text
stringlengths
8
5.77M
You Can and You Will 4″ Decal _ Vinyl motivational STICKER for laptop journal,wall or car matte black Luke Duke Decals - Great gift! Easy to install with instructions. Unique! If you want a different color please email me before buying it and Ill let you know if I can do it. Thanks! waterproof, will not fade, more durable than a sticker! . 4" x 3. 1" color is as shown. The Sticker Boss - Great gift! Easy to install with instructions. Unique! If you want a different color please email me before buying it and Ill let you know if I can do it. Color is as shown. 4" x 3. 1". 4" x 3. 1" please measure your lab top. We do make custom sizes ! Just message me! . If you need a smaller size please message us after checkout. Thanks! waterproof, will not fade, more durable than a sticker! Will not fit 2017 15inch macbook Pro Please measure the area you are to place it to make sure it will fit. Epic Designs - Trademark registration# 5206638 All counterfeits will be reported. Waterproof, will not fade, more durable than a sticker! Note: this item has a registered trademark. Vinyl color Matte BLACK. 4" x 3. 1" please measure your lab top. Great gift! Easy to install with instructions. Unique! We do make custom sizes ! Just message me! Die cut high quality vinyl. Made only by Epic Designs in the USA. Trademark registration# 5206638 All counterfeits will be reported. Note: this item has a registered trademark. Measures approximately 7". Decal & Sticker Pro ® - Trademark registration# 5206638 All counterfeits will be reported. Die cut high quality vinyl. Note: this item has a registered trademark. Measures approximately 7". Made only by Epic Designs in the USA. Waterproof, will not fade, more durable than a sticker!4" x 3. 1" please measure your lab top. Great gift! Easy to install with instructions. Southern Sticker Company - Made in the USA. Measures approximately 7". Rated to last 6 years. Die cut high quality vinyl. We do make custom sizes ! Just message me! We stand behind all of our decals 100%. Made only by Epic Designs in the USA. We hand make all of our Decals here in the USA. 4" x 3. 1" please measure your lab top. We include application instructions with all of our decals. Note: this item has a registered trademark. Vinyl color Matte BLACK. Great gift! Easy to install with instructions. Unique! Won't leave residue upon removal. Trademark registration# 5206638 All counterfeits will be reported. Made from high quality vinyl. Easy to apply, instructions included. Matt Black. Waterproof, will not fade, more durable than a sticker! Wicked Decals® - Made in the USA. Please contact us for any customization request or a different color. Easy to apply, instructions included. Easily apply to any smooth surface. Die cut high quality vinyl. Size: 2. 76 inches high. Made only by Epic Designs in the USA. Great gift! Easy to install with instructions. Unique! High quality Vinyl. Sold exclusively by Wicked Decals®. Just peel and apply. High quality decal printed on a clear vinyl. Official wicked decals® Brand Product - "Wicked decals. They are simply wicked!". Wicked decals. They are simply wicked!" Waterproof, will not fade, more durable than a sticker! Vinyl color Matte BLACK. Measures approximately 7". . They are simply wicked!". Matt Black. Easy to apply, instructions included. Size: 2. 76 inches high. Made in the USA. Measures approximately 7". Perfect for tumblers this is a smaller three inch version of our popular sea turtles Waterproof, will not fade, more durable than a sticker! Die cut high quality vinyl. Note: this item has a registered trademark. Made in USA. Easily applied on any smooth surface, peel and stick. Brand new items waterproof, will not fade, more durable than a sticker! Just peel and apply. High quality decal printed on a clear vinyl. Official wicked decals® Brand Product - "Wicked decals. They are simply wicked!". Made in the USA. Size: 2. 76 inches high. Laptop Macbook sticker decal - World map - skins stickers Epic Designs - Easily applied on any smooth surface, peel and stick. If you want to put other size, thank you for contact us first. This is just partial one. Printed on clear. 4" x 3. 1" please measure your lab top. Custom design by vinyl junkie graphics. Fits on 13, 15, 17 macbooks. Lovedecalhome @macbook decal could be used for macbook pro 13, retina 13 and air 13. Note: this has a clear outline and will ONLY work on silver and white notebooks. Won't leave residue upon removal. Fits 13, 15, 17. Great gift! Easy to install with instructions. Unique! Made in USA. Made in the USA. Matt Black. Size: 2. 76 inches high. Laminated with high gloss laminate for years of protection indoors or outdoors. StickAny - For 13" 15" & 17" mac Laptops. Laminated with high gloss laminate for years of protection indoors or outdoors. Instructions Included with every order :. The transfer paper will stick to the Sticker/Decal and the Backing will be discarded at this time. Won't leave residue upon removal. This is what is keeping the sticky part of your sticker sticky and ready for action. Sticker in picture is shown on a 13" mac when you receive your brand new sticker/decal you'll notice 3 parts: 1 - Transfer Paper - This is how you will move the sticker from the packaging to your surface. This will noT show up on a black laptop. Its located behind the sticker on the bottom of the trio. Car Phone Helmet - SELECT SIZE - Cacti Set Cute Trendy Vinyl Sticker AK Wall Art Company - This will noT show up on a black laptop. Easily apply to any smooth surface. Small size is great for phone, helmet, laptop, I pad, car window, etc. Simple peel & stick application. Note: this item has a registered trademark. Instructions Included with every order :. Made from award winning vinyl by Orafol. Made only by Epic Designs in the USA.
Our Partners WFCM“As an expression of God’s love and an opportunity to share the Gospel of Jesus Christ, Western Fairfax Christian Ministries (WFCM) provides life-essential support to those needing our assistance.” FACETS FACETS opens doors by helping parents, their children, and individuals who suffer the effects of poverty in Fairfax County. Church World Service Church World Service is people reaching out to neighbors in need near and far–not with a hand out, but a hand up. So, if you’re looking to help build a better world—a world where there’s enough for all—you’ve come to the right place! CWS is working with partners in the U.S. and around the world to build interfaith and intercultural coalitions to eradicate hunger and poverty and promote peace and justice. Together, we’re supporting sustainable grassroots development, disaster relief, and refugee assistance.
Law minister Ravi Shankar Prasad NEW DELHI: More than 50% of high courts in the country have opposed the Centre’s proposal to constitute an All India Judicial Service to recruit judges at the level of district judges. The Centre’s proposal has been pending since 2012 when it had suggested creation of an all-India service on the lines of recruitment of IAS/IPS officers by the Union Public Service Commission. At least 15 of the 25 HCs and state governments of Arunachal Pradesh, Himachal Pradesh, Karnataka, Madhya Pradesh , Meghalaya, Nagaland and Punjab have objected to the Centre’s proposal, law minister Ravi Shankar Prasad told Lok Sabha on Wednesday. The minister, however, argued in favour of constitution of a centralised recruitment authority for district judges. “In government’s view, a properly framed All India Judicial Service (AIJS) is important to strengthen overall justice delivery system. This will give an opportunity for induction of suitably qualified fresh legal talent selected through a proper all-India merit selection system as well as address the issue of social inclusion by enabling suitable representation to marginalised and deprived sections of society,” he said in his written reply to a question. Prasad said the HCs of Sikkim and Tripura had concurred with the proposal approved by a committee of secretaries for formation of AIJS. The HCs of Allahabad, Chhattisgarh, Himachal Pradesh, Kerala , Manipur, Meghalaya, Orissa and Uttarakhand suggested changes in age at the induction level, qualifications, training and quota of vacancies to be filled through AIJS. “Rests of the high courts have not favoured the idea,” he said. The reason, the minister said, was that most HCs did not want to cede administrative control over the subordinate judiciary. While the HCs of Jharkhand and Rajasthan indicated that the matter was under consideration, HCs of Calcutta, J&K and Gauhati are yet to respond to the Centre’s proposal.
General immunological status of nasopharyngeal carcinoma patients in Singapore. Newly diagnosed NPC patients were found to have impaired general T-cell functions, as determined in vivo by the Mantoux test and in vitro by the PHA response assay. Treated remission patients were as hyporesponsiveness as newly diagnosed patients. PHA hyporesponsiveness was associated with the HLA profile of A2-B Sin 2 and with high antibody titres to EBV-related antigens, in particular to the early antigen. Impaired responses in the Mantoux or PHA tests were associated with poor survival. The impaired response could be partially or totally restored by in vitro treatment of the hyporesponsive lymphocytes with levamisole.
Emma Stone Oscars 2011 2011 Oscars Afterparty: Emma Stone Next up on the afterparty scene is the lovely Emma Stone. Tonight she opted for a funky cool Chanel number that's short in the front and long in the back. The swirly design gives it a groovy kick, as does her shaggy haircut, while her green ring pulls in more color. What do you think of this entire look — love it or hate it?
Effect of short-term exposure to zidovudine (AZT) on the expression of mitochondria-related genes in skeletal muscle of neonatal mice. Zidovudine (3'-azido-3'-deoxythymidine; AZT) is the main anti-retroviral drug given to HIV-1-infected pregnant women during pregnancy and to their infants after birth to reduce mother-to-child transmission of the virus. In animal studies, however, a significant mitochondrial morphological damage has been reported in skeletal muscle as a consequence of transplacental or perinatal exposure to AZT. Because proper muscle function is highly dependent on efficient mitochondrial function and information on AZT-induced mitochondrial toxicity during neonatal exposure is limited, we investigated the effect of AZT on the expression of 542 mitochondria-related genes encoded by both nuclear and mitochondrial DNA in the skeletal muscle of infant male and female mice using microarray technology. Animals were treated orally by gavage with AZT at 0, 10, 50, 100, and 200mg/kg body weight/day from postnatal day (PND) 1 through 8 and were sacrificed at 1- and 2-h following the last dose on PND 8. These doses in mice correspond to 0, 1.1, 5.5, 11.0, and 22.0mg/kg AZT in human infants [Center for Drug Evaluation and Research (CDER) 2005. Pharmacology and Toxicology, Guidance for industry. Estimating the maximum safe dose in initial clinical trials for therapeutics in adult healthy volunteers, p. 7. http://www.fda.gov/cder/guidance/index.htm.]. Microarray data were analyzed for effects of time, sex, treatment, and their interactions using a fixed effect linear model. The results showed modest, but significant, dose-related responses in the expression level of genes associated with apoptosis, fatty acid metabolism, mitochondrial DNA maintenance, and various mitochondrial membrane transporters. The transcription levels were not significantly different at both time points and were not sex dependent. The results suggest that changes in expression of mitochondria-related genes in skeletal muscle may be an initial response to short-term AZT exposure in infant mice.
Novel Assay for Quantitative Analysis of DNA Methylation at Single-Base Resolution. The DNA methylation profile provides valuable biological information with potential clinical utility. Several methods, such as quantitative methylation-specific PCR (qMSP), have been developed to examine methylation of specific CpG sites. Existing qMSP-based techniques fail to examine the genomic methylation at a single-base resolution, particularly for loci in gene bodies or extensive CpG open seas lacking flanking CpGs. Therefore, we established a novel assay for quantitative analysis of single-base methylation. To achieve a robust single-base specificity, we developed a PCR-based method using paired probes following bisulfite treatment. The 6-carboxyfluorescein- and 2'-chloro-7'phenyl-1,4-dichloro-6-carboxy-fluorescein-labeled probes conjugated with minor groove binder were designed to specifically bind to the methylated and unmethylated allele of targeted single CpGs at their 3' half regions, respectively. The methylation percentage was calculated by values of methylation / (methylation + unmethylation). In the detection of single CpGs within promoters or bodies of 4 human genes, the quantitative analysis of the single-base methylation assay showed a detection capability in the 1 to 1:10000 dilution experiments with linearity over 4 orders of magnitude (R 2 = 0.989-0.994; all P < 0.001). In a cohort of 10 colorectal cancer samples, the assay showed a comparable detection performance with bisulfite pyrosequencing (R 2 = 0.875-0.990; all P < 0.001), which was better than conventional qMSP methods normalized by input control reaction (R 2 = 0.841 vs 0.769; P = 0.002 vs 0.009). This assay is highly specific and sensitive for determining single-base methylation and, thus, is potentially useful for methylation-based panels in diagnostic and prognostic applications.
News and updates for the BABS Genome education and outreach initiative of the School of Biotechnology and Biomolecular Sciences at UNSW Sydney, Australia. Join us as we sequence, assemble and analyse the genomes of some iconic Australian species. Thursday, 3 August 2017 Sequencing technologies used for the BABS Genome Sequencing for the BABS Genome is being performed at the Ramaciotti Centre for Genomics at UNSW, which is one of Australia’s top sequencing centres and has a long, rich history of genome sequencing. The Gold Standard for genome assembly is currently to combine three technologies: High coverage short read sequencing for accurate base calling of unique regions. Long read sequencing for assembling complex and small repetitive regions of the genome. Long range sequencing for scaffolding contigs across larger repetitive regions of the genome. We will be using a combination of three of these latest technologies for the BABS genome: Illumina NovaSeq and HiSeq X Short read Illumina sequencing is still the starting point for sequencing large (>0.5 Gb) genomes. Although it is impossible to assemble short read data alone into a high-quality genome, it remains the most cost-effective technology in terms of high-quality bases sequenced per dollar. Illumina sequencing struggles with regions of the genome with certain compositional bias and short read assembly fails at repetitive regions. Nevertheless, it is possible to get a useful assembly of a large portion of the “unique” genome, which includes most of the protein-coding genes. For the 2017 BABS genome, we are using two of the latest - and most cost-effective - Illumina sequencing platform: the HiSeq X (XTen) and new HiSeq NovaSeq. These machines have a phenomenal output per run. The NovaSeq is being used for pure Illumina sequencing, whereas the HiSeq X is being used for the sequencing component of the 10X Genomics Linked Read sequencing (below). PacBio Sequel Whole genome sequencing and assembly has been revolutionised by the development of long read sequencing technologies by Pacific Biosciences (PacBio) and Oxford Nanopore (MinION). With typical read lengths a hundred times longer than Illumina reads, long read sequencing enables resolution of many of the shorter repetitive regions in the genome. Long read sequencing is still comparably expensive and the budget does not stretch for a pure PacBio assembly this year. However, we will be getting some sequencing done on the new PacBio Sequel, which will help with scaffolding Illumina contigs. We also hope to be able to generate a pure PacBio mitochondrial genome; mitochondria are present in multiple copies per cell, which effectively increases the depth of coverage! 10X Genomics Chromium Linked Reads Due to the cost (and DNA requirements) of long read sequencing, there has been considerable effort in recent years to combine cost-effective Illumina short read sequencing with additional experimental approaches to leverage long-range information. The long range service offered by the Ramaciotti Centre is 10X Genomics Chromium linked read sequencing. Unlike PacBio or MinION, this does not contiguously sequence a long DNA molecule. Instead, it uses a clever barcoding system to link short reads back to their DNA molecule of origin. 10X Genomics software then uses this linkage to regenerate pseudo-long-reads that can be used for both genome assembly and haplotype phasing.
The Canada Border Services Agency had a busy 2017, as they continued to fulfill their mandate to protect the borders of the country. Here in Saskatchewan, they are expected to have processed more than 650,000 for the year by midnight Sunday. With such a high number of travelers coming into the country, they had a fair number of instances where they were required to take action. Across the ports of entry in southern Saskatchewan, they seized 25 undeclared firearms. Nearly two-thirds of those were handguns. On June 16th, officers at Coronach seized a loaded handgun from a suspected impaired driver. The Montana man was handed over to the RCMP. He did pay a $1,000 penalty for failing to declare the weapon but was denied entry into Canada. CBSA officers are also tasked with disrupting the flow of illegal drugs into Canada. They made 80 seizures at border crossings in 2017, the biggest of which was in December at the Regway crossing. Officers there stopped a commercial vehicle headed to Regina and found 694 grams of suspected doda, a narcotic made from the crushed pods of the opium poppy. The driver was arrested and then turned over to the RCMP. Officers were also involved with the RCMP in April in regards to human smuggling over the border. A women was arrested with nine people in a van, and her husband was taken into custody south of the border for similar activities. That investigation has since been left fully to the RCMP. Part of the job of the CBSA is determining the admissibility of people into Canada. In August, again at the port of Regway, officers denied entry to two registered sex offenders. They were allowed to return to the United States. The convictions the two had included aggravated sexual assault of a child. “As a professional law enforcement agency, the CBSA in Saskatchewan is unwavering in its commitment to serve and protect Canadians,” explained Guy Rook, director of the Southern Albert and Southern Saskatchewan District. “We take great pride in knowing that by securing the border, we are making our communities safer.” "It's been a great year, and looking ahead to 2018, our officers will continue to exercise due diligence, and ensure that only admissible people and goods are allowed into the country," added spokesperson Lisa White. She noted that it is hard to compare the number of occurrences year to year as they fluctuate, and predicting that for the next year can be just as difficult. However, the number of travelers crossing the border has pretty much remained steady from 2016. When the City of Estevan wants local news, weather, and sports online and on-demand, they turn to Discover Estevan. As Estevan's website for local job listings, free classifieds, garage sales, family events, business directory and weather cancellations, DiscoverEstevan is your connection to local information.
-------- EventFlow: Npc_Attacked_006 -------- Actor: EventSystemActor entrypoint: None() actions: [] queries: ['CheckFlag', 'CheckGameDataInt'] params: {'CreateMode': 0, 'IsGrounding': False, 'IsWorld': False, 'PosX': 0.0, 'PosY': 0.0, 'PosZ': 0.0, 'RotX': 0.0, 'RotY': 0.0, 'RotZ': 0.0} Actor: Npc_Attacked_006 entrypoint: None() actions: ['Demo_Talk', 'Demo_TalkASync', 'Demo_LookAtObject', 'Demo_ReturnAnchor'] queries: ['CheckTerrorLevel', 'CheckResultOfNPCConflict'] params: {'CreateMode': 0, 'IsGrounding': False, 'IsWorld': False, 'PosX': 0.0, 'PosY': 0.0, 'PosZ': 0.0, 'RotX': 0.0, 'RotY': 0.0, 'RotZ': 0.0} Actor: Npc_Attacked_011 entrypoint: None() actions: ['Demo_Talk', 'Demo_LookAtObject', 'Demo_PlayASForDemo'] queries: ['IsWeaponDrawn'] params: {'CreateMode': 0, 'IsGrounding': False, 'IsWorld': False, 'PosX': 0.0, 'PosY': 0.0, 'PosZ': 0.0, 'RotX': 0.0, 'RotY': 0.0, 'RotZ': 0.0} void Talk() { switch Npc_Attacked_006.CheckTerrorLevel() { case [0, 1, 2, 4]: Event3: call InitTalk.InitTalk({'Arg_Turn': 0, 'Arg_Greeting': 'FollowAISchedule'}) if EventSystemActor.CheckFlag({'FlagName': 'AttackedNPC_Set3_Saved'}) { Npc_Attacked_006.Demo_Talk({'IsWaitFinish': True, 'IsBecomingSpeaker': True, 'IsOverWriteLabelActorName': False, 'ASName': '', 'IsCloseMessageDialog': True, 'MessageId': 'EventFlowMsg/Npc_Attacked_006:After00'}) } else { Event5: call Npc_Road_Common.Atacked_Pair({'Flag': 'Npc_Attacked_006_CookReward', 'AttackedState': 'Npc_Attacked_011_AttackedState', 'TerrorState': 'Npc_Attacked_011_TerrorState', 'Self': ActorIdentifier(name="Npc_Attacked_006"), 'Pair': ActorIdentifier(name="Npc_Attacked_011")}) Npc_Attacked_006.Demo_Talk({'IsWaitFinish': True, 'IsBecomingSpeaker': True, 'IsOverWriteLabelActorName': False, 'IsCloseMessageDialog': True, 'MessageId': 'EventFlowMsg/Npc_Attacked_006:GoodBye00', 'ASName': ''}) } case 3: switch Npc_Attacked_006.CheckResultOfNPCConflict() { case [0, 1]: if EventSystemActor.CheckGameDataInt({'Operator': 'Equal', 'Value': 2, 'GameDataIntName': 'Npc_Attacked_011_AttackedState'}) { goto Event3 } else { call InitTalk.InitTalk({'Arg_Greeting': 'FollowAISchedule', 'Arg_Turn': 6}) goto Event5 } case 2: call InitTalk.InitTalk({'Arg_Greeting': 'FollowAISchedule', 'Arg_Turn': 5}) Event22: call Npc_Road_Common.Atacked_Pair({'Flag': 'Npc_Attacked_006_CookReward', 'AttackedState': 'Npc_Attacked_011_AttackedState', 'Self': ActorIdentifier(name="Npc_Attacked_006"), 'Pair': ActorIdentifier(name="Npc_Attacked_011"), 'TerrorState': 'Npc_Attacked_011_TerrorState'}) case 3: call InitTalk.InitTalkNPCEquip({'Arg_Greeting': 'FollowAISchedule', 'Arg_Turn': 5}) goto Event22 } case 5: call InitTalk.InitTalk({'Arg_Greeting': 'FollowAISchedule', 'Arg_Turn': 2}) Npc_Attacked_006.Demo_Talk({'IsWaitFinish': True, 'IsBecomingSpeaker': True, 'IsOverWriteLabelActorName': False, 'IsCloseMessageDialog': True, 'MessageId': 'EventFlowMsg/Npc_Attacked_006:Guardian00', 'ASName': 'Detect'}) } } void MeetingTalk() { call InitTalk.InitTalk_Pair({'Arg_Greeting': 'FollowAISchedule', 'Arg_Turn': 0, 'Actor1': 'Npc_Attacked_006', 'Actor2': 'Npc_Attacked_011'}) fork { Npc_Attacked_006.Demo_Talk({'IsWaitFinish': True, 'IsBecomingSpeaker': True, 'IsOverWriteLabelActorName': False, 'IsCloseMessageDialog': True, 'MessageId': 'EventFlowMsg/Npc_Attacked_006:Meeting02', 'ASName': ''}) } { Npc_Attacked_011.Demo_LookAtObject({'IsWaitFinish': True, 'IsValid': True, 'FaceId': 2, 'UniqueName': '', 'PosOffset': [0.0, 0.0, 0.0], 'TurnPosition': [0.0, 0.0, 0.0], 'TurnDirection': 0.0, 'ObjectId': 0, 'ActorName': 'GameROMPlayer'}) if Npc_Attacked_011.IsWeaponDrawn() { Npc_Attacked_011.Demo_PlayASForDemo({'SeqBank': 0, 'IsEnabledAnimeDriven': -1, 'ClothWarpMode': -2, 'MorphingFrame': -1.0, 'ASName': 'GuardUnequip', 'IsWaitFinish': True, 'IsIgnoreSame': True, 'TargetIndex': 0}) Npc_Attacked_011.Demo_PlayASForDemo({'IsIgnoreSame': False, 'TargetIndex': -1, 'SeqBank': 0, 'IsEnabledAnimeDriven': -1, 'ClothWarpMode': -2, 'MorphingFrame': -1.0, 'ASName': 'Talk_Wait', 'IsWaitFinish': False}) } } fork { Npc_Attacked_011.Demo_LookAtObject({'IsWaitFinish': True, 'ObjectId': 1, 'IsValid': True, 'FaceId': 2, 'UniqueName': '', 'PosOffset': [0.0, 0.0, 0.0], 'TurnPosition': [0.0, 0.0, 0.0], 'TurnDirection': 0.0, 'ActorName': 'Npc_Attacked_006'}) Npc_Attacked_011.Demo_Talk({'IsWaitFinish': True, 'IsBecomingSpeaker': True, 'IsOverWriteLabelActorName': False, 'IsCloseMessageDialog': True, 'MessageId': 'EventFlowMsg/Npc_Attacked_011:Meeting00', 'ASName': 'Talk'}) } { Npc_Attacked_006.Demo_LookAtObject({'IsWaitFinish': True, 'ObjectId': 1, 'IsValid': True, 'FaceId': 2, 'UniqueName': '', 'PosOffset': [0.0, 0.0, 0.0], 'TurnPosition': [0.0, 0.0, 0.0], 'TurnDirection': 0.0, 'ActorName': 'Npc_Attacked_011'}) } Npc_Attacked_006.Demo_ReturnAnchor({'IsWaitFinish': True}) Npc_Attacked_006.Demo_Talk({'IsWaitFinish': True, 'IsBecomingSpeaker': True, 'IsOverWriteLabelActorName': False, 'IsCloseMessageDialog': True, 'MessageId': 'EventFlowMsg/Npc_Attacked_006:Meeting00', 'ASName': 'Act_TreasureHunter'}) } void Near() { Npc_Attacked_006.Demo_TalkASync({'IsWaitFinish': True, 'IsChecked': False, 'DispFrame': 90, 'MessageId': 'EventFlowMsg/Npc_Attacked_006:Near00'}) } void MeetingNear() { Npc_Attacked_006.Demo_TalkASync({'IsWaitFinish': True, 'IsChecked': False, 'DispFrame': 90, 'MessageId': 'EventFlowMsg/Npc_Attacked_006:Near01'}) }
Child Labor Rule Proposal: What You Need to Know Fact # 1: The proposed Child Labor in Agriculture rule will not prohibit all people under the age of 18 from working on a farm. The proposed rule would not change any of the Fair Labor Standards Act's minimum age standards for agricultural employment. Under the FLSA, the legal age to be employed on a farm without restrictions is 16. The FLSA also allows children between the ages of 12 and 15 years, under certain conditions, to be employed outside of school hours to perform nonhazardous jobs on farms. Children under the age of 12 may be employed with parental permission on very small farms to perform nonhazardous jobs outside of school hours. Young people can be employed to perform many jobs on the farm – and this would be true even if the proposed rule were adopted as written. The proposed rule would, however, prohibit the employment of workers under the age of 18 in nonagricultural occupations in the farm-product raw materials wholesale trade industries. Prohibited establishments would include country grain elevators, grain elevators, grain bins, silos, feed lots, feed yards, stockyard, livestock exchanges, and livestock auctions not on a farm or used solely by a single farmer. What these locations have in common is that many workers, including children, have suffered occupational deaths or serious injuries working in these facilities over the last few years. Fact # 2: The proposed rule would not eliminate the parental exemption for owners/operators of a family farm. The parental exemption for the owner or operator of a farm is statutory and cannot be eliminated through the regulatory process. A child of any age may perform any job, even hazardous work, at any age at any time on a farm owned by his or her parent. A child of any age whose parent operates a farm may also perform any task, even hazardous jobs, on that farm but only outside of school hours. So for children working on farms that are registered as LLCs, but operated solely by their parents, the parental exemption would still apply. Fact # 3: This proposed regulation will not eliminate 4-H and FFA programs. The Department of Labor fully supports the important contributions both 4-H and the FFA make toward developing our children. The proposed rule would in no way prohibit a child from raising or caring for an animal in a non-employment situation — even if the animal were housed on a working farm — as long as he or she is not hired or "employed" to work with the animal. In such a situation, the child is not acting as an "employee" and is not governed by the child labor regulations. And there is nothing in the proposed rule that would prevent a child from being employed to work with animals other than in those specific situations identified in the proposal as particularly hazardous. Fact # 4: Under the proposed rule, children will still be able to help neighbors in need of help. In order for the child labor provisions of the FLSA to apply, there must first be an employer/employee relationship. The lone act of helping a neighbor round up loose cattle who have broken out of their fencing, for example, generally would not establish an employer/employee relationship. Fact # 5: Children will still be able to take animals to the county fair or to market. A child who raises and cares for his or her animal -- for example, as part of a 4-H project -- is not being employed by anyone, and thus is outside the coverage of the FLSA. Even if the child needs to rent space from a farm, the animal is not part of the farm’s business and with regard to the care of the animal no employer/employee relationship exists, so the child labor provisions would not apply. Likewise, there would be no problem with taking the animal to the county fair or to market, since the child is doing this on his/her own behalf – not on behalf of an employer. The proposed prohibitions would apply only if the child was an employee of the exchange or auction.
I'm not a C++ guy, but I'm forced to think about this. Why is multiple inheritance possible in C++, but not in C#? (I know of the diamond problem, but that's not what I'm asking here). How does C++ resolve the ambiguity of identical method signatures inherited from multiple base classes? And why is the same design not incorporated into C#? Sure, I googled it, but how do I know that that is what Sandeep means? If you're going to reference something by an obscure name, when "Multiple inheritance with a shared common ancestor" is more direct ... – jcolebrandJan 30 '13 at 6:24 1 @jcolebrand I edited it to reflect what I got from the question. I assume he means the diamond problem referenced on wikipedia from the context. Next time drop the friendly comment, AND use the shiny new suggested edit tool :) – EarlzJan 30 '13 at 7:43 1 @Earlz that only works when I understand the reference. Otherwise I'm making a bad edit, and that's just bad juju. – jcolebrandJan 30 '13 at 13:24 2 Answers 2 I thing (without having hard reference), that in Java they wanted to limit the expressiveness of the language to make the language easier to learn and because code using multiple inheritance is more often too complex for it's own good than not. And because full multiple inheritance is a lot more complicated to implement, so it simplified the virtual machine a lot too (multiple inheritance interacts especially badly with garbage collector, because it requires keeping pointers into the middle of object (at the beginning of the base)) And when designing C# I think they looked at Java, saw that full multiple inheritance indeed wasn't missed much and elected to keep things simple as well. How does C++ resolve the ambiguity of identical method signatures inherited from multiple base classes? It does not. There is a syntax to call base class method from specific base explicitly, but there is no way to override only one of the virtual methods and if you don't override the method in the subclass, it's not possible to call it without specifying the base class. And why is the same design not incorporated into C#? There is nothing to incorporate. Since Giorgio mentioned interface extension methods in comments, I'll explain what mixins are and how they are implemented in various languages. Interfaces in Java and C# are limited to declaring methods only. But the methods have to be implemented in each class that inherits the interface. There is however large class of interfaces, where it would be useful to provide default implementations of some methods in terms of others. Common example is comparable (in pseudo-language): Difference from full class is that this can't contain any data members. There are several options for implementing this. Obviously multiple inheritance is one. But multiple inheritance is rather complicated to implement. But it's not really needed here. Instead, many languages implement this by splitting the mixin in an interface, which is implemented by the class and a repository of method implementations, that are either injected into the class itself or an intermediate base class is generated and they are placed there. This is implemented in Ruby and D, will be implemented in Java 8 and can be implemented manually in C++ using the curiously recurring template pattern. The above, in CRTP form, looks like: This does not require anything to be declared virtual as regular base class would, so if the interface is used in templates leaves useful optimization options open. Note, that in C++ this would probably still be inherited as second parent, but in languages that don't allow multiple inheritance it't inserted into the single inheritance chain, so it's more like The compiler implementation may or may not avoid the virtual dispatch. A different implementation was selected in C#. In C# the implementations are static methods of completely separate class and the method call syntax is appropriately interpreted by compiler if a method of given name does not exist, but an "extension method" is defined. This has the advantage that extension methods can be added to already compiled class and the disadvantage that such methods can't be overriden e.g. to provide optimized version. One might want to mention that multiple inheritance will be introduced into Java 8 with interface extension methods. – GiorgioJan 30 '13 at 9:10 @Giorgio: No, multiple inheritance will definitely not be introduced in Java. Mixins will be, which is very different thing, though it covers many remaining reasons to use multiple inheritance and most reasons to use curiously recurring template pattern (CRTP) and works mostly like CRTP, not like multiple inheritance at all. – Jan HudecJan 30 '13 at 9:42 I think multiple inheritance doesn't require pointers into middle of an object. If it did, multiple interface inheritance would also require it. – svickJan 30 '13 at 10:17 @svick: No, it does not. But the alternative is much less efficient as it requires virtual dispatch for member access. – Jan HudecJan 30 '13 at 10:49 +1 for a much more complete answer than mine. – Nathan C. TreschJan 30 '13 at 12:56 The answer is that it doesn't work correctly in C++ in the event of namespace clashes. See this. To avoid namespace clashing you have to do all kinds of gyrations with pointers. I worked at MS on the Visual Studio team and I at least in part the reason they developed delegation was to avoid namespace collision altogether. Preiouvsly I had said that they also considered Interfaces to be part of the multiple inheritance solution, but I was mistaken. Interfaces are actuallly amazing and can be made to work in C++, FWIW. Delegation specifically addresses namespace collision: You can delegate to 5 classes and all 5 of them will export their methods to your scope as first class members. On the outside looking in this IS multiple inheritance. I find it very unlikely that this was the primary reason for not to include MI in C#. Furthermore, this post does not answer the question why MI works in C++ when you don't have "namespace clashes". – Doc BrownJan 30 '13 at 12:07 @DocBrown I worked at MS on the Visual Studio team and I assure you that's at least in part the reason they developed delegation and interfaces, to avoid namespace collision altogether. As to the quality of the question, meh. Use your downvote, others seem to think that it's useful. – Nathan C. TreschJan 30 '13 at 12:55 @DocBrown As to your assertion that it works in C++, you're mistaken. Namespace collision is a real issue. Name magling mitigtates that, I'm given to understand, but it's not 100%. – Nathan C. TreschJan 30 '13 at 12:58 I have no intention to downvote your answer since I think it is a correct one. But your answer pretends MI is completely unusable in C++, and that's the reason they did not introduce it in C#. Though I don't like MI very much in C++, I think it is not completely unuasable. – Doc BrownJan 30 '13 at 14:04 1 It's one of the reasons, and I didn't mean to imply that it doesn't ever work. When something is non-deterministic in computing I tend to say it's "broken", or that it "doesn't work" when I intend to mean "it's like voodoo, it may or may not work, light your candles and pray." :D – Nathan C. TreschJan 30 '13 at 14:06
A new development in the increasingly controversial war against alleged copyright infringement is raising eyebrows in Sweden. Police raided Undertexter.se yesterday, a site which indexes subtitles that have been hand-created by its members. Blaming the United States for the shutdown, the site's operators are defiant and warn Hollywood that they will never give up. Needless to say, the Pirate Party is outraged. These days it’s a fairly common occurrence for sites offering links to movies and TV shows to attract the attention of authorities. It happens almost every week and considering the power of Hollywood, hardly comes as a surprise. However, an event in the past 24 hours is a step beyond anything seen so far in Sweden, a country that has long-enjoyed the freedom to share files but has increasingly felt pressure from the United States and its powerful Hollywood-based movie companies. There are plenty of sites online that offer subtitle files so that speakers of any language (and of course the deaf) are able to enjoy watching and understanding movies and TV shows. Many of these carry subtitles ripped from consumer DVDs and Blu-ray discs so it’s perhaps understandable when copyright holders object to their distribution. However, there are also sites that offer subtitles created by fans. Enthusiasts watch a movie or TV show and set to work translating the dialog and manually transforming it into a text file. These are then offered on sites various indexes around the web. One such site, Undertexter.se, paid the ultimate price for their subtitle-creation activities when police raided the site yesterday and seized its servers. “The people who work on the site don’t consider their own interpretation of dialog to be something illegal, especially when we’re handing out these interpretations for free,” says site founder Eugen Archy. However, the authorities clearly don’t agree and Archy says he knows who pushed them to that conclusion – famous Rättighetsalliansen (Rights Alliance) anti-piracy lawyer Henrik Pontén. “No Hollywood, you played the wrong card here. We will never give up, we live in a free country and Swedish people have every right to publish their own interpretations of a movie or TV show,” Archy insists. Needless to say, the Swedish Pirate Party is outraged at the development. “The copyright industry is increasingly resorting to desperate measures to preserve their outdated business model,” says party leader Anna Troberg. “Today’s copyright monopoly inhibits creativity and creation in a way that is completely unreasonable. The raid on Undertexter.se is yet more proof that it is time to completely reform copyright law.” In October 2012 another fan-subtitling controversy raised its head in Scandinavia when it was discovered that Netflix was using subtitles created by fans on DivX Finland for the show Andromeda. “We have removed the series from Netflix pending the investigation,” Netflix told us at the time. “We are a legitimate service and pay a lot of money for the TV programs and movies on Netflix, including subtitles.” And there’s the difference. Users of Undertexter were getting subtitles not only for free, but also in a shorter time frame when compared to official outlets. Upsetting the status quo in this way probably got them raided yesterday. “More news coming soon greedy Hollywood,” Undertexter’s founder concludes.
// Copyright 2017 Yahoo Holdings. Licensed under the terms of the Apache 2.0 license. See LICENSE in the project root. #include <util/timer.h> #include <httpclient/httpclient.h> #include <util/filereader.h> #include <util/clientstatus.h> #include <vespa/vespalib/crypto/crypto_exception.h> #include <vespa/vespalib/net/crypto_engine.h> #include <vespa/vespalib/net/tls/transport_security_options.h> #include <vespa/vespalib/net/tls/tls_crypto_engine.h> #include <vespa/vespalib/io/mapped_file_input.h> #include "client.h" #include "fbench.h" #include <cstring> #include <cmath> #include <csignal> #include <cinttypes> #include <cstdlib> namespace { std::string maybe_load(const std::string &file_name, bool &failed) { std::string content; if (!file_name.empty()) { vespalib::MappedFileInput file(file_name); if (file.valid()) { content = std::string(file.get().data, file.get().size); } else { fprintf(stderr, "could not load file: '%s'\n", file_name.c_str()); failed = true; } } return content; } } sig_atomic_t exitSignal = 0; FBench::FBench() : _crypto_engine(), _clients(), _ignoreCount(0), _cycle(0), _filenamePattern(NULL), _outputPattern(NULL), _byteLimit(0), _restartLimit(0), _maxLineSize(0), _keepAlive(true), _usePostMode(false), _headerBenchmarkdataCoverage(false), _seconds(60), _singleQueryFile(false) { } FBench::~FBench() { _clients.clear(); free(_filenamePattern); free(_outputPattern); } bool FBench::init_crypto_engine(const std::string &ca_certs_file_name, const std::string &cert_chain_file_name, const std::string &private_key_file_name, bool allow_default_tls) { if (ca_certs_file_name.empty() && cert_chain_file_name.empty() && private_key_file_name.empty()) { if (allow_default_tls) { _crypto_engine = vespalib::CryptoEngine::get_default(); } else { _crypto_engine = std::make_shared<vespalib::NullCryptoEngine>(); } return true; } if (ca_certs_file_name.empty()) { fprintf(stderr, "CA certificate required; specify with -T\n"); return false; } if (cert_chain_file_name.empty() != private_key_file_name.empty()) { fprintf(stderr, "both client certificate AND client private key required; specify with -C and -K\n"); return false; } bool load_failed = false; auto ts_builder = vespalib::net::tls::TransportSecurityOptions::Params(). ca_certs_pem(maybe_load(ca_certs_file_name, load_failed)). cert_chain_pem(maybe_load(cert_chain_file_name, load_failed)). private_key_pem(maybe_load(private_key_file_name, load_failed)). authorized_peers(vespalib::net::tls::AuthorizedPeers::allow_all_authenticated()). disable_hostname_validation(true); // TODO configurable or default false! vespalib::net::tls::TransportSecurityOptions tls_opts(std::move(ts_builder)); if (load_failed) { fprintf(stderr, "failed to load transport security options\n"); return false; } try { _crypto_engine = std::make_shared<vespalib::TlsCryptoEngine>(tls_opts); } catch (vespalib::crypto::CryptoException &e) { fprintf(stderr, "%s\n", e.what()); return false; } return true; } void FBench::InitBenchmark(int numClients, int ignoreCount, int cycle, const char *filenamePattern, const char *outputPattern, int byteLimit, int restartLimit, int maxLineSize, bool keepAlive, bool base64Decode, bool headerBenchmarkdataCoverage, int seconds, bool singleQueryFile, const std::string & queryStringToAppend, const std::string & extraHeaders, const std::string &authority, bool postMode) { _clients.resize(numClients); _ignoreCount = ignoreCount; _cycle = cycle; free(_filenamePattern); _filenamePattern = strdup(filenamePattern); free(_outputPattern); _outputPattern = (outputPattern == NULL) ? NULL : strdup(outputPattern); _queryStringToAppend = queryStringToAppend; _extraHeaders = extraHeaders; _authority = authority; _byteLimit = byteLimit; _restartLimit = restartLimit; _maxLineSize = maxLineSize; _keepAlive = keepAlive; _base64Decode = base64Decode; _usePostMode = postMode; _headerBenchmarkdataCoverage = headerBenchmarkdataCoverage; _seconds = seconds; _singleQueryFile = singleQueryFile; } void FBench::CreateClients() { int spread = (_cycle > 1) ? _cycle : 1; int i(0); for(auto & client : _clients) { uint64_t off_beg = 0; uint64_t off_end = 0; if (_singleQueryFile) { off_beg = _queryfileOffset[i]; off_end = _queryfileOffset[i+1]; } client = std::make_unique<Client>(_crypto_engine, new ClientArguments(i, _clients.size(), _filenamePattern, _outputPattern, _hostnames[i % _hostnames.size()].c_str(), _ports[i % _ports.size()], _cycle, random() % spread, _ignoreCount, _byteLimit, _restartLimit, _maxLineSize, _keepAlive, _base64Decode, _headerBenchmarkdataCoverage, off_beg, off_end, _singleQueryFile, _queryStringToAppend, _extraHeaders, _authority, _usePostMode)); ++i; } } bool FBench::ClientsDone() { bool done(true); for (auto & client : _clients) { if ( ! client->done() ) { return false; } } return done; } void FBench::StartClients() { printf("Starting clients...\n"); for (auto & client : _clients) { client->start(); } } void FBench::StopClients() { printf("Stopping clients"); for (auto & client : _clients) { client->stop(); } printf("\nClients stopped.\n"); for (auto & client : _clients) { client->join(); } printf("\nClients Joined.\n"); } namespace { const char * approx(double latency, const ClientStatus & status) { return (latency > (status._timetable.size() / status._timetableResolution - 1)) ? "ms (approx)" : "ms"; } std::string fmtPercentile(double percentile) { char buf[32]; if (percentile <= 99.0) { snprintf(buf, sizeof(buf), "%2d ", int(percentile)); } else { snprintf(buf, sizeof(buf), "%2.1f", percentile); } return buf; } } void FBench::PrintSummary() { ClientStatus status; double maxRate = 0; double actualRate = 0; int realNumClients = 0; int i = 0; for (auto & client : _clients) { if (client->GetStatus()._error) { printf("Client %d: %s => discarding client results.\n", i, client->GetStatus()._errorMsg.c_str()); } else { status.Merge(client->GetStatus()); ++realNumClients; } ++i; } double avg = status.GetAverage(); maxRate = (avg > 0) ? realNumClients * 1000.0 / avg : 0; actualRate = (status._realTime > 0) ? realNumClients * 1000.0 * status._requestCnt / status._realTime : 0; if (_keepAlive) { printf("*** HTTP keep-alive statistics ***\n"); printf("connection reuse count -- %" PRIu64 "\n", status._reuseCnt); } printf("***************** Benchmark Summary *****************\n"); printf("clients: %8ld\n", _clients.size()); printf("ran for: %8d seconds\n", _seconds); printf("cycle time: %8d ms\n", _cycle); printf("lower response limit: %8d bytes\n", _byteLimit); printf("skipped requests: %8ld\n", status._skipCnt); printf("failed requests: %8ld\n", status._failCnt); printf("successful requests: %8ld\n", status._requestCnt); printf("cycles not held: %8ld\n", status._overtimeCnt); printf("minimum response time: %8.2f ms\n", status._minTime); printf("maximum response time: %8.2f ms\n", status._maxTime); printf("average response time: %8.2f ms\n", status.GetAverage()); for (double percentile : {25.0, 50.0, 75.0, 90.0, 95.0, 98.0, 99.0, 99.5, 99.6, 99.7, 99.8, 99.9}) { double latency = status.GetPercentile(percentile); printf("%s percentile: %8.2f %s\n", fmtPercentile(percentile).c_str(), latency, approx(latency, status)); } printf("actual query rate: %8.2f Q/s\n", actualRate); printf("utilization: %8.2f %%\n", (maxRate > 0) ? 100 * (actualRate / maxRate) : 0); printf("zero hit queries: %8ld\n", status._zeroHitQueries); printf("http request status breakdown:\n"); for (const auto& entry : status._requestStatusDistribution) printf(" %8u : %8u \n", entry.first, entry.second); fflush(stdout); } void FBench::Usage() { printf("usage: vespa-fbench [-H extraHeader] [-a queryStringToAppend ] [-n numClients] [-c cycleTime] [-l limit] [-i ignoreCount]\n"); printf(" [-s seconds] [-q queryFilePattern] [-o outputFilePattern]\n"); printf(" [-r restartLimit] [-m maxLineSize] [-k] <hostname> <port>\n\n"); printf(" -H <str> : append extra header to each get request.\n"); printf(" -A <str> : assign autority. <str> should be hostname:port format. Overrides Host: header sent.\n"); printf(" -P : use POST for requests instead of GET.\n"); printf(" -a <str> : append string to each query\n"); printf(" -n <num> : run with <num> parallel clients [10]\n"); printf(" -c <num> : each client will make a request each <num> milliseconds [1000]\n"); printf(" ('-1' -> cycle time should be twice the response time)\n"); printf(" -l <num> : minimum response size for successful requests [0]\n"); printf(" -i <num> : do not log the <num> first results. -1 means no logging [0]\n"); printf(" -s <num> : run the test for <num> seconds. -1 means forever [60]\n"); printf(" -q <str> : pattern defining input query files ['query%%03d.txt']\n"); printf(" (the pattern is used with sprintf to generate filenames)\n"); printf(" -o <str> : save query results to output files with the given pattern\n"); printf(" (default is not saving.)\n"); printf(" -r <num> : number of times to re-use each query file. -1 means no limit [-1]\n"); printf(" -m <num> : max line size in input query files [131072].\n"); printf(" Can not be less than the minimum [1024].\n"); printf(" -p <num> : print summary every <num> seconds.\n"); printf(" -k : disable HTTP keep-alive.\n"); printf(" -d : Base64 decode POST request content.\n"); printf(" -y : write data on coverage to output file.\n"); printf(" -z : use single query file to be distributed between clients.\n"); printf(" -T <str> : CA certificate file to verify peer against.\n"); printf(" -C <str> : client certificate file name.\n"); printf(" -K <str> : client private key file name.\n"); printf(" -D : use TLS configuration from environment if T/C/K is not used\n\n"); printf(" <hostname> : the host you want to benchmark.\n"); printf(" <port> : the port to use when contacting the host.\n\n"); printf("Several hostnames and ports can be listed\n"); printf("This is distributed in round-robin manner to clients\n"); } void FBench::Exit() { StopClients(); printf("\n"); PrintSummary(); std::_Exit(0); } int FBench::Main(int argc, char *argv[]) { // parameters with default values. int numClients = 10; int cycleTime = 1000; int byteLimit = 0; int ignoreCount = 0; int seconds = 60; int maxLineSize = 128 * 1024; const int minLineSize = 1024; const char *queryFilePattern = "query%03d.txt"; const char *outputFilePattern = NULL; std::string queryStringToAppend; std::string extraHeaders; std::string ca_certs_file_name; // -T std::string cert_chain_file_name; // -C std::string private_key_file_name; // -K bool allow_default_tls = false; // -D int restartLimit = -1; bool keepAlive = true; bool base64Decode = false; bool headerBenchmarkdataCoverage = false; bool usePostMode = false; bool singleQueryFile = false; std::string authority; int printInterval = 0; // parse options and override defaults. int idx; char opt; const char *arg; bool optError; idx = 1; optError = false; while((opt = GetOpt(argc, argv, "H:A:T:C:K:Da:n:c:l:i:s:q:o:r:m:p:kdxyzP", arg, idx)) != -1) { switch(opt) { case 'A': authority = arg; break; case 'H': extraHeaders += std::string(arg) + "\r\n"; if (strncmp(arg, "Host:", 5) == 0) { fprintf(stderr, "Do not override 'Host:' header, use -A option instead\n"); return -1; } break; case 'T': ca_certs_file_name = std::string(arg); break; case 'C': cert_chain_file_name = std::string(arg); break; case 'K': private_key_file_name = std::string(arg); break; case 'D': allow_default_tls = true; break; case 'a': queryStringToAppend = std::string(arg); break; case 'n': numClients = atoi(arg); break; case 'c': cycleTime = atoi(arg); break; case 'l': byteLimit = atoi(arg); break; case 'i': ignoreCount = atoi(arg); break; case 's': seconds = atoi(arg); break; case 'q': queryFilePattern = arg; break; case 'o': outputFilePattern = arg; break; case 'r': restartLimit = atoi(arg); break; case 'm': maxLineSize = atoi(arg); if (maxLineSize < minLineSize) { maxLineSize = minLineSize; } break; case 'P': usePostMode = true; break; case 'p': printInterval = atoi(arg); if (printInterval < 0) optError = true; break; case 'k': keepAlive = false; break; case 'd': base64Decode = false; break; case 'x': // consuming x for backwards compability. This turned on header benchmark data // but this is now always on. break; case 'y': headerBenchmarkdataCoverage = true; break; case 'z': singleQueryFile = true; break; default: optError = true; break; } } if ( argc < (idx + 2) || optError) { Usage(); return -1; } // Hostname/port must be in pair int args = (argc - idx); if (args % 2 != 0) { fprintf(stderr, "Not equal number of hostnames and ports\n"); return -1; } if (!init_crypto_engine(ca_certs_file_name, cert_chain_file_name, private_key_file_name, allow_default_tls)) { fprintf(stderr, "failed to initialize crypto engine\n"); return -1; } short hosts = args / 2; for (int i=0; i<hosts; ++i) { _hostnames.push_back(std::string(argv[idx+2*i])); int port = atoi(argv[idx+2*i+1]); if (port == 0) { fprintf(stderr, "Not a valid port:\t%s\n", argv[idx+2*i+1]); return -1; } _ports.push_back(port); } // Find offset for each client if shared query file _queryfileOffset.push_back(0); if (singleQueryFile) { // Open file to find offsets, with pattern as if client 0 char filename[1024]; snprintf(filename, 1024, queryFilePattern, 0); queryFilePattern = filename; FileReader reader; if (!reader.Open(queryFilePattern)) { fprintf(stderr, "ERROR: could not open file '%s' [read mode]\n", queryFilePattern); return -1; } uint64_t totalSize = reader.GetFileSize(); uint64_t perClient = totalSize / numClients; for (int i=1; i<numClients; ++i) { /** Start each client with some offset, adjusted to next newline **/ FileReader r; r.Open(queryFilePattern); uint64_t clientOffset = std::max(i*perClient, _queryfileOffset.back() ); uint64_t newline = r.FindNextLine(clientOffset); _queryfileOffset.push_back(newline); } // Add pos to end of file _queryfileOffset.push_back(totalSize); // Print offset of clients /* printf("%6s%14s%15s", "Client", "Offset", "Bytes\n"); for (unsigned int i =0; i< _queryfileOffset.size()-1; ++i) printf("%6d%14ld%14ld\n", i, _queryfileOffset[i], _queryfileOffset[i+1]-_queryfileOffset[i]); */ } InitBenchmark(numClients, ignoreCount, cycleTime, queryFilePattern, outputFilePattern, byteLimit, restartLimit, maxLineSize, keepAlive, base64Decode, headerBenchmarkdataCoverage, seconds, singleQueryFile, queryStringToAppend, extraHeaders, authority, usePostMode); CreateClients(); StartClients(); if (seconds < 0) { unsigned int secondCount = 0; while (!ClientsDone()) { if (exitSignal) { _seconds = secondCount; Exit(); } std::this_thread::sleep_for(std::chrono::milliseconds(1000)); if (printInterval != 0 && ++secondCount % printInterval == 0) { printf("\nRuntime: %d sec\n", secondCount); PrintSummary(); } } } else if (seconds > 0) { // Timer to compansate for work load on PrintSummary() Timer sleepTimer; sleepTimer.SetMax(1000); for (;seconds > 0 && !ClientsDone(); seconds--) { if (exitSignal) { _seconds = _seconds - seconds; Exit(); } std::this_thread::sleep_for(std::chrono::milliseconds(int(sleepTimer.GetRemaining()))); sleepTimer.Start(); if (seconds % 60 == 0) { printf("[dummydate]: PROGRESS: vespa-fbench: Seconds left %d\n", seconds); } if (printInterval != 0 && seconds % printInterval == 0) { printf("\nRuntime: %d sec\n", _seconds - seconds); PrintSummary(); } sleepTimer.Stop(); } } StopClients(); PrintSummary(); return 0; } void sighandler(int sig) { if (sig == SIGINT) { exitSignal = 1; } } int main(int argc, char** argv) { struct sigaction act; act.sa_handler = sighandler; sigemptyset(&act.sa_mask); act.sa_flags = 0; sigaction(SIGINT, &act, NULL); sigaction(SIGPIPE, &act, NULL); FBench myApp; return myApp.Main(argc, argv); }
IT IS the world’s greatest game. You are pushed to your limits, fighting for the title of Sole Survivor. As a contestant who experienced a solid 54 days on the island, I can say that Australian Survivor is as it appears on TV. But there are some things that you only realise once you’re behind-the-scenes. YOU’RE ALLOWED SUNSCREEN AND INSECT REPELLENT And THANK GOD for them. It’s hot, like really hot. Samatau swamp was also named accordingly — it was full of mosquitoes. Without sunscreen and repellent we would have all been ridiculously burnt and bitten like crazy. Even with the insect repellent we got eaten by mozzies — I can’t imagine life without it. YOU DON’T NOTICE THE SMELL Everyone always asks who smelled the worst. To be honest I don’t know, and others don’t either. It doesn’t take long for your nose to ignore what I assume is the horrid smell that is us. The truth is that we probably all smell equally bad — probably somewhat smoky seeing as we spent so much time hovering around a fire. THE TORCHES ARE REALLY HEAVY Maybe it’s because we were starving and had no energy, but walking with the tribal torches was exhausting, especially along sand. I was also bummed that we weren’t allowed to keep them because they looked great. The seats at Tribal Council were also incredibly uncomfortable. You were perpetually nervous about going home and the awful seats just added to why Tribal Council was something to be feared. RELATIONSHIPS RUN DEEPER THAN STRATEGY CHAT When watching Survivor you often see strategy chat, but there is a lot of bonding between contestants that you don’t see. You learn about every contestant’s life in detail — their families, their lifestyle, their dreams and aspirations — and it makes the game a lot more real and a lot more difficult. Everyone gets together to play games. We played snakes and ladders and even held a connect four tournament (drawing the boards in the sand). “Who am I?” was a frequent occurrence and, yes, mine was almost always Kesha. IF THERE’S A TSUNAMI WARNING YOU HAVE 6-8 MINUTES TO EVACUATE While it fortunately didn’t come to this, in the event of an emergency you need to evacuate incredibly quickly. I’d guess the walk out of Asaga beach was about 500m metres, up the beach and through a rainforest. If an emergency happened we would have had to move fast. WE CAUGHT THE END OF A CYCLONE AND IT SHOOK US ALL On night four, before our shelter was anywhere near complete, we got hit by freakish weather. At Samatau we spent all night trying to protect the fire by holding palm fronds around it while we got battered by torrential rain and strong winds. YOU START TO DEVELOP A FEAR OF RAIN Frequent rain. Ridiculous humidity. Nothing ever dries and it is the worst. We were almost always uncomfortably wet and when rain hit the idea of being drenched and having no real way to dry yourself was on every contestant’s mind. The effect the weather had on the mood of the camp was very noticeable. CHALLENGES DID CAUSE INJURIES It’s often glanced over. Challenges are every bit as dangerous as they look. Jacqui injured her shoulder and Kent injured his finger in challenges — not to mention the cuts, scratches and bruises that every contestant had their fair share of. MEDEVAC IS A CONSTANT WORRY I definitely wasn’t the only one that freaked out over the idea of a small cut leading to an infection that could get you pulled from the game. Many contestants had to go on antibiotics — including myself twice. THE BUFFS ARE ACTUALLY SUPER USEFUL They don’t just look pretty, even though mine was pink. Buffs were wrapped over your head at night to keep bugs away from your ears and mouth. They were also really warm. And if that wasn’t enough, you could use them to take the lid off the pot while cooking — well, when you were too lazy to find a stick, which I often was.
Special Counsel Robert Mueller speaks on the investigation into Russian interference in the 2016 Presidential election - AFP Robert Mueller, the US Special Counsel who issued a report in April on Russian meddling in the 2016 presidential election, has agreed to testify publicly next month after two House panels issued subpoenas to him. House Judiciary Committee Chairman Jerrold Nadler and House Intelligence Committee Chairman Adam Schiff said in a joint statement that the special counsel has agreed to testify about the report he issued in April about possible Russian connections to Donald Trump's 2016 presidential campaign. The Justice Department declined to comment. Mr Schiff told reporters shortly after the announcement that Mr Mueller was reluctant to testify but agreed to honour the subpoenas. He said there would be two hearings on July 17 "back to back," one for each committee, and they will also meet with him in closed session afterwards. The committees have been in negotiations with Mr Mueller for more than two months about his testimony. But he has been hesitant to testify and speak about the investigation beyond a public statement he issued last month. In a letter to Mr Mueller accompanying the subpoenas, the committee chairmen said "the American public deserves to hear directly from you about your investigation and conclusions." In his 448-page report issued in April, Mr Mueller concluded there was not enough evidence to establish a conspiracy between Mr Trump's presidential campaign and Russia, which was the original question that started the investigation. But he also said he could not exonerate Mr Trump on obstruction of justice. The report examined several episodes in which Trump attempted to influence the investigation. The testimony from the taciturn ex-FBI director is likely to be the most highly anticipated congressional hearing in years, particularly given Mr Mueller's resolute silence throughout the two-year investigation. He never responded to any of the public attacks from Mr Trump, nor did he ever personally join his prosecutors in court or make announcements of criminal charges from the team. Story continues His sole public statement came from the Justice Department podium last month, when he sought to explain his decision to not indict Mr Trump or to accuse him of criminal conduct. He also put lawmakers on notice that he did not ever intend to say more than what he put in the report. "We chose those words carefully and the work speaks for itself," he said at the news conference. "I would not provide information beyond what is already public in any appearance before Congress." Those remarks did little to settle the demands for his testimony, with Democrats and Republicans likely to confront him on his team's conclusions, his reaction to a drumbeat of incessant criticism from the president and his personal opinion about whether Mr Trump would have been charged were he not the commander-in-chief.
PRAC2: a new gene expressed in human prostate and prostate cancer. The database of human Expressed Sequence Tags was previously used to identify PRAC (Prostate 47:125-131, 2001), a novel gene specifically expressed in human prostate, prostate cancer, rectum, and distal colon. In this report, we have identified PRAC2, another gene with a similar expression pattern that is located adjacent to the original PRAC gene on chromosome 17q21.3. Using a computer-based analysis, a cluster of sequence homologous ESTs was identified that is mainly derived from human prostate cDNA libraries. The tissue specificity was examined by multiple tissue RNA dot blots and RT-PCR. The PRAC2 transcript and protein were identified using Northern blot analysis, RACE-PCR, primer extension, and Western blots. PRAC2 encodes a 564 nucleotide RNA found in prostate, rectum, distal colon, and testis. Weak expression was also found in placenta, peripheral blood leukocytes, skin, and in two prostate cancer cell lines: LNCaP and PC-3. The transcript seems to encode a 10.5-kDa nuclear protein. The PRAC2 gene is located on chromosome 17 at position 17q21, between the Hoxb-13 gene and the recently discovered PRAC gene. Because of the higher expression of PRAC2 in prostate and its proximity to Hoxb-13, PRAC2 may have a function in prostate growth and development.
Central, Minnesota Central is an unincorporated community in Koochiching County, Minnesota, United States; located in the northwest corner of the county; along the Rainy River. The community is located between International Falls and Baudette on State Highway 11 (MN 11). Central is located within Northwest Koochiching Unorganized Territory. Central is located 12 miles east of Baudette; and 56 miles west of International Falls. Central is 13 miles west of Birchdale. Central is located within ZIP code 56623 based in Baudette. A post office had operated in the community of Central from 1909 to 1928. The boundary line between Koochiching and Lake of the Woods counties is nearby. References Mn/DOT map of Koochiching County – Sheet 3 – 2011 edition Category:Unincorporated communities in Minnesota Category:Unincorporated communities in Koochiching County, Minnesota
Advertisements To read more than 200 comments... click on the title of any post, it is a link to a separate page that shows all the comments. Scroll down to the bottom of the comments until you see the words newer and newest next to the number of comments on the right, those words are links that will lead you to a new page of comments. :) Thursday, February 13, 2014 The worst person of the day award goes to this B list mostly movie actress who is all about being famous no matter who she has to sleep with. Right now she kind of hit the jackpot with that and is not shy about dropping his name when things don't go her way. Last night she was at the after party for her latest movie and was talking to her co-star who used to be a really big shot and is having a comeback year. At one point our actress was talking about her boyfriend and the actor said, "When you broke up with him for a day or two though it didn't take you long to find your way into my trailer naked though did it?" Right in front of ten people he said this. The actor in question is married. I struggle to understand what Johnny sees in her. Vanessa is a sweetheart, the mother of his children, and most probably the love of his life. If the marriage goes ahead it won't last ... he's a lot more into her than she is him. #MidLifeCrisis Truthfully, I've never heard of Heard (ha) outside of this blog and wouldn't even recognize her in anything, even though I've seen several of the movies listed on her IMDB credits. That said, Costner wouldn't have room to talk - he's not exactly Old Faithful himself. Interesting barometer - if Count posted this Amber Heard pic 17 hours ago, as I imagine, we know that in that time 386 people (including yours truly! And some Kardashians/Cardassians) opened a nsfw link just from reading this thread. This means we're a teensy bit pervy, and gives an idea how many people read not just the page but the comments (given standardised click ratios). She looks good here, too. Very amateur porny - but preamble funning, not steamy. Usually, after a day or 2, the pics I post here, SFW or NSFW, get between 130 and 250 views. Imgur used to give you a panel of your Top Ten Most Viewed pics, which I miss. At the time it stopped I had a banner ad signature from a message board w/ over 450k views, and a pic of Reese Witherspoon w/ a black eye that had 50k+ views. They were both embedded, so that jumps the #s compared to people having to click a link. @teresa crane Johnny need to wake the feck up indeed!I remember him promoting his movies in France and He had an answer about why He never married Vanessa, in a nutshell it was "Why marry a woman named Paradis(=Heaven)and change her name?" She's doing mighty fine on her own MERCI BEAUCOUP.He's like most of us regular folks Advertisement Search Crazy Days and Nights Get in touch & Follow us Advertisement Labels Advertisement Design By Advertisement Disclaimer & Privacy Policy Crazy Days and Nights is a gossip site. The site publishes rumors, conjecture, and fiction. In addition to accurately reported information, certain situations, characters and events portrayed in the Blog are either products of the author’s imagination or are used fictitiously. Information on this site may contain errors or inaccuracies; the Blog’s proprietor does not make warranty as to the correctness or reliability of the site's content. Links to content on and quotation of material from other sites are not the responsibility of Crazy Days and Nights. Cookies & 3rd Party Advertisements Google, as a third party vendor, uses cookies to serve ads on your site. Google's use of the DART cookie enables it to serve ads to your users based on their visit to your sites and other sites on the Internet. Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy. We allow third-party companies to serve ads and/or collect certain anonymous information when you visit our web site. These companies may use non-personally identifiable information (e.g., click stream information, browser type, time and date, subject of advertisements clicked or scrolled over) during your visits to this and other Web sites in order to provide advertisements about goods and services likely to be of greater interest to you. These companies typically use a cookie or third party web beacon to collect this information. To learn more about this behavioral advertising practice or to opt-out of this type of advertising, you can visit http://www.networkadvertising.org/managing/opt_out.asp.
Q: Chrome detach option is no longer working There is a question for Ruby Selenium Binding here Selenium WebDriver in Ruby: Preventing the test from closing the browser window at end He was trying to not to close the window of Chrome after the execution but it's not working. I have had the solution for this problem, the given below program works fine earlier, but now it's not working require 'watir' caps = Selenium::WebDriver::Remote::Capabilities.chrome(chrome_options: {detach: true}) b = Watir::Browser.new :chrome, desired_capabilities: caps b.goto('www.google.co.uk') When I execute this program, this program is giving the warning of 2019-11-19 09:33:37 WARN Watir ["use_capabilities"] You can pass values directly into Watir::Browser opt without needing to use :desired_capabilities But I don't know how to use this Watir::Browser opt. Any help is appreciated. A: You can pass Chrome Options using the following format: browser = Watir::Browser.new( :chrome, 'goog:chromeOptions' => {detach: true} )
American veterinarians are seeking remedies for a spike in suicides as rising education costs lead to higher debt loads, compounding the stress of long hours for workers who may be tempted by easy access to euthanasia drugs. A 2018 study from the Centers for Disease Control and Prevention that was the first to gather separate data on women showed that male and female veterinarians are taking their own lives at higher rates than the general population. The report “shines a light on a complex issue in this profession," said CDC Director Dr. Robert Redfield. "Using this knowledge, we can work together to reduce the number of suicides." Overall, female veterinarians were 3.5 times as likely to commit suicide as the general population while male veterinarians were 2.1 times as likely, according to the CDC study, published in the Journal of the American Veterinary Medical Association. Even though gunshots were the most common method of suicide among veterinarians, the study indicated that 37 percent were caused by pharmaceutical poisoning. Overall, 75 percent of veterinarians who committed suicide worked in a small animal practice, according to the report. The New York State Veterinary Medical Society is responding, in part, through a 24-hour mental health hotline and in-person counseling. The society will hold a three-day education conference next month for early career veterinarians, seasoned practitioners and licensed technicians. As of 2018, there were 113,394 veterinarians living in the United States, more than 60 percent of whom were women, according to the American Veterinary Medical Association. For the study, researchers reviewed records on 11,620 veterinarians who died from 1979 through 2015, with data coming from the American Veterinary Medical Association and CDC’s National Center for Health Statistics. CLICK HERE TO READ MORE ON FOX BUSINESS Suicide is the 10th leading cause of death in the U.S., and 1 of 3 leading causes that are on the rise, according to the CDC. Though suicide is seldom caused by a single factor, the CDC says factors that may contribute to the veterinary suicide rates include work overload and practice management responsibilities, debt, poor work-life balance and access to euthanasia solution for animals as well as the training to calculate a dose that could be lethal to humans. To help guide suicide prevention within the profession, the study points to a National Institute for Occupational Safety and Health framework used to curb workplace hazards and risks. “Collaboration among multiple stakeholders in the profession such as professional associations, veterinary schools, and suicide prevention experts could help contribute to an effective and comprehensive suicide prevention strategy,” said Institute director Dr.. John Howard.
My COBRA insurance coverage ends on February 29 - as in Wednesday. I have been praying, my family has been praying, my friends have been praying, and quite possibly soon my sponsor children will be praying. I was notified today that my Hearing for Social Security is scheduled for May 21. While that beats 9-18 months, it sure is not the outcome I was praying for. I had so hoped and believed the judge would just look over the mountain of papers and make a (positive) decision. What is a hearing going to do? It is teleconferenced so the judge will not even see me in person so "the big show" will be shoulders and chest in a wheelchair. I can do a 360 for full effect if that makes him happy. I guess by May I have to shave my legs so I can wear a skirt because I don't think Federal judges are down with blue jeans. My other hope of Medicaid is still closed due to lack of funding. This is Michigan. We probably will not have funding again for a few decades. Stupid auto industry, who needs a car anyway? Actually, that is the problem. So now I am stepping out in complete blind faith that God will provide for my every single need as He promises in the Bible. It may not be how I expected (oh it most certainly is not how I expected) and it will be in His perfect time (which seems to not be synchronized to my watch) but He will provide for me. I wish I could say how, but I have no clue. I wish I could say when, but my calendar is full of empty boxes. All I know is that it will happen and I choose to have faith in the one who created me and has promised to never fail me. I wonder if wheeling over to Canada to buy my prescriptions is a part of His plan? ;) Wild Olive BlogHer Creative Victory This is Me I am a thirty year old enigma who has defied every expectation ever placed upon me and refused every definition created for me. My greatest passion in life is to make a difference in the lives of children with special needs and their families. As a special education teacher I broke all of the unwritten rules to make sure that my kids received the services they needed and had a right to receive. I have never been so proud to be reprimanded before in my life. Now, due to unpredictable twists in life, I am learning first hand what life is like when you rely upon a wheelchair for mobility. I am a medical puzzle with the pieces slowly being identified and put together, and my medical bills alone could fund a small nation. It takes a village to keep me alive. :) However, I am not defined by the genetic misspellings. I am a teacher, a daughter, an aunt, a friend, a dreamer, a reader, an amateur photographer, a writer, an advocate, a star gazer, a world changer. I am stubborn, situationally shy, quick to use humor and wit to make others laugh or cope with a situation, sarcastic, fiercely independent, giving, compassionate (sometimes to a fault), protective of those I love, defiant of arbitrary boundaries, perfectionistic, self conscious, self assured (yes you can be both!), articulate and occasionally dramatic. And that is just what I could fit in two sentences! :) Who's On First, What's On Second, I Don't Know! (Third Base!!)* Simple Vocabulary Definitions for those who may not speak fluent medical :) Undiagnosed Progressive Neurological Disorder- This is the diagnosis that is believed to make everything else fit together. It explains my frequent infections, my muscle weakness and dystonia, my dysautonomia, my cardiac issues, my inability to regulate blood pressure, my dysphagia, my ataxia, my severe fatigue, my extreme nausea, my gastrointestinal dysmotility and IBS like syndrome, my unbelievable migraines, my sensory changes in my arms and legs, my vision issues, my hearing loss (so much for blaming medication), and so much more. Going back to infancy and childhood, this would explain the severe apnea, the significantly delayed motor skills, the reason why I could never keep up with my peers in physical activities, the neurogenic bladder, the malfunctioning thyroid, and my frequent illnesses and vomiting. This is the diagnosis now being used since the DNA testing for Mitochondrial Disease came back odd and I can not afford the expenses of a workup at the Mayo Clinic. We are treating symptomatically. Pan-Dysautonomia- "Pan" means that it impacts many different systems of my body, "dysautonomia" is a failure of my autonomic nervous system or the part of my brain that does all of the automatic things that do not require conscious thought like telling your heart to beat, regulating your blood pressure, adjusting your body temperature, maintaining balance in space, digesting food, hunger and thirst, etc. It is believed that I have had this from birth based upon my history of symptoms, including severe life threatening apnea as an infant, but the cause remains elusive at this time Dystonia- abnormal muscle tone and spasticity, including painful spasms, that primarily impacts my feet and lower legs and is now starting to be a problem in my back
Aussie Alan? El Capitán Credits Coastal Sea Change Central Coast Mariners’ Captain, Alan Baro moved to the Central Coast for more than just football. Six months into his sea change, Alan and his young family are loving life in Terrigal. In Yellow & Navy, Alan has quickly shown fans why Head Coach Paul Okon appointed the Catalan defensive rock as the club’s fifth full time captain. Defensively reliable, great distribution and a man who leads by example thanks to his wealth of experience, Alan has been an ideal acquisition for the Mariners. But it’s life off the pitch for Alan, his wife Ester, son Biel (5) & daughter Arlet (2) that makes his efforts on the pitch even easier. This weekend, Fox Sports are celebrating the Spanish influence on the Hyundai A-League and Alan praised the quality of football in Australia. Baro said that before arriving in Australia to link up with Melbourne Victory, he spoke with former teammates Isaías (Adelaide United) and Alberto Aguilar (Western Sydney Wanderers) “Before coming to Australia, I spoke with Isiais and Alberto Aguilar who talked very highly of the quality of football in the Hyundai A-League,” Baro said. “I think a few years ago, not many people in Spain knew about the A-League but now, people in Spain are following the A-League because it’s a great league and many Spanish players have made the trip here,” Baro said. With talk surrounding the potential naturalisation of Spanish midfielder Isaías, Baro said he wouldn’t rule out the idea of staying in Australia long term with his family. “When we played Adelaide here in round seven I spoke to Isaías who is in the process of becoming an Australian,” Baro said. “Of course, it’s something I would consider – everyone around the world knows how much of a beautiful country Australia is and we are loving it here on the Central Coast “Like I’ve said before, my family and I have already made lots of close friends on the Central Coast and it has been very easy to settle in. Everyone is so nice, it’s a beautiful part of the world and we couldn’t be happier. “If one day I could achieve citizenship in Australia it would be a proud moment,” Baro said. The Club Captain says his side quickly re-focussed their attention to Saturday’s match against the Wanderers after a narrow 1-0 loss away from home to Melbourne City. “Yes, it was a disappointing result against Melbourne City but there are always positives you can take from it,” Baro said. “The best thing, is that we have an immediate opportunity to bounce back this weekend against the Wanderers and I am sure we will do that. “We know it’s going to be a tough game, Western Sydney are a very strong team. They also had a disappointing result last week but we know they will also want to return to winning ways. “Every week our game improves, week-by-week we rectify our mistakes which is pleasing to see for such a young team. “Paolo has a clear playing style that he wants us to follow, so we all know our role. We’re working extremely hard to ensure positive results,” Baro said.
A cell-free system from ethionine-treated rat liver active in initiation of protein synthesis. A cell-free protein-synthesizing system active in initiation of translation of both endogenous mRNA and exogenous mRNA has been obtained from postmitochondrial supernatant (S-12) of the liver of ethionine-treated rats by adding reticulocyte ribosomal extract as a source of initiation factor. Formation of polysomes in the course of protein synthesis in vitro has also been demonstrated. Homogenization of the liver in the presence of 50 microM hemin stabilizes the initiation activity of S-12 fraction, which otherwise decays rapidly even at 0 degrees C. The mechanism of inhibition of protein synthesis by ethionine is discussed in view of these results.
Prostate cancer is the most common non-skin cancer in United States men. Despite recent advances, prostate cancer mortality still remains high due to the emergence of therapy-resistant cancer cells that metastasize. This lack of effective therapies against metastatic cancer exists, at least in part, because of lack of drug screening platforms that address the unique nature of metastastatic prostate cancer cells and their microenvironment. Recently, our collaborators have found that prostate cancer (PCa) cells act as molecular parasites as they metastasize to bone and harvest resources from the hematopoietic stem cell (HSC) niche environment where they stay dormant and resistant to conventional anti-cancer drugs. If the dormant metastasized PCa cells that parasitize the HSC niche could be recreated in vitro, they would serve as ideal platforms to screen specifically for anti-metastatic PCa drugs. We have recently shown that 3D co-culture spheroids can mimic the PCa cell parasitized HSC niche thereby maintaining PCa cells in a physiological, more quiescent state. What is required to take advantage of the metastatic PCa microtissue engineering capability we have acquired for drug screening applications is to develop a high throughput format of these types of co-culture spheroids. Towards this end, this Phase I STTR proposal will: Aim 1: Validate a 384 array hanging drop plate system for preparation of the co-culture spheroids. This is a major focus of 3-D Biomatrix, LLC. We have already modified our published platform (Tung et al. 2011) to: enhance droplet stability, facilitate pipette tip insertin, mitigate evaporation, and preserve sterility during optical analysis (Figure 1A). We will perform high throughput performance validations for fluorescence, transmitted light, and bioluminescence assays (Z'- factor), and further refine the design as necessary. Aim 2: Create arrays of microengineered 3D tissues of bone metastasized PCa in the quiescent state. This will be the focus of the Takayama lab at the University of Michigan. To develop procedures to utilize the 384 array hanging drop plate to form co-culture spheroids of PCa cells, marrow stromal cells (MSCs), and human bone marrow endothelial cells (HBMECs) similar to those prepared previously in low throughput microfluidic devices. We will also confirm quiescence of the PCa cells in these co-culture spheroids. The biological hypothesis that motivates this study is: We can treat metastatic PCa better by developing drugs that specifically target dormant metastatic PCa cells that are parasitizing the HSC niche. PHS 398 (Rev. 11/07) Page 1
Custom Home Design Begin the journey with us to design and build the home of your dreams. Contact us today for more information on yournew custom dream home! Whether we are building on your lot or on one of our lots, when Sublime Homes, builds your custom home you’re assured of high quality materials, precise workmanship, and the best value for your new home. We offer a professional approach to home construction that allows you, to work hand in hand with a talented and experienced designer and builder. Let's get started today. FOR MORE INFORMATION ONDESIGNING AND BUILDING A CUSTOM HOMEREGISTER BELOW
Effect of cyclic AMP and cyclic GMP on thromboplastin (factor III) synthesis in human monocytes in vitro. Human monocytes in vitro respond to various agents (immune complexes, lectins, endotoxin, the divalent ionophore A 23187, 12-O-tetradecanoyl-phorbol 13-acetate [TPA], purified protein derivative [PPD] of Bacille Calmette-Guerin) with an increased synthesis of the protein component of thromboplastin. The effect of cyclic AMP and cyclic GMP on this response has been studied. Dibutyryl-cyclic AMP, prostaglandin E1 and the phosphodiesterase inhibitors 3-butyl-1-methyl-xanthine (MIX) and rac-4-(3-butoxy-4-methoxybenzyl)-2-imidazolidinone (Ro 20-1724), separately and in combination have a pronounced inhibitory effect on the response to immune complexes and PPD, and a moderate effect on the response to endotoxin and lectins. The effect on TPA response and on the response to A 23187 was slight. Dibutyryl-cyclic GMP (1 mM) gave a slight inhibition of the TPA and IC response, but had essentially no effect on the response to other inducers. The intracellular cAMP level increased when monocytes were incubated with IC, TPA or A 23187 followed by a decrease to basal levels within 1-2 hr, whereas lectin (PHA) and PPD did not induce such changes. The cAMP response to endotoxin varied. Stimulation with IC induced an increase in monocyte cGMP levels, whereas the other stimulants did not cause such changes.
Are you fed up with the industry's "sequelitis?" While most of the people are complaning that we're being bombarded with sequels left and right, new games and IPs generally don't do as well compared to the 15th iteration of shooter #21304. However, this problem isn't exclusive to consumers as some developers are feeling the same way. One of these developers is Arkane Studios producer Julien Roby. Arkane is, of course, the studio behind the upcoming first-person stealth action game, Dishonored. In an interview with IGN, Roby comments that gamers these days are getting tired of playing the same things over and over. Not only that, but he hopes people try Dishonored since it's trying something new. It’s been a few years where we’ve only got sequels of sequels of sequels of sequels. I think people are getting tired of just playing the same thing over and over…So I hope that they’re going to try Dishonored for the fact that it’s trying to do something a little different that those other games. Roby also thinks the most-talked about games at this year's E3 were new titles such as: Watch Dogs, Remember Me and, of course, Dishonored. So does this mean gamers want something new? I think so…You look at the line-up for Christmas this year and it’s like something number six, something number five, something number seven. I really think people are starving for something new. Something new in terms of universe. Something new in terms of gameplay. Something new in terms of visuals. From what I've seen of Dishonored, it does seem to be marching on the beat of a different drummer. However, it's also important to note that if and when Dishonored is successful, I'm betting dollars to doughnuts that we will see Dishonored 2 — thus, contributing to the problem somewhat, no? What do you think should publishers and developers do in order to combat "sequelities?" More importantly, do you even care?
We are excited to announce that Recoupit (RCPT) will be listed on the Switcheo Exchange on 24 November at 12pm SGT (UTC+8), allowing users to trade RCPT with NEO, GAS and SWTH. About Recoupit: Recoupit is specifically designed to benefit holders of the Coupit token. Coupit holders will generate Recoupit tokens automatically based on the amount that they hold in their wallets. Recoupit tokens can be used for promoting products on the Coupit platform or redeeming special offers presented by Coupit. Find out more about Coupit here: Website | Twitter | GitHub | LinkedIn About Switcheo Network: Switcheo Network is the first decentralized exchange on the NEO blockchain which now allows trading of Ethereum and NEO tokens. Our goal is to achieve a DEX network with cross-chain swapping capabilities across popular blockchains, with a focus on delivering a world-class trading experience in a trustless and decentralized environment.
Monthly Archives: July 2010 Post navigation Today, I took a day off from the high school beat and spent the day at Pac-10 Media Day, which was held at the Rose Bowl. I will again be covering college football in addition to my high school and area college duties. Our coverage will include a weekly column during the season and blog updates leading up to the 97th Rose Bowl, which I previously picked to be a matchup between Oregon and Boise State. You can find my predictions for the the Pac-10 here Well folks, tomorrow I’m on vacation until Aug. 9, hopefully surviving another week in Cabo before another wonderful football season. Steve Ramirez will be here to monitor and post on the blog in my absence, and hopefully you get a few posts from Aram too. It has been a busy month working on “Prep Extra,” our first football preview magazine, which debuts the first week of September.(To continue, click thread). With all the discussion about top programs, top teams, I thought it would be interesting to post CalPreps’ final state rankings computer poll from the 2009 football season. Calpreps’ state poll obviously factored league, division, strength of schedule, quality wins, opponents’ record, etc, etc. Bishop Amat wins the computer poll easily because in comparison to other valley schools, they crush everyone locally in terms of schedule strength and quality wins, though the CIF titles went to Charter Oak and San Dimas. I ranked Charter Oak No. 1 in our final poll, but this goes to show if you had to compare our locals using a BCS type formula, this is how our top ten would have ended in 2009. The fabulous inside sources at the Tribune are telling us to mark your calendars for Friday, Oct. 6, when Crespi rolls into Kiefer to take on Bishop Amat. The sources say Fox Sports is looking at the Serra League opener for their live high school game of the week and why not, no better place than Kiefer to show the Southland where the greatest fans in the Valley reside. French star Thierry Henry was a good sport show with New York hosts Rosanna Scotto and Greg Kelly, but if you remember, France left the World Cup in disgrace, which made the question ever more hilarious. He just signed with the MLS’ New York Red Bulls, and got a taste of the average American non-soccer fan. Nogales high school is losing one of the best young high school boys basketball coaches in the San Gabriel Valley. Nobles coach Ricky Roper is leaving to Southern Section powerhouse Cerritos Gahr, who won the San Gabriel Valley League title last season while competing against the likes of Lynwood and Paramount. (to continue click thread). There is no league tougher to predict than the new Hacienda League, which includes Diamond Bar, Diamond Ranch, West Covina, Rowland, Bonita, Los Altos and Walnut. Looking at Aram’s recent All-Encompassing San Gabriel Valley Top 25 poll, he has four teams from the Hacienda ranked, with West Covina No. 9, Diamond Ranch No. 10, Rowland No. 13 and Bonita No. 22, but seriously, there is no telling how this is going to shake out. Won’t Diamond Bar be reborn again after leaving the Sierra, especially with its sights set on a mammoth Oct. 1 encounter with its soon to be hated rival, Diamond Ranch, when the two meet for the first time? Can’t you picture Los Altos bouncing back and recharged under new coach Jim Arellanes? Walnut might be the one team in over its head this season, but I wouldn’t be surprised if this race comes down to the final weeks with as many as six teams within a game of each other. It’s going to be that tight. I too think West Covina has a slight edge, but I like Rowland to finish second, Diamond Ranch third and Bonita fourth. Diamond Bar, for me, is a sleeper. This is just what the doctor ordered for the purple, and looking at their preseason lineup of Nogales, Wilson, Don Lugo and Brea Olinda, the purple could and should be 4-0 when they meet DRanch, a game that will take bragging rights to another level. Above: West Covina coach Mike Maggiore and staff will have their hands full this fall. I told ya I will keep posting questions from random high school football players, local players or in this case an assistant football coach that I found on google that wants to know if his requirements for a quarterback are too harsh. Well, are they? Coach asks: I am a Quarterbacks coach and Assistant Offensive Coordinator for a local 5a High School. I am 20 years old and have not been able to continue my playing carrier (but I have had 2 walk-on tryouts with a team who WILL start in the top 5 in the nation next season) My question is, I have expectations for my players (Quarterbacks) above that of the rest of the team. To be on the team you must have a GPA of a 2.0, For my Quarterbacks I want to say you must have a minimum of a 3.0 (but for some kids that may be hard to get so I lower it to 2.5) If you have lower than a 2.5 you can still be on the team, but you may not be a Quarterback. I also will give my Quarterbacks the Wonderlic test for the evaluation process. Along with this I ask them to write a 1-2 Page paper over why they want to be a Quarterback, what makes a good Quarterback, as well as what their personal goals are. The last thing I do is send a contract home with the player to have signed by the player and his parents to explain what I expect on and off the field, so that we have an understanding of the rules. If they were to be broken then I would have NO problem benching that player and playing the Back-up. Now with this said…. What do you think of this? Is this too harsh? Is it okay? As a parent how would you feel? Is it getting them ready for College and the professional working life? Or is this ridiculous and not needed? I really wanted to hear some thoughts on this. Richie Cantero’s three-run homer punctuated an 11-0 victory for La Puente National in Tuesday’s Section 3 All-Star tournament win over previously undefeated San Dimas. San Dimas would have won the title with a victory, but La Puente forced a decisive game tonight at 7 p.m. San Dimas had been dominating to this point, but La Puente has been on a role since losing earlier in the tournament. “My team came in with momentum from the night before,” La Puente manager Juan Cuevas said. “We’re hoping to bring the momentum back for tonight’s game.” The winner will advance to the Southern California Divisional Tournament’s North Sub-Divisional, which starts Saturday at Perry Park in Redondo Beach. Go root them on, these two are our last chance for a local in the Little League World Series. “We don’t have the best workout facilities, but I want to work out and take this seriously. What type of workouts and workout schedule should I take for the summer? And is there some kinda protein I should take?” C’mon bloggers and ex-coaches, help him out, or help me out, I got a week to whip this 40 something body into shape for Cabo … Good luck with that happening. BTW, this isn’t the kid below, just a Chino Hills lineman in competition .. The Scouting Guru has been all over the San Gabriel Valley and beyond, and like always, he’s offered to share his thoughts, free of charge. Don’t hate, enjoy it for what it’s worth, which is one man’s opinion on the talent in the San Gabriel Valley. The Scouting Guru answers bloggers questions in his own T.J. Simers-type way ….To read the Q&A, click thread. I enjoyed Bryant Gumbel’s thoughts on the Lebron James to Miami discussion. This is what he said at the conclusion of this week’s HBO Real Sports segment …This is a transcript provided by the network.. Gumbel: Finally tonight, a few words about championship rings. Just when did they become the all-important barometer of who does or doesn’t count in sports? When did they supersede personal excellence or exemplary character as a standard of greatness? (to continue, click thread). Hi all: I just wanted to let you know of the first post of the season for my college football blog. I take a look at the upcoming season with my top pre-camp Top 5. You can see who I like as the favorite in the BCS. You can find anything from google searches, so I thought I would give you random questions from high school football players around the country. I don’t know where or when this kid wrote this, but I’m sure it applies to HS football players everywhere. If you’re a player in the Valley and have a question that you would like our bloggers to discuss, you can email me anonymously and I will post it for you. Send to [email protected]….Anyway, here’s today’s question/dilema HS player writes: I’m an incoming sophomore getting ready for summer ball, season, etc. This is my 2nd year of football, and i didn’t start as a freshmen. Coach is already favoring his starters in spring ball. When we do 7 on 7 he gets the linebackers (my position) that don’t know what to do mentally. I know everything I must do mentally, and physically, I’m real fast and pretty strong. Football isn’t fun to me at all. It’s all just hard hard work just to…well.. be someones backup. I’m not content with being a backup. (to continue click thread). You know most of the big names, but how about the newcomers, surprises and first-year varsity players expected to make an impact. You know that Jay Anderson isn’t returning his senior season at Bishop Amat, but all I’ve heard is great things about junior running backs Jalen Moore and Zachary Shay, whom coach Steve Hagerty described as “pure” football players. Speaking of which, Hagerty is extremely impressed with sophomore tight end Sal Velasquez, a 6-foot transfer from Los Altos whom Hagerty said, “Is a kid that was a Lancer and didn’t even know it. It was in his DNA. If I could draw a Lancer on the board, he would be it. He comes in, works hard in the weight room, works hard on the field and is unfazed by things. You can tell a lot by how a kid works, and he gets it.” How are those for strong words. You want more, we asked coaches to list their top newcomers, here a a few, Covina lists sophomore RB Gevontray Ainsworth and linebacker Justin Turner, Baldwin Park likes junior QB Ray Bosque, Azusa is counting on junior LB Eric Perez, Glendora naming junior RB/LB Cory Victoria, Duarte naming practically everyone (which includes Sr. QB Anthony Martinez), Workman loves Jr. QB Val Cervantes, Gladstone RB/LB Carlos Gomez, Northview going with a pair of sophomores in RB/WR Javon Taylor and LB/TE Roy Torres, just to name a few …. Now it’s your turn, lets hear your predictions on the Valley’s next rising stars. We want to hear it here first. I had a fun conversation with Glendora quarterback Chad Jeffries yesterday, who wasn’t short on predictions. One, he said junior Donovan Holmes, the younger brother of Andre Holmes, is an absolute stud and will be a huge part of their offense in the backfield. He said he was glad he made his decision early to go to San Diego State so he could concentrate on the season, and said we should make the Week 0 Charter Oak and Glendora the game of the week, because they’ve got some surprises for the two-time defending champion Chargers. You got to love his confidence, when I asked where they should be in the Trib rankings, he said No. 1, then laughed and said no lower than No. 3, though I know he really felt they deserved the No. 1 tag. The smartest team of all is Ganesha, they will have the stage to themsleves by kicking off our season with a Thursday night game on Sept. 2 (too bad Bonita and San Dimas couldn’t play on Thursday, it would have been the biggest Smudge Pot ever). As far as who gets the Friday night game of the week, is there anything better than Glendora-Charter Oak? I know San Dimas-Bonita is tradition, it’s for the Smudge, but for pure football anticipation Jeffries is right, Glendora-Charter Oak is No. 1. For the fun of it, I will rank who we feel are the most important games as far as coverage. Scouting Guru writes: South Hills Running Back Jordan Canada – who recently graduated from South Hills High School three weeks ago – was offered a full scholarship at the University of Montana and has signed a letter of intent to play for the University of Montana. Canada, a first-team All-Montview League selection in 2008, didn’t play in 2009 when the California Interscholastic Federation’s Southern Section Office ruled him ineligible to play for the 2009 season. Canada also had an offer coming off his junior year from New Mexico State University. (to continue click thread). The Scouting Guru has been all over the San Gabriel Valley and beyond, and like always, he’s offered to share his thoughts, free of charge. Don’t hate, enjoy it for what it’s worth, which is one man’s opinion on the talent in the San Gabriel Valley. Random musing and notes while on the Passing League circuit for the next two weeks….(to read all of it, click thread). By Fred J. Robledo, Staff Writer It would take multiple letterman jackets to sew on all the accomplishments of South Hills High School standouts Dakota Behr and Melinda Gomez, who have been selected the 2009-10 Tribune athletes of the year. Not only did the duo finish their senior season in style, but the two shared a brilliant prep career that shows the multiple-sport athlete is alive in well during an era of specialization in high school sports. (To continue, click thread). In June, these were Aram’s 2010 top ten predictions … we’re about to finalize the top ten for the football magazine preview, is he close, and what adjustments should be made…I’m listening. 1. Bishop Amat — The gap between Amat and the rest has narrowed thanks to Anderson’s departure. Hey, did you know Tom Salter is back?2. Charter Oak — Anyone thinking CO has slipped may change their mind when the Chargers go four wide with no receiver under six-feet tall.3. South Hills – Strong along the line and loaded with skill. But Jamie Canada’s knee injury is a concern.4. Glendora – Excellent coach + good QB is a nice formula in HS football.5. Chino Hills – The Huskies ranked below CO and South Hills? I’ll admit it doesn’t sound right. But Nate Harris and who ….?6. West Covina – Bulldogs have to get thru rough Hacienda before they can even think about the Southeast.7. Damien – When Coach Gano is mum, I get a bit concerned.8. Diamond Ranch — Are we looking at the weakest Panthers team of the Roddy era?9. San Dimas — Deep at QB, strong along both lines, but I haven’t heard much about the running backs.10. Rowland — A one-man show won’t get it done in the Hacienda. Just sayin … Multiple sources this morning are predicting the Super Friends are teaming up in Miami to form the Miami Super Heat. So this is how it goes, Lebron’s hour-long special tonight on ESPN will announce that the Three Egos are going to Miami, a made-for-TV event showing Lebron driving his decision into the heart of Clevelanders on live national television with split-screens showing Cleveland fans crying as Prince James announces his decision. What a guy! BTW, they still won’t beat the Lakers. Comments Policy We invite you to use our commenting platform to engage in insightful conversations about issues in our community. Although we do not pre-screen comments, we reserve the right at all times to remove any information or materials that are unlawful, threatening, abusive, libelous, defamatory, obscene, vulgar, pornographic, profane, indecent or otherwise objectionable to us, and to disclose any information necessary to satisfy the law, regulation, or government request. We might permanently block any user who abuses these conditions. If you see comments that you find offensive, please use the “Flag as Inappropriate” feature by hovering over the right side of the post, and pulling down on the arrow that appears. Or, contact our editors by emailing [email protected].
• Lufkin Industries (NASDAQ:LUFK) said it had concluded an Asset Purchase Agreement to purchase virtually all the assets of Quinn’s Oilfield Supply Ltd for around $303 million • Shares of exploration company Sunoco Inc. (NYSE:SUN) gained 5.32% after the company announced its decision to sell off its refinery businesses and concentrate on the gasoline retail segment • Shipping box maker Temple Inland, Inc.’s (NYSE:TIN) share prices advanced 25.25% to close at $30.85 a share after International Paper Co. (NYSE:IP) increased its offer price for the company • Shares of the banking sector declined and closed in the red after the cost of insuring bank debt rose substantially. Following this development, share prices of Credit Suisse (NYSE:CS), Royal Bank of Scotland (NYSE:RBS) and Bank of America (NYSE:BAC) fell 12.93%, 12.74% and 3.59% respectively • Analysts at Robert W. Baird & Co. slashed the price estimate of crane manufacturer Manitowec Co, Inc. (NYSE:MTW). Following the downgrade, shares of the company fell 4.25% Zacks Investment Research is one of the most highly regarded firms in the investment industry. In 1978 Zacks originated the concept of utilizing earnings estimates revisions to make profitable investment decisions. Zacks offers multiple investment products and services to help investors achieve superior returns.
This invention generally relates to projection displays, and more specifically applies to dimming in projection displays. Various types of optical displays are commonly used in a wide variety of applications. Included among these various types of displays are projection displays. Projection displays typically involve optical relaying of the displayed image prior to viewing. A typical projection display system will often include a diffuse viewing screen. One of the attractive characteristics of many projection displays is the flexibility of configuring a system with the particular features needed for a specific application. One important performance parameter in certain projection displays is the range of luminance that can be provided by a projection display, commonly referred to as the dimming range. In many applications it is critical that a display make information clearly visible in a wide variety of ambient light conditions. For example, a display used in an avionics control system will need to display information to the pilot under lighting conditions that can range from near total blackness to the extreme glare created by facing directly into daytime sunlight. Such a display must have a high maximum dimming ratio, where the dimming ratio is the ratio of the display luminance at highest brightness to the display luminance at its current setting. Without a sufficiently high maximum dimming ratio, a viewer of the display may be unable to easily read information from the display in high ambient light conditions, low ambient light conditions, or both. In some applications, the required maximum dimming ratio may be as little as 100:1. In other applications, a maximum dimming ratio of 20,000:1 or greater may be required to effectively display information in its expected range of ambient conditions. It should also be noted that in some applications alternative measures of light output may be used rather than luminance. In these cases, the dimming ratio can be expressed with respect to that measure. One such example might be the amount of optical power within a certain wavelength band. Additionally, in some applications the ability to precisely control the amount of dimming is of particular importance. This is typically of greatest concern in low light conditions, where small changes in the amount of dimming can have significant effects on the viewability of the display. Unfortunately, many prior dimming solutions have been unable to provide the precise dimming control needed for many critical applications. Thus, in many applications the projection display must be able to accurately and clearly display information through a wide dimming range, with the ability to precisely control the amount of dimming. Unfortunately, prior art solutions to dimming in projection displays have met with limited success. As mentioned above, some prior art solutions have been unable to reliably achieve the wide dimming range or the precise dimming control needed for certain critical applications. Other prior art solutions have required excessively complex structures that require large amounts of space and suffered from high cost and low reliability. Some prior art solutions have also negatively impacted the high bright state luminance required for bright ambient conditions. Thus, what is needed is an improved dimming system that provides a wide dimming range and precise control over the amount of dimming in a projection display. The present invention provides a dimming system that facilitates a wide dimming range and precise control of the dimming range. In one embodiment, the dimming system comprises a multi-aperture dimming system. The multi-aperture dimming system can be implemented in any display that utilizes a fly""s eye lens array. The multi-aperture dimming system comprises a plurality of moveable attenuators. The moveable attenuators are configured to form a plurality of apertures that can be controllably opened and closed. Each of the plurality of apertures attenuates a portion of the light propagating through at least one of the lenses in the fly""s eye lens array. Thus, by selectively controlling the plurality of moveable attenuators, the dimming system can control the throughput of light propagating through the fly""s eye lens array, where the throughput is the percentage of light passed compared to the light passed at maximum brightness and thus is the reciprocal of the dimming ratio at a given setting. The moveable attenuators are preferably configured to allow substantially all light transmission through each lens in the fly""s eye lens array when the moveable attenuators are moved to open the plurality of apertures. Likewise, the plurality of moveable attenuators are preferably configured to block substantially all light through each lens in the fly""s eye lens array when moved to close the plurality of apertures. Thus, the dimming system can provide a wide range of throughputs and dimming ratios. In a further variation on this embodiment, the moveable attenuators each have an attenuation profile at the area forming each of the plurality of apertures to increase the control over the dimming system at low light transmission levels The attenuation profile increases the dimming control by increasing the ratio of moveable attenuator movement to the corresponding change in throughput at low light transmission levels where the apertures are small and the dimming ratio is high This improves dimming control by making throughput change less sensitive to attenuator movement at these low light levels. In addition, the attenuation profile can be implemented to provide a plurality of sequential dimming modes, where each dimming mode provides a different ratio of attenuator movement to throughput change. The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular description of a preferred embodiment of the invention, as illustrated in the accompanying drawings.
Monday, February 4, 2013 The betting odds today would be that universalizing background checks (which has overwhelming public support) has a 2-in-3 chance of becoming law, curbing ammunition clips is a 50-50 proposition and the reinstatement of the assault weapons ban (which expired in 2004) is no better than a 1-in-10 shot. (So far, the other things he wants Congress to do — including increasing mental health care funding, boosting federal aid for school security and lifting restrictions on government studies about the causes of gun violence — have not gotten enough attention to merit such predictions.) Keep up the pressure on your U.S. Senators. Vice President Joe Biden has said new gun laws would not stop mass shootings.
Akkaya Dam Akkaya Dam is a dam in Niğde Province, Turkey, built between 1964 and 1967. See also List of dams and reservoirs in Turkey References DSI Category:Dams in Niğde Province Category:Dams completed in 1967
A month after another extended outage impeded Xbox gamers from playing for hours -- and with a number of smaller issues in between -- Microsoft's network is down once again. Right now, many people can't sign in or do much other than maybe watch Netflix on their Xbox Ones, after hours of problems and more than an hour and a half after its support account said the team was aware of problems. As usual, the Xbox Live status page is the best place to look for updated information, and it shows the issue running since around 8 PM ET. We've heard that gamers who bought Gears 5 Ultimate to jump in early have been able to play through the campaign by taking their boxes offline, so if you enjoy single player gaming you may be in luck. For everyone else hoping to take their NBA 2K20 MyPlayer online or get in some multiplayer action, maybe it's time to read a book, or take a walk. Whatever it is that other people do might help, if you don't have a PS4, PC or Switch to keep your attention. One thing's for sure -- a string of service outages isn't the best way to convince people that cloud-streamed gaming is a good bet for the future. Update: As of about 12:30 AM ET @XboxSupport reported sign-ins were restored, let us know if everything is working out for you now.
I appreciate all comments, and, LaRee, yours especially. It helps a lot to understand why someone didn't vote for an entry. I meant this to be evocative and intended it to be discomforting; what I had not fully considered is that some might have a personal connection to such a tragedy and whether it is appropriate to bring discomfort to an unsuspecting viewer in any medium of "art" is a question which remains unsettled in my own mind. I considered titling this "Dream" or "Nightmare" but the immediate visceral impact that raf spoke of probably could not be ameliorated by any title so you've brought home a point I hadn't considered -- and should have. LaReeMay 17, 2011 Congrats on your top 5 place. This evoked too much bad emotion for me. I have a friend who's sister jumped from a building to end her life. This struck too close to home for me. I couldn't get past the morbid and very sad feeling it threw me in. It just seems wrong. Your post processing on this one is very clean and well done, I will say that though. Jade O.May 16, 2011 Lo, I laughed when raf suggested she was coming down vertically. She wasn't moving at all of course. Always appreciate the comments (and the votes!) Bill, all comments are appreciated but your first comment is very much appreciated. Summed up what I was thinking; as always, sure would like to hear from those who didn't like it though since I think we learn most from those who don't like our entries. LoMay 16, 2011 Congratulations Jade - it's a great shot - It was interesting to find out how you actually achieved it. Like Raf, I thought for sure she was jumping - perhaps on a trampoline. wrosenthalMay 16, 2011 Glad it made the top 5, but I would have put it higher. It probably put too many demands on the viewers' emotional responses. Comments After End of ChallengeComments During Voting Jade O.May 15, 2011 Lo, you'll be pleased to know she wasn't hurt :-) LoMay 15, 2011 This is a great picture - even if it freaks me out to see a child catapulting backward onto the pavement. I would have been so much happier with a body of water below - but I have to admit - it made me look! Jade O.May 14, 2011 raf The immediate visceral discomforting reaction was the goal so glad it worked for you. I always appreciate in depth critique. The jury is in with the shadow (should be lighter) but while I don't agree with the dress, she is actually lying on a rug in the living room, I found a sharp outline looked too pasted on to me (but maybe I was wrong), and her look is just her looking back at the camera, no expression requested by me - I thought it enigmatic and hard to read in the context and for me, makes the shot since you look to the face for clues and cannot read what it says. fc I enjoy the comments especially and the interpretations. This could be just a dream, or a suicide, or a moment of perplexed wonderment at what has happened just prior to the scream... rafinmelbMay 13, 2011 Generates an immediate visceral reaction. So on that count alone it must rate highly. The PP is done with skill but there are some things which a pro would spend more time/thought on. I am not that pro but I am privileged to regularly see the work of one who would love this shot. She would pick up on a couple of things: - the shadow is probably a little overdone; - the hair and dress indicated she is coming down vertically from a jump rather than falling backwards - the areas around the edges are not 100% particularly the legs - she is struggling to keep the sort of serious/scared look of someone plunging to her deathOnly offer them as ways to take this to the next stage. Edited on May 13, 2011 forkcandles May 13, 2011 only missing the open mouth scream.. what a result and out of the box thinking. Jade O.May 13, 2011 Thanks, Old Finn. Yes, two images, the girl and the background. Old FinnMay 13, 2011 Good work. I assume the picture is a combination of two pics. Jade O.May 13, 2011 Thanks elliott. You have a keen eye. The shadow IS a bit forced but I thought it necessary to keep it from being overlooked; a paler shadow had less impact but I agree it should be less harsh. The body and face I can't explain as that is how it was out of the camera but with the arms, I think they are out of camera as well - I don't recall if I applied a slight guass blur to the arms to add a sense of motion but I don' think I did. Maybe I overdid the cut-out by blurring the edges to avoid a cut and paste look. She is actually just lying on a rug in the safe comfort of a living room -- the dress thing worked out better than I expected.Edited on May 13, 2011 elliottMay 12, 2011 tops for technical and closest to theme of challenge. pixel peeping.... light not harsh enough on her to create shadow as shown.... as sharp as the edges are (facial features), they aren't consistent with edges on her limbs. just minor things.disturbing theme but that is what will turn heads to your work in this case. well done number one!! el Jade O.May 12, 2011 Bill, your comments mean a lot. I deliberately withheld comments in extra info. This could, for example, well be a dream sequence and who has not awakened after dreaming they were falling? But it was also intended to evoke emotion, and even I find it a very uncomfortable image -- perhaps because it seems disturbingly real! wrosenthalMay 12, 2011 I hope I am not the only one who thinks this is very good. It is disturbing, but it not only meets the spirit of the challenge, it evokes emotion. That's good photography and it is my favorite.
Research on Binance Futures Multi-currency Hedging Strategy Part 2 Author: 善, Created: 2020-05-09 16:03:01, Updated: 2020-05-09 16:06:46 The original research report address: https://www.fmz.com/digest-topic/5584 You can read it first, this article won’t have duplicate content. This article will highlights the optimization process of the second strategy. After the optimization, the second strategy is improved obviously, it is recommended to upgrade the strategy according to this article. The backtest engine added the statistics of handling fee. Why improve The original biggest problem is the comparison between the latest price and the initial price started by the strategy. As the time passes, it will become more and more deviated. We will accumulate a lot of positions in these currencies. The biggest problem with filtering currencies is that we may still have unique currencies in the future based on our past experience. The following is the performance of non-filtering mode. In fact, when trade_value = 300, in the middle stage of the strategy running, it has already lost everything. Even if it is not, LINK and XTZ also hold positions above 10000USDT, which is too large. Therefore, we must solve this problem in the backtest and pass the test of all currencies. Since the cause of the problem is to compare with the initial price, it may be more and more biased. We can compare it with the moving average of the past period of time, backtest the full currency and see the results below. The performance of the strategy has fully met our expectations, and the returns are almost the same. The situation of bursting account positions in the original currency of the entire currencies has also smoothly transitioned, and there is almost no retracement. The same opening position size, almost all leverage is below 1 times, on 12th March 2020 price plunged extreme case, it still does not exceed 4 times, which means that we can increase trade_value, and under the same leverage, double the profit. The final holding position is only BCH exceeding 1000USDT, which is very good. Why would the position be lowered? Imagine joining the altcoin index unchanged, one coin has increased by 100%, and it will be maintained for a long time. The original strategy will hold short positions of 300 * 100 = 30000USDT for a long time, and the new strategy will eventually track the benchmark price At the latest price, you will not hold any position at the end. What will happen to the currency with the screening mechanism, with the same parameters, the earlier stage profits performs better, the retracement is smaller, but the overall returns are slightly lower. Therefore, it is recommended to have a screening mechanism. Parameter optimization The larger the setting of the Alpha parameter of the exponential moving average, the more sensitive the benchmark price tracking, the less transactions, the lower the final holding position. when lower the leverage, the return also reduced. Lower the maximum retracement, it can increase transaction volume. The specific balance operations need based on the backtest results. Since the backtest is a 1h K line, it can only be updated once an hour, the real market can be updated faster, and it is necessary to weigh the specific settings comprehensively.
Chapters: Being a teenager is no walk in the park. Trust me I know. I am a teenager. I am sixteen. I know being a teenager is hard because puberty hits you like a freight train and your hormones make you a walking horn dog. But for me life is tougher. My life is ticking like a time bomb and I have no idea when my bomb is going to blow. *** "Charlie! Stop it!" I squealed. "Haha. Alright. I will stop. Only for you!" he jokingly said. Charlie is my boyfriend of two months. I think I love him. And he is suppose to be taking me to our Junior prom. "Maddie it is time for Charlie to go home. You have a doctor's appointment early tomorrow, remember?" my father shouted from the stairs. "Okay dad." I replied. "I love you babe." Charlie said as he did a peck on my lips. I gave him a hug. "I love you too. I will see you tomorrow." I smiled as he exited my room *** I woke up at 5:15 in the morning to get ready for my doctor's appointment. I woke up with a major headache. I also had a hard time walking to the bathroom. I got in the shower and felt dizzy. I think it was just my headache making it hard to do activities. I got done with getting ready by 6:45 in the morning. By 7 I was waiting in the waiting room at the doctor's office. Reading a magazine. Reading articles about Lady Gaga, Lindsay Lohan, and One Direction. A woman in hot pink scrubs call my name. "Maddie Magic?" I stood up and walked over and told her "That's me." She did the normal stuff. "How are you?" and "Boy you grown up from the last time I have seen you!" She weighed me and asked me some questions. "Doctor Jepsen will be with you shortly." "Fantastic." I said inside my head. Time passes slowly. Minutes feel like hours. I can hear each tick the second hand makes. Tick. Tick. Tick. The doctor finally came in. "What are you in here for?" he asked me. I reply "I am here to find out what is causing my migrains. It happens almost every morning." The doctor takes an x-ray of my head. I hear the machine taking the photos of my head. Click. Click. The doctor leads me back to his waiting room. I sit in there looking around the room. Waiting for him to tell me what is wrong and how he can fix it. I see posters of soon to be mothers and obese people. I read the posters like ten times before the doctor even shows up. He opens up the door and is face does not look good. "Is everything alright?" I asked worriedly. "There is no easy way to say this" he told me. "I checked your x-rays and well it seems like you have stage two of ependymoma." I give the doctor a puzzled look. "Can you put that in simple terms? As you can see I did not go to Harvard for medical school." "It means you are in the second stage of cancer in your brain." After he told me the news his mouth kept moving but nothing was coming out. *** I am shocked. I do not even remember driving to school. How am I going to tell Charlie and my family about my about my cancer. I feel ashamed and pissed off. I walk into the locker room and stare into the mirror. As I stare I feel hot water fall from my eyes. I hear noises behind me. I turned around and noticed that I was in the guy's locker room. Really? Can this day get any worse!? I run out of the men's locker room. I pull out my cell phone and sent a massive text to Charlie and my family. "I found out what is wrong with me. We need to talk about this after school."
Critical evaluation and comparison of fluid distribution systems for industrial scale expanded bed adsorption chromatography columns. The hydrodynamic properties of an expanded bed contactor with 30 cm or 150 cm internal diameter, which employs a rotating or oscillating fluid distributor, were compared to prototype columns of 60 cm or 150 cm diameter employing local stirring (fixed wall nozzles plus central bottom mounted stirrer) for fluid distribution. Fluid introduction through a rotating fluid distributor was found to give superior hydrodynamic characteristics in the 30 cm and 150 cm diameter column compared to using the local stirrer in both the 60 cm and 150 cm diameter columns. The shortcomings of the local stirring distributor at large scale were apparent: dead zones were present which could not be removed by increasing rotation rates or flow rates, and such changes led to a deterioration in hydrodynamic properties. In contrast, during fluid introduction through a rotating distributor no dead zones were observed, and residence time distribution tests showed that plate numbers remained constant or increased slightly as flow rate was raised from 200 cm h(-1) to 470 cm h(-1). Under the conditions studied, oscillation of the rotating fluid distributor led to increased mixing and poorer performance than rotary movement. The results imply that further improvement in distributor design is needed and careful attention should be given to the trade off between turbulence and adequate fluid distribution.
Fricatives at 18 months as a measure for predicting vocabulary and grammar at 24 and 30 months. Language develops at variable rates in young children, yet markers for different developmental trajectories, have not been identified. Production of fricatives in words may be one marker because they are later developing sounds and contribute to syntactic production. We examined whether children who produced fricatives in words by 18 months had better vocabulary and grammar scores at 18, 24, and 30 months than children who did not. The expressive language skills of 37 toddlers who did and did not produce fricatives in words by 18 months of age were compared at 18, 24 and 30 months of age. Expressive vocabulary scores and the use of grammatical markers were significantly better for children who produced fricatives by 18 months than for those who did not. This effect was consistent across scores at 18, 24, and 30 months. The total number of consonants and total number of fricatives produced at 18 months did not significantly predict expressive vocabulary scores. Because the children who produced fricatives by 18 months demonstrated better expressive language skills than their peers who did not produce fricatives by 18 months, the early production of fricatives by toddlers may be a marker of a faster expressive language developmental trajectory. Readers will: (1) describe the relationship between early phonological development and early expressive lexical development, (2) describe the role of perceptual and motor development in speech sound the acquisition, and (3) describe the potential relationship between the production of fricatives and expressive language development.
× Thanks for reading! Log in to continue. Enjoy more articles by logging in or creating a free account. No credit card required. Log in Sign up {{featured_button_text}} Homeless advocate and former Tenant Resource Center director Brenda Konkel dropped out of the Madison mayoral race Wednesday. Konkel announced her decision in a Facebook post, calling the decision “soul crushing.” Candidates had until 5 p.m. Wednesday to file their campaign paperwork for the April election. Six mayoral candidates met the deadline. Konkel had announced in July her intentions to run . In October, she was fired as the Tenant Resource Center’s executive director, a position she held for more than 20 years. With time and energy spent appealing the decision of the center’s board to fire her, Konkel said, she couldn’t put together a “viable campaign” for this race. “There was too much indecision for too long,” Konkel told the Wisconsin State Journal. Konkel was fired by the board Oct. 26 for alleged financial mismanagement. Konkel has disputed those claims. At a Nov. 26 meeting, the board and Konkel agreed to enter mediation conducted by a volunteer mediator for the center. That mediation has ended, Konkel said, but the agreement is still being finalized. She said she could not comment further on the mediation.
Background {#s1} ========== Turmeric, a culinary food additive (spice) is powdered rhizome of the plant Curcuma longa. It has been used for centuries in indigenous medicine in India for the treatment of a variety of diseases. \[[@R01]\] The yellow pigment (curcuminoids), forming 3-4% by weight of turmeric is a mixture of curcumin (1, 94%) demethoxy curcumin (2, 6%) and bis-demethoxy curcumin (3, 0.3%) ([Figure 1](#F1){ref-type="fig"}). Aggarwal et al \[[@R02]\] have shown that curcumin is potent inhibitor of tumor initiation in vivo and in vitro studies. Many workers have shown that curcumin induces apoptosis and is a potent chemopreventive agent in several cancers. e.g breast, colon , skin, oral, intestinal carcinogenesis. Fang et al \[[@R03]\] characterized an irreversible inhibition mechanism of thioredoxin reductase (TrxR) by curcumin. Curcumin binds at the active site of thioredoxin reductase, and inhibits the process of electron transfer from NADPH to ribonucleotide TrxR is present in all living cells; but is overexpressed in tumor cells. However, tumor growth seems to be crucially dependent on an active thioredoxin redox system, making it a potential target for anticancer drugs. Thioredoxin is a key enzyme for DNA synthesis by directly serving as an electron donor to ribonucleotide reductase. TrxR is an important enzyme for DNA metabolism which is directly related to cell proliferation. Thioredoxin reductase (TrxR) catalyzes NADPHdependent reduction of the redox-active disulfide (S-S) in thioredoxin (Trx), which serves a wide range of functions in cellular proliferation, defense against oxidative stress, apoptosis and redox control. \[[@R04]\] The inhibition by curcumin and demethoxy derivatives was caused by covalent modification of active site CYS496 and SEC497 residues resulting in the destruction of the Trx reduction activity. In addition and more importantly, the curcumin-modified enzyme was converted into an NADPH oxidase with production of ROS to which cancer cells appear more sensitive. The threedimensional structure of the SeCYS498 mutant of rat TrxR in complex with NADP (+) has been determined to 3.0 resolution by X-ray crystallography. The overall structure is similar to that of glutathione reductase (GR), including conserved amino acid residues binding the cofactors FAD and NADPH. \[[@R05]\] TrxR can serve as a potential target for anticancer drugs and curcumin has been reported to be a potent anticancer drug. The combination of these two factors motivated us for in silico study of three naturally occurring curcuminoids in terms of binding and docking energies which is likely to help in designing a new synthetic analog of curcumin as a potent anticancer drug. Methodology {#s2} =========== The docking study was performed with three naturally occuring curcuminoids at the active site (CYS497-SEC498) of thioredoxin reductase. The PDB file that we considered for docking has S atom so we replaced it by Se atom with same coordinates because naturally occurring TrxR has SeCys498 amino acids. However, AutoDock does not recognize Se atom, which might be due to there is no parameter for Se atom in AutoDock. The grid maps were calculated with Auto Grid and grid\'s size was decided accordingly and the volume calculated by CAST-p program. The dimensions of the grids for E chain cavity were thus 50 • 50 • 50 Å, with a spacing of 0.375 Å between the grid points and the center (30.074, 0.267 and -1.792) close to the (S/Se) atom of the E chain of the catalytic residue CYS498. Similarly for F chain active site of TrxR, the center of catalytic residue CYS498 (S/Se) was used as the center (28.922, 7.243 and 42.311) of grid, with the grid points of 50 • 50 • 50 Å and the spacing of 0.375 Å. AutoDock 3 with a genetic search algorithm was chosen for all dockings. The maximum number of energy evaluations, the maximum number of generation in the genetic algorithm and the number of GA per run were 2,500,000, 27, 00000 and 50 respectively. All other run parameters were maintained at their default settings. As far as the search methods are concerned, we used genetic algorithm only. Curcumin was obtained from Cambridge structure database (CSD), whereas demethoxy curcumin and bis demethoxy curcumin were generated by drawing the 2-D on ChemSketch and 3-D structures from CORINA server and optimized with Insight II program (Accelrys Inc.). Atomic charges were added using calibration given in the AutoDock empirical free energy function and the numbers of flexible torsions were defined as seven for all three curcumin molecules. To find out hydrogen bonds and hydrophobic interactions we used Ligplot \[[@R07]\] and HBPLUS programes \[[@R08]\] that automatically generated 2-D diagrams of protein-ligand interactions from the 3D coordinates in a PDB file. Ligbuilder \[[@R09]\] program was used to design new potent curcumin derivatives and for lead optimization i.e.to improve bioactivity by precalculated key site of interaction and pharmacophore of the receptor. Discussion {#s3} ========== TrxR is inhibited by curcumin irreversibly forming an adduct. Volume and area of the E and F chains of curcumin binding site were simulated by the CASTp program. \[[@R10]\] Volume of E and Fchain cavity were 2451 Å3 and 4996.9 Å3 respectively, while area of both active sites was1437.5 Å2 and 3320.9Å2. In E chain active site 59 amino acid residues and at F chain 135 residues were accessible to the solvent. However, twenty-two amino acids are common at both the active sites. All the three naturally occurring curcuminoids were docked at the active site of E chain whereas the docking energies were -9.17 kcal,-9.48kcal,-8.48 kcal, and binding energies were -6.75 kcal,-7.17 kcal, -7.0 kcal respectively \[Table 1 in [supplementary material](#SD1){ref-type="supplementary-material"}\]. 2D plot of hydrogen bonds and hydrophobic interactions of curcumin at the E-chain active site were simulated. Four amino acids namely, HIS108(F), ARG351(F), LYS29(F) and LEU112(F) of F chain interact with curcumin molecule. Amongst these four F chain residues three are basic amino acids. HIS108(F) forms hydrogen bond where ARG351(F), LYS29(F) and LEU112(F) are in hydrophobic contacts. The continuous stretch of carboxyl terminal residues of E chain from SER495 to GLY499 are important in either hydrophobic or in hydrogen bond formation. SER 483 and TRP467 of E chain are also important at the active site. Se atom SeCYS498 residue forms hydrophobic contact with C11 atom of curcumin at a distance of 3.23 Å. Demethoxy curcumin forms two hydrogen bonds with docking energy of -9.48 and binding energy -7.17. Binding of demethoxy curcumin at E chain active site is very precise in comparison to curcumin itself \[[Figure 2(a)](#F2){ref-type="fig"}\]. 2D plot of hydrogen bond and hydrophobic interaction of demethoxy curcumin of the Echain active site has shown that F-chain does not interact with demethoxy curcumin molecule \[[Figure 2(b)](#F2){ref-type="fig"}\]. The residues ILE478, THR481, VAL484, ILE492, GLN494, CYS498 and GLY499 are in hydrophobic interactions and the residues SER404, PHE405 SER483 and GLY496 are involved in hydrogen bond interactions. The carboxyl terminal residues of E chain ILE492, GLN494, GLY496, SEC498, GLY499 are important in either hydrophobic or in hydrogen bond formation. The Se atom of SeCYS498 is at the distance of 3.56Å, 3.55 Å and 3.25Å from C13, C12 and C11 respectively. Bis demethoxy curcumin has only one hydrogen bond with the docking energy of -8.84 kcal and binding energy -7.0. Bis demethoxycurcumin has shown very poor binding in comparison to Curcumin and demthoxy curcumin at same (E chain) active site. The 2D plot of hydrogen bond and hydrophobic interaction of bisdemethoxy curcumin at the E-chain active site has shown that the residue of F-chain does not interact with demthoxy curcumin molecule at E-chain active site. The aromatic residues PHE405 PHE406 TRP407 and SER495 involved in hydrophobic contacts and THR481 SER483 GLN494 ILE492 forming hydrogen bond with bisdemethoxycurcumin molecule. Bis demethoxy curcumin is not as close as curcumin and demethoxy curcumin were to the catalytic residues Cys497 and SeCys498 so it can be concluded methoxy group is crucial for interaction at E chain active site. All the three naturally occurring curcuminoids were also docked at the active site of F chain with docking energies -9.75 kcal,-8.13 kcal,- 10.28 kcal, and -7.29 kcal,-9.09 kcal, -8.25 kcal binding energy were respectively, Table 2 (see [supplementary material](#SD1){ref-type="supplementary-material"}). Docked conformations of F chain active site and hydrogen bond interaction given in the Table 2 (see [supplementary material](#SD1){ref-type="supplementary-material"}). The 2D plot of Hydrogen bond and hydrophobic interaction of Curcumin-1 at the F-chain active site is as shown that the residue of E-chain does not interact with curcumin-1 molecule at F-chain active site. Three aromatic amino acids, PHE405 PHE406 TRP407, two acidic amino acids, GLU477 and ASP491 and two nonpolar amino acid residues i.e.VAL484 and ILE492 are involved in hydrophobic interactions. GLN494 is crucial for interaction and stabilizes the docked conformation by hydrogen bonds. The catalytic residues Cys497 and SeCys498 do not approach close to the main chain carbon atoms of curcumin molecule. Demethoxy curcumin also forms two hydrogen bonds with docking energy of -8.13 and binding energy of -9.09. The 2D plot of hydrogen bond and hydrophobic interactions of demethoxy curcumin at the F-chain active site has been shown that TYR106 residue of E-chain forms hydrogen bond with demethoxy curcumin molecule at F-chain active site. Three amino acids PRO473, HIS472 and GLU477 are involved in hydrophobic contacts. Five amino acids viz. LEU409 (F), TYR116(E), CYS498(F), GLY499(F) and TRP407(F), form hydrogen bonds with demethoxy curcumin and also both hydrophobic interactions (at the distance of 3.60Å from C12 and 3.36Å from C11 atom of demethoxy curcumin) and forms hydrogen bond with NH of SeCYS498 and O21 of demethoxy curcumin. Bis-demethoxy curcumin forms three hydrogen bonds with the docking energy of - 10.28 kcal and the best binding energy -8.25. The 2D plot of hydrogen bond and hydrophobic interactions of bisdemethoxy curcumin at the F-chain active site has shown that the residues CYS59, VAL60 and ILE65 of E-chain interact via hydrophobic interactions and SER22 forms hydrogen bond with bis-demethoxy curcumin at F-chain active site. Three aromatic amino acids PHE405, PHE406 and TRP407 are involved in hydrophobic interactions. ILE492 and GLN494 are crucial for interaction and stabilizing bis-demethoxy curcumin molecule by hydrogen bonds. Pharmacophore and receptor based drug designing {#s3a} =============================================== Since docking at the active site of E chain with curcumin and demethoxy curcumin and at F-chain with demethoxy curcumin strongly support wet experiment conducted by Fang *et al* \[[@R02]\] \[concluded by distance mapping Table 3 (see [supplementary material](#SD1){ref-type="supplementary-material"})\]. Hence we did simulation to design and synthesize more potent bioactive anticancerous curcumin derivative. In this reference we simulated pharmacophore of E-chain active site for curcumin and pharmacophore of E and F chain active site for demethoxy curcumin. Docking with bis- demethoxy curcumin has not produced any significant interaction with the catalytic residues, therefore, bisdemethoxy curcumin was not considered for further analysis. Pharmacophore of E-chain active site with curcumin molecule has shown three hydrophobic sites, two hydrogen bond acceptor sites and three hydrogen bond donor sites and maximal internal distance between two features was 18.63Å. Pharmacophore of E-chain active site with demethoxycurcumin have shown two hydrophobic sites, two hydrogen bond acceptor sites and four hydrogen bond donor sites and maximal internal distance between two points was 15.13Å ([Figure 3](#F3){ref-type="fig"}). Pharmacophore of F-chain active site with demethoxy curcumin has shown three hydrophobic sites, one hydrogen bond acceptor site and four hydrogen bond donor sites and maximal internal distance between two points was 11.08 Å. For de-novo design of ligand all parameters (Lipinski rule and ADMET) for drug like molecule were considered. We took curcumin as a seed molecule for E chain active site and demethoxycurcumin as a seed for both E and F chain active sites, growing points were assigned at OH and OCH3 functional groups in all cases. Binding of demethoxy curcumin molecule at E-chain active site was quite precise; hence there was no room to add any substituent. Whereas curcumin at E-chain active site and demethoxy curcumin at F-chain active site have shown big spaces in their hydrophobic pockets so a large hydrophobic moiety could be added to enhance binding and biological activity. The ligand molecule which are being proposed for synthesis are Oc2ccc(/C=C/C(O)CC(=O)/C=C/c1ccc(O)c(OC)c1)nc2OC and Oc2c(cc(/C=C/C(O)CC(=O)/C=C/c1ccc(O)c(OC)c1)nc2OC)CC all being analogs of curcumin molecule. In our docking simulation both chains E and F of thioredoxin reductase were considered together because active site resides at both junctions of chains. Since Fang *et al*, reported \[[@R03]\] in their mass spectrometric study that it forms 1:2 adduct with Cys-SeCYS residue. Conformation of curcumin molecule at the active site of E-chain is important because Se atom of SeCYS498 is approaching very close to the Sp2 C-11 of main chain of Curcumin molecule. Demethoxycurcumin at both E and F chain active sites is showing more interesting results in comparison to Curcumin itself. In our docking simulation it is clear that demethoxycurcumin molecule is apparently more active than curcumin molecule because the interacting Se atom of catalytic residue SeCys498 and ligand C atoms are very close to each other in both E and F-chain active site. Simulation at the E-chain active site with curcumin and demethoxycurcumin shows the latter to be more potent while bis demethoxy curcumin is not potent because interacting Se atom of receptor and ligand C atom are not as close as it is required for binding. Therefore we can conclude that for greater binding in the pocket of active site at least one methoxy group is necessary \[[@R12]\]. Among all the simulations the demethoxy curcumin molecule has been found to be most bioactive. It has shown greatest docking energy at the E-chain active site and nothing could be added at these functional groups OH, and OCH3. While demethoxy curcumin molecule at the F chain active site has shown greatest binding energy among all simulations of docking at E and F chain active site. Since area and volume of F chain active site is greater than E-chain active site so it provides sufficient space to add larger substituent at the OCH3 and OH functional group. Conclusion {#s4} ========== The present results indicate that synthetic curcumin conjugates could be designed and developed as potent anticancer drugs at TrxR receptor. Our study has shown that curcumin at the E chain and demethoxy curcumin at both E and F chain active sites bind strongly as the Se atom is approaching near to C10, C11 or C12 carbon atom of curcumin molecule where it is already proved that Se atom forms adduct with C13 atom. Therefore, it is possible to predict the design of synthetic curcumin derivatives/ conjugates that may become more potent anti-cancer drugs, which would be in addition to their current anti-cancerous profile. Supplementary material ====================== ###### Data 1 **Citation:**Singh & Misra, Bioinformation 4(5):187-192 (2009) ![Curcuminoids: (a) Curcumin; (b) Bis-demethoxy curcumin; (c) Demethoxy curcumin](97320630004187F1){#F1} ![(a) Bound conformation of demethoxy curcumin visualized by ADT in the active site of E-chain of TrxR. Curcumin and TrxR both molecules are in line model with all interacting residues. (b) 2D representation of 3D structure of \[Figure 2 (a)\] created with LigPlot. \[[@R07]\] The hydrogen bonds were identified with HBPLUS \[[@R08]\] as were the hydrophobic contacts formed between demethoxy curcumin and the TrxR residues.](97320630004187F2){#F2} ![Key site of Interaction of demethoxy curcumin and Contour map \[[@R11]\] of pharmacophore of the F-chain active site: Simulated by ligbuilder programme. \[[@R09]\]](97320630004187F3){#F3}
This service will cost you 1 Bitcoin and 5% of the recovered amount you had, if the hypnosis consultation have been successful. There are no deposit fees, as well as any guarantees though. https://buzcoin.io
The invention relates to a rotatable motor vehicle mirror of a type, e.g., depicted and described in German Patent application (OS) No. 2,415,407 counterpart to U.S. Pat. No. 3,942,863. The rotatable motor vehicle mirror type noted above has suction passages in the form of air guiding grooves in the bordering region between the shaft and the inside of the rotor bearing bore. Although the resulting air bearing and the air flow aspirated by the fan through the air guiding groove dissipates the bearing heat produced by friction and utilizes it to heat up the mirror, the bearing may overheat at high vehicle speeds or high speeds of rotor rotation. This risk can be largely excluded by the use of suitable materials for the bearing, but this in turn increases the manufacturing costs, particularly on account of the installation of bearing sleeves. It is the object of the present invention to provide a rotatable mirror for motor vehicles which, despite simple construction of the rotor bearing, largely permits the utilization of the bearing heat to heat up the mirror, and which causes little noise during operation. The advantages attainable by the invention especially reside in the fact that the relatively high resistance offered by the suction passageways to the oncoming air causes subatmospheric pressure at their outlet ends which aspirates additional air through the bearing clearance so that an air cushion builds up in the bearing clearance which results in low-friction and low-noise operation of the rotor. Owing to this air cushion, there is no need to use expensive bearing materials, and a plastic bearing may be employed. At the same time the air flow in the bearing clearance dissipates a substantial portion of the generated bearing heat at the place where it develops. In addition, a plurality of suction bores provided a small distance from the bearing bore contribute to the uniform dissipation of the bearing heat. Furthermore, the characterized inclined position of the blades prevents the development of noise.
Death penalty sought for Anaheim murders KABC A jury recommended that Iftekhar Murtaza, 29, of Van Nuys be sentenced to death for the May 22, 2007 killings of his ex-girlfriend's father and sister and the attempted murder of her mother in Anaheim Hills. December 16, 2013 12:00:00 AM PST SANTA ANA, Calif. -- A jury has recommended the death penalty for a man convicted of murdering his ex-girlfriend's family in a fiery attack. Iftekhar Murtaza, 29, of Van Nuys was found guilty on Nov. 22 of murder, attempted murder, conspiracy to commit murder, sentencing enhancements for multiple murders, and murder during the commission of kidnapping. On Monday, a jury recommended the death penalty. Prosecutors said Shayona Dhanak ended her two-year relationship with Murtaza citing her Hindu family's opposition to her dating a Muslim. Murtaza allegedly became angry about the break-up, believing that Dhanak's parents were responsible because they did not approve of the relationship. Murtaza killed his ex-girlfriend's father, Jayprakash Dhanak, and sister, Karishma Dhanak, and nearly killed her mother, Leele Dhanak, before setting fire to their Anaheim Hills home in 2007. Firefighters found the bodies of Jayprakash and Karishma Dhanak near a bike trail at Mason Regional Park in Irvine on May 22, 2007. Karishma appeared to have been burned alive and her throat was slashed. Prosecutors said Murtaza orchestrated the attack in an attempt to win back his girlfriend. Two other men, identified as Charles Anthony Murphy Jr., 28, and Vitaliy Krasnoperov, 28, were previously convicted for their connection in the murders. In 2011, Murtaza married fellow Orange County Jail inmate Marissa Bilotti, who is also facing murder charges in an unrelated case.
The second time do:|G|—————————————————————————————————————————————————||D|—————————————————————————————————————————————————||A|—————————————————————————————————————————————————||E|3—222222—5222222—7222222——4323———————————————————| Add this on to the notes above. Add 2 more 222220 at the end.|G|—————————————————————————————————————————————————||D|—————————————————————————————————————————————————||A|—————————————————————————————————————————————————||E|222220—222220—222220—222220—222220—2222220———————|
Walking Around Yesterday, this quote showed up in my inbox.I read in a book that a man named Christ went about doing good. It is very disconcerting to me that I am so easily satisfied with just going about. (Toyohiko Kagawa) It gave me pause. How do I walk through my day? What am I content with? Do I intentionally and consciously think about doing good? I like to think I do, but in reality probably not. Most days I am satisfied with just going about. I would like to change that.
****************************************************** The ‘‘officially released’’ date that appears near the beginning of each opinion is the date the opinion will be published in the Connecticut Law Journal or the date it was released as a slip opinion. The operative date for the beginning of all time periods for filing postopinion motions and petitions for certification is the ‘‘officially released’’ date appearing in the opinion. In no event will any such motions be accepted before the ‘‘officially released’’ date. All opinions are subject to modification and technical correction prior to official publication in the Connecti- cut Reports and Connecticut Appellate Reports. In the event of discrepancies between the electronic version of an opinion and the print version appearing in the Connecticut Law Journal and subsequently in the Con- necticut Reports or Connecticut Appellate Reports, the latest print version is to be considered authoritative. The syllabus and procedural history accompanying the opinion as it appears on the Commission on Official Legal Publications Electronic Bulletin Board Service and in the Connecticut Law Journal and bound volumes of official reports are copyrighted by the Secretary of the State, State of Connecticut, and may not be repro- duced and distributed without the express written per- mission of the Commission on Official Legal Publications, Judicial Branch, State of Connecticut. ****************************************************** U.S. BANK NATIONAL ASSOCIATION, TRUSTEE v. LOUISE WORKS (AC 36707) DiPentima, C. J., Sheldon and Cohn, Js. Argued April 9—officially released September 22, 2015 (Appeal from Superior Court, judicial district of Stamford-Norwalk, Mintz, J.) Christopher J. Picard, for the appellant (plaintiff). Janine M. Becker, with whom, on the brief, was Patricia Moore, for the appellee (defendant). Opinion COHN, J. The plaintiff, U.S. Bank National Associa- tion, as trustee for Wachovia Loan Trust, Series 2006- AMN1, appeals from the judgment of the trial court granting the motion of the defendant, Louise Works, to open the judgment of strict foreclosure and to set aside the default entered against her for failure to plead. The plaintiff claims that the court improperly (1) opened the judgment of strict foreclosure pursuant to General Statutes § 49-15 (b), and (2) set aside the default entered against the defendant. We conclude that the court had the authority to open the judgment of strict foreclosure and we dismiss the remainder of the plaintiff’s appeal for lack of a final judgment. This appeal arises out of the plaintiff’s attempt to foreclose on certain real property located at 54 Winding Lane in Norwalk. On February 16, 2010, the plaintiff instituted a foreclosure action with respect to the prop- erty in the Superior Court for the judicial district of Stamford-Norwalk. The plaintiff’s complaint alleged the following facts.1 On February 27, 2006, the defendant, the owner of the property, executed a note in favor of American Mortgage Network, Inc., for a loan in the amount of $462,000. On the same day, to secure the note, the defendant also executed a mortgage on the property in favor of Mortgage Electronic Registration Systems, Inc., as nominee for American Mortgage Net- work, Inc. The mortgage was recorded in the Norwalk land records. It was then assigned to the plaintiff. When the defendant failed to make timely payments of princi- pal and interest under the note, the plaintiff, as the holder of the note and the mortgage, elected to acceler- ate the balance due on the note and to foreclose the mortgage on the property. To that end, it commenced the present action. The day after the plaintiff filed its complaint, the defendant filed a request for foreclosure mediation, which the clerk of the court granted on March 8, 2010. The parties engaged in the mediation process until December 17, 2010, when the mediator filed a report notifying the court that the mediation had been unsuc- cessful. On May 25, 2011, the plaintiff filed a motion to enter a default against the defendant for failure to plead. The clerk of the court granted the plaintiff’s motion on June 1, 2011. The plaintiff then filed a motion for judgment of strict foreclosure, which the court granted on November 28, 2011. The court thereupon entered a judgment of strict foreclosure by setting the law day for May 1, 2012. On April 30, 2012, the defendant filed a chapter 13 bankruptcy petition in the United States Bankruptcy Court for the District of Connecticut in Bridgeport. Pur- suant to title 11 of the United States Code, § 362, the filing of the bankruptcy petition operated as an auto- matic stay of the plaintiff’s foreclosure action. The bankruptcy court dismissed the defendant’s chapter 13 petition on December 21, 2012. On July 17, 2013, the plaintiff filed a motion to reset the law days and reenter judgment in this action pursuant to § 49-15 (b). Before the court ruled on the motion, however, the defendant filed a chapter 7 bankruptcy petition. The chapter 7 petition also operated as an automatic stay of this action. 11 U.S.C. § 362 (2010). On August 28, 2013, the bankruptcy court issued an order granting the plaintiff relief from the automatic stay, thereby permitting the plaintiff to further pursue this action. On January 26, 2014, the day before the hearing sched- uled for the plaintiff’s motion to reset the law days and reenter judgment, the defendant filed a motion to open the judgment of strict foreclosure and set aside the default entered against her for failure to plead. In her motion, the defendant raised the defenses of equitable estoppel, unconscionability, and unclean hands. Specif- ically, she alleged that American Mortgage Network, Inc., the original lender, had engaged in misrepresenta- tion and predatory lending practices. On that basis, she requested that the court open the judgment of strict foreclosure and set aside the default entered against her. On the day of the hearing, January 27, 2014, the defen- dant’s counsel notified the court that the motion to open the judgment and set aside the default had been filed. The defendant’s counsel stated: ‘‘Upon receipt of affidavit of debt in this case, I noticed there had been no pay down of principal at all during this period of time and really reviewed the note and found that this was an interest only note and talked to [the defendant] more about the circumstances how this mortgage came about. Where she—and [the defendant] right now she’ll be I think, I believe, seventy-nine [years old] at the end of this month. She was about seventy-one when she entered into this mortgage. At the time, upon informa- tion and belief, she did have a mortgage, but there was, we believe, equity in the property. A representative did come to her home and sold her this mortgage product which, in fact, has extinguish[ed] any equity in the house, and has put her in a situation where she’s only been paying interest. She was earning the same amount of money she did at the time that she got the mortgage as she’s doing now as a substitute teacher who wasn’t even working full time then or she’s working now which is why she can’t work into modification. So all the indications of predatory lending are jumping out in this case. . . . At this point we need the judgment—well, the judgment, actually, has to be re-entered today if the court wishes to go forward, but we need the default set aside so that we can raise these defenses and develop these defenses.’’ After hearing from the defendant’s counsel, the court stated: ‘‘Well, you need to move to reopen the judgment first, don’t you, and then move to set aside the default.’’ The court then considered § 49-15 (b) and decided that, pursuant to that section, the judgment was already open.2 The court concluded that ‘‘the defendant does not have to under [General Statutes §] 52-212 file a motion to open judgment because under [§] 49-15 (b) it’s automatically [opened] upon the filing of the deficient bankruptcy. But the provisions of the judgment, the findings, remain. But the judgment was reopened.’’ The hearing on the merits of the defendant’s motion to set aside the default was scheduled for February 10, 2014. On February 10, 2014, the court continued the hearing to March 17, 2014. On March 17, 2014, the court held the hearing on the defendant’s motion to set aside the default. The court made the following findings: ‘‘The court is going to find that there is no prejudice to the plaintiff if I reopen the default, because the mediation ended [o]n December 17, 2010. Nothing was filed. A default [for] failure to plead was filed May 25, 2011. Judgment was filed Sep- tember 9, 2011 by the plaintiff. It went to judgment on November 28, 2011. And the bankruptcies occurred. Then the motion to—that was dismissed on—dismissed on December 21, 2012. A motion to reset law days after the dismissal wasn’t filed until July 17, 2013. That appeared on the short calendar on January 29, 2013; was not marked ready. Then it appeared on the short calendar on November 25, 2013, and was not marked ready. It was also on December 16, 2013, short calendar; was not marked ready. It was on the January 6, 2014 short calendar; was not marked ready. It appeared on the January 27, 2014. It was marked ready. And that’s when we started this discussion. The court’s going to find that there are viable defenses, albeit—I’m not sure they’re going to be—I’m not saying that they will be successful, but they’re viable. And I’ll grant the motion to open [the default], and overrule the objection.’’ Fol- lowing the court’s decision to open the default, the defendant filed an answer and special defenses. The plaintiff filed a motion to reargue the court’s decision, which the court denied. This appeal followed. After the plaintiff filed this appeal, it filed a motion for articulation with the trial court, requesting that the court articulate its decision to open the judgment of strict foreclosure and to set aside the default entered against the defendant. On June 23, 2014, the court pro- vided the following articulation: ‘‘The court, in response to the motion for articulation . . . the court is going to find . . . [§] 49-15 (b) states on its face that the— any judgment against the mortgagor foreclosing any title to real estate by a strict foreclosure shall be opened automatically without any action by any party or the court, provided, the provisions of such judgment, i.e., the debt, and other provisions of the judgment, other than the establishment of law days, shall not be set aside under this subsection . . . so the court articulation is that the judgment was opened automatically by [§] 49-15. ‘‘A default was not—the default failure to plead was not opened automatically. So a motion for default, motion to open the default, needed to be filed, and that’s what I ruled on. . . . The court found that there were viable defenses, albeit the court did recognize that if they were—went to trial, and a court did not believe the defendant, that they—she would lose . . . . And so the court found that the defenses that were alleged were valid defenses to the action. The court . . . went through a thorough analysis of why there was no preju- dice, no—no negligence on the behalf of the defendant, and will rely on what the court said, and [its] decision.’’ I The plaintiff first claims that the court improperly opened the judgment of strict foreclosure pursuant to § 49-15 (b). Before we address the merits of the plain- tiff’s claim, we must first determine whether this court has subject matter jurisdiction over that claim. Specifi- cally, we must determine whether the decision appealed from is a final judgment. ‘‘The lack of a final judgment implicates the subject matter jurisdiction of an appellate court to hear an appeal. A determination regarding . . . subject matter jurisdiction is a question of law [over which we exercise plenary review]. . . . As our Supreme Court has explained: To consider the [plaintiff’s] claims, we must apply the law governing our appellate jurisdiction, which is statutory. . . . The legislature has enacted General Statutes § 52-263, which limits the right of appeal to those appeals filed by aggrieved parties on issues of law from final judgments. Unless a specific right to appeal otherwise has been provided by statute, we must always determine the threshold question of whether the appeal is taken from a final judgment before considering the merits of the claim. . . . Fur- ther, we have recognized that limiting appeals to final judgments serves the important public policy of min- imizing interference with and delay in the resolution of trial court proceedings.’’ (Footnote omitted; internal quotation marks omitted.) J & E Investment Co., LLC v. Athan, 131 Conn. App. 471, 482–83, 27 A.3d 415 (2011). ‘‘[I]t is well established that an order opening a judg- ment ordinarily is not a final judgment within § 52-263. . . . [Our Supreme Court], however, has recognized an exception to this rule where the appeal challenges the power of the [trial] court to act to set aside the judg- ment.’’ (Citations omitted; internal quotation marks omitted.) Solomon v. Keiser, 212 Conn. 741, 746–47, 562 A.2d 524 (1989); see also Connecticut Light & Power Co. v. Costle, 179 Conn. 415, 418, 426 A.2d 1324 (1980) (‘‘an appeal which challenges the power of the court to act to set aside the judgment may be reviewed’’). In the present case, the plaintiff challenges the authority of the court to open the judgment of strict foreclosure. Accordingly, this court has jurisdiction over the plain- tiff’s claim. We now turn to the merits of the plaintiff’s claim that the court improperly opened the judgment of strict foreclosure pursuant to § 49-15 (b).3 The plaintiff argues that § 49-15 (b) limits the court to setting new law days and does not automatically open the judgment in its entirety. The defendant, on the other hand, argues that § 49-15 (b) automatically opens the entire judgment. We need not decide whether § 49-15 (b) opens the judg- ment in its entirety because we conclude that the court made the necessary findings for the judgment to be properly opened under § 49-15 (a) (1). Section 49-15 (a) (1) provides in relevant part: ‘‘Any judgment foreclosing the title to real estate by strict foreclosure may, at the discretion of the court rendering the judgment, upon the written motion of any person having an interest in the judgment and for cause shown, be opened and modified, notwithstanding the limitation imposed by [General Statutes §] 52-212a . . . provided no such judgment shall be opened after the title has become absolute in any encumbrancer . . . .’’ This sec- tion, then, permits the court, in its discretion, upon a finding of cause shown, to open and modify a judgment of strict foreclosure upon the motion of the mortgagor at any time after judgment has been rendered, so long as the law days have not passed. Once the law days have passed, the mortgagee holds absolute title to the property and the judgment of strict foreclosure cannot be opened or modified. But see Highgate Condomin- ium Assn., Inc., v. Miller, 129 Conn. App. 429, 434–35, 21 A.3d 853 (2011) (discussing exceptions). The defendant filed her motion to open the judgment of strict foreclosure on January 25, 2014, more than one year after the initial law day scheduled on May 1, 2012. Following the dismissal of the defendant’s bank- ruptcy petitions, which operated as an automatic stay of the judgment of strict foreclosure, the trial court did not set new law days. Thus, when the defendant filed the motion to open the judgment of strict foreclosure in January, 2014, the law days had not passed and the plaintiff did not hold absolute title to the property. Section 49-15 (a) (1) also requires the court to make a finding of ‘‘cause shown’’ in order to open the judgment. Because the court did not specifically consider § 49-15 (a) (1) when it deemed the foreclosure judgment to be open, it did not make a specific finding of cause shown for the purposes of that section. We nevertheless affirm the court’s ruling opening the judgment of strict foreclo- sure because we conclude that the court made the nec- essary findings to open the judgment for cause shown pursuant to § 49-15 (a) (1) when it found ‘‘good cause’’ to set aside the default entered against the defendant pursuant to Practice Book § 17-42. Practice Book § 17-42 states that ‘‘[a] motion to set aside a default where no judgment has been rendered may be granted by the judicial authority for good cause shown upon such terms as it may impose.’’ The court found good cause to set aside the default entered against the defendant when it found that the defendant had raised viable defenses and that there would be no prejudice to the plaintiff if the default were opened. The court also found that the defendant had not been negligent in her defense of the foreclosure action. See Percy v. Lamar Central Outdoor, LLC, 147 Conn. App. 815, 819, 83 A.3d 1212 (in exercising discretion to open judgment rendered after default pursuant to Practice Book § 17-42, ‘‘the trial court may consider not only the presence of mistake, accident, inadvertence, misfor- tune or other reasonable cause . . . factors such as [t]he seriousness of the default, its duration, the reasons for it and the degree of contumacy involved . . . but also, the totality of the circumstances, including whether the delay has caused prejudice to the nonde- faulting party’’ [internal quotation marks omitted]), cert. denied, 311 Conn. 932, 87 A.3d 580 (2014). We conclude that these findings were sufficient for the court to have also found ‘‘cause shown’’ for the purposes of § 49-15 (a) (1). See Hartford Federal Savings & Loan Assn. v. Stage Harbor Corp., 181 Conn. 141, 143–44, 434 A.2d 341 (1980) (whether defendant was negligent in failing to present defense to foreclosure action is relevant fac- tor in trial court’s decision to open judgment under § 49-15 [a] [1]); Centerbank v. Connell, 29 Conn. App. 508, 511, 616 A.2d 282 (1992) (injury to mortgagee if judgment is opened is relevant factor in trial court’s decision to open judgment under § 49-15 [a] [1]). Accordingly, the court’s ruling opening the judgment of strict foreclosure was not improper. II The plaintiff next claims that the court improperly set aside the default entered against the defendant for failure to plead. Because the court’s ruling setting aside the default was interlocutory, the plaintiff has not pre- sented a final judgment for the purposes of appeal. Accordingly, we dismiss this claim. This court may only consider claims on appeal from final judgments. J & E Investment Co., LLC v. Athan, supra, 131 Conn. App. 482. As we have previously explained, the court properly opened the judgment of strict foreclosure rendered in favor of the plaintiff. Once the judgment was opened, it was no longer final. The court then had to decide whether to set aside the default entered against the defendant. ‘‘A default is not a judg- ment. It is an order of the court the effect of which is to preclude the defendant from making any further defense in the case so far as liability is concerned.’’ Automotive Twins, Inc. v. Klein, 138 Conn. 28, 33, 82 A.2d 146 (1951). In setting aside the default, the court permitted the defendant to file an answer and any spe- cial defenses and, in fact, instructed her to do so. The court’s ruling setting aside the default was interlocu- tory, as it did not result in a final judgment, and there- fore we may not review it at this time. The judgment is affirmed with respect to the court’s ruling opening the judgment of strict foreclosure and the case is remanded for further proceedings according to law. The remainder of the plaintiff’s appeal is dis- missed. In this opinion the other judges concurred. 1 The plaintiff filed a corrected complaint, pursuant to court order, on June 14, 2011. The court ordered the plaintiff to file the corrected complaint when it granted the plaintiff’s motion to correct its party name. The only changes in the corrected complaint were to the plaintiff’s party name. All other factual allegations and requests for relief remained the same. 2 General Statutes § 49-15 (b) provides in relevant part: ‘‘Upon the filing of a bankruptcy petition by a mortgagor . . . any judgment against the mortgagor foreclosing the title to real estate by strict foreclosure shall be opened automatically without action by any party or the court, provided, the provisions of such judgment, other than the establishment of law days, shall not be set aside under this subsection, provided no such judgment shall be opened after the title has become absolute in any encumbrancer or the mortgagee, or any person claiming under such encumbrancer or mortgagee. . . .’’ 3 The General Assembly enacted § 49-15 (b) in response to the decision of the United States Court of Appeals for the Second Circuit in In re Canney, 284 F.3d 362, 366–67 (2002), which involved a bankruptcy stay. See 45 H.R. Proc., Pt. 13, 2002 Sess., p. 4158, remarks of Representative William A. Hamzy.
Pepperoni This super chill dog is looking for a second chance. We hear he gets along great with others and is very affectionate with his people (he loves to give gentle kisses). He hasn’t yet been cat tested so we suggest a feline-free home. This guy would basically fit in anywhere because of how calm and relaxed he is – he’s still getting used to car rides but we’re sure that’ll come with practice. As he never got proper training in his former life, he will need a bit of house-breaking but again, this guy is worth the time and effort. If you’re looking for a waddling snuggle bug, then Peppe is your man. Apply to adopt him by filling out an application!
Among those also present are members of the Newfoundland Aquaculture Industry Association (NAIA), ministers of the cabinet committee on jobs, high school and university students, as well as community, academic and business leaders. A total of 28 actions are being launched at the summit that will promote new careers through sustainable aquaculture development. “Our vision for the future of Newfoundland and Labrador is a place where potential is realized, and opportunities abound,” Ball said in a news release. NAIA and the provincial government have a mutual goal to increase annual production of salmon to 50,000 metric tonnes and mussels to 10,750 metric tonnes. Achieving those targets would mean more than double the current number of year-round jobs supported by aquaculture to approximately 2,100, the release states. All actions included in the new sector work plan, which can be found online here, along with other materials presented at the summit, will be fully realized within 20 months. “Aquaculture generated a record $276 million for the provincial economy last year,” NAIA executive director Mark Lane said. “While this is good news, the real excitement comes from knowing there is potential for even more economic success, not only from direct aquaculture activity, but also spin off employment in processing, transportation, service and supply." Some of the actions identified in the aquaculture sector work plan include: - Responding to the human resource needs of the industry with tailored labour market supports, immigration attraction, and efforts to help make youth aware of opportunities in aquaculture; - Responding to the capital and infrastructure needs of the industry by adjusting government funding programs and exploring partnership opportunities to develop facilities that strengthen the value chain for mussel and salmon producers; - Responding to the public awareness and market access needs of the industry by developing a marketing strategy that promotes products and builds public trust; - Responding to the needs of provincial entrepreneurs by promoting opportunities for aquaculture supply and service companies, which in turn creates new employment and maximizes industry competitiveness; and - Responding to the public’s need for sustainable aquaculture development by reviewing all provincial policies related to aquaculture, including the provincial Code of Containment and other measures used to promote sustainability, which ensures the province remains a leader in best practices for years to come.
AkzoNobel share buyback (January 27, 2020 – January 31, 2020) February 04, 2020 AkzoNobel (AKZA; AKZOY) has repurchased 445,490 of its own ordinary shares in the period from January 27, 2020, up to and including January 31, 2020, at an average price of €86.23 per share. The consideration of the repurchase was €38.41 million. This is part of a repurchase program announced on October 23, 2019. AkzoNobel intends to repurchase common shares up to a value of €500 million. The total number of shares repurchased under this program to date is 2,139,393 ordinary shares for a total consideration of €189.99 million. The share buyback is due to be completed in the first half of 2020. The company has engaged a third party to manage the program and perform transactions on its behalf. It is intended that the shares will be cancelled following repurchase. The share buyback will be implemented within the limitations of the authority granted by the Annual General Meeting (AGM) on April 25, 2019. The share repurchase program will be conducted within the parameters prescribed by the Market Abuse Regulation 596/2014 and the safe harbor parameters prescribed by the Commission Delegated Regulation 2016/1052 for share buybacks. In accordance with regulations, AkzoNobel will inform the market about the progress made in the execution of this program through weekly updates on the share buyback overview page.
Lead tartrate from X-ray powder diffraction data. The structure of lead tartrate, Pb(2+).C(4)H(4)O(6)(2-), has been solved from X-ray powder diffraction data. The cation exhibits ninefold coordination and the tartrate groups are linked through Pb.O contacts to form a three-dimensional network.
d to the nearest 10? 40 Let a = -80.889 - 0.111. Let c = 2 + a. Let j = -79.00224 - c. Round j to 4 dps. -0.0022 Let d = -2.275 - -0.2805. Round d to 2 dps. -1.99 Let s = 2134 + -2132.739. Round s to 0 dps. 1 Let h = -749478740.0996956 - -749478892. Let i = h - 151.9. Round i to five decimal places. 0.0003 Suppose -4*n - 3*p + 246567513 = 0, -2*n = -4*n + 3*p + 123283743. Suppose -5*l + n = -97408124. What is l rounded to the nearest one million? 32000000 Let b = 54453286 + -54453503.915188. Let r = -41.915918 - b. Let o = -176 + r. What is o rounded to four decimal places? -0.0007 Let x(b) = 4*b + 35. Let d be x(-5). Let l be (-295600050)/40 + d/12. Round l to the nearest 1000000. -7000000 Let a = 8.1 + -8.09996647. What is a rounded to 5 dps? 0.00003 Let j = -32 - -32.22. Let r = 10.82 - j. Let k = -10.5999822 + r. Round k to 6 decimal places. 0.000018 Let o = 421.31842 + -0.01842. Let x = -412 + o. Round x to the nearest integer. 9 Let s(f) be the third derivative of -f**6/120 + f**5/4 - 7*f**4/24 + 10*f**3/3 + 44*f**2 + 2. Let z be s(8). What is z rounded to the nearest 10? 410 Let w = 1741633721127589 - 1741633717753074.655620351. Let b = w + -3373889.34438. Let t = b - 625. Round t to seven decimal places. -0.0000004 Let u = -19.933 - -14.152. What is u rounded to 1 decimal place? -5.8 Let g be (4/3)/(-4) + (-38160)/54. Suppose -3*l + 5*l = 5994. Let s = l + g. Round s to the nearest one thousand. 2000 Let u = -7494553.200317 + 7495228.2. Let f = -675 + u. What is f rounded to five decimal places? -0.00032 Let w = -63094.999930222 + 63095. What is w rounded to seven decimal places? 0.0000698 Let m = -293 - -317. Let o be (2960/m)/(-2)*-12000. What is o rounded to the nearest 1000000? 1000000 Let q = 247 + -248.266. Let c = 1.25573 + q. Round c to four decimal places. -0.0103 Let f = 11966 + -10915.6. What is f rounded to the nearest one hundred? 1100 Let k = -8884066 - -13459066. Round k to the nearest 1000000. 5000000 Let g(t) be the third derivative of 6341*t**6/120 + t**5/60 + t**4/3 + t**3 + 66*t**2 - 3. Let j be g(-1). Round j to the nearest one hundred. -6300 Let j = 19.40218 + -301.4083. Let c = j - -282. Round c to 3 decimal places. -0.006 Let t = 7 - 56. Let c = 51 + t. Let m be 1/(((-1)/1*c)/554). What is m rounded to the nearest 10? -280 Let i = 2056.0016117 - 2056. Round i to four decimal places. 0.0016 Let p = -0.472 - -0.42. Let f = -5.848 + p. Let a = f - -6.76. Round a to one decimal place. 0.9 Let h = 10025.0000030924 + -10025. What is h rounded to seven decimal places? 0.0000031 Suppose 41*p = -34*p - 610125. Round p to the nearest 1000. -8000 Let z be ((-11 + -21)*-2)/(2*1). Let b(g) = -31435*g - 80. Let d be b(z). What is d rounded to the nearest 100000? -1000000 Let d = 55.4 + -42. Let y = -1276536 + 1276522.600056. Let f = y + d. What is f rounded to four decimal places? 0.0001 Let y = -1195.6 + -228. What is y rounded to the nearest ten? -1420 Let k = -18 - -76. Let f be k/18 + (-11)/(198/4). Let v be ((1200/9)/5)/(f/(-2700)). Round v to the nearest 1000. -24000 Let f = -2.6699 + 2.78349. Round f to three dps. 0.114 Let c = 55.9848619 + -52.494905. Let r = c - 3.49. Round r to six dps. -0.000043 Let i = 26.9846201 - 0.0639201. What is i rounded to one dp? 26.9 Let d = -39 + 17. Let v = -4739520907.99999957 + 4739520930. Let s = v + d. Round s to seven dps. 0.0000004 Let w be ((-250)/(-75))/((-28312796)/(-14156400) - 2). What is w rounded to the nearest 1000000? -12000000 Let y = -401 - -594. Let q = y + -192.9879. Round q to 3 dps. 0.012 Let y(v) = -2*v**3 + v**2 + 4*v + 4. Let t be y(-4). Suppose 9*o + t = 6*o. Let c = 46 - o. What is c rounded to the nearest one hundred? 100 Let u = 25 - 24.958. Let j = u + -22.042. Let v = j - -21.99952. Round v to four decimal places. -0.0005 Let m = 272 + -226. Suppose 33*w = m*w + 5083000. Round w to the nearest 10000. -390000 Let b = 2586.5 + -239.5. Let u = b - 2371.79. Let t = u + 4.69. Round t to 0 dps. -20 Let h(q) = -1318*q - 42. Let u be h(6). Let k be u/(-4)*(6 - 450/27). What is k rounded to the nearest 1000? -21000 Let i = -101447.993 - -101507. Let d = i - 59. Let s = -0.007032 + d. Round s to 5 decimal places. -0.00003 Let n = 20.6 - 20.717. Let s = -22.94177 - -22.825. Let f = n - s. Round f to 5 decimal places. -0.00023 Suppose -10*b + 0*b = 9090. Let k be b - (-3)/(-3)*-1*1. Let x be (k/(-1))/(2*(-6)/30000). What is x rounded to the nearest one hundred thousand? -2300000 Let g = -4.904696 + -0.019004. What is g rounded to the nearest integer? -5 Let w = -934.1598 - 3.2002. What is w rounded to the nearest 10? -940 Let l = 796656477 + -796656479.690000395. Let z = 2.69 + l. What is z rounded to 7 dps? -0.0000004 Suppose 20*p - 44812 = -61*p + 115*p. Round p to the nearest one thousand. -1000 Let f = 0.0677 - 0.067663721. What is f rounded to six decimal places? 0.000036 Let v = -5860206 + 1726650. Let k = v + 6913556. What is k rounded to the nearest 1000000? 3000000 Let l = 789.28 - 789. Let b = l - 0.279999688. Round b to 7 decimal places. 0.0000003 Let t = -10438.5809 - -10438. Let a = t + -82.6791. Let d = a + 84. What is d rounded to 1 decimal place? 0.7 Let d = -108 - -112. Let j be 101*(d - -6*(-1)/2). Round j to the nearest ten. 100 Let r = -0.366 - 0.134. Let k = r + 0.498285. Round k to four decimal places. -0.0017 Let o be (-36 + (13 - -15))*(-8197)/(-4). Round o to the nearest 1000. -16000 Let h = 0.497906 + -0.49490481. Let b = 12 + -12.003. Let p = h + b. Round p to 7 decimal places. 0.0000012 Let a = -266.267 + 266. Let u = a - -0.27828. Round u to 3 dps. 0.011 Let r = -680.2947468 - -680.3. What is r rounded to three dps? 0.005 Let u = 13027 - 13026.950854. Round u to 3 decimal places. 0.049 Let z = -4.949 + 4.9. Let m = z + -9.951. Let t = 9.9999748 + m. Round t to six decimal places. -0.000025 Let v(a) = -919750*a**2 + 49*a - 196. Let y be v(4). What is y rounded to the nearest 100000? -14700000 Let l = -433.4 + 2.4. Let t = l - -430.99802. Round t to 3 decimal places. -0.002 Let b = 2696 + -1794. Suppose -94*r = -1036 + 8932. Let l = r + b. What is l rounded to the nearest 100? 800 Let i = -43.981 - 0.019. Let t = i - -14.8. Let h = 63 + t. What is h rounded to the nearest ten? 30 Let m = -1070.04973 - -1070.1. Round m to four dps. 0.0503 Let h be (-77895)/(-189) - 1/7. Suppose -h = 2*b + 874. What is b rounded to the nearest 100? -600 Let w(h) = 10437*h**3 + 21*h**2 + 70*h. Let l be w(12). What is l rounded to the nearest one million? 18000000 Let q = 8.731 - 8.9. Let o = -30.352 - -30. Let g = q - o. Round g to 2 decimal places. 0.18 Let l = 4222.41 - 4194.4451. Let q = 28 - l. Round q to three decimal places. 0.035 Let q = -11973 + 11943.002. Let i = q + 30. Let w = -0.0011 - i. What is w rounded to 3 decimal places? -0.003 Let a = 197 + -197.541. Let o = -0.54099757 - a. Round o to 7 decimal places. 0.0000024 Let v = -5 - -52. Let b = 52 - v. Let u = 4.99999685 - b. What is u rounded to 6 decimal places? -0.000003 Let b = 6135.99575 - 6136. What is b rounded to two decimal places? 0 Let w be (174627/(-6))/(-3)*1070. Suppose -4*s + w = s. Suppose 5*i - s = 12423879. Round i to the nearest 1000000. 3000000 Let l = -2.1707336 + 1.984769. Let w = -0.186 - l. Round w to 5 dps. -0.00004 Suppose -33 = -3*r - 40*g + 37*g, 7*r + 2*g = 37. Suppose -4*s - 2*c = -6, -2*c + 5 = 4*s + c. Let d be ((-141)/(-2) + 3)*s/r. Round d to the nearest ten. 50 Let o = 37 + -37.28. Let j = 0.166 + o. What is j rounded to 2 decimal places? -0.11 Suppose 0 = 2*h - b - 132, 192 = -0*h + 3*h - 3*b. Suppose 369200 = h*s - 64*s. What is s rounded to the nearest ten thousand? 90000 Let w = 7.3 - 0.3. Let p = 170.475 + -177.47563. Let j = p + w. What is j rounded to four dps? -0.0006 Let r = 1284726.94499966 + -1284727. Let w = -0.555 - -0.5. Let j = r - w. What is j rounded to 7 decimal places? -0.0000003 Suppose 0*x - k + 8364141 = 3*x, -x = 4*k - 2788036. Suppose -23094144 = 221*p - 218*p. Let h = x + p. Round h to the nearest 1000000. -5000000 Suppose -79 = -12*i + 185. Suppose -i*q = -21*q - 1394. Suppose -2*n = 5*z - 3*n + q, -4*z - n = 1108. Round z to the nearest 10. -280 Let h be 1/(9/6)*9. Let y = -14 - -16. Suppose -368000 = -y*d + h*d. What is d rounded to
Mobile devices such as cellular phones typically include a bottom connector that is used for both data programming and battery charging. Some connectors also include a cover for the connector or port to prevent water or dust intrusion and to otherwise protect the connector or port from the environment. Such connectors also include a mechanical attachment scheme that can include latches or hooks that can eventually fail over time.
###################################################################### # Cloud Routes Web Application # ------------------------------------------------------------------- # SaltStack Generic Modules - Forms Class ###################################################################### from wtforms import TextField, SelectField from wtforms.validators import DataRequired, URL from ..base import BaseReactForm class ReactForm(BaseReactForm): ''' Class that creates a Saltstack Reaction form for the dashboard ''' title = "SaltStack: Call Module" description = """ <P> This reaction provides a method for using Salt-API to trigger a defined modules execution. This integration relies on the <a href="https://github.com/saltstack-formulas/salt-api-reactor-formula" target="_blank">Salt-API Reactor Formula</a> or a similar reactor and salt-api configuration to be in place. This reaction simply sends a webhook to the defined SaltStack API server. </P><P> SaltStack reactions open up many possible remediations, by integrating Runbook with SaltStack nearly any infrastructure task can be performed as a result of the integration. </P> """ placeholders = BaseReactForm.placeholders placeholders.update({ 'secretkey' : "OneTwoThree_VerySecret", 'tgt' : "webserver*nyc3*.example.com", 'module' : "state.sls", 'args' : 'nginx', }) descriptions=BaseReactForm.descriptions matcher_choices = [ ("glob", "Hostname Glob"), ("pcre", "Hostname PCRE"), ("list", "List"), ("grain", "Grains"), ("grain_pcre", "Grains PCRE"), ("pillar", "Pillar"), ("nodegroup", "NodeGroup"), ("ipcidr", "IP Address/CIDR"), ("compound", "Compound") ] url = TextField( "URL", description=descriptions['url'], validators=[URL(message='URL must be in an appropriate format')]) secretkey = TextField( "Secret Key", description=descriptions['saltstack']['secretkey'], validators=[DataRequired(message='Secret Key is a required field')]) tgt = TextField( "Target", description=descriptions['saltstack']['tgt'], validators=[DataRequired(message='Target is a required field')]) matcher = SelectField( "Matcher", description=descriptions['saltstack']['matcher'], choices=matcher_choices, validators=[DataRequired(message='Matcher is a required field')]) module = TextField( "Module", description="Define the Salt Module to call", validators=[DataRequired(message='Module is a required field')]) args = TextField("Arguments", description="Provide arguments to the module being called") call_on = SelectField( "Call On", description=descriptions['callon'], choices=[('false', 'False Monitors'), ('true', 'True Monitors')], validators=[DataRequired(message='Call On is a required field')]) if __name__ == '__main__': pass
// // Copyright (C) Microsoft Corporation // All rights reserved. // #include "pch.h" #pragma hdrstop namespace Platform { CPPCLI_FUNC SizeT::SizeT(void* pv) { _value = pv; } CPPCLI_FUNC SizeT::SizeT(int32 n) { _value = (void*)n; } }
Greene, G. W. and K. Melanson. "The Relationship Between Weight Dissatisfaction and Anthropometric, Cognitive and Eating Behavioral Variables in College Students (Abstract)." Journal of the American Dietetic Association. 11(9,S):A-23. September 2011.
#!/bin/sh ##### CCAA管理脚本 ##### ##### Author:xiaoz.me ##### ##### Update:2020-04-30 ##### #导入环境变量 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/bin:/sbin export PATH aria2pid=$(pgrep 'aria2c') ccaa_web_pid=$(pgrep 'ccaa_web') filebrowser_pid=$(pgrep 'filebrowser') #设置aria2密码 function pass(){ sed -ir "s/rpc-secret=.*/rpc-secret=$PASS/g" /etc/ccaa/aria2.conf } #启动ccaa function ccaa_start(){ nohup aria2c --conf-path=/etc/ccaa/aria2.conf > /var/log/aria2.log 2>&1 & nohup /usr/sbin/ccaa_web > /var/log/ccaa_web.log 2>&1 & nohup filebrowser -c /etc/ccaa/config.json > /var/log/fbrun.log 2>&1 & sleep 3600d } case $1 in 'start') ccaa_start ;; 'stop') kill -9 ${aria2pid} kill -9 ${ccaa_web_pid} kill -9 ${filebrowser_pid} ;; 'restart') kill -9 ${aria2pid} kill -9 ${ccaa_web_pid} kill -9 ${filebrowser_pid} ccaa_start ;; 'status') if [ "$aria2pid" == "" ] then echo "Not running!" else echo '-----------------------------------------------' echo "Aria2 is running,pid is ${aria2pid}." echo "AriaNg is running,pid is ${ccaa_web_pid}." echo "Filebrowser is running,pid is ${filebrowser_pid}." echo '-----------------------------------------------' fi ;; '-v') cat /etc/ccaa/version.txt && echo '' ;; 'pass') pass $2 ;; *) echo '参数错误!' exit ;; esac
一、判断题 (2x10=20) 二、不定项选择 (3x5=15) 三、Next[]构造题 (8+6=14) 这题给了两个模式串,分别写出各自的改进前、后的next[]表 第一个串是SHIPSHIPED_SHIPS,共16个字符 第二个串是PHILEDPHAL...,忘了最后是啥了,共12个字符 第一个串,个人觉得难点可能就是最后一个S吧,时间很充裕,对于改进后的next[]表,我直接按照程序运行了一遍,写了长长的一串t\j数值= = 第二个串没发现啥陷阱,感觉有点虚啊= = 四、就地堆排序 (15) 给了一个长度为7的随机整数向量,要求用Floyd算法建堆,然后排序。给了一个大表格,每一行都是向量的一个状态,第一行是建堆之后的状态,然后依次取最大值放到堆后面。 建堆算法我是现场看的,而且讲义里的代码被拆成了好几块,看起来很不方便= =这要是建堆建错了,估计后面就错大发了= = 五、有向图DFS遍历 (1x6+2x5=16) 给了一个7节点的有向图,节点标号为1~7,指定当存在歧义性的时候优先考虑标号小的节点。 最后一共有6条树边(T),1条跨边(C),两条前向边(F)和两条后向边(B),而且这题的分值写的是1*6+2*5=16,大家懂的。 六、散列冲突 (20) 给定M=17的散列表,给定了基本策略:求余法、单向平方试探、懒惰删除。 进行了一系列操作,写出每次操作之后的散列表状态。 一开始put进去7个数,中间有一步put(1481),第八个操作remove(1481),最后一个操作put()一个数进去。 第一问,如果在上面操作之后查询1481,问将会出现什么情况。死循环找不到了呗= = 第二问,在不改变基本策略的基础上,给出两种方案解决上述问题。 注意,不能改变那三个基本策略。 个人认为,由于懒惰删除之后,在查询的时候会把删除标记也算到装填因子里,所以最然最后只有8个元素,装填因子貌似是8/17,但是加上一个标记之后就有9个了,9/17>0.5,所以会出现这种情况。于是可以复制出来一个一样规模的新散列表,然后将旧表非空桶的元素逐一插入,这样就可以保证装填因子<=0.5的时候一定能找到。 然后我想不出啥新招了,就直接写了一个扩容,又造了一个M'=37的散列,好乏力……估计两个只会给一个方案的分= = CA大神提出另一种方案,查询的时候记录查过几个桶,当查询桶的数量超过某一阈值的时候判定为查询失败。但是这个阈值怎么设定呢?现有元素数量?现有元素+懒惰标记数量?或者是散列规模M?似乎都不够大。有人说是2M,不知道为啥,求大神解答啊…… -------------------------------------------------------------- 先补充一句,请教了gao_young大神,最后一道大题解决死循环的计数,当计数到M/2-1的时候就可以判定查询失败了。可以自行证明。其实我不会证= = 判断和选择题应该比较难吧,而且很多填空题都很“恰好”,数字很贱。这里只写一些印象深刻的题,这些题比较难,想了很久(当然,是对我而言的)。以下整理的题不计次序。 判断:(一共10个,想不起来那么多了= =) 1.对于正权值有向图,如果把所有的边权都平方之后,Dijkstra算法得到的最短路径树方案不变。 2.在KMP匹配的过程中,当主程序运行到i,j的状态时,意味着之前至少做过i次成功匹配以及i-j次失败匹配。 3.一个向量的存在主流数,则该数必然是中位数以及频繁数。 (似乎AB卷里的另一个是:如果有某数既是中位数又是频繁数,则该数也是主流数) 4.字符集规模越大的时候,next表比BC表效果越好。 5.如果使用了线性复杂度的中位数选取算法,快速排序的复杂度可以保证在最坏情况下也渐进等于O(nlogn)。 选择: 1.将[1481,1992]区间内的整数逐一插入到空AVL树中,最后该AVL树的高度是: A、7 B、8 C、9 D、10 E、以上都不对 2.将[23, 1481)区间内的整数组成一个2-3-B树,且根节点只有一个关键码,则最终该B-树的高度至少是 A、7 B、8 C、9 D、10 E、以上都不对 3.对红黑树进行插入操作时,进行双红修正,黑高度增加,则_____发生重染色,_____发生结构调整。 (两个空分别可以填入“必然”、“可能”、“必然不”,选项就是这三者的排列组合) 4.对以下各搜索树进行删除操作,哪些树可能会经过Omega(logn)次局部调整,其中n为关键码的数量。 A、AVL B、伸展树 C、红黑树 D、B-树 E、都不会
Q: " had been about everything and done almost every where" What does this sentence mean in text below: " there was a girl. She wandered all over the country hitching rides and shacking up until she'd been just about everything and done almost everywhere". A: This is an inversion of the normal phrase "done just about everything and been almost everywhere". This inversion is done for emphasis. In a similar vein, one of my former colleagues used to say, "The early worm catches the bird." The "normal" sequence will make a point but not catch anyone's attention. Bu the "inverted" sequence will raise eyebrows. When people get over their surprise, they'll remember the underlying point better (the one to which these phrases refer.)
The present invention relates generally to heat exchangers and more particularly to a method of transferring heat from primary fluid to secondary fluid utilizing a particularly designed heat exchanger which is especially suitable for transferring heat from primary liquid metal to secondary liquid metal, for example liquid sodium, for cooling a fast breeder nuclear reactor or the like. A liquid metal cooled fast breeder reactor power plant typically uses what is commonly referred to as an intermediate heat exchanger for transferring heat from liquid metal primary coolant, which becomes radioactive while cooling the reactor core, to an isolated intermediate or secondary circuit of liquid metal which does not become radioactive to any significant extent. In most cases, the heat transferred to the intermediate or secondary stream is not wasted but rather used, for example, to make steam for driving a turbine-generator. To date, there have been a number of problems associated with power plants of the type just mentioned. For example, the conventional heat exchanger utilized heretofore has typically displayed a relatively high pressure drop, for example 10 psi or more, across its primary liquid metal side. This in turn means that the primary circulation pump must be placed in the "hot leg" of the overall primary circulation loop, that is, the pump must be located in the section of the loop from the reactor to the heat exchanger rather than in the "cold leg" after the heat exchanger. This is mainly due to the net positive suction head requirements of such pumps and specifically because they tend to cavitate if operated at too low a net positive suction head. However, placing the primary circulation pump in the hot leg is undesirable because of being subjected to very severe operating requirements including thermal transients and high temperature, for example temperatures as high as 1050.degree. F. In fact, where pumps of this type are to be used in commercial sized reactors, it may be entirely impractical to design them with a capability to withstand the severe operating requirements under hot leg conditions. Proposals have been made to place the primary circulation pump in the cold leg of the primary loop by obtaining a net positive suction head sufficient to overcome the pressure drop of the heat exchanger. This has been attempted by pressurizing the cover gas over the primary liquid metal in the reactor vessel, which metal is typically sodium, and also by lengthening the pump shaft, that is, lowering the pump inlet relative to the sodium level in the reactor vessel. However, pressurizing the cover gas is undesirable because it could be hazardous if the pressure were lost during a transient period. Moreover, the longer shaft is undesirable because of bearing problems. Still another proposal has been to reduce the pressure drop by enlarging the overall size of the heat exchanger and specifically by making its ratio of volume to heat transfer surface quite high. However, because space is at a premium with regard to fast breeder reactors, this solution would be quite costly and, in some cases, economically prohibitive. As will be seen hereinafter, the heat exchanger designed in accordance with the present invention eliminates the various drawbacks just discussed. More specifically, this heat exchanger displays a sufficiently low pressure drop across its primary side so that the primary circulation pump can be located in the cold leg of the primary circulation loop. Moreover, this is accomplished in an uncomplicated and economical way without pressurizing the cover gas over the primary sodium in the reactor vessel, without lengthening the pump shaft and without enlarging the overall exchanger.
subculture corsets and clothing This week I answer questions from the peanut gallery in a year-end Q&A. From opinions on Flat Earth people to pot brownies to tattoos and dinosaurs, pretty much no topic is left unsullied… including the birth of #thepainofthegraze hashtag This week I talk about SJWs, aka Social Justice… Witch hunts. Not Warriors. Witch hunts. Because definitions get fuzzy, fingers get all pointy, and evidence and procedure are tossed out the window in the name of social media hysteria. Welcome to the American Witch Hunts of 2017, where sexual harassment, racism and prejudicial behavior are all lit up like torches for the masses to carry with their pitchforks. This week I talk about genre, subgenre, categories, keywords and how they affect everything—from what you watch and read, to what gets written, and how it’s all marketed. BUT it is imperative that you GO HERE before you listen… trust me. Go. Watch. Come back… This week I don’t just get angry at the system for dumbing down America, I spew about the sheep allowing it. From the blatant watering down of education to the mental tapeworm of media and entertainment… NSFW: language. *to boil an egg: put water in pot. turn on heat (burner/flame/etc). once it is boiling, gently add eggs. set timer for 13 minutes**. go scrub your f**king toilet. take off heat. tip pan into sink and pour hot water out (not the eggs. use a lid or something to hold them there). add really cold water. drain again. cold water. drain. add cold water and let sit on stove/counter. go dust the tops of all the frames and clocks. remove from water. dry off. use sharpie to draw faces on eggs (that’s how you tell the boiled from the raw, duh). put in fridge. you’re welcome. **13 minutes is the exact time needed for a. perfectly yellow insides, not that overdone green color, and b. if you slap it against the counter and roll it back and forth, the shell will come off in one piece… handy.
Search This Blog Saturday, January 14, 2012 Gov. Haley Barbour release inmates in order to repent for a racist. Former Mississippi Gov. Haley Barbour said Friday he's "very comfortable" with his final-days decisions to grant pardons or other clemency to more than 200 people, including convicted killers — decisions that outraged victims' families and dismayed even some of his most devoted supporters. Barbour, a Republican who had considered but decided against running for president this year, said that 189 of the people who got pardons or other reprieves had already been released from prison before his actions. Only 10, he said, have been or will be fully released from prison, while several with expensive, chronic conditions are receiving medical leave. "I am fully confident the pardons and other clemency I have given are all valid," Barbour told reporters at a news conference, his first on the subject, at the Jackson-area law firm where he now works. Barbour granted pardons and other reprieves in his final days before leaving office after two terms Tuesday. Five inmates who had worked as trusties at the Governor's Mansion — four of them, convicted of murder — were released last weekend. One of the freed men had fatally shot his estranged wife as she held their baby in 1993 and then shot her male friend in the head; the friend survived. Barbour initially declined to comment on the pardons or to provide detailed information about how many of those receiving them were still in prison. He then issued a statement after leaving office, after the pardons had generated a firestorm of criticism. By the time state corrections officials said Wednesday that 21 on the list were still in custody, state Attorney General Jim Hood was calling the pardons "shameful" and questioning whether Barbour had violated the state constitution by not ensuring inmates gave enough public notice about their possible release. Hood, the only statewide Democratic officeholder in Mississippi, also persuaded a state judge to temporarily block release of the 21 still in custody. State corrections officials said Friday they would start to release 13 of the 21 inmates because the 13 were given medical discharges and weren't bound by the same public notice requirements before release. Barbour on Friday reiterated that it's a tradition in Mississippi for governors to free trusties who worked at the Governor's Mansion. And the former governor said he's not concerned that the freed trusties might harm anyone. "I have absolute confidence, so much confidence, that I let my grandchildren play with these five men," Barbour, 64, said of the trusties freed this week. He said the Mississippi Department of Corrections picks inmates who work at the Governor's Mansion. Typically, they are men who committed crimes of passion. Corrections officials assign them, he said, because they are not likely to commit another violent crime and make good workers. Records show Barbour gave "full, complete and unconditional" pardons to 203 people, including 17 convicted of murder, 10 convicted of manslaughter, eight convicted of aggravated assault and five convicted of drunken-driving incidents that caused deaths. He granted some sort of reprieve to 26 inmates who were in custody — 10 full pardons; 13 medical releases; one suspension of sentence; one conditional, indefinite suspension of sentence; and one conditional clemency.
Q: Would you prefer to use String\NSString or Array/NSArray and etc in swift Would you prefer to use String\NSString or Array/NSArray and etc in swift or what depends on to choose? A: String and Array are supercharged enhanced versions of NSString NSArray. String has better UTF support, Array uses generics and more. NSString and NSArray should be used only when necessary, such as when using objective-c code from swift or accessing iOS/MacOS APIs However each pair is interchangeable and (almost) automatically bridged when needed, so you can pass an Array where a NSArray is required, and vice versa. Same applies to strings.
Q: Creating a background color "ping" using only CSS3 I want to create a simple "ping" feature when an event happens on a div. For example, if the user clicks a div, I want the div to quickly change background color and then slowly transition back to the original color. I would like to do this purely with CSS3 if possible. A: You can use a trick with the transition property, and the pseudo class :active that will be triggered on click. On the :active pseudo, set the transition to 0s, so it will instantly change the color. Then, when it is not triggered anymore the default transition: 1s /*or whatever speed*/ will slowly get it back to its original color. div { width: 100px; height: 100px; background: silver; transition: 1s; } div:active { background: yellow; transition: 0s; } http://jsfiddle.net/1vgef44t/
Spontaneous mammary carcinomas fail to induce an immune response in syngeneic FVBN202 neu transgenic mice. FVBN202 mice, which are transgenic for the rat neu gene, spontaneously develop mammary carcinomas between 6 and 7 months of age. We investigated whether these spontaneous tumors (spontaneous breast carcinoma cells, SBCC) could elicit an immune response in naive 6- to 8-week-old FVBN202 transgenic and FVBN nontransgenic mice. After s.c. injection of SBCC, the recently activated T cells, which were identified by their reduced expression of CD62L (L-selectin), were isolated from the draining lymph nodes, expanded with anti-CD3 and IL-2, and their cytokine response to tumor cells in vitro was analyzed. Tumor-vaccine draining lymph node lymphocytes (TVDLN) from transgenic mice failed to make IFN-gamma in response to the tumor cells. However, TVDLN from the nontransgenic mice exhibited a tumor-specific IFN-gamma response against the SBCC. This indicates that the SBCC are immunogenic. The lack of response in transgenic mice could not be attributed to cytokine immune deviation or T-cell signaling defects. Although transgenic mice were tolerant to their own tumors, their immune competence was established by their ability to respond in an allogeneic mixed lymphocyte reaction, to reject an allogeneic breast carcinoma cell line, and to produce a tumor-specific IFN-gamma response against a syngeneic cancer cell line. This transgenic mouse model provides the opportunity to investigate the immune response against a primary tumor cell culture rather than cell lines or clones and should prove useful for developing immunotherapies that overcome tolerance to self-tumor antigens.
Nixon (film) Nixon is a 1995 American epic historical drama film directed by Oliver Stone, produced by Clayton Townsend, Stone and Andrew G. Vajna. The film was written by Stone, Christopher Wilkinson and Stephen J. Rievele, with significant contributions from "project consultants" Christopher Scheer and Robert Scheer. The film tells the story of the political and personal life of former U.S. President Richard Nixon, played by Anthony Hopkins. The film portrays Nixon as a complex and, in many respects, admirable, though deeply flawed, person. Nixon begins with a disclaimer that the film is "an attempt to understand the truth [...] based on numerous public sources and on an incomplete historical record." The cast includes Anthony Hopkins, Joan Allen, Annabeth Gish, Marley Shelton, Powers Boothe, J. T. Walsh, E. G. Marshall, James Woods, Paul Sorvino, Bob Hoskins, Larry Hagman, Ed Harris and David Hyde Pierce, plus archival appearances from political figures such as President Bill Clinton in TV footage from the Nixon funeral service. The film was nominated for four Academy Awards: Best Actor (Anthony Hopkins), Best Supporting Actress (Joan Allen), Best Original Score (John Williams) and Best Original Screenplay. This was Stone's second of three films about the American presidency, made four years after JFK, about the assassination of John F. Kennedy, and followed 13 years later by W., about George W. Bush. Plot In 1972, the White House Plumbers break into The Watergate and are subsequently arrested. Eighteen months later in December 1973, Richard Nixon's Chief of Staff, Alexander Haig (Powers Boothe), brings Nixon (Anthony Hopkins) audio tapes for Nixon to listen. The two men discuss the Watergate scandal and the resulting chaos. After discussing the death of J. Edgar Hoover, Nixon uses profanity when discussing John Dean, James McCord and others involved in Watergate. As Haig turns to leave, Nixon asks Haig why he hasn't been given a pistol to commit suicide like an honorable soldier. Nixon starts the taping system which triggers memories that begin a series of flashbacks within the film. The first begins on June 23, 1972 about one week after the break-in, during a meeting with H. R. Haldeman (James Woods), John Ehrlichman (J. T. Walsh) and Dean (David Hyde Pierce). Ehrlichman and Dean leave, and Nixon speaks the "smoking gun" tape to Haldeman. The film covers most aspects of Nixon's life and political career and implies that Nixon and his wife abused alcohol and prescription medications. Nixon's health problems, including his bout of phlebitis and pneumonia during the Watergate crisis, are also shown, and his various medicants are sometimes attributed to these health issues. The film also hints at some kind of responsibility, real or imagined, that Nixon felt towards the John F. Kennedy assassination through references to the Bay of Pigs Invasion, the implication being that the mechanisms set into place for the invasion by Nixon during his term as Dwight D. Eisenhower's vice president spiraled out of control to culminate in Kennedy's assassination and, eventually, Watergate. The film ends with Nixon's resignation and departure from the lawn of the White House on the helicopter, Army One. Real life footage of Nixon's state funeral in Yorba Linda, California plays out over the extended end credits, and all living ex-presidents at the time—Gerald Ford, Jimmy Carter, Ronald Reagan, George H. W. Bush, and then-president Bill Clinton—are shown in attendance. Cast First family Anthony Hopkins as Richard Nixon Joan Allen as Pat Nixon Annabeth Gish as Julie Nixon Eisenhower Marley Shelton as Tricia Nixon Cox White House staff and cabinet James Woods as H. R. Haldeman Woods talked Stone into giving him the part, a role that the director had planned to offer Ed Harris. J. T. Walsh as John Ehrlichman Paul Sorvino as Henry Kissinger Powers Boothe as Alexander Haig E. G. Marshall as John N. Mitchell David Paymer as Ron Ziegler David Hyde Pierce as John Dean Kevin Dunn as Charles Colson Saul Rubinek as Herbert G. Klein Fyvush Finkel as Murray Chotiner Tony Plana as Manolo Sanchez (Nixon's valet) James Karen as William P. Rogers Richard Fancy as Melvin Laird Nixon family Mary Steenburgen as Hannah Milhous Nixon Tony Goldwyn as Harold Nixon Tom Bower as Francis Nixon Sean Stone as Donald Nixon Joshua Preston as Arthur Nixon Corey Carrier as adolescent Richard Nixon David Barry Gray as young adult Richard Nixon White House plumbers Ed Harris as E. Howard Hunt John Diehl as G. Gordon Liddy Robert Beltran as Frank Sturgis Other cast members Bob Hoskins as J. Edgar Hoover Brian Bedford as Clyde Tolson Madeline Kahn as Martha Beall Mitchell Edward Herrmann as Nelson Rockefeller Dan Hedaya as Trini Cardoza, based upon Bebe Rebozo Bridgette Wilson as Sandy Ric Young as Mao Zedong Boris Sichkin as Leonid Brezhnev Sam Waterston as Richard Helms (scenes present only in director's cut) Larry Hagman as "Jack Jones" Unlike some other characters in the film who represent actual people, Jack Jones, a billionaire investment banker and real estate tycoon, is a composite character, who is emblematic of "big business" in general. The character may be a reference to Nixon's meetings with Clint Murchison, Sr., although he also illuminates Nixon's relationships with Howard Hughes, H. L. Hunt and other entrepreneurs. Tony Lo Bianco as Johnny Roselli George Plimpton as the President's lawyer Production Origins Eric Hamburg, former speechwriter and staff member of the House Foreign Affairs Committee, got the idea of a film about Nixon after having dinner with Oliver Stone. Originally, Oliver Stone had been developing two projects — the musical Evita and a movie about Panamanian dictator Manuel Noriega. When they both did not get made, Stone turned his attention to a biopic about Richard Nixon. The former President's death on April 22, 1994, was also a key factor in Stone's decision to make a Nixon film. He pitched the film to Warner Bros., but, according to the director, they saw it, "as a bunch of unattractive older white men sitting around in suits, with a lot of dialogue and not enough action". In 1993, Hamburg mentioned the idea of a Nixon film to writer Stephen J. Rivele with the concept being that they would incorporate all of the politician's misdeeds, both known and speculative. Rivele liked the idea and had previously thought about writing a play exploring the same themes. Hamburg encouraged Rivele to write a film instead and with his screenwriting partner, Christopher Wilkinson, they wrote a treatment on November 1993. They conceived of a concept referred to as "the Beast", which Wilkinson describes as "a headless monster that lurches through postwar history," a metaphor for a system of dark forces that resulted in the assassinations of John F. Kennedy, Robert F. Kennedy, and Martin Luther King Jr., the Vietnam War, and helped Nixon's rise to power and his fall from it as well. Stone said in an interview that Nixon realizes that "the Beast" "is more powerful than he is. We can't get into it that much, but we hint at it so many times — the military-industrial complex, the forces of money". In another interview, the director elaborates, It was this concept that convinced Stone to make Nixon and he told Hamburg to hire Rivele and Wilkinson. Stone commissioned the first draft of the film's screenplay in the fall of 1993. Rivele and Wilkinson delivered the first draft of their script on June 17, 1994, the anniversary of the Watergate scandal. Stone loved the script but felt that the third act and the ending needed more work. They wrote another draft and delivered it on August 9, the 20th anniversary of Nixon's resignation. Pre-production Stone immersed himself in research with the help of Hamburg. With Hamburg and actors Hopkins and James Woods, Stone flew to Washington, D.C. and interviewed the surviving members of Nixon's inner circle: lawyer Leonard Garment and Attorney General Elliot Richardson. He also interviewed Robert McNamara, a former Secretary of Defense under the Kennedy and Johnson administrations. The director also hired Alexander Butterfield, a key figure in the Watergate scandal who handled the flow of paper to the President, as a consultant to make sure that the Oval Office was realistically depicted, former deputy White House counsel John Sears, and John Dean, who made sure that every aspect of the script was accurate and wrote a few uncredited scenes for the film. Butterfield also appears in a few scenes as a White House staffer. To research their roles, Powers Boothe, David Hyde Pierce and Paul Sorvino talked to their real-life counterparts, but J.T. Walsh decided not to contact John Ehrlichman because he had threatened to sue after reading an early version of the script and was not happy with how he was portrayed. Hopkins watched a lot of documentary footage on Nixon. At night, he would go to sleep with the Nixon footage playing, letting it seep into his subconscious. Hopkins said, "It's taking in all this information and if you're relaxed enough, it begins to take you over." Stone originally had a three-picture deal with Regency Enterprises which included JFK, Heaven and Earth, and Natural Born Killers. After the success of Killers, Arnon Milchan, head of Regency, signed Stone for three more motion pictures. Stone could make any film up to a budget of $42.5 million. When Stone told Milchan that he wanted to make Nixon, Milchan, who was not keen on the idea, told the director that he would only give him $35 million, thinking that this would cause Stone to abandon the project. Stone took the project to Hungarian financier Andrew G. Vajna who had co-financing deal with Disney. Vajna's company, Cinergi Pictures, were willing to finance the $38 million film. This angered Milchan who claimed that Nixon was his film because of his three-picture deal with Stone and he threatened to sue. He withdrew after Stone paid him an undisclosed amount. Stone was finalizing the film's budget a week before shooting was to begin. He made a deal with Cinergi and Disney's Hollywood Pictures in order to supply the $43 million budget. To cut costs, Stone leased the White House sets from Rob Reiner's film The American President. Casting The studio did not like Stone's choice to play Nixon. They wanted Tom Hanks or Jack Nicholson — two of Stone's original choices. The director also considered Gene Hackman, Robin Williams, Gary Oldman and Tommy Lee Jones. Stone met with Warren Beatty but the actor wanted to make too many changes to the script. Stone cast Hopkins based on his performances in The Remains of the Day and Shadowlands. Of Hopkins, Stone said, "The isolation of Tony is what struck me. The loneliness. I felt that was the quality that always marked Nixon." When the actor met the director he got the impression that Stone was "one of the great bad boys of American pop culture, and I might be a fool to walk away." What convinced Hopkins to ultimately take on the role and "impersonate the soul of Nixon were the scenes in the film when he talks about his mother and father. That affected me." Hopkins wore a hair piece and false teeth "to hint at a physical resemblance to Nixon". When Beatty was thinking about doing the film, he insisted on doing a reading of the script with an actress and Joan Allen was flown in from New York City. Afterwards, Beatty told Stone that he had found his Pat Nixon. Principal photography The film began shooting on May 1, 1995 but there was a week of pre-shooting at the end of April to film scenes that would be used as part of a mock documentary about Nixon's career. Early on during principal photography, Hopkins was intimidated by the amount of dialogue he had to learn, that was being added and changed all the time as he recalled, "There were moments when I wanted to get out, when I wanted to just do a nice Knots Landing or something." Sorvino told him that his accent was all wrong. Sorvino claims he told Hopkins that he thought "there was room for improvement" and that he would be willing to help him. Woods says that Sorvino told Hopkins that he was "doing the whole thing wrong" and that he was an "expert" who could help him. Woods recalls that Sorvino took Hopkins to lunch and then he quit that afternoon. Hopkins told Stone that he wanted to quit the production but the director managed to convince him to stay. According to the actors, this was all good-natured joking. Woods said, "I'd always tell him how great he was in Psycho. I'd call him Lady Perkins all the time instead of Sir Anthony Hopkins." In Spring of 1994, Time magazine reported that an early draft of the screenplay linked Nixon to the assassination of President John F. Kennedy. The facts contained in the script were based on research from various sources, including documents, transcripts and hours of footage from the Nixon White House. Dean said about the film's accuracy: "In the larger picture, it reflected accurately what happened." Stone addressed the criticism of fictional material in the film, saying, "The material we invented was not done haphazardly or whimsically, it was based on research and interpretation." John Taylor, head of the Nixon Presidential Library, leaked a copy of the script to Richard Helms, former Director of the CIA, who threatened to sue the production. In response, Stone cut out all scenes with Helms from the theatrical print and claimed that he did for "artistic reasons" only to reinstate this footage on the home video release. During the post-production phase, Stone had his editors in three different rooms with the scenes from the film revolving from one room to another, "depending on how successful they were". If one editor wasn't successful with a scene then it went to another. Stone said that it was "the most intense post- I've ever done, even more intense than JFK" because they were screening the film three times a week, making changes in 48–72 hours, rescreening the film and then making another 48 hours of changes. Reception Box office In its opening weekend, Nixon grossed a total of $2.2 million in 514 theaters. As of December 19, 2006, the film had grossed a total of $13.6 million in the United States and Canada, below its $44 million budget. Critical reaction Two days before the film was released in theaters, the Richard Nixon Library and birthplace in Yorba Linda, California issued a statement on behalf of the Nixon family, calling parts of the film "reprehensible" and that it was designed to "defame and degrade President and Mrs. Nixon's memories in the mind of the American public". This statement was based on a published copy of the script. The statement also criticized Stone's depiction of Nixon's private life, that of his childhood, and his part in planning the assassination of Fidel Castro. Stone responded that his "purpose in making the film, Nixon was neither malicious nor defamatory", and was an attempt to gain "a fuller understanding of the life and career of Richard Nixon — the good and the bad, the triumphs and the tragedies, and the legacy he left his nation and the world". Walt Disney's daughter, Diane Disney Miller, wrote a letter to Nixon's daughters saying that Stone had "committed a grave disservice to your family, to the Presidency, and to American history". Stone does not see his film as the definitive statement on Nixon but as "a basis to start reading, to start investigating on your own". Some critics took Stone to task for portraying Nixon as an alcoholic, though Stone says that was based on information from books by Stephen Ambrose, Fawn Brodie, and Tom Wicker. Film critic Roger Ebert praised the film for how it took "on the resonance of classic tragedy. Tragedy requires the fall of a hero, and one of the achievements of Nixon is to show that greatness was within his reach." Ebert also placed the film on his list of the top ten films of the year. Janet Maslin from The New York Times praised Anthony Hopkins' performance and "his character's embattled outlook and stiff, hunched body language with amazing skill". Mick LaSalle in the San Francisco Chronicle, felt that "the problem here isn't accuracy. It's absurdity. Hopkins' exaggerated portrayal of Nixon is the linchpin of a film that in its conception and presentation consistently veers into camp". Richard Corliss, in his review for Time, also had a problem with Hopkins' portrayal: "Hopkins, though, is a failure. He finds neither the timbre of Nixon's plummy baritone, with its wonderfully false attempts at intimacy, nor the stature of a career climber who, with raw hands, scaled the mountain and was still not high or big enough." Peter Travers of Rolling Stone wrote: "It's gripping psychodrama — just don't confuse Nixon with history." On Rotten Tomatoes the film has a 74% approval rating, based reviews from 61 critics, with an average score of 6.8/10. The site's consensus states: "Much like its subject's time in office, Nixon might have ended sooner -- but what remains is an engrossing, well-acted look at the rise and fall of a fascinating political figure." Accolades It was nominated for four Academy Awards: Best Actor in a Leading Role (Anthony Hopkins), Best Actress in a Supporting Role (Joan Allen), Best Music, Original Dramatic Score and Best Writing, Screenplay Written Directly for the Screen. Entertainment Weekly ranked Nixon #40 on their "50 Best Biopics Ever" list and one of the 25 "Powerful Political Thrillers". Home media The theatrical cut of the film was released on DVD on June 15, 1999. A director's cut was released on DVD as part of an Oliver Stone boxset in 2001, running 212 mins and including 28 minutes of previously deleted scenes restored. Much of the added time consists of two scenes: one in which Nixon meets with Central Intelligence Agency director Richard Helms (played by Sam Waterston) and another on Tricia Nixon's wedding day, where J. Edgar Hoover persuades Nixon to install the taping system in the Oval Office. The Director's Cut was released individually on DVD in 2002. The Director's Cut was re-released by Walt Disney Studios Home Entertainment (branded as Hollywood Pictures Home Entertainment) on DVD and Blu-ray Disc on August 19, 2008 with the first anamorphic widescreen version of the film in North America. References External links White House Museum - How accurately did the movie recreate the architecture and floor plan of the actual White House? (Review) Salon.com Stone interview Category:1995 films Category:1990s biographical drama films Category:American political drama films Category:American biographical drama films Category:English-language films Category:Films about elections Category:Films directed by Oliver Stone Category:Films produced by Andrew G. Vajna Category:Films set in the 1920s Category:Films set in the 1930s Category:Films set in the 1960s Category:Films set in the 1970s Category:Films set in Washington, D.C. Category:Films about Richard Nixon Category:Cultural depictions of Richard Nixon Category:Cultural depictions of Henry Kissinger Category:Cultural depictions of Mao Zedong Category:Cultural depictions of J. Edgar Hoover Category:Cultural depictions of Leonid Brezhnev Category:Watergate scandal in film Category:Films scored by John Williams Category:Films with screenplays by Oliver Stone Category:Cinergi Pictures films Category:Hollywood Pictures films Category:American nonlinear narrative films Category:Films about Presidents of the United States Category:Films set in the White House
Dressed active particles in spherical crystals. We investigate the dynamics of an active particle in two-dimensional spherical crystals, which provide an ideal environment to illustrate the interplay between active particles and crystallographic defects. A moving active particle is observed to be surrounded by localized topological defects, becoming a dressed active particle. Such a physical picture characterizes both the lattice distortion around the moving particle and the healing of the distorted lattice in its trajectory. We find that the dynamical behaviors of an active particle in both random and ballistic motions uniformly conform to this featured scenario, whether the particle is initially a defect or not. We further observe that the defect pattern around a dressed ballistic active particle randomly oscillates between two well-defined wing-like defect motifs regardless of its speed. The established physical picture of dressed active particles in this work partially deciphers the complexity of the intriguing nonequilibrium behaviors in active crystals, and opens the promising possibility of introducing the activity to engineer defects, which has strong connections with the design of materials.
YOU may have heard of Nick Clegg. He is the Deputy Prime Minister of an illiberal and uncaring government that has run Britain for the past five years. Under Clegg, the number of people seeking emergency help from food banks has soared from 61,648 in 2010 to more than one million last year. Clegg’s defence – that he and his LibDem colleagues have somehow kept the Tory wild beast in its political cage – will not be understood by people being deliberately “sanctioned” by the Department of Work and Pensions for allegedly not trying hard enough to find work, who now have to rely on private charity to feed their children. As for “saving Britain” from economic collapse – Clegg’s other explanation for propping up David Cameron’s lacklustre administration – tell that to the record 697,000 people on zero-hours contracts. Clegg’s so-called economic miracle consists of the reintroduction of Victorian labour practices. Then he has the effrontery to claim credit for “persuading” George Osborne that it is not worth bothering to levy income tax on the few mites thus earned. Normally I wouldn’t waste words on Nick Clegg, who will have trouble retaining his parliamentary seat next week. The latest Ashcroft poll puts him two points behind his Labour opponent in Sheffield Hallam. However, with breathtaking arrogance, our Nick has suddenly decided to try and save the LibDem bacon by selling his party’s MPs to the highest coalition bidder. Fortunately, it looks like the LibDems will be lucky to return to Westminster with 27 of their current 57 seats. That’s too few to provide Cameron or Miliband with a Commons majority. Current projections give the Tories circa 274 seats and Labour 269 – though it could swing either way on the night. So Nick Clegg (or his instant successor) is unlikely to be king maker. Nick Clegg knows this. So in order to keep the LibDems in business, he is trying a desperate manoeuvre. First he has declared that he said he will not join a coalition with Labour that involves a “confidence and supply” arrangement with the SNP. Clegg justifies this by saying the SNP is a threat to constitutional order, a view supported by many Tory grandees. Second, Clegg argues that any coalition with the party that finishes second – Labour, on current projections – will lack "legitimacy". It doesn’t take a genius to see that Nick Clegg wants to get back under the duvet with David Cameron. Far from being centrists, Clegg and allies such as David Laws and Danny Alexander are with the Tories on economic issues. Just as in 2010, Clegg is now acting to engineer a Tory return to Downing Street, where he will give a “liberal” cover to what the Institute of Fiscal Studies predicts could be the deepest and fastest fiscal consolidation seen in a major industrial economy. Start with Clegg’s claim that an arrangement between a minority Labour administration and the SNP would be constitutional dynamite because Nationalists want Scottish independence. On the contrary, the real potential for constitutional instability derives from the British parliamentary establishment ganging up to exclude the majority of elected Scottish MPs from participating in the governing of what is supposed to be a united kingdom. As well as being an affront to the democratic will of the Scottish people, it tells Scots they are only allowed to elect the MPs that suit Nick Clegg and his ilk. One might see the ghost of an argument in Clegg’s illiberal veto on SNP participation in UK governance if – God forbid – the independence movement sought to pursue its aims by non-democratic means. On the contrary, the SNP has been a model to the world in how to seek self-government peacefully. This new Clegg doctrine ostracising the SNP politically is in stark contrast to the approach of the late, great Jo Grimond, leader of the old Liberal Party from 1956 to 1967. Or of Ludovic Kennedy, the great Scottish Liberal activist and journalist. In 1967, Kennedy arranged a meeting between Grimond, David Steel and the SNP’s Billy Wolfe to discuss common action over Home Rule. True, there was dissention in Scottish Liberal ranks over such cooperation and Kennedy subsequently left the party when it came to nothing. Grimond always regretted the failure to make common cause with the SNP and in November 1969 advocated publically that the Liberals should give the Nationalists a clear run in the South Ayrshire by-election (won, incidentally, by Labour’s Jim Sillars). Where Nick Clegg is pursuing classic Liberal deviousness is in seeking a pact with the Tories to destroy left-wing opponents. Back in the early 1920s, when Labour was emerging as a party with a significant parliamentary presence, the Liberals and Tories in Scotland routinely withdrew candidates in favour of each other, rather than split the vote and let the Socialists in. What about Clegg’s contention that the minority party that wins the most seats has the sole legitimate right to form a government? For starters, this convention is not found in any statute. Second, the will of the voters matters more than one party having a modest plurality of seats. If, on May 7, the UK electorate gives an overall Commons majority to progressive parties, including both Labour and the SNP, then it would be undemocratic for Clegg to try and lever David Cameron back into Downing Street. True, if the Tories are the largest single party by a nose, Cameron is likely to demand first dibs at putting together a working majority. So what? The progressive majority can immediately vote him down. We’ve been here before. In the General Election of December 1923, the ruling Tories lost 86 seats but remained the largest single party, with 258 seats. Upstart Labour, under Ramsay MacDonald, increased its score to 191. The Liberals managed third place with 158. Tory Prime Minister and steel tycoon Stanley Baldwin tried to cling to power but the Liberals refused to support him. Nevertheless, Baldwin went through the constitutional motions, as leader of the largest party and sitting PM, hoping to provoke a split in the Liberal ranks. The new parliament met on January 16 1924, with a King’s speech written by Baldwin. But on January 21, this was voted down by Labour and Liberal MPs. Baldwin had to resign and Ramsay MacDonald was called to the palace to become Labour’s first ever Prime Minister, albeit of a minority government. The one thing that emerges from Clegg’s desperate intervention is that the Westminster Establishment is revving up to block any move to a progressive UK administration. The demonisation of the SNP is part of this. But Ed Miliband should be mindful that ultimately these scare tactics are also aimed at keeping Labour out of power. The solution is a working arrangement between a minority Labour government and the SNP, based on an end to austerity. The last thing most people want to see, north or south of the Border, is David Cameron and Nick Clegg sniggering again in the Downing Street Rose Garden.
Dead Man Driving Car crashes happen to other guys, right? Maybe they don't have your quick reaction time or uncanny ability to multitask behind the wheel. Or maybe they're simply lesser drivers. If you believe that, let us introduce you to Adam LaBar, 1970-2008. We suspect you'll recognize him. We hope you'll learn from him. A light rain patters the windshields on Interstate 81 in Pennsylvania. The traffic sighs and groans and pushes forward. At the sight of the emergency vehicles huddled on the berm, the southbound drivers hesitate, some from a superstitious caution, as if the doom that claimed the crash victim might at any moment extend another tentacle; some in a gesture of respect, a kind of automotive bowing of the head; but most, let's face it, because they want to see. We dismiss the impulse as unworthy, and yet we wouldn't want to look so badly if there wasn't some lesson in this spectacle. "That could have been me," some part of us mutters. But before the thought resolves, the traffic quickens and the serene forgetfulness of highway driving resumes. Meanwhile, a few cars back but gaining, the statistics take up their morbid pursuit: roughly 40,000 dead every year on our roadways, according to the National Highway Traffic Safety Administration, and an annual injury count of 3.2 million. One day, sometime in the next 6 years, the odds say, you're going to be one of them. So, this once, let's indulge that dire curiosity. Who was the victim, and where was he going? How did he lose control, and why didn't his car protect him? Because maybe if you know what happened back there, you can prevent the same thing from happening to you. T-Minus 00:42:00 || 6:40 pm EST The crash on I-81 stands out for no particular reason. The victim is young, full of life, and well loved. His name is Adam LaBar. At 6:40 p.m. he's just leaving work. He is 38 years old, married, has four kids—the two oldest are boys, the third a girl, the youngest a happy surprise. LaBar's a joker, a peacemaker, a fan of Jack Nicholson and the Pittsburgh Steelers. He is by all accounts an intelligent, educated, savvy man, and yet he is entirely ignorant of one critical fact: In 42 minutes his life will undergo a violent interruption. Tuesday is LaBar's early day. Most days he works 10 to 10 at a car dealership in Chambersburg. He never chose to be a salesman. One day he went in to buy a car and negotiated so well that they offered him a job. He was young and the job paid well, so he took it. With his head for numbers, it wasn't long before he worked his way up to sales manager, moving more than 100 units a month. Still, the hours are brutal, and he never has enough time with his wife, Lisa, and the kids. He knows too well what it's like to grow up with no father. His own dad died when he was 10, of a heart condition. LaBar's oldest is 15—a difficult age, when good parenting is crucial. Recently Stephan was in trouble for reenacting a slo-mo fight scene from The Matrix—in the middle of science class. It wasn't a big deal, but school administrations are easily freaked. Now LaBar buckles into his '07 sedan (which happens to be one of the best-selling cars in America, not that it matters) and starts to pull out. The traffic on Route 30 is always dicey this time of day, and a left turn requires a keen sense of timing. At the tired end of a gray afternoon, it'd be easy to be T-boned and end up impaled on your own elbow. In fact, driver drowsiness is a contributing factor in up to 24 percent of all crashes and near crashes, according to the Virginia Tech Transportation Institute. LaBar thinks he's a pretty good driver. He's not unusual in this respect. According to one study by the Insurance Institute for Highway Safety, 72 percent of drivers regard themselves as more skilled than everyone else. Researchers call it the Lake Wobegon effect—a tendency to think we're above average, particularly at relatively undemanding tasks. (It's the rare person who considers himself an above-average juggler.) Studies trace the bias to a fundamental information imbalance, namely that the poorest performers are also the least able to recognize skill (or lack of skill) in themselves or others. Some evidence suggests that this overconfidence is exacerbated by the design of cars themselves. For instance, studies show that the same insulated engine compartment that reduces road noise also impairs your sense of the vehicle's speed and makes you more likely to drive closer to the vehicle in front. The speedometer, which in many vehicles reaches 140, makes whatever speed you're driving seem manageable by comparison. And if you're driving an SUV, with its higher vantage point, the illusion of control becomes even more pronounced. But while cockpit ergonomics encourage a feeling of control, the truth is borne out by the car's hidden arsenal of safety features. Behind the elegant facade, crumple zones brace for brutal impacts. Airbags hang on hair triggers. The headrest waits for the moment your head snaps back, the energy-absorbing steering column for the moment your torso crunches forward. Electronic stability control, antilock brakes, shatter-resistant windshields, all grimly anticipate statistical inevitability. By this light, your car is as much a crashing machine as a driving machine. LaBar knows all this, on some level. He has sold the model he's driving so many times he can reel off the safety features in his sleep. Top-of-the-line crash ratings on front and side impacts. Best acceleration in its class. Recipient of numerous awards. All he has to do is stand next to it. The thing sells itself. Now he sneaks a right onto Franklin Farm and rolls down into the hollow. The speed limit drops to 35. A flock of starlings dodges over a cornfield. The next stop is the restaurant, which LaBar opened last month. This is his ticket out of the car business. It's his second try. The first was a hotel that burned down in 2004. LaBar continued to work at the dealership, biding his time, waiting for the next opportunity. Now he has a second restaurant planned for Hagerstown—step 2 in his own little empire. T-Minus 00:39:00 || 6:43 pm EST Franklin Farm Lane ends at Walker Road. As he reaches the stop sign, LaBar's risk of mishap multiplies. Intersections are the site of 40 percent of all crashes and 22 percent of fatal crashes. Risk is the landscape that every driver moves through, and part of being a good driver is how well you perceive it. One measure of risk perception is the position of your hands on the wheel. If they're at 10 and 2, chances are you're alert to danger. Right now LaBar's are at the base of the wheel. Certainly intersections can be dangerous, but he's passed this way maybe 2,000 times. If anything bad could happen, it would have happened by now. The effects of familiarity on risk perception are well known. The more accustomed you are to the road, the more difficult it is for you to imagine disaster. And so it is with LaBar. His eyes stop scanning, his attention withdraws, his response time drops from around 450 milliseconds to about 1,300. Mental resources are allocated elsewhere, to a review of recent events or the anticipation of future ones. The restaurant is just 2 minutes away; the books must be checked, the kitchen inspected, the manager assuaged. Traversing the highway overpass and converging on Norland, LaBar discards his dealership persona and assumes the role of restaurant owner. As he curves left on Walker, various road signs slide into view. We rely on signage to alert us to changes in our risk landscape—an intersection, for instance, or a construction zone. And yet studies suggest that the better marked a road is, the faster we tend to drive. Researchers call this "risk homeostasis"—the tendency to adjust our behavior to preserve a preferred level of risk. Risk taking is part of our nature. It's what allows us to experiment, to remain undiscouraged by previous failures, and to keep cool in the midst of danger. It's also what can lead us into danger when danger may be completely avoidable. Highways, which are engineered for maximum safety, are particularly susceptible to risk homeostasis. The berms are cleared to reduce the chance of collisions with trees, but then the landscape seems to pass by more slowly, which invites greater speed. Lanes are widened to provide a larger safety margin, but in effect they telegraph a tacit permission to pay less attention. That's the great thing about rumble strips, says Tom Vanderbilt, the author of Traffic: Why We Drive the Way We Do. "They increase your safety without increasing your perception of safety." Even if we were immune to this sort of behavioral blowback, not even the best signage could warn you of the deadliest hazard: the other driver. But just who is the other driver? Surveys indicate there's a nearly 80 percent chance that he speeds regularly, and a 53 percent likelihood that he talks on the phone while driving. There's a 4 percent chance he runs red lights—on purpose—and a 2 percent chance he has driven after he's had too much to drink. The more you learn about this person, the less you want to meet him. Yet chances are you will, because you share the road with him every day. T-Minus 00:07:00 || 7:15 pm EST LaBar leaves the restaurant carrying two pizzas, a plain and a meat lover's. Tonight Lisa has a break from cooking. It's late May and the air is humid and loamy. Even here in the parking lot, amid so much asphalt, you can smell the manure that's spread over the cornfields. LaBar hooks a left out of the parking lot, and is again on Walker. At the top of the hill he eases onto the I-81 on-ramp, cruising down to join the highway's southward flow. His attention surges along with his tachometer as he accelerates to match the traffic. Driving is a cooperative activity, notes James Jenness, Ph.D., of Westat, a research center in Rockville, Maryland. The more your driving blends in, the safer you are. This principle has its limits, however. Black cars, one New Zealand study reveals, are twice as likely to crash as white cars, while red and yellow cars are less likely to crash. The safest of all cars, then, may be the one that looks the most different but acts most the same. LaBar's car is brick red, which has the disadvantage of appearing black at night, and the additional disadvantage of being difficult to perceive peripherally. Now he tunes the radio to 94.3 WQCM—a local rock station. If he's anything like the rest of us, LaBar will adjust his controls three times in the next 20 minutes, with each adjustment taking 5.5 seconds. That's 5.5 seconds when his eyes may not be on the road and both hands may not be on the wheel. Even when he's not fiddling with the controls, the tempo of the music could double his chance of a crash, suggests a study from Israel's Ben-Gurion University. "If music is above 60 beats per minute," says Conrad King, a consultant psychologist to Britain's Royal Automobile Club Foundation, "listeners experience a faster heart rate and increased blood pressure." In general, the foundation concluded, you should stay away from Wagner and Motorhead and stick to more laid-back stuff, like Bach's cello suites or Dido. Music is just one of a dozen factors that can affect your response on the roadway. Dialing a phone triples your risk of a crash. Reaching for a moving object increases it nine times. Worst of all is texting, which according to another Virginia Tech Transportation Institute study, makes you 23 times more likely to crash. As technology develops and our cars gradually morph into rolling computers with built-in Internet, navigation, and entertainment consoles, experts see distraction as the big threat to road safety. As DUI was to the '80s and road rage was to the '90s, so "distraction" is to this decade. Yes, there is always the possibility that new technology will come along to protect us from the dangers of the old technology: night vision; collision detection systems; vibration feedback when you drift out of your lane; even audio alerts from your headrest, the electronic equivalent of someone shouting "boo!" But there's an opportunity here to recognize an important truth about ourselves. Advances in technology are quickly turning attention into our most valuable resource. Treating it as such, and allocating it wisely, could mean the difference between life and death. This is easier said than done, of course. Because what if you're on your way home from work and your 12-year-old son calls? What kind of dad wouldn't answer? T-Minus 00:02:36 || 7:19:24 pm EST Thunderstorms prowl the horizon to the west. After a day of hustling, there are few things LaBar looks forward to more than sitting out back with Lisa and watching the clouds drag their dark curtain over the land. There's something weirdly calming about observing distant trouble. Once they sat out there until 3 in the morning, just talking, drinking Coronas, and pointing at satellites. Theirs was a classic American romance. They met around a jukebox on a Saturday night. She shot a glance at him, his buddy threw an elbow into his ribs, and it was on. Now he can picture her waiting for him with the children by the pool. The water leaps as Stephan lands a cannonball. T-Minus 00:00:02.67 || 7:22:06.33 pm ESTThe road is wet. We know that much. And we know about the phone call. To pick it up, he glances away from the road for a second—or 95 feet at the speed he is traveling, 65 miles per hour. And as driving instructors stress, your hands tend to follow where your eyes are looking, so perhaps Labar's hands shift imperceptibly on the steering wheel, changing the course of his vehicle. Maybe he adjusts radio volume, too, or reaches to keep the pizza boxes from sliding off the seat. The phone conversation is brief. LaBar says . . . T-Minus 00:00:02.31 || 7:22:06.69 pm EST"Oh God — " Deep in his brain, his amygdala sparks a fear signal, and his heart starts blasting blood to his muscles. Vision narrows. Hearing dims. The adrenaline spike momentarily disrupts executive function as the ancient fight-flight impulse girds his body for an entirely different kind of conflict than the one he's facing at this moment. In the sedan there is no jaguar to flee or rival to pummel. Instead, LaBar faces an array of roughly 50 levers and buttons, all but perhaps three of which have become unusable, given the loss of his fine motor control. In fact, LaBar is so shocked right now that it may not even occur to him to drop his phone. There's still a chance he could turn this into a near crash. For every actual crash, drivers experience 11 near crashes, according to a study by the Virginia Tech Transportation Institute, a fact that by itself demonstrates the mortal importance of evasive maneuvering. But evasive maneuvers depend on experience, and there's little in LaBar's experience that speaks to his current peril. Nor should this be surprising. After all, even if we are scheduled to crash every 6 years and nearly crash every 7 months, that's still not enough practice to learn much. One study, in fact, has shown that close to 30 percent of drivers involved in car crashes take no evasive measures at all. Even if you do respond—and respond correctly—a lot depends on your car. While every vehicle sold in America must meet federal safety standards, there's still plenty of room for variation in handling performance. Take skid resistance. A sports car can endure nearly 50 percent more cornering forces than a full-sized SUV before skidding, says Dave VanderWerp, the technical director at Car and Driver magazine. "That's a huge, huge difference in how much grip you have," VanderWerp says, "and how much the car can handle in terms of steering away from a potential accident." The variation among passenger cars in braking ability is equally dramatic. At 70 mph, the worst performers require an additional 30 feet to reach a full stop. "If you look up and the car is stopped in front of you," VanderWerp says, "depending on what car you're in, you may stop in time or you may continue another 30 feet, which is forever in a situation like that." LaBar's car has pretty good skid resistance, and among the best brake ratings for a car in its class. But he's not on a test track at the moment. Swerving left and into the median, he's not even on the road. T-Minus 00:00:01.81 || 7:22:07.19 pm EST "The way this often happens is that the driver actually goes off the right side of the road," says Joel Stitzel, Ph.D., a biomechanics expert on an elite crash-investigation team at the Virginia Tech-Wake Forest center for injury biomechanics, "and when he realizes he's off the road, he oversteers to the left. And as soon as he goes back onto the road his wheels are turned too far, so the first thing he does is fly across the road and through the median." The tires lose their grip and the car starts to spin, skidding sideways across the wet grass and into the path of oncoming traffic. "The thing is, the driver doesn't usually have that much control. Probably he's just trying to keep the steering wheel from turning in his hands, because it becomes really responsive to the ground. When it starts jumping around in your hands, you become freaked out. Unless you've been trained, you don't know what to do." LaBar can't even see it because his car is skidding backward, but coming his way at about 70 miles per hour from the opposite direction is a Chevy Silverado pickup that weighs 8,000 pounds. Yards . . . feet . . . inches . . . a panicked instant — 00:00:00.00 || 7:22:09.00 pm EST IMPACT Too fast to describe, too fast to experience. Other things operate at this speed—crunching metal, shattering glass—but not human thought. The Silverado punches deep into the car's right rear flank, crumpling the bumper into the trunk, popping the wheel from the right-rear well, and twisting the C-pillar like a licorice stick. As the crash pulse launches forward, the door panels buckle and the erupting windows send a blizzard of glass tinkling into the Silverado's grille. It all occurs in roughly the time it takes an eyelid to swoop down over your cornea and flick back again. And this is the problem, ultimately. Because it's not the crash that kills you. It's how quickly it happens. If you could take the impact and spread it over 5 seconds, the likelihood of injury would decrease dramatically. That's why crash cushions guard exit ramps. A cement divider would stop your car just as well, but much less gradually. Violence, in other words, is a function of time. The principle is reflected in automotive safety design, says Stitzel. "A lot of people think a seatbelt is designed only to hold you in the same place in your vehicle, but in fact it does more than that. It's designed to let you have a longer duration of deceleration than the vehicle has. So while the vehicle might stop in 50 to 100 milliseconds, you might get 150 to 200 milliseconds to ride down that impact." These are small numbers, but they can make a huge difference, Stitzel says. It begins with the bumper, then the crumple zones, the C-pillar, the seatbelt pretensioner. Everything is designed to contribute another few milliseconds to the crash duration experienced by the occupant. When pooled together, these scraps of time are often enough to keep the force of the crash below injury-threshold levels. T-Plus 00:00:00.10 || 7:22:09.10 pm EST It's as if LaBar's car has been dropped from a height of 54 feet. The crush easily exceeds 20 inches. There are three big impacts in any crash, says Stitzel. "The vehicle hits the other vehicle; the occupant loads the restraint system; and then the occupant's internal organs load the inner chest wall or the inside of the skull." It's this third impact that we tend to forget about. The human body, says Stitzel, did not evolve to cope with impacts of this order. If it did, our chest cavity—instead of a big open space packed with soft tissue—would be braced with internal restraints. Lacking such restraints, there's nothing to prevent your aorta, for instance, from rupturing when you stop too quickly. At that point—even if you're otherwise free of visible injury--you're dead. Your skull, by the same token, is basically a big yogurt container. The brain's only other crash restraints are the delicate internal structures that allow it to function. T-Plus 00:00:00.15 || 7:22:09.30 PM ESTThe crash pulse reaches LaBar. That's when LaBar's brain and all the thoughts in it try to part ways from the surrounding cranium, the one continuing southbound on I-81, the other rocketing forward with the impact from the truck. The disagreement lasts a fraction of a second, as long as it takes for his brain to squish the cerebrospinal fluid out of the way and pound against the cranial wall. Some parts of the brain are denser than others, and now this fact assumes fatal importance, because when a collision of greater than 15 mph occurs, the denser parts start shearing away from the less-dense parts, producing cataclysmic tears across the neural net. It's called diffuse axonal injury (DAI), a reference to the nerve fibers that conduct electrical impulses between neurons. "It's probably the worst brain injury you can have," says Shayn Martin, M.D., the trauma surgeon on Stitzel's crash team. "Bleeds are fixable. If you can move a patient into the operating room fast enough, you can open up the cranium, drain the blood, and potentially save some brain tissue." But among trillions of neurons, DAI is so spread out it often can't even be seen on a CT scan. "The real way we diagnose it," Dr. Martin says, "is that folks just don't wake up." T-Plus 00:00:15 || 7:22:24 pm ESTIn the basement of the courthouse in downtown Chambersburg, the calls pour in to the Franklin County 911 Center: a severe crash on I-81 with possible entrapment. The computer-assisted dispatch unit gives a chirp as the call taker logs the incident and the location flashes on the other dispatch screens. Seconds later the fire dispatcher is punching the audibles for Company 100, Company 8, and Station 4, trailed by the warble that signifies an MVA, a motor-vehicle accident. Bob Shearer is en route to the West Shore station when he receives the call in Medic 100, a Ford Explorer Advanced Life Support unit. Mile marker 13 is about 5 miles away. After 25 years of doing this, Shearer knows what to expect. The dispatch itself can tell you a lot. For instance, they wouldn't have sent those extra ambulance units if the crash wasn't serious. Now traffic mooches out of his way as he aims south on 81 beneath a crown of flashing lights. The first sign of trouble is a white truck stalled in a cornfield, but it looks intact and the driver is already walking around. Then he sees the red sedan and the yaw marks leading across the median, like death's own driveway. T-Plus 00:06:15 || 7:28:26 pm EST By the time Shearer reaches the scene, the victim's neck has already been stabilized by a Good Samaritan. The victim is a white male, mid-30s, out cold. Shuddering snores emerge from his mouth, and he could almost be in a deep, comfortable slumber, were it not for the crumpled mayhem around him and that gash on his forehead. Another even larger gash oozes blood over his right ear—likely the dagger work of a shattered rearview mirror. In a crash, everything in the car becomes a potential weapon. A collapsible steering wheel can crush the ribs of an unrestrained driver. A and B pillars perform like baseball bats in the hands of a Mafia hit man. Seatbelts crack clavicles, bruise spleens, burst bladders. Even the gentlest of restraints—the airbag—can shatter limbs and leave alkali burns on eyes. As a paramedic, you learn to look for certain kinds of injuries. Shearing breaks in the forearms, for instance. Drivers instinctively brace for a crash, but bone can handle only so much pressure before cracking at the weakest point, and then you're in horror country, with fragments spearing upward through the skin. Drunks have this much going for them: Too bombed to brace, they suffer fewer breaks. Not LaBar. Raindrops dampen Shearer's back as he leans into the passenger compartment to inspect the disfiguring lump below the victim's left elbow. T-Plus 00:08:32 || 7:30:41 pm ESTFrom here it all goes by the book. Two minutes after Medic 100 arrives, the Franklin Fire squad truck pulls up and secures the scene, checking the car for gasoline leaks and snipping the battery lines so the remaining airbags don't trip. Meanwhile, Shearer attaches a heart monitor and runs a line into LaBar's right hand before the veins can retract into the muscle—one of the body's responses to trauma. Then he straps an oxygen mask onto LaBar—with a head injury the patient needs all he can get. Engine 8-2 from Marion Volunteer Fire Company handles the extrication. The response has been flawless, and yet as they shift LaBar onto the backboard and bear him to the ambulance, everyone notices the arms twitching creepily inward like broken bird wings. It's called decorticate posturing, and it usually indicates brain damage. T-Plus 00:27:51 || 7:55:00 pm ESTAt the quiet end of Melrose Avenue, Lisa LaBar sits on her front porch, waiting for her husband. Kyle mentioned the disconnected call, but calls are dropped all the time. Her phone rings. Raising it to her ear, she expects Adam's voice. What she hears instead is the other manager from Adam's dealership. She can't understand what he's saying at first. Then she recoils as the meaning of his words assaults her like a shrieked obscenity. T-Plus 00:40:30 || 8:02:39 pm ESTOn 81 North, the lights of the emergency vehicles burn colored holes in the gathering dusk. LaBar is trache'd, and loaded aboard Stat MedEvac 12, a rescue chopper bound for York Hospital. The fire teams pack up and prepare to pull out. In both directions, mute lines of gray traffic reach back for miles. By the time most of them arrive at mile marker 13, the cause of the delay will have vanished. LaBar spends the ensuing 5 days in Bay 8 of the York Hospital trauma center. He is pumped with drugs, and a pressure probe is sunk into his skull. The swelling shifts his brain more than a quarter of an inch to the right. As the pressure rises, his brain jams downward through the only exit, corking bloodflow. No more oxygen. At 8:35 a.m. on Sunday morning, the coroner signs the death certificate. None of this had to happen. And the same can be said of nearly every accident. That's why federal transportation agencies are careful about how they use the word. "Accident" implies complicity with fate. A metaphysical shrugging of the shoulders: "So it goes." We say this after the fact to reconcile ourselves to tragedy, but calling crashes what they are reminds us that they can be anticipated—and therefore prevented. We pass by the crumpled vehicle of Adam LaBar, and thousands of accidents like his. It cannot happen to us. Until it does. You hope that your seatbelt will save you, or that proper road design and signage will point the other 2-ton hunks of flying metal in the right directions. Even so, disaster is never more than a twist of the wheel away. In the end, the only thing that can stop it is you. The driver. When a crash seems inevitable You Veer Off the Road The instinctSwerve back onto the roadThe right responseLift off the accelerator "Gently straighten up your car and scan ahead for obstacles," says Paul Gerrard, the director of global training at the Audi Driving Experience in Sonoma, California. "If you swerve back right away, you will likely overcorrect, careen across the road, and lose control." Maintain your composure and look for a smooth transition where you can reenter the road. If you're straddling a high curb, slow to 25 mph before attempting to drive over it. Your Tire Blows The instinctStomp on the brakesThe right responseDon't brake Instead, take your foot off the gas, hold the wheel firmly, and gently countersteer to overcome any pulling or fishtailing the blowout has caused, says Debbie Prudhomme, the cofounder of Training Wheels driving school, in Minnesota. Let the weight of the car slow it down, and when you feel in control, lightly apply the brakes, signal, and pull off onto the shoulder. You See a Deer Ahead The instinctSwerveThe right responseHit it Animal impacts account for only 0.6 percent of fatal crashes, but if you swerve, you could end up in a head-on collision with a car or tree, says Jeff Payne, the founder of Driver's Edge, a nonprofit performance-driving school. And don't slam on the brakes, either: You'll cause the front of your car to dip, making it more likely that the deer will slide up the hood and crash through the windshield. Instead, aim for the deer's butt. Deer don't generally go in reverse, says Payne, and if you're lucky it will jump out of the way. You're About to Rear-End the Car in Front of You The instinctBrake hardThe right responseBrake even harder "Push the brake to the floor," says Gerrard. "This sounds obvious, but statistics show that people who think they're braking hard are using only about half the car's braking power." Note: If you've never jammed on your brakes, Gerrard recommends practicing in an empty parking lot so you're familiar with the amount of pedal pressure needed. You Hit Black Ice The instinctTurn away from the slide, and hit the brakesThe right responseWait a split second "You have to decide quickly: Will I regain traction before I lose control and/or hit something?" says Payne. "If you think you will, then keep your foot off both the gas and brake until your tires grab again." At the same time, point your car in the direction you want it to go. Sliding out of control? Slam on the brakes, says Payne. Your car will slide in one direction, which will at least make it easier for other drivers to avoid hitting you. —mike zimmerman 6 instant safety upgrades that could save your life Before you put your car in gear, run through this checklist 1. Headrest Sit in the driver's seat, flip down the visor, and look in the vanity mirror: Is the top of the headrest at the same height as your ears? If it isn't, adjust it. "Properly positioned head restraints can help save your neck in a crash," says Anne McCartt, Ph.D., the senior vice president of research for the Insurance Institute for Highway Safety. Next, adjust the angle of your seat back so there's no more than 4 inches between your head and the headrest. 2. Steering wheel Don't let your steering wheel become a weapon. "If you sit too close, you may smash into it before the seatbelt can restrain you and the airbag fully deploys," says Stefan Duma, Ph.D., the director of the Center of Injury Biomechanics at Virginia Tech University. Adjust the seat and/or the steering column so that your chest is as far from the wheel as is reasonably comfortable. "But make sure you don't go so far back that you have to extend your arms fully to reach the wheel." 3. Headlights Credit the safety-conscious researchers in Sweden -- where varselljus, or notice lights, have been standard since 1977 -- for this simple strategy: Flip your headlights on even during the day. "Studies of daytime running lights show they can reduce opposite direction two-vehicle crashes by 5 percent and accidents with pedestrians and bicyclists by 12 percent," says McCartt. If you're concerned about burning through bulbs faster, swap in the extended-life type next time you replace them. 4. Climate control Set your cabin temperature to whatever's comfortable, and then if you feel drowsy, drop it 15 degrees. Swedish researchers discovered that when drivers continually lower and then raise the temperature at random intervals lasting 5 to 8 minutes, their alertness increases. The scientists say the cooler temperatures may disrupt the alpha brain waves associated with drowsiness. 5. Tires Worn tires increase your stopping distance by as much as 32 percent. So grab a quarter, and with George Washington's head facing you and upside down, place it in any tire groove. If the top of GW's head is visible, you need new rubber soon, says Ronn Langford, the president of MasterDrive, a driving-safety school. The classic penny measurement indicates only the absolute minimum. Also, check tire pressure monthly -- underinflation causes blowouts, and those automatic monitors may kick in only when the pressure is down 25 percent. 6. Cellphone In a recent review, Canadian researchers concluded that driving while talking on a headset is just as distracting as holding the phone to your ear. Yes, it's tough to imagine hanging up when you head out, but your life literally depends on it. Use one of the call-blocking features offered by ZoomSafer (zoomsafer.com), which alert callers that you're on the road and also can inform them of your whereabouts. A Part of Hearst Digital Media Men's Health participates in various affiliate marketing programs, which means we may get paid commissions on editorially chosen products purchased through our links to retailer sites.
Differential susceptibility of triatomines of the genus Rhodnius to Trypanosoma rangeli strains from different geographical origins. The susceptibility of four Rhodnius species to different Trypanosoma rangeli strains was evaluated using both intracoelomic inoculation and oral infection. Rhodnius prolixus, Rhodnius domesticus, Rhodnius neglectus and Rhodnius nasutus were infected with Trypanosoma rangeli Macias (Venezuela), Choachi (Colombia) and SC-58 (Brazil) strains, revealing distinct haemolymph and salivary glands infection rates. The obtained infection rates were revealed to be dependent on the method of infection and the triatomine species. Our results suggest the existence of a high adaptation between the strain and the local vector.
Jerusalem, the Knesset Residence Irina Zilberbod 26/02/2006 During January, April and September 2002, and April–May 2003, salvage excavations were conducted in the vicinity of the Knesset residence (Permit Nos. A-3573, A-3888; map ref. NIG 21955–65/63145–55; OIG 16955–65/13145–55). The excavations, on behalf of the Antiquities Authority and financed by the Shafir Company, were directed by I. Zilberbod, with the assistance of A. Hajian and T. Kornfeld (surveying) and T. Sagiv and C. Amit (photography). Two hewn burial caves were discovered on the eastern slope of the Knesset hill. The first burial cave was void of datable finds; however, its plan indicates it can be ascribed to the later part of the SecondTemple period. Some 55 m southwest, a hewn water cistern was uncovered and another cistern was detected c. 10 m northwest of the first one. Artifacts dating from the Late Roman to the Early Islamic periods were found in proximity to the cisterns. The second burial cave was equipped with loculi (visible from the entrance as it was not excavated) and had a rectangular forecourt (L301; quarried to a depth of c. 2 m; Fig. 1). Along its eastern side, facing the slope, were two broad hewn steps (L303, L304) with a built staircase (L302) in their middle, which led to the courtyard. A stone threshold, not in situ, was found in the center of the courtyard; its width was identical to that of the built steps. Three hewn entrances (L306–L308) were cut in the western wall of the courtyard, opposite the steps. The three entrances led into one cave or perhaps into three separate burial caves. The back side of a stone sarcophagus was discovered while the northernmost entrance was cleaned. A single loculus (L309) was hewn in the middle of the southern side. The ceramic finds recovered from the cave dated it to the end of the second–third centuries CE.
The purpose of this protocol is to examine the toxicity and immunomodulatory activity of the combination of granulocyte-macrophage colony-stimulating factor (GM-CSF) and tumor necrosis factor (TNF) in patients with advanced cancer. The combination of GM-CSF and TNF stimulate the maturation of dendritic cells from CD34+ bone marrow progenitor cells. TNF has a two-fold function in the maturation of dendritic cells, it up-regulates the expression of the GM-CSF receptor on bone marrow progenitors and prevents their maturation into granulocytes. Dendritic cells are the most potent antigen presenting cells of the immune system. They function as initiators in organ transplant rejection, major histocompatibility restricted T cell responses and in the formation of antibodies dependent on T cells. Dendritic cells are found in small numbers in many tissues and in the peripheral blood. This study will examine the activity of TNF and GM-CSF to stimulate the maturation and function of dendritic cells. Bone marrow will be examined for the presence of dendritic colony forming units before therapy and following each course of therapy. The number of dendritic cells in peripheral blood mononuclear preparations will be examined before and during therapy. Finally, the number of S100+ and CD1A+ cells in skin biopsy specimens will be quantitated. Langerhans cells, a type of dendritic cell, is positive for these markers. The major goal of this protocol is to determine whether the combination of GM-CSF and TNF cause maturation of dendritic cells and increases their number in the blood bone marrow and skin and to determine whether this increase produces tumor regressions.
Redskins draft countdown Da’Ron Payne Defensive tackle Alabama Stuff the run in the middle of the line? Check. Get outside to stop stretch plays? Check. Get after the passer? Check. Yes, Alabama defensive tackle Da’Ron Payne checks all the boxes the Redskins are looking for on the D-line. He can be the immovable object, taking on double and triple teams, and he also can chase down the quarterback. At 311 pounds he could be the Redskins’ nose tackle in base and move outside in nickel. Height: 6-2 Weight: 311 40-yard dash: 4.95 Projected draft round: 1 What they’re saying Payne possesses one of the most impressive combinations of strength and athleticism that we've seen from an interior lineman. He will be the premier run-stuffer in this draft, but he may have enough in the pass rushing toolbox to project as a better pro than college pass rusher. Payne is a game-ready starter who immediately upgrades a defense's ability to slow the run. —Lance Zierlein, NFL.com How he fits the Redskins: This just in—the Redskins need a nose tackle. Of course, if you’re reading this you know that, and you’ve known it has been the case ever since the Redskins went to the 3-4 defense in 2010. In very closely related news, they need to play better against the run, too. You probably noticed that they were dead last in the league in rushing defense last year. And that the NFC East has two very strong rushing teams in the Eagles and Cowboys and a Giants team that could well take Saquon Barkley with the second pick in the draft. If they don’t fix their rushing defense they could literally get run over. Payne could help them a lot. He can take on double and triple teams and clog up running lanes in the middle. If they try to go around him, he has the quickness to penetrate and disrupt outside runs. And a defensive lineman taken in the top half of the first round should be able to provide some pass rush pressure. As noted by Zierlein, Payne has the potential to do that. He’ll never be a double-digit sack guy, but if he can kick in four to six per year and get some pressure up the middle, that would be fine. Film review: vs. Tennessee, vs Georgia (national title game) Like most players, Payne can’t get much in the way of a pass rush when he is double and triple teamed. But when they tried to block him one on one he consistently got pressure. Payne didn’t get many sacks, but he did make a difference. Against Georgia, one pressure resulted in an interception and another forced a third-down incompletion. Payne is very difficult to move off the spot in the running game, even when the offense tries to do it with two or even three players. Running backs did not get by him on a regular basis. In the second half in particular, Georgia tried to move the ball with Nick Chubb and Sony Michel, both of whom are likely to get selected in the top 100 in the draft next month. But they kept running into a mass of humanity in the middle of the line with Payne in the middle of it. He played well during the Tennessee game during the regular season, but he didn’t have a lot of impact. The only time his name was called was when he was hit with a roughing the passer call. Potential issues: At 311 pounds, Payne may not be the ideal size to fill the chronic hole at nose tackle. It should be noted, however, that defensive line coach Jim Tomsula has said that the Redskins aren’t necessarily looking for the 350-pound nose tackle and that a relatively smaller player can get the job done. Ziggy Hood played the nose at 305 pounds last year. The Redskins finished last against the run, although that’s not necessarily cause and effect. Bottom line: The Redskins went 20 years without taking an interior defensive lineman in the first round before taking Jonathan Allen last year. Nobody could legitimately complain if they doubled up on first-round D-linemen after so many years of neglect. Payne should be there when the 13th pick goes on the clock. Unless the Redskins address the nose tackle spot in free agency Payne will be under strong consideration. The defensive line improved last year with the additions of Allen in the draft, Stacy McGee as a free agent and the second-year emergence of Matt Ioannidis. Payne could be the final piece of what could be a dominant defensive line. Stay up to date on the Redskins. Rich Tandler covers the team 365 days a year. Like his Facebook page Facebook.com/TandlerNBCS and follow him on Twitter @TandlerNBCS.
[Results and complications following the placement of the transobturator tension free tape for the treatment of stress urinary incontinence]. Evaluate the complications and short term sucess rate of the transobturator tape for the treatment of stress urinary incontinence. It is a retrospective study of the transobturator tapes perform in 2005 and 2006. All the procedures were done with epidural anesthesia. The success rate, the immediate, short-term and long term complications were recorded at the first, second and third year. 28 women were included in the study, 54% of them with stress urinary incontinence. 25% were solely transobturator procedures. mong the complications were 2 vesical puntures, 1 periurethral fascia trauma and 5 urinary retention during the first 24 hours. In the 1 and 2 year follow-up were 2 cases of overactive detrusor. Objective sucess was 90% and subjective sucess was 92%. Transobturator tape is a highly successful and a low morbility procedure.
Scary Robot Is Subway Halloween Hero He wouldn’t take the tinfoil-clad bucket off his head, so we don’t know who this hero is who got off the F train last night at Bergen Street. But we caught a glimpse of him as he got fairly mangled in the subway turnstile exit, and so if you see a bald-ish English-ish man with a ton of brutal costume-related cuts on his hands today, buy him lunch, for he is a hero of Halloween. I’m not sure I can even explain why this was the funniest thing I’ve ever seen. It didn’t help that the woman with him kept saying “YOU’RE SUCH A SCARY ROBOT” and he would just say “GRRRRRR.”
Clojure 2011 Year in Review - llambda http://stuartsierra.com/2012/01/03/clojure-2011-year-in-review ====== ibdknox How could you forget Noir and Korma? ;) <http://www.webnoir.org> <http://www.sqlkorma.com> ~~~ reddit_clone I would like to add seesaw ( <https://github.com/daveray/seesaw> ) to the list. It is a nice lispy wrapper over Swing for writing GUI apps (in a fairly declarative style). ------ kamaal I am interested in learning clojure. Unfortunately the learning material online is very scanty. Also the material is very dry. If you have never programmed in a Lisp language before it all looks greek and latin. This tends to be a problem with most Lisp books. They very soon go into the great aspects of Lisp. As a beginner, I need to be shown how to do the regular stuff in Lisp. Like other languages tutorials. One of the reason I like Python is really for the awesome documentation on their website. Now the thing about clojure, is due to sheer interest and passion alone. I am being forced to take additional pain to continuously search and learn. Others may not do the same. If the barrier to entry is too high, you will scare away new comers. Especially Lisp new comers. All Advanced Hackery is OK, but teach me the basic stuff first. I need to learn the if/else, for/do/while , functions, IO, regular expressions, Battery usage, socket etc kind of stuff. After I'm through with this, you can rant as much about macros as you want, and I'm all ears. But directly going to all this advanced hackery without me even knowing how to do my day-to-day tasks is what has kept Lisp in the lower side of usage. It will be sad if clojure goes down this route. ~~~ minikomi I found making my own notes, and playing around doing things I've done before in other more familiar languages, while reading this: <http://java.ociweb.com/mark/clojure/article.html> ..to been a nice soft introduction. Now I'm intending to go through The Joy Of book, but with more familiarity than last time I tackled it (and fell flat on my face!). Yes, it's dry, but it's also very straightforward. Using the repl in another window while looking it over was key though. It really does become much more clear what's going on when you manually type everything out, and then poke bits of it with a stick until it clicks. ~~~ kamaal _The Joy Of book, but with more familiarity than last time I tackled it (and fell flat on my face!)_ I am facing the same problem. I tend to run into that problem, because the moment I see some non regular programming aspect being discussed at length it becomes a little boring. Also I can't co relate that with my practical experiences. I enjoyed functional programming thanks to Mark Jason Dominus's "Higher Order Perl". Which taught me all functional programming stuff in the most pragmatic way out. Now that is what I look for, material that teaches me all this great stuff in the framework of my real work. Then it becomes really enjoyable and graspable. ~~~ minikomi Just glancing through, these look like great problems to tackle while learning any new language, and I might have a go at just that - translating them to clojure, and looking at docs as I go. If you're interested in doing something similar, my mail is my name at gmail. (You probably know the material a lot better than I though!) ------ hkarthik Clojure is on my list of languages to learn in 2012. I really dig the community and the fact that it runs on the JVM. I've been looking for a strong functional language to use for backends as an alternative to using Node, and Clojure seems to be the right fit for that. ------ nickik Nice Clojure Year. One of my goals with clojure is to do more acctual programming in clojure and less reading and testing out stuff.
Time Magazine presents 9 current inventors and their inventions. These little known inventors have created items that are familiar to many of us today - items include the sticky note (Post-It), a pizza box with perforated sections for plates, and a huggable pacifier. This slideshow is easy to use. Just click on the next button after each slide to find the next inventor. In the Classroom After presenting the slideshow on your interactive whiteboard or projector, ask students to create their own list of modern inventions that are in general use. Students can then research their inventors and how the invention came about. Have a "Create an Invention" Day where students design and build their own invention that would make their lives easier. Have students share their inventions and how they work on video. Share the videos using a site such as SchoolTube (reviewed here). Another possibility is to include this slideshow in your study of the Industrial Revolution. Share TeachersFirst's interactive introduction to Inventors of the Industrial Revolution, and ask students to compare the circumstances around successful inventions today vs then. TeachersFirst doesn't normally review lists of "links," but this hotlist from Fact Monster was good enough to pass our review team. The links here provide all kinds of ideas for classroom activities for Flag Day, including quizzes, puzzles, and a flag timeline. There's also additional information about the national anthem and Betsy Ross. In the Classroom Use the U.S. flag quiz on this site as a learning center or station during a Flag Day celebration or national symbol unit. Have students complete the quiz in cooperative learning groups, allowing them to assist each other when there is confusion. This site from the Smithsonian provides ample information about the American Flag, as well as early American history. The Explore option on the site allows you to investigate and discover important facts about the flag and its creation. There is also a section about the National Anthem, as well as an interactive quiz about the early days of American government. A great site for Flag Day or early U.S. history! In the Classroom Use the interactive quiz on this site as a review tool before an assessment or to introduce a mini-unit on the flag. Introduce the site on the interactive whiteboard before allowing students to complete the quiz individually on classroom computers. Because of the amount of reading on the site, be sure to provide lower achieving readers with the vocabulary beforehand or a tool to help them look up complex words. Younger students would do better with partner readers or whole-class reading on an interactive whiteboard where they could highlight new words. Although this site may look pretty simple, it has some great information on the history and evolution of the American Flag. The site hosts images of all the flags, including the famous "Don't tread on me," flag from the revolutionary period. Besides images, each flag hosted on the site has a brief history accompanying it. In the Classroom Use this site as a resource during Flag Day celebrations or a unit on national symbols. Use the site as an activity to help students better understand the significance of Flag Day, as well as the American Flag. Introduce the site on the interactive whiteboard or projector before allowing cooperative learning groups loose on the site. Have students investigate the "story" of the flag, presenting the information in a multimedia presentation. Have cooperative learning groups or the whole class (younger students) create online books using a tool such as Bookemon, reviewed here. In the Classroom Use this site as a review activity on Flag Day or during a national symbols unit, with cooperative learning groups competing to finish the web for time and correct answers. Introduce the site on the interactive whiteboard or projector, before allowing groups to complete it on classroom computers. Not only is this a fun activity for students, but it's great review both in their search for answers and in the review of answers afterwards. Once all groups are done, as a class demonstrate the correct answers on a projector or the interactive whiteboard. This site, containing tons of timelines, is great for a number of different content areas. There are many video clips included. Search for the timeline of your choice, browse topics or people, or play timeline trivia. Topics range from Mark Twain to Women's Suffrage to The Beatles to Lord of the Rings (and countless others). There is a lot of information written in a clear, understandable manner. Plus, the pictures help tell the story of the timeline. You can also contribute by creating events, voting, commenting, and adding descriptions, photos, and videos to this site. If your district blocks YouTube, the videos may not be viewable. You could always view them at home and bring them to class "on a stick" to share. Use a tool such as Freemake Video Converter, reviewed here, to download the videos from YouTube.This site includes advertising. In the Classroom To add events to the site, locate the "add event" found at the bottom of the Timelines.com homepage. Follow the very clear (with samples) directions to insert your own event. Viewing the timelines is simple. Click to watch videos, view the maps, click "Like" or "Dislike" or make comments by clicking on the words. Monitor what students are viewing in the premade timelines. Also, teach students appropriate events to include and check their work before having them submit work so that they are more accurate. Use the timelines on the site in science class to help students understand the history behind discoveries that they take for granted, such as the the space race. Today's students have never lived in a world where traveling to the moon was not possible, and understanding the history of the event could be very helpful in understanding the magnitude of such an event. This site would also be useful in art or music class. Have students investigate the history of their favorite group or type of music and create a multimedia presentation to share with the class. How about a video (including music, of course). Use a tool such as Moovly, reviewed here, and then share the videos on a site such as SchoolTube, reviewed here. Create your own piece of art using style and technique similar to Jackson Pollack. Click on the arrow to be taken to your blank canvas. Just click your mouse and watch the painting begin. Using your mouse, drag and click to disperse paint. Left click to change the color of the paint. In the Classroom Use this site as an anticipatory set on Jackson Pollack. Students can create a "painting" and share it with a partner or the class using a projector. Since the site paints via "mouse-overs," it can also work on interactive whiteboards that use a special "pen," but not on touch-sensitive ones, since these boards have no idea where your "mouse" is hovering. Research Jackson Pollack paintings and biographical information. Then go back to the site and have students again create a "painting" following Jackson Pollack's style. Have students explain why their painting follows Pollack's style. Create a class wiki to share paintings and explanations. Possibly compare these with images in other artist's styles. Want to learn more about wikis? Check out the TeachersFirst's Wiki Walk-Through. This website is an up-to-date catalog of television shows, clips, cartoons and anything else that could be viewed on major television. No membership is needed to use this website. If you see something on television that you would like to use in your classroom, all you need to do is find it on here and you can show it in class via your television or interactive whiteboard. There are commercial television shows and some movies available on the site. Search by channel, recently added, TV or Movie, Trailers, or many other search options. Note: many schools may block this site to prevent student access to entertainment. Use it from home to find specific curriculum-related programs and request that those URLs be unblocked for class viewing. In the Classroom Use this to watch episodes of Glee in sociology class, and have student compare and contrast the television show with their real life high school experiences. Use science movies to reinforce concepts in class, or embed the codes given into your class website or wiki and assign television as homework! Have cooperative learning groups investigate a certain news story or current event and create multimedia presentations. Challenge students to create a video and share using a site such as SchoolTube (reviewed here). This informative site gives an entertaining education about life in George Washington's 18th Century world. Click to learn about Washington's Treasures, Harpsichord Hero, Bombarding Yorktown, Jigsaw Puzzles, or the Archeology Memory Game. This site offers several educational games. An additional benefit of the site is that it is visually appealing and students can learn about the life of that time period by just looking at the images. The animation is fairly realistic. Some parts are read to the students; other parts they will have to read themselves. Certain parts of this site require Unity web player. You may be asked to download the player (it's free), in order to try the 3D interactives. In the Classroom This site could be used in several ways. Individual students can visit the site when finished with class work or use it as part of a learning center about Washington's life. (You will need a dedicated computer or two.) Cooperative learning groups could explore specific topics within this website and create multimedia presentations to share with the class. Challenge the students to find images for the information, put captions and animation with them using a site such as Animoto, reviewed here. Teachers who use this site with fifth graders, be aware that some of the parts that are not read to the students are written at the 8th grade level. You may want to lead the students up to the point where the game starts. Once the students get to the games, they will have no trouble. A good project to accompany "Washington's World" is to have students research another President's world in another time period i.e. Lincoln. Teachers and students together can decide on the type of information found in Washington's world and research it for Lincoln's world. Each group of students could be in charge of different types of information. Have students create a project to compare life during both presidents time periods. How about an interactive Venn diagram using a site such as Interactive Two Circle Venn Diagram (reviewed here). This site takes any quotation or poem and creates a "word cloud" (graphical display) of the words in a passage of text. Paste in any passage or the URL for any blog entry or web page (including newspapers online) to create a word cloud of the text. This resource is currently free while in beta and intends to keep it free for NON PROFIT only. Enhance basic word clouds by using this site to create clouds in various shapes, use mouse rollover options, use font effects, and more. Elevate your word clouds into an art form. Once registered, change your password by clicking on the profile tab and entering your changes. Before creating a word cloud, agree to their terms that includes only using appropriate content. Copy and paste series of words or use the url of a page where the words can be found. Choose a shape such as a heart, cloud, or geometric patterns. Choose a font as well as other options, and then click "Build the Cloud." Preview your cloud before saving. In the Classroom Users must be able to copy and paste text or provide a url to a page of text as well as determine parameters of more advanced word clouds. Alternately, these word clouds can be kept very simple. After creating the word cloud, be sure to save the image (or use a screen capture) to share with others. Another idea, use the url of the cloud or embed into a place to share such as blog, wiki, or site. This is a terrific visual tool to share on an interactive whiteboard or projector. Help students develop creative fluency by creating their own taguls of words and ideas from scratch. Paste in a passage or URL for a political speech to visualize the politician's "message." Analyze advertising propaganda by visualizing the language used in TV or print ads. Create taguls of historical texts of inauguration speeches as time capsules of the issues of the day. Use this site as a way to help students see and memorize text, especially visual learners. Use it also when writing poetry or reading passages of great literature to "see" themes and motifs of repeated words and images. Have students paste in their own writing to spot repeated (and monotonous) language when teaching lessons on word choice. Students will be surprised to see what words appear to be dominant. ESL and ELL students will eagerly use this site since word order will no longer be a problem for them. Have students work in groups to create word posters of vocabulary words with related meanings, such as different ways to say "walk" or "said" and decorate your classroom with these visual reminders of the richness of language. Collect thoughts about the class subject at the beginning of the year and then again at the end of the year to determine changes in thoughts about the subject matter. There are plenty of helpful sites to learn content. What makes this so special? Created by an uncle wanting to help his nieces learn material, Khan Academy has grown into a Creative Commons attributed site for helping all students. What information is available? Maybe one should ask: What are you looking for? View a vast array of videos on many topics: SAT prep, Algebra, Geometry, Chemistry, Biology, History, Trigonometry, Calculus, Economics, Brain Teasers, Banking and Money, Statistics, Finance, Physics, and more....Whew! The only problem? The videos are hosted on You Tube. If your district blocks You Tube, then they may not be viewable. You could always view that at home and bring them to class "on a stick" to share. Use a tool such as KeepVid reviewed here to download the videos from YouTube. Ed note: Another alternative to downloading at home is to access Khan Academy through iTunes U FREE downloads, assuming you can load and access iTunes! In the Classroom Share the site with your students in order to access at home for homework help. List this link on your class website. If you are unable to view this site on student computers but You Tube is unblocked for teachers, consider using a projector or interactive whiteboard to show to the whole class. Use your google account to log in once you click on the exercises link. From there, find access to exercises that students can complete that are related to each video. Encourage students to share links to specific videos they find helpful on a "Video Reviews" (yes, that is a pun) page of your class wiki. For a very real challenge, have students create their own simple review videos in the Khan Academy style and upload to SchoolTube, TeacherTube, or YouTube, whichever works best in your school. Embed them on your class wiki for a year-to-year student-made study guide! This collection of reviewed resources from TeachersFirst is selected to help students learn their most effective study strategies. The collection includes specific study tools, reading strategies, review ideas, and notetaking methods that students and teachers can try as lessons in themselves or --even better-- as they go about the regular curriculum. Whether you want to use a graphic organizer, create your own electronic flash cards, or simply learn how to approach a test, there is a resource to help. Learning Support teachers and teachers of gifted will also want to share these alternate ways for students to organize and retain concepts, vocabulary, and more. In the Classroom Make learning how to learn part of your class routine at any grade level and in any subject. Feature one or more new study strategy each month and share this entire list as a link from your class web page for students and parents to access both in and out of school. StoryCorps is a nonprofit site where Americans of all backgrounds and beliefs can record, share, and preserve the stories of their lives. It is one of the largest oral history projects of its kind. At the site you can download a "Do it Yourself Guide", find resources for teachers, and a list of great questions. You can subscribe to their podcast, e-newsletter, and blog, or you can upload your own story or that of a loved one or friend for free. Each conversation is recorded on a free CD to share, and is preserved at the American Folklife Center at the Library of Congress. In the Classroom Grandparent's day is in September. What better gift to a grandparent than to be able to spend time with their grandchild and tell them a story about an important time in their lives? Of course, you'll want to prepare students with some interviewing skills and questions before they interview their grandparents, and show them how to record the interview with some type of recorder (tape recorder, cell phone, video camera, etc). This recording can then be submitted to StoryCorps and it will then reside at the American Folklife Center at the Library of Congress. Students can also interview parents about their first memories of school, and what they remember about the grade that the student is currently in. Share these interviews during the first week or month of the school year. Not only can these interviews be submitted to StoryCorp, but students could then do a write up of their interviews and publish them in a classroom book of memories. Have students create online books to share with the class about their interview. Use a tool such as Bookemon, reviewed here. Or have students narrate a photo of the person they interviewed using a site such as ThingLink, reviewed here. Playing History is a directory of free historical games, interactives, and simulations. There is a growing body of research about the value of educational games and this site is a database for high quality games and simulations. You will find not only games for history, but for different cultural knowledge, too. This collaborative site currently has 132 humanities learning games and is growing monthly. You can suggest your own favorite humanities based games and simulations to be included in this collection. This site does not host these games. It is a sharing point for teachers/enthusiasts of history to recommend games and find them. At this site the quality of the games varies from deep thinking to factual to cute. Learn everything from the history of dating to the geography of China to "Do I Have a Right?" exploring the Bill of Rights. In the Classroom There is a wide variety of topics for the study of cultures and history here, so be sure to look through this site as you plan your new unit or lesson! There are many, many uses for this site in the class room: Share a game from this site on your interactive whiteboard or projector for a whole class review, choose a game from this website to use as a center, a review, or to provide a student reward on individual computers. Some of the games can be downloaded into a pdf and printed out and used as a traditional card, or board group game. Since this is a collaborative website, you and your students can "rate" the games to give feedback for other users. Comments Oh MY GOSH! Who knew? This is a wealth of information available through game-playing. By searching the term "social justice," I arrived at numerous options for delving into the various aspects of a complex problem. I cannot wait to share this resource.Patricia, NJ, Grades: 6 - 12 This site provides a comprehensive look at the Star Spangled Banner. The site lets you interact with the Star Spangled Banner by clicking on various "hot spots". You can play a game called Collect the Stars that requires you to collect 14 stars by answering quiz questions. You can sing your own version of the national anthem and contribute your own photos to the flag mosaic. There is also a link to educational resources (click resources). You can also click on the link at the bottom of the page "How to Use This Resource In Your Classroom." In the Classroom Introduce this site on your interactive whiteboard or projector. Use the Explore the Flag section on the site as a whole group activity. Have students explore the site independently or in small groups. If used independently put the site on a classroom computer and use as a center. To use in small groups, set up a game show format. Using the Star Quiz game, break students into groups and ask the questions. Whichever team collects the most stars wins. In addition, take individual or group photos and submit them to be part of the flag mosaic. Additional ideas can be found in the provided educator resources. This site, based on the Liberty's Kids television program, provides numerous resources for students and teachers regarding Colonial America. Students can use the News Maker to create a Colonial Newspaper, watch video clips of "Now and Then," or try various interactives. Liberty's Kids provides several background articles and lesson ideas for teacher use. Click on the link for Parents & Teachers to find goals, ideas about how to use the site, learn more about the characters, understand the interactives, and more. In the Classroom Because of its size, thoroughly introduce this site on your interactive whiteboard or projector. Then have students explore this site independently or in small groups. Have students use the News Maker to create a brief written piece about a Colonial topic. Check out all of the lesson ideas. This site has some very clever ideas for using videoconferencing to help students delve deeper into quality texts, or extend their knowledge of a topic of study. As the creator of this site says, "Some of the ideas shown could easily be used as drama activities but there are some which would be improved by bringing in an outside helper using videoconference." Another very special aspect of this site is the book titles used, and the variety of age groups represented. This is a must see site! In the Classroom One of the ideas presented is the "Interview." Use your interactive whiteboard for students to create questions to ask the author or an expert about the book or the subject of the book. Video the interview, or save the video conference, and have students reflect on the quality of the questions once the students have had the opportunity to illicit answers to their questions. Use your interactive whiteboard to have students brainstorm what they would do differently next time as far as developing good questions. This site has 18 maps with coordinated lesson plans that are designed to help the K-12 student improve their map reading skills. Using historical maps, students learn about history and how geography has influenced that history. Sample themes include "Environmental History," "The Historical Geography of Transportation," "Political and Military History," and a few others. The themes each have lesson plans by grade level. In the Classroom In addition to using the provided lesson plans, use this site on an interactive whiteboard or with a projector. Use the whiteboard tools to highlight special features of the map. Print out the maps and have students label them with the provided vocabulary words. Use a drawing program like KidPix and have students create their own "historical" maps based on their own lives. Use the additional photos from the resource section and have students create an interactive online poster using Genial.ly, reviewed here about why their map is significant to history. Travel through time with Mr. Dowling's Electronic Passport to read about the history of Marco Polo and his adventurous family. This site offers a brief but thorough account of the travels and life of Marco Polo. This site is a great reference tool for research and reports as well as an extension of a textbook lesson. In the Classroom Use this site as a class webquest in conjunction with Marco Polo's Route to China and Back, reviewed here. Have students or groups research one area of this site and create a multimedia report to share with the class. Challenge students to narrate a picture using a tool such as Slidestory, reviewed here. Or have students create an online book using a tool such as Bookemon, reviewed here. Newspaper Blackout is a clever way to unlock the secret poetry hidden within any printed page. This Tumblr site shares examples (unmoderated, so preview before sharing in a classroom!). Poetry no longer needs to be a gray area; this activity makes it black and white! There are no gimmicks, no magic pens, and no camouflage paper, but this is certainly a tricky way to write a poem! All you need are newspapers and black markers. Hunt for and select a few words from each of the lines as you read a newspaper or magazine article. Remember to start with the title. Instead of the typical bottom-up approach to writing a poem by starting with a blank page and filling it with words, try this fresh, top down approach by starting with a page already crowded with words. Then use permanent markers to blacken out all the trivial words in each line until the poem appears. (Put something under your page so the ink does not bleed through on furniture!) Click Share your poem to learn how to upload your work to the site. In the Classroom This poetry activity (aka Found Poetry) opens the doors to so many learning objectives. In a social studies or history classroom, you could direct your students to search for newspaper or magazine articles on topics that you have been studying, or current events. Suddenly you have social studies poetry! In an English language arts lesson, you might instruct students to blacken out all the words that are not nouns or verbs, or select other parts of speech. You could change the task to eliminate any word that is not part of the simple subject or predicate, and simultaneously teach or reinforce main idea. For classrooms with individual computers, students could access articles online. Copy the text into a document. Then, Instead of blackening out words with markers, they could get the same effect by highlighting over them with black, or changing the font color of the text to white, and printing them or saving a screenshot image. Another option is for students to email their Newspaper Blackout poems to the teacher. Each poem could then be put into a Power Point slide show for the class to see on a projector or interactive whiteboard. Use this site to offer your students a new twist on Poetry Month (April). Take your new poetry collection to the world by uploading the PowerPoint to ThingLink, reviewed here, and having each student record a reading in his/her own voice. Make poetry a participatory experience, no matter what the subject. If your school permits, have students take photos of their paper poems -- or screenshots of ones done on the computer --and share them on this site. You may want students to start saving their work in a digital portfolio. Suggestions are bulb, reviewed here, for high school students, or Dropr, reviewed here, for fourth through eighth grade students.
require 'spidr/settings/user_agent' require 'spidr/agent/sanitizers' require 'spidr/agent/filters' require 'spidr/agent/events' require 'spidr/agent/actions' require 'spidr/agent/robots' require 'spidr/page' require 'spidr/session_cache' require 'spidr/cookie_jar' require 'spidr/auth_store' require 'spidr/spidr' require 'openssl' require 'net/http' require 'set' module Spidr class Agent include Settings::UserAgent # HTTP Host Header to use # # @return [String] attr_accessor :host_header # HTTP Host Headers to use for specific hosts # # @return [Hash{String,Regexp => String}] attr_reader :host_headers # HTTP Headers to use for every request # # @return [Hash{String => String}] # # @since 0.6.0 attr_reader :default_headers # HTTP Authentication credentials # # @return [AuthStore] attr_accessor :authorized # Referer to use # # @return [String] attr_accessor :referer # Delay in between fetching pages # # @return [Integer] attr_accessor :delay # History containing visited URLs # # @return [Set<URI::HTTP>] attr_reader :history # List of unreachable URLs # # @return [Set<URI::HTTP>] attr_reader :failures # Queue of URLs to visit # # @return [Array<URI::HTTP>] attr_reader :queue # The session cache # # @return [SessionCache] # # @since 0.6.0 attr_reader :sessions # Cached cookies # # @return [CookieJar] attr_reader :cookies # Maximum number of pages to visit. # # @return [Integer] attr_reader :limit # Maximum depth # # @return [Integer] attr_reader :max_depth # The visited URLs and their depth within a site # # @return [Hash{URI::HTTP => Integer}] attr_reader :levels # # Creates a new Agent object. # # @param [Hash] options # Additional options # # @option options [Integer] :open_timeout (Spidr.open_timeout) # Optional open timeout. # # @option options [Integer] :read_timeout (Spidr.read_timeout) # Optional read timeout. # # @option options [Integer] :ssl_timeout (Spidr.ssl_timeout) # Optional ssl timeout. # # @option options [Integer] :continue_timeout (Spidr.continue_timeout) # Optional continue timeout. # # @option options [Integer] :keep_alive_timeout (Spidr.keep_alive_timeout) # Optional keep_alive timeout. # # @option options [Hash] :proxy (Spidr.proxy) # The proxy information to use. # # @option :proxy [String] :host # The host the proxy is running on. # # @option :proxy [Integer] :port # The port the proxy is running on. # # @option :proxy [String] :user # The user to authenticate as with the proxy. # # @option :proxy [String] :password # The password to authenticate with. # # @option options [Hash{String => String}] :default_headers # Default headers to set for every request. # # @option options [String] :host_header # The HTTP Host header to use with each request. # # @option options [Hash{String,Regexp => String}] :host_headers # The HTTP Host headers to use for specific hosts. # # @option options [String] :user_agent (Spidr.user_agent) # The User-Agent string to send with each requests. # # @option options [String] :referer # The Referer URL to send with each request. # # @option options [Integer] :delay (0) # The number of seconds to pause between each request. # # @option options [Set, Array] :queue # The initial queue of URLs to visit. # # @option options [Set, Array] :history # The initial list of visited URLs. # # @option options [Integer] :limit # The maximum number of pages to visit. # # @option options [Integer] :max_depth # The maximum link depth to follow. # # @option options [Boolean] :robots (Spidr.robots?) # Specifies whether `robots.txt` should be honored. # # @yield [agent] # If a block is given, it will be passed the newly created agent # for further configuration. # # @yieldparam [Agent] agent # The newly created agent. # # @see #initialize_sanitizers # @see #initialize_filters # @see #initialize_actions # @see #initialize_events # def initialize(options={}) @host_header = options[:host_header] @host_headers = {} if options[:host_headers] @host_headers.merge!(options[:host_headers]) end @default_headers = {} if options[:default_headers] @default_headers.merge!(options[:default_headers]) end @user_agent = options.fetch(:user_agent,Spidr.user_agent) @referer = options[:referer] @sessions = SessionCache.new(options) @cookies = CookieJar.new @authorized = AuthStore.new @running = false @delay = options.fetch(:delay,0) @history = Set[] @failures = Set[] @queue = [] @limit = options[:limit] @levels = Hash.new(0) @max_depth = options[:max_depth] if options[:queue] self.queue = options[:queue] end if options[:history] self.history = options[:history] end initialize_sanitizers(options) initialize_filters(options) initialize_actions(options) initialize_events(options) if options.fetch(:robots,Spidr.robots?) initialize_robots end yield self if block_given? end # # Creates a new agent and begin spidering at the given URL. # # @param [URI::HTTP, String] url # The URL to start spidering at. # # @param [Hash] options # Additional options. See {Agent#initialize}. # # @yield [agent] # If a block is given, it will be passed the newly created agent # before it begins spidering. # # @yieldparam [Agent] agent # The newly created agent. # # @see #initialize # @see #start_at # def self.start_at(url,options={},&block) agent = new(options,&block) agent.start_at(url) end # # Creates a new agent and spiders the web-site located at the given URL. # # @param [URI::HTTP, String] url # The web-site to spider. # # @param [Hash] options # Additional options. See {Agent#initialize}. # # @yield [agent] # If a block is given, it will be passed the newly created agent # before it begins spidering. # # @yieldparam [Agent] agent # The newly created agent. # # @see #initialize # def self.site(url,options={},&block) url = URI(url) agent = new(options.merge(host: url.host),&block) agent.start_at(url) end # # Creates a new agent and spiders the given host. # # @param [String] name # The host-name to spider. # # @param [Hash] options # Additional options. See {Agent#initialize}. # # @yield [agent] # If a block is given, it will be passed the newly created agent # before it begins spidering. # # @yieldparam [Agent] agent # The newly created agent. # # @see #initialize # def self.host(name,options={},&block) agent = new(options.merge(host: name),&block) agent.start_at(URI::HTTP.build(host: name, path: '/')) end # # The proxy information the agent uses. # # @return [Proxy] # The proxy information. # # @see SessionCache#proxy # # @since 0.2.2 # def proxy @sessions.proxy end # # Sets the proxy information that the agent uses. # # @param [Proxy] new_proxy # The new proxy information. # # @return [Hash] # The new proxy information. # # @see SessionCache#proxy= # # @since 0.2.2 # def proxy=(new_proxy) @sessions.proxy = new_proxy end # # Clears the history of the agent. # def clear @queue.clear @history.clear @failures.clear return self end # # Start spidering at a given URL. # # @param [URI::HTTP, String] url # The URL to start spidering at. # # @yield [page] # If a block is given, it will be passed every page visited. # # @yieldparam [Page] page # A page which has been visited. # def start_at(url,&block) enqueue(url) return run(&block) end # # Start spidering until the queue becomes empty or the agent is # paused. # # @yield [page] # If a block is given, it will be passed every page visited. # # @yieldparam [Page] page # A page which has been visited. # def run(&block) @running = true until (@queue.empty? || paused? || limit_reached?) begin visit_page(dequeue,&block) rescue Actions::Paused return self rescue Actions::Action end end @running = false @sessions.clear return self end # # Determines if the agent is running. # # @return [Boolean] # Specifies whether the agent is running or stopped. # def running? @running == true end # # Sets the history of URLs that were previously visited. # # @param [#each] new_history # A list of URLs to populate the history with. # # @return [Set<URI::HTTP>] # The history of the agent. # # @example # agent.history = ['http://tenderlovemaking.com/2009/05/06/ann-nokogiri-130rc1-has-been-released/'] # def history=(new_history) @history.clear new_history.each do |url| @history << URI(url) end return @history end alias visited_urls history # # Specifies the links which have been visited. # # @return [Array<String>] # The links which have been visited. # def visited_links @history.map(&:to_s) end # # Specifies all hosts that were visited. # # @return [Array<String>] # The hosts which have been visited. # def visited_hosts visited_urls.map(&:host).uniq end # # Determines whether a URL was visited or not. # # @param [URI::HTTP, String] url # The URL to search for. # # @return [Boolean] # Specifies whether a URL was visited. # def visited?(url) @history.include?(URI(url)) end # # Sets the list of failed URLs. # # @param [#each] new_failures # The new list of failed URLs. # # @return [Array<URI::HTTP>] # The list of failed URLs. # # @example # agent.failures = ['http://localhost/'] # def failures=(new_failures) @failures.clear new_failures.each do |url| @failures << URI(url) end return @failures end # # Determines whether a given URL could not be visited. # # @param [URI::HTTP, String] url # The URL to check for failures. # # @return [Boolean] # Specifies whether the given URL was unable to be visited. # def failed?(url) @failures.include?(URI(url)) end alias pending_urls queue # # Sets the queue of URLs to visit. # # @param [#each] new_queue # The new list of URLs to visit. # # @return [Array<URI::HTTP>] # The list of URLs to visit. # # @example # agent.queue = ['http://www.vimeo.com/', 'http://www.reddit.com/'] # def queue=(new_queue) @queue.clear new_queue.each do |url| @queue << URI(url) end return @queue end # # Determines whether a given URL has been enqueued. # # @param [URI::HTTP] url # The URL to search for in the queue. # # @return [Boolean] # Specifies whether the given URL has been queued for visiting. # def queued?(url) @queue.include?(url) end # # Enqueues a given URL for visiting, only if it passes all of the # agent's rules for visiting a given URL. # # @param [URI::HTTP, String] url # The URL to enqueue for visiting. # # @return [Boolean] # Specifies whether the URL was enqueued, or ignored. # def enqueue(url,level=0) url = sanitize_url(url) if (!(queued?(url)) && visit?(url)) link = url.to_s begin @every_url_blocks.each { |url_block| url_block.call(url) } @every_url_like_blocks.each do |pattern,url_blocks| match = case pattern when Regexp link =~ pattern else (pattern == link) || (pattern == url) end if match url_blocks.each { |url_block| url_block.call(url) } end end rescue Actions::Paused => action raise(action) rescue Actions::SkipLink return false rescue Actions::Action end @queue << url @levels[url] = level return true end return false end # # Requests and creates a new Page object from a given URL. # # @param [URI::HTTP] url # The URL to request. # # @yield [page] # If a block is given, it will be passed the page that represents the # response. # # @yieldparam [Page] page # The page for the response. # # @return [Page, nil] # The page for the response, or `nil` if the request failed. # def get_page(url) url = URI(url) prepare_request(url) do |session,path,headers| new_page = Page.new(url,session.get(path,headers)) # save any new cookies @cookies.from_page(new_page) yield new_page if block_given? return new_page end end # # Posts supplied form data and creates a new Page object from a given URL. # # @param [URI::HTTP] url # The URL to request. # # @param [String] post_data # Form option data. # # @yield [page] # If a block is given, it will be passed the page that represents the # response. # # @yieldparam [Page] page # The page for the response. # # @return [Page, nil] # The page for the response, or `nil` if the request failed. # # @since 0.2.2 # def post_page(url,post_data='') url = URI(url) prepare_request(url) do |session,path,headers| new_page = Page.new(url,session.post(path,post_data,headers)) # save any new cookies @cookies.from_page(new_page) yield new_page if block_given? return new_page end end # # Visits a given URL, and enqueus the links recovered from the URL # to be visited later. # # @param [URI::HTTP, String] url # The URL to visit. # # @yield [page] # If a block is given, it will be passed the page which was visited. # # @yieldparam [Page] page # The page which was visited. # # @return [Page, nil] # The page that was visited. If `nil` is returned, either the request # for the page failed, or the page was skipped. # def visit_page(url) url = sanitize_url(url) get_page(url) do |page| @history << page.url begin @every_page_blocks.each { |page_block| page_block.call(page) } yield page if block_given? rescue Actions::Paused => action raise(action) rescue Actions::SkipPage return nil rescue Actions::Action end page.each_url do |next_url| begin @every_link_blocks.each do |link_block| link_block.call(page.url,next_url) end rescue Actions::Paused => action raise(action) rescue Actions::SkipLink next rescue Actions::Action end if (@max_depth.nil? || @max_depth > @levels[url]) enqueue(next_url,@levels[url] + 1) end end end end # # Converts the agent into a Hash. # # @return [Hash] # The agent represented as a Hash containing the `history` and # the `queue` of the agent. # def to_hash {history: @history, queue: @queue} end protected # # Prepares request headers for the given URL. # # @param [URI::HTTP] url # The URL to prepare the request headers for. # # @return [Hash{String => String}] # The prepared headers. # # @since 0.6.0 # def prepare_request_headers(url) # set any additional HTTP headers headers = @default_headers.dup unless @host_headers.empty? @host_headers.each do |name,header| if url.host.match(name) headers['Host'] = header break end end end headers['Host'] ||= @host_header if @host_header headers['User-Agent'] = @user_agent if @user_agent headers['Referer'] = @referer if @referer if (authorization = @authorized.for_url(url)) headers['Authorization'] = "Basic #{authorization}" end if (header_cookies = @cookies.for_host(url.host)) headers['Cookie'] = header_cookies end return headers end # # Normalizes the request path and grabs a session to handle page # get and post requests. # # @param [URI::HTTP] url # The URL to request. # # @yield [request] # A block whose purpose is to make a page request. # # @yieldparam [Net::HTTP] session # An HTTP session object. # # @yieldparam [String] path # Normalized URL string. # # @yieldparam [Hash] headers # A Hash of request header options. # # @since 0.2.2 # def prepare_request(url,&block) path = unless url.path.empty? url.path else '/' end # append the URL query to the path path += "?#{url.query}" if url.query headers = prepare_request_headers(url) begin sleep(@delay) if @delay > 0 yield @sessions[url], path, headers rescue SystemCallError, Timeout::Error, SocketError, IOError, OpenSSL::SSL::SSLError, Net::HTTPBadResponse, Zlib::Error @sessions.kill!(url) failed(url) return nil end end # # Dequeues a URL that will later be visited. # # @return [URI::HTTP] # The URL that was at the front of the queue. # def dequeue @queue.shift end # # Determines if the maximum limit has been reached. # # @return [Boolean] # # @since 0.6.0 # def limit_reached? @limit && @history.length >= @limit end # # Determines if a given URL should be visited. # # @param [URI::HTTP] url # The URL in question. # # @return [Boolean] # Specifies whether the given URL should be visited. # def visit?(url) !visited?(url) && visit_scheme?(url.scheme) && visit_host?(url.host) && visit_port?(url.port) && visit_link?(url.to_s) && visit_url?(url) && visit_ext?(url.path) && robot_allowed?(url.to_s) end # # Adds a given URL to the failures list. # # @param [URI::HTTP] url # The URL to add to the failures list. # def failed(url) @failures << url @every_failed_url_blocks.each { |fail_block| fail_block.call(url) } return true end end end
194 F.Supp. 522 (1961) George R. WALKER, Mildred C. Marshall, and Royse S. Barnaby, Trustees u/i Joseph R. Walker et al., sometimes known as Walker Building Trust v. UNITED STATES of America. George R. WALKER and Frances B. Walker v. UNITED STATES of America. Civ. A. Nos. 60-140, 60-141. United States District Court D. Massachusetts. May 25, 1961. *523 Earle W. Carr, Frederick D. Herberich, Gaston, Snow, Motley & Holt, Boston, Mass., for plaintiffs. Elliot L. Richardson, U. S. Atty., Andrew A. Caffrey, James C. Heigham, Asst. U. S. Attys., Boston, Mass., for defendant. *524 FRANCIS J. W. FORD, District Judge. Plaintiffs in 60-140-F bring this action as trustees of the so-called Walker Building trust to recover income taxes alleged to have been erroneously assessed and collected for the calendar year 1955. The sole issue is whether the income of the trust was taxable to the beneficiaries thereof or to the trust as a corporation under § 7701(a) (3) of the Internal Revenue Code of 1954, 26 U.S.C.A. § 7701 (a) (3). The companion case, 60-141-F, involves questions as to the personal income tax for 1955 of one of the beneficiaries of the trust, which are dependent on the decision in the case involving the taxation of the trust itself. On October 4, 1893, Joseph Henry Walker transferred certain real estate in Boston to his son Joseph Walker in trust to pay the income to the grantor for life and thereafter to his four children (issue of a deceased child to take their parent's share). On the death of the survivor of said children the trust was to terminate and the principal was to be distributed in equal shares per capita to the then surviving grandchildren. The grantor died in 1907. Of the four children, George Walker died without issue in 1937, Ellen W. Shirk died in 1940 survived by a son, Joseph Walker died in 1941 survived by five children, and Agnes Claflin died in 1949 survived by two children. There were disputes between members of the family resulting in suits involving this trust, Shirk v. Walker, 298 Mass. 251, 10 N.E.2d 192, 125 A.L.R. 620, and another trust, Walker v. Walker, 326 Mass. 397, 94 N.E.2d 925, and in consequence hostility or at least strained relations existed between various branches of the family. The trust operated successfully until the early thirties. In 1934 the property was operated at a loss, and the trust was unable to meet the first mortgage falling due in that year. Litigation involving this mortgage resulted in a decree extending the mortgage to 1943 under an arrangement whereby specified amounts of income were to be withheld from the beneficiaries and applied to the principal of the mortgage, the beneficiaries having a charge against trust assets, after the first and second mortgages, for repayment of the amounts so applied. Further extensions on similar terms were made in 1943 and 1946. Following the death of Joseph Walker in 1941, three trustees were appointed representing the three existing branches of the family. During the next few years there was discussion by the eight surviving grandchildren, to whom the property would presumptively be distributed when the trust terminated on the death of Agnes Claflin. Relations between these parties were such that it was difficult to get them all to agree on anything. The situation was complicated by the existence of two mortgages and the claims for reimbursement of withheld income. They felt immediate sale of the property could be made only at a sacrifice. They also felt it was impractical for the remaindermen to hold title to the property in undivided interests since they were widely scattered geographically in addition to the difficulty of securing agreement among them in any event. Moreover, the bank holding the first mortgage, the latest extension of which would expire in 1949, would not agree to a further extension involving it in dealings with eight owners under these terms. The second mortgage was held by another trust having the same beneficiaries and it was feared that the passing of title directly to the eight beneficiaries would result in merger of the second mortgage into the fee, thus ending the priority of the claims of the owners of the second mortgage over the reimbursement claims. The result of these discussions was a new trust agreement embodied in an instrument dated December 20, 1948, signatures to which were completed in 1949 and which took effect in 1949 upon the termination of the original trust. By the instrument of December 20, 1948, the eight grandchildren agreed that on the termination of the original Walker *525 trust, their interests were to continue to be held in trust by the three trustees, one representing each branch of the family, until the death of the survivor of the eight grandchildren. Net income was to be paid to the eight grandchildren in equal shares with provisions governing payment of the share of any of them who died before termination of the trust. There were provisions for appointment of a successor to any trustee who died or resigned, such successor to represent the same branch of the family represented by the trustee he was replacing. Any of the grandchildren could at any time by an instrument in writing bring about termination of the trust and distribution of the trust estate. In any event the trust was to be terminated upon the sale of the Walker Building. There was a spendthrift trust provision under which the interest of a beneficiary could not be alienated except that it might be transferred to another beneficiary or to the trustees. Where a beneficiary elected to sell his interest to the trustees and agreement could not be reached as to the price, the beneficiary could compel sale of the real estate and termination of the trust. The trustees were given broad powers of management of the real estate, including power to retain unproductive property, power to lease beyond the anticipated life of the trust, power to exchange the real estate for other real estate, power to sell any and all of the real estate held by them in whole or in part, publicly or privately, power to maintain and repair or reconstruct the building, and power to tear down the building and construct new buildings. The main asset of the trust was the so-called Walker Building consisting of the original building conveyed by the original grantor together with additions erected during the period of the original trust. The active management of the property was carried on by one of the trustees, George R. Walker, who was paid $12,000 a year as compensation for his services. He negotiated leases with the approximately fifty tenants of the building and also carried on negotiations with banks for refinancing of the mortgage from time to time. A staff of about twenty-five employees was required for operation of the building. Routine activities were performed by Walker alone and important acts performed with the agreement of the remaining trustees. An annual report of the activities and condition of the trust was made to the beneficiaries. The Walker Building was an old one. In 1949 its operations showed only a slight profit, but this was increased somewhat in subsequent years. The building was heavily taxed, its assessed valuation in 1949 being $1,375,000. Walker's efforts to obtain abatements resulted in a reduction of this valuation to $1,090,000 and later to $950,000. Beginning in 1949 and continuing thereafter Walker talked with various real estate brokers in an effort to procure a customer who would buy the building at a satisfactory price. Finally in 1959 the building was sold for $850,000. The trust was thereupon terminated and its assets have been substantially distributed to the beneficiaries. The trust, as did the original Walker trust before it, filed its tax returns on a cash, calendar year basis on fiduciary return form 1041 as a revocable trust. The beneficiaries reported their respective shares of its net income as income on their individual returns, whether or not such income was actually distributed to them. In fact, 1955 was the first year in which any substantial portion of the trust income was actually distributed to the beneficiaries. The sole issue is whether the trust is to be treated for purposes of taxation as a corporation under the provisions of § 7701(a), or whether it is to be treated as a trust whose income is taxable to the grantor-beneficiaries under §§ 671 and 674, 26 U.S.C.A. §§ 671, 674. The basic criteria for distinguishing between a strict trust of the traditional type and a trust taxable as an association have been clearly laid down in the regulations and in innumerable cases. Each case, however, must be decided *526 on its own peculiar facts and the difficulty lies in determining on the facts of each case considered as a whole on which side of the line the trust in question must fall. Basically an association taxable as a corporation exists when (1) two or more persons associate themselves in a joint enterprise (2) having a substantial resemblance to a corporation and (3) having for its purpose the carrying on of business for a profit. The first of these prerequisites can clearly be found to be present here. Plaintiffs' only contention to the contrary is based on the argument that since the eight grandchildren were divided into hostile family groups, any association which they did form was not voluntary. None of them, however, was under any legal compulsion to enter into the trust agreement. Admittedly it required long negotiations to produce an agreement they would all accept. All agreed in the end because whether or not the arrangement was pleasing to them personally, they were convinced it was the one which would be most advantageous under the circumstances. That is all that the law requires. It does not demand that the association should be a friendly one. The second requirement is that there should be a substantial resemblance (though not necessarily an identity) of the organization to a corporation. The presence or absence of certain of the outward trappings of a corporation such as officers, directors, minutes, seal, by-laws, shareholders' meetings or certificates of beneficial interest have only secondary significance. The principal criteria as set forth in the leading case of Morrissey v. Commissioner of Internal Revenue, 296 U.S. 344, 359, 56 S.Ct. 289, 80 L.Ed. 263, are the holding of title by the trustees as a continuing body, centralized management, continuity of the life of the enterprise, means for the transfer of beneficial interests and limitation of personal liability of the participants to property embarked in the undertaking. All of these need not be present in order to make the entity taxable as a corporation. Some may be absent or present only to a limited degree. The extent to which these characteristics are present, however, is the decisive test of whether there is substantial resemblance to a corporation. Some of these characteristics are clearly present here. There was a continuing body of trustees with centralized management of the enterprise. Transferability of the interests of the beneficiaries was severely limited. Continuity of the life of the trust itself was not assured, since any of the original beneficiaries could at any time have caused the termination of the trust. This factor of lack of continuity has at times been given considerable weight. Thus in Rev.Rul. 54-484, 1954-2 C.B. 242, it is stated: "Continuity of life in the corporate sense, a requisite of an association taxable as a corporation, is not practically attained by provisions in a partnership agreement making it possible for the continuing members to continue the partnership if they choose." Similarly I.T. 3948, 1949-1 C.B. 161 held that a joint operating agreement entered into between co-owners of oil and gas properties would not constitute an association unless "some person or persons are irrevocably authorized to act in a representative capacity for a fixed and determinable period of time to sell the production from the joint operation for the joint account of two or more of the co-owners."[1] Government argues that the power to terminate should be given no consideration because there was no real possibility that it would ever be exercised. In the light of the history of *527 the hostile relations which had divided the family groups this argument cannot be accepted. The power to terminate was evidently included as a concession to some of the parties who were persuaded only with difficulty to enter into the agreement in the first place, and an actual exercise of the power, even an unreasonable one, was clearly not an impossible development. The third requirement, and the one of greatest importance, is that the purpose of the trust should be that of engaging in a business for profit. Plaintiffs' contention is that the purpose of the trust here was the orderly liquidation of the trust estate involved. Government's position is that the question must be resolved solely on the basis of the provisions of the trust instrument. It is true, as was said in Sears v. Hassett, 1 Cir., 111 F.2d 961, 962, 963, that "the character of the trust as an association is not determined by the intentions or expectations of its creators, proved by parol, nor by the extent to which the powers in the trust instrument have actually been exercised, but rather by the purposes and potential activities as disclosed on the face of the trust instrument." Government argues that the extent of the powers conferred on the trustees, the emphasis on the desirability of the continuation of centralized management, the absence of any express statement that the purpose of the trust was liquidation, and the failure to include any express requirement for the sale of the property and the termination of the trust within any specified time all show clearly that the purpose was not liquidation but continued operation for profit. The trust instrument must be considered as a whole. If it does not expressly state that the purpose of the trust is liquidation, it at least clearly implies it. In the circumstances in which the earlier trust was coming to an end, a satisfactory liquidation of the property could be expected to require considerable time. The trust property consisted of a large and complex real property whose conservation required extensive management during the liquidation period. In this light the extensive powers of management conferred upon the trustees appear to be given as incidental to the orderly liquidation of the property and not for an independent business motive. In fact, the trust instrument expressly states in Article VI that, "The Trustees are not given extraordinary powers relating to the management, investment and reinvestment of intangible securities and other personal property, except mortgages for the reason that this Agreement and Indenture of Trust will have terminated upon the occasion of a liquidation of said real estate known as the Walker Building and of any purchase money mortgages resulting from the sale, thereof, all in the manner hereinabove set forth." The provisions for termination of the trust upon liquidation of the real estate and for early termination by any of the interested parties are further indications of a purpose of liquidation rather than of conducting a business for profit. The provisions of the trust instrument considered as a whole thus indicate that the paramount purpose of the arrangement was an orderly and timely liquidation of the estate. The evidence of plaintiff Walker was that liquidation was in fact the object of the agreement. The attendant circumstances bear this out. In 1949 immediate sale of the real estate or distribution in kind to the beneficiaries involved genuine difficulties and prospects of financial loss. An arrangement for orderly liquidation was necessary and the continuation of the existing trust arrangement was clearly a reasonable choice of an orderly method of liquidation. The conduct of the trustees after 1949 showed reasonable and continuing efforts to improve the salability of the property and to dispose of it as soon as a reasonably adequate price could be obtained. As was pointed out in the Morrissey case, supra, every trust involves some business activity. There was undoubtedly considerable business activity on the part of the trustees in this case, but it does not appear to have involved *528 more than what was required to conserve the value of the property and obtain a satisfactory price for it. The law does not require that a liquidation be carried out immediately under unfavorable circumstances and at the cost of selling at a loss. Nor does it require that the property be operated at a loss pending disposition of it. Where the paramount purpose of the arrangement is liquidation, the use of reasonable business skill and judgment in waiting for a favorable opportunity for sale and in managing the property efficiently in the meantime to enhance its salability does not convert the liquidation into a business enterprise. Helvering v. Washburn, 8 Cir., 99 F.2d 478, 481; Paine v. United States, D. C., 32 F.Supp. 672; Pitzman, 36 B.T.A. 81; Girard Trust Co., 34 B.T.A. 1066; Broadway-Brompton, 34 B.T.A. 1089. The conclusion must be that the trust here involved was an entity with some but not all the characteristics of a corporation, that it had as its paramount purpose the orderly liquidation of the trust estate and not the carrying on of a business for profit, that the business activities carried on were only those incidental to the conservation of the property and its orderly liquidation, and that it is therefore for purposes of the federal income tax not an association taxable as a corporation within the meaning of § 7701(a) (3) but a revocable trust falling within the provisions of §§ 671 and 676, 26 U.S.C.A. §§ 671, 676. Cf. Codman v. United States, D.C., 30 F.Supp. 732; Paine v. United States, D.C., 32 F.Supp. 672. Plaintiffs in No. 60-141-F have paid their individual income tax on the basis that income of the trust in No. 60-140-F was taxable to the grantor-beneficiaries and bring their action only for a refund which they contend would be due if the holding in 60-140-F was that the trust was taxable as a corporation. Consequently they concede that in the light of the holding in 60-140-F, 60-141-F is to be dismissed. In No. 60-140-F judgment will be entered for plaintiffs, the computation of the amount of the judgment to be agreed upon by the parties. In No. 60-141-F judgment will be entered for defendant dismissing the complaint. NOTES [1] Regulations issued under the 1954 Code in 1960, Reg. § 301.7701, not applicable in terms to tax years ending before December 31, 1960, significantly state on this point: "For example, if the agreement expressly provides that the organization can be terminated by the will of any member, it is clear that the organization lacks continuity of life."
Q: Document Type Description or 'Kind' Description Given a file type (eg, DOC or PDF), how does one get a description similar to Finder's 'Kind'? For example, under Finder, DOC Kind is 'Word 97 Format (.doc)', and PDF Kind is 'Portable Document Format (PDF). According to About Document Interaction, " iOS provides a systemwide registry of file type associations". But I don't believe I am pulling out the correct information (I'm not even really sure I'm using the aforementioned registry). I'm using the code below, and it is returning 'com.microsoft.word.doc' for a DOC's kind. RTF is 'public.rtf', and PDF is 'com.adobe.pdf'. More bizarre is a link (webloc): 'dyn.age81s3pcrv10g'. None of the descriptions are user friendly. NSURL* url = [NSURL fileURLWithPath:fullPathName]; if(url == nil) return [extension uppercaseString]; // i.e., PDF UIDocumentInteractionController* doc = [UIDocumentInteractionController interactionControllerWithURL: url]; if(doc == nil) return [extension uppercaseString]; // i.e., PDF return doc.UTI; A: Here's the code to get the description. For example, a PDF files retrieves 'Portable Document Format (PDF)'. To use the code on the iPhone, add the MobileCoreServices framework and #import <MobileCoreServices/MobileCoreServices.h>. Error checking and ASSERTs have been omitted for clarity. NSString* extension = [filename pathExtension]; NSString* hint = @"public.data"; CFStringRef uti = UTTypeCreatePreferredIdentifierForTag(kUTTagClassFilenameExtension, (CFStringRef)extension, (CFStringRef)hint); [(NSString *)uti autorelease]; CFStringRef mime = UTTypeCopyPreferredTagWithClass (uti, kUTTagClassMIMEType); [(NSString *)mime autorelease]; CFStringRef description = UTTypeCopyDescription(uti); [(NSString*)description autorelease]; NSLog(@"%@: %@", filename, description); ========================================== Stack Overflow: Where's the iPhone MIME type database? Apple: Adopting Uniform Type Identifiers
DW12983 I feel you have the real problem wrong on this. Rather than the Army's lack of action, to me it's a case of this country as a whole being oversensitive to the fear of being called racist, bigot, profiler etc. What do you think would have happened to one of his superiors if they called him out as a fanatic? I would bet there would be Muslim protests. His superior would be chastised, threatened, probably disciplined and possibly discharged all in the name of tolerance. The problem is not the Military, it's a society that has become scared of it's own shadow.
INTRODUCTION ============ GADD (growth arrest and DNA-damage inducible) 45α is a multi-functional protein implicated in a variety of cellular stress responses ([@gkt223-B1],[@gkt223-B2]). Upregulation of GADD45α expression has been shown to link to the G~2~/M checkpoint of the cell cycle by inhibiting CDC2 kinase activity ([@gkt223-B3]). In addition, GADD45α also functions in modulating genomic DNA demethylation and DNA-damage repair responses, and therefore contributing to the genome stability ([@gkt223-B4],[@gkt223-B5]). Furthermore, induction of GADD45α represents an important cellular mechanism to trigger the apoptosis in responding to various harmful stresses ([@gkt223-B6; @gkt223-B7; @gkt223-B8]). The induction of GADD45α expression can be regulated at multiple steps, including the transcriptional, post-transcriptional, translational and post-translational events, and the mechanisms involved in these processes are also complicated ([@gkt223-B2],[@gkt223-B4],[@gkt223-B7],[@gkt223-B9; @gkt223-B10; @gkt223-B11]). In our previously study, we demonstrated that GADD45α is a liable protein and undergoes constitutive ubiquitination and proteasome-dependent degradation in the resting cells. Arsenite, a toxic chemical agent with anticancer usage, has effects to interrupt endogenous GADD45α ubiquitination and degradation, leading to GADD45α protein accumulation and cellular apoptosis ([@gkt223-B7],[@gkt223-B12]). These findings provide a new model for GADD45α functional regulation through the modulation of its protein stability *in vivo*. However, the factors and mechanisms involved in the cellular GADD45α protein stability regulation are still poorly understood yet. The oncoprotein MDM2 (mouse counterpart of HDM2 in human) is a ring-finger-containing E3 ubiquitin ligase, which is well known as a feedback regulator of the tumor suppressor p53. It binds to and mediates the ubiquitination and degradation of p53, thereby contributing greatly to the cellular p53 functional control. Various damaging stresses can trigger the interruption of constitutive p53--MDM2 interaction, leading to p53 accumulation and fully functional activation to mediate diverse cellular biological effects ([@gkt223-B13]). A lot of regulatory factors have been demonstrated to act on MDM2 and modulate p53 stability and transactivity under various stress conditions ([@gkt223-B14]). The latest players in MDM2--p53 pathway regulation are a subset of ribosomal proteins (RPs) with well-established extraribosomal functions, including the large subunit RPs, L5 ([@gkt223-B15]), L11 ([@gkt223-B16; @gkt223-B17; @gkt223-B18]), L23 ([@gkt223-B19],[@gkt223-B20]), L26 ([@gkt223-B21],[@gkt223-B22]), and the small subunit RPs, S7 ([@gkt223-B23],[@gkt223-B24]) and S3 ([@gkt223-B25]). The binding of these RPs to MDM2 have been reported with effects of blocking the E3 ubiquitin ligase activity of MDM2, thereby contributing to p53 upregulation and functional activation under the ribosomal biogenesis stress conditions ([@gkt223-B26; @gkt223-B27; @gkt223-B28]). Furthermore, each of the ribosomal protein binds to overlapping yet distinct domains within the central region of MDM2. Therefore, the interdependence interaction of the different ribosomal proteins to MDM2 might be critical for regulating the E3 ubiquitin ligase activity of MDM2 by similar but not identical mechanism and indicates the potential and specific roles of these RPs in sensing different types of stress signals ([@gkt223-B15],[@gkt223-B17],[@gkt223-B19],[@gkt223-B23],[@gkt223-B26; @gkt223-B27; @gkt223-B28]). In this study, we show that GADD45α, MDM2 and a small subunit of RPs, S7, interact with each other in human cells. Interaction with MDM2 serves as a mechanism for GADD45α protein undergoing the dynamic ubiquitination and degradation process *in vivo*; although by associating with MDM2, S7 has effect to interrupt MDM2-mediated GADD45α degradation and thereby contributing to the GADD45α protein stabilization in cells. We further demonstrate that modulation of the S7--MDM2 interaction is the key mechanism for arsenite to kill cancer cells through activating the GADD45α-dependent apoptotic pathway. Therefore, our results illustrate a novel mechanism for the cellular GADD45α protein stability regulation and identify a novel function for S7 in mediating arsenite-induced apoptotic response. MATERIALS AND METHODS ===================== Plasmids and reagents --------------------- The HA--GADD45α expression plasmid was described in our previous study ([@gkt223-B7]). The following expression plasmids were constructed by regular polymerase chain reaction (PCR) or reverse transcriptase (RT)--PCR to obtain the DNA fragments: FLAG--GADD45α, FLAG--S7, HA--S7, GFP--S7, FLAG--S7--ΔMDM2 (S7 mutant deleting amino acids 59--134 responsible for MDM2 interaction). The details of the primers used for the construction are available on request. The HA--MDM2 and Myc--Ub expression plasmids were kindly provided by Dr Tao Zhou (National Center of Biomedical Analysis, China). Human MDM2 shRNA and S7 shRNA were constructed by using the GeneSuppressor System (Imgenex). The target sequences were also available on request. Human p53 shRNA and the antibodies against myc, ubiquitin, GFP, p-JNK, JNK and β-actin were purchased from Cell Signaling Technology (Beverly, MA, USA). The antibodies against GADD45α, S7, HA, MDM2 and GAPDH were obtained from Santa Cruz Biotechnology (Santa Cruz, CA, USA). Anti-FLAG antibody, MG132, cyclohexamide (CHX) and arsenite were purchased from Sigma (St. Louis, MO, USA). Cell culture and transfection ----------------------------- HepG2, H1299 and 293T cells were maintained in Dulbecco's modified Eagle's medium supplement with 10% FBS, 1% penicillin/streptomycin, and 2 mM [l]{.smallcaps}-glutamine. The transfections were performed with the Lipofectamine 2000 reagent (Life Technologies Inc., Rockville, MD, USA) according to the manufacturer's instructions. RT--PCR and real-time PCR ------------------------- Total RNA was extracted with TRizol reagent (Life Technologies Inc., Rockville, MD, USA), and cDNAs were synthesized with the ThermoScript™ RT--PCR system (Life Technologies Inc., Rockville, MD, USA) or real-time PCR detection system (Agilent Biotechnologies, Santa Clara, CA, USA) as recommended by the manufactures. To detect the induction of *gadd45α* transcription, the following oligonucleotides were synthesized and used as specific primers to amplify the human *gadd45α* cDNA: 5′-atgactttggaggaattctcg-3′ (forward) and 5′-ccgttcagggagattaatc-3′ (reverse). The results were analyzed using the comparative threshold cycle method with GAPDH as an internal control. Immunoprecipitation and western-blot assay ------------------------------------------ Cells transfected with various combination of the expression plasmids were incubated for at least 36 h before harvest or exposure to the chemical reagents. Cellular protein preparation, immunoprecipitation (IP) and immunoblot assays were performed as described previously ([@gkt223-B29],[@gkt223-B30]). *In vitro* ubiquitination assay ------------------------------- *In vitro* ubiquitination assay of GADD45α was performed with the *in vitro* ubiquitination system (Enzo Biotechnology, New York, NY, USA) as recommended by the manufacture. Briefly, the reactions were conducted at 37°C for 40 min in a 30 -µl volume containing 1× reaction buffer, 20 ng of E1, 125 ng of E2 mixture, 100--400 ng of MDM2 (Sigma), 600 ng of ubiquitin and 250 ng of purified GADD45α protein (Santa Cruz Biotechnology). After terminating the reactions with 5× sodium dodecyl sulfate (SDS) loading buffer, the reaction products were fractionated by SDS--polyacrylamide gel electrophoresis and detected by immunoblotting with the anti-GADD45α antibody. *In vivo* ubiquitination assay ------------------------------ HepG2 cells were transfected with Myc--Ub and FLAG--GADD45α expression plasmids with or without combination of the constructs encoding MDM2, S7 or MDM2 and S7 shRNA. The transfected cells were incubated for 30 h and then exposed to MG132 (10 µM) treatment for 4 h before harvesting. Cell lysate was immunoprecipitated with anti-FLAG antibody, and the ubiquitination of GADD45α was detected with anti-GADD45α antibody. Yeast two-hybrid assay ---------------------- The full-length human *gadd45α* cDNA was inserted into pGBKT7 (Clontech Laboratories) to construct the bait plasmid. For screening the potential GADD45α-binding proteins, the bait construct was transformed into the yeast cells pre-transfected with a mammary embryonic liver cDNA library (Clontech Laboratories) following the manufacture's instruction. GST-fusion protein association assay ------------------------------------ The *gadd45α* cDNA was inserted into the pGEX-T vector to construct the GST--GADD45α fusion protein expression plasmid. The fusion protein was prepared from BL21 strains by the regular protocols. Next, GST fusion protein bound to the agarose beads was mixed with the total lysate from 293T cells, followed by incubation with gentle rotation. Beads-bounded proteins were eluted with 2× SDS sample buffer and analyzed by immunoblot assay. Cell apoptosis assay -------------------- Cell death incidence on arsenite exposure was determined by flow cytometric analysis after propidium iodide staining of the nuclei as described previously ([@gkt223-B7],[@gkt223-B12]). RESULTS ======= GADD45α is a liable protein, whose ubiquitination and degradation are inhibited under arsenite exposure ------------------------------------------------------------------------------------------------------- We have previously disclosed that GADD45α protein undergoes a constitutive degradation via the ubiquitin--proteasome pathway in the mouse embryonic fibroblasts (MEFs), which process can be blocked by arsenite treatment, and the accumulation of GADD45α and its dependent JNKs cell death pathway activation contribute largely to arsenite-induced apoptotic response in the MEFs ([@gkt223-B7]). More recently, we further demonstrated that induction of GADD45α/JNKs cascade activation also has key roles in signaling arsenite-induced apoptotic effect in HepG2 human hepatoma cells as that observed in the mouse cells ([@gkt223-B12]). These findings prompt us to consider that protein stabilization may constitute an important functional regulation of GADD45α in mammalian cells. To determine whether a constitutive ubiquitination and degradation of GADD45α proteins also happens in human cells, FLAG--GADD45α and Myc--Ub expression plasmids were co-transfected into the HepG2 cells. We found that a high-molecular weight GADD45α smear characteristic of poly-ubiquitinated GADD45α was obviously presented in the co-transfected cells but not in controlled cells ([Figure 1](#gkt223-F1){ref-type="fig"}A). Furthermore, treatment with the proteasome inhibitor MG132 was able to significantly accumulate the endogenous GADD45α protein, which is barely detectable before the treatment, in HepG2 cells ([Figure 1](#gkt223-F1){ref-type="fig"}B). After arsenite exposure, a significant upregulation of GADD45α protein levels was detected in HepG2 cells ([Figure1](#gkt223-F1){ref-type="fig"}C). However, real-time PCR assays showed that *gadd45α* mRNA was constitutively expressed in the resting HepG2 cells, and its levels did not get obvious changes after the arsenite treatment during the indicated time ([Figure1](#gkt223-F1){ref-type="fig"}C). Meanwhile, when HepG2 cells were pre-treated with arsenite and then subjected to the exposure of protein synthesis inhibitor (CHX) after arsenite withdrawal, the pre-accumulated GADD45α could undergo a rapid degradation in a time-dependent manner ([Figure 1](#gkt223-F1){ref-type="fig"}D). Together, we thus conclude that GADD45α proteins are also constitutively subjected to ubiquitin--proteasome-dependent degradation and blocking this process also constitutes a response of HepG2 cells to the arsenite stress. Figure 1.GADD45α is a liable protein, and its proteasome-dependent degradation is blocked by arsenite in the HepG2 cells. (**A**) HepG2 cells were transfected with combination of the expression plasmids encoding FLAG--GADD45α or Myc--Ub as indicated. Cell extracts were immunoprecipitated with anti-FLAG antibody, and the ubiquitination of GADD45α was detected with anti-GADD45α antibody. (**B**) HepG2 cells were treated with MG132 (10 µM) for the indicated time, and then the levels of GADD45α were detected. (**C**) HepG2 cells were treated with arsenite (20 µM) for the indicated time, and then the induction of *gadd45α* mRNA and protein levels was detected by real-time PCR or western-blot assays, respectively. (**D**) HepG2 cells were left untreated or treated with arsenite (20 µM) for 12 h and then subjected to CHX (20 µM) exposure at the indicated time after arsenite withdrawal. The degradation of GADD45α was detected by western-blot assay. Ribosomal protein S7 interacts with GADD45α ------------------------------------------- To find factors involved in regulating GADD45α protein stability, the full-length GADD45α was used as the bait to screen a human embryonic liver cDNA library through the yeast two-hybrid approach. Several positive clones were found to contain the same cDNA sequences encoding the ribosomal protein S7. To confirm the putative GADD45α--S7 interaction, the *Escherichia coli* prepared and purified GST--GADD45α proteins were mixed with the 293T cellular extracts. Then we found that the GST--GADD45α, but not the controlled GST proteins, was able to pull down the cellular expressed S7 ([Figure 2](#gkt223-F2){ref-type="fig"}A). Co-expressions of the FLAG--GADD45α with GFP--S7 in 293T cells also confirmed the specific interaction between these two ectopic expressed proteins *in vivo* as judged by the IP assays ([Figure 2](#gkt223-F2){ref-type="fig"}B). The following IP assays also showed that the ectopic-expressed FLAG--GADD45α was able to form complex with endogenous S7 in the HepG2 cells ([Figure 2](#gkt223-F2){ref-type="fig"}C). Next, we wanted to address whether an endogenous GADD45α--S7 interaction occurs in human cells. Therefore, the arsenite-treated HepG2 cells were used as model for the extremely low GADD45α expression levels in this cell line under the physiological growth condition ([Figure 1](#gkt223-F1){ref-type="fig"}B). As indicated in [Figure 2](#gkt223-F2){ref-type="fig"}D, the accumulated GADD45α induced by the arsenite could bind to S7 endogenously in HepG2 cells. Taken together, we conclude that S7 is a novel GADD45α-binding protein, and such an interaction between GADD45α and S7 could be present in human cells under both basal and the arsenite-stress conditions. Figure 2.S7 interacts with GADD45α. (**A**) The purified GST--GADD45α or GST proteins and 293T whole-cell lysate with high levels of S7 expression were incubated together, and then GST-pull-down assay was performed to examine the *in vitro* interaction between GADD45α and S7. (**B**) 293T cells were either transfected with the expression plasmid encoding FLAG--GADD45α or in combination with GFP--S7 construct or eFGPN1 vector. Cell lysate was immunoprecipitated with anti-GFP antibody, and then the immunoprecipitants were probed with anti-GFP and anti-FLAG antibodies. (**C**) HepG2 cells were transfected with FLAG--GADD45α construct or its control vector. Cell lysate was immunoprecipitated with anti-FLAG antibody, and the immunoprecipitants were probed with anti-FLAG, anti-GADD45α and anti-S7 antibodies. (**D**) HepG2 cells were treated with arsenite (20 µM) for 12 h, and then cell lysate was immunoprecipitated with anti-GADD45α antibody or rabbit IgG. The immunoprecipitants were probed with anti-GADD45α and anti-S7 antibodies. S7 enhances GADD45α stability by suppressing GADD45α ubiquitination and degradation ----------------------------------------------------------------------------------- To test whether S7 has any roles in regulating GADD45α stability, a single dose of HA--GADD45α and the increasing amount of FLAG--S7 were co-transfected into HepG2 cells, and then a dose-dependent effect of S7 overexpression on enhancing the original GADD45α levels was found ([Figure 3](#gkt223-F3){ref-type="fig"}A). Consistently, ectopic overexpression of S7 also caused a significant accumulation of endogenous GADD45α proteins in HepG2 cells ([Figure 3](#gkt223-F3){ref-type="fig"}B). These data thus suggest that S7 has a positive role in regulating the cellular GADD45α expression. Figure 3.S7 upregulates GADD45α protein stability by attenuating GADD45α ubiquitination and degradation under physiological conditions. (**A**) HepG2 cells were left untreated or transfected with a single dose of expression plasmid encoding HA--GADD45α (1.5 µg) with or without combination of increasing amount of FLAG--S7 construct (2, 3 and 4 µg). The expression levels of the exogenous GADD45α were detected with anti-HA antibody. (**B**) HepG2 cells were transfected with increasing amount of FLAG--S7 construct (2, 3 and 4 µg). The expression levels of the endogenous GADD45α were detected with anti-GADD45α antibody. (**C**) HepG2 cells were transfected with p53 shRNA or its control vector with or without combination of FLAG--S7 construct (3 µg). The expression levels of the endogenous GADD45α and p53 were detected. The cells were also co-transfected with eGFPN1 vector (100 ng) and the expression level of GFP served as the control for both transfection efficiency and global translation in HepG2 cells. (**D**) H1299 cells were transfected with increasing amount of FLAG--S7 construct (3 and 4 µg). The expression levels of the endogenous GADD45α and the transcription of *gadd45α* mRNA were detected by western-blot and RT--PCR assay, respectively. (**E**) HepG2 cells were transfected with Myc--Ub and FLAG--GADD45α constructs with or without combination of the expression plasmid encoding GFP--S7. The cell lysate was immunoprecipitated with anti-FLAG antibody, and then the ubiquitination of GADD45α was detected with anti-GADD45α antibody. (**F** and **G**) HepG2 (F) or H1299 (G) cells were transfected with the expression plasmid encoding HA--GADD45α (1 µg) with or without combination of FLAG--S7 construct (3 µg). Then the cells were subjected to CHX (20 µM) exposure at the indicated time, and the degradation of GADD45α was detected with anti-HA antibody. S7 was previously shown with effect on upregulating expression levels of p53, an established transcriptional activator for the *gadd45α* gene ([@gkt223-B1],[@gkt223-B2],[@gkt223-B9],[@gkt223-B23],[@gkt223-B24]). Indeed, an increase of p53 protein levels could be found in the ectopic S7-overexpressed HepG2 cells as compared with the controlled cells ([Figure 3](#gkt223-F3){ref-type="fig"}C). However, blocking the inducible p53 upregulation by a p53-specific shRNA co-transfection did not remove the effect of the overexpressed S7 on GADD45α accumulation in these cells ([Figure 3](#gkt223-F3){ref-type="fig"}C). Moreover, ectopic overexpression of S7 in the well-known *p53*-deficient human non--small-cell carcinoma H1299 cells also caused the similar response of GADD45α accumulation ([Figure 3](#gkt223-F3){ref-type="fig"}D). We, therefore, prefer to interpret that the major role for S7 in enhancing GADD45α expression is unrelated to its putative function involving in p53 regulation. Further supporting that non-transcriptional mechanisms are involved in the S7 overexpression-dependent GADD45α accumulation, we showed that *gadd45α* mRNA levels remained roughly unchanged in H1299 cells with and without ectopic S7 overexpression ([Figure 3](#gkt223-F3){ref-type="fig"}D). Based on the aforementioned data, we anticipate that the positive effect of S7 on GADD45α expression may result from the modulation of the process of GADD45α ubiquitination and degradation in cells. To address this possibility, plasmids encoding FLAG--GADD45α and Myc--Ub were co-transfected into the HepG2 cells with or without a combination of GFP--S7 overexpression. As shown in [Figure 3](#gkt223-F3){ref-type="fig"}E, the signs for the ubiquitin-conjugated GADD45α were almost undetectable in the presence of S7 overexpression. In addition, the degradation dynamics assay showed that half-life for the ectopic expressed GADD45α was significantly elongated in the S7 overexpressing HepG2 cells as compared with that in the controlled cells ([Figure 3](#gkt223-F3){ref-type="fig"}F). The same response was also readily observed in the H1299 cells ([Figure 3](#gkt223-F3){ref-type="fig"}G). Therefore, we propose that S7 functions as a GADD45α stabilizer, and its overexpression has the effect of suppressing GADD45α ubiquitination and degradation, thereby increasing cellular GADD45α protein expression levels. MDM2 mediates GADD45α ubiquitination and degradation ---------------------------------------------------- MDM2 has been known as the E3 ubiquitin ligase for p53 and some other proteins as well. Previous studies showed that S7 can bind to and suppress MDM2's activity on mediating p53 ubiquitination, thereby enhancing p53 protein levels in cells ([@gkt223-B23],[@gkt223-B24]). It is, therefore, reasonable to ask whether S7 also stabilizes GADD45α via the same mechanism. To test this possibility, we first determined whether GADD45α could be a substrate for MDM2. 293T cells were co-transfected with HA--MDM2 and FLAG--GADD45α and then IP was performed with anti-FLAG antibody. Data in [Figure 4](#gkt223-F4){ref-type="fig"}A showed that HA--MDM2 can be detected in the anti-FLAG immunoprecipitants. Endogenous MDM2--GADD45α association was also detectable with the arsenite-treated HepG2 cells as model ([Figure 4](#gkt223-F4){ref-type="fig"}B). These data thus indicate that MDM2 has the potential to interact with GADD45α *in vivo*. Figure 4.MDM2 functions as an E3 ubiquitin ligase for GADD45α. (**A**) 293T cells were either transfected with the expression plasmid encoding FLAG--GADD45α or in combination with HA--MDM2 construct. The cells were subjected to MG132 (10 µM) treatment for 4 h before harvesting. Then cell lysate was immunoprecipitated with anti-FLAG antibody, and the immunoprecipitants were probed with anti-FLAG, anti-HA and anti-MDM2 antibodies. (**B**) HepG2 cells were treated with arsenite (20 µM) for 12 h, and then cell lysate was immunoprecipitated with anti-GADD45α antibody or rabbit IgG. The immunoprecipitants were probed with anti-GADD45α and anti-MDM2 antibodies. (**C**) HepG2 cells were transfected with Myc--Ub and FLAG--GADD45α constructs with or without combination of the expression plasmid encoding HA--MDM2. Cell lysate was immunoprecipitated with anti-FLAG antibody, and then the ubiquitination of GADD45α was detected with anti-GADD45α antibody. (**D**) HepG2 cells were transfected with the HA--MDM2 construct with or without combination of control shRNA or MDM2 shRNAs. Then the efficiency of MDM2 shRNAs was determined by western-blot assay. (**E**) HepG2 cells were transfected with Myc--Ub and FLAG--GADD45α constructs with or without combination of control shRNA or MDM2 shRNAs mixture. Cell lysate was immunoprecipitated with anti-FLAG antibody, and then the ubiquitination of GADD45α was detected with anti-GADD45α antibody. (**F**) The purified GADD45α protein (250 ng) was incubated in the *in vitro* ubiquitination reaction buffer with E1 (20 ng), E2 mixture (125 ng), MDM2 (100 or 400 ng) and ubiquitin (600 ng) for 40 min at 37°C. Then the ubiquitination of GADD45α was detected by immunoblotting with the anti-GADD45α antibody. (**G**) HepG2 cells were transfected with HA--GADD45α construct (0.25 µg) with or without combination of overdosed HA--MDM2 expression plasmid (1.25 µg). Then the expression levels of GADD45α were detected. (**H**) H1299 cells were transfected with HA--GADD45α construct (0.5 µg) with or without combination of overdosed HA--MDM2 expression plasmid (1.5 µg). Then the expression levels of GADD45α were detected. (**I**) H1299 cells were left untreated or transfected with MDM2 shRNA. Then the expression levels of endogenous GADD45α and *mdm2* mRNA were detected. We further provided evidences that co-expression with HA--MDM2 could enhance GADD45α poly-ubiquitination in HepG2 cells ([Figure 4](#gkt223-F4){ref-type="fig"}C). On the contrary, knockdown endogenous MDM2 expression by its specific shRNA decreased GADD45α ubiquitination levels significantly ([Figure 4](#gkt223-F4){ref-type="fig"}D and E). Moreover, MDM2 directly mediated the ubiquitination of the purified GADD45α protein according to the results obtained from the *in vitro* ubiquitination assay ([Figure 4](#gkt223-F4){ref-type="fig"}F). These data thus indicated that MDM2 is an E3 ubiquitin ligase for GADD45α. To further clarify the critical role of MDM2 involving in GADD45α protein stability regulation in human cells, we next showed that co-expression with overdosed HA--MDM2 significantly reduced the ectopic GADD45α levels in both HepG2 and H1299 cells ([Figure 4](#gkt223-F4){ref-type="fig"}G and H). In contract, MDM2 depletion by specific shRNA transfection remarkably increased endogenous GADD45α protein expression in H1299 cells ([Figure 4](#gkt223-F4){ref-type="fig"}I). Because of p53 deficiency in H1299 cells, we believe that the effects of MDM2 on cellular p53 and GADD45α protein stability regulations are two separate processes. S7 stabilizes GADD45α by binding to and inhibiting MDM2-mediated GADD45α ubiquitination and degradation ------------------------------------------------------------------------------------------------------- It has been showed in the previous study that S7 binds to and prevents MDM2 from accessing to p53, thereby blocking the ubiquitination and degradation of p53 in cells ([@gkt223-B23]). We wonder whether this model is also applied to the action of S7 on stabilizing GADD45α proteins *in vivo*. To this end, Myc--Ub, FLAG--GADD45α, HA--MDM2 and GFP--S7 were co-expressed in HepG2 cells. As indicated in the [Figure 5](#gkt223-F5){ref-type="fig"}A, the effect of MDM2 on mediating GADD45α poly-ubiquitination was significantly suppressed by S7 co-expression. Moreover, with the increased amounts of S7 overexpression, it also displayed a dose-dependent effect on rescuing MDM2-mediated GADD45α degradation ([Figure 5](#gkt223-F5){ref-type="fig"}B). The same results were also obtained with the H1299 cells as model ([Figure 5](#gkt223-F5){ref-type="fig"}C), further supporting the effect of S7 on GADD45α upregulation independent of p53. However, deletion of the MDM2-binding site rendered the mutant S7--ΔMDM2 ([@gkt223-B23]) losing the function of accumulating GADD45α in both HepG2 and H1299 cells under the same experimental conditions ([Figure 5](#gkt223-F5){ref-type="fig"}D and E). These results thus indicate that, like its manner in the MDM2--p53 regulation, a direct binding is also necessary for S7 to inhibit MDM2-mediated GADD45α ubiquitination and degradation *in vivo*. However, unlike its setting in regulating MDM2--p53 interaction ([@gkt223-B23]), S7 did not interrupt the MDM2--GADD45α association *in vivo* ([Figure 5](#gkt223-F5){ref-type="fig"}F). As shown in this figure, the protein amounts for HA--MDM2 in the FLAG--GADD45α immunoprecipitates from cells with and without the GFP--S7 overexpression remained unchanged, although the MDM2-dependent GADD45α ubiquitination was significantly decreased in the GFP--S7 expressing cells ([Figure 5](#gkt223-F5){ref-type="fig"}A). The mechanism for how S7 repressing MDM2-mediated GADD45α ubiquitination and degradation without interrupting MDM2/GADD45α interaction is currently unknown yet. Figure 5.S7 attenuates MDM2-mediated GADD45α ubiquitination and degradation. (**A**) HepG2 cells were transfected with Myc--Ub expression plasmid in combination of FLAG--GADD45α, HA--MDM2 or GFP--S7 constructs as indicated. Then the ubiquitination of GADD45α was detected with anti-GADD45α antibody. (**B**) HepG2 cells were left untreated or transfected with HA--GADD45α construct (0.25 µg) with or without combination of HA--MDM2 expression plasmid (1.25 µg) and increasing amount of FLAG--S7 construct (1.25, 2.5 and 3.75 µg, respectively). Then the levels of GADD45α were detected. (**C**) H1299 cells were left untreated or transfected with HA--GADD45α construct (0.5 µg) with or without combination of HA--MDM2 expression plasmid (1.5 µg) and increasing amount of FLAG--S7 construct (1.5 and 3.0 µg, respectively). Then the levels of GADD45α were detected. (**D** and **E**) HepG2 (D) or H1299 (E) cells were transfected with equal amount of FLAG--S7 or FLAG--S7--ΔMDM2 constructs (3 µg), and then the levels of the endogenous GADD45α were detected. (**F**) 293 T cells were transfected with combination of FLAG--GADD45α, HA--MDM2 or GFP--S7 constructs as indicated. The cells were subjected to MG132 (10 µM) treatment for 4 h before harvesting. Then cell lysate was immunoprecipitated with anti-FLAG antibody, and the immunoprecipitants were probed with anti-FLAG, anti-GFP or anti-MDM2 antibodies. Arsenite exposure enhances S7--MDM2 interaction, which subsequently downregulates GADD45α ubiquitination -------------------------------------------------------------------------------------------------------- As we have demonstrated that arsenite stimulation has effect on accumulating GADD45α by blocking its ubiquitination and degradation in both human and mouse cells, then we asked whether the role of S7 for suppressing MDM2-mediated GADD45α degradation accounts for the mechanism in this process. By co-expressing HA--MDM2 and GFP--S7 in HepG2 cells, we found that the MDM2--S7 interaction was drastically enhanced after arsenite treatment, evidenced by the amounts of HA--MDM2 in the GFP--S7 immunoprecipitates significantly increased in the sample from arsenite-treated cells ([Figure 6](#gkt223-F6){ref-type="fig"}A). Consistently, an increased endogenous MDM2--S7 interaction was also detectable in the arsenite-treated HepG2 cells ([Figure 6](#gkt223-F6){ref-type="fig"}B). Notably, an increase of endogenous MDM2 protein levels was also observed in HepG2 cells after arsenite exposure, whereas the protein levels for endogenous S7 remained roughly unchanged under the same conditions ([Figure 6](#gkt223-F6){ref-type="fig"}B). Moreover, MDM2-mediated GADD45α ubiquitination was remarkably inhibited after arsenite exposure ([Figure 6](#gkt223-F6){ref-type="fig"}C). Based on these data, we proposed that associating and blocking MDM2 to mediate GADD45α ubiquitination and degradation by S7 is a mechanism for arsenite-induced GADD45α accumulation in cells. Figure 6.Arsenite exposure enhances S7--MDM2 interaction, which subsequently abrogates GADD45α ubiquitination. (**A**) HepG2 cells were either transfected with HA--MDM2 or in combination with GFP--S7. Then the cells were left untreated or exposed to arsenite (20 µM) for 8 h. Cell lysate was immunoprecipitated with anti-GFP antibody, and the immunoprecipitants were probed with anti-GFP and anti-MDM2 antibodies. (**B**) HepG2 cells were left untreated or pre-treated with MG132 (10 µM) for 6 h followed by exposure to arsenite (20 µM) for 8 h. Cell lysate was immunoprecipitated with anti-S7 antibody or the mouse IgG, and then the immunoprecipitants were probed with anti-S7 and anti-MDM2 antibodies. (**C**) HepG2 cells were transfected with Myc--Ub expression plasmid with or without combination of FLAG--GADD45α or HA--MDM2 constructs. Then the transfected cells were left untreated or exposed to arsenite (20 µM) for the time indicated. Cell lysate was immunoprecipitated with anti-FLAG antibody, and then the ubiquitination of GADD45α was detected with anti-GADD45α antibody. S7 mediates arsenite-induced cellular apoptosis through the GADD45α-JNKs pathway -------------------------------------------------------------------------------- We finally addressed the significances for the S7-dependent GADD45α regulation in cellular stress responses. According to our previous reports, GADD45α--JNKs cascade functions an apoptotic signaling pathway in mice cells to the arsenite stress response ([@gkt223-B7]). Consistently, stimulation with arsenite (20 µM) triggers a robust apoptotic response in HepG2 cells ([Figure 7](#gkt223-F7){ref-type="fig"}A), associated with induction of GADD45α accumulation and JNKs activation ([Figure 7](#gkt223-F7){ref-type="fig"}C). However, pre-transfection with a pair of S7 shRNAs, which individually displayed a modest ([Figure 7](#gkt223-F7){ref-type="fig"}B) but changed to a robust S7 knockdown effect in combination ([Figure 7](#gkt223-F7){ref-type="fig"}C), greatly reduced the inducible GADD45α accumulation and JNKs activation in HepG2 cells by the subsequent arsenite treatment ([Figure 7](#gkt223-F7){ref-type="fig"}C). Also like the case of GADD45α shRNA transfection, introduction of S7 shRNAs also significantly attenuated arsenite-induced apoptosis in HepG2 cells by the same extent ([Figure 7](#gkt223-F7){ref-type="fig"}A). Together, these data indicate that S7 is critical for mediating GADD45α-dependent cell death response under arsenite exposure. Figure 7.Knockdown S7 levels impair GADD45α-dependent cell apoptotic pathway activation in the arsenite-treated HepG2 cells. (**A**) HepG2 cells were transfected with the control shRNA, p53 shRNA or combination of S7 shRNA1 and 2. The cell death incidence was detected by flow cytometric assay 24 h after arsenite exposure. And the cells accumulated in the sub G~1~ phase were presented. (**B**) HepG2 cells were transfected with either the control shRNA or the individual S7 shRNA1 or S7 shRNA 2. Then the efficiency of each shRNA was determined with anti-S7 antibody. (**C**) HepG2 cells were transfected with either the control shRNA or S7 shRNA mixture. Then the cells were left untreated or exposed to arsenite (20 µM) for 12 h. The induction of GADD45α expression and JNKs activation was detected. (**D**) HepG2 cells were transfected with either the control shRNA or p53 shRNA with or without S7 shRNA mixture. Then the cells were treated as described in C. The induction of GADD45α and p53 expression, as well as JNKs activation, was detected. As arsenite treatment also triggered a p53 induction in these cells ([Figure 7](#gkt223-F7){ref-type="fig"}D), the p53-specific shRNA was transfected into HepG2 cells before S7 shRNA introduction. As shown in [Figure 7](#gkt223-F7){ref-type="fig"}D, silencing p53 expression did not affect arsenite-induced GADD45α accumulation and JNKs activation, and co-transfection with p53 shRNA failed to affect the effect of S7 shRNAs on suppressing the inducible GADD45α accumulation and JNKs activation in the arsenite-treated HepG2 cells ([Figure 7](#gkt223-F7){ref-type="fig"}D). Thus, we prefer to exclude that p53 induction would be a predominant mechanism for the S7-dependent activation of the GADD45α--JNKs cell death pathway under the cellular arsenite stress. DISCUSSION ========== GADD45α induction has been functionally linked to multiple cellular damaging responses and with implications in the cell fate determination under these conditions ([@gkt223-B1],[@gkt223-B2]). Although transcriptional controls are generally regarded as the major mechanism for the cellular GADD45α regulations, other post-transcriptional mechanisms have also been implicated ([@gkt223-B1],[@gkt223-B2],[@gkt223-B7],[@gkt223-B9; @gkt223-B10; @gkt223-B11]). We previously demonstrate that arsenite exposure induces GADD45α expression via blocking its constitutive ubiqitination and degradation, thereby revealing a novel model of the post-translational modification for GADD45α and highlighting the importance of the protein stability modulations on this protein in the maintenance of cellular homeostasis ([@gkt223-B7]). Here, we extended the study to explore the cellular mechanisms on GADD45α protein stability regulations. We identified the MDM2 as an E3 ligase for mediating GADD45α ubiquitination and degradation and S7 as the key factor for preventing GADD45α from MDM2-dependent degradation pathway, thereby throwing new lights on the mechanisms of the cellular GADD45α stability regulations and the corresponding significance in cell fate determination under certain damaging stress conditions, such as the arsenite. S7 belongs to a member of small subunit of the ribosome proteins but is recently shown with novel function of modulating the MDM2-dependent p53 ubiquitination and degradation in mammalian cells ([@gkt223-B23],[@gkt223-B24]). In that case, S7 enters for p53 functional regulation via binding to MDM2, with the outcome of interrupting MDM2 access to p53 and thereby freeing p53 from MDM2-mediated ubiquitination and degradation pathway. In this study, we got evidences to show GADD45α served as a substrate of MDM2 *in vitro* and was subjected to a constitutive ubiquitination and degradation process mediated by MDM2 *in vivo*, and that the effect of S7 on suppressing GADD45α ubiquitination and degradation was dependent on its MDM2-binding capacity, as mutation disrupting this interaction rendered S7 losing its function to accumulate GADD45α. These data thus can support our notion that S7 enhances GADD45α protein stability by binding to repress the MDM2 action on mediating GADD45α ubiquitination *in vivo*. However, as the *gadd45α* has been established as a p53-targeted gene, one might also expect that the observation of S7 on GADD45α protein upregulation is derived from the outcome of its potential effect on p53 functional activation. But, as the effect for S7 on modulating GADD45α expression remained intact in *p53*-deficient or p53 shRNA-silencing cells, we excluded the possible involvement of p53 in S7-dependent GADD45α accumulation. On the other hand, the S7 association seemed to not interrupt MDM2--GADD45α interaction *in vivo*, which markedly contrasted to the model proposed for the action of S7 on the MDM2--p53 modulation ([@gkt223-B23]). How can S7 bind to repress MDM2-mediated GADD45α ubiquitination without affecting MDM2--GADD45α association is waiting further elucidated. We prefer to interpret this as distinctive situation, for S7 can bind to MDM2 and GADD45α simultaneously, thereby representing a novel independent function for S7. The significance for S7 on GADD45α protein stabilization is also reflected by its key role in turning on the GADD45α--JNKs apoptotic signaling pathway in cellular arsenite response. Notably, although the importance for the presence of S7 in the arsenite-induced GADD45α accumulation and JNKs activation is true, no significant changes in the S7 levels were detected during the course of cellular arsenite response. Given that the role of S7 in this cellular reaction is to bind to interrupt MDM2 on mediating GADD45α ubiquitination, it raises an interesting question of why the same levels of S7 do not inhibit this process under the physiological condition. We consider that cells may possess additional mechanisms on controlling the endogenous S7--MDM2 interaction so that make it an inducible event under certain cellular growth conditions. Indeed, the endogenous MDM2 protein level is extremely low in resting cells and is remarkably upregulated associating with the obvious presence of the S7--MDM2 interaction after arsenite stimulation. This observation may suggest that certain signaling events are elicited to trigger the endogenous S7--MDM2 interaction under this stress conditions. In fact, we have previously demonstrated that the arsenite-induced GADD45α--JNKs pathway activation is distinctively dependent on a particular role of the β subunit of the IκB kinase (IKK) complex, IKKβ ([@gkt223-B7]). Whether IKKβ has function to confer special modifications on S7 or MDM2, or both, during the cellular arsenite response is worth of investigating. As arsenite has been used for the clinical treatment of some human cancers, further elucidating the molecular events involved in the regulation of the S7--MDM2--GADD45α signaling axle is of medical important. FUNDING ======= Funding for open access charge: National Key Research and Development Program on Fundamental Sciences \[973 Project, 2011CB503803\]; National Natural Science Foundation of China \[30970594, 31171342 and 31270797\]; Beijing Natural Science Foundation \[5102035 to L.S.\]. *Conflict of interest statement*. None declared. [^1]: The authors wish it to be known that, in their opinion, the first three authors should be regarded as joint First Authors.
According to Elliotte Friedman, the Los Angeles Kings have decided that they would like to trade centre Mike Richards, if possible. Furthermore, the Toronto Maple Leafs are one of the teams that they’ve approached. The Leafs are often rumoured to be looking for a high-end centre, so he this a good option to fill that void? The Case For Richards The man wins everything. No, but seriously, he’s got a trophy cabinet that’s probably fuller than several NHL forward cores. RIchards has won a Memorial Cup (2004 with Kitchener, under the eye of Leafs assistant coach Steve Spott), a Calder Cup (2005 with Philadelphia), and two Stanley Cups (Los Angeles in 2012, 2014; the former with Jonathan Bernier). Internationally, he has both World Junior Gold (2005, with Dion Phaneuf), and Olympic Gold (coached by Leafs blatant tampering target Mike Babcock). No other player in the history of the National Hockey League has won more different types of team-based trophies that anybody cares about. Richards also captained the 2010 Philadelphia Flyers roster to the Stanley Cup Finals. He didn’t win, but hey, he wore the C. Also, they eliminated the Habs, which as Leafs fans would know, is more important than winning the Stanley Cup. The Case Against Richards I’m going to show you a neat tables. Player X is Mike Richards. Player Y is…. David Clarkson. With the exception of Richards’ one huge year in Philadelphia, and Clarkson’s mind numbingly awful first year in Toronto, the two have produced at similar clips, even at times where their sticks were on opposite ends of the luck chip. Clarkson’s relative possession numbers have also been better than Richards’ for half a decade now. With that said, I’m not about to say that David Clarkson is a better player than Mike Richards. Richards has also spent his entire career other than this year being deployed against tougher competition than the oft-falling Mimico native. Why Does It Matter Then? Because the difference between the two is not night-and-day significant. It’s not even dawn and afternoon significant anymore. Now, consider that Mike Richards makes $500,000 more than David Clarkson for only a year shorter of a term. If David Clarkson is considered by many to be an unmitigated disaster and his contract is often considered the worst ever signed by the Toronto Maple Leafs, what does this make Richards? He’s still a pretty good player, but with his contract attached, he has negative asset value. If anything, the only player I would even consider trading for him in the Leafs organization is David Clarkson. Otherwise, you’re stuck with two long-term boat anchor contracts for a player who is definitely not better than Nazem Kadri and, at this point, is most likely a step behind Tyler Bozak as well. I’m forever curious as to why Dean Lombardi did not use his compliance buyout on Richards this summer. He’d be a bad contract to have on a team with little depth, let alone one with the depth that the Kings have. The Leafs should stay away at all costs, unless they get severe contract dumping leverage, which given Los Angeles’ ambitions to make some room, would be next to impossible.
PowerVu PowerVu is a conditional access system for digital television developed by Scientific Atlanta. It is used for professional broadcasting, notably by Retevision, Bloomberg Television, Discovery Channel, AFRTS, ABS-CBN, GMA Network, and American Forces Network. It is also used by cable companies to prevent viewing by unauthorized viewers and non-cable subscribers. PowerVu has decoders that decode signals from certain satellites for cable distribution services. These decoders can also be used just like the FTA (Free-To-Air) satellite receivers if properly configured. References Category:Broadcast engineering Category:Digital television Category:Conditional-access television broadcasting
Effect of calcitonin on bone lesions in chronic dialysis patients. The effects of synthetic salmon CT, administered subcutaneously and intermittently (1 MRC U/kg/day for 15 days/month over 6 months) were investigated in 15 uremic patients on regular dialysis treatment (RDT), all presenting various degrees of osteodystrophy. Clinically, osteoarticular pain disappeared in 8 out of 10 cases; 1 patient with rib fractures had a rapid calcification of the bone fracture repair tissue. No significant changes were found in serum calcium and PTH levels. Phosphotemia showed a significant decrease within the first 20 days. The varying individual hypophosphatemic response proved to be related to the initial level of phosphatemia. The alkaline phosphatase, when increased, showed a decrease to the normal range. A significant decrease in osteoclastic hyperactivity (active resorption surface, osteoclast index) and a slight increase in osteoblastic pool (active osteoid surface) were documented. No change was noted when osteomalacia predominated. Side effects included: anorexia, nausea, vomiting, face flushing. Our data suggest that salmon CT may be usefully employed in chronic uremic patients on RDT, when secondary hyperparathyroidism predominates.
More from Complex SIGN UP FOR OUR NEWSLETTER 3. Supreme x Nike SB Dunk Lace Tag Sneaker: Supreme x Nike SB Dunk HighReleased: 2003 The starred and gatored Supreme Dunk Highs were crazy on their own — add in the three sets of laces and gold Supreme tags, and even the Supremetail price started to make sense. These are just bananas. And like bragging rights to have them on your already extremely limited kicks.
/* * Copyright (C) 2011 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "arm64_lir.h" #include "codegen_arm64.h" #include "dex/quick/mir_to_lir-inl.h" #include "utils.h" namespace art { void Arm64Mir2Lir::GenArithOpFloat(Instruction::Code opcode, RegLocation rl_dest, RegLocation rl_src1, RegLocation rl_src2) { int op = kA64Brk1d; RegLocation rl_result; switch (opcode) { case Instruction::ADD_FLOAT_2ADDR: case Instruction::ADD_FLOAT: op = kA64Fadd3fff; break; case Instruction::SUB_FLOAT_2ADDR: case Instruction::SUB_FLOAT: op = kA64Fsub3fff; break; case Instruction::DIV_FLOAT_2ADDR: case Instruction::DIV_FLOAT: op = kA64Fdiv3fff; break; case Instruction::MUL_FLOAT_2ADDR: case Instruction::MUL_FLOAT: op = kA64Fmul3fff; break; case Instruction::REM_FLOAT_2ADDR: case Instruction::REM_FLOAT: FlushAllRegs(); // Send everything to home location CallRuntimeHelperRegLocationRegLocation(kQuickFmodf, rl_src1, rl_src2, false); rl_result = GetReturn(kFPReg); StoreValue(rl_dest, rl_result); return; case Instruction::NEG_FLOAT: GenNegFloat(rl_dest, rl_src1); return; default: LOG(FATAL) << "Unexpected opcode: " << opcode; } rl_src1 = LoadValue(rl_src1, kFPReg); rl_src2 = LoadValue(rl_src2, kFPReg); rl_result = EvalLoc(rl_dest, kFPReg, true); NewLIR3(op, rl_result.reg.GetReg(), rl_src1.reg.GetReg(), rl_src2.reg.GetReg()); StoreValue(rl_dest, rl_result); } void Arm64Mir2Lir::GenArithOpDouble(Instruction::Code opcode, RegLocation rl_dest, RegLocation rl_src1, RegLocation rl_src2) { int op = kA64Brk1d; RegLocation rl_result; switch (opcode) { case Instruction::ADD_DOUBLE_2ADDR: case Instruction::ADD_DOUBLE: op = kA64Fadd3fff; break; case Instruction::SUB_DOUBLE_2ADDR: case Instruction::SUB_DOUBLE: op = kA64Fsub3fff; break; case Instruction::DIV_DOUBLE_2ADDR: case Instruction::DIV_DOUBLE: op = kA64Fdiv3fff; break; case Instruction::MUL_DOUBLE_2ADDR: case Instruction::MUL_DOUBLE: op = kA64Fmul3fff; break; case Instruction::REM_DOUBLE_2ADDR: case Instruction::REM_DOUBLE: FlushAllRegs(); // Send everything to home location { RegStorage r_tgt = CallHelperSetup(kQuickFmod); LoadValueDirectWideFixed(rl_src1, rs_d0); LoadValueDirectWideFixed(rl_src2, rs_d1); ClobberCallerSave(); CallHelper(r_tgt, kQuickFmod, false); } rl_result = GetReturnWide(kFPReg); StoreValueWide(rl_dest, rl_result); return; case Instruction::NEG_DOUBLE: GenNegDouble(rl_dest, rl_src1); return; default: LOG(FATAL) << "Unexpected opcode: " << opcode; } rl_src1 = LoadValueWide(rl_src1, kFPReg); DCHECK(rl_src1.wide); rl_src2 = LoadValueWide(rl_src2, kFPReg); DCHECK(rl_src2.wide); rl_result = EvalLoc(rl_dest, kFPReg, true); DCHECK(rl_dest.wide); DCHECK(rl_result.wide); NewLIR3(FWIDE(op), rl_result.reg.GetReg(), rl_src1.reg.GetReg(), rl_src2.reg.GetReg()); StoreValueWide(rl_dest, rl_result); } void Arm64Mir2Lir::GenConversion(Instruction::Code opcode, RegLocation rl_dest, RegLocation rl_src) { int op = kA64Brk1d; RegLocation rl_result; RegisterClass src_reg_class = kInvalidRegClass; RegisterClass dst_reg_class = kInvalidRegClass; switch (opcode) { case Instruction::INT_TO_FLOAT: op = kA64Scvtf2fw; src_reg_class = kCoreReg; dst_reg_class = kFPReg; break; case Instruction::FLOAT_TO_INT: op = kA64Fcvtzs2wf; src_reg_class = kFPReg; dst_reg_class = kCoreReg; break; case Instruction::DOUBLE_TO_FLOAT: op = kA64Fcvt2sS; src_reg_class = kFPReg; dst_reg_class = kFPReg; break; case Instruction::FLOAT_TO_DOUBLE: op = kA64Fcvt2Ss; src_reg_class = kFPReg; dst_reg_class = kFPReg; break; case Instruction::INT_TO_DOUBLE: op = FWIDE(kA64Scvtf2fw); src_reg_class = kCoreReg; dst_reg_class = kFPReg; break; case Instruction::DOUBLE_TO_INT: op = FWIDE(kA64Fcvtzs2wf); src_reg_class = kFPReg; dst_reg_class = kCoreReg; break; case Instruction::LONG_TO_DOUBLE: op = FWIDE(kA64Scvtf2fx); src_reg_class = kCoreReg; dst_reg_class = kFPReg; break; case Instruction::FLOAT_TO_LONG: op = kA64Fcvtzs2xf; src_reg_class = kFPReg; dst_reg_class = kCoreReg; break; case Instruction::LONG_TO_FLOAT: op = kA64Scvtf2fx; src_reg_class = kCoreReg; dst_reg_class = kFPReg; break; case Instruction::DOUBLE_TO_LONG: op = FWIDE(kA64Fcvtzs2xf); src_reg_class = kFPReg; dst_reg_class = kCoreReg; break; default: LOG(FATAL) << "Unexpected opcode: " << opcode; } DCHECK_NE(src_reg_class, kInvalidRegClass); DCHECK_NE(dst_reg_class, kInvalidRegClass); DCHECK_NE(op, kA64Brk1d); if (rl_src.wide) { rl_src = LoadValueWide(rl_src, src_reg_class); } else { rl_src = LoadValue(rl_src, src_reg_class); } rl_result = EvalLoc(rl_dest, dst_reg_class, true); NewLIR2(op, rl_result.reg.GetReg(), rl_src.reg.GetReg()); if (rl_dest.wide) { StoreValueWide(rl_dest, rl_result); } else { StoreValue(rl_dest, rl_result); } } void Arm64Mir2Lir::GenFusedFPCmpBranch(BasicBlock* bb, MIR* mir, bool gt_bias, bool is_double) { LIR* target = &block_label_list_[bb->taken]; RegLocation rl_src1; RegLocation rl_src2; if (is_double) { rl_src1 = mir_graph_->GetSrcWide(mir, 0); rl_src2 = mir_graph_->GetSrcWide(mir, 2); rl_src1 = LoadValueWide(rl_src1, kFPReg); rl_src2 = LoadValueWide(rl_src2, kFPReg); NewLIR2(FWIDE(kA64Fcmp2ff), rl_src1.reg.GetReg(), rl_src2.reg.GetReg()); } else { rl_src1 = mir_graph_->GetSrc(mir, 0); rl_src2 = mir_graph_->GetSrc(mir, 1); rl_src1 = LoadValue(rl_src1, kFPReg); rl_src2 = LoadValue(rl_src2, kFPReg); NewLIR2(kA64Fcmp2ff, rl_src1.reg.GetReg(), rl_src2.reg.GetReg()); } ConditionCode ccode = mir->meta.ccode; switch (ccode) { case kCondEq: case kCondNe: break; case kCondLt: if (gt_bias) { ccode = kCondMi; } break; case kCondLe: if (gt_bias) { ccode = kCondLs; } break; case kCondGt: if (gt_bias) { ccode = kCondHi; } break; case kCondGe: if (gt_bias) { ccode = kCondUge; } break; default: LOG(FATAL) << "Unexpected ccode: " << ccode; } OpCondBranch(ccode, target); } void Arm64Mir2Lir::GenCmpFP(Instruction::Code opcode, RegLocation rl_dest, RegLocation rl_src1, RegLocation rl_src2) { bool is_double = false; int default_result = -1; RegLocation rl_result; switch (opcode) { case Instruction::CMPL_FLOAT: is_double = false; default_result = -1; break; case Instruction::CMPG_FLOAT: is_double = false; default_result = 1; break; case Instruction::CMPL_DOUBLE: is_double = true; default_result = -1; break; case Instruction::CMPG_DOUBLE: is_double = true; default_result = 1; break; default: LOG(FATAL) << "Unexpected opcode: " << opcode; } if (is_double) { rl_src1 = LoadValueWide(rl_src1, kFPReg); rl_src2 = LoadValueWide(rl_src2, kFPReg); // In case result vreg is also a src vreg, break association to avoid useless copy by EvalLoc() ClobberSReg(rl_dest.s_reg_low); rl_result = EvalLoc(rl_dest, kCoreReg, true); LoadConstant(rl_result.reg, default_result); NewLIR2(FWIDE(kA64Fcmp2ff), rl_src1.reg.GetReg(), rl_src2.reg.GetReg()); } else { rl_src1 = LoadValue(rl_src1, kFPReg); rl_src2 = LoadValue(rl_src2, kFPReg); // In case result vreg is also a srcvreg, break association to avoid useless copy by EvalLoc() ClobberSReg(rl_dest.s_reg_low); rl_result = EvalLoc(rl_dest, kCoreReg, true); LoadConstant(rl_result.reg, default_result); NewLIR2(kA64Fcmp2ff, rl_src1.reg.GetReg(), rl_src2.reg.GetReg()); } DCHECK(!rl_result.reg.IsFloat()); // TODO(Arm64): should we rather do this? // csinc wD, wzr, wzr, eq // csneg wD, wD, wD, le // (which requires 2 instructions rather than 3) // Rd = if cond then Rd else -Rd. NewLIR4(kA64Csneg4rrrc, rl_result.reg.GetReg(), rl_result.reg.GetReg(), rl_result.reg.GetReg(), (default_result == 1) ? kArmCondPl : kArmCondLe); NewLIR4(kA64Csel4rrrc, rl_result.reg.GetReg(), rwzr, rl_result.reg.GetReg(), kArmCondEq); StoreValue(rl_dest, rl_result); } void Arm64Mir2Lir::GenNegFloat(RegLocation rl_dest, RegLocation rl_src) { RegLocation rl_result; rl_src = LoadValue(rl_src, kFPReg); rl_result = EvalLoc(rl_dest, kFPReg, true); NewLIR2(kA64Fneg2ff, rl_result.reg.GetReg(), rl_src.reg.GetReg()); StoreValue(rl_dest, rl_result); } void Arm64Mir2Lir::GenNegDouble(RegLocation rl_dest, RegLocation rl_src) { RegLocation rl_result; rl_src = LoadValueWide(rl_src, kFPReg); rl_result = EvalLoc(rl_dest, kFPReg, true); NewLIR2(FWIDE(kA64Fneg2ff), rl_result.reg.GetReg(), rl_src.reg.GetReg()); StoreValueWide(rl_dest, rl_result); } static RegisterClass RegClassForAbsFP(RegLocation rl_src, RegLocation rl_dest) { // If src is in a core reg or, unlikely, dest has been promoted to a core reg, use core reg. if ((rl_src.location == kLocPhysReg && !rl_src.reg.IsFloat()) || (rl_dest.location == kLocPhysReg && !rl_dest.reg.IsFloat())) { return kCoreReg; } // If src is in an fp reg or dest has been promoted to an fp reg, use fp reg. if (rl_src.location == kLocPhysReg || rl_dest.location == kLocPhysReg) { return kFPReg; } // With both src and dest in the stack frame we have to perform load+abs+store. Whether this // is faster using a core reg or fp reg depends on the particular CPU. For example, on A53 // it's faster using core reg while on A57 it's faster with fp reg, the difference being // bigger on the A53. Without further investigation and testing we prefer core register. // (If the result is subsequently used in another fp operation, the dalvik reg will probably // get promoted and that should be handled by the cases above.) return kCoreReg; } bool Arm64Mir2Lir::GenInlinedAbsFloat(CallInfo* info) { if (info->result.location == kLocInvalid) { return true; // Result is unused: inlining successful, no code generated. } RegLocation rl_dest = info->result; RegLocation rl_src = UpdateLoc(info->args[0]); RegisterClass reg_class = RegClassForAbsFP(rl_src, rl_dest); rl_src = LoadValue(rl_src, reg_class); RegLocation rl_result = EvalLoc(rl_dest, reg_class, true); if (reg_class == kFPReg) { NewLIR2(kA64Fabs2ff, rl_result.reg.GetReg(), rl_src.reg.GetReg()); } else { NewLIR4(kA64Ubfm4rrdd, rl_result.reg.GetReg(), rl_src.reg.GetReg(), 0, 30); } StoreValue(rl_dest, rl_result); return true; } bool Arm64Mir2Lir::GenInlinedAbsDouble(CallInfo* info) { if (info->result.location == kLocInvalid) { return true; // Result is unused: inlining successful, no code generated. } RegLocation rl_dest = info->result; RegLocation rl_src = UpdateLocWide(info->args[0]); RegisterClass reg_class = RegClassForAbsFP(rl_src, rl_dest); rl_src = LoadValueWide(rl_src, reg_class); RegLocation rl_result = EvalLoc(rl_dest, reg_class, true); if (reg_class == kFPReg) { NewLIR2(FWIDE(kA64Fabs2ff), rl_result.reg.GetReg(), rl_src.reg.GetReg()); } else { NewLIR4(WIDE(kA64Ubfm4rrdd), rl_result.reg.GetReg(), rl_src.reg.GetReg(), 0, 62); } StoreValueWide(rl_dest, rl_result); return true; } bool Arm64Mir2Lir::GenInlinedSqrt(CallInfo* info) { RegLocation rl_src = info->args[0]; RegLocation rl_dest = InlineTargetWide(info); // double place for result rl_src = LoadValueWide(rl_src, kFPReg); RegLocation rl_result = EvalLoc(rl_dest, kFPReg, true); NewLIR2(FWIDE(kA64Fsqrt2ff), rl_result.reg.GetReg(), rl_src.reg.GetReg()); StoreValueWide(rl_dest, rl_result); return true; } bool Arm64Mir2Lir::GenInlinedCeil(CallInfo* info) { RegLocation rl_src = info->args[0]; RegLocation rl_dest = InlineTargetWide(info); rl_src = LoadValueWide(rl_src, kFPReg); RegLocation rl_result = EvalLoc(rl_dest, kFPReg, true); NewLIR2(FWIDE(kA64Frintp2ff), rl_result.reg.GetReg(), rl_src.reg.GetReg()); StoreValueWide(rl_dest, rl_result); return true; } bool Arm64Mir2Lir::GenInlinedFloor(CallInfo* info) { RegLocation rl_src = info->args[0]; RegLocation rl_dest = InlineTargetWide(info); rl_src = LoadValueWide(rl_src, kFPReg); RegLocation rl_result = EvalLoc(rl_dest, kFPReg, true); NewLIR2(FWIDE(kA64Frintm2ff), rl_result.reg.GetReg(), rl_src.reg.GetReg()); StoreValueWide(rl_dest, rl_result); return true; } bool Arm64Mir2Lir::GenInlinedRint(CallInfo* info) { RegLocation rl_src = info->args[0]; RegLocation rl_dest = InlineTargetWide(info); rl_src = LoadValueWide(rl_src, kFPReg); RegLocation rl_result = EvalLoc(rl_dest, kFPReg, true); NewLIR2(FWIDE(kA64Frintn2ff), rl_result.reg.GetReg(), rl_src.reg.GetReg()); StoreValueWide(rl_dest, rl_result); return true; } bool Arm64Mir2Lir::GenInlinedRound(CallInfo* info, bool is_double) { int32_t encoded_imm = EncodeImmSingle(bit_cast<float, uint32_t>(0.5f)); ArmOpcode wide = (is_double) ? FWIDE(0) : FUNWIDE(0); RegLocation rl_src = info->args[0]; RegLocation rl_dest = (is_double) ? InlineTargetWide(info) : InlineTarget(info); rl_src = (is_double) ? LoadValueWide(rl_src, kFPReg) : LoadValue(rl_src, kFPReg); RegLocation rl_result = EvalLoc(rl_dest, kCoreReg, true); RegStorage r_imm_point5 = (is_double) ? AllocTempDouble() : AllocTempSingle(); RegStorage r_tmp = (is_double) ? AllocTempDouble() : AllocTempSingle(); // 0.5f and 0.5d are encoded in the same way. NewLIR2(kA64Fmov2fI | wide, r_imm_point5.GetReg(), encoded_imm); NewLIR3(kA64Fadd3fff | wide, r_tmp.GetReg(), rl_src.reg.GetReg(), r_imm_point5.GetReg()); NewLIR2((is_double) ? kA64Fcvtms2xS : kA64Fcvtms2ws, rl_result.reg.GetReg(), r_tmp.GetReg()); (is_double) ? StoreValueWide(rl_dest, rl_result) : StoreValue(rl_dest, rl_result); return true; } bool Arm64Mir2Lir::GenInlinedMinMaxFP(CallInfo* info, bool is_min, bool is_double) { DCHECK_EQ(cu_->instruction_set, kArm64); int op = (is_min) ? kA64Fmin3fff : kA64Fmax3fff; ArmOpcode wide = (is_double) ? FWIDE(0) : FUNWIDE(0); RegLocation rl_src1 = info->args[0]; RegLocation rl_src2 = (is_double) ? info->args[2] : info->args[1]; rl_src1 = (is_double) ? LoadValueWide(rl_src1, kFPReg) : LoadValue(rl_src1, kFPReg); rl_src2 = (is_double) ? LoadValueWide(rl_src2, kFPReg) : LoadValue(rl_src2, kFPReg); RegLocation rl_dest = (is_double) ? InlineTargetWide(info) : InlineTarget(info); RegLocation rl_result = EvalLoc(rl_dest, kFPReg, true); NewLIR3(op | wide, rl_result.reg.GetReg(), rl_src1.reg.GetReg(), rl_src2.reg.GetReg()); (is_double) ? StoreValueWide(rl_dest, rl_result) : StoreValue(rl_dest, rl_result); return true; } } // namespace art
Integrated development environments (IDEs) provide a common platform and design tools for modern software development. While software is often the most time-consuming and highest risk aspect of electronic program development, it also holds the greatest potential to enhance a design for multiple target applications. Such design tools allow designers to efficiently develop code where graphical user interfaces (GUI) automate and simplify configuration of complex programming projects. These tools also enable designers to create source code by enhancing code readability and simplifying code writing. For instance, source code editor features may include syntax coloring, auto-indenting and shortcut menus that link stored procedure calls to their definitions, declarations and usages even when these references reside in separate files. Other aspects of the tools include simulation resources to allow designers to develop and debug applications. One area of software development that is performed on IDEs includes mapping class objects to relational objects, referred to as O/R mapping, and is the latest advancement in modern day programming technologies. It improves productivity of programmers by many degrees while providing flexibility to adapt to changing business needs. While O/R technology itself provides many benefits to programmers, enabling O/R classes to be created and set up correctly is not an easy task for normal development nor is it well supported in current programming tools. Without providing adequate tools support, programmers trying to adopt the technology may be forced to write their respective code manually. One purpose driving O/R technologies is the need to interface the relational database world with the models supported in the object oriented programming world. For example, relational database management systems (RDBMS) supporting a relational database pre-dated the popularization of object-oriented programming in the 1990s. Using relational databases to store object-oriented data leads to a semantic gap where programmers would be required to allow their software to function in two different worlds—processing of data would be performed in object-oriented form, but the same data would have to be stored in relational form. Requiring this constant conversion between two different forms of the same data not only had the effect of stifling performance but also imposed difficulties for programmers as relational or object-oriented forms would impose limitations on each other. For example, relational databases make complicated associations difficult, and they tend to “map” poorly into the object-oriented world since they fail to implement the relational model's user-defined types. This problem is sometimes referred to as the Object-Relational impedance mismatch. Generally, relational databases use a series of tables representing simple data, where optional or related information is stored in other tables. A single (persistent object) record in the database often spans several of these tables, and requires a join to collect all of the related information back into a single piece of data for processing. This would be the case for an address book example, which would likely include at least a user and address table, but perhaps even a phone number table as well. In the object world, there is a clear sense of “ownership,” where a particular person object owns a particular phone number in the above example. This is not the case in relational databases, where the tables have no understanding how they relate to other tables at a fundamental level. Instead, the user must construct a “query” to gather information together. Queries not only request what information to return but also need to know how the tables involved are related to each other, illustrating the point that tables do not know their relationships when they are residing in the database. Thus, these relationships are typically only known when a query is run to specify the relationships. Relational databases (which attempt to implement the Relational Model), do maintain relationships via constraints but the Structured Query Language (SQL), for example, is generally unaware of these. When creating Object/Relational (O/R) classes by mapping class objects to database objects, it is important to also set correct associations between related objects so that applications written on top of these objects can easily take advantage of such relationships. Hand coding such relationship is not a trivial task for typical developers. While the O/R technology itself provides many benefits to programmers, manually having O/R classes created and set up correctly is not a straightforward or simple task. With current development tools support, programmers trying to adopt O/R technology are often forced to write code manually which detracts from the utility of such tools.
The foramen lacerum--a route of access to the cranial cavity for malignant tumours below the skull base. Thirteen malignant neoplasms (seven different tumour types) arising in the postnasal space or surrounding soft tissues extended upwards through the skull base into the middle cranial fossa. Gadolinium-enhanced magnetic resonance imaging (GdMRI) clearly revealed the route of the tumour into the cavernous sinus, parasellar region and floor of the middle cranial fossa. Since this extension alters both management and prognosis, GdMRI in the coronal plane is a necessary investigation for persistent and unexplained facial pain in order to demonstrate such lesions of the trigeminal nerve. Differentiation between neoplasms and aggressive inflammatory disease may be difficult.
#include "memory.h" int simplet_retain(simplet_retainable_t *obj) { obj->refcount++; return obj->refcount; } int simplet_release(simplet_retainable_t *obj) { obj->refcount--; return obj->refcount; }
IN THE COURT OF CRIMINAL APPEALS OF TENNESSEE AT KNOXVILLE Assigned on Briefs June 29, 2010 ROBERT CLAY PRIEST v. STATE OF TENNESSEE Appeal from the Circuit Court for Blount County No. C-17077 Jon Kerry Blackwood, Senior Judge No. E2009-02137-CCA-R3-PC - Filed September 14, 2010 The petitioner, Robert Clay Priest, who pleaded guilty in the Blount County Circuit Court to multiple offenses and was sentenced to 29 years’ confinement, appeals from that court’s dismissal of his petition for post-conviction relief. On appeal, he claims that he was mentally incompetent to enter into a plea agreement, that the trial court failed to ask him to enter a guilty plea, and that the post-conviction court erroneously excluded his expert witness. We discern no error and affirm the order of the circuit court. Tenn. R. App. P. 3; Judgment of the Circuit Court Affirmed J AMES C URWOOD W ITT, J R., J., delivered the opinion of the Court, in which N ORMA M CG EE O GLE, J., joined. D. K ELLY T HOMAS, J R., J., not participating. Robert L. Huddleston, Knoxville, Tennessee, for the appellant, Robert Clay Priest. Robert E. Cooper, Jr., Attorney General and Reporter; Sophia S. Lee, Assistant Attorney General; Michael L. Flynn, District Attorney General; and Tammy Harrington, Assistant District Attorney General, for the appellee, State of Tennessee. OPINION On November 13, 2006, the petitioner entered guilty pleas to counts of especially aggravated robbery, aggravated robbery, aggravated burglary, attempted aggravated kidnapping, and burglary. The circuit court imposed a total effective sentence of 29 years. On December 14, 2007, the petitioner filed in the circuit court the petition for post-conviction relief now at issue. The post-conviction court appointed counsel for the petitioner and conducted an evidentiary hearing. A transcript of the petitioner’s competency and plea submission hearing was exhibited to the post-conviction hearing. From the State’s rendering of a factual basis for the pleas, we glean the following summary of the charged offenses: [O]n May [25,] 2005, [the petitioner] along with Bobby Bain burglarized a house under construction located in the same area, prior to the burglary of the Teffeteller residence. ... Sometime after that burglary, . . . Mr. Bain and [the petitioner] entered the home of Leslie and Betty Jane Teffeteller. That was done, according to [the petitioner], by breaking out a pane glass window in the back door . . . . [The victims testified at the preliminary hearing] that they were awakened by two individuals standing on either side of their beds, including Ms. Teffeteller[’s] saying that something was put to her head, which she was led to believe was a gun, and the statement was made demanding keys, money from both the Teffetellers. A struggle ensued . . . . Mr. Teffeteller . . . began to combat his assailants [with a hammer]. There was quite a bit of injury to Mr. Teffeteller, as well as Mr. Bain and [the petitioner] were injured . . . . Mr. Teffeteller was able to fight off his assailants. [The petitioner] was in the kitchen with Betty Teffeteller, asked for money, which she gave him from her purse. And then, according to Ms. Teffeteller, he then attempted to tie her hands behind her back as they were leaving. But the rope – I should say the belt then fell away . . . . She was not restrained for any significant period of time. After they left the residence, . . . they did try to gain access and take the Teffeteller’s van. An alarm went off, a neighbor came out and they fled the premises. [The petitioner] was later found on a pay phone at a gas station . . . [and] made spontaneous statements . . . that he didn’t mean to hurt them, that – basically admitted that he was there. In the post-conviction evidentiary hearing, the petitioner testified that he was diagnosed with mental illness at the age of eight and had been in several mental hospitals within the State of Tennessee including Vanderbilt, St. Francis, Moccasin Bend, Peninsula, -2- Lakeshore, and Middle Tennessee Mental Health Institute. At the time of the post-conviction proceeding, he was incarcerated in the Lois M. DeBerry Special Needs Facility (“Lois M. DeBerry”) within the Tennessee Department of Correction. The petitioner testified that while incarcerated at Lois M. DeBerry, the medication that he was taking, Risperdal, caused him to “trip” and made him “temporarily insane.” He was taken off of this medication and refused to take his new medication, Vistaril, because the drug caused him “more mental problems” than when he was without it. The petitioner testified that he pleaded guilty to the crimes because he was “under a lot of stress” and that he had been intimidated by police officers in the county jail. He also testified that his lawyer told him that if he did not take the plea, he would be charged with possessing child pornography that had been found on his accomplice’s computer. The petitioner stated that he did not clearly recall the day that he submitted his guilty plea. He claimed that he remembered speaking with his lawyer but that most of his recollection came from reading the transcript. He testified that he recalled his lawyer’s telling him that the lawyer did not believe that the petitioner was competent to stand trial. He recalled the mental evaluation done at Lakeshore, but he did not clearly recall the evaluation done at Vanderbilt that concluded that he was competent to stand trial. The petitioner stated that he could not have been convicted of especially aggravated robbery because there were no serious injuries or of the crime of “robbery because robbery is the theft at the body of another.” The petitioner claims that he was “railroaded due to the political clout that these victims had.” He testified that he changed his mind about going to trial because the officers in the jail were having other inmates beat him and were putting things in his food. The petitioner asked the court to allow him to withdraw the guilty pleas and give him a trial on the merits. On cross-examination, the petitioner claimed that his lawyer “didn’t do what he should have done.” He claimed he asked his lawyer to get him transferred to another jail because the family of the victims worked there and tried to intimidate him. He claimed he also asked his lawyer to get a change of venue “due to the publicity.” The petitioner testified that he was given copies of everything that his lawyer had. He claimed, “I don’t remember nothing at the plea. I remember reading – I got all the paperwork.” The petitioner testified that, as a result of the pleas, two cases pending in -3- general sessions court for aggravated perjury and aggravated assault were dismissed. The petitioner’s trial counsel testified that he recalled the petitioner’s three- month commitment to Lakeshore, as well as the subsequent determination by Vanderbilt that the petitioner was neither insane nor incompetent and that he was malingering. Counsel testified that he had 29 contacts with the petitioner and opined that the petitioner was able to communicate effectively with counsel. Counsel testified that there was insufficient “tainting of the [jury] pool to do a change of venue.” Counsel testified that the petitioner could have received a sentence of 53 years if he had gone to trial and that the petitioner asked counsel to initiate plea negotiations with the State. Counsel stated that the case against the petitioner was overwhelming and that the only defense was insanity, based on the Lakeshore report. Counsel testified that the petitioner thought it would be in his best interest to take the plea because the risks were too great to go to trial. He testified that the risk of a poor outcome at trial was heightened by the possibility that the jury would be sympathetic with the elderly victims whose home was invaded. Counsel also testified that the petitioner said that he wanted to go from jail to prison because it would be “nicer.” The evaluative reports from Lakeshore and Vanderbilt were exhibited to the post-conviction hearing. The post-conviction court entered written factual findings and conclusions of law. The court found that trial counsel had obtained a pretrial mental evaluation of the petitioner which resulted in Lakeshore’s determinations that he was incompetent to stand trial and that a defense of insanity could be supported. The State requested further pretrial evaluation, and the trial court ordered an evaluation at Vanderbilt which resulted in determinations that the petitioner was competent to stand trial and that a defense of insanity was unsupportable. The post-conviction court further found that the petitioner was not a credible witness. It found that trial counsel “recognized the need for a mental evaluation of petitioner and took all appropriate steps to pursue a defense based upon a mental condition.” The court found that trial counsel conducted numerous interviews of the petitioner and believed him to be lucid and to understand the proceedings. The court found that trial counsel provided the petitioner with copies of the discovery materials and discussed with the petitioner the possibilities for trial strategy, including the use of an insanity defense. The court found that no undue publicity had occurred that would have warranted a change of venue. Finding that -4- the petitioner requested his counsel to pursue plea negotiations, trial counsel obtained a plea offer that entailed the reduction of the Class A felony charge of especially aggravated robbery to a Class B felony with a release eligibility of 30 percent. The court found that the plea colloquy was thorough and detailed. Based upon these findings, the post-conviction court concluded that the pleas were knowingly and voluntarily entered and that the petitioner received the effective assistance of trial counsel. From this determination, the petitioner filed a timely appeal. On appeal, the petitioner claims that his diminished mental capacity invalidated his guilty pleas as a matter of due process of law, that the guilty pleas were not effectively submitted, and that the post-conviction court erred in disallowing expert testimony about the adequacy of the conviction court’s inquiry into the petitioner’s competency to submit guilty pleas. The post-conviction petitioner bears the burden of proving his or her allegations by clear and convincing evidence. T.C.A. § 40-30-110(f) (2006). On appeal, the appellate court accords to the post-conviction court’s findings of fact the weight of a jury verdict, and these findings are conclusive on appeal unless the evidence preponderates against them. Henley v. State, 960 S.W.2d 572, 578-79 (Tenn. 1997); Bates v. State, 973 S.W.2d 615, 631 (Tenn. Crim. App. 1997). The appellate court defers to the post-conviction court’s resolution of credibility issues. See Massey v. State, 929 S.W.2d 399, 403 (Tenn. Crim. App. 1996); Taylor v. State, 875 S.W.2d 684, 686 (Tenn. Crim. App. 1993). By contrast, the post-conviction court’s conclusions of law receive no deference or presumption of correctness on appeal. Fields v. State, 40 S.W.3d 450, 453 (Tenn. 2001). First, we address the petitioner’s claim that, based upon his diminished mental capacity, principles of due process precluded the entry of valid guilty pleas. He posits that the transcripts of the pre-plea competency hearing and the post-conviction evidentiary hearing evince his incompetency at the time the pleas were submitted. Our supreme court, in setting forth the standard for identifying a constitutionally valid guilty plea, has noted that “before a trial judge can accept a guilty plea, there must be an affirmative showing that it was given intelligently and voluntarily.” State v. Pettus, 986 S.W.2d 540, 542 (Tenn. 1999) (citing Boykin v. Alabama, 395 U.S. 238, 242 (1969)). Our high court has noted that “a plea is not ‘voluntary’ if it is the product of ‘[i]gnorance, incomprehension, coercion, terror, inducements, [or] subtle or blatant threats,’” Blankenship v. State, 858 S.W.2d 897, 904 (Tenn. 1993) (quoting Boykin, 395 U.S. at 242-43), or if the defendant was “incompetent or otherwise not in control of his mental facilities” when the plea was entered, id. “It is a fundamental principle of our system of -5- criminal justice that one who is charged with a crime cannot be required to plead to the offense, be put to trial, convicted, or sentenced while insane or otherwise mentally incompetent.” Berndt v. State, 733 S.W.2d 119, 121 (Tenn. Crim. App. 1987) (citing Pate v. Robinson, 383 U.S. 375 (1966); Drope v. Missouri, 420 U.S. 162 (1975); State v. Stacy, 556 S.W.2d 552 (Tenn. Crim. App. 1977); Mackey v. State, 537 S.W.2d 704 (Tenn. Crim. App. 1975)). “The conviction of an accused while mentally incompetent violates the basic concepts of the Due Process Clause of the Fourteenth Amendment to the United States Constitution. Such a conviction also violates Article I, Section 8 of the Tennessee Constitution.” Berndt, 733 S.W.2d at 122 (internal citations omitted). Furthermore, The standard for determining the competency of an accused to stand trial, i.e. the capacity to understand the nature and object of the proceedings, consult with counsel, and assist in the preparation of his or her defense, is the same standard to be applied in determining the competency of an accused to plead guilty or nolo contendere. A person who has been found competent to stand trial has the requisite mental competence to waive his or her rights and enter a plea of guilty or nolo contendere. This is the prevailing view in this country. Id. at 123. First, we address the claim that the petitioner’s testimony in the post-conviction hearing supports the claim of his mental debility at the time of plea submission. On this point, we must defer to the post-conviction court’s resolution of credibility issues, and in this case, the post-conviction court found that the petitioner was not credible. Second, we remind the petitioner that the proceeding below was not a direct action to obtain leave to withdraw his guilty pleas; it was a post-conviction proceeding. As such, the petitioner bore the burden of establishing his claims by clear and convincing evidence. See State v. Antonio Demonte Lyons, No. 01C01-9508-CR-00263 (Tenn. Crim. App., Nashville, Aug. 15, 1997) (distinguishing between challenges to guilty pleas brought through a petition for post-conviction relief, on the one hand, and through a motion to withdraw a guilty plea via Tennessee Rule of Criminal Procedure 32(f), on the other, and stating that the standards for a Rule 32(f) avoidance of a guilty plea are less stringent than the standard for post-conviction proceeding). Other than the evaluative reports from Lakeshore and Vanderbilt, which essentially are in conflict, and the petitioner’s testimony in the pre-plea competency hearing, no credible evidence of record really addresses the issue. Although the record shows that the petitioner amassed a long history of mental health treatment, the extensive Vanderbilt report, issued just a week prior to the competency and -6- plea submission hearing, diagnosed the petitioner as a malingerer who exhibited merely an antisocial personality disorder with borderline traits and who was competent to stand trial and who appreciated the nature and wrongfulness of his criminal conduct. From our review of the transcript of the trial court’s voir dire of the petitioner for the purpose of determining his competency to waive his rights and submit a guilty plea, we cannot say that the court’s conclusion that the petitioner was competent is unsupported in the record. Under the circumstances of this case, we agree with the post-conviction court that the petitioner failed to establish by clear and convincing evidence that he was not competent to validly waive his constitutional rights and enter guilty pleas. In the petitioner’s next issue, he claims that his convictions are invalid because the trial court failed to ask him in the plea-submission hearing whether he in fact was pleading guilty to the charges. Unfortunately for the petitioner, this issue recently has been settled by our supreme court. In Jeffery Aaron Lane v. State, --- S.W.3d ---, No. E2007-00032-SC-R11-PC (Tenn., Knoxville, July 14, 2010), the court held that, when a trial court “substantially complied with the federal and Tennessee guilty plea mandates with its questions and the defendant affirmatively answered these questions,” a valid, knowing, voluntary, and intelligent guilty plea resulted despite that the trial court did not specifically ask the defendant whether he was pleading guilty. Id. at ---, slip op. at 14. In the present case, we hold that the trial court substantially complied with the law in questioning and advising the petitioner concerning his plea agreement.1 In his final issue, the petitioner asserts that the post-conviction court erred in disallowing the expert testimony of an attorney concerning the adequacy of the trial court’s pre-plea competency hearing. We decline to review the issue because the petitioner did not comply with Tennessee Rule of Evidence 103; the petitioner did not proffer the testimony of the attorney expert. “Error may not be predicated upon a ruling which . . . excludes evidence unless a substantial right of the party is affected, and . . . the substance of the evidence and the specific evidentiary basis supporting admission were made known to the court by offer or were apparent from the context.” Tenn. R. Evid. 103(a)(2). In the present case, counsel for the petitioner merely described the purpose of the proposed testimony in stating that it 1 In so holding, we do not wish to imply that non-constitutional elements in a plea litany may ipso facto form the basis for a post-conviction claim. See T.C.A. § 40-30-103; see also, e.g., Casey Skelton v. State, No. E2007-02818-CCA-R3-CD (Tenn. Crim. App., Knoxville, Aug. 28, 2008). -7- “would address the sufficiency of [the trial judge’s] questioning in order to assess the competency of [the petitioner] on the day of the plea.” Lacking a proffer of the expert testimony, we cannot discern how or to what extent the proposed testimony would have addressed the sufficiency of the competency hearing, whether it would have substantially assisted the post-conviction court, see Tenn. R. Evid. 702, or whether the facts or data utilized by the proposed expert met the requirements of Tennessee Rule of Evidence 703. Also, we cannot know without a proffer whether some issue, unrevealed in the competency hearing, could have emerged through the proposed expert and altered the perception of the competency inquiry. Accordingly, error may not be predicated upon the exclusion of this evidence. At any rate, we doubt that a substantial right of the petitioner was at stake as required by Rule 103(a). The post-conviction court and this court have both reviewed the transcript of the competency hearing and the evaluative reports. As we noted above, the record evinces a basis for the trial court’s determination of competency. In view of the foregoing analysis, we affirm the order of the post-conviction court. _________________________________ JAMES CURWOOD WITT, JR., JUDGE -8-
CDVSA Awards $18.8 million to support community-based grants FY 20 community-based grants have been awarded to 26 agencies in 21 Alaska communities focusing on services to victims of domestic and sexual violence and other violent crimes, perpetrator rehabilitation and prevention strategies and interventions. This funding amount equals an increase of $422,518 from FY19. Did you report a sexual assault to the Alaska State Troopers between 2006 and 2016? Were you 18 years or older at the time of the assault? The Department of Public Safety and the UAA Justice Center have partnered to research practices related to sexual assault investigation, prosecution, and victim-survivor engagement and support. To be part of this project click on the link above.
CANBERRA, Australia -Australian Home Affairs Minister Peter Dutton has announced he plans to examine ways to fast-track a visa program for white South African farmers. The decision comes in the wake of newly-elected South African President Cyril Ramaphosa's apparent plan to appropriate white-owned South African farms and redistribute the land to black South Africans. Ramaphosa's plan would exclude white South Africans from receiving any compensation for their appropriated land. In addition, Sky News Australia reported that white South Africans are being murdered at a rate of more than one per week, according to News Corp Australia chief Paul Toohey, who travelled to South Africa to investigate. In the wake of such claims, Dutton suggested to the media that a humanitarian visa may be what is needed. Australia's home affairs page states a total of 13,765 visas were granted under the annual Humanitarian Program from 2015 to 2016. Under the current system, a refugee would first need to be referred by the United Nations High Commissioner for Refugees to the Australian government. Dutton's call for a white South African visa program is a shift away from Australia's widely criticized handling of refugees on Manus Island late last year, when hundreds of males were herded onto a small strip of land under the control of Papua New Guinea. The Associated Press reported in November 2017 that Australia's use of the island as a male housing sector for refugees was ruled unconstitutional by the government of Papua New Guinea, thus effectively shutting it down. Refugees initially refused to leave, choosing to live in squalid conditions, without running water and adequate shelter. The mainly South East Asian and Arab refugees only vacated the refugee center on the island when local authorities threatened force.
Former Footy Show host James Brayshaw is confirmed to join Seven’s AFL commentary team for Saturday Night Football. He will share the call of the game with Luke Darcy, Cameron Ling, Matthew Richardson Sam Lane and Sam McClure. Seven Melbourne Managing Director Lewis Martin said: “Channel 7 is delighted to welcome James back to where his sporting commentary career began. James knows AFL inside out, and will bring tremendous energy and passion for the game to our screens.” Related
Q: count the frequency of items within a list based off a different implementation of the equals method I am using Collections.frequency() to count the frequency of objects within a list. I overrode the equals method. My use case object is a MenuItem. The equals method it checks whether the name and other properties are all equal before returning true. This works if that is the type of equals I want. Sometimes I want to check whether they are equal based on the MenuItem id. My issue is, having already implemented the equals method, I cannot use this with Collection.frequency(). How can I count the frequency of items within a list based on a different implementation of the equals method? thank you Stefano A: here is the implementation of java.util.Collections#frequency public static int frequency(Collection<?> c, Object o) { int result = 0; if (o == null) { for (Object e : c) if (e == null) result++; } else { for (Object e : c) if (o.equals(e)) result++; } return result; } it isn't that complex. You could create your own CollectionUtils class and define a method to get the frequency of a collection that accepts a Comparator as a parameter public static <T> int frequency(Collection<T> c, T o, Comparator<? super T> comp) { int result = 0; if (o == null) { for (Object e : c) if (e == null) result++; } else { for (T e : c) if (comp.compare(e,o) == 0) result++; } return result; }
Beliefs and Prejudices Versus Knowledge and Awareness: How to Cope Stigma Against Mental Illness. A College Staff E-survey. The aims of this study were to collect information about attitudes toward mental illness from the staff of Brescia University, and to detect predictors of issues regarding mental disorders and evaluate their relationship with public stigma. The study involved 1079 people and each participant received a letter explaining the purpose of the e-research. Four hundred and eighty-six people completed the questionnaires. The results showed that those who had a higher level of education, a personal life experience with mental disorders and a higher professional role were more likely to develop behaviours of acceptance toward the mentally ill. Factor analysis of the CAMI showed three main factors: Social distance and isolation, Social integration, Social responsibility and tolerance. Through the structural equation model it was found that the latent construct stigma was mainly defined by the first factor. From this study it emerged that education and personal contact were protective factors against public stigma.
# The MIT License # # Copyright (c) 2004-2009, Sun Microsystems, Inc., Kohsuke Kawaguchi # # Permission is hereby granted, free of charge, to any person obtaining a copy # of this software and associated documentation files (the "Software"), to deal # in the Software without restriction, including without limitation the rights # to use, copy, modify, merge, publish, distribute, sublicense, and/or sell # copies of the Software, and to permit persons to whom the Software is # furnished to do so, subject to the following conditions: # # The above copyright notice and this permission notice shall be included in # all copies or substantial portions of the Software. # # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR # IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, # FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE # AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER # LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, # OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN # THE SOFTWARE. Jobs=Jobs Use\ a\ regular\ expression\ to\ include\ jobs\ into\ the\ view=Regulären Ausdruck verwenden, um Jobs für diese Ansicht auszuwählen. Recurse\ in\ subfolders=Unterverzeichnisse rekursiv durchsuchen Regular\ expression=Regulärer Ausdruck Columns=Spalten Add\ column=Spalte hinzufügen All\ selected\ jobs=Alle ausgewählten Jobs Disabled\ jobs\ only=Nur deaktivierte Jobs Enabled\ jobs\ only=Nur aktivierte Jobs Job\ Filters=Job Filter Add\ Job\ Filter=Job Filter hinzufügen Status\ Filter=Status-Filter
The Tumut High School Burrabinya students attended the Brungle Yarning Space, which is located behind the Brungle Health Centre in Adams St, Brungle. Burrabinya – Leap to your future program takes its name from the meaning to ‘Leap or Jump’ as defined in the Wiradjuri Dictionary written by Stan Grant Snr. The purpose of the excursion was to provide students with a practical cultural experience, through the creation of a Youth focused shelter within the Yarning Space site. Students were clearing the site of debris when Alyssa discovered a tiny frog at the bottom of a freshly dug fire pit. The frog was a very pale grey and pink in colour and was not moving very well. Alyssa had put the frog into a clear plastic cup, with some grass and water to keep it moist and placed it under a tree whilst she continued work. At lunchtime, all the participants gathered at the Health Centre, where the frog was brought out for all to look at and possibly identify and we noticed the frog had changed colour to yellow and black. Luke Penrith, Yarning Space Project Manager, took some photos and sent them to Shane Herrington, a NSW National Parks and Wildlife Service Ranger for the local area and Brungle local himself to be identified. Shane was able to identify the frog as being a Southern Corroboree Frog, a near extinct species in the wild, with only isolated specimens having been identified in the local area. It is known that this particular species of frog cannot jump very high, and if Alyssa had not spotted it whilst taking photographs for the project, the frog may have perished. Shane advised to release the frog into a local creek nearby, which was done at the end of the day, when rain ceased construction. The little guy stole our show and our hearts this week. The general comments from Aunty Sophie, Luke and Michael Lucas, Cooee Cottage was that it was a serendipitous moment when the students found a Corroboree frog on a sacred Aboriginal site (Brungle) while participating in Burrabinya (meaning to leap or jump). The Burrabinya program, delivered by COMPACT Inc. is funded through the Dept Prime Minister and Cabinet – Indigenous Advancement Strategy – Children and Schooling Program and will continue in 2018. Key objectives of Burrabinya is Building the capacity of Aboriginal students through connection with cultural identity and community to develop the confidence, skills, knowledge and understanding required to reach their full potential in employment and education.
32 Ill. App.3d 691 (1975) 336 N.E.2d 199 THE PEOPLE OF THE STATE OF ILLINOIS, Plaintiff-Appellee, v. JAMES LEROY ENGLISH et al., Defendants-Appellants. Nos. 74-165, 74-166 cons. Illinois Appellate Court — Fifth District. September 26, 1975. *692 Paul Bradley, James R. Streicker, and Lynn Sara Frackman, all of State Appellate Defender's Office, of Chicago, for appellants. Nicholas G. Byron, State's Attorney, of Edwardsville (Bruoe D. Irish and Myra J. Brown, both of Illinois State's Attorneys Association, of counsel), for the People. Judgment affirmed. Mr. JUSTICE KARNS delivered the opinion of the court: Defendants-appellants, William Howard Hayes and James Leroy English, were convicted of armed robbery after a jury trial in Madison County. Hayes was sentenced to from 6 to 12 years' imprisonment and English from 12 to 20 years. On appeal, each defendant contends that he was not proved guilty beyond a reasonable doubt and that the court erred in failing to grant a mistrial when evidence of crimes other than the subject of the instant prosecution was brought before the jury. English further contends that the sentence of from 12 to 20 years is excessive. The incident arose when the two defendants and a third defendant, Roxanne Howard English, arrived at the home of Charles and Dani Reisinger, to collect money owed to Roxanne by Dani. James and Roxanne English had gone to the Reisinger home the previous night but had been sent away by Charles, who was armed with a shotgun. The three defendants arrived the next morning and pushed their way into the apartment after Dani had denied them entrance. Hayes was armed with a sawed-off shotgun and James English with a pistol. Mr. and Mrs. Reisinger *693 testified that both Hayes and James English threatened them and that English took money from Charles Reisinger. When Dani attempted to prevent this, she was struck on the head with the pistol by English. As soon as the three left, the Reisingers called the police. Roxanne English was the only witness for the defense. She denied that threats were made and stated that no violence occurred until after Charles Reisinger had given her, and not her husband, James, the money voluntarily. At that point, Dani Reisinger became hysterical and attempted to strike James and Roxanne. To protect Roxanne, James then struck Dani. According to Roxanne, Hayes did not display the shotgun until after this violence had occurred, although she admitted that English held his pistol in plain view throughout the incident. At the time of the robbery neither Charles or Dani Reisinger was armed. Both Reisingers identified Hayes and Roxanne English and the defense stipulated to the identification of James English who was voluntarily absent from the trial. The defense also stipulated that the three defendants were arrested a short distance from the scene and that a subsequent search of Roxanne revealed two shotgun shells taken from the Reisinger home and $107 in cash. A search of the car disclosed the pistol and shotgun. • 1, 2 We believe there was sufficient evidence to prove beyond a reasonable doubt that the defendants took money from the person or presence of Charles Reisinger by the use of force or the threat of the imminent use of force and while armed with dangerous weapons and thus committed armed robbery. (Ill. Rev. Stat. 1973, ch. 38, par. 18-2.) Although there were several contradictions and discrepancies in the testimony of the witnesses, there was sufficient evidence, if believed by the jury, to convict. It is the duty of the trier of fact to judge the credibility of the witnesses and to determine the weight their testimony is to be afforded. This court will not disturb the jury's findings unless the verdict is so palpably contrary to the weight of the evidence or the evidence so unsatisfactory as to create a reasonable doubt of guilt. (People v. Clark, 52 Ill.2d 374, 288 N.E.2d 363 (1972); People v. Crews, 38 Ill.2d 331, 231 N.E.2d 451 (1967).) Although not strenuously argued by the defendants, it is suggested that the existence of the debt owed to the defendants by the victims should be considered in our decision. Even assuming that the debt alluded to was valid, it is the law and policy of this State that a creditor may not employ violence, threats, or weapons to collect the debt but should pursue his remedies in the normal channels of peaceful and legal redress. (People v. Uselding, 107 Ill. App.2d 305, 247 N.E.2d 35 (1969); People v. Williams, 118 Ill. App.2d 341, 225 N.E.2d 44 (1969). • 3 Defendant Hayes contends that his accountability for the acts of *694 James English was not proved beyond a reasonable doubt. This argument apparently relies solely on the verity of the testimony of Roxanne English. As we have noted, however, the jury could reasonably believe the testimony of the Reisingers that Hayes brandished the shotgun and threatened Charles Reisinger with immediate violence. Thus the only act in which he did not take part was the physical removal of the money from Reisinger, which was accomplished solely by either James or Roxanne English. In addition, Hayes departed with the other defendants and in no way attempted to dissuade them from their course of conduct. The jury had ample evidence to convict defendant as a principal without employing principles of accountability. But in the instant case, the jury was properly instructed both on the elements of the offense and on the principles of accountability and properly could have returned the verdict complained of. • 4 Defendants next contend that they were denied a fair trial by the introduction of evidence of the commission of offenses other than that which was the subject of the prosecution. During the direct testimony of Charles Reisinger, the State asked if Reisinger had made any statements to the defendants on the night before the robbery. Reisinger responded, "That I didn't want them selling speed out of my apartment." The State immediately stopped him and attempted to elicit an answer concerning the gun Reisinger was holding but an objection was sustained that the question was leading. Out of the presence of the jury all defendants moved for mistrial because of the introduction of evidence of unrelated offenses. The State explained that the purpose of the question was to negate a statement by the defense in opening argument that Reisinger had threatened the defendants with the shotgun the night before the robbery and that the State did not expect the answer that was given. The State further noted that the subject of drugs was brought up during voir dire to determine if the jury would be prejudiced by the evidence of drug use. Although the voir dire was not transcribed and is not a part of the record, the only defense response to this statement was that only the State made such an inquiry of prospective jurors. The court denied the motions for mistrial but admonished the jury that it should not consider in any way the statement made by the witness. While there is no doubt that reference to offenses other than those being prosecuted is error (People v. Stadtman, 59 Ill.2d 229, 319 N.E.2d 813 (1974)), we do not believe that Reisinger's statement in the instant case requires reversal. There is no evidence in the record to support defendant's contention that the State intentionally elicited the answer from the witness. In addition, several other references to drug usage by the victims, elicited both by the State and the defense, coupled with the uncontradicted *695 statement of the prosecutor that the jury had been cautioned about drug involvement at voir dire and the unavoidable implication throughout that the debt owed related to narcotics, rendered Reisinger's statement harmless error beyond a reasonable doubt in the face of the overwhelming evidence of guilt. See People v. Wilson, 51 Ill.2d 302, 281 N.E.2d 626 (1972). • 5 Defendant James English finally contends that his sentence of from 12 to 20 years' imprisonment is excessive. While the sentence is severe, we believe that it is fully justified by the record. The presentence report reveals several prior felony and misdemeanor convictions and a consistent pattern of antisocial and illegal conduct spanning almost 15 years. The evidence adduced at trial indicates that defendant was the instigator of the instant offense, one of a very serious nature due to the inherent risk to human life. The offense was aggravated when defendant needlessly struck Mrs. Reisinger in the head with a pistol causing an injury requiring medical treatment. We believe that the trial court adequately determined that a sentence greater than the minimum provided by statute was necessary for the protection of the public and that the court did not abuse its discretion in imposing sentence. People v. Van Gilder, 26 Ill. App.3d 152, 324 N.E.2d 715 (1975). The judgment of the Circuit Court of Madison County is affirmed. Affirmed. EBERSPACHER, J., concurs. Mr. JUSTICE GEORGE J. MORAN, specially concurring: I concur in the result reached in this case; however, I disagree with the rationale of People v. Van Gilder, cited by the majority, because it relies on cases antedating the Illinois Constitution of 1970. In People v. Simmons, 60 Ill.2d 173, 326 N.E.2d 383 (1975), our supreme court said: "Because the circuit court may reinstate the judgment of conviction, it is necessary to consider defendant's contention that the sentences imposed were excessive. Most of the cases cited by the People in support of its argument that the sentences were not excessive antedate the Constitution of 1970, which provides: `All penalties shall be determined both according to the seriousness of the offense and with the objective of restoring the offender to useful citizenship.' Ill. Const. (1970), art. I, sec. 11." 60 Ill.2d 173, 182.