text
stringlengths 8
5.77M
|
---|
Search This Blog
Filipino-American Coalition of Florida Supports House Res. 121
I went on an amazing weekend conference to West Palm Beach and met with several of the key Filipino American leaders in the state of Florida who represent over 85,000 Filipino American constituents. I was so impressed with their dedication and their agenda concerning the Filipino Veterans Equity Bill, the Immigration Bill and the development of disaster action plans to support local residents in the preparation for and aftermath of hurricanes as well as an outreach program to natural disasters in their ancestral land, the islands of the Philippines. Most exciting is the leadership's desire to educate their communities on the upcoming presidential candidates, the issues and their creation of an action plan to raise voter participation among the Filipino American community in the state of Florida. They are hoping to join forces with the larger Asian Pacific American voting community and working to make some strong and positive changes.
I felt at ease sharing with them the stories of the lolas. Many of the leaders identified with the stories of Lolas Remedios, Prescilla, and Cristeta for they too were children of Leyte. They were in awe because they admitted that growing up there, they had not heard these stories. Of course, the women had been silent for 50 years after the war. Many of us never knew of their stories until recently.
I suppose this is why it is so important to share their lives and their fight for justice. People don't know, but once you hear the stories, like the key leaders of the Filipino-American Coalition of Florida, your hearts go ablaze, and you know the right thing to do.
Here is their hand-written letter to House Speaker Pelosi. Another letter is being drafted to all Congress persons in the state of Florida. And leaders have promised to educate their communities and begin their own letter writing campaigns.
The organizations of the Filipino American Coalition of Florida are also joining 121 Coalition in support of House Resolution 121.
On Behalf of the Filipino-American communities in Florida, which make up one of the fastest growing populations in the state, we would like to urge your good office to support House Resolution 121, encouraging Japan to take full responsibility and make a formal apology to the 200,000 women and girls of Asia who were subjected to systematic rape and enslavement during WW2, from the Japanese Imperial Army.
Sending a clear message that the trauma inflicted upon these "comfort women" is intolerable, inhumane and unjust -- is the least we can do to make up for the atrocities.
Sincerely,
Filipino-American Coalition of Florida
Council for Filipino American Organizations (representing ten Filipino American organizations)
Bataan Corregidor Memorial Foundation
Fil-Am Council of North East Florida (representing 9 Filipino American Organizations)
No. I think they want to make sure they have the House's full support. This is a critical time for House Res 121. It is extremely important that constituents write their Congress man or woman and ask them to co-sponsor the bill and to tell them why it is so important. This is a good time for the Filipino American community at large to unite and support our lolas -- and to carry on this respect for our elders by supporting the Filipino Veteran's Equity Bill too.
So if you could encourage your friends and family and colleagues to write Congress, I'd appreciate it.
Popular Posts
Maria Rosa Henson, or Lola Rosa, was the first Filipina Comfort Woman of WWII to come forward publicly on September 12, 1992. Because of Lola Rosa, many other Filipinas who had been living with this secret for over 50 years found the courage to come forward and finally speak their truth, finally ask for their apology, finally free themselves from the stories.
Here is an excerpt from her book, COMFORT WOMAN: Slave of Destiny (Philippine Center for Investigative Journalism, 1996). This passage occurs in 1943. She's 16 years old and she has just been abducted and placed into a garrison, a former town hospital close to Magalang, Pampanga near Manila.
Without warning, a Japanese soldier entered my room and pointed his bayonet at my chest. I thought he was going to kill me, but he used his bayonet to slash my dress and tear it open. I was too frightened to scream. And then he raped me. When he was done, other soldiers came into my room and they took turns raping me.
The sun streams in through the wall-sized window, casting afternoon light on our family room. Outside the trees sway vibrant and green, shade a small figure of Mama Mary. She welcomes me too with arms stretched and hands waiting. Inside, noise percolates from every room of the house. I am home. From my suitcase I pull a salmon colored tapestry. When you first glance at it, the greens, blues and reds flash a beautiful montage of color. The folds unwind and reveal the fine embroidery.
I’m telling my mother and sister-in-law that when Lola Remedios learned I was coming, she began working on this piece as gift to me. It took her all six months to get this far in the tapestry. Every piece – every letter and image has been cut from other fabrics and painstakingly hand-sewn into the cloth. Except for the missing D where she has sewn, “(D)ecember 20, 1942, Dito Ako Nahuli Sa Lugar ng Baryo Esperanza,” it’s all there – the Dagitan River, green…
Lola Precsilla Bartonico was born on January 6, 1926 on the island of Leyte, Philippines. Here is an excerpt from Lola Prescilla’s testimony to the Japanese government:
One day in the late months of 1943 when I was about 17 years old, the Japanese soldiers captured us as we were hiding in one of the air raid shelters. We were only two women in that group who were all my relatives. They started raping my cousin while the other soldiers tied up the men. I was about 17 years old then. Then they tied me and one soldier raped me. I wanted to resist but I was too afraid to for fear of getting killed. After, they brought us to the town of Burauen and I was brought to the elementary school which they converted into garrison. We arrive in there late afternoon. I saw around 15 women who were also raped like what they did to me. After that, I was brought to the Home Economics Building and saw two women inside.
Then my suffering started at the hands of the Japanese soldiers. We were bein… |
Q:
translating arrays from c to python ctypes
I have the below arrays on C how can i interpert them to ctypes datatypes inside structre
struct a {
BYTE a[30];
CHAR b[256];
};
should i interpert a fixed array as the datatype * the size i want like the below and if yes how can i
call this structure as a parameter to fun that takes instance from this structure
class a(structure) :
_fields_ = [ ("a",c_bytes*30 ),
("b",c_char*256 ),]
A:
You're on the right track. You're probably just missing the byref() function. Assuming the function you want to call is named *print_struct*, do the following:
from ctypes import *
class MyStruct(Structure):
_fields_ = [('a',c_byte*30), ('b',c_char*256)]
s = MyStruct() # Allocates a new instance of the structure from Python
s.a[5] = 10 # Use as normal
d = CDLL('yourdll.so')
d.print_struct( byref(s) ) # byref() passes a pointer rather than passing by copy
|
6 Pa. Commonwealth Ct. 612 (1972)
Richmond
v.
Pennsylvania Higher Education Assistance Agency.
Original jurisdiction, No. 145 C.D. 1972.
Commonwealth Court of Pennsylvania.
Argued September 12, 1972.
December 6, 1972.
*613 Argued September 12, 1972, before Judges KRAMER, MENCER and ROGERS, sitting as a panel of three.
Lawrence Silver, for petitioner.
John D. Killian, with him Killian & Gephart, for respondent.
OPINION BY JUDGE MENCER, December 6, 1972:
On May 22, 1969, petitioner Kenneth W. Richmond (Richmond) filed an application with respondent Pennsylvania Higher Education Assistance Agency (PHEAA) for scholarship aid. PHEAA denied such aid to Richmond, and he appealed such denial according to PHEAA regulations. After a hearing concerning the matter on July 30, 1971, the PHEAA Hearing Examiner recommended that Richmond be granted full *614 scholarship aid retroactive to May 22, 1969. PHEAA subsequently accepted this recommendation.
Counsel for Richmond then demanded of PHEAA costs of $275.00 for the hearing transcript and $50.00 for the transporting of Richmond, his counsel, and witnesses to Harrisburg, for the hearing. Counsel for PHEAA replied to this request that "the Board of Directors took formal action to deny the request." Richmond then filed a Petition for Assignment of Costs with this Court. PHEAA timely filed preliminary objections to this petition challenging the jurisdiction of this Court, the sufficiency of the claim for relief, the form of the verification of the petition, and the specificity of the allegations of damages.
This action is properly within our original jurisdiction pursuant to Section 401(a)(1) of the Appellate Court Jurisdiction Act of 1970, Act of July 31, 1970, P.L., No. 223, § 401, 17 P.S. § 211.401(a) (1), which states, in pertinent part, "The Commonwealth Court shall have original jurisdiction of: (1) All civil actions or proceedings against the Commonwealth . . . ." Section 102(a)(2) of the same Act, 17 P.S. § 211.102(a) (2), defines "Commonwealth" as including "departments, departmental administrative boards and commissions, officers, independent boards or commissions, authorities and other agencies of this Commonwealth.. . ." (Emphasis added.) PHEAA is such an agency.
We conclude that the petition must be dismissed. The right to impose or recover costs in a proceeding based on a statute must be found in the statute; otherwise it does not exist. Morganroth's Election Contest Case, 346 Pa. 327, 29 A. 2d 502 (1943); Scott Township Appeal, 186 Pa. Superior Ct. 167, 142 A. 2d 357 (1958); see also 2 F. Pollock & F. Maitland, The History of English Law 597 (2d ed. 1898). No such authorization in this type of proceeding is contained in *615 the Act of August 7, 1963, P.L. 549, 24 P.S. § 5101 et seq., which created the Pennsylvania Higher Education Assistance Agency. Nor have we found or been referred to any other relevant legislation on the subject.
We are urged to accept the Statute of Gloucester, 6 Edw. 1, c. 1 (1275), which is still in force in Pennsylvania (but ceased to have effect in England after 1875), as requisite statutory authorization. It is true that this statute and several other ancient English acts initiated the principle that a prevailing party is entitled to his costs, and, as a general rule of law, this principle still obtains in the Commonwealth. See Taged, Inv. v. Zoning Board of Adjustment and Shields, 6 Pa. Commonwealth Ct. 331, 295 A. 2d 339 (1972). But the Statute of Gloucester extends only to cases where damages are recovered in a common law forum, and then only if the damages were recoverable at common law. Black's Appeal, 106 Pa. 344, 15 W.N.C. 308 (1884); Cameron v. Paul, 11 Pa. 277 (1849); see also Annot., 12 A.L.R. 721, 723 (1921). As Sir Edward Coke said, "[I]t extendeth to all the legall cost of the suit, but not to the costs and expences of his travell and losse of time . . . ." E. Coke, Second Institutes 288 (1642) (emphasis added). Therefore, although liberal construction is to be given statutes providing for costs, Steele v. Lineberger, 72 Pa. 239 (1872), the Statute of Gloucester is clearly inapplicable to the administrative proceedings which generated the costs at issue and to the very costs claimed.
Moreover, by reason of the general immunity of the sovereign, costs cannot be placed upon the Commonwealth even under a statutory provision unless the legislative intention to do so is clearly manifest, either by express terms or necessary implication. Tunison v. Commonwealth, 347 Pa. 76, 31 A. 2d 521 (1943). This immunity from liability for costs is generally extended *616 to state officers, boards, or other agencies. See Annot., 72 A.L.R. 2d 1379, 1385, 1406 (1960).
Nor was Richmond effectively denied access to the judicial system for reasons predicated upon his wealth in contravention of Boddie v. Connecticut, 401 U.S. 371, 28 L. Ed. 2d 113 (1971) (indigent persons may not be prevented from bringing divorce actions except on payment of court fees and service-of-process costs which they are unable to pay), and Griffin v. Illinois, 351 U.S. 12, 100 L. Ed. 891 (1956) (indigent defendants may obtain a free transcript to obtain appellate review of constitutional questions). It is apparent that Richmond's appeal was readily and efficiently handled within PHEAA. Disregarding possible counsel fees, the appeal was concluded with a minimum of expense.[1] We therefore reject Richmond's contention[2] that a dismissal of his petition will effectively terminate future challenges to adverse PHEAA rulings.
In view of our disposition of this matter, we need not consider the other questions raised by PHEAA.
ORDER
NOW, December 6, 1972, the preliminary objections of the Pennsylvania Higher Education Assistance *617 Agency are hereby sustained, and the Petition for Assignment of Costs of Kenneth W. Richmond is dismissed.
NOTES
[1] Circumstances indicate that, but for reasons of haste, Richmond could have received a transcript of the hearing without charge.
[2] Quoting from Knight v. Auciello, 453 F. 2d 852, 853 (1st Cir. 1972): "The violation of an important public policy may involve little by way of actual damages, so far as a single individual is concerned, or little in comparison with the cost of vindication, as the case at bar illustrates. If a defendant may feel that the cost of litigation, and, particularly, that the financial circumstances of an injured party may mean that the chances of suit being brought, or continued in the face of opposition, will be small, there will be little brake upon deliberate wrongdoing. In such instances public policy may suggest an award of costs that will remove the burden from the shoulders of the plaintiff seeking to vindicate the public right."
|
Get Rid of Sciatica Permanently in 7 Days or Less
Sciatica SOS
DMCA
The Gabapentin for Sciatica: From Relieving into Curing
Posted on Sep 20, 2016 by Administrator
Gabapentin for sciatica is commonly used for relieving only. In some cases, it also can help to cure the disease too. There are some ways can be chosen today for relieving the sciatica pain. One of them is by using the gabapentin. The use of gabapentin for sciatica is the most popular one today because of its guarantee about the result may be gained. Based on that reason, you need to know deeper about it. Its use is relatively easy too, and that becomes the additional reason why people more like to choose this way than another. However, you need to keep carefully making sure that you get the result in line with your desire.
The Brief Information about Gabapentin
Gabapentin is not similar to the common medicine used in your everyday life. This one must be consumed under the instruction and control of your doctor. The wrong use of this medicine can give the bad effect actually instead of the good one. One thing must be noticed too is that gabapentin is not the medicine for curing sciatica. It is only for relieving sciatica. The medicine can help you for reducing your pain.
This medicine is understood as the great anti-epilepsy medicine. It is often used for people who have the diabetes disease. The medicine is appropriated to be consumed only by people who have reached six years old. The form of the medicine may be found in some variations. You can find it in the form of the fluid medicine or even in tablet form. You can choose one of them based on the appropriateness to be used. Women commonly more like to consume the medicine in fluid form same as the old people.
The medicine is not appropriated to be consumed by pregnant women except under the control of the doctor. The dosage for children can be different. Some people with the specific diseases like diabetes and depression must be more careful during the consumption of this medicine too. Since there is the possibility of the side effect that makes people want to sleep, it is better to consume it in the house. The tight schedule of consuming the gabapentin for sciatica must be used for making sure about the result.
The Common Recipe for Gabapentin
The use of this medicine is commonly suggested by doctor for reducing your sciatica pain. However, it will be better for you to understand about the recipe for that can help you to get more knowledge about its use too. The dosage of gabapentin can be different for different people. The age level can make the difference too. All of these aspects must be understood before you try to consume it. The choice of this medicine is the best option for today since it is the easiest one too to be found.
Gabapentin for sciatica pain is popular, but it must be done under the recipe by doctor. Even if it is said only for reducing the pain, but in some cases it can help to cure it completely. The common first dosage is 300 mg once per day. However, the recipe is commonly changed based on the development of the patience. It can be increased in 900 mg, but it must be reduced too into the lower one that is 600 mg per day. Both of the last are for been consuming three times in a day.
The other recipe commonly for old people is the consumption of 100 mg in his bedtime. This one is changed into 100 mg per day to be consumed twice and it is combined with 200 mg in his bedtime. Both cases show the significant development of the patience since it even shows the better result of being cured by using this medicine.
It must be noted too that you must follow the instruction correctly to make sure that you consume it in the right way. There is the list of the rules for consuming it inserted on its sachet and you must read it. Besides, the information suggested before about the gabapentin for sciatica must be followed. The right and careful consumption of this medicine cannot give you the side effect and it may help you completely instead. That is the desired result by everyone who uses it today. |
Pacira Pharmaceuticals, Inc.(NASDAQ: PCRX) noted that the FDA has set a PDUFA date of March 5, 2015 for the supplemental New Drug Application (sNDA) for a nerve block indication for EXPAREL. NovaBay Pharmaceuticals, Inc. (NYSE MKT:NBY) said that their BAYnovation trial for viral conjunctivitis has been completed and top-line results are due in mid-August 2014. Threshold Pharmaceuticals, Inc. (NASDAQ: THLD) maintained guidance that the pre-planned […]
Curis, Inc.(NASDAQ:CRIS) provided an update noting that Phase 2 data of everolimus for Operable Nodular BCC (basal cell carcinoma) are due 1Q 2014. Their submission to the FDA regarding the partial clinical hold of CUDC-427 is due shortly. A Phase 2 trial of Debio 0932 is due to be to initiated in 2H 2014. Galena Biopharma (Nasdaq:GALE) announced it has […]
Aeterna Zentaris Inc. (NASDAQ: AEZS $1.39) announced that it has submitted a NDA for AEZS-130 for adult growth hormone deficiency (“AGHD”). ImmunoGen, Inc. (Nasdaq: IMGN $13.41) announced that it will discontinue their Phase 2 trail of IMGN901 for SCLC, following the recommendation from the Data Monitoring Committee (DMC) due to a higher rate of infection and […]
Dynavax Technologies Corporation (NASDAQ: DVAX) reported that following a meeting with the FDA regarding its Biologic License Application (BLA) for HEPLISAV,an adult hepatitis B vaccine, additional safety data would be required before they refile their BLA. This would most likely necessitate the need for a new trial. Clovis Oncology (NASDAQ:CLVS) announced that it has commenced an underwritten […]
Affymax, Inc. (NASDAQ:AFFY) announced in a filing that the contract of its CEO, John Orwin, has been terminated. This follows a company-wide restructuring plan by The Brenner Group, Inc, a restructuring firm assigned by Affymax. Rockwell Medical, Inc. (Nasdaq:RMTI) announced it intends to offer shares in an underwritten public offering. ACADIA Pharmaceuticals Inc. (ACAD) also announced it intends to offer shares […]
Achillion Pharmaceuticals, Inc. (Nasdaq:ACHN) provided an update noting that interim RVR results from its Phase 2 ACH-3102 trials for the treatment of genotype 1 HCV are due in 3Q 2013 (-007 trial), followed by SVR results during 4Q 2013. BioCryst Pharmaceuticals, Inc. (NASDAQ:BCRX) said it plans to initiate a Phase 2 trial of BCX4161 in patients with hereditary angioedema, later in 2013 […]
Latest Articles
Dear readers of BioPharmCatalyst, Thank you to all readers who have followed and supported BioPharmCatalyst over the past five years. Yes, that’s correct, BioPharmCatalyst celebrated it’s 5th anniversary earlier this week. BPC is run independently and a change in working circumstances has meant that updating the website has become quite time consuming to maintain over the past […]
Latest updates to the Company Pipeline Database for May 18 and 19, 2015. Refer to the FDA Calendar for upcoming catalysts: In addition, over 100 updates were made over the weekend as companies continued with their reporting season. You can find the updates from last week by clicking the “updated” column on the far right of the Company Pipeline Database. […] |
{
"name": "LLC \"Zhivaya Biblioteka\"",
"displayName": "Zhivaya Biblioteka",
"properties": [
"livelib.ru",
"pricelib.ru"
]
} |
Q:
Is there any way to get where condition from the collection?
I want to get the where condition from a collection.I'm using it in my sales order grid.
$collection = $this->getCollection();
echo $this->getCollection()->getSelect();
When i apply getselect to the collection i could see the corresponding query with where condition:
SELECT `main_table`.*, `myorder`.`customer_email` FROM `sales_flat_order_grid` AS `main_table`
LEFT JOIN `sales_flat_order` AS `myorder` ON myorder.entity_id = main_table.entity_id
WHERE (`main_table`.`status` = 'received')
ORDER BY main_table.created_at DESC LIMIT 20
But I want to know is there any other way to get where condition directly from the collection itself.
I want to apply that where to another query of mine.
A:
You can get the select part in this way:
$where = $collection->getSelect()->getPart(Zend_Db_Select::WHERE);
There is also a setPart() method that can be used to set where condition.
Other possible parts from Zend_Db_Select are:
/**
* The initial values for the $_parts array.
* NOTE: It is important for the 'FOR_UPDATE' part to be last to ensure
* meximum compatibility with database adapters.
*
* @var array
*/
protected static $_partsInit = array(
self::DISTINCT => false,
self::COLUMNS => array(),
self::UNION => array(),
self::FROM => array(),
self::WHERE => array(),
self::GROUP => array(),
self::HAVING => array(),
self::ORDER => array(),
self::LIMIT_COUNT => null,
self::LIMIT_OFFSET => null,
self::FOR_UPDATE => false
);
|
Push For Local Apprenticeships
Posted by Administrator : Monday 11th March 2013
INVESTING IN THE LOCAL WORKFORCE. The Tonbridge council and government have tried many initiatives over the years, one being local apprenticeships. We believe that local and trusted apprenticeship schemes in our community would be welcomed with open hands. The problem is so many local businesses simply do not know about them or understand the details of them.
Local education centres, community centres and the local council often hold apprenticeship open days and open evenings to help bring together local young people and young businesses. These events will provide a wide range of information for both local businesses and local youngsters on how to get them on the working ladder. |
/*
* Copyright 2018-present Facebook. All Rights Reserved.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#ifndef _OBMC_MISC_UTILS_H_
#define _OBMC_MISC_UTILS_H_
#ifdef __cplusplus
extern "C" {
#endif
#include <time.h>
#include <errno.h>
#include <unistd.h>
#include <stdbool.h>
#include <stdint.h>
#ifndef ARRAY_SIZE
#define ARRAY_SIZE(a) (sizeof(a) / sizeof((a)[0]))
#endif
/* Retry till condition is true.
Helper macro to consolidate retry logic. Usage example:
if (retry_cond((rc = stuff(1, 4)) == 0, 4, 1000)) {
printf("stuff failed with %d even after 4 attempts\n", rc);
} else {
printf("Stuff succeeded!\n");
}
*/
#define retry_cond(oper, _num_retries, _msec) ({ \
int retries; \
int num_retries = (int)(_num_retries); \
int msec = (int)(_msec); \
struct timespec ts; \
ts.tv_sec = msec / 1000; ts.tv_nsec = (msec % 1000) * 1000000; \
for (retries = 0; retries < num_retries && !(oper); retries++) { \
int res; \
do { \
res = nanosleep(&ts, &ts); \
} while (res && errno == EINTR); \
} \
retries == num_retries ? (!(oper) ? -1 : 0) : 0; \
})
typedef enum {
CPU_MODEL_INVALID = -1,
CPU_MODEL_ARM_V5,
CPU_MODEL_ARM_V6,
CPU_MODEL_MAX,
} cpu_model_t;
typedef enum {
SOC_MODEL_INVALID = -1,
SOC_MODEL_ASPEED_G4,
SOC_MODEL_ASPEED_G5,
SOC_MODEL_MAX,
} soc_model_t;
typedef uint32_t k_version_t;
/*
* String utility functions.
*/
char* str_lstrip(char *input);
char* str_rstrip(char *input);
char* str_strip(char *input);
bool str_startswith(const char *str, const char *pattern);
bool str_endswith(const char *str, const char *pattern);
/*
* Device IO utility functions.
*/
int device_read(const char *device, int *value);
int device_write_buff(const char *device, const char *value);
/*
* File IO utility functions.
*/
ssize_t file_read_bytes(int fd, void *buf, size_t count);
ssize_t file_write_bytes(int fd, const void *buf, size_t count);
/*
* pathname utility functions.
*/
int path_split(char *path, char **entries, int *size);
char* path_join(char *buf, size_t size, ...);
bool path_exists(const char *path);
bool path_isfile(const char *path);
bool path_isdir(const char *path);
bool path_islink(const char *path);
/*
* Platform utility functions.
*/
cpu_model_t get_cpu_model(void);
soc_model_t get_soc_model(void);
k_version_t get_kernel_version(void);
#ifdef __cplusplus
} /* extern "C" */
#endif
#endif /* _OBMC_MISC_UTILS_H_ */
|
Efficacy and toxicity management of CAR-T-cell immunotherapy: a matter of responsiveness control or tumour-specificity?
Chimaeric antigen receptor (CAR)-expressing T-cells have demonstrated potent clinical efficacy in patients with haematological malignancies. However, the use of CAR-T-cells targeting solid tumour-associated antigens (TAAs) has been limited by organ toxicities related to activation of T-cell effector functions through the CAR. Most existing CARs recognize TAAs, which are also found in normal tissues. CAR-T-cell-mediated destruction of normal tissues constitutes a major roadblock to CAR-T-cell therapy, and must be avoided or mitigated. There is a broad range of strategies for modulating antigen responsiveness of CAR-T-cells, with varying degrees of complexity. Some of them might ameliorate the acute and chronic toxicities associated with current CAR constructs. However, further embellishments to CAR therapy may complicate clinical implementation and possibly create new immunogenicity issues. In contrast, the development of CARs targeting truly tumour-specific antigens might circumvent on-target/off-tumour toxicities without adding additional complexity to CAR-T-cell therapies, but these antigens have been elusive and may require novel selection strategies for their discovery. |
By continuing to use this site you consent to the use of cookies on your device as described in our
Cookie Policy unless you have disabled them. You can change your Cookie Settings at any time but parts of our site will not function correctly without them.
The results are available on SEBA's official website. However, due to multiple users on the portal, the website is unavailable. Students will get access to their physical result after 11 am. In this year’s HSLC examination 396 candidates were expelled.
In the Assam High Madrassa Examination 2019, 9127 candidates took the examination and 5310 came out successful with a pass percentage of 58.18 per cent.
Assam HSLC Result 2019: Pass percentage
This year, 60.23% students passed Assam HSLC exam
Assam HSLC Result 2019: Toppers' list
Meghaahree Borah from Sankardev Sishu Vidya Niketan, Lakhimpur has secured the first position in the HSLC exam result 2019 with 594 marks out of 600.
Students can download mobile app - SEBA Results 2019 from Google Play state (developed by Pan India Internet Pvt Ltd)
Assam HSLC Class 10th Result 2019: Where to check
Other than the official website resultsassam.nic.in, students can also check their SEBA result on:
results.sebaonline.org
resultsassam.nic.in
www.examresults.net
www.indiaresults.com
exametc.com
yesresult.com
www.result.shiksha
www.assamonline.in
assamjobsalerts.com
Assam Class 10 Board examinations were conducted by the SEBA from February 14 to March 6. A total of 3,42,702 candidates appeared for the HSLC exams at 857 centres, and 9,441 candidates appeared in the Assam High Madrassa Examination 2019. |
Esperanto-Asocio de Britio 2016 Annual General Meeting
[This is a "stop-press"/placeholder report - a more comprehensive report will be published in EAB Update or a copy of the minutes will be circulated to members with EAB Update]
EAB's 39th Annual General Meeting was held on 20th March 2016 at The Gateway Conference Centre, Liverpool. The meeting was chaired by (Honorary Secretary) Tim Owen at the request of the outgoing President Paul Gubbins and the Vice-President Edmund Grimley-Evans, neither of whom were able to attend in person.
The proposals to receive the minutes of the previous AGM, to re-appoint the current independent examiner, and to leave the [voting member] subscription rates unchanged, were all approved.
Various suggestions and comments were received from the members present. Topics discussed included the option of spending money on resorces to manage/organise the Butler library; recuritment of new trustees; the drawing power of combined events e.g. Bucanan Masterclass with British Congress; fortcoming EAB courses and events (see esperanto.org.uk/events); EAB will refund KER examination fees for (up to) ten successful exam-takers at the June KER session in London organised by Renato Corsetti; the NoJEF trustees are considering options for merging administration activities with those of EAB (subject to further legal advice).
Ed Robertson announced that the 2017 British Esperanto Congress will be a joint venture with the 2017 Scottish Congress, to be held in Edinburgh in the second half of May 2017 (the precise date still To Be Confirmed).
The votes for the ManCom* were counted by Viv O'Dunne.
[* ManCom= Management Committee, and Trustees of the Association]
Ian Carter, Edmund Grimley Evans, Clare Hunter, Tim Owen, Ed Robertson were elected as trustees.
NAME OF CANDIDATE
FOR
AGAINST
ABSTAIN
Ian Carter
52
4
4
Edmund Grimley Evans
56
1
3
Clare Hunter
57
3
0
Tim Owen
55
4
1
Ed Robertson
57
3
2
Ian Carter was the sole candidate for president of the Association, and so became the new president. |
Q:
Mount shared Ubuntuone folder
Is it possible to mount a folder, which is shared by another person into my Ubuntu-One folder (or any other) to my Ubuntu system (not the Web-interface). It also would be nice to do this via fstab.
A:
Ubuntu One's file sync service is synchronization, and not remote file storage. This means the client will download everything in a folder to the machine you choose to synchronize that folder to, rather than creating a mount point to a remote server.
If you've accepted a share from someone, you can open the Ubuntu One control panel and in the Folders tab of the interface, the folders which are shared to you will be listed. You can simply check the folder in question to enable synchronizing it to your computer, and all the files in that folder that was shared to you, will start downloading.
|
Latest Lawsuits
Share
July 16, 2015
| Case
Daily Caller v. CFPB (No. 1:15-cv-01125)
On July 15, 2015, Judicial Watch announced that it has filed a lawsuit on behalf of the Daily Caller News Foundation, a media organization based in Washington, D.C., seeking records from the Consumer Financial Protection Bureau (CFPB). The lawsuit was filed in the U.S. District Court for the District of Columbia (The Daily Caller News Foundation v. Consumer Financial Protection Bureau (No. 1:15-cv-01125)).
On February 27, 2015, The Daily Caller filed a FOIA request with the CFPB seeking access, in part, to:
A. All emails to or from Robert Cauldwell, National Treasury Employees’ Union Chapter 335 president and an examiner for the bureau’s Southeast region, between January 1, 2014 to February 27, 2015 that make reference to political parties, elected political figures, congressional committees, congressional testimony and congressional activities including hearings, investigatory activities or subpoenas; and
B. All emails sent to or received from Bureau employee and active union member Anthony Romano between January 1, 2014 to February 27, 2015 that make reference to political parties, elected political figures, congressional committees, congressional testimony and congressional activities including hearings, investigatory activities or subpoenas.
Subsequently, on March 19, The Daily Caller narrowed its request and provided the CFPB with a list of 27 specific terms to be searched. Yet, the CFPB responded on April 8 that the request was overly broad, and by letter dated May 21, denied The Daily Caller’s administrative appeal, declaring the request “insufficiently specific and therefore unreasonably burdensome.” The search terms in The Daily Caller’s request include “Republican,” “Tea Party,” “Obama,” “subpoenas” and “House Financial Services Committee.” |
Separation of polynucleotides is a focus of scientific interest, and numerous researchers have been attempting to achieve technical improvements in various aspects of polynucleotide separation. Anion exchange separation and reverse phase ion pair chromatography are among the most frequently used methods for separating polynucleotides.
Previous work has focused on developing rapid, high resolution separations, developing separations based on the size of the polynucleotide fragment rather than the base sequence of the fragment, and on developing the ability to collect fractions of polynucleotides.
W. Bloch (European patent publication No. EP 0 507 591 A2) demonstrated that, to a certain extent, length-relevant separation of polynucleotide fragments was possible on nonporous anion exchangers with tetramethylammonium chloride (TMAC) containing mobile phases. Y. Ohimya et al. (Anal Biochem., 189:126-130 (1990)) disclosed a method for separating polynucleotide fragments on anion exchange material carrying trimethylammonium groups. Anion exchangers with diethylaminoethyl groups were used by Y. Kato et al. to separate polynucleotide fragments (J. Chromatogr., 478:264 (1989)).
An important disadvantage of anion exchange separations of double-stranded polynucleotides is the differing retention behavior of GC- and AT-base pairs. This effect makes separation according to molecular size impossible. Another important drawback of the anion exchange methodology is the necessity to use salts and buffers for elution, thus making subsequent investigation of the polynucleotide molecule fractions very difficult.
U.S. Pat. No. 5,585,236 (1996) to Bonn et al. describes a method for separating polynucleotides using what was characterized as reverse phase ion pair chromatography (RPIPC) utilizing columns filled with nonporous polymeric beads. High resolution, rapid separations were achieved using an ion-pairing reagent, triethylammonium acetate, and acetonitrile/water reagent mobile phase gradient. This work is important because it is the first separation to give size-dependent, sequence-independent separation of double-stranded polynucleotides by chromatography. These separations are comparable to gel electrophoresis-compatible separations, currently the most widely used technology for polynucleotide separations. Bonn's work makes it possible to automate separations based on the size or on the polarity of polynucleotides.
In the course of our work on separation of polynucleotides using the method developed by Bonn et al., with HPLC instrumentation and columns as described by Bonn, we discovered a degradation effect on the separation of double-stranded polynucleotides after long-term column usage (i.e., greater than about 50 injections). This degradation effect has been generally observed as a loss of resolution for base pairs greater than 200, as illustrated in the chromatogram of FIG. 1. As the degradation worsens, increasingly short fragments of polynucleotides are affected, as shown in FIG. 2. Eventually, the polynucleotides do not elute from the system. As such, the degradation effect or decreasing resolution appears to be a function of the length of the polynucleotide fragment being separated.
There is no published chemical mechanism which would explain such a degradation effect that distinguishes between different size fragments while using reverse phase chromatography. Therefore, we first examined our procedure for packing the column. We realized that the molecules that we were attempting to separate were several magnitudes larger in size than those conventionally separated by reverse phase ion pair liquid chromatography. We suspected that hydrodynamic flow through the column was adequate for short polynucleotide fragments, but was being disrupted for larger fragments. In other words, perhaps the longest fragments were being partially sheared. However, we were unable to identify a packing procedure that would discriminate between short and long fragments of polynucleotides.
Although we could not conceive a mechanism by which chemical contamination could produce these unusual results, we nevertheless examined contamination of one or more of the various "pure" reagents employed in liquid chromatography. After testing each of the reagents for contamination, we determined that this was not the source of the problem. This is not surprising, since the mobile phases used are not corrosive.
Subsequent clean-up of the column with injections of tetrasodium ethylenediaminetetraacetic acid (EDTA), a metal-chelating agent, largely restored chromatographic resolution, as shown in FIG. 3. Putting a chelating additive into the mobile phase can provide some protection to the column. Without wishing to be bound by theory, there are several mechanisms by which a chelating reagent can provide protection or restore the instrument or column. One mechanism is the chelating reagent binds the free metal ions in solution, thus preventing any interaction of the metal ions with the DNA. Another mechanism is the chelating reagent coats colloidal metal ions, thereby preventing interaction of the colloidal metal ions with the DNA. The colloidal metal can be introduced from the mobile phase, injected into the mobile phase, or can be released from wetted surfaces in the fluid path. If the chelating reagent is water soluble, it can eventually dissolve the colloidal metals.
We were successful in adding small amounts (ie., 0.1 mM) of tetrasodium EDTA to the mobile phase without significant changes to the chromatography. However, this concentration of EDTA was not sufficient to protect the columns in all of the stainless steel HPLC instruments and columns that were tested. There can be cases where the amount of metal ions present or generated are at a concentration where adding a chelating reagent will coat or bind the metal ions. In these cases, addition of a small amount of chelating reagent can allow the successful separation of DNA fragments.
We tested the use of larger amounts of chelator additive in the mobile phase and found that addition of 10 mM of tetrasodium EDTA impaired the separation of polynucleotides. It was still uncertain that this higher concentration of chelating agent provided an acceptable protective benefit. While use of EDTA injected into the mobile phase (via the HPLC sample injection valve) demonstrated that the column can be regenerated, addition of chelating agents to the mobile phase is not an ideal solution to the problem as it can hamper subsequent use or analysis of the polynucleotide fragments.
We then discovered that placing a cation exchange resin in the flow path of the mobile phase removed the problem. Guard disks were prepared containing a gel-type iminodiacetate resin with an ion exchange capacity of 2.5 mequiv/g (tested with Cu(II)). FIG. 4 shows a chromatogram obtained when the guard disk was positioned directly in front of the sample injection valve. FIG. 5 shows a chromatogram obtained when the guard disk was placed directly in front of the separation column (ie., between the injection valve and the column). Attempts to separate polynucleotides on the stainless steel HPLC system without the use of guard disks or guard columns containing cation exchange resin or chelating resin resulted in rapid deterioration of the chromatographic separation.
From the improved results obtained by placing a cation exchange resin in the flow path of the mobile phase, we concluded that whatever was causing the peak distortion, probably ionic contaminants, was capable of binding to the cation exchange resin. Whatever was causing the fragment size-dependent distortion of the peaks had been removed by the cation exchange resin.
Ionic contamination of the system can logically originate in one or more of several sources. The most significant sources of metal ions are HPLC components containing fritted filters made of stainless steel. Fritted filter components are used in mobile phase filters, check valve filters, helium spargers, mobile phase mixers, in-line filters, column frits, and other parts of the HPLC. Frits are commonly located at each end of a separation column in order to contain the particulate packing material within the column. The frit at the head of a column also serves to trap particulate material. Trapped particulate materials can be metal ions released from another part of the liquid chromatography system. The large surface area associated with any particular fritted component can contribute to faster solubilization of metals and release of ions. Thus, the ionic contamination from a fritted component can arise in at least two ways. First, the component can be a source of ionic material. Second, it can be a means for trapping ionic material.
Ionic contamination from metals can exist in two forms. One form is dissolved metal ions. In another form, metals ions can exist in the colloidal state. For example, colloidal iron can be present, even in "high purity" 18 megohm water. Any metal or other ion that can interact with polynucleotides in the manner described could cause potentially harmful chromatographic effects when the metal becomes trapped on the chromatographic column. Magnesium and/or calcium and other ions can be present in samples such as PCR products. However, at the concentrations typically used, magnesium ions present in PCR products do not harm the peak separation.
Metal ion contamination such as colloidal iron can be released from frits, travel to other parts of the HPLC and then be trapped. These types of contaminants will interfere with DNA in solution or after having been released and trapped on a critical component of the HPLC such as the column, an inline filter in front of the detector, or at a back pressure device located after the detector.
In order to test our hypothesis that soluble metals and, potentially, other ions were causing loss of peak resolution during polynucleotide separations, we challenged the HPLC system with iron, chromium, and nickel. Known concentrations of these three metal ions were added to a polynucleotide standard (pUC18 DNA-Hae III digest). The polynucleotide/metal ion solutions were then injected into the HPLC.
Chromium (III) ions (prepared from CrK(SO.sub.4).sub.2 did not degrade the separation when present in the sample at 9 mM. However, the sample contained 100 mM EDTA as a preservative against enzymatic degradation during storage, and much of the chromium could have been bound in an EDTA complex. However, when chromium was present at 90 mM, fragment size-ependent degradation of peaks occurred. At 900 mM chromium, no peaks could be detected. Several hours later, a sample containing 50 mM Cr(III) showed complete loss of the separation peaks.
The same protocol using Ni(II) (prepared from Ni.sub.2 SO.sub.4) showed substantially no effect on peak shape, although some peak broadening was observed at 0.1 M Ni(II).
With Fe(III) (prepared from FeNH.sub.4 (SO.sub.4).sub.2), the effect was less than with Cr(III). An injection of 900 .mu.M of Fe(III) in the polynucleotide standard showed no effect. However, an injection of 2700 .mu.M resulted in a loss of all peaks. There was some indication that the results were time-dependent, with the full effect becoming apparent several minutes after preparation of the metal/polynucleotide sample.
The contact times and metal concentrations of the experiments described above were several orders of magnitude higher than would be found in a stainless steel HPLC system used for polynucleotide separations. Also, none of the experiments indicated how any reaction could be dependent on the size of the polynucleotide fragment. However, these data show the relative effect on separations of some of the metals found in stainless steel on polynucleotide separation.
As an example of the effects of stainless steel, placement of a previously used stainless steel frit as an inline frit in front of the column resulted in no peaks being eluted from the column, even after short exposure of the frit to the fluid path. In this case all of the DNA was lost in the separation. This means that either DNA was taken up by the frit, or the frit released material that either disrupted the separation of DNA on the column or within the fluid path to the column and detector.
The effect of metals on the reverse phase column separation of polynucleotides or an effect that discriminated according to fragment size has not been reported in the literature. There are, in fact, only a limited number of publications on the chromatographic separation of polynucleotides; most of which focus on single-stranded polynucleotides. Separation of single-stranded polynucleotides has been performed routinely by many workers, but this is usually on very short lengths of polynucleotide fragments (usually less than 100-mer, with 25-mer the average length), where, based on our observations of double-stranded polynucleotides, we would expect the degradation effect to be much less pronounced.
Gunther Bonn and his colleagues have developed the world's leading chromatographic method for separating double-stranded polynucleotides. Bonn's work was performed on a stainless steel HPLC system with stainless steel hardware, including stainless steel frits. Based on our discovery, we concluded that the effect of metal contamination on polynucleotide separations was never reported by Bonn or others because the amount of dissolved and particulate metals in their stainless steel systems was below the threshold where degradation of the separation occurs and the systems worked adequately to produce good peak separations. Also, our work was carried out over a longer period, perhaps giving sufficient time for accumulation of contaminants within the system.
Metal-free or titanium instrumentation is commonly used in protein separations, for reasons peculiar to the art of protein separation. For example, the activity of a protein can be affected if a metal is present. If the protein is intended to be collected and studied, separation is generally performed in a metal-free environment. Also, protein separations use particular mobile phases that can be corrosive to stainless steel HPLC equipment.
Although metal-free or titanium systems are generally used in the separation of proteins for the reasons discussed above, it has been demonstrated that the use of metal-free or titanium systems is not necessary to maintain the integrity of the separation and that stainless steel HPLC systems show equivalent performance (Herold, M. et al., BioChromatography, 10:656-662 (1991)). In fact, Hewlett-Packard, one of the leading manufacturers of HPLC systems, now recommends stainless steel systems for use in protein separations.
Because of the success of using stainless steel components in protein separations, and because the use of stainless steel systems for polynucleotide separations had been shown to be successful in the past, there had previously been no indication of the requirement to use non-metal or titanium system components for liquid chromatographic separation of polynucleotide fragments.
Our subsequent experiments showed that even if titanium or PEEK fluid path components are used, then some treatment was necessary before the components could be used for Matched Ion Polynucleotide Chromatography. Although an improvement, our initial use of titanium frits did not give consistent results. Treatment of the frits with dilute nitric acid and then with a chelating agent did improve the performance of the instrument. Similarly, as shown in the examples, PEEK frits were not consistently suitable for MIPC, but acid treatment did improve their performance.
Finally, degassing the fluid before it enters the liquid chromatography system removes the oxygen. This process will inhibit the oxidation and production of metal ions in stainless steel or titanium or other tubing containing iron. The use of a degasser to remove oxygen can help the MIPC separation. This is probably because the need for an ion contaminant free fluid path is much more critical in MIPC than in prior art separation processes. The use of the precautions of the method and system of the present invention has been found to be much more critical for double stranded DNA than for single stranded DNA separations.
As Bonn and coworkers demonstrated, stainless steel can be an excellent material to be used for the fluid path of DNA separations. However, it is difficult to keep the stainless steel surface free of contaminants which interfere with MIPC, especially as the surfaces age. |
var class_dem_1_1_convex_l_s =
[
[ "MatrixX", "class_dem_1_1_convex_l_s.html#ae6da3230d1826b15b369e6879cbb7191", null ],
[ "VectorX", "class_dem_1_1_convex_l_s.html#a066dff3827a4d933cfed98276e8d41d0", null ],
[ "ConvexLS", "class_dem_1_1_convex_l_s.html#a42f2e62346ddc90f930d0d473773fd06", null ],
[ "init", "class_dem_1_1_convex_l_s.html#ac601e6ddfcad0b277ad805449b3510f3", null ],
[ "solve", "class_dem_1_1_convex_l_s.html#a68f946876bc5259e699f0c311d18e266", null ]
]; |
Q:
How can I avoid options if those options are previously selected in vue js html?
My json data for getting all inventories is
{
"status": true,
"data": [
{ "inv_id": 1, "name": "Arts" },
{ "inv_id": 2, "name": "web" },
{ "inv_id": 3, "name": "mobileapp" },
{ "inv_id": 4, "name": "ws" },
{ "inv_id": 5, "name": "aop" },
{ "inv_id": 6, "name": "bin" },
{ "inv_id": 7, "name": "webs" },
{ "inv_id": 8, "name": "hell" }
]
}
My json data which is selected already by user will be in the following format
{
"data": {
"pid": 109,
"contact": {
"email": "[email protected]",
"phone": 85998472,
"address": { "country": "India", "state": "Kerala" }
},
"about": "hello how are you",
"is_featured": false,
"avg_rating": 0,
"total_reviews": 0,
"reviews": [],
"inventory": [
{
"item": {
"name": "Arts",
"category": { "name": "Education", "id": 1 },
"id": 1
}
}
],
"review": null
},
"status": true
}
Here arts is already selected, so I need to avoid the same when I am giving an edit option. How can I able to achieve the same.
mounted() {
var self = this
data = {}
data["auth-token"] = this.authType
data["pid"] = this.pid
$.ajax({
url: "http://127.0.0.1:8000/get/post/",
data: data,
type: "POST",
dataType: "json",
success: function(e) {
if (e.status == 1) {
self.inventory = e.data.inventory
data = {}
data["category"] = self.catid
data["cat_id"] = self.catid
$.ajax({
url: "http://127.0.0.1:8000/alpha/get/inventory/",
data: data,
type: "POST",
dataType: "JSON",
success: function(e) {
if (e.status == 1) {
self.inventoryall = e.data
}
},
})
}
},
})
}
I have all inventories in inventoryall[] and inventory that is already added in inventory[].
My html code is
<div class="form-group">
<label>Inventory
<small>(required)</small>
</label>
<select
id="basic"
class="selectpicker"
data-live-search="true"
data-live-search-style="begins"
title="Select Your Subcategory"
v-model="inv" name="inv[]" multiple required="required"
>
<option v-for="sop in inventoryall" v-bind:value="sop.inv_id">{{sop.name}}</option>
</select>
</div>
So, when I display the inventories here, I need to avoid the once that is already selected. Please help me to have a solution.
A:
Here you can use the array filter method:
// filter loops through every item in the array and returns a new array
// if the filter function returns true, the item stays in the new array
// if the filter function returns false, the item is removed
self.inventoryall = self.inventoryall.filter(item => {
// loop through all of the currently selected items
for (const selectedItem of self.inventory) {
// if we find a current item with the same ID as the selected one,
// return false, so we don't keep the item
if (selectedItem.id === item.inv_id) {
return false
}
}
// if we never find an item with a matching ID, return true to keep it
return true
})
Note that this method is only available in browsers that support ES6, so use the polyfill on the MDN page if you need to support older browsers.
Another note, since you're using Vue, this would probably be a good use case for a computed property.
|
Hirofumi Hirano
is a Japanese politician of the Democratic Party of Japan (DPJ), a member of the House of Representatives in the Diet (national legislature). He is a native of Katsuragi, Wakayama and he started working for Panasonic Corporation in 1971 after graduating from Chuo University. He was elected to the House of Representatives for the first time in 1996 as an independent. He was the Chief Cabinet Secretary in the Yukio Hatoyama administration.
References
External links
in Japanese.
Category:1949 births
Category:Living people
Category:People from Wakayama Prefecture
Category:Chuo University alumni
Category:Panasonic
Category:Members of the House of Representatives (Japan)
Category:Government ministers of Japan
Category:Democratic Party of Japan politicians
Category:Noda cabinet
Category:21st-century Japanese politicians |
Welcome to another “potpourri” edition of The Mailbag, where I give short(er) answers to several questions rather than a long answer to one question. I also like to take the opportunity in these potpourri editions to let new readers know about my comments/e-mail/messages policy. I’m not able to respond individually to most e-mails and messages, so here are some helpful hints for getting your questions answered more quickly. Remember, the search bar can be a helpful tool!
Do you have any thoughts on Todd Friel’s latest comment that Rick Warren is not a heretic?
Yes, I’m a faithful listener of Wretched Radio, and I did hear that episode. (You can listen to the specific remarks this reader is referencing here starting around the 5:25 mark.)
I’d like to start by saying that I don’t speak for Todd, so if this is of great concern to you, I would recommend contacting Todd directly and getting a “straight from the horse’s mouth” response from him.
The following is what I understood Todd’s remarks to mean:
I believe Todd was using a more classical theological definition of heresy used by many pastors and theologians (and which I agree with), which a lot of people are unaware of these days because the term “heresy” is tossed about so haphazardly (I’m sure I’ve been guilty of it myself). In this definition, real heresy is narrowly focused. It has only to do with the basic doctrines of salvation. In other words, the things you have to believe to be a Christian, and the things you can’t believe to be a Christian.
For example, T.D. Jakes is a heretic for two reasons: a) he is a modalist, a classic heresy which denies the biblical nature of the Trinity, and b) he preaches Word of Faith heresy – “another gospel” as described in Galatians 1:6-9.
Rick Warren, on the other hand, is someone I would categorize as a “false teacher” (again, I cannot speak for Todd, so I don’t know if he would use that label, but I think he would agree with the remainder of this paragraph). He says and does a lot of unbiblical things which he needs to stop and repent of, and nobody should be following him, but he does not preach or claim to believe anything (to my knowledge anyway) that goes against the basic doctrines of salvation. If you sat him down and talked to him, he would affirm the biblical doctrine of the Trinity, the deity of Christ, that Christ is the only way of salvation, etc.
I think the confusion is that the classical definition of heresy differentiates between true heretics and false teachers, but many Christians don’t seem to understand that because the terms “heretic” and “false teacher” are often used interchangeably. This is a definitional thing. Todd is not saying Rick Warren is a doctrinally sound pastor you should be following. He’s made that abundantly clear on a number of occasions.
My friend Samuel had a great question on Twitter recently:
In light of Titus 1:13, where Paul commands Titus to rebuke false teachers SHARPLY, how should pastors maintain a gentle character while frankly, boldly, sharply rebuking false teaching, like Jesus did with the Pharisees?
This testimony is true. Therefore rebuke them sharply, that they may be sound in the faith, Titus 1:13
It’s a great passage with a lot to consider. My thoughts:
1. Look at the rest of 13: “that they may be sound in the faith”. That’s the goal of the sharp rebuke- to bring them out of false doctrine and restore them to sound doctrine. That goal is what should inform the “sharpness” of the rebuke as well as the tone.
2. I think the “sharpness” has more to do with the urgency and immovability of the content of the message you’re conveying, and gentleness, kindness, etc., have more to do with the way (tone) in which you convey it.
3. Notice the word “For” at the beginning of v. 10. It draws our attention back to v. 5-9, the qualifications for elders. In other words, “Elders need to have these qualities (5-9) because of the need to silence and sharply rebuke these false teachers (10-16).” Verses 7-8 call for an elder not to be “arrogant…quick-tempered…violent…but…self-controlled, upright, holy, and disciplined.” Those qualities should govern how an elder gives a sharp rebuke.
4. I totally agree [I think someone else in the Twitter discussion mentioned this] that we should follow Christ’s example in Matthew 23, but we need to keep in mind that a culturally appropriate sharp rebuke in the first century Middle East might not be exactly the same as a culturally appropriate sharp rebuke in 21st century America. We convey the same message, but in a different way.
What is an Enneagram? A church in my area is offering a Bible study on it. Is it biblical?
The Enneagram is basically a tool that purports to help you discover which of nine fundamental personality types you are in order to maximize your strengths and grow in areas in which you are weak.
Is it biblical? There are a lot of different opinions and information out there, so it depends on who you ask. Some would say it’s merely a tool that helps identify less Christlike areas of your personality so you can be aware of, and strive to be more obedient in, those areas of weakness. Others grab on to the Enneagram and dive headfirst into the New Age mysticism that seems to be lurking in all its nooks and crannies.
I would just ask – have you ever read a passage of Scripture that says we need to analyze our personalities – using any tool, for any reason? No, you haven’t. And that’s the main reason I would say you don’t need the Enneagram or any other personality evaluation tool. Just like Christians for the past 2000 years haven’t needed them.
God gives us everything we need for life and godliness in the Bible. Do you tend to be too much of a people pleaser? That’s called fear of man. It’s in the Bible. Too harsh with others? You’re being unkind. It’s in the Bible. Struggle with anxiety? You’re not trusting God. It’s in the Bible.
A lot of people don’t want to hear this again and again because it’s not shiny and new, popular and fun like the Enneagram, personality tests, or internet quizzes (plus it takes longer and involves hard, spiritual work), but we don’t need to be looking for the latest evangelical fad to microwave us into spiritual maturity. We need the slow, deep, plodding work of studying our Bibles, sitting under good preaching and teaching at church, being discipled by older, wiser brothers and sisters in Christ, praying for wisdom, and repenting of sin.
If I were considering using the Enneagram, here’s what I would ask myself:
Why would I rather use the Enneagram – which isn’t mentioned or suggested anywhere in Scripture and has some sketchy spiritual elements to it – than use the methods (prayer, Bible study, discipleship, etc.) I know God has prescribed in Scripture?
For more information on the Enneagram here are a couple of good resources:
Christian Answers for the New Age(Marcia posts great information on her Facebook page. You may have to scroll a bit or ask her to find the specific topic you’re looking for. Here’s something on the Enneagram I happened to find near the top of her feed today.)
Can you recommend a good resource on _____ [a very specific relationship issue]?
There are a lot of wonderful books and other materials out there that can help us deal with certain relational issues, and when I’m aware of those resources I try to recommend them if I think they would help. I am all for reading and learning from helpful, doctrinally sound materials.
But the more specific and interpersonal the issue is, the less helpful resources are, because those resources are general by nature and can’t address every conceivable scenario, including yours. Sometimes you don’t need to read a book, you need to have a conversation with the other person(s) involved in the issue.
For example, if Sally is constantly gossiping about you to other people at church, you don’t need to read a book on gossip or relationships between church members. You need to go to Sally and ask why she’s saying these things. You might need to set the record straight about your behavior that she’s gossiping about. You might have received a false report that she’s gossiping about you. You might need to rebuke her and proceed to the next step of church discipline. But you won’t know any of those things unless you sit down and talk to her. And you’re not going to find those answers in a book.
In other situations, getting the wise counsel of a godly older sister in your church, or setting up an appointment with your pastor for counseling can be much more helpful than simply reading a book. These people know you and care about you. They’re available to help you and answer your questions. They can walk through the changing ups and downs of the situation with you over time. You can’t get all of that from a book.
Materials and resources are great and can be very helpful, but not in every situation.
I still meet with my ladies Bible study group, but they continue to choose very questionable material. Teachers that you have warned against as false and I agree with you. I have voiced my concerns to them over and over and at this point I am just starting to sound like a broken record. My question is, do I still participate and try my level best to help them discern or do I just leave the group?
Either option can be perfectly biblical depending on the situation and the people involved. This reader chose to go the former route, which brings up an additional question: If I join this group and they continue to teach false doctrine via materials by false teachers despite my correction, how long do I hang in there and continue to correct?
Since every situation is different, I can’t give a hard and fast answer to that. I would reiterate the counsel I gave in the previous article about praying for wisdom and discussing it with your husband and your pastor. If, in these discussions, you and your husband decide that, in addition to the women’s group, there are sufficient biblical reasons to look for another church, you may want to hang in there until you move to a new church.
If you decide to leave the group, another natural time to make the break would be when they finish the book they’re currently using and before they begin a new book.
If the question is less, “When should I leave?” and more, “Is it biblical to leave the group when it’s obvious they aren’t going to listen to biblical rebuke and sound doctrine?” the answer is yes, and practically the whole Bible is precedent for this.
Think back over the Scriptures. What is the Bible’s general posture and response to people – particularly God’s people – who have been repeatedly warned about their sin or presented with biblical truth, and choose to continue in that sin or ignore that truth (as this group seems to be acting toward the reader)?
Think about God’s repeated warnings to Old Testament Israel about their sins of idolatry and syncretism (which are basically what importing false doctrine into a church is). Even God didn’t hang in there continuing to warn them forever. What was His eventual response to them? He used pagan nations to conquer them and send them into exile.
Passages like these also help us see the New Testament’s take on moving on when sound doctrine is rejected:
As for a person who stirs up division, after warning him once and then twice, have nothing more to do with him, knowing that such a person is warped and sinful; he is self-condemned.Titus 3:10-11 (For more on false doctrine as “division”, see Romans 16:17-18, Jude 18-19.)
And if any place will not receive you and they will not listen to you, when you leave, shake off the dust that is on your feet as a testimony against them.Mark 6:11 (see verses 7-13 for context)
Do not give dogs what is holy, and do not throw your pearls before pigs, lest they trample them underfoot and turn to attack you.Matthew 7:6
Do you have scriptural grounds to leave if a group rejects biblical correction of their false doctrine? Yes. When should you leave? You’ll have to ask God to give you the wisdom to decide.
If you have a question about: a Bible passage, an aspect of theology, a current issue in Christianity, or how to biblically handle a family, life, or church situation, comment below (I’ll hold all questions in queue {unpublished} for a future edition of The Mailbag) or send me an e-mail or private message. If your question is chosen for publication, your anonymity will be protected.
It’s Black Friday! Time to shop til you drop…into your favorite comfy chair, fire up ye olde internet, and check out the deals at these businesses owned by some of your brothers and sisters in Christ.
There’s nothing wrong with shopping at a big box store that’s advertising great deals today or supporting the mom and pop shop down the street, but if you see something you like for a good price at one of these online stores, why not throw a little business to family? Galatians 6:10 says:
So then, as we have opportunity, let us do good to everyone, and especially to those who are of the household of faith.
See an opportunity? Grab it and do good to someone in the household of faith.
all the disclaimers:
🎄 Here’s how this list came about: I put out a general call on my Facebook page saying that I wanted to put this article together and asked for people to recommend Christian-owned businesses. Well, you know how things on social media get shared around to a friend of a friend and aunt Myrtle’s third cousin’s step-nephew’s veterinarian. So what I’m saying is, while the people who recommended or own these businesses say that these are Christian-owned businesses, I can’t vouch for the actual, day to day spiritual state of any of the recommenders or owners. I’ve checked out each web site as best I can to make sure none of them promote anything unbiblical (giving the benefit of the doubt when possible – these are gifts, not sermons), but I can’t tell you whether or not Stan of “Stan’s Snow Shovels” is a faithful member of his local church. If the theology of the business owner is extremely important to you, I urge you to contact him/her directly to inquire before making your purchase.
🎄 These are Christian-owned businesses, but the products they make are not all necessarily “Christian” (i.e. they don’t all have Bible verses or Christian sayings on them).
🎄 Some businesses carry more than one type of product (ex: jewelry and wall art). I’ve categorized them according to the main product type they sell.
🎄 Some of these businesses are based outside the U.S. Be aware of this with regard to shipping costs, time, etc. when ordering.
Originally published November 21, 2016
Now that Christmas is coming, I have a question about where to buy books, and/or Christian gifts. Should we patronize Christian bookstores and websites? Or would we be helping the culture become more Christian by buying from Walmart or ordering from Amazon?
I think the answer to this question is largely a matter of conscience and good stewardship of the money God has blessed you with, and, of course, husbands and wives need to be on the same page if this is an issue in your home.
Christians have been buying from WalMart and Amazon for years, and the culture continues to march toward Hell at breakneck speed, so I don’t think shopping or not shopping at either of those venues is going to change society much. Amazon carries just about everything that’s in print, so they’re just as happy to sell you a Bible as a Book of Mormon as a Koran as a Richard Dawkins book. The last time I perused the “Christian” book section at my local WalMart, I literally could not find a single book by a doctrinally sound author. The half dozen shelves were laden with Joyce Meyer, T.D. Jakes, Joel Osteen, and the like. (So, yeah, definitely don’t buy “Christian” books there!)
Some Christians don’t want to patronize Christian retailers who carry materials by false teachers. For others this isn’t an issue. This is something you (and your husband, if you’re married) will need to think and pray through and make a decision about. Check out the Popular False Teacherstab at the top of this page to make sure you’re not giving heresy for the holidays!
A few suggestions as you shop this year:
Amazon has a great program called Amazon Smile. It allows you to designate a charity that will receive a percentage of every purchase you make. There are scads of Christian organizations to choose from: churches (maybe even yours!), ministries, missions organizations, pro-life organizations, and others.
If you’re shopping at brick and mortar stores, does your town have a locally owned, doctrinally sound Christian retailer- either stand-alone or at a nearby church? Wherever you choose to shop, don’t forget to take your tracts with you to hand out along the way! That’s the best way to impact your community for Christ while buying gifts.
If you’re shopping for Christian gifts on line, you might consider “shopping small” rather than hitting one of the major Christian retailers. If you’re ordering a book or CD, try getting it directly from the author’s/publisher’s or artist’s web site. Check out some of the smaller Christian book and gift sites. And don’t forget sites like Etsy where you can order lots of Christian gifts directly from the craftsman. Here are a few awesome, doctrinally sound sites to order Christian books and gifts from:
To get the most bang for your stewardship buck, start scouting out the sites you like now. Some are already running Christmas sales. Some will have Black Friday deals, and some will offer discounts on Cyber Monday (the Monday following Thanksgiving).
Happy shopping!
If you’re a Black Friday shopper, stop here at the blog before you head out to the mall. I’ll have a great new list of small Christian-owned online businesses you might want to check out – and throw some brotherly love to – first!
If you have a question about: a Bible passage, an aspect of theology, a current issue in Christianity, or how to biblically handle a family, life, or church situation, comment below (I’ll hold all questions in queue {unpublished} for a future edition of The Mailbag) or send me an e-mail or private message. If your question is chosen for publication, your anonymity will be protected.
If your theology pretty much matches up with mine (as outlined in the “Welcome” and “Statement of Faith” tabs) and you’d like to contribute a guest post, drop me an e-mail at [email protected],
and let’s chat about it.
Moving Off The Sure Foundationby Kerri Sheldon
The authoritative rule for Christian belief and practice is Scripture – pure and sound. It should be the church’s first say, only say, and final say. If the truth within Scripture is compromised, then by default, the new norm will become muddled thinking and false teaching. Such a compromise will transpire when biblical truths are subtly displaced by other ideas that perhaps on the surface appear innocuous, but with further consideration are found to be a diversion from truth.
Unfortunately, such a shift is happening today among evangelical circles at an increasing rate. A prime illustration is seen when a church has a statement of faith that includes something like, “We believe in the sole authority of Scripture for faith and practice,” yet they have practically abandoned that stance by allowing false teachings to enter in, whether deliberately or indirectly. If Scripture is really their authority, as they say, it should be in actuality, not just in statement. Sometimes it can be more telling to view a church’s list of current studies to know if they truly adhere to God’s Word.
Let’s turn our attention to a few specific examples of untrue teachings that have entered the visible church, making way for a foundational swing.
Hearing God’s Voice
It is quite possible you have heard the phrase “hearing God’s voice,” whether from some teacher or in conversation. Upon hearing such an expression, we should ask ourselves what the person means. Are they saying they were reading the Bible and the Holy Spirit illuminated the truth meaning of the text to their minds? Perhaps that is what they mean. But generally when the phrase is used it means something quite different. Authors Henry and Richard Blackaby, as well as teachers Beth Moore and Priscilla Shirer, to name a few, typically use it to convey the concept that God’s voice is heard when one opens themselves up or learns through experience apart from and outside of Scripture. Keep in mind they might affirm that God’s voice is heard only in Scripture. However, in reality, usually the idea is that one should hear fresh inner promptings or whispers that are not found in the Bible. In fact, they suggest that to hear God’s voice immediately and directly is fresher and greater than simply reading and studying His Word. Do you see why this teaching is so deceptive? It is not because of what is actually stated – to hear God’s voice, but because of what is not stated – how, when, and where to hear God’s voice. The truth is that Christians are commanded to read, study, memorize, believe, and obey God’s Word, not to listen for a voice. It is in the hearing and illumination of the Word that the Spirit then promises to be with us, guiding and empowering us, as we simply walk by faith.
Experiencing God
“Experiencing God” is another commonly heard theme. The idea is associated with having fresh encounters with God. An example can be seen in the book Jesus Calling by Sarah Young. Young states, “I knew that God communicated with me through the Bible, but I yearned for more…” (p. xi) What is this “more” for which Young longs? Is it for more of the Bible? It is not presented that way. Implicit in her statement is the desire for a personal encounter or direct experience with the Living God that is beyond, or other than through, the Word of God.
Should Christians desire to personally encounter God based on their own devices or whims? Is this even attainable? Mystics would answer “yes.” They believe that direct knowledge of God, spiritual truth, or ultimate reality can be attained through subjective experience as intuition or insight. But the believers’ “experiencing” of God is a knowing of God through His means – the Word of God and the Spirit of God. The eternal invisible God is unknowable to fallen and rebellious sinners apart from His own provision for them. Unfortunately, when someone wishes to experience God directly they will be operating from worldly or sensual desires. Let’s remember what one of the more prolific writers and theologians of the 20th century, Francis Schaeffer, said: “We must stress that the basis for our faith is neither experience nor emotion, but the truth as God has given it: in verbalized, propositional form in the Scripture and which we first of all apprehend with our mind – though, of course, the whole man must act upon it.”
Benjamin Warfield, a professor at Princeton Theological Seminary, explained the difference between biblically “experiencing” God and mystical experience, in The Biblical Review, Volume 2, 1917: “Evangelical Christianity interprets all religious experience by the normative revelation of God recorded for us in the Holy Scriptures, and guides, directs, and corrects it from these Scriptures, and thus molds it into harmony with what God in His revealed Word lays down as the normal Christian life. The mystic, on the other hand, tends to substitute his religious experience for the objective revelation of God recorded in the written Word, as the source from which he derives his knowledge of God, or at least to subordinate the expressly revealed Word as the less direct and convincing source of knowledge of God to his own religious experience. The result is that the external revelation is relatively depressed in value, if not totally set aside.”
One of the more prominent people who introduced experience-based emphases and techniques into the visible church was author Richard Foster. His book Celebration of Discipline: The Path to Spiritual Growth took the church world by storm when first published in 1978 (from which the below quotes are taken). It is about the quest for spirituality based on the inner workings of the soul and spiritual techniques. Interestingly, Foster was raised a Quaker. They believe in the “inward light.” To give you a taste of Foster’s book the following quotes are given:
The inner world of meditation is most easily entered through the door of the imagination. (p. 22)
Another meditation aimed at centering oneself begins by concentrating on breathing…become silent outwardly and inwardly. Be attentive to the inward living Christ…then listen once again. (p.25)
You can see Foster believes that imagination, meditation, and the quest for the “inward Christ” are the new mediation before God. Of course that is absolutely not biblical, and is in contrast to the “outward” light who invaded our world of darkness in the person of Jesus Christ, who is the Way, the Truth and the Life. He and His Word are the Light having come into our darkened lives. Not long after Foster’s book, a new seminary category of study was born – spiritual formations. It is quite a conglomeration of teachings in most seminaries these days.
The Cosmic Christ
Another false thought that has entered into evangelicalism is that of a Romantic and/or Cosmic Christ. It says God comes to us “in stuff” (like the creation) and that we need “spiritual eyes” to see Him there. But does Christ make Himself known personally through the creation? No, the true God reigns transcendent over His creation and made Himself personally known in the Person of the Lord Jesus Christ as revealed in Scripture. Yet many are flocking to such authors as Ann Voskamp who writes in her book One Thousand Gifts, “Do I have eyes to see His face in all things…” (p.112). This is a new-age concept in that there is an ever present deity in the creation. It is not talking of the real Jesus, the One who became flesh and dwelt among us and died and was raised again and is seated at the right hand of God the Father. If you want that Christ, you should stick with only the Scriptures.
The End of this Present Evil Age
Unfortunately, the introduction of many false teachers and false doctrines as mentioned here has been “winked at” by most evangelical leaders. This is not ok. If we move even slightly off a biblical foundation, where does that take us? In Acts 20:17-38 we read of Paul’s ministry to the elders of Ephesus and his emphasis in that ministry. True shepherds warn the flock of such impending dangers just like Paul. In light of this, we must not overlook the very nature of the end of this present evil age. Remember what Paul says in 2 Thessalonians 2. He warns that there would be a falling away from the faith led by the man of sin. In the midst of the church at the end of the age a beast will arise and be the catalyst of a false church and the world’s final rebellion against the God of the Scriptures. The spirit of antichrist starts in the visible church and the final apostasy will be no exception. For saints who are alive, it will be very costly to maintain a faithful testimony to the Lord Jesus Christ in the environment of both the visible apostate church and the fallen world.
But our ultimate hope is eternal and will be revealed when the Lord Jesus Christ Himself returns on that glorious day of His revelation! Until then, we should be on guard even while sitting in a church pew and wait patiently with watchful eye and prayerful hearts.
This article is drawn, in part, from Resolute: An Unwavering Stance on the Truth of God’s Word by Kerri Sheldon and her father, David Sheldon. Kerri and David believe that making true disciples of Jesus Christ can only happen when one is presented with sound theological doctrine, and their desire is to help Christians guard against deception and ignite a stance on the Word of God alone. Check out Kerri and David’s website, 4 Truth Ministry and follow them on Facebook and Twitter.
Sometimes we ladies fall for the mindset that if we’re going to pick up a Bible study book, read a blog, or listen to Bible teaching, it has to be from a female author or teacher. Not so! There are a lot of fantastic, doctrinally sound, male Bible teachers, pastors, and writers out there – far more males than females, actually – and you’ll really be missing out if you limit yourself to women teachers and writers.
In A Few Good Men, and A Few MORE Good Men, I recommended some of my favorite male pastors, writers, and podcasters. Here are ten more; and these lists are by no means exhaustive!
IMPORTANT REMINDER: Don’t take my (or anyone else’s) word for it that any ministry, podcast, book, or blog is biblical in its doctrine. You MUST do the work of comparing with Scripture everything you read and hear. If it doesn’t match up with God’s word (in context), chuck it.
1. A.W. Pink – “Biographer Iain Murray observes of Pink, ‘the widespread circulation of his writings after his death made him one of the most influential evangelical authors in the second half of the twentieth century.’ His writing sparked a revival of expository preaching and focused readers’ hearts on biblical living.”¹ Pink pastored churches in Britain, Australia, and across the United States. During that time (1922-1953), Pink published a monthly magazine, Studies in the Scriptures. Each edition contained several articles expositing Scripture. He also authored scads of pamphlets and books on a number of theological topics. Perhaps two of his best known books are The Attributes of Godand The Sovereignty of God. You can read these and many others of Pink’s works online for free at CCEL and Chapel Library or buy a bound or Kindle copy at Amazon. Facebook
3. Allen Nelson – Better known as “Cuatro” to his friends (because he’s Allen Nelson IV), Allen pastors Perryville Second Baptist Church in Perryville, Arkansas. You can hear Allen’s heart for the life and health of the rural church on the podcast he hosts with fellow rural church pastor, Eddie Ragsdale, The Rural Church Podcast(also on iTunes), and you don’t have to be a pastor or member of a rural church to benefit from listening in. You might recall reading a review here on the blog of Allen’s recently published first book From Death to Life: How Salvation Works (ordering info. included). It’s a helpful treatment of the ordo salutis in plain English for plain Bible Belt “Christians,” a discouraging proportion of whom do not understand the biblical gospel. Allen is also contributing writer and roundtable member of the Things Above Us blog and podcast, and don’t forget to check out his sermons, too! FacebookTwitter
4. James White – An expert in apologetics, textual criticism, and theology, “James White is the director of Alpha and Omega Ministries, a Christian apologetics organization based in Phoenix, Arizona. He is a professor, having taught Greek, Systematic Theology, and various topics in the field of apologetics. He has authored or contributed to more than twenty-four books…is an accomplished debater, having engaged in more than one-hundred sixty moderated, public debates around the world with leading proponents of Roman Catholicism, Islam, Jehovah’s Witnesses, and Mormonism, as well as critics such as Bart Ehrman, John Dominic Crossan, Marcus Borg, and John Shelby Spong. [Dr. White] is an elder of the Phoenix Reformed Baptist Church.” Check out Dr. White’s many books and debates, his blog, and The Dividing Linewebcast (also on iTunes). FacebookTwitter
(A word of caution: Dr. White maintains a personal friendship and occasional ministerial partnership with Dr. Michael Brown, who, although doctrinally sound in many areas of his theology, has become a safe haven for the worst of the worst New Apostolic Reformation heretics. To my knowledge, Dr. White does not endorse this behavior of Dr. Brown, and certainly does not endorse NAR heresy. I strongly discourage you from following Dr. Brown.)
5. Tim Challies – Founder of one of the most widely read conservative Christian blogs on the web, Tim Challies has been writing on a variety of theological and “Christian Living” topics for over fifteen years. An avid book reviewer, Tim is also an author in his own right. Two fun features of Tim’s blog are his daily “A la Carte” column, a curation of articles and other resources from around the web, and Free Stuff Fridays, a weekly giveaway of books, conference tickets, software, music, and all kinds of other awesome Christian resources and materials. Catch Tim at a speaking engagement or on his YouTube channel, listen to his sermons, and take a look at his terrific products over at Visual Theology, and Tim’s publishing company, Cruciform Press. FacebookTwitter
6. Kevin DeYoung – Kevin is the senior pastor of Christ Covenant Church in Matthews, North Carolina, serves as board chairman for The Gospel Coalition, and holds the position of assistant professor of systematic theology at Reformed Theological Seminary. Kevin is the author of several books, including Crazy Busy and The Biggest Story, the story arc of redemption for children. Read Kevin’s articles at his blog, DeYoung, Restless, and Reformed, check out his books, tune in to his sermons and videos, or catch him at an upcoming conference like Faithful. FacebookTwitter
7. Darrell Harrison – “An expository Bible teacher with a passion for helping Christians understand what they believe and why they believe it,” Darrell’s love for God’s Word and God’s people is evident no matter which ministry “hat” he wears. Darrell is a faithful member of Rockdale Community Church in Conyers, Georgia, and is training to become an ACBC certified biblical counselor. But Darrell is probably best known for blogging and podcasting. At Just Thinking…For Myself, Darrell writes eloquently on a variety of theological topics and current events. “The Just Thinking podcast is an extension of the Just Thinking blog and is hosted weekly by Darrell Harrison and Virgil Walker. The mission of the podcast mirrors the mission of the blog: applying biblical truth to social, cultural, political, and theological issues in our world.” FacebookTwitter
8. Tom Buck – Tom’s no nonsense quips and keen insight into the current affairs of Southern Baptist life have made him something of a legend on Twitter, but Tom is first and foremost a pastor. “Tom has a strong passion for the local church and a desire to lead the church to be Word-centered in everything it does. He is committed to the expositional preaching and teaching of God’s Word” as senior pastor of First Baptist Church of Lindale, Texas. Listen to Tom’s sermons online or on iTunes. You can read some of Tom’s compelling articles at The Statement on Social Justice and the Gospel (which Tom contributed to), Delivered by Grace, and Reformation 21. FacebookTwitter
9. Costi Hinn – Costi is “the Executive Pastor of Mission Bible Church in Orange County, CA. He is passionate about equipping Christians to live boldly for Jesus Christ. Due to his background and expertise, he educates people around the world on strategies for dealing with the prosperity gospel.” Though not one to capitalize on the family name, much of Costi’s background and expertise that uniquely qualify him to address the blight of the prosperity gospel and New Apostolic Reformation, stem from his personal experiences as nephew and ministry assistant of NAR faith healer Benny Hinn. I highly recommend Costi’s excellent book on the NAR, Defining Deception: Freeing the Church from the Mystical-Miracle Movement (co-authored with MBC’s pastor, Anthony Wood) as well as his Truth & Transformation video series with Justin Peters. Check out all of Costi’s sermons, videos, and podcast appearances, and be sure to subscribe to his blog at For the Gospel. FacebookTwitter
10. Jerry Bridges – Jerry Bridges spent most of his professional career in parachurch ministry, serving in a variety of positions and capacities with The Navigators. He is remembered for his clear and easy to grasp writing style which has endeared to the hearts of millions his books The Pursuit of Holiness,The Practice of Godliness, Trusting God, and over twenty others dealing with topics in theology and discipleship. Get a list (with links) of all of Jerry’s books, listen to his sermons, talks, and interviews here and here, and watch his videos on YouTube. Twitter
Welcome to another “potpourri” edition of The Mailbag, where I give short(er) answers to several questions rather than a long answer to one question. I also like to take the opportunity in these potpourri editions to let new readers know about my comments/e-mail/messages policy. I’m not able to respond individually to most e-mails and messages, so here are some helpful hints for getting your questions answered more quickly. Remember, the search bar can be a helpful tool!
I need guidance in approaching the worship director of the church I started attending 6 months ago (haven’t joined yet) due to his frequent use of Bethel/Jesus Culture/Hillsong/Elevation Church music. I stand there in silence most of the worship time because I just don’t feel comfortable singing those songs. I don’t want to meet with him and be that person who is critical and legalistic but I feel convicted that someone needs to. Should I go talk to the pastor first (we have somewhat of a relationship since I’ve met with him a couple times and agree with his theology)?
It’s awesome that you are discerning enough to know that music from these heretical and New Apostolic Reformation organizations shouldn’t be used by any church. I encourage you to keep having those “powers of discernment trained by constant practice” of distinguishing good from evil (Hebrews 5:14).
I also want to encourage you that inquiring about the theology of a church or its music – especially as someone who is deciding whether or not to join that church – is not being “critical and legalistic”. That is what scoffers say about discernment issues, but it is not the biblicalway of viewing “contending for the faith”. Do not allow ungodly people with their unbiblical personal opinions to deter you or even make you feel bad for doing what is right and good and godly.
I agree with you that someone needs to address the issue of the music. It is possible that’s why God put you into this church at this time – to pray for the church, the minister of music, and the pastor about this, and to lovingly explain the issues.
Since I’m not personally involved in the situation, I can’t offer any advice as to whether to approach the minister of music or the pastor first. I would suggest you pray and ask God to give you the wisdom to know which one of them to speak to first, and trust Him to direct your paths. You might want to consider which of these men you feel will be more receptive to what you have to say. If you go to the minister of music first and he brushes you off, I would encourage you to go to the pastor next. I think both of their responses will help you decide whether or not you want to join this church.
A popular Christian apologist I follow says that the prohibition against women preaching, teaching Scripture to men, and holding authority over men in the church in 1 Timothy 2:12 is translated incorrectly.
I do not permit a woman to teach or to exercise authority over a man; rather, she is to remain quiet.
He says it should not be translated as “woman” and “man” “but as “wife” and “husband”, and that he believes Bible translators mainly translate it as man woman due to tradition (i.e. men have historically been the pastors and teachers in the church).
This is why linguists – professional experts in the biblical languages – are hired to translate Scripture, not apologists.
Bible translators (of reliable translations) are true to the text, not church tradition or personal convictions. Furthermore, when translators are working on the text, it is not a lone individual who writes down what he thinks the Greek words say and that’s the Bible you end up reading. There are teams of translators, linguists, editors, and even computer experts who work on the text. They check, and double check, each other’s work. So even if one translator was translating according to tradition or opinion, it would be caught by others and not allowed to slip through the cracks.
All of the most reliable English translations translate the words as “man” and “woman”, not “husband” and “wife”.
And just for kicks, I checked this verse in about a dozen of the less reliable translations, and every single one of them translates it “man” and “woman”. Even versions that got other parts of verse 12 incorrect still use “man” and “woman.” For goodness sake, even The Message and The Passion “Translation” possibly the two worst English versions of the Bible (They’re not even translations. The Message is a paraphrase, written by someone who endorsed the heresy-laden book The Shack and has made statements affirming homosexuality. And Passion is the new New Apostolic Reformation version of the Bible, based, supposedly, on new revelation directly from God.) both say “man” and “woman”. And the NAR is totally OK with female preachers, so you know they’re not using “man” and “woman” due to tradition.
So we’ve got one apologist who’s of the opinion that it should be “husband” and “wife” against scads of translators who are experts in their fields and whack job NAR “translators” who approve of female pastors, who all use “man” and “woman”. You would think someone out of all of those people would have translated it “husband” and “wife” if that was the correct translation. It’s telling that even “translators” who push the egalitarian agenda won’t go so far as to change it to “husband” and “wife”. I think the apologist is somewhat out of his depth here.
A few more quotes from said apologist:
“Verse 11 and following is directed at women in the context of their relationship with a man to whom they are supposed to be entirely submissive. That is a marriage relationship…1 Timothy 2 talks about the relationship between husband and wife; it’s chapter 3 that talks about church leadership.”
No, verse 11 is not directed at women. Neither are any of the other verses in chapter two or the rest of the book. First Timothy is a pastoral epistle. It was directed at Timothy by the Holy Spirit via Paul as sort of a “policy and procedure manual” for the church. This passage is not talking to women about their marriages, it is talking to pastors and elders about how to run the church. Verses 11-12 are talking about the role and behavior of women (all women, not just wives) in the church setting. They are not to instruct men in the Scriptures or exercise authority over men. That definitely “talks about church leadership” by excluding women from leadership roles that place them in authority over, or instructing, men.
And keep in mind that when 1 Timothy was written, there were no chapter and verse markings. The text was one continuous flow. If you begin reading in 2:11 and go through 3:13 (try reading it here, adjusting the settings to remover chapter and verse markings), I believe there’s a strong case to be made that 2:11-15 is actually the introduction to the qualifications for pastors, elders, and deacons. The passage (2:11-3:13) starts by stating who is disqualified from those positions and why (2:11-15) and then moves on to who is qualified and how (3:1-13).
Furthermore, if you’ll take a look at verses 8-10 of chapter two, which immediately precede the verses in question (11-12) and provide context, you’ll see more instructions to both men and women. Are only husbands to pray? Are only wives to dress modestly and respectably and adorn themselves with good works? What about single men and women, divorced men and women, widows and widowers?
No other place in Scripture teaches that all women should be under the authority of all men in the church. If this passage is to be interpreted the traditional way, this makes a new and unusual pattern of submission.
And this passage (1 Timothy 2:12) doesn’t teach that either. The statement that women are not to have authority over men doesn’t flip around to mean that all men are in authority over all women. That’s fallacious logic, silly reasoning, and patently unbiblical. The text says what it says and that’s it. You can’t turn it inside out and make an inference from an incorrect converse. That’s being a poor workman and mishandling Scripture.
It’s abundantly clear that “man” and “woman” are the correct translation in 1 Timothy 2:12. If anyone is being more loyal to an agenda than to the text here, it’s the apologist, not the translators.
If you’re looking at a 5-10 minute time frame, you might want to work your way through Proverbs one verse at a time, or possibly some of the shorter Psalms. I usually set aside a 30 minute block of time and read through a book with my boys one chapter a day, asking questions and explaining things along the way. If you’d like, feel free to use any of my studies at the “Bible Studies” tab at the top of this page, selecting and simplifying the questions you feel are most appropriate for your children.
How can I subscribe to your blog via e-mail?
If you’re on a computer, there’s a little box in the left sidebar where you can enter your e-mail address:
I don’t know if your phone is the same as mine or not, but here’s what the e-mail sign-up on my phone looks like:
I was wondering if you had a list of recommended books for women. I’m trying to offer an alternative to an NAR book that has nice ideas and some good thoughts but also strays into Spiritual Formation and, of course, really off-base hermeneutics.
I don’t really know of any off-hand along those lines that I would recommend. The problem with “Christian” books for women by women is that most of them contain false doctrine. A couple of suggestions:
1. The Bible. If you’re looking for a book with nice ideas and good thoughts, Psalms might be a good place to start. Getting grounded in God’s Word and digging deep into Scripture itself is the best way to guard your ladies against the false doctrine you’re describing.
2. There’s no reason women can’t read books authored by men. If you already have a particular doctrinally sound book in mind that was authored by a man, go right ahead and use that one. I would recommend any of the male authors under my “Recommended Bible Teachers” tab (as well as any of the female authors listed there). You might also find the kind of book you’re looking for at GTY or Ligonier.
If you have a question about: a Bible passage, an aspect of theology, a current issue in Christianity, or how to biblically handle a family, life, or church situation, comment below (I’ll hold all questions in queue {unpublished} for a future edition of The Mailbag) or send me an e-mail or private message. If your question is chosen for publication, your anonymity will be protected.
I’ve written a book. Will you please read and review it or give me some feedback on it?
Every time I receive this e-mail from an author, I just want to reach through the screen and hug her. I’ve been in her shoes.
When my book, Jacob: Journaling the Journey, was in print I, too, had to write to bloggers and Christian newspapers and magazines asking them to write a review of my book. It’s a good way to introduce potential readers to your work and encourage them to buy a copy or twenty.
I never liked soliciting reviews for two reasons: First, it’s kind of like asking a boy out on a date – it’s an awkward and weird feeling that you’re essentially saying, “Do you like me enough to say ‘yes’ to me?”. Then, there’s the agonizing wait to see whether or not you’re going to be rejected. Second, I always felt like I was asking the person to invest an enormous amount of time and work, and all I was able to give her in return was my thanks and a copy of my book. It felt like asking someone for a huge favor that I’d never be able to repay.
So my heart goes out to those fledgling authors who are having to cold call bloggers for reviews. It ranks right up there with having a tooth pulled.
Now that the shoe is on the other foot and people are asking me to write reviews of their books, I have a much different perspective. Far from feeling like authors are asking me for a humongous favor, it would be my joy to serve and encourage each and every one of them by writing up shining and supportive reviews for all.
Unfortunately, for a number of reasons, I find that I can’t:
📖 There aren’t enough hours in the day to read and review, in a timely manner, all of the books I receive inquiries about. And, I can’t bring myself to say “yes” to some authors and “no” to others.
📖 I’ll just be perfectly transparent with y’all, I’m very undisciplined right now when it comes to book reading. I study my Bible. I read lots of articles. But for some strange reason, I’m not reading many books – even books of my own choosing – at this season of my life. I can’t really figure it out because I’ve lived my whole life with my nose in a book, but…there it is.
📖 Writing a book review (especially when you have a relationship with the author) is kind of like a friend showing you her new baby and saying, “Isn’t she cute?”. Fortunately, I happen to think all babies are cute, but…with books, not so much. And the last thing I want to have to do is tell a friend, or even a stranger, that her book has a face only a mother could love. I’m an author. I know what it’s like to hear that. It’s no bueno.
Every once in a blue moon, I’ll write a brief recommendation of a book I’ve picked up of my own volition and taken my sweet time reading because I think it’s something my readers would enjoy or benefit from. I can do that without the pressure of a deadline or worrying about hurting an author’s feelings.
Also, I try to compensate for the fact that I don’t write book reviews myself by publishing reviews written by guest posters. If you would like to write a book review as a guest poster, or if you’re an author who has a blog-less friend ready to write a review but needing a platform to post it on, drop me an e-mail and let’s chat about it.
While I’m honored and humbled that anybody out there might want my opinion on her book, and I dearly wish I could write a review for everyone who asks, I’m afraid that – with rare exceptions for people I’m extremely close to or who have served as mentors to me – for this season of my life, the answer has to be an across the board “no”.
If you have a question about: a Bible passage, an aspect of theology, a current issue in Christianity, or how to biblically handle a family, life, or church situation, comment below (I’ll hold all questions in queue {unpublished} for a future edition of The Mailbag) or send me an e-mail or private message. If your question is chosen for publication, your anonymity will be protected.
If your theology pretty much matches up with mine (as outlined in the “Welcome” and “Statement of Faith” tabs) and you’d like to contribute a guest post, drop me an e-mail at [email protected],
and let’s chat about it.
photo credit: Stephen J. Melniszyn
A Review of Allen S. Nelson IV’sFrom Death to Life: How Salvation Worksby KatyB.
The most agonizing, frustrating experience in my ministry to women is the woman who claims to be “saved” but gives no evidence of it. No interest in talking about Jesus, no interest in holiness, reading the Bible, going to church, serving God’s people. She has a salvation testimony (often dramatic and self-glorifying) that is superficial, shallow, and devoid of any real repentance for her sin. I suspect she’s a false convert. And I find it exceptionally difficult to talk to false converts.
In From Death to Life, Pastor Allen Nelson confronts the disaster of false conversions, linking them toa false understanding of salvation: what it is, what it does, and how it works. He writes, “Ask fifteen people what it takes to be saved and it’s not out of the realm of possibility that you’ll get twenty different answers.” (Loc 173)¹
He makes the bold statement that “there is no spiritual life in many who claim to be Christians in America.” (Loc 247)He calls them the “walking dead”.
How does that happen? What would cause a person to wrongly believe he or she is a Christian? He lays some of the responsibility at the feet of churches that use methods such as external manipulation, diluted gospel presentations, the altar call, and the sinner’s prayer to lead the walking dead to their false professions of faith and their false assurances of salvation. He blisters easy-believism practices that, even if well-intentioned, have done damage to churches more influenced by a fallen culture than by God’s own Word.
So how does salvation work? The author has narrowed the answer down to five main points:
1. The gospel must be proclaimed.
2. God must move.
3. The sinner must respond in faith and repentance.
4. God justifies the sinner.
5. The sinner grows in the Lord over a lifetime.
Pastor Nelson not only unpacks, but folds, hangs up, and neatly puts away each of these main points in a few short chapters. In doing so, he poses and then answers questions such as, “What is the true gospel?”, “What is biblical repentance?”, “What is saving faith?”, and “What exactly is justification?” His answers are delivered in a direct, engaging, accessible style with plenty of biblical illustrations and scriptural references. No theological dictionary needed.
The book includes “how–to’s” but doesn’t read like a “how–to” manual. The tone is pastoral, sometimes comfortable, sometimes convicting, but never harsh. At times, the reading felt like sitting over coffee with Pastor Nelson, asking questions about various evangelistic situations, and receivinguseful advice on how to respond.
A destitute woman in a homeless shelter,eyes pallid, needle tracks running down her arms, naturally incitesmy heart instinct to put my arms around her, tell her Jesus loves her, and give her some money. But Pastor Nelson reminds us:
“People need to hear more than “Jesus loves you,” What they need to hear today is what they’ve alwaysneeded: to know that they are sinners, that they need a Savior, that Jesus is that Savior, and until and unless they come to Him in faith, they will justly spend an eternity facing the punishment of their sins.” (Loc 2413)
He points out that it is vital that we all(not just the “trained professionals”) know what to say when the time comes to share the gospel of Christ. And while there is no formula, it is essential that the facts of the gospel are understood. The book helpfully guides the reader in a biblical understanding of how salvation happens and presentsrealistic examples of responsesthat can be used with unbelievers/false converts in evangelistic conversations.
The chapter “Plant, Water, Trust God, Repeat” is a compellingwarning to stick to a biblical approachto evangelizing the lost. (Throughout the book he gives examples of unbiblical approaches.) In this encouragingchapter, he discusses applying how salvation works in real life scenarios, acknowledging that it is not always easy. He doesn’t present himself as a superhero evangelist.
This is a serious book, but the author can also be funny. I got a laugh out of his response to the command to “ask Jesus into your heart”. His tone, however,is utterly serious when discussing repentance:
“God doesn’t beg people to repent so they can be the star player on His team. He demands repentance. He owes mankind nothing. What a fearful and insolent game we play by making repentance an optional feature to becoming a Christian, refusing to properly define it in hopes of sneaking people into the kingdom, or by flat out dismissing it altogether.” (Loc 1164)
He spends a good bit of time parked on repentance, emphasizing that biblical repentance is necessary for any person to become a Christian. He asserts, “Remorse does not equal repentance” and goes on to give what he calls the bare necessities of repentance.
Is it possible toknow if a person has actually been converted? In the chapter on sanctification, the author acknowledges that while we can’t see the heart, we can use the discernment God gives us to see evidence of true conversion. He provides a practical alliteration method to assist in discerning whether or not the gospel has actually taken root in a person’s heart and the changes we would expect to see in a truly converted person.
He warns the church against haphazardly affirming people as Christians without exercising grace-filled discernment:
“Often, we claim that the problem in our churches is that too many people are immature believers when the real problem is that many we call immature, actually have no life in Christ at all. They aren’t growing because they aren’t living.” (Loc 1878)
The sanctification chapter, my favorite, thrust me to a fresh examination of my own life using his alliteration template. What evidence of salvation would others see in me? What would they discern as my motivation for life? There is plenty of self-application for the reader.
The book has three appendices. Appendix 1: The Sinner’s Prayer, Appendix 2: Acts 2 is Not an Altar Call, Appendix 3: Putting “Baptist” Back in Your Church. In these appendices, the author makes some “say whaaaat?!?”observations that will rock your world if your church endorses these practices.
This is a short book. Although the print version is only 200 pages, there is nothing shallow about the content. The reader will step into a deep pool. Did I know how salvation works before I read the book? Yes. Have I been guilty of using unbiblical methods to try to bring about a conversion? Yes. I finished the book with an unanticipated, heart wrenchingreorientation to the gospel as the power of God unto salvation. I betI’m not the only reader who closed the book and repented.
I began by saying I find it exceptionally difficult to talk to false converts. What do you say to someone who believes she is saved when it is clear that she is not? Pastor Nelsonis immeasurably supportive in reinforcing that “we must proclaim the gospel. Without it, people will go to hell. It’s as simple as that.” (Loc 441)
The book left me feeling hopeful, energized, looking forward to my next evangelistic encounter. God saves sinners. God saves sinners. And he uses sinners like me to do so.
Pastor Nelsonwrites, “Every single one of us is charged with sharing the gospel with those God providentially places in our life.” What a calling, what a staggering privilege. God could sovereignly call His own to Himself without us, but He has chosen to work through us. This book will certainly help us in our evangelism. I recommend it for everyone.
¹Katy reviewed the Kindle edition of the book and used Kindle location numbers rather than page numbers.
Allen “Cuatro” Nelson, IV, author of From Death to Life, is the pastor of Perryville Second Baptist Church in Perryville, Arkansas, and co-host ofThe Rural Church Podcast. Contact Him directly viaTwitter to receive a free study guide with your order of From Death to Life or a discount on bulk orders. You can also order fromAmazon.
Katy can’t remember when she became a Christian but is assured that, by the grace of God alone, she is a Christian. She ministers to women in her OPC church, in homeless shelters, in a prison, and sometimes at the grocery store. She is an executive with a United States health care corporation and enjoys her work, although she would rather be reading. You can find Katy on Twitter at @KatyvonBora.
ALTHOUGH I DO MY BEST TO THOROUGHLY VET THE THEOLOGY OF THOSE WHO SUBMIT GUEST POSTS, IT IS ALWAYS POSSIBLE FOR THINGS TO SLIP THROUGH THE CRACKS. PLEASE MAKE SURE ANYONE YOU FOLLOW, INCLUDING ME, RIGHTLY AND FAITHFULLY HANDLES GOD’S WORD AND HOLDS TO SOUND BIBLICAL DOCTRINE.
Welcome to another “potpourri” edition of The Mailbag, where I give short(er) answers to several questions rather than a long answer to one question. I also like to take the opportunity in these potpourrri editions to let new readers know about my comments/e-mail/messages policy. I’m not able to respond individually to most e-mails and messages, so here are some helpful hints for getting your questions answered more quickly. Remember, the search bar can be a helpful tool!
In the last Potpourri edition of The Mailbag, a reader asked if I could enlarge the font of my articles. I played around with several different fonts and sizes, and what you’re currently seeing is the best I can do to enlarge the font without throwing the layout of the whole page out of whack. Personally, I think it’s still too small, but I hope it has helped at least a little.
I am wanting to start a Bible study for my coworkers after work maybe once a week or every two weeks but I don’t know where to start. Many of them are young women in their early twenties and either new in the faith or no faith at all. I want to start slowly so I don’t overwhelm them but I have no idea the first step I should take. Do you have any resources for sound Bible studies for new believers or young women?
Yes, I recommend you choose a book of the Bible, maybe a shorter one to start with, start at the beginning, and work your way through it with your ladies, teaching and discussing as you go. If you need some help in the beginning knowing what kinds of questions to ask or which issues in the text to focus on, you are more than welcome to use any of the studies I’ve written free of charge (see the “Bible Studies” tab at the top of this page), and even print them out if you like. Once you get a feel for teaching this way, I’m sure you’ll do fine on your own coming up with questions and pointing out important points in the passage.
You might want to start out with my study on Colossians since it’s fairly short and will give your group a good grounding in biblical Christology (who Jesus is, what He did, and why).
Another option might be for the group to choose a Bible reading plan (again, maybe one of the shorter ones to start off with), do the reading at home, and come together weekly to discuss the readings.
I don’t recommend “canned” book or DVD studies anymore. First of all, the overwhelming majority of them contain false doctrine. Studying the Bible itself sidesteps that problem altogether. Second, Christian women need to learn and practice the skill of picking up God’s Word and studying it for themselves. You have the unique opportunity with new Christians and non-Christians to start them off on the right foot of studying the Bible itself rather than getting them hooked on other people’s books. Below are a few more resources that might be helpful. Let me know how it goes!
Oh my! My take is that I really don’t know enough about quantum physics to speak intelligently on this. You might want to check out Answers in Genesis or the Biblical Science Institute. The founder of BSI, Dr. Jason Lisle, is a doctrinally sound Christian who has a double-major bachelor’s degree in physics and astronomy with a minor in mathematics, and a Master’s degree and Ph.D. in astrophysics. He would be the one to ask.
Book RecommendationsI need some help from you readers on these!
Readers have written in requesting doctrinally sound recommendations of books on the following topics:
Theology books for teenagersNeither of these are written specifically for teenagers, but they’re both written simply enough that teenagers shouldn’t have any trouble with them:None Other by John MacArthurEveryone’s a Theologian by R.C. Sproul
A whole Bible commentaryHere are some you can try out for free. MacArthur’scommentaries are excellent, as are Boice’s.
Explaining sex/where babies come from (8 year old level)Clueless. My husband and I just explained it to our children verbally.
If you have a recommendation for a doctrinally sound book on any of these topics, please comment below with the title, and the author’s name and a link if possible. Thank you!
I read your blog regularly and haven’t seen you write about a particular topic: Christian wives, especially mothers, working outside the home.
The reader went on to answer her own question quite beautifully, I thought. I couldn’t say it any better, so here’s the rest of her e-mail:
As I have read and studied Titus 2:3-5 lately, as an older woman (62 this year), I was struck by this phrase, workers at home:
Older women likewise are to be reverent in their behavior, not malicious gossips nor enslaved to much wine, teaching what is good, so that they may encourage the young women to love their husbands, to love their children, to be sensible, pure, workers at home, kind, being subject to their own husbands, so that the word of God will not be dishonored. (emphasis mine)
Interestingly, our pastor is doing a series on evangelism. He has started out in a different place, sort of laying the groundwork. He is showing us particular passages in the Scriptures regarding practical things that Scripture says Christians can do to perhaps provide openings and help to overcome some of the unsaved person’s natural enmity to the gospel. He preached on this passage because it says that women are to do/not do these things “so that the word of God will not be dishonored.” This has made this issue seem even more compelling to me. I know of Christian wives that are working outside the home, some against the counsel of godly people in their lives and even the wishes of their own husbands.
Lest you misunderstand me, I am not saying that a Christian woman should never work outside the home. Every Christian couple must decide together before the Lord how this looks in their own family. Obviously, a woman who has children in school all day, or grown children, or no children, has more leeway. If a husband is absolutely unable to work because of ill health, or whatever, I am sure there are some exceptions. But still the Scriptures teach that the Christian wife’s primary focus and attention is to be in her home, that the word of God will not be dishonored. I agree with what Grace to You wrote here.
Should women be missionaries?
Yes. Absolutely. In fact, we need more women – single and married – to serve as missionaries (more men, too). The only caveat is that women who serve as missionaries need to do so in a way that is in keeping with Scriptural principles of women’s roles in the church. (For example, female missionaries should not be pastoring churches on the mission field. A missionary’s job is to share the gospel with people and then disciple them in sound doctrine, and you don’t want to be teaching false doctrine through the act of preaching to men.) But there are oodles of mission opportunities that fit the bill.
It is my understanding that there is a great need for women missionaries to minister to women in countries whose cultures discourage or prohibit their women from interacting with men. A male missionary could not reach out to women in those countries, but a female missionary could be very effective.
My denomination, the Southern Baptist Convention, has a rich history of female missionaries and mission work, starting with our Women’s Missionary Union, celebrating its 130th anniversary this year. Our yearly offering for international missions is named after female missionary, Lottie Moon. Likewise, our annual North American missions offering is the Annie Armstrong offering, and my state convention collects the Georgia Barnette missions offering every year. You might enjoy reading about these female missionaries and others such as Amy Carmichael, Stacy Dyck, and Amy Medina.
There are many reputable missions organizations out there, but the two I’m most familiar with are the Southern Baptist Convention’s North American Mission Board and the International Mission Board, which, even if you’re not Southern Baptist could give you some ideas of the types of mission work out there and the countries needing missionaries.
If you’re thinking about becoming a missionary, set up an appointment with your pastor to talk it over. He can probably give you some great pointers and put you in touch with people and organizations that can help you.
If you have a question about: a Bible passage, an aspect of theology, a current issue in Christianity, or how to biblically handle a family, life, or church situation, comment below (I’ll hold all questions in queue {unpublished} for a future edition of The Mailbag) or send me an e-mail or private message. If your question is chosen for publication, your anonymity will be protected.
If your theology pretty much matches up with mine (as outlined in the “Welcome” and “Statement of Faith” tabs) and you’d like to contribute a guest post, drop me an e-mail at [email protected],
and let’s chat about it.
A Review of Jennie Allen’sAnything: The Prayer that Unlocked My God and My Soulby Carol Coppens
Many years ago, when I was in the 6th grade, I was taught that when doing a book report, even if I didn’t like the book, I should try to say something good about it. That was fine teaching at the time and I think it has made me a better writer, this trying to see both sides. I’m not in school any longer though and these days, I’m bound less by trying to see the good and more to pointing out the multiple errors of books like Anything. If you’re a Jennie Allen fan, you won’t like what I have to say but I can’t stay silent.
Anything is a poorly written book. It’s an irreverent book. It’s a book that will never help any woman discover the totality of God’s plan of redemption, His sovereignty, His wrath which rests on the unregenerate, nor His holy fury at those who presume to speak for Him. This is not a book that will help you to dive deep into the character of God and to know Him better but instead, Jennie’s book is a tedious, self absorbed, experience driven, hermeneutically unsound, over-stepper of scriptural boundaries, mish-mash of emotionalism and repetitive “wrecked-ness”. Here are some of the specific faults that I see.
Even in these days of relativity, where the only rule that seems to apply is that there are to be no rules at all, there are still a few that are necessary. One of the rules of basic English grammar is, if you’re going to use an adjective (remember that word from English class?) you’d better do your homework and find out exactly what that word means, in the context in which you plan to use it.
The word reckless is used multiple times in this book. Jennie describes childlike faith as living “simply, recklessly.” On pg. 97, she writes that she and her husband, “now lay in the hands of a reckless, invisible God.” Page 143 tells of her realization that people are going to think they are foolish for adopting, saying, “that goes with almost any act of recklessness, even reckless love.” Maybe she thought the word sounded powerful and kind of daring when she penned it but the definition of reckless is “without thinking or caring about the consequences of an action.”
Describe human beings as reckless as much as you like, because we all certainly can be, but when a writer uses the word reckless to describe almighty God, that person has crossed over into blasphemy and I would shudder to think that I had written such a thing about the God I will eventually have to give an account to. Some of the other words she uses to describe God are, “unsafe”, “wildly unpredictable”, “radical”, “ridiculously radical” and she also writes that “God is still not very practical.” Exactly where are the chapters and verses for these descriptions of God, Jennie?
In many places, Jennie adds words to Scripture that are not there. Space hinders me from listing them all, so one example will have to do. On page 184, she speaks for Jesus and writes, “as if he were letting us in on the secret, Jesus whispered back to his father, this will all be worth it. Wait till they are with us and see our glory. Just wait till all of this work and suffering and pouring out is over and we are in heaven together forever. Just wait.”
This conversation is, of course, recorded nowhere in Scripture but the words “do not exceed what is written”, definitely are. Jennie would do well to read and meditate deeply on that verse in 1 Corinthians 4. When we imagine that God is speaking to us apart from Scripture, we can easily be led to enter very dangerous territory.
An example of her flawed interpretations of Scripture is on page 37. Jennie quotes Hosea 2:14-17 but then she blatantly misinterprets God’s promise to restore Israel to Himself, as a “dramatic metaphor” about those of us who chase other loves. I say, leave Biblical interpreting to those who know about these things, Jennie. If you think that you’ve been given a new interpretation of these verses that no other person has ever had before, you’re just plain wrong. God was promising restoration to Israel in these verses and nothing else.
She also does emotional and hermeneutical callisthenics with God’s call to Abraham to sacrifice Isaac (pgs. 69-70). Jennie’s theory is that God was punishing Abraham for his overwhelming love for his son that, according to her, had usurped God as Abraham’s first love. If she had thoughtfully studied these Bible passages or, if she truly understood God’s plan to ultimately save His elect, she would know that the sacrifice of Isaac and the ram God substituted for the boy, was a shadow of God’s own sacrifice of His son Jesus Christ on the cross. There is no excuse for such lazy interpretation of the sacred Scriptures. In these current times, the proliferation of false and misleading doctrine abounds. Having the correct interpretation of Scripture is of paramount importance because our eternal futures depend on understanding correctly, what God is saying to us.
On page 102, Jennie asks “so how do we actually let God change us?” Finally, I thought, a good solid question after having read page after page of drivel. Can an explanation of justification and sanctification be far behind? Sadly, they weren’t even hinted at and she goes on to tell a rather horrific (as a mother I cringed) story of telling her two oldest children to climb up a cliff and jump off! For Jennie, jumping is the key. Either “jump or crawl down” and “the more we jump and see our God come alive around us, the more we jump without fear – and the bigger the cliffs get”, she says. As the Peanuts character Charlie Brown was known to exclaim, good grief!
In the final analysis, the biggest problem I had with this book (and I slogged through it twice) was my knowing that, from the time of her “vision” in the night that Jennie feels was definitely from God, the wheels of the IF: Gatherings began to turn. For those readers who still might be unfamiliar with IF, they are para-church organization, begun by Jennie, that has no scriptural basis or authority. The gatherings happen outside of the local churches and their oversight, supposedly to accomplish something, ie. discipling women, that only churches are charged to do, in Scripture. In this case, the ends do not justify the means.
Because all the women involved in IF cannot possibly be born again, spirit filled, doctrinally sound, mature women with the spiritual gift of teaching, the possibilities for unscriptural philosophies and practices entering in to local churches, families and society at large, are enormous. I see this movement as no less than a calculated move of Satan against women, a frontal attack on the sufficiency of Scripture and a throwing off of the direct commands of God, in His Word, for both married and single women. Jennie Allen might believe that her “call” to begin IF was of God, but I do not.
So, at the end of the day, would I recommend this book to anyone? Absolutely not! What I do recommend instead is simply this – read your Bible, always praying that God will illuminate your mind with His truth. Get involved with a biblically solid church and pray for God to open doors for you to serve there. There is no substitute for a godly, biblically saturated, discerning Christian woman and one only gets that way by hard work and study. The Scriptures do not open themselves to the slothful. When a woman is mature in Christ and can properly discern truth from error then and only then it will come to pass that the writings of the Jennie Allens of this world will be seen for what they truly are, rubbish.
With a grateful nod to my 6th grade English teacher, I suppose I could say one good thing about this book and that is, that it wasn’t any longer.
Carol and her husband Mike live in a small town, on the shores of Lake Erie, in Ontario, Canada. She was 49 years old when Christ called her to be His disciple. A love for the pure truth of God’s Word fuels her passion to expose false teaching and especially that kind which has women as its primary target.
ALTHOUGH I DO MY BEST TO THOROUGHLY VET THE THEOLOGY OF THose WHO SUBMIT GUEST POSTS, IT IS ALWAYS POSSIBLE FOR THINGS TO SLIP THROUGH THE CRACKS. PLEASE MAKE SURE ANYone YOU FOLLOW, INCLUDING ME, RIGHTLY AND FAITHFULLY HANDLES GOD’S WORD AND HOLDS TO SOUND BIBLICAL DOCTRINE.
Share this:
Like this:
WELCOME!
If you're new or would like to comment, please see the "Welcome- Start Here" tab at the top of this page. All comments are handled manually, and I do not publish comments which promote false doctrine. Thanks for stopping by! |
by Doug Sweeney | August 20th, 2018
At long last, the first volume of the Dutch Reformed Translation Society’s English edition of Mastricht is available for purchase. Translated by Todd Rester of Queen’s University Belfast (Northern Ireland), edited by Joel Beeke of Puritan Reformed Theological Seminary (Grand Rapids, Michigan), it offers a great introduction to Reformed orthodoxy and makes available in English Jonathan Edwards’ favorite book. In addition to two prefaces–one by Rester, one by Beeke–its front matter features an introduction to Mastricht’s life and work by our friend Adriaan Neele and an English translation of the funeral oration preached for Mastricht by his university colleague Henricus Pontanus (1706, reprinted in some Latin editions of Mastricht’s magnum opus).
Only two sections of Mastricht’s work have appeared in English before: A Treatise on Regeneration, which was published here and here, and The Best Method of Preaching, released in 2013 as the first fruit of the Rester edition of Mastricht’s TPT and included in the current volume as well.
Mastricht (1630-1706) is widely acclaimed as one of the best theologians in the Calvinist tradition, and his Theoretico-Practica Theologia (1699) is his best work. A seventeenth-century Dutchman in the school of Gisbertus Voetius (1589-1676) at Utrecht University, he presented Reformed theology with academic precision as well as pastoral sensitivity and practical application. For a book-length introduction in English to Mastricht, see this monograph by Neele.
As Edwards wrote to his student and colleague, the Rev. Joseph Bellamy, in 1747, Francis Turretin (1623-1687, a Genevan Calvinist) is excellent “on polemical divinity; on the Five Points [of Dordtian Calvinism], and all other controversial points; and is much larger in these than Mastricht; and is better for one that desires only to be thoroughly versed in controversies. But take Van Mastricht for divinity in general, doctrine, practice, and controversy; or as an universal system of divinity; and it is much better than Turretin, or any other book in the world, excepting the Bible, in my opinion” (Letters and Personal Writings, WJE Online Vol. 16). High praise indeed.
If you enjoy scholastic theology and want a better feel for Edwards’ intellectual world, read this work and stay tuned for its 6 remaining volumes.
by Edwards Center | July 6th, 2018
The Andrew Fuller Center for Baptist Studies at The Southern Baptist Theological Seminary (SBTS) and the Jonathan Edwards Center Germany at Heidelberg University will co-host a conference on Biblical Interpretation and Early Transatlantic Evangelicalism.
The speakers include the conference hosts: the Director of the JE Center Germany, Jan Stievermann, and the Director of the Andrew Fuller Center, Michael Haykin. Joining them is a team of world-class scholars in the field (including notable Edwards scholars): Douglas Sweeney, Ken Minkema, Isabel Rivers, Bruce Hindmarsh, Crawford Gribben, Adriaan Neele, and Robert Brown.
The objective of the conference aims to bring the historiography of early transatlantic evangelicalism together with the history of biblical interpretation. The goal is to understand the exegesis of various eighteenth-century exegetes in their intellectual, cultural, and religious contexts.
To learn more about the conference speakers, schedule, and to register, visit the conference website.
by Doug Sweeney | November 9th, 2017
The long-awaited Edwards Encyclopedia is here. With nearly 400 entries by 169 scholars, as well as a “Foreword” by George Marsden, it is a culmination of many years of labor in New Haven as well as the spread of Edwards studies during the past generation through a wide array of scholarly institutions around the world.
I and several of my students have contributed to this volume. In the interest of fair play, I will keep my comments brief.
This landmark volume features well-known scholars writing on topics about which they have already published books: Robert Brown on “Biblical Languages (Hebrew and Greek),” Ronald Story on “Charity,” Rhys Bezzant on “Ecclesiology,” Ava Chamberlain on “Elizabeth Tuttle Edwards (b. 1645),” Jan Stievermann on “German Pietism,” Thomas Kidd on “Great Awakening,” Sang Hyun Lee on “Habit,” Oliver Crisp on “Idealism,” Seng-Kong Tan on “Incarnation,” Gerald McDermott on “Islam,” Donald Whitney on “Piety,” Ray Yeo on “Regeneration,” Stephen Stein on “Scripture (Exegetical Sources),” David Kling on “Second Great Awakening,” Terrence Erdt on “Sense of the Heart,” Amy Plantinga Pauw on “Trinity,” and Stephen R. C. Nichols on “Typology,” for example.
Perhaps more importantly, it also features lesser-known, up-and-coming scholars treating topics on which they have learned a great deal: Allan Hedberg on “Aging,” Ryan Hoselton on “William Ames,” Joseph Tyrpak on “David Brainerd,” Reita Yazawa on “Covenant,” David Komline on “Sereno Edwards Dwight (1786-1850),” David Barshinger on “Hermeneutics,” Roy Mellor on “An Humble Inquiry (1749),” Craig Biehl on “Merit of Christ,” Daniel Cooley on “Edwards Amasa Park (1808-1900),” Jon Hinkson on “Providence,” Ryan Griffith on “Spiritual Gifts”—this list could go on and on.
Several contributors wrote many different entries–most importantly Ken Minkema, Associate Editor of the volume and Executive Editor of the Edwards Center at Yale.
As the editors have written in the volume’s “Introduction,” the Encyclopedia “fills an essential gap” in reference works about Edwards and his world. It corrects “certain stubborn errors or myths about Edwards’s life and those of his family and acquaintance[s].” It also provides “succinct synopses of topics large and small, well known and little known in Edwards’s life, as well as easily referenced sketches of the people and events of his times, any or all of which can be followed up in more depth by consulting the suggested readings at the end of each entry” (p. x).
Stout, Minkema, and Neele hope to publish an expanded, online version of this work, which will include new entries on subjects identified by readers as important to the study of Edwards’ life, times, and legacies in the future. So our thanks should go today both to those who have made this letterpress book possible and those who will engage and improve it in days ahead.
This previously unprinted sermon series on Jesus’ frightening parable of the wise and foolish virgins (Matthew 25) is a gold mine for Edwards scholars and lay Christians alike. Preached in 1737-38, between the Connecticut Valley revival (1734-35) and New England’s Great Awakening (1740-42), it focused Northampton’s attention for a period of several weeks on the differences between true Christians and “hypocrites” (those who fooled others, and often themselves, about their standing before God)—a theme that would occupy Edwards for many years into the future, when he used this sermon series in writing his better-known spiritual treatises on the Distinguishing Marks of a Work of the Spirit of God (1741), Some Thoughts concerning the Present Revival of Religion in New England (1743), and Religious Affections (1746).
Edited by the standards of the letterpress edition of The Works of Jonathan Edwards (26 volumes, Yale University Press, 1957-2008), these sermons are prefaced with a rudimentary chapter by Wilson Kimnach (general editor of Edwards’ sermons at Yale’s Jonathan Edwards Center) on the homiletical Edwards, “Edwards the Preacher” (13 pgs.), and a slightly longer chapter by Bryan McCarthy (formerly an editorial assistant at the Jonathan Edwards Center, now a doctoral student at Oxford) on the sermons’ “Historical Context” (19 pgs.).
Smartly presented, helpfully indexed, and priced to sell ($25), this volume should make it into the library of every serious Edwards scholar and many fans as well. |
Those who dwell among the beauties and mysteries of the earth are never alone or weary of life - Rachel Carson
Tuesday, February 25, 2014
Hey stop that!!!!!!!!!!!!!!
So I’m sitting down
with my friend she tells me she’s about to make a cologne purchase for one of
her guy friends the add featured David Gandy in a less appropriate attire. At
that moment his name completely escaped my mind, doing a little research this appeared.
1 comment:
This is what i have to say:
There is a privacy about it which no other season gives you.... In spring, summer and fall people sort of have an open season on each other; only in the winter, in the country, can you have longer, quiet stretches when you can savor belonging to yourself. -Ruth Stout... I love winter, Coffee and I seek mystery In life. |
It was a narrative perfectly suited for Fox News’s conservative commentariat. Too bad it was total bullshit.
Three assailants allegedly shot and killed Lt. Joe Gliniewicz, a wholesome small-town cop and Army vet known locally as “GI Joe”; a 30-year veteran of the force; a married father of four; a local hero.
His death had to be part of an ominous trend of societal menaces murdering law officers in cold blood, supposedly fueled by President Obama’s “anti-cop” rhetoric and the Black Lives Matter movement. Several Fox Newsers were quick to make that connection just as Fox Lake, Illinois, police set out to find the three perpetrators Gliniewicz mentioned over the radio just before he died.
While the news of GI Joe’s death broke nationwide on Tuesday, Sept. 1, Fox’s resident quack doctor Keith Ablow sat on the set of the network’s Outnumbered show and lamented how the president has “inflamed racial discord in this country and put a target on the backs of American police officers,” using the recent murder of a Texas deputy at a gas station as a jumping-off point.
“This is not the only incident of this,” conservative firebrand Andrea Tantaros interrupted, teeing up co-host Sandra Smith to introduce the Fox Lake incident. “This is happening time and time again,” Fox & Friends First’s Ainsley Earhardt chimed in. “This is a dangerous place for the country to be,” Liz MacDonald fretted before Tantaros pivoted back to the role of Black Lives Matter rhetoric in cop slayings.
Hours later, primetime star anchor Megyn Kelly interviewed Milwaukee County Sheriff David A. Clarke—an all-too-frequent Fox guest who seems to spend more time bashing black activists on TV than actually, you know… sheriffing. Clarke willfully linked Gliniewicz’s death to how President Obama has “breathed life into this anti-cop sentiment” with his “inflammatory rhetoric.”
That same evening, a cocksure Clarke told Fox Business Network host Lou Dobbs that he has been to Fox Lake and knows that Gliniewicz is one of the town’s “finest,” gunned down while “engaged in self-initiative policing, the best policing there is.” He added: “War has been declared on the American police officer.” On Twitter, the lawman continued: “Time to take to the streets to counter Black LIES Matter. Fox Lake, Illinois.”
And on the morning of Saturday, Sept. 5, Eric Bolling used his weekly Cashin’ In monologue (titled “Wake Up, America!”) to connect Gliniewicz being “blown away in cold blood” to a “crisis” of law enforcement officers being killed, in part because President Obama has failed to publicly state that “Blue Lives Matter.”
Flash-forward to this Wednesday when Fox Lake police officials revealed that Gliniewicz’s death was actually a “carefully staged suicide.” As it turns out, the longtime lieutenant had been laundering thousands of dollars from his department’s youth program for his own personal spending on gym memberships, porn websites, and mortgage payments. There were no assailants; GI Joe shot himself rather than face the consequences.
Have any of these Fox pundits corrected the record or issued mea culpas for their rush to connect this twisted story to their political narrative? Wednesday’s edition of Outnumbered, with Tantaros among its hosts, went without a single mention of the news their own network aired just an hour before. (The show did, however, spend an entire segment bashing film director Quentin Tarantino for his remarks against police brutality.)
As for Sheriff Clarke, he spent all day Wednesday tweeting not about “best policing” Gliniewicz’s complete betrayal of his peers, but instead about, yep, “cop-hating” “prick” Quentin Tarantino.
And Eric Bolling? His daily talk show The Five—which frequently gripes about Black Lives Matter—made no mention of Gliniewicz. Don’t hold your breath for a correct-the-record monologue from him this Saturday either.
Of course, it should be noted that Fox’s straight-news reporters—namely Mike Tobin, Shepard Smith, Happening Now, and the network’s cut-in anchors—reported the story, from the start, as a continuing investigation, without tying it to racial tensions or anti-police violence. The way it should be done.
And when they reported the story’s bizarre developments on Wednesday morning, they did so with entirely straight language. But mum’s the word from the professional bloviators. |
Q:
Jquery click and toggleClass question
here's my probably (and hopefully) simple problem:
i have a list with images as navigation. when you hover over them, jquery animates a div with a caption and shows it. it disapears on mouseout. (works fine)
when you click on the image, the caption div animates further and is overlaying the image completly (works fine). while hovering over another image in the nav the caption div animates aswell (works fine).
the problem: when clicking a second navigation image, the animation of the first one(clicked) should disapear.
here's the jquery:
var thumbslide = $('.boxgrid.captionfull').click(function() {
$(this).toggleClass('clicked').children('.cover').stop().animate({top: 0, height:"230px", opacity: 1}, 350);
});
$('.boxgrid.captionfull:not(.clicked)').live('mouseenter', function() {
$(this).children('.cover').stop().animate({top: 130}, 350);
}).live('mouseleave', function() {
$(this).children('.cover').stop().animate({top: 230}, 350);
})
and here's a link to the dev site
any help is welcome, thanks.
A:
This removes the clicked class and animates it back down and returns the opacity back to 0.7:
var thumbslide = $('.boxgrid.captionfull').click(function() {
$('.boxgrid.captionfull.clicked').removeClass('clicked').children('.cover').stop().animate({top: 230, opacity: 0.7}, 350);
$(this).toggleClass('clicked').children('.cover').stop().animate({top: 0, height:"230px", opacity: 1}, 350);
});
|
Sergio Armando Chávez Davalos
Sergio Armando Chávez Davalos (born 31 October 1974) is a Mexican politician affiliated with the PRI. He currently serves as Deputy of the LXII Legislature of the Mexican Congress representing Jalisco. He also served as Deputy during the LIX Legislature.
References
Category:1974 births
Category:Living people
Category:Members of the Chamber of Deputies (Mexico)
Category:Institutional Revolutionary Party politicians
Category:21st-century Mexican politicians |
[The result of reoperation for lung cancer].
Twenty four patients with recurrent or multiple lung cancer were reoperated in our center. Five-year survival rate was 20% for 11 patients with recurrent, while was 25% for 13 patients with multiple after reoperation. The patients with limited operation had well survival and there was no significant difference in procedure. However all four patients with N2 had poor prognosis. Seven patients (29%) had the post reoperative complication in pulmonary system. All of them had the impairment of pulmonary function (FEV1.0% was less than 50%) or more than 75% perfusion ratio, measured with pulmonary perfusion scintigraphy, in the side of the reoperation. |
Q:
How to remove a subset of a data frame in Python?
My dataframe df is 3020x4.
I'd like to remove a subset df1 20x4 out of the original. In other words, I just want to get the difference whose shape is 3000x4. I tried the below but it did not work. It returned exactly df. Would you please help? Thanks.
new_df = df.drop(df1)
A:
As you seem to be unable to post a representative example I will demonstrate one approach using merge with param indicator=True:
So generate some data:
In [116]:
df = pd.DataFrame(np.random.randn(5,3), columns=list('abc'))
df
Out[116]:
a b c
0 -0.134933 -0.664799 -1.611790
1 1.457741 0.652709 -1.154430
2 0.534560 -0.781352 1.978084
3 0.844243 -0.234208 -2.415347
4 -0.118761 -0.287092 1.179237
take a subset:
In [118]:
df_subset=df.iloc[2:3]
df_subset
Out[118]:
a b c
2 0.53456 -0.781352 1.978084
now perform a left merge with param indicator=True this will add _merge column which indicates whether the row is left_only, both or right_only (the latter won't appear in this example) and we filter the merged df to show only left_only:
In [121]:
df_new = df.merge(df_subset, how='left', indicator=True)
df_new = df_new[df_new['_merge'] == 'left_only']
df_new
Out[121]:
a b c _merge
0 -0.134933 -0.664799 -1.611790 left_only
1 1.457741 0.652709 -1.154430 left_only
3 0.844243 -0.234208 -2.415347 left_only
4 -0.118761 -0.287092 1.179237 left_only
here is the original merged df:
In [122]:
df.merge(df_subset, how='left', indicator=True)
Out[122]:
a b c _merge
0 -0.134933 -0.664799 -1.611790 left_only
1 1.457741 0.652709 -1.154430 left_only
2 0.534560 -0.781352 1.978084 both
3 0.844243 -0.234208 -2.415347 left_only
4 -0.118761 -0.287092 1.179237 left_only
|
This is a very good tamper that fit my needs perfectly. With it's weight ratio with the low "weight point" is very nice to work with. The rubber parts makes it comfortable for the hand and fingers, and even makes the portafilter knock gentle to both tamper and portafilter. The adjustable heigh in three different levels helps you to find a perfect height for your needs and, ofcourse, makes it even more comfortable to use. The uniqness and beauty of the design makes it very attractive and arouse an "I want it badly"-feeling. |
Q:
Importing .xlsx file with special characters
I am using the function readWorksheet from the package XLConnect to import Excel sheets in R. These sheets contain special characters (e.g., ø, õ, ú) which R does not handle very well. As far as I know, there is no "encoding" argument for the function readWorksheet as there is for the read.csv one.
Here is what I am doing so far:
data <- readWorksheet(loadWorkbook("data.xlsx"), sheet = 5)
Is there any option I could use to let R know I have special characters?
I am using RStudio 0.99.903 on macOS Sierra 10.12.1.
A:
This is UTF-8 letters table http://www.utf8-chartable.de/
I use package xlsx for excel files:
read.xlsx(file = ".xlsx", sheetName = "Arkusz1", encoding = "UTF-8", stringsAsFactors = F)
This is in polish language, but print and read.xlsx reads all letters like "ś", "ć" etc.
[27] "Niewłaściwa kwalifikacja memoriałowa przychodu"
[28] "Niewłaściwe ceny transferowe"
[29] "niewłaściwe zarządzanie relacjami z kontrahentami"
finally if you can't read xlsx, just save your excel as .csv and read csv with encoding
|
Legislative News
The U.S. Supreme Court ruled today in Janus v. AFSCME that requiring agency fees/fair share dues is a violation of the First Amendment and are unconstitutional. The decision is generating a tremendous amount of media attention and no doubt discussion and questions in your organizations. ACSA, with our Legal Partners comprised of Atkinson, Andelson, Loya, Ruud and Romo (AALRR), Fagen Friedman & Fulfrost (F3) and Lozano Smith have updated our Frequently Asked Questions (FAQ) document to assist you moving forward. This information is intended to guide and expedite your work, not replace the advice provided by your legal counsel.
In anticipation of the Janus ruling, unions in California rushed Senate Bill 866, a budget trailer bill, to limit the impact of the decision on public employees. SB 866 has been signed by the Governor and takes effect immediately. We anticipate confusion implementing SB 866 and how this legislation will intersect with the Janus decision. In the face of change, there can be chaos before there is clarity. I suggest you consider reaching out to your union leaders to offer your assurance that you will work with them to develop and manage a process that works for the employees and district.
Because school districts have a break in the work year that impacts how payroll is processed, only our employees who are paid over 12 calendar months will likely be impacted in the short term, providing a little time to work out details for the majority of your employees with your unions and legal counsel. While this work is going to require action from you, please take the time to care for yourself.
In addition to the updated FAQ, we are providing a link to the Janus decision. ACSA wants to continue to respond to your questions and concerns so please visit us, to submit your thoughts.
Are you a member of California ASCD?
CASCD members are active and involved in the changing face of education. Join CASCD and become empowered with innovative solutions to support the success of all learners. Sign up to become a member or renew your membership today!
The California Association for Supervision and Curriculum Development (CASCD) is a diverse community of educators throughout California committed to promoting exemplary practices that ensure all learners reach their fullest potential. |
namespace BenchmarkDriver
{
/// <summary>
/// Interface for classes that implement benchmark execution and validation logic.
/// </summary>
internal interface IRunner
{
/// <summary>
/// Execute the relevant learner(s) and validate their results.
/// </summary>
void Run();
}
} |
In the
Missouri Court of Appeals
Western District
IN RE THE ESTATE OF ARTHUR E. )
PETHAN, DECEASED; )
) WD78157
MARY LU BROWN, PERSONAL )
REPRESENTATIVE OF THE ) OPINION FILED:
ESTATE OF ARTHUR E. PETHAN, ) September 22, 2015
DECEASED, )
)
Respondent, )
)
v. )
)
DAVID A. HEIN, )
)
Appellant. )
Appeal from the Circuit Court of Cooper County, Missouri
The Honorable Keith M. Bail, Judge
Before Division One: Cynthia L. Martin, Presiding Judge, Joseph M. Ellis, Judge and
James E. Welsh, Judge
David A. Hein ("Brother") appeals a judgment that sanctioned him for discovery
violations by striking his answer and affirmative defenses and that entered judgment in
favor of Mary Lu Brown ("Sister") on one of two counts in Sister's petition seeking the
discovery of assets in a probate proceeding. Brother also appeals from an order granting
Sister's motions for bond forfeiture and civil contempt after Brother violated the terms of
a consent order.
Because Brother's appeal from the sanctions judgment is moot, and because
Brother has appealed an order that is not designated as a "judgment," we dismiss
Brother's appeal.
Factual and Procedural History
Arthur Pethan ("Pethan") died in November 2009. Brother and Sister were
Pethan's heirs. Pethan's estate was opened on May 21, 2010. Sister was appointed as the
personal representative for Pethan's estate on November 1, 2011.
On November 17, 2011, Sister filed a discovery of assets petition against Brother.
Sister alleged in Count I that Brother had removed a tractor, farm equipment, and various
furniture items ("Property") from Pethan's estate after Pethan's death and had executed a
false bill of sale for the Property. Sister requested an award of punitive damages in
Count II of the petition.
Sister filed a motion for sanctions against Brother on September 3, 2013, alleging
discovery violations. Sister requested that Brother's answer be stricken, the entry of
judgment in her favor on her petition, and an evidentiary hearing to calculate punitive
damages and attorney's fees.
Following a hearing, the trial court entered its "Order Relating to Motion for
Sanctions and Judgment" ("Sanctions Judgment") on November 1, 2013. The Sanctions
Judgment sustained Sister's motion for sanctions, struck Brother's answer and affirmative
defenses, and entered judgment "in favor of [Sister] and against [Brother] on Count I of
2
[Sister's] Petition for Discovery of Assets." The Sanctions Judgment ordered Brother to
deliver the Property to Sister at the Cooper County Fairgrounds on November 30, 2013.
The Sanctions Judgment scheduled a hearing for December 9, 2013, "to hear additional
evidence as to damages" including "evidence regarding punitive damages . . . if [Brother]
fails to deliver the [Property]" to Sister. The Sanctions Judgment thus resolved Count I
of Sister's petition but reserved determination of Count II of Sister's petition.
Following entry of the Sanctions Judgment, Brother filed pleadings seeking to stay
his obligation to deliver the Property, to continue the damages hearing, and to set aside
the Sanctions Judgment.
On December 2, 2013, the trial entered a "Consent Order." The Consent Order
directed that "[u]pon the agreement of the parties" Brother would deliver the Property to
Sister by February 1, 2014; Brother would post a $20,000 bond by December 13, 2013,1
which would be forfeited and paid to Sister if Brother failed to deliver the Property; and
that the hearing on Sister's punitive damages claim would be continued until sometime
after February 1, 2014. The Consent Order also reflected Brother's agreement to permit
Sister to prove up her attorney's fees claim by the submission of an affidavit.
Brother delivered some of the Property to the Cooper County Fairgrounds on
January 18, 2014, and delivered the balance of the Property by February 1, 2014. Sister
thereafter secured the trial court's authority to sell the Property at auction.
1
On December 13, 2013, the trial court entered a "Stipulation and Order" reiterating Brother's and Sister's
agreements which led to entry of the Consent Order and which reflected the parties' further agreement to permit
Brother until December 16, 2013, to post the agreed upon $20,000 bond.
3
After the auction, Sister filed a motion for bond forfeiture and a motion for
contempt against Brother. Sister alleged that Brother had intentionally sabotaged some
of the Property that was delivered, causing it to decline in value.
Following a hearing, the trial court entered an order on November 20, 2014,
granting Sister's motions for bond forfeiture and contempt ("Order"). The Order noted
the parties' agreements giving rise to the Consent Order. The trial court found that
Brother had intentionally and willfully violated the trial court's previous orders and that
Brother's conduct had resulted in a decrease in the fair market value of the Property by
$7,500. The Order found Brother in contempt and fined him $5,000 "in order to
compensate the Estate of Arthur Pethan for its actual damages and attorney's fees the
estate has incurred in connection with [Sister's] Motions and to deter [Brother] from such
conduct in the future." The Order directed that the amount of $12,500 "shall be paid
from the $20,000 bond [Brother] previously posted with the Court," with the $7,500
balance of the bond to be refunded to Brother.
On November 26, 2014, Brother appealed. On December 15, 2014, Sister
voluntarily dismissed Count II of her petition.
Analysis
Brother asserts two points on appeal. In his first point, Brother claims that the
Sanctions Judgment was entered in error because Sister failed to establish she was
prejudiced by Brother's discovery violations. In his second point, Brother claims that the
Order was entered in error because Sister's motions to forfeit the bond and for contempt
4
were barred by the doctrine of laches. Both points require that we first discern whether
we may entertain Brother's appeal.
"Prior to reaching the merit of the issues in this case, this Court must determine,
sua sponte, if there is a final judgment." Ndegwa v. KSSO, LLC, 371 S.W.3d 798, 801
(Mo. banc 2012) (citing Gibson v. Brewer, 952 S.W.2d 239, 244 (Mo. banc 1997)). A
final judgment is a prerequisite to appellate review." Id. If the circuit court's judgment
was not a final judgment, then the appeal must be dismissed." Id. "A final judgment
'resolves all issues in a case, leaving nothing for future determination.'" Id. (quoting
Gibson, 952 S.W.2d at 244). "Damages are an essential element of a claim and must be
resolved for a judgment to be final and appealable." Crest Const. II, Inc. v. Hart, 439
S.W.3d 246, 249 (Mo. App. W.D. 2014) (internal quotations omitted). Moreover, "[a]s a
threshold matter, appellate courts must determine if a controversy is moot." Dotson v.
Kander, 435 S.W.3d 643, 644 (Mo. banc 2014) (citing State ex rel. Reed v. Reardon, 41
S.W.3d 470, 473 (Mo. banc 2001)). An appellate court is obligated to examine an appeal
for mootness "either upon motion of a party or acting sua sponte." Missouri Municipal
League v. State, No. SC94493, 2015 WL4627486, at *1 (Mo. banc August 4, 2015).
"Mootness implicates the justiciability of a controversy and is a threshold issue to
appellate review." LeBeau v. Commissioners of Franklin County, 459 S.W.3d 436, 438
(Mo. banc 2015) (citing Reed, 41 S.W.3d at 473). "To exercise appellate jurisdiction,
there must be an actual controversy that is 'susceptible of some relief.'" Dotson, 435
S.W.3d at 644 (quoting Reed, 41 S.W.3d at 473). "When an event occurs which makes a
5
court's decision unnecessary or makes granting effectual relief impossible, the case is
moot and should be dismissed." Id.
Point one of Brother's appeal claims error with respect to entry of the Sanctions
Judgment. By its plain terms, the Sanctions Judgment did not resolve all issues, as it
expressly reserved determination of Count II of Sister's petition. The Sanctions Judgment
was not, therefore, a final judgment at the time Brother filed his appeal. Crest Const. II,
Inc., 439 S.W.3d at 249.
We recognize that Sister dismissed Count II of her petition nearly a month after
Brother filed his appeal. And we recognize that there is authority for the proposition that
a party's voluntary dismissal of remaining claims or parties following entry of an
interlocutory judgment can render the interlocutory judgment final for purposes of
appeal. See Bailey v. Innovative Management & Inv., Inc., 890 S.W.2d 648, 649-50 (Mo.
banc 1994) (finding that an interlocutory summary judgment in favor of one defendant
became final and appealable when the plaintiff later voluntarily dismissed the remaining
defendant); Magee v. Blue Ridge Professional Bldg. Co., Inc., 821 S.W.2d 839, 842 (Mo.
banc 1991) (finding that an interlocutory order dismissing claims against one defendant
became final and appealable when the plaintiff later voluntarily dismissed claims against
all remaining defendants).
Assuming, arguendo, that Sister's post-appeal voluntary dismissal of Count II of
her petition converted the interlocutory Sanctions Judgment into a final judgment, and
6
assuming that Rule 81.05(b)2 would thus apply to require us to consider Brother's
premature appeal as having been filed immediately after the Sanctions Judgment became
final, Brother's claim of error regarding the Sanctions Judgment must nonetheless be
dismissed. Brother's voluntary agreement to, and performance of, the terms of the
Consent Order constituted voluntary performance of the Sanction's Judgment, rendering
Brother's claim of error relating to the Sanctions Judgment moot.
The Sanctions Judgment ordered Brother to deliver the Property that was the
subject of the discovery of assets claim to a particular location by a particular date. The
Sanctions Judgment ordered a hearing on Sister's remaining claim for punitive damages,
and on her claim for an award of attorney's fees. Brother contested the Sanctions
Judgment and filed a motion to set it aside, sought continuances of the damages hearing,
and sought a continuance of the deadline for delivery of the Property.
Thereafter, the trial court entered the Consent Order based on the agreement of the
parties. Pursuant to the Consent Order, Brother voluntarily agreed to deliver the Property
to a specified location by February 1, 2014, and to post a bond to ensure his performance
of this obligation. Sister agreed to defer a hearing on her punitive damage claim until
sometime after the date agreed upon for delivery of the Property. And both parties
agreed that Sister's attorney's fee claim could be ruled by the trial court based on
submitted affidavits. The Consent Order represented "a recital of an agreement," and
"not a judicial determination of rights." Henze v. Schallert, 92 S.W.3d 317, 319 (Mo.
App. E.D. 2002). More to the point, the Consent Order represented Brother's voluntary
2
All citations to the Rules are to Missouri Court Rules Volume I--State (2015).
7
agreement to the manner in which he would perform the obligation to deliver the
Property described in the Sanctions Judgment.
"[A] party may estop himself from taking an appeal by performing acts after the
rendition of the order or judgment which are clearly inconsistent with the right of
appeal." Stevens Family Trust v. Huthsing, 81 S.W.3d 664, 667 (Mo. App. S.D. 2002)
(internal quotations omitted). "The estoppel may consist of any voluntary act which
expressly or impliedly recognizes the validity of the judgment, order or decree." Id.
"Accordingly, it is also generally recognized that when a defendant voluntarily pays a
judgment rendered against him, he may not appeal from that judgment." Id. "When the
judgment has been paid, the issue is settled and the question is moot." Id.
"An involuntary payment, however, does not render an appeal moot." Two
Pershing Square, L.P. v. Boley, 981 S.W.2d 635, 638 (Mo. App. W.D. 1998). "A
payment is considered involuntary when it is made to forestall collection and no
supersedeas bond is posted." Id. "A payment is also considered involuntary when it is
made after execution or writ of garnishment in aid of execution has issued because it is
presumed to have been made as a result of legal coercion." Id. "A payment made to cut
off the accrual of interest on a judgment is also considered involuntary." Id.
Brother's agreement to the terms of the Consent Order, and his delivery of the
Property pursuant to the terms of the Consent Order, were not in response to collection
procedures or to any attempt to enforce the Sanctions Judgment by execution or
garnishment. The Sanctions Judgment did not provide for the accrual of interest,
rendering it unnecessary for Brother to enter into the Consent Order or to deliver the
8
Property to cutoff the accrual of interest. Rather, Brother voluntarily agreed to terms by
which he would perform the obligation to deliver the Property described in the Sanctions
Judgment. By agreeing to the terms set forth in the Consent Order, and by proceeding to
perform the terms of the Consent Order, Brother impliedly recognized the validity of the
Sanctions Judgment. Braveheart Real Estate Co. v. Peters, 157 S.W.3d 231, 233-34
(Mo. App. E.D. 2004) (holding that "[i]f the defendant's surrender of . . . property is
voluntary, he or she effectively concedes the correctness of the judgment, thereby
rendering the appeal moot").
In his Reply Brief, Brother nonetheless argues that his delivery of the Property
was involuntary. He claims that he was legally coerced into delivering the Property
because he otherwise would have been found in contempt of court and exposed to
punitive damages.3 We disagree. No contempt proceedings were pending when Brother
agreed to the terms of the Consent Order. In any event, even had they been, a similar
argument was rejected in Peters, when the Eastern District found that the surrender of
real property upon threat of contempt constituted a voluntary act. Peters, 157 S.W.3d at
233-34.
In short, Brother voluntarily agreed to entry of the Consent Order, which included
his agreement to deliver the Property to Sister. Brother thus impliedly recognized the
validity of the Sanctions Judgment. Brother thereafter delivered the Property as he
agreed to do pursuant to the Consent Order. The Property has been sold at auction. The
3
Brother also argues that he had no choice but to comply with the Sanctions Judgment because it was not a
final judgment and could not be appealed given Sister's outstanding punitive damages claim. This argument in
Brother's Reply Brief is in stark and irreconcilable conflict with the jurisdictional statement in Brother's principle
Brief where Brother argues that the Sanctions Judgment is a final, appealable judgment.
9
relief awarded by the Sanctions Judgment has been voluntarily performed. Any decision
from this court resolving Brother's current complaint that the Sanctions Judgment was
improvidently entered would have no practical effect, rendering Brother's first point on
appeal moot.4
Point one is dismissed as moot.
Point two of Brother's appeal claims error in the entry of an Order granting Sister's
motions for bond forfeiture and contempt because both motions should have been barred
by the doctrine of laches.
Rule 74.01(a) states that a "[j]udgment . . . includes a decree and any order from
which an appeal lies" and that "[a] judgment is entered when a writing signed by the
judge and denominated 'judgment' or 'decree' is filed." "Thus, a written judgment must
be signed by the judge and must be designated a 'judgment.'" City of St. Louis v. Hughes,
950 S.W.2d 850, 853 (Mo. banc 1997). "The designation of 'judgment' may occur at the
top of the writing, within the body of the writing, or in a docket-sheet entry, but it must
be clear from the writing that the trial court is calling the document or docket-sheet entry
a judgment." Id. Generally, an appeal from an order that is not designated as a
"judgment" must be dismissed. See Gateway Directory Pub. Group, Inc. v. Fischer, 84
S.W.3d 496, 497 (Mo. App. E.D. 2002) (dismissing an appeal from an order that was not
designated as a "judgment.")
4
There are recognized exceptions to the mootness doctrine where a case becomes moot after it is argued
and submitted or where a case presents an unsettled issue of public interest that is likely to recur and to evade
review. Floyd v. Department of Mental Health, 452 S.W.3d 154, 158 (Mo. App. W.D. 2014). Neither exception
applies here.
10
It is true that pursuant to Rule 41.01(b), "[t]he provisions of Rule 74 are not
applicable to probate proceedings . . . unless the judge of the probate division orders that
it shall be applicable in a particular matter . . . ." In Estate of Downs, 400 S.W.3d 360,
361 (Mo. App. W.D. 2013) (citing Rule 41.01(b)); Burgess, Care & Treatment of v.
State, 34 S.W.3d 430, 431 n. 2 (Mo. App. S.D. 2000). Here, the trial court entered an
order on February 24, 2011, directing that Rules 41 through 101 were applicable to the
proceedings. It was thus essential that the Order comply with Rule 74.01(a) as a
condition to Brother's right to appeal the Order.5
Plainly, the Order is not designated a "judgment," and there is no indication within
the body of the Order that the trial court considered the Order to be a judgment. The
Order is not appealable.6
Point two is dismissed.
5
Even where this not the case, Brother has not explained how or whether the Order falls within one of the
categories of immediately appealable probate orders enumerated by section 472.160.1(1)-(14).
6
The Order granted two motions--Sister's motion for bond forfeiture and Sister's motion for an order
holding Brother in contempt. Contempt orders are not exempt from Rule 74.01(a)'s "denomination as a judgment"
requirement. However, civil contempt orders, even if denominated as a "judgment," are not final for purposes of
appeal until they are enforced, either through the imposition of fines or imprisonment. In re Marriage of Crow and
Gilmore, 103 S.W.3d 778, 781 (Mo. banc 2003). Here, the record does not reveal whether the contempt portion of
the Order (which ordered the payment of a $5,000 fine to Sister from the bond Brother posted) has been enforced.
More to the point, as Brother notes in his Brief, the $5,000 fine imposed for contempt was not "for the
purpose of coercing compliance with relief that had already been granted . . . but [was] instead awarded to punish
[Brother] for failing to comply with the court's order." [Appellant's Brief, p. 19] This calls into question whether
the Order found Brother to be in civil or criminal contempt. "Civil contempt is intended to benefit a party for whom
an order, judgment, or decree was entered. Its purpose is to coerce compliance with the relief granted." State ex rel.
Chassaing v. Mummert, 887 S.W.2d 573, 578 (Mo. banc 1994). In contrast, criminal contempt is authorized as a
part of a court's inherent constitutional power and by section 476.110 to punish a person's refusal to abide by a
court's authority as to protect the dignity of the judicial system. See Smith v. Pace, 313 S.W.3d 124, 129-30 (Mo.
banc 2010); Teefey v. Teefey, 533 S.W.2d 563, 565 (Mo. banc 1976). A criminal contemnor has no right of appeal.
Smith, 313 S.W.3d at 129.
We express no opinion as to whether the contempt aspect of the Order can be appealed, even assuming the
Order is hereinafter designated as a "judgment."
11
Conclusion
Brother's appeal is dismissed.
__________________________________
Cynthia L. Martin, Judge
All concur.
12
|
u.
2
Let z = -16 + 8. Let d(w) = w + 0*w - 4 + 14. Let v be d(z). Solve q + 15 = -v*q for q.
-5
Let a = 10 + -6. Let z = a + 1. Suppose z*m = m + 16. Solve -m*g = 3 + 13 for g.
-4
Suppose -4*d + 1 = -7. Suppose -d*w + 0 = -10. Solve 0*v + v + w = 0 for v.
-5
Let d be 44/(-12)*(2 + -5). Suppose 0 = -5*t + 3*p - 4, 3*p + d = -4*t + 8*p. Solve -3*y + t = 10 for y.
-3
Let u = -45 - -90. Let b = -20 + u. Solve -6*l + l - b = 0 for l.
-5
Let i be (0 - -1)/(1/6). Let d be (-24)/((27/i)/(-3)). Let z be 1/3 + d/6. Solve -5*n = -z*n + 4 for n.
-2
Let p = -93 - -97. Suppose -3 = -4*s + 1. Solve 9 = -p*l + s for l.
-2
Suppose -3*c - 4*q - 27 = 0, -18 = 2*c - 4*q - 0*q. Let d = c + 11. Solve -4 = k - d*k for k.
4
Let j be (-60)/(-9) + (-6)/(-9)*-1. Solve -3*h - j = 9 for h.
-5
Let y = 20 + -17. Solve 6 = y*a - 6*a for a.
-2
Let i = -15 + 30. Let t be -3*3/((-9)/i). Solve -5*n + 2*n = t for n.
-5
Let u = -60 - -65. Solve u - 1 = b for b.
4
Let q be (-64)/(-11) + 14/77. Solve -q = -5*h + 9 for h.
3
Let p(a) = a + 12. Let b be p(-10). Let f be 1 + b + -3 + 2. Solve -f*g = g for g.
0
Suppose 0 = 6*q - 2*q - 4. Suppose 2*m = 3 - 1. Let h = m + 3. Solve 0 = -j - q + h for j.
3
Suppose -4*s = -3*i + 4 - 25, 2*s - 10 = 2*i. Solve q = -s + 3 for q.
-3
Let x(k) = k + 7. Let j be x(-7). Suppose -y + 3 = -j. Solve -s - 16 = y*s for s.
-4
Let a = 47 - 44. Solve 1 = -v - a for v.
-4
Let a(y) be the third derivative of -y**7/5040 - y**5/30 + y**2. Let d(r) be the third derivative of a(r). Let i be d(-2). Solve -i*q = -0*q - 10 for q.
5
Suppose -2*l - 11 = q - 2*q, -l - 16 = -4*q. Let g = -7 + 7. Let s be (0 + g)/(4 - 6). Solve s = n - q + 2 for n.
1
Let g = 3 + -3. Suppose 4 + 5 = 2*y + 5*b, 4*b - 4 = g. Let j be (-3)/((-9)/y)*3. Solve j*t = 7*t + 15 for t.
-3
Suppose -10*v = -8*v. Solve -3*h + 4*h = v for h.
0
Suppose -81 = -17*m - 13. Solve -m*b - 5 = -5*b for b.
5
Let l = 31 + -19. Suppose 2*o = 5*c + 6*o - 34, -2*o + 20 = 3*c. Let i be c/1 - (6 + -2). Solve -i*v - 2*v = -l for v.
3
Suppose 0 = -6*m + 2*m + q + 6, 0 = -5*m + 3*q + 11. Solve 5*r + 9 = -m for r.
-2
Let b be ((-8)/(-1))/(2 + 0). Solve 0 = -b*v + v for v.
0
Let o(z) = -z**3 + 9*z**2 - 6*z. Let n be o(8). Let q = n - 4. Solve 0 = -5*c + 2*c + q for c.
4
Let h be (3 - 2) + (-1)/(-1). Let y(c) = -c**2 - 5*c - 3. Let w be y(-7). Let n = w - -27. Solve -3*m - h*m = n for m.
-2
Let t be (24/(-10))/(8/(-20)). Suppose -m - m = -t. Solve -m*b - b = 0 for b.
0
Let m = 22 - 12. Let s = -4 + 19. Suppose -2*o = -s - 25. Solve -5*y + m*y - o = 0 for y.
4
Suppose 11 = 4*u - 5. Suppose 2*p + u*o - 22 = 2, 5*o - 21 = 2*p. Solve 2*l = -0*l + p for l.
1
Let k be 1/(2/(-14)*-1). Suppose -2*z + 17 = k. Let h = -5 + z. Solve j - 2 = -h for j.
2
Suppose 11 = -3*s + 137. Let y = s + -30. Let b = -5 + 11. Solve -2*m + b*m = -y for m.
-3
Let r(q) = -q**2 - 5*q - 1. Let m be r(-2). Suppose 5 = 2*u + h, m*h + 8 - 3 = -4*u. Solve u*b + 17 - 2 = 0 for b.
-3
Let v be (-24)/(-5)*10/4. Solve -3*m + v = -0*m for m.
4
Suppose -4*q = -q - 6. Solve q*a = -0*a - 6 for a.
-3
Suppose 0 = 4*r - 52 - 48. Solve 6*t = t - r for t.
-5
Let k be 101/3 - 7/(-21). Let l = k + -19. Solve -l = -4*a - a for a.
3
Let g = 12 - 9. Suppose -g*i - 2*i + 2*p = -9, 5*i = -p + 18. Solve 0*d - i = d for d.
-3
Suppose 9*o = 4*o + 15. Suppose -21 = -3*s - 0*s. Suppose -4*w + 21 = -s. Solve 2*a = -w + o for a.
-2
Suppose 3*b - 4*i + 8 = 0, -i = 3*i - 20. Suppose -24 = -b*g + 8. Solve -c - 3*c = -g for c.
2
Let r = 1 - -2. Suppose -14*w - 2 = -15*w. Solve -w*b = r*b for b.
0
Let c(a) = -a**2 - 10*a + 12. Let v be c(-11). Solve -2*w = -1 - v for w.
1
Suppose 0 = -8*f + 3*f + 2*a + 216, -f + 2*a = -48. Let l be 264/f - (-2)/(-7). Solve -2*t + l*t = -4 for t.
-1
Suppose -o + 4*b + 8 = 3*o, -2 = -2*o + 4*b. Suppose -o*s - 7 = i, 4*s = 5*s + 3. Suppose -4 = -i*p, 0*w + 2*p = -w + 4. Solve w*r = r for r.
0
Let c(h) = 0*h + 10*h - h + h**2. Let y be c(-9). Suppose 2*f + 10 = -5*x, 10 + y = -3*f - 5*x. Solve f = 3*g - g - 6 for g.
3
Let a = 7 + -15. Let v be 1 + -2 + (2 - a). Let b be (v/3)/(0 + 1). Solve -b*y + 5 = -4*y for y.
-5
Let r = -8 - -8. Let n be r*(0/(-2) - -1). Solve -z - 4*z - 25 = n for z.
-5
Suppose 3*d - 2 = 2*v, -4 = -2*v - 0. Solve 0 = d*c - 6 - 4 for c.
5
Let x be (-2)/8 - 36/(-16). Solve i = -i + x for i.
1
Let z = -1 + 2. Solve x + z = 2*x for x.
1
Let q(k) = 4*k**2 + 2*k + 4. Let b be q(-2). Solve -6 + b = -5*n for n.
-2
Let y be 3 + (-5)/(-2)*-2. Let k = y + 4. Solve 11 = -k*q + 1 for q.
-5
Suppose -3*i + 13 = 3*o - i, -2*i = -4*o + 8. Solve -o*h - 8 = 1 for h.
-3
Let m = 13 - 8. Let f(k) = -3*k - 2. Let s be f(-2). Let l = 10 - s. Solve l*n - m*n = 0 for n.
0
Let s(d) = -d - 4. Let r be s(-8). Suppose -5*z = 2*h - 4, -r*z = -5*h - z + 10. Let t be (4/(-2))/((-1)/1). Solve -4 = -h*o + t for o.
3
Let w(h) = h**3 - 8*h**2 + 2*h - 11. Let p be 4/((-2)/(-4)*1). Let u be w(p). Suppose 0*a + 3*a = u*l + 22, 3*l + 10 = a. Solve 0 = a*d - 11 - 9 for d.
5
Let x(k) be the second derivative of -k**5/20 - k**4/2 - 5*k**3/6 + 2*k**2 - k. Let j be x(-5). Solve j = 2*u - 0 for u.
2
Let s = -5 + 5. Suppose 12 = -3*a, -4*p + 4*a + 40 = -a. Solve l - p*l + 4 = s for l.
1
Let w(v) = -v**2 + v**2 - v**2 + 4 - 2. Let c be w(2). Let u = c + 4. Solve -8 = -u*t - 0*t for t.
4
Let u(q) = 2*q - 16. Let w be u(9). Solve -5 = w*f + 1 for f.
-3
Suppose 2 = 4*a - 3*a. Solve a*l - 3 = 3 for l.
3
Suppose -5*k + k = -j - 8, -3*k + j + 6 = 0. Solve -k*l - 4 = -6*l for l.
1
Let t be (-5 + -3)/(-2 + 0). Suppose -2*j + 8 = 3*v, v = -0*j - 2*j + t. Solve i = -6 + j for i.
-5
Let s be (-1 - 0)/(5/(-220)). Suppose 14 = -3*o + s. Solve o + 2 = -4*u for u.
-3
Suppose -3 = -2*m + 1. Suppose -m = -2*f - 0*f. Let l be (7/2)/(f/2). Solve 2*k = l*k for k.
0
Let o(d) = -d**2 + 2*d + 5. Suppose 0 = 4*y - 5*p - 37, 3*y - 2*p - 22 = -3. Let z be o(y). Solve -2 + 0 = z*f for f.
-1
Let f be 6 - 0/(2 - 3). Solve 4*p = 6 + f for p.
3
Let b(t) = t**2 + t. Let z be b(1). Suppose z*s = -s. Let f = -5 + 7. Solve s = f*i - i for i.
0
Suppose 2*b + 2*q + q = 7, 3*b - 3*q - 18 = 0. Suppose -3*s - 7 - 14 = -b*o, 5*s = o - 13. Solve o*i = -3 - 0 for i.
-1
Let s(h) be the first derivative of -h**4/4 + 4*h**3/3 - 3*h**2/2 + 3. Let m be (-6)/(-4)*(-8)/(-6). Let j be s(m). Solve j*t = -0*t for t.
0
Let h be (-44)/(-16) + 3/12. Solve -h*c - 1 = -4 for c.
1
Let x be 4/14 - (-48)/28. Suppose 6 = -x*l - 3*h, 4*l - h = 4*h + 10. Solve l = -3*b - 6 for b.
-2
Suppose 0 = -2*u + 1 + 15. Solve 25 = 3*d - u*d for d.
-5
Let s be (2/(-8))/(2/(-40)). Solve 10*v - s*v = 20 for v.
4
Suppose 2*z - 40 - 8 = 0. Let p = z + -21. Solve -1 = -p*b + 8 for b.
3
Suppose 0 = 5*r - 10, -2*m = 4*r + r - 18. Solve -7 = m*s - 15 for s.
2
Suppose 5*z = 4*c + 8, 0 = -4*z + c + 2. Solve -6*y + 3*y + 3 = z for y.
1
Let y be 0/1*4/8. Let i(t) = 2*t**2 + 23*t - 8. Let h be i(-12). Solve -4*x + h = -y for x.
1
Let m = -6 - -6. Suppose 4 = 5*a - x - m*x, 3*x = 5*a - 12. Solve a = -c - 0*c + 5 for c.
5
Let j(c) = -3*c - 2 - c + 5*c + 0*c. Let q be j(3). Solve -3 - q = 4*u for u.
-1
Let m = -11 - -15. Solve 4*w - m = 8 for w.
3
Let s = 2 - -7. Let j = 0 - -2. Suppose n = -3*p + 18, -j*p = 5*n + 5 - 17. Solve s = 5*v - p for v.
3
Suppose 2*r = 8 + 14. Suppose h - r = 4*f, 0 = -h - 0*f - 5*f + 2. Solve 2*z - 10 = h*z for z.
-2
Suppose -j + 2*j = 5*r - 4, 4*j = -3*r + 30. Solve 5*s + j + 9 = 0 for s.
-3
Let s(c) = -c + 5. Let j be s(-4). Let x be ((-8)/12)/((-1)/j). Solve -x*y = -y for y.
0
Let f(c) = 3*c + 38. Let l be f(-12). Solve -l*y - 5 - 3 = 0 for y.
-4
Let u be (-7)/14 - 27/(-2). Let q = -8 + u. Solve 0 = -3*n + 14 - q for n.
3
Let h be 518/133 - 4/(-38). Solve h*x = 15 + 5 for x.
5
Let a = 49 - 46. Solve a*d = 5*d - 2 for d.
1
Let t(r) = r**2 - 8*r + 8. Let q be t(7). Suppose -h = -q - 13. Let w be 3/(-21) + 72/h. Solve -j - 3 = -w for j.
2
Let g = 5 - 5. Suppose 3*y - 2*y = g. Let v = y - -1. Solve 2*b = b + v for b.
1
Let k be 2 + (1 - (-16)/4). Solve k*x + 5 = 6*x for x.
-5
Suppose 141 = 3*m + 5*f, 5*m = 2*m - 4*f + 138. Suppose 4*v - 2*v = -2*q - 18, 2*q = -5*v - m. Let j be v/(-6) - (-2)/3. Solve i = j*i for i.
0
Let o = 2 - 0. Suppose -u - 3 = -o*u. Solve -u*n + 7*n + 4 = 0 for n.
-1
Let l(t) = -t + 13. Let g(m) = m**3 - 5*m**2 - 5*m + 6. Let |
"As I tried to kiss you, as if to avoid me with your T-Shirt on, you dove into the shining sea..." "The white flower petals on your soaking skirt..." "Spread open upon the surface of the blue water." "Tell me why, when you winked..." "Oh Baby, Tell Me, Tell Me" " You're unpredictable..." "'Tell me you love me, Tell me that you need me..." "Tell Me, Tell Me, ...my Angel of the Summer..." "'Tell me, lover, Tell me that you need me..." "Oh Baby, Tell Me, Tell Me - I know that you're in love..." "'Tell me you love me, Tell me that you need me..." "Tell Me, Tell Me - but you're a mystery." "Thank you for waiting..." "Darling." "Oh gosh!" "This is more than I can stand!" "Don't Cry Jingoro!" "The Heat of Young Love." "Anju!" "Zushio!" "Mother!" "Mother!" "I promise that I... that I shall find you, Mother, without fail!" "I shall!" "Say..." "What's got you all excited?" "Oh, noth..." "Wherever did you find that book?" "Geez!" "It's the only thing that'll make Kazuya fall asleep!" "Oooh!" "I don't care anymore, nope!" "Jingoro hasn't been behaving at all!" "I wonder what's happened..." "What's up with you kids?" "Is something wrong with Jingoro?" "Y'know, Kazuya's finally fallen asleep, after much effort on my part!" "He doesn't listen to me at all!" "Can't you talk a little more quietly?" "!" "Yeah!" "Can you believe it?" "!" "It was a huge hassle just getting him back home!" "It's just a thought, but... maybe Jingoro's entering puberty?" "The onset of puberty..." "Indeed, even I could see... that he wasn't our usual Jingoro." "But, even then..." "Hey!" "Jingoro, quiet down!" "Oh, your Auntie has things to do tonight so Kazuya will be staying over in Kyosuke's room." "Kazuya took advantage of the fact that Auntie was out..." "Okay..." "Here it comes." "Okay." "Still, tell me what happened?" "Your cutesy eyes are all red." "Oh!" "Well..." "Nothing much, really." "Though, I'm concerned about..." "About Jingoro?" "Uh-huh." "There's gotta be something wrong with him." "He's never disobeyed Kurumi and Manami like that before." "That's true." "That must mean that..." "that..." "Oh!" "...that, just like your father was saying..." "Huh?" "Then, that means well, Jingoro is a he, after all... so so the "onset of puberty" must be something that just happens naturally... so..." ""Something that happens naturally?"" "At that moment, I realized that I had just said something quite racy right in front of Hikaru." "H..." "Hikaru..." "O..." "Oh, Darling!" "Huh?" "!" "W..." "Well..." "Well..." "H..." "Hikaru!" "Umm, I need to take care of something first!" "Gosh, Darling!" "Darling is using Jingoro as an excuse!" "The truth is... that it was you who... who that it was you who desired me!" "Oh, dear God!" "I've..." "I've been dreaming all this time..." "About..." "About that moment." "Tell me that it's... okay for us to..." ""It's all right."" "Yeah right!" "Oh, this is too much!" "Though if it's going to be on the Nurse's bed well, that's a bit different from how I'd imagined it." "N..." "N..." "Nurse's Room?" "!" "Thank you for waiting..." "Darling..." "Oh?" "Yesterday evening, huh?" "Uh-huh." "She was shaking..." "terrified because a truck splashed through a puddle and drenched her." "When it comes to animals, you've got such a big heart." "He's so cute!" "Gosh, Hikaru... go easy on me, won't you please?" "Oh!" "Sorry about that." "But, my goodness, Kasuga!" "Just look at your face!" "Huh?" "Er..." "Well..." "Quite an injury, considering you were only scratched by a girl..." "G..." "Gee, Ayukawa!" "Anyway, about Jingoro..." "Hikaru told me about him." "Maybe he's lonely." "Jingoro, that is." "What?" "I mean, when you and your sisters are at school Jingoro is all alone by himself, isn't he?" "Being all by yourself... it gets quite lonely, you know." "Being alone..." "A..." "Ayukawa!" "S..." "So, y'know... just think of it as doing me a favor!" "So... help me out here!" "I hear ya!" "I hear ya!" "You want us to find Jingoro a pussycat, one that he'll like, right?" "Trust us, I say!" "Here!" "Yeah!" "Whoa!" "Hey, guys!" "What are you up to?" "!" "Pussycats!" "Pussycats!" "We can pick from a wide selection here!" "Look, you, don't you know that puberty and the estrus cycle are when we've got to fight using reason!" "I'm gonna fight!" "Wh..." "What the heck's this?" "!" "Hey!" "Why, you, you knew about this, didn't you?" "!" "Correctamundo!" "Oh, Kurumi and Manami are in there too!" "Wh..." "What?" "!" "A guy!" "Eyeeeww!" "Shoo!" "Shoo!" "You pervert!" "Yo, Hatta!" "Watch it!" "Watch it!" "Uh..." "Uh-oh!" "Hey!" "What the...!" "K..." "Kasuga!" "Help me out here!" "Help!" "I'm suspended, man!" "What?" "!" "What do you mean "help me..."" "Gimme your shoulders!" "Your shoulders!" "Shoulders!" "Shoulders!" "Will you calm down..." "Hey!" "Hey!" "Hurry!" "Help!" "Whoa..." "I'm saved!" "You take it from here, man!" "There's another one still out there!" "Oniichan!" "You're scum...!" "Hey!" "Hey, Oniichan!" "Don't hold him so tight!" "You're hurting him!" "Relax!" "Relax!" "We're doing this for Jingoro's own good." "Listen, Jingoro... we'll get you feeling great in no time!" "Hey, Kasuga!" "Over here!" "Over here!" "Huh...?" "Komatsu and Hatta..." "Just what're you trying to do, Oniichan?" "Matchmaking!" "Matchmaking!" "WHAT?" "!" ""To want somebody who'll be there always..."" ""That's not so strange, is it?"" "Ayukawa..." "Every time I'm here, your house is always so nice, Madoka!" "What do you mean?" "I mean, it's so spacious!" "If I do some aerobics at home I can't avoid kicking my dad's butt!" "Say, Madoka, have you decided on what to name this cat?" "Nope." "Not yet." ""Kyosuke!"" "Not gonna happen, or will it...?" "!" "Of course not!" "This cat's a "she," you know." "So that's that!" "Maybe it's not so bad an idea..." "A girl with a boy's name." "Tumtatatum! "When you meet someone for the first time..."" ""...sometimes love blooms, starting that very day!"" ""The stranger that you are..."" ""...and the stranger that you are..."" ""We'll set you up on a date..."" ""Meow-Meow With A Punch!" -"Meow-Meow With A Punch!"" "I'm your host, Komatsuya lwashi!" "I'm the assistant host, Hattatei Buri!" "All right, our first contestant..." "Okay, please state your name and age;" "let's hear some energy!" "Your name and age are...?" "S..." "Say, young man, how old are you?" "Doofus!" "Whatta li'l friggin' twerp!" "Why you little punk, you think you can diss me that way, dammit?" "!" "Well, well, please, calm down." "Calm down!" "All right now, time for a meeting!" "Okay!" "No-go!" "No-go!" "Next, please!" "This sure is something, to have this much of a response!" "For something done by Oniichan, it's pretty impressive, I think." "Stop!" "Hey!" "Kazuya!" "That's right!" "Uh-huh!" "You shouldn't be naughty like that!" "Look who's talking!" "I'm not gonna pull Kurumi and Manami's skirts up for you guys anymore!" "ShShShShhh!" "Why, you guys!" "All right, this calls for..." "Wh..." "What are you doing, Oniichan?" "!" "Just come with me!" "You're hurting me!" "What's up with him?" "!" "I didn't know he was into child abuse." "Huh?" "Er..." "Oh, no, nothing." "What?" "!" "You want me to switch places with Jingoro?" "!" "Yeah!" "That's the only way we can find out what's troubling him!" "Okay?" "I'm begging you!" "No way, I'm not gonna!" "Why, you!" "Don't you feel any sympathy for Jingoro?" "!" "He could be heartbroken because he's all alone!" "Jingoro's all alone?" "Yeah." "Oniichan!" "Oooh!" "Here comes the snowman!" "Huh...?" "!" "Oh!" "It's so cute!" "Ah... but I dunno, maybe not for her..." "It doesn't look like they'd go well together." "Like, whassup?" "!" "What are you lookin' at?" "!" "Don't you "whassup" me!" "We've been lookin' for that cat, y'know." "We know all about your type, babes that claim they found things, when really they ripped 'em off!" "Say what?" "!" "Hey!" "Hey!" "Jingoro!" "Hey!" "Jingoro!" "A white one and polka-dotted one!" "Who said he's feeling down?" "!" "Uh-oh!" "Oniichan!" "What's the meaning of this?" "!" "Um..." "Well... so this is what happens when Kazuya becomes a cat." "Er..." "Oh, nothing!" "At any rate, about Kazuya I mean, about Jingoro..." "Jingoro!" "Huh?" "Er, I mean, Kazuya is gone!" "Oh, gosh!" "He's so irresponsible, leaving his friends like that!" "Oh, no!" "H..." "Hey, Kasuga!" "What's up with Oniichan?" "Bumble, Bumble!" "Bumble, Bumble!" "Bumble, Bumble!" "Jingoro!" "Hey, Kazuya!" "Where did Jingoro go?" "!" "Hey, Kazuya!" "Will you help me out a little?" "!" "Madoka's cat?" "What?" "Oh, er... that was, y'see my mommy!" "What?" "!" "Er... just what's going on here?" "Yesterday, quite by accident, while I was out shopping, I saw her!" "There's no doubt about it!" ""Jingoro!" "What's wrong?" "!"" "Please!" "Tell me!" "Where did she go?" "!" ""Tell me?" Um..." "I've got no idea what's going on here, you know what I mean?" "Well, if you're looking for Madoka, then..." "she called earlier and said..." "Why, you, Jingoro!" "Where'd you go?" "!" "I've been looking everywhere for you!" "So what's the story?" "!" "Are you telling us that the cat's owner is here?" "What a cute one." "My!" "Two pussycats at that." "Madoka..." "So, you're the one... the weirdo who lets us take care of his cat and then accuses us of stealing her." "We sure would like a little gratitude for finding her!" "What you did was despicable!" "You won't get away with this." ""I hear they are a shady bunch of fellows."" ""If I recall... they hang out just outside of town."" ""So, what happened to Ayukawa?" "!"" ""Oh!" "Oh, she went with Hikaru!"" ""What?" "!" "Hikaru too?" "!"" "Mommy!" "Such an energetic pussycat." ""Puttytat, Puttytat... won't you be my... friend?"" "If you thought that all the girls these days would be so easily intimidated you're totally mistaken!" "Ayukawa!" "Sempai!" "Mommy..." "Mommy!" "Mommy!" "Oh no!" "There!" "Now, just what's going on here, Kasuga?" "!" "Wh..." "Oh, er..." "Well, you know..." "like they say, "Cats ought to be with other cats!"" "What?" "!" ""Mommy!"" ""Mommy!"" "Who knew that it was just an accidental resemblance..." "An accidental resemblance among cats?" "!" "Keep your chin up, okay?" "Until you find her Ms. Madoka here will take care of you like a mother would." "Ayukawa..." "Oh!" "I love Jingoro too, you know!" "Jingoro!" "At that moment..." "I felt really envious of Jingoro..." "Broken Heart is in Flames. "It began in the summer..."" "Hold me, Hold me, Hold me, Fire Love. "It burnt up in the fall..."" "Broken Heart is in Flames. "It's withering in the winter..."" "Flare, Flare, Flare like the Sun, Fire Love..." "On that last night we went out for a drive, I left my go-out voice behind." "As we watched the horizon, I said good-bye." "Like seasons, hit songs come and go..." "As you get used to one, you're tired of it..." "That's what's written on your profile." "You were waiting for the lucky star in your room I was too late to notice it in that one phone call that day." "Broken Heart is in Flames. "It began in the summer..."" "Hold me, Hold me, Hold me, Fire Love. "It burnt up in the fall..."" "Broken Heart is in Flames. "It's withering in the winter..."" "Flare, Flare, Flare like the Sun, Fire Love..." "Erase the memory of you from me... "Stop, Stop, Stop."" "Kurumi 's fallen in love!" "That royal pig has lost her appetite and gotten all mellow and sentimental, gazing at the night sky!" "Exactly who did she fall for?" "!" "What?" "!" "Hayami, the guy from the Soccer Club?" "!" "Why, that's the guy who sent Ayukawa a love letter!" "Next time: "A Tender Little Story!" "Kurumi's First Love" " Chapter 'Hell'"" "I... am in for one surprise after another!" |
Wednesday, February 5, 2014
Comfortably Yum E-cookbook Giveaway!
At my first Vida Vegan Con Galarama in Portland in 2011, I had the pleasure of standing in line for vegan pizza with Allison Rivers Samson. Allison is the creator of Allison's Gourmet chocolates and a gifted cook who authored the award-winning "Veganize It" column in VegNews.
If you've never had Allison's hand-crafted chocolates, well, I'm a little sad for you. You should get over to her site and treat yourself to an order as a Valentine to yourself. But if you want Allison's delicious comforting home-cookin', you can look no further than your computer or iPad. Allison recently released Comfortably Yum, a colorful e-cookbook with recipes for some of our favorite comfort foods. And now she wants to give a copy to one lucky Vegan Crunk reader (details at the end of this post).
Allison sent me a copy to review, and honestly, I want to try everything in it! There are 10 recipes, so eventually I'm sure I will make them all. Each one is illustrated with a gorgeous full-color photo. I opted to try two for this review. Allison is vegan-famous for her mac & cheese recipe. You know the one — it ran in her VegNews column years ago, and it's become a vegan standard. Well, she's changed it up a bit, and now it's even better — Magic Mac 'n' Cheese.
This is unlike any other vegan mac recipe out there. There's no faux cheese and no nooch (nothing against either, but sometimes it's fun to mix things up). Instead, the cheese sauce is made from cooked, pureed veggies and chickpeas. And yet somehow, it tastes like cheese! I used gluten-free spiral pasta for my dish because I'm finding that I prefer the texture of gluten-free pasta over wheat pasta.
On the side, I made the Caesar Salad.
God, I love a Caesar, and this one is just perfect. Those are homemade croutons that I made from leftover sesame seed bread. They're roasted in garlic-olive oil. The dressing is what really makes this recipe though. I've never had a vegan Caesar that tasted so much like the real thing. It contains a bit of nori to replace the anchovies in non-vegan Caesar, and there are lots of other ingredients that make it rich and creamy.
If you'd like to order a copy, it's only $20 on Allison's website. If you order by Valentine's Day and enter 2CRUNK14 in the promo code box, you can save $3 (that's Allison's VDay gift to you!). And she'll donate $3 from every sale to Animal Place farmed animal sanctuary.
Or you can try to win a copy here! Just leave me a comment letting me know which Comfortably Yum recipe (they're all listed in this post) you'd like to try first. Be sure and leave your email address in your comment if isn't linked to a Blogger profile. I'll randomly choose a winner on Monday!
I've been wanting to make a veggie pot pie lately. That would definitely have to be my starter recipe. Also, thanks so much for compiling the list of Memphis restaurants. It's such a great resource to have on hand, and a nice reminder that I need to branch out a little! :)
My first recipe that I'll certainly try would be the Ceasar Salad. I just love the Ceasar salad, but so far I haven't find THE vegan version that satisfy my craving. Also, the Clam-Free Showder...miummm !!! And in fact, everything looks so yummy !!!
Vegan pot pies are the best! I would definitely try this first, I think, or maybe the Chocolate salted caramel...no mac n cheese. Oh lawd, I can't choose one so it will have to be a multi course meal!belained44(at)yahoo.com
Ooooh, I'd want to try the Caesar salad as well! I don't think I've made/had one since going vegan that I really liked, so I'm intrigued by this recipe! But, everything else sounds great too! My email is sheridanposey(at)yahoo(dot)com.
Many peoples want to earn money on internet without any investment but there is many online jobs which have many investments. Now you can earn without any investment with Just clicking and Earn daily upto 10 Dollars.Join this Best opportunity to make money online without any investment or Charges.HotProClicks.com |
Action For California Required!
A group of concerned Californians consisting of
Phil Angelides (Treasurer of California)
Mark Leno (Assm. of San Francisco)
Sharon Maldonado (Contest The Vote)
Tomas Brown (California For Democracy)
turn in over 50,000 petition signatures to Governor Arnold Schwarzenegger!
Assemblyman Mark Leno and State Treasurer Phil Angelides hosted a press conference in Sacramento on Monday, June 6 as we handed in your signatures opposing the Special Election. Those of you who saw press coverage of the event may have noticed, as we turned in the petitions, that Schwarzenegger's office has begun to look like a well armed fortress. Meanwhile, here at the friendly website, we'll continue to gather signatures this week, making sure they also get turned in. Arnold’s decision is due June 13.
Political rancor likely to swell in special vote
Schwarzenegger expected to announce election on redistricting, budget, schools.
Is the special election a done deal for Arnold?
Help Protect Our Vote!
Further action needed: Come to Sacramento on Thursday, June 16 to rid our state of dishonest voting machine companies. You can support open and clean elections by joining electoral justice activists at the Voting Systems & Procedures Panel (VSPP), Thursday, June 16th, 9 AM, in front of the Secretary of State's office, 1500 11th Street, SACRAMENTO.
Support those who will testify in favor of open and clean elections (and against unscrupulous companies like Diebold and ES&S), at the 10:00 AM VSPP hearings. Or, testify yourself before the panel, which certifies voting systems for California. Rock the boat. Protect our vote!
Treasurer Phil Angelides and Assemblyman Mark Leno urge people to
Stop Arnold's Special Election!
At a press conference held on the steps of San Francisco's City Hall today,
California state treasurer Phil Angelides shared the podium with Assemblyman Mark Leno and www.ContestTheVote.org's
Rick Hall to announce their support for a statewide effort to stop Arnold's special election.
“Instead of working with the Legislature in good faith to address the complex issues facing the state, the governor has chosen to spend his time dining with out of state corporate interests, raising campaign dollars to fight against teachers, firefighters and nurses,” said Assemblyman Mark Leno (D-San Francisco). “This is not what the people of California elected him to do. He should be in Sacramento, working with the legislature to tackle the state’s budget, education and healthcare crises.”
“These so-called reforms will take California in the wrong direction, while doing nothing to address the real issues,” said California State Treasurer Phil Angelides. “Governor Schwarzenegger’s initiatives do nothing to balance the budget, invest in transportation, or increase educational opportunities for our young people.”
‘www.ContestTheVote.org’ does not pay signature gatherers and we don’t raise money. We are a group of real Californians attempting to educate voters that the Governor’s special election circumvents new laws going into effect in 2006 which removes paperless electronic machines from use. We also want to send the Governor the message that not all Californians are in support of his idea to spend $70 million on an unnecessary and costly special election.
Instead of spending the $70 million for a special election, we could provide a UC education to more than 9,000 eligible students or pay the salaries for more than 1,300 classroom teachers. We could provide healthcare for 50,000 uninsured, poor children or in-home support services for over 90,000 frail, elderly or disabled Californians.
Governor Schwarzenegger claims that “the people” are the motivating force behind his special election, even though ‘Citizens to Save California’ will pay signature gatherers up to $15 per signature to get the 600,000 signatures needed to quality each of his initiatives for the ballot and the million signatures needed for his constitutional amendments.
‘California for Democracy’ are asking Californians who care about this issue and want to help stop Arnold's waste of taxpayer money to log on to the ‘California for Democracy’ website: www.californiafordemocracy.com At that site Californians can connect with an on-line petition to sign, download their own petition form and make copies of flyers to hand out to friends and neighbors.
“Going out of state to raise tens of millions of dollars for a special election in California, is a real affront to the working people of this state,” said Tom Brown, organizer for ‘California for Democracy.’ “We are trying to help real citizens of California make up their own minds about the future of the state.”
Stop Arnold From Holding An Expensive, Unnecessary, Unverifiable, Special Election!
(Please post this action item below to your favorite blogs)
California residents: do you want your vote to count? Do you know that, if a Special Election is held in 2005, your vote could be lost or stolen by electronic means that would leave not a trace? Yes, Arnold’s boondoggle of an election would not only cost $70 million dollars--the most distressing fact is that voting in 2005 would take place on the outmoded paperless and non-voter verified electronic voting machines.
Governor skirting election law
An election held early, in 2005, is much less secure than one held in 2006. A November, 2005 election would circumvent the bill passed last September by the California legislature requiring that all direct recording electronic (DRE) voting machines include an accessible voter verified paper audit trail as of January, 2006. Holding a special election in 2005, before this requirement takes effect, clearly invites chaos and lack of voter confidence in the election result.
Why is Ahnold so intent on holding an election seven months prior to the regularly scheduled, more secure, June 2006 primary? Word is, he wants to circumvent yet another law, one that makes it illegal for him to raise and spend money for his initiatives closer to the time when he’s a declared candidate. Supposedly, he wants new statewide redistricting, but the timeline is so short for that, its feasibility is suspect. After all, candidates need to file their papers in early 2006, but can’t if they don’t know whether they still live in their district.
Write this Special Election out of existence
There are many excellent reasons to Stop this Special Election. We need to make it clear to the Governor, and the media, that California voters do not want an expensive, unnecessary, unverifiable, and potentially chaotic statewide election in November 2005. We can wait until the regularly scheduled election in 2006, when a voter verified paper audit trail will be required for all direct recording electronic machines.
We need to get everyone we know to sign this petition to Schwarzenegger demanding he drop his wrong-headed idea of forcing a special election upon us. Polls show that support for the election falls when people know how much it costs. Add to that the mystery of what could happen to our votes, and support will dwindle even more.
Timelines and deadlines
How much time do we have to publicize these issues and gain signatures? The Governor can call a Special Election as soon as one initiative completely qualifies—probably about the beginning of May. (By statute, he has until June to call a November election.)
Concerned Californians: sign on. Contact your friends. Let’s let the Governor know we oppose a special election set up for his Special Interests. It’s time for him to realize he doesn’t own California. The state belongs not to Arnold, but to us, the people of California.
“Leno has been working with grassroots organizers who have been gathering
signatures online [www.ContestTheVote.org] and in person for petitions urging the governor to drop
plans for a special election. As of Friday afternoon, the groups have
collected nearly 17,000 signatures.”. |
Q:
Loading UTF keymap file
I need to load a particular keymap file that enables me to write underscore, special characters by typing
:set keymap=iast
where iast.vim is my keymap file
This no longer works. Where should this file reside.
I use the mac and my vim package is updated by homebrew
A:
According to the docs (:help mbyte-keymap):
The value of the 'keymap' option specifies a keymap file to use. The name of
this file is one of these two:
keymap/{keymap}_{encoding}.vim
keymap/{keymap}.vim
I would expect $HOME/.vim/keymap/iast.vim.
|
Serum 1,25-dihydroxycholecalciferol in anephric, haemodialyzed and kidney-transplanted patients. Effect of vitamin D3 supplement.
The serum levels of 25-hydroxycholecalciferol (25-OHD3) and 1,25-dihydroxycholecalciferol[1,25-(OH)2D3] were measured simultaneously in nephrectomized patients on maintenance haemodialysis, in haemodialyzed patients with preserved kidneys who were receiving different vitamin D supplement, and in patients who had undergone renal transplantation. The results indicate that the production of 1,25-(OH)2D3 can be stimulated in patients with minimal residual renal excretory function by increasing the serum levels of 25-OHD3. Successful renal transplantation was followed by a rise in serum 1,25-(OH)2D3 concentrations. |
Interaction of leukotriene C4 and Chinese hamster lung fibroblasts (V79A03 cells). 1. Characterization of binding.
A novel, specific, and potent biological action of leukotriene C4 (LTC4) was demonstrated in the Chinese hamster lung fibroblast cell line V79A03 (V79 cells), namely the confirment of protection against subsequent gamma-irradiation. Consequently, studies were conducted to determine whether LTC4-conferred radioprotection could be attributed to a receptor-mediated phenomenon. Specific binding sites for leukotriene C4 (LTC4) were identified and characterized using intact V79 cells incubated at 4 degrees C in the presence of serine-borate, during which time conversion of LTC4 to LTD4 or LTE4 was undetectable. Binding was maximal in a broad region between pH 6.2 and 8.8. Ca2+, Mg2+, and Na+ were not required for binding, and binding was not altered by GTP, ATP, or cAMP, by leukotrienes B4, D4, or E4, or by the leukotriene end point antagonists LY 171883, FPL 55712, or Revlon 5901-5. Scatchard analyses and kinetic experiments indicated the presence of high-affinity [Kd = 2.5 +/- 0.63 nM, approximately 9.9 x 10(5) sites/cell] and low-affinity [Kd = 350 +/- 211 nM, approximately 2.7 x 10(6) sites/cell] binding sites. The observed binding characteristics of LTC4 to V79 cells are consistent with a receptor-mediated phenomenon. In a companion communication which follows this report, we report the subcellular distribution of LTC4 binding to V79 cells and demonstrate that this binding is unlikely to be attributed principally to interaction with glutathione-S-transferase. |
ABC’s political editor Chris Uhlmann continues with his ill-informed campaign against wind and solar, warning in an article on Sunday of the risk of widespread blackouts and claiming there is a limit of 20 per cent renewables before problems arise.
“Once wind energy passes about 20 per cent of generation it creates a series of well-documented challenges for electricity grids in both managing intermittency and stabilising the system’s frequency,” Uhlmann writes, without citing any such documents.
That, indeed, is what the fossil fuel industry would have you believe. It was what many engineers believed back in the 1980s and 1990s. And some still may do. But it is not true.
Just a few weeks ago, these claims were were put into perspective by the CSIRO, which said that anything up to 30 per cent wind and solar should be considered “trivial”.
“We could probably add that introducing renewables at a share of 10, 20 or 30 per cent is fairly trivial on the basis that the existing generation capacity has a lot of flexibility to deal with the variability,” CSIRO energy division’s principal research scientist Paul Graham told the Senate committee into the resilience of the grid.
The CSIRO is not the only one to say this. 50 Hertz, one of the biggest network companies in Germany, says more than 60 per cent can be absorbed without the need for storage.
“It’s about the mind-set,” Schucht said at the Re-energising the Future conference in Paris, and later to RenewEconomy, on the sidelines of the Paris climate conference in 2015.
“Ten to 15 years ago when I was young engineer, nobody believed that integrating more than 5 per cent variable renewable energy in an industrial state such as Germany was possible.” In the region 50 Hertz operates, the share of wind and solar was 42 per cent in 2015.
“No other region in the world has a similar amount of volatile renewable energy ….. yet we have not had a customer outage. Not for 35 or 40 years.”
That comes down, not to the particularities of wind and solar, but to management of the grid, or what the head of the world’s biggest grid has called a “cultural issue.”
China State Grid, the world’s largest, and the part owner of three Australian networks, has a vision for powering the world 80 per cent with wind and solar. High levels of renewable energy, CEO Lio Zhenha told a Texas conference last year, “is not a technical issue but a cultural one.”
The CSIRO’s Graham noted that existing back-up and redundancy for the current coal-dominated grid was already in place. Challenges may start to emerge around 40 per cent, Graham noted, but these could be addressed with a range of already available technology options.
As the CSIRO and Energy Networks Australia – which represents grid owners – said in last year’s the Network Transformation Map, very high levels of wind and solar can be accommodated: 86 per cent in South Australia by 2036, it suggests. Overall, a decarbonised grid could save $100 billion over business as usual.
They underlined the need for changes in market rules, that would make it easier for new technologies such as battery storage – or concepts such as demand management and energy efficiency. But these have been fought furiously by the fossil fuel industry and incumbents protecting their vested interests.
Uhlmann further states, likes his co-conspirator Andrew Probyn, that battery storage is not yet ready to compete with gas – another favourite fossil fuel line.
“Battery technology was advancing rapidly and the cost was falling but it was still not an economic solution for Australia. What made sense for households did not, yet, add up for business.”
This appears amid a series of quotes from the CEO of Alinta, Jeff Dimery. It is not entirely clear whether they are Dimery’s point of view, or Uhlmann’s. But Uhlmann might have asked himself why Alinta is now installing a large battery storage array in WA.
As Dimery told RenewEconomy last year, providing a spinning reserve – which is needed even in a grid with no large scale renewables, because even fossil fuel plants need back-up – is consuming gas and costing money.
He said the battery system will pay for itself through gas displacement, in the same way that solar makes sense as diesel replacement, and because of its ability to respond quickly to outages.
This is what has been said by numerous other people. Battery storage is competitive – but not yet fully competitive in a large grid, because the rules that favour the incumbent fossil fuel interests make it impossible for storage to unlock all its value streams.
The 30-minute rule – which even the market operator has conceded is having a grossly distorting effect on prices – is chief among them.
And battery storage has other uses, particularly as a cheaper alternative to grid upgrades. Ergon Energy has been rolling battery storage out in Queensland, and says it saves around one-third from the cost of upgrades, with no subsidies. That was two years ago.
Readers will know that this is not the first time we have taken Uhlmann to task, or his college Andrew Probyn. We took issue with Uhlmann’s reporting on the September blackout, and his warning of a “national blackout” if we built too much wind and solar.
He then sought to portray himself as the messenger of inconvenient truths, who had been treated like a heretic by the “pitch-fork brigade”. We presume he mean us.
No, the renewable energy industry and other energy experts have been working on these issues for years, but have been frustrated at every turn by the incumbent fossil fuel industry, who have been desperate to reject any energy market progress, and to continue to peddle nonsense. Some of which is swallowed whole.
That may soon – and hopefully – change with the arrival today of Audrey Zibelman, the new head of the Australian Energy Market Operator, who was previously in charge of New York’s remarkable Reform the Energy Vision program and its target of 50 per cent renewables by 2030.
Probyn has also been guilty, like Uhlmann, of repeating fossil fuel marketing lines that gas is the only commercial solution to grid integration issues, and of accusing Labor of being a “slave” to renewable energy targets. |
Q:
“Thus ignoring” meaning of thus in text?
Shaping Identity in Eastern Europe and Russia: Soviet and Polish Accounts of ...
Authors of survey histories were criticized for focusing on interclass as opposed to intraclass conflict thus ignoring the revolutionary role of the peasantry in the seventeenth century and erroneously labeling the Khmelnytsky uprising as a “ national bourgeois” revolution against Polish trade capitalism.* Particularly harsh was Skubytsky...
I am trying to detect the meaning of “thus” in this text, but with no hope.
I am trying to replace it with therefore or consequently. But it doesn’t make any sense.
A:
Thereby is a good choice since it emphasizes that there was a decision (focusing on interclass conflict) and a result (ignoring the revolutionary ...).
|
Q:
TERM=(linux|xterm) vi in an xterm or the AAABBBBBBCCDDD-problem
Usually when I want to run vim in a desktop konsole session, I make sure the TERM variable is set to linux as the arrow keys don't work in insert mode with TERM=xterm. They show capital A..D instead of moving the cursor.
Now I think this is the wrong way of doing thingsas konsole or xterm is actually of type xterm.
Is there a better way for making arrow keys work under vi / vim?
OS: Kubuntu 13.04 (Clean install)
A:
I think I know what's going on.
You've not configured vim to disable vi compatibility mode.
In vi, you can only press the arrow keys in command mode. When in insert mode, the character sequences sent upon pressing the arrow keys are treated as if the characters were entered individually.
Now, upon startup, vi sets the terminal in keypad transmit mode (kx). In that mode, the terminals usually send a different character sequence upon pressing the arrow keys than when not.
For instance, the Up key sends \eOA in kx mode and \e[A when not.
To set the terminal in kx mode, it looks up the smkx (Set Mode Keypad Transmit) capability in the terminfo database for the current value of $TERM.
If you look at the smkx capability for xterm, konsole and linux, you see:
$ infocmp -1 linux | grep smkx
$ infocmp -1 xterm | grep smkx
smkx=\E[?1h\E=,
$ infocmp -1 konsole | grep smkx
smkx=\E[?1h\E=,
That is smkx is not defined in the linux entry.
What that means is that when you start vim with TERM=linux, vim doesn't set the terminal in kx mode, that means it sends \e[A instead of \eOA when you press the Up key for instance.
Now, what does \eOA do in vim when you're in insert mode? \e (ESC), leaves insert mode and returns to command mode. O opens a new line and enters insert mode again, A inserts the A character.
While \e[A, \e (ESC) leaves insert mode, [A is an unknown combination (in vim, [ is a prefix and is always followed by another character), so does nothing.
So what you need to do is: keep $TERM as it is, don't use arrow keys in insert mode when in vi compatibility or add a set nocp to your ~/.vimrc so you can use arrow keys in insert mode.
|
Discover and Recover
God has provided a glorious new life in Christ Jesus for all. Yet, so many people still carry emotional pain, insecurities, and guilt of the past. As a result, they are caught up in destructive habits,
Product Description
Begin a new path of personal discovery and recovery! Discover & Recover is an effective resource for churches and Christian recovery groups, as well as for personal study. Discover & Recover will help to: • Eliminate insecurities, guilt, and painful issues of the past • Bring you into right relationship with God and to be filled with His power • Bring freedom from addictions and bad habits • Understand yourself better • See yourself the way God sees you • Understand spiritual growth and begin to grow spiritually • Live a godly life daily • Hear from God and move into His destiny for you • Equip you to help and minister to others Dale Allen came into recovery from alcoholism, drug addiction, and severe depression in 1974. Then, in 1978, he came to know Jesus personally and was filled with the Holy Spirit, which brought the true victory and freedom he sought in his recovery. Dale now teaches the principles that he has learned through his years of experience and study. Dale has been a full time addictions worker for 10 years. He and his wife, Delaine, head up Lifestream Ministries International, preaching and teaching the Word of God, and are part of the leadership team of their home church in Regina, Canada. They are the parents of two grown children.
Product Details
Paperback: 172 pages
Publisher: Xulon Press (November 6, 2008)
Language: English
ISBN-10: 1607910330
ISBN-13: 978-1607910336
Product Dimensions: 10.9 x 8 x 0.5 inches
Shopping cart
x
Cart empty
Please wait
Lifestream Ministries International uses Paypal exclusively to process all of our online contributions. Paypal is one of the highest rated credit card processors on the internet in terms of security, safety and ease of use. You do not have to have a paypal account to contribute to Lifestream Ministries. |
CTRLR integrates hardware synths into your DAW with the convenience of software synths. See you on Ebay.
Column: Jason Hearn
Around the year 2000, I was lured by the spoils of software synths: reliable recall, sounds stored within project files, easy automation and the ability to run multiple instances. It was revolutionary. But ever since, some downright gorgeous-sounding hardware synths have been slowly collecting dust around me, exactly because of this lack of convenience.
Just one example is a Roland MKS80 Super Jupiter polyphonic analogue synth module from the mid ’80s I’d been loaned. Since I didn’t have the optional MPG80 programming unit for it — with all the knobs and faders — it sat under-utilised in my rack. When another good friend finally loaned me his MPG80 controller, what should have been the connecting link still didn’t solve two aspects of soft-synth workflow I’d become accustomed to: full recall of sound parameters from within my DAW projects (I’m using a DAW which doesn’t record SysEx dumps), and full automation of all parameters.
It got me thinking. What would I need to build a VST/AU-based editor for my synth collection? When I started listing the skills required, even an optimistic timeframe was starting to look medical degree-long: Learn how to code C++; build GUIs from scratch; create VST/AU plug-ins; ensure it was cross platform; and test it. It sounded less and less like a fun weeknight hobby and more like a career choice.
Thankfully, almost out of the blue, I discovered CTRLR, which has completely revolutionised the way I integrate my hardware synths within the context of a modern-day 64-bit DAW. Hopefully it can do the same for you.
WHAT IS CTRLR?
CTRLR (ctrlr.org) is a freeware, open-source, cross-platform tool allowing owners of MIDI-equipped hardware synths to integrate them with the same convenience of software-based plug-in synths. It can run either as a standalone editor or a VST/AU plug-in within 32-bit and 64-bit DAW applications running on OS X, Windows, and surprisingly, Linux.
Launching CTRLR as a VST/AU plug-in allows you to load a controller Panel created for your synth, configure the MIDI port and channel settings, and then, via standard plug-in automation, automate all parameter objects on the Panel just like a software synth.
While the concept itself may not be unique (manufacturers of modern synths often provide a plug-in-based editor), what is special about CTRLR is users are free to create their own custom Panels with relative ease — providing it has a sufficient MIDI spec.
Additionally, CTRLR allows you to generate specific VST/AU plug-ins with your desired Panel preloaded. I’ve spent the past months getting a kick out of addressing the Roland MKS80 nestled deep within my rack by simply calling up my self-created plug-in called Roland MKS80.vst.
A FEATURE-RICH EDITOR
CTRLR’s editor is deep to say the least. Here are some examples:
• You can arrange layers of controls in Tabs for control-laden synths.
• Users with design chops can import bitmaps as the basis for their GUI and replace CTRLR’s built-in faders and knobs with bitmap animations saved in PNG format. The freeware KnobMan application (www.g200kg.com/en/software/knobman) is designed specifically with this type of design in mind.
• CTRLR’s slider/knob objects even support multi-part MIDI messages — great news for synths supporting high-resolution 14-bit Continuous Controller data such as Moog’s Voyager. And when creating Panel Modulators that send SysEx messages, complexities such as Roland’s SysEx Checksum standards have been implemented (this was essential when I created the Roland MKS80 panel).
• There’s also a very useful MIDI Monitor tool allowing you to watch the data flowing in and out of CTRLR. And the MIDI Calculator window will help those not accustomed to converting values back and forth from decimal to hexadecimal, and vice versa.
CTRLR Panels currently available for download:
Access Virus TI, Akai MiniAK, Alesis Micron (same panel as Akai MiniAK), Cheetah MS6 with MAD Rom panel, DSI Mopho, DSI Prophet’08 (Power’08), Emagic AMT8, EMU Procussion, GEM Real Expander, Jomox Xbase09, Korg DW6000, Korg DW8000 (two different panels), Korg Prophecy, MFB SynthLite 2, MIDIbox SID, Moog Little Fatty (Mogue Big Skinny), Moog Minitaur, Moog Voyager (Mogue Voyeur), Novation Supernova, Roland Juno 106, Roland JV/XP family panel (Jay-V) ,Roland JX-3P fitted Kiwitechnics 3P Upgrade (Kiwi-3P), Roland JX3P with Organix MIDI Kit (JOX’3P), Roland JX8P (two different panels), Roland MKS80, Roland VM-3100 Mixer Map, Sequential Circuits Six-Trak (Six-Trak Editor), Studio Electronics Omega 8, Vintage Revolution PedalPro MIDI, Waldorf Microwave II/XT/XTk, Waldorf Rack Attack (RealAttack), Yamaha TX7, Yamaha TX81Z.
TOTAL RECALL
While building your own panels is powerful, the key feature most of us are looking for is the ability to recall our hardware synth settings as easily as our softsynths. So, how does it work?
Well, behind the scenes CTRLR’s primary developer, Atom, is hard at work building a Librarian within CTRLR that promises to help manage the patch memories within your hardware synths. It’s a big job, so in the meantime CTRLR uses the Snapshot function to achieve total recall of patches within DAW projects — perfectly adequate if you tend to create unique sounds for each project you create.
Creating a Snapshot stores a ‘local’ preset in that project’s plug-in instance. When you reopen the project, simply hit Send Snapshot, and CTRLR transmits all settings on the Panel to the synth. Hey presto, your hardware synth sound is recalled.
Used in tandem with your DAW’s Freeze function, you can use multiple instances of a single hardware synth just like you can with a software synth. Just unfreeze and resend your snapshot if you want to tweak the sound. The best part of this workflow is the sounds are stored within the DAW project itself (just like a software synth), freeing you from having to separately maintain patch memories within the synth itself. It also effectively gives you unlimited patch memories for your synth — one of the key motivators for me avoiding hardware synths in the first place.
Editing is uni-directional (you can’t actually suck the patch data out of the synth to edit) unless otherwise stated. This is fine for most purposes if you create yourself a good initial Snapshot.
POWER TIP: SET YOUR PRESETS
If your DAW has track-insertable objects to bring external audio streams into a track (for example, Ableton Live’s External Effect object) and the ability to save track presets, you’re in luck! With these facilities, you can simultaneously launch an instance of CTRLR with MIDI settings preconfigured and a Panel preloaded, simplifying how you route audio streams back into the DAW. Much more convenient than manually creating audio tracks to route your synth’s audio each time.
This is a huge timesaver and great for keeping in the creative zone. Ideally, you will be using an audio interface with enough I/O to dedicate specific inputs to specific synths and keep them connected consistently. In fact, the existence of a good CTRLR Panel for a forgotten classic on eBay is good enough reason to consider buying it.
PACKETS OF STREAMING GOLD
Some synths only adjust parameters with MIDI SysEx messages, which is a problem for Ableton Live users as the DAW removes MIDI SysEx messages from MIDI data streams. CTRLR neatly overcomes this limitation by communicating directly with hardware MIDI ports (in Live’s MIDI preferences, uncheck the Input and Output ports you are using with CTRLR for the Track/Sync/Remote columns). Although it has been possible for Ableton Live users to create Max4Live editors for hardware synths, for synths requiring SysEx messages you need to launch a satellite Max run-time application when recalling projects, introducing the risk of incomplete recall.
When creating a CTRLR Panel for a synth without the aid of the manufacturer’s MIDI SysEx Implementation guide, consider watching the data streams from an existing editor like Emagic’s Windows-only SoundDive, and identifying which values are changing in response to tweaking the controls.
A similar approach was instrumental when I developed the MKS80 Panel. Armed with an iPad2 running Liine’s Lemur app loaded with the MKS80 editor, I watched the data streams — making it easier to understand the grubby scanned version of the MKS80’s MIDI SysEx guide I found online.
POWER TIP: GEEKING OUT ON LUA
For ultra-geeky musicians familiar with programming and LUA scripting, CTRLR’s Panel editor has a full LUA scripting engine and console built-in. It allows you to build and attach LUA ‘Methods’ to modulators that execute depending on specific GUI actions. For most Panel creators, understanding LUA scripting is unnecessary. If, however, you wish to extend a Panel to interpret SysEx patch dumps from your synth or build additional functionality into your Panels such as Patch randomisers, LUA will be worthwhile learning.
SUPERCHARGE SYNTHS WITH CTRLR
Prior to making the MKS80 Panel, external modulation via MIDI was limited to Aftertouch (with only two destinations), Velocity (rates for Envelopes 1 and 2 only) and Pitch Wheel. Now, armed with the Panel, any parameters within the MKS80 can be modulated. In tandem with Ableton Live’s Clip-based parameter automation, I can perform exotic modulations such as ‘wavesequencing’ oscillator waveforms. It’s not just controlling, it’s super-charging your synths!
Creating your own Panels might seem daunting, but it’s doable and there’s a whole community to help you along. And during the process you’ll get a dual education — how to build Panels, and a deep understanding of what makes your synth tick — all without the medical degree timeframe.
POWER TIP: THINK BEFORE YOU CLICK
In Ableton, parameters of a softsynth are not made available for automation until you click the Configure tool (found in the header of the plug-in device container) and then click on each parameter on the synth’s GUI until all are shown. It’s worth putting some thought into the order you add the parameters since this is the order they’ll be presented and grouped on your control surface. |
---
abstract: 'Multifractal properties of a tracer density passively advected by a compressible random velocity field are characterized. A relationship is established between the statistical properties of mass on the dynamical fractal attractor towards which the trajectories converge and large deviations of the stretching rates of the flow. In the framework of the compressible Kraichnan model, this result is illustrated by analytical calculations and confirmed by numerical simulations.'
author:
- Jérémie Bec
- Krzysztof Gawȩdzki
- Péter Horvai
title: Intermittent distribution of tracers advected by a compressible random flow
---
We are interested in the passive transport of a scalar density by smooth-in-space compressible random flows in a $d$-dimensional bounded domain $\Lambda$. During transport, the density develops strong inhomogeneities. Our goal is to describe [quantitatively]{} their fine structure arising at asymptotically large times. Compressible flows are physically relevant not only at large Mach numbers. For instance, the dynamics of a suspension of finite-size (inertial) particles in an incompressible flow may be approximated in the limit of short Stokes times by that of simple tracers in an effective compressible flow [@ekr96; @bff01]. Another application is to the advection of particles floating on the surface of an incompressible fluid [@SchumEckh].
A smooth passive density field $\rho(t,\bm x)$ evolves in the velocity field $\bm v(t,\bm x)$ according to the continuity equation $$\label{eq:density}
\partial_t \rho + \nabla\cdot(\rho\bm v)
=
0$$ which preserves the total mass that we shall assume for convenience normalized to one. If the initial density at time $t_0$ is uniform and if the flow is compressible and sufficiently mixing, then the solution $\rho(t)$ of (\[eq:density\]) will approach, when $t_0$ tends to $-\infty$, a singular limit $\rho_*(t)$ which is a measure with support on the dynamical attractor towards which the Lagrangian trajectories converge. For random velocities, the measure $\rho_*(t)$ and the dynamical attractor depend on the velocity realization. We shall consider stationary velocity ensembles where the statistics of $\rho_*(t)$ does not depend on $t$. For convenience, we shall restrict our study to $\rho_* \equiv \rho_*(0)$. One expects the measure $\rho_*$ to have roughly a local product structure with a smooth density along the unstable manifolds of the flow and a fractal-like structure in the transverse directions (such measures are called SRB [@LSY]).
The **Lagrangian average** defined by $$\langle F \rangle
\equiv
\overline{
\int_\Lambda
F(\bm x \,|\, \bm v) \, \rho_*(\bm x \,|\, \bm v)
\,{{\mathrm{d}}}\bm x }
\, ,$$ where the overline denotes the expectation with respect to the velocity ensemble, samples points in $\Lambda$ according to the density $\rho_*$ of the asymptotic tracer distribution on the random attractor. It determines an invariant measure $\mu_*$ of the random dynamical system defined on the product of the physical space $\Lambda$ and the space of the velocity realizations.
We are interested in the small-scale statistics of the mass distribution associated to the measure $\rho_*$. Denote by ${\cal
B}_r(\bm x)$ the ball of radius $r$ around the point $\bm x$ and introduce the quantities $$m_r(\bm x)
\equiv
\int_{{\cal B}_r(\bm x)} \!\!\!\!
\rho_*(\bm y)
\,{{\mathrm{d}}}\bm y
\, , \quad
h_r(\bm x)
\equiv
{\ln\, m_r(\bm x)\over \ln r}
\,.$$ The **local dimension** at ${\bm x}$, defined if the limit exists as $h(\bm x) \equiv \lim_{r\to0}\,h_r(\bm x)$, characterizes the small-scale distribution of mass associated to the limiting density $\rho_*$. A more global assessment is provided by the Hentschel-Procaccia spectrum for dimensions [@HP; @p97] of $\rho_*\,$: $$\label{HP}
{{\mathit{HP}}}(n \,|\, \rho_*)
\equiv
\lim\limits_{r\to 0} \;
\frac{\ln \int_\Lambda m_r(\bm x)^{n-1}\,\rho_*(\bm x)\,{{\mathrm{d}}}\bm x}
{(n-1) \ln r}$$ for real $n$. In particular, ${{\mathit{HP}}}(0 \,|\, \rho_*)$ is the fractal dimension of the support of $\rho_*$, ${{\mathit{HP}}}(1 \,|\, \rho_*)$ is known as the information (or capacity) dimension and ${{\mathit{HP}}}(2 \,|\, \rho_*)$ as the correlation dimension. For random flows, one may define the **quenched** version of the Hentschel-Procaccia spectrum ${{\mathit{HP}}}_{\!\rm qu}(n) \equiv \overline{{{\mathit{HP}}}(n \,|\, \rho_*)}$ and the **annealed** version ${{\mathit{HP}}}_{\!\rm an}(n)$ where the velocity average is taken under the logarithm in the numerator on the right-hand side of (\[HP\]). One has $\,(n-1){{\mathit{HP}}}_{\!\rm
qu}(n)\geq(n-1) {{\mathit{HP}}}_{\!\rm an}(n)\,$ and $\,{{\mathit{HP}}}_{\!\rm
qu}(1)={{\mathit{HP}}}_{\!\rm an}(1)\,$ (if exists). If the moments of $m_r(\bm x
\,|\, \bm v)$ with respect to the invariant measure $\mu_*$ exhibit the small $r$ scaling $$\label{scb}
\langle\, m_r^n \,\rangle
\,\sim\,
r^{\xi_n}
,$$ then ${{\mathit{HP}}}_{\!\rm an}(n+1)=\xi_n/n$. There are various aspects of behavior (\[scb\]). First, a non-linear dependence of the scaling exponents $\xi_n$ implies **intermittency** in the mass distribution and, in particular, the presence of non-Gaussian tails in the probability density function (PDF) of $m_r$. Second, this behavior suggests that the PDFs of $h_r$ take, for small radii, the large deviations form $\,{\rm e}^{\,(\ln
r)\,S(h)}\,$ with the rate function $S(h)$ and the scaling exponents $\xi_n$ related by the Legendre transform: $\,S(h) = \mathop{\rm max}_n
\,[\xi_n-nh]$. Third, the (annealed) fractal dimensions $f(h)$ of the random sets on which the local dimension $h(\bm x)$ is equal to $h$ (the **multifractal spectrum**), is expected to be equal to $h-S(h)$.
The aim of this letter is to relate quantitatively the dimensional spectrum ${{\mathit{HP}}}_{\!\rm an}(n)$ to the large deviations of the **stretching rates** of the flow (sometimes also called finite-time Lyapunov exponents). We note here that in [@bff01] a similar relation was discussed for $n=1$ and, in a qualitative way, for large $n$.
Let $\bm X(t,\bm x)$ denote the Lagrangian trajectory passing at time zero through point $\bm x$. The matrix $\,W(t,\bm x) \equiv
\left({\partial_{j}X^{i}(t,\bm x)}\right)\,$ describes the flow linearized around the trajectory $\bm X$. The eigenvalues of the positive matrix $W^TW$ may be written, arranged in non-increasing order, as $\,{\rm e}^{2t\sigma_1}, \dots, {\rm e}^{2t\sigma_d}\,$ with $\sigma_i\equiv\sigma_i(\tau,\bm x|\bm v)$ called the stretching rates of the flow. The limits $$\lambda_i
\equiv
\lim_{t\to\infty}\, \sigma_i(t)$$ exist almost surely with respect to the invariant measure $\mu_*$ and are constant if the latter is ergodic. They define the Lyapunov exponents of the flow. This is the content of the Multiplicative Ergodic Theorem [@LArnold]. As argued in [@bf99], if the exponents $\lambda_i$ are all different then the PDF of the stretching rates takes the large deviation form $$\label{eq:ftle_largdev}
\ {\rm e}^{-t\,H(\sigma_1,\dots,\,\sigma_d)}
\,\, \theta(\sigma_1-\sigma_2)\dots\,\theta(\sigma_{d-1}-\sigma_d)$$ for large $t$ with convex rate function $H$ attaining its minimum, equal to zero, at $\sigma_i = \lambda_i$.
If the top Lyapunov exponent $\lambda_1$ is negative, then the attractor measure $\rho_*$ is expected to be atomic with trivial mass statistics. For $\lambda_1>0$, Ledrappier and Young [@ly88] showed under rather general assumptions that the local dimension $h$ is almost surely equal to the Lyapunov dimension $d_L = j+\delta$ where $0 < \delta \leq 1$ is such that $\,\lambda_1 + \dots +
\lambda_j + \delta\lambda_{j+1} = 0$. The above statement implies that $$\label{eq:dxi/dn|0}
{{\mathit{HP}}}_{\!\rm qu}(1)
=
{{\mathit{HP}}}_{\!\rm an}(1)
=
{{{\mathrm{d}}}\xi_n / {{\mathrm{d}}}n} |_{n=0}
=
d_L
\,.$$ The Lyapunov dimension $d_L$ was introduced by Kaplan and Yorke [@ky79] and may be heuristically interpreted as the dimension of objects keeping a constant volume during the time evolution. Eq.(\[eq:dxi/dn|0\]) gives only partial information about the mass scaling as compared to the full set of exponents $\xi_n$.
![\[fig:mass\_attract\] Two-dimensional sketch of the backward-in-time evolution between times $t$ and $0$ of a small parallelogram of length $r_1$ in the direction of the unstable manifold and $r_2$ in the direction perpendicular to it.](fig1.eps){width="30.00000%"}
To relate the mass distribution in small balls to the fluctuations of the stretching rates, we focus on the two-dimensional case. The expected smoothness of $\rho_*$ in the unstable direction leads us to consider small parallelograms with one side of size $r_1$ parallel to the unstable manifold and with extension $r_2$ in the direction perpendicular to it. We expect that the moments of the mass $m_{r_1,r_2}$ in such parallelograms obey $$\label{eq:rectscaling}
\langle\,m_{r_1,r_2}^{\,n}\rangle
\sim
r_1^{n} \, r_2^{\xi_n-n}$$ for small $r_1,r_2$ as long as $\xi_n-n\geq 0$. When $\xi_n < n$, we expect (\[eq:rectscaling\]) to be replaced for $r_2 > r_1$ by $$\label{eq:rectscaling-sat}
\langle\, m_{r_1,r_2}^{\,n}\rangle
\sim
r_1^{\xi_n} \, r_2^0
.$$ This may be viewed as analogous to the stretching in one direction of a fractal set of dimension $D$, while contracting it in the other one. In the expanding direction, the set will behave (down to a scale depending on the stretching) as if projected on a line, so it will have dimension $\min(1,D)$. In the other direction it will have the complementary dimension $D - \min(1,D) = \max(D-1,0)$.
Let us consider such a parallelogram at $t>0$ and let us look at its pre-image at time zero. While the direction parallel to the unstable manifold is exponentially contracted backward-in-time with a rate given by the largest stretching rate $\sigma_1$, the other direction typically expands with an exponential rate $\sigma_2$. Hence the time-zero pre-image of the original parallelogram is (approximately) another parallelogram as sketched in Fig. \[fig:mass\_attract\]. Conservation of mass and stationarity of the statistics lead to the relation $$\langle\, m_{r_1,r_2}^{\,n}\rangle
\approx
\langle\, m_{r_1{\rm e}^{-t\sigma_1}\,,\,r_2{\rm e}^{-t\sigma_2}}^{\,n}
\rangle.$$ If there is a sufficiently rapid loss of memory in the Lagrangian dynamics (i.e. if the invariant measure is sufficiently mixing) then the expectation on the right-hand side should factorize for large $t$ (such a factorization holds for all $t$ in the Kraichnan model discussed below). In such situation, using the large deviation form (\[eq:ftle\_largdev\]) of the PDF of the stretching rates, we infer that $$\langle\, m_{r_1,r_2}^{\,n} \rangle
\sim
\!\int_{\sigma_1\geq\sigma_2}\!\!\!\!\!\!
\langle\,
m_{r_1{\rm e}^{-t\sigma_1}\,,
\,{r_2\rm e}^{-t \sigma_2}}^{\,n}
\rangle\,
{\rm e}^{-t H(\sigma_1,\dots,\,\sigma_2)}\;{{\mathrm{d}}}\sigma_1
{{\mathrm{d}}}\sigma_2\,.$$ Consistency of the above relation with the scaling (\[eq:rectscaling\]) requires that $$1
\sim
\int_{\sigma_1\geq\sigma_2} \!\!\!\!\!\!\!
{\rm e}^{-t\,[n\sigma_1+(\xi_n-n)\sigma_2 +
H(\sigma_1,\,\sigma_2)]}\,\,{{\mathrm{d}}}\sigma_1{{\mathrm{d}}}\sigma_2\,.$$ Since $t$ is assumed large, a saddle-point argument implies then the following relation between the scaling exponents $\xi_n$ and the rate function $H$ of the stretching rates: $$\label{eq:form2d}
\min_{\sigma_1\geq\sigma_2} \left[
n\sigma_1 + (\xi_n-n)\sigma_2 +
H(\sigma_1,\,\sigma_2)
\right]
=
0
.$$ Alternative formulations are $$\xi_n
=
n -
\!\!\!
\max\limits_{
\begin{array}{c}
\raisebox{3pt}[0pt][0pt]
{$\scriptstyle \sigma_1 \geq \sigma_2$}
\\
\raisebox{6pt}[0pt][0pt]{$\scriptstyle \sigma_2 < 0$}
\end{array}
}\!
\frac{1}{\sigma_2}
\left[
n\sigma_1 + H(\sigma_1,\,\sigma_2)
\right]
=
\min\limits_{h\geq0} \, [h n + S(h)]$$ for $\,S(h)=\min_{\sigma>0}\,{\sigma}^{-1} H((h-1)\sigma,-\sigma)$. These formulae are valid for $\xi_n \geq n$. Similarly, from (\[eq:rectscaling-sat\]) we may get the formula valid for $\xi_n
\leq n$ $$\label{eq:form2d-sat}
\xi_n
=
-\max_{
\begin{array}{c}
\raisebox{3pt}[0pt][0pt]
{$\scriptstyle \sigma_1 \geq \sigma_2$}
\\
\raisebox{6pt}[0pt][0pt]{$\scriptstyle \sigma_1 < 0$}
\end{array}
}
\frac{1}{\sigma_1}
H(\sigma_1,\,\sigma_2)
.$$
It is easily checked from (\[eq:form2d\]) that $({{\mathrm{d}}}\xi_n/{{\mathrm{d}}}n)|_{n=0} = 1 - \lambda_1/\lambda_2$ which coincides, in our settings, with formula (\[eq:dxi/dn|0\]). Also from (\[eq:form2d\]) one may deduce that $$\lim_{t\to\infty}
\frac{1}{t}
\left\langle
\left| \bm R(t) \right|^{-\xi_1}
\right\rangle
=
0
,$$ for $\bm R(t)=W(t,\bm x)\bm R_0$, meaning that the generalized Lyapunov exponent of order $-\xi_1$ vanishes. This is a known result for stochastic flows of diffeomorphisms, see [@b91]. Relation (\[eq:form2d\]) can be extended to dimensions higher than two using similar arguments.
To illustrate the small-scale properties of the mass distribution, we focus in the sequel on transport by a random compressible velocity field chosen in the framework of the Kraichnan model [@Kr68]. For the domain $\Lambda$ we take a periodic box. The velocity $\bm v$ is taken centered Gaussian, with covariance $$\overline{v^i(\bm x+\bm\ell,t+\tau)\, v^j(\bm x,t)} =
2(D_0 \delta^{ij} - d^{ij}(\bm\ell))\,\,\delta(\tau),$$ where, for small separations $\bm\ell$, the function $d^{ij}$ satisfies $$d^{ij}(\bm \ell)
=
\frac{\mathrm{D}_1}{2}\left[(d+1-2\wp)\,\delta^{ij}\ell^2
+ 2(\wp d-1) \,\ell^i\ell^j
+ o(\ell^2)\right]$$ assuring local isotropy. The parameter $\wp$, called the compressibility degree, is chosen in the interval $[0,1]$. Its extreme values correspond, respectively, to incompressible and to potential velocity fields. For such velocity ensembles, the distribution of the stretching rates is explicitly known [@bf99; @fgv01]. The corresponding rate function takes the simple form $$H = \frac {1}{\mathrm{C}_1} \Big[ \sum _{i=1}^{d}
\,(\sigma_i-\lambda_i)^{2} + \mathrm{C}_2 \Big( \sum _{i=1}^{d}
\,(\sigma_i-\lambda_i)\Big)^{2} \Big].$$ $\mathrm{C}_1 \equiv 4 \mathrm{D}_1\,(d + \wp\,(d - 2))$, $\mathrm{C}_2 \equiv (1 - \wp\,d)/(\wp\,(d - 1)\,(d + 2))$. The Lyapunov exponents are $\lambda_j = \mathrm{D}_1
[d\,(d-2j+1)-2\wp(d+(d-2)j)]$. In the two-dimensional case, the largest Lyapunov exponent is negative when $\wp>1/2$. For $\wp<1/2$, the exponents for the mass distribution obtained from (\[eq:form2d\]) and (\[eq:form2d-sat\]) read $$\label{eq:expokraich}
\xi_n
=
\left\{\begin{array}{cl}
\frac{2n + \sqrt{(1+2\wp)^2 - 8\wp n}}{1+2\wp} -1 &
\ \mbox{ if }\quad n \le n_{\rm cr}\,,
\\[10pt]
\xi_{\infty} &
\ \mbox{ if }\quad n \ge n_{\rm cr}
\end{array}\right.$$ where the critical moment $n_{\rm cr}$ and the saturation exponent $\xi_{\infty}$ are given by $$\begin{aligned}
\left\{\begin{array}{rcl} n_{\rm cr} &=&
\frac{1}{2}\sqrt{{1+\frac{1}{2\wp}}} \\
\xi_{\infty} &=& 2 n_{\rm cr} -1
\end{array} \right. &\quad\mbox{if}\quad
0<\wp\le{1/6}\,,
\nonumber
\\[5pt] n_{\rm cr} =
\xi_{\infty} = \xi_1 =\frac{2-4\wp}{1+2\wp} &\quad\mbox{if}\quad
{1/6}\le\wp<\frac{1}{2}\,.
\label{eq:defsat2}
\nonumber\end{aligned}$$ The two different behaviors are illustrated in Fig. 2. In both cases, the events contributing to the saturation of the exponents are those for which a mass of order unity is concentrated inside the small ball.
![\[fig:saturation\] (a) Ellipses in the $(n,\,\xi_n)$ plane corresponding to the unconstrained minimum in (\[eq:form2d\]). Dotted parts refer to situations when either the minimum is reached for $\sigma_1 < \sigma_2$ or $\xi_n < n$. Two values of $\wp$ are represented to illustrate both the case $\wp < 1/6$ and $\wp > 1/6$. (b) Location where the minimum is reached in the $(\sigma_1,\sigma_2)$ plane.](fig2a.eps "fig:"){width="20.00000%"} ![\[fig:saturation\] (a) Ellipses in the $(n,\,\xi_n)$ plane corresponding to the unconstrained minimum in (\[eq:form2d\]). Dotted parts refer to situations when either the minimum is reached for $\sigma_1 < \sigma_2$ or $\xi_n < n$. Two values of $\wp$ are represented to illustrate both the case $\wp < 1/6$ and $\wp > 1/6$. (b) Location where the minimum is reached in the $(\sigma_1,\sigma_2)$ plane.](fig2b.eps "fig:"){width="22.00000%"}
Numerical simulations confirm the values of the scaling exponents obtained explicitly for the compressible Kraichnan model. To distinguish the two cases, two different values of the compressibility degree are investigated ($\wp = 1/10<1/6$ and $\wp = 3/10>1/6$). The velocity field $\bm v$ is generated by the superposition of nine independent Gaussian modes and the density is approximated by considering a large number of Lagrangian tracers. The exponents obtained numerically after averaging over $10^5$ turnover times and for $N=10^5$ tracers are shown in Fig. \[fig:scaling1\]. Although statistical convergence of the average is quite slow, these expensive simulations are in a rather good agreement with the theory, in particular with the saturation of the exponents after the critical order.
The determination of the exponents may be improved for positive integer orders $n$ by considering only $n+1$ particles. This method allows to perform very long time averages (here of the order of $10^8$ turnover times) required for good convergence of the statistics at small scales. As shown in Fig. \[fig:scaling2\], for $\wp = 3/10$, the moments clearly scale over several decades. For the lower value of compressibility $\wp = 1/10$, convergence is slower because of the smaller probability for the tracked particles to come close together.
![\[fig:scaling2\] For $n+1$ particles ($n=1,\,2$ and $3$) the distribution of the maximum of the distances of the reference particle to the other $n$ particles is represented. It can be shown that this PDF is proportional to $\,{{\mathrm{d}}}\langle
m_r^n \rangle/{{\mathrm{d}}}\ln r$. The insets show the difference with small-$r$ asymptotes with slopes given by the theoretical exponents. ](fig-1_10.eps "fig:"){width="24.00000%"} ![\[fig:scaling2\] For $n+1$ particles ($n=1,\,2$ and $3$) the distribution of the maximum of the distances of the reference particle to the other $n$ particles is represented. It can be shown that this PDF is proportional to $\,{{\mathrm{d}}}\langle
m_r^n \rangle/{{\mathrm{d}}}\ln r$. The insets show the difference with small-$r$ asymptotes with slopes given by the theoretical exponents. ](fig-3_10.eps "fig:"){width="24.00000%"}
-3cm
Finally, let us mention that, for integer orders, the exponent $\xi_n$ for the Kraichnan model can be linked to the homogeneity degree of the stationary single-time density correlation function $${\cal F}_{n+1} \equiv \overline{\rho({\bm 0})\rho({\bm
x}_1)\cdots\rho({\bm x}_n)}\,.$$ The $n^{\rm th}$ order moment of $m_r$ may be written as $$\label{eq:masstodensity}
\left\langle\, m_r^n \right\rangle\hspace{-0.1cm}
\ =
\displaystyle \int_{{\cal B}_r({\bm 0})\times
\cdots\times{\cal B}_r({\bm 0})} \!\!\!\!\!\!\!\!\!\!\!\!\!\!\!
\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!\!
{\cal F}_{n+1} ({\bm 0},{\bm x}_1,
\dots,{\bm x}_n)\,\,{{\mathrm{d}}}{\bm x}_1\dots {{\mathrm{d}}}{\bm x}_n\,.\ \quad$$ In the stationary regime of the Kraichnan model ${\cal F}_{n+1}$ is a zero mode of the operator $$M_{n+1}^\dag
\equiv \!\!\!\!
\sum_{0\le k,\ell\le n}
\partial_{x_k^i} \partial_{x_\ell^j}
\left[ \left(
D_0\delta^{ij} - d^{ij}(\bm x_k -\bm x_\ell )
\right)\,\cdot\,\,\right]$$ We need not write these zero modes explicitly. The homogeneity degree of the isotropic solution of lowest degree can be found simply by requiring its positivity and imposing on it certain continuity and integrability conditions. The branch $n < n_{\rm cr}$ in (\[eq:expokraich\]) is obtained by requiring the solution to be continuous at ${\bm x}_1 = \ldots = {\bm x}_n$. On this subspace, $M_{n+1}^\dag$ is degenerate, owing to the fact that collinear points remain collinear when transported by the (linearized) flow. If in addition we restrict $M_{n+1}^\dag$ to the rotationally invariant sector, it becomes an ordinary second-order homogenous differential operator. It has two scaling solutions. The one with exponent $\xi_n - nd$ gives, through (\[eq:masstodensity\]), the non-saturated ($n < n_{\text{cr}}$) branch of (\[eq:expokraich\]). Such a solution breaks down when the corresponding zero mode ceases to be integrable at small ${\bm x}_i$ which may occur if the restriction of the zero mode to the collinear sector is not integrable near 0, i.e. $\xi_n - nd \leq -1$. This gives $n_{\rm cr}$ and $\xi_\infty$ in the case $\wp < 1/6$. Another scenario is if the zero mode has a non-integrable singularity around the collinear geometry. This gives $n_{\rm cr}$ and $\xi_\infty$ in the case $\wp > 1/6$.
An important open question not touched upon by this paper concerns the case of rough-in-space velocity fields appearing in the limit of very high Reynolds numbers. That problem cannot be formulated in terms of stretching rates but the relationship with density correlations and zero modes still holds.
We are grateful to D. Dolgopyat, U. Frisch, K. Khanin, Y. Le Jan and O. Raimond for interesting and motivating discussions. J.B. acknowledges the support of the National Science Foundation under agreement No. DMS-9729992 and of the European Union under contract HPRN-CT-2000-00162. K.G. thanks the von Neumann Fund at IAS in Princeton for the grant. Part of the numerical simulations were performed in the framework of the SIVAM project at the Observatoire de la Côte d’Azur.
When this work was essentially finished, we learned from A. Fouxon that he has also derived the relationship (\[eq:form2d\]) between the scaling exponents of mass and the large deviations of the stretching rates.
[99]{}
T. Elperin, N. Kleeorin and I. Rogachevskii, Phys. Rev. Lett. **77**, 5373 (1996).
E. Balkovsky, G. Falkovich and A. Fouxon, Phys. Rev. Lett. **86**, 2790 (2001).
J. Schumacher and B. Eckhardt, Phys. Rev. **E 66**, 017303 (2002).
L.-S. Young, J. Stat. Phys. **108** (2002), 733.
H. G. E. Hentschel and I. Procaccia, Physica **D 8**, 435 (1983).
Ya. Pesin, *Dimensional theory in dynamical systems* (Univ. Chicago Press, Chicago, 1997).
L. Arnold, *Random Dynamical Systems* (Springer, Berlin Heidelberg, 1998)
E. Balkovsky and A. Fouxon, Phys. Rev. **E 60** (1999), 4164.
F. Ledrappier and L.-S. Young, Commun. Math. Phys. **117**, 529 (1988).
J.L. Kaplan and J.A. Yorke, in Lecture Notes in Math. **730** (Springer, Berlin, 1979) p. 204.
P.H. Baxendale, in *Spatial stochastic processes*, edited by K. Alexander and J. Watkins, Progress in Probability **19** (Birkhäuser, Boston, Basel, Berlin, 1991), p. 189.
R. H. Kraichnan, Phys. Fluids **11**, 945 (1968)
G. Falkovich, K. Gawȩdzki and M. Vergassola, Rev. Mod. Phys. **73** 913 (2001).
|
t: 2, c: 2, l: 1}. Give prob of picking 2 s.
2/35
Three letters picked without replacement from {e: 11, q: 5}. What is prob of picking 1 q and 2 e?
55/112
Calculate prob of picking 1 e and 1 k when two letters picked without replacement from {e: 3, f: 2, y: 6, k: 3, z: 1}.
3/35
Three letters picked without replacement from vkvmvvvvkv. Give prob of picking 2 k and 1 v.
7/120
Calculate prob of picking 1 u and 1 m when two letters picked without replacement from uuggmragg.
1/18
Calculate prob of picking 2 m when two letters picked without replacement from mmgmdmjmmdgdemmmd.
9/34
What is prob of picking 1 n and 1 u when two letters picked without replacement from {u: 2, n: 1}?
2/3
Two letters picked without replacement from {a: 2, c: 4, e: 2, y: 1, i: 2, l: 3}. What is prob of picking 1 y and 1 a?
2/91
Calculate prob of picking 2 k and 1 x when three letters picked without replacement from xkxxkkxxkkkxk.
63/143
Two letters picked without replacement from senlelletee. Give prob of picking 2 e.
2/11
Two letters picked without replacement from {b: 1, v: 1, j: 1, y: 1, n: 1}. Give prob of picking 1 j and 1 n.
1/10
Three letters picked without replacement from ccxcxucerrycxrcuccc. What is prob of picking 1 u, 1 x, and 1 y?
2/323
What is prob of picking 2 q when two letters picked without replacement from cswccccsqqccqsw?
1/35
Four letters picked without replacement from {m: 8, b: 1, d: 6}. What is prob of picking 4 d?
1/91
What is prob of picking 2 g when two letters picked without replacement from dygdddyddldddydyxgl?
1/171
Two letters picked without replacement from {v: 1, w: 1, q: 4, j: 1, s: 2, l: 6}. Give prob of picking 1 l and 1 s.
4/35
Two letters picked without replacement from {r: 11, v: 2}. Give prob of picking 2 v.
1/78
What is prob of picking 4 v when four letters picked without replacement from vvvsvvvvvvvv?
2/3
Two letters picked without replacement from nkjoonpnnp. What is prob of picking 2 p?
1/45
What is prob of picking 1 k and 1 t when two letters picked without replacement from xtxktxtx?
3/28
Three letters picked without replacement from gggbgggbgg. What is prob of picking 2 g and 1 b?
7/15
What is prob of picking 1 u and 3 q when four letters picked without replacement from {q: 7, u: 4}?
14/33
Three letters picked without replacement from xdxxxxxuxpxxxnxkx. What is prob of picking 1 x, 1 d, and 1 n?
3/170
Two letters picked without replacement from {d: 7, l: 3}. What is prob of picking 2 l?
1/15
Two letters picked without replacement from frmmlblf. What is prob of picking 1 f and 1 r?
1/14
Three letters picked without replacement from qqppqpqqpqpqpqpqpppq. Give prob of picking 3 q.
2/19
Calculate prob of picking 1 b and 1 r when two letters picked without replacement from {k: 4, o: 1, q: 5, r: 4, b: 1}.
4/105
Four letters picked without replacement from lleelleeeelllellelel. Give prob of picking 2 e and 2 l.
132/323
What is prob of picking 3 b when three letters picked without replacement from {g: 8, b: 5, y: 5}?
5/408
Three letters picked without replacement from {a: 2, e: 1, y: 1, r: 1}. Give prob of picking 1 r, 1 y, and 1 e.
1/10
What is prob of picking 2 d and 1 j when three letters picked without replacement from ffffddj?
1/35
What is prob of picking 3 n when three letters picked without replacement from nnnnnnknnknn?
6/11
Calculate prob of picking 2 s when two letters picked without replacement from sss.
1
Calculate prob of picking 1 i, 1 p, and 1 t when three letters picked without replacement from {b: 1, p: 9, t: 4, i: 1, v: 5}.
3/95
What is prob of picking 1 m, 1 d, and 1 r when three letters picked without replacement from {d: 2, r: 1, m: 4, u: 3}?
1/15
Three letters picked without replacement from mmmdmddddm. What is prob of picking 3 m?
1/12
Two letters picked without replacement from {j: 5, k: 11}. What is prob of picking 2 k?
11/24
Two letters picked without replacement from ptttp. What is prob of picking 2 t?
3/10
Calculate prob of picking 2 v and 1 y when three letters picked without replacement from vyvyyvyyyvwvvvwyvyv.
96/323
What is prob of picking 3 k and 1 d when four letters picked without replacement from skkkd?
1/5
Two letters picked without replacement from bqeqqeqebeqqqebq. What is prob of picking 2 e?
1/12
What is prob of picking 3 c and 1 q when four letters picked without replacement from caqkucakcacacal?
2/273
Two letters picked without replacement from rbqxb. Give prob of picking 2 b.
1/10
What is prob of picking 1 t and 1 r when two letters picked without replacement from taatpaagrpztpp?
3/91
What is prob of picking 1 d, 1 r, and 2 p when four letters picked without replacement from ddrdspapssppaap?
2/91
Three letters picked without replacement from xxrxxxrxxxxxxxrx. What is prob of picking 3 x?
143/280
Two letters picked without replacement from {a: 1, x: 1, y: 1, i: 2, l: 2, d: 1}. What is prob of picking 1 i and 1 y?
1/14
Two letters picked without replacement from {m: 4, f: 7}. What is prob of picking 1 f and 1 m?
28/55
Two letters picked without replacement from yyyyyyyyyy. What is prob of picking 2 y?
1
Calculate prob of picking 1 i and 1 p when two letters picked without replacement from ipkmpm.
2/15
Two letters picked without replacement from {r: 6, p: 4}. Give prob of picking 2 r.
1/3
What is prob of picking 1 m, 1 j, 1 r, and 1 s when four letters picked without replacement from {u: 2, r: 7, m: 1, s: 2, j: 1, e: 1}?
2/143
Calculate prob of picking 2 i when two letters picked without replacement from cliclililzlcclccccj.
1/57
Four letters picked without replacement from {r: 8, a: 5}. Give prob of picking 4 r.
14/143
Calculate prob of picking 2 u and 1 g when three letters picked without replacement from guuuiuiiu.
5/42
Calculate prob of picking 2 k when two letters picked without replacement from kkknnknnkk.
1/3
Three letters picked without replacement from {v: 1, w: 5, m: 3}. What is prob of picking 1 w, 1 v, and 1 m?
5/28
Two letters picked without replacement from oonolee. What is prob of picking 1 e and 1 l?
2/21
Two letters picked without replacement from sxvxgcgbvvsgsbs. Give prob of picking 1 g and 1 s.
4/35
Calculate prob of picking 1 a and 2 w when three letters picked without replacement from wwwwwwawcwcwww.
55/364
Calculate prob of picking 1 o, 1 e, and 1 n when three letters picked without replacement from {u: 5, e: 5, z: 1, o: 4, n: 1}.
1/28
What is prob of picking 4 w when four letters picked without replacement from wewwwwwewwwww?
6/13
Calculate prob of picking 2 t when two letters picked without replacement from ltclcncccct.
1/55
Three letters picked without replacement from kqisaiskxqki. What is prob of picking 3 k?
1/220
Three letters picked without replacement from lhnnhllnhnl. What is prob of picking 2 h and 1 n?
4/55
What is prob of picking 1 n and 2 w when three letters picked without replacement from nwnwnwnnnnw?
14/55
What is prob of picking 1 w and 1 r when two letters picked without replacement from hierhwhwweww?
5/66
Calculate prob of picking 2 g when two letters picked without replacement from fbbggxxgfgb.
6/55
Two letters picked without replacement from lpgxllpllxpplx. What is prob of picking 2 x?
3/91
Two letters picked without replacement from {m: 1, s: 1, i: 4, f: 5, k: 3}. Give prob of picking 1 m and 1 k.
3/91
Calculate prob of picking 1 z and 3 b when four letters picked without replacement from {b: 3, z: 3}.
1/5
Calculate prob of picking 1 q and 1 u when two letters picked without replacement from qbpbquwk.
1/14
Three letters picked without replacement from sispdpdid. Give prob of picking 2 i and 1 p.
1/42
Four letters picked without replacement from crrrrrrrrrrr. Give prob of picking 3 r and 1 c.
1/3
Three letters picked without replacement from {x: 1, r: 1, m: 2, c: 4, v: 11}. Give prob of picking 1 v and 2 m.
11/969
What is prob of picking 1 z, 1 w, and 1 g when three letters picked without replacement from wwwzqgqgqg?
3/40
Three letters picked without replacement from {d: 4, o: 1, c: 3, s: 1, k: 9}. What is prob of picking 2 c and 1 o?
1/272
Three letters picked without replacement from {e: 1, c: 1, q: 2, g: 2}. Give prob of picking 2 g and 1 e.
1/20
Calculate prob of picking 1 j, 1 o, and 1 t when three letters picked without replacement from {j |
Q:
How to prevent fixed div block touch scroll
I have container div which creates scroll when content overflows, as the content's sibling I want to place some floating buttons that are position fixed.
However on mobile devices, the container div blocks user being able to scroll, is there a way to solve this?
things I have tried:
pointer-event: none works but user won't be able to interact with whatever inside of the fixed div.
z-Index: doesn't work
works if the scroll area is window, but I need it to be a inner scroll
please see below example in mobile view (chrome devtool) and try to scroll with mouse "touch", noticed if you start scroll from red area, it doesn't work
.container {
overflow: auto;
position: absolute;
top:0;
left: 0;
right: 0;
bottom: 0;
}
.content {
height: 2500px;
background: lightgray;
}
.btn-container {
position: fixed;
bottom: 100px;
padding:64px;
width: 100%;
display: flex;
justify-content: center;
background: red;
}
<div class="container">
<div class="content">
</div>
<div class="btn-container">
<button>button</button>
</div>
</div>
A:
pointer-events: none works but user won't be able to interact with whatever inside of the fixed div.
reset it for the child elements:
.container {
overflow: auto;
position: absolute;
top:0;
left: 0;
right: 0;
bottom: 0;
}
.content {
height: 2500px;
background: lightgray;
}
.btn-container {
position: fixed;
bottom: 100px;
padding:64px;
width: 100%;
display: flex;
justify-content: center;
background: red;
pointer-events: none
}
.btn-container>* {
pointer-events: initial;
}
<div class="container">
<div class="content">
</div>
<div class="btn-container">
<button>button</button>
</div>
</div>
|
Introduction {#sec1-1}
============
Cutaneous drug eruption is the most common adverse drug reaction attributed to a drug. Fixed drug eruption (FDE) represents the most common cutaneous adverse drug reaction in Indian patients.\[[@ref1]\] It is mainly characterized by skin lesions that recur at the same anatomic sites upon repeated exposures to an offending agent.\[[@ref2]\] The drugs most commonly implicated in FDE are analgesics and antibiotics. We report an FDE occurring secondary to fluconazole intake.
Case Report {#sec1-2}
===========
A 33-year-old male presented to the skin OPD with a history of rash since one day. The rashes were associated with burning and itching. History of drug intake (tab fluconazole 150 mg) for tinea cruris one day back at 9 pm was followed by itching with rash at 2 am at night. There was a history of similar lesions in the past due to some medication for a similar dermatological complaint. There was no history of fever or any medications. On cutaneous examination, well-defined erythematous plaques of varied sizes were present over the chest, back, lower limbs, and lips \[[Figure 1](#F1){ref-type="fig"}\]. The largest over the chest was 10X10 cm. No involvement of the genitalia was present. A patch test done with the offending drug was positive. Complete blood count and biochemical investigations were normal. The causality assessment was carried out using the Naranjo ADR probability scale or WHO-UMC causality assessment scale \[Tables [1](#T1){ref-type="table"} and [2](#T2){ref-type="table"}\]. A diagnosis of FDE to fluconazole was made and the patient was told to stop the offending agent and was started on oral antihistamines and topical steroids with complete recovery in five days.
{#F1}
######
Naranjo ADR probability scale

######
WHO-UMC causality assessment system

Discussion {#sec1-3}
==========
FDE is a distinctive drug-induced dermatosis with a characteristic recurrence at the same sites of the skin or mucous membrane after repeated administration of the causative drug.\[[@ref2]\] It was first described by Bourns in1889; five years later, it was termed by Brocq as "eruption erythemato-pigmentee fixe".\[[@ref3]\] FDE represents the most common cutaneous adverse drug reaction in the Indian scenario.\[[@ref1]\] This adverse drug reaction seems to be more common in this part of the world, probably reflecting a predisposing genetic background.\[[@ref4]\] FDE is believed to be a lymphocyte CD8-mediated reaction, wherein the offending drug may induce local reactivation of memory T cell lymphocytes localized in epidermal and dermal tissues and targeted initially by the viral infection.\[[@ref5]\] The most common drugs causing FDE are antibiotics (trimethoprim-sulfamethoxazole, tetracycline, penicillin, and erythromycin), followed by nonsteroidal anti-inflammatory drugs (NSAIDs; diclofenac sodium, aspirin, naproxen, and ibuprofen).\[[@ref2]\]
FDE characteristically recurs in the same site or sites each time the drug is administered, and the number of sites may increase with subsequent exposure.\[[@ref2]\] FDE presents mainly as sharply marginated, round or oval itchy plaques of erythema and edema becoming dusky violaceous or brown, and sometimes vesicular or bullous.\[[@ref2]\] Most of the reactions occur within 30 minutes to one day of drug exposure.\[[@ref2][@ref4]\] The lesions may be solitary or multiple. The most common sites are the genitalia in males and the extremities in females.\[[@ref4]\] Lesions can also be seen on the perianal, periorbital, and trunk.\[[@ref2]\] They may be bullous, pigmented, or nonpigmented. Pigmented lesions can be seen in pigmented individuals and heroin addicts. Nonpigmented lesions are reported with pseudoephedrine use.\[[@ref6]\]
Histologically, FDE is characterized by marked basal cell hydropic degeneration with pigmentary incontinence. Scattered keratinocyte necrosis with eosinophilic cytoplasm and pyknotic nucleus (civatte bodies) are seen in the epidermis. Infiltration of lymphocytes, histiocytes, and neutrophil polymorphs is evident in the upper dermis.\[[@ref7]\]
As most case reports concern suspected adverse drug reactions, pharmacovigilance can be problematic. Also, adverse reactions are rarely specific for the drug without specific diagnostic tests and a rechallenge is rarely ethically justified.\[[@ref8]\] Therefore, certain causality assessment scales regarding drug reaction have been described like the Naranjo ADR probability scale or the WHO-UMC causality assessment system.\[[@ref8][@ref9]\] In our case, the association was 'definite' and 'certain' as per the Naranjo scale and WHO-UMC causality assessment system, respectively. For nonimmediate drug reactions like FDE, patch tests, together with delayed-reading intradermal tests, lymphocyte transformation tests (LTTs), and oral challenges can be used in selective cases.\[[@ref10]\] Treatment includes stopping the offending drug with topical steroids, emollients, and oral antihistamines.\[[@ref2]\]
Fluconazole is one of the most common drugs used in dermatology practice. It is a triazole which acts on lanosterol 14 α-demethylase and inhibits the conversion of lanosterol to ergosterol.\[[@ref11]\] The adverse effects most frequently reported are nausea, headache, vomiting, and self-limiting biliary hepatitis.\[[@ref11]\] The most common cutaneous adverse effect is skin rash. Severe cutaneous reactions like Stevens Johnson syndrome, acute generalized exanthematous pustulosis, toxic epidermal necrolysis, and erythema multiforme have been reported.\[[@ref12]\] FDE to fluconazole is very rarely reported, with 13 cases reported till date.\[[@ref13][@ref14]\] Cross-reactions may occur with structurally related agents, such as itraconazole.\[[@ref15]\]
Therefore, this case is presented for its rarity and also to create awareness about the various side effects associated with this very commonly prescribed medication.
**Source of Support:** Nil
**Conflict of Interest:** No.
|
Q:
You can have either "not opinion-based" or you can have musicology, but not both
One of the topic areas of Music.SE that is most exciting and interesting to me is musicology. Because SE, as a system, is richly populated with -- and I use this term with all pride and fondness -- geeks, Music.SE is disproportionately blessed with early musicians and other people with passion for music history. Music.SE's denizens are unusually capable of supporting questions into musicology, as a number of recent questions have demonstrated.
Furthermore, insofar as it is SE's mission to be a repository of good answers to interesting and sometimes recondite questions practitioners of a technical discipline might ask, and to expose those answers to Google so that anyone in the world asking those questions finds those answers, Music.SE supporting musicology questions is not only right in line with what SE is trying to achieve, it is an example of how excellently SE can support sophisticated, deep, knowledgable questions and answers in tiny, under-appreciated academic fields. Answers to musicology questions typically involve pointers to resources -- books, recordings, shows, scores -- that are otherwise hard for questioners to identify as relevant, and in doing so, help bring those musicological resources to wider audiences.
It seems obvious to me that musicology is good for Music.SE, and Music.SE is good for musicology.
But we have a problem. Musicology questions are tending to get put on hold and suspended. I don't think anybody is doing this because they hate musicology, or think musicology questions are, per se, off topic. (Let me know if I'm mistaken about this!) The reasons cited are occasionally "too broad", but more usually "too opinion-based". I think it's because the people voting to close don't realize that that has to do with the nature of musicology itself.
History, as a academic practice and discipline, is, fundamentally, about opinions. Not opinions in the sense of taste preferences, but in the sense of considered hypotheses with substantiating evidence. This is what historians do: attempt to put together the jigsaw puzzle of the past, without the box, missing a lot of the pieces, and with multiple puzzle's pieces all jumbled together. Historians construct hypotheses about how things were, or why, and they marshal the evidence they have, and set them loose in the world. This is what makes history a fundamentally contentious field: conflicting hypotheses contend.
History is a field where you almost never get to know that one answer is conclusively right. The best you are ever likely get is that that the preponderance of evidence supports your contention. But maybe tomorrow somebody will find a score, a recording, an instrument, a picture, a textual description which upends everything you thought. We don't have time machines to go back and check. Is this interpretation how it would have sounded in 1189AD? Maybe, maybe not. You do your homework, and you put it out there, and at best, fellow knowledgable people nod and say, "that's a very compelling case."
Consequently, questions in the history of music don't necessarily have one right answer. You can have five different, even contradictory answers, that all are valid, interesting, and informative. That's not actually different from another sort of question that doesn't get any moderation push-back here: requests for suggestions of approaches to solve performance and mastery problems. When someone posts, e.g. for suggestions how to address the challenge of dyslexia while learning to read music, there can be a nigh-infinite number of different suggestions, all of which are useful to know about. Having "the answer" to a question be a collection of different answers isn't a bug, it's a feature.
Likewise, that there will be multiple, possibly contentious, responses to a musicology question is not a bug, it's a feature. Musicology is like perl: TMTOWTDI. Having one place where all the arguments are represented: that's not a problem, that's an achievement. Having a place where the puzzle pieces -- the bits of evidence -- are collected? That's fabulous. Having a place where the puzzle pieces are discussed, and where are collected the arguments whether or not they are part of the puzzle being assembled? Also fabulous.
The thing that gets me is that the SE platform, with its scoring mechanisms, is a particularly great at supporting that kind of discourse. People who find an argument particularly compelling can upvote it. People who disagree with an argument can object in comments, and the comments themselves can be endorsed by those who agree. People who have additional substantiating evidence can edit it right in to an answer. No one argument has to "win", all, at their varying levels of community support, show up on the page -- and if there's additional future evidence that changes things, well, votes can be added or changed. SE actually handles "opinions" really, really well. And by "well" I mean "in a way which is informative to answer seekers and other researchers".
But for Music.SE to be a home for musicology, it's got to stop unwittingly suppressing musicological questions.
From one perspective, that means relaxing the "not opinion-based" standard. I see it from another perspective: realizing that questions about associations, influences, labels, and tastes are no more "opinion" based and are just as substantiatable as questions like "how do I fix this technique problem?" and that the solution, if there is a problem, shouldn't be to ban or "fix" the question, but to hold answers to a high standard. Same as with any questions.
Regardless of how you get there, it means seeing a question like "Are the works or artists that are considered particularly influential in the development this style, and if so what/who?" and not dropping the banhammer on them as "likely to have opinion based answers", but rather reminding answerers, "Bring evidence".
Let me put this another way: I want, not unreasonably I think, Music.SE to be the place where somebody asking "Should I use Beethoven's metronome markings?" (for those that don't know: a famous, important, unresolved contentious issue of musicology that directly intersects musical practice) winds up, and finds a thorough discussion of the evidence for and against. Right now, when I put "beethoven metronome markings" into Google, you know what discussion site it sends me to? Reddit. (While there are fabulous, thoughtful technical discussions on Reddit (truly!) that... is not one.) But right now, if somebody puts "Should I..." anything it will be shot down as "too opinion-based".
Could we not do this anymore? Because I respectfully submit it's killing off one of the best, most important, most useful parts of Music.SE.
A few examples:
I personally rescued "Why is the saxophone considered romantic?" and have made a stab at saving "Which disco tracks were the most influential in electronic music?" which is still on hold as of this writing. The highly rated question I asked, "Was the viola da gamba or violin particularly associated with England in the late 16th or early 17th century?" was a direct outgrowth of a comment on the merits of "Why is the saxophone considered romantic?" which posited that that question was as absurd and inappropriate to Music.SE as asking why violins are associated with sadness. The question "About note duration"/"Why are only even values used for note duration?" was originally closed as too broad; I recommend checking out both the discussion on it, questioning whether "why" questions are even legitimate to SE (?!?!), and the answer I wrote.
A:
Isn't it time to take a good look at the guidelines, to make them more allowing? What we need in order to go out of beta is more questions, and it is clear to me that we have a problem with people having a too narrow view on what should be allowed.
Isn't it better to have a living community, with some question that one might not care about, than one where not much is happening? I don't know the history of this SE, but did the guidelines come as solutions to specific problems, or were they largely inherited from Stack Exchange, where they have other problems? I think we could do with very relaxed guidelines here, without losing quality.
Downvote and editing can solve cases rather than closing. We don't have many questions with low votes, but a relatively high number get closed.
The guidelines are forming the attitude of new users, I've seen it in my own behaviour. I think we need much more of a live-and-let-live mindset. Also, when/if the Music Fans SE goes live, questions can be migrated there (and vice versa).
A:
The only one of those examples I have a problem with is the disco one. Influence is a purely subjective thing that can't be measured. You can get opinions directly, or be pointed to resources that offer opinions, but you can't get an answer based on fact. It also seems to come from the "music fan" side more than the "musician" side as alluded to by NReilingh, but I'll admit that it's valid history.
To comment on the violin question: We have a "Why are minor keys sad?" question that I think has turned out pretty well. There are definitely reasons for them whether psychological or social.
Last thoughts: True "Should I do X?" questions are generally pretty bad. But lots that we get here and on other sites can be reworded into "What are the pros and cons of X?" or, better yet, "I have problem Y, how can I solve it?" where maybe the answer is X. Lately it seems we've had a bunch of people jump on imperfect questions and bombard them with argumentative comments that really have no place on a question page. This does need to stop in favor of positive contributions like editing and simple, polite comments asking the poster to clarify and so on.
A:
Perhaps another way of phrasing the problem is that questions as phrased might look primarily opinion based, and thus might reflect only the opinion of the person answering, but many can also be answered through research that gives a longer, well-cited view on what opinions on the topic have been for a long time.
Most of the questions I see posed on music.SE as "fact-based" are as opinion-based as the ones cited here. "Why note B is marked with H in Scandinavia and Germany?" "Was the pitch A given that letter because the minor key was originally the "basic" mode?" "What's the Difference between Baritone and Euphonium ?". They look factual, but for every one of them I can find differences of opinions between different published authors and at different times in the musicological literature. What I've posted is my opinion, that based on what I've read and on my work (in medieval musicology in the former two cases [if it matters, I'm a musicologist on the MIT faculty]) best distills common consensus and my own knowledge. But it's just my opinion about which facts ("X said A, Y said B, Z said C") are worth repeating.
|
Q:
Why doesn't setting the bounds of a UIView restrict its size to those bounds
I would like to turn off auto layout for a while and handle the size and placement of a UIView using its bounds, center, and transformation.
I have a very simple 'Single View Application' example. My app has a view controller hosting the main view. In that view are two buttons, and another view (with its background set to pink) which in turn contains an image view (set to aspect fit):
I've distilled my problem into a very simple UIViewController:
@IBOutlet weak var imageHolderView: UIView!
@IBOutlet weak var imageView: UIImageView!
@IBAction func loadImageButtonClicked(sender: AnyObject) {
let url = NSURL(string: "https://c2.staticflickr.com/4/3909/15110089915_21a12eba6a_k.jpg")
let data = NSData(contentsOfURL: url!)
self.imageView.image = UIImage(data: data!)
}
@IBAction func clearConstraintsButtonClicked(sender: AnyObject) {
let bounds:CGRect = self.imageHolderView.bounds
let center:CGPoint = self.imageHolderView.center
NSLayoutConstraint.deactivateConstraints(self.imageHolderView.constraints)
self.imageHolderView.bounds = bounds
self.imageHolderView.center = center
}
N.B. I'm trying to understand this within a more complex project, the example here is just to demonstrate the problem.
When I run the project the image has no source and so the pink UIView (imageHolderView) takes up much of the screen as expected:
When I click the load image button the controller loads the image from the web into the UIImageView. Because the constraints are all still in place Auto Layout ensures that the picture is aspect-fitted in to the UIImageView constrained to its super view imageHolderView:
If I now clear the constraints I expect to see no difference because the constraints set by Auto Layout are immediately replaced in code by the same values. But that's not what I see:
How do I grab the bounds and center of a UIView as set by Auto Layout, turn off Auto Layout for the UIView, and then re-establish the bounds and center from my own swift code?
Looking in the debugger the bounds on the UIView imageHolderView are correct, and the constraints on the UIImageView imageView are almost (*) still in place (which I'd hope would constrain the UIImageView to fit inside the UIView), but the bounds on the UIImageView have grown to accommodate the full sized image. Why?
(In the more complex app I then go on to resize, rotate, and translate the view with transformations. Apple's documentation states that "if the transform property contains a non-identity transform, the value of the frame property is undefined and should not be modified. In that case, you can reposition the view using the center property and adjust the size using the bounds property instead." The sample code does not use transformations, but as I say my real code does; I think that precludes me from setting the frame.)
(*) I say almost, because there are four constraints on the UIImageView, but in the debugger the count is two.
A:
There are several things you are forgetting.
First of all, in:
NSLayoutConstraint.deactivateConstraints(self.imageHolderView.constraints)
make sure that you are not deactivating constraints that you need. E.g. if you have a width or height constraint on imageHolderView, you would deactivate it using this call.
In:
let bounds:CGRect = self.imageHolderView.bounds
let center:CGPoint = self.imageHolderView.center
NSLayoutConstraint.deactivateConstraints(self.imageHolderView.constraints)
self.imageHolderView.bounds = bounds
self.imageHolderView.center = center
You are getting the bounds and center of imageHolderView and then you are trying to assign them back to imageHolderView. That's wrong because you are deactivating the constraints that set the position for imageView. You don't have to change the position of self.imageHolderView because the constraints for it are saved in its superview. On the other hand, self.imageView has probably all constraints deactivated, so you should be setting its position:
self.imageView.bounds = bounds
self.imageView.center = center
The center settings is wrong because imageHolderView.center is specified in the coordinate system of its superview. You should calculate the center manually from bounds.
self.imageView.center = CGPointMake(bounds.size.width / 2, bounds.size.height / 2)
However, the biggest problem is probably the fact, that bounds and center (or frame) are ignored by default in any view that is created from storyboard/xib with autolayout enabled.
You will have to manually set imageView.translatesAutoresizingMaskIntoConstraints to true. Otherwise frame will be ignored by layout manager.
|
Archive for category Soil Fertility
Tomatoes are one of my favourite foods so I grow as many as I can fit in my garden and choose varieties for their flavour, use and season and I make sure of a good crop by really taking care of them. As with most plants if you give them a good start and the best growing conditions you will be rewarded with better crops and stronger plants that need less care in the long run.
Choosing Tomato varieties
My favourite eating tomato is still Noir de Crimee, a black Russian heirloom; odd shape, odd colour but fantastic taste. Cherry tomatoes are a must for me as they are great to graze on while pottering around the garden. Next I make sure I have plenty of tomatoes for preserving, some varieties being better than others, the best I’ve tried so far are San Marzano and Roma for paste and sauces see the page on best preserving tomatoes. The other thing to consider is the length of the season. Some tomatoes bear fruit more quickly than others and are normally described by the number of days from planting out to first fruit ripening i.e. Early 55-70 days, Mid-Season 70-85 days and Late beyond 85 days. Next is variety of flavour and colour which makes for wonderful mixed tomato salads so it is nice to grow a few mild white tomatoes, acidic green ones and puunchy orange ones.
The first thing about tomatoes is that they need plenty of nutrients to produce all those lovely fruits, but the nutrients need to be added as they grow, if you put too much in at the beginning they are more likely to have too much leaf growth at the expense of fruit.
atoes. Prepare the soil where the tomatoes are to be grown either by preparing planting holes, troughs or the entire bed. I prefer to prepare troughs as this helps to direct the most nutrients and moisture to the roots and it makes it easier to water when needed. Dig a long ditch 2 spades deep and 1 spade wide. Put a layer of chopped comfrey leaves on the bottom and half fill with a mixture of well rotten compost and manure 9 parts compost to one part manure and water heavily to fill the trough.
Planting depth
Plant the tomatoes in the bottom of the trough, as deep as you can, right up to the first set of true leaves, remove the remaining baby leaves. Roots will grow from th
e stalks giving the plant more stability and ability to draw more moisture and nutrients from the soil cover with dry soil but leave sides to the trough. This will help protect the young plants from wind and help direct water to the plants.
Spacing and Staking
Tomatoes need a fare bit of space as they don’t like to be crowded. It depends on how you plan to grow the tomatoes as to what distance apart they should by anything from 40-75cm apart works. I normally set out at around 50cm apart and grow them as cordons, that is straight up a pole with one main stem or sometimes two depending on how vigorous the variety. Cordon tomatoes need to be staked, I use 2 meter metal, chestnut, or cane poles with a cross brace on windy sites. Tie in the plants as they grow so that the tops are firmly but gently attached to the poles.
Top Dressing
Once the tomatoes are in place add a top dressing of organic soil enhancer such as seaweed meal or well rotted manure. The dressing will gradually be brought down into the soil by water and the soluble nutrients can then be drawn up by the plant as it grows.
Mulch
Applying a mulch, a top cover, over the ground around the tomatoes will help protect the soil and plants and conserve the moisture level in the soil. For more details on mulching read Using Mulches
Pinching out
Intermediate tomatoes have a habit of growing into bushes which produce a lot of leaf and plant growth but less fruit. In order to concentrate the plants energy on the fruit it helps to pinch out the side shoots. That is the little sprouts that form between the main stems and a leaf branch. Pinch these out with your fingers when they are less than 12cm. If you have missed a few and they have got bigger cut them off with clippers or a knife so as not to tear the plant.
Liquid Feed
Tomatoes benefit from a liquid feed, applied every 2 weeks, once the fruit start to form. You can buy ready made preparations but why not make you own. For more details on liquid feeds read Making Organic Liquid Fertilisers
Gardener’s Tip
Russian Comfrey is one of the most versatile plants for the organic kitchen gardener as it is a fantastic natural source of potash-rich organic material and liquid feed. It’s many uses include; compost activator, liquid feed, potting mix, soil enhancer, mulch and bee attractant.
The real value of comfrey lies in its composition. The roots bring up potassium, phosphate and other minerals from deep in the ground to the leaves which are also high in nitrogen. Comfrey has 2-3 times more potassium than animal manure, which makes it especially good for the production of flowers, fruits and seeds.
Beware Russian Comfrey (Symphytum x uplandicum) is quite a different plant from Wild Comfrey. (Symphytum asperum). Russian Comfrey is a hybrid and is sterile so does not freely seed. Wild Comfrey seeds madly and can be a real nuisance, we had some growing in our garden in England and I could not get rid of it.
In our area people generally rotivate their land each spring and plant the vegetable gardens out in rows like a mini version of field cultivation. I followed the local way in our first year here but found that our light stony soil was non the better for it; the nutrients and humus I added were just getting washed away during the torrential rains in autumn. So now I prefer a raised bed system; for our sloping growing land with soil that is light, shallow and stony over rock, a raised bed system is what works for us.
Strawberry bed with a mulch of pine needles to increase acidity and to mimic a woodland floor
Benefits of using a raised bed system
Soil depth is increased as mulches are applied each year
Soil does not get compacted because it is not being walked on
Soil is kept aerated and weeded by hoeing the top few inches
Soil structure is improved by keeping it undisturbed (digging light soil just turns it to dust).
Soil fertility can be improved as and where needed and in rotation
Water is conserved by tailoring irrigation to the needs of the crops in each bed
Planning and rotating the growing area is easier because beds are fixed
Easier to provide specific soil requirements for plants with special needs.
On a sloping site a raised bed can level the growing area
Work is reduced by digging soil only once and thereafter leaving it alone
Taller edges can be made to protect and support some plants
It just looks tidy! when i go down to the kitchen gardens it is easy to walk between the beds and harvest what i need.
For us the benefits of a raised bed system outweigh the downsides. Raised beds are less suitable to the light sandy soil and dry conditions we have here, as raised beds have a tendency to dry out faster. However, the fact that the beds won’t be dug over again helps to maintain the soils structure and by top dressing with muck and compost twice a season and mulching in summer we are able to increase the fertility and water retention of the soil making it less prone to drying out in the long term. The bed edges also help to protect the top soil from being whipped away by the long, dry summer winds.
Raised beds in the veg patch (one end woven)
Edging the beds
I did try to just visually mark the bed boundaries because I wanted to be able to change the layout each year but I found that the top dressings and nutrients got washed away in the heavy rains. The higher the planting areas got and the lower the paths got the more got washed away and the growing areas became smaller in time. So I ended up edging the beds.
Ours are not the smartest looking beds, most are edged with whatever i can get my hands on; old planks, the round end bits of trees left over from milling, flat stones, I even tried making some woven edges – far too pretty for my garden, rather pointless and they only lasted a single season but they did look cute (see pic above). I have learned to just make the best use of what I have around without causing myself extra work.
Adapting growing methods to climate and land
We live in a mountainous area which has unfortunately been given over to the mono-culture of pine trees but it would have been covered in a mixed deciduous forest with shrub and low growing plants. This year I plan to start fencing off some new areas of land to try growing edibles in a more natural forest-like way. No fixed beds just a layering of planting that will mirror the way plants grow in nature with trees, bushes, climbers, perennials and annuals (if they self seed) all taking their place. I want to see for myself which is more productive and uses the least water; the permaculture way as advocated by Bill Mollison or the fixed bed intensive growing the way i do it now. Gardening is about adapting and being open to find out what works for each piece of land and climate see Kate’s picture of some clever irrigated sunken vegetable beds in India @ Hills and Plain.
Mulching is a simple technique of covering bare soil to; protect it from erosion and compression and to suppress weeds and retain moisture. Soil can be mulched with hard materials such as plastics or stone but better still are materials that are degradable because they also add nutrients, humus and improve the condition of the soil over time.
Half rotted compost this is bulkier and good around large plants and to cover larger areas.
Leaf mould, excellent soil enhancer brought down into the soil by worms
Well rotted manure nutrient rich apply to greedy plants such as fruiting crops and corn.
Specialist Mulches
Pine needles are not suitable for all crops but strawberries love a thick mulch of pine needles. Wild strawberries are forest plants and can often be found around pine forests so this is a good way to replicate their natural environment it also keeps the fruit clean and off the soil and deters slugs.
When to mulch
The golden rule of mulching is to mulch when the soil is in perfect condition, in most cases when the soil is warm and moist. Mulching will maintain the condition of the soil so do not mulch if the soil is too dry or cold and wet, mulch when the soil is warm after rains or the ground has been watered.
Mulch when planting out or soon afterwards. Mulches can also be applied:Autumn mulch overwintering crops: celeriac, leeks, parsnip, kale, winter radishes to keep soil warm, preserve soil structure and reduce ground frost making it easier to lift roots in frosty weather.Early spring mulch lightly with garden compost after digging unless the soil is very wet. It will keep the soil in good condition ready for sowing and planting later.Late spring summer mulch between rows after seedlings have germinated and between growing crops such as peas, beans, onions and carrots.Summer mulch summer fruiting crops with a thick layer of straw to keep moisture down in the soil suitable for tomatoes, aubergines, peppers, courgettes, also good for cucurbits and other sprawling plants to keep their fruit clean and of good quality.
You are currently browsing the archives for the Soil Fertility category.
Kitchen Garden Recipes
Laura Hudson’s gardening notebook – formerly Mas du Diable. It is important that we all know how to grow food, even if we don’t do very much of it, and equally that we all know how to save the seeds of edible and useful plants for the future.
Veg & Seed Forums
Web
About Me
I'm Laura, an artist and veg gardener. This is my notebook - a place to keep and share my notes about growing seasonal food and preserving the seeds of edible or useful crops. Most of my growing notes come from the 10 years I spent growing food in France https://masdudiable.wordpress.com/ |
SCRANTON, Pa., Aug. 17, 2011 -- Senior U.S. District Court Judge Edwin M. Kosik has sentenced Mark Ciavarella, former president judge of the Court of Common Pleas and former judge of the Juvenile Court for Luzerne County, Pa., to 28 years in federal prison. The federal system offers no parole and Ciavarella, 61, could remain behind bars until he is 89 years old.
In an ongoing corruption scandal that implicated more than 30 state and local government officials and contractors, Ciavarella, in a "kids for cash" scheme, was accused of sentencing juveniles to Pennsylvania Child Care and Western Pennsylvania Child Care detention centers in exchange for cash payments. Ciavarella was convicted of accepting a payment of nearly $1 million from the juvenile detention centers' builder. After the scandal, which broke in 2007, the Pennsylvania Supreme Court vacated the sentences and wiped clean the records of all minors (about 4,000) who appeared before Ciavarella during his tenure as a Juvenile Court judge.
More than 200 people packed into the William J. Nealon Federal Building in Scranton, Pa., last Thursday to witness the sentencing of Ciavarella. Following an 11-day trial in February 2011, Ciavarella was found guilty on 12 of 39 charges, including racketeering, racketeering conspiracy, mail fraud, money laundering conspiracy, conspiracy to defraud the U.S. and filing false tax returns.
Since allegations emerged five years ago, Ciavarella has steadfastly maintained that he never received kickbacks for incarcerating juveniles who appeared before him. In a statement he delivered to the court right before his sentencing, the husband and father of three requested that the government release his entire investigative file to the media and public for review. Ciavarella said, "Let it all become public and allow everyone to judge based upon the evidence amassed against me, if there is any believable evidence that I received money to place juveniles."
In an email to ABC News, the office of Assistant U.S. Attorney Gordon Zubrod, the lead prosecutor,s aid that the U.S. Attorney's Office would not be making the file available. "The file contains statements of other witnesses, Grand Jury documents and other matters not directly related to Mr. Ciavarella that we cannot disclose. We rely on the evidence that was presented at trial," the letter said.
Many of the families of children whom Ciavarella incarcerated saw the sentence as a victory. Droves of parents and some children were present at the courthouse to witness Ciavarella's fate firsthand. "The day was extremely draining," Susan Morgans told ABC News. Morgans' daughter appeared before Ciavarella as a teenager and was sentenced to detention. Although Morgans' daughter is now in her 20s, she still struggles with the effects of her boot camp experience and did not attend the sentencing. "His refusal to accept responsibility evoked a lot of emotions. Many of us were hoping to hear remorse," Morgans said.
The U.S. Attorney's Office echoed the same sentiments. "The sentence that Mr. Ciavarella received was the sentence the government asked for, and we believe it was appropriate given the ruin Mr. Ciavarella brought to the thousands of young people," Zubrod's office conveyed to ABC News.
On the courthouse steps immediately following sentencing, Defense Attorney Al Flora told a group of reporters that the sentence would definitely be appealed. "Federal sentencing guidelines are very difficult, and we knew that going in," Flora said. The defense continued to argue that Ciavarella's attitude all along was that he never accepted a bribe or kickback in exchange for sending a child to a detention facility and that was his driving force for going to trial. "In reality, I think the government was surprised with the 336-month sentence," Flora said. An appeal must be filed with the Third Circuit Court of Appeals in Philadelphia.
Ciavarella surrendered to U.S. Marshalls immediately following sentencing and was escorted to the Federal Detention Center in Philadelphia. He will remain there until the U.S. Bureau of Federal Prisons determines where the one-time judge will serve his sentence. |
# Copyright (C) 2003 Free Software Foundation, Inc.
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
load_lib dg.exp
load_lib libgloss.exp
# Define libffi callbacks for dg.exp.
proc libffi-dg-test-1 { target_compile prog do_what extra_tool_flags } {
# Set up the compiler flags, based on what we're going to do.
set options [list]
switch $do_what {
"compile" {
set compile_type "assembly"
set output_file "[file rootname [file tail $prog]].s"
}
"link" {
set compile_type "executable"
set output_file "[file rootname [file tail $prog]].exe"
# The following line is needed for targets like the i960 where
# the default output file is b.out. Sigh.
}
"run" {
set compile_type "executable"
# FIXME: "./" is to cope with "." not being in $PATH.
# Should this be handled elsewhere?
# YES.
set output_file "./[file rootname [file tail $prog]].exe"
# This is the only place where we care if an executable was
# created or not. If it was, dg.exp will try to run it.
remote_file build delete $output_file;
}
default {
perror "$do_what: not a valid dg-do keyword"
return ""
}
}
if { $extra_tool_flags != "" } {
lappend options "additional_flags=$extra_tool_flags"
}
set comp_output [libffi_target_compile "$prog" "$output_file" "$compile_type" $options];
return [list $comp_output $output_file]
}
proc libffi-dg-test { prog do_what extra_tool_flags } {
return [libffi-dg-test-1 target_compile $prog $do_what $extra_tool_flags]
}
proc libffi-init { args } {
global gluefile wrap_flags;
global srcdir
global blddirffi
global blddircxx
global TOOL_OPTIONS
global ld_library_path
global libffi_include
global libffi_link_flags
global tool_root_dir
#set blddirffi [lookfor_file [get_multilibs] libffi]
set blddirffi "/Users/ronald/Projects/pyobjc-trunk/pyobjc/libffi-src/build"
verbose "libffi $blddirffi"
set blddircxx [lookfor_file [get_multilibs] libstdc++-v3]
verbose "libstdc++ $blddircxx"
set gccdir [lookfor_file $tool_root_dir gcc/libgcc.a]
if {$gccdir != ""} {
set gccdir [file dirname $gccdir]
}
verbose "gccdir $gccdir"
set ld_library_path "."
append ld_library_path ":${gccdir}"
set compiler "${gccdir}/xgcc"
if { [is_remote host] == 0 && [which $compiler] != 0 } {
foreach i "[exec $compiler --print-multi-lib]" {
set mldir ""
regexp -- "\[a-z0-9=/\.-\]*;" $i mldir
set mldir [string trimright $mldir "\;@"]
if { "$mldir" == "." } {
continue
}
if { [llength [glob -nocomplain ${gccdir}/${mldir}/libgcc_s*.so.*]] == 1 } {
append ld_library_path ":${gccdir}/${mldir}"
}
}
}
# add the library path for libffi.
append ld_library_path ":${blddirffi}/.libs"
# add the library path for libstdc++ as well.
append ld_library_path ":${blddircxx}/src/.libs"
verbose "ld_library_path: $ld_library_path"
# Point to the Libffi headers in libffi.
set libffi_include "${blddirffi}/include"
verbose "libffi_include $libffi_include"
set libffi_dir "${blddirffi}/.libs"
verbose "libffi_dir $libffi_dir"
if { $libffi_dir != "" } {
set libffi_dir [file dirname ${libffi_dir}]
set libffi_link_flags "-L${libffi_dir}/.libs"
lappend libffi_link_flags "-L${blddircxx}/src/.libs"
}
# On IRIX 6, we have to set variables akin to LD_LIBRARY_PATH, but
# called LD_LIBRARYN32_PATH (for the N32 ABI) and LD_LIBRARY64_PATH
# (for the 64-bit ABI). The right way to do this would be to modify
# unix.exp -- but that's not an option since it's part of DejaGNU
# proper, so we do it here.
# The same applies to darwin (DYLD_LIBRARY_PATH), solaris 32 bit
# (LD_LIBRARY_PATH_32), solaris 64 bit (LD_LIBRARY_PATH_64), and HP-UX
# (SHLIB_PATH).
setenv LD_LIBRARY_PATH $ld_library_path
setenv SHLIB_PATH $ld_library_path
setenv LD_LIBRARYN32_PATH $ld_library_path
setenv LD_LIBRARY64_PATH $ld_library_path
setenv LD_LIBRARY_PATH_32 $ld_library_path
setenv LD_LIBRARY_PATH_64 $ld_library_path
setenv DYLD_LIBRARY_PATH $ld_library_path
}
proc libffi_target_compile { source dest type options } {
global gluefile wrap_flags;
global srcdir
global blddirffi
global TOOL_OPTIONS
global ld_library_path
global libffi_link_flags
global libffi_include
global target_triplet
if { [target_info needs_status_wrapper]!="" && [info exists gluefile] } {
lappend options "libs=${gluefile}"
lappend options "ldflags=$wrap_flags"
}
# TOOL_OPTIONS must come first, so that it doesn't override testcase
# specific options.
if [info exists TOOL_OPTIONS] {
lappend options [concat "additional_flags=$TOOL_OPTIONS" $options];
}
# search for ffi_mips.h in srcdir, too
lappend options "additional_flags=-I${libffi_include} -I${srcdir}/../include -I${libffi_include}/.."
lappend options "additional_flags=${libffi_link_flags}"
if { [string match "powerpc-*-darwin*" $target_triplet] } {
lappend options "libs= -lgcc_s"
}
lappend options "libs= -lffi"
verbose "options: $options"
return [target_compile $source $dest $type $options]
}
# Utility routines.
#
# search_for -- looks for a string match in a file
#
proc search_for { file pattern } {
set fd [open $file r]
while { [gets $fd cur_line]>=0 } {
if [string match "*$pattern*" $cur_line] then {
close $fd
return 1
}
}
close $fd
return 0
}
# Modified dg-runtest that can cycle through a list of optimization options
# as c-torture does.
proc libffi-dg-runtest { testcases default-extra-flags } {
global runtests
foreach test $testcases {
# If we're only testing specific files and this isn't one of
# them, skip it.
if ![runtest_file_p $runtests $test] {
continue
}
# Look for a loop within the source code - if we don't find one,
# don't pass -funroll[-all]-loops.
global torture_with_loops torture_without_loops
if [expr [search_for $test "for*("]+[search_for $test "while*("]] {
set option_list $torture_with_loops
} else {
set option_list $torture_without_loops
}
set nshort [file tail [file dirname $test]]/[file tail $test]
foreach flags $option_list {
verbose "Testing $nshort, $flags" 1
dg-test $test $flags ${default-extra-flags}
}
}
}
# Like check_conditional_xfail, but callable from a dg test.
proc dg-xfail-if { args } {
set args [lreplace $args 0 0]
set selector "target [join [lindex $args 1]]"
if { [dg-process-target $selector] == "S" } {
global compiler_conditional_xfail_data
set compiler_conditional_xfail_data $args
}
}
# We need to make sure that additional_files and additional_sources
# are both cleared out after every test. It is not enough to clear
# them out *before* the next test run because gcc-target-compile gets
# run directly from some .exp files (outside of any test). (Those
# uses should eventually be eliminated.)
# Because the DG framework doesn't provide a hook that is run at the
# end of a test, we must replace dg-test with a wrapper.
if { [info procs saved-dg-test] == [list] } {
rename dg-test saved-dg-test
proc dg-test { args } {
global additional_files
global additional_sources
global errorInfo
if { [ catch { eval saved-dg-test $args } errmsg ] } {
set saved_info $errorInfo
set additional_files ""
set additional_sources ""
error $errmsg $saved_info
}
set additional_files ""
set additional_sources ""
}
}
# Local Variables:
# tcl-indent-level:4
# End:
|
Health and Nutrition Examination Survey of 1971-75: Part II. Tinnitus, subjective hearing loss, and well-being.
The Health and Nutrition Examination Survey of 1971-75 contains valuable information because it provides unbiased estimates of the state of hearing in the general population. Here, three facets of the subjective aspects of hearing loss are examined: frequent and bothersome tinnitus, ratings of hearing, and general well-being. The period prevalence of frequent, bothersome tinnitus varied with race and gender (13 to 17%) with higher rates among blacks and females. The mean air-conduction thresholds (0.5 to 4 kHz) of those reporting frequent and bothersome tinnitus did not exceed 32 dB HL. Mean audiograms associated with those who rated both ears good, fair, poor, or deaf were significantly different from each other. Mean poorer ear audiograms for those rating one ear as good were significantly better than those for comparable symmetrical ratings. Last, there was no clear, consistent relationship between audiometric thresholds and measures of well-being. |
745 A.2d 95 (2000)
Karin SHERMAN, Appellant,
v.
CITY OF PHILADELPHIA.
Commonwealth Court of Pennsylvania.
Argued October 7, 1998.
Decided January 31, 2000.
*96 Daniel J. Mann, Philadelphia, for appellant.
Alan C. Ostrow, Philadelphia, for appellee.
Before DOYLE, President Judge, and COLINS, J., SMITH, J., FRIEDMAN, J., KELLEY, J., FLAHERTY, J., and LEADBETTER, J.,
DOYLE, President Judge.
Karin Sherman appeals from an order of the Court of Common Pleas of Philadelphia County which granted the City of Philadelphia's (City) motion for summary judgment, thereby dismissing her negligence claim against the City.
Sherman was injured on June 9, 1994, when she tripped and fell on a section of defective sidewalk and struck her head while walking in front of the City's Fire Department Administration Building located at 240 Spring Garden Street. Although the sidewalk where Sherman fell is in front of the Fire Administration Building, which the City owns, that section of Spring Garden Street abutting the sidewalk is not a City street, but has been designated as a *97 state highway pursuant to Section 2 of the State Highway Law.[1]
On April 23, 1996, Sherman initiated a negligence action against the City seeking damages for her injuries. Following discovery, the City filed a motion for summary judgment, asserting its general immunity from negligence actions and alleging that Sherman's lawsuit did not fit within any of the recognized exceptions to governmental immunity. Common Pleas granted the City's motion, and Sherman appealed.
Before engaging in a lengthy discussion about the particular facts in this appeal, however, we first examine the statutory scheme under which those facts must be examined. Following our Supreme Court's abolition of all governmental immunity for local agencies in 1973 in Ayala v. Philadelphia Board of Public Education, 453 Pa. 584, 305 A.2d 877 (1973), superceded by statute, 53 P.S. §§ 5311.101-5311.803,[2] presently 42 Pa. C.S. §§ 8541-8564, the General Assembly reinstated governmental immunity, but created several exceptions to such immunity in specific instances in 42 Pa.C.S. § 8542(b), which provides, in relevant part, as follows:
(b) Acts which may impose liability. The following acts by a local agency or any of its employees may result in the imposition of liability on a local agency:
....
(3) Real property.The care, custody or control of real property in the possession of the local agency, except that the local agency shall not be liable for damages on account of any injury sustained by a person intentionally trespassing on real property in the possession of the local agency. As used in this paragraph, `real property' shall not include:
(i) trees, traffic signs, lights and other traffic controls, street lights and street lighting systems;
(ii) facilities of steam, sewer, water, gas and electric systems owned by the local agency and located within rightsof-way;
(iii) streets; or
(iv) sidewalks.
....
(7) Sidewalks.A dangerous condition of sidewalks within the rightsof-way of streets owned by the local agency, except that the claimant to recover must establish that the dangerous condition created a reasonably foreseeable risk of the kind of injury which was incurred and that the local agency had actual notice or could reasonably be charged with notice under the circumstances of the dangerous condition at a sufficient time prior to the event to have taken measures to protect against the dangerous condition. When a local agency is liable for damages under this paragraph by reason of its power and authority to require installation and repair of sidewalks under the care, custody and control of other persons, the local agency shall be secondarily liable only and such other persons shall be primarily liable.
42 Pa.C.S. § 8542(b) (emphasis added).
From even a cursory review of these statutory exceptions to governmental immunity, it is readily apparent, first, that any strict reading of Section 8542(b)(7) would preclude Sherman from recovering for her injuries because the sidewalk on which she fell was not within the right-ofway of a street owned by the City, and second, that the underlying premise supporting the statutory scheme of Section 8542(b)(7) is predicated exclusively upon the City's secondary liability for the maintenance of a sidewalk.
*98 Conversely, in other sections of the statutory law dealing with sovereign immunity, the General Assembly provided that the Commonwealth's liability for sidewalk injuries is explicitly limited to primary liability, i.e., the liability of a private property owner, as evidenced by the exception contained in 42 Pa.C.S. § 8522(b), which provides as follows:
(b) Acts which may impose liability. The following acts by a Commonwealth party may result in the imposition of liability on the Commonwealth and the defense of sovereign immunity shall not be raised to claims for damages caused by:
....
(4) Commonwealth real estate, highways and sidewalks.A dangerous condition of Commonwealth agency real estate and sidewalks, including Commonwealth-owned real property, leaseholds in the possession of a Commonwealth agency and Commonwealth-owned real property leased by a Commonwealth agency to private persons, and highways under the jurisdiction of a Commonwealth agency, except conditions described in paragraph (5).
42 Pa.C.S. § 8522(b)(4) (emphasis added); see also Finn v. City of Philadelphia, 541 Pa. 596, 664 A.2d 1342 (1995); May 1978 Report of Joint State Government Commission Task Force on Sovereign Immunity (Report) at 13.
In its motion for summary judgment, the City argued, understandably, that because the Commonwealth owns that section of Spring Garden Street which is adjacent to the City's Fire Administration Building, as the result of its designation as a state highway the sidewalk was within the right-of-way of the Commonwealth's highway and not within the right-of-way of one of its streets, and, therefore, the sidewalk exception does not apply. Common Pleas, relying on this Court's decision in Bruce v. Gadson, 127 Pa.Cmwlth. 159, 561 A.2d 74 (1989), agreed and granted the City's motion. On appeal to this Court, the case was originally argued in February of 1998, but, due to the importance of the issue, it was listed for argument before the Court en banc in October of 1998.
On appeal,[3] Sherman argues that Common Pleas erred as a matter of law by concluding that the sidewalk on which she was injured was not within the right-ofway of a street owned by the City and, therefore, she argues, her cause of action is within the sidewalk exception of governmental immunity.
Because our resolution of this issue directs us to venture into heretofore unexamined areas of the principles of immunity, a brief historical review of the law of immunity as it existed prior to Ayala and Mayle v. Pennsylvania Department of Highways, 479 Pa. 384, 388 A.2d 709 (1978), superceded by statute, 42 Pa.C.S. § 8522(b)[4] would be in order. Prior to the enactment of the current immunity statute by the General Assembly, the Commonwealth enjoyed absolute immunity against negligence actions unless it consented to suit. See Monongahela Navigation Co. v. Coons, 6 Watts & S. 101 (Pa.1843). Conversely, the immunity of a local agency was never absolute; rather, liability existed (a) for failure to maintain roads, bridges, and sidewalks; (b) in actions based upon improper management and use of municipal property; and (c) in cases in which the local agency function was determined *99 to be "proprietary" as distinguished from "governmental." See, e.g., Marshall v. Port Authority of Allegheny County, 524 Pa. 1, 13, 568 A.2d 931, 937 (1990) (Papadakos, J., dissenting); Shields v. Pittsburgh School District, 408 Pa. 388, 184 A.2d 240 (1962). If the local agency was engaged in a proprietary function, then its liability was no different than that of a private citizen. See Honaman v. City of Philadelphia, 322 Pa. 535, 185 A. 750 (1936).
Although the distinction between the immunity of the Commonwealth and that of the local agencies was not characterized as "sovereign" versus "governmental immunity" until our Supreme Court's decision in Ayala, it is clear that the distinction nonetheless existed. This judiciallycreated immunity for the Commonwealth and local agencies perpetuated until our Supreme Court's decisions of Ayala and Mayle when the Supreme Court, concluding that immunity was a common law doctrine created by the Courts and, as such, could be dismantled by the Courts, abolished both sovereign and governmental immunity.
As a result of the Supreme Court's decisions in these two cases, both the Commonwealth and local agencies were subject to the common law doctrines of liability from which their immunity had previously shielded them. At common law there were two types of liability which could be imposed. The first, primary liability, is imposed on a party who is directly negligent. See Vattimo v. Lower Bucks Hospital, Inc., 502 Pa. 241, 465 A.2d 1231 (1983). Primary liability flows from the duty imposed on an individual or entity who owns or controls property. An example is the duty imposed upon a property owner to keep the sidewalks in front of his property in good repair.
Conversely, secondary liability "rests upon a fault that is imputed or constructive only, being based on some legal relation[ship] between the parties, or arising from some positive rule of common or statutory law or because of a failure to discover or correct a defect or remedy a dangerous condition caused by the act of the one primarily responsible." Builders Supply v. McCabe, 366 Pa. 322, 328, 77 A.2d 368, 371 (1951). Our Supreme Court in Builders Supply further distinguished between primary and secondary liability as follows:
The difference between primary and secondary liability is not based on a difference in degrees of negligence or on any doctrine of comparative negligence.... It depends on a difference in the character or kind of the wrongs which cause the injury and in the nature of the legal obligation owed by each of the wrongdoers to the injured person. Secondary liability exists, for example,... when a pedestrian is injured by falling in a hole in the pavement of a street; in such a case the abutting property owner is primarily liable because of his failure to maintain the pavement in proper condition, but the municipality is secondarily liable because of its having neglected to perform its duty of policing the streets and seeing to it that the property owners keep them in repair; if therefore the injured person chooses to bring suit against the municipality the latter can recover indemnity from the property owner for the damages which it has been called upon to pay.
Id. at 328, 77 A.2d at 370 (second emphasis added). At common law, a local municipality was required to ensure that the owner of the property abutting a sidewalk within the right-of-way of a street that the municipality owned kept the property in good repair or that the municipality made the required repairs itself. Fisher v. City of Philadelphia, 112 Pa.Super. 226, 170 A. 875 (1934). That was never the law where the Commonwealth owned the highway or the right-of-way and the property owner negligently maintained the sidewalk. The Commonwealth was never liable in such a situation, even under a theory of secondary liability, because there was never an *100 obligation on the Commonwealth to see to it that the abutting property owners along its miles of highway kept the property, including the sidewalks, in good repair.
In response to the Supreme Court's decisions in Ayala and Mayle, in 1978, the General Assembly adopted what we will designate the Sovereign and Governmental Immunity Acts, thereby limiting both entities' immunity in specific situations. Particularly relevant to the present case, the General Assembly recognized the concept of primary liability as it existed at common law by abrogating the immunity of local agencies and the Commonwealth for injuries occurring on property which either entity owned or controlled. See 42 Pa.C.S. § 8522(b)(4); 42 Pa.C.S. § 8542(b)(3).
In addition, however, the General Assembly recognized the fact that, at common law, the liability of a local agency was not only singular, as was that of the Commonwealth, but rather local agencies had additional liability that the Commonwealth did not have, i.e., the common law duty to maintain sidewalks. This recognition is evidenced in 42 Pa.C.S. § 8542(b)(7), the "sidewalk exception," which imposes secondary liability on a local agency for an injury which occurred on a sidewalk within the right-of-way of a street owned by the agency. It is significant that the exceptions to sovereign immunity contain no such exception. This absence recognizes the fact that, at common law, unlike a local agency, the Commonwealth had no duty to keep sidewalks which it did not own in good repair. See Report at 13.
However, both the Commonwealth and local agencies were always primarily liable for the negligence occasioned by their failure to maintain all of their real estate, including the sidewalks on their property abutting their own buildings. See Osborne v. City of Pittsburgh, 192 Pa.Super. 387, 161 A.2d 636 (1960), In Osborne, the City of Pittsburgh, the School District of Pittsburgh and the County of Allegheny acquired title to a property which abutted a city-owned street by virtue of a treasurer's sale. Subsequent to acquiring the property, Osborne fell and injured herself on a defective section of the sidewalk in front of the property and successfully sued the City, the school district and the county by virtue of their ownership of the property. On appeal to the Superior Court, the issue was whether the school district and the county, although they did not join in the purchase of the property, were responsible for contribution because the property was purchased to satisfy taxes owed to those two entities. The Superior Court concluded as follows:
The lower court concluded that there was liability. It stated that Allegheny County and the School District of Pittsburgh are bound to maintain safely the sidewalk on the unimproved properties purchased by the City of Pittsburgh at tax sales. With this contention we are bound to agree.
...
The School District has a strong argument when it asserts that the City is primarily liable for the maintenance of its streets. The only weakness with that argument lies in the fact that the liability of the City is secondary and the primary liability rests upon the property which in this case is held by the three taxing authorities....
The City is correct in its contention that the County and School District should contribute in accordance with their proportionate interest at the time of the acquisition of the property by the City at the treasurer's sale.
Another convincing argument points out that ... the excess of the proceeds over taxes realized should be distributed to the other taxing bodies in proportion to their tax levies. The implication is that all three bodies have an interest in the properties beyond the collection of delinquent taxes. We agree with the appellees that the title is vested in all three bodies and any tort liability should be jointly shared.
*101 Id. at 637-38 (emphasis added). With these principles of liability in mind, we now turn to the issue of governmental immunity and the relevant exceptions we must consider in this case.
With regard to sovereign immunity, Section 8522(a) of the Judicial Code, 42 Pa. C.S. § 8522(a) provides in relevant part as follows:
§ 8522. Exceptions to sovereign immunity
(a) Liability imposed.The General Assembly, pursuant to section 11 of Article I of the Constitution of Pennsylvania, does hereby waive, in the instances set forth in subsection (b) only and only to the extent set forth in this subchapter and within the limits set forth in section 8528 (relating to limitations on damages), sovereign immunity as a bar to an action against Commonwealth parties, for damages arising out of a negligent act where the damages would be recoverable under the common law or a statute creating a cause of action if the injury were caused by a person not having available the defense of sovereign immunity.
With regard to governmental immunity, as noted above, the General Assembly has abrogated the immunity of local agencies as to real estate in two respects relevant to the present case. A local agency is not immune from suit for injuries caused by real property that is in the care, custody or control of the local agency under the real property exception. In addition, a local agency is also responsible for injuries occurring on sidewalks owned by others, but within the rights-of-way of its own streets under the sidewalk exception.
As the discussion above illustrates, the liability imposed upon a local agency under the real property exception is primary, because liability flows directly from the duty of the local agency as the owner, possessor or custodian of the property and not from any imputed duty. It would be liable in this respect as would the Commonwealth or any private landowner. We must conclude, therefore, that, under the real estate exception, the local agency was intended to have the same duties as any private landowner to keep the property, including the adjacent sidewalk, which is part of its real estate, in good repair and that the local agency is primarily responsible for injuries which arise from its failure to do so. Flynn v. Chester, 429 Pa. 170, 239 A.2d 322 (1968).
Moreover, a local agency has the additional burden, as it did at common law, to keep sidewalks owned by others in good repair if the sidewalk is located within the right-of-way of streets it owns. In this situation, unlike the exception in Section 8542(b)(3), a local agency is only secondarily liable under Section 8542(b)(7), because the assumption is that it does not own the property, and, therefore, its liability under the sidewalk exception flows from its common law duty to keep the sidewalks within its jurisdiction in good repair. See Restifo v. City of Philadelphia, 151 Pa. Cmwlth. 27, 617 A.2d 818 (1992). Again, it must be stressed that a local agency's secondary liability does not flow from a breach of its duty as the owner of the real property adjacent to the sidewalk, but from its imputed duty to ensure that property owners keep their property, including the sidewalks adjacent thereto, in good repair. Flynn. With these principles in mind, we will now review several decisions of this Court dealing with the exception at issue, the sidewalk exception.
In Bruce v. Gadson, 127 Pa.Cmwlth. 159, 561 A.2d 74 (1989), the plaintiff was injured when she fell on a defective sidewalk which was adjacent to privatelyowned property in the City of Philadelphia. The sidewalk on which she fell abutted Lancaster Avenue, which, pursuant to the State Highway Law, was designated a Commonwealth highway. Bruce filed suit against the City of Philadelphia and the private owner of the property where she fell, but Common Pleas dismissed Bruce's action as to the City. On appeal to this *102 Court, we affirmed the judgment of Common Pleas, concluding that "the City did not own either the street or the sidewalk because the sidewalk was adjacent to a state road and the sidewalk exception therefore did not apply." Id. at 74-75. We went on to note that "[w]ithout ownership, the agency is neither primarily nor secondarily liable." Id. at 75. This holding was used as the basis for the subsequent conclusion in Lyons v. City of Philadelphia, 159 Pa.Cmwlth. 107, 632 A.2d 1006 (1993), a case where we affirmed Common Pleas' dismissal of a suit filed by a pedestrian against the City for injuries she sustained when she fell into a hole on the sidewalk along Bustleton Avenue, a highway designated as a Commonwealth highway. Like Gadson, Lyons involved the private ownership of property abutting a Commonwealth-owned highway.
Further, in Gray v. Logue, 654 A.2d 109 (Pa.Cmwlth.), petition for allowance of appeal denied, 541 Pa. 628, 661 A.2d 875 (1995), we affirmed the judgment of Common Pleas granting Bedford Borough's motion for summary judgment, dismissing a suit filed by a plaintiff who had tripped and fell over a protruding piece of pipe in front of private property. In doing so, we again reaffirmed the principle that the sidewalk exception is designed to impose only secondary liability, and, under that exception, liability can only be imposed when the sidewalk at issue is within a right-of-way owned by the local agency, thus imputing the agency's duty to ensure that the sidewalks under its jurisdiction are kept in repair.
Most recently, however, for the first time, in White v. City of Philadelphia, 712 A.2d 345 (Pa.Cmwlth.1998), we examined a case in which the Plaintiff, White, was injured while walking on a section of sidewalk in front of the City of Philadelphia's Visitors Center, which, of course, is public, rather than private property. The City filed a motion for summary judgment, asserting that the sidewalk on which White fell abuts a Commonwealth highway and, therefore, the City did not "own" the rightof-way encompassing the sidewalk and was immune from suit. The Court of Common Pleas granted the motion.
On appeal to this Court, we reversed the Common Pleas Court order, concluding that the record was insufficient to establish that the City did not own the right-ofway which encompassed the sidewalk. In reaching this conclusion, the Court reasoned that Gray and its predecessors had created an anomaly in the "otherwise complete coverage" of the exceptions to immunity. White, 712 A.2d at 347. To reconcile this anomaly, the Court looked to the relevant provisions of the State Highway Law and concluded that the provisions of that law did not impose a duty on the Commonwealth for upkeep of the sidewalks in cities of the first class which abutted roads that it took over via statute. The Court went on to establish a rule of law, which, by our own admission, would have limited applicability, stating that:
[a]ccordingly, the Court interprets `sidewalks within the rights-of-way of streets owned by the local agency' in Section 8542(b)(7) to include sidewalks in a city of the first class that are owned by the city and that abut a State highway.
White, 712 A.2d at 348 (emphasis added). Although the Court concluded that the City was not immune from suit, that determination was based essentially upon a conclusion that the City owned the sidewalk.[5] Nonetheless, the opinion concluded that the City was not immune from suit based upon the sidewalk exception, which, as noted above, imposes only secondary liability *103 upon a local agency and not the real estate exception.
To illustrate the problem which confronts the Court and our statutory interpretation of Section 8542(b), consider the following scenarios, assuming in each case that negligent conduct caused the plaintiff's injury. First, a shopper is injured when she trips and falls on a sidewalk in front of a store in the Borough of Media. In that case, the result is clear and logical: the store is primarily liable because it owns the property where the shopper fell, and the Borough is secondarily liable, a result clear from the exceptions to governmental immunity. The result is changed, however, if the road in front of the store is a state highway. In that case, the store is still primarily liable, but there is no secondary liability because the Borough does not own the right-of-way within which the sidewalk sits. In addition, the Commonwealth, by virtue of the fact that the real estate exception to sovereign immunity only imposes primary liability, can never be secondarily liable for any injuries because it does not have the same duties to ensure that sidewalks are safe as do the local agencies; rather, its duty and corresponding liability is limited to that of the private landowner. Accordingly, in that situation, only the store is liable for the injuries; but the injured party at least has a right to recover from the store.
Next, consider a situation in which an individual is strolling on a sidewalk in Media near the Borough Hall building and trips and falls on a defective surface. Assume further for the purposes of the hypothetical that the street in front of the building is a state-owned highway. In this situation, whether there is any liability under the current interpretation of the sidewalk and real property exceptions to governmental immunity is contingent upon where the person fell. If she fell on the sidewalk in front of the Borough Hall, under our current interpretations of immunity law, there would be no liability at all; there would be neither primary nor secondary liability because she fell on a sidewalk that was not within a right-of-way of a street owned by the Borough of Media. Additionally, there would be no primary liability because sidewalks owned by the Borough are excluded from the definition of "real estate" by Section 8542(b)(3), despite the fact that the Borough, as the owner of the property, would ordinarily be primarily responsible for the maintenance of the sidewalk.
If, however, the person fell on the walkway of the Borough building, a foot closer to the building than the sidewalk, the Borough would be primarily liable under the real estate exception. Clearly, in both scenarios the person was injured on Borough property, i.e., the Borough owns both the sidewalk in front of and the walkway leading to its building and, as a result of its ownership of the property, has the primary duty to ensure that both the sidewalk and walkway are kept in good repair; but in the first instance, because of our present construction of the real estate exception, there would be no liability at all, while in the second, the Borough would be primarily liable, the same as any private property owner would be. Based upon our reading of the exceptions to governmental immunity, as well as the common-law theories of liability which they represent, we cannot conclude that the General Assembly intended to decree such a disparate result: We cannot believe that the General Assembly intended to impose liability on a local agency for an injury which occurred on a walkway to one of the agency's buildings, but not when that plaintiff is injured on a sidewalk adjacent to that building, yet likewise owned by it.
Consider further the hypothetical where Media's Borough Hall abuts one of its own streets and the plaintiff injures herself when she falls because of a defective sidewalk; the result would be even more disparate, perhaps even bizarre, because that local agency would not be primarily liable under the real estate exception, but would be secondarily liable because it owned the *104 street. Theoretically, then, in such a situation, a local municipality would have recourse against itself under principles already articulated infra and explained so thoroughly by the Supreme Court in Builders Supply. Furthermore, what if the local agency would be a school district or a local authority, neither of which, of course, owns any street or public roadway? In that instance, assuming negligence, of course, the local agency or school district would always be primarily liable for injuries occurring on other parts of its real estate, but would never be liable for injuries occurring on its sidewalks.
What arises from the above discussion is that we are confronted with a disparity in the liability for injuries which occur on sidewalks adjacent to some public property, but not all public property; i.e., a disparity between Commonwealth sidewalk liability and local agency sidewalk liability, complicated by requiring a decision as to which entity, the local agency or the Commonwealth owns not only the street (cartway) but the right-of-way. This anomaly has arisen, in part, as a result of the language employed in our construction of the exceptions to governmental immunity. The question remains, then, how to reconcile this lacuna in the coverage of the exceptions. In White, we attempted to "fill-in" the gap by imposing secondary liability on the City because the Commonwealth, although it took over the street at issue, was responsible only for the maintenance of the roadway surface, and the City remained responsible for the upkeep of the sidewalk on which White was injured. Despite the fact that the sidewalk was not within the right-of-way of a street owned by the City, the White decision concluded that the City must be responsible for the sidewalk, not because the sidewalk was part of the City's realty, but because the Commonwealth did not take over all of the right-of-way encompassing the sidewalk, just the road surface. Although we agree with the ultimate outcome in White, reversing the grant of summary judgment, and agree with its acknowledgment that a "gap in coverage" exists in the interpretation of governmental immunity, the Court now eschews the rationale used in White to reach that result.
We note that the holding in White would effectively create a rule of law applicable only to cities of the first and second class, whereby only those cities would be liable for injuries occurring on sidewalks adjacent to their own property which abuts state-owned streets. In White, Judge Smith correctly pointed out that when the Commonwealth takes over a road, pursuant to Section 542 of the State Highway Act, the Commonwealth merely takes over the road surface itself, not any corresponding duty or liability for maintenance of the sidewalks. However, as Judge Smith further noted, that section merely applies to cities of the first and second class and does not apply to other municipal governments. The provisions applicable to other local agencies, such as Townships and Boroughs, identify the Commonwealth as the party responsible for the maintenance of the sidewalks abutting state-owned highways. See White, 712 A.2d at 349 n. 2.
Indeed our research has revealed that, when the Commonwealth takes over local government roads in other areas, it takes over the entire right-of-way, not merely the road surface. See Act of December 18, 1994, P.L. 172. Accordingly, the holding in White would lead to confusion and disparity in situations where the local government has made different arrangements with the Commonwealth. Indeed, in Pennsylvania, there are over 50 third-class cities and hundreds of boroughs, townships, home-rule charter communities and other local agencies to which White would not apply. Although we agree that this Court's judicial responsibility of statutory interpretation needs to "fill in the gaps," White created an untenable distinction resulting in a limited, localized construction of a statute that clearly is intended to have statewide application.
*105 Accordingly, rather than laboring through an analysis as to the true definition of what constitutes a "street," see Gray, 654 A.2d at 114 (Pellegrini, J., dissenting), we believe that the more appropriate solution to the problem is to make a key acknowledgment at the starting point of the analysisthat is, that the General Assembly, when it was drafting the exceptions to governmental immunity, did not envision nor consider the situation where the local agency owns the property adjacent to the sidewalk on which the injury occurs and the Commonwealth owns the street abutting that sidewalk. Accordingly, we now hold that Section 8542(b)(3), the real property exception, must be read as intending to exclude from the definition of real property, sidewalks, except where those sidewalks are part of the real property owned by the local agency.
Although we acknowledge that this analysis clearly sets up an "exception" to an exception in governmental immunity, thereby obliterating a distinction between sidewalks owned by a local government and those owned by private citizens, such an analysis is clearly reasonable and reaches a sensible result. If the local government owns the property adjacent to the sidewalk, its liability is primary, like that of the Commonwealth or any other private landowner. If however, the local government does not own the property, its liability is merely secondary as the result of its common-law obligation, and Section 8542(b)(7), to keep the sidewalks which abut its streets in good repair. In such an instance, liability would be imposed under the sidewalk exception as it has been in Gray and the cases preceding it.
If we acknowledge that the General Assembly did not envision the present factual situation, primary liability would be properly imposed on the City in this case, not under the sidewalk exception, but under the real estate exception by virtue of the City's ownership of the Fire Administration Building and the sidewalk adjacent thereto. In essence, we read the General Assembly's exclusion of sidewalks from the definition of real property in the real estate exception to exclude only those sidewalks which the local agency is not primarily responsible for maintaining, i.e., sidewalks which are adjacent to property owned by others. Therefore, the real property exception to governmental immunity can, and indeed should, be read and applied the same as the real estate exception to sovereign immunity, i.e., primary liability imposed when the Commonwealth or the local agency owns the real estate which directly causes a plaintiff's injury. Crowell v. City of Philadelphia, 531 Pa. 400, 613 A.2d 1178 (1992); Mascaro v. Youth Study Center, 514 Pa. 351, 523 A.2d 1118 (1987). Moreover, it seems illogical to us that the General Assembly would provide an exception from the Commonwealth's sovereign immunity for a failure to maintain its sidewalks, but not provide an identical exception to a local agency's immunity for an identical failure.
Turning now to the present case, it is undisputed that the City owns the Fire Administration Building, as well as the sidewalk, which is part of its real estate. Applying the rationale which we now have established, we must conclude that Sherman has pled a cause of action which fits into one of the exceptions to governmental immunity: She has averred that she was injured on the City's property, i.e., the sidewalk in front of the administration building, the maintenance for which the City is primarily responsible. Accordingly, although Common Pleas correctly concluded that the City was immune from liability under the sidewalk exception, we conclude that, under the real property exception, it would not be immune from suit. On that basis, therefore, we must reverse the judgment of Common Pleas and remand the case for further proceedings and trial.
ORDER
NOW, January 31, 2000, the order of the Court of Common Pleas of Philadelphia *106 County in the above-captioned matter is reversed to the extent that Common Pleas dismissed the cause of action against the City, and this case is remanded for further proceedings and trial.
Jurisdiction relinquished.
SMITH, Judge, concurring and dissenting.
I concur in the result reached by the majority to reverse the grant of summary judgment in favor of the City of Philadelphia and to return this matter to the trial court for further proceedings and trial. I must dissent, however, from the majority's reasoning for reaching that result. As this Court explained in White v. City of Philadelphia, 712 A.2d 345 (Pa.Cmwlth.1998), the correct approach in cases where the Commonwealth's having designated a road as a State highway is said to conflict with the "sidewalk exception" to local agency immunity contained in Section 8542(b)(7) of the Judicial Code, 42 Pa.C.S. § 8542(b)(7), is to examine closely the statutory provisions relating to such designation in order to determine what the legislature intended by it. I disagree with both major premises upon which the majority relies: first, that the designation of the street involved here as a State highway means that the Commonwealth "owns" the street, and therefore the sidewalk exception to local agency immunity does not apply, and second, that the sidewalk exception imposes only secondary liability upon a municipality.
The act of designation as a State highway is provided for by statutes, and it has only the legal effect expressed in the statutes. Nevertheless, beginning with Pritchard v. City of Pottsville, 113 Pa. Cmwlth. 38, 536 A.2d 844 (1988), this Court simply assumed, with no discussion or analysis of the relevant statutes, that when a road was designated as a State highway, a sidewalk alongside it could not fall within the meaning of "sidewalks within rights-of-way of streets owned by the local agency" in Section 8542(b)(7). Cases cited by the majority routinely reaffirmed this interpretation, and in some, such as Gray v. Logue, 654 A.2d 109 (Pa.Cmwlth. 1995) , the question of whether designation as a State highway equated with "ownership" by the Commonwealth was not even contested. Various provisions of the State Highway Law, Act of June 1, 1945, P.L. 1242, as amended, 36 P.S. §§ 670-101 to -1102, clearly show however that the legislature never intended the act of designation as a State highway to constitute the assumption of "ownership" of the designated street to the exclusion of the ownership of the City.
Section 102(1) of the State Highway Law, 36 P.S. § 670-102(1), provides:
State highway shall mean and include all roads and highways taken over by the Commonwealth as State highways under the provisions of any act of Assembly. Unless clearly so intended, the term shall not include any street in any city, borough or incorporated town, even though the same may have been taken over as a State highway.
Section 541, 36 P.S. § 670-541, relating to restrictions and limitations upon powers and obligations of the State, provides that the designation or taking over of any street in any city of the first or second class is not intended and shall not be construed: "(2) To place upon the department any authority to regulate traffic, parking or the general use by the traveling public of the streets, or sections thereof, taken over by the Commonwealth for maintenance or improvement under the provisions of any act of Assembly...." (Emphasis added.) The emphasized phrase encapsulates the limited purpose of designation.
Section 542, 36 P.S. § 670-542, as initially enacted[1] provided that after the streets *107 designated as State highways were taken over by the Commonwealth, they should be maintained, constructed, reconstructed, resurfaced and repaired at the expense of the Commonwealth: "Provided, however, That nothing in this section shall be construed to place upon the Commonwealth any obligation to repair and maintain the curbing and footways of any such street, or to remove snow or keep streets clean." This language remains intact in the current version of Section 542, after amendments in 1965 and 1970.
Where the legislature wished to provide for the Commonwealth's taking of an interest in land in the State Highway Law, it did so expressly and precisely. Section 413, 36 P.S. § 670-413, relating to acquisition of land for unobstructed view, provides:
The department may acquire, by purchase or by the right of eminent domain, a free and unobstructed view down and across such lands located at or near the intersection of any two highways, or a highway and a railroad or railway, or at any curve in any highway, as may be necessary to assure a free and unobstructed view in all directions at such crossings....
Upon any such condemnation, the secretary shall file with the recorder of deeds of the proper county a plan showing the property condemned....
The proceedings for the condemnation of such view over and across such lands, and for the assessment of damages for property taken, injured or destroyed, shall be taken in the same manner as provided for the condemnation of land by the department for road purposes.
[Following condemnation of a view,] the owner of such lands may make every such use thereof as will not interfere with a free and unobstructed view....
Thus acquisition of even the partial interest of a view over land is required to be accomplished through purchase or condemnation and to be recorded with the recorder of deeds. In contrast, "designation" of a road as a State road is accomplished by act of the legislature and is not treated in the State Highway Law as the acquisition of an interest in land.[2]
The State Highway Law did provide for responsibility of the Commonwealth to maintain sidewalks in one specifically defined and limited circumstance in Section 416, 36 P.S. § 670-416:
Whenever it shall appear that any part or portion of a State highway in any township is dangerous to the traveling public, and such danger could be materially reduced or lessened by the construction of a sidewalk, the department may aid the local authorities to lay out and construct a sidewalk along such dangerous portion of State highway.... All sidewalks constructed under the provisions of this section shall be thereafter considered as a part of the State highway system, and shall be reconstructed, maintained and repaired, by the department, and the cost or proportion thereof agreed to be paid by the department shall be paid in the same manner as provided in this act in the case of State highways. (Emphasis added.)
In City of Philadelphia v. Friends Asylum for the Insane, 46 Pa. D. & C. 251 (1942), the City had filed a lien against private property for the use of a contractor who had constructed a sidewalk in front of the property along Roosevelt Boulevard. The trial court stated that the defendant private property owner could take no comfort from the Act of May 7, 1937, P.L. 589, *108 as amended by the Act of July 10, 1941, P.L. 345, under which certain streets in the City were taken over by the Commonwealth. Although under those Acts the streets were to be maintained by the Department of Highways at the expense of the Commonwealth, "there is a proviso that there not be placed upon the Commonwealth any obligation to repair and maintain the curbing and footways. Therefore, we conclude that the duty of maintaining and repairing curbs and footways remains with the owners of the abutting property." Friends Asylum at 254. The trial court's reference was to the provisions of former Section 5 of the Act of May 7, 1937, P.L. 589, which was the predecessor in part to Section 542 of the State Highway Law. See n1 above.
Thus from the time of the earliest enactment and interpretation of relevant provisions of the State Highway Law and their predecessors, the legislative intent was clear that the act of designation and taking over of a road as a State highway imposed certain enumerated responsibilities upon the Commonwealth in regard to maintenance and improvement. Nothing in the State Highway Law indicated, however, that the act of designation constituted acquiring any form of interest in the "ownership" of the road that was designated. Section 413 affirmatively indicates to the contrary under the maxim expressio unius est exclusio alterius.
Both the general provisions of the State Highway Law and those specifically applicable to cities of the first class show that there never was any conflict between the State Highway Law and the grant of an exception to governmental immunity in Section 8542(b)(7) for "a dangerous condition of sidewalks within the rights-of-way of streets owned by the local agency." A street that was owned by the City of Philadelphia continued to be owned by the City after it was designated as a State highway.
I disagree also with the majority's ultimate conclusions regarding Section 8542(b)(3) of the Judicial Code, 42 Pa.C.S. § 8542(b)(3), and Section 8542(b)(7), the real property and sidewalk exceptions to local agency immunity respectively. Section 8542(b)(3), in defining the real property exception, could not be clearer in excluding sidewalks from that definition. There can be no dispute that the reason for this exclusion is that liability relating to sidewalks is dealt with separately in Section 8542(b)(7). I agree with the majority that the Commonwealth's liability relating to sidewalks is handled in Section 8522(b)(4) of the Judicial Code, 42 Pa.C.S. § 8522(b)(4), where it is included with Commonwealth real estate and highways. I agree further that the sovereign immunity provision contemplates only primary liability. The different treatment in the two provisions, however, simply reflects the fact that the Commonwealth does not own and operate municipalities. The Commonwealth owns parcels of land, many of which have sidewalks, and the legislature has determined that it should be liable for injuries caused by a dangerous condition of those sidewalks in the same manner as for the rest of its real property.[3]
In municipalities such as the City, on the other hand, sidewalks run by both land owned by the municipality and land owned by others. As the majority explains, such other owners typically are charged by ordinance with the primary responsibility to keep their sidewalks in good repair, while the municipality has the distinct duty to ensure that they do so. However, the fact that the Commonwealth's liability is solely primary and that a municipality's may be secondary simply does not lead to a conclusion that a municipality's liability may never be primary. Contrary to the majority's *109 position, I believe that there is no question that a municipality is primarily liable for injuries caused by dangerous conditions of sidewalks abutting its own property. The last sentence of Section 8542(b)(7) recognizes the different responsibilities of a municipality and renders it secondarily liable only where some other party is primarily liable.
The Supreme Court in Finn v. City of Philadelphia, 541 Pa. 596, 664 A.2d 1342 (1995), to which the majority refers, held that Section 8542(b)(7) applied to determine the liability of the City where a plaintiff alleged that she was injured when she fell on an accumulation of grease on a sidewalk in front of a City-owned building. Although the Supreme Court ultimately concluded that the claim was not within the meaning of the phrase "dangerous condition of sidewalks" (emphasis added) as strictly construed, Finn holds, as do many other cases, that the City may be held primarily liable where an injury is shown to be caused by a dangerous condition of a sidewalk along property owned by the City.
Finally, I note that the majority's discussion of the holding in White v. City of Philadelphia is not correct. The holding there was not that the Commonwealth had somehow acquired ownership of the cartway of the street next to the sidewalk where the injury occurred but not of the sidewalk itself. Rather, based upon an analysis of the relevant statutes as discussed above, the holding was that the designation of the street involved there as a State highway did not mean that the Commonwealth had acquired "ownership" at all, and therefore it did not remove the sidewalk from the ambit of "sidewalks within the rights-of-way of streets owned by the local agency" in Section 8542(b)(7). In my view, the resolution of the present case is straightforward under the principles set forth in White. It may be accomplished by application of the clearly relevant provisions of the State Highway Law and the sidewalk exception to local agency immunity and without the majority's conceded violence to the plain meaning of Section 8542(b)(3) and its unconceded violence to Section 8542(b)(7).
FLAHERTY, Judge, dissenting.
I regretfully dissent. While the majority's method of resolving this case has the allure of achieving perhaps the most reasonable result, because I am a judge and not a legislator, I cannot join the majority's opinion. As a judge I am bound by the clear unambiguous language enacted by the legislature and compelled to dissent. What is at stake here is a more crucial principlethe proper role of courts in our democracy in giving effect to the language duly enacted by the legislature.
In the Statutory Construction Act of 1972, the legislature has statutorily mandated to the courts of this Commonwealth what principles of construction the courts are to utilize in interpreting the statutes on which it works so hard to cover every conceivable situation.[1] Thus, we have been instructed that the
(a) The object of all interpretation and construction of statutes is to ascertain and effectuate the intention of the General Assembly. Every statute shall be construed, if possible to give effect to all of its provisions.
(b) When the words of a statute are clear and free from all ambiguity, the letter of it is not to be disregarded under the pretext of pursuing its spirit.
(c) When the words of the statute are not explicit, the intention of the General Assembly may be ascertained by considering among other matters:
....
1 Pa.C.S. § 1921. The legislature further instructs us that "[w]ords and phrases *110 shall be construed according to their common and approved usage; but technical words and phrases and such others as have acquired a peculiar and appropriate meaning ... shall be construed according to such peculiar and appropriate meaning." 1 Pa.C.S. § 1903(a). Although ostensibly engaged in construing the Governmental Immunity Act, inexplicably, nowhere in its entire opinion does the majority even once reference these fundamental principles of construction.
Application of these principles requires that we find the City not liable as the sidewalk at issue herein was not within the right of way of a street owned by the City. Indeed the majority candidly acknowledges as much: "[f]rom even a cursory review of these statutory exceptions to governmental immunity, it is readily apparent, first, that any strict reading of Section 8542(b)(7) would preclude Sherman from recovering for her injuries because the sidewalk on which she fell was not within the right-of-way of a street owned by the City...." Majority op. at 97. Perhaps this is why in the majority's opinion, not one reference is made to these dispositive principles as they apply to this case. Because the text of the statute clearly precludes recovery here and the majority concedes as much, I dissent to the majority's reversal of the trial court's order.
Essentially, the majority reasons that because the sidewalk at issue herein abuts property owned by the City, it constitutes "real property" in the possession of the local agency and thus falls within the real estate exception to the Governmental Immunity Act. The majority concludes so notwithstanding that the legislature specifically defined "real property" as used in this exception to exclude "sidewalks." Thus, we have the majority concluding that the real property exception applies to the sidewalk herein which is directly contradictory to the legislature's clear and unambiguous definition of real property which excludes sidewalks.[2]
Rather than give effect to the legislature's clear and unambiguous language as courts are bound to do, the majority seeks to remedy what it perceives to be a lacuna or gap in the legislative scheme of immunity due to the legislature's alleged failure to contemplate the situation where the City owns the real property abutting a sidewalk but not the cartway which also abuts the sidewalk. The text of the statute, however, does provide for this situation. In no uncertain terms the text of the statute prohibits liability and the majority so concedes. Majority op. at 97.
The majority severs its analysis from the text of the statute in favor of an analysis which "reaches a sensible result." Majority op. at 105. Thus, severed from the anchor of the text, the majority's analysis is cast adrift into the murky and unpredictable seas of its own surmise regarding what must have been the legislature's intent, forgetting that the "intent of the legislature should be gathered from the language of the statute alone where such language is clear and unambiguous" as it concededly is here. F.W. Woolworth Co. v. City of Pittsburgh, 2 Pa.Cmwlth. 338, 284 A.2d 143, 146 (1971)(emphasis added).
Even if one agrees with the majority's surmise that the General Assembly, "when it was drafting the exceptions to governmental immunity, did not envision nor consider the situation where the local agency owns the property adjacent to the sidewalk on which the injury occurs and the Commonwealth owns the street abutting the sidewalk", Majority op. at 105, it does not follow that the solution is for this court by judicial fiat to engraft language onto the legislature's definition of real property where the engrafted language runs directly contrary to the express words. Latella v. Com., Unemployment Compensation *111 Board of Review, 74 Pa.Cmwlth. 14, 459 A.2d 464 (1983)(a court cannot supply an apparent omission in a statute even though it appears that the omission resulted from the legislature's failure to foresee or contemplate a case in question). Rather, the solution is to give effect to the clear and unambiguous language, point out the anomalies, and urge the legislature to resolve the problem by enacting proper amendments to the statute.
Because the majority ignores the applicable principles of construction, and fails to give effect to what is concededly the plain meaning of the text of the statute and instead engages in legislation by judicial fiat, I must dissent.
LEADBETTER, Judge, dissenting.
I must respectfully dissent. Although I do not disagree with the majority's thorough and well-stated analysis, I simply do not believe that it is our function to rewrite a statute which is clear on its face because we believe the legislature has made a mistake. It is the General Assembly's prerogative to write our statutory laws, and if one is inartfully drafted, it is the General Assembly's prerogative to amend it or leave it alone.
I would affirm the Court of Common Pleas in this case, overrule White v. City of Philadelphia, 712 A.2d 345 (Pa.Cmwlth. 1998) and leave it to the legislature to "fill in" "gaps" in the laws setting forth the exceptions to local government immunity.
Judge KELLEY joins in this dissenting opinion.
NOTES
[1] Act of May 7, 1937, P.L. 589, as amended, 36 P.S. § 961-2.
[2] Act of November 26, 1978, P.L. 1399.
[3] Our standard of review of an order granting a motion for summary judgment is limited to determining whether the trial court abused its discretion or committed an error of law. Peterson v. Philadelphia Housing Authority, 154 Pa.Cmwlth. 309, 623 A.2d 904 (1993). Summary judgment is appropriate when, after reviewing the record in a light most favorable to the non-moving party, there is no genuine issue of material fact and the moving party is entitled to judgment as a matter of law. Peterson.
[4] The Commonwealth's judicially created absolute immunity from suit was struck down by the Supreme Court in 1978 by Mayle.
[5] This conclusion, and indeed the analysis used to reach the conclusion, focused solely on whether the City or the Commonwealth owned the sidewalk and was therefore responsible for the maintenance of the sidewalk. The plain language of the sidewalk exception, however, requires a determination of who owns the right-of-way containing the sidewalk. It would appear, then, that the White opinion incorrectly disregarded the phrase "within a right-of-way" owned by the local agency.
[1] Replacing former Section 5 of the Act of May 7, 1937, P.L. 589, as amended, formerly 36 P.S. § 961-5, repealed by Section 1101 of the State Highway Law, 36 P.S. § 670-1101.
[2] Although the Secretary was given the power, with the approval of the Governor, to establish the ultimate width and lines of any State highway for future construction by means of a plan recorded with the recorder of deeds, this power could be exercised "before or after the construction, reconstruction or improvement" of the State highway. Section 206 of the State Highway Law, 36 P.S. § 670-206. Such a plan is not a recording of the act of designation as a State highway, which necessarily precedes the development of any such plan.
[3] See Joint State Government Commission, General Assembly of the Commonwealth of Pennsylvania, Sovereign Immunity 13 (1978), concerning the exception to immunity for Commonwealth real estate, highways and sidewalks: "As to real property generally, this area of waiver is intended to impose liability as it would exist if the owner or lessee were a private person."
[1] As the Governmental Immunity Act was a statute finally enacted after September 1, 1937 and does not provide otherwise, the Statutory Construction Act applies to it. 1 Pa.C.S. § 1502.
[2] I find it ironic that the majority takes to task the panel in White v. City of Philadelphia, 712 A.2d 345 (Pa.Cmwlth.1998) for ignoring the "plain language of the sidewalk exception" while engaging in the same behavior. See Majority op. at p. 102 n. 5.
|
using System.Collections.Generic;
using SpanJson.Helpers;
using SpanJson.Resolvers;
namespace SpanJson.Formatters
{
public sealed class TwoDimensionalArrayFormatter<T, TSymbol, TResolver> : BaseFormatter, IJsonFormatter<T[,], TSymbol>
where TResolver : IJsonFormatterResolver<TSymbol, TResolver>, new() where TSymbol : struct
{
public static readonly TwoDimensionalArrayFormatter<T, TSymbol, TResolver> Default = new TwoDimensionalArrayFormatter<T, TSymbol, TResolver>();
private static readonly IJsonFormatter<T, TSymbol> ElementFormatter =
StandardResolvers.GetResolver<TSymbol, TResolver>().GetFormatter<T>();
private static readonly bool IsRecursionCandidate = RecursionCandidate<T>.IsRecursionCandidate;
public T[,] Deserialize(ref JsonReader<TSymbol> reader)
{
var values = new List<T[]>(4);
reader.ReadBeginArrayOrThrow();
var count = 0;
while (!reader.TryReadIsEndArrayOrValueSeparator(ref count)) // count is already preincremented, as it counts the separators
{
values.Add(ArrayFormatter<T, TSymbol, TResolver>.Default.Deserialize(ref reader));
}
if (values.Count == 0)
{
return new T[0, 0];
}
var length = values[0].Length;
if (!values.TrueForAll(a => a.Length == length))
{
throw new JsonParserException(JsonParserException.ParserError.InvalidArrayFormat, reader.Position);
}
var result = new T[values.Count, length];
for (var i = 0; i < values.Count; i++)
{
for (var j = 0; j < length; j++)
{
result[i, j] = values[i][j];
}
}
return result;
}
public void Serialize(ref JsonWriter<TSymbol> writer, T[,] value)
{
if (value == null)
{
writer.WriteNull();
return;
}
if (IsRecursionCandidate)
{
writer.IncrementDepth();
}
var firstLength = value.GetLength(0);
var secondLength = value.GetLength(1);
writer.WriteBeginArray();
if (firstLength > 0)
{
writer.WriteBeginArray();
if (secondLength > 0)
{
SerializeRuntimeDecisionInternal<T, TSymbol, TResolver>(ref writer, value[0, 0], ElementFormatter);
for (var k = 1; k < secondLength; k++)
{
writer.WriteValueSeparator();
SerializeRuntimeDecisionInternal<T, TSymbol, TResolver>(ref writer, value[0, k], ElementFormatter);
}
}
writer.WriteEndArray();
for (var i = 1; i < firstLength; i++)
{
writer.WriteValueSeparator();
writer.WriteBeginArray();
if (secondLength > 0)
{
SerializeRuntimeDecisionInternal<T, TSymbol, TResolver>(ref writer, value[i, 0], ElementFormatter);
for (var k = 1; k < secondLength; k++)
{
writer.WriteValueSeparator();
SerializeRuntimeDecisionInternal<T, TSymbol, TResolver>(ref writer, value[i, k], ElementFormatter);
}
}
writer.WriteEndArray();
}
}
if (IsRecursionCandidate)
{
writer.DecrementDepth();
}
writer.WriteEndArray();
}
}
} |
788 F.2d 1
McKayv.Gray
85-7441
United States Court of Appeals,Second Circuit.
12/6/85
1
E.D.N.Y.
AFFIRMED
|
Ruminal tryptophan-utilizing bacteria degrade ergovaline from tall fescue seed extract.
The objectives of this study were to evaluate degradation of ergovaline in a tall fescue [ (Schreb.) Darbysh.] seed extract by rumen microbiota ex vivo and to identify specific bacteria capable of ergovaline degradation in vitro. Rumen cell suspensions were prepared by harvesting rumen fluid from fistulated wether goats ( = 3), straining, and differential centrifugation. Suspensions were dispensed into anaerobic tubes with added Trypticase with or without extract (∼10 μg kg ergovaline). Suspensions were incubated for 48 h at 39°C. Samples were collected at 0, 24, and 48 h for ergovaline analysis and enumeration of hyper-ammonia producing (HAB) and tryptophan-utilizing bacteria. Ergovaline values were analyzed by repeated measures using the mixed procedure of SAS. Enumeration data were log transformed for statistical analysis. When suspensions were incubated with extract, 11 to 15% of ergovaline disappearance was observed over 48 h ( = 0.02). After 24 h, suspensions with added extract had 10-fold less HAB than controls ( = 0.04), but treatments were similar by 48 h ( = 1.00). However, after 24 h and 48 h, suspensions with extract had 10-fold more tryptophan-utilizing bacteria ( < 0.01) that were later isolated and identified by their 16S RNA gene sequence as . The isolates and other known rumen pure cultures ( JB1, B159, HD4, B, F, MD1, SR) were evaluated for the ability to degrade ergovaline in vitro. Pure culture cell suspensions were incubated as described above and samples were taken at 0 and 48 h for ergovaline analysis. Data were analyzed using the ANOVA procedure of SAS. All HAB, including the isolates, tested degraded ergovaline (54 to 75%; < 0.05). B14 was also able to degrade ergovaline but to a lesser capacity (12%; < 0.05), but all other bacteria tested did not degrade ergovaline. The results of this study indicate which rumen bacteria may play an important role in ergovaline degradation and that microbiological strategies for controlling their activity could have ramifications for fescue toxicosis and other forms of ergotism in ruminants. |
Cellular mechanisms underlying the interaction between cannabinoid and opioid system.
Recently, the presence of functional interaction between the opioid and cannabinoid system has been shown in various pharmacological responses. Although there is an increasing interest for the feasible therapeutic application of a co-administration of cannabinoids and opioids in some disorders (i.e. to manage pain, to modulate immune system and emotions) and the combined use of the two drugs by drug abusers is becoming largely diffuse, only few papers focused on cellular and molecular mechanisms underlying this interaction. This review updates the biochemical and molecular underpinnings of opioid and cannabinoid interaction, both within the central nervous system and periphery. The most convincing theory for the explanation of this reciprocal interaction involves (i) the release of opioid peptides by cannabinoids or endocannabinoids by opioids, (ii) the existence of a direct receptor-receptor interaction when the receptors are co-expressed in the same cells, and (iii) the interaction of their intracellular pathways. Finally, the cannabinoid/opioid interaction might be different in the brain rewarding networks and in those accounting for other pharmacological effects (antinociception, modulation of emotionality and cognitive behavior), as well as between the central nervous system and periphery. Further insights about the cannabinoid/opioid interaction could pave the way for new and promising therapeutic approaches. |
(1) Field of the Invention
The present invention relates generally to office workstations, and in particular to workstation walls that include raceways for standard UL rated, off-the-shelf, electrical and utility wiring devices, and to workstation walls having releasable, reversible edge caps that can be refurbished or refinished.
(2) Description of the Prior Art
Workstations, sometimes referred to as cubicles, are designed to provide a degree of privacy for the individual workers, while still permitting ease of rearrangement to accommodate changing office needs. Generally, workstations are comprised of a plurality of low walls that are joined at their abutting corners to enclose a workspace. For example, a workstation may have a back wall, a pair of parallel sidewalls, and a front wall that includes a doorway or access opening. Frequently, the back wall and/or one or both of the sidewalls also serve as a wall of an adjacent workstation.
A modern workstation is outfitted with various types of electrical and electronic equipment, such as computers, telephones, lighting, and the like, which require various kinds of electrical and data transmission wiring to connect the equipment to outlets. Thus, many prior art workstation walls make provision for conduits or raceways through which the wiring can be channeled from an external connection to the workstation equipment. Generally, these raceways are located in the wall interior, with a covering being placed over the raceways to hide the wiring and make the workstation more attractive.
For example, U.S. Pat. Nos. 5,209,035 and 5,746,034 to Hodges et al., describe workstation utility panels comprised of a panel frame having a foot portion to support the utility panel on the floor and spaced sides. A horizontal utility trough extends from one side of the panel to the other. A detachable cover panel covers at least one face of the panel frame. The utility trough is shaped with open ends, so that a continuous, uninterrupted horizontal channel exists when two panels are joined in an end to end relationship.
U.S. Pat. No. 5,341,615 to Luchetti et al. also describes a workstation panel structure formed of an open framework that includes vertical uprights with first and second pairs of horizontal stringers attached to the opposite faces of the vertical uprights, forming horizontal raceway cavities between the uprights which open to opposite sides of the frame. The panel also includes detachable cover panels to enclose the interior of the panel.
Prior art workstation panels are also known to include edge facing components or end caps for decorative purposes and to protect the panels. For example, U.S. Pat. No. 4,269,005 to Timmons shows partition panels with parallel grooves on their edges and end caps with U-shaped members that are attached by inserting the legs of the U into the channels. A corner cap also includes U-shaped channel members that are fitted into the grooves at the ends of the panel corner members.
U.S. Pat. No. 4,716,692 to Harper et al. describes attachment of panel walls and end caps using facing parallel grooves and connector plates that extend into the grooves. Clips are used to hold the end caps in place.
U.S. Pat. No. 4,949,519 to Jeffers describes attachment of end caps with metal clips that press against the inner sidewalls of an end cap.
Until the present invention, however, there has been no easily assembled workstation constructed primarily of wood components, and including wall sections providing separate isolated raceways for data and electrical components. Moreover, there has been no suggestion of a workstation walls with readily detachable edge and end caps that have the appearance of permanently attached wooden strips. |
Veterans find jobs, niche
Joseph Femenia is a former Navy SEAL who completed missions in Kosovo, Bosnia, Iraq and Afghanistan. Today he works on Wall Street for Goldman Sachs as a "senior high yield trader.”
(Photo:
Robert Deutsch/USA TODAY
)
The wars in Iraq and Afghanistan might have left Rachel Gutierrez, Joe Femenia and Mervin Roxas embittered or even suicidal as they have countless other veterans.
The wars could have killed them: Gutierrez, an Army sergeant, was nearly shot by one of her own soldiers in Baghdad; Femenia, a Navy SEAL, went on missions in both wars; Roxas, a lance corporal, was caught in a roadside bomb blast on the Iraqi border with Syria.
They instead embody narratives that are seldom discussed. Each — like many of the 2.6 million who served in the wars — did not wind up on the deficit side of war's ledger.
Rather, they reinvented themselves. They built on their warrior foundation even as they left it behind.
They entered a postwar phase of life and say they are thriving: The former GI runs a consulting firm and organizing community service; the ex-Navy SEAL has a lead position on Wall Street; and the Marine veteran is rising in the ranks of the Easter Seals organization.
Far from the scandal over delays at the Department of Veterans Affairs in treating thousands of former servicemembers, Gutierrez, Femenia and Roxas live life on their own terms.
"We are portrayed as this damaged generation of veterans," says Gutierrez, 32, who lives near Phoenix. "We're not liabilities to this nation. We're assets."
Here are three stories you might otherwise never hear:
'A PASSION FOR HELPING'
Gutierrez emerged from the cauldron of Iraq violence in 2005 to become a businesswoman.
Platoon Leader Rachel Gutierrez (right, The Mission Continues) talks with Kristin Fray (2nd from left, Therapeutic Programs Manager) and John Johnston (2nd from right, Physical Plant Supervisor, both Arizona State Veteran Home about about making improvements to an outdoor patio at the Arizona State Veteran Homein Phoenix, Arizona. Looking on is Squad Leader Luis Camacho (left, The Mission Continues).
(Photo:
Mark Henle/The Arizona Republic
)
She was all of 23. But Gutierrez had gained a year of experience in a very dangerous place as a non-commissioned officer and human resources specialist assisting in disseminating identification badges for U.S. military personnel and defense contractors.
Growing up in a Detroit suburb, she had enlisted in the Army at 17 as much to flee a decrepit, drug-ridden neighborhood as to find a new future. "I wanted to get out," Gutierrez says.
Gutierrez went to war in 2004. Interacting with contractors, she paid attention to the buildup of military manpower and infrastructure and grew comfortable communicating and negotiating with people of different cultures.
There were risks, such as daily mortar attacks. During one convoy preparation, a U.S. soldier accidentally discharged a machine gun, the rounds passing close to Gutierrez. She and others were sent an e-mail — her address found on a cellphone acquired by insurgents — a video showing a captured friend, a Nepalese soldier, being executed.
When she mustered out in 2005, she studied interior design in college and obtained her MBA.
After graduate school, she formed her own consulting firm, Version2, and took a fellowship in 2012 with The Mission Continues, a Missouri-based, non-profit organization that offers a pathway for veterans to perform community service. "The Mission Continues was so attractive to me because it was these veterans who found a unit again and were part of a family again. And I missed that," says Gutierrez, who lives in Phoenix with her 14-year-old daughter, Alexis La Duke, and 5-year-old son, Ace.
Under the fellowship, she helped raise $14,000 to renovate and upgrade a living facility for at-risk and homeless female veterans, bonding with several who had served in her war.
“We don’t have to be victims all the time.”
Veteran Mervin Roxas, who lost an arm in Iraq
Last year, The Mission Continues named her "platoon leader" for a group of more than 100 veterans who perform community work in Phoenix. Their latest effort in March was raising $13,000 to renovate a transitional living facility for male veterans.
The work has galvanized Gutierrez, instilling a sense of purpose and easing her transition from war. "I've always had a passion for helping others," she says, "but I didn't realize, until reflecting later, that I love it, and I need it. I need it to survive."
BATTLEFIELD TO WALL STREET
There were instincts, reactive skills, creative ways of thinking that Joe Femenia honed as a Navy SEAL team leader and that needed an outlet of expression in life after combat. The answer he found: Wall Street.
He is a managing director at Goldman Sachs, head of U.S. leveraged loan trading.
A native of the Bronx who grew up on the campus of New York state's Maritime College where his father was an engineering professor, Femenia found a future of service in uniform a comfortable idea for a young swimming athlete.
He became intrigued with the SEALs, drawn to their informal command structure that encourages creative thought and a free-flowing exchange of ideas. "I felt I was part of a really elite organization that did great things for our country," says Femenia, who joined the commandos in 1998.
He would be part of the invasion of Iraq in 2003 and two combat deployments to Afghanistan, conducting reconnaissance missions behind enemy lines.
Nearing the end of a seven-year, active-duty commitment in 2005, Femenia was ready to return home, but he had a quandary: finding a career to "offer me a mental challenge, daily stimulation and excitement," he recalls.
Between deployments, he was accepted into Columbia Business School, where a retired executive mentored him about the adrenalin-fueled world of trading over-the-counter corporate debt. "You're taking risk. But it's an art, not a science," says Femenia, who joined Goldman Sachs as an associate after obtaining his MBA in 2007. Transitioning from the battlefield to the fast pace of the trading floor offered personal fulfillment, says Femenia, who lives with his wife and two young sons in Connecticut.
"I'm obviously very proud of my background (as a Navy SEAL), but it's sort of something I did in the past," he says. "My benchmark now is not that I was a SEAL, it's how I perform at work and as a husband and dad."
Femenia says he wants to help his brethren make that same transition. He helped build a Goldman Sachs program that recruits, trains and employs veterans. "These young men and women have just tremendous skill sets," Femenia says. "They're smart. They have integrity. They're risk-takers. They're disciplined. They can work as a team. Those are things that are so important to corporate America."
STILL SERVING OTHERS
Mervin Roxas says it was only after he helped others fit into the world that he fit in himself.
Mervin Roxas in 2012. He lost his left arm to a roadside bomb in Iraq, but is now a supervisor at Easter Seals. “We don’t have to be victims all the time,” he said.(Photo: USA TODAY)
The Philippine native joined the Marines after the 9/11 terror attacks. Twice he went to war, during the Iraq invasion in 2003 and a year later serving on the border with Syria as the Iraqi insurgency intensified.
It was there on July 5, 2004, as Roxas manned a machine gun mounted on the roof of an unarmored Humvee, that a roadside bomb exploded. The force ripped his arm off at the shoulder, shattering his jaw and punching a hole through his right cheek.
His dream of becoming a police officer was gone. "I had to kind of go back to the drawing board and look at other options," says Roxas, 32.
One day, he came across a jobs booth for Easter Seals, the non-profit organization devoted to helping those with autism and other disabilities. Roxas was intrigued. "They serve people with disabilities and get to do all these cool things with them," he says. He was hired in 2008 while attending college and taught life and social skills to one severely disabled, non-verbal client and another with moderate autism.
Roxas worked with them for two years, helping to plan their week, guiding them through tasks such as working at a library or helping at a homeless shelter.
Roxas says he loved it. "It was a way for me to serve again," he says. He began seeing parallels between their experience and his.
"A lot of people just kind of write them off as, 'Oh, they're disabled. They really can't do much.' But then when they're actually out there helping other people, it's pretty cool," he says. "It kept me from being bitter."
Easter Seals took notice. In 2012, he took over supervision of more than 60 life skills coaches.
He graduated from Cal State and got married. He and his wife, Maribeth, have a 10-month-old son, Gideon.
Roxas has been asked to assist in Easter Seals' effort to help transitioning veterans learn the lessons he's acquired.
A key principle is simply allowing yourself to come home, Roxas says. "We don't have to be victims all the time," he says. "We don't have to be recipients all the time. A lot of times, we can serve other people. I made peace with the fact that most of the work that needs to be done, I had to do. ... Good stuff snowballs after that." |
Businesses looking to develop, design and occupy retail and factory space being sought
Darussalam Enterprise (DARe) are inviting businesses to submit expressions of interest (EOI) to develop, operate and occupy factory space units and a commercial center to be built within the Salambigar Industrial Park.
The factory hub will be constructed over a 4.3 hectare plot, offering multiple high-ceiling units that are adaptable for micro, small and medium enterprises (MSMEs) to manufacture different products.
The accompanying commercial center will be located in a 2.7 hectare plot in front of the factory hub, and is envisioned as a mall that can house 30 to 40 retail stores and office space between 30 to 100 square metres with room for an anchor tenant to occupy a unit of approximately 6,500 square metres.
DARe’s industrial site management explained in a recent briefing that the commercial centre and factory space was part of the planned build-up of the Salambigar Industrial Park which currently has 10 tenants employing over 500 people.
Both projects are expected to begin construction between December 2019 and May 2020.
“The commercial space is targeted to cater not only to the tenants but the surrounding (Salambigar and Muara) community of 50,000 residents,” said DARe officer Ali Hj Zamikhan (pictured L).
“The development of the factory space meanwhile is targeted to help local MSMEs have a space to begin manufacturing operations. As they grow (in production) they can upgrade to bigger spaces or DARe’s other industrial parks.”
Ali explained that DARe is currently looking for EOIs from a range of businesses including developers, designers, building managers, marketing consultants and retail businesses.
“We (DARe) are looking to take a different approach by opening up the opportunity to for different parties to submit interest, proposal and plans to develop, operate and occupy the space so that both the commercial centre and factory hub are able to best fit the needs of the businesses and market,” he added.
“The submitted interest includes businesses looking for places to manufacture or sell, businesses who are looking to design (the centres) and businesses looking to construct the property.”
DARe will host another briefing on the project this June 14 at the main auditorium of the Design and Technology building at 9am. To learn more about the project visit DARe’s website.
Commercial Centre:
2.7 hectares
105 metres by 265 metres
Building footprint of 10,000 square metres
Carpark footprint 8,925 square metres (430 carparks)
1.6 floors/Gross floor area 16,000 square metres
Road frontage
Factory Hub:
4.3 hecatres
Building footprint of 16,000 square metres
One floor with high ceilings
Each individual units to have small retail (in front) and office space (rear)
Share this: Tweet
WhatsApp
|
The introduction of the FA Certificate next season in place of the FA Cup is sure to bring crowds flocking in to watch their teams, according to an FA spokesperson.
“One of the frustrations of watching football over the past few years has been the number of teams that sadly lose matches despite having great players working hard,” he said. “Time and again, hard-working teams have lost important matches simply because, on the day, they were unlucky, or tired or stressed, or had the misfortune to meet a better team.
“The new system will be much fairer, and every team will have a good chance of winning,” he said.
In order to gain the coveted FA Certificate, teams will have to show that they can perform a range of competencies on the pitch under the supervision of their managers, who will assess their performance according to the criteria laid down by the FA.
Each manager will be responsible for setting realistic tasks to show off their team’s skills. These must include a minimum of three attacking procedures and three defensive techniques. The only compulsory manoeuvre is the offside trap.
“We were going to make the cross into the box from the byeline compulsory,” said the spokesman, “but that would have made it very difficult for teams that don’t have any decent wingers.”
Scoring goals is also not compulsory. “Goals are important, obviously,” said the spokesman, “but anyone can kick a ball into a net. If we are serious about raising standards of football in this country then we must concentrate on the underlying skills. This Certificate will make sure that teams know how to analyse the situation and build up a proper attack. A good attack is worth any number of goals.”
Managers will have some discretion in setting up simulations. For example, when demonstrating a team’s defensive strengths it may be difficult to arrange for a world-class striker to take a direct free kick from the edge of the box, in which case the manager can take the free kick himself.
One of the great benefits of the new system will be its flexibility, allowing managers to assess their teams at any convenient time instead of cluttering up the schedule with fixed cup-tie dates. Teams can also be assessed more than once for the same skill, ensuring that they have the opportunity to put in the best possible performance.
The FA is confident that the new scheme will show that it is raising standards, by focusing attention on the skills that it sees as essential if English football is to survive in an increasingly competitive world. “We expect to see an improvement year on year,” said the spokesman. “Managers whose teams do not show an improvement will soon be out of a job.”
When asked about the validity of the results, the spokesman was quick to confirm that managers would have to sign a form stating that they had not given their teams any help or special coaching.
FIFA are said to be watching the developments with interest, and the FA must surely be hoping that their new procedures will be adopted in place of the World Cup. |
Perfection is this 'dome' shaped, hand-ladled treat from Websterville, Vermont. Bright, fresh chevre gets sweet and creamy just beneath the velvety, edible rind.Plus it reminds us of Honeydew from the Muppets. 2011 American Cheese Society Winner Read More
The delicate, crinkly rind on this American Original encases a deceptively rich and tasty cheese, thanks to the addition of tart creme fraiche. It may not be socially acceptable to down in two bites, but just you try resisting its advances. 2011 American Cheese Society Winner Read More |
/*
* Copyright (C) 2016 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License
*/
package com.android.server.job;
import static com.android.server.job.JobSchedulerService.sElapsedRealtimeClock;
import static com.android.server.job.JobSchedulerService.sSystemClock;
import static com.android.server.job.JobSchedulerService.sUptimeMillisClock;
import android.app.job.JobInfo;
import android.app.job.JobParameters;
import android.os.UserHandle;
import android.text.format.DateFormat;
import android.util.ArrayMap;
import android.util.SparseArray;
import android.util.SparseIntArray;
import android.util.TimeUtils;
import android.util.proto.ProtoOutputStream;
import com.android.internal.util.RingBufferIndices;
import com.android.server.job.controllers.JobStatus;
import java.io.PrintWriter;
public final class JobPackageTracker {
// We batch every 30 minutes.
static final long BATCHING_TIME = 30*60*1000;
// Number of historical data sets we keep.
static final int NUM_HISTORY = 5;
private static final int EVENT_BUFFER_SIZE = 100;
public static final int EVENT_CMD_MASK = 0xff;
public static final int EVENT_STOP_REASON_SHIFT = 8;
public static final int EVENT_STOP_REASON_MASK = 0xff << EVENT_STOP_REASON_SHIFT;
public static final int EVENT_NULL = 0;
public static final int EVENT_START_JOB = 1;
public static final int EVENT_STOP_JOB = 2;
public static final int EVENT_START_PERIODIC_JOB = 3;
public static final int EVENT_STOP_PERIODIC_JOB = 4;
private final RingBufferIndices mEventIndices = new RingBufferIndices(EVENT_BUFFER_SIZE);
private final int[] mEventCmds = new int[EVENT_BUFFER_SIZE];
private final long[] mEventTimes = new long[EVENT_BUFFER_SIZE];
private final int[] mEventUids = new int[EVENT_BUFFER_SIZE];
private final String[] mEventTags = new String[EVENT_BUFFER_SIZE];
private final int[] mEventJobIds = new int[EVENT_BUFFER_SIZE];
private final String[] mEventReasons = new String[EVENT_BUFFER_SIZE];
public void addEvent(int cmd, int uid, String tag, int jobId, int stopReason,
String debugReason) {
int index = mEventIndices.add();
mEventCmds[index] = cmd | ((stopReason<<EVENT_STOP_REASON_SHIFT) & EVENT_STOP_REASON_MASK);
mEventTimes[index] = sElapsedRealtimeClock.millis();
mEventUids[index] = uid;
mEventTags[index] = tag;
mEventJobIds[index] = jobId;
mEventReasons[index] = debugReason;
}
DataSet mCurDataSet = new DataSet();
DataSet[] mLastDataSets = new DataSet[NUM_HISTORY];
final static class PackageEntry {
long pastActiveTime;
long activeStartTime;
int activeNesting;
int activeCount;
boolean hadActive;
long pastActiveTopTime;
long activeTopStartTime;
int activeTopNesting;
int activeTopCount;
boolean hadActiveTop;
long pastPendingTime;
long pendingStartTime;
int pendingNesting;
int pendingCount;
boolean hadPending;
final SparseIntArray stopReasons = new SparseIntArray();
public long getActiveTime(long now) {
long time = pastActiveTime;
if (activeNesting > 0) {
time += now - activeStartTime;
}
return time;
}
public long getActiveTopTime(long now) {
long time = pastActiveTopTime;
if (activeTopNesting > 0) {
time += now - activeTopStartTime;
}
return time;
}
public long getPendingTime(long now) {
long time = pastPendingTime;
if (pendingNesting > 0) {
time += now - pendingStartTime;
}
return time;
}
}
final static class DataSet {
final SparseArray<ArrayMap<String, PackageEntry>> mEntries = new SparseArray<>();
final long mStartUptimeTime;
final long mStartElapsedTime;
final long mStartClockTime;
long mSummedTime;
int mMaxTotalActive;
int mMaxFgActive;
public DataSet(DataSet otherTimes) {
mStartUptimeTime = otherTimes.mStartUptimeTime;
mStartElapsedTime = otherTimes.mStartElapsedTime;
mStartClockTime = otherTimes.mStartClockTime;
}
public DataSet() {
mStartUptimeTime = sUptimeMillisClock.millis();
mStartElapsedTime = sElapsedRealtimeClock.millis();
mStartClockTime = sSystemClock.millis();
}
private PackageEntry getOrCreateEntry(int uid, String pkg) {
ArrayMap<String, PackageEntry> uidMap = mEntries.get(uid);
if (uidMap == null) {
uidMap = new ArrayMap<>();
mEntries.put(uid, uidMap);
}
PackageEntry entry = uidMap.get(pkg);
if (entry == null) {
entry = new PackageEntry();
uidMap.put(pkg, entry);
}
return entry;
}
public PackageEntry getEntry(int uid, String pkg) {
ArrayMap<String, PackageEntry> uidMap = mEntries.get(uid);
if (uidMap == null) {
return null;
}
return uidMap.get(pkg);
}
long getTotalTime(long now) {
if (mSummedTime > 0) {
return mSummedTime;
}
return now - mStartUptimeTime;
}
void incPending(int uid, String pkg, long now) {
PackageEntry pe = getOrCreateEntry(uid, pkg);
if (pe.pendingNesting == 0) {
pe.pendingStartTime = now;
pe.pendingCount++;
}
pe.pendingNesting++;
}
void decPending(int uid, String pkg, long now) {
PackageEntry pe = getOrCreateEntry(uid, pkg);
if (pe.pendingNesting == 1) {
pe.pastPendingTime += now - pe.pendingStartTime;
}
pe.pendingNesting--;
}
void incActive(int uid, String pkg, long now) {
PackageEntry pe = getOrCreateEntry(uid, pkg);
if (pe.activeNesting == 0) {
pe.activeStartTime = now;
pe.activeCount++;
}
pe.activeNesting++;
}
void decActive(int uid, String pkg, long now, int stopReason) {
PackageEntry pe = getOrCreateEntry(uid, pkg);
if (pe.activeNesting == 1) {
pe.pastActiveTime += now - pe.activeStartTime;
}
pe.activeNesting--;
int count = pe.stopReasons.get(stopReason, 0);
pe.stopReasons.put(stopReason, count+1);
}
void incActiveTop(int uid, String pkg, long now) {
PackageEntry pe = getOrCreateEntry(uid, pkg);
if (pe.activeTopNesting == 0) {
pe.activeTopStartTime = now;
pe.activeTopCount++;
}
pe.activeTopNesting++;
}
void decActiveTop(int uid, String pkg, long now, int stopReason) {
PackageEntry pe = getOrCreateEntry(uid, pkg);
if (pe.activeTopNesting == 1) {
pe.pastActiveTopTime += now - pe.activeTopStartTime;
}
pe.activeTopNesting--;
int count = pe.stopReasons.get(stopReason, 0);
pe.stopReasons.put(stopReason, count+1);
}
void finish(DataSet next, long now) {
for (int i = mEntries.size() - 1; i >= 0; i--) {
ArrayMap<String, PackageEntry> uidMap = mEntries.valueAt(i);
for (int j = uidMap.size() - 1; j >= 0; j--) {
PackageEntry pe = uidMap.valueAt(j);
if (pe.activeNesting > 0 || pe.activeTopNesting > 0 || pe.pendingNesting > 0) {
// Propagate existing activity in to next data set.
PackageEntry nextPe = next.getOrCreateEntry(mEntries.keyAt(i), uidMap.keyAt(j));
nextPe.activeStartTime = now;
nextPe.activeNesting = pe.activeNesting;
nextPe.activeTopStartTime = now;
nextPe.activeTopNesting = pe.activeTopNesting;
nextPe.pendingStartTime = now;
nextPe.pendingNesting = pe.pendingNesting;
// Finish it off.
if (pe.activeNesting > 0) {
pe.pastActiveTime += now - pe.activeStartTime;
pe.activeNesting = 0;
}
if (pe.activeTopNesting > 0) {
pe.pastActiveTopTime += now - pe.activeTopStartTime;
pe.activeTopNesting = 0;
}
if (pe.pendingNesting > 0) {
pe.pastPendingTime += now - pe.pendingStartTime;
pe.pendingNesting = 0;
}
}
}
}
}
void addTo(DataSet out, long now) {
out.mSummedTime += getTotalTime(now);
for (int i = mEntries.size() - 1; i >= 0; i--) {
ArrayMap<String, PackageEntry> uidMap = mEntries.valueAt(i);
for (int j = uidMap.size() - 1; j >= 0; j--) {
PackageEntry pe = uidMap.valueAt(j);
PackageEntry outPe = out.getOrCreateEntry(mEntries.keyAt(i), uidMap.keyAt(j));
outPe.pastActiveTime += pe.pastActiveTime;
outPe.activeCount += pe.activeCount;
outPe.pastActiveTopTime += pe.pastActiveTopTime;
outPe.activeTopCount += pe.activeTopCount;
outPe.pastPendingTime += pe.pastPendingTime;
outPe.pendingCount += pe.pendingCount;
if (pe.activeNesting > 0) {
outPe.pastActiveTime += now - pe.activeStartTime;
outPe.hadActive = true;
}
if (pe.activeTopNesting > 0) {
outPe.pastActiveTopTime += now - pe.activeTopStartTime;
outPe.hadActiveTop = true;
}
if (pe.pendingNesting > 0) {
outPe.pastPendingTime += now - pe.pendingStartTime;
outPe.hadPending = true;
}
for (int k = pe.stopReasons.size()-1; k >= 0; k--) {
int type = pe.stopReasons.keyAt(k);
outPe.stopReasons.put(type, outPe.stopReasons.get(type, 0)
+ pe.stopReasons.valueAt(k));
}
}
}
if (mMaxTotalActive > out.mMaxTotalActive) {
out.mMaxTotalActive = mMaxTotalActive;
}
if (mMaxFgActive > out.mMaxFgActive) {
out.mMaxFgActive = mMaxFgActive;
}
}
void printDuration(PrintWriter pw, long period, long duration, int count, String suffix) {
float fraction = duration / (float) period;
int percent = (int) ((fraction * 100) + .5f);
if (percent > 0) {
pw.print(" ");
pw.print(percent);
pw.print("% ");
pw.print(count);
pw.print("x ");
pw.print(suffix);
} else if (count > 0) {
pw.print(" ");
pw.print(count);
pw.print("x ");
pw.print(suffix);
}
}
void dump(PrintWriter pw, String header, String prefix, long now, long nowElapsed,
int filterUid) {
final long period = getTotalTime(now);
pw.print(prefix); pw.print(header); pw.print(" at ");
pw.print(DateFormat.format("yyyy-MM-dd-HH-mm-ss", mStartClockTime).toString());
pw.print(" (");
TimeUtils.formatDuration(mStartElapsedTime, nowElapsed, pw);
pw.print(") over ");
TimeUtils.formatDuration(period, pw);
pw.println(":");
final int NE = mEntries.size();
for (int i = 0; i < NE; i++) {
int uid = mEntries.keyAt(i);
if (filterUid != -1 && filterUid != UserHandle.getAppId(uid)) {
continue;
}
ArrayMap<String, PackageEntry> uidMap = mEntries.valueAt(i);
final int NP = uidMap.size();
for (int j = 0; j < NP; j++) {
PackageEntry pe = uidMap.valueAt(j);
pw.print(prefix); pw.print(" ");
UserHandle.formatUid(pw, uid);
pw.print(" / "); pw.print(uidMap.keyAt(j));
pw.println(":");
pw.print(prefix); pw.print(" ");
printDuration(pw, period, pe.getPendingTime(now), pe.pendingCount, "pending");
printDuration(pw, period, pe.getActiveTime(now), pe.activeCount, "active");
printDuration(pw, period, pe.getActiveTopTime(now), pe.activeTopCount,
"active-top");
if (pe.pendingNesting > 0 || pe.hadPending) {
pw.print(" (pending)");
}
if (pe.activeNesting > 0 || pe.hadActive) {
pw.print(" (active)");
}
if (pe.activeTopNesting > 0 || pe.hadActiveTop) {
pw.print(" (active-top)");
}
pw.println();
if (pe.stopReasons.size() > 0) {
pw.print(prefix); pw.print(" ");
for (int k = 0; k < pe.stopReasons.size(); k++) {
if (k > 0) {
pw.print(", ");
}
pw.print(pe.stopReasons.valueAt(k));
pw.print("x ");
pw.print(JobParameters.getReasonName(pe.stopReasons.keyAt(k)));
}
pw.println();
}
}
}
pw.print(prefix); pw.print(" Max concurrency: ");
pw.print(mMaxTotalActive); pw.print(" total, ");
pw.print(mMaxFgActive); pw.println(" foreground");
}
private void printPackageEntryState(ProtoOutputStream proto, long fieldId,
long duration, int count) {
final long token = proto.start(fieldId);
proto.write(DataSetProto.PackageEntryProto.State.DURATION_MS, duration);
proto.write(DataSetProto.PackageEntryProto.State.COUNT, count);
proto.end(token);
}
void dump(ProtoOutputStream proto, long fieldId, long now, long nowElapsed, int filterUid) {
final long token = proto.start(fieldId);
final long period = getTotalTime(now);
proto.write(DataSetProto.START_CLOCK_TIME_MS, mStartClockTime);
proto.write(DataSetProto.ELAPSED_TIME_MS, nowElapsed - mStartElapsedTime);
proto.write(DataSetProto.PERIOD_MS, period);
final int NE = mEntries.size();
for (int i = 0; i < NE; i++) {
int uid = mEntries.keyAt(i);
if (filterUid != -1 && filterUid != UserHandle.getAppId(uid)) {
continue;
}
ArrayMap<String, PackageEntry> uidMap = mEntries.valueAt(i);
final int NP = uidMap.size();
for (int j = 0; j < NP; j++) {
final long peToken = proto.start(DataSetProto.PACKAGE_ENTRIES);
PackageEntry pe = uidMap.valueAt(j);
proto.write(DataSetProto.PackageEntryProto.UID, uid);
proto.write(DataSetProto.PackageEntryProto.PACKAGE_NAME, uidMap.keyAt(j));
printPackageEntryState(proto, DataSetProto.PackageEntryProto.PENDING_STATE,
pe.getPendingTime(now), pe.pendingCount);
printPackageEntryState(proto, DataSetProto.PackageEntryProto.ACTIVE_STATE,
pe.getActiveTime(now), pe.activeCount);
printPackageEntryState(proto, DataSetProto.PackageEntryProto.ACTIVE_TOP_STATE,
pe.getActiveTopTime(now), pe.activeTopCount);
proto.write(DataSetProto.PackageEntryProto.PENDING,
pe.pendingNesting > 0 || pe.hadPending);
proto.write(DataSetProto.PackageEntryProto.ACTIVE,
pe.activeNesting > 0 || pe.hadActive);
proto.write(DataSetProto.PackageEntryProto.ACTIVE_TOP,
pe.activeTopNesting > 0 || pe.hadActiveTop);
for (int k = 0; k < pe.stopReasons.size(); k++) {
final long srcToken =
proto.start(DataSetProto.PackageEntryProto.STOP_REASONS);
proto.write(DataSetProto.PackageEntryProto.StopReasonCount.REASON,
pe.stopReasons.keyAt(k));
proto.write(DataSetProto.PackageEntryProto.StopReasonCount.COUNT,
pe.stopReasons.valueAt(k));
proto.end(srcToken);
}
proto.end(peToken);
}
}
proto.write(DataSetProto.MAX_CONCURRENCY, mMaxTotalActive);
proto.write(DataSetProto.MAX_FOREGROUND_CONCURRENCY, mMaxFgActive);
proto.end(token);
}
}
void rebatchIfNeeded(long now) {
long totalTime = mCurDataSet.getTotalTime(now);
if (totalTime > BATCHING_TIME) {
DataSet last = mCurDataSet;
last.mSummedTime = totalTime;
mCurDataSet = new DataSet();
last.finish(mCurDataSet, now);
System.arraycopy(mLastDataSets, 0, mLastDataSets, 1, mLastDataSets.length-1);
mLastDataSets[0] = last;
}
}
public void notePending(JobStatus job) {
final long now = sUptimeMillisClock.millis();
job.madePending = now;
rebatchIfNeeded(now);
mCurDataSet.incPending(job.getSourceUid(), job.getSourcePackageName(), now);
}
public void noteNonpending(JobStatus job) {
final long now = sUptimeMillisClock.millis();
mCurDataSet.decPending(job.getSourceUid(), job.getSourcePackageName(), now);
rebatchIfNeeded(now);
}
public void noteActive(JobStatus job) {
final long now = sUptimeMillisClock.millis();
job.madeActive = now;
rebatchIfNeeded(now);
if (job.lastEvaluatedPriority >= JobInfo.PRIORITY_TOP_APP) {
mCurDataSet.incActiveTop(job.getSourceUid(), job.getSourcePackageName(), now);
} else {
mCurDataSet.incActive(job.getSourceUid(), job.getSourcePackageName(), now);
}
addEvent(job.getJob().isPeriodic() ? EVENT_START_PERIODIC_JOB : EVENT_START_JOB,
job.getSourceUid(), job.getBatteryName(), job.getJobId(), 0, null);
}
public void noteInactive(JobStatus job, int stopReason, String debugReason) {
final long now = sUptimeMillisClock.millis();
if (job.lastEvaluatedPriority >= JobInfo.PRIORITY_TOP_APP) {
mCurDataSet.decActiveTop(job.getSourceUid(), job.getSourcePackageName(), now,
stopReason);
} else {
mCurDataSet.decActive(job.getSourceUid(), job.getSourcePackageName(), now, stopReason);
}
rebatchIfNeeded(now);
addEvent(job.getJob().isPeriodic() ? EVENT_STOP_JOB : EVENT_STOP_PERIODIC_JOB,
job.getSourceUid(), job.getBatteryName(), job.getJobId(), stopReason, debugReason);
}
public void noteConcurrency(int totalActive, int fgActive) {
if (totalActive > mCurDataSet.mMaxTotalActive) {
mCurDataSet.mMaxTotalActive = totalActive;
}
if (fgActive > mCurDataSet.mMaxFgActive) {
mCurDataSet.mMaxFgActive = fgActive;
}
}
public float getLoadFactor(JobStatus job) {
final int uid = job.getSourceUid();
final String pkg = job.getSourcePackageName();
PackageEntry cur = mCurDataSet.getEntry(uid, pkg);
PackageEntry last = mLastDataSets[0] != null ? mLastDataSets[0].getEntry(uid, pkg) : null;
if (cur == null && last == null) {
return 0;
}
final long now = sUptimeMillisClock.millis();
long time = 0;
if (cur != null) {
time += cur.getActiveTime(now) + cur.getPendingTime(now);
}
long period = mCurDataSet.getTotalTime(now);
if (last != null) {
time += last.getActiveTime(now) + last.getPendingTime(now);
period += mLastDataSets[0].getTotalTime(now);
}
return time / (float)period;
}
public void dump(PrintWriter pw, String prefix, int filterUid) {
final long now = sUptimeMillisClock.millis();
final long nowElapsed = sElapsedRealtimeClock.millis();
final DataSet total;
if (mLastDataSets[0] != null) {
total = new DataSet(mLastDataSets[0]);
mLastDataSets[0].addTo(total, now);
} else {
total = new DataSet(mCurDataSet);
}
mCurDataSet.addTo(total, now);
for (int i = 1; i < mLastDataSets.length; i++) {
if (mLastDataSets[i] != null) {
mLastDataSets[i].dump(pw, "Historical stats", prefix, now, nowElapsed, filterUid);
pw.println();
}
}
total.dump(pw, "Current stats", prefix, now, nowElapsed, filterUid);
}
public void dump(ProtoOutputStream proto, long fieldId, int filterUid) {
final long token = proto.start(fieldId);
final long now = sUptimeMillisClock.millis();
final long nowElapsed = sElapsedRealtimeClock.millis();
final DataSet total;
if (mLastDataSets[0] != null) {
total = new DataSet(mLastDataSets[0]);
mLastDataSets[0].addTo(total, now);
} else {
total = new DataSet(mCurDataSet);
}
mCurDataSet.addTo(total, now);
for (int i = 1; i < mLastDataSets.length; i++) {
if (mLastDataSets[i] != null) {
mLastDataSets[i].dump(proto, JobPackageTrackerDumpProto.HISTORICAL_STATS,
now, nowElapsed, filterUid);
}
}
total.dump(proto, JobPackageTrackerDumpProto.CURRENT_STATS,
now, nowElapsed, filterUid);
proto.end(token);
}
public boolean dumpHistory(PrintWriter pw, String prefix, int filterUid) {
final int size = mEventIndices.size();
if (size <= 0) {
return false;
}
pw.println(" Job history:");
final long now = sElapsedRealtimeClock.millis();
for (int i=0; i<size; i++) {
final int index = mEventIndices.indexOf(i);
final int uid = mEventUids[index];
if (filterUid != -1 && filterUid != UserHandle.getAppId(uid)) {
continue;
}
final int cmd = mEventCmds[index] & EVENT_CMD_MASK;
if (cmd == EVENT_NULL) {
continue;
}
final String label;
switch (cmd) {
case EVENT_START_JOB: label = " START"; break;
case EVENT_STOP_JOB: label = " STOP"; break;
case EVENT_START_PERIODIC_JOB: label = "START-P"; break;
case EVENT_STOP_PERIODIC_JOB: label = " STOP-P"; break;
default: label = " ??"; break;
}
pw.print(prefix);
TimeUtils.formatDuration(mEventTimes[index]-now, pw, TimeUtils.HUNDRED_DAY_FIELD_LEN);
pw.print(" ");
pw.print(label);
pw.print(": #");
UserHandle.formatUid(pw, uid);
pw.print("/");
pw.print(mEventJobIds[index]);
pw.print(" ");
pw.print(mEventTags[index]);
if (cmd == EVENT_STOP_JOB || cmd == EVENT_STOP_PERIODIC_JOB) {
pw.print(" ");
final String reason = mEventReasons[index];
if (reason != null) {
pw.print(mEventReasons[index]);
} else {
pw.print(JobParameters.getReasonName((mEventCmds[index] & EVENT_STOP_REASON_MASK)
>> EVENT_STOP_REASON_SHIFT));
}
}
pw.println();
}
return true;
}
public void dumpHistory(ProtoOutputStream proto, long fieldId, int filterUid) {
final int size = mEventIndices.size();
if (size == 0) {
return;
}
final long token = proto.start(fieldId);
final long now = sElapsedRealtimeClock.millis();
for (int i = 0; i < size; i++) {
final int index = mEventIndices.indexOf(i);
final int uid = mEventUids[index];
if (filterUid != -1 && filterUid != UserHandle.getAppId(uid)) {
continue;
}
final int cmd = mEventCmds[index] & EVENT_CMD_MASK;
if (cmd == EVENT_NULL) {
continue;
}
final long heToken = proto.start(JobPackageHistoryProto.HISTORY_EVENT);
proto.write(JobPackageHistoryProto.HistoryEvent.EVENT, cmd);
proto.write(JobPackageHistoryProto.HistoryEvent.TIME_SINCE_EVENT_MS, now - mEventTimes[index]);
proto.write(JobPackageHistoryProto.HistoryEvent.UID, uid);
proto.write(JobPackageHistoryProto.HistoryEvent.JOB_ID, mEventJobIds[index]);
proto.write(JobPackageHistoryProto.HistoryEvent.TAG, mEventTags[index]);
if (cmd == EVENT_STOP_JOB || cmd == EVENT_STOP_PERIODIC_JOB) {
proto.write(JobPackageHistoryProto.HistoryEvent.STOP_REASON,
(mEventCmds[index] & EVENT_STOP_REASON_MASK) >> EVENT_STOP_REASON_SHIFT);
}
proto.end(heToken);
}
proto.end(token);
}
}
|
I have ChIP-seq samples with replicates for the same experiment. I have processed ChIP-seq as follows,
Steps done:
Bowtie and Bowtie2 (50 bp read length, used both outputs for further
processing)
picard (duplicate removal)
NGSUtils (BAMutils, clean with Black list and MAPQ 30)
Deeptools (fingerprint, BAMsummary and correlation)
Query:
I am planning to do peak calling using this replicate samples (2 x treatment and 2 x Input) with MACS2. But when I check the correlation (pearson) between Input replicate samples (S1), it gives 0.61 (highlighted with box) unlike in treatment replicates it was above 0.85 [refer attached figure below].
Is it fine to consider S1_InputR1 and S1_InputR2 as replicates when
doing peak calling with MACS2 ? [refer attached figure below]
Interesting, S1_InputR2 also covers ~5% less of the genome. From the graph, it looks like the depth might be a bit lower for it, but I'm guessing it's not hugely different. If you have a recent-ish version of deepTools, it'd be interesting to use --outQualityMetrics something.txt --JSDsample S1_InputR1.bam to see what the "synthetic JSD" is. This is the Jensen-Shannon divergence between a sample's coverage distribution and what would be seen from an ideal input sample sequenced to the same depth. Lower is better and I suspect your S1_InputR2 will have a notably higher value, which indicates that something went wrong at some point (possibly too many PCR cycles?) and maybe the sample should be excluded. |
Newport Crossings
Newport Crossings project — as of September 2018
Project Overview: This is a modestly revised return appearance of the Residences at Newport Place proposal (rejected by both the Planning Commission and City Council in 2016) for high density, high rise residential redevelopment of the now shuttered shopping center that was formerly home to “Arnie’s Deli” and “Il Barone” restaurant — a pentagon of land along the MacArthur corridor in the Airport Area, bounded by Dove, Scott, Corinthian and Martingale Ways (and an abutting office parking lot). In this reincarnation of the rejected plan, 350 apartments are planned, down from the earlier proposal for 384.
Why We’re Watching: The return of a previously rejected proposal is always of concern. SPON continues to feel that although the City’s 2006 General Plan allowed for adding housing to the Airport Area, the plan for actually doing that, and its consequences (both for the city in general and on the potential future Airport Area residents and existing office park uses in particular), have never been adequately thought out. The already-approved and under construction Uptown Newport project seems ominously like the undesirable development constructed along the Jamboree corridor in nearly Irvine. Before additional projects are approved in Newport Beach’s portion of the Airport Area, SPON believes that either the General Plan needs to be updated or a more comprehensive specific area plan for the area developed.
The need for better planning is exemplified by the rationale offered, when essentially the same proposal was previously before decision makers, for converting the shopping center to residential: there were, the owner said, not enough residents in the area to support his center. But by replacing the small amount of existing retail with housing, the developer will be creating new residents who, with the center gone, will likely have too little retail to serve them. That doesn’t sound like good planning — and for many it remains hard to see how housing belongs at all so close to an airport — typically a buffer zone reserved for office, retail and industrial/manufacturing uses.
Upcoming:
December 6, 2018: The EIR has not yet been released, but December 6 has been announced as the tentative date for a Planning Commission Study Session to review the project.
Recent Events:
November 30, 2017 @ 5:00 pm: Was the deadline to submit written comments to be considered in the “scoping” of the EIR. See Notice of Preparation for submission details.
November 16, 2017 @ 6:00 pm: Per the Notice of Preparation, “Scoping Meeting” was held in the Evelyn Hart Event Center at the OASIS Senior Center in Corona del Mar. Staff and consultants described the project and invited comments on issues that need to be addressed in the EIR.
November 1, 2017: The City announced the posting of a “Notice of Preparation” for an Environmental Impact Report to be prepared prior to any City approvals (this is an improvement over the previous proposal, whose approval was considered with only a lesser “Mitigated Negative Declaration”). Comments on issues that need to be addressed in the EIR are due by November 30, and can also be offered orally at a public Scoping Meeting to be held on November 16. |
17.10.09
Thought I saw you in the battleshipBut it was only a look a likeShe was nothing but a vision trickUnder the warning lightShe was close, close enough to be your ghostBut my chances turned to toastWhen I asked her if I could call her your name
I thought I saw you in the rusty hookHuddled up in wicker chairI wandered up for a closer lookAnd kissed who ever was sitting there
She was close, and she held me very tightlyTill I asked awfully politely, pleaseCan I call you her name
And I elongated my lift home,Yeah I let him go the long way roundI smelt your scent on the seatbeltAnd kept my shortcuts to myself
I thought I saw you in the parrots beakMessing with the smoke alarmIt was too loud for me to hear her speakAnd she had a broken arm
It was close, so close that the walls were wetAnd she wrote it out in letrasetNo you can't call me her name
I elongated my lift homeYeah I let him go the long way roundI smelt your scent on the seatbeltAnd kept my shortcuts to myself
I saw your sister in the cornerstoneOn the phone to the middle manWhen I saw that she was on her ownI thought she might understandShe was close, well you couldn't get much closerShe said I'm really not supposed to but yes,You can call me anything you want
9.10.09
8.10.09
7.10.09
can blame it on your teachersyou can blame it on the weathercan blame it on how your mother and your father didn't stick togethersomeday darlin its got to make sense in your headcan't make up your mind till you wake up and make your bed
3.10.09
1.10.09
The drunken politician leapsUpon the street where mothers weepAnd the saviors who are fast asleep,They wait for youAnd I wait for them to interruptMe drinkin' from my broken cupAnd ask me toOpen up the gate for youI want you, I want you,I want you so bad,Honey, I want you! |
Richard Falcão
Richard Amorim Falcão (born 29 June 1987), better known as Rei is a Brazilian professional footballer who plays as a forward for Real Noroeste.
Career
Early career
Born in Feira de Santana he played with Botafogo, America RJ, Paraíba do Sul and Colatinense.
Thailand
In 2009, he moved to Thailand and played with top-league side Buriram United, at time known as Provincial Electricity Authority FC which had just been Thai Premier League champions the season earlier, 2008.
Back in Brazil
After returning from Thailand, on January 3, 2010, he signed with Guarani (Campeonato Paulista A2), Then he joined Ponte Preta and played in the Campeonato Brasileiro Serie B but he disappointed after missing a goal in an important match against Nautico and ended up leaving in March 2011. He then played with Veranópolis in the Campeonato Gaucho. On January 3, 2012, he signed with Itabuna and played in the Campeonato Baiano. Later he played with América PE (Campeonato Pernambucano), Rio Claro (Campeonato Paulista A2), Villa Nova, Esportiva Patrocinense and Ipatinga (Campeonato Brasileiro Serie C), In July 2013 he signed with Comercial after a brief spell with Betim Amadense, Galícia (Campeonato Baiano) and Jacobina were his last clubs before his move to Europe.
Serbia
In the winter break of the 2014–15 Serbian SuperLiga season, he joined FK Novi Pazar.
He left Serbia at the end of the first half of the season, and during winter-break he returned to Brazil. He joined Jacuipense but stayed only during the month of January, afterwards moving to Juazeirense. Next he played with Atlético Itapemirim, Vitória das Tabocas and Real Noroeste.
Honours
Campinas
Campeonato Brasileiro Serie B: 2008
References
External links
richardfalcao9.blogspot.pt
Category:1987 births
Category:Living people
Category:Brazilian footballers
Category:Association football forwards
Category:Botafogo de Futebol e Regatas players
Category:America Football Club (RJ) players
Category:Clube Atlético Colatinense players
Category:Buriram United F.C. players
Category:Guarani FC players
Category:Associação Atlética Ponte Preta players
Category:Veranópolis Esporte Clube Recreativo e Cultural players
Category:América Futebol Clube (PE) players
Category:Rio Claro Futebol Clube players
Category:Villa Nova Atlético Clube players
Category:Ipatinga Futebol Clube players
Category:Comercial Futebol Clube (Ribeirão Preto) players
Category:Galícia Esporte Clube players
Category:FK Novi Pazar players
Category:Thai League 1 players
Category:Campeonato Brasileiro Série A players
Category:Serbian SuperLiga players
Category:Brazilian expatriates in Thailand
Category:Brazilian expatriates in Serbia
Category:Expatriate footballers in Thailand
Category:Expatriate footballers in Serbia |
/*
* Copyright 2011 Joakim Sindholt <[email protected]>
*
* Permission is hereby granted, free of charge, to any person obtaining a
* copy of this software and associated documentation files (the "Software"),
* to deal in the Software without restriction, including without limitation
* on the rights to use, copy, modify, merge, publish, distribute, sub
* license, and/or sell copies of the Software, and to permit persons to whom
* the Software is furnished to do so, subject to the following conditions:
*
* The above copyright notice and this permission notice (including the next
* paragraph) shall be included in all copies or substantial portions of the
* Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
* FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. IN NO EVENT SHALL
* THE AUTHOR(S) AND/OR THEIR SUPPLIERS BE LIABLE FOR ANY CLAIM,
* DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
* OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
* USE OR OTHER DEALINGS IN THE SOFTWARE. */
#ifndef _NINE_SHADER_H_
#define _NINE_SHADER_H_
#include "d3d9types.h"
#include "d3d9caps.h"
#include "nine_defines.h"
#include "nine_helpers.h"
#include "pipe/p_state.h" /* PIPE_MAX_ATTRIBS */
#include "util/u_memory.h"
struct NineDevice9;
struct NineVertexDeclaration9;
struct nine_lconstf /* NOTE: both pointers should be FREE'd by the user */
{
struct nine_range *ranges; /* single MALLOC, but next-pointers valid */
float *data;
};
struct nine_shader_info
{
unsigned type; /* in, PIPE_SHADER_x */
uint8_t version; /* (major << 4) | minor */
const DWORD *byte_code; /* in, pointer to shader tokens */
DWORD byte_size; /* out, size of data at byte_code */
void *cso; /* out, pipe cso for bind_vs,fs_state */
uint16_t input_map[PIPE_MAX_ATTRIBS]; /* VS input -> NINE_DECLUSAGE_x */
uint8_t num_inputs; /* there may be unused inputs (NINE_DECLUSAGE_NONE) */
boolean position_t; /* out, true if VP writes pre-transformed position */
boolean point_size; /* out, true if VP writes point size */
float point_size_min;
float point_size_max;
uint32_t sampler_ps1xtypes; /* 2 bits per sampler */
uint16_t sampler_mask; /* out, which samplers are being used */
uint16_t sampler_mask_shadow; /* in, which samplers use depth compare */
uint8_t rt_mask; /* out, which render targets are being written */
uint8_t fog_enable;
uint8_t fog_mode;
uint8_t force_color_in_centroid;
uint16_t projected; /* ps 1.1 to 1.3 */
unsigned const_i_base; /* in vec4 (16 byte) units */
unsigned const_b_base; /* in vec4 (16 byte) units */
unsigned const_used_size;
unsigned const_float_slots;
unsigned const_int_slots;
unsigned const_bool_slots;
struct nine_lconstf lconstf; /* out, NOTE: members to be free'd by user */
uint8_t bumpenvmat_needed;
boolean swvp_on;
boolean process_vertices;
struct NineVertexDeclaration9 *vdecl_out;
struct pipe_stream_output_info so;
};
struct nine_vs_output_info
{
BYTE output_semantic;
int output_semantic_index;
int mask;
int output_index;
};
static inline void
nine_info_mark_const_f_used(struct nine_shader_info *info, int idx)
{
if (info->const_float_slots < (idx + 1))
info->const_float_slots = idx + 1;
}
static inline void
nine_info_mark_const_i_used(struct nine_shader_info *info, int idx)
{
if (info->const_int_slots < (idx + 1))
info->const_int_slots = idx + 1;
}
static inline void
nine_info_mark_const_b_used(struct nine_shader_info *info, int idx)
{
if (info->const_bool_slots < (idx + 1))
info->const_bool_slots = idx + 1;
}
HRESULT
nine_translate_shader(struct NineDevice9 *device,
struct nine_shader_info *,
struct pipe_context *);
struct nine_shader_variant
{
struct nine_shader_variant *next;
void *cso;
uint64_t key;
};
static inline void *
nine_shader_variant_get(struct nine_shader_variant *list, uint64_t key)
{
while (list->key != key && list->next)
list = list->next;
if (list->key == key)
return list->cso;
return NULL;
}
static inline boolean
nine_shader_variant_add(struct nine_shader_variant *list,
uint64_t key, void *cso)
{
while (list->next) {
assert(list->key != key);
list = list->next;
}
list->next = MALLOC_STRUCT(nine_shader_variant);
if (!list->next)
return FALSE;
list->next->next = NULL;
list->next->key = key;
list->next->cso = cso;
return TRUE;
}
static inline void
nine_shader_variants_free(struct nine_shader_variant *list)
{
while (list->next) {
struct nine_shader_variant *ptr = list->next;
list->next = ptr->next;
FREE(ptr);
}
}
struct nine_shader_variant_so
{
struct nine_shader_variant_so *next;
struct NineVertexDeclaration9 *vdecl;
struct pipe_stream_output_info so;
void *cso;
};
static inline void *
nine_shader_variant_so_get(struct nine_shader_variant_so *list,
struct NineVertexDeclaration9 *vdecl,
struct pipe_stream_output_info *so)
{
while (list->vdecl != vdecl && list->next)
list = list->next;
if (list->vdecl == vdecl) {
*so = list->so;
return list->cso;
}
return NULL;
}
static inline boolean
nine_shader_variant_so_add(struct nine_shader_variant_so *list,
struct NineVertexDeclaration9 *vdecl,
struct pipe_stream_output_info *so, void *cso)
{
if (list->vdecl == NULL) { /* first shader */
list->next = NULL;
nine_bind(&list->vdecl, vdecl);
list->so = *so;
list->cso = cso;
return TRUE;
}
while (list->next) {
assert(list->vdecl != vdecl);
list = list->next;
}
list->next = MALLOC_STRUCT(nine_shader_variant_so);
if (!list->next)
return FALSE;
list->next->next = NULL;
nine_bind(&list->vdecl, vdecl);
list->next->so = *so;
list->next->cso = cso;
return TRUE;
}
static inline void
nine_shader_variants_so_free(struct nine_shader_variant_so *list)
{
while (list->next) {
struct nine_shader_variant_so *ptr = list->next;
list->next = ptr->next;
nine_bind(&ptr->vdecl, NULL);
FREE(ptr);
}
if (list->vdecl)
nine_bind(&list->vdecl, NULL);
}
#endif /* _NINE_SHADER_H_ */
|
By now I’m sure you have heard about the issues with Coinbase customers being charged more than once for their original crypto purposes. The whole problem started when the credit card companies changed the way crypto purchases are classified. Instead of being straight purchases, they were classified as a type of cash advance, which brings higher daily fees. However, it appears as though according to Visa, they went back and re-charged old transactions under the new classification, but left the original charges as well. Visa claims this was just a technical error, but I think a closer inspection shows how that is almost impossible and it’s very likely Visa did this as way to damage Coinbase and crypto purchases in general.
As I have written about before here and here, I am 100% convinced that the recent move by banks to deny credit card purchases involving crypto was a hostile move, and not one to protect consumers. I also believe this current “glitch” was also done with the same hostile intention.
So let’s look at the situation. Nobody knows credit card transactions and how they work more than Visa. I find it highly unlikely that they didn’t know that re-charging people and refunding the original charge would cause huge problems for consumers.
Most of us have probably returned goods that we purchased on a credit card. We all know it takes several days for the refund to appear, it is never instant or the same day. Pretty much everybody who has used a credit card knows this simple fact. Yet, we are to believe that Visa didn’t know that re-charging people and refunding the original charge would cause people to have extra funds unavailable in their account? Of course Visa knows that refunds take several days, we all know that. So if you put through a charge on the same day as the refund, there will be extra charges and people will have their accounts showing a much lower balance than they expect, or even overdrawn. And this is exactly what happened.
Bottom line, Visa knows exactly how long it takes charges to get reversed, so they were well aware that adding a duplicate charge while the original one was waiting to be refunded would cause huge issues for most customers. There is NO way they did not know this would happen. It simply defies common sense.
Not only this, Visa knows they won’t get the blame for it, even if they admit it as they now have. The damage to Coinbase has already been done. If a customer buys something from a store and notices they got charged extra, do they blame the store or do they blame Visa? Even if the store tells them it’s Visa’s fault days later, they still blame the store as the charge is from them.
Maybe a few people who are avid crypto people will follow this story until the end to realize Visa is at fault. But the thousands of casual customers will only blame Coinbase, and Visa knew this is exactly how the situation would play out.
Next, Coinbase is opening a rival service to that of Visa and the credit card processing industry called Coinbase Commerce. It allows merchants to accept crypto currencies on a very easy and low cost platform. Coinbase is a big player in the crypto space and them opening up this service is the first shot at traditional online payment gateways. Visa is well aware of this and it doesn’t look like they want to play nice.
But the worst thing about what Visa has done is it has given the banks plenty of ammunition to stop all transactions involving crypto, including wire transfers. This week thousands of customers have called their banks to complain about Coinbase. Major banks can simply block wire transfers and use the excuse that there have been so many complaints and overcharges with Coinbase that they can no longer work with them. It doesn’t make a difference if Visa says it’s their fault. The banks can say the purchases originated from Coinbase and this hasn’t happened with any other merchant they deal with. In fact, this is a scenario I predicted not long ago after the banks banned credit card purchases. So don’t be surprised if you hear about a few banks in the coming weeks refusing to let customers do any business with Coinbase.
As for now it is impossible to know how all this plays out. But it is becoming more an more evident that Visa and the credit card companies are acting outright hostile towards crypto. The banks will most likely survive a crypto revolution, but I think the credit card companies believe they will be the ones with the most to lose if crypto payments become more and more popular. |
Empathy Goes a Long Way
Empathy Goes a Long Way
Today is “Day 4 Empathy” in Chicago as the Ebert Foundation honors late, beloved film critic Roger Ebert on the fifth anniversary of his death. Coincidentally, it is also the 50th anniversary of civil rights activist Dr. Martin Luther King Jr.’s death.
The day is more than an observance; it is a call to action to people across the city, and even across the country, to show more kindness and work towards more understanding with one another. Throughout the day in Chicago, ambassadors from the Ebert Foundation will pass out cards and bracelets to call on people to perform random acts of kindness for others. In addition, Roger Ebert’s wife, Chaz, will take an empathy truck around the city and stop to interview people about what empathy means to them.
About Roger Ebert
On a number of occasions, Ebert spoke about empathy as one of the cornerstones of civilization. This is especially true when thinking about people who are facing difficult battles, like addiction. People fighting addiction who have the support of a strong community demonstrate much higher rates of success. Developing an understanding of where another person might be coming from is necessary to build such communities; it is critical in the journey of recovery.
In his reviews, Ebert talked about the ability of movies to bring about empathy. “When I go to a great movie I can live somebody else’s life for a while. I can walk in somebody else’s shoes,” Ebert once said. “I can see what it feels like to be a member of a different gender, a different race, a different economic class, to live in a different time, to have a different belief.”
That is what great movies do – they transport us to places and situations we never dreamed of experiencing, developing our understanding of the characters, others, and ourselves. |
Q:
Export Failed Element Log(s) after deliver?
When a deliver has been performed I can rightlick an entry in the GUI version/element log and it displays me a popup with the element log. Quite handy.
I now have a delivery with about 25 failed ones and a couple of hundred OK's. Sadly I can not sort on the column "status" so I have to make screenshots wherever I find a [!] to sit together with the specific team to find out if it is really ok to not deliver those.
It would however be handy to have this list of element logs from a deliver so that I do not have to make screenshots or copy the contents of the popup box one by one but just have a list of the failed ones with the element log.
Is there a way to export the element logs from a deliver (so the the ones that show up when you rightclick and choose "Display Element Log") and/or only the ones that gave failures?
A:
Whenever a deliver fails graphically, one possible solution is to resume it through the command line (cleartool deliver -resume), grepping for the "cleartool Error" message.
At least that way, you have a text information to share.
Other than tat, I do not know of a way to export the deliver result directly from the GUI.
|
1. Field of the Invention
The present invention relates generally to animal retrieval devices, and, more particularly, to a pet identification and retrieval device.
2. Description of the Related Art
Pets are a beloved part of many family homes. The warmth, company and affection which they provide is well known. After all, it is said that dogs are man's best friends.
Sometimes, however, that relationship between human and animal is threatened by the disappearance of the animal from the home. This can happen in a number of ways. The animal may be an outside animal, such as a dog or cat, which strays from home and gets lost. Such animals often end up at animal shelters or dog pounds. If the family has moved into a new neighborhood, it is likely that the family pet could get lost in its new surroundings.
Even for indoor pets, there is a chance of the animal being lost, since many animals like to sneak out of a partially open door. Even with attentive and caring owners, the possibility of a lost pet exists.
In this event, it becomes paramount that individuals who find the animal have a simple and effective means to identify the animal and contact its owner.
The previous art includes numerous dog tags. Examples of this type of device include U.S. Pat. No. 4,137,660, issued in the name of Dettmann et al., U.S. Pat. No. 4,091,766, issued in the name of Colliard, and U.S. Pat. No. 3,585,743, issued in the name of Jeffers. These dog tags usually include metal tags engraved with information regarding the animal, or an identification card with written information stored in a plastic sheet located on the collar.
These devices suffer from one or more of the following problems. First, dog tags provide limited space for information on the animal, such as what the animal likes to eat. This is important if the animal must spend the night at the individual's home who found the animal. Second, when the family moves or goes on vacation, the tag must be replaced with a new tag that contains the new address and phone number. Third, the metal tags have a tendency to rust over time. Fourth, the engraved information on the metal tags has a tendency to wear down and become unreadable. Fifth, the tag does little to facilitate calming the animal, other than providing the animal's name so that the individuals who found him or her can use the correct name. Sixth, the paper tags are affected by moisture in the air, such as when the animal is outside in the rain. Such moisture can make the written information unreadable.
U.S. Pat. No. 5,355,839, issued in the name of Mistry, discloses a retrieval device that incorporates a micro cassette recorder into a collar. The problem with the '839 device is that the microcassette can get damaged in the rain or if the dog comes near a magnetic source. Also, the '839 device requires that the individual finding the animal have a micro cassette player to listen to the message and discover the animal's name and its owner's identification. This severely limits the effectiveness of the device.
Digital recorders exist in the previous art. Examples include U.S. Pat. No. 4,815,032, issued in the name of Fujii, U.S. Pat. No. 4,772,873, issued in the name of Duncan, and U.S. Pat. No. 3,430,256, issued in the name of Goodman. In general, such devices are bulky and too large to be used with a dog or cat collar. Such digital technology must be miniaturized so as to fit on a dog or cat's collar.
One device, being sold on the market, incorporates solid-state technology to digitally record a message to be replayed by the individual finding the animal. There are several problems with such a device, however. First, the device is bulky, heavy and cumbersome, making it effective only with bigger animals, such as large dogs. Cats would find the device bulky and uncomfortable. Second, the device is an elongated, hanging from the animal's collar. This swinging motion would be distracting to pets. Also, the swinging motion would increase the chance of the device getting caught on some object and choking the animal. Third, the attachment point for the device to the collar is extremely weak, increasing the risk that the device would inadvertently break free while being worn. Fourth, the device requires that the back plate be removed to record a message. This is difficult for many individuals, such as the young, the elderly and the infirm. Also, whenever the family moves, or takes the pet on vacation, the device must be opened to record a new message. This is a difficult problem given most families do not have the minuscule screw drivers necessary to open the back plate. Fifth, there is no way for the owner to know if the battery is operational, unless the owner opens up the device and tests the battery with electrical equipment.
A search of the prior art did not disclose any patents that read directly on the claims of the instant invention. Consequently, a need has been felt for providing an apparatus and method which overcomes the problems cited above. |
Stereo-thresholds: simultaneity, target proximity and eye movements.
Stereo-thresholds are much higher when adjacent targets are presented without temporal overlap than when they are shown simultaneously. Sequentially presented adjacent targets also evoke small involuntary eye movements toward the newly presented target. Neither of these phenomena is evident with widely separated targets; for sequential presentation of targets 10 degrees apart, stereo-thresholds are only slightly higher (a factor of about 1.5) than for simultaneous presentation; and stable fixation can be maintained. If the differing influence of simultaneity on stereoacuity for adjacent and for widely separated targets arises because adjacent alternating targets evoke eye movements, that effect is apparently not mediated exclusively by displacement of retinal images due to the measured eye movements. It could, however, be due to a general long-term instability of fixation associated with repetitive small involuntary eye movements. |
Jockeying for position among insurers has also led to people jumping from plan to plan hunting for the cheapest deal, which makes it difficult for plans to accurately model expenses or provide cost-saving primary care preventions and interventions that make care more affordable over the long term. Among those who’ve selected plans on the exchanges attrition has been high, with as many as 20 percent failing to pay even the first premium. As the market stabilizes and as people become used to the ACA’s regulations, those patterns should settle down.
Also, proposed premium hikes may not reflect the final premiums, since they are based on a number of factors including regulatory approval. Despite some high proposed premium increases last year and similar warnings about financial ruin, premiums only rose about 8 percent on average. The doom-and-gloom today just might not match up with reality come fall. System-wide costs can be expected to be held in check by the general expansion of coverage, as providers now have a more robust source of funding for low-income patients through Medicaid. Accordingly, the Kaiser Family Foundation reports that hospitals have been seeing reductions in uncompensated care costs.
There is, however, a real case for pessimism. One of the most important ways that Obamacare has controlled costs in the exchanges so far has been the use of “risk corridors,” or payments to insurers whose costs exceed revenue by a certain amount. That provision expires in 2017, though, and its expiration will remove a powerful incentive for exchange insurers to keep premiums low. The risk corridors program has already run into legal challenges as disruptions in funding from Congress have led to lawsuits by big insurers for hundreds of millions of dollars. And if artificially low prices do exist, insurers that have used them and have taken a loss will have very little reason to keep premiums low at the end of the year, now that many competitors have been weakened and the federal government is no longer subsidizing that deflation. In 2017 the training wheels come off.
The Obama administration is also clearly worried about the lack of enrollment from young people and the prominence of short-term insurance plans, two problems that likely go hand in hand. The financial viability of Obamacare’s exchange risk pools hinges upon two things: the sheer number of enrollees and their overall health. Young adults are the most likely adults to be uninsured and the healthiest, which means that their participation is critical to the continued viability of the exchanges. A surge in young-adult enrollment last year brought the exchanges closer to working financially, but it was only a start, and potential premium hikes at the end of this year could make it impossible for more young adults to sign up. Those premium hikes could also erase the surge itself and push many enrolled young adults with unstable means back into the ranks of the uninsured, thus increasing the pressure to increase premiums even more. |
Article content continued
Households’ credit market debt, which includes mortgages, consumer credit and loans, rose by $14.7 billion in the quarter, about half the increase seen in the third, Statscan said.
Mortgage borrowing led the demand for credit in the fourth quarter, rising by $11 billion to a total of $1.1 trillion. In the previous quarter, mortgage borrowing increased by $19.1 billion.
Consumer credit debt stood at $477 billion at the end of 2012.
Worried about stretched personal finances and high housing prices, Canada’s federal government tightened mortgage lending rules four times in the last four years to make it harder for home buyers to take on too much debt in their quest for a home.
The rule changes gradually shorted the maximum mortgage length from 40 years to 25 and put limits on how much people can borrow against their homes, among other measures.
While interest rates are not expected to rise until 2014 – the stiffer lending rules and government warnings about the high debt loads of Canadian households have helped cool the ardor of home buyers, with the hottest markets, including Vancouver and Toronto, feeling a chill.
The growth of household credit slowed to about 3% near the end of 2012, the lowest rate since 1999, and down from about 5.5% through much of the remainder of last year, according to the central bank. |
Oasis Golf Club - Palmer Course
This par-71 course offers you a choice of five different tees and some of the most scenic desert panoramas in Southern Nevada. It's rugged canyon fairways and meticulous contour greens set this course apart as one of the best 18 holes you can play. The Palmer Course has been rated among the "Top 10 You Can Play" by Golf Digest. |
Q:
method can? in javascript file
I get an error when trying to call a method can?
undefined method `can?' for #<#:0xa9a6d0e8>
spr_well_types.js.erb file:
<% if can? :buttoncreate, SprWellType %>
container.append('<div style="margin-left: 5px; float: left;" id="spr_well_type_addrowbutton"><span class="glyphicon glyphicon-plus"></span>Add</div>');
<% end %>
application.html.erb file:
<%= stylesheet_link_tag "application", params[:controller], :media => "all", "data-turbolinks-track" => true %>
<%= javascript_include_tag "application", params[:controller], "data-turbolinks-track" => true %>
assets.rb file:
%w( home
spr_well_types
spr_well_purposes
spr_well_constructions
spr_prod_programs
spr_well_constr_details
carpets
spr_minefields
spr_org_structures
spr_layers
mwp_plan_drillings
planing_drill_wells
spr_drill_rig_types
schedules
devise/sessions
devise/registrations
permissions
).each do |controller|
Rails.application.config.assets.precompile += ["#{controller}.js", "#{controller}.css"]
end
A:
If spr_well_types.js.erb is in your assets pipeline (IE /app/assets/javascripts/...), you'll find that you can't use any of the object-orientated methods inside it.
As mentioned by Martin M, this is because assets are meant to be static (CSS/JS). They can be precompiled so that they have small file sizes (minified) in production.
Using paths and other helpers is acceptable (these won't change), but trying to use methods such as can? simply won't work (they rely on dynamic data).
The simple explanation is that JS is client-side whilst Rails is server-side. JS doesn't have access to the same data as Rails, and thus cannot run methods on non-existent data.
Views
If you wanted to use this type of functionality, you'd have to put it in your views directory, calling it through a controller action.
This server-side javascript is not precompiled, and does have access to the same data as Rails. Thus, with the help of ERB, you can use the object-orientated methods you require.
You've not given enough context for me to know how you're calling the file, but this is an example of what you can do:
#app/controllers/spr_well_types_controller.rb
class SprWellTypesController < ApplicationController
def show
# your code here
respond_to do |format|
format.js #-> app/views/spr_well_types/show.js.erb
end
end
end
#app/views/spr_well_types/show.js.erb
<% if can? :buttoncreate, SprWellType %>
container.append('<div style="margin-left: 5px; float: left;" id="spr_well_type_addrowbutton"><span class="glyphicon glyphicon-plus"></span>Add</div>');
<% end %>
It must be noted that respond_to takes the request mime type, meaning if you want to process both html and js responses, you'll have to send the different requests using their respective method. I can explain more about that if required.
|
controller:
kind: DaemonSet
service:
type: NodePort
|
Drug Cartel Suspected in Massacre of 72 Migrants
A Mexican drug cartel massacred 72 Central and South American migrants within 100 miles of the U.S. border that they were trying to reach, according to an Ecuadorean survivor who escaped and stumbled wounded to a highway checkpoint where he alerted marines, official said Wednesday.
The marines fought the cartel gunmen at a ranch in the northern state of Tamaulipas on Tuesday, a battle that left one marine and three suspects dead. They found the bodies of 58 men and 14 women in a room, some piled on top of each other.
The Ecuadorean migrant told investigators that his captors identified themselves as members of the Zetas drug gang, said Vice Adm. Jose Luis Vergara, a spokesman for the Mexican navy. Authorities believe the migrants were from Honduras, El Salvador, Brazil and Ecuador.
It is the biggest massacre to date in Mexico's drug war and the most horrifying example yet of the dangers faced by immigrants trying to get to the U.S.
"It's absolutely terrible and it demands the condemnation of all of our society," said Alejandro Poire, the government's security spokesman.
Authorities did not say why the gang killed the migrants. Mexico's drug cartels frequently kidnap migrants and threaten to kill them unless they pay fees for crossing their territory. Sometimes, gangs contact relatives of the migrants in the U.S. and demand they pay a ransom.
The bodies were discovered Tuesday when marines manning a checkpoint were approached by a wounded man who said he had been attacked by gang gunmen at a nearby ranch. Officials said the man, Luis Fredy Lala Pomavilla, identified himself an illegal migrant from Ecuador and said he and other migrants had been kidnapped by an armed group and taken to the ranch in San Fernando, a town about 100 miles (160 kilometers) south of Brownsville, Texas.
The scale of the massacre of migrants appeared to be unprecedented even by the gruesome standards of Mexican drug cartels.
It was unclear if all 72 were killed at the same time or why. A federal official, who spoke on condition of anonymity, said investigators believe the victims were killed within recent days.
The navy said it dispatched aircraft to check out the man's report and when the gunmen saw the marines, they opened fire and tried to flee in a convoy of vehicles. One marine and three of the suspects were killed in the shootout.
The youth, who was apparently part of the gang, was handed over to civilian prosecutors.
It was the third time this year that Mexican authorities have discovered large masses of corpses. In the other two cases, investigators believe the bodies were dumped at the sites over a long time.
In May, authorities discovered 55 bodies in an abandoned mine near Taxco, a colonial-era city south of Mexico City that is popular with tourists.
In July, investigators found 51 corpses in two days of digging in a field near a trash dump outside the northern metropolis of Monterrey. Many of those found were believed to have been rival traffickers. But cartels often dispose of the bodies of kidnap victims in such dumping grounds.
The region has been besieged by a turf battle between the Zetas and their former ally, the Gulf cartel.
Mexico's drug violence has surged since President Felipe Calderon dispatched soldiers and federal police to root out drug traffickers from their strongholds in northern Mexico and along the Pacific coast.
More than 28,000 people have been killed in drug-gang violence since the offensive began. |
In a conventional ozonizer, plate electrodes or tubular electrodes are used to provide corona discharge, and air passes through the corona discharge space defined by the electrodes, so that oxygen is converted into ozone. There is provided another type of conventional ozonizer in which one of the electrodes is of movable type, and electric discharge space is defined between the movable electrode and a stationary electrode.
According to such conventional ozonizers it is difficult to process air in the electrical discharge space if the ozonizer is small in size. For example, dusts or moisture contained in the air may be adhered to the electrode surface, so that hydrogen compound is formed. As a result, ozone generating efficiency may be lowered. Further, the hydrogen compound may accidentally perform electrical current collection, so that stabilized ozone generation may not be obtainable by a compact ozonizer.
A conventional rotary type ozonizer is disclosed in Japanese Patent Laid-Open Publication (Kokai) No. 125606/1983. In the publication, on one side of a motor is provided an ozone generating portion while on the other side of the motor is provided a sirocco fan for supplying compressed air into the ozone generating portion. The ozone generating portion comprises a rotor serving as a rotary electrode and a cylindrical body serving as a stationary electrode.
In the above conventional ozonizer, the sirocco fan, the motor and the ozone generating portion are all separated from one another. Therefore, a compact ozonizer may not be obtainable. Particularly, the sirocco fan as a compressed air source requires large volume, so that overall apparatus becomes bulky. Further, sufficient sealability may not be attainable at the rotary portion, to inadvertently provide ozone leakage.
Furthermore, the cylindrical body which serves as the stationary electrode is heated by the high voltage current, which degrades ozone generating efficiency, and a cooling means may be required to cool the cylindrical body. Moreover, a duct is required to provide fluid communication between the sirocco fan and the cylindrical body, so that large numbers of mechanical parts are required to render the resultant apparatus being bulky. Therefore, each apparatus is incapable of installing on a small size electrical equipment such as a refrigerator. |
Comments
Watch BBC’s New Sherlock Trailer Right Now
Yeah yeah, Doctor Who is all the rage this weekend, but for those of us who’ve outgrown our David Tennant jammies and waving a plastic screwdriver around (I swear to God I’m kidding, so please don’t send me nasty letters or destroy my home please and thanks), Steven Moffat’s true achievement is BBC’s superb Sherlock. I can scarcely believe so much time has passed since the heart-stopping conclusion to season 2’s “The Reichenbach Fall,” but here we are. Sherlock’s return is upon us, in more ways than one, and it just got all the more real with this brand new teaser trailer.
What’s most striking about this teaser trailer is that which sits atop John Watson’s upper lip. I’m sure Martin Freeman can overcome the distraction (because he is the best at acting, you see) but it’s certainly what I took away from it. Mustache. Mustache mustache mustache. You’ve also got the smirksome pleasure of seeing Sherlock’s true undisputed nemesis Anderson sycophantically siding with Holmes’ fan club in the wake of his apparent death, as well as a veritable assault of the hashtag #SherlockLives.
Listen up, you. Sherlock is the best. We’ve all had our theories about just how exactly he pulled it off (with mine being that he had a safety net and then a giant cartoon pencil eraser rubbed it out when we weren’t looking), but in less than two months we’ll all be clued in, no doubt in a manner that will dazzle through breathless exposition and likely earn Sherlock a good punch for his efforts. January can’t come soon enough. After all, despite rumors to the contrary… Sherlock lives. |
Leukocyte lysosomal enzymes in Alzheimer's disease and Down's syndrome.
Previous studies suggested the possibility of accelerated lysosomal degradation of brain gangliosides in Alzheimer's disease (AD). As AD pathology affects both neural and nonneural tissues, the aim of this study was to determine possible changes of glycosphingolipid metabolism in available peripheral cells in AD and Down's syndrome (DS). The activities of several lysosomal enzymes involved in catabolism of gangliosides and sulfatides were measured in leukocytes from subjects with dementia of the Alzheimer type, DS, and age-matched controls, by fluorimetry and spectrophotometry using specific substrates. The results showed a statistically significant increase of beta-galactosidase activity in both dementia of the Alzheimer type and DS leukocytes when compared with age-matched controls (p <.01 and p <.05, respectively; Student's t test). Not significantly increased activities of beta-galactosidase, beta-hexosaminidase, beta-hexosaminidase A, and slightly decreased activity of arylsulfatase A were observed in control leukocytes with aging. Our results indicate that a metabolic dysfunction and the acceleration of at least some lysosomal catabolic pathways are present in AD and DS nonneural cells. |
The Courier-Journal
There is a business near my home that I frequent. There is a young Hispanic woman that works there. She is a delight, always courteous, very helpful and maintains a kept appearance. If business is a little slow, she is quite the conversationist. Today, she did not seem herself, I ask if she was doing OK and she teared up. Seems she was very upset that her parents might be deported.
They had been here for quite some time, made an American life, worked and paid taxes while raising three American-born children that are working their way through school. They taught their children to learn to be Americans while maintaining their own heritage. But because we elected Donald Trump, she is realizing the fear of us actually deporting her parents. Is that really who we are? Is that how we want to treat our neighbors? I tried to assure her that it would not likely get that far.
Please help me keep my word. Tell your Congress members that you support a strong border, but do not want to go back so far as to deport those that have already made a life here. Yes, we need to have a controlled border and we need to deport criminals, but not the people whose only crime was to come to America to be Americans and have done no other wrong. They just don’t deserve to have their family torn apart. Stand up for a strong border while maintaining a good heart.
Steve Ford
Prospect, Ky., 40059
Letters | Readers despair after Trump's victory
Letters | Trump's victory: The people have spoken |
Washington Post journalist David Fahrenthold learned a very difficult lesson about what happens when you ignore the four gun safety rules.
In February of 2015, I wrote what I thought was a helpful guide for journalists who wished to have a better understanding of guns and gun laws throughout the U.S. Entitled “14 Things Everyone Should Understand About Guns,” the guide summarized different state and federal gun laws, explained the mechanics of how different guns work, and included a list of ironclad gun safety rules that should be followed at all times, with no exceptions.
I didn’t just want anti-gun journalists to better understand the objects of their hatred. I also wanted them (and everyone else) to know how to safely handle a firearm. That’s why the very first of the 14 items in the article was about the four basic rules of gun safety: 1) Treat all guns as though they are loaded, 2) Never point the muzzle at anything you don’t intend to destroy, 3) Keep your finger off the trigger until your sights are on target and you’re prepared to fire, and 4) Always confirm your target, as well as what’s in front, behind, and around it.
Unfortunately, Washington Post reporter David Fahrenthold did not read that article. How do we know? Because Fahrenthold had to go to the emergency room after he shot himself in the eye with one of his children’s confetti guns:
When I came home from my last TV hit, the kids, ages 4 and 5 months, were asleep. The house was quiet. I was still full of caffeine and do-gooder energy and decided to tidy up.
Among the clutter on the coffee table, I found my 4-year-old’s Party Popper, a bright yellow gun that fired confetti. For some reason, I held the gun up to my eye and looked down the barrel, the way Yosemite Sam always does.
It looked unloaded.
Then, for some reason, I pulled the trigger.
When I got to the ER, I had a swollen face, metal-foil confetti in my hair and a faint odor of gun smoke. Finally, the doctor could see me.
“I shot myself in the eye with a glitter gun,” I said. I showed him the Party Popper, which I had brought with me, in case he wanted to send it off to the National Institute of Morons for further study.
I got home from the hospital with a scratched cornea and a tube of eye ointment. The next day, with some of my dignity permanently lost, I got started on a bigger story.
He’s lucky his dignity is the only thing he lost, because he could’ve permanently lost his vision in that eye. And if he’d been as careless with a real gun as he was with a toy gun, he or someone else might have lost their lives. I don’t highlight this incident to mock Fahrenthold, and I disagree with his characterization of himself as a “moron.” The issue isn’t that he’s stupid, it’s that he was never taught to not do what he did.
The incident is important because it shows just how important it is to know the basic rules of gun safety, even if you don’t own any guns or ever plan to handle one. No responsible gun owner on earth would have done with a toy confetti gun what Fahrenthold did. Let’s go through his incident step by step to point out what he did wrong and how the four basic gun safety rules could’ve prevented what happened.
Mistake #1: “For some reason, I held the gun up to my eye and looked down the barrel, the way Yosemite Sam always does.”
That’s a direct violation of gun safety rule #2: Never point the muzzle at anything you don’t intend to destroy. Had he pointed the gun in a safe direction, nobody would’ve gotten hurt even if he violated all of the other rules. Instead, he pointed it at his eye and guaranteed that if the gun was fired, his eye would be the target.
Mistake #2: “It looked unloaded.”
That’s a violation of gun safety rule #1: Treat all guns as though they are loaded. Had he followed this rule and checked and unloaded the gun, nobody would’ve gotten hurt. Remember: there’s no such thing as an unloaded gun. If you always assume a gun is loaded, you’ll never be forced to explain to a doctor or law enforcement official that you didn’t mean to shoot that person since you thought the gun was unloaded. Always confirm a firearm is unloaded before handling it. If it’s not, unload it immediately.
Mistake #3: “Then, for some reason, I pulled the trigger.”
That’s a violation of gun safety rule #3: Keep your finger off the trigger until your sights are on target and you’re prepared to fire. Or, as the instructors I’ve worked with like to paraphrase it, “Keep your #&$^#&%! finger off the *!^%#@$% trigger you #$#^%! idiot.” Violating rule #3 is the ultimate cause of every negligent firearm discharge. Even if you ignore all the other rules, the gun will not fire a bullet and potentially cause irreparable damage unless someone pulls the trigger. Fahrenthold could’ve walked away unscathed after ignoring rules #1 and #2 if only he had followed rule #3.
The four basic rules of gun safety exist for a reason: to keep you and everyone around you safe. They must be applied religiously at all times, even if you think you’re just playing with a harmless toy gun. Even if you don’t plan on ever owning or handling a gun, you should memorize and obey the four basic gun safety rules at all times. And if you disagree, just ask David Fahrenthold. |
Figure 2: The Vulnerable Function: batchTransfer()
The vulnerable function is located in batchTransfer and the code is shown in Figure 2. As indicated in line 257, the amount local variable is calculated as the product of cnt and _value. The second parameter, i.e., _value, can be an arbitrary 256 bits integer, say 0x8000,0000,0000,0000,0000,0000,0000,0000,0000,0000,0000,0000,0000,0000,0000,0000(63 0’s). By having two _receivers passed into batchTransfer(), with that extremely large _value, we can overflow amount and make it zero. With amount zeroed, an attacker can then pass the sanity checks in lines 258–259 and make the subtraction in line 261 irrelevant. Finally, here comes the interesting part: as shown in lines 262–265, the balance of the two receivers would be added by the extremely large _value without costing a dime in the the attacker’s pocket!
With that, we further run our system to scan and analyze other contracts. Our results show that more than a dozen of ERC20 contracts are also vulnerable to batchOverflow. To demonstrate, we have successfully transacted with one vulnerable contract (that is not tradable in any exchange) as our proof-of-concept exploit (Figure 3).
Figure 3: Proof-of-Concept Exploit against batchOverflow
By the time of writing this blog, we have also made efforts to contact the teams who own these vulnerable contracts. However, with the touted “code-is-law” principle in Ethereum blockchain, there is no traditional well-known security response mechanism in place to remedy these vulnerable contracts! Moreover, with potential values associated with these tokens, we, as a third-party independent security team, unfortunately are not in the position to react by suspending the trading of vulnerable tokens in various exchanges. Fortunately, effectively at 4:12 p.m. GMT+8, OKEx made an announcement to suspend the withdrawal and trading of BeautyChain (BEC), a batchOverflow-affected token. However, other exchanges also need to be coordinated and there still exist other tradable tokens vulnerable to batchOverflow! The presence of non-centralized exchanges with offline trading services might pose additional challenges as they cannot even stop attackers from laundering their tokens.
On the other hand, we might face additional serious complexities. Specifically, it is very likely for an attacker to possess a huge amount of tokens by exploiting these vulnerable contracts.What if she go to a cryptocurrency exchange and start to trade those tokens for ETH, BTC, or even USD? With the extremely large amount of tokens in possession (likely larger than totalSupply in circulation), the attack might easily manipulate the price of related cryptocurrencies. This immediately reminds us the very recent Binance incident [1] happened early last month that the criminal crew drove up Viacoin by controlling Binance customers’ accounts to cash out on the other side.
About US
PeckShield Inc. is a blockchain security company which aims to elevate the security, privacy, and usability of current blockchain ecosystem by offering top-notch, industry-leading services and products (including smart contract auditing). Please contact us at Telegram, Twitter, or Email.
References |
Q:
About symplectic embedding
I never read about the symplectic embeddings. While reading a general math note, I have following question:
Does every symplectic manifold $(M,\omega)$ can be symplectically embedded to some $(\mathbb R^n, \omega_{std})$.
Can I have an counter example of a symplectic manifold which can not be embedded(symplectically)
If questions are stupid and trivial.. I request to provide reference so that I can learn this type of questions.
A:
Your question has a trivial answer and a deeper answer.
First of all, there is an obvious obstruction. The standard symplectic form on $\mathbb{R}^{2n}$ is exact, so if there is an embedding $M \hookrightarrow \mathbb{R}^{2n}$, the cohomology class of $\omega$ has to vanish. In particular, then, $M$ cannot be a closed symplectic manifold. So for instance, $\mathbb{C}P^1$ cannot be embedded symplectically in $\mathbb{R}^{2n}$ for any $n$.
There is a great theorem of Gromov, however, that such topological obstructions are the only obstructions if $M$ is an open symplectic manifold. Such obstructions are also the only obstructions for a codimension 4 embedding. This has to do with Gromov's h-principle. This is a beautiful area of mathematics, and I high recommend the book by Eliashberg and Mishachev (though be careful! it has a fair number of misprints)
I forgot to mention: if you want to embed in $\mathbb{C}P^n$ for $n$ sufficiently large, you can always do it. See for instance this Mathoverflow question and its references:
https://mathoverflow.net/questions/59733/projective-embedding-of-symplectic-manifolds
|
-- Add missing Terokkar Triggers to db
SET @GUID :=40253;
DELETE FROM `creature` WHERE `guid` BETWEEN @GUID AND @GUID+12;
INSERT INTO `creature` (`guid`,`id`,`map`,`spawnMask`,`phaseMask`,`modelid`,`equipment_id`,`position_x`,`position_y`,`position_z`,`orientation`,`spawntimesecs`,`spawndist`,`currentwaypoint`,`curhealth`,`curmana`,`MovementType`) VALUES
(@GUID+0,23102,530,1,1,0,0,-2414.89038,4436.77,163.188354,0.209439516,120,0,0,1,0,0),
(@GUID+1,23102,530,1,1,0,0,-2414.979,4458.585,165.8086,2.80998015,120,0,0,1,0,0),
(@GUID+2,23102,530,1,1,0,0,-2418.69775,4446.772,165.705322,2.18166161,120,0,0,1,0,0),
(@GUID+3,23102,530,1,1,0,0,-2423.714,4453.51563,165.694977,0.575958669,120,0,0,1,0,0),
(@GUID+4,23102,530,1,1,0,0,-2426.56567,4437.25732,168.060211,3.63028479,120,0,0,1,0,0),
(@GUID+5,23102,530,1,1,0,0,-2428.65723,4460.04932,166.3208,0.7679449,120,0,0,1,0,0),
(@GUID+6,23102,530,1,1,0,0,-2432.37817,4444.567,170.260162,4.59021568,120,0,0,1,0,0),
(@GUID+7,23102,530,1,1,0,0,-2432.45435,4434.5835,170.945572,0.820304751,120,0,0,1,0,0),
(@GUID+8,23102,530,1,1,0,0,-2432.74561,4458.09668,166.1593,1.27409029,120,0,0,1,0,0),
(@GUID+9,23102,530,1,1,0,0,-2435.68359,4440.8667,171.700333,4.049164,120,0,0,1,0,0),
(@GUID+10,23102,530,1,1,0,0,-2443.70239,4634.14355,158.2777,0,120,0,0,1,0,0),
(@GUID+11,23102,530,1,1,0,0,-2466.943,4699.982,155.832977,0,120,0,0,1,0,0),
(@GUID+12,23102,530,1,1,0,0,-2482.24243,4661.68066,161.495926,0,120,0,0,1,0,0);
-- Set Terokkar Trigger as Trigger
UPDATE `creature_template` SET `flags_extra`=`flags_extra`|128 WHERE `entry`=23102;
-- Missing Go
SET @GUID :=226;
DELETE FROM `gameobject` WHERE `guid`=@GUID;
INSERT INTO `gameobject` (`guid`,`id`,`map`,`spawnMask`,`phaseMask`,`position_x`,`position_y`,`position_z`,`orientation`,`rotation0`,`rotation1`,`rotation2`,`rotation3`,`spawntimesecs`,`animprogress`,`state`) VALUES
(@GUID,185863,530,1,1,-2466.60474,4700.11963,155.7146,1.81514192,0,0,0,0,120,0,1);
|
// Copyright 2013 Howling Moon Software. All rights reserved.
// See http://chipmunk2d.net/legal.php for more information.
#include <stdlib.h>
#include <stdio.h>
//TODO: Move all the thread stuff to another file
//#include <sys/param.h >
#ifdef __APPLE__
#include <sys/sysctl.h>
#endif
#ifndef _WIN32
#include <pthread.h>
#elif defined(__MINGW32__)
#include <pthread.h>
#else
#ifndef WIN32_LEAN_AND_MEAN
#define WIN32_LEAN_AND_MEAN
#endif
#ifndef NOMINMAX
#define NOMINMAX
#endif
#include <process.h> // _beginthreadex
#include <windows.h>
#ifndef ETIMEDOUT
#define ETIMEDOUT 1
#endif
// Simple pthread implementation for Windows
// Made from scratch to avoid the LGPL licence from pthread-win32
enum {
SIGNAL = 0,
BROADCAST = 1,
MAX_EVENTS = 2
};
typedef HANDLE pthread_t;
typedef struct
{
// Based on http://www.cs.wustl.edu/~schmidt/win32-cv-1.html since Windows has no condition variable until NT6
UINT waiters_count;
// Count of the number of waiters.
CRITICAL_SECTION waiters_count_lock;
// Serialize access to <waiters_count_>.
HANDLE events[MAX_EVENTS];
} pthread_cond_t;
typedef CRITICAL_SECTION pthread_mutex_t;
typedef struct {} pthread_condattr_t; // Dummy;
int pthread_cond_destroy(pthread_cond_t* cv)
{
CloseHandle(cv->events[BROADCAST]);
CloseHandle(cv->events[SIGNAL]);
DeleteCriticalSection(&cv->waiters_count_lock);
return 0;
}
int pthread_cond_init(pthread_cond_t* cv, const pthread_condattr_t* attr)
{
// Initialize the count to 0.
cv->waiters_count = 0;
// Create an auto-reset event.
cv->events[SIGNAL] = CreateEvent(NULL, // no security
FALSE, // auto-reset event
FALSE, // non-signaled initially
NULL); // unnamed
// Create a manual-reset event.
cv->events[BROADCAST] = CreateEvent(NULL, // no security
TRUE, // manual-reset
FALSE, // non-signaled initially
NULL); // unnamed
InitializeCriticalSection(&cv->waiters_count_lock);
return 0;
}
int pthread_cond_broadcast(pthread_cond_t *cv)
{
// Avoid race conditions.
EnterCriticalSection(&cv->waiters_count_lock);
int have_waiters = cv->waiters_count > 0;
LeaveCriticalSection(&cv->waiters_count_lock);
if (have_waiters)
SetEvent(cv->events[BROADCAST]);
return 0;
}
int pthread_cond_signal(pthread_cond_t* cv)
{
// Avoid race conditions.
EnterCriticalSection(&cv->waiters_count_lock);
int have_waiters = cv->waiters_count > 0;
LeaveCriticalSection(&cv->waiters_count_lock);
if (have_waiters)
SetEvent(cv->events[SIGNAL]);
return 0;
}
int pthread_cond_wait(pthread_cond_t* cv, pthread_mutex_t* external_mutex)
{
// Avoid race conditions.
EnterCriticalSection(&cv->waiters_count_lock);
cv->waiters_count++;
LeaveCriticalSection(&cv->waiters_count_lock);
// It's ok to release the <external_mutex> here since Win32
// manual-reset events maintain state when used with
// <SetEvent>. This avoids the "lost wakeup" bug...
LeaveCriticalSection(external_mutex);
// Wait for either event to become signaled due to <pthread_cond_signal>
// being called or <pthread_cond_broadcast> being called.
int result = WaitForMultipleObjects(2, cv->events, FALSE, INFINITE);
EnterCriticalSection(&cv->waiters_count_lock);
cv->waiters_count--;
int last_waiter =
result == WAIT_OBJECT_0 + BROADCAST
&& cv->waiters_count == 0;
LeaveCriticalSection(&cv->waiters_count_lock);
// Some thread called <pthread_cond_broadcast>.
if (last_waiter)
// We're the last waiter to be notified or to stop waiting, so
// reset the manual event.
ResetEvent(cv->events[BROADCAST]);
// Reacquire the <external_mutex>.
EnterCriticalSection(external_mutex);
return result == WAIT_TIMEOUT ? ETIMEDOUT : 0;
}
typedef struct {} pthread_mutexattr_t; //< Dummy
int pthread_mutex_init(pthread_mutex_t* mutex, const pthread_mutexattr_t* attr)
{
InitializeCriticalSection(mutex);
return 0;
}
int pthread_mutex_destroy(pthread_mutex_t* mutex)
{
DeleteCriticalSection(mutex);
return 0;
}
int pthread_mutex_lock(pthread_mutex_t* mutex)
{
EnterCriticalSection(mutex);
return 0;
}
int pthread_mutex_unlock(pthread_mutex_t* mutex)
{
LeaveCriticalSection(mutex);
return 0;
}
typedef struct {} pthread_attr_t;
typedef struct
{
void *(*start_routine) (void *);
void* arg;
} pthread_internal_thread;
unsigned int __stdcall ThreadProc(void* userdata)
{
pthread_internal_thread* ud = (pthread_internal_thread*) userdata;
ud->start_routine(ud->arg);
free(ud);
return 0;
}
int pthread_create(pthread_t* thread, const pthread_attr_t* attr, void *(*start_routine) (void *), void *arg)
{
pthread_internal_thread* ud = (pthread_internal_thread*) malloc(sizeof(pthread_internal_thread));
ud->start_routine = start_routine;
ud->arg = arg;
*thread = (HANDLE) (_beginthreadex(NULL, 0, &ThreadProc, ud, 0, NULL));
if (!*thread)
return 1;
return 0;
}
int pthread_join(pthread_t thread, void **value_ptr)
{
WaitForSingleObject(thread, INFINITE);
CloseHandle(thread);
return 0;
}
#endif
#include "chipmunk/chipmunk_private.h"
#include "chipmunk/cpHastySpace.h"
//MARK: ARM NEON Solver
#if __ARM_NEON__
#include <arm_neon.h>
// Tested and known to work fine with Clang 3.0 and GCC 4.2
// Doesn't work with Clang 1.6, and I have no idea why.
#if defined(__clang_major__) && __clang_major__ < 3
#error Compiler not supported.
#endif
#if CP_USE_DOUBLES
#if !__arm64
#error Cannot use CP_USE_DOUBLES on 32 bit ARM.
#endif
typedef float64_t cpFloat_t;
typedef float64x2_t cpFloatx2_t;
#define vld vld1q_f64
#define vdup_n vdupq_n_f64
#define vst vst1q_f64
#define vst_lane vst1q_lane_f64
#define vadd vaddq_f64
#define vsub vsubq_f64
#define vpadd vpaddq_f64
#define vmul vmulq_f64
#define vmul_n vmulq_n_f64
#define vneg vnegq_f64
#define vget_lane vgetq_lane_f64
#define vset_lane vsetq_lane_f64
#define vmin vminq_f64
#define vmax vmaxq_f64
#define vrev(__a) __builtin_shufflevector(__a, __a, 1, 0)
#else
typedef float32_t cpFloat_t;
typedef float32x2_t cpFloatx2_t;
#define vld vld1_f32
#define vdup_n vdup_n_f32
#define vst vst1_f32
#define vst_lane vst1_lane_f32
#define vadd vadd_f32
#define vsub vsub_f32
#define vpadd vpadd_f32
#define vmul vmul_f32
#define vmul_n vmul_n_f32
#define vneg vneg_f32
#define vget_lane vget_lane_f32
#define vset_lane vset_lane_f32
#define vmin vmin_f32
#define vmax vmax_f32
#define vrev vrev64_f32
#endif
// TODO could probably do better here, maybe using vcreate?
// especially for the constants
// Maybe use the {} notation for GCC/Clang?
static inline cpFloatx2_t
vmake(cpFloat_t x, cpFloat_t y)
{
// cpFloatx2_t v = {};
// v = vset_lane(x, v, 0);
// v = vset_lane(y, v, 1);
//
// return v;
// This might not be super compatible, but all the NEON headers use it...
return (cpFloatx2_t){x, y};
}
static void
cpArbiterApplyImpulse_NEON(cpArbiter *arb)
{
cpBody *a = arb->body_a;
cpBody *b = arb->body_b;
cpFloatx2_t surface_vr = vld((cpFloat_t *)&arb->surface_vr);
cpFloatx2_t n = vld((cpFloat_t *)&arb->n);
cpFloat_t friction = arb->u;
int numContacts = arb->count;
struct cpContact *contacts = arb->contacts;
for(int i=0; i<numContacts; i++){
struct cpContact *con = contacts + i;
cpFloatx2_t r1 = vld((cpFloat_t *)&con->r1);
cpFloatx2_t r2 = vld((cpFloat_t *)&con->r2);
cpFloatx2_t perp = vmake(-1.0, 1.0);
cpFloatx2_t r1p = vmul(vrev(r1), perp);
cpFloatx2_t r2p = vmul(vrev(r2), perp);
cpFloatx2_t vBias_a = vld((cpFloat_t *)&a->v_bias);
cpFloatx2_t vBias_b = vld((cpFloat_t *)&b->v_bias);
cpFloatx2_t wBias = vmake(a->w_bias, b->w_bias);
cpFloatx2_t vb1 = vadd(vBias_a, vmul_n(r1p, vget_lane(wBias, 0)));
cpFloatx2_t vb2 = vadd(vBias_b, vmul_n(r2p, vget_lane(wBias, 1)));
cpFloatx2_t vbr = vsub(vb2, vb1);
cpFloatx2_t v_a = vld((cpFloat_t *)&a->v);
cpFloatx2_t v_b = vld((cpFloat_t *)&b->v);
cpFloatx2_t w = vmake(a->w, b->w);
cpFloatx2_t v1 = vadd(v_a, vmul_n(r1p, vget_lane(w, 0)));
cpFloatx2_t v2 = vadd(v_b, vmul_n(r2p, vget_lane(w, 1)));
cpFloatx2_t vr = vsub(v2, v1);
cpFloatx2_t vbn_vrn = vpadd(vmul(vbr, n), vmul(vr, n));
cpFloatx2_t v_offset = vmake(con->bias, -con->bounce);
cpFloatx2_t jOld = vmake(con->jBias, con->jnAcc);
cpFloatx2_t jbn_jn = vmul_n(vsub(v_offset, vbn_vrn), con->nMass);
jbn_jn = vmax(vadd(jOld, jbn_jn), vdup_n(0.0));
cpFloatx2_t jApply = vsub(jbn_jn, jOld);
cpFloatx2_t t = vmul(vrev(n), perp);
cpFloatx2_t vrt_tmp = vmul(vadd(vr, surface_vr), t);
cpFloatx2_t vrt = vpadd(vrt_tmp, vrt_tmp);
cpFloatx2_t jtOld = {}; jtOld = vset_lane(con->jtAcc, jtOld, 0);
cpFloatx2_t jtMax = vrev(vmul_n(jbn_jn, friction));
cpFloatx2_t jt = vmul_n(vrt, -con->tMass);
jt = vmax(vneg(jtMax), vmin(vadd(jtOld, jt), jtMax));
cpFloatx2_t jtApply = vsub(jt, jtOld);
cpFloatx2_t i_inv = vmake(-a->i_inv, b->i_inv);
cpFloatx2_t nperp = vmake(1.0, -1.0);
cpFloatx2_t jBias = vmul_n(n, vget_lane(jApply, 0));
cpFloatx2_t jBiasCross = vmul(vrev(jBias), nperp);
cpFloatx2_t biasCrosses = vpadd(vmul(r1, jBiasCross), vmul(r2, jBiasCross));
wBias = vadd(wBias, vmul(i_inv, biasCrosses));
vBias_a = vsub(vBias_a, vmul_n(jBias, a->m_inv));
vBias_b = vadd(vBias_b, vmul_n(jBias, b->m_inv));
cpFloatx2_t j = vadd(vmul_n(n, vget_lane(jApply, 1)), vmul_n(t, vget_lane(jtApply, 0)));
cpFloatx2_t jCross = vmul(vrev(j), nperp);
cpFloatx2_t crosses = vpadd(vmul(r1, jCross), vmul(r2, jCross));
w = vadd(w, vmul(i_inv, crosses));
v_a = vsub(v_a, vmul_n(j, a->m_inv));
v_b = vadd(v_b, vmul_n(j, b->m_inv));
// TODO would moving these earlier help pipeline them better?
vst((cpFloat_t *)&a->v_bias, vBias_a);
vst((cpFloat_t *)&b->v_bias, vBias_b);
vst_lane((cpFloat_t *)&a->w_bias, wBias, 0);
vst_lane((cpFloat_t *)&b->w_bias, wBias, 1);
vst((cpFloat_t *)&a->v, v_a);
vst((cpFloat_t *)&b->v, v_b);
vst_lane((cpFloat_t *)&a->w, w, 0);
vst_lane((cpFloat_t *)&b->w, w, 1);
vst_lane((cpFloat_t *)&con->jBias, jbn_jn, 0);
vst_lane((cpFloat_t *)&con->jnAcc, jbn_jn, 1);
vst_lane((cpFloat_t *)&con->jtAcc, jt, 0);
}
}
#endif
//MARK: PThreads
// Right now using more than 2 threads probably wont help your performance any.
// If you are using a ridiculous number of iterations it could help though.
#define MAX_THREADS 2
struct ThreadContext {
pthread_t thread;
cpHastySpace *space;
unsigned long thread_num;
};
typedef void (*cpHastySpaceWorkFunction)(cpSpace *space, unsigned long worker, unsigned long worker_count);
struct cpHastySpace {
cpSpace space;
// Number of worker threads (including the main thread)
unsigned long num_threads;
// Number of worker threads currently executing. (also including the main thread)
unsigned long num_working;
// Number of constraints (plus contacts) that must exist per step to start the worker threads.
unsigned long constraint_count_threshold;
pthread_mutex_t mutex;
pthread_cond_t cond_work, cond_resume;
// Work function to invoke.
cpHastySpaceWorkFunction work;
struct ThreadContext workers[MAX_THREADS - 1];
};
static void *
WorkerThreadLoop(struct ThreadContext *context)
{
cpHastySpace *hasty = context->space;
unsigned long thread = context->thread_num;
unsigned long num_threads = hasty->num_threads;
for(;;){
pthread_mutex_lock(&hasty->mutex); {
if(--hasty->num_working == 0){
pthread_cond_signal(&hasty->cond_resume);
}
pthread_cond_wait(&hasty->cond_work, &hasty->mutex);
} pthread_mutex_unlock(&hasty->mutex);
cpHastySpaceWorkFunction func = hasty->work;
if(func){
hasty->work(&hasty->space, thread, num_threads);
} else {
break;
}
}
return NULL;
}
static void
RunWorkers(cpHastySpace *hasty, cpHastySpaceWorkFunction func)
{
hasty->num_working = hasty->num_threads - 1;
hasty->work = func;
if(hasty->num_working > 0){
pthread_mutex_lock(&hasty->mutex); {
pthread_cond_broadcast(&hasty->cond_work);
} pthread_mutex_unlock(&hasty->mutex);
func((cpSpace *)hasty, 0, hasty->num_threads);
pthread_mutex_lock(&hasty->mutex); {
if(hasty->num_working > 0){
pthread_cond_wait(&hasty->cond_resume, &hasty->mutex);
}
} pthread_mutex_unlock(&hasty->mutex);
} else {
func((cpSpace *)hasty, 0, hasty->num_threads);
}
hasty->work = NULL;
}
static void
Solver(cpSpace *space, unsigned long worker, unsigned long worker_count)
{
cpArray *constraints = space->constraints;
cpArray *arbiters = space->arbiters;
cpFloat dt = space->curr_dt;
unsigned long iterations = (space->iterations + worker_count - 1)/worker_count;
for(unsigned long i=0; i<iterations; i++){
for(int j=0; j<arbiters->num; j++){
cpArbiter *arb = (cpArbiter *)arbiters->arr[j];
#ifdef __ARM_NEON__
cpArbiterApplyImpulse_NEON(arb);
#else
cpArbiterApplyImpulse(arb);
#endif
}
for(int j=0; j<constraints->num; j++){
cpConstraint *constraint = (cpConstraint *)constraints->arr[j];
constraint->klass->applyImpulse(constraint, dt);
}
}
}
//MARK: Thread Management Functions
static void
HaltThreads(cpHastySpace *hasty)
{
pthread_mutex_t *mutex = &hasty->mutex;
pthread_mutex_lock(mutex); {
hasty->work = NULL; // NULL work function means break and exit
pthread_cond_broadcast(&hasty->cond_work);
} pthread_mutex_unlock(mutex);
for(unsigned long i=0; i<(hasty->num_threads-1); i++){
pthread_join(hasty->workers[i].thread, NULL);
}
}
void
cpHastySpaceSetThreads(cpSpace *space, unsigned long threads)
{
#if TARGET_IPHONE_SIMULATOR == 1
// Individual values appear to be written non-atomically when compiled as debug for the simulator.
// No idea why, so threads are disabled.
threads = 1;
#endif
cpHastySpace *hasty = (cpHastySpace *)space;
HaltThreads(hasty);
#ifdef __APPLE__
if(threads == 0){
size_t size = sizeof(threads);
sysctlbyname("hw.ncpu", &threads, &size, NULL, 0);
}
#else
if(threads == 0) threads = 1;
#endif
hasty->num_threads = (threads < MAX_THREADS ? threads : MAX_THREADS);
hasty->num_working = hasty->num_threads - 1;
// Create the worker threads and wait for them to signal ready.
if(hasty->num_working > 0){
pthread_mutex_lock(&hasty->mutex);
for(unsigned long i=0; i<(hasty->num_threads-1); i++){
hasty->workers[i].space = hasty;
hasty->workers[i].thread_num = i + 1;
pthread_create(&hasty->workers[i].thread, NULL, (void*(*)(void*))WorkerThreadLoop, &hasty->workers[i]);
}
pthread_cond_wait(&hasty->cond_resume, &hasty->mutex);
pthread_mutex_unlock(&hasty->mutex);
}
}
unsigned long
cpHastySpaceGetThreads(cpSpace *space)
{
return ((cpHastySpace *)space)->num_threads;
}
//MARK: Overriden cpSpace Functions.
cpSpace *
cpHastySpaceNew(void)
{
cpHastySpace *hasty = (cpHastySpace *)cpcalloc(1, sizeof(cpHastySpace));
cpSpaceInit((cpSpace *)hasty);
pthread_mutex_init(&hasty->mutex, NULL);
pthread_cond_init(&hasty->cond_work, NULL);
pthread_cond_init(&hasty->cond_resume, NULL);
// TODO magic number, should test this more thoroughly.
hasty->constraint_count_threshold = 50;
// Default to 1 thread for determinism.
hasty->num_threads = 1;
cpHastySpaceSetThreads((cpSpace *)hasty, 1);
return (cpSpace *)hasty;
}
void
cpHastySpaceFree(cpSpace *space)
{
cpHastySpace *hasty = (cpHastySpace *)space;
HaltThreads(hasty);
pthread_mutex_destroy(&hasty->mutex);
pthread_cond_destroy(&hasty->cond_work);
pthread_cond_destroy(&hasty->cond_resume);
cpSpaceFree(space);
}
void
cpHastySpaceStep(cpSpace *space, cpFloat dt)
{
// don't step if the timestep is 0!
if(dt == 0.0f) return;
space->stamp++;
cpFloat prev_dt = space->curr_dt;
space->curr_dt = dt;
cpArray *bodies = space->dynamicBodies;
cpArray *constraints = space->constraints;
cpArray *arbiters = space->arbiters;
// Reset and empty the arbiter list.
for(int i=0; i<arbiters->num; i++){
cpArbiter *arb = (cpArbiter *)arbiters->arr[i];
arb->state = CP_ARBITER_STATE_NORMAL;
// If both bodies are awake, unthread the arbiter from the contact graph.
if(!cpBodyIsSleeping(arb->body_a) && !cpBodyIsSleeping(arb->body_b)){
cpArbiterUnthread(arb);
}
}
arbiters->num = 0;
cpSpaceLock(space); {
// Integrate positions
for(int i=0; i<bodies->num; i++){
cpBody *body = (cpBody *)bodies->arr[i];
body->position_func(body, dt);
}
// Find colliding pairs.
cpSpacePushFreshContactBuffer(space);
cpSpatialIndexEach(space->dynamicShapes, (cpSpatialIndexIteratorFunc)cpShapeUpdateFunc, NULL);
cpSpatialIndexReindexQuery(space->dynamicShapes, (cpSpatialIndexQueryFunc)cpSpaceCollideShapes, space);
} cpSpaceUnlock(space, cpFalse);
// Rebuild the contact graph (and detect sleeping components if sleeping is enabled)
cpSpaceProcessComponents(space, dt);
cpSpaceLock(space); {
// Clear out old cached arbiters and call separate callbacks
cpHashSetFilter(space->cachedArbiters, (cpHashSetFilterFunc)cpSpaceArbiterSetFilter, space);
// Prestep the arbiters and constraints.
cpFloat slop = space->collisionSlop;
cpFloat biasCoef = 1.0f - cpfpow(space->collisionBias, dt);
for(int i=0; i<arbiters->num; i++){
cpArbiterPreStep((cpArbiter *)arbiters->arr[i], dt, slop, biasCoef);
}
for(int i=0; i<constraints->num; i++){
cpConstraint *constraint = (cpConstraint *)constraints->arr[i];
cpConstraintPreSolveFunc preSolve = constraint->preSolve;
if(preSolve) preSolve(constraint, space);
constraint->klass->preStep(constraint, dt);
}
// Integrate velocities.
cpFloat damping = cpfpow(space->damping, dt);
cpVect gravity = space->gravity;
for(int i=0; i<bodies->num; i++){
cpBody *body = (cpBody *)bodies->arr[i];
body->velocity_func(body, gravity, damping, dt);
}
// Apply cached impulses
cpFloat dt_coef = (prev_dt == 0.0f ? 0.0f : dt/prev_dt);
for(int i=0; i<arbiters->num; i++){
cpArbiterApplyCachedImpulse((cpArbiter *)arbiters->arr[i], dt_coef);
}
for(int i=0; i<constraints->num; i++){
cpConstraint *constraint = (cpConstraint *)constraints->arr[i];
constraint->klass->applyCachedImpulse(constraint, dt_coef);
}
// Run the impulse solver.
cpHastySpace *hasty = (cpHastySpace *)space;
if((unsigned long)(arbiters->num + constraints->num) > hasty->constraint_count_threshold){
RunWorkers(hasty, Solver);
} else {
Solver(space, 0, 1);
}
// Run the constraint post-solve callbacks
for(int i=0; i<constraints->num; i++){
cpConstraint *constraint = (cpConstraint *)constraints->arr[i];
cpConstraintPostSolveFunc postSolve = constraint->postSolve;
if(postSolve) postSolve(constraint, space);
}
// run the post-solve callbacks
for(int i=0; i<arbiters->num; i++){
cpArbiter *arb = (cpArbiter *) arbiters->arr[i];
cpCollisionHandler *handler = arb->handler;
handler->postSolveFunc(arb, space, handler->userData);
}
} cpSpaceUnlock(space, cpTrue);
}
|
Q:
Polynomial function cannot be solved by Python sympy
I have problems by solving a polynomial function with sympy. The following example shows a case which gives an error message that I cannot manage. If the polynomial gets simpler the solver works properly. Please copy and paste the code to check the error on your system as well.
import sympy
from sympy import I
omega = sympy.symbols('omega')
def function(omega):
return - 0.34*omega**4 \
+ 7.44*omega**3 \
+ 4.51*I*omega**3 \
+ 87705.64*omega**2 \
- 53.08*I*omega**2 \
- 144140.03*omega \
- 22959.95*I*omega \
+ 42357.18 + 50317.77*I
sympy.solve(function(omega), omega)
Do you know how I can achieve a result?
Thank you for your help.
EDIT:
This is the error message:
TypeError Traceback (most recent call last)
<ipython-input-7-512446a62fa9> in <module>()
1 def function(omega):
2 return - 0.34*omega**4 + 7.44*omega**3 + 4.51*I*omega**3 + 87705.64*omega**2 - 53.08*I*omega**2 - 144140.03*omega - 22959.95*I*omega + 42357.18 + 50317.77*I
----> 3 sympy.solve(function(omega), omega)
C:\Anaconda\lib\site-packages\sympy\solvers\solvers.pyc in solve(f, *symbols, **flags)
1123 # restore floats
1124 if floats and solution and flags.get('rational', None) is None:
-> 1125 solution = nfloat(solution, exponent=False)
1126
1127 if check and solution: # assumption checking
C:\Anaconda\lib\site-packages\sympy\core\function.pyc in nfloat(expr, n, exponent)
2463 return type(expr)([(k, nfloat(v, n, exponent)) for k, v in
2464 list(expr.items())])
-> 2465 return type(expr)([nfloat(a, n, exponent) for a in expr])
2466 rv = sympify(expr)
2467
C:\Anaconda\lib\site-packages\sympy\core\function.pyc in nfloat(expr, n, exponent)
2497 return rv.xreplace(Transform(
2498 lambda x: x.func(*nfloat(x.args, n, exponent)),
-> 2499 lambda x: isinstance(x, Function)))
2500
2501
C:\Anaconda\lib\site-packages\sympy\core\basic.pyc in xreplace(self, rule)
1085
1086 """
-> 1087 value, _ = self._xreplace(rule)
1088 return value
1089
C:\Anaconda\lib\site-packages\sympy\core\basic.pyc in _xreplace(self, rule)
1093 """
1094 if self in rule:
-> 1095 return rule[self], True
1096 elif rule:
1097 args = []
C:\Anaconda\lib\site-packages\sympy\core\rules.pyc in __getitem__(self, key)
57 def __getitem__(self, key):
58 if self._filter(key):
---> 59 return self._transform(key)
60 else:
61 raise KeyError(key)
C:\Anaconda\lib\site-packages\sympy\core\function.pyc in <lambda>(x)
2496
2497 return rv.xreplace(Transform(
-> 2498 lambda x: x.func(*nfloat(x.args, n, exponent)),
2499 lambda x: isinstance(x, Function)))
2500
C:\Anaconda\lib\site-packages\sympy\core\function.pyc in nfloat(expr, n, exponent)
2463 return type(expr)([(k, nfloat(v, n, exponent)) for k, v in
2464 list(expr.items())])
-> 2465 return type(expr)([nfloat(a, n, exponent) for a in expr])
2466 rv = sympify(expr)
2467
C:\Anaconda\lib\site-packages\sympy\core\function.pyc in nfloat(expr, n, exponent)
2463 return type(expr)([(k, nfloat(v, n, exponent)) for k, v in
2464 list(expr.items())])
-> 2465 return type(expr)([nfloat(a, n, exponent) for a in expr])
2466 rv = sympify(expr)
2467
TypeError: __new__() takes exactly 3 arguments (2 given)
A:
As I mentioned in the comments I'm not familiar with sympy, but here's how to find the roots of your equation using the arbitrary-precision mpmath module.
In order to avoid precision issues with Python floats, it's usual to pass floats to mpmath in string form, unless it's convenient to construct them from integers. I guess it's not really an issue with your equation, since your coefficients have rather low precision, but anyway...
Here's your equation translated directly into mpmath syntax:
from mpmath import mp
I = mp.mpc(0, 1)
def func(x):
return (-mp.mpf('0.34') * x ** 4
+ mp.mpf('7.44') * x ** 3
+ mp.mpf('4.51') * I * x ** 3
+ mp.mpf('87705.64') * x ** 2
- mp.mpf('53.08') * I * x ** 2
- mp.mpf('144140.03') * x
- mp.mpf('22959.95') * I * x
+ mp.mpf('42357.18') + mp.mpf('50317.77') * I)
mpf is the arbitrary-precision float constructor, mpc is the complex number constructor. Please see the mpmath docs for info on how to call these constructors.
However, we don't need to mess about with I like that: we can just define the coefficients directly as complex numbers.
from __future__ import print_function
from mpmath import mp
# set precision to ~30 decimal places
mp.dps = 30
def func(x):
return (mp.mpf('-0.34') * x ** 4
+ mp.mpc('7.44', '4.51') * x ** 3
+ mp.mpc('87705.64', '-53.08') * x ** 2
+ mp.mpc('-144140.03', '-22959.95') * x
+ mp.mpc('42357.18', '50317.77'))
x = mp.findroot(func, 1)
print(x)
print('test:', func(x))
output
(1.35717989161653180236360985534 - 0.202974596285109153971324419197j)
test: (-3.2311742677852643549664402034e-26 + 6.4623485355705287099328804068e-27j)
But how can we find the other roots? Simple!
Let u be a root of f(x). Then let f(x) = g(x)(x - u) and any root of g(x) is also a root of f(x). We can conveniently do this multiple times by using a for loop that saves each found root to a list and then builds a new function from the previous function, storing this new function in another list.
In this version, I use the "muller" solver, as that's recommended when looking for complex roots, but it actually gives the same answers as using the default "secant" solver.
from __future__ import print_function
from mpmath import mp
# set precision to ~30 decimal places
mp.dps = 30
def func(x):
return (mp.mpf('-0.34') * x ** 4
+ mp.mpc('7.44', '4.51') * x ** 3
+ mp.mpc('87705.64', '-53.08') * x ** 2
+ mp.mpc('-144140.03', '-22959.95') * x
+ mp.mpc('42357.18', '50317.77'))
x = mp.findroot(func, 1)
print(x)
print('test:', func(x))
funcs = [func]
roots = []
#Find all 4 roots
for i in range(4):
x = mp.findroot(funcs[i], 1, solver="muller")
print('%d: %s' % (i, x))
print('test: %s\n%s\n' % (funcs[i](x), funcs[0](x)))
roots.append(x)
funcs.append(lambda x,i=i: funcs[i](x) / (x - roots[i]))
output
(1.35717989161653180236360985534 - 0.202974596285109153971324419197j)
test: (-3.2311742677852643549664402034e-26 + 6.4623485355705287099328804068e-27j)
0: (1.35717989161653180236360985534 - 0.202974596285109153971324419197j)
test: (-3.2311742677852643549664402034e-26 + 6.4623485355705287099328804068e-27j)
(-3.2311742677852643549664402034e-26 + 6.4623485355705287099328804068e-27j)
1: (0.2859569222439674364374376897 + 0.465618100581394597267702975072j)
test: (2.70967991111831205485691272044e-27 - 4.34146435347156317045282996313e-27j)
(0.0 + 6.4623485355705287099328804068e-27j)
2: (-497.86487129703641182172086688 + 6.49836193448774263077718499855j)
test: (1.25428695883356196194609388771e-26 - 3.46609896266051486795576778151e-28j)
(3.11655159180984988723836070362e-21 - 1.65830325771275337225587644119e-22j)
3: (518.104087424352383171155113452 + 6.50370044356891310239702468087j)
test: (-4.82755073209873082528016484574e-30 + 7.38353321095804877623117526215e-31j)
(-1.31713649147437845007238988587e-21 + 1.68350641700147843422461467477e-22j)
In
lambda x,i=i: funcs[i](x) / (x - roots[i])
we specify i as a default keyword argument, so that the value that i had when the function was defined is used. Otherwise, the current value of i is used when the function is called, which is not what we want.
This technique for finding multiple roots can be used for arbitrary functions. However, when we want to solve polynomials, mpmath has a better way that can find all roots simultaneously: the polyroots function. We just need to give it a list (or tuple) of the polynomial's coefficients.
from __future__ import print_function
from mpmath import mp
# set precision to ~30 decimal places
mp.dps = 30
coeff = (
mp.mpf('-0.34'),
mp.mpc('7.44', '4.51'),
mp.mpc('87705.64', '-53.08'),
mp.mpc('-144140.03', '-22959.95'),
mp.mpc('42357.18', '50317.77'),
)
roots = mp.polyroots(coeff)
for i, x in enumerate(roots):
print('%d: %s' % (i, x))
print('test: %s\n' % mp.polyval(coeff, x))
output
0: (1.35717989161653180236360985534 - 0.202974596285109153971324419197j)
test: (6.4623485355705287099328804068e-27 - 6.4623485355705287099328804068e-27j)
1: (0.2859569222439674364374376897 + 0.465618100581394597267702975072j)
test: (0.0 + 0.0j)
2: (-497.86487129703641182172086688 + 6.49836193448774263077718499855j)
test: (-2.27689218423463552142807161949e-21 + 7.09242751778865525915133624646e-23j)
3: (518.104087424352383171155113452 + 6.50370044356891310239702468087j)
test: (-7.83663157514495734538720675411e-22 - 1.08373584941517766465574404422e-23j)
As you can see, the results are very close to those obtained by the previous technique. Using polyroots is not only more accurate, it has the big advantage that we don't need to specify a starting approximation for the root, mpmath is smart enough to create one for itself.
|
An aromatic substance, eugenol induces distinct depressant effects on respiratory activity in different postnatal developmental stages of the rat.
Eugenol modulates neuronal activity through actions on voltage-gated ionic channels and/or transient receptor potential channels. We previously suggested that eugenol inhibited cellular (and/or network) mechanisms essential for the maintenance of the respiratory burst activity in a brainstem-spinal cord preparation from newborn rat (postnatal day 0-3). Study of the distinct effects of eugenol in neonatal and later developmental stage rats may offer new information about postnatal developmental changes of respiratory neuron networks. In the present study, therefore, we compared effects of eugenol in an in vitro newborn rat preparation with those in an arterially perfused in situ preparation from juvenile rat (postnatal day 12-15). In the former preparation, application of 1 mM eugenol decreased respiratory rate and inspiratory burst duration. In contrast, in the latter preparation, 1 mM eugenol induced a gradual decrease in the amplitude of integrated phrenic nerve activity. Phrenic nerve activity gradually recovered at 25-30 min after washout with a burst duration similar to control values. We hypothesized that the depressant effects of eugenol were caused by inhibition of cell excitability in the neonatal rat in vitro preparation but by a reduction of synaptic interactions in the juvenile rat in situ preparation. |
It relates that God created heaven and earth and all things, and how He created them.
When did God create heaven and earth and all things?
God created them “in the beginning,” that is, in the beginning of time.
What do we see from this?
We see from this that the world is not eternal.
Who is eternal?
God alone is eternal.
What does “create” mean?
To “create” means to make out of nothing.
How was it possible for God to create the world if there was nothing out of which to make it?
It was possible because God is almighty.
What do we mean when we say that God is almighty?
When we say that God is almighty, we mean that He can do all things and nothing is hard or impossible to Him.
Why is God called the Creator?
God is called the Creator because He made heaven and earth and all things out of nothing.
In what condition was the earth when God created it?
It was “void and empty,” that is to say, it was not in its present orderly condition and was not inhabited by living beings.
What else do we know about the earth in its primitive condition?
We know that it was covered with water and darkness.
What happened at the creation?
At the creation, “the Spirit of God moved over the waters.”
What did God create on the first day?
On the first day He created the light.
Why did He create the light first?
God created the light first because without light nothing could live.
What did God create on the second day?
On the second day He created the firmament.
What do we mean by firmament?
By firmament we mean the sky.
What else do we understand by firmament?
By firmament we also understand the atmosphere.
What did God create on the third day?
On the third day He created the different bodies of water and the firm land.
How did God do this?
God caused the waters to be gathered together in one place, so that the dry land appeared.
With what did God cover the dry land?
God covered the land with grass, flowers, and fruit-bearing trees.
What happened on the fourth day?
On the fourth day God created the sun, moon, and stars, and placed them in the heavens.
What did God create on the fifth day?
On the fifth day He created fish and birds of every kind.
What did God create on the sixth day?
On the sixth day He created all kinds of animals that inhabit the earth, and last of all man.
What were all things that God created?
All things that God created were good.
Why were they good?
They were good because they answered the purpose for which they had been created.
Why did God create the world?
God created the world for two reasons: (1) For His own honor and glory; and (2) For the benefit of man.
What did God do on the seventh day?
On the seventh day He rested, blessed it, and made it holy.
What does “God rested” mean?
It means that He ceased to create.
What does God still do for the world?
He still preserves and governs it.
How does God preserve the world?
God preserves the world by causing it to continue to exist.
How does God govern the world?
God governs the world by taking care of all things and arranging them so as to carry out His will.
But if God takes care of every one, why does He allow so many to suffer?
God allows many to suffer: (1) To turn the thoughts of the sinner to Himself, that he may be converted and save his soul; (2) That the just may have an opportunity of following in the footsteps of Christ and laying up for themselves treasures in heaven.
How did God bless the Sabbath and make it holy?
God blessed the Sabbath and made it holy by setting it aside for His own special service.
Was Sunday the Lord’s day in the Old Testament?
No, Saturday or the Sabbath was the Lord’s day in the Old Testament.
What day do Christians keep holy?
Christians keep Sunday holy.
Who changed the Lord’s day from Saturday to Sunday?
The Catholic Church changed it.
Why had the Church a right to change it?
The Church had a right to change it, because it is the representative of Christ on earth.
What induced the Church to make this change?
The Church was induced to make this change because Sunday was the day on which her divine Founder rose from the dead, and on which the Holy Ghost descended on the Apostles.
Can Protestants consistently observe Sunday instead of Saturday?
No, because they believe only what they find in Holy Scripture, and Holy Scripture does not tell us to keep Sunday, but the Sabbath.
Which attributes did God manifest in creating the world?
In creating the world, God manifested His almighty power, His wisdom, and His goodness.
What should we learn from this lesson?
We should learn from it to be thankful to God for all He has done for us.
How can we show that we are thankful to God?
We can show that we are thankful to God: (1) By saying our prayers regularly morning and night, before and after meals; (2) By keeping holy the Lord’s day.
How do we keep holy the Lord’s day?
We keep holy the Lord’s day by attending Mass and abstaining from servile works.
MLA Citation
Father John J Nash, DD. “The Creation of the World, and the Institution of the Sabbath”. Practical Explanation and Application of Bible History, 1902. CatholicSaints.Info. 23 May 2018. Web. 19 November 2018. <> |
Former top managers of HBOS could be banned from working in the City after a damning report into the near collapse of the bank seven years ago laid the blame squarely on its former board and senior directors.
At least 10 former executives – including chairman Lord Stevenson and chief executives Andy Hornby and James Crosby – could be subject to formal investigations after a decision not to pursue them before now was described as “materially flawed”.
The business secretary, Sajid Javid, has also been handed a copy of the report prepared by City regulators – to reconsider whether there are grounds to strike off any of the executives as directors of any type of business.
Others who could face investigation include former finance chief Mike Ellis, who is now chairman of Skipton building society, Colin Matthew, who ran the international division of HBOS, and Lindsay Mackay, who ran the treasury operation.
The report was seized upon by the chancellor, George Osborne, to justify sweeping changes to the regulatory regime and pin the blame on the Labour government’s approach to overseeing banks in the run-up to the 2008 crisis.
“This report, from one of our most respected regulators, clearly shows that the collapse of HBOS was caused by those running the bank and those regulating it. It demonstrates that the system of regulation created by the last Labour government failed,” said Osborne.
It is the second time an official investigation has laid blame for the near collapse of HBOS on its bosses. A previous parliamentary report said it was the result of a “colossal failure of management”.
The much-delayed 400-page report into the collapse of the country’s biggest mortgage lender and savings institution describes a boardroom that lacked banking experience and a management team which drove a culture of growth at all costs.
The end result of the bank’s ill-judged lending spree was that HBOS faced bad debts of £45bn – significantly more than the £38bn in losses racked up by the far larger Royal Bank of Scotland.
The bank – which had to be rescued by Lloyds TSB and then bailed out with £20bn of taxpayers’ money during the height of the crisis – “failed to set an appropriate strategy, and also failed to challenge a flawed business model that placed inappropriate reliance on continuous growth without due regard to the risks involved”.
At one point in 2008, when HBOS was facing meltdown, it was reliant on a £25bn Bank of England lifeline to stay in business.
The now defunct City regulator, the Financial Services Authority, was also criticised, both for its approach to overseeing banks in the run-up to the crisis and for the way it decided to only punish one of HBOS executives, Peter Cummings, in the wake of its near collapse.
But the report, first scheduled for publication two years ago and which cost £7m to produce, concluded: “Ultimate responsibility for the failure of HBOS rests with its board.”
It was published alongside a highly critical assessment of the FSA’s decision to investigate only Cummings, who ran the corporate division, which also revealed there were grounds for an investigation into Hornby, now the chief operating officer of Gala Coral.
There is no formal record of why the FSA targeted only on Cummings, who was banned and fined £500,000 in 2012. He complained of “tokenism” at the time.
Andrew Green, the QC who conducted the review of the FSA’s decisions, said it was plainly in the public interest that the decision not to investigate any other former HBOS bosses was reconsidered.
A decision on whether to heed his advice has not yet been taken. Regulators will conduct a review into whether enforcement action should be taken “as early as possible next year”.
The Green report quotes Clive Adamson, the former FSA director of enforcement, saying that “the people most culpable were let off”. In his view those people were Hornby and Stevenson.
While Green has left the door open for a wide investigation into former executives, he concludes that FSA was right not to investigate Crosby, who gave up his knighthood in 2013 along with 30% of his pension.
Green’s report also reveals a breakdown in communication between the City watchdog’s enforcement division, then run by Margaret Cole, and its chief executive Sir Hector Sants, who was not told that there were grounds for a full investigation into Hornby.
Sants’ predecessors, chairman Sir Callum McCarthy and chief executive John Tiner, are also criticised for their approach in the run-up to 2008 crisis. “The FSA’s approach was too trusting of firms’ management and insufficiently challenging,” the report said.
The report acknowledges that the regulatory regime at the time was one of “light touch” and Andrew Bailey, head of the Prudential Regulation Authority, described HBOS and the FSA as “creatures of the time”.
“HBOS was at root a simple bank that nonetheless managed to a create a big problem,” Bailey said. He says the bank was not one that embarked on risky trading activities but overly focused on growth – which is denied by both Crosby and Hornby.
Hornby refused to comment but his employer Gala Coral, the betting business, stood behind him. Skipton building society also backed Ellis, saying he had the “wholehearted confidence of the board”.
In a statement issued by law firm Ashursts, eight former directors rejected the suggestion that an investigation into their conduct was warranted. The eight included Stevenson, who the report said bore “responsibility individually and, collectively and as board member for the failings of the board”.
The former directors said they “disagree with a number of the conclusions of this report, particularly the way in which it downplays the unforeseen and unforeseeable effect of the financial crisis on HBOS”.
But Andrew Tyrie, the Conservative MP who chairs the Treasury select committee, urged the regulators to press on with investigations: “Better late than never … The FCA and PRA should get on with this immediately.”
He also called for further action on auditors KPMG, after the Financial Reporting Council, which polices the accountancy profession, said there were no grounds for an investigation. “The audit process was an important part of the story of HBOS’s failure,” said Tyrie. |
[Release of the lateral structures of the first metatarsophalangeal joint during hallux valgus surgery].
Operations of hallux valgus deformity are very well known in orthopaedic surgery. The important part of these procedures is the release of soft tissue on the lateral side of the first metatarsophalangeal joint. Soft tissue procedures became routinely used in the 1920s and 1930s and several techniques of soft tissue release have been published in the past seventy years. We found several inaccuracies between the anatomy published and the routine clinical performance. The purpose of the study was to describe the anatomy of the first metatarsophalangeal joint's lateral part, especially the adductor hallucis muscle attachment, and to assess to what extent the lateral structures of the first metatarsophalangeal joint should be released to correct hallux valgus deformity. We described and compared the anatomy of the lateral part of the first metatarsophalangeal joint on 30 dissected specimens obtained from cadavers that met the criteria of hallux valgus deformity. The standard preparation method was used for anatomical dissection; whole leg specimens including the pelvic girdle were fixed in formaldehyde, acetone, ethyl-alcohol and glycerol. The detailed course and shape of the adductor muscle attachment was described as well as its relation to the lateral sesamoid bone, lateral portion of the flexor hallucis brevis and the transverse metatarsal ligament. Dissection of the joint's lateral capsule was used to show the course of the lateral collateral ligament, sesamoid ligament and conjoined tendon of the adductor hallucis and flexor hallucis brevis muscles. Subsequently, we released the lateral sesamoid ligament with a standard longitudinal cut and then released the conjoined tendon and lateral collateral ligament at the level of the joint gap in the frontal plane. We evaluated the proposed technique in terms of the extent of soft tissue release and the size of tenotomy necessary to correct the deformity. The mean valgus deformity was 32° (range, 18° to 50°). We were not able to define space between the medial border of the adductor hallucis and the flexor hallucis brevis in 23 cases (77%). The mean size of release was 6.4 mm (range, 5 to 15 mm) and the width of a conjoined tendon at the level of release was 11.2 mm (range, 8 to 15 mm). We did not achieve satisfactory release with our technique in two cases (7%, deviation 45° and 50°). We compared our results with those of similar anatomical studies. We found several inaccuracies in anatomical descriptions of the adductor hallucis attachment. We confirmed the difficulty in separation of the adductor hallucis from the lateral head of the flexor hallucis brevis in total tenotomy of the adductor. Our technique was successful in releasing the first metatarsophalangeal joint's lateral structures. Our study showed than even partial tenotomy of the conjoined tendon of the adductor hallucis and flexor hallucis brevis muscles is successful in correcting hallux valgus deformity. The release has to be combined with release of the lateral sesamoid ligament. |
Buyers were getting an average discount of 11% from the original asking price, the report said, while properties spent an average of 390 days on the market.
The priciest deal was for a full-floor co-op unit at 640 Park Ave., on the Upper East Side. The six-bedroom apartment was asking $21 million, reduced from the $25 million it was first listed for in February last year. It has 14 rooms, three fireplaces and overlooks Park Avenue.
The second most expensive contract signed was for a duplex condo at the newly developed 565 Broome SoHo, a Renzo Piano-designed building that has seen a luxury contract signed on one of its apartments in four out of the last five weeks.
DISCLAIMER: The currency conversion is provided for illustration purposes only. It is meant only as an approximation based on the latest information available and should not be relied upon for any other purposes. We are not responsible for any loss that you may incur as a result of relying on these currency conversions. All property prices are as stated by the listing agent.
For the optimum Mansion Global experience, please turn off any ad blockers and refresh this page. |
Determinants of Severe Metabolic Bone Disease in Very Low-Birth-Weight Infants with Severe Bronchopulmonary Dysplasia Admitted to a Tertiary Referral Center.
Nonrespiratory comorbidities are common among preterm infants with severe bronchopulmonary dysplasia (BPD) referred to tertiary perinatal centers. We evaluated the incidence, severity, and risk factors for metabolic bone disease (MBD) in this population. We conducted a retrospective cohort study of all infants born ≤ 1,500 g who were diagnosed with severe BPD in our single, tertiary referral center between September 2010 and October 2012. MBD severity was classified by serial radiography. Among the 83 infants diagnosed with severe BPD, 26 (31%) developed severe MBD (rickets). Male gender and lower gestational age and birth weight were associated with increased odds of severe MBD. After adjustment for these potential confounders, cytomegalovirus infection, postnatal growth restriction, surgical necrotizing enterocolitis, and blood culture confirmed sepsis were associated with increased odds of severe MBD. The cumulative duration of therapy with furosemide, hydrocortisone, and prednisolone each correlated with significantly greater probability of severe MBD. Severe MBD was common in this referral-based cohort with severe BPD. The high incidence in this population is likely explained by the coexistence of multiple exposures and comorbidities associated with bone demineralization. |
NLRB v. Hearst Publications
NLRB v. Hearst Publications, 322 U.S. 111 (1944), was an administrative law case heard before the United States Supreme Court. The case concerned the meaning of the term "employees" in the National Labor Relations Act (NLRA).
Background
Hearst Publications (Hearst), the publishers of four daily Los Angeles newspapers, refused to bargain collectively with their newsboys. The newsboys filed petitions with the National Labor Relations Board (NLRB) for certification as a local union. The NLRB found that the newsboys were full-time employees within the meaning of the NLRA and ordered Hearst bargain with the newsboys. The United States Court of Appeals for the Ninth Circuit refused to enforce the order, reasoning that the newsboys were independent contractors, rather than employees.
Decision of the Court
Justice Rutledge, delivering the opinion of the court, ruled that the NLRB's interpretation of the Act was not erroneous. The court held that when an administrative agency engages in "specific application of a broad statutory term in a proceeding in which the agency administering the statute must determine it initially, the reviewing court's function is limited." The newsboys were employees within the meaning of the Act, with whom Hearst was required to collectively bargain.
Dissent
Justice Roberts, dissenting, wrote that "the question of who is an employee, so as to make the statute applicable to him, is a question of the meaning of the Act and, therefore, is a judicial and not an administrative question."
National Labor Relations Board v Hearst Publications, Inc is a US labor law case, concerning the scope of protection for employees under the National Labor Relations Act 1935.
Facts
Newsboys, who distributed papers on the streets of the city of Los Angeles, formed a union to collectively bargain over wages. They claimed they were 'employees' under the National Labor Relations Act 1935. They alleged their employers were Hearst Publications Inc, which owned the Los Angeles Examiner and the Los Angeles Evening Herald and Express, as well as the Los Angeles Times. The National Labor Relations Board determined that the newsboys were employees, as they worked continuously, regularly and relied on their earnings to support themselves and their families. The publishers dictated the buying and selling prices, fixed their markets, controlled their supply of papers, supervised their work hours and effort, and gave them sales equipment for the publishers' benefit. The NLRB then designated the full-time newsboys and 'checkmen' to be a bargaining unit within the city, excluding temporary, casual and part-time newsboys and bootjackers. The newspapers argued that under common law standards, their control over the newsboys made them no more than independent contractors, so that they were not 'employees' and had no duty to bargain in good faith under the National Labor Relations Act 1935.
Judgment
The Supreme Court held that the Act's history, context and purposes should be taken into account when determining whether someone is an employee, not just common law standards, local law or legal classifications made for other purposes. The NLRB's determination that someone is an employee may not be set aside if it has a reasonable legal basis. Its identification of bargaining units was within its discretion, including its exclusion of suburban newsboys on the ground that they were not in the union.
Rutledge J gave the court's judgment.
Reed J concurred, and said the NLRB had the definition of 'employee' correct.
Roberts J dissented, stating his view that the newsboys were not employees.
See also
Newsboys Strike of 1899
List of United States Supreme Court cases, volume 322
US labor law
References
External links
Category:United States Supreme Court cases
Category:United States administrative case law
Category:United States labor case law
Category:1944 in United States case law
Category:National Labor Relations Board litigation
Category:Hearst Communications
Category:United States Supreme Court cases of the Stone Court
Category:Newspaper strikes |
Yang's parents are Yang Gwan-gwon and Ki Suk-hyang.[3] Their impoverished family previously lived in one of Gwangju's shantytowns, before relocating to North Jeolla Province's Gochang, in South Korea's countryside, in 2010, after his father, a construction worker, suffered from serious injuries.[3] His family currently lives in a makeshift converted greenhouse constructed from PVC pipes.[2] After Yang's father lost his job, Yang supported the family with a modest income from the Korea Gymnastic Association.[4] Yang's coach Cho Sung-doe admitted that he had been unaware of the family's precarious financial situation before Yang won the gold medal.[4] |
This invention related to shoulder supports and is more particularly directed to an acromioclavicular support for humans, particularly useful in treating and retaining in position most degrees of ligamentous ruptures.
Typically, there are three degrees of acromioclavicular (hereinafter referred to as "a/c") sprains:
(1) first degree, where there is a very slight tearing of the a/c ligamentous fibers, resulting in localized pain over the a/c joint;
(2) second degree, where there is a greater tearing of these a/c ligaments and greater disability and more substantial pain upon motion; and
(3) third degree, where there is severe ligamentous sprain in which one or more of the ligaments have been completely ruptured or torn, and there is dislocation of the clavicular.
In each of these degrees of a/c sprain, the clavicle is in misalignment with the acromion and the ligaments therebetween are injured, from mere misalignment of the first degree, where there is slight separation but the shoulder parts are still co-planar, to the second degree, where there is partial separation and the clavicle and acromion are out of alignment and the shoulder parts are no longer co-planar, and to the third degree, where there is complete separation and misalignment of the clavicle and the acromion.
Frequently, these conditions, which often result from sports injuries, are treated surgically, because treatment requires long term healing, and sometimes relatively complete immobility, for six weeks or more. Such surgical procedures often result in a stiff shoulder because a pin is inserted in the shoulder joint or a fusion of the joint is made to hold the a/c in position relative to the clavicle.
Only careful and patient tending to these injuries can allow recovery, because of the need to immobilize the shoulder during healing and to apply specific pressure to the a/c for a relatively long term. Known supports do not have the ability to draw the a/c to the clavicle. Such supports may be too high on the shoulder or they may slip out of position or they are not suitable for long term wear or they apply improper pressure to one side or the other of the joint.
The support embodying the present invention provides a firm fixation of the a/c articulation and retains the a/c dislocation and its sprain in anatomical apposition. Such a preferred support will maintain sufficient pressure upon the a/c separation to retain the sprained area in healing configuration. The preferred support will not immobilize the shoulder girdle completely or as a result cause atrophy and weakness of the girdle muscles to occur during immobilization.
A preferred a/c support following the teachings of the present invention has an abdominal belt and straps, one end of each of which is slidably connected to the belt, which rise from the front and rear sides of the belt and are adjustably secured to a pad dimensioned for covering the a/c joint, and the free end or distal portion of each strap is secured to the belt by means of an adjustable buckle spaced apart from the other distal strap slidable connection end. Through such a device, the pad is maintained under sufficient pressure to heal the a/c joint, because the straps may be adjusted to properly distribute belt pressure upon the shoulder pad and to provide tension of the shoulder pad upon the separated a/o articulation and retain its apposition.
The support embodying the present invention is not for use on a fracture of the clavicle or for sterno clavicular separation, but is intended for use strictly in a/c separations where distributed downward pressure and tension from the front and rear of the patient can promote healing of the a/c joint.
Adjustable straps also permit the strap lengths to be changed as necessary for use with patients of greater or lesser height or more or less abundant structure, giving the support embodying the present invention great versatility for reuse by different persons. |
For 45 days, jurors in the Jodi Arias murder trial have sat in the courtroom, listen to the lurid tales of the adventurous sex life of Jodi and Travis Alexander, who she admittedly murdered on June 4th, 2008. They have heard the grisly details of the murder, how he was stabbed 27 times, shot in the head, and slashed across the throat. They have heard Jodi tell of abuse she suffered at the hands of this man, who all friends and relatives remember as a wonderful person, as well as abuse by her parents and other boyfriends. They have heard testimony from witnesses on both sides, most recently domestic violence “expert” Alyce LaViolette.
In court on Thursday, LaViolette answered questions from the jury. Arizona is one of the few states where the jury is allowed to ask questions of the witnesses, in this case read by the lovely judge Sherry Stephens. Off topic for a minute, many people are complaining about Judge Stephens lack of control over the courtroom. However, the defendant is still alive, not murdered by any of the court spectators, and everything seems to be going smoothly, regarding the testimony being given, so what’s the problem? And back to it. The expert was asked questions about her time with Jodi Arias, her assessment that Jodi was a survivor of domestic violence, and whether or not she had affection for the defendant. A similar question was posed to the previous witness in this case, Richard Samuels, who had given Jodi a self help book. LaViolette was also asked about Jodi’s truthfulness, and her manipulative behavior.
Alyce LaViolette, whether her expert opinion was paid for or not, has said that she believes Jodi was a domestic violence victim at the hands of Travis Alexander. She read through their journals, emails, text and instant messages and formed this opinion, which is not a very popular one. Most people would rather believe that Jodi is just a sociopath who murdered her lover in a jealous rage, which is just as likely true. The thing is, neither Jodi or Travis was completely honest, even in their journals, which would normally be the one place where your innermost thoughts are safe. He kept his sexcapades with Jodi well under wraps, with the rest of the Mormon community believing that he was a 30 year old virgin. He was not a perfect person. But the problem wasn’t just him, nor was it her; it was them. Together, they were toxic.
Overall, the juror questions were well thought out, scads better than the ridiculous questions they posed to the defendant, after her 18 days on the stand. More juror questions will be presented to Ms. LaViolette on Friday, a day normally blacked out for this trial. That’s part of the reason they are only on day 45, with the trial starting 3 and a half months ago. How much longer will the defense drag this out? Their stall tactics are just more and more obvious, as they try to keep Jodi off death row.
Bookmark this link for continued coverage of this story and many others. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.