text
stringlengths
8
5.77M
Platinum electrode noise in the ENG spectrum. The noise from Pt electrodes has not been measured before. We measured the impedance and noise between pairs of Pt electrodes in cylindrical cells within frequency bands which contain the electroneurogram band (ENG, 500-10 kHz). The results show that the noise from the Pt-saline interface and also the volume conductor are the same as the thermal noise from the real part of those impedances. This means that Pt electrodes are convenient for neural recording because the total source noise from the electrodes and the volume conductor (tissue) can be estimated from the measured total impedance and calculating the thermal noise associated with the resistive part. This differs from Ag/AgCl electrodes for which the interface noise has been reported to be higher than the thermal noise, and therefore calculation of the total noise will be more difficult.
c = -0*g + 5*g - 10 for g. 2 Suppose 4*g - 33 = g + 3*k, 44 = 4*g + k. Let t = g - 7. Solve 0 = t*b + 11 + 1 for b. -3 Let d be (-669)/(-27) + 4/18. Solve -z = 4*z + d for z. -5 Let s = 2 + -2. Let r(p) = p**2 + 6*p + 1. Let g be 7/(1/1*-1). Let u be r(g). Solve s = -4*x + 2*x + u for x. 4 Let g = -13 - -23. Solve -t - g + 5 = 0 for t. -5 Suppose 0 = -2*y - 5*b + 5, 4*y - 3*b = -y + 28. Solve -y*f - 12 = -f for f. -3 Let q = -11 - -10. Let w be (q/(-1))/((-2)/(-4)). Solve 7*c = w*c for c. 0 Let d = 7 + -4. Suppose -10 = 5*w, d*r - 5*w + 0*w - 22 = 0. Solve 0 = r*c - 24 + 8 for c. 4 Suppose 2*f + 4 = -6. Let m be f/((-5)/21) + -1. Solve 5*g - g = m for g. 5 Suppose 2*f - 4*f = -4. Suppose -5*s + 11 = -d, f = -2*s - 5*d + 1. Solve 3*p + s = -4 for p. -2 Let i be 2/8 + (-7)/(-4). Let v(w) = 5 + 4*w**2 - 4 + 3*w**i. Let c be v(1). Solve -g - c = -5*g for g. 2 Let n be (-5)/15*(-1 - -1). Let l be 2 + (-1)/3*n. Solve -l + 1 = z for z. -1 Let t(a) = a + 7. Let f be t(-5). Suppose 0 = f*k + 5*x - 2, 3*k = x - 0 + 3. Solve k = -h - 1 for h. -2 Let a(c) = c - 1. Let o be a(1). Let d be 5/2 - 3/6. Suppose 0 = -d*u - o*u. Solve 3*s - 6 + u = 0 for s. 2 Let h = -3 + 5. Suppose 5*b + 2*w - 2 = 0, -h*w + 3*w + 6 = b. Solve -10 + 2 = b*g for g. -4 Let o = 49 + -34. Solve o = -4*r - r for r. -3 Suppose 0 = w - 2*w. Suppose w = -3*c + 5*c. Let d = 7 + c. Solve -5 = 3*i + d for i. -4 Let w be 9/1*(-6)/(-9). Let j = -2 + w. Solve j*z + 14 + 2 = 0 for z. -4 Suppose 4*g - 1 - 3 = 0. Solve k - 1 - g = 0 for k. 2 Let s(k) = 2*k**2 - 6*k + 7. Let h be s(2). Suppose -2*d + 124 = -76. Suppose -2*w + d = 3*w. Solve -2*q + w = h*q for q. 4 Suppose 3*k - 3*h = -1 + 40, 0 = -5*h - 20. Let t = 13 - k. Suppose t*i - 5 = 3. Solve 3*x - i*x + 5 = 0 for x. -5 Let g(k) = k. Let v(u) = u**2 + 5*u - 3. Let c(p) = -4*g(p) + v(p). Let j be c(-3). Let l = -7 + 12. Solve -j + 23 = -l*r for r. -4 Let h(i) be the first derivative of -i**4/4 + i**3 + 1. Let u be h(3). Let j be (-110)/(-14) - ((-40)/35)/8. Solve u = r + r + j for r. -4 Suppose 3*w + 2*a + 2 = 7*a, 3*w + 3*a + 42 = 0. Let r be 10 + w - 11*-1. Solve -13 = 5*d + r for d. -5 Let q(v) be the second derivative of v**3/6 - 7*v**2/2 - 2*v. Let y be q(6). Let z(m) = -9*m**3 - m**2 + 1. Let k be z(y). Solve -b - k = -4*b for b. 3 Suppose -8*j + 41 = 9. Solve 0*b + b - j = 0 for b. 4 Suppose -4*l - 2*x + 2 = -4*x, -l + 2 = x. Solve 2*b + 1 + l = 0 for b. -1 Suppose 5*d + 29 = -r, -4*r - d - 40 = 133. Let v be 16/(2 - (-16)/(-6)). Let j = v - r. Solve -j = 6*g - g for g. -4 Let w(g) = -3*g**2 - 7*g - 5. Let s(a) = a**2 + 3*a + 2. Let p(q) = 5*s(q) + 2*w(q). Let u be p(3). Let m be 1 + 2*3/u. Solve m*l + 3 = 3*l for l. 1 Let p = -21 - -22. Let q be (-1 - -16)/((-3)/(-2)). Solve 0 = 3*s + p - q for s. 3 Let z be (36/8)/(-9)*-16. Solve 5*s = 2 + z for s. 2 Suppose -t - 4*g - 5 = -1, -4*t - 3*g = 81. Let w be (-3)/9*t/2. Solve 3 = w*i - 3*i for i. 3 Let j = 31 - 19. Suppose -i - 32 = -4*q - 4*i, 0 = -3*i + j. Suppose 17 + 8 = q*p. Solve -3*a - p = 2*a for a. -1 Let p(g) = g**3 + 5*g**2 + 6*g + 9. Let i be p(-4). Solve 5*f = 21 - i for f. 4 Let i = -82 + 82. Solve i = -2*h + h for h. 0 Let z(x) = x**3 - 6*x**2 - 6*x - 6. Let w be z(7). Suppose w = -d + 3. Suppose g + 4 = d*g. Solve -g*p + 13 = -3 for p. 4 Suppose -20 = -y - 5*l + l, -2*l - 12 = -5*y. Solve -y*s + 9 - 1 = 0 for s. 2 Suppose 6 = -26*w + 29*w. Solve -2*x = w*x - 20 for x. 5 Let g be 0/((3 - 2) + 1). Suppose 4*c = -2*x + 7*x + 40, g = -2*x. Solve -7*l = -2*l - c for l. 2 Let a = 40 - 9. Suppose -5*x - 4*h = -31, -4*h = 3*x - 0*h - 25. Suppose 2*k + f + 0*f = 13, -a = -4*k - x*f. Solve -3*g - 4 = -k*g for g. 4 Let f(a) = -a + 13. Let v be f(12). Solve -15 - v = -4*q for q. 4 Suppose -5 = 2*o - 11. Solve -o*u - 3 - 6 = 0 for u. -3 Let l = 4 + -2. Suppose 0*w + 4 = l*w. Suppose -2*k = -5*j - 10, -w*k - j = -4*k + 18. Solve 4*r = -r - k for r. -2 Suppose u + 25 = 4*s + 8, -4*s = u - 23. Suppose -r + 9 = 5. Solve t = s - r for t. 1 Suppose 0 = -4*d - 8 - 0, -3*z + 4*d + 62 = 0. Let s = 30 - z. Solve 13 = -5*l - s for l. -5 Suppose -3*g - 2*x + 17 = 0, 2*x - 15 = -5*g + 8. Solve 0 = g*v + v for v. 0 Suppose 16 = 5*j + 2*y + 3, -9 = -j - 2*y. Solve 3*l - j = -4 for l. -1 Let h = 2 + 3. Suppose -25 = -3*m + 5*j, 2*m - 9 = h*j + 16. Solve 5*b - 10 + 25 = m for b. -3 Let l(o) = o**2 - 111. Let t be l(0). Let k = t - -158. Let d = -27 + k. Solve m + 4*m = d for m. 4 Suppose -20 = -36*p + 26*p. Solve 5 = -p*v + 7 for v. 1 Let h(c) = -2*c**2 - 40*c + 2. Let i be h(-20). Solve -1 = i*w + 7 for w. -4 Let z(g) = 5*g**2 + g - 2. Let m(r) = r**2 - 1. Let t(v) = 6*m(v) - z(v). Let q be t(-2). Solve q*p = -10 + 2 for p. -4 Suppose 5*m - 3*p = 70, -3*m + 31 + 27 = -5*p. Solve 14 = 5*v - m for v. 5 Let f be 76/18 - 4/18. Suppose 6 - 16 = -2*c. Suppose 5*s - 2*v - 7 = 0, 0*s - 2*s = -v - 2. Solve -s*w = -c*w - f for w. -2 Let o = -23 - -28. Solve -3*b - o = 1 for b. -2 Let h(z) = z**2 - 4*z. Let s be h(4). Solve -4*j - 20 = -s*j for j. -5 Let j be 0*1/(-2)*-1. Suppose -5*x = 4*n + 5, -2*x - 2 = 5*n - j*n. Let a = -1 - -11. Solve n*g - 5*g = -a for g. 2 Suppose -c - 2*h = -0*h, -2 = 2*h. Solve -c*n = 11 - 1 for n. -5 Let v(o) = -o**3 - o**2 + 3*o + 1. Let k be -1 + (-2)/(-2) + -3. Let r be v(k). Solve 4*b = -b + r for b. 2 Let j be (-3 + 3)/(-4) + 3. Suppose -2*g = j*g. Solve g*i = -i for i. 0 Let s be 1/(-2) + (-15)/(-6). Solve s*i - 3 = i for i. 3 Let k be (-2 - 3)*(-8)/10. Let f be 2/4 + 10/k. Suppose -2*w + 55 = f*u, -u - w = 2*u - 50. Solve -u = 3*p - 3 for p. -4 Let w = 31 + -9. Suppose 3*n - 5*n = 4*f - w, 2*f = -5*n - 1. Solve -5*j + f = 22 for j. -3 Let p(k) = k. Let z be p(4). Solve 0 = 3*b - z*b - 4 for b. -4 Let w be 0*2*(-3)/12. Suppose -3*j + w*j = 0. Suppose -95 = -5*m - 4*h, -3*m + 3*h = -0*h - 30. Solve 5*c - m = -j*c for c. 3 Let u be ((-2)/2)/(2/(-6)). Suppose -u*a - 2 - 1 = 0, 3*g = -2*a - 2. Solve g + 2 = -l for l. -2 Suppose 2*f + 2*y - 10 = -2, 5*f + 3*y - 20 = 0. Suppose 7 - 1 = b - 4*k, 16 = 2*b - f*k. Suppose 0 = 3*p - b - 8. Solve 0 = -3*d - p + 3 for d. -1 Let r = 4 + -6. Let p = 6 + r. Solve 2*i + 2*i + p = 0 for i. -1 Let y(v) = v**2 + 5*v + 2. Let m be y(-5). Solve 6 = a + m*a for a. 2 Let a be 3 - (3 + 0 + -1). Solve 0 = h - 0*h - a for h. 1 Suppose -3*f - 2 + 11 = 0. Suppose n - f = 2. Suppose 3*a - 2*y - 18 = -n*y, 3*a + 2 = 2*y. Solve a*s = 5*s for s. 0 Let l be -1 - 5/((-10)/4). Let v = 18 + -11. Suppose -f - b + 3*b = v, 3*f - 11 = -2*b. Solve 2*y - l = f for y. 1 Let i be 10/50 + 24/5. Solve -15 = 4*j + i for j. -5 Let b(t) = -5*t**2 + t. Let k be 12/(-10) - (-5)/25. Let s be b(k). Let d be (4/s)/((-4)/30). Solve 2*i - d*i + 12 = 0 for i. 4 Let u(o) = -3*o. Let r be u(-2). Suppose r = 3*v - v. Let b(q) = -2*q - 2. Let m be b(-2). Solve v = -l - m*l for l. -1 Suppose 2*u = -5*i + 16, -5*u + 2*i = -3 - 8. Solve u*t + 8 = -t for t. -2 Suppose 55*w - 54*w = 1. Solve -1 - w = 2*f for f. -1 Suppose j = -s, j + 2*j + 9 = 0. Suppose 0 = 3*p + d + 1, 2*p = s*d - 11 + 3. Let r(q) = -2*q. Let x be r(p). Solve -x*u = -u + 5 for u. -5 Let x(r) = -2*r**3 + r**3 + 5*r**2 + 6*r - 2 + 5. Let b = 0 - -6. Let f be x(b). Solve -f*u + u = 0 for u. 0 Let b(f) = f + 2. Let k(h) = h + 2. Let s(v) = 2*b(v) - 3*k(v). Let g be s(-6). Suppose 0 = 2*y - g + 2. Solve -3*z = 16 - y for z. -5 Suppose -2*s + 22 = 5*d - 5*s, 3*s = -4*d - 4. Let i = 9 - 5. Solve m + i - d = 0 for m. -2 Suppose -4 = 3*h - 5*h. Suppose h*k - 5*k + 9 = 0. Solve -k = 3*g - 9 for g. 2 Let b be ((-12)/(-14))/(5/35). Let i = -4 + b. Let z be -3 - (-4)/i - -3. Solve 6 = -z*w - 0 for w. -3 Let f(o) = o**3 + 5*o**2 + 2. Let i be f(-5). Suppose -5*u + 10 = 4*b, 8 = i*u + 2*u + 3*b. Solve u = 2*j - 2 for j. 2 Suppose 3*o + 5 = 17. Solve o*q - 3 = 5 for q. 2 Let k = -96 - -100. Solve 2 + 6 = -k*g for g. -2 Let q = 20 + -10. Suppose -2*k + 5*k - 15 = 0. Solve -n + k - q = 0 for n. -5 Let t(x) = -x**3 - 5*x**2 - 5*x - 4. Let o be t(-4). Suppose 0*i - 2*i = -6. Solve o = i*p + 12 - 0 for p. -4 Let v = -3 - 9. Let m be 3 - 2 - (-2 + v). Solve -z + 6*z = m for z. 3 Let w = -93 + 98. Solve 0 = -0*n - w*n for n. 0 Let d be (0/(-3))/(-3) + (8 - 4). Solve d*w + 6 = 2*w for w. -3 Suppose 4*h - 72 = 4*q + q, -5*h + q = -111. Let v
<h1>Editing Star</h1> <%= render 'form' %> <%= link_to 'Show', @star %> | <%= link_to 'Back', stars_path %>
TroundUp As I’ve probably mentioned, I love random shirts, and, as you can see, this one is quite random. So, naturally, I love this shirt. The fact that it’s only $10 with free shipping and it’s printed on an American Apparel shirt doesn’t hurt either. Update: I forgot to mention the reference to The Colbert Report. “Despite his bluster, Colbert’s character also demonstrates a notable phobia of bears, which he refers to as “godless killing machines without a soul”. Bears often top his “threat downs”, lists of the greatest threats facing America.” By buying one of these awesome t-shirts printed on American Apparel, you can feed one African child for an entire school year. Currently, 100% of the profits from all t-shirts sold go towards Africa Aid’s School Lunch Program in Buduburam. Naive Clothing just underwent a huge makeover, releasing a new website and tons of new tees simultaneously. I’m a fan of most of the new shirts, with my favorite being King Eagle. It’s just a great looking design, and I especially like the fact that the branding actually looks cool, which some companies don’t seem to understand. They also print on American Apparel, which is a plus. The design comes on a bunch of different colors, which I believe are brown, slate, gold, and light blue, although some are sold out. I’d like to say there’s some funny or intelligent message behind this tee, but, unless I’m missing it, that doesn’t seem to be the case. No, the real reason I like this tee is just because I’m oddly attracted to the design. I can’t really explain why, it’s just one of those things where you look at it and go, “Hey, that’s cool, I’d totally wear that”. Unfortunately, for those of us in the US, the shirt is kind’ve expensive, weighing in at 25 pounds + shipping, which is over $40 I believe. We Are Loved is a small project run by Barak Hardley. Instead of describing the company and what it stands for, I thought I’d just post up the well done clip above explaining the background and meaning behind the company and its name. They currently have four shirts up, which are sold through Merchline. Expect some reviews of their shirts in the coming days. Reach For The Stars I actually came across this shirt yesterday. As soon as I saw it, I was hoping for a reprint. I don’t know how it happened, but I’m certainly glad my wish got answered in such an expedient fashion. I just hope I can afford all these new Threadless tees I want. CUSTOM Industries is a globally inspired streetwear brand whose aesthetic reflects the quest for adventure and the discovery of the obscure. CUSTOM is about individuality AND community, living life on the road and off-the-beaten path. Respect for the familiar and the unusual; opening eyes and minds to peoples, places and cultures from around the world, and in our own backyards. Matt from CUSTOM Industries emailed me awhile back about reviewing some of their shirts. I liked them so much I asked Matt about getting an actual shirt to review, which he kindly sent out. Here’s just a little background about the company. From reading the site, Matt, who is the founder, has traveled quite a bit around the world, 45 different countries to be exact. This can be easily seen in the various cultural icons/ideas their designs influenced by. These influences give their shirts a unique, global feel about them. Also, something which I find extremely cool, on all the tags of their shirts, it gives you the location from whence the shirt comes. Like most of the companies I’ve dealt with, the shipping was extremely fast. Inside the package was the t-shirt, some cool stickers (they feel very cool, not the standard sticker), and a post card with a note from Matt. The tee I received from them was their Bushido design. As you’d expect, this design is based on Japan’s Bushido code, which is something I find fascinating. It’s printed on a 70% Cotton, 30% Poly Ringer T-shirt, which, like most of the shirts I’ve received, is extremely comfortable. The influences of their shirts, at least for me, could not be better. Combine that with excellent designs and comfortable tees, and you’ve got one kickass store. I strongly urge you to check out the rest of their designs. I spent some time browsing around old Threadless designs today, and I came up with a bunch of designs that I really like and want reprinted. I’m hoping you guys like these designs as well. This is by no means a comprehensive list, just some shirts I really like. I don’t have time for a long post (it’s late), but I just wanted to stop in quick and post this God Le$$ America t-shirt from Lucky Threadz. The shirt features a healthy dose of politics from one of my favorite designers, Tom Burns. Background from the site, While a little expensive, I really like this tee from Young Lovers. Here’s the inspiration behind the shirt summed up in one sentence, “Death to Arms and the worldwide arms race.” Another cool thing is that all their shirts are limited editions, as of now, only 100 prints of each shirt are made. Regarding what they print on, this is what I found, “All of our tees are made with the finest combed, ringspun 100% cotton.” They also offer a perfect fit guarantee, so you can always mail it back (at your expense) and get a new size if it doesn’t fit right.
hey what's up coffee lovers today I've got a new coffee maker review this is something I've been meaning to try for a really long time it is the moka pot by Bialetti and this is the six cup version, it's pretty much all aluminum with the exception of the handle and this little lid holder plastic comes apart like this so there aren't too many parts you have to mess with. Here is the filter basket where the ground coffee goes and the perforations. There is the water reservoir. So basically you put the water into this chamber right here. This little thing right here it doesn't really say what this is for but I use it is as the fill-line indicator so you take a look inside and see the corresponding end of it and that's what I use to gauge how far up the water goes. So it's really easy from a dosing perspective this will pretty much give you...although it's a 6 cup coffee maker allegedly it gives me one full mug if I'm just using the coffee that is brewed from it. Now I know some people will probably dillute it but I'm not one of them. I think it's very good as is. So then once the coffee is in the filter basket just goes right on top, assuming your water is already in the reservoir and then screw the top on like this and you wanna make sure... the instructions say not to do it too tightly but I found that if I don't do it tight enough then the water starts to seep out around the edges so there's one of the cons right there I would say and then the coffee is eventually going to...well, I should say the hot water is going to be heated up so it passes through into that filter basket and that's where the coffee starts to brew and then it continues to pass up into the main chamber where your final coffee is going to come out so I'm gonna go through a brew. The whole thing takes about... for me, 12 minutes. It depends on how fine your grind is it's been said that you should use a finer grind for Moka Pots, but I've found that the best results come with a coarser grind which isn't to say that fine grind is bad I've actually liked every grind that I've used so far but today will be using something in the middle and I'll show you what I'm gonna use right now. But before I do that, this is the only other thing that comes in the box. this instruction booklet. And it's weird because oh! sorry about that. they label every every piece it comes in it and I forgot to mention there's one additional piece... this is the gasket or additional filter so its in a way the the coffee is really filtered through here so as it continues to rise through that filter basket it's going to be filtered again through here It's almost like a double filtration I would say so anyway instruction booklet pretty poorly translated English but the thing is so easy to use that I found I didn't really need it so that's the only other thing that comes in there So I already ground my coffee and I'll just show you a little bit of what I'm using here so this is actually quite coarse I don't know if you can see. And I don't want to drop too much of it but what I do is I just fill up the filter basket to the top. Like this. And you'll probably actually want a little bit more coffee than what I put in here But you'll just want to make sure that it's nice and level and filling up the entire filter basket you don't want to go over the edges you don't want any coffee around the edges so I'm gonna just remove the filter basket real quick because I haven't added my water yet and I would recommend actually doing that before you do what I just did so before I mess anything up here and spill coffee all over the ground I will resume once I have the water in there okay so once again you do not want your water being too high up there I've used this little notch (pressure release valve) once again to kind of gauge how high the water should be. If the water is too high it's going to come up into the filter basket before the thing is even heated so here's my filter basket with the coffee. You don't want to tamp this just keep it loose and is evenly distributed as possible. Ok? Like that We'll screw the lid on. So, one of the things I really like about this coffee maker it's really easy to use one of the qualms that people have is that it's all aluminum and whether there is accurate research or not people think that leeched aluminum is terrible for your health I am of the camp that doesn't believe that I don't think there has been enough research that has shown that but even if it is bad for you I'd much rather have aluminum in my final cup of coffee then unknown plastic chemicals BPA free or not so I'm gonna show you how this works I'm just gonna put it on the stove and have it running on low heat. The brew time itself is very very long in my opinion. Takes at least 10 minutes but as far as portability goes this is probably the best option I'm going to take this camping over my Aeropress probably so I'll get more coffee out of it it's very good I think it's better than French press so I'll see you on the other end at the stove okay so let me first show you about how hot or how high your burner should be so this is too much it's too hot I have it down to about here so very low-heat I'm not sure how these are supposed to work on an electric stove. I think it's fine but you'll wanna check on that yourself with the manufacturer I think it says in the instruction booklet. other reviewers also have information on that but basically a very low flame is what you want once you start hearing that hissing noise you'll notice that coffee starts to brew come out of the spouts here and it should come out in an espresso-esque color so you'll see some creaminess but this isn't espresso. It doesn't have enough bars of pressure to make it espresso, officially. Hence, the moka name. so it's a different type of coffee but a very good one, very rich, lots of oils so I'd say it's most similar French press but much more low maintenance. you don't have to do any plunging stirring or any of that nonsense and it's also much easier to clean, and I'll show you that whole process after this is done brewing. So once it starts to brew, I'll turn the camera back on so you can see what it looks like. Ok. So we're about 5-7 minutes in and you can already see the coffee coming out of the spout at the top and you can hear that sizzle if you will and here's what I was talking about I don't know if you see what's going on but the flames are starting to go crazy because water is seeping out of the sides here so thats one of the downsides of this coffee maker. I don't know if maybe I'm doing something wrong and that's definitely possible but it doesn't seem really have an impact on on the overall output it doesn't really create a mess. Just something to note. Some of that water is lost on the side so you can see or maybe you can't... the very rich looking coffee. got something that's close...I mean it isn't crema. But it looks delicious maybe that's where it gets its moka name...the dark color of it the question...this is another downside you do have to keep an eye on this thing because once the coffee stops coming out of the top there or it starts to look clear that's when you want to take this thing off the heat. So you're not going to get any beep of course to tell you when it's done, you'll just have to keep an eye on it. so already it's starting to look a little bit thin and watery so I'll want to be taken it off the burner any second now. In fact, I think I'll do that right now so there's a look at it I'm gonna pour it out to show you what I was talking about... this is enough coffee for one of these mugs yes it's very rich, pretty concentrated but depending on what your taste preferences are this will probably need to be diluted. For many people it won't so I suggest trying it first, if it's too strong then go ahead and add hot water. something else to note is I've heard that people can expedite the brew process by already adding hot water to the the bottom chamber. I can't say if this has any negative impact on the final coffee output but maybe that will be for another day...a quick experiment. So I'm going to turn this off one more time and I'm gonna show you how easy it is to clean this thing the coffee though is fantastic so I'm not gonna even bother taking a sip, gonna wait for it to cool off. One of the best parts about to the Bialetti Moka Pot is how easy it is to clean first step in cleaning it is to wait for it to cool down because it's going to be really hot. If you can't wait (like me right now) you can just run some cold water on the outside and this will help it cool down pretty quickly you don't want to use any soap harsh metal brushes/steel wools you just want to rinse the Bialetti with tap water so you unscrew it just like we did before when we were doing the brewing and you'll take out the filter basket so I just do it like that and then you'll go dump the ground coffee into (before it burns your hand off) your compost bin or garbage if you're a terrible human like I am just kidding of course but compost is ideal give the reservoir a rinse and give your top coffee chamber a rinse and then the often neglected bottom gasket give that a little rinse too, maybe a wipe down let it dry voila! done! that was pretty simple. one of the great things about this coffee maker. so there you guys have it. This is is the Bialetti Ah! Very hot, Moka pot. Make sure you don't touch the edges at least for a while wait to clean this thing it is a) very easy to use b) makes incredible coffee comparable to a French press. In my opinion it's better c) it is portable probably your best option in terms of taking it to go camping or packing it in your suitcase. No electricity required you just need an open flame. The construction is great. This thing I know will last a long time. The only thing that really needs to be replaced from time to time is the gasket that second filter I showed you I can't say how long they last so I will have to do an update later but this is very low cost, easy to use, easy to clean, great-tasting coffee. there's few cons if any those would be that the water tends to seep out of the sides the brew process is longer than most. It doesn't quite make as many cups as I'd like and the aluminum construction little bit shaky ground I know for many people but those are really the only complaints I have about it so once again that's the Bialetti Moka Pot. Definitely recommend you check out this really underrated brew process, at least here in the States. So I'll see you guys next time and thanks for watching
--- abstract: 'We present an experimental study of the motion of a circular disk spun onto a table. With the help of a high speed video system, the temporal evolutions of (i) the inclination angle $\alpha$, (ii) the angular velocity $\omega$ and (iii) the precession rate $\Omega$ are studied. The influence of the mass of the disk and the friction between the disk and the supporting surface are considered. The inclination angle $\alpha$ and the angular velocity are observed to decrease according to a power law. We also show that the precession rate $\Omega$ diverges as the disk stops. Exponents are measured very near the collapse as well as on long range times. Collapsing times have been also measured. The results are compared with previous theoretical and experimental works. The major source of energy dissipation is found to be the slipping of the disk on the plane.' author: - 'H.Caps' - 'S.Dorbolo' - 'S.Ponte' - 'H.Croisier' - 'N.Vandewalle' date: 'Received: / Revised version: date' title: 'Rolling/Slipping Motion of Euler’s Disk' --- Introduction ============ A common straightforward experiment is the following. A coin spun onto a table rotates with an increasing precession rate and a decreasing inclination angle until it abruptly stops. This complex motion is known as the Euler’s disk problem. Within the classical formalism of mechanics, the disk should spin [*ad infinitum*]{}. Moffat’s work [@moffatt1; @nature] emphasized the necessity of considering energy dissipation in order to avoid such forever persisting motion. Many theoretical and numerical studies [@physd; @kessler; @pre2; @mcdonald] have been devoted to the finding of the major dissipation process leading to the stop of the disk. However, only a few experimental result can be found in the scientific literature [@pre1; @nature]. For a disk of radius $R$, mass $m$, and an inertia momentum $I$, the total energy reads $$\label{eqenergy} E=mgR\sin(\alpha)+\frac{1}{2}I\Omega^2 \sin^2(\alpha),$$ where $\alpha$ is the inclination angle with respect to the horizontal and $\Omega$ is the precession rate. A sketch of the disk is illustrated in Figure \[param\]. Parameters $\alpha$, $\Omega$ and $\omega$ are emphasized. In order to meet observations, one has to consider that the energy $E$ is dissipated with a rate $\phi$. The goal is thus to find the major mechanism responsible for energy dissipation $\phi$. Considering that the energy is dissipated through a velocity-dependent process, the temporal evolutions of $\alpha$, $\Omega$ and $\omega$ can be described in a general way with $$\label{eqalpha} \alpha\sim (t_0-t)^{n_\alpha},$$ $$\label{eqOmega} \Omega\sim \left(\frac{1}{t_0-t}\right)^{n_\Omega}$$ and $$\label{eqomega} \omega\sim (t_0-t)^{n_\omega},$$ where $n_\alpha$, $n_\Omega$ and $n_\omega$ are the dynamical exponents to be determined [@mcdonald]. Depending on the dissipation process, different values can be found for these exponents. The prefactors of those laws, and hence collapsing times $t_0$, also depend on the dissipation mechanism. Moreover, it should be noticed that the power laws may be valid only in a limited range of inclination angles since the major dissipation mechanism may depend on the dynamical parameters $\alpha$ and $\Omega$ values. Nowadays, no consensus has been found by the physical community. Other experiments are thus required in order to emphasize the major dissipation process leading to the brutal stop of the disk. ![Sketch of the disk and its dynamical parameters: the inclination angle $\alpha$, the precession speed $\Omega$ and the angular velocity $\omega$.[]{data-label="param"}](param2.eps){width="7cm"} In the next section, we present the experimental setup and procedures. In Section III, we report the experimental results concerning the temporal evolution of the inclination angle, the precession frequency and the rotation velocity as well as times to collapse. We discuss the results in Section IV. A summary of our findings is eventually given in Section V. Experimental procedures ======================= The experiment consists in spinning a disk by hand onto a table and to observe the evolution of the three different dynamical parameters with the help of a high speed video system. We used three different coins: (i) a stainless disk having a diameter $D_2=75\pm 0.01$mm, a thickness $e_2=10\pm 0.01$mm and a mass $m_2=353.4\pm 0.1$g ; (ii) an alumna disk with a diameter $D_1=75\pm 0.01$mm, a thickness $e_1=9.9\pm 0.01$mm and a mass $m_1=123.9\pm 0.1$g; (iii) an alumna torus with an internal diameter $D_{T_i}=63.65\pm 0.01$mm, an external diameter $D_{T_e}=78\pm 0.01$mm, a thickness $e_T=10\pm 0.02$mm and a mass $m_T=124.5\pm 0.1$g. The used surfaces on which the disks spin were $2$ mm thickness plates of alumna, glass and rough plastic sheets. All these plates where supported by the same table in order to change only the surface roughness. Starting from the lowest friction coefficient to the uppest, one finds the glass, the alumna and the rough plastic surface. Herebelow, we describe the experimental procedures we used for the data acquisitions. Note that despite the fact that the disks are spun by hand, our results are quite reproducible. This has been also mentioned in [@pre1]. Inclination angle $\alpha$ -------------------------- The inclination angle measurement is based on the reflectivity of the disks. When a laser beam is directed to a disk with a finite angle $\gamma$ relative to the horizontal plane, one can observe an “ellipse” formed by the laser beam on a screen situated on the opposite side. This ellipse is due to the motion of the disk, which changes the incident angle of the laser beam on the disk. In fact, a circle should be observed on the screen. However, the angle between the laser beam and the horizontal plane induces a deformation of that circle into an ellipse. In order to minimize this effect, the laser beam is placed as vertically as possible ($\gamma\approx 80^\circ$ in practice); its position being limited by the screen. A sketch of the setup is illustrated in Figure \[ellipse\]. ![Experimental setup for the inclination angle measurement. A laser beam is reflected by the disk and creates an ‘ellipse’ on a screen situated on the other side. A high speed video camera records images of the ‘ellipse’.[]{data-label="ellipse"}](d_dellipse.eps){width="7cm"} Since the inclination angle $\alpha$ of the disk decreases with time, the size of the ellipse accordingly decreases. Measuring the size of the ellipse gives us the inclination angle $\alpha$ of the disk as a function of time. In Figure \[spirale\], we present the whole path of the laser beam during the last seconds of the disk motion. One can observe a spiral pattern due to the decrease of $\alpha$ with time. The black circle in the center of the picture is an artifact due to the width of the trajectory on the picture. Experimentally, the high speed video camera allows us to distinguish the trajectories until $0.0005\, s$ before the disk motion stops. However, direct observations from the side of the disks showed that a recording rate of 500 frames per second is large enough for an accurate determination of $\alpha$. ![Path of the laser beam during the disk rotation. The size of the ellipse decreases with time.[]{data-label="spirale"}](spirale.eps){width="5cm"} Geometrical arguments give us the relation between the size of the ellipse and the inclination angle $\alpha$. The main axis length $A$ of the ellipse and the inclination angle $\alpha$ are correlated through $$\label{A} A=\frac{2r\sin(2\alpha)}{\sin(\gamma+\delta)-\frac{\cos^2(\gamma+\delta)}{\sin(\gamma+\delta)}\tan^2(2\alpha)}$$ where $\delta$ is the angle between the screen and the horizontal plane and $r$ is the distance from the center of the disk to the center of the ellipse. Typically, $r=0.3$ m. This relation is invertible for determining $\alpha$ from the knowledge of $A$, but has a rather complicated formulation. The minor axis case is more simple. Calculations lead to the following relation between the vertical axis length $B$ and the inclination angle $$\label{B} \alpha=\frac{1}{2}\arccos\left(\frac{1-2cos(2\beta)+\cos\left(2\arcsin\left(\frac{B}{2r}\right)\right)}{4\sin^2(\beta)}\right)$$ For each measured value of $A$ and $B$, we have calculated $\alpha$ from Eqs.\[A\] and \[B\] and we have averaged the values. Precession rate $\Omega$ ------------------------ In order to measure the precession rate $\Omega$, we have proceeded as follows. A laser beam has been horizontally placed in front of the table in such a way that the beam skims the table \[see Figure \[d\_rasemotte\]\]. During the rotating motion of the disk, the laser beam is intercepted, leading to a fast decrease of the light intensity transmitted on the other side of the table. Such a light extinction occurs twice a rotation of the disk. The transmitted light is observed with a high speed video camera situated at the same height as the laser but on the opposite side of the plate. The images are then transfered to a computer for image analysis of the intensity of the light spot created by the laser beam. The images are recorded at a frame rate of 500 frames per second, allowing us a high precision for the spot extinction detection. ![Sketch of the experimental setup for the measurement of the precession rate $\Omega$. A laser beam skims the supporting surface and is intercepted by the disk twice a precession. A high speed video camera records the intensity of the transmitted beam.[]{data-label="d_rasemotte"}](d_rasemotte.eps){width="7cm"} Figure \[example\] presents a typical curve for the temporal evolution of the intensity $I$ of the laser spot in arbitrary units. Each sharp peak corresponds to an interception of the laser beam by the disk. The peaks are alternatively due to the front and to the back of the disk. The peaks are detected by fitting a Gaussian curve on each point of the signal. In so doing, times corresponding to successive minima of the intensity are recorded. This method allows a precision of $0.002\ s$. ![Typical curve of the temporal evolution of the intensity $I$ of the laser beam. A fit using a Gaussian curve (dashed curve) is also illustrated.[]{data-label="example"}](example.eps){width="6cm"} Angular velocity $\omega$ ------------------------- We have measured the angular velocity $\omega$ of the disk by recording the motion of two diametrically opposed white marks situated on the top face of the disk. The experimental setup is illustrated in Figure \[d\_angulaire\]. The angular position, and then the angular velocity $\omega$, are calculated from the displacement of both dots between two consecutive frames. The images have been recorded at a rate of $125$ frames per second. This has been found to be sufficient for detecting the stop of the disk. Top view recordings also allowed us to measure the motion of the center of mass of the disk. ![Sketch of the experimental setup for determining the angular velocity $\omega$. Two diametrically white dots are glued on the disk. Their motions are recorded with the help of a high speed video camera, from the top.[]{data-label="d_angulaire"}](d_angulaire.eps){width="7cm"} Experimental results ==================== In this section, we present the results of the experiments performed with three ‘disks’ on the three different surfaces. This corresponds to nine different experimental situations. The measurements have been performed a large number of times for each experimental condition. We will first consider times to collapse $t_0$ and long time behaviour of the dynamical parameters. Then, the last stage of the disk’s motion will be further analysed. Time to collapse $t_0$ ---------------------- Figures \[longomega\] presents two typical evolutions of the precession rate $\Omega$ and the inclination angle $\alpha$ as a function of time $t$. Black lines correspond to fits using Eq.(\[eqomega\]). At the beginning of the disk’s motion, a larger dispersion of the measurement is observed; due to the way the disk was set into motion. The center of mass of the disk may, for exemple, own some small linear momentum. However, the motion considered in the introduction is rapidly reached and we have observed that the early stage of motion has not significant effect on the results presented hereafter. This was also mentionned in [@pre1]. One can seen that the power law behavior previoulsy proposed is consistent with observation over two decades in times. This means that, as close as we can approach the collapse, the major mechanism of energy dissipation remains the same whatever its nature. ![Temporal evolution of the precession rate $\Omega$ over an entire run in a log-log scale. Two cases are illustrated, as well as fits using Eq.(\[eqomega\]).[]{data-label="longomega"}](long_omega.eps){width="7cm"} If the friction between the disk and the surface is increased, the time to collapse $t_0$ decreases. For the alumna disk (disk 1) on a glass surface, we have $t_0=12.389\pm 0.007$ while $t_0=3.393\pm 0.168$ for the same disk on the alumna surface (similar results are obtained for other experimental conditions). Since the geometry of the system is the same in both cases, the energy dissipation may not come from the air drag. Friction seems take the main source of dissipation. Inclination angle $\alpha$ -------------------------- Figure \[alpha\] presents a typical curve of the inclination angle $\alpha$ as a function of time $t$. The angle is observed to decrease and to vanish quite abruptly at the time $t_0=0.571\, s$. A fit using Eq.(\[eqalpha\]) emphasizes the power law behavior. ![Temporal evolution of the inclination angle $\alpha$ for the stainless steel disk (disk 1) case on the alumna surface. A fit using Eq.(\[eqalpha\]) is also illustrated.[]{data-label="alpha"}](alpha.eps){width="7cm"} The values of the exponent $n_\alpha$ are presented in Table \[tabalpha\]. We have observed that despite the error bars, $n_\alpha$ seems to increase when the static friction coefficient $\mu_s$ increases. This tends to show that the friction at the rolling contact point of the disk may play an important role in the dissipation process of the disk energy. One should also note the small differences between the values obtained for the three ‘disks’. Particularly, the torus behaves in nearly the same way as the two disks. This result suggests that the air layer under the disk is not a major source for the energy dissipation. Another observation is that $n_\alpha$ does not depend on the mass of the spinning coin, in agreement with the equations of motion derived in [@mcdonald]. glass alumna plastic -------- ----------------- ----------------- ----------------- disk 1 0.51 $\pm$ 0.01 0.60 $\pm$ 0.01 0.56 $\pm$ 0.03 disk 2 0.49 $\pm$ 0.01 0.49 $\pm$ 0.05 0.59 $\pm$ 0.02 torus 0.52 $\pm$ 0.02 0.56 $\pm$ 0.03 0.66 $\pm$ 0.03 Precession rate $\Omega$ ------------------------ The precession rate $\Omega$ is observed to diverge after a finite time, as illustrated in Figure \[Omega\]. The divergence (Eq.(\[eqOmega\])) is illustrated (continuous curve of Figure \[Omega\]). Note that around the black curve, small oscillations of $\Omega$ are observed. They were already reported in other measurements [@physd]. ![Temporal evolution of the precession rate $\Omega$ for the alumna disk case on the alumna surface. A fit using Eq.(\[eqOmega\]) is also illustrated.[]{data-label="Omega"}](omega.eps){width="7cm"} Adjusting the data with the power law Eq.(\[eqOmega\]), we have found different $n_\Omega$ values for different experimental conditions \[see Table \[tabOmega\]\]. It is observed that the precession rate diverges as rapidly as the static friction increases. Once again, the torus and the disks behave in similar ways, in the sense that the values of $n_\Omega$ are not so different for these different coins. This also suggests that the air drag is not a major source for the energy dissipation. glass alumna plastic -------- ----------------- ----------------- ----------------- disk 1 0.39 $\pm$ 0.03 0.34 $\pm$ 0.01 0.39 $\pm$ 0.03 disk 2 0.32 $\pm$ 0.01 0.30 $\pm$ 0.01 0.34 $\pm$ 0.01 torus 0.30 $\pm$ 0.03 0.31 $\pm$ 0.02 0.35 $\pm$ 0.02 Angular velocity $\omega$ ------------------------- We have measured the angular velocity of the different coins and reported the values of $n_\omega$ in Table \[tabomega\]. A typical curve, as well as a fit using Eq.(\[eqomega\]) are reported in Figure \[omega\]. ![Temporal evolution of the angular velocity $\omega$ for the stainless steel disk case on the glass surface. A fit using Eq.(\[eqomega\]) is also plotted.[]{data-label="omega"}](angulaire.eps){width="7cm"} As observed for both $\alpha$ and $\Omega$, an increase in the friction between the disk and the surface causes a faster energy dissipation. Here, we observe that the different coins give different values of the exponent $n_\omega$, contrary to previous observations. glass alumna plastic -------- ---------------- ---------------- ---------------- disk 1 0.38$\pm$ 0.07 0.46$\pm$ 0.02 0.41$\pm$ 0.01 disk 2 0.44$\pm$ 0.01 0.53$\pm$ 0.06 0.51$\pm$ 0.02 torus 0.42$\pm$ 0.01 0.42$\pm$ 0.01 0.65$\pm$ 0.03 Discussion ========== Assuming that the main dissipation mechanism that leads to the singular behavior is the air drag, Moffatt concluded that $n_\alpha$ should be $1/3$, and $n_\Omega=1/6$. Bildsten pointed out a mistake in the Moffatt’s calculations and found the values $n_\alpha=4/9$ and $n_\Omega=2/9$. These theoretical previsions are a too low to explain the experimental results, suggesting that air drag does not play an important role in the energy dissipation, as also shown by torus experiments. Experiments performed in vacuum conditions [@nature] have also emphasized the small effects of viscous drag. From the values of both exponents $n_\alpha$ and $n_\Omega$, we thus see that the rolling friction seems to play an important role in the energy dissipation mechanism. Indeed, one would expect [@pre1] $n_\Omega=1/3$ in the case of rolling without slipping, what is quite close to our values. This result is also supported by plots of the dissipation rate $\phi$ of energy during the experiments. We have calculated the total energy $E$ of the disks (Eq.(\[eqenergy\])) for each measured values of $\alpha$ and $\Omega$. Then we have computed the dissipated rate of energy $\phi$ by finite differencing of the energy $E$. ![Disipation rate of energy $\phi$ as a function of the inclination angle $\alpha$. Two cases are illustrated.[]{data-label="phi"}](en.eps){width="7cm"} In Figure \[phi\], one can find a typical evolution of the dissipation rate $\phi$ as a function of the inclination angle $\alpha$ for the stainless disk (disk 2) on both glass and alumna surfaces. Indeed, the disk is osberved to dissipate more energy by time unit on the surface with the largest friction. On the same figure, we have plotted the curves corresponding to a dissipation rate due to friction [@pre1] $$\phi_{frict}\sim\cos(\alpha)\,\Omega$$ . The agreement between experimental and theoretical results emphasize the role played by friction in the energy dissipation. Moreover, one should note that a proportionality between the precession rate $\Omega$ of the disk and its angular velocity $\omega$ is expected [@moffatt1; @mcdonald]. This is not so obvious here, even if the data are quite dispersed \[see Tables \[tabOmega\] and \[tabomega\]\]. Moreover, for a considered surface, the angular velocity exponent $n_\omega$ depends on the disk, and therefore on the static friction. These observations lead us to believe that the disk may slip while it is rotating. The influence of the slipping of the disk was also suggested in [@nature], but from a theoretical point of view. This is in contradiction with [@petrie] where the energy dissipation by slipping is ruled out. However, these preliminary experiments were performed during the [*early*]{} stage of the disk rotation. Indeed, only one experimental condition was measured and moreover at a low frame recording rate. ![Path of the center of mass of the disk 1 on the alumna surface.[]{data-label="cm"}](cm.eps){width="5cm"} In order to emphasize the slipping or not of the disk, we have recorded the motion of the center of mass of the disk with a high precision ($250$ fps, $1024\,\times 1024$pixels images). Figure \[cm\] illustrates the trajectory of the center of mass within one and a half angular revolution. One can see that the center of mass moves along a circular path. As noticed, the center of this circular path has a tendency to move the most at the early stage of the motion than at the end. In the case of the circular ring, this ‘stabilization’ is less important. We suppose that the large surface of the disks help them to get this stabilization. It will be interesting to check whether this mechanism always occurs in vacuum condition, in order to determine the role of the air in this phenomenon. Another important observation is that the center mass of the disk exhibits small quasi-periodic excursions around the circular trajectory. These oscillations are not exactly periodic but are quite frequent, especially during the last angular rotations of the disk. These small oscillations in the circular trajectory of the center of mass of the disk are due to the slipping of the contact point of the disk along the surface. The resolution of our setup does not allows us to determine wheter there is some kind of ‘stick-slip’ of this point on the surface. However, these slips are responsible for the energy dissipation leading to the final stop of the disk. Summary ======= We have performed new experiments for studying the Euler’s disk motion. The divergence of the precession rate as the inclination angle and the angular velocity vanish have been observed after a finite time. All these parameters follow power law behaviors. The time to collaspe is observed to decrease with the friction. Contrary to previous theoretical works, the air is found to be a minor source of energy dissipation. On the contrary, the major energy dissipation process is found to be the rolling/slipping of the disk on the supporting surface. HC is financially supported by the FRIA (Brussels, Belgium). SD acknowledges the FNRS (Brussels, Belgium) for financial support. This work is also supported through the ARC contract n$^\circ$02/07-293. [11]{} H.K. Moffatt, [*Nature*]{} [**404**]{}, (2000) 833 G. van der Engh, P. Neslon and J. Roach [*Nature*]{} [**408**]{}, (2000) 540 A.A. Stanislavsky and K. Weron, [*Physica D*]{} [**156**]{}, (2001) 247 P. Kessler and O.M. O’Reilly, [*Reg. Chaot. Dyn.*]{} [**7**]{}, (2002) 49 L. Bildsten, [*Phys. Rev. E*]{} [**66**]{}, (2002) 056309 K.T. McDonald, [*physics/0008237 (xxx.lanl.gov)*]{} K. Easwar, F. Rouyer and N. Menon, [*Phys. Rev. E*]{} [**66**]{}, (2002) 045102(R) D. Petrie, J.L. Hunt and C.G. Gray, [*Am. J. Phys.*]{} [**70**]{}, 1025 (2002) Z. Farkas, G. Bartels, T. Unger and D.E. Wolf, [*Phys. Rev. Lett.*]{} [**90**]{}, 248302 (2003)
CHENNAI: There are just two more days to go for candidates to apply for the post of Team India’s head coach. As of Wednesday evening, former Australia pacer Jason Gillespie was the sole prominent foreigner to have applied for the job. Former Australia all-rounder Stuart Law has also shown interest and one understands that Tom Moody, who recently guided Sunrisers Hyderabad to the IPL title, will also throw his hat in the ring. On Wednesday, former India cricketer Venkatesh Prasad also applied for the job and has even expressed his desire to be the bowling coach, a role he has performed in the past. Sandeep Patil, Ravi Shastria, Balwinder Singh Sandhu, Robin Singh and Lalchand Rajput are among Indians to have applied for the post. Gillespie, who is currently in charge of English county side Yorkshire, seems to have sent a presentation model, like Shastri has. The 41-year-old, who has 259 wickets to his name in 71 Tests, is one of the highly-sought coaches in the international arena and was even in contention to take over from Peter Moores as England coach before losing it to compatriot Trevor Bayliss last year. Gillespie has had a stellar campaign at Yorkshire, guiding them to two County Championships apart from overseeing the development of a core group that has produced internationals like Joe Root, Jonny Bairstow, Gary Ballance, Adil Rashid, Liam Plunkett. Sources in the BCCI revealed that Gillespie has sent a detailed document on what he wants to achieve with the Indian team, if selected. One of the highlights is ensuring better co-ordination between the national team and the A side. Recently, there were indications from Australia coach Darren Lehmann that Gillespie might join him as bowling coach as a replacement for Craig McDermott. But on May 31, Gillespie revealed that he was not interested in international assignments because of hectic travel and his contract with Big Bash side Adelaide Strikers. “Gillespie has sent a detailed list of what he wants to do. He has had great success in recent times. In many ways, he is a modern-day coach capable of handling all three formats of the game. We are actually surprised that not many foreigners have applied. With a couple of days to go, one or two more names might come in. But from whoever we spoke to in the past, we gather that most high-profile names have reservations about against being associated with a national team for 10 months. In shorter T20 leagues, you earn a lot more,” an insider told Express. Meanwhile, Bharathi Arun and R Sridhar have not applied for the posts of bowling and fielding coach, as one understands that if Shastri gets to continue, he would prefer the same support staff that was in charge until the World T20 in March. “Shastri has made it clear that he wants to retain the same support staff if he gets picked and he has mentioned it in his application. Anyway, the BCCI was going to give head coach the support staff of his choice. Although the final say will be with the board,” the official said. Applied Ravi Shastri Sandeep Patil Lalchand Rajput Venkatesh Prasad Robin Singh Balwinder Singh Sandhu Stuart Law Jason Gillespie — [email protected]
1. Field of the Invention This invention relates to a parlor golf game for participation by one or more players. The game provides for elements of chance but is also highly realistic of an actual outdoor game of golf. 2. Description of the Prior Art There have been many attempts in the past to capture the concept of the outdoor game of golf in a parlor game. These have covered a wide range of concepts in order to achieve some degree of realism. Those prior art golf games known to the applicant which are representative of those games which have previously achieved some degree of realism are disclosed, for example, by the U.S. Pat. No. 1,520,081 to Purnell; Zapolski, U.S. Pat No. 3,130,973; Carroll et al, U.S. Pat. No. 3,355,175; Seitz, U.S. Pat. No. 3,260,526; Browne, U.S. Pat. No. 3,612,534; Boileau, U.S. Pat. No. 3,658,339; Strandgard, U.S. Pat. No. 4,042,246; and Conrad, U.S. Pat. No. 4,134,590. Although each of these patents may have represented improvements in the state of the art at the time that they were issued, and may have intrinsic value, they are not deemed to be anticipatory of the present invention. In some instances, those patents recited above disclosed individual game boards representative of an entire golf course; in other instances they presented a board for an individual hole comprising tee, fairway, and green; and in some instances the representations of the course were limited to the confines of a carrying case. There were disclosures of a variety of random chance generating means including spinners, dice of various shapes, colors and indicia, spinner tops, and rotatable drums. Sometimes the information provided upon manipulation of the chance generating means required the use of scale devices for measuring distance and, possibly, directions, of the player's piece on the game board. The drawback of each of the recited patents and of all of the prior art known to the applicant resides in the limited numbers of possibilities in the play of the parlor game with a resulting lack of realism in relation to the outdoor game of golf. Indeed, some of the known games were of such a simplified format as to severely limit realism and others, in an attempt to achieve realism, were extremely complex to play, resulting in either boredom or disinterest on the part of a player.
Q: How to find string in table when a expression has any order? I have a table mama rama drama drama mama rama rama drama mama I use a dialog for find and replace in spreadsheet. I want to find all items at once. How to use a regex for this? Thanks! A: You can't do what you want as easy as you're thinking. Here are the next best options I can think of. 1) Have every combination in lookaheads, so it'll match just the string you want (i skipped some combinations for brevity) (?=\bmama|rama|drama\b)(?=\brama|mama|drama\b)(?=\bdrama|mama|rama\b).* 2) List the words individually inside lookaheads, but it'll match the whole line that contains the words you list in the lookaheads. (?=.*\bmama\b)(?=.*\brama\b)(?=.*\bdrama\b).* This is as good as you'll get I think :)
Q: Labelling and current arrow in circuitikz Ok so currently I have managed to output the following circuit (and following code) : \documentclass{article} \usepackage[european]{circuitikz} \begin{document} \begin{center} \begin{circuitikz} \draw (0,0) to [R, l_=$R_1$] (2,0) to [short] (6,0) to [R, l_=$R_3$] (6,4) to [short] (6,5) to [short] (0,5) to [V, l_=$E_1$] (0,2.5) to [V, l_=$E_2$] (0,0.5) to [short] (0,0) (4,0) to [V, l_=$E_3$] (4,2.5) to [R, l_=$R_2$] (4,4.5) to [short] (4,5); \end{circuitikz} \end{center} \end{document} And I'm trying to add currents and voltage arrows, but the documentation for circuitikz didn't help. So the goal would be to add arrows for example an upward one near E_1, downward one near E_2 or one going right below R_1. Also I'd like to add current arrow for example, an arrow going up on the wire above E_1 labelled i_1. I'd appreciate any help thanks. A: Ike this? Probably are missed some arrows or some are on wrong positions. This can be easilly to correct. \documentclass[margin=3mm]{standalone} \usepackage[european]{circuitikz} \begin{document} \begin{circuitikz} \draw (0,0) to [R, l_=$R_1$] (2,0) to [short] (6,0) to [R, l_=$R_3$] (6,4) to [short] (6,5) to [short] (0,5) to [V=$E_1$, i=$i_1$] (0,2.5) % <--- to [V<=$E_2$] (0,0.5) % <--- to [short] (0,0) (4,0) to [V, l_=$E_3$] (4,2.5) to [R, l_=$R_2$] (4,4.5) to [short] (4,5); \end{circuitikz} \end{document}
This archived news story is available only for your personal, non-commercial use. Information in the story may be outdated or superseded by additional information. Reading or replaying the story in its archived form does not constitute a republication of the story. COTTONWOOD HEIGHTS — After Salt Lake County prosecutors declined multiple requests to file criminal charges against a man accused of date rape, police decided to ask state prosecutors to look at the case. On Thursday, the Utah Attorney General's Office agreed to file rape and sodomy charges against a Cottonwood Heights man. "Each case that is prosecuted by the Utah Attorney General’s office is screened independently of other agency findings. Once in a while, the AG’s office will take cases that have been denied by other agencies. Reasons vary, but include new information at the time of screening, resource availability, and investigative findings,” said Daniel Burton, a spokesman for the Attorney General's Office. But what has Cottonwood Heights police and the alleged victim — an 18-year-old woman — most concerned about the case are the reasons the Salt Lake County District Attorney's Office outlined in its initial letter for declining to file criminal charges. The letter seemed to indicate it was because the alleged perpetrator was too drunk to know what he was doing. According to a Dec. 3 letter sent to the Cottonwood Heights Police Department from the district attorney's office, they declined to prosecute the case due to "insufficient evidence to prove beyond a reasonable doubt" as well as "problems with defense of voluntary intoxication negating his mens rea." Mens rea is a legal term that means with criminal intent or guilty knowledge and wilfulness. On Thursday, Salt Lake County District Attorney Sim Gill said he, too, was concerned with the language from the initial declination letter, which is why he looked at the case again. "As an administration, when it was brought to our attention, we were also concerned about that. And because of that, I instructed my senior staff to go back and take a look at this and re-review this again thoroughly," he said. "I found that to be troubling as well." Still, after the case received a second and third set of reviews from senior levels of the district attorney's office as well as several local attorneys, the office still declined to file charges in the case because of insufficient evidence. The woman who police say was attacked, however, feels she has been victimized again by the whole process. "I get why people don't want to come forward with (rape allegations). It's hard enough," she said. The woman, whom KSL agreed not to identify, said despite months of both physical and emotional trauma, she will press on with the case and is glad the attorney general's office has agreed to take it. "He raped the wrong girl because I won't be quiet about it," she said. On Sept. 13, 2015, the woman said she went to a party with friends and ran into the 19-year-old man. She says she had known the man for about a month and a half. When the night was over, she said the man was too drunk to drive and she agreed to give him a ride home. When they got to his house, he quickly ran away from the car. The woman said she wanted to make sure he got inside OK, so she followed him. She found him in a bedroom, and after he started kissing her, she agreed to consensual sex. But she said what started as a consensual situation soon became an assault. "He pins my arms and uses his body weight and he pushes me and tells me to relax," she said. "So he knows at this point that he's hurting me. He doesn't care, and I'm not going anywhere, he made that clear. … I told him no every single time." The woman said she was overcome by paralyzing fear and intense pain at the same time. When she was able to knock him away, she said he got dressed and went to sleep. The woman gathered her clothes, having to at one point reach over the man's sleeping body to grab a piece of clothing, and ran out of the door to her car. Once she was there, she said she was too shocked to think clearly and didn't know what to do. "I can't think, but I can think. I can't breathe, but I can breathe. And I'm like, 'Should I call my mom? Should I call the police? But if I call the police he'll get in trouble. But he's someone I care about and trusted. Is this rape? Did I just get raped?'" she said she asked herself. The woman initially decided not to call police. "I didn't want to look like a liar. I didn't want to look like a crazy girl that cries rape," she said. "I just lost all control of everything. … Nobody tells you what to do in that situation." She didn't tell her parents initially. It wasn't until after consulting with a school counselor and a friend that she went to the hospital for a sexual assault examination. "My body was a crime scene," she said. "I got poked, prodded, I got dye everywhere, asking me questions ..." After having to repeat her story many times to police, prosecutors, family members and others, the woman said she was forced to keep re-living it, and she fell apart. She dropped out school and says she did nothing but stay home and sleep and eat. "It was hard to leave my house. I think I'd see (him) everywhere walking around. So I stopped going. And I didn't have a job," she said. "I don't have male friends. I get very aggressive, my thoughts do, when I notice a guy staring at me or he's too close. I get really paranoid." The woman says she recently got a job just to get out of the house and try to re-acclimate herself around others. But the stress still affects her daily. "Nothing could make it better. Nothing still can make it better," she said. Gill said deciding not to file charges was not an easy decision. But his office stands by its decision. "If the attorney general's office wants to file, it's within their prerogative to do so. And unless they have different evidence or maybe a different approach, that's within their prerogative to do so," he said. The woman believes it's a solid case. Still, she is not looking forward to reliving it. "I'm going to get picked apart in court. It's going to be long. It's going to be hard; it's so hard to have my stuff together when I'm in the middle of all this," she said. But she believes it will happen again if she doesn't step forward. "I want to make sure it ends with me. I want to make sure I'm the last one." Christopher Jordan Anger, 19, was charged Thursday by the Utah Attorney General's Office with forcible sodomy and object rape, both first-degree felonies. Charging documents filed in 3rd District Court specify that the man's alleged actions occurred without the victim's consent. × Photos
Anonymous Unite! After reading a really great post, I usually leave a comment, telling the blogger how much I enjoyed reading his or her post. In this fashion, I scrolled to the bottom of the post and began typing words of praise. But as I was writing, I noticed the last comment that had been left by an Anonymous user: After reading this stirring comment, I looked at the words that I had begun to type, and realized that nothing I said could compare. Clearly, this Anonymous user had a better understanding of MOV’s post than I ever would. Not only that, this Anonymous user was polite. I hadn’t even thought to start my comment by classifying myself as a regular visitor and politely addressing everyone. I felt bad for him. He had asked everyone how they were doing, and not a single person took five seconds to reply. I could see him sitting there, refreshing the page over and over again, waiting for someone to write back and tell him how they were doing. So, being the nice guy that I am, I decided to delete my words of praise for MOV and address him personally: I hope that you read my response carefully and took it to heart. Because I want to instill a lesson upon you all. This is what I ask you, gentle readers: In your travels across the interwebz, if you happen to come across someone who posts a comment anonymously, don’t just assume that they are a spammer who is desperately attempting to get traffic to their obscure website. Also, don’t blame them for posting anonymously. Perhaps they are shy. Or in the witness protection program. Who knows, maybe their name actually is “Anonymous.” And if this is the case, don’t you feel awful for ignoring them? Their parents clearly hated them for naming them “Anonymous,” so why should you add to their pain and suffering? It’s not their fault. But most importantly, when they ask everyone how they are doing, don’t assume that they are simply trying to be polite or don’t know what else to say. They actually care about your well-being. My name is Anonymous, and you have probably met me at my Alcohol meetings with my (former) boozy pals. It is rough being anonymous, and I am very greatful (grateful? ah, whatever) to you for shining the spotlight of attention wear (where? like it matters) attention is needed most: on the poor, unrespected drones that so desperately need attention. Private and anonymous attention, natch. Please reply to me in caps. I need more anger in my life. I have started to reply to some of my anonymous readers. I also visit their Web sites and leave friendly comments for them. If they are going to visit me, then I'm going to visit them. Good day and thank you for this pertinent information that I have been looking around for. Lucκy me Ι ran acгoss youг website by chаnce. I have saved as a faѵorite for lateг! I hope to you that you return favors and find many good sex toys at my Home pages I truly enjoy the post that you posted about on your blog here. I wish more people posted posts such as this as the information is well good and profitable to you. Please see my page where many others like yourself have gather. Hello other pleasant, albeit suffering peoples with names like mine.How are everyone does toady?Very smooth posting on your post here browny Young. I am certainly glad that I am happy to have read it.Happier am I that you recognize the power of my people. In case you want to return the favor at my website I can be found in Some Dudes Mynd of CheeseNony This is wonderful posting about topic that I have been meaning to find on more information about. I am thankful to you for providing for me. I had almost give up when my brother pointed you for to me. Keep up the good work of your postings. I saw your post on the Dr. Oz show a few days ago and was amazed at the results. Today is my 8th day being on your program and I am 11lbs down!!:) I just want others to know when something works. Good luck to you all! To be quite eligible with this program, you must not have been a lot more than 1 month past due in your mortgage within the latest one full year paydayloans364.co.uk wolves trying to sign frimpong and coquelin on loan from arsenal.Also see my website – paydayloans364.co.uk The banks will simply lend cash on the amount of “taxable” income one shows on the returns as proof that it is possible to repay the money quick loans uk generally, it is a one page application form that really needs to get filled in and submitted as well as documents for scrutiny by loan-officers. As he continues, he repeatedly glances over his shoulder to produce sure nobody is listening quick money loans if you are doing buy abroad, you may probably believe it is beneficial to open a multi-currency account. All you may need is some hosting for the site, and a desire to succeed to rake inside a huge fortune online loans the fees can be a fraction with the $639 billion in assets that lehman brothers holdings inc lehmq. All you may need is some hosting for the site, and a desire to succeed to rake inside a huge fortune online loansthe fees can be a fraction with the $639 billion in assets that lehman brothers holdings inc lehmq. In the mean time, access of unseen problems adds one misery to already miserable condition payday loans you can help to conserve your property or deal with precisely what is happening to you personally. Shadow skills minister Gordon Marsden said: “While I welcome these concessions, real fears remain on the impact FE loans might have on the sector online payday loans times are tough for sure but to think you are able to't advertise and grow your business is crazy. Sloan Yes, I think, Betsy, it had not been anybody specific category, however it's a combination of some one-timers that there were within the second quarter versus the 3rd quarter Online Payday loans no credit check needed process is going to be done at lenders end with there being countless beneficial aspects you will check if you happen to be waiting only to incur small money advance. I love the gentle man as I would desire to believe that you'll find excellent achievements he did for my country; by way of example, he helped Tilahun Gesesse through his latter times payday loans online a paycheck-to-paycheck lifestyle is frequently very bad for the budget. No matter how much you return, though, you are able to add funds when needed either with the internet or by telephone rv loans interest rates will vary, which could influence the form of car you find yourself buying. Morgan Stanley defined problem loans as those performing loans for which the company management has serious doubts as to the ability in the borrower to comply with current loan repayment terms advances paydaythese companies take for the task to locate the top money-lenders who can provide loans that you live. Each and every imperfect credit situation including missed payment, late payment, payment overdue, insolvency, arrears, bankruptcy, foreclosures and so on would not at all be considered loans pay day the annual monthly interest for a loan on this type might be 300% or older. Finally, be aware in the terms of the loan agreement in small low credit score loans payday loan lenders only the applicant ought to be an adult citizen with the county who's a fixed month end salary which in different case should no less than be 1000. It's crucial that you need to do all which is in your power to own your name erased, because it can hurt your chances for payday cash advances, acquiring jobs, and traditional loans next payday loans these two savings make the program a large win for first time homebuyers helping them be entitled to more home for less money.
--- title: Opening and Closing the Trace Viewer description: Opening and Closing the Trace Viewer ms.assetid: 89a32b91-e28f-442f-9523-7e2c7f51ae9e keywords: - Static Driver Verifier Report WDK , Defect Viewer - Defect Viewer WDK Static Driver Verifier ms.date: 04/20/2017 ms.localizationpriority: medium --- # Opening and Closing the Trace Viewer You can open the Trace Viewer for any rule in the **Results** tab that reports a defect. To open the Trace Viewer: - In the Results tab, locate the rule you are interested in and click **Defect**. - After a brief delay, during which SDV retrieves the information that it needs, the Trace Viewer opens. Then, during a more extended delay, it positions and resizes the windows. A delay of 1 minute or more is considered to be normal. You can display only one Trace Viewer (for one rule violation) at a time. To open the Trace Viewer for a different rule violation, you must first close the Trace Viewer for the current rule violation. To close the Defect Viewer, do either of the following: - From the **File** menu, select **Exit**. - Click the **Close** (**X**) button in the far right corner of the Static Driver Verifier Report.
1. Technical Field The invention relates to clamping means and more particularly to the clamping means adapted to affix a resilient elastomeric sleeve member to a relatively rigid piston member or end cap of an air spring. Specifically, the invention relates to a clamp ring assembly employing a clamping ring having at least a pair of recesses on the inner diameter thereof which coact with a corresponding member of projections on the outer diameter of the piston member or end cap to positionally locate the clamping ring on the piston member and to effectively seal the open end of the elastomeric sleeve therebetween. 2. Background Information Pneumatic springs commonly referred to as air springs, have been used for many applications, including motor vehicles, for a number of years to provide cushioning between moveable parts of the vehicle, primarily to absorb shock loads impressed on the vehicle axles by the wheels striking an object in the road or falling into a depression. The air spring usually consists of a flexible rubber sleeve or bellows containing a supply of compressible fluid and has one or more pistons movable with respect to the flexible sleeve. The piston causes compression and expansion of the fluid within the sleeve as the sleeve compresses and expands as the vehicle experiences the road shock. The spring sleeve is formed of a flexible elastomeric material containing reinforcing cords, and permits the piston to move axially with respect to another piston or end cap secured within open ends of the sleeve. The open ends of the sleeves are sealingly connected to the piston and/or opposite end cap, and the integrity of this connection is always one of the important and major aspects in producing an efficient and maintenance free air spring. Another problem with existing air springs, and in particular, the clamp ring therefore, is that the clamp ring will move in its clamped position under dynamic air spring conditions causing movement of the clamped elastomeric material therebetween tending to loosen the sealing engagement and deteriorating the clamp integrity and causing ultimate air spring leakage and failure. This ring movement is especially critical during the jounce or collapsing stroke. Another problem with existing air springs and the clamping of the elastomeric sleeve ends to the piston member and/or end cap is to secure a sufficiently tight seal to be able to withstand high fluid pressures contained in the fluid chamber without premature leakage or bursting even upon experiencing severe air spring movement and being exposed to the harsh environments on the undercarriage of a vehicle. Some examples of air springs and band sealing devices are shown in the following patents described below: U.S. Pat. No. 3,788,628 discloses a pneumatic spring-type system which includes a structure for anchoring the inner ends of a flexible rolling sleeve. The sleeve is positioned between surfaces characterized by having a saw-toothed shape with a circumferential groove and rib on an inner circumferential surface and two ribs on an outer circumferential surface. The opposite sides of the grooves converge at predefined angles with predetermined and matching radius of curvatures, the combination of which provides a gripping action to hold the flexible sleeve firmly in place by means of the saw-tooth design, in cooperation with the matching recess of the ring and sleeve flange. U.S. Pat. No. 3,870,286 shows a fluid spring wherein the ends of the rolling sleeve are secured by annular clamping rings which engage against the internal surface of the sleeve. The clamping ring secures the rolling sleeve to the working cylinder. The clamping ring contains an annular groove deformation by which the rolling sleeve is held in place by virtue of this interacting groove-shaped design in combination with the clamping force exerted by the ring. U.S. Pat. No. 4,489,474 relates to means for connecting a tubular flexible member to a piston which includes a recess near the piston end to which is secured a flexible member. The flexible member is wrapped over and around a ring-shaped fitting which secures the flexible member to the piston. The piston comprises a circumferentially extending recess adjacent to its end with the flexible sleeve being positioned and substantially filling the recess of the piston. The ring-shaped fitting is a conventional swaged ring and the end portion of the flexible member is trimmed from the portion extending from the piston ring with the flexible member substantially filling the recess of the shoulder of the piston. The piston employs a serrated edge to assist in griping of the flexible member. U.S. Pat. No. 4,573,692 discloses an assembly for sealing two members, one of which has a cylindrical surface which supports the seal, wherein a sealing lip is provided to bear against the second member. A cylindrical surface supports the seal which comprises a hollow-cylindrical body having a lip which extends outwardly from the body with an elastomeric band circling the body to hold it firmly in place. The cylindrical surface contains a recess which extends circumferentially around the surface and receives a matching projecting element of the seal which extends from the inside diameter of the cylindrical body. U.S. Pat. No. 4,629,170 shows a pneumatic spring with a pair of chambers formed by a pair of membranes that are sealingly attached to an axially spaced apart retainer and piston wherein the axial end of the membrane is compressed between a serrated surface of a solid member and a retaining ring. The ring is swaged, fitted or otherwise tightened to produce radial compression against the axial ends of the flexible membrane. British Patent No. 199,789 discloses a metal securing band which grips a diaphragm and forces it against a tapered end portion of a tubular member. U.S. Pat. No. 4,718,650 shows an air spring in which the ends of the flexible sleeves are connected to the sealing surfaces of a pair of axially spaced pistons by swaged or crimped clamping rings. The piston clamping surfaces are formed with serrations to assist the retention of the elastomeric material when forced therein by the clamping rings. Other types of piston and end cap sealing arrangements for air springs are shown in U.S. Pat. Nos. 4,784,376; 4,787,607 and 4,787,606, all of which have been assigned to the Assignee of the present invention. Another known prior art air spring construction includes a radially extending shoulder formed on the piston member on which the clamping ring seats and sealingly clamps the cut end of the flexible sleeve against a plurality of uniformly raised ribs formed on the axially extending sealing surface of the piston member adjacent the annular shoulder. However, such construction presents problems in that the clamp ring is not positively positioned on the annular shoulder, and is free to move in an upward axial direction upon the air spring experiencing severe jounce or extended positioning. Many of the problems discussed above are solved by the clamping arrangement shown in U.S. Pat. Nos. 4,899,995 and 4,852,861. These patents show the use of a clamp ring having a single centrally located recess which aligns with an outwardly extending projection formed on the sealing surface of the piston and end member in order to position the clamping ring on the piston or end member. A pair of pinch areas are formed on opposite sides of the projection by outwardly extending annular rings or surfaces on the sealing surfaces of the piston and/or end member. These rings form the pinch areas or zones in cooperation with the axially extending inner annular surface of the clamp ring on opposite sides of the concave recess. Although this clamp ring assembly does solve many of the problems discussed above and is extremely efficient for many applications, it has been found that for certain air spring applications, especially for larger air springs having high internal pressure, it may not provide the necessary clamping power. Therefore, the need exists for a still further improved clamp ring assembly for air springs which provides increased clamping and sealing for the open ends of the elastomeric member between the clamp ring and end member and/or piston.
#!/bin/sh # This software was produced with support in part from the Defense Advanced # Research Projects Agency (DARPA) through AFRL Contract FA8650-09-C-1915. # Nothing in this work should be construed as reflecting the official policy # or position of the Defense Department, the United States government, # or Rice University. SRC_DIR=${SRC_DIR_PREFIX}data/01 PROFILE_DIR=${SRC_DIR}/PROFILE # return code for passing PASS=0 set -x "$@" ./propagate_metrics \ -rose:hpct:prof ${PROFILE_DIR}/PAPI_TOT_CYC.xml \ -rose:hpct:prof ${PROFILE_DIR}/PAPI_FP_OPS.xml \ -rose:hpct:prof ${PROFILE_DIR}/PAPI_L1_DCM.xml \ -rose:hpct:prof ${PROFILE_DIR}/PAPI_L2_TCM.xml \ -rose:hpct:eqpath ./src/home/dxnguyen/git-rose/rose-zung/tests/nonsmoke/functional/roseTests/roseHPCToolkitTests/data/01=data/01 \ -c ${SRC_DIR}/example.c >&1 | tee test_prop01-out.txt diff test_prop01-out.txt ${PROFILE_DIR}/test_prop01-answer.txt rc=$? if [ $rc -eq $PASS ]; then echo "******* HPCTOOLKIT test_prop01 PASSED *********" else echo "error: ******* HPCTOOLKIT test_prop01 FAILED *********" fi #rm -f test_prop01-out.txt exit $rc # eof
Measurement of adult antibacterial drug use in 130 US hospitals: comparison of defined daily dose and days of therapy. Hospitals are advised to measure antibiotic use and monitor its relationship to resistance. The World Health Organization's recommended metric is the defined daily dose (DDD). An alternative measure is the number of days of therapy (DOT). The purpose of this study was to contrast these measures. We measured the use of 50 antibacterial drugs that were administered to adults who were discharged from 130 US hospitals during 1 August 2002-31 July 2003. Of 1,795,504 patients, 1,074,174 received at least 1 dose of an antibacterial drug (59.8%). The mean (+/- standard deviation) of total antibacterial drug use measured by the number of DDDs per 1000 patient-days and the number of DOTs per 1000 patient-days were not significantly different (792+/-147 and 776+/-120, respectively; P=.137), although the correlation was poor (r=0.603). For some individual drugs, such as levofloxacin and linezolid, there was no significant difference between DDDs per 1000 patient-days and DOTs per 1000 patient-days, because the administered daily dosage was nearly equivalent to the DDD. When the administered dosage exceeded the DDD, such as for ampicillin-sulbactam and cefepime, estimates of use based on DDDs per 1000 patient-days significantly exceeded those based on DOTs per 1000 patient-days (P<.001). When the administered dosage was less than the DDD, such as for piperacillin-tazobactam and ceftriaxone, estimates of use based on DDDs per 1000 patient-days were significantly lower than those based on DOTs per 1000 patient-days (P<.001). The measurement of aggregate hospital antibiotic use by DDDs per 1000 patient-days and DOTs per 1000 patient-days is discordant for many frequently used antibacterial drugs, because the administered dose is dissimilar from the DDD recommended by the World Health Organization. DDD methods are useful for benchmarking purposes but cannot be used to make inferences about the number of DOTs or relative use for many antibacterial drugs.
Painting Ikea Pine Furniture Chest Of 6 Drawers Cm painting ikea pine furniture chest of 6 drawers cm one of Furniture Ideas collection that can give you a concept to make a good decision about what furniture which can make your home beautiful, this is a awesome unique article being published at October 30, 2017, 1:21 am posted on furniture Category . Many People today decide to take some time away from their careers, take a break to perform up their house interiors and this one painting ikea pine furniture chest of 6 drawers cm will guide you to arrange a good view of your furniture decoration . Spending day looking for custom furniture to their house makes them house proud and brings out their creativity. A home full of custom furniture afterward reflects the owner's personality and provides them an identity. Now the trend is to Design your customized layout furniture for every room of your house and have them fabricated according to the plan. There are several renowned companies who take orders of the kind and are famed for Manufactured to Order custom furniture. . And also some furniture ideas on blog that will give you some ideas to build one for your home like this painting ikea pine furniture chest of 6 drawers cm
using YAF.Lucene.Net.QueryParsers.Flexible.Core.Config; using System.Collections.Generic; namespace YAF.Lucene.Net.QueryParsers.Flexible.Standard.Config { /* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ /// <summary> /// This listener listens for every field configuration request and assign a /// <see cref="ConfigurationKeys.BOOST"/> to the /// equivalent <see cref="FieldConfig"/> based on a defined map: fieldName -> boostValue stored in /// <see cref="ConfigurationKeys.FIELD_BOOST_MAP"/>. /// </summary> /// <seealso cref="ConfigurationKeys.FIELD_BOOST_MAP"/> /// <seealso cref="ConfigurationKeys.BOOST"/> /// <seealso cref="FieldConfig"/> /// <seealso cref="IFieldConfigListener"/> public class FieldBoostMapFCListener : IFieldConfigListener { private QueryConfigHandler config = null; public FieldBoostMapFCListener(QueryConfigHandler config) { this.config = config; } public virtual void BuildFieldConfig(FieldConfig fieldConfig) { IDictionary<string, float?> fieldBoostMap = this.config.Get(ConfigurationKeys.FIELD_BOOST_MAP); if (fieldBoostMap != null) { float? boost; if (fieldBoostMap.TryGetValue(fieldConfig.Field, out boost) && boost != null) { fieldConfig.Set(ConfigurationKeys.BOOST, boost); } } } } }
package org.stagemonitor.alerting.alerter; import java.io.IOException; import javax.servlet.ServletException; import javax.servlet.http.HttpServlet; import javax.servlet.http.HttpServletRequest; import javax.servlet.http.HttpServletResponse; import org.stagemonitor.alerting.AlertingPlugin; import org.stagemonitor.alerting.check.CheckResult; import org.stagemonitor.core.Stagemonitor; import org.stagemonitor.core.util.JsonUtils; public class TestAlertSenderServlet extends HttpServlet { private final AlertingPlugin alertingPlugin; public TestAlertSenderServlet() { this(Stagemonitor.getPlugin(AlertingPlugin.class)); } public TestAlertSenderServlet(AlertingPlugin alertingPlugin) { this.alertingPlugin = alertingPlugin; } @Override protected void doPost(HttpServletRequest req, HttpServletResponse resp) throws ServletException, IOException { final CheckResult.Status status = CheckResult.Status.valueOf(req.getParameter("status")); final Subscription subscription = JsonUtils.getMapper().readValue(req.getInputStream(), Subscription.class); alertingPlugin.getAlertSender().sendTestAlert(subscription, status); } }
Article content Fifteen years after 9/11 we continue to feel the aftershocks. They are present in the U.S. presidential campaign. They are present in Ottawa, as Canadian politicians begin to grapple, belatedly, with populist nativism. Remembered daily or put out of mind, the attacks on the Twin Towers and the Pentagon resonate everywhere and change everything, still. It’s unclear at this juncture that world leaders — even the most powerful – have much control of the aftermath even now, or more than a very bleary idea of what to do about it. Like the rest of us they’re hanging on, clinging to the life buoy, praying for calm. Except for the predatory few, the Donald Trumps, Nigel Farages and Marine Le Pens, who’ve tried to catch a wave. We apologize, but this video has failed to load. tap here to see other videos from our team. Try refreshing your browser, or Michael Den Tandt: Nativism in the U.S. and Canada has become one of the sad legacies of 9/11 Back to video To understand what connects the murders of 2,996 people on that bright, awful morning to the rise of Trump and the “alt right” 15 years on, or the possible disintegration of a borderless Europe, or indeed Conservative leadership aspirant Kellie Leitch’s plan to screen immigrants for “anti-Canadian” values, we need only review the history. The inflection points are impossible to miss.
biggest value? (a) -2 (b) y (c) 4 c Suppose 3*w = j - 12, -7 = -4*j + w - 3. What is the third biggest value in j, -1/2, -0.4? -1/2 Let c be ((-12)/(-3))/12 + (-3)/63. What is the smallest value in -9, c, -5/3? -9 Let d be 3/(-2)*(-36)/135. Let k = 6.7 - 7. Let n = 0 - 0.2. Which is the biggest value? (a) k (b) n (c) d c Let g = -2.5 - 1.5. What is the smallest value in g, 2, -2/7? g Let k = 0.43 - 0.23. Which is the third biggest value? (a) -0.2 (b) 1 (c) k a Let s(u) = u**2 - 6*u + 8. Let n be s(4). Let h = 4 + -3.6. What is the second biggest value in -2, n, h? n Let v = 7.5 - 7.2. Which is the third smallest value? (a) -1 (b) -9 (c) -2/21 (d) v c Let t = -135 + 132. What is the third smallest value in t, 4, 20? 20 Let k = 95 - 95. What is the biggest value in 5, k, 1, -7? 5 Let i = 7 - 7.3. Let c be 248/88 + (0 - 3). What is the smallest value in c, i, -0.1? i Let r = -4 + 9. What is the second biggest value in -0.2, 0.1, r? 0.1 Let b = 153/7 - 22. What is the third biggest value in -3, 1/5, -0.5, b? -0.5 Let s(n) = n + 7. Let x be s(-5). Let g be x*27/(-6)*-1. Let h be (-30)/8*3/g. Which is the third smallest value? (a) h (b) -4 (c) -2/21 c Let s = 5 - 8. Let h = 20 - 39/2. What is the third smallest value in h, s, 0.4? h Let p be (-8)/28*12 - -3. What is the third biggest value in p, -3, 0.3? -3 Suppose 4*g - 11*g + 28 = 0. Let y = 0.2 - 0. What is the third smallest value in -6, g, y? g Let f = -0.2 - -0.2. Let g = f - -0.1. Which is the second smallest value? (a) -3/2 (b) -0.1 (c) g b Let t be 2/(-3)*-6*2/16. What is the fourth biggest value in -1, 0.4, 3/4, t? -1 Let s = 15 - 15.41. Let v = 0.11 + s. What is the third smallest value in v, -5/4, 4? 4 Suppose 0 = -2*w + 4*v + v + 391, -2*w = 5*v - 401. Let u = w - 993/5. Which is the second smallest value? (a) 0.2 (b) -0.1 (c) u b Let j = 32 + -27. Let k = -1 - 0. What is the third biggest value in j, k, 3? k Let j(l) = 2*l**2 - 4*l - 1. Let d be j(3). Suppose d*p - 8 = p. What is the smallest value in -0.4, 4, p? -0.4 Let p = -273/43994 - -1228230771/1011862. Let q = p - 1214. Let b = q + 82/207. What is the second smallest value in b, -5, 0? 0 Let d = -624023/237 + 2633. Let g = 56/395 + d. Which is the second smallest value? (a) g (b) 0.4 (c) 1 b Let l = -15 - -13. Which is the biggest value? (a) -0.08 (b) l (c) 4 c Let v(j) = -j - 8. Let l(y) = -3*y - 2*y + 7*y + 8. Let r(d) = -2*l(d) - 3*v(d). Let q be r(8). Which is the second biggest value? (a) 2/3 (b) q (c) -0.5 b Let z(l) = l**3 - 2*l**2 + l + 1. Let s be z(2). Which is the smallest value? (a) 1/2 (b) s (c) -2/19 c Let d = -5.09 - -0.09. Let x = 0.34 - -0.04. Let k = 0.02 + x. Which is the third biggest value? (a) k (b) d (c) 3/2 b Let w = 9 + -15. Let x be (0 + w)*(-2)/(-8). Let h(m) = m**3 - 11*m**2 + m - 12. Let q be h(11). What is the second biggest value in -1/2, x, q? q Let c = -9 + 9.4. What is the smallest value in 3/8, 5, c? 3/8 Let d(k) = k**2 + k + 4. Suppose 4*m = 5*m. Let x be d(m). What is the second biggest value in -2/5, x, -0.3? -0.3 Let s be 366/21*(-14)/(-8). Let r = s + -31. Which is the biggest value? (a) r (b) -3 (c) 0.2 c Let s = 0.4 - 0.9. Let d = -0.9 + 1. Let j = d + 0.3. What is the biggest value in 2, j, s? 2 Suppose -6*a + 3*a = -15. Let l = -0.8 + 1. What is the biggest value in l, 2/21, a? a Let s = -2281 + 2271.01. Let r = -10 - s. Let y = r - 0.29. Which is the third smallest value? (a) y (b) -3/8 (c) 2 c Let x = -17/5 + 16/5. Let k be 14/(-30) - (-2)/3. Which is the second smallest value? (a) x (b) -0.3 (c) k a Let m = -4 - -3. Let f be (-3)/9*6/10. Let a = -116 + 814/7. What is the biggest value in a, f, m? a Let l = 0.2 + 0.7. Let q = l + -0.5. Which is the third biggest value? (a) 0.06 (b) q (c) 4 a Let o = 1.16 - 1.16. Let z = -6 - -5.6. Which is the biggest value? (a) 1/3 (b) o (c) z a Let w be 2*-1*(5/(-2) + 2). Which is the second smallest value? (a) 1/7 (b) 0 (c) w (d) -2/5 b Suppose -3*v - 2*p + 0*p + 22 = 0, -2*v = 2*p - 18. Let s = 0 - 1. Which is the third smallest value? (a) 0.4 (b) v (c) s b Let s = 0.18 + -3.18. Which is the second smallest value? (a) 0 (b) -4 (c) s c Suppose 3*u - 2*u + 2*b = -128, 2*u + b + 256 = 0. Let z be u/(-168) - (-1)/(-3). What is the third biggest value in -1/9, z, 0.5? -1/9 Let r = 6 - 5. Let f = 3 + r. Let n(k) = 5*k. Let v be n(-1). Which is the second smallest value? (a) -1 (b) v (c) f a Let m = 2 - -2. What is the second biggest value in 3, m, -6/7? 3 Let s be 36/(-40) - (-6)/15. Which is the third smallest value? (a) s (b) 0.3 (c) -1 b Let x = 41 + -73. Let r = x - -32.13. Let j = -0.07 - r. Which is the third biggest value? (a) 0.3 (b) j (c) 5/2 b Let u = -0.23 - 0.07. Let o = u - -1.3. Let f = o - 5. Which is the third smallest value? (a) 2 (b) f (c) 2/13 a Let p = 2 + -1. Let n = -34 + 34.4. Which is the smallest value? (a) p (b) 2 (c) n c Let q = 5.97 - 6. Let p = 2.03 + q. Which is the third smallest value? (a) 0.4 (b) p (c) 4 c Let m = -3/25 - -131/50. Let k = m - 7/4. Which is the second biggest value? (a) 1 (b) k (c) 0.5 b Let i(d) = 32*d**2 - 1. Let q be i(-1). Let x = q + -123/4. Which is the third biggest value? (a) -4 (b) 0.1 (c) x a Let v = -2.8 - 0.2. Let y = 21 - 12. Suppose 13 + y = -x + 5*l, -2*x = -4*l + 14. Which is the third smallest value? (a) 4 (b) x (c) v a Let j be (-48)/36 - (-2)/3. Which is the second smallest value? (a) j (b) 0.2 (c) -0.2 c Let z = 26 + -18. Let w = 18.9 + -11.2. Let v = z - w. What is the third smallest value in 0, 4, v? 4 Let j = 2 + -11/6. What is the third biggest value in 4, j, 0.3? j Let t be ((-4)/(-84))/(-2 - 7). Let z = -82/189 - t. Let h = -0.1 + 0.1. Which is the third smallest value? (a) h (b) z (c) 1/3 c Let j = -2 - -4. Let t be (-8)/(-6) + (1 - j). What is the second biggest value in -3, -4/9, t? -4/9 Let w = 4.979 + 0.021. What is the biggest value in 4, 1, w? w Let r = -0.17 - 0.23. What is the second smallest value in r, 15, -2/9? -2/9 Let a be 15/(-3) - (-2 + (1 - 2)). What is the biggest value in 2, -44, a? 2 Let t = -119 + 114. What is the third smallest value in t, -1, -0.5? -0.5 Let g = 0 - -11. Let q = -10 + g. Which is the smallest value? (a) 4 (b) q (c) 5 b Suppose 0*t = -t - 14. Let b = t + 9. What is the third smallest value in 4, 0.4, b? 4 Let s be (1*-1)/(63/(-14)). Suppose -2*n = 3*w + 6, -4*n + 4*w = 2 + 10. What is the smallest value in n, s, 0? n Let q = 1.1 - -2.9. What is the third smallest value in q, 5, -2/5? 5 Let h = -4 - -3. Let n = 0.38 - -0.02. Which is the third smallest value? (a) n (b) h (c) 1/6 a Let h = 0.4 - -2.6. Let c = -2 + 1.9. What is the second smallest value in h, c, -0.07? -0.07 Suppose -2*i - i + 17 = -2*z, 2*z + 27 = 5*i. Suppose -2*s + 4*j + 14 = s, -5*s + j - 5 = 0. What is the smallest value in -3/2, s, i? s Let l = -3.1 + 3. Let f = -85 - -169/2. What is the second biggest value in l, f, 0? l Let p = 33 + -101/3. What is the third biggest value in 7/6, 2/13, p? p Let r = -433/5 - -87. Let d = 1 - 0.92. Let z = d - -3.92. Which is the second biggest value? (a) 1/5 (b) r (c) z b Let v = -183 + 129. Let k = 11 + -10. Let g be (-7 + k)*(-4)/v. Which is the second smallest value? (a) 0.4 (b) g (c) -4 b Let k = 1.6 - 1.3. Which is the biggest value? (a) k (b) 3 (c) 1 (d) 0 b Let n be 2 - 2*127/6. Let w = -41 - n. Let x be (1 - 0)/((-63)/7 - -10). What is the second biggest value in x, 4, w? x Let u = -3.4 + 4. Let t = -6.4 - u. Let k = t + 6.9. What is the third smallest value in 1, k, -4? 1 Let o = 0.55 - 0.85. What is the third smallest value in o, -14/3, -0.1, -2/9? -2/9 Suppose 2*s = -2*i, -4*s - 19 - 6 = -i. Let l(w) = -w**3 - 4*w**2 + 4*w + 4. Let x be l(s). What is the third biggest value in x, 2/21, -1/4? -1/4 Let s be (2 - 2) + 4/14. Let t = 5.04 - 0.04. Which is the smallest value? (a) s (b) t (c) 5/2 a Let y = 0.13 + -0.08. Let o = 0.45 + y. Let w = 2 - 0. Which is the smallest value? (a) w (b) o (c) 3/7 c Let d = -0.12 - 1.48. Let f = d - -2. Let w = 0 + f. Which is the third smallest value? (a) 4 (b) 0.5 (c) w a Let h = -0.16 + -0.04. Which is the biggest value? (a) -2 (b) 1/3 (c) h (d) 0.4 d Let l = -17 - -1
Background {#Sec1} ========== Necrotising fasciitis is a rapidly progressing soft-tissue infection, which has historically been linked to penetrating trauma in war times \[[@CR1]\]. Paediatric textbooks did not mention necrotising fasciitis before 1973 \[[@CR2], [@CR3]\] despite the first case of necrotising fasciitis in a child \[[@CR4]\] being reported just six years after the initial description in adults \[[@CR5]\]. Selective literature reviews dealing with necrotising fasciitis in childhood usually deduce their recommendations from small case series or reports on adults \[[@CR6]--[@CR9]\]. In them, considerable research effort has been made to analyze necrotising fasciitis on a population based level \[[@CR10]\], for specific patient groups at risk for necrotising fasciitis \[[@CR11]\], and to facilitate early diagnosis \[[@CR12]--[@CR14]\]. In contrast, the knowledge on paediatric necrotising fasciitis is scarce: One database article identified 334 children with necrotising soft-tissue infections, but focused on treatment, outcome, and a multivariate analysis of independent risk factors for fatal outcomes \[[@CR15]\]. The two largest studies reporting on skin signs, risk factors and outcomes include 39 retrospectively assessed \[[@CR16]\] and 32 prospectively included cases \[[@CR17]\]. The 39 retrospective cases were collected within 30 years \[[@CR16]\], whereas the prospective study was conducted within four years, but included 20 neonates \[[@CR17]\]. The difference in research on necrotising fasciitis in adults and children may further be emphasised by studies on laboratory parameters that may aid in diagnosis of necrotising fasciitis: While 20 children were investigated in a case-control study \[[@CR18]\], a meta-analysis of adult patients included 846 cases from 16 studies \[[@CR14]\]. Recently, a systematic review of necrotising fasciitis in children has been published \[[@CR19]\], which is hampered by several shortcomings: Limited to articles published in English language after 2010, lack of clearly defined inclusion and exclusion criteria, inclusion of neonates, and cases likely to be Fournier's gangrene due to genital involvement. Therefore, we aimed to identify specific features of necrotising fasciitis in childhood that may aid in early diagnosis and treatment initiation of this devastating disease by means of a systematic review. Furthermore, we aimed to gather information on causative organisms and the necessity of reconstructive procedures following an episode of necrotising fasciitis in children. Methods {#Sec2} ======= Guidelines and protocol for the systematic review {#Sec3} ------------------------------------------------- We developed a Preferred Reporting Items for Systematic Reviews and Meta-Analyses - Protocols \[[@CR20]\] compliant protocol (Additional file [1](#MOESM1){ref-type="media"}) for the systematic review, and closely followed the Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines \[[@CR21]\] during the systematic review. Literature search strategy {#Sec4} -------------------------- The literature search strategy with its adaptations to the three databases 'PubMed', 'Web of Science' and 'SCOPUS' is laid out in detail in the appendix of the protocol (Additional file [1](#MOESM1){ref-type="media"}). A sensitivity-oriented approach combining text elements and Medical Subject Headings was used in all three databases. Literature search was extended towards snowballing the reference lists of all included studies and relevant reviews. We conducted the literature search on the 9^th^ of January 2016 and updated it at the 4^th^ of December 2018. Types of included studies {#Sec5} ------------------------- Preliminary searches failed to identify prospective studies on signs on presentation. We therefore opted to include retrospective case series and case reports to collect information on these aspects, because information from reports with higher quality were not available. Only population-based data were considered eligible to determine incidence and case-fatality rates. Inclusion criteria {#Sec6} ------------------ Inclusion criteria for our systematic review were: Patient age between one month and 17 years. Studies have reported symptoms on presentation separate for each patient or for the whole group if all cases were within the age limit. Studies should indicate whether risk factors were present. Studies have reported on case fatalities. Studies reporting on incidence and case fatality rates on a population-based level must include data within the same age limits as stated above, but do not have to report on signs at presentation or risk factors. Exclusion criteria {#Sec7} ------------------ Exclusion criteria for our systematic review were: Studies were narrative reviews. Studies include patient data outside the specified age group that cannot be removed from the reported results. Studies include data on neonates or Fournier's grangrene that cannot be separated from the paediatric data. Studies were reported in languages that could not be adequately translated using Google translator into a language that one of the authors can speak fluently (English, German, French, Dutch/Afrikaans, and Spanish). Primary and secondary outcomes {#Sec8} ------------------------------ Our primary outcomes were: Determine incidence and case-fatality rates of necrotising fasciitis in children from population-based reports and assess skin symptoms on presentation. Our secondary outcomes were: Age-specific case fatality rates, risk factors for necrotising fasciitis, signs of systemic illness due to necrotising fasciitis, microbes causative for necrotising fasciitis and reconstructive procedures following necrotising fasciitis. Literature selection and data extraction {#Sec9} ---------------------------------------- Two researchers independently assessed the search results and extracted data from the included reports as described in the protocol (Additional file [1](#MOESM1){ref-type="media"}). Following de-duplication, titles were independently screened for eligibility followed by reading the abstracts as second and the full-text as a third step. Each step was checked for consistency by another researcher. Differences between the two independent researchers were settled by consensus. If consensus could not be reached, the assessment of a third researcher was decisive. We used a Data extraction sheet (Additional file [2](#MOESM2){ref-type="media"}) for the documentation of the results. Definitions for data acquisition {#Sec10} -------------------------------- We defined all skin symptoms which were not explicitly mentioned in a report as absent. This definition was also used for signs of systemic illness not reported. Signs of systemic illness and reconstructive procedures were only included if at least one item was reported in the study, otherwise the respective cells were not included in the analysis. Definitions for the systemic inflammatory response syndrome relied on the international paediatric sepsis consensus conference \[[@CR22]\]. Risk factors in the pooled cases {#Sec11} -------------------------------- We grouped the underlying conditions or preceding events of the included cases into five distinct risk groups: Varicella, surgery, immunocompromise, trauma, and minor trauma (e.g. an insect bite, a bruise from a fall etc.) and contrasted them with the cases in which necrotising fasciitis occurred without predisposing factors. Protocol deviations {#Sec12} ------------------- The study by *Mulla* reports cases of necrotising fasciitis in children caused by group-A streptococci in Florida between August 1996 and August 2000, but did not provide incidence data \[[@CR23]\]. We extrapolated incidence data by using census data of Florida in 2000, which counted 3,646,340 persons below 18 years of age \[[@CR24]\]. The population data used in the Finnish incidence study \[[@CR25]\] had an age limit of 15 years. The neonatal case in the study by *Eneli & Davies* \[[@CR26]\] has been excluded and the incidence data were recalculated using population data provided within the report. The report by *Gjessing Jensen & Christensen* \[[@CR27]\] was not translated using Google translator as stated in the protocol, because the corresponding author supplied us with an author translation. Results {#Sec13} ======= Article selection {#Sec14} ----------------- We identified five studies that reported population-based on incidence and case-fatality rates in 68 cases \[[@CR23], [@CR25], [@CR26], [@CR28], [@CR29]\], two case-control studies with 27 cases \[[@CR30], [@CR31]\], and another 298 cases from 195 case series and case reports \[[@CR2]--[@CR4], [@CR8], [@CR27], [@CR32]--[@CR221]\] (Fig. [1](#Fig1){ref-type="fig"}). Fig. 1Preferred reporting items for systematic reviews and meta-analyses flow diagram. Literature search and selection of studies for the systematic review Incidence rate {#Sec15} -------------- Two studies from Canada were prospective: One monitored the whole country \[[@CR26]\], whereas the other was limited to Ontario \[[@CR28]\]. Another study collected retrospective data for Florida \[[@CR23]\] and another relied on the database of a hospital chain in Utah, which claimed to cover 70-85% of all hospital admissions of children in this state \[[@CR29]\]. The last report was based on the data of Finnish university hospitals and the childhood population living in their referral area \[[@CR25]\]. Only one study \[[@CR26]\] reports incidence data for cases of necrotising fasciitis for both group-A streptococci and non-group-A streptococci, whereas the remaining three studies were limited to necrotising fasciitis caused by group-A streptococci \[[@CR23], [@CR28], [@CR29]\]. The incidence rate of necrotising fasciitis varied from 0.843 cases per 100,000 children per year due to group-A streptococci in the Finnish Oulu University Hospital area \[[@CR25]\] to 0.022 cases per 100,000 children per year caused by group-A streptococci \[[@CR23]\]. Incidence rates of 0.212 cases occurred due to group-A streptococci and 0.0729 cases were caused by all other organisms \[[@CR26]\] 0.01 \[[@CR29]\] and 0.08 per 100,000 children per year \[[@CR28]\] were in between. Case fatality rate {#Sec16} ------------------ The case fatality rate differed between 14.3% (1/7) \[[@CR29]\], 10% (1/10) \[[@CR28]\], and 0% in two reports \[(0/3) \[[@CR23]\] and (0/13) \[[@CR25]\]\], but was 2.85% (1/35) in the only study that included cases caused by other germs than group-A streptococci \[[@CR26]\]. Properties of the identified case-control studies {#Sec17} ------------------------------------------------- The first identified case-control study had a mixed design of retrospectively (5/19) and prospectively (14/19) included cases. It aimed to describe an association between necrotising fasciitis following primary varicella infection and a preceding treatment with ibuprofen \[[@CR30]\]. Twenty-nine controls were prospectively identified and had non-necrotising skin infections following primary varicella infection \[[@CR30]\]. Therefore, study parameters were collected with the intent to compare baseline variables between two groups \[[@CR30]\]. The second case-control study aimed to identify specific features of necrotising fasciitis compared to non-necrotising soft tissue infections \[[@CR31]\]. It included cases within 16 years \[[@CR31]\], whereas the first study had a duration of 19 months \[[@CR30]\]. Age, sex and geographic distribution {#Sec18} ------------------------------------ The included cases had a similar mean age compared to the case-control studies (Table [1](#Tab1){ref-type="table"}). Distribution of age groups within the pooled cases was similar except for a slight over-representation of school children and a corresponding under-representation of adolescents and infants. Males were predominantly affected in the varicella and ibuprofen case-control study with 74% (14/19) \[[@CR30]\], and within the pooled cases (57.4%, 171/298), but not in the second case-control study (3/8 males) \[[@CR31]\]. North America accounted for 39.9% (119/298), Asia for 31.9% (95/298), and Europe for 21.1% (63/298) of the included cases. In contrast, South America contributed ten (3.3%), Africa nine (3%), and Oceania only two reports. Table 1Age, risk factors, skin symptoms, and signs of systemic illness in case-control studies and pooled casesItemZerr et al. \[[@CR30]\]Hsieh et al. \[[@CR31]\]Pooled cases \[[@CR2]--[@CR4], [@CR8], [@CR27], [@CR32]--[@CR221]\]Age \[years\] (range)4.6 (0.5-9.6)5 (2-13)5.7 (0.1-17)Varicella \[%\] (Number)100 (19/19)50 (4/8)25.9 (77/297)No risk factor \[%\] (Number)012.5 (1/8)22.9 (68/297)Minor trauma \[%\] (Number)0012.5 (37/297)Immunocompromise \[%\] (Number)0011.8 (35/297)Surgery \[%\] (Number)012.5 (1/8)9.4 (28/297)Trauma \[%\] (Number)025 (2/8)8.1 (24/297)Skin infection \[%\] (Number)006.1 (18/297)Intramuscular injection \[%\] (Number)001.7 (5/297)Neuropathy \[%\] (Number)001.4 (4/297)Diabetes \[%\] (Number)000.4 (1/297)Erythema \[%\] (Number)94.7 (18/19)87.5 (7/8)58.7 (175/298)Swelling \[%\] (Number)100 (19/19)87.5 (7/8)48 (143/298)Pain \[%\] (Number)100 (19/19)87.5 (7/8)33.6 (100/298)Splinting \[%\] (Number)66.7 (12/18)37.5 (3/8)3 (9/298)Tenderness \[%\] (Number)037.5 (3/8)25.2 (75/298)Discolouration \[%\] (Number)0032.6 (97/298)Necrosis \[%\] (Number)0032.2 (96/298)Oedema \[%\] (Number)0026.5 (79/298)Induration \[%\] (Number)0014.4 (43/298)Warmth \[%\] (Number)0010.7 (32/298)Bullae \[%\] (Number)009.1 (27/298)Discharge \[%\] (Number)008.4 (25/298)Ecchymosis \[%\] (Number)008.4 (25/298)Blister \[%\] (Number)006 (18/298)Crepitus \[%\] (Number)003.7 (11/298)Fever \[%\] (Number)100 (19/19)Not reported76.7 (188/245)Tachycardia \[%\] (Number)0Not reported40.7 (94/231)Tachypnea \[%\] (Number)0Not reported27.7 (64/231)Hypotension \[%\] (Number)26.3 (5/19)Not reported29.9 (69/231)Leukocytosis \[%\] (Number)Not reportedNot reported49.5 (106/214)Bandemia \[%\] (Number)Not reportedNot reported22.9 (49/214)Leukopenia \[%\] (Number)Not reportedNot reported17.3 (29/214)Hypothermia \[%\] (Number)0Not reported0.8 (2/245)Bradycardia \[%\] (Number)0Not reported0.4 (1/231)Systemic inflammatory response syndrome \[%\] (Number)Not reportedNot reported65.1 (175/269) Items assessed in the systematic review {#Sec19} --------------------------------------- The results can be found in Tables [1](#Tab1){ref-type="table"} and [2](#Tab2){ref-type="table"}. An itemisation for risk factors revealed that there were no obvious differences between them. Table 2Isolated germs, involved body regions, fatalities, and reconstructive procedures in case-control studies and pooled casesItemZerr et al. \[[@CR30]\]Hsieh et al. \[[@CR31]\]Pooled cases\[[@CR2]--[@CR4], [@CR8], [@CR27], [@CR32]--[@CR221]\]Group-A streptococci \[%\] (Number)84.2 (16/19)87.5 (7/8)44.8 (132/295)*Staphylococcus aureus* \[%\] (Number)5.3 (1/19)12.5 (1/8)18.6 (55/295)Gramnegative rods combined \[%\] (Number)0029.8 (88/295)*Pseudomonas aeruginosa* \[%\] (Number)0010.2 (30/295)*Escherichia coli* \[%\] (Number)007.8 (23/295)*Serratia marcescens* \[%\] (Number)001.7 (5/295)*Klebsiella* species \[%\] (Number)001.7 (5/295)Other gramnegative rods \[%\] (Number)008.5 (25/295)Anaerobe microbes \[%\] (Number)007.1 (21/295)Other streptococci \[%\] (Number)006.8 (20/295)Fungi \[%\] (Number)003.4 (10/295)Other staphylococci \[%\] (Number)003.1 (9/295)*Enterococcus* species \[%\] (Number)002.7 (8/295)Polymicrobial infection \[%\] (Number)5.3 (1/19)017.3 (51/295)Extremities \[%\] (Number)63.2 (12/19)Not reported45.6 (136/298)Lower extremity \[%\] (Number)Not reportedNot reported33.9 (100/298)Upper extremity \[%\] (Number)Not reportedNot reported12.1 (36/298)Trunk \[%\] (Number)21.1 (4/19)Not reported32.9 (98/298)Head \[%\] (Number)15.8 (3/19)Not reported20.8 (62/298)Retroperitoneum \[%\] (Number)0Not reported0.7 (2/298)Second body region involved \[%\] (Number)0Not reported16.8 (50/298)Lower extremity \[%\] (Number)0Not reported11.1 (33/298)Trunk \[%\] (Number)0Not reported3.7 (11/298)Upper extremity \[%\] (Number)0Not reported2 (6/298)More than two body regions involved \[%\] (Number)0Not reported2.7 (8/298)Fatalities \[%\] (Number)0010.4 (31/295)Primary closure \[%\] (Number)Not reportedNot reported17.3 (28/162)Secondary closure \[%\] (Number)Not reportedNot reported20.4 (33/162)Skin graft \[%\] (Number)Not reportedNot reported51.6 (84/162)Skin flap \[%\] (Number)Not reportedNot reported10.5 (17/162) Discussion {#Sec20} ========== We aimed to identify features specific to necrotising fasciitis in children by a systematic review. Whereas necrotising fasciitis had been subject to intensive research efforts in adults, knowledge on necrotising fasciitis in children is scarce. We identified four studies reporting population based incidences and case-fatality rates, of which two were prospectively conducted. Moreover, three of them were limited to cases of necrotising fasciitis caused by group-A streptococci and had a narrow geographic focus: Either a Canadian province \[[@CR28]\], states within the United States of America \[[@CR23], [@CR29]\] or the referral area of Finnish university hospitals \[[@CR25]\]. Only one report assessed necrotising fasciitis on a nationwide level \[[@CR26]\] and included cases caused by other organisms than group-A streptococci. This might represent an accurate estimation of the burden of disease for an industrialised country. Necrotising fasciitis may be more common in developing countries as indicated by a monocentric Nigerian prospective observational study: It included 32 cases of necrotising fasciitis in childhood within 4 years \[[@CR17]\]. Although 20 cases were neonates - leaving 12 children - the report \[[@CR17]\] still hints at higher incidences in low-income countries. Moreover, all of these children presented with tissue necrosis \[[@CR17]\] indicating an advanced disease \[[@CR9], [@CR222]\]. Similarly, ecchymosis and necrosis were found in 72% of cases in the other large case series \[[@CR16]\]. In contrast to these late-appearing skin symptoms, pain, erythema, swelling, and - to a lesser extent - splinting were predominant skin symptoms in both case-control studies \[[@CR30], [@CR31]\]. The analysis of skin symptoms within the pooled cases did not identify highly frequent lesions: Only erythema had been noted in more than a half of the included cases and swelling in almost a half of the affected cases despite an advanced stage of disease - evidenced by either ecchymosis or necrosis - in 40.6% of the cases. This result may be explained by recall bias: The lack of clinical information that has been present in the patient, but was not documented in the patient's file and thus not included in the published report \[[@CR223]\]. Consequently, the more subtle skin symptoms might not be documented in light of the more dramatic changes such as necrosis or discolouration. Recall bias is also likely to have affected the signs of systemic illness within the pooled cases. Signs of systemic illness had similar frequencies among the pooled cases with the exception of fever in 76.6%. This percentage was smaller than the 100% reported in both case-control studies, and the 92% in the largest report on paediatric necrotising fasciitis \[[@CR16]\]. Frank et al. \[[@CR6]\] suggested that necrotising fasciitis would often go hand in hand with normal white cell counts combined with pronounced bandemia, whereas others associated necrotising fasciitis specifically with increased white cell counts \[[@CR9]\]. In both case-control studies, white cell counts did not differ from those in patients diagnosed with cellulitis \[[@CR30], [@CR31]\]. Within the pooled cases, 49.5% had leukocytosis, 17.3% leukopenia, and 22.9% bandemia, of which the majority were found conjointly with leukocytosis. However, leukocyte counts are not part of the paediatric laboratory risk indicator for necrotising fasciitis, developed to differentiate cellulitis from necrotising fasciitis: Only C-reactive protein and sodium levels below 135mmol/L were found to be of relevance \[[@CR18]\]. An abnormal leukocyte count or temperature are required to diagnose systemic inflammatory response syndrome, which occured in 65.1% of the pooled cases. A recent case-control study has shown that fever, tachycardia, and tachypnea might be used to differentiate necrotising fasciitis from abscesses or cellulitis \[[@CR224]\]. Thus, a systemic inflammatory response syndrome conjointly with the combination of the most frequent skin symptoms from the case-control studies - swelling, pain, erythema, and probably splinting - might be predictive for necrotising fasciitis. Due to the limitations of the data included in the systematic review, this symptom combination needs to be evaluated for its predictive value before recommendations can be made. Predominant involvement of extremities followed by lesions on trunk and head was a common picture within all included studies. It also is in line with other reports \[[@CR16]\] and adult data \[[@CR11], [@CR225], [@CR226]\]. This is different concerning polymicrobial necrotising fasciitis: Previously, polymicrobial infection was commonly reported in paediatric necrotising fasciitis in developed \[[@CR227]\] as well as developing countries \[[@CR16], [@CR17]\]. Among the pooled cases, in contrast, necrotising fasciitis was usually monomicrobial, which has previously been attributed to necrotising fasciitis following primary varicella infection \[[@CR30], [@CR31], [@CR222]\]. Whether the pooled cases provide an accurate estimation of the distribution of mono- and polymicrobial infections needs to be assessed at a larger scale. In particular, Gram-negative rods isolated from wounds may depict a changing spectrum of necrotising fasciitis with a transition of risk factors from primary varicella towards immunocompromised or operated patients. Introduction of varicella vaccination resulted in reduction of the case load of necrotising fasciitis caused by group-A streptococci \[[@CR228], [@CR229]\]. Again, these results have to be validated by large scale studies. The necessary information seem to be available in certain databases as the negative association of both *Streptococcus* spp. and *Staphylococcus* spp. with case fatalities \[[@CR15]\] could not have been calculated without knowledge of isolated germs. Case fatality rates have been \[[@CR225]\] and still are high in adults \[[@CR10], [@CR226]\], but lower or absent in children \[[@CR16]--[@CR18], [@CR222], [@CR227], [@CR230]\]. Higher case fatality rates of 14.3% \[[@CR29]\] and 10% \[[@CR28]\] have likely been influenced by small sample sizes as the case fatality rate was only 2.85% in the only cohort with more than ten patients \[[@CR26]\]. Case fatality rate was 10.4% within the pooled cases and thus higher than in the aforementioned studies. Similarly, the number of cases that required a skin graft was 51.6%, which largely exceeds the previously reported values of skin grafting \[[@CR17], [@CR230]\]. There has been considerable variation within the literature: From skin grafts being exceptional \[[@CR222]\] to institutions where skin grafting is the regular treatment modality for skin defects following necrotising fasciitis \[[@CR227]\]. Probably, necessity for skin grafts was determined by extent of debridement and may thus have influenced the number of skin grafts. Different thresholds for using skin grafts could also play a role. Besides the already mentioned recall bias, several other limitations need to be taken into account for data from case series and case reports. Usually, case reports and series have an exorbitantly high success rate. Either due to preferential reporting of successful results \[[@CR231]\] or an over-representation of specialised centres \[[@CR232]\], whereas terrible results are scarce and those in between almost non-existent. The extent of this bias is however unclear as an assessment of case series included in Health Technology Assessments of the National Institute of Clinical Excellence of the United Kingdom found no differences in reported outcomes compared to randomised controlled clinical trials on the same subject \[[@CR233]\]. Nevertheless, the results from the pooled cases have to be interpreted cautiously and thus require validation by studies of higher quality. Despite the relevance of necrotising fasciitis and its potential grave consequences for the future life of children, these studies are missing. Likely due to the rarity of necrotising fasciitis for the individual institutions, which could be overcome by multiinstitutional collaboration. Conclusions {#Sec21} =========== A high index of suspicion is necessary to diagnose necrotising fasciitis. A combination of swelling, pain, erythema, and a systemic inflammatory response syndrome might be indicative of early stages of necrotising fasciitis. Incidence and case-fatality rates of necrotising fasciitis in childhood are much smaller than in adults. Nevertheless, necrotising fasciitis seems to carry a relevant risk of morbidity exemplified skin grafting in more than a half of the pooled cases. A systematic multiinstitutional research effort is necessary to gain meaningful results from future studies to further elucidate necrotising fasciitis in childhood. Additional files ================ {#Sec22} Additional file 1Preferred reporting items for systematic reviews and meta-analyses-protocol compliant systematic review protocol. Protocol for the systematic review. (PDF 259 kb) Additional file 2Data extraction sheet. Sheet used for data extraction and documentation. (PDF 8 kb) Additional file 3Dataset for the pooled cases. Complete database of all cases extracted from the literature and their coding for the respective items. (XLSX 91 kb) We thank Dr. Karsten Gjessing Jensen for providing us with a translated version of his manuscript written in Danish. We acknowledge the capability of the German interlibrary loan service without whose support the retrieval of a dozen non-English reports would have been impossible. We also thank the corresponding authors who provided us with reprints of their articles. Moreover, we are indebted to our patient S. whose gruesome course \[[@CR221]\] initiated the present study. Funding {#d29e1878} ======= The systematic review was conducted without funding. Availability of data and materials {#d29e1883} ================================== The data used in the present study is appropriately cited. The information on the individual cases is available as Additional file [3](#MOESM3){ref-type="media"}. AS, AG, GBF, and CO conceptualised the systematic review and developed the protocol. AS and CO designed the search strategy, which was reviewed by AGr, AS, and CO performed the literature search. AS and CO independently extracted the data. GBF and KSH reviewed the protocol and settled disputes in the data extraction. AS and CO wrote the paper. AG, GBF, KSH, and AGr critically reviewed the manuscript. All authors approved the final version. CO is the guarantor of the work. Ethics approval and consent to participate ========================================== Not applicable. Consent for publication ======================= Not applicable. Competing interests =================== The authors declare that they have no competing interests. Publisher's Note ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
--- abstract: 'We study the propagation of an ultrarelativistic light quark jet inside a shock wave using the holographic principle. The maximum stopping distance and its dependency on the energy of the jet is obtained.' --- [hep-th/...]{}\ [**Jet quenching in shock waves**]{}\ Michael Spillane, Alexander Stoffers and Ismail Zahed\ \ Introduction ============ A shock wave can be interpreted as a dense, non-equilibrated medium and the collision of two shock waves has been used to model heavy ion collisions and to study the formation of a thermalized, strongly coupled medium, see for example [@Gubser:2008pc; @Lin:2009pn; @Kovchegov:2009du; @Chesler:2010bi]. To gain insight into the energy loss at the early stages of the collision, we use the holographic principle to study the propagation of an ultrarelativistic light quark jet in a shock wave. The propagation of probe quarks in a strongly coupled medium can be accessed by studying strings in a suitable AdS background and the energy loss of a heavy quark inside a shock wave is discussed in [@Horowitz:2009pw]. While the bulk metric describing the late time asymptotics of a relativistic, hydrodynamic medium is known [@Janik:2005zt], an analytic solution for the metric valid at times shortly after the collision of two shock waves is still missing; see however [@Grumiller:2008va]. A setup dual to an ultrarelativistic light quark jet moving though an equilibrated medium was proposed in [@Chesler:2008wd; @Chesler:2008uy]. In particular, the energy scaling of the maximum stopping distance was shown to be $\l(\Delta x (E)\r)_{max} \propto \frac{1}{T}\l(\frac{E}{T\sqrt{\lambda}}\r)^{1/3}$. We will follow the reasoning of this approach to evaluate the energy dependence of the maximum stopping distance for an ultrarelativistic light quark jet in a shock wave and neglect any gravitational back reaction [@Shuryak:2011ge]. For another approach to jet quenching in a holographic frame work, see [@Arnold:2010ir; @Arnold:2011qi]. In order to evaluate the maximum stopping distance for two light quark jets flying back to back, Chesler et. al. [@Chesler:2008wd; @Chesler:2008uy] consider an open string in an asymptotically $AdS_5$ background whose bulk is filled by a D7 flavor brane. An early approach to jet quenching by using light rays in bulk can be found in [@Sin:2004yx]; see also [@Gubser:2008as; @Hatta:2007cs; @Hatta:2008tx; @Stoffers:2011fx]. At late times after the initialization of the jet, the string can be approximated by a trailing null string. The trajectory of endpoints of the string is well approximated by a null geodesic and the jets are interpreted to diffuse into the medium once the string endpoints reach the horizon of the black hole. Jet quenching using light rays in bulk ====================================== Motivated by the observation, that the shape of a trailing and falling string can be captured by studying light rays propagating in bulk, [@Hatta:2007cs; @Hatta:2008tx; @Stoffers:2011fx], we consider the propagation of a nearly massless particle in bulk to get an estimate for the maximum stopping distance for a quark jet within a shock wave. We consider a particle following a null geodesic in the background dual to a shock wave solution. Since the metric in (\[metric\]) yields a conserved momentum and energy, we fix the resulting constants of motion $$\begin{aligned} \dot{x}=\frac{dx}{dt}=\frac{\Pi_x}{\Pi_t}f=v f \ \end{aligned}$$ to describe a quark at the boundary with velocity $v$. The null geodesic reads $$\begin{aligned} \dot{z}=\frac{dz}{dt} = \sqrt{f-\dot{x}^2} \ ,\end{aligned}$$ and for $\dot{z}$ to be real, the bulk coordinate is confined to $z^4<1/\mu$. The distance $\Delta x$ the quark travels is given by $$\begin{aligned} \Delta x = \int_0^{\mu^{-1/4}} dz \frac{\dot{x}}{\dot{z}} = \int_0^{\mu^{-1/4}} dz \frac{v \sqrt{f}}{\sqrt{1-v^2f}} = \int_0^{\mu^{-1/4}} dz \frac{v\sqrt{f}}{\sqrt{\frac{1}{\gamma^2}+v^2 \mu z^4}}\end{aligned}$$ For $v\simeq 1$ and finite $\frac{1}{\gamma}$, the energy dependence of the maximum penetration depth reads $$\begin{aligned} \label{penetrationdepth} \l(\Delta x\r)_{max} \approx \sqrt{\gamma} \mu^{-1/4} \approx \mu^{-1/4} \sqrt{E/M(\mu)} \ ,\end{aligned}$$ where $E=\gamma M(\mu)$ is the energy of an ultrarelativistic quark with an in-medium mass $M(\mu)$ zipping through a plasma. Following [@Horowitz:2009pw; @Albacete:2008ze] we can relate the coefficient $\mu$ to the typical particle momentum $\Lambda$ of the shock wave medium boosted along $x^3$ with Lorentz factor $\gamma_{\parallel}$ by $$\begin{aligned} \mu = \pi^2 \Lambda^4 \gamma_{\parallel}^2 \ .\end{aligned}$$ Since the maximum stopping distance (\[penetrationdepth\]) is governd by the UV behavior of the null geodesic and the geometries for a shock wave, (\[metric\]), and thermal AdS$_5$ coincide near the boundary, the energy dependence of the stopping distance in a shock wave and in thermal AdS are the same, compare [@Stoffers:2011fx]. Stopping distance for a ultrarelativistic light quark jet in a shock wave ========================================================================= The metric dual to a shock wave with energy momentum tensor $< T_{--}> = \frac{N_c^2}{\pi^2} \mu \theta (x^-)$ reads [@Horowitz:2009pw; @Janik:2005zt] $$\begin{aligned} \label{metric} ds^2=G_{MN}dx^M dx^N=\frac{R^2}{z^2} \l(-f(z) dt^2 + dx^2 + dz^2 \r) \ ,\end{aligned}$$ with the AdS radius $R$, $x_\perp(t,z)\equiv x(t,z)$, $f(z)=1-\mu \theta(x^-) z^4$ and $x^-=\frac{1}{\sqrt{2}} (t-x^3)$. Since we are interested in ultrarelativistic dynamics in the $x_\perp$-direction, the longitudinal components proportional to $x^3$ in (\[metric\]) are suppressed and $\theta (x^-)=1$. A light ray can escape from the region $z \le \mu^{-\frac{1}{4}}$ and the surface at $z=\mu^{-\frac{1}{4}}$ is not a true horizon [@Horowitz:2009pw]. Null geodesics in the ($t,z$)-plane follow $$\begin{aligned} \dot{x}_{geo}^2&\equiv & \l(\frac{dx}{dt}\r)_{geo}^2 = f^2\\ \label{nullgeodesicforz} \dot{z}_{geo}^2 &\equiv & \l(\frac{dz}{dt}\r)_{geo}^2 = f(1-f) \end{aligned}$$ and the trajectory in bulk is given by $$\begin{aligned} \label{nullgeodesic} x_{geo}'^2 \equiv \l(\frac{dx}{dz}\r)_{geo}^2 = \frac{f}{1-f} \ .\end{aligned}$$ The length of the path of the null geodesic in $x-$direction increases the closer the initial radial position is to the boundary; close to the boundary at some $z=z_*\simeq0$, (\[nullgeodesic\]) implies $$\begin{aligned} x(z_*)\simeq \frac{1}{ \sqrt{\mu} z_*} \ .\end{aligned}$$ As shown in [@Chesler:2008wd; @Chesler:2008uy], the string is at late times but long before the jet diffuses into the medium well approximated by a trailing null string solution with the endpoints following null geodesics. We adopt this assumption and approximate the string by $$\begin{aligned} \label{Ansatz} x(t,z)&=&x_0(t,z)+ \delta x(t,z) + \mathcal{O}\l( (\delta x)^2\r) \\ \mathcal{Z}(t) &=& \mathcal{Z}_0(t) + \delta \mathcal{Z}(t) + \mathcal{O}\l( (\delta \mathcal{Z})^2\r)\ ,\end{aligned}$$ with $x_0(t,z)$ a trailing null string solution and the trajectory of the endpoints, $\mathcal{Z}_0(t)$, following null geodesics as we will now show. In the static gauge the Nambu-Goto action in the background (\[metric\]) $$\begin{aligned} S = \frac{\sqrt{\lambda}}{2\pi R^2} \int dt \ dz \sqrt{-g} = \frac{\sqrt{\lambda}}{2\pi} \int dt \ dz \frac{1}{z^2} \sqrt{f+ f x'^2 - \dot{x}^2} \ ,\end{aligned}$$ with the t’Hooft coupling $\lambda$ results in the following solution for a string of the form $x_0(t,z)=vt + \xi(z)$ $$\begin{aligned} \label{eom} \xi'^2= \frac{f-v^2}{f} \frac{1}{\l(\frac{R^4}{z^4}\r) \frac{f}{c}-1} \ .\end{aligned}$$ The integration constant $c$ is inversly proportional to the on-shell action density $\sqrt{-g}$. The endpoint of the open string follows a curve $\mathcal{Z}_0(t)$ fixed by the boundary conditions $$\begin{aligned} G_{AB} \frac{d X^A}{dt}\frac{d X^B}{dt}=0 \\ G_{AB} \frac{d X^A}{dt}\frac{\partial X^B}{\partial z}=0 \ ,\end{aligned}$$ ($X^A=(t,x,z)$) which are equivalent to $$\begin{aligned} \label{boundarycondition1} \xi'^2 &=& \frac{v^2-f}{f} \\ \label{boundarycondition2} \dot{\mathcal{Z}}_0^2 &=& \frac{f(v^2-f)}{v^2} \ .\end{aligned}$$ To match the boundary condition (\[boundarycondition1\]) on to the string, (\[eom\]), $\frac{1}{c}=0$, which means the string is a null string with vanishing action density. In order for the string to trail behind the endpoint, the sign of the square root in (\[boundarycondition1\]) is chosen such that $\xi'=-\sqrt{\frac{v^2-f}{f}}$. For a light quark with $v\simeq 1$, the endpoint of the string, (\[boundarycondition2\]), is well approximated by a null geodesic, compare (\[nullgeodesicforz\]).\ The energy of the string at a time $t_*$ is given by [@Chesler:2008wd; @Chesler:2008uy] $$\begin{aligned} \label{energy1} E_*=\frac{\sqrt{\lambda}}{2 \pi R^2} \int_{z_*}^{\infty} dz \frac{G_{tB}}{\sqrt{-g}} \l( \l( \dot{X} \cdot X'\r) X'^{B}- \l(X' \cdot X'\r) \dot{X}^B \r) \ ,\end{aligned}$$ where we have assumed that the flavor brane fills the whole AdS space, effectively setting the rest mass of the light quark to zero. The maximum stopping distance is related to the UV behavior of the trailing string and the trajectory of the null geodesic. Thus, introducing a finite mass by extending the flavor brane from $z=0$ to some finite IR cutoff $z=z_m$ will not affect the maximum stopping distance. Since the energy of the null string $x_0(t,z)$ is not finite $(\sqrt{-g}=0)$, we need to evaluate the perturbation $\delta x$, (\[Ansatz\]), to obtain a finite energy configuration. The linearized equations of motion are $$\begin{aligned} \label{lineareom} \delta \ddot{x} + f \mu z^4 \delta x'' + 2\sqrt{f \mu} \ z^2 \delta \dot{x}' + \frac{4 \mu^{\frac{3}{2}}z^5}{\sqrt{f}} \delta \dot{x}+ 2\frac{z^3}{\mu} \delta x' =0 \ ,\end{aligned}$$ and the unique solution reads $$\begin{aligned} \label{deltax} \delta x(t,z) = \phi(\alpha(t,z)) - \l(\frac{\mu^{-\frac{1}{4}}}{z} + \mathcal{O}(z^3) \r) \psi(\alpha(t,z)) \ ,\end{aligned}$$ with $\alpha(t,z)=\int^z \frac{d \tilde{z}}{\tilde{z}^2 \sqrt{1-\mu \tilde{z}^4}}-t$ and arbitrary functions $\phi(\alpha)$, $\psi(\alpha)$. To first order in $\delta x$, the energy of one jet is given by $$\begin{aligned} \label{energy2} E_* = \frac{\sqrt{\lambda}}{2 \pi} \int_{z_*}^{\infty} dz \frac{f}{z^2} \frac{1}{\sqrt{2 \psi(\alpha(t_*,z))}} \ .\end{aligned}$$ In order to minimize the energy, $\psi$ has to be maximized. For high energetic jets with $z_*$ close to the boundary, $x$ scales as $x(z\simeq0) \propto z^3$, (\[boundarycondition1\]), and for $\delta x$ to be a small perturbation, the maximum scaling of $\psi$ is $\psi(z\simeq 0) = \mu z^4 \tilde{\psi}(z) + \mathcal{O}(z^5)$, compare (\[deltax\]), with $\tilde{\psi}$ finite at the boundary. Integrating the trajectory of the endpoints, (\[nullgeodesic\]), from $z_*$ up to the horizon, yields the maximum stopping distance to leading order in $\mu^{1/4}z_*$ $$\begin{aligned} \l(\Delta x\r)_{max}=\frac{1}{\sqrt{\mu}\ z_*} \ .\end{aligned}$$ Using (\[energy2\]) we can relate the position of the endpoint, $z_*$, at a given time $t_*$ to the energy of the jet and obtain $$\begin{aligned} \l(\Delta x (E_*)\r)_{max}&=&\frac{1}{\sqrt{\mu}} \l(\frac{2\pi \sqrt{\mu} E_*}{\sqrt{\lambda} \mathcal{J} }\r)^{\frac{1}{3}} \\ &=&\frac{1}{\gamma_{\parallel}^{\frac{2}{3}}}\l(\frac{2 E_*}{\sqrt{\lambda} \mathcal{J} \pi \Lambda^4}\r)^{\frac{1}{3}}\end{aligned}$$ with $\mathcal{J}= \int_1^{\infty} dw \frac{1}{\sqrt{2 \tilde{\psi}(w)}}$. The maximum stopping distance scales as $E_*^{1/3}$, which we recognize as the same dependency as for the thermalized, static medium, [@Chesler:2008uy]. The stopping distance is sensitive to the relative velocity of the shock wave in the lab frame. Conclusion ========== The energy scaling of the maximum stopping distance for an ultrarelativistic light quark jet in a boosted shock wave agrees with the result obtained in a static, thermalized medium. This is not a surprise: In order to obtain $\l(\Delta x (E_*)\r)_{max}$, we need 1) the trajectory of the null geodesic in the (x-z) plane close to the boundary and 2) the scaling of the trailing string solution close to its endpoint. Both are dominated by the geometry of the space near the boundary: 1) The null geodesic only depends on the geometry of the space. 2) We can find the trailing string solution by looking at light rays in bulk [@Hatta:2008tx; @Stoffers:2011fx]. For an ultrarelativistic quark, the string endpoint is close to the boundary, $z_* \simeq 0$, and the maximum scaling of the string solution dictated by the geometry of the space near the boundary. Since the AdS-Schwarzschild metric describing a static, thermal medium, $ds^2=\frac{R^2}{z^2} [-(1-\frac{z^4}{z_H^4}) dt^2 + dx^2 + \frac{1}{(1-\frac{z^4}{z_H^4})}dz^2 ]$, has the same structure near $z=0$ as the shock wave metric, (\[metric\]), the energy dependence of the stopping distance agrees in both backgrounds. [99]{} S. S. Gubser, S. S. Pufu, A. Yarom, Phys. Rev.  [**D78**]{}, 066014 (2008). \[arXiv:0805.1551 \[hep-th\]\]. S. Lin, E. Shuryak, Phys. Rev.  [**D79**]{}, 124015 (2009). \[arXiv:0902.1508 \[hep-th\]\]. Y. V. Kovchegov, S. Lin, JHEP [**1003**]{}, 057 (2010). \[arXiv:0911.4707 \[hep-th\]\]. P. M. Chesler, L. G. Yaffe, Phys. Rev. Lett.  [**106**]{}, 021601 (2011). \[arXiv:1011.3562 \[hep-th\]\]. W. A. Horowitz, Y. V. Kovchegov, Phys. Lett.  [**B680**]{}, 56-61 (2009). \[arXiv:0904.2536 \[hep-th\]\]. R. A. Janik and R. B. Peschanski, Phys. Rev.  D [**73**]{}, 045013 (2006) \[arXiv:hep-th/0512162\]. D. Grumiller, P. Romatschke, JHEP [**0808**]{}, 027 (2008). \[arXiv:0803.3226 \[hep-th\]\]. P. M. Chesler, K. Jensen and A. Karch, Phys. Rev.  D [**79**]{}, 025021 (2009) \[arXiv:0804.3110 \[hep-th\]\]. P. M. Chesler, K. Jensen, A. Karch and L. G. Yaffe, Phys. Rev.  D [**79**]{}, 125015 (2009) \[arXiv:0810.1985 \[hep-th\]\]. E. Shuryak, H. -U. Yee, I. Zahed, \[arXiv:1110.0825 \[hep-th\]\]. P. Arnold, D. Vaman, JHEP [**1010**]{}, 099 (2010). \[arXiv:1008.4023 \[hep-th\]\]. P. Arnold, D. Vaman, JHEP [**1104**]{}, 027 (2011). \[arXiv:1101.2689 \[hep-th\]\]. S. J. Sin and I. Zahed, Phys. Lett.  B [**608**]{}, 265 (2005) \[arXiv:hep-th/0407215\]. S. S. Gubser, D. R. Gulotta, S. S. Pufu and F. D. Rocha, JHEP [**0810**]{}, 052 (2008) \[arXiv:0803.1470 \[hep-th\]\]. Y. Hatta, E. Iancu, A. H. Mueller, JHEP [**0801**]{}, 063 (2008). \[arXiv:0710.5297 \[hep-th\]\]. Y. Hatta, E. Iancu and A. H. Mueller, JHEP [**0805**]{}, 037 (2008) \[arXiv:0803.2481 \[hep-th\]\]. A. Stoffers and I. Zahed, arXiv:1110.2943 \[hep-th\]. J. L. Albacete, Y. V. Kovchegov, A. Taliotis, JHEP [**0807**]{}, 074 (2008). \[arXiv:0806.1484 \[hep-th\]\].
Jarrod Gilchrist Jarrod Gilchrist (born 13 June 1990) is a water polo player of Australia. He was part of the Australian team at the 2015 World Aquatics Championships, as well as being part of the team which went to the 2016 Olympics in Rio de Janeiro. See also Australia at the 2015 World Aquatics Championships References Category:Australian male water polo players Category:Living people Category:Place of birth missing (living people) Category:1990 births Category:Water polo players at the 2016 Summer Olympics Category:Olympic water polo players of Australia
fashion, art; androgyny, minimalism Menu Androgynous Guide/ Beginner’s Guide To Ethical Fashion The movement and demand for more ethical fashion is slow but necessary. But with accident after accident across thousands of factories in Asia, the fashion industry can’t continue being ignorant of vulnerable workers and the dire state of the world’s affairs. Most notably was the tragedy of Rana Plaza. On April 2013, one of the worst garment factory disasters in history shook the lives of thousands of Bangladeshi workers, their families and the fashion industry. Rana plaza, an eight-story garment factory, collapsed into the ground, claiming the lives of 1200+ workers and injuring 2500+ more. Knowledge really is power, so here’s a beginner’s guide to ethical fashion. It isn’t as pricey, bland or as hard as you may think. It essentially means that in the process of manufacturing, workers and their community benefit positively from the employment while ensuring the environment affects are minimal. But different companies have varied definitions depending on what their priorities are. Reliable ethical companies will be straight forward with what their values are. The way an ethical brand can operate can take on different combination of benefits: ensuring workers are fairly compensated defend wage/safety rights of workers using ecofriendly, sustainable fabrics avoid use of harmful chemicals in farming fibres using vegan materials that don’t involve the use of animal/animal byproducts minimizing carbon foot print many more factors! What can you do to help? 1. Buy Less The demand for cheaper and cheaper clothing desensitizes customers to believe we need more. You’re chained to the mentality of “But this shirt is only $5, how can I go wrong?!” The customer mindset is to clean your closet, give it to a charity organization and then you have more room in your closet. But only 15-20% of clothing donated to a charity organization are really being used second-hand, the rest are sold to create rags or end up in a landfill. Note: The opposite isn’t necessarily true. Buying an expensive garment does not guarantee the safety factors surrounding its make. However, investing in quality over low price, can increase the longevity for a garment to stay in your closet vs rotting in a landfill. 2. Thrift/Vintage Shopping The beauty of thrifting or vintage shopping – You can treasure hunt for unique and special pre-loved clothing and keep these perfectly wearable gems out of the landfills. 3. Make Your Own Clothing It’s very rewarding putting time and effort into creating a garment and then having the satisfaction of wearing it! I know not everyone has ample time to learn all the technical aspects of pattern drafting and construction but you can start small and learn along the way. There’s plenty of DIY resources from creative bloggers: When you buy from your local shops,Etsy stores and indie shops, you support your local economy as well as preserving crafts/artisanal practices local to cultural regions. 5. Invest In Ethical Brands Ethical fashion isn’t all scratchy hemp shirts and yoga leggings. There are some really stylish brands that are minimalist/androgynous as they are socially and environmentally conscious. Here are a few of my favorites (I will be writing detailed reviews soon): Everlane – If you want the timeless GQ look, Everlane is your next best friend. This New York/San Francisco based “radically transparent” online clothing store is incredibly cognizant and transparent about all their practices. Whenever you click on a garment, it shows you a nifty chart with a lot of info: from how much their fabrics cost, the conditions of their factories and to everything else you could really wonder about your clothes’ background. Their refreshing honesty isn’t a gimmick, they really do put a lot of effort into making you look good and feel good too! Peau de Loup – PDL is 3 folds of amazing. They’re designed and produced in Canada, they specialize in menswear shirts FOR women’s bodies and YOU the customer, is a hand in helping them design their next product! They are incredibly thoughtful with their production process (They use fabric scraps during manufacturing; that’s less textiles in the landfills!) and even give back to the community. When you invest in well made clothes, they last longer (That’s more time to love your clothes!) Being “ethical” isn’t an all or nothing goal. Start small, be conscious of your spending habits, ask important questions about where your clothing is from, who is making them and how is this one garment impacting the world around you. This review is not in any way sponsored or affiliated with the brands mentioned. If I am affiliated with the brands in the future, it would be clearly stated on my blog for your discretion.
Introduction ============ In adults, malignant fibrous histiocytoma (MFH) is a soft tissue sarcoma, occurring most commonly on the lower extremities and in the abdominal cavity or retroperitoneum ([@B1]). MFH in the viscera, particularly with gastrointestinal involvement, is rare ([@B2]-[@B22]). In 2002, MFH was re-classified as undifferentiated pleomorphic sarcoma (UPS) by the World Health Organization ([@B23]). It is classified into three types: UPS, UPS with giant cells, and UPS with prominent inflammation. Among these types, inflammatory UPS occurring in the gastrointestinal tract is extremely rare ([@B2],[@B8],[@B12],[@B17],[@B19],[@B24]). Inflammatory UPS has been reported to be correlated with the production of granulocyte colony-stimulating factor (G-CSF) by tumor cells ([@B12],[@B25]). We herein report a rare case of G-CSF-producing UPS adjacent to the ascending colon and in the right iliopsoas muscle. Although this inflammatory reaction caused by G-CSF was noted preoperatively, it disappeared immediately after complete surgical resection of the tumors. Case Report =========== A 50-year-old man was admitted to a local hospital because of abdominal pain and numbness in the right lower limb accompanied by a slight fever. Computed tomography (CT) of the abdomen revealed large well-defined enhanced heterogeneous masses: a 7.2×6.0-cm mass on the right side of the abdomen ([Fig. 1A](#g001){ref-type="fig"}), which was adjacent to the ascending colon, and a 3.7×3.6-cm mass in the right iliopsoas muscle ([Fig. 1B](#g001){ref-type="fig"}). ![Computed tomography (CT) of the abdomen. A: A 7.2×6.0-cm mass on the right side of the abdomen (white arrows). B: A 3.7×3.6-cm mass in the right iliopsoas muscle (white arrows).](1349-7235-58-2783-g001){#g001} The patient was referred to our hospital with a 15-kg loss of weight in a month. On a physical examination, his body temperature was 37.4℃, and a large palpable mass was detected in the right lower abdomen. The hematological examination showed a hemoglobin level of 12.3 g/dL (normal range: 14.1-17.2 g/dL), white blood cell count of 21,440/mm^3^, and severe elevated serum C-reactive protein (CRP) level of 14.8 mg/dL. The levels of tumor markers, including CEA and CA19-9, were within the normal limits. While a CT-guided biopsy of the masses on the right side of the abdomen and right iliopsoas muscle was performed, the specimens revealed inflammatory changes, mainly composed of neutrophils, so the biopsy was not useful for the diagnosis. The patient complained of a continuous high fever and was hospitalized for both a further examination and treatment. During hospitalization, his maximum temperature was 40.0℃ despite antipyretic medication, with a maximum leukocyte count of 40,100/mm^3^ (84.1% neutrophils, 1.2% eosinophils, 0.1% basophils, 6% monocytes, and 8.6% lymphocytes) and serum CRP level of 21.3 mg/dL. The serum cytokine values were assessed by an enzyme immunoassay, and elevated G-CSF levels of 339 pg/mL (normal range: 10.5-57.5 pg/mL) and elevated interleukin-6 (IL-6) levels of 110 pg/mL (normal range: 0-2.41 pg/mL) were noted. Magnetic resonance imaging (MRI) of the abdomen revealed a 12.9×6.8-cm mass on the right side of the abdomen, which showed marked enlargement in 1 month with a relatively homogenous intensity on T2-weighted imaging and high intensity in the early phase on enhanced images accompanied by bleeding caused by the CT-guided biopsy ([Fig. 2A](#g002){ref-type="fig"}). The size of the mass in the right iliopsoas muscle was unchanged, showing the same intensity as that on the right side of the abdomen ([Fig. 2B](#g002){ref-type="fig"}). Colonoscopy revealed only extramural compression in the ascending colon ([Fig. 3](#g003){ref-type="fig"}). ^18^F-fluorodeoxyglucose-positron emission tomography (FDG-PET)/CT showed the elevated uptake of FDG in the right abdominal tumor \[maximum standardized uptake value (SUVmax) 25.12\] ([Fig. 4A](#g004){ref-type="fig"}) and tumor in the right iliopsoas muscle (SUVmax 17.84) ([Fig. 4B](#g004){ref-type="fig"}). In addition, an increased FDG uptake in the systemic bone marrow, which indicated elevated bone marrow activity, was noted ([Fig. 2B](#g002){ref-type="fig"}). Although no obstruction of the large intestine was detected, tumor resection was nevertheless scheduled due to the fact that the patient\'s high fever persisted. ![Magnetic resonance imaging (MRI) of the abdomen. A: A 12.9×6.8-cm mass on the right side of the abdomen (white arrows) with a high intensity in the early phase, as observed in enhanced images. B: A 3.7×3.6-cm mass in the right iliopsoas muscle (white arrows).](1349-7235-58-2783-g002){#g002} ![Colonoscopy findings. Extramural compression was revealed in the ascending colon (white arrows).](1349-7235-58-2783-g003){#g003} ![FDG-PET findings before the operation. A: A high uptake of FDG by the tumor in the ascending colon (white arrows). B: A high uptake of FDG by the tumor in the right iliopsoas muscle (white arrow) and a diffuse, low uptake of FDG in the bone marrow.](1349-7235-58-2783-g004){#g004} At the operation, two masses were detected adjacent to the ascending colon invading the right transverse abdominal muscle and right iliopsoas muscle. Right hemi-colectomy with regional lymph node dissection, composite resection of the right transverse abdominal muscle, and resection of the right iliopsoas muscle were performed. No evidence of liver or peritoneal metastases was found. The high fever and leukocytosis immediately disappeared after resection of the tumors. Serum G-CSF was undetectable after the operation. The postoperative course was uneventful, and the patient was discharged 10 days after the operation. FDG-PET revealed that the elevated FDG uptake in both tumors and the systemic bone marrow had disappeared 1.5 months after the operation. Grossly, the resected specimen of the ascending colon was a whitish circumscribed tumor, measuring 19×14×10 cm in size, that protruded extramurally from the colonic wall. The tumor in the right iliopsoas muscle was a whitish tumor, measuring 6.5×5.0×3.0 cm in size. Lymph node metastasis was not detected. A microscopic examination revealed that the tumor in the ascending colon consisted of many neutrophils and fibroblast-like spindle cells with atypical mitosis and widespread necrosis ([Fig. 5A](#g005){ref-type="fig"}), and the tumor in the right iliopsoas muscle consisted of fibroblast-like spindle cells, giant cells, and cells undergoing osteogenesis. Immunohistochemical staining was positive for vimentin in both tumors and for SMA, desmin, and EMA (focally) in the right iliopsoas muscle tumor. S100, CD34, and AE1/AE3 were not expressed. On an immunohistochemical examination based on cytokine expression, both tumors were focally positive for G-CSF ([Fig. 5B](#g005){ref-type="fig"}). Therefore, the pathological diagnosis was inflammatory UPS originating from the ascending colon and giant cell-type UPS originating in the right iliopsoas muscle, with G-CSF-producing tumors. Following surgical treatment, the patient received 3 courses of adjuvant chemotherapy with doxorubicin (60 mg/m^2^) and was doing well 1 year after the operation without evidence of recurrence. ![Histopathological findings of the resected specimen. A: Fibroblast-like spindle cells with many neutrophils (Hematoxylin and Eosin staining, ×200). B: Tumor cells showing positivity for granulocyte colony-stimulating factor (×200).](1349-7235-58-2783-g005){#g005} Discussion ========== We encountered a case of G-CSF-producing UPS adjacent to the ascending colon and in the right iliopsoas muscle. The patient presented with a high-grade fever, and laboratory tests showed marked leukocytosis and severely elevated serum CRP levels. FDG-PET revealed the localized FDG uptake in both tumors and diffuse uptake in the systemic bone marrow. These inflammatory reactions were considered to have been caused by cytokines, such as serum G-CSF and IL-6 secreted by tumor cells, and they disappeared immediately after surgical resection. MFH was first described by O\'Brien and Stout in 1964 and it was the most common soft tissue sarcoma found in adults at that time ([@B26]). It consists of fibroblastic spindle cells, histiocytic round and polygonal cells, and unusual giant cells. Weiss et al. reported that this tumor most commonly occurred on an extremity (lower 49%, upper 19%) and in the abdominal cavity or retroperitoneum (16%) but rarely in the digestive tract ([@B1]). Recently, the classification of soft tissue sarcoma according to the line of differentiation rather than histogenesis has been considered. Therefore, MFH was re-classified as UPS by the World Health Organization in 2002 ([@B23]). This tumor did not have any of the typical diagnostic characteristics which could help in performing histological specific differentiation, and therefore an exclusion diagnosis was made by performing an immunohistochemical analysis. UPS is classified as UPS, UPS with giant cells, and UPS with prominent inflammation. Primary MFH/UPS of the large bowel is exceedingly rare. We reviewed a total of 23 reported cases of primary colorectal MFH/UPS, including our own case, published in the English literature and summarized the findings in the [Table](#t001){ref-type="table"} ([@B2]-[@B22]). The ratio of male to female patients was 19:4, with a median age of 62 years (range 12-80 years). The tumor originated from the cecum in three, ascending colon in seven, transverse colon in four, descending colon in one, sigmoid colon in three, rectum in four, and anal canal in three, including two cases with multicentric tumors. Most of the tumors were large, ranging from 2 to 19 cm in diameter; their early detection was difficult. All of the patients, excluding one autopsy case, received surgical resection, four of whom received adjuvant chemotherapy, two radiotherapy, and one chemoradiotherapy. Synchronous metastasis was detected in the regional lymph nodes in three patients, the peritoneum in two, and the liver, lymph nodes, and peritoneum in one. Local recurrence was detected in three patients (local alone in one, local and lung in one, and local and liver in one) and lung and liver metastasis in one patient each. Local recurrence was most common in MFH/UPS of the large intestine; the tumors spread radially through the muscle, involving the surrounding structures. Seven cases were considered to be inflammatory MFH/UPS ([@B2],[@B8],[@B12],[@B17],[@B19],[@B24]). ###### Reported Cases with Primary Malignant Fibrous Histiocytoma/Undifferentiated Pleomorphic Sarcoma of the Large Intestine. ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Reference Age Sex Site Size (cm) Sympton Inflammation Cytokine Therapy Metastasis Adjuvant therapy Recurrence Prognosis ------------------- ----- -------- -------------------------- ----------------- -------------------------------------- ----------------------- ----------- ----------- ------------------------------- ------------------- ----------------- ------------- 2 38 Male Rectum 12 loose bowel movement, abdominal pain WBC 11,300, ESR 40 Operation Lymph node \- \- 2M Alive 3 74 Male Transverse 8.5×5×5 anorexia, diarrhea \- Operation \- \- \- 1Y Alive 4 17 Male Transverse/ Rectosigmoid 10, 8, 3×2 abdominal pain, fever \- Operation NS \- NS NS 5 68 Male Sigmoid 7.5×6 abdominal pain, fever \- Operation \- \- Local 9M Dead 6 60 Male Sigmoid 7 blood in stool \- Operation Lymph node Chemotherapy Liver 2Y4M Alive 7 52 Female Anorectal 2×1.6×1 blood in stool \- Operation \- \- Local, Lung 2Y Daed 8 73 Male Ascending 15×7×4, 8×4×1 anemia, anorexia WBC 10,800 Operation \- \- \- 6M Alive 9 62 Male Ascending/ Transverse 17×10×8, 19×7×7 palpable mass \- \- Peritoneum \- \- NS 10 41 Male Anal canal NS palpable mass \- Operation \- Radiation \- 1Y4M Alive 11 62 Female Cecum 2×1.8×1.1 rectal bleeding \- Operation \- \- \- 3M Alive 12 50 Male Ascending 9.5×6×5 abdominal fullness, anorexia WBC 12,700, ESR 151,\ G-CSF 78 Operation \- Chemotherapy \- 10M Alive CRP 32.7 13 12 Male Ascending 3.5 abdominal pain \- Operation \- \- \- 1Y4M Alive 14 72 Male Transverse 5×7 periumbilical pain \- Operation \- \- Local, Perineal 4M Dead 15 50 Female Descending 4.0×3.2 abdominal pain, diarrhea \- Operation \- Chemotherapy \- 7Y Alive 16 64 Male Cecum 4×5×3 slightly tenderness \- Operation Peritoneum \- \- 9M Dead 17 47 Male Ascending 7×5×4 abdominal pain WBC 10,400, CRP 2.21 Operation \- \- \- 1Y1M Alive 18 55 Male Rectum 4×2.5 tennismus, perineal pain \- Operation \- Chemoradiotherapy \- 3Y10M Alive 19 66 Male Ascending 14.5×8×4.5 epigastralgia WBC 10,900, CRP 7.74 Operation \- \- \- 2Y9M Alive 20 73 Male Sigmoid 3.2 anemia \- Operation \- \- \- 1Y10M Alive 21 70 Male Cecum 12×10 abdominal pain \- Operation Lymph node, Liver, Peritoneum \- Lung 1M Dead 22 63 Female Anal canal 1.7×1.3×0.3 blood stool, anal mass \- Operation \- Radiation \- 1Y3M Alive 24 80 Male Rectum 5×4×2.5 rectal bleeding, fecal incontinency ESR 45 Operation \- \- \- NS Present case 2018 50 Male Ascending 19×14×10 abdominal pain, numbness WBC 40,100, CRP 21.3 G-CSF 339 Operation \- Chemotherapy \- 6M Alive ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- NS: not stated, ESR: erythrocyte sedimentation rate, CRP: C-reactive protein level Recently, inflammatory UPS has been reported to be correlated with the production of G-CSF by tumor cells ([@B12]). Furthermore, several studies have reported that G-CSF and IL-6 are produced by lung carcinoma ([@B27]). To our knowledge, this is the first study to report that G-CSF and IL-6 are produced by inflammatory UPS. IL-6 is known to play a role in stimulating the production of G-CSF ([@B28]). The elevated IL-6 level in previous reports might have contributed to the high-grade fever and elevated serum CRP level ([@B29]), and the elevated serum G-CSF level might have contributed to leukocytosis and hematopoietic activation ([@B30]). G-CSF-producing tumors are characterized by 1) an increased WBC count, predominantly neutrophils, in the absence of infectious and hematologic diseases; 2) an increased serum G-CSF level; 3) normalization of the WBC count and serum G-CSF level after removal of the tumor; and 4) the presence of G-CSF in the tumor tissue ([@B31]). In the present case, all of these criteria were fulfilled. FDG-PET imaging of patients with G-CSF-producing tumors has shown not only the elevated uptake of FDG by the primary tumors but also its diffuse uptake throughout the bone marrow. This FDG finding of bone marrow was thought to indicate that G-CSF-producing tumors enhanced bone marrow metabolism, potentially being useful for the diagnosis of G-CSF-producing tumors ([@B32]). In our case, the uptake of FDG was noted in both tumors and the systemic bone marrow, and this signal disappeared after resection of the tumors. The strategy for treating MFH/UPS is early and complete excision with en-bloc regional lymph node dissection. It has been reported that this tumor in the extremities and limb girdles is not radiosensitive, but radiation therapy plays an important role in achieving local control, particularly in high-grade lesions or in cases with positive surgical margins ([@B33]). In the present case, radiation therapy was not performed because the resected margin was negative. Although the role of adjuvant chemotherapy in colorectal MFH/UPS is controversial, 3 patients treated by adjuvant chemotherapy survived for \>10 months of follow-up ([@B6],[@B12],[@B15]). Inflammatory MFH/UPS has been reported to be aggressive with an ultimately fatal course, but four cases with either inoperable or recurrent inflammatory MFH have proven responsive to chemotherapy ([@B34]). Therefore, we considered that the present patient should receive adjuvant chemotherapy despite no signs of recurrence for six months after the operation. In conclusion, although G-CSF-producing colorectal UPS is rare, the clinical condition of leukocytosis (especially of neutrophils), the elevated serum CRP level, and the uptake of FDG in the bone marrow may suggest this tumor type. Changes in these parameters may be useful as markers of tumor recurrence. **The authors state that they have no Conflict of Interest (COI).** [^1]: Correspondence to Dr. Shinsuke Kazama, <[email protected]>
function v = mtimes(varargin) % ensure that result is not S2Grid anymore v = vector3d(mtimes@vector3d(varargin{:}));
package srcobj import "io" // PrefixByte for prefix byte check code generation type PrefixByte struct { Var string Src Source Needle Source } // Dump ... func (p PrefixByte) Dump(w io.Writer) error { src := LineAssign{ Receiver: "ok", Expr: OperatorAnd( OperatorGT(Call{Name: "len", Params: []Source{p.Src}}, Raw("0")), OperatorEq(Index{Src: p.Src, Index: Raw("0")}, p.Needle), ), } return src.Dump(w) } func RightPkg(useString bool) string { if useString { return "strings" } return "bytes" } func RightType(useString bool) string { if useString { return "string" } return "[]byte" } // prefixString for prefix string check code generation type prefixString struct { useString bool Src Source Needle Source } // PrefixString creates private prefixString for external consumption func PrefixString(useString bool, src, needle Source) prefixString { return prefixString{ useString: useString, Src: src, Needle: needle, } } // Dump ... func (p prefixString) Dump(w io.Writer) error { src := LineAssign{ Receiver: "ok", Expr: Call{Name: RightPkg(p.useString) + ".HasPrefix", Params: []Source{p.Src, p.Needle}}, } return src.Dump(w) } // prefixStringShort when it is known prefix is short type prefixStringShort struct { Src Source Needle Source } // Dump ... func (p prefixStringShort) Dump(w io.Writer) error { body := &Body{} body.Append(LineAssign{Receiver: "ok", Expr: Raw("true")}) body.Append(If{ Expr: OperatorGE(NewCall("len", p.Src), NewCall("len", p.Needle)), Then: For{ I: "i", Value: "char", Container: p.Needle, Body: If{ Expr: OperatorNEq(Raw("char"), Index{Src: p.Src, Index: Raw("i")}), Then: NewBody( LineAssign{Receiver: "ok", Expr: Raw("false")}, Break, ), }, }, Else: LineAssign{Receiver: "ok", Expr: Raw("false")}, }) return body.Dump(w) }
Q: React Component Names Like BEM I got some great react best practices are here. Grateful to AirBnB https://github.com/airbnb/javascript/tree/master/react So... Got this idea like BEM for classes, but use for component names and children. A bit tired of happening to search around components. Like so.. Component__childName__childName__childName.jsx I have this idea however and would like to know: Is this a bad practice? Are component names going to be come unwieldy? Sort of links the file names all together when its box in a box in a box in a box. Could get as short as say: Component__List.jsx Component__List__Item,jsx UpdAte question: Could a separate directory for each component be useful? I am seeing that as well indifferent projects. For example: |-Components |--ExampleComponent |---Component.jsx |---ComponentList.jsx |---ComponentItem.jsx |---ComponentItemDetail.jsx |---Component.scss |--AnotherOne |---AnotherOne.jsx And so on... A: I guess you are asking for a good naming practice and is it ok to name your components like Component_User.jsx, then if it has a header, Component_User_Header.jsx, then if the header has a label Component_User_Header_Label.jsx. If you are asking smtg else you can just ignore the rest :) I guess a better approach would be to put related components into a domain folder: such as under user directory index.jsx would be your main component and index.css would be your main css for that component. Then for each subcomponent you can create a similar named files as a sub-directory. user // main directory image //sub directory index.jsx //component file import index.css index.css //css for this component header index.jsx //component file import index.css index.css index.jsx //main component file import sub-directories index files to use those components index.css
/* * Copyright 2018 Confluent Inc. * * Licensed under the Confluent Community License (the "License"); you may not use * this file except in compliance with the License. You may obtain a copy of the * License at * * http://www.confluent.io/confluent-community-license * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OF ANY KIND, either express or implied. See the License for the * specific language governing permissions and limitations under the License. */ package io.confluent.connect.elasticsearch; import static org.mockito.Mockito.mock; import com.carrotsearch.randomizedtesting.annotations.ThreadLeakScope; import org.apache.kafka.common.TopicPartition; import org.apache.kafka.connect.data.Schema; import org.apache.kafka.connect.data.Struct; import org.apache.kafka.connect.sink.SinkRecord; import org.apache.kafka.connect.sink.SinkTaskContext; import org.elasticsearch.action.ActionFuture; import org.elasticsearch.action.ActionRequest; import org.elasticsearch.action.ActionRequestValidationException; import org.elasticsearch.action.admin.indices.exists.indices.IndicesExistsRequest; import org.elasticsearch.action.admin.indices.exists.indices.IndicesExistsResponse; import org.elasticsearch.action.index.IndexRequest; import org.elasticsearch.test.ESIntegTestCase; import org.elasticsearch.test.InternalTestCluster; import org.junit.Test; import java.util.Arrays; import java.util.HashMap; import java.util.HashSet; import java.util.Map; import java.util.Collection; import java.util.ArrayList; import java.util.Collections; @ThreadLeakScope(ThreadLeakScope.Scope.NONE) public class ElasticsearchSinkTaskTest extends ElasticsearchSinkTestBase { private static final String TOPIC_IN_CAPS = "AnotherTopicInCaps"; private static final int PARTITION_113 = 113; private static final TopicPartition TOPIC_IN_CAPS_PARTITION = new TopicPartition(TOPIC_IN_CAPS, PARTITION_113); private static final String UNSEEN_TOPIC = "UnseenTopic"; private static final int PARTITION_114 = 114; private static final TopicPartition UNSEEN_TOPIC_PARTITION = new TopicPartition(UNSEEN_TOPIC, PARTITION_114); private Map<String, String> createProps() { Map<String, String> props = new HashMap<>(); props.put(ElasticsearchSinkConnectorConfig.TYPE_NAME_CONFIG, TYPE); props.put(ElasticsearchSinkConnectorConfig.CONNECTION_URL_CONFIG, "localhost"); props.put(ElasticsearchSinkConnectorConfig.KEY_IGNORE_CONFIG, "true"); props.put(ElasticsearchSinkConnectorConfig.READ_TIMEOUT_MS_CONFIG, "3000"); return props; } @Test public void testPutAndFlush() throws Exception { InternalTestCluster cluster = ESIntegTestCase.internalCluster(); cluster.ensureAtLeastNumDataNodes(3); Map<String, String> props = createProps(); ElasticsearchSinkTask task = new ElasticsearchSinkTask(); task.initialize(mock(SinkTaskContext.class)); task.start(props, client); task.open(new HashSet<>(Arrays.asList(TOPIC_PARTITION, TOPIC_PARTITION2, TOPIC_PARTITION3))); String key = "key"; Schema schema = createSchema(); Struct record = createRecord(schema); Collection<SinkRecord> records = new ArrayList<>(); SinkRecord sinkRecord = new SinkRecord(TOPIC, PARTITION, Schema.STRING_SCHEMA, key, schema, record, 0); records.add(sinkRecord); sinkRecord = new SinkRecord(TOPIC, PARTITION, Schema.STRING_SCHEMA, key, schema, record, 1); records.add(sinkRecord); task.put(records); task.flush(null); refresh(); verifySearchResults(records, true, false); } @Test public void testCreateAndWriteToIndexForTopicWithUppercaseCharacters() { // We should as well test that writing a record with a previously un seen record will create // an index following the required elasticsearch requirements of lowercasing. InternalTestCluster cluster = ESIntegTestCase.internalCluster(); cluster.ensureAtLeastNumDataNodes(3); Map<String, String> props = createProps(); ElasticsearchSinkTask task = new ElasticsearchSinkTask(); task.initialize(mock(SinkTaskContext.class)); String key = "key"; Schema schema = createSchema(); Struct record = createRecord(schema); SinkRecord sinkRecord = new SinkRecord(TOPIC_IN_CAPS, PARTITION_113, Schema.STRING_SCHEMA, key, schema, record, 0 ); try { task.start(props, client); task.open(new HashSet<>(Collections.singletonList(TOPIC_IN_CAPS_PARTITION))); task.put(Collections.singleton(sinkRecord)); } catch (Exception ex) { fail("A topic name not in lowercase can not be used as index name in Elasticsearch"); } finally { task.stop(); } } @Test public void testCreateAndWriteToIndexNotCreatedAtStartTime() { InternalTestCluster cluster = ESIntegTestCase.internalCluster(); cluster.ensureAtLeastNumDataNodes(3); Map<String, String> props = createProps(); props.put(ElasticsearchSinkConnectorConfig.AUTO_CREATE_INDICES_AT_START_CONFIG, "false"); ElasticsearchSinkTask task = new ElasticsearchSinkTask(); task.initialize(mock(SinkTaskContext.class)); String key = "key"; Schema schema = createSchema(); Struct record = createRecord(schema); SinkRecord sinkRecord = new SinkRecord(UNSEEN_TOPIC, PARTITION_114, Schema.STRING_SCHEMA, key, schema, record, 0 ); task.start(props, client); task.open(new HashSet<>(Collections.singletonList(TOPIC_IN_CAPS_PARTITION))); task.put(Collections.singleton(sinkRecord)); task.stop(); assertTrue(UNSEEN_TOPIC + " index created without errors ", verifyIndexExist(cluster, UNSEEN_TOPIC.toLowerCase())); } private boolean verifyIndexExist(InternalTestCluster cluster, String ... indices) { ActionFuture<IndicesExistsResponse> action = cluster .client() .admin() .indices() .exists(new IndicesExistsRequest(indices)); return action.actionGet().isExists(); } }
Effect of aging on the buffering capacity of fast-twitch skeletal muscle. The effects of aging on the in situ buffering capacity of fast-twitch muscle fibers was examined in the tibialis anterior (TA) and extensor digitorum longus (EDL) muscles of specific pathogen free Fischer 344 rats. Muscles were electrically stimulated with trains of impulses lasting 100 ms at a frequency of 80 Hz. Trains were delivered at a rate of 1 Hz for 1 min with the hindlimb circulation occluded. Muscle hydrogen ion (H+) release during stimulation was estimated from the accumulation of metabolites. The free [H+] was measured using an homogenate technique. Muscle buffering capacity (Slykes) was estimated as delta mmol H+/l muscle water/delta pH unit. Muscle pH was unaffected by age both at rest and following stimulation in the TA and EDL. H+ release and buffering capacity were significantly reduced in aged TA muscle but unaffected by age in the EDL. Reduced buffering through metabolic processes accounted for only a small portion of the lower buffering capacity in aged TA. Most of the decrease in buffering capacity appeared to be due to reduced protein buffering. Therefore, aged TA muscle was less able to buffer a given H+ load when compared to adult controls. A more rapid accumulation of H+ during intense stimulation may lead to a earlier onset of fatigue in the aged muscle. It is not clear why the EDL buffering capacity was unaffected by age when the fiber mass profiles of the EDL and TA muscles appear similar (approximately 80% fast glycolytic fibers). It is possible that alterations in activity patterns with aging could have differential effects on the two muscles. Detailed activity pattern and fiber mass analyses are required in adult and aged EDL and TA muscles of Fischer 344 rats to answer this question.
using System; using System.Collections.Generic; using System.Linq; using System.Threading.Tasks; using GraphQL.Types; using Microsoft.EntityFrameworkCore; namespace GraphQL.EntityFramework { public class EfObjectGraphType<TDbContext, TSource> : ObjectGraphType<TSource> where TDbContext : DbContext { public IEfGraphQLService<TDbContext> GraphQlService { get; } public EfObjectGraphType(IEfGraphQLService<TDbContext> graphQlService) { Guard.AgainstNull(nameof(graphQlService), graphQlService); GraphQlService = graphQlService; } public void AutoMap(IReadOnlyList<string>? exclusions = null) { Mapper.AutoMap(this, GraphQlService, exclusions); } public void AddNavigationConnectionField<TReturn>( string name, Func<ResolveEfFieldContext<TDbContext, TSource>, IEnumerable<TReturn>>? resolve = null, Type? graphType = null, IEnumerable<QueryArgument>? arguments = null, IEnumerable<string>? includeNames = null, int pageSize = 10, string? description = null) where TReturn : class { GraphQlService.AddNavigationConnectionField(this, name, resolve, graphType, arguments, includeNames, pageSize, description); } public FieldType AddNavigationField<TReturn>( string name, Func<ResolveEfFieldContext<TDbContext, TSource>, TReturn?>? resolve = null, Type? graphType = null, IEnumerable<string>? includeNames = null, string? description = null) where TReturn : class { return GraphQlService.AddNavigationField(this, name, resolve, graphType, includeNames, description); } public FieldType AddNavigationListField<TReturn>( string name, Func<ResolveEfFieldContext<TDbContext, TSource>, IEnumerable<TReturn>>? resolve = null, Type? graphType = null, IEnumerable<QueryArgument>? arguments = null, IEnumerable<string>? includeNames = null, string? description = null) where TReturn : class { return GraphQlService.AddNavigationListField(this, name, resolve, graphType, arguments, includeNames, description); } public void AddQueryConnectionField<TReturn>( string name, Func<ResolveEfFieldContext<TDbContext, TSource>, IQueryable<TReturn>> resolve, Type? graphType = null, IEnumerable<QueryArgument>? arguments = null, int pageSize = 10, string? description = null) where TReturn : class { GraphQlService.AddQueryConnectionField(this, name, resolve, graphType, arguments, pageSize, description); } public FieldType AddQueryField<TReturn>( string name, Func<ResolveEfFieldContext<TDbContext, TSource>, IQueryable<TReturn>> resolve, Type? graphType = null, IEnumerable<QueryArgument>? arguments = null, string? description = null) where TReturn : class { return GraphQlService.AddQueryField(this, name, resolve, graphType, arguments, description); } public TDbContext ResolveDbContext(IResolveFieldContext<TSource> context) { Guard.AgainstNull(nameof(context), context); return GraphQlService.ResolveDbContext(context); } public TDbContext ResolveDbContext(IResolveFieldContext context) { Guard.AgainstNull(nameof(context), context); return GraphQlService.ResolveDbContext(context); } public FieldType AddSingleField<TReturn>( string name, Func<ResolveEfFieldContext<TDbContext, TSource>, IQueryable<TReturn>> resolve, Func<ResolveEfFieldContext<TDbContext, TSource>, TReturn, Task>? mutate = null, Type? graphType = null, IEnumerable<QueryArgument>? arguments = null, bool nullable = false, string? description = null) where TReturn : class { return GraphQlService.AddSingleField(this, name, resolve, mutate, graphType, arguments, nullable, description); } } }
module Facets SUPPORTED_CORE_OBJECTS = [:host, :hostgroup] module_function def registered_facets(facet_type = nil) facets = configuration.dup return facets unless facet_type facets.select { |_, facet| facet.has_configuration(facet_type) } end def find_facet_by_class(facet_class, facet_type = :host) hash = registered_facets(facet_type).select { |_, facet| facet.configuration_for(facet_type).model == facet_class } hash.first end # Registers a new facet. Specify a model class for facet's data. # You can optionally specify a name that will be used to create # the assotiation on the host object. # Use block to add more initialization code for the facet. # Example: # Facets.register(ExampleFacet, :example_facet_relation) do # extend_model ExampleHostExtensions # add_helper ExampleFacetHelper # add_tabs :example_tabs # api_view :list => 'api/v2/example_facets/base', :single => 'api/v2/example_facets/single_host_view' # template_compatibility_properties :environment_id, :example_proxy_id # end # For more detailed description of the registration methods, see <tt>Facets::Entry</tt> documentation. def register(facet_model = nil, facet_name = nil, &block) if facet_model.is_a?(Symbol) && facet_name.nil? facet_name = facet_model facet_model = nil end entry = Facets::Entry.new(facet_model, facet_name) entry.instance_eval(&block) if block_given? # create host configuration if no block was specified entry.configure_host unless block_given? configuration[entry.name] = entry publish_entry_created(entry) # TODO MERGE # Facets::ManagedHostExtensions.register_facet_relation(Host::Managed, entry) # Facets::BaseHostExtensions.register_facet_relation(Host::Base, entry) entry end # subscription method to know when a facet entry is created. # The callback will receive a single parameter - the entry that was created. def after_entry_created(&block) entry_created_callbacks << block end # declare private module methods. class << self private def configuration @configuration ||= Hash[entries_from_plugins.map { |entry| [entry.name, entry] }] end def entries_from_plugins Foreman::Plugin.all.map { |plugin| plugin.facets }.compact.flatten end def entry_created_callbacks @entry_created_callbacks ||= [] end def publish_entry_created(entry) entry_created_callbacks.each do |callback| callback.call(entry) end end end end
Determination of ametryn in sugarcane and ametryn-atrazine herbicide formulations using spectrophotometric method. A sensitive spectrophotometric method has been developed for determination of ametryn in agricultural samples. The proposed method was based on reaction with pyridine and further coupling with sulfanilic acid to form a colored product. The absorbance was measured at 400 nm with a molar absorptivity of 2.1 x 10(5) L mol(-1) cm(-1). The method shows a linear range from 0.2-20 μg mL(-1) with limit of detection and limit of quantification 0.16 and 0.54 μg mL(-1), respectively. The method has been successfully applied to the determination of ametryn in sugarcane juice and commercial formulations after separation of ametryn from triazine herbicides based on solvent extraction. Recovery values were found to be in the range of 96.0 ± 0.2% to 98.4 ± 0.1%.
PUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT KENISHA BRANTLEY; GREG BRANTLEY,  on behalf of themselves and all others similarly situated, Plaintiffs-Appellees, v.  No. 05-1047 REPUBLIC MORTGAGE INSURANCE COMPANY, Defendant-Appellant.  Appeal from the United States District Court for the District of South Carolina, at Charleston. Patrick Michael Duffy, District Judge. (CA-04-805-2-23) Argued: May 24, 2005 Decided: September 28, 2005 Before WIDENER and MOTZ, Circuit Judges, and Robert E. PAYNE, United States District Judge for the Eastern District of Virginia, sitting by designation. Affirmed by published opinion. Judge Widener wrote the opinion, in which Judge Motz and Judge Payne concurred. COUNSEL ARGUED: Benjamin Rush Smith, III, NELSON, MULLINS, RILEY & SCARBOROUGH, Columbia, South Carolina, for Appellant. 2 BRANTLEY v. REPUBLIC MORTGAGE INSURANCE Kathleen Clark Knight, JAMES, HOYER, NEWCOMER & SMIL- JANICH, P.A., Tampa, Florida, for Appellees. ON BRIEF: Thade- ous H. Westbrook, III, NELSON, MULLINS, RILEY & SCARBOROUGH, Columbia, South Carolina; William L. Kirkman, BOURLAND, KIRKMAN, SEIDLER, JAY & MICHEL, L.L.P., Fort Worth, Texas, for Appellant. Terry A. Smiljanich, JAMES, HOYER, NEWCOMER & SMILJANICH, P.A., Tampa, Florida; T. English McCutchen, William E. Hopkins, Jr., MCCUTCHEN, BLANTON, JOHNSON & BARNETTE, Columbia, South Carolina, for Appel- lees. OPINION WIDENER, Circuit Judge: This case arises from alleged violations by the defendant, Republic Mortgage Insurance Company, of the Fair Credit Reporting Act, 15 U.S.C. § 1681-1681t. Republic Mortgage filed a motion to compel arbitration and dismiss the action or, in the alternative, stay the action pending arbitration. The district court denied Republic’s motion, find- ing that Republic Mortgage, as a nonsignatory to the arbitration agreement, could not enforce the agreement to arbitrate against the plaintiffs, Kenisha and Greg Brantley. We affirm. I. In August 2003, the plaintiffs bought a home in Beaufort, SC. Because they financed the entire cost of the home, their mortgage lender, SouthStar Funding, L.L.C., required them to obtain private mortgage insurance. The plaintiffs obtained mortgage insurance from Republic Mortgage, and their mortgage insurance premium was set at $590.43 per month.1 The Brantleys contend that Republic Mortgage did not give them 1 Mortgage insurance obligates the insurer to underwrite the risk of default associated with the loan of the borrower, in this case the Brant- leys. There is no contention in the case that the loan is in default. BRANTLEY v. REPUBLIC MORTGAGE INSURANCE 3 the lowest premium available and that Republic Mortgage never informed them that their premium was increased based on informa- tion contained in their consumer credit reports. Further, the plaintiffs complain that Republic Mortgage never advised them of the con- sumer reporting agency from which it received the information, nor that they could obtain a copy of that report and dispute entries it con- tained under the Fair Credit Report Act (FCRA). The plaintiffs allege that when Republic Mortgage increased their insurance premium based on information in their credit report, it was required to provide them with an "adverse action notice" pursuant to the FCRA. 15 U.S.C. § 1681m. Finally, the plaintiffs allege that these actions consti- tuted either willful, or negligent, or both, violations of the FCRA. In connection with the mortgage loan transaction, the plaintiffs entered into a separate arbitration agreement with the mortgage lender, SouthStar, which provided Any claim, dispute, or controversy (whether in contract, tort, or otherwise) arising from or related to the loan evidenced by the Note shall be resolved, upon the election of either Borrower or Lender, by binding arbitration, and not by court action, except as provided under "Exclusions from Arbitra- tion" below. Such claims which shall be arbitrated include, but are not limited to, all: statutory and regulatory claims; any claim, dispute or controversy that may arise out of or is based on the relationships which result from the Borrower’s application to the broker or lender for the loan, the closing of the loan, or the servicing of the loan; or any dispute or controversy over the applicability or enforceability of this arbitration agreement or the entire agreement between Bor- rower and Broker or between Borrower and Lender (collec- tively "claim"). The agreement further provided that the agreement would apply "no matter by whom or against whom a claim is made." The Brantleys filed this suit on March 15, 2004.2 On September 22, 2 The plaintiffs styled this action as a class action. The district court, however, has not ruled on class certification and only considered the alle- gations specific to the Brantleys in its order. Our review does not decide anything with respect to the claimed class action. 4 BRANTLEY v. REPUBLIC MORTGAGE INSURANCE 2004, Republic Mortgage, which had not signed the arbitration agree- ment, moved to compel arbitration and to dismiss or stay the plain- tiff’s action. The district court, on December 1, 2004, denied Republic Mortgage’s motion to compel arbitration and dismiss or stay the action. This appeal by Republic Mortgage followed. II. Republic Mortgage claims that the district court erred in denying its motion to compel arbitration and dismiss or stay the action. Specif- ically, it contends that, despite being a nonsignatory to the arbitration agreement, its insurance contract is so intertwined with the mortgage and arbitration contracts between the plaintiffs and SouthStar that it should receive the benefit of the arbitration agreement. Alternately, Republic Mortgage argues that it is a third-party beneficiary of the arbitration contract, and is thus entitled to enforce arbitration on those grounds. The principal issue in this appeal is whether equitable estoppel allows Republic Mortgage to claim the benefit of the arbitration agreement between the plaintiffs and SouthStar. District court decisions determining the scope of arbitration agree- ments are generally reviewed de novo since a review of orders com- pelling or refusing to compel arbitration is a matter of contract interpretation. United States v. Bankers Ins. Co., 245 F.3d 315, 319 (4th Cir. 2001). However, in cases such as the present one, the arbitration order does not rest on a term of the contract, rather upon the application of equitable estoppel. See Int’l Paper Co. v. Schwabedissen Maschinen & Anlagen GMBH, 206 F.3d 411, 417-18 (4th Cir. 2000) (holding that a signatory to an arbitration agreement may be bound by a non- signatory through the doctrine of equitable estoppel). We review such equitable estoppel decisions for abuse of discretion. See Grigson v. Creative Artists Agency L.L.C., 210 F.3d 524, 528 (5th Cir. 2000). The district court determined that Republic Mortgage could only estop the plaintiffs from avoiding arbitration if the case met the inter- BRANTLEY v. REPUBLIC MORTGAGE INSURANCE 5 twined claims test. See Long v. Silver, 248 F.3d 309, 320-21 (4th Cir. 2001). The Eleventh Circuit has provided a clear statement of the intertwined claims test, which we apply here: Existing case law demonstrates that equitable estoppel allows a nonsignatory to compel arbitration in two different circumstances. First, equitable estoppel applies when the signatory to a written agreement containing an arbitration clause must "rely on the terms of the written agreement in asserting [its] claims" against the nonsignatory. When each of a signatory’s claims against a nonsignatory "makes refer- ence to" or "presumes the existence of" the written agree- ment, the signatory’s claims "arise[ ] out of and relate[ ] directly to the [written] agreement," and arbitration is appro- priate. Second, "application of equitable estoppel is war- ranted . . . when the signatory [to the contract containing the arbitration clause] raises allegations of . . . substantially interdependent and concerted misconduct by both the non- signatory and one or more of the signatories to the contract." Otherwise, "the arbitration proceedings [between the two signatories] would be rendered meaningless and the federal policy in favor of arbitration effectively thwarted. MS Dealer Serv. Corp. v. Franklin, 177 F.3d 942, 947 (11th Cir. 1999) (citations omitted). In the present case, as the district court correctly concluded, Republic Mortgage can satisfy neither of these requirements. The lawsuit in the current case deals with Republic Mortgage’s insurance premiums, and an allegation that these premiums were increased due to information contained in the plaintiffs’ credit histo- ries. This claim is a statutory remedy under the Fair Credit Reporting Act and is wholly separate from any action or remedy for breach of the underlying mortgage contract that is governed by the arbitration agreement. Although the mortgage insurance relates to the mortgage debt, the premiums of the mortgage insurance are separate and wholly independent from the mortgage agreement. The district court cor- rectly found that the mere existence of a loan transaction requiring plaintiffs to obtain mortgage insurance cannot be the basis for finding 6 BRANTLEY v. REPUBLIC MORTGAGE INSURANCE their federal statutory claims, which are wholly unrelated to the underlying mortgage agreement, to be intertwined with that contract. Likewise, the plaintiffs’ claim does not raise allegations of collu- sion or misconduct by SouthStar necessary to satisfy the second means of obtaining equitable estoppel. Instead, the plaintiffs’ claim is based entirely on actions taken by Republic Mortgage, a nonsignatory to the arbitration agreement. The plaintiffs’ claims against Republic Mortgage do not implicate SouthStar in any wrongdoing. Thus, the district court correctly concluded that the plaintiffs "never attempt[ed] to rely on the contract to establish their claims, nor [did] they allege concerted action between Republic and SouthStar." Because this conclusion is appropriately drawn from the facts pre- sented to the district court, we affirm the district court’s decision that the Brantleys are not equitably estopped from denying a contractual obligation to arbitrate with the non-party (Republic Mortgage) to the arbitration agreement. III. Republic Mortgage also argues that it is entitled to enforce the arbi- tration agreement as a third-party beneficiary of the arbitration con- tract. We reject this argument. As this court has held, "[i]n order to determine whether the parties intended [a nonsignatory] to be a third party beneficiary, we must look within ‘the four corners of the deed.’" R.J. Griffin & Co. v. Beach Club II Homeowners Ass’n, 384 F.3d 157, 164 (4th Cir. 2004) (citing Gardner v. Mozingo, 358 S.E.2d 390, 392 (S.C. 1987)). We do not differentiate between a deed and the underly- ing contract here. Examining this, the district court observed that "the underlying contract makes no reference to Republic, nor does it mention the mortgage insurance transaction . . . . Republic is not entitled to third- party beneficiary status because ‘the language of the [contract] does not clearly indicate that, at the time of contracting, the parties intended to provide [Republic] with a direct benefit.’" (quoting Grif- fin, 384 F.3d at 165). BRANTLEY v. REPUBLIC MORTGAGE INSURANCE 7 We are of opinion the district court correctly decided under Griffin that Republic was not entitled to arbitration as a third-party benefi- ciary. The judgment of the district court is accordingly AFFIRMED.
Tech with a social conscience: Why you should care President and vice-chancellor of Ontario Tech University in Oshawa, Ont. Want to be a tech entrepreneur? The sage wisdom is to start by solving a problem. That is what university students Hamayal Choudhry and Samin Khan did. Through their startup smartARM, they created a 3D-printed robotic prosthetic hand for amputees that costs less than $1,000. The smartARM team competed in and won the worldwide competition, Microsoft Imagine Cup, becoming the first team to bring the award to Canada. The bionic arm invention by smartARM is a great example of tech with a social conscience. Story continues below advertisement Traditionally, the primary goal of a business is to maximize wealth for shareholders. Those days are long gone. For a business to be sustainable, it has to retain its social licence and contribute positively to the community. As Salesforce CEO Marc Benioff said in a recent interview, tech companies need to shift from a money-centric world view to one that focuses on making a positive impact. As we prepare students for the 21st century, we have a responsibility as higher education institutions to develop leaders who are driven to better the community, both locally and globally. Here are some guiding tips. Equipping student entrepreneurs for the future Student entrepreneurs have the potential to be great change-makers. Provided with the opportunities, tools and mentorship, they are a force not to be underestimated. That is not to say that all will become serial entrepreneurs, but we need creative thinking in organizations in every sector of our economy. One great example is Ontario Tech University student Yasin Othman, who, while on a journey with friends in East Africa, realized the dire need for clean drinking water in the region. He used the trip to make a documentary film about this issue. With funding from Brilliant Catalyst, the university’s on-campus collaboration and idea collision space, and a crowdfunding campaign, Othman and his partners were able to establish their startup Rootworks. They are working to provide rural communities in Somalia and Ethiopia with access to clean drinking water by building sand dams. The really cool part is that they are doing so by applying their talents in filmmaking to crowdsource funding for an innovative take on a daunting social problem. In both Choudhry and Khan’s prosthetic arm and Othman’s film, these young minds used technology to address vexing social problems. Addressing tech’s ethical implications Today, we have a collective responsibility to explore and research the implications of tech, both positive and negative. That means asking the hard questions: What are the ethical implications of tech? How will it compromise our privacy? How do we address hate bias and extremism on the Web and in social media? What are the biases built into AI? Answers to these questions will be found when we give under-represented scholars in the “tech” world, such as philosophers, educators and humanities and social scientists of all stripes, licence to consider themselves key voices in the discourse. Fewer people are now fixated on when the next iPhone is coming out, but people do have grave concerns over whether AI will take their jobs, and whether their privacy is being breached just because they carry a smartphone. Influence industry to support tech with a conscience The allure of the gadget or gizmo is not going to fade away easily. There will be profits to be made from early adopters of new technology. Story continues below advertisement Story continues below advertisement But the tsunami of new tech is about how self-driving cars will keep our children and grandchildren safe. It is about how to ensure that the insatiable production and collection of data has safeguards and regulations. Smart tech is tech that improves the human condition. Collaborating with businesses on work-integrated-learning placements is a great opportunity for higher education institutions to influence businesses to have a positive impact. In particular, we send top-notch groups of students from interdisciplinary backgrounds (picture an engineer working with a political science major, a kinesiologist and a game developer) to approach problems in organizations in a manner where tech can be used for good. Our students are digital natives – they don’t need to be told of the downsides of tech, and by supporting our students, we are dispatching agents of innovation and social change into the workplace. In return, students gain valuable hands-on experience while realizing their voice matters. It’s a win-win for both. Building tech with a social conscience sometimes manifests itself through local outreach events, where students volunteer their time to teach kids how to code. Embedded in those coding lessons is “what are you trying to solve with the code in the first place?” Let’s stop talking about tech as though it’s always “progress.” Tech with a conscience requires a deliberate strategy and takes hard work. Stay ahead in your career. We have a weekly Careers newsletter to give you guidance and tips on career management, leadership, business education and more. Sign up today. Due to technical reasons, we have temporarily removed commenting from our articles. We hope to have this fixed soon. Thank you for your patience. If you are looking to give feedback on our new site, please send it along to [email protected]. If you want to write a letter to the editor, please forward to [email protected]. Welcome to The Globe and Mail’s comment community. This is a space where subscribers can engage with each other and Globe staff. Non-subscribers can read and sort comments but will not be able to engage with them in any way. Click here to subscribe. Welcome to The Globe and Mail’s comment community. This is a space where subscribers can engage with each other and Globe staff. Non-subscribers can read and sort comments but will not be able to engage with them in any way. Click here to subscribe.
Leopold Averbakh Leopold Leonidovich Averbakh (1903–1937) was the head of the Russian Association of Proletarian Writers (RAPP) in the 1920s, and the most prominent of a group of communist literary critics who argued that the Bolshevik revolution, carried out in 1917 in the name of Russia's industrial working class, should be followed by a cultural revolution in which 'bourgeois' literature workers' would be supplanted by literature written by and for the proletariat. Averbakh was a powerful figure in Russian cultural circles until Josif Stalin ordered RAPP to cease its activities, in 1932. Family and early career Leopold Averbakh was born to Jewish parents in 1903 in Saratov, though most of his family links were in Nizhny Novgorod. His father, Leonid, owned a small steamship on the Volga. Aged only 14 at the time of the Bolshevik revolution, he had exceptionally good family links with the new regime. His mother was the sister of Yakov Sverdlov and of Zinovy Sverdlov, who became the adopted son of Maxim Gorky. He was also related to Vladimir Bonch-Bruyevich. His sister, Ida, married Genrikh Yagoda, future head of the NKVD. He played a prominent role in the Bolshevik youth movement in his teens, and by the age of 19, he was editor of the literary journal Moldaya gvardiya ('Young Guard'), and a leading member of the All-Russian Association of Proletarian Writers (VAPP), the forerunner of RAPP. He was one of three representatives of VAPP who signed an agreement in 1923 with the poet Vladimir Mayakovsky promising that their respective organisations would co-operate to "steadfastly unmask bourgeois-gentry and pseudo-sympathetic literary groups" and to promote "class artistry". . One of the 'bourgeois' writers they targeted was Mikhail Bulgakov, whom Averbakh denounced in September 1924 as a writer "who doesn't pretend to disguise himself as a fellow traveller." Head of RAPP Late in 1925, the Soviet communist party's ruling triumvirate of Stalin, Grigory Zinoviev and Lev Kamenev split. Illarion Vardin, effective leader of VAPP, joined the Zinoviev faction. Averbakh and most of VAPP's younger members broke with him and founded RAPP, as a kind of literary wing of the Stalinist faction, though they never sought or received Stalin's formal endorsement. Averbakh was RAPP's unchallenged leader for the whole of its existence. He wrote extensively - "a prolific critic who hoped to apply Karl Marx’s understanding of historical materialism to literary production, Averbakh’s theoretical contribution to Soviet literary scholarship cannot be negated." Personality and Reputation Averbakh was the first from the generation who were too young to have taken part in revolutionary activity before 1917 to achieve prominence under communist rule. Some of his contemporaries, such as Mikhail Suslov, still held high office in the 1980s, whereas Averbakh's career peaked 50 years earlier. He was an effective organiser, but had a bad reputation. The French writer, Victor Serge, who knew Averbakh for many years, described him as "a young Soviet careerist possessed of an extraordinary talent for the bureaucratic callings. Less than thirty, he had the hairless head of a young senior official, the verbal fluency of a Congress demagogue, and the dominating, false-sincere eyes of a manipulator of meetings.". According to a fellow member of RAPP, Anna Karavayeva: "Someone once spoke of Leopold Averbakh as a harsh, yet knowledgeable, man. A publicist, an agitator, he wanted to organize everything according to a designated ‘proletarian base,’ as he explained. Correctly acknowledging that there was a class war in literature, Averbakh, in my opinion, presented it very narrowly, not wanting to comprehend the specifics." His Treatment of Eminent Writers Averbakh's influence reached its peak in 1929, when he orchestrated the public campaigns against the writers Yevgeny Zamyatin, who was driven into exile, and Boris Pilnyak, and the Old Bolshevik and critic, Aleksandr Voronsky, founder of the literary journal, Krasnaya nov. Reviewing a short story by Andrei Platonov in 1929, Averbakh warned: "There is ambiguity in it...our era does not tolerate any ambiguity." When Nadezhda Mandelstam challenged him to explain how he could denounce her husband's poetry without having read it, he replied "that there is no such thing as art or culture in the abstract, but only 'bourgeois art' and 'proletarian art'." By contrast, Averbakh went to pains to cultivate Russia's most famous living writer, Maxim Gorky, after being introduced to him by Yagoda. He spent the summer of 1931 as a house guest in Gorky's home in Sorrento, on a mission to persuade Gorky to return permanently to Russia. On his return, he reported to Yagoda that he was "proud and happy" to have succeeded. Dissolution of RAPP On 23 April 1932, Stalin ordered suddenly and unexpectedly RAPP, and all other literary clubs and movements to disband and merge into the newly formed Soviet Writers' Union. It was immediately understood that this move was intended to destroy Averbakh's power base. When Nadezha Mandlestam visited Herzen House, in Leningrad, the day after the announcement, she found two eminent writers, Nikolai Tikhonov and Pyotr Pavlenko drinking wine to celebrate Averbakh's downfall. When she protested: "I thought you were a friend of Averbakh" - Pavlenko replied: "The war in literature has entered a new phase." Averbakh's fall may have been Stalin's way of striking at his powerful brother-in-law, Yagoda, but also seems to have been brought about by his own over confidence and lack of deference. As early as 1929, Stalin complained in a letter to his deputy, Vyacheslav Molotov, about certain young communists, including Averbakh, who treated the party as a "discussion club" where they could "review policy" instead of awaiting instructions. Later career and arrest Most of Averbakh's former colleagues in RAPP, with the notable exception of the playwright Vladimir Kirshon, deserted him after this public humiliation, but he continued to enjoy the protection of Yagoda, and of Maxim Gorky. In 1935, Gorky, Averbakh and the NKVD officer Semyon Firin, the deputy head of Gulag, co-edited a book lauding the construction of the White Sea-Baltic Canal by convict labour. Gorky's death and Yagoda's downfall left him unprotected. He was arrested in April 1937, and shot on 14 August 1937, along with Kirshon, Firin and others. References Category:1903 births Category:1937 deaths Category:Russian literary critics Category:Great Purge victims from Russia Category:People from Saratov
Background ========== The genomes of all eukaryotes contain examples of transposable elements, sequences that generally appear to be genomic parasites although such sequences are occasionally co-opted for the host\'s benefit \[[@B1],[@B2]\]. These mobile elements fall into families that differ in basic structure and method of transposition \[[@B3],[@B4]\]. Non-long terminal repeat (non-LTR) retrotransposable elements comprise one of the two major families of mobile elements whose movement requires reverse transcriptase. Their mechanism of integration is different from retrotransposable elements with long terminal repeats in that they use the 3\' hydroxyl group at a DNA break to prime reverse transcription of their RNA transcripts; a process termed target primed reverse transcription (TPRT) \[[@B5]\]. Full-length non-LTR elements encode the critical enzymes necessary for generating additional copies in the genome and are, therefore, autonomous. A common occurrence with non-LTR elements is that their insertion machinery is hijacked. The elements that parasitize the retrotransposition machinery of autonomous LINEs (for 'Long INterspersed Elements') have been called SINEs (for 'Short INterspersed Elements'). They are represented by Alu elements in primates although dozens of SINE families have been found in other eukaryotic genomes \[[@B6]-[@B8]\]. Several SINEs were in part derived from 7SL RNA; however, with the additional exception of a SINE derived from 5 S ribosomal RNA in zebrafish \[[@B9]\], the majority of SINEs in eukaryotic genomes are derived from tRNA genes \[[@B6],[@B10]\]. While their structure is variable, the characteristic attribute of SINEs is that they are transcribed by RNA polymerase III. Recognition of the SINE transcripts by LINE proteins is necessary for their reverse transcription and insertion into a new site. This is accomplished either by sequence identity at the 3\' end between the LINE and its associated SINE (stringent elements) or a less strict recognition of a simple sequence, frequently a poly(A) tail, (relaxed elements) \[[@B11]-[@B14]\]. R2 and R1 are non-LTR retrotransposable elements that insert into specific sites in the 28S ribosomal RNA genes of most animal lineages (Figure [1](#F1){ref-type="fig"}A) \[[@B15]\]. The mechanism by which non-LTR elements retrotranspose has been best characterized for R2 using the protein encoded by the element in the silk moth, *Bombyx mori*. The R2 transcript has sequences in the 5\' untranslated region (UTR) and 3\' UTR, which are recognized by the R2 protein although only the sequences in the latter are necessary for insertion of a new copy (Figure [1](#F1){ref-type="fig"}A). The new copy of the R2 element is inserted into a ribosomal DNA (rDNA) unit via a symmetric series of cleavages of the two DNA strands and utilization of the free ends to prime synthesis \[[@B16]\]. A study of the variation at the junctions of R1 elements suggested that like R2 it is integrated in a series of cleavage and TPRT reactions \[[@B17]-[@B19]\]. Both R2 and R1 elements have been extensively studied in *Drosophila* and found to be maintained by vertical descent since the genus arose \[[@B20],[@B21]\]. Analysis of the sequenced genomes of 12 *Drosophila* species indicates that the high sequence identity found among R2 and R1 elements within a species is because all insertions are relatively new \[[@B22]\]. That is, the recombinational forces responsible for the concerted evolution of the rRNA genes rapidly eliminate element copies from the rDNA locus. ![**The rDNA locus and its R2 and R1 element insertions. (A)** The rDNA locus is composed of a tandem array of rDNA units with a subset of these units inserted by R2 (blue boxes) and/or R1 elements (orange boxes). The rRNA transcription unit with external transcribed spacer (ETS), 18S, 5.8S and 28S genes (gray boxes), transcribed spacers (white boxes), and R2 insertion is diagrammed. The single open reading frame (ORF) of R2 is delineated in light blue. R2 RNA sequences are processed from the cotranscript at the 5\' end by an R2 encoded self-cleaving ribozyme. After translation, identical subunits of the R2 protein (circles) bind sequences at either end of the R2 transcript, and the RNA/protein complex binds at the R2 target site in the 28S gene and proceeds with the insertion of a new R2 copy. **(B)** Diagram of a portion of the 28S gene with both R2 and R1 insertions. Arrows indicate location and direction of primers in the 28S gene and R2 element used to survey for unusual insertions near the R2 target site.](1759-8753-3-10-1){#F1} While there is no direct evidence, the presence of R1 lineages outside the 28S gene (for example, telomeres) suggests R1 encodes its own promoter \[[@B23],[@B24]\]. R2 elements, however, depend on an encoded self-cleaving ribozyme at their 5\' end to process the R2 transcript from a 28S cotranscript. The R2 ribozyme shows remarkable similarity to the structure of the hepatitis delta virus (HDV) ribozyme with many of the conserved nucleotides in *Drosophila* R2 ribozymes identical to residues in the catalytic region of the HDV ribozyme \[[@B25]\]. In our survey of the R2 ribozyme in different species of *Drosophila*, insertions bearing the R2 ribozyme were discovered that did not correspond to the R2 elements of that species. Here we report the discovery of non-autonomous elements with sequence identity to R2 elements as well as multiple examples of hybrid non-autonomous elements with sequence identity to both R2 and R1 elements. Because these elements are not transcribed by polymerase III and therefore not SINEs \[[@B6]-[@B8]\], they are referred to as SIDEs (for 'Short Internally Deleted Elements'). Based on the divergence of their sequence and their abundance, these SIDEs appear active and have persisted for millions of years. Finally, we report evidence for template jumps *in vivo* to small, stable RNAs in the cell, which in one case may have established a new R2 subfamily. Results ======= R2 SIDE ------- While analyzing R2 ribozyme sequences from *Drosophila willistoni*, a sequence located in the R2 insertion site was identified which showed only 64% sequence identity to the 5\' UTR of the R2 elements in this species \[[@B22]\]. PCR amplification using a degenerate primer to conserved sequences in the ribozyme paired with a reverse primer to 28S sequences 30 to 50 bp downstream of the R2 site (Figure [1](#F1){ref-type="fig"}B, primers 1 and 2) generated the expected 3.5 kb R2 element product as well as a much shorter product. Sequencing revealed the short insert had identity to both the 5\' and 3\' UTRs of the *D. willistoni* R2 and, like R2Dwi, ended in a poly(A) tail. We refer to this insert as a Short Internally Deleted Element, or a SIDE. This particular SIDE is R2Dwi_SIDE to indicate its presence in *D. willistoni* and it relationship to R2. A comparison of the structure of the 3.53 kb *D. willistoni* R2 element to that of the 529 bp R2 SIDE is presented in Figure [2](#F2){ref-type="fig"}A. Sequence identity at the 5\' and 3\' ends was 64% and 81% respectively. The central 197 bp of R2Dwi_SIDE showed no apparent identity to R2 or any other *D. willistoni* sequence. ![**R2 SIDE ('Short Internally Deleted Element') in*Drosophila willistoni.*(A)** The 3.53 kb R2 element in *D. willistoni*, R2Dwi, is diagrammed with the 5\' and 3\' UTRs (untranslated regions) shaded darker. The 529 bp element, R2Dwi_SIDE, has sequence identity at the 5\' and 3\' ends to the R2 element (percent identity shown); the 197 bp central region (white box) has no significant identity to the R2 element. **(B)** Sequence reads for full-length R2 and R2Dwi_SIDE elements obtained from the trace archive at NCBI \[[@B26]\]. The majority of 5\' junctions for both element types are precise (marked with asterisks). Typical variation at the 5\' junction for both elements is also presented. **(C)** Genomic DNA from *D. willistoni* was PCR amplified using a 28S primer (32 nucleotides upstream of the R2 site) and a ribozyme primer (conserved region 100 nucleotides into the elements) (arrows). PCR products after *Bam*HI digestion were separated on a native, 8% polyacrylamide gel. Lane M, DNA length markers with sizes indicated. The product at 200 bp was subsequently determined to correspond to an insertion in the R1 site, R2/R1Dwi_SIDE (bottom diagram). Element type and relative percentage in the genome are to the right of the gel.](1759-8753-3-10-2){#F2} *D. willistoni* was one of the species chosen for the 12 *Drosophila* genomes project \[[@B27]\], thus sequencing reads containing copies of the R2Dwi_SIDE could be obtained from the trace archive. Approximately 70 original reads corresponding to the R2 SIDE were analyzed and found to have minor 5\' junction variation and less than 3% nucleotide divergence. As previously documented for R2 element junctions in many *Drosophila* species, most full-length R2 elements in *D. willistoni* insert precisely into the 28S gene. This canonical 5\' junction sequence is indicated by an asterisk in the upper portion of Figure [2](#F2){ref-type="fig"}B. However, many *D. willistoni* R2 element 5\' junctions have deletions of the upstream 28S sequences and/or non-templated nucleotide additions. Typical examples of the range of variation are presented below the canonical junction. The full-length R2 SIDE insertions were also found to have a precise, canonical junction and the same range of sequence variation found for the R2 elements. This variation in the 5\' junctions as well as variation in the length of the poly (A) tail at the 3\' end (13 to 41 A's for R2; 14 to 38 A's for the SIDE) suggest that the R2 SIDE in *D. willistoni* is actively using the retrotransposition machinery provided by the autonomous R2 element. This model predicts that the 3\' end of the R2 SIDE transcript is recognized by the R2 protein for retrotransposition into a 28S gene (Figure [1](#F1){ref-type="fig"}A). The secondary structure formed by the 3\' UTR RNA of *Drosophila* R2 elements was previously predicted using sequences from ten species in the melanogaster and obscura groups \[[@B28]\]. In Figure [3](#F3){ref-type="fig"}, it is apparent that both the 3\' end of the R2 element and of the R2 SIDE from *D. willistoni* can be folded into this predicted secondary structure. Although these sequences are 20% divergent, nucleotide differences (circled) are largely relegated to the loops or exhibit compensatory changes in base-paired regions. Furthermore, over 90% of the invariant nucleotides found in the previous study are conserved in both element types in *D. willistoni* (boxed nucleotides). ![**Secondary structure conservation of R2 3\' ends. (A)** RNA sequence from the 3\' UTR of the R2 element from *Drosophila willistoni* folded into the secondary structure modeled for other *Drosophila* R2 \[[@B28]\]. Nucleotides identical to those found to be conserved in the previous report are boxed. **(B)** The 3\' end sequence from R2Dwi_SIDE folded into the same secondary structure. Nucleotide differences relative to R2Dwi are circled in blue. Boxed nucleotides are as in (A).](1759-8753-3-10-3){#F3} To determine the relative abundance of R2 and R2 SIDE, a PCR primer with sequence identity to both *D. willistoni* elements was used in conjunction with an upstream 28S primer. The R2 element and R2 SIDE products could be differentiated after PCR amplification because the R2 SIDE sequences contain a *Bam*HI restriction site. The PCR results are shown in Figure [2](#F2){ref-type="fig"}C. The similar intensities of the 130 bp R2 element product and the 97 bp R2 SIDE product after *Bam*HI digestion indicated that they are present in the *D. willistoni* rDNA loci in equal numbers. The unexpected 200 bp PCR product suggested an abundant third element type bearing the R2 ribozyme was also present in the 28S gene at or near the R2 site. The trace archive was searched for the origin of this product. Surprisingly, an element was found with sequence identity to both the R2 ribozyme and the 3\' end of the R1 element, forming what appeared to be an R2/R1 hybrid SIDE (R2/R1Dwi_SIDE). A discussion of the R1 component of this hybrid SIDE, which is more abundant than either the full-length R2 or R2Dwi_SIDE, is presented below. Although 30% to 40% divergent in nucleotide sequence, the secondary structures at the 5\' end of R2Dwi_SIDE as well as R2/R1Dwi_SIDE were nearly identical to the R2Dwi ribozyme (Figure [4](#F4){ref-type="fig"}A). Nucleotide differences, relative to the R2Dwi ribozyme, were predominantly compensatory changes in the four major base-paired regions (P1 to P4) or present in the large J1/2 loop between P1 and P2. Sequences in the J1/2 loop were previously shown to have little effect on self-cleavage of HDV-like ribozymes \[[@B25],[@B29]\]. Each of the three ribozymes was tested in our standard T7 *in vitro* transcription-cleavage assay \[[@B25]\] and each was observed to self-cleave (Figure [4](#F4){ref-type="fig"}B). The R2 SIDE and the R2 element ribozymes were found to self-cleave at similar levels (89% and 85% respectively), the R2/R1 SIDE ribozyme at a lower level (54%). The lower level of cleavage by the R2/R1 SIDE may be due to the two nucleotide differences in the catalytic L3 region of the ribozyme or the different 28S sequences upstream of the ribozyme. Both types of changes have been shown to affect the level of self-cleavage by HDV-like ribozymes \[[@B25],[@B30],[@B31]\]. The ability to self-cleave suggests that the 5\' end of both R2Dwi_SIDE and R2/R1Dwi_SIDE can be processed out of a 28S cotranscript much like the R2 element. ![**The 5\' ends of*D. willistoni*(Dwi) elements function as ribozymes. (A)** RNA sequences from the 5\' end of R2Dwi folded into the secondary structure previously determined for the ribozymes encoded by other *Drosophila* R2 (left). J = nucleotides joining paired regions; L = loop; P = base paired region \[[@B25]\]. Similar structures are presented for R2Dwi_SIDE ('Short Internally Deleted Element') (center) and R2/R1Dwi_SIDE (right) with nucleotide differences relative to the R2 element circled in blue. J1/2 sequences for each element type are presented below with nucleotide differences relative to R2Dwi boxed in blue. Nucleotides boxed in pink correspond to a stop codon found in most *Drosophila* R2 elements. Nucleotide circled in pink corresponds to a 'U' residue conserved in *Drosophila* R2 elements and the R2 SIDE but not the hybrid SIDEs. **(B)** A 5% polyacrylamide denaturing gel showing the *in vitro* generated RNAs from 5\' junction templates starting 95 bp upstream of the R2 site (lanes 1 and 2) or 74 bp upstream of the R1 site (lane 3) and extending 5 to 10 bp downstream of the ribozyme structure. Lane numbers correspond to ribozyme structure in (A). The uncleaved RNA (solid circle) and self-cleaved products (open circles) are indicated for each ribozyme. The fraction of synthesized RNA undergoing self-cleavage (*f*~c~) is under each lane. Lane M, RNA length markers with sizes indicated.](1759-8753-3-10-4){#F4} Survey for additional SIDEs --------------------------- Several PCR-based surveys were performed to look for additional SIDEs containing the R2 ribozyme in other *Drosophila* species. First, primers 1 and 2 (Figure [1](#F1){ref-type="fig"}B) gave rise in most of the 39 *Drosophila* species analyzed to a PCR product greater than 3 kb in length consistent with the presence of full-length R2 elements; however, no additional R2 SIDEs were detected. Second, a reverse primer to the catalytic region of the ribozyme was used in conjunction with a primer to 28S sequences upstream of the R2 site to look for PCR products distinct from the full-length R2 product (Figure [1](#F1){ref-type="fig"}B, primers 3 and 4). This survey also did not reveal additional R2 SIDEs but did lead to the discovery of several examples of *in vivo* template jumps to small cellular RNAs (discussed below). These results suggest R2 SIDEs are not common in *Drosophila*. A third survey was performed to look for additional hybrid SIDEs in the R1 site of *Drosophila*. Primer 3 was paired with a 28S primer corresponding to sequences between the R2 and R1 sites (Figure [1](#F1){ref-type="fig"}B, primer 5). This primer pair will only amplify R2 sequences inserted downstream of the R2 site (for example, the R1 site) \[[@B22]\]. PCR products containing R2 sequences were obtained from 11 species. Sequence analysis of the products from eight species suggested that they arose from R2 insertions containing target site duplications greater than 20 bp in length, therefore, only appeared inserted downstream of the R2 site. Such target site duplications have been previously detected for R2 elements \[[@B22]\]. However, an analysis of the products from *Drosophila falleniDrosophila innubila* and *Drosophila immigrans* did reveal additional SIDE elements. The 3\' end of each of these insertions was obtained using a species-specific primer paired with a primer downstream of the R1 site (Figure [1](#F1){ref-type="fig"}B, primer 6 and primer 7). R2/R1 SIDEs ----------- Based on their 3\' junctions, all R1 elements within the 28S gene are located 60 bp downstream of the R2 insertion site. Based on their 5\' junctions, all R1 elements outside the melanogaster species group have a 14 bp target site duplication that flanks the R1 insertions \[[@B22]\]. The hybrid insertion elements found in *D. willistoni, D. falleniD. innubila* and *D. immigrans* were present in the R1 site and also had a 14 bp target site duplication (Figure [5](#F5){ref-type="fig"}A). Schematic diagrams of the insertions- R2/R1Dfa_SIDE, R2/R1Din_SIDE, R2/R1Dim_SIDE and R2/R1Dwi_SIDE- are presented in Figure [5](#F5){ref-type="fig"}B. Sequence identity to R2 for the four hybrid SIDEs was confined to the ribozyme plus five to eight downstream nucleotides and varied from 76% to 87%. Sequence identity to R1 for the 3\' ends of the hybrid SIDEs varied from only short segments to 83% in the case of *D. willistoni*. Previous analysis of *Drosophila* R1s has revealed the 3\' UTR varies considerably in length between species (500 to 1,000 bp) with little sequence conservation \[[@B21]\]. A detailed comparison of the 3\' UTRs of divergent *Drosophila* R1s (Additional file [1](#S1){ref-type="supplementary-material"}) revealed six conserved regions. The R2/R1 SIDEs in *D. willistoniD. falleni*, and *D. innubila* have these six conserved segments spaced at intervals consistent with those observed for R1 elements (Additional file [1](#S1){ref-type="supplementary-material"}; Figure [5](#F5){ref-type="fig"}B, red vertical bars). Only the hybrid SIDE from *D. immigrans* differed by the addition of extra sequences between the third and fourth conserved segments. Surprisingly, half of this extra sequence appears to be derived from the internal transcribed spacer (ITS)-1 region of the *D. immigrans* rDNA unit (green shading). The conservation of the critical segments at the 3\' ends of the R2/R1 SIDEs as well as their target site specificity suggest the hybrid SIDEs use the R1 retrotransposition machinery. ![**R2/R1 hybrid SIDEs. (A)** R1 insertions in the 28S gene in *Drosophila* outside the melanogaster group are flanked by a 14 bp target site duplication (arrows, upper diagram). In four species (bottom diagrams), a family of insertion elements bearing R2 ribozyme sequences (blue box) upstream of sequences with identity to R1 elements (orange box) was found in the R1 site flanked by the same 14 bp target site duplication. **(B)** The diagrams show the extent and level of sequence identity of each hybrid SIDE to the R1 and R2 elements in the same species. In the case of the R2/R1 SIDEs from *Drosophila falleni*, *Drosophila innubila* and *Drosophila immigrans* sequence identity to R1 was limited to six conserved segments found in all *Drosophila* R1 elements (red vertical lines; see Additional file 1). A portion of the sequence between the third and fourth conserved segments in R2/R1Dim_SIDE has 75% identity to ITS-1 of *D. immigrans* (green box). The lengths of the R2/R1 SIDEs are shown to the right.](1759-8753-3-10-5){#F5} A common property of the R1 elements in many *Drosophila* species, including *D. willistoni*, is that individual 28S genes contain multiple R1 insertions. The multiple R1s are organized in a tandem array at the target site with the individual copies separated by the 14 bp 28S gene target site duplication \[[@B22]\]. A search of the *D. willistoni* trace archive revealed that copies of R2/R1Dwi_SIDE were interspersed with the R1 elements in these tandem arrays. This result also strongly supports the conclusion that the hybrid SIDEs are mobilized like typical R1 elements. PCR amplifications, similar to that in Figure [2](#F2){ref-type="fig"}C, were performed to estimate the relative abundance of the three hybrid SIDEs (data not shown). In *D. falleni*, R2/R1Dfa_SIDEs and R2 elements were present at approximately equal numbers; in *D. immigrans*, R2 elements outnumbered R2/R1Dim_SIDEs by a factor of 5; and in *D. innubila* only a few copies (less than 5) of the R2/R1Din_SIDE were detected. It should be noted that when multiple stocks from a species were sampled, R2 and R1 levels varied over a threefold to fivefold range \[[@B32],[@B33]\]. Therefore, the SIDE levels detected in any one stock should not be regarded as characteristic for the species. The R2/R1 SIDEs presumably rely on an active ribozyme to process SIDE sequences from the R1 site within a 28S cotranscript. The ribozyme encoded in R2/R1Dwi_SIDE was shown capable of self-cleavage in Figure [4](#F4){ref-type="fig"}B. The secondary structures of and nucleotide differences between the 5\' ends of the hybrid SIDE and R2 element from *D. falleni* are shown in Figure [6](#F6){ref-type="fig"}A. The single nucleotide differences between the elements found in *D. innubila* and *D. falleni* in the diagrammed regions are boxed. T7 *in vitro* transcription-cleavage assays revealed that the hybrid SIDEs from these two species showed self-cleavage levels between one-third and one-half the levels observed for the R2 elements (Figure [6](#F6){ref-type="fig"}B). ![**The 5\' ends of*Drosophila falleni*and*Drosophila innubila*elements function as ribozymes. (A)** The RNA secondary structures and highlighted nucleotides for R2Dfa and R2/R1Dfa_SIDE are as described in Figure [4](#F4){ref-type="fig"}. The corresponding regions in the *D. innubila* elements are identical except for the boxed U in R2Dfa (A in R2Din) and the boxed G in the R2/R1Dfa_SIDE (A in R2/R1Din_SIDE). J1/2 sequences for the elements are shown below with nucleotide differences relative to R2Dfa boxed in blue. **(B)***In vitro* cotranscription/cleavage assays as described in Figure [4](#F4){ref-type="fig"}.](1759-8753-3-10-6){#F6} Figure [7](#F7){ref-type="fig"}A shows a comparison between the 5\' ends from the *D. immigrans* hybrid SIDE and R2 element. There are many nucleotide differences throughout the structure including a large number of compensatory changes in the P1 stem. The *in vitro* transcription-cleavage assays revealed that both the R2 and R2/R1 SIDE ribozymes self-cleaved at levels above 80% (Figure [7](#F7){ref-type="fig"}B). Therefore, the ribozymes encoded by the R2/R1 SIDEs in all four species can self-cleave and are likely able to process the 5\' end of the element transcript out of the 28S cotranscript. ![**The 5\' ends of*Drosophila immigrans*elements function as ribozymes. (A)** Folded RNA secondary structures, J1/2 sequencers, and highlighted nucleotides for R2Dim and R2/R1Dim_SIDE are as described in Figure [4](#F4){ref-type="fig"}. **(B)***In vitro* cotranscription/cleavage assay as described in Figure [4](#F4){ref-type="fig"}.](1759-8753-3-10-7){#F7} *In vivo* template jumps ------------------------ During the attempts to identify SIDE families by PCR, R2 5\' junction products that differed in length by 120 bp were observed in *Drosophila ambigua* (Figure [8](#F8){ref-type="fig"}A). The two junction types were confirmed using a second primer to sequences approximately 400 bp further downstream in the R2 element. Sequence analysis of cloned PCR products revealed the less abundant, shorter type to have typical R2 5\' junctions (8 clones) while the more abundant, longer type contained a 48 bp deletion of the 28S gene and a 170 bp extension at the 5\' end of R2 (12 clones). A sequence blast revealed this extension corresponded to the 5\' end of the small nuclear RNA, snU12 \[[@B34]\]. Sequencing of the snU12 from *D. ambigua* revealed 99% identity to the first 156 bp of the R2 extension, and two additional copies of nucleotides 151 to 156 present in the R2 extension. The structures for the two junction types are diagrammed in Figure [8](#F8){ref-type="fig"}B. ![***In vivo*template jump to the small nuclear RNA, snU12. (A)** 5\' R2 junction products from PCR amplification in *Drosophila ambigua* separated on a native, 8% polyacrylamide gel. Lane M, DNA length markers. **(B)** Diagrams of sequenced PCR products: 28S sequences (gray boxes); R2 sequences (blue boxes); snU12 sequences, yellow boxes. Long PCR products (12 clones) had a 48 bp deletion of upstream 28S sequences, 156 bp with sequence identity to the 5\' end of snU12, and a 6 bp repeat at the snU12/R2 junction (arrowheads). Short products (eight clones) had typical 5\' junctions that differed by zero to two non-templated nucleotides. **(C)***In vitro* cotranscription/cleavage assay of RNA containing R2 sequences with the snU12 extension indicated self-cleavage only immediately upstream of the R2 sequences (lane 1, open circles). RNA constructs (see (D)) designed to promote self-cleavage upstream of the snU12 sequences did not self-cleave (lanes 2 and 3, solid circles). **(D)** Secondary structures of R2 with U12 extension (1) and two modified constructs. The substitution of two C's in the P1 stem (2) and deletion of the 5\' end of R2 (3) are highlighted in gray. Structure number corresponds to lane number in (C). Nomenclature and highlighted nucleotides are as described in Figure [4](#F4){ref-type="fig"}.](1759-8753-3-10-8){#F8} The long variant of the R2 element likely originated during reverse transcription when the R2 reverse transcriptase jumped from the 5\' end of the R2 RNA to snU12 RNA. This process has been described as a template jump and has been observed *in vitro* for the R2 reverse transcriptase \[[@B35]\] and *in vivo* for human L1 retrotransposition \[[@B36]\]. Unlike the reoccurring jumps to snU6 by L1 which gave rise to sequence variation \[[@B37],[@B38]\], the multiple copies of R2 in *D. ambigua* are probably derived from a single jump to snU12 RNA since they all contain the same 6 bp repeats. Because this long form appears more abundant than the short form, one intriguing possibility is that a template jump gave rise to a new subfamily of R2 capable of retrotransposing with the upstream snU12 sequences. If the 170 bp extension is retrotransposing with the R2 element, RNA self-cleavage should occur upstream of the U12 sequences rather than at the R2 5\' junction. The products observed in T7 *in vitro* transcription-cleavage reactions are shown in Figure [8](#F8){ref-type="fig"}C. Efficient self-cleavage only occurred at the 5\' end of the R2 sequences as observed for a typical *Drosophila* R2 ribozyme (Figure [8](#F8){ref-type="fig"}C, lane 1; Figure [8](#F8){ref-type="fig"}D, diagram 1). Two constructs were next generated in an attempt to force cleavage upstream of the U12 sequences. In the first, the two G's at the base of the R2 P1 stem were mutated to C's (Figure [8](#F8){ref-type="fig"}D, diagram 2); in the second, all but the first 12 bp of the snU12 sequence as well as the first 66 nucleotides at the 5\' end of R2 were deleted (Figure [8](#F8){ref-type="fig"}D, diagram 3). Self-cleavage in standard *in vitro* reactions was not observed for either RNA construct (Figure [8](#F8){ref-type="fig"}C, lanes 2 and 3). We suggest the conditions needed for the self-cleavage of the R2 upstream of the snU12 extension are not met in our *in vitro* assay. We do not favor the alternative explanation that a single R2 insertion with U12 extension occurred in this species and was then duplicated multiple times by recombination. We have never seen high levels of amplification of a specific inserted rDNA unit in *Drosophila*. Finally, two additional examples of template jumps were detected in *Drosophila* species. An 80 bp extension at the 5\' junction of an R2 element was found in the trace archive of *D. pseudoobscura* (Additional file [2](#S2){ref-type="supplementary-material"}). These extra sequences differed at only one nucleotide position from the tRNA^lys(2)^ of this species. The presence of the nucleotides 'CCA' at the 3\' end of this extension, which are added to tRNA post transcriptionally, confirm that the sequence arose by a jump from the R2 RNA template to the mature tRNA. Surveying the remaining 11 *Drosophila* trace archives for 'CCA' immediately upstream of full-length R2 insertions revealed another potential template jump to tRNA in *Drosophila yakuba*. In this case, 18 nucleotides from tRNA^gly^ were found at the 5\' junction of an R2 (Additional file [2](#S2){ref-type="supplementary-material"}). Discussion ========== The experiments in this report provide evidence for new families of insertion elements in the 28S genes of *Drosophila*. Segments from R2 and/or R1 elements comprise these insertions, and they are mobilized by hijacking the R2 or R1 retrotransposition machinery. Because these non-autonomous elements rely (as does the R2 element itself) on cotranscription with the 28S gene, they are referred to as SIDEs rather than SINEs. Non-autonomous DNA-mediated transposable element families, such as the miniature inverted-repeat DINE-1 and non-autonomous P elements, have been previously documented in *Drosophila* genomes \[[@B39]-[@B41]\]. The R2 SIDE and R2/R1 hybrid SIDEs along with HeT-A \[[@B42]\] are, however, the only clear examples of non-autonomous retrotransposons to be found in *Drosophila*. Analysis of the SIDEs provides direct support for the model that R2 retrotransposition requires only the 5\' end for RNA self-cleavage from a 28S cotranscript and the 3\' UTR for binding the R2 protein to initiate TPRT. The discovery of SIDEs mobilized by the R1 machinery also provides strong support for the model \[[@B19]\] that the R1 protein recognizes the 3\' UTR sequences/secondary structure of its RNA to initiate TPRT and thus belongs to the class of stringent non-LTR retrotransposable elements. Because there is a single lineage of R2 element vertically transmitted in *Drosophila*\[[@B20]\], the levels of divergence between ribozyme sequences (excluding the highly variable J1/2 loop) from different elements can be compared to provide an estimate of the number of independently formed SIDEs and their approximate ages. First, the 25% sequence divergence between the ribozymes from the R2 element and R2 SIDE of *D. willistoni* is similar to the divergence between the ribozymes from the R2 elements from *D. willistoni* and *D. melanogaster* (23%) as well as between *D. ananassae* and *D. melanogaste*r (28%). Assuming similar levels of constraint on the ribozyme of these elements, this suggests the R2 SIDE lineage is as old as the divergence between species groups within the *Sophophora* subgenus, that is, over 40 million years \[[@B43],[@B44]\]. Second, the 27% sequence divergence between the R2 and hybrid SIDE ribozymes from *D. immigrans* indicates the R2/R1Dim_SIDE lineage also dates back to a comparable time within the *Drosophila* subgenus. Third, the lower levels of sequence divergence between the ribozymes from R2/R1Dwi_SIDE and R2Dwi (11%) and between the ribozymes from R2/R1Dfa_SIDE and R2Dfa (10%) suggests both of these hybrid SIDEs have a more recent origin (approximately 20 million years ago). Because *D. falleni* and *D. willistoni* are in different subgenuses, their hybrid SIDEs arose independently. Finally, because R2/R1Dfa_SIDE and R2/R1Din_SIDE have only 3% sequence divergence, they likely represent the same event in the ancestor of these two closely related species. In summary, the five identified SIDEs in this report appear to have originated in four separate events. Non-autonomous elements of DNA transposons (for example, miniature inverted-repeat transposable elements (MITEs)) and LTR retrotransposons (for example, terminal-repeat retrotransposons in miniature (TRIMs)) have been found to originate from autonomous elements by internal deletions \[[@B6],[@B45]-[@B48]\]. The non-LTR, non-autonomous elements TbRIME and Ag-Sponge also appear to have arisen by internal deletions \[[@B49],[@B50]\]. TbRIME is of special interest because it has sequence identity at the 5\' end to the ribozyme encoded by L1Tc \[[@B31],[@B51]\]. Two potential mechanisms could have formed the *Drosophila* SIDEs. First a template jump \[[@B35]\] during a retrotransposition reaction could have fused the 3\' and 5\' ends of an R2 element. The R2 5\' junctions with upstream snU12 RNA and tRNA sequences shown in Figure [8](#F8){ref-type="fig"} and Additional file [2](#S2){ref-type="supplementary-material"} demonstrates the R2 protein does have the ability to template jump *in vivo*. In the case of the hybrid SIDEs, R1 sequences are located downstream of the R2 sequences, therefore, it is the R1 reverse transcriptase that must be postulated as responsible for the jumps. A second more likely possibility for the formation of the SIDEs is that non-homologous recombination within the rRNA gene locus joined the 5\' end of R2 to either the 3\' end of R2 or the 3\' end of R1. Such recombinants could have been the result of DNA repair after retrotransposition events. The R2 machinery has been associated with large deletions of upstream rDNA sequences in *D. melanogaster*\[[@B52]\] and *D. simulans*\[[@B53]\]. Alternatively, the recombinations generating the SIDEs could simply have been aberrant versions of the frequent crossovers that give rise to the concerted evolution of the rDNA locus. Whatever the scenario, it seems unlikely that the SIDEs were formed in their present configuration. All SIDE families appear old, thus there has been ample opportunity for subsequent internal deletions to shorten the SIDEs until only the minimal sequences needed for activity remain. Based on the sequence conservation of each SIDE, it appears that these elements have recently been active. Since their formation, the ribozymes and 3\' ends of the SIDEs appear to be evolving similarly to the corresponding regions of R2 and R1 with two notable exceptions. A highly conserved 'U' located in the catalytic region of 18/19 *Drosophila* R2 ribozymes as well as in the R2 SIDE itself (pink circle, Figures [4](#F4){ref-type="fig"}A[6](#F6){ref-type="fig"}A[7](#F7){ref-type="fig"}A and [8](#F8){ref-type="fig"}D) has been substituted with an 'A' in all hybrid R1/R2 SIDEs. This substitution may reflect the difference in the insertion site of the hybrid SIDEs and consequently the upstream 28S sequences that must be cleaved from the cotranscripts. The second exception is a stop codon that is found in J4/2 in 18/19 R2 elements (pink box, Figures [4](#F4){ref-type="fig"}A[6](#F6){ref-type="fig"}A and [8](#F8){ref-type="fig"}D) but not found in any of the five SIDEs. We suggest this stop codon is important in the initiation of translation of the R2 RNA open reading frame by way of an encoded internal ribosome entry site (IRES) \[[@B54],[@B55]\], a function obviously not required for RNA arising from the SIDEs. In general, non-LTR SIDEs appear to be rare. An L1 SIDE has not been observed despite the fact that studies of L1 retrotransposition in cultured cells revealed the generation of chimeric and internally deleted L1 insertions \[[@B38]\]. The cis preference of the L1 ORF2 protein for its RNA can, however, readily explain the absence of an associated SIDE \[[@B56]\]. Likewise, our survey of 39 *Drosophila* species suggests that the formation of R2/R1 hybrid SIDEs and to a greater extent R2 SIDEs is also rare and/or their survival after formation is unlikely. While there is no evidence that R1 and R2 undergo cis preference, our studies on R2 expression and regulation suggest an explanation for the paucity of R2 associated SIDEs \[[@B57],[@B58]\]. Our current model suggests that *Drosophila* has the ability to select for transcription a localized region in the rDNA locus that has the lowest level of insertions. Because the SIDEs as well as the R2 elements rely on cotranscription with the 28S gene, their transcription can only occur whenever an rDNA unit with the insertion is located within this transcription domain. Consequently, in order for an R2 SIDE to retrotranspose both a copy of the SIDE and a copy of the autonomous R2 element must be present in the small transcription domain. Because the R2 lineage itself appears somewhat unstable and has been lost in several species of *Drosophila*\[[@B22],[@B59]\], the survival of an R2 SIDE would be even more tenuous. However, R1 elements have been suggested to contain their own promoter and thus may not need to be within the transcription domain for activity. R1 elements are present in all lineages of *Drosophila* and indeed many species have two distinct lineages \[[@B21],[@B59]\]. The greater evolutionary stability of the R1 retrotransposition machinery and the independence of transcriptional control of the hybrid SIDE from the autonomous R1 elements may explain why these SIDEs appear to have a greater chance of long-term survival within the locus. Conclusion ========== This report demonstrates that R1 and R2 elements, like many other non-LTR retrotransposons, are parasitized by non-autonomous sequences that hijack their retrotransposition machinery. These short internally deleted elements, or SIDEs as we have called them, need only the R2 self-cleaving ribozyme at their 5' end to process themselves from a 28S rRNA co-transcript and 3' RNA sequences which can be bound by the retrotransposition machinery of an autonomous element. These R2 SIDEs and R2/R1 SIDEs can survive only as long as the autonomous R1 and R2 elements are able to survive. The existence of each element would seem tenuous, as there are a limited number of potential insertion sites in the rDNA locus. However, the high rates of recombination and turnover of rDNA units within this locus facilitates mobile element survival \[[@B20],[@B21],[@B57],[@B59]\]. The finding that some lineages of the SIDEs have persisted for an estimated 40 million years suggests this genomic niche is sometimes even flexible enough to maintain the parasites of R1 and R2. Methods ======= PCR amplification/cloning/nucleotide sequence determination ----------------------------------------------------------- Genomic DNA from most *Drosophila* species surveyed was previously isolated \[[@B20],[@B21]\]. For *D. innubila* and *Drosophila phalerata*, genomic DNA was isolated from adult flies (a gift from J Jaenike) as described in the above references. The initial survey for R2 SIDEs was performed using two primers to the conserved catalytic region of the R2 ribozyme (R2(catA), 5\'-AAAACCTCCTCGTGGTRTY-3\') and (R2(catB), 5\'-GTGGCCTCCTCGTGGTRTY-3\') separately paired with a reverse primer which anneals to the 28S gene 29 to 50 nucleotides downstream of the R2 site (28S(+50), 5\'-CGTTAATCCATTCATGCGCGTC-3\'). The survey for R2/R1 hybrid SIDEs was performed using a reverse primer to the conserved catalytic region of the R2 ribozyme (R2 (cat1), 5\'-RAYACCACGAGGAGG-3\') paired with a primer annealed to the 28S gene 1 to 15 nucleotides downstream of the R2 insertion site (28S (+15), 5\'-TAGCCAAATGCCTCG-3\'). A second survey for R2 SIDEs and R2 5\' variation was performed by pairing the R2 (cat1) primer with a 28S gene primer 81 to 61 nucleotides upstream of the R2 insertion site (28S (−81), 5\'-TGCCCAGTCCTCTGAATGTC-3\'). Where noted R corresponds to A and G; Y corresponds to C and G; and W corresponds to A and T. PCR fragments were cloned into the pCR2.1-TOPO cloning vector (Invitrogen, Grand Island, NY USA) and sequenced (Macrogen, Rockville, MD USA). The 3\' ends of the R2/R1 SIDEs were obtained by pairing the *D. falleni/D. innubila* primer (fal(J1/2), 5\'-GCACATGGTGTCCCACAAATTGTCAG-3\') and the *D. immigrans* primer (imm(J1/2), 5\'-TACCTTGGCAAAGTACCC-3\') with a reverse primer which annealed to the 28S gene 6 to 27 nucleotides downstream of the R1 site (28S(+80), 5\'-GTTCCCTTGGCTGTGGTTTCGC-3\'). The 3\' end of the R2 ribozyme from *D. ambigua* was obtained by pairing primer (Cys(amb), 5\'-CATRTGNACRCCNARNCC) with (28S(−81)). A partial snU12 sequence from *D. ambigua* was obtained by pairing primers: (DpsU12up, 5\'-GTGCCTGAAATTAATGAGTAAGG) and (DpsU12down, GGGCAGATCGCAAACACCC). All PCR products were cloned and sequenced as above. The primers to sequences shared by the R2 element and SIDE(s) in *D. willistoni* (Cons(wil), 5\'-ACACCACGAGGAGGTTTCG-3\'), in *D. falleni/D. innubila* (Cons(fal), 5\'-ACACTGAATTTAGCACCCGGAGG-3\'), and in *D. immigrans* (Cons(imm), 5\'-ACGGWGGCCCCCTCTGC-3\') were paired with either 28S(−81) or (28S(−32), 5\'-CAACGGCGGGAGTAACTATG-3\') to determine relative SIDE abundance. PCR products were separated on 8.75% polyacrylamide gels and ethidium bromide stained bands analyzed using QuantityOne (BioRad, Hercules, CA USA). Template generation ------------------- Reverse primers which annealed to sequences downstream of the SIDE ribozymes: *D. willistoni* (R2SIDE(wil), 5\'-AGGATTAGACCTTCAGAATACC-3\') and (R2/R1SIDE(wil), 5\'- GCCAAACAGGAAATGGGTAAACC-3\') *D. falleni/D. innubila* (R2/R1SIDE(fal), 5\'-CTACCAATTCTAACTCCAAAACAG-3\'), and *D. immigrans* (R2/R1SIDE(imm), 5\'-TATGGAAGAATTCTAACCCGC-3\') as well as downstream of the R2 elements: *D. willistoni* (R2(wil), 5\'-GGTAACCCCAAGAGTTGCTTC-3\'), *D. falleni/D. innubila* (R2(fal), 5\'-TTGGGTAGGTAACCCTTTGGAC-3\'), *D. immigrans* (R2(imm), 5\'-TGATTTGCACCAACAGTTGTC-3\') and *D. ambigua* (R2(amb), 5\'-CCCCATAGGACTGTTTCGCTG-3\') were paired with a 28S upstream primer containing a T7 promoter (28S(−95), 5\'-TAATACGACTCACTATAGGGCACAATGTGATTTCTGCCCAGT-3\'). PCR fragments were cloned into the TOPO cloning vector (Invitrogen, Grand Island, NY USA). DNA templates were generated by PCR amplification using the same primers with unincorporated primers and nucleotides removed with the PCR Purification Kit (BioBasics, Markham, Ontario Canada). Cotranscription/cleavage assay ------------------------------ Assays were preformed as described in \[[@B25]\]. Approximately 0.1 μg of PCR template was incubated in transcription buffer with 20 units of T7 RNA polymerase (Fermentas, Glen Burnie, MD USA) and trace amounts of \[α-^32^P\]UTP) for 1 h at 42°C. Reactions were then placed on ice and four volumes of 95% formamide, 10 mM EDTA (pH 8) added. RNA products were denatured at 92°C for 3 minutes and separated on 8 M urea, 5% polyacrylamide gels. The dried gels were exposed to a phosphorimager screen and analyzed using QuantityOne (BioRad, Hercules, CA USA). SIDE sequence files ------------------- Complete nucleotide sequences for each SIDE can be found in Additional file [3](#S3){ref-type="supplementary-material"} (R2Dwi_SIDE), Additional file [4](#S4){ref-type="supplementary-material"} (R2/R1Dwi_SIDE), Additional file [5](#S5){ref-type="supplementary-material"} (R2/R1Dfa_SIDE), Additional file [6](#S6){ref-type="supplementary-material"} (R2/R1Din_SIDE), and Additional file [7](#S7){ref-type="supplementary-material"} (R2/R1Dim_SIDE). Sequences were aligned with the aid of ClustalX \[[@B60]\]. Original sequence reads ----------------------- Sequencing reads from the whole genome shotgun sequencing project of *D. willistoni* (8.4-fold coverage), *D. pseudoobscura* (ninefold coverage), and *D. yakuba* (ninefold coverage) were accessed by Blast search (version 2.2.17) in the trace archives at NCBI \[[@B26]\]. Competing interests =================== The authors declare that they have no competing interests. Authors' contributions ====================== DGE carried out the studies and drafted the manuscript. THE participated in the design of the studies and helped finalize the manuscript. Both authors read and approved the final manuscript. Supplementary Material ====================== ###### Additional file 1 **R1 and hybrid SIDE 3\' end sequence conservation.** Two lineages of R1 elements, R1A and R1B, suggested to have diverged over 100 million years ago and maintained in *Drosophila* by vertical descent were previously found to have little sequence conservation in the 3\' untranslated regions (UTRs). Shown in this figure are sequences from the 3\' ends of nine R1A and six R1B family members that represent the diversity of *Drosophila*. The six R1 segments with the highest levels of identity were also identifiable in the four families of R2/R1 SIDEs. Distances from the stop codon of open reading frame 2 (ORF2) (R1 elements) or the ribozyme (SIDE elements) as well as distances between conserved segments are shown in parentheses. Dmer, *Drosophila mercatorum*; Dfa, *Drosophila falleni*; Dte, *Drosophila testacea*; Dpu, *Drosophila putrida*; Dan, *Drosophila ananassae*; Dta, *Drosophila takahashii*; Dme, *Drosophila melanogaster*; Dps, *Drosophila pseudoobscura*; Dvi, *Drosophila virillis*; Dre, *Drosophila recens*; Dgr, *Drosophila grimshawii*. ###### Click here for file ###### Additional file 2 **Template jumps to tRNA. (A)** Diagram of an R2 5\' junction found in the *Drosophila pseudoobscura* trace archive indicating a template jump from R2 RNA to tRNA^lys(2)^: R2 (blue box); tRNA (purple box); 28S gene (gray box). Partial 28S and R2 junction sequences and the entire tRNA^lys(2)^ sequence is shown below the diagram. Three non-templated nucleotides (white box) are present between the tRNA and 28S sequences. **(B)** Diagram and sequence of the 5\' junction of a template jump to tRNA^gly^ found in the *Drosophila yakuba* trace archive. Shading as in **(A)**. ###### Click here for file ###### Additional file 3 R2Dwi_SIDE sequence. ###### Click here for file ###### Additional file 4 R2/R1Dwi_SIDE sequence. ###### Click here for file ###### Additional file 5 R2/R1Dfa_SIDE sequence. ###### Click here for file ###### Additional file 6 R2/R1Din_SIDE sequence. ###### Click here for file ###### Additional file 7 R2/R1Dim_SIDE sequence. ###### Click here for file Acknowledgements ================ The authors thank William Burke for helpful discussions. We thank J Jaenike (University of Rochester) for fly stocks. This work was made possible by National Institutes of Health Grant Number R01GM42790.
Q: Where's the error in this for? Probably it's because I've written It, but, where's the error? function getTotalVideoFrame ():int { if (video.current > 0) { var frames:int = 0; for (i:int = 0; i < video.current; i ++) { frames += video.chapters[i].frames; } frames = frames + getCurrentVideoFrame (); return frames; } return getCurrentVideoFrame (); } the error: Scene 1, Layer 'as3', Frame 1, Line 1051 1084: Syntax error: expecting in before colon. Scene 1, Layer 'as3', Frame 1, Line 1051 1084: Syntax error: expecting rightbrace before rightparen. if I comment the for statement everything go right, I must be spent to be unable to see the error. A: I think you are missing var in your for loop: for (var i:int = 0; i < video.current; i ++)
This section tracks interviews and articles conducted by the Council as well as significant use of, or reference to, CTBUH-generated tall building facts in the international media. In 2015 we launched an enhanced version of the In the Media section and are in the process of moving historical articles over to this system. For now you may browse older articles by visiting the Pre-2015 Archive. As the 10th anniversary of the 9/11 terrorist attacks nears, CTBUH Executive Director Antony Wood speaks with WBEZ about the impact of the attacks on the skyscraper industry, and how it has affected changing trends. Read more.
Facebook buys speech recognition start-up Wit.ai, prompting rumours about new developments to the site Mark Zuckerberg launches his “Year of Books” on Facebook Social media embarrassment for Ryan Air after.. read more
/** * Copyright (c) 2010-2020 Contributors to the openHAB project * * See the NOTICE file(s) distributed with this work for additional * information. * * This program and the accompanying materials are made available under the * terms of the Eclipse Public License 2.0 which is available at * http://www.eclipse.org/legal/epl-2.0 * * SPDX-License-Identifier: EPL-2.0 */ package org.openhab.binding.pulseaudio.cli; import java.util.ArrayList; import java.util.Collection; import java.util.Hashtable; import java.util.List; import java.util.regex.Matcher; import java.util.regex.Pattern; import org.openhab.binding.pulseaudio.internal.PulseaudioClient; import org.openhab.binding.pulseaudio.internal.items.AbstractAudioDeviceConfig; import org.openhab.binding.pulseaudio.internal.items.Module; import org.openhab.binding.pulseaudio.internal.items.Sink; import org.openhab.binding.pulseaudio.internal.items.SinkInput; import org.openhab.binding.pulseaudio.internal.items.Source; import org.openhab.binding.pulseaudio.internal.items.SourceOutput; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * Parsers for the pulseaudio return strings * * @author Tobias Bräutigam * @since 1.2.0 */ public class Parser { private static final Logger logger = LoggerFactory.getLogger(Parser.class); private static final Pattern pattern = Pattern.compile("^\\s+([a-z\\s._]+)[:=]\\s*<?\"?([^>\"]+)\"?>?$"); private static final Pattern volumePattern = Pattern.compile( "^(0|front-left|mono):(\\s[0-9]+\\s/\\s)?\\s*([0-9]+)%\\s*(/\\s[\\-0-9]+,[0-9]{2}\\sdB,\\s*)?(1|front-right)?:?(\\s[0-9]+\\s/\\s)?\\s*([0-9]+)?%?\\s*(/\\s[\\-0-9]+,[0-9]{2}\\sdB)?.*$"); private static final Pattern fallBackPattern = Pattern .compile("^([0-9]+)([a-z\\s._]+)[:=]\\s*<?\"?([^>\"]+)\"?>?$"); private static final Pattern numberValuePattern = Pattern.compile("^([0-9]+).*$"); /** * parses the pulseaudio servers answer to the list-modules command and returns a list of * {@link Module} objects * * @param raw the given string from the pulseaudio server * @return list of modules */ public static List<Module> parseModules(String raw) { List<Module> modules = new ArrayList<Module>(); // System.out.println(raw); String[] parts = raw.split("index: "); if (parts.length <= 1) { return modules; } // skip first part for (int i = 1; i < parts.length; i++) { String[] lines = parts[i].split("\n"); Hashtable<String, String> properties = new Hashtable<String, String>(); int id = 0; try { id = Integer.valueOf(lines[0].trim()); } catch (NumberFormatException e) { // sometime the line feed is missing here Matcher matcher = fallBackPattern.matcher(lines[0].trim()); if (matcher.find()) { id = Integer.valueOf(matcher.group(1)); properties.put(matcher.group(2).trim(), matcher.group(3).trim()); } } for (int j = 1; j < lines.length; j++) { Matcher matcher = pattern.matcher(lines[j]); if (matcher.find()) { // System.out.println(matcher.group(1).trim()+": "+matcher.group(2).trim()); properties.put(matcher.group(1).trim(), matcher.group(2).trim()); } } if (properties.containsKey("name")) { Module module = new Module(id, properties.get("name")); if (properties.containsKey("argument")) { module.setArgument(properties.get("argument")); } modules.add(module); } } return modules; } /** * parses the pulseaudio servers answer to the list-sinks command and returns a list of * {@link Sink} objects * * @param raw the given string from the pulseaudio server * @return list of sinks */ public static Collection<Sink> parseSinks(String raw, PulseaudioClient client) { Hashtable<String, Sink> sinks = new Hashtable<String, Sink>(); // System.out.println(raw); String[] parts = raw.split("index: "); if (parts.length <= 1) { return sinks.values(); } // skip first part List<Sink> combinedSinks = new ArrayList<Sink>(); for (int i = 1; i < parts.length; i++) { String[] lines = parts[i].split("\n"); Hashtable<String, String> properties = new Hashtable<String, String>(); int id = 0; try { id = Integer.valueOf(lines[0].trim()); } catch (NumberFormatException e) { // sometime the line feed is missing here Matcher matcher = fallBackPattern.matcher(lines[0].trim()); if (matcher.find()) { id = Integer.valueOf(matcher.group(1)); properties.put(matcher.group(2).trim(), matcher.group(3).trim()); } } for (int j = 1; j < lines.length; j++) { Matcher matcher = pattern.matcher(lines[j]); if (matcher.find()) { // System.out.println(matcher.group(1).trim()+": "+matcher.group(2).trim()); properties.put(matcher.group(1).trim(), matcher.group(2).trim()); } } if (properties.containsKey("name")) { Sink sink = new Sink(id, properties.get("name"), client.getModule(getNumberValue(properties.get("module")))); if (properties.containsKey("state")) { try { sink.setState(AbstractAudioDeviceConfig.State.valueOf(properties.get("state"))); } catch (IllegalArgumentException e) { logger.error("unhandled state " + properties.get("state") + " in sink item #" + id); } } if (properties.containsKey("muted")) { sink.setMuted(properties.get("muted").equalsIgnoreCase("yes")); } if (properties.containsKey("volume")) { sink.setVolume(Integer.valueOf(parseVolume(properties.get("volume")))); } if (properties.containsKey("combine.slaves")) { // this is a combined sink, the combined sink object // should // be for (String sinkName : properties.get("combine.slaves").replace("\"", "").split(",")) { sink.addCombinedSinkName(sinkName); } combinedSinks.add(sink); } sinks.put(sink.getName(), sink); } } for (Sink combinedSink : combinedSinks) { for (String sinkName : combinedSink.getCombinedSinkNames()) { combinedSink.addCombinedSink(sinks.get(sinkName)); } } return sinks.values(); } /** * parses the pulseaudio servers answer to the list-sink-inputs command and returns a list of * {@link SinkInput} objects * * @param raw the given string from the pulseaudio server * @return list of sink-inputs */ public static List<SinkInput> parseSinkInputs(String raw, PulseaudioClient client) { List<SinkInput> items = new ArrayList<SinkInput>(); String[] parts = raw.split("index: "); if (parts.length <= 1) { return items; } // skip first part for (int i = 1; i < parts.length; i++) { String[] lines = parts[i].split("\n"); Hashtable<String, String> properties = new Hashtable<String, String>(); int id = 0; try { id = Integer.valueOf(lines[0].trim()); } catch (NumberFormatException e) { // sometime the line feed is missing here Matcher matcher = fallBackPattern.matcher(lines[0].trim()); if (matcher.find()) { id = Integer.valueOf(matcher.group(1)); properties.put(matcher.group(2).trim(), matcher.group(3).trim()); } } for (int j = 1; j < lines.length; j++) { Matcher matcher = pattern.matcher(lines[j]); if (matcher.find()) { properties.put(matcher.group(1).trim(), matcher.group(2).trim()); } } if (properties.containsKey("sink")) { String name = properties.containsKey("media.name") ? properties.get("media.name") : properties.get("sink"); SinkInput item = new SinkInput(id, name, client.getModule(getNumberValue(properties.get("module")))); if (properties.containsKey("state")) { try { item.setState(AbstractAudioDeviceConfig.State.valueOf(properties.get("state"))); } catch (IllegalArgumentException e) { logger.error("unhandled state " + properties.get("state") + " in sink-input item #" + id); } } if (properties.containsKey("muted")) { item.setMuted(properties.get("muted").equalsIgnoreCase("yes")); } if (properties.containsKey("volume")) { item.setVolume(Integer.valueOf(parseVolume(properties.get("volume")))); } if (properties.containsKey("sink")) { item.setSink(client.getSink(Integer.valueOf(parseVolume(properties.get("sink"))))); } items.add(item); } } return items; } /** * parses the pulseaudio servers answer to the list-sources command and returns a list of * {@link Source} objects * * @param raw the given string from the pulseaudio server * @return list of sources */ public static List<Source> parseSources(String raw, PulseaudioClient client) { List<Source> sources = new ArrayList<Source>(); // System.out.println(raw); String[] parts = raw.split("index: "); if (parts.length <= 1) { return sources; } // skip first part for (int i = 1; i < parts.length; i++) { String[] lines = parts[i].split("\n"); Hashtable<String, String> properties = new Hashtable<String, String>(); int id = 0; try { id = Integer.valueOf(lines[0].trim()); } catch (NumberFormatException e) { // sometime the line feed is missing here Matcher matcher = fallBackPattern.matcher(lines[0].trim()); if (matcher.find()) { id = Integer.valueOf(matcher.group(1)); properties.put(matcher.group(2).trim(), matcher.group(3).trim()); } } for (int j = 1; j < lines.length; j++) { Matcher matcher = pattern.matcher(lines[j]); if (matcher.find()) { properties.put(matcher.group(1).trim(), matcher.group(2).trim()); } } if (properties.containsKey("name")) { Source source = new Source(id, properties.get("name"), client.getModule(getNumberValue(properties.get("module")))); if (properties.containsKey("state")) { try { source.setState(AbstractAudioDeviceConfig.State.valueOf(properties.get("state"))); } catch (IllegalArgumentException e) { logger.error("unhandled state " + properties.get("state") + " in source item #" + id); } } if (properties.containsKey("muted")) { source.setMuted(properties.get("muted").equalsIgnoreCase("yes")); } if (properties.containsKey("volume")) { source.setVolume(Integer.valueOf(parseVolume(properties.get("volume")))); } if (properties.containsKey("monitor_of")) { source.setMonitorOf(client.getSink(Integer.valueOf(parseVolume(properties.get("monitor_of"))))); } sources.add(source); } } return sources; } /** * parses the pulseaudio servers answer to the list-source-outputs command and returns a list of * {@link SourceOutput} objects * * @param raw the given string from the pulseaudio server * @return list of source-outputs */ public static List<SourceOutput> parseSourceOutputs(String raw, PulseaudioClient client) { List<SourceOutput> items = new ArrayList<SourceOutput>(); // System.out.println(raw); String[] parts = raw.split("index: "); if (parts.length <= 1) { return items; } // skip first part for (int i = 1; i < parts.length; i++) { String[] lines = parts[i].split("\n"); Hashtable<String, String> properties = new Hashtable<String, String>(); int id = 0; try { id = Integer.valueOf(lines[0].trim()); } catch (NumberFormatException e) { // sometime the line feed is missing here Matcher matcher = fallBackPattern.matcher(lines[0].trim()); if (matcher.find()) { id = Integer.valueOf(matcher.group(1)); properties.put(matcher.group(2).trim(), matcher.group(3).trim()); } } for (int j = 1; j < lines.length; j++) { Matcher matcher = pattern.matcher(lines[j]); if (matcher.find()) { properties.put(matcher.group(1).trim(), matcher.group(2).trim()); } } if (properties.containsKey("source")) { SourceOutput item = new SourceOutput(id, properties.get("source"), client.getModule(getNumberValue(properties.get("module")))); if (properties.containsKey("state")) { try { item.setState(AbstractAudioDeviceConfig.State.valueOf(properties.get("state"))); } catch (IllegalArgumentException e) { logger.error("unhandled state " + properties.get("state") + " in source-output item #" + id); } } if (properties.containsKey("muted")) { item.setMuted(properties.get("muted").equalsIgnoreCase("yes")); } if (properties.containsKey("volume")) { item.setVolume(Integer.valueOf(parseVolume(properties.get("volume")))); } if (properties.containsKey("sink")) { item.setSource(client.getSource(Integer.valueOf(parseVolume(properties.get("source"))))); } items.add(item); } } return items; } /** * converts the volume value given by the pulseaudio server * to a percentage value. The pulseaudio server sends 2 values for left and right channel volume * e.g. 0: 80% 1: 80% which would be converted to 80 * * @param vol * @return */ private static int parseVolume(String vol) { Matcher matcher = volumePattern.matcher(vol); if (matcher.find()) { if (matcher.group(7) == null) { return Integer.valueOf(matcher.group(3)); } else { return Math.round((Integer.valueOf(matcher.group(3)) + Integer.valueOf(matcher.group(7))) / 2); } } return 0; } /** * sometimes the pulseaudio server "forgets" some line feeds which leeds to unparsable number values * like 80NextProperty: * this is a workaround to get the correct number value in these cases * * @param raw * @return */ private static int getNumberValue(String raw) { int id = -1; if (raw == null) { return 0; } try { id = Integer.valueOf(raw.trim()); } catch (NumberFormatException e) { Matcher matcher = numberValuePattern.matcher(raw.trim()); if (matcher.find()) { id = Integer.valueOf(matcher.group(1)); } } return id; } }
Boca todavía no se retiró del mercado de pases y, mientras busca cerrar la llegada de Gustavo Gómez, surgió el nombre de Miguel Almirón, delantero paraguayo del Atlanta United. El Xeneize podría utilizar el dinero que tenía reservado para Nicolás Gaitán (7 millones de euros) para Almirón, quien tiene 23 años. Uno de los temas a resolver ante una eventual llegada del paraguayo es el cupo de extranjeros: Boca tiene uno libre pero lo reserva para Gustavo Gómez, por lo tendría que ceder a uno de los jugadores que tiene actualmente en el plantel.
Wednesday, April 25, 2007 The "Truth" About Homosexuality In a world baffled by religion and different interpretations of various beliefs, we’ve become more separated from God and even more so with our own people. We’ve alienated those who are different from us. We’ve only accepted the ones that look like us, walk like us and think like us, but we refuse to welcome those that stand strong in their own set of ‘beliefs’. Some call it ‘knowledge’, and others will simply say it’s ‘truth’. Whose truth? My gay brothers and sisters have been chastised for years, taking blows from radical extremists in the midst of their heated anger. They’ve been stoned to death, beaten by their very own kind---humans. Religion is the core reason for wars. Some would die for their God. Some would kill for their God. Where is the love in killing? The Ten Commandments teach us, ‘thou shall not kill’, yet we’re killing people left and right due to others not believing in what ‘we’ believe. Misinterpretations of love. I truly believe that many people misinterpret the messages in the bible. When “Christians” ridicule homosexuals, they bring forth the story of Sodom and Gomorrah. This story is based upon power and rape---not homosexuality. Jesus never once spoke about homosexuality. He spoke more about the immoral ways of heterosexuals in the bible. Promiscuity is the prime target when speaking about sexual immorality—not loving one another. People cannot distinguish between love and lust sometimes. They feel that if two people of the same gender are together as a couple, that they’re immoral and sinful. Premarital heterosexual sex is overlooked by many churches. Ironic. In my belief as a Christian, Jesus died for all of us up on the cross. I believe that He took away all of my sins by doing this. I’m washed clean. You’re washed clean. God knew that we would have an extremely difficult time here on earth, if Jesus didn’t sacrifice His own life for us. We would be doomed forever. His blood washes us clean from sin. We don’t live by the old law anymore. We live and walk through the grace of God and with gratitude, we are accepted by God. Here… Look at Galatians chapter two verses 17 through 21: "But what if we seek to be made right with God through faith in Christ and then find out that we are still sinners? Has Christ led us into sin? Of course not! Rather, I make myself guilty if rebuild the old system I already tore down. For when I tried to keep the law, I realized I could never earn God’s approval. So I died to the law so that I might live for God. I have been crucified with Christ. I myself no longer live, but Christ lives in me. So I live my life in this earthly body by trusting in the Son of God, who loved me an gave himself for me. I am not one for those who treats the grace of God as meaningless. For if we could be saved by keeping the law, then there was no need for Christ to die." So, if we don’t believe that ‘faith’ alone will save us, then we don’t fully trust that Jesus died for us up on the cross. Do we trust Jesus enough? Was it enough for Him to die for us? Did He actually take away our sins by doing this? Or do we keep clinging to the old law for safety? The law will never save us. Only Jesus can. (In my beliefs.) Many “Christians” will yell out, “Repentance!” But what does repentance really mean when we come to the Lord? It means to develop a relationship with God. It means that we accept that we are flawed as humans, and that we are saved by Christ. It doesn’t mean that we have to keep saying sorry for every single ‘humanly mistake’ that’s been made. Don’t you think God knows what we do? Do you think your secrets are hidden by God? He made you. He knows everything you do. He sees every sin that’s committed, He hears every word that’s spoken and reads every motive in your heart. Even in the darkness, your secrets are revealed. Accept the fact that God knows you. He made you. And, get this----HE STILL LOVES YOU! Don’t let them chastise you any longer. Stand strong in your faith—whatever religion you practice and know that God loves you. Judgments from other human beings are just that—it doesn’t hold up very well. The only judgment you should be concerned about is the one that comes from God. Other people are so miserable in their own lives, that they feel the need to criticize those who are happy and content in their walk with God. Be strong! This is a video I made, which I’ve shown once before on my blog, but I feel the need to post it up again. I apologize for the small lettering in the clip, however it was my first run with iMovie.
Q: Get POST data in django form AJAX from I'm going to get parameter form AJAX request in Django, Here's what I'm doing: base.html: <form method="POST">{% csrf_token %} First name: <input type="text"> <input type="submit" value="Register" id="register"> </form> main.js: $(document).ready(function(){ $("#register").live("click", function(e){ $.post("/", { name: "MY TEXT", }); }); }); views.py: from django.shortcuts import render_to_response from django.template import RequestContext from django.core.context_processors import csrf def home(request): if request.method == 'POST': print request.POST['name'] return render_to_response('registration.html', {}, context_instance=RequestContext(request)) Yes, I know that at this moment my JS doesnt get real data from text form, it sends just a static text "MY TEXT". but when I press button, I get "MultiValueDictKeyError at / "Key 'name' not found in "" What I'm doing wrong? I've changed my code: main.js $(document).ready(function(){ $("#register").live("click", function(e){ e.preventDefault(); $.post("/", { name:'MY TEXT' }); }); }); base.html: <form method="POST">{% csrf_token %} First name: <input type="text" name="name"> <br> <input type="submit" value="Register" id="register"> </form> It works, thanks! Although, I have two questions: Where am I sending 'MY TEXT' in this case? I ment it returns the ACTUAL data from name field and doesn't return "MY TEXT" The page is still reloading. And I wanted to make it completely AJAX. I mean create a python function to add data from POST request to MySQL database, and return to AJAX-script the result of the operation. And everything without page reload. How can I do this? A: What's happening is that you haven't prevented the browser's default submit action from taking place. So your Ajax POST is done, but then immediately the browser itself POSTs - and, as Michal points out, your form doesn't include a name field, so the lookup fails. You need to do two things to fix this. Firstly, use e.preventDefault(); in your JS click method. Secondly, check for request.is_ajax() at the top of your view.
Scientists at UC Berkeley and UC Riverside have demonstrated a way to edit the genome of disease-carrying mosquitoes that brings us closer to suppressing them on a continental scale. The study used CRISPR/Cas9 gene-editing technology to insert and spread genes designed to suppress wild insects, while at the same time avoiding the resistance to these efforts that evolution would typically favor. The proof-of-concept study was demonstrated in fruit flies; but the researchers believe this technology could be used in mosquitoes to help fight malaria and other mosquito-borne diseases in the next decade, pending public and regulatory approval. “What we showed is that, if you disrupt a gene required for fertility in female mosquitoes at multiple sites all at once, it becomes much harder for the population to evolve around that disruption. As a result, you can suppress a much larger population. It’s much the same as combination drug therapy, but for CRISPR-based gene drive,” said John Marshall, the study’s lead author and an assistant professor of biostatistics and epidemiology at the UC Berkeley School of Public Health. The article was published recently in the journal Nature Scientific Reports. The research was funded by the National Institutes of Health, UC MEXUS and the Parker Foundation. The technology at the heart of the study is called a gene drive system, which manipulates how genetic traits are inherited from parent to offspring. Gene drives are used to bias genetic inheritance in favor of rapidly spreading, self-destructive genes, and could be an environmentally friendly and cost-effective way to suppress populations of disease-spreading insects. The rise of CRISPR/Cas9 gene-editing technology (developed at UC Berkeley, see video below) has recently revolutionized gene drive systems because it offers a rapid, efficient and reliable way to make precise, targeted changes to the genome. The new study based its calculations on a gene drive that past studies found could result in up to 99 percent of offspring inheriting the inserted gene. Yet the few offspring that don’t inherit the gene present a big problem for this technology. A fraction of these offspring are immune to the gene drive, so any attempt to eliminate a mosquito species in this manner would result in a rapid rebound of those that are gene drive-immune. The impact of this resistance on the ability of gene drive to spread and suppress populations had previously been discussed; but had not been thoroughly evaluated. Through mathematical modeling, the new study found this resistance would have a major impact on attempts to eliminate a mosquito species on a continent-wide scale. To address this issue, the research team devised a technique that they determined could potentially suppress mosquito species continent-wide. The new technique, called multiplexing, involves using one of the components of the CRISPR system, a guide RNA, to target multiple locations in a gene at once. Computer modeling by the research team suggests that the size of the population that could be suppressed increases exponentially with the number of these guide RNAs utilized. It also shows that with four or five multiplexed guide RNAs, a mosquito species could potentially be suppressed on a continental scale. “Knowing that we can potentially overcome the issues of resistance through careful engineering and multiplexing is huge,” said co-corresponding author Omar Akbari, an assistant professor of entomology at UC Riverside. The researchers demonstrated the technology in fruit flies, an organism commonly used as a model in labs. Now they are working to adapt this technology to the mosquito species that transmit malaria, dengue and Zika. “The potential of multiplexing is vast. With one guide RNA, we could suppress a room of mosquitoes. With four, we could potentially suppress a continent and the diseases they transmit. But nature has a knack for finding a way around hurdles, so assessing that potential will require a lot more work,” Marshall said.
<?xml version="1.0" encoding="UTF-8" ?> <localizationPack name="South Africa" version="1.0"> <currencies> <currency name="South African rand" iso_code="ZAR" iso_code_num="710" sign="R" blank="1" format="1" decimals="1" /> </currencies> <languages> <language iso_code="en" /> </languages> <taxes> <tax id="1" name="TVA ZA 15%" rate="15" /> <tax id="2" name="TVA ZA 0%" rate="0" /> <taxRulesGroup name="ZA Standard Rate (15%)"> <taxRule iso_code_country="za" id_tax="1" /> </taxRulesGroup> <taxRulesGroup name="ZA Zero Rate (0%)"> <taxRule iso_code_country="za" id_tax="2" /> </taxRulesGroup> </taxes> <units> <unit type="weight" value="kg"/> <unit type="volume" value="L"/> <unit type="short_distance" value="cm"/> <unit type="base_distance" value="m"/> <unit type="long_distance" value="km"/> </units> </localizationPack>
Ben Affleck. Super-chatty! Articulate! Handsome! Warren Beatty for the new millennium. And maybe, eventually, a Ronald Reagan for the Democrats? During a round-table interview in September, he sure looked the part, wearing a luxe jacket, subtle plaid shirt and jeans. There was eye contact! There was clarity! His answers were full. He talked with his hands. From his first words, “so what can I tell you?” to his last, “football camp,” he was nothing but winning. Movies Multimedia It was a pleasure to witness, because Affleck, 40, has done some fumbling. He arrived onscreen, baby-faced, in indies (Dazed and Confused) and almost immediately won an Oscar for his first screenplay, Good Will Hunting. He rose to big-studio heights in rom-coms and action flicks (Armageddon, Pearl Harbor). Then in 2003, it all went pear-shaped. He lolled on a yacht stroking the (pear-shaped) backside of his then-fiancé Jennifer Lopez in one of her music videos. His film titles became punchlines ( Daredevil,Gigli, Jersey Girl). There were honking pink diamonds. There were lap dancers. But Affleck stayed in the game. He married the sweet Jennifer Garner in 2005, transforming himself into a happy family man with two daughters and a baby son. “You know how as a kid you picture yourself with a tall, handsome husband, and you imagine him cuddling your baby?” Garner told me in 2006. “Ben is that, like, on crack.” In 2007, his directorial debut, Gone, Baby, Gone, hit screens, so good it was almost spooky, and his sophomore effort, the heist picture The Town, cemented it: Ben Affleck is a director. “On the immigration forms, on the occupation line, forever I wrote Actor,” he admits. “But I was noticing recently that I wrote Director. So yeah, I call myself a filmmaker, an actor, a writer, a producer, because to me they’re all part of the same soup. That’s the soup I want to be swimming in.” His third film, Argo, opened Friday, and it stirs all of Affleck’s strengths into one snappy, whip-smart brew. It’s the true, recently declassified story of how Hollywood, the CIA and Ken Taylor, then the Canadian ambassador to Iran, conspired to sneak six U.S. hostages out of Tehran in 1979 disguised as a film crew. Affleck plays Tony Mendez, the real-life CIA exfiltration expert who concocted the scheme. As Garner might put it, it’s everything that adult audiences and Oscar voters love, like, on crack. What other former Middle East studies major (at the University of Vermont), activist and movie spy could have met with CIA head General David Petraeus and secured permission to shoot at the real CIA (the first film in 25 years to do so), or convinced Turkish officials to let him screw 4,000 period light bulbs into the fixtures at Istanbul’s revered Hagia Sofia (a former Orthodox basilica, now a museum)? “It was the last day of shooting, it was 2 in the morning, I was sick with the flu, and they originally wanted all the bulbs changed back,” Affleck remembers. “Then they saw them and said [deep Turkish accent], ‘No, you can leave them, they look good.’” (Who else could pull off a deep Turkish accent?) Who else could have composed a shot that starts on a drink being carried across a room where actors are doing a read-through of a terrible Star Wars rip-off, and ends up on a TV screen showing a firing squad? “I think it’s the one time the whole movie’s bound up together and flows into itself,” Affleck says. And who else could treat the Hollywood portion of Argo with the ideal combination of affection, cynicism and deadpan humour? His perspective is hard-earned. “I don’t read most of the stuff about me or my wife because it becomes a snake eating its tail,” Affleck says. “We try to have as much normalcy at home as we can.” He avoids the paparazzi, especially those who target his children, which he calls “pernicious and vile.” But the bulk of his success is “wonderful gravy,” he says. “I get to make movies about the things I’m interested in. I’ve been working my whole career to get here, and it’s a great place to be. I recognize that Hollywood is not about seniority. Often it’s not even a meritocracy. It’s about what you did yesterday. You have a couple of misses, and suddenly it’s impossible to find a hit. So the swings are gigantic. But I’ve always understood it as such, and navigated it as such.” Having rebranded himself as a director is “really, really satisfying,” Affleck acknowledges, grinning. “I probably did not feel like a director on Gone Baby Gone. I felt like a rat, on a cliff, scrambling with his claws to not fall off. I was a little less scrambly on the second one, and I learned a lot on this. I don’t mean to suggest that I’m some great talent, but I have worked really hard, and I’m proud of that.” “Ben’s astonishing,” says Victor Garber, who plays Taylor, in a separate interview. “He was so calm, so much fun – under an enormous amount of pressure. He’s meticulous; he knows what he wants. Obviously, I’m close to his wife [they co-starred in the hit series Alias] and their children, but this was the first time I really collaborated with him. It was a joy.” As for his own performance, Affleck asks his script supervisor, Sheila Waldron, to keep an eye on him. “But sometimes she hurts my feelings,” he joshes. “She’ll whisper, ‘That one seemed kind of fake.’” He feigns anger: “‘What do you mean it seemed fake, you seem fake! Get out of here!’ So I’m not quite secure enough to take notes from her.” Instead, he shoots multiple takes with a lot of variance in them, and makes choices “in the cool dark of the editing room, when I have some perspective.” He mentions the film Jiro Dreams of Sushi, which to him is about “the value of work, and of always learning something new, and what it takes to achieve excellence.” He found it inspiring. “I really believe in those things – that you have to dedicate yourself and spend time, that excellence is elusive. It’s a little maddening, to try to have that level of discipline in your life, and I don’t succeed all the time. But I do try.” See what I mean about his potential as a politician? He believes! Perhaps his strongest belief is that “you have to be kind to people,” Affleck says. “Treat them decently. There’s no excuse for not.” Which is why, when Affleck learned that Taylor felt slighted by a card at the end of Argo that minimized his contribution to the hostages’ escape, Affleck phoned him, flew him and his wife to Los Angeles, screened the film for them on the Warner Bros. lot, lunched with them, listened to them and rewrote it. Now Affleck and Taylor, 77, are pals: Taylor taped a commentary for the eventual DVD release, and Affleck toasted him on Wednesday night at a gala reception at the Canadian embassy before the film’s Washington, D.C., premiere, attended by Garner, Petraeus and a few of the real hostages. That attitude is why Affleck deserves to have ridden all those swings and landed on top. “To me,” he sums up, “it’s treat people with respect” – he laughs – “or fuck off.”
# # Copyright (C) 2016 The Android Open Source Project # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # LOCAL_PATH:= $(call my-dir) ifeq ($(HOST_OS),linux) # Build the legacy-performance-test-hostdex library # ================================================= # This contains the android.test.PerformanceTestCase class only include $(CLEAR_VARS) LOCAL_SRC_FILES := src/android/test/PerformanceTestCase.java LOCAL_MODULE := legacy-performance-test-hostdex include $(BUILD_HOST_DALVIK_STATIC_JAVA_LIBRARY) endif # HOST_OS == linux
Q: RewriteRule: problems with dash I'm using the following rule: RewriteEngine On RewriteRule ^colection/(\w+)/?$ collection.php?title=$1 Works great for me. But I would like to use a dash instead underscore between words. And thus, the site can not find the page (error 404). A: Well you're getting 404 because \w in your regex matches only alphanumerics and underscore so it won't match hyphen. Replace your RewriteRule with this: RewriteRule ^colection/([^/]+)/?$ collection.php?title=$1 [L,QSA,NC]
Pub challenges $6.7M award in Mass. student’s death BOSTON — What seemed like a casual get-together with friends turned out to be Jacob Freeman’s last. The Northeastern University student went to a popular restaurant and pub near campus with a few friends in the early morning hours of April 1, 2007. Shortly afterward, the 21-year-old was found at the bottom of the basement stairs with a severe head injury. He died two days later. In a wrongful-death lawsuit filed by his family, a jury found Our House East and its owners were not liable for Freeman’s death, but a judge later ordered the owners to pay $6.7 million in damages, plus costs and attorneys’ fees. Judge Elizabeth Fahey said the pub violated the state’s consumer protection law by not getting a required permit for the stairs and ignoring building code violations. The bar owners’ failure to comply with the state building code amounted to “unfair or deceptive acts,” the judge said. Massachusetts’ highest court plans to hear the bar owners’ appeal of her decision. The state Supreme Judicial Court has scheduled Jan. 7 for oral arguments. The bar owners say the judge was wrong to award damages after the jury considered the same evidence and found that the bar owners were not responsible for Freeman’s death. “What we are disputing is that the judge can ignore a jury and really kind of relegate their findings to second-class status,” said Michael Aylward, the appellate lawyer for Gainsboro Restaurant Inc., the owners and operators of Our House East. “It seems to the defendants that you have a constitutional right to a trial by a jury, and that should mean something. In this case, it means absolutely nothing. … The judge ignored the jury’s findings and awarded the exact same damages that they had been seeking from the jury.” But lawyers for Freeman’s family say the judge made a reasoned and thoughtful ruling after hearing testimony from employees that the stairs were a safety hazard. The judge and jury heard testimony during the trial that the stairs were built in the 1980s and led from the kitchen to a basement, where beer kegs and other supplies were kept. Instead of a door at the top of the stairs, there were colored vinyl strips. In this way, employees could carry supplies from the basement without needing to use their hands to open a door. Jeffrey Newman, a lawyer for Freeman’s family, said the restaurant owners never received a permit to build the stairs or later re-build them and ignored warnings from employees who told managers the stairs were dangerous. The judge said the vinyl strips actually obscured Freeman’s view of the stairs and the stairs had poor lighting, no landing at the top, and only one railing when two were required. “Any reasonable person observing these stairs in 2007 and before would conclude this staircase is an accident waiting to happen and is not Code compliant,” Fahey wrote in her ruling. During the trial, Freeman’s friends said he walked to the back of the restaurant after he received a call on his cellphone. He was found at the bottom of the stairs by a restaurant employee. Citing testimony, Newman said it was well-known to bar managers and patrons that customers regularly walked into an area close to the stairs as a quieter place to talk on their cellphones. But the bar owners said the stairs were off-limits to customers. They also said Freeman’s heavy alcohol consumption that night contributed to his fall. Freeman drank at a party and another bar before arriving at Our House East. He had a blood-alcohol level of 0.208, more than twice the legal limit for drivers in Massachusetts. The judge found that while Freeman was under the influence of alcohol at the time of his fall, he was an experienced drinker who had built up a “serious tolerance” to alcohol and did not exhibit the usual deficiencies caused by drinking, including impaired walking. “I accept that, until he began to fall, he had no knowledge of the presence of the staircase directly behind the vinyl strips,” Fahey wrote. Aylward said the judge should not have awarded damages under the consumer protection law because Freeman’s death occurred in a private part of the business. “The stairway was in a private part of the restaurant. It’s in the very back of the kitchen. It’s not meant for customers to use,” Aylward said. “He wasn’t there to use the stairs. He was there to stand at the bar and visit friends. The condition of the stairs had nothing to do with the consumer relationship between Mr. Freeman and Our House East restaurant.” During the trial, the bar owners presented evidence that the stairs had never been cited by any building inspector as a code violation, despite having been built more than two decades before Freeman’s fall. “My clients had no reason to believe that they had done anything wrong,” Aylward said. Here at MaineToday Media we value our readers and are committed to growing our community by encouraging you to add to the discussion. To ensure conscientious dialogue we have implemented a strict no-bullying policy. To participate, you must follow our Terms of Use. Click here to flag and report a comment that violates our terms of use.
Active-specific immunotherapy of human cancers with the heat shock protein Gp96-revisited. The passive administration of specific antibodies that selectively target tumors is a well-known strategy in cancer treatment. Active immunotherapy using peptide vaccines, in contrast, is expected to induce specific, cytolytic T cells in the patient, which react against tumor antigens and destroy malignant cells. Although several concepts exist, the identification and low immunogenicity of tumor-specific peptides remain a serious problem. Heat shock proteins (HSPs), notably glycoprotein (Gp) 96, are of special interest, because they are able to take molecular peptide-fingerprints of the protein array characteristic for a particular cell. Association of Gp96 with peptides has been shown to be essential for crosspresentation and activation of T cells. Consequently, Gp96-peptide complexes extracted from cancer cells harbor the tumor-specific peptides and are immunogenic, thus offering a tool for active immunization against the tumor. Already, several immunotherapy studies of human cancers have been carried out, showing no severe adverse effects but unfortunately only limited improvement in the clinical outcome. Vitespen, a commercial HSP-peptide complex vaccine based on tumor-derived Gp96, seems to induce an improved overall survival for subsets of early stage melanoma and kidney cancer patients. The limited access to vaccine material derived from the autologous tumor requires the development of alternative protocols. Moreover, counteracting immunosuppressive mechanisms induced by the malignancy might further improve the efficacy of vaccinations. This review critically analyzes the current state of clinical immunotherapy with Gp96, with special attention to Vitespen.
1. Field of the Invention The invention relates to a hydraulic tool and, more specifically, a hand-held, portable, battery-powered hydraulic tool. 2. Brief Description of Prior Developments International PCT patent publication No. WO 03/084719 A2 discloses a hydraulic pressing device which is powered by a battery. Hydraulic power tools are employed in numerous applications to provide a user with a desired mechanical advantage. One example application is in crimping tools used for making crimping connections, such as crimping power connectors onto conductors. Another example application is in cutting tools where hydraulic power enables a user to apply a relatively large amount of force or pressure. In enabling such operations, it is generally desirable to provide a tool that can perform the desired operations, and is manageable as well. With regards to hydraulic power tools, this can often be difficult as conventional hydraulic tools are generally heavy and cumbersome to handle, at least partially owing to the high loads such tools are often subjected to during operation. Notwithstanding this cumbersome aspect of a conventional hydraulic tool, it is desirable that the hydraulic tool be portable and hand-held. Many operators prefer a battery-powered hydraulic tool since it forgoes manual pumping by the operator to actuate the hydraulics and, hence, involves less physical effort on the part of the operator to operate the tool. Hydraulic power tools largely come in different configurations including, for example, a pistol configuration and an in-line configuration. U.S. Pat. No. 5,727,417 discloses a portable, in-line, battery-powered crimper. The longitudinal axis of the crimper's battery is in line with the tool longitudinal axis. The tool comprises one, long section wherein the tool longitudinal axis is aligned with the longitudinal axis of the crimper's working head. EP0860245 also discloses an in-line pressing tool with coupled jaws that are spring biased in a closed position.
The mammalian kidney is used as a model to study the genetic basis of development and oncogenesis in a complex multicellular tissue. Current studies continue to focus on the role of transcription factors in early kidney development and their regulation by potential tumor suppressor genes. The objectives are to understand how developmental regulatory genes can contribute to oncogenic transformation. A. Development. The Pax-2 gene is activated early after kidney induction, in mesenchymal cells destined to become the renal epithelium. Using in vitro embryonic kidney cultures and antisense oligonucleotides against the Pax-2 gene, we have shown a clear requirement for this transcription factor in the transition of the kidney mesenchyme to epithelium. Furthermore, the requirement for Pax-2 is transient, as the terminally differentiating proximal and distal epithelial cells suppress Pax-2 expression. Persistent expression of Pax-2 in transgenic mice results in severe kidney abnormalities similar to human congenital nephrotic syndrome. B. Oncogenesis. The suppression of Pax-2 during kidney development is mediated, in part, by the Wilms' tumor suppressor gene, WT1. There is a direct correlation between decreasing levels of Pax-2 protein and increasing levels of WT1 in the developing nephron. Furthermore, WT1 binds at least three sites in the Pax-2 5' regulatory sequences and can repress transcription in vitro. Pax-2 is expressed in Wilms' tumor, an embryonic tumor derived from mesenchymal blastema or undifferentiated epithelium. Pax-2 expression can also be detected in renal cell carcinoma from adult patients. This may be due to reactivation of Pax- 2, or hyperproliferation of a renal stem cell population that has never repressed the Pax-2 gene. in any event, cell lines derived from renal cell carcinomas can be growth inhibited with Pax-2 antisense oligonucleotides, suggesting that activation of Pax-2 is a necessary determinant for oncogenesis. C. Biochemistry. In order to understand the function of the Pax family of transcription factors, identifying the potential target genes is mandatory. using Pax-2 specific antibodies, DNA-protein complexes were precipitated from intact chromatin and the DNA binding sequences cloned. DNA footprinting and methylation protection experiments clearly demonstrate Pax-2 binding to these genomic loci. These genomic tags can be used to identify larger genomic clones that may contain potential target genes.
Turmoil between the Oregon governor and the state’s legislature has officially reached shocking new heights. In order to prevent the passage of a far-left climate change bill, Republicans have said that they are “prepared to take actions” if Democratic Gov. Kate Brown gets law enforcement involved, who will supposedly force, — via arresting — conservative members to the state legislature to vote. Republican Sen. Brian Boquist implied in a shocking video captured by Pat Dooris from KGW8 news that he’s willing to take drastic action should state troopers come to arrest him. “This is what I told the superintendent,” Boquist said, referring to OSP Superintendent Travis Hampton. “Send bachelors and come heavily armed. I’m not going to be a political prisoner in the state of Oregon. It’s just that simple.” Oregon state senator @BrianBoquistGOP said if R’s walk out to stop a vote on Cap and Trade and @OregonGovBrown sends state police to bring him back, they should be single and well armed. Your take? pic.twitter.com/Fcu8NXXl8h — Pat Dooris (@PatDooris) June 19, 2019 TRENDING: Tim Tebow Teams with Trump Administration To Fight Human Trafficking Some reporters apparently didn’t believe Boquist’s implied threat, as they claimed in their news coverage that the threat was “thinly veiled.” However, the fiery senator stuck by his guns in an emailed statement to The Oregonian. “Nothing thinly veiled,” Boquist, a U.S. Army veteran, wrote. “I have been in political coup attempts. I have been held hostage overseas. I have been jailed politically overseas … Not going to be arrested as a political prisoner in Oregon period.” Boquist said that state troopers can only enforce criminal violations and arrest warrants, not force absent lawmakers to vote on an issue. Should these Oregon Republicans be forced to vote on the climate change bill? Yes No Completing this poll entitles you to The Western Journal news updates free of charge. You may opt out at anytime. You also agree to our Privacy Policy and Terms of Use You're logged in to Facebook. Click here to log out. 2% (76 Votes) 98% (4541 Votes) Boquist’s interview garnered many responses from both the right and left across the nation. One individual tweeted, “It’s pretty bad that Brown wants to use police, who have much more important things to attend to (like solving crimes and arresting criminals) than to drag people back to Senate.” I mean… I think it’s pretty bad that Brown wants to use police, who have much more important things to attend to (like solving crimes and arresting criminals) than to drag people back to Senate. You cant use police to force them to vote the way you want them to. — Breanne (@brever12) June 20, 2019 However, the left is enjoying seeing Republicans on the run — quite literally. “Lock ‘n load. Also note to the State Police: make sure excitable Brian’s face doesn’t hit any door jambs or anything on the way to the car. 😜 Wouldn’t want him to have an accident,” one person tweeted sarcastically. Lock ‘n load. Also note to the State Police: make sure excitable Brian’s face doesn’t hit any door jambs or anything on the way to the car.😜 Wouldn’t want him to have an accident — Raoul Duke (@EricCu11en) June 20, 2019 RELATED: Mainstream News Outlet Trots Out 'Mostly Peaceful' Line Again, Suggests Police Responsible for Louisville Violence The legislation in question is a greenhouse gas emissions cap-and-invest bill. Republicans have insisted that they do not want the legislature to vote on such a bill, but rather have the people of Oregon decide in the voting booth whether they want the climate change law or not. If the bill were to be approved, it’d be the second of its kind in the nation. And Gov. Brown will do anything in her power to ensure this legislation’s passage, threatening to use “all resources and tools” to bring the 11 rogue Republicans back to vote. “We ask for, and take on responsibility, as elected representatives of the people of Oregon to show up and speak up on their behalf,” Brown said in a statement. “I am prepared to use all resources and tools available to me as governor to ensure that Oregonians are being served by their leaders.” State Senate Republican Minority Leader Herman Baertschiger Jr. refuted the governor and backed the walkout. “My caucus and I have been threatened by the governor, Senate president and majority leader with fines and arrests because they do not agree with our stance to protect rural Oregonians from cap and trade,” Baertschiger Jr. said. “Walking out is part of the conversation because the Governor is not willing to move on her position on the bill, and she is only representing Portland and the environmental community, not rural Oregonians.” At this point, the Oregon government seems to be in a Mexican-type standoff. Unfortunately, there’s no telling who will fire first (not literally) or what the next play will be. Here’s hoping cooler heads prevail on both sides. It sounds like the Oregon’s governor and legislature could stand to read a few chapters of President Donald Trump’s “Art of the Deal.“ We are committed to truth and accuracy in all of our journalism. Read our editorial standards.
A developmentally regulated, neuron-specific splice variant of the variable subunit Bbeta targets protein phosphatase 2A to mitochondria and modulates apoptosis. Heterotrimeric protein phosphatase 2A (PP2A) is a major Ser/Thr phosphatase composed of catalytic, structural, and regulatory subunits. Here, we characterize Bbeta2, a novel splice variant of the neuronal Bbeta regulatory subunit with a unique N-terminal tail. Bbeta2 is expressed predominantly in forebrain areas, and PP2A holoenzymes containing Bbeta2 are about 10-fold less abundant than those containing the Bbeta1 (previously Bbeta) isoform. Bbeta2 mRNA is dramatically induced postnatally and in response to neuronal differentiation of a hippocampal progenitor cell line. The divergent N terminus of Bbeta2 does not affect phosphatase activity but encodes a subcellular targeting signal. Bbeta2, but not Bbeta1 or an N-terminal truncation mutant, colocalizes with mitochondria in neuronal PC12 cells. Moreover, the Bbeta2 N-terminal tail is sufficient to target green fluorescent protein to this organelle. Inducible or transient expression of Bbeta2, but neither Bbeta1, Bgamma, nor a Bbeta2 mutant defective in holoenzyme formation, accelerates apoptosis in response to growth factor deprivation. Thus, alternative splicing of a mitochondrial localization signal generates a PP2A holoenzyme involved in neuronal survival signaling.
Correction {#Sec1} ========== Following the publication of this article \[[@CR1]\], the authors reported that they had submitted an incorrect version of Figs. [2](#Fig1){ref-type="fig"}, [3](#Fig2){ref-type="fig"} and [4](#Fig3){ref-type="fig"}. They apologize for this error and the correct versions of Figs. [2](#Fig1){ref-type="fig"}, [3](#Fig2){ref-type="fig"} and [4](#Fig3){ref-type="fig"} with captions have been included in this Correction. There is a typographical error in the following sentence: Two retrospective cohort studies reported results on any and all complications \[23, 30\]. The correct version of this sentence is: Two retrospective cohort studies reported results on any complication \[24, 34\].Fig. 2Forest plot of pulmonary complications. **a** Pulmonary complications. **b** Acute respiratory distress syndrome. **c** Fat embolism. **d** pulmonary embolism. **e** PneumoniaFig. 3Forest plots of cutaneous, infectious and venous complications: **a** decubitus ulcers. **b** wound infection. **c** sepsis. **d** deep vein thrombosisFig. 4Forest plots of other complications: **a**. Any complication. **b** multiorgan failure **c.** mortality The original article can be found online at 10.1186/s13018-018-0856-4
Q: How to call a jquery method after dynamic divs(panel) are created using asp.net My asp.net page loads with one text box and one button and no hidden element at this point. On button click it does processing and creates number of divs (Panel) based on result. Divs will have result in them as Pass, Fail, Neutral, etc. This happens by asp.net asynchronous web service call without any page refresh Now after the divs are created I want to analyze the content of these divs using jQuery and add particular attributes to those divs. eg Div Background color as Green for Pass, Amber for Neutral etc. Would do more processing as required in future. I can do this in asp.net only, but i want to keep the div highlighting thing separate from asp.net code and jquery will be more suitable for that. (Question) Any suggestion how to trigger the jquery method after those divs are created on the webpage. Edit 1: I am trying this, but not working. $(document).on("create", '[id*="GridComp"]', function () { alert("Created 1"); // change background color of divs or any other thing }); A: If those divs Id attribute contains "GridComp". Then you can use setInterval method and keep checking the existence of divs. If found then style those divs as per the contained text and clear interval. var intervalId; $(function(){ intervalId = setInterval(styleDynamicDivs, 500); }); function styleDynamicDivs(){ if($('div[id*="GridComp"]').length > 0){ clearInterval(intervalId); $('div[id*="GridComp"]').each(function(){ var result = $.trim($(this).text().toLowerCase()); if(result == "pass"){ $(this).css('background-color', 'Green'); } else { $(this).css('background-color', 'red'); } }); } }​
1. Field of the Invention The present invention relates to an optical fiber draw tower, and more particularly, to a cooler of an optical fiber draw tower. 2. Description of the Related Art In general, optical fibers are obtained by drawing a preform for optical fibers using an optical fiber draw tower. A general optical fiber draw tower includes a melting furnace for melting a preform at a high temperature to draw out uncoated optical fiber, a diameter measuring unit installed below the melting furnace for continuously measuring the outer diameter of the uncoated optical fiber to uniformly control the outer diameter of the uncoated optical fiber, a cooling unit below the diameter measuring unit, for cooling down the temperature of the uncoated optical fiber to room temperature, a coating unit below the cooling unit, for coating the surface of the uncoated optical fiber with UV-curable resin such as acryl resin or silicon resin so as to protect the uncoated optical fiber from the elements of nature, a curing unit below the coating unit, for curing the coated optical fiber, a capstan below the curing unit, for drawing out an optical fiber from the preform in a lower direction, and a spool next to the capstan, for winding the drawn optical fiber. A method for preparing (drawing) an optical fiber coated with the UV-curable resin will be described. The preform is slowly provided into the melting furnace according to the position control mechanism of a preform position controller (not shown). Here, the preform is heated in the melting furnace to several thousands of degrees centigrade, typically, to 2,100.about.2,200.degree. C. As a result, the uncoated optical fiber is drawn from the preform. Here, the drawing force originates from the capstan and is applied to the uncoated optical fiber. Then, the diameter measuring unit measures the outer diameter of the uncoated optical fiber drawn to determine whether the diameter is equal to a predetermined diameter, e.g., 125 pm, and sends the measured diameter values to a diameter controller (not shown). The diameter controller controls the rotating speed of the capstan such that the diameter of the uncoated optical fiber is maintained at 125 pm. Then, the capstan rotates to control the drawing force on the uncoated optical fiber in response to the control of the diameter controller, thereby drawing out the uncoated optical fiber in a downward direction. Then, in order to protect the uncoated optical fiber cooled at high speed by the cooling unit, the coating unit coats the surface of the descending uncoated optical fiber with a UV-curable resin, e.g., acryl resin or silicon resin. Then, the optical fiber coated with the UV-curable resin is cured by the curing unit, and is then wound around the spool under the control of drawing force of the capstan. Also, if the preform is large, the height of the optical fiber draw tower must be increased. This is because very rapid drawing is necessary as the preform becomes large. After the preform is melted passing through a melting furnace and then drawn out, the drawn optical fiber is subjected to coating. Here, prior to coating of the optical fiber, the temperature of the uncoated optical fiber it must be lowered to a predetermined temperature. In general, the temperature of the uncoated optical fiber drawn right from the melting furnace is 2,000.degree. C. or more, However, in order to guarantee stable coating on the drawn optical fiber, the temperature of the uncoated optical fiber must be cooled to at least 40.degree. C. or less (usually to room temperature). For this purpose, the temperature of the uncoated optical fiber is cooled rapidly using a cooler. However, coolers in use are not sufficient to cool the uncoated optical fiber to keep pace with the rapid drawing speed. In the cooler having a pipe shape, the drawn optical fiber is cooled by filling the pipe with helium (He). Thus, it is necessary to increase the height of the optical fiber draw tower in order to quickly cool the uncoated optical fiber in response to the rapid drawing speed of the optical fiber, However, making the optical fiber draw tower high increases the manufacturing cost and it is not efficient. What is needed is an efficient cooler not requiring a high optical fiber draw tower.
1. Field of the Invention The present invention relates generally to a scanning system driving device used in an image forming apparatus, having a scanning system for illuminating and scanning a document, such as a copying machine or an image scanner, and more particularly, to an improvement in transmission control of a driving force of the scanning system driving device. As a scanning system provided for a copying machine or the like, there are two types of scanning systems: a scanning system in which an optical system is moved relative to a still document, and a scanning system in which a document platen is moved relative to a still optical system. In this specification, the term "scanning system" is used as a general term for the above described two types of scanning systems. Consequently, a scanning system driving device includes both a device for moving and controlling an optical system and a device for moving and controlling a document platen. 2. Description of the Prior Art An image forming apparatus such as a copying machine includes a scanning system for optically scanning a document by driving an optical system or a document platen. For example, in a copying machine comprising a scanning system in which an optical system is driven, a moving body holding a light source and a reflecting mirror is displaced at uniform speed relative to a document. Consequently, the surface of the document is illuminated and scanned. In the process, a photoreceptor is exposed by light reflected from the document, and an electrostatic latent image is formed on the surface of the photoreceptor. This electrostatic latent image is developed into a toner image, and the toner image is transferred and fixed to copy paper, to achieve copying. In such an image forming apparatus such as a copying machine, there are strong demands toward improvements in the image quality, along with miniaturization and higher speed. Therefore, improvements have been made for shortening the rise time elapsed before the scanning speed of the document by the scanning system reaches a predetermined speed, as well as preventing the nonuniformity of speed from occurring during the scanning of the document. The electrostatic latent image formed on the surface of the photoreceptor is formed by the light reflected from the document illuminated and scanned. In order to increase the copying speed, therefore, it is essential that the scanning system be moved at high speed. Furthermore, in order to accurately reproduce a document image, it is necessary to keep the scanning speed constant. On the other hand, if the copying machine is miniaturized, the moving distance of the scanning system from the home position to the position where illumination and scanning are started is short. Therefore, it is necessary to rapidly increase the moving speed of the scanning system. If the moving speed of the scanning system is thus rapidly increased so-called overshoot is produced. That is, the speed of the scanning system once exceeds the rated speed immediately before the speed of the scanning system reaches the rated speed. This overshoot degrades the copy image corresponding to the region in the vicinity of the position where illumination and scanning are started. Consequently, care must be taken to exclude the effect of the overshoot. A prior art technique in which the moving speed of a scanning system is rapidly increased and a copy image is not affected by overshoot is shown in FIG. 11. A driving force on the scanning system is supplied from a main motor, provided in the copying machine, through an electromagnetic clutch. FIG. 11(a) shows the change with time of the voltage applied to the electromagnetic clutch, and FIG. 11(b) shows the change with time of the moving speed of the scanning system. In this prior art technique, in order to rapidly increase the moving speed of the scanning system, the voltage applied to the electromagnetic clutch is instantaneously increased to a predetermined rated voltage at the time of starting the scanning system, as shown in FIG. 11(a). This predetermined rated voltage is a voltage applied to the electromagnetic clutch when the scanning system is driven at rated speed so as to illuminate and scan a document. In FIG. 11, an idle period is a period elapsed from the time when the rotation of the main motor is started until the electromagnetic clutch is connected, an approach period is a period elapsed from the time when the scanning system is in the home position until it reaches the position where illumination and scanning are started, and an image forming period is a period during which the document is illuminateded and scanned. In this prior art technique the electromagnetic clutch is instantaneously connected, so that the driving force from the main motor is impulsively transmitted to the scanning system. Immediately after the scanning system rises, therefore, the moving speed of the scanning system fluctuates, as shown in FIG. 11(b). If the moving speed vibrates, excellent image formation is not carried out. Consequently, a period during which the moving speed vibrates is taken as an approach period, and a period after the moving speed is stabilized is taken as an image forming period. In this prior art technique, however, it is necessary to ensure a sufficient approach period to stabilize the moving speed of the scanning system. Therefore, the distance from the home position to the position where illumination and scanning are started of the scanning system, that is, an approach distance, is increased. Therefore, there occurs a problem that the copying machine is prevented from being miniaturized. This problem is solved by another prior art technique shown in FIG. 12. In this prior art technique a applied to an electromagnetic clutch is gradually increased, as shown in FIG. 12(a), Therefore, a driving force from a main motor is gently transmitted to a scanning system. As a result, the moving speed of the scanning system is smoothly increased and stabilized at rated speed in a short time, as shown in FIG. 12(b). Consequently, no long approach distance is required, thereby making it possible to miniaturize the copying machine, unlike the prior art technique shown in FIG. 11. In this prior art technique however, a dedicated electric circuit of complicated construction is required to gradually increase the voltage applied to the electromagnetic clutch. Therefore, there occurs a new problem in that the cost is increased. Still another prior art technique by which this problem is solved is disclosed in Japanese Patent Laid-Open Gazette No. 148138/1986. This gazette discloses the technique for applying a pulse voltage to an electromagnetic clutch in the early stages of scanning and repeatedly connecting and/or disconnecting the clutch to achieve a substantially half clutched state. In this prior art technique, however, the pulse period, the pulse content and the like of the pulse voltage are not sufficiently considered. That is, the natural vibration of an optical system is promoted by repeatedly connecting and/or disconnecting the clutch, so that the image quality is liable to be degraded.
Shalivahana Shalivahana (IAST: Śālivāhana) was a legendary emperor of ancient India, who is said to have ruled from Pratishthana (present-day Paithan, Maharashtra). He is believed to be based on a Satavahana king (or kings). There are several contradictory legends about him. Most legends associate him with another legendary emperor, Vikramaditya of Ujjain, in some way. In some legends, he is presented as an enemy of Vikramaditya; in other legends, he is named as a grandson of Vikramaditya; and in a few legends, the title Vikramaditya is applied to the ruler of Pratishthana. According to some historically inaccurate legends, his birth or one of his battle victories marked the beginning of the Shalivahana calendar era, which is another name for the Saka era. Legends Viracharita Ananta's heroic poem Viracharita (12th century CE) mentions Shalivahana as a rival of the king Vikramaditya of Ujjain. According to it, Shalivahana defeated and killed Vikramaditya, and then ruled from Pratishthana. Shudraka was a close associate of Shalivahana and his son Shakti Kumara. Later, Shudraka allied with Vikramaditya's successors and defeated Shakti Kumara. This legend is full of mythological stories. Bhavishya Purana Paramara-era legends associate the Paramara rulers with legendary kings, in order to enhance the Paramara imperial claims. In the Bhavishya Purana, the Paramara king Bhoja is described as a descendant of Shalivahana, who is named as a grandson of Vikramaditya. According to the text (3.1.6.45-7.4), the first Paramara king was Pramara, born from a fire pit at Mount Abu (thus belonging to the Agnivansha). Vikramaditya, Shalivahana and Bhoja are described as the descendants of Pramara, and thus, members of the Paramara dynasty. Bhavishya Purana mentions that Vikramaditya ruled Bharatavarsha (India) bounded by Indus river in the west, Badaristhana (Badrinath) in the north, Kapila in the east and Setubandha (Rameshwaram) in the south. A hundred years after his death, many languages and many religions had developed in the 18 kingdoms of the Aryadesha (country of the Aryas). When the outsiders such as the Śakas heard about the destruction of dharma (righteousness, law and order) in Aryadesha, they raided the country by crossing the Indus and the Himalayas. They plundered Aryas and returned to their countries with the wives of the Aryas. Shalivahana, the grandson of Vikramaditya, then subjugated the Śakas and other barbarians. He defined the maryada to distinguish the Aryans from the mlecchas, and established Indus as the border between the Aryan lands and the land of the mlecchas. Subsequently, Shalivahana once came to a snowy mountain in the land of the Hunas. There, he met Isamasi (Jesus Christ), who had appeared because the truth had been destroyed in the land of the mlecchas. Shalivahana bowed to him and then returned home. In Aryadesha, he performed an ashvamedha sacrifice, and then ascended to the heaven. 500 years after Shalivahana, his descendant Bhoja also fought against foreign invaders including "Mahamada", a character modeled on Muhammad and possibly Mahamud Ghazanvi. The text presents the doctrine of Jesus as consistent with the Vedic dharma, while Muhammad is presented as demonic. According to Theodor Aufrecht, the passages about Jesus were inserted by an employee of the Venkatesvara Press, which published its first printed edition of the text in 1897. According to Giorgio Bonazzoli, this part was inserted by "some clever pandit" in the 19th century. Another book was retranslated by Vidwan in Kannada language during the time of Jayachamarajendra Wodiyar of Mysore. Chola Purva Patayam Chola Purva Patayam ("Ancient Chola Record"), a Tamil language manuscript of uncertain date, contains the following legend about Shalivahana (also known as Bhoja in this story): Shalivahana was born in Ayodhya, in a potter's house, by grace of Adi-Sheshan. When he grew up, he became a king and defeated Vikramaditya, marking the beginning of the Shalivahana calendar era. Shalivahana was an alien Nastika Shramana (possibly a Jain), and persecuted all those who refused to convert to his faith. He revoked all the privileges that the Hindus had received from Vikramaditya. The non-Shramana ascetics started retiring to wilderness, and prayed Shiva and Vishnu to stop the new king's atrocities. Shiva then appealed the Adi Parabaram (the supreme being) to be allowed to start a rain of fire in Shalivahana's kingdom. Adi-Sheshan appeared in Shalivahana's dream and warned him about the upcoming disaster. Shalivahana asked his people to build stone houses or hide in the river (Kaveri) to escape the rain of fire. When Shiva opened his third eye and started raining fire, the people survived thanks to Shalivahana's advice. Shiva then sent down a rain of mud. Those hiding in the stone houses suffocated to death, as the mud blocked the openings. Those hiding in the rivers, including Shalivahana and his army, survived. To destroy Shalivahana, Shiva now created the Three Crowned Kings: Vira Cholan, Ula Cheran, and Vajranga Pandiyan. The three kings came to bathe together at the triveni sangam (three-river confluence) in Thirumukkoodal, and formed an alliance against Shalivahana. Next, they went through a number of adventures at various places, including Kashi and Kanchi. With the blessings of Durga, they found treasure and inscriptions of Hindu kings from the age of Shantanu to Vikramaditya. They then reached Cudatturiyur (possibly Uraiyur), where Vira Cholan wrote letters to all those who worshipped Shiva and Vishnu, seeking their help against Shalivahana. A number of people assembled at Cudatturiyur to support the three kings' campaign. When Shalivahana heard of this preparation, he marched towards south and took possession of the strong citadel at Tiruchirappalli. The three kings sent their envoy to Shalivahana, asking him to surrender and renounce his faith. When he refused, they and their allies assembled an army at Thiruvanaikaval. From an inscription that they had earlier found at Kanchi, they realized that there was a subterraneous entry into the Tiruchirappalli fort. They sent a few soldiers who entered the fort and opened its Chintamani gate. Their forces then entered the fortress, and defeated Shalivahana. Chola Purva Patayam dates Shalivahana's defeat to the year 1443 of an uncertain calendar era (possibly from the beginning of Kali Yuga). Others Jain scholar Hemachandra (12th century) names Shalivahana among the four learned kings. Another Jain writer, Jina Prabhu Suri, mentions him in Kalpa Pradipa. In some of the legends that present Shalivahana and Vikramaditya as rivals, their political rivalry is extended to patronage of language, with Vikramaditya supporting Sanskrit and Shalivahana supporting Prakrit. Shalivahana era According to some historically inaccurate legends, one of Shalivahana's victories marked the beginning of the Saka era (also known as "Shalivahana era"). The earliest association of Shalivahana with the era beginning in 78 CE is found in the Kannada language work Udbhatakavya by Somaraja (1222 CE). The next earliest association is found in the Tasgaon plates (1251 CE) of the Yadava king Krishna. Some works, such as Muhurta-Martanda suggest that this era starts from Shalivahana's birth. Others, such as Kalpa-Pradipa (c. 1300 CE) of Jinaprabha Suri, suggest that the era marks Shalivahana's victory over Vikramaditya. Dineshchandra Sircar suggests that the association of the northern king Vikramaditya with Vikrama era (also historically inaccurate) might have led the southern scholars to fabricate a similar legend of their own. An attempt to forget the foreign association of the era's name might have been another factor. Historicity Many of the legends about Shalivahana feature fantasy and mythical elements, but some scholars believe that he is based on a historical figure (or figures). According to scholars such as Moriz Winternitz and K. R. Subramanian, Shalivahana is same as Satavahana, and was a generic family name or title of the Satavahana kings. According to D. C. Sircar, the legendary "Shalivahana" was based on the exploits of multiple Satavahana kings; the legendary Vikramaditya was also based on multiple kings, and the distinction between these individual kings was lost over time. D. C. Sircar believes that the historically inaccurate notion of the "Shalivahana era" was probably based on the victory of the Satavahana ruler Gautamiputra Satakarni over some Saka (Western Kshatrapa) kings. Literary works such as Prabodha Chintamani and Chaturavinshati Prabandha suggest that Shalivahana composed 400,000 gathas (single-verse poems). Gatha Saptashati, compiled by the Satvahana king Hāla, contains 700 verses in Maharashtri Prakrit. For this reason, Hāla is identified as Shalivahana. Although Jain chroniclers claim that he was a Jain, this does not appear to be correct, as the work invokes Shiva. Kathasaritsagara (based on the now-lost Brihatkatha) also contains some legends about a king named Satavahana, but this king is obviously different from Hāla. References Bibliography Category:Legendary Indian people
Q: Transforming one row into many rows using Spark I'm trying to use Spark to turn one row into many rows. My goal is something like a SQL UNPIVOT. I have a pipe delimited text file that is 360GB, compressed (gzip). It has over 1,620 columns. Here's the basic layout: primary_key|property1_name|property1_value|property800_name|property800_value 12345|is_male|1|is_college_educated|1 There are over 800 of these property name/value fields. There are roughly 280 million rows. The file is in an S3 bucket. The users want me to unpivot the data. For example: primary_key|key|value 12345|is_male|1 12345|is_college_educated|1 This is my first time using Spark. I'm struggling to figure out a good way to do this. What is a good way to do this in Spark? Thanks. A: The idea is to generate a list of lines from each input line as you have shown. This will give an RDD of lists of lines. Then use flatMap to get an RDD of individual lines: If your file is loaded in as rdd1, then the following should give you what you want: rdd1.flatMap(break_out) where the function for processing lines is defined as: def break_out(line): # split line into individual fields/values line_split=line.split("|") # get the values for the line vals=line_split[::2] # field names for the line keys=line_split[1::2] # first value is primary key primary_key=vals[0] # get list of field values, pipe delimited return(["|".join((primary_key, keys[i], vals[i+1])) for i in range(len(keys))]) You may need some additional code to deal with header lines etc, but this should work.
We here at /r/punchablefaces have been working hard to figure out how best to meet the needs of our users. We've been paying careful attention to the complaints we've been seeing, and the biggest concern we've seen over and over again is this: how can we prevent the subreddit from being a platform for bullying? And we're happy to announce that we think we've hit upon a solution. First, of course, it's important to define the problem. What exactly is bullying? Having put our heads together and discussed the question at length, we've come to the conclusion that bullying, fundamentally, is a form of oppression: a use of power to keep others down. With that in mind, we've come to the conclusion that the best, and indeed only, way to prevent bullying is by only allowing those who are completely unoppressed to be targeted; as it's impossible to bully a perfectly privileged person. To that end, we're very excited to reveal our new Punching Up policy. In a nutshell, we will be allowing photos of any real human being, provided that they are not a member of an underprivileged or disadvantaged minority group: No black, brown, tan, Asian, Latino, Native North or South American, or Pacific Islander subjects No LGBTQ subjects No physically, developmentally, or otherwise disabled subjects No women or non-binary subjects No underage or elderly subjects No socioeconomically disadvantaged subjects Thanks for bearing with us during this transition, and we hope you'll enjoy wanting to punch real people's faces as much as we will!
Q: Changing Header Theme in jquery mobile Page? I Need To Change the Default(theme a) Theme of the jquery mobile page header to (theme c) A: As mentioned in their documentation http://jquerymobile.com/test/docs/toolbars/bars-themes.html, you have to specify your theme with data-theme attribute. Ex: <div data-role="header" data-theme="b"> <h1>Page Title</h1> </div>
Purification of viruses and macromolecular assemblies for structural investigations using a novel ion exchange method. We describe a novel ion exchange chromatographic technique suitable for large-scale preparation of viruses and other biomacromolecular assemblies in highly purified form. The method, which utilizes anion exchange on either of two commercially available cellulose cartridges, is applied to the Escherichia coli bacteriophage PRD1. Viral particles eluted from both QMA and DEAE cartridges retain infectivity and exhibit greater homogeneity of composition, as judged by gel electrophoresis and electron microscopy, than particles purified by rate zonal sucrose gradient centrifugation. The ion exchange protocols are rapid, requiring less than 15 min elution time, and permit retrieval of the purified viral particles at high concentration in aqueous media without centrifugal pelleting. The present method is particularly well suited to the preparation of milligram to decigram quantities of virus, sufficient for many biophysical structural analyses, including investigations by solution spectroscopic and crystal diffraction techniques. The feasibility and advantages of the ion exchange chromatographic procedure are demonstrated by application of laser Raman spectroscopy to ion exchange purified PRD1 virions and subviral assemblies.
GDC 2013: Sony puts its money where its mouth is on the indie developer-centric future of the PS4 The Sony we’re seeing at GDC 2013 seems to be a very different company than the one that told gamers back in 2006 that they should get a second job if they wanted to have enough to buy a PlayStation 3. Rather than making bold statements about the sheer horsepower and technical magic inside the upcoming PS4, Sony is doing its best Valve imitation by painting the PlayStation Network as the premiere home for independent video game developers looking to put their games in front of console owners – and not just on the PS4, either, but on the PS3 and PS Vita as well. At the GDC Indie Arcade on Monday night, Sony introduced one new PS4 indie title: Zombie Studios’ Blacklight Retribution. It also announced a number of other titles coming to its current machines, like One True Game Studios’ two-button fighting game, Divekick. The big news wasn’t the stream of games coming from small groups rather than big publishers, but how Sony has already changed its digital publishing policies on the PlayStation Network. It turns out that during the PS4 debut in February, Sony’s boastful claims of streamlining the process of getting a game on a PlayStation machine was more than hot air. “We’ve just changed our whole concept submission process,” Adam Boyes, Sony’s head of publisher and developer relations, told Gamasutra. “It used to be two stages and all this feedback, and now it’s just one, and it’s optional feedback so there’s no greenlighting process, no voting, no weird stuff.” That’s not just for independent developers, though. Sony isn’t forcing major publishers like Capcom and Electronic Arts to go through a drawn out submission process to get their digital games online. This is why unusual titles, like the six unlocalized PSOne imports including Sentimental Graffiti published by GungHo Online Entertainment earlier in March, have been showing up on the PSN with greater frequency. Easing the submission process is only part of the way that Sony is helping indies, though. “[If] these guys are developing content for Vita, and we like the team, we send them Vita kits as loaners for free,” Boyes said. “Or waiving path fees for independent developers, if they need that support, then we’re totally behind it.” According to Boyes, it’s digital-only developers that receive this aid. Game makers publishing their games as retail discs or cartridges tend not to receive this benefit. These are precisely the sort of factors that have kept independent developers wary of consoles. Fez developer Phil Fish, for example, never released a second patch for his game on XBLA due to the exorbitant costs of issuing the patch and having the game certified again. Between these policy changes and the opportunity for developers to self-publish on PlayStation consoles, Sony is putting its money where its mouth is in terms of wooing the next generation of game developers. Will that make the PS4 and the PS Vita a success in 2014 and beyond? That depends on how good those indie games turn out to be.
If you’ve ever contemplated what censorship in media looks like, here’s an illustration. At 12:00 PM on February 8, the Capital Research Center released our latest short video entitled “The Dirty Secrets of Democratic Politics.” I narrated that brief exposé on Robert Creamer, the longtime Democratic Party operative whose attempts to smear Donald Trump supporters in 2016 using violent agitators were exposed by the investigative group Project Veritas. When Project Veritas promoted the video in a tweet that afternoon, we discovered that Youtube had removed CRC’s video for supposedly violating their community guidelines on “hate speech” (see the tweet and image below). In less than 6 hours, our video—which contains no “hate speech” or other violations of YouTube’s community guidelines of any kind, and even used footage from Project Veritas that has been up on YouTube for well over a year and has millions of views—was flagged for review and removed by a platform supposedly built on promoting free speech. It isn’t the first time YouTube has censored our work. In December 2017, the company targeted another CRC video called “Right-Wing or Left-Wing, Identity Politics is Destroying America,” narrated by CRC film and video producer Joseph Klein. (Watch it here.) Despite our nonpartisan critique of identity politics for driving Americans apart, YouTube restricted access to the video—blocking it from view in 28 foreign countries and halting American viewers from advertising, commenting, or “liking” the video. Joseph, who also produced the more recently removed video, wrote about that experience here. After we fought back and brought these outrages to light, YouTube quietly reinstated both videos. But it’s become increasingly clear: when it comes to allowing free speech, YouTube is willing to break their professed values if it advances their ideology at the cost of conservatives.
I managed to get out the past couple days to snap a few of the aftermath that Igor left in it’s wake. A lot of the damage is being cleaned up fairly quickly so not much remains now. The major damage is on Random Island and it’s probably going to be a little while before it gets open. I heard on CBC Radio today that the CO-OP in Clarenville got a load of fresh food together; bread, milk, water, snacks, vegetables, etc. and stogged a boat bound for Hickman’s Harbour. That is what’s great about Newfoundland though — without batting an eye a local business owner used his position to help out not just one person, but several entire communities. Several people now are suggesting that the military needs to be called in as the scale of the devastation is just too great for local services to clear up in a reasonable amount of time.
Fundamental Cosmology conference (Stockholm, November 2012) There's an interesting conference taking place this month at the NORDITA institute for theoretical physics in Stockholm. It brings together, from a number of different areas, researchers working on various models of what was happening around the start of expansion--replacing the "singularity" (the classical theory's failure) with some more physical model. The conference is called *Perspectives of Fundamental Cosmology* The topics of the hour talks include cosmology from the perspective of Causal Dynamical Triangulations Horava Gravity Noncommutative (i.e. Spectral) Geometry Loop and Spinfoam Geometrodynamics String I count 51 things on the schedule, mostly 1-hour talks, but including a half-dozen discussion sessions on various topics. Part of why I find the conference interesting is that it brings together prominent experts from different fields with the aim of getting them talking with each other (Loll, Ambjorn, Lizzi, Brandenberger, Mersini, Kiefer, Sakellariadou, Nelson, Burgess, Sotiriou, Mavromatos, Thiemann, Schücker, Steinhacker, Hossenfelder...) The more I consider the lineup the more I am impressed by how incredibly diverse it is. All these people are giving talks. Lewandowski is not on the list but his junior co-author Andrea Dapor is presenting their research. Here is a highly incomplete sampling of abstracts of hour talks: Claus KieferQuantum Gravity and Quantum Cosmology: A General Introduction I start by giving a general introduction to the motivation for and the problems of a theory of quantum gravity. I then briefly describe the main approaches - quantum general relativity (including loop quantum gravity) and string theory - and some of their applications. I then give a general introduction to quantum cosmology, in which I mainly deal with geometrodynamics, but make also remarks on loop quantum cosmology. Will NelsonExtending inflation to the quantum gravity era Inflation is extremely successful at explaining the features of our late-time universe, however it is well known that it is incomplete. In particular the initial singularity persists and there is a period where quantum gravity effects must become important. In this talk I will discuss these quantum-gravity issues and describe how they can be tackled within Loop Quantum Cosmology. I will describe how we can make contact between LQC and QFT in curved space-times, what the 'true' trans-Planckian issue is within this context and what this approach predicts for observations. Andrea DaporIsotropy-breaking in Quantum Cosmology We present a new perspective on QFT on quantum cosmological space-times. Naively, the semiclassical limit of a quantum space-time can be taken by averaging the gravitational operators on a semiclassical state of geometry. The result is an effective classical metric (which in general does not obey Einstein equation). We show that, once quantum matter is taken into account, a new possibility arises: the dynamics of matter on quantum space-time can be equivalently described by standard QFT on a classical space-time, whose geometry is encoded in a so-called "dressed metric", a classical metric which is different than the naive semiclassical one. Such matter-dependent dressed metric can be thought of as the metric "seen" by the matter field. We explore this interpretation and its consequences in various instances, such as scalar field on quantum cosmological space-times, addressing the question of observable effects on the propagation of matter. Indeed, since the dressed metric depends on the matter, Lorentz-violating phenomena are expected (such as deformation of dispersion relations). We prove that for massless field on FRW [1] or Bianchi I [2] quantum geometries, no violation takes place at test-field level. We present a way to take into account the matter back-reaction (in which case a deformation in the dispersion relation is present). Finally, we address the case of a massive field on FRW quantum geometry [3], and show that an isotropy-breaking is present already at the test-field level, since the dressed metric depends on the direction of propagation of the mode of the field. Francesca VidottoSpinfoam and Cosmology In the recent years the major developments in Loop Quantum Gravity have arisen in the covariant framework (spinfoam) where the dynamics is coded by transition amplitudes. These provide an evolution for "quanta of spacetime" in terms of a local product of interaction vertices, reconstructing a Lorentzian spacetime. The first part of the talk will be devoted to a general presentation of these results. The second part of the talk will show how these results find a good testing framework in cosmology and how, viceversa, spinfoam could provide a fertile framework for the description of the early-universe physics. A sample discussion section led by Claus Kiefer:Boundary Conditions in Quantum Cosmology My idea here is to give a short introduction myself (at most half an hour), followed by short presentations of participants and a general discussion. As for the topics of the short presentations, I suggest: "The no-boundary condition", "The tunnelling condition", "Boundary conditions in loop quantum cosmology", as well as other suggestions by participants.
**Citation:** Burcin MM, Armstrong SN, Early JO, Godwin H. Optimizing college health promotion in the digital age: comparing perceived well-being, and health behaviors, health education needs and preferences between college students enrolled in fully online versus campus-based programs. Health Promot Perspect. 2019;9(4):270-278. doi: [10.15171/hpp.2019.37](http://dx.doi.org/10.15171/hpp.2019.37). Background {#s1} ========== Enrollment in online university programs have increased over the last ten years,^[@R1]^ yet the health risks and needs of online learners are not well understood. A few studies have made conclusions about the online learning environment and the students' being at higher risk of sedentary lifestyles, cigarette smoking, and depression due to social isolation.^[@R2]-[@R4]^ Rohrer et al found that nearly a quarter of online student respondents were smokers and may favor the online learning environment because studying at home permits them to smoke.^[@R3]^ However, a recent exploratory study suggested that being an online student was not a risk factor for poor health.^[@R5]^ The results of these studies are inconsistent and contain many limitations, particularly the use of non-random sampling which may make the sample not representative of the online student population.^[@R3],[@R5]^ In addition, when online students are surveyed using a snowball sampling method,^[@R3]^ it is not possible to benchmark them to students nationwide. On the contrary, college students enrolled in campus-based programs health risks and needs are well understood. The American College Health Association (ACHA) is the leading organization with the goal of "improving the health of the nation's college students through social justice, student-centered services, professional excellence and responsiveness, multidisciplinary and collaborative approaches to health, active involvement of students, and evidence-informed program practices."^[@R6]^ The ACHA's National College Health Assessment II (ACHA-NCHA II) is a national research survey which assists college health service providers, health educators, counselors, and administrators in collecting data about their students' habits, behaviors, and perceptions on the most prevalent health topics. The ACHA-NCHA provides the largest known comprehensive data set on the health of college students, providing the college health and higher education fields with a vast spectrum of information on student health.^[@R7]^ The ACHA-NCHA II includes questions related to demographics, overall health status, alcohol, tobacco, weight, nutrition, exercise, mental health, and physical health. Results from the Spring 2015 NCHA indicated that anxiety, sleep difficulties, and stress were the most commonly reported health impediments to academic performance.^[@R7]^ In addition, 35% of respondents reported feeling so depressed it was difficult to function in the last 12 months, with over 50% reporting overwhelming anxiety and over 60% reporting feeling very sad in the last 12 months.^[@R7]^However, only 15% of students experiencing anxiety and 13% of those experiencing depression reported being treated or diagnosed by a professional within the last 12 months. Interestingly, 92% of respondents reported being full-time students, with a median age of 21 years, and only 14% indicated that outside work impacted their academic performance.^[@R7]^ Thus, this sample may be vastly different in terms of employment status and health challenges experienced by students enrolled in fully, online programs. With comparative assessment data of online students, *Healthy Campus* initiatives can shift to align with the needs and characteristics of this population. Purpose {#s2} ======= The purpose of this study was to explore risk factors, perceived well-being, health behaviors, and health education preferences between US college students enrolled in a fully online academic programs compared to a national sample of college students enrolled in campus-based programs. According to an annual survey of online college students in the United States by Clinefelter and Aslanian,^[@R8]^ an undergraduate online student in the United States in 2016 was most likely a woman in her 30s, in a relationship, and caring for at least one child while working full-time.^[@R8]^ Given the demographic differences between online students and their peers at brick and mortar institutions, our hypothesis was that we would see significant differences between the two groups in terms in of health habits, behaviors, and perceptions. Through qualitative (open-ended questions), we also explored students' perceived impediments to academic performance and their health education needs and preferences. Materials and Methods {#s3} ===================== Sample {#s3-1} ------ A volunteer sample of 961 college students enrolled in two large, accredited, fully online universities in the United States comprised the online student sample. At university number one, students were invited to participate through the school's Participant Pool, a virtual bulletin board that connects researchers to participants. At university number two, students were recruited through the school's "eCampus" portal, where students access their classrooms and support services. The announcement sent through communication listservs at both institutions invited students to take part in the research study and provided an explanation of the study aims. Participants were eligible to participate if they were currently enrolled in a fully online program and were 18 years of age or older. The study was hosted online in SurveyMonkey. The first page of the online survey was the consent form. It included background information, the voluntary nature of the study, risks and benefits, confidentiality, contacts and questions about rights as a participant, and the statement of consent via an electronic signature, regulated by the Uniform Electronic Transactions Act. Participants were informed that the maximum time commitment to complete the survey was 20 minutes, there was no monetary benefit, participation was optional and they could opt out at any time. The NCHA archive and database in Spring 2015 included 91 497 completed college surveys and provided data for a comparison group. The comparison group completed the NCHA in the Spring of 2015 via an online surveying tool, Qualtrics. The comparison group received the survey link via a direct email from ACHA. The data was provided with permission by the ACHA. Instrument {#s3-2} ---------- After electronically signing the consent form, participants completed a 36-item online survey comprised of subscales from the ACHA's NCHA IIb. The NCHA is the most widely recognized survey used in college health in the United States.^[@R7]^ The original NCHA was developed by an interdisciplinary team of college health professionals and was pilot tested in 1998-1999 and has since undergone test for reliability and validity^[@R9]^ comparing common survey items with national surveys such as the National College Health Risk Behavior Survey (from the Centers for Disease Control) and the College Alcohol Study by the Harvard School of Public Health. The survey consists of 294 questions regarding physical and mental health, health education, and alcohol, tobacco, and drug use, as well as questions about impediments to academic performance and risk factors. Although the NCHA is not without limitations, a number of major studies has shown evidence that the ACHA-NCHA has "empirical value for representing the nation's students."^[@R7]^ The Spring 2015 data set included a sample of over 108 US colleges and universities and a total of 93 034 participants. Permission was granted by ACHA to use select subscales of the NCHA IIb in order to create the 36-item online survey for online learners. The entire NCHA IIb was not utilized for this target population because some items, such as contraceptive use and frequency of "partying", needed to be excluded due to a high rate of "not applicable" responses among the more "non-traditional" adult population. The researchers also wanted to keep the survey short and focused on issues that would be appropriate for addressing health promotion programming and services at the university level. In order to better align with health risk factors and issues reported to be of influence to the well-being of non-traditional, online learners, the subscales included questions relating to: demographics (11 questions), health status and chronic health problems (CHP; 2 questions), alcohol and tobacco use (ATU; 2 questions), weight status, nutrition, exercise (WSNE; 7 questions), mental health (MH; 7 questions), academic impediments (AI; 1 question), and physical health (PH; 2 questions). Three additional questions were added about health education topic, modality and impact specifically "do you think your health and well-being impacts your academic standing?", "are you interested in receiving information on the following topics", and "if virtual services were offered, how would you like to receive this information?" Reliability analysis reported by the ACHA in 2013 demonstrated primarily moderate to strong scores for NCHA IIb sub scale items with reported standardized alphas as follows: 0.59 (CHP), 0.74 (ATU), 0.86 (WSNE), 0.84 (MH), 0.88 (AI), and 0.83 (PH).^[@R9]^ Statistical analyses {#s3-3} -------------------- Descriptive and inferential statistical tests were used to analyze the data. The volunteer, online student sample was first screened for outliers, incomplete surveys, and participants that did not meet the study criteria. Forty-seven responses were excluded to arrive at the final total of 961. Frequencies on survey items were calculated and mean scores of subset measures for online students were compared against the NCHA IIb Spring 2015 data set using two-tailed z-test scores and independent sample *t* tests with alpha at 0.05. Online software Medcalc.com was used to calculate the *t* tests on the means and Social Science Statistics (online) was used for all z-calculations on the proportions. Results {#s4} ======= Demographic characteristics of the samples {#s4-1} ------------------------------------------ There were notable differences of demographic characteristics between the study sample (e.g. online students) and the comparison group (NCHA group) ([Table 1](#T1){ref-type="table"}). Of the 961 fully online students who completed the survey, the mean age was 40.2 years compared to 22.6 years for the NCHA group. The difference in the means of 17.6 years was highly statistically significant (*P* value \< 0.0001). The student samples also differed in representation by racial/ethnic breakdown. More students identified as African American/Black in the online student sample (28.6%) compared to the NCHA group (5.5%) and more Hispanic/Latino students in the NCHA group than the online student sample (11.2% versus 5.2%). In the online student sample 2.6% identified as Asian/Pacific Islander compared to 13.7% in the NCHA sample and approximately 4% reported they were bi- or multi-racial in both samples. The majority of students in the online and NCHA samples identified as female, 70.2% and 66.6% respectively. In terms of their sexual identity, the majority of students in both groups identified as heterosexual (90.0% for online students and 88.5% of non-online students), with the remainder identifying as LGBTQIA (9.1% online students vs. 11.5% non-online students). More online students reported being married or partnered (53.9%) compared to students in the NCHA sample (9.3%), which is assumed to be based differences in age. The majority of online students worked 40 or more hours per week (61.8%) compared to the NCHA sample (6.5%), a highly statistically significant result (t-statistic = 92.93, *P* value \< 0.0001). In addition, 92.0% students in the NCHA sample reported they were in school full-time versus 72.7% of students in fully online programs. Health status and chronic health problems reported by online students vs. NCHA group {#s4-2} ------------------------------------------------------------------------------------ ***A*** higher percent of online students (15.7%) reported having been diagnosed with a chronic illness and/or disability (e.g. cancer, diabetes, autoimmune disorders) compared to 4.9% of the NCHA group ([Table 2](#T2){ref-type="table"}). Online college students were more likely to report a psychiatric condition (11.3%) compared to those in the NCHA sample (7.1%). The online sample also reported a higher percentage of a mobility disability (7.1%) versus the NCHA data set (0.9%). attention deficit/hyperactivity disorder (ADHD) was the highest reported health issue among the NCHA sample (7.4%) which is still lower than online student sample reporting ADHD (7.9%). More than double the percent of students in the online sample report deafness or problems with sight (10.1%) versus the NCHA sample (4.2%). The percent of students reporting a learning disability for both groups is around 4%. Test statistics for chronic illness (*z* = 14.90, *P*value \< 0.0001), deafness/hearing loss (*z* = 8.16, *P*value \< 0.0001), psychiatric condition (*z* = 4.98, *P*value \< 0.0001), and speech or language disorder (*z* = 3.79, *P*value \< 0.0001) were all statistically significant. The tests for learning disability (*z* = 0.55, *P*value = 0.58) and attention deficit disorder (*z* = 0.56, *P*value = 0.58) were not significant and we failed to reject that the null hypothesis was true. Alcohol and tobacco use {#s4-3} ----------------------- The NCHA sample had statistically significantly higher percentages of students binge drinking (e.g. consuming 5 or more drinks in one sitting) over the previous 2 weeks compared to the online college students. Although a greater percentage of online students in the sample (8.1%) reported smoking daily versus the NCHA sample (2.5%) (*z* = 10.57, *P*value \< 0.0001), cigarette use in the 30 days prior to completing the survey is higher in the NCHA sample at 8.0% compared to 4.7% of the online students ([Table 3](#T3){ref-type="table"}). Daily use of cigars, little cigars, clove cigarettes, and smokeless tobacco were similar for both groups. Weight status, nutrition and exercise {#s4-4} ------------------------------------- There were statistically significant differences between the two groups on weight status ([Table 4](#T4){ref-type="table"}). Over 66% of online students classified themselves as overweight (*z* = 8.73, *P*value \< 0.0001) to very overweight (*z* = 22.67, *P*value \< 0.0001) with 69.4% currently trying to lose weight (*z* = 10.47, *P*value \< 0.0001), compared to the NCHA sample with 36.4% classifying themselves as overweight to very overweight and 52% trying to lose weight. The percentage of online students who consumed three or more servings of fruits and vegetables per day was higher (40.2%) compared to the NCHA sample (33.1%), although more than half in both samples reported consuming two or fewer servings per day. Regarding exercise, online students had a higher percent of zero days per week of: moderate-intensity cardio (30.5%), vigorous intensity (53.5%) and strength training (56.5%). Only 15.5% reported engaging in five or more days each week. A greater percentage of online students (53.5%) reported no days of vigorous-intensity cardio per week, compared to 41.1% of the NCHA sample. Only 8.6% of online students reported engaging in five or more days each week of vigorous cardio. Additionally, 56.6% of online students reported no (0 days) of strength training per week. Finally, 61.3% of online students reported sitting more than 6 hours each day. Mental health {#s4-5} ------------- Regarding mental health, the survey inquired about students' feelings in the previous two weeks. The NCHA sample had statistically significant higher proportions for: "Overwhelmed by all I have to do" (*z* = -9.12, *P*value \< 0.0001); "felt very lonely" (*z* = -7.98, *P*value \< 0.0001); "felt very sad" (*z* = -6.53, *P*value \< 0.0001); "felt so depressed it was difficult to function" (*z* = -3.27, *P*value \< 0.0001); and "felt overwhelming anxiety" (*z* = -2.51, *P*value \< 0.0001) ([Table 5](#T5){ref-type="table"}). However, a higher percentage of online students (29.3%) reported having been diagnosed with depression (*z* = 7.85, *P*value \< 0.0001) compared to the NCHA sample (19.1%). For both samples, more than half reported experiencing "more than average" to "tremendous levels" of stress over the previous 12 months (online= 51.9%, NCHA= 53.2%). Regarding sleep, the NCHA sample had a statistically significant higher percent of students who reported not getting enough rest to feel sleepy during the day (41.5%) for "more than a little problem" to a "very big problem" (*z* = -6.39, *P*value \< 0.0001) compared to 31.1% of the online student sample. Academic impediments {#s4-6} -------------------- The top five health impediments to academic performance reported by online students were: 1) stress; 2) chronic health problem; 3) work; 4) anxiety; and 5) death of a family/friend ([Table 6](#T6){ref-type="table"}). The top five health education topics of interest reported by online college students were: 1) stress; 2) nutrition; 3) physical activity; 4) sleep difficulties; 5) how to help others in distress.Stress, anxiety, and work ranked as top academic impediments for both groups, but chronic health problems and death of a family/friend were specific to online students. The majority (71%) of online students believed that health and well-being impacted their academic standing, and 70.1% indicated "yes" they would participate in virtual health services and use electronic health promotion resources or programs if they were offered at their university. Discussion {#s5} ========== There are very few published studies which examine the health of online college students compared to students enrolled in brick-and-mortar academic programs. This study compared health habits, behaviors, and perceptions of online students attending two large, accredited US universities (n = 961) to an equal comparison group of non-online students drawn from the 2015 NCHA IIb dataset. Significant differences in age, race/ethnicity, marital status and hours worked were identified between the two groups. Online students in this study were older (40 years). More participants identified as African American/Black and Hispanic/Latino; more were married or divorced; and the majority worked 40 or more hours per week. The sample characteristics of the study are consistent with the demographic breakdown of a what is characterized in the literature as "non-traditional" student population: 57% female, 34 years being the average age, almost 30% identifying as non-Caucasian, and the majority working full or part-time (60% for undergraduates and 88% for graduate students).^[@R8]^ The demographics are also more consistent with community college students.^[@R10]^ As non-traditional students have become the majority (71%) on college campuses,^[@R11]^ the term "non-traditional" is no longer fitting. This demographic shift should inform the college and university *Healthy Campus* initiatives as well as health promotion strategies and services. The results of this study also demonstrated that online students had significantly higher percentages of having chronic illnesses, psychiatric conditions, mobility disabilities, deafness/hearing loss, and/or speech or language disorders versus the college students from the NCHA data set. These findings are consistent with the literature that notes online students are vulnerable to challenges affecting their well-being, levels of stress and satisfaction, academic persistence and diploma attainment.^[@R11]^ In addition, online students had statistically significant higher percentages of daily cigarette as well as higher percentages of students classifying themselves as "overweight" to "very overweight" when compared to the college students from the NCHA data set (66.5% versus 36.4%, respectively). Yet 52% of college students from the NCHA data set reported trying to lose weight compared to 69.4% of online students. Therefore, online students may have a more realistic perception of body image when compared to the NCHA sample. This clearly aligns with research studies that have demonstrated that symptoms of eating disorders are pervasive among college students, with a prevalence ranging from 8% to 17%.^[@R12]-[@R14]^ This may be due to structural and psychosocial influences, such as stress, lower levels of self-esteem and sense of unity.^[@R15]^ Obesity is a major health problem in the United States, affecting roughly one-third of adults, and is associated with multiple chronic health problems.^[@R16]^ Lack of exercise is the largest contributor to obesity in America. In relation to this, online students had a higher percent of sedentary activity and these findings are consistent with the literature concludingonline students' are at higher risk of sedentary lifestyles and cigarette smoking.^[@R3]^ Researchers also reported older students having significantly higher body mass index (BMI) scores, and smoking being associated with higher BMI.^[@R17]^ The demographics of this sample of online students (being older, married, employed, more ethnically diverse) are known to negatively influence physical activity behavior.^[@R18]^ Furthermore, screen time (amount of time spent in front of a television, computer, or other electronic devices) has been linked to obesity.^[@R19]^ Several studies have concluded that a higher screen time (more than 21 hours per week) was associated with obesity, regardless of exercise behavior.^[@R17],[@R19],[@R20]^ Online students had statistically significant lower proportions for being overwhelmed, lonely, sad, depressed, and anxiety over the past two weeks, but a statistically significant higher percentage of having been diagnosed with depression. More information and research is needed in this area, but one could speculate that online students are older and therefore have found coping skills and techniques to deal with depressive symptoms. Stress was the top health impediment to academic performance reported by both groups. According to a recent study, mental health and stress management were the most common types of health services offered by universities offering fully online academic programs.^[@R21]^ However, services were offered in the form of written material or website. The results from this study also underscored the need for mental health services promoted to online students to be more interactive and possibly synchronous. For example, support groups and coaching might be offered virtually. Handouts and websites provide a good starting point, but they do not create a healthy campus climate, offer behavior change techniques, or support for real health actualization.^[@R21]^ In terms of health education needs and preferences, the top five health education topics of interest to online college students only slightly differed from those in the non-online group. For the online group, the top issues of need or interest were: 1) stress; 2) nutrition; 3) physical activity; 4) sleep difficulties; 5) how to help others in distress. Topics reported by non-online students included the following: 1) mental health; 2) stress management; 3) physical activity/fitness; 4) relationship violence/sexual assault; and 5) weight management.^[@R21]^ Limitations {#s5-1} ----------- This study, like all research, was not without limitations. The first was that participants in the online group were selected through convenience sampling of two fully online universities and did not reflect all online students in the United States. This may have limited variation in responses and thereby inhibits generalizability of findings. In addition, the NCHA IIb subscales used to collect the data only provide a snapshot of a college student's health and well-being, as defined by the limitations of the scale and self-reported data. Although it is the most widely used college health instrument, the NCHA has a number of limitations such as item sensitivity, not defining health behaviors, and absence of theory, as recently outlined by researchers Rahn, Pruitt and Goodson.^[@R22]^ Ideally, future iterations of the NCHA would account for the shifting demographics in higher education and the fact that more full-time students are enrolling in fully online academic programs. Also, future research on fully online students' health issues should take into consideration the following variables: age, identified gender (to include non-binary), work status, timing of survey, type of campus, and major life events that may influence answers. Additionally, to improve generalizability, future studies should use a national sample of online students and compare this to a sample of non-online students of similar age and work profiles. Although similar differences could be found between two groups within the general population with such different demographics, this study highlights the changes colleges and universities have to promote health and well-being of their online students. Implications for Practice {#s5-2} ------------------------- Assessing community capacity and needs, developing tailored health education and promotion programs and services, and delivering health education in formats most likely to reach the intended audience are primary responsibilities of health education specialists.^[@R23]^ Although wellness data is collected yearly across college campuses in the United States, there has previously been little known about online students' health needs and behaviors, or how college health services are evolving, to address the needs of this population. The study findings underscored the need for US colleges and universities to increase digital health promotion resources, programs, and strategies tailored for the growing number of online, place-bound, and commuter students. The demand is there; the large majority (70.1%) of online students (n = 961) in this study indicated they would use health promotion resources and services if they were offered at their institution. However, few universities are doing more than providing written material online.^[@R21]^ In order to achieve social change and become a bigger part of the healthcare solution, university health services should positivity impact their online community's behaviors and well-being, which requires interaction with each other, participation, leadership, and the uptake of interventions.^[@R13]^ Most of the health issues reported by students in this study are addressed by *Healthy Campus* (e.g. mental health issues such as stress, nutrition, sleep, physical activity). Stress, anxiety, and work were ranked as top academic impediments for both groups, but chronic health programs and death of a family/friend were specific to online students. These findings suggest that online students may benefit from stress, time management, and physical activity programs aimed at working adults-especially those prone to long periods of sitting. Leveraging technology to improve college health promotion will not only cater to the preferences of more digital savvy Millennial and post-Millennial students, but will also address a resource gap, especially for those enrolled in fully online programs. Furthermore, as the results of the student survey confirmed, health and well-being are connected to academic success. By providing services and programs that address some of the most pressing health challenges, universities may simultaneously strengthen students' academic performance and persistence. Ethical approval {#s6} ================ The Institutional Review Boards (IRBs) and Institutional Approvers (IA) from both universities approved the study. Competing interests {#s7} =================== The authors declare that they have no competing interests. The contents of this publication are solely the responsibility of the authors and do not necessary represent the official views of Walden University or the ACHA. Funding {#s8} ======= This project was supported by Walden University via an internal faculty grant. Authors' contributions {#s9} ====================== MMB and SNA secured the grant funding through Walden University to conduct this study. All authors contributed to planning and write-up of the paper. MMB and SNA implemented the study and lead the framework for the paper. All authors contributed to the data analysis, results, discussion, and conclusion. JOE helped to write the background, methods, and results and also contributed to the discussion. She also assisted with revisions. HG also contributed to the background and writing the conclusion. Acknowledgments {#s10} =============== The authors would like to acknowledge the universities and students who participated in this project as well as the ACHA for allowing the authors to use a subset of questions from the NCHA. Table 1Comparison of demographic characteristics of online vs. non-online college students**Online College StudentsNon-online College Students (NCHA II Spring 2015 data set)Z-Statistic*****P*** **Value**Race/ethnicityn = 961n = 103 314White/Caucasian55.30%60.90%3.540.0004Black/African American28.60%5.50%-30.71\<0.0001Hispanic/Latino5.20%11.20%5.88\<0.0001Asian/Pacific Islander2.60%13.70%9.99\<0.0001Bi/Multi-racial4.50%4.10%-0.620.5353Age \[mean\]n = 961n = 91 96640.2 years22.6 years-91.44\<0.0001Gendern = 961n = 93 034Female70.24%66.6%-2.40.164Male29.45%32.19%1.810.0703Transgender0.31%0.45%8.68\<0.0001Enrollment statusn = 961n = 92 272Full Time72.70%92.00%21.7\<0.0001Part Time24.80%7.30%-20.52\<0.0001International statusn = 961n = 92 06812.20%9.50%-2.840.0045Sexual orientationn = 961n = 92 065Heterosexual90.90%88.50%-2.32\<0.0203Relationship statusn = 961n = 92 092Married/partnered53.90%9.30%-46.35\<0.0001Single28.80%87.90%54.72\<0.0001Divorced12.10%1.10%-30.98\<0.0001Hours worked per weekn = 961n = 91 945018.00%41.40%-14.69\<0.00011-3920.20%52.10%19.69\<0.00014029.80%3.40%42.96\<0.000140+32.00%3.00%49.97\<0.0001 Table 2Comparison of chronic illness and disabilities between online vs. non-online students**Online College StudentsNon-Online College Students NCHAZ-Statistic*****P*** **Value**Attention deficitn = 961n = 91,8297.85 %7.37%0.56020.5755Chronic illnessn = 961n = 91,82215.70%4.91%14.9\<0.0001Deafnessn = 961n = 91,7825.56%1.86%8.163\<0.0001Learning disabilityn = 961n = 91,5234.36%4.00%0.55280.5823Psychiatricn = 961n = 91,69911.34%7.09%4.9815\<0.0001Speech or languagen = 961n = 91,6931.96%0.82%3.7861\<0.0002 Table 3Frequencies of cigarette use and alcohol use: online students versus non-online students **Online College Students**\ **(n = 961)Non-online College Students (NCHA II Spring 2015 data set; n = 91829)Z-Statistic*****P*** **Value**Cigarette use    Never used73.4%73.8%-0.270.7872Used last 30 days4.7%8.0%-3.72\*0.0002Smoke daily8.1%2.5%10.57\*\<0.0001Daily use of cigars, little cigars, clove cigarettes0.3%0.1%Daily use of smokeless tobacco0.7%0.7%Alcohol use \[5+ drinks over last 2 weeks\]  None/do not drink29.3%23.7%7.59\*\<0.00011-5 times19.2%29.8%-6.99\*\<0.00016+ times1.0%2.1%-2.37\*0.0178[^1] Table 4Comparison of Weight, Nutrition and Exercise among Online vs. Non-Online College Students**Online College Students (n = 961)Non-online College Students (NCHA II Spring 2015 data set; n = 91829)Z-score*****P*** **value**Weight statusVery underweight0.9%0.7%Slightly underweight0.05%8.9%About the right weight27.7%54.1%-15.93\*\< 0.0001Slightly overweight44.8%31.4%8.73\*\< 0.0001Very overweight21.7%5.0%22.67\*\< 0.0001Trying to lose weight69.4%52.0%10.47\*\< 0.0001Fruits and vegetables0-2 servings per day59.8%66.9%-4.59\*\< 0.00013+ servings40.2%33.1%4.59\*\< 0.0001Exercise0 days moderate-intensity cardio30.5%24.6%5+ days moderate intensity cardio15.5%19.2%0 days vigorous cardio53.5%41.1%5+ days vigorous cardio8.6%10.4%0 days strength training56.5%50.7%5+ days strength training7.1%8.9%[^2] Table 5Mental health issues reported by online college students vs. non-online college students**Online CollegeStudents (n = 961)Non-Online College Students (NCHA II Spring 2015 data set; n = 91829)Z-Statistic*****P*** **Value**In the last 2 weeksOverwhelmed by all I have to do35.8%51%-9.12\*\<0.0001Felt very lonely13.5%25%-7.98\*\<0.0001Felt very sad17.0%26.5%-6.53\*\<0.0001Felt so depressed it was difficult to function8.3%11.9%-3.37\*\<0.0001Felt overwhelming anxiety19.5%23.6%-2.91\*\<0.0001Have been diagnosed with depression29.3%19.1%7.85\*\<0.0001Levels of stress over last 12 monthsMore than average37.5%42.5%-3.25\*\<0.0001Tremendous14.4%10.7%3.52\*\<0.0001Slept to feel rested in last week0 days12.5%10.7%1.750.081-2 days27.6%29.9%-1.440.153-5 days42.9%47.5%-2.77\*0.016-7 days16%11.7%4.64\*\<0.0001Felt sleepy in the daytime during the last weekNo problem18.3%9.9%8.42\*\<0.0001A little problem50.6%48.5%More than a little problem18.4%24.9%-6.39\*\<0.0001A big problem9.1%11.9%A very big problem3.6%4.7%[^3] Table 6Academic impediments reported by online college students vs. non-online college students**Online College Students**\ **(n = 961)Non-Online College Students (NCHA II Spring 2015 data set)**\ **(n= 91819)**1. Stress1. Stress2. Chronic health problem2. Anxiety3. Work3. Depression4. Anxiety4. Sleep difficulties5. Death of a family/friend5. Work [^1]: \*Significant differences between online students and NCHA sample (*P* \< 0.0001). [^2]: \*Significant differences between online students and NCHA sample (*P* \< 0.0001). [^3]: \*Significant differences between online students and NCHA sample (*P* \< 0.0001).
Frequency of HLA-B8 in Israeli children with celiac disease. The frequency of HLA-B8 in 18 Israeli children with celiac disease was examined and compared with that in 27 nonceliac children hospitalized at the time of the study. The diagnosis of celiac disease was made on the basis of an intestinal biopsy and a positive response to the lymphocyte inhibition factor (LIF) test, as well as a good response to withdrawal of gluten from the diet. HLA-B8 was found in 10 of the 18 celiac patients (56%). Of the 27 nonceliac children, three (11%) had HLA-B8. The LIF-positive celiac group had an HLA-B8 frequency five times greater than that in the nonceliac group, confirming our previous finding that the LIF test is a good diagnostic criterion for celiac disease. The combination of an intestinal biopsy, the LIF test and the presence of HLA-B8 could be a useful triad for diagnosis of celiac disease.
444 P.2d 605 (1968) 79 N.M. 420 Narciso FLORES, Petitioner-Appellant, v. STATE of New Mexico, Respondent-Appellee. No. 222. Court of Appeals of New Mexico. August 9, 1968. J. Benson Newell, Las Cruces, for petitioner-appellant. Boston E. Witt, Atty. Gen., Gary O'Dowd, Asst. Atty. Gen., Santa Fe, for respondent-appellee. OPINION WOOD, Judge. Narciso Flores appeals from the denial of his second motion for post-conviction relief under § 21-1-1(93) N.M.S.A. 1953. Denial of his first motion was affirmed in Flores v. State, 79 N.M. 47, 439 P.2d 565 (Ct.App. 1968). He contends that his armed robbery conviction should be set aside because of the provisions of N.M. Const. Art. XX, § 20. N.M.Const. Art. XX, § 20, provides that a person held on a felony charge "* * * may in open court with the consent of the court and the district attorney, to be entered upon the record, waive indictment and plead to an information * * *." Flores was charged by criminal information. The record does not show that either the court or the district attorney consented to waiver of grant jury indictment. Because the record does not show such consent, Flores contends the trial court was without jurisdiction to proceed on the basis of the criminal information. Prior to the amendment of N.M.Const. Art. II, § 14 in 1925, a defendant was to be held to answer only on a presentment or indictment by a grand jury. N.M.Const. Art. XX, § 20 sets forth the requirements for waiver of action by a grand jury. Thus, prior to the 1925 amendment, defendant's argument may have had merit. The 1925 amendment of N.M.Const. Art. II, § 14 provides that a defendant may be charged either by grand jury action or by a criminal information. Since the 1925 amendment, defendant has had no right to be charged by a grand jury; rather he may be proceeded against by information. State v. Barton, 79 N.M. 70, 439 P.2d 719 (1968); State v. Williams, 78 N.M. 211, 430 P.2d 105 (1967); State v. Franklin, 78 N.M. 127, 428 P.2d 982 (1967); State v. Reyes, 78 N.M. 527, 433 P.2d 506 (Ct. App. 1967). Since Flores was charged by criminal information, the provisions of N.M.Const. Art. XX, § 20 concerning waiver of grand jury indictment and consent to such a waiver are not applicable. State v. Chacon, 62 N.M. 291, 309 P.2d 230 (1957) is not to the contrary. In Chacon, the trial court was without jurisdiction because there was neither an information nor a grand jury indictment. The claim concerning N.M. Const. Art. XX, § 20 provided no basis for post-conviction relief. State v. Reyes, supra. The order denying relief is affirmed. It is so ordered. OMAN and ARMIJO, JJ., concur.
Will Mainstream Media Survive the Next Decade?Anyone can become a media owner these days In 2005, your day wasn't complete if you hadn't read the Daily Nation. [ Photo / Business Today ] I worked in a media house, the Nation Media Group to be exact, from 2005 to 2008. Besides a day or two spent in the newsroom, I mostly worked on the 5th floor championing the brand. Today, I am amazed at what 10 years can do to an entire industry. In 2005, your day wasn’t complete if you hadn’t read the Daily Nation. If you were a PR person, your job wasn’t complete until the client’s story appeared in the Daily Nation. While briefing the client, the more forthright ones would ask, “Was it in the Nation.” If it was, chances were that your contract would be renewed at the end of the year. The fall of legacy media The media was easily the most powerful institution in the land. I remember NMG running the Save a Life campaign together with the Kenya Red Cross Society, Standard Chartered Bank and EABL and corporates literally fell over themselves for a chance to contribute just for the good feeling it provided, to be associated with the largest media house in the region and sometimes in return for free publicity. Related Stories On the other side, any politician who was unable to stop a damning story about him/her from being published spent sleepless nights pondering how to counter the negative publicity and its unpleasant consequences. Then social media happened – Twitter, Facebook, YouTube and other platforms – and everyone became a journalist. A swarm of bees would attack mourners in a remote West Pokot village and we would know about it instantly, complete with photos and videos of folks running for dear life. Loading... Then we moved from analogue to digital technology and anyone could become a media owner. All you need is good content, reasonable looks or some rib-cracking humour and voila, you got viewers and you could negotiate for advertising alongside the giant media houses. Rise of alternative media The net effect is that folks no longer care as much as they used to about mainstream media as they have lots of alternatives, some of them credible while others are just entertaining. The shift from analogue to digital has had media houses that had spent millions on analogue technology competing for business with those who have spent very little on digital technology. The floundering economy, the decision by the Jubilee government to tie a tight noose around the media’s neck in 2013 through the creation of the Government Advertising Agency (GAA) as well as a quid pro quo policy (you do your job properly, you don’t get business from us) has left mainstream media gasping for breath. Recent job losses are, therefore, not surprising at all. The 2020-2030 decade will be very interesting. Some media houses will emerge stronger due to innovation, others (especially smaller radio stations and newspapers) will die and new ones will emerge. Such is life. Only change is constant. This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT Privacy & Cookies Policy Privacy Overview This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are as essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience. Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Caffeine, a brand new sci-fi horror game, is currently in development. It appears that the weirdly named game was create by one dude (Dylan Browne from Incandescent Imaging). Games like F.E.A.R., Condemned and Doom 3 were mentioned as the main inspiration for this one. In Caffeine you'll be playing as a boy who wakes up on a caffeine-mining space ship - evidently there's a lot of caffeine out there in uncharted space. Anyway something went terribly wrong and the boy has to explore the huge vessel to discover what it is. The good news is that a playable PC demo will be available tomorrow. While the demo created using Unreal Engine 3, the full game going to utilizes UE 4 tech. Someone say caffeine? too much can kill .... recently a Norwegian Boy consumed over 4 liters worth of f energy drinks in a 16 hour period playing Call of Duty almost died from kidney failure slipped into a week long comma...
Phase II window of idarubicin in children with extraocular retinoblastoma. The aim of this study was to evaluate in an upfront phase II study the response to idarubicin in children with extraocular retinoblastoma. The starting dose of idarubicin was 15 mg/m(2)/d (days 1 and 2) weeks 0 and 3. After an interim evaluation, the dose was reduced to 10 mg/m(2)/d (days 1 and 2) weeks 0 and 3 because of hematopoietic toxicity. Response was evaluated at week 6. At the Hospital JP Garrahan (Buenos Aires, Argentina), 10 patients (five bilateral) were entered onto the study from 1995 to 1998. A total of 19 cycles were administered. Extraocular sites included orbit (n = 10), bone marrow (n = 3), bone (n = 1), lymph node (n = 1), and CNS (n = 1). The response rate was 60% (95% confidence interval, 30% to 90%). One complete response was achieved, in addition to five partial responses, two cases of stable disease, and two cases of progressive disease. All patients with bone marrow involvement achieved complete clearance of tumor cells. The patient with CNS disease had progressive disease. All patients had severe hematopoietic toxicity (grade 4 neutropenia and grade 3/4 thrombocytopenia after most cycles). Other toxicities included grade 2 diarrhea in 30%. No echocardiographic changes were detected. Idarubicin is active in extraocular retinoblastoma. The activity of this drug should be explored in future phase III studies.
Inhibitory effects of hydroxyflutamide on ovarian 2008 cancer cells studied for medical student's Independent Study Project.
Methylmercury inhibits differentiation of rat neural stem cells via Notch signalling. The Notch receptor is essential for neural stem cell (NSC) characteristics. Relatively high concentrations (micromolar) of methylmercury (MeHg) activate Notch signalling in Drosophila cell lines; however, exposure of MeHg at such concentrations is rare, and the implications for mammalian cells are unclear. We have shown that MeHg at a nanomolar range inhibits neuronal differentiation of rodent embryonic NSCs. Here we show that low MeHg levels (2.5-10 nM) activated Notch signalling in NSCs, as assessed by the increased activity in a specific Notch-reporter assay and by the increased cleavage of the Notch intracellular domain. Importantly, pretreatment with Notch cleavage inhibitor reversed the MeHg-induced repression of neuronal differentiation, suggesting that Notch activation is involved in the inhibition of NSC differentiation by environmentally relevant levels of MeHg.
2 1/2 year old rottie messing over night We have a female rottie she's nearly 2 1/2 and at least 2-3 nights a week she pooing in the kitchen over night then often eating it but still leaving a mess. She's goes outdoors before bed and 9/10 times does a poo and wee. We were advised to change her feed to morning rather than evening but this hasn't changed things. We've even changed the make of food.We mostly go bed at 11 and are up at 6.30 sometimes i can come back down at 12 and she's messed. Having to clean up the mess and mop through every morning before the kids come in the kitchen is really getting to me so any advise greatly received x I'm sorry but if she has been 'dirty since a puppy ' then you haven't house trained her properly and need to go back to basics ,there was a thread a couple of days ago explaining how to do it properly . Do the dogs share a space ,if so how do you know its her ? I'd be inclined to break the problem up into two parts;The first is that she has the need to go in the night rather than being able to sleep right through. Is this a diet or health related issue or a behavioural one? Have you had her checked by the vet and have you tried different diets? The second is that you're not alerted to her wanting the toilet. Does she ask to go out during the day (i.e. so knows to ask to be let out to relieve herself), and do you think she's asking at night but you don't hear her? I finally watched that dogfood programme last night and incidently a vet mentioned that some dry food is so full of flavourings etc, that it still tastes like dog food when it comes out bleurgh. could it be the your dogs food? I'm afraid I agree with Floral. If this isn't new behaviour then she just isn't house trained. Dogs are all different and some are easier to house train than others. You need to devote a few days to totally focusing on training her to toilet outdoors, which will mean hard work and lost sleep, but it's the only way for her to learnwwhere she's supposed to go to the toilet. Incidentally, did you use puppy pads when she was little? How have you responded when she's made a mess in the past? Dogs that have been trained on pads often only learn to toilet indoors unless they are then retrained to go outdoors. And dogs that eat it when they've messed indoors are often stressed. What dog food have you tried and what is she eating now? My Rottie is on a raw diet (meat, fish, bones, eggs, veg and occasional fruit) and I've noticed he needs to poo less than previous dogs fed on dry complete. He also gets fed twice a day rather than only having one large meal.
A Chinese Shenzhou spacecraft carrying a space veteran and two rookies, including China's first female "taikonaut," rocketed into orbit Saturday on a mission to dock with a prototype space station module, an incremental but critical step on the road to building a Mir-class space station later this decade. Broadcast live on Chinese television, the Long March-2F rocket carrying the three-seat Shenzhou 9 spacecraft roared to life on time and quickly climbed away from the Jiuquan Satellite Launch Center in north central China at 6:37 p.m. local time (GMT+8; 6:37 a.m. EDT), arcing to the east through a cloudless blue sky. CCTV The mission commander is 46-year-old Jing Haipeng, veteran of China's third and most recent manned mission, in 2008, and the first Chinese astronaut to make a return trip to space. His crew mates are both making their first flight: Liu Wang, 43, and Liu Yang, 33, the first female Chinese astronaut. She is an air force major in the People's Liberation Army with 1,680 hours of flying time. Live television from the spacecraft during the climb to space showed Jing, strapped into the capsule's center seat, with Liu Wang seated to his right and Liu Yang to his left. All three appeared relaxed and in good spirits as they monitored cockpit displays, occasionally waving at the camera. "I am grateful to the motherland and the people," Liu Yang told reporters during a preflight news conference. "I feel honored to fly into space on behalf of hundreds of millions of female Chinese citizens." Along with achieving the technical goals of the mission, "I want to experience the fantastic environment in space and appreciate the beauty of Earth and our homeland," she said in a report from the Xinhua news agency. "I will live up to your expectations and work with my teammates to complete this space mission." Joan Johnson-Freese, an expert on China's space program, said Liu Yang's selection "will play well domestically. They're always quoting that Mao said women hold up half of heaven. So this is a big nod to half of 1.3 billion people. It plays well domestically and internationally." Xinhuanet The goal of China's fourth manned space mission is to carry out the first manned rendezvous and docking with the orbiting Tiangong 1 module, a prototype of the much larger laboratory components that will be assembled into an operational space station by the end of the decade, a program approved by China's leadership in 1992. Following a deliberate, step-by-step approach to that long-term goal, China became the third nation, after the United States and the Soviet Union/Russia, to launch a manned spacecraft, in October 2003, when Yang Liwei blasted off aboard the Shenzhou 5 spacecraft. Shenzhou 6, carrying two crew members, was successfully launched in October 2005 and Shenzhou 7, carrying a three-man crew -- including Jing Haipeng -- flew in September 2008. The Tiangong 1 -- "Heavenly Palace" -- research module was launched Sept. 29, 2011, to serve as a target for unmanned and then manned docking missions. One month after Tiangong 1 reached orbit, China launched the unmanned Shenzhou 8 spacecraft, which carried out an automated rendezvous and televised docking with the research module two days later. "Currently, China is still experimenting with docking technology, which is critical to its ability to transfer people and material from the ground to a long-term outpost in space," wrote Gregory Kulacki in a background paper distributed by the Union of Concerned Scientists. "Docking requires careful and accurate control of the space capsule to allow it to rendezvous with and attach itself to a port on the station. Experience with docking will also allow China to gain valuable information and experience needed for the design and construction of the space station, which will be assembled from a series of large modules joined together with a similar docking mechanism." The Shenzhou 9 mission "is designed to test the ability to conduct a piloted docking between a Shenzhou capsule occupied by three Chinese astronauts and the same Tiangong 1 experimental space laboratory," Kulacki wrote. "If all goes well there are plans for a third docking mission between a piloted Shenzhou spacecraft and the Tiangong 1 laboratory in 2013." The solar-powered Tiangong 1 measures 34 feet long, 11 feet wide, and weighs about 8.5 tons. It features a pressurized experiment module where visiting crews can live and work and a "resource module" housing electrical power, propulsion, and life support systems. The space station the Chinese hope to build later this decade will consist of four or more modules linked together with a total mass between 60 and 80 tons. For comparison, the International Space Station operated by the United States, Russia, Europe, Canada, and Japan, is the size of a football field, weighs more than 450 tons and has a multimodule pressurized volume comparable to a 747 jumbo jet. It has been staffed with rotating crews of up to six astronauts and cosmonauts for the past 12 years.
28% off Phone Mask Disinfection Sterilizer With USB/Wireless inductive Charge UV Sanitizer Disinfector Touch Control Phone Sterilizer – White Banggood Coupon Promo Code Banggood Coupon Price :$33.65 Banggood Regular Price : $46.91 Your Save : $13.26 Coupon Limit: 100 times Expires : August 31, 2020 Full-automatic multifunctional Mobile phone disinfector Six Major upgrade function Mobile phone disinfection Usb charging Mobile phone aromatherapy Touching speech Wireless inductive charging Disinfection progress indicator Mobile Phone Is Sucking In your health Do you know? Mobile surface bacteriais as high as 120000/CM Carry a cell phone bacteria are toilets bacteria 18 times Within easy reach of pathogenic bacteria viruses can damage your health Full-automatic Multifunctional Mobile phone disinfector. Kill 99% of the common pathogenic bacteria DOUBLE ULTRAVIOLET sterilization The Dual Uv Sterilization Efficient project comprehensive sterilization 8 minutes to give you a healthy cell phone . Sterilizer cavity at the bottom of the upport design mobile phone back by ultraviolet light Uv Lamp With Sweet oil aing kind of sweet More healthy and more romantic Stylist Clever Inside The Fuselage Loin Aromatherapy Interlining Is Designed .When You Open The Aromatherapy Button When Heated, Sweet Oil Aing Kind Of Sweet Grass Will Diffuse In The Space Sterilization of Health And Romantic At The Same Time Mobile Phone Stents Convenient video call for a long time See a movie Usb Full Range General Charging Quick charge There is no worry Smart Touch Speech A key touch without worry A Key Mobile Disinfection A Key Mobile Phone Aroma Wireless induction charger Usb Charging Disinfection The progress indicator Product specifications The net weight: 0.35kg The fuselage size: 22*12.5*5.5cm Gross weight: 0.7kg Packing size: 30.3*17*6cm Product details show the figure
'Boaty McBoatface' polar ship named after David Attenborough - sghi http://www.bbc.co.uk/news/uk-36225652 ====== JorgeGT Good luck selling plushies, apparel, comics or animated cartoons of lil' fun Sir David Attenborough! Now instead of having the dream name for science outreach and awareness for kids, you have a stark, cynical lesson on democracy. ~~~ sandworm101 Kids are great, but they also want to appeal to young people who aren't still five. Silly names aren't a great marketing tool for pulling in recent college graduates or dedicated sailors. ~~~ enraged_camel Only the most boring, humorless person would think a ship named "Boaty McBoatface" only appeals to kids. ~~~ logfromblammo Indeed, the name would have been a hearty reassurance that the employer is not _entirely_ lost up its own ass _all the time_. I have always been a great fan of Dada, Surrealism, and Discordianism. So I am somewhat disappointed that it seems so dreadfully important to unwaveringly maintain the illusion that science is Serious Business. There is a time and place for both whimsy and gravitas in all aspects of life. ------ samsolomon I don't know. It feels like a missed opportunity to excite kids about research. Can't you just see the series of children's books about Boaty McBoatface and all the incredible science adventures it has—a Magic School Bus 2.0? Many people taking themselves too seriously. It's a shame. ~~~ nness I would hope stories about Sir David Attenborough would stir a more adventurous spirit in kids than a funnily named boat. ~~~ nekopa I think the funny name would spark the interest. But then again, why not have both? I think a drone called Boaty McBoatface could get into all kinds of crazy trouble, only to be bailed out by the wise old mothership, Sir David Attenborough. Could actually work out really well. I may just have to start working on my new kids book series "Curious Boaty, the cheeky little ROS (Remotely Operated Submarine)" \- with related merchandise, a toy ROS with HD video and sampling claw that can be operated from your Android or iOS phone/tablet ~~~ threeseed This is what I can't understand. There are so many research vessels. Can't one at least be fun, playful and a little bit ridiculous. People are desperately trying to tell institutions (not just in this situation but also in politics) that being honest and more connected with the ordinary person on the street is a virtue. ~~~ theoh The problem, I think, is that the suffix "face" makes it sound like an insult. It would be a derogatory name, which is just unacceptable. ~~~ shepardrtc Personally I'm fine with "Boatface" being derogatory toward boats. They're inanimate objects; I think they'll be okay. ~~~ theoh Grown ups don't tolerate name calling. It's unpleasant. ------ sschueller Sir David Attenborough should have his legal name (or at least his twitter handle :)) changed to 'Sir Boaty McBoatface'. Then see what happens... ~~~ braythwayt > In a stunning move, Buckingham Palace announces > that the former David Attenborough will now be > known as “Sir Naturalist McNatureface, OBE." ------ planetjones I think the name chosen is a good one and like David Attenborough himself, the boat's name will endure for a long time. However, what did the organisation (NERC) expect when they gave a free choice for the names of the boat. They would have been far better having a poll of say 5 names which had been pre-selected. ~~~ dingaling I'm not convinced on the choice of name; _Sir_ David Attenborough has already received many honours and appears to have received this nomination because (1) he is famous as a broadcaster and (2) is popular as a person, seemingly being of a mild and pleasant character. So they cleverly side-stepped the Boaty issue by picking a name to which people can't object without being accused of picking on a "nice" 90-year-old man. I don't think that's a good basis for a naming policy. I'm sure there are many publicly-anonymous actual research scientists who could have received this honour instead and BIS / NERC could still have thrown the Boaty-as-ROV bone to the voters. ~~~ sandworm101 To see your name on a large ship you need to be old. It's the sort of thing for people who are well into retirement, if not recently deceased. Pick someone younger and you may look foolish should they become involved in something later. Given the public nature of the naming, they also want to go with someone popular. So they want an older person, who the public knows, and that has a history of doing something for the environment. Nobody else covers those three areas like Attenborough. ~~~ TheOtherHobbes Chevron had a policy of naming ships after living executives - although it quietly renamed the Condoleeza Rice to something less political in 2001. With respect to Attenborough, the RRS David Attenborough is a very unexciting choice and isn't going to do anything at all to raise the profile of environmental research. ~~~ hirsin Can't say I'm opposed to Chevron's idea here. I'm sure headlines like "Chevron CEO hits reef, spilling millions of crude and killing thousands of seals" might make them take safety a (tiny) bit more seriously. Nothing good happens with oil tankers etc. ------ alblue The remotely operated vehicle has been named BoatyMcBoatface instead: [https://twitter.com/NERCscience/status/728508385692418048](https://twitter.com/NERCscience/status/728508385692418048) ~~~ ojii But that should've been called DroneyMcDroneface. It's not a boat! ~~~ alblue Actually in naval terminology a "boat" is a vessel that can be carried by another vessel (eg life boat). [https://en.m.wikipedia.org/wiki/Boat](https://en.m.wikipedia.org/wiki/Boat) Though frankly I think RemoteyMcBoatface would be good here :-) ~~~ arethuza What about submarines - aren't they referred to as "boats"? ~~~ vlehto During WWII there was somewhat surprizigly unified ship classification and there was hardly any civillian submarines at the time. It was based on tonnage, speed and main gun calibre. Anything smaller than 1000 tons was a boat. Interwar German submarines we're around 500 - 1000 tons, so they we're called "u-boot". Since WWII names stuck by role of ship. Now we have all kinds of propaganda pieces floating around and ship classification names don't mean anything anymore. A "frigate" might be anything except oil tanker or CATOBAR carrier. If you would use WWII classification by top speed and tonnage and apply it to modern vessels, Ohio class submarine would be "Submarine Heavy Cruiser" and Typhoon would be "Submarine Battleship". ~~~ arethuza The Royal Navy did have "through-deck cruisers" for a while - they did eventually admit that they were mini aircraft carriers. ------ _Marak_ I'm disappointed. If an organization decides to use a social media contest like this to promote themselves, they should have a social responsibility to adhere to the demands of the people. "Boaty McBoatface" was a good name. ------ rectang Disappointing. It's as if UC Santa Cruz had chosen "Sea Lions" over "Banana Slugs". [http://www.ucsc.edu/about/mascot.html](http://www.ucsc.edu/about/mascot.html) ~~~ orthecreedence From what I heard, they tried to change it a while ago and were met with severe backlash. Banana Slugs is so much more interesting and disarming than some typical predatory animal. Nobody will ever forget UCSC's mascot. ------ pjc50 I think people are underestimating the popularity of David Attenborough - to many people in the UK he is _the_ face, and especially voice, of TV naturalism, and has been for decades. ------ simonh Naming one of the remote drones 'Boaty' heads off people calling the ship 'Boaty' as a nickname. I wonder if that's why they did it. ------ siddboots Good choice, and also a great way for the organisation to get out of a tough PR situation. Literally no-one dislikes David Attenborough. ~~~ stevetrewick Black swan. I dislike him. He's a staunch proponent of population control and patron of Population Matters a group which amongst other things campaigns for net zero immigration. His undeniably impressive professional oeuvre has a carbon footprint like a charcoal yeti making some of his environmental preachiness quite hypocritical. I still like his programs, though. ~~~ orthecreedence Curious, I can understand not liking him for supporting/speaking at an organization you dislike, but what's wrong with the idea of population control? So many of our problems could be fixed by limiting the population of the human race. To be clear, I'm not proposing a solution for doing so nor am I saying the ends would justify the means for how this is reached. However can you not agree that climate change, pollution, resource shortages, etc are caused by having too many people on this planet? This is especially true if people in first-world countries want to continue their lives of excess. The only reason to keep growing in population is to add fuel to the economic fire, so to speak. This is not a sustainable trend though. ------ whyleyc It's almost as if representative democracy of this kind is a complete sham. It's a good job this kind of ridiculous situation doesn't crop up here on HN from our YC overlords ! Wait, what. [1] [1] [https://news.ycombinator.com/item?id=11633517](https://news.ycombinator.com/item?id=11633517) ~~~ david927 What are you talking about? Neither is a representative democracy. They don't _have_ to do anything. Both simply appealed to the public as an experiment and learned that a large swath of the public feels it has no power and finds it empowering, now that they finally have their hands on the steering wheel, to flip the car rather than drive it. Children who haven't been given much autonomy will often have the same mentality: when finally given power they will be destructive because it's a better test of the reality of the new-found power. ~~~ whyleyc Ok, so maybe "representative democracy" (in a strict political sense) was bad terminology to use, but my point is that both experiments set themselves up with a veneer of democracy only for that to come crumbling down when they didn't like the answers they got. ------ dzdt Being named Boaty McBoatface would have been such a great icebreaker for starting outreach discussions. A ship like this one needs a great icebreaker sometimes. ------ sbmassey Goofy names are usually fun for about 5 minutes, but quickly become seriously annoying if you have to use them continually. I imagine the same is true for ship names as for naming classes or functions. ------ sccxy Good outcome from this naming campaign >We're building on the #BoatyMcBoatface spirit with a £1m Polar Explorer programme to inspire the next generation of scientists and explorers [https://twitter.com/JoJohnsonMP/status/728499945402204160](https://twitter.com/JoJohnsonMP/status/728499945402204160) ------ genmon They should have called it Pinboard ------ daimyoyo If they wanted to name the boat after someone like Attenborough that's great but why open the vote to the public and then ignore the most popular choice? ------ f4stjack They can name it whatever they want, that ship has been recorded as "Boaty McBoatface" to my memory. Also really kudos to them, Boaty McBoatface made everyone smile when they heard the name and got them interested; Sir David Attenborough however... doesn't make that effect. ------ smoyer This just in ... In a surprise move, Sir David Attenborough legally changes his name to Boaty McBoatface in support of the Internet hordes. Facing waning popularity, this maneuver is seen as a means of returning to the cult-icon status days he experienced as a broadcaster. When asked for comment, Sir McBoatface stated "I'm a few days short of my ninetieth birthday and let's face it - once I'm gone nobody's going to remember a name like Attenborough. As Boaty McBoatface, my name will actually be remembered. Would you like fries with that?" ------ goffley3 Is it too much just let the internet have its candy? Just this once, when it's completely innocuous. ~~~ stronglikedan As another comment mentioned, it appears that it's already had its candy[0]. [0][https://en.wikipedia.org/wiki/Mister_Splashy_Pants](https://en.wikipedia.org/wiki/Mister_Splashy_Pants) ------ swamp40 If voting made any difference they wouldn't let us do it. ~ Mark Twain _(apocryphal)_ ------ TheCraiggers When will they learn that holding an online poll to name stuff is never, _ever_ a good idea. They should count themselves lucky the winning entry was work-safe. Although I still feel that if you're going to go through with it you should stick with the results. Silly people. ------ sgnelson If nothing else, I must say that reading through this thread, I now understand much better why I've always thought the world can be such a sad place; There are way too many people who apparently have no sense of humor. ------ pessimizer Thank God that this boat was named after a television host rather than a whimsy chosen by the public. I guess "seriousness" was a choice between terminally ill children and entertainers. Couldn't find a scientist? ~~~ timthorn David Attenborough has a degree in Natural Sciences from Cambridge University. No one in England would characterise him as an entertainer - he is well regarded both in front and behind the camera as a science communicator, and was responsible as the head of BBC2 for commissioning a vast range of science television programming. ------ transfire And lo it is proven... the government does _not_ listen to the people. ------ delecti "Boaty McBoatface" was just irreverent enough without being offensive that it should have been a perfect choice to gain a bunch of free publicity. ------ jonathankoren Am I just wrong in thinking that it's a relatively new phenomenon to name things after living people? ------ jordanb The cute name wasn't suitably distinguished so instead they named it after a television personality.. ------ quocble Everyone: let's go with the most boring name possible. it's who we are! ------ mherdeg Wow! Big year for Leicester! ------ unlinker For some time, iirc, it was about to be called Blas de Lezo. ------ mtgx And the boat was never to be heard from again (in the media). ------ quadyeast This always cracks me up and I don't know why. ------ pyython No justice in this world. ------ randac That's great... but meanwhile, he's being downvoted for doing exactly the same as you; sharing his opinion. Stay classy, HN. ~~~ fossuser I suspect he's being downvoted both because HN users disagree and also because he's stating his opinion as if it's obvious fact. ~~~ hartpuff > he's being downvoted both because HN users disagree Which is probably the usual reason people downvote. And it's a shit reason. Downvoting (ie, trying to bury or hide a post) because someone says sumfing u don't wike is pathetic and childish; if you disagree either argue against it or move on. Downvotes (if they have to exist) should be reserved for posts that are objectively non-constructive (as in posts that don't make any argument, whether you agree with it or not, or add anything to a discussion). ~~~ Nadya _> Which is probably the usual reason people downvote. And it's a shit reason._ In a matter of public opinion about whether or not this would interest children in science - the votes are showing more people think it _would_ than _wouldn 't_. I also have a feeling more downvotes are coming for trying to pass off their (minority) opinion as some sort of established fact that one could reason themselves into, when most people who have reasoned with themselves came to the _opposite_ conclusion. If you take _that_ to the logical conclusion: they're _insulting other people 's intelligence_ for reaching the opposite conclusion. Which, last I checked, is not proper discourse on HN and routinely gets downvoted along with any other name calling. ~~~ hartpuff I honestly can't tell if this is meant to be serious or not. It's not proper discourse on HN, or it insults people's intelligence, to have a minority opinion? What? ------ ck2 We need to quit naming things after people in the first place, it's always egotistical and political. ------ x5n1 They should have just gone with it, and said the people have spoken. It would have been good for morale, because everyone would have a smile on their face every time they said the name in a British accent. ~~~ distances I disagree. I think it's fine to disregard juvenile name suggestions, and the supposed disappointment in the Internet will be forgotten in a couple of days. ~~~ duaneb > I think it's fine to disregard juvenile name suggestions, and the supposed > disappointment in the Internet will be forgotten in a couple of days. Along with the ship itself.
.saladict-div, .saladict-div > .saladict-external, .saladict-div > .saladict-panel { display: block !important; width: 0 !important; height: 0 !important; margin: 0 !important; padding: 0 !important; border: none !important; outline: none !important; }
By reaching the quarter-finals of the 2002 World Cup, the United States simultaneously accomplished three things they had never done before. First, the team has established supremacy as the top dogs in Concacaf, by defeating arch-rival Mexico in the second round and advancing further than any other side from the North and Central American confederation. For the first time ever, Mexico will not enter the next cycle of World Cup qualification as the Concacaf favorites Their 2-0 victory in the second round means the US have now defeated Mexico in five of the past six matches. For the first time ever, Mexico will not enter the next cycle of World Cup qualification as the favorites. Instead, that honour will now go to the United States. Qualification for Germany 2006 would mean five consecutive appearances in the finals for the US, an achievement unprecedented in Concacaf history. Secondly, World Cup 2002 finally showed the planet that the US are capable of playing quality football at the highest level. With a sports-obsessed population rapidly approaching 300 million, the United States can now truly lay claim to being correctly identified as an emerging football nation. Fourth-place finishes at the last world under-17 championships and Olympic Games, combined with an appearance in the last eight at World Cup 2002 make this point all but irrefutable. No longer does the US have to rely predominantly on naturalised citizens and first-generation Americans to lead the squad While it is true that the US's best young male athletes still choose to play sports such as American football, basketball, ice hockey, and baseball ahead of football, the figures are not nearly as lopsided as they were even a decade ago. No longer does the US have to rely predominantly on naturalised citizens and first-generation Americans to lead the squad. Young stars such as Landon Donovan, DaMarcus Beasley and Clint Mathis represent the emergence of a generation of outstanding American athletes who chose football above all other sports, with no family or historical ties to the game. Finally, the US's success at World Cup 2002 proved the old axiom that the country loves a winner. After the victory over Portugal in their opening game, the World Cup suddenly became the thing to watch and follow in the US. This momentum built rapidly through the first round, then the victory over Mexico, and finally to the competitive quarter-final defeat by Germany. Television ratings and media coverage vastly improved along the way. Football, or rather soccer, was a word on the lips of Americans more than at any other time in the nation's history The defeat by Germany ranks not only as the most watched football match in the history of the television network which broadcast it live, but also as cable television's highest-rated morning broadcast of all time among men age 18 to 34. The last statistic is most significant, because it is exactly that audience that football is looking to for future growth in the country. American males who follow football passionately are seen as the group to move the game past the tag of "niche" to "major sport" in the United States. In June 2002, football, or to be more correct soccer, was a word on the lips of Americans more than at any other time in the nation's history, USA 94 included. In reality, most of those who professed to love the US squad will have forgotten the names of every member in a couple of months. But there is no doubt that the sport has greatly increased its fan base in the United States. More players, more supporters, more ticket buyers and more television viewers. Football is still a very long way from laying claim to be the number one sport in the USA, but it is now a great deal closer than it was just one month ago.
Character Concept Art for Blizzard's Overwatch Blizzard recently announced the development phase of the new franchise Overwatch, a multi-player, futuristic shooter. Arnold Tsang created the concept art for the game's varied characters, which each represent their own class. Check out the characters and let us know: which one do you want to play first?
Conformon From a biological standpoint, the goal-directed molecular motions inside living cells are carried out by biopolymers acting like molecular machines (e.g. myosin, RNA/DNA polymerase, ion pumps, etc.). These molecular machines are driven by conformons, that is sequence-specific mechanical strains generated by free energy released in chemical reactions or stress induced destabilisations in supercoiled biopolymer chains. Therefore, conformons can be defined as packets of conformational energy generated from substrate binding or chemical reactions and confined within biopolymers. On the other hand, from a physics standpoint, the conformon is a localization of elastic and electronic energy which may propagate in space with or without dissipation. The mechanism which involves dissipationless propagation is a form of molecular superconductivity. On quantum mechanical level both elastic/vibrational and electronic energy can be quantised, therefore the conformon carries a fixed portion of energy. This has led to the definition of quantum of conformation (shape). References Category:Physics
Follow Blog via Email Girl Scout Activities You Can Do from Home! So you’re stuck at home, and suddenly regretting all those times you begged your parents to skip school. Maybe you’ve been staring outside your window, yearning for the great outdoors, or maybe you’ve just been missing a little bit of Girl Scout sisterhood. Don’t fret! You may be social distancing, but Girl Scouts is not cancelled! You can be a Girl Scout anywhere, even from at home. There are plenty of things you can do to keep your Girl Scout spirits high, and we collected some of them for you here! Explore the Outdoors in Your Own Backyard Cross off 15 outdoorsy tasks from this list—like fort building, learning about springtime flowers, playing with a pet outside, and so much more—to earn the BackyardFunChallenge! Make sure to always follow the Safety Activity Checkpointswhen doing the challenges, and remember to wash or sanitize your hands after being outside. Tips on Hosting a Virtual Girl Scout Troop Meeting While we can’t be in-person, keep your Girl Scout troop connected through online meetings to keep girls engaged with one another, while keeping safe. Here are some tips on how to run a productive, fun and engaging online meeting. Choose a virtual platform: There are several different virtual tools you can use to host an online meeting. Here are several suggestions to help you. Keep Girls Connected: Designate the first 10 minutes to have girls share what they’ve been up to and how they are feeling. This will keep girls socialized and engaged with one another. Prepare: Create an agenda and a purpose for your meeting with the girls. Ask each parent to complete the Girl Scout internet safety pledge. Make it Girl-led: Have girls choose a topic they are interested in discussing or learning about and create a simple action plan. Use Online Resources: Take advantage of learning tools online! From Virtual Field trips to online patch programs there are multiple activities you can do with your girls. Don’t Forget the Volunteer Toolkit! Troop Leaders, don’t forget you can support your troop activities from afar! Look to the Volunteer Toolkit (VTK). Download pdfs of the badges your troop is working on and send them off to parents and caregivers. Easy and simple way to keep the Girl Scout fun going for your troop! Girl Scouts Take the Lead in a Time of Need Are you looking for ways to help others while you are home during the next couple weeks? Here are a few options to consider: As part of our Silver Lining patch program in partnership with BCBSIL, please consider sending letters, cards, emails, or drawings to senior citizens at retirement homes or centers. Although it is not recommended to visit during this time for the safety of the elderly, it would be a nice gesture to reach out and send some cheer their way. Do you have a neighbor or family member who lives alone? Take some time out of your day to call or video chat with them. You can see if they need anything, but it is also just nice to hear from someone in this time when we are all stuck at home. Human interaction is important! Check out littlefreepantry.org to see if you could set up or support a food resource for others in need. Send cards of thanks to healthcare workers like this group of Girl Scouts from Naperville. Big thanks to Brownie troop 55693 in Naperville for the thoughtful cards and delicious @girlscouts cookies for our Emergency Department staff. Generous gestures like this go a long way. pic.twitter.com/Er8FzowSyc Tell Us What You’re Up To! Whether you’re writing thank-you letters to your local hospital staff and doctors, learning all about different plant species around the world, completing a Patch Program, or spending time with loved ones, we want to know what you’re up to! Share your story with us here. Resources from around the web! We’ve compiled some resources from around the internet including websites, podcasts, YouTube channels, and apps. You can take virtual tours, play games, practice a foreign language, and so much more!
Regular Home Maintenance Your home is one of your biggest investments. The best way to protect that investment is to conduct regular inspections and keep your home maintenance up-to-date. Setting up a routine maintenance schedule will not only keep your home in top shape, it will also help you to prevent small problems from becoming bigger and more costly issues. During the summer, there are a number of indoor and outdoor maintenance tasks to look after. Some of these include repairing walkways and steps, painting, and checking your chimney and roof. Keep in mind that it’s not necessary to take care of these tasks all at once. In fact, the work won’t feel as overwhelming if you spread the chores out over the summer months. Start by doing an assessment of what needs to be done. Take a walk around your home and check for, and seal off, any holes in the exterior cladding (but not the small vent holes found at the bottom of brick walls) that could be an entry point for rain or small pests such as bats or squirrels. Next, inspect the condition of your roof — by using binoculars from the ground — and note any sagging that could indicate structural problems. If you do notice sagging, you may need to investigate further from inside the attic or hire a qualified contractor to do a more detailed inspection. While you are examining the roof, note the condition of your shingles to see if any need replacing, and examine all roof flashings, such as those at the chimney and roof joints, for any signs of cracking or leakage. Summer is a good time to clean or replace your air conditioning or furnace filter, and wash or replace your ventilation system filters if necessary. Take the time to ensure that the outdoor air conditioning unit is free of leaves and other debris that could block airflow. Windows are another important component of your house that requires regular attention. This might be an ideal time to give them a thorough cleaning, re-caulk if necessary and repair any damaged screens. A common summertime issue for homeowners is moisture problems caused by high levels of humidity — especially in the basement. Check your basement pipes for condensation or dripping, as this can often be a sign that the humidity in your basement is too high and you need to take corrective action to reduce humidity. It’s a good idea to monitor your basement humidity and avoid relative humidity levels above 60%. But instead of guessing whether or not you have a humidity problem inside your house, you can get a small, inexpensive and easy-to-use instrument called a hygrometer and place it in your basement. If you discover the moisture levels are too high, deal with any leaks or other moisture sources and consider using a dehumidifier to maintain safe relative humidity. Insulating your cold water pipes will also help. Once you’ve got your routine down, regular home maintenance will be easy. To help you with your summer chores, and to keep your home in top shape all year round, Canada Mortgage and Housing Corporation (CMHC) has a free About Your House fact sheet entitled Home Maintenance Schedule. Remember your home protects your family, be nice to your home, your home will in turn be nice to you.
footer .container.text-center p.pull-left © 2016 Company, Inc. All Rights Reserved ul.pull-right.list-inline li a(href='https://github.com/sahat/hackathon-starter') GitHub Project li a(href='https://github.com/sahat/hackathon-starter/issues') Issues
The Searchers Fun Features This is the section for all our "FUN" The Searchers information - please enjoy! Did You Know? … Natalie Wood played the role of Debbie the girl kidnapped by the Commanche but it was her sister Lana Wood who is seen as the young Debbie at the beginning of the movie. This was Lana Wood's first credited movie appearance. … John Wayne often gave his children small roles in his films. The Searchers was Patrick Wayne's first real speaking role. He plays a young military man who comes to speak with Ethan and Reverend Clayton (Ward Bond.) ... You can listen to Tex Ritter sing The Searchers theme song (What makes a man to wander / What makes a man to roam? / What makes a man leave bed and board / And turn his back on home? / Ride away (Ride away), ride away (ride away), ride away / Now, a man will search for fortune / Of silver and of gold / The silver he finds in his hair / While a weary heart grows old / Ride away , ride away , ride away / The snow is deep and oh, so white / The winds they howl and moan / Fire cooks a man his buffalo meat / But his lonely heart won't warm / Ride away, ride away, ride away) ... The American Film Institute has named The Searchers as the number one western of all time It is interesting to see that in 1997 when they compiled their list of top 100 movies The Searchers was number 96. In the newest listing (2007) The Searchers shot up a whopping 84 slots to become number 12. That is the biggest move up in ratings made by any movie. ... the final scene of the movie was ad-libbed by John Wayne as homage to good friend and fellow actor Harry Carey who had recently died. As John Wayne stands in the doorway he grabs his right arms and stands there for a minute. This was Carey's signature stance. You can watch it here: The Searchers On Location John Wayne and Natalie Wood are two of the many legendary celebrities to leave hand and footprints outside the famous Grauman's (now Mann's) Chinese Theater. Hollywood Walk of Fame Star In the early 1960's, the Hollywood Chamber of Commerce developed the idea of the "Hollywood Walk of Fame." The sidewalks of the most famous streets in the heart of Hollywood were lined with "stars" recognizing celebrities' life-long contributions to the entertainment industry. Receiving a star is still to this day considered a huge honor. Here's where you can find the stars of The Searchers celebs John Wayne, Natalie Wood, Ward Bond and director John Ford:
A letter from Sgt. Bowe Bergdahl of Hailey was obtained by the International Committee of the Red Cross and provided to the Bergdahl family. It is unclear when the letter was written but the family believes it was a couple of months ago, according to an email sent from Bergdahl's father, Bob Bergdahl, to Dwight Murphy, spokesman for the Boise Valley POW/MIA. "Our family is greatly relieved and encouraged by this letter, which gives us hope that Bowe is doing as well as can be expected under the circumstances," Bob and Jani Bergdahl wrote in a statement released Thursday by Col. Timothy Marsano of the Idaho National Guard. Marsano acts as the family's spokesman. "He was scripted and redacted but he was no doubt alive and his faculties fully functioning as of two months ago," Bob Bergdahl wrote in the email. Bowe Bergdahl, now 27, was captured in Afghanistan on June 30, 2009, only two months after he was deployed as a machine gunner. He is believed held by the Haqqani network, a Pakistani group aligned with the Taliban. A senior Haqqani official last December denied the group had Bergdahl, saying he was being held by a Taliban group. Bergdahl was reported missing after failing to show up for roll call. Since his capture, the Taliban has released five videos in which Bergdahl called for an end to U.S. involvement in the war and called for the release of Afghan prisoners held by the U.S. Military officials in the United States dismissed the videos as propaganda. Bergdahl's family thanked the Red Cross for its assistance during Bowe's nearly four years in captivity, and also thanked the many Idahoans and others who have supported efforts to free their son. "We hope Bowe's captors will again consider his parents' plea to release him, but in the meantime, we ask that you please continue to keep him in good health and allow him to keep corresponding with us," the Bergdahl family wrote in its statement. Murphy said there was no doubt of the letter's authenticity. "They know it was from their son," said Murphy, who served in the U.S. Marine Corps from 1976 to 1982. "Bowe Bergdahl is alive and there is hope to bring him home." Yellow ribbons continue to adorn trees and light poles in Hailey to call attention to Bergdahl's plight. Several events are scheduled June 22 in Hailey to mark the fourth anniversary of Bergdahl's capture. The day will be capped off by a tree dedication in Hop Porter Park. Four trees -- one for each year of Bergdahl's time as a prisoner -- will be planted. There will also be a 5-kilometer race, speeches by Blaine County officials and musical entertainment. The Boise Valley POW/MIA will ride motorcycles to the event. Bob Bergdahl is scheduled to join the group in Hailey and ride his son's motorcycle. Separately, thousands of motorcyclists are expected to take part June 13 in a New Hampshire ride dedicated to Bergdahl. The annual Freedom Ride organized by the Northeast POW/MIA Network calls attention to prisoners of war and service members missing in action. The group travels 13 miles from Gilford to Meredith, N.H. The Associated Press contributed to this report.
Intrinsic photoaffinity labeling probes for cholecystokinin (CCK)-gastrin family receptors. D-Tyr-Gly-[Nle28,31,pNO2-Phe33)CCK-26-33). Attempts to biochemically characterize the pancreatic cholecystokinin (CCK) receptor by affinity labeling have utilized either 125I-Bolton-Hunter-CCK-33 ("long" probes) or decapeptide analogues of the carboxyl terminus of CCK ("short" probes), and covalent attachment via the amino-terminal regions of these probes. The long probe has identified a protein of Mr = 80,000 while "shorter" probes, which have their site of cross-linking closer to the receptor binding region of the probes, have labeled a distinct protein of Mr = 85,000-95,000. To extend and complement these observations, we have designed and synthesized a new probe for the CCK receptor which incorporates a photolabile p-nitrophenylalanine moiety within the theoretical receptor-binding region of the hormone, as its carboxyl-terminal residue. This "intrinsic" photoaffinity labeling probe has been shown to possess full biological activity, with potency and efficacy in stimulating amylase secretion by dispersed rat pancreatic acini similar to that of CCK-8 (CCK-26-33). When iodinated oxidatively, this probe binds rapidly, in a temperature-dependent, reversible, saturable, specific, high affinity manner to enriched pancreatic plasma membranes. In this work, we have used this probe to specifically label the CCK binding site on rat pancreatic plasma membranes. The Mr = 85,000-95,000 protein previously identified with amino-terminal cross-linking of short probes appears to be the protein labeled with this reagent as well. This provides strong evidence that this pancreatic plasma membrane protein contains the CCK-binding domain of the CCK receptor. This intrinsic photoaffinity labeling probe should be quite useful for the characterization of the active site of this receptor and for other CCK and gastrin receptors in many species.
Enhancement of immobility induced by repeated phencyclidine injection: association with c-Fos protein in the mouse brain. Immunohistochemistry of c-Fos protein was performed to study changes in neuronal activity in discrete brain areas of mice repeatedly treated with phencyclidine (PCP) showing enhancement of immobility in the forced swimming test, this behavioral change being considered as avolition, which is one of negative symptoms of schizophrenia. Repeated treatment with PCP significantly prolonged immobility time in the forced swimming test, compared with saline treatment. The c-Fos protein expression of mice showing PCP-induced enhancement of immobility was increased in certain brain regions, such as the retrosplenial cortex, pyriform cortices, pontine nuclei, cingulate, frontal cortex and thalamus, compared with that of PCP-treated, non-swimming and saline-treated, swimming groups. These results suggest that increased c-Fos protein is involved in the expression of PCP-induced enhancement of immobility, and c-Fos expression plays a role in negative symptoms-like behavioral changes.
How to stay powered up as Hurricane Sandy comes down Maximize battery life and keep the data flowing as long as possible. Hurricane Sandy is shutting things down left and right: Google events, universities, public transportation, and plenty of offices (Ars not included). New York, New Jersey, Massachusetts, and Washington, D.C. have already had states of emergency declared and the worst of the storm is still to come. Yes, the biggest problem is safety. Be sure to abide by evacuation notices and, as some government officials will tell you, "don't be stupid." Power outages are also a distinct possibility for many areas affected by the storm—CBS News reported more than 67,000 were without power across 10 East Coast states this morning, CNN tweeted the number exceeded 300,000 within the last hour. But we know keeping connected is a major concern for the Ars community (and it could help anyone in case of emergency). Naturally, extreme weather tends to hit both data and talk hard. "There are a couple of problems with wireless in a hurricane, aside from power going out to cell towers," says Ars IT Editor (and Sandy target), Sean Gallagher (Baltimore, Maryland). "Rain fade is a big one—LTE and WiMAX bite it hard in heavy rain, as does satellite." Staying informed If you have functioning cable, Ethernet, WiFi, or LTE/your preferred data connection, this is pretty simple. But should that route go down, there are still ways to keep up to date with information. (Still, meaning beyond that battery powered or hand-cranked radio "everyone" has lying around.) The government actually has an entire page set up to outline tech preparedness during an emergency. This includes some basic recommendations—download the FEMA app for preparedness tips, get the same info via text by sending "PREPARE" to 43362 (4FEMA). It lists a few common-sense tips as well: If you are unsuccessful in completing a call using your cell phone, wait 10 seconds before redialing to help reduce network congestion. If you lose power, you can charge your cell phone in your car. Just be sure your car is in a well-ventilated place (remove it from the garage) and do not go to your car until any danger has passed. You can also listen to your car radio for important news alerts. If you have a traditional landline (non-broadband or VOIP) phone, keep at least one non-cordless reciever in your home because it will work even if you lose power. Immediately following a disaster, resist using your mobile device to watch streaming videos, download music or videos, or play video games, all of which can add to network congestion. Limiting use of these services can help potentially life-saving emergency calls get through to 9-1-1. You can also get non-FEMA Twitter updates sent directly to you by sending "Follow [username]" to 40404 on a US-based phone, regardless of whether you have a Twitter account of your own. (@twc_hurricane is sending out a variety of messages including storm accounts and updated safety information.) Staying charged Charge your devices while you can of course, but energy saving strategies for your phones, computers, and tablets will prove vital should power cut out. Ars Social Editor Cesar Torres dove deeper into the land of battery misery with an iPad in the Spring, but the broader tips there work well across devices: Screen brightness eats power for breakfast. Keep it as low as you can for comfortable reading. (And remember, some devices even offer voice options that will allow you to nearly dull the screen entirely.) Utilize Wi-Fi or data only when it's necessary. Airplane mode keeps you powered on longer. Eliminate unnecessary automated actions such as notifications or location services, and definitely eliminate unnecessary apps or programs that may be sitting idle in the background. Ultimately, you may be forced to make a decision about what device is most valuable. So make sure you have contingency plans to keep those going even if it takes the juice of other hardware. "My strategy is to charge up every conceivable device, and use my phone to tether Internet when the power goes out," says Ars Senior IT Reporter Jon Brodkin (Massachusetts). "And I have a couple computers capable of charging my phone via USB from their battery reserves. (I'll do some car charging of the phone if necessary too.)" Have other tips to share for our East Coast Arsians? Share them in the comments (then make sure to save a cache or PDF of this piece for reference). If someone was to do that, they should have done it a LONG time ago -- not now. There were probably none for sale (even at outrageous prices) this entire past weekend. Unfortunately true. The time to prepare is not when a disaster is looming -- because sometimes you don't get notice. That said, those preparing now are still doing a lot better than those who aren't preparing at all. For those who are generator shopping for some future event, get one with an inverter. They are more expensive, but you really don't want to try to charge your phone off the $300 Home Depot special. Other useful items are solar powered battery chargers (for devices with removable batteries like AA and AAA) and wind-up dynamo items. Last time the power was out for a week here, having a wind-up camping lantern was super-helpful even though I had the generator for the freezer and essentials. Not so useful -- wind-up phone chargers. Better than nothing, but you'll be getting your exercise. How well do some of those external battery packs that provide power via USB work? Just fine, or is there anything to to trip you up about them? I have a Mophie JuicePack and it works pretty well, but you have to make sure to keep it charged and/or charge it semi-frequently. It tends to lose juice over time even if you're not plugging anything into it (I'm talking over a period of months, roughly). So if I haven't used it for 1.5 months and I'm about to go somewhere where I might need it, I try to charge it up again to make sure it's topped off. Unfortunately true. The time to prepare is not when a disaster is looming -- because sometimes you don't get notice. That said, those preparing now are still doing a lot better than those who aren't preparing at all. For those who are generator shopping for some future event, get one with an inverter. They are more expensive, but you really don't want to try to charge your phone off the $300 Home Depot special. You touch upon a good point--Most portable generators don't provide conditioned power, and extended use will shorten the life of devices plugged into them (Ask any contractor that does work at jobsites without electrical utilities). My neighborhood can be hard hit (have had no power for over a week on multiple occasions), and living in a condo does limit options. A good UPS system will go a long way for keeping power to charge the minimal devices. Candles and oil lamps (when used with common sense) provide light for long periods of time. Luckily, I have never lost gas, so my range can be used, if matches are available to light. For those without, a good camp stove can work in a pinch (I try to be well prepared). I have a portable Briggs & Stratton 5000W generator; ran me about $700 and was purchased after Isabel cleaned house back in 2003. To date, I've used it over four significant power outages (3 or more days) to power kitchen appliances, medical equipment, and our home network (Cox modem, wireless-N router to devices). No issues whatsoever in terms of connection and equipment charging. Other prep ideas: on hand cash, propane or charcoal grill for cooking and heating water, a bright lantern for the bathroom, pre-frozen blocks of ice in the freezer/fridge (gallon water jugs filled 3/4 full, then frozen), extra gasoline for gas-fired generator, and last but not least, a roll of quality duct tape. Is using a car inverter to recharge an UPS to run a cable/dsl modem/router a feasible option? The one I've got is rated for IIRC 1000W AC out if I used the alligator clamps to connect directly to my cars battery (cig adapter is only 100W); so I know it can deliver enough power to do the charging. That leaves if I can pull a full ups charge (I've got 500 to 1300Va units) out the battery while the car's turned off; or if the inverter could keep up even when the engine is running. Techwise, a UPS with a decent battery may be able to run/charge some of your less demanding gadgets during a power outage. I've been meaning to get a UPS, whose sole purpose would be to power the cable model and the router. That way I could still use my laptop (with it's fully charged battery) to get online while the power it out. Cellular tethering is, at least in my experience, not really an ideal option. Every time I've tried it I've found it to drain the battery faster than a Hummer goes through gas, and the phone gets uncomfortably hot to boot. Unless you absolutely positively have to do something that you just can't do directly from your phone. Bored Koi wrote: Other prep ideas: ... propane or charcoal grill for cooking and heating water ... I keep a propane cylinder in the basement, even though I don't even have a propane grill. I have one of those attachments that let's you use it as a heater. One of my concerns is an extended power outage during the depths of winter, preventing our furnace from running. Off topic, but a camp stove is always handy to have during these emergencies. Also, a cooler box, bottled water, batteries, flashlights, matches, blankets, gasoline, etc. Techwise, a UPS with a decent battery may be able to run/charge some of your less demanding gadgets during a power outage. Definitely a good call on some basic supplies. The best use of a UPS I ever came up with was during a winter power outage at home. After I powered down all the computer and network equipment it was getting a little chilly... One long extension cord later and I was brewing coffee and hot chocolate for me and my GF. ;-) What we have around my house:Non-perisable food for a weekBottled water/jugs of water for drinking and sanitationCandles and matches/lighters (save batteries for radios and other devices)Small generatorPower Inverter for the carExtra GasolineExtra Toiletpaper and paper towelsPlastic bagsTrashbagsBlanketsHand SanitizerExtra BatteriesFlashlights (just in case it isn't safe for candels/open flame)Wet WipesTopped off the cars with gasAt least a week worth of medicationsBattry powered radioGPS in case of evacuation or to find a shelter (new to the area and don't know way around yet)Emergency medical kit Techwise, a UPS with a decent battery may be able to run/charge some of your less demanding gadgets during a power outage. I've been meaning to get a UPS, whose sole purpose would be to power the cable model and the router. That way I could still use my laptop (with it's fully charged battery) to get online while the power it out. Unless your hardware's significantly more efficient than mine (Isp's favorite brand cable modem and no-name router running DDWRT), running networking gear on an ups is at best a medium term solution. Based on the incremental rundown time I saw over ~90 minutes during an extended outage last year my large 1300VA ups would have been able to give about 12 hours of modem and router runtime. Biolite stoves. It's a small(ish) camp stove with a forced-air fan (hotter, cleaner burn) and a peltier. Cranks out, as I recall, 400mA or so at 5v. Won't exactly keep you running 24/7, but it'll charge your USB device. And, of course, it still acts as a stove. You just need a supply of burnables; twigs, paper, wood chips...just about anything will work. Ars should work up a tech-centric emergency preparedness kit. A lot of sites have good "survival" info (how to stay warm, how to make water drinkable, etc), not so much for how to stay connected. Maybe test generators to see what's got the best fuel use, most power per unit of fuel, etc. Heating units; which last longest, are hottest? What should be on the generator in your house? The UPS? How can they be hooked up? What faraday/dynamo flashlights are brightest? Longest lasting? A quick protip about UPSes - You can do a quick and dirty estimate of how long they'll last with a particular load if you know the load in watts. the "VA" ranking is the total amount of energy a UPS can contain without considering power factor. DC wattage can be considered equivalent to VA. Any time you're working with watts on a consumer device, it's really watts per hour. So if you're running a device that draws 5v, 500mAh (2.5 watts) from a wall wart that has 80% efficiency, you're going to be pulling 2.5/.80 = 3.13 watts. If you have a UPS that maxes out at 500VA, you're pretty well set with your mobile devices for quite awhile. https://discussions.apple.com/message/18288537#18288537 This post discusses the power an ipad charger uses, it claims the charger can use up to 10 watts. This translates to a 500VA battery backup being able to run an ipad charger for about 50 hours - or 40 if you assume 80% efficiency. My cable modem draws 12v, 750 mah DC or 9 watts/hour. A spare router of mine draws 12v, 1a or 12 watts/hour. Running a cable modem, wifi router, and ipad charger combined would result in a load of 31 watts/hour, or 38.75 if you assume the wall warts convert AC to DC power at 80% efficiency. This would mean that your 500VA battery backup would run this load for 500/38.75 = ~13 hours. I hope this helps! If I have any huge math errors, please point them out. Try and find one hours before a storm hits, or better yet, after the fact. Good luck. If you don't already have one, you're out of luck. Hurricanes, unlike tornado's, are forecast weeks in advance (with variable tracking paths). As I live in Florida (a state that has seen its fair share of hurricanes) I can say with confidence that by the night prior to this storm hitting, all store shelves were nearly bare, hardware supplies were gone, and anyone who waited till the last minute to prepare is SOL. That's why I have a natural gas generator, natural gas for my stove and dryer, and a nice propane grill. Should a storm hit here, I'll have refrigeration, A/C, and electric thanks to my generator along with the ability to boil water on my stove thanks to natural gas. If you live on the coast you need to be prepared at all times (just like folks in tornado prone areas tend to have storm cellars). Any coastal region can be hit by storms like these. At least this is only a category 1 storm. I've been through much worse in the nearly 40 years I've lived in Florida. Quote: A quick protip about UPSes - You can do a quick and dirty estimate of how long they'll last with a particular load if you know the load in watts. the "VA" ranking is the total amount of energy a UPS can contain without considering power factor. DC wattage can be considered equivalent to VA. True, but this is also where a Kill-a-watt meter comes in handy. This way you know exactly what your equipment pulls when in use. I only have a UPS to protect against over voltage and brownouts since I have a big whole home generator. Aside from the difficulty obtaining one as the storm is bearing down, which others have pointed out, generators aren't really a good choice for folks in urban environments, since they they tend to make some very rudimentary and stupid mistakes when running them. Generator-related fatalities occur during most Gulf Coast hurricanes, because some people run the damn things indoors. If you're in an apartment, tossing the genny in a bedroom and cracking the window is NOT going to keep you from spreading fumes throughout your building. Yeah, seems obvious, lol generators go outside, but people tend to become pretty stupid when faced with disasters. Just "buy a generator" doesn't help if you don't have a safe place to store and run it, along with a similarly safe place to store its fuel supply. Aside from the difficulty obtaining one as the storm is bearing down, which others have pointed out, generators aren't really a good choice for folks in urban environments, since they they tend to make some very rudimentary and stupid mistakes when running them. Generator-related fatalities occur during most Gulf Coast hurricanes, because some people run the damn things indoors. If you're in an apartment, tossing the genny in a bedroom and cracking the window is NOT going to keep you from spreading fumes throughout your building. Yeah, seems obvious, lol generators go outside, but people tend to become pretty stupid when faced with disasters. Just "buy a generator" doesn't help if you don't have a safe place to store and run it, along with a similarly safe place to store its fuel supply. Besides those problems, you also have the issue of getting gas. If the whole area is generally suffering from a lack of power, the likelihood of getting gas is nebulous at best. When Wilma hit Florida, there were only a handful of gas stations that had backup generators to run their pumps. You could literally spend three to five hours in line just to fill a few gas cans for your portable generator. Florida passed a law requiring all gas stations to have emergency generators on hand after Wilma. Still, most don't have them, and enforcement is disgustingly lax. So, you really need to be prepared well before hand. I've been meaning to get a UPS, whose sole purpose would be to power the cable model and the router. That way I could still use my laptop (with it's fully charged battery) to get online while the power it out. In an extended outage, it's quite possible your ISP won't have power either, at least not for long. Very unlikely. Telecoms must have backup generators by law. And I've yet to meet the cable company that doesn't have solid backup power either. What will be affected is wireless. Internet access and POTS will generally be up and working. After Wilma, my land line worked just fine, as did my Internet when I was using my (at the time) portable generator to power my PC. Wireless was spotty, and electric was out for nearly a month. Aside from the difficulty obtaining one as the storm is bearing down, which others have pointed out, Maybe not so hard to get, according to Yahoo!, they are still selling generators today at Home Depot and Lowes. I imagine if power failures occur, then it gets diffiicult to purchase a generator. What do you mean by "according to Yahoo?" Like, are you reading a story talking about them being available, or does Yahoo! return stock status for local stores? I know that in the past any time I've been faced with a major storm, all the local stores are out of generators. Because every year there are people like me who failed to get them before the last storm, who suddenly decide to get prepared...at the last minute. Same as trying to find an air conditioner (particularly specific form factors, sizes, etc) right before a late summer heat wave. Good point from Lee, too, that generators don't necessarily work for everybody, especially in urban areas. One thing to watch is many UPS units will not turn on again once they have been powered off if there is no AC present at the outlet. So if you power it off to save the battery and then attempt to power it back on, it won't fire up. A better option is a good quality sine wave inverter, 500-1000 watts, and a deep cycle battery that you can store in the garage attached to a trickle charger. This way you can use it as needed, and power it off when done, and a true sine wave inverter will have a much higher conversion efficiency, though they will cost more. Don't get a bigger inverter then you will need as it'll just eat more power, think of it like a computer power supply, oversized it'll just waste power. A good deep cycle battery will set you back couple hundred but it'll far outlast the batteries in a UPS, and it'll work when you need it. Combine that will LED lightbulbs in the 3-5 watt range and you'll have light and power to charge devices as needed for quite some time. This is especially handy if you are somewhere that you can't use a generator. As many have said, basic food stuffs for a week, water, first aid, and a good camping stove are high on the list. I like the pressure fed multifuel camp stoves, they can burn gas, white gas, kerosene etc and will put out a lot of heat. However a 5 gallon bottle of propane and an adapter for a small propane camp stove, will last a long while too. Hiking boots and a good pair of work gloves are another good thing to have, most people forget how important it is to get around a torn up area if you don't have footwear that will protect your feet or gloves to save your hands. It's generally a good idea to go over your gear a couple times a year, the time changes are a good time to go over everything again. One more hint: turn your computer (preferably a laptop) on, login, and turn off all your unnecessary programs, taskbar items, etc. and set your power settings to maximize battery life, reduce your display brightness, turn off unnecessary Bluetooth, wireless, etc. Then let the computer go to standby/hibernate while still being plugged in and charging. Your computer uses a bit of power to boot up (particularly with hard drives), so this will save you some juice if the power goes out, and your settings will prepare you for a longer, if slower and dimmer, haul. Also, wash your clothes and dishes while you have power because you might not be able to later on. In the same line of thought, have your emergency stuff out so that you can see and access it if the lights go out. Maps and such are also good if you're in a non-urban setting. While not for everyone I love my oil lamps. The soft glow of fire to read read by. A couple of solar chargers also help to top off phones and pads. Last and decidedly not for everyone a hatchet. Mine has been used to help clear roads, and get cars unstuck. During one ice storm I was driving a small generator to my mothers. Only 2kw but enough to turn the fridge on and relight the furance and hot water tank(they were gas). I literally had to chop and dig my way through the back roads. The biggest issue there is to make sure it's a decent quality inverter, a lot of the crap ones sold at Lowe's etc, put out power that more square wave then sine wave. You need a decent modified sine wave inverter at the minimum in order to run a charger like a ups has properly, or you can damage it. If you are going to buy an inverter, go for quality over wattage, a good inverter will cost more for fewer watts but your electronics will work a lot better on it.
# Translation of OpenERP Server. # This file contains the translation of the following modules: # * l10n_it # # Translators: msgid "" msgstr "" "Project-Id-Version: Odoo 8.0\n" "Report-Msgid-Bugs-To: \n" "POT-Creation-Date: 2011-12-23 09:56+0000\n" "PO-Revision-Date: 2015-05-18 11:32+0000\n" "Last-Translator: <>\n" "Language-Team: Spanish (Ecuador) (http://www.transifex.com/odoo/odoo-8/language/es_EC/)\n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: \n" "Language: es_EC\n" "Plural-Forms: nplurals=2; plural=(n != 1);\n" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_cash msgid "Liquidità" msgstr "" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_expense msgid "Uscite" msgstr "" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_p_l msgid "Conto Economico" msgstr "" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_receivable msgid "Crediti" msgstr "" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_view msgid "Gerarchia" msgstr "" #. module: l10n_it #: model:ir.actions.todo,note:l10n_it.config_call_account_template_generic msgid "" "Generate Chart of Accounts from a Chart Template. You will be asked to pass the name of the company, the chart template to follow, the no. of digits to generate the code for your accounts and Bank account, currency to create Journals. Thus,the pure copy of chart Template is generated.\n" "\tThis is the same wizard that runs from Financial Management/Configuration/Financial Accounting/Financial Accounts/Generate Chart of Accounts from a Chart Template." msgstr "" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_tax msgid "Tasse" msgstr "" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_bank msgid "Banca" msgstr "" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_asset msgid "Beni" msgstr "" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_payable msgid "Debiti" msgstr "" #. module: l10n_it #: model:account.account.type,name:l10n_it.account_type_income msgid "Entrate" msgstr ""
Topics A divided U.S. Supreme Court handed down a victory Wednesday for black legislative leaders in Alabama, and the decision may signal a coming win for Virginia Democrats fighting Republican-drawn election maps here. The court's 5-4 decision sends Alabama Legislative Black Caucus v. Alabama back to the federal district court there with an admonition that the case be re-argued. Plaintiffs there argued that Alabama legislators unfairly packed minority voters into districts to dilute black voting strength elsewhere. A federal judicial panel in the state disagreed, but the U.S. Supreme Court vacated that decision Wednesday. A three-judge panel in Virginia decided just the opposite in a... Del. Joe Morrissey says his move into the city of Richmond, back into the Democratic party and into a primary contest for in state Senate that sprawls from Richmond south to Hopewell and Petersburg and beyond is coming because he thinks he can get more... Military leaders over the past week have sharpened warnings that force readiness is unraveling and it could plummet if Congress allows the next round of defense cuts mandated by the 2011 Budget Control Act (BCA), with its sequestration tool, to take... Drawing representative district lines to favor the political party in power is nearly as old as the republic itself. It's a strategy both Democrats and Republicans use to protect majorities and which allows prominent incumbents to all but ensure... Virginia state Del. Joseph Morrissey, D-Henrico, will resign his seat in the General Assembly in the wake of his conviction on a misdemeanor charge involving his relations with a 17-year-old girl. But he plans to run in a special election for his own... In a way, the incumbent and challenger in one of Virginia's most closely divided congressional districts, the 2nd, agree on the big point: Washington is broken.But Rep. Scott Rigell, R-Virginia Beach, and Democratic challenger Suzanne Patrick disagree... RICHMOND — Virginia seems headed for a ho-hum election Tuesday, with little on the ballot to inspire passion, or turnout. Most people will see three things: The U.S. Senate race between incumbent Democrat Mark Warner and Republican Ed Gillespie, an... RICHMOND, Va. — Virginia Gov. Terry McAuliffe had run out of options to pull off his marquee campaign promise to expand Medicaid under the Affordable Care Act. Even a risky plan to circumvent the legislature had fallen apart. That's when the governor,... Republican Ed Gillespie attacked U.S. Sen. Mark Warner for discussing the possibility of a federal judgeship for the daughter of a Democrat who was on the verge of quitting the evenly split Virginia state Senate and throwing control to the GOP. In the... RICHMOND — The son of a former state senator has told federal investigators that U.S. Sen. Mark Warner discussed the possibility of several jobs, including a federal judgeship, for the senator's daughter in an effort to dissuade him from quitting the... RICHMOND, Va. — Virginia Gov. Terry McAuliffe's chief of staff left a voice-mail message for a Democrat who was on the verge of quitting the General Assembly in June, saying that the state senator's daughter might get a top state job if he stayed to... The race for the Senate pits a governor-turned-senator who prides himself on his willingness to work across party lines against a former head of the Republican National Committee who says it's time to break Senate Majority Leader Harry Reid's grip.Sen.... The Republican caucus has taken firm control of the state Senate’s committees, in the wake of Phil Puckett’s resignation, which threw control of the body to the GOP. The changes came on a voice voice last week -- and since committees have the power to... Norfolk Democrats have their candidate to replace Algie Howell in the 90th House of Delegates district: Local attorney Joe Lindsey. Lindsey bested two other candidates over the weekend. No word yet on a Republican / Libertarian / Independent candidate in... Senate Democratic Leader Richard Saslaw has signaled repeatedly - and sometimes just outright said - that he doesn't see any movement coming on the state's budget impasse until after the new fiscal year starts July 1. And with the news this morning... Republican politicos are a bit reluctant to say it out loud, but many are furious over what they see as a politically motived prosecution of one of their stars, former Gov. Bob McDonnell. The trial — and now the conviction — added fuel to a fire... At the center of the fall campaigns, from the presidential race on down, is whether to extend all or some of President George W. Bush's temporary tax cuts which are set to expire at the end of the year.President Barack Obama wants the Bush-tax cuts to... Were you paying attention to the pop culture in 2011? It was certainly an eventful year, with pop stars and talk show hosts grabbing headlines and a colorful cast of Republican presidential hopefuls jockeying for position. Here's a little test to make... UPDATE: Gov. Bob McDonnell late Thursday said he would sign the redistricting legislation passed by the General Assembly "as soon as it reaches my desk." In a statement, the governor said the legislation approved by state lawmakers earlier in...
School Rules We believe that children thrive on praise and every opportunity is taken to encourage good work and polite, social behaviour. Good work or achievement is regularly highlighted in our assemblies. Class teachers frequently award team points. We follow the Jenny Mosley Golden Rules: We are gentle - We don't hurt others We are kind and helpful - We don't hurt anybody's feelings We listen - We don't interrupt We are honest- We don't cover up the truth We work hard - We don't waste our own or others' time We look after property - We don't waste or damage things Rules to ensure safe, smooth running school day for everyone Children will not be admitted to the premises before 8:40am and they should not return to the site after leaving at the end of the school day, except to attend clubs or events organised for them. Morning Snacks. A healthy snack such as an apple, banana or carrot for mid-morning break is welcomed, but not sweets, crisps or chocolate biscuits. The children in Bee and Owl Classes are offered a piece of fruit or vegetable at morning playtime: this is free of charge. Money should not be brought to school except for dinner money, official collections or other school functions as and when they occur. Toys can only be brought in with the teacher's permission and children are not allowed to swap items in school. Jewellery and Watches. Rings, bracelets, earrings etc are not allowed as these have been known to cause accidents. In those few cases where children have pierced ears, they should wear plain studs only, please – and these must be removed by the child for PE. Children may wear watches, but it must be understood that they will be required to remove them for Games and PE and that the school cannot accept any responsibility for loss or damage.
[DO NOT PUBLISH] IN THE UNITED STATES COURT OF APPEALS FOR THE ELEVENTH CIRCUIT FILED ________________________ U.S. COURT OF APPEALS ELEVENTH CIRCUIT June 13, 2005 No. 04-16333 THOMAS K. KAHN Non-Argument Calendar CLERK ________________________ D.C. Docket No. 04-00135-CR-WTM UNITED STATES OF AMERICA, Plaintiff-Appellee, versus CHARLES GREGORY COLLINS, Defendant-Appellant. __________________________ Appeal from the United States District Court for the Southern District of Georgia _________________________ (June 13, 2005) Before CARNES, MARCUS and KRAVITCH, Circuit Judges. PER CURIAM: Charles Gregory Collins appeals his sentence of thirty months imprisonment, imposed following his guilty plea for possession with intent to distribute cocaine, in violation of 21 U.S.C. § 841. On appeal, Collins challenges the district court’s enhancement of his sentence as unconstitutional in light of United States v. Booker, 543 U.S. -, 125 S.Ct. 738, 160 L.Ed.2d 621 (2005). Collins was indicted for one count of possession with intent to distribute cocaine, in violation of 21 U.S.C. § 841 (count 1); possession of a firearm in connection with a drug-trafficking offense, in violation of 18 U.S.C. § 924(c) (count 2); and possession of a firearm by a convicted felon, in violation of 18 U.S.C. § 922(g) (count 3). Collins agreed to plead guilty to counts 1 and 2. At the change of plea hearing, the government proffered that Collins was stopped during a routine traffic stop and he attempted to flee the scene. After a struggle with police, Collins moved his hands toward his pants and pulled out a large bag of cocaine, which burst. Police placed Collins under arrest, and, during a subsequent search of the car, police found a handgun under the driver’s seat. Collins admitted that the factual proffer was correct, and stated that he possessed the gun that was found in the car, but he denied any prior knowledge that the firearm was there because the car belonged to someone else. Because Collins denied any knowledge of the gun, the district court did not accept the plea to count 2. The prosecutor and defense counsel then agreed that Collins would plead guilty to count 1 only. The plea agreement informed Collins that the presentence 2 investigation report (“PSI”) calculations would consider all conduct, even those counts that had been dismissed. In preparing the PSI, the probation officer recommended a two-level enhancement for possession of a firearm under U.S.S.G. § 2D1.1(b)(1). With a total offense level of 17 and a criminal history category III, the resulting guidelines range was 30 to 37 months imprisonment. Collins objected to the PSI, asserting, inter alia, that his enhancement for possession of a firearm was unconstitutional under Apprendi v. New Jersey, 530 U.S. 466, 120 S.Ct. 2348, 147 L.Ed.2d 435 (2000), and Blakely v. Washington, 542 U.S. –, 124 S.Ct. 2537, 159 L.Ed.2d 403 (2004).1 At sentencing, the district court overruled Collins’s objections and sentenced Collins to thirty months imprisonment and five years supervised release. We review a preserved challenge to a sentence de novo, but “will reverse and remand only for harmful error.” United States v. Paz, 405 F.3d 946, 948 (11th Cir. 2005). The burden is on the government to show that an error was harmless. Id. As this court recently explained, there are two standards for the harmless error analysis: one applies to constitutional errors, the other to “statutory” errors. 1 We now analyze this argument under Booker. 3 United States v. Mathenia, No. 04-15250, manuscript op. at 5-6 (11th Cir. May 23, 2005). In Booker, the Supreme Court applied the Blakely decision to the Federal Sentencing Guidelines, holding that the mandatory nature of the federal guidelines rendered them incompatible with the Sixth Amendment’s guarantee to the right to a jury trial. 125 S.Ct. at 749-52. The Court explicitly reaffirmed its rationale first pronounced in Apprendi that “[a]ny fact (other than a prior conviction) which is necessary to support a sentence exceeding the maximum authorized by the facts established by a plea of guilty or a jury verdict must be admitted by the defendant or proved to a jury beyond a reasonable doubt.” Booker, 125 S.Ct. at 756. The Court , however, explained that although the guidelines were advisory only, courts should consider the guidelines in addition to the sentencing factors in 18 U.S.C. § 3553(a), in determining a reasonable sentence. 125 S.Ct. at 764. Here, Collins challenges the district court’s enhancement of his sentence based on possession of a firearm. Under U.S.S.G. § 2D1.1(b)(1), the district court should increase the defendant’s offense level by two if the defendant was in possession of a firearm. U.S.S.G. § 2D1.1(b)(1). The commentary explains that this enhancement “reflects the increased danger of violence when drug traffickers possess weapons. The adjustment should be applied if the weapon was present, 4 unless it is clearly improbable that the weapon was connected with the offense.” U.S.S.G. § 2D1.1, comment. (n.3). Collins admitted during the plea colloquy that the gun was in his possession, and he offered nothing to show that it was clearly improbable that the gun was connected to the drug offense except to assert that he did not know the gun was present because the car belonged to someone else. Because Collins admitted that the firearm was present, there was no constitutional error. Booker, 125 S.Ct. at 756. Although there was no Sixth Amendment violation in this case, there is statutory error because the court imposed sentence under a mandatory guideline scheme. Thus, the burden falls on the government to show that the error was harmless. Mathenia, manuscript op. at 5-6. “A non-constitutional error is harmless if, viewing the proceedings in their entirety, a court determines that the error did not affect the sentence, or had but very slight effect.”2 Id. at 5-6 (citations and quotations omitted). Here, we cannot say that the government has met its burden to show that the error was harmless because we cannot determine from the sentencing transcript 2 The heightened “beyond a reasonable doubt” test applies to harmless error cases involving constitutional errors. United States v. Robles, No. 04-13598, slip op. at 2257 (11th Cir. May 10, 2005). Here, there is statutory, but not constitutional, error. 5 whether the court would have sentenced Collins differently had it known the guidelines were not mandatory, but advisory only. Because we do not know, the government has not met its burden. United States v. Petho, No. 04-15412 manuscript op. at 4 (11th Cir. May 18, 2005); United States v. Davis, No. 04- 14585 (11th Cir. May 4, 2005). Accordingly, we VACATE and REMAND for resentencing. 6
click to enlarge Maya Dukmasova In a classroom at the School of the Art Institute, the People’s Response Team recently held a workshop on the monitoring of interactions between citizens and police officers. click to enlarge Maya Dukmasova Despite plummeting temperatures last week, about two dozen people filled a classroom on the seventh floor of the School of the Art Institute one evening for a workshop on the basics of "cop watching." While the idea of observing police has become tightly linked in recent years with bystanders filming officers, the organizers of the training emphasized that cell-phone cameras aren't required to keep an eye on cops.The goals of cop watching, according to the workshop leaders, are to document—through videos, photos, and notes—interactions between citizens and police officers; to deter or deescalate police violence; and to make sure that a person stopped by police stays safe. The implication is not that every police stop is unwarranted, but that the work of police officers in the community can and should be observed by the public. The training was put on by members of the People's Response Team—a community group affiliated with the Black Lives Matter movement—which provides resources and assistance to the families of every person fatally shot by police in Chicago. Since 2014 the organization has seen its cop-watching trainings grow in popularity, in lockstep with the increasing public interest in police transparency and accountability."Every time we do it we get a full room," PRT member Monica Trinidad said.Last week's workshop focused on how to conduct oneself if one chooses to observe a police stop, and what to do if the cop being watched turns his or her attention to the watcher."This is for building confidence in situations when you're witnessing police violence or harassment and you're unsure of what to do," Debbie Southorn, another workshop coordinator, told the diverse group in attendance. "It's not a training that will give you all of the answers. It's not a solution to policing or white supremacy or antiblackness or Islamophobia. This is just a tiny step in building our capacity to act."The workshop leaders insisted that the best way to actively engage in observing police interactions is to be with at least one other person who can speak up on the watcher's behalf. "I highly discourage you from cop watching alone," Trinidad advised the group.Another element to successful cop watching is knowing one's rights. Southorn wrote three key phrases on the chalkboard: "Am I free to go?," "I do not consent to a search," and "I will not talk. I want my lawyer."Citizens are not required to continue interacting with officers if officers haven't physically detained them or placed them under arrest. In a stop-and-frisk situation, citizens can decline to consent to a search—which doesn't mean a cop will stop frisking, but stating one's opposition to the search can be helpful in court later. Legally, remaining silent during a search constitutes consent.Conversely, one's right to remain silent during questioning must also be affirmed. If you happen to be arrested and invoke the right to remain silent, any further conversations with officers—even a request for water or permission to go to the bathroom—is legally seen as a withdrawal of the invocation and anything you say further can be used by the police and prosecutors to build a case against you. Even after a brief and seemingly irrelevant exchange of words, one must restate one's desire to remain silent or not talk without a lawyer.Though no attorneys were present at the workshop, PRT distributed cards with the phone number for First Defense Legal Aid —a group that provides free legal representation 24-7 to people in CPD custody. PRT often works with this group and members of the National Lawyers' Guild to facilitate the trainings and answer legal questions.NLG member and Uptown People's Law Center director Alan Mills says that cop watchers should be careful getting into arguments with police officers about the technicalities of the law. Though Illinois citizens have a constitutional right to watch cops, "what you don't have a right to do is interfere with a police officer performing their duties," Mills explains. "That means on the scene there's often some gray areas."CPD didn't respond to a question about whether officers have ever felt cop watchers have interfered with the officers' ability to do their jobs. But a department spokesman did answer a question about whether someone who isn't under arrest has to obey an officer's orders. "The citizens have to comply with lawful orders issued by police officers who are in performance of their duties," sergeant Bob Kanewrote in an e-mail.What, exactly, constitutes a "lawful order" is difficult to parse. As a George Washington University law professor put it in a Washington Post op-ed last year, "The police can back up their orders with force because it's often a crime to disobey a lawful order from a police officer. But from a citizen's perspective, it's often impossible to know what is a lawful order. As a result, it's often impossible for citizens to know what they can and can't do during a police encounter."PRT advises that a person observing a police encounter should stand "within grabbing distance plus one step" away from officers. They may tell you to move away further, and it's best to comply, even if you think an officer isn't issuing a "lawful" order. "The bottom line is the law matters in court, it doesn't matter so much on the street," Mills says. "Playing lawyer on the street is the quickest way to get arrested or, in the worst circumstances, to get shot."If you decide to film a police stop, PRT recommends filming horizontally not vertically, to narrate what's being shown if possible, and to focus on filming the officers and not the person being detained or questioned. If that person was indeed in the process of committing a crime, the role of the cop watcher, according to PRT, is not to produce evidence that could be used against the person. Rather, the cop watcher should focus on documenting information about the officers, such as their names, badge numbers, and faces. Illinois law permits citizens to record public conversations with police and any law enforcement activity, including arrests, without officers' consent. If you decide to watch a police stop, PRT recommends that you stay until the interaction is done and the officers have left or let the person go. Using a cloud-based service to save a video immediately after filming is recommended in case the police confiscate your phone.PRT also trained the workshop attendees in techniques of "bystander intervention," such as indirectly speaking to a person caught in an interaction with police about their rights. One way is to have a loud conversation nearby with a friend, saying things such as, "Did you know that you do not have to consent to a search?" or "Did you know that you can ask officers whether you're free to go when you are stopped on the street?" A cop watcher can also offer to call relatives or a lawyer for the person being detained, and ask police officers to explain what's happening. If they demand that you identify yourself, you aren't obligated to show ID but only to state your name, address, and date of birth.Although not illegal, cop watching still puts citizens at risk for arrest, so the trainers also shared useful information in case this happens: prosecutors have 72 hours to bring charges against anyone after arrest; police officers can collect DNA samples without your consent from discarded personal items such as tissues and water bottles; cops are within their rights to lie to you during questioning; and warrants have to be signed by a judge to be valid.With awareness about police misconduct on the rise and community-police relations severely strained over the last year in Chicago, PRT members anticipate cop watching to become a more widespread practice. Many of the attendees of last week's workshop were members of community groups aiming to take the skills back to their own networks."We just need more people [leading cop-watching workshops]," Trinidad said. "There's this whole idea that we are gonna be safe when cops have the video cameras, but we know they just turn them off. We know that's not fixing anything. What we need is more people to be aware of their surroundings and be cop watching themselves and feeling more comfortable in intervening."Mills agrees, saying that citizens watching cops works in the service of government transparency. "Do it, but do it safely," he urges. "The more police officers get filmed, the more likely it is that everyone stays safe out there."
419 F.2d 914 Application of Joseph A. BRINK, Jr. Patent Appeal No. 8239. United States Court of Customs and Patent Appeals. January 15, 1970. Richard W. Sternberg, Roger R. Jones, St. Louis, Mo., attys. of record, for appellant. Joseph Schimmel, Washington, D. C., for the Commissioner of Patents. Raymond E. Martin, Washington, D. C., of counsel. Before RICH, Acting Chief Judge, ALMOND, BALDWIN and LANE, Judges, and RAO, Chief Judge, sitting by designation. ALMOND, Judge. 1 This is an appeal from the decision of the Patent Office Board of Appeals, adhered to on reconsideration, affirming the rejection of claims 1, 2, 4, 5 and 6, all the claims remaining in appellant's application entitled "Liquid Mist Collection."1 2 The invention relates to a method for separating a liquid mist from a mistladen gas by passing the gas through a bed of glass fibers under such conditions that the liquid mist in the gas is collected on the glass fibers and is drained therefrom by gravity flow as a continuous liquid phase in substantially undiluted form. Particular use is found in the removal and recovery of acid mists from process gas streams. Appellant tells us that the success of the invention rests upon the discovery that it is not necessary to "sieve" the mist particles from the gas and that a bed formed of coarse fibers can be employed to remove even the smallest mist droplets if the fibers in the bed are compacted to a relatively high density. Claim 1 is representative: 3 1. A process for separating and collecting a finely divided mist from a gas in which said mist is dispersed, which process comprises passing said gas through a bed of unbonded glass fibers having fiber diameters between about 5 and about 30 microns, said fiber bed being compressed to a bulk density of between about 5 and about 20 pounds per cubic foot, and concurrently draining liquid resulting from the collection of said mist from said bed by gravity flow in substantially undiluted form and as a continuous liquid phase to thereby effect steady state operation. 4 Claim 2 depends from claim 1 and limits the direction of gas flow. Claims 4-6 each depend from claim 2 and further restrict the range of fiber diameter and bed density. 5 The examiner rejected claims 1, 2 and 4 as being fully anticipated under 35 U.S.C. § 102 and claims 5 and 6 as being unpatentable under 35 U.S.C. § 103. The references he relied upon are: 6 Hennig 2,771,153 November 20, 1956 Lange's Handbook of Chemistry (Lange), 9th Ed., McGraw-Hill Book Co., New York, 1956, pp. 878-879. 7 Hennig discloses removing sulfuric acid mist from a gas stream laden therewith. He specifically illustrates an apparatus including a circular casing inside of which are disposed a plurality of vertical annular filters. One such filter is composed of two blankets of glass wool retained between inner and outer screens, the upper ends of the blankets being compressed and clamped against the exterior of an annular sleeve telescoped within the end of the screens. For the inner of the two blankets is used "a 14 micron average fiber diameter glass mat (commercially available as Owens-Corning TWF) of about 4 to 6 inches thick * * *." 8 Lange discloses properties of materials of construction and describes, inter alia, material No. 75 "Fiberglas TW-F, general purpose" of commercial construction "Batt, roll, bulk, shredded" and material No. 77 "Fiberglas, TW-F (see above)," commercial construction "Pipe covering blankets." For No. 75 a density of 2-10 lbs. per cu. ft. is given, while No. 77 is listed as having a density of 7 lbs. per cu. ft. 9 The board's affirmance reveals the Patent Office position: 10 Claims 1, 2 and 4 were rejected as being fully anticipated by Hennig, and claims 5 and 6 were rejected as being unpatentable over Hennig under 35 U.S.C. 103. The rejection of claims 1, 2 and 4 is put on the basis of 35 U.S.C. 102 because the Lange's Handbook, like a dictionary, is relied on to explain what is meant in the Hennig patent by the expression "14 micron average fiber diameter glass mat (commercially available as Owens-Corning TWF) of about 4 to 6 inches thick" * * *. Appellant has not suggested that 35 U.S.C. 103 would be a better basis for rejection by the rule-of-thumb that recourse to two references indicates a rejection under subordinate section 103 instead of section 102. 11 * * * * * * 12 Since the authoritative Lange's Handbook gives a density of 7 lbs. per cu. ft. for "Fiberglas TWF" blanket which Hennig recommended for his filter in a 14 micron average diameter form, it would seem that appellant's contentions or representations to the contrary should be explicit and to the point. * * * Appellant has instead resorted to a series of affidavit representations which in the aggregate give us little confidence in appellant's position. 13 * * * * * * 14 Only Exhibit C refers to "TWF" insulation and this is of a specialized type for appliance purposes and of an undisclosed fiber diameter. The "nominal" density for this fiber (2.6 lbs. per cu. ft.) is not explained, but obviously this is not the delivered, or use density since the material is packed under compression. 15 Appellant requested reconsideration and submitted a letter signed by "a vice-president of Owens-Corning Fiberglas Corporation" discussing the density of the product sold under the mark "TWF." The writer states: 16 I do not believe we ever had available or sold an insulating material under the mark "TWF" which had a bulk density much over 3 pounds per cubic foot and certainly not as high as 5 pounds per cubic foot in the normal uncompressed condition. 17 In adhering to its decision, the board stated that it was moved by the letter to consult available handbooks to determine whether the Lange data were unreasonable. The board then referred to an article by two Corning Glass Co. experts indicating that fibrous glass wool products have minimum densities between 4 and 6 lbs. per cu. ft. as well as a handbook indicating a density of 4 and 10 lbs. per cu. ft. for a Pyrex glass wool, curled. The board acknowledged that these sources provided no direct evidence as to the appeal issues, but felt that they suggested that Lange was not out of line with ordinary experience. 18 Appellant acknowledges that except for the bulk density limitation Hennig satisfies every limitation of claim 1. He contends, however, that the rejection under 35 U.S.C. § 102 is a technical rejection based on alleged inherency. The process of the appealed claims, it is argued, is not inherent in the Hennig disclosure because nowhere therein is the importance of bed density recognized. Moreover, appellant urges, even if Lange may be properly referred to it is merely speculative that anything therein described is the same material used in the reference patent. As to "inherency" as a basis for rejection, appellant requests that we follow the language of this court in In re Hughes, 345 F.2d 184, 52 CCPA 1355 (1965), stating in effect that if a reference is ambiguous and can be interpreted so that it may or may not constitute an anticipation of an appellant's claims, an anticipation rejection under 35 U.S.C. § 102 based upon the ambiguous reference is improper. Here, it is contended, there is uncertainty or doubt as to the inherency. 19 The solicitor counters by arguing that In re Hughes is inapposite because there is nothing ambiguous about Hennig's disclosure. Rather, it is urged, there is merely an example of incorporation by reference in a patent disclosure, a frequent occurrence. In such a case, an outside source must be consulted in order to fully comprehend the invention in question. 20 The essence of the solicitor's argument appears in his brief as follows: 21 Hennig specifies that blanket or mat 41 is commercially available as "Owens Corning TWF". This naturally leads one who wishes to practice Hennig's invention, to the literature on the subject. Aside from Lange, the only other evidence of record which refers to "TWF" insulation, is presented by Exhibit C * * * which accompanies the affidavit of November 12, 1965 * * *. While the TWF insulation of that exhibit has a light coating of lubricant * * * and is available in the form of a blanket, the Board noted that it was of a specialized type and of an undisclosed fiber diameter * * *. Regarding its unexplained "nominal" density of 2.6 lbs. per cu. ft., the Board stated: "obviously this is not the delivered, or use density since the material is packed under compression" * * *. 22 The Board might further have noted that the density value of 2.6 in Exhibit C * * * is predicated upon a specific type of blanket no more than 3½" in thickness, whereas Hennig's blanket 41 must be 4-6" thick. In view of the difference in thickness and different purposes for which TWF blankets are used: (a) filtering (Hennig), (b) appliance insulation (Exhibit C) and (c) pipe covering (Lange's item 77, * * *), it is more likely that one would naturally select the Hennig blanket, item 77, since the upper limit of 3½" for the blanket of Exhibit C would suggest its unavailability in the greater thicknesses specified by Hennig. 23 It is immaterial that Hennig does not mention pipe covering or refer to "general purpose TWF" (as contended * * *). This appeal must be decided on the totality of evidence before the Court plus whatever common knowledge the Court is aware of, of which it will take judicial notice. 24 The solicitor then states that "[s]ince Hennig does refer to `Owens Corning TWF' * * *, the important question to decide is which form of TWF constituting part of the evidence of record, one skilled in the art would select for blanket 41 in putting into practice the Hennig invention." 25 Accepting the solicitor's statement of the question above, without necessarily totally agreeing therewith, we conclude from a careful consideration of the evidence of record that one is unable to say with reasonable certainty that one form of TWF would be used in preference to another. Hennig discloses only TWF, in addition to setting forth a blanket thickness. Yet Lange lists two types of TWF with no mention of thickness. One type has a density of 2-10 lbs. per cu. ft. and is available in batt, roll, bulk or shredded form, while the other of 7 lbs. per cu. ft. density is available as pipe covering blankets. Neither would appear to be preferred over the other for the filtering use of Hennig. Just as the ambiguous reference failed as an anticipation under 35 U.S.C. § 102 in In re Hughes, supra, we do not see how a disclosure or combination of disclosures leaving one to rely on fortune in choosing the referred to material can function as an anticipation. Absent a showing of some reasonable certainty of inherency, the rejection of claims 1, 2 and 4 under 35 U.S.C. § 102 must fail. With respect to claims 5 and 6, we agree with the solicitor that since the rejection of those claims is predicated on the assumption that Hennig's blanket has a bulk density of 7 lbs. per cu. ft., reversal of that rejection is in order once having reversed the rejection of claims 1, 2 and 4, predicated on the same assumption. 26 The decision of the board is, therefore, reversed. 27 Reversed. Notes: 1 Serial No. 280.847 filed May 16, 1963, alleged to be a continuation of serial No. 779,535 filed December 11, 1958
When 48-year-old Heidi Guido saw the news cameras outside the Ambridge police station Monday, she wished to turn back around. But as officers walked her out with handcuffs as she kept her head down, police say she needs to face the serious charges against her. "I told her this is the day she needs to be honest with herself, because she's put her daughter in danger," said officer Zadock Dismuke. Guido lives on Duss Avenue where police say she left her 5-year-old daughter sleeping home alone. Officers say her daughter awoke about an hour and a half later, scared, and dialed 911 for help. "She's a beautiful 5-year-old little girl. It broke my heart to walk in and see her in the apartment by herself," said Dismuke. Guido's neighbors reacted as well. "I would never leave my daughter alone. I can barely leave her alone when I go to the bathroom," said neighbor Ruth Mattison. Guido told police she came to the 8th Street CVS Pharmacy to drop off her prescription. Police said it didn't take long for her to admit the other reason she left the house. After police used Guido's family members to call her and track her down at the CVS, police say they took her in for questioning and that she ultimately gave this statement, in part: "I walked to the 11th Street park, talked to my friend, then texted someone to see if they had any crack cocaine." While the mother's admitted actions are troubling, police say it's fortunate the 5-year-old was quick to dial 911, and fortunate that she is now surrounded by responsible people. "There are a lot of good family members in the picture for the little girl, that's our main focus," said Zadock. The area's Child and Youth Services are investigating this case right now. Meanwhile Guido faces charges that include endangering the welfare of a child.