text
stringlengths 8
5.77M
|
---|
Hexadecanal dehydrogenase (acylating)
In enzymology, a hexadecanal dehydrogenase (acylating) () is an enzyme that catalyzes the chemical reaction
hexadecanal + CoA + NAD+ hexadecanoyl-CoA + NADH + H+
The 3 substrates of this enzyme are hexadecanal, CoA, and NAD+, whereas its 3 products are hexadecanoyl-CoA, NADH, and H+.
This enzyme belongs to the family of oxidoreductases, specifically those acting on the aldehyde or oxo group of donor with NAD+ or NADP+ as acceptor. The systematic name of this enzyme class is hexadecanal:NAD+ oxidoreductase (CoA-acylating). This enzyme is also called fatty acyl-CoA reductase.
References
Category:EC 1.2.1
Category:NADH-dependent enzymes
Category:Enzymes of unknown structure
|
Japan has a new hara. No, the nice couple down the hall didn’t just have a baby; according to recent news, yet another form of harassment — abbreviated as “hara” in Japanese — is supposedly becoming a social problem. This time it’s sō-hara, or “social media harassment.”
Though you might think so from the name, it doesn’t refer to using Facebook or other social media to harass people by slagging off their ruminations and cat pictures. Rather, sō-hara describes the discomfiture that comes from accepting a friend request from your boss or coworker and then feeling pressured to actively “like” their ruminations and cat pictures — not to mention the stress of no longer being able to use Facebook to vent about what idiots your boss and coworkers are.
It also encompasses problems of the type experienced by a young woman featured in a recent Asahi Shimbun article on sō-hara who had felt deterred from posting photos of a recent trip to Disneyland because . . . she hadn’t bought omiyage for the coworkers she was connected to on Facebook! Clearly a problem requiring third-party expert intervention.
Despite its outdated reputation as the land of lecherous salarymen who spend their long days fondling office ladies before heading out to buy used high-school girl panties from vending machines (has anyone ever actually seen one of these?), Japan has come a long way in the fight against seku-hara, the abbreviated Japanese rendering of “sexual harassment.” Japan’s Equal Employment Opportunity Act has required employers to combat sexual harassment in the workplace since 1997, and employers are under increasing pressure to banish sexually inappropriate words or conduct from the workplace.
Somewhere along the line, however, the suffix “hara” took on a life of its own, leading to a growing list of other forms of “harassment.” While some describe potentially harmful types of nonphysical bullying, others may leave you scratching your head. The following is a by-no-means-complete list of some of the other types of “hara” that one may encounter living or working in Japan.
•Aka-hara — “academic harassment,” also known as “campus harassment”: Going beyond the type of inappropriate sexual pressure that can arise in a professor-student relationship, aka-hara is a concept that seeks to address a wide range of behavior found in campus environments.
Different schools have different policies, but the University of Tokyo’s is a good example. Todai defines it in terms of any abuse of authority in an academic context that “disadvantages [a] person in studying, receiving education, conducting research, or performing their duties, or . . . causes mental and physical suffering that will inevitably hinder him or her from studying, receiving education, conducting research, or performing their duties.” A related term, sukūru-harasumento, expands the concept from universities to schools.
•Pawa-hara: “Power harassment” refers to the abuse of authority in the workplace — superiors using their position to bully subordinates while cloaked in the veil of the employment relationship. The term is said to have been coined by Yasuko Okada, who founded a consulting firm that helps companies deal with . . . workplace harassment.
•Teku-hara: Not all harassment comes from the top down: “Technological (or technical) harassment” refers to the use of one’s superior technological knowledge to make other people feel inadequate (I thought computers did a perfectly good job of that without human assistance).
The origin of this term is uncertain, but I like to think it was invented by middle-management oji-san who, befuddled both by technology and the sudden proliferation of complaints about seku-hara and pawa-hara, figured out a way to fight back by developing a victim classification they could call their own.
•Mora-hara: “Moral harassment” is a form of abuse originally identified by French psychiatrist Marie-France Hirigoyen. It covers an extremely wide range of psychological bullying behaviors. Moral harassment in the workplace was banned by law in France in 2002. A Japanese translation of Hirigoyen’s book on the subject was published in 1999, and since then claims of mora-hara seem to have become extremely common in the workplace and within family relationships.
•Aru-hara: Ah, the good old days, when university seniors could force froshes to drink until they needed an ambulance — when you could demand that employees who joined the company later than you down tankard after tankard of beer, and then maybe dance naked for your amusement.
What, you can’t drink? Maybe you don’t have enough company spirit. Shockingly, this is now considered to be a form of harassment: alcohol harassment.
•Bura-hara: Discrimination based on blood type. Really. In Japan different blood types are associated with certain types of personality traits.
In one episode of “Gintama,” my favorite anime cartoon, there is a sequence where the characters rag on each other by speculating about each other’s blood type based on their various character flaws. The specific blood types are actually bleeped out, possibly to avoid offense to the people who follow this sort of nonsense.
•Rabu-hara: Apparently it can be “love harassment” to talk about your boyfriend or smooch in front of other people — presumably, people who manage to live in a world without TV, the Internet or any popular culture in which romance is featured.
•Eiji-hara: “Eiji-harasumento” (“Age Harassment”) is the title of a 2008 novel by author Makiko Uchidate that, according to reviews and blog descriptions (sorry, I have been really busy, see . . .) deals with the problem of most men apparently preferring their women young, and the “harassment” this inflicts on women who are not.
On the Internet, eiji-hara appears to have morphed into a catch-all term for any sort of negative feelings people of either gender are made to feel on account of being above a certain age. It has some competition from the related term shiruba-hara (the Japanese rendering of “silver” being commonly used to refer to old people).
•Mariji-harasumento (“marriage harassment”): any sort of commentary that makes a woman feel bad about still not being married.
•Sumeru-harasumento (“smell harassment”): marinating in perfume or otherwise inflicting what you think smells nice on those around you. Personally I would prefer to call it “aroma-hara,” but then the difference between this form of harassment and aromatherapy is lost on people like me.
•Eā-harasumento: Kūki, the Japanese word for air, is often used to refer to the atmosphere or “vibe” of a social situation. “Air harassment” is apparently any sort of act or behavior that damages the mood.
Of these various forms of hara, sexual, power and moral harassment are taken seriously as workplace issues. The Ministry of Health, Labor and Welfare has even set up a special website just to address pawa-hara. Beyond these, however, it seems like all you need is a word processor and an audience of fellow victims to create a new form of harassment. A few newspaper articles and enough Google hits and it can become an established part of Japanese culture. This being the case, I would like to offer a few candidates of my own.
•Harō-hara: Seeing a foreigner and saying “harō.” Sure, it’s funny the first time you do it, but the novelty for me wore off around the 10,000th time.
•Ere-hara: I realize that Japan’s arcane electoral campaign laws leave politicians with few options for establishing name recognition with voters other than driving around in a sound truck shouting their names. But it is still really, really annoying. Furthermore, some non-Japanese residents might have their feelings hurt by the constant, abrasive reminders of their inability to vote.
•Ekusupa-hara: Expats presuming to tell other expats the “correct” way to be a foreigner in Japan.
Perhaps I am guilty what might be called sāka-hara — using sarcasm to belittle potentially serious problems. As a parent I feel strongly that children both need to be protected from bullying because of their vulnerability, but taught not to bully as part of the educational process. As a lawyer I appreciate that sexual harassment in its worst form may involve using the employment relationship to facilitate or cover up clearly unlawful — even criminal — behavior such as offensive physical contact or sexual assault, and that even in milder forms it represents a form of discrimination that women should no longer have to put up with.
I also understand how various types of workplace harassment need to be addressed, particularly in Japan, where there is often little flexibility in employment relationships. Joining a company and staying with it for decades is still the ideal for many people, but those who succeed in doing so may be left with few avenues of escape from workplace bullying, such as finding a comparable job elsewhere. Some companies may even have an incentive to encourage or at least turn a blind eye to harassment because the inflexibility works both ways: Legal restrictions on terminating employees can be circumvented by allowing an employee to be bullied until they quit “voluntarily.” So it is also understandable that labor regulators are seeking to address a broad range of harassment in their guidance and regulations.
At the same time, however, if harassment is defined too broadly and vaguely, it can stifle even legitimate, socially useful conduct — free speech, even — and make it hard to accomplish, well, anything. For example, does the definition of academic harassment given above apply to giving students failing grades? It will probably cause them mental anguish and may limit their future academic opportunities, so as a professor I would like to know. Probably legitimate grading is not “behavior,” but you never know. The only way to be completely safe is probably to not fail anyone.
Similarly, I know several managers at Japanese companies who are terrified that any negative comment they make to a subordinate will boomerang back to them as a harassment claim. Since so many types of harassment are completely subjective — being derived from the feelings of the individual making the claim — organizations can get bogged down dealing with even loopy, completely unsubstantiated complaints (why are you still not doing anything about my torment from the orbital mind control lasers?!).
Furthermore, diluted and trivialized with each new iteration, harassment in Japan seems to be a mechanism for turning every person’s subjective feelings of victimization into a “social problem” — of turning your problems into other people’s problems. Yet, part of the process of growing up and growing old is coming to grips with the fact that you must accept the world as it is a great deal more than the world has to accept you. The spread of frivolous forms of harassment seems to run against this basic reality, and the acceptance of the growing taxonomy of forms of “hara” seems to be part of an ongoing trend of infantilizing the populace, by proffering new ways to avoid growing up (ironic, given how rapidly the country is graying).
On this note, I will close by offering up one other new type of harassment for your consideration: hara-hara — the invention of new forms of harassment so you can get other people to deal with your problems rather than confronting them yourself.
Colin P. A. Jones is a professor at Doshisha Law School in Kyoto. Can you think of any new types of harassment that haven’t been discussed in this article? Please send your suggestions with a brief (ideally witty) description, and your comments on these issues, to [email protected] .
|
Q:
How to invoke a java component in Mule
I'm using the following SOAP client to inovke a web service in Apache OFBiz:
public class CreatePerson {
private static OMFactory fac;
private static OMNamespace omNs;
public static String fname;
public static String lname;
static {
fac = OMAbstractFactory.getOMFactory();
omNs = fac.createOMNamespace("http://my-ip-adress/service/", "ns1");
}
public static void main(String[] args) throws AxisFault {
ServiceClient sc = new ServiceClient();
Options opts = new Options();
opts.setTo(new EndpointReference("http://my-ip-adress:port/webtools/control/SOAPService"));
opts.setAction("createPerson");
sc.setOptions(opts);
OMElement res = sc.sendReceive(createPayLoad(fname, lname));
System.out.println(res);
}
public static OMElement createPayLoad(@XPath("//person/return[1]")String firstName, @XPath("//person/return[2]")String lastName) {
CreatePerson.fname = firstName;
CreatePerson.lname = lastName;
OMElement createPerson = fac.createOMElement("createPerson", omNs);
OMElement mapMap = fac.createOMElement("map-Map", omNs);
createPerson.addChild(mapMap);
mapMap.addChild(createMapEntry("login.username", "admin"));
mapMap.addChild(createMapEntry("login.password", "ofbiz"));
// do the mapping here!
mapMap.addChild(createMapEntry("firstName", firstName));
mapMap.addChild(createMapEntry("lastName", lastName));
return createPerson;
}
public static OMElement createMapEntry(String key, String val) {
OMElement mapEntry = fac.createOMElement("map-Entry", omNs);
// create the key
OMElement mapKey = fac.createOMElement("map-Key", omNs);
OMElement keyElement = fac.createOMElement("std-String", omNs);
OMAttribute keyAttribute = fac.createOMAttribute("value", null, key);
mapKey.addChild(keyElement);
keyElement.addAttribute(keyAttribute);
// create the value
OMElement mapValue = fac.createOMElement("map-Value", omNs);
OMElement valElement = fac.createOMElement("std-String", omNs);
OMAttribute valAttribute = fac.createOMAttribute("value", null, val);
mapValue.addChild(valElement);
valElement.addAttribute(valAttribute);
// attach to map-Entry
mapEntry.addChild(mapKey);
mapEntry.addChild(mapValue);
return mapEntry;
}
}
Next I want to use the following xml to get the values in return-element to "map" (AnnotatedEntryPointResolver) with firstName and lastName in my client above:
<soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/">
<soap:Body>
<ns2:getAllResponse xmlns:ns2="http://service.ofbiz.org/">
<person>
<return>Testname</return>
<return>Test</return>
</person>
</ns2:getAllResponse>
</soap:Body>
</soap:Envelope>
Herefore I'm using Mule. As you can see in my client code I added some XPath annotations to reference the xml values in return-element. For testing purposes my Mule config is simple:
<flow name="test_flow" doc:name="test_flow">
<file:inbound-endpoint path="[mypath]\xml\in" responseTimeout="10000" doc:name="File"/>
<component class="org.ofbiz.service.CreatePerson" doc:name="Java"/>
</flow>
I'm just using a file inbound endpoint and the java component referencing my client above.
After running Mule "mapping" is done correctly within the createPayLoad()-method in my client. But it's not what I want to do. My question: How can I invoke the whole java component (including the main-method) using the AnnotatedEntryPointResolvers for this example? Is there an alternative or better solution as described above?
A:
Invoking the main() is odd but... you can do it with:
<scripting:component>
<scripting:script engine="groovy">CreatePerson.main([] as String[])</scripting:script>
</scripting:component>
|
Heat loss variations of full-face motorcycle helmets.
Heat loss of 27 full-face motorcycle helmets was studied using a thermal manikin headform. The headform was electrically heated and positioned at the exit of a wind tunnel, so that the air stream flowed onto its front side. All helmets were measured in three sessions in which all the vents were opened or closed consecutively in random order. Average heat loss was calculated from a steady state period, under controlled environmental conditions of 22+/-0.05 degrees C, 50+/-1% RH and 50.4+/-1.1 km h(-1) (14.0+/-0.3 ms(-1)) wind speed. The results show large variations in heat loss among the different helmets, ranging from 0 to 4 W for the scalp section of the headform and 8 to 18 W for the face section of the headform. Opening all the vents showed an increase in heat loss of more than 1 W (2 W) for four (two) helmets in the scalp section and six (one) helmets in the face section. These levels of heat transfer have been shown to be the thresholds for human sensitivity in scalp and face sections. Furthermore, helmet construction features which could be identified as important for heat loss of motorcycle helmets were identified.
|
/*
* Copyright (c) 2000, 2019, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
package sun.security.util;
/**
* This class represents the <code>ResourceBundle</code>
* for javax.security.auth and sun.security.
*
*/
public class Resources extends java.util.ListResourceBundle {
private static final Object[][] contents = {
// javax.security.auth.PrivateCredentialPermission
{"invalid.null.input.s.", "invalid null input(s)"},
{"actions.can.only.be.read.", "actions can only be 'read'"},
{"permission.name.name.syntax.invalid.",
"permission name [{0}] syntax invalid: "},
{"Credential.Class.not.followed.by.a.Principal.Class.and.Name",
"Credential Class not followed by a Principal Class and Name"},
{"Principal.Class.not.followed.by.a.Principal.Name",
"Principal Class not followed by a Principal Name"},
{"Principal.Name.must.be.surrounded.by.quotes",
"Principal Name must be surrounded by quotes"},
{"Principal.Name.missing.end.quote",
"Principal Name missing end quote"},
{"PrivateCredentialPermission.Principal.Class.can.not.be.a.wildcard.value.if.Principal.Name.is.not.a.wildcard.value",
"PrivateCredentialPermission Principal Class can not be a wildcard (*) value if Principal Name is not a wildcard (*) value"},
{"CredOwner.Principal.Class.class.Principal.Name.name",
"CredOwner:\n\tPrincipal Class = {0}\n\tPrincipal Name = {1}"},
// javax.security.auth.x500
{"provided.null.name", "provided null name"},
{"provided.null.keyword.map", "provided null keyword map"},
{"provided.null.OID.map", "provided null OID map"},
// javax.security.auth.Subject
{"NEWLINE", "\n"},
{"invalid.null.AccessControlContext.provided",
"invalid null AccessControlContext provided"},
{"invalid.null.action.provided", "invalid null action provided"},
{"invalid.null.Class.provided", "invalid null Class provided"},
{"Subject.", "Subject:\n"},
{".Principal.", "\tPrincipal: "},
{".Public.Credential.", "\tPublic Credential: "},
{".Private.Credential.", "\tPrivate Credential: "},
{".Private.Credential.inaccessible.",
"\tPrivate Credential inaccessible\n"},
{"Subject.is.read.only", "Subject is read-only"},
{"attempting.to.add.an.object.which.is.not.an.instance.of.java.security.Principal.to.a.Subject.s.Principal.Set",
"attempting to add an object which is not an instance of java.security.Principal to a Subject's Principal Set"},
{"attempting.to.add.an.object.which.is.not.an.instance.of.class",
"attempting to add an object which is not an instance of {0}"},
// javax.security.auth.login.AppConfigurationEntry
{"LoginModuleControlFlag.", "LoginModuleControlFlag: "},
// javax.security.auth.login.LoginContext
{"Invalid.null.input.name", "Invalid null input: name"},
{"No.LoginModules.configured.for.name",
"No LoginModules configured for {0}"},
{"invalid.null.Subject.provided", "invalid null Subject provided"},
{"invalid.null.CallbackHandler.provided",
"invalid null CallbackHandler provided"},
{"null.subject.logout.called.before.login",
"null subject - logout called before login"},
{"Login.Failure.all.modules.ignored",
"Login Failure: all modules ignored"},
// sun.security.provider.PolicyFile
{"java.security.policy.error.parsing.policy.message",
"java.security.policy: error parsing {0}:\n\t{1}"},
{"java.security.policy.error.adding.Permission.perm.message",
"java.security.policy: error adding Permission, {0}:\n\t{1}"},
{"java.security.policy.error.adding.Entry.message",
"java.security.policy: error adding Entry:\n\t{0}"},
{"alias.name.not.provided.pe.name.", "alias name not provided ({0})"},
{"unable.to.perform.substitution.on.alias.suffix",
"unable to perform substitution on alias, {0}"},
{"substitution.value.prefix.unsupported",
"substitution value, {0}, unsupported"},
{"SPACE", " "},
{"LPARAM", "("},
{"RPARAM", ")"},
{"type.can.t.be.null","type can't be null"},
// sun.security.provider.PolicyParser
{"keystorePasswordURL.can.not.be.specified.without.also.specifying.keystore",
"keystorePasswordURL can not be specified without also specifying keystore"},
{"expected.keystore.type", "expected keystore type"},
{"expected.keystore.provider", "expected keystore provider"},
{"multiple.Codebase.expressions",
"multiple Codebase expressions"},
{"multiple.SignedBy.expressions","multiple SignedBy expressions"},
{"duplicate.keystore.domain.name","duplicate keystore domain name: {0}"},
{"duplicate.keystore.name","duplicate keystore name: {0}"},
{"SignedBy.has.empty.alias","SignedBy has empty alias"},
{"can.not.specify.Principal.with.a.wildcard.class.without.a.wildcard.name",
"can not specify Principal with a wildcard class without a wildcard name"},
{"expected.codeBase.or.SignedBy.or.Principal",
"expected codeBase or SignedBy or Principal"},
{"expected.permission.entry", "expected permission entry"},
{"number.", "number "},
{"expected.expect.read.end.of.file.",
"expected [{0}], read [end of file]"},
{"expected.read.end.of.file.",
"expected [;], read [end of file]"},
{"line.number.msg", "line {0}: {1}"},
{"line.number.expected.expect.found.actual.",
"line {0}: expected [{1}], found [{2}]"},
{"null.principalClass.or.principalName",
"null principalClass or principalName"},
// sun.security.pkcs11.SunPKCS11
{"PKCS11.Token.providerName.Password.",
"PKCS11 Token [{0}] Password: "},
};
/**
* Returns the contents of this <code>ResourceBundle</code>.
*
* @return the contents of this <code>ResourceBundle</code>.
*/
@Override
public Object[][] getContents() {
return contents;
}
}
|
Welcome to our website! As we have the ability to list on our website (our selection changes all of the time), it is not feasible for a company our size to record and playback the descriptions on every item on our website.
However, if you are an American with a disability we are here to help you. Please call our disability services phone line at 770-285-7849 during regular business hours and one of our kind and friendly personal shoppers will help you navigate through our website, help conduct advanced searches, help you choose the item you are looking for with the specifications you are seeking, read you the specifications of any item and consult with you about the products themselves. There is no charge for the help of this personal shopper for any American with a disability. Finally, your personal shopper will explain our Privacy Policy and Terms of Service, and help you place an order if you so desire.
SchnadigHome Entertainment
Looking for Schnadig at Home Fashion Interiors in Alpharetta, GA?
Home Fashion Interiors in Alpharetta, GA is an authorized dealer of Schnadig Products. With a proud heritage that can be traced back to 1880, Schnadig International Corp. has long stood for well designed, well made furniture. In 2009, they became a wholly owned subsidiary of Markor International Furniture Co., Ltd., a world class furniture manufacturing and retail store operation based in China, with 10 modern manufacturing plants and a state-of-the-art global distribution center. As a vertically integrated company, they are now able to offer a surprising mix of styling, special designer details, modern day comfort and exquisite craftsmanship normally only found in the most expensive furniture. For these reasons and more, Schnadig truly is In a Class of its Own.
So if you are looking for Schnadig products in Alpharetta, Roswell, Mountain Park, Dunwoody, Duluth, Norcross, Sandy Springs, Doraville, Chamblee, Suwanee and Woodstock, or if you have any questions about Schnadig products, please feel free to call us at 770-285-7849 or simply stop by Home Fashion Interiors at any time and we would be glad to help you.
|
Q:
Why is TensorFlow predicting all 0's or all 1's after training?
So my problem is that I am running through the beginner level code in the TensorFlow tutorial and have modified it for my needs but when I make it print sess.run(accuracy, feed_dict={x: x_test, y_: y_test}) it used to always print out a 1.0, now it's always guessing 0's and printing out an ~93% accuracy. When I use tf.argmin(y,1), tf.argmin(y_,1), it guesses all 1's and produces an ~7% accuracy rate. Add up the two and it equals 100%. I don't get how tf.argmin guesses 1's and tf.argmax guesses 0's. Obviously something is wrong with the code. Please have a look and let me know what I can do to fix this issue. I think that the code is going wrong during the training, but I could be wrong.
import tensorflow as tf
import numpy as np
from numpy import genfromtxt
data = genfromtxt('cs-training.csv',delimiter=',') # Training data
test_data = genfromtxt('cs-test.csv',delimiter=',') # Test data
x_train = []
for i in data:
x_train.append(i[1:])
x_train = np.array(x_train)
y_train = []
for i in data:
if i[0] == 0:
y_train.append([1., i[0]])
else:
y_train.append([0., i[0]])
y_train = np.array(y_train)
where_are_NaNs = isnan(x_train)
x_train[where_are_NaNs] = 0
x_test = []
for i in test_data:
x_test.append(i[1:])
x_test = np.array(x_test)
y_test = []
for i in test_data:
if i[0] == 0:
y_test.append([1., i[0]])
else:
y_test.append([0., i[0]])
y_test = np.array(y_test)
where_are_NaNs = isnan(x_test)
x_test[where_are_NaNs] = 0
x = tf.placeholder("float", [None, 10])
W = tf.Variable(tf.zeros([10,2]))
b = tf.Variable(tf.zeros([2]))
y = tf.nn.softmax(tf.matmul(x,W) + b)
y_ = tf.placeholder("float", [None,2])
cross_entropy = -tf.reduce_sum(y_*tf.log(y))
train_step = tf.train.GradientDescentOptimizer(0.01).minimize(cross_entropy)
init = tf.initialize_all_variables()
sess = tf.Session()
sess.run(init)
print "...Training..."
g = 0
for i in range(len(x_train)):
sess.run(train_step, feed_dict={x: [x_train[g]], y_: [y_train[g]]})
g += 1
At this point, if I make it print [x_train[g]] and print [y_train[g]], this is what the results look like.
[array([ 7.66126609e-01, 4.50000000e+01, 2.00000000e+00,
8.02982129e-01, 9.12000000e+03, 1.30000000e+01,
0.00000000e+00, 6.00000000e+00, 0.00000000e+00,
2.00000000e+00])]
[array([ 0., 1.])]
Ok, let's carry on then.
correct_prediction = tf.equal(tf.argmax(y,1), tf.argmax(y_,1))
accuracy = tf.reduce_mean(tf.cast(correct_prediction, "float"))
print sess.run(accuracy, feed_dict={x: x_test, y_: y_test})
0.929209
This percentage does not shift. It's guessing all zeros regardless of the onehot that I created for the 2 classes (1 or 0).
Here's a look at the data-
print x_train[:10]
[[ 7.66126609e-01 4.50000000e+01 2.00000000e+00 8.02982129e-01
9.12000000e+03 1.30000000e+01 0.00000000e+00 6.00000000e+00
0.00000000e+00 2.00000000e+00]
[ 9.57151019e-01 4.00000000e+01 0.00000000e+00 1.21876201e-01
2.60000000e+03 4.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 1.00000000e+00]
[ 6.58180140e-01 3.80000000e+01 1.00000000e+00 8.51133750e-02
3.04200000e+03 2.00000000e+00 1.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 2.33809776e-01 3.00000000e+01 0.00000000e+00 3.60496820e-02
3.30000000e+03 5.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 9.07239400e-01 4.90000000e+01 1.00000000e+00 2.49256950e-02
6.35880000e+04 7.00000000e+00 0.00000000e+00 1.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 2.13178682e-01 7.40000000e+01 0.00000000e+00 3.75606969e-01
3.50000000e+03 3.00000000e+00 0.00000000e+00 1.00000000e+00
0.00000000e+00 1.00000000e+00]
[ 3.05682465e-01 5.70000000e+01 0.00000000e+00 5.71000000e+03
0.00000000e+00 8.00000000e+00 0.00000000e+00 3.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 7.54463648e-01 3.90000000e+01 0.00000000e+00 2.09940017e-01
3.50000000e+03 8.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 1.16950644e-01 2.70000000e+01 0.00000000e+00 4.60000000e+01
0.00000000e+00 2.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 1.89169052e-01 5.70000000e+01 0.00000000e+00 6.06290901e-01
2.36840000e+04 9.00000000e+00 0.00000000e+00 4.00000000e+00
0.00000000e+00 2.00000000e+00]]
print y_train[:10]
[[ 0. 1.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]]
print x_test[:20]
[[ 4.83539240e-02 4.40000000e+01 0.00000000e+00 3.02297622e-01
7.48500000e+03 1.10000000e+01 0.00000000e+00 1.00000000e+00
0.00000000e+00 2.00000000e+00]
[ 9.10224439e-01 4.20000000e+01 5.00000000e+00 1.72900000e+03
0.00000000e+00 5.00000000e+00 2.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 2.92682927e-01 5.80000000e+01 0.00000000e+00 3.66480079e-01
3.03600000e+03 7.00000000e+00 0.00000000e+00 1.00000000e+00
0.00000000e+00 1.00000000e+00]
[ 3.11547538e-01 3.30000000e+01 1.00000000e+00 3.55431993e-01
4.67500000e+03 1.10000000e+01 0.00000000e+00 1.00000000e+00
0.00000000e+00 1.00000000e+00]
[ 0.00000000e+00 7.20000000e+01 0.00000000e+00 2.16630600e-03
6.00000000e+03 9.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 2.79217052e-01 4.50000000e+01 1.00000000e+00 4.89921122e-01
6.84500000e+03 8.00000000e+00 0.00000000e+00 2.00000000e+00
0.00000000e+00 2.00000000e+00]
[ 0.00000000e+00 7.80000000e+01 0.00000000e+00 0.00000000e+00
0.00000000e+00 1.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 9.10363487e-01 2.80000000e+01 0.00000000e+00 4.99451497e-01
6.38000000e+03 8.00000000e+00 0.00000000e+00 2.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 6.36595797e-01 4.40000000e+01 0.00000000e+00 7.85457163e-01
4.16600000e+03 6.00000000e+00 0.00000000e+00 1.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 1.41549211e-01 2.60000000e+01 0.00000000e+00 2.68407434e-01
4.25000000e+03 4.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 4.14101100e-03 7.80000000e+01 0.00000000e+00 2.26362500e-03
5.74200000e+03 7.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 9.99999900e-01 6.00000000e+01 0.00000000e+00 1.20000000e+02
0.00000000e+00 2.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 6.28525944e-01 4.70000000e+01 0.00000000e+00 1.13100000e+03
0.00000000e+00 5.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 2.00000000e+00]
[ 4.02283095e-01 6.00000000e+01 0.00000000e+00 3.79442065e-01
8.63800000e+03 1.00000000e+01 0.00000000e+00 1.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 5.70997900e-03 8.10000000e+01 0.00000000e+00 2.17382000e-04
2.30000000e+04 4.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 4.71171849e-01 5.10000000e+01 0.00000000e+00 1.53700000e+03
0.00000000e+00 1.40000000e+01 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 1.42395210e-02 8.20000000e+01 0.00000000e+00 7.40466500e-03
2.70000000e+03 1.00000000e+01 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]
[ 4.67455800e-02 3.70000000e+01 0.00000000e+00 1.48010090e-02
9.12000000e+03 8.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 4.00000000e+00]
[ 9.99999900e-01 4.70000000e+01 0.00000000e+00 3.54604127e-01
1.10000000e+04 1.10000000e+01 0.00000000e+00 2.00000000e+00
0.00000000e+00 3.00000000e+00]
[ 8.96417860e-02 2.70000000e+01 0.00000000e+00 8.14664000e-03
5.40000000e+03 6.00000000e+00 0.00000000e+00 0.00000000e+00
0.00000000e+00 0.00000000e+00]]
print y_test[:20]
[[ 1. 0.]
[ 0. 1.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 0. 1.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]
[ 1. 0.]]
A:
tl;dr: The way the sample code above posted computes the cross-entropy is not numerically robust. Use tf.nn.cross_entropy_with_logits instead.
(in response to v1 of the question, which has changed): I'm worried that your training is not actually getting run to completion or working, based upon the nans in your x_train data that you showed. I'd suggest first fixing that - and identifying why they showed up and fixing that bug, and seeing if you also have nans in your test set. Might be helpful to show x_test and y_test also.
Finally, I believe there's a bug in the way y_ is handled in relation to x. The code is written as if y_ is a one-hot matrix, but when you show y_train[:10], it only has 10 elements, not 10*num_classes categories. I suspect a bug there. When you argmax it on axis 1, you're always going to get a vector full of zeros (because there's only one element on that axis, so of course it's the maximum element). Combine that with a bug producing always-zero output on the estimate, and you're always producing a "correct" answer. :)
Update for revised version
In the changed version, if you run it and print out W at the end of every execution by changing your code to look like this:
_, w_out, b_out = sess.run([train_step, W, b], feed_dict={x: [x_train[g]], y_: [y_train[g]]})
you'll observe that W is full of nans. To debug this, you can either stare a lot at your code to see if there's a mathematical problem you can spot, or you can instrument back through the pipeline to see where they show up. Let's try that. First, what's the cross_entropy? (add cross_entropy to the list of things in the run statement and print it out)
Cross entropy: inf
Great! So.. why? Well, one answer is that when:
y = [0, 1]
tf.log(y) = [-inf, 0]
This is a valid possible output for y, but one that your computation of the cross-entropy is not robust to. You could either manually add some epsilons to avoid the corner cases, or use tf.nn.softmax_cross_entropy_with_logits to do it for you. I recommend the latter:
yprime = tf.matmul(x,W)+b
y = tf.nn.softmax(yprime)
cross_entropy = tf.nn.softmax_cross_entropy_with_logits(yprime, y_)
I don't guarantee that your model will work, but this should fix your current NaN problem.
|
Dart Lang 1.2 Released - WoodenChair
https://www.dartlang.org/
======
afsina
Here is the announcement page:
[http://news.dartlang.org/2014/02/dart-v1-2.html](http://news.dartlang.org/2014/02/dart-v1-2.html)
And release notes:
[https://groups.google.com/a/dartlang.org/forum/#!msg/announc...](https://groups.google.com/a/dartlang.org/forum/#!msg/announce/Pm0DH7B6V6Y/BDD-
ArOJsf4J)
------
themckman
Working on a project that I kind of want to use the same language for the
frontend and the backend. There's, obviously, vanilla JS, maybe clojure and
clojurescript, but Dart...
For some reason I never realized it could be used server side. Anyone have any
practical experience with an app built entirely in Dart?
~~~
xxgreg
It works. There are a few people using it server side. There is a Heroku build
pack. The HTTP server is a bit slow, sounds like this is being addressed, and
shouldn't be a limiting factor. I wrote a postgresql driver, which works ok.
More users, issues filed and patches are always welcome ;)
------
fidotron
Politics aside, I find it interesting Dart isn't getting much traction at this
point. It seems it should be in a similar position to Java during the first
wave, but it clearly isn't.
By itself it's clearly not bad, it's just not better enough than what is there
already to suffer the inter-ecosystem pain with native JS. Since it can't do
anything JS can't the only selling point it really has is to build large JS
systems in some other safer language, but we've been there before with GWT,
and that didn't set the world on fire either.
~~~
RamiK
Java (Vs. Visual C++) had the industry and Academia trying to break free from
Microsoft's grip by going cross-platform and later in-browser.
Dart just doesn't have that kind of driving force going for it.
~~~
fidotron
True, I had missed that.
Maybe it's that environments mean much more than languages, and with Java the
JVM was the killer thing which dragged the language with it. Spark might be
that killer platform for Dart, but it strikes me as wishful thinking,
especially with players like github coming into that side of the market.
------
gtaylor
I've been working on a Dart project ([http://frontiermap.s3-website-us-
east-1.amazonaws.com/](http://frontiermap.s3-website-us-
east-1.amazonaws.com/)) with StageXL, a Dart transcription of ActionScript's
library: [http://www.stagexl.org/](http://www.stagexl.org/)
I've been meaning to write a blog post on my experience with Dart and StageXL,
but as far as the Dart part of things, a few misc. observations:
* Dart shows a lot of influence from Java, and obviously some tinges of JS. I don't really care, I wanted a productive web language with optional static types.
* It is a "boring" language in that it's not doing anything new or earth-shattering syntactically or conceptually. This ended up being a positive to me, in that I was able to ramp up extremely quickly. I'm a Pythonista by trade, I know enough JS/CoffeeScript to get by, and I've got a little bit of Java experience.
* Dart comes with so many tools, to the point where I'm not constantly trying to find and piece together core components like "module" imports, package managers, unit test frameworks, documentation generators, IDE. Not all of the tools are extremely polished at this point (their package browsing/searching site is incredibly basic), but there is a clear "way" to do most things. There's nothing stopping anyone from writing alternatives to the official stuff, either.
* The Dart->JS interop is OK for simple usage cases, but can get a bit complex for others. This is my only big hangup for non-hobby projects. This will improve with time, but it's very clunky for now.
* Types don't have to be specified, but I have tended to provide them for everything. I really like being able to do this, even coming from a Python background.
* The Dart IDE is surprisingly helpful. Debugging is decent, and they've stripped a ton of the bloat out from its Eclipse underpinnings. It does crash a bit on Arch Linux with the latest Oracle Java, though. That said, I hope they get in with the IDEA guys like they did for Android.
* My particular project uses WebGL, and I'm compiling to JS. I have yet to run into any complications with the conversion, and the generated JS has worked well on my two mid-range dev machines (Linux and Mac OS 10.9 on Chrome and Firefox).
* The error messages shown during interpretation/compiling are helpful most of the time, but can get a little more cryptic in certain cases (I've yet to find a pattern, but there probably is). I expect this to improve with time.
Overall, I have been very pleased with Dart, and like it (as a langauge) a lot
better than CoffeeScript. Optional types has been my favorite feature, and I
really like how "batteries included" Dart is. I'm a backend guy, so I don't
have the drive or mental bandwidth to go looking at the various
packaging/importing/testing/doc utils in JS land (although that is a perfectly
viable approach if you have the time and experience).
The ecosystem obviously can't be compared to JS, since Dart is in its infancy.
It'll be good enough for some usage cases, but you may find yourself re-
inventing things for others (or shoe-horning things in via the JS interop).
For hobby projects, Dart is going to get the nod over the alternatives
(Typescript, CoffeeScript, pure JS) until it burns me.
~~~
greggman
What if anything makes Dart better than say ES6 or ES7 or whatever version of
JavaScript that adds optional types, generators, etc...
~~~
kyrra
Dart is usable now. ES6 has long been delayed, and who knows when ES7 will be
available for mass usage.
There are lots of intro pages out there to get you a little more familiar with
it [0][1][2]. Dart as a language spec isn't all that deep, and it tries to
keep things simple and easy to use. A lot of the power I feel like comes from
the library and tools that come with the language.
[0] [http://programming.oreilly.com/2013/05/dart-is-not-the-
langu...](http://programming.oreilly.com/2013/05/dart-is-not-the-language-you-
think-it-is.html)
[1] [https://www.dartlang.org/docs/dart-up-and-
running/contents/c...](https://www.dartlang.org/docs/dart-up-and-
running/contents/ch01.html)
[2]
[http://en.wikipedia.org/wiki/Dart_(programming_language)](http://en.wikipedia.org/wiki/Dart_\(programming_language\))
~~~
kyrra
To add a few more useful links. Language spec[0][1] is available under a free
license and they welcome input on it[2]. The 3 top starred bugs in their
bugtracker are: enums, non-nullable types, and "await" support [3], though I
don't expect non-nullable types to ever be added, but they like hearing what
is important to programmers. If there is really a killer language feature that
people want, starring it will increase it's chances of being considered.
[0] [https://www.dartlang.org/docs/spec/latest/dart-language-
spec...](https://www.dartlang.org/docs/spec/latest/dart-language-
specification.html)
[1]
[https://code.google.com/p/dart/source/browse/trunk/dart/docs...](https://code.google.com/p/dart/source/browse/trunk/dart/docs/language/dartLangSpec.tex)
[2] [http://news.dartlang.org/2014/02/standardizing-dart-1st-
ecma...](http://news.dartlang.org/2014/02/standardizing-dart-1st-ecma-
tc52.html)
[3]
[https://code.google.com/p/dart/issues/list?can=2&q=&sort=-st...](https://code.google.com/p/dart/issues/list?can=2&q=&sort=-stars&colspec=ID%20Type%20Status%20Priority%20Area%20Milestone%20Owner%20Summary%20Modified%20Stars)
------
lukasm
I'd love to see dart going mainstream, but nobody would integrate VM, except
google.
~~~
melling
It doesn't matter. It compiles to JS and you still get a better language in
which to develop large apps. The generated JS is probably faster because of
the static analysis.
~~~
lukasm
Of course it does. Extra abstraction that may cause pain in fixing nasty
production bugs, can't use goodies from Dart jak SIMP etc. Logically it
doesn't matter, but empirically that doesn't happen.
------
tarpden
Is pub.dartlang.org Dart's "CPAN"?
I don't know Dart, but it looks as if you need a Google account to upload
packages to that central package repo. Is that correct?
------
puppetmaster3
Comparing TypeScript to Dart, one is clearly much better.
~~~
discreteevent
Would you like to share the answer with the rest of the class?
~~~
puppetmaster3
My comment was for the people that tried both, not bait for the people that
know one and not the other.
------
stefantalpalaru
It's "Dart" not "Dart lang" just like it's "Go" not "Golang". Let's keep SEO
out of common language.
~~~
Lambdanaut
sudo apt-get install golang
~~~
stefantalpalaru
emerge go
------
andyl
Dart: Google's ActiveX
~~~
haberman
Dart is nothing like ActiveX. But apparently it is "cool" to invoke ActiveX
for any browser technology you don't like.
ActiveX was a way of loading untrusted binaries in-process with the browser
and running them unsandboxed.
Does Dart run untrusted machine code unsandboxed? No.
If Dart is Google's ActiveX, then JavaScript is Netscape's ActiveX, Java is
Sun's ActiveX and Emscripten is Mozilla's ActiveX. (Note: none of these is
actually true)
Comparisons to Silverlight or Flash would also be inaccurate, since neither
can compile to JavaScript and both are closed-source technologies that are not
on any path to being standardized.
~~~
Touche
Dart is Google's JavaScript. JavaScript was developed exclusively by Netscape
and forced upon the web because of their dominance. Everyone agrees in
hindsight that it was bad to do it that way. And now today Google is
attempting the same thing.
~~~
coldtea
> _Everyone agrees in hindsight that it was bad to do it that way._
I, for one, don't. Better Javascript, with all its warts, than the W3C taking
10 years to create some standard language that was a comitee monstrocity (as
they used to do a lot, until HTML5).
|
With 7,107 Islands, a land area of 343,448 square kilometers, Philippines is bigger than Italy, Britain or North & South Korean combined. I’m sure you’ll have a hard time finding where to start your wanderlust in the Pearl of the Orient. The Philippines is teeming with travel adventure & experience. Its countless tourist attractions spell year long journey and priceless life moments.
This article will help you find the top and famous pictures of tourist spots and landmarks from the 81 provinces of the Philippines in alphabetical order.
1. Abra Province – The Abra River
Photo by Flickr | Ian Ong
2. Agusan del Norte Province – Lake Mainit
Photo by Flickr | Edgar Alan Zeta-Yap
3. Agusan del Sur Province – Agusan Marsh
Photo by Flickr | Allan Millan
4. Aklan Province – Boracay Island
Photo by Flickr | Patrick Payne
5. Albay Province – Mayon Volcano
Photo by Flickr | Rex Montalban
6. Antique Province – Sunset in Tibiao
Photo by Flickr | Ric Amar
7. Apayao Province – Rice Field in Buneg
Photo by Flickr | Lala’s World
8. Aurora Province – Waves of Baler
Photo by Flickr | Jose Figueroa
10. Bataan Province – San Miguel Lighthouse
Photo by Flickr | Dinno Sandoval
11. Batanes Province – Racuh A Payaman
Photo by Flickr | Dan Carlo07
12. Batangas Province – Anilao Diving Spot
Photo by Flickr | Ludovic
13. Benguet Province – La Trinidad Strawberry Farm
Photo by Flickr | Kesh Matlong
15. Bohol Province – Chocolate Hills
Photo by Flickr | Al Michael Caballes
16. Bukidnon Province – Bukidnon Landscape
Photo by Flickr | Jojo Nicdao
17. Bulacan Province – Barasoain Church
Photo by Flickr | Rodrigo Layug
18. Cagayan Province – Dos Hermanos Islands
Photo by Flickr | Poma Malantic
19. Camarines Norte Province – Calaguas
Photo by Flickr | Dexter Baldon
20. Camarines Sur Province – Caramoan
Photo by Flickr | Tony Hidalgo
21. Camiguin Province – White Island, Camiguin
Photo by Flickr | Dexter Tiangco
22. Capiz Province – Olotayan Island – Sawang
Photo by Flickr | Rome Gerardo
23. Catanduanes Province – Maribina Falls
Photo by Flickr | Herald Presado
24. Cavite Province – Tagaytay Picnic Grove
Photo by Flickr | Sonny Saguil
25. Cebu Province – Malapascua Island
Photo by Flickr | Sandy Gabutin
26. Compostela Valley Province – Awao Waterfalls in Monkayo
Photo by Flickr | Brian Mark Barqueros
27. Cotabato Province – Lake Holon in T’boli
Photo by Flickr | Edgar Alan Zeta-Yap
28. Davao del Norte Province – Talicud Island
Photo by Flickr | Sweet Caroline Espejon
29. Davao del Sur Province – Samal Island
Photo by Flickr | Boiworx
30. Davao Occidental Province – Sta Maria
Photo by Flickr | Joseph Gumla
31. Davao Oriental Province – Sleeping Dinosaur in Mati
Photo by Flickr | Joseph Bernal
32. Dinagat Islands Province – Babas Cove in Basilisa
Photo by Flickr | Edgar Alan Zeta-Yap
33. Eastern Samar Province – Calicoan Island
Photo by Flickr | Kullen & Family
34. Guimaras Province – Natago Beach
Photo by Flickr | Mambol
35. Ifugao Province – Batad Rice Terraces
Photo by Flickr | Loveleen Dee
36. Ilocos Norte Province – Bangui Windmill
Photo by Flickr | Michael Yap
37. Ilocos Sur Province – Calle Crisologo
Photo by Flickr | Adam Dimech
38. Iloilo Province – Islas de Gigantes
Photo by Flickr | Ed
39. Isabela Province – Sta Victoria Cave
Photo by Flickr | J Abibas
40. Kalinga Province – Kalinga Mountains
Photo by Flickr | Ruro Photography
41. La Union Province – San Juan Surf
Photo by Flickr | Benjo Robles
42. Laguna Province – Pagsanjan Falls
Photo by Flickr | Jet Rabe
43. Lanao del Norte Province – Tinago Falls
Photo by Flickr | Valguz488
44. Lanao del Sur Province – Pagayawan Mosque
Photo by Flickr | Life4Water
45. Leyte Province – Kalanggaman Island in Palompon
Photo by Flickr | Vera Venus
46. Maguindanao Province – Masjid Dimaukom
Photo by www.byaherongbarat.com
47. Marinduque Province – Marinduque
Photo by Flickr | JonesPhoto17
48. Masbate Province – Esperanza
Photo by Flickr | Philip Lee
“
49. Misamis Occidental Province – Misamis Occidental Aquamarine Park
http://flic.kr/p/6SExnD
Photo by Flickr | Rev Adan
”
50. Misamis Oriental Province – White Water Rafting in CDO
Photo by Flickr | Doc Jabagat
51. Mountain Province Province – Sumaguing Cave in Sagada
Photo by Flickr | Rawen Balmaña
52. Negros Occidental Province – The Ruins in Bacolod
Photo by Flickr | Benjo Rulona
53. Negros Oriental Province – Manjuyod Sandbar
Photo by Flickr | Dexter Sadang
54. Northern Samar Province – Magasang, Biri Island
Photo by Flickr | Dinno Sandoval
55. Nueva Ecija Province – Minalungao National Park
Photo by Flickr | Manny Francisco
56. Nueva Vizcaya Province – Mt. Kasibu
Photo by Flickr | Karen Gonzalez
57. Occidental Mindoro Province – Apo Reef in Sablayan
Photo by Flickr | Macoi Mestidio
58. Oriental Mindoro Province – Puerto Galera
Photo by Flickr | Steve Almeda
59. Palawan Province – Miniloc Island, El Nido
Photo by Flickr | Mon Corpuz
60. Pampanga Province – Candaba Swamp
Photo by Flickr | Allan Barredo
61. Pangasinan Province – Hundred Islands
Photo by Flickr | Vera Venus
62. Quezon Province – Borawan Island
Photo by Flickr | Danielle Cuaresma
63. Quirino Province – Maddela Rapids
Photo by Flickr | Marlowe311
64. Rizal Province – Agos River in Daraitan, Tanay
Photo by Flickr | Dexter Baldon
65. Romblon Province – Carabao Island
Photo by Flickr | Vera Venus
66. Samar Province – Rakit Dakit, Samar
Photo by Flickr | Casey Caballero
67. Sarangani Province – Gumasa Beach in Glan
Photo by Flickr | Omar Gallinero
68. Siquijor Province – Coco Grove Beach
Photo by Flickr | Johannes Landin
69. Sorsogon Province – Whale Shark in Donsol
http://www.traveltothephilippines.info/2011/11/23/whale-shark-watching-in-donsol-sorsogon/
Photo by TraveltoPhilippines.com
70. South Cotabato Province – Dongon Falls
Photo by Flickr | Sweet Caroline Espejon
71. Southern Leyte Province – Wawa Bridge of Liloan
Photo by Flickr | Ronald Tagra
72. Sultan Kudarat Province – Lagbasan Cave
Photo by Flickr | Jing Velos
74. Surigao del Norte Province – Bucas Grande Island
Photo by Flickr | Mikko Dapula
75. Surigao del Sur Province – Enchanted River
Photo by Flickr | Raquel Bagnol
76. Tarlac Province – Mt. Pinatubo Crater
Photo by Flickr | Romain John
77. Tawi-Tawi Province – Bongao
Photo by Flickr | Farl
78. Zambales Province – Lilies in San Felipe
Photo by Flickr | Michael Cabrales
79. Zamboanga del Norte Province – Tamipilisan Falls
Photo by Flickr | JB Ajero
80. Zamboanga del Sur Province – Lake Wood in Laag
Photo by Flickr | Filan
81. Zamboanga Sibugay Province – Buluan Island
Photo by Flickr | Edgar Alan Zeta-Yap
So what are you waiting for?
Comments
comments
|
IF THE THUGS in the Oakdale Mob are not deterred by the prospect of long prison sentences for murder and drug dealing -- among their many alleged crimes -- why would they give a moment's thought to a court injunction to stop them from hanging out in a four-block section of Bayview-Hunters Point?
In truth, a few days in jail or $1,000 fines are unlikely to instill much fear in a notorious gang that has run amok in the neighborhood for far too long. Members of the gangs are suspected in at least 12 killings over the past three years.
Nevertheless, City Attorney Dennis Herrera's office will try to persuade a Superior Court judge today to issue a preliminary injunction to keep 22 of the core gang members from congregating in the area around Oakdale Avenue and Baldwin Court near public housing in the southeast corner of San Francisco.
Any government attempt to curtail free association should be subject to close scrutiny. In this case, Herrera has more than 1,000 pages of documentation of the Oakdale Mob's reign of terror. He also narrowed the designated "safety zone" -- where the targeted gang members could still come and go, but with restrictions on their activities -- to the four-block area. Other cities, such as Los Angeles, have secured injunctions restricting the actions of gang members over much wider swaths of the city.
District Attorney Kamala Harris, who supports Herrera's move, acknowledged that "the best way to get those guys is to convict them and send them to prison." Still, she suggested the civil and criminal penalties could serve to unnerve the gang with the "threat of something that is ominous and unknown." Equally significant is the signal that it sends to law-abiding residents who have been intimidated by the gangsters and are wary of the city's inability to stop the violence.
The understandable reluctance of residents to cooperate with investigations is a long-running impediment to cracking down on the Oakdale Mob. The injunction should encourage more communication between the neighborhood and police. If it is enforced with consistency and reasonableness, it will help establish a trust that has been missing.
|
Investors are warming their hearts and opening their minds to the power of love. While this takagari courting stunt has seen better days, and certainly better centuries, it shows new signs of life after blinded falconer Theo Webber used his prized Saker Falcon to deliver love notes to his amnesiac fiancé on ABC's Wings of Love. The popular soap stirred many a housewife, and had every male falconer on the block eager to follow Theo's lead.
12
Picking the King's Apples
+0.48
The old bandit tradition of using falcons to steal apples from Royal Apple Trees has seen renewed interest after its use in the recent wave of high profile Los Angeles diamond robberies. LA Police Chief William Bratton was quick to denounce the crimes. "This is not a joke or a laughing matter," he said during a press conference. "We are doing everything in our power to put these men and their falcons behind bars." Still, many falconers can't help but appreciate the artistry involved, fueling Picking's modest gains.
13
The Bombardier
+0.27
Bombardier posted dubious gains after its usage fueled an Atlanta nightclub brouhaha. A police report indicates that a falconer used his Harris' Hawk to drop GHB into the drinks of female patrons. A lariateur at the club noted the unseemly tactic and quickly lassoed him for authorities. While the would-be rapist and his falcon were arrested and charged, news of the story inspired numerous copycat attempts throughout the country. Many nightclubs are now cracking down and instructing bouncers to turn falconers away.
14
There Goes The Gentleman's Hat!
-0.42
This old standard took some dents in trading after a series of gruesome accidents. "Plucking hats off gentlemen requires a high level of training," said ESPN falconry analyst Mitch Matthews. "We're not seeing that training. We're seeing head scars and eye gouges and it's not pretty."
15
The Repeated Plummet
-0.65
This stunt lives up to its name posting serious losses for the second day in a row. A tepid performance by Amy Boston on NBC's America's Got Talon didn't help matters. If anything, she flew this stunt right into a window.
16
Calcutta Rat Catcher
-1.24
When Bruce "Wildfeather" Tyson saw Indian falconers plucking rats from the streets of Calcutta and dropping them into boiling cauldrons, he knew he had to bring the stunt to America. After decades of popularity in city and country alike, the stunt is finally showing its age, largely due to the scarcity of rats and lack of public cauldrons.
17
A Taste of Grandpa's Medicine
-3.47
There's no end to the feather ruffling caused by this oft-decried stunt, thanks to the excessive mouth-beak contact. "Vultures eating the faces of the dead don't even get this much tongue," joked ESPN's Mitch Matthews on Tuesday's episode of Claws Out. "Frankly, I can't even figure out why it hasn't been banned yet. It doesn't even involve flying."
18
Feathers & Leather
-4.78
Shock falconer Percy Dick got a little too close for comfort with his osprey, prompting fans to walk out on his most recent performance. The offending stunt, which saw the bird repeatedly swooping in-between his gyrating legs, turned stomachs faster than eyes. George Greensmith, who heads Wingspan, the largest union of falconry promoters, said Dick would no longer be welcome in their venues. With that, Feathers & Leather dives headfirst into oblivion.
19
The Bird is the Word
-9.24
Strong words of condemnation from Pope Benedict XVI sent the Bird crashing down. "There can be only one Word, and that is the Word of the Heavenly Father," said the Pontiff in an official decree from the Vatican. NAFA, in an attempt to avoid controversy, agreed that the stunt was in poor taste. In spite of its sudden unpopularity, some falconers are saying the Bird won't stay grounded for long.
20
The Phoenix Rises
-10.24
Fans attending this year's Falconfest were in for a shock when Buck Whitely set his prized Goshawk aflame for a perverted take on the Soucar's Gamble. Stunned crowds began booing and pelting Whitely with refuse until officers arrested him for animal cruelty. Alvin, the charred bird, left this world in a blaze of glory never to rise from the ash. NAFA has condemned this stunt and urged against its practice. In addition to losing his license, Whitely faces a lifetime blacklisting.
|
The present invention grows out of a continuing development of forging hammer controls. In recent years, forging hammers have increasingly been of the compressible fluid driven type. A device disclosed in U.S. Pat. No. 4,131,164, the invention of Wilmer W. Hague and Charles W. Frame, senses position of the ram, and hence the piston, to make sure that the piston position does not partially occlude the intake port when the inlet valve is opened in order to assure repeatable performance. The impact device of U.S. Pat. No. 3,464,315, the invention of Henry A. Weyer, provides pilot valves to control inlet and exhaust valves. U.S. Pat. No. 3,818,799, the invention of Wilmer W. Hague, allows both the number and intensity of the series of blows to be performed by a forging hammer to be preselected. Each of these patents is assigned to the assignee of the present invention, Chambersburg Engineering Company.
These prior art refinements represent important steps along the road to automation and efficiency. However, these developments were accomplished by knowing what the forging device was capable of doing and assuming that it would always perform in precisely the same way, or making correction based upon a single parameter to allow the forging device to perform that way. While this assumption resulted in important improvements over the prior art, the assumption was a generalized one and often subject to error. In fact, many factors enter into the operation of the forging hammer which cause the energy of blows intended to be identical, to vary from one another, depending upon variations in operating parameters.
The advent of computer assisted die design, which prescribes discrete magnitudes of forging energy, demands that forging equipment be capable of delivering precise energies per blow. Developments of this sort have made greater precision in energy control in a forging operation of great significance. The present invention is in response to this need.
|
#include <bits/stdc++.h>
using namespace std;
#define MAXN 200009
typedef long long int ll;
typedef pair<int, int> ii;
/*
* ALGORITMO DE MO
*/
int arr[MAXN], N, sn, Q;
bool appeared[MAXN];
int inv[MAXN]; //mo tree
struct query {
int l, r, id, lca;
int ans, tot;
query() { l=r=id=lca=-1; }
query(int _id, int _l, int _r){
id = _id; l = _l; r = _r; lca = -1;
}
} qrs[MAXN];
bool lrcomp(query a, query b){
if (a.l/sn != b.l/sn) return a.l/sn < b.l/sn;
return a.r > b.r;
}
bool idcomp(query a, query b){
return a.id < b.id;
}
int freq[MAXN], curTot, freqs[MAXN], maxfreqs;
void check(int i) {
if (i < 0 || i>= N) return;
if (appeared[inv[i]]) { //mo tree
freqs[freq[arr[i]]]--;
freq[arr[i]]--;
curTot--;
freqs[freq[arr[i]]]++;
if (freqs[maxfreqs] == 0) maxfreqs--;
}
else {
freqs[freq[arr[i]]]--;
freq[arr[i]]++;
curTot++;
freqs[freq[arr[i]]]++;
maxfreqs = max(maxfreqs, freq[arr[i]]);
}
appeared[inv[i]] = !appeared[inv[i]]; //mo tree
}
void mo(){
sn = sqrt(N);
sort(qrs, qrs+Q, &lrcomp);
memset(&freq, 0, sizeof freq);
memset(&freqs, 0, sizeof freqs);
maxfreqs = 0;
int l = 1, r = 0;
curTot = 0;
for(int i=0; i<Q; i++){
query & q = qrs[i];
while(r > q.r) check(r--);
while(r < q.r) check(++r);
while(l < q.l) check(l++);
while(l > q.l) check(--l);
q.ans = maxfreqs;
q.tot = curTot;
}
sort(qrs, qrs+Q, &idcomp);
}
/*
* LCA
*/
#include <vector>
#define MAXLOGN 20
vector<ii> adjList[MAXN];
int depth[MAXN], level[MAXN];
int P[MAXN][MAXLOGN];
void depthdfs(int u){
for(int i=0; i<(int)adjList[u].size(); i++){
int v = adjList[u][i].first;
int w = adjList[u][i].second;
if (v == P[u][0]) continue;
P[v][0] = u;
level[v] = 1 + level[u];
depth[v] = w + depth[u];
depthdfs(v);
}
}
void computeP(int root){
level[root] = depth[root] = 0;
P[root][0] = root;
depthdfs(root);
for(int j = 1; j < MAXLOGN; j++)
for(int i = 1; i <= N; i++)
P[i][j] = P[P[i][j-1]][j-1];
}
int LCA(int a, int b){
if(level[a] > level[b]) swap(a, b);
int d = level[b] - level[a];
for(int i=0; i<MAXLOGN; i++){
if((d & (1<<i)) != 0) b = P[b][i];
}
if(a == b) return a;
for(int i = MAXLOGN-1; i>=0; i--)
while(P[a][i] != P[b][i]){
a=P[a][i]; b=P[b][i];
}
return P[a][0];
}
/*
* TREE MO
*/
int st[MAXN], en[MAXN], cnt, c[MAXN];
void prepos(int u, int p) {
arr[cnt] = c[u];
inv[cnt] = u;
st[u] = cnt++;
for(int i=0; i<(int)adjList[u].size(); i++) {
int v = adjList[u][i].first;
int w = adjList[u][i].second;
if (v == p) continue;
c[v] = w;
prepos(v, u);
}
arr[cnt] = c[u];
inv[cnt] = u;
en[u] = cnt++;
}
void treemo(int root) {
cnt = 0;
c[root] = -1;
prepos(root, -1);
computeP(root);
N = cnt;
memset(&appeared, false, sizeof appeared);
for(int i=0, u, v, lca; i<Q; i++) {
query & q = qrs[i];
u = q.l; v = q.r; lca = LCA(u, v);
if (st[u] > st[v]) swap(u, v);
if (lca == u) q.l = st[u]+1, q.lca = -1; //propriedade na aresta
else q.l = en[u], q.lca = -1;
//if (lca == u) q.l = st[u], q.lca = -1; //propriedade no noh
//else q.l = en[u], q.lca = st[lca];
q.r = st[v];
}
mo();
}
/*
* SPOJ COT2
*/
int main()
{
scanf("%d %d", &N, &Q);
int u, v, w;
for(int i=1; i<N; i++) {
scanf("%d %d %d", &u, &v, &w);
adjList[u].push_back(ii(v, w));
adjList[v].push_back(ii(u, w));
}
int l, r;
for(int i=0; i<Q; i++){
scanf("%d %d", &l, &r);
qrs[i] = query(i, l, r);
}
treemo(1);
for(int i=0; i<Q; i++){
printf("%.10f\n", qrs[i].ans*100.0/qrs[i].tot);
}
return 0;
}
|
Anti-Abortion Activists Step Up Plans to Harass Women Using Red River Women’s Clinic
The Fargo Catholic Diocese has decided to increase their assault on women trying to exercise their legal rights to an abortion by opening a new chapel directly across the street from the Red River Women’s Clinic, North Dakota’s only abortion clinic. The chapel plans to hold a mass every Wednesday to coincide with the one day the clinic is open.
The Church wants to demonstrate God’s love for women by controlling their lives —
The Church wants to demonstrate God’s love for women by convincing them to turn off their brains and let the Church do all their thinking —
The Church wants to make sure that women understand at every moment that the Church is eager for them to be martyred and disgusted with them for resisting —
The Church wants to demonstrate God’s plan for women by restricting them to two life choices, choistered sexless virgin or a mindless household drudge used for breeding —
The Church wants to demonstrate God’s love for women by convincing them to voluntarily erase themselves and become self-abnegating servants who believe they deserve nothing, not even life, as a deserved lifetime punishment for the sin of being born inferior females.
littlepunklost
These people are pathetic. They really believe in what they’re doing, but why waste this much energy on trying to shame women out of making the choices they need to make? Surely there’s a better way to spread Christ’s love and message other than shaming women. They’re just so hypocritical and ignorant that it’s sickenening.
|
three things
1.) Tired! There is not enough coffee in the world to keep me awake. This week Dylan likes to wake up at 5:30 for a cry and a quick cuddle, but this morning, he decided to stay up for breakfast as well. Funny thing is that we had our alarms set for 5:30 anyway, so that I could do some writing, and Jim could do some work, but instead we entertained a tired and hungry baby.
2.) Tofurkey! Man that sounds weird, and for some reason, I feel a little embarrassed typing the word. But my vegetarian husband is slowly brainwashing me, and I have to say it actually tastes really good.
and 3.) Today is the day I stop eating like a frat boy. That day was also yesterday, and the day before, and it will probably be tomorrow as well. But anyway, today is the dayÖ
This entry was posted in Uncategorized.
Post navigation
One thought on “three things”
My regular alarm time is 5:15 on work days. On those days I have the insane pleasure of not getting out of work until after 7 p.m. Then there’s the two hour ordeal to get J out of grandma’s house and home. Then there’s dinner to cook, house to clean, dishes to put away, time to spend with the munchkin, and bags to prepare for the next day. I feel you on the tired! And I totally understand the not enough coffee! Most nights I’m asleep before my head touches the pillow.
Tofurkey? I’ll have to try it for curiosity’s sake now. My little sister declared herself vegan for a few years, and I tried a lot of new stuff then. Most of it good.
Fratbot eating is a good thing, sometimes. So long as it’s not an everyday thing.
Your email address will not be published. Required fields are marked *
Comment
Name *
Email *
Website
Search
don’t miss anything!
Sign up here to be notified about new releases, book discounts, exclusive sneak peeks, and occasional free goodies! Emails are sent quarterly, or less, delivered straight to your inbox only when there's something super juicy you need to know!
murder of innocent laptop keyboards
to date, 4 keyboards have died to produce these stories
keyboard #1: death by coffee, knocked over by child carrying a broomstick // keyboard #2: death by ice water, my fault // keyboard #3: gravely ill, arrow keys ceasing to function, which makes editing a bitch - declared terminal, will euthanize soon // keyboard #4 (and whole laptop): killed dead before its time by a vicious internet virus :( // keyboard #5 (on new laptop): was accidentally injured just days after its arrival by a fingernail that flicked off its "+" key -- really, it should NOT be that easy to flick off a keyboard key! But otherwise, is alive and well.
|
Hemodialysis vascular access morbidity in the United States.
Extensive morbidity related to hemodialysis vascular access exists among end-stage renal disease (ESRD) patients, but the risk factors for this morbidity have not been extensively studied. Medicare ESRD patient data were obtained from 1984, 1985, and 1986. Hospitalization for vascular access morbidity (ICD-996.1, 996.6, or 996.7) was analyzed among prevalent patients and, using survival analysis, among incident patients to assess sex, age, race, and underlying cause of renal failure as risk factors. We found that 15 to 16% of hospital stays among prevalent ESRD patients were associated with vascular access-related morbidity. Black race, older age, female sex, and diabetes mellitus as a cause of kidney failure were all independent risk factors for access-related morbidity. The rate ratio comparing Blacks to Whites was 1.12 (95% C.I., 1.09, 1.16); > 64 years to 20 to 44 years, 1.53 (1.46, 1.59); men to women, 0.81 (0.79, 0.84); and diabetes to glomerulonephritis, 1.29 (1.24, 1.35). We conclude that hemodialysis vascular access malfunction causes much hospitalization among ESRD patients. Women, Blacks, the elderly, and diabetics appear to be at particularly high risk, and additional studies are needed to understand these patterns.
|
Weekly Purchases – 08/26/14
I used $2500 in new capital and added $92.11/year to my dividend income. This is an average yield of 3.68%.
Note:
Large purchase this week. I had some extra capital I wanted to put to work before the end of the month.
I added more MO before the ex-dividend date. They recently had a nice raise and I believe the company will continue rewarding shareholders for a long time.
BBL is now a full position. Even with the “demerger” talks, I decided to add a little extra after the pullback.
I think DE is at a great value and I’d like to bring it up closer to my position in CAT since I want these to end up being half positions.
I recently added AWR last week. I plan to keep adding more while dollar-cost-averaging on this great company that’s been paying out higher dividends for 60 years!
It’s nothing new that I keep building up a full position in UL. With a giant portfolio of well-known brands and 3.5% yield, what’s not to like! I’m getting closer to a full position.
KMI is already a larger position of mine, possibly the largest. The recently announced news to consolidate into one company sent shares up quite a bit. I believe KMI still has great long-term growth going foward. I’m also more confident after Richard Kinder laid out his dividend plan for the next few years.
Picture:
Just for some fun and to add some color I will be posting pictures of places I’ve been to. It’s also motivation to reach FI so I can travel and do what I want to when I want to.
This is a picture from my recent trip to Hawai’i. It was taken on The Big Island during a helicopter tour we took.
Comments
Great purchases AAI. $2500 for the week is wonderful. I am a big fan of MO myself and hold that. But I don’t hold any other companies mentioned, though I would like to initiate positions in DE and UL pretty soon.
I wish I could add that much every week. I’m behind my contribution level of last year and am hoping to ramp up the purchases the second half of the year. Glad to have you as a fellow shareholder in those companies. AWR as I mentioned, is a new position but they have a very long streak of increases.
Thanks! I love UL and I think about the company every day as I use their Dove soap lol. MCD and T are both solid and I think can be bought at a decent price currently. I added T fairly recently in a couple of big purchases in my Motif account. I don’t think you can go wrong with any of those.
I have AWR on my watch list. The dividend growth the past few years has really shot up. The last raise wasn’t quite as much but still about 5% which is really good for a utility. I really like utilities, I think a lot more than your typical dividend investor does. I see them as very defensive and I like the safety there.
CDCaptain Dividend recently posted…Top 40 Stocks Held By DGI Bloggers
Utilities are definitely defensive and it might be a good idea to add some if you think a big correction is coming. Either way, I plan to allocate a portion of my portfolio for them. I also like the business of water, nobody can live without it. AWR also has a monster dividend streak going. It’s one of those companies that I’m confident won’t be going anywhere in my lifetime.
Categories
Disclaimer
I am not a licensed financial professional. I created this site to be informative and entertaining. No purchases I make are recommendations to buy those particular equities. I'm not liable by any party for losses you might incur. All investments are subject to losing money and you should consult a financial professional before making any investment decisions.
|
I have two Fisheye Fix LED48DX focus lights with diffuser filter, red filter and handle that I am not using that are collecting dust on my shelf that I am willing to sell for $100 each plus postage. I also have a new stix buoyancy arm for one fisheye light.
|
After GOP gained control of all three branches of governments, then reneged on it's pledge to end illegal immigration, repeal ObamaCare, and implement tax reform: "Dems see control of Congress in reach" in 2018 after 2017's election upsets.
Two EXCLUSIVE FBI reports prove existence of “the Deep State” working against Trump's agenda, warns of ISIS ties to the anti-Trump "resistance,” and highlights dangers of domestic terrorism from anti-Trump radicals.
Who's the friend of Wall Street fat cats now? Obama set to receive $400,000 from one speech to the investment firm Cantor Fitzgerald, which is double the amount the Clinton’s charged for similar speeches.
Chuck Schumer fact-checked by Washington Post over claim that 'millions of women turn' to Planned Parenthood for mammograms: "It does not have mammogram machines".The Post previously gave "The repeated, misleading claim that Planned Parenthood 'provides' mammograms" Three Pinocchios. PolitiFact says Chuck Schumer tells the truth only 12% of the time.
Target told us there was nothing to fear from their "inclusive" bathroom policy, but they were categorically mistaken. As reported by Chicago police, a mother entered the Target unisex bathroom with her young daughter, and moments later, a man entered who stated that he needed to use the bathroom. Based on Target's 'inclusive' policy, he was allowed to do so without restrictions, and based on horrified witness' statements, he then pushed into the stall occupied by the little girl, exposed his genitals, relieved himself, then fled the scene. Police described this 'pee-vert' as "black with a dark complexion, about 30 to 40 years old, 5-foot-10 to 6 feet tall, 170 to 190 pounds and wearing a red jacket, dark-colored hat, gray pants and sunglasses." Target spokesperson Danielle Schumann's attempt to sugarcoat the incident was pathetic, because she told NBC Chicago that the man was only drunk when he exposed and relieved himself. And in any liberal's opinion, that makes everything okay.
SHULKIN COULDN'T WHISTLE HIS WAY PAST THE GRAVEYARD.
Though we feel at times that President Trump has been 'fire crazy' in regard to dismissing his cabinet members, we fully concur that this one deserved the ax. We say "good riddance" to ex-Veterans Administration chief David Shulkin who -- according to his arrogant account -- did nothing to deserve an ouster. But we think differently, and could we offer him some advice, it would be this; When you're caught with your hand firmly in the cookie jar, it's better to accept your fate than to try whining and lying your way around it, e.g., issuing a statement saying that documented facts regarding such are “neither accurate nor objective”. And when an inspector general’s report found “serious derelictions” in Shulkin’s leadership, among them doctoring emails to allow he and his wife luxurious European vacations at taxpayers' expense while veterans went without, well ... Regarding that, a report from the Inspector General for the Department of Veterans Affairs found that the Washington D.C.'s VA Medical Center has for years “suffered a series of systemic and programmatic failures to consistently deliver timely and quality patient care,” and heightening the potential for waste, fraud and abuse of government resources. Additionally, the D.C. facility lacked clean areas for medical supplies, had staffing issues across multiple departments and that approximately $92 million in supplies and equipment were purchased over a two-year period without “proper controls to ensure the purchases were necessary and cost-effective.” The report details many other troubling conditions, and faulted “failed leadership at multiple levels within VA that put patients and assets … at unnecessary risk.”But to make matters worse, much evidence indicates that Shulkin knew about these monumental VA shortcomings and did nothing. Hence, we feel that a just reward for his laziness and greed would be a lengthy nighttime jail stint combined with daytime community service consisting of scrubbing floors and toilets in that filthy D.C. VA facility for many future years.
Before judging this 'book' by its cover, let's ask ourselves if President Trump deserves all the hatred he receives 24/7.Naturally, most liberals despise Republican ideals, but when mainstream reporters openly voice sick fantasies regarding slow and agonizing ways that Donald Trump might die, well .... We'll admit our frequent embarrassments over many inane missteps of our 'Tweeter In Chief' –– especially his "sh-thole" comment while he referenced third world countries –– and we've made sport of him aplenty. And for different reasons, so did we of ex-President Obama, and wished he'd shut the (bleep) up, but when it came to fancying his slow and excruciating death, we drew the line. But, back to the ugly business regarding the press' fantasies for Donald Trump's agonizing demise: Among the mainstream press reporters' longed for possibilities were "dementia, Alzheimer's, stroke, heart disease, drug addiction, colon cancer ..." So, the point of the satirical picture was to express that –– no matter how much one person despises another –– some things are best whispered, or never publicly uttered, and often better kept to oneself, altogether. But when it comes to candidly and publicly wishing slow and painful deaths upon others for political reasons, well .... that takes plentiful doses of blind hateful ignorance mixed with mental instability. In light of that, perhaps we shouldn't hold the mainstream press' liberals accountable for uttering such things, after all.
Having experienced multiple days when –– as the saying goes –– we felt damned if we did, or damned if we didn't, our sympathies went to Donald Trump December 6, 2017. It was assuredly one of those days for him, and though we frequently find reasonable fault with our 'Tweeter in Chief', December 6th was not one of those days. Kudos to Trump for asserting that Jerusalem is Israel's capital, because Obama's thirst for revenge against Israel's Prime Minister Netanyahu led to a change in America's longstanding United Nations policy. Up to then, America's policy was to veto any U.N. Security Council resolutions put forth by anti-Semitic nations that defined Israel's occupation of Jerusalem's as a “flagrant violation under international law.” By Obama altering that longstanding policy, he made all reasonable peace talks impossible by handing Palestine vast leverage to make unreasonable demands. As such, as our picture above indicates, there never was any placating of Palestine's perpetual prerogative to ruin every peace accord by launching attacks on Israel merely to continue the Arab world's anti-Semite quest to push every Jew into the sea. So it's "damned if you do or don't" for Trump, especially when adding the mainstream press' distain for anything pro-Israel, but there is good news: Trump's declaration ended a quarter century of lies: When running for president 25 years ago, Bill Clinton promised to “support Jerusalem as the capital of the state of Israel.” President George W. Bush criticized Clinton for not following up on that commitment, but then W failed to make good on his too. During Barack Obama’s 2008 campaign, he stated that, “we should move our embassy to Jerusalem” but never recognized the city as the capital once he was elected. Per se, we'll set aside our Trump faultfinding for another day.
Frankly Conservative doesn't consider itself the pinnacled arbiter of truth or fiction, but can recognize something that's fallen from a horse's rear. Having said that, we've made clear our opinion of the 257 boring partisan-filled pages of Donna Brazile's "Hacks; The Inside Story of the Break-ins and Breakdowns That Put Donald Trump in the White House". Despite many conservative pundits glomming onto 'revelations' from Brazile's book telling that Hillary colluded with the DNC and mainstream press to deny Bernie Sander the nomination, that was old news: The first edition of Brazile's book was released early this November 2017, but The Washington Post reported in July 2016 that "DNC officials appeared to conspire" against Sanders, and that Hillary was the DNC's puppeteer. But what about Brazile's 'bombshell' that Obama bankrupted the DNC by spending the entirety of its money on his 2012 reelection campaign? No surprise there, either: Fortune magazine reported Sept. 2013 that "The Democratic National Committee remains so deeply in the hole from spending in the last election that it is struggling to pay its own vendors". And regarding Brazile admitting that she helped Hillary cheat in the primary debates by feeding her questions that would be asked by debate moderators? She not only denied it in her book, but also blamed Russian hackers for planting phony emails to that regard on the DNC server. As such, we found this duplicitous explanation on page 299 why she publicly admitted passing those questions to Hillary: "Even if I couldn't remember sending it -- and couldn't find it in my online files -- there was no proof that I had not sent it. The best course was for me to apologize, and I did". One simply would not forget doing wrongs of such magnitude, and we could ramble on regarding multiple obvious falsehoods from "Hacks", but since brevity is the soul of wit, we'll leave readers with this single dung nugget: An example of Brazile's unflappable sycophantic worship of Hillary (which remained consistent throughout "Hacks") can be found on page 205 regarding Clinton's illegal email server: "I knew Hillary was an honest person, and if she had made a slip in her emails, it was not from a desire to hide anything". Yep, we're still laughing, too.
Comrade Bernie?
With Facebook turning-over Russian-funded ads to Congress, and new revelations published in a tell-all book by ex-interim DNC Chair, Donna Brazile, perhaps this investigation of Russian meddling in U.S. elections should focus on Bernie Sanders. However, in its never-ending attempt to infer that Trump colluded with Russia to steal the White House from Hillary, the Associated press regurgitated this moldy hairball one year later on Nov. 2, 2017: "U.S. intelligence services say the Russian use of social media was part of a broad effort to sway the 2016 presidential election in favor of Trump". How disingenuous, since the AP reported concrete info to the contrary in that very same article: Of the ads that Facebook turned over to Congress for scrutiny, Russia sought to equally de-legitimize both Trump and Clinton, but offered something different to the campaign of the self-professed socialist, Bernie Sanders: "The (Facebook) ads, seen by vast numbers of people, encouraged street demonstrations against Donald Trump and Hillary Clinton and fostered support and opposition to Bernie Sanders, Muslims, gays, blacks and the icons of the Civil Rights movement."As such, Trump and Clinton received only "opposition" from Russia, but Sanders received both "support and opposition", plus Russia urged Sanders' pro-socialist "antifa" supporters to stage "street demonstrations" against Trump and Clinton, but not Sanders. How better for Russia to accelerate America's demise than by promoting the election of a socialist president whose followers are masked thugs sowing anarchy and destruction in their wake? But even worse, by helping Sanders get elected? And, had Hillary not taken control of the DNC to rig the nomination process against Sanders as Donna Brazile revealed in her book, the presidential election may have turned out differently: Poll after poll showed Sanders beating Trump by double-digits in a head-to-head race -- including Trump's own campaign polls. So, the late Soviet Premier, Nikita Khrushchev's plan to "destroy [America] from within" was the Kremlin's goal, with chaos employed as the primary weapon. And, by implementing cyber warfare via Facebook propaganda, Putin's Kremlin expanded and refined Khrushchev's concept. Is it time for U.S. intelligence services to take a closer look at Bernie Sanders? We think so, for if there's any evidence at all thus far suggesting that any presidential aspirant colluded with Russia, or received any aid and support from the Kremlin, it would be the self-professed socialist, 'Comrade Bernie'.
On Oct. 28, the anniversary of ex-FBI director, James Comey reopening his investigation into Hillary's illegal email server, we thought it proper to fondly reminisce. Oh, how high Hillary believed herself to be flying, for in her mind (and nearly that of every pollster), she was an easy shoo-in to the White House. Even the occasion that Comey cited for reopening the investigation -- New York congressman Anthony Weiner's sordid online relationship with an underage girl -- was merely an inconvenient distraction. Of course, we all occasionally find ourselves guilty of believing what we want rather than what's 100 percent true, but in Hillary's case, she's downright delusional. Clinton was such a horrid presidential aspirant that Trump -- a politically inept newcomer -- won states that have been Democrat strongholds for decades. In the spirit of Halloween, and no matter who your chosen candidate was, let's momentarily forget all that to share a few laughs at 'Hilldabeast's' expense:
If one chooses to believe The Washington Post, "Trump now owns the broken health-care system", but only idiots believe that after Obama and his Dems wrote and passed it without any Republican votes.Due to odious burdens of ObamaCare, Dems lost many seats, supporters, and donors, but with the help of a compliant liberal press, salvation could be at hand, thanks to showboating GOP U.S. Senators McCain, Paul, Collins, and Murkowski. And because you're reading this, the mainstream press has begun what could well-be the successful laying of ObamaCare's failures on Republican shoulders. Any true conservative knows how the press falsely and successfully pinned sordid Democrat enterprises such as slavery, racism, Poll Taxes, Jim Crow, etc. on the GOP. That's even after the Republican party was formed primarily to combat the slavery in Democrat controlled southern states. And it's second presidential candidate -- Abe Lincoln -- led the North to war against the South, and was later assassinated by Confederate sympathizer, John Wilkes Booth, but we digress. What The Post used for ammo is Trump allowing "small businesses to buy alternative types of health insurance with lower prices, fewer benefits and weaker government protections", and the removal of "$7 billion in annual [taxpayer] subsidies". Still, that doesn't make Trump "the owner" of ObamaCare: Even without removing those items which help subsidize insurance for lower income individuals, the ACA will implode in it's present form, at which time "only the most wealthy" will be able to afford insurance. When put in those terms and given enough time, the liberal-leaning press will assure that the records of guilty Democrats are expunged, and The Post has already begun pounding that drum of liberal exaltation.
We've come to realize that there's no end to liberal hypocrisy, because while sensible persons grieved for those 59 souls murdered in Las Vegas, Democrat leaders did a celebratory jig: No better fortune could have befallen the liberal agenda of disarming America, or as Rahm Emanuel once said, "You never let a serious crisis go to waste". And to make sure that those who might want to 'fact check' that Schumer quote (which seems extremely difficult to locate on Google search for some odd reason), we'll link to it here. Accuse us of being harsh if you will, but we've spoken honestly while likewise marveling that Schumer and his minions can even sleep at night. For every person who died at that Country Music concert that fateful day, 60 babies were ripped from the womb in America, which totals more than 3,000 abortions each day, thanks to the liberals' 'heartfelt feelings' regarding the sanctity of life. To put that into even grittier terms, according to the World Health Organization (WHO), that's 1.095 million abortions in America yearly, so just remember that the next time some ignorant liberal lectures you regarding how guns take innocent lives.
We never believed that Trump would keep his grandiose promises to build a wall, deport 12 million illegal aliens, repeal ObamaCare within his first 100 days in office, and eliminate our national debt by 2024. Although warning others that he's a closet liberal permits us clear consciences, our dreams remain encumbered. Saying "we told you so" doesn't quite suffice, because "Make America Great Again" became impotent within eight months of Trump's presidency. He's promised not to deport 12 million illegals, plotted with Dems to increase how much debt we incur, all but said that ObamaCare is not repealable, and of the wall he promised to build immediately? It became "more of a fence" that will need to wait until after illegal-alien 'Dreamers' are granted amnesty. So we ask of all you Trump voters -- how's it feel to have really cast your vote for Jeb Bush or Lindsey 'Gramnesty'? And for those MAGAs out there who remain loyal even after Trump's betrayal, and wish to again classify this blog as a (place description here), we'll just post a few headlines:Trump betrays his base, cuts deal with Dems to first give illegal-alien dreamers amnesty, then 'build the wall later'.TRUMP'S 'DEAL' IS ANOTHER HUMILIATION FOR JEFF SESSIONS: Attorney General Sessions had announced last week that DACA -- the Deferred Action for Childhood Arrivals program -- "is being rescinded".Talk-show giantess Laura Ingraham changes from Trump's cheerleader to sarcastic critic: “BUILD THE WALL! BUILD THE WALL! … or … maybe … not really”.Talk show giant and Trump supporter Sean Hannity 'panics' & makes weak excuses, blames GOP leaders for 'forcing Trump to break his campaign promises'. Flashback: Candidate Trump vowed “Number one, I’m building a wall. They’re not coming in anymore. Number two, immediately, we’re building a wall”.
We don't call her "Debbie Dunce Cap" for nothing: After all the accusations of the Russians hacking Democrat National Committee databases to benefit Trump, who'd-a-thunk it was possibly an inside job? As reported by The Washington Examiner, after "the IT aide of former Democratic National Committee chairwoman and Rep. Debbie Wasserman Schultz, D-Fla., was arrested by federal law enforcement officials as he attempted to flee the country, enterprising reporters and law enforcement officials alike began to piece together the web of computer security breaches that reportedly occurred on the Congress member's watch ... The IT aide "reportedly also consulted for the DNC and possessed the password for the iPad which then-chairwoman Wasserman Schultz used for official DNC business at or around the same time that the DNC's email system was hacked and DNC emails were published by Wikileaks".Foreign-born Imran Awan reportedly breached the mainframe of the House Intelligence Committee as well as the House Foreign Affairs Committee. While doing so, Awan, his brother, and his wife (who has now fled to Pakistan), were paid a whopping $4 million in taxpayer-funded salary since 2009, according to public salary records. Wasserman Schultz refused to fire the IT aide "despite being a known criminal suspect in a cybersecurity probe," instead placing him in an advisory capacity in order to circumvent the ban on having him as an IT provider. As of Tuesday morning (the day he was arrested), Wasserman Schultz still employed him. As we said, we don't call Debbie stupid for nothing, and we're certain that this peach of a story regarding her ex-IT specialist will be ignored by the mainstream press.
TRUMP TEMPER TANTRUM -- 70 YEARS SHOULD HAVE BEEN PLENTY OF TIME TO GROW-UP
Even though we at Frankly Conservative supported GOP candidates other than Donald Trump in the primaries, we accepted him as our Commander in Chief after the election. Items such as securing the border, appointing conservative jurists to the Supreme Court, strengthening our military, restoring powers to Law Enforcement, repealing Obamacare, etc. -- these items demand our support.However, when Trump made crystal-clear his intent to lessen GOP majorities in Congress, we'll take soooo none of that sitting down. Just because his big push to pass Obamacare-lite didn't succeed because members of the House Freedom Caucus thankfully stopped it, Trump has no business tweeting the following:"We must fight" House conservatives, and he's even encouraged primary challenges to each of them in next year’s elections. What matters more is this: Trump said earlier of the GOP establishment's Obamacare replacement plan with premiums 15 to 20 percent higher than ObamaCare:"I am 100 percent behind it". Trump needs to stop hyperventilating, and most assuredly, stop tweeting this nonsense, because he's sinking beneath Obama's level. Not only that, by Trump threatening to winnow the number of House conservatives, he comforts our Democrat adversaries while providing matches & gasoline to the press . . . as if it needs more fuel for for burning conservatism to a crisp.
As the liberal media (and Democrat presidential wannabe Cory Booker) scream "RACISM" while declaring a "Constitutional Crisis" over Trump's travel ban from seven Muslim countries, we conservative should yawn. What's become self-evident is this: After the GOP regained both Congressional chambers, the White House -- and soon enough -- The Supreme Court, liberals have only one hope of relevance, and that's faux outcries of "RACISM!" What none of the mainstream media outlets will honestly say is that Trump's ban has nothing to do with racism, but only statistics from what Obama's administration researched and confirmed years ago:As reported by KTLA5: "In December 2015, President Barack Obama signed into law a measure placing limited restrictions on certain travelers who had visited Iran, Iraq, Sudan, or Syria on or after March 1, 2011. Two months later, the Obama administration added Libya, Somalia, and Yemen to the list, in an effort, the administration said, to address “the growing threat from foreign terrorist fighters”. Trump's White House Press Secretary, Sean Spicer pointed out that Obama's administration set the groundwork by fingering those seven countries for aiding and abetting terrorism, and producing more-than their equal share of terrorists: “There were further travel restrictions already in place from those seven countries,” Spicer said on ABC’s “This Week.” “What the president did was take the first step through this executive order of insuring that we’re looking at the entire system of who’s coming in, refugees that are coming in, people who are coming in from places that have a history or that our intelligence suggests that we need to have further extreme vetting for.” Of course, that's likely not the entire story, but it's a far-cry more than the "tens of thousands" of ignorant fools will ever know who are protesting Trump's "RACIST!" travel ban, but then again, that's what fake news is all about.
Christmas came early for House Speaker Paul Ryan in the form of Nancy Pelosi beating back the challenge for her Democrat House Minority leadership. Despite the fact that Dems suffered historic losses of Congressional seats and state Governors under Pelosi's leadership in 2010, 2014, and 2016, her strong-arm tactics to stay in power prevailed. Paul Ryan, as the GOP's re-elected House Majority Leader, has much reason to celebrate the Democrats' maintaining of the status quo.Writing for the liberal publication Salon, Mathew Sheffield titled his piece "No change needed: By selecting Pelosi, House Democrats think the party is just fine". In that article, Sheffield agrees with and parrots the main concern of Pelosi's defeated challenger, Tim Ryan of Ohio (not related to GOP Speaker, Paul Ryan). “If you take state and federal officials, Democratic officials, we have the smallest number since Reconstruction,” he said in a Nov. 18 interview on MSNBC’s “Morning Joe. If that’s not a call for doing something differently, I don’t know what is”.Matt Laslo of the liberal Daily Beast maintains in his article titled "House Dems lose Big, Change Nothing As Pelosi is Re-Elected" that "After three straight losing seasons House Democrats just resigned their quarterback to another two year contract . . . Rank and file lawmakers fear the party establishment has learned nothing from the ascension of Trump - a case Republicans were more than happy to point out on Twitter and at the RNC where they recycled a 2010 “Fire Pelosi Banner” by turning the “F” into an “H”.To ice the cake, Jeff Stein, writing for the uber liberal publication Vox woefully titled his article "Nancy Pelosi's victory shows House Democrats don't think they need to change to win", which bemoans the fact that "Pelosi’s victory today makes clear that a changing of the guard is not on the table. Many Democrats on the Hill don’t think they deserve blame for their party’s feeble state, and they think the Republican majority is about to embark on a path of political suicide. All of it confirms evidence of one growing sign of the post-election fallout: Despite its losses, the Democratic Party is not headed for a wholesale reinvention, because its leaders do not appear to believe they need one".For all of this, we at Frankly Conservative rejoice, but then again, much of what will happen next relies on Republican House Speaker, Paul Ryan, who we hope will soon have an epiphany. We know this following information reaches well into the past, but he carries an "F" rating by conservatives for a good reason: He's voted for every bailout, TARP, No Child Left Behind, raising the debt ceiling, collaborated with Dems to raise taxes, etc. Unless Ryan readily accepts that Americans really voted as much for change as they did for Trump, Pelosi's plan to retake Congress by not changing anything will succeed 100 percent.
As experience dictates, Obama is a pestilent narcissistic troublemaker, and as published by The Wall Street Journal, the "Republican's campaign was a referendum on the entirety of the president's record". We couldn't agree more, and although it's our opinion that Trump was a vastly-flawed candidate, we'll admit breathing a (temporary?) sigh of relief to wish him well. The notion of Hillary turning the U.S. Supreme Court into an activist Left-wing judicial arm of the Democrat party brought us fear and trepidation. We'll likewise confide that Hillary's promise to expand ObamaCare caused us many a sleepless night, so with all due respect to Trump supporters everywhere: Please forgive us should we hold Trump to his words should he renege on specific promises. Nothing would destroy America further and faster than a liberal Supreme Court, for whatever Dems couldn't legislate in Congress, they'd litigate all the way to our highest court. We could then kiss the U.S. Constitution goodbye, so it's incumbent upon us to remind Trump of his promise to nominate only constructionist jurists. And, he must repeal and replace ObamaCare to reverse it's adverse effect of turning America into a part-time working nation. Without question, there's much work to be done, and much to be undone, but meanwhile, we have only brief words for Obama and Hillary: Good riddance, and may karma be your everlasting companion.
READER DISCRETION IS ADVISED: Frequent visitors to this website know that vulgarity is kept to a minimum on these pages. However, with Democrats and liberals regularly accusing Republicans and conservatives of crossing common lines of moral decency and behavior, it's only fair that we point out a few of our accusers own peccadilloes. For starters, there's nothing that Madonna won’t do to make sure Hillary Clinton takes the White House come Election Day -- Madonna's taken her top off, arranged for her son to disembowel a Donald Trump piñata, and pledged to perform oral sex on every Clinton supporter at Amy Schumer’s comedy show: “If you vote for Hillary Clinton, I will give you a blow job — and I am good. I'm not a douche. I’m not a tool. I take my time,” she continued, much to the displeasure of any of her children who have internet access. “I have ... eye contact and I do swallow.” Fair enough -- we admit that's more information than the average reader needs in order to determine that liberals 'suck', but we're only trying to make a point: Does anyone know of any Trump supporter of celebrity status that even remotely matches the sleaze of Madonna? Okay, there was David Duke, the former KKK Grand Wizard who endorsed Trump, and liberals demanded that Trump denounce Duke, which Trump did, but did anyone demand that Hillary denounce Madonna? No, and here's another piece of celebrity filth supporting Clinton: Miley Cyrus (who's been known to do some disgusting things such as performing topless while wearing a prosthetic penis) has volunteered to appear in Virginia on behalf of Hillary Clinton. Though Cyrus supported Sen. Bernie Sanders in the Democrat primaries, she recently said persons who weren't planning to vote for Hillary are "f---ing crazy". Regardless, Cyrus promised to go "door to door" in her quest to boost Clinton support, but we wonder if she'll do it topless while wearing her plastic penis. Perhaps this is an adequate jumping-off spot, for we feel that our point is made: Democrats demand that Republicans denounce unsavory supporters, but for Democrats, gutter rats are A-okay.
Environmentalists blame increased greenhouse gasses on myriad things, and one of their favorite bogeymen is the adorable bovine for producing methane through flatulence and manure. Quite humorously, persons driven by an imaginary ability to stop climate change cheered California's Democrat Governor, Jerry Brown, for signing legislation ordering cattle farmers to control their herd's farting and pooping: "Under a bill signed Monday by Democratic Governor Jerry Brown, the state will cut emissions of methane from dairy cows and other animals by 40 percent . . . It would also require the state's dairy industry, which produces 20 percent of the country's milk, to find a way to reduce methane produced by cow flatulence and manure. One technology for doing that is known as a methane digester . . . Such equipment is expensive, however, which worries the state's dairy farmers ".Of course, common sense dictates that cows will be cows, and this scenario sets the stage for dairy farmers to fail, thus making them subject to huge fines. So let's call Gov. Brown's bill what it really is -- a steaming pile of bull intended to raise revenue for California, but as usual, this state's legislature is once again shortsighted: Either way, dairy farmers who are heavily fined and/or attempt to comply by purchasing expensive "digesters" might be forced out of business, because they cannot raise the price of milk to compensate for their losses:"The price of milk, on the other hand, is decided by [federal] regulators, using complicated formulas. They set one price for wholesale milk used to produce "fluid" products and another for milk used in making cheese. It's a ridiculous game of catch-up, in which the regulated prices never change as fast and efficiently as they would in a market, one buyer and seller at a time".
We at Frankly Conservative aren't members of any Tea Party group, because we enjoy avidly endorsing certain political candidates (a limitation of their 501(c)(3) non-profit status). Still, there's no reason we can't endorse the Tea Party and show our support, and if one wishes to explore locations of Tea Parties on a national level, please visit http://www.teapartypatriots.org/groups/.
How does one frame sick irony? By shouting "Black lives matter" while wearing a Planned Parenthood shirt. We've gotta' hand it to the people in this picture: If hypocrisy could be summed up in one photo, this one's in the top ten. Before somebody calls us racists for pointing out their stupidity, there would be lots more blacks populating this planet if it weren't for Planned Parenthood. Here's the statistics: Black women account for only 6.6 percent of the U.S. population, yet account for 35.7 percent of abortions. For those who wish to watch these hypocritical jackasses make fools of themselves, here's the video.
Nancy needed some air fresheners after passing that Obamacare stink bomb. Not only has that hateful piece of legislation killed millions of insurance policies, it's killing millions of jobs as well. How many? 2.5 million per year. Plunge harder!
Thanks for coming and please visit often, since this website updates frequently. Most important, if we conservatives keep our sense of humor in a world that's "progressively" changing, we can make a difference. - Franklin Fogle, webmaster
|
En Garde (novel)
En Garde is the 17th volume of the Nancy Drew: Girl Detective series. It was published in 2006 under the pseudonym Carolyn Keene.
Plot
The story is told with Nancy Drew as the narrator. Nancy's friend George Fayne is taking fencing classes at Salle Budapest. Every thing seems well except for a shadowy guy who seems to be at both the salle and the fencing meet, but Nancy ignores him for now. George is at the meet with her fencing friends and twins DeLyn and Damon Brittany. When Una, a fencer from Salle Olympique, gets a minor injury due to a faulty gauntlet, it leads to a fight between Bela Kovacs, the coach at Salle Budapest, and Paul Mourbiers, the coach of Salle Olympique, Nancy learns of the two coaches' long rivalry.
This deeply affects Kovacs' business as a TV crew records this fight and interviews Mourbiers, who loses no time in bad-mouthing Kovacs. So, Nancy starts investigating to help out. Soon she discovers that Mourbiers called the TV crew to the meet. She also discovers the reason Mourbiers and Kovacs are rivals. At the 1976 Montreal Olympics, during the quarter-final match the duo faced each other. During the bout, Mourbiers' épée touched the ground. The referee did not notice this, but Kovacs did. He protested, but the referee penalized Kovacs a point. This led to him losing the bout. Mourbiers went on win the silver medal. Nancy uses her boyfriend Ned Nickerson's father's high position in mass media to arrange an interview with Kovacs so that he can regain his image, but in vain as Kovacs sends the TV crew away suspecting it to be sent by Mourbiers. As Nancy continues her investigation she discovers that several of the foils are missing their protective tips. While she is investigating, Damon gets involved in an accident when he smells ammonium carbonate (from an ampoule of smelling salts which were placed in DeLyn's fencing mask, which he accidentally wears). At the twins' home, Nancy realizes that over the past few years, DeLyn has won more awards than Damon, and that DeLyn has been throwing some bouts to not let her brother feel sad at being less talented.
The next day when Nancy and George go to Salle Olympique to investigate, Una gets injured and Mobiers accuses the duo of being saboteurs from Salle Budapest. As she is about to leave she sees the very same shadowy guy (whom she has nicknamed Raggedy Man) trying to hurt Una. When she catches him, she realizes that he is Una's ex-boyfriend, Dough Calley, who is a member of a rock band (thus explaining his attire) who was at Salle Budapest as he had heard that she was dating Damon. When Nancy returns home, she sees that a saber has been plunged through the door with a note attached to it saying "THIS IS WHAT HAPPENS TO BUSYBODIES".
After putting together the clues, Nancy finally realizes that the one responsible behind all the events is none other than Damon. The next morning at the college meet, she finds a bottle of strychnine in Una's bag. She finally catches Damon, who reveals that he did all this just to get back at Una for breaking up with him. He ripped off Una's gauntlet's seam, which led to her injury, but his intentions were not injure her, just to get her to lose the bout for improper equipment, but when he saw its effects when people cancelled their lessons, he decided to make it look like Mourbiers was really sabotaging the salle. He did not intend to injure DeLyn by putting the mask on her, instead planning to remove it before the fumes overcame her. He also put the fake poison bottle in Una's bag. Damon is kicked out of the college team and decides to let go of fencing as he was actually sad while competing in it. Meanwhile, DeLyn wins the bout, but Una seems quite happy because Dough Cally improves himself, becoming quite a decent man, and may finally be accepted by her father. Kovacs and Mourbiers reconcile by setting aside the Olympics incident.
References
Category:Nancy Drew books
Category:2006 American novels
Category:2006 children's books
Category:American sports novels
|
Genetic risk factors for modulation of age at onset in Machado-Joseph disease/spinocerebellar ataxia type 3: a systematic review and meta-analysis.
To perform a systematic review and meta-analysis of genetic risk factors for age at onset (AO) in spinocerebellar ataxia type 3/Machado-Joseph disease (SCA3/MJD). Two authors independently reviewed reports on the mathematical relationship between CAG length at the expanded ATXN3 allele (CAGexp), and other genetic variants if available, and AO. Publications from January 1994 to September 2017 in English, Portuguese or Spanish and indexed in MEDLINE (PubMed), LILACS or EMBASE were considered. Inclusion criteria were reports with >20 SCA3/MJD carriers with molecular diagnosis performed by capillary electrophoresis. Non-overlapping cohorts were determined on contact with corresponding authors. A detailed analysis protocol was registered at the PROSPERO database prior to data extraction (CRD42017073071). Eleven studies were eligible for meta-analysis, comprising 10 individual-participant (n=2099 subjects) and two aggregated data cohorts. On average, CAGexp explained 55.2% (95% CI 50.8 to 59.0; p<0.001) of AO variability. Population-specific factors accounted for 8.3% of AO variance. Cohorts clustered into distinct geographic groups, evidencing significantly earlier AO in non-Portuguese Europeans than in Portuguese/South Brazilians with similar CAGexp lengths. Presence of intermediate ATXN2 alleles (27-33 CAG repeats) significantly correlated with earlier AO. Familial factors accounted for ~10% of AO variability. CAGexp, origin, family effects and CAG length at ATXN2 together explained 73.5% of AO variance. Current evidence supports genetic modulation of AO in SCA3/MJD by CAGexp, ATXN2 and family-specific and population-specific factors. Future studies should take these into account in the search for new genetic modifiers of AO, which could be of therapeutic relevance.
|
A new task force will address street homelessness block by block and have the capability to send teams on scene within an hour of a resident reporting a homeless person, New York City Mayor Bill de Blasio said on Thursday.
The mayor described the effort in remarks to a business group, just days after he announced the resignation of the homeless-services commissioner and said City Hall would conduct a top-to-bottom review of the city’s work on homelessness.
The initiative marks one of the most visible moves by Mr. de Blasio to address homelessness, which has become an increasingly intractable political problem for the mayor.
There are more than 58,000 people in shelters, but the specific target of the new effort is the homeless on the street, who the mayor said can “make many New Yorkers uncomfortable, and even fearful.”
The initiative will be known as NYC Homeless Outreach & Mobile Engagement Street Action Team—or HOME-STAT, Mr. de Blasio explained in a breakfast speech to the Association for a Better New York.
|
Burden
The Dead Man's Burden By Matt Bird Copyright 2011 Matt Bird Smashwords Edition Smashwords Edition License Notes This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold or given away to other people. If you would like to share this book with another person, please purchase an additional copy for each recipient. If you’re reading this book and did not purchase it, or it was not purchased for your use only, then please return to Smashwords.com and purchase your own copy. Thank you for respecting the hard work of this author. Other Ebooks by Matt...
From the historical perspective, the two central problems facing most of the developing countries are: Who should bear the burden of the costs of development? and How should these costs be shared between those in the urban and rural sectors? The inevitable conflicts between the two have, in fact, been a long standing theme, reflected in the debates, in Britain over the Corn Laws, in the United States over industrial tariffs, and in Russia over the size of the "scissors." The book provides for the first time a unifying framework within which these questions can be systematically approached.
The burden of disease quantifies mortality and morbidity
due to a given disease or risk factor. The most commonly
used measure is the Disability-Adjusted Life Year (DALY),
which combines the years of life lost due to disability with
the years of life lost due to death. This measure allows to
compare diseases or risk factors in terms of their public
health importance. The World Health Organization has
been investigating the contribution of a range of risk
factors, such as malnutrition, smoking and lack of access
to water and sanitation, to the burden of disease.
In order to provide comparable estimates of exposure to outdoor air
pollution for all 14 WHO regions, models developed by the World Bank
were used to estimate concentrations of inhalable particles (PM10) (Pandey
et al., 2004). Specifically, economic, meteorologic, and demographic data
and available PM measurements in 304 cities were used to estimate PM10
levels in all 3211 cities worldwide with populations greater than 100,000 and
capital cities.
|
/* pslCut - Remove a list of clones from psl file.. */
/* Copyright (C) 2011 The Regents of the University of California
* See README in this or parent directory for licensing information. */
#include "common.h"
#include "linefile.h"
#include "hash.h"
#include "psl.h"
#include "hCommon.h"
void usage()
/* Explain usage and exit. */
{
errAbort(
"pslCut - Remove a list of clones from psl file.\n"
"usage:\n"
" pslCut cut.lst in.psl out.psl\n");
}
void buildCutHash(char *file, struct hash *hash)
/* Each line of file contains a file name. Put the
* non-dir/non-suffix part onto hash. */
{
struct lineFile *lf = lineFileOpen(file, TRUE);
char dir[256], name[128], ext[64];
int lineSize;
char *line;
int count = 0;
while (lineFileNext(lf, &line, &lineSize))
{
splitPath(line, dir, name, ext);
hashStore(hash, name);
++count;
}
lineFileClose(&lf);
printf("%d clones in cut list %s\n", count, file);
}
void pslCut(char *cutList, char *inPsl, char *outPsl)
/* pslCut - Remove a list of clones from psl file.. */
{
struct hash *cutHash = newHash(0);
struct lineFile *lf = pslFileOpen(inPsl);
FILE *f = mustOpen(outPsl, "w");
struct psl *psl;
char cloneName[128];
int total = 0, cut = 0;
buildCutHash(cutList, cutHash);
pslWriteHead(f);
while ((psl = pslNext(lf)) != NULL)
{
fragToCloneName(psl->tName, cloneName);
if (!hashLookup(cutHash, cloneName))
{
pslTabOut(psl, f);
}
else
++cut;
++total;
pslFree(&psl);
}
printf("Cut %d of %d\n", cut, total);
}
int main(int argc, char *argv[])
/* Process command line. */
{
if (argc != 4)
usage();
pslCut(argv[1], argv[2], argv[3]);
return 0;
}
|
J-S72043-17
NON-PRECEDENTIAL DECISION - SEE SUPERIOR COURT I.O.P. 65.37
COMMONWEALTH OF : IN THE SUPERIOR COURT OF
PENNSYLVANIA : PENNSYLVANIA
:
:
v. :
:
:
DANIR MALLOY :
: No. 3569 EDA 2016
Appellant
Appeal from the Judgment of Sentence October 20, 2016
In the Court of Common Pleas of Philadelphia County Criminal Division at
No(s): CP-51-CR-0012074-2015
BEFORE: BENDER, P.J.E., MUSMANNO, J., and STEVENS*, P.J.E.
MEMORANDUM BY STEVENS, P.J.E.: FILED NOVEMBER 14, 2017
Appellant Danir Malloy appeals from the Judgment of Sentence entered
in the Court of Common Pleas of Philadelphia County on October 20, 2016, at
which time he was sentenced to an aggregate term of eleven (11) years to
twenty-two (22) years in prison. We affirm.
The trial court set forth the relevant facts and procedural history herein
as follows:
PROCEDURAL BACKGROUND
On August 11, 2016, following trial, a jury found Appellant
guilty of robbery (18 Pa. C.S. § 3701(a)(1)(ii)), theft by unlawful
taking (18 Pa. C.S. § 3921(a)), possessing an instrument of a
crime (PIC) (18 Pa. C.S. § 907(a)), and terroristic threats (18
Pa. C.S. § 2706(a)(1)). On October 14, 2016, this [c]ourt
sentenced Appellant to an aggregate term of eleven (11) to
twenty-two (22) years' incarceration, which included a
mandatory minimum of ten (10) years' incarceration under 42
Pa. C.S. § 9714 for his robbery conviction.
____________________________________
* Former Justice specially assigned to the Superior Court.
J-S72043-17
On October 19, 2016, Appellant filed a motion for
reconsideration of sentence, claiming this [c]ourt had
erroneously applied 42 Pa. C.S. § 9714. On October 20, 2016,
following a hearing on Appellant's motion, this [c]ourt again
sentenced Appellant to 11 to 22 years' incarceration. Although
this [c]ourt did not sentence Appellant pursuant to § 9714, this
[c]ourt imposed consecutive sentences of (10) to twenty (20)
years' incarceration on the robbery conviction and one (1) to two
(2) years' incarceration on the PIC conviction. This [c]ourt
imposed no sentence on the terroristic threats conviction, and
the theft charge, for purposes of sentencing, merged with the
robbery charge.
On November 9, 2016, Appellant filed another motion for
reconsideration of sentence, which this [c]ourt denied on
November 14, 2016. On November 18, 2016, Appellant filed a
notice of appeal to the Superior Court, and on February 14, 2016,
Appellant filed a "Statement of Errors Complained of on Appeal"
pursuant to Pa. R.A.P. 1925(b).
FACTUAL BACKGROUND
At trial, the Commonwealth presented the testimony of
Louis Lanni ("Mr. Lanni"), Philadelphia Police Officer George
Dilworth ("Officer Dilworth"), Philadelphia Police Officer Walter
Henik ("Officer Henik"), and Tiara Bethea ("Ms. Bethea").
Mr. Lanni testified that on November 11, 2015, around
1:00 a.m., he left a bar and was walking home along the 1100
block of Spruce Street in the city and county of Philadelphia,
Pennsylvania, when he felt a "violent shove on [his] rear and
right side causing [him] to stumble forward."1 Mr. Lanni turned
around and encountered Appellant "standing directly behind
[him] holding a silver automatic handgun ... point[ed] at [Mr.
Lanni's] chest." Appellant demanded money and threatened:
"Give it up or you're going to get hurt." Mr. Lanni, however,
grabbed Appellant's handgun and the two men "struggled … for
control of the gun." (N.T., 8/10/16, pgs. 130-132, 145).
At some point Mr. Lanni lost his footing and fell to the
sidewalk, landing hard on his right hip where he recently
underwent a hip replacement surgery. Appellant landed on top
of Mr. Lanni but he quickly rose to his feet. With Appellant now
standing over him, pointing a gun, Mr. Lanni said "You win" and
advised that his money was in his left pocket. Appellant reached
into Mr. Lanni's pocket and confiscated fifteen dollars ($15),
which was all the money Mr. Lanni possessed. As Appellant
-2-
J-S72043-17
walked away, Mr. Lanni called 911 with his cellular phone and
informed the dispatcher of Appellant's description. (N.T.,
8/10/16, pgs. 132-134, 145-148).
Police officers arrived "rather quickly" and requested Mr.
Lanni to enter their patrol car so they could search for Appellant.
Minutes later, another officer advised over police radio that he
stopped someone a few blocks away who matched Appellant's
description. Mr. Lanni was transported to the location, and he
promptly identified Appellant as the person that robbed him. Mr.
Lanni also identified the "handgun" that Appellant used in the
robbery. Although the gun turned out to be a toy, Mr. Lanni
testified that he believed at the time of the robbery - i.e., when
Appellant pointed the object at Mr. Lanni's chest and demanded
his money - that the gun was genuine. (N.T., 8/10/16, pgs. 134-
136, 160-162).
Officer Dilworth testified that on November 11, 2015, he
and his partner were on patrol when they received a radio call
around 1:00 a.m. regarding "a robbery in progress" near the
1100 block of Spruce Street. The officers responded and were
"flagged down by [Mr. Lanni] who stated that he had just been
robbed by point of handgun." A few minutes later the officers
received a radio call from another officer, who patrolling only a
few blocks away, stopped someone matching Appellant's
description. The officers transported Mr. Lanni to the location,
and upon viewing Appellant, Mr. Lanni "said one hundred
percent, that's the guy that robbed me." Police officers
subsequently arrested Appellant. (N.T., 8/10/16, pgs. 40-49).2
Officer Dilworth further testified that Tiara Bethea (Ms.
Bethea) was present with Appellant at the arrest location and
was holding "a canvas bag under her shoulder, holding it tight to
herself." Officer Dilworth noticed the bag because Ms. Bethea
"reach[ed] in it a few times[.]" While viewing the bag's exterior
surface, Officer Dilworth observed the "outline" of an object that
resembled a weapon. Officer Dilworth requested permission to
search the bag but Ms. Bethea said "no" and "tried to walk away
and leave the scene." Because Mr. Lanni reported a gunpoint
robbery and Ms. Bethea "kept reaching in [a] bag" that contained
an object shaped like a gun, Officer Dilworth confiscated the bag
"for everybody's safety on the scene." Officer Dilworth thereafter
discovered a "silver handgun" inside the bag, which Mr. Lanni
identified as the gun used in the robbery. (N.T., 8/10/16, pgs.
53-54).3
Ms. Bethea testified that she and Appellant lived in New
Jersey and came to Philadelphia by train to patronize some bars
-3-
J-S72043-17
located on South Street. After having a few drinks on South
Street, Ms. Bethea and Appellant decided to return to New Jersey
by the "Speedline" train. As they walked to the train station,
Appellant left Ms. Bethea to purportedly go to the bathroom. Ms.
Bethea, meanwhile, continued walking to the train station. About
eight (8) minutes later, Appellant caught up with Ms. Bethea and
asked to see her bag/purse so he could retrieve a cigarette. Upon
returning the bag, Appellant continued walking with Ms. Bethea
until they were stopped by police. Ms. Bethea testified that her
bag contained no gun when she left home that evening to come
to Philadelphia, or when she gave it to Appellant when he
requested a cigarette. (N.T., 8/10/16, pgs. 186-195, 223).
At the conclusion of trial, the jury found Appellant guilty of
robbery, theft by unlawful taking, PIC, and terroristic threats. On
October 14, 2016, this [c]ourt sentenced Appellant on the
robbery conviction to ten (10) to twenty (20) years' incarceration
under 42 Pa. C.S. § 9714(a)(1), which requires a mandatory
term of ten (10) years' incarceration for a second conviction of a
"crime of violence."4 This Court ruled that Appellant's prior
conviction of arson in the State of New Jersey constituted a first
conviction of a "crime of violence" under 42 Pa. C.S. § 9714(g),5
On the PIC conviction, this [c]ourt sentenced Appellant to a
consecutive term of one (1) to two (2) years' incarceration. This
[c]ourt imposed no sentence on the terroristic threats conviction,
and the theft charge, for purposes of sentencing, merged with
the robbery charge. Overall, Appellant's aggregate sentence was
11 to 22 years' incarceration. (N.T., 10/14/16).
On or around October 19, 2016, Appellant filed a motion
for reconsideration of sentence, claiming this [c]ourt had
erroneously imposed a mandatory sentence under § 9714(a)(1)
for his robbery conviction. On October 20, 2016, following a
hearing on Appellant's motion, this [c]ourt ruled that Appellant's
prior arson conviction was not a "first strike" under § 9714, and
that his robbery conviction did not constitute a "second strike"
requiring a mandatory minimum sentence. (N.T. 10/20/16, pgs.
1-14). Nonetheless, without applying § 9714, this [c]ourt still
determined that 11 to 22 years' incarceration was an appropriate
sentence, and therefore imposed consecutive terms of 10 to 20
years' incarceration for Appellant'[s] robbery conviction and 1 to
2 years’ incarceration for his PIC conviction. (Id., pgs. 26-27).
______
1Mr. Lanni testified that he consumed two drinks of alcohol at the
bar. (N.T., 8/10/16, pg. 137).
-4-
J-S72043-17
2Officer Walter Henik was the officer that stopped Appellant. He
testified that he likewise was patrolling the area and received a
radio call describing "a black male in his early 20s with a black
waist length jacket, gray pants, black and white baseball cap and
a beard that committed the robbery." A few blocks from the
robbery location, Officer Henik observed Appellant, who matched
the "exact description" of the suspect. Officer Henik therefore
pulled over and told Appellant to put his hands on the patrol car.
After frisking Appellant and radioing that he stopped someone
matching the suspect's description, Officer Henik waited with
Appellant until Officer Dilworth and Mr. Lanni arrived about one
minute later. Once Mr. Lanni identified Appellant, Officer Henik
searched him and recovered $20, consisting of a $10 bill, a $5
bill, and five $1 bills. No firearm was recovered from Appellant.
(N.T., 8/10/16, pgs. 85-96).
3 Although the gun was not real, Officer Dilworth testified that
the object resembled "a semiautomatic handgun.' (N.T.,
8/10/16, pgs. 58, 77, 80).
4§ 9714(a)(1) provides, in relevant part:
(a) Mandatory sentence. ... (1) Any person who is
convicted in any court of this Commonwealth of a crime
of violence shall, if at the time of the commission of the
current offense the person had previously been
convicted of a crime of violence, be sentenced to a
minimum sentence of at least ten years of total
confinement, notwithstanding any other provision of this
title or other statute to the contrary.... See 42 Pa. C.S.
§ 9714(a)(1).
5 § 9714(g) provides, in relevant part:
(g) Definition. - As used in this section, the term 'crime
of violence' means ... arson engendering [sic] persons
or aggravated arson as defined in 18 Pa, C.S. § 3301(a)
or (a.1) ... or an equivalent crime under the laws of this
Commonwealth in effect at the time of the commission
of that offense or an equivalent crime in another
jurisdiction. See 42 Pa. C.S. § 9714(g).
Trial Court Opinion, filed 3/15/17, at 1-6.
-5-
J-S72043-17
On November 9, 2016, Appellant filed his “Reconsideration of Sentence
Nunc Pro Tunc.” In its Order entered on November 15, 2016, the trial court
ordered that Appellant’s petition to reconsider his sentence was accepted as
timely filed and further denied the petition. Appellant filed a timely notice of
appeal on November 18, 2016.
On January 17, 2017, the trial court ordered Appellant to file a concise
statement of matters complained of on appeal pursuant to Pa.R.A.P. 1925(b).
On February 14, 2017, Appellant filed his “Nunc Pro Tunc Statement of Errors
Complained of on Appeal,” and the next day the trial court entered an Order
indicating that the Statement was accepted as timely filed. Therein, Appellant
stated he wished to raise the following, sole issue on appeal:
This [c]ourt erred as a matter of law and abused its
discretion in imposing an excessive sentence, inasmuch as the
[c]ourt failed to adequately examine and investigate [Appellant’s]
background, character and rehabilitative needs pursuant to 42
Pa.C.S. § 9721. The [c]ourt also erred in double counting factors
to justify the excessive sentence, that have already been taken
into consideration in the sentencing guidelines.
See Nunc Pro Tunc Statement of Errors Complained of on Appeal, filed
2/14/17, at ¶ 4(A).1
____________________________________________
1 We remind Appellant the proper manner in which to obtain an extension of
time to file a concise statement is by filing a written application with the trial
court seeking such relief for good cause shown, not the filing of the document
with a “nunc pro tunc” designation as was done herein. Pa.R.A.P. 1925(b)(2).
It is well-settled that the failure to file a timely Rule 1925(b) statement
automatically results in waiver of all issues on appeal, regardless of the length
-6-
J-S72043-17
In his brief, Appellant presents the following Statement of the Question
Involved:
Did not the lower court err and abuse its discretion by
sentencing [Appellant] to an unreasonable sentence that was
higher than the standard range of the Sentencing Guidelines,
without giving adequate reasons, on the basis of considerations,
including the nature of the offense and his prior criminal history,
that were already factored into the Sentencing Guidelines and did
not the lower court further err in failing to give proper
consideration to [Appellant’s] personal circumstances and
mitigating factors?
Brief for Appellant at 3.
Although Appellant presents a single question for this Court’s review in
his appellate brief, that question is multifaceted. Initially, Appellant asserts
the trial court erred in failing to provide adequate reasons for its sentence.
However, Appellant did not present this specific challenge in his concise
statement of matters complained of on appeal.
It is well-settled that a claim not raised in the lower court is waived and
cannot be raised for the first time on appeal. Pa.R.A.P. 302(a); see also
____________________________________________
of the delay in filing. See Commonwealth v. Hill, 16 A.3d 484, 494
(Pa.2011). However, this Court has concluded that a late 1925(b) statement
by a criminal defendant represented by counsel constitutes per se
ineffectiveness, and the proper remedy is to remand for the filing of such a
statement nunc pro tunc. Commonwealth v. Grohowski, 980 A.2d 113, 114
(Pa.Super. 2009), citing Commonwealth v. Burton, 972 A.2d 428, 433
(Pa.Super.2009) (en banc ); see also Commonwealth v. Myers, 86 A.3d
286, 289 (Pa.Super. 2014) (observing that if an appellant's Rule 1925(b)
statement were late, “we would be obligated as a matter of our rules of
procedure to deem appellate counsel ineffective and to remand for the filing
of a Statement nunc pro tunc.”), citing Pa.R.A.P.1925(c)(3).
-7-
J-S72043-17
Commonwealth v. Lopata, 754 A.2d 685, 689 (Pa.Super. 2000). In
addition, “[a] theory of error different from that presented to the trial jurist is
waived on appeal, even if both theories support the same basic allegation of
error which gives rise to the claim for relief.” Commonwealth v. Ryan, 909
A.2d 839, 845 (Pa.Super. 2006). Because only claims properly presented
before the trial court are preserved for appeal, Appellant’s contention the trial
court did not state adequate reasons on the record to support its sentence is
waived.
Appellant further maintains the trial court failed to consider his personal
circumstances and mitigating factors prior to imposing his sentence which falls
outside of the Sentencing Guidelines’ standard range and in “double counting”
factors accounted for in the Guidelines. These properly preserved claims
present challenges to the discretionary aspects of Appellant’s sentence. When
reviewing a discretionary aspects of sentencing claim, this Court is guided by
the following principles:
[T]he proper standard of review when considering whether to
affirm the sentencing court's determination is an abuse of
discretion.... [A]n abuse of discretion is more than a mere error
of judgment; thus, a sentencing court will not have abused its
discretion unless the record discloses that the judgment exercised
was manifestly unreasonable, or the result of partiality, prejudice,
bias or ill-will.... An abuse of discretion may not be found merely
because an appellate court might have reached a different
conclusion, but requires a result of manifest unreasonableness, or
partiality, prejudice, bias, or ill-will, or such lack of support so as
to be clearly erroneous.... The rationale behind such broad
discretion and the concomitantly deferential standard of appellate
review is that the sentencing court is in the best position to
determine the proper penalty for a particular offense based upon
-8-
J-S72043-17
an evaluation of the individual circumstances before it.
Commonwealth v. Walls, 592 Pa. 557, 926 A.2d 957, 961
(2007) (internal citations omitted).
Commonwealth v. Allen, 24 A.3d 1058, 1064 (Pa.Super. 2011).
However, it is well-settled that challenges to the discretionary aspects
of one’s sentence are not reviewable as a matter of right. Id. Before this
Court can address such a discretionary challenge, an appellant must satisfy
the following four-part test:
(1) whether appellant has filed a timely notice of appeal, see
Pa.R.A.P. 902 and 903; (2) whether the issue was properly
preserved at sentencing or in a motion to reconsider and
modify sentence, see Pa.R.Crim.P. [720]; (3) whether
appellant's brief has a fatal defect, Pa.R.A.P. 2119(f); and
(4) whether there is a substantial question that the sentence
appealed from is not appropriate under the Sentencing
Code.
Id. (citation omitted).
What constitutes a substantial question must be evaluated on a case-
by-case basis. Commonwealth v. Paul, 925 A.2d 825, 828 (Pa.Super.
2007). A substantial question exists “only when the appellant advances a
colorable argument that the sentencing judge's actions were either: (1)
inconsistent with a specific provision of the Sentencing Code; or (2) contrary
to the fundamental norms which underlie the sentencing process.”
Commonwealth v. Swope, 123 A.3d 333, 338 (Pa.Super. 2015) (citation
omitted). Therefore, an appellant's Rule 2119(f) statement must sufficiently
articulate the manner in which the sentence violates either a specific provision
of the sentencing scheme set forth in the Sentencing Code or a particular
-9-
J-S72043-17
fundamental norm underlying the sentencing process. Commonwealth v.
Mouzon, 571 Pa. 419, 426, 812 A.2d 617, 622 (2002).
Herein, Appellant has satisfied the first three requirements of the four-
part test. He timely filed his notice of appeal and preserved his claim in a
post-sentence motion. He also includes in his appellate brief his “Statement
of Reasons for Allowance of Appeal from Discretionary Aspects of Sentence”
in accordance with Pa.R.A.P. 2119(f). Thus, we must next determine whether
Appellant has raised a substantial question requiring us to review the
discretionary aspects of the trial court's sentence. Commonwealth v.
Haynes, 125 A.3d 800, 807 (Pa.Super. 2015).
In his Pa.R.A.P. 2119(f) statement, Appellant contends that “[i]n
imposing this unreasonable and excessive sentence, the trial court relied
almost entirely upon the nature of the offense and [A]ppellant’s prior record-
factors already given consideration by the Guidelines- and ignored
[A]ppellant’s needs for rehabilitation in violation of 42 Pa.C.S.A. § 9721.”
Appellant further asserts his aggregate sentence “violates many norms of the
Sentencing Code and is unreasonable and excessive.” Brief for Appellant at
10. These assertions raise substantial questions. See Commonwealth v.
Caldwell, 117 A.3d 763, 770 (Pa.Super. 2015) (en banc), appeal denied, 633
Pa. 774, 126 A.3d 1282 (2015) (stating claim a sentence imposed
consecutively was unduly excessive coupled with claim the trial court failed to
consider rehabilitative needs raises a substantial question); Commonwealth
- 10 -
J-S72043-17
v. Scassera, 965 A.2d 247, 250 (Pa.Super. 2009), appeal denied, 603 Pa.
709, 985 A.2d 219 (2009) (recognizing claim the sentencing court failed to
consider applicable sentencing guidelines, prior to exceeding them, presents
a substantial question); Commonwealth v. Ahmad, 961 A.2d 884, 887
(Pa.Super. 2008) (concluding claim sentencing court failed to consider
defendant's individualized circumstances when imposing sentence raises a
substantial question); Commonwealth v. Simpson, 829 A.2d 334, 338 (Pa.
Super. 2003) (stating claim sentencing court “relied on impermissible factors,
by considering factors already included in the sentencing guidelines” raises a
substantial question).
Thus, we turn to the substantive merits of Appellant's question
presented and in doing so employ a well-settled standard of review:
Sentencing is a matter vested in the sound discretion of the
sentencing judge, and a sentence will not be disturbed on appeal
absent a manifest abuse of discretion. In this context, an abuse
of discretion is not shown merely by an error in judgment. Rather,
the appellant must establish, by reference to the record, that the
sentencing court ignored or misapplied the law, exercised its
judgment for reasons of partiality, prejudice, bias or ill will, or
arrived at a manifestly unreasonable decision.
Commonwealth v. Zirkle, 107 A.3d 127, 132 (Pa.Super. 2014) (citation
omitted), appeal denied, 632 Pa. 671, 117 A.3d 297 (2015). In addition, it is
axiomatic that the trial court “need not undertake a lengthy discourse for its
reasons for imposing a sentence or specifically reference the statute in
question, but the record as a whole must reflect the sentencing court’s
- 11 -
J-S72043-17
consideration of the facts of the crime and the character of the offender.”
Commonwealth v. Colon, 102 A.3d 1033, 1044 (Pa.Super. 2014) (citation
omitted); 42 Pa.C.S.A. § 9721(b). As we shall discuss infra, we find the trial
court complied with this directive herein.
As the trial court in this case had the benefit of a PSI report and a mental
health report, See N.T. Sentence Hearing, 10/14/16, at 17; N.T. Sentence
Hearing, 10/20/16, at 23, this Court presumes that it considered all relevant
sentencing factors and fashioned an individualized sentence. See
Commonwealth v. Fowler, 893 A.2d 758, 766 (Pa.Super. 2005) (stating
where the sentencing court had and considered a PSI report, this fact alone
adequately supported the sentence, and in light of the court's explicit reliance
upon that report, this Court was required to presume it properly weighed the
mitigating factors).
Notwithstanding, the trial court detailed its reasons for imposing
Appellant’s sentence at the sentencing hearings. At the hearing held on
October 14, 2016, the trial court recounted Appellant’s difficult childhood
wrought with physical neglect and abuse which caused him to be placed in
foster care at the age of ten and again at thirteen. The court also noted
Appellant had significant substance abuse problems and was HIV positive. The
court further discussed Appellant’s extensive juvenile adjudications and adult
convictions, although he was only twenty-five years of age at the time he
committed the serious, instant crimes. N.T. Sentencing, 10/14/16, at 17-20.
- 12 -
J-S72043-17
At the Amended Sentencing Hearing held on October 20, 2016, the trial
court referenced its remarks from the prior hearing and stated the reasons for
its sentence on the record as follows:
THE COURT: I did go through, at the original sentencing
hearing, all of the information that I have regarding [Appellant]
from his presentence investigation including his family
background, his health background, his work experience, his
substance abuse, which was significant, as well as his mental
health status and prior treatment.
Certainly, we also heard from Mr. Lanni -- and thank you
again, Mr. Lanni, for being here today.
In review of [Appellant’s] significant and lengthy history --
again, as a juvenile, six arrests, six adjudications, four
commitments all in New Jersey starting at the age of 17 -- simple
assault, possession with intent to deliver, aggravated assault on
law enforcement, another simple assault. And then as an adult,
six arrests, four convictions, three commitments, two violation
hearings, two revocations, again all in New Jersey. Possession
with intent to deliver, aggravated assault, and this arson case
leading up to after [Appellant] was released from a three-year
sentence on that arson case.
He comes to Philadelphia and commits the point of gun
robbery on Mr. Lanni.
[Appellant] at 25 years old has a criminal history that
reflects very little time where [Appellant] is not engaged somehow
in the activity of violent crime, selling drugs, and being high on
PCP.
The [S]entencing [G]uidelines create a parameter that we
all use in fashioning appropriate sentences along with
consideration of all of the other factors including [Appellant’s]
criminal history, the amount of time that has elapsed between
criminal convictions. And it is not an inflexible standard.
Defense counsel has reiterated several times that
[Appellant] should have been afforded a greater opportunity to
enter into an open guilty plea and take advantage of a much lower,
much more advantageous sentence.
He, in fact, was offered in the smart room initially a seven-
to 14-year sentence and he rejected that. He was again offered
the opportunity to accept responsibility for a much more favorable
sentence – second strike notwithstanding. He rejected that.
- 13 -
J-S72043-17
There are many, many reasons why lenient sentences are
offered prior to trial. Unfortunately, after trial, those reasons no
longer hold. And a person's decision about whether or not they're
going to accept responsibility has to include more than a numbers
calculation.
It certainly has to take into account acceptance of
responsibility for one's actions. And [Appellant] has never done
that. Not to this day.
In arriving at [Appellant’s] sentence on October 14, 2016,
quite frankly, the second strike issue was not a major component
of this [c]ourt's sentence.
The sentence of 11 to 22 years was the sentence that this
Court believed, and still believes, is the appropriate sentence
under these circumstances, notwithstanding the ruling on the
second strike issue, and remains so, notwithstanding the change
in the prior record score.
The reasons for this Court's sentence were, and still are, in
25 years, totally the juvenile and the adult record of 12 arrests
and ten adjudications/convictions for violent crime with very little
space and time in between those convictions, very little
consideration toward rehabilitation, toward acceptance of
responsibility as a law-abiding member of society.
So, [Appellant], your sentence on the robbery is ten to 20
years. The theft merges. The sentence on the possession of an
instrument of crime is one to two years consecutive. And the
sentence on the terroristic threats is no further penalty. The total
sentence is 11 to 22 years.
[Appellant] is not RRRI eligible. He does get credit for time
served. I did recommend a dual diagnosis facility for [Appellant]
to be housed to address his mental health and substance abuse
issues as well as GED enrollment and vocational counseling.
N.T. Sentencing, 10/20/16, at 23-27.
In addition, in its Opinion filed pursuant to Rule 1925(a), the trial court
acknowledged the Sentencing Guidelines recommended a term of sixty (60)
months to seventy-two (72) months in prison (+/- twelve (12) months). After
reiterating the aforementioned reasons it had placed on the record at the
- 14 -
J-S72043-17
October 20, 2016, Amended Sentencing Hearing, the court explained the
analysis which preceded its sentence as follows:
The record plainly reflects that when contemplating
Appellant’s sentence, this [c]ourt considered the nature and
gravity of Appellant’s offenses and the impact of his crimes on Mr.
Lanni. This [c]ourt also considered Appellant’s presentence
investigation report, which reveals a vast and violent criminal
history. At age 25, Appellant already amassed a staggering
criminal record that includes multiple violent assaults, drug
offenses, arson, and a wholesale defiance of probation/parole.
Not only is Appellant a repeat offender, he is a violent repeat
offender, whose criminal history demonstrates his danger to the
community and alarming disregard of its citizens. Given
Appellant’s abhorrent and continuous criminal behavior, and
persistent refusal to rehabilitate into a law abiding citizen, this
[c]ourt’s sentence of 11 to 22 years’ incarceration is thoroughly
deserving and justified.
Trial Court Opinion, filed 3/15/17, at 10 (emphasis in original).
Contrary to Appellant’s averments, as reflected by the record, the trial
court properly considered the factors listed in 42 Pa.C.S.A. § 9721(b) and in
doing so did not “double count” the seriousness of the offense when
resentencing him. The trial court emphasized not only the gravity of
Appellant’s crimes, but also their impact upon the victim, the danger Appellant
posed to the public and the lack of evidence of remorse and rehabilitation
Appellant had displayed. In addition, the court took into account Appellant’s
troubled childhood and medical issues as is evident upon a review of the
October 14, 2016, hearing transcript. The trial court also considered
Appellant’s personal and rehabilitative needs in fashioning a sentence
recommending that Appellant be housed in a dual diagnosis facility to address
- 15 -
J-S72043-17
his mental health and substance abuse issues and that he be enrolled in a
GED program and receive vocational counseling. N.T. Sentencing, 10/20/16,
at 27.
Accordingly, we conclude the trial court did not abuse its discretion
when it imposed its sentence on October 20, 2016.
Judgment of sentence affirmed.
Judgment Entered.
Joseph D. Seletyn, Esq.
Prothonotary
Date: 11/14/2017
- 16 -
|
/* Target-dependent code for Darwin x86.
Copyright (C) 2008-2020 Free Software Foundation, Inc.
This file is part of GDB.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>. */
#ifndef I386_DARWIN_TDEP_H
#define I386_DARWIN_TDEP_H
#include "frame.h"
/* Mapping between the general-purpose registers in Darwin x86 thread_state
struct and GDB's register cache layout. */
extern int i386_darwin_thread_state_reg_offset[];
extern const int i386_darwin_thread_state_num_regs;
int darwin_dwarf_signal_frame_p (struct gdbarch *, struct frame_info *);
#endif /* I386_DARWIN_TDEP_H */
|
Politicians, stakeholders want conditions for Juneau utility sale
The damming of Long Lake south of Juneau allowed for the construction of the Snettisham Hydroelectric project in the 1960s, which has provided low-cost power to the state capital ever since. A pending sale that could allow the dam to become owned by a Canadian utility is drawing objections from across the state and its lone U.S. Rep. Don Young. (Photo/Courtesy/Alaska Industrial Development and Export Authority)
Alaskans with addresses from North Pole to Washington, D.C., are objecting to the proposed sale of the Juneau electric utility by its current Washington state-based owners to a large Ontario utility.
The cause for the North American geography mini-lesson is what will happen if the Regulatory Commission of Alaska approves the sale including the 78-megawatt Snettisham hydroelectric facility that provides up to 75 percent of Juneau’s base load power supply.
In July, Toronto-based Hydro One Ltd. and Spokane, Wash.-based Avista Corp. announced that Hydro One would buy Avista for $5.3 billion in cash to form one of the largest utilities in North America with a combined asset value estimated at more than $25 billion.
Avista bought Alaska Energy and Resources Co., the parent to Juneau’s electric utility Alaska Electric Light and Power, in a deal that closed in 2014 for $170 million. Prior to being under Avista, a Juneau family held majority ownership of AEL&P.
The Juneau utility operates and maintains the Snettisham facilities located about 30 miles southeast of Juneau, but the hydro project was built by the U.S. Army Corps of Engineers in the 1960s and subsequently expanded multiple times.
Snettisham was sold to the state-owned Alaska Industrial Development and Export Authority in 1998 as part of a broader federal move to divest from local utilities nationwide. The state investment bank financed the purchase with $100 million in revenue bonds, which will be paid off in 2034, according to AIDEA.
The sticking point in the sale is what happens when those bonds are paid off and AIDEA owns the hydro facilities and the associated 44-mile transmission line free-and-clear.
At that point, the owners of AEL&P have the option of purchasing the energy-producing infrastructure for $1, a condition of the 1998 purchase by AIDEA, according to a letter from Rep. Don Young to the RCA.
Young’s Dec. 4 letter to the commission — submitted during the public comment period on the proposed Avista to Hydro One sale of AEL&P — urges the RCA to condition the sale to require the Snettisham facilities remain in state or local ownership.
“The Snettisham assets were transferred to the State of Alaska at below construction and replacement value to help insure low electric utility rates in Juneau. I can (assure) you that it was never Congress’ intent that this asset be transferred for the potential profiteering by Canadian government interests,” Young wrote.
“At this point, a foreign government entity could ‘hijack’ this public asset initially built to produce low-cost power and pledge, monetize or refinance this asset cashing in the equity at the U.S. taxpayer and Alaskan ratepayer expense without recourse,” he continued. “A Hydro One sale, without divesture of this asset option, could pre-empt Juneau from reaping the benefits of Congress’ intended purpose.”
Young concluded by clarifying he does not object to the sale other than to ensure Snettisham remains in public ownership.
Hydro One, Canada’s largest electric transmission and distribution utility according to its website, was formed by the Ontario Legislature in 1906. It became a publicly traded company on the Toronto Stock Exchange in late 2015 as the provincial government began divesting the utility.
The government of Ontario currently owns 47.4 percent of Hydro One shares, according to the international investment research firm Morningstar Inc.
Alaska Independent Power Producers Association Director and Juneau-area resident Duff Mitchell said in an interview that Snettisham power currently costs a little more than 5 cents per kilowatt-hour and once the bonds are paid off that rate could drop to less than 1 cent per kilowatt-hour.
If Hydro One is allowed to own Snettisham it could refinance the project, monetize its equity or use it as collateral for other projects and potentially impact future rates in Juneau, Mitchell stressed.
He said the $1 purchase option also applies to Avista, but wasn’t generally known when its purchase of AEL&P was pending in late 2013-14.
“It’s a very simple fix; it doesn’t hurt Hydro One. Juneau will get its rates reduced and it keeps a foreign government entity from playing games with the asset,” Mitchell said.
Alaska state Rep. Tammie Wilson, R-North Pole, reiterated Young’s sentiments in comments to the RCA, contending that, “If Hydro One is successful in obtaining RCA approval with the Snettisham asset rights, this would set a bad precedent that Alaska is for sale and that it is open season to plunder our state. This is a bad message.”
Additionally, Alaska Chamber CEO Curtis Thayer, former legislators Cathy Munoz and Lesil McGuire and numerous Juneau residents joined in support of conditioning the sale of AEL&P.
Hydro One and Avista wrote in a joint response to the public comments Dec. 11 that they agree with Young that Snettisham “should be preserved for the benefit of Alaskan utility rate payers so that it can continue to provide low cost power for Juneau” and should remain in local ownership.
They argue, however, that the concerns are already addressed and conditioning the sale is unnecessary.
Utility operations will stay the same when the deal closes, according to the companies.
“As it does today, AEL&P will continue to manage the utility and will continue to have certain rights and obligations relating to Snettisham,” they wrote. “Avista has not inserted itself into AEL&P management and neither will Hydro One, because the structure of the merger leaves in place local control.”
Former AEL&P director Neil MacKinnon wrote to the RCA that he supports the sale as-is because, among other things, it makes no difference who owns the hydro facilities given the power can only go to the Juneau area and the commission has to approve any rate changes. The expertise a large owner company provides the small utility is extremely valuable as well, according to MacKinnon.
(This story has been amended to correctly note that former Alaska Electric Light and Power director Neil MacKinnon supports the Avista-Hydro One transaction without stipulations. The original version of the story incorrectly stated MacKinnon requested the RCA condition the sale.)
The RCA rejected the utility companies’ first sale application in Nov. 8 on procedural grounds. They reapplied Nov. 21 and the commission has until May 20 to issue its decision.
Wilson, who has championed open access for small, often renewable power producers to utility-owned transmission lines in the Legislature, also urged the RCA stipulate Hydro One provide open access to the Snettisham transmission line that runs from the generation facilities to Juneau.
“The RCA, by conditioning Hydro One, can send a public interest message to the utility industry that if multi-state or multi-national corporations want to take over Alaskan utilities and do business in Alaska that they will have to treat Alaskan energy developers with the same nondiscriminatory transmission interconnection rights and privileges that they are required to provide energy developers in other jurisdictions,” Wilson wrote.
Current Alaska laws and regulations do not, according to Mitchell, which has been a growing source of contention between renewable power startups in the state and the utilities that own or manage large segments of Alaska’s transmission lines.
Hydro One sells power to Lower 48 utilities and as a result operates under FERC regulations in many instances despite being a Canadian company.
Hydro One spokeswoman Tiziana Baccega Rosa wrote in an emailed response to questions that the benefits of the Snettisham facility will remain in Alaska and that AEL&P is already subject to the RCA’s open-access requirements and will continue to comply with them.
However, Wilson and McGuire, of Anchorage who retired from the state Senate in 2016, further noted that Juneau Hydropower Inc. has been trying to gain access to the Snettisham line from AEL&P for several years without success.
Juneau Hydropower, also led by Alaska Independent Power Producers Association head Mitchell, has regulatory approval to construct the Sweetheart Lake hydro project south of Juneau but needs to secure transmission capacity before it can start construction.
The 20-megawatt hydro project would supply power to the Kensington gold mine north of Juneau, which currently runs on diesel-fired generation.
Kensington’s owner company Coeur Mining also urged the RCA to condition the Hydro One sale on an access agreement with Juneau Hydropower, which has been trying to get such an agreement since 2012, according to the filings.
The Sweetheart Lake condition was a request of AIPPA as well.
Mitchell acknowledged that his company would stand to benefit from such terms, but said the stance is in line with what the association has sought for years in other similar instances across the state.
“I believe our state is the breadbasket of renewable energy and we have manmade problems keeping those developments from happening. It’s not a question of financing; it’s not a question of natural, God-given resources. It’s a question of legislative and regulatory problems,” Mitchell said. “I have always been — Juneau Hydropower and AIPPA has always been — consistently for open access and non-discriminaatory access to transmission lines in Alaska.”
He also noted that Sweetheart Lake, by getting Kensington off diesel, would cut Juneau-area greenhouse gas emissions by about 8 percent.
“I’m doing what America is supposed to do,” Mitchell emphasized. “If you can offer a better product — this transmission issue does affect Juneau Hydropower but it also affects every independent power producer in Alaska.”
|
Pak Railway’s multi-million dollar scam to please China
Islamabad, Apr. 10 (ANI): A multi-million dollar scam has been unearthed in Pakistan’s Railway Ministry with top railway bosses confessing before the National Assembly Standing Committee that a Chinese company was awarded contracts on the basis of “fake performance certificates.”
The Chinese company got a deal of 12.5 billion rupees for procurement of 75 locomotives and that nine serious procedures required for award of any contract to an international firm were also ignored, Chairman of Parliamentary Committee Ayaz Sadiq told The News.
“Even those who forged this document did not bother to get it attested from the Pakistani Embassy in Beijing, the requirement of such contracts,” Sadiq said.
Of late, the issue of the 75 Chinese locomotives has been in the media especially since the US embassy raised serious objections on the move as the US auto giant General Motors was also in run for the contract.
But the GM price was much higher although the Railways Minister Ghulam Ahmed Bilour had stated on record that he would prefer the US engines, as they were reliable and durable.
However, President Asif Ali Zardari reportedly got involved in the issue and finally he decided that the contract should be given to the Chinese on political grounds because China was a friend of Pakistan.
Secretary/Chairman Railways Samiul Haq Khilji had also informed the committee that during the examination of the official record, forgery and tampering of documents had been detected.
The Secretary Finance Salman Sadiq reportedly could not help making a comment after looking at the performance certificate, saying: “This is a joke.” (ANI)
|
Sometimes you just want something to wear that's as flexible as you are. If your typical day tends to take you from the gym to the office to the grocery store to daycare to your in-law's barbecue, you understand how frustrating it can be to try and find some kind o ... (see full details) (see specifications) #WSFP01GRY.
Sometimes you just want something to wear that's as flexible as you are. If your typical day tends to take you from the gym to the office to the grocery store to daycare to your in-law's barbecue, you understand how frustrating it can be to try and find some kind of go-to piece that'll keep you comfortable - and looking good - no matter what your schedule has in store. Thankfully, there's an answer, and you've just stumbled across it. The Berne Women's WSFP01 GRY Grey Performance Full-Zip Crew Water-Repellent Sweatshirt is the holy grail of busy women everywhere.
This versatile Berne sweatshirt is constructed performance fleece, which consists of a blend of 8-ounce poly and four-way-stretch Spandex material. That means that it fits close to your body without being restrictive. It also moves when you do and bounces back into shape afterward, so you don't look sloppy after all of that physical exertion. The fabric is water-repellent, too, so perspiration and rain both roll off readily and leave you drier and more comfortable.
The flattering grey color of this women's sweatshirt matches with just about everything from gym shorts to blue jeans to khaki trousers. Classically-styled raglan sleeves make sure you have ease of movement in your arms, and a stand-up crew-style collar adds both a professional look and extra coverage, too.
You can slip into this performance sweatshirt easily, thanks to a full front nylon zipper in a contrasting color. Matching colored zippers close up the front left chest pocket and the two lower pockets, which are perfect for keys and cell phones.
If you've got the kind of daily schedule where it's not unusual not to have time to run home and change, you're definitely not alone. You're also not out of luck - at least, not anymore. The Berne Women's WSFP01 GRY Performance Full-Zip Crew Water-Repellent Grey Sweatshirt (available right here at Working Person's Store) is here to keep you looking good, feeling comfortable, and moving from task to task and place to place with total self-confidence. You go, girl.
When it comes to products that are priced cheap, I feel that the quality is normally cheap as well. The Berne full-zip sweatshirt is an exception and the wife loves it. We bought it on sale and I couldn't believe that a quality product would be $25 and have some longevity behind it. Great deal, so don't over look it.
|
Current mitigation technologies of low frequency spectrum attenuation include acoustic hangers, Helmholtz resonators, chamber core resonators, coverage tube resonators, large volume resonators, and large mass systems. These devices are problematic in that the manufacturing methods used consider the acoustic resonator design to be the same as a structural design and/or their performance is not broad band, i.e., the devices operate in a narrow frequency range, thereby limiting the effective range of environments in which the devices can be used. Furthermore, these devices can be expensive to manufacture in that they are sequentially constructed in an add-on manner.
|
Q:
MSSQL Single Listener for Multiple AGs
I was looking for a solution in which my application, one which I can configure only one Listener param, if we can address multiple Availability Groups or not.
I have heard of using multiple listeners for one or multiple AGs, but is it possible to use a single listener and address multiple AGs?
A:
but is it possible to use a single listener and address multiple AGs.
A listener is specific to Instance of AG so you cannot connect to multiple AG's using one listener. If you have multiple instances you have to use multiple AG's.
How do you think a single listener will manager multiple AG's now how will it know which AG to connect ?
|
Q:
How do you join three tables in Oracle?
I'm having a hard time joining three separate tables in Oracle. I'm never joined three tables before so I'm not well versed. My theory is below:
SELECT customer_num WHEN customer_num IS 104 -198, order_num
FROM orders INNER JOIN items
ON order_num, stock_num
INNER JOIN stock
ON stock_num, description
Essentially, I'm trying to start with the ORDERS table and pull the customer number (customer_num) specifically customer number 104 -108 and the order_num from the orders table. Then attach the orders table to the Items table and attach the order_num and stock_num, and lastly attach the stock table and pull out the stock_num and description.
A:
It should look something like this (based on the limited information about the schema)...
SELECT
O.CUSTOMER_NUM,
O.ORDER_NUM,
S.STOCK_NUM,
S.DESCRIPTION
FROM
ORDERS O,
ITEMS I,
STOCK S
WHERE
I.CUSTOMER_NUM >= 104
AND I.CUSTOMER_NUM <= 198
AND O.ORDER_NUM = I.ORDER_NUM
AND I.STOCK_NUM = S.STOCK_NUM
|
[Familial deafness showing hearing pattern of low-tone losses].
Clinical and electrocochleographic studies of low tone familial deafness were carried out in 19 patients of 10 families. These hearing impairments were characterized by an upward-sloping pure tone audiogram with 50dB to 60dB hearing threshold below 2000Hz and with normal or near-normal hearing threshold above this frequency. The type of inheritance in these families showed autosomal dominant mode and no associated malformation. In 7 patients, hearing tests were repeated, it was observed that hearing threshold was not elevated. The short increment sensitivity index (SISI) tests were positive suggesting a hair cell lesion in tested 7 patients. The caloric tests were normal in tested 3 patients. No abnormal internal ear configuration was found in both X-ray and high-resolution computed tomography. Twelve patients with these familial low tone deafness (FLTD), 19 patients with Ménière's disease, and 9 patients with low tone sudden deafness (LTSD) were studied using the transtympanic electrode technique of electrocochleography. All patients of FLTD showed normal negative summating potential (-SP) amplitude, and the cochlear microphonics (CM) showed a nearly same detection threshold as hearing level of the pure tone audiogram at 1 kHz and 0.5 kHz. The evidence suggested that the hearing impairment resulted from a localized abnormality of the cochlear apex, and without endolymphatic hydrops. On the other hand, patients with Ménière's disease and LTSD showed a high -SP amplitude and a satisfactory detection threshold of CM compared with hearing level of the pure tone audiogram. These findings suggest that both Ménière's disease and LTSD relate to endolymphatic hydrops.
|
/*
* Copyright 2001-2020 The OpenSSL Project Authors. All Rights Reserved.
*
* Licensed under the Apache License 2.0 (the "License"). You may not use
* this file except in compliance with the License. You can obtain a copy
* in the file LICENSE in the source distribution or at
* https://www.openssl.org/source/license.html
*/
#include <stdio.h>
#include "internal/cryptlib.h"
#include <openssl/objects.h>
#include <openssl/x509.h>
#include <openssl/pem.h>
#include <openssl/x509v3.h>
#include <openssl/ocsp.h>
#include "ocsp_local.h"
/*
* Utility functions related to sending OCSP responses and extracting
* relevant information from the request.
*/
int OCSP_request_onereq_count(OCSP_REQUEST *req)
{
return sk_OCSP_ONEREQ_num(req->tbsRequest.requestList);
}
OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i)
{
return sk_OCSP_ONEREQ_value(req->tbsRequest.requestList, i);
}
OCSP_CERTID *OCSP_onereq_get0_id(OCSP_ONEREQ *one)
{
return one->reqCert;
}
int OCSP_id_get0_info(ASN1_OCTET_STRING **piNameHash, ASN1_OBJECT **pmd,
ASN1_OCTET_STRING **pikeyHash,
ASN1_INTEGER **pserial, OCSP_CERTID *cid)
{
if (!cid)
return 0;
if (pmd)
*pmd = cid->hashAlgorithm.algorithm;
if (piNameHash)
*piNameHash = &cid->issuerNameHash;
if (pikeyHash)
*pikeyHash = &cid->issuerKeyHash;
if (pserial)
*pserial = &cid->serialNumber;
return 1;
}
int OCSP_request_is_signed(OCSP_REQUEST *req)
{
if (req->optionalSignature)
return 1;
return 0;
}
/* Create an OCSP response and encode an optional basic response */
OCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs)
{
OCSP_RESPONSE *rsp = NULL;
if ((rsp = OCSP_RESPONSE_new()) == NULL)
goto err;
if (!(ASN1_ENUMERATED_set(rsp->responseStatus, status)))
goto err;
if (!bs)
return rsp;
if ((rsp->responseBytes = OCSP_RESPBYTES_new()) == NULL)
goto err;
rsp->responseBytes->responseType = OBJ_nid2obj(NID_id_pkix_OCSP_basic);
if (!ASN1_item_pack
(bs, ASN1_ITEM_rptr(OCSP_BASICRESP), &rsp->responseBytes->response))
goto err;
return rsp;
err:
OCSP_RESPONSE_free(rsp);
return NULL;
}
OCSP_SINGLERESP *OCSP_basic_add1_status(OCSP_BASICRESP *rsp,
OCSP_CERTID *cid,
int status, int reason,
ASN1_TIME *revtime,
ASN1_TIME *thisupd,
ASN1_TIME *nextupd)
{
OCSP_SINGLERESP *single = NULL;
OCSP_CERTSTATUS *cs;
OCSP_REVOKEDINFO *ri;
if (rsp->tbsResponseData.responses == NULL
&& (rsp->tbsResponseData.responses
= sk_OCSP_SINGLERESP_new_null()) == NULL)
goto err;
if ((single = OCSP_SINGLERESP_new()) == NULL)
goto err;
if (!ASN1_TIME_to_generalizedtime(thisupd, &single->thisUpdate))
goto err;
if (nextupd &&
!ASN1_TIME_to_generalizedtime(nextupd, &single->nextUpdate))
goto err;
OCSP_CERTID_free(single->certId);
if ((single->certId = OCSP_CERTID_dup(cid)) == NULL)
goto err;
cs = single->certStatus;
switch (cs->type = status) {
case V_OCSP_CERTSTATUS_REVOKED:
if (!revtime) {
OCSPerr(OCSP_F_OCSP_BASIC_ADD1_STATUS, OCSP_R_NO_REVOKED_TIME);
goto err;
}
if ((cs->value.revoked = ri = OCSP_REVOKEDINFO_new()) == NULL)
goto err;
if (!ASN1_TIME_to_generalizedtime(revtime, &ri->revocationTime))
goto err;
if (reason != OCSP_REVOKED_STATUS_NOSTATUS) {
if ((ri->revocationReason = ASN1_ENUMERATED_new()) == NULL)
goto err;
if (!(ASN1_ENUMERATED_set(ri->revocationReason, reason)))
goto err;
}
break;
case V_OCSP_CERTSTATUS_GOOD:
if ((cs->value.good = ASN1_NULL_new()) == NULL)
goto err;
break;
case V_OCSP_CERTSTATUS_UNKNOWN:
if ((cs->value.unknown = ASN1_NULL_new()) == NULL)
goto err;
break;
default:
goto err;
}
if (!(sk_OCSP_SINGLERESP_push(rsp->tbsResponseData.responses, single)))
goto err;
return single;
err:
OCSP_SINGLERESP_free(single);
return NULL;
}
/* Add a certificate to an OCSP request */
int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert)
{
return X509_add_cert_new(&resp->certs, cert, X509_ADD_FLAG_UP_REF);
}
/*
* Sign an OCSP response using the parameters contained in the digest context,
* set the responderID to the subject name in the signer's certificate, and
* include one or more optional certificates in the response.
*/
int OCSP_basic_sign_ctx(OCSP_BASICRESP *brsp,
X509 *signer, EVP_MD_CTX *ctx,
STACK_OF(X509) *certs, unsigned long flags)
{
int i;
OCSP_RESPID *rid;
EVP_PKEY *pkey;
if (ctx == NULL || EVP_MD_CTX_pkey_ctx(ctx) == NULL) {
OCSPerr(OCSP_F_OCSP_BASIC_SIGN_CTX, OCSP_R_NO_SIGNER_KEY);
goto err;
}
pkey = EVP_PKEY_CTX_get0_pkey(EVP_MD_CTX_pkey_ctx(ctx));
if (pkey == NULL || !X509_check_private_key(signer, pkey)) {
OCSPerr(OCSP_F_OCSP_BASIC_SIGN_CTX,
OCSP_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE);
goto err;
}
if (!(flags & OCSP_NOCERTS)) {
if (!OCSP_basic_add1_cert(brsp, signer))
goto err;
for (i = 0; i < sk_X509_num(certs); i++) {
X509 *tmpcert = sk_X509_value(certs, i);
if (!OCSP_basic_add1_cert(brsp, tmpcert))
goto err;
}
}
rid = &brsp->tbsResponseData.responderId;
if (flags & OCSP_RESPID_KEY) {
if (!OCSP_RESPID_set_by_key(rid, signer))
goto err;
} else if (!OCSP_RESPID_set_by_name(rid, signer)) {
goto err;
}
if (!(flags & OCSP_NOTIME) &&
!X509_gmtime_adj(brsp->tbsResponseData.producedAt, 0))
goto err;
/*
* Right now, I think that not doing double hashing is the right thing.
* -- Richard Levitte
*/
if (!OCSP_BASICRESP_sign_ctx(brsp, ctx, 0))
goto err;
return 1;
err:
return 0;
}
int OCSP_basic_sign(OCSP_BASICRESP *brsp,
X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
STACK_OF(X509) *certs, unsigned long flags)
{
EVP_MD_CTX *ctx = EVP_MD_CTX_new();
EVP_PKEY_CTX *pkctx = NULL;
int i;
if (ctx == NULL)
return 0;
if (!EVP_DigestSignInit(ctx, &pkctx, dgst, NULL, key)) {
EVP_MD_CTX_free(ctx);
return 0;
}
i = OCSP_basic_sign_ctx(brsp, signer, ctx, certs, flags);
EVP_MD_CTX_free(ctx);
return i;
}
int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert)
{
if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert)))
return 0;
respid->type = V_OCSP_RESPID_NAME;
return 1;
}
int OCSP_RESPID_set_by_key_ex(OCSP_RESPID *respid, X509 *cert,
OPENSSL_CTX *libctx, const char *propq)
{
ASN1_OCTET_STRING *byKey = NULL;
unsigned char md[SHA_DIGEST_LENGTH];
EVP_MD *sha1 = EVP_MD_fetch(libctx, "SHA1", propq);
int ret = 0;
if (sha1 == NULL)
return 0;
/* RFC2560 requires SHA1 */
if (!X509_pubkey_digest(cert, sha1, md, NULL))
goto err;
byKey = ASN1_OCTET_STRING_new();
if (byKey == NULL)
goto err;
if (!(ASN1_OCTET_STRING_set(byKey, md, SHA_DIGEST_LENGTH))) {
ASN1_OCTET_STRING_free(byKey);
goto err;
}
respid->type = V_OCSP_RESPID_KEY;
respid->value.byKey = byKey;
ret = 1;
err:
EVP_MD_free(sha1);
return ret;
}
int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert)
{
return OCSP_RESPID_set_by_key_ex(respid, cert, NULL, NULL);
}
int OCSP_RESPID_match_ex(OCSP_RESPID *respid, X509 *cert, OPENSSL_CTX *libctx,
const char *propq)
{
EVP_MD *sha1 = NULL;
int ret = 0;
if (respid->type == V_OCSP_RESPID_KEY) {
unsigned char md[SHA_DIGEST_LENGTH];
sha1 = EVP_MD_fetch(libctx, "SHA1", propq);
if (sha1 == NULL)
goto err;
if (respid->value.byKey == NULL)
goto err;
/* RFC2560 requires SHA1 */
if (!X509_pubkey_digest(cert, sha1, md, NULL))
goto err;
ret = (ASN1_STRING_length(respid->value.byKey) == SHA_DIGEST_LENGTH)
&& (memcmp(ASN1_STRING_get0_data(respid->value.byKey), md,
SHA_DIGEST_LENGTH) == 0);
} else if (respid->type == V_OCSP_RESPID_NAME) {
if (respid->value.byName == NULL)
return 0;
return X509_NAME_cmp(respid->value.byName,
X509_get_subject_name(cert)) == 0;
}
err:
EVP_MD_free(sha1);
return ret;
}
int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert)
{
return OCSP_RESPID_match_ex(respid, cert, NULL, NULL);
}
|
Description
Innisfree Olive Actual Cleansing Oil Is A Smoothest And Supple Deep Cleansing Oil With Organic Olives. It Deep Cleansing Oil Totally Adheres Onto Your Pores and skin To Cast off And Cleanse Makeup And Impurities Left Inside of Pores As It Moisturizes And Softens Your Pores and skin.
It Is Appropriate For Standard To Aggregate Pores and skin Sort
Soothing And Moisturizing
This Is Synthetic In South Korea
In compliance with new EU laws, we must inform you that we use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it. Thank you.Okay
|
Q:
How to restrict retry attempts?
Is there a way through the Stormpath API or their UI to set a maximum number of password retry attempts? Or does this retry count need to be managed on my web server during any authentication with the Stormpath API?
A:
The Stormpath API does not yet provide this as a feature, so this is something that would have to be managed by your web application. However the Stormpath API can help you, because you can store the state in the account's custom data object, so that you can keep track of how many attempts have been made on that particular account.
I hope this answer helps!
|
Total Pageviews
Description: Those not born with the ability all dream of a chance, if only for a few moments, to fly.
Even if he is merely a tortoise with a simple mind; Tank was no different that the millions of other dreamers that covet the sky. Ever since his Yellow Mistress helped him hatch from his egg, he always marveled at those who have the capabilities.
As of yet though; he has not appeared at any of the pet play dates, nor has The Blue Mistress. If anything, the two are rarely even seen together. Concerned, Owlowicious attempts to consult with Tank whist they fly regarding the matter. The two have grown close since Tank has been fitted for the peculiar contraption strapped about his shell, despite their differences.
|
BuTuna,Idd, it was great meeting you in C B with a.o. some nice talking about the tuskers...
I wish I could make you happy with some names but can't ID any so far.I understand you thought about Shisha but it is not him. Many differences at his ear marks...Shisha had many small notche, better to say a ragged left ear. Also another notch at the bottom of his left ear...
[quote="BluTuna"]Hi Aat!
I'm glad you got back safely from your trip here! Was good to meet you & Elly!
Here are the first of the big guys that I would like to get ID'd or confirmed.
No 1. Not sure if this one is big enough to be a tusker. taken in the vicinity of Mopani camp.
No 2. Taken at Mooiplaas Water hole, I didn't realise that the one at the back had such long tusks until I was processing these pictures when I got home.No 3. On the S50 near Shingwedzi, I think this is Shisha. I remember being impressed by the size of this elephant!
Joined: Thu Mar 10, 2011 11:45 amPosts: 375Location: Back home in the ratrace.
Aat wrote:
BuTuna,Idd, it was great meeting you in C B with a.o. some nice talking about the tuskers...
I wish I could make you happy with some names but can't ID any so far.I understand you thought about Shisha but it is not him. Many differences at his ear marks...Shisha had many small notche, better to say a ragged left ear. Also another notch at the bottom of his left ear...
Hi Aat,
Thanks for trying, Here are the others I got during my trip :-
Babalala? at Babalala waterhole.
This one was between Shingwedzi and Mopani, not sure if he's big enough to be a tusker.
I think this one may be Matrix but I'm really not sure.
Unfortunately, this was the best picture I got of this big guy - he really has an enormous left tusk but I didn't get to see the right one. Taken on the S90 north of Satara.
This one was a few Kms north of Orpen Dam on the S35.
And lastly, on the S122 north of Lower Sabie.
_________________15-17 November 2013, day visitor at Croc Bridge gate.18 November 2013, Lower Sabie
BluTunaI really tried to ID the ones you showed, but besides of MaTrix the other ones are not named tuskers so far.The positive thing about it is, also looking at pictures I received from others ... there is a nice number of promising tuskers.
I will tell a bit more about it in my post about MAC.
Sorry BluTuna... I really wanted to make you happy with some names but I follow my own rules with ...being 100% sure about a name or being convinced about the name even when I am wrong after all... I also see some bulls with almost similar marks (like one of your bulls shown...with loose piece of skin in left ear but it is not one of the named ones with such a loose piece of skin, other marks are just different.
On our very last day in the park on 26.02.2012 on the tar road shortly before the main entrance of Shingwedzi camp we had the honour in spotting Mavatsani and one askari - In the following a short part out of my trip report
so we started to absorb everything and whilst looking around I realized in the distance in the river bed a huge elephant with long tusks and same was moving into the direction of the road and so we decided to hurry on as maybe from one of the many view points on the tar road leading to Shingewdzi camp we might have the possibility in seeing him a bit closer but gladly it came even better as first his askari popped out of the bushes and crossed the road in front of us
and after quite a while with some pictures with only a bush in front of his head he followed his friend with a large amount of remaining breakfast in his mouth
and demonstrating who the boss is!
Not only that he was wearing a nice pair of tusks he is also one of the larger ones and quite an impressive appearance
but was not in all interested in any way in us - He simply wanted to follow his friend.
On the other side of the road both walked still parallel to us and from time to time between one of the many bushes we got nice views onto him again and due to the remarkable V-shape in his left ear I could recognize him as Mavatsani - a known tusker!
The two of them removed more and more deeper into the bush and with this very last picture to also demonstrate the largeness of Mavatsani's tusks compared to his friend
A pity was the we only got side views of his head and not a frontal view but hey you cannot have everything.
Philip,Nice comment... and I ask myself sometimes the question: "how many people visiting the Park today do pay more attention to these big guys then some years ago" ?. It was funny to hear and see during my last trip hoew many do carry the tusker documents printed and/or on their laptop... Well, the more the better, so we can expect more posts here...like the one below....
Philip1 wrote:
:thumbs_up: Hi all with your Big Tuskers, thanks for sharing. I am learning slowly but will get thereA person do not realise how many of them roam in the Park, always just see another Ellie
Pumbaa,Great shots of Mavatsani !! I recognize the feeling of looking at a named big tusker for some time and waiting he will show his face...I waited for Mandzemba while he was socializing and eating and "removing" small trees... it took 1 1/2 hour before he finally showed himself completely and even crossed the road for me ...Difference is... I am a tusker whisperer
It's great to see that Mavatsani is around and doing well.... Hope to see or hear something about Machachule too soon... last pics I got did not promise a good future.
Pumbaa, hope to see Mavatsani's pics soon if you can find a minute to send them
Pumbaa , thank you for sharing your pics of Mavatsani . You know , I first spotted him in October 2010 at Babalala , and sent his pics to Aat , which was when he then first named him , so I always like to consider Mavatsani " as mine " .Unfortunately I have not seen him again since that first time , but certainly I have a soft spot for him . Good to see this magnificent tusker still well and thriving
_________________Tread softly , and let your departure not be spoiled by the damage of your arrival
Who is online
Users browsing this forum: No registered users and 0 guests
You cannot post new topics in this forumYou cannot reply to topics in this forumYou cannot edit your posts in this forumYou cannot delete your posts in this forumYou cannot post attachments in this forum
|
(a) Technical Field
The present disclosure relates generally to display devices, and particularly to curved display devices having a display screen with an extended area.
(b) Description of the Related Art
Recently, flexible display devices have been emphasized as potential next-generation display devices, and among them, curved display devices of which at least a part is bent or may be bent have been actively developed.
The curved display device may be generated to have a shape in which an entire display panel is bent with a constant curvature, or it may include curved portions that are bent at respective end portions of the display panel in a first direction. The curved display device is attached to a set frame by an adhesive tape or an adhesive solution provided to an edge, and is then assembled.
The curved display device may display an image on one side and may not display it on a lateral side and a rear side, so display devices for displaying images on all surfaces have recently been under development.
The above information disclosed in this Background section is only for enhancement of understanding of the background of the invention and therefore it may contain information that does not form the prior art that is already known in this country to a person of ordinary skill in the art.
|
County Courthouse
Probate Court has marriage records from 1845 and probate records from 1792; Clerk Superior Court has divorce and court records from 1792 and land records 1824-1829 burned, all records to 1818 damaged[1]
History
Parent County
1777--Glynn County was created 5 February 1777 from St. David and St. Patrick Parishes.County seat: Brunswick [2]
Boundary Changes
Record Loss
1896 -- Courthouse damaged by Storm.
For further information on researching in burned counties, see the following:
|
The Wall Street Journalreported that the new feature may be planned for as early as this fall, with it costing anywhere from $12 to $14 per month. The move comes as Hulu is attempting to become more competitive with Netflix, which currently enjoys the lion’s share of the television streaming market.
The option apparently has a codename of its own, “NOAH,” which stands for “No Ads Hulu, according to the publication, citing people familiar with the matter.
The number of Hulu subscribers pales in comparison to Netflix. The service, which is owned in part by Disney, 21st Century Fox, and Comcast, said it has about 9 million subscribers to Netflix’s 65 million. Meanwhile, Hulu may generate anywhere from $1.5 billion to $1.7 billion in revenue in 2015. Last year, Netflix garnered $5.5 billion, according to the newspaper.
Hulu did, however, make waves earlier this year when it announced it would start streaming all Seinfeld episodes.
]]>http://fortune.com/2015/07/17/hulu-ad-free-option/feed/01280-hulusnyderfortuneNetflix’s CEO just revealed the most important issue for Internet TVhttp://fortune.com/2015/07/15/netflix-investor-call-q2/
http://fortune.com/2015/07/15/netflix-investor-call-q2/#commentsWed, 15 Jul 2015 22:13:01 +0000http://fortune.com/?p=1209355]]>Netflix has no immediate plans to raise prices for U.S. subscribers, and will instead seek to lift profits by encouraging customers to upgrade to streaming that comes with better resolution. Meanwhile, the company plans to beef up its film library by adding new movies from Disney and by releasing more homegrown shows like the upcoming Narcos.
Those are some of the strategic insights shared by Netflix NFLX executives on a conference call following followed the release on Wednesday of its surprisingly buoyant second quarter earnings.
During the 45-minute discussion, which was broadcast on YouTube, the company also repeated its mantra that it “wants to get like HBO before they get like Netflix.” Translation: Netflix wants to master the content-production game before its rival can match it wide reach.
But the most significant moment came when CEO Reed Hastings explained the company’s decision to support a big cable merger between Charter CHTR and Time Warner Cable. The key to Netflix’s support, said Hastings, was the companies’ agreement to abide by settlement-free peering, which means the companies will not charge content providers for distributing their Internet traffic.
This is important because Netflix, in 2014, was locked in a bitter war with Comcast CMCSA and other Internet Service Providers over paying extra charges, which some likened to a form of extortion (ie “pay up or your Internet stream will get choppy”). The dispute led Netflix to ferociously oppose a proposed merger between Comcast and Time Warner Cable TWC.
Now, Netflix hopes the Charter peering pledge could serve not only its own interests, but establish an industry-wide practice for Internet TV. Hastings said he hopes free peering will spare the emerging industry from the sort of battles that continue to plague the cable TV industry, in which stations go dark whenever distributor and content owner haggle over a “retransmission” price.
“We view interconnection [peering] fees as the next retransmission …. that escalates with various price discovery battles,” he said. “It sets up an ugly industry practice.
In contrast, Hastings claims the spread of Charter-style free peering arrangements will spare not only Netflix but the industry from “worrying about a tax from ISPs.”
Hastings added that the Charter deal will benefit all Internet companies, and that he hopes in time that Comcast will embrace free peering too.
The call addressed other issues, including the reasons for Netflix’s surprising second quarter success (they include a strong Australia launch and the popularity of Spanish language shows), and whether Netflix will be willing to be part of an Internet “bundle” with other channels. The short answer to the latter question was “no” - Hastings said he would let distributors package Netflix, but that the service must appear as a separate line item on a customer’s bill.
Finally, the other remarkable part of the event was Hastings’ ghastly sweater, which he was wearing to promote the upcoming new season of Netflix’s Bojack Horseman show:
]]>http://fortune.com/2015/07/15/netflix-investor-call-q2/feed/0OITNB Laverne CoxJeffReed Hastings ugly sweaterNetflix streams its way to another blockbuster quarter, share price soarshttp://fortune.com/2015/07/15/netflix-q2-earnings-2015/
http://fortune.com/2015/07/15/netflix-q2-earnings-2015/#commentsWed, 15 Jul 2015 20:19:33 +0000http://fortune.com/?p=1209166]]>Netflix’s overseas push helped make for a blockbuster second quarter as the streaming movie service added 2.5 million new subscribers.
The company said Wednesday that it had more than 65 million subscribers, in total. Of those, 42 million are in the U.S. and another 23 million were international. Netflix predicted it would have 69 million subscribers by the end of the third quarter.
The strong results helped lift Netflix’s shares NFLX more than 10% in after-hours trading to around $107. The earnings came a day after Netflix went ahead with a 7-1 stock split that may tempt more average investors to take a position by reducing the share prices from above $700 to closer to $100.
The company reported a 6 cent per share profit (based on the post-split share price). This would be equivalent to 42 cents prior to the split, which beat the 28 cents analysts predicted. But the amount fell well short of the 16 cents EPS (post-split) the company posted in the same quarter a year ago. Revenue for Q2 was $1.481 billion which compares to $1.223 billion last year.
Netflix, which has a more volatile stock than many companies, has seen its share price tumble after every one of its second quarter earnings reports in the last six years - even though most of those reports likewise beat expectations.
Prior to the earnings release Greenlight Capital’s David Einhorn’s groused about Netflix’s original programming efforts, saying the popular House of Cards “appeared to be scripted to compete with Ambien.”
Netflix executives, including CEO Reed Hastings, discussed the numbers via a live YouTube conference on Wednesday afternoon. Hastings credited a strong launch in Australia and the popularity of Netflix’s Spanish language content with subscribers as some of the reason’s for the successful quarters. You can get more highlights from the conference call here.
]]>http://fortune.com/2015/07/15/netflix-q2-earnings-2015/feed/0Reed Hastings 2015JeffThis is how Comcast hopes to keep customers from cutting the cordhttp://fortune.com/2015/07/13/comcast-stream/
http://fortune.com/2015/07/13/comcast-stream/#commentsMon, 13 Jul 2015 15:14:43 +0000http://fortune.com/?p=1205798]]>Comcast has a new offering that the company likely hopes will make its customers reconsider cutting the cord.
The cable giant said late-Sunday that its broadband internet customers will soon have the option of paying just $15 a month to get live access to about a dozen TV networks over the web. Comcast’s CMCSA new service, called Stream, includes the major broadcast networks, as well as HBO, and customers will also have access to “thousands of on demand movies and shows,” the company said.
Stream also comes with access to Comcast’s TV Everywhere web streaming app and a cloud DVR for recording and storing content.
The offer is only available to Comcast broadband subscribers and, to start, Comcast will first launch Stream in the Boston area at the end of this summer before eventually expanding the service to Chicago and Seattle. The company said Stream will roll out nationally early next year.
With the introduction of Stream, Comcast joins the ranks of large media companies courting so-called “cord-cutters,” who have shown a reluctance to pay for traditional large cable-and-internet packages. Earlier this year, Verizon VZlaunched its FiOS Custom TV service, which offers modified ? la carte pricing for slimmer, customizable pay-TV bundles. Meanwhile, Dish Network DISH offers a similar subscription service, Sling TV, and cord-cutters can also opt for services like Sony’s SNE Playstation Vue.
The main difference between the other services available to streaming TV customers and Comcast’s Stream is that the latter is only available to Comcast’s own broadband subscribers, which allows the company to offer cord-cutter-like service without encouraging its customers to actually cut the cord.
Meanwhile, as Re/code notes, customers would be paying the $15-per-month for Stream on top of Comcast’s broadband-only subscription, and the combined total of those two packages could actually exceed Comcast’s basic, $45-per-month TV and broadband package, which also includes HBO. Comcast’s basic “Economy Plus” internet service costs about $35-per month.
This week, the performance of European stocks will be in focus as traders watch events involving Greece. Euro zone leaders reached a deal with the debt-stricken country at the end of a marathon night of talks, making Greece surrender much of its sovereignty to outside supervision in return for agreeing to talks on an 86 billion euro bailout. Also this week, Federal Reserve chair Janet Yellen will meet with Congress to discuss monetary policy and the economy as investors hope for some clarity on the impending interest rate hike. Meanwhile, corporate earnings season is back in full swing with a bumper crop of bank earnings as well as quarterly results for some high-profile tech firms.
Here’s what else you need to know this week.
1. Another Greek bailout
World markets gave a weary cheer on Monday as euro zone leaders emerged from-all night talks in Brussels with a deal to keep Greece afloat and part of the euro currency union. Euro zone leaders made Greece surrender much of its sovereignty to outside supervision in return for agreeing to talks on an 86 billion euros ($95 billion) bailout to keep the near-bankrupt country in the single currency. European Council President Donald Tusk announced just as European trading started that after months of tortuous negotiations, marathon overnight discussions had produced the third bailout deal in five years for Greece.
2. Yellen’s congressional testimony
The Federal Reserve chair will offer her semi-annual testimony to the House Financial Services Committee in Washington. Yellen will discuss monetary policy and the U.S. economy at a time when the central bank is on the verge of a much-anticipated interest rate hike. However, investors looking for some insight into the timing of the rate hike will likely need to wait until after the next Federal Open Market Committee meeting in a couple of weeks.
3. Tech earnings
Earnings season is back in full force and a handful of major technology companies will report their latest quarterly results this week. Google GOOG is expected to report second-quarter numbers on Thursday that fall short of Wall Street’s expectations after the strong U.S. dollar weighed down overseas revenue. EBay EBAY also reports second-quarter results on Thursday, but the online marketplace is expected to show disappointing sales figures due to increased competition from rivals such as Amazon AMZN. Netflix NFLX is expected to reveal a better-than-expected bump in online subscribers when it reports second-quarter figures on Wednesday.
4. Bank earnings
JPMorgan & Chase JPM and Goldman Sachs GS both report second-quarter results this week, with the latter expected to see a decline in quarterly profit. CitiGroup’s C second-quarter profits are expected to see a healthy jump year-over-year after the bank took a hit from legal costs during the same period in 2014. Other financial institutions reporting earnings this week include Bank of America BAC, Wells Fargo WFC, BlackRock BLK, and Charles Scwhab SCHW.
5. Economic indicators
On Friday, the Labor Department will release the Consumer Price Index for June, when the index is expected to have climbed at a slower pace than in May. The Fed releases its report on June industrial output on Wednesday, while Tuesday will bring the Commerce Department’s report on June retail sales, which are expected to have increased by only 0.3% last month after a 1.2% bump in May.
--Reuters contributed to this report.
]]>http://fortune.com/2015/07/12/week-ahead-greece-5things/feed/0Eurozone Finance Ministers Demand Greater Scrutiny Of Greek Budget CutshuddlestontomNetflix announces release dates for its first original movieshttp://fortune.com/2015/07/07/netflix-original-movies/
http://fortune.com/2015/07/07/netflix-original-movies/#commentsTue, 07 Jul 2015 18:20:53 +0000http://fortune.com/?p=1201991]]>Netflix NFLX has finally announced the release dates for its initial wave of original films, and the first -- “Beasts of No Nation” by acclaimed director Cary Fukunaga -- will be available as soon as October this year.
The other films -- Adam Sandler’s “The Ridiculous Six,” “Pee-Wee’s Big Holiday,” and “Crouching Tiger, Hidden Dragon: The Green Legend” -- will be released in December, March, and sometime in the first quarter of 2016, respectively, the company said.
The films will all be made available on Netflix, but some will also be released in cinemas. “Beasts of No Nation” will be released concurrently on the streaming service and in select theaters, and the “Crouching Tiger, Hidden Dragon” sequel will be shown in Chinese theaters and in IMAX.
The original films represent a new frontier for the video streaming service, which enjoyed huge membership gains after the introduction of original TV series such as “Orange is the New Black,” and “House of Cards.” Creating original films takes that success one step further.
Netflix’s foray into original films also promises to shake up the film’s industry’s business model, in which movies (or at least the good ones) are only released to streaming services and DVD a few months after they are shown in theaters.
]]>http://fortune.com/2015/07/07/netflix-original-movies/feed/0Netflix 2013clairegrodenAs Netflix goes global, more customers jump digital fencehttp://fortune.com/2015/07/07/netflix-vpns/
http://fortune.com/2015/07/07/netflix-vpns/#commentsTue, 07 Jul 2015 13:58:05 +0000http://fortune.com/?p=1200624]]>A media executive publicly denounced her own daughter for “stealing” last month. The crime? The 15-year-old has used a common technology to watch the U.S. version of Netflix instead of the Canadian one to which the family subscribed.
The “stealing” remark, which came during a speech about copyright issues, was seen by some as overblown. But it did underscore an important issue facing NetflixNFLX and other digital subscription services: large numbers of consumers, in search of new content, are jumping over the digital fences intended to preserve companies’ traditional country-by-country distribution models.
The result is a boom in cross-border viewing, which has become easier than ever thanks to cheap access to services such as virtual private networks (VPNs) that let customers hide their location. And in the case of Netflix, which is now in more than 50 countries, it raises the question of whether the company can or should do more to keep online customers locked into local internet borders?
Watch movies across the border: how it works
Netflix is wildly popular in Canada, and has been ever since the U.S. company opened shop there in 2010. The only catch for many Canadians is that the selection stinks compared to what their friends south of the border can get: Americans see hundreds of movies and TV shows, including Grey’s Anatomy and Burn Notice, that they do not. While Canadians see some shows that don’t appear on Netflix in the U.S., including Downton Abbey, these are relatively few.
This content shortage is why Canadians, and others with cross-border-Netflix envy, turn to services like “usnetflix.ca” that disguise their online location. By using these services, a subscriber in Vancouver may appear (from Netflix’s perspective) to be signing on from Seattle. Or a viewer in Australia may log-in via an internet address based in Boston. This simple trick prompts Netflix to fire up its U.S. roster of shows, including Grey’s Anatomy, in place of the more limited Canadian or Australian catalogue - meaning the viewer’s national subscription becomes an international one.
It’s important to point that this cross-border viewing is not really akin to “stealing” shows - despite what some media executives might say. That’s because the viewers in question are mostly paying customers of Netflix, and what they see is exactly what Netflix would show them if they happened to be traveling in another country. And though the digital fence-hopping is a violation of Netflix’s terms of service, it is questionable whether the practice is the same as outright piracy.
So how exactly do these people get access to international versions of Netflix in the first place? There are two popular technologies. The first is called a “VPN” (virtual private network), which creates a steady connection to Netflix from an out-of-country server. This is the same tool that people use to evade censorship in countries like China or that dissidents can use to hide their identify.
The second tool is a “smart DNS” server. This method likewise tells Netflix that you’re somewhere that you’re not - but only briefly, at the moment you sign on. Unlike a VPN, it doesn’t maintain a dedicated and encrypted connection. But that’s okay for someone who just wants to watch Netflix since it’s only the initial “authentication” moment that matters. Once you’re logged in, you’re “in” as far as Netflix is concerned.
According to Don Bowman, the CTO of network equipment maker Sandvine, both tools are common ways for Canadians to watch international Netflix, though DNS is more popular. All told he estimates that, in Canada, 30 percent of Netflix subscribers use one or the other method to watch U.S. Netflix.
This demand appears to be facilitated by sites like “usnetflix.ca” and “unblock.us,” which purport to offer easy access to location-disguising services for around $5 a month. Such sites are flourishing, even though some have earned a reputation for shady practices such as selling the bandwidth of their users to third parties.
Does Netflix know (and does it care)?
In January, certain corners of the internet went into panic over reports that Netflix was cracking down on VPN use. The news turned out to be overstated, but it did serve to raise the question of how much Netflix knows about, and possibly tolerates, its border-jumping customers.
“Whenever I’ve asked them about VPN's, they always say the same thing - that it's not a big issue, that it's hard to nail down,” said Morgan Stanley analyst, Ben Swinburne, in a recent phone interview. He added that investors and Netflix are aware that “VPN’ing” goes on, but specific numbers are unclear.
From a technological perspective, however, experts say that Netflix could probably do more to shutdown the cross-border viewing.
“To be economical, they [the DNS or VPN provider] have to use commercial data centers … there’s not a way for them to hide,” said Bowman, the Sandvine CTO, explaining that Netflix can typically detect when certain internet traffic is coming from an internet address associated with a VPN or DNS provider. In response, the company could choose to block the incoming traffic.
According to Bowman, Netflix can’t block cross-border viewing entirely but it’s likely the company could put a “big dent” in it. He added that the company has made some effort to curb VPN and DNS use, in part through updates to its mobile apps.
As for Netflix, company spokesperson Anne Marie Squeo said the company is doing what it can, even as it expands in dozens of countries.
“We employ industry standard measures to prevent people from using VPN to access our service. That said, it’s an issue of haves and have nots –people who are willing to pay for a TV show or movie but don’t have access — that we hope to address by offering our content globally to audiences at the same time.”
Meanwhile, analyst Barton Crockett of FBR Capital claims Netflix has no incentive to allow cross-border viewing, saying by phone: “They are trying to identify these people and shut them off. The U.S. content is only supposed to be in the U.S.”
Netflix, physical borders and global rights
The behavior of Netflix’s roving subscribers is actually just a symptom of a larger issue confronting media owners: the territory-based approach to selling movie and TV rights is harder than ever to maintain in digital world. While selling DVDs on a country-by-country basis makes perfect sense, the role of borders is less obvious when it comes to the internet.
“Consumers don't understand. They say, ‘why can't I watch the shows I want in Netflix’,” said Sandvine’s Bowman. “It’s trying to apply the physical world in the digital world.”
This consumer confusion appears in part to explain Netflix’s recent push to obtain TV and movie rights on a global basis instead of country-by-country. For Netflix, a worldwide license is not just an efficient way to acquire content, but also results in a more consistent product experience for its customers.
“I think they absolutely want global rights. It’s a strategic advantage over their competitive set,” said Swinburne, the Morgan Stanley analyst. He also notes, however, that a demand for global rights poses a dilemma for content owners: should they embrace the convenience of one large paycheck from Netflix, or instead try to make more money by selling the rights in one territory at a time?
The issue of VPNs and smart DNS tools further complicates the issue, and could amount to a form of leverage for Netflix. The company could, in effect tell content owners: “see, viewers are going to get this content anyways, so you might as well give us the global license.”
Netflix does not, of course, concede it is doing this, but the outrage from the Canadian media executive - who made the “stealing” comment about her own daughter - suggests that cross-border viewing is already causing friction between Netflix, its competitors and content owners. Seen in this light, the 15-year-old’s Netflix viewing doesn’t represent a moral problem, but a familiar business one.
]]>http://fortune.com/2015/07/07/netflix-vpns/feed/0Watching NetflixJeffNetflix hit with ‘cloud tax’ as Chicago targets online consumershttp://fortune.com/2015/07/01/netflix-tax/
http://fortune.com/2015/07/01/netflix-tax/#commentsWed, 01 Jul 2015 16:13:50 +0000http://fortune.com/?p=1198909]]>Chicago is marking Independence Day this year with fireworks, hot dogs - and sweeping new tax rules that require companies to collect a 9% levy every time consumers use streaming and cloud services such as Netflix NFLXor AmazonAMZNWeb Services.
The rules, which went into effect today, came about after city officials expanded the interpretation of existing amusement and property lease taxes to encompass cloud-based technologies.
According to lawyers at ReedSmith, which flagged the new rules in a blog post, the taxes now encompass SaaS (software as a service), PaaS (Platform as a Service) and streaming media services. In a phone interview, Wynne described how the tax collection will work in practice:
“It really comes from doing audits of consumers. Take our law firm. City officials will audit us for a bunch of taxes, and may find online services,” said Wynne, explaining that officials will now check if the firm has been paying the 9 percent tax on those services.
This raises the question of who is responsible for collecting and paying the tax, which is technically levied on consumers.
“Let’s say an audit of our firm reveals we an invoice from Amazon or someone else with a Chicago address,” said Wynne in a hypothetical example. “The city authority has the choice of either going after the law firm or the companies who didn't collect.”
In response to the new rules, Netflix is already making arrangements to add the tax to the bills of its Chicago subscribers, according to the Verge, which points out that costs to consumers will rise as companies like Lexis-Nexis to Spotify may follow suit.
The new Chicago tax interpretation comes at a time when local tax jurisdictions are confronting a loss in sales tax revenue from traditional main street stores. As a result, the booming cloud industry appears to present a tempting target to make up the shortfall.
For cloud and streaming companies, however, Chicago’s aggressive approach could provide major compliance and accounting headaches if thousands of other local jurisdictions follow suit.
Meanwhile, members of Congress are trying once again to introduce a law that would oblige online retailers to collect sales tax when they sell to out-of-state residents.
A survey released on Tuesday by TiVoTIVO finds that 9 out of 10 people are engaging in “binge viewing,” which the digital video recording company defines as watching more than three episodes of a particular TV show in one day. According to TiVo, 92% of respondents to the company’s latest Binge Viewing Survey said they have engaged in the act of television gluttony at some point.
Not surprisingly, binge-watching is also less frowned upon, with only 30% of respondents reporting a negative view of binge-viewership (there would appear to be some self-loathers in that bunch) compared to two years ago, when more than half of respondents felt the term “binging” had negative connotations.
Most people said they binge-watch simply because they fall behind on watching new episodes of a certain show, while others said they simply didn’t hear about a new show until several episodes had already aired and they wanted to catch up. But 32% of those surveyed said they intentionally avoided watching certain programs until an entire season, or the whole series, had ended so that they could then binge-watch the show.
Of course, you may want to take the report’s findings with a grain of salt. Most of the survey’s respondents are TiVo subscribers (about 30,000 people out of 42,000 surveyed) and one would imagine that people who are willing to pay for the DVR service are also probably more likely to binge-watch recorded shows.
Those who did participate in the survey, though, mostly seem to be doing their binge-watching in one place: Netflix NFLX. TiVo found that 66% of those surveyed use Netflix to binge-watch their favorite programs, with Netflix original series House of Cards and Unbreakable Kimmy Schmidt topping the list of the most-recently binged upon shows. (Does that mean people are still working their way through the new season of Orange is the New Black?) Those results aren’t all that surprising given all of the work Netflix has done to expand its stable of original content as the online streaming platform looks to challenge more traditional media outlets like broadcast and cable television networks.
Despite binge-watching’s march toward ubiquity, there are still some downsides to the voluntary force-feeding of television series. For instance, 31% of respondents to TiVo’s survey said they have lost sleep to their binging habit while another 37% said they have spent an entire weekend binging on a show.
It may be a contradiction, but please do remember to binge in moderation.
]]>http://fortune.com/2015/06/30/binge-viewing-study/feed/0TV AddicthuddlestontomHuffington Post is betting big on video, but so is everyone elsehttp://fortune.com/2015/06/26/huffington-post-video/
http://fortune.com/2015/06/26/huffington-post-video/#commentsFri, 26 Jun 2015 17:58:29 +0000http://fortune.com/?p=1194317]]>When Verizon said it was buying AOL, there was much speculation about whether the telecom giant would want to hang on to the company’s media assets--that is, The Huffington Post, TechCrunch, etc. Many (including me) were skeptical about whether Verizon would want to keep them, since media doesn’t generate a huge amount of income. But for now at least, it appears that HuffPost is sticking around, and it plans to use its new parent’s deep pockets to expand into video in a significant way.
Co-founder Arianna Huffington--who recently signed a four-year deal to remain with the publication she created--told the Hollywood Reporter that the site is staffing up to launch a CNN-style 24-hour video news network called HuffPost 24. The new service will apparently feature live news and short-form video, as well as original TV-style series content and documentaries, and will be available through the website and mobile apps, and through over-the-top and video-on-demand services. Said Huffington:
“It’s part of our growth plan to be 50-50 video. As we see the world moving to mobile and global video, these are pretty big priorities. Being able to produce video that can be consumed both by over-the-top and mobile is a huge priority for us.”
Huffington Post has had a video offering for several years now, called HuffPost Live, which has focused primarily on interview-style TV show content. What the site is talking about now is turning that video unit into a full-fledged television and movie network known as HuffPost Studios: According to the company’s founder, it will have separate divisions that will create TV and movie projects--including feature-length films--as well as acquiring and licensing them from others.
The site has been working on bulking up its video for some time now, but this is the first time its founder has talked about the full scope of her ambitions in that area, and the fact that Huffington Post wants video to be at least 50% of its content in the future.
It seems clear that HuffPost wants to make full use of the resources of its new owner, Verizon, which just closed its acquisition of AOL a few days ago. For its part, Verizon is no doubt salivating at the prospect of offering all of that video to its mobile users, along with ads targeted with AOL’s ad-serving technology--something many saw as one of the key factors driving Verizon’s purchase.
The only real problem standing in the way of these ambitious video moves is that virtually everyone else in the media industry is either working on or planning the exact same thing, and many of them have far greater skills and even deeper pockets than Huffington.
VICE, for example, has its own HBO channel and is expected to expand that after an investment by A&E Networks that values the company at more than $2.5 billion. It already has a 24-hour news network that it recently launched in Canada (where the company was originally founded as a lifestyle magazine), and co-founder Shane Smith has said he wants to become “the next CNN, the next ESPN and the next MTV.” According to one report, VICE has already sold three years worth of advertising for its channel.
BuzzFeed is also counting on its video division, which it is calling BuzzFeed Motion Pictures, for a large part of its future growth: The unit is run by online-video veteran Ze Frank, who said recently it generates more than one billion views of its video content a month. At the recent Cannes Lions advertising forum in France, co-founder Jonah Peretti said the company--which initially frowned on the idea of creating TV-series-style content--is working on a number of projects.
Another company that has said it is betting big on TV and film content, and has extremely deep pockets, is Amazon AMZN. Its Amazon Studios division is already a fairly significant player in independent TV and movies, with shows like Transparent and new offerings it is working on with stars like Kevin Costner. It distributes its content through its Netflix-style Amazon Instant Video service, and the company recently said it plans to produce movies and distribute them online.
In addition to these new competitors, the market for video also includes every existing TV and movie provider, as well as established digital players like Netflix and YouTube. And they are all doing it for the exact same reason that Arianna Huffington and Verizon are: Namely, that whatever money there is in digital advertising is predominantly in video. But will that continue to be the case, or is there a video advertising glut looming as all these players converge?
Follow Mathew Ingram on Twitter at @mathewi. You can read his coverage of the media industry by going here, or you can subscribe via his RSS feed.
]]>http://fortune.com/2015/06/26/huffington-post-video/feed/0Family watching television in living roomMathewNetflix is launching in this massive new markethttp://fortune.com/2015/06/25/netflix-india-internet/
http://fortune.com/2015/06/25/netflix-india-internet/#commentsThu, 25 Jun 2015 17:52:54 +0000http://fortune.com/?p=1192943]]>With subscribers in over 40 countries, Netflix NFLX has set its sights on one of the biggest markets known to Internet TV companies: India.
The company plans to expand its 62-million customer base with a launch in India in 2016, sources told The Times of India. The service will include popular local shows such as Buniyaad, Nukkad, and Malgudi Days, and will be available on Apple iOS and Google Android devices, the report said.
The move into India is notable for two reasons.
First, it continues the global expansion of the movie-streaming company with ambitions of hitting 200 countries by the end of next year. “We now believe we can complete our global expansion over the next two years, while staying profitable, which is earlier than we expected,” said CEO Reed Hastings in a letter to investors earlier this year.
Second, India is huge, and companies are speeding toward a growing market of eager web surfers. The nation of 1.2 billion people leads the world in Internet user growth across all platforms, according to the 2015 Internet Trends report by Kleiner Perkins. India has over 240 million Internet users, and added 63 million new users last year, the report said. It is the second largest market for Facebook FB and LinkedIn LNKD, and Amazon AMZN and Alibaba BABA are duking it out for dominance of India’s $6 billion online retail industry. Clearly, the country is a potential cash cow for a company like Netflix.
The company has several challenges ahead. India’s broadband connection speeds are two times less than the global average, and they rank among the lowest in the Asia-Pacific region. For Netflix to thrive in the country, potential online moviegoers must fight through power cuts, jam-packed cities and, well, hungry, fiber-optic cable-eating monkeys.
Netflix said on Tuesday its board of directors has approved a seven-for-one stock split.
]]>http://fortune.com/2015/06/25/netflix-india-internet/feed/0Netflix headquartersjchew1271Here’s how much Carl Icahn made on Netflixhttp://fortune.com/2015/06/25/how-much-icahn-made-on-netflix/
http://fortune.com/2015/06/25/how-much-icahn-made-on-netflix/#commentsThu, 25 Jun 2015 16:29:28 +0000http://fortune.com/?p=1192579]]>Carl Icahn tweeted on Wednesday that he was out of Netflix NFLX . He received an awfully lovely parting gift.
]]>http://fortune.com/2015/06/25/how-much-icahn-made-on-netflix/feed/0Carl Icahn 2013clairezillmanWhy Carl Icahn dumped his last Netflix shareshttp://fortune.com/2015/06/24/carl-icahn-netflix-shares/
http://fortune.com/2015/06/24/carl-icahn-netflix-shares/#commentsWed, 24 Jun 2015 16:12:51 +0000http://fortune.com/?p=1191539]]>Carl Icahn announced on his Twitter Wednesday that he’s sold his last Netflix shares.
Icahn Enterprises, which owned about 1.4 million Netflix shares at the end of 2015’s first quarter, made the move after Netflix NFLXannounced approval of a 7-for-1 stock split, according to CNBC.
Per the publication:
The split will come in the form of a dividend of six additional shares for each outstanding share, Netflix said. It is payable on July 14 to stock owners of record at the July 2 close. Trading at the post-split price will start July 15.
CNBC reported, too, that Netflix stocks dipped slightly after Icahn’s message on the social media service.
Here’s Icahn’s Twitter message announcing the decision:
Sold last of our $NFLX today. Believe $AAPL currently represents same opportunity we stated NFLX offered several years ago.
Netflix has expanded in recent years becoming not only a streaming service for television and film, but also a developer of new movies and TV shows.
]]>http://fortune.com/2015/06/24/carl-icahn-netflix-shares/feed/0Carl Ichan activist shareholder 2014snyderfortuneMeet ‘Nollywood': The second largest movie industry in the worldhttp://fortune.com/2015/06/24/nollywood-movie-industry/
http://fortune.com/2015/06/24/nollywood-movie-industry/#commentsWed, 24 Jun 2015 14:25:34 +0000http://fortune.com/?p=1191310]]>In 1992, in Nigeria, electronics salesman Kenneth Nnebue shot a straight-to-video movie in one month, on a budget of just $12,000. Living in Bondagesold more than a million copies, mostly by street vendors, and Nollywood - Nigeria’s movie industry - was born.
By 2009, Nollywood had surpassed Hollywood as the world's second largest movie industry by volume, right behind India's Bollywood. And in 2014, the Nigerian government released data for the first time showing Nollywood is a $3.3 billion sector, with 1844 movies produced in 2013 alone. Earlier this year, Nollywood Producer Kunle Afolyan reached an exclusive Netflix distribution arrangement for his latest film, October 1. This adds to the 10 Nollywood related titles already on Netflix and the U.S. media company's recent $12 million movie rights purchase of Nigerian novel Beasts of No Nation, to star Idris Elba.
And many observers believe that the global reach of African films could take off, led by video on demand (VOD) platforms and productions of Nigeria — the continent's largest economy and most populous nation.
"Nollywood's popularity across Africa and the diaspora certainly demonstrates the capacity of the films to travel," said Nigerian film producer and financier Yewande Sadiku.
But, she notes industry is "in desperate need of a financial makeover." Indeed, pirating of Nollywood productions is a big problem in Nigeria and throughout Africa. Nigeria's film regulatory agency now posts existing laws, enforcement actions, and arrest details for film copyright infringement online, but many in the industry, including Nollywood producer Kunle Afolayan, say that's not enough. They've pressed for stronger copyright laws and led a campaign to expose violators, including posting photos and films of alleged pirating operations.
And critics note that while Nollywood has volume, it lacks production value, and African actors have yet to breakout globally. "The truth is key players in the global movie industry still have little idea what Nollywood is about," said Nigerian producer Kunle Afolayan. "The volume won't matter until we can connect the art to the money with better content and profits."
Nigeria's National Bureau of Statistics data also highlights Nollywood's greatest shortcoming: severe revenue bleed. Of the industry's $3 billion valuation less than 1 percent was tracked from official ticket sales and royalties. The rest came from pirated reproductions sold by unauthorized vendors for roughly $2 each. As a result, producers and financiers see only a fraction of the movie industry's economic value.
African digital content startups and the entry of subscription-based video on demand are trying to change this equation. With financial backing of $25 million from firms such as New York's Tiger Global and Sweden's , iROKO Partners licenses and streams Nollywood content to global subscribers, who pay $1.50 a month. "The focus is to take this popular movie industry, digitize it, and put the right framework around it to capture the proper value," founder Jason Njoku said of Nollywood and iROKO's platform.
"The revenue is already there, it's just scattered. If stakeholders can invest in Nollywood and make back profits, it will lead to larger budgets and better quality content."
Competition in African digital entertainment is heating up. In 2014, Africa Magic, a Naspers owned South African satellite TV channel, announced its $8 a month Africa Magic Go VOD package. Then there's Kenyan startup Buni.tv's new Buni+, a $5 a month streaming movie service. Each has a heavy focus on consumers of Nigerian content. Meanwhile, YouTube is also becoming a competitor. Taking a cue from U.S. disruptors like Netflix, Africa's digital film platforms are already creating proprietary programming. iROKOTV is now directing its own productions through its ROK Studios. So too is Nairobi based Buni.tv, which launched Ogas at The Top, a Nigerian version of its popular political satire XYZ Show. In April Nigerian media outlet TechCabal reported a distribution partnership between IROKOTV and Netflix. But, neither Njoku nor Netflix would confirm or deny any deal to Fortune.
Reliable Internet–a baseline for streaming VOD–is still a problem in African countries, however. IROKO has set its developers to creating smaller Nollywood movie files and more direct download options. Another Nigerian startup, SOLO, is bridging the device and broadband gap by offering entry level smartphones (around $75) and its View App that allows customers to buy and rent digital content at download hotspots throughout the country.
As Africa's VOD platforms improve prospects for the continent's films by formalizing revenue and distribution streams, Nollywood may not be the only industry to profit. U.S. digital content purveyors could benefit too. "If we can solve these monetization challenges for African creative content, it can apply to any creative content," said Jason Njoku.
Jake Bright is a Whitehead Fellow of The Foreign Policy Association and author of the upcoming book, The Next Africa: An Emerging Continent Becomes a Global Powerhouse.
Correction: An earlier version of this story erroneously said that Nollywood first surpassed Hollywood in volume in 2014; it reached that marker in 2009. The Nollywood industry’s first official valuation was made in 2014. The story has been updated to reflect this.
]]>http://fortune.com/2015/06/24/nollywood-movie-industry/feed/0AFOLAYAN.OCT.1.FILMINGpamelakrugerNetflix announces 7-to-1 stock splithttp://fortune.com/2015/06/23/netflix-stock-split/
http://fortune.com/2015/06/23/netflix-stock-split/#commentsTue, 23 Jun 2015 22:17:37 +0000http://fortune.com/?p=1190946]]>Netflix will be splitting its shares seven-to-one, the company said in a statement after the markets closed Tuesday.
The Los Gatos, Calif.-based company’s stock doubled this year. The split will make the stock more accessible to investors, Netflix CEO Reed Hastings told investors at the company’s annual meeting, Bloomberg reports.
The split will take effect on July 14, and is payable to stockholders as of July 2. The new shares will begin to trade on July 15, and any shares purchased between July 2 and July 14 will come with a “due-bill” entitling buyers to six more shares for each share they’ve purchased.
Netflix, which started as a DVD-by-mail lending service, has since evolved into a primarily digital streaming company. Today, the company says it has more than 62 million members in over 50 countries, who watch more than 100 million hours of television shows and movies per day.
Netflix’s stock closed at $681.19 at the end of regular trading hours, and climbed to at least $703.55 in after-hours trading following the stock-split announcement.
]]>http://fortune.com/2015/06/23/netflix-stock-split/feed/01280-netflixkiakokalitchevaThis Spotify hire could point to an IPOhttp://fortune.com/2015/06/18/spotify-ipo/
http://fortune.com/2015/06/18/spotify-ipo/#commentsThu, 18 Jun 2015 16:33:48 +0000http://fortune.com/?p=1182461]]>For a few months now there’s been speculation about a Spotify IPO, and a new hire by the company is doing nothing to quell those rumors.
McCarthy most recently worked at operating chief at Clinkle Corp., a digital-payments startup, which he left in March after five months.
Spotify’s most recent round of funding pegs its valuation at $8.53 billion. Still, Spotify suddenly finds itself up against new music streaming competition with the recent introduction of Apple Music.
]]>http://fortune.com/2015/06/18/spotify-ipo/feed/0Spotify Press AnnouncementclairezillmanYour Netflix experience is about to look a lot differenthttp://fortune.com/2015/06/15/netflix-new-website-design/
http://fortune.com/2015/06/15/netflix-new-website-design/#commentsMon, 15 Jun 2015 19:53:57 +0000http://fortune.com/?p=1176539]]>Netflix announced Monday what it calls the “first major update” to the popular video streaming service’s website design in four years.
The new design is meant to offer Netflix NFLX users “a richer, more visual experience,” while functioning more like a mobile app than a traditional website, the company said in a blog post.
The post notes that growing usage rates for mobile apps mean websites need to adapt to users’ evolving preferences. That’s why the redesigned Netflix site presents information like movies and TV shows in-line for easier, faster scrolling rather than linking to separate pages.
Netflix users will be able to hover a mouse over a movie or TV show to see more information about the content along with a slideshow of images from the program. Clicking on a program opens an in-line pane with more details and the option of browsing through specific episodes.
Some Netflix members will see the new interface immediately; Netflix said the rollout may take up to two weeks to reach all users.
As more and more people turn to Netflix and other streaming sites for their entertainment needs, more traditional media outlets are suffering a drop-off in viewership. In addition to dropping TV ratings, a recent PricewaterhouseCoopers study found that the revenue from downloading and streaming video content will outpace physical DVD sales this year and will surpass revenue from movie theaters in the U.S. by 2017.
]]>http://fortune.com/2015/06/15/netflix-new-website-design/feed/0US Online Streaming Giant Netflix : IllustrationhuddlestontomThink your office is distracting? It could be worsehttp://fortune.com/2015/06/12/worst-office-distractions/
http://fortune.com/2015/06/12/worst-office-distractions/#commentsFri, 12 Jun 2015 15:03:14 +0000http://fortune.com/?p=1173197]]>It's well known that distractions wreak havoc on productivity. Now comes a study from CareerBuilder revealing exactly what makes it so hard to concentrate at work, including smartphones, chatty colleagues, and never-ending social media feeds.
Asked to name the biggest productivity killers at their companies, 2,175 managers said pretty much what you would expect: Cell phones (52%), the Internet (44%), gossip (37%), and email (31%).
Then there are the, um, more surprising things that bosses have found someone doing instead of actually working, including:
Taking a sponge bath in the restroom sink
Searching online for a mail-order bride
Hiding in a bathroom stall to play a video game on a smartphone
Sabotaging another employee's car tires
Trying to hypnotize other employees to help them quit smoking
Writing negative posts about the company on social media
Sleeping on the CEO's couch
Searching Google images for "cute kittens"
Building a model airplane
Visiting a tanning booth instead of making deliveries
Flying drones around the office
Printing pictures of animals, naming them after coworkers, and hanging them on the walls around the work area
Then there was our personal favorite: "Drinking vodka while watching Netflix."
What if you're one of those people (you know who you are) who just can't resist a little unauthorized R&R now and then? It might help, says CareerBuilder human resources chief Rosemary Haefner, to "schedule 'play breaks.’ Give yourself permission to take a break, and set a definite ending time. Not only will you have something to look forward to, but you'll also know when it's time to get back to work."
Wall Street stock futures are lower this morning as investor sentiment wanes amid bad signs from Greece and fears about the U.S. economic recovery.
Today’s must-read story is from Fortune‘s Matthew Ingram and it takes a hard look at whether Rupert Murdoch’s son, James Murdoch, is ready to take over 21st Century Fox with his father reportedly stepping down as CEO.
Here’s what else you need to know today.
1. Greek drama
Shares in some of Greece's biggest banks are down sharply on the Athens Stock Exchange following a new blow to the nation's debt negotiations. On Thursday, officials from the International Monetary Fund (IMF) pulled out of talks with Greek politicians in Brussels due to "major differences." Greece on Friday said the move was designed to put pressure on both Athens and its European creditors. In a signal that it had not softened its stance in the talks, a Greek government official also said Athens would not cross its “red lines” as it looked to intensify political negotiations for an agreement. Time is fast running out for Greece to reach a deal with its EU and IMF lenders and avert a default at the end of June that could see it tumbling out of the euro zone.
2. Net Neutrality
The new open Internet rules the FCC passed in February go into effect today after a federal appeals court yesterday denied a request from the telecom industry to suspend their implementation. Industry leaders like AT&T T, Comcast CMCSA, and Verizon VZ were among those claiming that the FCC overstepped its reach with the net neutrality rules, which ban Internet providers from blocking certain websites or allowing companies to pay for faster content delivery.
3. May PPI
Today, the Labor Department will release the Producer Price Index for the month of May. The index, which measures changes in the prices businesses receive for their goods and services, is expected to have increased by 0.4% last month after falling by that same amount in April.
The online “dramedy” returns for a third season on Netflix NFLX starting today. The series, which follows an ensemble cast of female prison inmates, is one of Netflix’s most popular pieces of original content, winning three Emmy Awards last year. Netflix has been busy bolstering its portfolio of original content in recent years as the online streaming site battles more traditional entertainment outlets for television and film viewers. The company’s latest content coup is a deal to produce a film starring Brad Pitt, announced earlier this week.
That’s according to a press release today from Marriott Hotels MAR about its new deal with Netflix NFLX. As part of the partnership, guests at (select) Marriott hotels can access their Netflix accounts directly from their in-room televisions. If they don’t already have Netflix, they will also be able to subscribe to the service from their room.
TechCrunch reported back in January that Marriott was considering offering Netflix, Hulu and Pandora P in its rooms -- now it has rolled out one of those services, and the rest may not come at all: as Fast Company reports today, Marriott tested several TV streaming services, including Hulu and YouTube, and found that the “significant majority” of guests chose Netflix.
Netflix is already available in the rooms of six Marriott hotels around the U.S., including one in Manhattan. The service will launch in six more hotels this summer, and will expand to 100 by the end of the year, according to the company. Netflix will be available in “nearly all” Marriott hotels by the end of 2016, the company said.
The Netflix deal is a move to keep up with the cord-cutting times and offer guests something more modern than the traditional high-fee movies on their in-room TV sets.
Interestingly, the company chose to name-drop in its announcement these three Netflix shows: Orange is the New Black, House of Cards, and Marvel’s Daredevil.
Separately, Netflix on Tuesday approved a big increase in the number of shares the company is authorized to issue -- the first step toward a possible stock split. At the company’s annual meeting, Chief Executive Reed Hastings said the management will seek approval from the board of directors to pursue a stock split, Reuters reported.
|
the g'th term of 6987, 13979, 20969, 27957, 34943, 41927, 48909?
-g**2 + 6995*g - 7
What is the o'th term of -2441, -9810, -22107, -39332?
-2464*o**2 + 23*o
What is the g'th term of -635760, -635762, -635764, -635766?
-2*g - 635758
What is the n'th term of -11818, -23705, -35592, -47479, -59366?
-11887*n + 69
What is the r'th term of 41293, 41312, 41329, 41344, 41357, 41368, 41377?
-r**2 + 22*r + 41272
What is the u'th term of -5549, -11101, -16653?
-5552*u + 3
What is the d'th term of -44633, -44637, -44643, -44651?
-d**2 - d - 44631
What is the g'th term of 332, 1340, 3018, 5354, 8336, 11952, 16190?
-2*g**3 + 347*g**2 - 19*g + 6
What is the j'th term of 7741, 15492, 23243, 30994, 38745, 46496?
7751*j - 10
What is the m'th term of -188, -762, -1716, -3050, -4764?
-190*m**2 - 4*m + 6
What is the h'th term of -6765, -6770, -6775, -6780?
-5*h - 6760
What is the t'th term of -1619, -3248, -4913, -6632, -8423, -10304?
-3*t**3 - 1608*t - 8
What is the b'th term of 294, 400, 510, 624?
2*b**2 + 100*b + 192
What is the v'th term of 132, 513, 1140, 2013?
123*v**2 + 12*v - 3
What is the u'th term of -613668, -613669, -613670, -613671, -613672?
-u - 613667
What is the s'th term of -29, -36, -51, -74, -105, -144, -191?
-4*s**2 + 5*s - 30
What is the k'th term of 2483, 4938, 7393, 9848, 12303?
2455*k + 28
What is the i'th term of 2479, 2505, 2539, 2581?
4*i**2 + 14*i + 2461
What is the h'th term of 80593, 80597, 80605, 80617?
2*h**2 - 2*h + 80593
What is the o'th term of -4232, -4235, -4238, -4241, -4244?
-3*o - 4229
What is the j'th term of -2399, -1823, -1247, -671?
576*j - 2975
What is the v'th term of -62, -201, -342, -485, -630, -777, -926?
-v**2 - 136*v + 75
What is the q'th term of -22033, -44068, -66103, -88138, -110173?
-22035*q + 2
What is the l'th term of 127, 102, 51, -32, -153?
-l**3 - 7*l**2 + 3*l + 132
What is the n'th term of -725, -701, -657, -593, -509, -405, -281?
10*n**2 - 6*n - 729
What is the w'th term of -83102, -83105, -83108?
-3*w - 83099
What is the a'th term of -122, -1329, -4624, -11051, -21654, -37477, -59564?
-174*a**3 + 11*a + 41
What is the y'th term of -30085, -30079, -30073?
6*y - 30091
What is the d'th term of -4694, -9393, -14092?
-4699*d + 5
What is the x'th term of -23783, -23784, -23785, -23786?
-x - 23782
What is the h'th term of -7, 12, 13, -22, -111?
-3*h**3 + 9*h**2 + 13*h - 26
What is the r'th term of 10713, 10703, 10693, 10683?
-10*r + 10723
What is the b'th term of -7309, -14580, -21851, -29122?
-7271*b - 38
What is the c'th term of 32172, 64344, 96516?
32172*c
What is the a'th term of 744, 6012, 20314, 48168, 94092, 162604, 258222, 385464?
753*a**3 - a**2 - 8
What is the b'th term of -844, -895, -152, 1379, 3692, 6781, 10640, 15263?
-b**3 + 403*b**2 - 1253*b + 7
What is the m'th term of 384, 706, 1016, 1308, 1576, 1814, 2016?
-m**3 + 329*m + 56
What is the z'th term of -290, -382, -536, -752, -1030?
-31*z**2 + z - 260
What is the m'th term of -50, -343, -1052, -2357, -4438, -7475, -11648, -17137?
-30*m**3 - 28*m**2 + m + 7
What is the y'th term of -15809, -31629, -47445, -63257, -79065?
2*y**2 - 15826*y + 15
What is the g'th term of 1027, 1362, 1697, 2032, 2367, 2702?
335*g + 692
What is the k'th term of -384, -361, -338?
23*k - 407
What is the k'th term of 4506, 4517, 4528?
11*k + 4495
What is the o'th term of -108, -134, -148, -156, -164, -178?
-o**3 + 12*o**2 - 55*o - 64
What is the d'th term of -7604, -7603, -7618, -7661, -7744, -7879, -8078, -8353?
-2*d**3 + 4*d**2 + 3*d - 7609
What is the g'th term of -3960, -7922, -11884, -15846, -19808?
-3962*g + 2
What is the z'th term of 711, 1056, 1401, 1746, 2091?
345*z + 366
What is the w'th term of -153866, -307852, -461824, -615776, -769702, -923596?
w**3 + w**2 - 153996*w + 128
What is the m'th term of 105, 864, 2953, 7038, 13785, 23860, 37929?
111*m**3 - m**2 - 15*m + 10
What is the c'th term of -668094, -668095, -668096, -668097, -668098, -668099?
-c - 668093
What is the l'th term of 13818, 27644, 41476, 55314, 69158?
3*l**2 + 13817*l - 2
What is the f'th term of 46169, 92355, 138565, 184811, 231105, 277459, 323885?
2*f**3 + 46172*f - 5
What is the q'th term of -315, -436, -571, -720, -883, -1060?
-7*q**2 - 100*q - 208
What is the f'th term of 214, 229, 282, 391, 574, 849?
3*f**3 + f**2 - 9*f + 219
What is the f'th term of 91, 374, 829, 1450, 2231, 3166, 4249, 5474?
-f**3 + 92*f**2 + 14*f - 14
What is the l'th term of -309105, -309100, -309093, -309084?
l**2 + 2*l - 309108
What is the x'th term of 1462, 2910, 4358, 5806, 7254?
1448*x + 14
What is the k'th term of 559, 794, 1005, 1180, 1307, 1374?
-2*k**3 + 249*k + 312
What is the d'th term of -10731, -42916, -96563, -171678, -268267, -386336?
-d**3 - 10725*d**2 - 3*d - 2
What is the w'th term of 4509, 4477, 4445?
-32*w + 4541
What is the k'th term of 29, 312, 1087, 2600, 5097, 8824, 14027, 20952?
41*k**3 - 4*k - 8
What is the f'th term of -22932, -45880, -68828, -91776?
-22948*f + 16
What is the j'th term of 55, 79, 131, 223, 367?
2*j**3 + 2*j**2 + 4*j + 47
What is the m'th term of -753, 584, 1921?
1337*m - 2090
What is the a'th term of -269, -1299, -3011, -5399, -8457, -12179, -16559?
a**3 - 347*a**2 + 4*a + 73
What is the l'th term of 1120, 991, 842, 673?
-10*l**2 - 99*l + 1229
What is the h'th term of 3297, 13177, 29631, 52647, 82213, 118317, 160947?
-2*h**3 + 3299*h**2 - 3*h + 3
What is the b'th term of -9100, -36350, -81754, -145306, -227000?
b**3 - 9083*b**2 - 8*b - 10
What is the n'th term of -49573, -99140, -148709, -198280?
-n**2 - 49564*n - 8
What is the i'th term of -77, -185, -233, -113, 283?
18*i**3 - 78*i**2 - 17
What is the l'th term of -389, -133, 125, 385, 647, 911, 1177?
l**2 + 253*l - 643
What is the s'th term of 410989, 411029, 411089, 411163, 411245?
-s**3 + 16*s**2 - s + 410975
What is the c'th term of 4256, 3267, 2278, 1289, 300, -689?
-989*c + 5245
What is the r'th term of 62042, 124083, 186124, 248165, 310206, 372247?
62041*r + 1
What is the z'th term of -48, -37, -16, 15?
5*z**2 - 4*z - 49
What is the d'th term of 28163, 28152, 28127, 28082, 28011, 27908, 27767, 27582?
-d**3 - d**2 - d + 28166
What is the v'th term of 1014, 1995, 2958, 3903, 4830, 5739, 6630?
-9*v**2 + 1008*v + 15
What is the w'th term of -1133, -490, 153, 796, 1439?
643*w - 1776
What is the q'th term of 233, 110, -21, -160?
-4*q**2 - 111*q + 348
What is the l'th term of -185, -359, -499, -587, -605, -535, -359?
3*l**3 - l**2 - 192*l + 5
What is the y'th term of -256, -429, -600, -763, -912, -1041, -1144?
y**3 - 5*y**2 - 165*y - 87
What is the a'th term of 164, 233, 396, 695, 1172, 1869, 2828, 4091?
7*a**3 + 5*a**2 + 5*a + 147
What is the x'th term of -1098294, -1098292, -1098288, -1098282, -1098274?
x**2 - x - 1098294
What is the t'th term of -43, -239, -715, -1609, -3059, -5203, -8179?
-23*t**3 - 2*t**2 - 29*t + 11
What is the j'th term of -1984, -3995, -6038, -8113, -10220, -12359?
-16*j**2 - 1963*j - 5
What is the h'th term of -29621, -29609, -29579, -29525, -29441, -29321, -29159?
h**3 + 3*h**2 - 4*h - 29621
What is the b'th term of -100223, -100230, -100243, -100262, -100287?
-3*b**2 + 2*b - 100222
What is the b'th term of -343, -342, -337, -328?
2*b**2 - 5*b - 340
What is the z'th term of -164, -253, -332, -401?
5*z**2 - 104*z - 65
What is the r'th term of -1751, -1787, -1823, -1859?
-36*r - 1715
What is the a'th term of -1472, -1485, -1506, -1535?
-4*a**2 - a - 1467
What is the x'th term of -153293, -306593, -459893, -613193?
-153300*x + 7
What is the q'th term of 307170, 307186, 307212, 307254, 307318, 307410?
q**3 - q**2 + 12*q + 307158
What is the s'th term of 472, 21, -430, -881, -1332?
-451*s + 923
What is the b'th term of 325682, 325687, 325692, 325697?
5*b + 325677
What is the j'th term of 9558, 19126, 28716, 38334, 47986?
j**3 + 5*j**2 + 9546*j + 6
What is the m'th term of 909, 7989, 27211, 64647, 126369, 218449?
1012*m**3 - m**2 - m - 101
What is the c'th term of -117, -389, -837, -1473, -2309, -3357, -4629, -6137?
-2*c**3 - 76*c**2 - 30*c - 9
What is the j'th term of -6016, -6014, -6012, -6010, -6008, -6006?
2*j - 6018
What is the f'th term of -990, -1977, -2980, -3999?
-8*f**2 - 963*f - 19
What is the d'th term of 101550, 101577, 101604, 101631?
27*d + 101523
What is the d'th term of 19570, 1
|
Here you are. It’s 2017. Almost every business has a website. The ones that do not probably should. The cost has come down over the years and functionality has improved. Having a website was once like having an online brochure. Today it’s like having a 2nd...
Over the years Google has proven itself very good at presenting users with content they’re looking for. Gone are the days of adapting our search queries to “what we think Google will think we mean”. Thanks to advances in machine learning web...
We spend a lot of our time working with small business owners nationwide. We get to work on a wide variety of projects ranging from auto detailing one-man shows to seasonal candy shops. You’ve guessed it; this post will talk about the latter! When Heather first...
WordPress is by far the most popular content management system (CMS) in the world. According to the latest statistics, WordPress is used by over 75 million websites in the world (more than 25% of all websites). (1) This CMS is easy to use, doesn’t’ require HTML...
It’s that time of the year again. Everyone is trying to predict what will happen over the next 12 months. From technology trends to customer taste, every business owner is looking for the edge that will make their business better and stronger in 2017. Let’s start by...
If you haven’t heard about the Snapchat Spectacles, it’s probably just a matter of time. When Snapchat launched its first piece of hardware earlier this month, it did in a unique way. It created scarcity by initially making little inventory available (the...
After all the bad rep that Amazon has gotten over the years in regards to the way it treats its employees, I was surprised to read that it would offer 30-hour work weeks to its employees. The eCommerce giant promises to provide employees who take advantage of the...
Much has happened in the world of tech over the past week. In fact “last week” is comprised of 11 days since I decided to publish on Tuesdays moving forward. Starting next week I will focus on one important news per week. Uber: Class-action lawsuit no longer settled...
This is the first post that I’m writing as part of our “Elevate Your Business” series. I’ve have been reading my fair share of “advice” on LinkedIn and various professional publications. While a good portion of the content I have seen is valuable, I also come across...
1,500 flights cancelled by Delta Airlines Delta Airlines made the headlines on Monday (July 8, 2016) after it cancelled 1,500 flights over technical issues. A power outage at the company’s Atlanta operations centre took down the airline’s reservation system. By...
|
More Sports:
Week 1 non-Eagles rooting guide
Sunday will be one of two times this season that Eagles fans will learn what it's like to have to root for Eli Manning.
In past seasons, Philadelphia Eagles fans generally rooted for their own team, and kept an eye on the rest of the NFC East. Ever since they won their first Super Bowl, and now that they are consistently contenders to represent the NFC in the Super Bowl, it's perhaps worth keeping tabs on the conference, as opposed to just the division.
And so, each week we'll lay out a rooting guide for non-Eagles games on the NFL schedule, and yes, I'm aware that most of the below is obvious.
• Giants at Cowboys: The Cowboys are the biggest threat to the Eagles in the NFC East, and obviously, the Eagles have owned the Giants over the last decade or so. A Giants win would be a very favorable outcome for Philly.
• Rams at Panthers: Clearly, the better outcome is if the Super Bowl contending Rams are dealt a loss.
• Texans at Saints: Obviously, anytime an AFC team is facing an NFC team, the AFC team winning is the better option. In this case, the Saints are a likely obstacle for the Eagles if they are going to make it back to the Super Bowl.
• Bengals at Seahawks: See AFC-NFC explanation above. The Seahawks are fringe contenders.
• Falcons at Vikings: It's debatable which of these two teams is better. I'll go with the Vikings, so I say with no conviction whatsoever that it's maybe better if the Falcons win this one.
• Lions at Cardinals: In terms of which team has a better chance of eking into the playoffs instead of some other more talented team, I would give the nod in this case to the Lions, so maybe it's better if they put a win in the books? But really, this is a near-irrelevant game to the Eagles.
• 49ers at Buccaneers: See Lions-Cardinals explanation above.
• Ravens at Dolphins: With Washington (and to a lesser extent, in my view, the Giants) likely to contend for a top five draft pick, the more games the tanking Dolphins lose, the better. While neither the Giants nor the Washington team necessarily need to draft another quarterback immediately after taking one each in the 2019 NFL Draft, a No. 1 overall pick could be worth an extreme draft pick bounty to a team that needs one, you know, like the Dolphins. It's better for the Eagles if a few QB-needy AFC teams land the top draft spots.
• Bills at Jets: It doesn't matter which team wins this game, but it's interesting to keep an eye on, as the Eagles play each of these teams somewhat early in the season.
|
XD! I get to request the picture too, T0T oh man...!, owww -thinks- draw a side on view (this is gunna be angst) where kai has his arm against tyson's neck, forheads touching, pinning him againt the kitchen fridge(has a fetish for tyka kitchen love) tyson is grinning back into his eyes, as if to say 'what can you do' kais other hand holding tysons *cough*, obviouly tysons pants need to be round his legs....ahhh the smex...i'm getting aroused...and you can take it from there before i get goo on my keyboard
*Starts sketching the idea* 'arm' against his neck? Hand? Kinda like strangling? We talking forarm or upper arm? We want hands pinned against the fridge or pinned down to my wishing? *sketches madly, placing pants around his thighs, cuz Kio thinks it's so much sexier than at his ankles* -obsessed-
I mean like, how to explain, the underside of kais arm, not his hand, like his actual arm, the space between his hand and elbow...fails to explain....ill draw you a diagram..if you still dont get it lol...you can do what you wish, Im just the Photoshoper!
Yeah! that's what i meant, no not quit choking...as hot as that wud be....ANGST *_*
Here have some angsty inspiration;;
(In the kitchen)
...
"What the heck is wrong with you Kai, why are you always like this, you always say 'whatever' and 'hmff' whats your problem dude" Tyson grumbled, both his eyebrows indenting inwards.
Kai darted forward, smashing his forearm into tyson's neck, he voilently glared into tyson's chestnut eye's as he gave a sideways smile "so now your gunna kill me? Real smart!..." tyson beemed, as if somehow he knew toying with him would get some reaction.
Kai kept his arm roughly weighing against tysons neck as he groped his hips, his manly hands sliding up his snail trail and along his biceps, each little touch and tickle tormented tyson, but he tried so hard not to let kai know how much satisfaction he was actually feeling "What's this Kai, trying to make he hot, your not doing a very good job"
Kai paused for a moment
"SHUT THE FUCK UP" He shouted, removing his arm and smashing his fists into the wall, he quickly held tyson's body, stripping his shirt away he bit tysons VERY errect nipples..Tyson bit his lip, quickly closing his eyes, before re operning them..."You want a fucking good job, I'm gunna make you beg for me to stop when I'm breaking you, and making you scream! He finished. A look in his eyes of almost evil...It wasn't evil, it was a passion, to make love to his rival in the most cruel Delicious way!
I could go on.... but i'll let your imagine take you there!hehe...man im aroused again =_=;;;
*talking to self* I see Yuki wants this done. She just gave me fic scene. I better make this good. Very angsty angry Kai... Manga style goes best when's he's angry... he's so much angrier in the manga. Takao, how am I gonna make this look right... I've been challenged. Gotta get it right! Hand on hip? Should a do the biting? No, just the exchange of expressions...oya! *sketches madly again*
Oh shit, i did it again...-talks to self- lol...I'm very excited to see this *_* I can't wait to get my mittens on ur artwork, must colour your angst!
AH! OMG! The color, the sparkle, the swirly pwetty color! IT'S AMAZING! I almost didn't even think it was mine! XD Can you color all my pics?! Ahaha, just kiddin... XP wouldn't want to over-work ya! *keeps looking at it* Sparkle spots are something I have never attempted or even think of when I'm coloring... and the little shades of different skin tones in some places too! O.o That is crazy! We just made something Supercalafragilisticexpialadociously good!
AH! OMG! The color, the sparkle, the swirly pwetty color! IT'S AMAZING! I almost didn't even think it was mine! XD Can you color all my pics?! Ahaha, just kiddin... XP wouldn't want to over-work ya! *keeps looking at it* Sparkle spots are something I have never attempted or even think of when I'm coloring... and the little shades of different skin tones in some places too! O.o That is crazy! We just made something Supercalafragilisticexpialadociously good!
Thank god it's okay, i was really worried you wasn't gunna like it...I got really annoyed with uploading it, cause it cam up in shite quality on my laptop, i spent the whole day thinking what if u see it and its in this crap quality, i was freaking out, didn't want you to think i had ruined your lovley art when it was the qualilty's fault!!!! then i used my friends computer and the quality was okay, which was a relive...well it looked okay on da anywho...not sure about it on here...It keeped looking ridiculously blurry on my laptop...i don't think my laptop cant handle the shinnyness!!! -kicks it- i dunno, go see it on da, does it look any shinnier or it it just my laptop...? Weird...Anyway the important thing is ya liked it -big grin- It was fun!!!! I'll be happy to collab with you whenever...i havn't got much else to do! Well i do, but like i can make the time for if its collabs! >.<
AH! OMG! The color, the sparkle, the swirly pwetty color! IT'S AMAZING! I almost didn't even think it was mine! XD Can you color all my pics?! Ahaha, just kiddin... XP wouldn't want to over-work ya! *keeps looking at it* Sparkle spots are something I have never attempted or even think of when I'm coloring... and the little shades of different skin tones in some places too! O.o That is crazy! We just made something Supercalafragilisticexpialadociously good!
Thank god it's okay, i was really worried you wasn't gunna like it...I got really annoyed with uploading it, cause it cam up in shite quality on my laptop, i spent the whole day thinking what if u see it and its in this crap quality, i was freaking out, didn't want you to think i had ruined your lovley art when it was the qualilty's fault!!!! then i used my friends computer and the quality was okay, which was a relive...well it looked okay on da anywho...not sure about it on here...It keeped looking ridiculously blurry on my laptop...i don't think my laptop cant handle the shinnyness!!! -kicks it- i dunno, go see it on da, does it look any shinnier or it it just my laptop...? Weird...Anyway the important thing is ya liked it -big grin- It was fun!!!! I'll be happy to collab with you whenever...i havn't got much else to do! Well i do, but like i can make the time for if its collabs! >.<
|
Optiboot_flash build output for atmega168pb
https://github.com/MCUdude/optiboot_flash
Build date and time: 18.02.2019 00:11
Compiler: avr-gcc 5.4.0
F_CPU: UART NUMBER: LED PIN: LED FLASHES: DESIRED BAUD: ACTUAL BAUD: ERROR: COMPILED SIZE: OUTPUT FILE:
24000000L UART0 B5 2 1000000 1000000 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_1000000_24000000L.hex
24000000L UART0 B5 2 500000 500000 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_500000_24000000L.hex
24000000L UART0 B5 2 250000 250000 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_250000_24000000L.hex
24000000L UART0 B5 2 230400 230769 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_230400_24000000L.hex
24000000L UART0 B5 2 115200 115384 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_115200_24000000L.hex
24000000L UART0 B5 2 57600 57692 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_57600_24000000L.hex
24000000L UART0 B5 2 38400 38461 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_38400_24000000L.hex
24000000L UART0 B5 2 19200 19230 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_19200_24000000L.hex
20000000L UART0 B5 2 500000 500000 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_500000_20000000L.hex
20000000L UART0 B5 2 250000 250000 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_250000_20000000L.hex
20000000L UART0 B5 2 115200 113636 -1.3% 460 bytes optiboot_flash_atmega168pb_UART0_115200_20000000L.hex
20000000L UART0 B5 2 19200 19230 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_19200_20000000L.hex
18432000L UART0 B5 2 230400 230400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_230400_18432000L.hex
18432000L UART0 B5 2 115200 115200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_115200_18432000L.hex
18432000L UART0 B5 2 57600 57600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_57600_18432000L.hex
18432000L UART0 B5 2 38400 38400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_38400_18432000L.hex
18432000L UART0 B5 2 19200 19200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_19200_18432000L.hex
18432000L UART0 B5 2 9600 9600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_9600_18432000L.hex
16000000L UART0 B5 2 1000000 1000000 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_1000000_16000000L.hex
16000000L UART0 B5 2 500000 500000 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_500000_16000000L.hex
16000000L UART0 B5 2 250000 250000 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_250000_16000000L.hex
16000000L UART0 B5 2 115200 117647 2.1% 460 bytes optiboot_flash_atmega168pb_UART0_115200_16000000L.hex
16000000L UART0 B5 2 38400 38461 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_38400_16000000L.hex
16000000L UART0 B5 2 19200 19230 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_19200_16000000L.hex
16000000L UART0 B5 2 9600 9615 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_9600_16000000L.hex
14745600L UART0 B5 2 230400 230400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_230400_14745600L.hex
14745600L UART0 B5 2 115200 115200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_115200_14745600L.hex
14745600L UART0 B5 2 57600 57600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_57600_14745600L.hex
14745600L UART0 B5 2 38400 38400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_38400_14745600L.hex
14745600L UART0 B5 2 19200 19200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_19200_14745600L.hex
14745600L UART0 B5 2 9600 9600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_9600_14745600L.hex
12000000L UART0 B5 2 500000 500000 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_500000_12000000L.hex
12000000L UART0 B5 2 250000 250000 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_250000_12000000L.hex
12000000L UART0 B5 2 57600 57692 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_57600_12000000L.hex
12000000L UART0 B5 2 19200 19230 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_19200_12000000L.hex
12000000L UART0 B5 2 9600 9615 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_9600_12000000L.hex
11059200L UART0 B5 2 230400 230400 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_230400_11059200L.hex
11059200L UART0 B5 2 115200 115200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_115200_11059200L.hex
11059200L UART0 B5 2 57600 57600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_57600_11059200L.hex
11059200L UART0 B5 2 38400 38400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_38400_11059200L.hex
11059200L UART0 B5 2 19200 19200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_19200_11059200L.hex
11059200L UART0 B5 2 9600 9600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_9600_11059200L.hex
8000000L UART0 B5 2 1000000 1000000 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_1000000_8000000L.hex
8000000L UART0 B5 2 500000 500000 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_500000_8000000L.hex
8000000L UART0 B5 2 250000 250000 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_250000_8000000L.hex
8000000L UART0 B5 2 115200 111111 -3.5% 460 bytes optiboot_flash_atmega168pb_UART0_115200_8000000L.hex
8000000L UART0 B5 2 57600 58823 2.1% 460 bytes optiboot_flash_atmega168pb_UART0_57600_8000000L.hex
8000000L UART0 B5 2 38400 38461 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_38400_8000000L.hex
8000000L UART0 B5 2 19200 19230 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_19200_8000000L.hex
8000000L UART0 B5 2 9600 9615 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_9600_8000000L.hex
7372800L UART0 B5 2 230400 230400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_230400_7372800L.hex
7372800L UART0 B5 2 115200 115200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_115200_7372800L.hex
7372800L UART0 B5 2 57600 57600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_57600_7372800L.hex
7372800L UART0 B5 2 38400 38400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_38400_7372800L.hex
7372800L UART0 B5 2 19200 19200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_19200_7372800L.hex
7372800L UART0 B5 2 9600 9600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_9600_7372800L.hex
4000000L UART0 B5 2 500000 500000 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_500000_4000000L.hex
4000000L UART0 B5 2 250000 250000 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_250000_4000000L.hex
4000000L UART0 B5 2 19200 19230 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_19200_4000000L.hex
4000000L UART0 B5 2 9600 9615 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_9600_4000000L.hex
3686400L UART0 B5 2 230400 230400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_230400_3686400L.hex
3686400L UART0 B5 2 115200 115200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_115200_3686400L.hex
3686400L UART0 B5 2 57600 57600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_57600_3686400L.hex
3686400L UART0 B5 2 38400 38400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_38400_3686400L.hex
3686400L UART0 B5 2 19200 19200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_19200_3686400L.hex
3686400L UART0 B5 2 9600 9600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_9600_3686400L.hex
2000000L UART0 B5 2 250000 250000 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_250000_2000000L.hex
2000000L UART0 B5 2 19200 19230 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_19200_2000000L.hex
2000000L UART0 B5 2 9600 9615 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_9600_2000000L.hex
1843200L UART0 B5 2 230400 230400 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_230400_1843200L.hex
1843200L UART0 B5 2 115200 115200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_115200_1843200L.hex
1843200L UART0 B5 2 57600 57600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_57600_1843200L.hex
1843200L UART0 B5 2 38400 38400 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_38400_1843200L.hex
1843200L UART0 B5 2 19200 19200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_19200_1843200L.hex
1843200L UART0 B5 2 9600 9600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_9600_1843200L.hex
1000000L UART0 B5 2 9600 9615 0.1% 460 bytes optiboot_flash_atmega168pb_UART0_9600_1000000L.hex
Optiboot_flash build output for atmega168pb
https://github.com/MCUdude/optiboot_flash
Build date and time: 18.05.2019 20:27
Compiler: avr-gcc 5.4.0
F_CPU: UART NUMBER: LED PIN: LED FLASHES: EEPROM SUPPORT: FLASH PG COPY: DESIRED BAUD: ACTUAL BAUD: ERROR: COMPILED SIZE: OUTPUT FILE:
18432000L UART0 B5 2 No No 460800 460800 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_460800_18432000L.hex
14745600L UART0 B5 2 No No 460800 460800 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_460800_14745600L.hex
11059200L UART0 B5 2 No No 460800 460800 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_460800_11059200L.hex
7372800L UART0 B5 2 No No 460800 460800 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_460800_7372800L.hex
3686400L UART0 B5 2 No No 460800 460800 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_460800_3686400L.hex
Optiboot_flash build output for atmega168pb
https://github.com/MCUdude/optiboot_flash
Build date and time: 03.08.2019 01:05
Compiler: avr-gcc 5.4.0
F_CPU: UART NUMBER: LED PIN: LED FLASHES: EEPROM SUPPORT: FLASH PG COPY: DESIRED BAUD: ACTUAL BAUD: ERROR: COMPILED SIZE: OUTPUT FILE:
22118400L UART0 B5 2 No No 460800 460800 0.0% 458 bytes optiboot_flash_atmega168pb_UART0_460800_22118400L.hex
22118400L UART0 B5 2 No No 230400 230400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_230400_22118400L.hex
22118400L UART0 B5 2 No No 115200 115200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_115200_22118400L.hex
22118400L UART0 B5 2 No No 57600 57600 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_57600_22118400L.hex
22118400L UART0 B5 2 No No 38400 38400 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_38400_22118400L.hex
22118400L UART0 B5 2 No No 19200 19200 0.0% 460 bytes optiboot_flash_atmega168pb_UART0_19200_22118400L.hex
Optiboot_flash build output for atmega168pb
https://github.com/MCUdude/optiboot_flash
Build date and time: 04.11.2019 19:45
Compiler: avr-gcc 7.3.0
F_CPU: UART NUMBER: LED PIN: LED FLASHES: EEPROM SUPPORT: FLASH PG COPY: DESIRED BAUD: ACTUAL BAUD: ERROR: COMPILED SIZE: OUTPUT FILE:
24000000L UART0 B5 2 No No 1000000 1000000 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_1000000_24000000L_B5.hex
24000000L UART0 B5 2 No No 500000 500000 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_500000_24000000L_B5.hex
24000000L UART0 B5 2 No No 250000 250000 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_250000_24000000L_B5.hex
24000000L UART0 B5 2 No No 230400 230769 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_230400_24000000L_B5.hex
24000000L UART0 B5 2 No No 115200 115384 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_115200_24000000L_B5.hex
24000000L UART0 B5 2 No No 57600 57692 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_57600_24000000L_B5.hex
24000000L UART0 B5 2 No No 38400 38461 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_38400_24000000L_B5.hex
24000000L UART0 B5 2 No No 19200 19230 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_19200_24000000L_B5.hex
22118400L UART0 B5 2 No No 460800 460800 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_460800_22118400L_B5.hex
22118400L UART0 B5 2 No No 230400 230400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_230400_22118400L_B5.hex
22118400L UART0 B5 2 No No 115200 115200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_115200_22118400L_B5.hex
22118400L UART0 B5 2 No No 57600 57600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_57600_22118400L_B5.hex
22118400L UART0 B5 2 No No 38400 38400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_38400_22118400L_B5.hex
22118400L UART0 B5 2 No No 19200 19200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_19200_22118400L_B5.hex
20000000L UART0 B5 2 No No 500000 500000 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_500000_20000000L_B5.hex
20000000L UART0 B5 2 No No 250000 250000 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_250000_20000000L_B5.hex
20000000L UART0 B5 2 No No 115200 113636 -1.3% 474 bytes optiboot_flash_atmega168pb_UART0_115200_20000000L_B5.hex
20000000L UART0 B5 2 No No 19200 19230 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_19200_20000000L_B5.hex
18432000L UART0 B5 2 No No 460800 460800 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_460800_18432000L_B5.hex
18432000L UART0 B5 2 No No 230400 230400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_230400_18432000L_B5.hex
18432000L UART0 B5 2 No No 115200 115200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_115200_18432000L_B5.hex
18432000L UART0 B5 2 No No 57600 57600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_57600_18432000L_B5.hex
18432000L UART0 B5 2 No No 38400 38400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_38400_18432000L_B5.hex
18432000L UART0 B5 2 No No 19200 19200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_19200_18432000L_B5.hex
18432000L UART0 B5 2 No No 9600 9600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_9600_18432000L_B5.hex
16000000L UART0 B5 2 No No 1000000 1000000 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_1000000_16000000L_B5.hex
16000000L UART0 B5 2 No No 500000 500000 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_500000_16000000L_B5.hex
16000000L UART0 B5 2 No No 250000 250000 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_250000_16000000L_B5.hex
16000000L UART0 B5 2 No No 115200 117647 2.1% 474 bytes optiboot_flash_atmega168pb_UART0_115200_16000000L_B5.hex
16000000L UART0 B5 2 No No 38400 38461 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_38400_16000000L_B5.hex
16000000L UART0 B5 2 No No 19200 19230 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_19200_16000000L_B5.hex
16000000L UART0 B5 2 No No 9600 9615 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_9600_16000000L_B5.hex
14745600L UART0 B5 2 No No 460800 460800 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_460800_14745600L_B5.hex
14745600L UART0 B5 2 No No 230400 230400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_230400_14745600L_B5.hex
14745600L UART0 B5 2 No No 115200 115200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_115200_14745600L_B5.hex
14745600L UART0 B5 2 No No 57600 57600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_57600_14745600L_B5.hex
14745600L UART0 B5 2 No No 38400 38400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_38400_14745600L_B5.hex
14745600L UART0 B5 2 No No 19200 19200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_19200_14745600L_B5.hex
14745600L UART0 B5 2 No No 9600 9600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_9600_14745600L_B5.hex
12000000L UART0 B5 2 No No 500000 500000 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_500000_12000000L_B5.hex
12000000L UART0 B5 2 No No 250000 250000 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_250000_12000000L_B5.hex
12000000L UART0 B5 2 No No 57600 57692 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_57600_12000000L_B5.hex
12000000L UART0 B5 2 No No 19200 19230 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_19200_12000000L_B5.hex
12000000L UART0 B5 2 No No 9600 9615 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_9600_12000000L_B5.hex
11059200L UART0 B5 2 No No 460800 460800 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_460800_11059200L_B5.hex
11059200L UART0 B5 2 No No 230400 230400 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_230400_11059200L_B5.hex
11059200L UART0 B5 2 No No 115200 115200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_115200_11059200L_B5.hex
11059200L UART0 B5 2 No No 57600 57600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_57600_11059200L_B5.hex
11059200L UART0 B5 2 No No 38400 38400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_38400_11059200L_B5.hex
11059200L UART0 B5 2 No No 19200 19200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_19200_11059200L_B5.hex
11059200L UART0 B5 2 No No 9600 9600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_9600_11059200L_B5.hex
8000000L UART0 B5 2 No No 1000000 1000000 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_1000000_8000000L_B5.hex
8000000L UART0 B5 2 No No 500000 500000 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_500000_8000000L_B5.hex
8000000L UART0 B5 2 No No 250000 250000 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_250000_8000000L_B5.hex
8000000L UART0 B5 2 No No 115200 111111 -3.5% 474 bytes optiboot_flash_atmega168pb_UART0_115200_8000000L_B5.hex
8000000L UART0 B5 2 No No 57600 58823 2.1% 474 bytes optiboot_flash_atmega168pb_UART0_57600_8000000L_B5.hex
8000000L UART0 B5 2 No No 38400 38461 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_38400_8000000L_B5.hex
8000000L UART0 B5 2 No No 19200 19230 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_19200_8000000L_B5.hex
8000000L UART0 B5 2 No No 9600 9615 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_9600_8000000L_B5.hex
7372800L UART0 B5 2 No No 460800 460800 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_460800_7372800L_B5.hex
7372800L UART0 B5 2 No No 230400 230400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_230400_7372800L_B5.hex
7372800L UART0 B5 2 No No 115200 115200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_115200_7372800L_B5.hex
7372800L UART0 B5 2 No No 57600 57600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_57600_7372800L_B5.hex
7372800L UART0 B5 2 No No 38400 38400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_38400_7372800L_B5.hex
7372800L UART0 B5 2 No No 19200 19200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_19200_7372800L_B5.hex
7372800L UART0 B5 2 No No 9600 9600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_9600_7372800L_B5.hex
4000000L UART0 B5 2 No No 500000 500000 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_500000_4000000L_B5.hex
4000000L UART0 B5 2 No No 250000 250000 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_250000_4000000L_B5.hex
4000000L UART0 B5 2 No No 19200 19230 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_19200_4000000L_B5.hex
4000000L UART0 B5 2 No No 9600 9615 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_9600_4000000L_B5.hex
3686400L UART0 B5 2 No No 460800 460800 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_460800_3686400L_B5.hex
3686400L UART0 B5 2 No No 230400 230400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_230400_3686400L_B5.hex
3686400L UART0 B5 2 No No 115200 115200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_115200_3686400L_B5.hex
3686400L UART0 B5 2 No No 57600 57600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_57600_3686400L_B5.hex
3686400L UART0 B5 2 No No 38400 38400 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_38400_3686400L_B5.hex
3686400L UART0 B5 2 No No 19200 19200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_19200_3686400L_B5.hex
3686400L UART0 B5 2 No No 9600 9600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_9600_3686400L_B5.hex
2000000L UART0 B5 2 No No 250000 250000 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_250000_2000000L_B5.hex
2000000L UART0 B5 2 No No 19200 19230 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_19200_2000000L_B5.hex
2000000L UART0 B5 2 No No 9600 9615 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_9600_2000000L_B5.hex
1843200L UART0 B5 2 No No 230400 230400 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_230400_1843200L_B5.hex
1843200L UART0 B5 2 No No 115200 115200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_115200_1843200L_B5.hex
1843200L UART0 B5 2 No No 57600 57600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_57600_1843200L_B5.hex
1843200L UART0 B5 2 No No 38400 38400 0.0% 472 bytes optiboot_flash_atmega168pb_UART0_38400_1843200L_B5.hex
1843200L UART0 B5 2 No No 19200 19200 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_19200_1843200L_B5.hex
1843200L UART0 B5 2 No No 9600 9600 0.0% 474 bytes optiboot_flash_atmega168pb_UART0_9600_1843200L_B5.hex
1000000L UART0 B5 2 No No 9600 9615 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_9600_1000000L_B5.hex
Optiboot_flash build output for atmega168pb
https://github.com/MCUdude/optiboot_flash
Build date and time: 09.11.2019 21:25
Compiler: avr-gcc 7.3.0
F_CPU: UART NUMBER: LED PIN: LED FLASHES: EEPROM SUPPORT: FLASH PG COPY: DESIRED BAUD: ACTUAL BAUD: ERROR: COMPILED SIZE: OUTPUT FILE:
12000000L UART0 B5 2 No No 115200 115384 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_115200_12000000L_B5.hex
Optiboot_flash build output for atmega168pb
https://github.com/MCUdude/optiboot_flash
Build date and time: 11.04.2020 15:39
Compiler: avr-gcc 7.3.0
F_CPU: UART NUMBER: LED PIN: LED FLASHES: EEPROM SUPPORT: FLASH PG COPY: DESIRED BAUD: ACTUAL BAUD: ERROR: COMPILED SIZE: OUTPUT FILE:
24000000L UART0 B5 2 No No 1000000 1000000 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_1000000_24000000L_B5.hex
24000000L UART0 B5 2 No No 500000 500000 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_500000_24000000L_B5.hex
24000000L UART0 B5 2 No No 250000 250000 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_250000_24000000L_B5.hex
24000000L UART0 B5 2 No No 230400 230769 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_230400_24000000L_B5.hex
24000000L UART0 B5 2 No No 115200 115384 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_115200_24000000L_B5.hex
24000000L UART0 B5 2 No No 57600 57692 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_57600_24000000L_B5.hex
24000000L UART0 B5 2 No No 38400 38461 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_38400_24000000L_B5.hex
24000000L UART0 B5 2 No No 19200 19230 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_19200_24000000L_B5.hex
22118400L UART0 B5 2 No No 460800 460800 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_460800_22118400L_B5.hex
22118400L UART0 B5 2 No No 230400 230400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_230400_22118400L_B5.hex
22118400L UART0 B5 2 No No 115200 115200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_115200_22118400L_B5.hex
22118400L UART0 B5 2 No No 57600 57600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_57600_22118400L_B5.hex
22118400L UART0 B5 2 No No 38400 38400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_38400_22118400L_B5.hex
22118400L UART0 B5 2 No No 19200 19200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_19200_22118400L_B5.hex
20000000L UART0 B5 2 No No 500000 500000 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_500000_20000000L_B5.hex
20000000L UART0 B5 2 No No 250000 250000 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_250000_20000000L_B5.hex
20000000L UART0 B5 2 No No 115200 113636 -1.3% 484 bytes optiboot_flash_atmega168pb_UART0_115200_20000000L_B5.hex
20000000L UART0 B5 2 No No 19200 19230 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_19200_20000000L_B5.hex
18432000L UART0 B5 2 No No 460800 460800 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_460800_18432000L_B5.hex
18432000L UART0 B5 2 No No 230400 230400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_230400_18432000L_B5.hex
18432000L UART0 B5 2 No No 115200 115200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_115200_18432000L_B5.hex
18432000L UART0 B5 2 No No 57600 57600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_57600_18432000L_B5.hex
18432000L UART0 B5 2 No No 38400 38400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_38400_18432000L_B5.hex
18432000L UART0 B5 2 No No 19200 19200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_19200_18432000L_B5.hex
18432000L UART0 B5 2 No No 9600 9600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_9600_18432000L_B5.hex
16000000L UART0 B5 2 No No 1000000 1000000 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_1000000_16000000L_B5.hex
16000000L UART0 B5 2 No No 500000 500000 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_500000_16000000L_B5.hex
16000000L UART0 B5 2 No No 250000 250000 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_250000_16000000L_B5.hex
16000000L UART0 B5 2 No No 115200 117647 2.1% 484 bytes optiboot_flash_atmega168pb_UART0_115200_16000000L_B5.hex
16000000L UART0 B5 2 No No 38400 38461 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_38400_16000000L_B5.hex
16000000L UART0 B5 2 No No 19200 19230 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_19200_16000000L_B5.hex
16000000L UART0 B5 2 No No 9600 9615 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_9600_16000000L_B5.hex
14745600L UART0 B5 2 No No 460800 460800 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_460800_14745600L_B5.hex
14745600L UART0 B5 2 No No 230400 230400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_230400_14745600L_B5.hex
14745600L UART0 B5 2 No No 115200 115200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_115200_14745600L_B5.hex
14745600L UART0 B5 2 No No 57600 57600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_57600_14745600L_B5.hex
14745600L UART0 B5 2 No No 38400 38400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_38400_14745600L_B5.hex
14745600L UART0 B5 2 No No 19200 19200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_19200_14745600L_B5.hex
14745600L UART0 B5 2 No No 9600 9600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_9600_14745600L_B5.hex
12000000L UART0 B5 2 No No 500000 500000 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_500000_12000000L_B5.hex
12000000L UART0 B5 2 No No 250000 250000 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_250000_12000000L_B5.hex
12000000L UART0 B5 2 No No 115200 115384 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_115200_12000000L_B5.hex
12000000L UART0 B5 2 No No 57600 57692 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_57600_12000000L_B5.hex
12000000L UART0 B5 2 No No 19200 19230 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_19200_12000000L_B5.hex
12000000L UART0 B5 2 No No 9600 9615 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_9600_12000000L_B5.hex
11059200L UART0 B5 2 No No 460800 460800 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_460800_11059200L_B5.hex
11059200L UART0 B5 2 No No 230400 230400 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_230400_11059200L_B5.hex
11059200L UART0 B5 2 No No 115200 115200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_115200_11059200L_B5.hex
11059200L UART0 B5 2 No No 57600 57600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_57600_11059200L_B5.hex
11059200L UART0 B5 2 No No 38400 38400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_38400_11059200L_B5.hex
11059200L UART0 B5 2 No No 19200 19200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_19200_11059200L_B5.hex
11059200L UART0 B5 2 No No 9600 9600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_9600_11059200L_B5.hex
8000000L UART0 B5 2 No No 1000000 1000000 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_1000000_8000000L_B5.hex
8000000L UART0 B5 2 No No 500000 500000 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_500000_8000000L_B5.hex
8000000L UART0 B5 2 No No 250000 250000 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_250000_8000000L_B5.hex
8000000L UART0 B5 2 No No 115200 111111 -3.5% 484 bytes optiboot_flash_atmega168pb_UART0_115200_8000000L_B5.hex
8000000L UART0 B5 2 No No 57600 58823 2.1% 484 bytes optiboot_flash_atmega168pb_UART0_57600_8000000L_B5.hex
8000000L UART0 B5 2 No No 38400 38461 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_38400_8000000L_B5.hex
8000000L UART0 B5 2 No No 19200 19230 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_19200_8000000L_B5.hex
8000000L UART0 B5 2 No No 9600 9615 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_9600_8000000L_B5.hex
7372800L UART0 B5 2 No No 460800 460800 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_460800_7372800L_B5.hex
7372800L UART0 B5 2 No No 230400 230400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_230400_7372800L_B5.hex
7372800L UART0 B5 2 No No 115200 115200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_115200_7372800L_B5.hex
7372800L UART0 B5 2 No No 57600 57600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_57600_7372800L_B5.hex
7372800L UART0 B5 2 No No 38400 38400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_38400_7372800L_B5.hex
7372800L UART0 B5 2 No No 19200 19200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_19200_7372800L_B5.hex
7372800L UART0 B5 2 No No 9600 9600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_9600_7372800L_B5.hex
4000000L UART0 B5 2 No No 500000 500000 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_500000_4000000L_B5.hex
4000000L UART0 B5 2 No No 250000 250000 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_250000_4000000L_B5.hex
4000000L UART0 B5 2 No No 19200 19230 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_19200_4000000L_B5.hex
4000000L UART0 B5 2 No No 9600 9615 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_9600_4000000L_B5.hex
3686400L UART0 B5 2 No No 460800 460800 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_460800_3686400L_B5.hex
3686400L UART0 B5 2 No No 230400 230400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_230400_3686400L_B5.hex
3686400L UART0 B5 2 No No 115200 115200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_115200_3686400L_B5.hex
3686400L UART0 B5 2 No No 57600 57600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_57600_3686400L_B5.hex
3686400L UART0 B5 2 No No 38400 38400 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_38400_3686400L_B5.hex
3686400L UART0 B5 2 No No 19200 19200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_19200_3686400L_B5.hex
3686400L UART0 B5 2 No No 9600 9600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_9600_3686400L_B5.hex
2000000L UART0 B5 2 No No 250000 250000 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_250000_2000000L_B5.hex
2000000L UART0 B5 2 No No 19200 19230 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_19200_2000000L_B5.hex
2000000L UART0 B5 2 No No 9600 9615 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_9600_2000000L_B5.hex
1843200L UART0 B5 2 No No 230400 230400 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_230400_1843200L_B5.hex
1843200L UART0 B5 2 No No 115200 115200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_115200_1843200L_B5.hex
1843200L UART0 B5 2 No No 57600 57600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_57600_1843200L_B5.hex
1843200L UART0 B5 2 No No 38400 38400 0.0% 482 bytes optiboot_flash_atmega168pb_UART0_38400_1843200L_B5.hex
1843200L UART0 B5 2 No No 19200 19200 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_19200_1843200L_B5.hex
1843200L UART0 B5 2 No No 9600 9600 0.0% 484 bytes optiboot_flash_atmega168pb_UART0_9600_1843200L_B5.hex
1000000L UART0 B5 2 No No 9600 9615 0.1% 484 bytes optiboot_flash_atmega168pb_UART0_9600_1000000L_B5.hex
Optiboot_flash build output for atmega168pb
https://github.com/MCUdude/optiboot_flash
Build date and time: 27.05.2020 07:53
Compiler: avr-gcc 7.3.0
F_CPU: UART NUMBER: LED PIN: LED FLASHES: EEPROM SUPPORT: FLASH PG COPY: DESIRED BAUD: ACTUAL BAUD: ERROR: COMPILED SIZE: OUTPUT FILE:
1000000L UART0 B5 2 No No 9600 9615 0.1% 474 bytes optiboot_flash_atmega168pb_UART0_9600_1000000L_B5.hex
|
Cherry Blossom Season in Retrospect
At the end of March and beginning of April, the cherry blossoms began to bloom, ushering in warmer weather and a festive attitude amongst the Japanese people. I was too preoccupied with school work to make any posts to the Temple Abroad blog–I needed to start several final projects simultaneously. However, I still want to share my experience of cherry blossom season in Japan.
During cherry blossom season, delicate pink and white flowers bloom from the numerous cherry trees in Japan. The season ends when the flowers fall from the trees, to be replaced with budding green leaves. Tourists and native Japanese alike flock to parks and gardens to take pictures of the short-lived blooms, called sakura. Many people also set up picnics or parties to watch the cherry blossoms, called hanami.
I was lucky enough to go on several hanami outings. Some were sponsored by Temple University, while others were personal trips I took with friends. However, cherry blossom trees are so common in Japan, every trip outside felt like a mini hanami session. Hanami trees lined major streets and were planted in every park. There was one directly outside the TUJ dorms and three directly behind main campus in Azabu.
The cherry blossom trees in Hama Rikyu Gardens
The first flower viewing I went to was a field trip for one of my art classes. We went to Hama Rikyu Gardens, a series of gardens belonging to the Japanese government which initially served as the grounds for a wealthy feudal lord. The garden was crowded with other hopeful flower viewers. One fully blooming cherry tree was quickly surrounded by twenty or so people, all trying to take a picture of its sakura. My friend and I joined in the chaos and took some nice photos, although it was difficult to work around the many other people crowding around.
Picture of myself with cherry blossoms and several other people in the background
Though I thoroughly enjoyed Hama Rikyu Gardens, my personal favorite hanami experience happened at night, near the end of the season. I was meeting up with a friend who went to a nearby school. We ate dinner together at a bar and then casually strolled through Ueno Park after evening fell. The cherry blossoms were difficult to see and impossible to take pictures of in the dark, but I could still see their flowering branches stretching overhead, covering our path in a flowery canopy. Strings of lanterns illuminated small patches of white blossoms and the numerous picnics taking place underneath. Business men and groups of friends laughed and cracked open bottles of alcohol. Polite signs asked picnic-goers to throw away their trash, and the atmosphere was fun and lighthearted. My friend and I walked past the rows of picnics and food stands, passing by a large lake. Through the cherry blossom branches we could make out the bright city lights from across the water. I thought the view might have looked better during the daytime but in the nighttime, a serene atmosphere settled over our surroundings.
The sakura season ended after two weeks. I remember going to school during finals week and feeling a twinge of disappointment upon seeing the pink petals replaced by tiny green leaves. The cherry blossoms lasted such a short time, but I still have some excellent memories and photos from the experience.
Advertisements
Share this:
Like this:
Related
About sarahwongtakesjapan
Hello, my name is Sarah Wong. I'm a Media Studies major and Art minor at Scripps College in Claremont, California. Though I attend Scripps College, I have decided to study abroad for a semester through the Temple University Japan program. I spend most of my spare time editing photos, making graphics, and drawing; partially for fun and partially because I hope it will prepare me for a career in graphic design. I love hanging out with my friends, eating Asian food, and watching cartoons (especially anime). I'm hoping to meet new friends, eat new kinds of food, and watch new television programs during my time in Japan! 行きましょう!(Let's go!)
Links
About
The official blog about studying abroad at Temple University, Japan Campus
This blog is written by American students spending a semester or year studying abroad at Temple University’s campus in Tokyo, Japan. This blog and its content are administered by Temple University Education Abroad and Overseas Campuses.
|
Local Blogs
About this blog: The Raucous Caucus shares the southpaw perspectives of this Boomer on the state of the nation, the world, and, sometimes, other stuff. I enjoy crafting it to keep current, and occasionally to rant on some issue I care about deeply... (More)
About this blog: The Raucous Caucus shares the southpaw perspectives of this Boomer on the state of the nation, the world, and, sometimes, other stuff. I enjoy crafting it to keep current, and occasionally to rant on some issue I care about deeply. My long, strange career trip has included law and management jobs in two Fortune 50 companies, before founding the legal search and staffing firm Cushing Group, Recruiters. I've lectured on negotiation and settlement strategy, and teach graduate courses at Golden Gate University (Adjunct of the Year for a doctoral seminar on business, law and society). Illinois, Texas and California (Inactive) admitted me to law practice; I hold JD and MBA degrees from the University of Illinois, and a BGS from the University of Michigan, with Distinction. There -- Go Blue! Personally, my daughters are a lawyer in NY, and a pre-med student in NM - their lives-and-times often animate these columns. I'm active in animal advocacy matters, having led a citizen team that took Alameda's city animal shelter to a non-profit operation - we saved $600K annually and the lives of some 700 companion animals/year vs. the City's best alternative. I'm delighted with that success. My family has re-homed 144 foster animals over many years; we host four boisterous border collies of our own. Mostly for humane movement efforts, I was nominated for GQ magazine's 2009 Better Men, Better World Award. You may notice that many of my rants relate to critter issues. In addition to the Raucous Caucus blog, I frequently contribute to The BARK magazine, and am a proud Moderator emeritus on the popular news and humor website www.Fark.com. I prefer scotch over imported beer (Hide)
‘Much Ado’ or is it Adios for ObamaCare?
Uploaded: Jul 23, 2014
My grandfather, the Accountant, had little use for law or lawyers. In his orderly view of the world (and quite apart from his dismay about the romantic attachments of one Mr. Justice Douglas), the whole legal process was inefficient: The Law was out there in immutable absolute principles. Thus, you shouldn't need a baseball team of judges to find it; one really good Justice ought to be a sufficient law giver.
The problem, of course, is that law is not science in the way that a brick dropped on your foot will never defy the Law of Gravity. Rather, it is political philosophy: thus, reasonable minds may differ as to its proper coverage and emphases in governing the affairs of people. In other words, law is human, and subject to the same philosophical influences that place us each on a political spectrum from Left to Right. And its processes are messy, as reflected in the famous 'laws and sausages' metaphor.
That's why an odd number of appellate judges > 1 is required, Gramps, and why the positioning of the fifth-vote out of nine Supremes is most important.
The Affordable Care Act/ObamaCare approach to health care is a product of the legislative schnitzel factory. It represents compromise, first crafted by the conservative Heritage Foundation in the 1990s, as an alternative to a so-called single-payor system of universal coverage popular elsewhere in the First World.
Introduced as an early stab at bi-partisanship, it immediately morph'd into the Worst Thing Ever in some circles, and passed with nary a GOP vote. It has been battered and altered by a barrage of legal challenges, bedeviled by scurrilous campaigns of disinformation, and confounded by delay and its own early mismanagement. Despite all that, enrollments are now brisk, the coverage-age distribution satisfactory and folks are paying their premiums. It is getting on with the hard work of improving health and relieving suffering.
Not that the batterings have ceased. The GOP House majority continues to shake an impotent fist (there's pharmaceutical coverage for that, I'm told) by voting to repeal the law on a roughly weekly basis when they're in session (despite having no time to reform immigration, but that's another column). And here come two lawsuits, birthed by the libertarian Cato Institute, that seek to invalidate the work of the federal government's much-maligned website: healthcare.gov.
At issue are the ACA's subsidies to insureds earning less than a threshold income. As drafted, the subsidies go to individuals who purchase their health insurance through "exchanges run by the state." Not included was a further clause "or the federal government-sponsored exchange," which is accessed by the feds' website. Some states have established their own exchanges (Covered CA, for instance), but a majority have not relying instead on the federal version. Indeed, more individuals have accessed coverage via the federal site than all the state sites, combined.
The lawsuits, both of which failed at trial, allege that the absence of specific federal exchange language in that single provision of a 2,000-page bill is fatal to the provision of all those federal exchange-accessed subsidies, which are the defining element of the legislation.
As you've probably read, yesterday two federal intermediate appeals courts came to simultaneous, diametrically opposed conclusions on the subject. It would shock my granddad to know that they split along the partisan divide: two GOP-appointed judges in DC overruled their trial judge (with one Dem dissent), while the all-Dem 4th Circuit panel in Richmond unanimously upheld the lower court in allowing the federal exchange subsidies. The DC Court did its work "with reluctance," which is what judges often write when they know they're out on a flimsy limb, and suspect they'll be reversed -- but they just can't help themselves.
Who has the better argument? Well, with the caveat that where you come-out has a Lot to do with where you came-in on the political spectrum, I think the ayes have it. The subsidies are the central, even defining characteristic of ObamaCare they are what does the most to expand the coverage it provides. To argue that the federal exchange was to be consciously excluded from their provision strains logic. There is no reference to such intent anywhere in the reams of the so-called legislative history papers that preceded the bill's passage. Reading and interpreting the bill as a whole, and in light of its evident purpose, it seems clear that there was no intent to exclude the largest exchange from the primary purpose of the Act.
The contrary arguments are that the federal exchange was left out specifically to incentivize the states to form their own exchanges, and that it's not the courts' job to repair legislation. The former would make a better case if there was anything in the history, or subsequent implementation that remotely reflects such an incentive system. Surely, those incentives would have been front-and-center in the activation process.
As to the latter argument, there are interpretive rules that point both ways, leaving the judges ample rope on which to hang a conclusion, or themselves from that philosophical limb.
Where do we go from here? Tactically, the feds have promised to seek so-called "en banc" rehearing of the case, meaning that it would be argued before All the DC Circuit judges. The Richmond plaintiffs will probably seek immediate Supreme Court review. It seems likely that the DC Circuit will vote to hear the case en banc a majority of them are Dem appointees, which also suggests the ultimate outcome of that review (sorry, Grandpa).
It's also likely that the Supremes will defer handling any appeal until both Circuits have finally opined. Whether one case or the other will ultimately be heard at the highest level is unclear. There are two primary reasons for them to decide the issue either it is socially very important to rule on the subject, or there's a conflict between/among the intermediate circuits that needs to be resolved, so that there is one rule across the land.
Here, delay favors the proponents of the law. There may not even Be a final Circuit conflict, and the more institutionally ingrained the ACA becomes, the more difficult to unscramble the egg, and the better it may be perceived to duck the issue, or defer to Congress.
My grandfather would not be pleased by this unruly state of human affairs, but at least he couldn't have blamed Justice Douglas this time.
Posted by Formerly Dan from BC,
a resident of Bridle Creek,
on Jul 23, 2014 at 4:54 pmFormerly Dan from BC is a registered user.
Tom,
You posit: "To argue that the federal exchange was to be consciously excluded from their provision strains LOGIC."
It doesn't strain logic and I'll tell you why in one simple quote from the person responsible for pushing this badly written law: "But we have to pass the bill so you can find out what is in it, away from the fog of the controversy."
Nancy Pelosi, former SOTH.
Obviously our - supposed - betters in congress just simply didn't know what they were voting for. But to say this strains logics? Nope, don't buy it at all.
And the language in the law is unambiguous: exchanges shall be set up "by the states". The problem is that 34 states did not want to set up exchanges. The Executive, in an attempt to increase the subsidies, then created federal exchanges, without any authority to do so and completely usurping congressional authority.
Again, unambiguous
And you badly mischaracterized the DC circuits "reluctance" quote. They were not reluctant to rule because of perceived failure at the supreme court level, they were reluctant because "...our ruling will likely have significant consequences both for the millions of individuals receiving tax credits through federal exchanges and for health insurance market more broadly."
Posted by American,
a resident of Danville,
on Jul 23, 2014 at 5:27 pm
This is exactly why in 23 years of practice, I always insist on a jury trial, rather than a court trial by a political appointee who more likely than not bases their decision on their political parties view of the issue rather than precedent and jurisprudence. Governor Brown appointing to the California Supreme Court today a person with far left political views who never was even a Judge Pro Tem or Superior Court Judge anywhere, is an embarassment to our legal system. Even a gifted ball player must start in AAA before the majors, just like a Supreme Court judge should have to be a judge somewhere for a while.
Posted by San Ramon Observer,
a resident of San Ramon,
on Jul 23, 2014 at 9:44 pmSan Ramon Observer is a registered user.
Obamacare is a mess. Obama tried so hard to please Republicans that he wound up pleasing nobody. Why didn't he just extend Medicare to everyone? It works and there are supplemental policies that can be purchased for a reasonable price to cover what Medicare doesn't. That's an effective combination of Government healthcare and private insurance that works. Ask anyone over 65 if they would give up their Medicare for Obamacare. I wouldn't.
Posted by Peter Kluget,
a resident of Danville,
on Jul 24, 2014 at 7:55 am
It's good to have someone like Formerly Dan around to keep us all current with whatever disinformation is being fed to the foot soldiers of the right wing. I'm sure he doesn't make this stuff up; someone must be distributing it to him and his like-minded Foxbots.
"The Executive, in an attempt to increase the subsidies, then created federal exchanges, without any authority to do so and completely usurping congressional authority."
Uh, no. The option of using a federally-operated exchange, partially or entirely, was always available for the states which didn't set up their own exchanges. It's part of the law as enacted by Congress. There's no significant difference between how state and federally-run exchanges work unless a state decides to opt for a waiver to run a different system which meets the goals of the ACA by somewhat different means (Vermont is reportedly working on a single-payer system.)
That's what makes the Republican judge's ruling so tenuous. If there was an intent to essentially gut a basic feature of the law in states with federally operated exchanges you'd expect that intent to be stated clearly, or for some reason for the disparate treatment to be evident. It isn't. If the word "in" had been used instead of "by" the issue disappears. The language they are hanging their hats on is the kind of imprecise drafting that appears in virtually all laws, legislated or voted into effect, and is routinely addressed just like this is being addressed.
This situation is not unique, or even uncommon. It only becomes a big deal when there is an ideological desire to bash the legislation at every turn.
Posted by Formerly Dan from BC,
a resident of Bridle Creek,
on Jul 24, 2014 at 8:50 amFormerly Dan from BC is a registered user.
"If there was an intent to essentially gut a basic feature of the law in states with federally operated exchanges you'd expect that intent to be stated clearly, or for some reason for the disparate treatment to be evident."
Ok please quote the feature of the law that describes Fed exchanges. I'll wait.
Posted by Peter Kluget,
a resident of Danville,
on Jul 24, 2014 at 9:25 am
Section 1321 (c) of the ACA provides that in any state which fails to establish an exchange "the Secretary [i.e., the federal government]... shall establish and operate such Exchange within the state." That is "exactly" where in the law it was written. Don't take my word for it - or the word of any of the hundreds of articles and explanations written about the ACA when it was passed and afterwards - look it up.
There is no indication anywhere in the law that those exchanges are supposed to be governed by different standards than the exchanges set up by states.
Posted by Conservator,
a resident of Danville,
on Jul 24, 2014 at 9:51 am
Dan, Respectfully, do you live to refute every written word and thought that Tom publishes? Frankly, it's your right but surely it must get quite numbing to carry-on with such a self-inflicted burden. Just my opinion but life is simply too short for perpetual debates without really changing hearts and minds of the regular antagonists.
I haven't reviewed the specifics from the most recent independent rulings but I would suspect that subsection 'c', as follows, has got to be at the heart of where this is being battled.
Source: Web Link [This bill was enacted after being signed by the President on March 23, 2010. The text of the bill below is as of Aug 25, 2010 (Passed Congress/Enrolled Bill).]
PART IIISTATE FLEXIBILITY RELATING TO
EXCHANGES / SEC. 1321. STATE FLEXIBILITY IN OPERATION AND ENFORCEMENT OF
EXCHANGES AND RELATED REQUIREMENTS.
...
(c) FAILURE TO ESTABLISH EXCHANGE OR IMPLEMENT REQUIREMENTS.
(1) IN GENERAL.If
(A) a State is not an electing State under subsection
(b); or
(B) the Secretary determines, on or before January
1, 2013, that an electing State
(i) will not have any required Exchange operational
by January 1, 2014; or
(ii) has not taken the actions the Secretary determines
necessary to implement
(I) the other requirements set forth in the
standards under subsection (a); or
(II) the requirements set forth in subtitles A
and C and the amendments made by such subtitles;
the Secretary shall (directly or through agreement with a notfor-
profit entity) establish and operate such Exchange within
the State and the Secretary shall take such actions as are
necessary to implement such other requirements.
(2) ENFORCEMENT AUTHORITY.The provisions of section
2736(b) of the Public Health Services Act shall apply to the
enforcement under paragraph (1) of requirements of subsection
(a)(1) (without regard to any limitation on the application of
those provisions to group health plans).
Posted by Tom Cushing,
a resident of another community,
on Jul 24, 2014 at 10:33 am
Nuke: Gratuitous Nancy-slam aside, ho-hum, there is ambiguity in the language of our land, and it finds its way into the law -- hence there have ALways been 'Rules of Construction' to guide the courts in divining what the legislative branch intended. Here's a nice wikipedia reference to get you started: Web Link Technical corrections are fairly routine, and before the Age of the Radical Recalcitrants, they were unremarkable. Frankly, I'd have expected a little more tolerance of such linguistic frailties from a guy whose posts are so chronically loaded with language flaws.
Michael: I'm trying to understand the significance of what you wrote about the JFK quip. If it was serious, you are aware, aren't you that he practiced law for 10 years with DOJ and as a committee counsel, prior to his appointment as AG? He Was young; that said, he was a bolder Justice chief than many others, before, since and currently. He pushed against the institutional evils of the day -- Organized Crime, union racketeering and segregation among them. Contrast Holder's timid coddling of the banksters.
Roz: I think he knew that a single payor plan couldn't pass, as it didn't when Hillary went down in flames for it in the '90s. That's too bad, in my view, but politics is the art of the possible. Even the ACA was only barely possible.
That said -- it's working reasonably well, despite all the cynical disinformation. As somebody once said: never have so few folks worked so hard to deny a life-saving benefit to so many. Best to keep eyes on the prize here -- it's real and fundamental, and it literally saves lives.
Peter: yup. It was once suggested that you are me -- to which I responded "thank you."
The key issue in these cases is whether people who buy health insurance on the Federal Exchange are entitled to a tax credit. The ACA added a new section to Internal Revenue Code, Section 36B, which clearly spells out what you have to do to get that healthcare tax credit. It says tax credits are available only to people who purchase insurance on an "Exchange established by the State." It doesn't say you get a tax credit if you purchase a tax credit on the Federal Exchange. The DC circuit concluded that if you buy insurance on an exchange established by the Feds or a private company or any other insurance exchange, then you haven't met the requirements detailed in Sec. 36B, thus you don't get the tax credit.
I love the simplicity of that argument. It's like any other tax credit. If you don't meet the requirement set forth in the tax code, then you don't qualify for the credit.
The liberal justice who dissented in the DC Circuit case said that the tax credits were a key part of the ACA and that the government intended to grant tax credits to people who purchase insurance on the federal exchange. Unfortunately, that's not true. As the DC Court notes in their opinion, "the scant legislative history sheds little light on the precise question of the availability of subsidies on federal Exchanges." The court notes that the liberal dissenting judge "leans heavily on a more abstract form of legislative history Congress's broad purpose in passing the ACA and that it is "inconceivable" to think that Congress would have risked the ACA's "stability" by making subsidies conditional on states establishing Exchanges." Yet, as the court noted, that's exactly what the ACA enacts in federal territories, such as the Northern Mariana Islands. They don't get any subsidies there, yet they must buy insurance. The ACA also didn't provide insurance subsidies for the long-term care insurance program known as CLASS. Congress repealed the CLASS portion of the ACA in 2013.
The court's majority noted that the IRS is not permitted to adopt regulations overriding the tax code. The tax code is the law. The IRS is supposed to interpret the law, not re-write the law. The DC Circuit ruled that the IRS shouldn't give tax credits to people who don't meet the requirements of Sec. 36B of the tax code.
As the DC Circuit noted, the courts have ruled time and again that statues mean what they say. It's not a court's role to "correct" the text of a statute to better serve the statute's purposes. Courts can't add new clauses to a statute so that what was omitted by inadvertence may be included. It's up to Congress to go back and fix whatever they want fixed. The courts have no legal authority to re-write statutes.
On the other hand, the court should not follow the literal meaning of the statute when doing so would "render the statute nonsensical or superfluous or create an outcome so contrary to perceived social values that Congress could not have intended it." But there must be evidence that Congress meant something other than what it literally said before a court can depart from the plain meaning of a statute. The DC Circuit ruled that standard wasn't met due to "scant legislative history." The DC Circuit quoted the Supreme Court noting, "it frustrates rather than effectuates legislative intent simplistically to assume that whatever furthers the statute's primary objective must be the law."
The Fourth Circuit Court ruled the opposite way on this issue. They acknowledged that if the statute is clear and unambiguous, then that is the end of the matter for the court as well as the agency. The court and the IRS must give effect to the unambiguously expressed intent of Congress. A statute is ambiguous only if the disputed language is "reasonably susceptible of different interpretations."
The Court acknowledged that the language of Sec. 36B of the tax code is plain. Sec. 36B says to get a tax credit, you must purchase insurance established by the State. The word "State" is a defined term and the court acknowledges "State" does not include the Federal Government.
But here's how the Court gets around it. They note that Section 1311 of the ACA says, "…each State shall establish an… Exchange," and "such Exchange shall be a government agency or nonprofit entity that is established by the State." If a state doesn't establish an Exchange, then Section 1321 of the ACA says the Federal Government "shall establish and operate such Exchange."
The Court says that since Section 1311 defines "Exchange" as "an Exchange established by the State," then "it makes sense" to conclude that the Federal government is acting on behalf of the State when it forms an Exchange. In other words, an exchange established by the federal government is really an exchange established by the state, thus the taxpayers are allowed a tax credit under Sec. 36B. They ruled that since this was a plausible interpretation, they deferred to the IRS rules that allow tax credits.
It didn't "make sense" to the DC Circuit, of course. They ruled that the statute means what it says. There's no ambiguity. There's no language in there saying the Federal government is "acting on behalf of the state." Nothing in Sec. 1321 says federal exchanges are "Exchanges established by the State." This omission is particularly significant since Congress knew how to do that elsewhere in the ACA. In a nearby section, the ACA provides that a U.S. territory that elects to establish an Exchange "shall be treated as a State." The absence of similar language in Sec. 1321 suggests that even though the federal government may establish an Exchange within a state, it does not in fact stand in the state's shoes when doing so.
The Fourth Circuit court acknowledged this shortcoming, noting, "the court cannot ignore the common-sense appeal…a literal reading of the statute undoubtedly accords more closely with the position [that an Exchange established by the Federal Government is not an Exchange established by the State]."
Obama has packed the DC Circuit with extra Democrats, so if the case is reheard by the full bench of the DC Circuit no doubt they will rule in Obama's favor.
But Obama likely won't be able to squash all dissent. There's a good chance this issue will make it up to the Supreme Court eventually. It will be interesting to see how they decide this.
I think the Supreme Court's decision in UARG v. EPA is a good indicator that this portion of the ACA will get struck down. That case concerned the EPA's "Tailoring Rule" in which it "tailored" a statutory provision in the Clean Air Act. The majority opinion said:
"Were we to recognize the authority claimed by EPA in the Tailoring Rule, we would deal a severe blow to the Constitution's separation of powers… The power of executing laws … does not include a power to revise clear statutory terms that turn out not to work in practice."
Posted by San Ramon Observer,
a resident of San Ramon,
on Jul 24, 2014 at 4:05 pmSan Ramon Observer is a registered user.
Tom,
Obama made two big mistakes, and he took too long to realize these were big mistakes. One, he thought Republicans would cooperate with him and two, he didn't address the economic situation and the jobs situation fast enough or hardly at all. He spent too much time and effort on getting his medical plan passed.
You said, "Roz: I think he knew that a single payor plan couldn't pass, as it didn't when Hillary went down in flames for it in the '90s. That's too bad, in my view, but politics is the art of the possible. Even the ACA was only barely possible."
That was if he wanted a bi-partisan plan. When it was clear (and it was fairly early in his first term), that Republicans would not participate in any plan he proposed, he should have switched to a single-payer plan.
He's been criticized for barely getting ACA passed with a Democrat majority in the House and Senate. That's because it wasn't the plan Democrats wanted. When he saw that this could be passed only by the Democrat majority, he should have switched to a single-payer plan and dumped the 2200 pages of confusing legalese.
Also Hillary Clinton's plan was 20 years earlier. More voters might have been receptive to it after the nightmare, go-for-broke or die, medical stories in the news over the last 20 years.
Posted by Michael Austin,
a resident of Pleasanton Meadows,
on Jul 24, 2014 at 4:08 pm
Tom,
I posted the Jack Kennedy quote because when I read American post about unexperienced judges, I was reminded of it. Jack Kennedy came under fire for appointing his younger inexperienced brother to the AG job.
Robert Kennedy was hired by Senator McCarthy as minority counsel for the Senate Committee investigating domestic communism early 1950's. McCarthy was a close friend of Joseph Kennedy and visited the Kennedy compound often.
Passing Obamacare the way that it was has been horribly divisive for this country. Voters were so mad it cost the Democrats control of the House of Representatives. A big portion of the country is still furious about it. It passed by only one vote in the senate, warts and all, because Democrats knew that if they sent it back to Congress to try and fix its problems it would never pass. Not a single Republicans voted for it. Imagine if a slim majority of Republicans did the same thing with legislation that Democrats found repugnant. Democrats would be furious. It would divide the country. A slim majority should not force legislation on nearly half of America. This will continue to divide Americans for years.
Here's an idea, why not let each state decide what's best for its people? Why was it necessary for the Federal Government to step in and create a one-size-fits-all "solution" to America's healthcare crisis? Massachusetts and other states were already addressing the health insurance crisis in ways that were tailored to meet the needs of their constituents. California was working on its own healthcare plan and might have even eventually adopted a single payer system. America works best when states can experiment with different solutions to find out what works and what doesn't.
If the Supreme Court strikes down the tax credit provisions for the 36 states who refused to create state exchanges, I hope that Congress and the president can come together and craft a solution that works for everyone. For example, states who want to go along with Obamacare can establish an exchange if they haven't done so already. States who refuse would be allowed to create their own systems, whether it be an exchange, or a single payer system, or whatever the people want.
It's time to stop trying to micromanage our country of 300 million people with just 535 people in Washington DC. We need to return power to the states as the constitution originally intended.
Posted by Tom Cushing,
a resident of Alamo,
on Jul 24, 2014 at 6:05 pm
Roz: I don't think he had a Dem majority for single payor -- they lack the enviable? party discipline of the GOP. For my money, I also think he acted quickly on the economy, but did not do enough, or all the right things, and some of what he did was wrong. It was a big job.
S-P: great -- because I do not favor uber-expensive beer that ultimately has no pay-off. I prefer to have this, twice: Web Link
Posted by Formerly Dan from BC,
a resident of Bridle Creek,
on Jul 24, 2014 at 7:01 pmFormerly Dan from BC is a registered user.
PK - Stop being so disingenuous. The statute does not specify Federal Exchanges, which is the the heart of the case as argued by DC. Stop inserting language that doesn't exist.
Conservator - Thanks for posting the info. I find it kinda fun to debate and like the instant feedback. As to why I frequent Tom's little place, it's because he thinks opposite of me. Other than the A's, Tom and I disagree on everything, so its far more engaging and interesting to comment. And although he probably doesn't realize it, I actually like reading his blog. My only issue with Tom is he can dish out disparaging remarks but can't take it in return and will delete posts. He's thin-skinned, and when you prove him wrong he will delete the post or ignore the point and resort to the tried-and-true method of being a grammar nazi. Classic lefty boomer.
Posted by Peter Kluget,
a resident of Danville,
on Jul 25, 2014 at 5:06 am
On July 23 Formerly Dan wrote: "The Executive, in an attempt to increase the subsidies, then created federal exchanges, without any authority to do so and completely usurping congressional authority."
I responded that that assertion was wrong, that "The option of using a federally-operated exchange, partially or entirely, was always available for the states which didn't set up their own exchanges. It's part of the law as enacted by Congress".
Formerly Dan wrote: "'It's part of the law as enacted by Congress.' Perhaps you could point us to EXACTLY where in the law it was written?
I'll wait for your link or direct quotes."
I responded by citing section 1321 of the ACA as enacted by Congress and quoting the operative language. Conservator cut and pasted the entire section setting forth the directive that if a state fails to establish an exchange the Secretary (of the federal Dept. of Health and Human Services) "shall establish and operate such exchange." spcwt posted a reasoned analysis, including the comment that "If a state doesn't establish an Exchange, then Section 1321 of the ACA says the Federal Government 'shall establish and operate such Exchange.'"
Formerly Dan, sometimes I wonder if you are a parody of a right wing troll or a real person. I don't watch Bill Maher, but someone sent me a link to a bit he did where he noted that people who say "You're entitled to your own opinion but not your own facts" obviously have never watched Fox News.
Posted by Formerly Dan from BC,
a resident of Bridle Creek,
on Jul 25, 2014 at 7:17 amFormerly Dan from BC is a registered user.
PK,
A quote from Jonathan Gruber in 2012:
"What's important to remember politically about this is if you're a state and you don't set up an exchange, that means your citizens don't get their tax credits--but your citizens still pay the taxes that support this bill. So you're essentially saying [to] your citizens you're going to pay all the taxes to help all the other states in the country. I hope that that's a blatant enough political reality that states will get their act together and realize there are billions of dollars at stake here in setting up these exchanges. But, you know, once again the politics can get ugly around this."
Posted by Tom Cushing,
a resident of Alamo,
on Jul 25, 2014 at 7:33 am
Am: it looks like Frank Newman and current Justice Godwin Liu were not former judges, and several others appear in retrospect to have been Justices-in-Waiting at the Courts of Apps. If Mr. Cuellar is confirmed he'll be another. FWIW, his wife is Judge Lucy Koh, who is presiding over several of the most far-reaching trial court cases in the state.
Nuke: you appear to have difficulty with distinctions (hence the nickname, of course). For example, there's a difference between comments that go to themes in the content of your many postings (as above), and quite another to assume license to make status-based derogations of your host. That's a crucial distinction -- sort of like the difference between 'having a thin skin' and 'not suffering fools gladly.'
Now, if this comment sends you scurrying for support to 'prove me wrong,' two things will happen: you will demonstrate the above phenomenon, and you will have failed to learn anything. A third thing might also happen -- if you clutter-up what's an actual, interesting thread (a rare and precious commodity in itself) with such materials, I may have to delete it, again. Your choice.
As noted, Obama packed the DC circuit with Democrat judges so that when the full panel of DC Circuit judges hears the case, they'll overturn it and thus avoid a conflict among the appellate circuits so the Supreme Court wouldn't take the case.
The good news is, there doesn't have to be an appellate court conflict for the Supreme Court to hear the case. The losing lead litigator in the Fourth Circuit, Michael Carvin of Jones Day, can now petition the Supreme Court to hear his expedited appeal. If he does that, as expected, then all that is needed is four Supreme Court justices to hear the case and it will be heard.
I think there's a good chance Mr. Carvin will be able to scrounge up at least four conservative Supreme Court justices for this noble cause.
Posted by Tom Cushing,
a resident of Alamo,
on Jul 25, 2014 at 8:16 am
S-P: you fail to mention that EVery Chief Executive "packs" the courts with nominees who live in the same political neighborhood as they do. Bushes One and Two 'packed' the Supreme Court with conservatives Thomas, Alito, and Roberts, and Reagan appointed Scalia and swing vote Kennedy. All the reliable liberals were appointed by Mssrs Clinton and Obama (Breyer, Ginsburg, Sotomayor and Kagan). It's possibly the Prezs' most enduring legacy, when it works out -- indeed, Ike called nominating our own Chief Justice Earl Warren 'the biggest damn fool mistake' of his terms, as Warren morph'd into a liberal on the bench.
But I know you know all that -- are you really counting on readers not to know it, so that your pack language packs more wallop? I think the readership is smarter than that.
I really doubt that the current timid bunch of Supremes is eager to stir-up yet another health care hornet's nest if they can duck it, so no, the filing was predictable (mentioned in the blog, even), and the en banc review, if it happens, will buy them time and give them cover. Other issues wrack these nerves, but not this one.
So what if I failed to mention that every other President packs the court with political cronies? Whenever Obama does something outrageous, like spies on people, kills kids, or whatever, you liberals always say, "So what? Republicans do it too," as if that somehow justifies Obama's crimes. You sound like fighting children who say, "Well, he started it."
America's problem ain't Obama. It's people like you who support him and his criminal activities because, hey, you like his healthcare plan or whatever.
As for your point that the en banc review will buy Obama time. Ummm…no it won't Sherlock. Whatever the DC Circuit does is of no consequence at this point. All that matters is whether Michael Carvin can convince four members of the Supreme Court to hear his expedited appeal. If he succeeds, as is likely, then the tax credit / federal exchange issue will be heard by the Supreme Court.
That's just the rules of the game, homeboy.
You call the Supreme Court "timid." Did you not read the dissenting opinion in NFIB v. Sebelius? As you know, that's the case where the four liberal justices and that wussie Roberts ruled that the individual mandate was constitutional, cause it was a tax. Ok, fair enough. But the four dissenting justices Scalia and crew were livid. You think those guys don't want another bite at the apple? You're such a dreamer.
I think Scalia will convince the other three conservative justices to stand up to Obama. And when they take the case, I think liberals like you will actually need to read these cases and realize that your arguments blow.
I'm not saying that it's a slam dunk for Scalia. Roberts will likely look to weasel his way out of it. But who knows. Maybe Roberts will grow a pair and America can finally be rid of this Obamacare nightmare.
Posted by Tom Cushing,
a PleasantonWeekly.com blogger,
on Jul 25, 2014 at 12:01 pmTom Cushing is a registered user.
S-P: you went out of your way to mention court-packing in two different comments on the same thread. That suggests that you thought it might have meaning to somebody, even if it doesn't, really. The whole blog stands for the proposition that everybody does it -- you appeared to be indicating, twice, that it was Mr. Obama's exclusive province. And of course, everything after 'you liberals' is troll-worthy.
The IRS's Healthcare Tax Credit regulations are the product of politics, not sound law or legal research.
Obama cronies pressured IRS lawyers to have the IRS change the regulations to grant tax credits for health insurance bought on the federal exchange.
The IRS and Treasury lawyers' initial draft of the Sec. 36B regulations gave tax credits only to taxpayers who purchased insurance on "exchanges established by the state" and not to people who purchase insurance on federal exchanges.
In other words, these tax lawyers initially followed the Obamacare law as written. Obama officials at the Treasury Department and Health and Human Services got wind of it and instructed the IRS and Treasury lawyers to ignore the law's text and change the regulations so people got tax credits even on federal exchanges. This, despite the fact that the IRS is supposed to be insulated from political meddling.
The lawyers who wrote the regulations worried they were breaking the law, that they had no statutory authority to deem a federal exchange to be the equivalent of a state exchange. The IRS should've done basic legal analysis, their core duty as the agency in charge of tax law. Instead, they asked Obama appointees at HHS for a memo to cover their backsides. HHS lawyers obliged.
Posted by American,
a resident of Danville,
on Jul 25, 2014 at 7:50 pm
Tom, I have appeared in front of Judge Kohl, good judge, better qualified than her husband, but her husband came to US with his parents as illegal alien so Jerry Brown finds that more important for judicial appointments, far left political views than any judicial experience. Embarrassing!!
Posted by Tom Cushing,
a resident of Alamo,
on Jul 25, 2014 at 9:55 pm
Am: I've read a few different perspectives on nominee Cuellar's bio, and he's really quite impressive as a lawyer, scholar and policy wonk. I'm not sure what he did in your cornflakes, other than be a card-carrying liberal.
Are you sure you're not using 'lack of direct judicial experience' as a proxy for Leftie who could be around for the next 30 years?
Posted by American,
a resident of Danville,
on Jul 28, 2014 at 1:18 pm
Tom: I do not care if you are a Republican appointee or Democrat, it is wrong for a Governor to appoint someone to the state's highest bench, if they have never been a Judge anywhere before. It is also an insult to those Court of Appeals Judges and Superior Court Judges who have served with integrity and have a record to review their jurisprudence, to skip over all of them and appoint someone who has never served a single day as a Judge at any level. There are plenty of well qualified Democratic party Court of Appeal Judges and Superior Court Judges, he could have appointed to the California Supreme Court. But Governor Brown is trying to pull another Rose Bird out of his hat, with his current appointee, and the fact this new appointee came to the US as illegal alien with his parents is a political statement by Brown.
Tom, how many First Round draft picks never spend a day in AAA and immediately start in the majors? Don't you think it is important for someone to learn the ropes, get some experience, before they jump in at the highest level?
Tom, have you ever actually appeared in court in California as attorney of record for anyone? Even extremely gifted trial attorneys I knew, needed some time making the shift from advocate to Superior Court Judge, as being a judge is a completely different animal than being an advocate. Ask anyone who regularly appears in court as a litigation attorney, or any Judges for that matter, and the universal agreement is that it takes time for anyone to get use to being a Judge. That is why most appointees who have never been a Judge anywhere start in the Superior Court, or what use to be called the Municipal Court, for us old timers, before court unification got rid of the Municipal Court.
This has nothing to do with my views of his political party. I would be equally upset if it was a Republican appointed to the Supreme Court who had never been a Judge before.
Your comments disappointed me, as although I know you are a card carrying Democrat, as a lawyer, I expected better from you on this issue, putting politics aside for precedent and jurisprudence, and respect for the bench and judicial experience.
Posted by Tom Cushing,
a resident of Alamo,
on Jul 28, 2014 at 5:16 pm
Am:
1 -- Would you have sent Cespedes to Triple A?? Perhaps think of Cuellar as a Cespedes?
2 -- I think you are overstating by a lot to say Cuellar's nomination is an insult to the whole bench. There are probably some Appellate Judges who were disappointed, just as there are always unhappy passed-overs in regard to Any promotion -- especially one from 'outside the company.' I do not think appellate judging at either level is much like trial court judging -- former is remote, legalistic and policy-oriented while the latter is fact-based and immediate. Academia+ is not a bad proving ground for policy argumentation. And yes, I've appeared in court and have a better than .500 average. I do not choose to make my living that way. BTW, I hope we are not going to have a repeat of the sorry spectacle of you attempting to impugn my credentials as a member of the CA Bar. Understand clearly that I will not permit it -- I earned my membership here by taking the full exam, almost 20 years post-law school, and after previous admittance to the state bars of both IL and TX. You could look it up.
3 -- I think your analogy to Rose Bird is inapposite, and if there's an insult to be had it's yours against Mr. Cuellar. That nomination stands on firm ground, based on the remarkable credentials of the candidate that he has amassed since his impoverished childhood. I'm more inclined to celebrate him as an all-American success story -- rags to riches, or pobreza a la riqueza, if you must.
4 -- my descriptions in the blog are not meant to be normative -- they're descriptive of the world as it is. EVeryone's views on the law depend in part on their political philosophies. That point should not be controversial. Would I prefer a less politicized bench? Yes, and a less polarized Congress, too -- but that does not make it so in either case. And I believe the Exchange Issue rulings are substantially political.
Hell, if I had my way, Bush v. Gore would have been decided on better merits, and many, many things would have been different as a result. Or do you really believe that one, too, was decided on precedent, jurisprudence and the majesty of natural law principles?
Posted by American,
a resident of Danville,
on Jul 28, 2014 at 5:37 pm
Tom, I think your response was little defensive. My comments were not attack on you, just was under impression your background is not as litigation attorney, as most litigation attorneys have similar view to mine on judicial experience, since we appear in court constantly and see and interact with judges constantly.
Cespedes essentially played major league ball in Cuba before coming here, so he is like a Judge in another Country coming here, with judicial experience.
I have noticed lately you have hard time with anyone who disagrees with you, and you go into attack mode. I don't usually agree with your politics but respected your attempts to be civil and encourage sharing of thoughts. Not anymore. Think will stop reading your blog.
Posted by Tom Cushing,
a resident of Alamo,
on Jul 29, 2014 at 9:44 am
Defensive regarding the litigator point -- you bet. I was furious about that prior exchange, and interpreted your inquiry as starting down the same road. Thanks for clearing that up.
As to 'attack mode,' I was trying to draw you out to see what lies behind your very aggressive summary denunciation of the Cuellar nomination, as well as your stated disappointment in the blog. For example, as a litigator, you might not agree with my distinction between trial and appellate work. And maybe you think I got the rationales wrong on the state exchange cases. Also, I wanted to indicate that I do not feel a duty as a lawyer to exalt ideal legal theory over rough-and-tumble practice as an explanation, which appeared to be a part of your discomfort -- so maybe you don't agree with that, either?
It didn't work, obviously, but at least we agree about Cespedes, sort-of. I will take your critiques to heart and try to be less aggressive in tone, and more solicitous of honest contrary opinion. When comments are trollish or insulting, however, it's Katy-bar-the-door, and there's nobody around here named Katy.
Posted by Formerly Dan from BC,
a resident of Bridle Creek,
on Jul 29, 2014 at 10:31 amFormerly Dan from BC is a registered user.
Tom,
It's been interesting to read the back-and-forth between you and American. However, and I say this without malice or ill-intent, you have been patently unfair and ultra-defensive to any comment that calls out your opinion/s.
For instance, just go back and read my very first post and your subsequent response. You say you want honest contrary opinion, yet when I gave honest, contrary and factual opinion/quotes, I get the response that you gave. There was noting insulting in that post and, of course, it escalated from there.
Have I said things I shouldn't have? Yes, without a doubt. But I have always apologized for those things that I know I shouldn't have said but had written in the "heat of the moment".
Posted by paul davidson,
a resident of another community,
on Nov 4, 2014 at 3:38 pm
Just in case anyone needs to fill out a tax form, I found a blank forms in this site PDFfiller. This site also has some tutorials on how to fill it out and a several blank tax forms that you might find useful. I was able to fill out the form I need through this link Web Link.
Posting an item on Town Square is simple and requires no registration. Just complete this form and hit "submit" and your topic will appear online.
Please be respectful and truthful in your postings so Town Square will continue to be a thoughtful gathering place for sharing community information
and opinion. All postings are subject to our TERMS OF USE, and may be deleted if deemed inappropriate by our staff.
We prefer that you use your real name, but you may use any "member" name you wish.
Name:*
Select your neighborhood or school community:*
Comment:*
Verification code:* Enter the verification code exactly as shown, using capital and lowercase letters, in the multi-colored box.
|
More
Miller Stops 41 Shots, Ducks Beat Stars 2-0
ANAHEIM, Calif. (AP) — Ryan Miller couldn’t help but crack a smile when remembering the mess the Anaheim Ducks found themselves in.
After two Ducks players put the puck over the glass on back-to-back plays while already on the penalty kill in the third period, Miller just dug in and helped drag Anaheim to its longest winning streak of the season.
Miller stopped 41 shots for his 42nd career shutout as the Ducks beat the Dallas Stars 2-0 Wednesday night for their fourth straight win.
“We can laugh about it now, but when you watch those two float out of the rink you get a little anxious,” said Miller, who picked up his third shutout of the season.
Ryan Getzlaf scored short-handed and Hampus Lindholm had a power-play goal for the Ducks, who took sole possession of third place in the Pacific Division.
It was the Ducks’ second straight shutout, after Miller came on for the third period in relief of an injured John Gibson in a 2-0 win at Vegas on Monday.
Miller made 20 saves against the Golden Knights and picked up where he left off with an early stop on Mattias Janmark’s backhand. It wasn’t until Getzlaf and Josh Manson each took delay-of-game penalties following a slashing call on Cam Fowler that the veteran goalie showed how locked in he was by turning away dangerous shots by Jamie Benn and Jason Spezza in succession.
“It was a pivotal point in the game, definitely,” Miller said. “I just told myself get one at a time and see what we can do.”
Miller stopped seven shots during the 5-on-3, setting the stage for the Ducks to make it 2-0 at 4:28 of the third on Getzlaf’s eighth career short-handed goal.
Getzlaf left the penalty box and was on the receiving end of a long pass from Francois Beauchemin. Ben Bishop came out of his crease to play the bouncing puck but Getzlaf chipped it over him before the goaltender could knock it away. The Ducks’ captain then composed himself and scored into an open goal for his 11th multi-point game.
“Get there faster than (Bishop),” Getzlaf said of his mindset during the sequence. “I just noticed that their D-men had been out there a long time so they were probably going to change thinking I was going off. Clearly, I was fresh.”
Lindholm gave the Ducks a 1-0 lead with 6:45 left in the first, barreling in to bury the rebound of Getzlaf’s shot into an open net for his third power-play goal of the season. It was Lindholm’s 38th career goal, breaking a tie with Fredrik Olausson for fifth place in franchise history for the most by a defenseman.
“I think we did a lot of good things tonight, but just couldn’t win the special teams,” said Bishop, who made 15 saves.
The Ducks entered the game tied with the Los Angeles Kings for third place in the Pacific Division, and the Stars are in third in the Central Division. Not surprisingly, there was playoff intensity and caginess at the start. The Ducks went into the power play where Lindholm scored with two shots on goal and got two in eight seconds with the man-advantage, their only four shots in the period.
The game also ended on a playoff-like note, with Benn and Corey Perry fighting while teammates on both sides jawed and postured.
Miller wants the Ducks to maintain that feisty play and spirit.
“We recognize where the season is at,” Miller said. “We’ve built a good game. We have to stick with it.”
NOTES: Stars C Martin Hanzal left after the first period and did not return with a lower-body injury. … The Ducks have won four in a row at home against the Stars. Anaheim hosts Dallas on April 7 to close out the regular season. … Kari Lehtonen will start in goal for the Stars against the Kings in the second game of a back-to-back on Thursday night.
|
Q:
How do I fix open <'s without closing >'s with C#?
I'm using C# with the .NEt 4.5 version of the HTML Agility Pack. I have to be able to import a large number of different html documents and always be able to load them into the .NET XmlDocument.
My current issue is that I am seeing html similar to this:
<p class="s18">(4) if qual. ch ild <17 f or</p>
I need to convert that "<" to anything else but I need to preserve all of the other <'s and >'s. I'd like to use as few lines of code as possible and hope that someone can show me how the Html Agility Pack (already being used in my project for other things) can be leveraged to solve this problem.
EDIT: If Html Agility Pack doesn't satisfy the need then I'd appreciate a C# method which will eliminate or close any open flags while preserving any valid tags.
EDIT 2: Removed, no longer relevant.
EDIT 3: I've partially solved this problem but there is a bug that I'd appreciate help resolving.
My method is below. This method successfully removes the '<' and '>' characters from this HTML.
<p>yo hi</p><p> Gee I love 1<'s</p><td name=\"\" /><p>bazinga ></p>
The problem that I am having is that the Regex.Matches() method seems to not actually find all matches. It will find a match and then look for the next match, positioned after the first match ends. This behavior makes the " Gee I love 2<'s" '<' character get skipped in following HTML.
<p>yo hi</p><p> Gee I love 1<'s<p> Gee I love 2<'s<p> Gee I love 3<'s</p></p></p><td name=\"\" /><p>bazinga ></p>
In my opinion " Gee I love 2<'s" should be a match but the Regex.Matches() method is skipping it because of, what I assume, is a position location being moved forward to the end of the last match.
private static string RemovePartialTags(string input)
{
Regex regex = new Regex(@"<[^<>/]+>(.*?)<[^<>]+>");
string output = regex.Replace(input, delegate(Match m)
{
string v = m.Value;
Regex reg = new Regex(@"<[^<>]+>");
MatchCollection matches = reg.Matches(v);
int locEndTag = v.IndexOf(matches[1].Value);
List<string> tokens = new List<string>
{
v.Substring(0, matches[0].Length),
v.Substring(matches[0].Length, locEndTag - matches[0].Length)
.Replace(@"<", string.Empty)
.Replace(@">", string.Empty)
};
tokens.Add(v.Substring(tokens[0].Length + (locEndTag - matches[0].Length)));
return tokens[0] + tokens[1] + tokens[2];
}
);
return output;
}
Thank you in advance!
A:
I solved my problem by using the same method as above but with a modified regex expression
@"<[^<>/]+>(.*?)[<](.*?)<[^<>]+>"
Method:
private static string RemovePartialTags(string input)
{
Regex regex = new Regex(@"<[^<>/]+>(.*?)[<](.*?)<[^<>]+>");
string output = regex.Replace(input, delegate(Match m)
{
string v = m.Value;
Regex reg = new Regex(@"<[^<>]+>");
MatchCollection matches = reg.Matches(v);
int locEndTag = v.IndexOf(matches[1].Value);
List<string> tokens = new List<string>
{
v.Substring(0, matches[0].Length),
v.Substring(matches[0].Length, locEndTag - matches[0].Length)
.Replace(@"<", string.Empty)
.Replace(@">", string.Empty)
};
tokens.Add(v.Substring(tokens[0].Length + (locEndTag - matches[0].Length)));
return tokens[0] + tokens[1] + tokens[2];
}
);
return output;
}
|
Establishing the work of our hands
“May the favor of the Lord rest upon us; establish the work of our hands for us – yes, establish the work of our hands.” – Psalm 90:17
Last fall, hip-hop artist Lecrae Moore spoke at on the importance of engaging culture from a Christian perspective. Speaking at the 2012 Resurgence Conference, Moore told the audience:
“God has structured things for his glory and his goodness and humanity is directing it in evil or good ways. If you are going to engage culture, it’s about taking the things you are skilled at and asking, ‘how can I direct them in a good way?’”
Moore’s comments are part of a renewed interest among Christians regarding the biblical doctrine of work. This doctrine teaches that all things come under the Lordship of Christ, including the work of our vocations. Our work matters to God. As human beings created in the image of God, we work and create as a reflection of that image. The work of our hands is intended to serve three great ends:
To glorify God.
To serve the common good.
To further the Kingdom of God.
What are the implications of this doctrine for Christians today?
As Christians, our primary call is to follow Jesus. This call encompasses the whole of our lives, including our everyday work. This call should lead Christians to a radically different lifestyle, seeking not to follow the culture, but influence it for the glory of God.
It is important to understand the mission we are called to carry out in this world. For Christians, life without work is meaningless, but work must never become the meaning of one’s life. Our identity is in Christ, not our work. It is our union with Christ which transforms our hearts and gives us the desire to serve him out of gratitude while we engage the world.
The purpose of our work is to have a positive impact on culture. A prominent biblical metaphor is the bringing of light into a dark world (Matthew 5:16, John 1:5). When light is brought into a dark room, the room is transformed. The light of the gospel has the power to radically transform individual people and their culture as a whole.
The biblical doctrine of work is one of the most powerful means God provides for us to shape and influence culture. Yet today we hear many Christians say that we should not be involved in shaping culture.
People who say this are supporting the social status quo, whether they agree with it or not. Tim Keller had this to say in a recent essay:
“When Christians work in the world, they will either assimilate into their culture and support the status quo or they will be agents of change. This is especially true in the area of work. Every culture works on the basis of a “map” of what is considered most important. If God and his grace are not at the center of a culture, then other things will be substituted as ultimate values. So every vocational field is distorted by idolatry.”
When Christians do their jobs with excellence and accountability, in a distinctively Christian manner, they cannot help but have a profound effect on the world around them. Thomas Cahill, in his book How the Irish Saved Civilization, tells how Christian monks in the Middle Ages moved out of Ireland and through pagan Europe. Along the way, they established academies, universities, and hospitals. The monks transformed local economies and care for the poor and unfortunate through these new institutions.
The Irish monks’ goal was not to change the pagan culture into the church. Instead, their vocation was inspired by the gospel, and that changed the way they carried out their work. They worked for the flourishing of mankind, rather than strictly for themselves.
Christians today have a similar opportunity. If we are serious about the truth of Christianity, we need to engage in cultural renewal. Like Moore encourages, we need to “take the things we’re good at” and “direct them in a good way,” a way that serves the common good of our culture and the Kingdom, for the glory of God.
Question: What have you perceived to be the Church’s attitude towards the cultural status quo? Leave a comment here.
The Institute for Faith, Work & Economics is a Christian research organization committed to promoting biblical and economic principles that help individuals find fulfillment in their work and contribute to a free and flourishing society. Learn more at tifwe.org and blog.tifwe.org.
|
Q:
JOIN-ON vs just = in WHERE clause
Most RDBMSs support both syntaxes:
SELECT ...
FROM table1 t1 JOIN table2 t2
ON t1.jfield = t2.jfield
as well as
SELECT ...
FROM table1 t1, table2 t2
WHERE t1.jfield = t2.jfield
Personally, I prefer the latter version because of less verbosity but does it presents any difference in performance and query execution? I have seen people on this forum making remarks that the 2nd style is obsolete and does not perform as well.
A:
There is no difference in performance. But a lot in robustness. Leave the WHERE clause out in the second example and you wind up with an unwanted cartesian product. Leave out the ON in the first example and you just get a syntax error. That might be obvious for a two table join, but once you have 10 or 15 tables, those errors are hard to spot.
Additionally when you start using outer joins, using LEFT OUTER JOIN will work across all DBMS, whereas any DBMS specific outer join syntax is just that: DBMS specific (and e.g. Oracle's (+) operator can't do everything a LEFT OUTER JOIN can do.
So do get used to using the JOIN keyword.
|
The Royal Country Club is situated at the border of Zaociao and Touwu in Miaoli. Nestled among the pristine wilderness northeast of Mingte Dam, the course is a great, quiet golf destination which allows golfers to get away from the busy city life.
This Robert Trent Jones Jr. design measures 6,520 yards. The meandering fairways through forests of trees are moderate in length but quite challenging. Ever-present are the cleverly-designed bunkers, waters and primitive broadleaf forests. It is indeed a charming challenge.
The putting surfaces of The Royal Country Club are mostly highly-slanted elevated greens combined with OB areas around. It will be wise to make the approach shot with a lower-numbered iron. The OB area on one side of most fairways and a number of waters in play further make The Royal Country Club a golf paradise which offers great challenges to your games.
|
Tahir Ashraf is the Superintendent of Police of the cyber crime wing of Jammu and Kashmir police.
Hours after questioning a journalist for her social media posts on Tuesday, the head of the cyber cell of the Jammu and Kashmir Police was called out for his own old tweet terming Prime Minister Narendra Modi "sadistic".
Amid a growing controversy, Tahir Ashraf, Superintendent of Police of the cyber police wing, was forced to delete his tweet posted in 2013.
In his tweet, the police officer had referred to an NDTV interview of PM Modi on the 2002 Gujarat riots, in which the then Chief Minister had said it would pain him "even if a puppy came under a car".
Responding to the statement, Mr Ashraf had tweeted: "Narendra Modi's puppy analogy on 2002 riots shows his real character... sadistic".
The old tweet surfaced on Tuesday as the Jammu and Kashmir Police charged a 26-year-old female photojournalist under the strict Unlawful Activities Prevention Act (UAPA) for her social media posts.
The officer was also roasted for his controversial tweets about the BJP and Hindutva before the party came to power in 2014.
Tahir Ashraf arrest yourself. Your tweet will be threat to national Sovereignty. @[email protected]/sG7zaeetyH — MUSAIB BIN UMEYR (@MusaibUmeyr) April 21, 2020
Not forget his endorsement of @Shehla_Rashid's call to overthrow the fascists in India. pic.twitter.com/Sd28mcqgZm — Bekaar Jamaat (@BekaarJ) April 21, 2020
Talking bad about a now Parliamentarian and the supporters of the regime. Tsk Tsk Tsk.https://t.co/iJuPcmgjgK — Bekaar Jamaat (@BekaarJ) April 21, 2020
On Tuesday, the photojournalist Masrat Zahra was called for questioning by the cyber cell of the police which reports to Mr Ashraf.
She has been charged under the tough anti-terror law UAPA for her social media posts which the police say are "anti-national".
Since the centre scrapped Jammu and Kashmir's special status and split it into two union territories last August, several journalists working in Srinagar have been summoned by the police for questioning.
Earlier this week, Mr Ashraf had called a correspondent of The Hindu newspaper Peerzada Ashiq for questioning over a story.
The journalist was later asked to go to the Anantnag district to join the investigation.
The police say a First Information Report or FIR has been registered about a "fake" news report but Mr Ashiq or The Hindu newspaper were not named in the FIR.
Journalist groups say harassment of journalists in Kashmir aims to muzzle the freedom of press and have demanded that cases against them are withdrawn.
In a statement, human rights group Amnesty International too urged the central government to stop the intimidation of journalists in Jammu and Kashmir.
|
Synthetic micelle sensitive to IR light via a two-photon process.
A micellar assembly of molecules constituted of poly(ethylene glycol) as the hydrophilic component and 2-diazo-1,2-naphthoquinone as the hydrophobic component was shown to be destroyed in a two-photon photoreaction triggered by infrared light with release of an encapsulated fluorescent probe molecule.
|
Balanced Resuscitation in Trauma Management.
Over the past decade substantial knowledge has been gained in understanding both the coagulopathy of trauma and the complications associated with aggressive crystalloid-based resuscitation. Balanced resuscitation, which includes permissive hypotension, limiting crystalloid use, and the transfusion of blood products in ratios similar to whole blood, has changed the previous standard of care. Prompt initiation of massive transfusion and the protocolled use of 1:1:1 product ratios have improved the morbidity and mortality of patients with trauma in hemorrhagic shock. Balanced resuscitation minimizes the impact of trauma-induced coagulopathy, limits blood product waste, and reduces the complications that occur with aggressive crystalloid resuscitation.
|
Step 1: What You'll Need
If you too would like a Ludo, here's what you'll need:
-a victim, er, I mean a volunteer
materials for the mask:-plaster cloth, we used Rigid Wrap-Vaseline-an old tuque (I believe the Americans call them beanies, but any tight fitting hat would do)-duct tape-modeling clay, make sure it's the kind that can air dry, we used DAS-one wire coat hanger-masking tape-cardboard-toilet paper tubes-paper towel-newspaper-white glue-make-up sponges-elastic-metal rings, ours were from a broken purse but you could use key chain rings-spray paint, we used Valspar Suede-acrylic paint-fun/fake fur, you'll need less than a meter for the head
materials for the body:-fun/fake fur, about 4 meters-an unwanted jacket-a pair of pants to trace-upholstery foam, we bought 2 packs of 4 seat cushions -bamboo stakes, the kind they sell for gardening-knock-off Hulk hands-fabric to use for suspenders, we used an old pair of pants-duct tape-spray paint, the same as you use on the mask
materials for the feet:-an old pair of shoes-Hobbit feet-fun/fake fur
necessary tools:-scissors-sewing machine-glue gun with a big bag of glue sticks-paint brushes-saw or other way to cut bamboo
optional:-Styrofoam head, the kind they use to display wigs (not necessary but helpful when you're working on the mask)-hairdryer-6'4" boyfriend
Step 2: Make the Base for the Mask
Get your volunteer to tie back his hair (he's wearing his Burning Man bandanna) and grease up his face with Vaseline.
Cut the plaster cloth into strips and triangles.
Following the package directions, dip the pieces in water and apply the plaster to your volunteer's face.
We used a hair dryer to dry it faster and then threw the mask in the microwave.
Step 3: Build It Up
Using paper towel and masking tape, start to build up the shape of Ludo's face.
We used paper towel rolled up to build up his eyebrows, cheeks and upper lip. Drawing on the plaster with a marker helped us determine where we needed to add to it.
After the basic shape was built up we covered it with another layer of plaster cloth. If you didn't have any plaster left over from the first step you could use papier mache.
Let it dry.
Make Ludo's horns by rolling newspaper around toilet paper tubes and shaping it with masking tape.
If your mask still needs more volume, build it up some more with paper and tape.
Cover the face and horns with papier mache. We used white glue diluted with warm water and strips of paper towel. The paper towel gives the horns a great texture so I would recommend using it over newspaper for this papier mache step.
Step 4: Put It Together
Cut the make-up sponges into thinner pieces and use them to pad the inside of the mask.
Attach the face and horns to the tuque with the help of a glue gun and duct tape.
Step 5: Break Out the Clay
Apply a thin layer of clay onto the mask.
Sculpt the face.
Step 6: Make the Jaw
Trace the outline of the upper lip onto cardboard and cut it out.
Untwist the coast hanger and bend it into a curve that matches the cardboard piece.
Tape the cardboard to the wire.
Bend the ends of the wire into an "L" shape. Bend the ends of the L into hooks.
Create a chin hold by shaping thin cardboard into a cone and taping it to the base of the jaw piece. Add some of the cosmetic sponges to make it more comfortable.
Sew a length of elastic onto the top of the tuque. Sew a metal ring to both ends of the elastic. We used hardware from an old purse but you could use a key ring like in this Realistic Werewolf Costume instructable.
Have your volunteer put on the mask and adjust the wire until the jaw piece sits comfortably on the chin and moves naturally when he speaks.
Build up the shape on the jaw with paper towel and masking tape. Make two teeth from cones of cardboard and tape them on.
Papier mache and then add clay as you did to the rest of the face.
Step 7: Paint
Spray the mask with brown spray paint.
We used a paint with a "suede" finish and worked very well.
Once it is dry, use acrylic craft paint to add shading and detail. It's helpful to have some reference photos in front of you while you work.
Step 8: Give Him Some Fur
Using a hot glue gun, attach the fun fur to your mask.
The head should now be done!
If you're as proud as I was, you'll take it bowling.
Step 9: Make the Arm Extensions
Ludo's hands hang down past his knees. My boyfriend's do not.To fix this problem we made arm extensions.
Take the cheap costume Hulk hands from the dollar store and remove the green fur cuffs.
Cut four equal lengths of bamboo and attach them inside the monster hands with your glue gun and duct tape.
Add a short bamboo piece width wise to keep the hand from collapsing. Secure it with glue and duct tape.
Spray paint the hands with the same paint you used on Ludo's face.
Step 10: Sew Him a Fur Suit
Time to start up the sewing machine!
I'm not a very good seamstress so there is likely a much better way to do this part.
Here's how we did it:
For the upper body, we used an old jacket as the base and covered it in fun fur. Before sewing on the sleeves we padded the shoulders with wedges of upholstery foam.
Make the sleeves extra long to accommodate the arm extensions and cut slits so he can get his real hands out when he needs to hold a beer.
For the pants, I traced a pair of my boyfriend's pants onto the fun fur and enlarged them significantly.
We cut the upholstery foam and glued together three layers to give Ludo a nice padded butt and hips. With a large curved upholstery needle we stitched the foam by hand to the pants.
To hold up the pants we made suspender-like straps.
Step 11: Make the Feet
Using your hot glue gun, attach some costume feet to a pair of old shoes. We happened to have hobbit feet kicking around from a past costume and they did the trick.
Cover the rest of the shoes with scraps of fun fur and your glue gun.
Step 12: Take Him Out on the Town!
Use brown face paint to complete the costume and go have some fun!
Be aware of the fact that it will get very hot, so be sure he drinks plenty of fluids and takes a break to cool off every once in a while.
Keep your eye on your guy in the fur. Not only will women be lining up to give him a hug, he might also be an easy target for drunken idiots.
Thanks so much for sharing this amazing costume! I followed your instructable this Halloween for a group labyrinth costume where my best friend's 5 year old son was the Goblin King! Thanks so much for helping to make us the belle of the ball!http://flic.kr/p/dqAvZg
This is freakin' awesome...no other way to put it. My daughter (9yo) wants to be Aughra and after telling her that it was not possible, now I have some ideas and next year, my daughter WILL have an Aughra costume.
|
Q:
Android libc.so crash?
I'm using AndEngine with the PhysicsBox2DExtension to make a game. My game keeps crashing and I get this in the unfiltered LogCat:
07-06 13:25:27.266: I/DEBUG(19582): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
07-06 13:25:27.266: I/DEBUG(19582): Build fingerprint: 'TMOUS/SGH-T959V/SGH-T959V/SGH-T959V:2.2.1/FROYO/VUVKD1:user/release-keys'
07-06 13:25:27.274: I/DEBUG(19582): pid: 22238, tid: 22263 >>> com.prattia.webs.testgfx5 <<<
07-06 13:25:27.274: I/DEBUG(19582): signal 11 (SIGSEGV), fault addr deadbaad
07-06 13:25:27.286: I/DEBUG(19582): r0 00000000 r1 afd14921 r2 00000027 r3 00000070
07-06 13:25:27.286: I/DEBUG(19582): r4 afd42328 r5 00000000 r6 00000000 r7 43095ba0
07-06 13:25:27.297: I/DEBUG(19582): r8 447d75ac r9 43095b5c 10 80aa23f4 fp 43095b58
07-06 13:25:27.297: I/DEBUG(19582): ip 00001730 sp 447d74c8 lr deadbaad pc afd11f74 cpsr 60000030
07-06 13:25:27.301: I/DEBUG(19582): d0 6472656767756265 d1 646f426574616572
07-06 13:25:27.301: I/DEBUG(19582): d2 2074736e6f632879 d3 654479646f423262
07-06 13:25:27.305: I/DEBUG(19582): d4 73656e69676e655f d5 69676e45646e412f
07-06 13:25:27.309: I/DEBUG(19582): d6 6e45646e412f656e d7 73796850656e6967
07-06 13:25:27.309: I/DEBUG(19582): d8 40c9de1ed6a7d420 d9 43e0000000000000
07-06 13:25:27.313: I/DEBUG(19582): d10 41dfffffffc00000 d11 c3e0000000000000
07-06 13:25:27.313: I/DEBUG(19582): d12 0000000000000000 d13 0000000000000000
07-06 13:25:27.313: I/DEBUG(19582): d14 0000000000000000 d15 0000000000000000
07-06 13:25:27.317: I/DEBUG(19582): d16 000000c247d403f0 d17 400921fb54442d18
07-06 13:25:27.317: I/DEBUG(19582): d18 3f810f1cab7c1816 d19 3f651bd7d319330c
07-06 13:25:27.317: I/DEBUG(19582): d20 bfc55034095fd11a d21 be5ae514498b308e
07-06 13:25:27.321: I/DEBUG(19582): d22 0000000000000000 d23 3de5d93a5acfd57c
07-06 13:25:27.325: I/DEBUG(19582): d24 bfb3b25552016f7e d25 3fb10e9526779bed
07-06 13:25:27.325: I/DEBUG(19582): d26 bfaddfe9639fbb1a d27 3fa97c111b7b144e
07-06 13:25:27.325: I/DEBUG(19582): d28 bfa2b4442c6a6c2f d29 0000000000000000
07-06 13:25:27.325: I/DEBUG(19582): d30 0000000000000000 d31 0000000000000000
07-06 13:25:27.325: I/DEBUG(19582): scr 60000012
07-06 13:25:27.469: I/DEBUG(19582): #00 pc 00011f74 /system/lib/libc.so
07-06 13:25:27.473: I/DEBUG(19582): #01 pc 0001921e /system/lib/libc.so
07-06 13:25:27.473: I/DEBUG(19582): #02 pc 00026558 /data/data/com.prattia.webs.testgfx5/lib/libandenginephysicsbox2dextension.so
07-06 13:25:27.473: I/DEBUG(19582): #03 pc 00013e7c /data/data/com.prattia.webs.testgfx5/lib/libandenginephysicsbox2dextension.so
07-06 13:25:27.473: I/DEBUG(19582): #04 pc 00016e34 /system/lib/libdvm.so
07-06 13:25:27.473: I/DEBUG(19582): code around pc:
07-06 13:25:27.473: I/DEBUG(19582): afd11f54 2d00682d e029d1fb b12b68db c05cf8df
07-06 13:25:27.473: I/DEBUG(19582): afd11f64 f8442001 4798000c e054f8df 26002227
07-06 13:25:27.473: I/DEBUG(19582): afd11f74 2000f88e eec2f7fb f7fc2106 f04feff8
07-06 13:25:27.473: I/DEBUG(19582): afd11f84 91035180 460aa901 96012006 f7fc9602
07-06 13:25:27.473: I/DEBUG(19582): afd11f94 a905eb7e 20024632 eb88f7fc eeaef7fb
07-06 13:25:27.473: I/DEBUG(19582): code around lr:
07-06 13:25:27.477: I/DEBUG(19582): deadba8c ffffffff ffffffff ffffffff ffffffff
07-06 13:25:27.477: I/DEBUG(19582): deadba9c ffffffff ffffffff ffffffff ffffffff
07-06 13:25:27.477: I/DEBUG(19582): deadbaac ffffffff ffffffff ffffffff ffffffff
07-06 13:25:27.477: I/DEBUG(19582): deadbabc ffffffff ffffffff ffffffff ffffffff
07-06 13:25:27.477: I/DEBUG(19582): deadbacc ffffffff ffffffff ffffffff ffffffff
07-06 13:25:27.477: I/DEBUG(19582): stack:
07-06 13:25:27.477: I/DEBUG(19582): 447d7488 00000000
07-06 13:25:27.477: I/DEBUG(19582): 447d748c 00000000
07-06 13:25:27.477: I/DEBUG(19582): 447d7490 afd425a0 /system/lib/libc.so
07-06 13:25:27.477: I/DEBUG(19582): 447d7494 afd4254c /system/lib/libc.so
07-06 13:25:27.477: I/DEBUG(19582): 447d7498 00000000
07-06 13:25:27.477: I/DEBUG(19582): 447d749c afd1596b /system/lib/libc.so
07-06 13:25:27.481: I/DEBUG(19582): 447d74a0 afd14921 /system/lib/libc.so
07-06 13:25:27.481: I/DEBUG(19582): 447d74a4 afd14921 /system/lib/libc.so
07-06 13:25:27.481: I/DEBUG(19582): 447d74a8 00000070
07-06 13:25:27.481: I/DEBUG(19582): 447d74ac afd42328 /system/lib/libc.so
07-06 13:25:27.481: I/DEBUG(19582): 447d74b0 00000000
07-06 13:25:27.481: I/DEBUG(19582): 447d74b4 447d74dc
07-06 13:25:27.481: I/DEBUG(19582): 447d74b8 43095ba0
07-06 13:25:27.481: I/DEBUG(19582): 447d74bc afd14bc3 /system/lib/libc.so
07-06 13:25:27.481: I/DEBUG(19582): 447d74c0 df002777
07-06 13:25:27.481: I/DEBUG(19582): 447d74c4 e3a070ad
07-06 13:25:27.481: I/DEBUG(19582): #00 447d74c8 00000003
07-06 13:25:27.481: I/DEBUG(19582): 447d74cc 43095b58
07-06 13:25:27.481: I/DEBUG(19582): 447d74d0 43095ba0
07-06 13:25:27.485: I/DEBUG(19582): 447d74d4 afd14f29 /system/lib/libc.so
07-06 13:25:27.485: I/DEBUG(19582): 447d74d8 afd4254c /system/lib/libc.so
07-06 13:25:27.485: I/DEBUG(19582): 447d74dc fffffbdf
07-06 13:25:27.485: I/DEBUG(19582): 447d74e0 00000054
07-06 13:25:27.485: I/DEBUG(19582): 447d74e4 00000003
07-06 13:25:27.485: I/DEBUG(19582): 447d74e8 43095b58
07-06 13:25:27.489: I/DEBUG(19582): 447d74ec afd19223 /system/lib/libc.so
07-06 13:25:27.489: I/DEBUG(19582): #01 447d74f0 00000054
07-06 13:25:27.489: I/DEBUG(19582): 447d74f4 821412bc /data/data/com.prattia.webs.testgfx5/lib/libandenginephysicsbox2dextension.so
07-06 13:25:27.489: I/DEBUG(19582): 447d74f8 447d75d0
07-06 13:25:27.489: I/DEBUG(19582): 447d74fc 8212655c /data/data/com.prattia.webs.testgfx5/lib/libandenginephysicsbox2dextension.so
07-06 13:25:28.040: I/DEBUG(19582): dumpstate /data/log/dumpstate_app_native.txt
07-06 13:25:28.114: I/dumpstate(22478): begin
07-06 13:25:28.122: I/dalvikvm(2480): threadid=3: reacting to signal 3
07-06 13:25:28.157: I/dalvikvm(2480): Wrote stack traces to '/data/anr/traces.txt'
07-06 13:25:28.192: I/BootReceiver(2480): Copying /data/tombstones/tombstone_09 to DropBox (SYSTEM_TOMBSTONE)
07-06 13:25:28.239: I/dalvikvm(2604): threadid=3: reacting to signal 3
07-06 13:25:28.239: I/dalvikvm(2604): Wrote stack traces to '/data/anr/traces.txt'
Can anyone explain to me what's going on and how I might find what exactly is causing the crash?
There are two places in my code where it crashes, but it's fairly random when it does. After executing this method:
private void destroyFiller(){ //Deletes filler
if(filler[fillerNum].active){
Log.e("destroyFiller","Destroying filler");
filler[fillerNum].active=false;
filler[fillerNum].body.setActive(false);
scene.detachChild(filler[fillerNum].sprite);
fillerCount--;
fillersLeftText.setText("Balls left: "+Integer.toString(fillerCount));
if(fillerCount==0)
gameOver();
Log.e("destroyFiller","Destroyed");
}
}
And after executing the indicated line in this method:
private void levelComplete(){
runOnUiThread(new Runnable() {
public void run() {
Toast.makeText(TestGFX5Activity.this, "Level Complete", Toast.LENGTH_SHORT).show();
}
});
Log.e("Level Complete","Going to reset values");
//Reset values
level++;
destroyerNum++;
fillerCount = (originalNumberOfFillers + level - 1);
areaFilled=0;
fillAreaPercent = 0;
//Rid scene of sprites
for(int x=0;x<=fillerNum;x++){
filler[x].body.setActive(false);
scene.detachChild(filler[x].sprite);
filler[x].active=false;
filler[x].scale=originalSpriteScale;
filler[x].body.setUserData("inactive");
}
levelText.setText("Level: "+Integer.toString(level));
fillersLeftText.setText("Balls left: "+Integer.toString(fillerCount));
percentFilledText.setText("0%");
fillerNum = -1;
Log.e("Level Complete","values reset");
randx = random.nextInt(650) + 25;
randy = random.nextInt(400) + 25;
randix = random.nextInt(10);
randiy = random.nextInt(10);
if(randix%2==0)
ix = 5;
else
ix = -5;
if(randiy%2==0)
iy = 5;
else
iy = -5;
Log.e("Level Complete","Creating destroyer");
destroyer[destroyerNum] = new Ball(randx, randy, destroyerTR, getVertexBufferObjectManager(), ix, iy); //crashes here
Log.e("Level Complete","complete"); //This line never reached.
}
A:
You should use addr2line tool as described here and lookup these two addresses in your library to find what causes the crash:
#02 pc 00026558 /data/data/com.prattia.webs.testgfx5/lib/libandenginephysicsbox2dextension.so
#03 pc 00013e7c /data/data/com.prattia.webs.testgfx5/lib/libandenginephysicsbox2dextension.so
So under Windows you should:
Copy the library from device:
adb pull /data/data/com.prattia.webs.testgfx5/lib/libandenginephysicsbox2dextension.so C:\
Run addr2line tool for it using command line:
cd %PATH_TO_YOUR_NDK%\toolchains\arm-linux-androideabi-4.4.3\prebuilt\linux-x86\bin
arm-linux-androideabi-addr2line -C -f -e C:\libandenginephysicsbox2dextension.so
Enter adress by adress:
00026558 [ENTER]
> here will be function name and line
00013e7c [ENTER]
> and again
Note: running this tool under Windows may give you less information than under Linux, so you may choose to install the distro as a virtual machine and follow instructions from the link to original answer above.
Update
Another (easier?) way is to use ndk-stack:
As previously
Save your dump into file. Let's call it 'dump.txt'.
Run ndk-stack:
cd %PATH_TO_YOUR_NDK%
ndk-stack -sym C:\libandenginephysicsbox2dextension.so -dump C:\dump.txt
A:
libc is experiencing a segmentation violation, almost certainly because andengine gave it a bad pointer. You probably don't have debug symbols for libc, but you can adb pull and objdump it to figure out what dynamic function is being given bad arguments. Or if your andengine library has debug symbols, you can track down the address there using the address to line tool.
You will have to figure out if it is a bug in what you are asking andengine to do, or if the bug is in andengine itself.
|
/**
* FE-Helper后台运行程序
* @author [email protected]
*/
var BgPageInstance = (function(){
/**
* 初始化
*/
var _init = function(){
};
return {
init : _init
};
})();
//初始化
BgPageInstance.init();
|
Display ALL Minnesota Lakeshore Cabins, and Lakefront Properties by County
Here is the link to bookmark if you are serious about finding a Minnesota lake home, cabin, or luxury lakefront estate. You can sort lakeshore listings by county, and if you bookmark this link, you will see new listings when you return to it. Use this lakeshore link to find waterfront homes close to the Twin Cities, or outlying areas including anything from log cabins on Leech Lake to luxury estates in Orono on Lake Minnetonka. Use this link to explore anything from lakefront Prior Lake homes to Detroit Lakes waterfront or Brainerd area lake homes. Find fixer uppers, cabins with large acreages, and just about anything you want. If you want more detailed information, we can get you on Minnesota lake water quailty info, fishing information, resale histories, or just about any other kind of data that would be helpful to you. Minnesota lakeshore is in high demand, and generally speaking makes an excellent long term investment.
You can use the field below to search by county or price. You can also click the MODIFY Search link to browse by lake name, price, size, or just about any parameter you choose.
The data relating to real estate for sale on this web site comes in part from the Broker Reciprocity Program of the Regional Multiple Listing Service of Minnesota, Inc. Real estate listings held by brokerage firms other than Independent Brokers Realty are marked with the Broker Reciprocity logo.
Any use of search facilities of data on this site, other than by a consumer looking to purchase real estate, is prohibited. No part of this search utility may be reproduced, adapted, translated, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise.
Information Deemed Reliable, but Not Guaranteed. The property information being provided is for consumers' personal, non-commercial use and may not be used for any purpose other than to identify prospective properties consumers may be interested in purchasing.
|
De-icing Meltdown Needs Fast Resolution
Rocky Mountain News (Denver, CO) On Nov 26, 2007
Travelers who departed from snowy Denver International Airport on Wednesday might have wondered if they made the right choice. Recent reports from CBS4 News reporter Brian Maas about a de-icing contractor at DIA could give passengers chills that have nothing to do with the temperature.
An investigation led by Maas found that Servisair, the company that handles de-icing duties for every DIA carrier other than United Airlines, has been cutting corners as it trains personnel. These shortcuts may have saved the company a few bucks, but they could have easily placed passengers in harm's way.
Proper training and follow-up of employees are essential to the safety of passengers and those who work at the airport. Inadequate de-icing contributed to the fatal crash of Continental Airlines Flight 1713 20 years ago; 28 people died in that catastrophe, which took place at Denver's Stapleton International Airport.
There was also a near-miss in early February when an inbound United airliner narrowly avoided a DIA snowplow which had inexplicably driven onto an active runway.
The Federal Aviation Administration is now investigating whether the training lapses were more widespread, and if higher-ups at Servisair were involved. If so, the company and responsible individuals should face tough sanctions from safety regulators.
Maas sent a producer undercover to attend training sessions. The producer's hidden camera showed a Servisair employee feeding job candidates answers to the certification tests so that everyone would pass.
Even worse, a Servisair trainer was not requiring candidates to complete the two hours of driver training that's required before they can receive badges that afford employees access to runways, gates and other areas of DIA that are off-limits to the general public.
The producer was briefly driven around the airport in a van and then issued a security badge without spending any time behind the wheel.
Why would the company cut corners? Servisair officials based at DIA claim ignorance of these actions. And perhaps a rogue employee was simply too lazy to require applicants to spend the time needed to teach the materials and complete driving tests.
Finding out whether supervisors knew about the shortcuts should be one the FAA's top priorities. It does appear that the violations captured by Maas and his team may be more than a one-time occurrence. A Servisair worker who had earlier been through the classes told Maas that his "training" was just as lax as the episodes caught by the producer's hidden camera.
Meantime, Servisair has fired the employee who issued those tests and agreed to an order from DIA officials to retrain all its personnel.
On Wednesday, U.S. Sen. Ken Salazar asked Homeland Security Secretary Michael Chertoff to help the FAA expedite its investigation. Good. We'll surely get more snow this winter. Safety officials need to quickly learn who in Servisair knew what about the training shortcuts, and hold all who were culpable for the dangers they posed to the traveling public.
|
/*
This file is part of the iText (R) project.
Copyright (c) 1998-2020 iText Group NV
Authors: Bruno Lowagie, Paulo Soares, et al.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License version 3
as published by the Free Software Foundation with the addition of the
following permission added to Section 15 as permitted in Section 7(a):
FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY
ITEXT GROUP. ITEXT GROUP DISCLAIMS THE WARRANTY OF NON INFRINGEMENT
OF THIRD PARTY RIGHTS
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
or FITNESS FOR A PARTICULAR PURPOSE.
See the GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with this program; if not, see http://www.gnu.org/licenses or write to
the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
Boston, MA, 02110-1301 USA, or download the license from the following URL:
http://itextpdf.com/terms-of-use/
The interactive user interfaces in modified source and object code versions
of this program must display Appropriate Legal Notices, as required under
Section 5 of the GNU Affero General Public License.
In accordance with Section 7(b) of the GNU Affero General Public License,
a covered work must retain the producer line in every PDF that is created
or manipulated using iText.
You can be released from the requirements of the license by purchasing
a commercial license. Buying such a license is mandatory as soon as you
develop commercial activities involving the iText software without
disclosing the source code of your own applications.
These activities include: offering paid services to customers as an ASP,
serving PDFs on the fly in a web application, shipping iText with a closed
source product.
For more information, please contact iText Software Corp. at this
address: [email protected]
*/
using System;
using iText.Kernel.Pdf;
namespace iText.Kernel.Pdf.Collection {
public class PdfCollectionSchema : PdfObjectWrapper<PdfDictionary> {
public PdfCollectionSchema(PdfDictionary pdfObject)
: base(pdfObject) {
}
/// <summary>Creates a Collection Schema dictionary.</summary>
public PdfCollectionSchema()
: this(new PdfDictionary()) {
}
/// <summary>Adds a Collection field to the Schema.</summary>
/// <param name="name">the name of the collection field</param>
/// <param name="field">a Collection Field</param>
/// <returns>this instance to support fluent interface</returns>
public virtual iText.Kernel.Pdf.Collection.PdfCollectionSchema AddField(String name, PdfCollectionField field
) {
GetPdfObject().Put(new PdfName(name), field.GetPdfObject());
return this;
}
/// <summary>Retrieves a Collection field from the Schema.</summary>
/// <param name="name">is the name of the collection field</param>
/// <returns>
/// a
/// <see cref="PdfCollectionField">Collection field</see>
/// </returns>
public virtual PdfCollectionField GetField(String name) {
return new PdfCollectionField(GetPdfObject().GetAsDictionary(new PdfName(name)));
}
protected internal override bool IsWrappedObjectMustBeIndirect() {
return false;
}
}
}
|
What Will Apple's Stock Price Be on December 18, 2013?
In the video below, Fool analysts Jeremy Phillips and Austin Smith talk about Apple and where its stock price might be headed over the next nine months.
Austin says he gathered all his numbers on Apple, and he came up with a big question mark. A common mistake investors make is that they find comfort in the precise estimates that Wall Street deals in. Instead, investors should be seeking out great companies that make them rich over the long run, he says.
No one 10 years ago could have told you where Berkshire Hathaway or Coca Cola would be trading today, but they could tell you that they were, and still are, great companies, Austin says.
So, when should price matter to investors? Austin says investors should not have a penny in a stock that they cannot leave there for at least three to five years. For him, that's the minimum time an investor should be looking to let a stock investment work.
The real question isn't at what exact price Apple will trade at in a given time frame, but instead, whether it's the great company many once thought it was.
Two of the industry's top Apple experts Eric Bleeker, CFA and Evan Niu, CFA, teamed up for months to answer this. Now, they're making their findings available to the public. Their new Apple research service reveals the precise information for you to know whether it's time to be greedy, or if the sell-off has just begun. Eleven thousand enterprising investors are accessing this insight right now and gaining the courage to take control of their wealth. Join them today; simply click here now to answer The Apple Enigma.
|
import nmap
import optparse
def nmapScan(tgtHost,tgtPort):
nmScan = nmap.PortScanner()
nmScan.scan(tgtHost,tgtPort)
state=nmScan[tgtHost]['tcp'][int(tgtPort)]['state']
print "[*] " + tgtHost + " tcp/"+tgtPort +" "+state
def main():
parser = optparse.OptionParser('usage %prog '+\
'-H <target host> -p <target port>')
parser.add_option('-H', dest='tgtHost', type='string',\
help='specify target host')
parser.add_option('-p', dest='tgtPort', type='string',\
help='specify target port[s] separated by comma')
(options, args) = parser.parse_args()
tgtHost = options.tgtHost
tgtPorts = str(options.tgtPort).split(',')
if (tgtHost == None) | (tgtPorts[0] == None):
print parser.usage
exit(0)
for tgtPort in tgtPorts:
nmapScan(tgtHost, tgtPort)
if __name__ == '__main__':
main()
|
Nancy Andrew
{{Infobox person
| name = Nancy Andrew
| image =
|image_size = 200px
| caption = Nancy Andrew in 1970.
| birth_name =
| birth_date =
| birth_place = Dallas, Texas
| death_date =
| death_place = Tokyo
| alma mater = Indiana University Bloomington Waseda University Harvard Yenching Institute
| other_names =
| occupation = Japanese-English translator
| known_for = English translation of Ryū Murakami's novel, Almost Transparent Blue
}}
Linda Nancy Andrew (August 17, 1947 – November 29, 1998) was the English-language translator of Japanese author Ryū Murakami's highly acclaimed novel, Almost Transparent Blue, which had won the Akutagawa Prize in 1976.
Born in Dallas, Texas, Andrew was the only child of Dr. Warren Andrew (1910–1982), who later chaired the Department of Anatomy at the Indiana University School of Medicine in Indianapolis, and Nancy Valerie Miellmier Andrew (1914–1993), later a secretary with the Indiana State Anatomical Board.
Her interest in Japanese language and culture was kindled when she traveled to Japan with her parents just before her thirteenth birthday in 1960. Graduating from Shortridge High School in Indianapolis in 1965, she studied East Asian languages at Indiana University in Bloomington and Waseda University in Tokyo.
After receiving an honors degree from Indiana in 1969, she began graduate study at the Harvard Yenching Institute, where her faculty adviser was Edwin O. Reischauer, former United States Ambassador to Japan, and where she was an editor of Stone Lion Review, published by the East Asian Graduate Students Colloquium.
While doing research for her doctoral dissertation on the feminist movement in Japan, Andrew abandoned her academic studies to work as a translator for NHK, the Japan Broadcasting Corporation. Her translation of Murakami's surrealistic novel of post-war life in Japan was published in 1977.
References
Andrew, Warren, One World of Science: Personal Visits to Men of Research in Many Lands'', Springfield, IL: Charles C. Thomas (1966), Chapter 13.
Category:1947 births
Category:1998 deaths
Category:American translators
Category:Japanese–English translators
Category:American Japanologists
Category:Indiana University Bloomington alumni
Category:Harvard University alumni
Category:People from Dallas
Category:People from Indianapolis
Category:20th-century translators
Category:American women non-fiction writers
Category:20th-century American women writers
Category:Women orientalists
|
div.code-toolbar {
position: relative;
}
div.code-toolbar > .toolbar {
position: absolute;
top: .3em;
right: .2em;
transition: opacity 0.3s ease-in-out;
opacity: 0;
}
div.code-toolbar:hover > .toolbar {
opacity: 1;
}
/* Separate line b/c rules are thrown out if selector is invalid.
IE11 and old Edge versions don't support :focus-within. */
div.code-toolbar:focus-within > .toolbar {
opacity: 1;
}
div.code-toolbar > .toolbar .toolbar-item {
display: inline-block;
}
div.code-toolbar > .toolbar a {
cursor: pointer;
}
div.code-toolbar > .toolbar button {
background: none;
border: 0;
color: inherit;
font: inherit;
line-height: normal;
overflow: visible;
padding: 0;
-webkit-user-select: none; /* for button */
-moz-user-select: none;
-ms-user-select: none;
}
div.code-toolbar > .toolbar a,
div.code-toolbar > .toolbar button,
div.code-toolbar > .toolbar span {
color: #bbb;
font-size: .8em;
padding: 0 .5em;
background: #f5f2f0;
background: rgba(224, 224, 224, 0.2);
box-shadow: 0 2px 0 0 rgba(0,0,0,0.2);
border-radius: .5em;
}
div.code-toolbar > .toolbar a:hover,
div.code-toolbar > .toolbar a:focus,
div.code-toolbar > .toolbar button:hover,
div.code-toolbar > .toolbar button:focus,
div.code-toolbar > .toolbar span:hover,
div.code-toolbar > .toolbar span:focus {
color: inherit;
text-decoration: none;
}
|
1. Field of the Invention
The present invention relates to a liquid crystal display module and a back light for the same. More specifically, the present invention relates to a liquid crystal display module and a back light for the same having a dust-proof structure.
2. Description of the Related Art
A display device configured to integrate a liquid crystal panel with an illumination panel to enhance a dust-proof effect of a liquid crystal display module has been disclosed in Japanese Unexamined Patent Publication No. 2003-005658 (p. 2–3, FIG. 3 and FIG. 5), for example.
The display device disclosed in the publication includes a display unit which maintains a constant space between a display panel and an illumination panel for illuminating the display panel by use of a frame body. This display unit is covered with a protection cover unit. In particular, the frame body is made of a flexible member and protrusions are integrally formed on the frame body so as to fill the space between the protection cover and the frame body.
However, this display device adopts the structure of the frame body and an illumination mode of a front light version. Accordingly, application of this display device is limited to small-sized liquid crystal display products such as a portable terminal. It is difficult to apply the display device disclosed in the publication to medium-sized liquid crystal display products such as a notebook personal computer or to large-sized liquid crystal display products such as a PC monitor or a television.
There are two options applicable to the above-mentioned medium-sized or large-sized liquid crystal display devices for achieving the dust-proof effect, which are described below.
Firstly, FIG. 1 is a cross-sectional view of a liquid crystal display module adopting a side type back light representing a conventional example. Here, only the left half of the liquid crystal display module is illustrated herein as the liquid crystal display module has a substantially symmetrical shape.
Referring to FIG. 1, a liquid crystal display module 12 of a first conventional type includes a liquid crystal panel 2, a back light mechanism 11a for providing illumination light to this liquid crystal panel 2 from backside, and a frame mechanism. Moreover, particularly, inside a lower frame 9a of a box shape, the back light mechanism 11a includes lamps 8 as light sources, a reflector 6a for reflecting illumination light from the lamps 8, an optical waveguide 7 for guiding this illumination light to the backside of the liquid crystal panel 2, and an optical sheet 5 disposed to cover part of upper ends of this optical waveguide 7 and the reflector 6a. Meanwhile, for the purpose of protection against dust or impact, the frame mechanism includes an upper frame 1, an intermediate frame 4a, and the lower frame 9a for covering the periphery and upper and lower surfaces.
The back light mechanism 11a thus configured is called a side type back light because the lamps 8 are disposed on the side (hereinafter referred to as the side type back light 11a) Meanwhile, there is also a mode (a front light mode) regarding a small and thin liquid crystal display module which is configured to supply the illumination light from a front face side of the liquid crystal panel 2. However, consideration will be made herein only for the back light mode.
Moreover, in this liquid crystal display module 12, an elastic member 3a is fixed between the rear face of the liquid crystal display module 12 and the intermediate frame. 4a to maintain air tightness between the liquid crystal panel 2 and the side type back light 11a in light of dust protection.
This elastic member 3a is formed into a rectangular cross section and besides is fixed to a projecting flat surface of the intermediate frame 4a constituting the back light 11a with a double-faced tape. That is, this elastic member 3a is fixed to the flat surface opposed to the liquid crystal panel 2 with the double-faced tape. As a result, the liquid crystal panel 2 is mounted so as to contact the elastic member 3a.
For this reason, in a large-sized liquid crystal panel, for example, there is a risk that a gap is formed partially between the liquid crystal panel 2 and the elastic member 3a when planarity of a surface of the liquid crystal panel 2 contacting the elastic member 3a is compromised due to slight warpage. Moreover, when the liquid crystal display module 12 is used in the state placed upright on a floor surface and then tilted to some extent, the liquid crystal panel 2 comes close to the rear surface of the upper frame 1 and it becomes further prone to forming a gap between the liquid crystal panel 2 and the elastic member 3a. In this case, it is not possible to prevent intrusion of dust completely.
In the meantime, the elastic member 3a of the liquid crystal display module 12 is fixed to the rear surface of the upper frame 1 opposed to a display surface of the liquid crystal panel 2 with a double-faced tape. Moreover, a surface of the elastic member 3a opposed to the liquid crystal panel 2 comes close to the display surface of the liquid crystal panel 2. Here, since there is the gap between the liquid crystal panel 2 and the elastic member 3a, it is not possible to prevent intrusion of dust completely. Furthermore, in an attempt to reduce the gap between the liquid crystal panel 2 and the elastic member 3a as much as possible, the liquid crystal panel 2 and the elastic member 3a may completely abut on each other depending on quality of members such as the upper frame 1, and thereby puts a load on the liquid crystal panel 2. Therefore, the display performance of the liquid crystal panel 2 may be adversely affected, which may cause deterioration in display quality or yields.
Next, a liquid crystal display module of a second conventional type will be described. FIG. 2 is a cross-sectional view of a liquid crystal display module adopting a direct back light, which represents the liquid crystal display module of the second conventional type. Here, only substantially the left half of the liquid crystal display module 12 is illustrated herein as the liquid crystal display module also has a substantially symmetrical shape. Moreover, a direct back light 11b includes lamps 8 at the bottom of a reflector 6b, that is, directly below the liquid crystal panel 2. Accordingly, this is referred to as direct back light structure.
The liquid crystal display module 12 using this direct back light 11b includes the liquid crystal panel 2, the direct back light 11b, and a frame mechanism having an upper frame 1, an intermediate frame 4b, and a lower frame 9b. Inside the lower frame 9b, the direct back light 11b includes the lamps 8, and the reflector 6b for reflecting light emitted from these lamps 8 and directing the light efficiently to the liquid crystal panel 2 side through a diffuser 10 and an optical sheet 5.
In this liquid crystal display module 12,, an elastic member 3a having a rectangular cross section is fixed to a side surface of a lamp holder set 13 rendered detachable outward therefrom with a double-faced tape. Moreover, a constant gap is formed between the elastic member 3a and the intermediate frame 4b.
This gap between the elastic member 3a and the intermediate frame 4b is necessary for preventing detachment of members, interference, scratches and the like when detaching the lamp holder set 13. However, since there is no shielding from outside space, dust may intrude from the gap and the dust may reach the rear surface of the diffuser 10 or the front surface of the optical sheet 5, thereby causing deterioration in display quality or yields.
The above-described display device disclosed in Japanese Unexamined Patent Publication No. 2003-005658 intends to enhance dust-proof effect in a small-sized display instrument such as a portable terminal. Particularly, the illumination mode in this display device is of the front light type. That is, this is the type configured to locate an illumination panel above (in front of) a display panel. In this small-sized display instrument, the dust-proof effect is enhanced by providing a frame body with protrusions. This conventional example is intended for preventing intrusion of dust between the rear surface of a sensor device such as a touch panel and the front surface of a front light (an illumination panel), and is not intended for preventing intrusion of dust inside a liquid crystal display module such as a space between the rear surface of a liquid crystal panel and an optical sheet.
Moreover, since this display device includes the flexible frame body, the display device has poor rigidity. Therefore, from the viewpoints of protection of optical members and assembly performances, such a display device is hardly applicable to middle-sized or large-sized liquid crystal products. In addition, the frame body in this display device includes a protruded portion which is integrally formed thereon. Accordingly, a long period of time and high costs are required to modify the shapes of the frame body and the protruded portion.
Furthermore, in the conventional liquid crystal display modules explained with reference to FIG. 1 and FIG. 2, there is a gap between the elastic member and a member opposed to the elastic member. Accordingly, dust may intrude and deteriorates the display quality and the yields.
The present invention has been made in consideration of the foregoing problems. It is an object of the present invention to provide a liquid crystal display module and a back light for the same, which are capable of preventing intrusion of dust and enhancing display quality, vibration resistance, and impact resistance without adversely affecting a display condition of a screen by use of an elastic member represented by silicone rubber.
|
"For starters: the protests are not really about Halloween costumes or a frat party. They’re about a mismatch between the Yale we find in admissions brochures and the Yale we experience every day. They’re about real experiences with racism on this campus that have gone unacknowledged for far too long. The university sells itself as a welcoming and inclusive place for people of all backgrounds. Unfortunately, it often isn’t."
Because, as absurd and problematic as the countless calls for the players to have their scholarships revoked were, it’s equally absurd that a couple dozens or so kids threatening to not play one football game had such an extensive and decisive impact — on the college, the state, the conference, and the nation — that it took less than 72 hours to get the university president out. It’s nothing short of amazing that those kids had the wherewithal and courage to put their scholarships and livelihoods (current and future) on the line to stand up for what they believed in, and it’s nothing short of terrifying that nothing anyone else on that campus would have done would have mattered the same way. No hunger strikes — and thank you, Jonathan Butler, for sparking this flame — no protests, no petitions signed by students and teachers, no votes of no confidence would have earned the same result as quickly.
hello.
you blog holds my latest finds/thoughts/ramblings. not intended for normal edu-blogger consumption or modeling.lookdirectly below for our collection of more orderly-random (chaordic) thinking... if you are so inclined...
|
&FORCE_EVAL
METHOD Quickstep
&DFT
LSD
BASIS_SET_FILE_NAME /users/marcella/basis/ALL_BASIS_SETS
POTENTIAL_FILE_NAME /users/marcella/basis/POTENTIAL
&MGRID
CUTOFF 280
NGRIDS 1
&END MGRID
&QS
ALPHA0_H 10
EPS_GVG 1.0E-8
EPS_PGF_ORB 1.0E-8
EPSFIT 1.E-4
EPSISO 1.0E-12
EPSRHO0 1.E-8
LMAXN0 4
LMAXN1 6
METHOD GAPW
QUADRATURE GC_LOG
&END QS
&SCF
EPS_DIIS 0.4
EPS_SCF 5.0E-7
MAX_SCF 20
&MIXING
METHOD DIRECT_P_MIXING
ALPHA 0.4
&END
SCF_GUESS ATOMIC
&END SCF
&XAS
ATOMS_LIST 1 4
CONVERGENCE 0.00001
EACH_STEP 1
FNAME pippo
LOCALIZE_WFN
MAXSTEP 40
METHOD TP_HH
STATE_SEARCH 10
STATE_TYPE 1s
&END XAS
&XC
DENSITY_CUTOFF 1.0e-11
&XC_FUNCTIONAL Blyp
&END XC_FUNCTIONAL
&END XC
&END DFT
&SUBSYS
&CELL
ABC 10.0 10.0 10.0
&END CELL
&COORD
O -1.5574991518 5.5615110942 1.6017385036
H -1.1071155404 4.9123357898 1.0055969642
H -2.4841650102 5.5320929304 1.2848208725
O -0.0936672407 3.6972834592 -0.0942506957
H 0.3514665955 3.1856287764 0.6144874465
H 0.6019083928 4.3150027824 -0.4056961815
&END COORD
&KIND O
BASIS_SET 6-31G*
LEBEDEV_GRID 70
POTENTIAL ALL
RADIAL_GRID 300
&END KIND
&KIND H
BASIS_SET 6-31G*
LEBEDEV_GRID 60
POTENTIAL ALL
RADIAL_GRID 300
&END KIND
&END SUBSYS
&END FORCE_EVAL
&GLOBAL
PROJECT xas_6-31Gs
RUN_TYPE WFN_OPT
PRINT_LEVEL MEDIUM
&END GLOBAL
|
Therapeutic evaluation of solid lipid nanoparticle of quercetin in pentylenetetrazole induced cognitive impairment of zebrafish.
Quercetin is a major flavonoid in various plants. It possesses the multiple pharmacological actions like vascular integrity and regulatory action of the blood-brain barrier. The present study is focused on evaluating the role of solid lipid nanoparticle of quercetin in pentylenetetrazole (PTZ) induced cognitive impairment of Danio rerio species. The memory impairment of zebrafish was induced by exposing of PTZ in 7.5 mM solution. The pretreatment of solid lipid nanoparticle of quercetin (SLN-Q; 5 and 10 mg/kg) was administered by single intraperitoneal (i.p.) injection. The reference control i.e., donepezil (10 mg/kg) was administered by single intraperitoneal (i.p.) injection. The learning and memory levels were evaluated with different tests like light and dark chamber test; partition preference test; and three (horizontal) compartment tests. In addition, the PTZ induced biochemical changes such as acetylcholinesterase activity, lipid peroxidation, and reduced glutathione levels were assessed in the brain of zebrafish. The solid lipid nanoparticle of quercetin found to possess the attenuating effect in PTZ induced neurocognitive impairments along with amelioration of biochemical changes. This effect is similar to that of donepezil pretreated group. Therefore, this solid lipid nanoparticle of quercetin can be used as future nanomedicine for various neurodegenerative disorders like Alzheimer and Parkinson disorders due to its potential anti-oxidative, anti-lipid peroxidative and acetylcholinesterase inhibitory actions.
|
This invention relates to a narrow-band filter having a variable center frequency. Such a narrow-band filter is particularly useful for detecting a plurality of tone signals which have different frequencies.
In general, a narrow-band filter comprises an input terminal supplied with an input signal having a predetermined frequency, an output terminal, first through n-th low-pass filters which are connected in parallel to one another, where n represents a first positive integer greater than unity, a switching circuit connected to the first through the n-th low-pass filters, and a control circuit for controlling the switching circuit. The first through the n-th low-pass filters have the same filter characteristic and are collectively called an n-path filter. The control circuit delivers first through n-th switch driving signals to the switching circuit. Supplied with the first through the n-th switch driving signals, the switching circuit time divisionally connects the first through the n-th low-pass filters one by one between the input and the output terminals at a predetermined period Tp. As a result of switching operation of the switching circuit, the first through the n-th low-pass filters time divisionally filtering the input signal for first through n-th filtering durations, respectively. The first through the n-th filtering durations are equal to one another. In this event, the narrow-band filter has a single center frequency fc. Such a narrow-band filter is disclosed in Japanese Unexamined Patent Prepublication No. 16013/1985 (Tokkai Sho 60-16013).
In the meantime, a mobile radio telephone system of an AMPS type uses an SAT (Supervisory Audio Tone) signal in order to monitor a connection state of a radio channel. The SAT signal is carried by a radio signal and has one of first through third tone frequencies which are equal to 5970 (Hz), 6000 (Hz), and 6030 (Hz), respectively, and which are assigned to base stations. Let the mobile radio telephone system comprise first through third base stations which are assigned with the first through the third tone frequencies, respectively. When the first base station transmits the SAT signal having the first tone frequency, a mobile station receives the SAT signal transmitted from the first base station. When the mobile station detects the first tone frequency of the SAT signal, the mobile station transmits a transmission signal, as an answer back signal, having a frequency equal to the first tone frequency. On reception of the transmission signal having the frequency equal to the first tone frequency, the first base station confirms the fact that the radio channel is connected to the mobile station.
As apparent from the above description, the mobile station must discriminate a tone frequency among the first through the third tone frequencies. The narrow-band filter mentioned above is particularly useful for detecting the tone frequency. However, the mobile station must be provided with first through third narrow-band filters having first through third center frequencies which are equal to the first through the third tone frequencies, respectively. This is because the narrow-band filter detects a single tone frequency only. This means that the mobile station requires a receiver circuit of a large size for discriminating the tone frequency among the first through the third tone frequencies.
|
1. Recommendations for control of FCoV in catteries (Pedersen)
==============================================================
Due to time limits, the working group decided to concentrate on breeding and rescue catteries rather than veterinary practices, shows or boarding catteries as recommendations for the former would apply to the latter. We are using the generic term 'feline coronavirus' for a common RNA-containing virus in accordance with the guidelines set out in the Fifth International Symposium on Coronaviruses ([@BIB12]). Feline coronavirus (FCoV) is comprised of two closely related biotypes: (1) a ubiquitous form present in virtually all large multi-cat environments which leads to seroconversion and causes very little disease, known as feline enteric coronavirus (FECV) and (2) a much less common mutant form of FECV that has gained the ability to replicate in macrophages, and causes feline infectious peritonitis known as FIP virus (FIPV). Both biotypes exist in at least two strains (types I and II) with large numbers of genetic variants.
FIP is the major consequence of feline coronavirus infection, and because FIPV occurs as a mutant of the common FCoV, control of FIP must be directed first at control of its parent virus, and should that fail, at the FIPV itself.
1.1. Early weaning and isolation
--------------------------------
Isolation of queens 2--3 weeks prior to parturition, strict quarantine of queen and kittens, and early weaning at 4--6 weeks of age is one means to prevent FCoV infection. This procedure is based on the findings that some queens do not shed the virus, some queens will stop shedding after several weeks if not re-exposed, and that even if they do shed, very young kittens have maternal resistance to the virus ([@BIB1]). Therefore, if you can prevent outside infection, you should be able to remove the kittens from the queen before they can be infected and then continue to raise them clear of the infection. Early weaning and isolation is not just a good idea for the control of FCoV, but also for the control of feline calicivirus, feline herpesvirus, *Bordetella bronchiseptica*, *Microsporum* spp. and the many enteric infections to which kittens are susceptible.
Although straightforward in concept, isolation of queens and early weaning is not as simple as it may seem. The procedure requires quarantine rooms and procedures that absolutely ensure that new virus does not enter. It also works best when the isolated queens are not shedding FCoV, when they are shedding low levels, or when they can clear the infection early after being isolated. The single factor that most assures these conditions is the number of animals. The success of early weaning and isolation in FCoV control depends on effective quarantine and low numbers of cats in the household, preferably under 5 or 6. If there are less than 5 or 6 cats, the chances of there being high or persistent shedders is low. Also, human abodes do not easily allow for adequate quarantine space for large numbers of queens and kittens and the time and money required to maintain quarantine goes up in proportion to the number of queens and litters under quarantine. As examples of environment and cat numbers, all kittens under 8 weeks old submitted to a USA shelter were FCoV negative ([@BIB16]). These were kittens that largely came from one-queen homes. In contrast, a Swiss studyin large catteries demonstrated viral infection of kittens as young as 2 weeks old ([@BIB13]). It is clear that low FCoV exposure will delay infection, while high exposure can overcome maternally derived immunity at an early age.
There are two essential downsides of isolation and early weaning. The first is that it is not easy to do and will fail if conditions are not proper. Second, some breeders believe that early weaning exacts a social price on the kittens. In recognition of both concerns, the group recommended that early weaning not be undertaken without careful consideration. FCoV-free households would not be required to undertake routine isolation and early weaning. Where kittens are isolated with their queen, extra care must be taken during the 2--7 weeks-of-age period to socialise the kittens. The success of early weaning should also be measured, and not continued in situations where it is not working. Kittens that have been successfully reared free of the FCoV should be antibody negative at 12 weeks of age. If they are antibody positive, it means that they have been infected with the virus.
Even if kittens can be raised free of FCoV, it is clear that they may become infected sooner or later. The virus is very widespread, even among outdoor cats, and it is easily carried on clothes, hair, hands, shoes, etc. ([@BIB14]). Therefore, the objective of isolation and early weaning should not be to prevent infection forever, but to delay it. It is known that immunity to FIPV does not develop until around 16 weeks of age (based on experience with Primucell^®^ vaccine (Pfizer) (reviewed by [@BIB15])). We also have anecdotal evidence that FIPV infection in shelter and cattery kittens occurs in the first 2 months or so of life, even though the actual disease may not appear outwardly for many weeks, months, and sometimes years.
1.2. Measurement of antibody titres and viral load
--------------------------------------------------
FCoV serology (also known as FIP serology) can be of some value, but only if it is performed accurately and expressed as an endpoint titre ([@BIB13]), For instance cats with very low titres (1:25 or below) are often shedding no or low levels of virus ([@BIB3]), and will frequently stop shedding when isolated. Cats with high titres (1:400) are almost always shedding high levels of virus. Some of these cats will stop shedding upon isolation, and this will be demonstrated by adecrease in their titre to low or negligible levels. If a cat is persistently shedding virus, the titre will always remain high. If laboratories cannot offer accurate antibody testing, than the alternative is for commercial laboratories to make available quantitative RT--PCR to measure viral load. PCR based tests would be a direct measure of virus shedding. Veterinarians would be supplied with a faecal swab in a tube and a bar code. This would allow for accurate submission of samples.
1.3. Genetic markers in the cat
-------------------------------
We know that three groups of FCoV shedders exist: (1) those that shed high levels of virus all of the time (about 10--15%), (2) those that seem to be immune to the virus and never shed (less than 5%), and (3) those that continuously lose and re-acquire the infection (about 70--80%) ([@BIB3]; [@BIB8]). Do high shedders or resistant cats have genetic markers for either state? Susceptibility to FCoV infection is likely to be different to susceptibility to the mutant FIPV. We know that the heritability of FIP is about 50%; susceptible cats being approximately twice as likely to develop FIP as other cats ([@BIB7]). That is why we do not recommend breeding cats that have thrown kittens that later developed FIP. This would be especially true of toms, which can sire so many more kittens and therefore have a greater genetic influence on the bloodline.
1.4. Genetic markers of the virus
---------------------------------
Are some FCoV strains more likely to mutate and thus cause FIP? We see some households without any cat deaths, despite endemic FCoV, while other households suffer many cases of FIP.
1.5. Vaccination
----------------
A FCoV vaccine may well be different from an FIPV vaccine, just as immunity to the two biotypes of the virus may differ. However, doubt was expressed about the possibility of ever developing a successful vaccine to the non-mutated form of FCoV (or FECV), because no vaccine can work better than natural infection. Most infected cats develop immunity, but the immunity disappears when the virus is controlled and the cats are then reinfected. Most cats are repeatedly infected with the same strain of FCoV, as well as by different strains ([@BIB4]). Panleucopenia vaccines work well because most cats in nature recover from theinfection. Where hosts do not have good immunity, we often do not have good vaccines, e.g. feline calicivirus.
1.6. Shelters
-------------
Forty percent of young cats in the USA are now coming from shelters. Previously people acquired kittens from newspaper advertisements and word of mouth. [@BIB16]found that admission into a rescue cattery resulted in high levels of shedding of feline calicivirus, herpesvirus and coronavirus. All of these viruses can cause long term consequences in an infected cat. Shelters need to optimise facilities and husbandry so they can be cleaned easily and minimise virus spread. It is essential to decrease viral load and stress levels in shelters.
2. Recommendations for diagnosing FIP (especially with regard to RT--PCR tests) and treatment (Paltrinieri)
===========================================================================================================
2.1. Serology and RT--PCR
-------------------------
At the present time, FIP cannot be diagnosed solely by serology or on a positive RT--PCR test. In particular, no specific data regarding the pathogenic role of some mutated genes or proteins, detectable by RT--PCR or serology, have been published in independent peer reviewed scientific journals. The diagnosis of FIP is based on the history of the animal, the history of the disease signs, on gross clinical abnormalities, and a number of suggestive (but not specific) abnormal laboratory findings. Immunohistochemistry to identify viral proteins in macrophages within lesions can be used on tissues taken at biopsy or necropsy. Positive immunohistochemical staining of macrophages within lesions is considered the most definitive test for FIP. However, the possibility of detecting replicating FCoVs within circulating monocytes by RT--PCR was presented at this meeting and looks promising ([@BIB17]). Based on the assumption that only mutated FCoV can replicate within monocytes, this test or other future tests based on biologic behaviour of mutated FCoVs, might have a high diagnostic significance. More detailed descriptions of diagnostic tests are given below.
2.2. Recommended tests for diagnosing FIP
-----------------------------------------
The most important tests for FIP are not laboratory, but rather historical. Most cats with FIP are from 6 months to 3 years of age, come from shelters or catteries, and show signs of cyclical antibiotic resistant fevers and specific physical manifestations depending on the form of the disease and location of lesions. A second tier of test findings include characteristic analysis of peritoneal or pleural effusions, elevated white blood cell counts with neutrophilia and lymphopenia, elevated globulin levels, and non-regenerative anaemia of chronic disease and hypoalbuminemia, andelevated fibrinogen. Laboratory tests, such as the serology and RT--PCR should comprise a third tier of diagnostics. Because a wide range of tests is quite expensive, it is prudent to start with basic tests first and add additional procedures only if preliminary testing justifies them. For these reasons we recommend starting with a laboratory approach only when the clinical signs are strongly suggestive of FIP and keeping in mind a list of possible differential diagnoses. This might help to choose the best panel of tests to apply to your case.
### 2.2.1. Analysis of the effusion
In the case of suspect effusive FIP, the analysis of the effusions remain the best diagnostic method, although it can be supported by other clinico-pathological changes. In particular, protein and globulin determination, cytology and bacterial cultures should be performed. These tests might strongly support the diagnosis of FIP, when high proteins and/or globulin concentrations are found in a sterile effusion with cytologic signs of a non-specific inflammatory process. In any case, they will rule out septic effusions and neoplasia (mainly lymphomas), but might not be enough to differentiate FIP from, for example, cholangiohepatitis. The detection of FCoVs in the effusion is the only conclusive test in these cases. To do this, immunocytologic techniques (immunofluorescence, immunohistochemistry) are preferable to the detection of FCoV genome by RT--PCR: although RT--PCR might easily detect FCoV in the effusions ([@BIB11]), as previously stated, it is a very sensitive technique and can detect any small amount of virus that might extravasate from blood to the effusion during every inflammatory process in cats with circulating FCoVs. In contrast, immunocytology detects only large amounts of virus and, moreover, allows identification of macrophages as the cells carrying the FCoVs. A positive result using these techniques can thus confirm the diagnosis of FIP, while an eventual negative result does not exclude the disease ([@BIB9]). In these cases, as in dry forms, the detection of other clinico-pathological changes is needed to support the clinical diagnosis of FIP.
### 2.2.2. Non-effusive FIP
In dry forms, a list of possible differential diagnoses must also be considered to suggest the best diagnostic approach. It is not possible in this report, to list all possible differential diagnoses, due to the extreme variability in clinical signs detectable in dry forms. This list, however, should include any possible cause of fever of unknown origin (FUO), uveitis, neurological alterations, hepatic or renal failure. The panel of tests to be used should be decided based on these symptoms and should always include a complete CBC (non-regenerative anaemia, neutrophilic leukocytosis and in particular, lymphopenia might have a high diagnostic value for FIP), the determination of the albumin/globulin ratio, eventually followed by a serum protein electrophoresis in the case of high globulins (*α* ~2~and *γ*-globulins are expected to be elevated during FIP), and the measurement of *α* ~1~-acid glycoprotein levels (high concentrations of this protein, although not specific, might be strongly suggestive of FIP; [@BIB6]). Although none of the above mentioned changes is per se suggestive of FIP, the presence of multiple alterations in cats with symptoms suggestive of FIP might highly increase the probability of correctly diagnosing the disease. Other tests might also be considered: in pure neurologic forms, for example, diagnostic imaging can exclude the presence of intracranial tumours, and antibody titre in CSF can be evaluated and compared to those in blood; a high CSF/blood ratio might be detected during FIP, based on the assumption that antibodies are produced within the CNS but the results of this test must be carefully considered, since alterations of the blood--brainbarrier (BBB) are often present during FIP. The presence of a BBB damage can be excluded by measuring the serum:CSF ratio of antibodies against other infectious agents (e.g. herpesviruses). The cost/benefit ratio of such a complicated panel of tests, however, strongly reduces its practical use. The detection of histologic lesions consistent with FIP has been considered the only conclusive test for FIP for a long time ([@BIB5]) and the finding of viral antigen in the lesions using immunofluorescence or immunohistochemistry (again, RT--PCR, is too sensitive) allows further confirmation of the diagnosis. Unfortunately, surgical biopsies cannot be taken frequently during FIP, due to the poor general conditions of the affected cats. The probability of detecting histologic lesions or positive macrophages in ultrasound-guided tru-cut biopsies (TCB) or in fine needle aspiration biopsies (FNA) is very low and negatively correlated with the extension of the pyogranulomatous foci (Paltrinieri, manuscript in preparation). Based on the general health status, the clinician should then decide among the following three diagnostic approaches: expose the cat to the risk of anaesthesia and laparoscopy/laparotomy to obtain surgical biopsies and gather a conclusive diagnosis of FIP; perform a non-invasive bioptic technique (TCB, FNA) with the possibility of a false negative result; obtain only a presumptive diagnosis based on clinico-pathological changes. A presumptive diagnosis, however, would be not enough to subject the cat to any treatment.
In conclusion, the only conclusive diagnosis of FIP must be obtained by the detection of FCoVs within macrophages in the effusions or within the lesions detected in surgical biopsies. If such an approach cannot be followed, the presence of multiple clinico-pathological changes might support the clinical diagnosis of FIP in both wet and dry forms. Serology and RT--PCR are much more useful in the cattery management than in the diagnosis of the disease.
2.3. Recommendations on treatment of FIP
----------------------------------------
No therapies have been proved to be effective for FIP, and the use of alternative treatments and so-called immunosuppressive or immunomodulating drugs should be suspect. Although encouraging results obtained using feline recombinant feline interferon have been presented at this meeting ([@BIB10]) further data are needed before recommendation of extensive use of this treatment. The best treatment at the present time is to stage the disease and treat symptomatically. As long as the cat is eating, feeling relatively well, and not losing weight, affected animals should be fed a high quality diet and kept as stress free as possible. In contrast, if the cat is losing condition, is suffering from specific debilitating signs of the disease, and has a poor quality of life, treatment should be counselled against. Severely affected animals should then be euthanased, due to short survival expectation. Even in cats with mild initial disease signs, the ultimate mortality is over 95%. However, miracle cures do happen from time to time, and miracles cannot happen unless they are allowed time to happen.
3. Recommendations for priority areas of future FCoV research (Addie)
=====================================================================
1.In the absence of an effective vaccine, it was considered a priority to prevent cats becoming infected with FCoV at all. It was considered important to look at ways of minimising virus dose. Existing cat litters need to be checked for their ability to limit FCoV transmission by biocidal action and/or good clumping. The effect of flushing litter trays on FCoV spread needs to be investigated.2.The ideal vaccine should protect against FIP, give good mucosal immunity to prevent infection and reduce virus shedding. Development of a therapeutic vaccine should also be considered, both to treat cats with FIP and to attempt to stop carrier cats from shedding. For the latter, it is essential to establish where the virus is in carrier cats (the ileum and colon are the most likely areas) so that immune clearance of virus from this area is taken into consideration in vaccine development.3.The group was concerned about antibody dependent enhancement (ADE) being a laboratory artefact ([@BIB2]) and thatexperimental vaccines which might have worked perfectly well in the field had been rejected because in experimental infections they caused ADE. A reasonable challenge virus needs to be defined. The 79-1146 strain is probably not a good choice, since it is extremely virulent and also is a type II FCoV. The working group called for standardisation of vaccine challenge protocols worldwide, using a constant virus dose, strains more representative of natural infection (including types I and II) and natural exposure challenge (i.e. challenge not given parenterally). The virus dose threshold over which FIP develops would need to be established. A challenge virus stock should be made and stored in two or three locations worldwide and supplied from there to those working on novel vaccines.4.The current belief is that cats with FIPV do not transmit the mutant virus to other cats ([@BIB18]). Studies have shown that 40% or more of cats with FIP shed FCoV from their gut, but that the virus is of the intestinal type and will not cause FIP when given to susceptible kittens (Foley, J.E., and Pedersen, N.C., UC Davis, unpublished information). In contrast, virus taken from internal lesions readily induces FIP. The FIP causing virus is only present within macrophages in internal lesions, where it has no access to the outside. However, some investigators have seen 'outbreaks' of FIP, which can best be explained by an FIPV carrier. Although there are alternative explanations for such mini-epidemics, it is theoretically possible for cats with lesions in their kidneys or intestinal wall to shed FIPV in urine or feces.5.More molecular work needs to be undertaken on the exact mutations that cause FCoVs to become FIPVs and how these mutations change the behavior of the virus:◦to establish whether all FIPVs have 3c deletions◦to define the functions of non-structural proteins 3a, b, c and 7a and b◦to do a worldwide phylogenetic study so that future vaccines will cover as many natural FCoV strains as possible.6.More work needs to be undertaken to grow the type I FCoV in cell culture. Different cell lines should be tried, and if that fails, the type I receptor needs to be found and cloned into a cell line.7.More work is required to understand exactly what FIPV does in the infected macrophage. In addition, the cytokine profiles of naturally infected cats needs to be determined.8.The phenomenon of resistant cats requires further investigation. Might it be possible to breed cats resistant to FCoV infection? Could resistant cats simply have been exposed very early in life (e.g. in the first week) and therefore have become immune tolerant?9.Since the research community in FCoV is small, it is important that we exchange ideas more often and work together. An email newslist will be established and the [www.felinecoronavirus.com](http://www.felinecoronavirus.com) website will continue as a place where researchers can list available reagents.
The authors would like to thank all the participants of these three workshops for their contributions. We would also like to thank the sponsors of the SIFFS for their generous financial support:American Association of Feline Practitioners, Biogal Galed Laboratories, Cats Protection, Center for Companion Animal Health, Intervet, Kyoritsu Seiyaku Corporation, Merial, the Orion Foundation, Schering Plough, Pharmacia, Virbac and the Winn Foundation.
|
I’ve had an entire jar of sesame seeds since well, forever. The other day one of my good friends asked me if I had ever tried sesame milk…when someone asks me something like that I definitely have to try it (providing it’s vegan of course!).
So this one is for you my nut-free friends! I’m a bit of a freak for vanilla so I’ve used quite a bit of vanilla powder here – feel free to reduce it if you’re not so much of a fan!
The beautiful cups in the photos are made by Jono Smart.
INGREDIENTS
For the milk
1 cup sesame seeds, soaked for 2-4 hours
3 cups water
1/4 tsp vanilla powder
1 tsp maple syrup
Pinch of sea salt
For the latte
1 shot espresso (I used this blend by Squaremile Coffee Roasters)
Sweetener to taste
|
Hydraulic braking systems are known in which the brake force applied by the driver to the brake pedal is transformed via a hydraulic brake cylinder and a brake servo unit into a hydraulic brake pressure, with the aid of which brake linings are applied to a brake disk. In the case of a failure of the brake servo unit, for example, a hydraulic pump, the brake boost is only available via the brake cylinder. In this connection, a hydraulic dead volume must initially be delivered before the brake force is built up in order to achieve a significant braking effect.
Furthermore, parking brakes are known in vehicles, which have an electric brake motor which, when actuated, pushes a brake piston, which is the carrier of a brake lining, against the brake disk. Such a parking brake is described, for example, in Germen Patent No. 103 61 042.
|
<?xml version="1.0" encoding="UTF-8"?>
<resources>
<string name="lichessClasses">Classes</string>
<string name="teachClassesOfChessStudents">Teach classes of chess students with the Lichess Classes tool suite.</string>
<string name="features">Features</string>
<string name="quicklyGenerateSafeUsernames">Quickly generate safe usernames and passwords for students</string>
<string name="trackStudentProgress">Track student progress in games and puzzles</string>
<string name="messageAllStudents">Message all students about new class material</string>
<string name="freeForAllForever">100% free for all, forever, with no ads or trackers</string>
<string name="applyToBeLichessTeacher">Apply to be a Lichess Teacher</string>
<string name="noClassesYet">No classes yet.</string>
<string name="teachersX">Teachers: %s</string>
<string name="newClass">New class</string>
<string name="closeClass">Close class</string>
<string name="closedByX">Closed by %s</string>
<string name="reopen">Reopen</string>
<string name="removeStudent">Remove student</string>
<string name="removedStudents">Removed</string>
<string name="inviteTheStudentBack">Invite the student back</string>
<string name="sendAMessage">Send a message to all students.</string>
<string name="aLinkToTheClassWillBeAdded">A link to the class will be automatically added at the end of the message, so you don't need to include it yourself.</string>
<string name="className">Class name</string>
<string name="classDescription">Class description</string>
<string name="visibleByBothStudentsAndTeachers">Visible by both teachers and students of the class</string>
<string name="teachersOfTheClass">Teachers of the class</string>
<string name="addLichessUsernames">Add Lichess usernames to invite them as teachers. One per line.</string>
<string name="theyMustFirstApply">They must first apply to be Lichess Teachers.</string>
<string name="resetPassword">Reset password</string>
<string name="makeSureToCopy">Make sure to copy or write down the password now. You won’t be able to see it again!</string>
<string name="passwordX">Password: %s</string>
<string name="generateANewPassword">Generate a new password for the student</string>
<string name="invitedToXByY">Invited to %1$s by %2$s</string>
<string name="realName">Real name</string>
<string name="privateWillNeverBeShown">Private. Will never be shown outside the class. Helps remember who the student is.</string>
<string name="addStudent">Add student</string>
<string name="lichessProfileXCreatedForY">Lichess profile %1$s created for %2$s.</string>
<string name="studentCredentials">Student: %1$s
Username: %2$s
Password: %3$s</string>
<string name="inviteALichessAccount">Invite a Lichess account</string>
<string name="inviteDesc1">If the student already has a Lichess account, you can invite them to the class.</string>
<string name="inviteDesc2">They will receive a message on Lichess with a link to join the class.</string>
<string name="inviteDesc3">Important: only invite students you know, and who actively want to join the class.</string>
<string name="inviteDesc4">Never send unsolicited invites to arbitrary players.</string>
<string name="createANewLichessAccount">Create a new Lichess account</string>
<string name="createDesc1">If the student doesn't have a Lichess account yet, you can create one for them here.</string>
<string name="createDesc2">No email address is required. A password will be generated, and you will have to transmit it to the student, so they can log in.</string>
<string name="createDesc3">Important: a student must not have multiple accounts.</string>
<string name="createDesc4">If they already have one, use the invite form instead.</string>
<string name="lichessUsername">Lichess username</string>
<string name="generateANewUsername">Generate a new username</string>
<string name="welcomeToClass">Welcome to your class: %s.
Here is the link to access the class.</string>
<string name="invitationToClass">You are invited to join the class "%s" as a student.</string>
<string name="clickToViewInvitation">Click the link to view the invitation:</string>
<plurals name="nbPendingInvitations">
<item quantity="one">One pending invitation</item>
<item quantity="other">%s pending invitations</item>
</plurals>
<string name="noPendingInvitations">No pending invitations</string>
<string name="onlyVisibleToTeachers">Only visible to the class teachers</string>
<string name="lastActiveDate">Active</string>
<string name="managed">Managed</string>
<string name="thisStudentAccountIsManaged">This student account is managed</string>
<string name="upgradeFromManaged">Upgrade from managed to autonomous</string>
<string name="release">Release</string>
<string name="releaseTheAccount">Release the account so the student can manage it autonomously.</string>
<string name="releaseDesc1">A released account cannot be made managed again. The student will be able to toggle kid mode and reset password themselves.</string>
<string name="releaseDesc2">The student will remain in the class after their account is released.</string>
<string name="realUniqueEmail">Real, unique email address of the student. We will send a confirmation email to it, with a link to release the account.</string>
<string name="teachers">Teachers</string>
<plurals name="nbTeachers">
<item quantity="one">Teacher</item>
<item quantity="other">%s teachers</item>
</plurals>
<plurals name="nbStudents">
<item quantity="one">Student</item>
<item quantity="other">%s students</item>
</plurals>
<string name="students">Students</string>
<string name="progress">Progress</string>
<string name="noStudents">No students in the class, yet.</string>
<string name="noRemovedStudents">No removed students.</string>
<string name="overDays">Over days</string>
<string name="timePlaying">Time playing</string>
<string name="variantXOverLastY">%1$s over last %2$s</string>
<string name="winrate">Win rate</string>
<string name="na">N/A</string>
<string name="news">Class news</string>
<string name="editNews">Edit news</string>
<string name="notifyAllStudents">Notify all students</string>
<string name="nothingHere">Nothing here, yet.</string>
<string name="newsEdit1">All class news in a single field.</string>
<string name="newsEdit2">Add the recent news at the top. Don't delete previous news.</string>
<string name="newsEdit3">Separate news with ---
It will display a horizontal line.</string>
<string name="markdownAvailable">%s is available for more advanced syntax.</string>
</resources>
|
The accent still says Pittsburgh. The coaching resume still says Pittsburgh. The chin still says Pittsburgh.
But ask Bill Cowher where he comes from and the words say something else — much to his own surprise.
“I’m a full-fledged New Yorker,” he said. “It’s hard for me to say that. That’s something I never thought I would say. People ask me where I’m from and I go, ‘New York City.’ [They say], ‘Are you?’ ‘Yup, I am.’ ”
This was early on a recent afternoon as the western Pennsylvania native, former Steelers coach and current CBS analyst approached his apartment building on East 64th Street after an outdoor lunch and stroll in Central Park.
The sun was shining, leaves were turning, tourists were teeming. And if ever someone embodied The New Yorker by adoption that E.B. White described in a 1948 essay, it is Cowher.
“Commuters give the city its tidal restlessness,” White famously wrote. “Natives give it solidity and continuity; but the settlers give it passion.”
Cowher’s passion grew when he settled here in 2010, shortly after his wife, Kaye, died of cancer and around the time his three daughters were growing up and out of the house.
Subscribe to Sports Now newsletter By clicking Sign up, you agree to our privacy policy.
He already was working Sundays at CBS and commuting to his home in North Carolina. So he rented a place, found himself spending more time there, met the woman who would become his second wife, bought an apartment in 2012, got remarried in 2014, and here we are.
“The more I was up here, given everything, it was kind of like a new start, a fresh start,” he said. “It was a place with all these people; I was embracing that. It has all these little places you can go and kind of be yourself. That was what I probably needed at the time.”
At 60, he might not need it any longer, but he wants it, and does not see that changing. Why should it?
His wife, Veronica, a musician known professionally as Queen V, is a New York-area native — and a big Jets fan. One of his daughters (and one of his three grandchildren) lives in Brooklyn.
He does not worry about parking. His car is in North Carolina.
He likes his job at CBS and said it is “highly unlikely” he will coach again, 12 years after the last of his 15 seasons with the Steelers.
And he likes being just another face in the crowd, embracing the “obscurity.”
Over 90 minutes, one grilled cheese sandwich lunch (with lemonade) and four miles of walking, he was approached only twice, by middle-aged men who called him “Coach.”
“I walk over here quite frequently, and when you walk into the park, it’s another country,” he said. “There’s such a great mix of people. Periodically you’ll run into somebody who speaks English.”
Not that he minds being recognized by the few passers-by who can spell “Roethlisberger.” He is far more comfortable with it than he was in the Pittsburgh fishbowl, where his daughters once asked him not to join them at the mall for fear of the hassles that would ensue.
“It hit home,” he said. “I said, wow, that’s where I’m at. That was one of the things I always will remember. It was nothing negative. It was just a reality of where I was. But I’m very normal. Normality is very important to me.
“For me, now, the being recognized part of it, it’s for what you’ve done. It’s for the past. It’s not now. So that in itself is very flattering, and it’s great. It’s a positive thing.”
Veronica said 99.9 percent of Bill’s interaction with the public is positive. “There’s a lot of quote-unquote man love, as I call it, but the lady fans appreciate him too, and I get it and I back it, obviously,” she said. “I think he’s the greatest in my eyes.”
And then there is the city itself. Cowher and Veronica, whom he calls “V,” take full advantage, including theater, concerts, restaurants, biking and simple pleasures such as the view west from their 36th-floor apartment.
“I think Central Park is one of the great wonders of the world,” he said, sitting outside the boathouse. “You think about the people, the foresight they had, to leave this undeveloped in the middle of one of the most developed cities in the world. It’s so unique, so special.”
As he strolled, the park at times seemed almost too scenic to be true, as if someone had set it all up for a movie shoot — a saxophone player, a political protester, a child climbing on the Balto statue.
“You never know what you’re going to run into,” Cowher said, smiling the smile of an unjaded relative newcomer.
Veronica grew up in Montclair, New Jersey. She said showing Bill around has helped her rediscover the city of her own youth and made her appreciate it all the more.
“It is interesting to see it through someone else’s eyes,” she said. “When you grow up around it, you take a lot of things for granted.”
Cowher, whose mother and two brothers still live in the Pittsburgh area, seems to have found a sweet spot as a guy famous for his intensity, mellowed by age and a saner lifestyle.
“I think that’s probably helped him fit in so well into New York City; you still have to have a certain amount of intensity to live here,” Veronica said. “I think finding the balance is what’s key to everything, even though none of us hardly ever find it. But we’re always striving to.”
On Thursday, Cowher will be at The Cutting Room in Manhattan, where Veronica will headline a concert and party to celebrate the launch of her new album, “Bridges Vol. 2,” which is due out the following day.
Let’s just say it is not the sort of scene Cowher likely imagined for himself while growing up in suburban Pittsburgh. But that was then. This is now, and he hopes it will be forever.
“When I first came up here, I couldn’t get out of here fast enough, to be honest with you, because it was too fast and it felt too cluttery, just too many people in a small space,” he said.
“Once you get to know the city and get acclimated to the people, it’s a really neat place and offers so much to do. The vibrancy in itself, you feel it. To me, it’s home.”
|
LAST OF THE BOERS
€10.00
The Last of the Boers is a documentary film produced by Mel Ve.
Mel Ve is a South African born humanitarian, activist, author and independent media icon, who is descended from the Boers. This documentary tells the story of the people Mel Ve left behind in South Africa, and who are being genocidally slaughtered.
This controversial documentary film tells the story of the Boers, who they were, and why they were so important in South Africa’s history. We explore the events that led to the Anglo Boer wars, in which the Boers fought for their freedom from the forces of Imperialism.
Mel Ve controversially explores the true facts pertaining to APARTHEID, explaining some of the fallacies and lies that the world was fed in order to brainwash them into supporting the eventual presidency of Nelson Mandela, a known communist, terrorist and murderer.
With half the population living in poverty, and the highest violent crime rate in the world, many are wondering how such a beautiful country got to this state. This documentary sheds light on the tragedy that is happening in South Africa, which is a direct result of the globalisation agenda fronted by the Elite.
THE LAST OF THE BOERS was banned on You Tube with over 66 250 views. Due to the constant demands to find an alternative platform to host this documentary, THE LAST OF THE BOERS has now been made available to download
Description
The Last of the Boers is a documentary film produced by Mel Ve.
Mel Ve is a South African born humanitarian, activist, author and independent media icon, who is descended from the Boers. This documentary tells the story of the people Mel Ve left behind in South Africa, and who are being genocidally slaughtered.
This controversial documentary film tells the story of the Boers, who they were, and why they were so important in South Africa’s history. We explore the events that led to the Anglo Boer wars, in which the Boers fought for their freedom from the forces of Imperialism.
Mel Ve controversially explores the true facts pertaining to APARTHEID, explaining some of the fallacies and lies that the world was fed in order to brainwash them into supporting the eventual presidency of Nelson Mandela, a known communist, terrorist and murderer.
With half the population living in poverty, and the highest violent crime rate in the world, many are wondering how such a beautiful country got to this state. This documentary sheds light on the tragedy that is happening in South Africa, which is a direct result of the globalisation agenda fronted by the Elite.
THE LAST OF THE BOERS was banned on You Tube with over 66 250 views. Due to the constant demands to find an alternative platform to host this documentary, THE LAST OF THE BOERS has now been made available to download
Reviews
Download Last Of The Boers here
The Last of the Boers is a documentary film produced by Mel Ve.
Mel Ve is a South African born humanitarian, activist, author and independent media icon, who is descended from the Boers. This documentary tells the story of the people Mel Ve left behind in South Africa, and who are being genocidally slaughtered.
This controversial documentary film tells the story of the Boers, who they were, and why they were so important in South Africa’s history. We explore the events that led to the Anglo Boer wars, in which the Boers fought for their freedom from the forces of Imperialism.
Mel Ve controversially explores the true facts pertaining to APARTHEID, explaining some of the fallacies and lies that the world was fed in order to brainwash them into supporting the eventual presidency of Nelson Mandela, a known communist, terrorist and murderer.
With half the population living in poverty, and the highest violent crime rate in the world, many are wondering how such a beautiful country got to this state. This documentary sheds light on the tragedy that is happening in South Africa, which is a direct result of the globalisation agenda fronted by the Elite.
THE LAST OF THE BOERS was banned on You Tube with over 66 250 views. Due to the constant demands to find an alternative platform to host this documentary, THE LAST OF THE BOERS has now been made available to download
Download a copy of DRAGONOLOGY BOOK I | SPELLBREAKER
Download a copy of DRAGONOLOGY BOOK I | SPELLBREAKER
SPELL BREAKER is the first book in the DRAGONOLOGY series, and tracks the roots of our modern day CULTure, by taking the reader on a journey through history, mythology and fairytale, whilst exploring art, sculpture, architecture, literature and the real meaning of words through etymological deconstructions, to decipher the many symbols that mask the existence of the DRAGON. –
Latest Comments
Sign In
Reset Your Password
By continuing to use the site, you agree to the use of cookies. more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.
|
Q:
Creating COM object from C++?
I want to create a dll from a C++ code and the use it in C#. Is there a solution of creating COM object from C++ ?
I don't want to use System.Runtime.InteropServices.
Many thanks
A:
Of course that you can write COM+ objects with C++. Here's a tutorial.
A:
You can write COM directly (see @Darin Dimitrov's answer), but you can also use ATL. My favorite solution to expose C++ code to C# (without COM though) is to use C++/CLI.
|
Virus and Anti Viruses
A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code. Infected computer programs can include, as well, data files, or the "boot.
Viruses: A virus is basically an executable file which is designed such that first of all it should be able to infect documents, then it has to have the ability to survive by replicating itself and then it should also be able to avoid detection.Computer viruses can be classified into several different types. Antiviruses: The ideal solution to the threat of viruses is prevention.
Do not allow a virus is get into the system in first place. This goal is in general difficult to achieve, although prevention can reduce the no: of successful viral attacksIn the mid-eighties, so legend has it, the Amjad brothers of Pakistan ran a computer store. Frustrated by computer piracy, they wrote the first computer virus, a boot sector virus called Brain. From those simple beginnings, an entire counter-culture industry of virus creation and distribution emerged, leaving us today with several tens of thousands of viruses. In just over a decade, most of us have been familiar with the term computer virus.
Virus: What exactly is a Virus?
A virus is basically an executable file which is designed such that first of all it should be able to infect documents, then it has to have the ability to survive by replicating itself and then it should also be able to avoid detection. Usually to avoid detection, a Virus disguises itself as a legitimate program which the user would not normally suspect to be a Virus. Viruses are designed to corrupt or delete data on the hard disk i.e. on the FAT (File Allocation Table).
TYPES OF VIRUSES
Computer viruses can be classified into several different types.
1. File or program viruses:
Some programs are viruses in disguise, when executed they load the virus in the memory along with the program and perform the predefined steps and infect the system. They infect program files like files with extensions like .EXE, .COM , .BIN , .DRV and .SYS. Some file viruses just replicate while others destroy the program being used at that time.
2. Boot Sector Viruses (MBR or Master Boot Record)
Boot sector viruses can be created without much difficulty and infect either the Master boot record of the hard disk or the floppy drive.
3. Multipartite Viruses
Multipartite viruses are the hybrid variety; they can be best described as a cross between both Boot Viruses and File viruses. They not only infect files but also infect the boot sector.
4. Stealth Viruses
They viruses are stealth in nature and use various methods to hide themselves and to avoid detection.
5. Polymorphic Viruses
They are the most difficult viruses to detect. They have the ability to mutate this means that they change the viral code known as the signature each time it spreads or infects.
6. Macro viruses
In essence, a macro is an executable program embedded in a word processing document or other type of file. Typically users employ macros to automate repetitive tasks and there by save key strokes
|
Receive the latest real-estate updates in your inbox
LOS ANGELES: A reader who was also curious about the case of the missing hands forwarded this comment that was left on LA Times reporter Steve Lopez's blog. An excerpt: "Please can you find out what happened to the LA Times building (First Street) facade clock?? I ride Foothill Transit and wait at the City Hall stop and rely on the wonderful clock to check if my bus is picking my up on time. The clock is old is has been working on and off for many years, but it always fixed and continued giving Angelinos pleasure and and time. But a couple of weeks ago, gone was the clock, no hands only a hole where the hands were always working. I miss it very much and so do my fellow public transportation riders. I would like to ask you to ask on our behalf, if can you implore the owners of the building to fix the clock, if it is broken, and re-assemble it and attach back on the facade of the building. The building looks like it has been vandalized and I wish very much to have it back. The LA Times building with its clock is one of downtown LA's icon...." [Curbed InBox]
LOS ANGELES: Speaking of, how many more weeks before those scary Saw VI billboards go away? Via the Inbox, news of yet another billboard story: "We're broadcasting part 2 of a story on L.A.'s billboards tomorrow [Thursday] evening on KCET's "SoCal Connected." This story focuses on the proliferation of electronic billboards...Please click on the following site [KCET] to see our first story." [Curbed Inbox]
|
New Hampshire Senate To Vote On Barring Taxpayer Funding of Any Place That Performs Abortions
The New Hampshire senate is preparing to vote on a bill that will ban “taxpayer dollars” from going to any person or place that performs “elective” abortions — even hospitals. And the move could cut off all funding to their Medicaid program in the process.
A New Hampshire Senate committee is holding a hearing on a bill that would cut off taxpayer funding to hospitals, clinics, doctors and others who perform elective abortions.
State officials believe the bill could jeopardize New Hampshire’s $1.4 billion annual Medicaid program because states aren’t allowed to exclude providers from the program based solely on the range of services provided.
The bill is just one of the slew of anti-choice measures being pushed in the state this year, including “informed consent” and a 24 hour wait period. Those who are proposing the bill say that any practitioner or entity that performs abortions can simply “create separate business entities” to cover the abortion portion of their business, which would increase expense and bureaucracy but apparently appease the anti-choice advocates’ consciences.
|
Q:
Arquillian Integration with WildFly 10
Can anyone please guide me on how to use Arquillian with WildFly 10. I have recently migrated my application from JBoss 7 to WildFly 10. Arquillian used to work with JBoss 7, but the same configuration is not working on WildFly 10.
I am able to integrate now, however my EJBs with JNDI names as "java:global/xyz/xyzEMFactor" is failing with following error:
Caused by: java.lang.Exception: {"WFLYCTL0180: Services with missing/unavailable dependencies" => ["jboss.naming.context.java.module.test.test.env.\"com.xyz.abc.poc.knowledge_base.ontology.DBContextBean\".emFactory is missing [jboss.naming.context.java.global.xyz_dal.xyzpEMFactory]"]} at org.jboss.as.controller.client.helpers.standalone.impl.ServerDeploymentPlanResultFuture.getActionResult(ServerDeploymentPlanResultFuture.java:134)
Following is my class:
@AccessTimeout(5 * 60 * 60 * 1000)
@StatefulTimeout(-1)
@TransactionAttribute(TransactionAttributeType.NOT_SUPPORTED)
public class DBContextBean<T> {
@Inject
@EJB(lookup = "java:global/xyz_dal/xyzEMFactory")
private xyzEMFactory emFactory;
}
A:
It was because, The testable war file, i was creating a jar as,
@Deployment(name = "xyz_dal", order = 3)
public static Archive<?> createDeployment() {
JavaArchive jar = ShrinkWrap.create(JavaArchive .class, "xyz_dal.jar")
.addClasses(xyzEMFactory.class, DBContextBean.class, xyzDao.class)
.addPackages(true, "com.xyz.abc.poc.entities")
.addAsResource("test-persistence.xml", "META-INF/persistence.xml")
.addAsManifestResource(EmptyAsset.INSTANCE, "beans.xml").setManifest(new Asset() {
@Override
public InputStream openStream() {
// dependency management
return ManifestBuilder.newInstance()
.addManifestHeader("Dependencies", "xyz,javax.api,deployment.abc_common.jar")
.openStream();
}
});
return jar;
}
It worked when i changed it to
@Deployment(name = "xyz_dal", order = 3)
public static Archive<?> createDeployment() {
WebArchive jar = ShrinkWrap.create(WebArchive.class, "xyz_dal.war")
.addClasses(xyzpEMFactory.class, DBContextBean.class, xyzDao.class)
.addPackages(true, "com.xyz.abc.poc.entities")
.addAsResource("test-persistence.xml", "META-INF/persistence.xml")
.addAsManifestResource(EmptyAsset.INSTANCE, "beans.xml").setManifest(new Asset() {
@Override
public InputStream openStream() {
// dependency management
return ManifestBuilder.newInstance()
.addManifestHeader("Dependencies", "xyz,javax.api,deployment.abc_common.jar")
.openStream();
}
});
return jar;
}
It was because when i was creating a testable jar,the container wraps the jar in a test.war, and hence the context "java:global/xyz/xyzEMFactory" was not available.
|
It's easy to blame minorities
Yahoo has some 11,000 workers. Most estimates put the number of remote workers between 300 and 500. In other words, just 2-4% of the Yahoo work force. That’s a tiny minority!
But that’s exactly why it’s been so easy to place the blame on them for Yahoo’s ails. Minorities make for great scapegoats in all walks of life. If we can just place the blame on this small group of people, then it means there’s nothing really wrong with the rest of us.
Gruber summed up this sentiment as “Yahoo employees have been allowed to work remotely, and they have not excelled”. In other words, Yahoo is a rudderless basket case, so it must be because of those 2-4% of the work force who are “goofing off”. Heh.
Yahoo puts the same blame in their original edict: “To become the absolute best place to work, communication and collaboration will be important, so we need to be working side-by-side”. So yes, remote workers are keeping Yahoo from being the “absolute best place to work”.
Jean-Philippe Boily
Working remotely, which I do, forces us to have good communications and processes (does not mean huge and complex process). Communication is the key to good work, even when working side-by-side.
My feeling is that failing at communication seems to hurt more if you work remotely and this is so easy to bash on being remote.
When communication fails for some reason, do not blame anything but the persons trying to communicate. Just communicate well.
Matt Leonard
on 01 Mar 13
Refuting Gruber with statistics – nice tactic ;-)
Simon
on 01 Mar 13
Remote work looks like a scapegoat for Yahoo’s lack of management.
Ryan Fischer
on 01 Mar 13
No matter how small a percentage, if you find something isn’t performing wouldn’t you make a change with it? I haven’t seen Yahoo saying that this will change their company outlook. It seems to be one step out of many to try to bring the company back.
David Yewsuc
on 01 Mar 13
You are stupid. Yahoo! is the best search engine. It is better than all other search engines.
GregT
on 01 Mar 13
For anyone else here who is a fan of The Economist … the Yahoo story is a Leader in this week’s issue (which came out yesterday). Their opinion is approximately consistent with 37s’s (which is a little surprising to me, but there you are).
GregTerrible
on 01 Mar 13
GregT, is your last name Terrible? Because it would be fitting, because your comment is terrible.
ChrisB
on 01 Mar 13
If your company was going southward, theres no better way to end it by flexing some muscle and forcing people to do things they dont want to do.
Mridul
on 01 Mar 13
When the company goes down the CEO takes the blame. He/she is the minority among the minority among the minority among the minority .......
If that is justified, then why not this ?
Simon
on 01 Mar 13
Slacking off may exist but should be taken care of one individual at a time.
Anonymous Coward
on 01 Mar 13
And if slacking off became the norm … then I guess Yahoo needs a massive re organisation (eg firing).
Kevin
on 01 Mar 13
Not to put words in Gruber’s mouth, but his comment seems to clearly be in response specifically to Richard Branson’s statement “Give people the freedom of where to work and they will excel.” The first part of John’s sentence confirms this: “It may well be that Mayer’s policy change will not help Yahoo, but Branson’s statement is clearly wrong:”
That is, he’s not blaming the remote workers. He’s only saying that the freedom=success argument doesn’t hold up. There was freedom, and there was no success.
Of course, I’m not disagreeing with you on the greater point, only pointing out that your evidence of the blaming of minorities taking place isn’t quite sound.
Alan
on 01 Mar 13
I think you’re doing exactly the same thing here, though, David, by blaming Yahoo! for acting in a way that’s been generally accepted in the business world for ages. They’re clearly not the only company with a no remoters policy – Apple’s building a building that looks amazing but ultimately locks employees butts to seats. I’d love to hear you turn this more into a call across the industry, and not just an attack on a company that most consider irrelevant at this point anyway. It’s easy to blame minorities.
Johnny
on 01 Mar 13
I don’t think Gruber was saying that is was JUST because of remote workers Yahoo! was ailing. I think he was responding to the argument that companies should allow people to work where they are most productive. But apparently allowing people to work from home isn’t necessarily making them (or a portion of them) as productive as they can be. Accounts from current and former employees indicate that “working from home” at Yahoo! is a joke. I certainly don’t mean to cast judgement on all at-home employees but as new CEO Mayer has to sort of reign in everyone to sort out who’s doing what. I wouldn’t be surprised if the work from home policy was reinstated once it has been determined that the pool of employees is composed of hard working, productive and honest people. I think we all agree that there are lots of changes that need to take place this is just one small piece.
Glenn
on 01 Mar 13
I am reading the same thing as you David, and I don’t see it as scapegoating. They made a call for the good of their business. Neither you, nor I have the information that they have about the situation, nor do we know their big plans. There are different opinions on what works, and there are different management styles. Just because this works for 37 Signals, doesn’t mean that it works for every company. Steve Jobs didn’t agree with you on this point. I hope that when you guys come out with your book about remote working that you acknowledge that it’s one way of doing things and that it may not be right for every company, otherwise it has the potential to sound arrogant. You know what’s best for your company, and you are an innovator and have some things that you can teach business leaders, but you don’t know what’s best for every company.
Aliotsy Andrianarivo
on 01 Mar 13
I’m a long-time admirer of 37signals (one of my fondest memories as a college kid was getting linked by you on the 37express page), I enjoyed Getting Real, am enjoying REWORK and expect to enjoy REMOTE. That said, the last two posts about Yahoo and remote working have been silly.
I do not see anyone asserting that remote workers ought to shoulder the burden of Yahoo’s shortcomings—not even Gruber, when you read his post.
The principles in Getting Real and REWORK are refreshing, but I doubt they work at all companies. That said, I also think most companies would be wise to test those principles and see if they do work. In the same vein, remote work clearly thrives at 37signals. Maybe it doesn’t at Yahoo—or maybe it doesn’t.
Marissa Mayer, for better or worse, is relentlessly data-driven in her decision-making (she was, after all, the one whose decision to test 41 shades of blue likely drove Doug Bowman to Twitter). And I’m sure she’s likely making the call to test this culture change using the best data on hand. Data like the HBR studies Penelope Trunk cites in her piece about Yahoo’s decision, probably the best defense of Mayer I’ve seen yet. I wish the posts from 37signals criticizing Mayer’s decision were more like that, rather than the dismissive rants setting up straw man arguments that we’ve seen so far.
Fred
on 01 Mar 13
STOP attacking yahoo to promote your upcoming book/idea. There are millions of companies out there that don’t allow working remotely. Why are you picking on yahoo?
It’s really nothing wrong to regroup the whole company again, nurturing a stronger culture in a shared space and have a good face to face time. You are not Yahoo’s CEO, stop acting like one and apply your thought as universal thought all companies should apply.
And the most important point, there is nothing blaming of minorities sort of thing here. In another perspective, it’s just a move worth trying.
Ahmed
on 01 Mar 13
When is 37Signals going to hire some former Yahoo remote works to really make a statement ? :)
Jon
on 01 Mar 13
Hey guys, sorry to interrupt, but can anyone tell me what this Yahoo company does and how they generate revenue?
Marrisa
on 01 Mar 13
Any Yahoo employees care to comment?
Question
on 01 Mar 13
What happens if the new management had success on that cutting the remote access, and the Yahoo begins grow up again?
How the world will deal with this?
Fred
on 01 Mar 13
After posting my comment above, it’s kind of funny to think about it.
I’m like telling myself why am I picking on David’s blog. There are thousands of news outlets talking about this latest Yahoo CEO’s policy. Even Gruber chimed in with the crowd. It’s everywhere. Why single out David alone to be one who shouldn’t talk about Yahoo’s remote worker policy. Probably it’s just me expecting to find quality post on this blog rather than a strong voice lemming toward the mainstream news.
In the end, this could be just a nice marketing move to promote the idea of working remotely. It’s definitely worth trying. Nice try, David!
Well, just that it hurts when ball of accusation start rolling, claiming it as a case of blaming the minorities. Yahoo shouldn’t be the revolutionary idea’s crown spacegoat of what 99.99% of working people has been doing all the time.
Jon
on 01 Mar 13
If a worker can’t excel and be productive with the benefits of working at home, do you really expect them to provide exceptional work in the office? I don’t know anyone who is a superstar that needs someone breathing down their neck to produce their best work. You are either motivated and a self-starter or your not. Companies like 37signals and Automattic do well in remote environments because they hire motivated employees who want to excel. Accountability isn’t necessary because it’s built into the DNA of the employee. Communication is excellent because it needs to be.
How could anyone who works in web technologies think that Yahoo’s frontpage and service are well done? Obviously the management does because they allow it to persist.
John Liverspool
on 01 Mar 13
I think it’s just childish to keep putting your nose into someone else’s business. If you’re so concerned about the 300-500 “poor” minorities why don’t you hire them all?
It really doesn’t matter what decisions a company makes. If they fail because of this they will suffer the consequences. On the other hand, if they strive and gain more success it’s on their own merit.
You have no idea what led them to that decision. You have no stakes in the company. It’s so freaking easy to gain popularity by blaming someone else from your small safe spot.
So I think it’s just coward to keep pressing on this subject unless you’re prepared to do something. If you’re so concerned about Yahoo why not buy enough of their business to have voting powers and then change these kinds of decisions?
Otherwise, each one with their own business. Yahoo don’t criticize 37signals, they don’t care. You shouldn’t as well. This smells just as link bait for more popularity by using left wing populism agenda to call in the masses.
Shame on you.
ploogman
on 01 Mar 13
this is all about cutting jobs, not whether remote is good or bad, yahoo just wants to make cuts “under the radar”, nothing more and nothing less. period. they know some workers live nowhere near a Yahoo office and they know others will not agree to be chained to the office, so they know they can thin their payroll this way
Marissa Mayer
on 01 Mar 13
I quit as CEO of Yahoo!, effective immediately. I just can’t take this criticism anymore. I elect DHH as my replacement, also effective immediately.
David H.
on 01 Mar 13
I accept your resignation, Marissa, and I am happy to accept the role of CEO of Yahoo! My first order of business will be to rewrite the search engine using Ruby. Also, Yahoo! Mail will henceforth be known as gemmail. For a fee of $35/month users may upgrade to railsmail, which includes 45 hours of personal 37 signals coaching by yours truly. Please see yahoo.com/ruby for more information.
Gruber
on 01 Mar 13
This is excellent news. I knew Yahoo! was moving in a better direction, but I am astounded at the speed and efficiency of it all. It reminds me of the first time I used an iPhone. I was blown away at how much better it was than my old phone, the Motorola StarTAC. Man that thing was slow. But still better than an Android phone – am I right guys? Man Google is just a terrible company. Go Yahoo!
Chad
on 01 Mar 13
37signals sells colloboration software.
Yahoo states colloboration best occurs face-to-face
No bring surprise here 37signals doesn’t like Yahoo recent move
Mark
on 02 Mar 13
Like any large company with tens of thousands of employees, all 11,000 of those people don’t work in the same group. It’s not necessarily the case that this 2-4% of the total Yahoo population is a “minority”. It could be, in fact, an entire group responsible for a complete sector of the company. Assuming this, it would be necessary to rein these folks in to see what’s going on.
I work for a company with nearly 100,000 employees. The group I work for has 3,000 (or 3% of the population), yet it accounts for billions in revenue.
TDG
on 03 Mar 13
If you want to work remotedly, go work for Google…and be an Ad Quality Rater. That’s your only option.
mark
on 03 Mar 13
David, you are wrong. You know why? Because you have no idea what is going at Yahoo. You’ve read something somewhere and now ate making judgements.
And you cant be right all the time, its not possible:)
Corporate
on 03 Mar 13
Here’s my take on working from home from a small tech company owner.
- If your boss doesn’t care that you work at home as long as your tasks get done, then you’re probably not getting paid great money, or your boss just doesn’t really care as long as you make him look good. Business owners DO care, and you’ll have to add lots of productivity to that to make them happy AND be a self-starter.
- It’s not for everyone. a) Some people actually can’t communicate well by IM, email or phone. Definitely a good reason to hire people who can communicate well by any method. Nonetheless, the world is full of these people. They have to work in the office. b) Some people are indeed too distracted at home. They have to work in the office. On top of that, Facebook should be blocked for those people in the office. c) People who are not self-starters, who need accountability, who are not motivated working not for themselves at home, they need to work in the office. d) Some don’t make great micro decisions on their own, frankly, and need too much communication to get anything done. That’s more difficult remotely. There’s a lot of those people out there too. Someone has to hire them. For HR, this is a policy mess, to allow some to work at home and some not to and creates division.
- Communication is not nearly as good. a) It needs to be scheduled for when people are back to their IM client. b) Many people just don’t know where they stand after a written communcation. Feelings get hurt. You know the drill. c) Written communication is inefficient. It’s passive. It’s not immediate. Sometimes that’s good. Sometimes not.
- If you want to work at home to avoid people or “focus” better, then you’re not as valuable to the company as those who can do those things at the office.
- Security has to be addressed. Our office is physically more secure than your home. Your laptop gets lost or stolen, and that becomes our problem. Your passwords get hacked due to your loose wifi network after your kid resets your router, and that’s our problem.
- If you hate your office so much, you probably don’t like your job. If you don’t like your job, you’re not going to like it more from home. You’re going to like your life more, but you need to find other work you love more.
- Working from home is not the same as working when you want to. These are two different things, sometimes combined. Working when you want to is completely separate and determined by job. If, at home, you still need to remain available 9-5, then you don’t have that flexibility.
- It’s not for small businesses/offices where people have to wear a lot of hats that the internet just doesn’t allow you to wear well.
- Workers are not seeking out as much communication with other workers when they’re remote and can’t see each other. Out of sight, out of mind. Nothing like a room full of people working together. We find problems faster, because others tune into phone calls and hear post-phonecall dialogue about issues, etc. Remote workers hear nothing and see nothing and experience nothing that the rest of the group does together in the office.
- Relationships stagnate. People get bored. Workers have to work harder to maintain relationships. If they are not trying harder, those relationships will suffer. Workers need to feel a part of something, not disconnected from it. See how people act on the web when they are separate from the group?
- My take on pay: Telecommuters do and should make less money than their office counterparts. They get a huge break on wear and tear on the vehicle and gas consumption, clothes, time, food, etc. Should they work more to earn the same money? Yes. They don’t have to be as accountable. You can’t find such a benefit all over the place. It’s a luxury. You should pay for it.
- From the workers’ perspective, remember, if you’re out of your employer’s sight, you may be out of his mind come eval/promotion/bonus time. If you can’t be seen and measured the old-fashioned way, you may get passed up for promotion if someone in the office is more visible and the relationship is better due to that proximity. That’s human nature.
- If you can work from home, maybe your employer can simply outsource your job cheaper.
- You’re more easily let go remotely too. I worked for a company that transitioned most of us home for a few weeks of retooling, and that turned into remote permanent layoffs for everyone. Basically, you become more anonymous. It easier to transition you out the company if you’re not physically IN the company. Are you “real” anymore?
- As an owner, I’m less likely to micromanage you at the office, because I consider you “paying your dues” and being a part of the group.
To work at home for me, it would have to be proven that you:
1. Require little maintenance
2. Are a proven self-starter
3. Are noticeably productive
4. Communicate to me very well and efficiently in writing (I don’t like to be on the phone with you all day)
5. BE THERE when we need to communicate with you
6. Be a level-headed, rational person
7. Will not cause me more work by being out of the office
You’d better be the best of the best AND be productive ALREADY to expect to get a chance to work from home in a good company if you have a smart boss.
Zingus
on 04 Mar 13
how about the costs of keeping that minority remote? they might be trough the roof.
A comment on another blog highlighted to me how the majority/minority status of remote working seriously enhances/hinders its usefulness.
Tim
on 05 Mar 13
@Corporate:
You said:
To work at home for me, it would have to be proven that you: 1. Require little maintenance 2. Are a proven self-starter 3. Are noticeably productive 4. Communicate to me very well and efficiently in writing (I don’t like to be on the phone with you all day) 5. BE THERE when we need to communicate with you 6. Be a level-headed, rational person 7. Will not cause me more work by being out of the office
My question to you is, why would you hire anyone, remote or not, who didn’t meet all of those criteria anyway?
Corporate
on 05 Mar 13
Tim, I’ll let you write the article on why not to hire someone who doesn’t fit those criteria. :-)
Ka Wai
on 05 Mar 13
I generally agree with what you have to say, but you’re really stretching and twisting and trivializing points here.
“Gruber summed up this sentiment as “Yahoo employees have been allowed to work remotely, and they have not excelled”. In other words, Yahoo is a rudderless basket case, so it must be because of those 2-4% of the work force who are “goofing off”. Heh.”
Well…maybe. It’s been noted by some Yahoo! employees that people were abusing the WFH policy, were working on other projects on company time, and weren’t checking in. If you’re one of the vast majority of workers coming to work for Yahoo! each day and you can’t regroup with your boss or co-worker because they aren’t in the office or aren’t available on Campfire, suddenly the impact of the 2-4% minority is creeping pretty deeply into the productivity of the majority.
“In other words, just 2-4% of the Yahoo work force. That’s a tiny minority! But that’s exactly why it’s been so easy to place the blame on them for Yahoo’s ails. Minorities make for great scapegoats in all walks of life. If we can just place the blame on this small group of people, then it means there’s nothing really wrong with the rest of us.”
If I’m interpreting this right, you believe that Marissa Mayer, in trying to right a sinking ship, sought to find some convenient minority demographic to penalize, in order to let the rest of the company off the hook.
“So yes, remote workers are keeping Yahoo from being the “absolute best place to work”. What a parody, what a farce.”
It could be. Perhaps, getting everyone back into the office, parting ways with the old Blackberrys for paid-for iPhone 5’s and Android devices, working on fewer products with a renewed focus on mobile, for a CEO who actually gives a damn about the company, its products, and its clearly defunct culture will energizing her employees. It just might be the key to Yahoo!s success, and not its demise.
This discussion is closed.
About David
Creator of Ruby on Rails, partner at 37signals, best-selling author, public speaker, race-car driver, hobbyist photographer, and family man.
|
Legion type TV Show network FX
Is it real or just in my head? This question has kept fans of Legion on their toes since the beginning, and with the FX drama coming back for season 2, Aubrey Plaza returns in a new promo to melt your mind with more trippy psychedelics.
“I need to remind you what you think is real has never occurred,” Plaza’s Lenny — or is it the Shadow King?! — says to camera. Has David Haller (Dan Stevens) been a figment of our imaginations all this time? Has his “lover,” Sydney (Rachel Keller), just been a representation of our sexual appetite?
The first season of Legion, saw David locked up in a psychiatric facility to treat his mental disorder… or that’s what unseen forces wanted him to believe. It turned out he wasn’t crazy at all, but rather an all-power telekinetic and telepathic mutant, based on the character of the same name from the X-Men comics.
Lenny, meanwhile, wasn’t actually Lenny. David’s friend from the hospital was really a psychic leach known as Amahl “Shadow King” Farouk using Lenny as its physical form.
Picking up with Legion season 2, which will premiere on FX this April 3, Farouk will have a new host, Oliver (Jemaine Clemente). Navid Negahban will appear as Farouk, alongside Plaza, while Jeremie Harris, Bill Irwin, and Jean Smart will also return.
With David gone and Farouk on the loose, the folks from Summerland must form an alliance with Clark (Hamish Linklater) and the rest of their enemies at Division III. Fans have merely glimpsed new footage of the next run, though a full trailer still eludes us.
While we wait, let Plaza lull you into a false sense of comfort.
|
Why People Think Ponds Are A Good Idea
Important Tips for Hiring a Pond Cleaning Service
Pond maintenance is important in order to keep your fish happy, hence, the need to hire professional services to clean and take care of your pond. The following are factors that you should consider when choosing a pond cleaning service.
Start by doing some research to help you identify pond cleaning services that are capable of meeting your needs. You can start by talking to people or businesses that have ponds as they are more likely to know the best pond cleaning companies. This way, you will know which companies are capable of meeting of meeting your goals and those that are not. Similarly, you can use the internet to locate pond maintenance companies that are located near you.
Before you choose a service, it is important to inquire what kind of services is included in their packages. Ensure that your pond cleaning company provides you with a variety of services from which you can choose from. Additional services to look for include Servicing of filters and pumps, pond construction, pond repairs and maintenance services.
Determine if the technicians of the pond cleaning company that you are considering are highly trained and qualified for the job. When the technicians are experienced and qualified, you will be assured that your pond is in the right hands. The technicians will be coming to your property, therefore; it’s important to ensure that they are properly screened before they are allowed to work in your pond.
Similarly, you want to choose a company that has been offering its pond maintenance services in the market for a number of years. Consider hiring a pond cleaning service that has the latest equipment to perform an exceptional work. Also, they know what to look for when there is an issue with your water feature in order to ensure that your pond is not just looking good but also works properly.
A reputable pond cleaning company will also not hesitate to provide you with a list of references. Be sure to ask the references if the company has qualified personnel and whether the company in question met their needs. As a result, you will be able to choose a company you think is capable of providing you with the highest quality service.
The next step is to get quotes from several pond cleaning companies so that you can compare their charges and packages. Also, decide on the method of payment that will work for you as they may vary with different companies. Remember it’s not a wise decision to go with the cheapest company as they are unlikely to provide you with quality services. Set up a meeting with the potential pond cleaning services to help you narrow down your list further by examining their communication skills.
|
Opioid modulation of ingestive behavior.
Supportive evidence for an important role of endogenous opioid systems in modulation of ingestive behaviors is presented. Low doses of morphine (1.0-5.0 mg/kg) increase and low doses of naloxone (0.5-2.5 mg/kg) decrease food and water intake during both acute and chronic testing in mildly-deprived rats. Chronic infusions of naloxone with implanted osmotic mini-pumps elicited sustained dose-related suppression of food, water, and saccharin solution intakes but did not reduce ingestion of 10.0% glucose solution or food following 12 hr deprivation. Finally, naloxone treatment did not antagonize nocturnal ingestion of food any more than it reduced day time feeding when the latter was enhanced by prior food deprivation. These results indicate that an opiate agonist and an opiate antagonist modify ingestive behaviors oppositely, affirming that endogenous opioid systems may be involved in control of feeding and drinking. However, their role may be restricted to only indirect participation in homeostatic regulation via neural systems modulating emotional tone or goal-directed behaviors in general.
|
A Son of David
A Son of David is a 1920 British silent sports film directed by Hay Plumb and starring Poppy Wyndham, Ronald Colman, and Arthur Walcott.
Premise
A young Jewish boy from Whitechapel becomes a professional boxer in the hope of fighting the man he believes murdered his father.
Cast
Poppy Wyndham - Esther Raphael
Ronald Colman - Maurice Phillips
Arthur Walcott - Louis Raphael
Constance Backner - Miriam Myers
Robert Vallis - Sam Myers
Joseph Pacey - Maurice, as a child
Vesta Sylva - Esther as a child
Preservation status
A Son of David is now considered a lost film.
See also
List of lost films
References
External links
A Son of David at SilentEra
Category:1920 films
Category:1920s sports films
Category:British films
Category:British sports films
Category:British boxing films
Category:Broadwest Films films
Category:English-language films
Category:Films directed by Hay Plumb
Category:Films set in London
Category:Lost British films
Category:British black-and-white films
|
Cveto Pretnar
Cveto Pretnar (January 27, 1957 – April 25, 2018) was a Slovenian ice hockey player. He played for the Yugoslavia men's national ice hockey team at the 1984 Winter Olympics in Sarajevo.
Pretnar died on April 25, 2018 at the age of 61.
References
Category:1957 births
Category:2018 deaths
Category:HK Acroni Jesenice players
Category:Ice hockey players at the 1984 Winter Olympics
Category:Olympic ice hockey players of Yugoslavia
Category:Slovenian Hockey Hall of Fame inductees
Category:Slovenian ice hockey goaltenders
Category:Sportspeople from Jesenice, Jesenice
Category:Yugoslav ice hockey goaltenders
|
CREATE TYPE Boolean FROM [tinyint] NOT NULL
GO
EXEC sys.sp_bindrule @rulename=N'booleanRule', @objname=N'Boolean' , @futureonly='futureonly'
GO
|
Kevin Kurbec, a 2002 graduate of the College, enters his fourth season as the associate director of player development under Ed Cooley.
Kurbec returned to Providence College after spending three seasons as an assistant coach at Bryant University for Head Coach Tim O'Shea. Kurbec's duties at Bryant included individual guard development, recruiting and opponent scouting. Kurbec also served as Director of the Bryant University Team Camp each summer.
Prior to working at Bryant, Kurbec spent 10 years at Providence College working with the men's basketball program for Head Coach Tim Welsh. Kurbec was the Director of Basketball Operations for three seasons and was responsible for overseeing the day-to-day operations of the office. Another major component of his job was monitoring the team's academic progress and serving as the liaison with the office of academic services. Kurbec also served as the co-director of the Tim Welsh Summer Basketball Camp.
Kurbec spent three seasons (2002-05) as a graduate assistant with the men's basketball program. As a graduate assistant for the program, he oversaw the student managers, coordinated the team's meals at home and was responsible for the organization of the game scouting. Kurbec also served as the film exhange coordinator for the Friars.
As an undergraduate, Kurbec served as a manager for the squad for four years, including his junior and senior seasons when he was the head student manager. As a student manager, he assisted in many aspects of the program, including the ordering, issuance and care taking of the team's equipment and gear.
He and his wife, Melissa, their son, Cameron, and two daughters, Kyra and Caylee, reside in Cumberland, R.I.
|
# Time: O(n)
# Space: O(1)
class Solution(object):
def findPermutation(self, s):
"""
:type s: str
:rtype: List[int]
"""
result = []
for i in xrange(len(s)+1):
if i == len(s) or s[i] == 'I':
result += range(i+1, len(result), -1)
return result
|
version https://git-lfs.github.com/spec/v1
oid sha256:3325182bc091dbad77df5fbff4d022b2c08a74965f423b51b9638e409a0d2219
size 13472
|
Document
++Group IsControlElement=false
++++Document Name='Empty iframe'
++++++Document
|
In the
United States Court of Appeals
For the Seventh Circuit
____________
No. 04-1463
UNITED STATES OF AMERICA,
Plaintiff-Appellee,
v.
ALLAN JOHNSON,
Defendant-Appellant.
____________
Appeal from the United States District Court
for the Northern District of Indiana, Hammond Division.
No. 02 CR 28—Rudy Lozano, Judge.
____________
ARGUED MARCH 29, 2005—DECIDED OCTOBER 14, 2005
____________
Before CUDAHY, WOOD, and SYKES, Circuit Judges.
SYKES, Circuit Judge. Allan Johnson pleaded guilty to
three child pornography charges and now appeals his
sentence, which is significantly longer than the guide-
lines sentencing range because the district court judge
exercised his discretion to depart upward from the then-
applicable range. Johnson challenges only the district
court’s decision on upward departure. After United States
v. Booker, 125 S.Ct. 738 (2005), his appeal requires us to
evaluate the reasonableness of the sentence and also to
determine whether a limited remand pursuant to United
States v. Paladino, 401 F.3d 471 (7th Cir. 2005) is war-
ranted. We conclude that a Paladino remand is unnecessary
2 No. 04-1463
and affirm Johnson’s sentence as reasonable and ade-
quately explained by the district court.
I. Background
Beginning in January 2002, Johnson downloaded child
pornography from the internet and also uploaded images
already in his possession in exchange for what he received.
By the time he was arrested about two months later,
Johnson had acquired an astonishing 10,000 to 12,000
computer images of children engaged in sexually explicit
conduct, though for purposes of sentencing the government
narrowed that number to 4,638 by counting only pictures of
children who appeared to be under age twelve. Some files
depicted children as young as five or six participating in
sexual acts, and among them were 174 images of sadistic
sexual acts and 42 of bestiality involving children. In
addition to the child pornography images, Johnson
also possessed videotapes of children, some depicting chil-
dren engaged in sexually explicit conduct. He made at least
one of these videotapes himself with a hidden camera in his
bathroom, where he videotaped a six- or seven-year-old girl
taking a shower. Johnson ultimately pleaded guilty without
a written agreement to three crimes: possession with intent
to sell images of children engaged in sexually explicit
conduct, in violation of 18 U.S.C. § 2252(a)(3)(B); distribu-
tion of such images, in violation of § 2252(a)(2); and receipt
of such images, also contrary to § 2252(a)(2).
At sentencing, which occurred before our decision in
United States v. Booker, 375 F.3d 508 (7th Cir. 2004), aff’d,
125 S.Ct. 738 (2005), the district court, Judge Rudy Lozano,
adopted without objection the factual statements in the
presentence report. The judge also heard testimony from an
FBI agent and a postal inspector concerning the particu-
larly aggravated content of the child pornography images at
issue in this case, which the judge characterized as the
No. 04-1463 3
most shocking he had seen in sixteen years on the bench.
The images of sadistic sexual acts included images of
children under the age of ten being tied up and forced
to have oral, genital, and anal sex with adult males. The
images of bestiality depicted young children, sometimes
bound, engaging in acts of intercourse and oral sex with
dogs.
The FBI agent, who had four years’ experience investigat-
ing child pornography, testified that only once before had he
encountered images of bestiality involving chil-
dren. Drawing on institutional knowledge, the agent also
testified that he spoke with a customs agent and another
FBI agent—experienced investigators of this sort of
crime—both of whom estimated that less than one per-
cent of child pornography investigations involve bestiality.
The postal inspector, who had specialized for nine years
in crimes involving the exploitation of children, had seen
bestiality before but never involving children under age
twelve. Nor had anyone in his office encountered bestiality
involving such young children.
Judge Lozano also received testimony from the mother of
the child who was videotaped while in the shower. Her
testimony and other evidence established that Johnson’s
live-in girlfriend was a day-care provider, and the child
Johnson videotaped was a neighbor child in his girlfriend’s
care.
Judge Lozano calculated the guidelines sentencing range
as follows: applying the version of U.S.S.G. § 2G2.2 in effect
at the time Johnson committed the offenses, the judge
started with a base offense level of 17. Then, following the
probation officer’s recommendation, the court added two
levels because the child pornography at issue involved
minors under age twelve, § 2G2.2(b)(1); five levels because
Johnson distributed child pornography, § 2G2.2(b)(2)(B);
two levels because Johnson used a computer, § 2G2.2(b)(5);
4 No. 04-1463
and four more because of the sadistic images involving
children, § 2G2.2(b)(3) (renumbered as § 2G2.2(b)(4)
effective November 1, 2004). These adjustments, after a
decrease of three levels for acceptance of responsibility,
§ 3E1.1, yielded an offense level of 27, which, when com-
bined with Johnson’s criminal history category of I, resulted
in a guidelines sentencing range of 70 to 87 months’
imprisonment.
But Judge Lozano nearly tripled the high end of the
guidelines range, calculating a “departure range” of 210 to
262 months and ultimately imposing a total sentence of 236
months’ imprisonment—180 months on each count to be
served consecutively to the extent necessary to arrive at the
total term of 236 months. The judge gave three
basic reasons for imposing this sentence above the guide-
lines range. First, the judge added the equivalent of four
levels to account for Johnson’s possession of 42 images of
children engaged in bestiality. The judge concluded that
bestiality, especially involving children so young, consti-
tuted a substantial aggravating factor not adequately
considered by the Sentencing Commission.
Second, the judge added another five levels (bringing the
effective offense level to 36) to account for the number
of images in Johnson’s possession: 4,638. Judge Lozano
explained that he was taking into consideration a later-
enacted amendment to § 2G2.2 under which Johnson would
have received an equivalent adjustment for possessing 600
or more images. See U.S.S.G. § 2G2.2(b)(7)(D); id. app. C,
amend. 649 (effective Apr. 30, 2003). Since Johnson stood
convicted of possessing more than seven times as many
images, the court reasoned that departing upward by
reference to this amendment was appropriate.
Third, the court concluded that Johnson’s criminal history
category of I did not accurately reflect his past criminal
conduct nor the likelihood that he would commit other
crimes in the future. By his own admission, Johnson
No. 04-1463 5
committed the offense of voyeurism under IND. CODE § 35-
45-4-5 (a Class D felony under Indiana law) by videotap-
ing the child in the shower, even though he was never
charged with that crime. Because this was a crime punish-
able by more than a year and a month in prison, the judge
deemed it appropriate to elevate Johnson’s criminal history
category from I to II. See U.S.S.G. § 4A1.3.
Beyond articulating these three basic grounds for exceed-
ing the guidelines range, Judge Lozano also commented at
length on the additional factors that influenced his sentenc-
ing decision. He repeatedly addressed the particularly
aggravated content of the images at issue in this
case—especially those depicting bestiality—which he
characterized as “vile” and “completely appalling.” He noted
Johnson’s abuse of the baby-sitting situation in connection
with the videotape incident, reasoning that this made
Johnson more likely to commit crimes involving child
pornography again and perhaps to progress to even more
serious sex crimes against children. The judge explained
that he settled on 236 months because he thought a sen-
tence of that length was necessary to send a strong message
of deterrence and permit enough time for Johnson’s rehabil-
itation. The court took into account Johnson’s age and
health, his degree of remorse (which the judge found
lacking), his propensity toward recidivism, and “the Court’s
duty to society.” Judge Lozano emphasized that he “did not
come to this decision lightly, nor was it an easy issue to
decide.” The judge explained: “I have considered all of the
facts in this case, Mr. Johnson, and I have considered what
would be a fair sentence. I have considered very strongly
what, hopefully, would send a message to other individuals
who are thinking about these types of crimes, that this is off
limits. Our children are off limits, and this Court will
protect them at all costs.”
6 No. 04-1463
II. Discussion
On appeal Johnson argues that the district court erred by
making “three departures” based on the images of bestial-
ity, the overall number of images, and the videotape of the
showering child. He also argues that the judge violated his
Sixth Amendment rights by sentencing him under the
formerly mandatory guidelines regime. See Booker, 125
S.Ct. at 756.
Johnson’s framing of the issue as one about “departures”
has been rendered obsolete by our recent decisions applying
Booker. It is now clear that after Booker what is at stake is
the reasonableness of the sentence, not the correctness of
the “departures” as measured against pre-Booker decisions
that cabined the discretion of sentencing courts to depart
from guidelines that were then mandatory. United States v.
Castro-Juarez, No. 05-1195, 2005 WL 2417065, at *3 (7th
Cir. Oct. 3, 2005) (the question . . . is ultimately the reason-
ableness of the sentence the district court imposed, not the
court’s application of a guideline authorizing an upward
depature”). Now, instead of employing the pre-Booker
terminology of departures, we have moved toward charac-
terizing sentences as either fitting within the advisory
guidelines range or not. See United States v. Dean, 414 F.3d
725, 729 (7th Cir. 2005).
Johnson does not dispute the facts used to arrive at
the guidelines range, nor does he argue that the guide-
lines range was improperly calculated. See id. (“The judge
must . . . compute the guidelines sentence, just as he had to
do before Booker.”). A sentence within a properly calculated
guidelines range is presumptively reasonable. United States
v. Bryant, 420 F.3d 652, 658 (7th Cir. 2005); United States
v. Re, 419 F.3d 582, 583 (7th Cir. 2005); United States v.
Mykytiuk, 415 F.3d 606, 608 (7th Cir. 2005). Sentences
varying from the guidelines range, as this one does, are
reasonable so long as the judge offers appropriate justifica-
No. 04-1463 7
tion under the factors specified in 18 U.S.C. § 3553(a).
Dean, 414 F.3d at 729. How compelling that justification
must be is proportional to the extent of the difference
between the advisory range and the sentence imposed. Id.
Relevant factors may include the defendant’s history, the
nature and seriousness of the crime, just punishment,
deterrence, protection of the public from the defendant’s
future crimes, and the defendant’s correctional needs. 18
U.S.C. § 3553(a); Dean, 414 F.3d at 728. Explicit factfinding
on the factors influencing a decision to exceed the guide-
lines range is not required, except where a particular fact
is contested and “may be decisive to the choice of sentence.”
Dean, 414 F.3d at 730. Johnson does not contest the facts
underlying the court’s decision to move up from the guide-
lines range here.
Once the issue is properly framed in terms of “reasonable-
ness,” we are hard-pressed to say that Johnson’s sentence
does not meet the standard in terms of the bottom line.
Johnson’s sentence is substantially longer than the guide-
lines range as calculated by reference to § 2G2.2 as it
existed when he committed his crimes, but that would not
be true if he engaged in the identical conduct today.
Viewing the current version of § 2G2.2 as one benchmark to
gauge the reasonableness of Johnson’s sentence, cf. United
States v. Coe, 220 F.3d 573, 578 (7th Cir. 2000); United
States v. Porter, 145 F.3d 897, 907 (7th Cir. 1998); United
States v. Willey, 985 F.2d 1342, 1350 (7th Cir. 1993), the
sentence Johnson received would fall within the advisory
guidelines range instead of substantially above it. After
Johnson committed his crimes, § 2G2.2 was twice amended
to reflect the judgment of Congress that trafficking in child
pornography was being punished too lightly. See The
Prosecutorial Remedies and Other Tools to end the Exploi-
tation of Children Today Act of 2003 (PROTECT Act), Pub.
L. No. 108-21, 117 Stat. 650 (Apr. 30, 2003); U.S.S.G. app.
C, amend. 649 (effective Apr. 30, 2003); id. amend. 664
8 No. 04-1463
(effective Nov. 1, 2004). As amended, § 2G2.2 now sets the
base offense level at 22. U.S.S.G. § 2G2.2(a)(2) (2004). Two
levels would be added because children under twelve are
depicted, § 2G2.2(b)(2); another five levels for distribution,
§ 2G2.2(b)(3)(B); four more for sadistic or masochistic
images, § 2G2.2(b)(4); two for using a computer,
§ 2G2.2(b)(6); and, finally, five more levels because there
were more than 600 images. See U.S.S.G § 2G2.2(b)(7)(D)
(2004). Even dropping three levels for acceptance of respon-
sibility, the resulting total offense level of 37 coupled with
a criminal history category of I would yield a range of 210
to 262 months. The comparison is irresistible: if handed
down today, Johnson’s 236-month sentence would be right
in the middle of the advisory range and thus presumptively
reasonable. See Bryant, 420 F.3d at 658; Re, 419 F.3d at
583; Mykytiuk, 415 F.3d at 608.
That aside, focusing exclusively on the reasons the
district court gave for imposing the 236-month term of
imprisonment, we are persuaded that a sentence of this
length was amply justified. First, the court reasoned that
Johnson’s case is particularly egregious because he pos-
sessed 42 shocking images of children engaged in bestiality.
Johnson objects to this rationale, arguing that the court had
already accounted for the images of bestiality by applying
the upward adjustment under § 2G2.2(b)(3) (now subsection
(b)(4)), for child pornography depicting “sadistic or masoch-
istic conduct or other depictions of violence.” Johnson
contends that images involving both kinds of
conduct—sadism and bestiality—are covered by the adjust-
ment. He notes that sadism in this context requires neither
violence nor the infliction of physical pain but simply the
infliction of severe and degrading harm on the child. See
United States v. Turchen, 187 F.3d 735, 739-40 (7th Cir.
1999) (defining sadism to include conduct that inflicts
emotional as well as physical pain). Conceding that the
images of bestiality in his possession involved harm
No. 04-1463 9
degrading and severe enough to be considered sadistic,
Johnson argues from this concession that it was improper
for the district court to further increase his sentence
based upon the depictions of bestiality when it had already
done so because they satisfied the definition of sadism.
We need not attempt to draw a clear distinction between
the two kinds of conduct here. Even if § 2G2.2(b)(4) is
construed to include images of bestiality, there is no reason
why the court, in deciding whether to impose a sentence
above the advisory range, could not give further weight to
a factor covered by a specific guidelines adjustment,
especially where (as is true here) that “factor is present to
an exceptional degree or in some other way makes the case
different from the ordinary case where the factor is pres-
ent.” Koon v. United States, 518 U.S. 81, 96 (1996). In some
instances child pornography fitting the general category
covered by § 2G2.2(b)(4) is so aggravating as to justify going
above the advisory range. See United States v. Griffith, 344
F.3d 714, 718-20 (7th Cir. 2003) (explaining that the
particularly horrific nature of defendant’s images justified
a sentence above guidelines range). That was the judge’s
reasoning here, and we cannot disagree with it.
Attacking the court’s second reason for increasing the
sentence—the number of images in his possession—
Johnson concedes that the district court correctly de-
cided that possessing so many illicit pictures warranted
a longer sentence, but insists that the district court in-
creased his sentence by too much. We are not persuaded.
Astonished by Johnson’s accumulation of thousands of
images in just a few months, the judge explained that
Johnson’s rapid, deep fall into child pornography was
“almost beyond belief, and certainly far from typical.” Judge
Lozano looked to a subsequent amendment—now
§ 2G2.2(b)(7)(D), for cases involving 600 or more images—to
guide his discretion in increasing the sentence. See U.S.S.G.
app. C, amend. 649 (effective Apr. 30, 2003). Using a later-
10 No. 04-1463
enacted guidelines amendment as a tool to guide sentencing
discretion is appropriate. Coe, 220 F.3d at 578; Porter, 145
F.3d at 907.
The district court’s third reason for increasing the
sentence was Johnson’s videotaping of the little girl in the
shower. Johnson argues that the district court had no
authority to increase his sentence based on this reason. We
disagree. Johnson admitted during the plea colloquy that he
secretly videotaped the child, and he concedes
that this conduct could have been prosecuted under Indiana
law as voyeurism, see IND. CODE § 35-45-4-5 (voyeurism),
which at the time of the offense carried a presumptive
penalty of 18 months in prison, see id. § 35-50-2-7(a); Dixon
v. State, 825 N.E.2d 1269, 1271-72 (Ind. Ct. App. 2005).
Even under the old sentencing regime, U.S.S.G. § 4A1.3
permitted district courts to impose a higher sentence after
considering, among other things, all “prior similar adult
criminal conduct not resulting in a criminal conviction,”
U.S.S.G. § 4A1.3(e) (redesignated § 4A1.3(a) (2)(E)); United
States v. Terry, 930 F.2d 542, 545 (7th Cir. 1991). Moreover,
the district court explained that Johnson’s abuse of the
baby-sitting situation increased the likelihood that Johnson
would reoffend and perhaps escalate to even more serious
sexual abuse of children. This assessment was entirely
reasonable.
Accordingly, although Johnson’s sentence is much longer
than the guidelines range applicable at the time of sentenc-
ing, the district court’s justification is commensurate to the
difference between the sentence imposed and the advisory
range. The judge’s conclusions regarding the particular
nature of the pornographic images, the sheer quantity of
child pornography, and Johnson’s risk of recidivism were
appropriately related to the factors specified in §3553(a).
See Dean, 414 F.3d at 728. The district court’s stated
justification adequately supports the sentence imposed. Id.
at 729.
No. 04-1463 11
As a fallback position, Johnson argues for the first time
on appeal that imposing this sentence under the formerly
mandatory regime is error that requires resentencing. See
Booker, 125 S.Ct. at 756. Although it was error to apply the
guidelines as mandatory, see id.; United States v.
Cunningham, 405 F.3d 497, 504-05 (7th Cir. 2005), Johnson
failed to preserve the error by raising a constitutional
objection below, see Paladino, 401 F.3d at 481-84. Accord-
ingly, our review is for plain error. Under the plain error
standard, we will order resentencing only if applying the
guidelines as mandatory worked to the defendant’s disad-
vantage, that is, if the sentencing court would have imposed
a lower sentence had it realized that the guidelines were
advisory. Id. at 482-83. If we are in doubt about whether
the district court would have done so, we will remand for
the limited purpose of asking. Id. at 483-84. But only if we
are in doubt. United States v. Lee, 399 F.3d 864, 866 (7th
Cir. 2005). In Lee we observed that when a sentencing judge
departs upward from what was believed to be a mandatory
guidelines range, it is unlikely the judge would have
lowered the sentence had he known that after Booker he
would have even more freedom to fashion an appropriate
sentence. Id. at 867; see also United States v. Stewart, 411
F.3d 825, 829 (7th Cir. 2005); Cunningham, 405 F.3d at
504-05; Lee, 399 F.3d at 866. Of course, there are excep-
tions; we have also stated that “Lee did not . . . establish a
per se rule that plain error is impossible if the district court
departed upwards.” United States v. Long, No. 04-1721,
2005 WL 2465006, at *5 (7th Cir. Oct. 7, 2005). Here, Judge
Lozano explained his decision so thoroughly that we are
confident he would not lower the sentence in this case. A
limited remand under Paladino is not necessary. See Lee,
399 F.3d at 866-67.
Because the sentence imposed was reasonable and we see
no reason for a Paladino remand, the judgment of the
district court is AFFIRMED.
12 No. 04-1463
A true Copy:
Teste:
________________________________
Clerk of the United States Court of
Appeals for the Seventh Circuit
USCA-02-C-0072—10-14-05
|
K2 missconduct 2017-18
K2's Missconduct are established park and pipe skis designed for experienced women freestylers - we wanted to ensure they remain valid for the 2018 winter season so check out what we think in our review.
Performance
Stability
Playfulness
Pop
Durability
Energy
Value
Overall
The K2 Missconduct's are all-mountain skis at heart with a homing beacon for the park. If you're into freestyle skiing but need the versatility for piste too then they do the job to perfection - the only misconduct is by the rider, not the skis.
Our women testers say they are an amazing park and pipe ski - nice and lively, super light, soft-medium flex and perfect in the park for advance to expert skiers who like to combine mellow riding with more aggressive turns when they need them.
It's tough to fault the Missconduct and why would K2 dump them when they still provide the goods, time and time again. Scores are high across the board and for good reason, they pop, zip and jib with the best of them and then rip a bumps line for tea.
Indoor ski domes, big mountains and everything in between - the Missconduct might lead you astray, but in all the right ways. Great value for money and would suit experienced riders and seasonaire's looking for a versatile freestyle ski.
|
Subcutaneous panniculitic T-cell lymphoma-review of five cases.
Subcutaneous panniculitic T-cell lymphoma (SPTL) is a rare variant of cutaneous T-cell lymphoma where lymphoma cells infiltrate preferentially into subcutaneous tissue. Five cases of SPTL were seen during the period from 2001-2004 at the Department of Dermatology, Hospital Kuala Lumpur. All five presented with multiple subcutaneous nodules on the face, trunk and limbs of one week to six months duration with associated fever and loss of weight. Physical examination showed multiple tender, erythematous indurated plaques and subcutaneous nodules on their face, trunk and limbs. One patient also presented with unhealing ulcerated nodules. Two patients had hepatosplenomegaly and one hepatomegaly. Two patients had pancytopaenia while the other three had leucopaenia. One patient had deranged liver function. Out of the five patients, three had bone marrow examination with haemophaegocytosis in two and one hypocellular marrow. Skin biopsy of all patients showed infiltration with atypical lymphoid cells in the upper dermis and subcutaneous fat. These neoplastic cells showed positivity for CD3 and CD30 in three patients with CD8, TIA-1 and LCA (Leucocyte common antigen) being positive in one patient. One patient treated with prednisolone and subcutaneous Roferon 3Mu three times a week since 2001 was in remission. Two patients who were planned for chemotherapy had deteriorated rapidly and succumbed to septicaemia from pancytopaenia. Subcutaneous panniculitic T-cell lymphoma has been reported to show two distinct clinical presentations. The first is characterized by an indolent course with good prognosis and the second with rapid clinical deterioration, haemophaegocytosis and death. Both presentations were seen in our five patients seem to demonstrate these two subtypes of SPTL.
|
Small party to celebrate the birthday of Yuu Rei. Good friend Kristiyan Zero-Blade is visiting us for this special day to have a chit-chat around the table. If you bring something sweet (a birthday party means nothing without candy or cake!) to share with ppl, there will be a nice cuppa tea provided for you :p.
Location info coming soon, reservation for this party will be needed, send me a message with your name if you are planning to come ^^.
|
[NOT FOR PUBLICATION]
UNITED STATES COURT OF APPEALS
FOR THE FIRST CIRCUIT
No. 96-2199
UNITED STATES,
Appellee,
v.
LAWRENCE MASTELLO,
Defendant, Appellant.
APPEAL FROM THE UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF MASSACHUSETTS
[Hon. Frank H. Freedman, Senior U.S. District Judge]
Before
Selya, Boudin and Lynch,
Circuit Judges.
Tina Schneider on brief for appellant.
Donald
K.
Stern, United States Attorney, and Kevin
O'Regan,
Assistant United States Attorney, on brief for appellee.
July 23, 1997
Per Curiam
. Upon careful consideration of the briefs and
record, we conclude that this appeal does not present a
substantial question. See 1st Cir. Loc. R. 27.1.
The 24-month sentence imposed upon revocation of
supervised release was within the district court's authority
under 18 U.S.C. S 3583(e)(3) and was not inconsistent with
U.S.S.G. S 7B1.4. See United
States v. O'Neil, 11 F.3d 292,
301 n.11 (1st Cir. 1993) (the S 7B1.4 sentencing table is
advisory, not mandatory). In our view, the district court's
statement of reasons for the longer sentence, including
defendant's repeated disobedience, was sufficient and gave
adequate weight to the guideline provisions.
The sentence is affirmed. See 1st Cir. R. 27.1.
-2-
|
Q:
Procedure or function "" expects parameter '', which was not supplied
I have a problem with Database thing. The stored Proc has to be called with either 3 or 4 parameters. If ImageID is not given, then it has to
get into If loop and execute. if ImageID is given, execute the else part of the stored proc. But i have no idea why is that showing
Procedure or function "" expects parameter '@ImageID', which was not supplied."
Thanks in Advance
if (!hasImage)
{
parameters = new SqlParameter[]
{
new SqlParameter("@LocationID", LocationID),
new SqlParameter("@PrimaryID",
Convert.ToInt32(CategoryList[i].ToString().Split(',')[0])),
new SqlParameter("@SecondaryID",
Convert.ToInt32(CategoryList[i].ToString().Split(',')[1]))
};
SqlHelper.ExecuteNonQuery(
DbConnString,
System.Data.CommandType.StoredProcedure,
"TempUpdateMerchantCategories_Insert",
parameters);
}
else
{
parameters = new SqlParameter[]
{
new SqlParameter("@LocationID", LocationID),
new SqlParameter("@PrimaryID",
Convert.ToInt32(CategoryList[i].ToString().Split(',')[0])),
new SqlParameter("@SecondaryID",
Convert.ToInt32(CategoryList[i].ToString().Split(',')[1])),
new SqlParameter("@ImageID",
Convert.ToInt64(ImageData[j].ToString().Split(',')[0]))
};
SqlHelper.ExecuteNonQuery(
DbConnString,
System.Data.CommandType.StoredProcedure,
"TempUpdateMerchantCategories_Insert",
parameters);
}
The Stored Proc is like this.
CREATE PROCEDURE [dbo].[TempUpdateMerchantCategories_Insert]
(
@LocationID BIGINT,
@PrimaryID INT,
@SecondaryID INT,
@ImageID BIGINT)
AS
BEGIN
if (@ImageID is null)
BEGIN
SET NOCOUNT ON;
INSERT INTO TempMerchant_Location_Category(
LocationID,
PrimaryID,
SecondaryID)
VALUES (
@LocationID,
@PrimaryID,
@SecondaryID)
END
ELSE
BEGIN
SET NOCOUNT ON;
INSERT INTO TempMerchant_Location_Category(
LocationID,
PrimaryID,
SecondaryID,
ImageID)
VALUES(
@LocationID,
@PrimaryID,
@SecondaryID,
@ImageID)
END
END
A:
create your proc like this in that case
CREATE PROCEDURE [dbo].[TempUpdateMerchantCategories_Insert]
( @LocationID BIGINT,
@PrimaryID INT,
@SecondaryID INT,
@ImageID BIGINT = null)
This will make ImageID an optional parameter
|
National Trail Raceway celebrates 50 years of diversity
1:30 AM,
May 1, 2014
Bob Motz prepares to blast off in his jet semi during the 2013 Night of Thunder at National Trail Raceway
Written by
It had been raining for three consecutive days but as Mike Fornataro looked out across the spacious grounds of National Trail Raceway on Wednesday, he could only smile.
The parking lot already was starting to fill up with campers for this weekend's Northern Class Nationals, which hadn't been to the popular quarter-mile drag strip in 10 years.
"They actually started arriving Sunday," said Fornataro, who has taken over as track manager after several years as sales and marketing manager. "They were calling ahead for hotel rooms. They could have taken it anywhere else, but they chose here." ...
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.