text
stringlengths
8
5.77M
Photocatalytic degradation of gaseous perchloroethylene: products and pathway. Batch photocatalytic degradation of 1000-ppm gaseous perchloroethylene (PCE) was conducted with UV irradiation such that nearly 100% was decomposed within 10 min. The main intermediate and final product were identified as trichloroacetylchloride (TCAC) and hydrogen chloride (HCl), respectively, and minor ones as dichloroacetic acid (DCAC), monochloroacetic acid (MCAC), carbon tetrachloride, chloroform, and phosgene. More than 90% of Cl- equivalent, i.e., the sum of the chlorine number in PCE, intermediates, and HCl, was compensated for during the time of PCE degradation; a result indicating that no other major chlorinated intermediates are present during the time of PCE degradation. In a similar experiment, 500 ppm of gaseous TCAC degraded into HCl within 3 h without producing DCAC or MCAC, where like PCE, more than 90% of Cl- equivalent, i.e., the sum of the chlorine number in TCAC and HCl, was compensated for during time of TCAC degradation. Accordingly, gaseous PCE is concluded to predominantly follow a degradation pathway of PCE --> TCAC --> HCl.
The present invention concerns filters, in particular air filters. More particularly, the present invention concerns the characterization of filter cartridge seal impermeability, and more precisely impermeability to air. Air filters are commonly used in industrial devices to separate gases from the particles they contain. The air filter may be used at the exit point of a device, to purify gases prior to release into the atmosphere; or at the entry point of a device to purify the air or gas used inside the device, for example at the entry point of a gas turbine compressor. By design, air filters are built to separate particles from gas, retaining them in a manner comparable to a sieve. The filter's interstitial spaces block the passage of particles while still enabling gas or air to flow. However, the particles retained in the filter place limits on efficient filter volume; and cleaning or replacement of the filter becomes necessary following a certain amount of usage. Filters are thus built in the form of cartridges. The cartridges are equipped with sealing means comprising attachment means and one or several gasket seals, which enable easy and fast replacement of the filter when it is obstructed or congested. However, in view of enabling proper function of the filter, it is also necessary to ensure that the filter cartridge and its sealing means are tight or impermeable to air or gas, to make sure that the circulating air or gas is effectively crossing the filter, and not taking a parallel path along which no filtration occurs.
/* Stats chart */ #statsChart { width: 97%; height: 250px; margin-top: 65px; } /* specific chart styles */ .legendLabel { font-size: 12px; font-family: "Open Sans", Arial; color: #9da3a9; } #pad-wrapper .section { border-top: 1px solid #edeff1; margin-top: 70px; padding-top: 45px; box-shadow: inset 0px 3px 4px -1px #fafafa; } #pad-wrapper h4.title { margin-bottom: 45px; } #pad-wrapper .section .chart h5 { margin-bottom: 10px; } /*Responsive*/
Clinical and Imaging Correlates of Pediatric Mucosal Appendicitis. Mucosal appendicitis is a controversial entity that is histologically distinct from transmural appendicitis. There is mixed opinion regarding mucosal inflammation as a spectrum of appendicitis versus a negative appendectomy. The ability to distinguish these diagnoses preoperatively is of importance to prevent unnecessary surgery. We hypothesize that patients with mucosal appendicitis can be discriminated from those with transmural disease based on specific preoperative clinical and imaging findings. After IRB approval, all patients who underwent laparoscopic appendectomy at our institution during 2015 were reviewed in the electronic medical record. Patients with mucosal appendicitis were identified and matched 2:1 to a random cohort of nonperforated transmural appendicitis cases. Demographic and clinical data were collected, including history, examination, laboratory, and imaging findings. Preoperative factors associated with mucosal appendicitis were modeled using binomial logistic regression analysis. Of 1153 appendectomies performed during 2015, 103 patients had pathologic diagnosis of mucosal appendicitis. When compared with patients with mucosal infection, leukocytosis >10,000 per microliter led to 5.9 times higher likelihood of transmural pathology (P = 0.000). Noncompressibility on ultrasound was associated with 7.3 times higher likelihood of transmural disease (P = 0.015). Echogenic changes were predictive of transmural appendicitis, conferring 3.9 times the risk (P = 0.007). Presence of free fluid led to 2.3 times the rate of transmural pathology (P = 0.007). Finally, for every millimeter decrease in appendiceal diameter, patients were half as likely to exhibit transmural disease (P = 0.000). Together, these variables can successfully predict presence of mucosal appendicitis on final pathology report at a rate of 82.1%, and explain 60% of the variance in diagnosis of mucosal versus transmural appendicitis (P = 0.000). Mucosal appendicitis remains a controversial pathologic entity, but is not associated with greater complications compared with transmural appendicitis when treated with laparoscopic appendectomy. Transmural disease can be predicted by leukocytosis, noncompressible appendix, presence of free fluid, larger appendiceal diameter and echogenicity.
177 Cal.App.3d 415 (1986) 223 Cal. Rptr. 4 In re ANGEL E., a Person Coming Under the Juvenile Court Law. T. GLEN BROWN, as Chief Probation Officer, etc., Plaintiff and Respondent, v. ANGEL E., Defendant and Appellant. Docket No. F005632. Court of Appeals of California, Fifth District. January 17, 1986. *417 COUNSEL Peter C. Carton, under appointment by the Court of Appeal, for Defendant and Appellant. John K. Van de Kamp, Attorney General, and W. Scott Thorpe, Deputy Attorney General, for Plaintiff and Respondent. OPINION BEST, J. When payment of restitution is a condition of a probationary order of the juvenile court, may the ward's probation be revoked upon his failure to make restitution payments as ordered? Absent a showing of the ward's wilful failure to make restitution payments, we will hold that the answer is "No." *418 THE CASE In 1982, two different burglary petitions were sustained against minor and he was ordered to pay restitution in the total sum of $285.24. Minor failed to submit any payment. Many attempts were made in 1984 to persuade minor to honor his restitution obligations, all of which failed. A supplemental petition filed on October 31, 1984, alleged that minor came within the provisions of Welfare and Institutions Code section 777, subdivision (a),[1] in that he violated probation by failing to pay restitution as previously ordered by the court. Ultimately, Angel admitted the allegations of the supplemental petition, and he was committed to the California Youth Authority (CYA) for a period not to exceed four years, less four hundred fifty-seven days credit. DISCUSSION In 1982 at the time the restitution order herein was made, section 731 authorized the juvenile court to order a ward to pay restitution as part of his rehabilitation. (See also §§ 729.6 and 730.6 added by Stats. 1983, ch. 940, §§ 3 and 4, respectively.) (1) While juvenile court proceedings are not criminal proceedings (§ 203), "the `"civil" label-of-convenience' (In re Gault, 387 U.S. 1, 50 [18 L.Ed.2d 527, 558, 87 S.Ct. 1428]) cannot obscure the quasi-criminal nature of juvenile proceedings, involving as they often do the possibility of a substantial loss of personal freedom." (Joe Z. v. Superior Court (1970) 3 Cal.3d 797, 801 [91 Cal. Rptr. 594, 478 P.2d 26]; In re Brian S. (1982) 130 Cal. App.3d 523, 529, fn. 2 [181 Cal. Rptr. 778].) As in In re Brian S., for purposes of our discussion, the restitution order must be deemed part of the quasi-criminal nature of juvenile proceedings. (Ibid.) (2) Since a possible result of a supplementary proceeding under section 777 is that of commitment to CYA (as, indeed, happened in the instant case), the proceeding must meet the constitutional due process standards of criminal proceedings. (In re Donna G. (1970) 6 Cal. App.3d 890, 894 [86 Cal. Rptr. 421].) Section 777 requires the supplemental petition to contain "... a concise statement of facts sufficient to support the conclusion that the previous disposition has not been effective in the rehabilitation or protection of the minor." *419 (3) The only facts alleged in the instant supplemental petition were that Angel had failed to pay restitution in the amount of $285.24 by August 14, 1984, as previously ordered by the court. At the dispositional hearing held on April 24, 1985, the juvenile judge stated: "The Court: Well, I believe that one has to earn trust. What Angel has done here, and his background is committing two burglaries that we know of — he has failed to pay restitution and he failed to report to his probation officer. He failed to appear for a revocation hearing that was scheduled that he was aware of. He finally gets caught prowling on school grounds. He has done poorly in school and he's been to the Kern Youth Facility twice and Camp Irwin Owen once. Because of assault of [sic] conduct at Camp Owen they don't want him back up there. With that kind of background Angel, you have not earned the trust of this Court to give you the kind of chance that you are asking for here." In committing Angel to CYA it is apparent the court relied on many factual matters which were not alleged in the supplemental petition nor adjudicated, e.g., (1) "he failed to report to his probation officer," (2) "He failed to appear for a revocation hearing that was scheduled that he was aware of," (3) "He finally gets caught prowling on school grounds;" (4) "He has done poorly in school," and (5) "Because of assault of [sic] conduct at Camp Owen...." This was error. While these matters were contained in the probation officer's reports, "if the court were to consider the facts contained in those reports, due process, and section 777, require that they be at least summarized in the petition and regularly proven at the hearing." (In re Donna G., supra, 6 Cal. App.3d at p. 895.) In support of the CYA commitment, plaintiff lists as a proper factor for the court's consideration the fact that "three separate Camp Erwin Owen spokesmen `emphatically requested that the minor not be considered for a second commitment there, as he was considered assaultive, possessing limited intelligence and believed to be gang oriented.'" However, not only were these matters not set forth in the supplemental petition, there was no factual basis in the probation report or anywhere in the record upon which the juvenile court could rely to accept the opinion that minor was assaultive, of limited intelligence and gang oriented. Indeed, although the probation officer also believed the minor was prone to involvement in gang activity, he conceded that "[t]hus far, there is no documented evidence to support this opinion." Plaintiff also relies on the probation officer's conclusion in his report stating, "It is this officer's opinion that the minor has learned little or nothing from counseling and supervision provided by agencies, institutions, and *420 individuals on the county level during what has already been a lengthy period of probationary status. Angel continues to exhibit contempt and disregard for court orders and is suspected of ongoing delinquent activity, including street gang involvement." Again, there is no factual basis for the probation officer's suspicion of ongoing delinquent activity, to the extent he refers to criminal conduct if committed by an adult, or gang involvement. As to the former, it appears that the juvenile court may have relied on the probation officer's speculation. In stating grounds for the CYA commitment, the court stated, "[minor's] background is committing two burglaries that we know of. ..." Since no facts were established to support the probation officer's suspicions, it was improper for the court to rely on them. (4) It thus appears that the only factual finding which could arguably support the section 777 adjudication and the subsequent commitment of Angel to CYA was his failure to pay restitution as previously ordered by the court. Subdivision (e) of section 730.6 provides in pertinent part: "However, probation shall not be revoked for failure of a person to make restitution pursuant to Section 729.6 as a condition of probation unless the court determines that the person has willfully failed to pay or failed to make sufficient bona fide efforts to legally acquire the resources to pay." In the instant case, there was no finding by the juvenile court that Angel "has willfully failed to pay or failed to make sufficient bona fide efforts to legally acquire the resources to pay" restitution as ordered.[2] (5) Furthermore, even absent subdivision (e) of section 730.6, without a finding that the failure was willful, a finding that Angel violated his probation by failing to pay restitution as ordered and his subsequent commitment to CYA for that reason would be violative of the equal protection clause of the Fourteenth Amendment. "An indigent defendant cannot be imprisoned because of his inability to pay a fine, even though the fine be imposed as a condition of probation." (People v. Kay (1973) 36 Cal. App.3d 759, 763 [111 Cal. Rptr. 894, 73 A.L.R.3d 1235], citing In re Antazo (1970) 3 Cal.3d 100, 116 [89 Cal. Rptr. 255, 473 P.2d 999].) *421 (6) In this context, an order to pay restitution as a condition of probation is no different than an order to pay a fine. (See In re Brian S., supra, 130 Cal. App.3d 523, 532.) By admitting the allegations of the supplemental petition Angel admitted only the factual allegation that he had failed to pay restitution as previously ordered by the court. As we have noted, this admission was legally insufficient to support a finding that he had violated the terms of his probation. The additional factual matters relied upon by the court to support its order committing Angel to CYA were neither alleged in the supplemental petition nor adjudicated. Under these circumstances, the order sustaining the section 777 petition must be, and is, set aside and the commitment order appealed from is reversed. Martin, Acting P.J., and Hamlin, J., concurred. NOTES [1] All statutory references are to the Welfare and Institutions Code unless otherwise indicated. [2] Even if we were to accept plaintiff's contention that the minor had the burden of proving both a bona fide effort to pay the restitution and indigency, the only evidence before the juvenile court sufficiently established both requirements. The probation officer's report indicates the minor explained his unsuccessful efforts at obtaining employment. Also, minor apparently established indigency at the inception of the juvenile court proceedings since he was represented by the public defender below and by appointed counsel on appeal. (See People v. Feagley (1974) 39 Cal. App.3d 772, 775 [114 Cal. Rptr. 663].) No evidence was presented to rebut either showing.
Q: Terminal & Git on Android Mobile This is not a duplicate question as my previous question is deleted. I use terminal to run my Python and MongoDB codes and willing to use Git to do push/pull my codes into a remote repository. Just wanted to know if I can install a real working terminal in my Android Lolly Pop Phone which will allow me to install Git using... $ sudo apt-get install git Type command. If it is not possible then can anyone tell me whether I can use Git on my Android phone via terminal in any way? A: You'd be best off just using one of the several apps on the market, SGit was the first that came up for me in a search. I don't expect you'd have much luck trying to use git directly in a terminal emulator.
Q: Where can I find a SWIFT form in HTML? I'm developing a banking/accounting system and want to make possible printing a SWIFT (Society for Worldwide Interbank Financial Telecommunication) payment order. Does anybody meet a HTML template of such form? A: For which message type? There are so many SWIFT messages (MT350, MT103, ...) out there. You probably want a MT202? Maybe this can help you on your way: http://www.ubs.com/1/ShowMedia/bank_for_banks/offering/securities/processing?contentId=28371&name=SWIFT_ForGuiMee_e4GzD.pdf
There are many instances in which it is difficult to gain leverage to apply torque to bolts and/or nuts, usually, because of the proximity of other structures. In addition to tight confines of some machinery, there may be the problem of rust and corrosion adhering the components to each other. In these circumstances, impact tools are used to apply a large amount of force with little leverage. Impact tools range from a simple hammer to air hammers, hydraulic rams and electric ultrasonic drivers. Concomitantly, it may be impossible to directly apply the force of the impact tools perpendicularly to the axis of rotation of the bolts or nuts. In such situations, a link is required between the impact tool and the bolt to vector the force. Conventionally, the link is used to vector the force only in the plane of rotation. U.S. Pat. No. 1,923,122 to Smith discloses an impact wrench driven by an air hammer. A conventional open end wrench has a spherical socket mounted on one end. A link having a spherical end and integral arms is rotatably mounted in the socket. The arms are connected with a pin in the shank of the wrench. The other end of the link is to be fitted onto the air hammer. The link can rotate approximately 180 degrees about the pin in a plane perpendicular to the longitudinal axis of the bolt or nut being loosened or tightened. McCarthy, U.S. Pat. No. 1,850,239, discloses a manual impact wrench having an open end with a shank connected by a pin such that the shank can rotate approximately 180 degrees in a plane perpendicular with the longitudinal axis of the bolt. The end of the shank is formed with a flat surface which may be struck with a hammer. Blackmore, U.S. Pat. No. 4,807,349, discloses an apparatus and method for breaking frozen or other tight connections between screw threads by using a rivet gun for impulses along the longitudinal axis of the bolt while applying manual rotational force to the threads. U.S. Pat. No. 5,161,440 to Jordan discloses a box end wrench having a shank with a pivoting arm mounted on one end to pivot in a plane perpendicular to the longitudinal axis of the bolt. The arm may be attached to a ultrasonic or other vibrational energy source to turn the bolt. What is needed in the art is an impact wrench which can pivot in the plane of rotation of a bolt and can rotate about the longitudinal axis of the wrench.
Pollster Douglas Schoen, who worked for President Bill Clinton, penned an op-ed in this morning's Wall Street Journal warning President Barack Obama and other Democrats from associating too closely with the Occupy Wall Street movement. "[T]he Occupy Wall Street movement reflects values that are dangerously out of touch with the broad mass of the American people—and particularly with swing voters who are largely independent and have been trending away from the president since the debate over health-care reform," he writes, citing polling of the protesters conducted by his firm. Obama and congressional Democrats have embraced the movement — with the White House using the term "the 99 percent" for the first time on Sunday. Schoen says participants in Occupy events "are bound by a deep commitment to radical left-wing policies," and that supporting them will only disillusion more voters from the Democratic party. "Today, having abandoned any effort to work with the congressional super committee to craft a bipartisan agreement on deficit reduction, President Obama has thrown in with those who support his desire to tax oil companies and the rich, rather than appeal to independent and self-described moderate swing voters who want smaller government and lower taxes, not additional stimulus or interference in the private sector." "...Put simply, Democrats need to say they are with voters in the middle who want cooperation, conciliation and lower taxes. And they should work particularly hard to contrast their rhetoric with the extremes advocated by the Occupy Wall Street crowd." Read the full op-ed here >
Smooth-pursuit eye movement--a convenient bedside indicator for evaluating frontal lobe and intellectual function. We hypothesized that smooth-pursuit eye movement is related to higher brain functions and that its impairment (iSPEM) could be useful in diagnosing neurological dysfunctions. We prospectively examined 305 patients and studied the relations between iSPEM and five items that reflect intellectual and/or frontal lobe function (dementia, sucking, snouting, hand grasping, elbow flexion response). We divided these patients into four subgroups: group A, patients with cerebellar ataxia as the presenting manifestation and with main lesions in the cerebellum; group B, patients with main lesions in brain regions other than the cerebellum; group C, patients with main lesions in the spinal cord, peripheral nerves, and muscles; and group D, patients with non-organic functional disorders, such as paroxysmal attacks and physical pain. Consequently, iSPEM was significantly (p<0.01) related to impairment in intellectual and frontal lobe functions in patients with cerebral lesions, and it also can be regarded as being equivalent to primitive reflexes.
Q: Gnuplot linecolor by palette, but key not Suppose I have the following gnuplot script. set terminal epslatex standalone size 8cm, 4cm set output "test.tex" set palette defined ( 0 "black", 1 "red" ) plot \ "a.dat" using 1:2:3 linecolor palette z pointtype 9 title "a" , \ "b.dat" using 1:2:3 linecolor palette z pointtype 5 title "b" , \ "c.dat" using 1:2:3 linecolor palette z pointtype 7 title "c" And the following sample datasets a.dat: 0 0 0 1 0 1 2 0 2 3 0 3 4 0 4 b.dat 0 1 0 1 1 1 2 1 2 3 1 3 c.dat 0 2 0 1 2 1 2 2 2 This gives me the following My problem with this example is that the keys in the legend, all get the color of the last datapoint of the respective input file. Basically, what I want all of the symbols in the key to be of the same color. How can I achieve that? I am using gnuplot 4.6.2 (and 4.6.5). I am looking for a general solution. I.e., I am not really looking for a solution where I have to alter the data file (because it is updated on a regular basis). A: The best option which comes into my mind is to use a separate plot expression for each title where you specify the color you actually want in the key: set terminal epslatex standalone size 8cm, 4cm set output "test.tex" set palette defined ( 0 "black", 1 "red" ) set key samplen 1 set offset 0.1,0.1,0.1,0.1 plot \ "a.dat" using 1:2:3 palette pt 9 notitle, "" using 1:(NaN) lc rgb 'black' pt 9 title 'a', \ "b.dat" using 1:2:3 palette pt 5 notitle, "" using 1:(NaN) lc rgb 'black' pt 5 title 'b', \ "c.dat" using 1:2:3 palette pt 7 notitle, "" using 1:(NaN) lc rgb 'black' pt 7 title 'c' set output system('latex test && dvips test && ps2pdf test.ps') Alternatively you could also manually set three labels with the point option, but that might require more fiddling to get the position and alignments correct.
Also, how do the "define (a,b) <= (c,d) iff (a<=c) and d<=b" come into play? Where do account for a being less than or equal to c and d being less than or equal to b? I am still unsure how to show P.O. Anymore help is appreciated.
LC-MS/MS-ESI method for simultaneous quantitation of metformin and repaglinidie in rat plasma and its application to pharmacokinetic study in rats. A highly sensitive and specific LC-MS/MS-ESI method has been developed for simultaneous quantification of metformin (MFN) and repaglinide (RGN) in rat plasma (50 μL) using phenacetin as an internal standard (IS). Simple protein precipitation was used to extract MFN and RGN from rat plasma. The chromatographic resolution of MFN, RGN and IS was achieved with a mobile phase consisting of 0.2% formic acid in water-acetonitrile (1:1, v/v) with a time program flow gradient on a Chromolith RP-18e column. The total chromatographic run time was 3.5 min and the elution of MFN, RGN and IS occurred at 1.64, 2.21 and 2.15 min, respectively. A linear response function was established for the range of concentrations 0.855-394 and 0.021-21.7 ng/mL for MFN and RGN, respectively. The intra- and inter-day precision values for MFN and RGN met the acceptance as per FDA guidelines. MFN and RGN were stable in battery of stability studies viz., bench-top, auto-sampler and freeze-thaw cycles. The developed assay was applied to a pharmacokinetic study in rats.
Crosswalk.com aims to offer the most compelling biblically-based content to Christians on their walk with Jesus. Crosswalk.com is your online destination for all areas of Christian Living – faith, family, fun, and community. Each category is further divided into areas important to you and your Christian faith including Bible study, daily devotions, marriage, parenting, movie reviews, music, news, and more. Cannon Beach Q&A, Part 2 I'm a modest person and I don't even like undressing at the doctor's office. If God is always watching us, and angels are always with us, does this mean when my spouse and I are having sex that we have an audience? The short answer is yes. This is part of the doctrine of God's omnipresence. Read Psalm 139 and you will see how clearly the Bible states this. There is nowhere we can go that God is not already there. If we venture to the ends of the earth, he is there. So he is certainly with us in the bedroom. But remember this. After God created Eve and brought her to Adam and they became husband and wife, the Bible says that they "were both naked, and they felt no shame" (Genesis 2:25). That verse is hard for us to understand because nakedness is the blessing we can hardly bear. But in Eden, before sin entered the world, nakedness did not involve shame. Where there is no sin, there can be no shame. God is pleased when a husband and wife come together on the marriage bed. Hebrews 13:4 tells us that marriage is honorable and the marriage bed is "undefiled," meaning that the physical act of coming together as husband and wife pleases the Lord. In the old marriage ceremonies, the husband and wife were said to "worship" in their coming together. Rather than see sex in marriage as shameful, we should see it as beautiful and God-honoring. It is a true act of worship that pleases the Lord who sees and knows all that we do. What did the churches of Galatia do when they received Paul's letter? How did they respond to his message? The book of Galatians ends with the question left hanging in the air. As he writes his final words, not even Paul knows the answer. Having made his argument, the issue now rests with his readers. Will they choose slavery or freedom? It is fitting that the book ends this way, with an unanswered question, because in every generation the church of Jesus Christ faces the same issue in one form or another. Will we choose liberty in Christ or will we succumb to the temptation to return to the slavery of self-effort and lawkeeping as a means of pleasing God? Will we turn away from the gospel of grace or will we embrace Christ and his cross as our only hope of salvation? In Matthew 16:18 Jesus said, "I will build my church." Note the singular, "my church," not "my churches." From God's point of view there is only one church composed of all true believers in the Lord Jesus Christ. On earth we divide into various denominations, partly because of tradition, sometimes because of human opinion, and sometimes because we have trouble getting along with each other. Often we divide because of sincerely held disagreements over what the Bible teaches in certain areas. The history of the Christian church reveals a fractured body of imperfect people who keep dividing and subdividing. That's part of the scandal of Christian disunity that we see all around us. The answer is not some sort of "super-church" where all the doctrinal differences are put aside. The real answer is spiritual unity among all true believers where we unite around a common confession of faith in Christ even while agreeing to disagree on lesser matters. What do you say to preachers and teachers who feel they must "name names" and call out certain organizations in order to "protect the flock"? Sometimes you must be specific when there is a specific attack of false doctrine. Sometimes we must name names in order to be fair to the opposition. If I'm going to criticize a certain person for false teaching, it seems only right that I quote him fairly and give the citation so that others can check out what I'm saying. Paul occasionally named names. Note 2 Timothy 2:17 where he calls out "Hymenaeus and Philetus." While calling out false teachers must be done, I personally wouldn't care to attend a church where that happened every Sunday. I would rather hear positive teaching of the Word of God because that will build my soul and make me strong. Pastors should name names when they need to, but we'll do better if that happens occasionally and not as a steady diet on Sunday morning.
// +build ignore // This code consumes the JSON created from scraping the MS documentation and generates the map of Attribute names // to Syntax // to update the JSON, run scrapeAttributesFromMS.py in the tools directory package main import ( "encoding/json" "io/ioutil" "log" "os" "text/template" "time" ) type ADAttributeJSON struct { CN string `json:"CN"` LdapDisplayName string `json:"Ldap-Display-Name"` AttributeId string `json:"Attribute-Id"` SystemIDGuid string `json:"System-Id-Guid"` Syntax string `json:"Syntax"` IsSingleValue bool `json:"Is-Single-Valued"` } type data struct { ADAttributes []ADAttributeJSON Syntaxes []string Timestamp string } func must(err error) { if err != nil { log.Fatal(err) } } func main() { var d data d.Timestamp = time.Now().Format(time.RFC3339) file, err := ioutil.ReadFile("../../tools/ADAttributes.json") must(err) err = json.Unmarshal([]byte(file), &d.ADAttributes) must(err) uniqueSyntaxes := make(map[string]bool) var multiValueAttributes []string for _, attr := range d.ADAttributes { if _, ok := uniqueSyntaxes[attr.Syntax]; !ok { uniqueSyntaxes[attr.Syntax] = true d.Syntaxes = append(d.Syntaxes, attr.Syntax) } if !attr.IsSingleValue { multiValueAttributes = append(multiValueAttributes, attr.LdapDisplayName) } } tmpl, err := template.New("attributeSyntax").Parse(attributeSyntaxTemplate) must(err) f, err := os.Create("attr_syntaxes.go") must(err) defer f.Close() tmpl.Execute(f, d) } var attributeSyntaxTemplate = ` // This file was automatically generated at // {{ .Timestamp }} // from AD Schema documentation here https://docs.microsoft.com/en-us/windows/win32/adschema/ // length of unique attributes: {{len .ADAttributes}} // length of unique syntaxes: {{len .Syntaxes}} package adschema type ADAttributeInfo struct { Syntax string IsSingleValue bool } var AttributeMap = map[string]*ADAttributeInfo{ {{range $attr := .ADAttributes}} "{{$attr.LdapDisplayName}}": &ADAttributeInfo{Syntax: "{{$attr.Syntax}}", IsSingleValue: {{$attr.IsSingleValue}}},{{end}} } `
What is NFC Technology? Before digging into the details about how to use NFC in Android, it is useful to describe a bit about NFC technology. Near Field Technology (NFC) is a technology that enables short-range communication between two compatible devices that support this technology. NFC requires that one device behaves as the transmitter and the other one as a receiver. NFC enabled devices can be grouped in two categories: Active Passive Active NFC devices are capable of sending and receiving data and can exchange data with a passive device. Passive devices can send data to other NFC-enabled devices without a power source. A typical passive device is NFC tag that can be used as advertising system for example. NFC technology is available on the newest Android smartphones and NFC tags are used to active advertising, smart payment etc. It is important than to know how to write NFC tags in Android. Getting Started Using NFC The first thing an NFC-enabled Android app should do is verifying if the NFC is present and if it is active: Just to recall if you have not read the getting started with NFC tutorial, it is necessary to register the android app so that it receives notification when the Android device is near the NFC tag. To enable this notification we have to use NFC foreground dispatch: How To Write A NFC Tag In Android Now the Android app is ready to handle the NFC tag and when the Android smartphone gets near the NFC tag, the event is notified to the app. The next step is writing the data on the tag. The method is quite simple: This method accepts an abstract representation of the NFC tag we want to write and the NdefMessage containing the message to write. As the first step, the NFCManager class tries to get the Ndef tag (line 4). If the tag is null, the app tries to "format" the tag and the write the message. If the tag is already formatted, the Android app tries to connect to the tag abstract representation and write the NdefMessage. Write URL Into NFC Tag With Android App Now it is known how to write data into NFC tag, it is time to start writing some simple information. The code is very simple, using NdefRecord provided by Android NFC API, the Android app creates a Uri record. As we already know, a NdefMessage is an array of record, so we create an NFC Ndef Message holding only one record: the Uri record.In this case, type holds HTTP value because it is a link. If we want to write an NFC tag that holds a phone number so that when the user taps with the smartphone the tag a phone call is triggered, we have to pass as type tel:. Write Text Data Into NFC Tag The last example is writing text data in an NFC tag. In this case following NFC specs the code is very simple: Implementing The Android UI For NFC App The last step is implementing the UI so that the Android app handles different NFC record type and the user can insert the data to write. The app uses a spinner that holds the different record types and an EditText that holds the data to write and finally a button (a Floating Action Button) to start the operation. As soon as the user clicks on the button the app starts waiting for the NFC tag. When the user taps on the tag, the app starts writing the data.
Ripe vine tomatoes, French beans, Charlotte potatoes, black olives and a french vinaigrette topped with a thick seared tuna steak and griddled tiger prawns. Served with a side order of triple fried frites
Sealing documents and records is actually a fairly common practice. In many countries, birth, marriage and divorce records, just to name a few, are often sealed for a variety of reasons. However, when documents are sealed, or kept secret, in highly publicized cases it becomes very intriguing and mysterious with potential conspiracy implications. In this list I have gathered what I hope are 10 interesting unopened and opened documents that were sealed or not available to the public, for one reason or the other. 10 Dr. David Kelly’s Post Mortem Sealed Until: 2073 David Kelly worked for the U.K Ministry of Defense as an expert in bio-weapons. He was also one of the key UN weapons inspectors in Iraq. In 2003, he became concerned about the US/UK claims of WMD in Iraq in the build-up to the Iraq war. The trouble started when Kelly became an anonymous source for a BBC journalist, who quoted his doubts about the existence of weapons of mass destruction. After Kelly’s identity was leaked, a Parliamentary committee, tasked with investigating the intelligence on Iraq, asked Kelly to testify, which he did. During his testimony Kelly denied any knowledge of the quotes. Several days after his testimony, he went for a walk, as he did almost every day. In a wooded area about a mile away from his home he ingested up to 29 tablets of painkillers then cut his left wrist. The British government announced that Lord Hutton would lead the Inquiry into Kelly’s death. The Hutton Inquiry reported, on the 28th of January, 2004, that Kelly had committed suicide. Although suicide was officially accepted as the cause of death, some medical experts have their doubts, suggesting that the evidence does not back this up. In January 2010, Lord Hutton ordered that all files relating to the post mortem remain sealed for 70 years from the date of his death, for reasons that have not been explained. Interesting Fact: Most of the articles I came across concerning Dr. Kelly were pretty much agenda driven, with a lot of conspiracy theories. I do admit that the sealed post mortem does make it seem a little fishy. However, it should be pointed out that there are still many who believe that Kelly committed suicide. They explain that the killer, or killers, would have had to kidnap him and march him into the woods, then force tablets down his throat and make him cut his own wrist. All of this without leaving any trace of forensic evidence on Kelly. It is also said that just before he was found dead, he was seen alone by a friend on his way to the woods, where they exchanged pleasantries. 9 Shirley Ardell Mason Files Sealed Until: Indefinitely The life of Shirley Ardell Mason was chronicled by Arthur Flora Rheta Schreiber in the book “Sybil”. It was published in 1973 and then made into a television movie in 1976, starring Sally Field. Mason’s real name was not used in order to protect her identity. In the early 1950s, Mason was a student at Columbia University and had long suffered from blackouts and emotional breakdowns, and had started therapy with psychiatrist Cornelia B. Wilbur. It was their psychotherapy sessions together that was the basis of the book. Wilber diagnosed and treated her for multiple personality disorder, with, reportedly, up to 16 co-existing personalities. In 1998, Robert Rieber and John Jay of the College of Criminal Justice claimed Wilbur had manipulated Mason in order to secure a book deal. Neither Rieber nor Jay are psychologists, but the miss-diagnoses was also supported by Dr. Herbert Spiegel, who saw Mason for several sessions while Wilbur was on vacation. Spiegel argued that Sybil had disassociation disorder, not multiple personalities. Shirley Ardell Mason died of breast cancer in 1998, at the age of 75. The case still remains very controversial and, due to privacy laws, it is very unlikely that Mason’s therapy records will ever be released to the public. Interesting Fact: Dr. Herbert Spiegel recalled that Wilbur came to him with author Flora Rheta Schreiber and asked him to co-author the book with them, and that they would be calling the book Sybil a “multiple personality.” Spiegel told them, “But she’s not a multiple personality!” When Spiegel told Wilbur and Schreiber that multiple personality would not be accurate, Schreiber got in a huff and said, “But if we don’t call it a multiple personality, we don’t have a book!” 8 Mark Twain’s Autobiography Sealed Until: This Year One of Mark Twain’s wishes before he died was that his autobiography not be published until 100 years after his death, which was April 21, 1910. Twain left behind thousands of unedited pages of memoirs, together with handwritten notes. Included in the memoirs are 400 pages detailing his relationship with Isabel Van Kleek Lyon, who became his secretary after his wife died in 1904. Twain says he was so close to Lyon that she once bought him an electric vibrating sex toy. However he later turns on her, saying she had seduced him and “hypnotized” him into giving her the power of attorney over his estate. Also included are his doubts about God, and questions the imperial mission of the U.S. in Cuba, Puerto Rico and the Philippines. The first volume of the autobiography is to be published November 2010 by the University of California, where the manuscripts were sealed in a vault. The eventual trilogy will run close to half a million words. Interesting Fact: No one really know for sure why Mark Twain wanted the first-hand account of his life kept under wraps for so long. Some scholars believe it was because he wanted to talk freely about issues such as religion and politics. Others argue that the time lag prevented him from having to worry about offending friends. I think it was probably both. 7 Identical Twin Study Sealed Until: 2066 In the 1960s and 70s renowned New York psychologist Viola Bernard and her colleague, Dr. Peter Neubauer, conducted a nature-nurture study. They persuaded an adoption agency to send twins to different homes, without telling the respective adoptive parents that the children were, in fact, twins. In 1963, Dr. Bernard wrote that the study “provides a natural laboratory situation for studying certain questions with respect to the nature-nurture issue, and of family dynamic interactions in relation to personality development.” She also believed that, if separated, identical twins would be better off with their individual identities. When the families adopted the children, they were told that their child was already part of an ongoing child study, but neglected to tell them the key element of the study. The adoptive families would travel separately to the center once a month for 12 years for IQ tests and speech analysis. They would also visit their homes and film the children playing. The study ended in 1980, and a year later, the state of New York began requiring adoption agencies to keep siblings together. Realizing that public opinion would be against this type of research, Dr. Neubauer decided not to publish it. Yale University gathered all the information from the study and sealed it until 2066, when most of the participants will likely be dead. Interesting Fact: I know these twins were already featured in a twins list a while back, but I think they are worth another look. The two women pictured above, Elyse and Paula, were one of the sets of twins studied. When Elyse was 35 she registered with the Adoption Information Registry, and later received a call telling her she had a twin sister. She was also told about the controversial study. When the twins were reunited they started to investigate the details of their adoption. Dr. Bernard had already died, but the twins were able to track down Dr. Neubauer and, after many requests, he agreed to meet with them. The doctor showed no remorse and offered no apology. Of the 13 children involved in the study, three sets of twins and one set of triplets have discovered their siblings. There are still four people who don’t know that they have an identical twin. Efforts to have Yale University release the records by the sisters and other twins have failed. For those who want to know more about Elyse and Paula’s remarkable story, you can watch an interview of the two here. 6 France’s Secret UFO Files Opened in: 2007 In 2007, France’s National Center for Space Studies made available over 1000 files on UFO cases, that have been researched by the French government for over 50 years. The archives were made available onto its Internet site for worldwide viewing. The files include pictures of possible UFOs, eyewitness accounts, field journals and inter-governmental documents on those sightings. Within three hours of posting the first cases, the French space agency’s Web server crashed because of the flood of viewers seeking the first glimpses of official government UFO files. Jacques Patenet, who heads the Group for the Study of Unidentified Aerospace Phenomena said “the data that we are releasing doesn’t demonstrate the presence of extraterrestrial beings, but it doesn’t demonstrate the impossibility of such presence either”. The French government is the first to release this type of information to the public. Great Britain then followed by releasing their files in 2008. You can go on the French website here and the UK site can be found here. Interesting Fact: One of the more interesting cases included in the files happened on Aug. 29, 1967. A 13-year-old boy and his 9-year-old sister were watching over their family’s cows near the village of Cussac when the boy spotted “four small black beings” about 47 inches tall. Thinking they were other youngsters, he shouted to his sister, “Oh, there are black children!” But as they watched, the four beings became agitated and rose into the air, entering the top of what appeared to be a round spaceship, about 15 feet in diameter, which hovered over the field. Just as the sphere rose up, one of the passengers emerged from the top and returned to the ground to grab something, then flew back to the sphere. The sphere “became increasingly brilliant” before disappearing with a loud whistling sound and left “a strong sulfur odor after departure,” The children raced home in tears and their father summoned the local police, who “noted the sulfur odor and the dried grass at the reported place where the sphere took off.” 5 Kennedy’s Assassination Records Sealed Until: 2017 In 1964, the Warren Commission submitted the unpublished portion of the assassination records to the National Archives, where it was to be sealed and locked away until 2039 (75 years later). This was to serve as protection for innocent persons who might be damaged because of their relationship with participants in the case. However, due to the popularity of Oliver Stone’s film, JFK, and because of the public outcry, it led to the passage of The President John F. Kennedy Assassination Records Collection Act of 1992. This Act mandated that all assassination-related material be housed in a single collection in the National Archives and Records Administration. The Act also requires that each assassination record be publicly disclosed in full, and be available in the collection no later than 25 years after the date of enactment. From 1994 to 1998, almost all of all Warren Commission documents had been released to the public. The resulting collection consists of more than 5 million pages of assassination-related records, photographs, sound recordings, motion pictures and artifacts. By 2017, all existing assassination-related documents will be made public. Interesting Fact: I guess I’m still in the minority to believe in the lone gunman theory but I do have an open mind about it. In a recent U.S. poll the following questions were asked: “Do you think Lee Harvey Oswald was the only gunman in the Kennedy assassination, do you think there was another gunman in addition to Oswald there that day, or do you think Oswald was not involved in the assassination at all?” Results are: Only Oswald 32%, Another Gunman 51%, Oswald Not Involved 7% No Opinion 10%. You can watch a recent digitized version of the famous Zapruder film here. 4 Trial Records of Mata Hari Opened in: 1985 Mata Hari was the stage name of a highly successful Dutch exotic dancer, Gertrud Margarete Zelle. Because of her profession, she had many cross-border associations. During World War 1, the French Government convinced her to travel to neutral Spain. There she could develop relationships with the German navy and army and report any intelligence back to Paris. There are different accounts for reasons why she was accused of being a double spy. Several sources claim that, in January 1917, the German military transmitted a radio message to Berlin describing the helpful activities of a German spy, code-named H-21. French intelligence agents intercepted the messages and identified H-21 as Mata Hari. What makes this even more interesting is that the messages are said to be in a code that German intelligence knew had already been broken by the French. This leaves some historians to suspect that the messages were contrived and the French were using her as a propaganda boost. They claimed she had cost the lives of 50,000 French soldiers. Mat Hari was arrested, stood trail and was convicted of being a German Spy. On October 15th 1917, at the age of 41, Mata Hari was executed by firing squad. She went to her death with dignity, all the while proclaiming her innocence. The prosecutor wanted the trial to be in secret and the records were to be sealed for 100 years. However, in 1985, Biographer Russell Warren convinced the National defense Minister of France to open the sealed case file thirty two years early. In the opinion of many experts, it’s said to reveal that Mata Hari was innocent of the charges of which she was convicted. Interesting Fact: The more I read about Mata Hari, the more fascinating I found her. I also found this interesting. Henry Wales, a British reporter and eye witness, wrote this incredibly detailed account about the day of her execution. You can read it here. 3 Martin Luther King Tapes Sealed Until: 2027 Fearing that Martin Luther King Jr. had ties to Communist organizations, the FBI spied on him for several years. The FBI described King as “the most dangerous and effective Negro leader in the country”. FBI Director J. Edgar Hoover filed a request with Attorney General Robert Kennedy to wiretap King and his associates. Kennedy gave the Bureau permission and tapped their phones and placed hidden microphones in homes, hotel rooms and offices. The FBI was unsuccessful in proving that he had ties to Communists; however they did have something that would reveal embarrassing details about King’s sex life. King refused to give in to the FBI’s threats, even after the FBI drafted a letter to him from an anonymous source detailing everything they knew about his sexual transgressions. Highlights of the letter include: “You are a colossal fraud and an evil, vicious one at that.” “The American public will know you for what you are, an evil, abnormal beast, and Satan could not do more” “King, there is only one thing left for you to do.” Some have theorized the intent of the letter was to drive King to commit suicide in order to avoid personal embarrassment. On January 31, 1977, district Judge John Lewis Smith, Jr., ordered all known copies of recorded audiotapes and written transcripts resulting from the FBI’s surveillance of King between 1963 and 1968 to be sealed in the National Archives and away from public access for 50 years. Interesting Fact: Ralph Abernathy was a close associate of King’s in the civil rights movement. In his autobiography titled “And the Walls Came Tumbling Down”, he does mention that King was a “womanizer”. He also wrote this about the Surveillance Tapes: “I remember in particular a stay at the Willard Hotel in Washington, where they not only put in audio receivers, but video equipment as well. Then, after collecting enough of this ‘evidence’ to be useful, they began to distribute it to reporters, law officers, and other people in a position to hurt us.” Finally, when no one would do Hoover’s dirty work for him, someone in the FBI put together a tape of highly intimate moments and sent them to Martin. Unfortunately — and perhaps this was deliberate — [his wife] Coretta received the tape and played it first. But such accusations never seemed to touch her. She rose above all the petty attempts to damage their marriage by refusing to even entertain such thoughts. 2 Sinking of the RMS Lancastria Sealed Until: 2040 On June 17th 1940, the Lancastria was evacuating British troops and civilian refugees, including women and children from France, which was then on the point of collapse. At 6:00am, Captain Rudolf Sharp received orders to load as many troops and refugees as possible, and to disregard international laws on passenger limits. By lunchtime, the decks were packed with anywhere between 6,000 to 9,000 troops and refugees. A nearby destroyer signaled the Lancastria to get under way, if she was full to capacity, but offered no escort. At 3.48pm, a German bomber appeared and dropped four bombs which ripped through the Lancastria. Within 20 minutes the, luxury liner went down, taking with her an estimated 4,000 to 7,000 victims. The official report of this terrible incident was sealed for 100 years under the Official Secrets Act. It has been argued that this might be because if it could be confirmed that the Ministry of Defense did indeed instruct Captain Sharp to ignore load restrictions, there would be grounds for compensation claims from relatives. In July 2007, another request for documents held by the Ministry of Defense related to the sinking was rejected by the British Government. This tragedy was the largest single-day loss of life to the British Army since the Battle of the Somme. To this day there has been no official British government recognition of the dead or the survivors. Interesting Fact: Winston Churchill immediately hid the news from the public, thinking that to reveal the truth would have been too damaging for civilian morale. He said, ‘The newspapers have got quite enough disaster for today, at least.’ You can watch a tribute to the Lancastria here. 1 Worst Friendly-Fire Incident Sealed Until: 2045 This is just a heart a wrenching tragedy with a great loss of life, but it remains just a little-known chapter of World War II history, and rarely appears in history books. It happened on May 3, 1945, four days after Hitler’s suicide, and four days before the unconditional German surrender. After enduring years of Nazi brutality, thousands of concentration camp prisoners were loaded on to two German ships in Lubeck Bay, the Cap Arcona and the Thielbek. The British Air Force commanders ordered a strike on the ships, thinking they carried escaping SS officers, possibly fleeing to German-controlled Norway. The British Typhoon fighter-bombers struck in several attack waves. The Thielbek, packed with 2,800 prisoners, sank in just 20 minutes, killing all but 50 prisoners. The Cap Arcona carrying 4,500 prisoners took longer to go under, and many inmates burned to death. In less than two hours, more than 7,000 concentration camp refugees were dead. Some believe the Nazis intended to sink the ships at sea, to kill everyone on board. Another unlikely scenario is the British intelligence may have known who was on the ships and it would explain why the Royal Air Force sealed the records for 100 years. Interesting Fact: For weeks after the sinking, bodies of the victims were being washed ashore, and were collected and buried in a single mass grave at Neustadt in Holstein. For nearly thirty years, parts of skeletons were being washed ashore, until the last find, by a twelve-year-old boy, in 1971.
--- abstract: 'We propose an energy-efficient procedure for transponder configuration in FMF-based elastic optical networks in which quality of service and physical constraints are guaranteed and joint optimization of transmit optical power, temporal, spatial and spectral variables are addressed. We use geometric convexification techniques to provide convex representations for quality of service, transponder power consumption and transponder configuration problem. Simulation results show that our convex formulation is considerably faster than its mixed-integer nonlinear counterpart and its ability to optimize transmit optical power reduces total transponder power consumption up to $32\%$. We also analyze the effect of mode coupling and number of available modes on power consumption of different network elements.' author: - 'Mohammad Hadi,  and Mohammad Reza Pakravan, ' bibliography: - 'Reference.bib' title: 'Energy-Efficient Transponder Configuration for FMF-based Elastic Optical Networks' --- Convex optimization, Green communication, Elastic optical networks, Few-mode fibers, Mode coupling. Introduction {#sec_I} ============ temporally, spectrally and spatially Elastic Optical Network (EON) has been widely acknowledged as the next generation high capacity transport system and the optical society has focused on its architecture and network resource allocation techniques [@proietti20153d]. EONs can provide an energy-efficient network configuration by adaptive 3D resource allocation according to the communication demands and physical conditions. Higher energy efficiency of Orthogonal Frequency Division Multiplex (OFDM) signaling has been reported in [@khodakarami2014flexible] which nominates OFDM as the main technology for resource provisioning over 2D resources of time and spectrum. On the other hand, enabling technologies such as Few-Mode Fibers (FMFs) and Multi-Core Fibers (MCFs) have been used to increase network capacity and efficiency through resource allocation over spatial dimension [@saridis2015survey; @proietti20153d]. Although many variants of algorithms have been proposed for resource allocation in 1D/2D EONs [@chatterjee2015routing], joint assignment of temporal, spectral and spatial resources in 3D EONs needs much research and study. Among the available works on 3D EONs, a few of them have focused on energy-efficiency which is a fundamental requirement of the future optical networks [@muhammad2015resource; @winzer2011energy; @yan2017joint]. Moreover, the available energy-efficient 3D approaches do not consider transmit optical power as an optimization variable which results in inefficient network provisioning [@hadi2017energy]. Flexible resource allocation is an NP-hard problem and it is usually decomposed into several sub-problems with lower complexity [@khodakarami2016quality]. Following this approach, we decompose the resource allocation problem into 1) Routing and Ordering Sub-problem (ROS) and 2) Transponder Configuration Sub-problem (TCS) and mainly focus on TCS which is more complex and time-consuming [@yan2015resource; @hadi2017resource]. We consider FMF because it has simple amplifier structure, easier fusion process, lower nonlinear effects and lower manufacturing cost compared to other Space-Division Multiplexed (SDM) optical fibers [@saridis2015survey; @ho2013mode]. In TCS, we optimally configure transponder parameters such as modulation level, number of sub-carriers, coding rate, transmit optical power, number of active modes and central frequency such that total transponders power consumption is minimized while Quality of Service (QoS) and physical constraints are met. Unlike the conventional approach, we provide convex expressions for transponder power consumption and Optical Signal to Noise Ratio (OSNR), as an indicator of QoS. We then use the results to formulate TCS as a convex optimization problem which can efficiently be solved using fast convex optimization algorithms. We consider transmit optical power as an optimization variable and show that it has an important impact on total transponder power consumption. Simulation results show that our convex formulation can be solved almost $20$ times faster than its Mixed-Integer NonLinear Program (MINLP) counterpart. Optimizing transmit optical power also improves total transponder power consumption by a factor of $32\%$ for European Cost239 optical network with aggregate traffic $60$ Tbps. We analyze the effect of mode coupling on power consumption of the different network elements. As simulation results show, total network power consumption can be reduced more than $50\%$ using strongly-coupled FMFs rather than weakly-coupled ones. Numerical outcomes also demonstrate that increasing the number of available modes in FMFs provides a trade-off between FFT and DSP power consumption such that the overall transponder power consumption is a descending function of the number of available modes. System Model {#Sec_II} ============ Consider a coherent optical communication network characterized by topology graph $G(\mathbf{V}, \mathbf{L})$ where $\mathbf{V}$ and $\mathbf{L}$ are the sets of optical nodes and directional optical strongly-coupled FMF links, respectively. The optical FMFs have $\mathcal{M}$ modes and gridless bandwidth $\mathcal{B}$. $\mathbf{Q}$ is the set of connection requests and $\mathbf{Q}_l$ shows the set of requests sharing FMF $l$ on their routes. Each request $q$ is assigned a contiguous bandwidth $\Delta_q$ around carrier frequency $\omega_q$ and modulates $m_q$ modes of its available $\mathcal{M}$ modes. The assigned contiguous bandwidth includes $2^{b_q}$ OFDM sub-carriers with sub-carrier space of $\mathcal{F}$ so, $\Delta_q=2^{b_q}\mathcal{F}$. To have a feasible MIMO processing, the remaining unused modes of a request cannot be shared among others [@ho2013mode]. We assume that the assigned bandwidths are continuous over their routes to remove the high cost of spectrum/mode conversion [@spectrum2017hadi]. Request $q$ passes $\mathcal{N}_q$ fiber spans along its path and has $\mathcal{N}_{q,i}$ shared spans with request $i\neq q$. Each FMF span has fixed length of $\mathcal{L}_{spn}$ and an optical amplifier to compensate for its attenuation. There are pre-defined modulation levels $c$ and coding rates $r$ where each pair of $(c, r)$ requires minimum OSNR $\Theta(c, r)$ to get a pre-FEC BER value of $1\times 10^{-4}$ [@yan2015resource]. Each transponder is given modulation level $c_q$, coding rate $r_q$ and injects optical power $p_q/m_q$ to each active mode of each polarization. Chromatic dispersion and mode coupling signal broadenings are respectively proportional to $\mathcal{N}_q2^{b_q}$ and $m_q^{-0.78}\sqrt{\mathcal{N}_q}$ with coefficients $\sigma=2\pi\abs{\beta_2}\mathcal{F}\mathcal{L}_{spn}$ and $\varrho=5\Delta\beta_1 \sqrt{L_{sec}\mathcal{L}_{spn}}$ where $\beta_2$ is chromatic dispersion factor and $\Delta\beta_1 \sqrt{L_{sec}}$ is the product of rms uncoupled group delay spread and section length [@arik2014adaptive]. Transponders add a sufficient cyclic prefix to each OFMD symbol to resolve the signal broadening induced by mode coupling and chromatic dispersion. Transponders have maximum information bit rate $\mathcal{C}$. There is also a guard band $\mathcal{G}$ between any two adjacent requests on a link. Considering the architecture of Fig. \[fig:transponder\], the power consumption of each pair of transmit and receive transponders $P_q$ can be calculated as follows: $$\begin{aligned} \label{eq:trx_pow} P_q = \mathcal{P}_{trb}+2\mathcal{P}_{edc}m_qr_q^{-1}+2m_q2^{b_q}b_q\mathcal{P}_{fft}+2m_q^22^{b_q}\mathcal{P}_{dsp}\end{aligned}$$ where $\mathcal{P}_{trb}$ is transmit and receive transponder bias term, $\mathcal{P}_{edc}$ is the scaling coefficient of encoder and decoder power consumptions, $\mathcal{P}_{fft}$ denotes the power consumption for a two point FFT operation and $\mathcal{P}_{dsp}$ is the power consumption scaling coefficient of the receiver DSP and MIMO operations [@ho2013mode; @khodakarami2014flexible]. To have a green EON, we need a resource allocation algorithm to determine the values of system model variables such that the transponders consume the minimum power while physical constrains are satisfied and desired levels of OSNR are guaranteed. In general, such a problem is modeled as an NP-hard MINLP optimization problem [@yan2015resource]. To simplify the problem and provide a fast-achievable near-optimum solution, the resource allocation problem is usually decomposed into two sub-problems: ROS, where the routing and ordering of requests on each link are defined, and 2) TCS, where transponders are configured. Usually the search for a near optimal solution involves iterations between these two sub-problems. To save this iteration time, it is of great interest to hold the running time of each sub-problem at its minimum value. In this work, we mainly focus on TCS which is the most time-consuming sub-problem and formulate it as a convex problem to benefit from fast convex optimization algorithms. For a complete study of ROS, one can refer to [@hadi2017energy; @hadi2017resource]. Transponder Configuartion Problem {#Sec_III} ================================= A MINLP formulation for TCS is as follows: $$\begin{aligned} &\hspace{-1.5mm}\min_{\mathbf{c}, \mathbf{b}, \mathbf{r}, \mathbf{p},\mathbf{m}, \bm{\omega}} \quad \sum\limits_{q \in \mathbf{Q}}P_q\label{eq:nonlinear_g}\\ &\hspace{-1.5mm}\text{s.t.} \quad \Psi_q \geqslant \Theta_q, \forall q \in \mathbf{Q} \label{eq:nonlinear_c1}\\ & \hspace{-1.5mm} \omega_{\Upsilon_{l, j}}+\frac{\Delta_{\Upsilon_{l, j}}+\Delta_{\Upsilon_{l, j+1}}}{2} + \mathcal{G}\leqslant \omega_{\Upsilon_{l, j+1}}, \forall l \in \mathbf{L}, \forall j \in \mathbf{M}_{1}^{\abs{\mathbf{Q}_l}} \label{eq:nonlinear_c2}\\ &\hspace{-1.5mm}\frac{\Delta_q}{2} \leqslant \omega_q \leqslant \mathcal{B}- \frac{\Delta_q}{2}, \forall q \in \mathbf{Q}\label{eq:nonlinear_c3}\\ & \hspace{-1.5mm}\mathcal{R}_q \leqslant \frac{2\mathcal{F}^{-1}m_qr_q c_q\Delta_q}{\mathcal{F}^{-1}+\sigma\mathcal{N}_{q}2^{b_q}+\varrho m_q^{-0.78}\sqrt{\mathcal{N}_{q}}}, \forall q \in \mathbf{Q} \label{eq:nonlinear_c4}\end{aligned}$$ where $\mathbf{c}$, $\mathbf{b}$, $\mathbf{r}$, $\mathbf{p}$, $\mathbf{m}$ and $\bm{\omega}$ are variable vectors of transponder configuration parameters [*i*.*e*. ]{}modulation level, number of sub-carriers, coding rate, transmit optical power, number of active modes and central frequency. $\mathbf{M}_{a}^{b}$ shows the set of integer numbers $\{a, a+1, \cdots, b-1\}$. The goal is to minimize the total transponder power consumption where $P_q$ is obtained using . Constraint is the QoS constraint that forces OSNR $\Psi_q$ to be greater than its required minimum threshold $\Theta_q$. $\Psi_q$ is a nonlinear function of $\mathbf{b}$, $\mathbf{p}$, $\mathbf{m}$ and $\bm{\omega}$ while the value of $\Theta_q$ is related to $r_q$ and $c_q$ [@hadi2017resource; @yan2017joint]. Constraint is nonoverlapping-guard constraint that prevents two requests from sharing the same frequency spectrum. $\Upsilon_{l, j}$ is a function that shows which request occupies $j$-th assigned spectrum bandwidth on link $l$ and its values are determined by solving ROS [@hadi2017resource; @yan2017joint]. Constraint holds all assigned central frequencies within the acceptable range of the fiber spectrum. The last constraint guarantees that the transponder can convey the input traffic rate $\mathcal{R}_q$ in which wasted cyclic prefix times are considered. Generally, this problem is a complex MINLP which is NP-hard and cannot easily be solved in a reasonable time. Therefore, we use geometric convexification techniques to convert this MINLP to a mixed-integer convex optimization problem and then use relaxation method to solve it. To have a convex problem, we first provide a generalized posynomial expression [@boyd2007tutorial] for the optimization and then define a variable change to convexify the problem. A posynomial expression for OSNR of a request in 2D EONs has been proposed in [@hadi2017resource]. We simply consider each active mode as an independent source of nonlinearity and incoherently add all the interferences [@yan2015resource]. Therefore the extended version of the posynomial OSNR expression is: $$\begin{aligned} \label{eq:xci_app} \hspace{-3 mm}\Psi_q= \frac{p_q/m_q}{\zeta \mathcal{N}_q\Delta_q+\kappa_1\varsigma \frac{p_q}{m_q}\sum\limits_{\substack{i \in \mathbf{Q}, q \neq i}}m_i(\frac{p_i}{m_i})^2\mathcal{N}_{q,i}/\Delta_i/d_{q,i}}, \forall q \in \mathbf{Q}\end{aligned}$$ where $\kappa_1=0.4343$, $\zeta=(e^{\alpha \mathcal{L}_{spn}}-1)h\nu n_{sp}$ and $\varsigma=\frac{3\gamma^2}{2\alpha\pi\abs{\beta_2}}$. $n_{sp}$ is the spontaneous emission factor, $\nu$ is the light frequency, $h$ is Planck’s constant, $\alpha$ is attenuation coefficient, $\beta_2$ is dispersion factor and $\gamma$ is nonlinear constant. Furthermore, $d_{q,i}$ is the distance between carrier frequencies $\omega_q$ and $\omega_i$ and equals to $d_{q,i} = \abs{\omega_q-\omega_i}$. We use $\Theta_q \approx r_q^{\kappa_2}(1+\kappa_3 c_q)^{\kappa_4}$ for posynomial curve fitting of OSNR threshold values where $\kappa_2=3.37$, $\kappa_3=0.21$, $\kappa_4=5.73$ [@hadi2017energy]. Following the same approach as [@hadi2017resource], we arrive at this new representation of the optimization problem: $$\begin{aligned} &\hspace{-1.5mm} \min_{\mathbf{c}, \mathbf{b}, \mathbf{r}, \mathbf{p}, \mathbf{m}, \bm{\omega}, \mathbf{t}, \mathbf{d}} \quad \sum\limits_{q \in \mathbf{Q}}P_{q}+\mathcal{K}\sum\limits_{\substack{q,i \in \mathbf{Q}\\q \neq i, \mathcal{N}_{q,i} \neq 0}}d_{q,i}^{-1}\label{eq:gp_1_g}\\ \nonumber &\hspace{-1.5mm} \text{s.t.} \quad r_{q}^{\kappa_2} t_{q}^{\kappa_4}\Big[\zeta\mathcal{F}\mathcal{N}_{q}m_qp_{q}^{-1}2^{b_{q}}+ \kappa_1\varsigma\mathcal{F}^{-1}\sum\limits_{i \in \mathbf{Q}, i \neq q}\mathcal{N}_{q,i}p_{i}^{2}m_i^{-1}2^{-b_{i}} \\ & \hspace{-1.5mm} d_{q,i}^{-1}\Big]\leqslant 1 , \forall q \in \mathbf{Q} \label{eq:gp_1_c1} \\ \nonumber & \hspace{-1.5mm} \omega_{\Upsilon_{l, j}}+0.5\mathcal{F}2^{b_{\Upsilon_{l, j}}} +\mathcal{G}+ 0.5\mathcal{F}2^{b_{\Upsilon_{l, j+1}}}\leqslant \omega_{\Upsilon_{l, j+1}}, \forall l \in \mathbf{L}\\ & \hspace{-1.5mm} ,\forall j \in \mathbf{M}_{1}^{\abs{\mathbf{Q}_l}} \label{eq:gp_1_c2}\\ & \hspace{-1.5mm} 0.5\mathcal{F}2^{b_q} + \omega_{q} \leqslant \mathcal{B}, \forall q \in \mathbf{Q} \label{eq:gp_1_c3} \\ & \hspace{-1.5mm} 0.5\mathcal{F}2^{b_q} \leqslant \omega_{q}, \forall q \in \mathbf{Q}\label{eq:gp_1_c4} \\ \nonumber & \hspace{-1.5mm} 0.5\mathcal{R}_q\mathcal{F}^{-1} r_{q}^{-1} c_{q}^{-1}m_q^{-1} 2^{-b_{q}}+ 0.5 \sigma \mathcal{N}_q \mathcal{R}_{q} m_q^{-1}r_{q}^{-1} c_{q}^{-1}\\ & \hspace{-1.5mm} +0.5 \varrho \sqrt{\mathcal{N}_q} \mathcal{R}_qr_{q}^{-1} c_{q}^{-1}m_q^{-1.78} 2^{-b_{q}}\leqslant 1, \forall q \in \mathbf{Q}\label{eq:gp_1_c5} \\ & \hspace{-1.5mm} 1+\kappa_3c_{q} \leqslant t_{q}, \forall q \in \mathbf{Q} \label{eq:gp_1_c6} \\ & \hspace{-1.5mm} d_{\Upsilon_{l, i},\Upsilon_{l, j}} + \omega_{\Upsilon_{l, j}}\leqslant \omega_{\Upsilon_{l, i}}, \forall l \in \mathbf{L},\forall j \in \mathbf{M}_{1}^{\abs{\mathbf{Q}_l}},\forall i \in \mathbf{M}_{j+1}^{\abs{\mathbf{Q}_l}+1} \label{eq:gp_1_c7} \\ & \hspace{-1.5mm} d_{\Upsilon_{l, i},\Upsilon_{l, j}}+\omega_{\Upsilon_{l, i}} \leqslant \omega_{\Upsilon_{l, j}} , \forall l \in \mathbf{L},\forall j \in \mathbf{M}_{2}^{\abs{\mathbf{Q}_l}+1}, \forall i \in \mathbf{M}_{1}^{j} \label{eq:gp_1_c8} \end{aligned}$$ Ignoring constraints , , and the penalty term of the goal function , the above formulation is equivalent geometric program of the previous MINLP in which expressions and the mentioned posynomial curve fitting have been used for QoS constraint . Constraints and and the penalty term are added to guarantee the implicit equality of $d_{q,i} = \abs{\omega_{q}-\omega_{i}}$ [@hadi2017resource]. Constraint is also needed to convert the generalized posynomial QoS constraint to a valid geometric expression, as explained in [@boyd2007tutorial]. Now, consider the following variable change: $$\begin{aligned} \label{eq:vc} x=e^{X}:x \in \mathbb{R}_{>0} \longrightarrow X \in \mathbb{R}, \forall x \notin \mathbf{b}\end{aligned}$$ Applying this variable change to the goal function (which is the most difficult part of the variable change), we have: $$\begin{aligned} \label{eq:cv_g} \nonumber & \sum\limits_{q \in \mathbf{Q}} [\mathcal{P}_{trb}+2\mathcal{P}_{edc}e^{m_q-r_q}+5.36e^{0.82b_q+m_q}\mathcal{P}_{fft}+ 2e^{2m_q}2^{b_q}\mathcal{P}_{dsp}]\\ & +\mathcal{K}\sum\limits_{\substack{q,i\in \mathbf{Q}, q \neq i, \mathcal{N}_{q,i} \neq 0}}e^{-d_{q,i}}\end{aligned}$$ Clearly, $e^{-d_{q,i}}$, $e^{m_q-r_q}$ and $e^{2m_q}2^{b_q}$ are convex over variable domain. We use expression $5.36e^{0.82b_q+m_q}$ to provide a convex approximation for the remaining term $2e^{m_q}b_q2^{b_q}$. The approximation relative error is less than $3\%$ for practical values of $m_q \geqslant 1$ and $4 \leqslant b_q \leqslant 11$. Consequently, function which is a nonnegative weighted sum of convex functions is also convex. The same statement (without any approximation) can be applied to show the convexity of the constraints under variable change of (for some constraints, we need to apply an extra $\log$ to both sides of the inequality). To solve this problem, a relaxed continuous version of the proposed mixed-integer convex formulation is iteratively optimized in a loop [@boyd2007tutorial]. At each epoch, the continuous convex optimization is solved and obtained values for relaxed integer variables are rounded by a given precision. Then, we fix the acceptable rounded variables and solve the relaxed continuous convex problem again. The loop continues untill all the integer variables have valid values. The number of iterations is at most equal to (in practice, is usually less than) the number of integer variables. Furthermore, a simpler problem should be solved as the number of iteration increases because some of the integer variables are fixed during each loop. Numerical Results {#Sec_VI} ================= In this section, we use simulation results to demonstrate the performance of the convex formulation for TCS. The European Cost239 optical network is considered with the topology and traffic matrix given in [@khodakarami2014flexible]. Simulation constant parameters are $\abs{\beta_2}=20393$ $\text{fs}^2/\text{m}$ , $\alpha=0.22$ dB/km, $\mathcal{L}_{spn}=80$ km, $\nu=193.55$ THz, $n_{sp}=1.58$, $\gamma=1.3$ $1/\text{W/km}$, $\mathcal{F}=80$ MHz, $\varrho=113$ ps, $\sigma=14$ fs, $\mathcal{G}=20$ GHz, $\mathcal{B}=2$ THz, $\mathcal{P}_{trb}=36$ W, $\mathcal{P}_{edc}=3.2$ W, $\mathcal{P}_{fft}=4$ mW, $\mathcal{P}_{dsp}=3$ mW [@khodakarami2014flexible; @arik2014adaptive]. We use MATLAB, YALMIP and CVX software packages for programming, modeling and optimization. The total power consumption of different network elements in terms of aggregate traffic with and without adaptive transmit optical power assignment has been reported in Fig. \[fig:powerAdapt\]. We have used the proposed approach of [@gao2012analytical] for fixed assignment of transmit optical power. Clearly, for all the elements, the total power consumption is approximately a linear function of aggregate traffic but the slope of the lines are lower when transmit optical powers are adaptively assigned. As an example, adaptive transmit optical power assignment improves total transponder power consumption by a factor of $32\%$ for aggregate traffic of $60$ Tbps. Fig. \[fig:modeAdapt\] shows total power consumption of different network elements versus number of available modes $\mathcal{M}$ in FMFs. The power consumption values are normalized to their corresponding values for the scenario with single mode fibers [*i*.*e*. ]{}$\mathcal{M}=1$. As $\mathcal{M}$ increases, the amount of transponder power consumption decreases but there is no considerable gain for $\mathcal{M} > 5$. Moreover, there is a tradeoff between DSP and FFT power consumption such that the overall transponder power consumption is a decreasing function of the number of available modes. Fig. \[fig:fmfAssignment\] shows power consumption of different network elements in terms of aggregate traffic for strongly- and weakly-coupled FMFs. Obviously, total transponder power consumption is considerably reduced for strongly-coupled FMFs (in which group delay spread is proportional to square root of path lengths) in comparison to weakly-coupled FMFs (in which group delay spread is proportional to path lengths). This is the same as the results published in [@ho2013mode]. As an example, improvement can be more than $50\%$ for aggregate traffic of $60$ Tbps. Numerical outcomes also show that our convex formulation can be more than $20$ times faster than its mixed-integer nonlinear counterpart which is compatible with the results reported in [@hadi2017energy]. Conclusion {#Sec_VII} ========== Energy-efficient resource allocation and quality of service provisioning is the fundamental problem of green 3D FMF-based elastic optical networks. In this paper, we decompose the resource allocation problem into two sub-problems for routing and traffic ordering, and transponder configuration. We mainly focus on transponder configuration sub-problem and provide a convex formulation in which joint optimization of temporal, spectral and spatial resources along with optical transmit power are considered. Simulation results show that our formulation is considerably faster than its mixed-integer nonlinear counterpart and its ability to optimize transmit optical power can improve total transponder power consumption up to $32\%$. We demonstrate that there is a tradeoff between DSP and FFT power consumptions as the number of modes in FMFs increases but the overall transponder power consumption is a descending function of the number of available modes. We also calculate the power consumption of different network elements and show that strongly-coupled FMFs reduce the power consumption of these elements.
Memphis Grizzlies General Manager Chris Wallace today announced that the Grizzlies waived guard Wade Baldwin IV and forward Rade Zagorac to finalize its 2017-18 regular season roster. The Grizzlies’ roster now stands at 17 players, including two-way players Kobi Simmons and Vince Hunter who will be eligible to play for both the Grizzlies and the team’s NBA G League affiliate, the Memphis Hustle. An updated roster is attached. Baldwin (6-4, 202) appeared in all five preseason games (two starts) and averaged 5.8 points, 1.8 rebounds and 1.8 assists in 18.3 minutes. The 21-year-old Belle Mead, New Jersey native competed in 33 games (one start) for the Grizzlies as a rookie last season and averaged 3.2 points, 1.4 rebounds and 1.8 assists in 12.3 minutes after he was selected with the 17th overall pick in the 2016 NBA Draft. Zagorac came off the bench in all five preseason contests and averaged 3.6 points, 3.2 rebounds and 1.0 assists in 10.1 minutes. Selected in the second round (35th overall) of the 2016 NBA Draft and traded to the Grizzlies on draft night, the 22-year-old played last season for KK Mega Leks in his native Serbia. Fans who want to support the Memphis Grizzlies by purchasing 2017-18 Season Tickets, 6-, 12- and 22-Game Packs can do so now by calling (901) 888-HOOP or by going online to grizzlies.com. For more information on the Grizzlies, ‘like’ Memphis Grizzlies on Facebook or follow on Twitter (@memgrizz).
HTTP 418. To most highway drivers, it looks like a random collection of characters -- the kind of mud-spattered jumble you'd see on any car. But to Phil Dokas, it's a really good joke. And he's right. His "HTTP 418" vanity license plate is one of geekiest license plates ever attached to the back of a car -- and that's one of the highest compliments Wired could ever give. A couple of years ago, Dokas chose "HTTP 418" as the vanity plate for his Volkswagen Jetta. An HTTP 418 is an kind of internet status error, but it's not likely to turn up on your web browser. It was created as part of a 1998 April Fool's joke by those madcaps at the Internet Engineering Task Force, the people who define the internet's underlying protocols. More Geek Plates Live Free or Die: The Origins of the Geek License Plate Greatest Geek Plates: Readers' PicksHTTP 418 is part of the "Hyper Text Coffee Pot Control Protocol standard." It's the error you get when you try to make coffee in a teapot over the internet. According to a draft of the standard: "Any attempt to brew coffee with a teapot should result in the error code '418 I'm a teapot.' The resulting entity body MAY be short and stout." When the vanity plate arrived at his home, Dokas pulled out his camera. "I took a photo of it and put it online knowing full well that someone was going to eventually say: 'Hey, I get this. I think it's amazing." It took six months, Dokas says, but someone finally got the joke. Dokas eventually hung up the license plate when he sold his car and moved from Michigan to the Bay Area to take a job as a developer at Flickr. But if you pass by his cube, you can still see it on the wall. No license plate could ever match the genius of the HTTP 418. But many come close. Click through the images above to see them in all their splendor.... Photo: Phil Dokas/Flickr This is the license plate that inspired Phil Dokas to get his "418" vanity plate. To most drivers, "CTHLHU" looks like some weird consonant-starved name, but to H.P. Lovecraft fans, this is a fiendishly funny plate. Lovecraft's Cthlhu is a scaly winged, tentacle-faced demon. In short, a completely evil creature with a whole different idea about "kids first." Photo: Pete Tosacano/Flickr A great user error message, popular in tech support shops: "Problem Exists Between Keyboard And Chair." Photo: Jessamyn West/Flickr You know you're a badass when you drive a Porsche with a Linux license plate command that could completely wipe all the files off that jerk who's tailgating you. Photo: Michael Ford/Flickr Last spotted in May 2005. We think it is some sort of Google social network beloved by people in Brazil. Photo: Peter Kaminski/Flickr A subtle hat-tip to trolling. In Windows, Alt-F4 closes the window you're typing in and is a favorite troll tech tip to knock newbies out of online games and chat rooms (i.e., having trouble with your computer? Try hitting Alt-F4). Photo: Brandon Debes/Flickr If you think trigonometry on a license plate isn't cool, you are sadly mistaken. Photo: Mary MacTavish/Flickr A beloved Unix command that somehow works perfectly on the back of a car. It means "file system check." Photo: Nathanael Burton/Flickr A tip of the hat to the old syn-syn-ack three-way handshake that's used to set up a TCP/IP connection. Photo: Tim Vandegrift Everyone will be wanting one of these babies ... someday. Photo: Phil Hollenback/Flickr Technically, it's an all-white license plate. This geek-joke license plate is the hexadecimal HTML color code for white. Photo: Jon Canady/Flickr We spotted this Legomobile parked in Oracle's parking lot a few months back. Photo: Wired/Robert McMillan There is a metaphor here. We're just not 100 percent sure we know what it is. Photo: J. Chris Vaughan/Flickr No matter how hip Microsoft tells us that Windows 8 is going to be, a Microsoft license plate will always be geeky. Photo: Christina Dulude/Flickr OK, "Dad of 3" is not a geeky license plate. But this license plate really does belong to Mr. Linux, the King of Geeks: Linus Torvalds Photo: Wired/Jon Snyder
Descriere: In this adventure battle game your task is to take revenge for the death of your father. Fight against fantasy style monsters, earn resources and upgrade your hero and his weapons. Use mouse to control him during the fight, select the best attack or defence modes to beat your opponents.
Speech by Scott Gottlieb, M.D. Leadership Role Commissioner of Food and Drugs - Food and Drug Administration Remarks by Scott Gottlieb, M.D. FDA All Hands Meeting Silver Spring, MD It’s an honor to be here today, and to be taking on this responsibility with all of you. You realize how special our mission of consumer protection and public health promotion is when you explain what we do to the children in our lives. My baby girl is four and my twin daughters are seven. Explaining my new job to them, I told them daddy’s going to be working with a lot of people who help make sure the medicine you take makes you feel better, and that the food you eat is safe. I had the privilege to work at FDA as a senior advisor to Mark McClellan when he served as Commissioner. And then to return to FDA as a Deputy Commissioner. Through my two previous roles in the agency, I’ve had the pleasure to work with – and rely on the guidance of – many great senior career leaders of this agency. I’m humbled now to have another opportunity for public service and to be working with all of you to advance FDA’s mission of consumer protection and public health promotion. FDA always faces big challenges because of where it sits at the intersection of so many critical concerns. By virtue of the fact that people’s lives – quite literally – depend on what we do. Patient and consumer protection are at the heart of what we do. And I believe deeply in that fundamental mission of this agency. FDA has a proud tradition of leaders who’ve dedicated themselves to the agency’s special mission. And Dr. Steve Ostroff stands high on that list. Two times Dr. Ostroff has stepped up to the challenge of leading FDA through periods of transition. Each time, he continued to advance the agency’s public health prerogatives and uphold its vital consumer mission. I look forward to continuing to rely on Dr. Ostroff’s experience and counsel. And, like all of you, I’m immensely grateful for his contributions. Looking ahead, we sit at a time of great promise. Among some of the reasons I’m so optimistic about our shared future are new scientific opportunities, like gene therapy and regenerative medicine that give us plausible hope that we might be able to actually cure many more diseases. And new medical devices that are empowering consumers, enabling them to be better informed about their health, and better stewards of their own medical care. Scientific advances also give us better tools to do our regulatory work. Many of these tools and resources are being developed right here at FDA, in our labs, and at places like NCTR. Twenty-first century challenges require us to modernize how we do our own work to take advantage of advances that can help us better protect consumers and promote health by making the regulatory process, itself, more modern and efficient. To these ends, we have an opportunity to greatly improve FDA’s primary and principal public health protection role through the Program Alignment being undertaken by the Office of Regulatory Affairs. As ORA’s mandate becomes more complex and more global, we look forward to achieving operational efficiencies that can improve our ability to fulfill our public health mission and protect consumers. New authorities and resources, along with improvements in science, have given us better tools and prospects to do all of these things: to safeguard our foods and cosmetics, to improve nutrition, and to protect consumers and livestock from emerging threats like antimicrobial resistance. Among these and many other opportunities, there’s probably no single intervention, or product we’re likely to create in the near future that can have as profound an impact on reducing illness and death from disease as our ability to increase the rate of decline in smoking. We need to redouble efforts to help more smokers become tobacco-free. And, we need to have the science base to explore the potential to move current smokers – unable or unwilling to quit – to less harmful products, if they can’t quit altogether. At all times, we must protect kids from the dangers of tobacco use. Alongside these and many other opportunities, we also have some challenges that require us to continue to work together and build on our progress and mission. For one thing, too many consumers are priced out of the medicines they need. Now, I know FDA doesn’t play a direct role in drug pricing. But we still need to be taking meaningful steps to get more low cost alternatives to the market, to increase competition, and to give consumers more options. This is especially true when it comes to complex drugs and biosimilars. We also need to take steps to make sure the generic drug process isn’t being inappropriately gamed to delay competition and disadvantage consumers. I hope to have much more to say on this topic in the coming weeks. In other areas, Congress gave us a clear mandate to be forward-leaning when it comes to how we’ll evaluate safety and efficacy in view of emerging scientific insight and better analytical tools. Implementing the 21st Century Cures Act is a key priority. We need to make sure we’re taking steps to foster innovation and regulating areas of promising new technology in ways that don’t raise the cost of development or reduce innovation. We need to do all of these things without compromising our primary mandate to protect the public health. When it comes to food safety, new authorities and resources, alongside the transformational work of the people of CFSAN, have visibly improved our programs to ensure the safety of food. I’m committed to working with the senior leadership of CFSAN, to get you the resources you need, to do the job that FSMA requires. I want to build on your successes in implementing the new food safety framework. But unquestionably, our greatest immediate challenge is the problem of opioid abuse. This is a public health crisis of staggering human and economic proportion. The epidemic of opioid addiction is not a problem that FDA can solve alone. But we have an important role to play in reducing the rate of new abuse, and in giving health care providers the tools to reduce exposure to opioids to only clearly appropriate patients, so we can also help reduce the new cases of addiction. Addressing this tragedy is going to be one of my highest initial priorities. Now, I know FDA has already taken many important steps to address the opioid crisis. But the epidemic has continued to grow. I’ll be working with FDA’s senior career leadership and in the coming weeks hope to have more to say on how we take even more forceful steps to address this crisis. In tackling these and other issues, we need to always be risk-based in our work. We need to make sure we’re getting the most public health bang for our efforts and the resources that we’re entrusted with. I know we only have limited resources to do these hard tasks. And I also know, from my prior work at FDA, how much we accomplish with the limited tools and resources we have available to us. We need to be patient-centric and science-based in everything we do. And, we must make sure that in all our efforts, we maintain the gold standard for regulatory science and independent, science-led decision-making, all led by a strong career workforce. In my recent travels, meeting with many of the members of the Senate in the run-up to my confirmation, and talking with many leaders, who represent patients and providers, I know that your efforts are not taken for granted by the people I’ve met. And they’re certainly not taken for granted by me. You all are the heart and soul of this great agency. The work doesn’t get done without you. And while the public relies on your work in protecting them, it’s only by seeing your work from the inside that your dedication and sacrifice is so evident. Some of you have told me in recent days that you feel this is a period of some uncertainty for FDA. But, I want you to know I wouldn’t have taken this job if I didn’t think there was a clear and historic opportunity for us to advance FDA’s mission, and to help Americans realize more opportunities from science and medicine. Working together, I know that we’ll seize that opportunity. One final thought in closing: A lot of people know what we do. Not as many people know why we do it. But I know why. And, I know you all know why. It’s because Americans need us. They need to be safe. They need to have medicines and products that work. They need to have opportunities to improve their health. People can’t live a life of dignity if they don’t have access to these opportunities – if they don’t have access to the consumer protections that we provide and the tools of public health. We do what we do to serve that larger societal purpose. This isn’t like any other job. People need us. All of us. And I’m delighted to be a part of these efforts, and to be working with you. I look forward to meeting many of you in the days ahead, and working with all of you to fulfill FDA’s special mission.
Synthesis and properties of trans-3',4'-bridged nucleic acids having typical S-type sugar conformation. The synthesis of nucleoside analogues with a conformationally restricted sugar moiety is of great interest. The present research describes the synthesis of BNA (bridged nucleic acid) monomers 1 and 2 bearing a 4,7-dioxabicyclo[4.3.0]nonane skeleton and a methoxy group at the C2' position. Conformational analysis showed that the sugar moiety of these monomers is restricted in a typical S-type conformation. It was difficult to synthesize the phosphoramidite derivative of the ribo-type monomer 1, while the phosphoramidite of the arabino-type monomer 2 was successfully prepared and incorporated into oligodeoxynucleotides (ODNs). The hybridization ability of the obtained ODN derivatives containing 2 with complementary strands was evaluated by melting temperature (T(m)) measurements. As a result, the ODN derivatives hybridized with DNA and RNA complements in a sequence-selective manner, though the stability of the duplexes was lower than that of the corresponding natural DNA/DNA or DNA/RNA duplex.
Considering tomorrow is the last day of spatial theory class, I figured it was about time to get around to posting curiosities that I’ve collected throughout the term but have otherwise forgotten to post or ran into technical difficulties with. I attempted to post a number of these last week, but for some reason WordPress decided to eat my post after it was submitted for review. Since surveillance has been such a prevalent topic in our class, I figured some people might find this online journal useful. In my own studies, I’ve culled a great number of useful articles from this peer-reviewed, free-access journal, using them for both research and inspiration in terms of engaging surveillance studies. They are currently in a transition process, with newer articles on the new website, and back issues that have not been transferred yet remaining in the old one. Each issue is typically arranged around a particular topic of surveillance and includes research (sociological, psychological, political science, cultural studies, etc.), editorials, opinion pieces and even the occasional creative work. As a starting-point for discussion in my group, I made a .zip file of all the articles I though were the most relevant to the Waterloo Watchmen initiative. You can download the files from the link below. Hopefully they might help others as to fill in any missing theory in their final paper. This website combines new media and spatial mapping to provide a resource for community-run surveillance as well as counter-surveillance of policing. It employs the flexibility provided by the Internet to allow people to create a dynamic, flexible and collaborative representation of surveillance and crime in their area. This aggregation of surveillance data allows Oakland residents to have current and non-externally selected (i.e. not just what the news reports) understanding of crime in their area, allowing them to view crime patterns as they are associated with spaces. Moreover, exploiting the connectivity of new medias, the website provides for RSS feeds and alerts sent to people’s cell phones, giving them up to the minute information. While it certainly feeds into a Panoptic structure, it shows ownership of the Panopticon instead of mere subjection to it. It stands as an interesting representation in digital terms of how disciplinary societies function. ———— Jacques Derrida’s “Fear of Writing” I thought that this video, while not about space, was incredibly appropriate for describing the feeling of writing the chora essay. Guessing how primary Derrida was to so many of our papers, thought it was rather appropriate. Hopefully few are experiencing such angst with our final paper. Good for a laugh at least. ———— Cursed’s “Into The Hive” Since we began the first class talking about Le Corbusier, this song has been on my mind. Written by the as-of-recently defunct hardcore punk band Cursed, who are southern Ontario residents I might add, it appeared on their last album, “III”. While obviously some complexity is lost when words have to be yelled in the face of sweaty teenagers, I think Collohan’s lyrics here actually aptly engage with notions of how spatiality and architecture play a significant role in social hegemony, alienation and the extraction of economic capital. You’ll notice themes from Foucault and Marx here. But hey, we’re talking about an album that has another song called “Hegel’s Bastards.” These guys know their stuff. As taken from the writer himself, all bizarre punctuation left in tact. “Into The Hive What i got, you need in. This is the future, son. Stake your claim, it’s almost gone. It’s gonna be beautiful, gonna reach the sky & more. There’s gold in them there walls. We’re tearing down all the neighborhoods, making room for designer skylines, so the lives in the underpass can be left in the dust by a whole new crowd. Units still available, primed for success. Your life in 500 square feet or less. And it’s self-contained. And it’s all the same. And only steps away from a city that you’ll never see, And every ugly abomination that the billboard never mentioned but whose problem, whose life, whose city is that? Show me a man with that much faith in concrete and I’ll show you every self-starter that ever put torch to building. Every towering inferno lying in wait. Show me your city plans, I’ll show you angry hands Selling the urban dream one locked door at a time. And this is what Air Conditioned Nightmares are made of, The architecture of isolation. What i got, you need in. This is the future, son. Stake your claim, it’s almost gone. It’s gonna be beautiful, gonna reach the sky & more. There’s gold in them there walls. Compartmentalized. Headlong into the hive. City plans that eat you alive.” However, defunct or not, I would still encourage you to purchase the album if you enjoy it. These guys had a rough go of it when they were together, despite widespread respect within the hardcore scene. ———— Finally, continuing the intersection of theories from our class and music, I thought I should share one final curiosity. Having scoured the Internet for electronic copies of Sadie Plant’s work, I was unsuccessful. However, what I did find, and what I feel compelled to share here so that it is not lost to the Internet ether is an interesting and often funny lecture delivered by Plant in the 1990’s about Situationism and its connection to techno music culture in England. I came across an extremely neat map today in the New Yorker which has finally put psychogeography in a relatable perspective for me – a literary map of my hometown, St. Petersburg, Russia, made up entirely of the words of its poets and writers, many of them embedded in my mind and my understanding of the city: (perhaps my favourite quote, upper left – “the most abstract and artificial city in the world”) Ironically it’s psychogeography that was a bit abstract and artificial to me throughout this course to be honest. I think part of it has to do with the fact that the way we engaged space in the course and the kind of space we engaged has really been difficult for me to relate to. I’ve never been to Paris. I’ve traveled little in my life. And I still don’t quite understand North American urban space. The map, meanwhile, puts a lot of this in perspective – where Kitchener/Waterloo and North American urban space in general for me are a map of melancholia, St. Petersburg is a kind of deep, sublimely interesting depression – in many ways a sublime city to the mind of someone raised within its cultural traditions. Some rather chilling coincidences with my own personal mapping of the city – the location where I was born has the word “Child” across it. Vasilievsky Island, where I was born and lived most of my life, is both very prominently positioned and often referenced in words. But most interesting is perhaps the way death permeates a lot of the language on the map – much as it does the entire city’s mythology and history. And in any case, a very neat map. It speaks to me as a long-time resident of that place and a reader of that literature. Seeing as our caches are not likely to survive very long, we thought we should post our photographs of them. The pictures are taken from the angle you would need to get your head at to properly view the clues (some are easier to access than others). If you want to try to find them, the website for the first location is http://www.tsilaerrus.com (that one will be a freebie). One of the appropriated caches in our treasure-hunt cache project is this one. (You will need to be logged in to the GeoCache website to access the co-ordinates, but registration is quick, free and painless, and I don’t think I’ve ever gotten any spam from them). There are nine such caches, each one leading to the next, and each one containing a URL that both contains more information about the repurposed space that particular cache is in, as well as tells you where the next one is. In addition, on that site, you’ll find a portion of the URL for the final, ultimate, SUPER-SECRET tenth cache. You need to visit all nine caches to get the whole URL for the final cache. One last thing: when writing out the URL for the cache’s site in each of the booklets, I made an error: the beginning of each URL starts http://theocaching/ettinburg.com/****.html — but that’s impossible. It’s theocaching.ettinburg.com — with a dot, not a slash. Sorry about that. Just keep that in mind and you’ll be fine. I came across these links much to my late-night delight yesterday, as they are both an entertaining reprieve from note-typing and engage what we were talking about during Laura’s presentation. Get your headphones ready. Auditory illusions are just what they sound like: similar to optical illusions, they are simple techniques that play on tricks of cognition to produce hallucinatory effects. This first link is sparing on the information, but has too startlingly effective examples: the virtual haircut and the matchbox. While I wouldn’t go so far as to argue decree hearing as the primary sense for understanding spatiality yet, I feel like these illusions make a pretty good argument for it. This second link “Five Great Auditory Illusions” has a few spatial ones (with a repeat of the popular virtual haircut) that pose some interesting questions. Consider the second one, “Phantom Words” – I have yet to do it as I don’t have the proper setup in my room, but apparently the repetition of words in projected into different spatial locations in the room allows your brain to create coherent meanings out of the random sea of words, with some suggestion that your own inclinations have an effect of producing meaning, your schema guiding the collection and assemblage of the randomized words. It might be interesting to pursue what role spatiality performs in constructing meaning out of sound. There are also a couple music-oriented illusions there that while not wholly connected to spatial theory, are nonetheless terrifying and interesting to see hear easily your brain can be tricked.
Dream11 prediction for MIL vs JUV Football match that is going to be played on Mar 31 2018. You will get 100% safe dream11 team prediction. Dream11 team prediction is based on our team research and the news we got from our sources. Milan vs Juventus Mar 31 2018 Fantasy Football Dream11 prediction, MIL vs JUV dream11 team, MIL vs JUV dream11 today Football match, MIL vs JUV Playing XI Team News, Serie A 2017-18 - Week 30. Please check Our website again before 2 hours of the dream11 MIL vs JUV football deadline Match. Our team tries to best to help dream11 fantasy football game Lovers who want to earn from the dream11. Get access to our expert dream11 teams and win daily in fantasy games. MIL vs JUV match overview Last six matches result MIL - DWWWWW JUV - WWWWWD Doubtful - Giorgio Chiellini, Andrea Conti, Ignazio Abate MIL vs JUV Match Info Match : MIL vs JUV Dream11 Team Prediction Mar 31 2018 Date : Mar 31 2018 Time : 11:15 PM Venue : Allianz Stadium Key Players Higuain | Dybala | Cutrone | To provide you best 100% safe Dream11 team prediction, we are using our highest paid resources. Dream11 Tip And Tricks - Play in Small League that have less competitor. MIL vs JUV Squad Prediction based on player's last 3 match perfomance. Play in small league if you have any other thought. Note: Try Different Captain And Vice Captain, go with your instincts. Make 1 or 2 changes to the team with players of your choice. The small changes can give your team the boost to win major contests. Luck plays an important role in Dream11, So you may not win every day. MIL vs JUV match dream11 fantasy football team prediction Team-1 Team-2 (Disclaimer: In above article the team picked by lateshtprediction is based on various factors and analysis. The writers and editors are not responsible for any decisions taken by readers. This article's main purpose is to provide a direction to choosing a best Fantasy team for the match mentioned in the article.)
Q: Angularjs / expressjs - sessions and IE I am having troubles with getting IE8/9 to work with the way my app is set out. Initially I was using express to store my session var, this worked with a url path like '/broadcast/12343' however when view in IE8 nothing renders. If I change it to '/#/broadcast/12343' IE renders correctly however express doesn't read the hash var so can't set the session which in this case would be 12343. I either need to change the sessions to be created and checked in angular or preferably get IE8 working without the hash in the URL. And yes I have included ngRoute and the CDN file for angular-route.min.js My server.js app.configure(function(){ app.set('views', __dirname + '/views'); app.set('view engine', 'jade'); app.set('view options', { layout: false }); app.use( express.cookieParser() ); app.use(express.session({ store: new MongoStore({ url: 'mongodb://URL/' }), maxAge : new Date(Date.now() + (3600000 * 24 *365)), //1 year expires : new Date(Date.now() + (3600000 * 24 *365)), //1 year secret: '1234567890QWERTY', httpOnly: false })); app.use(express.favicon()); app.use(express.bodyParser()); app.use(express.methodOverride()); app.use(express.static(__dirname + '/public')); app.use(app.router); }); app.configure('development', function(){ app.use(express.errorHandler({ dumpExceptions: true, showStack: true })); }); app.configure('production', function(){ app.use(express.errorHandler()); }); app.get('/partials/:name', routes.partials); app.get('/event/:eventid', routes.event); app.post('/registrant/create', routes.register); app.get('/broadcast/*', function (req, res) { var eventid = req.url.replace("/broadcast/", "");///ie 12343 if(!req.session.eventids) req.session.eventids = []; if (req.session.eventids.indexOf(eventid) > -1) { res.render('index'); } else { res.render('signup', { title:"Signup", eventid:eventid }); } }); app.get("*", routes.index); app.js var app = angular.module('myApp', ['myApp.filters','ngRoute','myApp.directives','myApp.services','snap']); routes/index.js var Event = require('../models/events'); var mongoose= require('mongoose'); var url= require('url'); exports.index = function(req, res){ res.render('index'); }; exports.partials = function (req, res) { var name = req.params.name; res.render('partials/' + name); }; exports.event = function (req, res) { var id = req.params.eventid; var self = this; Event.findOne({managerId:id}, function(err, docs){ res.json(docs); }); }; exports.register = function (req, res) { var input = JSON.stringify(req.body); var ip = req.headers['x-forwarded-for'] || req.connection.remoteAddress; new Registrant({ eventid:req.body.eventid, fields:input, ip :ip, updated_at : Date.now() }).save( function ( err, registrant, count ){ if( err ) return next( err ); req.session.username = req.body.firstname + req.body.lastname + req.body.eventid; }); if (req.session.eventids.indexOf(req.body.eventid) < 0) req.session.eventids.push(req.body.eventid); res.redirect('/broadcast/'+req.body.eventid);//eventid rendered in form on signup page }; Also my layout.jade html#ng-app(data-ng-app="myApp" xmlns:ng="http://angularjs.org") ...... A: There was an error with the include of files, i needed an absolute path rather than relative, thanks for your help though.
| 1. "Focusing your life solely on making a buck shows a certain poverty of ambition..." Barack Obama ..... 2. "One of the sad signs of our times is that we have demonized those who produce, subsidized those who refuse to produce, and canonized those who complain." By Thomas Sowell usa tag Drill down on usa search: The first thing I learned to read, around age five, was everything on a box of Kellog's Corn Flakes. From there on, I was doomed or empowered? ;-) I studied Emily Post, the Hardy Boys, encyclopedias, a book about nuns... No joke! $24.99 per month for Vonage's unlimited calling to 60+ countries with calls to cellular phones excluded, and yes, India and Mexico are included... next step would be to offer phone numbers from the same countries and more: AndorraArgentinaAustraliaAustriaBahamas*BahrainBelgiumBrazilBrunei*BulgariaCanada*ChileChina*ColombiaCroatiaCyprusCzech RepublicDenmarkDominican... $tizing telecommunications whether IP or not can be tough in an age where government regulation stifles growth, innovation, and taxes us to death. Have you and/or your accounting team gone nuts over things to do with Federal Excise, State Communications Tax,... First, in case, you're not familiar with USF. Wikipedia does a good job among its global contributors in defining and describing it. USA "was created by the United States Federal Communications Commission in 1997 to meet the goals of Universal...
Browse Best of SLO Supes seek ban on marijuana dispensaries as board tension boils over Update (Oct. 24): On Oct. 20, the Board of Supervisors continued its cannabis regulations hearing to Nov. 7. After months of seesawing on how to regulate the marijuana industry in the wake of Proposition 64, the SLO County Board of Supervisors unveiled plans at its Oct. 17 meeting to ban all brick-and-mortar dispensaries in unincorporated communities. click to enlarge FILE PHOTO JUST SAY NO? The SLO County Board of Supervisors will continue a hearing to establish new marijuana regulations on Oct. 20, which includes a cap on outdoor grows and no cap on indoor grows, like this greenhouse in North County. A final decision on adopting the ordinance was continued to Oct. 20 at 9 a.m., after dissenting 3rd District Supervisor Adam Hill refused to vote to extend the meeting past 5 p.m. Hill accused the board of making substantial revisions to the ordinance that hadn't been previously proposed or discussed, and therefore received no public comment. "I think that's an abuse of process," Hill said, and later added that he thought it was a Brown Act violation. The 3.5-hour hearing was often contentious and combative, as 1st District Supervisor John Peschong led the board in a new policy direction backed by Supervisors Lynn Compton (4th District) and Debbie Arnold (5th District), and opposed by Hill and Supervisor Bruce Gibson (2nd District). In a series of "straw poll votes," Peschong successfully sought bans on medical and recreational cannabis dispensaries, the manufacturing and delivery of edible products for recreational uses, and any cannabis manufacturing using volatile substances. Peschong, Compton, and Arnold said that the "mobile delivery" cannabis distribution model—currently the only legal means of buying and selling marijuana in SLO County—was sufficient for patients and recreational consumers going forward. Peschong said he was concerned about cannabis products in dispensaries attracting youth, and he was specifically critical of "gummy bears." "I do believe in our county, they say the [mobile delivery] services work very well," Peschong said. The county's current land-use ordinances already allow for the establishment of medical marijuana dispensaries, even though the county has rejected multiple applications over the years. The board's direction ran contrary to the draft policy that was put before them, a culmination of many months of public and Planning Commission input, and it drew groans and gasps from a perturbed audience of mostly cannabis supporters. When Peschong sought an outright ban on all edible products, both medical and recreational, in the county, an industry stakeholder in the audience muttered, "That's a HIPAA [Health Insurance Portability and Accountability Act] violation." After Compton voted against allowing volatile manufacturing because she'd "seen the videos of explosions," the room howled with laughter, which was quickly rebuked by chairman Peschong. The supervisors did not find time during the meeting to discuss restrictions on cannabis cultivation—which has been the most hotly disputed subject since it sets a cap of 50 total outdoor grows. Acrimony among the board members boiled over several times, most intensely during a debate over whether to ban cultivation in the entire Carrizo Planning Area versus just the California Valley subdivision. When Supervisor Arnold described the state of the Cal Valley as "total chaos" after a recent influx of marijuana grows, Supervisor Hill responded, "I'm sorry you live in the nonevidential world," and then, while looking across the dais, said, "I see the little face you're making." Peschong then called for a 10-minute break, and one citizen in the audience sighed and said:
Politicians, the media, and the public express concern that immigrants depress wages by competing with native workers, but 30 years of empirical research provide little supporting evidence to this claim. Most studies for industrialized countries have found no effect on wages, on average, and only modest effects on wage differentials between more and less educated immigrant and native workers. Native workers’ wages have been insulated by differences in skills, adjustments in local demand and technology, production expansion, and specialization of native workers as immigration rises. While the literature reports a range of wage effects of immigration, most estimates are small and, on average, essentially zero. Recent evidence shows that immigration is likely to boost firm productivity and the wages of native workers in the long run by stimulating firm growth and contributing a range of skills and ideas. More open immigration policies, which allow for balanced entry of immigrants of different education and skill levels, are likely to have no adverse effects on native workers’ wages and may pave the way for productivity growth. The recent empirical literature emphasizes that to understand the impact of immigrant workers on wages, immigration and the response of firms and workers must be analyzed together. This literature focuses on how firms and local economies respond to immigrant inflows by expanding, investing, adjusting product specialization, adopting efficient technologies, and creating new businesses. A review of the literature finds little evidence of a wage-depressing effect of immigration because immigrants are absorbed into the receiving economy through a series of adjustments by firms and other workers. Once these adjustments are accounted for, the wages of native workers, even workers with skills similar to those of immigrants, do not change much in response to immigration. Many people hold the belief that immigrants “take jobs” from the native labor force in industrial countries; that they crowd out job opportunities; and that they depress wages (see Figure 1 ). This fear is often manifested in stringent immigration restrictions, especially on immigrants with little education. Such measures are defended as necessary to protect native workers. But this view is rooted in a simplified, static model of labor demand and supply in which immigration increases the supply of some workers while everything else in the economy remains fixed. An overview of the estimated wage impact of immigrants Many studies in recent decades have analyzed the effect of immigration on the wages of native workers, assessing the magnitude and direction of the impact. These studies have used both cross-sectional data and panel (cross-sectional plus longitudinal) evidence of immigration flows into regions, countries, occupation groups, and skill groups in countries that have received large inflows of immigrants, such as Canada, Germany, Spain, the UK, and the US. About a third of these studies used US data. The others used data mainly for Austria, Germany, Israel, and the UK, whilst a few used data for other European countries. Most of the studies used labor market statistics as a control. The more recent studies, which used mainly panel data analysis, included labor market and year fixed effects. Several studies, especially those based on regional variation, used econometric “instrumental variables” to separate the exogenous, supply-driven variation in immigrants from variations correlated with demand shocks, to identify the causal effect of a supply-driven change in immigrants on native wages. This paper summarizes that abundant literature, based on a review of 27 original studies published between 1982 and 2013. Most of the reviewed studies were published, and some have been quite influential. Together, the 27 studies produced more than 270 baseline estimates of the effects of an increase in the share of immigrants on the wages of natives in the same labor market. The message that emerges from these studies is illustrated in Figure 2, which shows the distribution of the average estimated wage effect for each of the 27 studies, ranging from –0.8 to +0.8, in bins of length equal to 0.1. The histogram would look very similar if it showed all the estimates from the 27 studies rather than an average for each study. Additionally, a meta-analysis of 18 studies conducted between 1982 and 2003 showed a very similar histogram, centered on 0 and populated mostly with very small estimates between –0.1 and +0.1 [1]. The values report the effects of a 1 percentage point increase in the share of immigrants in a labor market (whether a city, state, country, or a skill group within one of these areas) on the average wage of native workers in the same market. For example, an estimated effect of 0.1 means that a 1 percentage point increase in immigrants in a labor market raises the average wage paid to native workers in that labor market by 0.1 percentage point. These studies used a variety of reduced-form estimation and structural estimation methods; all the estimates were converted into the elasticity described here. While there are important qualifications to each method and a degree of imprecision in each study (some discussed below), one clear finding emerges: the largest concentration of estimated effects is clustered around zero. Furthermore, the effects are often economically very small and at least half are not statistically significant. While the full range of estimates is between –0.7 and +0.7, two-thirds of them (19 out of 27) are between –0.1 and 0.1, equally distributed over positive and negative values. The average estimated coefficient is 0.008. Applying the average value of the estimates to total immigration in the US between 1990 and 2010, a time when the share of foreign-born workers rose from 9% to 16%, would imply an impact of immigrants on the average wage of native workers of 0.056 of a percentage point (7% times 0.008), or an increase of roughly one-twentieth of a percentage point. These are extremely small changes, especially over a 20-year period, and do not support the notion that immigrants lower the wages of native workers. Two other general findings emerge from the literature. First, while some of the surveyed studies find a more significant negative effect on the wages of less educated native workers than native workers overall, most do not. The meta-analysis study does not identify any significant difference in estimated wage effects between less educated native workers and all native workers [1]. This is understandable. In many countries, immigrants are concentrated in the highly educated group or evenly distributed across skill groups, so there is no reason to believe that they will hurt the wages of less educated workers more than others. In several large immigrant-receiving economies (such as Canada, Sweden, and the UK), the college-educated group makes up the largest concentration of immigrants relative to native workers in the same group. Even in the US, where some of the estimated effects on the wages of less educated native workers are negative, this holds true only for the 1990s, a particularly low-skill-intensive time; during the period 2000–2010, net immigration was high-skill-intensive. Second, the wage effects of recent immigrants are usually negative and slightly larger for earlier immigrants than for native workers. New immigrants may be stronger labor market competitors of earlier immigrants than of native workers. Do native workers attenuate the wage effects of immigrant labor by moving? Researchers have sought to identify the mechanisms that allow immigrant-receiving economies to absorb immigrants without lowering the wages of their native workers. Since many studies have analyzed local labor markets (cities, regions, states), one proposed mechanism was the “skating-rink” model: as immigrants moved into a local economy, native workers with similar skills moved out, leaving total employment and the skill composition unchanged. In the canonical labor supply and demand model, this adjustment mechanism would weaken any detectable effect on native wages. Immigrants might still displace native workers by pushing them out of the market, but the wage effect would not be detectable in the local economy. Most studies find no empirical evidence that native workers move out in response to immigration [2]. With the exception of particularly rigid labor markets (discussed below), local economies, firms, and native workers do respond to immigration and eliminate potential adverse wage impacts, but not by moving out of the region or by becoming unemployed. Examining the effects of immigrants on wages in national labor markets and by skill Due to the fact that analyses of local labor markets might miss wage effects that diffuse beyond the local market, several recent studies have analyzed the effects over time of immigrants in national labor markets segmented by skill (usually education-age groups). Changes in the supply of one skill in a national labor market, such as an inflow of college-educated immigrants, are assumed to affect the wages of workers in that skill group. Using data for the US over the period 1960–2000, one study estimated a negative effect of –0.76 of an increased share of immigrants in one skill group on the wages of native workers in the same skill group [3]. This is the largest negative estimated effect of immigrants on native wages in any of the reviewed studies (it is the negative outlier at the left edge of the histogram in Figure 1, with a value of –0.76). What explains such a large, negative estimate, and how can it be reconciled with the much smaller and sometimes positive effects found in most of the literature? Partial versus total effects: Skill complementarities and firm investments The more recent literature using national data by skill group has emphasized the importance of three mechanisms for correctly estimating the effects of immigration on wages. Specifically these are: immigration has cross-skill effects (complementarity) that must be considered; firms respond to the increased supply of immigrant workers by adjusting capital; and immigration has potentially important overall productivity effects. Taking these adjustment mechanisms into account would therefore attenuate the negative effects estimated in the US study [3]. The first effect can be explained by the fact that different jobs are connected within a firm’s production process. Having more immigrants in one skill group (for example, engineers) allows firms to expand job opportunities (complementarities) for workers in other skill groups (for example, sales representatives and janitors). Accounting for these cross-skill effects substantially reduces the negative wage impact of immigrants, while failing to account for them isolates a partial effect of immigration without considering the total effect. The second effect is related to the first. An increase in available workers means that existing firms can grow, investing in new plant and equipment, and that new firms may start up. Unless the immigrant influx is sudden and unexpected, this mechanism operates continuously and allows the local economy to expand and absorb additional immigrant labor without lowering wages. Incorporating these two effects into the analysis requires some assumptions to be made about the extent of cross-skill complementarity and about how fast firms adjust investment. Recent studies that apply this model to the US and the UK, using a reasonable set of assumptions, find very small effects on the wages of native workers, including the less educated ones [4]. The estimates concerning the increase in US immigrants between 1990 and 2006 imply a negative effect of less than 1 percentage point for the wages of native workers with no diploma in response to a small positive effect for native workers with a high school education, and ultimately a zero effect for native workers with a college education. Productivity effects A third effect overlooked in the earlier analyses of national labor markets by skill group is the effect of immigration on productivity. In the long run, immigrants can increase the overall efficiency of the economy by bringing new skills, stimulating efficient specialization, and encouraging firm creation. In the long run this can have an important effect on wages, because productivity drives all wage growth. There is evidence of this positive effect in recent analyses at the city [4], [5], state [6], region [7], [8], and national levels. This effect has, however, been hard to identify and is often neglected. In particular, studies based on the canonical model of the labor market and the national skill-group approach ignore the possibility of an overall productivity effect and focus only on the narrow competition or complementarity effects within and between skill groups. Some studies do not explicitly consider this potential effect but simply absorb it into a fixed term [3], [9]. Moving beyond the canonical model of the labor market: Alternative mechanisms offsetting wage effects Understanding how immigrants create positive productivity effects requires moving beyond the canonical model of labor supply and demand. That model assumes that immigration is simply a shift of the labor supply for a given labor demand and given labor supply of native workers. It also assumes that native and immigrant workers of similar skills perform identical tasks, that firms do not respond to immigration (at least in the short term), and that native workers do not change occupations or specializations. More likely, as evidenced by several recent studies, immigrants bring different skills and perform different tasks than native workers [2], [4], [6]. Native workers also respond to immigration by specializing in more communication and cognitive-intensive production tasks, which complement the tasks performed by immigrants. This is important because skill diversity among workers facing a wide array of differentiated tasks increases specialization and efficiency. Skill diversity may also spur innovation and productivity growth. Firms may also expand in response to an increase in immigrant workers and create new complementary jobs filled largely by native workers. If any of these mechanisms lead to an increase in overall productivity, a canonical model applied at the national level would be unlikely to capture these effects of immigration [3], [9]. Most studies that explicitly consider these possibilities find positive, sometimes large, productivity effects of increased numbers of immigrant workers. When the impact of these mechanisms on wages is also accounted for, it seems clear that these mechanisms could offset competition effects, producing the overall nil or positive effects observed in the 27 broad studies of immigration and native wages. Recently, scholars have explored other adjustment mechanisms not included in the canonical model that might offset the negative competition effects of an increase in immigrant workers. One is the choice of appropriate firm technology. When the supply of certain skills rises in the local labor market, firms tend to choose technologies that use those skills efficiently. For example, an immigration-induced increase in the supply of less educated manual workers in some US cities has pushed firms to adopt more manual-intensive technologies in place of more mechanized technologies. This has resulted in keeping the productivity and wages of that skill group relatively high. Similarly, the larger number of foreign scientists and engineers in some US cities encouraged firms to adopt technologies that increased the productivity of native workers with these specialties. Another mechanism protecting wages and boosting the productivity of native workers is the occupational upgrading that occurs when the share of immigrant workers rises. When immigrants fill lower-skill, manual-intensive positions, native workers move into more complex, cognitive- and communication-intensive jobs [2], [10]. Similarly, when highly educated immigrants enter the labor market and take analytically intensive positions in science and technology, highly educated native workers move into managerial occupations. Finally, a large share of immigrants with specific skills are absorbed by new firms that spring up to take advantage of the availability and skills of new immigrants (for a more comprehensive overview see Why immigrants may not depress natives' wages).
North Island, New Zealand 10 years after abandoning our RTW trip, we finally arrived back in New Zealand – a trip which we have been counting down to probably since 2006. We decided to start our New Zealand road trip in the North Island, flying in to Auckland before driving down to Wellington where we would get a ferry to the South Island to continue on. Drury, Auckland (23rd November 2016) Flying over with Emirates, we touched down in Auckland just before 5pm and in time for rush hour. Although we first considered hiring camper van, we decided against it. The hire costs were pretty extortionate, and I read a horror story about bed bugs which completely put me off. So instead we picked up our hire car, which we affectionately called Greenie. Fortunately our lovely airbnb accommodation was just a half hour drive from the airport and was on the outskirts of town in a little village called Drury. Taking the suggestion from our airbnb host, we walked around the corner to the local village pub for dinner. We arrived to find most of the tables reserved, but found a small one in the corner. It was quiz night in the pub and it seems we were lucky to find the last table. The quiz actually looked quite good. There were proper booklets for the answers – no scrappy paper like the pub quizzes I used to go to in England. I was sad that we didn’t really have enough people (or brain cells) to form our own team. although we decided to keep a note of the answers to see where we might come. We never got round to this though, as the first round of the quiz was ‘British Food’. I asked if the table behind us wanted to be our friends in exchange for answers. They did, and we helped them get 9/10 on the first round to put them in the lead. After this, we were unofficial members for the duration of the quiz. By the end of the evening, they had won second place and a bar tab for another evening. Sadly we never got to join them for a winning pint, as we had our New Zealand road trip to get on with. Rotorua (24th November 2016) After our first good sleep in 5 days, we set off on our brief tour of the North Island of New Zealand. Our first destination was Rotorua. An old work colleague of mine, Vic, moved out to New Zealand a few years prior so I was looking forward to a catch up. We arrived in Rotorua in time for lunch, which was good. Darren and I were both getting a bit narkey. After picking up some picnic snacks in the local supermarket we sat by the beautiful Lake Rotorua. Hunger anger was quickly subdued and we set about to look for a plan to spend the afternoon until Vic finished work. Darren already knew that Rotorua was famous for its hot Springs. I didn’t. But soon realised why. Kuirau Park Almost as soon as we set off from Lake Rotorua, I spotted steam. We pulled over and found ourselves exploring Kuirau Park, a free public park with lots of boiling thermal pools. It was a good way to pass an hour, but we still had a couple to go before Vic would be finishing work, so we set off to explore the wider Rotorua area. Ngahewa Wetland Just a short drive, we came across the beautiful Lake Ngahewa. We only had time to stop for a short time, but I actually preferred it to where we had stopped on Lake Rotorua. Wai-O-Tapu Hot Pool (Free at The Bridge) Darren wanted to swim in the hot springs, and google indicated that we were fairly close to Wai-O-Tapu. When we arrived we found a steep entry price and imminent closing time, so re visited google and found that there was a free hot pool down the road. We found a stream of hot water from The Wai-O-Tapu geothermal pools which met the cold river. As Darren popped his whole body in, I dipped my feet in. We found the exact spot where the two water streams met. It was a bit of an odd experience. Our final stop before heading back to visit Vic were the thermal mud pools. We also stopped to take this photo of the beautiful hills. With views similar to these, it’s easy to see why Vic moved to Rotorua and didn’t stay in Southampton….. We met Vic in Eat Streat – a trendy strip of bars and restaurants in Rotorua. We caught up with a meal for the night market and a wander around the Government Gardens before we were treated to a comfy bed for the night. Rotorua to Wellington (25th November 2016) After a lovely evening with Vic & Kev, we set off at just after 7am to catch up with more of my pharmacy buddies, Rosie & Claudine. It took us over 10 hours to travel the rest of the North Island to reach Wellington. In fact, it’s amazing we covered so much of the North Island in one day. We stopped numerous times during such a pretty drive. Darren dubbed the North Island “Telly Tubby land’ due to the numerous bright green hills. As we passed them, we came across the following attractions. Huka Fall, Taupo Huka Falls is the most visited natural attraction in New Zealand, although our visit came about quite by accident. We spotted a sign for Huka Falls an hour after leaving Rotorua so decided to stop. It’s no surprise its such a popular attraction, the falls were incredible. We were really lucky and actually got to experience the falls by ourselves due to our early impromptu visit. Tongariro Natural Park My friend Kaylie (who we later met in Queenstown) was travelling New Zealand at the same time as us. She put some photographs of her visit to Tongaririo Natural Park up on Facebook. It looked incredible, and she suggested we visit if we were passing. Sadly for us, the walk they had taken to the Emerald Lake took over 8 hours. We just didn’t have time to fit it in. We also didn’t have the array of clothing that is required for the walk. But our journey did see us drive through the out natural park. For the reasonably short part of the journey, the weather changed so much! One moment, there were bright blue skies, the next it was grey and overcast. In some areas the wind was so strong, there were sandstorm blowing as us. We had to get back into the car after we had stopped for a walk. Soon, however, the sun was back out and shiny. Darren likened it to being on the moon. Not of course that we have any idea what it is like to be on the moon. But in our heads, this is what the moon is like! Waitarere Beach By 3pm we were shattered. We found ourselves on Waitarere Beach and after finding we could drive along it we stopped the car on the sand. Turning off the engine, we tilted the seats back as far as they would go and set an alarm. Within moments we were both sound asleep. And moments before the alarm went off we both awoke, ready to crack on to Wellington. As we neared Wellington we hit a small bit of rush hour traffic, but nothing that brought us to a stop. We reached Rosie’s just after 5:30. Claudine joined us a short while later. This super excited happy snap was taken just after that, over two years after we had last been together. We spent the evening enjoying fish and chips, wine and beer and a lot of laughs. Te Papa Tongarewa Museum, Wellington (26th November 2016) After a good catch up, Saturday morning was a lazy start. After picking Claudine up, we set off for New Zealand National Museum, Te Papa Tongarewa. We’d had a couple of recommendations to visit this free museum so i Our lazy start continued by stopping for coffee and lunch before we saw even one exhibition. ‘Gallipoli: The Scale of Our War’ After a leisurely lunch in the Te Papu museum cafe, we got into the queue for the Gallipoli exhibition. Rosie & Claudine had both already seen the ‘Gallipoli: The Scale of Our War’ exhibition and raved about it. They were right. It has to be the most incredible exhibition I have ever seen. At the heart of the exhibition phenomenal oversized statues of real people who fought in WW1 at Gallipoli told the story of how the Anzac troops were overwhelmed by the Turkish and German troops. The Exhibition made the hairs on my arms stand on end. They matched the hairs which stood on end of each of the models at the exhibition. It was amazing how much detail these contained, right down to tears! You can read more about the amazing Gallipoli exhibition on the Te Papu website. We also explored some of the other areas of the museum, including an earthquake simulator, before Rosie took us on a drive around Wellington. After more coffee, we went home for a nice home cooked meal (such a treat when travelling!) which was washed down with more wine! Wellington (27th November 2016) Mount Victoria Our final day in the North Island saw us visiting Mount Victoria. True to its reputation, Wellington was windy, and as we made our way to the viewpoint at the top of Mount Victoria we were almost blown away. The views across Wellington were wonderful, though. Wellington Cable Car After lunch, we took a trip in the Wellington Cable Car. Yet again we were afforded with incredible views over the city. It was a lovely end to our first visit to the North Island and the first part of our New Zealand Road Trip. Share this: Like this: LikeLoading... themetcalfememoir.co.uk uses affiliate links to help with the running of this site. If you purchase an item recommended by this website we may receive a small commission at no additional cost to you. Victoria
;;; Copyright 2012 Hubert Iwaniuk ;;; Licensed under the Apache License, Version 2.0 (the "License"); ;;; you may not use this file except in compliance with the License. ;;; You may obtain a copy of the License at ;;; http://www.apache.org/licenses/LICENSE-2.0 ;;; Unless required by applicable law or agreed to in writing, software ;;; distributed under the License is distributed on an "AS IS" BASIS, ;;; WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. ;;; See the License for the specific language governing permissions and ;;; limitations under the License. (ns http.async.client.cert "Asynchronous HTTP Client - Clojure - Utils" {:author "Hubert Iwaniuk / Andrew Diamond / RoomKey.com"} (:import (java.security KeyStore SecureRandom) (java.security.cert X509Certificate CertificateFactory) (javax.net.ssl KeyManagerFactory SSLContext HttpsURLConnection X509TrustManager) (java.io File InputStream FileInputStream InputStreamReader FileNotFoundException)) (:require [clojure.java.io :as io])) (defrecord BlindTrustManager ;; "An X509TrustManager that blindly trusts all certificates, chains and issuers. ;; All methods return nil, indicating that the client/server is trusted." [] X509TrustManager (checkClientTrusted [this chain auth-type] nil) (checkServerTrusted [this chain auth-type] nil) (getAcceptedIssuers [this] nil)) (defn #^InputStream load-embedded-resource "Loads a resource embedded in a jar file. Returns an InputStream" [#^String resource] (let [thr (Thread/currentThread) loader (.getContextClassLoader thr) resource (.getResource loader resource)] (FileInputStream. (File. (.toURI resource))))) (defn #^InputStream resource-stream "Loads the resource at the specified path, and returns it as an InputStream. If there is no file at the specified path, and we are running as a jar, we'll attempt to load the resource embedded within the jar at the specified path." [#^String path] (try (if (.exists (io/file path)) (FileInputStream. path) (load-embedded-resource path)) (catch Exception _ (throw (new FileNotFoundException (str "File or resource \"" path "\" could not be found.")))))) (defn #^X509Certificate load-x509-cert "Loads an x509 certificate from the specified path, which may be either a file system path or a path to an embedded resource in a jar file. Returns an instace of java.security.cert.X509Certificate." [#^String path] (let [cert-file-instream (resource-stream path) cert-factory (CertificateFactory/getInstance "X.509") cert (.generateCertificate cert-factory cert-file-instream)] (.close cert-file-instream) (cast X509Certificate cert))) (defn #^KeyStore load-keystore "Loads a KeyStore from the specified file. Param keystore-stream is an InputStream. If password is provided, that will be used to unlock the KeyStore. Password may be nil. If keystore-stream is nil, this returns an empty default KeyStore." [#^FileInputStream keystore-stream #^String password] (let [ks (KeyStore/getInstance (KeyStore/getDefaultType))] (if keystore-stream (if password (.load ks keystore-stream (.toCharArray password)) (.load ks keystore-stream nil)) (.load ks nil nil)) ks)) (defn #^KeyStore add-x509-cert "Adds the x509 certificate to the specified keystore. Param cert-alias is a name for this cert. Returns KeyStore with the certificate loaded." [#^KeyStore keystore #^String cert-alias #^String certificate] (.setCertificateEntry keystore cert-alias certificate) keystore) (defn #^KeyManagerFactory key-manager-factory "Returns a key manager for X509 certs using the speficied keystore." [#^KeyStore keystore #^String password] (let [kmf (KeyManagerFactory/getInstance "SunX509")] (if password (.init kmf keystore (.toCharArray password)) (.init kmf keystore nil)) kmf)) (defn #^SSLContext ssl-context "Creates a new SSLContext with x509 certificates. This allows you to use client certificates in your async http requests. File params should be relative to resources when your app is running as a jar. For example, if your certificate file is in resources/security/mycert.pem, then the :certificate-file param would be \"security/mycert.pem\". :keystore-file - Path to Java keystore containing any private keys and trusted certificate authority certificates required for this connection. If this is nil or missing, a default keystore will be used. :keystore-password - Password to unlock KeyStore if keystore file is provided. :certificate-file The path to the file containing an X509 certificate (or certificate chain) to be used in the https connection :certificate-alias - A name by which to access an X509 certificate that will be loaded into the KeyStore. :trust-managers - [optional] A seq of javax.net.ssl.X509TrustManager objects. These are used to verify the certificates sent by the remote host. If you don't specify this option, the connection will use an instance of BlindTrustManager, which blindly trusts all certificates. This is handy, but it's not particularly safe." [& {:keys [keystore-file keystore-password certificate-alias certificate-file trust-managers]}] (let [initial-keystore (load-keystore (when keystore-file (resource-stream keystore-file)) keystore-password) keystore-with-cert (add-x509-cert initial-keystore certificate-alias (load-x509-cert certificate-file)) key-mgr-factory (key-manager-factory keystore-with-cert keystore-password) ctx (SSLContext/getInstance "TLS") key-managers (.getKeyManagers key-mgr-factory) trust-managers (into-array javax.net.ssl.X509TrustManager (or trust-managers (list (new BlindTrustManager))))] (.init ctx key-managers trust-managers (new SecureRandom)) ctx))
Historian Nancy L Cohen, whose latest book is The Making of America’s First Woman President, explains why voters care more about policy than gender Pick up the new work by historian Nancy L Cohen, Breakthrough: The Making of America’s First Woman President, and you’ll find the former secretary of state’s name mentioned a dozen times in a 12-page prologue, as well as a chapter titled “Hillary” – the longest in the book, and the only chapter named after an individual. Can Clinton change American history? We asked Cohen for her thoughts on the election – and whether sexism will play a pivotal role. Howard Cole: Should it be considered a surprise that the first woman to have a real shot at the presidency is a Democrat? Nancy L Cohen: There were Republican women over the last two decades who could have been viable presidential candidates. But it’s not surprising that today it is a Democrat. The Democratic party has been much more committed to gender equality, thanks to a lot of Democratic women who devoted energy and resources to elect women. In Congress, Democratic women outnumber Republican women by almost three to one. Women make up 35% of the Democratic congressional caucus, and only 9% of the Republican caucus. You wrote a couple of times that the double standard is dead. Are you really that convinced? There are a lot of sexist attacks and gendered attacks on Hillary Clinton, so you would think that sexism might play a big role in this election. The good news and the surprising news is that sexism doesn’t really affect the outcome of elections. Women win at rates equal to men in similar situations – apple-to-apple situations. Voters care much more about party and ideology and temperament and policy than they care about gender. So women don’t lose elections because of sexism. So in that way, when we come down to the ultimate decision, the double standard is not really a factor anymore. It doesn’t mean that women aren’t subject to sexism. It doesn’t mean that our political debate is not highly gendered. What it means is that’s not the prime influence on how people vote. Facebook Twitter Pinterest Hillary Clinton shakes hands with attendees during a campaign stop. Photograph: Matt Rourke/AP Obviously, when you were writing the book you couldn’t have expected that Donald Trump was going to be figuring so prominently. He’s completely changed the whole way women are treated. Yeah, I mean, if we had ever had a woman president, do we think we’d be having a conversation about the size of Trump’s endowment? I mean, that’s ridiculous that – yeah, I’m going to stop there. You write that “long before anyone imagined that Bernie Sanders might run for president as a Democrat, Clinton already intended to run as a progressive,” adding how much you felt it resonated with students at the time. And yet Sanders seems to have the edge with the college crowd. Why? I’m convinced from my interviews and research that Hillary is a progressive and that there’s little difference between her and Sanders on their goals for domestic policy. But she’s a policy wonk who wants to get things done, even if that takes compromise. He’s a protest politician, who would rather stay true to his beliefs, even if that means preserving the status quo. [College students are] a more progressive generation than older people, and his ideals appeal to them. He talks about their interests in a direct and simple way that makes sense. The Sanders campaign is brilliant at social media, and that’s creating a bandwagon effect. People want to be part of something that feels exciting. Hillary is actually winning African American and Latino millennials. Sanders is cleaning her clock with white millennials, particularly white millennial men. Thoughts on an all-female Democratic ticket in 2016? The real problem the Democratic party has at this moment in fielding an all-woman ticket is that pretty much all the women qualified right now are white women, from the north-east, in a very narrow age band. They don’t get the geographical diversity, or the ethnic diversity, or even really the ideological diversity. However, given the clear strength in numbers of the progressive wing of the Democratic party, I would not completely rule out a Clinton-Elizabeth Warren ticket. But I really expect the Democrats to put a Latino in the vice-presidential spot. I think that’s the main issue right now, given how virulent the nativism and racism is on the Republican side, that the Democrats will want to have an ethnically diverse ticket. Facebook Twitter Pinterest Hillary Clinton on stage with singer Katy Perry during a campaign rally. Photograph: Scott Morgan/Reuters If not Hillary this time then who, and when? I think if she doesn’t win in 2016, then she’s not going to run in 2020. What I would expect to see in 2020 is a number of women running for what will be an open seat for the Democratic side. And I think we could see equal numbers of women and men running the next time we see a competitive Democratic primary. Who could it be? There are people like Amy Klobuchar, Kirsten Gillibrand and [California attorney general and candidate for US Senate] Kamala Harris – women who are coming up, who are running for senator who would be kind of an Obama equivalent. You know, they can come out of nowhere and we don’t know who they might be in 2020 or 2024. Based on everything we know about the state of the race right now, today, how do you think the Democratic race turns out? And the general? Hillary Clinton will continue to win the most votes and the most pledged delegates, and she will be the Democratic nominee. And I feel confident making another prediction, especially after Trump’s recent comment that abortion should be illegal and that women who have abortions should be punished. Hillary will win in November and be our next president. Remember, for so many years, the party establishments wouldn’t support women because they said women were unelectable. The irony now is that Hillary, the woman in the race, is not only the most qualified presidential candidate, but also the most electable candidate in either party. This Q&A has been edited for length and clarity
Q: Textbox with Dropdown as Group Addon I am trying to use the Dropdown as a Group Add-on in bootstrap: <div class="col-md-5"> <div class="form-group"> <div class="input-group"> <div class="input-group-addon">@Html.DropDownListFor(m => m.SelectedCountryCode, new SelectList(Model.ListOfCountries, "PhoneCode", "PhoneCode"), "Select")</div> @Html.TextBoxFor(m => Model.Value, new { @class = "form-control" }) </div> </div> </div> This is the result I get: Is there another way to do this so my styles of dropdown are same as the textbox? I don't want the grey part around the dropdown. Here is a JSFiddle: https://jsfiddle.net/mdawood1991/yLygh0v4/ A: This is the best way to fix this. Style the dropdown with this: background: transparent; border: 0; Then it'll look like this: And when open:
Equipment Values up 2.1% Average February sales values for used equipment typically operated in rental fleets have risen 2.1 percent from November numbers. Of the 10 equipment categories typically owned by rental firms, skid-steer loaders registered the greatest jump in OLV, moving up 6.9 percent over January. Staff May 01, 2007 Average February sales values for used equipment typically operated in rental fleets have risen 2.1 percent from November numbers. Of the 10 equipment categories typically owned by rental firms, skid-steer loaders registered the greatest jump in OLV, moving up 6.9 percent over January. For more information, visit www.rouseservices.com.
; SICP exercise 3.33 ; ; Using primitive multiplier, adder, and constant constraints, define a ; procedure averager that takes three connectors a, b and c as inputs and ; establishes the constraint that the value of c is average of the values of a ; and b. ; Averager ; c = (a + b)/2 ; ; 2c = a + b (define (averager a b c) (let ((x (make-connector)) (y (make-connector))) (adder a b x) (multiplier c y x) (constant 2 y) 'ok)) ; Celsius to Fahrenheit converter (define (celsius-fahrenheit-converter c f) (let ((u (make-connector)) (v (make-connector)) (w (make-connector)) (x (make-connector)) (y (make-connector))) (multiplier c w u) (multiplier v x u) (adder v y f) (constant 9 w) (constant 5 x) (constant 32 y) 'ok)) ; Constraints (define (adder a1 a2 sum) (define (process-new-value) (cond ((and (has-value? a1) (has-value? a2)) (set-value! sum (+ (get-value a1) (get-value a2)) me)) ((and (has-value? a1) (has-value? sum)) (set-value! a2 (- (get-value sum) (get-value a1)) me)) ((and (has-value? a2) (has-value? sum)) (set-value! a1 (- (get-value sum) (get-value a2)) me)))) (define (process-forget-value) (forget-value! sum me) (forget-value! a1 me) (forget-value! a2 me) (process-new-value)) (define (me request) (cond ((eq? request 'i-have-a-value) (process-new-value)) ((eq? request 'i-lost-my-value) (process-forget-value)) (else (error "Unknown request - ADDER" request)))) (connect a1 me) (connect a2 me) (connect sum me) me) (define (multiplier m1 m2 product) (define (process-new-value) (cond ((or (and (has-value? m1) (= (get-value m1) 0)) (and (has-value? m2) (= (get-value m2) 0))) (set-value! product 0 me)) ((and (has-value? m1) (has-value? m2)) (set-value! product (* (get-value m1) (get-value m2)) me)) ((and (has-value? product) (has-value? m1)) (set-value! m2 (/ (get-value product) (get-value m1)) me)) ((and (has-value? product) (has-value? m2)) (set-value! m1 (/ (get-value product) (get-value m2)) me)))) (define (process-forget-value) (forget-value! product me) (forget-value! m1 me) (forget-value! m2 me) (process-new-value)) (define (me request) (cond ((eq? request 'i-have-a-value) (process-new-value)) ((eq? request 'i-lost-my-value) (process-forget-value)) (else (error "Unknown request - MULTIPLIER" request)))) (connect m1 me) (connect m2 me) (connect product me) me) (define (constant value connector) (define (me request) (error "Unknown request - CONSTANT" request)) (connect connector me) (set-value! connector value me) me) (define (inform-about-value constraint) (constraint 'i-have-a-value)) (define (inform-about-no-value constraint) (constraint 'i-lost-my-value)) ; Connectors (define (make-connector) (let ((value false) (informant false) (constraints '())) (define (set-my-value newval setter) (cond ((not (has-value? me)) (set! value newval) (set! informant setter) (for-each-except setter inform-about-value constraints)) ((not (= value newval)) (error "Contradiction" (list value newval))) (else 'ignored))) (define (forget-my-value retractor) (if (eq? retractor informant) (begin (set! informant false) (for-each-except retractor inform-about-no-value constraints)) 'ignored)) (define (connect new-constraint) (if (not (memq new-constraint constraints)) (set! constraints (cons new-constraint constraints)) #t) (if (has-value? me) (inform-about-value new-constraint) #t) 'done) (define (me request) (cond ((eq? request 'has-value?) (if informant true false)) ((eq? request 'value) value) ((eq? request 'set-value!) set-my-value) ((eq? request 'forget) forget-my-value) ((eq? request 'connect) connect) (else (error "Unknown operator - CONNECTOR" request)))) me)) (define (for-each-except exception procedure list) (define (loop items) (cond ((null? items) 'done) ((eq? (car items) exception) (loop (cdr items))) (else (procedure (car items)) (loop (cdr items))))) (loop list)) (define (has-value? connector) (connector 'has-value?)) (define (get-value connector) (connector 'value)) (define (set-value! connector new-value informant) ((connector 'set-value!) new-value informant)) (define (forget-value! connector retractor) ((connector 'forget) retractor)) (define (connect connector new-constraint) ((connector 'connect) new-constraint)) ; Probe (define (probe name connector) (define (print-probe value) (newline) (display "Probe: ") (display name) (display " = ") (display value)) (define (process-new-value) (print-probe (get-value connector))) (define (process-forget-value) (print-probe "?")) (define (me request) (cond ((eq? request 'i-have-a-value) (process-new-value)) ((eq? request 'i-lost-my-value) (process-forget-value)) (else (error "Unknown request - PROBE" request)))) (connect connector me) me)
Q: C++ macro causing null pointer I was wondering if someone can explain this macro to me. #define Q_DECLARE_PRIVATE(Class) \ inline Class##Private* d_func() { return reinterpret_cast<Class##Private *>(d_ptr); } \ inline const Class##Private* d_func() const { return reinterpret_cast<const Class##Private *>(d_ptr); } \ friend class Class##Private; I have an application that uses QT and it crashes with an access violation exception on the last line from the following snippet. class Q_GUI_EXPORT QWidget : public QObject, public QPaintDevice { Q_OBJECT Q_DECLARE_PRIVATE(QWidget) (full source here) and what can cause a null pointer operation in on the last line? A: The compiler can explain it best of all: g++ -E foo.cc will put foo.cc to stdout after passing through the pre-processor. It lets you see what the compiler sees which (especially with token pasting) is usually less than obvious.
State senator Mark Leno has proposed new legislation in a move that could delight S.F. drinkers and aggravate responsible types across the city and state. The measure would allow cities and counties to petition state alcohol regulators for permission to allow restaurants, nightclubs and other watering holes that remain open after 2 a.m. to continue serving alcohol to late-night patrons. The move is designed to stimulate the state's nightlife economy by bringing in more dollars from residents and tourists looking for a good time. It would presumably also help silence your friends visiting from NYC who won't STFU about how early everything closes out here. Leno expects pushback from groups concerned about late-night noise, drunk driving and general debauchery, but points out that if the measure becomes law, it would serve only to create an option. "The bill offers cities an opportunity to create jobs, expand business and increase tax revenue. It imposes nothing on anybody; it merely authorizes the opportunity." Time will tell whether authorizing the opportunity to party will result in more late-night drinking on the horizon. [SF Gate]
ELMO1 signaling in apoptotic germ cell clearance and spermatogenesis. Apoptosis and the subsequent removal of dying cells are crucial processes for tissue development and maintenance. Although we are beginning to understand the signaling pathways that control the phagocytic clearance of apoptotic cells, the physiological relevance of these pathways is lacking. During spermatogenesis, over half of the developing germ cells eventually die by apoptosis, yet the signaling pathways that regulate the phagocytic clearance of these dying cells or the impact of this clearance on development and maintenance of the germ cell population is not well understood. The ELMO1/Dock180 proteins form an evolutionarily conserved signaling module that functions as a bipartite guanine nucleotide exchange factor for the small GTPase Rac. The subsequent Rac-dependent cytoskeletal changes play an important role in the physical engulfment of apoptotic cells. Recent findings demonstrate an in vivo role for ELMO1-dependent clearance in the testes, with implications for spermatogenesis. Here we will discuss the role of apoptotic cell clearance during spermatogenesis, with a particular emphasis on ELMO1/Dock180 signaling.
Al-Maliki vows militants won't succeed in capturing western part of capital Below: Next story in Conflict in Iraq BAGHDAD, Iraq — Prime Minister Nouri al-Maliki said Wednesday that insurgents are trying to take control of western Baghdad, but he vowed they won’t succeed. The Shiite prime minister addressed parliament minutes after the largest Sunni Arab bloc of legislators ended their boycott of the meetings. The Sunni United Accordance Front thanked the parliament for its help in seeking the release of kidnapped legislator Tayseer al-Mashhadani and called for a new spirit of cooperation amid rising sectarian violence. Shiite gunmen are believed to be holding al-Mashhadani, who was seized in a Shiite neighborhood earlier this month. Al-Maliki said that insurgents have plans to take control of Karkh, a large swath of western Baghdad that extends north. “They have intentions to occupy Karkh (west Baghdad) but be sure that Iraqi forces are capable of repulsing them and have started striking them,” he said. “The government cannot protect every child and every woman,” al-Maliki said. “Military forces will deter anyone who tries to occupy any area.” He also called on Iraq’s myriad ethnic and sectarian groups to unite to stem the violence instead of casting blame solely on his government. “It is not only the government that should be responsible. You chose the ministers and the prime ministers. You should not stand up and criticize the government,” al-Maliki said in an apparent reference to some legislators who blamed the government for the country’s bad security situation. The prime minister added that the government will work on cleaning up the security and armed forces in order “to make them far from political groups and sectarianism.”
Retailers And Chapter 11 Ever wonder why retailers use the bankruptcy code as an exit strategy or path to restructure? Here’s a look. By: Daniel F. Blanks, partner, Nelson Mullins Circuit City, Blockbuster, Sharper Image, Friedman’s Jewelers, Bombay Company, Lillian Vernon, Movie Gallery, KB Toys, Borders and Linens-N-Things all filed for Chapter 11 in an attempt at reorganizing their companies. Each of them failed to reorganize, and instead liquidated. In the past, retailers such as Kmart, Macy’s, Montgomery Ward, Ames and Federated Department Stores filed for bankruptcy protection, reorganized and emerged from Chapter 11 as a restructured company. For landlords of retailers, it is important to understand what’s different now. To understand the current bankruptcy code, it may help to view it through the prism of history. The Great Depression was the defining cataclysmic event of the American economy and political system. In the severe downturn of the economy at that time, preservation of businesses from liquidation, and the preservation of the employment and capital generated by those businesses was a major objective of the government. The Chandler Act of 1938 codified the reorganization principles to include large companies, including those that are publicly traded. Notwithstanding the general objectives of providing the opportunity for rehabilitation of the distressed business and avoiding liquidation, there were significant obstacles for American companies to utilize the 1938 Act. In the decades that followed World War II, businesses obtained liberal access to capital markets and leverage grew exponentially. With the attendant financial distress occurring more frequently with this leverage, Congress passed the Bankruptcy Reform Act of 1978. The 1978 Act ushered in a transformative array of new concepts including, among others, the abandonment of the mandatory trustee and application of the “debtor-in-possession,” the automatic stay — expanding the ability of a debtor to obtain financing in Chapter 11 — and the authority to assume or reject unexpired leases and contracts. In 2005, Congress dramatically altered the bankruptcy code in several important respects, many of which directly impacted a Chapter 11 retailer’s ability to reorganize. Several ongoing changes to the financial system have also evolved since 1978, some of which significantly impact Chapter 11. Prior to 2005, a debtor had 60 days to decide whether to assume or reject leases. This 60-day period could be extended by the Bankruptcy Court “for cause.” As a practical matter, this 60-day period was routinely extended, often for long periods of time. Today, a debtor must assume or reject non-residential leases by the earlier of (i) 120 days after the petition date; or (ii) confirmation of a plan. Courts may extend this 120-day period by an additional 90 days only once “for cause.” Extensions beyond 210 days may only be granted upon the consent of the landlord. Since “going out of business sales” typically require 60 days to complete, debtors are given three to five months to accomplish a reorganization. If it cannot, going out of business sales are instituted to maximize a return to the lender before the debtor must relinquish its leasehold. Outside of retail cases, most Chapter 11 debtors do not have hundreds or thousands of leases. Retailers’ leasehold interests, inventory and “brand” are often their primary, if not only, significant assets. In addition, secured creditors now dominate Chapter 11 cases. Corporate debtors now pledge substantially all of their assets — including cash — to finance their businesses. When all of a debtor’s assets are liened, a debtor’s likely only source for debtor-in-possession financing is the secured creditor. To secure this financing, the secured creditor typically requires the debtor to consent to provisions and conditions that enhance the secured creditor’s position, including dictating going-out-of-business sales. Historically, a retailer’s creditor pool was comprised of creditors with a vested interest in the survival of the retailer in Chapter 11. Today, that is much less likely. First, with the rise of international trade, a retailer’s trading partner is likely to be on another continent with little or no vested relationship with the retailer. Furthermore, there may be cultural differences in interpreting bankruptcy and debts. Second, section 503(b)(9) of the bankruptcy code now requires debtors to pay in full all claims of creditors that provided goods to the debtor in the 20 days before the bankruptcy filing. Unlike other trade vendors, these creditors do not share in a pro rata distribution of the pool of funds for creditors. Moreover, this class of creditors often comprises a substantial amount of money that must be paid before other creditors. Third, debt trading dominates Chapter 11. Private equity funds and hedge funds regularly purchase claims from institutional lenders and ordinary creditors. These debt purchasers have no interest in the rehabilitation and restructuring of the debtor. They much prefer quick sales and immediate distributions. Finally, gone are the days when customers had only one or two options of stores from which to purchase goods. Now, local companies compete with national companies and everything is available online. Unlike many other industries, a retailer survives on its reputation with its customers. The disparate public has no appetite or interest in the nuances of financial difficulties. If a retailer files for Chapter 11, it must be “bad” or mistakenly believed to be closing simply because it filed for bankruptcy. The brand name of the retailer is destroyed immediately upon the public becoming aware of a Chapter 11 filing. All of this presents owners of shopping centers with a unique set of problems. Some of these cannot be remedied by better drafted leases or even federal legislation, however, there are things that can be done to ameliorate one’s position. First, landlords of Chapter 11 debtors should play an active role in the Chapter 11 case from the first day. Second, landlords should participate on official committees of unsecured creditors to progress the case. Third, landlords may want to act in a collective manner, and proactively engage the debtor about the leases instead of allowing the debtor — or the secured creditor — to drive the decision. SCB Daniel F. Blanks is a partner in Nelson Mullins’ Jacksonville, Florida, office. He counsels clients, including retailers, in matters related to bankruptcy, financial restructuring, distressed asset acquisitions, commercial workouts and commercial litigation. He may be reached by email at [email protected]. Much of the spotlight surrounding in-demand tenants at today's shopping centers is focused on food and beverage and entertainment users. This is a solid strategy, agrees Steven Maksin, founder and CEO…
Eliyahu Hacarmeli Eliyahu Hacarmeli (, born Eliyahu Lulu (); 1 August 1891 – 21 December 1952) was an Israeli politician who served as a member of the Knesset from 1949 until 1952. Biography Born in Haifa during the Ottoman era, Hacarmeli was educated at an Alliance School in his home city, before studying at an Alliance Teachers Seminary in Paris. Between 1920 and 1930 he worked as a teacher in the north of the country, and was chairman of the Southern Galilee branch of the Teachers Union. A member of Hapoel Hatzair, he served as a member of the Assembly of Representatives on its behalf between 1925 and 1931, as well as being a deputy member of the Jewish National Council. In 1930 he moved to Jerusalem, where he became a Mapai activist, having previously been a member of Hapoel Hatzair. He also worked as an emissary to Morocco and Tunisia. In 1949 he was elected to the first Knesset on the Mapai list, and was re-elected in 1951. He died whilst still a Knesset member in 1952; his seat was taken by Shlomo Hillel. References External links Category:1891 births Category:1952 deaths Category:Israeli educators Category:Jews in Mandatory Palestine Category:Jews in Ottoman Palestine Category:Mapai politicians Category:Members of the Assembly of Representatives (Mandatory Palestine) Category:Members of the 1st Knesset (1949–1951) Category:Members of the 2nd Knesset (1951–1955) Category:People from Haifa
Comments on: Hospitalityhttp://meyerweb.com/eric/thoughts/2006/10/02/hospitality/ Things that Eric A. Meyer, CSS expert, writes about on his personal Web site; it's largely Web standards and Web technology, but also various bits of culture, politics, personal observations, and other miscellaneous stuffThu, 30 Jul 2015 15:08:52 +0000hourly1http://wordpress.org/?v=4.2.4-RC1By: Justinhttp://meyerweb.com/eric/thoughts/2006/10/02/hospitality/#comment-62294 Wed, 11 Oct 2006 03:37:31 +0000http://meyerweb.com/?p=768#comment-62294Our 2yr old daughter had tubes put into her ears a few month ago becuase she had a massive amount of fluid that had collected. It was both frightening and a relief when she went into surgery because we knew she heard very little of what we said. Or at least she wasn’t hearing the corret pronounciation and therefore could not repeat it. It was affecting her and us because she wanted to communicate more complex things but her language wasn’t quite there to do it. She used some sign, but was limited to really basic things. She would usually end up on the floor screaming and crying. On the ride home from the hospital everything was “Loud!! Oh, truck loud!!” The improvements in her language were almost immediate. Best wishes and a speedy recovery to all. ]]>By: Tarellelhttp://meyerweb.com/eric/thoughts/2006/10/02/hospitality/#comment-61341 Sat, 07 Oct 2006 05:08:32 +0000http://meyerweb.com/?p=768#comment-61341Wow, sounds like you’ve got a little trooper there. But I think most parents do think their kids are generally rough, tough, and better then the average kid. But ouch a broken toe, *squint* sorry to hear that. But I realized the, little if you can move it thing was wrong in high school. In P.E. I ended up getting kicked in the hand, while playing dodge ball. After a few days my hand was swollen up to the size of a softball. I edned having a hand cast for breaking 2 of my fingers and having my thumb popped out of socket. And boy did I ever use that as an excuse to get away without do my homework for like a month and half. *grins* ]]>By: Ricky Onsmanhttp://meyerweb.com/eric/thoughts/2006/10/02/hospitality/#comment-61076 Fri, 06 Oct 2006 11:39:04 +0000http://meyerweb.com/?p=768#comment-61076Maybe it’s something that wears off AFTER three. Our 5yo boy was showing 3yo girl how his battery-operated helicopter could fan the hair on the back of her head. Naturally, the rotors caught her hair and ripped a bunch out, with a bit of blood spilled. She gave one quick shriek and came to find Daddy so he could “take this helicopter off my head, please”. Then she went back to playing. 5yo was still completely trauatised hours later, unable to even look at the helicopter again. She was last seen comforting him, telling him “The helicopter wasn’t bad.” ]]>By: Ginihttp://meyerweb.com/eric/thoughts/2006/10/02/hospitality/#comment-60482 Thu, 05 Oct 2006 01:46:15 +0000http://meyerweb.com/?p=768#comment-60482I am still amazed by her quick recovery. You guys should count your blessings! ]]>By: Rob L.http://meyerweb.com/eric/thoughts/2006/10/02/hospitality/#comment-60025 Wed, 04 Oct 2006 02:58:26 +0000http://meyerweb.com/?p=768#comment-60025Speedy and complete recovery to all of you. Ah, Signing Time. My daughter loves it too, and has learned much from it. And of course, one of the reasons we started teaching her signs was because of stuff I read right here. Been meaning to say thanks for that, so, well, thanks! ]]>By: Kevanhttp://meyerweb.com/eric/thoughts/2006/10/02/hospitality/#comment-59660 Tue, 03 Oct 2006 18:50:57 +0000http://meyerweb.com/?p=768#comment-59660It was Thomas the Tank Engine and Backyardigans for us too – our three year old was pretty out of it for a few days after the good drugs wore off, and he was relegated to motrin/tylenol. We can’t wait – 20 new Backyardigans starting in a week or two! ]]>By: FAWhttp://meyerweb.com/eric/thoughts/2006/10/02/hospitality/#comment-59604 Tue, 03 Oct 2006 15:02:40 +0000http://meyerweb.com/?p=768#comment-59604Ouchouchouch. (Though the Aircast *does* sound cool.) I hope everyone at Chez Meyer recovers quickly and completely. ]]>By: Eric TF Bathttp://meyerweb.com/eric/thoughts/2006/10/02/hospitality/#comment-59509 Tue, 03 Oct 2006 10:34:35 +0000http://meyerweb.com/?p=768#comment-59509My daughter, the BatPup, is similarly invulnerable. The other day she was playing with something long and whippy and hit herself square in the eye. She blinked, looked vaguely non-plussed, and then went back to playing. She didn’t cry. And she’s all of 18 months old. This sort of thing happens all the time. Superhero, I swear. She’ll be flying around the living room before long, and be demanding to be allowed to pop out to the Antarctic Ocean and dive-bomb Japanese whaling ships from low orbit. I shall, of course, tell her she’s not allowed to do that until she’s finished melting the tyres of every SUV and four-wheel drive in Australia. A girl’s gotta get her chores done before she can have fun! She’s playing pool? And she’s not yet three? I’d say a little parental pride is quite in order. ]]>By: stevehttp://meyerweb.com/eric/thoughts/2006/10/02/hospitality/#comment-59350 Tue, 03 Oct 2006 04:07:47 +0000http://meyerweb.com/?p=768#comment-59350i learned the same thing when i was kid. “yeah, as long as you can move it, it’s fine.” not always the case. in college (as a music major) i was helping out at a recital and rolled a grand piano onto my big toe! being the manly man i am, i shrugged it off, sat through the recital and walked all the way back to my dorm. was it broken? i don’t know, i never got it checked (because i’m stupid). but i had one bloody shoe/sock/toe by the time i got back…
Q: bad component(expected host component): received when running a rake task to send email with roadie on heroku I'm using the roadie gem to help with the inline css for emails and am getting the following error when running a rake task to send emails. My app is hosted on heroku. It works fine in development mode, but get this error in production. I don't quite understand the issue. Other mailings are sent out fine in production. I'm pretty much a beginner. Thanks in advance for any help! rake aborted! bad component(expected host component): http://nameless-taiga-7547.herokuapp.com/ /app/vendor/ruby-1.9.2/lib/ruby/1.9.1/uri/generic.rb:395:in `check_host' /app/vendor/ruby-1.9.2/lib/ruby/1.9.1/uri/generic.rb:409:in `host=' /app/vendor/ruby-1.9.2/lib/ruby/1.9.1/uri/generic.rb:180:in `initialize' /app/vendor/ruby-1.9.2/lib/ruby/1.9.1/uri/generic.rb:126:in `new' /app/vendor/ruby-1.9.2/lib/ruby/1.9.1/uri/generic.rb:126:in `build' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/inliner.rb:206:in `absolute_url_base' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/inliner.rb:192:in `ensure_absolute_url' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/inliner.rb:180:in `block in make_image_urls_absolute' /app/vendor/bundle/ruby/1.9.1/gems/nokogiri-1.5.6/lib/nokogiri/xml/node_set.rb:239:in `block in each' /app/vendor/bundle/ruby/1.9.1/gems/nokogiri-1.5.6/lib/nokogiri/xml/node_set.rb:238:in `upto' /app/vendor/bundle/ruby/1.9.1/gems/nokogiri-1.5.6/lib/nokogiri/xml/node_set.rb:238:in `each' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/inliner.rb:179:in `make_image_urls_absolute' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/inliner.rb:57:in `block in execute' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/inliner.rb:80:in `block in adjust_html' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/inliner.rb:79:in `tap' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/inliner.rb:79:in `adjust_html' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/inliner.rb:51:in `execute' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie.rb:6:in `inline_css' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/action_mailer_extensions.rb:75:in `inline_style_response' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/action_mailer_extensions.rb:54:in `block in collect_responses_and_parts_order_with_inline_styles' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/action_mailer_extensions.rb:54:in `map' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/action_mailer_extensions.rb:54:in `collect_responses_and_parts_order_with_inline_styles' /app/vendor/bundle/ruby/1.9.1/gems/actionmailer-3.2.11/lib/action_mailer/base.rb:648:in `mail' /app/vendor/bundle/ruby/1.9.1/gems/roadie-2.4.3/lib/roadie/action_mailer_extensions.rb:35:in `mail_with_inline_styles' /app/app/mailers/match_mailer.rb:13:in `deal_match' /app/vendor/bundle/ruby/1.9.1/gems/actionpack-3.2.11/lib/abstract_controller/base.rb:167:in `process_action' /app/vendor/bundle/ruby/1.9.1/gems/actionpack-3.2.11/lib/abstract_controller/base.rb:121:in `process' /app/vendor/bundle/ruby/1.9.1/gems/actionpack-3.2.11/lib/abstract_controller/rendering.rb:45:in `process' /app/vendor/bundle/ruby/1.9.1/gems/actionmailer-3.2.11/lib/action_mailer/base.rb:458:in `process' /app/vendor/bundle/ruby/1.9.1/gems/actionmailer-3.2.11/lib/action_mailer/base.rb:452:in `initialize' /app/vendor/bundle/ruby/1.9.1/gems/actionmailer-3.2.11/lib/action_mailer/base.rb:439:in `new' /app/vendor/bundle/ruby/1.9.1/gems/actionmailer-3.2.11/lib/action_mailer/base.rb:439:in `method_missing' /app/lib/tasks/match.rake:24:in `block (3 levels) in <top (required)>' /app/vendor/bundle/ruby/1.9.1/gems/activerecord-3.2.11/lib/active_record/relation/delegation.rb:6:in `each' /app/vendor/bundle/ruby/1.9.1/gems/activerecord-3.2.11/lib/active_record/relation/delegation.rb:6:in `each' /app/lib/tasks/match.rake:20:in `block (2 levels) in <top (required)>' /app/lib/tasks/match.rake:9:in `each' /app/lib/tasks/match.rake:9:in `block in <top (required)>' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/task.rb:236:in `call' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/task.rb:236:in `block in execute' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/task.rb:231:in `each' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/task.rb:231:in `execute' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/task.rb:175:in `block in invoke_with_call_chain' /app/vendor/ruby-1.9.2/lib/ruby/1.9.1/monitor.rb:201:in `mon_synchronize' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/task.rb:168:in `invoke_with_call_chain' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/task.rb:161:in `invoke' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/application.rb:149:in `invoke_task' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/application.rb:106:in `block (2 levels) in top_level' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/application.rb:106:in `each' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/application.rb:106:in `block in top_level' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/application.rb:115:in `run_with_threads' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/application.rb:100:in `top_level' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/application.rb:78:in `block in run' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/application.rb:165:in `standard_exception_handling' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/lib/rake/application.rb:75:in `run' /app/vendor/bundle/ruby/1.9.1/gems/rake-10.1.0/bin/rake:33:in `<top (required)>' /app/vendor/bundle/ruby/1.9.1/bin/rake:19:in `load' /app/vendor/bundle/ruby/1.9.1/bin/rake:19:in `<main>' In my rake task task :match => :environment do ... end Here is what is in my production.rb config.cache_classes = true config.consider_all_requests_local = false config.action_controller.perform_caching = true config.serve_static_assets = false config.assets.compress = true config.assets.compile = true config.assets.digest = true config.action_mailer.asset_host = { :host => 'http://nameless-taiga-7547.herokuapp.com/' } ActionMailer::Base.smtp_settings = { :address => 'smtp.sendgrid.net', :port => '587', :authentication => :plain, :user_name => 'example', :password => 'password', :domain => 'heroku.com' } ActionMailer::Base.delivery_method = :smtp config.action_mailer.default_url_options = { :host => 'http://nameless-taiga-7547.herokuapp.com/' } A: You are asked to provide a Hostname, but you've instead provided a full URI. You should just provide the host: config.action_mailer.asset_host = { :host => 'nameless-taiga-7547.herokuapp.com' } config.action_mailer.default_url_options = { :host => 'nameless-taiga-7547.herokuapp.com' }
Presidential neighbors Imagine you could pluck a U.S. president from the pages of history and install him as your next-door neighbor. Who would you choose? A popular historical figure like George Washington might seem an obvious choice, but you wouldn’t want George as a neighbor. He would sneak onto your property under the cover of darkness and chop down all your fruit trees while you slept. Oh sure, in the morning, he would knock on your door, guilt-ridden, seeking forgiveness. But that would be little consolation come springtime with no cherry pies to take to the church bake sale. And don’t think Thomas Jefferson would make a cool neighbor, either. Sure, according to Wikipedia, he “spoke five languages and was deeply interested in science, invention, architecture, religion and philosophy.” But who wants a smart-aleck living next door? As the only president to never marry, James Buchanan would probably hold disruptive bachelor parties every weekend. He might scare the children, too, since he suffered from an odd condition called wryneck, resulting in his head always leaning to the left. Explain to the kids this is normal, for a Democrat. You wouldn’t want Richard Nixon living next door either. According to most biographies, he was narcissistic, secretive, and suspicious—not endearing qualities in a neighbor. With tricky Dick on the other side of the fence, you’d end up a neurotic wreck: during backyard cookouts, you’d continually be checking the coleslaw for “bugs.” However, not all presidents would make bad neighbors. Abraham Lincoln would be a great practical asset to any community. Before he entered politics, he worked on the family farm wielding an axe with great skill to build rail fences. So you could count on Abe to help with the firewood in December. Nevertheless, if he invited you to accompany him to the theater one night, skip it. Often unfairly portrayed as a boozer, Ulysses S. Grant was a decent man of good character and would make a fine neighbor. Unfortunately, he was a poor judge of people when it came to political appointments—his administration was one of the most corrupt due to the scoundrels he unwittingly selected. So as a neighbor, if he ever recommended a plumber, go to the Yellow Pages instead. Another good neighbor would be George H.W. Bush. A kind man, he and Barbara would always be willing to lend a neighborly cup of sugar; but if you ever ran out of broccoli, don’t expect George to return the favor. George W. Bush would make a good neighbor, too. He would be personable, easy-going, and probably a lot of fun. I could also see George Jr., as the neighborhood practical joker, ringing door bells late at night, then running away claiming, “Cheney did it!” As possibly the coolest president in recent history, Bill Clinton would be a hoot for a neighbor. But for those of you with 20-year-old daughters, I know what you’re thinking: “No way I’d want him next door!” Don’t worry, he’s no longer chasing after young women, or Big Macs. Besides, Hillary would have invisible fencing around the property and a permanent electronic collar attached to Bill’s neck. Barack Obama would make a nifty neighbor, too. As an energetic community organizer, expect him to also be active in the local Homeowners Association. Of course, there would always be doubters wanting proof that he actually did have membership. And when it came to yard maintenance, expect him to insist that residents with extra fertilizer do their fair share, and spread it around to those having less. Along these lines, I’m including Mitt Romney since he may be our next president. I could easily see the good Governor working the barbeque grill during a block party -—especially if he was running for president of the Homeowners Association. Of course, there’s bound to be some in the community who might object to the Romneys because of their megawealth. Really? Maybe those folks would prefer a house load of Wall Street occupiers living next door instead? One note of caution, however. If Mitt volunteered to drive your sick dog to the vet, politely decline. (Thomas’ features and columns have appeared in more than 200 magazines and newspapers. He can be reached at [email protected].)
SAN FRANCISCO (Reuters) - Blockchain firm Ripple sued Alphabet Inc’s YouTube on Tuesday, alleging the video-sharing platform failed to protect consumers from cryptocurrency “giveaway” scams that use fake social media profiles to dupe victims into sending money. FILE PHOTO: The logo of blockchain company Ripple is seen at the SIBOS banking and financial conference in Toronto, Ontario, Canada October 19, 2017. Picture taken October 19, 2017. REUTERS/Chris Helgren The company says scammers on YouTube have been impersonating Ripple and its CEO, Brad Garlinghouse, to bait viewers into sending thousands of dollars worth of XRP, a cryptocurrency championed by Ripple, according to a court filing. The scammers promise to send back up to 5 million XRP, worth nearly $1 million, but victims who participate in the fake “giveaways” never receive any money in return, said the filing. The lawsuit appears poised to raise a fresh challenge around the controversial Section 230 of the Communications Decency Act, which shields Google, Facebook and other internet companies from liability for material that users post on their platforms. Regulators in Washington are reconsidering the need for the law’s broad immunity, which helped U.S. tech companies grow but is viewed increasingly as a shelter enabling some of the world’s richest companies to avoid investments to curb crime, extremism and misinformation online. “For every scam, giveaway, fake conspiracy that is taken down, multiple more pop up nearly immediately,” Ripple said in a blog post. “YouTube and other big technology and social media platforms must be held accountable for not implementing sufficient processes for fighting these scams.” Garlinghouse, a long-time Silicon Valley executive, said he wants the case to be a “call to action” for the social media industry, arguing the law was written “at a time when we didn’t understand how these platforms could be abused.” He said he had seen similar impersonations on platforms including Facebook’s photo-sharing app Instagram, but targeted YouTube in the lawsuit because it was the “slowest to respond and least proactive.” YouTube spokesman Alex Joseph said the company takes abuse of the platform seriously and acts “quickly when we detect violations of our policies, such as scams or impersonation.” Founded in 2012, Ripple is one of the best known companies that develop so-called blockchain technology, or the system underpinning cryptocurrencies. The company develops blockchain systems to help financial services firms carry out cross-border payments using XRP. Its filing, in the U.S. District Court for the Northern District of California, says YouTube’s failure to address the “pervasive and injurious fraud” has harmed the reputation of both Ripple and Garlinghouse. Ripple said millions of people have viewed the scams on YouTube, which enabled the fraud to proliferate by ignoring its demands for the videos to be taken down and continuing to sell ads to the scammers. YouTube also awarded a “verification badge” to a hacked channel displaying a photo of Garlinghouse as its profile picture, falsely indicating to viewers that the account was legitimate, the filing said.
Q: Average in assembly 8086 (macro error) The code below computes the average of 20 user entered numbers. It works fine when I disable ShowMsg msg2 (make it a comment), but when its enabled, I get this error : INT 21h, AH=09h - address: 0711E byte 24h not found after 2000 bytes. ; correct example of INT 21h/9h: mov dx, offset msg mov ah, 9 And I cant figure what the problem is. ShowMsg macro msg mov ah, 09h mov dx, offset msg int 21h endm NewLine macro mov ah, 02h mov dl, 0ah int 21h mov dl, 0dh int 21h endm data segment sum dd 0 num dd 0 array dd 20 dup(0) msg1 db 'Enter 20 numbers:', '$' msg2 db 0dh,0ah,'Average: ', '$' data ends stack segment dw 100 dup(?) stack ends code segment assume cs:code, ds:data, ss:stack Main Proc Far mov ax, data mov ds, ax mov ax, stack mov ss, ax ShowMsg msg1 lea si, array call GetNum ;**** PROBLEM IS HERE! **** ShowMsg msg2 lea si, array call Average mov ah, 4ch int 21h Main endp ;Gets 20 numbers(max 6 digit) from user ;and puts them in the array ;which its effective address is in SI. proc GetNum push si mov ch, 20 NextNumber: NewLine mov cl, 6 mov word ptr num, 0 mov word ptr num+2, 0 GetChar: mov ah, 07h int 21h cmp al, 0dh jz Flag cmp al, 30h jb GetChar cmp al, 39h ja GetChar mov ah, 02h mov dl, al int 21h sub al, 30h mov bl, al mov di, 10 mov ax, num mul di mov num, ax push dx mov ax, num+2 mul di mov num+2, ax pop dx add num+2, dx mov bh, 0 add num, bx adc word ptr num+2, 0 dec cl jnz GetChar Flag: mov ax, num mov dx, num+2 mov [si], ax mov [si+2], dx add si, 4 dec ch jnz NextNumber pop si ret GetNum endp ;Computes the average of numbers in the array ;which its effective address is in SI. proc Average push si mov cx, 20 Average_Next: mov ax, [si] add word ptr sum, ax mov ax, [si+2] adc word ptr sum+2, ax add si, 4 loop Average_Next mov bx, sum mov bp, sum+2 mov di, 20 call Div32 call Show pop si ret Average endp ;Divides BP:BX to DI, ;returns the quotient to BP:BX, ;remainder to DX proc Div32 mov dx, 0 mov ax, bp div di mov bp, ax mov ax, bx div di mov bx, ax ret Div32 endp ;Prints the number in BP:BX proc Show mov di, 10 mov cx, 0 Show_Next1: call Div32 push dx inc cx or bp, bx jnz Show_next1 Show_next2: pop dx add dl, 30h mov ah, 02h int 21h loop Show_next2 ret Show endp A: I tested your code in EMU8086, and this is the solution that worked for me, next is your data segment with 5 little changes : data segment sum dw 0 ;<========================== dw 0 ;<========================== num dw 0 ;<========================== dw 0 ;<========================== msg1 db 'Enter 20 numbers:', '$' msg2 db 0dh,0ah,'Average: ', '$' array dd 20 dup(0) ;<========================== data ends In the procedure "GetNum", as the characters are captured, the address of the array gets overwritten by the address of "msg1", so, the captured numbers overwrite "msg1" and "msg2". Moving the array to the end of the data segment fixed it (for me). You have to test it to see if it works for you too. More changes in variables "sum" and "num", because the size "DD" gave me problems. The way to fix this is to use two "DW", so there is no problem with sizes when using AX and DX with "num" and "sum".
--- abstract: 'The 180-day Space Telescope and Optical Reverberation Mapping campaign on NGC 5548 discovered an anomalous period, the broad-line region (BLR) holiday, in which the emission lines decorrelated from the continuum variations. This is important since the correlation between the continuum-flux variations and the emission-line response is the basic assumption for black hole (BH) mass determinations through reverberation mapping. During the BLR holiday the high-ionization intrinsic absorption lines also decorrelated from the continuum as a result of variable covering factor of the line of sight (LOS) obscurer. The emission lines are not confined to the LOS, so this does not explain the BLR holiday. If the LOS obscurer is a disk wind, its streamlines must extend down to the plane of the disk and the base of the wind would lie between the BH and the BLR, forming an equatorial obscurer. This obscurer can be transparent to ionizing radiation, or can be translucent, blocking only parts of the SED, depending on its density. An emission-line holiday is produced if the wind density increases only slightly above its transparent state. Both obscurers are parts of the same wind, so they can have associated behavior in a way that explains both holidays. A very dense wind would block nearly all ionizing radiation, producing a Seyfert 2 and possibly providing a contributor to the changing-look AGN phenomenon. Disk winds are very common and we propose that the equatorial obscurers are too, but mostly in a transparent state.' author: - 'M. Dehghanian' - 'G. J. Ferland' - 'B. M. Peterson' - 'G. A. Kriss' - 'K. T. Korista' - 'M. Chatzikos' - 'F. Guzmán' - 'N. Arav' - 'G. De Rosa' - 'M. R. Goad' - 'M. Mehdipour' - 'P. A. M. van Hoof' title: 'A wind-based unification model for NGC 5548: spectral holidays, non-disk emission, and implications for changing-look quasars' --- 2 INTRODUCTION ============= AGN STORM, the AGN Space Telescope and Optical Reverberation Mapping project, is the largest spectroscopic reverberation mapping (RM) campaign to date. NGC 5548 1[was observed ]{}with [[*HST*]{}]{}/*COS* 1[nearly]{}daily over six months in 2014 [@DeRosa15; @Edelson15; @Fausnaugh16; @Goad16; @Pei17; @Starkey17; @Mathur17], with the goal of determining the kinematics and geometry of the central regions using RM methods. [@Goad16], hereafter G16, revealed some unexpected results: about 60 days into the observing campaign, the FUV continuum and broad emission line variations, which are typically highly correlated and form the basis of RM, became “decorrelated” for $\sim$ 60-70 days, after which time the emission lines returned to their normal behavior. During this time, the equivalent widths (EWs) of the emission lines dropped by at most 25-30%. This anomalous behavior, hereafter the “emission-line holiday”, was investigated by G16, [@Pei17; @Mathur17; @sun18] among others, although no physical model 1[to explain it]{} has been proposed. The occurrence of the emission-line holiday shows that we are missing an important part of the physics of the inner regions of AGN. As discussed by [@Kriss19] and @Deh19 [hereafter D19] the same holiday happened approximately simultaneously (within measurement uncertainties) for the high-ionization narrow intrinsic absorption lines. D19 shows that changes in the covering factor (CF) of the line of sight (LOS) obscurer [@Kaastra14] explains the absorption-line holiday. The SED emitted by the source passes through this obscurer and then ionizes the absorbing clouds. Depending on the LOS CF of the obscurer, the transmitted SED changes in a way that reproduces the decorrelated behavior in some absorption lines. The LOS CF deduced from [[*Swift*]{}]{} observations confirms this 1[hypothesis]{} (D19). Here, we examine the physics by which a related emission-line holiday could occur. We take the obscurer to be a wind launched from the accretion disk, with variable mass-loss rate and hydrogen density. Figure 1 shows a cartoon with one possible geometry. We show that for low hydrogen densities the obscurer near the disk is almost transparent and so has no effect on the SED striking the BLR. However, for higher densities it can obscure much of the ionizing radiation, producing the emission-line holiday. In this case, the observed UV continuum is not a good proxy for the ionizing flux. Finally, for even higher gas densities, little ionizing radiation strikes the BLR. In this case, broad-line emission is strongly suppressed, resulting in something like a changing-look AGN. We suggest that an equatorial obscurer associated with a disk wind produces the BLR holiday, and may in more extreme circumstances contribute to causing a changing-look AGN. In Section 2, we set up a simple model of the BLR with no obscurer. Section 3 investigates how changes in the equatorial obscurer’s hydrogen density change the transmitted SED. We then show, in Section 4, that the BLR responds to this variable equatorial obscurer in agreement with observations. Small changes in the obscurer’s density reproduce the emission-line holiday and account for the amplitude of the variability in various lines. 2[If the covering fraction of the LOS obscurer also increases as the equatorial obscurer becomes more substantial, a simultaneous absorption-line holiday will be produced.]{} A baseline BLR with changing luminosity ======================================== Figure \[f1\] shows the geometry of the central regions, including the obscurer, based on [@Kaastra14] figure 4. We note that the [@Kaastra14] figure only highlights the portion of the disk wind that forms the obscurer along our LOS. The critical differences in our illustration in Figure \[f1\] are (1) we show the disk wind as an axisymmetric structure, (2) we show the full wind, with streamlines tracing from the surface of the disk to the gas lying along our LOS, and (3) we locate the obscurer interior to the BLR. The LOS obscurer is the upper part of the wind, and we refer to the lower part as the “equatorial obscurer”. Although 2[some of]{} the properties of the LOS obscurer are known 2[(such as its column density and x-ray absorption)]{}, there is no way to 1[determine]{} the properties of the obscurer near the disk. The density at the base is likely to be higher than at higher altitudes and the column density through the base of the wind toward the BLR is higher than along the LOS, and 2[therefore the wind is]{} potentially opaque. Although our LOS samples only a specific sight line through the wind, 2[we assume]{} the structure along all other sight lines is comparable and therefore can affect the whole of the BLR. The obscurer has persisted over at least four years [@Mehd16]. If it is located interior to the BLR at $<0.5$ light days, where the orbital timescale is only 40 days, this longevity implies that the wind extends a full 360-degrees around the black hole. It thus forms an axisymmetric, cylindrical continuous flow around the BH and so always fully shields the BLR. For this reason, it is not likely that a changing CF of the equatorial obscurer could explain the broad emission-line holiday as well. ![Diagram of the disk wind in NGC 5548 (not to scale). The BH is surrounded by the accretion disk. At larger radii the BLR is indicated by orange/red turbulent clouds. The disk wind rises nearly vertically from the surface of the accretion disk, where it has a dense, high-column-density base. At higher elevations, radiation pressure accelerates the wind and bends the streamlines down along the  30 degree inclination of the observer’s LOS 2 [to the rotation axis of the disk [@Kaastra14]]{}.[]{data-label="f1"}](Fig1.pdf){width="3"} Here we develop a baseline model for the BLR to investigate how its emission lines are affected by the variations of the SED striking it. At this stage, we avoid including the equatorial obscurer in our modeling, so changes in the emission-line spectrum are caused by the variations of the luminosity of the source. For simplicity, we do not model a full LOC[^1] similar to figure 2 of [@Korista00]. Our baseline model is sufficient for the goal of this paper, which is to test how changes in the equatorial obscurer change the observed EW of the broad emission lines. We use the development version of Cloudy (C17), last described by [@Ferland17], for all the photoionization models presented here. To model the BLR, we fix its hydrogen column density to be $N$(H)=10$^{23}$ cm$^{-2}$, choose a hydrogen density of $n$(H)=10$^{11}$ cm$^{-3}$, and use solar abundances [@Ferland17]. These are all typical values for the BLR [following @Ferland92; @Goad98; @Kaspi99]. The remaining parameter is the flux of hydrogen ionizing photons $\phi$(H) (ionizing photons cm$^{-2}$ s$^{-1}$) striking the cloud. For a given SED shape [we use that of @Mehd15 as discussed by D19] and location of the BLR, this flux depends on the luminosity, so changes in the flux simulate changes in the luminosity. 2[We assume thermal line broadening evaluated for the gas kinetic temperature and atomic weight of each species.]{} 1[ The line EWs were observed to decrease as the luminosity increased before the holiday. Figure \[f2\] shows our predicted EWs. The observations report a slope $\beta$ that fits EW $\propto$ $L^{\beta}$. G16 find $\beta$ in the range -0.48 to -0.75 for Ly$\alpha$, Si IV+O IV\], , and He II+O III\], while [@Pei17] find $\beta= -0.85$ for H$\beta$. This range of $\beta$ values is shown as the bow tie in the lower left corner. Each of these lines has its own reverberation timescale, formation radius, and value of $\phi$(H). Future work will examine using EW and $\beta$ to better constrain LOC models. ]{} ![image](Fig2.pdf){width="\textwidth"} As Figure \[f2\] shows, variations of the luminosity can dramatically affect the BLR. For $\phi$(H)$>10^{20}$ cm$^{-2}$ s$^{-1}$ the   EW, shown in green, behaves as in G16’s figure 1b. Changes in the EW of  and H$\beta$ are consistent with G16 and [@Pei17]. In the next Section, we consider the effects of the equatorial obscurer on the BLR. To do this, we only change the parameters of the obscurer, while we freeze all BLR parameters, including the unobscured flux, which we take to be $\phi($H$)=10^{20}$ cm$^{-2}$ s$^{-1}$. Our goal is only to demonstrate a scenario that produces emission-line holidays, so we are not trying to fine tune the parameters. The SED transmitted through the equatorial obscurer =================================================== As Figure \[f1\] shows, we assume that the obscurer is a wind extending from the equator to at least our LOS. This means that the BLR is ionized by the SED transmitted through the lowest part of the wind, the equatorial obscurer. Here we investigate how the SED transmitted through the equatorial obscurer changes as the wind parameters change. There are no observational constraints on the equatorial obscurer, but it seems likely that it is denser, perhaps with a larger column density, than 2[the more distant LOS obscurer.]{}. For simplicity, we hold its column density fixed at $N$(H)$=10^{23}$ cm$^{-2}$ and assume solar abundances. Since the broad UV absorption associated with the LOS obscurer partially covers the BLR and has velocities ($\sim 1500~\rm km~s^{-1}$) typical of the BLR [@Kaastra14], we assume that the LOS obscurer is near or coincident with the outer portion of the BLR. The equatorial obscurer must be closer to the black hole since it is launched from the disk. We choose $\phi($H$)=10^{20.3}$ cm$^{-2}$ s$^{-1}$, twice that of the BLR, placing the obscurer at $r_{obscurer}=0.7\times r_{BLR}$. We do not know the exact location of the equatorial obscurer and these values are chosen based 1[only]{} on the fact that it must be inside the BLR. 1[As in D19, we are trying to identify the phenomenology that makes the observed changes possible and not to model any particular observation (section 3.3 of that paper). We wish to see how the changes in the optical depth of the intervening wind affects emission from the BLR. These changes could be caused by variations in the physical thickness of the wind, its density, the AGN luminosity, or the distance from the black hole. For simplicity we vary only one of these, the density, while keeping the others fixed. As discussed in following sections, this change, while simple, does serve to illustrate the types of SEDs that will filter through the wind. ]{} Changes in the mass-loss rate of the wind can cause changes in the hydrogen density of the equatorial obscurer. We examine the effects of such variations upon the transmitted SED in Figure \[f3\], which shows three typical SEDs. As the Figure shows, the shape of the SED is highly sensitive to the value of the hydrogen density. ![image](Fig3.pdf){width="\textwidth"} The density and flux parameters chosen here do not matter in detail. The transmitted SED actually depends on the ionization parameter, which is the ratio of the ionizing flux to the hydrogen density [@Osterbrock06]. Increasing the hydrogen density lowers the ionization parameter inversely. Particular values 2[of the density and flux]{} do not matter as long as the ratio giving the ionization parameter is kept constant. As the ionization parameter increases the level of ionization of the gas increases. The gas opacity decreases as the number of bound electrons decreases. The ionization structure changes in ways that produce the three characteristic SEDs shown in Figure \[f3\]. These are the three cases: - Case1 has the lowest density and the highest ionization, and is shown in black. This 1[wind]{} is fully ionized, has no H or He ionization fronts, and nearly fully transmits the entire incident SED. - Case 2 has an intermediate density and is shown in blue. This has a He$^{2+}$ - He$^{+}$ ionization-front but no H ionization-front. The incident SED is heavily absorbed for the 1[XUV energies[^2] ]{}, although most of the hydrogen-ionizing radiation is transmitted. - • Finally, Case 3 is shown with the red line and has the highest density. The 1[wind]{} has both H and He ionization-fronts, and much of the light 1[in the EUV and XUV regions]{} is absorbed. The response of the BLR to changes of the transmitted continuum =============================================================== We now show how the EWs of the BLR lines in Figure \[f2\] are affected by changes in the transmitted SED of the equatorial obscurer. Figure \[f4\] shows how the EW of the strongest observed lines react as the density, $n$(H), of the equatorial obscurer varies. These 2[changes]{} are due to variations in the SED filtering through the equatorial obscurer. The three general types of SED shown in Figure \[f3\] produce the three different BLR regimes shown in Figure \[f4\]. We examine each of these three cases in more detail: ![image](Fig4.pdf){width="\textwidth"} - Case 1: In this low density regime (approximately $n($H$) <6\times 10^{9}$ cm$^{-3}$), the equatorial obscurer is transparent and has little effect on the SED or BLR. This may be the usual geometry in most AGN and results in a standard response of lines to the changes in the continuum luminosity. For low densities, the intervening wind has little effect on the optical/UV BLR, however, it does emit in other spectral ranges. This emission will be the subject of our future work. Changes in the EWs of the BLR emission lines follow the variations of the continuum luminosity. - Case 2: 2[In this case]{} the obscurer has a higher density ($6\times 10^{9}$ cm$^{-3}$ to $4\times 10^{10}$ cm$^{-3}$). As Figure \[f4\] shows, for this range of hydrogen density, the BLR EW decreases independently of the AGN luminosity and the holiday occurs. Large changes in EW at $n$(H) = $6\times 10^{9}$ cm$^{-3}$ are due to the He$^{2+}$ -He$^{+}$ ionization front reaching the outer edge of the 1wind. Much of the SED 1[in the XUV region]{} is absorbed. Case 2 produces the emission-line holiday. In this scenario, the obscurer’s density increased only slightly above Case 1. When the ionization front appears, there are significant changes in the transmitted SED and the BLR follows these changes. These changes are independent of the observed far-ultraviolet continuum longward of 912 Å, so appear as a holiday. One check of this model of the holiday is the $\sim 19\%$ deficit in   EW observed by G16. A smaller deficit, $\sim 6\%$, was observed by [@Pei17] for H$\beta$. Figure \[f4\] shows that only small changes in the density $(\sim 8\%)$ are needed to produce this   deficit. The change needed to produce the holiday is shown by the gray shaded area. Our model predicts the largest deficits for , , and  EWs, with a smaller deficit for Ly$\alpha$ EW, and the smallest deficit for H$\beta$ EW. These predictions are in the same sense as the AGN STORM observations [G16 & @Pei17]. 1[Mg II was not observed by the STORM campaign, however we report this line for future reference. The line is nearly constant when the obscurer is in Case 1 while in Case 2 it is slightly affected. This is reasonable, since we do not expect such a low-ionization line to be affected as much as  or other similar lines.]{} - Case 3: In this case, the obscurer has the highest density ($>4\times 10^{10}$ cm$^{-3}$) and most of the ionizing radiation is blocked. As Figure \[f4\] shows, many of the broad emission lines vanish. A dense equatorial obscurer provides a scenario to produce a “changing-look” quasar, transitioning from Seyfert 1 to Seyfert 2. Figure \[f5\] compares the optical/UV BLR spectrum for Cases 1 and 3. The upper panel shows that UV broad lines are suppressed by the dense equatorial obscurer. The optical lines in the lower panel almost disappear. This Figure suggests that dense disk winds could contribute to the changing-look AGN phenomenon, since changes in the equatorial obscurer can cause transitions between Seyfert 1 and 2 without affecting the optical / UV continuum. The LOS obscurer, if present, is transparent at those wavelengths. 2[This would remove BLR emission during times when the black hole remained active, a different form of the changing-look phenomenon.]{} ![image](Fig5.pdf){width="\textwidth"} Discussion and summary ====================== Various types of winds are commonly seen in AGN. They launch from inner regions of the disk, so the geometry shown in Figure \[f1\] might be typical, but usually in the transparent state (Case 1). A nearly fully ionized wind does not have a dramatic effect on the SED or lines. The observed holiday corresponds to a temporary change in the density of the wind. We suggests that 2[wind shielding]{} is usually happening, but for most of the time we just do not notice it, because the wind is transparent. Such shadowing can be the missing ingredient in many AGN models. Our model requires that the normal state of the equatorial obscurer is one where the ionization front is near the outer radius of the 1[wind]{}. The ionization-front location depends on 1[the wind’s]{} parameters. This variation greatly affects the transmitted SED, as the wind density changes. The original [@Kaastra14] model of the LOS obscurer ($\log U\approx-2.8$ or $\log \xi=-1.2$ erg cm s$^{-1}$ ) has an H ionization-front and strong absorption at the Lyman limit [@Arav15]. Later [@Cappi16] proposed $\log U\approx-1$ ($\log \xi=0.5-0.8$ erg cm s$^{-1}$ ) for the LOS obscurer, and our tests show that this obscurer transmits the Lyman continuum, corresponding to the blue line2[, Case 2,]{} in Figure 3. This shows it is likely that the physical state of the equatorial obscurer is such that the H, He ionization fronts are near the outer edge of the 1[wind]{} so that small changes in the model affect its location. This is why small changes in the obscurer’s density (Figure \[f4\]) can produce significant changes in the SED and result in the holiday. This model appears fine-tuned since it is sensitive to the location of the ionization front. But this geometry has a physical motivation from dynamical stability arguments. [@Math77] point out that radiatively driven clouds become Rayleigh-Taylor unstable near ionization fronts so that the cloud tends to truncate at that point. This happens because 1[the Lyman continuum]{} radiative acceleration depends on the ion density, so falls precipitously when the gas recombines. This instability provides a natural explanation for why the obscurer tends to have an ionization front near its outer edge. Although this paper discusses the emission-line holiday, a simultaneous holiday happened for higher-ionization narrow absorption lines [@Kriss19 D19]. D19 show that changes in the CF of the LOS obscurer could be responsible for the absorption-line holiday. This obscurer is part of the same wind that produces the equatorial obscurer. 2[The density of the equatorial obscurer, the base of the wind, might change because of instabilities in the flow]{}. This produces the emission-line holiday, as shown in Figure \[f4\]. At the same time, it seems likely that injecting more mass from the base of the wind into our LOS causes the wind to produce a substantial flow and larger 1[wind]{}. This produces a larger CF for the LOS obscurer, producing the absorption-line holiday. So, a denser equatorial obscurer results in a more extensive LOS obscurer. In other words, the emission and absorption-line holidays are unified by the structure of the wind. This is the first physical model of the holidays observed in NGC 5548, and the relationship between them. As Figures \[f3\] shows, the SED transmitted through Case 2 is stronger than Case 1 for 1[energies $\lesssim$ 1 eV. In Case 3, the SED is stronger than Case 1 for energies $\lesssim$ 5 eV. The emission is mainly due to hydrogen radiative recombination in the optical and NIR and 2[Bremsstrahlung]{} in the IR.]{} These show that a dense equatorial obscurer can be a source of 2[continuum]{}, even in Case 2. Such emission could explain 2[the significant thermal diffuse continuum component spanning the entire UV–optical–near IR continuum”]{} discussed in [@Goad19] and may be the source of the non-disk optical continuum emission discussed by [@Ferland90], [@Shi95], and [@Chel19]. The BLR itself is also a source of non-disk continuum emission [@Korista01]. To summarize, we have demonstrated, for the first time, a physical model by which several different phenomena are unified by the presence of the disk wind: an absorption-line holiday, an emission-line holiday, non-disk emission from the inner regions, and a contributor to the changing-look phenomenon. This shows the importance of 2[“wind shielding”]{} , in which a wind partially blocks the continuum ionizing other clouds. Large CF required by previous models (e.g @Korista00 [@Kaspi99; @Goad93]) supports the idea the 2[“wind shielding”]{} is likely. It may be the missing ingredient in understanding many AGN phenomena. 1[We came to a model in which an intervening obscurer filters the continuum striking emission and absorption line cloud after consideration of how they respond to changes during the STORM campaign. Many papers have considered cloud shadowing as an appropriate explanation for very different observations. [@Mur95]’s study of accretion disk winds from AGN found that a dense gas could block the soft X-ray and transmit UV photons. Shielding permits wind acceleration to high velocities. This wind produces smooth line profiles and has a covering fraction of $10\%$. [@Lei04], suggested a wind model in which the continuum filtered through the wind would better fit her models of BLR emission. Finally, [@Shem15] reproduced the Baldwin effect by use of such filtering. As the STORM campaign demonstrated, and these previous investigation suggested, cloud shadowing is a key ingredient in the physics of inner regions of AGN and must be considered in future studies.]{} 2[We thanks the anonymous reviewer for their very careful comments on our paper. ]{}Support for [*HST*]{} program number GO-13330 was provided by NASA through a grant from the Space Telescope Science Institute, which is operated by the Association of Universities for Research in Astronomy, Inc., under NASA contract NAS5-26555.We thank NSF (1816537), NASA (ATP 17-0141), and STScI (HST-AR.13914, HST-AR-15018) for their support and Huffaker scholarship for funding the trip to Atlanta to attend the annual AGN STORM meeting, 2017. MC acknowledges support from NASA through STScI grant HST-AR-14556.001-A and STScI grant HST-AR-14286, 1[and also support from National Science Foundation through grant AST-1910687]{}. M.D. and G.F. and F. G.  acknowledge support from the NSF (AST-1816537), NASA (ATP 17-0141), and STScI (HST-AR-13914, HST-AR-15018), and the Huffaker Scholarship. B.M.P. and G.D.R. are grateful for the support of the National Science Foundation through grant AST-1008882 to The Ohio State University. M.M. is supported by the Netherlands Organization for Scientific Research (NWO) through the Innovational Research Incentives Scheme Vidi grant 639.042.525. Arav, N., Chamberlain, C., Kriss, G. A., et al. 2015, A&A 577, 37 Cappi, M., De Marco, B., Ponti, G., et al. 2016, A&A 592, A27 Chelouche, D., Pozo Nuñez, F., Kaspi, Sh. 2019, NatAs,3,251–257 Dehghanian, M., Ferland, G.J., Kriss, G.A., Peterson, B.M., et al. 2019, ApJ...877..119D De Rosa, G., Peterson, B. M., Ely, J., et al. 2015, ApJ, 806:128 Edelson, R., Gelbord, J. M., Horne, K., et al. 2015, ApJ, 806, 129 Fausnaugh, M. M., Denney, K. D., Barth, A. J., et al. 2016, ApJ, 821, 56 Ferland, G. J., Peterson, B. M., Horne, K, et al. 1992,ApJ,387, 95 Ferland, G. J., Chatzikos, M., Guzmán, F., et al. 2017, RMxAA, 53,385 Ferland, G. J., Korista, K. T., Peterson, B. M. 1990,ApJ,363L, 21F Goad, M. and Koratkar, A. 1998, ApJ, 495, 718G Goad, M., Korista, K. T., De Rosa, G., et al. 2016, ApJ, 824, 11 Goad, M. R. ,Knigge, C.,Korista,K. T.,Cackett, E., et al. 2019, MNRAS, 10, 1093 Goad, M., O’Brien, P. T., Gondhalekar,P.M.1993,MNRAS.263..149G Kaastra, J., S., Kriss, G. A., Cappi, M., et al. 2014, Science, 345, 64 Kaspi, Sh. Netzer, H. 1999, ApJ...524...71 Kriss, G.A., De Rosa, G., Ely, J., et al. 2019, ApJ in press. Korista,K. T. & Goad, M. R. 2000, ApJ, 536, 284 Korista,K. T. & Goad, M. R. 2001, ApJ, 553, 695 1[ Leighly, K. M. 2004, ApJ, 611, 125]{} Mathews, W. G. & Blumenthal, G. R.1977, ApJ, 214: 10 Mathur, S., Gupta, A., Page, K., et al. 2017, ApJ, 846:55 Mehdipour, M., Kaastra, J., S., Kriss, G. A., et al. 2015, A&A, 575, 22 Mehdipour, M., Kaastra, J., S., Kriss, G. A., et al. 2016, A&A, 588, 139 1[ Murray, N., Chiang, J., Grossman, S. A., Voit, G, M. 1995, ApJ, 451, 498]{} Osterbrock D. E., & Ferland G. J., 2006, [*Astrophysics of Gaseous Nebulae and Active Galactic Nuclei*]{}, 2nd ed., Univ. Science Books, CA, Herndon, VA Pei, L., Fausnaugh, M. M., Barth, A. J., et al. 2017, ApJ, 837: 131 1[ Shemmer, O., Lieber, S. 2015, ApJ, 805, 124]{} Shields, J. C., Ferland, G. J., Peterson, B. M. 1995, ApJ, 441, 507 Starkey, D., Horne, K., Fausnaugh, M. M., et al. 2017, ApJ, 835: 65 Sun, M., Xue, Y., Cai, Z.& Guo, H. 2018, ApJ, 857:86 [^1]: Locally optimally emitting clouds [^2]: We refer to the region 6 – 13.6 eV (912Å to 2000Å) as FUV; 13.6 – 54.4 eV (228Å to 912Å) as EUV; and 54.4 eV to few hundred eV (less than 228Å) as XUV.
/* * Copyright (c) 2019 Nordic Semiconductor ASA * * SPDX-License-Identifier: LicenseRef-BSD-5-Clause-Nordic */ /**@file * * @brief LED control for the User Interface module. The module uses PWM to * control RGB colors and light intensity. */ #ifndef UI_LEDS_H__ #define UI_LEDS_H__ #include <zephyr.h> #include "ui.h" #ifdef __cplusplus extern "C" { #endif /**@brief Initializes LEDs in the user interface module. */ int ui_leds_init(void); /**@brief Starts the PWM and handling of LED effects. */ void ui_leds_start(void); /**@brief Stops the LED effects. */ void ui_leds_stop(void); /**@brief Sets LED effect based in UI LED state. */ void ui_led_set_effect(enum ui_led_pattern state); /**@brief Sets RGB and light intensity values, in 0 - 255 ranges. */ int ui_led_set_rgb(uint8_t red, uint8_t green, uint8_t blue); #ifdef __cplusplus } #endif #endif /* UI_LEDS_H__ */
# Copyright 2019 gRPC authors. # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. FROM php:5.6-zts-stretch RUN apt-get -qq update && apt-get -qq install -y \ autoconf automake git libtool pkg-config \ valgrind wget zlib1g-dev ARG MAKEFLAGS=-j8 WORKDIR /tmp RUN wget https://phar.phpunit.de/phpunit-5.7.27.phar && \ mv phpunit-5.7.27.phar /usr/local/bin/phpunit && \ chmod +x /usr/local/bin/phpunit WORKDIR /github/grpc COPY . . RUN pear package && \ find . -name grpc-*.tgz | xargs -I{} pecl install {} CMD ["/github/grpc/src/php/bin/run_tests.sh", "--skip-persistent-channel-tests"]
An attack by the Islamic State group involving a car bomb, a gunfight and a hostage-taking left at least 12 people dead in Baghdad today, security and medical sources said. The exact sequence of the attack in the Baghdad al-Jadida area of the Iraqi capital was not immediately clear but security officials and an AFP reporter described scenes of chaos. The attack, which IS claimed in a statement posted online, was a departure from the jihadist organisation's usual modus operandi of suicide car bombings. According to an official from the interior ministry, gunmen blew up at least one car bomb before spraying gunfire in the street and storming a mall called Zahrat Baghdad. "At least one of the attackers had a suicide vest and blew himself up inside the mall," the official said. Several people were held hostage inside the mall and three of them were killed as security forces attempted to neutralise the attackers, a police colonel said. "When the security forces got too close, they killed three hostages," he said. "The attackers at one stage released at least nine hostages, women and children," he also said. The police officer said at least two members of the security forces were killed during the attack and nine wounded, including three officers. A hospital official confirmed the death toll and said at least three attackers either killed themselves or were killed by the security forces. Security forces at one stage in the attack reported that gunmen had full control of the mall and it was not clear how the standoff ended. The area around the mall, located in a busy commercial area of Baghdad al-Jadida, a populous Shiite-majority area on the eastern edge of the Iraqi capital, suffered extensive damage. Police said a counter-terrorism force from the intelligence services was deployed to the scene of the attack. "The security forces are now fully in control, the gunmen have been killed and the hostages have been freed," the police officer said. Helicopters flew overhead as security forces searched the scene and the roads gradually reopened. The IS statement said the attack was carried out by "four soldiers of the caliphate" and targeted Shiites. It said one of the IS members blew himself up in an explosives-laden vehicle when "the apostates sent reinforcements". IS claimed that a total of 90 people were killed or wounded but the group has exaggerated the number of casualties caused by its attacks in previous such statements. IS has suffered a number of military setbacks across Iraq in the past year. Security officials say fierce battles and relentless air strikes have depleted its manpower.
117 Wn.2d 619 (1991) 818 P.2d 1056 VIRGIL T. HOWELL, ET AL, Appellants, v. SPOKANE & INLAND EMPIRE BLOOD BANK, ET AL, Respondents. No. 56642-9. The Supreme Court of Washington, En Banc. October 31, 1991. John P. Lynch, for appellants Howell. Randall & Danskin, P.S., by Michael J. Myers and Keith D. Brown, for respondent Spokane & Inland Empire Blood Bank. Paine, Hamblen, Coffin, Brooke & Miller, by John C. Riseborough, for respondents John and Jane Doe X. *621 Bryan P. Harnetiaux and Robert H. Whaley on behalf of Washington State Trial Lawyers Association, amicus curiae for appellants. Heather Houston and Sam Pailca on behalf of Washington Defense Trial Lawyers Association; Kenneth A. Letzler, Karen S. Wagner, Karen Shoos Lipton, Steven Labensky, and David M. Jacobi on behalf of the American National Red Cross, American Association of Blood Banks, and Council of Community Blood Banks; Robert J. Rohan on behalf of The Northwest AIDS Foundation; Stephen K. Causseaux, Jr., on behalf of Tacoma-Pierce County Health Department; Andrew K. Dolan on behalf of the Washington State Medical Association, amici curiae for the blood banks. DORE, C.J. Blood recipient Virgil Howell (Howell)[1] appeals the trial court's summary judgment order dismissing his claims against a donor (John Doe X) of allegedly HIV-positive blood transfused into him. Howell also appeals a discovery order providing that the donor's identifying information be kept confidential until greater need could be demonstrated and one providing that Howell be allowed to take only an anonymous, videotaped deposition of John Doe X rather than a face-to-face deposition. We affirm. FACTS The facts relevant to this appeal are as follows. On October 1, 1984, before blood screening tests for AIDS were available, John Doe X made a voluntary blood donation at respondent Spokane and Inland Empire Blood Bank (SIEBB). At that time, SIEBB was routinely asking donors to self-screen and to refrain from donating blood if they were members of any high-risk group, which groups SIEBB identified to donors. *622 On October 8, 1984, appellant Virgil Howell received two units of blood at Deaconess Medical Center. The blood was provided to Deaconess by SIEBB. One of the units had been provided to SIEBB by John Doe X. Two years later, in August of 1986, John Doe X again donated blood. At that time, blood screening tests were available to detect antibodies to the HIV virus, which is known to cause AIDS. John Doe X's donation was tested and found to contain such antibodies, and SIEBB notified John Doe X of the test results. Both John Doe X and Howell presently test seropositive.[2] On December 4, 1987, Howell sued SIEBB, John Doe X, and others on a number of theories. On August 5, 1988, before John Doe X appeared in the action, the trial judge ruled orally that SIEBB must disclose John Doe X's identity. John Doe X then appeared and moved for reconsideration of the order. The trial judge reversed and ruled that discovery could proceed through interrogatories, requests for production of documents, and depositions upon written questions, but the identity of John Doe X would remain confidential. If the initial round of discovery indicated a need for disclosure of John Doe X's name, a motion for disclosure could be brought at that time. If disclosure of John Doe X's identity was indicated, it would be provided to only one of Howell's counsel and to no one else absent *623 court order. None of John Doe X's relatives or acquaintances could be contacted without court order. Finally, John Doe X's identity would not be placed in the record of the court until after a final judgment was obtained. Following the entry of this order, Howell was provided 10 years' worth of John Doe X's and his wife's medical records and their dental records. Howell has deposed John Doe X's wife, his treating physician, and a physician who has counseled John Doe X. John Doe X has also answered 19 interrogatories propounded to him by Howell and 80 by SIEBB. Although John Doe X desired to have his deposition taken by written question, Howell was allowed to conduct a videotaped deposition with John Doe X's face obscured so Howell and his counsel could observe John Doe X's body language. This deposition lasted 5 hours. John Doe X testified that he is not a member of a high-risk group, and that his alleged exposure to the AIDS virus must have happened during a separation from his wife in 1982, during which period he had vaginal sex with one woman three times. John Doe X's physician testified that the likelihood of a casual heterosexual contact resulting in the transmission of AIDS is remote. John Doe X also testified that before he made the 1984 blood donation, he read a handout given him by SIEBB entitled "An Important Message to All Blood Donors". This handout identified high-risk groups and asked members of those groups to refrain from donating blood. A copy of John Doe X's donor card, which lists, among other things, his weight, blood pressure, and pulse was produced by SIEBB. However, the medical questionnaire that is routinely given to donors was not produced because SIEBB claimed it was unavailable. On October 12, 1989, the trial judge granted summary judgment of dismissal of Howell's claims against John Doe X for negligence, res ipsa loquitur, negligent infliction of emotional distress, outrage, assault, and loss of consortium. Howell appeals the entry of this summary judgment, *624 the order preventing John Doe X's face-to-face deposition, and the discovery order preventing disclosure of John Doe X's identity. ANALYSIS I [1] We begin our analysis by noting that Howell's brief suffers from the same flaw that plagued him on his earlier appeal: although he makes numerous assignments of error, not all are supported by legal argument and authority. If a party fails to support assignments of error with legal arguments, they will not be considered on appeal. Schmidt v. Cornerstone Invs., Inc., 115 Wn.2d 148, 795 P.2d 1143 (1990); Howell v. Spokane & Inland Empire Blood Bank, 114 Wn.2d 42, 46, 785 P.2d 815 (1990 (Howell I). Howell assigns error to the trial court's grant of summary judgment dismissing Howell's claims of negligence, res ipsa loquitur, negligent infliction of emotional distress, outrage, assault, and loss of consortium. However, he discusses only the negligence claim, and that only in his reply brief. Thus, we will not address these other claims on this appeal, and the summary judgment is affirmed to the extent it dismisses claims other than negligence. II [2] On a summary judgment motion, the moving party bears the initial burden of showing the absence of an issue of material fact. Young v. Key Pharmaceuticals, Inc., 112 Wn.2d 216, 225, 770 P.2d 182 (1989) (citing LaPlante v. State, 85 Wn.2d 154, 158, 531 P.2d 299 (1975)). A moving defendant may meet this burden by showing that there is an absence of evidence to support the nonmoving party's case. 112 Wn.2d at 225 (citing Celotex Corp. v. Catrett, 477 U.S. 317, 325, 91 L.Ed.2d 265, 106 S.Ct. 2548 (1986)). John Doe X provides a detailed discussion of each cause of action raised by Howell and the lack of evidence to support it. However, because we have disposed of Howell's other causes of action, we will focus only on his claim of negligence. *625 John Doe X has met his initial burden with respect to Howell's negligence claim. [3] After this showing is made, the burden shifts to the party with the burden of proof at trial, the plaintiff. The plaintiff must come forward with evidence sufficient to establish the existence of each essential element of its case. If this showing is not made: [T]here can be `no genuine issue as to any material fact,' since a complete failure of proof concerning an essential element of the nonmoving party's case necessarily renders all other facts immaterial. 112 Wn.2d at 225 (quoting Celotex, 477 U.S. at 322-23). In that case, a summary judgment is properly granted. [4] Thus, after John Doe X made his initial showing, Howell's burden was to come forward with evidence to establish the existence of each essential element of his negligence claim. One element Howell must establish is John Doe X's breach of a duty to refrain from donating blood in 1984. See Davis v. Globe Mach. Mfg. Co., 102 Wn.2d 68, 73, 684 P.2d 692 (1984). However, such a duty arose, if at all, only if John Doe X knew or should have known of his seropositivity at the time of the donation. See, e.g., Berner v. Caldwell, 543 So.2d 686, 689-90 (Ala. 1989); see generally Comment, AIDS — Liability for Negligent Sexual Transmission, 18 Cum. L. Rev. 691 (1987-1988). Howell has presented absolutely no evidence that John Doe X knew or should have known of his seropositivity when he donated blood in 1984. The only evidence offered on this issue is from John Doe X himself. He supported his summary judgment motion with his own and his counsel's affidavits, deposition testimony of Dr. Collins and Dr. Lehman, and by his responses to interrogatories promulgated by SIEBB and Howell. The gist of this evidence was that John Doe X was not a member of a high-risk group at the time of the donation and truthfully answered the questions asked him by the blood bank staff, he has never shown any *626 signs or symptoms of AIDS, and he did not know of his seropositivity at the time of the donation. This evidence went completely uncontradicted by Howell and, in fact, Howell's counsel conceded at oral argument Howell's inability to prove John Doe X's knowledge of his seropositivity at the time of the blood donation. Because of Howell's failure to come forward with evidence on an essential element of his case, we would normally decide at this point that the summary judgment was properly granted by the trial court. However, Howell nevertheless claims that summary judgment was improperly granted because: (1) he raised an issue as to John Doe X's credibility; and (2) the facts about John Doe X's knowledge or lack thereof were completely within John Doe X's control and he had no access to them. With respect to this second claim, Howell apparently argues he could have presented evidence to withstand the motion had he been given access to John Doe X's name. We will address these arguments. III Howell contends the summary judgment was improperly granted because he raised an issue of fact regarding John Doe X's credibility. Howell points to the fact that John Doe X had sex with a woman while separated from his wife, he did not immediately disclose his seropositive test results and a herpes zoster (shingles) diagnosis to his wife, and he never informed his dentist of the HIV-test results. [5] This argument is not convincing. It is true that a court should not resolve a genuine issue of credibility at a summary judgment hearing. Amend v. Bell, 89 Wn.2d 124, 129, 570 P.2d 138, 95 A.L.R.3d 225 (1977). An issue of credibility is present only if the party opposing the summary judgment motion comes forward with evidence which contradicts or impeaches the movant's evidence on a material issue. Dunlap v. Wayne, 105 Wn.2d 529, 536-37, 716 P.2d 842 (1986). A party may not preclude summary *627 judgment by merely raising argument and inference on collateral matters: [T]he party opposing summary judgment must be able to point to some facts which may or will entitle him to judgment, or refute the proof of the moving party in some material portion, and that the opposing party may not merely recite the incantation, "Credibility," and have a trial on the hope that a jury may disbelieve factually uncontested proof. Amend, 89 Wn.2d at 129 (plaintiff did not raise an issue of credibility about defendant's testimony regarding the scope of his employment by arguing that there were weaknesses in his testimony concerning speed and intoxication) (quoting Rinieri v. Scanlon, 254 F. Supp. 469, 474 (S.D.N.Y. 1966)). Howell's attempts to portray John Doe X as generally untrustworthy do not raise an issue of credibility as to a material fact. John Doe X has offered evidence that he did not have reason to believe he should not be donating blood in 1984. Howell has presented no facts inconsistent with this evidence. See Dunlap, 105 Wn.2d at 536-37 (suggested inference does not qualify as evidence). When or if John Doe X told, his wife or dentist of his seropositive test results is irrelevant. This argument is without merit. IV Howell argues alternatively that summary judgment was improperly granted because the facts regarding John Doe X's state of mind at the time he donated blood are uniquely within John Doe X's control. [6] A party appealing a summary judgment because he has allegedly not been permitted to conduct adequate discovery must indicate what relevant evidence he expects the additional discovery would provide. In other words, he must prove that he has been prejudiced by the summary judgment order. See Parish v. Howard, 459 F.2d 616, 619-20 (8th Cir.1972); see also Illinois State Employees Union, Coun. 34 v. Lewis, 473 F.2d 561, 565 n. 8 (7th Cir. *628 1972) (citing Washington v. Cameron, 411 F.2d 705, 711 (D.C. Cir.1969) (although party opposing summary judgment motion must be permitted ample discovery, it is incumbent on such party to demonstrate that inquiry is directed toward establishing material facts and that, upon receipt of such facts, he will be armed to defend against motion)), cert. denied, 410 U.S. 928 (1973). Howell has failed to demonstrate that he was in any way prejudiced in his discovery by not knowing John Doe X's true identity. At the time he sought disclosure of John Doe X's identity, Howell had already been permitted to conduct extensive discovery. By the time the summary judgment motion was set for hearing, Howell had obtained over 10 years' worth of John Doe X's and his wife's medical records and their dental records. He had deposed John Doe X for over 5 hours, and he had also deposed John Doe X's wife, his treating physician, Dr. Collins, and Dr. Lehman, who had counseled John Doe X. John Doe X had answered 19 interrogatories propounded by Howell and 80 interrogatories propounded by SIEBB. Even with this extensive discovery, however, Howell was unable to uncover a scintilla of evidence indicating that John Doe X donated blood at a time when he should have known not to. He still has not indicated what relevant evidence he expects to discover if allowed access to John Doe X's name and, thus, has not established that he has been prejudiced by the trial court's order. In sum, Howell's argument that summary judgment was improperly granted because he was denied the opportunity to conduct full discovery is without merit. Donor John Doe X has a significant interest in avoiding intrusion into his private life. Because the HIV virus is known to be transmitted through sexual contact, intravenous drug use, and blood transfusions, Howell would undoubtedly wish to ask highly personal questions of John Doe X's relatives, friends, co-workers, and others. *629 In addition, persons associated with AIDS are known to suffer discrimination in employment, education, housing, and even medical treatment. See Rasmussen v. South Fla. Blood Serv., Inc., 500 So.2d 533, 537, 56 A.L.R.4th 739 (Fla. 1987). Blood recipient Howell has a legitimate interest in being compensated for his injuries. Howell is an asymptomatic carrier of the virus, who may never develop the disease. However, he must continue to live with the knowledge that he may someday develop AIDS and suffer a terrible death from the disease. [7] Under CR 26(c), a judge is given broad discretion in fashioning discovery orders in order to protect a person's privacy. The trial judge did so here by allowing limited disclosure of the donor's name subject to a strict confidentiality order. The confidentiality order will expire only if the judge determines, after further discovery, that the recipient has made a prima facie case of the donor's negligence. At this point, discovery is just beginning. [8] At this point in the proceedings, Howell is not entitled to discover John Doe X's identity. As already discussed, Howell has failed to demonstrate that he was in any way prejudiced by the trial court order denying him access to donor John Doe X's true identity. The trial court has permitted Howell to undertake extensive discovery and Howell still has not come forward with any evidence of John Doe X's negligence. Moreover, the discovery order of the trial court is reviewable only for an abuse of discretion, see State v. Lewis, 115 Wn.2d 294, 797 P.2d 1191 (1990) (no abuse of discretion unless no reasonable person would have decided the way the judge did). The trial court in the instant case foresaw a "fishing expedition" and protected the donor by requiring a greater showing of entitlement before allowing discovery of the donor's name. When Howell was unable to make this showing, his case was dismissed. We cannot say the *630 discovery order or the summary judgment was improperly granted. The trial court did not abuse its discretion in refusing Howell's discovery request. V The final argument Howell makes is that the trial court erred by ordering the videotaped deposition of John Doe X with his face obscured, instead of the face-to-face deposition requested by Howell. This argument is also without merit. As we have already noted, the trial court has broad discretion to fashion discovery orders, and these orders are reviewable only for an abuse of discretion. See CR 26(c); Progressive Animal Welfare Soc'y v. UW, 114 Wn.2d 677, 688-89, 790 P.2d 604 (1990). The order of the trial court accommodated both Howell's stated interest in observing John Doe X's "body language" and John Doe X's privacy interest. Moreover, there is no evidence that John Doe X's testimony would have revealed anything more had he not been blindfolded. This order was within the trial court's discretion. CONCLUSION We affirm. Howell's attempt to raise an issue as to John Doe X's credibility is without merit. He has not indicated what evidence he believes he could uncover if permitted disclosure of John Doe X's identity. In light of the extensive discovery Howell has already performed, it was incumbent upon him to demonstrate that disclosure of John Doe X's identity would enable him to defend against the summary judgment motion. This he did not do. The summary judgment and discovery orders are affirmed. UTTER, BRACHTENBACH, DOLLIVER, DURHAM, and SMITH, JJ., and CALLOW, J. Pro Tem., concur. ANDERSEN, J., concurs in the result. Reconsideration denied February 28, 1992. NOTES [1] "Howell" will be used to refer to both Virgil Howell and his wife, who has joined in this action. [2] There are three gradations of HIV infection. The first is seropositivity, which means one has tested positive for the presence of antibodies to the virus but is asymptomatic. Seropositive carriers appear totally healthy but are capable of transmitting the virus and are vulnerable to developing AIDS. The second is AIDS-related complex (ARC), which is a lesser form of AIDS; it is infectious but not life threatening. The final gradation is AIDS, which to this date is always fatal. Comment, Blood Donation: A Gift of Life or a Death Sentence?, 22 Akron L. Rev. 623, 626-27 (1989). For every person with AIDS, there are probably 60 to 70 seropositive healthy carriers. 22 Akron L. Rev. at 623, 626 (citing Comment, The Constitutional Implications of Mandatory Testing for Acquired Immunodeficiency Syndrome — AIDS, 37 Emory L.J. 217 (1988)). Of these healthy carriers, researchers estimate that 5 to 30 percent will develop AIDS over the next 5 to 7 years. 22 Akron L. Rev. at 623, 626 (citing Note, AIDS: Legal Issues in Search of a Cure, 14 Wm. Mitchell L. Rev. 575, 586-87 (1988)).
Zhang Jiaqi Zhang Jiaqi (; ; born 9 December 1991) is a Chinese footballer who currently plays for China League One side Qingdao Huanghai on loan from Guangzhou Evergrande. Club career Zhang Jiaqi started his football career playing for Le Mans' youth academy. He played for their reserve team before being promoted to the first team in 2012. Zhang made his debut for the club on 8 February 2013 in a 1-1 draw against Clermont Foot. After starting three consecutive games, Zhang scored his first goal on 22 February 2013 in a 3-2 win against Niort which turned out to be the match winner. Zhang became a mainstay in the team's starting eleven for the rest of the season; however, Le Mans was relegated to the third tier on the last day of the 2012-13 season. In November 2013, Swiss Super League side FC Sion announced Zhang had signed a contract with the club after Le Mans lost its professional status; however, Zhang could not register for the club because they had already reached the maximum 25 players allowed in the squad. On 27 February 2014, Zhang was signed by top tier side Dalian Aerbin on a free transfer. He made his debut for the club on 30 April 2014 in a 1-1 draw against Guizhou Renhe. On 24 December 2014, Zhang transferred to fellow Chinese Super League side Guangzhou Evergrande after Dalian was relegated at the end of the 2014 season. He was used as a rotation player at the beginning of 2015 season; however, he didn't appear for Guangzhou after Luiz Felipe Scolari became the manager of the club in June 2015. Zhang was downgraded to the reserve squad in the 2016 season. On 15 July 2016, he was loaned to China League One side Qingdao Huanghai for the rest of the 2016 season. He made his debut for the club on 16 July 2016 in a 1-1 draw against Meizhou Hakka. On 23 January 2017, Zhang was loaned to second tier side Shenzhen FC for the 2017 season. In February 2018, he was loaned to Guangzhou Evergrande's city rivals Guangzhou R&F for the 2018 season. Failing to establish himself within the team, Zhang appeared just one league match and two FA Cup matches for Guangzhou R&F. Zhang was loaned to Qingdao Huanghai for the second time for one season in February 2019. International career Zhang made his debut for the Chinese national team on 18 June 2014 in a 2-0 win against Macedonia. Career statistics Club statistics 1Other tournaments include Chinese FA Super Cup and FIFA Club World Cup. International statistics Honours Club Guangzhou Evergrande Chinese Super League: 2015 AFC Champions League: 2015 References External links Category:Living people Category:1991 births Category:Footballers from Shenyang Category:Chinese footballers Category:Association football midfielders Category:Le Mans FC players Category:FC Sion players Category:Dalian Yifang F.C. players Category:Guangzhou Evergrande Taobao F.C. players Category:Qingdao Huanghai F.C. players Category:Shenzhen F.C. players Category:Guangzhou R&F F.C. players Category:Ligue 2 players Category:Swiss Super League players Category:Chinese Super League players Category:China League One players Category:Expatriate footballers in France Category:Expatriate footballers in Switzerland Category:Chinese expatriate footballers Category:Chinese expatriate sportspeople in France Category:China international footballers
Northern Pulp has been ordered to address air pollution levels at its Pictou County mill and has been issued a fine of $697.50, an amount the premier himself is uncertain can act as enough of a deterrent. The province announced the fine and the ministerial order of Environment Minister Iain Rankin on Tuesday. Emissions from the mill's power boiler have repeatedly exceeded regulations. "It's the appropriate fine based on their history and their compliance at the mill," said Rankin. Rankin said three tests in the last 10 at the mill found it was not compliant. The mill has been warned before, he said, but now it is time to "step it up to that next level." Comply or permit could be revoked This is the third year the mill, located Pictou County, exceeded emissions limits set by the province. The mill's industrial approval requires it to operate within a measure of 150 milligrams per referenced cubic metre of particulate matter when stacks are tested. The test from June 2017 showed the power boiler at 224 milligrams per referenced cubit metre. Nova Scotia Environment Minister Iain Rankin said Northern Pulp's permit could be revoked if it continued to fail emission tests. (CBC) Premier Stephen McNeil said Tuesday he has asked Rankin and his department to look at the small size of the summary offence fine that can be issued, which he said took him off guard. "I think it's a valid question: are they appropriate? But let's go do it evidence-based and not decide on whether or not how you're feeling today," McNeil said. The province had imposed, but then retracted, a $697.50 fine on Northern Pulp last year for violating air pollution limits. If the company doesn't comply with the ministerial order, Rankin said he could revoke the permit at Northern Pulp. "If they don't come into compliance with the order then of course it's a possibility," said Rankin. A court could levy more In 2015, the mill, which is owned by Paper Excellence, spent $35 million on a new precipitator that captures particulate from its recovery boiler using static electricity. When asked by reporters what would prevent the company from continuing to pay $700 fines rather than address the power boiler problems, Rankin said the intent of the order is to get the mill back into compliance. "If you want to go to the next level, it's long-form prosecution. Then you're talking about the courts and the judicial system, which is separate from the legislative body," he said. "If we want go to that path, it may go down that into the future and then it's up to the court if they levy a higher fine." What Northern Pulp must do The order involves the company publicly posting the results of its emissions tests on its website until its industrial approval expires in 2020. Northern Pulp must also give the Environment Department its external consultant reports and training records related to the power boiler. As the mill prepares to shut down temporarily this month, the order requires the company to give the department reports on what's planned with the shutdown, when the shutdown is over and what the company did to bring the power boiler into compliance.
.. ************************************************** * * * Automatically generated file, do not edit! * * * ************************************************** .. _amdgpu_synid10_src32_4: src =========================== Instruction input. *Size:* 1 dword. *Operands:* :ref:`v<amdgpu_synid_v>`, :ref:`s<amdgpu_synid_s>`, :ref:`vcc<amdgpu_synid_vcc>`, :ref:`ttmp<amdgpu_synid_ttmp>`, :ref:`m0<amdgpu_synid_m0>`, :ref:`exec<amdgpu_synid_exec>`, :ref:`vccz<amdgpu_synid_vccz>`, :ref:`execz<amdgpu_synid_execz>`, :ref:`scc<amdgpu_synid_scc>`, :ref:`constant<amdgpu_synid_constant>`, :ref:`literal<amdgpu_synid_literal>`
249 S.E.2d 879 (1978) 39 N.C. App. 179 STATE of North Carolina v. Richard M. JOHNSTON, Jr. and Harry Lee Bowman. No. 7817SC582. Court of Appeals of North Carolina. December 19, 1978. *880 Atty. Gen. Rufus L. Edmisten by Asst. Attys. Gen. Roy A. Giles, Jr. and Nonnie F. Midgette, Raleigh, for the State. Robert S. Cahoon, Greensboro, for defendant-appellant, Richard M. Johnston, Jr. C. Orville Light, Eden, for defendant-appellant, Harry Lee Bowman. CLARK, Judge. Defendants assign error in the denial of their motions to quash the indictments, contending that the three indictments were fatally defective because they do not allege that the theft of the property was a felony in the State of Virginia. We treat these assignments of error together. All indictments allege the essential elements of the crimes charged. An indictment is sufficient if it charges the offense in a plain, intelligible, and explicit manner and contains averments sufficient to enable the court to proceed to judgment, and to bar a subsequent prosecution for the same offense. 7 Strong's N.C. Index 3d, Indictment and Warrant, § 9. It is not necessary that an indictment for conspiracy describe the subject crime with legal and technical accuracy. State v. Terrell, 256 N.C. 232, 123 S.E.2d 469 (1962); State v. Blanton, 227 N.C. 517, 42 S.E.2d 663 (1947). And in the case sub judice it was not necessary that the conspiracy indictments aver that larceny of the described property and stated value was a felony in Virginia. The law of North Carolina, not the law of Virginia, determines *881 whether the charged conspiracy was a felony. The charge was brought in this State, and the evidence for the State tends to show that the conspiracy to steal was entered into by the defendants in this State. Thus, the crime in its entirety was committed in this State, where the larceny of goods in excess of $200.00 is a felony (G.S. 14-70, G.S. 14-72), and a conspiracy to commit a felony is a felony. 3 Strong's N.C. Index 3d, Conspiracy, § 3.2. Under these circumstances it is immaterial that the larceny offense was actually committed in Virginia. It was not required that the indictment for receiving stolen goods allege that the larceny constituted a felony in Virginia. It alleged that the crime was committed in Rockingham County, and the evidence for the State tended to so show. Thus, the law of this State controls on the question of whether the crime in question was a felony or a misdemeanor. In this State the larceny of property having a value in excess of $200.00 is a felony, and the offense of receiving stolen goods having a value in excess of $200.00 is a felony. G.S. 14-71, G.S. 14-72. We conclude that the three indictments are proper in form, sufficiently meet legal requirements, and the trial court did not err in denying the motions to quash. If, arguendo, it was relevant to determine whether the larceny was a felony in Virginia, this was a question of law for the trial court, which could take judicial notice of the laws of other states. G.S. 8-4. The Code of Virginia, Title 18.2-95(2) provides that the larceny of goods or chattels of the value of $100 or more constitutes the felony of grand larceny. The alleged value of the property described in all three indictments was substantially above the felony value prescribed by the statutes of Virginia and North Carolina. All the evidence tended to show the value of the property to be as alleged in the indictments. The value of the property was not a contested issue. Under these circumstances the trial court was not required to instruct, or to inform, the jury about the Virginia larceny statute. Next, defendants assign error by the trial court in allowing the State's motion to consolidate the cases for trial and in denying defendant's motion to sever. Defendants argue that the extrajudicial statements of accomplices implicating them were improperly admitted into evidence and they rely on G.S. 15A-927(c)(1), which provides: "(c) Objection to Joinder of Charges against Multiple Defendants for Trial; Severance.— (1) When a defendant objects to joinder of charges against two or more defendants for trial because an out-of-court statement of a codefendant makes reference to him but is not admissible against him, the court must require the prosecutor to select one of the following courses: a. A joint trial at which the statement is not admitted into evidence; or b. A joint trial at which the statement is admitted into evidence only after all references to the moving defendant have been effectively deleted so that the statement will not prejudice him; or c. A separate trial of the objecting defendant." G.S. 15A-927(c)(1) codifies substantially the decision in Bruton v. United States, 391 U.S. 123, 88 S.Ct. 1620, 20 L.Ed.2d 476 (1968), which held that the receipt in evidence of the confession of one codefendant posed a substantial threat to the other codefendant's Sixth Amendment right of confrontation and cross-examination because the privilege against self-incrimination prevents those who are implicated from calling the defendant who made the statement to the stand. In the case sub judice the extrajudicial statements made by the accomplices implicating the defendants were admitted at trial for the purpose of corroborating the testimony of the accomplices. Since the accomplices testified and were subject to cross-examination by defendants, the Bruton rule and G.S. 15A-927(c)(1) do not apply. See State v. Fox, 274 N.C. 277, 163 S.E.2d 492 (1968); State v. Paige, 272 N.C. 417, 158 S.E.2d 522 (1968); State v. Moles, *882 17 N.C.App. 664, 195 S.E.2d 352 (1973). This assignment of error by the defendants is without merit. We have carefully examined the other assignments of error, which relate primarily to admissibility of evidence and the charge of the court, in light of the rule that a new trial will be granted only if the error is prejudicial and not mere technical error which could not have effected the result. G.S. 15A-1443(a); State v. Stanfield, 292 N.C. 357, 233 S.E.2d 574 (1977); State v. Cottingham, 30 N.C.App. 67, 226 S.E.2d 387 (1976). The State's evidence, which included the corroborated testimony of two accomplices, is substantial, if not overwhelming. We find that defendants had a fair trial free from prejudicial error. No error. MITCHELL and WEBB, JJ., concur.
Fernando de Ornelas Fernando Franco de Ornelas (born 29 July 1976 in Caracas), is a retired Venezuelan football player. Club career De Ornelas has played for clubs in several countries in his career, such as Norwegian Odd Grenland and Hong Kong First Division League giant South China. He has had short spells with Crystal Palace, Celtic and Queens Park Rangers, Olympiakos Nicosia, and played for two teams called Marítimo, CS Marítimo of Portugal and Marítimo Caracas. International goals |- | 1. || 20 June 1999 || Misael Delgado, Valencia, Venezuela || || 3–0 || 3–0 || Friendly |- | 2. || 10 August 2000 || Alejandro Morera Soto, Alajuela, Costa Rica || || 1–4 || 1–5 || Friendly |- | 3. || 6 September 2006 || St. Jakob-Park, Basel, Switzerland || || 0–1 || 0–1 || Friendly |- | 4. || 28 March 2007 || José Pachencho Romero, Maracaibo, Venezuela || || 2–0 || 5–0 || Friendly |- | 5. || 28 March 2007 || José Pachencho Romero, Maracaibo, Venezuela || || 3–0 || 5–0 || Friendly |- References External links Category:1976 births Category:Living people Category:Sportspeople from Caracas Category:Venezuelan people of Portuguese descent Category:Venezuelan footballers Category:Venezuela international footballers Category:2007 Copa América players Category:Deportivo Táchira players Category:South China AA players Category:Crystal Palace F.C. players Category:Celtic F.C. players Category:ŠK Slovan Bratislava players Category:Queens Park Rangers F.C. players Category:C.S. Marítimo players Category:1. FC Nürnberg players Category:Olympiakos Nicosia players Category:Odds BK players Category:Monagas S.C. players Category:Zulia F.C. players Category:Mjøndalen IF players Category:Primeira Liga players Category:Hong Kong First Division League players Category:Scottish Premier League players Category:Eliteserien players Category:English Football League players Category:Cypriot First Division players Category:Venezuelan expatriate footballers Category:Expatriate footballers in Cyprus Category:Expatriate footballers in Hong Kong Category:Expatriate footballers in Germany Category:Expatriate footballers in China Category:Expatriate footballers in Norway Category:Expatriate footballers in England Category:Expatriate footballers in Scotland Category:Expatriate footballers in Portugal Category:Venezuelan expatriate sportspeople in Portugal Category:Venezuelan expatriate sportspeople in Germany Category:Venezuelan expatriate sportspeople in England Category:Venezuelan expatriate sportspeople in Scotland Category:Venezuelan expatriate sportspeople in Norway Category:Venezuelan expatriate sportspeople in Cyprus Category:Venezuelan expatriate sportspeople in China Category:Venezuelan expatriate sportspeople in Hong Kong Category:Association football midfielders Category:Slovak Super Liga players
The controls against women in the kingdom are not ‘strict’, as they were described in a Guardian article. Much more accurate to describe them as ‘oppressive’, writes Emma Laughton Your article “Saudi women ‘no longer need male approval to go abroad’” (2 August) struck the wrong note for me. It referred to the “strictest controls” over women, which seems to rather understate the nature of the situation and existential impact on the suffering of women there. Could I suggest that it would be more appropriate to describe the controls as “oppressive”? Perhaps this is a silly quibble, but the words do give a different flavour. For example, a “strict” diet might even be a good thing in certain circumstances. Using a word like oppressive makes the point that the situation has no redeeming features and can’t be justified in any circumstances. Of course, I’m glad if the article is correct in suggesting that some of the worst features of the system there are being changed. Emma Laughton Colyton, Devon • Join the debate – email [email protected] • Read more Guardian letters – click here to visit gu.com/letters • Do you have a photo you’d like to share with Guardian readers? Click here to upload it and we’ll publish the best submissions in the letters spread of our print edition
Byron Storer Byron Donald Storer (born May 1, 1984) is an American football coach and former fullback who is the special teams assistant coach for the Las Vegas Raiders of the National Football League (NFL). He previously coached for the Tampa Bay Buccaneers and San Diego Chargers. Storer played for the Tampa Bay Buccaneers from 2007 to 2009. He played college football at California. Early years In 2002, Storer graduated from Central Catholic High School in Modesto, California. Playing career College Storer played at University of California, Berkeley and was second team All-Pac-10 special teams in 2006. National Football League Tampa Bay Buccaneers Storer signed with the Tampa Bay Buccaneers in May 2007 and started the final three games of the season, finishing with two receptions for three yards. An exclusive-rights free agent in the 2009 offseason, Storer was re-signed on March 17. He reached an injury settlement with the Buccaneers on May 17 and was placed on injured reserve. Storer retired after spending the 2008 and 2009 season on injured reserve due to tearing his ACL. Coaching career Tampa Bay Buccaneers Storer was hired by the Tampa Bay Buccaneers as an assistant special teams coach. Following the Buccaneers 4-12 record for the 2011 season Raheem Morris and his entire coaching staff were fired. San Diego Chargers In 2012, Storer was hired by the San Diego Chargers as special teams assistant. He was moved to assistant linebackers coach in 2013. Oakland Raiders In 2018, Storer was hired by the Oakland Raiders as special teams assistant. References Category:1984 births Category:Living people Category:Sportspeople from Modesto, California Category:Players of American football from California Category:American football fullbacks Category:California Golden Bears football players Category:Tampa Bay Buccaneers players Category:Tampa Bay Buccaneers coaches Category:San Diego Chargers coaches Category:Oakland Raiders coaches Category:Las Vegas Raiders coaches
The "Flu" and Pregnancy: Get Smart, Get Vaccinated NOW Well, the flu season is underway, and every pregnant woman wants to know, “Should I get the flu shot?” The simple answer is “YES (with few exceptions),” no matter how early or far along you are in your pregnancy, and the optimal time to receive the vaccine is now, during October and November (Obstet Gynecol. 2004;104:1125-6). During an average flu season (October-May; peak December-March) in the U.S., 10-20% of individuals will contract the virus that causes the flu, 20-40,000 will die from it, and about 300,000 will be hospitalized due to complications. The flu is spread via the respiratory route by coughing, sneezing, and even speaking, and by self-inoculation from contact with surfaces that have been contaminated with respiratory tract fluids from an infected individual. Not every “cold” people get during the flu season is actually the result of infection with the influenza virus. There are MANY other “cold” viruses. Influenza usually causes a more severe illness than many of these and is often associated with high fever, headache, sore throat, cough (usually ‘dry’ and ‘nonproductive’), extreme fatigue, and muscle aches. Occasionally, people will have nausea, vomiting, and diarrhea as well, but these are not really typical of the flu, especially in adults. Pregnant women are no more likely to contract the virus than other women, but they are more susceptible to developing more complicated infections, including influenza pneumonia, that may require hospitalization for respiratory compromise, high fever, and dehydration, as well as more serious complications associated with superimposed bacterial pneumonia. The latter was first recognized during the Great Flu (“Spanish flu”) Pandemic of 1918 that claimed 20-40,000,000 people worldwide. Indeed, it is now thought that many of these deaths were related to secondary infections with Staphylococcus aureus and not Streptococcus pneumonia, the more common cause of ‘milder’ bacterial pneumonia. This is a frightening prospect as this and future flu seasons loom because of the increasing prevalence of antibiotic-resistant Staphylococcus (MRSA) in the community (see my recent post “Postmortem Postscript: Staphylococcal Pneumonia”). In 2004, the U.S. Advisory Committee on Immunization Practices (ACIP) recommended for the first time that all pregnant women annually receive the heat-inactivated (no live virus) trivalent influenza vaccine. This vaccine varies each year depending on the strains of the flu virus that are anticipated for the upcoming season. The influenza virus frequently ‘mutates’ so that even if you have had the flu before, you may not be immune to this year’s varieties. When the correct strains are chosen for vaccine production, it is estimated that both hospitalization and death among young, healthy recipients are reduced by 70-90%. It is not recommended that pregnant women take the live attenuated virus vaccine (LAIV). It is especially important that you get the vaccine if you are pregnant and have medical conditions (diabetes, HIV, autoimmune disorders, organ transplant patients) that are accompanied by some degree of immunocompromise (by virtue of either the disease or the treatment), chronic lung disease (asthma, COPD, tobacco abuse), or anemia. Despite the recommendations, proven safety, and benefits of the flu vaccine, in recent studies generally less than 10% of pregnant women actually received the vaccine. The most common reason cited for this was “maternal concern” regarding vaccine safety for themselves and their babies (Naleway AL, et. al., Epidemiol Rev. 2006;28:47-53). However, this may also be the consequence of providers not doing their share in providing good information to their patients. A recent survey of OB/GYNs practicing in the U.S. revealed that only half would offer the flu vaccine to their pregnant patients in first trimester and more than one-third did not offer it at all in their practices (MMWR Morb Mortal Wkly Rep. 2005;54:1050-2). The flu vaccine will not give you the flu. Some individuals will be sore at the site of injection (usually the deltoid muscle) and may even run a very low grade fever as their immune system mounts a response to the vaccine, but this is uncommon. Even if you have gotten the vaccine, and it was selected correctly for the strain of flu that season, you might still get the flu. However, symptoms are usually much milder and it is very unlikely that you will develop influenza pneumonia, require hospitalization, or die from the disease. A milder case of the flu probably reduces the risks to your baby as well. The vaccine also will not protect you from other viruses that can cause “colds” during flu season. Contraindications to receiving the vaccine include allergies to chicken eggs (in which the vaccine is produced), thimerosal (preservative containing a small amount of mercury), and a history of allergic reaction to a flu vaccine in the past. You should also not get the vaccine in the rare event that you are the 1 in a million patient who suffered a condition called Giuillain-Barré Syndrome within 6 weeks of having previously received a flu vaccine. The vaccine during pregnancy is probably safer than waiting and relying on the use of drugs that might be used to treat an influenza infection once it is established. The flu virus itself does not cross the placenta and infect the baby. However, maternal infection with the virus can be associated with fetal complications, particularly if contracted in the first trimester, as well as preterm labor and low birth-weight. Fetal anomalies are probably associated with maternal fever (hyperthermia), and perhaps inflammatory substances produced by the immune system in response to the organism, during the period of fetal organogenesis. The consequences of fever depend on the extent and duration of temperature elevation and the stage of fetal development when it occurs. In experimental animals, hyperthermia has been shown to cause fetal abnormalities such as neural tube defects, small brains (micrencephaly), small eyes (microphthalmia), cataracts, facial clefts, skeletal, and heart abnormalities, among many others, as well as behavioral problems (Edwards MJ. Birth Defects Res A Clin Mol Teratol. 2006;76:507-16). Nearly all of these have been found in epidemiological studies following maternal fever during pregnancy. A recent study confirmed a higher prevalence of facial clefting, neural tube defects, and heart abnormalities among babies whose mothers had the flu during the 2nd and 3rd months of pregnancy (Acs N. Birth Defects Res A Clin Mol Teratol. 2006;73:989-96). There is some suggestion that the developing brain and nervous system might be sensitive to hyperthermia even beyond first trimester. Several studies have shown behavioral problems and, possibly, an increased risk for schizophrenia among offspring of women who have had the flu during pregnancy. So, if you are pregnant, get the flu vaccine, encourage other family members to be vaccinated as well, avoid other people who may have the flu, wash your hands often when in ‘public places,’ and try not to touch your eyes, nose, and mouth when you have come in contact with surfaces that have a high risk of contamination! And, if you do get the flu, make sure you let your provider know, especially if you run a high fever, develop a ‘productive’ cough, or have any respiratory difficulties whatsoever…. Healthline’s mission is to make the people of the world healthier through the power of information. We do this by creating quality health information that is authoritative, approachable, and actionable. Join more than 30 million monthly visitors like you and let Healthline be your guide to better health.
Festivals & Special Events In our Temple, we celebrate the major Saiva festivals as well as Navaratri and our annual Alankara Festival. Please view our Temple Calendar for dates and other specific details. For those who are interested, sponsorship is available for most festival events. Not only are festivals fun for the family and a feast for the senses, they represent a powerful time for receiving divine blessings from Divine Mother and Lord Siva. Festivals are calculated according to the positions of the planets and stars, such that a maximum of cosmic energy is flowing into the Temple during the pujas. The divine celestial energies combine with the powerful mantras and ceremonies to create a maximally auspicious and energized atmosphere. By witnessing or sponsoring the festival pujas and homas, tremendous divine blessings can be absorbed during these auspicious times. The following sacred festivals and auspicious days are celebrated in our Temple. Public Sraddha Ceremonies to Honor One’s Ancestors Sraddha Tarpanam is a very important duty for everyone to perform, and it is typically performed on the lunar tithi of the mother’s or father’s passing. However, some people may not be able to arrange this ceremony on the correct date. To help everyone carry out this sacred duty, the Temple conducts public Sraddha ceremonies on Chitra Paurnami (for the mothers), and Adi Amavasya (for the departed fathers). Sponsors are able to perform the ceremony with their own hands, through the guidance of our volunteers. Special Homam Events Right after the start of every Tamil New Year, the rare and powerful Maha Pratyangira Homam is conducted to invoke divine blessings and protection for all the devotees in the new year. Devotees are given the opportunity to prepare sweets to be offered to Sri Maha Pratyangira Devi, and all who attend are able to offer sweets directly into the fire. This is an extremely rare opportunity and a wonderful blessing. On the final Sunday of each year, a special and unique Raja Matangi Homam is performed to bless all the young students. The uniqueness of this homam is that it is entirely organized and run by kids, and only children up to the age of 21 are allowed to sponsor and make offerings into the homam fire. Contact Us Who We Are The Sri Vidya Temple Society (SVTS) is a 501(c)3 nonprofit organization founded for the purpose of running the Sri Rajarajeswari Peetam and helping to spread the knowledge of Sri Vidya and Saiva spirituality. Our Mission The Temple functions as a "Teaching Temple," as our goal is to preserve and pass on the auspicious knowledge of Sri Vidya as well as the pure devotion of our ancient and noble Tamil Saiva culture.
1. Technical Field The present disclosure relates to an image sensor, and more particularly, to a stack chip package image sensor in which a capacitor for noise reduction is formed in a bottom wafer in correspondence with a unit pixel of a top wafer, so that it is possible to improve noise characteristics of the image sensor. 2. Related Art In general, a CMOS image sensor (CIS) may be classified into a FSI (Front Side Illumination) image sensor and a BSI (Back Side Illumination) image sensor. In a conventional FSI CMOS image sensor, it is not possible to arrange a capacitor for noise reduction in each unit pixel due to a structural problem. Recently, high pixel and pixel miniaturization have been demanded for the FSI CMOS image sensor. However, such a CMOS image sensor has an insufficient space where a capacitor for noise reduction may be arranged in each unit pixel. In spite of the problem, when a capacitor for noise reduction is arranged in the FSI CMOS image sensor, a capacitor C for noise reduction may be arranged on an incident path of a photodiode PD in a MIM (Metal Insulator Metal) or MOM (Metal on Metal) structure as illustrated in FIG. 1. In such a case, there is a problem that a light incident area of the photodiode PD is reduced inversely proportional to an installation area of the capacitor for noise reduction. Therefore, in the FSI CMOS image sensor, it is not possible to arrange the capacitor for noise reduction. However, in the case of a conventional BSI CMOS image sensor, a capacitor for noise reduction may be formed in a rear direction of a photodiode PD by using a metal layer with a MIM or MOM structure on the basis of incident light. Consequently, the capacitor for noise reduction is formed, so that it is possible to prevent an area of the photodiode PD from being reduced. However, in such a case, there is a problem that the incident light may be reflected from the surface of the metal layer and thus crosstalk may occur. Furthermore, since the capacitor for noise reduction is formed in the MIM or MOM structure in order to maximally reduce the size of an image sensor chip, it is difficult to design the capacity or the capacitor for noise reduction at a desired value.
Q: hash values computation in c# I am trying to make a program which computes hash values of two dates.The dates are creation date of the file and the date time when it was last updated.I am getting the same hast values for both in every case even if date of updation and creation are different.My simple aim is to computes the hash values of the two dates and compare them. Please help me with my code . Correct the code or suggest any new code.Thanks in advance. using System; using System.Collections.Generic; using System.Linq; using System.Text; using System.IO; using System.Security.Cryptography; namespace ConsoleApplication3 { class Program { static void Main() { string source, source1; FileInfo info = new FileInfo("D:\\file.txt"); DateTime time1 = info.CreationTime; Console.WriteLine(time1); DateTime time2 = info.LastAccessTime; Console.WriteLine(time2); DateTime time3 = info.LastWriteTime; Console.WriteLine(time3); source = Convert.ToString(time1); source1 = Convert.ToString(time3); using (MD5 md5Hash = MD5.Create()) { string hash = GetMd5Hash(md5Hash, source); string hash1 = GetMd5Hash(md5Hash, source1); Console.WriteLine("The MD5 hash of" + time1 + "is:" + hash + "."); Console.WriteLine("The MD5 hash of" + time3 + "is:" + hash1 + "."); if (VerifyMd5Hash(md5Hash, source, hash)) { Console.WriteLine("The hashes are the same."); } else { Console.WriteLine("The hashes are not same."); } Console.ReadLine(); } } static string GetMd5Hash(MD5 md5Hash, string source1) { FileInfo info = new FileInfo("D:\\file.txt"); DateTime time3 = info.LastWriteTime; source1 = Convert.ToString(time3); // Convert the input string to a byte array and compute the hash. byte[] data = md5Hash.ComputeHash(Encoding.UTF8.GetBytes(source1)); // Create a new Stringbuilder to collect the bytes // and create a string. StringBuilder sBuilder = new StringBuilder(); // Loop through each byte of the hashed data // and format each one as a hexadecimal string. for (int i = 0; i < data.Length; i++) { sBuilder.Append(data[i].ToString("x2")); } // Return the hexadecimal string. return sBuilder.ToString(); } // Verify a hash against a string. static bool VerifyMd5Hash(MD5 md5Hash, string source1, string hash) { // Hash the input. string hashOfInput = GetMd5Hash(md5Hash, source1); // Create a StringComparer an compare the hashes. StringComparer comparer = StringComparer.OrdinalIgnoreCase; if (0 == comparer.Compare(hashOfInput, hash)) { return true; } else { return false; } } } } A: Your function GetMd5Hash has a file baked into it that overrides whatever gets passed in. Just kill off the first three lines inside of it static string GetMd5Hash(MD5 md5Hash, string source1) { //FileInfo info = new FileInfo("D:\\file.txt"); //DateTime time3 = info.LastWriteTime; //source1 = Convert.ToString(time3);
Rorschach Velvet Pillow in Iris $270 Dimensions: 22"W x 22"H Ships In: 6-8 Weeks Ship Method: Standard Product ID: 27122 The Rorschach Velvet Pillow in Iris is a hand dyed, designer pillow made from the softest velvet. This vivid pillow will highlight almost any bedding, living room, boathouse, or lounge. Includes a feather/down insert. This item is custom made especially for you upon order. Click here for our policy on custom made items and returns.
/* * OMAP Crypto driver common support routines. * * Copyright (c) 2017 Texas Instruments Incorporated * Tero Kristo <[email protected]> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as published * by the Free Software Foundation. */ #include <linux/module.h> #include <linux/kernel.h> #include <linux/scatterlist.h> #include <crypto/scatterwalk.h> #include "omap-crypto.h" static int omap_crypto_copy_sg_lists(int total, int bs, struct scatterlist **sg, struct scatterlist *new_sg, u16 flags) { int n = sg_nents(*sg); struct scatterlist *tmp; if (!(flags & OMAP_CRYPTO_FORCE_SINGLE_ENTRY)) { new_sg = kmalloc_array(n, sizeof(*sg), GFP_KERNEL); if (!new_sg) return -ENOMEM; sg_init_table(new_sg, n); } tmp = new_sg; while (*sg && total) { int len = (*sg)->length; if (total < len) len = total; if (len > 0) { total -= len; sg_set_page(tmp, sg_page(*sg), len, (*sg)->offset); if (total <= 0) sg_mark_end(tmp); tmp = sg_next(tmp); } *sg = sg_next(*sg); } *sg = new_sg; return 0; } static int omap_crypto_copy_sgs(int total, int bs, struct scatterlist **sg, struct scatterlist *new_sg, u16 flags) { void *buf; int pages; int new_len; new_len = ALIGN(total, bs); pages = get_order(new_len); buf = (void *)__get_free_pages(GFP_ATOMIC, pages); if (!buf) { pr_err("%s: Couldn't allocate pages for unaligned cases.\n", __func__); return -ENOMEM; } if (flags & OMAP_CRYPTO_COPY_DATA) { scatterwalk_map_and_copy(buf, *sg, 0, total, 0); if (flags & OMAP_CRYPTO_ZERO_BUF) memset(buf + total, 0, new_len - total); } if (!(flags & OMAP_CRYPTO_FORCE_SINGLE_ENTRY)) sg_init_table(new_sg, 1); sg_set_buf(new_sg, buf, new_len); *sg = new_sg; return 0; } static int omap_crypto_check_sg(struct scatterlist *sg, int total, int bs, u16 flags) { int len = 0; int num_sg = 0; if (!IS_ALIGNED(total, bs)) return OMAP_CRYPTO_NOT_ALIGNED; while (sg) { num_sg++; if (!IS_ALIGNED(sg->offset, 4)) return OMAP_CRYPTO_NOT_ALIGNED; if (!IS_ALIGNED(sg->length, bs)) return OMAP_CRYPTO_NOT_ALIGNED; #ifdef CONFIG_ZONE_DMA if (page_zonenum(sg_page(sg)) != ZONE_DMA) return OMAP_CRYPTO_NOT_ALIGNED; #endif len += sg->length; sg = sg_next(sg); if (len >= total) break; } if ((flags & OMAP_CRYPTO_FORCE_SINGLE_ENTRY) && num_sg > 1) return OMAP_CRYPTO_NOT_ALIGNED; if (len != total) return OMAP_CRYPTO_BAD_DATA_LENGTH; return 0; } int omap_crypto_align_sg(struct scatterlist **sg, int total, int bs, struct scatterlist *new_sg, u16 flags, u8 flags_shift, unsigned long *dd_flags) { int ret; *dd_flags &= ~(OMAP_CRYPTO_COPY_MASK << flags_shift); if (flags & OMAP_CRYPTO_FORCE_COPY) ret = OMAP_CRYPTO_NOT_ALIGNED; else ret = omap_crypto_check_sg(*sg, total, bs, flags); if (ret == OMAP_CRYPTO_NOT_ALIGNED) { ret = omap_crypto_copy_sgs(total, bs, sg, new_sg, flags); if (ret) return ret; *dd_flags |= OMAP_CRYPTO_DATA_COPIED << flags_shift; } else if (ret == OMAP_CRYPTO_BAD_DATA_LENGTH) { ret = omap_crypto_copy_sg_lists(total, bs, sg, new_sg, flags); if (ret) return ret; if (!(flags & OMAP_CRYPTO_FORCE_SINGLE_ENTRY)) *dd_flags |= OMAP_CRYPTO_SG_COPIED << flags_shift; } else if (flags & OMAP_CRYPTO_FORCE_SINGLE_ENTRY) { sg_set_buf(new_sg, sg_virt(*sg), (*sg)->length); } return 0; } EXPORT_SYMBOL_GPL(omap_crypto_align_sg); void omap_crypto_cleanup(struct scatterlist *sg, struct scatterlist *orig, int offset, int len, u8 flags_shift, unsigned long flags) { void *buf; int pages; flags >>= flags_shift; flags &= OMAP_CRYPTO_COPY_MASK; if (!flags) return; buf = sg_virt(sg); pages = get_order(len); if (orig && (flags & OMAP_CRYPTO_COPY_MASK)) scatterwalk_map_and_copy(buf, orig, offset, len, 1); if (flags & OMAP_CRYPTO_DATA_COPIED) free_pages((unsigned long)buf, pages); else if (flags & OMAP_CRYPTO_SG_COPIED) kfree(sg); } EXPORT_SYMBOL_GPL(omap_crypto_cleanup); MODULE_DESCRIPTION("OMAP crypto support library."); MODULE_LICENSE("GPL v2"); MODULE_AUTHOR("Tero Kristo <[email protected]>");
This is a wrapper around File::Flock that starts a subprocess and does the locking in the subprocess with File::Flock. The purpose of this is to handle operating systems (eg: Solaris) that do not retain locks across a call to fork(). The sub-process for this is created with fork() when File::Flock::Subprocess is compiled. I’ve tried to minimize the side-effects calling fork() by doing calling it early and by using POSIX::_exit() to quit but it is still worth being aware of. I suggest loading File::Flock::Subprocess early.
Q: Problem with switch statement in language picker - [Solved] I made a language picker, it works in one language but not in other. I want to get the current page of other locale. {% set locale = craft.i18n.getCurrentLocale() %} {% switch locale %} {% case 'en_us' %} <a href="{{ craft.entries.id(entry.id).locale('de').first().url }}">Deutsch {% case 'de' %} <a href="{{ craft.entries.id(entry.id).locale('en_us').first().url}}">English {% endswitch %} Works in first case but not the second. What am i doing wrong? Update: I forget to update the locale template in other language. Problem is solved, my mistake. A: I forget to update locale template code with the same switch statement. Now problem solved.
Contact PD/PI: Panettieri, Reynold Alexander Project Summary/Abstract Overview Coordinated by Rutgers Biomedical and Health Sciences (RBHS), the New Jersey Alliance for Clinical and Translational Science (NJ ACTS) comprises a consortium with Rutgers and Princeton Universities (PU), NJ Institute for Technology (NJIT), medical, nursing, dental and public health schools, hospitals, community health centers, outpatient practices, industry, policymakers and health information exchanges. All Alliance universities and affiliates have provided substantial resources and contributed to the planning, development and leadership of the consortium. With access to ~7 million people, NJ ACTS serves as a ?natural laboratory? for translational and clinical research. With a state population of ~9 million, New Jersey ranks 11th in the US, 1st in population density and higher than average in racial and ethnic diversity. Surprisingly, NJ has no CTSA Hub to coordinate translational and clinical research. Our CTSA Hub focuses on two overarching themes: the heterogeneity of disease pathogenesis and response to treatment, and the value of linking large clinical databases with interventional clinical investigations to identify cause-and-effect and predict therapeutic responses. NJ ACTS will provide: innovative approaches to link information from large databases and electronic health records to inform clinical trial design, execution and analysis; and novel platforms for biomarker discovery using fluorescence in situ hybridization and machine learning to identify unique neural signatures of chronic illness. NJ ACTS will access a large health system with significant member diversity; a rich legacy of community engagement and community-based research platforms; and proven approaches to enhance workforce development in clinical research. With a substantial investment in streamlining research administration and IRB practices at Rutgers and with the inception of NJ ACTS, there exists an unparalleled opportunity for logarithmic growth in clinical research in New Jersey. To build our capacity for participant and clinical interactions as a CTSA Hub, the newly established Trial Accelerator and Recruitment Office will coordinate feasibility assessment, implementation, recruitment, and evaluation of clinical studies. Additionally, our organization of five clinical research units into a cohesive network provides extraordinary expertise in strategic locations to enhance participant recruitment from diverse communities with a particular focus on: children; the elderly; those with serious mental illness or substance abuse issues; low-income individuals served by Medicaid; those with HIV/AIDS; and people of all ages who are minorities, underserved, and victims of health and environmental disparities. With a history of collaboration, partners and affiliates share unique skills, expertise, training and mentoring capabilities that will be greatly amplified within the infrastructure of a CTSA Hub. Princeton and NJIT, without medical schools or hospital affiliates, seeks collaboration with Rutgers to provide clinical research platforms; Rutgers seeks the PU and NJIT expertise in novel informatics platforms, expertise in natural language and ontology, machine learning and cognitive neurosciences. Together NJ ACTS will provide an alliance that will catalyze clinical research and training across New Jersey to improve population health and contribute to the CTSA Consortium. In this revised application, the overall themes remain unchanged but Cores leadership and direction has been markedly refined. Page 337 Project Summary/Abstract Contact PD/PI: Panettieri, Reynold Alexander New Jersey Alliance for Clinical and Translational Science (NJ ACTS)
Q: How to list git tags with certain format or filter We would like to encode our build version number in git tags. For example, we will have git tags like this: release/3.4.4/7889 release/3.4.5/7890 release/3.4.5/7891 ... We know that simply calling git tag will give a list of git tags in the history. Is there a way to tell git to only return some tags following certain formate? For example, is that a way to find all git tags starting with release/3.4.4/? A: For example, is that a way to find all git tags starting with release/3.4.4/? If you read through the git tag documentation, you find: git tag [-n[<num>]] -l [--contains <commit>] [--no-contains <commit>] [--points-at <object>] [--column[=<options>] | --no-column] [--create-reflog] [--sort=<key>] [--format=<format>] [--[no-]merged [<commit>]] [<pattern>...] So, you can simply run: git tag -l release/3.4.4/* You may want to escape that * to avoid erroneous wildcard expansion in the shell: git tag -l release/3.4.4/\*
Distribution of nearest distances between nodal points for the Berry function in two dimensions. According to Berry a wave-chaotic state may be viewed as a superposition of monochromatic plane waves with random phases and amplitudes. Here we consider the distribution of nodal points associated with this state. Using the property that both the real and imaginary parts of the wave function are random Gaussian fields we analyze the correlation function and densities of the nodal points. Using two approaches (the Poisson and Bernoulli) we derive the distribution of nearest neighbor separations. Furthermore the distribution functions for nodal points with specific chirality are found. Comparison is made with results from numerical calculations for the Berry wave function.
Jaggesh and Vijayaprasad to reunite for new film Jaggesh and Vijayaprasad to reunite for new film The "Neer Dose" combination of actor Jaggesh and director Vijayaprasad will be back for another venture together. The two are expected to collaborate for a project being produced by K A Suresh. This is sure to quell the speculations that were surrounding Vijayaprasad regarding his third film. He was expected to direct "34:34 Ladies Tailor". The film also saw some actors and producers making an entry and exiting before it went on the floor. However, after much thought, Vijayaprasad is said to have decided to keep the film on the back burner and will start afresh at a later date. There were also rumours doing the rounds that Jaggesh was upset with Vijayaprasad, however, with the announcement of this film, we hope the rumours die down.
Q: HTML, making a button submit data to another url? The following is my HTML: <form class="form-horizontal" method="post"> <div class="control-group"> <label class="control-label" for="inputEmail">Email</label> <div class="controls"> <input type="text" id="inputEmail" placeholder="Email"> </div> </div> <div class="control-group"> <label class="control-label" for="inputPassword">Password</label> <div class="controls"> <input type="password" id="inputPassword" placeholder="Password"> </div> </div> <div class="control-group"> <div class="controls"> <label class="checkbox"> <input type="checkbox"> Remember me </label> <button type="submit" class="btn btn-success">Sign in</button> <button class="btn btn-primary"> Make a new account </button> </div> </div> </form> Note: Just in case someone is wondering, it is utilizing the bootstrap library. I have the form and it POSTs to login.php but I want the button Make a new account post the same data to register.php. Is that possible? If so, how? A: Set action attribute of your form tag to the URL of the page to send the data to. A: Try the following: In HTML add an onclick event handler for Make a new account button: <form class="form-horizontal" method="post" id="myform"> <div class="control-group"> <label class="control-label" for="inputEmail">Email</label> <div class="controls"> <input type="text" id="inputEmail" placeholder="Email"> </div> </div> <div class="control-group"> <label class="control-label" for="inputPassword">Password</label> <div class="controls"> <input type="password" id="inputPassword" placeholder="Password"> </div> </div> <div class="control-group"> <div class="controls"> <label class="checkbox"> <input type="checkbox"> Remember me </label> <button type="submit" class="btn btn-success">Sign in</button> <button class="btn btn-primary" onclick="javascript:register()"> Make a new account </button> </div> </div> </form> In JavaScript: function register() { this.action = 'register.php'; return true; } If this does not work, you may try: function register() { var frm = document.getElementById("myform"); frm.action = 'register.php'; return true; } One or both of the above mentioned solution should work for you. Prefer the first approach as it is cleaner. Please take this as a starting point not a copy-paste solution and follow the best practices for development. A: I have the form and it POSTs to login.php but I want the button Make a new account post the same data to register.php. Is that possible? In HTML5 it is, using the formaction attribute on the submit button. But browser support is probably not so good yet. Could be resolved using a Polyfil that attaches click handlers to such buttons automatically and changes the action attribute of the form dynamically, though.
/* Terminal color manipulation macros. Copyright (C) 2005-2018 Free Software Foundation, Inc. This file is part of GCC. GCC is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. GCC is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with GCC; see the file COPYING3. If not see <http://www.gnu.org/licenses/>. */ #ifndef GCC_COLOR_MACROS_H #define GCC_COLOR_MACROS_H /* Select Graphic Rendition (SGR, "\33[...m") strings. */ /* Also Erase in Line (EL) to Right ("\33[K") by default. */ /* Why have EL to Right after SGR? -- The behavior of line-wrapping when at the bottom of the terminal screen and at the end of the current line is often such that a new line is introduced, entirely cleared with the current background color which may be different from the default one (see the boolean back_color_erase terminfo(5) capability), thus scrolling the display by one line. The end of this new line will stay in this background color even after reverting to the default background color with "\33[m', unless it is explicitly cleared again with "\33[K" (which is the behavior the user would instinctively expect from the whole thing). There may be some unavoidable background-color flicker at the end of this new line because of this (when timing with the monitor's redraw is just right). -- The behavior of HT (tab, "\t") is usually the same as that of Cursor Forward Tabulation (CHT) with a default parameter of 1 ("\33[I"), i.e., it performs pure movement to the next tab stop, without any clearing of either content or screen attributes (including background color); try printf 'asdfqwerzxcv\rASDF\tZXCV\n' in a bash(1) shell to demonstrate this. This is not what the user would instinctively expect of HT (but is ok for CHT). The instinctive behavior would include clearing the terminal cells that are skipped over by HT with blank cells in the current screen attributes, including background color; the boolean dest_tabs_magic_smso terminfo(5) capability indicates this saner behavior for HT, but only some rare terminals have it (although it also indicates a special glitch with standout mode in the Teleray terminal for which it was initially introduced). The remedy is to add "\33K" after each SGR sequence, be it START (to fix the behavior of any HT after that before another SGR) or END (to fix the behavior of an HT in default background color that would follow a line-wrapping at the bottom of the screen in another background color, and to complement doing it after START). Piping GCC's output through a pager such as less(1) avoids any HT problems since the pager performs tab expansion. Generic disadvantages of this remedy are: -- Some very rare terminals might support SGR but not EL (nobody will use "gcc -fdiagnostics-color" on a terminal that does not support SGR in the first place). -- Having these extra control sequences might somewhat complicate the task of any program trying to parse "gcc -fdiagnostics-color" output in order to extract structuring information from it. A specific disadvantage to doing it after SGR START is: -- Even more possible background color flicker (when timing with the monitor's redraw is just right), even when not at the bottom of the screen. There are no additional disadvantages specific to doing it after SGR END. It would be impractical for GCC to become a full-fledged terminal program linked against ncurses or the like, so it will not detect terminfo(5) capabilities. */ #define COLOR_SEPARATOR ";" #define COLOR_NONE "00" #define COLOR_BOLD "01" #define COLOR_UNDERSCORE "04" #define COLOR_BLINK "05" #define COLOR_REVERSE "07" #define COLOR_FG_BLACK "30" #define COLOR_FG_RED "31" #define COLOR_FG_GREEN "32" #define COLOR_FG_YELLOW "33" #define COLOR_FG_BLUE "34" #define COLOR_FG_MAGENTA "35" #define COLOR_FG_CYAN "36" #define COLOR_FG_WHITE "37" #define COLOR_BG_BLACK "40" #define COLOR_BG_RED "41" #define COLOR_BG_GREEN "42" #define COLOR_BG_YELLOW "43" #define COLOR_BG_BLUE "44" #define COLOR_BG_MAGENTA "45" #define COLOR_BG_CYAN "46" #define COLOR_BG_WHITE "47" #define SGR_START "\33[" #define SGR_END "m\33[K" #define SGR_SEQ(str) SGR_START str SGR_END #define SGR_RESET SGR_SEQ("") #endif /* GCC_COLOR_MACROS_H */
Q: A property of $F_\sigma$ sets. I am self studying topology from C. Wayne patty and I am unable to think how to proceed with this question whose image is added. ( Exercise 1.5 question 13(c) ) . It seems that some construction has to be done in terms of sets but I am unable to construct those sets. My attempt-> I tried by thinking that $F_\sigma$ is an countable union of closed sets but there is no surety that they are contained in one another and not even need to intersect. So, I am unable to think foreword on how to construct such a set. Any help would be really appreciated. A: $A$ is an $F_\sigma$, so $A= \bigcup_{n \in \Bbb N} F_n$ for a sequence $(F_n)$ of closed sets of $X$. Now, finite unions of closed sets are closed, so $C_n = \bigcup_{i \le n} F_i$ is closed for each $n$. $C_{m} \subseteq C_{m+1}$ for all $m$ is clear, because we take a union of one more set. $\bigcup_n C_n = \bigcup_n F_n$ because $F_n \subseteq C_n$ for all $n$ and if $x$ is in some $C_n$ it must be in some $F_i$ as well. So the $C_n$ are as required.
New Trends in Language Didactics / Noi Direcții și Orientări în Pedagogia Limbilor Străine is an international conference to be hosted by the Faculty of Letters, Babeș-Bolyai University, Cluj-Napoca on 9th-10th May 2014.
// Copyright (c) 2017-2018 Uber Technologies, Inc. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package message import ( "fmt" "runtime" "sort" "github.com/uber-go/tally" "github.com/uber/aresdb/client" memcom "github.com/uber/aresdb/memstore/common" metaCom "github.com/uber/aresdb/metastore/common" "github.com/uber/aresdb/subscriber/common/rules" "github.com/uber/aresdb/subscriber/common/sink" "github.com/uber/aresdb/subscriber/config" "github.com/uber/aresdb/utils" "go.uber.org/zap" ) // Parser holds all resources needed to parse one message // into one or multiple row objects with respect to different destinations type Parser struct { // ServiceConfig is ares-subscriber configure ServiceConfig config.ServiceConfig // JobName is job name JobName string // Cluster is ares cluster name Cluster string // destinations each message will be parsed and written into Destination sink.Destination // Transformations are keyed on the output column name Transformations map[string]*rules.TransformationConfig scope tally.Scope } // NewParser will create a Parser for given JobConfig func NewParser(jobConfig *rules.JobConfig, serviceConfig config.ServiceConfig) *Parser { mp := &Parser{ ServiceConfig: serviceConfig, JobName: jobConfig.Name, Cluster: jobConfig.AresTableConfig.Cluster, Transformations: jobConfig.GetTranformations(), scope: serviceConfig.Scope.Tagged(map[string]string{ "job": jobConfig.Name, "aresCluster": jobConfig.AresTableConfig.Cluster, }), } mp.populateDestination(jobConfig) return mp } func (mp *Parser) populateDestination(jobConfig *rules.JobConfig) { columnNames := []string{} updateModes := []memcom.ColumnUpdateMode{} primaryKeys := make(map[string]int) primaryKeysInSchema := make(map[string]int) destinations := jobConfig.GetDestinations() for _, dstConfig := range destinations { columnNames = append(columnNames, dstConfig.Column) } // sort column names in destination for consistent query order sort.Strings(columnNames) for id, column := range columnNames { updateModes = append(updateModes, destinations[column].UpdateMode) if oid, ok := jobConfig.GetPrimaryKeys()[column]; ok { primaryKeysInSchema[column] = oid primaryKeys[column] = id } } mp.Destination = sink.Destination{ Table: jobConfig.AresTableConfig.Table.Name, ColumnNames: columnNames, PrimaryKeys: primaryKeys, PrimaryKeysInSchema: primaryKeysInSchema, AresUpdateModes: updateModes, NumShards: uint32(jobConfig.NumShards), } } // ParseMessage will parse given message to fit the destination func (mp *Parser) ParseMessage(msg map[string]interface{}, destination sink.Destination) (client.Row, error) { mp.ServiceConfig.Logger.Debug("Parsing", zap.Any("msg", msg)) var row client.Row for _, col := range destination.ColumnNames { transformation := mp.Transformations[col] fromValue := mp.extractSourceFieldValue(msg, col) toValue, err := transformation.Transform(fromValue) if err != nil { mp.ServiceConfig.Logger.Error("Tranformation error", zap.String("job", mp.JobName), zap.String("cluster", mp.Cluster), zap.String("field", col), zap.String("name", GetFuncName()), zap.Error(err)) } row = append(row, toValue) } return row, nil } // IsMessageValid checks if the message is valid func (mp *Parser) IsMessageValid(msg map[string]interface{}, destination sink.Destination) error { if len(destination.ColumnNames) == 0 { return utils.StackError(nil, "No column names specified") } if len(destination.AresUpdateModes) != len(destination.ColumnNames) { return utils.StackError(nil, "length of column update modes %d does not equal to number of columns %d", len(destination.AresUpdateModes), len(destination.ColumnNames)) } return nil } // CheckPrimaryKeys returns error if the value of primary key column is nil func (mp *Parser) CheckPrimaryKeys(destination sink.Destination, row client.Row) error { for columnName, columnID := range destination.PrimaryKeys { if row[columnID] == nil { return utils.StackError(nil, "Primary key column %s is nil", columnName) } } return nil } // CheckTimeColumnExistence checks if time column is missing for fact table func (mp *Parser) CheckTimeColumnExistence(schema *metaCom.Table, columnDict map[string]int, destination sink.Destination, row client.Row) error { if !schema.IsFactTable || schema.Config.AllowMissingEventTime { return nil } for id, columnName := range destination.ColumnNames { columnID := columnDict[columnName] if columnID == 0 && row[id] != nil { return nil } } return utils.StackError(nil, "Missing time column") } func (mp *Parser) extractSourceFieldValue(msg map[string]interface{}, fieldName string) interface{} { value, err := mp.getValue(msg, fieldName) if err != nil { mp.ServiceConfig.Logger.Debug("Failed to get value for", zap.String("job", mp.JobName), zap.String("cluster", mp.Cluster), zap.String("field", fieldName), zap.String("name", GetFuncName()), zap.Error(err)) } return value } func (mp *Parser) getValue(msg map[string]interface{}, fieldName string) (interface{}, error) { if value, found := msg[fieldName]; found { return value, nil } return nil, fmt.Errorf("Message does not contain key: %s, job: %s, cluster: %s", fieldName, mp.JobName, mp.Cluster) } //GetFuncName get the function name of the calling function func GetFuncName() string { p, _, _, _ := runtime.Caller(1) fn := runtime.FuncForPC(p).Name() return fn }
use std::io; use std::ops::*; use std::os::unix::io::{AsRawFd, RawFd}; use crate::SQE; pub const PLACEHOLDER_FD: RawFd = -1; /// A member of the kernel's registered fileset. /// /// Valid `RegisteredFd`s can be obtained through a [`Registrar`](crate::registrar::Registrar). /// /// Registered files handle kernel fileset indexing behind the scenes and can often be used in place /// of raw file descriptors. Not all IO operations support registered files. /// /// Submission event prep methods on `RegisteredFd` will ensure that the submission event's /// `SubmissionFlags::FIXED_FILE` flag is properly set. pub type RegisteredFd = Registered<RawFd>; pub type RegisteredBuf = Registered<Box<[u8]>>; pub type RegisteredBufRef<'a> = Registered<&'a [u8]>; pub type RegisteredBufMut<'a> = Registered<&'a mut [u8]>; /// An object registered with an io-uring instance through a [`Registrar`](crate::Registrar). #[derive(Copy, Clone, Eq, PartialEq, Hash, Ord, PartialOrd)] pub struct Registered<T> { data: T, index: u32, } impl<T> Registered<T> { pub fn new(index: u32, data: T) -> Registered<T> { Registered { data, index } } pub fn index(&self) -> u32 { self.index } pub fn into_inner(self) -> T { self.data } } impl RegisteredFd { pub fn is_placeholder(&self) -> bool { self.data == PLACEHOLDER_FD } } impl AsRawFd for RegisteredFd { fn as_raw_fd(&self) -> RawFd { self.data } } impl RegisteredBuf { pub fn as_ref(&self) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[..]) } pub fn as_mut(&mut self) -> RegisteredBufMut<'_> { Registered::new(self.index, &mut self.data[..]) } pub fn slice(&self, range: Range<usize>) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[range]) } pub fn slice_mut(&mut self, range: Range<usize>) -> RegisteredBufMut<'_> { Registered::new(self.index, &mut self.data[range]) } pub fn slice_to(&self, index: usize) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[..index]) } pub fn slice_to_mut(&mut self, index: usize) -> RegisteredBufMut<'_> { Registered::new(self.index, &mut self.data[..index]) } pub fn slice_from(&self, index: usize) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[index..]) } pub fn slice_from_mut(&mut self, index: usize) -> RegisteredBufMut<'_> { Registered::new(self.index, &mut self.data[index..]) } } impl<'a> RegisteredBufRef<'a> { pub fn as_ref(&self) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[..]) } pub fn slice(self, range: Range<usize>) -> RegisteredBufRef<'a> { Registered::new(self.index, &self.data[range]) } pub fn slice_to(&self, index: usize) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[..index]) } pub fn slice_from(&self, index: usize) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[index..]) } } impl<'a> RegisteredBufMut<'a> { pub fn as_ref(&self) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[..]) } pub fn as_mut(&mut self) -> RegisteredBufMut<'_> { Registered::new(self.index, &mut self.data[..]) } pub fn slice(self, range: Range<usize>) -> RegisteredBufRef<'a> { Registered::new(self.index, &self.data[range]) } pub fn slice_mut(self, range: Range<usize>) -> RegisteredBufMut<'a> { Registered::new(self.index, &mut self.data[range]) } pub fn slice_to(&self, index: usize) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[..index]) } pub fn slice_to_mut(&mut self, index: usize) -> RegisteredBufMut<'_> { Registered::new(self.index, &mut self.data[..index]) } pub fn slice_from(&self, index: usize) -> RegisteredBufRef<'_> { Registered::new(self.index, &self.data[index..]) } pub fn slice_from_mut(&mut self, index: usize) -> RegisteredBufMut<'_> { Registered::new(self.index, &mut self.data[index..]) } } impl Deref for RegisteredBuf { type Target = [u8]; fn deref(&self) -> &[u8] { &self.data[..] } } impl Deref for RegisteredBufRef<'_> { type Target = [u8]; fn deref(&self) -> &[u8] { &self.data[..] } } impl Deref for RegisteredBufMut<'_> { type Target = [u8]; fn deref(&self) -> &[u8] { &self.data[..] } } impl DerefMut for RegisteredBuf { fn deref_mut(&mut self) -> &mut [u8] { &mut self.data[..] } } impl DerefMut for RegisteredBufMut<'_> { fn deref_mut(&mut self) -> &mut [u8] { &mut self.data[..] } } /// A file descriptor that can be used to prepare SQEs. /// /// The standard library's [`RawFd`] type implements this trait, but so does [`RegisteredFd`], a /// type which is returned when a user pre-registers file descriptors with an io-uring instance. pub trait UringFd { fn as_raw_fd(&self) -> RawFd; fn update_sqe(&self, sqe: &mut SQE<'_>); } impl UringFd for RawFd { fn as_raw_fd(&self) -> RawFd { *self } fn update_sqe(&self, _: &mut SQE<'_>) { } } impl UringFd for RegisteredFd { fn as_raw_fd(&self) -> RawFd { AsRawFd::as_raw_fd(self) } fn update_sqe(&self, sqe: &mut SQE<'_>) { unsafe { sqe.raw_mut().fd = self.index as RawFd; } sqe.set_fixed_file(); } } /// A buffer that can be used to prepare read events. pub trait UringReadBuf { unsafe fn prep_read(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64); } /// A buffer that can be used to prepare write events. pub trait UringWriteBuf { unsafe fn prep_write(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64); } impl UringReadBuf for RegisteredBufMut<'_> { unsafe fn prep_read(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_read_fixed( sqe.raw_mut(), fd.as_raw_fd(), self.data.as_mut_ptr() as _, self.data.len() as _, offset as _, self.index() as _ ); fd.update_sqe(sqe); } } impl UringReadBuf for &'_ mut [u8] { unsafe fn prep_read(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_read( sqe.raw_mut(), fd.as_raw_fd(), self.as_mut_ptr() as _, self.len() as _, offset as _, ); fd.update_sqe(sqe); } } impl UringReadBuf for io::IoSliceMut<'_> { unsafe fn prep_read(mut self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_read( sqe.raw_mut(), fd.as_raw_fd(), self.as_mut_ptr() as _, self.len() as _, offset as _, ); fd.update_sqe(sqe); } } impl UringReadBuf for &'_ mut [&'_ mut [u8]] { unsafe fn prep_read(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_readv( sqe.raw_mut(), fd.as_raw_fd(), self.as_mut_ptr() as _, self.len() as _, offset as _, ); fd.update_sqe(sqe); } } impl UringReadBuf for &'_ mut [io::IoSliceMut<'_>] { unsafe fn prep_read(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_readv( sqe.raw_mut(), fd.as_raw_fd(), self.as_mut_ptr() as _, self.len() as _, offset as _, ); fd.update_sqe(sqe); } } impl UringWriteBuf for RegisteredBufRef<'_> { unsafe fn prep_write(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_write_fixed( sqe.raw_mut(), fd.as_raw_fd(), self.data.as_ptr() as _, self.data.len() as _, offset as _, self.index() as _ ); fd.update_sqe(sqe); } } impl UringWriteBuf for &'_ [u8] { unsafe fn prep_write(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_write( sqe.raw_mut(), fd.as_raw_fd(), self.as_ptr() as _, self.len() as _, offset as _, ); fd.update_sqe(sqe); } } impl UringWriteBuf for io::IoSlice<'_> { unsafe fn prep_write(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_write( sqe.raw_mut(), fd.as_raw_fd(), self.as_ptr() as _, self.len() as _, offset as _, ); fd.update_sqe(sqe); } } impl UringWriteBuf for &'_ [io::IoSlice<'_>] { unsafe fn prep_write(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_writev( sqe.raw_mut(), fd.as_raw_fd(), self.as_ptr() as _, self.len() as _, offset as _, ); fd.update_sqe(sqe); } } impl UringWriteBuf for &'_ [&'_ [u8]] { unsafe fn prep_write(self, fd: impl UringFd, sqe: &mut SQE<'_>, offset: u64) { uring_sys::io_uring_prep_writev( sqe.raw_mut(), fd.as_raw_fd(), self.as_ptr() as _, self.len() as _, offset as _, ); fd.update_sqe(sqe); } }
Introduction ============ Polypoidal choroidal vasculopathy (PCV) is characterized by polyp-like terminal aneurysmal dilations with or without branching choroidal vessels \[[@r1]-[@r4]\]. Although the visual prognoses and potential responses to treatment differ between PCV and neovascular age-related macular degeneration (nAMD), they share several common characteristics, including subretinal hemorrhage, pigment epithelial detachment (PED), and increased prevalence in people more than 50 years of age \[[@r1],[@r2],[@r5]\]. In view of the similarities between nAMD and PCV, several studies have investigated the relationship between the genetic variants associated with both conditions. Although some studies have found a shared genetic background \[[@r6]-[@r10]\], others have found little to no genetic similarity \[[@r11],[@r12]\]. Although the genetics of nAMD have been well studied, investigations into the genes encoding the structural proteins involved in this disease are limited \[[@r13]-[@r16]\]. However, histopathological studies of the choroidal neovascular (CNV) membranes of AMD have found abnormal vessels surrounded by fibrin-like materials \[[@r17]\]. In contrast, the genetic investigation of PCV is just beginning, and only a few studies have conducted single nucleotide polymorphism (SNP) analyses of PCV \[[@r9],[@r12],[@r18]-[@r21]\]. Kuroiwa et al. observed the histopathologic changes of PCV and found vessel wall sclerosis and an increase in basement membrane-like materials and collagen fibers within the wall of polypoidal lesions \[[@r22]\]. Nakashizuka et al. \[[@r23]\] and Okubo et al. \[[@r24]\] also investigated the histopathologic characteristics of PCV lesions and found vessel wall destruction that manifested as wall thickening and apparent hyaline degeneration. These pathologic findings provide an important clue to the possible relationship between nAMD, PCV, and vessel wall destruction. Collagen destruction can result in a decrease in vessel integrity and an increase in vessel permeability \[[@r25]\]. Type I collagen is the critical component required for maintaining vessel wall elasticity and is an important component of the extracellular matrix \[[@r26]\]. Collagen fiber disintegration in pericellular connective tissue decreases the accumulation of connective tissue in vessel walls, which in turn decreases wall flexibility. This decrease in wall flexibility has been associated with CNV, PCV, and intracranial aneurysm (IA). Type I collagen is the most abundant connective tissue protein in human organ systems. Type I collagen consists of two alpha-1 and one alpha-2 chains \[[@r27]\]. The alpha-2 type I collagen (*COL1A2*) gene is located in the 7q22.1 locus and encodes the pro-alpha 2 chain protein. The [rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524) polymorphism in *COL1A2* results in an amino acid substitution, Ala to Pro, at amino acid position 459 and therefore influences the integrity of type I collagen, decreases vessel wall rigidity, and eventually causes the destruction of blood vessel walls \[[@r28]\]. To our knowledge, this is the first investigation into the association between *COL1A2*, PCV, and nAMD. The purpose of our study was to assess the associations of [rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524) with PCV and nAMD in a Han Chinese population. Methods ======= Study population ---------------- A prospective study was conducted on 512 participants including 195 patients with PCV, 136 patients with nAMD, and 181 control individuals. Each participant was examined at the Zhongshan Ophthalmic Center (Guangzhou, China). The patients' medical histories were reviewed. All patients underwent visual acuity testing, slit-lamp biomicroscopy, and ophthalmoscopic examination. Color fundus photography, fluorescein angiography, and indocyanine green angiography were performed in both eyes of the patients with PCV and nAMD. The diagnostic criteria for PCV were polypoidal choroidal vascular dilations with or without branching inner choroidal vessels on indocyanine green angiography \[[@r29]\]. Patients with other neovascularized maculopathies such as retinal angiomatous proliferation, pathological myopia, angioid streaks, central serous chorioretinopathy, presumed ocular histoplasmosis, and other retinal or choroidal diseases that could account for CNV were excluded. All control subjects were unrelated to the case subjects and were aged ≥50 years. All subjects with macular changes such as drusen or pigment abnormalities, macular degeneration of any cause, or media opacities preventing clear observation of the fundus were excluded from recruitment. The study protocol was approved by the institutional review board at the Zhongshan Ophthalmic Center of Sun Yat-sen University. Informed consent was obtained from all patients before angiography. All procedures adhered to the tenets of the Declaration of Helsinki. Single nucleotide polymorphism genotyping ----------------------------------------- Genomic DNA from peripheral blood samples was isolated using the NucleoSpin Blood XL kit (Macherey-Nagel GmbH & Co., KG Düren, Germany) and stored at −20 °C. Genotyping was performed using a PCR restriction fragment length polymorphism assay. Direct sequencing was performed to confirm the restriction patterns for 10% of the samples. [rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524) in *COL1A2* was genotyped with the Multiplex SNaPshot System with an ABI 3730XL Genetic Analyzer (Applied Biosystems, Foster City, CA). SNP genotypes were determined with GeneMapper software V4.1 (Applied Biosystems). The primer sequences used for the SNP were as follows: forward 5′-CAA GGT GGA AAA GGT GAA CAG-3′ and reverse 5′-AGC TCA ATA GGC TGA CCA AAG-3′. The extension primer was 5′-TTT TTT TTT TTT TTT TTT TTT TTT GGA AGC CTG GAG GAC CAG-3′. Statistics ---------- A statistical analysis of the data was performed using Statistical Package for the Social Sciences (SPSS) software (version 16.0, SPSS Inc., Chicago, IL). Baseline characteristics between the cases and controls were compared using unpaired Student *t* tests for means and chi-square tests for proportions. An exact test implemented in the [PLINK](http://pngu.mgh.harvard.edu/~purcell/plink/index.shtml) v1.07 software package was used to test for deviations from the Hardy-Weinberg equilibrium \[[@r30]\]. The minor allele was determined based on all case and control subjects. Allele frequencies were compared between cases and controls using chi-square tests along with [PLINK](http://pngu.mgh.harvard.edu/~purcell/plink/index.shtml) as previously described \[[@r14]\]. The logistic option in [PLINK](http://pngu.mgh.harvard.edu/~purcell/plink/index.shtml) was used to provide a test based on logistic regression for the genotypic additive model, and the model option in [PLINK](http://pngu.mgh.harvard.edu/~purcell/plink/index.shtml) was used to provide a chi-square test for the dominant and recessive models. The odds ratio and corresponding 95% confidence interval (CI) were calculated relative to the minor allele and the wild-type homozygote. A p-value \<0.05 was considered statistically significant. The G\* power 3 program (Erdfelder, Faul, & Buchner, Mannheim, Germany) \[[@r31]\] was used to perform post-hoc power analyses. Results ======= A total of 512 subjects participated in this study, including 136 patients with nAMD, 195 patients with PCV, and 181 control individuals. The percentage of male patients in the nAMD, PCV, and control populations was 63.2% (86 cases), 66.7% (130 cases), and 61.9% (112 cases), respectively. There was no significant difference between the control group and the PCV (p=0.333) or nAMD (p=0.805) group regarding gender. The mean age of the PCV group (64±8.75 years) was significantly lower than that of the control group (68±9.18 years; p\<0.001). There was no significant age difference between the nAMD group (67±9.29 years) and the control group. Genotypes were determined using a PCR restriction fragment length polymorphism assay in all patients and were confirmed with direct sequencing in a subset. The population tested in this study did not show any significant deviation from the Hardy--Weinberg equilibrium for the observed genotype (p\>0.1000; [Table 1](#t1){ref-type="table"}). ###### Association test for the minor allele frequency of the rs42524 polymorphism in nAMD, PCV and control subjects **Status** **Minor allele\*** **HWE** **MAF** **OR (95%CI)** **p-value** ------------ -------------------- --------- --------- ------------------------- ------------- nAMD   1 0.0804 0.5285 (0.2832--0.9866) 0.0425 PCV   0.7345 0.109 1.2110 (0.7631--1.9210) 0.4164 Control G 0.6879 0.0947     nAMD=neovascular age-related macular degeneration; PCV=polypoidal choroidal vasculopathy; MAF=minor allele frequency; HWE=*P*-value of Hardy--Weinberg equilibrium test; OR=odds ratio; 95%CI=95% confidence intervals. \*The minor allele was calculated based on the all cases and control subjects. [rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524) was modestly significantly associated with nAMD \[p(allelic)=0.0425, minor allele G: 8.04% in nAMD versus 9.47% in the control\], but not with PCV \[p (allelic)=0.4164, minor allele G: 10.90% in PCV versus 9.47% in the control\]. The odds ratio for the G allele of rs42524 was 0.53 (95% CI, 0.28--0.99) for nAMD and 1.21 (95% CI, 0.76--1.92) for PCV ([Table 2](#t2){ref-type="table"}). The pvalue for this association with nAMD was significant under an additive model, but not under a dominant or recessive model. None of the models showed any statistically significant association with PCV ([Table 2](#t2){ref-type="table"}). ###### Association test for the rs42524 genotype in nAMD, PCV and control subjects **Group** **Genotype** **Genotype** **Genotype distribution (%)** **p-value** ----------- -------------- ------------------------ ------------------------------- ------------- ------------ ----------- ------------------------- ----------   Model OR(95%CI) P-value Case Control OR(95%CI)   AMD Additive 0.5259 (0.2802-0.9869) 0.0454 CC 121(89.0) 147(81.2) Reference     Dominant 0.5360(0.2788-1.0302) 0.0587 GC 15(11.0) 32(17.7) 0.5695(0.2947-1.1005) 0.1105   Recessive 0.7905(0.6373-0.9805) 0.2188 GG 0 2(1.1) -- --               0.5259(0.2802-0.9869)\* 0.045\* PCV Additive 1.2080 (0.7632-1.911) 0.4201 CC 152 (77.9) 147(81.2) Reference     Dominant 1.2231(0.7391-2.0241) 0.4329 GC 40(20.5) 32(17.7) 1.2089(0.7207-2.0277) 0.5126   Recessive 1.1134(0.8446-1.4679) 0.7139 GG 3(1.5) 2(1.1) 1.4507(0.2389-8.8071) 1               1.2078(0.7632-1.9115)\* 1.2078\* nAMD=neovascular age-related macular degeneration; OR=odds ratio; 95% CI=95% confidence interval; PCV=polypoidal choroidal vasculopathy. \* Trend test. The size of the cohort provides \>80% power to detect significant associations (α=0.017) with an effect size index of 0.2 (corresponding to a weak-to-moderate gene effect). The degrees of freedom were 1 for allelic frequencies and 2 for genotype frequencies. The statistical power to detect changes in allelic frequencies for the nAMD and PCV groups versus the controls was 87.98% and 93.21%, respectively, and the power to detect changes in genotype frequencies was 80.66% and 88.01%, respectively. Discussion ========== Both nAMD and PCV are leading causes of blindness and visual impairment in the elderly population. Recently, many studies have found that the two possess different genetic backgrounds, clinical characteristics, and prognoses. These results indicate a strong possibility that PCV and nAMD have different pathogenic mechanisms \[[@r32]-[@r34]\]. In recent analyses of human PCV and AMD specimens, several investigations have suggested a possible role for vessel destruction as a pathogenic mechanism in PCV and AMD. Other studies have sought to identify the related SNPs and finally identified a relationship between elastin (*ELN*) and susceptibility to the two diseases \[[@r13],[@r19],[@r35]\]. Collagen is known to decrease the strength of the vascular wall, thus leading to aneurysm formation. Many collagens play important roles in cell adhesion, the maintenance of tissue architecture, and normal tissue function. Among them, *COL1A2* plays an essential role in the expression of collagen type I in vivo, which is important in development and adult tissue repair \[[@r36],[@r37]\]. The *COL1A2* gene is located on chromosome 7q22.1 and has been identified as a susceptibility gene in many collagen-related problems \[[@r38],[@r39]\]. This gene has also been shown to be involved in vascular development, stabilization, maturation, and remodeling \[[@r40],[@r41]\]. Furthermore, many vascular abnormalities, including stroke, myocardial infarction, and IA, have been found to be due to defects in *COL1A2* \[[@r28],[@r39],[@r42]\]. Given the results of these previous studies, we aimed to discover whether *COL1A2* plays a role in the pathogenesis of PCV or neovascular AMD. To our knowledge, this issue has not yet been investigated. We previously found that PCV was most likely associated with IA and have documented a variant ([rs10757278](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=10757278)) in 9p21 shared between the two \[[@r14]\]. An investigation in Japanese patients with IA screened the *COL1A2* gene extensively for suspected SNPs and found a particularly strong association between the polymorphism [rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524) and IA under a dominant model \[[@r28]\]. Zhu et al. further confirmed the association between *COL1A2* and IA in a Han Chinese population \[[@r43]\]. Thus, in this study, we aimed to discover whether this SNP plays a role in susceptibility to PCV or nAMD. The results of our case-control study demonstrated that [rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524) in *COL1A2* is significantly associated with nAMD, which is consistent with recent studies \[[@r44],[@r45]\]. To date, only one group has examined the association between advanced AMD and variants near *COL10A1* ([rs1999930](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=1999930)) in Caucasian individuals \[[@r44]\]. However, a recent in vitro study found that a reduction in *COL1A2* expression suppressed neovessel growth and curtailed CNV fibrosis \[[@r45]\]. Genome-wide association studies with large cohorts have further strengthened the association between advanced AMD and variants near *COL10A1* ([rs1999930](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=1999930)) in Caucasian individuals, finding that the development of advanced AMD might be caused in part by extracellular collagen matrix pathways \[[@r44]\]. We found that [rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524), however, is not associated with PCV. This differential susceptibility of PCV and nAMD agrees with previous studies that found little-to-no overlap between PCV and nAMD susceptibility genes \[[@r11],[@r12]\]. Our previous study also showed a lack of association between PCV and *SERPING1* polymorphisms \[[@r12]\]. The same polymorphisms have been shown to have a protective effect for nAMD \[[@r46]\]. Additionally, a common variant ([rs10757278](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=10757278)) on chromosome 9p21 was reported to be associated with PCV, but not with nAMD, in a Chinese population \[[@r14]\]. Taken together, these findings may indicate that although PCV and nAMD share similar clinical manifestations, the two may be controlled by different collagen genes. The main limitations of our study included the relatively small sample size and the fact that not all of the collagen genes were surveyed. These results need to be confirmed in a larger cohort and with comprehensive investigations of all of the collagen genes. In conclusion, we investigated the association of *COL1A2* ([rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524)) polymorphisms in PCV and nAMD. We found that [rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524) is significantly associated with nAMD, but not with PCV. This finding may imply that *COL1A2* gene polymorphisms play an important role in the development of nAMD. Finally, we discovered that the G allele of [rs42524](http://www.ncbi.nlm.nih.gov/projects/SNP/snp_ref.cgi?rs=42524), rather than the C allele, confers nAMD risk. This study was supported by the National Natural Science Foundation of China (grant number: 81070745), the Medical Scientific Research Foundation of Guangdong Province, China (grant number: B2011108) and the Fundamental Research Funds of State Key Laboratory of Ophthalmology.
A new organization says tens of thousands of people have left the gay lifestyle, but they're intimidated into silence. And they took their stories to the Supreme Court this week. At a press conference outside the U.S. Supreme Court Wednesday, ex-gays with the group Voice of the Voiceless told of coming out of the gay world and often being harassed. They said they deserve legal protection against discrimination. "I have been free of the obsession, the compulsion of same-sex attraction for over 40 years," Doug McIntyre, with Homosexuals Anonymous, said. ***What kind of legal protection are ex-gays seeking? Christopher Doyle, co-founder and president of Voice of the Voiceless, answered this and more on CBN Newswatch, July 31. "After years of effective therapy I realized that being gay is not really a true expression of who I really am and changed to ex-gay," Chuck Peters, clinical director of the Sexual Orientation Change Institution, said. They also told of rejection and hate. "I have suffered more discrimination and intolerance as any ex-gay than I did when I was in the lifestyle," Rev. Grace Harley, with Jesus is the Answer Ministry, said. "Many ex-gays are afraid to come out of the closet because of the harassment that we receive." Christopher Doyle, president and co-founder of Voice of the Voiceless, told CBN News it's time the world listened to ex-gays. "We're just simply saying that we want a seat at the table," Doyle said. "We want our voices to be heard." Doyle is asking for legal protection from discrimination due to sexual orientation and says states should stop efforts to ban therapy for those seeking change. "They're literally trying to take away the choice to come out of homosexuality and pursue heterosexuality," he said. "So we're saying we have the desire to be protected and not have our rights infringed upon by these activists who only want one viewpoint to be heard on this issue." Meanwhile, the former head of the American Psychological Association is defending the rights of those who want to leave the gay lifestyle. Dr. Nicholas Cummings wrote in USA Today that he counseled thousands of homosexuals over the years, many of whom were choosing to remain as homosexuals. But he also helped hundreds of patients overcome same-sex attraction during his years as a clinical therapist. He says the belief that "homosexuality is one identical inherited characteristic" is not "supported by scientific evidence." Cummings said groups like the Southern Poverty Law Center that are working to ban conversion therapy are actually causing damage. "Attempting to characterize all sexual re-orientation therapy as 'unethical' violates patient choice and gives an outside party a veto over patients' goals for their own treatment," Cummings wrote.
croftangleart.com How to eboot.pbp games for psp 2 May Hey just downloaded a game and extracted it and got an croftangleart.com file i have tried putting it into my iso folder doesn't work and then tried. 27 Dec - 5 min - Uploaded by Jimer Tivs How to Put games into your PSP, .ISO/.CSO/.PBP formats). Jimer Tivs. Loading. . Como poner. I tried to put that game in ISO folder and also in Game folder in PSP folder. But in both the case unable to play that game. How can I play that. 22 Sep Open PSX2PSP and click the "ISO/PBP File" browse button. Look for your BIN. Tech 4 Idiots: How to Convert PSone Games to PSP EBOOTs. 23 Jun I looked around the internet for at least an hour to look for a program or website to croftangleart.com files to croftangleart.com files to run PSP games but. 29 Jul ROMs, ISOs, Games PSX on PSP eBoots Section We've got converts of PSX titles ready to go onto your PSP - no conversion. 23 Jan Download locations for PlayStation Portable (PSP) Firmware , Downloads: , Size: MB. PlayStation Portable (PSP) Firmware Download mirrors for croftangleart.com Popular downloads in Games. 24 Jul Hi i will show you how to make PS1 games work on a PSP. FIrst have a PSP with CFW. Mine is PRO-B9 beta. Second find a PS1 game. 14 May Some people would like to play downloaded Games on their PSP's, but don't want to go through all the risks of bricking their PSP while. 7 Aug So for playing ISO/CSO games on your PlayStation Portable you need to convert your ISO/CSO files to croftangleart.com files. That's so easy, we just. To play PSX on PSP place eboot files you have downloaded on to a Memory Stick in Play PS1 game on PSP - PSXPSP converter guide. PBP and KEYS.
4,000 strike at Anglo American Platinum mine once again Workers at Anglo American Platinum (LON:ALL), the world's largest platinum producer, staged a sit-in strike at one of the company’s underground mines in South Africa on Friday in protest of the firing of several of their leaders, a union representative told AFP. Between 3,000 to 4,000 people were striking at Amplats’ Thembelani mine in Rustenburg, said an Association of Mineworkers and Construction Union (AMCU) spokesman, adding that at least 2,400 of them were being held down in the mine by colleagues. “There is zero tolerance to any illegal actions which include intimidation, threats of violence and assault,” Anglo American Platinum said in a statement. "Our protection services teams are on the ground attending to the situation. Management is currently engaging with recognized unions at regional and at head office levels to resolve the situation," it said. AMCU and rival union the National Union of Mineworkers (NUM) have been in a bloody war for dominance at the mines that has resulted in violent strikes and assassinations. The incident is the latest wildcat action to hit South Africa’s platinum belt. The country, Africa's largest economy, accounts for 75% of world PGM output. The nation’s mining sector, which accounts for 6% of gross domestic product, has been repeatedly hit by disputes over low wages that reflect widespread anger over enduring inequalities in the economy.
In developing and maintaining a proper golf swing it is customary for the golfer to use a golf club in a practice area to strike successive golf balls and thereby become more proficient in executing a proper golf swing. In those instances in which the golfer uses a golf club for hitting a ball from atop a tee it is not uncommon for the tee to be broken and/or dislodged from the ground by engagement of the golf club with the ball and its supporting tee during the execution of a swing. Having to replace a dislodged or broken tee is burdensome and takes away from the time otherwise available for practice. Some of the practice devices of the prior art have supports which simulate tees for supporting golf balls during a practice session. Some of such supports have objectionable characteristics such as being of such flimsy nature as to require frequent replacement. Others of such devices provide more resistance to golf club movement than is desirable, thereby precluding the player is experiencing the feel generated by the movement of a golf club into engagement with the ball during a proper stroke. The placement of a golfer's feet in relation to the position of the ball during the execution of a stroke has an effect on the flight of a struck ball. It is desirable, therefore, to make possible an arrangement by means of which a golfer may learn where to position his feet during successive strokes so as to enable him to practice golf shots which produce different results according to the placement of the feet. Apparatus constructed in accordance with the invention overcomes the objectionable characteristics referred to above and facilitates the golfer's making specific golf strokes.
function f() : return true
Q: Java Swing Custom Cursor is invisible I made a custom cursor using this tutorial. Problem is, as soon as it changes, i just get nothing. The cursor is invisible. I tried the pencil image given there, a custom image i quickly have drawn in paint, but they all don't work. public Cursor stoneCursor; Toolkit toolkit = Toolkit.getDefaultToolkit(); Image image = toolkit.getImage("pencil.gif"); Point hotspot = new Point(0,0); stoneCursor = toolkit.createCustomCursor(image, hotspot, "Stone"); getContentPane().setCursor(stoneCursor); This is inside a JFrame ofcourse. ". If the image to display is invalid, the cursor will be hidden (made completely transparent), and the hotspot will be set to (0, 0)." This is written in the javadoc of createCustomCursor(), but it should work with the pencil.gif? Thanks for the answers in advance! :) A: Your code works for me. I am betting that the toolkit can't find your image and therefore is unable to display it. Here is a complete working example that uses the same code as yours (except I used a public Image from a URL): import java.awt.Cursor; import java.awt.Image; import java.awt.Point; import java.awt.Toolkit; import java.net.MalformedURLException; import java.net.URL; import javax.swing.JFrame; import javax.swing.SwingUtilities; public class TestCursor { protected void initUI() throws MalformedURLException { JFrame frame = new JFrame("Test text pane"); frame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE); Toolkit toolkit = Toolkit.getDefaultToolkit(); Image image = toolkit.getImage(new URL("http://fc03.deviantart.net/fs71/f/2010/094/7/9/Kalyan_hand_cursor_1_by_Zanten.png")); Point hotspot = new Point(0, 0); Cursor cursor = toolkit.createCustomCursor(image, hotspot, "Stone"); frame.setCursor(cursor); frame.setSize(600, 400); frame.setVisible(true); } public static void main(String[] args) { SwingUtilities.invokeLater(new Runnable() { @Override public void run() { try { new TestCursor().initUI(); } catch (MalformedURLException e) { // TODO Auto-generated catch block e.printStackTrace(); } } }); } }
Identification of latent periodicity in domains of alkaline proteases. Internal repeats in protein sequences have wide-ranging implications for the structure and function of proteins. A keen analysis of the repeats in protein sequences may help us to better understand the structural organization of proteins and their evolutionary relations. In this paper, a mathematical method for searching for latent periodicity in protein sequences is developed. Using this method, we identified simple sequence repeats in the alkaline proteases and found that the sequences could show the same periodicity as their tertiary structures. This result may help us to reduce difficulties in the study of the relationship between sequences and their structures.
Angola: Affirmation of Local Music Regarded As Gain of Independência Huambo — The musician Nascimento Tchilalu considered this Friday in the central Huambo province that the affirmation of the Angolan music inside and outside the country one of the gains of the national independence. The singer said so to Angop in the ambit of the celebrations of the 37th anniversary of the national independence, to be marked on 11 November. The artist highlighted the emergence of various studios and music producers that have been contributing the increase of the Angolan music production. Nascimento Tchilalu recognised the impact of the Angolan music in the fight against the Portuguese colonial regime, though that time there were not many singers. Nascimento Tchilalu was born in Mungo district, cetral Huambo province. AllAfrica publishes around 2,000 reports a day from more than 130 news organizations and over 200 other institutions and individuals, representing a diversity of positions on every topic. We publish news and views ranging from vigorous opponents of governments to government publications and spokespersons. Publishers named above each report are responsible for their own content, which AllAfrica does not have the legal right to edit or correct. Related Follow AllAfrica AllAfrica is a voice of, by and about Africa - aggregating, producing and distributing 2000 news and information items daily from over 130 African news organizations and our own reporters to an African and global public. We operate from Cape Town, Dakar, Lagos, Monrovia, Nairobi and Washington DC.
Single-cell enzymatic dissociation of hESC lines OxF1-OxF4 and culture in feeder-free conditions. Experimental manipulation of hESCs has been hampered by their fragility and susceptibility to apoptosis when dissociated into single cells. The OxF lines are particularly robust and may be successfully passaged as single cells, with the inclusion of ROCK inhibitor in the medium. The protocols here describe the enzymatic dissociation of hESCs into a single-cell suspension and the plating of these cells onto either feeder cells or a protein-coated surface.
// This file was procedurally generated from the following sources: // - src/dstr-binding/ary-ptrn-rest-obj-id.case // - src/dstr-binding/default/cls-decl-private-gen-meth.template /*--- description: Rest element containing an object binding pattern (private class expression method) esid: sec-class-definitions-runtime-semantics-evaluation features: [class, class-methods-private, generators, destructuring-binding] flags: [generated] info: | ClassDeclaration : class BindingIdentifier ClassTail 1. Let className be StringValue of BindingIdentifier. 2. Let value be the result of ClassDefinitionEvaluation of ClassTail with argument className. [...] 14.5.14 Runtime Semantics: ClassDefinitionEvaluation 21. For each ClassElement m in order from methods a. If IsStatic of m is false, then i. Let status be the result of performing PropertyDefinitionEvaluation for m with arguments proto and false. [...] 14.4.13 Runtime Semantics: PropertyDefinitionEvaluation GeneratorMethod : * PropertyName ( StrictFormalParameters ) { GeneratorBody } 1. Let propKey be the result of evaluating PropertyName. 2. ReturnIfAbrupt(propKey). 3. If the function code for this GeneratorMethod is strict mode code, let strict be true. Otherwise let strict be false. 4. Let scope be the running execution context's LexicalEnvironment. 5. Let closure be GeneratorFunctionCreate(Method, StrictFormalParameters, GeneratorBody, scope, strict). 9.2.1 [[Call]] ( thisArgument, argumentsList) [...] 7. Let result be OrdinaryCallEvaluateBody(F, argumentsList). [...] 9.2.1.3 OrdinaryCallEvaluateBody ( F, argumentsList ) 1. Let status be FunctionDeclarationInstantiation(F, argumentsList). [...] 9.2.12 FunctionDeclarationInstantiation(func, argumentsList) [...] 23. Let iteratorRecord be Record {[[iterator]]: CreateListIterator(argumentsList), [[done]]: false}. 24. If hasDuplicates is true, then [...] 25. Else, b. Let formalStatus be IteratorBindingInitialization for formals with iteratorRecord and env as arguments. [...] 13.3.3.6 Runtime Semantics: IteratorBindingInitialization BindingRestElement : ... BindingPattern 1. Let A be ArrayCreate(0). [...] 3. Repeat [...] b. If iteratorRecord.[[done]] is true, then i. Return the result of performing BindingInitialization of BindingPattern with A and environment as the arguments. [...] ---*/ var callCount = 0; class C { * #method([...{ length }]) { assert.sameValue(length, 3); callCount = callCount + 1; } get method() { return this.#method; } }; new C().method([1, 2, 3]).next(); assert.sameValue(callCount, 1, 'method invoked exactly once');
Forbes columnist Steven Salzberg and author-investigator Joe Nickell will each be awarded the 2012 Robert P. Balles Prize in Critical Thinking, to be presented by the Committee for Skeptical Inquiry at the CFI Summit in October. Imported Paranormal Beliefs in Taiwan Despite parental worries over Buddhist brainwashings of students at a temple-sponsored camp last summer (China Post 1996d,e,f,g),1 Taiwan has so far been spared much of the cult madness that elsewhere captures headlines, from the Texas shoot out with Branch Davidians to the Aum Shinri Kyo gas attacks on the Tokyo subway system. That doesn't mean, however, that people here are immune to nutty ideas imported from other lands. For instance, the true popularity here of UFOs may be hard to gauge, but when the China Post (1995) ran an editorial encouraging the study of UFOs in the schools, skeptical hackles were raised.2 In a letter to the editor, Tim Holmes (1995) of the Taiwan Skeptics delivered a telling riposte. Whereas the paper printed his letter, public lectures by UFO buffs don’t usually admit any questioning. I attended one such free presentation during an island-wide blitz by believers in 1995. As a door prize they offered Streiber-alien look-alike dolls. The slide show was a “Best of National Enquirer” tour de force, at which I thought everyone would double over laughing. Seeing as how the audience seemed to be taking everything in and being taken in, I ventured to question the plausibility of a slide which allegedly showed a U.S. bomber that had been transported by aliens to the dark side of the moon. My comment was greeted with stony silence, and my escort scolded me for breaching Chinese etiquette, which does not permit the raising of “problems” for a speaker. (Wen-ti, the Chinese word for question, is also the word for problem). In short, no public questions allowed — unless requested by the speaker at the end. Catch-22, in Chinese. Another cult practice here apparently has its fountainhead in India. The supposed medicinal benefits of drinking one’s own urine made quite a splash in the media (Graves 1996; China Post 1996a,b). A television station aired an “investigative report” in which a credulous and somewhat flushed reporter watched mainly older men and women wash, gargle, and even swallow what they said was their own urine. The practice seems to be limited to small handfuls of devotees throughout the country, though the media gave “estimates” of tens of thousands of believers — based on reports from the adherents themselves. Tim Holmes (1996) tells me he has neighbors who assure him they practice urine therapy, which is said to cure disease and lead to a longer life. Taiwan is part of that exotic Orient which has embraced Western technology and even adopted democratic electoral procedures. Behind all the hustle and bustle of daily life is the world of commonly shared cultural beliefs, some of which extol the paranormal or perpetuate pseudoscience. While many of these strike Westerners as quite odd, others at root are similar to widely held beliefs in the Occident and elsewhere. Certainly this sketch, and the one previous, in no way exhaust the world of the weird in Taiwan. Notes Two sixth-graders who attended that same camp joined my English class in the fall; they said they had not been harangued in any way. The same newspaper subsequently reported that a woman had “sat in a bathtub for three years” (China Post 1996c). To the paper’s credit, they decided in the end that the family making the report “might have exaggerated.” Content copyright CSI or the respective copyright holders. Do not redistribute without obtaining permission. Articles, reports, reviews, and letters published on the CSICOP.org website represent the views and work of individual authors. Their publication does not necessarily constitute and endorsement by CSI or its members unless so stated. Thanks to the ESO for the image of the Helix Nebula, also NASA, ESA and the Hubble Heritage Team for the image of NGC 3808B (ARP 87).
[Chemical and pharmacological study of Phragmites communis Trin]. A chemical study of the aerial parts of Phragmites communis Trin. concerning free amino-acids, fatty acids, sterols, tocopherols and polyphenols has been carried out. The amino-acids content was studied at two different periods (winter, summer) in order to elucidate differences. The isolated polyphenols were investigated for antibacteriophage properties.
Q: How to determine if a cell formula contains Constants? When debugging or Quality Checking an Excel report at work I have found that the problem was because of text being hard coded inside a formula. I have heard this as being a Constant and Formula mixed cell. Here are examples of what I see. Constant =100 Constant =Facility Formula cell =INDIRECT(ADDRESS(5,MATCH($A7&$B7&C$2,Data!$4:$4,0),,,$A$2)) Mixed cell =INDIRECT("Data!"&ADDRESS(5,MATCH($A7&$B7&C$2,Data!$4:$4,0))) "Data!" is the Constant in the mixed cell, in this case the sheet name. If that sheet name ever changed, the formula would break. I have found and am using two conditional formats to highlight cells that are Constants and those that are formulas using this "Identify formulas using Conditional Formatting". I need to come up with a way to format those cells which contain these Constants inside of formulas. I have found this question and tried using =IF(COUNT(SEARCH(CHAR(34),A1,1)),TRUE,FALSE) and FIND() to see if I could check if a cell had double quotes inside of it, but the SEARCH() returns FALSE since it is looking at the cells value and not it's contents. It returns TRUE if the cell contains "Constant" but if it is a formula it returns FALSE, such as if the cell contains ="Constant". How can I find Constants inside formulas across a whole worksheet or workbook? EDIT* Thanks to Sidd's code below I have made a function in a module I can use in conditional formatting to at least highlight cells that contain quotes inside the cells. Function FormulaHasQuotes(aCell) If InStr(1, aCell.Formula, """") Then FormulaHasQuotes = True Else FormulaHasQuotes = False End If End Function A: Let's say your sheet looks like this. Is this what you are trying? Sub Sample() Dim ws As Worksheet Dim aCell As Range, FRange As Range '~~> Set this to the relevant sheet Set ws = ThisWorkbook.Sheets("Sheet1") With ws '~~> Find all the cells which have formula On Error Resume Next Set FRange = .Cells.SpecialCells(xlCellTypeFormulas) On Error GoTo 0 If Not FRange Is Nothing Then '~~> Check for " in the cell's formula For Each aCell In FRange If InStr(1, aCell.Formula, """") Then Debug.Print "Cell " & aCell.Address; " has a constant" End If Next End If End With End Sub When you run the above code, you get this output Cell $A$2 has a constant Cell $A$5 has a constant Note: I have shown you how to do it for a sheet, i am sure you can replicate it for all sheets in a workbook?
They all claim to be the only ones who understand the Bible and that they interpret scripture 'literally.' All human judgements can err but the Scriptures cannot and do not err, therefore they themselves are the ultimate and final authority in matters of faith and practice. You will say about this, that it leaves everyone to judge for themselves what the Scriptures mean, and so it is, by necessity. Even if someone chooses to believe that whatever the Church says must be correct, they have chosen what to believe. The question is, have they believed the right thing for the right reasons. The Church saying that the Church is right because the Church is right is not a reason. And if someone says, you can’t know what the Scriptures are apart from the Church telling you what they are, I would need to ask, “What Church?” and “How do you know that?” If they say it is from the Scriptures, they have shown their argument to be circular and largely meaningless, because they would have needed to reference Scripture itself in order to know what Scripture was. Sounds way too much like sola scriptura and is therefore flawed. Scriptures don't err--those misinterpretations are all pilot errors. Every single protestant who told me scriptures don't err then proceeded to bend, twist, wrangle, and skew their meanings so as to bear little if any semblance to the words on the page. Read "Sola Scriptura: an Orthodox Analysis of the Cornerstone of Reformation Theology" by Fr. John Whiteford. This method is what has lured 'ten-percenters' into the delusion that they have the right to interpret scripture any way they see fit. These people end up thinking they can just mold God and the Bible into not what it is but what they want it to be, and then run off and start a new sect. I've seen numbers between 20,000 and 38,000 referring to how many Christian denominations there are. Sola Scriptura is the battle axe of the disgruntled. Between A) not reading the Bible at all and B) reading it but woefully misinterpreting and then misrepresenting it to others, I'd bet God would rather you choose option A and just go get hooked on Sudoku. Umm, nobody's saying servicemen don't deserve respect. ISTM what Akimori's saying is that being a veteran doesn't mean we're obliged to take the veteran's opinions on matters not pertaining to his service as the final word. Like when I say the Marine Corps has the best looking uniforms out of all the branches of the US military. That the Word of God is not self-justifying seems problematic, since it seems to be the methodology of Jesus. What Scriptures did Jesus (or the Apostles) use? Greek Septuagint? Hebrew text? Aramaic Targums? And I speak as though there was one Septuagint, one Hebrew text, etc., which there were not.* And this also ignores that the Jewish Bible was not set in stone at the time Jesus lived anyway (nor, IMO, was it even set, as is sometimes claimed, at the later Council at Jamnia). This is not to say that I necessarily disagree. For example, to "All human judgements can err" I said "Says you." I actually agree with that one. My point is that you are throwing these chains of ideas out there as though they are self-evidently true, when they are not. In fact, I think you have some of them completely bass-ackwards. *Actually that's a fairly amusing thing--that many of the "extra" books in the Septuagint were written after the traditional time/date for the creation of the Septuagint, putting an exclamation point on this collection of texts being a work on progress over the course of a couple centuries. They all claim to be the only ones who understand the Bible and that they interpret scripture 'literally.' The Church saying that the Church is right because the Church is right is not a reason. Really? You seem quite comfortable accepting "the Scriptures" as inerrant and perfect, and yet the very Scriptures you trust are only "the" Scriptures because of the Church saying these Scriptures are "the" Scriptures because the Church says so By the way, I seriously applaud your faith if you can live with only the Bible, that is remarkable. No disrespect or sarcasm, I am serious. You haven't been trolling, and you've been polite enough to read our responses and consider and reply. Clearly you have faith in the authenticity of the Scriptures as miraculous, which they are. However, and this is the meaning of life, when we become convinced by faith that the Scriptures are the word of God, we must then ask ourselves, "If these Scriptures are God speaking to me, where did they come from? Where can I get more of this?" The answer is the Church As for me, I came to Church exactly because of the Scriptures, but because the Scriptures come from the Church. It is like reading any novels, if you enjoy a particular book, you look for more by that author. In this case, if you love the Bible, you should come to the Church where the Bible comes from, because in the Church, we love the bible too! stay blessed,habte selassie Logged "Yet stand aloof from stupid questionings and geneologies and strifes and fightings about law, for they are without benefit and vain." Titus 3:10 You haven't been trolling, and you've been polite enough to read our responses and consider and reply. Clearly you have faith in the authenticity of the Scriptures as miraculous, which they are. Thank you. I do have great love for the Scriptures. I have been playing the devil's advocate, though, and arguing from a Protestant POV. I just don't think I could ever make a good Lutheran, Anglican or Methodist even if I wanted to. It seems that in the end I am stuck with Orthodoxy. You haven't been trolling, and you've been polite enough to read our responses and consider and reply. Clearly you have faith in the authenticity of the Scriptures as miraculous, which they are. Thank you. I do have great love for the Scriptures. I have been playing the devil's advocate, though, and arguing from a Protestant POV. I just don't think I could ever make a good Lutheran, Anglican or Methodist even if I wanted to. It seems that in the end I am stuck with Orthodoxy. If you're feeling 'stuck,' then explore another faith. If your heart's not in it, then in coming to church, you're only taking your body for a walk. I fault no one for considering other options. Realize that every church on earth is armed with compelling arguments, and through all that, you have to sift through and find the truth. It's like trying to find a needle in a stack of needles, and not just any needle will do. You weren't responding to me but I'm Italian and female so I'm going to respond anyway--I can be just as wrong as the next guy. You've got to make your own choices. You haven't been trolling, and you've been polite enough to read our responses and consider and reply. Clearly you have faith in the authenticity of the Scriptures as miraculous, which they are. Thank you. I do have great love for the Scriptures. I have been playing the devil's advocate, though, and arguing from a Protestant POV. I just don't think I could ever make a good Lutheran, Anglican or Methodist even if I wanted to. It seems that in the end I am stuck with Orthodoxy. You don't have to be "stuck" with anything. Some people create a hybrid of religions while worshiping no one - that's called Unitarian Universalists. Quote Our Unitarian Universalist faith has evolved through a long history, with theological origins in European Christian traditions. Today Unitarian Universalism is a non-creedal faith which allows individual Unitarian Universalists the freedom to search for truth on many paths. While our congregations uphold shared principles, individual Unitarian Universalists may discern their own beliefs about spiritual, ethical, and theological issues. You haven't been trolling, and you've been polite enough to read our responses and consider and reply. Clearly you have faith in the authenticity of the Scriptures as miraculous, which they are. Thank you. I do have great love for the Scriptures. I have been playing the devil's advocate, though, and arguing from a Protestant POV. I just don't think I could ever make a good Lutheran, Anglican or Methodist even if I wanted to. It seems that in the end I am stuck with Orthodoxy. You don't have to be "stuck" with anything. Some people create a hybrid of religions while worshiping no one - that's called Unitarian Universalists. Quote Our Unitarian Universalist faith has evolved through a long history, with theological origins in European Christian traditions. Today Unitarian Universalism is a non-creedal faith which allows individual Unitarian Universalists the freedom to search for truth on many paths. While our congregations uphold shared principles, individual Unitarian Universalists may discern their own beliefs about spiritual, ethical, and theological issues. I share your love of the scriptures, though I do stand by my earlier points. But, I also agree that it doesn't help to broadly lambast all Protestants for proclaiming themselves to be the one true church or condemning to hell anyone who does not agree with them. The Church I left was one that held to a unity among Protestants. Even ironically Protestants that didn't share that view and would be all to happy to condemn them. I know some of that sort also. I have been playing the devil's advocate, though, and arguing from a Protestant POV. I just don't think I could ever make a good Lutheran, Anglican or Methodist even if I wanted to. It seems that in the end I am stuck with Orthodoxy. Well, that explains a few things. So is there any actual crisis of faith that we can help with? Not that there has to be, of course, just wanting to be helpful if needed. Logged Psalm 37:23 The Lord guides a man safely in the way he should go. Prov. 3: 5-6 Trust in the Lord with all your heart, lean not on your own understanding; in all your ways acknowledge Him, and He will direct your paths. You haven't been trolling, and you've been polite enough to read our responses and consider and reply. Clearly you have faith in the authenticity of the Scriptures as miraculous, which they are. Thank you. I do have great love for the Scriptures. I have been playing the devil's advocate, though, and arguing from a Protestant POV. I just don't think I could ever make a good Lutheran, Anglican or Methodist even if I wanted to. It seems that in the end I am stuck with Orthodoxy. Big Chris, judging from many of your recent posts and ideas, you seem to be stuck in a lucid state of doubt and uncertainty. If you do not mind my advice, I would recommend perhaps spending a period of time at a monastery or performing something ascetic like a solitary fasting period or something. Maybe it would help you clear out your mind and decide what you want to do. Logged Until I see the resurrection of the dead and the life of the world to come, I will not believe. I can't help but think of all the intelligent men, more experienced in Church history than any of us here, who lived and died as Protestants - men like Bruce Metzger, Henry Chadwick, Dietrich Bonhoeffer, Francis Schaeffer, etc.. If it was good enough for them, why not me? Do you know what everyone on the board knows? If not then how can you assume that the ones you named know more about Church history than everyone here? You do know that their are college professors as well as others here who either don't post as much or not at all, but they are here. I chatted with a couple through e-mail. Also, as a former protestant, I already know of alot of various protestant church history scholars from different protestant churches. Everything from the churches of christ, to Baptist, Anabaptist, to Methodist, to Lutheran, Presbyterian, Anglican, Congregationalist to even Assembly of God. And so I already know about a number of them. I knew about a good chunk of them even way back in my protestant years. And so there is nothing wrong in reading good secondary and Tertiary protestant sources when it comes to church history, but nothing beats reading the primary sources for yourselves. I personally do both! It's a hobby of mine since 1997/1998. Quote There's a large non-denominational church right down the road from me. There is no such thing as non-denominational. Why not read history books about the various kinds of Protestantism? I've noticed what you said about "One Holy Catholic and Apostolic Church". Do you know what the bishops of 381 A.D. believed about that? They believed it meant all those who were in communion with them at the time. That is what it originally meant. The nonsense of a lower "c" catholic is nothing more than a modern protestant concept that they read back into the text. What I've noticed over the years is that it's best to read multiple protestant sources when it comes to church history for you won't get the full scope nor the full depth of everything if you just rely on one. But what I would like you to do is read the pre-nicene fathers, nicen fathers, and post nicene fathers for yourself, along with the protestant, Roman Catholic, and Orthodox church historians. Then compare them when it comes to the issues of: 1.) The Trinity, especially in regards to the role of the Father. Pay attention to the details and see who is more faithful to the original interpretation 2.) Christology, pay attention to the details, and see which group is more faithful to the 3rd, 4th, 5th, and 6th Ecumenical councils and the theology behind those councils. 3.) The Church (Apostolic Succession included.....for you will see that when you read some of the fathers and witnesses), pay close attention to the details and see which group/groups is more faithful to the interpretations of the first 1,000 years. 4.) The Eucharist and Water Baptism, pay close attention to the details and see which groups are the closest to the interpretations of the first 1,000 years. 5.) Free Will, pay very close attention to the details and see which group is more faithful when it comes to this issue. Do this and then you will understand why most protestant groups will be automatically crossed out when it comes to the issue of what is the Historic Christian Faith. What it always was and what it always will continue to be! « Last Edit: June 05, 2012, 04:09:04 AM by jnorm888 » Logged "loving one's enemies does not mean loving wickedness, ungodliness, adultery, or theft. Rather, it means loving the theif, the ungodly, and the adulterer." Clement of Alexandria 195 A.D. Even someone like Maximum Bob admits to at one time being honestly confident of his call to be a minister and various other paths. Someone like? I don't know that I used the word confident anywhere but it was a fair and accurate thing to imply from what I said. Honestly, I think you're the only person participating in this thread who intimately understands what I'm currently experiencing. Perhaps that's for no other reason than you, too, have not yet fully committed yourself to Orthodoxy, or maybe it's because you're capable of seeing the good and unity among Protestants. Quote So is there any actual crisis of faith that we can help with? Not that there has to be, of course, just wanting to be helpful if needed. What I should have said is that these last few posts I've been using some "strong" Protestant objections a la Christopher Neiswonger, a Protestant my own age whom I sort of envy for many reasons but mostly because he's thoroughly convinced of the Protestant dialectic and can defend such with great rhetorical skills. There is definitely a crisis, though. In my heart of hearts, I currently think Orthodoxy is the summit of my spiritual journey. My faith in Christ has never been more stable. Even as I've wrestled with thoughts of becoming Lutheran or Anglican, it's been Orthodoxy that has sustained my faith and my prayer life. And my thoughts continually refer back to my OCA priest, whom I now regard as a spiritual father. I don't think I'm so much worried about 'what if Protestantism is right' but rather 'what if Orthodoxy is wrong'. While I truly am amazed that a respected scholar like James. D.G. Dunn can be Methodist or N.T. Wright can be Anglican, convinced as they might be of the invisible church rhetoric and other doctrinal matters, I can't see either Methodism or Anglicanism working for me, sustaining my faith. Though I've read Luther, and even agreed with him and some 20th century Lutheran theologians on several points, becoming Lutheran still seems like a regression for me. What I've realized from reading Luther is that I disagree with the ecclesial and doctrinal structure of Roman Catholicism - yet, the developments in Lutheranism since Luther are, if nothing, less than satisfactory. They certainly haven't been stable. I think the faith of Bonhoeffer closely resembles Orthodoxy more than Lutheranism these days. Realizing this, though, two things concern me: There was a time when I was thoroughly convinced that the RCC was the true, apostolic church. However, I also now realize that the reason why I believed this is because Orthodoxy was barely on my radar, the mission church which I currently attend was then holding Liturgy in a hotel room, and I blindly accepted some apologist's claim that EO was schismatic. Now, having read about the history of the churches much more thoroughly, having researched the ECF, and having become disaffected with the current abuses of the RCC, I am more convinced now that I can no longer remain RC and must seek shelter elsewhere. However this is where my second concern comes in: Convinced as I may be about the historical roots of EO and their connection to contemporary Orthodoxy, realizing that Orthodoxy is most likely the best soil to plant my roots, being an inquirer and having to go through the catechumenate process makes me feel alienated, homeless and in limbo. I feel like a shipwrecked sailor clutching a piece of driftwood hovering over the abyss. And it is for this reason that I'm grasping for any reason whatsoever not to become Orthodox. Even someone like Maximum Bob admits to at one time being honestly confident of his call to be a minister and various other paths. Someone like? I don't know that I used the word confident anywhere but it was a fair and accurate thing to imply from what I said. Honestly, I think you're the only person participating in this thread who intimately understands what I'm currently experiencing. Perhaps that's for no other reason than you, too, have not yet fully committed yourself to Orthodoxy, or maybe it's because you're capable of seeing the good and unity among Protestants. Well, while I thank you, I would like to think that resigning my ministerial credential and leaving the church I went to for 20 years would show I was rather committed to Orthodoxy (unless you mean "the less than a Catechumen" part of my faith statement), so lets assume this is about seeing the good and unity among Protestants. If so, that is true. I have said before my leaving Protestantism was less about leaving and more about coming, to Orthodoxy. I don't hate Protestantism and while I think there are some mistakes in how the Protestant churches view things, as previously noted, I also do see much sincerity in those Churches as well. I know a lot of these people. I've seen what some are trying to do, from the inside. I don't see it as all show. I know there are people in Protestantism who are sincerely trying to follow God with all their hearts. On this forum I have criticized Protestantism but I've also defended it. In this, however, let me say I'm not alone on the forum, there are many who have been here much longer than I who have done the same. There is definitely a crisis, though. ... I don't think I'm so much worried about 'what if Protestantism is right' but rather 'what if Orthodoxy is wrong'. Okay, so there is a confidence issue here, that's understandable. It seems to me that it's part and parcel of such a change. Having once been confident of something when we loose that and go to something else it's doubly hard to gain that confidence again, after all we were wrong before... Realizing this, though, two things concern me: ... There was a time when I was thoroughly convinced that the RCC was the true, apostolic church. However, I also now realize that the reason why I believed this is because Orthodoxy was barely on my radar,... For me too but not the RCC rather the Protestant church I was part of. I have spent much time as noted studying the EOC, but also some studying the RCC, the Oriental Orthodox church, the Assyrian Church of the East, splinters from these and even many of the Protestant cults. I can say with some confidence now that I don't think there's anything flying below my radar, but then we don't know, what we don't know, do we. I think at some point we just have to let go of the unknown and operate on faith, that God want us more than we want him and will guide us to truth if we seek it. ...this is where my second concern comes in: Convinced as I may be about the historical roots of EO and their connection to contemporary Orthodoxy...being an inquirer and having to go through the catechumenate process makes me feel alienated, homeless and in limbo. I feel like a shipwrecked sailor clutching a piece of driftwood hovering over the abyss. And it is for this reason that I'm grasping for any reason whatsoever not to become Orthodox. So I think I hear you saying here that your tempted to reject Orthodoxy before it rejects you. Rather to truly argue those opposite positions to see them fail so they're not hanging over your head as things that might be, or simply as a very human defence mechanism I don't' know. Either way your about as patient as I am I see. The one word that concerns me though is "alienated", don't know if there's much there or not but it makes me wonder if you feel welcome and at home with the people of your church. That is a boon, I feel lucky to have the people of our new church have definitely shown us love. I wish you well my friend and pray God's mercy and grace be upon you. Logged Psalm 37:23 The Lord guides a man safely in the way he should go. Prov. 3: 5-6 Trust in the Lord with all your heart, lean not on your own understanding; in all your ways acknowledge Him, and He will direct your paths. However this is where my second concern comes in: Convinced as I may be about the historical roots of EO and their connection to contemporary Orthodoxy, realizing that Orthodoxy is most likely the best soil to plant my roots, being an inquirer and having to go through the catechumenate process makes me feel alienated, homeless and in limbo. I feel like a shipwrecked sailor clutching a piece of driftwood hovering over the abyss. And it is for this reason that I'm grasping for any reason whatsoever not to become Orthodox. Big Chris, I have been following this thread and think I also know what you are going through. I left a denomination that considered itself as the only correct religion and all others as heretic and bound for perdition (they do not express this as much now). When I left and after looking into the other faiths I was bound and determined to never join another organized religion. I did not want to get burned again. After a few years I found Orthodoxy. As a former Spiritual Father expressed to me; "Orthodoxy is Catholicism without additions and Protestantism without subtractions". There is truth in every faith but the orthodox church has the fullness of the faith handed down of the Apostles. If you are comfortable with some one at you parish, ask them be you sponsor. Use them as your sounding board, they may even accompany you in you journey as a catechumen. You do not have to do this alone. I was lucky mine was my wife. This is just my humble opinion and very simplistic but it worked for me. If you are comfortable with some one at you parish, ask them be you sponsor. Use them as your sounding board, they may even accompany you in you journey as a catechumen. You do not have to do this alone. I was lucky mine was my wife. The only person I currently feel comfortable talking to at my parish is my priest, yet I am reluctant to express any feelings of doubt to him because I fear that will only delay my ability to join the catechumenate and ultimately become Orthodox. I expressed some doubt to him once before and he was quick to nearly dismiss me. While I do understand the importance of being fully open with our spiritual fathers, I think much of what I'm currently experiencing will resolve itself in time. Within the span of this thread alone, I have flip-flopped many, many times. If I had burdened my priest with these thoughts, I think an inaccurate cariacture would have been formed. When my fiance attended DL with me for the first time, everybody was very gracious to us. Since then, as I've attended by myself (because she has been unable to), I almost have to pull teeth to get some friendly interaction. Perhaps people have become more comfortable with my presence, but, even so, no relationships are being formed no matter how hard I try to engage conversation. The last DL I attended a couple of weeks ago, I was sitting during Matins to rest my lower back, and this woman walks again and stands right in front me, not even one foot away, like I wasn't even there even though the whole church was practically empty. In a couple more weeks, my fiance will start attending DL with me on a regular basis, and I bet you anything that suddenly these people will become interested again. Single men are strange, but couples are received warmly. The only person I currently feel comfortable talking to at my parish is my priest, yet I am reluctant to express any feelings of doubt to him because I fear that will only delay my ability to join the catechumenate and ultimately become Orthodox Given your wrestling, I'd slow it down and make sure its what you want, and what is comfortable for you. The LAST thing you want is to be a Catechumen and be Chrismated or baptised doubting all the way. Quote I expressed some doubt to him once before and he was quick to nearly dismiss me I think that is the wrong way to approach it. Casting you out does not help you grow spiritually. Seems to me that he just needs to spend more time addressing your concerns. Quote While I do understand the importance of being fully open with our spiritual fathers, I think much of what I'm currently experiencing will resolve itself in time Possibly, but time alone wont do it. Voicing your concerns and having them addressed will help give you peace about them. Quote When my fiance attended DL with me for the first time, everybody was very gracious to us. Since then, as I've attended by myself (because she has been unable to), I almost have to pull teeth to get some friendly interaction. Perhaps people have become more comfortable with my presence, but, even so, no relationships are being formed no matter how hard I try to engage conversation. The last DL I attended a couple of weeks ago, I was sitting during Matins to rest my lower back, and this woman walks again and stands right in front me, not even one foot away, like I wasn't even there even though the whole church was practically empty. In a couple more weeks, my fiance will start attending DL with me on a regular basis, and I bet you anything that suddenly these people will become interested again. Single men are strange, but couples are received warmly I personally think that this is more of a perception thing, but I'd definitely bring that to your priest's attention. PP Logged "I confidently affirm that whoever calls himself Universal Bishop is the precursor of Antichrist"Gregory the Great "Never, never, never let anyone tell you that, in order to be Orthodox, you must also be eastern." St. John Maximovitch, The Wonderworker Perhaps people have become more comfortable with my presence, but, even so, no relationships are being formed no matter how hard I try to engage conversation. That could be the case I know in our Parish after someone has been there few times they become "a common sight". I fear that some try not to press this person, while others just dismiss the need to reach out. I know I have (to my sham) been one to not want to press the visitor. I would welcome the opportunity to be a supporter/guide if asked. I just want to throw this out there, as well, but not necessarily in response to anyone in particular... During Lent, a young couple in our parish lost their newborn infant only moments after it was born. My heart truly went out to them, and I prayed for them. As is typical, the Psalter was chanted during the all-night vigil. Being capable of chanting the Psalms myself, I wanted to share in their sorrow by helping to chant the Psalms but I'm not allowed to because I'm not Orthodox - and that just seems ridiculous to me. You need to have passed through the initiatory clubhouse rites before chanting the Psalter in a time of need?? The sign-up list of volunteers for the chanting was practically empty and I would have been glad to have chanted from 3 AM to 5 AM, but no - I am not allowed. So, it's almost like my non-christmation is standing in the way of forming any relationships. I do not know if this correct or not but I was told that the chanter is an actual position in the church and therefore requires one to be of the body. I do not know if there is any special blessing or ritual needed to performed to become a chanter. I have seen non-orthodox families being allowed to read from the Psalter in honor of their Orthodox family member, especially in convert parishes and small missions. I believe it is based upon the charism of the priest to determine if he will allow it for such a situation. Apparrently the parish priest either felt he could not or was encouraging members of the church family to step up and do their last duty to the child. I can't help but think of all the intelligent men, more experienced in Church history than any of us here, who lived and died as Protestants - men like Bruce Metzger, Henry Chadwick, Dietrich Bonhoeffer, Francis Schaeffer, etc.. If it was good enough for them, why not me? Whilst these are very smart men, I think that if you take a step back and question the Protestant paradigm/ideology itself, you would find that it leaves a lot to be desired - particularly philosophically. Many Calvinists like the late Francis Schaeffer are very smart. But they operate within a system of thought that they have accepted from the start. To be an very good apologist for an ideology such as Calvinism says nothing about its goodness. I happen to believe that the philosophical foundations of Calvinism are so barren that you almost have to believe that God is something close to being simply wicked to accept it. But once you accept Calvinism, then yes, you kind make all sorts of clever arguments in support of it. Those Protestants that know intuitively that there is something utterly wrong with the fundamentalists often end up being liberals who compromise on some of the most important doctrines or they leave the faith altogether. Think of Bart Ehrman. A fiercely intelligent man. He rejected Christianity because the foundations of the fundamentalist positions he once believed in are philosophically untenable. E.g. Inerrancy of Scripture (as formulated by fundamentalist Protestants) and so on. Being a textual scholar, he knew that the inerrancy position of fundamentalists is simply wrong. And he's right about that. Unfortunately, because he is a child of the Enlightenment, he can't think outside the sort of scholastic tradition that he is accustomed to. In other words, concepts that are central for Orthodox Christians ar like "mystery" are simply incomprehensible to people like Ehrman. I would also add that in the history of Christendom, those who come from a high church tradition have been, by far, the most intellectually convincing. In modern times think of high church Anglicans such as CS Lewis and NT Wright. Roman Catholics such as Chesterton and Tolkien. Eastern Orthodox such Dostoevsky, Richard Swinburne and Pelikan. These intellectuals are not only great apologists for their respective denominations, but are very highly regarded across Christendom and by secularists also. The Protestant intellectuals you name above are really only big names in the evangelical sub culture in America. Men like Dostoevsky and Lewis are able to transcend sectarian boundaries. I think this is because there is truth in what they are saying. Intelligent people intuitively know that the god of modern evangelicalism is based on legal fictions (e.g. penal substitutionary atonement). Ontologically, Protestant fundamentalism is indefensible. It can not stand up to scrutiny beyond the boundaries of evangelical sub culture. That is why fundamentalist evangelicals have retreated from secular universities and have to set up their own institutions. They have simply lost the intellectual argument and are now fearful the outside world.
Non obstructive high-risk plaque but not calcified by coronary CTA, and the G-score predict ischemia. The association of plaque morphology with ischemia in non-obstructive lesions has not been fully eludicated: Calcium density and high-risk plaque features have not been explored. to assess whether high-risk plaque or calcified, and global mixed including non-calcified plaque burden (G-score) by coronary CTA predict ischemia in non-obstructive lesions using non-invasive fractional flow reserve (FFRCT). In 106 patients with low-to-intermediate pre-test probability referred to coronary 128-slice dual source CTA, lesion-based and distal FFRCT were computated. The 4 high-risk-plaque criteria: Low-attenuation-plaque, Napkin Ring Sign, positive remodelling and spotty calcification were recorded. Plaque density (HU) and stenosis (MLA,MLD,%area,%diameter stenosis) were quantified. Plaque composition was classified as type 1-4:1 = calcified, 2 = mixed (calcified > non-calcified), 3 = mixed (non-calcified > calcified), 4 = non-calcified, and expressed by the G-score: Z = Sum of type 1-4 per segment. The total plaque segment involvement score (SIS) and the Coronary Calcium Score (Agatston) were calculated. 89 non-obstructive lesions were included. Both lesion-based and distal FFRCT were lower in high-risk-plaque as compared to calcified (0.85 vs 0.93, p < 0.001 and 0.79 vs 0.86, p = 0.002). The prevalence of lesion-based ischemia (FFRCT<0.8) was higher in high-risk-plaque as compared to calcified (25% vs. 2.5%, p = 0.007). Similarly, the rate of distal ischemia (40% vs 17.5%) was higher, respectively. Lower plaque density (HU) indicating higher lipid plaque component (p = 0.024) predicted lesion based FFRCT in low attenuation plaque. For all lesions (n = 89) including calcified (p = 0.003), the correlation enhanced. Positive remodelling and an increasing non-calcified plaque burden (G-score) in relation to calcified were associated with lower FFRCT distal (p = 0.042), but not the SIS and calcium score. High-risk-plaque but not calcified, an increasing lipid-necrotic-core component and non-calcified mixed plaque burden (G-score) predict ischemia in non-obstructive lesions (INOCA), while an increasing calcium compactness acts contrary.
Morphological, anatomical, and ultrastructural changes (visualized through scanning electron microscopy) induced in Triticum aestivum by Pb²⁺ treatment. Lead (Pb) causes severe damage to crops, ecosystems, and humans, and alters the physiology and biochemistry of various plant species. It is hypothesized that Pb-induced metabolic alterations could manifest as structural variations in the roots of plants. In light of this, the morphological, anatomical, and ultrastructural variations (through scanning electron microscopy, SEM) were studied in 4-day-old seedlings of Triticum aestivum grown under Pb stress (0, 8, 16, 40, and 80 mg Pb(2+) l(-1); mild to highly toxic). The toxic effect was more pronounced in radicle growth than on the plumule growth. The SEM of the root of T. aestivum depicted morphological alterations and surface ultrastructural changes. Compared to intact and uniform surface cells in the control roots, cells were irregular and desiccated in Pb(2+)-treated roots. In Pb(2+)-treated roots, the number of root hairs increased manifold, showing dense growth, and these were apparently longer. Apart from the deformity in surface morphology and anatomy of the roots in response to Pb(2+) toxicity, considerable anatomical alterations were also observed. Pb(2+)-treated root exhibited signs of injury in the form of cell distortion, particularly in the cortical cells. The endodermis and pericycle region showed loss of uniformity post Pb(2+) exposure (at 80 mg l(-1) Pb(2+)). The cells appeared to be squeezed with greater depositions observed all over the tissue. The study concludes that Pb(2+) treatment caused structural anomalies and induced anatomical and surface ultrastructural changes in T. aestivum.
Q: Is it possible to get an UPDATED environment variable once a Node.js script is running? How can one retrieve an updated environment variable once a node script is already running? Consider the following gulp task. How can you update the environment variable Z (i.e., from some other script running on the system) so that the function outputs different values after it's running? As is, environment variables set elsewhere are ignored and the function always outputs 'undefined'. gulp.task('z', function () { var z; setInterval(function(){ z = process.env.Z; console.log('Value of Z is: ' + z); }, 1000); }); Running Windows 7. I have tried both set and setx but nothing will persist into the running node script. I wouldn't think this is possible since you generally can't pass environment variables between command prompts without re-launching them (and using setx). But then again SO users are special and I've been surprised before. Is this even possible? A: Yes it's possible. There are many options actually. You can pass variables between multiple scripts with 'inter process communication (IPC)'... The easyest option is probably to do it via sockets, ie with use of redis. Advantage of this is that you can also use it to communicate between processes running on different devices, if this would be required in the future. Another option is to do it via the built in process signalling: https://nodejs.org/api/process.html#process_signal_events There are many other options/library's with each their pro's and cons. For scalability you are probably best of when you do the communication via sockets, If performance is very important you can choose for an option which uses shared memory. In this question are multiple options discussed; What's the most efficient node.js inter-process communication library/method?
% Generated by roxygen2: do not edit by hand % Please edit documentation in R/blockquoter.R \name{blockquoter} \alias{blockquoter} \title{Convert to blockquote} \usage{ blockquoter() } \value{ a markdown blockquote } \description{ Turn the selected text into a blockquote. } \examples{ \dontrun{ remedy_example( c( "to_blockquote"), blockquoter ) } }
import { Component } from "@angular/core" import "self/common/styles/IntroductionDemos.css" @Component({ selector: "IntroductionDemos", template: ` <div class="IntroductionDemos"> <div class="center-text"> <span class="button-row"> <button *ngFor="let d of demos" (click)="demo = d" [ngClass]="{ selected: d === demo }"> {{ d }} </button> </span> </div> <ComponentDemo [files]="getFiles(demo)" [ngSwitch]="demo"> <ChuckNorrisComponent *ngSwitchCase="'ChuckNorris'"></ChuckNorrisComponent> <PokeApiComponent *ngSwitchCase="'Pokeapi'"></PokeApiComponent> <HackerNewsComponent *ngSwitchCase="'HackerNews'"></HackerNewsComponent> </ComponentDemo> </div> ` }) export class IntroductionDemosComponent { demos = [ "HackerNews", "Pokeapi", "ChuckNorris" ] demo = this.demos[0] getFiles(demo) { return [ `./components/Demos/${demo}/${demo}.component.ts`, `../common/styles/${demo}.css`, `./components/Demos/${demo}/models.ts` ] } }
At least three rockets struck Baghdad's fortified Green Zone near the United States Embassy late Tuesday, the fourth such attack in the span of a week. It came a day after an attack on a training base south of the capital, where US-led coalition troops and NATO trainers were present, Iraqi security officials said. At least three rockets struck the Green Zone, the seat of Iraq's government and home to several foreign embassies, two Iraqi security officials said. More: Myles Caggins, a spokesman for the US-led coalition, said the rockets fell at least 2km (1.2 miles) from the embassy. There were no immediate reports of casualties. The previous evening, rockets hit the Basmaya base near the Iraqi capital, an Iraqi army statement said. The projectiles landed in an area that includes agricultural land and a factory, according to the statement. No more details were provided. A Spanish contingent of the coalition and NATO trainers are present at the Basmaya site. There was no immediate confirmation of the attack from the coalition, and no armed group claimed responsibility. Camp Taji Last Wednesday, a barrage of two dozen rockets struck Camp Taji, north of Baghdad, killing three coalition servicemen, including two Americans. A British serviceman was also killed. It was the deadliest raid to target US troops in Iraq since a late December rocket attack on an Iraqi base, which killed a US contractor and set in motion a series of attacks that brought Iraq to the brink of war. Wednesday's barrage was followed by another raid, on Saturday at the same site, which wounded five soldiers - three coalition members and two Iraqi soldiers. The first attack prompted American air strikes on Friday against what US officials said were mainly weapons facilities belonging to Kataib Hezbollah, the Iran-backed militia group believed to be responsible for the attack. However, Iraq's military said those air strikes killed five security force members and a civilian, while wounding five fighters from the Popular Mobilisation Forces, an umbrella organisation including an array of militias, including some Iran-backed groups. Iran-backed Shia militia groups vowed to exact revenge, signalling another cycle of tit-for-tat violence between Washington and Tehran that could play out in Iraq.
Mel Gibson Case: Far From Over The Mel Gibson-Oksana Grigorieva case is far from reaching a conclusion, according to several well-placed sources within the law-enforcement community. L.A. County Sheriff's Department investigators are in "absolutely no rush" to formally turn the Mel Gibson case over to the L.A. County District Attorney. In reality, TMZ reports, this is because the D.A. already has the case. The official line from the Sheriff's Department was that the goal was to turn the case over to the D.A. by Tuesday. Tomorrow is still possible, however, they feel "no pressure" to hit that date and a source said, "It will get there when it gets there." Sources connected with the case say it really doesn't matter when the case is turned over from the police to the legal authorities, because the prosecutor assigned to the case is fully engaged in the process and already knows the deal. Moreover, the D.A. will not make any decision on whether to file charges until the investigation into extortion allegations against Oksana Grigorieva ends. That is reportedly not happening soon, and the D.A. will be treating both cases as a "package deal," and make filing decisions on both at the same time.
They say nothing good happens after midnight – and the latest evidence is a violent brawl that unfolded in a Seattle International House of Pancakes location at three in the morning on Sunday. In the early hours of May 5, a brouhaha erupted when Brian Culpepper hit another man in the IHOP, the Springfield News-Sun reports. According to the outlet, Culpepper later told police he got offended when he overheard the other man, who has not been named, and his “mixed-race” girlfriend talking about “African Americans and church,” prompting him to interject. Culpepper alleges that the man used a racial slur and told law enforcement officials “he didn’t want to look like a punk” by standing idle, as per KIRO 7. IHOP LAUNCHES NATIONAL MILITARY MONTH CAMPAIGN TO BENEFIT CHILDREN OF FALLEN SERVICE MEMBERS The man, who has not been named, has since denied that he used the slur. As seen in an eighteen-second video clip shared to Twitter — which has since gone massively viral with nearly four million views — Culpepper and the man appear to be engaged in conversation when he forcefully slaps the fellow customer, who is seated, on the head. Witnesses can be heard shrieking at the sight, as an IHOP staffer appears to attempt to step between the two men. The slapped man pushes the staffer out of the way and fists fly, as the man tackles Culpepper to the ground, with tables and place settings coming tumbling down. The News-Sun reports that Culpepper went on to “hit the other man with a chair,” according to surveillance video — though that assault was not captured in the video shared to social media. FOLLOW US ON FACEBOOK FOR MORE FOX LIFESTYLE NEWS Customers were able to eventually break the two men apart, charging papers say, as per KIRO 7. "I was just trying to have an omelet,” Dunia Matamoros, the customer who filmed the video, told the News-Sun of the frightening fight. "Everybody was like, ‘I can't believe that just happened.’" Seattle police responded to the scene, arresting Culpepper and booking him into jail. He has since been served a felony second-degree assault charge. Law enforcement officials later revealed that Culpepper was intoxicated at the time of the attack, and had previously been convicted of assault, according to the outlet. A charging decision is expected to be made today. As for the man who was first attacked, he reportedly wants to "move on" from the episode, the News-Sun reports. Police said that he had a cut underneath his eye, and swelling on his face when they arrived at the restaurant. CLICK HERE TO GET THE FOX NEWS APP Mischievous Twitter commenters, meanwhile, couldn’t resist throwing out breakfast-centric puns in replying to the wild clip. “That’s how the pancakes be hitting the skillet,” one said of the forceful blows. “Them pancakes ain’t never coming out,” another agreed.