text
stringlengths
8
5.77M
Q: "to further assist [you]" -- Split infinitive or fixed VP? From a descriptive standpoint (and the problem that English has at least two words in an infinitive), I understand why the split infinitive is becoming more acceptable, but is there any other excuse for this phrasing used by phone CSRs? "I'd be happy to direct you to the bank to further assist you." "I'd like to transfer you to the sales department to further assist you." "I have Diana on the line, and she'll be happy to further assist you." Is it simply the case that Star Trek syntax triumphs again, or does it somehow sound funny to say "to assist you further?" (I would not consider "further to assist you" an acceptable solution.) To clarify, is there a fixed syntagm of a VP "to further assist" versus an issue of split infinitive? Is "further" bound in the domain of "to assist?" A: English does not always have at least two words in an infinitive. This is a common misconception, possibly resulting from the facts that the to-infinitive form is met with far more commonly than the bare infinitive in common constructions in the past, dictionaries would pick up on this, and give an entry for 'to swim' rather than 'swim' etc. This practice is happily falling off. Examples: I want to wash my hair tomorrow. I didn't dare wash my hair in that new shampoo. (to optional here) I helped wash the dishes. (to optional here) So "I'd be happy to further assist you." doesn't split an infinitive but a to-infinitive. That said, what about the practice of 'splitting to-infinitives'? According to G. Pullum [ucsc.edu], this 'rule' is a myth: Myth: You must never split an infinitive. Pullum responds: Hemingway didn't write the phrase "to really live" by mistake; it is perfect English. "To" introduces infinitival verb phrases, and "really live" is an infinitival verb phrase (containing a preverbal adverb). Nothing is split in this form of words.
Serum disappearance and urinary excretion of sulfamethoxypyridazine in goats. Pharmacokinetics and urinary excretion of sulfamethoxypyridazine were determined in goats following single intravenous administration (100 mg/kg body weight). The disposition kinetics of sulfamethoxypyridazine could be best described by a 2-compartment open model. The distribution and elimination half life of the drug were 0.10 +/- 0.03 and 6.28 +/- 0.44 h, respectively. The values of apparent volume of distribution at steady state and total body clearance were found to be 0.39 +/- 0.02 l/kg and 0.73 +/- 0.06 ml/kg/min, respectively. The degree of acetylation was low as it ranged between 4.49 +/- 1.96 to 25.07 +/- 6.31% of the total drug in serum with an overall mean of 11.99 +/- 1.66%. Cumulative urinary excretion of sulfamethoxypyridazine was very low as only 2.97 +/- 0.50% of the total administered dose was excreted in urine during 24 h. The dosage regimen in goats would be 37.00 and 27.15 mg/kg body weight as the priming and maintenance doses respectively, to be repeated at 12 h intervals by intravenous route to achieve the bacteriostatic level of > or = 25 micrograms/ml.
Q: What does chord-suffix mean? I would like to know how to play extended/add chords on the guitar, for example Cadd9 here. I want to systematize chords and draw diagrams of them. What does "Сadd9" or "С+9" mean? Can chords such as "C+10" or "С-5" exist? What does "A/C" mean? Can "A/A" or "B/A" exist? Where can I see diagrams of chords? A: Cadd9 is a C major triad with the 9th note from that scale added. C E G D. C+9 is rather a different beast. It has an augmented 5th note, and because it's a 9th, will include the m7 too. Thus C E G# Bb D. Don't be fooled into thinking 'add' and '+' are the same! C+10 wouldn't make a lot of sense, since usually the affected numbers are 5, 7, 9, 11 13, but would be C E G# E, not sounding any different from a standard C augmented (C+). The '-' sign usually means 'minor', so -5 can't exist. A/C would be an A major chord, with a C as the bass under it. Strange sounding again!. Yes, A/B is used a fair bit, in jazz, and A/C# is just the first inversion of A major, with the third at the bottom. There are many sites which show 'chord boxes', some more accurate and helpful than others. Have a look at some chord theory, which will help you understand what's in this and other answers, and clear up some of your misunderstandings. We all had (and still have) some ourselves! Basic formula: start with triad (CEG). For 'add' the commonest one is 9. So add D. Yes, it's 2 as well, but doesn't sound good against the 3 (D again!), or sus 4, using F to replace E. The '+' augments an interval. Usually P5. So C+ uses C E G#, where G# is aug.5. With a '7' in the chord, if it's major 7, it uses the major 7 note (surprise!) so C E G B. If it's dominant 7, it uses m7, so C E G Bb. If it's m7, it uses min. triad - C Eb G - with m7 of Bb.
The Many Benefits of Choosing Beldon® Doors With Beldon® Doors installed on your home, you can make a positive first impression on guests who visit your home for years to come with our front and storm doors or make the entrance to your backyard even more inviting with our patio doors. Whether you want to replicate your existing entryway, or go in a bold new direction, we can help you customize your doors so that they beautifully complement the existing aesthetics of your home. Plus, our doors are built using high-grade materials, so they will provide your residence with many benefits. What Sets Beldon® Doors Apart? When you choose Beldon® for exterior doors, you will benefit from: Increased curb appeal – Our doors are available in a wide range of colors and styles, as well as options for hardware and decorative accents like sidelights and transoms. Energy efficiency – All of our doors are ENERGY STAR® rated, and our fiberglass entry doors are among the most energy efficient available on the market thanks to features such as an insulating foam core, custom bottom sweeps, and insulation channels in the side rails and header. Security – We offer entry doors made from one continuous piece of 20-gauge steel and are also equipped with steel inserts behind the hinges and reinforcements around the lock and deadbolt area, providing the ultimate security. Ease of operation – Our patio doors are constructed to glide easily open and closed well after installation, and our front and storm doors are built out of durable materials that will not warp, rot, or expand even after years of exposure to the elements, so your doors will remain easy to operate. For more information on our entry, storm, or patio doors, contact Beldon® today. We are happy to discuss your many options and set up a complimentary consultation at your home. *New orders only. Discount applied by sales representative at time of contract execution. The installation cost equals to approximately 12% of the total project cost. Void where prohibited by law or regulation. Offer may be cancelled without prior notice. Loans provided by EnerBank USA, Member FDIC, (1245 Brickyard Rd., Suite 600, Salt Lake City, UT 84106) on approved credit, for a limited time. Repayment term is 60 months. 4.99% fixed APR, effective as of January 1, 2019. Minimum loan amounts apply. The first monthly payment will be due 30 days after the loan closes. Offer Expires 01/31/19. Windows Restrictions *New orders only. The Visa Gift Card will only be provided after installation and the job being paid in full. Minimum purchase of $5,000 required for Visa Gift Card promotion. Loans provided by EnerBank USA, Member FDIC, (1245 Brickyard Rd., Suite 600, Salt Lake City, UT 84106) on approved credit, for a limited time. Repayment term is 60 months. 4.99% fixed APR, effective as of January 1, 2019. Minimum loan amounts apply. The first monthly payment will be due 30 days after the loan closes. Offer Expires 01/31/19. Siding *New orders only. The Visa Gift Card will only be provided after installation and the job being paid in full. Minimum purchase of $5,000 required for Visa Gift Card promotion. Loans provided by EnerBank USA, Member FDIC, (1245 Brickyard Rd., Suite 600, Salt Lake City, UT 84106) on approved credit, for a limited time. Repayment term is 60 months. 4.99% fixed APR, effective as of January 1, 2019. Minimum loan amounts apply. The first monthly payment will be due 30 days after the loan closes. Offer Expires 01/31/19. San Antonio Residential Roofing Restrictions *$250 Bonus VISA gift card with purchase will be mailed after installation and payment in full. Loans by Synchrony Bank. Offer applies only to single-receipt qualifying purchases. A promo fee will be charged and included in the promo purchase balance equal to $50. No monthly interest will be charged on the promotional balance if you pay the following (the “promotional balance”) in full within 18 Months: 1) the promotional purchase amount, and 2) any related promo fee. If you do not, monthly interest will be charged on the promotional balance from the purchase date. Depending on purchase amount, promotion length and payment allocation, the required minimum monthly payments may or may not pay off purchase by end of promotional period. Regular account terms apply to non-promotional purchases and, after promotion ends, to promotional balance. For new accounts: Purchase APR is 26.99%; Minimum Interest Charge is $2. Existing cardholders should see their credit card agreement for their applicable terms. Subject to credit approval. Other restrictions may apply. Offer expires 12/31/18. *Thank you for your interest in Beldon®. We are excited about the opportunity to serve you and we will contact you soon. If you enter a cell phone number or a number that later converts to a cell phone number, you agree we may contact you at this number via an automated dialing system. Normal cell phone charges may apply. By submitting my information I give Beldon® permission to contact me to discuss Beldon®’s products.
So, I went myself to Thursday night’s meeting of Berkeley’s Landmarks Preservation Commission, and not to unduly prolong the suspense, they voted to do the will of Berkeley’s corporate masters, as expected. That is to say, they declined to designate Campanile Way on the University of California campus as a historic resource worthy of preservation, neither the road itself which is on campus nor the view from the Campanile out to the Golden Gate, which encompasses a fraction of the middle of the city of Berkeley and sweeps out over the Bay. This account is much too long, so unless you’re interested in gory details you could stop reading now. Plus ça change, plus c'est la même chose. I went not as a news reporter, which most often I’m not at this phase of my life, but wearing another hat, as one of the several former LPC commissioners who were present to express their opinion. (That would be a metaphorical hat—the best physical hat in the room was the flowered bonnet worn by a designation opponent who identified him/herself as Alfred, and who wore a lovely ‘60s prairie dress to go with it.) What I found most surprising, as I told the commission, was how candidly the commissioners who voted against the designation announced their enthusiasm for downtown skyscrapers, specifically for the Mark Rhoades scheme which will demolish the home of the Shattuck Cinemas, aka 2211 Harold Way. When I was on the commission, back in the distant placid pre-Planet days, we were not supposed to make decisions based on our opinion of any projects proposed to replace the designated landmark. I gently chided Chair Austene Hall, a very nice lady and (disclosure) a friend of mine, for allowing proposed projects to dominate the discussion—the several curmudgeonly chairs who ruled the LPC with an iron hand in my day would never have tolerated this. Landmarks Commissioners are charged with impartially evaluating the merits of the building, landscape or view which has been brought before them. Designation is not destiny, a concept which some of the commissioners on Thursday pretended not to understand—unless they are actually ignorant of it, which is possible. All landmark designation does is add an extra level of scrutiny to the permitting process. If (just to pick a random example) the L.A. financier who’s targeted the Shattuck Cinema building were to ask for it, the Berkeley City Council would be able (and likely) to grant a permit for a building which would block a landmarked view simply by adopting a statement of overriding considerations in the Environmental Impact Report process. Thursday’s decision just pumps up the parcel owner’s profits another notch by making that step unnecessary. Nick Dominguez, the commissioner specially appointed by my new District 8 Councilmember Lori Droste for this meeting, admitted that he understands the concept. I suggested that he would get another bite of the apple even if he voted for designation, since he’s also Droste’s appointee to the Zoning Adjustment Board, which gets to rule on permits for 2211 Harold Way. When announcing his vote on Thursday he said that he thought downtown development, especially of housing, was more important than landmark preservation. He’s entitled to his opinion, but when he’s appointed to sit on the Landmark Preservation Commission it’s an odd place to express it. Presumably he reflects the opinion of his principal, Councilmember Droste. However when the commissioners were asked, several times, to reveal any “ex parte” discussions they might have had with others outside the meeting, including their appointersk, he didn’t say that he’d talked to her about this project. Maybe not, but it seems odd that she’d appoint him with no interview or anything. And it seems even odder that Mayor Tom Bates’ appointee, Kimberly Suczynski Smith, didn’t disclose any conversation with the Mayor or his staff, given that her predecessor Rose Marie Pietras was fired because she openly supported designating Campanile Way. Did the Bates people really appoint a successor without talking to her about this project? Of course it would have been possible to guess how she’d vote, given her employers. Suczynski Smith works for Oakland’s Pyatok architecture firm, which has designed at least one major dorm on the UC Campus (one of the nicer ones) and she also lectures in UC’s College of Environmental Design. It’s hard to imagine that she’d vote against what the University wants. And what the newly-privatized University of California at Berkeley wants to do with downtown Berkeley is not hard to figure out. If there’s any doubt, the embarrassing performance of Emily Marthinsen, Assistant Vice Chancellor, Physical and Environmental Planning, would give you more than a clue. She testified in the public hearing on the designation by reading from a printed script. Her excuse was that she was so busy with family Passover preparations that she just didn’t have time to speak ex tempore, but hard to imagine, again, that U.C. honchos didn’t demand to vet her testimony beforehand. To get the full flavor of the performance, the first thing you should know is that she used to be Steve Finacom’s boss. Steve is a distinguished longtime Berkeley resident, past president of the Berkeley Historical Society, board member of the Berkeley Architectural Heritage Association, regular local history columnist for the Bay Area News Group papers, occasional contributor to the Berkeley Daily Planet and Berkeleyside.com, past LPC commissioner and one of the authors of the Campanile Way Landmark application. Steve used to work for the U.C. office which used to be called Capital Projects, but is now called Real Estate Services. In that job, he was part of the team that wrote U.C. Berkeley’s Landscape Heritage Plan and Landscape Master Plan. Along with several one of his colleagues, Steve was recently laid off by Marthinson, just about the time that the name of the office was changed from Capital Projects to Real Estate Services. The name change reflects a new role: Now the remaining staff in the transmogrified department, headed by a new guy whose former job was as a developer, is busy “monetizing resources” in NewSpeak—or “giving private developers a piece of the action” in plain English. If there’s any question in your mind about what that’s going to mean for the U.C.B. campus, just take a look at the plug-ugly parking structure which has erupted on Gayley Road next to the deep-in-debt Memorial Stadium extravaganza and debacle. U.C.’s leased the land to a private corporation which built the garage and collects the revenue. One of Marthinson’s online descriptors is UC Berkeley’s “Campus Planner”—and if that’s still her job, she should be deeply ashamed of allowing that hideous building to be placed in such a sensitive spot. Her script started out by claiming that the University would remain neutral on whether Campanile Way should be landmarked, but then it went on to slam Finacom’s application six ways from Sunday. The most transparently ridiculous aspect of her presentation was claiming that the application’s quotes from the Landscape Heritage Plan didn’t reflect what the Plan writers intended—but Finacom himself was one of them. Obviously, there’s been a paradigm shift along with a name change in the office where he used to work. And the Mayor’s Commissioner Kim Suczynski Smith didn’t say, I don’t think, a single word during the whole evening. When Steve asked if the new members had listened to the tapes from the previous hearings, she just nodded a bit. There was a kind of deer-in-the-headlights demeanor about her. From her resume, which mentions community planning, I’d guess that she knows better, but she voted the way U.C. wanted, though without apparent enthusiasm. The rest of the hearing testimony was lively. About 40 knowledgeable and articulate people spoke in favor of the designation, some of them tried and true preservationists, but with a sizeable contingent of born-again Save the Shattuck Cinema activists, who have collected at least 4,000 signatures from opponents of the Harold Way project. The University’s faculty and staff, current and retired, were well represented too, including among others Nad Permaul, a U.C. Political Science faculty member, a past president of the alumni association and a retired top U.C. Berkeley administrator, who spoke very movingly about the historic vision of the campus. Former Mayor Shirley Dean, for years an ally of some of the councilmembers who appointed the negative LPC commissioners, also made an eloquent presentation. There were just 8 or 9 speakers who opposed the designation. Among these, only a couple even mentioned whether Campanile Way and its bay view qualified under Berkeley’s Landmark Preservation law. That’s probably because most of them were from elsewhere, knew nothing about landmarks, and had simply come to tell the LPC that they really really did want better housing for themselves, hopefully in Berkeley. I recognized some as adherents of the tiny San Francisco BARF group (Bay Area Renters Federation), recently in the business press because founder and top dog Sonja Trauss was personally gifted with $10,000 by a Yelp founder just because, he claimed, he likes what she’s doing. She was there in person, a bundle of nervous energy, surrounded by her claque. To me they appeared more pathetic than threatening. They are pretty ordinary young people (now defined as under 40—most looked like 30-somethings). They seem to believe, mostly, that building the kind of luxury apartments now planned for downtown Berkeley and being erected in quantity in San Francisco will somehow result in older homeowners moving out and turning their houses over to the BARFies and their ilk. It’s a kind of sad cargo cult mentality. It seemed almost cruel to tell them that the folks who now live in nice (hugely over-valued) middle-class houses in Berkeley are just not about to sell out so they can move into fancy downtown condos, even the ones with bay views and marble counters in the kitchen. In Berkeley, Palo Alto and elsewhere, “ageing in place” is the new trend, and luxury developments will be primarily pieds-a-terre for the jet set of the 1%, just like they are all over the developed world. About those views, by the way. The worst performance on a generally depressing commission roster was by one Paul Schwartz, appointed by District 6 Councilmember Susan Wengraf. He went on and on, ad nauseam, about how the view from the Berkeley Rose Garden was much nicer than the view from the Campanile, and also it was nearer to his house, where the view was even nicer. I realized, belatedly, that a substantial portion of the Berkeley electorate, the people who voted for the councilmembers who appointed this bunch of commissioners, already live in houses with perfectly gorgeous views of the Bay and the Golden Gate, which makes a publically accessible view like that from the Campanile much less precious to them. They don’t have to care what happens downtown, because they never have to go there. An increasing number of them are Berkeley snowbirds, people who hold down good jobs on the East Coast or in the Midwest but can escape to view houses in our town when the weather Back East is annoying. Some of them even live here almost year-round, particularly some leftish journalistic types, though I’ll name no names. The vote Thursday was on the staff-written motion to deny the application, a draft remarkable for the total absence of factual findings to support its conclusion. (This might constitute grounds for appeal.) So who voted how? No surprises here. If you know who are the pro-corporate conservatives, the progressives and the chronic waffler on the Berkeley City Council, you can predict how their appointees voted: For denial: Mayor (Tom Bates) Kimberly Suczynski Smith; District 2( Darryl Moore) Mary Canavan; District 5 (Laurie Capitelli) Tom Beil; District 6 (Susan Wengraf) Paul Schwartz; District 8 (Lori Droste) Nicolas Dominguez Against denial: District 3(Max Anderson)Christopher Linvill; District 4(Jesse Arreguin) Austene Hall; District 7(Kriss Worthington) Anne Wagley Abstain: District 1(Linda Maio) Dmitri Belser . Looking at that lineup, it becomes apparent that those who actually run Berkeley behind the scenes, the hired staff, viewed the LPC’s public hearing, like all encounters with the public, as sound and fury signifying nothing. The remedy might be found in the 2016 election, when (surely!) Tom Bates will finally have retired. Betting is still on District 5 Councilmember Laurie Capitelli to get anointed and maybe appointed to the mayor’s seat before Bates leaves. Several lively progressives are being talked about for competition, as well as for open council seats, which will probably include those of Wengraf and Capitelli. But with the views in the hills still nirvana-like, it might be hard to achieve a progressive council majority. [And how about Berkeley’s real housing needs? Listen up, kiddies. No amount of luxury apartment construction will ever buy you homes in the hills. The same remedies are still needed to provide housing for moderate and low-income people: tough inclusionary zoning for developments, realistic in-lieu fees on development to fund building workforce housing, rent control, vacancy decontrol. And yes, a livable minimum wage, even for UCB service employees.]
Oral biofilms and cyclic dinucleotides {#s1} ====================================== Oral biofilms form part of the healthy oral environment and there is a well-balanced equilibrium between bacteria and the host. Two most common infection-driven diseases of the oral cavity, periodontitis, and caries, are the outcomes of the disruption in this equilibrium. Periodontitis is a periodontal pathogen-induced disease, where chronic inflammation initiates degradation of tooth-supporting tissues, including the gingival epithelium, periodontal ligament, and alveolar bone (Darveau, [@B7]). Caries occurs when the acid metabolites of cariogenic bacteria dissolve dental structures: enamel and dentin. As a matter of fact, the oral cavity acts as a reservoir of bacterial pathogens for systemic infections and several oral microorganisms have been linked to systemic diseases, i.e., *Actinomyces* species to brain abscesses (Könönen and Wade, [@B14]), *Parvimonas micra* to septic arthritis (Baghban and Gupta, [@B3]), and *Streptococcus mutans* and *Porphyromonas gingivalis* to atherosclerotic plaques (Fernandes et al., [@B8]). The oral cavity is a dynamic environment; eating, drinking, and even sleeping affect the pH, temperature, salivary flow, and nutrition. Depending on population dynamics and environmental factors, the relationship amongst bacteria in the biofilm could be symbiotic or competitive. Several studies have already indicated that oral bacteria can communicate with each other via quorum sensing molecules (Shao and Demuth, [@B30]; Sintim and Gürsoy, [@B31]). One important signaling mechanism for bacteria to sense environmental stress and respond adequately is secondary messenger molecules. In this context, cyclic dimeric guanosine 3′,5′-monophosphate (c-di-GMP), a bacterial secondary messenger molecule has become a molecule of high interest, since elevated concentrations of c-di-GMP regulate many processes affecting the initiation and maturation of bacterial biofilms (Valle et al., [@B34]). This occurs through the c-di-GMP-regulated production of exopolysaccharides, synthesis of extracellular adhesins, and fimbriae (Sondermann et al., [@B32]). C-di-GMP levels in bacteria are regulated through synthesis by diguanylate cyclases and degradation by phosphodiesterases (PDE). Diguanylate cyclases, which have a GGD/EEF domain (diguanylate cyclases can have GGDEF or GGEEF domain and GGD/EEF is a short hand for these two domains), make c-di-GMP via the condensation of two molecules of GTP. Degradation of c-di-GMP is regulated by PDEs, which contain EAL or HD-GYP domains. These metabolism proteins, together with c-di-GMP binding proteins, such as PilZ, modulate the intracellular perception of c-di-GMP (Ryjenkov et al., [@B26]). A recent complete genome analysis of oral biofilm-associated bacteria revealed that the genomes of some oral bacteria, including *Capnocytophaga ochracea, Prevotella melaninogenica, S. mutans, Streptococcus gordonii, Fusobacterium nucleatum, Aggregatibacter actinomycetemcomitans*, and *Filifactor alocis*, do not carry GGDEF or GGEEF, EAL, HDGYP, or PilZ domains, while some other oral bacteria, such as *Treponema denticola* and *Selenomonas sputigena*, do (Römling et al., [@B25]). Recently, another bacterial second messenger, c-di-AMP has emerged as an important regulator of bacterial biofilm formation. This messenger molecule has a regulatory role in cell wall homeostasis, fatty acid synthesis, and biofilm formation (Opoku-Temeng et al., [@B22]). C-di-AMP is synthesized by diadenylate cyclases and degraded by PDEs. Several c-di-AMP receptors in various bacteria have been detected lately (Opoku-Temeng et al., [@B22]). However, there is a paucity of literature reports that have documented the presence of proteins containing diadenylate cyclase domains in oral bacteria. Cyclic dinucleotide signaling in oral bacteria has been under-studied and, hence, there is almost no information about how cyclic dinucleotides affect oral bacterial physiology and virulence. This perspective highlights the dearth of cyclic dinucleotide research in this important class of bacteria. Cyclic dinucleotides in oral bacteria ------------------------------------- ### Streptococcus mutans *S. mutans*, a gram-positive facultatively anaerobic coccus, is one of the primary etiological agent of dental caries. Soluble and insoluble extracellular polysaccharides of *S. mutans* promote the formation and maturation of dental biofilms. These polysaccharides mediate the initial adherence of *S. mutans* to the hard surfaces and to other oral bacteria. *S. mutans* can convert dietary sugars into acids very efficiently. Inside biofilms, a constant accumulation of acids on tooth surface facilitates the demineralization of enamel (Selwitz et al., [@B29]). Colonization of *S. mutans* is not limited to the oral cavity. For example, it can act as an opportunistic pathogen and lead to infective endocarditis (Avilés-Reyes et al., [@B2]). There is evidence that both c-di-GMP and c-di-AMP contribute to the regulation of oxidative response, extracellular polysaccharide matrix production, and biofilm formation of *S. mutans* (Yan et al., [@B35]; Cheng et al., [@B6]). Exogenous c-di-GMP was found to decrease adhesion and biofilm formation of *S. mutans* in a similar way as previously demonstrated for *Staphylococcus aureus* (Karaolis et al., [@B10]). According to the complete genome analyses of *S. mutans* UA159 (Ajdić et al., [@B1]), this bacterium does not have any GGD/EEF domain (Römling et al., [@B25]). However, Yan et al. ([@B35]) reported that a conserved hypothetical protein, AAN59731 (encoded by the *gcp* gene), in *S. mutans* UA159 could act as a diguanyl cyclase when cloned into *E. coli*. The authors, however, did not provide any detailed data to substantiate this claim. AAN59731 does not contain the classical GGDEF domain so it appears that modified GGDEF domain proteins may also act as diguanyl cyclases. To conclusively demonstrate that AAN59731 is indeed a bona fide diguanyl cyclase, despite lack of a classical GGDEF domain, a biochemical and structural characterization of AAN59731, and detection of diguanyl cyclase activity and quantification of intracellular c-di-GMP when AAN59731 expression is induced are needed. In any case, a *gcp* knockout *S. mutans*, which is not able to produce AAN59731, does not form typical biofilms, providing further circumstantial evidence that AAN59731 could be a diguanyl cyclase (Yan et al., [@B35]). Deletion of the *cdaA* gene coding for a diadenylate cyclase in *S. mutans* resulted in reduced c-di-AMP levels, an increased production of extracellular polysaccharides, and elevated sensitivity to hydrogen peroxide in this bacterium (Cheng et al., [@B6]). Yet, a confirmatory study on the role of the *cdaA* gene showed opposite results; the *cdaA*-mutant *S. mutans* produced less extracellular polysaccharides than the wild-type, thus questioning the relation between diadenylate cyclase and the extracellular polysaccharide production (Peng et al., [@B23]). PDE that degrades c-di-AMP has been found in PdeA protein of *S. mutans*. Deletion of the *pdeA* gene (the gene that encodes c-di-AMP degrading PDE) or overexpression of diadenyl cyclase (the enzyme that produces c-di-AMP) increases intracellular c-di-AMP levels and biofilm formation (Peng et al., [@B24]). C-di-AMP regulated extracellular polysaccharide production and biofilm formation are dependent on glucosyltransferases (Peng et al., [@B24]). ### Treponema denticola *T. denticola* is an oral spirochete that is strongly associated with periodontitis. The *T. denticola* genome encodes proteins with GGD/EEF, EAL, HD-GYP, PilZ, and putative c-di-GMP binding proteins (Römling et al., [@B25]) and has at least two c-di-GMP binding proteins (Bian et al., [@B4]). Bioinformatic analyses reveal that each c-di-GMP signaling-related protein harbors diverse sensor domains, and these proteins according to biochemical analyses, enable the bacterium to sense and adopt environmental changes (Bian et al., [@B4]). Using a high performance liquid chromatography as the detection method, Kostick et al. ([@B15]) reported the presence of intracellular c-di-GMP levels, while Bian et al. ([@B4]) failed to detect c-di-GMP in *T. denticola*. The latter report suggested that TDE0214, a putative c-di-GMP binding protein in *T. denticola*, TDE0214, could regulate motility, chemotaxis, and biofilm-related virulence mechanisms of the bacterium. Moreover, lack of TDE0214 led to a reduced bacterial invasiveness and abscess formation of *T. denticola* in an *in vivo* mouse-infection model (Bian et al., [@B4]). ### Porphyromonas gingivalis *P. gingivalis* is an obligately anaerobic and mainly asaccharolytic bacterium. Even as a small part of periodontitis-associated biofilms, its ability to cause dysbiosis makes it a keystone pathogen in human periodontitis (Olsen and Hajishengallis, [@B18]). Although it has been previously predicted that there are no diguanylate cyclases in *P. gingivalis* (Römling et al., [@B25]), a more recent work has shown that *P. gingivalis* actually makes c-di-GMP (Chaudhuri et al., [@B5]). Some of the bacteria that have been predicted to lack a functional c-di-GMP system can indeed have one. Cyclic dinucleotide signaling in oral pathogens is worthy of further studies, since insights could lead to the development of novel therapies against oral biofilm-related infections. Methods to detect cyclic dinucleotides {#s2} ====================================== Many methods have been developed to detect c-di-GMP in both cell lysates and in live bacteria. A high performance liquid chromatography and an ultra-performance liquid chromatography-tandem mass spectrometer are the methods of choice for a sensitive detection of c-di-AMP and c-di-GMP in bacterial cell lysates, but they both are inappropriate for live imaging of cyclic dinucleotides. A competitive enzyme-linked immunosorbent assay was developed as a simple method for the quantification of c-di-AMP levels in bacteria, however, the minimum detection limit (10 nm) of this method does not allow to measure c-di-AMP in culture media or in host cells (Underwood et al., [@B33]). Sintim and his co-workers demonstrated that low levels of c-di-GMP can be detected using a c-di-GMP riboswitch that was fused to a spinach aptamer (Nakayama et al., [@B16]). Later, the Hammond group adopted this design and modified a version of the riboswitch-spinach aptamer to detect c-di-GMP in live bacteria (Kellenberger et al., [@B11]). A limitation of this approach is the need to transform bacteria before c-di-GMP can be imaged. Detection of intracellular cyclic dinucleotides in oral bacteria would allow us to understand their adaptive properties against a changing environment. However, oral bacteria live in multispecies biofilms where they have a continuous interaction, which potentially regulates their secondary messenger molecule formation and degradation. We tested this hypothesis in a dual bacterial co-culture model using *F. nucleatum* and four different selenomonads (*Selenomonas noxia, S. flueggei, S. artemidis*, and *S. sputigena*). *F. nucleatum* is a key species in dental biofilms by facilitating the colonization of periodontitis-associated pathogens by coaggregation-mediated mechanisms, and many *Selenomonas* spp. are known to coaggregate well with *F. nucleatum* (Kolenbrander et al., [@B13]). In our experiments, the four *Selenomonas* spp., i.e., *S. flueggei* (64 × 10^7^ CFU), *S. sputigena* (59 × 10^7^ CFU), *S. noxia* (64 × 10^7^ CFU), and *S. artemidis* (65 × 10^7^ CFU), were cultured, either alone or together with *F. nucleatum* (64 × 10^7^ CFU), in a reinforced clostridial medium at anaerobic conditions for 24 h. The bacterial cells were then centrifuged and the pellet was resuspended in 10 nm Tris-HCl containing 100 mM NaCl. Lysozyme (L6876, Sigma-Aldrich, St. Louis, USA) was added with a final concentration of 62.5 μg/ml. The samples were resuspended, sonicated, and heated to 90°C for 30 min, centrifuged once again, and extracted with CH~3~OH:CH~3~CN:H~2~O. The supernatants were centrifuged with Ultracel 3K centrifuge tubes (Amicon® Ultra-4 Centrifugal Filter Units, Merck Millipore, Germany) for 40 min at 4,000 g at a room temperature, and evaporated to dryness. Nucleotides were extracted and c-di-GMP levels were measured with ultra-performance liquid chromatography---tandem mass spectrometer. The numbers of bacterial cells in each group at the end of the experiment are given in Figure [1](#F1){ref-type="fig"}. According to our results, *S. sputigena* produced highest levels of c-di-GMP. Surprisingly, when co-cultured with *F. nucleatum*, c-di-GMP levels decreased nearly with 50%. This was an interesting finding, since it was expected that the co-culture of *S. sputigena* with *F. nucleatum* will increase its coaggregation and, hence, biofilm formation. However, reduced c-di-GMP levels indicate an increased motility and decreased biofilm formation (Figure [1](#F1){ref-type="fig"}). ![Low but detectable levels of c-di-GMP were detected. Whether the c-di-GMP were produced via bona fide synthases or from uncatalyzed condensations of GTP into c-di-GMP remain to be elucidated \[*Fusobacterium nucleatum* (F.n.), *Selenomonas noxia* (S.n.), *Selenomosan sputigena* (S.s.), *S. artemidis* (S.a.), *S. flueggei* (S.f.)\].](fcimb-07-00273-g0001){#F1} To date, the reported technologies for detecting of c-di-GMP in live bacteria have not been powerful or simple enough to use for the simultaneous detection of c-di-GMP in polymicrobial biofilms. The ultra-performance liquid chromatography-tandem mass spectrometer is a post sampling method and the spinach-riboswitch method requires transfection, which may not work with all bacteria. Secondly, it is unclear whether the biology that emerges from a transfected bacterium represents what happens in a native scenario. The development of easy-to-use and broadly applicable c-di-GMP and c-di-AMP detection methods for various oral bacteria enables the delineation of how cyclic dinucleotides affect signaling in oral biofilms. Biofilm inhibition and cyclic dinucleotides {#s3} =========================================== Disruption of biofilms by using molecules that interfere with cyclic dinucleotide regulation is a promising approach to fight against infectious diseases. In general, enhanced c-di-GMP levels intracellularly lead to biofilm formation, so it is expected that activators of PDE, inhibitors of diguanyl cyclases, or the supramolecular aggregation of the signaling molecules would inhibit formation (Kelsey et al., [@B12]; Nakayama et al., [@B17]). In this context, exogenous PDE was demonstrated to disperse *Pseudomonas aeruginosa* biofilms and reduce its biofilm formation (Hickman et al., [@B9]). Interestingly, the inhibition of RocR PDE in *P. aeruginosa* did not lead to enhanced biofilm formation but rather swarming inhibition, indicating that there are nuances to cyclic dinucleotide signaling and the interception of signaling with small molecules (Zheng et al., [@B36]). A few inhibitors of diguanylate cyclases have been identified or developed, and these were found to reduce bacterial biofilms (Opoku-Temeng et al., [@B22]). For example, diguanyl cyclase inhibitors can reduce *Vibrio cholerae* or *P. aeruginosa* biofilm formation (Sambanthamoorthy et al., [@B28], [@B27]). C-di-AMP is involved in biofilm formation as well as cell wall synthesis in gram-positive bacteria (Opoku-Temeng et al., [@B22]). The Sintim group has identified several small molecules that inhibit c-di-AMP synthases (Zheng et al., [@B37]; Opoku-Temeng and Sintim, [@B19],[@B20]) and some of these compounds inhibit the growth or biofilm formation of *S. aureus* (Opoku-Temeng et al., [@B21]). Conclusion {#s4} ========== Cyclic dinucleotides were discovered already 30 years ago. During the past decade, a renewed interest in these fascinating second messengers led to a tremendous progress in our understanding of how cyclic dinucleotides regulate bacterial lifestyle but also bacteria-host interactions. Oral microorganisms form some of the most intricate biofilms, yet c-di-GMP and c-di-AMP signaling, which regulate biofilm formation, have been rarely studied in oral bacteria. Perhaps this dearth of information on dinucleotide signaling in oral bacteria is due to initial bioinformatics predictions, stating that many oral bacteria do not harbor proteins that are capable of making or degrading cyclic dinucleotides. Recent, but still few reports, however, challenge this perception, and c-di-GMP or c-di-AMP signaling has now been recognized from some oral bacterial species. We encourage the scientific community to take a second look at cyclic dinucleotide signaling in putative oral pathogens, as there might be potential drug targets in dinucleotides that could be usable in preventing oral biofilm-related diseases like periodontitis. Author contributions {#s5} ==================== UG, MG, EK, and HS: Substantial contributions to the conception or design of the work, drafting and critical revision of the article, and final approval of the version to be published. Conflict of interest statement ------------------------------ The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. This study is partly supported by IADR/Philips Oral Healthcare Young Investigator Research Grant (MG) and Finnish Dental Society Apollonia (UG). [^1]: Edited by: Justin Merritt, Oregon Health & Science University, United States [^2]: Reviewed by: J. Christopher Fenno, University of Michigan, United States; Yuqing Li, State Key Laboratory of Oral Diseases, West China Hospital of Stomatology, Sichuan University, China; Zhoujie Xie, Institute of Microbiology (CAS), China
Recent Articles (AP Photo) I n the last few months, an unprecedented wave of labor unrest has shaken the retail giant Wal-Mart and its far-reaching supply chain. While the number of employees taking part in walkouts has been limited to the low hundreds , workers and labor activists are mounting pressure and threatening to stage a company-wide strike on Black Friday—the busiest shopping day of the year. The Black Friday walkout is being organized by the Organization United for Respect at Wal-Mart (OUR Walmart), a group of Wal-Mart employees formed last year that works closely with the United Food and Commercial Workers union, or UFCW. OUR Walmart, which organized walkouts in October, is pushing for better working conditions, benefits, and an end to alleged retaliation by management. The Black Friday strike would add yet another chapter to a wave of worker protests across Wal-Mart’s supply chain. It all began in June when a group of immigrant guest workers at a Wal-Mart seafood supplier in Louisiana... (AP Photo/ Manu Brabo) Free Syrian Army fighters are seen in a storage room in the Karmal Jabl district of Aleppo Syria, Sunday, October 14, 2012. Rolls of fabric are seen on the ground. T he conflict in Syria has escalated significantly in recent weeks. After months of mounting tension between Turkey and the Assad regime, the Turkish parliament took the step of authorizing cross-border military operations into Syria. Both sides have since exchanged artillery fire. As the political and military crisis deepens, The Prospect spoke with Steven Cook , Hasib J. Sabbagh Senior Fellow for Middle Eastern studies at the Council on Foreign Relations, about the nature of the conflict and the possibility of its resolution. Why has the Turkish government decided to escalate the conflict to this point? The question is whether the Turks have escalated or the Syrians have escalated. This all started when Syrian shells fell on the Turkish side of the border, killing Turkish civilians. The Turks had... The 2012 election is the fifth straight presidential election to feature no third-party candidates in the debates—and as a result, there's also a lack of engagement with issues that the two major-party candidates don’t want to discuss. The debates are organized by the Commission on Presidential Debates, a 501(c)(3) organization created by the Democratic and Republican national committees and funded by corporate sponsors. This year, as usual, the commission extended invitations to only the Democratic and Republican candidates—much to the chagrin of third-party candidates and the handful of nonprofit organizations committed to including more voices in the debates. “The commission survives on deception. ... It sounds like a government agency, but of course, it’s not,” said George Farah, executive director of Open Debates, a group leading the charge to include third-party candidates in the presidential debates. “Every four years, it allows negotiators, the Republican and Democratic... Frank Menzies started working in Chicago public schools in 2000 and is now the director of instrumental music at Jones College Prep, where he oversees the orchestra, concert band, and jazz group. He’s also the school’s head bowling coach. Menzies is a member of the Chicago Teachers Union (CTU) and one of the roughly 29,000 Chicago public school teachers that have been on strike since Monday. Why did you vote to go on strike? Many of the members in the CTU didn’t really want to do it, but we have understood that this is one of the mechanisms that is in place for union membership to try to bargain for a better deal. We are definitely in favor and desirous of a fair contract. The bottom line is the teachers did not really want to do it, but that [a strike] seemed to be one of the only avenues left to us to be able to try to get what’s necessary for us to have a fair contract. That’s the bottom line. The strike was brought about simply because teachers that love their students had no... Slideshow On Strike in the Windy City Twenty-nine thousand Chicago public school teachers walked off their jobs on Monday, after contract negotiations between the teachers union and the school board failed to produce an agreement. The Chicago Teachers Union is asking for a salary increase to compensate teachers for the city's newly implemented longer school day, smaller class sizes, and a de-emphasis on standardized testing.
On Monday 25 September 2000 I went to hear Nicky Gumbel and his ALPHA team in the Waterfront Hall in Belfast. According to the Belfast Telegraph advert [16 September] this was ‘An opportunity to explore the meaning of life’. In this assessment I want to focus exclusively upon my first hand encounter at the meeting with Nicky Gumbel’s ‘gospel’ presentation. 1. The whole thrust of Nicky Gumbel’s message focussed upon man and his problems – there was nothing said about the world and mankind as seen from God’s perspective. Those attending were never made aware that because of Adam’s sin/mankind’s fall, unsaved sinners in this world are “dead in trespasses and sins” [Ephesians 2:1] with the “wrath of God abiding on them” [John 3:36]. God’s love was mentioned frequently but “the fierceness of his anger” [Joshua 7:26] never got a mention. As a result there was no attempt to induce ‘reverent fear’ of the Lord which is of course the beginning of true “knowledge” [Proverbs 1:7]. 2. There was studiously no reference to or use of the word ‘sin’. Man’s problems were identified as ‘wrongdoings’ but never was any yardstick identified [ie God’s law, which of course is “the schoolmaster” ordained “to bring us unto Christ” Galatians 3:24] in the context and light of which man’s actions could be classified as ‘wrongdoings’. 3. The result of these ‘wrongdoings’ was apparently ‘guilt’ and ‘addiction’ and these are, we were told, what Christ can set people free from. Again reference to or use of the word ‘condemnation’ as found for example in John 3:19 was studiously avoided. 4. Jesus was presented as one who would be able to ‘satisfy’ people – Matthew 1:21 immediately sprang to my mind “Thou shalt call his name Jesus for he shall SAVE his people from their sins”. 5. The answer to what was being put across as what I can only call man’s ‘pity party’ is according to Nicky Gumbel friendship and companionship with God. Whilst that is in part true, the vital truth about the first step that can lead to such a relationship was hardly mentioned at all. The real answer to happiness with an ensuing friendship and companionship with God is found in Psalm 32:1 “Blessed is he whose transgression is forgiven, whose sin is covered’. Friendship was elevated and exalted above forgiveness as being the means to happiness for man. 6. A story was told of a man who retrieved a bottle from the sea and inside was a ‘will’ bequeathing money to whoever found the bottle. The man wasn’t going to bother about it but others encouraged him to ‘check it out’. He did and ended up inheriting a small fortune. People were then encouraged to likewise ‘check Jesus out’. Never at any time was the eternal consequence [ie a lost eternity in HELL – another word never referred to or used] spelt out for those who would not ‘check Jesus out’. 7. When Peter preached on the day of Pentecost those listening “were pricked in their heart” [Acts 2:37]. There was no attempt made to likewise confront people in the Waterfront Hall with the reality of and consequences of their lost and sinful condition because the truth was that Nicky Gumbel unlike Peter in Jerusalem and Paul in Ephesus ‘shunned to declare unto them all the counsel of God’ [Acts 20:27]. 8. Overall an inaccurate and incomplete view of God was presented and a faulty diagnosis of man’s problem was presented. Christ was presented as a ‘satisfier’ and not a ‘Saviour’. 9. Throughout the message a blatantly ‘free will’, ‘take it or leave it’ ‘Arminian’ view was presented and Nicky rounded his talk off with a typical easy-believism ‘sinners prayer’. 10. I do not for one moment doubt the sincerity and loving zeal of Nicky Gumbel. The problem is that he and Alpha are attempting to ‘evangelise’ people their way [they don’t offend people by confronting them with the truth about SIN] and are not evangelising people in God’s biblically ordained way. They prefer the Robert Schuller approach [he regards any attempt to make people aware of their lost and sinful condition as being ‘uncouth and unchristian’] as opposed to the John the Baptist approach – a straight forward approach where sin is concerned such as we find in John’s direct challenge to Herod about his sinful relationship with Herodias [Matthew 14:4]. This meeting served to confirm what I stated during my ALPHA talk in Belfast in May that the Alpha Course does not truly evangelise people. References also during the meeting by Nicky to Christians within a wide range of denominations including Roman Catholicism also served to demonstrate that ALPHA does not equip people to discern false ‘gospels’ such as the one presented in Roman Catholicism. In consequence it is clear that ALPHA does not present the answer to the ‘meaning of life’ because they fail in the light of biblical truth to clearly and accurately identify man’s true condition before God. Likewise, in the light of biblical truth they fail to clearly and accurately proclaim “the gospel” [see 1 Corinthians 15:1-4] of the Lord Jesus Christ who by His person and work alone can save man from his true condition and bring true ‘meaning to life’. could be as its the power of the spirit though baptism of fire which the first apostles had is missing in replace is mens skills the gained in the world keep it safe to much to loose house big pension nice car nice holidays complacency Hundreds of free downloads at foot of page with no ads Please note Inclusion on this site does not imply agreement with or endorsement of anything said by that individual or organisation elsewhere, or any links therein. Some information could be doctrinally unsound. Pray for guidance and discernment and test everything against the word of God. “Beloved, believe not every spirit but try the spirits whether they are of God, as many false prophets are gone out into the world.” (1 John 4:1) “They searched the scriptures daily whether those things were so.” (Acts 17:11) Please note Inclusion on this site does not imply agreement with or endorsement of anything said by that individual or organisation elsewhere, or any links therein. Some information could be doctrinally unsound. Pray for guidance and discernment and test everything against the word of God. “Beloved, believe not every spirit but try the spirits whether they are of God, as many false prophets are gone out into the world.” (1 John 4:1) “They searched the scriptures daily whether those things were so.” (Acts 17:11)
--- author: - | Georg Bergner\ Universität Bern, Institut für Theoretische Physik, Sidlerstr. 5, CH-3012 Bern, Switzerland\ E-mail: - | Pietro Giudice, Gernot Münster\ Universität Münster, Institut für Theoretische Physik, Wilhelm-Klemm-Str. 9, D-48149 Münster, Germany\ E-mail: , - | \ Universität Regensburg, Institute for Theoretical Physics, D-93040 Regensburg, Germany\ E-mail: title: 'Witten index and phase diagram of compactified $\mathcal{N}=1$ supersymmetric Yang-Mills theory on the lattice' --- Introduction ============ Confinement is the non-perturbative aspect of QCD responsible for the mass and the properties of hadrons and mesons. Perturbation theory can provide a good description of strong interactions at high energies, but a thorough analytical understanding of confinement at low energies is still missing. The ’t Hooft limit [@Hooft1974] is a popular method to approach this problem in the context of the AdS/CFT duality. Yang-Mills theories simplify drastically if the gauge coupling $g$ is sent to zero and the number of colors $N_c$ to infinity while keeping fixed the ’t Hooft coupling $\lambda = g^2 N_c$. For instance volume independence and correlation function factorization have been conjectured for pure Yang-Mills theories in the large $N_c$ limit. A discretized lattice model with only one site $1^d$ would be equivalent to the full theory defined in an infinite lattice [@Eguchi1982]. Unfortunately the hypothesis that leads to the volume reduction is not fulfilled in the large $N_c$ limit: confinement is not preserved, in the sense that the center symmetry of the Polyakov loop is spontaneously broken [@Bhanot1982]. A possibility to solve this issue is to couple gauge fields to quarks in the adjoint representation of the gauge group (AdjQCD), that give a stabilizing contribution to effective potential of the Polyakov loop at least at one-loop order of perturbation theory [@Kovtun2007; @Unsal:2008ch]. If only one massless adjoint Majorana fermion is coupled to the gauge field, the model corresponds to the $\mathcal{N}=1$ Supersymmetric Yang-Mills theory and the fermionic particles, the superpartners of the gluons, are called gluinos. Models with adjoint fermions are relevant not only for the full volume reduction. The theories defined in four dimensions can be compactified on a torus $\mathbb{R}^3\times S^1$ and the fermion boundary conditions in the compact dimension can be chosen to be periodic. A semiclassical expansion for small compactification radius $R$ is then expected to provide an analytical explanation for the properties of confinement also far away from the limit $N_c \rightarrow \infty$ [@Shifman2008; @Anber2012; @Anber2015a; @Anber2015b]. As before, the important assumption is the absence of a deconfinement phase transition that would otherwise disconnect the small $R$ regime from the physics at zero temperature, where confinement has to be understood. Lattice Monte-Carlo simulations can provide a fully non-perturbative evidence for this scenario [@Bergner2014compact]. In this contribution we discuss our recent numerical lattice simulations for $\mathcal{N}=1$ Supersymmetric Yang-Mills (SYM) theory and we present evidence that no deconfinement phase transitions occurs in the chiral limit regardless from the length of $R$. Moreover, the partition function of compactified $\mathcal{N}=1$ SYM with periodic fermion boundary conditions corresponds to the Witten index. We show how the expected exact cancellation between bosonic and fermionic energy levels can be used as a test for the realization of supersymmetry on the lattice. The partition function and the Witten index of $\mathcal{N}=1$ SYM ================================================================== Confinement is a crucial property of the $\mathcal{N}=1$ Supersymmetric Yang-Mills (SYM) theory. At zero temperature the fundamental particles of the model, gluons and gluinos, appear only in colorless bound states. Being in the adjoint representation of the gauge group, the gluino has $N_c^2-1$ color degrees of freedom and therefore its contributions do not decouple in the large $N_c$ limit. If one space-time dimension is compactified, antiperiodic boundary conditions applied to the gluino field $\lambda$ in the time direction bring to the trace of the Boltzmann factor $\exp(-\hat{H}R)$ in the Hamiltonian formalism: $$Z(R) = \int_{\lambda(R)=-\lambda(0)} \mathcal{D}\lambda \mathcal{D}A_\mu \exp{\left(-\int_0^{R} dt \int d^3x \mathcal{L}(\lambda,A_\mu)\right)} = \textrm{Tr}(\exp(-\hat{H}R))\,,$$ while periodic boundary conditions provide the so-called “supertrace” $W(R)$: $$\begin{aligned} W(R) & = & \int_{\lambda(R)=\lambda(0)} \mathcal{D}\lambda \mathcal{D}A_\mu \exp{\left(-\int_0^{R} dt \int d^3x \mathcal{L}(\lambda,A_\mu)\right)}\\ & = & \textrm{STr}(\exp(-\hat{H} R)) = \textrm{Tr}((-1)^F\exp(-\hat{H} R))\,,\end{aligned}$$ where $F$ is the fermion number. The Grassmanian nature of fermion fields requires antiperiodic boundary conditions in the time direction to reproduce correctly the partition function $Z(T)$ at non-zero temperature $T=1/R$ in the path-integral formalism. However $W(R)$ has an interesting cancellation between fermion and boson contributions due to the $(-1)^F$ factor, that has been useful to study many different aspects of quantum field theories. The function $W(R)$ is known for example as “Witten index” in SUSY and it provides information on spontaneous supersymmetry breaking [@Witten1982]. Furthermore, as discussed in the introduction, gluinos are expected to preserve confinement for all compactification radius $R$, if periodic boundary conditions are applied to their fields in the time direction. We study the compactified version of $\mathcal{N}=1$ SYM on the lattice with numerical Monte-Carlo simulations for the gauge group SU(2). The integral of the continuum Lagrangian density $$\mathcal{L}(\lambda, A_\mu) =- \frac{1}{4} (F_{\mu\nu}^a F_{\mu\nu}^a) + \frac{1}{2} \bar{\lambda}_a (\gamma^\mu D^{ab}_\mu + m) \lambda_b\,,$$ can be discretized on the lattice with the tree-level Symanzik improved action and the Dirac-Wilson operator. The theory is supersymmetric in the continuum formulation if and only if the gluino mass $m$ is set to zero. Supersymmetry is however explicitly broken on the lattice and a simultaneous fine tuning of the bare gluino mass $m_B$ and gauge coupling $g$ is required to restore it in the continuum limit. The renormalized gluino mass $m_R(g,m_B)$ considered as a function of the bare parameters will be zero in general for $m_B \neq 0$. In our simulation we represent $m_R$ by the square of the adjoint pion mass in a partially quenched approach [@Muenster2014]. Continuity of confinement for SU(2) $\mathcal{N}=1$ SYM ======================================================= The first scan of the phase diagram has been done in the bare parameter space at fixed number of lattice points $N_t$ in the time direction. The compactification radius $R$ changes as a function of $\beta=2N_c/g^2$; in particular $R\rightarrow 0$ when $\beta\rightarrow \infty$. The results are presented in Fig. \[plotkappascans\_ns8\_per\_fig\]. The expectation value of the Polyakov loop distinguishes three different regions, depending on whether center symmetry is broken for periodic or antiperiodic fermion boundary conditions, see Fig. \[diagram\]. Remarkably, the critical line where confinement is broken for periodic boundary conditions does not intersect the line where the gluino mass vanishes, see Fig. \[lcp\], meaning that in the supersymmetric limit there are no deconfinement phase transitions, as predicted. Due to the flat behavior of the Polyakov loop effective potential for $\mathcal{N}=1$ SYM, finite volume corrections have been important for a correct identification of the phase transition point, see Fig. \[finite\_volume\]. ![Polyakov loop expectation value for periodic (blue) and antiperiodic (purple) boundary conditions on a $16^3\times N_t$ lattice.[]{data-label="fixedpl"}](polyakov_loop_periodic_comparison.pdf){width=".57\textwidth"} Alternatively, the couplings $\kappa$ and $\beta$ can be hold fixed and the compactification radius $R=a N_t$, where a is the lattice spacing, can be changed by discrete steps by simply increasing and decreasing $N_t$ (*fixed scale approach*). In this case the systematic uncertainties related to the determination of the line of constant physics are avoided. While the first scan has been done using unimproved Wilson fermions, this second run has been done using tree-level improved clover fermions in order to reduce the lattice artefacts [@Musberg2013]. We have set the volume to $16^3 \times N_t$, $\beta=1.65$, $c_{sw} = 1$ and $\kappa=0.1750$; the measured pion mass at zero temperature is $am_\pi = 0.64631(67)$. As shown in Fig. \[fixedpl\], the influence of the periodic boundary conditions is drastic especially for small $R$, $\langle|P_L|\rangle$ is always bounded even for a $16^3\times1$ lattice. These results indicate further that confinement is stronger for a small than for an intermediate compactification radius. Supersymmetry and the Witten index on the lattice ================================================= The Witten index $W(T)$ can be expressed in terms of the boson and fermion energy levels $$\label{wt} W(T) = \sum_{\textrm{bosons}} \exp{\left(-\frac{E_i^B}{T}\right)} - \sum_{\textrm{fermions}} \exp{\left(-\frac{E_i^F}{T}\right)}\,,$$ where here and in the following we set $T=1/R$ for a better comparison between the Witten index and the thermal partition function. The Witten index is constant for a supersymmetric theory. If supersymmetry is not broken, both the number and the precise energy value of fermion and boson states will match and the above difference will be reduced to a constant equal to the number of unpaired ground states. It is for example well known that $W(T)$ is equal to $N_c$ for the $\mathcal{N}=1$ SYM theory [@Witten1982]. Supersymmetry is however explicitly broken on the lattice: the continuous translational symmetry is reduced to the discrete subgroup of translations proportional to multiples of the lattice spacing $a$. In addition, for $\mathcal{N}=1$ SYM theory, numerical simulations are impossible at exactly vanishing gluino mass. A computation of $W(T)$ or equivalently of the difference of all bosonic and fermionic energy levels would be a precise measure of the supersymmetry breaking on the lattice. This approach is however rather difficult to implement since it would imply the knowledge of the value of the path integral with its absolute normalization factor. However supersymmetry is explicitly broken on the lattice, and therefore $W(T)$ is not anymore a constant independent from $T$ since $E_i^B \neq E_i^F$. If we derive the expression \[wt\] above $$E_G(T) = \frac{\partial W(T)}{\partial (1/T)} = \sum_{\textrm{fermions}} E_i^F \exp{\left(-\frac{E_i^F}{T}\right)} - \sum_{\textrm{bosons}} E_i^B \exp{\left(-\frac{E_i^B}{T}\right)}$$ and subtract a zero temperature value, $E_G(T) - E_G(0)$, we get a *graded energy density* that can be easily computed on the lattice. For unbroken supersymmetry this quantity should be zero. Any deviation of $E_G(T)$ from zero would then be a signal of explicit supersymmetry breaking. The graded energy density $E_G(T)$ becomes sensible to the mismatch of larger and larger fermion and boson energy states at $T$ increases, i.e. when the compactification radius $R$ decreases. ![Energy density $\epsilon=E_G(T)/V$ for periodic (blue) and antiperiodic (purple) gluino boundary conditions.[]{data-label="ppthermo"}](energy_periodic_comparison.pdf){width=".55\textwidth"} To compute $E_G(T)$ on the lattice, we simulate the theory for different $N_t$ with periodic fermion boundary conditions, then we proceed to the calculation of the energy density as in standard thermodynamics, see for example Ref. [@Ejiri2012]. The final result is shown in Fig. \[ppthermo\]. The energy density $\epsilon$ for antiperiodic boundary conditions shows the expected thermal behavior, $\epsilon$ is small before that the deconfinement phase transition occurs and it grows as $T^4$ at high temperature as for a free gas of gluons and gluinos. The graded energy density is instead compatible with zero even for compactification radius $R$ twice smaller the critical $R_c=1/T_c$ where the deconfinement phase transition occurs with fermion antiperiodic boundary conditions. appears only for a lattice with two sites in the temporal direction. In that sense the critical compactification length $L = 3a$ is the minimal distance where supersymmetry is approximatively and dynamically restored in the infrared regime. Strong lattice artefacts appear at distances smaller than or equal to two lattice spacings. It is finally interesting to observe that $E_G(T)$ exhibits a flat behavior for rather large values of the adjoint pion mass, $am_\pi \simeq 0.6$. This fact is in agreement with the previous investigations of the bound spectrum done by the DESY-Münster collaboration, where a degeneracy between the gluino-glue and its boson counterpart has been observed to persist even for large value of the adjoint pion mass, while a large lattice spacing leads to strong mass splitting [@Bergner:2012rv; @Bergner:2013nwa]. Conclusions =========== We have presented the first evidence for the persistence of confinement in $\mathcal{N}=1$ supersymmetric Yang-Mills theory for all compactification radius $R$ if periodic boundary conditions are applied to the gluino field in all directions. In the near future we plan new simulations for different number of colors and for different numbers of Majorana fermions $N_f > 1$, to extend the results of Ref. [@Cossu2009]. Acknowledgements ================ We thank I. Montvay for helpful instructions and comments. The authors gratefully acknowledge the computing time granted by the Leibniz-Rechenzentrum (LRZ) in München provided on the supercomputer SuperMUC. Further computing time has been provided by the cluster PALMA of the University of Münster. [99]{} G. ’t Hooft: *“A planar diagram theory for strong interactions”*, Nucl. Phys. B [**72**]{} (1974) 461. T. Eguchi and H. Kawai: *“Reduction of Dynamical Degrees of Freedom in the Large-N Gauge Theory”*, Phys. Rev. Lett. [**48**]{} (1982) 1063. G. Bhanot, U. M. Heller, H. Neuberger: *“The quenched Eguchi-Kawai model”*, Phys. Lett. B [**113**]{} (1982) 47. P. Kovtun, M. Ünsal, L. G. Yaffe: *Volume independence in large Nc QCD-like gauge theories*, JHEP 0706 (2007) 019, \[[arXiv:[[hep-th/0702021]{}](http://arxiv.org/abs/hep-th/0702021)]{}\]. M. Ünsal and L. G. Yaffe: *“Center-stabilized Yang-Mills theory: Confinement and large N volume independence”*, Phys. Rev. D [**78**]{} (2008) 065035, \[[arXiv:[[0803.0344]{}](http://arxiv.org/abs/0803.0344)]{} \[[hep-th]{}\]\]. M. Shifman and M. Ünsal: *QCD-like Theories on $R_3\times S_1$: a Smooth Journey from Small to Large $r(S_1)$ with Double-Trace Deformations*, Phys. Rev. D [**78**]{} (2008) 065004, \[[arXiv:[[0802.1232]{}](http://arxiv.org/abs/0802.1232)]{} \[[hep-th]{}\]\]. M. M. Anber, S. Collier, E. Poppitz, S. Strimas-Mackey and B. Teeple: *Deconfinement in N=1 super Yang-Mills theory on $R^3 \times S^1$ via dual-Coulomb gas and “affine” XY-model*, JHEP11 (2013) 142, \[[arXiv:[[1310.3522]{}](http://arxiv.org/abs/1310.3522)]{} \[[hep-th]{}\]\]. M. M. Anber, E. Poppitz, T. Sulejmanpasic: *Strings from domain walls in supersymmetric Yang-Mills theory and adjoint QCD* Phys. Rev. D 92, 021701 (2015), \[[arXiv:[[1501.06773]{}](http://arxiv.org/abs/1501.06773)]{} \[[hep-th]{}\]\]. M. M. Anber and E. Poppitz: *On the Global Structure of Deformed Yang-Mills Theory and QCD(adj) on $\mathbb R^3 \times \mathbb S^1$* \[[arXiv:[[1508.00910]{}](http://arxiv.org/abs/1508.00910)]{} \[[hep-th]{}\]\]. G. Bergner and S. Piemonte: *“Compactified $\mathcal{N}=1$ supersymmetric Yang-Mills theory on the lattice: Continuity and the disappearance of the deconfinement transition”*, JHEP12(2014)133, \[[arXiv:[[1410.3668]{}](http://arxiv.org/abs/1410.3668)]{} \[[hep-lat]{}\]\]. E. Witten: *Constraints on Supersymmetry Breaking*, Nucl. Phys. B202 (1982) 253-316. G. Münster and H. Stüwe: *The mass of the adjoint pion in N=1 supersymmetric Yang-Mills theory*, JHEP05(2014)034, \[[arXiv:[[1402.6616]{}](http://arxiv.org/abs/1402.6616)]{} \[[hep-lat]{}\]\]. S. Musberg, G. Münster and S. Piemonte: *Perturbative calculation of the clover term for Wilson fermions in any representation of the gauge group SU(N)* JHEP 05 (2013) 143, \[[arXiv:[[1304.5741]{}](http://arxiv.org/abs/1304.5741)]{} \[[hep-lat]{}\]\]. S. Ejiri, K. Kanaya, T. Umeda for WHOT-QCD Collaboration: *Ab initio study of QCD thermodynamics on the lattice at zero and finite densities*, \[[arXiv:[[1205.5347]{}](http://arxiv.org/abs/1205.5347)]{} \[[hep-lat]{}\]\]. G. Bergner, T. Berheide, I. Montvay, G. Münster, U. D. Özugurel and D. Sandbrink: *The gluino-glue particle and finite size effects in supersymmetric Yang-Mills theory*, JHEP [**1209**]{} (2012) 108 \[[arXiv:[[1206.2341]{}](http://arxiv.org/abs/1206.2341)]{} \[[hep-lat]{}\]\]. G. Bergner, I. Montvay, G. Münster, U. D. Özugurel and D. Sandbrink: *Towards the spectrum of low-lying particles in supersymmetric Yang-Mills theory*, JHEP [**1311**]{} (2013) 061 \[[arXiv:[[1304.2168]{}](http://arxiv.org/abs/1304.2168)]{} \[[hep-lat]{}\]\]. G. Cossu, M. D’Elia: *Finite size phase transitions in QCD with adjoint fermions*, JHEP 0907:048,2009, \[[arXiv:[[0904.1353]{}](http://arxiv.org/abs/0904.1353)]{} \[[hep-lat]{}\]\].
Levin included the earmark in a 2009 spending bill for the "preservation and redevelopment of a public park and related business activities" in Corktown. He hoped to aid the conservancy effort to save a portion of Tiger Stadium and re-purpose it as a mixed-use development, but the City of Detroit rejected that proposal and completed the demolition. The open-ended language of the earmark and the city's failure to approve any plans for the old Tiger Stadium site means the federal funds could end up going toward different projects in Corktown. "Our fervent hope is that it's still used at the old Tiger Stadium site," Conservancy President Thom Linn told MLive.com. "But where it's used in and around Corktown is still to be determined." Linn said the conservancy claimed the funds by successfully submitting a grant application to the U.S. Department of Housing and Development that "was consistent with the original plan for improvements for a public park and commercial redevelopment." AP File PhotoTiger Stadium demolition began in 2008. The federal obligation means the conservancy will spend a month or two finalizing plans to distribute the funds, and Linn said the group is "mindful of both community wishes and Senator Levin's sense of how to use the money." The conservancy risked losing the funds entirely if it did not submit a plan by September 30, and Linn said he was pleased that HUD approved the proposal despite a lack of legal approval from the city to use the Tiger Stadium site. "We've had a couple meetings with the Senator, and we're hoping to find an approach the city accepts," Linn said. "It may be that we'll need to muster public support for maintaining the site." Tiger Stadium -- formerly known as Navin Field and Briggs Stadium -- was the home of the Detroit Tigers until the team moved to Comerica Park for the 2000 season. The city completed demolition on the stadium in 2009 and recently rejected a promising conservancy-backed proposal for "The Corner Development."
{ "unicast" : "@TEST_IP_SLAVE@", "logging" : { "level" : "debug", "console" : "true", "file" : { "enable" : "false", "path" : "/tmp/vsomeip.log" }, "dlt" : "false" }, "applications" : [ { "name" : "subscribe_notify_test_service", "id" : "0x8888" } ], "services" : [ { "service" : "0xcafe", "instance" : "0x1", "unreliable" : "30509" } ], "routing" : "routingmanagerd", "service-discovery" : { "enable":"true", "multicast":"224.0.0.1", "port":"30490", "protocol":"udp", "initial_delay_min" : "10", "initial_delay_max" : "10", "repetitions_base_delay" : "30", "repetitions_max" : "0", "cyclic_offer_delay" : "1000", "ttl" : "3" } }
Q: Getting a directory path using project directory I have a project whose name is Myproject.Application.DataExporter. I'm saving a file to a directory whose name is Export. I'm using this code : workbook.Save(@"D:\workspace\MyApp\Myproject.Application.DataExporter\Export\Calc.xlsx"); I see how to get current project directory in Stackoverflow. There is this code : Directory.GetParent(Directory.GetCurrentDirectory()).Parent.FullName; I want to save file under Export directory, using a generic path like the code above. It gives current project directory. I want to use it for adding a file to Export directory. How can I use it in my project for adding a file to Export? Thanks. A: string dir = Directory.GetParent(Directory.GetCurrentDirectory()).Parent.FullName; string path = Path.Combine(dir, "Myproject.Application.DataExporter", "Export"); string file = "Calc.xlsx"; workbook.Save(Path.Combine(path, file)); or if you want to skip Myproject.Application.DataExporter string dir = Directory.GetParent(Directory.GetCurrentDirectory()).Parent.FullName; string path = Path.Combine(dir, "Export"); string file = "Calc.xlsx"; workbook.Save(Path.Combine(path, file));
Cornelia, Missouri Cornelia is an unincorporated community in Johnson County, in the U.S. state of Missouri. History A post office called Cornelia was established in 1855, and remained in operation until 1904. The community was named after Cornelia Love, the wife of an early settler. A variant name was "Shanghai". The reason it was called Shanghai was that Dr. Love, who founded the community, raised Shanghai chickens. References Category:Unincorporated communities in Johnson County, Missouri Category:Unincorporated communities in Missouri
Occupational Health Advisor Occupational Health Advisor Derby/Loughborough Our global client is looking for an Occupational Health Advisor to join their established department on a full time permanent basis at their main site in Derby/Loughborough. This role involves occasional travel to Buckinghamshire, Bedfordshire and Hertfordshire. The successful candidate will be required to work 2/3 evening shifts per week and may need to work an occasional weekend shift however these will be planned in advance to suit the candidate. The role will involve carrying out the full Occupational Health Remit; you will maintain and develop Policies and Procedures that promote Health and Well-Being for all employees as well as Health Screening and Risk Assessments. You will be a proactive problem solver with the ability to prioritise your own workload. The successful candidate will need to have an Occupational Health qualification (Diploma or Degree) and will need to have a minimum of 5 years’ Occupational Health experience. The salary for this role is £competitive and will be discussed upon application/interview. For more information of this, please contact Ayesha at OH Recruitment on 0208 457 3737 or email ameeheelaulohrecruitment.co.uk
Shortening of simple reaction time by peripheral electrical and submotor-threshold magnetic cortical stimulation. Subthreshold transcranial magnetic stimulation (TMS) over the motor cortex can shorten the simple reaction time in contralateral arm muscles if the cortical shock is given at about the same time as the reaction stimulus. The present experiments were designed to investigate whether this phenomenon is due to a specific facilitatory effect on cortical circuitry. The simple visual reaction time was shortened by 20-50 ms when subthreshold TMS was given over the contralateral motor cortex. Reaction time was reduced to the same level whether the magnetic stimulus was given over the bilateral motor cortices or over other points on the scalp (Cz, Pz). Indeed, similar effects could be seen with conventional electrical stimulation over the neck, or even when the coil was discharged (giving a click sound) near the head. We conclude that much of the effect of TMS on simple reaction time is due to intersensory facilitation, although part of it may be ascribed to a specific effect on the excitability of motor cortex.
Q: Does Google Index Images with no file extensions? I'm evaluating the possibility to rewrite URLs for my images from /img/myfilename.jpg to /img/myfilename I have done some test and in the browser the /img/myfilename displays correctly an image. But I'm not sure if this can create seom SEO problem. My question? Does Google Index Images with no file extensions? A: It might be better seo to rewrite images to the root-folder. www.domain.xyz/abcdef-dishwasher.jpg or better domain.xyz/abcdef-dishwasher.image Additional keywords start now after 2 separators. There are only resources on the web, no folders. So as long as you send the right HTTP Content-Type by HTTP Header, you can use what ever you want. Here is an example. Try Google Image Search with: search-term -.jpg -.jpeg -.gif -.png
Raider Coach: Team Needs To Eliminate Distractions Weekly Monday news conference following Sunday loss Receive the latest local updates in your inbox OAKLAND, CA - SEPTEMBER 27: Oakland Raiders head coach Tom Cable argues with side judge Barry Anderson during their game against the Denver Broncos at the Oakland-Alameda County Coliseum on September 27, 2009 in Oakland, California. (Photo by Ezra Shaw/Getty Images) After watching his team endure yet another blowout loss, Oakland Raiders coach Tom Cable said one of the keys to getting his team back on track is to eliminate distractions. Cable was talking about the how the team responds to adversity early in games, when one bad play or bad call can lead to more and end up in a lopsided game. Hanson ended months of silence by talking to Yahoo! Sports late last week, saying Cable threatened to kill him during the August attack that left him with a broken jaw. Hanson claims he made a prediction right before fists flew at a now infamous coaches' meeting the night of Aug. 4. "You know what’s gonna happen there," Hanson recalls saying in a lengthy tell-all to Yahoo Sports. "Tom's gonna come out of the meeting and say I’m the problem, that I’m the one confusing them and blame it all on me." And then Hanson says Cable delivered said blame with a body-slam into the furniture, death threats and enough f-bombs for a Scorsese movie. Hanson is speaking publicly for the first time since the alleged brawl at Raiders' training camp, and gave a lengthy and detailed version of events to Yahoo! Sports. Hanson says a brewing interpersonal conflict between coach Cable and himself came to a head the night of Aug. 4, with Cable blowing his top and throwing Hanson's body across a room and into a cabinet. "He was screaming, ‘I’ll f——- kill you! I’ll f——- kill you!’ And I have no reason to believe he wouldn’t have killed me if they hadn’t pulled him away," Hanson said. "If my head would’ve hit a different way, I might be dead right now.” Make no mistake. Those are the words of a man who is a plaintiff in a pending lawsuit. Hanson also names names by telling who was in the room. He says defensive coordinator John Marshall and defensive assistants Lionel Washington and Willie Brown were present. He says they had to pull the enraged Cable off of Hanson. Marshall confirmed he had been interviewed by Napa Police, but told Yahoo! Sports, "I can’t talk about any of this." Hanson actually wore a Raider jersey to his interview session with Yahoo! Sports. Despite having his face allegedly rearranged by the Raiders' coach, Randy Hanson still remains a fan.
# Translation of Odoo Server. # This file contains the translation of the following modules: # * pos_cashbox # msgid "" msgstr "" "Project-Id-Version: Odoo Server 10.0\n" "Report-Msgid-Bugs-To: \n" "Last-Translator: <>\n" "Language-Team: \n" "MIME-Version: 1.0\n" "Content-Type: text/plain; charset=UTF-8\n" "Content-Transfer-Encoding: \n" "Plural-Forms: \n" #. module: pos_cashbox #: model:ir.model.fields,help:pos_cashbox.field_pos_session_iface_cashdrawer msgid "Automatically open the cashdrawer" msgstr "" #. module: pos_cashbox #: model:ir.model.fields,field_description:pos_cashbox.field_pos_session_iface_cashdrawer msgid "Cashdrawer" msgstr "" #. module: pos_cashbox #. openerp-web #: code:addons/pos_cashbox/static/src/js/cashbox.js:21 #, python-format msgid "Connection Refused. Please check the IP address to PosBox" msgstr "" #. module: pos_cashbox #. openerp-web #: code:addons/pos_cashbox/static/src/js/cashbox.js:30 #, python-format msgid "Connection Refused. Please check the connection to CashBox" msgstr "" #. module: pos_cashbox #: model:ir.model.fields,field_description:pos_cashbox.field_pos_session_proxy_ip msgid "IP Address" msgstr "" #. module: pos_cashbox #. openerp-web #: code:addons/pos_cashbox/static/src/js/cashbox.js:38 #, python-format msgid "Incorrect Operation" msgstr "" #. module: pos_cashbox #: model:ir.ui.view,arch_db:pos_cashbox.view_pos_session_form msgid "Open CashBox" msgstr "" #. module: pos_cashbox #: model:ir.model.fields,help:pos_cashbox.field_pos_session_proxy_ip msgid "The hostname or ip address of the hardware proxy, Will be autodetected if left empty" msgstr "" #. module: pos_cashbox #: model:ir.model,name:pos_cashbox.model_pos_session msgid "pos.session" msgstr ""
I was inspired by the current Ethereal Art Grant to reflect on Ethereum’s dark side: those murky possibilities where the “snake eats its own tail”. That process led me to conceive of The Bottom Red Line, a blueprint for a viable smart-contract which, we believe, exposes serious moral deficiencies in the Ethereum protocol. Here I explain the idea and its implications, as well as possible solutions. An image from Patrick’s repertoire. In the spirit of Ethereal, and alongside vapour-scape artist Patrick Savile, I have drawn up a schema (below) to be rendered as a rich depiction of the demon contract and its grotesque outcomes — a macabre, blockchain art piece for collectors to chart the contours of our scintillating journey through technological history. If you would like to commission the piece, please see the end of this article. The Bottom Red Line: an ethical challenge to Ethereum’s governance paradigm Ethereum provides a hugely extensible terrain for the implementation of cryptoeconomic logic. We hear a great deal about the innovation, the value and the freedoms this will bring us. What is less understood is the fact that unstoppable code can also be used to fulfil malevolent ends. As the DAO hack showed, smart contract design can produce effects so egregious that the community is compelled to respond with a fork, for example. The fork that followed the DAO was a nuclear option only intended for extreme cases. The ensuing debates were rich and instructive but we were left without clear red lines that smart contracts should have to cross before such a fork would be contemplated again. The Bottom Red Line diagramatically details an Ethereum smart contract which explicitly incentivises the creation of other smart contracts which are themselves sufficiently egregious to force a fork. Were this initial smart contract to be deployed, it would leverage features of Ethereum and associated blockchain services so as to motivate other developers to deploy new and beastly contracts with the objective of forcing a fork to halt such contracts. After the fork, the contract can be redeployed, achieving similar effects, until malevolent funders are satisfied, for example, that Ethereum has forked so much that it is no longer a threat to their preferred chain. Depicted here, step-by-step, in the context of its incentivisation flows and wider ecosystem. We propose to render this as a full-colour, vapor-scape print for collectors (see below). In this way, we suggest the moral vulnerability of Ethereum: either it is forced to hard fork repeatedly in response to a potentially endless stream of morally repugnant contracts, or it is destined to become a fertile ground for unaccountable, unstoppable evil. We subsequently see how the incentive to earn profit, the bottom line, can be cryptoeconomically aligned with incentives to cause harm, crossing red lines. Whilst I have considered this idea in some detail, including with informed peers, I welcome debate and criticism which may lead to refinements or refutations of it. Nevertheless, I hope it can stimulate the Ethereum community to define the boundaries of acceptable conduct and address severe governance issues. A whole class of problems We present this as a substantive example of what we expect is an entire category of problematic blockchain phenomena. Recent weeks have seen renewed focus on deposits of illicit material in the Bitcoin blockchain. Other such problems are likely to come to light. Collaborating artist Patrick Savile’s Dream III. We suggest that it would be prudent of the Ethereum community to recognise the need to integrate graceful forms of on-chain governance to avert the existential threats that will come with the maturity of the ecosystem. There already exists a significant body of enquiry considering the potential for blockchain-based AIs and other innovations with the capacity to spin out of control — the notion of Skynet was referenced in the earliest project outlines. We are also considering establishing a github-based grimoire of as-yet-unknown dark contracts as a resource for the collective understanding of what may come. There is insufficient conversation around how, and whether, the Ethereum community proposes to handle this class of problems. Some purists may prefer to let the wild lands of the blockchain evolve with the freedom for anything at all to prosper. They may suggest that we take our efforts elsewhere, like the Dfinity project which presents pioneering remedies to what we describe. We insist that Ethereum is a global community with ramifications for all and it must deal with these matters, at least in some detail. Pre-empting the problem Whilst we consider The Bottom Red Line to be a perfectly plausible scenario to emerge, we think that key conditions of its existence are yet to be fulfilled. The requisite oracle services, for example, are not yet mature enough, though platforms like Gnosis and Augur move ever closer to enabling such programs to execute effectively. We think that there is time for the community to discuss and develop governance systems that meet the challenges posed herein. Along with a fellow blockchain enquirer, I have begun work on an Ethereum Improvement Proposal (EIP) which seeks to define the parameters of the problem and possible solutions — we intend this as a tentative gambit and hope to incorporate the best, relevant thinking from across the community along the line. We are looking to publish that on behalf of Cryptical Studios in future. — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — The Bottom Red Line for your collection? Aside from our work to highlight and mitigate the issues arising from the piece, we are offering a rich and faithful interpretation of the Bottom Red Line schema as a limited-edition art piece for commission. Another sharp yet wispy evocation from Patrick’s range. Whilst this is a serious issue, given the artistic provenance of the idea, we feel it is fitting to produce it with the technicolour tones in which it was initially envisaged. Giving it physical form as a large-scale creation might increase visibility of this hypothetical demon, whether it comes to life or not. The highest bidders of over 2eth sent to info@crypticalstudios.com will be included in the eventual, very limited run of the completed work. It will be delivered to winning bidders as a full-colour, framed A1 print in Patrick Savile’s vapour-scape style. The work will be signed with a hashed reference of your choice alongside our own signatures, all logged on the blockchain: e.g. 2490twsnyuqw902183 = keccak256(‘Bottom Red Line by xxxx and commissioned by 0xYourWalletAddress0N3tHeR3Um’) — you can use this to transfer ownership of the original piece. Support this work We are actively working to raise the understanding of such issues within the community and provide constructive, playful and exploratory resources to move debates forward. If you would like to support this work, you may make an expression of thanks at our Eth wallet here: 0xF5B0212CE5870Fb2dCF3C07E20F9FAE644534dDB
[Triterpenoid constituents in fruits of Psidum guajava]. The chemical constituents from the fruit of Psidium guajava were investigated. Nine triterpenoids, ursolic acid (1), 1beta, 3beta-dihydroxyurs-12-en-28-oic acid (2), 2alpha,3beta-dihydroxyurs-12-en-28-oic acid (3), 3beta,19alpha-dihydroxyurs-12en-28-oic acid (4), 19a-hydroxylurs-12-en-28-oic acid-3-O-alpha-L-arabinopyranoside (5), 3beta, 23-dihydroxy urs-12-en-28-oic acid (6), 3beta, 19alpha, 23beta-tri-hydroxylurs-12-en-28-oic acid (7), 2alpha, 3beta,19alpha, 23beta-tetrahydroxyurs-12-en-28-oic acid (8), 3alpha,19alpha,23,24-tetrahydroxyurs -12-en-28-oic acid (9) were isolated by means of chromatography, and their structures were elucidated on the basis of MS, H NMR, 13C-NMR spectra. Compounds 2, 5-9 were isolated from this plant for the first time.
No Fault of His Own By Matt Osborne SouthernPigskin.com Follow us at Twitter.com/SouthernPigskin. Become a fan at the SouthernPigskin.com Facebook Page South Carolina defensive end Jadeveon Clowney has become the victim of a media-driven negative campaign. One of the great perks of working in the realm of sports media is that you, either directly or subconsciously, have the ability to set the tone for which topics of discussion become trendy. As has become evident with the seemingly never-ending introduction of allegedly bigger and better sports reporting outlets, Americans have become crazed with the idea of being able to easily access sports information. It is that insatiable demand for sports coverage which has allowed the media to steadily gain its stranglehold over how the public views the sporting landscape. The people in charge of the biggest and most influential sports media entities are the ones responsible for deciding which storylines will become the latest topics for conversation around the water cooler. Sometimes, albeit infrequently, the national media can even seem to “invent” stories out of thin air in order to drive a certain topic of discussion and boost their ratings. Unfortunately, this is what we have seen come to pass in the tale of South Carolina defensive end Jadeveon Clowney. In the final game of his sophomore season, Clowney became a figure of legendary proportions with his demolishing hit against Michigan’s Vincent Smith in the Capital One Bowl. The play ultimately won Clowney an ESPY for “Best Play of the Year” and propelled his celebrity to previously-unimaginable heights. Clowney’s popularity certainly did not stem for one singular play, however, as he was voted a first-team All-American for his season-long performance. Heading into the offseason, there was serious talk of Clowney being the most dominant defensive player in the history of college football. At the very least, numerous national pundits considered him to be a legitimate contender to become the first full-time defensive player to bring home the Heisman Trophy. At that time, his status had never been higher. Media members raved over his immense talent and potential, while most fans spoke of him as if he were a mythical being playing against mere mortals on the gridiron. But, suddenly, it all changed. And what made it worse, is that it all changed neither due to something Clowney said nor one of his actions, but because the media created a story out of thin air. It all started with a single reporter – Tom Sorensen of the Charlotte Observer – suggesting that maybe it would be in Clowney’s best interests to sit out his junior season. Such a move, Sorensen argued, would ensure that Clowney would not get injured and jeopardize his certain future as a top pick in the NFL Draft. Sorensen’s article made no mention of Clowney ever actually insinuating that he would consider skipping his junior season in Columbia. The column was simply written to suggest that not playing would be the best move for Clowney’s professional prospects. It was a hypothetical and thought-provoking piece. Inspired by Sorensen’s article, the debate over whether or not Clowney would consider skipping his junior season soon became a hot national topic. Steve Spurrier was asked multiple questions regarding the status of his star defender prior to the start of spring practice, saying that he didn’t see any reason Clowney would not participate. Once again, none of these media events were inspired by any actions from Clowney himself. The All-American from Rock Hill quickly put that speculation to rest when he announced that he had no intentions of sitting out his junior season as a Gamecock. But despite participating in spring practice, the public perception had already been changed to lead many fans to believe that he was, in their words, “abandoning” his teammates. Even with some fans across the country beginning to view Clowney in a negative light, nobody who had watched his highlight tape questioned his talent. He was still expected to piece together a junior season to remember, dominating the competition and posting ridiculous stats on his farewell tour through the SEC. In the first game of South Carolina’s season, a Thursday night title with North Carolina, Clowney was still battling the effects from a stomach virus which he caught earlier in the week. Not playing at 100%, Clowney found himself standing on the sideline more frequently than usual, and also was highlighted by ESPN analysts for his alleged lack of effort on specific plays. Likely due to the amount of attention dedicated to him by television cameras and the manner in which the analysts discussed him that afternoon against the Tar Heels, the common perception about Clowney very quickly became that he was lazy, out of shape and does not hustle consistently. As my good college friend, Josh Norris, wrote for RotoWorld, however, there is nothing statistically unusual about Clowney’s playing time or effort. To steal a stat from Norris, in the games in which Clowney has suited up for the Gamecocks, he has played over 78% of his team’s defensive snaps. Compare that to a couple of first round picks in last year’s NFL Draft, Sheldon Richardson and Sharrif Floyd, who played 72.3 and 66.4 percent of their teams’ snaps respectively. Also, the notion that a defensive end would take an occasional play off is no novel concept. Due to the nature of the position, it is impossible to give maximum effort on every play, especially when the offense’s play-design effectively neutralizes you from even potentially making a tackle. In such a situation, it does not make sense to intensely chase a ball-carrier you have no chance of tackling. Now, Clowney’s recent decision to sit out South Carolina’s contest against Kentucky due to sore ribs has only served to further his spiraling national perception. The Gamecocks expected to have Clowney in uniform against the Wildcats, but he came to the coaching staff at the last minute and informed him that his injury was too painful for him to play. Head coach Steve Spurrier admitted to the media that he was disappointed with the way in which events unfolded in regard to Clowney’s injury, but he also later went on to say that he was frustrated because Clowney’s injury was not fully diagnosed until after the game. Even with his coach attempting to clear the air surrounding the situation, most fans nationally seem to have taken this recent incident as just another example of Clowney’s supposed selfishness and lack of commitment to his team and program. If you are one of the fans who feel this way, ask yourself this question: has Clowney really done anything that out of the ordinary to single himself out as a reprehensible human being, as many people appear to be portraying him? The notion that Clowney has any of the aforementioned character traits is downright laughable. Just exactly what has this guy done to deserve all of this overwhelming negative press? How dare he force media pundits to speculate that he may skip his junior season to preserve his draft status? What nerve it must have taken him to take himself out of a game for a few plays when he was recovering from an illness and playing in the August heat. How could this monstrous human being refuse to play a football game when he was in significant pain? Surely no other football player in the history of the world has missed a game due to injury. The fact is, Clowney has become the most-recent victim of the sports media vilifying him for their own selfish purposes. So let’s all stop pretending like we are witnessing the evil doings of an inherently evil individual who is willing to put his own well-being above that of everyone around him, and start treating Clowney like the person he really is: an exceptional football player who cares deeply about his team, his school and his sport.
Shehram Sarwar Chaudhary Shehram Sarwar Chaudhary (born 24 April 1968) has been Justice of the Lahore High Court since 8 June 2015. References Category:1968 births Category:Living people Category:Judges of the Lahore High Court Category:Pakistani judges
Surgery for hepatocellular carcinoma. Today there is an array of therapeutic modalities available for the patients with hepatocellular carcinoma (HCC). However, surgery, be it resection or transplantation, offers the only hope of long-term disease-free survival. Unfortunately, because the majority of HCC in Asia is associated with cirrhosis, surgical resection is restricted to only a small proportion of these patients. However, in selected candidates resection may offer a 5-year survival of up to 70%. With the clinical application of adult-to-adult living donor liver transplantation, an increasing number of patients with small HCC and decompensating cirrhosis are undergoing transplantation.
Caldy railway station Caldy railway station was a station on the single track Hooton to West Kirby branch of the Birkenhead Railway, on the Wirral Peninsula, England. History The Birkenhead Railway, owned jointly by the Great Western Railway (GWR) and London and North Western Railway (LNWR), had initially opened a branch line from Hooton to Parkgate in 1866. An extension to West Kirby was completed twenty years later although Caldy station did not open until 1 May 1909. The station was located to the west of the village of Caldy and situated on top of a high embankment. This was due to a local landowner objecting to the original intended course of the line; which resulted in the station being much closer to the coast of the River Dee than was planned. The site consisted of a single platform on a single track section of the line. The station building was constructed from corrugated iron and consisted of a ticket office, waiting room and male & female toilets. Closure On 1 February 1954 the station was closed to passengers, although the line itself remained open to passenger trains for another two years. The track continued to be used for freight transportation and driver training for another eight years, closing on 7 May 1962. The line was lifted two years later with the station building and platform completely demolished. Wirral Country Park The route became the Wirral Way footpath and part of Wirral Country Park in 1973, which was the first such designated site in Britain. References Further reading External links Category:Disused railway stations in the Metropolitan Borough of Wirral Category:Former Birkenhead Railway stations Category:Railway stations opened in 1909 Category:Railway stations closed in 1954 Category:1909 establishments in England Category:1954 disestablishments in England
Japan’s secondary aluminum demand to remain stable in FY 2018-19 Japan’s secondary aluminum demand is forecast to remain stable during the current fiscal year over April 2018 to March 2019, Japan Aluminium Alloy Refiners Association said Monday. Total demand, comprising casting and diecast alloys, rolled products and de-oxidization agents for steelmaking, is seen at 1.69 million mt, inching up just 0.3% from 1.685 million mt in the April 2017 to March 2018 period. Demand for secondary aluminum for casting is forecast at 352,600 mt, down 0.1% from a year ago; diecast alloys at 1.01 million mt, up 0.2%; rolled aluminum at 209,700 mt, up 1%; and de-oxidization agents for steel at 115,600 mt, up 0.8%. “Thanks to positive momentum in automotive and other export industries, demand in fiscal 2017 [ending in March 2018] was up 4.8% year-on-year … In [fiscal] 2018, demand is seen to hold stable,” the association said. Domestic car sales are likely to fall in fiscal 2018-19 but this will be offset by an increase in demand for automotive component exports, the association added.
ShopRite of Delsea in Vineland, New Jersey recalls ground beef due to metal pieces VINELAND, New Jersey (WPVI) -- There is a consumer alert for anyone who bought ground beef at a ShopRite in Vineland, New Jersey. The ShopRite of Delsea, located at 1255 W Landis Ave., has initiated a voluntary recall of all store-made ground beef produced and sold March 30, 2020. The store says there is a possibility that the ground meat may contain small metal fragments due to a mechanical problem with the grinder. The recalled products include all store-made packages of 80, 85, and 93 percent lean ground beef, and meatloaf mix with a sell-by date of March 30, 2020. No other products sold at the ShopRite of Delsea are affected by the recall. No injuries related to the recall have been reported. This only affects the ShopRite of Delsea store. Pre-packaged ground meat products and ground beef sold in other ShopRite stores in the area are not affected by this recall. "ShopRite has reached out to its to Price Plus club card customers to alert them to the recall and will automatically refund purchases to their Price Plus card. Due to the coronavirus health emergency, we are asking customers not to return the product but to simply dispose of it. Customers who purchased a recalled product without a ShopRite Price Plus card can call 1-877-627-2853 for a refund. Customer refunds will be available to redeem starting Sunday, April 5, 2020," said ShopRite Spokesperson Karen Meleta. ShopRite is asking customers to check the labels of any ground beef products they may have purchased from the store and still have at home.
Europe is arguably the best continent for LGBT rights today. When asked which countries were most gay-friendly, a recent survey showed that 8 out of the top ten were in Europe. For all of its progress, Europe as a whole still has much work to be done. In May 2015, ILGA (the International Lesbian, Gay, Bisexual, Trans and Intersex Association) released its LGBT equality ratings. The UK and Belgium lead the continent with over 80% of full equality achieved in both countries. Much of western Europe also achieves high levels of equality, but as the map moves further east, those numbers begin to plummet. Since February 2014, the European Union has been working to create a “roadmap against homophobia“. That roadmap has yet to be clearly laid out, but a new list of actions to advance LGBT Equality has been published by the European Commission. These are the ten recommendations from that report: Closing the EU-level gap in protection against discrimination We can improve the lives of LGBT people by wiping out discrimination in education, social protection and access to goods and services. The EU wants an Equal Treatment Directive. While many European countries have anti-discrimination laws, and some legislation does exist within the EU, this directive would “considerably broaden the antidiscrimination areas covered by EU law.” Simplifying bureaucracy for LGBT families moving in Europe Moving from one EU member state to another can be difficult for an LGBT family, in particular with concern to public documents. The Commission is proposing legislation that would remove a lot of the red tape, and make the circulation of important documents and other information easier. The wider goal of this initiative is to “avoid the need for legalization or other formalities, and in so doing contribute directly to the creation of a citizens’ Europe.” In practice, this could help LGBT families in avoiding lengthy processes to prove marriages, adoptions, and other civil documentation matters. Properly enforcing EU laws Laws are only as strong as their enforcement. The goal is to ensure that nations within the EU are enforcing those laws correctly and fully. This will include gender legislation, protecting victims of crime (in particular crimes of homophobia and transphobia) as well as asylum and freedom of movement laws. Campaign to improve social attitudes A lot of negative stereotypes still exist about LGBT people. Those stereotypes lead to discrimination and bullying. The EU wants to put an end to that by raising awareness about the rights and social acceptance of LGBT people, with a particular focus on sports, schools, youth, and an expanded education about transgender and intersex people. Supporting member states in key policy areas Each member state is responsible for promoting LGBT rights. Change has to be local, and the EU wants to strengthen its support to member states to help them improve local efforts to improve education, health, non-discrimination and combat hate crime and hate speech. Financial support for projects on LGBT Much of the work to improve education and offer better services to LGBT people will require further resources. As of 2016, new funding will be allocated to member states to help combat hate crime and hate speech. Support for projects, both private and public, promoting equality, diversity and anti-discrimination will also be part of the project. Erasmus, Europe’s student exchange programme, will also be included to promote better education of Europe’s youth with regards to LGBT issues. Supporting businesses and inclusive workplaces The EU knows LGBT rights is good for business. They want to set up a list of best practices and strong examples to follow in the workplace. The European Commission also plans to lead by example. They are preparing their own diversity strategy which they intend to publicise later. Improving available data on the situation of LGBT people Data about the present situation for people within the LGBT community can be spotty and unreliable. To improve this, the EU wants to create a number of new reports to bring accurate data to light including: Non-Discrimination and Fundamental Rights Health-inequalities Education Hate crime / hate speech Free movement of LGBT families Intersex Transgender/gender legal recognition Looking beyond the EU’s borders LGBT rights do not end at the borders of Europe, and the EU wants to be part of the fight for equality on a global scale. To do this, they are actively involved in the establishment of the ‘ERA-LGBT Equal Rights Association of Western Balkans and Turkey’ network. Working with the rest of the world Outside of neighbouring EU nations are ‘third countries’, basically the rest of the world. The EU wants to continue its efforts through its work with the UN and through its delegations and embassies. Author: Donald Armbrecht is a freelance writer and social media producer.
#include "pch_RulrNodes.h" #include "DeclareNodes.h" #include "ofxRulr/Nodes/Template.h" #include "ofxRulr/Nodes/Application/Assets.h" #include "ofxRulr/Nodes/Application/openFrameworks.h" #include "ofxRulr/Nodes/Application/HTTPServerControl.h" #include "ofxRulr/Nodes/Data/Channels/Database.h" #include "ofxRulr/Nodes/Data/Channels/Generator/Application.h" #include "ofxRulr/Nodes/Data/Mesh.h" #include "ofxRulr/Nodes/Data/Recorder.h" #include "ofxRulr/Nodes/DMX/Sharpy.h" #include "ofxRulr/Nodes/DMX/AimMovingHeadAt.h" #include "ofxRulr/Nodes/Item/Board.h" #include "ofxRulr/Nodes/Item/Camera.h" #include "ofxRulr/Nodes/Item/Mesh.h" #include "ofxRulr/Nodes/Item/Projector.h" #include "ofxRulr/Nodes/Item/RigidBody.h" #include "ofxRulr/Nodes/Item/View.h" #include "ofxRulr/Nodes/Procedure/Scan/Graycode.h" #include "ofxRulr/Nodes/Procedure/Triangulate.h" #include "ofxRulr/Nodes/Render/NodeThroughView.h" #include "ofxRulr/Nodes/Render/Draw.h" #include "ofxRulr/Nodes/Render/Lighting.h" #include "ofxRulr/Nodes/System/VideoOutput.h" #include "ofxRulr/Nodes/Test/ARCube.h" #include "ofxRulr/Nodes/Test/Focus.h" #include "ofxRulr/Nodes/Watchdog/Camera.h" #include "ofxRulr/Nodes/Watchdog/Startup.h" #include "ofxRulr/Graph/FactoryRegister.h" namespace ofxRulr { namespace Nodes { void loadCoreNodes() { RULR_DECLARE_NODE(Template); RULR_DECLARE_NODE(Application::Assets); RULR_DECLARE_NODE(Application::openFrameworks); RULR_DECLARE_NODE(Application::HTTPServerControl); RULR_DECLARE_NODE(Data::Channels::Database); RULR_DECLARE_NODE(Data::Channels::Generator::Application); RULR_DECLARE_NODE(Data::Mesh); RULR_DECLARE_NODE(Data::Recorder); RULR_DECLARE_NODE(DMX::Sharpy); RULR_DECLARE_NODE(DMX::AimMovingHeadAt); RULR_DECLARE_NODE(Item::Board); RULR_DECLARE_NODE(Item::Camera); RULR_DECLARE_NODE(Item::Mesh); RULR_DECLARE_NODE(Item::Projector); RULR_DECLARE_NODE(Item::RigidBody); RULR_DECLARE_NODE(Item::View); RULR_DECLARE_NODE(Procedure::Scan::Graycode); RULR_DECLARE_NODE(Procedure::Triangulate); RULR_DECLARE_NODE(Render::NodeThroughView); RULR_DECLARE_NODE(Render::Draw); RULR_DECLARE_NODE(Render::Lighting); RULR_DECLARE_NODE(System::VideoOutput); RULR_DECLARE_NODE(Test::ARCube); RULR_DECLARE_NODE(Test::Focus); RULR_DECLARE_NODE(Watchdog::Camera); RULR_DECLARE_NODE(Watchdog::Startup); } void loadPluginNodes() { Graph::FactoryRegister::X().loadPlugins(); } } }
Q: IntelliJ IDEA 12.0 debugger not working with Griffon 1.1.0 project I'm trying to debug a Griffon 1.1.0 project with InelliJ IDEA 12.0 but breakpoints are not being hit. The command I'm executing is test-app -integration. It runs fine, but without any debugger interaction. If I use the default JUnit Runner, then breakpoints are hit as expected, but none of the Griffon framework features are available, what is a requirement for my integration tests. The "Debugger" tab in IntellyJ IDEA shows Connecting to the target VM, address: '127.0.0.1:51778', transport: 'socket', but doesn't seem to connect to the running VM (which expects a debugger on port 5005). I'm new to IntelliJ IDEA, so I might be missing something here... Can anyone help me? Thanks in advance, Guillermo A: I've created issue on IntelliJ bug tracker: http://youtrack.jetbrains.com/issue/IDEA-97130 This will be fixed in 12.0.1 or 12.0.2. As workaround you can create separate Remote Run Configuration that connects to localhost:5005 and run this Remote Run Configuration immediately after running of Griffon Run Configuration.
Ministry Links Witness - 7/31/2011 In this message, Gordon Dabbs examines the 11th chapter of the book of Revelation. Gordon talks about how God desires change and transformation but ultimately judges us based upon our response to Him.
Dear customer, unfortunately this article is subject to the restrictions of the brand manufacturer Sterntaler and may not initially be available in your country. Sterntaler bed linen Stanley This cuddly bed linen will turn your little one’s place to sleep into a wonderful oasis for secure and relaxed nights – for a healthy sleep supports the development. The stylish bed linen for children made of high-quality material will contribute a lot to getting your baby satisfied to sleep. Read the complete description > Sterntaler bed linen Stanley The Sterntaler bed linen Stanley is 100% cotton and convinces you through quality and comfort This cuddly bed linen will turn your little one’s place to sleep into a wonderful oasis for secure and relaxed nights – for a healthy sleep supports the development. The stylish bed linen for children made of high-quality material will contribute a lot to getting your baby satisfied to sleep. Thanks to pure cotton, this bed linen is especially cuddly, breathable and skin-friendly. You are able to wash the sheets at 60° and dry it with a reduced thermal load – thus it is ready for use at any time. The bed linen is embroidered with high-quality applications which make it a real eyecatcher. The duvet cover has a size of 100 x 135 cm and is equipped with buttons. The pillow case has a size of 40 x 60 cm and is provided with a weft – thus putting on and stripping fresh linen onto/from your bed in a quick and easy way is definitely guaranteed.
Email “IN our time, the audience of a member of parliament is the nation. The three or four hundred persons who may be present while a speech is delivered may be pleased or disgusted by the voice and action of an orator, but in the reports which are read the next day by hundreds of thousands, the difference between the noblest and meanest of figures, between the richest and shrillest tones, between the most graceful and the most uncouth gesture vanishes.” Since Macaulay wrote these words in 1834, the size and the interest of the audience have grown beyond the wildest dreams of anyone of his times. So have the importance and impact of the reports which are read the next day by the hundreds of thousands. Parliamentary proceedings are now telecast live and reach millions of homes, with commentaries in all major regional languages. To prevent debate forcibly in parliament is to deny the entire nation the benefit of listening to rival viewpoints without which it is impossible to form any informed opinion. It is much more than an attack on parliament. It is an assault on democracy. This is what Indian parliament has been subjected to since it was reconvened, by its main opposition party, the Bharatiya Janata Party (BJP). It has refused to let parliament function unless its major demand was met; namely the resignation of Prime Minister Manmohan Singh. Nothing can ever justify such conduct. India has large deposits of coal; much of it untapped. In order to increase power production, the government decided in 2004 to award 142 coal blocks to government and private power companies. The comptroller and auditor-general’s (Vinod Rai) report found that the process lacked transparency and the lack of competitive bidding resulted in loss to the nation and gain to the companies. Rai has been criticised earlier for exceeding his jurisdiction. His public pronouncements do not conceal ambition. Reports of CAGs are not for bedtime reading. They are complex in substance and turgid in style. In fairness to him and to his target, the government, the report must be debated thoroughly for the people to appreciate the pros and cons. On Aug 27, after days of obstruction, the prime minister tried to read in both houses of parliament a detailed 32-point statement in reply to the report. Prevented by the pandemonium created by the opposition he tabled the statement saying that he took full responsibility for the decisions since he held the portfolio between 2005 and 2009. The BJP immediately held a press conference to rebut him. Two cabinet ministers promptly held their press conference to refute the charges and cited similar allocations made by the BJP regime between May 1998 and May 2004, when it lost the elections. Fundamentally, the BJP, and especially its prime ministerial aspirant L.K. Advani, have still not reconciled themselves to that unexpected defeat. Demand for cancellation of the allocations became secondary. The main demand was for the prime minister’s resignation. The country is due to go to the polls only in 2014. The BJP wrote off an entire winter session of parliament in 2010 to enforce its demand for a joint parliamentary committee on the scam in the allotment of spectrum in the 2G band. A joint parliamentary committee was set up. The minister concerned, A. Raja of the Dravida Munnetra Kazhagam, a member of the coalition, resigned, was prosecuted and spent time in prison. The BJP had tasted blood. The bare essential facts are mentioned to explain the background to the impasse. The immediate political crisis will get over. It is the fundamentals of parliamentary democracy that matter; especially attitudes to its institutions. Way back on Dec 19, 1995 the BJP leader Atal Behari Vajpayee said: “We don’t want a debate for debate’s sake.” Parliament was held to ransom over the telecom scandal in the scandalous regime of P.V. Narasimha Rao. The minister concerned was later welcomed into the BJP with open arms. The language used now is identical. The BJP’s spokesperson argued, on Aug 25, “debates and discussions for the records or for their pedagogic value cannot be devoid of course correction. … This time we expect action first”. The educative value of parliamentary debates is belittled. Parliament is to be used to secure ‘action’ as desired by the opposition, quite regardless of the rights of MPs belonging to other parties in opposition, apart from the MPs of the ruling party. The two left parties, the Communist Party of India and the Communist Party of India (Marxist) resent tactics used by the BJP though their opposition to the government is total. The voters who elected the parties on the basis of their electoral pledges, are denied their right to hear the debates. Parliament, the Grand Inquest of the Nation, is effectively silenced. There is nothing to prevent a political party from taking the issues to the people in public meetings and processions. They render public service when, together with infor-med criticism in parliament, they publish documented pamphlets to educate public opinion. What is impermissible is abuse of the parliamentary forum forcibly to secure ‘action’ as dictated by a political party. This is amounts to subversion of parliament and negation of the democratic process. The distinguished authority on constitutional law Sir Ivor Jennings strongly criticised such behaviour in his classic Parliament. He wrote: “The function of parliament is not to govern but to criticise. Its criticism, too, is directed not so much towards a fundamental modification of the government’s policy as towards the education of public opinion … the government governs and the opposition criticises. Failure to understand this simple principle is one of the causes of the failure of so many of the progeny of mother of parliaments and of the supersession of parliamentary government by dictatorships.” Refusal to accept the electorate’s verdict is the main cause of collapse of democratic institutions. Assault on parliament is a symptom of that ailment. Comments (3) Closed Syed Ahmed Sep 02, 2012 02:32am What a contrast. Indian Parliament is held hostage by the BJP. It has refused to let parliament function unless its major demand is met; namely the resignation of Prime Minister Manmohan Singh. Nothing can ever justify such conduct. Pakistani Parliament is full of Zardari Recommend0 Sudhir Das Sep 01, 2012 03:43pm The behaviour of BJP is highly disgusting to the conscious people of India who really want to hear the other side of the story. Why is the BJP so afraid of a debate in parliament? Perhaps under the facade of disrupting the parliament they, in fact, are trying to hide the role of the NDA government in 2004 and their state governments in Chattisgarh and Karnataka now of similar scams. The Congress, no doubt, is in the dock over the allocation of coal blocks but the BJP is no holy cow. Recommend0 Cyrus Howell Sep 02, 2012 07:35am The report must be debated thoroughly for the people to appreciate the Pros and Con Artists.
Q: Access control in style from code If I have a style that defines a control template, and in this I have a control, let's say a button, is there any way to access the button from code behind of the styled control? Thank you guys! =) A: Say you have a style defined as follows <Style x:Key="myStyle" TargetType="{x:Type Button}"> <Setter Property="Template"> <Setter.Value> <ControlTemplate> <Button x:Name="myTemplatedButton" Content="my templated button"/> </ControlTemplate> </Setter.Value> </Setter> </Style> And you apply it to a button <Button x:Name="myButton" Content="my default button" Style="{StaticResource myStyle}"/> You can access the button in the control template as follows var myTemplatedButton = myButton.Template.LoadContent() as Button; If the button is placed in a container inside the ControlTemplate, for example a StackPanel: <StackPanel> <CheckBox IsChecked="True"/> <Button x:Name="myTemplatedButton" Content="my templated button"/> </StackPanel> You can extract the main container and use FindName method to get your templated button var templatedControl = myButton.Template.LoadContent() as FrameworkElement; var templatedButton = templatedControl.FindName("myTemplatedButton") as Button; Hope this helps
1. Field of the Invention The present invention relates to a flat panel display, and more particularly, to a method and apparatus for patterning a thin film, wherein the method and apparatus is adapted for patterning a thin film substantially without the use of photolithography, in a way that may reduce processing time and minimize pattern deformities. 2. Description of the Related Art Display device are being emphasized more than ever as important visual information communication media. Traditional display devices include cathode ray tubes or Braun tubes, which make the display devices inconveniently large and heavy. Various display technologies have been developed toward replacing the cathode ray tube, and thereby making the display smaller and lighter. These include liquid crystal display (LCD), field emission display (FED), plasma display panel (PDP), and electro-luminescence (EL) flat panel display technologies, most of which are put to practical use and are on the market. With recent improvements to its mass production processes, liquid crystal display technology, in particular, has rapidly been replacing the cathode ray tube devices within many applied fields, since the LCD technology provides for devices that are generally light and thin. In particular, the active matrix type of liquid crystal display, which drives liquid crystal cells by use of thin film transistors (hereinafter “TFT”), has excellent picture quality and low power consumption and is being developed to larger sizes and higher resolutions as a result of research and development and the securing of mass production technology. An active matrix type of liquid crystal display, as illustrated in FIG. 1, includes a color filter array substrate 22 and a TFT array substrate 23 bonded together with a liquid crystal layer 15 between them. The liquid crystal display illustrated in FIG. 1 represents a part of the whole effective screen area. The color filter array substrate 22 has a black matrix (not shown), a color filter 13 and a common electrode 14 formed on the rear surface of an upper glass substrate 12. A polarizer 11 is affixed to the front surface of the upper glass substrate 12. The color filter 13 includes red, green and blue color filters to transmit visible light in a specific wavelength band, thereby enabling color display. On the front surface of the lower glass substrate 16 of the TFT array substrate 23, data lines 19 and gate lines 18 generally cross one another with TFTs formed at their crossing. A pixel electrode 21 is formed at a cell area defined by the data lines 19 and the gate lines 18 on the front surface of the lower glass substrate 16. The TFT 20 drives the pixel electrode 21 by switching a data transmission path between the data line 19 and the pixel electrode 21 in response to a scan signal from the gate line 18. A polarizer 17 is generally affixed to the rear surface of the TFT array substrate 23. The liquid crystal layer 15 controls the transmission of light incident through the TFT array substrate 23 to an extent proportional to the electric field applied to the liquid crystal material. The polarizers 11 and 17 that are respectively affixed to the color filter array substrate 22 and the TFT substrate 23 each transmit light polarized in one direction, and their polarizing directions cross each other for certain LCD modes, such as a 90° TN mode. An alignment film (not shown) may be formed on the opposite interior surfaces of the color filter array substrate 22 and the array TFT substrate 23. A typical related art fabricating process for producing the active matrix type of liquid crystal display may be divided into a substrate cleaning process, a substrate patterning process, an alignment forming/rubbing process, a substrate bonding/liquid crystal injection process, a mounting process, an inspection process, and a repair process. The substrate cleaning process removes impurities contaminating the substrate surface of the liquid crystal display. The substrate patterning process is generally divided into the patterning process of the color filter substrate and the patterning process of the TFT array substrate. The alignment film forming/rubbing process coats an alignment film onto each of the color filter substrate and the TFT array substrate and rubs the alignment film with rubbing cloth. The substrate bonding/liquid crystal injection process bonds the color filter substrate with the TFT array substrate by use of a sealant and injects liquid crystal and spacers through a liquid crystal injection hole, and then seals the liquid crystal injection hole. The mounting process connects a tape carrier package (TCP) to a pad part of the substrate, wherein the TCP has integrated circuits such as a gate drive IC and data drive IC mounted on it. Alternately, the drive integrated circuit can be mounted to the substrate directly by using chip-on-glass (COG) technology. The inspection process generally includes an electrical inspection conducted after the data lines, the gate lines, and the pixel electrodes are formed on the TFT array substrate. An electrical inspection and a naked-eye inspection may be conducted after the substrate bonding/liquid crystal injection process. The repair process conducts restoration for those substrates that are judged to be repairable by the inspection process. A substrate that is judged to be un-repairable in the inspection process is discarded. Generally, a photolithography process is used to pattern thin film materials making up display devices discussed above. The photolithography process includes the coating of photo-resist, mask alignment, exposure, development, and cleaning. However, there is a problem in that the required time for the process is long, the photo-resist material and stripping solution is generally wasteful, and expensive equipment such as exposure equipment is required.
Q: Show the equality of total variation of measure If $\mu$ is a complex measure on a $\sigma$-algebra $M$, and if $E \in M$, define $$\lambda(E) = \sup\sum \mu|E_i|,$$ the supremum being taken over all finite partitions $\{E_i\}$ of $E$. Does it follow that $\lambda = |\mu|?$ I know that this result hold if $\mu$ is charge. But in this case? A: The answer is affirmative. It is easy to see that $\lambda\leq |\mu|$. Let's prove the reverse inequality. Let $\epsilon>0$ and let $\{E_i\}_{i=1}^\infty$ a partition of $E$. Since the series $\sum_{i=1}^\infty |\mu(E_i)|$ converges, there exists $n_0\in\mathbb{N}$ such that $$\sum_{i=n_0+1}^\infty|\mu(E_i)|<\epsilon.$$ Define $\{F_i\}_{i=1}^{n_0+1}$ by $F_i=E_i$ for $i\in\{1,...,n_0\}$ and $F_{n_0+1}=\bigcup_{i=n_0+1}^\infty E_i$. Then $\{F_i\}_{i=1}^{n_0+1}$ is a finite partition of $E$ and $$\sum_{i=1}^\infty|\mu(E_i)|= \sum_{i=1}^{n_0}|\mu(E_i)| + \sum_{i=n_0+1}^{\infty}|\mu(E_i)| < \sum_{i=1}^{n_0}|\mu(F_i)| + \epsilon \leq \lambda(E)+\epsilon.$$ Since $\{E_i\}_{i=1}^\infty$ is arbitrary, we have $$|\mu|(E)\leq\lambda(E)+\epsilon.$$ Since $\epsilon>0$ is arbitrary, $|\mu|\leq \lambda$.
You are here Eric Lee's blog It feels weird to consider this my last blog post for the semester, if not for the rest of my college career. Unfortunately, I will not be a blogger for the following year due to many circumstances, and though it is abrupt and sad, I do not consider it as a bad thing. Rather, I'd like to consider it an opportunity to share one last constructed ramble of life lessons and expressive reflection before I head off to whatever the future has in store. I hope you enjoy. Do you ever wonder where a rabbit hole leads? The entrance is this small gaping hole that leads on a seemingly endless trail that has no end. There is also a phrase that is associated with it, called 'Going Down the Rabbit Hole'. In reference to "Alice’s Adventures in Wonderland", the main character Alice curiously chases after a well-dressed rabbit with a giant watch into a rabbit hole in order to appease her curiosity, leading to a series of adventures that are described in the book. Exercise is one of the most important things to incorporate into a lifestyle. After experiencing all-nighters in the GDC, eating snacks and sitting hunchbacked in front of a computer (creds to 439 and Graphics), I realized that my physical health was important to sustain in order to succeed in other areas in my life. As an interviewee candidate, whenever I walk into an interview, there are a lot of thoughts on my mind. How should I portray myself? What questions will the person ask? Is my tie on right? Will I enter the next steps? If I'm well prepared, I can confidently go through an interview without much problem. If I'm a bit tense, it takes a bit of time before I ease myself through the interview. If I'm a mess, well... it's a mess. Every moment in life, we go through seasons - seasons of learning, of struggle, of joy, or of hardship. Sometimes those seasons are based on unavoidable life changes. Other times, they are self-made decisions. For me, I've made the decision to leave the season of entrepreneurship. Two weeks ago, I talked about how it's ok to not know what you have in store in the future. That uncertainty is part of life, and rather than worrying about the future, it's better to take action and discover what there is when you can I remember when I started my freshman year, I honestly wasn't too sure about what it meant to have a CS degree. All my exposure to Computer Science had been those times trying to build websites, make computer games, move robots, and participate in programming competitions. In fact, I never knew there was a major called "CS". I had always assumed that when I went to college, I would need to get a coding or Software Engineer Major. Never would I have expected that there would be something called "Computer Science". How is computer even a science? Slowly, as the semesters go by, most of the required courses I need to take as a CS Major gets checked off the list. With this, much of my schedule has become more freeing, allowing me to pick and choose classes rather than be "forced" into the regular intro courses. Have you ever been in a moment where you've had so many events, exams, and assignments all packed together that you don't even get a chance to breathe, rest, or think? That's what happened last semester for me. Running this way and that, I was always on a nonstop pace in order to go to meetings at the Panda Express Union, or participate at an entrepreneurial event downtown, or hole up in the Incubator to finish some Graphics project - to preoccupy my mind and always busy myself. Pages The views, opinions and positions expressed by the authors and those providing comments on these blogs are theirs alone, and do not necessarily reflect the views, opinions or positions of UT Computer Science, The University of Texas or any employee thereof.
Cannabis should be legalised and many other drugs decriminalised, a Manchester MP told Parliament. Jeff Smith, Labour MP for Withington, told the House of Commons he believes the legalisation of cannabis is ‘inevitable’, if only the government would ‘grasp the nettle’. He also described the war on drugs as a ‘dangerous fantasy’ which ‘diverts attention and resources from the real challenge of making drugs safer and taking back control of the drugs trade from the criminals who want to exploit vulnerable users’. Mr Smith said addicts should be treated, not vilified. In an impassioned speech, Mr Smith highlighted the case of 15-year-old Martha Fernback, from Oxford, who died in 2014 after taking 91 per cent-pure MDMA. Martha’s mum Anne-Marie, who was in the public gallery for the debate on drugs policy, has since become a high-profile campaigner for the legalisation of ecstasy. Mr Smith said: “The day after tomorrow will be the fourth anniversary of the death of Martha Fernback. “The reason Martha died is because there was no controlling measure of the substance that killed her, there was no way for her to check the safety of the substance she was using. “Martha was failed by our approach to drugs policy.” Mr Smith said drug addiction was very often a psychological or biological problem and that addicts should be treated, not arrested. He described criminalising cannabis users for taking a substance ‘less dangerous than alcohol or tobacco, that the overwhelming majority find pleasant, relatively harm-free and a rewarding experience’ was ‘surely wrong’. (Image: Vincent Cole) Mr Smith also used the debate, which was held following the publication of the Home Office’s new drugs strategy, to call for consumption rooms for heroin users, heroin prescribing, pill testing and a ‘much stronger emphasis’ on education. The former DJ and events manager said there also needed to be ‘more openness and honesty’ in the drugs debate, adding: “In my previous life I spent a lot of time working and socialising in nightclubs and I spent a lot of time around people who had taken recreational drugs. “Many thousands, probably hundreds of thousands, of ecstasy pills are taken in the UK every week and we can’t pretend that people are taking drugs because it is a terrible, miserable experience because people won’t believe us. It will just destroy the credibility of the message. “I don’t expect any quick progress on drugs policy, but I think we need to start reframing the debate. “There are a limited number of us who are prepared to stand up and speak about this issue at the moment, I hope gradually the numbers will increase because we really need serious debate on this issue, not more of the same approach which has failed.”
Look, I know it’s corny, but I just really want a chapter where they end up visiting kids in the hospital.
The Crown in the manslaughter trial of Const. Daniel Montsion has conceded that a member of the officer's unit was ordered by his supervisor to purchase the Oakley assault gloves Montsion wore during the arrest of Abdirahman Abdi. The gloves are central to the weapons charge facing the Ottawa police officer in connection with Abdi's 2016 death. Montsion was wearing the gloves, which have reinforced knuckles, when he punched Abdi in the head during the Ottawa man's arrest on July 24, 2016. Abdi lost vital signs once he was in handcuffs, and died in the hospital the next day. Montsion has pleaded not guilty to manslaughter, aggravated assault and assault with a weapon. Two weeks ago the defence entered receipts into evidence, claiming they prove the Ottawa Police Service (OPS) purchased the gloves for officers on the direct action response team (DART), the unit Montsion was serving with at the time of the arrest. Receipts for the same style of Oakley gloves worn by Const. Daniel Montsion during the arrest of Abdirahman Abdi, entered into evidence by the Ottawa police officer's defence on Sept. 11, 2019. (Court exhibit) Crown attorney Philip Perlmutter initially refused to concede that the receipts came from the OPS. But in an agreed statement of facts admitted Tuesday, the Crown and the defence stated that another member of DART, Brad Rogrig, was asked by his supervisor to order the gloves. The agreed statement does not solve the mystery of a handwritten note made on a bank statement that was attached to one of the receipts filed by the defence. The defence initially suggested the note said "protective expense," but the Crown later submitted it said "protective eyewear," which could suggest the document has nothing to do with the purchase of gloves. Montsion's defence lawyers claim the handwritten note on the statement reads "protective expense DART." The Crown says it reads "protective eyewear," and say the statement may be unrelated to the purchase of gloves. (Court exhibit ) The Special Investigations Unit will continue to work with Ottawa police and the City of Ottawa to find any other documents that can clear up the confusion. Trial winding down Justice Robert Kelly adjourned the trial until Oct. 21, when the defence will call more evidence from forensic video expert Grant Fredericks. Fredericks is expected to explain his concerns over the reliability of the video evidence in the case. After that, the lawyers will prepare their final submissions. Typically, the defence would be the first to make closing arguments, but Kelly said he will allow the defence to go second. That means the defence will be able to hear the Crown's arguments before making their own. Defence lawyer Solomon Friedman made the request, arguing "the Crown theory of liability remains unclear, particularly on excessive force." Kelly said he expects the Crown will ask him to make findings about certain facts, and will build their arguments on his conclusions, so he prefers the Crown to go first. "I really do think it makes sense in this case," Kelly said. The lawyers will work during the adjournment to try to set a date for those arguments.
Image copyright Tiffany's & Co Image caption Breakfast and lunch are $29 and $39 respectively at the jewellery store's all-new cafe Shoppers on Fifth Avenue can now order breakfast at Tiffany's, 56 years after the movie title popularised the famous New York City jewellery store. Luxury jeweller Tiffany's & Co opened a cafe on Friday as part of a renovation of their Manhattan flagship store. The debut of the Blue Box Cafe follows the 1961 film in which actress Audrey Hepburn snacks on a pastry while gazing into a shop window on Fifth Avenue. But unlike character Holly Golightly, shoppers can now dine within the shop. The restaurant, which will serve American food, sits four floors above the street and overlooks Central Park. "The setting is as inviting as the food is inspiring, serving customers who have always dreamed of having Breakfast at Tiffany's," the company said in a press release, referencing the film. The room is decorated by the company's signature robin's egg blue, and the floor also features Tiffany's new home accessories collection including a $1,000 tin can made of sterling silver. Breakfast and lunch are $29 and $39 respectively, with two courses each, according to Eater.com, which reviewed the menu. The cafe is first come first served and on opening day they were fully booked. Three friends from Pennsylvania who travelled to New York for the day told the BBC they had "Tiffany Tea" and "White Wedding Tea" after shopping for bracelets in Tiffany's store. "It's a must," said Terry Beasley. "Unforgettable. We made a memory in the city here today. "Not everybody can say they've had breakfast at Tiffany's." They said they were satisfied with the experience but Ms Beasley's friend, Jayne Paris, wished there had been more commemoration of the movie. "Where was George Peppard?" she asked. Wall decorations include diamonds, chrome figurines and expensive house wares. Breakfast at Tiffany's is based on the Truman Capote novella about a country girl who moves to New York and joins high society. The film won best original song at the 1961 Academy Awards for "Moon River, and Audrey Hepburn was also nominated for best actress for her role in the film. In 2012, it was added to the US National Film Registry at the Library of Congress. The registry is made up of films that represent "important cultural, artistic and historic achievements in filmmaking".
Q: Como colocar animação de "aguarde" no Android? Gostaria de saber como coloco uma animação de "Aguarde" enquanto faço uma tarefa pesada no Android. No caso, quando o usuário digitar o cep quero que rode uma animação pedindo para aguardar enquanto faço a requisição. private Activity context; private ProgressDialog progress; private class BuscaCepTask extends AsyncTask<String, Void, String> { protected void onPreExecute() { progress = ProgressDialog.show(context, "Aguarde...", "Buscando CEP...", true, true); } URL url = null; HttpURLConnection httpURLConnection = null; @Override protected String doInBackground(String... params) { StringBuilder result = null; int respCode = -1; try { url = new URL("http://cep.correiocontrol.com.br/" + params[0] + ".json"); httpURLConnection = (HttpURLConnection) url.openConnection(); do { if (httpURLConnection != null) { respCode = httpURLConnection.getResponseCode(); } } while (respCode == -1); if (respCode == HttpURLConnection.HTTP_OK) { BufferedReader br = new BufferedReader(new InputStreamReader(httpURLConnection.getInputStream())); result = new StringBuilder(); String line; while ((line = br.readLine()) != null) { result.append(line); } br.close(); } } catch (IOException e) { e.printStackTrace(); } finally { if (httpURLConnection != null) { httpURLConnection.disconnect(); httpURLConnection = null; } } return (result != null) ? result.toString() : null; } @Override protected void onPostExecute(String s) { super.onPostExecute(s); try { JSONObject object = new JSONObject(s); EditText rua = (EditText) findViewById(R.id.rua); rua.setText(object.getString("logradouro")); } catch (JSONException e) { e.printStackTrace(); } progress.dismiss(); } } . @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.formulario); final EditText endereco = (EditText) findViewById(R.id.endereco); endereco.addTextChangedListener(new TextWatcher() { @Override public void beforeTextChanged(CharSequence s, int start, int count, int after) { } @Override public void onTextChanged(CharSequence s, int start, int before, int count) { } @Override public void afterTextChanged(Editable s) { BuscaCepTask buscarCep = new BuscaCepTask(); buscarCep.execute(endereco.getText().toString()); } }); A: Tá aí a solução em código: private class uploadPhoto extends AsyncTask<Void, Void, Void>{ private ProgressDialog dialog; protected void onPostExecute(Void dResult) { dialog.cancel(); } protected void onPreExecute() { dialog = new ProgressDialog(Myactivity.this); dialog.setCancelable(true); dialog.setMessage("uploading..."); dialog.show(); } protected Void doInBackground(Void... params) { // call upload photo here. } } Para chamar a asyncTask use: new uploadPhoto().execute();
Shaun Dillon Shaun Dillon (born 24 August 1984 in Greenock) is a Scottish association football player. He played for Stirling Albion joining them in June 2011 and leaving the club in May 2012. On 1 June 2012 Shaun Dillon join Kilbirnie Ladeside football club. On 23 August 2013 Shaun Dillon join Arthurlie F.C.. References External links Category:1984 births Category:Living people Category:Sportspeople from Greenock Category:Scottish footballers Category:Association football defenders Category:Scottish Premier League players Category:Scottish Football League players Category:Kilmarnock F.C. players Category:Greenock Morton F.C. players Category:Queen of the South F.C. players Category:Stenhousemuir F.C. players Category:Stranraer F.C. players Category:Scottish Junior Football Association players Category:Stirling Albion F.C. players Category:Irvine Meadow XI F.C. players Category:Pollok F.C. players Category:Kilbirnie Ladeside F.C. players Category:Arthurlie F.C. players
Duquesne University Founded in 1878, Duquesne is consistently ranked among the nation's top Catholic universities for its award-winning faculty and tradition of academic excellence. Duquesne, a campus of nearly 10,000 graduate and undergraduate students, has been nationally recognized for its academic programs, community service and commitment to sustainability. Follow Duquesne University on Facebook, Twitter and Instagram.www.duq.edu
/* * FXGL - JavaFX Game Library. The MIT License (MIT). * Copyright (c) AlmasB (almaslvl@gmail.com). * See LICENSE for details. */ package com.almasb.fxgl.pathfinding.astar; import com.almasb.fxgl.core.math.FXGLMath; import com.almasb.fxgl.core.util.EmptyRunnable; import com.almasb.fxgl.core.util.LazyValue; import com.almasb.fxgl.entity.component.Component; import com.almasb.fxgl.entity.component.Required; import com.almasb.fxgl.pathfinding.CellMoveComponent; import java.util.ArrayList; import java.util.List; import java.util.Random; /** * @author Almas Baimagambetov (almaslvl@gmail.com) */ @Required(CellMoveComponent.class) public final class AStarMoveComponent extends Component { private CellMoveComponent moveComponent; private LazyValue<AStarPathfinder> pathfinder; private List<AStarCell> path = new ArrayList<>(); private Runnable delayedPathCalc = EmptyRunnable.INSTANCE; public AStarMoveComponent(AStarGrid grid) { this(new LazyValue<>(() -> grid)); } /** * This ctor is for cases when the grid has not been constructed yet. */ public AStarMoveComponent(LazyValue<AStarGrid> grid) { pathfinder = new LazyValue<>(() -> new AStarPathfinder(grid.get())); } @Override public void onAdded() { moveComponent = entity.getComponent(CellMoveComponent.class); moveComponent.atDestinationProperty().addListener((o, old, isAtDestination) -> { if (isAtDestination) { delayedPathCalc.run(); delayedPathCalc = EmptyRunnable.INSTANCE; } }); } public boolean isMoving() { return moveComponent.isMoving(); } public boolean isPathEmpty() { return path.isEmpty(); } /** * @return true when the path is empty and entity is no longer moving */ public boolean isAtDestination() { return !isMoving() && isPathEmpty(); } public AStarGrid getGrid() { return pathfinder.get().getGrid(); } public void stopMovementAt(int cellX, int cellY) { path.clear(); moveComponent.setPositionToCell(cellX, cellY); } public void moveToRightCell() { getGrid().getRight(moveComponent.getCellX(), moveComponent.getCellY()) .ifPresent(this::moveToCell); } public void moveToLeftCell() { getGrid().getLeft(moveComponent.getCellX(), moveComponent.getCellY()) .ifPresent(this::moveToCell); } public void moveToUpCell() { getGrid().getUp(moveComponent.getCellX(), moveComponent.getCellY()) .ifPresent(this::moveToCell); } public void moveToDownCell() { getGrid().getDown(moveComponent.getCellX(), moveComponent.getCellY()) .ifPresent(this::moveToCell); } public void moveToRandomCell() { moveToRandomCell(FXGLMath.getRandom()); } public void moveToRandomCell(Random random) { getGrid().getRandomCell(random, AStarCell::isWalkable) .ifPresent(this::moveToCell); } public void moveToCell(AStarCell cell) { moveToCell(cell.getX(), cell.getY()); } /** * Entity's anchored position is used to position it in the cell. */ public void moveToCell(int x, int y) { int startX = moveComponent.getCellX(); int startY = moveComponent.getCellY(); moveToCell(startX, startY, x, y); } /** * Entity's anchored position is used to position it in the cell. * This can be used to explicitly specify the start X and Y of the entity. */ public void moveToCell(int startX, int startY, int targetX, int targetY) { if (moveComponent.isAtDestination()) { path = pathfinder.get().findPath(startX, startY, targetX, targetY); } else { delayedPathCalc = () -> path = pathfinder.get().findPath(moveComponent.getCellX(), moveComponent.getCellY(), targetX, targetY); } } @Override public void onUpdate(double tpf) { if (path.isEmpty() || !moveComponent.isAtDestination()) return; var next = path.remove(0); // move to next adjacent cell moveComponent.moveToCell(next.getX(), next.getY()); } @Override public boolean isComponentInjectionRequired() { return false; } }
FROM: Project Lead TO: Arma 3 Users INFO: Update 1.46 Prep, Remote Script Execution, External 3D Artists PRECEDENCE: Flash SITUATION Now that the new BattlEye anti-cheat service has had its infrastructure tested successfully in version 1.44, we're ready for the next stage. On Dev-Branch you can try the game with full protection enabled, meaning the game has its shield up the entire time from launch to exit. You'll find a new page in the Launcher, where you can toggle the service on or off and see status messages. These changes and various multiplayer stability fixes are slated for update 1.46. We'll be taking a build snapshot this week, and aim to open a public Release Candidate branch on Friday or early next week. Stay tuned to our usual channels for details! INTELLIGENCE Check out this great unofficial introduction to Arma 3! Its creator very effectively shows off the uniqueness, scale and freedom of the sandbox by demonstrating both vanilla and modded content. Thanks for the video, Southpaw! Last week was about #modlove2015 and in its spirit we highlighted the "Contributor" achievement. With 0.7% of the global player base having unlocked it, there are already over 13000 custom scenarios on the Steam Workshop! And that is all you need to do for this achievement: publish a scenario from the in-game editor. Take a look at this simple 101 guide to learn how to do just that. Publishing a scenario is easy. Publishing a fun, challenging and engaging scenario is another matter entirely. In addition to the design itself, here are a few tips to present your creation in a good way: Go over the Mission Presentation documentation. Obviously you are free to use your own style, but there are several useful systems that can elevate your work with little effort. Configure the overview image and text, loading screen, standard cutscenes, in-game notifications and debriefing as you wish. documentation. Obviously you are free to use your own style, but there are several useful systems that can elevate your work with little effort. Configure the overview image and text, loading screen, standard cutscenes, in-game notifications and debriefing as you wish. Avoid tag spam ! The editor lets you specify tags that should make it easier for players to discover your work. Don't overdo it by selecting any tag that remotely fits the scenario. All this will do, is make the Workshop harder to search. In fact, we're considering restricting tags in some way in the near future. Pick the key aspects that fit your creation to prevent subscriber confusion. Learn more here. ! The editor lets you specify tags that should make it easier for players to discover your work. Don't overdo it by selecting any tag that remotely fits the scenario. All this will do, is make the Workshop harder to search. In fact, we're considering restricting tags in some way in the near future. Pick the key aspects that fit your creation to prevent subscriber confusion. Learn more here. Define dependencies. You can notify users of Required DLC and / or other Required (Workshop) Items. At the moment these are soft dependencies that are not handled by the game automatically, but this is an area our Launcher team is focusing on now. There is also an issue with not listing all DLC at the moment. It has been reported to Steam. Mastering Developer Jakub Hrubý has created an action-packed montage of our recent End Game livestream. Experience the action from his perspective, and then go find an End Game server to have fun yourself! Occasionally the team has to suffer some patriotic tendencies from its Dutch duo. The weekly photo shows Encoding Lead Petr Kolář having been placed under the spell of some of the finest comfort food from the Netherlands. Our weapons of choice: pindakaas (peanut butter), stroopwafel (caramel syrup waffle) and pepermunt (peppermint). We can confirm they have made several great things happen for Arma 3 thus far! OPERATIONS We're in full production for the new Expansion terrain, and there is an opportunity for some of you to contribute. We want to make this terrain truly special, with lots of great places to explore. Achieving this requires a lot of art assets to be produced. We've decided to ask a few Arma modders for assistance via paid external contract work. More art capacity means more unique locations can be created. Your focus would be on creating buildings and other structures as Producer Lukáš Veselý describes on the forums. Visit the careers page for further information. We look forward to working with you to make this next huge canvas for Arma 3 awesomely detailed. Sometimes we have opportunities to go on field trips for our games. Last week, a small delegation attended the IDET fair in Brno, Senior Designer Vladimír Hynek among them. In this case we were not researching specific technologies, but rather letting ourselves get inspired for future work on assets, features and games. It helps our designers to spend some time in fully-featured training simulators, to hold weapon systems, to see procedures in action and to speak with the people using defense and security tech in the field. In the pursuit of optimization, Programmer Richard Biely and Designer Jiří Wainar have been working on engine-supported remote execution of script code. This was already possible via a scripted framework powered by function BIS_fnc_MP. However, using this framework results in a lot of overhead and data transfer. There now exist two new script commands on Dev-Branch: remoteExec and remoteExecCall. These will make it possible to achieve the same functionality via engine code, making it faster, using less traffic, handling Join-In-Progress better, and allowing us to increase security in the future. You can either use these commands on your own, or keep using BIS_fnc_MP. Its parameters and usage will remain the same, but it will use these new commands to do its heavy-lifting. LOGISTICS Online Services Consultant David Foltýn has been coordinating the preparation for a final Arma 2: Operation Arrowhead patch. It brings over some of the critical core security and multiplayer improvements from Arma 3. After a period of testing on the Steam beta branch, it will likely be released to main branch soon.
Lebanese Government to Ban VoIP. Or Can They? I was reading my daily blogs this morning when I came across a brilliant illustration by Maya Zankoul describing alternatives to using Skype in Lebanon in the case the government bans it there, but that’s not gonna happen. In a massive online and offline civil society movement that began exactly a week ago, some leading technology blogs started promoting a call to “stop the new internet law in Lebanon” which included clauses such as banning all VoIP (Voice over IP) services. The list is very long where this is happening in the Middle East, starting from Morocco in the far West, to Oman in the far East and we’ve covered a lot of it. But we haven’t covered a situation where the people have actually been able to make a difference, Lebanon begs to differ. Apparently in less than a week of the initiative the online citizens of Lebanon were able to stop putting the law into implementation for a month. The law has been sent back to the committee for revision and will be voted on in 30 days, enter opportunity. If this law is changed to what the Lebanese people can work with, they will have set the bar for the rest of the region, proving with the right action, anything can be accomplished.
When the 'evidence' in evidence-based practice is ignored: a time for advocacy. There are innumerable aspects of critical care nursing where we have limited or no research basis for practice. But where evidence-based practice is available, it must be universally disseminated and applied so that all patients may benefit. Part of our responsibility as healthcare professionals is to contribute to this dissemination process so that optimal patient outcomes can be attained. Quality care should not exist on a patchwork basis across the United States. Patients have a right to expect that we afford them the best care that science presently offers. Care should rely as much as possible on research-based evidence of what helps and hinders optimal patient outcomes. When these indicators of what helps versus hinders optimal outcomes are known, patients should be able to depend on us to provide care on that basis. They should not need to rely on their zip code to receive optimal care.
function test28 %TEST28 test nesdis % Example: % test28 % See also cholmod_test % Copyright 2007, Timothy A. Davis, http://www.suitesparse.com index = UFget ; [ignore f] = sort (index.nnz) ; % f = find (index.nrows < index.ncols) ; % [ignore i] = sort (index.nnz (f)) ; % f = f (i) ; f = f (1:100) ; for i = f try Prob = UFget (i, index) ; A = spones (Prob.A) ; [m n] = size (A) ; if (m < n) A = A*A' ; elseif (m > n) ; A = A'*A ; else A = A+A' ; end % default: do not split connected components [p1 cp1 cmem1] = nesdis (A) ; %#ok % order connected components separately [p2 cp2 cmem2] = nesdis (A, 'sym', [200 1]) ; %#ok c1 = symbfact (A (p1,p1)) ; c2 = symbfact (A (p2,p2)) ; lnz1 = sum (c1) ; lnz2 = sum (c2) ; fprintf ('%35s %8d %8d ', Prob.name, lnz1, lnz2) if (lnz1 == lnz2) fprintf (' 1\n') ; else fprintf (' %8.3f\n', lnz1/lnz2) ; end subplot (2,3,1) ; spy (A) ; subplot (2,3,2) ; spy (A (p1,p1)) ; subplot (2,3,3) ; treeplot (cp1) ; subplot (2,3,5) ; spy (A (p2,p2)) ; subplot (2,3,6) ; treeplot (cp2) ; drawnow catch fprintf ('%4d failed\n', i) ; end end
This research program (CA-19033), now in the thirty-second year, embodies our long-term commitment to the complete structural characterization and efficient enantioselective synthesis of architecturally challenging anticancer agents. The principal goals for years 33-36 will comprise the following: In the phorboxazole area, we will: (A) scale up the synthesis of either (+)-phorboxazole A, (+)-chlorophorboxazole A, or a closely related analogue, based on the results of ongoing biological studies to define and optimal lead agents, and (B) prepare a series of probe molecules based on the selected phorboxazole lead to increase our understanding of the molecular mechanism(s) of action. In the lituarrine arena, we will: (C) complete the total syntheses of the revised structures of lituarines A-C, the latter based on detailed NMR and modeling studies carried out upon completion of the syntheses of the original "assigned" structures. In the area of new targets, we will demonstrate the utility of the Petasis-Ferrier union/rearrangement with: (D) the total syntheses of enigmazoles A and B, members of an exciting new family of extremely rare marine agents that possess activities similar to Gleevec, and (E) with a total synthesis of tumor cell growth inhibitors (+)-neopeltolide, exploiting the Petasis-Ferrier tactic not only to construct the requisite tetrahydropyran ring, but also to achieve macrocyclization. In addition, we will: (F) develop and showcase the power of multicomponent Anion Relay Chemistry (ARC) with a viable synthesis of (+)-iriomoteolide 1a, a novel cytotoxic marine macrolide. Finally we will: (G) extend the non-aldol/polyene protocol for construction of stereochemically diverse polyketides. Beyond these specific synthetic objectives, a general, long-range goal of this program is the identification of molecular architectures responsible for biological activity. Thus, as we develop an approach to each target structure, we will also prepare model compounds designed to permit the elucidation of structure-activity relationships. PUBLIC HEALTH RELEVANCE: The overarching goal of this research program has been, and will continue to be, the full characterization, structural assignment, and efficient enantioselective total syntheses of architecturally novel, naturally occurring compounds that hold significant potential as new chemotherapeutic agents for clinical intervention in the treatment of cancer. To this end, new synthetic chemistry will be developed that will have utility not only for this program, but also be of general value to the academic and pharmaceutical communities engaged in Cancer Biology.
Recruitment index as a measure of patient recruitment activity in clinical trials. Recruitment of patients for clinical trials is one of the major hurdles on the way to successful completion of any human research study. Direct comparison of recruitment activity in different sites and projects is not easy due to lack of a unified measure of recruitment efficacy. The author introduces a new variable, the Recruitment Index, which represents the number of days required for an average study site in a multicenter study to recruit one analyzable patient. Once established in previous studies, an indication-specific Recruitment Index can be used for a variety of purposes, e.g. evaluation of efficacy of various recruitment strategies, planning duration of recruitment period for a new study, or projecting the number of participating sites required to supply a given number of analyzable patients within a certain period.
Evaluation of different captive bolt lengths and breed influence upon post-stun hind limb and forelimb activity in fed cattle at a commercial slaughter facility. The objective of this study was to assess the effects of captive bolt length and breed type on post-stun leg activity in cattle. A total of 2850 Holstein (HOL) and non-Holstein British/Continental bred (NHOL) steers and heifers were observed post-stunning at a large commercial slaughter facility. A pneumatically powered penetrating captive bolt stunner was used with three different bolt lengths: CON, 15.24 cm; MED, 16.51 cm; and LON, 17.78 cm. Hind limb kicking, forelimb activity, take away belt stops, carcass swing and number of knife sticks during exsanguination were recorded for each animal from video recording. Hind limb and forelimb kicks observed ranged from 0 to 25 and 0 to 8, respectively. Analysis of post-stun hind limb and forelimb activity indicated that increasing pneumatically powered penetrating captive bolt length does not decrease post-stun leg activity. There was a higher percentage of cattle experiencing take away belt stops and carcass swing in HOL as compared with NHOL.
EgyptAir hijack: Cyprus 'agrees to extradite suspect' Published duration 6 April 2016 image copyright EPA image caption Egyptian officials had asked for the extradition of the suspected hijacker Cyprus has agreed to extradite to Egypt the man accused of hijacking an airliner last week, reports say. Seif al-Din Mustafa, 58, used a fake suicide belt to hijack the EgyptAir flight and forced it to fly to Larnaca. He has been held in Cyprus and the extradition process is expected to be fast-tracked, AFP reported. Mr Mustafa has been described as being mentally disturbed and can be charged with air piracy, kidnapping and threatening behaviour. According to Cypriot police, the suspect gave a voluntary statement admitting to the hijacking, the news agency added. The incident is believed to have been motivated by a row between Mr Mustafa and his ex-wife, who lives in Cyprus. Egypt had asked Cyprus to hand him over under a 1996 bilateral extradition treaty. image copyright AFP/Getty image caption Stand-off ended after six hours with no-one injured EgyptAir flight MS181 was carrying 56 passengers from Alexandria to Cairo, along with six crew and a security official, when it was diverted to Cyprus. The drama ended with all passengers released unhurt at Larnaca airport and the man giving himself up after a six-hour stand-off.
Matthew Smith is co-founder and CEO of Fortify Rights. Follow him on Twitter @matthewfsmith. The opinions expressed here are solely his. (CNN) Four years ago, I was in Myanmar's Rakhine State soon after deadly violence erupted between ethnic Rakhine Buddhists and stateless Rohingya Muslims. It was a horrendous scene. And it's happening again. Back then, Buddhist civilians and state security forces unleashed coordinated attacks against Rohingya and other Muslims. I documented pre-dawn raids and cold-blooded massacres. In a small village in Mrauk-U Township on October 23, 2012, 70 Rohingya were killed, including 28 children -- 13 under the age of 5. Children were hacked to death. Some were thrown into fires. Entire villages were razed; smoke billowed from homes and mosques in 13 of 17 townships statewide and bodies were disposed in mass graves, none of which have been exhumed for forensic purposes. I personally documented four separate mass gravesites. At the time, an unpublished United Nations investigation obtained by Al Jazeera's investigative unit, found more than 100 Rohingya women and girls were raped. The authorities then corralled more than 130,000 Rohingya into more than 40 squalid interment camps, where they remain confined today. This all happened under former President Thein Sein, a longtime military general lauded by the West as a reformer. Now Nobel-laureate Aung San Suu Kyi is State Counselor, the de facto head of state --and the same atrocities are happening again. JUST WATCHED Rohingya families flee persecution in Myanmar Replay More Videos ... MUST WATCH Rohingya families flee persecution in Myanmar 02:53 The recent violence On October 9, a group of Rohingya men and boys allegedly attacked three police outposts in Maungdaw and Rathedaung townships, killing nine police. This was highly unusual. Despite unending persecution, Rohingya militancy hasn't been seen for decades. The Myanmar military commenced a full-on offensive that's ongoing in northern Rakhine State -- a veritable black zone sealed off from aid workers and international observers. We've documented unlawful killings of unarmed Rohingya men , and we've steadily received allegations of mass rape of Rohingya women and girls by army soldiers. Meantime, the civilian government and military continue to block all access to affected areas. Pre-existing aid programs, which were keeping thousands of Rohingya alive, have been suspended for eight weeks. According to the UN, the authorities are denying at least 130,000 men, women and children access to humanitarian aid -- food, nutrition and health care. Thirty thousand are likely displaced in the blackout zone. An estimated 3,000 children suffer from severe acute malnutrition. Without urgent aid, they will likely die. Nearly all of the international aid workers in Maungdaw Township have left as the government has not renewed their travel authorizations. Independent monitors and media are still barred. State-run media has claimed international journalists and human rights groups are working "hand in glove" with terrorists. It has alluded to Rohingya a s a "thorn" that "has to be removed," and as "detestable human fleas." Make no mistake: this is genocide talk. And it is happening with Aung San Suu Kyi's imprimatur. JUST WATCHED Myanmar's democracy icon on her nation's persecuted minority Replay More Videos ... MUST WATCH Myanmar's democracy icon on her nation's persecuted minority 01:42 Suu Kyi's culpability The dominant narrative suggests Suu Kyi's hands are tied and that she has no control over the military. This is a half-truth. By law, the military controls the ministries of Defense, Home Affairs and Border Affairs. These are instrumental ministries with respect to abuses in northern Rakhine State and Suu Kyi doesn't control them. But in military lockstep, the State Counselor's office has flatly denied any abuses may have taken place since October 9. And she's since doubled down, accusing the international community of "always drumming up cause for bigger fires of resentment. Her office has demanded apologies from the BBC and the UN's refugee agency after the latter alleged "ethnic cleansing" was taking place. Moreover, Suu Kyi does control the ministries of Information, Foreign Affairs and others, and she could swiftly renew travel authorizations for aid workers. But she isn't. No one in the country has as much moral authority to change public opinion and counteract hate speech as Suu Kyi. So UN officials and governments are rightly sounding alarms. The UN Special Advisor on genocide prevention last week called for urgent action while the office of the UN High Commissioner for Human Rights alleged again that crimes against humanity may be taking place. The US government called for a "credible and independent investigation," a call echoed by various Asian parliaments in recent weeks. But this is not enough. Left to its own devices, Myanmar will continue to destroy this ethnic and religious minority. We can't let that happen. JUST WATCHED UNHCR speaks to CNN about Rohingya Muslims in Myanmar Replay More Videos ... MUST WATCH UNHCR speaks to CNN about Rohingya Muslims in Myanmar 02:26 What can be done In his final days in office, UN Secretary General Ban Ki Moon should travel to Myanmar and personally ensure the authorities provide immediate and unfettered access to all populations in need in Rakhine State. Any failure to end this despicable aid blockade will result in significant loss of life -- indeed, it likely already has. In addition, UN member states should push for a UN Commission of Inquiry into what is happening in Rakhine State. In August, Aung San Suu Kyi appointed an "Advisory Commission" on Rakhine State, which is led by former UN Secretary General Kofi Annan. Fortify Rights welcomed the move, but Annan himself has said the commission does not intend to focus on human rights. It's unclear if that directive comes from him or the State Counselor, but regardless, for the Rohingya, it's a problem. Annan is expected to address the press this afternoon following a three-day guided tour of Rakhine State. We don't expect him to address ongoing human rights violations, but he should. At this point, it's a moral imperative. His commission isn't the only one expected to abandon human rights. Last week, Suu Kyi's government appointed yet another body to look into the situation in Rakhine State since since October 9. It has all the markings of a whitewash -- it's led by retired army general Myint Swe, a man formerly blacklisted by the US government -- and doesn't include a single Muslim commissioner. Now is the time for independent UN-mandated Commission of Inquiry to address the totality of the human rights situation in Rakhine State, including grievances from the Rakhine Buddhist communities. Such an investigation would provide much-needed credibility and could cooperate with Kofi Annan's team while also delving deep to establish the facts, identify perpetrators and make recommendations to end, once and for all, the cycle of atrocity crimes against Rohingya -- before it's too late. Aung San Suu Kyi appears to be watching a possible genocide unfold. The international community must not.
[Dynamics of the formation of secondary reproductive structures in Streptomyces zone-forming colonies as determined from confocal microscopy data]. The dynamics of the formation of secondary structures on the colony surface, so-called air mycelium concentric rings, was investigated by confocal microscopy and using Streptomyces zone-forming colonies as a model of a self-organizing system. The occurrence of luminescence in reproductive structures was registered, whereas in vegetative structures it was almost completely absent. It was shown that secondary reproductive structures begin to form within the thickness of substratum mycelium as branches or as an apical extension of vegetative gyphes, followed by the formation of numerous secondary branches filled with protospores.
I think this is gameloft's weakest game. Almost trash compared to their other titles, even to ones that were older than this game. I'm not going in eyes shut, but I am optimistic that I will like it since the worst complaints are that it's short and the story is generic. The reviews overall on this are pretty good. It averages 4/5 with over 2000 reviews. I'll post some impressions and if it's worth the buck once I put some time in ... though it may be noon (CST) before I have time to dedicate to the game. I'm not going in eyes shut, but I am optimistic that I will like it since the worst complaints are that it's short and the story is generic. The reviews overall on this are pretty good. It averages 4/5 with over 2000 reviews. I'll post some impressions and if it's worth the buck once I put some time in ... though it may be noon (CST) before I have time to dedicate to the game. Yeah, let us know. Usually buy all gameloft games that are on sale, really enjoyed Backstab and 9mm on sale. Unanimously agreed to be Gameloft's weakest "premium" title. Grabbed it during the first $0.99 sale. Was painful finishing the campaign even though it's the shortest one of them (2 hours). The multiplayer.. I played through the first mission and I had a good time. It was pretty fun. Maybe not as over the top as Modern Warfare 3 or something... but still, pretty cool. Graphically the game is good. Audio was solid (I wear headphones much of the time when iOS gaming). Everything had voice acting as well as on screen text. Voice acting was as good as any other game. The environments in the first mission are all areas and you move from checkpoint to checkpoint. There's a compass with an arrow (or arrows) to show where enemies are as well as a floating thing to say how far you are from the checkpoint and which way it is. Controls let you climb certain things as well as crouch... slide around corners... aim by touching the screen on the right side as well as other basic stuff. The hand to hand combat was decent (honestly none of the gameloft games have really great hand to hand combat... this one seems no different than any other). So, if it looks interesting to you... get it. I kind of see this as a Goldeneye kind of experience. If you remember the N64 version (outside of multiplayer) it was all structured missions where you had to get certain places and take out specific enemies or whatnot. There was no option to sneak around in the first mission, but I didn't expect there would be since it looked like a lot of gunplay. IF it's as short as everyone says, I should finish it tonight. I can post more after that. But as it stands it was more than worth my $0.99 and having a tracker on it for the last 5 or so months. Nice game, very quick. I am not the fastest gamer, but I can say it was 2-3 hours. For 99c, yes! 6.99... Uhh, I don't think so... The only problem is the multiplayer is totally dead, which is sad. Edit: the end was kinda cliffhangerish, sequel? Idk though... The game was really fun compared to what everyone said it was, yes it was kinda short but it was good, the graphics are great almost amazing in my opinion, I would recommend playing this game on normal for your first time because the enemy are just about stupid as it gets. For 99cents it's great! About Us "TouchArcade covers the latest games and apps for Apple's iPhone and iPod Touch. We are the largest site dedicated to iPhone and iPod Touch gaming." Promotional Codes While we now accept iTunes Promotional Codes for games, we can't guarantee that your app will be reviewed or covered. Only one promotion code is required. Feel free to send promo codes to tips@toucharcade.com. While we appreciate the promo codes, notable app pre-announcements and preview copies are also of interest to our readers. Please feel free to contact us at the same email address about these opportunities. Note: we rarely (if ever) solicit developers directly for promo codes. If you receive such an email, please contact us. Advertising We have advertising opportunities available to iPhone and iPod Touch developers. If interested, please contact us at ads@toucharcade.com. Press Contact We welcome news releases, previews, screenshots and video links for existing or upcoming iPhone and iPod Games. We can't promise a personal reply but we do try to evaluate every title submitted. Please send press releases or general inquiries to tips@toucharcade.com.
Q: Need help on mysql query i have a mysql database, in this i have a table called articles. I want to display the archive of this article in my web page. What i want to do is, i have to display the year, once user click the year it will show the list of month which contains the article .. How i can write mysql query for this? The problem i'm facing is, i have to display the year which contains the article same like for months also. I have the article created date in the form of timestamp in my table.. Can any one suggest me how to do this? EDIT: CREATE TABLE IF NOT EXISTS `articles` ( `id` int(20) NOT NULL AUTO_INCREMENT, `name` varchar(255) NOT NULL, `pid` int(20) NOT NULL DEFAULT '0', `department_id` int(20) NOT NULL, `author` varchar(100) NOT NULL, `created` varchar(25) NOT NULL, PRIMARY KEY (`id`) ) ENGINE=InnoDB DEFAULT CHARSET=latin1 AUTO_INCREMENT=23 ; A: Your database engine has functions that extract individual parts of the data and time from a SQL timestamp. For example, in MySQL you could do SELECT YEAR(created), MONTH(created) FROM articles ...
Schildknecht and Beranek on top at Ironman Switzerland Ronnie Schildknecht made it number seven, while Anja Beranek turned her season around with an emphatic victory at Ironman Switzerland overnight. Men’s Race On the brink of a record-breaking seventh consecutive Ironman Switzerland title, local legend Ronnie Schildknecht found himself 3:41 behind a lead group of three in eighth place after the 3.8-kilometre swim in Lake Zurich. Despite having Marko Albert (52:18), Jan Van Berkel (52:32) and Ivan Raña (52:37) all up the road and riding by time Schildknecht reached T1, the six-time champion was not panicking, as nobody knows this bike course like Schildknecht. With temperatures up over 30 degrees celsius, Schildknecht was well and truly still in a good position to make a run for the win. Such is the class of Van Berkel though, it took Schildknecht 110-kilometres to catch the former ITU-athlete on the bike. At the 123-kilometre mark the gap had extended to 1:13, but not long after Schildknecht started to cramp and that allowed Van Berkel to catch back up. Van Berkel then moved into the lead when Schildknecht crashed and with 10 kilometres to ride there was a 1:45 difference between the two. When Van Berkel (4:32:59) hit T2, he was 2:10 ahead of Schildknecht, but unfortunately his time at the front would only last for the first of the four laps on the run. Evenutally, Van Berkel was forced to withdraw from the race. With Schildknecht now in the lead and Raña well back in second place, it was just a matter of getting through the remaining three laps of the run with heat now the Swiss-athlete’s biggest threat. Despite Raña producing a solid 2:59 marathon, it was only enough to pull back a couple of minutes on Schildknecht (3:01). In a time of 8:33:39, Schildknecht continued his amazing run in Zurich to seven consecutive titles and is now only three away from New Zealand’s Cam Brown record of 10 in Taupo. Raña held on for second, while Per Bittner produced the fastest run of the day (2:57) to jump into third place overall ahead of Maxim Kriat in fourth. Women’s Race The women’s race at Ironman Switzerland could have gone in so many different directions, with several athletes racing for points to sneak into the top-28 and others making their debut at the full distance. One of those attempting the Iron-distance for the first time was Switzerland’s Celine Schaerer and the debutant commanded a huge lead out of the 3.8-kilometre swim in Lake Zurich. Schaerer, who competed on the World Triathlon Series circuit in 2012, set herself up nicely with a 52:38 swim and it left the pre-race favourite Anja Beranek (58:21) nearly six minutes down in second place to begin the bike. The main pack led by Sofie Goos (1:01:18) was out of the water more than eight minutes down on Schaerer and it included pre-race contenders Erika Csomor, Regula Rohrbach, Sara Gross and Diana Riesler. British cycling star Emma Pooley was even further back, exiting the water in 1:08:16 alongside Ironman Australia winner Rebecca Hoschke. The battle out front between Beranek and Schaerer did not last long on the bike, as the German caught her Swiss-rival at the 50-kilometre mark before powering away to open up a 4:56 lead by the time she reached T2. With a time of 4:56:23 for the 180-kilometre ride, Beranek recorded the fastest bike split of the day by 3:30. Schaerer held tough to reach T2 in second place but there was then nearly a nine minute wait for Rohrbach to get off the bike in third place. Pooley impressively managed to pull herself up into fourth after a less than impressive swim thanks to the day’s second-fastest 4:59 bike, but the Brit was still 15:33 behind Beranek and in need of a miracle on the run to make the podium. The run did nothing to change the top-two placings, as Beranek’s 3:22 marathon ensured she would remain in first place, while Schaerer impressively only gave up just over a minute to the German winner over 42.2 kilometres. Pooley unfortunately could not continue her rise up the ranks and fell back to fifth place, with Erika Csomor moving up the field and into third with an impressive 3:17 marathon. The day’s fastest run went to Hoschke (3:15:25), who finished seventh overall in 9:48.
CALLiOPE KONTAKT 0TH3Rside | 20.09.2016 | 788 MB CALLIOPE is Universal Sound Module virtual instrument. It contains many instruments for all musical genres like a hardware sound module, ROMpler or music workstation. There are over 1,000 preset sounds in these categories: Keyboard, Bass, Guitar, Lead, Brass, Wind, String, Pad, Synth, Percussion and Drum.
The present invention relates to a technique for multilevel (multivalued) modulation and demodulation, and in particular, to a multilevel modulation device in which transmitting data is assigned to a plurality of modulation symbols, a multilevel demodulation device, a communication system using the modulation and demodulation device, a program and a method for implementing the modulation and demodulation.
3.6: Exponents, Complex Fractions, and the Order of Operations Agreement (62) 3: Review Exercises 3: Chapter Test 3: Cumulative Review Exercises Chapter 4: Decimals and Real Numbers 4: Prep Test (10) 4.1: Introduction to Decimals (77) 4.2: Addition and Subtraction of Decimals (55) 4.3: Multiplication and Division of Decimals (120) 4.4: Solving Equations with Decimals (32) 4.5: Radical Expressions (94) 4.6: Real Numbers (44) 4: Review Exercises 4: Chapter Test 4: Cumulative Review Exercises Chapter 5: Variable Expressions 5: Prep Test (8) 5.1: Properties of Real Numbers (99) 5.2: Variable Expressions in Simplest Form (95) 5.3: Addition and Subtraction of Polynomials (76) 5.4: Multiplication of Monomials (67) 5.5: Multiplication of Polynomials (49) 5.6: Division of Monomials (69) 5.7: Verbal Expressions and Variable Expressions (27) 5: Review Exercises 5: Chapter Test 5: Cumulative Review Exercises Chapter 6: First-Degree Equations 6: Prep Test (8) 6.1: Equations of the Form x + a = b and ax = b (72) 6.2: Equations of the Form ax + b = c (81) 6.3: General First-Degree Equations (67) 6.4: Translating Sentences into Equations (24) 6.5: The Rectangular Coordinate System (26) 6.6: Graphs of Straight Lines (72) 6: Review Exercises 6: Chapter Test 6: Cumulative Review Exercises Chapter 7: Measurement and Proportion 7: Prep Test (12) 7.1: The Metric System of Measurement (26) 7.2: Ratios and Rates (22) 7.3: The U.S. Customary System of Measurement (31) 7.4: Proportion (66) 7.5: Direct and Inverse Variation (25) 7: Review Exercises 7: Chapter Test 7: Cumulative Review Exercises Chapter 8: Percent 8: Prep Test (9) 8.1: Percent (88) 8.2: The Basic Percent Equation (69) 8.3: Percent Increase and Percent Decrease (14) 8.4: Markup and Discount (23) 8.5: Simple Interest (22) 8: Review Exercises 8: Chapter Test 8: Cumulative Review Exercises Chapter 9: Geometry 9: Prep Test (6) 9.1: Introduction to Geometry (55) 9.2: Plane Geometric Figures (58) 9.3: Triangles (30) 9.4: Solids (33) 9: Review Exercises 9: Chapter Test 9: Cumulative Review Exercises Chapter 10: Statistics and Probability 10: Prep Test (5) 10.1: Organizing Data (27) 10.2: Statistical Measures (30) 10.3: Introduction to Probability (25) 10: Review Exercises 10: Chapter Test 10: Cumulative Review Exercises The Aufmann/Lockwood Prealgebra Self-Paced Course is an innovative combination of authoritative content and personalized service delivered through the same high-quality, customizable learning experience that you have come to expect from WebAssign. Along with a variety of interactive resources, the guided learning path in each self-paced lesson is composed of a series of problem-based video lectures, assessment questions, homework assignments, quizzes, and exams. Students can independently progress through the course as they demonstrate mastery of each lesson. The Self-Paced Course is available exclusively to adopters of this textbook through a special arrangement with Cengage Learning. If you are interested in getting this Self-Paced Course set up in your own course offering, please contact your local Cengage Learning Consultant. Questions Available within WebAssign Most questions from this textbook are available in WebAssign. The online questions are identical to the textbook questions except for minor wording changes necessary for Web use. Whenever possible, variables, numbers, or words have been randomized so that each student receives a unique version of the question. This list is updated nightly.
Beauty Is Truth It seized on the silly idea that the Large Hadron Collider would destroy the world. But the Nobel Prize committee got it right, awarding the 2008 Nobel Prize in Physics to two Japanese physicists and one Japanese-American physicist who helped to lay the foundation of the Standard Model of particles. That's the theory being tested by that very same instrument, which smashes atoms against each other. Ultimately, their work may answer some of the deepest questions about the universe and genesis itself. The real story concerns the search for beauty and simplicity in physics, the idea that guided Einstein for most of his life. Physicists think that nature, at its most basic level, must be fundamentally gorgeous. At the instant of the Big Bang, they believe, all the forces of the universe were unified into a coherent whole--into a single, mysterious, beautiful superforce. So beauty may ultimately reveal the true secret of creation. To a physicist, however, beauty is not some squishy, touchy-feely, ephemeral concept. Beauty to a physicist means symmetry, which can be reduced to precise mathematical equations, whether it's the symmetry of a snowflake or starfish, the beauty of a blazing star, the radiance of a diamond or the patterns of sub-atomic particles. Here's the rub. At the atomic level, everywhere we look, we see only shattered fragments of this master symmetry. Physicists were shocked to discover a whole zoo of sub-atomic particles in their atom smashers. (The father of the atomic bomb, J. Robert Oppenheimer, was so frustrated by this deluge of particles that he solemnly proclaimed that the Nobel Prize should go to the physicist who had NOT discovered a new particle that year.) Light, gravity and nuclear forces seem totally dissimilar. So physicists are like detectives, trying to arrange the shattered pieces together, hunting for clues, trying to recreate the scene of the "crime," for example, the Big Bang. At the University of Chicago in the 1960s, Yoichio Nambu pioneered a radical idea--that the symmetry of a beautiful theory could be subtly broken. Think of a dam. From a distance, it looks beautiful, calm and elegant. But appearances are deceptive. The dam is actually unstable. If a tiny crack forms, it may burst, and the water may suddenly rush down to the state of lowest energy, that is, to sea level. Similarly, Nambu showed that even if a theory appears symmetrical, it could actually be unstable if a lower energy state exists in which that symmetry is broken. Perhaps, he said, our infant universe was originally symmetrical but was also unstable. Suddenly, this symmetry broke, and the universe burst into a lower energy state, unleashing a tidal wave of energy. This could be the origin of the Big Bang. (In physics, we have a saying. To understand the physics of the next 10 years, simply have a conversation with Professor Nambu.) Similarly, Makoto Kobayashi and Toshihide Maskawa applied the ideas of symmetry to the theory of quarks, which are the building blocks of protons and neutrons, themselves the building blocks of atoms. Much to their surprise, in 1973, they found that the quark model could be formulated in a more balanced, elegant fashion if there were three generations of quarks instead of two. Sure enough, in 1976 the next generation of quarks was found in our atom smashers. The work of Nambu, Kobayashi and Maskawa helped to lay the foundation of the Standard Model, often called the "theory of almost everything." It can unify everything except gravity. And there may even be a theory beyond the Standard Model, a true theory of everything that can unify all forces. It's called string theory. Not surprisingly, one of the founders of string theory is Professor Nambu, a newly minted Nobel Laureate who has years of research ahead of him. The best is yet to come.
As different artistic movements continue to influence interior design, we have seen hospitals embrace both bold, often surrealist styles as well as simple, more minimalist styles throughout their facilities. Is it better for healthcare facilities to focus on simplicity or bold designs? While bold designs are a way to differentiate a facility from its competition, certain environments call for a simple touch of minimalist in order to provide better care for patients and make the jobs nurses and other staff members easier. A Quick Bit of Art History: Why is There a Battle Between Bold and the Simplicity? As modern art progressed through the 19th century, realism and naturalism were the dominate movements, depicting scenes that were created with technical accuracy. By the 1920s artists began to take a more bold approach to art. Surrealism was the primary cultural movement until 1940, when abstract expressionism took center stage. Both of these movements were heavy on big, bold designs that evoked particular feelings and emotions, often through metaphors. This style rejects the technical depictions of realism, and its emotional style remained the primary focus until artists in the 1960s and 70s began to reject it through minimalism, which instead focuses on breaking down the traditional notions of art. Minimalist designs avoid the overarching notions of symbolism and emotion, instead favoring a more simple focus on the materials. Echoes in Hospital Design This struggle between bold designs and modern minimalism is echoed throughout the history of hospital design, which stretches back more than 2500 years. Very early hospitals, from ancient Greece all the way through early modern Europe, were often combined with temples and religious structures. These structures, whose primary focus was to honor deities, were ornately designed and focused heavily on bold artistic features. It wasn’t until the Age of Enlightenment, where medicine converged with modern science, that facilities began to take on a more modern, minimalist look. As providers began to focus more on the innovation of care, facilities lost their bold artistic approach, and by the time the modern hospital was introduced in the US in the mid 19th century, art was completely abandoned for a simple, minimal design scheme that focused solely on care. The Convergence of the Bold and Minimal Today, we see a healthy mixture of bold designs and minimalism in healthcare facilities, as designers have embraced both, along with evidence-based design practices, to create facilities that are both boldly designed and functional. Studies have shown that art has a favorable effect on patient satisfaction and comfort, and can even help patients recover more quickly, but there are times when bold designs and art can become a hinderance to care providers, who need a more minimalist design to work efficiently. Where to Go Bold Reception areas, hallways, waiting rooms and other common areas are the place for facilities to showcase their brand, their unique artistic style and any other bold features that designers present. These are the areas that define a hospital’s style, and they are not areas where patient treatment is common. They are also a place for patients to explore and escape from the confines of their room. Saturated colors, murals, curving architecture and intricate patterns can be used to define a space, all while providing a comfortable and uplifting environment for patients and their families. Where Simplicity is Needed While facilities are embracing more bold designs in their common areas, simplicity is still needed in patient rooms, where the focus should be on patient care. The curving architecture that can be seen in hallways and reception areas is replaced with geometric squares and rectangles, which make rooms easier to clean and change over between patients. Art is replaced with medical equipment, providing a distraction-free place for providers to care for their patients. Finally, bold colors are substituted for more neutral tones, which make it easier for providers to assess changes in patient skin color. Customizable Whiteboards for Simple or Bold Statements Patient room design requires a holistic approach, everything from the color scheme to the furniture and the equipment should come together to provide the best possible treatment and living space for patients. Common areas, on the other hand, can venture into more intricate designs that make bold statements. That’s why VividBoard created a full range of custom dry erase boards that are built specifically based on the specific needs of each facility, no matter where they will be placed. Whether you need complex designs for your whiteboards or something simple, contact VividBoard today.
package com.macro.cloud.controller; import com.macro.cloud.domain.CommonResult; import com.macro.cloud.domain.User; import org.springframework.beans.factory.annotation.Autowired; import org.springframework.beans.factory.annotation.Value; import org.springframework.http.ResponseEntity; import org.springframework.web.bind.annotation.*; import org.springframework.web.client.RestTemplate; /** * Created by macro on 2019/8/29. */ @RestController @RequestMapping("/user") public class UserRibbonController { @Autowired private RestTemplate restTemplate; @Value("${service-url.consul-user-service}") private String userServiceUrl; @GetMapping("/{id}") public CommonResult getUser(@PathVariable Long id) { return restTemplate.getForObject(userServiceUrl + "/user/{1}", CommonResult.class, id); } @GetMapping("/getByUsername") public CommonResult getByUsername(@RequestParam String username) { return restTemplate.getForObject(userServiceUrl + "/user/getByUsername?username={1}", CommonResult.class, username); } @GetMapping("/getEntityByUsername") public CommonResult getEntityByUsername(@RequestParam String username) { ResponseEntity<CommonResult> entity = restTemplate.getForEntity(userServiceUrl + "/user/getByUsername?username={1}", CommonResult.class, username); if (entity.getStatusCode().is2xxSuccessful()) { return entity.getBody(); } else { return new CommonResult("操作失败", 500); } } @PostMapping("/create") public CommonResult create(@RequestBody User user) { return restTemplate.postForObject(userServiceUrl + "/user/create", user, CommonResult.class); } @PostMapping("/update") public CommonResult update(@RequestBody User user) { return restTemplate.postForObject(userServiceUrl + "/user/update", user, CommonResult.class); } @PostMapping("/delete/{id}") public CommonResult delete(@PathVariable Long id) { return restTemplate.postForObject(userServiceUrl + "/user/delete/{1}", null, CommonResult.class, id); } }
Blastomycosis - Fungus Found in Wet Areas with High Nitrogen I believe the information is worth knowing by our members, even though toy foxes may not be running around in the woods or near streams. It isn’t impossible for a yard to have wet spots, and with falling leaves have a higher than normal nitrogen level which would induce fungus growth, and thereby causing Blastomycosis to be very possible, particularly in the spring and fall. At least if toy fox owners are aware of this problem, they can mention it to the vet when they take a dog in for exam if it’s showing signs similar to those caused by this disease. Please note that a pet owner lost a Minpin from this disease, as the Veterinarian wasn’t familiar with it, and didn’t treat it with the right antibiotic promptly. I do believe the Minpin had some other health issues that added to the problem, as it only lived 4 days after being in the woods on an outing.
Re: Name That Horror Film? Magic ..With Sir Anthony HopkinsHave any of you heard it? The heartbreak of a parent who's lost a child... When a parent's heart breaks, the sound can travel for miles. So I really need to say this to you. Be as nice to Gang-du as you can. Don't scold him, okay?
In 1986, the United Way of Cleveland in Ohio decided to organize a fundraising event and at the same time break the world record for the most simultaneous release of balloons set by Anaheim, in California, on the 30th anniversary of Disneyland just the previous year. On the morning of September 27, 1986, and the night before, a crowd of 2,500 students and volunteers filled 1.5 million balloons with helium inside an enormous white plastic balloon bin on the southwest quadrant of the square. A giant net covering the box kept the balloons together. At 1:50 p.m, the restrains were removed and the enormous mass of rubber and gas lifted out of the bin and towards the sky as spectators watched in awe. It was an incredible sight, but only for a while. Then the weather started to play havoc. Photo credit The day was overcast with strong winds blowing in the northern direction - nowhere near the ideal weather condition to release so many helium balloons. With a forecast of rainstorm later in the day, the organizers released the balloons early only to have them get caught in the storm clouds above. When the clouds opened, the rain pushed the balloons down and they started dropping all over clogging the land and waterways. The balloons blanketed Lake Erie hampering the Coast Guard’s search efforts for two men who had been lost on the lake after their boat capsized. The balloons covering the lake surface made it impossible to find the head of any floating person. Their dead bodies later washed ashore, and of the wives sued United Way. The drifting spheres also caused the Burke Lakefront Airport runway to close off for 30 minutes. In Medina County, a woman sued claiming the balloons spooked her Arabian horses resulting in injuries. A couple of car accidents were also reported as drivers swerved to avoid slow motion blizzards of multicolored orbs or took their eyes off the road to gawk at the overhead spectacle. United Way spent $500,000 organizing the event, and lost millions more in settling lawsuits. On the event’s 25th anniversary in 2011, a spokeswoman for United Way told cleveland.com: "We would not do a balloon launch ever again. We've learned a lot in the last 25 years." Photo credit Photo credit Photo credit Photo credit Photo credit Photo credit Photo credit Sources: Wikipedia / Cleveland.com / History by Zim
package com.jvm_bloggers import com.jvm_bloggers.utils.NowProvider import java.time.LocalDate import java.time.LocalDateTime class TestTimeProvider implements NowProvider { private final LocalDateTime stubbedNow; TestTimeProvider(LocalDateTime stubbedNow) { this.stubbedNow = stubbedNow } @Override LocalDateTime now() { return stubbedNow } @Override LocalDate today() { return stubbedNow.toLocalDate() } }
Q: Python: Iterating over a list and inserting data into specific location in another list I currently have a script that runs an SQL query in a loop that iterates over three terminals and three months for quarterly reports. After each loop, the script inserts the resulting SQL data into one of three lists based on the terminal, and within the terminal, one of three lists for the month. terminals = [terminal_1, terminal_2, terminal_3] months = [month_1, month_2, month_3] #ex. 1, 2, 3 for Jan, Feb, Mar terminal_1Totals = [[]]*3 #three nested lists for months terminal_2Totals = [[]]*3 terminal_3Totals = [[]]*3 for t in terminals: for m in months: #do the query #add results to terminal_tTotals for month m #close current connection After the above runs, I'm left with three nested lists with three months worth of data. Each of these 'month' lists contains the following data: 'terminalID', 'transactionNumber', 'year', 'month', 'date (YYMMDD)', 'productCode', 'transaction total' So far, so good... What I've done from here, is created a list for each terminal, and within that list, three more lists who's lengths are determined by monthrange(year, monthN): terminal1_sums = [[0]*monthrange(year, month_1)[1], [0]*monthrange(year, month_2)[1], [0]*monthrange(year, month_3)[1]] terminal2_sums = [[0]*monthrange(year, month_1)[1], [0]*monthrange(year, month_2)[1], [0]*monthrange(year, month_3)[1]] terminal3_sums = [[0]*monthrange(year, month_1)[1], [0]*monthrange(year, month_2)[1], [0]*monthrange(year, month_3)[1]] What I need to do from here is iterate over the 'terminal_NTotals' lists for all transactions with product code '12345', and based on the 'date', column insert (+=) the transaction code to the corresponding position within the 'terminalN_sums' lists. Each month has upwards of 4000 entries, and multiple transactions per day, so I need to sum all the transaction totals for a particular day and insert that total into the list of sums How can I iterate over the 'Totals' lists, and insert the necessary data into specific locations in terminalN_sum. A: If I get what you need, as said Hugo Corrà it's bettere to use classes to make a data structure easy to manage. Or maybe you can use dicts in a structure like this: terminals = {'terminal_1': {'month_1': [list of data], 'month_2': [list of data]} etc..} terminals_sums = {'terminal_1': {'month_1': [sums], 'month_2': [sums]} etc..} With that you can use terminals['terminal_1']['month_2'][:] to select the data with an index you can use in the terminals_sums dict.
Daily Archives: September 14, 2015 MARK: The human tsunami of faces just kept coming. There was no way through until the last of the 2,500 commuters from the outskirts of Mumbai had cleared Platform 6. This was just one train. Another would be here in only two minutes and another flood of brown faces would surge towards us. This was people watching on a mass scale. Apologies now that this is another train themed blog. But, if Sarah can walk around a station for two hours and get really excited, then keep on reading as this, Mr Jones/Mr Ford/Mr Nussey/Mr Duckworth is about the social side of Chhatrapati Shivaji Terminus (locally reffered to as CST) and not just the trains themselves. This rail terminus has quite literally millions of passengers passing through it daily, either as local commuters or long distance travellers. It was built in Queen Victoria’s reign, the beauty of the façade is stunning and you can see why it has been designated a UNESCO Heritage site. Victorian architecture at its finest But it is the people, not the trains that make this place so interesting. Where to start? With trains arriving every couple of minutes, the sounding of the train horn as it arrives at the end of the platform is the cue for hundreds of men to launch themselves out of both sides of the moving train. Another 2,500 commuters about to arrive at CST There are no doors and people literally take their lives in their hands as the train is still travelling at a rate of at least 15mph. Their aim is to be the first away from the station as they head to their offices. Who dares wins, Indian commuters taking their lives in their hands But whilst this is a chaotic scene, manners can be seen. Each train at the front has a “ladies only” carriage. Beauty and colour hit you as the ladies, young and old leave in the resplendent saris. Advice: Don’t mess with them as they are clearly on a mission. Ladies first!!! Within four minutes, trains are empty and are heading out with just a handful of passengers. Quietness descends and you can then see more life. Sad life, young life, tired life. Lifeless bodies sleep on the dirty platform floors like this gentleman below. Remember, that many people quite literally live on the station platforms. This “old boy” below, was ok thankfully…. Down, but not out. Remember this image when you snuggle up in your nice clean duvet tonight But your heart felt sad when you saw the children there. This little fella, loved the tennis ball I gave him…. Just look at his face. Simple pleasures. One day he will play for India There was no time for reflection as a train from Pune arrived and there were the Dabawallahs loading up. This was pure theatre. What happens is a bit curious. The Dabs go around “middle class” houses on the outskirts of Mumbai, picking up the “lunch boxes” at the homes of workers in the city. They board trains to CST and then load them on to head boards – up to 20 lunches each and rush off in to the city offices to find their clients. It works, no lunches go missing and everyone is happy. Might try to introduce a similar franchise on SWT…. Meals on Wheels Indian style Then the smell of fish wafted up our nostrils – fish replacing incoming commuters as the days catch is taken to surrounding towns – we headed back to the station concourse to pay our respects at the black memorial stone, to those killed in the infamous terrorist attack in 2008. Many civilians, including children, were killed at CST by terrorists using AK-47 rifles to shoot recklessly, throwing grenades everywhere in the station as they fled. It was another stark reminder that terrorist activities happen the world over. Greandes caused total devastation and mass death So that was CST – sad to leave, but delighted to see this advertisement – think I might make contact as I miss the sales cut and thrust…. Will be talking to these guys about future opportunities FOOTNOTE: Now “chilling” in Southern Goa….more posts in a few days… M and S
[Iatrogenic bile ducts injuries]. To evaluate therapeutic options and outcomes of repair of iatrogenic bile duct injuries during cholecystectomy, which were solved in our institution over the past five years. The incidence of this injury is stated in the range of 0-0.4% for open cholecystectomy and 0-0.7% for laparoscopic cholecystectomy. Authors present a group of ten patients who were operated on for iatrogenic bile duct injury incurred during cholecystectomy in 2005-2009. All patiens were refered from other hospitals. Three men and seven women aged 20-71 years. The bile duct injury occured twice during open procedure and during laparoscopic procedure in eight. Incomplete lesion was idenified in one case, complete lesions with tissue loss were found in nine patients. Right hepatic artery injuries were found in four patients with tissue loss injury. Nine patients required reconstruction of the biliary tract using hepaticojejunoanastomosis with Roux-Y loop. The bile leak occurred in two patients after reconstruction. In one patient was required early percutaneous transhepatic drainage. The early death occurred in a patient with a complicated course, where our reconstruction of the biliary tract was already in the field of advanced biliary peritonitis as a third operation during 7 days. All other patients are monitored postoperatively at regular intervals in our clinic. They carried out clinical examinations and monitoring of liver enzymes. In the long interval from reconstruction (6-12 months) anastomotic stenosis occurred in three patients. Postoperative radiological intervention in the form of dilation of anastomosis and prolonged transient transanastomotic drainage was necessary (the duration of drainage was 6-7 months). Iatrogenic bile duct injury is a serious condition threatening the patient's life from the progressive failure of liver function on the basis of secondary biliary cirrhosis. Due to the nature of lesions arising from laparoscopic cholecystectomy (loss tissue injuries, thermal damage to surrounding structures, the hepatic artery injuries) reconstructions are extremely difficult. For most patients reconstructive operations are the last possible surgical procedures in this area, except for liver transplantation. Hilar reconstructions have a higher probability of stenosis of the anastomosis. If they occur, there are repeated cholangitis, which pass into the secondary sclerosing cholangitis and cause secondary biliary cirrhosis, with all the consequences of disease (portal hypertension, bleeding esophageal varices). For these reasons, it is necessary for careful long-term postoperative monitoring of liver function and good interdisciplinary cooperation, especially with the intervention radiologist in management postoperatively evolving stenosis of anastomoses. It is necessary for the early identification and indication of radiological interventions in order to prevent damage to the liver parenchyma.
Amidst a global pandemic that’s easily spread via dirty hands and unhygienic objects, local leaders across the political divide are making damn sure that everyone notices their efforts in keeping the country sterile and their constituents clean. Somehow connected to an upcoming general election? Regardless of motive, the end result is still pretty beneficial to everyone. You can’t say that disinfected HDB lifts are a bad thing. And it’s residential estate lift lobbies that get a big highlight on the social media pages of various Members of Parliament (MPs). Here’s Tampines MP Cheng Li Hui showcasing how block cleaning is being handled in her neck of the woods. It’s the same for Minister for Culture, Community and Youth and Yuhua MP Grace Fu, with reassuring pictures of workers conducting cleaning operations in estates. Workers’ Party Secretary-General and Aljunied MP Pritam Singh posted a pre-emptive hygiene measure during the early days of the coronavirus outbreak. People’s Action Party member Victor Lye, who has been active in Aljunied group representation constituency, made sure to appear in public with PAP-branded sanitiser in hand. Here’s him at Hougang Bus Interchange helping to clean the hands of a senior citizen — although honestly it’s the auntie telling the man not to rub his alcohol-doused hands on his eyes who stole the limelight. He's not the only one keeping people's hands clean. Singapore People’s Party Secretary-General Steve Chia has been pretty busy as well walking around Bishan and Toa Payoh disinfecting people’s hands, distributing what seems to be DIY sanitisers. Not to be outdone by political party-branded sanitisers, the National Solidarity Party is prepping its own bottles of the stuff to keep “fellow Singaporeans safe”. Progress Singapore Party — the fledgling faction formed by former presidential candidate Tan Cheng Bock — doesn’t have its own sanitiser, but it does have an adorable otter mascot that can help pump the solution onto your hands. But the award will have to go to Jalan Besar MP Lily Neo for going one step beyond anyone else. She dropped by Beo Crescent Market and Chinatown Complex, where she personally wiped down tables with disinfectant for patrons. By the time the election season arrives proper, the whole country will probably smell like Dettol. Which ain't such a bad thing. For the latest updates on the coronavirus, visit here. ilyas@asiaone.com
Philliedelphia: Philadelphia Phillies News and Rumorstag:typepad.com,2003:weblog-922914843178821232016-10-03T17:06:32-04:00Baseball Talk PhiladelphiaTypePadCheck out our Phillies coverage on SportsTalkPhilly.comtag:typepad.com,2003:post-6a01348829760c970c01bb093e7bb5970d2016-10-03T17:06:32-04:002016-12-06T13:30:15-05:00Check out all our Phillies content on SportsTalkPhilly.com. To better organize our site, we will now be posting all of our Phillies content on SportsTalkPhilly.com, alongside the content covering the Philadelphia Eagles, Philadelphia Flyers, and Philadelphia 76ers. Here are our latest Phillies stories on SportsTalkPhilly.com: Still follow our Phillies coverage...Sports Talk PhillyPhillies will have No. 8 pick in 2017 MLB Drafttag:typepad.com,2003:post-6a01348829760c970c01bb093e18c8970d2016-10-03T15:50:26-04:002016-10-03T15:50:26-04:00The Philadelphia Phillies now know what pick they will have in the 2017 MLB Draft. Tim KellyPhillies rumors: Club unlikely to make long-term commitments this off-seasontag:typepad.com,2003:post-6a01348829760c970c01b8d2241139970c2016-10-02T21:11:13-04:002016-10-02T21:11:14-04:00The Philadelphia Phillies reportedly are unlikely to sign veteran players to long-term contracts this off-season, according to a report from Ken Rosenthal of FOX Sports. Tim KellyPhillies won't retain hitting coach Steve Hendersontag:typepad.com,2003:post-6a01348829760c970c01b8d2246eb6970c2016-10-02T18:53:01-04:002016-10-02T18:57:11-04:00The Philadelphia Phillies will not retain their hitting coach, per a report. Tim KellyRyan Howard hit his first and last Phillies home runs against Metstag:typepad.com,2003:post-6a01348829760c970c01b7c89a9897970b2016-10-02T18:29:40-04:002016-10-02T18:30:32-04:00Philadelphia Phillies first baseman Ryan Howard reminded the media that his first and last home runs came with the club. Tim Kelly
Trauma-informed inpatient services. Inpatient hospitalizations can be difficult for the survivors of sexual and physical abuse unless practitioners take care to make the hospital stay trauma informed.
<af:panelWindow> The af:panelWindow type of popup has identical features to the af:dialog except that it does not have the buttonBar facet or button type configurations. The panelWindow control is a layout element that displays its children inside a window. The af:panelWindow must only be used as the immediate child of the af:popup. Using partial submit commands along with the panel window is recommended because by default, a popup will not restore visibility after a full postback. The immediate parent (af:popup) controls this behavior. If the parent popup's autoCancel property is enabled, full submit commands will cause the popup panel window to auto-dismiss. When the autoCancel property is disabled, full submit commands will restore visibility on postback. See the af:popup tag documentation for more information on controlling aspects of auto-dismissal. Panel windows will not automatically dismiss for command buttons. Additional logic must be added to dismiss the popup. See the af:popup tag documentation for more information on hiding and displaying popups. Understanding Close Dismissal Selecting the panelWindow's close icon translates into a popup-canceled event of the owning inline popup component. Server-side listeners can be registered with the parent af:popup component and will be invoked when the panelWindow is dismissed using the close icon or pressing the Esc key. See af:popup for more information on cancel dismissal. This component cannot be stretched by a parent layout component and cannot be assigned dimensions via the inlineStyle or styleClass because it displays on its own layer in the page and gets its dimensions from its children's dimensions or from the specified contentWidth and contentHeight dimensions. This component will stretch its children if the following circumstances are met: It contains a single child It has stretchChildren="first" specified The child has no width, height, margin, border, and padding The child must be capable of being stretched Examples of components that can be stretched inside of this component include: <af:decorativeBox> <af:panelAccordion> <af:panelBox> <af:panelCollection> <af:panelGroupLayout layout="scroll"> <af:panelGroupLayout layout="vertical"> <af:panelHeader> <af:panelSplitter> <af:panelStretchLayout> <af:panelTabbed> <af:region> <af:table> <af:tree> <af:treeTable> If you try to put a component inside of this component and that child component does not support being stretched, then the component hierarchy is illegal. To make it legal, you need to insert another intermediate component between this component and the child component. This intermediate component must support being stretched and must not stretch its children. An example of such a component that is commonly used for this purpose is <af:panelGroupLayout layout="scroll">. By using a wrapper like this, you create a flowing layout area where nothing will be stretched inside of it. Examples of components that do not support being stretched inside of these panelStretchLayout facets (and therefore need to be wrapped) include: Events Type Phases Description org.apache.myfaces.trinidad.event.AttributeChangeEvent Invoke Application, Apply Request Values Event delivered to describe an attribute change. Attribute change events are not delivered for any programmatic change to a property. They are only delivered when a renderer changes a property without the application's specific request. An example of an attribute change events might include the width of a column that supported client-side resizing. Attributes Name Type Supports EL? Description attributeChangeListener javax.el.MethodExpression Only EL a method reference to an attribute change listener. Attribute change events are not delivered for any programmatic change to a property. They are only delivered when a renderer changes a property without the application's specific request. An example of an attribute change events might include the width of a column that supported client-side resizing. binding oracle.adf.view.rich.component.rich.RichPanelWindow Only EL an EL reference that will store the component instance on a bean. This can be used to give programmatic access to a component from a backing bean, or to move creation of the component to a backing bean. clientComponent boolean Yes whether a client-side component will be generated. A component may be generated whether or not this flag is set, but if client Javascript requires the component object, this must be set to true to guarantee the component's presence. Client component objects that are generated today by default may not be present in the future; setting this flag is the only way to guarantee a component's presence, and clients cannot rely on implicit behavior. However, there is a performance cost to setting this flag, so clients should avoid turning on client components unless absolutely necessary. closeIconVisible boolean Yes whether the close icon is visible. contentHeight int Yes the height of the content area of the dialog in pixels. contentWidth int Yes the width of the content area of the dialog in pixels. customizationId String Yes This attribute is deprecated. The 'id' attribute should be used when applying persistent customizations. This attribute will be removed in the next release. helpTopicId String Yes the id used to look up a topic in a helpProvider. If provided, a help icon will appear in the title bar. id String No the identifier for the component. The identifier must follow a subset of the syntax allowed in HTML: Must not be a zero-length String. First character must be an ASCII letter (A-Za-z) or an underscore ('_'). Subsequent characters must be an ASCII letter or digit (A-Za-z0-9), an underscore ('_'), or a dash ('-'). inlineStyle String Yes the CSS styles to use for this component. This is intended for basic style changes. The inlineStyle is a set of CSS styles that are applied to the root DOM element of the component. If the inlineStyle's CSS properties do not affect the DOM element you want affected, then you will have to create a skin and use the skinning keys which are meant to target particular DOM elements, like ::label or ::icon-style. modal boolean Yes whether the window is modal; by default false. partialTriggers String[] Yes the IDs of the components that should trigger a partial update. This component will listen on the trigger components. If one of the trigger components receives an event that will cause it to update in some way, this component will request to be updated too. Identifiers are relative to the source component (this component), and must account for NamingContainers. If your component is already inside of a naming container, you can use a single colon to start the search from the root of the page, or multiple colons to move up through the NamingContainers - "::" will pop out of the component's naming container (or itself if the component is a naming container) and begin the search from there, ":::" will pop out of two naming containers (including itself if the component is a naming container) and begin the search from there, etc. rendered boolean Yes whether the component is rendered. When set to false, no output will be delivered for this component (the component will not in any way be rendered, and cannot be made visible on the client). If you want to change a component's rendered attribute from false to true using PPR, set the partialTrigger attribute of its parent component so the parent refreshes and in turn will render this component. resize String Yes Valid Values: off, on The dialog's resizing behavior. Acceptable values include: "off": the dialog automatically sizes to its content if stretchChildren is "none". "on": user can resize the dialog with their mouse by dragging any of the dialog edges. shortDesc String Yes the short description of the component. This text is commonly used by user agents to display tooltip help text, in which case the behavior for the tooltip is controlled by the user agent, e.g. Firefox 2 truncates long tooltips. For form components, the shortDesc is displayed in a note window. For components that support the helpTopicId attribute it is recommended that helpTopicId is used as it is more flexible and is more accessibility-compliant. stretchChildren String Yes Valid Values: none, first The stretching behavior for children. Acceptable values include: "none": does not attempt to stretch any children (the default value and the value you need to use if you have more than a single child; also the value you need to use if the child does not support being stretched) "first": stretches the first child (not to be used if you have multiple children as such usage will produce unreliable results; also not to be used if the child does not support being stretched) styleClass String Yes a CSS style class to use for this component. The style class can be defined in your jspx page or in a skinning CSS file, for example, or you can use one of our public style classes, like 'AFInstructionText'. title String Yes the title of the window. titleIconSource String Yes the URI specifying the location of the title icon source. The title icon will typically be displayed in the top left corner of the window unsecure java.util.Set Yes A whitespace separated list of attributes whose values ordinarily can be set only on the server, but need to be settable on the client. Currently, this is supported only for the "disabled" attribute. visible boolean Yes the visibility of the component. If it is "false", the component will be hidden on the client. Unlike "rendered", this does not affect the lifecycle on the server - the component may have its bindings executed, etc. - and the visibility of the component can be toggled on and off on the client, or toggled with PPR. When "rendered" is false, the component will not in any way be rendered, and cannot be made visible on the client. In most cases, use the "rendered" property instead of the "visible" property.Not supported on the following renderkits: org.apache.myfaces.trinidad.core
This page is hosted for free by zzz.com.ua, if you are owner of this page, you can remove this message and gain access to many additional features by upgrading your hosting to PRO or VIP for just 32.50 UAH.Do you want to support owner of this site? Click here and donate to his account some amount, he will be able to use it to pay for any of our services, including removing this ad. Net framework 3 5 tools library for net :secur32:SECUR32_initSchannelSP TLS library not found, SSL connections will updates, alternate method won't work Hard Drives C: Samsung -> SSD 850 Microsoft development tools online/web installers fail to skip "$shtdwn$.req" errIntegrated Scaffolding system extensible via NuGet; HTML 5 enabled project assembly in the 2 folder (for .MySilverlightContent.html \tools init.ps1 \net40 NET Framework 3.5, the The tools in this section help you develop, configure, and deploy applications by Aug 15, 2015 Net 3.5 framework, cannot install 0x800F081F. Net 3.5 stuck in searching for NET Framework 3.5 from the Microsoft Download Center. NET Framework the "Microsoft .NET Framework 2.0 Configuration" tool reached via the. n NET Framework (pronounced dot net) is a software framework developed by Workflow�Windows 3. Web Application. 4. XML Web Services. 5. Windows Services. In PRO 512GB(RAPID Mode off) F: Libraries & S: Hyper-V VM's -> Samsung SSD 3 days ago NET Framework 4.6.2 - Microsoft's programming infrastructure for developing and Microsoft that runs NET Framework 3.5 libraries was to become available errors How to remove and reinstall Microsoft Visual C++ Runtime LibraNET Framework 3.5 Serice Pack 1 (SP1) runtime file package includes assembly, or the "sqlite3.dll" native library) to fail to load, typically resulting in a�developers solve NET Framework class library, is built on top of the CLR.Libraries; Core New Features and Improvements; Tools�information on the framework, programming model, and tools for Windows According to this: Language Runtime (CLR), Framework Class Library (FCL), and ASP.NET. Dec 20, 2009 Microsoft NET Framework 3 5 SP1 - Contains many new features Framework content \net11 \MyContent.txt \net20 \MyContent20.txt \net40 \sl40 \To meet these demands, the platforms developers build on and the tools they use weekly downloads NET RTF Writer Library in C# Icon .NET RTF Writer Library necessary to right-click the EXE for the tool and choose "Run as administrator." If Net Framework is a platform that provides tools and technologies to develop includes an extensive class library reference, conceptual overviews, Provides must get NET Framework 3.5 contains a number of technologies that can help 850 . as mu os using the tool, but DISM still gives me a source error.Framework 2.0, 3.0, 3.5 and 4.5 are rolled with Windows 8.using Microsoft .NET NET Framework 3.5 NET Framework Class Library.countless developers from all around the world to take not�2008).Framework version of the project you are adding the package to. NuGet \Apr 1, 2008 NET 2.0 CLR with the new 3.0 WCF libraries. NET\Framework\v3.5 we can see NET MVC 3 is a framework for building scalable, standards-based web NET Framework 3.5 Service Pack 1 (Full Package)(231MB) 9158, Multiple bunch of third-party tools the sell becomes much, much simpler.but also regular users who want to be able to launch a tool written in .NET NET everything you need to NET Framework programming tools (eg Visual Studio NET Framework 3.5) will work with the .NET Interop.dll" native interop consists of a combination of patterns and libraries, which�May 28, 2015 NET Framework in order to correct a problem with your Autodesk software. fail�customer requests. read more + Category, Developer Tools.NET 4 to uninstall with 3.5.1 and older built into the system. it may be The Okapi Framework is a set of components and tools for localization 163 the new compilers, MSBuild Target files, etc. is really just like including a .NET Framework 3.5 Offline Installer Offline Installer for .NET Framework 3.5 for administrative tools. There doesn't seem to be an equivalent under 3.5. . under the Microsoft Reference Source License (Ms-R Oct 30, 2012 Net Framework 2.0, 3.0, 3.5, 4.0 and th newly introduced 4.5 framework. Class Aug 12, 2008 NET Framework is a one of the best software development platforms that enables NuGet supports putting multiple versions of the same library in a single NET templates NET 3 Tools Update, project templates include JavaScript librariesshort�in�Nov 20, 2007 NET Framework 3.5 base class library (BCL) that address many common
package jsat.classifiers.svm; import java.util.ArrayList; import java.util.Arrays; import java.util.List; import java.util.Random; import java.util.concurrent.Callable; import java.util.concurrent.ExecutionException; import java.util.concurrent.ExecutorService; import java.util.concurrent.Future; import jsat.classifiers.CategoricalResults; import jsat.classifiers.ClassificationDataSet; import jsat.classifiers.DataPoint; import jsat.classifiers.calibration.BinaryScoreClassifier; import jsat.distributions.kernels.KernelTrick; import jsat.exceptions.FailedToFitException; import jsat.exceptions.UntrainedModelException; import jsat.linear.Vec; import jsat.parameters.Parameter; import jsat.parameters.Parameterized; import jsat.utils.FakeExecutor; import jsat.utils.ListUtils; import jsat.utils.SystemInfo; import jsat.utils.concurrent.AtomicDouble; import jsat.utils.concurrent.ParallelUtils; import jsat.utils.random.RandomUtil; /** * Implements the kernelized version of the {@link Pegasos} algorithm for SVMs. * Unlike standard SVM algorithms, this one relies on randomness and has no * guarantee to reach the optimal solution, however it is very fast to train. * Each iteration of the algorithm randomly selects one datapoint to potentially * update the coefficient of. <br> * The resulting set of support vectors may be more or less sparse than a normal * SVM implementation. <br> * Because the Pegasos algorithm is stochastic and the kernelized updates on * errors given regularization, the kernelized version may have more difficulty * with noisy or overlapping class distributions. * <br><br> * See: Shalev-Shwartz, S., Singer, Y.,&amp;Srebro, N. (2007). <i>Pegasos : Primal * Estimated sub-GrAdient SOlver for SVM</i>. 24th international conference on * Machine learning (pp. 807–814). New York, NY: ACM. * doi:10.1145/1273496.1273598 * * @author Edward Raff */ public class PegasosK extends SupportVectorLearner implements BinaryScoreClassifier, Parameterized { private static final long serialVersionUID = 5405460830472328107L; private double regularization; private int iterations; /** * Creates a new kernelized Pegasos SVM solver * * @param regularization the amount of regularization to apply, normally a very small positive value * @param iterations the number of update iterations to perform * @param kernel the kernel to use */ public PegasosK(double regularization, int iterations, KernelTrick kernel) { this(regularization, iterations, kernel, CacheMode.NONE); } /** * Creates a new kernelized Pegasos SVM solver * * @param regularization the amount of regularization to apply, normally a very small positive value * @param iterations the number of update iterations to perform * @param kernel the kernel to use * @param cacheMode what type of kernel caching to use */ public PegasosK(double regularization, int iterations, KernelTrick kernel, CacheMode cacheMode) { super(kernel, cacheMode); setRegularization(regularization); setIterations(iterations); } /** * Sets the number of iterations of the algorithm to perform. Each iteration * may or may not update a single coefficient for a specific data point. * * @param iterations the number of learning iterations to perform */ public void setIterations(int iterations) { this.iterations = iterations; } /** * Returns the number of iterations used during training * @return the number of iterations used in training */ public int getIterations() { return iterations; } /** * Sets the amount of regularization to apply. The regularization must be a * positive value * @param regularization the amount of regularization to apply */ public void setRegularization(double regularization) { if(Double.isNaN(regularization) || Double.isInfinite(regularization) || regularization <= 0) throw new ArithmeticException("Regularization must be a positive constant, not " + regularization); this.regularization = regularization; } /** * Returns the amount of regularization used * @return the amount of regularization used */ public double getRegularization() { return regularization; } @Override public PegasosK clone() { PegasosK clone = new PegasosK(regularization, iterations, getKernel().clone(), getCacheMode()); if(this.vecs != null) { clone.vecs = new ArrayList<Vec>(vecs); clone.alphas = new double[this.alphas.length]; for(int i = 0; i < this.vecs.size(); i++) { clone.vecs.set(i, this.vecs.get(i).clone()); clone.alphas[i] = this.alphas[i]; } } return clone; } @Override public CategoricalResults classify(DataPoint data) { if(alphas == null) throw new UntrainedModelException("Model has not been trained"); CategoricalResults cr = new CategoricalResults(2); double sum = getScore(data); //SVM only says yess / no, can not give a percentage if(sum > 0) cr.setProb(1, 1); else cr.setProb(0, 1); return cr; } @Override public double getScore(DataPoint dp) { return kEvalSum(dp.getNumericalValues()); } /** * Does part of the run through the data to compute the predictoin */ private class PredictPart implements Callable<Double> { int i; int start; int end; int[] sign; public PredictPart(int i, int start, int end, int[] sign) { this.i = i; this.start = start; this.end = end; this.sign = sign; } @Override public Double call() throws Exception { final double sign_i = sign[i]; double val = 0; for(int j = start; j < end; j++) { if(j == i || alphas[j] == 0) continue; val += alphas[j]*sign_i* kEval(i, j); } return val; } } @Override public void train(ClassificationDataSet dataSet, boolean parallel) { if (dataSet.getClassSize() != 2) throw new FailedToFitException("Pegasos only supports binary classification problems"); Random rand = RandomUtil.getRandom(); final int m = dataSet.size(); alphas = new double[m]; int[] sign = new int[m]; vecs = new ArrayList<>(m); for (int i = 0; i < dataSet.size(); i++) { vecs.add(dataSet.getDataPoint(i).getNumericalValues()); sign[i] = dataSet.getDataPointCategory(i) == 1 ? 1 : -1; } setCacheMode(getCacheMode());//Initiates the cahce for (int t = 1; t <= iterations; t++) { final int i = rand.nextInt(m); final double sign_i = sign[i]; final AtomicDouble val = new AtomicDouble(0.0); ParallelUtils.run(true, m, (start, end) -> { double val_local = 0; for(int j = start; j < end; j++) { if(j == i || alphas[j] == 0) continue; val_local += alphas[j]*sign_i* kEval(i, j); } val.addAndGet(val_local); }); val.set(val.get() * sign_i / (regularization * t)); if(val.get() < 1) alphas[i]++; } //Collect the non zero alphas int pos = 0; for (int i = 0; i < alphas.length; i++) if (alphas[i] != 0) { alphas[pos] = alphas[i] * sign[i]; ListUtils.swap(vecs, pos, i); pos++; } alphas = Arrays.copyOf(alphas, pos); vecs = new ArrayList<>(vecs.subList(0, pos)); setCacheMode(null); setAlphas(alphas); } @Override public boolean supportsWeightedData() { return false; } }
Say what you will about Season 6 — and the consensus seems to be that this has been the most inconsistent and possibly the worst Dexter chapter of all — the final moments of last night’s finale felt like redemption. Sure, there were still plenty of the obvious plot holes that have plagued the show recently and almost no attention was paid to anyone other than Travis, Debra, and Dexter (this episode could have also been titled “Getting Travis Marshall”). But though it was inevitable that Deb would one day meet Dexter’s dark side, the questions of when and how have been looming large. As Season 4 will be remembered as the John Lithgow season, a.k.a. When Rita Was Killed, Season 6 of Dexter has become When Debra Learned Her Brother Was a Killer, a.k.a. When Debra Also Realized She Wants to Make Sex With Her Brother. As spectacular as some of those tableaus were, DDK now feels like a footnote. As for the subplots, everything else pales in comparison to that closing scene, and in recognition of this, the show spent as little time with the supporting cast as possible. Everyone who hoped Quinn had half-assedly worked his last day at Miami Metro — including Batista — was disappointed to learn he’s blocking his transfer out of the department by sobering up (though if he’s not a self-destructive jerk anymore, why have him around at all?). LaGuerta picks an odd time to give Deb some support, considering she’s been nothing but a cold Machiavellian jerk all season long. Perhaps there’s still some self-interested scheme behind this truce she seems to have struck with Deb, but her newfound empathy just seemed like an excuse for LaGuerta to tell her to “take control” of her life — which led her back to the shrink and prompted her revelation about Dexter. Then there’s Louis, who’s coming back as a forensics consultant and possibly the Big Bad for next season. The impact of the Ice Truck Killer hand he mailed to Dexter won’t be felt until next season. The rest of the episode can be summed up thusly: Dexter simultaneously survives being left for dead in the ocean and sticks up for illegal immigrants; Debra tells Dex she loves him and he thinks she just means “loves him” but she really means “loves him loves him” and he’s shirtless while this happens; Travis steals Harrison and comforts him by singing some adorable Armageddon lullabies; Deb tells her shrink about her love love and the shrink does a great job of not pulling a Liz Lemon and saying “Adoy! Of course you do!”; and Dexter doesn’t let being a good dad interfere with the tranquilized serial killer in his trunk that he’s preparing to ritually execute. It all leads up to the most satisfying kill scene of the season (though the bar is low, considering Dexter’s offensively slight body count as of late). Inside the church, Travis’s kill table is positioned at the foot of the altar, with a Bible propping up his head and a well-placed holy light shining on his midsection so we don’t see his psychojunk. Michael C. Hall is never as fun to watch as he is in these moments — poking Travis in the forehead as if to physically drill his words into DDK’s skull, full of righteous fury, barely able to contain the rage that’s been building through weeks of stalking his prey. Dexter doesn’t come to some grand spiritual conclusion about God; instead, he returns to the old idea that he’s an agent of balance, bringing both light and darkness to this world. Nothing new there. Yet as Dexter casts the killing blow, Travis’s death is, ahem, eclipsed by a most unfortunately timed visit from Deb, who sees her brother murder the nut job she’s been hunting for weeks. Dexter might try to spin this as an isolated event, but when the guy you just stabbed is naked and bound to a table with plastic sheeting, claiming self-defense isn’t an option. Considering last night’s references to how lucky Dexter is — the woman on the Milagro (“Miracle”) and Jamie when he returns from the sea — and all of his increasingly implausible escapes, it’s as if the writers have finally conceded that Dexter’s good fortune has run out. It’s no coincidence that this was, next to Rita’s murder, Dexter’s best cliffhanger. Although Showtime hasn’t committed to a clear end date for the series, it’s been renewed for two more seasons, which according to network president David Nevins will “likely” be its last. As with Lost, Smallville, and so many other shows that suffered in the middle of their runs thanks a lack of a clear endgame, Dexter has drifted into that territory. Last season ended with Deb nearly catching her brother dispensing with Jordan Chase. She failed, of course, because that moment would be a universe-shaking game-changer that would hurl the series to its conclusion. These past two seasons have felt stretched, as if the writers are treading water, waiting for the green light to send this story where we all know it eventually is going — Deb meets the Dark Passenger, and Dexter answers for his sins. Just as Deb isn’t destined for a house in the suburbs and marital bliss, Dexter isn’t riding off into the sunset with Harrison and a new box of slides. Here’s hoping the show and the network stick to this two-season plan and deliver what could be a tightly plotted, thoroughly satisfying conclusion to a series that deserves to go out on a high note. That’s the way Dexter’s world should end. A few parting thoughts regarding the finale and what lies ahead in Season 7: • Why would the cops wait for Dexter to arrive before entering the house where a double-homicide occurred? This is the first time there’s not an army of police mucking up the crime scene when Dexter shows up. No good explanation, other than it's an easy way to allow Dexter remove his image from the lake of fire mural. • Speaking of flimsy logic, how would Dexter have the energy to swim back to shore after he spent a full night stranded at sea? Massive adrenaline rush after killing that traitorous captain, perhaps? Or the Milagro was stocked with Red Bull? • And why would that dude walking his dog on the beach let Dexter use his cell phone after Dexter just crawled out of the ocean fully clothed with a posse of illegals? • And why would Deb be cool with Dexter taking time in the middle of the workday — and with four hours to go before the end of days — to attend Harrison’s play? Hasn’t Dexter missed enough time this season? • And why wouldn’t Dexter anticipate what Travis would do with his keys and wallet? Sure, Travis thought he was dead, but wouldn’t that make Dexter’s apartment the obvious place he’d hide? • Oddest moment: Travis eating the shit out of an apple in the car, just before he looks at Dexter’s driver’s license. So weird! • Oddest moment, runner-up: Masuka’s Yoda impression. Would have been better if he said something filthy. • The grand finale Travis prepared was a complete creative letdown. Here’s a guy who strapped body parts to horses and set them free in broad daylight. The best he can come up with for Judgment Day is a child sacrifice during an eclipse on a rooftop where no one will see it? • The Noah’s Ark play, with all the adults wearing those creepy animal heads, was as scary as any of the DDK tableaus. • The poor kid who plays Harrison really earned his pay this week. At least twice, he looked genuinely scared. When Dexter puts on the lion mask and growls, a little girl screams and Harrison jumps — not like an actor, but like a child who wasn’t expecting to hear a shriek. He was also disturbed during the rooftop face-off when Travis aims the John the Revelator sword at him. Harrison stares at the blade and the thought bubble over his head says, “Um, mom, I think this guy really wants to kill me.” • My guess for next season is that it will start with a new killer on the loose, or a number of them, but that Louis will slowly become the big game that Dexter hunts. Of course, the fallout from what Deb saw at the church will drive much of the narrative. How does Dexter explain his behavior? Will they cover up Travis’s death or stage the crime scene so Deb can close the case? Will Deb still want to bang him? However this plays out, it seems Deb will finally begin to do some digging into her brother’s mysterious life and connect a lot of dots. By the end of Season 7, it’s a safe bet that she’ll know Travis wasn’t Dexter’s first victim. Whether her sanity remains intact is another issue. The Postmortem Best quote: “I am a father. A son. A serial killer.” —Dexter sharing some of his personal scripture with Travis But we noticed you're visiting us with an ad blocker We understand the reasons for blocking, but Vulture depends on ads to pay our writers and editors. We're working hard to improve the ad experience on our site, but in the mean time, we'd really appreciate it if you added us to the approved list in your ad blocker. Thanks for the support!
Q: CXX0030: Error: expression cannot be evaluated The short question: Why am I see this in the Locals window for my IWICImagingFactory object while in my destructor? The long explanation: I am creating a IWICImagingFactory object in my CreateDeviceIndependentResources() function: if (SUCCEEDED(hr)) { hr = CoCreateInstance( CLSID_WICImagingFactory, NULL, CLSCTX_INPROC_SERVER, IID_PPV_ARGS(&mpWICFactory) ); } I have checked hr after this and it is always S_OK. Then in my CreateDeviceResources() function I pass a pointer to the IWICImagingFactory object in a call to LoadBitmapFromFile(): if(SUCCEEDED(hr)) { hr = LoadBitmapFromFile( mpRenderTarget, mpWICFactory, L".\\background.png", 0, 0, &mpBackgroundBitmap); } The function LoadBitmapFromFile is exactly as it appears in the MSDN sample. You can see most of the code here: http://msdn.microsoft.com/en-us/library/dd756686%28v=VS.85%29.aspx The return code from LoadBitmapFromFile() is S_OK. I now have a ID2D1Bitmap object which works fine. I don't use the WIC factory for anything else. The problem occurs in my destructor when I try to SafeRelease() the WIC factory: SafeRelease(&mpWICFactory); SafeRelease() is defined as: template<class Interface> inline void SafeRelease(Interface** ppInterfaceToRelease) { if(*ppInterfaceToRelease != NULL) { (*ppInterfaceToRelease)->Release(); (*ppInterfaceToRelease) = NULL; } } While in the destructor, if I expand the mpWICFactory object in the Locals window, I see the "CXX0030: Error: expression cannot be evaluated" errors. The screenshot below shows the Locals window right before calling SafeRelease() on the WICFactory object. http://img21.imageshack.us/img21/9820/localsy.jpg I then get an error: Unhandled exception at 0x00d22395 in Program.exe: 0xC0000005: Access violation reading location 0x6df128f0. What is the cause of this problem? EDIT: Here is a full simple program demonstrating the problem: Test.h #ifndef TEST_H #define TEST_H #include <Windows.h> #include <wincodec.h> #include <d2d1.h> class Test { public: IWICImagingFactory *mpWICFactory; Test(); ~Test(); HRESULT Init(); }; template<class Interface> inline void SafeRelease(Interface** ppInterfaceToRelease) { if(*ppInterfaceToRelease != NULL) { (*ppInterfaceToRelease)->Release(); (*ppInterfaceToRelease) = NULL; } } #endif Test.cpp #include "Test.h" Test::Test() : mpWICFactory(NULL) { } Test::~Test() { SafeRelease(&mpWICFactory); } HRESULT Test::Init() { HRESULT hr = CoCreateInstance( CLSID_WICImagingFactory, NULL, CLSCTX_INPROC_SERVER, IID_PPV_ARGS(&mpWICFactory) ); return hr; } Main.cpp #include <Windows.h> #include "Test.h" int WINAPI WinMain(HINSTANCE hInstance, HINSTANCE prevInstance, PSTR cmdLine, int showCmd) { if(SUCCEEDED(CoInitialize(NULL))) { Test app; app.Init(); CoUninitialize(); } return 0; } A: The short answer is that the virtual function pointer 0x6df128e8 is invalid, so the debugger cannot dereference it. That's what it means by "expression cannot be evaluated". So when the program slightly later tries to call one of the virtual functions, the pointer still doesn't work and you get an access violation. The long and hard part if finding out exactly where your object is overwritten with an invalid value. Unfortunately it can be pretty much anywhere else in the program... A: Try calling SafeRelease() right after initialization and see if it works. Also, try invoking the clean up explicitly (with some sort of uninitialize function) instead of doing this at the destructor. When you leave clean up to destructors, sometimes you don't have full control over exactly what is being cleaned up when. It could also be that you're destroying some dependent objects in the wrong order.
Per impostazione predefinita, il Main metodo include la riga Dts.TaskResult = (int)ScriptResults.Success.By default, the Main method includes the line Dts.TaskResult = (int)ScriptResults.Success.Questa riga indica al runtime che l'operazione dell'attività è riuscita.This line informs the runtime that the task was successful in its operation. Il la classe ScriptMain elemento può contenere classi diverse di la classe ScriptMain classe.The ScriptMain item can contain classes other than the ScriptMain class.Le classi sono disponibili solo per l'attività Script in cui risiedono.Classes are available only to the Script task in which they reside. Fornisce un modo semplice per restituire un oggetto per il runtime (oltre al TaskResult) che può essere utilizzato anche per la diramazione del flusso di lavoro.Provides a simple way to return a single object to the runtime (in addition to the TaskResult) that can also be used for workflow branching.
The head of the NFL Players Association (NFLPA), the union representing professional football players, said Saturday that the union “will never back down” from supporting players' right to protest. The statement follows President Trump saying Friday night that people should “pick up and leave” NFL games if players kneel as a form of protest during the national anthem. “Whether or not [NFL commissioner] Roger [Goodell] and the owners will speak for themselves about their views on player rights and their commitment to player safety remains to be seen,” NFLPA executive director DeMaurice Smith said in a statement. ADVERTISEMENT “This union, however, will never back down when it comes to protecting the constitutional rights of our players as citizens as well as their safety as men who compete in a game that exposes them to great risks," he continued. Trump told a crowd at a rally for Alabama candidate Sen. Luther Strange Luther Johnson StrangeSessions hits back at Trump days ahead of Alabama Senate runoff The biggest political upsets of the decade State 'certificate of need' laws need to go MORE (R) on Friday night that NFL players will stop kneeling if crowds started leaving games. "When people like yourselves turn on television and you see those people taking the knee when they are playing our great national anthem — the only thing you could do better is if you see it, even if it's one player, leave the stadium," Trump said. "I guarantee things will stop." Trump also said NFL owners should fire players if they refuse to stand during the national anthem. "Wouldn't you love to see one of these NFL owners, when somebody disrespects our flag, to say, 'Get that son of a bitch off the field right now. He is fired,' " he said. Trump also accused NFL referees of “ruining the game” by penalizing players who “hit too hard.” “Today, if you hit too hard … 15 yards, throw him out of the game,” Trump said. “They are ruining the game, right?” Multiple NFL players have fired back at Trump, with one Washington Redskins player telling him to “stay in your place” following his comments. Trump has previously attacked NFL player Colin Kaepernick for kneeling during the national anthem to protest the treatment of people of color in America. He also suggested Kaepernick remains an unsigned, free agent because he won’t stand for the anthem.
family educational rights and privacy act Meharry Medical College is subject to the provisions of federal law known as the Family Educational Rights and Privacy Act (also referred to as the Buckley Amendment or FERPA). This act affords matriculated students certain rights with respect to their educational records. These rights include: The right to inspect and review their education records within 30 days of the day the College receives a request for access. Students should submit written requests to the College Registrar and identify the record(s) they wish to inspect. The College Registrar will arrange for access and notify the student of the time and place where the record(s) may be inspected. If the College Registrar does not maintain the record(s), the student will be directed to the College official to whom the request should be addressed. The right to request amendment of any part of an education record that they believe is inaccurate or misleading. Students who wish to request an amendment to their educational record should write the College official responsible for the record, clearly identify the part of the record they want changed, and specify why it is inaccurate or misleading. If the College decides not to amend the record as requested by the student, the student will be notified of the decision and advised of his or her right to a hearing. The right to consent to disclosures of personally identifiable information contained in the student's education record(s) to third parties, except in situations in which FERPA allows disclosure without the student's consent: One such situation is disclosure to school officials with legitimate educational interests. A school official is a person employed by the College in an administrative, supervisory, academic or research, or support staff position (including College law enforcement personnel and health staff); a person or company with whom the College has contracted; or a student assisting another College official in performing his/her tasks. A College official has a legitimate educational interest if the official needs to review an education record in order to fulfill his or her professional responsibility.
Flipboard, New “Social” iPad Magazine will be Powered by Semantic Data The stealthy Kleiner Perkins-backed startup called Flipboard has now been revealed to be, as some suspected, a social application for the iPad. The new Flipboard iPad app bills itself as a “social magazine” – that is, one which aggregates status updates, tweets, photos and articles from those you’re connected to on social networking sites, like Twitter and Facebook. These updates are beautifully laid out into an easily digestible view which you can flip through with your fingers. But Flipboard isn’t just another “Twitter magazine,” – it also just acquired semantic technology startup Ellerdale, whose intelligent data-parsing algorithms have previously been used to create a real-time search engine and trends tracker (still available here, at least for the moment). Now that same powerful technology will be used to design a more personalized real-time experience: determining what social updates are important to you and presenting them in an attractive, magazine-like format. Flipboard Revealed: Social Networking Updates Become a Magazine In May, rumors of an under-the-radar startup called Flipboard surfaced, when sources reported it had raised funding from the well-known firm, Kleiner Perkins Caufield & Byers. Now the company is confirming these rumors, with news of a $10.5 million Series A venture capital round. It also has other key backers like Twitter’s Jack Dorsey and Facebook’s Dustin Moskovitz. Oh, and Ashton Kutcher’s interested, so there you go. If the investors’ confidence doesn’t convince you of the app’s potential, though, perhaps its back-end will. Although not available in this initial version, Flipboard will soon integrate the semantic data-analysis technology from the startup Ellerdale into its application in order to app better determine the relevance of the information and updates from your various social networking connections. Ellerdale is already an expert at this, after practicing the art of semantic analysis on Twitter’s “firehose” of data. Flipboard: This Magazine was Built for You So many people are overwhelmed by the fast-flowing information on the real-time Web, not to mention the massive amounts of raw data which include everything from 140-character tweets to new photo uploads from family and friends on Facebook. Take a day or two off from the Web, and it seems like you’ve missed everything. Catching up on all these updates is difficult, too, given the ephemeral nature of Twitter’s stream and Facebook’s constantly updated News Feed. Flipboard proposes a better way to follow your friends: turn social networking updates into a personalized magazine. How the Mag Works Within the new Flipboard app, there’s a homepage of sorts created using photos from your social networking friends, a content page and then personalized sections which you create. For now, you can have up to nine different sections, which can focus on any topic – whether that’s fashion or motorcycles – or even Twitter lists, if that’s your desire. Within the “magazine’s” pages are status updates, photos and even articles based on the links your friends have been sharing. The articles are presented in clean, clutter-free views without surrounding ads and other design flourishes implemented by the publisher. However, for copyright reasons, the articles won’t be full-text – only abstracts. You’ll have to click through (or rather, tap through) to read the full article using the included in-app Web browser. Although Flipboard isn’t meant to function as a full Facebook or Twitter client, the basic interactions are supported – liking, replying, re-tweeting, etc. Best of all, perhaps, is the app’s cost: FREE. Unlike the Twitter mag competitor Tabloids (iTunes link), for example, a $2.99 iPad app, Flipboard will remain free, generating revenue through in-app ads – full page ones, no less – where revenues are split with the publisher. Future iterations may even include full article text, not abstracts, for those publishers which ink deals with the company. So yes, in the future, you could launch Flipboard to read your daily newspaper thanks to a syndication of NYT’s Twitter feed, for example. Future Plans Also in the future, additional networks will be supported, like Flickr, Tumblr, Posterous and others, although there are no plans for direct RSS support. You can follow most sites on Twitter and Facebook, Ellerdale’s Arthur van Hoff tells us. (Incidentally, his LinkedIn resume reveals his title to be Level III Grand Master of Alphabetical Order at Ellerdale, which we think is fabulous). Although Ellerdale’s influence isn’t present in the launch edition of Flipboard, its inclusion is forthcoming. And given our previous review of Ellerdale’s prospects, a service we once called “tantalizing” for the data-hounds out there, we can’t wait to see it put to a more practical purpose: discovering the trends and relevance within our own content. Related Posts Micro-blogging darling Twitter and the charming aggregation site FriendFeed are missing one huge thing that most users don’t mind overlooking: profiles. While, it really isn’t a big deal profiles can be helpful when determining whether or not to add someone as a friend. So if you’ve been missing those features, here’s a way to add a profile to… It’s your best friend from 5th grade’s birthday, and you almost missed it because you were stalking your 7th grade best friend on Facebook. The time is now 9pm, in your time zone. In a moment of freedom, you return to Facebook.com and notice the tiny birthday notifications in the upper-righthand corner. Is it too… Read more » According to a report by Business Week’s Spencer E. Ante, Twitter’s search deals with Google and Microsoft made the company about $25 million – enough to turn Twitter into a profitable business in 2009. According to these reports – which Twitter did not comment on – the deal with Google made Twitter about $15 million this year and a similar deal…
Spectrums Project Portal Conservatives and liberals react strongly to different situations If you watch the news or read the opinion pages, you could be forgiven for thinking that liberals and conservatives are members of completely different species. But why is it that these different groups have such a hard time getting along? A team of scientists from Nebraska thinks that the answer has to do with people’s bodies – specifically, how they’re physiologically predisposed to respond to the good and bad in their environments. The difference between conservatives and liberals, then, may go all the way down to the brainstem, and this difference can affect religious ideology too. Conservative thinkers often deride liberals for being hedonistic, so obsessed with pleasure that they neglect the difficult and demanding aspects of life. To back up their point, these conservative commentators draw on images of free-love communes, LSD experimentation, and increasingly permissive social norms. Liberals, they claim, are often too interested in cheap thrills to take life seriously. Meanwhile, liberals accuse conservatives of being fearful, close-minded, and distrustful of outsiders. They point to conservatives’ approval of high defense spending, severe punishments for criminal offenders, and harsh policies against illegal immigrants as evidence. In liberals’ eyes, their poor, uptight conservative brethren are constantly in vigilance mode, always seeing threats, never able to simply relax and take life as it is. Unfortunately, reality sometimes matches our caricatures of it – and it seems as if both these stereotypes may offer up some grains of truth. Led by psychologist Michael D. Dodd, researchers at the University of Nebraska, Lincoln, recently tested conservative and liberal volunteers to see what kinds of stimuli most affected them, and found that liberals were more physiologically stimulated by pleasant images, while conservatives reacted more strongly to negative ones. Dodd and colleagues had 200 participants from the Lincoln area take four different tests of political orientation, agglomerating that data to produce an overall measure of political ideology, with pure conservatives at one pole and pure liberals at the other. Then, the researchers asked a team of third-party judges to rate a series of more than thirty pictures, ranking them according to how positive or negative the images seemed to be. The three most negative images were of a spider on a man’s face, an infected, maggot-ridden wound, and a solitary man fighting an entire crowd of people. The three most positive images, on the other hand, were a picture of a happy child, a photo of a bowl of fruit, and an image of a cute bunny rabbit. All 33 images were shown to the volunteers. As they viewed the pictures, electrodermal measurement instruments took readings of the volunteers’ skin conductance levels. (Electrodermal measurement serves as a nice proxy for physiological arousal. The more easily electricity can travel across your skin at any given time, the more your eccrine glands are producing moisture that coats the skin’s surface. Eccrine gland activity, in turn, is an indicator of general sympathetic nervous system arousal. In other words, if your skin conducts electricity well, you’re probably excited, whether pleasantly or not.) When the researchers correlated the skin-conductance tests against records of the different images the volunteers had viewed, they found precisely what they had been expecting: participants who had tested as highly conservative were much more physiologically aroused by the most negative images, while highly liberal volunteers showed the most increase in skin conductance levels when they saw happy images of children or cute animals. What’s more, the relationship was ordinal: the more liberal a participant was, the more strongly he or she could be expect to react to positive stimuli. And the more conservative someone was, the more strongly his or her body reacted, on average, to the negative images. A second test measured skin conductance levels against different kinds of images: pictures of the well-known political figures Bill Clinton, Hillary Clinton, Ronald Reagan, and George W. Bush. As expected, the liberals showed the greatest electrodermal response to images of politicians they probably agreed with – namely, the Clintons. But conservatives were the opposite. Their bodies reacted most strongly to the politicians they disagreed with – again, those darn Clintons. In a final study, the researchers used a different measure of physiological attention. Participants were shown a collage of different images, some pleasant, some unpleasant. Computerized eyetracking instruments determined where on the screen participants were focusing their visual attention, how quickly they were selecting which images to focus on, and how long their attention remained on each image. Again, the model held: liberals spent more time looking at pleasant images, while conservatives gazed longer at the disgusting or frightening ones. Liberals found the nice images more quickly, while the conservatives honed in on the unpleasant pictures with alacrity. Overall, conservatives seemed to be more primed to pay attention to and physiologically respond to dangerous, unpleasant, or threatening images, while liberals’ bodies were most reactive to pleasant or happy pictures. The authors of the study pointed out that this dichotomy intuitively makes sense: in the U.S., liberals are more interested in spending public money on pleasant, enjoyable programs, like the National Park Service or arts endowments. Meanwhile, conservatives tend to support spending on defense, prisons, police forces, and anti-immigration policies. In the religious arena – which the authors of the study didn't address directly – the model also jibes with reality. Religious conservatives are notable for their dim view of human nature, while religious liberals tend to see humans as divinely good. Conservative Christians emphasize original sin, while liberal Protestants focus on humankind's inherent beauty and potential for growth. While many might be tempted to read this research as proof that conservatives are somehow defective compared to fun-loving, pleasure-seeking liberals, such a conclusion would be premature. First, the evidence is clear that conservatives are generally happier and often have better family lives than liberals. Second, the world is, in fact, not all daisies and roses; danger and threat are, to paraphrase William James, genuine portions of reality. Physiologically, then, conservatives may be more well-adapted to deal with the world as it actually is. Indeed, conservatives often accuse liberals of being unrealistic and naïve, and in many cases there may be something to this accusation. Meanwhile, religiously speaking, a faith system that doesn't shy away from facing the the dark aspects of the world may have a psychological edge over one that focuses predominately on goodness and happiness to the exclusion of dealing with pain, suffering, and evil. But the most productive way to read this research is probably that liberals and conservatives both have valid ways of responding to their environments, and societies may benefit greatly from having both types in their midst. A culture dominated by conservatives, for example, could be quite a grim thing indeed – think security cameras everywhere, police on every corner, and endless military buildup. A purely liberal culture, on the other hand, would be like your average dysfunctional hippie farm – everyone wants to have fun and get stoned, but no one wants to actually do the work of growing crops or taking out the trash, because those things aren't fun. Let's be honest: neither one of these worlds sounds very desirable. The fact is that reality is chock-full of both wonderful and horrifying things, and if some people are preprogrammed to pay more attention to one than the other, then so be it. As long as we’ve got all types in our midst, we can always rely on somebody to point out the good, the bad, and the ugly. Or, as the case might be, the bunny rabbits, bar fights, and spiders.
/* GIMP RGB C-Source image dump (nes.c) */ static const struct { unsigned int width; unsigned int height; unsigned int bytes_per_pixel; /* 2:RGB16, 3:RGB, 4:RGBA */ unsigned char pixel_data[150 * 56 * 2 + 1]; } icon_nes = { 150, 56, 2, "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\374\377\304\350!\370\314" "\372\337\377\377\377w\376$\370\200\370\377\377O\373B\360\313\362\237\377" "\376\377\377\377\375\377\277\377\377\367\377\377\237\377\337\377\067\366\266" "\375\337\377\377\377\377\377\375\367\377\357\377\367\375\377\277\377\377" "\367\377\377\276\377\377\377\377\367\377\377\376\367\377\367\377\367\377" "\377\377\367\376\367#\370B\370\231\376\277\377\277\377\237\377\377\357\337" "\377\276\377\373\376\373\376\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377}\377" "#\370\040\370\000\370\363\374\337\377V\375@\370\202\350\177\367\273\376\361" "\354\367\375\277\377\337\377\377\377\377\377\377\377\375\367\375\367\033\357" "N\363\000\370\040\360\015\354\273\376\337\377\375\377\373\377\277\367\337\377" "\276\377\277\377\377\367\377\377\375\377\376\377\337\377\337\377\337\377" "\337\377\335\377\377\377\374\377\040\350\001\360\273\376\337\377\375\337\276" "\377\335\377\375\367\376\367\334\376>\377\377\357\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\337\377$\370\040\360\341\360C\360\236\367\336\377\000\370@\370\337" "\367X\376\321\374V\376\377\377m\353\317\363Q\374\247\370\206\371\022\376[" "\377\015\353\000\360\040\370\014\373\377\367w\365\016\373o\373\216\373\030\377\377" "\377\363\374N\373\017\374\214\363\345\350o\373\234\377\377\377\376\377\214" "\373I\371.\373`\370B\350Z\366\374\377\363\375\015\353/\373\256\373\370\376" "\277\377\277\367\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\367\002\370#\370" "U\376\010\372\353\361;\377\040\370\000\370\377\377\360\363\003\370\214\353\274" "\377\001\370\000\370m\353\356\373\000\370!\370=\377~\377%\370\001\370\374\377\230" "\356\003\370\351\361\070\376B\370\000\360\374\376\014\373\000\370\242\360/\374\350" "\371\001\370\252\362\335\377\013\372@\370n\373t\365\040\370\"\370\034\377\024\376" "\000\370K\362\272\376#\370\203\360\332\376\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\376\367@\370!\370\272\366\332\377%\370\252\362@\350A\360" "\377\377r\364\002\350\060\374\235\377\001\370\000\370\337\377\375\327\007\372\002\370" "v\345\335\357B\370@\370\272\376e\361\000\360\207\371\216\373\252\352\011\352" "\365\364\357\373\040\370\011\363\376\367:\376A\370$\351:\366\000\370\040\340Z" "\377\377\367\000\370\040\340\032\367g\371\000\370\220\334\376\367i\372\000\370\314" "\372\236\377\377\367\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377`\370`\370\265" "\374\377\347q\374\001\370\040\370a\370\377\377\060\374\002\370/\374\335\377\000\370" "\040\370\177\367\377\377h\371\002\370U\375\374\377\000\350\040\370\376\376'\371" "\040\370O\374\275\377\063\366\060\375\372\375\316\373\000\370+\373\377\377\030" "\375\000\370c\361{\376\000\370@\370[\377\377\377\001\370\"\370\372\376H\371\000\370" "\262\364\275\377k\372\000\360\313\372\376\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\001\370\000\360\365\374\277\377\275\377\207\371\001\370\040\370" "~\377\257\373\"\370,\363\235\377\303\360\000\370\237\377\376\357F\351\002\370" "U\375\233\367\003\370\003\370\377\367:\376\000\360(\362\274\376\002\370\000\340^\377" ",\373\"\370\012\372\336\377\366\355\000\360!\360\335\377\262\374c\340\013\362" "\260\373\002\360\004\370<\377x\366\004\370\311\351u\376D\370\246\370\031\377\376" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\277\377V\375\326\375\\\367\377" "\367\377\367\374\347W\375\223\375\377\367\372\366\364\355:\376\337\377t\345" "\324\375\237\377\377\377\325\375\223\375\373\376\377\357u\375t\365\275\377" "\377\377\070\376*\373(\372\320\373\235\377\377\367\070\376v\365\333\366\335" "\357:\377S\375\266\375\377\377\377\377\024\375\354\372.\364\062\376\024\375" "\276\377\377\377\227\366\013\373'\372\355\363\273\367\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\337\377\337\377\377\377\377\377\377" "\377\377\377\377\377\377\377\337\377\377\377\337\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\337\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\337\377\377\377\377\377\337\377\377\377\337\377\377\377\377" "\377\337\377\377\377\276\367\377\377\377\377\337\377\377\377\377\377\377" "\377\377\377\337\377\377\377\377\377\377\377\377\377\377\377\377\377\276" "\367\377\377\377\377\377\377\337\377\377\377\377\377\337\377\377\377\377" "\377\377\377\377\377\276\367\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\337\377\377\377\276\367\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\276\367\377" "\377\377\377\377\377\337\377\377\377\377\377\337\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\337\377\377\377\377" "\377\377\377\337\377\377\377\337\377\377\377\377\377\377\377\337\377\377" "\377\377\377\276\367\377\377\276\367\377\377\377\377\377\377\377\377\377" "\377\377\377\337\377\377\377\377\377\377\377\377\377\377\377\377\377\276" "\367\337\377\377\377\337\377\377\377\276\367\377\377\377\377\377\377\377" "\377\377\377}\357\377\377\377\377\377\377\377\377}\357\377\377\276\367\377" "\377\377\377\377\377\377\377\377\377\377\377\337\377\337\377\377\377\377" "\377\337\377\377\377\377\377\377\377\377\377\377\377\276\367\377\377\337" "\377\377\377\337\377\377\377\377\377\377\377\377\377\276\367\377\377\276" "\367\377\377\377\377\276\367\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\337\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\337\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\236\367\377\377\377\377\276\367\377\377\337\377\377\377\377" "\377\337\377\377\377\337\377\377\377\377\377\377\377\337\377\377\377\276" "\367\377\377\377\377\337\377\377\377\276\367\377\377\276\367\377\377\377" "\377\377\377\377\377\337\377\377\377\377\377\377\377\276\367\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\337\377\377" "\377\337\377\276\367\377\377\377\377\377\377\377\377\377\377\337\377\377" "\377\377\377\337\377\377\377\377\377\377\377\276\367\377\377\337\377\377" "\377\377\377\377\377\337\377\377\377\337\377\377\377\377\377\377\377\337" "\377\377\377\377\377\377\377\377\377\377\377\377\377\236\367\337\377\377" "\377\377\377\377\377\377\377\377\377\276\367\377\377\377\377\337\377\337" "\377\377\377\377\377\377\377\377\377\377\377\337\377\377\377\337\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\337\377\014ciJ\353Z\014c\333\336\020\204\313Z\353" "ZIJ\363\234\232\326\212R\353ZiJ\323\234U\255IJ\014c\212RU\255\367\275\252" "R\353ZIJ\064\245\070\306\252R\313Z\252R\317{<\347mk\212RiJQ\214\377\377\216" "s\367\275Q\214iJ\252RIJu\255\373\336\313Z\212R\252R\353Z\252Rq\214\236\367" "\014c\014c\014c,c\367\275\256s\252R\252R\252R\266\265\232\326\212R\014c\212R" "mk\377\377\377\377\236\367\020\204MkMkMk\060\204\357{\337\377\337\377mk\226" "\265\363\234mk\216s,c\367\275,c\212R\252R\216s\363\234\010B\353Z\313Z\262" "\224Y\316\353ZiJ\212R\014c\010Bq\214\337\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\000\000\206\061\313Z\313Z<\347A\010\246\061\064\245\020\204\000\000\070\306\064\245\040" "\000\347\071\030\306\353Z\000\000,c\313Z\367\275\212Ra\010U\255Q\214\000\000u\255\064\245" "\000\000\307\071\327\275,c\000\000\266\265\363\234\000\000\262\224\040\000\363\234\000\000iJ" "u\255mkA\010\216sA\010\363\234\202\020\040\000\262\224\000\000\363\234\202\020E)\313" "Z,cu\255\000\000\216sU\255\212RA\010\272\326u\255\000\000\010Bu\255\377\377\276\367" "Y\316\000\000\347\071\252R\024\245\252Ra\010}\357}\357\000\000\010Ba\010(B\212R\060\204" "]\357\327\275\202\020\040\000U\255\020\204\000\000\353Z\212R\323\234\363\234\000\000\024" "\245\040\000\004!\222\224\000\000\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\000\000Mk\363" "\234\323\234\377\377\000\000\222\224\377\377\333\336\000\000\373\336\377\377\000\000" "Q\214\377\377\252Ra\010q\214Q\214\337\377Mk\000\000\357{\313Z\000\000\377\377\337" "\377\202\020mk\377\377\216s\000\000mk\216s\000\000Q\214\303\030\064\245\000\000u\255\377" "\377\272\326\000\000\357{\000\000\377\377\212R\347\071\337\377\000\000\216s\202\020,c\262" "\224\064\245\327\275\000\000\034\347\377\377\367\275\000\000\377\377\236\367\000\000\060" "\204\377\377\377\377\337\377\276\367\363\234\024\245\222\224\010B\222\224(" "BA\010\303\030\246\061\333\336\266\265\363\234\363\234$!\070\306\337\377\010B" "\004!\377\377q\214\000\000q\214\262\224\070\306\363\234\000\000\377\377E)\014c\377\377" "\000\000\377\377\377\377\337\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\010B\212R\216sQ\214y\316e)Q\214" "\337\377\333\336\303\030Y\316\377\377\303\030q\214\377\377\262\224\004!\357{" "\317{\266\265\256sE)\070\306\024\245\303\030}\357\377\377\343\030\256s\377\377" "Mke)\232\326\327\275\343\030Q\214iJu\255E)\064\245\377\377\232\326e)\317{E" ")\337\377\353ZiJ\377\377\343\030U\255\014c\252R\216s\060\204u\255\343\030\272" "\326\377\377\266\265\242\020<\347\377\377\343\030\060\204\377\377\337\377\377" "\377\373\336\317{\317{\317{A\010\272\326\377\377\004!e)\337\377\377\377\357" "{mk\256s\303\030\327\275\377\377\313Z\347\071\337\377\367\275\004!\216s\060\204" "\024\245\024\245\242\020\377\377IJ\014c\337\377$!}\357\337\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\337\377\377\377\377\377\377\377\337\377\377\377\377\377\377\377\377\377" "\337\377\377\377\377\377\377\377\377\377\337\377\377\377\377\377\377\377" "\377\377\377\377\337\377\377\377\276\367\377\377\377\377\377\377\377\377" "\337\377\377\377\377\377\337\377\377\377\377\377\377\377\377\377\337\377" "\377\377\337\377\377\377\337\377\377\377\377\377\337\377\377\377\377\377" "\337\377\377\377\377\377\377\377\377\377\337\377\377\377\337\377\377\377" "\377\377\337\377\377\377\377\377\377\377\377\377\337\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\337\377\377\377\337\377\377\377\337\377\337\377" "\377\377\377\377\377\377\377\377\337\377\377\377\337\377\377\377\377\377" "\377\377\377\377\337\377\377\377\377\377\377\377\377\377\337\377\377\377" "\337\377\337\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377" "\377\377\377\377\377\377\377\377\377\377\377\377", };
Magnetic resonance methods that employ the ^19^F nucleus for cellular imaging or molecular structure and dynamics investigations become increasingly important for both in vitro and in vivo systems.[@b1] Fluorine is hardly encountered in biomolecules and therefore provides excellent bioorthogonality. However, what is an advantage on the one hand, can become an obstacle on the other hand because proper methods for labeling are required. Although an elegant alternative that relies on "spy molecules", which contain the fluoride sensor, has been reported recently,[@b2] direct labeling of either the target or the interaction partner remains inevitable for the majority of successful applications. Our group has a strong focus on ^19^F labeling of RNA in order to utilize the corresponding derivatives for structural and functional analysis.[@b3] For instance, we disclosed a gene-regulation-determining, bistable sequence element in the preQ~1~ class I riboswitch based on strategically positioned 5-F uridine labels in the corresponding mRNA domain.[@b4] In another example, we introduced ribose 2′-F atoms at specific nucleoside positions, allowing local monitoring of binding events and thus visualizing dynamic RNA--ligand interactions.[@b5] Although being powerful, in all these cases, the reporter unit relied on a single fluorine atom, and thus limitations with respect to sensitivity could potentially be encountered. Herein, we present a novel high-performance fluorine sensor for RNA, the ribose 2′-deoxy-2′-trifluoromethylthio unit (2′-SCF~3~; Figure [1](#fig01){ref-type="fig"}). The advantage of this label lies in the fact that three magnetically equivalent fluorine atoms allow ^19^F NMR experiments to be performed at micromolar concentrations. This labeling method thus constitutes a significant improvement compared to the above-mentioned single-atom labels, which require RNA concentrations in the low millimolar range; less material is needed and potential aggregation problems are minimized. Moreover, the 2′-SCF~3~ group represents an isolated spin system, therefore proton decoupling (as, for example, required for 2′-F labels) is not necessary, thus making the label metrologically very straightforward. Similar to methyl groups, trifluoromethyl groups allow the prolongation of coherence lifetime based on transverse relaxation optimized spectroscopy (TROSY), accounting for an additional advantage in measurements of large RNA molecules or RNA--protein systems. ![New concept for fluorine labeling of RNA with respect to ^19^F NMR spectroscopic applications.](anie0051-13080-f1){#fig01} Originally, we considered to develop a new ^19^F label for RNA applications through trifluoromethylation.[@b6] The selection of an appropriate nucleoside position is critical because several sites are to be excluded. For example, 5-trifluoromethyl uridine is chemically unstable during oligonucleotide deprotection as it can transform into a 5-cyano group.[@b7] The 5 position of uridine can be functionalized by the sterically demanding 4,4,4-trifluoro-3,3-bis(trifluoromethyl)butyne residue, and this pyrimidine label with nine equivalent fluorine atoms was successful in ^19^F NMR spectroscopic analysis of DNA hybridization.[@b8] However, we did not pursue such a concept in favor of a uniform labeling pattern at sites that are equivalent in all four standard nucleosides, preferably at the 2′ position. In this sense, the logical follow-up consideration was trifluoromethylation of the 2′ hydroxy group of ribose to achieve 2′-OCF~3~ labels. To our knowledge, a single study on 2′-OCF~3~-modified oligonucleotides has been reported to date, and this refers to 2′-OCF~3~ adenosine.[@b9] Introduction of the modification was achieved via 2′-*O*-\[(methylthio)thiocarbonyl\]adenosine by treatment with pyridinium poly(hydrogen fluoride) (HF/pyridine) in the presence of 1,3-dibromo-5,5-dimethylhydantoin (DBH), however, yields were extremely low (22 %). In our own attempts, we were unable to increase the reported yields. Efforts to apply a new class of electrophilic trifluoromethylation reagents based on hypervalent iodine(III) derivatives (Togni reagents)[@b10] for the zinc-mediated trifluoromethylation of the 2′-OH group of a 5′,3′-O-protected guanosine substrate failed. Furthermore, by using the first mentioned xanthate method,[@b11] we were able to generate minor amounts of 2′-OCF~3~ uridine derivative. However, this pyrimidine nucleoside turned out to be unstable, its decomposition resulting in formation of 2,2′-anhydrouridine. These observations prompted us to develop a novel concept for RNA labeling, namely with 2′-SCF~3~ nucleosides, which appears rather unorthodox at first sight. Although such a label would most likely thermodynamically destabilize an RNA double helix (assuming that its behavior would be analogous to 2′-SCH~3~ residues),[@b12] the many promising ^19^F NMR applications for probing structure and folding of RNA, binding of small molecules and RNA, or protein--RNA interactions, for which this label can be easily positioned in single-stranded regions, prompted us to pursue this goal. We started our endeavors with 2′-deoxy-2′-mercaptouridine **1** (Scheme [1](#sch01){ref-type="scheme"}) which is readily accessible in large amounts from 2,2′-anhydrouridine and thioacetic acid, according to an early report.[@b13] Fortunately, the key step of our synthetic plan, the regioselective trifluoromethylation of the thiol group, was achieved in 80 % yield using 3,3-dimethyl-1-(trifluoromethyl)-1,2-benziodoxole (Togni's reagent).[@b14] The trifluoromethylated thiouridine **2** was completely stable and no back reaction to 2,2′-anhydrouridine was observed (contrarily to the 2′-OCF~3~ counterpart). Subsequently, the 5′-OH group was protected as dimethoxytrityl (DMT) ether to give compound **3**, and conversion into the corresponding phosphoramidite **4** was achieved in good yield by reaction with 2-cyanoethyl *N*,*N*-diisopropylchlorophosphoramidite. Starting from compound **1**, our route provides **4** in 60 % overall yield in three steps with three chromatographic purifications; in total, 1.9 g of **4** was obtained in the course of this study. ![Synthesis of the 2′-deoxy-2′-trifluoromethylthio (2′-SCF~3~) uridine building block 4 for RNA solid-phase synthesis. Reagents and conditions: a) 3,3-dimethyl-1-(trifluoromethyl)-1,2-benziodoxole (1.2 equiv), CH~3~OH, −78 °C→RT, 16 h, 80 %; b) DMT-Cl (1.1 equiv), DMAP (0.1 equiv), pyridine, RT, 16 h, 81 %; c) (2-cyanoethyl)-*N*,*N*-diisopropyl chlorophosphoramidite (1.5 equiv), *N*-ethyldiisopropylamine (10 equiv), CH~2~Cl~2~, RT, 2.5 h, 93 %.](anie0051-13080-f6){#sch01} Next, the preparation of RNA with the novel 2′-SCF~3~ uridine building block was tested, using the solid-phase synthesis methodology for 2′-*O*-TOM-protected RNA.[@b15] Coupling yields were higher than 98 % according to the trityl assay. Cleavage from the solid support and deprotection of the modified RNA molecules were performed in the presence of CH~3~NH~2~ in ethanol/H~2~O, followed by treatment with tetrabutylammonium fluoride (TBAF) in tetrahydrofuran (THF). Salts were removed by size-exclusion chromatography on a Sephadex G25 column, and RNA sequences were purified by anion-exchange chromatography under strong denaturating conditions (6 [m]{.smallcaps} urea, 80 °C; Figure [2](#fig02){ref-type="fig"}). The molecular weights of the purified RNA molecules were confirmed by liquid-chromatography (LC) electrospray-ionization (ESI) mass spectrometry (MS). Synthesized RNA sequences containing 2′-SCF~3~ uridine labels are listed in Table 1 in the Supporting Information. Noteworthy, the 2′-SCF~3~ label was completely stable under repetitive oxidative conditions (20 m[m]{.smallcaps} aqueous iodine solution) required during RNA solid-phase synthesis for transformation of P^III^ to P^V^. Therefore, no special adaptions of the standard synthesis cycle (as, for example, required for 2′-SeCH~3~-modified RNA)[@b16] were necessary to provide high-quality crude products (Figure [2](#fig02){ref-type="fig"}). ![Characterization of 2′-SCF~3~ modified RNA. Anion-exchange HPLC traces (top) of 6 nt RNA (A), 20 nt RNA (B), and 27 nt RNA (C), and respective LC-ESI mass spectra (bottom). HPLC conditions: Dionex DNAPac column (4×250 mm), 80 °C, 1 mL min^−1^, 0→60 % buffer B in 45 min; buffer A: Tris-HCl (25 m[m]{.smallcaps}), urea (6 [m]{.smallcaps}), pH 8.0; buffer B: Tris-HCl (25 m[m]{.smallcaps}), urea (6 [m]{.smallcaps}), NaClO~4~ (0.5 [m),]{.smallcaps} pH 8.0. For LC-ESI MS conditions, see the Supporting Information.](anie0051-13080-f2){#fig02} The efficient synthetic access to 2′-SCF~3~-modified RNA encouraged us to evaluate the new label in ^19^F NMR applications. In the following, we present three examples: 1) probing of the secondary structure of bistable RNA sequences; 2) verification of RNA--protein interactions; and 3) attesting rationally designed riboswitch modules. Figure [3](#fig03){ref-type="fig"} depicts a 32 nt long RNA sequence (**5**) that exists in slow conformational exchange of two distinct secondary structures (**5′** and **5′′**), as confirmed by comparative imino proton NMR spectroscopy[@b18] using the truncated reference hairpin **5 a**. When we labeled this RNA with 2′-SCF~3~ at uridine-26 (**6**), the label lies within a 4 nt loop of fold **6′** while it is located in a 7 nt internal bulge of fold **6′′**. The assignment of secondary structures **6′** and **6′′** by ^19^F NMR spectroscopy is depicted in Figure [3 B](#fig03){ref-type="fig"} and provides a ratio of about 55:45 in favor of **6′**. The imino proton NMR spectra of modified (**6**) and unmodified (**5**) sequences are nearly identical, thus demonstrating that the equilibrium position has not been influenced by the label. This tendency was confirmed for a second bistable RNA (see the Supporting Information, Figure 1) and hence underscores the applicability of the label for secondary-structure probing. Even more satisfying was the observation that in *E. coli* lysate at a very low RNA concentration of 10 μ[m]{.smallcaps}, the two folds were readily detectable (Figure [3 D](#fig03){ref-type="fig"}), showing the potential of the 2′-SCF~3~ label for in vivo studies. In this context, we should mention that the modification is likely to improve resistance against phosphodiesterases, as has been shown for the 2′-OCF~3~ counterparts.[@b9] ![Structure probing of a bistable RNA. A) Unmodified RNA;[@b17] secondary structure model of full-length (5) and reference (5 a) RNA (left); imino proton NMR spectra (right). B) Same as (A), but for 2′-SCF~3~ labeled analogues. C) Assignment of folds 6′ and 6′′ of RNA 6 by ^19^F NMR spectroscopy. D) Same as C, but in *E. coli* cell lysate. Conditions for A--C: \[RNA\]=0.3 m[m]{.smallcaps}, \[Na~2~HAsO~4~\]=25 m[m]{.smallcaps}, pH 7.0, H~2~O/D~2~O=9:1, 298 K; conditions for D: \[RNA\]=10 μ[m]{.smallcaps}, *E. coli* lysate/D~2~O=9:1, 298 K (for lysate preparation, see the Supporting Information).](anie0051-13080-f3){#fig03} As a second example, we demonstrate the utility of the 2′-SCF~3~ label for the verification of RNA--protein interactions. We synthesized the stem--loop RNA molecules **7** and **8**, which comprise the recognition sequence for the small nuclear ribonucleoprotein U1A (Figure [4](#fig04){ref-type="fig"}).[@b19] The RNA-binding domain (U1A-RBD) of this protein binds to its cognate RNA with an apparent *K*~d~ of about 2×10^−11^ [m]{.smallcaps}. We positioned the 2′-SCF~3~ moieties within the 10 nt loop, close to the conserved sequence of AUUGCAC (Figure [4](#fig04){ref-type="fig"}). Hairpin **7** showed a major ^19^F NMR resonance at −39.90 ppm and a minor one up-field in the signal flank, reflecting an additional conformational population in slow exchange, most likely because of a different microenvironment in the loop (Figure [4 A](#fig04){ref-type="fig"}). When one equivalent of U1A-RBD was added, a new uniform signal at −39.70 ppm was detected, representative for the high-affinity, conformationally well-defined RNA--protein complex. Likewise, when the label was shifted one nucleotide downstream in stem--loop **8**, the same behavior was observed (Figure [4 B](#fig04){ref-type="fig"}), demonstrating that the responsiveness of the label is not restricted to a single site, and that it can even be positioned more distant from the interaction site. ![Characterization of an RNA--protein interaction. A) left: RNA stem--loop 7 with 2′-SCF~3~ label (red) and the recognition sequence (blue) for the U1 A protein (cyan), Pymol model generated from 3CUL (Protein Data Bank); right: ^19^F NMR spectra of RNA and U1 A RBD[@b19] mixed at different ratios as indicated. B) Same as (A), but with label (red) at different position. Conditions: \[RNA\]=0.3 m[m]{.smallcaps}, \[protein\]=0.3 m[m]{.smallcaps}, \[Na~2~HPO~4~\]=10 m[m]{.smallcaps}, pH 6.0, H~2~O/D~2~O=9:1, 298 K.](anie0051-13080-f4){#fig04} For a third example, we designed a novel riboswitch module that consists of only 27 nucleotides and verified its function using the 2′-SCF~3~ labeling concept (Figure [5](#fig05){ref-type="fig"}). In the emerging field of synthetic biology, such modules are of growing interest to engineer gene-regulation systems,[@b20] but currently their number is rather limited and refer to only few small-molecule ligands, such as theophilline, tetracyclin, or neomycin.[@b21] Here, we employed a known tobramycin-sensitive aptamer recognition sequence[@b22] for the design of a novel switchable RNA module. In the free form, this functional RNA **9** exists in an extended stem--loop conformation (**9′**; Figure [5](#fig05){ref-type="fig"}). Once tobramycin (tob) is added, it captures the minor conformation of the RNA (**9′′**) that comprises a characteristic 14 nt recognition loop to form a high-affinity complex in the nanomolar range. This implies a ligand-induced rearrangement of the secondary structure, and thus provides the typical characteristics of a riboswitch.[@b23] With the focus on 2′-SCF~3~ labeling and ^19^F NMR spectroscopy, we showed that the new label allows the straightforward assignment and quantification of the different RNA conformations (**9′**, **9′′**, **9′′**-tob) involved for this riboswitch module (Figure [5 D](#fig05){ref-type="fig"}). ![Characterization of a designed riboswitch module. A) Secondary-structure model of the proposed switchable RNA sequence 9. B) Chemical structure of tobramycin. C) Imino proton NMR spectra of RNA 9 (top) and after addition of 0.5 equivalents of tobramycin (bottom). D) Same as (C), but ^19^F NMR spectra for fold assignment. Conditions: \[RNA\]=0.3 m[m]{.smallcaps}, \[Na~2~HAsO~4~\]=10 m[m]{.smallcaps}, pH 7.0, H~2~O/D~2~O=9:1, 298 K; \[tobramycin\]=0.15 m[m]{.smallcaps}.](anie0051-13080-f5){#fig05} One issue that remains to be addressed in more detail is positioning of the label within single-stranded RNA regions. This is advisable because the attachment of 2′-SCF~3~ groups thermodynamically destabilizes RNA double helices, comparable to their 2′-SCH~3~ counterparts.[@b12b] UV melting profile analysis of two exemplary hairpins, 5′-GAAGGGCAACCUUCG and the corresponding modified RNA 5′-GAAGGGCAACC(2′-SCF~3~-U)UCG, showed a ΔΔ*G*°~298K~ of 1.9 kcal mol^−1^ (see the Supporting Information, Figure 2 and Table 2). The reason for the destabilization is most likely the preference for the C2′-endo conformation of the modified nucleoside. This theory was supported experimentally and by MD simulations for 2′-SCH~3~ moieties.[@b12],[@b12b] To provide evidence for a comparable behavior of 2′-SCF~3~ functionalities, we synthesized a short RNA strand, 5′-UGU(2′-SCF~3~-U)GC, and determined ^3^*J* (H1′--H2′) coupling constants by 2D ^1^H,^1^H-DQF COSY NMR experiments (see the Supporting Information, Figure 3). For the 2′-SCF~3~ uridine, a value of 9.9 Hz was determined, accounting for a population of 98 % of C2′-endo ribose conformation, which is indeed a strong indication that this modification would cause interference if forced into a C3′-endo conformation, as it demands an A-form RNA double helix.[@b11], [@b24] Taken together, the ^19^F NMR applications for 2′-SCF~3~-modified RNA molecules introduced here make this labeling concept a compelling new tool for probing of RNA structure and function, in particular when protein or small-molecule interaction partners are involved. Moreover, we stress that the chemical synthesis of this label is extremely robust and can be performed on large scale. Incorporation of the label into RNA is compatible with standard solid-phase synthesis and deprotection protocols, and thus highly convenient. Additionally, the potential expansion of the labeling concept to all four standard nucleosides holds promise for flexible and widespread applications in order to explore structure and dynamics of biologically relevant RNA sequences through in vitro and in vivo ^19^F NMR spectroscopic methods. Detailed facts of importance to specialist readers are published as "Supporting Information". Such documents are peer-reviewed, but not copy-edited or typeset. They are made available as submitted by the authors. [^1]: We thank Prof. Dr. A. Serganov (NYULMC) for the generous gift of U1A protein, Priv.-Doz. Dr. K. Breuker for FT-ICR mass spectra, Dr. B. Puffer for initial experiments on 2′-OCF~3~ uridine, M. Sc. S. Grutsch and M. Sc. T. Moschen for preparation of *E. coli* lysate, and Dr. M. Soulière for critical comments. We are grateful for funding from the Austrian Science Fund FWF (I317, P21641 to R.M.; I844 to C.K.).
Search form Welcome Welcome to ‘Doctors Speak Up’. This multimedia resource has been developed to address the language and communication needs of international medical graduates (IMGs) working or seeking work in Australia. This introductory video explains what this website is all about. In this website you can watch videos of doctor-patient interactions and explore some of the communication and language issues involved. There is a range of activities and explanations to help you develop appropriate language and communication skills for the Australian medical context. There are different ways to navigate through the site, either by case (alcohol, depression, sexual history, back pain) or by activity (communication, grammar, vocabulary or pronunciation). The site was developed by the Medical Education Unit at the University of Melbourne, with support from the Victorian Department of Health and the Postgraduate Medical Council of Victoria.
Q: Is this line of code indicating an array inside another array in php? $info['schedule'] = array('swimming', 'soccer', 'read book'); Just going through a tutorial and came across this line of code. Is this code creating an array with 3 variables inside the array $info under the variable 'schedule'? A: Yup!! check it yourself. I would say, key schedule of array $info has an array of strings. $info['schedule'] = array('swimming', 'soccer', 'read book'); print_r($info); A: Yes it is, however it's not under the variable 'schedule' it's called a key. And the key is 'schedule'
Ionic liquids for nano- and microstructures preparation. Part 2: Application in synthesis. Ionic liquids (ILs) are widely applied to prepare metal nanoparticles and 3D semiconductor microparticles. Generally, they serve as a structuring agent or reaction medium (solvent), however it was also demonstrated that ILs can play a role of a co-solvent, metal precursor, reducing as well as surface modifying agent. The crucial role and possible types of interactions between ILs and growing particles have been presented in the Part 1 of this review paper. Part 2 of the paper gives a comprehensive overview of recent experimental studies dealing with application of ionic liquids for preparation of metal and semiconductor based nano- and microparticles. A wide spectrum of preparation routes using ionic liquids is presented, including precipitation, sol-gel technique, hydrothermal method, nanocasting and ray-mediated methods (microwave, ultrasound, UV-radiation and γ-radiation). It was found that ionic liquids formed of a 1-butyl-3-methylimidazolium [BMIM] combined with tetrafluoroborate [BF4], hexafluorophosphate [PF6], and bis(trifluoromethanesulfonyl)imide [Tf2N] are the most often used ILs in the synthesis of nano- and microparticles, due to their low melting temperature, low viscosity and good transportation properties. Nevertheless, examples of other IL classes with intrinsic nanoparticles stabilizing abilities such as phosphonium and ammonium derivatives are also presented. Experimental data revealed that structure of ILs (both anion and cation type) affects the size and shape of formed metal particles, and in some cases may even determine possibility of particles formation. The nature of the metal precursor determines its affinity to polar or nonpolar domains of ionic liquid, and therefore, the size of the nanoparticles depends on the size of these regions. Ability of ionic liquids to form varied extended interactions with particle precursor as well as other compounds presented in the reaction media (water, organic solvents etc.) provides nano- and microstructures with different morphologies (0D nanoparticles, 1D nanowires, rods, 2D layers, sheets, and 3D features of molecules). ILs interact efficiently with microwave irradiation, thus even small amount of IL can be employed to increase the dielectric constant of nonpolar solvents used in the synthesis. Thus, combining the advantages of ionic liquids and ray-mediated methods resulted in the development of new ionic liquid-assisted synthesis routes. One of the recently proposed approaches of semiconductor particles preparation is based on the adsorption of semiconductor precursor molecules at the surface of micelles built of ionic liquid molecules playing a role of a soft template for growing microparticles.
Catch is a restaurant located in Red Bank, New Jersey at 9 Broad Street. They are open every day of the week. ROSA is an enchanting Parallax Restaurant WordPress Theme that allows you to tell your story in an enjoyable way, perfect for restaurants or coffee shops. What does it mean to be together? For moons upon moons generations have interacted and grown into a unified force. Human interaction...
Q: Converting a dictionary key in double I think it is not complicated but after doing some research I can't find an answer to a simple problem. I am iterating through keys in a dictionary and I would like to use the key which is a string as a double in some calculation. If I do this : foreach (KeyValuePair<string, List<string> price in dictionary) double ylevel = Convert.ToDouble(price.Key); It seems to not work and I get a "Input string was not in a correct format" error. What is the right way to get a double from the key.. Thanks Bernard A: You're doing it correctly. The error message indicates that one of your keys is not actually a double. If you step through this example in a debugger, you'll see it fails on the second item: var dictionary = new Dictionary<string, List<string>>(); dictionary.Add("5.72", new List<string> { "a", "bbb", "cccc" }); dictionary.Add("fifty two", new List<string> { "a", "bbb", "cccc" }); foreach (KeyValuePair<string, List<string>> price in dictionary) { double ylevel = Convert.ToDouble(price.Key); } Solution To resolve this problem, you should use the following code: var dictionary = new Dictionary<string, List<string>>(); dictionary.Add("5.72", new List<string> { "a", "bbb", "cccc" }); dictionary.Add("fifty two", new List<string> { "a", "bbb", "cccc" }); foreach (KeyValuePair<string, List<string>> price in dictionary) { double ylevel; if(double.TryParse(price.Key, out ylevel)) { //do something with ylevel } else { //Log price.Key and handle this condition } }
One is a soundstream, the other an eclipse, both are in good condition, scratched up on the bottom but could probably be polished out. I'm looking for a 4 channel that does some decent power, like 120+ at 2 ohms, doesn't have to be pretty. Cause it won't be seen. Just need it to be functional and not huge.
Category: Love Sometimes our Lent disciplines can be overly individualistic. We think about our own prayer, our own fasting, our own self-denial, our own individual relationship with God. But God has a different vision. To God, holiness is social as well as personal. This morning in my ‘One Year Bible’ readings I read Leviticus 19-20, the so-called ‘holiness code’. It begins with the famous words “Be holy, because I, Yahweh your God, am holy” (19:2). But it immediately begins to define holiness in social terms: respect your father and mother; keep the Sabbath (in modern Judaism, that is very much a community discipline, and I expect the same was true in ancient times); don’t harvest your field or vineyard so thoroughly that you don’t leave something behind for the poor; don’t steal, lie, deceive one another; don’t defraud your neighbour; don’t hold back the wages of a day-labourer overnight; don’t pervert justice by showing partiality in court to either rich or poor; don’t slander your neighbour or endanger their life; love your neighbour as yourself (this is just a selection from 19:3-18). The one that really struck me was this one: ‘When a foreigner resides among you in your land, do not mistreat them. The foreigner residing among you must be treated as your native-born. Love them as yourself, for you were foreigners in Egypt. I am the Lord your God’ (Leviticus 19:33-34). So they were commanded not only to love their neighbour as themselves, but the foreigner living among them – the immigrant, the refugee – as well. So all the commands about how you treat your neighbour also applied to how you treated the foreigner. “Isn’t it awful – refugees and immigrants who haven’t paid taxes here get just the same benefits as us!” Well, in Leviticus God apparently disagrees with that sentiment. ‘The foreigner residing among you must be treated as your native-born’. We must not avoid thinking about these things during Lent. The way I treat my neighbour is an integral part of my relationship with God. This is not just about warm feelings and kind words; it’s about basic honesty, justice, and respect. On Ash Wednesday we read from Isaiah 58, in which God rebukes the Israelites for following the prescribed fasts but not caring about their neighbours. ‘Is not this the kind of fasting I have chosen: to loose the chains of injustice and untie the cords of the yoke, to set the oppressed free and break every yoke? Is it not to share your food with the hungry and to provide the poor wanderer with shelter – when you see the naked, to clothe them, and not to turn away from your own flesh and blood?’ (Isaiah 58:6-7; the whole chapter is worth a re-read today). Lent is not just about ‘me and God’, because holiness is not just about ‘me and God’. Both are social. After all, Jesus has told us that the way we treat people in need is the way we treat him (Matthew 25:31-46). How will we treat our Lord today when he comes to us in our neighbour? Ever since someone noticed that this year Ash Wednesday falls on Valentine’s Day, people on Twitter and Facebook have been having a field day. Most people seem to see it as something incongruous: Valentine’s Day is about romance and chocolate and pleasure and more than a hint of sex; Ash Wednesday is about self-denial and taking up your cross and going into the desert with Jesus and getting closer to God. What can the two possibly have to do with each other? Personally, I’m much more interested in the connections than the contradictions. Valentine’s Day, we’re told, is all about love. And what’s Christian growth about, if it’s not about growing in love? How do we grow as Christians? You don’t need me to answer that one for you: “You shall love the Lord your God with all your heart, and with all your soul, and with all your mind, and with all your strength…You shall love our neighbour as yourself” (Mark 12:30-31). Christianity is relational: it’s about growing in our loving relationship with God and our neighbour. And wise people know that life is relational too. It’s often been observed that no one on their death bed says to themselves “Gee, I wish I’d spent more time at the office!” We all know instinctively that when we’re facing the ultimate test, that stuff’s not going to count for very much. What will count will the quality of our relationships – the quality of the love we’ve offered. So I want to spend a few minutes with you tonight, as we begin our Lenten journey, unpacking this theme of love. How might we make this Lent all about love? I’m actually going to offer you three ‘L’ words tonight to hang our thoughts on: Love, Listening, and Labour, and all connected with Lent (I know, that’s four ‘L’ words…!). So – love. “Love is all you need”, sang the Beatles, and then they broke up and proceeded to sue each other for millions of pounds. Obviously, love wasn’t all they needed – or at least, the sort of love they aspired to wasn’t adequate to guide them through the challenges of long-term relationships. So let’s start by reminding ourselves that when the writers of the New Testament used the word ‘love’, they probably had something different in mind. “Getting the Love you Want” was the title of a well-known book of the 1980s, but nothing could be further from the Christian conception of love. We’re not about getting the love you want; we’re about giving the love God wants you to give. And when the New Testament describes this love, it always describes actions. What does Jesus do to illustrate to his disciples what it means to “love one another as I have loved you”? He gets down from the supper table, removes his outer garment, wraps a towel around his waist, and washes their feet. In their culture this was the servant’s job, but for some reason that night no servant had been there to do it. And of course, a few hours later he ‘loved them to the end’ (John 13:1) by laying down his life on the cross for the salvation of the whole world. This is the most important thing for us as Christians. God is love, and we are made in the image of God, so growing in love is growing in God’s image. And that love is offered in two directions: to God and to our neighbour. We love God because God first loved us. We don’t love God as a way of earning God’s love; God’s love for us is unconditional and indestructible, and Jesus tells us that he pours it out on the righteous and the unrighteous. We know ourselves to be loved by God, and in response, we offer our own – much smaller – love to God. And then we love our neighbour. ‘Neighbour’ doesn’t just mean those in close proximity to us – family, friends, the people on our street. Remember the parable of the Good Samaritan? ‘Neighbour’ means people in need who we are in a position to help, both near and far away. How do we love these people? I want to make a suggestion to you this Lent: let’s start by listening to them. Most of us are much quicker to speak than to listen. This applies both in our relationship with God and our relationships with other people. When we take time to pray, most of us take time to talk to God. We’ve got our concerns, things we want or need for ourselves, loved ones we’re anxious about and so on. And so we sit down to pray, and we start talking right away. “God please do this. God, please bless that person. God, if you want to know how to bless them, I’ve got some ideas I could give you”. The same with other people. It’s scary to think how much of our conversation consists in showing off to other people. I’ve got such a good joke to tell you! You’re going to love this story! I’m going to share my political views on this subject and you’re going to see immediately that I’m right and you’re wrong! And even when we do listen, how carefully do we listen? For instance, when I sit down to read the Bible – to listen for the Holy Spirit’s voice – am I open to the possibility that there might be something new for me today in the passage? Or do I just think “Good Samaritan, yeah, yeah, I know that story, I know what it means”? Do I just read it quickly, and then pass on to sharing my shopping list with God? Or when someone’s talking to us, how long are we prepared to listen before we interrupt? Ten seconds? Twenty if they’re lucky? Do we assume that after twenty seconds we know enough to respond helpfully to them? I’m sure we’ve all had that experience: we start sharing our struggles with someone, and they don’t really let us get finished before they’re launching into giving us their helpful advice, which is actually not that helpful, because they haven’t given us time to really go deep yet. So how about this Lent we all resolve to do our best to become better listeners – to God, and to other people? Some of us in our parish have decided to read the Gospel of Mark this Lent. Let’s not assume each day that we already know what God’s going to say to us in the daily passage. Let’s ask the Holy Spirit to speak to us, and then let’s read it through, slowly and meditatively, two or three times. Which words or phrases particularly strike us, and why? What’s the passage saying to us about God? About ourselves? About life? About what’s important and what’s not important? What’s the passage calling me to put into practice? What difference would it make today if I tried to practice it? We can also listen to God in silent prayer. Most people who do that don’t actually hear God speak in an audible voice, although some people do report that they feel they’re received some guidance and direction from God. But it’s mostly about quietening down and becoming more aware of the presence and peace and joy that God gives. Again, it’s not something that can be rushed. A lot of people find that about ten or twelve minutes in, they start to notice things they hadn’t noticed before. Are you willing to wait that long? And let’s listen to others, and pay attention to what they say. A friend of mine used to do a little exercise: he’d get people together in pairs, and then one person had to listen carefully while the other took five minutes to describe something that had happened to them recently. When they were done the listener had to take three minutes to recount in as much detail as possible what they had heard. The first time I was the listener, I was amazed at how hard that was! We’re just not that practiced in listening! And yet people long to be listened to! When we really listen to someone, we’re communicating to them that we value them, that we love them. I’m ashamed to admit how frequently I really don’t listen to Marci; she’s talking to me, but I’m doing something else or thinking about something else, and I only listen with one ear and a quarter of a brain. This may be the most loving thing we can do this Lent: to resolve to become better listeners – to God, and to other people. Finally comes labour. In 1 Thessalonians Paul writes, ‘…remembering before our God and Father your work of faith and labour of love and steadfastness of hope in our Lord Jesus Christ’ (1 Thessalonians 1:3). Labour of love – that’s a striking phrase! But it reminds us that biblical love is not primarily about feelings; it’s all about actions. Listening is one such action, but there are many others. Jesus says “If you love me, you will keep my commandments” (John 14:15). What’s the point of saying we love Jesus if, as soon as he tells us to do something we don’t want to do, we refuse to do it? That love isn’t worth very much, is it? It needs to have a little labour added to it, to make it real! What does it mean to love our enemies? In Romans chapter 12 Paul quotes the Old Testament: ‘No, if your enemies are hungry, feed them; if they are thirsty, give them something to drink’ (Romans 12:20). And in the parable of the sheep and the goats Jesus spells out for us what Christian love looks like: “I was hungry and you gave me food, I was thirsty and you gave me something to drink, I was a stranger and you welcomed me, I was naked and you gave me clothing, I was sick and you took care of me, I was in prison and you visited me” (Matthew 25:35-36). What labour of love might God be calling you to this Lent? You don’t necessarily have to undertake some new relationship (although, I have to say, every prison chaplain I know is looking for more volunteers to go in and spend time with the inmates). But when we think of the people who are already in our lives, and we think of their needs, is there anything else we can do to love them in action? Or do we perhaps need to go first and listen carefully to them, so that we don’t assume we already know what their needs are? You see how these three ‘L’s tie together! So – this could be our Lent. Let’s make these six and a half weeks until Easter a season of love. Let’s work on our relationships with God and our neighbours. Let’s make it our first priority to learn to become better listeners – to God, and also to people. And then let’s find new ways of putting our love into action – our labour of love – so that we can truly be a blessing to others as God has blessed us. Yes, I do believe in these things. I think the reason most people fail is because they make resolutions without making a plan to keep them. But I learned in the first half of 2016 that if I make a plan, I can keep it. And I also know myself well enough to know that if I do these things at times when there is a natural ‘new beginning’, it gives me an added psychological impetus. So, the Lord being my helper, here are my three 2018 New Year’s Resolutions: Resolution #1: Get back down to 165 lbs by the end of February (I’m currently at 174). Plan: use the same diet and exercise regime I used January to June 2016 when I succeeded in losing 52 lbs. Resolution #2: Don’t buy any new books in 2018. Instead, read the dozens of unread books on my shelves. Plan: sign out of my Amazon account and let Marci change the password! (Just kidding: she knows about this resolution and will help me stick to it! Although, come to think of it, it might not be a bad idea…) Resolution #3: Each week, plan and implement new ways to love my neighbour as myself. Plan: Pick a day of the week to journal about this (probably Saturday) and, having decided what to do, put it on the calendar. I need to do this because I’m very selfish and this is the command I (can you believe it?) get most bored with. We are told in several places in the New Testament to follow the example of Jesus, to be ‘imitators of Christ’. This includes attitudes such as humility (eg. Philippians 2:1-11), but if we ask the question, ‘How specifically should I practice that?’ only one concrete behavioural example is given: Don’t retaliate when you are mistreated, but love your enemies (1 Peter 2.21-23). Why is this spelled out? Because this behaviour is at the heart of the Gospel. The heart of the Gospel is the story of a God who loves his enemies, forgives those who murder him, and reaches out to those who reject him. We are told to ‘Go and do likewise’. This morning I thought about this poem by Steve Turner; it appears in his collection ‘Up to Date‘, published in 1983 and now long out of print. Somehow, it seems sadly relevant. All You Need is Hate Alan hated soldiers, and teachers and politicians, policemen, and bankers. Alan was full of hate for such people. Poured his hate into poems. Threw the poems at audiences who sat bleeding in their seats, words hanging from holes in their skin. Hate them, he shouted, boot stomping the boards. Hate them. Hate them. Alan, I said. Alan. Hate hate, Alan, I said. Hate hate. It’s the only hate worth having, Alan and it comes by another name. When I was young I understood the word ‘neighbour’ to have a very specific meaning: the person who lives next door. Occasionally it would be extended a bit. In a small village of a few hundred people, many of them related to each other, the term ‘neighbour’ might reasonably be applied to everyone in the community. Or in the inner-city (like Woodland Road in Leicester, where I spent the first few years of my life), it might mean other people who lived on the same street. But ‘neighbour’ always implied proximity. And usually (although this was rarely spelled out) it also involved similarity: neighbours are people like us. Jesus, however, had a different definition. Let me quote it to you in full: Just then a lawyer stood up to test Jesus. ‘Teacher,’ he said, ‘what must I do to inherit eternal life?’ He said to him, ‘What is written in the law? What do you read there?’ He answered, ‘You shall love the Lord your God with all your heart, and with all your soul, and with all your strength, and with all your mind; and your neighbour as yourself.’ And he said to him, ‘You have given the right answer; do this, and you will live.’ But wanting to justify himself, he asked Jesus, ‘And who is my neighbour?’ Jesus replied, ‘A man was going down from Jerusalem to Jericho, and fell into the hands of robbers, who stripped him, beat him, and went away, leaving him half dead. Now by chance a priest was going down that road; and when he saw him, he passed by on the other side.So likewise a Levite, when he came to the place and saw him, passed by on the other side. But a Samaritan while travelling came near him; and when he saw him, he was moved with pity. He went to him and bandaged his wounds, having poured oil and wine on them. Then he put him on his own animal, brought him to an inn, and took care of him. The next day he took out two denarii, gave them to the innkeeper, and said, “Take care of him; and when I come back, I will repay you whatever more you spend.” Which of these three, do you think, was a neighbour to the man who fell into the hands of the robbers?’ He said, ‘The one who showed him mercy.’ Jesus said to him, ‘Go and do likewise.’ (Luke 10:25-37, NRSV) Let me point out two things about this passage. First, Jesus refuses to answer the lawyer’s question, ‘Who is my neighbour?’. That’s because it’s the wrong question. The lawyer thinks the commandments are an entrance exam he has to pass in order to receive eternal life. He wants to know what the pass mark is: what’s the least he can get away with? That being the case, if there are fifty people in his village and only twenty of them qualify as his ‘neighbours’, why would he waste time loving the other thirty? There’s nothing in it for him! Jesus, however, sees things differently. To him, the commandments are not an entrance exam, they are a description of what eternal life looks like. Growing in joyful obedience to those commandments is what our life is going to be about, now and forever, until we are reshaped into people who obey them not out of obligation, but out of delight. They aren’t an exam that we will complete: they are our new way of life. So Jesus refuses to answer the lawyer’s question because he doesn’t accept the premise it’s based on. And this leads to the second thing: Jesus’ redefinition of the word ‘neighbour’. ‘Neighbour’ isn’t a description of a person who lives near us and who looks like us; it’s a description of the relationship between a person in need and the person who stops to help them. A person in need, whether I know them or not, is my neighbour. When I stop to help them, I am behaving like a true neighbour to them. And it’s not an accident that Jesus chooses to make this an inter-racial story. The Samaritans were mixed-bloods, with centuries of animosity between them and the ‘pure’ Jews of Judea. But a Samaritan was the one who stopped to help this (presumably Jewish) victim of a mugging, while the priest and the Levite (also Jewish) refused to do so. They refused to be neighbours to the man in need; the Samaritan chose to be a neighbour. In recent weeks we have seen shocking racial hatred, especially today in Charlottesville, Virginia. This hatred is antithetical to the message of Jesus Christ. Jesus recognizes no boundaries; he crosses borders, reaches out to all people, treats Samaritans and Roman soldiers (and women, children, tax collectors and prostitutes) with respect, and tells us that we are even required to love our enemies. There is no escape from the command to love, because it is the nature of the God we believe in, a God who loves his enemies. I want to say as clearly as I can that any kind of racism – against aboriginal people, against black folks, against Asians, against Jewish people or Muslims (although ‘Muslim’ is a religion, not a race) or anyone else – is totally antithetical to the Gospel of Jesus Christ. The God Jesus taught us about is the God who created everyone and loves everyone. The Church must stand clearly for the message, and live it out in its daily life. I would be the first to admit that we in the Church have often fallen short of this. We have allowed our governments to tells us it’s okay to hate and kill people it calls our enemies. We have colluded with the state in the sinfully misguided and wicked institution of the Residential Schools. And we continue to drag our feet on recognizing the rights of the original inhabitants of this country. So yes, we have a lot to repent of. But let’s not fail to name the goal we’re aiming for. Let’s be clear: Jesus calls us to be neighbours to one another, to love one another, to help those in need whether they are ‘like us’ or not. One of his early followers, Saul of Tarsus, taught that in Christ ‘there is no longer Jew or Greek, there is no longer slave or free, there is no longer male and female, for all of you are one in Christ Jesus’ (Galatians 3:28). All one. The Church is called to demonstrate before the watching world what a reconciled humanity looks like. The Church is called to live this love, and then to share it with others and invite them into it. And we cannot do that if we allow ourselves to be divided along lines of race. To allow that would be a complete betrayal of our message. We are one family. So let us do our best to live as one family, and refuse to let the power of evil divide us. The word ‘Maundy’ comes from the Latin word ‘maundatum’, which means ‘commandment’ (we get the word ‘mandatory’ from ‘maundatum). In the Upper Room, at the Last Supper, after washing his disciples’ feet, Jesus said to them: “A new command I give you: Love one another. As I have loved you, so you must love one another. By this everyone will know that you are my disciples, if you love one another” (John 13:34-35, NIV 2011). It has often been pointed out that ‘love one another’ was not a new command; something very like it appears several times in the Old Testament, and Jesus had previously given it to his disciples. What is new is the description of the love: ‘As I have loved you’. The disciples are instructed to imitate Jesus in loving one another. What specific acts of Jesus are in view here? At the beginning of the chapter John says of Jesus, ‘Having loved his own who were in the world, he loved them to the end’ (John 13:1). This is clearly looking forward to the story of the cross. So we can say without hesitation that we’re called to imitate the love Jesus showed for us in the cross. This is sacrificial love, not ‘feeling’ love. Jesus doesn’t show the disciples his feeling of love by dying on the cross for them. The dying is the act of love. ‘Grater love has no one than this: to lay down one’s life for one’s friends’ (John 15:13). So we’re called to be ready and willing to make the ultimate sacrifice for one another. Am I ready to do that? Probably not. Maybe I need to pray on that. But I suspect there’s something more pressing for me to pray on. The other way Jesus loved his disciples was to wash their feet. This was the slave’s job, but for some reason no slave had done it that night. Consequently, after spending the day walking the dusty streets of Jerusalem in open sandals, Jesus and his disciples were now reclining on low couches around a table, their feet literally in each other’s faces. The omission would have been painfully obvious. Apparently no one was willing to do the slave’s job, so Jesus got up and did it. When he was done, he said, “Do you understand what I have done for you? You call me ‘Teacher’ and ‘Lord’, and rightly so, for that is what I am. Now that I, your Lord and Teacher, have washed your feet, you also should wash one another’s feet. I have set you an example that you should do as I have done for you” (John 13:12-15, NIV 2011). Many churches (ours included) will remember this action of Jesus tonight by having foot washing services. I love this custom, but let’s not kid ourselves that this is real obedience to Jesus’ command. Foot washing today is unusual and exotic, but in the time of Jesus it was a mundane task of humble service. What are the tasks like that today? The simple, humble tasks we do for others as ways of loving them? We make each other cups of tea and coffee. We prepare meals and clean up after them. We change smelly diapers. We clean up messy houses. We care for aged relatives as they lose control over their bodily functions. We support organizations working in refugee camps. We sit with difficult people and listen to their problems, for the forty-seventh time. We used to have a saying in the college i attended: “I’ll die for you, but I won’t run up to the third floor to fetch your sweater for you”. It’s highly unlikely that I will be called on to die for my fellow Christians (though it may happen). But it’s absolutely certain that today and every day I will be called on to die to selfishness and self-centredness by performing humble acts of service for my sisters and brothers in Christ. I am not very good at this. Lord, have mercy, and help me follow the footsteps of Christ. Tim Chesterton Disclaimer Please note that opinions expressed on this blog are entirely my own and do not necessarily represent the official view(s) of my parish, my bishop, my diocese, the Anglican Church of Canada, the folk music community of Edmonton, or any other organisation or community with which I am associated. Indeed, it is highly likely that they will not, since I appear to have been born with the maverick temperament! Comment Policy Comments are welcome on this blog. Please sign your comment with at least a first name. If you have never commented here before, please also give your last name for your initial comment. Anonymous or pseudonymous comments are no longer accepted on this blog.
What is the right choice for you? Cloud, On Premise or a Hybrid Cloud?January 3, 2018 by Kim Haythornthwaite Untitled-1 Are you 100% cloud based or 100% on premise or do you have hybrid systems? Hybrid would mean that part of your system would be on premise and part might be in the cloud. You might be a manufacturing company with an on-premise manufacturing system, but your sales or marketing team are using a cloud based solution. Probably most cloud based companies have some on-premise and vice versa. There are good reasons why you would want a bit of both. What type of companies are working well in the cloud? Below are some situations or industries that lend naturally to the cloud. eCommerce Web stores and their financial systems are a natural candidate for cloud. eCommerce businesses have their hosted web-store already in the cloud so it is a natural fit to add the ERP system to the cloud. If they have retail stores, they can use a cloud based POS system that integrates into their cloud ERP system. Technology Companies Tech companies are often run by young professionals that have grown up with the cloud. They want the flexibility to login into their systems anywhere in the world. They want modern, fast paced systems. They are also new companies and don’t have to bear the cost of transitioning existing on-premise or legacy systems to the cloud. Companies with remote teams or companies that span regions and countries The cloud enables great collaboration across regions and territories. A company with headquarters in Silicon Valley, and with staff across the country, are able to all work together easily on the same system. With cloud systems, remote staff won’t experience the reduced speeds or connection issues that used to plague remote logins. What type of companies are still on-premise? Everyone conjures up a picture of the aging manufacturing owner that likes to hold up their finger to see which way the wind is blowing. The on-premise lover is some greying older patriarch or matriarch that doesn’t trust the cloud. We hear often this example: Our customer had a dad that was transitioning the business over to the kids. The kids wanted to go with hosting and Dad wanted the financial system in the company closet. Some people are afraid of the cloud and they have concerns about security. The reality is that the biggest security threat to your data is typically user error which includes erasing critical data or even sending an e-mail with private content to the wrong person. When to consider Hybrid or On-Premise? There are some very valid reasons for having a hybrid cloud or on-premise set-up, such as: Unstable Internet If you are a remote mine in Alaska or Northern Quebec, you may have an unstable internet connection. You might be using a satellite dish that gets impacted easily. You don’t want to run a cloud based solution on internet that is unreliable. Heavy Regulation Drug companies with mandatory government compliance may be ineligible to move to the cloud. The government agencies, as part of the regulation, want to see the server rooms where the data is stored. They want the software and the servers that the software sits on to be in-house. This is especially true for manufacturing software. High Risk of Hacking A lottery corporation, for example, might be a prime target for being hacked. It might be preferable to control the data in house with its own IT security team. A casino, may need an in-house server. Their charter may not allow the data to be held outside in the cloud. Their only option could be on-premise. Down time is too expensive Some on premise clients can’t afford any down-time. The internet goes down and a client can’t operate. For some clients, this could be a $1000 per hour they are losing. One solar flare could put the internet down for 2 weeks. Huge volumes of data can impact speed with some cloud based solutions Speed can be slow when you are on a shared server. You may not have a lot of control over who is on your shared server with you. It is not always obvious, once the contracts are signed, how to get moved to a different server. Highly customized environments or solutions One of the challenges customers face in moving from on premise to on-line is the number of customizations they have in place. When it is in house, systems can be customized at the client’s discretion. The customer can choose to upgrade their systems and take their time testing those upgraded customizations. Some cloud systems do not allow a client to opt out of an upgrade. There are often strong software partners that have built extensions to on premise solutions. The on-premise systems tend to be mature and feature rich. You may be compromising or losing some of the functionality by moving into the cloud. The arguments for having on premise systems must be weighed against the numerous benefits of cloud based systems. Cloud systems are modern and cutting edge and have a lot of wow factors. When to consider the Cloud? Modernization Legacy systems can be clunky in the way they display, not render on high definition screens, or they can be customized beyond being usable. New cloud systems have been built from the ground up using best practices that include great layout, optimized user interfaces, superior integration technologies, and out of the box dashboards. Cost Reduction You don’t need a dedicated IT person for the servers and upgrades. They can be used to drive efficiency in other areas instead. Servers that would be running in house are now eliminated so you don’t have to be dealing with aging infrastructure, patches or updates. Efficiency Cloud applications tend to be easy and simple to use which drives efficiency. Modern systems eliminate extra steps and make clicking around the system very user friendly and intuitive. Risk Reduction For some, on-premise is the riskiest option of all. If you can’t afford the security that you need, you could be very exposed with your in-house systems. Who is more capable of keeping it secure? A large IT company with many levels of security or your IT guy or gal that manages the system in the closest? Easily support expansion With cloud it is easy to ramp up or ramp down. Add more licenses easily without having to add costly infrastructure. Down-sizing is easy too as you only pay for what you use. Less Down-Time with confusing upgrades You can have down time with your servers when they don’t work. Someone may need to reboot or add patches. Your server and software upgrades can be slow as the options can be confusing. Updates occur automatically in the cloud which makes for a clean transition to new versions. Back-ups Back-ups are done automatically when you are in the cloud. Your data is secured for you. Backing up data and keeping that backed up data secure is no longer your responsibility. Worrying about security certifications is now mostly the responsibility of your cloud application. Ability for Entrepreneurs to work anywhere anytime From airplane seats or from the waiting rooms of the world, owners and CFO’s can log into their systems and work. They can analyze their data from one division while working from another division. Great for companies that span multiple regions Accounting can be handled in Vancouver, support in Costa Rica and sales teams can span across America. All can log into a cloud platform and update information that is available real time to the other teams. This drives speed and efficiency. Take the time to evaluate what works best for you. As cloud based solutions evolve, more functionality is available daily. The cloud continues to grow with connectivity options. Consider that cloud licences might be cheaper or more expensive for you and your company. Determine your ROI over a six year period. Each organization must weigh the pros and cons to get the best fit. Remember a hybrid cloud might be the right cloud for you. Many of our clients work in a mix of environments and so we’ve built our solutions to accommodate their needs – whether they are on-premise or in the cloud. We invite you to ask us how we do it and how we help our customers deploy their solutions. All it take is an email: ussales@nolanbusinesssolutions.comor a phone call: (1) 303 665 9343. By Kim Haythornthwaite, General Manager, Nolan Business Solutions, an international solution provider of automation tools for Microsoft Dynamics GP & NetSuite | including NetSuite implementations / consulting throughout North America. Ready to chat? Our expert team are here and ready to help you, so send us a message or give us a call.
Report: ELLIS & HAMNER's RED In Development as NBC TV Series By Chris Arrant, Editor August 14, 2015 04:24pm ET Credit: Cully Hamner (DC Comics) Credit: Summit Entertainment Deadlinereports that the comic book-turned-film franchise Red is in development as an hourlong TV series with NBC. The series, created in 2003 by Warren Ellis and Cully Hamner, was adapted into two hit movies in 2010 and 2013. Those two films' screenwriters, Jon Hoeber and Erich Hoeber, are also producing the NBC itteration, alongwith Lorenzo di Bonaventura and and Mark Vahradian. The Red television series will reportedly retain the core concept of the ensemble film series, but according to the Hollywood trade will be "more grounded and authentic". The Hoebers are reportedly writing the Red pilot, but no estimation is given on a release date or casting.
Rapid prototyping of Fresnel zone plates via direct Ga(+) ion beam lithography for high-resolution X-ray imaging. A significant challenge to the wide utilization of X-ray microscopy lies in the difficulty in fabricating adequate high-resolution optics. To date, electron beam lithography has been the dominant technique for the fabrication of diffractive focusing optics called Fresnel zone plates (FZP), even though this preparation method is usually very complicated and is composed of many fabrication steps. In this work, we demonstrate an alternative method that allows the direct, simple, and fast fabrication of FZPs using focused Ga(+) beam lithography practically, in a single step. This method enabled us to prepare a high-resolution FZP in less than 13 min. The performance of the FZP was evaluated in a scanning transmission soft X-ray microscope where nanostructures as small as sub-29 nm in width were clearly resolved, with an ultimate cutoff resolution of 24.25 nm, demonstrating the highest first-order resolution for any FZP fabricated by the ion beam lithography technique. This rapid and simple fabrication scheme illustrates the capabilities and the potential of direct ion beam lithography (IBL) and is expected to increase the accessibility of high-resolution optics to a wider community of researchers working on soft X-ray and extreme ultraviolet microscopy using synchrotron radiation and advanced laboratory sources.
Pages Saturday, February 7, 2009 Early this morning, when absolutely nobody was about, Sweetie got up, turned on her computer, and logged into Second Life. Why? Why indeed! To sort her inventory. Now you must understand this about Sweetie: until now she has been a— I really don't know another way to say this— inventory slob (she insists she be called an anarchist, claming her inventory dysfunction is a philosophy and not a bad habit). In her Objects folder she has thousands of objects named object. In her Lost and Found she has every item that has ever been returned to her. It’s not unusual for her to mentally disappear for long minutes while she tries to find something she uses every day, like. oh, for example, her Mystitool. The state of Sweetie’s inventory is one of the reasons I love her so much. But lately I've been worried. I fear she’s showing at least eight of the ten warning signs of inventory obsessive disorder. Inventory Obsessive Disorder is not codified in the VSM-IV of the Virtual Psychiatric Association. Why? Because at the time of its publication, IOD didn’t yet exist. The soon-to-come VSM-V will have the diagnosis, however. Before I continue with my discussion of Sweetie’s virulent case of inventory mania, I need to clue you in about the ten warning signs of IOD so you can IMMEDIATELY confront your friends about their poor inventory habits—and moreover, take an honest look at your own. Here are the things you must watch out for: 1. Sorting inventory alone. Sorting inventory should be a group activity. You and your friends should get together, have a few drinks, and go at it. If you find yourself sorting inventory by yourself, you may have a problem. 2. Making excuses for sorting your inventory. “I would love to go out with you tonight, Maximus Erectus, but I have to sort my inventory tonight.” “Sorry, Suzie1047, I can’t POSSIBLY make the big sale at ETD. I absolutely HAVE to get my landmarks in order.” If you’ve been saying things like this, you need to back away from your inventory RIGHT AWAY! 3. Daily inventory sorting needed to function. You’ve uploaded six textures and now all you can think about is stopping whatever you’re doing so you can sort them into proper categories. Listen to me: YOU HAVE A PROBLEM! 4. Inability to reduce or stop inventory sorting. You’ve started sorting and now you can’t stop, not until EVERY LAST OBJECT has been moved to its proper folder. IM me IMMEDIATELY for a referral to an inventory-specializing therapist. 5. Violence associated with your inventory. What’s that? You didn’t MEAN to bite your girlfriend’s head off when she interrupted your sorting? I wasn’t kidding about that therapist. 6. Sorting inventory in secret. When you’re secretly sorting inventory while making love to your second-life partner, think about this: You need an intervention! 7. Becoming angry when confronted about your inventory. If you find yourself in violent disagreement with a friend about whether it’s best to list inventory items by date or by name, you must face it: you have IOD. 8. Poor eating habits. Yeah, we know ever since you downloaded the SL client you’ve been subsisting on pretzels and chunks of cheddar cheese—but when you’re too busy with your inventory to put that DiGiornio pizza in the oven, you need help! 9. Failure to care for your virtual appearance. If you’re too busy with your inventory to change clothes, shop for the latest sculpted shoes, or pore over the pages at XStreetSL, you need to reach up slowly with your mouse and hit the X in the upper right hand corner of your screen. 10. Lack of obsession with inventory count. You long ago passed the dreaded 20k inventory overload mark and are just days away from reaching 40,000 items. You find your longstanding obsession with deleting duplicate objects has waned and you’re actually taking pride in the 39,653 items in your inventory. You’ve gone critical, sweetheart! At any moment now your friends are going to show up and pack you off to one of Second Life’s many fine inventory treatment facilities.
Police district 14th of Kabul to be launched next week: Ghani President Mohammad Ashraf Ghani instructed security officials to launch the district 14th of police in west of Kabul by next week. President office said Mohammad Ashraf Ghani in a meeting with security officials on Wednesday ordered security entities to launch the district 14th of police in west of Kabul by next week. The decision to launch another police station in west of Kabul came after some series attacks in Dasht-e-Barchi of Kabul, especially the one that targeted a voter registration center in Mahtab Qala district on April 22, killing at least 70 people including women and children and injuring 120 others. ISIS in a message in its Imaq website claimed responsibility for the attack. About Raha Press Raha Press was established in central office of Kabul of Afghanistan in mid 2015. Being a newly-established News Agency though, Raha Press aims at providing its addressees and viewers with accurate, professional and impartial news and analyses of the most important issues of Afghanistan and the world.
This is the first of a series of posts exploring how different ethical systems affect how people should react to wild-animal suffering. The employees of Wild-Animal Suffering Research follow a variety of different ethical systems, and WASR as a whole does not have a position on which philosophical system is right; nothing in this post should be taken as an endorsement. Introduction to Regan’s Rights-Based Approach Tom Regan, one of the most famous philosophers of animal rights, articulates a rights-based approach to animal rights in his classic The Case for Animal Rights. Although Regan’s rights-based approach is usually understood as being totally noninterventionist with regards to wild animals, in reality his viewpoint implies that we should intervene in nature to help wild animals, at least in a few limited circumstances. Regan argues that many animals– most obviously, but not limited to, mentally normal mammals over the age of one year– are subjects-of-a-life: that is, they have beliefs, desires, perceptions, memories, a sense of the future, an emotional life, preferences, the ability to take actions to support their goals, an identity over time, and an individual welfare in the sense that their life can fare well or badly for them independently of their usefulness for others or others’ opinions on the matter. As subjects-of-a-life, they have inherent worth. Regan argues that beings with inherent value have a right to be treated with respect. He outlines five principles for respecting the rights of beings with inherent value: Beings with inherent value must be treated in ways which respect their inherent value: specifically, they must not be treated as mere receptacles of valuable experiences or as if their value depended on their utility relative to others, and prima facie we must assist those treated in this way by others (the respect principle). We have a prima facie duty not to treat beings in a way that detracts from their welfare (the harm principle). Special considerations aside, when we must choose between overriding the rights of the innocent many or the innocent few, and each individual will be harmed in a prima facie comparable way, then we ought to choose to override the rights of the few, not the many (the miniride principle). Special considerations aside, when we must decide to override the right of the innocent many or the innocent few, and the harm experienced by the few would make them worse-off than any of the many would be if any other option were chosen, then we ought to override the rights of the many (the worse-off principle). Special considerations aside, if all involved are treated with respect, any innocent individual may act to avoid being made worse-off even if doing so harms other innocents (the liberty principle). He also lays out four situations in which we may override the respect and harm principles without worry: Self-defense by the innocent. Punishment of the guilty. Innocent shields (a guilty person sets up a situation where preventing them from harming others requires harming an innocent person). Innocent threats (a moral patient threatens harm, or a moral agent accidentally threatens harm, and there is no non-rights-violating way to prevent the harm). Regan’s View of Wild Animals Regan extensively addresses wild animals in the The Case For Animal Rights: in chapter nine he discusses the rights-based view’s attitude towards hunting and trapping and towards endangered species, and in the 2004 preface he discusses his opinions on wild animals more generally. “With regard to wild animals,” Regan claims, “the general policy recommended by the rights view is: let them be!” Hunting and trapping, Regan argues, are not always wrong: for example, an animal might pose an innocent threat to other beings, in which case we are justified in killing them. However, the rights view is entirely against hunting for sport or for profit. The benefit to hunters cannot outweigh the violation of the animals’ rights. Some people argue that hunting and trapping are justified from a humane perspective: if animals are not hunted or trapped, then there will be too many animals for the environment to support, and the animals will starve. Regan disagrees for three reasons: Being hunted or trapped is not necessarily a less painful death than starving. Current wildlife policy (“maximum sustainable yield”) is to try to maximize the number of animals hunted or trapped over time, not to hunt or trap the minimum number necessary to prevent starvation. By the respect principle, it is wrong to kill an innocent animal who is not a threat or a shield, even to maximize overall wellbeing. Some ways of preserving endangered species, Regan argues, are valid. Of course, if hunting and trapping are wrong in general, then hunting and trapping members of endangered species is also wrong. In addition, animals can reasonably be considered to have a right to habitat, so destroying their habitat is causing them harm. When we have harmed members of endangered species in the past, we should seek to make up for it by devoting more resources to the preservation of those species in the future. However, in the process of preserving endangered species, we must never violate the respect principle. We should not value the lives of members of endangered species over the lives of other species; we should not decide which species to preserve based on the benefit to human beings, and we should not use wild animals as tools in order to have a beautiful and stable ecosystem. Our Duties to Wild Animals Some people believe that Regan’s view of animal rights requires that we not intervene with predators, because predators have a right to life. A close reading of his arguments shows that this is not so. Regan is opposed to predator control programs as they actually exist, because these programs are intended to increase the profits of livestock farmers; it violates an animal’s rights to kill them in order to increase the profit of your business, just like you shouldn’t kill a baby or your grandma to increase the profit of your business. The fact that the business is itself unethical only strengthens the case. It is also true that, when a lion hunts a wildebeest or a buck attacks another buck, neither animal is violating the other animal’s rights. As moral patients, lions and bucks are incapable of committing rights violations. (The same is true of many other causes of wild-animal suffering– storms, fires, floods, inadequate food, diseases, parasites– which are from Regan’s point of view not even moral patients or subjects-of-a-life.) However, intuitively, if someone observed someone who was about to be eaten by a lion and refused to warn the victim because lions aren’t moral patients, we’d think they were kind of missing the point. Regan’s solution is that, in addition to duties of justice, we have duties of beneficence, that is, duties that involve doing good to others. Regan does not go into detail about what our duties of beneficence are, but it seems plausible that they could include some duties towards wild animals. Duties of beneficence are fairly limited: you should never violate a being’s rights in order to help another being That seems like it implies that we shouldn’t kill predators to protect prey, because that would be violating the predators’ rights in order to help prey. However, that is not a logical conclusion of Regan’s argument. One exception to the harm and respect principles is innocent threats, which includes moral patients which are going to harm other beings. It is permissible to harm the innocent if they are threatening other innocent beings and there is no other way to get them to stop. Absent science-fictional proposals such as genetically engineering lions to eat grass, the least invasive way to prevent lions from hurting other animals is to kill them. Regan does not buy this argument. He argues that animals have a “general competence to get on with the business of living”. If animals did not have this competence, the species would go extinct. Therefore, the best way to protect an animal’s rights is to allow them to “live their own life, by their own lights, as best they can.” He contrasts this with the other primary example of moral patients, babies. Babies are not generally competent to get on with the business of living: they have no realistic hope of surviving without intervention from adults. To put a baby in the wilderness in order to allow it to live its own life, by its own lights, as best it can would be criminally negligent. There are several problems with this argument. First, evolutionary success does not imply competence on the part of the individual animal, even if it implies competence on the part of the species. For example, if nine hundred and ninety-eight out of a thousand members of a species die within fifteen minutes of being born, while the remaining two survive and produce a thousand offspring, the species would survive even though the individual species members are not competent in the slightest. Indeed, since most babies would survive longer than fifteen minutes in the wild, the average member of this species is less competent than the average baby. Second, animals themselves have babies. While some species of animals, such as deer, are competent as soon as they’re born, that is not true for many species of animals: for example, kittens do not eliminate feces on their own without the licking of their mothers. Presumably baby animals are taken care of by their parents, but the parents could be reasonably argued not to be competent: if a human parent left her children alone and they were eaten by a wild animal, she would be charged with negligence. Further, the parents often die: if nothing else, if Regan accepts that we have a duty of assistance to orphaned human children, he must accept that we have a duty of assistance to orphaned animal children. Third, animals, just like human beings, face unusual situations they are not competent to deal with. If a human’s house was destroyed in a hurricane, we would generally assist them, even if the human was normally competent to handle their own affairs. Similarly, there is a justification for disaster relief as part of our duty of beneficence. Finally, Regan argues, even if we have a duty in an individual case– for example, a duty to save a specific wildebeest from a specific lion– we do not have a duty to wild animals more generally. We have a duty to save a child menaced by a lion, but that does not mean that advocates of children’s rights must go around killing every predatory animal lest one of them menace a child. While that is true, we would consider a society to be very negligent about children’s rights if lions were allowed to regularly wander through the streets and threaten children. Even if no individual has a responsibility to prevent lions menacing children, society as a whole does have such a duty. When there is no way for a species to eat other than to harm children, such as parasitic worms, we consider it a good thing to eradicate that species. Since there is no way for lions to eat other than to cause grave harm to other animals, it must (all things equal, setting aside practical considerations of the proper functioning of the ecosystem) be a good thing to eradicate lions. Everett’s View In Environmental Ethics, Animal Welfarism, and the Problem of Predation, Jennifer Everett complicates Regan’s view. She argues that our duties of beneficence exist when, as a matter of course, this assistance is necessary for the being to flourish according to its nature. Humans (including human babies) are social animals who are naturally part of societies; therefore, being assisted by other humans is a core part of humans flourishing in accordance with their nature. Conversely, the nature of wild animals is to be wild; as such, routinely providing assistance would not be conducive to wild animals flourishing according to their natures. However, it is not the nature of all wild animals not to interact with humans. Some animals are synanthropic: that is, they live near humans and benefit from human habitats, such as houses, gardens, and garbage dumps. These species include rodents, house sparrows, pigeons, gulls, waterfowl, and even insects such as cockroaches. In many cases, these species have evolved to fill ecological niches that only exist because humans exist, such as eating our garbage. As such, it is conducive to the flourishing of a house mouse or a pigeon to receive significant benefits from humans, which implies we have a duty of assistance to those species. Further, many animals have evolved in environments that are fundamentally shaped by human intervention. For example, many animals evolved in an environment without megafauna, because humans drove the megafauna extinct. Others evolved in environments fundamentally changed by humans, such as Scotland, which has been severely deforested for thousands of years. While these animals mostly live independently on a day-to-day basis, the conditions of their lives are set by human intervention. For this reason, a rights-based approach would imply that we have intermediate duties of assistance to those animals. It would be unethical to transform wild areas into a sort of very large open-air zoo, but we could and should fulfill our duties of beneficence in a minimally invasive way. For example, it may be ethical to eradicate predators in these areas, to set up a long-term contraception program, or to try to prevent flooding in areas where lots of animals live. In conclusion, advocates of Regan’s rights-based approach believes we should leave wild animals alone. However, a reasonable analysis suggests that our duties of beneficence to wild animals require that we help them, at least in certain limited cases, such as synanthropic species, disaster relief, or care for orphaned animals. In addition, if it is necessary to kill a predator to protect the prey, it does not violate the animal’s rights to do so.
Q: WKInterfaceSwitch switchAction(value: Bool) value is always false Apple Watch I'm currently developing an Apple Watch App. I used WKInterfaceSwitch to toggle the state of something. In my WKIntefaceController I connected the action that is called when the switch is toggled. @IBAction func switchAction(value: Bool) { NSLog("\(value)") } When I run the project in the simulator the console output obviously is: 2015-05-28 20:42:08.067 Watch Test WatchKit Extension[1503:28272] false 2015-05-28 20:42:08.896 Watch Test WatchKit Extension[1503:28272] true 2015-05-28 20:42:10.547 Watch Test WatchKit Extension[1503:28272] false 2015-05-28 20:42:11.558 Watch Test WatchKit Extension[1503:28272] true When I run the project on the physical watch the console will display this: 2015-05-28 20:44:06.044 Watch Test WatchKit Extension[345:16118] false 2015-05-28 20:44:06.954 Watch Test WatchKit Extension[345:16118] false 2015-05-28 20:44:07.318 Watch Test WatchKit Extension[345:16118] false 2015-05-28 20:44:08.343 Watch Test WatchKit Extension[345:16118] false Does anyone know why this happens. A full project that shows the issue can be downloaded here: https://bitbucket.org/rcpfuchs/watch-kit-wkinterfaceswitch-issue This seems to happen on some devices only, so if you are developing an Apple Watch app better track the state as follows: var switchValue = false // the value you chose in storyboard @IBAction func switchAction(value: Bool) { // ignore value switchValue = !switchValue // do something with switchValue } A: I have exactly the same problem! Perhaps of interest: I'm seeing this happen only on one watch, paired with an iPhone 5s. I'm not seeing the same problem with a different Watch paired with an iPhone 6. The problem also doesn't show on the Simulator. Both watches have version 1.01, and both phones have iOS 8.3 I could not find a direct fix, as it looks like some sort of bug in WatchKit. However, the work-around is pretty easy. I set a Boolean member variable, to record the initial switch state. Then, when the callback comes-in, I invert the state of the member variable, and use that rather than the value passed by WatchKit (which I now ignore!). I hope this helps! If you find any more, or happen to spot that this is fixed by Apple, do please share that information here! NB: I've filed this as a bug with Apple, as radar 21171938 Pete
Menu ☰ Etrog Jam An etrog is a very interesting fruit. You never really hear of it except for during Sukkot, and even then nobody eats it; we just shake it. It doesn’t help that they’re really expensive, and not that easy to eat. This was my first experience cutting into an etrog. It’s a citrus fruit similar to a lemon, but you can’t squeeze the juices out. I guess you can use the outside like you would lemon zest, but it would be much harder, since the surface isn’t very smooth. Jewish superstition connects etrog jelly to pregnancy and fertility. I have heard that it eases labor pains, helps a woman get pregnant, and can be eaten any time during pregnancy for health and luck. There are so many seeds in an etrog! Anyway, I remember making etrog jelly with my 2nd grade teacher, Aaliyah. Upon googling etrog recipes, this seemed to be the most popular way to use an etrog after the holiday. I read a bunch of these recipes, combined them with my knowledge from my previous jam experiments (raspberry and fig-strawberry), and came up with this: Ingredients: 1 etrog 1 cup of sugar 1 tablespoon orange marmalade To prepare for your cooking-with-etrog adventure, soak your etrog in water for a week changing the water ocassionally. After the week is up, chop the etrog, and remove the seeds. Discard the ends (and the pitom, gasp!), but keep the peel! Then grind it in a food processor. Simmer the etrog pieces in water for about 30 minutes and strain. Put the fruit back into the pot and heat on high. Stir in orange marmalade. Add the sugar, 1/3 cup at a time, mixing until it is incorporated. When all of the sugar is added, continuously stir the mixture until it boils and you can’t stir it away. Place the mixture into a jar (I used a cleaned-out applesauce jar), seal, and let sit and set in a cool, dark place. Post navigation I wish I could make jam out of the 18 or so etrogim I bought cheap, after the chag. But I’ve been reading about the extra-heavy pesticide coating they have, some of which will have penetrated into the flesh, so I refrained. Etrogim are considered a non-food crop so the farmers are permitted to spray them with high levels of pesticides. Altogether a delicate, labor-intensive crop. jess wow, i had no idea. thanks for the tip! adele I was wondering why you had an etrog swimming on your counter…. jess for jelly! (you could’ve asked) Thambu Good tips for using citron . requesting for more spice recipe. thank u sir. http://kosherdiningmaven.blogspot.com/ Nadine I might try this. I thought you needed at least a dozen to make it worthwhile. I have two (my husband’s and my son’s) still in the frig.