text stringlengths 8 5.77M |
|---|
//*****************************************************************************
//
// hw_flash.h - Macros used when accessing the flash controller.
//
// Copyright (c) 2005-2011 Texas Instruments Incorporated. All rights reserved.
// Software License Agreement
//
// Texas Instruments (TI) is supplying this software for use solely and
// exclusively on TI's microcontroller products. The software is owned by
// TI and/or its suppliers, and is protected under applicable copyright
// laws. You may not combine this software with "viral" open-source
// software in order to form a larger program.
//
// THIS SOFTWARE IS PROVIDED "AS IS" AND WITH ALL FAULTS.
// NO WARRANTIES, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, BUT
// NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
// A PARTICULAR PURPOSE APPLY TO THIS SOFTWARE. TI SHALL NOT, UNDER ANY
// CIRCUMSTANCES, BE LIABLE FOR SPECIAL, INCIDENTAL, OR CONSEQUENTIAL
// DAMAGES, FOR ANY REASON WHATSOEVER.
//
// This is part of revision 7611 of the Stellaris Firmware Development Package.
//
//*****************************************************************************
#ifndef __HW_FLASH_H__
#define __HW_FLASH_H__
//*****************************************************************************
//
// The following are defines for the FLASH register offsets.
//
//*****************************************************************************
#define FLASH_FMA 0x400FD000 // Flash Memory Address
#define FLASH_FMD 0x400FD004 // Flash Memory Data
#define FLASH_FMC 0x400FD008 // Flash Memory Control
#define FLASH_FCRIS 0x400FD00C // Flash Controller Raw Interrupt
// Status
#define FLASH_FCIM 0x400FD010 // Flash Controller Interrupt Mask
#define FLASH_FCMISC 0x400FD014 // Flash Controller Masked
// Interrupt Status and Clear
#define FLASH_FMC2 0x400FD020 // Flash Memory Control 2
#define FLASH_FWBVAL 0x400FD030 // Flash Write Buffer Valid
#define FLASH_FCTL 0x400FD0F8 // Flash Control
#define FLASH_FWBN 0x400FD100 // Flash Write Buffer n
#define FLASH_RMCTL 0x400FE0F0 // ROM Control
#define FLASH_FMPRE 0x400FE130 // Flash Memory Protection Read
// Enable
#define FLASH_FMPPE 0x400FE134 // Flash Memory Protection Program
// Enable
#define FLASH_USECRL 0x400FE140 // USec Reload
#define FLASH_USERDBG 0x400FE1D0 // User Debug
#define FLASH_BOOTCFG 0x400FE1D0 // Boot Configuration
#define FLASH_USERREG0 0x400FE1E0 // User Register 0
#define FLASH_USERREG1 0x400FE1E4 // User Register 1
#define FLASH_USERREG2 0x400FE1E8 // User Register 2
#define FLASH_USERREG3 0x400FE1EC // User Register 3
#define FLASH_FMPRE0 0x400FE200 // Flash Memory Protection Read
// Enable 0
#define FLASH_FMPRE1 0x400FE204 // Flash Memory Protection Read
// Enable 1
#define FLASH_FMPRE2 0x400FE208 // Flash Memory Protection Read
// Enable 2
#define FLASH_FMPRE3 0x400FE20C // Flash Memory Protection Read
// Enable 3
#define FLASH_FMPRE4 0x400FE210 // Flash Memory Protection Read
// Enable 4
#define FLASH_FMPRE5 0x400FE214 // Flash Memory Protection Read
// Enable 5
#define FLASH_FMPRE6 0x400FE218 // Flash Memory Protection Read
// Enable 6
#define FLASH_FMPRE7 0x400FE21C // Flash Memory Protection Read
// Enable 7
#define FLASH_FMPPE0 0x400FE400 // Flash Memory Protection Program
// Enable 0
#define FLASH_FMPPE1 0x400FE404 // Flash Memory Protection Program
// Enable 1
#define FLASH_FMPPE2 0x400FE408 // Flash Memory Protection Program
// Enable 2
#define FLASH_FMPPE3 0x400FE40C // Flash Memory Protection Program
// Enable 3
#define FLASH_FMPPE4 0x400FE410 // Flash Memory Protection Program
// Enable 4
#define FLASH_FMPPE5 0x400FE414 // Flash Memory Protection Program
// Enable 5
#define FLASH_FMPPE6 0x400FE418 // Flash Memory Protection Program
// Enable 6
#define FLASH_FMPPE7 0x400FE41C // Flash Memory Protection Program
// Enable 7
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FMA register.
//
//*****************************************************************************
#define FLASH_FMA_OFFSET_M 0x0007FFFF // Address Offset
#define FLASH_FMA_OFFSET_S 0
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FMD register.
//
//*****************************************************************************
#define FLASH_FMD_DATA_M 0xFFFFFFFF // Data Value
#define FLASH_FMD_DATA_S 0
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FMC register.
//
//*****************************************************************************
#define FLASH_FMC_WRKEY 0xA4420000 // FLASH write key
#define FLASH_FMC_COMT 0x00000008 // Commit Register Value
#define FLASH_FMC_MERASE 0x00000004 // Mass Erase Flash Memory
#define FLASH_FMC_ERASE 0x00000002 // Erase a Page of Flash Memory
#define FLASH_FMC_WRITE 0x00000001 // Write a Word into Flash Memory
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FCRIS register.
//
//*****************************************************************************
#define FLASH_FCRIS_PRIS 0x00000002 // Programming Raw Interrupt Status
#define FLASH_FCRIS_ARIS 0x00000001 // Access Raw Interrupt Status
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FCIM register.
//
//*****************************************************************************
#define FLASH_FCIM_PMASK 0x00000002 // Programming Interrupt Mask
#define FLASH_FCIM_AMASK 0x00000001 // Access Interrupt Mask
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FCMISC register.
//
//*****************************************************************************
#define FLASH_FCMISC_PMISC 0x00000002 // Programming Masked Interrupt
// Status and Clear
#define FLASH_FCMISC_AMISC 0x00000001 // Access Masked Interrupt Status
// and Clear
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FMC2 register.
//
//*****************************************************************************
#define FLASH_FMC2_WRKEY 0xA4420000 // FLASH write key
#define FLASH_FMC2_WRBUF 0x00000001 // Buffered Flash Memory Write
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FWBVAL register.
//
//*****************************************************************************
#define FLASH_FWBVAL_FWB_M 0xFFFFFFFF // Flash Memory Write Buffer
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FCTL register.
//
//*****************************************************************************
#define FLASH_FCTL_USDACK 0x00000002 // User Shut Down Acknowledge
#define FLASH_FCTL_USDREQ 0x00000001 // User Shut Down Request
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FWBN register.
//
//*****************************************************************************
#define FLASH_FWBN_DATA_M 0xFFFFFFFF // Data
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_RMCTL register.
//
//*****************************************************************************
#define FLASH_RMCTL_BA 0x00000001 // Boot Alias
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_USECRL register.
//
//*****************************************************************************
#define FLASH_USECRL_M 0x000000FF // Microsecond Reload Value
#define FLASH_USECRL_S 0
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_USERDBG register.
//
//*****************************************************************************
#define FLASH_USERDBG_NW 0x80000000 // User Debug Not Written
#define FLASH_USERDBG_DATA_M 0x7FFFFFFC // User Data
#define FLASH_USERDBG_DBG1 0x00000002 // Debug Control 1
#define FLASH_USERDBG_DBG0 0x00000001 // Debug Control 0
#define FLASH_USERDBG_DATA_S 2
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_BOOTCFG register.
//
//*****************************************************************************
#define FLASH_BOOTCFG_NW 0x80000000 // Not Written
#define FLASH_BOOTCFG_PORT_M 0x0000E000 // Boot GPIO Port
#define FLASH_BOOTCFG_PORT_A 0x00000000 // Port A
#define FLASH_BOOTCFG_PORT_B 0x00002000 // Port B
#define FLASH_BOOTCFG_PORT_C 0x00004000 // Port C
#define FLASH_BOOTCFG_PORT_D 0x00006000 // Port D
#define FLASH_BOOTCFG_PORT_E 0x00008000 // Port E
#define FLASH_BOOTCFG_PORT_F 0x0000A000 // Port F
#define FLASH_BOOTCFG_PORT_G 0x0000C000 // Port G
#define FLASH_BOOTCFG_PORT_H 0x0000E000 // Port H
#define FLASH_BOOTCFG_PIN_M 0x00001C00 // Boot GPIO Pin
#define FLASH_BOOTCFG_PIN_0 0x00000000 // Pin 0
#define FLASH_BOOTCFG_PIN_1 0x00000400 // Pin 1
#define FLASH_BOOTCFG_PIN_2 0x00000800 // Pin 2
#define FLASH_BOOTCFG_PIN_3 0x00000C00 // Pin 3
#define FLASH_BOOTCFG_PIN_4 0x00001000 // Pin 4
#define FLASH_BOOTCFG_PIN_5 0x00001400 // Pin 5
#define FLASH_BOOTCFG_PIN_6 0x00001800 // Pin 6
#define FLASH_BOOTCFG_PIN_7 0x00001C00 // Pin 7
#define FLASH_BOOTCFG_POL 0x00000200 // Boot GPIO Polarity
#define FLASH_BOOTCFG_EN 0x00000100 // Boot GPIO Enable
#define FLASH_BOOTCFG_DBG1 0x00000002 // Debug Control 1
#define FLASH_BOOTCFG_DBG0 0x00000001 // Debug Control 0
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_USERREG0 register.
//
//*****************************************************************************
#define FLASH_USERREG0_NW 0x80000000 // Not Written
#define FLASH_USERREG0_DATA_M 0x7FFFFFFF // User Data
#define FLASH_USERREG0_DATA_S 0
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_USERREG1 register.
//
//*****************************************************************************
#define FLASH_USERREG1_NW 0x80000000 // Not Written
#define FLASH_USERREG1_DATA_M 0x7FFFFFFF // User Data
#define FLASH_USERREG1_DATA_S 0
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_USERREG2 register.
//
//*****************************************************************************
#define FLASH_USERREG2_NW 0x80000000 // Not Written
#define FLASH_USERREG2_DATA_M 0x7FFFFFFF // User Data
#define FLASH_USERREG2_DATA_S 0
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_USERREG3 register.
//
//*****************************************************************************
#define FLASH_USERREG3_NW 0x80000000 // Not Written
#define FLASH_USERREG3_DATA_M 0x7FFFFFFF // User Data
#define FLASH_USERREG3_DATA_S 0
//*****************************************************************************
//
// The following are defines for the bit fields in the FLASH_FMPRE and
// FLASH_FMPPE registers.
//
//*****************************************************************************
#define FLASH_FMP_BLOCK_31 0x80000000 // Enable for block 31
#define FLASH_FMP_BLOCK_30 0x40000000 // Enable for block 30
#define FLASH_FMP_BLOCK_29 0x20000000 // Enable for block 29
#define FLASH_FMP_BLOCK_28 0x10000000 // Enable for block 28
#define FLASH_FMP_BLOCK_27 0x08000000 // Enable for block 27
#define FLASH_FMP_BLOCK_26 0x04000000 // Enable for block 26
#define FLASH_FMP_BLOCK_25 0x02000000 // Enable for block 25
#define FLASH_FMP_BLOCK_24 0x01000000 // Enable for block 24
#define FLASH_FMP_BLOCK_23 0x00800000 // Enable for block 23
#define FLASH_FMP_BLOCK_22 0x00400000 // Enable for block 22
#define FLASH_FMP_BLOCK_21 0x00200000 // Enable for block 21
#define FLASH_FMP_BLOCK_20 0x00100000 // Enable for block 20
#define FLASH_FMP_BLOCK_19 0x00080000 // Enable for block 19
#define FLASH_FMP_BLOCK_18 0x00040000 // Enable for block 18
#define FLASH_FMP_BLOCK_17 0x00020000 // Enable for block 17
#define FLASH_FMP_BLOCK_16 0x00010000 // Enable for block 16
#define FLASH_FMP_BLOCK_15 0x00008000 // Enable for block 15
#define FLASH_FMP_BLOCK_14 0x00004000 // Enable for block 14
#define FLASH_FMP_BLOCK_13 0x00002000 // Enable for block 13
#define FLASH_FMP_BLOCK_12 0x00001000 // Enable for block 12
#define FLASH_FMP_BLOCK_11 0x00000800 // Enable for block 11
#define FLASH_FMP_BLOCK_10 0x00000400 // Enable for block 10
#define FLASH_FMP_BLOCK_9 0x00000200 // Enable for block 9
#define FLASH_FMP_BLOCK_8 0x00000100 // Enable for block 8
#define FLASH_FMP_BLOCK_7 0x00000080 // Enable for block 7
#define FLASH_FMP_BLOCK_6 0x00000040 // Enable for block 6
#define FLASH_FMP_BLOCK_5 0x00000020 // Enable for block 5
#define FLASH_FMP_BLOCK_4 0x00000010 // Enable for block 4
#define FLASH_FMP_BLOCK_3 0x00000008 // Enable for block 3
#define FLASH_FMP_BLOCK_2 0x00000004 // Enable for block 2
#define FLASH_FMP_BLOCK_1 0x00000002 // Enable for block 1
#define FLASH_FMP_BLOCK_0 0x00000001 // Enable for block 0
//*****************************************************************************
//
// The following are defines for the erase size of the FLASH block that is
// erased by an erase operation, and the protect size is the size of the FLASH
// block that is protected by each protection register.
//
//*****************************************************************************
#define FLASH_PROTECT_SIZE 0x00000800
#define FLASH_ERASE_SIZE 0x00000400
//*****************************************************************************
//
// The following definitions are deprecated.
//
//*****************************************************************************
#ifndef DEPRECATED
//*****************************************************************************
//
// The following are deprecated defines for the FLASH register offsets.
//
//*****************************************************************************
#define FLASH_RMVER 0x400FE0F4 // ROM Version Register
//*****************************************************************************
//
// The following are deprecated defines for the bit fields in the FLASH_FMC
// register.
//
//*****************************************************************************
#define FLASH_FMC_WRKEY_MASK 0xFFFF0000 // FLASH write key mask
#define FLASH_FMC_WRKEY_M 0xFFFF0000 // Flash Memory Write Key
#define FLASH_FMC_WRKEY_S 16
//*****************************************************************************
//
// The following are deprecated defines for the bit fields in the FLASH_FCRIS
// register.
//
//*****************************************************************************
#define FLASH_FCRIS_PROGRAM 0x00000002 // Programming status
#define FLASH_FCRIS_ACCESS 0x00000001 // Invalid access status
//*****************************************************************************
//
// The following are deprecated defines for the bit fields in the FLASH_FCIM
// register.
//
//*****************************************************************************
#define FLASH_FCIM_PROGRAM 0x00000002 // Programming mask
#define FLASH_FCIM_ACCESS 0x00000001 // Invalid access mask
//*****************************************************************************
//
// The following are deprecated defines for the bit fields in the FLASH_FCMISC
// register.
//
//*****************************************************************************
#define FLASH_FCMISC_PROGRAM 0x00000002 // Programming status
#define FLASH_FCMISC_ACCESS 0x00000001 // Invalid access status
//*****************************************************************************
//
// The following are deprecated defines for the bit fields in the FLASH_RMVER
// register.
//
//*****************************************************************************
#define FLASH_RMVER_CONT_M 0xFF000000 // ROM Contents
#define FLASH_RMVER_CONT_LM 0x00000000 // Stellaris Boot Loader &
// DriverLib
#define FLASH_RMVER_CONT_LM_AES 0x02000000 // Stellaris Boot Loader &
// DriverLib with AES
#define FLASH_RMVER_CONT_LM_AES_SAFERTOS \
0x03000000 // Stellaris Boot Loader &
// DriverLib with AES and SAFERTOS
#define FLASH_RMVER_CONT_LM_AES2 \
0x05000000 // Stellaris Boot Loader &
// DriverLib with AES
#define FLASH_RMVER_VER_M 0x0000FF00 // ROM Version
#define FLASH_RMVER_REV_M 0x000000FF // ROM Revision
#define FLASH_RMVER_VER_S 8
#define FLASH_RMVER_REV_S 0
//*****************************************************************************
//
// The following are deprecated defines for the bit fields in the FLASH_USECRL
// register.
//
//*****************************************************************************
#define FLASH_USECRL_MASK 0x000000FF // Clock per uSec
#define FLASH_USECRL_SHIFT 0
#endif
#endif // __HW_FLASH_H__
|
There have been proposed a variety of photovoltaic elements such as solar cells and power sources for commercial and home appliances. They utilize pn junctions formed by ion implantation or thermal diffusion of impurities into a single crystal substrate of silicon (Si) or gallium arsenide (GaAs), or by epitaxial growth of an impurity-doped layer on such single crystal substrate. However, there is a disadvantage for any of these photo voltaic elements that they are still costly because of using an expensive specific single crystal substrate. Hence, they have not yet come into general use as solar cells or power sources in commercial and home appliances used by the general public. In order to solve this problem, there have been proposed a photovoltaic element in which there is utilized a pin junction formed by amorphous silicon (hereinafter referred to as "a-Si") semiconductor films laminated on an inexpensive substrate of a non-single crystal material such as glass, metal, ceramic, synthetic resin, etc. by way of a glow discharge decomposition method. This photovoltaic element does not provide a photoelectric conversion efficiency as high as that provided by the foregoing pn junction photovoltaic element in which a single crystal substrate is used. However, this photovoltaic element can be relatively easily produced and is of low production cost, and because of this, it is used as a power source in some kinds of appliances with very small power consumption such as electronic calculators and wrist watches.
In this pin junction amorphous silicon photovoltaic element, the Fermi level of the a-Si semiconductor having a good photoconductive property lies a little toward the conduction band from the center of the band gap and the electric field strength at the interface of the p-i junction is greater than that at the interface of the n-i junction. In this respect, it is advantageous to impinge light from the side of the p-type semiconductor layer in order to provide a desirable photoelectric conversion efficiency.
For the p-type semiconductor layer, it is desired to be formed of such a semiconductor film that does not absorb light and does not have defects since the light to be absorbed within the p-type semiconductor layer does not contribute to generation of photoelectric current in the case where defects acting as recombination centers are present therein. In view of this, for the semiconductor film to constitute the p-type semiconductor layer in the pin junction a-Si photovoltaic element, studies have been made on amorphous silicon carbide films (hereafter referred to as "a-SiC film") which are of wide band gap and also on microcrystal line silicon films (hereinafter referred to as ".mu.C-Si film") which are known as indirect semiconductor films having small absorption coefficients and which are considered to hardly absorb light when they are of 100 to 200 .ANG. in thickness even in the case where they are of narrow band gap. As for the a-SiC semiconductor film, there is an advantage that its band gap can be widened by increasing the composition ratio of the constituent carbon atoms. However, there is a disadvantage that when its band gap is more than 2.1 eV, its film quality is markedly worsened. Therefore, there is a limit for the a-SiC semiconductor film to be used as the p-type semiconductor layer in a pin heterojunction photovoltaic element.
As for the uC-Si semiconductor film, there is still a disadvantage that its band gap is narrow in any case and the quantity of light absorbed thereby is remarkable. Particularly, when the incident light is such that it contains short-wavelength light in a large proportion, the quantity of light absorbed becomes great.
In view of this, in order to provide a desirable pin heterojunction photovoltaic element of the type wherein light is impinged from the side of the p-type semiconductor layer, it necessitates the use of a p-type semiconductor film having a desirably wide band gap and a minimized defect density as the p-type semiconductor layer.
The same situation is present also in the case of a pin heterojunction photovoltaic element of the type wherein light is impinged from the side of the n-type semiconductor layer. That is, the n-type semiconductor layer is required to be constituted by such an n-type semiconductor film having a desirably wide band gap and a minimized defect density.
Further, in the case of a so-called tandem stacked type photovoltaic element or a triple cell tandem stacked type photovoltaic element comprising a plurality of stacked cells being stacked, each cell of which comprises a pin heterojunction photovoltaic element in which the residual components of light which are left not absorbed by the upper cell are absorbed by the lower cell to obtain a sufficient photoelectric conversion, both the p-type semiconductor layer and the n-type semiconductor layer of each of the cells are required to have a desirably wide band gap and a minimized defect density.
Further, for any of the foregoing photovoltaic elements, it is required for the material to constitute the p-type or n-type semiconductor layer to be such that it can be directly deposited on a non-single crystal substrate of glass, metal, ceramic or synthetic resin in a desired state and does not give any negative effect to the i-type semiconductor layer laminated thereon.
As semiconductor films capable of providing a wide band which satisfy the foregoing requirements, BP semiconductor films have been proposed by Japanese Patent Laid-open No. 116673/1981 (called "literature 1" hereinafter), Japanese Patent Laid-open No. 189629/1986 (called "literature 2" hereinafter) and Japanese Patent Laid-open No. 189630/1986 (called "literature 3" hereinafter).
That is, literature 1 mentions a pin heterojunction solar cell in which either the p-type or n-type semiconductor layer is comprised of a p-type or n-type amorphous BP semiconductor film (that is, a-BP semiconductor film) prepared by the glow discharge decomposition method and the i-type semiconductor layer is comprised of a a-Si semiconductor film containing fluorine atoms (F). Literature 1 does not mention anything about a crystalline BP semiconductor film (that is, poly-BP semiconductor film) which is to be distinguished from said a-BP semiconductor film. In addition, literature 1 does not describe anything about the characteristics required for a solar cell for the said pin heterojunction photovoltaic element. Literatures 2 and 3 are concerned with methods of forming semiconductor films containing group III-V elements of the Periodic Table by way of the HR-CVD method (Hydrogen Radical Assisted CVD method). But none of literatures 3 and 4 mentions anything about BP semiconductor films.
Further, none of literatures 1 to 3 mentions a tandem type photovoltaic element or a triple cell tandem stacked type photovoltaic element.
Against this background, there is an increased social demand to provide an inexpensive photovoltaic element which exhibits a high photoelectric conversion efficiency particularly for short wavelength light and which is practically usable as a solar cell and also as a power source in various appliances. |
/*
* ContentItemTest.java
* JUnit based test
*
* Created on February 2, 2005, 2:50 PM
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package com.rometools.modules.content;
import junit.framework.TestCase;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import com.rometools.modules.content.ContentItem;
/**
* This is all standard property storage testing.
*/
public class ContentItemTest extends TestCase {
private static final Logger LOG = LoggerFactory.getLogger(ContentItemTest.class);
private final ContentItem item = new ContentItem();
public ContentItemTest(final String testName) {
super(testName);
}
@Override
protected void setUp() throws java.lang.Exception {
}
@Override
protected void tearDown() throws java.lang.Exception {
}
public static junit.framework.Test suite() {
final junit.framework.TestSuite suite = new junit.framework.TestSuite(ContentItemTest.class);
return suite;
}
/**
* Test of ContentFormat method, of class com.totsp.xml.syndication.content.ContentItem.
*/
public void testContentFormat() {
LOG.debug("testContentFormat");
final String test = "application/xhtml";
item.setContentFormat(test);
assertTrue(item.getContentFormat().equals(test));
}
/**
* Test of ContentEncoding method, of class com.totsp.xml.syndication.content.ContentItem.
*/
public void testContentEncoding() {
LOG.debug("testContentEncoding");
final String test = "http://www.w3.org/TR/REC-xml#dt-wellformed";
item.setContentFormat(test);
assertTrue(item.getContentFormat().equals(test));
}
/**
* Test of ContentValue method, of class com.totsp.xml.syndication.content.ContentItem.
*/
public void testContentValue() {
LOG.debug("testContentValue");
final String test = "<em>This is<strong>very</em> cool</strong>.";
item.setContentFormat(test);
assertTrue(item.getContentFormat().equals(test));
}
/**
* Test of ContentAbout method, of class com.totsp.xml.syndication.content.ContentItem.
*/
public void testContentAbout() {
LOG.debug("testContentAbout");
final String test = "http://example.org/item/content.svg";
item.setContentFormat(test);
assertTrue(item.getContentFormat().equals(test));
}
/**
* Test of ContentValueParseType method, of class com.totsp.xml.syndication.content.ContentItem.
*/
public void testContentValueParseType() {
LOG.debug("testContentValueParseType");
final String test = "Literal";
item.setContentFormat(test);
assertTrue(item.getContentFormat().equals(test));
}
/**
* Test of ContentValueNamespace method, of class com.totsp.xml.syndication.content.ContentItem.
*/
public void testContentValueNamespace() {
LOG.debug("testContentValueNamespace");
final String test = "http://www.w3.org/1999/xhtml";
item.setContentFormat(test);
assertTrue(item.getContentFormat().equals(test));
}
/**
* Test of ContentResource method, of class com.totsp.xml.syndication.content.ContentItem.
*/
public void testContentResource() {
LOG.debug("testContentResource");
final String test = "http://www.w3.org/2000/svg";
item.setContentResource(test);
assertTrue(item.getContentResource().equals(test));
}
/**
* this is a stupid test.
*
* @todo make better Test of ContentResource method, of class
* com.totsp.xml.syndication.content.ContentItem.
*/
public void testEquals() {
LOG.debug("testEquals");
final String test = "http://www.w3.org/2000/svg";
assertTrue(test.equals(test));
final ContentItem test2 = ContentModuleImplTest.contentItems.get(0);
assertTrue(!test.equals(test2));
final ContentItem test3 = new ContentItem();
test3.setContentFormat(new String("http://www.w3.org/1999/xhtml"));
test3.setContentEncoding(new String("http://www.w3.org/TR/REC-xml#dt-wellformed"));
test3.setContentEncoding(new String("Literal"));
// test3.setContentValueNamespace(new String("http://www.w3.org/1999/xhtml"));
test3.setContentValue(new String("<em>This is <strong>very</strong></em> <strong>cool</strong>."));
// assertEquals( test2, test3 );
}
}
|
Eboost Pink Lemonade Energy Powder
Why You’ll Love It
Eboost Pink Lemonade Energy Powder has only 5 calories, zero sugar, and a whole lot of refreshing flavor. One delicious serving is all it takes to support your natural energy, a brighter mind, and a healthy metabolism.* Made from a carefully crafted blend of premium ingredients including green coffee bean and green tea leaf, essential vitamins and minerals, electrolytes, super-antioxidants, and more. This non-GMO, gluten-free powder contains no artificial flavors, colors or sweeteners.
SKU: 094922112774
About This Brand
Eboost
If you’re looking to fuel your on-the-go lifestyle, EBOOST has you covered. EBOOST offers a variety of energy powders, pre and post-workout supplements, greens powders, and probiotics to power your workday, workout, and overall wellbeing.
Clean fuel, it’s true, is hard to find. The fact is, many companies stuff their products with additives, artificial ingredients, and sugar. These high sugar powders and drinks don’t provide long lasting energy -- just a quick boost before an inevitable crash.
EBOOST products, on the other hand, are low
We offer this item for less than the manufacturer's minimum advertised price. To see the best price — and unlock exclusive member savings on 6,000+ wholesome products — just register.
Disclaimer: Information, statements, and reviews regarding products have not been evaluated by the Food and Drug Administration. Results vary person to person, and there is no guarantee of specific results. Thrive Market assumes no liability for inaccuracies or misstatements about products.
19 Members have left reviews!
Product Overview
3.6
Great product
Glad to see Thrive carry this at their consistently competitive prices.
Helpful review?
Love this stuff!
Posted 12 days ago by Liz from West Chester, Pennsylvania
Verified Purchase
Personally I prefer the orange flavor as this was a bit too sweet but I love this stuff!
Helpful review?
Awesome
Posted 13 days ago by Elizabeth from ARLINGTON, Virginia
Verified Purchase
Love this as a preworkout or pick me up. Good taste and not packed with fillers and artificial stuff
Helpful review?
Yum
Posted 17 days ago by Laura from FRANKLIN, Tennessee
Verified Purchase
Really like this power up energy powder...great energy and great taste
Helpful review?
Better than spark and no crap ingredients
Posted 23 days ago by Raemie from Winder, Georgia
Verified Purchase
Worth the money.. works better than a gas station energy drink.. and the ingredients are clean! Can’t get much better
Helpful review?
Disgusting
Posted a month ago by Michelle from WINCHESTER, Tennessee
Verified Purchase
If you want to know what’s it’s like to throw a twenty in the garbage just buy this! It’s the worst tasting drink I’ve ever had! Doesn’t even remotely taste like pink lemonade, it’s undrinkable! Very disappointed since this was my first order at Thrive!
Helpful review?
Awful!
Posted a month ago by Anonymous from Marina del Rey, California
This is NASTY! I usually drink Spark pink lemonade and was going to try this for a change. Literally was nauseous the rest of the day. Throwing the rest of the box away!
Helpful review?
Works, but not great tasting
Posted 5 months ago by Mikiko from AUSTIN, Texas
Verified Purchase
This actually does what it says, gives a clean, non-jittery boost of energy. However, it does not taste good AT ALL. It took me months just to get through a box because I couldn't stand the taste. It does work very well, so I will definitely try another flavor this time around!
Helpful review?
A Little Too Sweet
Posted 8 months ago by Kalina from Seattle, Washington
I like the initial taste a lot, but the aftertaste is too sweet. Definitely has that fake sweetener flavor. With ice and a lot of water to dilute the flavor it's refreshing enough.
Helpful review?
Disgusting taste
Posted 8 months ago by Beverly from MISSION VIEJO, California
Never again, it is not even close to a lemonade taste and it actually has an aftertaste, it's so awful I wish could return it! But it's now in the trash. It's like a vitamin c drink that went bad or something, I could not get far enough to see it's energy effects. Take my word on this, I'm a good reviewer mostly, but this has got to go.... off the shelf's! Ugh |
Two dire predictions heading into 2012
December 17th, 2012
Two dire predictions heading into 2012— a Greek exit from the eurozone and a collapse of the euro currency—have been avoided. Last week, European Union (EU) leaders gave Greece about $65 billion in long-delayed bailout funds, which should ease that country’s liquidity crisis. Perhaps more importantly, after four months of intense negotiation, EU finance ministers reached an agreement to create a single banking regulator to oversee the largest and riskiest banks in the 17-country currency bloc. The new regulator will be tasked with creating a resolution fund to clean up troubled banks. It will also establish a deposit fund (like the FDIC) to prevent bank runs. While markets barely moved on the news, we view this as major progress towards resolving the EU’s three-year-old debt crisis. Had this single entity been created prior to 2009, the crippling debt crisis might have been avoided. This paves the way towards severing the debilitating link between troubled banks and struggling governments, which has devastated confidence in the common currency.
However, the eurozone is not out of the woods yet. The common regulator won’t be in place until March 2014 at the earliest, and there are pending issues that need to be ironed out—not an easy task given the continent’s complex multilateral politics. For instance, it’s unclear how much it will cost to set up the resolution fund and who will be on the hook for the tab. Germany, for example, is opposed to paying for failed banks in Spain. Furthermore, the political landscape may look different in 2013. Italy’s Silvio Berlusconi has returned and announced he will run for the Italian premiership, potentially reversing the country’s austerity measures implemented by Mario Monti. And it’s hard to see that anything meaningful will happen before the German election, which is scheduled for September. Putting numbers around the resolution fund and deposit funds (they will be big) won’t sit well with German voters. Nonetheless, we view establishment of a common regulator as an important step towards stimulating cross-border lending, and boosting trust and confidence across the eurozone. That would go a long way towards helping improve US exports to the bloc, which have been sluggish for the past few years.
*The information contained in this email was derived from sources believed to be reliable, but completeness and accuracy are not guaranteed. The opinions expressed constitute our judgment as of the date of this email, but are subject to change without notice. Past performance may not be indicative of future results. This information is not intended as an offer or solicitation for any financial instrument. The opinions expressed do not take into account individual client circumstances, objectives, or needs and are not intended to be investment recommendations or strategies. |
certifi>=2019.3.9
Flask==1.1.2
Flask-SQLAlchemy==2.4.1
Flask-Mail==0.9.1
Flask-Migrate==2.5.3
Flask-WTF==0.14.3
git+https://github.com/foozmeat/python-instagram.git#egg=instagram
Mastodon.py==1.5.1
pandas
psutil
pygal==2.4.0
python-twitter==3.5
PyMySQL==0.9.3
pip-check
sentry-sdk[flask]
authlib==0.13
cairosvg
Werkzeug==0.16.1
pip-tools
wheel
|
The present invention relates to automatic sprayers for spraying cosmetic, medical or coating liquid.
Conventionally, there have been known, for example, manually operated sprayers to be used in ironing, or automatic ones fitted with a prime mover to be used for spraying upon plants. In addition to the above, for the cosmetic treatment or coating purpose there have been also used sprayers of the type which are operated by pressure of liquefied gas sealingly contained together with spray liquid in a container. However, in many countries, restrictions are being imposed on the use of such sprayers in view of various troubles caused by gases used therein, and accordingly, the use of such typed sprayers may not be permitted in the future.
The above-mentioned conventional manually-operated sprayers are constructed in such a way that a nozzle body is lowered by pressing action of the thumb, so as to cause the liquid to be sprayed, and after the nozzle body has been returned to the original position from the lowermost depressed position by force of a spring, such pressing may be repeated.
Such sprayers have certainly advantages, for example, spraying may be carried out by moving the nozzle body upward and downward, thereby to permit liquid to be dispersed in a certain vertical range. However, operators will get very tired if trying to keep spraying continued, in that sprayers are manually operated and spring return action is utilized.
On the contrary, automatic sprayers may enable continuous spraying at ease. However, such automatic sprayers have also defects; that is, in conventional automatic sprayers, a nozzle body is normally fixed to a spray body in a unitary construction, and spraying is not carried out in the pressing system of the manually operated type in which air is compressed by using a plunger, thereby to requiring an operator to direct the nozzle toward an object. Furthermore, such conventional automatic sprayers may produce spray of relatively larger particles than those obtained by manually operated sprayers of the type in which air is compressed by using a plunger.
Accordingly, in spraying, for example, medical liquid with such sprayers, sterilizing effect may be reduced, thereby to necessitate manual scattering. On the other hand, in spraying coating material with such sprayers, efficient, thinnest and uniform coating may not be expected. |
NEW YORK -- Major League Baseball is opening October by blasting the game's so-called "unwritten rules."
MLB released an advertisement ahead of Tuesday's postseason opener denouncing the anti-bat flip attitudes of many baseball traditionalists.
"Don't stop and stare. Don't flip your bat. Respect the jersey," says a narrator at the start. Meanwhile, the commercial shows Giancarlo Stanton admiring a lengthy home run, Carlos Correa tossing his bat, Mookie Betts flexing and Yasiel Puig wagging his tongue after a daring headfirst slide.
It also includes Atlanta rookie Ronald Acuna Jr. celebrating a home run against the Marlins. Acuna was plunked by Miami's Jose Urena during his impressive five-game homer streak this season, an incident that put baseball's unwritten rules back under the microscope.
After Acuna, the ad cuts to Hall of Famer Ken Griffey Jr. sporting a backward baseball cap, just like he did as the fresh face of baseball in the early 1990s.
"No more talk," Griffey says. "Let the kids play."
The commercial features soundbites from a few broadcasters criticizing players, including one from longtime Turner Sports analyst Joe Simpson. The Braves announcer came under fire a few times this season, including when he labeled Dodgers veteran Chase Utley "unprofessional" for wearing a "K Cancer" T-shirt during batting practice. Simpson was left off TBS's postseason lineup for this fall, a decision that was made last offseason.
Proponents of baseball's unspoken code of conduct have gone hard after certain players for their postseason antics. Puig is a regular target because of his energetic shenanigans, and slugger Jose Bautista was rebuked for staring down his go-ahead homer in Game 5 of the 2015 AL Division Series.
The game's conservative crowd has gotten increasing pushback from younger players and fans, especially as MLB struggles to target younger viewers. Bryce Harper campaigned in 2016 to "Make Baseball Fun Again," while some perceive the old-timers to be unfairly forcing Latin players to conform to American cultural standards. |
Pakistan have, in recent years, struggled to make a consistent impact in international cricket. While their bowlers have almost always delivered, it is the batting that has let the team down. Despite boasting of the requisite skill and talent, Pakistani batsmen somehow fail to deliver the goods when it matters most. Two batsmen in particular - Umar Akmal and Ahmed Shehzad - have been severely criticised by the fans for not converting their potential into performance. The two have often been compared to Virat Kohli especially since they started their careers together.
While Kohli has taken his game to the next level, Akmal and Shehzad continue to struggle. Akmal has now hit out at those who compare his record with that of the Indian captain. According to the Pakistani right-hander, comparisons with Kohli are unfair because the Indian skipper bats at the number three position.
"When people compare me with Kohli, it's not fair. It's a matter of batting positions. Since his debut, he is batting at No. 3 and I have been playing at No. 6. Let me play at 3 and Kohli at 6, then compare me with him," Akmal told Wisden India.
The 26-year-old said comparing Kohli and Babar Azam would make a lot more sense as they bat at similar positions.
"Compare him with Babar Azam, who is doing well at 3. He is in great form, so you can compare him with Babar," Akmal added.
Promoted
Akmal has registered just two centuries in 116 in ODIs, while Kohli has cracked 27 hundreds in 179 matches. The Delhi batsman has a superior record in T20Is as well.
Kohli has showcased his brilliance at the Test level too, while Akmal is not part of Pakistan's side in whites. |
Cenotes
Sea Diving
Sea Diving
PADI Courses
PADI Courses
Cavern Snorkeling
Cavern Snorkeling
Diving Expeditions in Mexico
Peaceful diving in paradise
The scenery: Mexico…Tulum, the worldwide famous Mayan city known for the pyramids that tower over the turquoise Caribbean sea, the idealistic white sand beaches, the cenotes(natural water holes) and the natural reserve classed with UNESCO as World Heritage.
We will take you in small groups( 4 divers maximum) to discover cenotes and the Mesoamerican Coral Reef of the Caribbean. Thanks to our personal and family style services, we can take care of all your needs and provide particular attention to each and every diver.
Relax and enjoy the fresh water cenotes and Caribbean sea
For the beginners, your bilingual French-English instructor, CMAS and PADI trained, will take you on your Discover Scuba Diving in the sea or in an open cenote.You also have the option to take the Open Water PADI exam(recognized worldwide equivalence of the level 1 CMAS, FFESSM. SSI. NAUI).
Certified divers can discovery the Mesoamerican Coral Reef or be initiated into cave diving in cenotes in Tulum and the Mayan Riviera. For close to ten years, our specialists will take you on expeditions to explore rare cenotes not visited with sometimes difficult access and always the most exceptional.
Our packages are perfect for every member of your family or group. You can begin diving with flippers, masks and snorkels in beautiful turquoise water on the Coral Reef . Swim among multicolored, tropical fish in Tulum or explore by zigzagging through stalagtites and stalagmites in the cenotes.
Fun and security guaranteed
We provide all the material and necessary equipment, respecting rigourously all safety standards and your comfort..Wetsuits(5 mm) are provided for the cenotes(water temperature: 75 f/24 c) as well as lights, stabs, double detenders, etc. Only the finest material and extremely well taken care maintenance, is provided.
We can take care of everything!
If you would like to reserve an All Inclusive Package, with lodging, airport transfers, diving expeditions and tours, we have excellent options! We can help you plan your vacation so you can just arrive in paradise and be guided the whole time! |
956 F.2d 274
NOTICE: Ninth Circuit Rule 36-3 provides that dispositions other than opinions or orders designated for publication are not precedential and should not be cited except when relevant under the doctrines of law of the case, res judicata, or collateral estoppel.Daniel LOPEZ, Petitioner-Appellant,v.Sam LEWIS, Respondent-Appellee.
No. 91-15145.
United States Court of Appeals, Ninth Circuit.
Submitted Feb. 26, 1992.*Decided March 2, 1992.
Before WILLIAM B. CANBY, NORRIS and LEAVY, Circuit Judges.
1
MEMORANDUM**
2
Daniel Lopez, an Arizona state prisoner, appeals pro se the district court's denial of his 28 U.S.C. § 2254 habeas corpus petition. We review de novo, Norris v. Risley, 878 F.2d 1178, 1180 (9th Cir.1989), and we affirm.
3
Lopez first contends that insufficient evidence supports his conviction. Viewing the evidence in the light most favorable to the prosecution, we hold that there is sufficient evidence from which a rational jury could find Lopez guilty of the offense. See Jackson v. Virginia, 443 U.S. 307, 319 (1979).
4
Lopez next contends that he was denied a fair trial because the trial court refused to allow testimony regarding the victim's psychiatric history, denied him discovery regarding the victim's prior claims of rape by other persons, and admitted evidence regarding Lopez's use of an alias. Miller is not entitled to federal habeas corpus relief on these alleged state evidentiary errors because he has not shown that the alleged errors were arbitrary or so prejudicial that they rendered the trial fundamentally unfair. See Jammal v. Van De Kamp, 926 F.2d 918, 919-20 (9th Cir.1991).
5
Lopez next contends that he was denied a fair trial because the trial court refused defense instructions regarding intoxication and specific intent. Lopez's attorney withdrew the intoxication instruction, however, and the trial court instructed the jury on the element of intent necessary to convict Lopez of attempted sexual assault. The alleged error did not "so infect[ ] the entire trial that the resulting conviction violates due process," and accordingly, Lopez is not entitled to federal habeas corpus relief on this claim. Henderson v. Kibbe, 431 U.S. 145, 154 (1977) (quotation omitted); see Prentil v. California, 843 F.2d 314, 317 (9th Cir.), cert. denied, 488 U.S. 861 (1988).
6
AFFIRMED.
*
The panel unanimously finds this case suitable for decision without oral argument. Fed.R.App.P. 34(a); 9th Cir.R. 34-4
**
This disposition is not appropriate for publication and may not be cited to or by the courts of this circuit except as provided by 9th Cir.R. 36-3
|
/*!
*
* This program is free software; you can redistribute it and/or modify it under the
* terms of the GNU Lesser General Public License, version 2.1 as published by the Free Software
* Foundation.
*
* You should have received a copy of the GNU Lesser General Public License along with this
* program; if not, you can obtain a copy at http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html
* or from the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
* without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
* See the GNU Lesser General Public License for more details.
*
*
* Copyright (c) 2002-2018 Hitachi Vantara. All rights reserved.
*
*/
package org.pentaho.mantle.client.events;
import com.google.gwt.event.shared.EventHandler;
public interface PerspectivesLoadedEventHandler extends EventHandler {
void onPerspectivesLoaded( PerspectivesLoadedEvent event );
}
|
Currently, a fingerprint recognition function is more popular in a handheld electronic device such as a mobile phone or a tablet computer. With a fingerprint recognition module mounted on an electronic device, the electronic device can recognize a user's fingerprint, thereby improving security of the electronic device. However, because existing handheld electronic devices favor light and thin designs, a waterproof design for the fingerprint recognition module becomes a difficulty. As shown in FIG. 1, in the prior art, a groove (6) is opened on a housing of an electronic device, a fingerprint recognition module (5) is placed in the groove (6), and the groove (6) is stuffed with a waterproof adhesive layer, so that the entire fingerprint module of the electronic device is protected and isolated from other components of the electronic device. However, in this design solution, a structure of a mobile phone needs to be changed. If a size of the fingerprint module changes, the structure of the mobile phone needs to be designed again. Consequently, compatibility with mass production is lacking, a machining process is complex, adhesive needs to be dispensed on a plurality of positions, space for the fingerprint module is enlarged, and the mobile phone cannot be thin or light. |
395 A.2d 399 (1978)
Jocelyn E. MASON, Appellant,
v.
DISTRICT OF COLUMBIA et al., Appellees.
No. 13181.
District of Columbia Court of Appeals.
Argued September 27, 1978.
Decided November 28, 1978.
*400 Robert H. Levan, Columbia, Md., for appellant.
Margaret L. Hines, Asst. Corp. Counsel, Washington, D. C., with whom Louis P. Robbins, Acting Corp. Counsel, and Richard W. Barton, Deputy Corp. Counsel, Washington, D. C., were on the brief, for appellees.
Before KERN, GALLAGHER and MACK, Associate Judges.
KERN, Associate Judge:
This is an appeal from an order of the trial court granting the motion of appellee District of Columbia to dismiss the complaint filed by appellant. Appellant, an employee of the District of Columbia, sued the District, its Chief of Police, and Dennis M. West, a District of Columbia police officer, for assault and battery, false arrest and false imprisonment based on an incident involving Officer West in the vicinity of the Hine Recreation Center on July 16, 1976. The District of Columbia moved for dismissal on the ground that appellant, as a District employee, should have proceeded under the Federal Employees Compensation Act, 5 U.S.C. § 8101 et seq. (1970) (hereinafter FECA), since that was her exclusive remedy at law for the damages she suffered. Since appellant failed to exhaust her administrative remedies under FECA, appellees argued that the court lacked subject matter jurisdiction over her action. The trial court agreed and granted the motion *401 to dismiss, attaching to its order a Super.Ct.Civ.R. 54(b) certification.[1]
According to appellant, she was on duty at Hine Recreation Center on July 16, 1976, when she decided to leave her place of employment and cross the street to mail a letter. During her walk, appellant claims that she heard Officer West speak abusively and discourteously to a child whom appellant knew frequented the playground. Appellant approached the officer and requested that he state his name and badge number so that she could report his misconduct to his superior. Appellant alleges that Officer West refused and proceeded to accost her and arrest her without cause. He then handcuffed her and transported her to the police station where she was searched, held in an interrogation room and locked in a cell until she posted bond. The District of Columbia ultimately dropped its criminal charge against appellant.
There is only one issue presented to us on appeal, to wit, whether the trial court erred in granting the motion to dismiss the complaint on the ground that appellant failed to obtain a determination from the Secretary of Labor as to the coverage of her case by FECA. Appellant argues that she was not required even to request that determination because FECA did not apply for two reasons. First, she claims the term "injury" as used in FECA does not contemplate the mental suffering and anguish she alleged as her sole injury in this case; she also points out that she could not possibly recover under FECA because her injury did not result in any disability, total or partial. Secondly, appellant contends that the incident giving rise to her suit was not within the scope of her employment as is required by FECA. Since FECA did not apply, appellant maintains, there was no substantial question regarding her coverage by FECA for the Secretary of Labor to resolve and hence a petition to the Secretary was unnecessary.
I
Federal Employees Compensation Act
Before addressing ourselves to the merits of these assertions, we first review the terms of FECA, its purpose and the scheme for its implementation so as to understand the statutory context in which appellant's claim arose. The Federal Employees Compensation Act, 5 U.S.C. § 8101 et seq. (1970), establishes under the Secretary of Labor a program of workmen's compensation for government employees injured in work-related accidents. Reep v. United States, 557 F.2d 204, 207 (9th Cir. 1977). FECA provides that
[t]he United States shall pay compensation as specified by this subchapter for the disability or death of an employee resulting from personal injury sustained while in the performance of his duty. . . . [5 U.S.C. § 8102(a).][2]
Generally speaking, workmen's compensation statutes are intended to provide injured workers with a quicker and more certain recovery than could be obtained from tort suits based on common law theories. United States v. Demko, 385 U.S. 149, 151, 87 S.Ct. 382, 17 L.Ed.2d 258 (1966); Reep v. United States, supra at 207.[3]
*402 FECA also provides that:
[T]he liability of the United States or an instrumentality thereof under this subchapter or any extension thereof with respect to the injury or death of an employee is exclusive and instead of all other liability of the United States or the instrumentality to the employee. [5 U.S.C. § 8116(c) (1970).]
This exclusivity provision was enacted in 1949 to avoid multiple recoveries by injured employees and excessive costs to the United States due to the passage of several acts such as the Federal Tort Claims Act waiving sovereign immunity of the United States in certain damage actions. Reep v. United States, supra at 207; Galimi v. United States, 514 F.2d 949, 952-53 (2d Cir. 1975). Thus, an employee who, in the scope of employment, suffers an injury resulting in death or disability is limited to the remedies under FECA.
For consistency of interpretation and policy in the implementation of FECA, the Secretary of Labor "administer[s], and decide[s] all questions arising under" FECA and his determinations are final and non-reviewable. 5 U.S.C. §§ 8145 and 8128(b) (1970); Reep v. United States, supra at 207; Bailey v. United States, Through Department of Army, 451 F.2d 963, 965 (5th Cir. 1971); Daniels-Lumley v. United States, 113 U.S.App.D.C. 162, 163, 306 F.2d 769, 770 (1962); Somma v. United States, 283 F.2d 149, 151 (3d Cir. 1960).
Because FECA is an exclusive remedy when it is applicable, an injured federal employee or, as in this case, an employee of the District of Columbia government may not bring a non-FECA action against the respective sovereign if there is a substantial question that his injuries are covered by FECA. Before an action in court may be brought, the employee must first seek and be denied relief by the Secretary of Labor. Reep v. United States, supra; Bailey v. United States, Through Department of Army, supra. If, however, there is no substantial question as to FECA coverage, the injured employee may commence his action in court without proceeding first to the Secretary. Reep v. United States, supra; Joyce v. United States, 474 F.2d 215, 219 (3d Cir. 1973); Bailey v. United States, Through Department of Army, supra; Walker v. United States, 322 F.Supp. 769, 771 (D.Alaska 1971). In the instant case, therefore, appellant was only justified in proceeding directly to the trial court if there was no substantial question regarding the applicability of FECA and so we now direct our attention to that issue.
II
Application of FECA to Claim of Appellant
Appellant argues that the trial court erred in dismissing her suit against appellees because of her failure to obtain a determination as to her coverage by FECA from the Secretary of Labor. She contends that in several respects her case clearly falls outside the purview of FECA so that there exists no substantial question of FECA coverage for the Secretary to address. For that reason, she argues, it was proper to bring her action against appellees without initially obtaining a ruling from the Secretary that FECA did not cover her case. Reep v. United States, supra.
We first address appellant's contention that FECA is inapplicable because the kind of injury for which she seeks redress is not contemplated by FECA. Her claim of damages in her complaint is based on the "mental suffering," "humiliation" and "embarrassment" caused by the officer's alleged unlawful arrest and false imprisonment of her. Appellant maintains that damages of this character, as a matter of law, are not "injuries" as used in FECA.[4]
*403 On the question of whether the FECA covers mere mental distress, the statute itself provides little guidance. See 5 U.S.C. § 8101(5) (Supp. IV 1974) (amending 5 U.S.C. § 8101 (1970)). Nor is the legislative history of the Act instructive. Our survey of the cases arising under FECA has revealed only one federal case which has addressed this question of interpretation Sullivan v. United States, 428 F.Supp. 79 (E.D.Wis.1977). In Sullivan, the plaintiff sued the United States and the American Postal Workers Union under 28 U.S.C. § 1346 (1970) for damages resulting from various acts of harassment and discrimination engaged in by defendants which caused him to lose his job as well as suffer other unstated hardship. The United States moved to dismiss the action against it for lack of subject matter jurisdiction. It contended that FECA was plaintiff's only remedy for those types of work-related injuries to federal employees. The court granted the motion to dismiss but expressly rejected that particular construction of the statute. The court stated:
I believe the position of the United States is incorrect. The type of injuries covered in 5 U.S.C. § 8101(5) includes injury by accident and disease; it does not appear to include such claims as are presented here for discrimination, mental distress, or loss of employment. The argument advanced by the defendant United States therefore does not entitle it to dismissal of this action. [428 F.Supp. at 81.]
Sullivan, in our view, is persuasive that the "humiliation" and "embarrassment" claimed by appellant to have caused "mental suffering" in the instant case would not be within the ambit of FECA and hence she could not recover these damages under FECA. Accordingly, there is no substantial question to be resolved on the coverage of FECA in the instant case since FECA is plainly inapplicable here.
Appellee cites three cases involving state workmen's compensation statutes where the basis of the claim was a nonphysical injury. These decisions are inapposite. Aside from the fact that they are state cases dealing with state statutes somewhat different from FECA, they involve injuries which although nonphysical like the appellant's differ markedly from hers in degree. In each case cited, the claimant suffered psychological conditions so severe as to partially or totally disable the claimant from performing his job. Pathfinder Company v. Industrial Commission, 62 Ill.2d 556, 343 N.E.2d 913 (1976) (severe emotional shock caused a nervous condition and headaches as well as a temporary total disability); Simon v. R.H.H. Steel Laundry, Inc., 25 N.J.Super. 50, 95 A.2d 446 (Hudson County Ct.1953) (viewing explosion of steampipe caused severe nervous condition resulting in 65% disability); Kalikoff v. John Lucas & Co., 271 App.Div. 942, 67 N.Y.S.2d 153 (1947) (cat bite caused psycho-neurosis and disability).[5]
There is another reason why the statute cannot apply here. FECA expressly provides compensation to federal and District of Columbia employees injured in the scope of their employment only when "disability or death" has resulted from their injuries. *404 5 U.S.C. § 8102(a) (1970). The complaint of appellant does not allege any disability, total or partial, nor does it allege anything from which a disability on her part might be inferred. From this we must assume that appellant does not assert that her injury is disabling and also conclude for that reason that FECA on its face does not apply to appellant's complaint.
Reversed.[6]
NOTES
[1] Super.Ct.Civ.R. 54(b) states in pertinent part:
When more than one claim for relief is presented in an action, whether as a claim, counterclaim, cross-claim or third party claim, or when multiple parties are involved, the court may direct the entry of a final judgment as to one or more but fewer than all of the claims or parties only upon an express determination that there is no just reason for delay and upon an express direction for the entry of judgment.
Hence, the trial court entered judgment in favor of defendant District of Columbia (R. 85).
[2] "Employee" is defined to include an employee of the District of Columbia government. 5 U.S.C. § 8101(1)(D) (Supp. IV 1974) (amending 5 U.S.C. § 8101 (1970)).
[3] In enacting FECA in 1916, Congress noted the advantage of a federal workmen's compensation act, stating:
Many of the States of this Union have such compensation laws which are working with most excellent results, and now it is proposed that the United States shall have a compensation law for the protection of all its employees, and thus give relief from the cumbrous and inefficient system of presenting private claims to Congress for its action, often delayed and many times insufficient, and to give its sanction to [the principle of providing federal employees protection against possible work-related injuries]. [H.R.Rep.No.678, 64th Cong., 1st Sess. 7-8 (1916).]
[4] Under FECA the term "injury"
. . . includes, in addition to injury by accident, a disease proximately caused by the employment, and damage to or destruction of medical braces, artificial limbs, and other prosthetic devices which shall be replaced or repaired, and such time lost while such device or appliance is being replaced or repaired; except that eyeglasses and hearing aids would not be replaced, repaired, or otherwise compensated for, unless the damages or destruction is incident to a personal injury requiring medical services. . . . [5 U.S.C. § 8101 (Supp. IV 1974) (amending 5 U.S.C. § 8101 (1970)).]
[5] We are aware of the many decisions of the Employees' Compensation Appeals Board granting compensation to claimants asserting various kinds of mental injury causally related to their employment. The injuries asserted by those claimants, however, were not the general mental distress claimed here but were particular and medically definable mental and emotional illnesses and conditions. See, e. g., Raymond H. Schultz, Jr., 23 Empl.Comp.App.Bd. (mental breakdown); Anna M. Heilemann, 18 Empl.Comp.App.Bd. 480 (1967) (neurosis); Arthur Jones, 16 Empl.Comp.App.Bd. 458 (1965) (nervous condition). Since appellant does not contend that she suffered any mental illness or emotional disorder, serious or incidental, as a result of her arrest, these cases further support the view that her claim is beyond the scope of FECA.
[6] Appellant's alternative contention that the facts stated in the complaint clearly show that she sustained her injury outside the scope of her employment and consequently was beyond the coverage of FECA need not be decided in light of our decision.
|
Q:
How do I access a view using Fluent NHibernate?
My web app uses half a dozen tables, each of which get populated when a user passes through the system. In order to do stats analysis I've written a database view to flatten these tables into a single view.
The view is working, however, I want to automate some tests around the view creation.
My idea to do this was to create a model/map and repository for the view - with list action only. My current implementation doesn't work.
This is my Repository:
namespace FunctionalTests.SpssView
{
public class SpssRepository
{
private readonly ISessionManager _sessionManager;
public SpssRepository(ISessionManager sessionManager)
{
_sessionManager = sessionManager;
}
public IList<Spss> ListFromSpssView()
{
ICriteria criteria = _sessionManager.GetSession().CreateCriteria(typeof(Spss));
return criteria.List<Spss>();
}
}
}
This is the model class:
namespace FunctionalTests.SpssView
{
public class Spss
{
public virtual String StudentId { get; set; }
public virtual String UPNSCN { get; set; }
...
}
}
And the mapping:
namespace FunctionalTests.SpssView
{
public sealed class SpssMap : ClassMap<Spss>
{
public SpssMap()
{
Id(x => x.StudentId).GeneratedBy.Assigned();
Map(x => x.UPNSCN);
...
}
}
}
I'm not entirely confident in the ID mapping - as it is just read from the view?
This is my test:
[Test]
public void ShouldPopulateAndRetrieveFromSpssView()
{
var mockSessionManager = new Mock<ISessionManager>();
mockSessionManager.Setup(x => x.GetSession()).Returns(_session);
var caseRepository = new CaseRepository(mockSessionManager.Object);
var caseList = caseRepository.ListCases();
Assert.That(caseList.Count, Is.EqualTo(2));
var repository = new SpssRepository(mockSessionManager.Object);
var spssList = repository.ListFromSpssView();
Assert.That(spssList.Count, Is.EqualTo(2));
}
Note the case list code - I put that in there to make sure the db connection was being made. This part of the test passes.
Running select * from spss; returns two results. (I'm using sql server 2005 fwiw)
And because this isn't production code, I created a new folder in my FunctionalTests visual studio project (I mention this, because it seems to me to be one of the main differences between this and my working repositories.) Should this make a difference??
Is it possible to test views like this?
Is there anyway I can see the sql that is being generated?
What am I doing wrong??!?
Thanks :)
A:
Try adding:
public SpssMap()
{
Table("myViewBame"); // ADD THIS
Id(x => x.StudentId).GeneratedBy.Assigned();
Map(x => x.UPNSCN);
...
}
In order to see the generated SQL add this:
.ShowSql()
For example:
Fluently.Configure().Database(
MsSqlConfiguration.MsSql2005
.ConnectionString(
ConfigurationManager.ConnectionStrings["my"].ConnectionString).ShowSql())
.Mappings(m => m.FluentMappings.AddFromAssemblyOf<MyClass>())
.BuildSessionFactory();
|
Hi, Geoff,
I am preparing your U.S. return and have a few questions for you:
Could you please tell me if you paid property taxes or made charitable
donations during 2000, and, if so, please provide me with the details and
amounts.
Also, you sold shares in Tibco Software Inc. (07/18/2000 - $2,905.09) and
Nasdaq 100 shares (10/12/2000 - $7,459.75). I will need the cost
basis/purchase price that was paid for acquiring those shares, so that I
may calculate a gain or loss on disposition.
Thanks so much,
Vicki Meszaros
PricewaterhouseCoopers LLP
Phone (403) 509-7469
Fax (403) 781-1825
----------------------------------------------------------------
The information transmitted is intended only for the person or entity to
which it is addressed and may contain confidential and/or privileged
material. Any review, retransmission, dissemination or other use of, or
taking of any action in reliance upon, this information by persons or
entities other than the intended recipient is prohibited. If you received
this in error, please contact the sender and delete the material from any
computer. |
Use of 5-Fluorouracil for Management of the Thick-Skinned Nose.
Patients with a thick nasal skin and soft tissue envelope can have unpredictable results and irregular scarring after rhinoplasty surgery. These patients typically have sebaceous tissue over the nasal tip and are particularly susceptible to soft tissue polly beak formation and excess scar tissue in the radix, tip, and septum. Targeted injections of 5-fluorouracil alone or mixed with low concentrations of steroid can be useful to prevent and treat excess postoperative scar tissue deposition. Ideally, four to six injections are performed every 1 to 4 weeks beginning 1 week postoperatively. The injections are most beneficial when performed within the first 3 months after surgery. Even a single injection may improve outcomes with minimal side effects. |
Mosin Nagant PU sniper for review.
Article about: Hey guys! Thinking of buying this guy, question is it all orginal to WW2? I know this went under armory refub. But are the parts WW2? Here's the link: Russian Tula 91/30 Mosin Nagant PU SNIP |
libextractor: Two heap-based buffer overflows
— GLSA 200605-14
libextractor is vulnerable to two heap overflow vulnerabilities which could
lead to the execution of arbitrary code.
Affected Packages
Package
media-libs/libextractor on all architectures
Affected versions
< 0.5.14
Unaffected versions
>= 0.5.14
Background
libextractor is a library used to extract metadata from arbitrary
files.
Description
Luigi Auriemma has found two heap-based buffer overflows in
libextractor 0.5.13 and earlier: one of them occurs in the
asf_read_header function in the ASF plugin, and the other occurs in the
parse_trak_atom function in the Qt plugin.
Impact
By enticing a user to open a malformed file using an application
that employs libextractor and its ASF or Qt plugins, an attacker could
execute arbitrary code in the context of the application running the
affected library. |
"So this is Cirra." "It's beautiful." "To me it's the ugliest place on Earth." "I don't think you should keep punishing yourself for what happened." "I didn't come here to punish myself." "I wanna understand why." "Why what?" "Why it happened." "Why I was, who I was." "And how I can ever atone." "You've changed, Xena." "Like this valley." "Once it was a place full of death and violence." "But now it's full of beauty and life." "The same kind of change has happened to you." "I wish that I could see it that way." "I'm going down there." "I'll wait here." "Why?" "Gabrielle!" "Gabrielle?" "Lord of the moon, mistress of the stars..." "We, the children of the sun, ask you for an omen." "Send us a sign." "Hail Goddess!" "We are your servants." "Tell us our future." "I got nothing but bad news for you." "Gabrielle, catch!" "Run!" "Come on, run!" "Gabrielle?" "Wait!" "Wait!" "Stop!" "I think I hear Xena." "Hey..." "Glad to see ya." "Now get outta here." "Quick!" "Run!" "Come on, don't stop!" "Let's go!" "Get her!" "Get out of the way!" "In the time of ancient gods..., warlords and kings, a land in turmoil cried out for a hero." "She was Xena." "A mighty princess forged in the heat of battle." "The power." "The passion." "The danger." "Her courage will change the world." "XENA" " WARRIOR PRINCESS" "Xena..." "Open your eyes." "Wake up!" "Wake up!" "Gabrielle, the girl." "What girl?" "One of the captives?" "Only she can save me." "They're gone!" "Xena..." "Mount Nestus..." "Oh, I'm sorry." "Mount Nestus?" "Take me there." "I..." "I can't take you there, I don't know..." "It's too far away." "Xena, I..." "I don't know if..." "Please..." "Ok." "Amphipolis..." "TEN WINTERS AGO" "Come on!" "Get moving!" "Have mercy!" "Please!" "Come on, get on over to Xena!" "People of Neopolitis." "Friends, you're free to go." "But spread the word." "My army will punish any village that allies itself with the enemies of Amphipolis." "And I will do anything to ensure the safety of my homeland." "Those who don't heed my warning will pay a terrible price." "Get going!" "You hungry?" "Ah, what's the matter?" "You not hungry?" "I generally don't eat food touched by a pig." "You have a woman's touch." "So, you not afraid of a beating, huh?" "You afraid to die?" "A brave man dies only once." "A man like you dies a thousand times." "All right, brave man." "You're one time is now!" "Tellus..." "Look at him." "The robes The bearing, the poise..." "Why, we have a roman nobleman." "A valuable commodity." "What are you talking about?" "Ransom." "She's talking about ransom, pig." "That's right, we can get 20.000 dinars for him." "20.000 isn't enough." "Oh, really?" "They'll never believe you have me, if that's all you're asking." "I'm worth five times that." "Very well..." "But if you're wrong, it's your neck." "Lyserius..." "Send out a ransom demand to the nearest roman settlement." "Tell them to send 100.000 dinars if they ever want to see..." "What's your name?" "Caesar." "Julius Caesar." "Caesar." "Julius Caesar, again." "You really weren't afraid to die, were you?" "I knew someone would stop him." "And how could you know that?" "I know what I'm fated to do with my life." "And what's that?" "Rule the world." "Let's go, roman." "Xena?" "Can you hear me?" "Xena!" "Xena, can you hear me?" "Mount Nestus." "Is it north of the Strymon river?" "North..." "Strymon..." "I think that's a yes." "Do you hear me?" "Don't make a move." "What is it?" "We have a stowaway." "Come down!" "We got her." "Hold onto her." "A woman." "What did you do to my leg?" "Fix it!" "My leg, fix it!" "Bring over Tellus." "She can fix whatever she did to him." "What's she saying?" "She said it's too late for him." "She's killed him!" "Wait." "You speak her language..." "Tell her I'll spare her life if she'll teach me how she did that." "Take her down below." "Let's go!" "Be careful." "Runaway slaves are very dangerous people." "How do you know she's a runaway?" "She speaks gaelic." "But she's clearly from the land of the Pharaoh." "Probably abducted as a child by raiders from Western Gaul." "Western Gaul, huh..." "Why do you say that?" "Gaul is divided into three parts." "Each area speaks its own different dialect." "One day I'll conquer all three provinces." "How can you be so sure of yourself?" "I told you, I'm..." "Oh, that's right." "You're fated to rule the world." "Do you really believe that?" "Of course." "Each event in our life is part of a great plan." "There are no accidents, only destiny." "And who shapes this destiny?" "The gods?" "Perhaps." "Or it's the blood in our veins, our souls Our desires, our will." "They're all in it together, weaving a tapestry we call destiny." "Well, I can tell you one thing about your destiny." "You're fated to have dinner in my cabin tonight." "Grab his legs!" "Show me that thing you do." "No." "Not on my leg." "Show me on my neck." "Yeah..." "Come on." "That was too fast." "Now take it off and do it again, slower." "Take it off." "Come on!" "You got some sense of humor." "Now, teach me how you did that." "No, not on me." "Teach me on yourself." "Here?" "You see, I can play, too." "Come on." "Where did you steal that dress?" "Stugeira." "Maybe someday, you can go back for the rest of it." "Are you complaining?" "No, not at all." "It's lovely." "Why Stugeira?" "It's the ancient enemy of my home village, Amphipolis." "Amphipolis?" "So all your raiding and looting is about protecting your homeland." "That's right." "It was once brutally attacked by a warlord." "But I've made sure that'll never happen again." "And what about you?" "What about me?" "What drives you?" "The desire to be great." "You mean powerful." "No." "Greatness isn't just about possessing power." "If it was, any thug with an army would be entitled to that label." "Greatness is about achieving what seems impossible... to other men." "Why don't you and I work together?" "What do you mean?" "This life I'm living is beginning to bore me." "I'd love to join forces with you." "So, you wanna help me conquer the world..." "Why not?" "We'd make an unstoppable team." "Indeed." "I bet you know a lot..." "about conquest." "Yes I love it." "Pursuing the enemy, breaking down his defenses Cutting off his only path of retreat and then closing for the kill." "Some enemies are harder that others." "Oh, I count on it." "What's the matter?" "Not all there?" "No." "I was just wondering if we'll ever see one another again." "A moment won't pass when I'm not thinking about you." "Now go." "I'll find you, I promise." "Ship ahoy!" "Bring her around!" "We're going to join them!" "It's all right." "He's my friend." "Hurry up!" "Now!" "What do you think you're doing?" "This is my destiny." "You're a part of it." "And I'm a part of yours." "The ship is secured, Caesar." "Good." "Where's that friend of yours?" "The gaelic slave girl..." "I had to kill her!" "Because she betrayed me!" "Really?" "Well, I don't blame you." "Still, she would have fetched a good price with the gladiator dealers." "Is that what you have planned for me?" "We were going to conquer the world together, what happened to those plans for us?" "Us?" "There was never any "us", Xena." "Only Rome." "And I am Rome." "Still Don't think that what we had was meaningless." "I'll always remember it." "And you'll have a special place of honor among my conquered." "She was an easier prey than I expected." "Divide and conquer, my friend." "You divide a woman's emotion from her sensibilities and you have her." "I could've sold you and all your friends into slavery, Xena." "But that's what any common warlord would do." "But with this and especially with you I defy myself to all those who would dare oppose me." "All those who would dare prey on Rome." "Goodbye, Xena." "Break her legs." "Sleep." "You're getting worse." "Who goes there?" "I asked you a question!" "The Senate will never approve the funds for a northern invasion." "You move too fast, Caesar." "Time is on your side, take advantage of it." "I shall." "And my time is now." "The plunder I have taken from these pirates makes it so." "I can finance my invasion without the approval of the Senate." "And with victory, the army will pledge allegiance." "And Rome will be mine." "No, Brutus." "From this moment on, I am no longer subordinate to old men in white robes." "I'm their rival." "What is this?" "Caesar, the barbarian woman." "The one name Xena, escaped." "Your life is forfeit." "That you already know." "But you can redeem yourself." "Take my centurion guard and find her." "I want her lifeless body brought back to me by the end of the night." "Go." "What is this?" "Nicklio!" "Are you a healer?" "You could say that." "I'm the healer." "Please..." "Please, help me." "Please, help me." "My friend, she needs help." "Xena?" "What happened to her?" "Her organs are swelling from internal bleeding." "Nicklio..." "Don't, please..., ...let me go." "I've just reset your bones." "You're lucky M'Lila brought you here." "Yeah, lucky." "M'Lila, huh?" "Ask her why she saved me." "She says it's not your time to die." "Well, if not now, then when?" "Let me see your wound." "Will you help my friend." "Xena can wait." "You, I can do something about." "What do you mean?" "You have amazing recuperative powers." "How are you feeling?" "Fine." "Much stronger." "Those needles are fascinating." "M'Lila..." "Up on that cross I wasn't sure that I wanted to live." "You had no reason to save me but you did." "Thank you." "I know you can't understand." "She wants to know if you feel anger towards Caesar." "There she is!" "Get her!" "Something's happening." "Her pulse is failing." "You'll be dead in 30 seconds." "But know this, you won't be the last." "She's gone." "She can't be gone." "Tell Hades to prepare himself." "A new Xena is born tonight." "With a new purpose in life." "No!" "Death." "No!" "Let her pass over." "Please..." "Please, wake up." "Wake up!" "Wake up!" "Please, wake up." "Do something!" "Do something!" "M'Lila..." "Hello, Xena." "You should have left me to die back there on that beach." "You have a destiny, Xena." "But you have to choose it." "I did choose it!" "I chose evil." "Now that you know evil..., ...were evil, you can fight evil." "When the living think of the dead the dead can hear their thoughts." "Listen." "Xena, I know you can hear me." "Wherever you are..." "I know you always told me to be strong." "I can't be, not now." "You can't leave me!" "I know it's not your time." "I can feel it in my heart." "I feel this emptiness that I've never known before and it scares me." "Xena, above all, just remember your destiny." "Remember it and fight!" "Just fight to come back." "This world needs you." "I need you." "I have to go back." "TO BE CONTINUED..." "Subtitles: @marlonrock1986 (^^V^^)" |
Article content
OTTAWA — Six Canadian individuals and groups involved in “organized hate” have been banned from having any further presence on Facebook and Instagram.
Those banned include one-time Toronto mayoral candidate Faith Goldy.
We apologize, but this video has failed to load.
tap here to see other videos from our team. Try refreshing your browser, or Faith Goldy and others involved in 'organized hate' banned from Facebook and Instagram Back to video
Also banned are the Canadian Nationalist Front and its white nationalist chairman, Kevin Goudreau, Aryan Strikeforce, Wolves of Odin and Soldiers of Odin (also known as Canadian Infidels).
Facebook is imposing the ban after concluding the six spread hate and urge attacks on or exclusion of others based on their identity, in contravention of the social media giant’s policy on dangerous organizations and individuals.
Goldy provided sympathetic coverage for Rebel Media of the 2017 white supremacist rally in Charlottesville, Va.; she was subsequently fired by Rebel Media for taking part in a podcast on a neo-Nazi group’s website.
In February, Goldy was among those who spoke to a convoy of truckers protesting federal policies on pipelines and carbon taxation, but which also included anti-immigration and white nationalist messages; Conservative Leader Andrew Scheer and People’s Party of Canada Leader Maxime Bernier also addressed the protesters. |
Alcohol is the most commonly abused drug in the world. In the United States about half the adult population regularly consumes alcohol. It has been well established that alcohol has harmful effects on the lung. For example, heavy alcohol intake increases the risk for developing pulmonary diseases such as pneumonia, bronchitis and acute respiratory distress syndrome (ARDS). The first line of defense of the conducting airways is the airway epithelium, which contains tight junctions and expresses Zonula occluden-1 (ZO-1), and occludin. Claudin-1 is a transmembrane protein, which is important in regulating tight junction permeability claudin-1, . ZO-1 is a peripherally associated membrane protein, which links tight junction proteins to the actin cytoskeleton, other tight junction proteins (claudin and occludin) and is believed to be an important component in stabilizing tight junctions. Tight junctions are characteristically located at the apical-lateral borders in airway epithelium where they regulate cell polarity and act to selectively regulate the passage of water, ions, neutral molecules and inflammatory cells through the paracellular pathway. A number of studies have shown that alcohol disrupts tight junctions resulting in barrier leak. In the lung this occurs in the parenchyma compartment resulting in pulmonary edema and alveolar edema. Tight junctions also play a key role in regulating the barrier function in the conducting airways. Airway leak is a cardinal feature of airway diseases such as bronchitis and asthma. Increased leak contributes to airway edema, which is a classic finding of these diseases. However, little is known about the effects of alcohol in the conducting airways. We have recently observed that alcohol impairs ZO-1 and claudin-1 translocation to the cell membrane and increases tight junction permeability resulting in leakier airway epithelial cells. Our data link this leakiness to alcohol-induced changes in airway protein kinase C (PKC) activation resulting in impaired protein translocation to the cell membrane. These findings led us to hypothesize that: Alcohol promotes airway leak linked to the delocalization of ZO-1 and claudin-1 through a PKC-dependent pathway in the airway epithelium. We propose to test this hypothesis with 3 specific aims: 1) Determine the functional consequences of alcohol on tight junctions in the epithelium of the conducting airways; 2) Define the mechanism through which alcohol impairs ZO-1 and translocation; 3) Establish the impact of alcohol-triggered ZO-1 and rearrangement in an in vivo model of alcohol-fed mice. Results for these studies will improve our understanding of the impact alcohol has on airway epithelial barrier functions, which are critical for the understanding and treatment of airway diseases common among alcohol abusers. claudin-1 claudin-1 ) |
Both had travelled recently, say officials
Two persons from the Nilgiris have died of swine flu in the past 10 days.
On Monday, Abdul Rahman, 43, a deputy tahsildar working with the Nilgiris district administration, died at the Coimbatore Medical College and Hospital (CMCH) after contracting the H1N1 virus.
Speaking to The Hindu, Dr. S. Porkudi, Deputy Director of Health Services, Nilgiris district, said that 10 days ago, a 60-year-old woman from Melur in Coonoor died from congestive cardiac failure. “After running tests, it became clear that she had contracted swine flu,” Dr. Porkudi said.
A few days ago, the deputy tahsildar contracted swine flu and was admitted to the CMCH, where he died.
“Both the woman and the government official had travel histories,” she said.
The family members of the Melur resident as well as the government staff at the tahslidar’s office have all tested negative for the virus, officials said.
The H1N1 virus poses a risk particularly to “vulnerable groups”, such as senior citizens, young children, pregnant mothers and those with underlying medical issues. People exhibiting symptoms of the virus should seek immediate medical help at Primary Health Centres and government hospitals, officials said. |
[TV] “iZombie” Recasting Reoccurring Role
Deadline reports that the CW drama “iZombie” will be replacing Alexandra Krosney for the series, although a new name has yet to be announced..
Based on the DC comic, “iZombie,” from Warner Bros TV, is a supernatural crime procedural that centers on Liv (Rose McIver), a med student-turned-zombie who takes a job in the coroner’s office and ends up solving homicide cases. Krosneyed plays Peyton, Liv’s best friend and roommate who is baffled by Liv’s recent behavior and feels like they’re drifting apart. |
Italy will stage the 2022 Ryder Cup at the Marco Simone course - 17 miles north-east of central Rome - for the 44th edition of the biennial contest against the USA. It beat off Austria, Germany and Spain in the bidding process and stages the match for the first time.
"What a day for Italian Golf … Ryder Cup in 2022 in Rome!!!" read a tweet from the Italian Ryder Cup player Edoardo Molinari while his young countryman Matteo Manassero, yet to appear for Europe in the match, wrote: "I guess it's time to start playing and [reach] the biggest goal I can have #rydercup2022 #Roma."
Spain, which staged the 1997 tournament at Valderrama, and Germany, yet to host one, were the perceived favourites but Italy's pledge to promote the Italian Open to a €7m tournament for 11 years from 2017 made the difference in the final analysis. Prize money at the 2016 event will also double from €1.5m to a minimum of €3m. |
653 S.W.2d 291 (1983)
Oleta R. SWEET, Petitioner,
v.
PORT TERMINAL RAILROAD ASSOCIATION, Respondent.
No. C-1703.
Supreme Court of Texas.
July 6, 1983.
Garrett, Letbetter & Payne, Tom R. Letbetter, Max Garrett and George Payne, Houston, for petitioner.
Sewell & Riggs, Gordon A. Holloway, Kyle M. Rowley and Claude R. Treece, Houston, for respondent.
*292 BARROW, Justice.
The petitioner, Oleta R. Sweet, brought this action under the Federal Employers' Liability Act (FELA), 45 U.S.C. §§ 51-60 (1976), against Port Terminal Railroad Association (Port Terminal) for the wrongful death of her husband, Ted Sweet. The trial court awarded Mrs. Sweet the full amount of damages found by the jury. The court of appeals reformed the award for pecuniary loss by decreasing Mrs. Sweet's recovery by the percentage of negligence attributed to the deceased and ordered a remittitur on the award for pain, suffering and mental anguish. 640 S.W.2d 362. We affirm the judgment of the court of appeals.
On October 24, 1979, Sweet was thrown from the lead car of a fourteen car train being pushed along the track when the car made a jerking, whip-like motion. Sweet fell in front of the train and was crushed to death when the car passed over his body. This whip-like motion is commonly referred to as "slack action" in the railroad industry and was initiated by the application of the engine's independent brake system. Evidence was introduced at trial which showed that the slack action was unusually forceful on this occasion because of a defective cushioning device on the car next to the one Sweet was riding.
In response to special issues, the jury found: (1) the cushioning device on the second car was defective at the time of the accident, (2) the defective cushioning device played a part in causing the accident, (3) both Port Terminal and Sweet were negligent, and (4) 75 percent of the negligence causing the accident was attributable to Port Terminal and 25 percent was attributable to Sweet's own negligence. The jury awarded Mrs. Sweet $579,287 for pecuniary losses and $25,000 for her husband's conscious pain and suffering and mental anguish. Based on the jury's verdict, the trial court rendered judgment that Mrs. Sweet recover the full amount of damages awarded. By not reducing Mrs. Sweet's recovery, the trial court impliedly held that Port Terminal violated a railroad safety statute by operating a railroad car with a defective cushioning device which contributed to Sweet's death.
Under the FELA, every "common carrier by railroad" is liable for injuries sustained by its employees resulting from or due to its negligence. 45 U.S.C. § 51 (1976). The FELA also establishes a system of comparative negligence whereby an employee's recovery of damages will be decreased "in proportion to the amount of negligence attributable to such employee ...." 45 U.S.C. § 53 (1976). The railroad, however, is precluded from asserting an employee's contributory negligence in "any case where the violation by [a] common carrier of any statute enacted for the safety of employees contributed to the injury or death of such employee." Id.
The court of appeals held that Mrs. Sweet had not established a violation of a safety statute because she failed to prove that Port Terminal knew or should have known of the defect prior to the accident. Our principal question is whether the 1979 Federal Railroad Administration regulations governing cushioning devices may be violated without proof of scienter of the defect by the railroad. We hold that the regulations do not impose liability without scienter and, therefore, the general comparative negligence provisions apply.
Mrs. Sweet asserts that the comparative negligence provisions do not apply because a cushioning device is part of a railroad car's coupling equipment which is controlled by the Safety Appliance Act. See 45 U.S.C. § 2 (1976). When equipment fails to perform as required by the Safety Appliance Act and that failure contributes to an employee's injuries, absolute liability is imposed on the railroad. Missouri-Kansas-Texas R. Co. v. Evans, 151 Tex. 340, 250 S.W.2d 385, 388 (1952). Liability under the act can be shown by the failure of the cars to couple automatically upon impact, to uncouple without the need to step between the cars or to remain coupled until released. O'Donnell v. Elgin, J. & E. Ry. Co., 338 U.S. 384, 388, 390, 70 S.Ct. 200, 203, 204, 94 L.Ed. 187 (1949). In this case, however, there is no proof that the cars failed to couple or *293 uncouple in violation of the requirements set out in the act. Furthermore, cushioning devices are not regulated under authority of the Safety Appliance Act. Cushioning devices are defined and controlled by the Railroad Freight Car Safety Standards. See 49 C.F.R. §§ 215.5(e) and 215.197 (1979). These regulations were promulgated pursuant to authority granted the Department of Transportation[1] by sections 202 and 209 of the Federal Railroad Safety Act of 1970.[2] Therefore, Port Terminal's liability must be measured by the standards set out in the Freight Car Safety Standards and the Federal Railroad Safety Act.
Unlike the Safety Appliance Act which was enacted to resolve specific safety problems, the Federal Railroad Safety Act is a comprehensive statute dealing with "safety in all areas of railroad operations."[3] Section 437(c) of the Federal Railroad Safety Act provides that the rules and regulations issued in the Freight Car Safety Standards "shall have the same force and effect as a statute for purposes of the application of sections 53 and 54 of this title [FELA], relating to the liability of common carriers by railroad for injuries to their employees." 45 U.S.C. § 437(c) (Supp. III 1979). Therefore, proof of a violation of these regulations would be sufficient to preclude Port Terminal from asserting contributory negligence and to allow Mrs. Sweet to recover her entire award of $579,287 for pecuniary loss.
This accident occurred in 1979 prior to the 1980 revisions to the railroad safety regulations which clearly sought to impose liability on the railroad without requiring proof of scienter of the defect. Mrs. Sweet, therefore, must prove all the elements of the Freight Car Safety Standards as they were written in 1979 to recover the entire award for pecuniary loss. Section 215.7 sets out a railroad's "responsibility for defective cars" and provides:
Any railroad that knows, has notice, or should have known that a railroad freight car that it operates has any component which is described as defective in this part is responsible for compliance with this section ... [E]ach railroad freight car which has a component described as defective in this part must be
(1) repaired; or
(2) removed from service. (emphasis added). 49 C.F.R. § 215.7 (1979).
This section requires a claimant to prove not only that the cushioning device was defective but that the railroad knew or should have known of the defect. The jury found the cushioning device on the second car to be defective as defined in section 215.197 of the 1979 regulations, but no issues were submitted on whether Port Terminal knew or should have known the equipment to be defective.
Prior to the 1980 amendment, the Federal Railroad Administration, which is responsible for issuing and enforcing railroad regulations, construed the Freight Car Safety Standards to impose liability only after it had been shown that the railroad "knew or should have known" of the defect. See Fort Worth and Denver Ry. Co. v. Lewis, 693 F.2d 432, 433, 439 (5th Cir.1982); see also Fort Worth and Denver Ry. Co. v. Goldschmidt, 518 F.Supp. 121, 131 (N.D.Tex. 1981), rev'd on other grounds, 693 F.2d 432 (5th Cir.1982). In 1978, the Federal Railroad Administration began a series of public hearings concerning proposed amendments to regulations dealing with railroad safety. See 43 Fed.Reg. 26337 (1978). One such proposal suggested combining several provisions in the Safety Appliance Standards[4] with the Freight Car Safety Standards. The agency noted that under this proposal, "`[k]nowledge' of defective conditions *294 would no longer be necessary for railroads to violate the Freight Car Safety Standards" if the changes contemplated in Part 215 were adopted. 43 Fed.Reg. 26337, 26338 (1978).
The 1980 revisions to section 215.7 expressly permitted "the assessment of fines for failure to comply with the revised standards with respect to any car which is `in service.'" 44 Fed.Reg. 1419, 1422 (1979). The Federal Railroad Administration noted that the "current regulation [49 C.F.R. Part 215 (1979)] creates civil penalty liability only where it is shown that the railroad knows or should know of a defect," whereas "the proposed [1980] rule would establish absolute liability similar to that which exists now under the Safety Appliance Act...." Id. at 1422-1423. The final comments made by the Federal Railroad Administration dealing with the 1980 regulations concluded:
"[B]asing a violation on knowledge of the defective condition encourages ignorance and neglect. It is FRA's experience that the knowledge requirement (§ 215.7) of the current standards has had that effect. Thus, it has been necessary to adopt a rule of strict liability for violations of revised standards." (emphasis added). 44 Fed.Reg. 77328, 77339 (1979).
This treatment by the Federal Railroad Administration indicates that scienter was necessary under the 1979 Freight Car Safety Standards before a violation could be shown. Since the regulations require scienter, there is no need for us to examine the provisions of the Federal Railroad Safety Act to determine if strict liability is authorized by Congress. See Fort Worth and Denver Ry. Co. v. Lewis, 693 F.2d 432 (5th Cir.1982).
Mrs. Sweet also urges that section 215.19[5] creates a standard of liability different from that set out in section 215.7. Specifically, Mrs. Sweet urges that liability under section 215.7 controls only where a railroad refuses to repair or remove a car after it becomes aware of the defect, but that scienter of the defect is not necessary for the railroad to violate the provisions in the remainder of the regulations under section 215.19. None of the comments published by the Federal Railroad Administration have ever alluded to the application of two different standards. The provisions in section 215.19 do no more than state the minimum and maximum civil penalties allowable for a violation identified in section 215.7.[6] Therefore, we hold that the standard of liability in section 215.7 controls all the provisions in part 215 of the 1979 regulations.
Since Sweet's death occurred while the 1979 regulations were in effect, Mrs. Sweet had the burden of showing that Port Terminal knew or should have known of the defective cushioning device. There being no findings that Port Terminal knew or should have known of the defect, we hold that Mrs. Sweet has failed to show that Port Terminal violated a safety statute. Therefore, the court of appeals correctly reduced the recovery for pecuniary loss by the 25 percent contributory negligence attributable to Sweet as required by the general comparative negligence provisions of the FELA.[7]
Mrs. Sweet also questions the authority of the court of appeals to disturb a jury's award of damages by ordering a remittitur in a FELA case. This contention has been raised before and was expressly overruled in Missouri Pacific R. Co. v. Kimbrell, 160 Tex. 542, 334 S.W.2d 283, 287 (1960), and Gulf Colorado & Sante Fe Ry. Co. v. Deen, 159 Tex. 238, 317 S.W.2d 913, 914 (1958), cert. denied, 359 U.S. 945, 79 S.Ct. 725, 3 L.Ed.2d 678 (1959). We, therefore, *295 hold that the court of appeals has the power to order a remittitur in FELA actions. Since the granting of a remittitur and questions as to the excessiveness of damages are questions of fact made final in the court of appeals, we lack jurisdiction to review that holding. Impson v. Structural Metals, Inc., 487 S.W.2d 694, 697 (Tex.1972); Pon Lip Chew v. Gilliland, 398 S.W.2d 98, 103 (Tex.1965).
The judgment of the court of appeals is affirmed.
NOTES
[1] The Secretary of Transportation has delegated the majority of his rule-making power under the Federal Railroad Safety Act to the administrator of the Federal Railroad Administration. 49 C.F.R. § 1.49(n) (1979).
[2] Pub.L. No. 91-458, §§ 202 and 209, 84 Stat. 971 and 975 (1970), (codified at 45 U.S.C. §§ 431 and 438 (1976)); see 38 Fed.Reg. 32224 (1979).
[3] 1970 U.S.Code Cong. & Admin.News 4104, 4106.
[4] 49 C.F.R. Part 231 (1979).
[5] 49 C.F.R. § 215.19 provides:
Any railroad that operates a railroad freight car in violation of any requirement prescribed in this part is liable to a civil penalty of at least $250 but not more than $2,500 for each violation. Each day of each violation constitutes a separate offense.
[6] Section 215.19 was revoked in the 1980 revision because a schedule of fines and penalties was included in Appendix B and the retention of the section was thought to be redundant. See 44 Fed.Reg. 1419, 1423 (1979).
[7] 45 U.S.C. §§ 51 and 53 (1976).
|
SD Woman Holds Record For Largest Bear Collection
HILL CITY, S.D. (AP) — As a child growing up in foster care in Minnesota, Jackie Miley never had that most quintessential childhood toy: the teddy bear.
But today, the 63-year-old resident of Hill City, S.D., is making up for that — and then some. With 7,790 teddy bears, Miley holds the Guinness World Record for largest teddy bear collection.
Her collection is housed in a small home along Main Street in Hill City, a town of fewer than 800 people in western South Dakota’s Black Hills. Teddy Bear Town is filled to the brim with every type and size of teddy bear imaginable — Beanie Baby teddy bears, the talking Teddy Ruxpin bear and porcelain teddy bears. Visitors are invited to admire the collection and buy souvenirs at a teddy bear-themed gift shop. |
Q:
Using an HTTP healthcheck for a TCP server in HA Proxy
Suppose I have a tcp server running on localhost:9000 and an HTTP server running on localhost:8000. The HTTP server exposes a URL "/healthz" that returns a 200 if the tcp server is healthy and a 500 if the tcp server is unhealthy. That is, performing:
curl localhost:9000/healthz
will return a status 200 or status 500 depending on health of the tcp server.
I want HAProxy to use localhost:8000/healthz for the healthcheck of the tcp server. Is that possible?
A:
Answering this in case anyone comes here looking for an answer.
I would have thought this wouldn't work, as you're mixing HTTP and TCP, but it appears to be possible. I've just tested with v1.4.24. The trick is to specify a different port to check on the server line in the backend. Here's a snippet of config that works for me.
frontend httpfrontend
bind *:8080
mode http
option httplog
default_backend http-backend
backend http-backend
balance roundrobin
mode http
option httplog
option httpclose
reqadd X-Forwarded-Proto:\ http
server server1 localhost:8000
frontend tcpfrontend
bind *:1080
mode tcp
option tcplog
default_backend tcp-backend
backend tcp-backend
mode tcp
option tcplog
# specify the format of the health check to run on the backend
option httpchk GET /healthz HTTP/1.0\r\nUser-agent:\ LB-Check\ TCP
# check -> turn on checks for this server
# port 8000 -> send the checks to port 8000 on the backend server (rather than 9000)
# inter 60000 -> check every 60s
server server1 localhost:9000 check port 8000 inter 60000
A:
This works for me on version 1.4.24 (same as @chrskly), without any tricks:
listen service 0.0.0.0:80
mode tcp
balance roundrobin
option tcplog
option httpchk GET http://service.com/healthcheck
server server1.service.com 192.168.0.101:80 check inter 2000
server server2.service.com 192.168.0.102:80 check inter 2000
|
Ingmire will serve as the hospital’s contact with the news media and oversee strategic media relations efforts at
St. Jude
Memphis, Tennessee, March 9, 2016
Jann Ingmire
St. Jude Children's Research Hospital has appointed Jann Ingmire as director of media relations. Ingmire will be responsible for developing and implementing national, regional and local media relations efforts focused on the research and clinical findings at St. Jude Children's Research Hospital.
"Media relations play an essential role in communicating the achievements of St. Jude," said Barry Whyte, vice president of communications and public relations at St. Jude. "Jann's considerable expertise in health and science communication will help us promote the many accomplishments of the hospital as it continues to grow in the years ahead."
Prior to St. Jude, Ingmire served at the University of Chicago managing research findings and programs with impact on local and global communities. Ingmire also served as the director of media relations at JAMA – the Journal of the American Medical Association – in Chicago, where she was responsible for international media relations outreach for the ten medical journals published by the American Medical Association.
"I am excited by the opportunity to work at an institution renowned for research, treatment and patient care," Ingmire said. "I look forward to bringing St. Jude stories to the world and creating more awareness of St. Jude's mission of finding cures and saving children."
Ingmire received a Bachelor of Science from Southern Illinois University in Carbondale, Illinois. She received a Masters in Communications from the University of Illinois-Springfield and a Master of Liberal Arts from the University of Chicago.
St. Jude Children’s Research Hospital
St. Jude Children’s Research Hospital is leading the way the world understands, treats and cures childhood cancer and other life-threatening diseases. It is the only National Cancer Institute-designated Comprehensive Cancer Center devoted solely to children. Treatments developed at St. Jude have helped push the overall childhood cancer survival rate from 20 percent to 80 percent since the hospital opened more than 50 years ago. St. Jude freely shares the breakthroughs it makes, and every child saved at St. Jude means doctors and scientists worldwide can use that knowledge to save thousands more children. Families never receive a bill from St. Jude for treatment, travel, housing and food — because all a family should worry about is helping their child live. To learn more, visit stjude.org or follow the hospital on Twitter and Instagram at @stjuderesearch. |
Q:
Permutations of list of list of lists
I want to find the permutation of list of list of lists
For example:
my input
x = [[[1,2,3],[5,6,7]],[[8,9,10],[11,12]]]
Required output should be:
[[[1,2,3],[8,9,10]],[[1,2,3],[11,12]],[[5,6,7],[8,9,10]],[[5,6,7],[11,12]]]
As you can see I want the innermost list to be intact and need to have that considered as an element and then do combinations.
I tried permutations(array) in itertools. But it didn't work.
Any help is highly appreciated.
Thank you.
A:
You need itertools.product
import itertools
x = [[[1,2,3],[5,6,7]],[[8,9,10],[11,12]]]
for combo in itertools.product(*x):
print combo
Output:
([1, 2, 3], [8, 9, 10])
([1, 2, 3], [11, 12])
([5, 6, 7], [8, 9, 10])
([5, 6, 7], [11, 12])
|
RIMPAC 2012 also marks the first time non-US officers will command components of the combined task force during the exercise. But while there would be major Indian staff participation, India would...... |
For the media
Natural gas price reduced at Gasum filling stations as from July 1, 2016
Jaa:
Gasum reduced the price of natural gas at all of its gas filling stations on Friday July 1, 2016. The new comparative price of natural gas per equivalent liter of gasoline is €0.718/l. Gasum is investing strongly in the expansion of the road fuel gas market by increasing the number of its gas filling stations around Finland and ensuring competitive fuel pricing.
The new comparative price of natural gas per equivalent liter of gasoline is €0.718/l (€1.120/kg) and that of biogas €0.928/l (€1.450/kg).
As well as being affordable, natural gas and biogas are also excellent road fuel choices from the environmental perspective. Carbon dioxide emissions from vehicles running on natural gas are around 25% lower than those from gasoline, and Finnish biogas is a zero-emission fuel. Gas vehicles do not in practice cause fine particulate emissions that reduce the quality of urban air, and the level of other local emissions is also very low. Gasum biogas is the only road transport fuel in Finland that has been awarded the Made in Finland Key Flag Symbol and the Nordic Ecolabel.
Gasum is committed to the sustained development of gas vehicle use in Finland and will construct 35 new filling stations over the next ten years. There are currently 24 gas filling stations in Finland.
Finland’s best-selling car models are available in gas versions, and the price difference between gasoline-fueled and gas-fueled cars is small. To take a look at the gas car models available, visit the website dedicated for driving on gas (Aja kaasulla) and to read about low-emission transport visit the Vihreä Kaista news and information service.
The energy company Gasum is a Finnish gas sector expert that is building a bridge to a carbon neutral society. |
Q:
Creating a Haskell function using foldl to turn a list of ints to a single int
I have to define a function, prob2, that takes a list of Ints and returns an Int using foldl:
HW3*> prob2 [2,3,4,5]
2345
I lack experience using folds. What I have is this:
prob2 :: [Integer] -> Integer
prob2 (x:xs) = foldl (\x->10*x+xs) 0
A:
The problem is that you are still thinking in terms of recursion. You seem to think of the problem as applying the function to the head of the element and the tail.
But foldl takes a binary operator and applies it to elements of the list in a cumulative fashion. It requires a binary operator for items of the same type.
You need a lambda expression with 2 parameters, like this:
foldl (\x y -> 10*x+y) 0 [2,3,4,5]
This will yield your integer 2345.
|
Secretary of State John Kerry promises GOP answers on Benghazi
Saying “I don’t think anybody lied to anybody,” Secretary of State John F. Kerry promised Wednesday to appoint a special liaison to dispel Republican lawmakers’ lingering suspicions over the Sept. 11 terrorist attack on the U.S. diplomatic post in Benghazi, Libya.
Mr. Kerry told angry Republicans at a House Foreign Affairs Committee hearing that verbatim transcripts of FBI interviews with all the survivors had “in an unprecedented way” been made available to Congress, along with 25,000 other documents and security camera footage of the attack.
In his congressional debut as secretary of state, Mr. Kerry promised to work with Rep. Edward R. Royce, California Republican and committee chairman, “to have a review of anything you don’t think you’ve gotten that you’re supposed to get.”
His promises did not mollify some critics, and a head of steam is building behind a call from Rep. Frank R. Wolf, Virginia Republican, for a Watergate-type investigative committee to look afresh at the attack and the U.S. response to it.
Mr. Wolf said Wednesday that 110 members of the House were backing his resolution urging Speaker John A. Boehner, Ohio Republican, to appoint the special committee. He spoke at a press event with Charles Woods, father of Tyrone Woods, a former Navy SEAL who was working in Benghazi as a security contractor for the CIA.
Tyrone Woods and Glen Doherty were killed on the roof of a CIA annex near the U.S. diplomatic post. Ambassador J. Christopher Stevens and State Department official Sean Smith were killed several hours earlier, when heavily armed extremists overran the post and set it ablaze.
Mr. Wolf said Charles Woods and Smith’s mother, who has written to the congressman expressing support for his resolution, are part of a burgeoning grass-roots movement.
“While home over Easter, members clearly heard from their constituents because nearly 50 [had signed on to the resolution] in the last week alone,” the congressman said. The relatives and lawmakers “along with the American public want to know why no one came to the rescue.”
Defense officials have said no military units were close enough to respond.
Mr. Woods, a retired lawyer and administrative judge who lives in Hawaii, told reporters that the special committee is needed so that lawmakers could “subpoena the witnesses who have firsthand knowledge of what happened.”
“We don’t want newspaper reports; we want the people who were on the ground,” he said.
“Part of their code of honor is they never leave anyone behind,” he said of former Navy SEALs like his son and others who fought to defend the CIA building.
The criminal investigation into the attack has made little progress. The FBI, which didn’t arrive at the attack site until a month after the incident, has been working with Libyan authorities, whose weak central government is challenged continually by well-armed militias in some regions.
The only suspect identified in the attack — Ali Harzi, a 26-year-old Tunisian national — was released in January by Tunisian authorities, who cited a lack of evidence.
Question of the Day
Do you believe Hillary Clinton's email explanation
Ask Congress
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ... |
Image copyright AFP Image caption Antonio Conte was manager of Juventus for three years between 2011 and 2014
Chelsea manager Antonio Conte says he wants to be in charge of the club for "many years" and lead the Blues into the new Stamford Bridge.
Conte arrived on a three-year deal last summer but is now looking beyond that.
The Blues have planning permission to rebuild their ground, though they are yet to decide whether to proceed.
"This could be a fantastic challenge for me and also for the club - to stay together and to play with this team in a new stadium," said Italian Conte.
The last manager to have four calendar years in charge of Chelsea was John Neal between 1981 and 1985.
"I want to break this bad record. I must be positive," added Conte, who steered the Blues to the Premier League title in his first season.
"When you start a job with a new club, I hope to stay in this club for many years. Honestly, the new stadium will be great - but I love Stamford Bridge a lot.
"Stamford Bridge is like my house."
Image caption Chelsea stadium
Chelsea have been given permission by the mayor of London to build a new £500m 60,000-seat stadium.
If they do rebuild Stamford Bridge they will probably need to temporarily relocate, with Wembley the most likely destination.
The national stadium is Tottenham's home this season while White Hart Lane is redeveloped, and Spurs host Conte's side in their first Premier League home game there on Sunday (16:00 BST).
Conte took charge of former club Juventus in 2011 as they moved into a new stadium. They had left their former Stadio delle Alpi home in 2006 and shared the Stadio Olimpico with local rivals Torino a ground for five years.
"For sure, it's not the same when you play not in your stadium," Conte added.
"But if you want to have another good step to improve the club, you must have this type of situation."
Conte gone in two weeks?
Despite Conte's comments, former Chelsea striker Chris Sutton is unconvinced the Italian will last in west London.
With striker Diego Costa absent in Brazil and midfielder Nemanja Matic sold to rivals Manchester United, Sutton told BBC Radio 5 live there are issues Conte might not be happy with.
"There are cracks appearing at Chelsea," he said. "There's a power struggle - are we to believe that Conte has control of the Costa situation when we know he didn't want Matic sold to Manchester United? I can't work certain things out.
"I do wonder, with only 11 days left of the transfer window, whether Conte is going to last. Things are not right at Stamford Bridge and it wouldn't surprise me if he isn't there in two weeks.
"If he feels he doesn't have the tools to challenge in the Premier League and in Europe, what is there to say he doesn't just walk away?" |
Necrotising external otitis caused by Aspergillus wentii: a case report.
Necrotising external otitis (NEO) is a destructive, potentially fatal, infection usually seen in elderly diabetics or the immunocompromised. The commonest causative organism is Pseudomonas but immunocompromised patients are additionally susceptible to opportunistic infections. Here we describe the first reported case of NEO caused by a previously unknown human pathogen--Aspergillus wentii. A review of the literature reveals that fungal NEO is associated with a high rate of cranial nerve palsies suggesting that infections are not being treated rapidly enough to prevent morbidity. Fungal infection should be considered early in immunocompromised patients and microbiological diagnosis should be obtained wherever possible. |
Crash Dummies let 8-year-olds smash things apart and put them together again
I confess: Crash Dummies are big in my house, which, considering the press they're getting, is roughly akin to publicly acknowledging that I am a pedophile, an ax murderer or some combination of the two.
But I offer no mea culpa for my dummy ownership, just this simple defense: Crash Dummies are toys. They aren't real. They're plastic. They're fake. They aren't flesh and blood.
They're dummies.
tTC Ever since Tyco introduced them to the toy market, Crash Dummies have been excoriated as sick and warped, and a scourge upon the psyches of the nation's young. A few years ago, it was the Teenage Mutant Ninja Turtles whose moniker alone, drained of its obvious comedic irony by parental paranoia,took the award for most-likely-to-scar-your-child-for-life toy. This year, it's the Dummies that are sweeping the scapegoat category.
For the uninitiated, Crash Dummies are small, robotlike action figures that explode on contact with hard surfaces, such as walls. Well, they don't explode actually; their snap-on heads and arms and legs sort of fall off their torsos. Their accompanying vehicles -- cars, trucks, motorcycles, -- also come undone on impact, scattering little plastic tires, doors and engines to smithereens. These stray parts are then gathered and reattached.
It sounds a bit macabre, I know, but the thing you've got to understand about Crash Dummies is that they bear absolutely no resemblance to real human beings. They're astonishingly un-lifelike. Remember, they're dummies.
In fact, they're modeled directly on the dummies featured in the U.S. Department of Transportation's public service announcements promoting seat belts. And while the feds' willingness to commercialize "Vince" and "Larry" may well be warped, is that any reason to condemn the product of their public-private collusion with Tyco?
A Hartford, Conn., clergyman thinks so; the Rev. Christopher L. Rose, pastor of Grace Episcopal Church, is calling for a congressional investigation into what he calls "dummygate." Of more immediate interest, Mr. Rose has placed the Crash Dummies at the top of his annual list of "warped toys for Christmas," claiming they desensitize children to violence. In fact, he labels them "Dahmer-esque."
"Decapitation!" he proclaimed on the nightly news, detaching a dummy's head for the benefit of the TV cameras. "Amputation!" he declared, as he removed a leg, then an arm. In short, Mr. Rose claimed, the dummies promote "torture."
Well, I admit, I've become more or less inured to the phenomenon of exploding motor vehicles. For the past dozen years or so, my life has unfolded against a human-made soundtrack of revving engines, skidding tires and crunching metal. But I think I can still recognize sadism when I see it, and I don't.
The beauty of Crash Dummies, from a child's view, is that they break apart quite spectacularly. And then, voila, they snap together and are all ready for another disassembly. It's just one of those mystifying kid obsessions -- wreck it, then make it whole again.
The real downside of Crash Dummies, in my view, is that they last about 48 hours max, whereupon the arms disappear into the fireplace ash, the heads roll under the couch and the legs get lodged in the dust balls and mice leavings behind the refrigerator. In other words, they're a waste of money, not a psychological plague.
We parents -- and pastors -- tend to get a bit too hyper these days about the psychological vulnerability of our kids. The Crash Dummies phobia is just another symptom of the generalized dread that afflicts those of us charged with the daunting responsibility of raising children in an increasingly dangerous world -- a frequently unfocused, unchanneled dread that gnaws away at us and sometimes goes off half-cocked.
But parents would do well to remember what it's like to be a kid, to try to look at our kids' needs and desires through their eyes, not ours. I wouldn't choose to amuse myself with a Vince or Larry. But then, fortunately or not, I'm not 8 years old anymore.
It seems to me the most troubling question raised by Crash Dummies is this: Are our children having trouble distinguishing fantasy from reality, or are we? |
---
abstract: |
A new generalization of Grassmannians to supergeometry, different from the well known supergrassmannian, is introduced. These are constructed by gluing a finite number of copies of a $ \nu $- domain, i.e. a superdomain with an odd involution, say $ \nu $, on their structure sheaf considered as a sheaf of $ C^\infty_{\mathbb{R}^m} $-modules.\
**Keywords.** supermanifolds, supergrassmannians, super vector bundles.
address:
- 'Department of Mathematics, Institute for Advanced Studies in Basic Sciences (IASBS), No. 444, Prof. Yousef Sobouti Blvd. P. O. Box 45195-1159 Zanjan Iran, Postal Code 45137-66731'
- 'Department of Mathematics, Institute for Advanced Studies in Basic Sciences (IASBS), No. 444, Prof. Yousef Sobouti Blvd. P. O. Box 45195-1159 Zanjan Iran, Postal Code 45137-66731'
- 'Department of Mathematics, Institute for Advanced Studies in Basic Sciences (IASBS), No. 444, Prof. Yousef Sobouti Blvd. P. O. Box 45195-1159 Zanjan Iran, Postal Code 45137-66731'
author:
- 'F. Bahadorykhalily'
- 'M. Mohammadi'
- 'S. Varsaie'
title: A Novel Supergeometric Generalization of Grassmannians
---
Introduction {#int .unnumbered}
============
Many different constructions in common geometry have found proper analogues in supergeometry such as tangent vectors, tangent bundles, vector bundles, differential forms, etc. But Chern classes has not found a satisfactory generalization in supergeometry. The Chern classes are cohomology elements which may be associated to isomorphism classes of vector bundles. In physics, these classes are related to special sort of quantum numbers called topological charges [@last]. These classes may be defined by homotopy classification of vector bundles approach.
From this approach, one may see that for generalizing the Chern classes, it is necessary to generalize Grassmannians as well as homotopy classification of vector bundles theorem. There exists a well known generalization of Grassmanian to supergeometry, called supergrassmanian. Supergrassmannian, introduced in [@f41] and Grassmannian, in some sense, are homotopy equivalent. Therefore, cohomology group associated to supergrassmannian is equal to that of Grassmannian. In other words, the former group contains no information about superstructure. For more information see [@Afshari]. But there is a different generalization called $ \nu $-Grassmanian, c.f. section , which plays a main role for homotopy classification of super vector bundles. In addition, through $ \nu $-Grassmanians, one may associate an element in $ \mathbb{Z}_2 $- graded cohomology group to each isomorphism class of super vector bundles. These elements may be considered as analogues of Chern classes in super geometry. To see these results in special cases for $ \nu $-projective spaces refer to [@Afshari], [@Roshandel], [@v3] and [@v5].
In this paper, we deal with introduction and construction of $ \nu $-Grassmanians. Other relevant results such as homotopy classification of super vector bundles or $ \mathbb{Z}_2 $- graded cohomology group associated to isomorphism class of super vector bundles will be discussed in forthcoming papers.
In this paper, the first section contains a brief summary of supermanifolds and also $\nu$-domains. Proposition shows that an odd involution always exists.
In section \[sec2\], we introduce $\nu$-Grassmannians as a generalization of the Grassmannians. For this, we construct a $\nu $-Grassmannian by gluing $ \nu $-domains. The existence of a canonical super vector bundle over a $ \nu $-Grassmannian is showed in Theorem .
Preliminaries {#pre}
=============
A supermanifold of dimension $ m|n $ is a superspace, namely $ (X,\mathcal{O}) $, which is locally isomorphic to a superdomain $ (\mathbb{R}^m, C^\infty_{\mathbb{R}^m} \otimes \wedge \mathbb{R}^n) $, where by $ C^\infty_{\mathbb{R}^m} $ we mean the sheaf of smooth functions on $ \mathbb{R}^m $. Let $ \mathcal{O}= \mathcal{O}_0 \oplus \mathcal{O}_1 $ and let $ a $ be an element of $ \mathcal{O}_{\delta} $; then $a$ is called a homogeneous element of degree $ p(a)=\delta $. A morphism between two supermanifolds, $ (X, \mathcal{O}_X) $ and $ (Y, \mathcal{O}_Y) $, is a pair $ \psi =(\tilde{\psi}, \psi^*) $ such that $ \tilde{\psi}: X \rightarrow Y $ is a continuous map and $ \psi^* :\mathcal{O}_Y \rightarrow \psi_*(\mathcal{O}_X) $ is a morphism between sheaves of super commutative local rings.
Let $ \mathcal{J}_X $ be the sheaf of nilpotents in $ \mathcal{O}_X $. Obviously, $ \mathcal{J}_X $ is a sheaf of ideals in $ \mathcal{O}_X $. Thus $ \tilde{\mathcal{O}}_X:=\dfrac{\mathcal{O}_X}{\mathcal{J}_X} $ is a sheaf of rings and is isomorphic to $ C^\infty_X $. Thus $ (X,\tilde{\mathcal{O}}_X) $ is a common smooth manifold and is called **reduced manifold** associated to $ (X,\mathcal{O}_X) $.
By a $ \nu $- domain, we mean a superdomain $ (\mathbb{R}^m, C^\infty_{\mathbb{R}^m} \otimes \wedge \mathbb{R}^n) $ with an odd involution, say $ \nu $, on the structure sheaf considered as a sheaf of $ C^\infty_{\mathbb{R}^m} $-modules, i.e. $$\nu^2=1.$$ A superdomain $ \mathbb{R}^{m|n}=(\mathbb{R}^m, C^\infty_{\mathbb{R}^m}\otimes \wedge \mathbb{R}^n) $ is a $ \nu $-domain if and only if its structure sheaf carries a $C^{\infty}_{\nu_0}$-module structure where $ C^{\infty}_{\nu_0}=C^{\infty}_{\mathbb R}[\nu_0]$ is a ring generated by $\nu_0$ such that $$\nu_0^2=1, \; \nu_0(\wedge^o \mathbb{R}^n)\subseteq C^{\infty}(\mathbb{R}^m)|_0\otimes\wedge^e \mathbb{R} , \; \nu_0(\wedge^e \mathbb{R}^n)\subseteq C^{\infty}(\mathbb{R}^m)|_0\otimes\wedge^o \mathbb{R}$$ where $ \wedge ^{\circ}\mathbb{R}^n= \sum \wedge^{2t+1}\mathbb{R}^n $ and $ \wedge^e \mathbb{R}^n=\sum \wedge^{2t} \mathbb{R}^n $ are odd and even parts of the $\mathbb{Z}_2$-graded ring $ \wedge \mathbb{R}^n $ respectively. Indeed, if $\mathbb{R}^{m|n}$ is a $\nu$-domain then for each element $p$ in $\wedge{\mathbb R}^n$, set $\nu_0 p:= \nu(p)$. Let $\mathbb{R}_{\nu}^{m|n}$ denote a $\nu$- domain. In the next proposition, the existence of such an involution is shown. For more details see [@v4].
\[prop1.1\] for $ n\geq 1 $, every superdomain $ \mathbb{R}^{m|n} $ is a $ \nu $- domain.
Obviously, $ \wedge \mathbb{R}^n $, as a real super vector space, has an ordered basis, say $ \mathcal{B} $, which its first $ 2^{n-1} $ elements are even and the others are odd. One may easily show the existence of an odd linear transformation $ T:\wedge \mathbb{R}^n \rightarrow \wedge \mathbb{R}^n $ with the following properties: $$T(\wedge^o \mathbb{R}^n)\subset \wedge^e \mathbb{R}^n, \ T(\wedge^e \mathbb{R}^n) \subset \wedge^o \mathbb{R}^n, \ T^2=id.$$ Indeed, let $ A $ be an invertible matrix of rank $ 2^{n-1} $ and let $ T $ be the unique linear transformation with matrix representation in the ordered basis $ \mathcal{B} $, as follows: $$\left[
\begin{array}{c|c}
0 & A \\
\hline
A^{-1} & 0
\end{array}
\right].$$ Now, consider the odd linear transformation $ \nu:C^\infty_{\mathbb{R}^m}\otimes \wedge \mathbb{R}^n \rightarrow C^\infty_{\mathbb{R}^m}\otimes \wedge \mathbb{R}^n $ defined by $$a \otimes b \longmapsto a \otimes T(b); \ a\in C^\infty_{\mathbb{R}^m}, b \in \wedge \mathbb{R}^n .$$ Obviously, $ \nu $ is an odd involution on the sheaf $ C^\infty_{\mathbb{R}^m}\otimes \wedge \mathbb{R}^n $.
Construction of $\nu$-Grassmannian {#sec2}
==================================
By a $\nu$-Grassmannian, denoted by $_\nu G_{k|l}(m|n) $, we mean a supermanifold which is constructed by gluing $\nu$-domains $ \big(\mathbb{R}^{\alpha}, C^{\infty}_{\mathbb{R}^{\alpha}} \otimes \wedge \mathbb{R}^{\beta} \big) $ where $ \alpha=k(m- k)+ l(n-l) $ and $ \beta=l(m- k)+k(n- l) $.\
Let $I\subset \{1, \cdots, m \}$ and $ R \subset \{1, \cdots, n\}$ be sorted subsets in ascending order, with $ p $ and $ q $ elements respectively such that $p+q=k+l$. The elements of $ I $ are called even indices and the elements of $ R $ are called odd indices. In this case, $I|R$ is called a $p|q$-index. Set $U_{I|R}=\mathbb{R}^{\alpha}, \mathcal{O}_{I|R}=\, C^{\infty}_{\mathbb{R}^{\alpha}}\otimes \wedge \mathbb{R}^{\beta}.$ If $ p=k $ then $ I|R $ is called a **standard index** and $ (U_{I|R},O_{I|R}) $, or $ U_{I|R} $ for brevity, is called a **Standard domain** and otherwise they are called **non standard index** and **non standard domain** respectively. Decompose any even super matrix into four blocks, say $ B_1, B_{2}, B_3, B_4 $. Upper left and lower right blocks, $ B_1, B_4 $ are $ k\times m $ and $ l\times n $ matrices respectively. They are called even blocks. Upper right and lower left blocks, $ B_2, B_3 $ are $ k\times n $ and $ l\times m $ matrices. They are called odd blocks. In addition, by even part we mean the blocks $ B_1, B_3 $ and by odd parts we mean the blocks $ B_2, B_4 $. Blocks, $ B_1, B_4 $ are filled with even elements and blocks, $ B_2, B_3 $ are filled with odd elements. By **divider line**, we mean the line which separates odd and even parts.
Let each domain $ U_{I|R} $ be labeled by an even $ k|l\times m|n $ supermatrix, say $ A_{I|R} $ with four blocks, $ B_1, B_{2}, B_3, B_4 $ as above. Except for columns with indices in $ I \cup R $, which together form a minor denoted by $ M_{I|R}(A_{I|R}) $, the even and odd blocks are filled from up to down and left to right by $ x_a^I, e_b^I $, the even and odd coordinates of $ U_{I|R} $ respectively, i.e. $ (x^I_a)_{1\leq a\leq \alpha} $ is a coordinate system on $ \mathbb{R}^\alpha $ and $ \{e^I_b\}_{1\leq b\leq \beta} $ is a basis for $\mathbb{R}^{\beta} $. This process imposes an ordering on the set of coordinates. If $ p=k $ then $ M_{I|R}A_{I|R} $ is supposed to be an identity matrix.
Let $ I|R $ and $ J|S $ be two standard indices and let $ M_{J|S}(A_{I|R}) $ be the minor consisting of columns of $ A_{I|R} $ with indices in $ J\cup S $. By $ U_{{I|R},{J|S}} $ we mean the set of all points of $ U_{I|R} $, on which $ M_{J|S}(A_{I|R}) $ is invertible. Obviously $ U_{{I|R},{J|S}} $ is an open set.
For example, let $ I=\{2\}, R=\{1,3\} $ and let $ I|R $ be a $ 1|2 $-index in $ _\nu G_{1|2}(3|3) $. In this case, the set of coordinates of $\mathcal{O}_{I|R} $is $$\lbrace x_1, x_2, x_3, x_4; e_{1}, e_{2}, e_{3}, e_{4}, e_{5}\rbrace$$,
and $ A_{I|R} $ is: $$\left[
\begin{array}{ccc|ccc}
x_1 & 1 & x_2 & 0 & e_5 & 0 \\
\hline
e_1 & 0 & e_3 & 1 & x_3 & 0 \\
e_2 & 0 & e_4 & 0 & x_4 & 1 \\
\end{array}
\right].$$ Thus $ \{x_1, e_1, e_2, x_2, e_3, e_4, e_5, x_3, x_4\} $ is the corresponding total ordered set of generators.
If $ p\neq k $, then $ M_{I|R}(A_{I|R}) $ is a $ k|l\times p|q $ supermatrix as follows:\
Let $ M_{I|R}(A_{I|R}) $ be partitioned into four blocks $ B_i, i=1,2, 3, 4 $, as above. All entries of this supermatrix except diagonal entries are zero. In addition, diagonal entries are equal to 1 if they place in $ B_1 $ and $ B_4 $ and are equal to $ 1\nu $ if they place in $ B_2 $ and $ B_3 $, where $ 1\nu $ is a formal symbol. One may consider it as 1 among odd elements. Nevertheless we learn how to deal with it as we go further. Such supermatrix is called a **non-standard identity**. All places in $ A_{I|R} $ except for $ M_{I|R}(A_{I|R}) $ are filled by coordinates $ x^I $ and $ e^I $ according to the ordering, as stated above, from up to down and left to right. In this process, if an even element, say $ x $, places in odd part then it is replaced by $ \nu(x) $ and if an odd element, say $ e $, places in even part then it is replaced by $ \nu(e) $.
As an example, consider $ _\nu G_{1|2}(3|3) $ and let $ I=\emptyset, R=\{1,2,3\} $, so $ I|R $ is an $ 0|3 $-index. In this case, $ A_{I|R} $ is as follows: $$\left[
\begin{array}{ccc|ccc}
x_1 & x_2 & \nu(e_5) & 1\nu & 0 & 0 \\
\hline
e_1 & e_3 & \nu(x_3) & 0 & 1 & 0 \\
e_2 & e_4 & \nu(x_4) & 0 & 0 & 1 \\
\end{array}
\right].$$ Also if $ J=\{2,3\}, S=\{1\} $, then $ J|S $ is a $2|1$-index and $A_{J|S}$ is as follows: $$\left[
\begin{array}{ccc|ccc}
x_1 & 1 & 0 & 0 & \nu(x_2) & e_5 \\
\hline
e_1 & 0 & 1\nu & 0 & \nu(e_3) & x_3 \\
e_2 & 0 & 0 & 1 & \nu(e_4) & x_4 \\
\end{array}\right].$$ Now, let us start by constructing morphisms $g_{I|R,J|S}$ through which the $ \nu $- domains $ U_{I|R} $ may be glued together. Set $$\label{equg}
g_{I|R,J|S} =(\tilde{g}_{I|R,J|S}, g^*_{I|R,J|S}): (U_{I|R,J|S}, \mathcal{O}_{I|R}|_{U_{I|R,J|S}}) \rightarrow (U_{J|S,I|R},\mathcal{O}_{J|S}|_{U_{J|S,I|R}}).$$ First of all we introduce $ g^*_{{I|R}.{J|S}} $. For this, we should consider two cases:
1. If both domains are standard domains, then the transition map $$g^*_{I|R,J|S}: \mathcal{O}_{J|S}|_{U_{J|S,I|R}}\rightarrow \mathcal{O}_{I|R}|_{U_{I|R,J|S}},$$ is obtained from the pasting equation: $$D_{J|S}\bigg(\big(M_{J|S}(A_{I|R})\big)^{-1}A_{I|R}\bigg)=D_{J|S}A_{J|S}.$$ Where $ D_{J|S}A_{J|S} $ is a matrix which remains after omitting $ M_{J|S}(A_{J|S}) $. This equation defines $ g^*_{{I|R} ,{J|S}} $, for each entry of $ D_{J|S}(A_{J|S}) $, to be a rational expression in generators of $ \mathcal{O}_{I|R} $. This determines $ g^*_{{I|R},{J|S}} $ as a unique morphism ([@f31], Theo. 4.3.1). Clearly, this map is defined whenever $ M_{J|S}(A_{I|R}) $ is invertible.
2. Let $ U_{I|R} $ be an arbitrary domain, and $ U_{J|S} $ be a non-standard domain, and let $ A_{I|R} $ and $ A_{J|S} $ be their labels respectively. Moreover, let $ J|S $ be a $ p|q $-index such that $ p\neq k $. In this case, $M_{J|S}(A_{I|R})$ is a $ k|l\times p|q $ matrix. Let $ M'_{J|S}(A_{I|R}) $ be a $ k|l\times k|l $ supermatrix associated to $ M_{J|S}(A_{I|R}) $ as follows:\
Consider the columns of non-standard identity $ M_{J|S}A_{J|S} $ which contains $ 1\nu $. Move the columns in $ M_{J|S}(A_{I|R}) $ with the same indices as the columns in $ M_{J|S}(A_{J|S}) $ which contain $ 1\nu $ to another side of the divider line of $ M_{J|S}(A_{I|R}) $ and replace each entry, say $ a $, in these columns with $ \nu(a) $. The resulting matrix is denoted by $ M'_{J|S}(A_{I|R}) $.
For example in $_\nu G_{1|2}(3|3)$ suppose $I=\{2\}, R=\{1,3\}, J=\{2,3\}, S=\{1\}$ , so $ I|R $ is a $1|2$-index and $J|S$ is a $2|1$-index. We have $$A_{I|R}=\left[
\begin{array}{ccc|ccc}
x_1 & 1 & x_2 & 0 & e_5 & 0 \\
\hline
e_1 & 0 & e_3 & 1 & x_3 & 0 \\
e_2 & 0 & e_4 & 0 & x_4 & 1 \\
\end{array}
\right], \quad
A_{J|S}=\left[
\begin{array}{ccc|ccc}
x_1 & 1 & 0 & 0 & \nu(x_2) & e_5 \\
\hline
e_1 & 0 & 1\nu & 0 & \nu(e_3) & x_3 \\
e_2 & 0 & 0 & 1 & \nu(e_4) & x_4 \\
\end{array}\right],$$ $$M_{J|S}A_{I|R}=\left[
\begin{array}{cc|c}
1 & x_2 & 0 \\
\hline
0 & e_3 & 1 \\
0 & e_4 & 0 \\
\end{array}
\right], \qquad
M'_{J|S}A_{I|R}=\left[
\begin{array}{c|cc}
1 & \nu x_2 & 0 \\
\hline
0 & \nu e_3 & 1 \\
0 & \nu e_4 & 0 \\
\end{array}
\right].$$ Let $ I|R $ be a standard index and $ J|S $ be a non standard index and let $M'_{J|S}(A_{I|R})$ be as above. By $ U_{{I|R},{J|S}} $ we mean the set of all points of $ U_{I|R} $, on which $ M'_{J|S}(A_{I|R}) $ is invertible. Obviously, $ U_{{I|R},{J|S}} $ is an open set.
Now, we can define a coordinate transformation: $$g^*_{I|R,J|S}: \mathcal{O}_{J|S}|_{U_{J|S,I|R}}\rightarrow \mathcal{O}_{I|R}|_{U_{I|R,J|S}}.$$ This map is obtained from the following equation: $$D_{J|S}\bigg(\big(M'_{J|S}(A_{I|R})\big)^{-1}A_{I|R}\bigg)=D_{J|S}A_{J|S}.$$ It can be shown that the sheaves on $ U_{I|R}$ and $U_{J|S} $ can be glued through these maps. By ([@f31], page 135), we have to show the next proposition.
\[prop1\] Let $ g^*_{I|R, J|S} $ be as above, then $$\begin{aligned}
&1.\, g^*_{I|R,I|R}=id.\\
&2.\, g^*_{I|R,J|S}\circ g^*_{J|S,I|R}=id.\\
&3.\, g^*_{I|R,J|S}\circ g^*_{J|S,T|P}\circ g^*_{T|P,I|R}=id.
\end{aligned}$$
1. For the first equation, note that the map $ g^*_{I|R,I|R} $ is obtained from the equation $$D_{I|R}\bigg((M'_{I|R}A_{I|R})^{-1}A_{I|R}\bigg)=D_{I|R}A_{I|R}.$$ In this equality, for each $ I|R $, the matrix $ M'_{I|R}A_{I|R} $ is identity. So we have the following equality: $$D_{I|R}A_{I|R}=D_{I|R}A_{I|R}.$$ This shows that $ g^*_{{I|R},{I|R}}= id $.
2. For the second equality, let $ J|S $ be a $ p|q $-index such that $ p\neq k $. Assume $ p>k $, so $ g^*_{I|R,J|S} $ is defined by the pasting equality: $$D_{J|S}\bigg((M'_{J|S}A_{I|R})^{-1}A_{I|R}\bigg)=D_{J|S}A_{J|S}.$$ For brevity, we use $ Z $ instead of $ M'_{J|S}A_{I|R} $, we get $$D_{J|S}(Z^{-1}A_{I|R})=D_{J|S}A_{J|S}.$$ By $ [A_{I|R}]_{J|S} $ we mean a matrix which is obtained from $ A_{I|R} $ after replacing $ M_{J|S}A_{I|R} $ with a non- standard identity.\
One may see that $ g^*_{I|R,J|S}\circ g^*_{J|S,I|R} $ is obtained by the following equality: $$\label{eq1}
\bigg({M^\prime}_{I|R}\bigg[Z^{-1}A_{I|R}\bigg]_{J|S}\bigg)^{-1}D_{I|R}\bigg[Z^{-1}A_{I|R}\bigg]_{J|S}=D_{I|R}A_{I|R}.$$ If $ C_t, 1\leq t\leq m+n $, denotes the t-th column of $ A_{I|R} $, then $$Z:= M^{\prime}_{J|S}A_{I|R}=[C_{j_1},C_{j_2}, \cdots, C_{j_k}|\nu C_{j_{k+1}},\cdots, \nu C_{j_p},C_{s_1},
C_{s_2},\cdots, {C}_{s_q}],$$ where $I=\{j_1, ..., j_p\}$ and $R=\{s_1, ..., s_q\}$. Therefore the supermatrix $ \big[Z^{-1}A_{I|R}\big]_{J|S} $ is as follows: $$\begin{gathered}
\big[Z^{-1}C_1,\cdots, Id_{j_1},\cdots, Id_{j_k}, Id_{j_{k+1}},\cdots,Id_{j_p}, \cdots, Z^{-1}C_m \big\vert\\
Z^{-1}C_{m+1},\cdots, Id_{s_1}, \cdots, Id_{s_q},\cdots, Z^{-1}C_{m+n}\big].
\end{gathered}$$ where $ Id_{j_r} $ is a columnar supermatrix with the only one nonzero entry equals $ 1 $ on $ r $-th row if $ 1\leq r\leq k $, and equals $ 1\nu $ if $ k+1\leq r\leq p $. In addition, $Id_{s_t}$ is a columnar supermatrix with the only one nonzero entry equals to $ 1 $ on the $ (k+t)- th $ row for each $ 1\leq t\leq q $. So one has $$\begin{gathered}
\big[Z^{-1}A_{I|R}\big]_{J|S}= Z^{-1}[C_1, \cdots, Z(Id_{j_1}), \cdots, Z(Id_{j_k}), \cdots, Z(Id_{j_p}), \cdots, C_m \big\vert\\
C_{m+1}, \cdots, Z(Id_{s_1}), \cdots, Z(Id_{s_q}),\cdots, C_{m+n}].
\end{gathered}$$ Due to the definition of $Id_{j_r}$ and $Id_{s_t}$ and also the following rule: $$z.{1\nu} = \nu(z),$$ where $z$ is an arbitrary element of $\mathcal O$. The following equalities hold:
&Z(Id\_[j\_]{})=C\_[j\_]{} ,1k,\
&Z(Id\_[j\_[r]{}]{})=(C\_[j\_[r]{}]{})1=C\_[j\_[r]{}]{},k+1r p,\
&Z(Id\_[s\_t]{})=C\_[s\_t]{},1t q.
Therefore, we have: $$[Z^{-1}A_{I|R}]_{J|S}=Z^{-1}A_{I|R}.$$ So for the left side of equation , one has $$\begin{aligned}
\bigg(M'_{I|R}\big[Z^{-1}A_{I|R}\big]_{J|S}\bigg)^{-1} & D_{I|R}\big[Z^{-1}A_{I|R}\big]_{J|S}\\ & =\bigg(M'_{I|R}(Z^{-1}
A_{I|R})\bigg)^{-1}D_{I|R}(Z^{-1}A_{I|R})\\
& = \bigg(Z^{-1}M'_{I|R}A_{I|R}\bigg)^{-1}Z^{-1}D_{I|R}A_{I|R}\\ & =\bigg(M'_{I|R}A_{I|R}\bigg)^{-1}Z
Z^{-1}D_{I|R}A_{I|R}=D_{I|R}A_{I|R}.
\end{aligned}$$ It follows that the map $ g^*_{I|R,J|S}\circ g^*_{J|S,I|R} $ is identity.
3. To prove the third equality, it is sufficient to show that the map $ g^*_{I|R,J|S}og^*_{J|S,T|P} $ is defined by the following equation: $$D_{T|P}((M'_{T|P}A_{I|R})^{-1}A_{I|R})=D_{T|P}A_{T|P} .$$ Note that the map $ g^*_{I|R,J|S} $ is obtained by $$\label{eq2}
(M'_{J|S}A_{I|R})^{-1}D_{J|S}A_{I|R}=D_{J|S}A_{J|S}.$$ So replacing $ A_{J|S} $ by the left hand side of in pasting equality defining $ g^*_{{J|S} , {T|P}} $ and by setting $ Z:= M'_{J|S}A_{I|R} $, one gets $$D_{T|P}(M'_{T|P}[Z^{-1}A_{I|R}]_{J|S})^{-1}[Z^{-1}A_{I|R}]_{J|S})=D_{T|P}A_{T|P}.$$ An analysis similar to that in case 2 shows that $ [Z^{-1}A_{I|R}]_{J|S}=Z^{-1}A_{I|R} $. Hence, we have
& (M’\_[T|P]{}(Z\^[-1]{}A\_[I|R]{}))\^[-1]{}D\_[T|P]{}(Z\^[-1]{}A\_[I|R]{})=\
& (Z\^[-1]{}M’\_[T|P]{}A\_[I|R]{})\^[-1]{}Z\^[-1]{}D\_[T|P]{}A\_[I|R]{}=\
& (M’\_[T|P]{}A\_[I|R]{})\^[-1]{}ZZ\^[-1]{}D\_[T|P]{}A\_[I|R]{}=\
& D\_[T|P]{}((M’\_[T|P]{}A\_[I|R]{})\^[-1]{}A\_[I|R]{}).
Finally, this calculation shows that the composition $g^*_{I|R,J|S}og^*_{J|S,T|P}$ is obtained by $$D_{T|P}((M'_{T|P}A_{I|R})^{-1}A_{I|R})=D_{T|P}A_{T|P},$$ and it completes the proof.
In the next lemma, we specify $ \tilde{g}_{I|R,J|S} $, the map which is introduced in .
\[lem2.2\] Let $g^*_{I|R,J|S}$ be the gluing morphism between $\mathcal{O}_{J|S}|_{U_{{J|S},{I|R}}}$ and $\mathcal{O}_{I|R}|_{U_{{I|R},{J|S}}}$. Then, there is a morphism $(\tilde{g}_{I|R,J|S},\tilde{g}^*_{I|R,J|S})$ between $(U_{{I|R},{J|S}}, C^{\infty}_{I|R}|_{U_{{I|R},{J|S}}})$ and $(U_{{J|S},{I|R}}, C^{\infty}_{J|S}|_{U_{J|S,I|R}})$ induced by $g^*_{I|R,J|S}$ such that $\tilde{g}_{I|R,J|S}$ is a map from $U_{{I|R},{J|S}}$ to $U_{{J|S},{I|R}}$.
Since $ g_{I|R,J|S}^* $ is a morphism between sheaves of rings, we have $$g_{I|R,J|S}^* (\mathcal{J}_{J|S}) \subset \mathcal{J}_{I|R},$$ where $ \mathcal{J} $ is the sheaf of nilpotent elements of $ \mathcal{O} $. So $ g_{I|R,J|S}^* $ induces the following map $$\bar{g}_{I|R,J|S}^*: \frac{\mathcal{O}_{J|S}}{\mathcal{J}_{J|S}}\bigg|_{U_{{J|S},{I|R}}} \longrightarrow \frac{\mathcal{O}_{I|R}}{\mathcal{J}_{I|R}}\bigg|_{U_{{I|R},{J|S}}}.$$ On the other hand, one has the following isomorphism: $$\begin{aligned}
\tau_{I|R}: & \frac{\mathcal{O}_{I|R}}{\mathcal{J}_{I|R}} \rightarrow C^{\infty}_{I|R},\\
& s+\mathcal{J}_{I|R} \longmapsto \tilde{s},
\end{aligned}$$ where $ \tilde{s}(x) $, for $ x \in U_{I|R} $, is a unique real number such that $ s- \tilde{s}(x) $ is not invertible in $ \mathcal{O}(U) $ for all open neighborhoods $U$ of $x$. So one may consider the composition $ \tilde{g}^*_{{I|R},{J|S}}= \tau_{I|R}\circ
\bar{g}^*_{{I|R},{J|S}}\circ \tau_{J|S}^{-1} $ as a map between sheaves of rings of smooth functions $ C^{\infty}_{J|S} $ and $ C^{\infty}_{I|R} $. Thus, there is a smooth map $ \tilde{g}_{I|R,J|S}: U_{I|R} \rightarrow U_{J|S} $ such that $ \tilde{g}_{I|R,J|S}^*(f)= f \circ \tilde{g}_{I|R,J|S} $ for each $ f\in C^{\infty}_{J|S} $ (c.f [@f31]).
If $ (\mathcal{X},\mathcal{O}) $ is the ringed space which is constructed by gluing $ (U_{I|R},\mathcal{O}_{I|R}) $ through $ g_{I|R,J|S} $ then the reduced manifold associated to it, i.e. $ (\mathcal{X},\tilde{\mathcal{O}}) $, is a manifold diffeomorphic to $ G_k(\mathbb{R}^m)\times G_l(\mathbb{R}^n) $.
Before proving the proposition, we need the following lemma.
\[lem1\] There exists an injective immersion from $ \mathcal{X} $ to $ G_{k+l}(\mathbb{R}^{m+n}) $.
First, note that $ \mathcal{X} $ is constructed by gluing $\nu$-domains $U_{I|R}$ through $\tilde{g}_{{I|R},{J|S}}$. The elements of $ U_{I|R} $ may be denoted by a $(k+l)\times (m+n-k-l)$ matrix as follows: $$\left[
\begin{array}{cc}
X_I & 0 \\
0 & X_R
\end{array}
\right].$$ Now suppose that $ V_{\tilde{J}} $ is an open neighborhood in $ G_{k+l}(\mathbb{R}^{m+n}) $ where $ \tilde{J}\subset \{1, \cdots , m+n \} $ is a multi index with k+l elements. We are going to define a map $ \psi_{I|R,\tilde{J}}:U_{I|R}\longrightarrow V_{\tilde{J}} $.\
For this purpose, first decompose $ \tilde{J} $ into two parts, namely $J, S$ as follows:
Suppose that $ j_r $ is the largest element in $ \tilde{J} $ smaller than or equal to $ m $. Set $$J:=\{j\in \tilde{J}, j<j_r\}, \qquad
S:= \tilde{J}\backslash J.$$ To define $ \psi_{I|R,\tilde{J}} $, suppose that $ X\in U_{I|R} $ and $ A_{I|R} $ be the label associated with $ U_{I|R} $. Now $ \psi_{I|R,\tilde{J}}:U_{I|R}\longrightarrow V_{\tilde{J}} $ can be defined as a map with component functions to be the same as entries of the following matrix: $$D_{J|S}\big( (M_{J|S}\nu''A_{I|R})^{-1}\nu''A_{I|R}\big),$$ where $ \nu'' $ is a map which is defined on homogenous element, say $ a $, by $ \nu''a= \widetilde{\nu^{p(a)}a} $. By $ \nu'' A_{I|R} $, we mean the matrix $ (\nu''a_{ij}) $ where $ A_{I|R}= (a_{ij}) $.\
It can be shown that the following diagram is commutative $$\xymatrix{
U_{I|R} \ar[d]_{\tilde{g}_{I|R,I'|R'}} \ar[r]^{\psi_{I|R,\tilde{J}}} & V_{\tilde{J}} \ar[d]^{\theta_{\tilde{J},\tilde{J'}}} \\
U_{I'|R'}\ar[r]^{\psi_{I'|R',\tilde{J'}}} & V_{\tilde{J'}} }$$ where $ \theta_{\tilde{J},\tilde{J'}} $ is the transition map which defines the rule for changing coordinates on $ G_{k+l}(\mathbb{R}^{m+n}) $ and $ \tilde{g}_{I|R,I'|R'} $ is introduced in lemma . To this end, first, we compute component functions of the map $ \theta_{\bar{J}, \bar{J}'}\circ \psi_{{I|R},\bar{J}} $. These are the entries of the following matrix: $$\begin{aligned}
& D_{J'|S'}\Bigg(\bigg(M_{J'|S'}\big((M_{J|S}\nu'' A_{I|R})^{-1}\nu'' A_{I|R}\big)\bigg)^{-1}(M_{J|S}\nu'' A_{I|R})^{-1}\nu'' A_{I|R}\Bigg)\\
& = D_{J'|S'}\bigg(\big((M_{J|S}\nu'' A_{I|R})^{-1}(M_{J'|S'}\nu'' A_{I|R})\big)^{-1}(M_{J|S}\nu'' A_{I|R})^{-1}\nu'' A_{I|R}\bigg)\\
&= D_{J'|S'}\bigg((M_{J'|S'}\nu'' A_{I|R})^{-1}(M_{J|S}\nu'' A_{I|R})(M_{J|S}\nu'' A_{I|R})^{-1}\nu'' A_{I|R}\bigg)\\
&= D_{J'|S'}\bigg((M_{J'|S'}\nu'' A_{I|R})^{-1}\nu'' A_{I|R}\bigg).
\end{aligned}$$ Now, we are going to compute the following composition: $$\psi_{{I'|R'},\tilde{J}'}\circ \tilde{g}_{{I|R}{I'|R'}}.$$
First, note that the component functions of $ \tilde{g}_{{I|R},{I'|R'}} $ are among the entries of the matrix $ \widetilde{(M_{I'|R'} A_{I|R})}^{-1} \nu'' A_{I|R} $. Thus the definition of the $ \psi_{{I'|R'},\tilde{J}'} $ implies that the component functions of the composition are the entries of the following matrix: $$\begin{aligned}
& D_{J'|S'}\Bigg( \bigg(M_{J'|S'}\big( \widetilde{(M_{I'|R'}\nu'' A_{I|R})}^{-1}\nu''A_{I|R}\big)\bigg)^{-1}\widetilde{(M_{I'|R'}\nu'' A_{I|R})}^{-1}\nu''A_{I|R}\Bigg)\\
= & D_{J'|S'}\bigg((M_{J'|S'}\nu'' A_{I|R})^{-1}\nu'' A_{I|R}\bigg).
\end{aligned}$$ This shows that the above diagram commutes. Commutativity shows that $ \psi_{I|R,\tilde{J}} $ is a coordinate representation of a map, say $ \psi $, from $ \mathcal{X} $ to $ G_{k+l}(\mathbb{R}^{m+n}) $.
Now, we show that the map $ \psi:\mathcal{X}\to G_{k+l}(\mathbb{R}^{m+n}) $ is 1-1 immersion.
This is obvious that each $\psi_{I|R,\tilde{J}}$ is smooth, so $ \psi $ is a smooth map. The left inverse of $ \psi $ is a map which its component functions are among the entries of the following matrix: $$ D_{I|R} \bigg((M_{I|R}\{Y\}_{J|S})^{-1}\{Y\}_{J|S}\bigg),$$ where $ \{Y\}_{J|S} $ is a matrix constructed by adding $ k+l $ columns with indices in $ J\cup S $ to $ Y $ which together form an identity matrix. This map is smooth and $ \chi_{\tilde{J},I|R} \circ \psi_{I|R,\tilde{J}} =Id_{U_{I|R}} $. So $ \psi $ is a 1-1 immersion.
Consider the imbedding $$\Lambda :G_k(\mathbb{R}^m)\times G_l(\mathbb{R}^n) \rightarrow G_{k+l}(\mathbb{R}^{m+n}),$$ which is defined locally by $ \Lambda (P,Q)= \pi_1(P)+ \pi_2(Q) $ where $ \pi_1:G_k(m)\to G_{k+l}(m+n)$ and $\pi_2:G_l(n)\to G_{k+l}(m+n) $ are the maps induced by maps $\mathbb{R}^m\to \mathbb{R}^{m+n}$ with $ (a_1, \cdots, a_m)\mapsto (a_1, \cdots, a_m, 0, \cdots,0) $ and $ \mathbb{R}^n\to \mathbb{R}^{m+n}$ with $(a_1, \cdots, a_n)\mapsto (0, \cdots, 0,a_1, \cdots, a_n) $ respectively.
It is easy to see that $ \Lambda $ is an embedding and $ \Lambda (G_k(\mathbb{R}^m)\times G_l(\mathbb{R}^n)) $ is equal to the image of $ \mathcal{X} $ under $ \psi $. So there exists a unique diffeomorphism $ \bar{\Lambda}: \mathcal{X} \rightarrow G_k(\mathbb{R}^m)\times G_l(\mathbb{R}^n) $ such that $ \Lambda \circ \bar{\Lambda}= \psi $.
By a super vector bundle of rank $ k|l $ on a supermanifold $ (X,\mathcal{O}) $, we mean a locally free sheaf of $ \mathcal{O} $-modules of rank $ k|l $.
\[thm\] There exists a canonical $ k|l $-super vector bundle over $ _\nu G_{k|l}(m|n) $.
On every neighborhood $ U_{I|R}$, one may define a sheaf of $ \mathcal{O}_{I|R} $- modules of rank $ k|l $ as $$\mathcal{O}_{I|R}\otimes_{\mathbb{R}}\left\langle A^1_{I|R}, \cdots, A^{k+l}_{I|R} \right\rangle_{\mathbb{R}},$$ where by $ A^i_{I|R} $ we mean $ i $-th row of $ A_{I|R} $ and also $ \left\langle A^1_{I|R}, \cdots, A^{k+l}_{I|R} \right\rangle_{\mathbb{R}} $ is a supervector space on $ \mathbb{R} $ generated by $ A^1_{I|R}, \cdots, A^{k+l}_{I|R} $. These sheaves may be glued together through the morphisms $$\eta_{I|R,J|S}:\mathcal{O}_{J|S}|_{U_{{J|S},{I|R}}}\otimes_{\mathbb{R}}\left\langle A^1_{J|S}, \cdots, A^{k+l}_{J|S} \right\rangle_{\mathbb{R}} \longrightarrow \mathcal{O}_{I|R}|_{U_{{I|R},{J|S}}}\otimes_{\mathbb{R}}\left\langle A^1_{I|R}, \cdots, A^{k+l}_{I|R} \right\rangle_{\mathbb{R}},$$ which are defined by $$a\otimes A^i_{J|S}\longmapsto g^*_{{I|R,J|S}}(a)\sum\limits_t m_{it}|_{U_{I|R,J|S}}\otimes A^t_{I|R},$$ where $ m_{it} $ is the entry of $ (M'_{J|S}A_{I|R})^{-1} $ on the $ i $-th row and $ t $-th column. A straight forward computation shows that $ \eta_{{I|R},{J|S}} $ satisfies the conditions of proposition .
This canonical super vector bundle over $_{\nu}G_{k|l}(m|n)$ is denoted by $\Gamma.$ It is worth to know that there exists a $2$-cocycle associated to $\Gamma$ canonically. Indeed, one may set $$h_{{I|R}{J|S}}:=(\nu_\circ)^{p(I|R)+p(J|S)}(M^\prime_{I|R}A_{J|S})^{-1},$$ where $p(I|R) = 0$ if $I|R$ is a standard index and otherwise $p(I|R) = 1$. Moreover, $A_{I|R}$ is the supermatrix associated to the $\nu$-domain $U_{I|R}$. It can be shown that ${h_{{I|R}{J|S}}}$ is a cocycle of open cover $U_{{I|R}{J|S}}$. This shows that $\Gamma$ and eventually $_{\nu}G_{k|l}(m|n)$ are novel things different from the supergrssmannian and its canonical super vector bundle. See [@Roshandel] for more details.
[99]{} =0.5cm
Afshari M. J., Varsaie S. *Universal Super Vector Bundles*,
Manin. Y. I., *Gauge Field Theory and Complex Geometry*, Translated by Kobilts. N., King. J. R., Springer-Verlag., 1988.
Roshandelbana M., Varsaie S. *Analytic Approach To ν-Classes*, arxiv:1801.06633.
Thouless. David J., *Topological Quantum Numbers in Nonrelativistic Physics*,World Scientic, 1998.
Varadarajan. V. S., *Supersymmetry for Mathematicians:An Introduction*, American Mathematical Society, 2004.
Varsaie. S., *$\nu$- Classes*, International Journal of Geometrical Methods in Modern Physics, Vol. 9, No. 4, (2012).
Varsaie. S., *$\nu$- Manifolds*, International Journal of Geometrical Methods in Modern Physics, Vol. 8, No. 6, (2011).
Varsaie. S., *$ \nu $-Projrctive spaces, $ \nu $-Line bundles and Chern classes*,International Journal of Geometric Methods in Modern Physics, Vol. 8, No. 2, (2011).
|
Former Chicago Bulls guard and three-time Duke All-American Jay Williams says it’s about time the NBA gets more progressive when it comes to marijuana.
Continue Reading Below
“It’s easy for doctors to prescribe you Oxycontin and look I was addicted to it for five plus years so I know,” Williams tells FOXBusiness.com. “But when you say marijuana you get a reaction, ahhh, it’s a gateway drug.”
Williams estimates that 75 to 80 percent of athletes use marijuana in the NBA.
“You see pictures of guys in California going in and getting their medical marijuana cards. And I’m not just saying athletes, let’s talk about society. I know a lot of people that use it. It’s something that the whole world is becoming more progressive with. So it’s about time some of these entities do as well,” he adds.
Currently, 23 states have legalized cannabis for medicinal purposes, but the NBA prohibits any type of pot use. According to the National Basketball Association, and its anti-drug agreement, players are subject to four random tests throughout the season, and are conducted by an independent, third-party entity without prior notice to the athlete.
If a player tests positive for marijuana and is convicted of the violation, he will be required to enter the Marijuana Program. A second offense will result in a $25,000 fine and the third will be a five-game suspension.
“I know so many athletes that play on Percocet. Have you ever taken Percocet by the way? It makes you way more groggy than rubbing cannabis oil into your skin,” adds Williams. “It’s demonized in society too. Oh, he’s a pot head. No, I actually just use cannabis oil because it helps with inflammation and takes away some anxiety.”
More on this... Jay Williams on Life After 2nd Pick in NBA Draft
Williams isn’t the only one speaking out about the positive effects of cannabis use. Former NBA player and UConn star Cliff Robinson is also an outspoken supporter of both the medicinal and stress-relieving benefits of the drug. The power forward was suspended twice for using marijuana during his tenure in the NBA and is now an advocate who plans to open up his own marijuana business called “Uncle Cliffy.”
Robinson told the Portland Business Journal in January that he wants to “distill the stigma around cannabis and the misperception that athletes and cannabis are incompatible.”
"When you talk about guys playing at a professional level, there's a lot of physical and mental stress that comes with that,'' he said.“ To have something available to you that has health benefits, I don't see the issue with it myself.''
FOXBusiness.com reached out to The NBA Players Association and they declined to comment.
Williams says the issue is still “taboo” for professional sports leagues because they’re still trying to position their brand in the best possible light.
“I’m not condoning for anyone under 18 to use cannabis or marijuana, but from a medical perspective, it’s about time some of these brands like the NBA and MLB become a little bit more progressive and start thinking forward instead of being held captive in the past.” |
Update on chondrosarcomas.
This paper reviews recent molecular, biologic, developmental therapeutic, and clinical findings in conventional and variant chondrosarcomas. The prognosis of chondrosarcomas traditionally correlates with histologic grade and adequacy of surgery. Newer markers of cell differentiation, activation, genetics, and cell signaling may offer important prognostic information. Translational research has validated platelet-derived growth factor receptor, estrogen signaling, matrix metalloproteinase-1, histone deacetylase, methylthioadenosine phosphorylase, and vascular endothelial growth factor-A as potential therapeutic targets. Bisphosphonates may also possess important antitumoral effects. Molecular studies have established that extraskeletal myxoid chondrosarcoma is a unique entity defined by the presence of a fusion gene between the orphan nuclear receptor, CHN/NOR1, and a promiscuous partner, most commonly EWSR1. Clinical studies have shown that development of second malignancies is an uncommon but real risk for chondrosarcoma survivors; the benefit of chemotherapy for dedifferentiated chondrosarcomas remains questionable; and late recurrences of clear cell chondrosarcomas emphasize the need for long-term follow up. Chondrosarcomas are a heterogeneous group of bone and soft tissue tumors. Recent advances in molecular diagnostics, pathobiology, and developmental therapeutics will aid both scientists and clinicians in improving the classification and therapy of this diverse family of cartilaginous tumors. |
Shardmap
Shardmap is a directory index design by Daniel Phillips who created the HTree and PHTree tree data structures and the Tux3 file system.
A Shardmap index consists of a scalable number of index shards.
Each shard entry maps a hash key to the logical block number of a directory entry block known to contain a name that hashes to that key.
Each shard is represented as an unsorted fifo on disk and a small hash table in memory.
Shardmap scales in two ways:
Rehash a cached shard to a larger number of hash buckets
Reshard a stored shard fifo to divide it into multiple, smaller shards.
These operations are staggered to avoid latency spikes. The reshard operation imposes a modest degree of write multiplication on the Shardmap design, asymptotically approaching a factor of two.
The key ideas of Shardmap are:
The representation of directory data is not the same on media as it is in cache. On media we have fifos, but in cache we have hash tables.
Updating a fifo is cache efficient. Only the tail block of the fifo needs to be present in cache. The cache footprint of the media image of a shardmap is therefore just one disk block per shard.
A small fifo on media is easily loaded and converted to an efficient hash table shard on demand. Once in cache, index updates are performed by updating the cached hash table and appending the same entries to the final block of the shard fifo.
The shardmap implementation in the Tux3 file system uses SipHash hash function designed by Jean-Philippe Aumasson and Daniel J. Bernstein.
See also
Dirhash
External links
https://lkml.org/lkml/2013/6/18/869 on the Linux kernel mailing list (LKML)
Category:Database index techniques |
2015 North Texas Mean Green football team
The 2015 North Texas Mean Green football team represented the University of North Texas in the 2015 NCAA Division I FBS football season as members of the West Division of Conference USA. They began the season with Dan McCarney as head coach, in his fifth season, and played their home games at Apogee Stadium in Denton, Texas. McCarney was fired on October 10 following a 66–7 loss to Portland State. Offensive coordinator Mike Canales was named interim head coach for the remainder of the season. They finished the season 1–11, 1–7 in C-USA play to finish in last place in the West Division.
Schedule
North Texas announced their 2015 football schedule on February 2, 2015. The 2015 schedule consist of five home and seven away games in the regular season. The Mean Green will host CUSA foes Rice, UTEP, UTSA, and Western Kentucky (WKU), and will travel to Louisiana Tech, Marshall, Middle Tennessee, and Southern Miss.
Schedule source:
Game summaries
SMU
Rice
Iowa
Southern Miss
Portland State
Following the 66–7 loss to FCS Portland State, Mean Green head coach Dan McCarney was fired. The 59-point margin is the biggest FCS win over an FBS team since Division I football was divided into the groupings now known as FCS and FBS in 1978.
WKU
Marshall
UTSA
Louisiana Tech
Tennessee
Middle Tennessee
UTEP
References
Category:North Texas Mean Green football seasons
North Texas
North Texas Mean Green f |
#include "../../VM/Handler/Opcode80F8Handler.h"
#include "../../Game/Game.h"
#include "../../Graphics/Rect.h"
#include "../../LocationCamera.h"
#include "../../PathFinding/Hexagon.h"
#include "../../PathFinding/HexagonGrid.h"
#include "../../State/Location.h"
#include "../../VM/Script.h"
namespace Falltergeist
{
namespace VM
{
namespace Handler
{
Opcode80F8::Opcode80F8(VM::Script *script, std::shared_ptr<ILogger> logger) : OpcodeHandler(script)
{
this->logger = std::move(logger);
}
void Opcode80F8::_run()
{
logger->debug() << "[80F8] [=] bool tile_is_visible (int hex)" << std::endl;
int hexnum = _script->dataStack()->popInteger();
auto hex = Game::Game::getInstance()->locationState()->hexagonGrid()->at(hexnum);
bool inrect = Graphics::Rect::inRect(
Point(hex->position() - Game::Game::getInstance()->locationState()->camera()->topLeft()),
Game::Game::getInstance()->locationState()->camera()->size());
_script->dataStack()->push(inrect);
}
}
}
}
|
The Set-up
Cover your work surface with a vinyl tablecloth or work on a non-precious surface that easily wipes clean.
If you’re making a Hanukkiah (it holds nine candles, rather than seven), talk about the story of Chanukah and how the Chanukah menorah has eight candles + 1, the shamash, to represent the miracle that oil burned continuously for eight days.
Invite your child/ren to make menorahs. Encourage creativity and original thinking.
We celebrate both Hanukkah and Christmas in our home, so, as some might agree, our children get the best of both worlds! But it can also be a tricky mash-up of cultures, but I guess it makes sense to my kids who know nothing else.
The other day we discovered a new-to-us A-mazing teacher supply store, and came home with a 2.5 pound bucket of Crayola Air Dry Clay to make our very own menorahs. It cost just $5, and I cannot recommend this clay enough.
It feels just like the clay you throw pots on, and my kids were enthralled by the texture. So unlike play dough, and it has the potential to make long-lasting objects.
We started with a mound of clay, rolled it out with our new rolling pin, scored at a Waldorf school winter festival, and poked a candle into the clay eight times. N placed one of our menorahs on the table as inspiration.
Menorahs hold nine candles, eight for the eight nights of Hanukkah, and a ninth called the shamash (meaning “attendant”) that lights the other candles.
Meanwhile, my 15 month old got into the clay spirit. She’s been copying everything her sister does, and after seeing this magic, I wished I had given her a bigger piece of clay to play with.
To make room for the shamash, we decided to build a little mound by making a ball of clay, scoring both sides of where it would connect with hatch marks, and then pressing the pieces together.
We used a little water and a popsicle stick to smooth out the edges. I read that if there are cracks in this clay it can fall apart once dry, so we were sure to smooth all those cracks right out with water.
And then N decided to use a wooden stick to poke a pattern of holes all over the menorah.
And a hole for the shamash.
My little one was happy to play with a small pot of water and the goopy clay.
Now we have to let the clay dry for 2-3 days before painting it. If you’d like to join us and make an air dry menorah too, you should be able to find Crayola Air Dry Clay at Target, Walmart, Office Depot or on Amazon for $5.99.
So far, I love this product, and I think we’ll make handprint ornaments with it tomorrow! |
Community Rating System
REDIRECT National Flood Insurance Program |
Q:
vimの繰り返し操作を使って文字列を削除する方法
以下のように記述されたファイルがあり
ln -sf ~/dev/dotfiles/.profile ~/
ln -sf ~/dev/dotfiles/.pryrc ~/
ln -sf ~/dev/dotfiles/.vimrc ~/
ln -sf ~/dev/dotfiles/.zshrc ~/
/devの部分を削除して、以下の状態にしたいと思います。
ln -sf ~/dotfiles/.profile ~/
ln -sf ~/dotfiles/.pryrc ~/
ln -sf ~/dotfiles/.vimrc ~/
ln -sf ~/dotfiles/.zshrc ~/
vimの繰り返し操作.を使い、devの上でdw,x,j,.してみたんですが、これだと最後のxでの一文字分の削除が繰り返されてしまいました。
もちろん置換を使って一括で変換するのが一番だとは思うのですが、繰り返し処理を使う場合はどのようなキーストロークを使えばいいのでしょうか?
A:
df/
次の / まで削除
4x
4文字削除
vwd
ヴィジュアルモードで単語一つとカーソル位置の文字を選択状態にして削除
などでしょうか。
レコーディング(マクロ)を使うならば、
qa dwx j q
で 下の行への移動までレジスタ a に記録されますから、後は @a(あるいは @@)の連打で繰り返せます。
A:
gn を使うといいかと思います(:h gn)
/\/dev<Enter> '/dev'を検索
dgn 次のマッチを削除する
. 繰り返し(必要な回数押す)
|
Biosynthesis and function of prokaryotic cell envelopes and their surface structures
Bacteria and archaea have complex cell envelopes that have several important functions, including providing a barrier that protects the cytoplasm from the environment. Along with its associated proteinaceous structures, it also ensures cell stability, facilitates motility and mediates adherence to biotic and abiotic surfaces. Although archaea are ubiquitous, present in all habitats examined thus far, including the human microbiome, compared to the bacteria, little is yet known about this domain of life. Using the genetically and biochemically amenable model archaeon Haloferax volcanii, my lab employs well-established techniques of molecular biology, biochemistry, and microscopy, as well as cutting edge technologies, such as RNAseq, to characterize the unique archaeal, as well as the highly conserved, aspects of archaeal cell surface biology.
Our lab’s extensive characterization of the evolutionarily conserved Sec pathway, as well as the Tat pathway, advanced the understanding of protein transport across both domains of prokaryotes. Exciting results from our recent analyses of cell surface anchoring strategies of archaeal proteins have uncovered a seemingly unique archaeal surface anchoring strategy and also revealed a novel membrane anchoring mechanism that is conserved between archaea and bacteria. Furth
ermore, our analyses of archaeal surface filaments led to the identification of previously unknown roles of type IV pilins in the regulation of early steps in biofilm formation (Fig. 1). The lab has used the data gleaned from these in vivo studies to develop novel software programs, as well as to improve existing ones, that predict the substrates that use specific transport and cell surface anchoring pathways. Information
gleaned from these studies has invariably been used to further develop our understanding of the molecular mechanisms that have allowed haloarchaea to adapt to high salt conditions.
Cell Surface anchoring mechanismsFollowing transport to the cell surface, secreted proteins involved in such critical cell processes as surface adhesion and mating are anchored to the cell surface. A better understanding of the molecular machineries involved in protein anchoring will facilitate the development of effective approaches for interfering with surface anchoring of such specific targets as virulence factors.
We have discovered that the N-terminal region of H. volcanii Tat substrates often contain a lipobox, a motif that is modified by the covalent attachment of a lipid to an invariant cysteine. Although archaea do not have homologues of the bacterial enzymes involved in lipid modification of lipobox-containing proteins, we have identified two candidates that might be involved in this process, as they are found in all archaea that express proteins containing a lipobox but not found in other archaea.
Recently, my lab confirmed that some archaea, including H. volcanii, also employ another type of protein anchoring mechanism that is mediated through a lipid-modified amino acid residue. In this case, an enzyme known as the archaeosortase processes, and attaches a lipid to, the C-terminus of substrates containing a PGF motif (Fig. 2). One such substrate, the Surface Layer Glycoprotein (SLG), perhaps the best studied of all archaeal proteins, was long believed to be anchored to the cell membrane by intercalation of a protein segment. We are now characterizing additional archaeosortase substrates, including several proteins that contain a low-complexity domain, a type of domain often found in proteins involved in mediating surface adhesion or cell-cell interactions. In fact, we have already shown that cells lacking one of these substrates have significantly diminished mating efficiencies. The lab has also begun to characterize bacterial archaeosortase homologs, the exosortases, and their substrates in Nitrosomonas europea, the first in vivo study of these enzymes in bacteria.
While investigating the roles played by pili in surface adhesion, we discovered six conserved H. volcanii adhesion pilins are also involved in regulating flagella-dependent motility. This previously unknown mechanism that plays a role in mediating the transition from the planktonic to sessile state, underscores the importance of the ability to quickly adapt to severe changes in the local environment. Complementation experiments indicate that pilin regulation of motility does not require assembled pili and that pilins do not interact directly with the flagella. We are now attempting to identify an intermediate through which pilin-dependent motility regulation operates (Fig. 3).
Surprisingly, while some type IV pilins promoted microcolony formation, as has previously been reported, a distinct subset inhibits this early step in biofilm formation. We are also investigating the effects that N-glycosylation, as well as other post-translation modifications, have on this regulatory mechanism. |
// Copyright (c) 2016 Uber Technologies, Inc.
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in
// all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
// THE SOFTWARE.
package client
import (
"time"
"github.com/m3db/m3/src/dbnode/generated/thrift/rpc"
"github.com/m3db/m3/src/dbnode/ts"
"github.com/m3db/m3/src/dbnode/x/xio"
"github.com/m3db/m3/src/x/checked"
xtime "github.com/m3db/m3/src/x/time"
)
var timeZero = time.Time{}
type readerSliceOfSlicesIterator struct {
segments []*rpc.Segments
blockReaders []xio.BlockReader
idx int
closed bool
pool *readerSliceOfSlicesIteratorPool
}
func newReaderSliceOfSlicesIterator(
segments []*rpc.Segments,
pool *readerSliceOfSlicesIteratorPool,
) *readerSliceOfSlicesIterator {
it := &readerSliceOfSlicesIterator{pool: pool}
it.Reset(segments)
return it
}
func (it *readerSliceOfSlicesIterator) Next() bool {
if !(it.idx+1 < len(it.segments)) {
return false
}
it.idx++
// Extend block readers if not enough available
currLen, start, blockSize := it.CurrentReaders()
if len(it.blockReaders) < currLen {
diff := currLen - len(it.blockReaders)
for i := 0; i < diff; i++ {
seg := ts.NewSegment(nil, nil, 0, ts.FinalizeNone)
sr := xio.NewSegmentReader(seg)
br := xio.BlockReader{
SegmentReader: sr,
Start: start,
BlockSize: blockSize,
}
it.blockReaders = append(it.blockReaders, br)
}
}
// Set the segment readers to reader from current segment pieces
segment := it.segments[it.idx]
if segment.Merged != nil {
it.resetReader(it.blockReaders[0], segment.Merged)
} else {
for i := 0; i < currLen; i++ {
it.resetReader(it.blockReaders[i], segment.Unmerged[i])
}
}
return true
}
func (it *readerSliceOfSlicesIterator) resetReader(
r xio.BlockReader,
seg *rpc.Segment,
) {
rseg, err := r.Segment()
_, start, end := it.CurrentReaders()
if err != nil {
r.ResetWindowed(ts.Segment{}, start, end)
return
}
var (
head = rseg.Head
tail = rseg.Tail
)
if head == nil {
head = checked.NewBytes(seg.Head, nil)
head.IncRef()
} else {
head.Reset(seg.Head)
}
if tail == nil {
tail = checked.NewBytes(seg.Tail, nil)
tail.IncRef()
} else {
tail.Reset(seg.Tail)
}
var checksum uint32
if seg.Checksum != nil {
checksum = uint32(*seg.Checksum)
}
newSeg := ts.NewSegment(head, tail, checksum, ts.FinalizeNone)
r.ResetWindowed(newSeg, start, end)
}
func (it *readerSliceOfSlicesIterator) currentLen() int {
if it.segments[it.idx].Merged != nil {
return 1
}
return len(it.segments[it.idx].Unmerged)
}
func (it *readerSliceOfSlicesIterator) CurrentReaders() (int, time.Time, time.Duration) {
segments := it.segments[it.idx]
if segments.Merged != nil {
return 1, timeConvert(segments.Merged.StartTime), durationConvert(segments.Merged.BlockSize)
}
unmerged := it.currentLen()
if unmerged == 0 {
return 0, timeZero, 0
}
return unmerged, timeConvert(segments.Unmerged[0].StartTime), durationConvert(segments.Unmerged[0].BlockSize)
}
func timeConvert(ticks *int64) time.Time {
if ticks == nil {
return timeZero
}
return xtime.FromNormalizedTime(*ticks, time.Nanosecond)
}
func durationConvert(duration *int64) time.Duration {
if duration == nil {
return 0
}
return xtime.FromNormalizedDuration(*duration, time.Nanosecond)
}
func (it *readerSliceOfSlicesIterator) CurrentReaderAt(idx int) xio.BlockReader {
if idx >= it.currentLen() {
return xio.EmptyBlockReader
}
return it.blockReaders[idx]
}
func (it *readerSliceOfSlicesIterator) Close() {
if it.closed {
return
}
it.closed = true
// Release any refs to segments
it.segments = nil
// Release any refs to segment byte slices
for i := range it.blockReaders {
seg, err := it.blockReaders[i].Segment()
if err != nil {
continue
}
if seg.Head != nil {
seg.Head.Reset(nil)
}
if seg.Tail != nil {
seg.Tail.Reset(nil)
}
}
if pool := it.pool; pool != nil {
pool.Put(it)
}
}
func (it *readerSliceOfSlicesIterator) Reset(segments []*rpc.Segments) {
it.segments = segments
it.resetIndex()
it.closed = false
}
func (it *readerSliceOfSlicesIterator) Size() (int, error) {
size := 0
for _, reader := range it.blockReaders {
seg, err := reader.Segment()
if err != nil {
return 0, err
}
size += seg.Len()
}
return size, nil
}
func (it *readerSliceOfSlicesIterator) Rewind() {
it.resetIndex()
}
func (it *readerSliceOfSlicesIterator) resetIndex() {
it.idx = -1
}
|
Wondering if your preemie caught up with weight fast but length took a lot longer?
Ahndrea - posted on 09/12/2012
(
5 moms have responded
)
4
0
0
I had my son at 34 weeks at 3.6 pounds and 15 inch. He just turned 7 months and is now 16 pounds 10 oz and 25 inch long. I feel like he is catching up on weight fast but not his height. Every time I see babies born around the same time as my son, they look huge! My son never had any problems when he was born. He never had a feeding tube or oxygen. He was growth restricted ( I had severe preeclampsia). My husband is only 5'6 ( shortest in his family) and I'm 5'4. I don't think my son will be tall but i don't see him catching up on height as fast like he is with his weight. Does any body's preemie do the same thing?
5 Comments
View replies by
Kristena - posted on 10/11/2012
4
0
0
Yesss
My daughter was 2 in a half months early. I had preeclampsia as well And she was tinnnnny 2lbs 1.5 oz. Well she is five months now and is 13 pounds she had no problem putting on the weight but I was told by the doctors her length needs toncatch upto her weight gain which worrys me a little but I'm sure she will eventually stretch out a little haha so I wouldnt worry to much it is very common from what I hear some babies gets the length before the weight and some get the weight before the length so I guess we just gotta wait it out
Hi, I'm so sorry that you are having these worries. My twins were born 8 weeks premature at 3lb.5oz and 3lb.7oz, (I too had preeclampsia) They were in the NICU until they were 5 weeks and 5 lbs, They each had a feeding tube ( about 10 days) and oxygen (1 day and 2 days). I was told that they would most likely be a bit smaller than other children and not to worry. Well, they are now 5 years old our "youngest" (by 1 minute) is at the 95 percentile for height and the 5th percentile for weight, while her "older" sister is at 80 percentile for height and 3rd for weight (she is about 4 inches shorter and 5 pounds lighter). I was a very tall and slender child, but now am 5'3" while my husband is 5'9". I think that they will get most of their height in early, as I did. Looking at them and listening to their language skills, they appear to be closer to 6 or 7 years of age. So not only did the girls catch up, they have exceeded the average. Try not to worry, my girls started really growing at about a year of age. Good Luck!
Hi! I had my twins at 32 weeks. My daughter was 4.5 pounds and 17 3/4 in and my son was 3.10lbs and 17 in long. They are now 8 yrs old and have 4 in and 10lbs difference. This is how it has always been and I always worried about it. I have done a lot of research on this over the years and talked to many doctors. They all have said the same thing. It doesn't matter the weight or the length, as long as they are growing at a consistent rate, they are fine. I wouldn't worry so much how your baby is compared to other children b/c he wasn't very long to begin with. Your dr should be tracking how much gain there is from one visit to the next. If its consistent, then he's fine. I have 2 boys and 1 girl. My boys have always been shortest among their peers and my daughter has always been tallest. My oldest boy is almost 15 and his growth shot up around 13/14. |
<?xml version="1.0" encoding="utf-8"?>
<fragment
xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:id="@+id/playback_fragment"
android:name="com.cube.lush.player.tv.playback.PlaybackFragment"
tools:context=".tv.playback.PlaybackActivity"
tools:deviceIds="tv"
tools:ignore="MergeRootFrame"
/>
|
WASHINGTON — U.S. Sen. Cory Booker just visited 24 -- count 'em, 24 -- states stumping for Democrats in the midterm elections.
He contributed $686,000 to House and Senate candidates across the nation.
And along the way, New Jersey's dynamic Democrat stopped in all those early presidential primary states, plus a few that look to be big battlegrounds.
A dry run for a potential 2020 bid?
Even Booker wouldn't quarrel with that.
"I will consider running for president," Booker told NJ Advance Media.
"That's something that I will do. There's people in New Jersey who are talking to me about it, across the country that are talking to me about it, so I will consider that."
U.S. Sen. Cory Booker speaks at a get out the vote event at the University of New Hampshire in Durham on Oct. 28. (AP Photo | Cheryl Senter)
Booker said he spent the year focused on the midterms, which saw the Democrats win back the House, including capturing four of New Jersey's five Republican-held congressional districts.
Next on his agenda is trying to push legislation across the finish line during the lame-duck congressional session, including a bill to overhaul the criminal justice system that has President Donald Trump's support.
Then, he told NJ Advance Media, he will look at 2020, where he already has banked $4.1 million for his Senate re-election campaign. He figures that will come in earnest during the December holiday season.
Don't Edit
U.S. Sen. Cory Booker poses for a selfie with Dartmouth College students after addressing a gathering of college Democrats there. (Jonathan D. Salant | NJ Advance Media for NJ.com)
A recently enacted state law made it clear that he could seek both the presidency and another term in the Senate at the same time. And this time, a Democratic governor would appoint a successor if Booker reaches the White House.
"I know he's interested," said Rep. Bill Pascrell Jr., D-9th Dist.
"He's got a hell of a brand. I like his personality. He's got character. It's great that somebody from our own state would even think about it. I think he'll be listened to."
Don't Edit
U.S. Sen. Cory Booker prepares to snap a selfie after speaking in New Hampshire. (Jonathan D. Salant | NJ Advance Media for NJ.com)
He was listened to this fall.
Booker appeared with Jacky Rosen in Nevada and Kyrsten Sinema in Arizona, who wrested Senate seats away from Republicans, and with U.S. Sens. Sherrod Brown of Ohio and Tammy Baldwin of Wisconsin, both of whom won re-election in states carried by Donald Trump in 2016.
He drew standing-room-only crowds in New Hampshire, the first presidential primary state, and, after hearing him, hundreds of people signed up to work for the Democratic ticket.
He returned to the road just days before Thanksgiving, heading to Mississippi to campaign again for Democratic Senate candidate Mike Espy, who is in a runoff election with U.S. Sen. Cindy Hyde-Smith.
Espy is an underdog, but so was Doug Jones in Alabama, who Booker also campaigned for. Jones upset Roy Moore in December and became Alabama's first Democratic U.S. senator in more than two decades.
Don't Edit
"He's following the Obama playbook in '06," said Phil Singer, a veteran of the John Kerry and Hillary Clinton presidential campaigns. "He was able to parlay that into relationships. He was able to build up a favor bank."
New Hampshire Democrats were happy to have him in their state, where Booker paced in front of a large meeting room to urge voters to elect a Democratic governor and then squeezed into a storefront headquarters to tout a congressional candidate.
"It attracts volunteers," New Hampshire Democratic Party Chairman Ray Buckley said. "It attracts votes. It's the name of the game."
Don't Edit
Welcome to Mississippi, Senator! Glad you have the chance to meet with some of our best and brightest at @SouthernMiss. https://t.co/TudWmSS8ML — Mike Espy (@MikeEspyMS) November 19, 2018
Don't Edit
Don't Edit
U.S. Sen. Cory Booker, left, listens as U.S. Sen. Robert Menendez speaks during a press conference in New Brunswick in September. (Patti Sapone | NJ Advance Media for NJ.com)
Back home in New Jersey, Booker helped carry U.S. Sen. Robert Menendez across the finish line in an unexpectedly competitive race, campaigning with him around the state.
"It's incredibly important, especially in a case like Cory where he has such a great standing with the people of New Jersey, well-regarded, and a validator of the work that I've done," said Menendez, D-N.J. "People will listen to someone independently of yourself."
Should he run, Booker's coast-to-coast campaigning will help prepare him for the rigors of a presidential race, Singer said.
"Just the stamina required to run for president, you need to train for it," Singer said. "Traveling around, refining and revising your stump speech, is a necessity for every aspiring candidate."
Don't Edit
U.S. Sen. Cory Booker chats with New Hampshire Democrats in Portsmouth. (Jonathan D. Salant | NJ Advance Media for NJ.com)
While not everyone Booker endorsed will return the favor in 2020 should he seek the presidency, some will. Booker also got to meet the party activists in the states he will need to do well in if he is to get the Democratic presidential nomination.
"We're an on-the-ground state," Portsmouth, N.H., Democratic Party Chair Laurie McCray said. "When we know our candidates well, when national figures come here, it's almost an affirmation of the work we do and the responsibility we have as the first- in-the-nation primary state."
While the Democratic field could be even larger than the 17 Republicans who sought for their party's nomination in 2016, GOP consultant Craig Stevens said that shouldn't dissuade Booker from running.
"If he ever wants to be president, he should at least go through the motions and see what the appetite is this cycle," said Stevens, who served as former Massachusetts Gov. Mitt Romney's 2008 New Hampshire communications director
Don't Edit
U.S. Sen. Cory Booker gestures while speaking before students at Dartmouth College.
So far, indications are that if Booker does run, he will start off as a top-tier candidate. Both the Washington Post and National Journal ranked him fifth among the potential Democratic candidates.
And US-Bookies, which aggregates European betting sites, put Booker third. His odds of winning the Democratic nomination were 10 to 1, behind only U.S. Sen. Kamala Harris, D-Calif., at 5 to 1; and Rep. Beto O'Rourke, D-Texas, at 6 to 1.
Should he not run for president, Booker still would come out ahead, thanks to his 2018 efforts, Singer said.
"At the very least, he did a good job winning chits with colleagues in the Senate, which will make him a more effective senator," Singer said. "It wasn't as if he wasted his time."
Don't Edit
U.S. Sen. Cory Booker discusses the cost of higher education before students at the University of New Hampshire.
On the campaign trail, Booker had several opportunities to test his popularity with younger voters, who tend to support Democratic candidates if they bother to go to the poll.
At age 49, Booker is a generation younger than three other potential 2020 presidential candidates, former Vice President Joe Biden and U.S. Sens. Bernie Sanders, I-Vt., and Elizabeth Warren, D-Mass.
No wonder his trip to New Hampshire last month was focused at college campuses. Young voters helped Obama in 2008 and Sanders in 2016.
"Cory probably plays right into that same crowd," said former Rep. Dick Swett, D-N.H. "He's young, he's exciting. That plays into what the young people are looking for."
When Booker went to Mississippi this month to campaign for Espy, he was booked to speak at the University of Southern Mississippi.
Don't Edit
Candidate signs form the backdrop as U.S. Sen. Cory Booker speaks at the University of New Hampshire. (Jonathan D. Salant | NJ Advance Media for NJ.com)
As for Booker's New Hampshire campaign swing, the Democratic gubernatorial nominee, Molly Kelly, fell short, even as the party took control of the state legislature.
But the congressional candidate who joined Booker in Portsmouth, Chris Pappas, won his race; and Rep. Annie Kuster, D-N.H., who appeared with the senator at Dartmouth College later in the day, was re-elected.
Booker will be the featured guest at a New Hampshire Democratic Party victory celebration next month.
Don't Edit
Don't Edit
2020 Watch-NEW: Potential Democratic presidential contender @CoryBooker returns to NH on 12/8 for @NHDems 'Post Election Victory Celebration' in Manchester. The senator from NJ was was just in the #FITN presidential primary state in late October #nhpolitics #NJpolitics pic.twitter.com/ZCky68xGLw — Paul Steinhauser (@steinhauserNH1) November 19, 2018
Don't Edit
More on Booker in 2020
Booker for president? Murphy signs 'Cory Booker Law' that'll make it easier for him to run
Booker returning to New Hampshire in advance of big decision on 2020 presidential run
Cory Booker just wowed 'em in New Hampshire. Here's how he can do it again in a 2020 run for president.
Election 2018 is over. Here's where Cory Booker stands in newest 2020 presidential rankings.
I chased Cory Booker all over Iowa to see what Dems think of him. Their answers are fascinating.
Don't Edit
Jonathan D. Salant may be reached at jsalant@njadvancemedia.com. Follow him on Twitter @JDSalant or on Facebook. Find NJ.com Politics on Facebook. |
Game Theory Versus Practice
Article views
693
VIEWS
When Microsoft announced its intention to acquire Yahoo last February, the software giant knew the struggling search firm would not come easily into the fold. But Microsoft had anticipated the eventual minuet of offer and counteroffer five months before its announcement, thanks to the powers of game theory.
A mathematical method of analyzing game-playing strategies, game theory is catching on with corporate planners, enabling them to test their moves against the possible responses of their competitors. Its origins trace as far back as The Art of War, the unlikely management best-seller penned 2,500 years ago by the Chinese general Sun Tzu. Mathematicians John von Neumann and Oskar Morgenstern adapted the method for economics in the 1940s, and game theory entered the academic mainstream in the 1970s, when economists like Thomas Schelling and Robert Aumann used it to study adverse selection and problems of asymmetric information. (Schelling and Aumann won Nobel prizes in 2005 for their work.)
Game theory can take many forms, but most companies use a simplified version that focuses executives on the mind-set of the competition. "The formal stuff quickly becomes very technical and less useful," says Louis Thomas, a professor at the Wharton School of Business who teaches game theory. "It's a matter of peeling it back to its bare essentials." One popular way to teach the theory hinges on a situation called the "prisoner's dilemma," where the fate of two detainees depends on whether each snitches or stays silent about an alleged crime (see "To Squeal or Not to Squeal?" at the end of this article).
Many companies are reluctant to talk about the specifics of how they use game theory, or even to admit whether they use it at all. But oil giant Chevron makes no bones about it. "Game theory is our secret strategic weapon," says Frank Koch, a Chevron decision analyst. Koch has publicly discussed Chevron's use of game theory to predict how foreign governments and competitors will react when the company embarks on international projects. "It reveals the win-win and gives you the ability to more easily play out where things might lead," he says.
Enter the Matrix
Microsoft's interest in game theory was piqued by the disclosure that IBM was using the method to better understand the motivations of its competitors — including Microsoft — when Linux, the open-source computer operating system, began to catch on. (Consultants note that companies often bone up on game theory when they find out that competitors are already using it.)
For its Yahoo bid, Microsoft hired Open Options, a consultancy, to model the merger and plot a possible course for the transaction. Yahoo's trepidation became clear from the outset. "We knew that they would not be particularly interested in the acquisition," says Ken Headrick, product and marketing director of Microsoft's Canadian online division, MSN. And, indeed, they weren't; the bid ultimately failed and a subsequent partial acquisition offer was abandoned in June.
Open Options wouldn't disclose specifics of its work for Microsoft, but in client workshops it asks attendees to answer detailed questions about their goals for a project — for example, "Should we enter this market?" "Will we need to eat costs to establish market share?" "Will a price war ensue?" Then, assumptions about the motives of other players, such as competitors and government regulators, are ranked and different scenarios developed. The goals of all players are given numerical values and charted on a matrix. The exercise is intended to show that there are more outcomes to a situation than most minds can comprehend, and to get managers thinking about competition and customers differently.
"If you have four or five players, with four actions each might or might not take, that could lead to a million outcomes," comments Tom Mitchell, CEO of Open Options. "And that's a simple situation." To simplify complex playing fields, Open Options uses algorithms to model what action a company should take — considering the likely actions of others — to attain its goals. The result replicates the so-called Nash equilibrium, first proposed by John Forbes Nash, the Nobel prize–winning mathematician portrayed in the movie A Beautiful Mind. In this optimal state, the theory goes, a player no longer has an incentive to change his position.
As a tool, game theory can be useful in many areas of finance, particularly when decisions require both economic and strategic considerations. "CFOs welcome this because it takes into account financial inputs and blends them with nonfinancial inputs," says Mitchell.
Rational to a Fault?
Some experts, however, question game theory's usefulness in the real world. They say the theory is at odds with human nature, because it assumes that all participants in a game will behave rationally. But as research in behavioral finance and economics has shown, common psychological biases can easily produce irrational decisions.
Similarly, John Horn, a consultant at McKinsey, argues that game theory gives people too much credit. "Game theory assumes rationally maximizing competitors, who understand everything that you're doing and what they can do," says Horn. "That's not how people actually behave." (Activist investor Carl Icahn said Yahoo's board "acted irrationally" in rejecting Microsoft's bid.) McKinsey's latest survey on competitive behavior found that companies tend to neglect upcoming moves by competitors, relying passively on sources such as the news and annual reports. And when they learn of new threats, they tend to react in the most obvious way, focusing on near-term metrics such as earnings and market share.
Moreover, finance executives have their own sets of metrics, and when favored indicators such as net present value clash with game-theory models, choices become more complicated. "Sometimes [game theory] tells you things you don't like," says Koch.
Game theory is still finding its place as a tool for companies, and its ultimate usefulness may depend on how quickly it moves from novelty to accepted practice. Practice, in fact, may be key. McKinsey takes that to heart with its "war game" scenarios, in which a company's top managers play the roles of different parties in a simulation. In effect, this boils game theory down to the schoolyard lesson that perfection comes through repetition. "Discipline is not a dirty word," as basketball coach Pat Riley once said. Game theory is one way that companies can assess their options with more discipline.
Alan Rappeport is a reporter for CFO.
Get Your Free Copy Of Innovation Quarterly
In this issue we look at the top 50 blockchain startups, how organizations are preparing for GDPR and talk to Uber's Machine Learning Data Science Manager. |
NFL Films and Showtime's Inside the NFL just added a new layer to the the controversy from the end of Seattle Seahawks vs Atlanta Falcons.
In their game highlights of the hotly-contest matchup (which can be viewed above), the game-deciding play has been heavily edited in the Falcons favor.
(The Seattle Seahawks can put a stranglehold on the NFC West on the road against their bitter rivals, the Arizona Cardinals, under the bright lights of Sunday Night Football . Make sure you're in the loop -- take five seconds to Sign up for our Free Seahawks newsletter now!)
On fourth down, the Falcons had one final chance to extend the drive, down 26-24 to the Seahawks. Atlanta cornerback Matt Ryan threw a deep pass into double coverage to his wide receiver Julio Jones, where Seattle cornerback Richard Sherman appears to interfere with Jones by grabbing his arm.
Interestingly enough, a review of the entirety of the play shows Jones hitting Sherman in the helmet area off the line of scrimmage. The move knocks the cornerback off balance and clearly helps the talented wideout get open, meaning at the very least both teams committed a penalty the refs didn't see on the play. So how does Inside the NFL factor into this?
In their highlights, the final play is edited to look like Jones has a free release off the line of scrimmage with Sherman nowhere in sight. The possible penalty on Atlanta is nowhere to be found while the controversy on Sherman is spotlighted. It's clear the play has been edited with the beginning of another play.
A couple of Seahawks writers/bloggers were the first to notice the edit.
Notice on final play they edit in a Julio release from early in game when sun out. Sherm not in press. Kinda shady NFL. https://t.co/GReV9YOIJu — Jared Stanger (@JaredStanger) October 19, 2016
So NFL assumes footage control from all official team accounts and then immediately proceeds to push deliberately misleading info.
Got it. — Evan (@EvanonHB) October 19, 2016
Perhaps, there's a purely coincidental reason for the edit? Maybe a cosmetic cut to juice up the drama of the final play? Or, they were unaware of a controversy at the start of play was found?
Of course, it could just be harder to sell the drama of a double penalty instead of the Falcons getting jobbed.
Either way, it's not a good look for the NFL. |
NL West
Now Commenting On:
Kluber settling into regular role in rotation
Email
Print
Kluber's 10 strikeouts 1:31
5/26/13: Corey Kulber sets a career high with 10 strikeouts against the Red Sox as he allows one run on three hits in 6 1/3 frames
By Jordan Bastian
/
MLB.com |
CINCINNATI -- Corey Kluber tends to keep to himself in the clubhouse and he is a softspoken part of an Indians club that has its share of characters. Kluber's personality seems fitting at the moment, considering he has quietly found a home in Cleveland's rotation.
Aside from one forgettable road start against Detroit, Kluber has been a consistent member of the Tribe's rejuvenated pitching staff. One of the keys to Kluber's success of late has been the right-hander's increasing ability to adjust on the fly.
"In the past, when he was able to make adjustments, it was more start to start," Indians pitching coach Mickey Callaway said. "So you saw some inconsistencies. Now, it seems like he's doing it in-game, which is really helping. He's a guy that likes information and likes feedback. Now, he's really starting to be able to use it in games."
Consider that rough outing on May 10 in the Motor City.
Kluber allowed eight runs on 11 hits in just 4 2/3 innings, but following the appearance he said he immediately knew what went wrong with his mechanics in the outing. In his three turns since that start, the 27-year-old right-hander has turned in three quality starts, allowing seven earned runs with 23 strikeouts and just one walk over 19 innings.
"I was getting too quick to the plate -- getting jumpy and not staying back," Kluber said of his start against the Tigers. "When I stay back over the rubber, my arm has time to catch up and I get on top of pitches and get that extension and finish instead of getting under the ball. There's a little more angle and a little more life to it."
Overall, Kluber has gone 3-3 with a 4.47 ERA in eight games, including six starts, for the Indians this season. Excluding the outing in Detroit, he has posted a 3.19 ERA with 39 strikeouts against five walks over 36 2/3 innings.
Lately, Kluber's slider has improved, creating a go-to weapon for swings and misses. The righty's slider was especially strong on Sunday, when he piled up a career-high 10 strikeouts and held the Red Sox to one run, one walk and three hits over 6 2/3 innings of a no-decision.
"What we've done is really try to stay away from his cutter as much," Callaway explained. "We just use his cutter to complement his pitches instead of pitching off the cutter. Now, he's pitching off his fastball and his fastball velocity has gone up, and he's gotten his slider back a little bit. A lot of times when you over-use your cutter, it will kind of go into your slider and make it inconsistent."
Kluber said the string of success has helped him gain confidence
"I'm just getting more comfortable up here," Kluber said. "I've gone out there and had some good outings and I'm trying to build off that, and always find something to improve on." |
Sections
The 3 biggest issues facing the NHS after Brexit
Published: 01 Sep 2016
By Prospect Health
1. Staffing
Currently approximately 55,000 workers within our health system come from EU countries (source: Kings Fund). The NHS is finding it difficult to recruit permanent staff. Currently, EU workers still retain the rights to work in the EU and the freedom of movement act still holds.
However, what will happen once this renegotiation takes place? The government needs to ensure EU nationals can still retain the right to work in the UK and possibly open gates to other NHS occupations and nationalities to the current shortage list.
2. Money available for the NHS
Remember the notorious campaign created by the VOTE LEAVE campaign? "We send £350 million a week overseas, let's fund our NHS instead". Many of the people associated with this claim have now backed away from the statement. The economic shock associated with leaving the EU will put any increase in funding for the NHS at risk. According to the Independent, the economy has already contracted by 0.2% in the time following the Brexit vote (Source: Independent). If this decline continues, the economy could slip into recession with additional pressure being put on our already stretched public spending.
The decline in the strength of the pound has already had an impact on the NHS, making any drugs, services or equipment the NHS buys from aboard more expensive.
3. Access to treatment in the UK and abroad
The UK holds a reciprocal agreement with other EU countries, meaning if you visit an EU country you can receive free medical treatment that the host country can claim back from the residents own country.
Would an end to this agreement mean an influx of the older retired generation of UK citizens now residing in EU countries (approximately 1.2 million of them, Source: Kings Fund) putting additional pressure on NHS resources?
Another school of thought eludes to the benefit of a younger migrant community who live and work in the UK. They will not put as much pressure on NHS resources as UK citizens who are on average older and therefore use the NHS more frequently.
The Department of Health, already depleted of staff due to funding cuts, now has to find the resource to pick its way through EU legislation and decide what it needs to renegotiate or redefine with UK alternatives. Whatever happens, a long drawn out process follows, with uncertain time ahead for the NHS. |
U Network testnet was successfully launched.
Besides testnet release, U Network has also successfully stored its data on blockchain. Now U Network is sharing the details with community members for the first time.
Registered User Data Storage On U Network — Trading on User Data
User data is one of the most valuable resources for all internet platforms. However, under current circumstances, users do not have actual control over their personal data. Now blockchain can help to solve this issue.
Based on current DApp testing requirements, U Network has stored on-chain registered users’ data including registered name, wallet address and user reputation score. In the future, based on business requirements, more user data could be stored on-chain.
As the number 1 quality content blockchain, U Network maybe even become a data trading platform in the future. Besides ecosystem data of DApps built on U Network, there could also be cross-ecosystem data from DApps built on other networks. Registered users for different DApps would have different group qualities, representing different business needs. When buyers and sellers want to trade on the data, if you give the permission, then platform would collect your personal data and sell it to the buyer. Individuals can gain more UUU tokens through selling their personal data. Even other blockchains which are partners of U Network would be able to participate in these data trading.
This allows every user to have control over his own data, it also allows the value of data to be maximized in terms of both circulation and utilization.
Content Data Storage On U Network - Content Traceability and Trading
Whenever a user publishes an article on U Network DApp, a hash value would be created. The hash value is linked to data including author, article content, author of original article, article titles, etc. All these information can be looked up on the blockchain. U Network guarantees that all certified information would be stored on the blockchain and not to be tempered with afterwards. This ensures both recording and traceability of article copyrights.
Content data storage on-chain also ensures separation of article copyrights and right to use. It also encrypts paying articles such that the same article can be purchased multiple times.
This effectively prevents the kind of control over content by centralized platforms. The copyright of personal creation gets effectively validated and its value gets maximized.
Upvote Data Storage On U Network- Transparent Asset, No Misappropriation
Whenever upvote data is stored on U Network blockchain, a hash value is created. The hash value is linked to upvote user ID, upvote user weighting, and number of UUU tokens spent in the upvote.
U Network revolutionized the traditional upvote model into a two-part model: appreciation and investment. As every upvote costs a certain amount of UUU tokens and affects personal asset, U Network stores upvote data on the blockchain to effectively prevent tampering of assets within the platform. The technicians cannot modify user asset information without user authorization, and the platform cannot misappropriate the assets. As users grow, the number of upvotes would increase accordingly, so storing upvote data on the blockchain would prevent unfair operation on assets.
U Network will ensure that every upvote is searchable and the circulation of assets on the entire DApp would be transparent.
U Network is the first global decentralized content valuation and publishing platform. It uses economic principles to introduce market prediction in content platforms, solves the issue of “quality content being obscured”, brings quality content to attention. |
This is for a class so I would prefer hints or something to read rather than just the answer unless it is just an obvious mistake. The parser is getting confused between DATE and VARCHAR I believe it is because they both start with a tick mark (') and end with a tick. I can not change the syntax it needs to stay this way |
Billionaire conservative icon David Koch is stepping down from the Koch brothers� network of business and political activities. The 78-year-old New York resident is suffering from deteriorating health.... David Koch is leaving his roles as executive vice president and board member for Koch Industries and a subsidiary, Koch Chemical Technology group, where he served as chairman and chief executive officer. Koch is also stepping down as chairman of the board for the Americans For Prosperity Foundation, the charity related to Koch brothers� primary political organization.
How to Get Rid of the Super-Rich: By leveraging the power of the public purse against corporations that pay their top execs outrageously more than their workers, we could help jump-start a democratic �New Economy.� By Sam Pizzigati, May 21, 2018 [The Nation]
....we do not expect shareholders to monitor the fairness of corporate employment practices. We deny government support, for instance, to companies that discriminate by race or gender in hiring. In the United States, such companies cannot gain government contracts. Tax dollars, Americans have come to believe, should not subsidize enterprises that increase racial or gender inequality.
Stakeholder-oriented corporate reformers are extending this analogy to executive compensation. Tax dollars, they maintain, should also not subsidize enterprises that widen economic inequality.
....In the United States, private-sector firms currently take in about $500 billion every year in federal government contracts, for everything from manufacturing military aircraft to serving food and drinks in national parks. Over a fifth of the US workforce, 22 percent, labors for a company that holds one or more federal contracts. Millions of other Americans work for firms with state and local government contracts.
....Imagine if all this taxpayer largesse came with strings that tied top executive compensation to worker pay: no contracts, no subsidies, no tax breaks for corporations that pay their top executives�in salary, bonus, and incentives�over 25 or 50 or 100 times what their workers are making.
Wall Street�s Misallocation of Capital Is Worse Today than the Dot.com Era, By Pam Martens and Russ Martens: June 7, 2018 [Wall Street on Parade]. Just look at
...the market cap of JPMorgan Chase versus Ford. JPMorgan Chase doesn�t manufacture anything other than financial products � for which there is essentially no barriers to entry. That is, hundreds of other investment banks, brokerage firms, insurance companies and mutual funds around the globe are doing the same thing. But somehow, JPMorgan Chase has achieved a market cap of $375.75 billion while Ford, which makes the automobiles that get us to and from work each day, has a market cap of a measly $47.70 billion. Even if you threw in General Motors, which has a market cap of $61.82 billion, you�re still looking at less than a third of JPMorgan Chase�s market value.
And here�s another weird anomaly. JPMorgan Chase�s stock price seems to defy not only gravity but mind-blowing reputational damage. The bank has pleaded guilty to three felony counts since 2014 and put on probation by the U.S. Justice Department and yet its stock has set multiple new highs this year. It should be noted that from peak to trough during the dot.com bust, JPMorgan Chase lost more than 70 percent of its value.
The whistleblowers of the 2007-2008 financial crashes have been crushed and need help. [The Steady Enmity of Powerful People, by Golem XIV on June 4, 2018, via Naked Capitalism]. A book has been written about the idealistic and brave whistleblowers of the 2007-2008 financial crashes. There is no happy ending.
All of the stories involved the whistleblower following the law and reporting their concerns. In every story the result was being threatened with punitive, some might say vindictive, legal action by the very banks whose wrong doing they had reported. In every case the �Proper Authorities�, in charge of regulating the banks, hung the whistleblowers out to dry.
All the whistleblowers were blackballed from their profession and lost their livelihoods. The majority lost their homes. Another disturbing common thread was that many of the whistleblowers, who had been well paid, and respected employees of the banks, found that as soon as they went public with their complaint, they were accused, by the banks, of being mentally unstable and in need of detention in a mental facility. Many lost their family as a result. In every case the leading politicians of all the major parties in the whistleblowers� country, ignored the whistleblower and closed ranks with the banks and the regulators. Very often they too would join the banks in solemnly suggesting the Whistleblower had had some sort of tragic mental breakdown and was now unstable or delusional.
But the most depressing thing about the book is that it was never published.
The writer is friends with a whistleblower who has reached his or her limit and is appealing for aid. Go to the link if you can help.
In May, Democratic Congressman Keith Ellison from Minnesota�s 5th District released a study on the new data that was being released. The study was titled �Rewarding or Hoarding: An Examination of Pay Ratios Revealed by Dodd-Frank.�Among the key findings in the study were the following:Two-thirds of the richest 1 percent of American households are headed by corporate executives;CEO pay in the U.S. is excessive compared to other countries. Citing Bloomberg data, the study revealed that �the average U.S. CEO makes more than four times the average pay of a CEO abroad�;The pay gap has exploded over the past half century. The report found that the average CEO to median worker pay ratio today is 339 to 1 versus in 1965 when the average CEO received only an average of 20 times the average worker�s pay;
Machines that suck CO2 from the air might be cheaper than we thought: Operators of pilot plant publish their design and costs for scaling up. by Scott K. Johnson, 6/7/2018 [Ars Technica]
....located an hour north of Vancouver, British Columbia, is the brainchild of a company called Carbon Engineering. One of the founders of Carbon Engineering is Harvard�s David Keith, a researcher studying this and other conceivable methods of �geoengineering� our planet�s climate. This week, the Carbon Engineering team has published a nuts-and-bolts breakdown of its design, providing the first cost analysis of a working carbon capture plant.
....Wind and solar are variable renewable energy sources that drive down electricity prices as their volume increases, potentially changing the landscape of the US electrical grid, write Joachim Seel, Andrew Mills and Ryan Wiser of the Lawrence Berkeley National Laboratory. They share how utilities can shift demand to take advantage of high VRE levels, for example encouraging the use of at-home electric vehicle charges in regions where wind production is higher at night.....How do solar and wind influence energy prices? And since power plants last for decades, what should policymakers and investors think about to ensure that investments in power infrastructure pay off in the future?
The Sierra Club is expected to release "Reinventing Power: America's Renewable Energy Boom," this summer, depicting the growth of renewables in the US and how the industry has revitalized the lives of many Americans and the communities they live in, Eillie Anzilotti writes. "We're telling the story of the clean energy revolution through the voices of the people who are benefiting from it," adds Mary Ann Hitt, director of the Beyond Coal campaign at the Sierra Club.
In April, California solar and wind farms shut down or dialed back nearly 95,000 megawatt-hours of electricity, a new record, according to the California Independent System Operator, which manages the vast majority of the state�s electricity. That�s enough to power more than 30 million homes for an hour.... cost and price are not the same. In a normally functioning market, prices that regularly drop to zero will eat deeply into the profits of power plant operators, strongly discouraging companies from bringing more facilities online.
In California, utilities will spend $768 million on electric car infrastructure, by Megan Geuss - 6/2/2018 [Ars Technica]. Pacific Gas & Electric (PG&E), will spend more than $22 million on installing 230 direct current fast-charging stations in the state. San Diego Gas & Electric (SDG&E), and Southern California Edison (SCE) together will spend $236.3 million and $342.6 million, respectively, "on infrastructure and rebates to support electric trucks, buses, and other medium or heavy-duty vehicles," including 1,500 charging stations for those vehicles.
....is a twin-turboprop Beechcraft King Air 90, equipped with a pair of sensors pointing through a glass cutout on the bottom of the plane. The lidar measures the volume of the mountain snowpack while a spectrometer gauges its reflectivity, together providing a highly accurate estimate of how much water will run off the mountain in the spring and when it will flow through California�s warren of dams, reservoirs, and aqueducts.Californians have been trying to accurately measure the Sierra snowpack for more than a century. Every winter, the California Department of Water Resources dispatches surveyors on cross-country skis and snowshoes to hundreds of designated spots, where they plunge aluminum measuring tubes deep into the snow. That data is supplemented by more than one hundred remote sensor stations situated throughout the range, where �snow pillows� provide estimates based on the shifting weight of snow above them.
But these snapshots often don�t add up to an accurate picture of these sprawling high-mountain watersheds. In some years, the estimated amount of water that eventually reaches reservoirs like the Hetch Hetchy system, which serves nearly three million customers around San Francisco, can be off as much as 40 percent. That�s a plus or minus of tens of billions of gallons of water.
But after five years of operation, through very wet, very dry, and average years, the NASA program�s error rate is averaging around 2 percent....
More proof Republican tax cuts do not work: Fodder for the Bulls: �America Inc. Has a Record $2.5 Trillion Gift for Stock Investors� [Bloomberg 6-5-18].
�Between buybacks, dividends, and merger activities, companies are poised to plow $2.5 trillion into the stock market this year, according to UBS Group AG. The buying spree is equivalent to 10 percent of the S and P 500�s market capitalization, easily outstripping prior records.
DARPA considering bids for new constellations of LEO military satellites [SpaceNews, by Sandra Erwin � May 31, 2018]. The Defense Advance Research Projects Agency--which historically has been a first funder of new technologies because military keynesianism is tolerated in USA by conservatives, libertarians, and neoliberals--has begun to study the bids it has received for its Blackjack program. The goal of Blackjack is to replace large, very expensive and very vulnerable military satellites placed in geostationary orbits, with to a low Earth orbit constellation of smaller, cheaper, more easily replaced satellites. Of note: DARPA intends to keep Blackjack unclassified, in hopes of attracting bidders who do not have security clearances.
Spearheading the Blackjack program is Fred Kennedy, director of DARPA�s Tactical Technology Office. Kennedy has criticized the military space business as being stuck in its old ways and missing opportunities to jump on the innovation bandwagon. At industry conferences, Kennedy has called out the Pentagon for embracing a culture of high performance and low risk that is now working against the military because it has given enemies ample time to develop counter-space weapons that could be used to disable or destroy U.S. satellites.
New chief of Russian space agency Roscosmos Dmitry Rogozin poses big problem for NASA [Space News, by Matthew Bodner, June 6, 2018]. Russian President Vladimir Putin has delivered a warning to the West with the appointment of former deputy prime minister Dmitry Rogozin as head of Roscosmos. Rogozin is one of the Russian officials placed on the 2014 USA sanctions list in the USA response to Russian actions and influence in Ukraine and Crimea.
�Rogozin is not only a hawk, but a loud hawk who has threatened to kick NASA astronauts off the Soyuz and that is not in the least helpful,� says Theresa Hitchens, a former UN space official and researcher at the University of Maryland. �The sanctions issue will make it impossible for senior level meetings, although that does not rule out lower level folks from working together.�
Independent defense and space contractor Orbital ATK to be acquired by Northrop Grumman [SpaceNews, by Sandra Erwin � June 5, 2018]. The U.S. Federal Trade Commission has approved Northrop Grumman's $7.8 billion purchase of Orbital, allowing the monopolization of the aerospace industry to continue. Three large conglomerates have dominated USA aerospace industry for the past decade.
Research finds tipping point for large-scale social change of 25%, June 7, 2018, University of Pennsylvania [phys.org, via Naked Capitalism]
In this study, "Experimental Evidence for Tipping Points in Social Convention," co-authored by Joshua Becker, Ph.D., Devon Brackbill, Ph.D., and Andrea Baronchelli, Ph.D., 10 groups of 20 participants each were given a financial incentive to agree on a linguistic norm. Once a norm had been established, a group of confederates�a coalition of activists that varied in size�then pushed for a change to the norm.
When a minority group pushing change was below 25% of the total group, its efforts failed. But when the committed minority reached 25%, there was an abrupt change in the group dynamic, and very quickly the majority of the population adopted the new norm. In one trial, a single person accounted for the difference between success and failure.
More proof the USA is becoming less capitalistic as it becomes more oligarchical: America�s Startup Scene Is Looking Anemic: Fewer people are taking the entrepreneurial plunge. , by Noah Smith, June 7, 2018 [Bloomberg, via Naked Capitalism].
Graph from a recent paper by economists Ryan Decker, John Haltiwanger, Ron Jarmin and Javier Miranda, National Bureau of Economic Research. |
using System;
using System.Drawing;
using System.Collections.Generic;
using System.Threading.Tasks;
using System.Reflection;
using Microsoft.Office.Interop.Excel;
public class Startup
{
public async Task<object> Invoke(dynamic input)
{
var app = new Application();
try
{
app.Visible = false;
var workbook = app.Workbooks.Open(input.path, Password: input.password);
return Parser.Parse(workbook);
}
finally
{
app.DisplayAlerts = false;
app.Quit();
}
}
}
|
GOP, Dems Tell Obama They'll Back Afghan Decision
Both parties say in a meeting with the president they'll support his Afghan war choice
Receive the latest politics updates in your inbox
Representatives from both political parties pledged their support for President Obama's upcoming decision on the war in Afghanistan, telling the commander in chief in a Tuesday meeting that they'd be behind whatever choice the White House makes.
Representatives from both political parties pledged their support for President Obama's upcoming decision on the war in Afghanistan, telling the commander in chief in a Tuesday meeting that they'd be behind whatever choice the White House makes.
Senate Majority Leader Harry Reid confirmed that in the Tuesday meeting, which brought together lawmakers from both sides of the aisle, GOP and Democratic representatives alike told Obama "whatever decision you make, we'll support it." Reid also said Republicans would be more likely to support Obama if he could get the majority of the U.S. commanders in the region on board with his choice.
Obama is facing pressure from lawmakers, constituents and the military alike to make a decision on whether or not he'll send more troops to Afghanistan, where over 60,000 U.S. forces are currently stationed. U.S. Commander Stanley McChrystal made what some considered a political gaffe last week when he publicly requested some 40,000 more troops to be sent to the region.
White House Press Secretary Robert Gibbs said Tuesday that Obama would make his own decision about the war in Afghanistan. The White House ruled out fully removing troops from Afghanistan Monday, saying that there was no possibility of pulling out from the conflict. |
Q:
Schedule task for a specific date & time in android
I'm tying to make a app schedules task, for example 28th of april at 5am I need to check a file on my server, for example if there is a Update for the app. But if the user his phone is shutdown at that time the task needs to be executed at the best time possible, next bootup & when the phone is conencted to the internet?
I can't figure out how I can do this? I can't find a framework or Classes in the Android API that can do This task in android.
Anyone who knows a way to do this and what the best way is for performance, battery?
A:
This question is the type that is better solved by a tutorial; I would suggest looking into the AlarmManager documentation and even checking chapter 26: Background Services on The Big Nerd Ranch: Android Programming Guide; if not maybe a simple tutorial on how to create an alarm clock app might help.
|
796 F.Supp.2d 883 (2011)
Hisham NIJEM, Plaintiff,
v.
ALSCO, INC., Defendant.
No. 3:10-00221.
United States District Court, M.D. Tennessee, Nashville Division.
June 3, 2011.
*884 Stephen W. Grace, Nashville, TN, for Plaintiff.
Jeffrey M. Beemer, Kelly M. Telfeyan, Dickinson Wright PLLC, Nashville, TN, for Defendant.
MEMORANDUM
WILLIAM J. HAYNES, JR., District Judge.
Plaintiff, Hisham Nijem, filed this action under Title VII of the Civil Rights Act of 1964, 42 U.S.C. §§ 2000e et seq., ("Title VII") and the Tennessee Human Rights Act, Term. Code Ann. §§ 4-21-101 et seq. ("THRA") against the Defendant, ALSCO, Inc., his former employer. Plaintiff asserts claims for disparate treatment and hostile work environment based on national origin as well as a Tennessee common law claim of outrageous conduct. Plaintiff alleges, in essence, that Defendant discriminated against him based on his national origin by assigning him to jobs he did not want; paying him less and providing him less valuable benefits than similarly situated employees outside the protected class; terminating him; and allowing and failing to remedy his exposure to a hostile work environment.
Before the Court is the Defendant's motion for summary judgment (Docket Entry No. 12), contending, in sum: (1) that Plaintiff cannot establish a prima facie showing of discrimination or hostile work environment; (2) that Plaintiff cannot show that Defendant's conduct was so outrageous so as to cause Plaintiff a serious mental injury; and (3) that Defendant did not engage in any conduct that would entitle Plaintiff to punitive damages under Title VII.[1] In *885 response (Docket Entry No. 31), Plaintiff asserts that he has submitted sufficient evidence in support of his claims of discrimination, hostile work environment and outrageous conduct.
For the reasons set forth below, the Court concludes that for his Title VII claims, Plaintiff has presented sufficient proof on his racially hostile work environment and his termination claims, but Plaintiff lacks such proof on his job assignments and the pay and benefits claims. For his state law claim, the Court concludes that Plaintiff's proof fails to establish that Defendant's conduct would support a judgment under Tennessee law for outrageous conduct or intentional infliction of emotional distress.
I. REVIEW OF THE RECORD[2]
The Defendant supplies uniforms and linens to restaurant and health care industries. (Docket Entry No. 32, Plaintiff's Response to Defendant's Statement of Undisputed Facts, at ¶ 1). Plaintiff, who is Lebanese, worked as a Route Sales Representative ("RSR") and Account Sales Consultant ("ASC") at the Defendant's Nashville branch from October 2006 until his termination on May 29, 2009. Id. at ¶ 2. An RSR delivers clean linens to customers, returns soiled linens to the Defendant's branch, and orders linen for the customer's next delivery. Id. at ¶ 3. Plaintiff's pay as an RSR was established by Union wage scale. Id. at ¶ 5.
Under Defendant's Standard Operating Procedures ("SOP"), an ASC at a branch with less than $200,000 in weekly revenue, or in a medium cost of living market, is paid a base annual salary of $26,000, plus commissions. Id. at ¶ 25. Where a branch's weekly revenue exceeds $200,000 per week, or in markets with a higher cost of living, the ASC's base annual salary is $30,000, plus commissions. Id. In March 2007, Bobby Morgan asked Rikli to help him obtain a higher base salary. Id. at ¶ 26. Rikli obtained authority from Gary Foster, the regional manager at that time, to pay Morgan the higher base salary of $30,000. Id. Without the additional salary, Morgan would not have taken the position. Id.
Plaintiff's RSR position was subject to the seniority system with Defendant's "Master Agreement" with the Teamsters Union. Id. at ¶ 22. In March 2008, Lewana Jackson, another RSR, exercised her rights of seniority under the "Master Agreement" and bumped Plaintiff from his route to an "extra" RSR position. Id. at ¶ 23. In March 2008, Defendant's Nashville branch had three extra RSRs, but Defendant's service module only allowed the branch to have two RSRs. Id. at ¶ 24. After one employee was laid off, Plaintiff was one of the two remaining extra RSRs. Id.
In April 2008, Plaintiff was considered for the ASC position, but Dan Jones, the new regional manager, was less flexible about deviating from the company's SOP. Id. at ¶ 27. Additionally, between the time that Morgan took the ASC position in March 2007 and the time Plaintiff was considered for the ASC position in April *886 2008, the Nashville branch lost $70,000 in weekly revenues after Defendant sold its hospital linen business. Id. Defendant hired Plaintiff for the ASC position effective May 5, 2008, at a base salary of $26,000 plus commission. Id. at ¶ 32. Six months after the Plaintiff took the ASC job, Casey Madden, who is not a member of a protected class, was hired as an ASC at Defendant's St. Louis branch at a base salary of $26,000, plus commissions. Id. at ¶ 33. Rikli described the move to ASC from RSR as a lateral move. (Docket Entry No. 14, Rikli Deposition at p. 60).
Plaintiff stated that he initially did not want the ASC position. Id., Plaintiff Deposition at pp. 80-81. Plaintiff stated that the RSR position paid better than the ASC position and that the ASC position was a lateral move, not a promotion. Id. at pp. 83, 146. According to Plaintiff, Rikli stated that as an ASC he would pay Plaintiff the same as Morgan, provide a van and that if the ASC position was unsatisfactory, Plaintiff could return as a driver. Id. Plaintiff sated that he accepted the position based upon these promises and that he was not coerced to accept the ASC position. Id. at pp. 88-89. Rikli, however, denies any promise to pay Plaintiff the same as Morgan and cited Jones's change of the policy, allowing employees to drive company vans to and from work. Id., Rikli Deposition at pp. 54, 61-64. Jones sent a memorandum that "you can't take the van home." Id., Plaintiff Deposition at pp. 151-52. Further, Rikli may have told Plaintiff that he could return to RSR, if Plaintiff requested a return, but explained that Plaintiff's return required an available RSR position because Rikli could not lay off an existing RSR with union seniority rights or create a new position for Plaintiff. Id., Rikli Deposition at pp. 83-84.
Plaintiff lost his union seniority after he left his job as an RSR in May 2008. (Docket Entry No. 32, at ¶¶ 29, 32). Under section 19.10 of the Master Agreement, loss of seniority rights results from, among other reasons, resignation from employment. (Docket Entry No. 16, Exhibit 1 at 7). Plaintiff's decision to leave the bargaining unit for the ASC position was the equivalent of voluntary resignation of the RSR position. (Docket Entry No. 16, Abshire Declaration, at ¶ 10). Neither Rikli nor Abshire can override the union's seniority system under the collective bargaining agreement. (Docket Entry No. 32, at ¶ 30).
In March 2008, several employees joked in the driver's room at the Nashville branch and discussed a nickname for Plaintiff when Defendant's Service Manager, Jackie Abshire, suggested "Achmed." Id. at ¶ 6. According to Plaintiff, two supervisors, Bobby Morgan and Mike Haley, were present during these discussions. (Docket Entry No. 14, Plaintiff Deposition at pp. 106, 116). Plaintiff reported Abshire's comment to Mike Rikli, Defendant's branch general manager. (Docket Entry No. 32, at ¶ 7). According to Rikli, Plaintiff stated that he knew Abshire was joking and he did not want to take the matter any further. (Docket Entry No. 14, Rikli Deposition at p. 98). Plaintiff, however, asserts that he told Rikli that he was offended by the comment. Id., Plaintiff Deposition at pp. 113, 115, 141, 143. Rikli did not provide Plaintiff with the corporate office's telephone number to report the incident. Id. at p. 143. Rikli and Defendant's regional manager, Dan Jones, counseled Abshire about the "Achmed" comment. (Docket Entry No. 32, at ¶ 9). Abshire apologized to Plaintiff and did not make further comment about Plaintiff's national origin. Id. at ¶ 10.
According to Plaintiff, throughout his work with Defendant's managerial and non-managerial employees, Plaintiff was subjected to derogatory name-calling and *887 comments based on his national origin. (Docket Entry No. 14, Plaintiff Deposition at pp. 70, 187). In addition to being called "Achmed," Plaintiff stated that he was also called "bin Laden," "terrorist," "Iraqi" and "Afghani" by other drivers in the presence of their supervisors and such comments "really kept [him] stressed out the whole time [he] was [employed]." Id. at pp. 70, 97-103. Plaintiff cited "Glenn Erickson," a district manager, as repeatedly making such comments. Id. at pp. 98-102. Danny Wilson, a driver, called Plaintiff names based on his national origin, including one occasion before supervisors, Morgan and Haley. Id. at pp. 102-106. When Plaintiff complained to Morgan and Haley that "`[t]his is your job to put a stop to this,'" they only laughed at Plaintiff. Id. at p. 106.
On another occasion, Jeff Vanwye, a RSR driver, referred to Plaintiff as a "terrorist." Id. at pp. 107-08. Other employees were not present when this comment was made. Id. Rodney Barnett, another driver, called Plaintiff "bin Laden" regularly. Id. at pp. 109-111. On one occasion, Barnett did so in Rikli's presence. Id. at p. 111. When Plaintiff asked Rikli about responding to the comment, Rikli replied, "`I would open up a can of whoop-ass.'" Id. at pp. 111, 130-32. A mechanic, Jason, called Plaintiff "Iraqi" and "terrorist" sometimes in Morgan's presence without any corrective action. Id. at pp. 117-120. Plaintiff also identifies employees, Glenn Erickson,[3] Wilson and Vanwye, who made these comments, but Plaintiff did not report them or file a grievance. (Docket Entry No. 32, at ¶¶ 12, 14-1; Docket Entry No. 14, Plaintiff Deposition at pp. 102-03, 107-08, 133-35). Despite these comments, Plaintiff performed acceptably as an RSR without any disciplinary issues. (Docket Entry No. 57, Defendant's Response to Plaintiff's Statement of Undisputed Facts, at ¶ 17).
Plaintiff cites Defendant's "Employee Guidelines and Work Standards" during his employment, (Docket Entry No. 32, at ¶ 20), that provide, in part, as follows:
Anyone who feels that he or she has been a victim of or has observed an act of harassment should immediately report such activity to the branch Human Resources Manager, General Manager or the Human Resources Director at the General Office.
The Company will immediately investigate all such claims and take appropriate action. . . .
To report an incident, you may use the form provided in the back of this book, or report the incident in person or by phone. You may call the General Office collect at (801) 328-8831. . . . The Company can ensure a harassment-free workplace only if all employees report incidents of harassment quickly and accurately. Any supervisor or manager who has knowledge of any incident of harassment is required to report such information to the branch Human Resources Manager, General Manager or Human Resources Director.
(Docket Entry No. 56, Exhibit 2 at 0339).
Plaintiff did not discuss these comments with Gayle Robinson, Defendant's Nashville branch's human resources manager, nor did Plaintiff file a written complaint form. (Docket Entry No. 32, at ¶ 21). Plaintiff did not inform Regina Reich, Defendant's regional human resources manager, *888 about any alleged comments by any specific employee except for Abshire's comment. (Docket Entry No. 14, Plaintiff's Deposition at pp. 127-30). Plaintiff stated:
Q. How many times did you speak with Miss Reich about comments that were made?
. . . .
A. . . . It pretty much came up every time I met with her.
Q. Okay. What would you tell her?
A. Well, I just felt some of the things they were doing was racially motivated.
Q. What in particular did you share with Reggie?
A. You know, I shared with her about racial comments by Jackie. She was asking me questions about stealing because somebody called in on me, and I thought that was racially motivated also, and I made that clear to her.
Q. Did you mention to her comments made by anyone other than Jackie Abshire?
A. I don't recall that, no.
Q. Okay. So you're saying you don't recall discussing any comments that anyone made, other than Jackie?
A. Not to Reggie, no.
Id. at pp. 127-28.
During an October 8, 2008 meeting, Plaintiff did not tell Rikli about any alleged comments except Abshire's comment. Plaintiff stated:
Q. Did you have any other discussions with Mike Rikli, other than the time that you were standing outside smoking and Rodney made the comment to you?
A. About Rodney?
Q. About any comments that were made to you. Any other times you spoke with Mike Rikli?
A. Well, at the time I guess you could say things started blowing up was when I was being investigated and Mike Rikli felt that I was using that as an excuse.
Q. Using what as an excuse?
A. The racial comments and, you know, discrimination.
Q. Well, my question is, other than the time you were standing outside next to him and you heard Rodney Barnett call you bin Ladin, was there ever a time you specifically spoke with Mike Rikli about comments that were made to you?
A. We spoke so many times in the office about discrimination, I don't recall what exactly the exact words were about who.
Q. You just don't remember?
A. No, I don't remember. I know we've had conversations about them. I don't remember exactly what the conversations were.
Q. Did you ever have a discussion with Mike about things that Glenn Erickson had said to you?
A. No.
Q. Did you ever have a discussion with Mike Rikli about what Danny Wilson had said to you?
A. I didn't have any conversation about any specific person. I just told him that there werethe comments were being made.
Q. Why didn't you give him a name? A specific person's name?
A. Well, because I felt at the time he heard it himself and he didn't do anything about it. Second, he was accusing me of using that as an excuse so he basically, didn't want to hear it. He didn't want to be bothered with it, didn't want to hear it. And once he made the comment to me about "This is the South, you got to expect discrimination," I knew what I was dealing with and I didn't want to deal with him.
* * *
Q. . . . . My question, though, is you had discussion with Mike Rikli. You *889 had the one time that he heard Rodney Barnett make the bin Ladin comment to you. There were several other conversations that you had with him that you discussed the work environment in general. Is that fair?
A. That's fair.
Q. Okay. And as I understand your testimony, you never specifically discussed with him what these six people had said to you, correct?
A. I don't remember any specific conversation about an individual. It was just an overall discussion about the name-calling by the drivers.
Q. Did Mike Rikli ever ask you, "Who's doing this? Hisham, tell me who's doing this"?
A. No.
Q. Never said anything to that effect?
A. No.
Q. Did you ever volunteer to him who was doing it?
A. I just said the drivers and Jackie did it.
Id. at pp. 132-34, 135. As a result of this meeting, on October 9, 2008, Rikli posted a memorandum to all branch employees to remind them that name-calling would not be tolerated. (Docket Entry No. 32, at ¶ 40).
On August 27, 2008, an anonymous person called Defendant's fraud hotline and reported that Plaintiff was overheard telling another RSR that he was taking cash for items he delivered, but not including the items on invoices. (Docket Entry No. 32, at ¶ 34). On August 29, 2008, Reich, interviewed Plaintiff concerning the anonymous complaint. Id. On October 31, 2008, Plaintiff met with Jones and Reich, who informed Plaintiff that he was cleared of any wrongdoing and that they were ending the theft investigation against him. Id. at ¶ 41.
On October 28, 2008, Rikli informed Plaintiff that "his attitude should change and he should do his job and keep his mouth shut." (Docket Entry No. 14, Rikli Deposition at p. 115). Rikli also stated that Plaintiff needed to stop the racial accusations and do his job. Id. Rikli further stated that if Plaintiff could not do his job without creating issues with his team, then he should work elsewhere. Id. at p. 116. Rikli explained that he was referring to Plaintiff's unfounded racial accusations. Id. at p. 117.
According to Abshire, a RSR position did not become available at any time between May 2008 and May 2009. (Docket Entry No. 16, Abshire Declaration, at ¶ 10). If a RSR position had been available after Plaintiff took the ASC position, Defendant would have been required to offer that position to Walter Staley based upon Staley's seniority. Id. Plaintiff, however, stated that some driver positions did become available, but Rikli told him that the positions would not be filled at the moment. (Docket Entry No. 14, Plaintiff Deposition at pp. 208-11).
On November 5, 2008, Plaintiff interviewed with Rikli, Robinson, and Abshire for a district manager position, a posted vacancy at the Nashville branch. (Docket Entry No. 32, at ¶¶ 35, 42). Another applicant, William Ray, Jr., interviewed for the position. Id. at ¶ 42. Defendant selected Ray who had more experience managing route service employees. Id. at ¶ 43. Ray worked six years as a route manager for a produce distribution company where he managed drivers. Id. Plaintiff's managerial experience included Coca-Cola that he left in 1997. Id.
In April 2009, Plaintiff's weekly sales average for the year was $ 16.59. Id. at 45. As an ASC, Plaintiff was responsible for generating $85.00 in weekly sales, but Plaintiff never met this goal. Id. at ¶ 44. On April 8, 2009, Defendant provided Plaintiff an "ASC Goal and Action Plan" to increase his sales number, with a warning *890 that his failure to progress would result in his termination. Id. at ¶ 45.
On May 26, 2009, Plaintiff's weekly sales report for May 4, 2009, reflected $70.63 in new sales, but that figure included the products sold by other RSRs. Id. at ¶ 47. Plaintiff's weekly sales average increased his multiplier for future commissions and would impact his future pay. Id. at ¶ 48. Plaintiff disputes that he misrepresented the number of products sold, explaining that he reported the numbers as Rikli and Abshire instructed.
Q. Would there ever have been a situation where you would have listed products or accounts sampled or products or accounts billed on invoice that you had not actually sold?
A. Yes. Yes.
Q. Okay. In what situations would you do that?
A. When the drivers gave them to me. You know, like I say, when Jackie gave me all the ones that's been, you know, put out there for customers that's already not sampled but sold, I did put those down, but I didn't collect the money for them.
Q. Okay.
A. I didn't collect no commission on them.
Q. What was the purpose of putting it down on your activity report if you didn't collect a commission?
A. To bring my numbers up, according to Rikli, and with the help of Jackie.
Q. And who gave you authorization to do that?
A. Mike Rikli did.
Q. So there were times that you submitted this Weekly ASC Activity where you listed products that you actually had not sold as being your sales?
A. I listed it whether they were sold by me or the other drivers, but I did not collect any money for myself.
Q. How did you get information on what the drivers had sold?
A. Jackie gave it to me. . . . But like I said, once again, I never collected any money for them because that was the deal that I made with Rikli.
Q. Who knew that you were submitting salesWeekly ASC Activity reports with driver sales listed on them?
A. Jackie Abshire, Mike Rikli, and all the drivers that I was working with. Like I said, at one point Jackie told the two drivers, you know, give Hisham the sales leadsor the numbers. But like said, once again, I would report the numbers to bring my numbers up, but they would get paid the commission on it, not me.
(Docket Entry No. 14, Plaintiff Deposition at pp. 215-16). Rikli denied that he or Abshire instructed Plaintiff to submit weekly ASC activity reports of driver sales. (Docket Entry No. 14, Rikli Deposition at pp. 133-34).
On May 29, 2009, Defendant terminated Plaintiff for failing to meet his sales goals and falsifying company documents. (Docket Entry No. 32, at ¶ 49). Morgan, who failed to meet his sales goals, was neither disciplined nor threatened with a loss of his job. (Docket Entry No. 57, at ¶ 25). Reich acknowledged that the majority of ASC's in the district do not make their sales quota. Id. at ¶ 34. Rikli stated that while Morgan did not meet the sales goal, Plaintiff's $18 week average at the time of his termination was far less than what Morgan averaged at any point. (Docket Entry No. 14, Rikli Deposition at pp. 129-30).[4] Rikli explained that Plaintiff's *891 falsifying of company records was the primary reason for Plaintiff's termination as Rikli had not yet decided, if Plaintiff's weekly sales average could still be tolerated. Id. The ASC position at the Nashville branch has not been filled since Plaintiff's termination. (Docket Entry No. 32, at ¶ 50).
II. CONCLUSIONS OF LAW
"The very mission of the summary judgment procedure is to pierce the pleadings and to assess the proof in order to see whether there is a genuine need for trial." Advisory Committee Notes on Rule 56, Federal Civil Judicial Procedure and Rules (West Ed. 1989). Moreover, "district courts are widely acknowledged to possess the power to enter summary judgment sua sponte, so long as the opposing party was on notice that [he] had to come forward with all of [his] evidence." Celotex Corp. v. Catrett, 477 U.S. 317, 326, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986); accord, Routman v. Automatic Data Processing, Inc., 873 F.2d 970, 971 (6th Cir.1989).
In Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986), the United States Supreme Court explained the nature of a motion for summary judgment:
Rule 56(c) of the Federal Rules of Civil Procedure provides that summary judgment "shall be rendered forthwith if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law." By its very terms, this standard provides that the mere existence of some alleged factual dispute between the parties will not defeat an otherwise properly supported motion for summary judgment; the requirement is that there be no genuine issue of material fact.
As to materiality, the substantive law will identify which facts are material. Only disputes over facts that might affect the outcome of the suit under the governing law will properly preclude the entry of summary judgment. Factual disputes that are irrelevant or unnecessary will not be counted.
477 U.S. at 247-48, 106 S.Ct. 2505 (emphasis in the original and added in part). Earlier the Supreme Court defined a material fact for Rule 56 purposes as "[w]here the record taken as a whole could not lead a rational trier of fact to find for the nonmoving party, there is no `genuine issue for trial.'" Matsushita Electrical Industrial Co. v. Zenith Radio Corp., 475 U.S. 574, 587, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986) (citations omitted).
A motion for summary judgment is to be considered after adequate time for discovery. Celotex, 477 U.S. at 326, 106 S.Ct. 2548 (1986). Where there has been a reasonable opportunity for discovery, the party opposing the motion must make an affirmative showing of the need for additional discovery after the filing of a motion for summary judgment. Emmons v. McLaughlin, 874 F.2d 351, 355-57 (6th Cir.1989). But see Routman v. Automatic Data Processing, Inc., 873 F.2d 970, 971 (6th Cir.1989).
There is a certain framework in considering a summary judgment motion as to the required showing of the respective parties, as described by the Court in Celotex:
Of course, a party seeking summary judgment always bears the initial responsibility of informing the district court of the basis for its motion, and identifying those portions of "the pleadings, depositions, answers to interrogatories, *892 and admissions on file, together with the affidavits, if any," which it believes demonstrate the absence of a genuine issue of material fact. . . . [W]e find no express or implied requirement in Rule 56 that the moving party support its motion with affidavits or other similar materials negating the opponent's claim.
Celotex, 477 U.S. at 323, 106 S.Ct. 2548 (emphasis deleted).
As the Court of Appeals explained, "[t]he moving party bears the burden of satisfying Rule 56(c) standards." Martin v. Kelley, 803 F.2d 236, 239, n. 4 (6th Cir.1986). The moving party's burden is to show "clearly and convincingly" the absence of any genuine issues of material fact. Sims v. Memphis Processors, Inc., 926 F.2d 524, 526 (6th Cir.1991) (quoting Kochins v. Linden-Alimak, Inc., 799 F.2d 1128, 1133 (6th Cir.1986)). "So long as the movant has met its initial burden of `demonstrat[ing] the absence of a genuine issue of material fact,' the nonmoving party then `must set forth specific facts showing that there is a genuine issue for trial.'" Emmons, 874 F.2d at 353 (quoting Celotex and Rule 56(e)).
Once the moving party meets its initial burden, the United States Court of Appeals for the Sixth Circuit warned that "the respondent must adduce more than a scintilla of evidence to overcome the motion [and] . . . must `present affirmative evidence in order to defeat a properly supported motion for summary judgment.'" Street v. J.C. Bradford & Co., 886 F.2d 1472, 1479 (6th Cir.1989) (quoting Liberty Lobby). Moreover, the Court of Appeals explained that:
The respondent must "do more than simply show that there is some metaphysical doubt as to the material facts." Further, "[w]here the record taken as a whole could not lead a rational trier of fact to find" for the respondent, the motion should be granted. The trial court has at least some discretion to determine whether the respondent's claim is "implausible."
Street, 886 F.2d at 1480 (citations omitted). See also Hutt v. Gibson Fiber Glass Products, 914 F.2d 790, 792 (6th Cir.1990) ("A court deciding a motion for summary judgment must determine `whether the evidence presents a sufficient disagreement to require submission to a jury or whether it is so one-sided that one party must prevail as a matter of law.'") (quoting Liberty Lobby).
If both parties make their respective showings, the Court then determines if the material factual dispute is genuine, applying the governing law.
More important for present purposes, summary judgment will not lie if the dispute about a material fact is "genuine," that is, if the evidence is such that a reasonable jury could return a verdict for the nonmoving party.
. . . .
Progressing to the specific issue in this case, we are convinced that the inquiry involved in a ruling on a motion for summary judgment or for a directed verdict necessarily implicates the substantive evidentiary standard of proof that would apply at the trial on the merits. If the defendant in a run-of-the-mill civil case moves for summary judgment or for a directed verdict based on the lack of proof of a material fact, the judge must ask himself not whether he thinks the evidence unmistakably favors one side or the other but whether a fair-minded jury could return a verdict for the plaintiff on the evidence presented. The mere existence of a scintilla of evidence in support of the plaintiff's position will be insufficient; there must be evidence on which the jury could reasonably find for the plaintiff. The judge's *893 inquiry, therefore, unavoidably asks whether reasonable jurors could find by a preponderance of the evidence that the plaintiff is entitled to a verdict "whether there is [evidence] upon which a jury can properly proceed to find a verdict for the party producing it, upon whom the onus of proof is imposed."
Liberty Lobby, 477 U.S. at 248, 252, 106 S.Ct. 2505 (citation omitted and emphasis added).
It is likewise true that:
In ruling on [a] motion for summary judgment, the court must construe the evidence in its most favorable light in favor of the party opposing the motion and against the movant. Further, the papers supporting the movant are closely scrutinized, whereas the opponent's are indulgently treated. It has been stated that: The purpose of the hearing on the motion for such a judgment is not to resolve factual issues. It is to determine whether there is any genuine issue of material fact in dispute. . . .'
Bohn Aluminum & Brass Corp. v. Storm King Corp., 303 F.2d 425, 427 (6th Cir. 1962) (citation omitted). As the Court of Appeals stated, "[a]ll facts and inferences to be drawn therefrom must be read in a light most favorable to the party opposing the motion." Duchon v. Cajon Co., 791 F.2d 43, 46 (6th Cir.1986).
The Sixth Circuit further explained the District Court's role in evaluating the proof on a summary judgment motion:
A district court is not required to speculate on which portion of the record the nonmoving party relies, nor is it obligated to wade through and search the entire record for some specific facts that might support the nonmoving party's claim. Rule 56 contemplates a limited marshalling of evidence by the nonmoving party sufficient to establish a genuine issue of material fact for trial. This marshalling of evidence, however, does not require the nonmoving party to "designate" facts by citing specific page numbers. Designate means simply "to point out the location of." Webster's Third New InterNational Dictionary (1986).
Of course, the designated portions of the record must be presented with enough specificity that the district court can readily identify the facts upon which the nonmoving party relies; but that need for specificity must be balanced against a party's need to be fairly apprised of how much specificity the district court requires. This notice can be adequately accomplished through a local court rule or a pretrial order.
InterRoyal Corp. v. Sponseller, 889 F.2d 108, 111 (6th Cir.1989). Here, the parties have given some references to the proof upon which they rely. Local Rules 56.01(b)-(d) require a showing of undisputed and disputed facts.
In Street, the Court of Appeals discussed the trilogy of leading Supreme Court decisions, and other authorities on summary judgment and synthesized ten rules in the "new era" on summary judgment motions:
1. Complex cases are not necessarily inappropriate for summary judgment.
2. Cases involving state of mind issues are not necessarily inappropriate for summary judgment.
3. The movant must meet the initial burden of showing "the absence of a genuine issue of material fact" as to an essential element of the non-movant's case.
4. This burden may be met by pointing out to the court that the respondent, having had sufficient opportunity for discovery, has no evidence to support an essential element of his or her case.
5. A court should apply a federal directed verdict standard in ruling on a *894 motion for summary judgment. The inquiry on a summary judgment motion or a directed verdict motion is the same: "whether the evidence presents a sufficient disagreement to require submission to a jury or whether it is so one-sided that one party must prevail as a matter of law."
6. As on federal directed verdict motions, the "scintilla rule" applies, i.e., the respondent must adduce more than a scintilla of evidence to overcome the motion.
7. The substantive law governing the case will determine what issues of fact are material, and any heightened burden of proof required by the substantive law for an element of the respondent's case, such as proof by clear and convincing evidence, must be satisfied by the respondent.
8. The respondent cannot rely on the hope that the trier of fact will disbelieve the movant's denial of a disputed fact, but must "present affirmative evidence in order to defeat a properly supported motion for summary judgment."
9. The trial court no longer has the duty to search the entire record to establish that it is bereft of a genuine issue of material fact.
10. The trial court has more discretion than in the "old era" in evaluating the respondent's evidence. The respondent must "do more than simply show that there is some metaphysical doubt as to the material facts." Further, "[w]here the record taken as a whole could not lead a rational trier of fact to find" for the respondent, the motion should be granted. The trial court has at least some discretion to determine whether the respondent's claim is "implausible."
Street, 886 F.2d at 1479-80 (citations omitted).
The Court has distilled from these collective holdings four issues that are to be addressed upon a motion for summary judgment: (1) has the moving party "clearly and convincingly" established the absence of material facts?; (2) if so, does the plaintiff present sufficient facts to establish all the elements of the asserted claim or defense?; (3) if factual support is presented by the nonmoving party, are those facts sufficiently plausible to support a jury verdict or judgment under the applicable law?; and (4) are there any genuine factual issues with respect to those material facts under the governing law?
A. HOSTILE WORK ENVIRONMENT CLAIM
Title VII of the Civil Rights Act of 1964 prohibits an employer from discriminating "against any individual with respect to his compensation, terms, conditions, or privileges of employment, because of such individual's race, color, religion sex or national origin." 42 U.S.C. § 2000e-2(a)(1).[5] A plaintiff can establish a violation of Title VII if he/she is able to prove that discrimination created a hostile work environment. Clark v. United Parcel Service, Inc., 400 F.3d 341, 347 (6th Cir.2005). Title VII is thus violated "[w]hen the workplace is permeated with `discriminatory intimidation, ridicule, and insult' that is `sufficiently severe or pervasive to alter the conditions of the victim's employment and create an abusive working environment.'" Harris v. Forklift Systems, Inc., 510 U.S. 17, 21, 114 S.Ct. 367, 126 L.Ed.2d 295 (1993) (citation omitted).
For a prima facie showing of hostile work environment based on national origin, *895 a plaintiff must prove: (1) that he was a member of a protected class; (2) that he was subjected to unwelcomed harassment; (3) that the harassment was based on national origin; (4) that the harassment had the effect of unreasonably interfering with the plaintiff's work performance by creating an intimidating, hostile, or offensive work environment; and (5) the existence of employer liability. Hafford v. Seidner, 183 F.3d 506, 512 (6th Cir.1999).
Harassment affects a "term, condition or privilege of employment" if the conduct is severe or pervasive enough to alter the conditions of the plaintiff's employment and creates an abusive working environment. Harris, 510 U.S. at 21-22, 114 S.Ct. 367. For conduct to qualify as having created a hostile work environment, both an objective and subjective test must be met:
"[M]ere utterance of an . . . epithet which engenders offensive feelings in a[sic] employee," Meritor Savings Bank, FSB v. Vinson, 477 U.S. 57, 106 S.Ct. 2399, 91 L.Ed.2d 49 (1986) (internal quotation marks omitted) does not sufficiently affect the conditions of employment to implicate Title VII. Conduct that is not severe or pervasive enough to create an objectively hostile or abusive work environmentan environment that a reasonable person would find hostile or abusive is beyond Title VII's purview. Likewise, if the victim does not subjectively perceive the environment to be abusive, the conduct has not actually altered the conditions of the victim's employment, and there is no Title VII violation.
Id. at 21-2, 114 S.Ct. 367. To determine whether the objective and subjective tests are met, the Court must look at the totality of the circumstances.
[W]hether an environment is "hostile" or "abusive" can be determined only by looking at all the circumstances. These may include the frequency of the discriminatory conduct; its severity; whether it is physically threatening or humiliating, or a mere offensive utterance; and whether it unreasonably interferes with an employee's work performance . . . no single factor is required.
Id. at 23, 114 S.Ct. 367. "`[S]imple teasing,' offhand comments, and isolated incidents (unless extremely serious) will not amount to discriminatory changes in the `terms and conditions of employment.'" Faragher v. City of Boca Raton, 524 U.S. 775, 788, 118 S.Ct. 2275, 141 L.Ed.2d 662 (1998) (citations omitted).
Defendant contends that Plaintiff cannot establish the fourth or fifth elements of his hostile work environment claim. As to the fourth element, Plaintiff has presented evidence that he was subjected to name-calling based upon his national origin on numerous occasions throughout his employment with Defendant. In his deposition, Plaintiff described these comments as offensive and causing him much stress. In viewing the facts in the light most favorable to Plaintiff, as it must on a motion for summary judgment, the Court concludes Plaintiff has satisfied the fourth element of his prima facie showing.
For an employer to be vicariously liable for the harassment of its employees, the plaintiff must also show that the employer "knew or should have known of the charged . . . harassment and failed to implement prompt and appropriate corrective action," Williams v. General Motors Corp., 187 F.3d 553, 561 (6th Cir.1999) (citing Hafford, 183 F.3d at 513).
As for the acts of co-workers, a plaintiff may hold an employer directly liable if she can show that the employer knew or should have known of the conduct, and that its response manifested indifference *896 or unreasonableness. See Blankenship v. Parke Care Ctrs., Inc., 123 F.3d at 873 (citing Pierce v. Commonwealth Life Ins. Co., 40 F.3d 796, 805 (6th Cir.1994)). Significantly, a court must judge the appropriateness of a response by the frequency and severity of the alleged harassment. See Erebia v. Chrysler Plastic Prods. Corp., 772 F.2d 1250, 1252-53 (6th Cir.1985). Generally, a response is adequate if it is reasonably calculated to end the harassment. See Intlekofer v. Turnage, 973 F.2d 773, 778 (9th Cir.1992) (citing Katz v. Dole, 709 F.2d 251, 256 (4th Cir.1983)).
Jackson v. Quanex Corp., 191 F.3d 647, 663 (6th Cir.1999).
Plaintiff complained to Reich and Rikli about Abshire's comment. Plaintiff also complained to Rikli concerning other discriminatory name-calling, but did not specifically name any employee. On one occasion, Plaintiff stated that Barnett called Plaintiff "bin Laden" in Rikli's presence, but Rikli did not take any action. Rikli disputes that he witnessed Barnett's comment. Rikli also stated that Plaintiff did not name anyone other than Abshire as calling Plaintiff names based upon his national origin and Rikli posted a memorandum reminding employees that such name-calling would not be tolerated. Plaintiff, however, stated that Rikli told him to expect some discrimination in the South; to change his attitude; to keep his mouth shut; and to stop the racial accusations. If Plaintiff could not do his job without creating issues with his team, Rikli told Plaintiff that he should work elsewhere. According to Plaintiff, these comments exhibit Rikli's lack of interest in Plaintiff's complaints. Rikli, however, explained that he was referring to Plaintiff's unfounded racial accusations.
The Court concludes that a material factual dispute exists on whether Defendant's response to Plaintiff's claims was adequate or manifested indifference or lack of a reasonable response to racially discriminatory remarks. Lagunovich v. Findlay City Sch. Sys., 181 F.Supp.2d 753, 767-68 (N.D.Ohio 2001). Thus, Defendant's motion on his hostile work environment claim should be denied.
B. DISCRIMINATION CLAIM
Under Title VII, an employer cannot discriminate against any individual with respect to the employee's compensation, terms, conditions or privileges of employment, because of such individual's national origin. 42 U.S.C. § 2000e-2(a)(1). "In a disparate treatment case, liability depends on whether the protected trait [here, national origin] actually motivated the employer's decision. . . . [A] disparate treatment claim cannot succeed unless the employee's protected trait actually played a role in that process and had a determinative influence on the outcome." Hazen Paper Co. v. Biggins, 507 U.S. 604, 610, 113 S.Ct. 1701, 123 L.Ed.2d 338 (1993).
The language of Title VII "is not limited to `economic' or `tangible' discrimination. The phrase `terms, conditions, or privileges of employment' evinces a congressional intent `to strike at the entire spectrum of disparate treatment of men and women' in employment. . . ." Harris, 510 U.S. at 21, 114 S.Ct. 367 (citing Meritor, 477 U.S. at 64, 106 S.Ct. 2399) (some internal quotation marks omitted).
"A prima facie case of disparate treatment under Title VII must establish by a preponderance of the evidence that the defendant took action affecting the plaintiff's compensation, terms, conditions or privileges of employment under circumstances which give rise to an inference of unlawful discrimination. Thus, the prima facie case focuses upon the primary factual inquiries of any disparate treatment case: "`[whether] the *897 defendant intentionally discriminated against the plaintiff'", and whether the employer treats people less favorably than others because of race, color, religion, sex or national origin.
Beaven v. Com. of Ky., 783 F.2d 672, 675 (6th Cir.1986) (citations omitted).
"[A] plaintiff may establish discrimination either by introducing direct evidence of discrimination or by proving inferential and circumstantial evidence which would support an inference of discrimination." Kline v. Tennessee Valley Authority, 128 F.3d 337, 348 (6th Cir.1997). Yet, "[t]he direct evidence and circumstantial evidence paths are mutually exclusive. . . . If a plaintiff can produce direct evidence of discrimination then the McDonnell Douglas-Burdine paradigm is of no consequence. Similarly, if a plaintiff attempts to prove its case using the McDonnell Douglas-Burdine paradigm, then the party is not required to introduce direct evidence of discrimination." Id. at 348-49. Here, Plaintiff relies upon circumstantial evidence to prove discrimination.
A plaintiff may create a presumption of discrimination when he establishes the following elements of his prima facie case by a preponderance of the evidence: (1) membership in a protected class; (2) that he suffered from an adverse employment action; (3) that he was qualified for the position; and (4) that he was replaced by someone outside the protected class or was treated differently than similarly-situated, non-protected employees. Wright v. Murray Guard, Inc., 455 F.3d 702, 707 (6th Cir.2006).[6] To qualify as "similarly-situated," the employee to whom the comparison is drawn "must have dealt with the same supervisor, have been subject to the same standards and have engaged in the same conduct without such differentiating or mitigating circumstances that would distinguish their conduct or the employer's treatment of them for it." Hollins v. Atlantic Co., Inc., 188 F.3d 652, 659 (6th Cir. 1999) (quoting Mitchell v. Toledo Hosp., 964 F.2d 577, 583 (6th Cir.1992)). If the Plaintiff establishes his prima facie case, the Defendant may offer any legitimate, non-discriminatory reason for the action, which Plaintiff may then rebut with evidence of pretext. Alexander v. Local 496, Laborers' Intern. Union of North America, 177 F.3d 394, 403 (6th Cir.1999) (citing Hartsel v. Keys, 87 F.3d 795, 800 (6th Cir.1996)). The burden at all times, remains with the Plaintiff. Id.
Plaintiff admits that he freely accepted the ASC position, and Rikli did not transfer Plaintiff against his will. Plaintiff was not similarly situated to Morgan as Plaintiff had a different regional manager who was, admittedly, less flexible about deviating from the company's SOP than the previous regional manager and eliminated Plaintiff's use of the van. The undisputed facts show that in April 2008, the Nashville branch had lost $70,000 in weekly revenue. Further, Jones, not Rikli, removed the *898 benefit of allowing employees take the company van home. Thus, Plaintiff has failed to demonstrate that Defendant discriminated against him based on his national origin by assigning him to the ASC position, by paying him less and providing him with less benefits than similarly situated employees outside the protected class. Further, the undisputed facts reveal that after he left his job as a RSR, Plaintiff lost his union seniority and that neither Rikli nor Abshire had the authority to override the union's seniority system. Plaintiff has failed to prove that he was treated differently than similarly-situated, non-protected employees who lacked seniority.[7]
Finally, Plaintiff has established a material factual dispute about his termination. Plaintiff was allegedly terminated for not meeting his sales goals and falsifying company documents. Defendant admits that Morgan was neither disciplined nor was his job threatened for failing to meet his sales goals, but states that Plaintiff's weekly sales average were far lower than what Morgan averaged at any point. Rikli also stated that Plaintiff's falsifying of company records was the primary reason for his termination. However, Plaintiff stated that he reported his sales as instructed by Rikli and Abshire. The Court concludes that this factual dispute is material and precludes an award of summary judgment.
C. OUTRAGEOUS CONDUCT CLAIM
Under Tennessee law, to state a claim for outrageous conduct/infliction of emotional distress "(1) the conduct complained of must be intentional or reckless; (2) the conduct must be so outrageous that it is not tolerated by civilized society; and (3) the conduct complained of must result in serious mental injury." Bain v. Wells, 936 S.W.2d 618, 622 (Tenn.1997) (citation omitted). "`It is for the court to determine, in the first instance, whether the defendant's conduct may reasonably be regarded as so extreme and outrageous as to permit recovery.'" Medlin v. Allied Inv. Co., 217 Tenn. 469, 398 S.W.2d 270, 275 (1966) (quoting Restatement (Second) of Torts § 46(1) cmt. h). Tennessee courts recognize that "liability for mental distress damages clearly `do[] not extend to mere insults, indignities, threats, annoyances, petty oppression or other trivialities.'" Bain, 936 S.W.2d at 622 (quoting Medlin, 398 S.W.2d at 274). Acknowledging that "no perfect legal standard exists for determining whether particular conduct is so intolerable as to be tortious," the Tennessee Supreme Court has adopted the "high threshold standard" of the Restatement (Second) of Torts that states as follows:
The cases thus far decided have found liability only where the defendant's conduct has been extreme and outrageous. It has not been enough that the defendant has acted with an intent which is tortious or even criminal, or that he has intended to inflict emotional distress, or even that his conduct has been characterized by `malice,' or a degree of aggravation which would entitle the plaintiff to punitive damages for another tort. Liability has been found only where the conduct has been so outrageous in character, and so extreme in degree, as to go beyond all bounds of decency, and to be regarded as atrocious and utterly intolerable in a civilized community. Generally, the case is one in which the recitation of the facts to an average member of the community would arouse his resentment *899 against the actor, and lead him to exclaim, `Outrageous.'
Id. at 622-23 (quoting Restatement (Second) of Torts § 46 comment d (1965)); see also Medlin, 398 S.W.2d at 274.
"This is an extremely high standard for the plaintiff to meet." Jenkins v. Nashville Public Radio, No. 3:02CV0179, 2005 WL 3358871, at *4 (M.D.Tenn. Dec. 9, 2005) (footnote omitted). "[D]iscriminatory conduct does not automatically give rise to the imposition of liability for intentional infliction of emotional distress. If it did, virtually every action brought under [the federal Civil Rights Act and the THRA] would include an intentional infliction of emotional distress claim." Arnett v. Domino's Pizza I, L.L.C., 124 S.W.3d 529, 540 (Tenn.Ct.App.2003). Further, "`some degree of transient and trivial emotional distress is a part of the price of living among people.' Thus recovery for intentional infliction of emotional distress is limited to mental injury which is `so severe that no reasonable [person] would be expected to endure it.'" Id. (quoting Miller v. Willbanks, 8 S.W.3d 607, 615 n. 4 (Tenn.1999)) (quoting Restatement (Second) of Torts § 46 cmt. j (1965)).
Usually, Title VII claims require less proof than state law claims for outrageous conduct or intentional infliction of emotional distress. See Herrera v. Lufkin Indus., Inc., 474 F.3d 675, 688 (10th Cir. 2007) (citing David C. Yamada, The Phenomenon of "Workplace Bullying" and the Need for Status-Blind Hostile Work Environment Protection, 88 Geo. L.J. 475, 503 (2000)). For his outrageous conduct claim, Plaintiff does not present any other facts apart from his discrimination claims. "Alleging a violation of anti-discrimination laws, without additional evidence showing conduct so outrageous as not to be tolerated in civilized society, is simply insufficient to prove intentional infliction of emotional distress." Jenkins, 2005 WL 3358871, at *4. While Plaintiff was exposed to comments based upon his national origin and was later terminated, the record reveals that Rikli did take some corrective action and there is not evidence of any physical touching or hostile threats in conjunction with the name-calling. Accordingly, the Court concludes that Plaintiff's state law outrageous conduct claim should be dismissed for failing to meet the standards of Tennessee law.
As to Plaintiff's punitive damages claim under Title VII, "[a] complaining party may recover punitive damages . . . if the complaining party demonstrates that the respondent engaged in a discriminatory practice or discriminatory practices with malice or with reckless indifference to the federally protected rights of an aggrieved individual." 42 U.S.C. § 1981a(b)(1). As Plaintiff has established an issue of fact that Defendant engaged in discriminatory conduct, the Court concludes that a reasonable jury could conclude that Defendant acted with malice or reckless indifference to Plaintiff's federally protected rights. Thus, Defendant's contention that it did not engage in any conduct that would entitle Plaintiff to punitive damages under Title VII fails.
Accordingly, for these reasons the Court concludes that Defendant's motion for summary judgment (Docket Entry No. 12) should be granted in part and denied in part consistent with this opinion.
An appropriate Order is filed herewith.
ORDER
In accordance with the Memorandum filed herewith, Defendant's motion for summary judgment (Docket Entry No. 12) is GRANTED in part and DENIED in part. A trial date on Plaintiff's discrimination claims based upon hostile work environment *900 and termination will be set by separate order.
It is so ORDERED.
NOTES
[1] Plaintiff's claim for punitive damages under the THRA was dismissed by the Court. See (Docket Entry No. 52).
[2] Upon a motion for summary judgment, the factual contentions are viewed in the light most favorable to the party opposing the motion for summary judgment. Duchon v. Cajon Co., 791 F.2d 43, 46 (6th Cir.1986). As will be discussed infra, upon the filing of a motion for summary judgment, the opposing party must come forth with sufficient evidence to withstand a motion for directed verdict, Anderson v. Liberty Lobby, 477 U.S. 242, 247-52, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986), particularly where there has been an opportunity for discovery. Celotex Corp. v. Catrett, 477 U.S. 317, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). Because material factual disputes exist, this section does not constitute a findings of fact under Fed.R.Civ.P. 56(d).
[3] According to Defendant, the Nashville branch did not employ anyone named "Glen Ericson" during Plaintiff's employment, but did employ a district manager, Glen Wilkinson, who last worked for ALSCO on October 17, 2007. (Docket Entry No. 15, Regina Reich Declaration at ¶ 3). Defendant asserts that Wilkinson was an RSR, (Docket Entry No. 14, at 3), but Reich's declaration refers to Wilkinson as a district manager.
[4] Rikli stated that Morgan's weekly sales average was "somewhere in the neighborhood of $45 to $50." (Docket Entry No. 57, at ¶ 25). Defendant, however, did not provide a copy of the deposition excerpt in support, and the Court cannot consider this testimony.
[5] "THRA claims are analyzed in the same manner as Title VII claims." Tetro v. Elliott Popham Pontiac, Oldsmobile, Buick & GMC Trucks, Inc., 173 F.3d 988, 993 (6th Cir.1999) (citing Campbell v. Florida Steel Corp., 919 S.W.2d 26, 31 (Tenn.1996)).
[6] The Court notes that Plaintiff is not alleging a mixed-motive claim. See Spees v. James Marine, Inc., 617 F.3d 380, 390 (6th Cir.2010) ("Plaintiffs must give proper notice when bringing mixed-motive claims.") (citing Hashem-Younes v. Danou Enters., Inc., 311 Fed. Appx. 777, 779 (6th Cir.2009)) (where the Sixth Circuit noted that the plaintiff presented her claims as single-motive claims pursuant to the general anti-discrimination provision of 42 U.S.C. § 2000e, the record was silent as to mixed motives, the plaintiff did not raise the claim in her complaint or mention it in her response to the defendants' motion for summary judgment); Bartlett v. Gates, No. 09-3823, 421 Fed.Appx. 485, 488 n. 1, 2010 WL 4723786, at *3 n. 1 (6th Cir. Nov. 15, 2010) (plaintiffs failed to provide notice of mixed motive claims); Byers v. Midwest Terminal, Inc., No. 5:09-CV-00010-TBR, 2010 WL 3259734, at *4 n. 2 (W.D.Ky. Aug. 17, 2010) (not a mixed-motive action where plaintiff did not raise issue in response and relied instead on indirect evidence of discrimination).
[7] Defendant also moved for summary judgment as to Plaintiff's application for the district manager position. However, Plaintiff did not address this claim in his response. To the extent that Plaintiff was asserting a failure to promote claim, the Court deems that claim abandoned.
|
Ecuador to Pump Over OPEC Oil Limit
Written by Benoit Faucon at The Wall Street Journal
Ecuador has broken ranks with fellow OPEC members as the South American country’s energy minister said it could no longer hold up its end of an agreement to cut oil production. Ecuador is among the smallest producers in the Organization of the Petroleum Exporting Countries, but the news is a symbolic setback for the 14-nation cartel, which has tried to juice the oil market by withholding oil supplies. OPEC’s output cuts have so far failed to raise prices, which remain stuck at or below levels in November, when the group struck its original agreement. |
/*
* Copyright (C) 2019 xuexiangjys(xuexiangjys@163.com)
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
*/
package com.xuexiang.xuidemo.fragment.components.button;
import com.xuexiang.xpage.annotation.Page;
import com.xuexiang.xuidemo.R;
import com.xuexiang.xuidemo.base.BaseFragment;
/**
* @author xuexiang
* @since 2019-05-15 21:42
*/
@Page(name = "RippleView\n点击水波纹样式")
public class RippleViewFragment extends BaseFragment {
/**
* 布局的资源id
*
* @return
*/
@Override
protected int getLayoutId() {
return R.layout.fragment_ripple_view;
}
/**
* 初始化控件
*/
@Override
protected void initViews() {
}
}
|
George Hepple
George Hepple (1904–1997) was an influential traditional Northumbrian fiddler. He was born at Sook Hill Farm, Haltwhistle, West Northumberland. He went to a nearby school in Melkridge.
He began his working life as an apprentice blacksmith at Cawfield's Quarry at the age of fourteen, before moving to Ventners Hall Colliery where he remained until its closure in the 1950s. He then worked at Bardon Mill Colliery. He later worked in a plastics factory in Plenmellor, South of Haltwistle, until his retirement. In the last years of his life, he lived with his wife Edna in sheltered housing in Haltwhistle. At this time, he also had a pacemaker implanted and when the doctor said he should return to have the battery replaced, in 10 years, he replied "I don't need to worry about that then!".
Musical life
He was born into a musical family; his grandfather had been taught to step-dance by the famous fiddler-composer and dancing master Robert Whinham. Cawfields, the family farm, within sight of the Roman Wall, was the venue for regular musical evenings; these were often held near the full moon, to make travelling over the fells easier. People from nearby farms would walk, while those from further afield might ride.
He was given a three-quarter size fiddle at the age of eight, and taught himself to play, at first practising in the byre, later saying My only audience was the hens. As he progressed, he was invited to play at the family's musical evenings. His son recalled that his first public solo performance was The Ferry Boat at a school concert, at the age of eleven - he was asked to play again for dancing that evening, earning two shillings. From this time onwards, he played regularly at concerts and dances. By the 1920s he was a member of the local dance band, playing mainly country dance music. Just before the war, in 1938, he founded a dance band, The Sylvian Dance Band, with a line up of two fiddles, a piano accordion (the first in the district), piano and drums.
He had been fascinated with the Northumbrian smallpipes for some time, but was frustrated by the considerable difficulty of getting a set at that time. After the war, in 1947, local musician Basil Clough found him a set, from Colin Caisley, and he made some progress on the instrument. His preferred instrument remained the fiddle, however. At this time, the piper Joe Hutton lived nearby at Gilsland, Cumberland and was a frequent visitor. George's son John also took up the smallpipes, and was broadcast by the BBC in 1953, on Children's Hour, presented by Huw Wheldon,. John and George made several broadcasts subsequently on the BBC's Barn Dance programme, playing pipe and fiddle duets. Later, both George and Joe Hutton would stay with John, at the time of the annual Pipers' Society competitions in Newcastle, and they would play together from morning till night.
He had strict ideas on fiddle accuracy and playing techniques, and on what constituted a Northumbrian style.
He said that formerly, traditional fiddlers would play with the fiddle on the shoulder, rather than under the chin - in particular he stated that Whinham played in this way.
The piper Adrian D Schofield, who knew him well, recalls that he used the 'Newcastle' style of bowing, where the bow-strokes go across the beat; he used only the top 3 inches of his bow to get the articulation needed. He also considered Honeyman's Strathspey, Reel and Hornpipe Tutor to be wrong in its teaching of this style. When playing fiddle along with smallpipes, he preferred to play more staccato, to go along with that instrument's articulation.
He also played the Northumberland small-pipes; finger-style G banjo (which he had learned from his brother-in-law); organ and a variety of wind instruments. He composed 'seconds', that is duet settings, for many traditional tunes, but apparently did not write these down. He also wrote and taught music, and judged competitions; in his later years was made an honorary member of the Northumbrian Pipers' Society.
Recordings
Some early recordings of him, made by Peter Kennedy in 1954, one of him playing The Ferry Boat on solo fiddle, and two others of him and his son John playing pipe and fiddle duets, are on the Topic compilation, Holey Ha'penny.
Several later recordings of him, as well as an extended interview, are on the FARNE archive, and these give a valuable perspective on his life, playing style and wide repertoire. He was also recorded playing fiddle in six tracks on the Topic record Bonny North Tyne - Northumbrian Country Music, 12TS239; five of these tracks are duets with his nephew, Donald Ridley. Two tracks were of George's own compositions, Geordie's Jig, and a hornpipe, The Burn Divot.
References
Category:1904 births
Category:1997 deaths
Category:Musicians from Northumberland
Category:Players of Northumbrian smallpipes
Category:English fiddlers
Category:British male violinists
Category:Folk fiddlers
Category:20th-century violinists
Category:20th-century English musicians
Category:20th-century British male musicians |
Automotive heat exchangers, such as radiators, heater cores, evaporators and condensers are predominantly made of aluminum alloys to reduce the weight of the vehicles. These heat exchangers can be the tube and fin type where the fins are corrugated and/slotted at right angles to the direction of airflow.
In the past, mechanical expansion techniques have been used for mass-production of automotive finned-tube heat exchangers. Heat exchangers are now predominantly formed by a brazing operation, wherein the individual components are permanently joined together with a brazing alloy.
Since the early 1980s, one brazing technique known as controlled atmosphere brazing (CAB) has become increasingly popular for use by automotive industry to make brazed aluminum heat exchangers. CAB has been preferred over a previous brazing method, i.e., vacuum furnace brazing, due to improved production yields, lower furnace maintenance requirements, greater braze process robustness, and lower capital cost of the equipment employed.
When manufacturing the heat exchangers using the CAB process, an aluminum brazing filler alloy (e.g., AA 4345 or AA 4043) is often pre-cladded or coated on at least one side of the core aluminum alloy sheet (or brazing sheet). Alternatively, a prebraze arc sprayed zinc coating is applied on the non-clad tubes (e.g., via a wire arc spraying process) to improve their corrosion resistance. The aluminum core alloys of the fins and tubes are typically AA 3003 or various “long life alloys” or modified AA 3003 alloys with additions of small amounts of elements typically selected from Cu, Mg, Mn, Ti, Zn, Cu, Cr and Zr.
In the CAB process, a fluxing agent is applied to the pre-assembled component surfaces to be jointed. During brazing at approximately 560 to 575° C., the fluxing agent starts to melt and the melted flux reacts, dissolves and displaces the aluminum oxide layer that naturally formed on the aluminum alloy surface and frees up the brazing filler alloy. The brazing filler alloy starts to melt at about 575 to 590° C. and begins to flow toward the joints to be brazed. During the cooling process, the filler metal solidifies and forms braze joints. The flux present on the surface also solidifies and remains on the surface as flux residue.
Additional functions of the fluxing agent are to prevent reformation of an aluminum oxide layer during brazing, enhance the flow of the brazing filler alloy, and increase base metal wettability. The fluxing agent is typically a mixture of alkaline metal fluoroaluminates with general formula K1-3A1F4-6.xH2O, which is essentially a mixture of K3AlF6, K2AlF5 and KAlF4. Fluoride-based fluxes are preferred over chloride-based fluxes for brazing aluminum or aluminum alloys because they are considered to be inert or non-corrosive to aluminum and its alloys, and substantially water insoluble after brazing. When the recommended flux coating weight (3-5 gram per square meter (g/m2) for furnace brazing) is used, the CAB process is said to generate a 1-2 micrometers (μm) thick tightly adherent non-corrosive residue. Hence, it is believed that no removal of the flux residue is necessary after the brazing operation.
Due to the reported non-corrosive nature of the flux, its tolerance to brazing assembly fit-up and flexible control, CAB is one of the lowest cost methods for the joining of aluminum heat exchangers. It is now commonly used by the automotive and other industries for manufacturing of heat exchangers. |
Essential Professional Nursing Practices in mental health: A cross-sectional study of hospital inpatient care.
Quality organizational structures and nursing practices are key to positive patient outcomes. Whereas structures have been largely studied over the past few decades, less is known of the nursing practices that account for patient outcomes, such as patient satisfaction. This is especially true in psychiatric, mental health care settings. The aim of the present study is to determine the relative importance of eight Essential Professional Nursing Practices (EPNPs) on the satisfaction of hospitalized patients on mental health care units. A cross-sectional design was selected; 226 point-of-care mental health nurses completed the online EPNP questionnaire in Spring 2015. Statistical analyses included MANOVAs and a 2-step linear regression. A significant relationship was found between university preparation and scores on two EPNP subscales: autonomous decision-making and practicing with competent nurses. Scores on patient advocacy and control over practice subscales were significantly related to nurse-rated patient satisfaction. The findings reinforce the positive link between university education and the work of nurses and highlight the power dynamics that are salient in mental health care. The pertinence of EPNPs in psychiatric settings is brought to the fore, with practices of patient advocacy and nurse control over care examined in relation to empowerment. Implications for clinical and administrative leaders are addressed, with a focus on strategies for empowering patients and nurses. |
Gindin J, et al. The effect of plant phosphatidylserine on age-associated memory impairment and mood in the functioning elderly. Rehovot, Israel. Geriatric Institute for Education and Research and Dept. of Geriatrics, Kaplan Hospital, 1995.
Gindin J, et al. The effect of plant phosphatidylserine on age-associated memory impairment and mood in the functioning elderly. Rehovot, Israel. Geriatric Institute for Education and Research and Dept. of Geriatrics, Kaplan Hospital, 1995. |
Segmental agenesia of the descending aorta treated by extra-anatomic bypass.
We present a 12-year-old girl with clinical manifestation of restenosis after coarctation repair in the neonatal period. However, MR-angiography revealed hypoplasia of the distal arch, complete absence of the descending aorta and severe hypoplasia of the thoraco-abdominal aorta. Treatment consisted of an extra-anatomic ascending-descending PTFE graft via sternotomy with normalization of upper-body hypertension and disappearance of leg claudication. It demonstrates how this very rare pathology of true segmental aortic agenesia may successfully be treated in older children with coexisting aortic arch or isthmus anomalies. Long-term follow-up is needed to assess the potential benefit of this approach. |
SUPERIOR COURT
OF THE
STATE OF DELAWARE
JOHN A. PARKINS, JR. NEW CASTLE COUNTY COURTHOUSE
JUDGE 500 NORTH KING STREET, SUITE 10400
WILMINGTON, DELAWARE 19801-3733
TELEPHONE: (302) 255-2584
May 11, 2016
Richard Galperin, Esquire
Joshua H. Meyeroff, Esquire
Morris James LLP
500 Delaware Avenue, Suite 1500
P.O. Box 2306
Wilmington, Delaware 19899-2306
Re: Alissa Porter
v. Christiana Care Health Services, Inc.,
a Delaware corporation, et al
C.A. No. N16C-02-231 JAP
Dear Counsel:
Presently before the court are requests from some of the defendants to
determine whether the Affidavit of Merit filed by Plaintiff satisfies 18 Del. C.
§ 6853. The court has done so and finds that the affidavit satisfies the
requirements found in section 6853.
In their requests to review the Affidavit of Merit the defendants ask the
court to determine if the “Affidavit of Merit states all its opinions with
reasonable medical probability.” The affiant expresses his opinions to a
reasonable degree of medical probability. The court takes this occasion to
note that this may be greater than the standard required by section 6853.
Nowhere does the statute require that opinions in Affidavits of Merit be
expressed to a reasonable degree of medical probability. All that is required
is that a qualified expert attest “that there are reasonable grounds to believe
that the applicable standard of care was breached by the named defendant
or defendants and that the breach was a proximate cause of injury or
injuries claimed in the complaint.” 18 Del. C. § 6853(c). It seems to the
court that the “reasonable grounds to believe” specified in the statute is not
as stringent as “reasonable degree of medical probability.” The court is
aware, of course, that expert trial testimony must meet the reasonable-
degree-of-medical-probability standard. But the purpose of affidavit of merit
requirement of section 6853 is to screen frivolous medical negligence claims.
That limited purpose does not require the same degree of reliability required
of trial testimony. As the Supreme Court has written:
This Section requires that a qualified medical
professional review a plaintiff's claim, to determine
and then to state that there are reasonable grounds
to believe that the health care provider breached the
applicable standard of care that caused the injuries
claimed in the complaint. Medical experts need not
couch their opinions in legal terms, state the facts
that underly their determination, or to articulate the
standard of care with a high degree of legal precision
or “magic words.”
Dishmon v. Fucci, 32 A.3d 338, 344 (Del. 2011) (internal footnotes omitted.)
Very truly yours,
John A. Parkins, Jr.
oc: Prothonotary
cc: Robert J. Leoni, Esquire, Shelsby & Leoni, Wilmington, Delaware
2
|
The wait for the Miami Heat will come to an end on Tuesday, and if they actually lose their pick to the Philadelphia 76ers, this will probably be the most pointless Hot Hot Hoops article ever. Until then, read on!!
Miami has had two confirmed visits with players at the NBA rookie combine:
1) Devin Booker
2) Kelly Oubre Jr
Devin Booker, SG, Kentucky
Booker has been anointed as the draft's best shooter, and according to Sam Vecenie of CBS Sports, he had a solid few days at the combine, easing concerns about this lack of athleticism. "He's extremely quick coming off of screens, and also is very slippery against defenders. This type of score also points to some potential defensive upside, the side of the ball where Booker showed quite a bit of weakness this season" says Vecenie.
Devin Booker met w/ #Heat. Says Riley told him Wade is in the final phase of his career and he could learn under him. — Jason Lieser (@PBPjasonlieser) May 15, 2015
Devin Booker calls himself best shooter in draft. Met with Pat Riley. "It was a great vibe. I could feel the Big Blue nation." — Ethan J. Skolnick (@EthanJSkolnick) May 15, 2015
If this kid is going to learn from Dwyane Wade, I hope he's able to get Wade's drive to the basket as if he actually is the second coming of Klay Thompson. Miami could definitely use him to space the floor and keep defenses honest, but the question is can this kid who will be only 19 when the season starts, handle the responsibility of being Wade's backup?
Kelly Oubre Jr, SF, Kansas
Oubre is also 19 and revealed his expectations at the combine:
"I’m hoping to show people I’m more than just a basketball player. I’m a student of the game," Oubre said. He continued by saying he's been specifically studying the games of MVP runner up James Harden, Most Improved Player of the Year Jimmy Butler and last year's Finals MVP Kawhi Leonard.
According to Jason Lieser of the Palm Beach Post, here's what Oubre said about his meeting with Riley:
"It was great, he’s a legend who has coached greats in the past, and seeing what he knows about the game of basketball is something I would never take for granted. I listened to every single thing he said. I asked him a couple questions, also, to see if I could pick his brain for things I need to know about my future. Oubre continued by saying "One of the things that stuck out to me was he said, ‘If you want to play for us, you've gotta be in the best shape of your life.’ I like to run and gun. If I’m running, I’m scoring in transition, and that’s what I do best."
Now Oubre might have one of the highest potentials in the draft. He isn't gifted offensively but he is a shutdown defender against wing players (one of Miami's major flaws last season, sorry Luol Deng,) is 6-foot-7 and has a 7-foot-1 wing span! The likeliness is the Heat would still want to pick Stanley Johnson from Arizona, but the team didn't meet him at the combine, so maybe Riley thinks Johnson is out of the Heat's range.
So which other players talked about possibly playing for the Heat next season?
Stanley Johnson, SF, Arizona
Johnson has already declared himself the best pick of the NBA Draft, and says what makes him stand out is his ability to "score from all three levels pretty well," Johnson continued by saying on defense, he plays hard, smart, and is a "nasty competitor." All these qualities are what the Heat look for, and my bet is if he's available at 10, Miami will pick him.
About being a possible Heat pick:
"To have guys like Dwyane Wade, Luol Deng and Hassan Whiteside on the team and be on a team that already knows they want to win next season - bringing my contribution to that team would be great."
Frank Kaminsky, PF/C, Wisconson
Now Kaminsky didn't play at the Combine because he says considering he was already named National Player of the Year, he didn't think anything he did at the Combine would top that. But Kaminsky did compare his game to Chris Bosh and even said he would "love" to be Bosh's understudy.
So there you have it folks. To recap, if Miami ends up at #10, they'll probably have Stanley Johnson as their preferred pick, and if he's not available; look for the Heat to draft either Devin Booker or Kelly Oubre. |
attributes
attributeAt: aKey
"Get the value of an attribute for the first element in the set of matched elements."
self call: 'attr' with: aKey |
#define _CRT_SECURE_NO_DEPRECATE
#include <stdio.h>
#include <math.h>
#include <cassert>
#include <string>
#include <sstream>
#include <vector>
#include <algorithm>
#include <functional>
#include <set>
#include <map>
#define fo(a,b,c) for( a = ( b ); a < ( c ); ++ a )
#define fr(a,b) fo( a, 0, ( b ) )
#define fi(a) fr( i, ( a ) )
#define fj(a) fr( j, ( a ) )
#define fk(a) fr( k, ( a ) )
#define pb push_back
#define mp make_pair
#define all(v) (v).begin( ), (v).end( )
using namespace std;
const int maxc = 12;
const int maxn = 60005;
const int maxm = 1000005;
const int WIN = 1;
const int LOSE = 2;
int n, m, la;
int a[maxc];
char sm[maxc][maxc];
char bsm[maxc][maxc];
int sx, sy;
int pr[maxc];
int pwr[maxn];
int fs[maxn];
int to[maxm];
int nx[maxm];
int cnt;
int vn;
bool p[maxc];
int b[maxc];
int ours[maxc];
int bn, bm;
int ans[maxn];
int q[maxn];
int qn;
bool p2[maxn];
int q2[maxn];
int q2n;
int num;
bool inc( int id )
{
if( id == -1 ) return false;
++ pr[id];
if( pr[id] > n - num + id )
{
if( !inc( id - 1 ) ) return false;
pr[id] = pr[id - 1] + 1;
}
return true;
}
bool rec( int id )
{
if( p[id] ) return false;
p[id] = true;
int i;
fi( bn ) if( bsm[i][id] && ( b[i] == -1 || rec( b[i] ) ) )
{
b[i] = id;
return true;
}
return false;
}
bool bipartite( )
{
int i, ret = 0;
memset( b, -1, sizeof( b ) );
fi( bm )
{
memset( p, 0, sizeof( p ) );
if( !rec( i ) ) return false;
}
return true;
}
int encode( )
{
int i;
int ret = 0;
for( i = n - 1; i >= 0; -- i )
ret = ret * 3 + a[i];
return ret;
}
void decode( int v )
{
int i;
fi( n )
{
a[i] = v % 3;
v /= 3;
}
}
void adde( int a, int b )
{
if( a == b ) return;
nx[cnt] = fs[a];
fs[a] = cnt;
to[cnt] = b;
++ cnt;
}
int main( )
{
int i, j, k;
// freopen( "in.txt", "r", stdin );
scanf( "%d %d %d %d", &n, &m, &sx, &sy );
memset( fs, -1, sizeof( fs ) );
fi( m )
{
int a, b;
scanf( "%d %d", &a, &b );
-- a; -- b;
sm[a][b] = sm[b][a] = 1;
}
a[sx - 1] = 1;
a[sy - 1] = 2;
sx = encode( );
vn = 1;
fi( n ) vn *= 3;
q2[q2n ++] = sx;
for( int ii = 0; ii < q2n; ++ ii )
{
i = q2[ii];
decode( i );
int moo[3];
memset( moo, 0, sizeof( moo ) );
fj( n ) ++ moo[a[j]];
if( moo[1] && !moo[2] )
{
ans[i] = WIN;
q[qn ++] = i;
}
else if( moo[2] && !moo[1] )
{
ans[i] = LOSE;
q[qn ++] = i;
}
bn = 0;
fj( n ) if( a[j] == 1 )
{
ours[bn ++] = j;
}
fr( num, n / 2 + 1 )
{
if( num > bn ) break;
fj( num ) pr[j] = j;
do
{
bool ok = true;
fj( num ) if( a[pr[j]] == 1 ) { ok = false; break; }
if( !ok ) continue;
memset( bsm, 0, sizeof( bsm ) );
bm = 0;
fj( num )
{
if( a[pr[j]] == 0 )
{
bool ok = false;
fk( bn ) if( sm[pr[j]][ours[k]] ) { bsm[k][bm] = 1; ok = true; }
if( !ok ) goto e;
++ bm;
}
else
{
bool ok = false;
fk( bn ) if( sm[pr[j]][ours[k]] ) { bsm[k][bm] = 1; ok = true; }
if( !ok ) goto e;
++ bm;
fk( bn ) if( sm[pr[j]][ours[k]] ) bsm[k][bm] = 1;
++ bm;
}
}
if( !bipartite( ) ) continue;
fj( num ) a[pr[j]] = 1;
// printf( "%d %d\n", i, encode( ) );
fj( n ) if( a[j] ) a[j] = 3 - a[j];
la = encode( );
adde( la, i );
++ pwr[i];
if( !p2[la] )
{
p2[la] = 1;
q2[q2n ++] = la;
}
decode( i );
e:;
} while( inc( num - 1 ) );
}
}
fi( qn )
{
for( j = fs[q[i]]; j != -1; j = nx[j] ) if( !ans[to[j]] )
{
if( ans[q[i]] == LOSE )
{
ans[to[j]] = WIN;
q[qn ++] = to[j];
}
else
{
-- pwr[to[j]];
if( pwr[to[j]] == 0 )
{
ans[to[j]] = LOSE;
q[qn ++] = to[j];
}
}
}
}
if( ans[sx] == WIN ) printf( "FIRST\n" );
else if( ans[sx] == LOSE ) printf( "SECOND\n" );
else printf( "DRAW\n" );
return 0;
}
|
Pearl Tie Slides
This beautiful selection of pearl coloured tie slides is perfect for special occasions such as weddings, christenings and many more. A pearl tie slide would look very sophisticated with a light or dark grey suit, white shirt and a dark purple or navy tie. Here at KJ Beckett, we also offer a large array of colours and designs of ties and other formal accessories including pocket squares, belts, collar stiffeners and many more to make you look truly charming. Ideal as a gift idea to an admirer of uniqueness or as a lavish treat, all tie slides are displayed in stunning presentation boxes. |
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Your World Beyond The Sound BytesWe are all citizens of the world...stay informed!Look to this blog to bring you occasional, eclectic news, videos and viewpoints you might not otherwise be exposed to.~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1. More tax cuts for the wealthy and large corporations with no strings attached.
2. Increase Corporate Welfare (but disguise it under another name so the "little people" don't catch on). Offshore as many profits as possible, jobs too.
3. Regulate all Uteruses via nation-wide or state by state Forced-Birth (anti-choice) Mandates. Ignore babies after birth until we can put them to use (we need more cannon-fodder for our next for-profit war. The grown children of the uneducated make ripe pickings... |
Q:
Pulling python module up into package namespace
If I have a directory structure like this:
package/
__init__.py
functions.py #contains do()
classes.py #contains class A()
And I want to be able to call
import package as p
How do I make the contents of functions, classes, accessible as:
p.do()
p.A()
in stead of:
p.functions.do()
p.classes.A()
The subdivision in files is only there for convenience (allowing easier collaboration), but I'd prefer to have all the contents in the same namespace.
A:
You could do this in __init__.py (because that's what you import when you import package):
from package.functions import *
from package.classes import *
However, import * is nearly always a bad idea and this isn't one of the exceptions. Instead, many packages explicitly import a limited set of commonly-used names - say,
from package.functions import do
from package.classes import A
This too allows accessing do or A directly, but it's not nearly as prone to name collisions and the other problems that come from import *.
|
Maternal and child health and health care reform.
Women and children, because of particular characteristics and vulnerabilities, should be afforded special attention in health care reform. Health care reform provides an opportunity to positively affect the maternal and child health (MCH) status. Universal coverage of a comprehensive benefit package must be combined with a strong public health system of population-based services if benefits are to be realized. There must be an accountable public locus of responsibility for promoting MCH, including clear authority and resources for four primary activities: (1) core public health, (2) systems development, (3) coordinated services for children with special health care needs, and (4) access to care. |
The Daily Mail broke news that Kenya Moore threw a hissy fit on the set of Food Network’s “Worst Cooks in America Celebrity Edition.”
She was supposedly cut first and reportedly spent two hours on set afterwards complaining about the elimination. If this is true, it’s one of the worst cases of bad sportsmanship on a show where the stakes are so darn low, it’s comical. What a blow to the ego! You’re on a show called ‘Worst Cooks” and you get cut first? Embrace it! You can now say, “Yes! I AM the worst cook in America!”
‘You would have thought she was filming a scene for Real Housewives of Atlanta the way she carried on. She cursed at the producers, badmouthed the judges and ranted: “Without me this damn show will fail”,’ a source close to the production told Daily Mail Online exclusively.
Apparently, she did this off camera so nobody captured the shenanigans on tape. Too bad.
NeNe Leakes is busy on ABC game shows. She will be on Sunday’s second season debut of “Celebrity Family Feud” as well as her regular “To Tell the Truth” gig, which now airs Tuesdays on the same network.
And she recently told Andy Cohen on “Watch What Happens Live” that she recently received a second nose job.
“There was a real medical reason why I had to get [my nose] done again,” she said, noting that she had the same procedure six years ago. “My cartilage was growing in my nose, my tip was touching the top of my lip.”
She remains tight-lipped about returning to “Real Housewives” beyond saying she will be on the show in some capacity. That could mean anything from a brief guest role like last season to a full peach.
***
DANCING WITH THE STARS – “Episode 2203” – The remaining celebrities will set out to leave a lasting impression with their dances as they commemorate their most memorable year, on “Dancing with the Stars,” live, MONDAY, APRIL 4 (8:00-10:01 p.m. EDT) on the ABC Television Network. (ABC/Adam Taylor)KIM FIELDS, SASHA FARBER
Will Kim Fields be back for a second season? Probably not. She didn’t really fit in and I get a sense she felt she got what she needed from the show, which is back in the spotlight. (See “Dancing With the Stars”.)
Porsha Williams was brought back to full time status season eight after being reduced to guest role season seven. She is likable enough but her penchant for getting violent does not sit well with some Bravo execs who see it as damaging to the brand and it may make it more difficult to recruit new cast members. Typically, at the point, Bravo shoots scenes with newcomers mixing with the existing cast to see how chemistry works. |
It has been long recognized that in both humans and NOD mice the autoimmune destruction of insulin-producing pancreatic β-cells causing type 1 diabetes development requires pathogenic CD4 T-cell responses mediated by particular major histocompatibility complex (MHC) class II molecules ([@B1]--[@B3]). However, studies in NOD mice have led to a more recent appreciation that, when expressed in the proper genetic context, some quite common MHC class I variants can acquire an aberrant ability to mediate autoreactive CD8 T-cell responses also essential to diabetes development ([@B4]--[@B9]). Moreover, CD8 T-cells that recognize various pancreatic β-cell peptides in the context of some particular MHC class I variants can also be detected in the peripheral blood of human diabetic patients ([@B10]--[@B15]). One relatively common MHC class I variant that can contribute to diabetes susceptibility in humans is HLA-A2.1 ([@B16]). Importantly, NOD.*β2m^null^.HHD* mice expressing human HLA-A2.1 but no murine MHC class I molecules generate diabetes-inducing autoreactive CD8 T-cell responses ([@B17],[@B18]). NOD.*β2m^null^.HHD* mice have been found to generate HLA-A2.1--restricted autoreactive CD8 T-cell responses against three peptides each derived from the pancreatic β-cell proteins islet-specific glucose-6-phosphatase catalytic subunit--related protein (IGRP~228--236~, IGRP~265--273~, and IGRP~337--345~) and insulin (INS1 L~3--11~, INS1 B~5--14~, and INS1/2 A~2--10~) ([@B17],[@B18]). Significantly, the homologous human peptides for Ins1/2 A~2--10~, Ins1 B~5--15~, IGRP~228--236~, and IGRP~265--273~ are also recognized by NOD*.β2m^null^*.*HHD* CD8 T-cells ([@B17],[@B18]). At least, the IGRP~228--236~ and IGRP~265--273~ epitopes have also been found to be the targets of HLA-A2.1--restricted CD8 T-cells in human diabetic patients ([@B10],[@B19],[@B20]). For these reasons, NOD.*β2m^null^.HHD* mice would appear to represent an ideal model for developing potentially clinically translatable interventions for suppressing diabetogenic HLA-A2.1--restricted T-cell responses.
By avoiding the potential complications of generalized immunosuppression, antigen-specific tolerance induction therapies may ultimately represent a desirable diabetes intervention approach in humans ([@B21]). Early support for such a possibility was provided in an article by Amrani et al. ([@B22]) that a free peptide injection approach, which deleted high-avidity IGRP-reactive CD8 T-cells, blocked progression to overt diabetes in standard NOD mice. Han et al. ([@B23]) subsequently found that diabetes development was more readily inhibited in NOD mice by a soluble IGRP analog peptide treatment protocol that only depleted CD8 T-cells with high T-cell receptor avidity for this antigen rather than one eliminating all such effectors. Even though these soluble peptide treatments are effective, they are particularly dependent on time of injection and antigenic doses. An alternative antigen-specific method to induce T-cell tolerance is intravenous treatment with syngeneic splenocytes bearing ethylene carbodiimide (ECDI) cross-linked peptides (peptide-SPs) or whole proteins. Treatment with peptide-SPs that induce antigen-specific tolerance has been reported to inhibit experimental autoimmune encephalomyelitis in mice ([@B24],[@B25]). Syngeneic spleen cells bearing whole insulin as an ECDI-coupled autoantigen have also been reported to exert a diabetes-protective effect in standard NOD mice ([@B26]). A peptide-SP approach has also been shown to attenuate the activity of diabetogenic BDC2.5 clonotypic CD4 T-cells in NOD mice ([@B26]). However, there have been no evaluations of whether a peptide-SP approach could attenuate the activity of diabetogenic CD8 T-cells, particularly those recognizing HLA-A2.1--restricted antigenic epitopes that may be of potential high clinical relevance in humans. We addressed this question in the current study by determining whether syngeneic splenocytes bearing any ECDI-coupled combination of the HLA-2.1--restricted Ins1/2 A~2--10~, Ins1 B~5--15~, IGRP~228--236~, and IGRP~265--273~ epitopes could suppress diabetes development in NOD.*β2m^null^*.*HHD* mice by modulating pathogenic CD8 T-cell responses.
RESEARCH DESIGN AND METHODS {#s5}
===========================
Mice. {#s6}
-----
Previously described NOD*.β2m^null^*.*HHD* mice ([@B17]) are maintained by sibling matings at The Jackson Laboratory. MHC class I--deficient NOD.*β2m^null^* mice have also been previously described ([@B4]). Some experiments used an N10 backcross generation NOD stock congenically expressing the CD45.2 rather than the CD45.1 variant leukocyte marker. NOD*.β2m^null^*.*HHD* mice in which antigen-presenting cells (APCs) specifically express an MHC class II promoter (H2-Eα^k^)--driven mouse proinsulin 2 transgene (NOD*.β2m^null^*.*HHD-PI*) were generated by crossing NOD*.β2m^null^*.*HHD* with previously described NOD.PI mice ([@B27]). The proinsulin transgene is maintained in a heterozygous state. The institutional Animal Care and Use Committee at The Jackson Laboratory approved all animal experiments.
Peptides and antibodies. {#s7}
------------------------
Synthetic peptides Ins1/2 A~2--10~ (IVDQCCTSI), Ins1 B~5--15~ (HLCGPHLVEA), IGRP~228--236~ (FGIDLLWSV), IGRP~265--273~ (VLFGLGFAI), and Flu16 (Flu MP~58--66~) (GILGFVFTL) were purchased from Mimotopes PTY, Melbourne, Australia. Monoclonal antibodies specific for CD11c (clone N418), CD8 (clone 53--6.72), CD45.1 (clone A201.7), and CD45.2 (clone 1042.1) were purchased from BD Biosciences, San Jose, CA and eBiosciences, San Diego, CA.
ECDI peptide-coupled cell treatment. {#s8}
------------------------------------
ECDI peptide-coupled splenocyte (peptide-SPs) treatment was carried out as previously described ([@B28]). Briefly, spleens were removed from syngeneic female mice, collagenase D treated (Roche Diagnostics, Manheim, Germany), and the erythrocytes lysed. The splenocytes were incubated with ECDI (150 mg/3.2 × 10^8^ cells \[Calbiochem, La Jolla, CA\]), and as indicated, a mixture of INS and/or IGRP peptide(s) (1 mg/mL each) on ice for 1 h, hand-shaking every 10 min. The peptide-SPs were washed, centrifuged, filtered to remove cell clumps, and resuspended in PBS. NOD*.β2m^null^*.*HHD* female mice (4--6 weeks old) received 50 × 10^6^ peptide-SPs in 200 μL PBS by intravenous injection. Controls consisted of NOD*.β2m^null^*.*HHD* female mice treated with splenocytes bearing the ECDI-coupled HLA-A2.1 binding but diabetes-irrelevant Flu16 peptide. Multiple treatments at 5-week intervals were given as indicated. The mice were monitored for diabetes development.
Assessment of diabetes and insulitis development. {#s9}
-------------------------------------------------
Diabetes onset was defined by a urinary glucose value of ≥3 as assessed with Ames Diastix (Bayer, Diagnostics Division, Elkhart, NJ). Mice were considered diabetic after two consecutive positive measurements. Mice remaining free of overt diabetes through 26 weeks posttreatment were killed and their pancreata fixed in Bouin's solution and sectioned at three nonoverlapping levels. Granulated β-cells were stained with aldehyde fuchsin and a hematoxylin and eosin counterstain. Islets (at least 20 per mouse) were individually scored as follows: 0, no lesions; 1, peri-insular leukocytic aggregates, usually periductal infiltrates; 2, \<25% islet destruction; 3, \>25% islet destruction; and 4, complete islet destruction. An insulitis score for each mouse was obtained by dividing the total score for each pancreas by the number of islets examined. Overtly diabetic mice were assigned an insulitis score of 4.
Enzyme-linked immunospot assays, CD8 T-cell culture, and in vivo T-cell priming. {#s10}
--------------------------------------------------------------------------------
Interferon (IFN)-γ enzyme-linked immunospot (ELISPOT) assays were performed as previously described ([@B17]). Spots were counted using an automated ELISPOT reader system (Immunospot; CTL Analyzers, Cleveland, OH). An interluekin (IL)-10 ELISPOT assay was also used as indicated. Numbers of IFN-γ or IL-10 spots were normalized to the indicated numbers of CD8 T-cells. NOD.*β2m^null^*.*HHD* mice treated every 5 weeks with peptide-SPs were primed in a rear footpad 2 days after the third treatment with a cocktail containing 20 μg each of the HLA-A2.1--restricted Ins1/2 A~2--10~, Ins1 B~5--15~, IGRP~228--236~, and IGRP~265--273~ peptides emulsified in 50 μL of complete Freund's adjuvant. Ten days after priming, the mice were killed, the popliteal lymph nodes were isolated and dispersed by collagenase D treatment, and CD8 T-cell reactions to each individual peptide were determined by IFN-γ ELISPOT analyses. Only mice remaining nondiabetic within each treatment group were analyzed.
In vitro assessment of peptide-SP effects on diabetogenic CD8 T-cells. {#s11}
----------------------------------------------------------------------
Splenic CD8 T-cells were enriched from NOD.*β2m^null^.HHD* mice by the previously described magnetic bead--based negative selection approach ([@B29]) and incubated in vitro at a concentration of 5 × 10^5^/mL with 5 × 10^6^/mL INS- and/or IGRP-SPs. The next day, the CD8 T-cells were recovered and assessed by IFN-γ ELISPOT analyses for reactivity against HLA-A2.1--restricted INS and IGRP peptides. Irradiated (2000R) syngeneic NOD.*β2m^null^.HHD* splenocytes were used as APCs.
Soluble peptide treatment. {#s12}
--------------------------
Starting at 3 weeks of age, NOD.*β2m^null^* .*HHD* mice were treated with repeated intraperitoneal injections of a soluble mixture containing 25 μg of each peptide (Ins A~2--10~, Ins B~5--15~, IGRP~228--236~, and IGRP~265--273~). Controls consisted of NOD*.β2m^null^*.*HHD* female mice treated with the Flu16 peptide. Three injections at 2-week intervals were followed by treatments once every 3 weeks. The mice were monitored for type 1 diabetes development.
Statistical analyses. {#s13}
---------------------
Data were evaluated using Prism 5 software (GraphPad Software). The log-rank test was used to compare diabetes incidence curves and the nonparametric unpaired test to compare antigen-reactive CD8 T-cell numbers between different treatment groups.
RESULTS {#s14}
=======
Splenocytes bearing ECDI-coupled peptides ablate IGRP-specific CD8 T-cell responses in vitro. {#s15}
---------------------------------------------------------------------------------------------
CD8 T-cells were enriched from pooled spleens of 9- to 16-week-old NOD.*β2m^null^*.*HHD* mice and cocultured in vitro with syngeneic splenocytes bearing an ECDI-coupled cocktail of the HLA-A2.1--restricted Ins1/2 A~2--10~, Ins1 B~5--15~, IGRP~228--236~, and IGRP~265--273~ β-cell autoantigens (INS/IGRP-SPs) and assessed the next day for responsiveness to each individual epitope by IFN-γ ELISPOT analyses. Compared with those exposed to the control Flu16 peptide (Flu-SPs), CD8 T-cells from NOD.*β2m^null^*.*HHD* mice cocultured with INS/IGRP-SPs displayed significantly decreased responses to restimulation by IGRP epitopes ([Fig. 1*A*](#F1){ref-type="fig"}). Levels of reactivity to the HLA-A2.1--restricted INS peptides was low among control CD8 T-cells exposed to Flu16 and not further influenced by previous coculture with INS/IGRP-SPs ([Fig. 1*A*](#F1){ref-type="fig"}). Coincubation with syngeneic splenocytes bearing an ECDI cross-linked mixture of the two INS peptides (INS-SPs) did not diminish CD8 T-cell responsiveness to INS or IGRP epitopes ([Fig. 1*B*](#F1){ref-type="fig"}). However, preincubation with IGRP-SPs did significantly diminish the ability of CD8 T-cells from NOD.*β2m^null^.HHD* mice to respond to restimulation by IGRP but not INS epitopes ([Fig. 1*B*](#F1){ref-type="fig"}). IL-10 ELISPOT analyses also indicated that regardless of preincubation conditions, no CD8 T-cells from NOD.*β2m^null^.HHD* mice responding to INS or IGRP stimulation produced this immunosuppressive cytokine. On the basis of these collective data, we subsequently assessed syngeneic INS/IGRP-SPs as a possible diabetes intervention approach in NOD.*β2m^null^.HHD* mice.
{#F1}
Syngeneic splenocytes bearing ECDI-coupled autoantigenic IGRP, but not INS peptides, inhibit diabetes development in NOD.*β2m^null^.HHD* mice. {#s16}
----------------------------------------------------------------------------------------------------------------------------------------------
Initial analyses found that repeated injections of a soluble mixture of the four INS and IGRP peptides (25 μg each) did not inhibit diabetes development in NOD.*β2m^null^ .HHD* mice (data not shown). Thus, given the in vitro results shown in [Fig. 1](#F1){ref-type="fig"}, we assessed whether a single intravenous injection of INS/IGRP-SPs given at 4--6 weeks of age could protect NOD.*β2m^null^*.*HHD* female mice from diabetes development. Diabetes development was inhibited in mice treated with the INS/IGRP-SPs, compared with controls receiving Flu-SPs ([Fig. 2](#F2){ref-type="fig"}). We next determined which peptide(s) were responsible for the diabetes protective effects. NOD.*β2m^null^*.*HHD* mice were injected with syngeneic splenocytes separately bearing either a mixture of the two ECDI cross-linked INS (INS-SPs) or IGRP (IGRP-SPs) peptides. Because one injection of INS/IGRP-SPs initially afforded a partial diabetes protective effect, treatments with INS-SPs and IGRP-SPs were repeated at 5-week intervals. Compared with controls receiving Flu-SPs, only IGRP-SPs and not INS-SPs exerted a diabetes protective effect in NOD.*β2m^null^*.*HHD* mice ([Fig. 3](#F3){ref-type="fig"}). Treatments with syngeneic splenocytes separately bearing either the ECDI-coupled IGRP~228--236~ or IGRP~265--273~ peptide failed to significantly inhibit diabetes development in NOD.*β2m^null^*.*HHD* mice ([Fig. 3*A*](#F3){ref-type="fig"}). Thus, splenocytes must bear a combination of the ECDI-coupled IGRP~228--236~ and IGRP~265--273~ peptides in order to elicit robust diabetes protective effects in NOD.*β2m^null^*.*HHD* mice. Furthermore, although both INS/IGRP-SPs and IGRP-SPs treatment could inhibit overt diabetes development in NOD.*β2m^null^*.*HHD* mice, neither intervention significantly suppressed insulitis levels ([Fig. 3*B*](#F3){ref-type="fig"}).
{#F2}
{#F3}
INS/IGRP-SPs and IGRP-SPs inhibit in vivo responses of HLA-A2.1--restricted IGRP but not INS autoreactive CD8 T-cells in NOD.*β2m^null^.HHD* mice. {#s17}
--------------------------------------------------------------------------------------------------------------------------------------------------
We assessed whether the diabetes protective effect of INS/IGRP-SPs treatment was associated with altered in vivo responsiveness of either HLA-A2.1--restricted INS or IGRP autoreactive CD8 T-cells in NOD.*β2m^null^*.*HHD* mice. Two days following a third INS/IGRP-SPs or Flu-SPs treatment given at 5-week intervals, NOD.*β2m^null^.HHD* mice were primed in the footpad with a cocktail of the four INS and IGRP peptides. Ten days postpriming, the mice were killed and CD8 T-cells within the draining popliteal lymph nodes were assessed for reactivity to each individual peptide by IFN-γ ELISPOT analyses. All mice were still nondiabetic at the time of analysis. In INS/IGRP-SPs--treated NOD.*β2m^null^*.*HHD* mice, CD8 T-cell responses to both the HLA-A2.1--restricted IGRP~228--236~ and IGRP~265--273~ peptides but neither INS epitope were significantly decreased (*P* = 0.03 and 0.004) ([Fig. 4](#F4){ref-type="fig"}). Treatment with IGRP-SPs but not with INS-SPs also showed significantly decreased CD8 T-cell responses to both the IGRP~228--236~ and IGRP~265--273~ peptides (*P* = 0.05 and 0.002) ([Fig. 4](#F4){ref-type="fig"}). These results further indicate that in the context of the human HLA-A2.1 class I variant, autoreactive CD8 T-cells recognizing the IGRP~228--236~ and/or IGRP~265--273~ peptides are of significant pathogenic importance during diabetes development in NOD.*β2m^null^.HHD* mice.
{#F4}
Proinsulin is a pathogenic autoantigen in NOD.*β2m^null^.HHD* mice. {#s18}
-------------------------------------------------------------------
Previous studies have indicated that (pro)insulin is a key autoantigen for diabetes development in standard NOD mice ([@B27],[@B30]--[@B33]). This was partly demonstrated by studies showing that MHC class II promoter--driven transgenic expression of proinsulin-2 in APCs of NOD mice inhibits insulitis and diabetes development ([@B27],[@B30]). Hence, we used such a transgenic approach as an alternative means to test whether (pro)insulin may also be an autoantigen of pathogenic importance in NOD.*β2m^null^.HHD* mice. NOD.*β2m^null^.HHD* mice expressing the previously described ([@B27]) proinsulin-2 transgene in APCs (designated NOD.*β2m^null^.HHD-PI*) were generated and assessed for diabetes development. As shown in [Fig. 5*A*](#F5){ref-type="fig"}, compared with nontransgenic controls, the rate of type 1 diabetes development was somewhat retarded in NOD.*β2m^null^.HHD-PI* female mice but did not quite achieve statistical significance (*P* = 0.08) by Kaplan-Meier analyses. However, as assessed by χ^2^ analyses, the cumulative frequency of diabetes development by 35 weeks of age was significantly lower (*P* \< 0.005) in NOD.*β2m^null^.HHD-PI* mice than in nontransgenic controls. Insulitis levels were also significantly lower in NOD.*β2m^null^.HHD-PI* mice than in nontransgenic controls ([Fig. 5*B*](#F5){ref-type="fig"}). Baseline and primed levels of CD8 T-cell responses to the HLA-A2.1--restricted Ins1/2 A~2--10~ or Ins1 B~5--14~ epitopes were found not to differ in NOD.*β2m^null^.HHD-PI* mice and nontransgenic controls (data not shown). These findings do not eliminate the possibility that like those targeting IGRP epitopes, HLA-A2.1--restricted insulin autoreactive CD8 T-cells are also important pathogenic contributors to diabetes development in NOD.*β2m^null^.HHD* mice. However, these APC transgenic expression studies indicate that even if they do not represent autoantigens recognized by pathogenic HLA-A2.1--restricted CD8 T-cells, (pro)insulin derived epitopes are important targets of at least diabetogenic CD4 T-cells in NOD.*β2m^null^.HHD* mice.
{#F5}
INS/IGRP-SPs do not have to share host MHC class I identity to tolerize IGRP-specific CD8 T-cells and to attenuate diabetes development in NOD.*β2m^null^.HHD* mice. {#s19}
--------------------------------------------------------------------------------------------------------------------------------------------------------------------
It has been previously reported that splenocytes bearing ECDI-coupled proteins or peptides do not directly induce tolerogenic responses by CD4 T-cells in an efficient manner, but rather do so indirectly following their uptake and processing by host-type APC ([@B21]). If this is also the case for inducing CD8 T-cell tolerance, we reasoned it should remain possible to inhibit diabetes development in the HLA-A2.1--expressing NOD.*β2m^null^*.*HHD* stock by treatments with splenocytes from totally MHC class I--deficient NOD.*β2m^null^* mice bearing the complete cocktail of ECDI cross-linked INS and IGRP epitopes (designated INS/IGRP-*β2m^null^* SPs). Unlike those receiving Flu-*β2m^null^* SPs, diabetes development was completely abrogated in INS/IGRP-*β2m^null^* SPs-treated NOD.*β2m^null^*.*HHD* mice ([Fig. 6*A*](#F6){ref-type="fig"}).
{#F6}
Two days after a third INS/IGRP-*β2m^null^* SPs or Flu-*β2m^null^* SPs treatment given at 5-week intervals, NOD.*β2m^null^.HHD* mice were primed in the footpad with a cocktail of the four INS and IGRP peptides. Ten days postpriming, CD8 T-cells within the draining popliteal lymph nodes were assessed for reactivity to each individual peptide by IFN-γ ELISPOT analyses. CD8 T-cell responses to both the HLA-A2.1--restricted IGRP~228--236~ and IGRP~265--273~ peptides but again not the INS epitopes were significantly decreased in INS/IGRP-*β2m^null^* SPs-treated NOD.*β2m^null^*.*HHD* mice ([Fig. 6*B*](#F6){ref-type="fig"}). These collective results indicate that in order to induce CD8 T-cell tolerance and to elicit diabetes protective effects in NOD.*β2m^null^.HHD* recipients, donor cells bearing ECDI cross-linked HLA-A2.1 restricted IGRP autoantigenic peptides do not also have to express the relevant host-type MHC class I variant.
The results described above also indicated that rather than directing inducing tolerogenic responses inhibiting diabetogenic CD8 cell activity in NOD.*β2m^null^*.*HHD* mice, INS/IGRP-SPS or IGRP-SPs instead do so in an indirect manner dependent on their uptake by host-type APC. To directly test this possibility, we compared the ability of ECDI-treated or untreated donor cells that were also labeled with the carboxyfluorescein diacetate succinimidyl ester (CFSE) tracker dye to be taken up by host-type antigen-presenting dendritic cells (DCs). Donor- and recipient-type cells were also distinguished by respective expression of the CD45.2 versus CD45.1 pan-leukocyte marker variant. There was a significantly greater uptake by host-type splenic CD8+ DCs of ECDI-treated than untreated donor cells that had been intravenously infused 1 day earlier ([Fig. 7*A* and *B*](#F7){ref-type="fig"}). ECDI fixation induces apoptotic death of treated cells ([@B21]). This likely explains why fewer ECDI-treated than untreated donor cells could be detected in the recipients, but with the apoptotic status of the former also allowing them to be more efficiently engulfed by host-type DCs. These results indicate the ability of donor cells bearing ECDI-coupled IGRP peptides to elicit diabetes protective effects likely entails their uptake by host-type DCs that then display the autoantigenic epitopes to CD8 T-cells in a tolerance-inducing manner.
{#F7}
DISCUSSION {#s20}
==========
Our results indicate that treatment with INS/IGRP-SPs (bearing an ECDI cross-linked mixture of the Ins1/2 A~2--10~, Ins1 B~5--15~, IGRP~228--236~, and/or IGRP~265--273~ peptides) inhibits diabetes development in "humanized" NOD.*β2m^null^*.*HHD* mice. We found IGRP-SPs to be more effective than INS-SPs in inhibiting diabetes development in NOD.*β2m^null^.HHD* mice. Furthermore, the inhibition of diabetes development in NOD.*β2m^null^.HHD* mice by INS/IGRP-SPs treatment was associated with an attenuation of IGRP but not INS-specific autoreactive CD8 T-cell responses. Treatment with IGRP~228--236~ or IGRP~265--273~ single peptide-SPs did not significantly inhibit diabetes development in NOD.*β2m^null^.HHD* mice. This indicated that CD8 T-cell tolerance must be established to both the HLA-A2.1--restricted IGRP~228--236~ and IGRP~265--273~ epitopes in order to elicit diabetes-protective effects in NOD.*β2m^null^*.*HHD* mice.
In standard NOD mice, insulin appears to be an earlier target than IGRP of CD4 and CD8 T-cells initiating diabetes development ([@B31]--[@B33]). It is unclear why INS/IGRP-SPs or INS-SPs treatment did not alter levels of HLA-A2.1--restricted CD8 responses against the Ins1/2 A~2--10~ or Ins1 B~5--14~ epitopes in NOD.*β2m^null^*.*HHD* mice. However, NOD.*β2m^null^*.*HHD* mice transgenically expressing proinsulin-2 in APCs were largely protected from insulitis and diabetes development. These APC transgenic studies also indicated that even if diabetes development in NOD.*β2m^null^*.*HHD* mice does not require HLA-A2.1--restricted CD8 responses targeting (pro)insulin epitopes, an important component of their disease susceptibility still entails CD4 T-cell responses against this pancreatic β-cell antigen.
It has been previously reported that although peptide-SPs can directly induce CD4 T-cell tolerance induction processes in an inefficient manner, they do so more efficiently through an indirect mechanism involving their uptake and processing by host-type APCs ([@B25]). Because of these alternative mechanisms, MHC compatibility between splenotype donor and host is not required in order to induce CD4 T-cell tolerance to ECDI-coupled antigens, although syngeneic donor cells are more efficient at doing so. We found INS/IGRP peptides ECDI coupled to completely MHC class I--deficient donor splenocytes strongly inhibited IGRP-specific CD8 T-cell responses and diabetes development in NOD.*β2m^null^.HHD* mice. Hence, donor/host MHC class I compatibility is not required to efficiently induce CD8 T-cell tolerance to ECDI-coupled self-antigenic peptides. These findings indicate that IGRP-SPs inhibit diabetes development in NOD.*β2m^null^*.*HHD* mice by inducing CD8 T-cell tolerance through an indirect host-type APC-dependent pathway. Indeed, other data indicate that host-type DCs more efficiently take up donor ECDI-treated than untreated leukocytes.
A review by Luo et al. ([@B21]) discusses efforts by the Immune Tolerance Network to develop a clinical trial using ECDI insulin-coupled peripheral blood lymphocytes as a possible diabetes intervention in humans. Our current results indicate that the use of "humanized" NOD.*β2m^null^.HHD* mice and other related strains may facilitate the development of clinically translatable peptide-based therapies for diabetic patients. In particular, currently available "humanized" mouse resources make it possible to determine which autoantigenic peptides when ECDI cross-linked to autologous leukocytes are most likely to attenuate HLA-A2.1--restricted CD8 T-cell responses that recent evidence ([@B10]--[@B16]) indicates may be important for diabetes development in many human patients.
This work was supported by National Institutes of Health grants DK-46266 and DK-51090, and Cancer Center Support Grant CA34196, and grants from the Juvenile Diabetes Research Foundation (JDRF). M.N. is the recipient of a JDRF post-doctoral fellowship award.
No potential conflicts of interest relevant to this article were reported.
M.N. researched data and wrote the manuscript. A.E.G. researched data. M.M. created the NOD.*β2m^null^.HHD* mice. T.W.H.K. created NOD.*PI* mice and contributed to discussion. D.L.G. contributed to discussion and reviewed and edited the manuscript. D.V.S. directed research and wrote the manuscript.
|
What is GitOps?
So what actually is GitOps? On the surface, it is quite simple. GitOps is centered around using a version control system (such as Git) to house all information, documentation, and code for a Kubernetes deployment, and then use automated directors to deploy changes to the cluster. GitOps provides a way for developers to manage operational workflows, particularly for Kubernetes, using Git and their own version control system.
In short, the same process you use to merge code using pull requests is used to deploy workloads to Kubernetes.
Continuous Integration
Like any good pull request (PR) workflow we need to be running continuous integration tests to validate our changes are mergeable into our codebase. This is no different for the Kubernetes manifests we are maintaining in source control.
All our custom helm charts at Mettle are stored in a centralized repository called mettle/k8s-helm-charts. These charts are then deployed into our Kubernetes clusters using Flux HelmReleases, to read more about these please see https://docs.fluxcd.io/projects/helm-operator/en/latest/references/helmrelease-custom-resource.html
The CI problem
We validated our helm charts by executing helm template and then piping the output into kubeval (https://github.com/instrumenta/kubeval) for each chart in turn (see below) to verify the manifests align to the schema definitions for the specific version of Kubernetes.
The issue was that every time kubeval was being executed it seemed to be taking ages, we realized this was because kubeval was having to pull down all the schemas each time to verify the helm chart against. This meant if we added more charts to the repository it was only conflating the issue.
Schemas: https://github.com/instrumenta/kubernetes-json-schema
The CI solution
When looking at the flags available to Kubeval I noticed the following one:
-s, --schema-location string Base URL used to download schemas. Can also be specified with the environment variable KUBEVAL_SCHEMA_LOCATION.
If we could download the necessary schemas locally and then point kubeval at them this would drastically decrease the amount of time required to lint our helm charts.
I went about creating a container called kubernetes-toolkit which would contain all the packages and binaries we use to validate kubernetes manifests (e.g. kubectl, helm and of course kubeval).
Additionally and most importantly, I would download the schemas for the specific version of kubectl inside the container at build time. The bash script for this can be seen below
The version of Kubernetes is passed to the Dockerfile as an argument at build time to make sure the correct version of kubectl is installed and most importantly only the schema definitions for that version are stored in the container.
The logic to maintain the specific set of schema can be seen below:
Additionally, we need to tweak the bash script which runs kubeval to the following:
We now set the KUBEVAL_SCHEMA_LOCATION environment variable to make sure the schemas inside the container are used. Additionally, we specifically tell kubeval what version of Kubernetes to validate against using the
—- kubernetes-version flag, this is required as the container only contains version 1.17 schemas.
Finally, we need to hook this all up in our CircleCI configuration file (below)
We aim to build a new version of the kubernetes-toolkit container for each release of kubernetes and update our corresponding CI jobs accordingly.
Shoutouts
I would like to shoutout https://twitter.com/karlstoney for this idea it's reduced our build times from 20 minutes to around 5 seconds with minimal changes. |
Q:
Cron Job SQL Check New User
This is more of a is it possible question rather then a technical question.
I've got a tender asking if its possible to check a old user database and if there's new users then add it to the new Joomla User database table.
I thought the best way would be to use a cron job but I don't understand how you would check if there was a new user added to the old database?
Would this be possible and if so what kind of theory would you use?
Thanks
A:
Supposing the Tender has access to both databases and files, i have a question.
Does the old database(website) still in use? I guess so since the user can be incremented!
So why not to edit Joomla files (user related component com_user), to also add the new user to the new database, after the validation/insert on the old one.
This is simple in either cases old 1.5 and newer versions.
Hope i have helped and drove you into the right direction.
Regards.
|
The 50-year-old definition of capitalism in the U.S. is due for an update because of income inequality, according to billionaire hedge fund manager and philanthropist Paul Tudor Jones.
"Capitalism may need modernizing," the reclusive trader told CNBC's "Squawk Box" on Tuesday in a rare interview. "In 1985, 35 percent of nation's wealth was owned by the bottom 90 percent. Today, they own 23 percent, and that 12 percent has gone to the top."
Jones pointed to economist Milton Friedman's nearly 50-year-old definition that the "social responsibility of a company is to improve its profits."
"When Milton Friedman said that, tax rates had just come from 91 percent to 70 and income inequality was one-fifth of what it is today," he said. "You can see how it was relevant at the time but fast forward to where we are today. It's a different deal." |
Thursday, May 9, 2013
Owner to sell rooming house where Oswald lived before JFK assassination
by ROY APPLETON / Dallas Morning News
Pat Hall wants to sell her house in north Oak Cliff.
The place at 1026 N. Beckley Ave. should attract some interest, as it has for half a century.
A guy named Lee Harvey Oswald lived there for a while in 1963. That is, until he was arrested and charged with killing President John F. Kennedy and Dallas police Officer J.D. Tippit.
With the 50th anniversary of those events drawing near, Hall plans to list the property for sale June 1. No word yet on an asking price. But she has a minimum in mind.
“It’s not going to be too low,” she said during a recent tour of the house. “I’m selling history here.”
Her grandmother Gladys Johnson bought the house in 1943 and lived there with her husband for years, renting rooms to single men.
On Oct. 14, 1963, a man identifying himself as O.H. Lee took her only available room, paying $8 a week including refrigerator and living room privileges.
“She must have really liked him,” said Hall, for most renters didn’t have refrigerator access.
And Oswald apparently liked children, she said, recalling how he would play ball with her brothers in front of the house.
In testimony for the Warren Commission investigating the Kennedy assassination, Johnson said the quiet and tidy tenant spent most weekends with his family in Irving. She said he would keep “a half gallon of sweet milk … and lunch meat” in the refrigerator and occasionally watch television with other renters in the living room.
She also told of learning on Nov. 22 that her Mr. Lee was really Lee Harvey Oswald after seeing his picture “flash on the television” and talking with police officers who swarmed his room after his arrest at the Texas Theatre in the fatal shooting of Tippit.
Oswald had returned to the house briefly after shooting Kennedy — hurriedly, the landlady later said — apparently to retrieve a pistol. Officers found an empty holster in his room, Johnson testified.
“She was ashamed and humiliated that this house was associated with him,” Hall said.
And so it has been ever since. The brown brick house became a place in history, a tie to that tragic day.
Her grandmother put up with an onslaught of reporters and other intruders for months after the assassination before “telling everybody to go away,” Hall said.
The Oswald yoke
Hall’s late mother, Fay Puckett, lived as well with the Oswald yoke, a past that continues to attract tour buses, history hounds and the unexpected — as in the Lee Harvey Oswald look-alike actor from Austin who showed up at the front door one day.
“It was kind of weird having that guy standing there,” Hall said. “It took me back.”
After her mother died, Hall, 61, opened the place to tours for several years, encouraging — with some success — donations toward its upkeep.
But she and her house aren’t getting younger. The structure needs repairs here and there. The public demands of history, she said, have been a burden, something she doesn’t want for her children.
‘Timing is perfect’
So the assassination’s 50th anniversary seemed like prime time to test the real estate market and perhaps make a move.
“The timing is perfect,” Hall said.
The listing will include nine bedrooms and four bathrooms counting the main house, its basement and a detached building — fewer sleeping areas than in rooming-house days.
The kitchen stove dates to Oswald days. The refrigerator that cooled his food and drink is gone, as is the communal telephone he would use. The compact bathroom he and others shared still has its white tile floor and built-in medicine cabinet.
The living room’s reupholstered couch, rocking chair, coffee table, book shelves and fireplace heater remain from the times Oswald sat there watching television.
“This is it,” said Hall, chuckling as she walked into the Oswald quarters near the dining room, minus the French doors he used for privacy.
Her grandmother, she said, “didn’t want to make a big deal about this being his room.”
But Hall is restoring it for the sale. She has repaired walls and hopes to paint them the green of 1963. She plans to refinish the wooden floor, measuring 5½ feet by 14 feet, and return blinds to the four windows. Oswald’s metal twin bed is back in place. A drawered closet will be returned from storage.
Everything but Hall’s personal belongings will remain with the house, she said.
The property, the 2,078-square-foot house and rear building, is valued on the tax rolls at $65,830. No telling what offers the 78-year-old, red-roofed house with its window air-conditioning, trellised porch and often-told story will attract.
Whatever happens, the structures have some protection. The city’s Landmark Commission must approve any significant changes to their exterior because the property lies in the Lake Cliff Historic District. Presence in the district probably would prevent demolition.
Landmark effort
Preservation Dallas may seek local, state or federal landmark status for the site, said David Preziosi, executive director. It also wants to record the Hall property inside and out, as well as other Oswald-related sites, he said.
“You need to tell the whole story of the assassination,” he said. “You can better understand the events of the day when you have the pieces documented.”
The big story about 1026 N. Beckley, Preziosi said, is more the possible change in ownership than any threat to the property.
“The sale is significant considering how long it’s been in her family,” he said. “We’re losing that [70-year] connection.”
Hall hopes a buyer will preserve the house, particularly the interior areas where Oswald spent time. “I’d like them to maintain it as it is so young people can come, history buffs can come and see what it was like to live in 1963.”
But first to find that buyer.
Real estate agent Vo Singhal will represent Hall. He will screen inquiries, he said, and try to protect Hall’s privacy.
“When this goes public, I don’t want to spend my time batting off lookie-looks,” Hall said.
Hall and Singhal would just as soon see a bidding war break out. And if she doesn’t get that bottom dollar? |
Q:
DCC error : published field is not a class or interface type
I keep getting this following DCC error, published field 'name' is not a class or interface type for the following class.
TGroup = class
name:string[32]; <<<========================
rwFeatures:TFeatures;
roFeatures:TFeatures;
levels:TLevels;
private
public
constructor Create;
procedure Read(var f:file);
procedure ReadOld(var f:file);
procedure Write(var f:file);
end;
What does it mean?
A:
The class is compiled with the Emit runtime type information setting enabled. When the class is compiled with runtime type information, the default visibility is published. Which means that the short string field is published. And short string fields are not allowed to be published.
The documentation says:
Fields can be published only if they are of a class or interface type.
That's a pretty stringent requirement. It means that you can't publish integer or boolean fields, for example.
I suspect this limitation is because the primary use for published fields is for object references. Think of the components on a form.
Solve the problem using one of these options:
Don't emit runtime type information for this class.
Make the short string fields public rather than published.
Use properties rather than fields.
|
WOLFE FINDS VICTORY LANE AT OUTLAW SPEEDWAY ON NIGHT #1 OF DUTCH HOAG WEEKENDDUNDEE, NY.....Under clear skies, competitors jammed the Outlaw Speedway pit area to begin the final race weekend of 2017 at the Dundee oval on the first of two days of the 'Dutch Hoag Memorial Weekend.'
In the 25-lap Lucas Oil Empire Super Sprint main event, Lucas Wolfe outdueled Mark Smith for the lead but Jordan Thomas's flip in turn two brought out the red just one lap in. On the restart, Smith took the lead again, but the red flew on lap 3 for another flip on the frontstretch by Steve Glover. A third flip by Steve Hutchinson brought out another red at lap 5. Smith pulled away from Wolfe on the restart as Jason Schultz took third. Justin Barger battled past Chuck Hebing for fourth as the leaders worked through traffic. A debris caution on lap 16 bunched the field again, and Wolfe jumped back into the lead as Shultz and Barger fought for third. At the checkers, Wolfe took the win over Smith, Schultz, Barger, and Varin.
Lucas Oil ESS heats were won by Robbie Stillwagon, Jason Schultz, Joe Trenca, and Matt Billings. Mark Smith was the Pole Dash winner and the 'B' Main was captured by Scott Kreutter.
Casey Pavlick took the lead from Garrett Rushlow at the start of the 25-lap GRIT Hoosier Crate Sportsman Series feature with Nick Guererri moving into second. The duo hit lapped traffic at lap 10 as Dave Marcuccilli and Rocky Warner were coming into the top five. Marcuccilli moved past Rushlow for third on lap 14 as Guererri battled Pavlick for the race lead.
Warner cracked the top five at lap 18 as Guererri took the lead from Pavlick on lap 20 with Marcuccilli right behind. George Sanford tangled with an infield marker tire on lap 23 to bring out the yellow and set up a shootout for the finish. Marcuccilli snuck past both Guererri and Pavlick in the final two circuits to take the victory in a great run to the checkers. Pavlick nipped Guererri for second, followed by Rocky Warner and Kyle Inman.
The 20-lap Crate Late Model feature saw Bryce Davis drive past pole sitter Dennis Cummings to take the top spot as John Waters and Jeremy Wonderling slotted into second and third Waters and Davis battled over a couple of restarts, with Waters sliding into the top spot on lap 8. Waters hit traffic on lap 13 but Davis could not close the gap on the leader. Wonderling closed in briefly, but Davis kept him at bay over the closing laps and at the finish, Waters had the win, followed by Davis, Wonderling, Brian Knowles, and Kurt Stebbins.
Crate Late Model heats were won by Brian Knowles, John Waters, and Jeremy Wonderling.
In the 20-lap IMCA Modified feature, Brad Smith took the point as Richard Michael Jr worked from his 6th starting spot into second by lap 6. On a restart after a caution for debris, Michael took the lead from Smith as AJ Ward and Brad Sites raced for the third spot. A lap 11 caution saw Bob Maynard and Jake Maynard spin off turn three, and at the same time, Smith and Billy Ward made hard contact that knocked the left rear off the Smith machine. AJ Ward was able to wrestle the lead away from Michael on a restart and held on for the final laps for the win over Michael, Will Ward, Ken Buck,and Myron DeYoung.
The 4 Cylinder feature saw Teddy Morseman and Chris Woodard battle for the early lead. Morseman spun in turn three on lap 3, which triggered a multi car pileup which brough out a red flag. Woodard pulled away on the restart with Brad Shepard joining him in a two car breakway as Bruce Kinner fought for third with Morseman and Ray Hyer. As the leaders worked in traffic, James Kreidler III blew an engine on lap 16, setting up a restart with four to go. Woodard held the lead to the finish and took the win over Shepard, Ray Hyer, Morseman, and Bruce Kinner.4 Cylinder heats were won by Ray Hyer, Brad Shepard, Mike Robinson, and Eric Ellsworth. The consolation race was taken by James Kreidler III.
A pair of dash events were also held for the Street Stock and Friendly Dodge Outlaw Modified divisions, with the winners getting guaranteed starting spots for tomorrow's events. In the Street Stock Dash, Dylan Ceece and Kurt Stebbins battled for the win with Ceece holding on for a one car length victory. In the Friendly Dodge Outlaw Modified Dash, Justin Haers led until turn two of the final lap when his car broke, giving Alan Johnson the victory.
Racing action continues at Outlaw Speedway Saturday, October 21st with the second day of the Dutch Hoag Weekend, featuring the 'Gunslinger 70' for the Friendly Dodge Outlaw Modifieds, the Street Stock 'World 100', plus several other divisions.. For more information, visit www.outlawspeedwayllc.com |
Q:
Cross-Compiling Qt for Embedded Linux Applications
Where qmake.conf file is located and how it should look for armhf debian wheezy platform? (BeagleBone Black)
I am trying to follow these steps, but some of them are unreasonable like that one about qmake.
Also what does export PATH=path/to/cross/compiler:$PATH will do?
I enter something like this in path/to/cross/compiler
export PATH=/usr/bin/arm-linux-gnueabihf-g++:$PATH
A:
export PATH=/usr/bin/arm-linux-gnueabihf-g++:$PATH
you should add directory to PATH not path to file, in your case it is /usr/bin,
but because of /usr/bin is already in your PATH you can skip this step.
Where qmake.conf file is located and how it should look for armhf debian wheezy platform?
Look at mkspecs/linux-arm-gnueabi-g++/ in qt source directory, your qmake.conf should looks like it, you can just modify this file to point to your compiler.
|
1. Field
The present disclosure relates generally to digital image processing, and more particularly, to devices and methods for embedding and retrieving information in digital images and using the information to organize, process and control the digital images.
2. Description of the Related Art
Photographs are taken for a variety of personal and business reasons. During the course of the year, an individual may take numerous photographs of various events. During these events, quite often there is a variety of different individuals and items present in these photographs. In the prior art, when one desires to catalog these images in a particular order, they usually are left to placing these images manually into photograph albums. This is a very extensive, manual procedure requiring a significant amount of time. In addition, it is very limited with regard to the amount of information that can be associated with the image in a quick and easy manner. While some photo albums allow the writing and placing of text, the entering of this data is a very time consuming and arduous affair. Once having sorted these images into particular albums which may represent categories of interest, it is extremely difficult to retrieve and/or reorganize the images into other categories.
With the advent of digital cameras and digital imaging, the process of organizing images and associating information with the images has become even more difficult. Firstly, upon capturing an image with a digital camera, the camera simply gives the image a numerical file name which usually has no meaning to the user and makes it difficult to retrieve at a later date. Secondly, with the technological advances in file size compression and increased capacity of storage media, several hundred images may be taken before a user downloads the images to a computer or other device, making it a very time consuming task to associate information to each image.
Therefore, a need exists for techniques for easily associating information about an image to the image and using the information to control and retrieve the image. |
Açai Berry (Euterpe oleracea) Dietary Supplements: Variations in Anthocyanin and Flavonoid Concentrations, Phenolic Contents, and Antioxidant Properties.
Açai (Euterpe oleracea) is a palm plant that is native to South America and produces deep purple berry fruits. Despite açai's popularity as a dietary supplement, little is known about the phenolic composition and antioxidant properties of commercially available açai berry products. Therefore, twenty açai supplements in a variety of forms (e.g., capsule, powder, frozen pulp, and liquid) were analyzed for their total phenolic and anthocyanin contents, individual anthocyanin and other flavonoid concentrations, and antioxidant capacities. Hierarchical cluster analysis was then used to group açai supplements into categories based on similarities in their chemical profiles and antioxidant properties. Results showed that over half of the supplements contained little or no açai fruit or had sufficient amounts of water to substantially lower the concentration of açai chemical components. Additionally, two açai supplements contained unlisted ingredients that greatly altered the products' chemical properties. Chromatographic analysis of individual anthocyanins and other flavonoids was useful in identifying the presence of açai fruit within the dietary supplements while complimentary in vitro spectroscopic assays aided in detection of adulterants. This study highlights the complexity of the dietary supplement market while also showing the importance of collectively analyzing data from multiple complimentary techniques when evaluating açai berry products. |
Just a small update, issues are still ongoing with the new 2.5.5 build so no Open Beta update today (Friday), soon as we have more info, we will let you all know. Thanks! |
In case anyone might be confused about the meaning of "traditional," he elaborated: "The white establishment is now the minority."
In other words, the problem was too many voters of color. And O'Reilly explained why that is a problem.
"There are 50 percent of the voting public who want stuff. They want things, and who is going to give them things? President Obama. He knows it, and he ran on it. ... You're going to see a tremendous Hispanic vote for President Obama. Overwhelming for President Obama, and women will probably break President Obama's way. People feel that they are entitled to things, and which candidate, between the two, is going to give them things?"
In a phone call with supporters Wednesday, Romney echoed some of the O'Reilly analysis. He attributed his defeat to the incumbent's "gifts" to some of the same demographic groups whose rise troubles O'Reilly.
"The Obama campaign was following the old playbook of giving a lot of stuff to groups that they hoped they could get to vote for them and be motivated to go out to the polls, specifically the African American community, the Hispanic community and young people," Romney said, according to the Los Angeles Times.
So, you may ask, what's incorrect in that analysis? Obama "evolved" on gay marriage just in time to solidify the gay vote. It wasn't until his fourth year in office, with Hispanic voters in play, that he decreed a path to legality for some young undocumented immigrants. Coincidence? Don't be naive, Romney is telling us.
Our guess is that Obama thought that both policies would be good for the country — at worst, a confluence of good politics and common sense — just as Romney saw promises of lower taxes and expanded drilling as in the national interest, not "gifts" to small businesses and oil companies. Yet he seems to view extending health care insurance to the uninsured as a political payoff to minorities.
"With regards to African American voters, Obamacare was a huge plus," Romney said. "You can imagine for somebody making $25- or $30- or $35,000 a year, being told you're now going to get free health care — particularly if you don't have it, getting free health care worth, what, $10,000 a family, in perpetuity — I mean, this is huge. Likewise with Hispanic voters, free health care was a big plus."
Yes — and shouldn't it be? Would Romney prefer that people making $25,000 a year remain uninsured? Does the man who expressed pride in extending insurance to everyone in Massachusetts really see the Affordable Care Act as nothing but a play for votes?
We think voters generally make decisions based on a complex assessment of their own interests and what they think is good for the country. Romney apparently views the people as a series of segmentable, selfish market shares.
It's encouraging that many Republicans are repudiating the contemptuous, and contemptible, O'Reilly-Romney worldview. |
Klinzman declined to discuss specifics of the attempt to find a company to take over the port, citing the need for privacy in such talks. But he said the board won't be voting on a privatization plan Friday. "They've made no secret about their interest in doing this," Klinzman said of the board's effort to reach some kind of public-private partnership agreement to run the port. |
/**
* Copyright 2014-present, Facebook, Inc.
* All rights reserved.
*
* This source code is licensed under the BSD-style license found in the
* LICENSE file in the root directory of this source tree. An additional grant
* of patent rights can be found in the PATENTS file in the same directory.
*
* @providesModule ReactCoroutine
* @flow
*/
'use strict';
import type { ReactNodeList } from './ReactTypes';
type ReifiedYield = { continuation: Object, props: Object };
type CoroutineHandler<T> = (props: T, yields: Array<ReifiedYield>) => ReactNodeList;
export type ReactCoroutine = {
$$typeof: Symbol | number,
key: null | string,
children: any,
// This should be a more specific CoroutineHandler
handler: (props: any, yields: Array<ReifiedYield>) => ReactNodeList,
props: any,
};
export type ReactYield = {
$$typeof: Symbol | number,
key: null | string,
props: Object,
continuation: mixed
};
|
Q:
Comparison Variables
I saw some variables like this:
var comparison = <condition> || /* It could be "&&" too */ <condition>;
I don't know what it is and what can it do?
Tks you so much!
A:
It's mainly used to initialize function arguments to a certain default value.
function foo(arg1,arg2)
{
arg1 = arg1 || 'Default for arg1';
arg2 = arg2 || 'Default for arg2';
}
What this code does, is actually the same as the following:
if (!(arg1))
{//if arg1 is falsy
arg1 = 'Default for arg1';//assign
}
As far as the && goes, that's pretty much the same story:
function foo(arg1,arg2)
{
var areBothArgsTrue = arg1 && arg2;//sets true is both args were truthy, else assigns false
arg1 = arg1 || 'Default for arg1';
arg2 = arg2 || 'Default for arg2';
}
A:
They're called logical operators (MDN):
expr1 && expr2 : Returns expr1 if it can be converted to false; otherwise, returns expr2. Thus, when used with Boolean values, && returns true if both operands are true; otherwise, returns false.
expr1 || expr2 : Returns expr1 if it can be converted to true; otherwise, returns expr2. Thus, when used with Boolean values, || returns true if either operand is true; if both are false, returns false.
|
/**
* This code was generated by
* \ / _ _ _| _ _
* | (_)\/(_)(_|\/| |(/_ v1.0.0
* / /
*/
package com.twilio.rest.sync.v1.service.syncmap;
import com.fasterxml.jackson.databind.ObjectMapper;
import com.twilio.Twilio;
import com.twilio.converter.DateConverter;
import com.twilio.converter.Promoter;
import com.twilio.exception.TwilioException;
import com.twilio.http.HttpMethod;
import com.twilio.http.Request;
import com.twilio.http.Response;
import com.twilio.http.TwilioRestClient;
import com.twilio.rest.Domains;
import mockit.Mocked;
import mockit.NonStrictExpectations;
import org.junit.Before;
import org.junit.Test;
import java.net.URI;
import static com.twilio.TwilioTest.serialize;
import static org.junit.Assert.*;
public class SyncMapPermissionTest {
@Mocked
private TwilioRestClient twilioRestClient;
@Before
public void setUp() throws Exception {
Twilio.init("AC123", "AUTH TOKEN");
}
@Test
public void testFetchRequest() {
new NonStrictExpectations() {{
Request request = new Request(HttpMethod.GET,
Domains.SYNC.toString(),
"/v1/Services/ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Maps/MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Permissions/identity");
twilioRestClient.request(request);
times = 1;
result = new Response("", 500);
twilioRestClient.getAccountSid();
result = "AC123";
}};
try {
SyncMapPermission.fetcher("ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "identity").fetch();
fail("Expected TwilioException to be thrown for 500");
} catch (TwilioException e) {}
}
@Test
public void testFetchResponse() {
new NonStrictExpectations() {{
twilioRestClient.request((Request) any);
result = new Response("{\"account_sid\": \"ACaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\",\"service_sid\": \"ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\",\"map_sid\": \"MPaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\",\"identity\": \"identity\",\"read\": true,\"write\": true,\"manage\": true,\"url\": \"https://sync.twilio.com/v1/Services/ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Maps/MPaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Permissions/identity\"}", TwilioRestClient.HTTP_STATUS_CODE_OK);
twilioRestClient.getObjectMapper();
result = new ObjectMapper();
}};
assertNotNull(SyncMapPermission.fetcher("ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "identity").fetch());
}
@Test
public void testDeleteRequest() {
new NonStrictExpectations() {{
Request request = new Request(HttpMethod.DELETE,
Domains.SYNC.toString(),
"/v1/Services/ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Maps/MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Permissions/identity");
twilioRestClient.request(request);
times = 1;
result = new Response("", 500);
twilioRestClient.getAccountSid();
result = "AC123";
}};
try {
SyncMapPermission.deleter("ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "identity").delete();
fail("Expected TwilioException to be thrown for 500");
} catch (TwilioException e) {}
}
@Test
public void testDeleteResponse() {
new NonStrictExpectations() {{
twilioRestClient.request((Request) any);
result = new Response("null", TwilioRestClient.HTTP_STATUS_CODE_NO_CONTENT);
twilioRestClient.getObjectMapper();
result = new ObjectMapper();
}};
SyncMapPermission.deleter("ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "identity").delete();
}
@Test
public void testReadRequest() {
new NonStrictExpectations() {{
Request request = new Request(HttpMethod.GET,
Domains.SYNC.toString(),
"/v1/Services/ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Maps/MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Permissions");
twilioRestClient.request(request);
times = 1;
result = new Response("", 500);
twilioRestClient.getAccountSid();
result = "AC123";
}};
try {
SyncMapPermission.reader("ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX").read();
fail("Expected TwilioException to be thrown for 500");
} catch (TwilioException e) {}
}
@Test
public void testReadEmptyResponse() {
new NonStrictExpectations() {{
twilioRestClient.request((Request) any);
result = new Response("{\"permissions\": [],\"meta\": {\"first_page_url\": \"https://sync.twilio.com/v1/Services/ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Maps/sidOrUniqueName/Permissions?PageSize=50&Page=0\",\"key\": \"permissions\",\"next_page_url\": null,\"page\": 0,\"page_size\": 50,\"previous_page_url\": null,\"url\": \"https://sync.twilio.com/v1/Services/ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Maps/sidOrUniqueName/Permissions?PageSize=50&Page=0\"}}", TwilioRestClient.HTTP_STATUS_CODE_OK);
twilioRestClient.getObjectMapper();
result = new ObjectMapper();
}};
assertNotNull(SyncMapPermission.reader("ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX").read());
}
@Test
public void testReadFullResponse() {
new NonStrictExpectations() {{
twilioRestClient.request((Request) any);
result = new Response("{\"permissions\": [{\"account_sid\": \"ACaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\",\"service_sid\": \"ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\",\"map_sid\": \"MPaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\",\"identity\": \"identity\",\"read\": true,\"write\": true,\"manage\": true,\"url\": \"https://sync.twilio.com/v1/Services/ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Maps/MPaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Permissions/identity\"}],\"meta\": {\"first_page_url\": \"https://sync.twilio.com/v1/Services/ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Maps/sidOrUniqueName/Permissions?PageSize=50&Page=0\",\"key\": \"permissions\",\"next_page_url\": null,\"page\": 0,\"page_size\": 50,\"previous_page_url\": null,\"url\": \"https://sync.twilio.com/v1/Services/ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Maps/sidOrUniqueName/Permissions?PageSize=50&Page=0\"}}", TwilioRestClient.HTTP_STATUS_CODE_OK);
twilioRestClient.getObjectMapper();
result = new ObjectMapper();
}};
assertNotNull(SyncMapPermission.reader("ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX").read());
}
@Test
public void testUpdateRequest() {
new NonStrictExpectations() {{
Request request = new Request(HttpMethod.POST,
Domains.SYNC.toString(),
"/v1/Services/ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Maps/MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX/Permissions/identity");
request.addPostParam("Read", serialize(true));
request.addPostParam("Write", serialize(true));
request.addPostParam("Manage", serialize(true));
twilioRestClient.request(request);
times = 1;
result = new Response("", 500);
twilioRestClient.getAccountSid();
result = "AC123";
}};
try {
SyncMapPermission.updater("ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "identity", true, true, true).update();
fail("Expected TwilioException to be thrown for 500");
} catch (TwilioException e) {}
}
@Test
public void testUpdateResponse() {
new NonStrictExpectations() {{
twilioRestClient.request((Request) any);
result = new Response("{\"account_sid\": \"ACaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\",\"service_sid\": \"ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\",\"map_sid\": \"MPaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\",\"identity\": \"identity\",\"read\": true,\"write\": true,\"manage\": true,\"url\": \"https://sync.twilio.com/v1/Services/ISaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Maps/MPaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/Permissions/identity\"}", TwilioRestClient.HTTP_STATUS_CODE_OK);
twilioRestClient.getObjectMapper();
result = new ObjectMapper();
}};
SyncMapPermission.updater("ISXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "MPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", "identity", true, true, true).update();
}
} |
Portland police are investigating the death of a person who apparently fell from a downtown Portland parking garage.
Officers responded at 2:30 p.m. Sunday to a report of a person lying on the sidewalk after falling from Alder Street Parking Garage at Southwest 6th Avenue and Washington Street.
Medical personnel arrived and declared the person deceased. Police did not say whether the person was a man or a woman. At 3:55 p.m., traffic was still blocked on Southwest 6th Avenue from Alder to Washington streets as the investigation continued.
TriMet buses were being let through, and police expect to clear the area within the next few hours.
Portland Police Bureau spokesman Pete Simpson said the medical examiner will examine the body to determine the nature of the incident. Police will also view any surveillance video available from businesses in the area to determine if the person jumped, fell or was pushed.
Nobody was seen leaving the garage at the time of the incident however Simpson said it was mostly empty with few people coming and going throughout the day.
--
; Twitter: |
Inspired by the free-standing kitchen pocket knife silestone Shaping
We present an innovative free standing kitchen, which began at the Milan Design Week 2012. The design of the famous duo of designers Fernando and Humberto Campana from Brazil was created in cooperation with Cosentino Group. Shaping Silestone offers a variety of uses. Was inspired by the unique shape of a Swiss Army knife.
Autonomous multi cuisine offers a unique combination of sculptural aesthetics, technology and functionality Dar. Although it seems strange and extraordinary, it is suitable for daily use in every kitchen. The modular furniture exclusive Campana consists of three axes and combines three cooking zones in a concept brothers, but should the right place.
Multifunctional kitchen in view of swiss army knife
The exclusive design of kitchen furniture transforms the space into a multi-functional living space. Was equipped with free-standing kitchen counter, a stove, a table and a sink. Elements of the facility include ® work surfaces and built Silestone by Cosentino ® Integrity sink. "Silestone ®" is an innovative material made from natural quartz and is distinguished by special characteristics -. Strong spots, shock and scratches, and low Flüssigkeitsabsorbtion The material is particularly suitable for use in kitchens.
New generation systems kitchen
The front panels of the old walnut high quality underline the exclusivity of the kitchen. The exceptional aesthetics, it is an eye-catcher in any room and is perfect for culinary experimentation.
The room design Campana brothers
Cosentino Group - a company that specializes in the production of recycled quartz stone surfaces, and worked with the Campana brothers for the second time the two artists live, work and São Paulo cooperate with many furniture manufacturers worldwide fame. Their design objects stängige Aussstellungsstücke in modern art museums and received numerous awards.
Designed in the same style chairs complete the design of the image
Modern kitchen with rotating page Summary
Integrity sink Cosentino ®
Modular
Silestone ® work surfaces
The natural quartz surfaces are characterized by low Flüssigkeitsabsorbtion
Leave a Reply
Your email address will not be published. Required fields are marked *
Comment
Name *
Email *
Website
About
A very warm welcome to OfDesign.net Interior Design, your one-stop portal for all things design related!
OfDesign is the ultimate home of interior design and our progressive mission is to continue growing our portal into the be-all and end-all of interior design, through the provision of design samples, ideas, photos and other useful information to streamline your interior design process or to give you some much-needed inspiration. We have it all -- if you don't find it here, you won't find it anywhere. |
Manager lands attacking target
Neal Ardley has beaten off competition from other clubs to bring Alfie Potter back for a third spell at Wimbledon.
The 26-year-old winger has joined on a permanent basis after leaving Oxford United and Neal Ardley believes he has made a “fantastic signing” who will excite Dons fans once he recaptures top form.
Alfie certainly knows all about Wimbledon as his first association with the club came as an eight-year-old youth team player and he later had a loan spell here when Terry Brown was manager in 2008.
Speaking during an interview with Rob Cornell for Dons Player, Neal Ardley said that he worked tirelessly in the last two weeks to bring Alfie back to the Dons with other clubs having also shown an interest.
“It’s been hard work, but we’re delighted to announce that we’ve signed Alfie on a permanent deal,” said Neal. “It’s been a tough week to try and get both signings we’ve made over the line. There were three or four clubs interested. The signing is announced today, but the hard work has gone on for two weeks prior to this.
“We were looking for a wide player because we only have George Francomb and Sean Rigg at the moment. They’ve both worked really hard this season. We wanted someone who could work a bit of magic; a player who could run with the ball and take players on. Alfie fits into that category. When you read what his former manager said it can be the right time to move on and have a fresh start.
“My job is to get Alfie’s confidence back and get him sparkling again. If I can do that then we will have a very exciting player. With all of our wide players I tell them to take risks; they have to get on the ball and make things happen. That’s what I will be telling Alfie. If we can get Alfie enjoying his football again and back to his best then he will be a fantastic signing.”
Alfie made his Football League debut with Peterborough United, but he had to reignite his career in non league. In 2008, his talents were rewarded with an FA Cup player of the round award after he starred for Havant & Waterlooville in their memorable defeat at Liverpool.
Following loan spells at several non league clubs, Alfie left Peterborough to join Oxford after helping the U’s to promotion into the Football League while on loan. Alfie made almost 200 appearances for Oxford United, scoring 28 goals in total. |
Simultaneous determination of seven alkaloids from Rhizoma Corydalis Decumbentis in rabbit aqueous humor by LC-MS/MS: Application to ocular pharmacokinetic studies.
This study aims to establish a fast and sensitive LC-MS/MS method for simultaneous determination of seven alkaloids from Rhizoma Corydalis Decumbentis in rabbit aqueous humor. Aqueous humor samples were processed by protein precipitation and then separated on a Thermo Syncronis C18 column (50mm×2.1mm, 5μm) with a mobile phase using acetonitrile-0.05% formic acid (28:72, v/v). Detection of the analytes and the internal standard (coptisine) were performed in positive electrospray ionization with selected reaction monitoring. The method showed good linearity (r>0.9931) for all the seven alkaloids. This fully validated method was applied to the studies of aqueous humor pharmacokinetics of seven alkaloids from Rhizoma Corydalis Decumbentis and the effects of borneol on corneal penetration of these alkaloids into aqueous humor. This is the first work that presents a reliable LC-MS/MS method for simultaneous determination of seven alkaloids in rabbit aqueous humor and its application of ocular pharmacokinetics of seven alkaloids from Rhizoma Corydalis Decumbentis. |
A Comparison Between Plastic and Metallic Biliary Stent Placement in Patients Receiving Preoperative Neoadjuvant Chemoradiotherapy for Resectable Pancreatic Cancer.
The optimal stent type in patients receiving preoperative neoadjuvant chemoradiotherapy (NACRT) is uncertain. The present study aimed to compare the clinical effectiveness of biliary metallic stent (MS) and plastic stent (PS) in patients undergoing preoperative NACRT for resectable pancreatic cancer. This retrospective study included 43 patients who required either biliary MS or PS before initiating NACRT for resectable or borderline resectable pancreatic head cancer. Seventeen patients had MS (MS group), while 23 patients had PS (PS group). All patients received preoperative NACRT, including gemcitabine and concomitant three-dimensional radiation of 54 Gy, and underwent pancreatectomy. Stent patency, surgery postponement, postoperative outcomes, and cost-effectiveness were compared between these groups. There were no significant differences in baseline demographic or tumor characteristics between the groups. Stent patency was significantly longer in the MS group than in the PS group (p = 0.042). There were no differences in time to surgery, intraoperative characteristics, surgical complications, margin positivity, and pathological response between the groups. Furthermore, the medical cost of maintenance of biliary drainage during NACRT was similar between the groups. MS placement compared to PS in patients receiving preoperative NACRT provided no significant benefits during the postoperative course of pancreatectomy. However, MS placement was associated with long stent patency while showing no economic disadvantage. Therefore, MS placement may be recommended in patients receiving preoperative NACRT for resectable pancreatic cancer. |
Q:
how to replace and add style into specific tag
i have a problem. i can't replace and add inline style css.
i have this
input:
<p style="text-align: justify;"><span style="font-size: 11pt;">hello world<br /></span></p>
<p id="tem" style="text-align: justify;">test</p>
<p > </p>
<p> </p>
and i want this
output:
<p style="text-align: justify;margin:0;"><span style="font-size: 11pt;">hello world<br /></span></p>
<p id="tem" style="text-align: justify;margin:0;">test</p>
<p style="margin:0;"> </p>
<p style="margin:0;"> </p>
i have tried this way demo
$re = "/(<p[^>]+\")([^>\"]+)/miu";
$str = "<p id=\"tem\" style=\"text-align: justify;\"><span style=\"font-size: 11pt;\">hello world<br /></span></p>\n<p style=\"text-align: justify;\">test</p>\n<p > </p>\n<p> </p>";
$subst = "$1$2margin:0;";
$result = preg_replace($re, $subst, $str);
please help me anybody. thanks.
A:
I have solved that:
search by regex pattern ((?<=\<)[^>]+style=")([^>"]+) and replace with $1$2margin:0;
Live demo
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.