text
stringlengths
8
5.77M
Spencer James: I have been taking comedy seriously since Feb 2, 2009, irony intended. I was not taking it very seriously for 2 years before that. I perform a lot on cruise lines right now and Las Vegas. I’m starting to do more Improv’s and Funny Bones around the country and half the time they let me go last. If you’d like to see where they let me do that, click over to shows. Some of my own personal highlights are as follows: I won the “World Series of Comedy” in Las Vegas in 2014 (funnier people had an off night), I co-created a live variety show with Christopher Wiegand called “Plethora” that ran in Denver, CO for 18 months and provided ANY type of performer “better than average” footage for free of their performance. I created a one man show called “How to Hide a Fat Kid,” (acting, not standup), and this year I’ve been selected to perform for Oceania Cruise Lines on their way to Bora Bora in French Polynesia. To follow along on the journey, click on either of these below and say “Hi!” ;) Our comedians are cleaner, funnier and famous. Most have done Dry Bar Comedy specials and are the best in the country. Our venue is BYOB and your ticket includes 2 drinks. We are the cheapest comedy club of this caliber in Texas. There are no additional drink charges or hidden fees. Our shows are 90 minutes in length. We provide 2-free non-alcoholic drinks with every ticket purchase. Our venue is also BYOB (Bring Your Own Booze) - so you may enjoy our show with your own personal favorites. We can provide additional non-alcoholic beverages (mixers), cups, ice and snacks during the show to compliment your experience. Seating is first come, first served. Since this is a small venue, it is best to buy your tickets as early as possible. OUR FEATURE: Kristin Lindner: https://www.summitcomedy.com/k... BOOK NOW: http://www.thesilodistrict.com
Q: Clustered WildFly 10 domain messaging I have three machines located in different networks: as-master as-node-1 as-node-2 In as-master I have WildFly as domain host-master and the two nodes have WildFly as domain host-slave each starting an instance in the full-ha server group. From the as-master web console I can see the two nodes in the full-ha profile runtime and if I deploy a WAR it gets correctly started on both nodes. Now, what I'm trying to achieve is messaging between the two instances of the WAR, i.e. sending a message from a producer instance in as-node-1, consumers in all the nodes should receive the message. This is what I tried: added a topic to WildFly domain.xml: <jms-topic name="MyTopic" entries="java:/jms/my-topic"/> Create a JAX-RS endpoint to trigger a producer bound to the topic: @Path("jms") @RequestScoped public class MessageEndpoint { @Inject JMSContext context; @Resource(mappedName = "java:/jms/my-topic") Topic myTopic; @GET public void sendMessage() { this.context.createProducer().send(this.myTopic, "Hello!"); } } Create a MDB listening to the topic: @MessageDriven(activationConfig = { @ActivationConfigProperty( propertyName = "destination", propertyValue = "java:/jms/my-topic" ), @ActivationConfigProperty( propertyName = "destinationType", propertyValue = "javax.jms.Topic") ) ) public class MyMessageListener implements MessageListener { private final static Logger LOGGER = /* ... */ public void onMessage(Message message) { try { String body = message.getBody(String.class) LOGGER.info("Received message: " + body); } catch (JMSException e) { throw new RuntimeException(e); } } } But when I curl as-node-1/jms I see the log only in as-node-1, and when I curl as-node-2/jms I see the log only in as-node-2. Shouldn't the message be delivered on all the nodes where the WAR is deployed? What am I missing? A: As I've come with the exactly same question - put the answer here. Yes, messages should be delivered to all nodes if a destination is a Topic. With the default configuration ActiveMQ Artemis uses broadcast to discover and connect to other ActiveMQ instances on other nodes (within the same discovery-group): <discovery-group name="dg-group1" jgroups-channel="activemq-cluster"/> <cluster-connection name="my-cluster" discovery-group="dg-group1" connector-name="http-connector" address="jms"/> Still need to ensure that a JNDI name for a jms-topic starts with the "jms" to match the address="jms" in the line above (what is OK in your case: "java:/jms/my-topic") The only thing missed in your example to get it working on all nodes is :<cluster password="yourPassword" user="activemqUser"/> (for sure activemqUser user must be added earlier, e.g. with the addUser.sh script). This let ActiveMQ instances to communicate each other. So called Core Bridge connection is created between nodes. As stated in ActiveMQ manual : ..this is done transparently behind the scenes - you don't have to declare an explicit bridge for each node If everything is OK then the bridge may be found in server.log: AMQ221027: Bridge ClusterConnectionBridge@63549ead [name=sf.my-cluster ...] is connected. Btw, if a destination is a Queue then ActiveMQ will not send a message to other nodes unless a message is not consumed locally. P.s. as answered here this refers to a classic approach to distribute an event to all nodes in a cluster.
The type 3 serotonin (5-HT3) receptor is a ligand-gated ion channel. Pharmacological studies had shown that the 5-HT3-receptor facilitates dopamine (DA) release in the nucleus accumbens (NAc). The 5-HT3-receptor antagonists reduce extracellular DA induced by 5-HT3-receptor agonists, drugs of abuse and by the direct stimulation of dopaminergic neurons. The source of the 5-HT3-receptor that regulates DA release is unknown. Although pharmacological studies suggest that the 5-HT3-receptor may be present in the NAc and ventral tegmental area (VTA), prior anatomical studies have revealed few or no 5-HT3-receptor binding sites in these regions. By using in situ hybridization histochemistry, we detected expression of the functional 5HT3A subunit, but not 5HT3B subunit, in the rat midbrain. The 5HT3A were found in the VTA, parabrachial pigmented nucleus, substancia nigra pars compacta (SNC), substantia nigra pars lateralis (SNL), prerubral field, medial and supra mammillary nucleus, and interpeduncular nucleus (IP). To determine the cellular phenotype of 5HT3A expressing neurons, we used double-labeling techniques and determined that dopaminergic cells express the 5HT3A subunit in the SNC and VTA. In addition, the 5HT3A subunit was found to be expressed in GABAergic neurons located in the substantia nigra pars reticulata, SNL and VTA. The localization of 5HT3A subunit transcripts in dopaminergic neurons suggests that serotonin, through 5-HT3-receptors present in the midbrain, may regulate the release of DA. In addition, expression of the 5HT3A subunit in midbrain GABAergic neurons suggests that serotonin might modulate dopaminergic neuronal activity via 5-HT3-receptors distributed in local GABAergic neurons.
Q: User verification through PHP I have tried to make PHP script using prepared statements in order to avoid SQL injection. Also I created 3 php files. db_connect.php (here are stored all informations for connecting to the database) functions.php (creating session, checking for login attempts, and function login -where I probably have made a mistake but can't find it) process_login.php (a set of the two files above. It also redirects to login_success, error page, or prints Invalid request if no POST variables are sent to this page). In additions is functions.php where probably is the mistake, because i'm getting Invalid request every time I try to insert some value. No matter if the fields are empty or they contain a value from the database user. <?php function sec_session_start() { $session_name = 'sec_session_id'; // Set a custom session name $secure = false; // Set to true if using https. $httponly = true; // This stops javascript being able to access the session id. ini_set('session.use_only_cookies', 1); // Forces sessions to only use cookies. $cookieParams = session_get_cookie_params(); // Gets current cookies params. session_set_cookie_params($cookieParams["lifetime"], $cookieParams["path"], $cookieParams["domain"], $secure, $httponly); session_name($session_name); // Sets the session name to the one set above. session_start(); // Start the php session session_regenerate_id(true); // regenerated the session, delete the old one. } function login($postcode, $ref, $mysqli) { // Using prepared Statements means that SQL injection is not possible. if ($stmt = $mysqli->prepare("SELECT ref_no, postcode FROM customers WHERE ref_no = ? LIMIT 1")) { $stmt->bind_param('ss', $postcode,$ref); // Bind "$email" to parameter. $stmt->execute(); // Execute the prepared query. $stmt->bind_result($dbref,$dbpostcode); // get variables from result. // $stmt->fetch(); $a = array(); while ($stmt->fetch()) { $a = array('ref' => $dbref , 'postcode' => $dbpostcode); } if ($_POST['ref']==$dbref && $_POST['postcode']==$dbpostcode){ // If the user exists // We check if the account is locked from too many login attempts if(checkbrute($ref, $mysqli) == true) { // Account is locked return false; } else { if($dbref == $ref) { // Check if the password in the database matches the password the user submitted. // Password is correct! $ip_address = $_SERVER['REMOTE_ADDR']; // Get the IP address of the user. $user_browser = $_SERVER['HTTP_USER_AGENT']; // Get the user-agent string of the user. if(preg_match("/^[0-9a-zA-Z]{5,7}$/", $_POST["postcode"]) === 0) '<p class="errText">Please enter valid postcode!</p>'; else{ $_SESSION['postcode'] = $postcode;} if(preg_match("/^[0-9]{4,6}$/", $_POST["ref"]) === 0) '<p class="errText">Please enter valid reference number ! </p>'; else{ $_SESSION['ref'] = $ref;} // Login successful. return true; } else { // Password is not correct // We record this attempt in the database $now = time(); $mysqli->query("INSERT INTO login_attempts (ref_no, time) VALUES ('$ref', '$now')"); return false; } } } else { // No user exists. return false; } } } function checkbrute($ref, $mysqli) { // Get timestamp of current time $now = time(); // All login attempts are counted from the past 2 hours. $valid_attempts = $now - (2 * 60 * 60); if ($stmt = $mysqli->prepare("SELECT time FROM login_attempts WHERE ref_no = ? AND time > '$valid_attempts'")) { $stmt->bind_param('i', $ref); // Execute the prepared query. $stmt->execute(); $stmt->store_result(); // If there has been more than 3 failed logins if($stmt->num_rows > 3) { return true; } else { return false; } } } ?> And this is process_login.php where user verification fails. <?php include 'db_connect.php'; include 'functions.php'; sec_session_start(); // if(isset($_POST['postcode'], $_POST['ref'])) { if(login($postcode, $ref, $mysqli) == true) { // Login success echo 'Success: You have been logged in!'; } else { // Login failed header('Location: ./login.php?error=1'); } } else { // The correct POST variables were not sent to this page. echo 'Invalid Request'; } ?> Any help would be most welcome. Thanks. A: You only have one $variable to bind. You are trying to bind two: if ($stmt = $mysqli->prepare("SELECT ref_no, postcode FROM customers WHERE ref_no = ? LIMIT 1")) { $stmt->bind_param('ss', $postcode,$ref); // Bind "$email" to parameter. Only one ? and two bind_param...... Should be: if ($stmt = $mysqli->prepare("SELECT ref_no, postcode FROM customers WHERE ref_no = ? LIMIT 1")) { $stmt->bind_param('s', $ref); // Bind "$email" to parameter. I have not tested this, but here is what i think you need for login function: function login($postcode, $ref, $mysqli) { // Using prepared Statements means that SQL injection is not possible. if ($stmt = $mysqli->prepare("SELECT ref_no, postcode FROM customers WHERE ref_no = ? LIMIT 1")) { $stmt->bind_param('s',$ref); // Bind "$email" to parameter. $stmt->execute(); // Execute the prepared query. $stmt->store_result(); $stmt->bind_result($dbref,$dbpostcode); // get variables from result. while ($stmt->fetch()) { if($stmt->num_rows > 0) { $now = time(); if ($_POST['ref'] == $dbref && $_POST['postcode'] == $dbpostcode) {// If the user exists if(checkbrute($ref, $mysqli) == true) { $mysqli->query("INSERT INTO login_attempts (ref_no, time) VALUES ('".$dbref."', '".$now."')"); return false; } $ip_address = $_SERVER['REMOTE_ADDR']; // Get the IP address of the user. $user_browser = $_SERVER['HTTP_USER_AGENT']; // Get the user-agent string of the user. if(!preg_match("/^[0-9a-zA-Z]{5,7}$/", $_POST["postcode"])) { $mysqli->query("INSERT INTO login_attempts (ref_no, time) VALUES ('".$dbref."', '".$now."')"); $error = '<p class="errText">Please enter valid postcode!</p>'; return $error; } $_SESSION['postcode'] = $postcode; if(!preg_match("/^[0-9]{4,6}$/", $_POST["ref"])) { $mysqli->query("INSERT INTO login_attempts (ref_no, time) VALUES ('".$dbref."', '".$now."')"); $error = '<p class="errText">Please enter valid reference number ! </p>'; return $error; } $_SESSION['ref'] = $ref; return true; } //no rows returned $mysqli->query("INSERT INTO login_attempts (ref_no, time) VALUES ('".$dbref."', '".$now."')"); return false; } //no statement fetched return false; } //no statment prepared return false; } I added this back into the code, but I do not understand the use of it. it is not returned or used in this scope: $ip_address = $_SERVER['REMOTE_ADDR']; // Get the IP address of the user. $user_browser = $_SERVER['HTTP_USER_AGENT']; // Get the user-agent string of the user.
610 S Georgia St, Amarillo Tel: (806) 457-1777 Established in 2001 Accent Roofing of Amarillo is a complete restoration one stop shop for all your roofing needs. Give Accent Roofing a Call to learn how we can help you with your roof today!... read more 1940 E Edinger Ave, Santa Ana Tel: (714) 258-2500 Cunningham Doors & Windows provides quality products competitive pricing and professional installation for new construction and replacement projects in Orange County. We have been family-owned and operated since the business was founded in 1988. We care about your home and want you to be thrilled with the added comfort security energy efficiency and beauty that new windows and doors can bring. Let us make your dream home a reality. We provide free in-home estimates and are dedicated to helping homeowners find the best doors and windows at a reasonable price. We carry a vast assortment of window options including vinyl... read more 1350 N Buckner Blvd #216, Dallas Tel: 2143198400 Foster Exteriors Window Company specializes in providing and installing energy efficient replacement windows in Dallas TX and the surrounding area. We offer homeowners quality materials quality workmanship and reasonable prices. Our customers tell us that they receive good value because we offer the best products and service for the price. We have assembled a cohesive team of expert installers and staff that will assist you at every phase of the process. We have been serving residential customers in the Metroplex since 1987. Foster Exteriors Window Company carries a selection of window products to fit every taste and style. We install... read more 615 North Benson Avenue Unit I, Upland Tel: (909) 949-9902 J.R. Door & Window Inc located in Upland CA is the best place for all of your window entry door and patio door needs. We carry Milgard windows and Therma-Tru doors. Call us today at (909) 949-9902 for your free in-home quote or visit our showroom in Upland CA. Let our decades of knowledge and experience provide you with the very best the windows industry has to offer.... read more 2915 Red Hill Ave Ste B104, Costa Mesa Tel: (714) 434-8650 Sales and installation of new and replacement windows and doors in vinyl fiberglass and wood. Wholesale prices are available to contractors and DIY. Be sure and visit our window and door showroom in Costa Mesa Orange County. After all "You deserve the best." At CALIFORNIA WINDOW & SOLAR the combination of energy efficient windows and solar energy panels is the perfect way to cut that ever increasing energy bill.... read more 534 N Milpas St, Santa Barbara Tel: (805) 564-7600 Quality Windows & Doors has been in business since 1980. In Santa Barbara and surround cities we provide replacement windows patio doors entry doors french doors glass repairs and mirrors. We have two showrooms in Oxnard and Santa Barbara with over 30 employees. We are your one stop shop for all of your windows doors glass and mirrors needs. We provide free in-home consultation or stop by one of our large showrooms.... read more 22613 68th Ave S, Kent Tel: (253) 887-7792 Signature Window & Door Replacement has been providing Kent WA area homeowners with quality window replacement and door replacement services since 1999. We offer a wide variety of window and door products to best serve our customers including vinyl windows wood windows woodclad windows fiberglass windows entry doors french doors and sliding patio doors. With a location in Auburn WA we have serviced thousands of homeowners in the area with quality window and door design and installation. We partner with top manufacturers in the industry including Simonton and Marvin. Let Signature Window & Door Replacement help you select the perfect... read more 516 E 2nd St, Newberg Tel: (503) 554-5500 EnergyGuard Windows & Doors is a family-owned and operated window and door replacement company in Newberg OR. We have over 40 years of knowledge and experience in the window and door industry. We service homeowners in the Newberg Sherwood Beaverton and Portland metropolitan areas. Our window selection includes vinyl aluminum wood and fiberglass options. In addition we carry a variety of entry doors and patio doors. Our experienced designers will help you choose the window and door products to best suit your style and budget. Our business philosophy is ""always put the homeowner's needs before any other"". We educate homeowners... read more 2115 Eastern Ave , MD, Baltimore Tel: (410) 846-1536 WeatherMaster Windows provides quality replacement windows for residential and commercial installation projects in Maryland and Northern Virginia. We are family-owned and operated and specialize in increasing the energy efficiency of homes and commercial buildings by providing the best quality windows at affordable prices. Our window products are built to last a lifetime with the latest energy-saving features. Replacing your windows with WeatherMaster will save you money on heating and cooling bills while also providing a new beautiful look for your home or business. Our trusted team has installed over 182 000 windows since our business opened in 1986. Having proper... read more
396 S.C. 230 (2011) 721 S.E.2d 775 In the Matter of Brian Charles REEVE, Respondent. No. 27050. Supreme Court of South Carolina. Submitted September 13, 2011. Decided October 10, 2011. *231 Lesley M. Coggiola, Disciplinary Counsel, and Sabrina C. Todd, Assistant Disciplinary Counsel, both of Columbia, for Office of Disciplinary Counsel. Brian C. Reeve, of Columbia, pro se. PER CURIAM. In this attorney disciplinary matter, the Office of Disciplinary Counsel (ODC) and respondent have entered into an Agreement for Discipline by Consent (Agreement) pursuant to Rule 21, RLDE, Rule 413, SCACR. In the Agreement, respondent admits misconduct and consents to the imposition of a definite suspension not to exceed two (2) years. Respondent further agrees to pay the costs incurred in the investigation and prosecution of this matter by ODC and the Commission on Lawyer Conduct (the Commission). In addition, he agrees to complete the Ethics School and Trust Account School portions of the Legal Ethics and Practice Program prior to seeking reinstatement. We accept the Agreement and impose a definite suspension of two (2) years. In addition, respondent shall pay the costs incurred in the investigation and prosecution of this matter by ODC and the Commission within thirty (30) days of the date of this order. Respondent shall not seek reinstatement until he has completed the Ethics School and Trust Account School portions of the Legal Ethics and Practice Program. The facts, as set forth in the Agreement, are as follows. *232 FACTS Matter I Respondent was admitted to the South Carolina Bar in 1983. In late 2009, he closed his law office and ceased practicing law. Although respondent initially notified the South Carolina Bar of his change of address, he since moved and failed to update his address with the Bar as required by Rule 410(e), SCACR. Respondent admits violating Rule 410(e), SCACR, and acknowledges that his failure to keep the Bar informed of his current address resulted in him not receiving some of ODC's inquiries in the matters discussed below. Matter II In January of 2002, Complainant A bought a mobile home and land in Laurens County. In May of 2009, Laurens County served Complainant A with a back tax notice for the mobile home. Complainant A contacted Laurens County and was advised that the mobile home was not in Complainant A's name and that Complainant A needed a copy of the title. Complainant A's mortgage company forwarded all closing document to Complainant A, but there was no title for the mobile home. Complainant A contacted respondent's office and was informed that Complainant A's file would need to be pulled from storage. Complainant A communicated with respondent's office directly and, later, through counsel, for several months. Respondent ultimately filed a corrective deed to resolve the issue, but failed to inform Complainant A that he had done so. Respondent admits he did not adequately communicate with Complainant A regarding this issue and closed his office without notice to Complainant A. Respondent responded to ODC's initial inquiry regarding the letter of complaint. On April 15, 2010, ODC forwarded a Notice of Full Investigation to respondent regarding this matter via certified mail. The certificate of receipt was signed for and returned to ODC, but respondent failed to respond to the Notice of Full Investigation. On May 25, 2010, ODC forwarded a Notice to Appear and Subpoena to respondent regarding this matter via certified mail and regular first class *233 mail. Respondent was to appear before ODC on June 17, 2010.[1] Respondent did not appear pursuant to the Notice to Appear and did not send the documentation pursuant to the subpoena. He did, however, appear for an interview on October 6, 2010. Although he answered questions during his interview, he never submitted a written response to the Notice of Full Investigation. Matter III During his practice, respondent was an agent for a title insurance company. The title insurance company filed a complaint against respondent and ODC forwarded the complaint and a Notice of Investigation to respondent. Respondent did not respond to the Notice of Investigation or to a reminder letter sent pursuant to In the Matter of Treacy, 277 S.C. 514, 290 S.E.2d 240 (1982). Respondent also failed to appear for an interview scheduled on June 17, 2010, but did appear for an interview scheduled on October 6, 2010. Although respondent answered questions during his interview, he never provided ODC with a written response to the Notice of Investigation. Thereafter, on two occasions, ODC sent respondent additional information received from the title insurance company and, on both occasions, respondent provided a written response. The title insurance company asserts respondent failed to remit $415.90, representing the company's portion of title insurance premiums on four closings. Respondent submits he believes he remitted all premiums due, but cannot establish payment because he failed to keep his financial records after closing his practice. Respondent submits that he closed his trust account after waiting to ensure all outstanding items had cleared. Matter IV Respondent was the closing attorney on Complainant B's home purchase in 2005. After respondent closed his office, Complainant B determined she needed her file. Complainant *234 B made numerous unsuccessful attempts to locate respondent and her file before filing a complaint with ODC. Respondent did not respond to ODC's Notice of Investigation or to the reminder letter sent pursuant to In the Matter of Treacy, id. Respondent never submitted a written response to the complaint. Respondent appeared for an on-the-record interview on October 6, 2010. During the interview, respondent admitted that, although he was aware Complainant B was trying to retrieve her file, he made no effort to ensure she received her file or its contents. LAW Respondent admits he has violated the following provisions of the Rules of Professional Conduct, Rule 407, SCACR: Rule 1.4 (lawyer shall keep client reasonably informed about status of matter and promptly comply with reasonable requests for information); Rule 1.15(d) (lawyer shall promptly deliver to client or third person any funds or other property that the client or third person is entitled to receive); Rule 1.16(d) (upon termination of representation, lawyer shall take steps to the extent reasonably practicable to protect client's interests, including surrendering papers and property to which the client is entitled); Rule 3.2 (lawyer shall make reasonable efforts to expedite litigation consistent with interests of client); Rule 8.1 (lawyer shall not knowingly fail to respond to lawful demand for information from disciplinary authority); and Rule 8.4(a) (it is professional misconduct for lawyer to violate the Rules of Professional Conduct). In addition, respondent admits he has violated the recordkeeping provisions of Rule 417, SCACR. Respondent admits that his misconduct constitutes grounds for discipline under Rule 413, RLDE, specifically Rule 7(a)(1) (lawyer shall not violate Rules of Professional Conduct or any other rules of this jurisdiction regarding professional conduct of lawyers) and Rule 7(a)(5) (lawyer shall not engage in conduct tending to pollute the administration of justice or to bring the courts or the legal profession into disrepute or conduct demonstrating an unfitness to practice law). *235 CONCLUSION We accept the Agreement for Discipline by Consent and impose a definite suspension of two (2) years. Within thirty (30) days of the date of this order, respondent shall pay the costs incurred by ODC and the Commission in the investigation and prosecution of this matter. Respondent shall not seek reinstatement until he has completed the Ethics School and Trust Account School portions of the Legal Ethics and Practice Program. Within fifteen days of the date of this opinion, respondent shall file an affidavit with the Clerk of Court showing that he has complied with Rule 30, RLDE, Rule 413, SCACR. DEFINITE SUSPENSION. TOAL, C.J., PLEICONES, BEATTY, KITTREDGE and HEARN, JJ., concur. NOTES [1] On June 28, 2010, the Court placed respondent on interim suspension. In the Matter of Reeve, 388 S.C. 175, 695 S.E.2d 172 (2010).
Lehman a 'kindergarten show' next to any default "There is virtually no chance that we'll have any kind of default... the markets understand that the debt ceiling is not going to be catastrophic," says Bill Miller, Legg Mason Opportunity Trust Fund manager, discussing how the government shutdown will likely impact the markets. Stock market traders and investors don't believe the fight over the debt ceiling will result in a U.S. default, closely followed value investor Bill Miller told CNBC on Tuesday, hours after the first government shutdown in 17 years. But if for some reason the federal government didn't pay the interest on the debt, he warned, that "would make Lehman Brothers look like a kindergarten show." "The real issue is the debt ceiling, not the government shutdown," Miller said in a "Squawk Box" interview. The Treasury has set Oct. 17 as the deadline for the nation's borrowing authority to be increased. Miller—portfolio manager of the Legg Mason Opportunity Trust fund—pointed out that the debt ceiling fight in the summer of 2011 resulted in a downgrade of the U.S. by Standard & Poor's. "But that was in conjunction with the European crisis. So we don't have that European crisis now, and there's virtually no chance we'll have any kind of default."
Russia will start supplying Kilo class diesel submarines to Vietnam in 2014, a representative of state-run arms exporter Rosoboronexport said on Friday. The submarines are equipped with "Club-S cruise missile systems," Oleg Azizov said. Russia and Vietnam signed a $3.2-billion contract on the delivery of submarines in December 2009 during the visit of Vietnamese Prime Minister Nguyen Tan Dung to Russia. This is the largest deal in the history of Russian exports of naval equipment. Kilo class submarines, nicknamed "Black Holes" for their ability to avoid detection, are considered to be among the quietest diesel-electric submarines in the world. The submarine is designed for anti-submarine warfare and anti-surface-ship warfare, and also for general reconnaissance and patrol missions. The vessel has a displacement of 2,300 tons, a maximum depth of 350 meters (1,200 feet), a range of 6,000 miles, and a crew of 57. It is equipped with six 533-mm torpedo tubes.
Akazukin Akazukin (赤ずきん?) is the Japanese name of the fairy tale story Little Red Riding Hood. Akazukin may refer to: Akazukin Chacha, shōjo manga series by Min Ayahana Otogi-Jūshi Akazukin, anime series also known as "Fairy Musketeers Little Red Riding Hood" Tokyo Red Hood, seinen manga series by Benkyo Tamaoki, also known as "Tokyo Akazukin"
SABC begins consultations over retrenchments The SABC Board released a statement announcing its intention to retrench about 1 200 out of its 2 400 freelancers, while about 981 out of a total of 3 380 permanent employees are likely to be affected by retrenchments. A picture taken on October 20, 2010 shows the SABC (South African Broadcasting Corporation) headquarters in Johannesburg. South Africa's crisis-hit public broadcaster posted a modest profit in the first six months of the 2010 financial year after a financial meltdown forced a government bail-out last year. AFP PHOTO / STEPHANE DE SAKUTIN (Photo by STEPHANE DE SAKUTIN / AFP) Briefing the Portfolio Committee on Communications on Tuesday, Jonathan Thekiso, SABC Group Executive for Human Resource, said the consultation process was being undertaken in line with the Labour Relations Act, with a view of discussing processes that would unfold in an event that the SABC was left with no alternative but to proceed with retrenchments. “The process has commenced today, the very first consultative session, and our estimation is that the process should be concluded by the end of January. “In the event that the organisation proceeds with retrenchments, the termination of the contracts of employment will be subject to a notice period starting from the beginning of February up to the end of February,” Thekiso said. Over 2000 SABC staff set for the chop The briefing comes not long after the SABC Board released a statement announcing its intention to retrench about 1 200 out of its 2 400 freelancers, while about 981 out of a total of 3 380 permanent employees are likely to be affected by retrenchments. Thekiso said the consultation process is being overseen by the Commission for Conciliation, Mediation and Arbitration (CCMA) and that talks will seek to find a consensus on finding ways to avoid or minimise retrenchments; considering assistance to affected employees, including offering counselling; and indicating future re-employment, among others. Section 189 of the Labour Relations Act, Thekiso said, would affect all employees across all divisions, including managers. He said the process of deciding on those that will be affected by retrenchments will be based on skills, experience and expertise. Thekiso said should the SABC have no alternative but to terminate services of employees, it proposed paying severance pay of one week’s salary per completed year of service, in accordance with the guidelines of the Basic Conditions of Employment Act. SABC is overstaffed Thekiso said the public broadcaster’s wage bill was unsustainable when compared to total revenue. “Our analysis at this stage shows that the SABC is overstaffed… [There is] an expression of maladministration where in the past, you had instances of non-performance in particular areas in the business but instead of the organisation addressing non-compliance — where the organisation ought to have mentored, trained and coached until people come up to the competences that we are looking for — instead of management doing those things, they brought on-board freelancers. “So what you found was that a job that ought to be done by one person ends up being done by two [or] three people. In other words, you fragment one position to be done by three people, inflating the remuneration bill,” said Thekiso. He said 43% of overall revenue was currently being spent on the wage bill. Some of the measures that the SABC has considered before contemplating Section 189 of the Labour Relations Act include cancelling catering for meetings, no hiring of external venues for meetings, limiting of attendance for workshops and conferences and limiting of printing material. Group CEO Madoda Mxakwe said as part of its cost-cutting drive, the public broadcaster has had to review spending in several areas, including sports broadcasting rights and marketing. Chris Maroleng, the SABC’s Chief Operating Officer, said operationally, the SABC is looking at reducing discounts that have been given to advertisers with the aim of bolstering revenue, while at the same time, the use of consultants in favour of utilising internal capacity was being reviewed.
Warner Bros. Entertainment CEO Kevin Tsujihara participated in a lunchtime keynote interview at the USC Gould School of Law on Saturday and talked briefly about their DC Comics properties. According to The Hollywood Reporter, Tsujihara said that the lack of superhero movies at Warner Bros. other than the Superman and Batman franchises had been a “missed opportunity.” He added, however, that the studio has “huge plans for a number of other DC properties on TV.” He specifically addressed Wonder Woman: “We need to get Wonder Woman on the big screen or TV.” Will we get the Wonder Woman TV series “Amazon” on The CW? Is Wonder Woman part of Zack Snyder’s Superman/Batman movie, as was rumored last month? Or would she get her own movie? We’ll have to wait and see what’s in store for Diana. In the meantime, you can check out a fan film of what Wonder Woman could look like on the big screen.
Now, New York loses their deputy entertainment editor and Vulture scribe Willa Paskin to Salon, to be their TV critic. Here is a map: When asked for hyperbolic plaudits about his freshest poaching kill, Salon chief Kerry Lauerman told The Observer over email: Willa was actually a star intern for us in 2006-2007, and I’ve followed her writing ever since, especially her terrific work at Vulture. When the position opened up, she was a natural person to approach, and I was thrilled when she accepted. The great thing about Willa is her range — she’s got a wonderfully curious mind, a compelling voice, knows how to report, and is a great interviewer — and we hope to employ her multiple talents to full effect. Criticism will be a big part of her role, but not the only one. See! Media internships do get people jobs. Lauerman also pointed to the inclusion of Paskin—before New York, a Radar and BlackBook editor—on this recent ThinkProgress list via his own Salon blog about women the media should be employing more. See! Making ostensibly frivolous link-baity media lists do get people jobs!
DESCRIPTION: (Applicant's Abstract) Methamphetarnine abuse in conjunction with sexual activity is now epidemic among homosexual and bisexual males. We propose an investigation of the efficacy of two promising putative stimulant abuse pharmacotherapies, desipramine and sertraline, as abstinence facilitation treatments for metharnphetamine (MAMPH) dependence in a sample of homosexual and bisexual males with symptomatic AIDS. The pharmacotherapies will be applied as adjunctive treatment linked to a medical care clinic for AIDS. The investigation will employ a placebo controlled, double-blind, random assignment, three cell parallel group design that will assess 120 subjects during 12 week's of experimental treatment, with follow-up at 1, 3 and 6 months. We hypothesize that subjects on active desipramine or sertraline, but not placebo, will evidence: 1. Decreased MAMPH abuse severity, operationalized as a decrease in MAMPH use on quantitative GCMS in urine and on self-reported amounts and frequency of use, as increased control over MAMPH craving and as increased durations of abstinence and retention in drug treatment. 2. Increased utilization of medical services for AIDS, operationalized as increases on measures of engagement attendance, and compliance with prescribed domains of AIDS medical care. 3. Decreased frequency of high risk sexual behaviors and of drug use in conjunction with sexual activity operationalized as decreases in self-reports of unsafe sexual behaviors and concurrent drug use on sexual behavior assessments.
Q: Discard all changes in Github Desktop (Mac) How to discard all changes in Github desktop (mac), comparing to the latest commit? It is possible to click on one file and select "discard changes". But how to discard all changes in files? A: Just in case anyone is interested, it can be done via GitHub's Menu Bar: Repository/Discard changes to selected files. A: Right click on any file and you'll find the option to 'Discard All Changes':
Passion Natural Water-Based Lubricant - 55 Gallon I'm a particle physics PhD working at CERN, on the Large Hadron Collider. We try to keep all 27 kilometers tunnels as slippery as possible at all times, on the theory that if the hadrons are already going close to lightspeed, maybe that will help push them over the edge. We make sure they're always going downhill, too, and we use fans to give them a boost. The fans dry out the lube some, which is why I can only give it 4 stars, but 27 kilometers is an awful lot of tunnel, and 55 gallons is an awful lot of lube. more
Warning Please note that hillwalking when there is snow lying requires an ice-axe, crampons and the knowledge, experience and skill to use them correctly. Summer routes may not be viable or appropriate in winter. See winter information on our skills and safety pages for more information. Date walked: 31/03/2012 Time taken: 6.5 hours Distance: 14.5 km Ascent: 1207m Register or Login free to be able to rate and comment on reports (as well as access 1:25000 mapping). For some things there’s a price to be paid; endure the pain to enjoy the gain; you’ve got to pay upfront. A’Chralaig epitomises every aspect of such a sentiment. A guidebook simply sums up the first stage as “climb steeply up grassy slopes for 500m.” Sounds simple doesn’t it. But as you sit in the car trying to trace a line or identify a path wending its way up that very same grassy slope it ain’t very pleasing to the eye. There are no sweeping zig-zags or gentle gradients to carry you easily uphill. Loch Cluanie and the South Shiel Ridge Instead, less than a hundred metres or so from the road, a series of bucket steps, one on top of the other, are stacked in an unrelenting, unremitting almost never-ending pile for the requisite height. Forget rhythm and forget pace. These bucket steps jumble short and long, wet and dry, grass and rock, firm and soggy. So, get your mind into another place, try doing the alphabet backwards, recall the words to Bohemian Rhapsody or work out why you spent £400 on a season ticket for Doncaster Rovers this year. Some will prove easier than others, but they’ll all be easier than the hour or so it’ll take you to get the steep stuff above you. But the angle does relent and with a sigh of relief (if there’s any breath left) you can welcome the end of the torture. Ahead, the whaleback of A’Chralaig rises in gentle steps; relief after the drudgery of below, but in itself it still belies and masks the pleasure to come. Upper slopes of A'Chralaig But in these curious times I shouldn’t have been surprised to lose visibility just a couple of hundred feet from the top. The early rainbows from showers heading up from the coast were now replaced by full on snow that obliterated any view that could have been enjoyed. Final slopes of A'Chralaig However this hill, and it’s neighbour Mullach Fraoch choire,are nothing if not tantalising, taunting and teasing. The path heads down into more mist until gradually, as the slope begins to level out, the snow eases and the view along the route ahead emerges. The outline of a swooping rollercoaster becomes crisper, culminating in a serrated crest that leads to the apparently precarious top of Mullach Fraoch choire. Bring it on. Mullach Fraoch choire emerges from the mist For those of a nervous disposition, be assured: its bark is worse than its bite. What appears as a teetering edge after Stob Coire na Cralaig is nowhere near as vertiginous as feared, and the challenging coxcomb of the final ridge is met with a weaving in, out and around the pinnacles rather than a vertigo-inducing up and teetering over. The summit cairn and shelter comes far too quickly; it’s a good job they’ve got to be repeated in reverse to get back to the point where a descent into Coire Odhar can begin. Summit cairn and shelter of Mullach Fraoch choire The shelter provides plenty of scope for escaping the wind and establishing a sun-trap corner in bizarrely surreal surroundings. It’s rare I spend so long on the top as I did here, savouring the views, the position and the boundless opportunities for more visits in the future. I still can’t fathom why, for so many years back in the 70s and 80s I just belted up the A87 on the way to Skye with absolutely no thought of stopping: what riches were missed. Loch Affric from Mullach Fraoch choire A'Chralaig from Mullach Fraoch choire After dropping into Coire Odhar, be advised to keep the deep-cut water channels to your right if the paths or tracks have become too indistinct. Whatever the preceding weather I suspect this area will forever be damp. As the water struggles to decide which water course it’s going to follow it hangs around. While waiting to decide between Fionngleann or Caorann Mor it congregates, gathers and puddles on land with a gradient that can barely make it flow: the perfect bog. Once out of this and heading back to Cluanie, the pace can pick up and enjoyment return. And when the steep profile of that initial slope begins to dominate your left-hand horizon you can breathe a sigh of relief. “Thank God I don’t have to do that again” is the first thought that springs to mind. Then the recent memory of those final ridges and the views down into Affric and that determination is already beginning to melt away. Some things are a price worth paying. old danensian wrote:So, get your mind into another place, try doing the alphabet backwards, recall the words to Bohemian Rhapsody or work out why you spent £400 on a season ticket for Doncaster Rovers this year. Some will prove easier than others, but they’ll all be easier than the hour or so it’ll take you to get the steep stuff above you. Could have been worse - could have been a season ticket for Dunfermline Athletic. Zero home wins so far this season. Reason we are going down! Fortunately I gave that expenditure up some years back! Aye great report OD !Still got these two to climb myself, and been eyeing them up more and more.........from the Cluanie trio yesterday and on the map over the weekend whilst listening to Iain Watson's account from the friday.Great meeting you,cheers the noo,
No place is more Miami than the Miami River. Its mouth, which empties into Biscayne Bay, was the cradle of the indigenous Tequestas and birthplace of the modern city. Today a combination of creaky, rusty cargo haulers and luxury megayachts gurgles up the waterway. River Yacht Club's manicured lawn filled with crisp white tables and chairs is the perfect place to see it all happen as the Brickell skyline rises before you. In the meantime, you never know what you'll find upon opening the menu, which seems to drastically change every three months. At one point, it was Philippe Ruiz, formerly of the Biltmore's Palme d'Or, running things. Shortly after that, it was the now-rebranded Vagabond's Alex Chang. Most recently, it's a refined Japanese concept called Dashi overseen by Shuji Hiyakawa, former executive sushi chef of Kuro at the Seminole Hard Rock. This is one club worth squeezing inside. When Panther Coffee alum Camila Ramos announced the opening of her own java shop, we knew it would be something special. Nestled downtown between the Corner and Fooq's, her bright, expansive space is a welcome addition to the neighborhood's club-dominated scene. Inside, a simple neon board shows All Day's coffee varieties, including pour-overs ($5) and cortados ($4.25), along with more distinct brews such as Thai iced coffee with xocolatl mole bitters ($5) and a nitrogen-infused Brooklyn brew by Toby's Estate Coffee ($5.50, $7.50, or $9.50). Coffees come wet or dry, which is a sophisticated way of saying creamy milk versus a cap of froth. Curb your hunger with small and large bites such as French toast, soft-scrambled eggs, house-made pastries, and pan con croqueta ($10), a sandwich stuffed with ham croquetas, Gouda cheese, egg spread, and pickles. There is a food truck for almost everything: tacos, burgers, French fries, and doughnuts. Now there is one for coffee. Miami-based wholesale coffee purveyor Relentless Roasters is behind one of Miami's newest food truck concepts: cold-brew coffee on wheels. At C.B. Station, short for "Cold Brew Station," java is iced and put on wheels. Find a variety of flavor pairings made with two bases. Awaken and its sister brew, Awaken Nitro, which offers a creamier consistency similar to a Guinness beer, are blended with sundry ingredients, creating flavors such as raspberry-lemonade, an Arnold Palmer variety, and a classic milk-and-cream version. The truck serves two sizes — 12 and 16 ounces — priced between $4 and $5. To find out where the truck is parked, check its Instagram page. Opened a little more than a year ago, Vice City Bean caffeinates Miami's not-so-sleepy Omni neighborhood. The café was founded by Roland and Eva Baker, who moved from Los Angeles, where they had recognized and enjoyed the sophisticated coffee culture. It's a perfect place to sip a cup of joe after a poolside live music session at the Filling Station Lofts or meandering through the stalls at the Miami Flea. Large street-facing windows fill the industrial space with warm light. It's located within walking distance of Wynwood's kaleidoscopic murals, but this café's vibe is far less pretentious than anything you'll find over there. An easygoing vibe fills the space and local artists' illustrations hang on the walls. There's plenty of seating for anyone to buckle down with a laptop for a few hours. The menu includes everything from crisp empanadas to rooibos tea latte. The highlight, though, is the specialty coffee from Madcap Roasters of Grand Rapids, Michigan. While the rest of America goes to Starbucks, Miami heads to its neighborhood Cuban spots. Of course, born-and-bred South Floridians will always have a difficult time deciding on their favorite ventanita, but it comes down to who makes the best coffee: the strongest cortadito, the most authentic cafecito, or the smoothest café con leche. If it's the last you're searching for, look no further than Tinta y Café, a tiny Coral Gables coffee shop and eatery open from 7:30 a.m. to 7:30 p.m. Monday through Saturday. Located on Ponce de Leon Boulevard, it's a small slice of home for anyone who wanders in from the street to relax. You can sit in the lounge space, adorned with mismatched furniture, or line up at the outdoor window. Inside, a small bar peddles all manner of caffeine, including a version of the cortadito made with evaporated milk ($2.25) or without ($2). It's like café con leche on steroids. But it's the traditional café con leche ($2.95 to $3.25 depending upon size, plus 60 cents extra for a double shot) that's won the hearts of many. Maybe it's the perfect balance of dense foam and warm, creamy milk that mellows out the dark, rich flavor of the espresso. The final touch: expertly crafted leaf- or heart-shaped latte art so beautiful it's a shame to ruin it with your first sip. This light, airy juicery is all about the positive vibes. If you forget to turn your frown upside down before entering, an array of inspirational signs will remind you. And if all else fails, the prices are sure to put a smile on your face. Cold-pressed juices in a rainbow of hues cost only $8 each — maybe Miami's tastiest cheap drink. Try the Got the Beet, an infusion of beet, carrot, celery, apple, and lemon. Down the Love Potion #9, a concoction of pear, pineapple, beet, chia, and ginger. Or sip the Essential, a verdant mix of green apple, cucumber, celery, kale, spinach, ginger, lemon, and spirulina. And liquid magic isn't the only thing on the menu. Smoothies ($8) contain exotic ingredients such as dragon fruit and maca. Check out a zoodle (zucchini noodle) bowl ($9.50), avocado toast ($5.50), green vegetable soup ($4.50), or a superfood salad ($9.50). The juice bar is open Monday through Friday from 9:30 a.m. to 6:30 p.m. and Saturday from 9:30 a.m. to 4:30 p.m. At Roots, you'll drink the rainbow, eat the rainbow, live the rainbow. Despite the growing number of vegan bodybuilders and cruelty-free athletes, some people are still under the impression that plant-based foods lack protein. That's a myth, however. Just ask Miami Instagram all-stars Vegan Thor and Badass Vegan. If you want to follow in their footsteps and avoid animal products while pumping up your protein intake, Raw Juce's E3 Green Monster smoothie ($13.50) is everything your muscles need. This buffed-up drink is a mashup of pineapple, banana, almond "mylk," green apple, kale, spirulina, E3Live algae, and Vega sport protein, all topped off with chopped almonds, bee pollen, and raw honey (which you can leave off to keep it 100 percent vegan). It's all of the muscle building with none of the artery clogging or animal abuse. It's Sunday morning, and you're still a little drunk from the night before. As you peel yourself from the bed, you're amazed that this zombie-like husk of a body still holds a beating heart. There's one thing that can cure all your ills: a proper bloody mary. So you pull yourself together long enough to make it to the Grove Spot. This tiny Coconut Grove establishment is a locals' secret spot for solid fare and cheap drinks. You sidle up to the bar and order a bloody mary ($9). The first sip of the libation, made with tomato juice, Stoli, and a house-made recipe of spices, brings color flooding to your cheeks. A second sip and you're on your way to becoming a person. As you order another bloody, text your friends to meet you for breakfast here even though it's late: The Grove Spot serves the morning meal daily until 3 p.m. Monday through Friday, you do the whole egg-whites thing. But today is Sunday, and your brunch needs the three s's: soulful, sinful, and Southern. The Local's brunch covers all the bases, from grits to lamb-belly pastrami to a bitter green salad. Every brunch item is upped with decadence (and usually a touch of bourbon for good measure). Take, for example, the French toast made with thick Sally Lunn bread, served with bourbon maple syrup ($13), or a Benedict where the Canadian bacon is replaced by pulled pork and then drizzled with hot sauce and hollandaise ($14). The Local will even up your chicken-and-waffles game with fried chicken and cheddar-rosemary pancakes served with (what else?) bourbon maple syrup ($17). Want more? Top anything with homemade Cheez Whiz or an egg, just because it's Sunday. And forgo the usual lame mimosa and go straight for one of the Local's crafted cocktails. Because real ballers drink whiskey with brunch. Break your morning açai-bowl-and-cold-brew routine. Wagons West specializes in the country breakfast, the kind that has powered the workin' man and woman through hours of backbreaking labor for decades, if not centuries. And you've got to be eager to get it. This Pinecrest spot begins filling up shortly after opening around sunrise, and asserting your place in line is the only way to get a table. Once you're seated, the job is far from over. Will it be twin pork chops with a pair of eggs and crisp hash browns ($15.25) or perhaps the catfish and eggs ($14.25) on the so-called lighter side? "What'll it be, hon?" a bespectacled waitress in a bright-pink shirt calls to you while passing your booth. Make up your mind, and quick, because everyone here has somewhere to be. Warm and doughy, with a slightly crisp exterior and a thick smear of cream cheese, these New York-style bagels are close to perfect. Roasters 'n Toasters boasts four locations across Miami-Dade: Pinecrest, Aventura, Miami Beach, and the Falls. This deli has been whipping up fresh, flavorful rings of dough that are not at all chewy since the '80s. Taste aside, they also happen to be ridiculously cheap, about $1.55 each, but prices double with the addition of a chunky coating of cream cheese. Make it a meal by ordering a nova platter ($14.50), where slices of smoked salmon, onion, and capers are layered on a bagel, giving it a little more oomph. A small brown box is left on your front doorstep. Inside the package awaits an assortment of chocolate chip cookies, double-chunk brownies, colorful macarons, and maybe even a chocolate-covered cannoli. No, you're not dreaming. It's from Jarly, a Miami-based startup that each month delivers a box of baked goods to your home. Through Jarly, customers can choose one of two subscription plans: a box delivered once a month ($20) or twice a month ($40), plus a $5 delivery fee. Each box is filled with five to seven items from a different featured baker each month. Every treat is prepared fresh that day — and Jarly suggests they be eaten within three to four days. Previous boxes have included dark-chocolate cookies, red velvet cupcakes, pistachio crisp muffins, honey cakes, triple-chocolate brownies, and sweet and soft blueberry scones. Best Restaurant for Out-of-Towners: River Yacht Club We use cookies to collect and analyze information on site performance and usage, and to enhance and customize content and advertisements. By clicking 'X' or continuing to use the site, you agree to allow cookies to be placed. To find out more, visit our cookies policy and our privacy policy.
Q: Playing with Java Final variables - explanation needed - code provided If you run the below code snippet, you will get this output for the final variable X and Y. X = 1 Y = 2 X = 4 Y = 5 Its obvious from the output, the final variables have been reassigned. I am wondering, if it has violated the contract of Java Final variables. Any thoughts? public class FinalVariablesTest { private final int x; private final int y; public FinalVariablesTest() { this.x = 1; this.y = 2; } public FinalVariablesTest(int xValue, int yValue) { this.x = xValue; this.y = yValue; } public int getX() { return x; } public int getY() { return y; } public static void main(String...strings) { FinalVariablesTest finalVariablesTest = new FinalVariablesTest(); System.out.println(" X = "+finalVariablesTest.getX() + " Y = "+finalVariablesTest.getY()); finalVariablesTest = new FinalVariablesTest(4,5); System.out.println(" X = "+finalVariablesTest.getX() + " Y = "+finalVariablesTest.getY()); } } A: No, this is not a violation - There are two separate instances, and each has different final values bound to x and y. You have changed the instance referenced by finalVariablesTest.
1. Field of the Invention The present invention relates to a solid electrolytic capacitor and a production method thereof. 2. Related Background Art A conventional solid electrolytic capacitor is a chip solid electrolytic capacitor, for example, as described in JP No. 2006-80423A. This conventional chip solid electrolytic capacitor is provided with the following two lead frames: an anode lead frame to which anode portions of capacitor elements are joined and which is provided with anode terminal portions for mounting; and a cathode lead frame to which cathode portions of the capacitor elements are joined and which is provided with cathode terminal portions for mounting. This chip solid electrolytic capacitor uses the lead frames for converting the two-terminal capacitor elements with a pair of anode terminal and cathode terminal into a multi-terminal configuration, thus enabling multiterminal connections when mounted on a board. A direction of an electric current flowing in the anode lead frame is opposite to a direction of an electric current flowing in the cathode lead frame, thereby achieving reduction in ESL.
November 08, 2017 posted by Jared McNeill Since the last update, we've made a number of improvements to the NetBSD Allwinner port. The SUNXI kernel has grown support for 8 new SoCs, and we added many new device drivers to the source repository. Supported systems Device driver support In addition to the countless machine-independent device drivers already in NetBSD, the following Allwinner-specific devices are supported: Audio codec The built-in analog audio codec is supported on the following SoCs with the sunxicodec driver: A10, A13, A20, A31, GR8, H2+, H3, and R8. Ethernet Ethernet is supported on all applicable Allwinner SoCs. Three ethernet drivers are available: Fast Ethernet MAC (EMAC) as found in A10 and A20 family SoCs Gigabit Ethernet MAC (GMAC) as found in A20, A31, and A80 family SoCs Gigabit Ethernet MAC (EMAC) as found in A64, A83T, H2+, and H3 family SoCs Framebuffer Framebuffer console support is available wherever it is supported by U-Boot using the simplefb(4) driver. Thermal sensors Thermal sensors are supported on A10, A13, A20, A31, A64, A83T, H2+, and H3 SoCs. CPU frequency and voltage scaling On A10, A20, H2+, and H3 SoCs, dynamic CPU frequency and voltage scaling support is available when configured in the device tree. In addition, on H2+ and H3 SoCs, the kernel will automatically detect when the CPU temperature is too high and throttle the CPU frequency and voltage to prevent overheating. Touch screen The touch screen controller found in A10, A13, A20, and A31 SoCs is fully supported. The tpctl(8) utility can be used to calibrate the touch screen and has been updated to support standard wsdisplay APIs. Other drivers A standard set of devices are supported across all SoCs (where applicable): DMA, GPIO, I2C, interrupt controllers, RTC, SATA, SD/MMC, timers, UART, USB, watchdog, and more. U-Boot A framework for U-Boot packages has been added to pkgsrc, and U-Boot packages for many boards already exist. What now? There are a few missing features that would be nice to have: Wi-Fi (SDIO). There are a lot of different wireless chips used on these boards, but the majority seem to be either Broadcom or Realtek based. We recently ported OpenBSD's bwfm(4) driver to support the USB version of the Broadcom Wi-Fi controllers, with an expectation that SDIO support will follow at some point in the future. driver to support the USB version of the Broadcom Wi-Fi controllers, with an expectation that SDIO support will follow at some point in the future. NAND controller. Most boards have eMMC and/or microSD slots, but this would be really useful for the CHIP / CHIP Pro / PocketCHIP family of devices. 64-bit support for sun50i family SoCs Readily available install images. A prototype NetBSD ARM Bootable Images site is available with a limited selection of supported boards. More information
/* Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package org.apache.flex.forks.batik.dom.svg; import java.util.Iterator; import java.util.LinkedList; import org.apache.flex.forks.batik.anim.values.AnimatableValue; /** * An abstract base class for the <code>SVGAnimated*</code> classes, that * implements an {@link AnimatedAttributeListener} list. * * @author <a href="mailto:cam%40mcc%2eid%2eau">Cameron McCormack</a> * @version $Id: AbstractSVGAnimatedValue.java 490655 2006-12-28 05:19:44Z cam $ */ public abstract class AbstractSVGAnimatedValue implements AnimatedLiveAttributeValue { /** * The associated element. */ protected AbstractElement element; /** * The namespace URI of the attribute. */ protected String namespaceURI; /** * The local name of the attribute. */ protected String localName; /** * Whether there is a current animated value. */ protected boolean hasAnimVal; /** * Listener list. */ protected LinkedList listeners = new LinkedList(); /** * Creates a new AbstractSVGAnimatedValue. */ public AbstractSVGAnimatedValue(AbstractElement elt, String ns, String ln) { element = elt; namespaceURI = ns; localName = ln; } /** * Returns the namespace URI of the attribute. */ public String getNamespaceURI() { return namespaceURI; } /** * Returns the local name of the attribute. */ public String getLocalName() { return localName; } /** * Returns whether this animated value has a specified value. * @return true if the DOM attribute is specified or if the attribute has * an animated value, false otherwise */ public boolean isSpecified() { return hasAnimVal || element.hasAttributeNS(namespaceURI, localName); } /** * Updates the animated value with the given {@link AnimatableValue}. */ protected abstract void updateAnimatedValue(AnimatableValue val); /** * Adds a listener for changes to the animated value. */ public void addAnimatedAttributeListener(AnimatedAttributeListener aal) { if (!listeners.contains(aal)) { listeners.add(aal); } } /** * Removes a listener for changes to the animated value. */ public void removeAnimatedAttributeListener(AnimatedAttributeListener aal) { listeners.remove(aal); } /** * Fires the listeners for the base value. */ protected void fireBaseAttributeListeners() { if (element instanceof SVGOMElement) { ((SVGOMElement) element).fireBaseAttributeListeners(namespaceURI, localName); } } /** * Fires the listeners for the animated value. */ protected void fireAnimatedAttributeListeners() { Iterator i = listeners.iterator(); while (i.hasNext()) { AnimatedAttributeListener listener = (AnimatedAttributeListener) i.next(); listener.animatedAttributeChanged(element, this); } } }
/* This procedure is non-destructive. It performs the following operations: 1) create_privileges Creates a new table where typical read/write/admin privileges are represented as constants, with a unique ID expressed as a 64 bit unsigned integer suitable for bitwise operations, and the name of the privilege as varchar for readability. Privileges will be used both by namespace-related roles, and repository-related roles. 2) create_namespace_roles Creates a new table where user roles related to namespaces are represented as constants, with a unique ID expressed as a 64 bit unsigned integer suitable for bitwise operations, a privileges field representing the sum of permissions this role allows, and the name of the namespace role as varchar for readability. These roles match all of the previously designed roles, save for sysadmin - as the latter is not bound to a specific namespace but to the repository (see next step). 3) create_repository_roles Creates a new table where user roles related to the repository in general are represented as constants, with a unique ID expressed as a 64 bit unsigned integer suitable for bitwise operations, a privileges field representing the sum of permissions this role allows, and the name of the repository role as varchar for readability. There are only two repository roles available at the time of writing: user and sysadmin. 4) create_user_namespace_roles Creates a table expressing the relationship between users and namespaces, by composite user-namespace id, and a role field expressing the sum of roles a given user has on a given namespace. The available roles reference the namespace_roles table. 5) pre_populate_user_namespace_roles Pre-populates the table by filling in the user-namespace ids for each user-namespace association present in the user_role table. 6) populate_user_namespace_roles Populates the actual roles by iterating over the user_role table and computing the role number for each user-namespace association. This is, by far, the most complex operation as the user_role table expresses the roles in multiple records, while the user_namespace_roles will only have one record per user-namespace association, hence an explicit cursor is required. Once this procedure has finalized, one can run the debug_user_namespace_roles procedure optionally, in order to create a debug table that displays user-namespace role relationships in human-readable form. The debug table itself is populated on-demand only, and serves no othe purpose than verifying data consistency after running the procedure. 7) create_user_repository_roles Creates a table expressing the roles users have on the repository. The standard user role is implied at this time, and does not require a record (so this table will NOT be populated with a row per every repository user). The current functionality of this table will be to list users with the sysadmin repository role. Therefore, it will be populated by collecting records from the user_role table where the user has the SYS_ADMIN role. At application level, checks for sysadmin role will query the table AND the role, not just the presence of a record for a given user, so in the future, if there are other repository roles, the business logic will remain as is. The population of the table data is in the same procedure. Notes: a) Some role names will change for harmonization, e.g. the TENANT_ADMIN role becomes namespace_admin, etc. 8) add_workspace_id_and_populate Adds a new column "workspace_id" to the namespace table and populates it with the former tenant_id from the tenant table. */ # 1) create_privileges drop procedure if exists create_privileges; create procedure create_privileges() begin declare privileges tinyint; set privileges = ( select count(*) from information_schema.TABLES where TABLE_NAME = 'privileges' ); if (privileges = 0) then # creates the table create table privileges ( # privilege value is a power of 2 privilege bigint not null primary key unique check ( privilege & (privilege - 1) = 0 ), name varchar(64) not null unique ); # populates with "harmonized" values insert into privileges values (1, 'readonly'); insert into privileges values (2, 'readwrite'); insert into privileges values (4, 'admin'); end if; end; call create_privileges(); # 2) create_namespace_roles drop procedure if exists create_namespace_roles; create procedure create_namespace_roles() begin declare namespace_roles tinyint; set namespace_roles = ( select count(*) from information_schema.TABLES where TABLE_NAME = 'namespace_roles' ); if (namespace_roles = 0) then create table namespace_roles ( # role is a power of 2 role bigint not null primary key unique check ( role & (role - 1) = 0 ), name varchar(64) not null unique, privileges bigint not null default 0 ); # populates with "harmonized" values # model_view has read privilege insert into namespace_roles values (1, 'model_viewer', 1); # model_write etc. have read/write privileges, aka 1 + 2 == 3 insert into namespace_roles values (2, 'model_creator', 3); insert into namespace_roles values (4, 'model_promoter', 3); insert into namespace_roles values (8, 'model_reviewer', 3); insert into namespace_roles values (16, 'model_publisher', 3); # namespace_admin has read/write and admin privileges, aka 1 + 2 + 4 == 7 insert into namespace_roles values (32, 'namespace_admin', 7); end if; end; call create_namespace_roles(); # 3) create_repository_roles drop procedure if exists create_repository_roles; create procedure create_repository_roles() begin declare repository_roles tinyint; set repository_roles = ( select count(*) from information_schema.TABLES where TABLE_NAME = 'repository_roles' ); if (repository_roles = 0) then create table repository_roles ( # role is a power of 2 role bigint not null primary key unique check ( role & (role - 1) = 0 ), name varchar(64) not null unique, privileges bigint not null default 0 ); # populates with "harmonized" values # repository_user has no special privileges, and their repository role is implied normally, # i.e. not even persisted in the user_repository_roles table insert into repository_roles values (0, 'repository_user', 0); # sysadmin has read/write/admin privileges - for now this is a bit over-generalized, but # things might be fine-tuned once other repository-scoped roles emerge insert into repository_roles values (1, 'sysadmin', 7); end if; end; call create_repository_roles(); # 4) create_user_namespace_roles drop procedure if exists create_user_namespace_roles; create procedure create_user_namespace_roles() begin declare user_namespace_roles tinyint; set user_namespace_roles = ( select count(*) from information_schema.TABLES where TABLE_NAME = 'user_namespace_roles' ); if (user_namespace_roles = 0) then # creates the table create table user_namespace_roles ( user_id bigint not null, namespace_id bigint not null, roles bigint not null default 0, primary key (user_id, namespace_id), foreign key (user_id) references user (id), foreign key (namespace_id) references namespace (id) ); end if; end; call create_user_namespace_roles(); # 5) pre_populate_user_namespace_roles drop procedure if exists pre_populate_user_namespace_roles; create procedure pre_populate_user_namespace_roles() begin # this defines the limit to the query to user_role, in order to ensure the whole # table is traversed and not the first n (e.g. 500) records declare max_limit bigint; select count(id) from user_role into max_limit; insert into user_namespace_roles (user_id, namespace_id) select tu.user_id, n.id from user_role inner join tenant_user tu on tenant_user_id = tu.id inner join tenant t on tu.tenant_id = t.id inner join user u on tu.user_id = u.id inner join namespace n on tu.tenant_id = n.tenant_id # ignoring SYS_ADMIN roles where role != 'SYS_ADMIN' limit max_limit on duplicate key update user_id = user_namespace_roles.user_id; end; call pre_populate_user_namespace_roles(); # 6) populate_user_namespace_roles - optionally, run the debug_user_namespace_roles script after # this one, in order to verify the data has been populated correctly drop procedure if exists populate_user_namespace_roles; # this one requires an explicit cursor, as it iterates over all user_role records and # updates same user_permission records multiple times create procedure populate_user_namespace_roles() begin declare done tinyint default false; declare c_user_id bigint; declare c_namespace_id bigint; # the old-notation role from user_role declare c_old_role varchar(255); # the new permission which might be overwritten by each iteration for same namespace/user records # (which means it need to be operated upon to sum) declare thecursor cursor for select u.id, n.id, user_role.role from user_role inner join tenant_user tu on tu.id = tenant_user_id inner join tenant t on tu.tenant_id = t.id inner join namespace n on t.id = n.tenant_id inner join user u on tu.user_id = u.id inner join user_namespace_roles un on un.namespace_id = n.id and un.user_id = u.id limit 2000; declare continue handler for not found set done = true; open thecursor; read_loop: loop # fetches each record one by one fetch thecursor into c_user_id, c_namespace_id, c_old_role; # break condition if done then leave read_loop; end if; /* Converts old varchar single role entries into numeric roles, summing with the existing value which default to 0 if none present. Here, the conversion e.g. from 'USER' to 1 is hard-coded, as there is no point querying the permissions table. */ case (c_old_role) when ('USER') then update user_namespace_roles set roles = roles + 1 where user_id = c_user_id and namespace_id = c_namespace_id; when ('MODEL_CREATOR') then update user_namespace_roles set roles = roles + 2 where user_id = c_user_id and namespace_id = c_namespace_id; when ('MODEL_PROMOTER') then update user_namespace_roles set roles = roles + 4 where user_id = c_user_id and namespace_id = c_namespace_id; when ('MODEL_REVIEWER') then update user_namespace_roles set roles = roles + 8 where user_id = c_user_id and namespace_id = c_namespace_id; when ('MODEL_PUBLISHER') then update user_namespace_roles set roles = roles + 16 where user_id = c_user_id and namespace_id = c_namespace_id; when ('TENANT_ADMIN') then update user_namespace_roles set roles = roles + 32 where user_id = c_user_id and namespace_id = c_namespace_id; # no handling for different cases such as 'SYS_ADMIN' here else begin end; end case; end loop; close thecursor; end; call populate_user_namespace_roles(); # 7) create_user_repository_roles drop procedure if exists create_user_repository_roles; create procedure create_user_repository_roles() begin declare user_repository_roles tinyint; declare sysadmin_role int; set user_repository_roles = ( select count(*) from information_schema.TABLES where TABLE_NAME = 'user_repository_roles' ); set sysadmin_role = 7; if (user_repository_roles = 0) then create table user_repository_roles ( user_id bigint primary key not null, roles bigint not null default 0, foreign key (user_id) references user (id) ); insert into user_repository_roles select user_id, 7 from tenant_user inner join user_role ur on tenant_user.id = ur.tenant_user_id where role = 'SYS_ADMIN'; end if; end; call create_user_repository_roles(); # 8) add_workspace_id_and_populate create procedure add_workspace_id_and_populate() begin alter table namespace add column workspace_id varchar(255) not null default 'undefined'; update namespace set workspace_id = (select tenant_id from tenant where id = namespace.tenant_id); end; call add_workspace_id_and_populate(); drop procedure add_workspace_id_and_populate;
using UnityEngine; namespace NaughtyCharacter { [CreateAssetMenu(fileName = "InterpolationCurve", menuName = "NaughtyCharacter/InterpolationCurve")] public class InterpolationCurve : ScriptableObject { public AnimationCurve Curve; public float Evaluate(float time) { return Curve.Evaluate(time); } public float Interpolate(float from, float to, float time) { return from + (to - from) * Evaluate(time); } public Vector2 Interpolate(Vector2 from, Vector2 to, float time) { return from + (to - from) * Evaluate(time); } public Vector3 Interpolate(Vector3 from, Vector3 to, float time) { return from + (to - from) * Evaluate(time); } public Color Interpolate(Color from, Color to, float time) { return from + (to - from) * Evaluate(time); } } }
Adenosine receptors and cardiovascular disease: the adenosine-1 receptor (A1) and A1 selective ligands. Adenosine has often been cited as a universal retaliatory metabolite against the destructive cellular mechanisms that are initiated during metabolic/oxidative stress. Despite this billing, clinical application of adenosine has been limited to rather specific cardiovascular indications (e.g., paroxysmal supraventricular tachycardia). At least four adenosine receptor subtypes mediate the physiologic effects of adenosine, and each receptor subtype has been implicated as a target for development of agonist- and antagonist-based therapies against a wide range of disorders (cardiac arrhythmias, asthma, renal failure, and inflammation). Yet, clinical application of receptor subtype selective ligands has been very limited. The lag in clinical development of subtype selective ligands has largely been due lack of an X-ray resolved receptor structure and concomitant production of very selective agonists and antagonists. Species and tissue differences in ligand selectivity, receptor-effector coupling, and intracellular signaling also frustrate efforts in developing subtype selective therapies despite a great deal of amino acid homology across the receptor subtypes. The adenosine subtype-1 receptor (A1) has been particularly well studied in a variety of cardiovascular pathologies and a number of selective ligands for the receptor have been developed. A1 selective ligands acting as full agonists (CVT-510) or partial agonists (CVT-2759), antagonists (BG9719/CVT-124) and allosteric enhancers (PD81723) are now under preclinical scrutiny or are being developed for the clinical application in a variety of cardiovascular disorders and will be discussed herein.
Queen ultra light futon bed for office home in 2018 6 full size futon mattress multiple colors com the best futon mattress what it should be like in 2018 snoremagazine 31 best futon bedroom images on pinterest
Q: Operator overloading for a set in c++ So I've created a new class called Tuples where Tuples takes in a vector of strings known as tupleVector. I then create a set of Tuples, meaning I need to overload the operators necessary to order elements and disallow duplicates. Two questions: which operator overload is necessary? Do I overload < or ==? Assuming I must perform this overload within my Tuples class (so I can use the set of Tuples in other classes), is the following code correct? include "Tuples.h" Tuples::Tuples(vector<string> tuple){ tupleVector = tuple; } vector<string> Tuples::getStrings() { return tupleVector; } bool Tuples::operator<(Tuples& other){ return this->tupleVector<other.tupleVector; } bool Tuples::operator==(const Tuples& other)const{ return this->tupleVector==other.tupleVector; } Tuples::~Tuples() { // TODO Auto-generated destructor stub } A: You only need to provide operator<. The container checks whether two items are equivalent by comparing them reflexively: they are equivalent if !(a<b) && !(b<a)
She was the quintessential Punjabi kudi of Bollywood and he the urban rockstar of Hindi film industry. If she was outspoken and dedicated, he was cool and carefree. She was already a star and he was still struggling to find a foothold in the industry. Nothing about the two was ordinary, so naturally, their love story too was far, far away from being an ordinary one. In a candid chat with Simi Garewal, Saif Ali Khan, who wears his heart on his sleeve spoke at length about how he met and fell in love with superstar Amrita Singh. It wasn’t love at first sightSaif and Amrita met for the first time during Rahul Rawail’s film with which Saif was going to make his debut. Since Rahul and Amrita shared a great camaraderie, he invited her to do a photoshoot with the star cast of the film. Saif, who was making his debut was trying to act as a gracious host and trying to take care of all the guests on the set. During the photoshoot, Saif decided to put his arms around Amrita for the picture and that is when Amrita first noticed him well. It wasn’t love at first sight but there was something that attracted both of them to each other, right there, right then! While Amrita thought it was quite gutsy of him to put his arms around her like that, for Saif, it was Amrita’s brash behaviour that caught his attention. He even told her: Quote:“There must be a gentler side of you which you’re trying to protect with this harsh exterior.” The unexpected phone call Even though the photoshoot got over quickly, Amrita Singh left a striking impression on Saif’s heart. The young boy was going crazy and curious about someone who did not even acknowledge his presence. After a couple of days post the photoshoot, Saif dialled Amrita’s home number hoping to invite her for dinner. He said: Quote:“Would you like to go out for dinner with me?” And, to his surprise, Amrita said: Quote:“No, I don’t go out for dinner. But, you can come home for dinner if you like.” Needless to say, Saif drove over to her place the very same night.The steamy, fiery liplock In his own words, Saif had said: Quote:“I did not go over there with any kind of expectations. I just wanted to have a nice time with her and get to know her better.” He was startled to see Amrita without any makeup, looking even more gorgeous than she looked otherwise. Well, this did break his heart a bit as he thought she did not feel the need to dress up and put on some makeup for him, which indirectly meant she was not interested in him. Sensing Saif’s impulse, Amrita clearly told him that: Quote:“If you have come here under the impression that something might happen between the two of us, it’s not. So just relax!” The duo talked about everything and anything under the sun and soon it off. They got along like a house on fire and talked about things ranging from professional to personal topics. As the night grew darker, the palpable fire between the two ignited and they kissed. Saif did not leave the house for two days After the steamy, passionate liplock, Saif confided that he loved her to which Amrita replied that she loved him too. Saif did not leave Amrita’s home post the episode for the next two days. When the calls of producers and directors became unbearable, he decided to resume shooting. By this time, Amrita was so madly in love with him that she did not want him to leave the house, or her at all. And so terrified was she when she heard that Saif had to go for the shoot again that she asked him to take her car and go. Amrita revealed that she secretly thought that if not for her, at least he would come back just for the sake of returning her car.From a fling to marriageEven though it looked similar from the outside, there was nothing in their lives which had any sort of similarity. While Amrita was a star, Saif was still breaking stones to carve a niche for himself in the industry. While Amrita wanted marriage, Saif had everything but marriage on his mind. Their massive age difference was another factor which was making them brood over the strange chemistry and kind of cosmic relationship they had developed. However, despite all the odds, both Saif and Amrita decided that they could not live without each other. So it did not come across as a surprise when the actress who is known for being bold and headstrong, decided to tie the knot with a much younger Saif Ali Khan. Falling out of love Even though no official confirmation came our way over what led to their divorce after 13 strong years of being married, many attribute Saif’s prolonged affairs and falling “out of love” with Amrita as the reason behind their separation. Saif and Amrita have two kids – Sara Ali Khan and Ibrahim Ali Khan. And even though the relationship between Amrita, their two kids is now cordial, it was not the same earlier. In an interview with the Telegraph, Saif had once said: Quote:“I’m supposed to give Amrita Rs 5 crore, of which I’ve already given her approximately Rs 2.5 crore. Also, I’m paying Rs 1 lakh per month until my son becomes 18. I’m not Shah Rukh Khan. I don’t have that kind of money. I’ve promised her I’ll pay up the rest of the money, and I will, even if I’ve to slog till I drop dead. Whatever I’ve earned from doing ads, stage shows and films is being given to my children. I’ve no money. Our bungalow is for Amrita and the kids, and never mind the relatives who’ve joined her after my departure. Rosa and I stay in a pokey two-room apartment. Still, I’ve never been more at peace with myself. After a long long time, I feel my self-worth has returned. It isn’t nice to be constantly reminded of how worthless you are and to have taunts, jeers, insults and abuses thrown at your mother and sister all the time. I’ve gone through all of it. Now I feel healed again. Today, if I’ve found someone who actually makes me feel I’m worth something, what’s wrong with it? Earlier, I had hit such a rock bottom with my self-esteem that I’d be shocked if someone complimented me for my looks! Today if someone says something nice, I say, ‘That’s fine. Stars are supposed to be complimented." Not allowed to meet the childrenTalking about his kids after their divorce, Saif had said: Quote:"My wife and I have gone our separate ways. I respect my wife’s space. But why am I being constantly reminded of how terrible a husband I was, and how awful a father I am I’ve my son Ibrahim’s photograph in my wallet. Each time I look at it, I feel like crying. I miss my daughter Sara all the time. I’m not allowed to meet my children. They aren’t allowed to come to visit me, let alone stay with me. Why’ Because there’s a new woman in my life who’d influence my children against their mother’ That’s so much hogwash and Amrita knows it. Right now my kids are growing up with Amrita’s relatives and maidservants while she’s out working in a TV serial. Why does she need to do that, when I’m more than willing to support my family.” Affair with Rosa Post their separation, Saif publically announced his relationship with Italian dancer and model, Rosa. The duo had even started living together. Even though the relationship did not last too long, Saif did find his soulmate in Rosa once. Quote:"Unlike Amrita, Rosa is not from the film industry. Sure, I liked being put in touch with the industry’s bigwigs by Amrita, having dinner with Karan Johar, etc. But in hindsight, I’d have been better off finding my way through the industry. There’s a theory that I became whatever I am because Amrita took me by my finger and led me through it all. She has played a big hand in my growth as an actor and human being. But it’s a blessing to be with a woman who has nothing to do with movies. Even Shah Rukh’s wife Gauri keeps out of his career. I’d like to keep it that way.” All is not wellThough Saif and Amrita have been spotted going for dinner in the last couple of years, and their kids share an impeccable chemistry with Kareena, everything between Amrita and Kareena still remains hunky-dory. When the news of Kareena Kapoor’s pregnancy had broken out, a particular media outlet reached out to Amrita for her quote. An angry Amrita not only slammed the phone but also gave an earful to the reporter before doing so. Amrita said: Quote:"How do you have the guts to call people and ask such random questions? Who are you? Don’t call me again." Well, the equation between Saif-Amrita-Kareena is certainly not an easy one to decode. But, we certainly are glad to see Sara and Ibrahim loving their half-brother Taimur Ali Khan like there’s no tomorrow. Afterall, all’s well that ends well. Right? Once upon a time in Bollywood, this actor ruled the industry with his perfect comic timing and bindaas dance moves. Hero No 1 Govinda gave some remarkable films as a contribution to the Hindi film industry. As much as he was loved by many for his professional front, his love life never came under the scrutiny as he is happily married to his childhood friend, Sunita on March 11, 1987. For the uninitiated ones, Sunita was not the only love of Govinda's life. Govinda was madly in love with his Ilzaam co-star, Neelam Kothari. Govinda and Neelam made their debut in Bollywood with this film and went on to have a glittering career post that. Govinda was smitten by the actress the moment he saw her for the first time. In an old interview with the Stardust, Govinda professed his undying endearment for the actress, which he referred to as pure love and not lust! This beloved on-screen couple gave many successful films with their sparkling chemistry, but in real life, they both were poles apart. While Neelam was a foreign return, Govinda was a desi munda. Govinda said: Quote:“I was never her cup of tea anyway. I am a ghati. An unpolished boor, and she’s a Dresden doll. Clean, pure, polished and dignified. We would probably never have got along.” Recalling their first meeting in Pranlal Mehta’s office, Govinda stated: Quote:“I remember the first time I met her. At Pranlal Mehta’s office. She was wearing white shorts. Her long hair falling straight, like an angel’s. ‘Hello’ she said politely, and I was scared to reply because my knowledge of English was embarrassing. It still is. And I wondered how I would communicate with her on the sets. I had never imagined I would work with her. She was a distant dream. I had seen her in ‘ Jawani’, and seen the film again and again only to see her.” He further added Quote:"I was very conscious of her. Of the difference in our backgrounds and upbringing. But gradually, we crossed these obstacles, and I started opening up. I would play pranks, crack jokes and she would laugh. We became friends. And we had so many films together. We met so often and the more I got to know her, the more I liked her. There was dignity in her. A kind of piousness in her eyes. And strength of character. There was no vulgarity about her, no loudness. She was the kind of woman any man would have lost his heart to. I lost mine. Govinda even tried to mould his girlfriend Sunita like Neelam and would often ask her to become like Neelam, which invariably enraged Sunita. He remarked: Quote:“I couldn’t believe that such a young girl, even after attaining so much name, fame and wealth, could be so simple and down-to-earth. I couldn’t stop praising her. To my friends, to my family. Even to Sunita, to whom I was committed. I would tell Sunita to change herself and become like Neelam. I would tell her to learn from her. I was merciless. Sunita would get irritated. She would tell me, ‘You fell in love with me because of what I am, don’t ever try to change me’. But I was so confused. I didn’t know what to own.” Govinda admitted that he didn’t want to get involved in a serious relationship with Sunita. Saying that he just wanted a girl to roam around with, Govinda quipped: Quote:“I had never meant to get so seriously involved with Sunita. I was looking for a girl to go around with. I had signed a few films by then, and one day, my elder brother Kirti came to visit me on my sets. I had to do a romantic scene but couldn’t bring myself to do it. I felt very uncomfortable and awkward holding a girl in my arms. So, later, my brother told me, ‘Why don’t you have an affair just to get some experience of romance? You’ll at least, learn how to hold a girl in your arms’. At that point in time, I met Sunita. I admit that my involvement with her was a totally calculated move on my part. And I paid a heavy price for it.” But he later realised that his fling went too far, and he had committed himself to Sunita. Govinda retorted: Quote:“I realised too late that one needn’t experience death to perform a death scene, similarly one needn’t experience romance to perform romantic scenes. It came naturally, one only had to let oneself go. But the harm was done. I had already committed myself to Sunita. I am very impulsive.” He also mentioned the instance when he broke off his engagement with Sunita because she said something about Neelam during one of their fights. Govinda described, “After I started getting busier, my relationship with Sunita went through a change. She began feeling insecure and jealous. And I was of no help. She would nag me and I would lose my temper. We had constant fights. In one of those fights, Sunita said something about Neelam, and I lost my head and called it quits. I asked Sunita to leave me. I broke off my engagement with her. And had Sunita not called me after five days and coaxed me into it again, I would probably have married Neelam.” Govinda confessed that Neelam was an ideal girl whom every guy visualises for in a life partner, and he wanted to marry her. He further said: Quote:“Yes, I wanted to marry her. And I don’t think there’s anything wrong with that. I feel love and hatred are two emotions over which a man has no control. If you love somebody and they reciprocate, there’s nothing one can do about it. It is instinctive. What is under our control is our sense of duty and commitment. Neelam was the ideal girl, the kind every man visualises for a life-partner. The kind of girl I wanted. But that was getting emotional. There was another practical side. Just because I had fallen in love elsewhere, I couldn’t overlook my commitment towards Sunita. If there was no sense of duty in a man, this would go on. Leave one for another and another for another…” Even his dad wanted Govinda to marry Neelam, but his mother felt that if he has given his word to Sunita, he must honour it. Govinda opened up: Quote:“My dad was very keen that I marry Neelam. He was very fond of her. She had even visited him with her family. Yes, she had come to Virar. Actually, I took her and her mother to see my father. And he was very happy. But my mother thought differently. She felt that since I had given my word to Sunita, I must honour it. And I knew that if I didn’t do it, it would hurt her. And for me, no relationship can be more important than my mother. Her happiness will always be my primary concern.” According to Govinda, Neelam was a very ambitious girl, who wanted to be a number 1 heroine in the industry. Govinda claimed: Quote:“And anyway, Neelam had ambitions of her own to fulfill. Every time I broached the topic of marriage, she would laugh it off. She wanted to become the Number One heroine. She loves this profession and she’s lying when she says so matter-of-factly that she doesn’t much care about what happens to her career. And that it doesn’t affect her. She is very ambitious, take it from me.” He further added: Quote:“She wanted an intelligent, well-to-do, good-looking man as a husband. And I was anything but that. She belonged to the upper strata and I was a dehati, coming from a lower-middle-class family. We were poles apart in every way. We probably would never have been successful as a married couple. And maybe, Neelam realised that.” Govinda revealed that another hurdle that came in their relationship was when Neelam started working with other actors, which made him absolute jealous and insecure. He confessed: Quote:“But the actual problems between her and me began when she started working more and more with other heroes. I was consumed with absolute jealousy and insecurity. I was scared that I would lose out on her totally. And that she was the only, one good heroine that I had. And then ‘Aag Hi Aag’ and ‘Paap Ki Duniya’ became hits. She started signing more films with Chunky, Sunny, Mithun, Chintu, I was very upset.” On playing dirty with Neelam by not telling her about his marriage with Sunita till one year, Govinda acknowledged: Quote:“In the meantime, my mother wanted me to officially marry Sunita – we’d had one ceremony in the mandir. For that matter, we were husband and wife. But I had not disclosed publicly my marriage to Sunita because I felt it would affect my career. Neither did Neelam know about it. She got to know only after a year. I probably did not tell her because I did not want to break this successful screen pair. And to be honest, to a certain extent, I did exploit my personal relationship with Neelam for professional ends. I played dirty with her. I should have told her that I was married.” Justifying his act, Govinda said: Quote:“But there was always such a conflict going on in my mind. After meeting a girl like Neelam, any man is bound to lose his balance. I lost mine totally. I was so confused. I liked her tremendously. I was in love with her. I wanted to marry her. But I couldn’t. And yet, I didn’t want to let go. Even today, I feel jealous when I see her working with other actors. I wish she would start signing films with me again. If not anything, we could at least be friends.” With a regret in his life, he was left with his one-sided love forever. Govinda quoted, Quote:“Of course, she’s very cordial to me whenever we bump into each other. But my heart still misses a beat when I see her. I feel like screaming in despair. If only I had not promised to marry Sunita. If only… I still care for Neelam. And I always will. I don’t know why she stopped signing films with me. And cut me off totally from her life. Maybe she felt that our pair was going stale on screen. The same old dancing, the same old steps, the same old Govinda.” Time passed by, and Govinda and Sunita came in a committed relationship with the start of their married life. But he never shies away from confessing his love for Neelam and he hates when his relationship with her is termed as an affair. Govinda was quoted as saying: Quote:“That is why I hate it when my relationship with Neelam is termed as an affair. It somehow demeans the status of the relationship, the depth of my feelings. And I say my feelings, because I can only be sure of them. What she felt, she knows. Maybe there was nothing from her side. But I will never deny my love and reverence for her. I will always care for her. For me it was love, not lust. Love in its purest form. I know she was too good for me. She probably deserves better. And I do wish her all the happiness in the world. The man she marries will be the luckiest man on this earth.” In the late 90s, Govinda got involved with his Hadh Kar Di Aapne co-star Rani Mukerji. As they both were of a very similar nature, it helped them elevate their professional acquaintance to the point of friendship. Their alleged relationship was a hush-hush affair until a reporter, when visiting her house for an interview, spotted Govinda walking out of Rani’s residence in a night suit. Govinda even said that there is second marriage written in his kundali and Sunita should be prepared for it. He revealed: Quote:“Tomorrow, who knows, I may get involved again, and then, maybe I will marry the girl I get involved with. But Sunita should be prepared for it. Only then will I feel free. And there is a second marriage in my kundali.” Finally, Govinda concluded with his other temptations from the glam world: Quote:“Well, I am a firm believer of destiny. What has to happen, will happen. Yes, I like Juhi a lot. Even Divya Bharati. Divya is a very sensuous girl. It’s difficult for a man to resist her. I know Sunita is going to be very upset with all this. But she should know that I am still resisting Divya’s charms. I haven’t given in to the temptation as yet…” Govinda and Sunita had their own fair share of ups and downs but they managed to keep their married life blissful. Despite his one-sided love for Neelam, Sunita stood by his side through everything, which is really commendable! Meet these Chote Nawabs, who started their career at a very tender age and fortunately turned out to be Bollywood Stars! (Scroll down for the pictures.) Shashi Kapoor - Having been born to the famous & filmy Kapoor khandaan, he was only seven when he acted in a movie called Tadbir. He won recognition in the movies Aag and Aawara where he played the younger version of his brother Raj Kapoor. Rishi Kapoor - He was on his late teens when he played the role of a young Raj Kapoor in Mera Naam Joker. I don’t think anyone could have done more justice to the role. Three years later, he acted in Bobby and there was no looking back for this handsome man! Neetu Signh/Kapoor - This Ever - Green gorgeous laddy started her acting career when she was only 8! In 1966, she played a small role in the movie Suraj as a chubby little girl. Her 3rd movie Do Kaliyaan won her recognition but it was Yaadon Ki Baraat which brought her fame! Padmini Kolhapure - As a child artist, she had many films to her credit which include Dream Girl, Zindagi, Saajan Bina Suhagan and Thodi Si Bewafai. In Satyam Shivam Sundaram, she played a young Zeenat Aman with a scar mark on her face. In Gahrayee, she played a school girl possessed by a spirit in her body. In Insaaf Ka Tarazu, she played Zeenat Aman's younger sister who is a victim of child molestation by Raj Babbar. P.S - Don't you people think she looks slightly alike to her niece, Shraddha Kapoor? Sanjay Dutt - Our Munna Bhai, was 11 when he made his first appearance in a film. He played the role of a qawali singer in the movie Reshma Aur Shera, which had his father, Sunil Dutt, in the lead role. Who knew one day this qawali singer will be showing his amazing acting skills in great movies like Vastab, Khalnayak, Munna Bhai MBBS, etc? Aamir Khan - He looks adorable, doesn't he? Yaadon Ki Baraat & Madhosh were the films where he acted as a child artist. Did anyone imagine back on tht time, that this young boy will one day be known as the perfectionist, one of the biggest Khans, one of the greast actors of all times & the very gentle host of the very popular show Satyamev Jayte? Imran Khan - "JAI" was seen as the younger Aamir Khan in Jo Jeeta Wohi Sikandar & Qayamath Se Qayamath Tak!! Who knew, one day he will win everyone's heart with this amazing acting in movies such as - Jaane Tu Ya Jaane Na & Delhi Belly? Sridevi - Miss. Hawa Hawaii has been acting since she was four! Her first movie was a Tamil film called Kandan Karunai after which she began acting in several regional and Bollywood movies. Urmila Matondkar - She is the Rangeela Girl! She was only 6 when she started her journey in Bollywood! She played her first role as a child artist in Shashi Kapoor and Rekha starrer movie, Kalyug. At the age of 9 she won recognition with her role in Masoom. Jugal Hansraj - He was the Masoom kid for every 80's fan! He was 11 years old when he was chosen for this movie! How adorable does he look!? Though, he might not be called Bollywood Star, but he will always stay as the famous Masoom Kid! Bobby Deol – This “Soldier” was only 10 years old when he acted as the young Dharmendra in Dharam Veer. Hrithik Roshan – This Greek God with the Hottest Body Ever was only 6 when he faced the camera for the very first time! While his first experience in the film industry was as an extra in a dance sequence in the movie Aasha (ofcourse! He has the sexiest & the coolest dancing movies even now), that same year he also played a minor role in Rakesh Roshan starrer, Aap ke Deewane. Shahid Kapoor – Was back then known as the Complan Boy (alongside Ayesha Takia in the same advertisement for Complan)! Now definitely known as the Chocolate Boy! Who can forget his innocent face in “Aankhon Mein Tera Hi Chehra?” Ayesha Takia - The Complan Girl alongside Shahid Kapoor, she endorsed the brand when she was in her early teens. She even played the lead role in Falguni Pathak’s music video Meri Chunar Udd Udd Jaye. Kunal Khemu – Perhaps, one of the most underrated actors in BW (in my opinion). I expected a lot more from him because of his amazing acting skills he proved in Zakhnm, Raju Ban Gaya Gentleman, Hum Hain Rahi Pyaar Ke, etc. He won several awards as the Best Child Artist, especially for the movie Zakhm, where his acting forced me to cry. I want to see this guy in much better movies! Aftab Shivdasani – The “Jugal” of Mr. India! He also acted in famous movies like Shahenshah, ChaalBaaz, and Insaniyat! Hansika Motwani – I am sure the 90’s Kids will remember her! She was the “Shakalaka Boom Boom Girl” (yes, you are right, that is the Magic Pencil serial). She also acted in few other serials later on. She won recognition in Koi Mill Gaya! Her Bollywood Debut was Aap Ka Suroor. Currently, working on Tamil & Telugu movies more. Kamaal Hasan - Thanks to the Anon who reminded me about this legend! His star power and amazing acting has always been there from a very young age! ----------------- P.S - Did you guys notice, how the good child artists did not turn out to be good actors as adults? But the not - so - famous child artists turned out to be our famous Bollywood actors? Though, I must say Rishi Kapoor, Neetu Kapoor, Shashi Kapoor & Sridevi were good even as child artists! Last week I watched Bajirao Mastani with my family. My condolences to those who chose to go for Dilwale instead. Anyway, despite the grandeur of the sets and Deepika's eyebrows, the only thing that I could focus on was how this too was yet another love triangle just packaged nicely. Normally, I don't have a problem with Bollywood's repetitive nature but the thing with love triangles is that we see them so rarely IRL. Anyway, this film made me wonder whether this age-old formula works any more. So, I set to make a list of all the Hindi films (that I could think of) which not only had love triangles but were Box Office Hits too. There are many and it’s not possible to list down all of them, so here are a few out of them: 1. Silsila (1981)Plot: Apparently inspired from the real-life romance of the protagonists, Silsila sees Amitabh Bachchan leave the love of his life (Rekha) to marry his dead brother's pregnant fiancée (Jaya). He then happens to meet Rekha (who too is married) and they begin having an extra-marital affair. Everyone finds out and unsurprisingly, Mr. Bachchan realizes the error of his ways and goes back to his wife , who takes the cheating *insert adjective of choice* back.Why it worked: Because of the real-life angle it was inspired from.2. Saagar (1985)Plot: Saagar is the most clichéd movie ever. Matlab, there's a gareeb guy who is secretly in love with his best friend. A rich man walks in just when the gareeb guy thinks he has a shot, and the girl obviously chooses the rich man. And just when you think that the girl will have to choose, one of the options dies and the other two get their Happily Ever After.Why it worked: Goa. 3. Chandni (1989)Plot: You know how we get nightmares about messing up in front of our crush? That fear is the premise of this film. Rishi Kapoor has an accident while trying to serenade Sridevi on a helicopter. Now, if you get on a helicopter to maaro-fy style, accident toh hoga hi. Anyway, he and his family blame her for the accident. A heartbroken Sridevi finds solace in Vinod Khanna and just when they're about to get married, this super intelligent person comes back. Normally, a sane woman would reject the man who blamed her for his stupidity, but no she goes back to him with the blessings of Mr. Khanna.Why it worked: If you know, please tell me. 4. Baazigar (1993)Plot: SRK is known for his lover-boy films, but I personally feel that he makes a better psychopathic killer. In Baazigar, he kills at least half the cast; breaks the hearts of both pre-rhinoplasty Shilpa Shetty and Kajol; and dies himself all in the name of revenge. The movie is as ridiculous as it sounds, but you can't help love it.Why it worked: Because it's the coolest movie ever! Also, Shah Rukh-Kajol.5. Dil Toh Pagal Hai (1997) Plot: Dil Toh Pagal Hai remains a cult favourite despite having the having a ghissa-pitta storyline of how the salwar-kameez girl is always preferred over the tequila-downing-shorts-donning woman. It not only has the Karishma-SRK-Madhuri love triangle but also the SRK-Madhuri-Akshay triangle. BUT, the sole reason why this film worked is cause no girl can resist Shah Rukh Khan going "aur paas, aur paas, aur paas"!Why it worked: Dil, dosti etc. And of course, Shah Rukh Khan.6. Judaai (1997)Plot: Judaai was a film that blew my mind as a child (I was 6 when it came out). Thing is, you see people leave their partners for someone else all the time. However in this, Sridevi sells her husband to Urmila in return for money and a house. Matlab kuch bhi.Why it worked: Because of the forehead to forehead bindi transfer scene AND for Kapil's bua going "Abba Dabba Chappa". 7. Kuch Kuch Hota Hai (1998)Plot: As much as I loved the movie as a kid, I can't help but cringe everytime I see it now. Kuch Kuch Hota Hai is the reason why girls are so insecure. Matlab, SRK and Kajol are joined at the hip, but does he see her? NO! He falls for the short skirt wali NRI girl, and needs his daughter to make him see how ghar ki murgi needn't always be dal baraabar.Why it works: Because its SRK, Kajol AND Rani. 8. Hum Dil De Chuke Sanam (1999)Plot: Hum Dil De Chuke Sanam is the story of a girl who falls in love with the hawaa-ka-jhoka. However, her parents don't approve and get her married to someone else. Her husband, who's an absolute sweetheart, takes her all the way to Italy just to unite her with her ex. BUT, she's like " I know I could have told you this any time before you spent a bomb on this trip, but I'm going to stay with you."Why it worked: The colours, naach-gaana and a beautiful film.9. Taal (1999)Plot: Once again, girl meets boy, they fall in love. Boy's family doesn't approve so girl moves on. Boy comes back and they (save the nice guy who loved the girl when no one did) live happily ever after.Why it worked: The music. 10. Dhadkan (2000)Plot: Dhadkan has the same story as the movie above or the one above that or the one above that. You get the hint, right?Why it worked: If you don't have a good script, make sure you at least have good songs.11. Darr (1993)Plot: A happy couple goes through a nightmare when someone they’re friends with turns out to be an obsessive stalker who’ll go to any heights to get the girl.Why it worked: SRK in a role that’ll send shivers down your spine.Source: India12. Lagaan (2001)Plot: The only reason why India stayed up all night to watch the Oscars, Lagaan is about pados-wale Sharma ji ka beta. He not only teen guna lagaan maaf-ed but also picks the gaon ki gori over the desi mem. Why it worked: Because Mera Bharat Mahaan13. Rehna Hai Tere Dil Mein (2001)Plot: Originally a movie that bombed at the BO, RHTDM has Maddy impersonating another man to woo Diya Mirza (lets not even talk about how stupid the idea is). Anyway, they fall in love and in walks Saif Ali Khan, the man Madhavan is impersonating. Instead of just letting go of Madhavan for life, Diya gets mad for a while but forgives him in the end.Why it worked: Once again, music. 14. Devdas (2001)Plot: SLB might have led you to believe that this was about the love triangle between Devdas, Paro and Chandramukhi but it's actually about the true love that dear old Deva finds in his whiskey bottle.Why it worked: Shah Rukh Khan. AND Madhuri. AND Aishwarya.15. Kal Ho Naa Ho (2003)Plot: A GAP advertisement, this film is about how a girl ruins the most ultimate bromances of all times.Why it worked: SRK dies in this. You can't hate a movie in which Shah Rukh Khan dies. S16. Jab We Met (2007)Plot: This really really high on something girl meets depressed man. Shady motel side adventures happen and boy falls in love with girl. Girl is however in love with stupid Anshuman, naturally the hero gives his blessing. Anshuman rejects her and she comes back to our hero.Why it worked: Great chemistry, memorable dialogues, great music and a plot we just cannot get over. 17. Dostana (2008)Plot: Proof that every dog has its day; this movie has two guys falling for their roommate but the girl is swept away by none other than Bobby Deol!Why it worked: Bromance and Priyanka Chopra in a gold swimsuit. 18. New York (2009)Plot: New York is about the moral dilemma faced by a man when asked to spy on his pyaar's husband.Why it worked: A different(ish) storyline.19. Ishqiya (2010)Plot: A film starring acting stalwarts like Naseerudin Shah and Vidya Balan; this movie is about two goons trying to make quick bucks who fall for their so-called friend's wife.Why it worked: Solid performances and an interesting plot.20. Tanu Weds Manu (2011) & Tanu Weds Manu Returns (2015)Plot: An extremely understated film, Tanu Weds Manu is the story of a rebellious girl who's forced to marry an NRI doctor despite having a boyfriend. The movie returned with a sequel starring Kangana in a double role. Tanu tries to woo her husband back as he decides to marry her lookalike.Why it works: Kangana and Kangana.21. Barfi (2012)Plot: An 'inspired' but nonetheless really sweet movie, Barfi tells the story of a mute man Murphy. He falls in love with a girl with perfect winged liner but obviously the girl gets married to someone else. Murphy, or as he calls himself, Barfi then meets Priyanka who too is disabled. They start living together but the pretty woman comes back . He, however, stays with the girl who remains by his side even when a street light is about to fall on them.Why it worked: Them feels.22. Cocktail (2012)Post: Deepika's so called coming-of-age film, Cocktail is the cliché of all cliché. See, Saif and Deepika are in a very happy relationship. However, Deepika gets a new room mate who's very reserved. The trio sing the Hanuman Chalisa and our hero falls for the desi girl even though his girlfriend was Deepika Padukone. Hats off to the logic.Why it worked: A couple of hit songs and foreign locations. savvyness and the film's music.23. Jab Tak Hai Jaan (2013)Plot: I wish there was one but its a mish-mash of random stuff happening in places and at times when it shouldn't.Why it worked: SRK and his first on-screen smooch.24. Raanjhanaa (2013)Plot: This is a film about extremes. Dhanush is in love with Sonam who's in love with someone else. So, he turns stalker. She is bothered by the stalkerness and gets him killed. Baat hi khatam.Why it worked: Dhanush made a believable stalker and Abhay Deol is impressive even in the little role he had.25. Bajirao Mastani (2015)Plot: Boy is married, goes to new state and meets pretty girl. Girl falls in love with boy and follows him home like a creep only to find out he's married. The hero on seeing the girl's dedication does mohabbat (not ayyaashi, mind you) with her. His wife finds out, does a little drama but ends up giving them her blessing. Why it worked: Deepika-Ranveer.26. Zubeidaa (2001)Plot: This poignant story revolves around the life of a Muslim divorcee who falls in love and marries a Rajput prince. As his second wife, she is torn between the royal life and her whims.Why it worked: Karishma Kapoor looked stunning as Zubeidaa and packed a powerful performance. 27. Student Of The Year (2012)Plot: Two best friends and a girl, set against the backdrop of a ‘school’ that has a tradition of holding the weirdest competition ever.Why it worked: Because of the larger-than-life portrayal of a school romance. Also, Alia Bhatt. If you're feeling a bit lethargic with your photography- try introducing a prop. Photograph your prop in the most unusual of circumstances that you can dream up. This was some of the thinking behind the 'Glasses' challenge. As you will see in these example photographs, some photographers took it to the limit, and they created some great shots!
The Committee's proposals relate to the capitalisation of bank exposures to a central counterparty (CCP) and cover both capital requirements for default fund exposures and trade-related exposures to CCPs. The Committee will finalise the rules around year end and expects that they will be implemented in its member jurisdictions by January 2013. The Committee conducted an initial consultation on this topic in December 2010. Today's consultative paper takes account of the responses received during this earlier consultation as well as the results of various impact assessments. The Committee also consulted closely with the Committee on Payment and Settlement Systems (CPSS) and the Technical Committee of the International Organization of Securities Commissions (IOSCO). The Basel Committee welcomes comments on the proposed rules text. Comments should be submitted by Friday, 25 November 2011 by email to: baselcommittee@bis.org. Alternatively, comments may be sent by post to the Secretariat of the Basel Committee on Banking Supervision, Bank for International Settlements, CH-4002 Basel, Switzerland. All comments may be published on the Bank for International Settlements' website unless a commenter specifically requests confidential treatment.
<?xml version="1.0" encoding="UTF-8"?> <!-- Copyright (C) 2006 W3C (R) (MIT ERCIM Keio), All Rights Reserved. W3C liability, trademark and document use rules apply. http://www.w3.org/Consortium/Legal/ipr-notice http://www.w3.org/Consortium/Legal/copyright-documents $Id: examples.xml,v 1.57 2008/02/20 16:41:48 pdowney Exp $ --> <ex:echoMixedContentType xmlns:ex="http://www.w3.org/2002/ws/databinding/examples/6/09/"> <ex:mixedContentType xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:wsdl11="http://schemas.xmlsoap.org/wsdl/" xmlns:soap11enc="http://schemas.xmlsoap.org/soap/encoding/"> <ex:elem1>Tagged Value</ex:elem1> mixed value <ex:elem2>Tagged Value</ex:elem2> </ex:mixedContentType> </ex:echoMixedContentType>
Q: How to become super user through SSH I am using ssh for connecting one of the systems. I have a perl script in that system which I have to run from my machine. But the commands in remote system runs only when it is in Super user mode (I give su - to become the super user, if I am working directly on the remote system) But if I have to run the perl script from my system ( I am using OpenSSH for this purpose), in super user mode, how should I do it? By the way, I have placed the command $sh->system("su -") . But it asks for the password but does not proceed further. I have waited for 5 mins atleast, even then I didnt get any response after I entered the password. Can anyone say how to deal with this situation? A: You could use sudo, and allow your user to become root with no password A: Read the entry titled "Can't change working directory" on Net::OpenSSH FAQ to know why it doesn't work. Then read the other entry, "Running remote commands with sudo", to see how you can solve it. A: If you don't want ssh to ask for the password, you can add your client user key in the server .ssh/authorized_keys file of the target user. Using this, ssh won't ask for a password anymore.
<?php /* * This file is part of Phraseanet * * (c) 2005-2016 Alchemy * * For the full copyright and license information, please view the LICENSE * file that was distributed with this source code. */ namespace Alchemy\Phrasea\Controller\Prod; use Alchemy\Phrasea\Controller\Controller; use PHPExiftool\Driver\Metadata\Metadata; use PHPExiftool\Driver\Metadata\MetadataBag; use PHPExiftool\Driver\TagFactory; use PHPExiftool\Driver\Value\Mono; use PHPExiftool\Reader; class SubdefsController extends Controller { public function metadataAction($databox_id, $record_id, $subdef_name) { $record = new \record_adapter($this->app, (int) $databox_id, (int) $record_id); $metadataBag = new MetadataBag(); try { $fileEntity = $this->getExifToolReader() ->files($record->get_subdef($subdef_name)->getRealPath()) ->first(); $metadatas = $fileEntity->getMetadatas(); foreach($metadatas as $metadata){ $valuedata = $fileEntity->executeQuery($metadata->getTag()->getTagname()."[not(@rdf:datatype = 'http://www.w3.org/2001/XMLSchema#base64Binary')]"); if(empty($valuedata)){ $valuedata = new Mono($this->app->trans('Binary data')); $tag = TagFactory::getFromRDFTagname($metadata->getTag()->getTagname()); $metadataBagElement = new Metadata($tag, $valuedata); $metadataBag->set($metadata->getTag()->getTagname(), $metadataBagElement); }else{ $metadataBag->set($metadata->getTag()->getTagname(), $metadata); } } } catch (PHPExiftoolException $e) { // ignore } catch (\Exception_Media_SubdefNotFound $e) { // ignore } return $this->render('prod/actions/Tools/metadata.html.twig', [ 'record' => $record, 'metadatas' => $metadataBag, 'subdef_name' => $subdef_name ]); } /** * @return Reader */ private function getExifToolReader() { return $this->app['exiftool.reader']; } }
# Microsoft-Windows-OLEACC ETW events ## Description This page contains the list of events for Microsoft-Windows-OLEACC, as collected by the Event Tracing for Windows. ## Sub Data Sets |events|Version|Description|Tags| |---|---|---|---| |[1](events/event-1.md)|0|None|etw_level_Informational, etw_task_OLEACC_IAccessibleErrors| |[2](events/event-2.md)|0|None|etw_level_Verbose, etw_opcode_Start, etw_task_OLEACC_ClientApiCall| |[3](events/event-3.md)|0|None|etw_level_Verbose, etw_opcode_Stop, etw_task_OLEACC_ClientApiCall|
<?xml version="1.0" encoding="utf-8"?> <root> <!-- Microsoft ResX Schema Version 2.0 The primary goals of this format is to allow a simple XML format that is mostly human readable. The generation and parsing of the various data types are done through the TypeConverter classes associated with the data types. Example: ... ado.net/XML headers & schema ... <resheader name="resmimetype">text/microsoft-resx</resheader> <resheader name="version">2.0</resheader> <resheader name="reader">System.Resources.ResXResourceReader, System.Windows.Forms, ...</resheader> <resheader name="writer">System.Resources.ResXResourceWriter, System.Windows.Forms, ...</resheader> <data name="Name1"><value>this is my long string</value><comment>this is a comment</comment></data> <data name="Color1" type="System.Drawing.Color, System.Drawing">Blue</data> <data name="Bitmap1" mimetype="application/x-microsoft.net.object.binary.base64"> <value>[base64 mime encoded serialized .NET Framework object]</value> </data> <data name="Icon1" type="System.Drawing.Icon, System.Drawing" mimetype="application/x-microsoft.net.object.bytearray.base64"> <value>[base64 mime encoded string representing a byte array form of the .NET Framework object]</value> <comment>This is a comment</comment> </data> There are any number of "resheader" rows that contain simple name/value pairs. Each data row contains a name, and value. The row also contains a type or mimetype. Type corresponds to a .NET class that support text/value conversion through the TypeConverter architecture. Classes that don't support this are serialized and stored with the mimetype set. The mimetype is used for serialized objects, and tells the ResXResourceReader how to depersist the object. This is currently not extensible. For a given mimetype the value must be set accordingly: Note - application/x-microsoft.net.object.binary.base64 is the format that the ResXResourceWriter will generate, however the reader can read any of the formats listed below. mimetype: application/x-microsoft.net.object.binary.base64 value : The object must be serialized with : System.Runtime.Serialization.Formatters.Binary.BinaryFormatter : and then encoded with base64 encoding. mimetype: application/x-microsoft.net.object.soap.base64 value : The object must be serialized with : System.Runtime.Serialization.Formatters.Soap.SoapFormatter : and then encoded with base64 encoding. mimetype: application/x-microsoft.net.object.bytearray.base64 value : The object must be serialized into a byte array : using a System.ComponentModel.TypeConverter : and then encoded with base64 encoding. --> <xsd:schema id="root" xmlns="" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:msdata="urn:schemas-microsoft-com:xml-msdata"> <xsd:import namespace="http://www.w3.org/XML/1998/namespace" /> <xsd:element name="root" msdata:IsDataSet="true"> <xsd:complexType> <xsd:choice maxOccurs="unbounded"> <xsd:element name="metadata"> <xsd:complexType> <xsd:sequence> <xsd:element name="value" type="xsd:string" minOccurs="0" /> </xsd:sequence> <xsd:attribute name="name" use="required" type="xsd:string" /> <xsd:attribute name="type" type="xsd:string" /> <xsd:attribute name="mimetype" type="xsd:string" /> <xsd:attribute ref="xml:space" /> </xsd:complexType> </xsd:element> <xsd:element name="assembly"> <xsd:complexType> <xsd:attribute name="alias" type="xsd:string" /> <xsd:attribute name="name" type="xsd:string" /> </xsd:complexType> </xsd:element> <xsd:element name="data"> <xsd:complexType> <xsd:sequence> <xsd:element name="value" type="xsd:string" minOccurs="0" msdata:Ordinal="1" /> <xsd:element name="comment" type="xsd:string" minOccurs="0" msdata:Ordinal="2" /> </xsd:sequence> <xsd:attribute name="name" type="xsd:string" use="required" msdata:Ordinal="1" /> <xsd:attribute name="type" type="xsd:string" msdata:Ordinal="3" /> <xsd:attribute name="mimetype" type="xsd:string" msdata:Ordinal="4" /> <xsd:attribute ref="xml:space" /> </xsd:complexType> </xsd:element> <xsd:element name="resheader"> <xsd:complexType> <xsd:sequence> <xsd:element name="value" type="xsd:string" minOccurs="0" msdata:Ordinal="1" /> </xsd:sequence> <xsd:attribute name="name" type="xsd:string" use="required" /> </xsd:complexType> </xsd:element> </xsd:choice> </xsd:complexType> </xsd:element> </xsd:schema> <resheader name="resmimetype"> <value>text/microsoft-resx</value> </resheader> <resheader name="version"> <value>2.0</value> </resheader> <resheader name="reader"> <value>System.Resources.ResXResourceReader, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> </resheader> <resheader name="writer"> <value>System.Resources.ResXResourceWriter, System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089</value> </resheader> <data name="BusinessImpact_HBI" xml:space="preserve"> <value>HBI</value> </data> <data name="BusinessImpact_LBI" xml:space="preserve"> <value>LBI</value> </data> <data name="BusinessImpact_MBI" xml:space="preserve"> <value>MBI</value> </data> <data name="BusinessImpact_NDA" xml:space="preserve"> <value>NDA</value> </data> <data name="MailBodyDelete" xml:space="preserve"> <value>Your SharePoint site has expired because the site collection information was not updated. This site has been locked for more than 30 days and will be deleted on {0} ,If you or your users still need this site, you can unlock it before it is deleted.</value> </data> <data name="MailBodyFirstLock" xml:space="preserve"> <value>First Notice: Please update your site before {0}, or your site will be locked and all users will be unable to access the site. All locked sites will be deleted after 90 days.</value> </data> <data name="MailBodySecondLock" xml:space="preserve"> <value>Second Notice: Please update your site before {0}, or your site will be locked and all users will be unable to access the site. All locked sites will be deleted after 90 days.</value> </data> <data name="MailSubjectDelete" xml:space="preserve"> <value>Your SharePoint site has expired and will be deleted: {0}</value> </data> <data name="MailSubjectFirstLock" xml:space="preserve"> <value>Update your SharePoint site information: {0}</value> </data> <data name="MailSubjectSecondLock" xml:space="preserve"> <value>Update your SharePoint site information - second notice: {0}</value> </data> </root>
IN THE SUPREME COURT OF THE STATE OF DELAWARE GERRY MOTT and DAWN MOTT, § § No. 155, 2019 Defendants Below, § Appellants, § Court Below—Superior Court § of the State of Delaware v. § § THE BANK OF NEW YORK § C.A. No. S17L-05-021 MELLON f/k/a The Bank of New § York as successor to JPMorgan Chase § Bank, N.A., as Trustee for the benefit § of the Certificateholders of Popular § ABS, Inc. Mortgage Pass-Through § Certificates Series 2006-C, § § Plaintiff Below, Appellee. § § § Submitted: September 6, 2019 Decided: October 2, 2019 Before VALIHURA, VAUGHN, and TRAYNOR, Justices. ORDER After consideration of the parties’ briefs and the record in this case, it appears to the Court that: (1) In this mortgage foreclosure action, the appellants, Gerry and Dawn Mott, filed this appeal from an order of the Superior Court granting summary judgment to the plaintiff-appellee, The Bank of New York Mellon f/k/a The Bank of New York as successor to JPMorgan Chase Bank, N.A., as Trustee for the benefit of the Certificateholders of Popular ABS, Inc. Mortgage Pass-Through Certificates Series 2006-C (the “Bank”). After careful consideration of the parties’ submissions and the record on appeal, we affirm the Superior Court’s judgment for the reasons stated below. (2) In May 2006, Mr. Mott executed a promissory note (the “Note”) for a $500,000 loan from Equity One, Inc.1 The Note was secured by a mortgage on a property located in Georgetown, Delaware (the “Mortgage”).2 Both of the Motts signed the Mortgage.3 The Mortgage provided that if payments were not made on the Note, the mortgagee could, after at least 30 days’ notice, accelerate the sum secured by the Mortgage and foreclose on the property.4 Mortgage Electronic Registration Systems, Inc. (“MERS”), as nominee for Equity One, was the mortgagee under the Mortgage. As discussed in greater detail below, both the Note and the Mortgage eventually were transferred to the Bank. (3) By late 2007, Mr. Mott had fallen behind on the mortgage payments. In February 2009, MERS filed a mortgage foreclosure action against the Motts. In October 2010, MERS requested that the case be placed on the mortgage foreclosure dormant docket, which was established by Superior Court Administrative Directive 1 Appendix to Answering Brief, at B-19-22. 2 Id. at B-1-18. 3 Id. at B-16. 4 Id. at B-14. 2 2008-3 in response to the substantial uptick in mortgage foreclosure complaints that occurred in 2008. In November 2012, the Superior Court dismissed the MERS complaint in accordance with Administrative Directive 2008-3 because MERS had not taken any action in the case in more than twenty-four months. (4) In April 2007, the Motts filed a petition under Chapter 13 of the United States Bankruptcy Code. The Bankruptcy Court entered a discharge order in February 2012.5 It appears that the parties agree that the bankruptcy discharge eliminated any personal liability of the Motts for amounts due under the Note. (5) On August 5, 2014, Ocwen Loan Servicing, LLC, which by that time was the servicer of the loan, sent Mr. Mott a notice of default. 6 The notice provided until September 4, 2014 for Mr. Mott to bring the loan current and indicated that failure to do so might result in the initiation of foreclosure proceedings. The Motts do not dispute that they have not made the mortgage payments since 2007. (6) In May 2017, the Bank filed an in rem, scire facias action seeking to foreclose on the property. Counsel for the Motts filed two motions to dismiss in which they argued, among other things, that the Bank lacked standing to prosecute the action, the mortgage was unenforceable because of alleged improprieties at the time of closing, and the Bank had not actually participated in the mandatory 5 Discharge of Debtor After Completion of Chapter 13 Plan, In re Mott, No. 07-10434-BLS (Bankr. D. Del. Feb. 7, 2012). 6 Appendix to Answering Brief, at B-36-42. 3 foreclosure mediation because only Ocwen, and not the Bank, had a representative present at the mediation. The Superior Court denied the motions to dismiss. (7) After the Motts answered the complaint, the Bank moved for summary judgment. The Motts’ counsel then moved to withdraw as counsel because the Motts could no longer pay for his services, and the Superior Court granted the motion. The Superior Court held a hearing on the motion for summary judgment on March 15, 2019. At the conclusion of the hearing, the court granted the motion for summary judgment. This appeal followed. (8) We review the Superior Court’s grant or denial of a motion for summary judgment de novo.7 On a motion for summary judgment, the movant must demonstrate that there are no genuine issues of material fact and that the movant is entitled to judgment as a matter of law. 8 “When the evidence shows no genuine issues of material fact in dispute, the burden shifts to the non-moving party to demonstrate that there are genuine issues of material fact in dispute that must be resolved at trial.”9 (9) In a mortgage foreclosure action, a mortgagor must establish why the mortgaged property should not be seized and sold to pay the mortgagor’s 7 ConAgra Foods Inc. v. Lexington Ins. Co., 21 A.3d 62, 68 (Del. 2011); Pickens v. CitiMortgage, Inc., 2016 WL 1374998 (Del. Apr. 4, 2016). 8 Del. Super. Ct. Civ. R. 56; Pickens, 2016 WL 1374998, at *1. 9 Grabowski v. Mangier, 938 A.2d 637, 641 (Del. 2007). 4 indebtedness.10 Defenses in a foreclosure action are limited to payment, satisfaction, or a plea in avoidance of the mortgage.11 The phrase “plea in avoidance” has sometimes been described as referring to a plea relating “to the validity or illegality of the mortgage documents,” . . . but a more apposite description of “plea in avoidance” [is that it refers] to the common law plea known as confession and avoidance. “Such plea admits the allegations of the complaint but asserts matter which destroys the effect of the allegations and defeats the plaintiff’s right.” “[T]he allegation ‘in avoidance’ must relate to the subject matter of the complaint.” Examples of pleas in confession and avoidance are “act of God, assignment of cause of action, conditional liability, discharge, duress, exception or proviso of statute, forfeiture, fraud, illegality of transaction, nonperformance of condition precedent, ratification, unjust enrichment and waiver.” 12 (10) The Motts do not assert payment or satisfaction. Rather, their arguments may be summarized as follows: (i) the Bank lacks standing to foreclose because it has not demonstrated that it holds both the Mortgage and the Note; (ii) no attorney was present at the closing; (iii) the Bank is not represented by counsel in this litigation and is not an actual participant in the litigation; (iv) the Bank did not timely comply with this Court’s rule governing disclosure of corporate affiliations; (v) the Bank impermissibly moved for summary judgment before the Motts rejected a final loss mitigation offer; (vi) the Bank has not acted in good faith or dealt fairly with the Motts, or it has unclean hands; and (vii) the foreclosure will confer an unfair 10 McCafferty v. Wells Fargo Bank, N.A., 2014 WL 7010781, at *2 (Del. Dec. 8, 2014). 11 Shrewsbury v. Bank of New York Mellon, 160 A.3d 471, 475 (Del. 2017). 12 Id. (footnotes citing Gordy v. Preform Building Components, Inc., 310 A.2d 893 (Del. Super. Ct. 1973), omitted) (third alteration in original). 5 windfall on the Bank in the form of a tax benefit. For the reasons discussed below, we conclude that none of the Motts’ arguments establishes a genuine issue of material fact in dispute, and the Superior Court therefore did not err by granting the Bank’s motion for summary judgment. (11) First, the Motts assert, on various grounds, that the Bank cannot foreclose because it has not established that it holds both the Mortgage and the Note, as required under Delaware law.13 The record reflects that Equity One, the initial lender, endorsed the Note to Popular ABS, Inc. and that Popular ABS endorsed the Note to JPMorgan Chase Bank as Trustee for the benefit of the Certificateholders of Popular ABS, Inc. Mortgage Pass-Through Certificates Series 2006-C (“JPMorgan Chase”).14 JPMorgan Chase then transferred the Note to the Bank by an allonge dated September 30, 2010.15 The record also reflects that MERS, the initial mortgagee, assigned the Mortgage to the Bank by a Corporation Assignment of Mortgage dated August 31, 2010.16 (12) Thus, on their face, the documents in the record indicate that the Bank holds both the Mortgage and the Note, and that it held them at the time that it initiated this foreclosure action in 2017. The Motts’ various arguments to the contrary do not 13 Opening Brief, Arguments 3, 4, 5, 6, 7, 8, 9, 11, 17. See generally Shrewsbury, 160 A.3d 471 (holding that “a mortgage holder must be a party entitled to enforce the obligation, mortgage money, which the mortgage secures in order to foreclose on the mortgage”). 14 Appendix to Opening Brief, at A-305. 15 Appendix to Answering Brief, at B-23. 16 Id. at B-24. 6 create a genuine issue of material fact in dispute. The Bank is not required to produce the original note in order to foreclose,17 and Ocwen’s failure to attach the allonge to the “Lost Note Affidavit” that Ocwen prepared in 2016 does not raise a genuine issue about a material fact, because a copy of the allonge, dated September 30, 2010, is in the record. Whether MERS had “possession or authority to assign the Note”18 is not a genuine issue of material fact because MERS assigned the Mortgage, not the Note. Similarly, whether Ocwen was “ever a person in possession”19 of the Note in accordance with 6 Del. C. § 3-309 is not a genuine issue of material fact because Ocwen is not the party seeking enforcement of the Note. 20 (13) Second, the Motts argue that the Mortgage and the Note are not enforceable because no attorney was present at the closing.21 Although the Motts assert that Equity One’s closing agent provided unsatisfactory, or even erroneous, answers to questions that they asked at closing, they admit that they proceeded with settlement anyway. And they do not contend that anyone prevented them from retaining counsel in order to obtain legal advice on the terms of the loan. Nor do they contend that they did not understand that foreclosure could result from their 17 Cf. Coppedge v. US Bank Nat’l Ass’n, 2014 WL 5784006, at *1 (Del. Nov. 5, 2014) (“The Coppedges also fail to cite any relevant authority in support of their contentions that . . . the Bank had to produce an original, wet ink note in order to foreclose on the Property.”). 18 Opening Brief at 14. 19 Opening Brief, Argument 16. 20 See 6 Del. C. § 3-309 (establishing the circumstances under which a person not in possession of a negotiable instrument is entitled to enforce the instrument). 21 Opening Brief, Argument 1. 7 failure to make mortgage payments. In these circumstances, there is no basis to invalidate the mortgage simply because no attorney appeared at the settlement. 22 (14) Third, the Motts argue that the Superior Court’s judgment should be reversed because the Bank is not represented by counsel in this litigation. 23 In the Final Mediation Record that was submitted to the Superior Court, the mediator stated that Ocwen appeared at the mediation as the servicer for the Bank, that the Bank was “not at [the] mediation directly,” and that “Plaintiff’s counsel’s client is Ocwen.” Except in limited circumstances that are not applicable here, a corporation or other business entity may proceed in the Delaware courts only through a duly-licensed attorney.24 The plaintiff-appellee in this case is the Bank. Daniel Conway of Orlans PC and James Carignan of Duane Morris LLP, both of whom are members of the Delaware bar, have entered appearances on behalf of the Bank in this appeal. Mr. Conway and Melanie Thompson, who is also a Delaware attorney, entered appearances on behalf of the Bank in the Superior Court. Mr. Conway has also signed pleadings, briefs, and affidavits stating that he is the “attorney for Plaintiff.” These Delaware attorneys therefore have represented to this Court and the Superior 22 See Manley v. MAS Assocs., LLC, 2009 WL 378172, at *3 (Del. Feb. 17, 2009) (rejecting borrower’s claim that order granting summary judgment in a foreclosure action should be reversed based on the absence of a Delaware attorney at closing, because the borrower received the full benefit of the loan and understood that not paying his loan would result in foreclosure). 23 Opening Brief, Arguments 2, 13. 24 Transpolymer Indus., Inc. v. Chapel Main Corp., 1990 WL 168276 (Del. Sept. 18, 1990). 8 Court that they represent the Bank, and the Motts have failed to establish a cognizable defense to this foreclosure action on these grounds. 25 (15) Fourth, the Motts assert that the Bank did not timely comply with this Court’s rule governing disclosure of corporate affiliations. 26 This argument does not warrant reversal because it does not fall within the available defenses to a foreclosure action27 and, in any event, the Bank has since filed the disclosure. (16) Fifth, the Motts rely on 12 C.F.R. § 1024.41(g) to argue that the Bank prematurely moved for summary judgment, because it filed the motion for summary judgment before the Motts rejected a final loss mitigation offer. 28 Section 1024.41(g) is part of Regulation X, which the federal Bureau of Consumer Financial Protection codified to implement the Real Estate Settlement Procedures Act of 1974 (“RESPA”).29 Among other things, Regulation X prohibits “dual-tracking,” which is the “common name for the home financial service industry practice of pursuing a foreclosure action against a delinquent borrower while the borrower is attempting to obtain some loss mitigation option to prevent foreclosure.” 30 25 See generally Shrewsbury, 160 A.3d at 475 (recognizing the defenses available in a foreclosure action as payment, satisfaction, or a plea in avoidance of the mortgage). 26 Opening Brief, Argument 10. 27 See Shrewsbury, 160 A.3d at 475 (discussing the available defenses to foreclosure). 28 Opening Brief, Argument 12 (citing 12 C.F.R. § 1024.41(g)(2)). 29 See Homebuyers Inc. v. Watkins, 2019 WL 2361760, at *12 (Neb. Ct. App. June 4, 2019) (discussing RESPA and Regulation X). 30 Id. 9 (17) Section 1024.41(g) provides that “[i]f a borrower submits a complete loss mitigation application after a servicer has made the first notice or filing required by applicable law for any judicial or non-judicial foreclosure process but more than 37 days before a foreclosure sale, a servicer shall not move for foreclosure judgment or order of sale, or conduct a foreclosure sale, unless . . . (2) The borrower rejects all loss mitigation options offered by the servicer . . . .”31 It is not clear from the record whether or not the Bank failed to comply with Section 1024.41(g), but we conclude that, even if it did, its failure to comply does not warrant reversal of the Superior Court’s judgment. The Motts do not cite any authority for the proposition that a violation of Section 1024.41(g) precludes foreclosure. Rather, the first sentence of Section 1024.41 provides that a “borrower may enforce the provisions of this section pursuant to section 6(f) of RESPA.” 32 Section 6(f) of RESPA authorizes a borrower to recover damages from “[w]hoever fails to comply with any provision of this section.”33 “[C]ourts have repeatedly rejected attempts to have a foreclosure sale declared void due to alleged noncompliance with this loan modification regulation.”34 The Motts’ remedy for the Bank’s alleged failure to comply with Section 1024.41(g) therefore is not preclusion of the foreclosure. 31 12 C.F.R. § 1024.41(g). 32 12 C.F.R. § 1024.41(a). 33 12 U.S.C. § 2605(f). 34 Biles v. Roby, 2017 WL 3447910, at *4 (Tenn. Ct. App. Aug. 11, 2017) (citing cases). 10 (18) Sixth, the Motts contend that the Superior Court’s judgment should be reversed because the Bank has not acted in good faith, has engaged in unfair dealing, or has unclean hands.35 Their arguments in support of that contention largely overlap with their other arguments. They do argue that the Bank “use[d] the Dormancy Docket in a way that constitutes bad faith.”36 They seem to offer this argument as further support for their position that the Bank does not hold both the Mortgage and the Note. The dormant docket issue does not change our conclusion with respect to the standing issue. To the extent that the Motts are attempting to make some other argument about the dormant docket, this case was never placed on the dormant docket. Moreover, as a general matter, the placement on the dormant docket of the earlier foreclosure action that was brought by MERS—and the eventual dismissal of that case—does not constitute a defense to a later foreclosure proceeding, because the administrative directive provides that such dismissals are without prejudice.37 (19) Seventh, the Motts seek reversal on the grounds that the Bank will receive an unfair windfall in the form of a tax benefit as a result of the foreclosure. 38 35 Opening Brief, Arguments 14 and 16. 36 Opening Brief at 20. See also id. at 19 (“The timing of the transfers to BONY coinciding with the MERS case being put on the Dormant Docket within hours is shocking. Further the MERS case continued on the Dormant Docket until timing out and being dismissed.”). 37 See Del. Super. Ct. Admin. Directive No. 2008-3, ¶ 4 (Oct. 27, 2008) (providing for dismissal “without prejudice” of cases that have been on the dormant docket for at least twenty-four months). See also Del. Super. Ct. Admin. Directive No. 2013-4, ¶ 5 (Oct. 10, 2013) (same) (superseding Del. Super. Ct. Admin. Directive No. 2008-3). 38 Opening Brief, Argument 15. 11 In addition to being raised for the first time on appeal, 39 this argument does not fall within the defenses that are available in a foreclosure action. 40 NOW, THEREFORE, IT IS ORDERED that the judgment of the Superior Court is AFFIRMED. The appellants’ motion to stay confirmation of the sheriff sale pending this appeal is moot. BY THE COURT: /s/ Gary F. Traynor Justice 39 See DEL. SUPR. CT. R. 8 (“Only questions fairly presented to the trial court may be presented for review; provided, however, that when the interests of justice so require, the Court may consider and determine any question not so presented.”). 40 See Shrewsbury, 160 A.3d at 475 (discussing the available defenses to foreclosure). 12
In just the past few years, mobile development has changed greatly in terms of not only what is capable on a pocket-sized device, but also in terms of what users want and expect out of the average app. With that, we developers have had to change how we build things in order to account for more complex, robust applications. The Android development community in particular has had a huge shift in focus (hopefully 🙏) from massive, logic-heavy Activities, to MVWhatever based approaches to help split our logic out. Most of us have also adopted the Observer Pattern through libraries like RxJava, dependency injection with Dagger, and more extensive testing. These tools, along with the adoption of Kotlin and the introduction of Architecture Components, have made it easier and easier to get off on the right foot with new Android apps to help ensure their maintainability and scalability for the future. However, these simple patterns are really just the tip of the iceberg and as our apps have some time to grow and mature in the wild, it is often necessary for us to employ other design patterns to allow applications to grow without becoming an unmaintainable mess. In this article, I’d like to take a look at some other common object oriented design patterns that have been around for while in the software world, but are talked about a little less in the typical Android development article. Before taking off and trying to implement these on your app as soon as you’re done reading, it’s worth noting that although these are good principles to abide by, using all or even some of them when they aren’t really necessary can lead to overly convoluted code that ends up being harder to understand than it needs to be. Not every app needs to implement them, but the key is to know when it’s time to start. Okay, enough of an intro, let’s get started! Note: All examples are in Kotlin, so it’s recommended to be fairly familiar with the language and / or have this reference guide on hand The Adapter Pattern The adapter pattern is a strategy for adapting an interface from one system so that it works well in another, usually by abstracting away implementation via an interface. It is a common and useful design pattern that can help make components that are hard to reuse or integrate into a system more susceptible to doing so by changing (wrapping) their interface with one we design ourselves. In fact, it’s no coincidence that a RecyclerView.Adapter is named as such. Although every RecyclerView (or even each cell in a single RecyclerView ) is going to likely display something different, we can utilize the common adapter interface for each ViewHolder . This allows for an easy way to hook into a RecyclerView but also gives the flexibility of allowing for different data types to be shown. This idea can be utilized in other areas as well. For example, say we’re working with a web API that doesn’t quite give us the data we need throughout the rest of our app. Maybe it gives us too much info, or gives shortened versions / acronyms of certain information in order to save cellular data, etc. We can build our own adapters to convert these API results to something that useful to the rest of our application. For example let’s take a look assume we’re making a basic ticketing app and have a TicketResponse that looks something like this after being converted from JSON to a Kotlin data class (note: not actually what our web API looks like): 1 2 3 4 5 6 data class TicketResponse ( val seat : String = "R17S6" , val price : Double = 50.55 , val currency : String = "USD" , val type : String = "Mobile" ) For the sake of example, ignore the debate on whether or not this is a good looking API model. Let’s assume that it is, but regardless it’s a little messy for us to use throughout our application. Instead of R17S6 we’d really like to have a Row model with a value of 17 , and a Seat model with a value of 6 . We’d also like to have some sort of Currency sealed class with a USD child that will make life much easier than what the API currently gives us. This is where our the Adapter pattern comes in handy. Instead of having our (presumably Retrofit based) API return the TicketResponse model, we can instead have it return a nicely cleaned up Ticket model that has everything we want. Take a look below: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 data class Ticket ( val row : Row , val seat : Seat , val price : Currency , val type : TicketType ) class TicketApiClient { fun getTicket (): Ticket { val ticketResponse : TicketResponse = getTicketResponse () return TicketAdapter . adapt ( ticketResponse ) } } object TicketAdapter { fun adapt ( ticketResponse : TicketResponse ) = Ticket ( row = TicketUtil . parseRow ( ticketResponse . seat ), seat = TicketUtil . parseSeat ( ticketResponse . seat ), price = CurrencyUtil . parse ( ticketResponse . price ), type = TicketUtil . parseType ( ticketResponse . type ) ) } Although there’s still some improvements that could be made here ( Api likely would return an RxJava Single for threading purposes), this little adapter gives us a nice clean Ticket model that’s much easier to use throughout the rest of our app than the model our Api gives us. There’s obviously many more usages for the adapter pattern, but this is a pretty straightforward one that most apps will likely find useful at some point along the way. The Façade Pattern Simply put, the façade pattern hides complex code behind a simple, easy to use interface. As our apps grow, there is bound to be some complicated business logic that comes about in order to implement product requirements. The façade pattern helps us not to have to worry about how those complex business logic implementations work, and instead let us plug into them very easily. Staying on the ticket theme, we may have some caching mechanisms implemented to ensure that users are able to view their tickets, even though they may not have service in the venue when they scan in. This logic is probably housed in some sort of TicketStore class that may have references to our TicketApiClient class above, our database, and maybe even a memory cache so we can load tickets as quick as possible. Determining where to load the tickets from can get pretty complicated pretty quickly and we therefore want to keep this logic isolated and abstracted away from those classes simply trying to get a reference to a ticket object to display on the screen for example. Let’s say we have a basic Model-View-Presenter architecture set-up. Our presenter shouldn’t have to worry about whether the ticket comes from the server, a memory cache, or from disk, it should just be able to say “Hey TicketStore , give me a ticket!” and get one back without having any knowledge of where it came from. This is where the Façade pattern comes into play. Our TicketStore class is a Façade that hides anything related to storing tickets behind a simple interface with potentially one simple method called something like getTicket(id: Int) : Ticket . Integrating with this interface now becomes incredibly easy. 1 2 3 4 5 6 7 class TicketPresenter ( view : TicketView , ticketStore : TicketStore ) { init { ticketStore . getTicket ( SOME_ID )?. let { view . show ( it ) } } } The Command Pattern The command pattern utilizes objects (value / data classes) to house all the information needed to perform some action. This is a design pattern that is becoming more and more common in Android development these days, largely due to lambdas / higher-order functions (functions that take in functions) available in Java 8 / Kotlin. With the command pattern, we can encapsulate a request or an action as an object. This object can take in function types that are executed when the request is handled. We tend to typically use these with third party libraries such as RxJava , but they can actually be useful for various internal APIs that we may have throughout our applications as well. Consider some sort of UI transition API we’ve created internally to help manage different view states. Let’s say we want to transition from the Loading state of our screen to the Content state. Let’s also say want certain actions to be executed before and after we make this transition. With the command pattern (and Kotlin), this becomes fairly trivial. First we have our Transition class that takes in the layout to transition to, as well as functions to be executed during the transition process. 1 2 3 4 5 6 data class Transition ( @LayoutRes val layoutRes : Int , val beforeTransition : () -> Unit , val onViewInflated : ( View ) -> Unit , val afterTransition : () -> Unit ) We then have some sort of TransitionCoordinator class that is able to take in Transition objects and perform our transition as well as execute these various actions when needed. The key piece of the puzzle that makes the command pattern so useful is that the TransitionCoordinator doesn’t need really know anything about the calling class in order to go about this transition process. It is very generic and can take in functions from any class without knowing its innards. This makes the command pattern very powerful while being quite generic. This TransitionCoordinator might look something like this: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 class TransitionCoordinator { fun startTransition ( transition : Transition ) { transition . run { beforeTransition () val view = inflate ( layoutRes ) onViewInflated ( view ) doTransition () afterTransition () } } fun inflate ( @LayoutRes layoutRes : Int ): View = { /* Inflation code */ } } Thanks to the brevity of Kotlin, we are able to execute this transition process in very few lines of code. In our Activity (or wherever we’re calling this code) we can now do something like this. 1 2 3 4 5 6 7 8 transitionCoordinator . startTransition ( Transition ( layoutRes = R . layout . activity_sample , beforeTransition = { unsubscribeObservables () }, onViewInflated = { view -> bind ( view ) }, afterTransition = { fetchData () } ) ) In this scenario we want to transition to some sample activity, unsubscribe to some observables before our transition, bind the newly inflated view upon transition, and fetch data after we’ve transition. Of course, once we brought this into the real world, our implementation would likely not be this simple, but it’s easy to see that encapsulating these method calls with “Command” objects makes them generic and easy to use. Null Object Pattern One other convenient design pattern, but possibly less frequently used is the “Null Object Pattern”. For those of us who have been Android developers for ~2+ years (before Kotlin came into play), we are all too familiar with null pointer exceptions that bring our apps to a crippling crash. Kotlin has helped to reduce this greatly, but there are still some cases in which we may need to account for null or empty states. The null object pattern can help us in scenarios where, although we may not have the necessary data to say populate a view, we still want to show some sort of empty (null) state in the meantime. This is only one potential example, but is a good place to start. Consider some sort of MVWhatever framework we’ve implemented in our UI layer. Our View takes in ViewModel s and shows them on the screen. Let’s say for instance we’re displaying a user’s profile. In the ideal scenario, we simply fetch the profile from our database, cache, api or wherever and display it on the screen. Simple as that. However, what do we show if api request is taking a very long time? Maybe the user has bad cell signal or our server is at high demand for some reason. Of course we’ll want to show some sort of loading indicator here to let the user know we’re working on loading this info, but one other cool thing we can do is actually populate the view with an “null” or empty user state. Many popular apps (Facebook, Twitter, etc) utilize this type of pattern to give the app the appearance of loading even faster than it technically is. Let’s take a look at brief bit of code to help make better sense of this. 1 2 3 interface ViewModel { val titleText : String } 1 data class UserViewModel ( val user : User , override val titleText : String = user . name ) : ViewModel 1 data class NullViewModel ( override val titleText : String = "" ) : ViewModel So what we have here is a ViewModel interface that holds the titleText we want to show on the screen as well as a couple of data classes that implement this interface and pass the necessary bits of data for the view to show what it needs to. Take a look at the NullViewModel data class. It might look pointless to pass this object to the view since there’s really nothing to show. However, by passing this model instead of waiting, our view can start to draw and allocate space on the screen. We can then even recycle this view when a real UserViewModel is available to make our rendering time even faster. Again, this is just one of many applications of this design pattern, and although it’s very simple it can be very useful in the right scenario. Hope you enjoyed this little list of some design patterns less talked about in the Android development community. Again, there are not always applications for all of these, and they should only be used when the provide a tangible benefit to your app. There’s many more design patterns out there, each with their own specific purpose. A couple great books that go more in depth into different patterns can be found here and here. Happy coding! We’re hiring! Learn more here
Elmo, Cookie Monster visit Vt. Children's Hospital 'Sesame Street' characters make rounds at Fletcher Allen Turn a corner in the halls for Vermont Children's Hospital at Fletcher Allen Tuesday, and you were likely to encounter two big, furry characters from "Sesame Street." Elmo and Cookie Monster made their rounds, helping kids like William Leach forget they were at the hospital. "And then these guys showed up, and he's real happy, something to tell his friends, making sure I got a picture of it. So, really enjoys it. You know they came in, gave him a high-five and a hug and all that, and brightened his day up. Makes it easier to deal with everything that's been going on and waiting for the tests and stuff," said William's father Jason Leach. This isn't the first time the furry friends have visited Fletcher Allen. "Sesame Street Live" swings by the Children's Hospital when it's in town to perform at the Flynn. Specialists at Vermont Children's Hospital look forward to the visits every year. They say "Sesame Street" is right up their alley. "They're really amazing with the kids, which is nice. To see that bright smile on a child's face when they're feeling kind of yucky or kind of bummed out for being in the hospital, that type of exposure is just wonderful," said Child Life Specialist Jennifer Dawson. Patient Daniel Wicks had no idea who was coming to visit. "I was surprised," he said. Daniel is recovering from surgery on his appendix. "It wasn't a very nice day, but it's more fun," he said after the visit. Staff and parents say visits like the one from "Sesame Street Live" is part of what makes Vermont Children's Hospital special. They say it helps kids forget where they are for a little while and lets them just be kids instead of patients. "Stuff like this is awesome. It really makes their day better," said Leach.
Publications President Barack Obama today signed the Dodd-Frank Wall Street Reform and Consumer Protection Act into law . The Act provides for a new Financial Stability Oversight Council, governmental “resolution authority” for failing financial institutions, agency reorganization, a new Consumer Financial Protection Bureau and a federal Insurance Office, and it imposes tougher capital, leverage and liquidity requirements on depository institutions. It also creates new requirements for derivatives, hedge funds, private-equity funds, credit rating agencies, debit card interchange fees and corporate governance, among others. Our comprehensive summary on the Act and the deadlines of anticipated rulemaking by the regulators can be found here. In addition, the complete text of the provisions of the Act summarized in this client alert can be found here. In this client alert, we discuss the provisions of the Act addressing executive compensation, corporate governance, the definition of “accredited investor” for purposes of capital raising and relief from the independent auditor attestation provision of the Sarbanes-Oxley Act for certain public companies. Many of the executive compensation and corporate governance provisions are expected to be applicable to the 2011 proxy season. We note below the SEC rulemaking schedule and possible exemptions. We also provide where appropriate “Action Items” that companies should consider pending further regulatory action. The final version of the Act did not address majority voting for election of directors, limits on executive compensation or mandatory board risk committees for non-financial companies. Section 951 of the Act requires companies subject to the proxy solicitation rules to submit for stockholder vote a separate non-binding advisory resolution to “approve the compensation of executives, as disclosed pursuant to” Item 402 of Regulation S-K, not less frequently than once every three years. In addition, at least once every six years, stockholders in such companies must be given the opportunity to determine whether the say on pay proposal will be submitted annually, biennially or triennially. Over the past several years, stockholder groups and governance activists have sought a stockholder vote on executive compensation as a means to influence senior executive pay. The proposals have generally taken the form of a nonbinding resolution requesting that the company seek approval of some or all of a company’s executive compensation disclosed in its proxy statement. Such proposals are known as Say on Pay (SOP). SOP proposals have become common in the United Kingdom and Europe and have gained popularity here in the United States; here, some public companies have voluntarily submitted SOP proposals to their stockholders. The SOP proposal required by Section 951 of the Act is non-binding and advisory in nature. This means that, whether the SOP proposal is approved or rejected by a company’s stockholders, a company will not be required to take any specific action based solely on the outcome of the vote. Indeed, the broad nature of the SOP proposal, which is essentially an up or down vote on all of the executive compensation disclosed in the company’s proxy statement, will make it difficult to gain clarity as to the reasons behind either approval or rejection of the proposal. Moreover, while SOP proposals are prevalent outside the United States, these proposals do not have a significant history in the United States, and accordingly, there is not much experience on what the rejection of an SOP proposal might mean to a public company. The stockholders of three public companies failed to approve SOP proposals so far in 2010; unfortunately, however, it is difficult to generalize about the reasons for a failure to obtain stockholder approval. Stockholders will be reviewing both the information about executive compensation, and perhaps more importantly, the company’s explanation as to the compensation paid to the executives, in considering these SOP proposals. Compensation committees should therefore focus on good governance principles in making compensation decisions for executives, and companies should be transparent in disclosure regarding the process undertaken and the reasons for all executive compensation decisions. Stockholder rejection of a SOP proposal may be viewed as a vote of no confidence by the stockholders in the company’s executive compensation program, and will likely have repercussions with respect to the company’s governance posture and stockholder relations. The Act requires two proposals to be included in the proxy statement for the first annual or other meeting requiring compensation disclosure occurring more than six months after the enactment of the Act: (1) an advisory proposal on executive compensation and (2) another proposal relating to the frequency of submitting the SOP proposal to stockholders at future annual meetings. The SEC has the authority to exempt an issuer or a class of issuers from any of the requirements relating to the requirements relating to these SOP proposals, and is expressly directed to consider if these requirements disproportionately burden small issuers. Every institutional investment manager is required to report at least annually how it voted on any SOP proposal. SEC action required: No. However, SEC rulemaking is likely since the SEC adopted new Rule 14a-20 under the Exchange Act earlier this year addressing instances when a recipient of financial assistance under the Troubled Asset Recovery Program is required to provide its stockholders with a non-binding SOP vote to approve the compensation of executives, as disclosed pursuant to Item 402 of Regulation S-K. Action items: Companies will want to study the policies of advisory firms such as Risk Metrics/ISS and Glass, Lewis & Co. in reviewing compensation and, to the extent the company’s compensation policies may run afoul of those policies, consider alternatives or develop explanations for the current compensation policies based on the company’s unique circumstances. Pay for performance is clearly a key area of stockholder concern, and companies will want to focus on demonstrating this element in the company’s executive compensation design, as applicable. See below regarding the new requirements for disclosure regarding pay versus performance in Section 953 of the Act. In addition, companies will want to consider the appropriate frequency of SOP proposals for their company (e.g., every one, two or three years), in light of the company’s governance posture generally, in making the proposal relating to frequency of such proposals. Section 951 of the Act requires companies to provide a non-binding advisory vote on compensation paid to named executive officers in connection with an acquisition, merger, consolidation, or proposed sale or other disposition of all or substantially all of the company’s assets in a business combination transaction (generally referred to as “golden parachutes”). The vote would occur at the time the transaction is approved by the stockholders, and is required unless the golden parachutes were previously subject to a stockholder vote pursuant to the SOP proposal described above in Section 1 of this client alert. Section 951 also requires the enhancement of disclosure required for golden parachute arrangements. Following the stockholder vote on the initial SOP proposal described in Section 1 of this client alert, the company’s existing arrangements should be exempt from the further nonbinding advisory vote. New compensation arrangements following the SOP vote will require the separate advisory vote, however. It remains to be seen what effect the separate advisory vote on golden parachute payments will have on the stockholder vote for the business combination transaction itself; separating the issues of compensation from the business combination transaction may be beneficial to the goal of obtaining votes on the transaction itself, because it allows a separate vote on the compensation, or it may further highlight the executive compensation paid or payable as a result of the deal, making it more difficult to get affirmative votes on the transaction itself in some cases. The SEC has the authority to exempt an issuer or a class of issuers from any of the requirements relating to the requirements relating to these golden parachute proposals, and is expressly directed to consider if these requirements disproportionately burden small issuers. Every institutional investment manager is required to report at least annually how it voted on any golden parachute proposal. SEC action required: Yes. The SEC is required to adopt rules relating to this section within six months after the enactment of the Act. Action items: The company’s compensation committee should carefully consider any new agreements or contracts with the named executive officers entered into in the context of a business combination, or otherwise providing compensation in a change of control transaction, and not previously subject to stockholder vote under prior SOP proposals. To the extent there are any new change in control arrangements, severance agreements or other retention or incentive payments triggered by the business combination transaction, and not previously described in the company’s proxy statement, the company will need to be able to explain the rationale for these payments. It is likely that following the adoption of new SEC rules, there will be enhanced disclosure regarding existing golden parachute arrangements. 3. Compensation Committee Independence Section 952 requires the SEC to adopt rules directing the national securities exchanges and national securities associations to prohibit the listing of equity securities of a company that does not have an independent compensation committee. In this regard, the Act imposes separate and higher standards for independence of compensation committees, much like the independence requirements for audit committees imposed by the Sarbanes-Oxley Act. The SEC rules are to require exchanges and associations to take into account the sources of compensation of a member of the board of directors of a company, including any consulting, advisory, or other compensatory fee paid by the company to the member and whether the committee member is affiliated with the company. A specific exemption is available for controlled companies as defined in the Act. Certain foreign private issuers are exempt from these provisions. The Act specifically gives the SEC exemptive authority to allow the exchanges and associations to exempt other relationships with respect to the members of the compensation committee taking into account the size of the issuer and any other relevant factors. SEC/Exchange action required: Yes. The SEC is required to adopt rules relating to Section 952 no later than 360 days after the enactment of the Act. The exchanges and associations will also have to revise their “independence” rules to comply with the SEC’s new rules. The SEC is to provide appropriate procedures for a company to have a reasonable opportunity to cure any defects that would be the basis for delisting under these rules. The Act does not set a time within which the exchanges and associations are required to act once the SEC revises its rules. Action items: Following the promulgation of the new SEC standards on independence, each company’s nominating committee or board of directors should review the qualifications of the members of its compensation committee to determine whether all members are likely to satisfy these new independence requirements, and consider if additional or different directors need to be recruited to the board of directors to permit constitution of a wholly independent compensation committee meeting these requirements. Similarly, if a company has relied on the “exceptional and limited circumstances” exemption available under listing standards, attention should be given to changing the composition of the compensation committee once the new SEC standards are promulgated. If a company does not currently have a separate compensation committee, relying on exchange rules permitting the board of directors to serve such functions, the board of directors should consider the formation of such a committee following the promulgation of the SEC rules on independence, and consider whether the company needs to recruit additional directors who will satisfy these new independence requirements. The charter of an existing compensation committee may need to be updated to take into account the new independence standards. 4. Independence of Compensation Consultants and other Advisors Section 952 provides that compensation committees that engage compensation consultants or legal counsel must consider factors that may affect their independence. The SEC is directed to adopt rules directing the national securities exchanges and national securities associations to prohibit the listing of equity securities of a company that does not comply with this requirement. These rules will identify the factors to be included in the listing standards for the exchanges, that affect the independence, including other services provided to the company by the advisor, the amount of fees received from the company by the advisor as a percentage of the total revenue of the advisor, conflict of interest policies of the advisor, any business or personal relationships between the members of the compensation committee and the advisor, and any stock of the company owned by the advisor. These factors are to be competitively neutral and are to preserve the ability of compensation committees to retain the services of providers. A specific exemption is provided for controlled companies as defined in the Act. This section does not require independence of any advisor and leaves the selection of advisors to the direction of the compensation committee which remains directly responsible for the appointment, compensation and oversight of the work of the compensation consultant, independent legal counsel or other advisors. Beginning with the first annual meeting of stockholders held more than one year after the enactment of the Act, companies are required to disclose whether the compensation committee retained or obtained the advice of a compensation consultant and whether the work of the compensation consultant has raised any conflict of interest and, if so, the nature of the conflict and how the conflict is being addressed. Each company is also required to provide appropriate funding, as determined by the compensation committee, for reasonable compensation to consultants, independent legal counsel and other advisors. The Act specifically gives the SEC exemptive authority to allow the exchanges and associations to exempt a category of issuers from the requirements of this section taking into account the potential impact on smaller reporting issuers. The SEC is also instructed to conduct a study and review the use of compensation consultants and the effect of such use, to be submitted to Congress no later than two years after enactment of the Act. SEC action required: Yes. The SEC is required to adopt rules relating to this section no later than 360 days after the enactment of the Act. The SEC is directed to provide in its rules appropriate procedures for a company to have a reasonable opportunity to cure any defects that would be the basis for delisting. Action items: Companies should consider revisions to the charter of the compensation committee upon the publication of the new rules in light of these new requirements. Compensation committees will want to review any existing engagements of compensation consultants, legal counsel and any other advisors in light of these new requirements, once promulgated, and prepare any necessary disclosure regarding the engagement of compensation consultants. 5. Additional Executive Compensation Disclosure Section 953 requires the SEC to adopt rules requiring each public company to disclose in its annual proxy statement the relationship between executive compensation actually paid and the financial performance of the issuer, taking into account any change in the value of the shares of stock and dividends of the company and any distributions to stockholders. Graphic presentations are expressly permitted. Further, the rules will require disclosure of the median of the annual total compensation of all employees of the company other than the chief executive officer, the annual total compensation paid to the chief executive officer, and the ratio of those two amounts. SEC action required: Yes. There is no specific deadline for SEC action pursuant to this section. Action items: New compensation disclosure, potentially including new graphical representations, will need to be developed once the SEC rules are promulgated. We expect the SEC to provide additional clarity when it proposes the relevant rules. Compensation committees will want to review the information required by this section and determine if any changes in executive compensation are appropriate in light of the ratios and the disclosure regarding financial performance, and consider any further disclosure of the compensation committee’s view of executive compensation in light of these disclosures. 6. Clawback policies Section 954 requires the SEC by rule to direct the national securities exchanges and the national securities associations to prohibit listing the equity securities of a company that does not implement a clawback policy allowing the company to recoup incentive-based compensation if the company is required to restate its financials due to material noncompliance with any financial reporting requirement under the securities laws. The clawback policy must apply to any current or former executive officer of the company who received incentive-based compensation (including stock options awarded as compensation) during the three-year period preceding the date on which the company is required to prepare an accounting restatement. This means that the clawback policy must have a three-year lookback from the date of the restatement and require repayment of incentive compensation in excess of what would have been paid under the accounting restatement. The clawback required by this section would require recovery in a broader set of circumstances than the SEC’s recovery authority under Section 304 of the Sarbanes-Oxley Act, and in particular, without regard to whether there was any misconduct. Further, a broader class of persons is subject to the clawback policies under Section 954, than under Section 304 of the Sarbanes-Oxley Act, which addressed recovery from a company’s chief executive officer or chief financial officer, while Section 954 seeks recovery from any current or former executive officer. This Section also directs the SEC to promulgate enhanced disclosure rules for incentive-based compensation. SEC action required: Yes. There is no specific deadline for the rules required by this section. Action items: Once the final rules are promulgated, compensation committees will want to review existing compensation policies, agreements and benefit plans to see whether any amendments are necessary in light of the new rules. Any “clawback” policies previously adopted by a company may not apply to all executive officers, or to all incentive-based compensation, or may not reach former executive officers. Compensation committees will need to consider whether or how to impose the new requirements on any former employees not subject to such policies at the time of their departure; the new rules promulgated by the SEC may address this issue of retroactivity. Companies will need to prepare disclosure required by the new rules on the company policies. CORPORATE GOVERNANCE 7. Authority Granted to the SEC to Adopt Proxy Access. Section 971 amends Section 14(a) of the Exchange Act to give the SEC express permission to issue rules requiring that a solicitation of proxy, consent, or authorization by or on behalf of a company include a nominee submitted by a stockholder to serve on the board of directors of the company, including procedures in relation to such solicitations (also know as “proxy access”). By the way of background, stockholders and corporate activists have championed proxy access as a means to remove impediments under the federal proxy laws to a stockholder’s ability to exercise their fundamental rights under state corporate law to nominate and elect directors. The SEC has previously proposed changes to the federal proxy rules to address proxy access, but has met considerable opposition from the business community. The bulk of the controversy surrounding the adoption by the SEC of these rules revolves around the percentage of beneficial ownership a stockholder must have and the length of the period for which such securities of the company should be held by the stockholder before such stockholder can submit a proposal to the company This section permits, but not require, the SEC to issue rules permitting the use by a stockholder of proxy solicitation materials supplied by a company for the purpose of nominating individuals to membership on the board of directors of the company, “under such terms and conditions as the SEC determines are in the interests of stockholders and for the protection of investors.” We expect the SEC to adopt these rules on a fairly expedited basis. In fact, the SEC Chair Mary Schapiro has indicated that she expects proxy access to be adopted in time for the 2011 proxy season. The SEC’s rules may resemble its most recent proposal on proxy access, which companies may wish to review. A summary of the prior SEC’s proposals on “proxy access” made by the SEC in June 2009 is available here. The SEC is expressly authorized to exempt classes of issuers and is directed to consider whether the rules disproportionally burden small reporting issuers. SEC action tequired: Yes. There is no specific deadline for SEC action. Action items: No action is required until the SEC publishes rules on proxy access. 8. Disclosure of Employee and Director Hedging Section 955 requires the SEC to adopt rules requiring each company to disclose in its proxy statement whether its employees or directors may purchase financial instruments (including prepaid variable forward contracts, equity swaps, collars and exchange funds) that are designed to hedge or offset any decrease in the market value of the company’s securities. SEC action required: Yes. There is no specific deadline for SEC action. Action items: The appropriate board committee should review company policies, including the company’s insider trading policies and corporate governance guidelines, in light of the new rules to be issued by the SEC, and determine if the company requires any revisions to or a new policy with respect to hedging. 9. Establishes new rules related to broker non-votes Section 957 prohibits broker discretionary voting on director elections, executive compensation or other significant matters to be determined by the SEC based upon its rulemaking. Broker discretionary voting on most of these matters has, however, already been eliminated SEC action required: Yes. There is no specific deadline for the rules required by this section. Action items: Companies will need to review the new SEC rules when promulgated to determine any further impact on voting and the ability to obtain a quorum. 10. Disclosures Regarding Chairman and CEO Structures Section 972 requires the SEC to adopt rules that require a company to disclose in its proxy statement the reason why the company chose either the same person or different persons to fill the role of Chairman of the Board and Chief Executive Officer. SEC action required: Yes. SEC rulemaking is required within 180 days after the enactment of this subsection. New Item 407(h) of Regulation S-K appears to cover this requirement, however. Action items: Following the promulgation of any new SEC rules, companies will need to determine if any further action is required. 11. Beneficial Ownership and Short Swing Profit Reporting Section 929R amends Section 13(d)(1) of the Exchange Act to permit the SEC to shorten the time for filing reports on beneficial ownership required under Regulation 13D-G from the time period now applicable and by eliminating the requirement to send to the company and the applicable national securities exchange a copy of the filing. Similarly Section 16(a) of the Exchange Act is amended to permit the SEC to shorten the time period for filing initial reports of beneficial ownership on Form 3 from the ten day period now applicable, and to eliminate the requirement to deliver a copy of the filing to the applicable national securities exchange. SEC action required: No, but this provision permits the SEC to take regulatory action to shorten filing deadlines for Schedules 13D and Forms 3. There is no specific deadline for SEC action. Action items: No action is required at this time. REGULATION D 12.Changing Definition of an Accredited Investor. Section 413 of the Act adjusts the net worth threshold for “accredited investors” who are natural persons to US$1 million, effective upon the enactment of the Act and for the four years thereafter. The Act does not change the definition of “qualified purchaser” standard under the 1940 Act. The Act also provides that the value of a person’s primary residence shall no longer be taken into account in determining whether a person’s net worth is $1 million dollars. Pursuant to current SEC Rules 215 and 501(a), “accredited investors” include natural persons with income in each of the two most recent years in excess of $200,000, or $300,000 for a couple and with a reasonable expectation to reach the same level in the current year, or with a net worth of $1 million either individually or jointly with the person’s spouse. The amendment to exclude the value of a potential investor’s primary residence in determining whether such “natural person” can be deemed to be an “accredited investor” will likely have a significant impact on capital raising. The SEC is authorized to undertake an initial review of the definition of accredited investor thresholds that are not related to net worth and to adjust or modify the definition of the term. In undertaking this review, the SEC is given a very broad mandate of issues like “protection of investors, in the public interest, and in light of the economy.” In addition, 4 years after the enactment of the Act and not less frequently that once every 4 years thereafter, the SEC is authorized to undertake a subsequent review of the accredited investor definition as such term applies to “natural persons” and to determine whether the requirements of the definition should be adjusted or modified for the “protection of investors, in the public interest, and in light of the economy.” SEC action required: Not initially. However, SEC rulemaking is expected, since the SEC is instructed to undertake two separate reviews and it is likely that each review will result in some changes to the defined term. Action items: Any public or private companies, funds or other intermediaries involved in raising capital will need to revise their subscription documents to incorporate the new net worth test for individual accredited investors and distribute new forms to their agents and prospective investors. Section 989C of the Act amends Section 404 of the Sarbanes-Oxley Act so that Section 404(b) no longer applies to an issuer that is neither a “large accelerated filer” nor an “accelerated filer” as each term is defined by Rule 12b-2 promulgated by the SEC. The SEC is also directed to undertake a study to determine how to reduce the burden of complying with Section 404(b) of the Sarbanes-Oxley Act for companies with market capitalization between $75 million and $250 million for the relevant reporting period. The SEC is to deliver this report to the Congress within nine months after the enactment of the Act. The Sarbanes-Oxley Act imposed numerous substantive corporate governance and disclosure requirements on all SEC reporting companies. As part of this process, Section 404(b) required an independent auditor to attest to, and report on, management’s assessment regarding the effectiveness of a company’s internal control over financial reporting. As a result of the high costs associated with obtaining the independent auditor’s attestation, the SEC has been under pressure to find a solution for smaller companies. After numerous delays in implementing the requirements of Section 404(b), in October 2009, the SEC granted a six month extension for non-accelerated files to begin complying with this section. Non-accelerated filers were required to include an auditor’s report on the effectiveness of internal control over financial reporting beginning with their annual reports for fiscal years ending on or after June 15, 2010. The SEC was on record stating that there would not be any more extensions for Section 404(b) compliance. Accordingly, this section is welcome news to many smaller public companies; it permanently exempts issuers who are neither “large accelerated filer” nor an “accelerated filer” from compliance with the internal control auditor attestation requirements of Section 404(b) of the Sarbanes-Oxley Act. SEC action required: Not initially. However, SEC is required to undertake a study to determine how to reduce the burden of complying with Section 404(b) of the Sarbanes-Oxley Act. It is likely that additional SEC rulemaking may occur once the study is completed. Related topics Related services DLA Piper is a global law firm with lawyers located in more than 30 countries throughout the Americas, Asia Pacific, Europe and the Middle East, positioning us to help companies with their legal needs anywhere in the world. Related Sites DLA Piper is a global law firm with lawyers located in more than 30 countries throughout the Americas, Asia Pacific, Europe and the Middle East, positioning us to help companies with their legal needs anywhere in the world. Select a local version of the site Our site provides a full range of global and local information. Tailor your perspective of our site by selecting your location and language below. If you are interested in exploring additional perspectives, select a different location or visit our Global Reach section.
This Mosquito Repellent Outdoor Lighting System is Powered by Low-Voltage Electricity For many families, the outdoor living area is the favorite “room” of the house. Now considered extensions of the rest of the home, decks, patios, and backyards exist as living and entertaining spaces. Despite the increase in outdoor living conveniences and solutions, a common problem remains: mosquitos. Many homeowners say pesky mosquitoes prevent them from using their outdoor living spaces to the fullest, especially with heightened concerns about mosquito-borne diseases. But now, homeowners can spend even more time outdoors without the nuisance of mosquitoes thanks to our backyard lighting & mosquito repellent system. Each Repellent Cartridge Provides Around 90 Days of Mosquito Protection Each fixture contains a mosquito repellent cartridge. When the system is turned on, low-voltage electricity heats the cartridge, which then produces an odorless, invisible, and silent mosquito repellent vapor. Each fixture repels mosquitoes within a 110-square-foot area, and four fixtures provide enough coverage for the average deck or patio. Season-Long Mosquito Protection Has Never Been More Simple Fixtures are available in two options: a light and repellent fixture featuring LED landscape lighting for added ambiance to outdoor spaces, and a standard repellent fixtures without lighting that provides the same high-quality mosquito protection for areas where lighting is not needed. Black and bronze finishes as well as deck-mounting flanges allow homeowners to further customize the system to fit their landscape’s aesthetics. An optional timer control allows programming the repellent and lighting systems separately for automatic operation triggered by time of day or by solar sensor.
But programs can rise and fall quickly, and perception contributes to both. And this is the kind of season that can really damage what Dantonio has built. That’s more of a concern for the Spartans if they can’t follow up today’s 23-20 loss to Northwestern – a fifth Big Ten loss by a total of 13 points – with a win at Minnesota to get to a bowl game (probably the Buffalo Wild Wings Bowl, Dec. 29 in Tempe, Ariz.) You don’t want this season’s epitaph to read: From Rose Bowl to No Bowl. The Spartans were focused on Pasadena after falling inches short of it a year ago, and now they are stunningly in danger of a losing season. You already have to recruit against Michigan, Notre Dame and Ohio State in your immediate region. You’re already fighting for attention and respect. You’re facing a critical 2013 season, a chance to prove that 2010-11 wasn’t an aberration built on the back of an overlooked, once-in-a-career leader and quarterback. First, you need to keep the bowl streak alive, get the bowl practices, avoid official football disaster. Today actually was different. MSU did a lot of good things on offense, got push up front, got the ball to a healthy Dion Sims (five catches, 102 yards), made some big plays. But the Spartans turned it over four times. That hasn’t been the losing formula for most of the season. The Spartans had a total of 12 turnovers in the first 10 games of the season and were plus-2. Take away the Boise State game, which saw four MSU turnovers, and the Spartans had eight in the next nine weeks. But when you’re losing, you’re finding ways to lose. The Spartans keep doing it, and they’ve run out of different ways to explain it. Contact Joe Rexrode: 313-222-2625 or jrexrode@freepress.com. Follow him on Twitter @joerexrode. Check out his MSU blog at freep.com/heyjoe.
How does someone who failed Year 12 miserably become Australia's first in-house school lawyer? Once a defiant teenager, Vincent Shin and his teachers never expected he would become a lawyer. But Mr Shin managed to overcome a childhood marred by family violence. His experiences have given him the ability to connect with the most vulnerable students, who are desperate for support. Mr Shin's first memory of family violence dates back to when he was five. "I was playing with my sister out the front of our unit," he said. "The door was just flung open and my dad threw my mum outside. She skidded across the concrete and landed in some bushes, and I remember running over with my sister while Mum was lying there." Australia's first school lawyer, Vincent Shin, shares his Year 12 results which ranked at 'less than 30'. ( Supplied: Vincent Shin ) The abuse continued until 2003 when Mr Shin was in his final year of high school and finally stood up to his father. "He hit me in the face," Mr Shin said. "I was 17 and I was a little bit more confident with really standing up to him. "I said to him: 'You're never going to hit me again.' "He stood there at the door and he said: 'Don't ever call me your dad, I have no son.'" As a result, the rest of the year was a write-off for Mr Shin. "I just felt completely empty … just lost," he said. In 2003 he failed Year 12 so badly that his Equivalent National Tertiary Entrance Rank (ENTER) certificate noted only that he received "less than 30". With university studies out of the question, Mr Shin enrolled in a TAFE diploma of business, majoring in legal practice. He did so well at TAFE he scored a place in law at Victoria University. "That's when I thought 'I want to do something in social justice — do something for the community, given my background'," Mr Shin said. Sorry, this video has expired Mr Shin vividly remembers witnessing violence in his childhood home. Not the typical lawyer A breakdancer and a boxer in his spare time, Mr Shin arrives at The Grange P-12 College in Melbourne's outer west on a motorbike each day. As he walks through the schoolyard, helmet and gloves in hand, teenagers high-five him. "Sometimes [we] see him roaring in the streets and it's very funny," Year 11 student Eddie Shastri said. Many of the 1,700 students at the college come from lower socio-economic backgrounds and some have legal issues. Four years ago the school's social worker, Renee Dowling, phoned the local community legal centre asking for help. "If we had a lawyer in the school that [students] could approach and get advice from, that could absolutely change the pathway of what may end up happening to that particular child or family," Ms Dowling said. Mr Shin's door is always open to students. ( Australian Story: Belinda Hawkins ) West Justice head of policy and community development Shorna Moore quickly grasped the chance to help teenagers who would otherwise be reluctant to seek out legal assistance. "You need to have somebody that can get down on the level of the young person," she said. West Justice chief executive Denis Nelthorpe said a "traditional lawyer" was never going to be the right fit for the job as school lawyer. "That would have been a disaster. We actually wanted someone who could be a lawyer, but could forget they were a lawyer," he said. Dad's dark secret uncovered Until recently, the young lawyer thought his life was finally on track. But when Mr Shin discovered his father's violence had spiralled into attempted murder, he was shattered. Even more painful was to learn that the children of the man whom his father attacked had witnessed what happened. "I feel for these kids; they're going to be traumatised for the rest of their lives," he said. "If I could reach out and help them in their healing, it could be good, but I think it's too much of a risk for me and my family." Sentenced to nine years for grievous bodily harm and intent to kill, his father is eligible for parole in two years. "I'm quite fearful of retribution," Mr Shin said. "I've been quite surprised at how derailing it was." But Mr Shin remains undeterred in his desire to empower young people. "I feel it's almost my duty to do this," he said. "There are not enough voices out there. "We often hear the voice of the woman who is the victim, but not often the child." Watch Sins of the Father on Australian Story at 8pm on ABC TV and iview.
function g = nextpow2(f, pref) %NEXTPOW2 Base 2 power of a CHEBFUN. % P = NEXTPOW2(N) returns the first P such that 2.^P >= abs(N). It is often % useful for finding the nearest power of two sequence length for FFT % operations. % % See also LOG2, POW2. % Copyright 2017 by The University of Oxford and The Chebfun Developers. % See http://www.chebfun.org/ for Chebfun information. % Trivial case: if ( isempty(f) ) g = f; return elseif ( ~isreal(f) ) error('CHEBFUN:CHEBFUN:nextpow2:complex', ... 'Input to NEXTPOW() must be real.'); end % Grab preferences: if ( nargin < 2 ) pref = chebfunpref(); end % NEXTPOW2 is not vectorized in versions of MATLAB prior to R2010a. Vectorize % it manually if we're running on older platforms. if ( verLessThan('matlab', '7.10') ) mynextpow2 = @nextpow2Vectorized; else mynextpow2 = @nextpow2; end % Compute the absolute value of f: absf = abs(f); % Result will have breaks where |f| is a power of 2. mm = minandmax(absf); pows = 2.^(mynextpow2(mm(1,:)):mynextpow2(mm(2,:))); r = f.domain.'; for k = 1:numel(pows) rk = roots(absf - pows(k)); r = [r ; rk(:)]; end r = unique(r); r(isnan(r)) = []; f = addBreaks(f, r.'); % We need to extrapolate: pref.extrapolate = true; % Call COMPOSE(): g = compose(f, @(n) mynextpow2(n), [], pref); % Attempt to remove unnecessary breaks: g = merge(g); % TODO: Could we work this out in advance? end function y = nextpow2Vectorized(x) %NEXTPOW2VECTORIZED A manually vectorized NEXTPOW2 for compabibility with % versions of MATLAB prior to R2010a. y = zeros(size(x)); for n = 1:1:numel(x) y(n) = nextpow2(x(n)); end end
Summary of work: Most studies of age differences in personality have been conducted in the United States using self-report measures. For this project, two studies were conducted across cultures using observer ratings of personality. In the first, we obtained both self-reports and informant ratings of the same individuals in Russia (N = 800) and the Czech Republic (N = 705). In both cultures, the same pattern of age differences was found: Neuroticism, Extraversion, and Openness declined across the lifespan, whereas Agreeableness and Conscientiousness increased. Informant data generally replicated self-report findings, although the effects were weaker. In the second study we gathered college students' ratings of an anonymous target, either 18-21 or 40+ years old, in 50 cultures, from Iceland to Ethiopia. Adults were rated as higher than college-age targets on Conscientiousness and lower on Extraversion and Openness in most cultures. Age differences on Neuroticism and Agreeableness were much weaker. Although there are still some unexplained differences between self-report and informant rating methods of assessing personality, the data overall demonstrate that age differences are universal, supporting the hypothesis that personality change is part of the intrinsic maturation of the human species.
1. Field of the Invention The present seal assembly will function when pressure acts on it from two different directions. It is therefore sometimes referred to as a bi-directional seal or a dual energized hydroseal. The present invention can be used in a variety of different types of valves where a dual energized seal assembly is needed, as well as in cases where single-direction control is necessary. 2. Background of the Invention The dual energized hydroseal includes a seal spool, two O-rings and two opposing seal cups. This bi-directional seal assembly can be used in a dirty fluid valve and a variety of other applications where a bi-directional seal assembly is needed, as well as in cases where a single direction seal assembly is necessary. For purposes of example, the dual energized hydroseal will be described in a dirty fluid valve, which is a type of cartridge valve frequently used in downhole tools. A plurality of dirty fluid valves are positioned in a downhole tool that is used for sampling wellbore fluids. A plurality of empty sample collection bottles are located in the downhole tool. When the tool is inserted in the wellbore, all of the dirty fluid valves are in the closed position as shown in FIG. 1. When the downhole tool reaches a depth that needs to be sampled, a pilot valve is pulsed, causing the seal carrier to slide the dual energized hydroseal assembly along opposing seal plates and open the supply port, as shown in FIG. 2. This allows wellbore fluids to enter the supply port of the dirty fluid valve and move through the longitudinal passageway of the valve and out the function port to a sample collection bottle. A plurality of sample collection bottles are often included in a single tool so that the wellbore may be sampled at different depths. External pressures in a wellbore often exceed 20,000 psi absolute. After a sample has been collected, a pilot valve is pulsed, causing the seal carrier to move back to the close position as shown in FIG. 1. The pressure inside the sample collection bottle is the same as the pressure in the wellbore at the collection depth. As the downhole tool is brought back to the surface, external pressure drops to standard atmospheric pressure, but the pressure inside the sample collection bottle remains at wellbore pressure, which may be in excess of 20,000 psi absolute. The present seal assembly will function when pressure acts on it from two different directions. The present invention can be used in a variety of different types of valves. When the seal assembly of the present invention is constructed, the O-rings are squeezed into position and/or compressed approximately 40%. The squeeze of the O-rings causes them to act as springs urging the seal cups into contact with the opposing seal plates. By contrast, O-ring manufacturers such as Parker generally recommend that O-rings be squeezed axially approximately 20%-30% for static seal designs. The present invention is a static seal design. Other O-ring manufacturers, such as Apple, recommend that O-rings be squeezed axially for static seal in the range of approximately 25%-38%. Squeezing the O-rings more than recommended by most manufacturers improves the function in the present invention. The O-rings in the present invention perform a dual function as both the spring and the seal. They act as a spring to force the seal cups into contact with the opposing seal plates, at lower pressures and they act as a seal at higher pressures. U.S. Pat. No. 5,662,166 to Shammai, discloses an apparatus for maintaining at least downhole pressure of a fluid sample of upon retrieval from an earthbore. The Shammai device has a much more complex series of seal than the present invention. Further, the Shammi device does not have a dual-energized seal like the present invention. U.S. Pat. No. 5,337,822 issued to Massie et al., discloses a wellfluid sampling tool. The Massie device maintains samples at the pressure at which they are obtained until they can be analyzed. The device does not, however, maintain this pressure by means of a dual-energized hydroseal. Rather, the device of Massey uses a hydraulically driven floating piston, powered by high-pressured gas such as nitrogen acting on another floating piston, to maintain sample pressure. The seal assembly of the present invention uses two O-rings that are squeezed more than 38.5% causing them to act as springs urging the seal cups into sealing engagement at very low pressures with the seal plates and as seals at higher pressures. At higher pressure a seal is achieved because pressure on the rear of the seal cups forces them into sealing engagement with the opposing seal plates. The pressure forces act on the seal cups to achieve a tight metal to metal seal. The bi-directional seal assembly of the present invention is shown in a dirty fluid valve which is positioned in a downhole tool for sampling wellbore fluids. The seal assembly of the present invention can be used in a variety of other types of valves that require bi-directional seal assemblies and in other types of valves that only require a uni-directional seal.
Lip Plumper Kit 3 Products. 2 Minutes. 100% Smearproof. LIP INK Lip Plumper Kit LIP-INK Semi-Permanent Cosmetics - 3D LipMax Lip Plumper was designed specifically to hydrate the lips and restore glycosaminoglycans and collagen, increasing lip moisture and adding volume to improve the contour of the lips and give better definition to the lip line. 3D LipMax also significantly reduces the appearance of fine lines to make dry, chapped, desquamating lips a thing of the past. Lip-Ink 3D LipMaxLip Plumper Volumizer creating a building block of: VOLUME, CONTOUR & HYDRATION. Always begin by purifying the lips with OFF solution. This not only cleanses but helps with the exfoliation process. Splash with water and pat dry. Massage a small amount into the lips until thoroughly absorbed. Apply just by itself, or in layers. Once you have applied a foundation of LIP INK® Brilliant Tinted Shine Lip Plumper you can stop and enjoy the maximum hydration or you can proceed with the LIP INK® lip colorization process with our LIP INK® wax free guaranteed smearproof and long lasting patented liquid lip colors. Finish with a final layer of LIP INK® Brilliant Tinted Shine Lip Plumper or you can apply your LIP INK® Brilliant Tinted Shine Lip Plumper on top of other LIP INK® Color products. Then use as needed throughout the day. LIP INK® Brilliant Tinted Shine Lip Plumper can be layered with other LIP INK® Lip Moisturizers to personalize your look and feel, however they are not compatible with other cosmetic lip products from other companies. I love this product. When I wash my face at night, the next morning some of the product is still on my eyebrows which is awesome. I also use the lip stain but am yet to order the right color because they are dark when they dry and I don't wear dark lipstick. I cant say anything bad about the products or the company. I love to order from you!
Q: Lombok IntelliJ IDEA Plugin: Use of var is disabled by default I'm using the Lombok Plugin for IntelliJ IDEA. When try to run Java code using the var keyword, I get the following error: Use of var is disabled by default. Please add 'lombok.var.flagUsage = ALLOW' to 'lombok.config' if you want to enable is. How do you do that in IntelliJ IDEA? I created the lombok.config in the project root and pasted lombok.var.flagUsage = ALLOW but it didn't fix it. val is working but not var. I can't seem to find clear instructions on enabling var. My Lombok maven dependency is: <dependency> <groupId>org.projectlombok</groupId> <artifactId>lombok</artifactId> <version>1.16.18</version> <scope>provided</scope> </dependency> A: You may need to recompile everything in order to observe the effect. Actually, any change of any lombok.config anywhere should trigger a recompilation of all classes in the subtree. This is not the case as such changes are rare and don't warrant the probably non-trivial amount of work.
<?php /** * @file classes/migration/TemporaryFilesMigration.inc.php * * Copyright (c) 2014-2020 Simon Fraser University * Copyright (c) 2000-2020 John Willinsky * Distributed under the GNU GPL v3. For full terms see the file docs/COPYING. * * @class TemporaryFilesMigration * @brief Describe database table structures. */ use Illuminate\Database\Migrations\Migration; use Illuminate\Database\Schema\Builder; use Illuminate\Database\Schema\Blueprint; use Illuminate\Database\Capsule\Manager as Capsule; class TemporaryFilesMigration extends Migration { /** * Run the migrations. * @return void */ public function up() { // Temporary file storage Capsule::schema()->create('temporary_files', function (Blueprint $table) { $table->bigInteger('file_id')->autoIncrement(); $table->bigInteger('user_id'); $table->string('file_name', 90); $table->string('file_type', 255)->nullable(); $table->bigInteger('file_size'); $table->string('original_file_name', 127)->nullable(); $table->datetime('date_uploaded'); $table->index(['user_id'], 'temporary_files_user_id'); }); } /** * Reverse the migration. * @return void */ public function down() { Capsule::schema()->drop('temporary_files'); } }
Q: How to delete data from gridview which is using datasource and SP using Wizard I am using a gridview to select, delete and update data in database. I have written a single SP for doing all these operation. Based on a parameter SP decides which operation to perform. Here is the image of my gridview image of my grid http://www.freeimagehosting.net/uploads/0a5de50661.jpg <asp:GridView ID="GridView1" runat="server" DataSourceID="dsDomain" AllowPaging="True" AllowSorting="True" AutoGenerateColumns="False" DataKeyNames="DomainId" > <Columns> <asp:CommandField ShowDeleteButton="True" ShowEditButton="True" /> <asp:BoundField DataField="DomainId" HeaderText="DomainId" InsertVisible="False" ReadOnly="True" SortExpression="DomainId"> </asp:BoundField> <asp:BoundField DataField="Domain" HeaderText="Domain" SortExpression="Domain"> </asp:BoundField> <asp:BoundField DataField="Description" HeaderText="Description" SortExpression="Description" > </asp:BoundField> <asp:BoundField DataField="InsertionDate" HeaderText="InsertionDate" SortExpression="InsertionDate"> </asp:BoundField> </asp:GridView> Data Source that I am using is here <asp:SqlDataSource ID="dsDomain" runat="server" ConnectionString="<%$ ConnectionStrings:conLogin %>" SelectCommand="Tags.spOnlineTest_Domain" SelectCommandType="StoredProcedure" CancelSelectOnNullParameter="False" DeleteCommand="Tags.spOnlineTest_Domain" DeleteCommandType="StoredProcedure" OnDeleting="DomainDeleting"> <SelectParameters> <asp:Parameter ConvertEmptyStringToNull="true" DefaultValue="" Name="DomainId" Type="String" /> <asp:Parameter ConvertEmptyStringToNull="true" DefaultValue="" Name="Domain" Type="String" /> <asp:Parameter ConvertEmptyStringToNull="true" DefaultValue="" Name="Description" Type="String" /> <asp:Parameter DefaultValue="1" Name="OperationType" Type="Byte" /> </SelectParameters> <DeleteParameters> <asp:ControlParameter ControlID="GridView1" Name="DomainId" PropertyName="SelectedValue" Size="4" Type="Int32" /> <asp:Parameter ConvertEmptyStringToNull="true" DefaultValue="" Name="Domain" Type="String" /> <asp:Parameter ConvertEmptyStringToNull="true" DefaultValue="" Name="Description" Type="String" /> <asp:Parameter ConvertEmptyStringToNull="true" DefaultValue="4" Name="OperationType" Type="Byte" /> </DeleteParameters> </asp:SqlDataSource> Select operation is working fine. But when I tried to delete, it says Procedure or Function 'spOnlineTest_Domain' expects parameter '@Domain', which was not supplied But I am supplying this parameter, as My Stored procedure calling is like this EXEC Tags.spOnlineTest_Domain NULL, NULL, NULL, 1 // For Select last parameter will be 1 EXEC Tags.spOnlineTest_Domain "SelectedRow's DomainId), NULL, NULL, 4 // For Delete last parameter will be 4 My procedure has 4 parameters where last parameter will be set by programmer which will tell the program for what kind of operation to be performed. For Select only last parameter has to be Not Null. For Delete first and last parameter cannot be NULL. My first Delete parameter is Primary key of the table. I am passing this value, when a user selects a row and hit delete. I am not sure by using PropertyName="SelectedValue", will I get the right value of the ID. http://www.freeimagehosting.net/uploads/0a5de50661.jpg /> A: If you have not implemented OnDeleting event of the ObjectDataSource, try the below <asp:ObjectDataSource .... OnDeleting="YourDeletingEvent" ... </asp:ObjectDataSource> In your code behind: private void YourDeletingEvent(object source, ObjectDataSourceMethodEventArgs e) { IDictionary paramsFromPage = e.InputParameters; //In this case I assume your stored procedure is taking a DomainId as a parameter paramsFromPage.Remove("Domain"); paramsFromPage.Add("Domain", (int)paramsFromPage["DomainId"]); paramsFromPage.Remove("DomainId"); } Please look here for more details.
Q: core data unrecognized selector sent to instance error: and Failed to call designated initializer on NSManagedObject class I have tried below code to update an object in core data but got error. NSError *error; NSArray *objects = [managedObjectContext executeFetchRequest:fetchRequest error:&error]; NSLog(@"objects %@",objects); // yourIdentifyingQualifier is unique. It just grabs the first object in the array. AllChallenge *tempChallenge = [[managedObjectContext executeFetchRequest:fetchRequest error:&error] objectAtIndex:0]; tempChallenge =[[AllChallenge alloc] init]; NSLog(@"tempchallenge >>>>> %@",tempChallenge); // update the object tempChallenge.status = 1; [self.managedObjectContext save:&error]; After compile I got CoreData: error: Failed to call designated initializer on NSManagedObject class 'AllChallenge'. Thanks for any help. A: If you want to update an existing object then you should not replace it with a newly allocated one: AllChallenge *tempChallenge = [[managedObjectContext executeFetchRequest:fetchRequest error:&error] objectAtIndex:0]; // tempChallenge =[[AllChallenge alloc] init]; // <-- REMOVE THIS LINE tempChallenge.status = 1; [self.managedObjectContext save:&error]; If you want to create a new object then you have to use the designated initializer, or this convenience method: AllChallenge *tempChallenge = [NSEntityDescription insertNewObjectForEntityForName:@"AllChallenge" inManagedObjectContext: managedObjectContext];
30 B.R. 33 (1983) In the Matter of KENSINGTON MANOR JOINT VENTURE, Debtor. Bankruptcy No. MM11-83-00369. United States Bankruptcy Court, W.D. Wisconsin. May 26, 1983. Gregory E. Scallon, Stafford, Rosenbaum, Rieser & Hansen, Madison, Wis., for debtor Kensington Manor Joint Venture. Irvin B. Charne, Michael C. Runde, Charne, Glassner, Tehan, Clancy & Taitelman, S.C., Milwaukee, Wis., for First Bank (N.A.). David J. Schwartz, Eisenberg, Giesen, Ewers & Hayes, S.C., Madison, Wis., for Julius J. Heifetz. FINDINGS OF FACT AND CONCLUSIONS OF LAW AND ORDER ROBERT D. MARTIN, Bankruptcy Judge. A final hearing in this matter was held May 24, 1983, at which Attorneys Irvin Charne and Michael Runde appeared for First Bank (N.A.), Gregory Scallon appeared for the debtor, and David Schwartz appeared for Julius J. Heifetz. Upon the evidence received at that hearing I make the following: FINDINGS OF FACT 1. Debtor and debtor in possession, Kensington Manor Joint Venture, filed for relief under chapter 11 of the Bankruptcy Code on March 11, 1983. 2. First Bank (N.A.) is a national banking association, licensed to do business in the State of Wisconsin, and is engaged in the banking business at 201 West Wisconsin Avenue, Milwaukee, Wisconsin. *34 3. The sole asset of the debtor is a 126 unit apartment complex located in Madison, Wisconsin and the personal property associated with the operation of said apartment complex (hereinafter referred to as "the property"). 4. The sole business of the debtor is investment in the property. 5. First Bank holds an amended foreclosure judgment, dated March 9, 1983, by the Circuit Court for Dane County, upon which a foreclosure sale of the property was scheduled for March 15, 1983. 6. The amount of the debt to First Bank as of May 24, 1983 is $1,955,350.50, excluding attorneys' fees and costs, and interest accrues at a rate of $567.50 per day thereafter. First Bank has estimated its attorneys' fees and costs to be $13,207.99. 7. The amount of real estate taxes due and not paid, including interest and penalties through May, 1983 is $74,528.19. 8. The 1983 assessed value of the property is $2,575,000.00. 9. The debtor has received and accepted a bona fide offer to purchase the property for the sum of $2,400,000.00, subject to approval by the bankruptcy court, which is contingent only upon the purchaser's ability to obtain financing according to terms set out in the offer and which provides for a closing on July 5, 1983. 10. The fair market value of the property is $2,400,000.00. 11. The debtor is properly maintaining the property and the property is not depreciating in value. 12. The debtor has proposed as adequate protection of First Bank that, subject to the approval of the bankruptcy court, it will commence monthly payments to First Bank of the accruing interest ($567.50 per day) and will establish and maintain an escrow account for the accruing real estate taxes. 13. The property is generating net monthly income, after payment of normal operating expenses, sufficient, together with cash on hand, to make the proposed payments to First Bank. 14. Although, at this early stage in this case, it is difficult to know the exact form a reorganization may take or the probability of success of any reorganization which might be proposed, it is apparent that creditors other than First Bank can reasonably anticipate being benefitted from a reorganization of this debtor and that the property is necessary for any effective reorganization. CONCLUSIONS OF LAW 1. First Bank can be adequately protected by the maintenance of all of the following: (a) the value of the property which exceeds the amount due First Bank and all prior liens, (b) monthly payments of the accruing interest due First Bank, and (c) monthly payments to maintain an escrow of the accruing real estate taxes. 2. The property is necessary for an effective reorganization. ORDER Upon the foregoing findings and conclusions it is hereby ORDERED that the stay imposed in this case by 11 U.S.C. § 362(a) be and hereby is modified as to the First Bank (N.A.) to be continued to June 1, 1983, and thereafter for so long as the debtor shall pay on or before June 1, 1983, and each month thereafter, a sum equal to the interest accrued on the mortgage of the First Bank during the prior month together with 1/12th of the annual real estate taxes levied against the property during the prior year which tax payment shall be held in escrow for application against the present year's real estate taxes, or until further order of this court.
Daily Archives: October 6, 2010 Returning to procurement and the GPV . . . in this week’s Delovoy vtornik, NVO’s Viktor Litovkin also asks what will 19 trillion rubles be spent on. He says the answer isn’t simple. During the last 20 years of ‘starvation rations,’ the armed forces got handfuls of essential combat equipment, and, meanwhile, a dangerous imbalance between strike and combat support systems was created. And this was obvious against Georgia in 2008. Litovkin says this imbalance has to be corrected, meanwhile priorities like strategic nuclear forces can’t be forgotten – not just the offensive triad, but also the missile attack early warning system (SPRN), missile defense (PRO), and aerospace defense (VKO). Like Viktor Yesin of late, Litovkin asks how Russia will replace its aging strategic offensive arms to stay up to the limits of the Prague / New START agreement. Half the Russian force is SS-18, SS-19, and SS-25 ICBMs which will be retired in 7-10 years. Moscow needs to build 400 strategic systems to replace them. He doesn’t even mention Delta III and IV SSBNs and their aging SLBMS. And Russia has only the SS-27, RS-24 Yars, Sineva, and Bulava to replace them. Litovkin expects a very large amount of money to be spent not just on replacing strategic systems, but also reequipping the enterprises that produce them. He turns to his second priority – also demonstrated by the Georgian war – precision-guided weapons, which in turn depend on reconnaissance-information support and equipment in space, on long-range surveillance aircraft [AWACS], and UAVs. Priority three – automated command and control systems (ASU). He cites Popovkin on linking all service C2 systems into one system over 2-3 years. Litovkin says you can’t forget about the Navy, but he mentions just the Borey-class SSBNs, and the need for a wide range of surface ships. And he makes the point [made by many] that Mistral is all well and good, but it’ll have to have multipurpose combatants operating in its battle group. They need to be built, and they won’t cost a small amount of money. One can’t forget aviation either. Litovkin cites a $100 million per copy cost for 60 fifth generation fighters [that’s a significant 180-billion-ruble bite out of the GPV]. He notes Vega is working on an updated Russian AWACS (A-100). And, like Korotchenko, he mentions transport aircraft, but also combat and support helicopters. And so, says Litovkin, the question arises – isn’t the country putting out a lot of money to rearm its army? Viktor Litovkin (photo: Ekho Moskvy) Being bold, he says, not really. He actually uses that accursed 22 trillion figure, which is procurement for all power ministries. If he used 19 trillion, it would be 1.9 trillion or $63 billion per year for Russia against $636 billion for the U.S., $78 billion for China, $58 billion for the U.K., and $51 billion for Japan. But he doesn’t say this is annual procurement, the GPV, against the total annual defense budget for these other countries. A bit of comparing one piece of pie to a whole pie. Nevertheless, he concludes this makes Russia far from champion when it comes to military expenditures. Litovkin’s last word is Russia will remain one of the G8 with a powerful, combat capable, and effective army, but without it, only a raw materials appendage of either the West or East. But one wonders, hasn’t Russia long been in the G8 without that kind of armed forces? Doesn’t breaking away from the raw materials supplier role have more to do with developing an open, attractive, innovative, value-added, and competitive economy (and a political system and society to match) than with military power?
His neighbors saw a devout family man. The last thing his victims saw was a shotgun aimed at their heads. If there's an outlaw who was born to kill it's DEACON JIM MILLER - the Bible-thumping psycho-killer.
As Matt Welch noted earlier today, Attorney General Eric Holder is promising that the federal government will "vigorously enforce" marijuana prohibition in California if Proposition 19 passes. "Regardless of the passage of this or similar legislation, the Department of Justice will remain firmly committed to enforcing the Controlled Substances Act (CSA) in all states," Holder said in a letter to eight former DEA administrators who have been urging the Obama administration to take a firm stand against the ballot initiative. "We will vigorously enforce the CSA against those individuals and organizations that possess, manufacture or distribute marijuana for recreational use, even if such activities are permitted under state law." Good luck with that. In 2008, according to the FBI's numbers, there were about 848,000 marijuana arrests in the United States. The feds accounted (PDF) for less than 1 percent of them. The DEA has about 5,500 special agents nationwide, compared to nearly 70,000 local police officers in California. It certainly can make trouble, but it simply does not have the resources to bust a significant percentage of the state's marijuana offenders now, let alone after every adult is allowed to grow his own pot. If the DEA could not block access to medical marijuana under Bush or Obama, what chance will it have after the drug is legal for recreational purposes as well? Not much, says Stephen Gutwillig, California director of the Drug Policy Alliance: This is 1996 all over again. Naysayers said then that the passage of Proposition 215, California's medical marijuana law, would be a symbolic gesture at most because the federal government would continue to criminalize all marijuana use. Today more than 80 million Americans live in 14 states and the District of Columbia that have functioning medical marijuana laws. All that happened without a single change in federal law. Under our system of government, states get to decide state law. There is nothing in the United States Constitution that requires that the State of California criminalize anything under state law. If California decides to legalize marijuana through the passage of Proposition 19, nothing in the Constitution stands in the way. In fact, Congress has explicitly left to the states wide discretion to legislate independently in the area of drug control and policy. States do not need to march in lockstep with the federal government or even agree with federal law. The reality is that the federal government has neither the resources nor the political will to undertake sole—or even primary—enforcement responsibility for low level marijuana offenses in California. Well over 95% of all marijuana arrests in this country are made by state and local law enforcement. The federal government may criminalize marijuana, but it can't force states to do so, and it can't require states to enforce federal law. More on federalism and marijuana policy here.
Air Jordan 7-001 Rank: $80.88 Model: Air Jordan00298 Please Choose: Select Size: Add to Cart: . Description AIR JORDAN VII In 1992, following the success of the Air Jordan VI and Michael Jordan's first NBA Championship, Tinker Hatfield continued his innovation in the Air Jordan line with the Air Jordan VII which was inspired partially by West African Tribal culture and partially by the Nike Huarache basketball shoe line. The AJVII had a more colorful, more minimal and more lightweight design than previous Air Jordans. The Air Jordan 7 design said goodbye to visible Air, the translucent outsole and the prominent Nike Air logo (except on the insole). The upper was similar to the AJ VI with minor alterations; the toecap design was a carryover from the VI. A stitched Jumpman appeared on the heel of the thin, unpadded leather upper. A triangular piece of the rubber outsole wrapped up to secure the midsole. The heel featured a hard plastic arrow-shaped piece with the number 23. The heel piece had a pull tab used to lock the foot into the inner sockliner. The Air Jordan VII marked several changes in the Air Jordan series: There was minimal Nike branding both on the shoe and in the marketing campaigns. Ads shifted from MJ's teamup with Mars Blackmon to Michael and Bugs Bunny. One commercial featured the duo both wearing the AJ VII beating another team in a game of hoops. Michael Jordan wore the Olympic-inspired version of the VII as he led the "Dream Team" to a Gold Medal at the 1992 summer games in Barcelona. That pair featured the number 9 on the heel, reflecting MJ's jersey number on Team USA. MJ won his sixth straight scoring title while wearing the AJ VII and was again named first team All-NBA, first team All-Defense and an All-Star for the seventh consecutive time. He was voted league MVP for the second straight year and won his second NBA Championship ring and Finals MVP with the Bulls. Size: please select from the size above in of the Variations Condition: Brand New with Box PLEASE DO NOT HESITATE TO ASK OTHER QUESTIONS ABOUT THIS ITEM! All shipments will be by USPS Priority Mail with Delivery confirmation. Shoes will be double boxed unless it is an abnormal shoe box. International Mail will only be mailed USPS GLOBAL EXPRESS MAILALL UK, IRELAND, EUROPE BUYERS, I DON/T CHARGE EXCESSIVE SHIPPING COST, IF YOU LOOK AT THE SHIPPING LABEL, I EVEN PAY AN EXTRA FEW DOLLARS TO COVER THE SHIPPING COST, SO PLEASE CONSIDER THAT AND GIVE ME A PROPER DSR, THANKS!!!
NAME : tutorial-03-capacitated-hard COMMENT : Geoffrey De Smet - OptaPlanner VRP demo 02 TYPE : CVRP DIMENSION : 8 EDGE_WEIGHT_TYPE : EUC_2D CAPACITY : 100 NODE_COORD_SECTION 1 50 50 2 45 100 3 30 80 4 70 85 5 60 60 6 35 10 7 30 30 8 45 20 DEMAND_SECTION 1 0 2 20 3 20 4 20 5 20 6 20 7 50 8 50 DEPOT_SECTION 1 -1 VEHICLES : 2 EOF
/* * CS4271 I2C audio driver * * Copyright (c) 2010 Alexander Sverdlin <subaparts@yandex.ru> * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. */ #include <linux/module.h> #include <linux/i2c.h> #include <linux/regmap.h> #include <sound/soc.h> #include "cs4271.h" static int cs4271_i2c_probe(struct i2c_client *client, const struct i2c_device_id *id) { struct regmap_config config; config = cs4271_regmap_config; config.reg_bits = 8; config.val_bits = 8; return cs4271_probe(&client->dev, devm_regmap_init_i2c(client, &config)); } static int cs4271_i2c_remove(struct i2c_client *client) { snd_soc_unregister_codec(&client->dev); return 0; } static const struct i2c_device_id cs4271_i2c_id[] = { { "cs4271", 0 }, { } }; MODULE_DEVICE_TABLE(i2c, cs4271_i2c_id); static struct i2c_driver cs4271_i2c_driver = { .driver = { .name = "cs4271", .of_match_table = of_match_ptr(cs4271_dt_ids), }, .probe = cs4271_i2c_probe, .remove = cs4271_i2c_remove, .id_table = cs4271_i2c_id, }; module_i2c_driver(cs4271_i2c_driver); MODULE_DESCRIPTION("ASoC CS4271 I2C Driver"); MODULE_AUTHOR("Alexander Sverdlin <subaparts@yandex.ru>"); MODULE_LICENSE("GPL");
// Copyright Contributors to the Open Shading Language project. // SPDX-License-Identifier: BSD-3-Clause // https://github.com/imageworks/OpenShadingLanguage shader glossy_glass (float Kr = 1, color Cs = 1, float xalpha = 0.01, float yalpha = 0.01) { vector U; if (abs(N[0]) > 0.01) U = vector(N[2], 0, -N[0]); else U = vector(0, -N[2], N[1]); U = normalize(U); float eta = 1.5; if (backfacing()) { Ci = (Kr * Cs) * microfacet("default", N, U, xalpha, yalpha, 1.0 / eta, 1); Ci += (Kr * Cs) * microfacet("default", N, U, xalpha, yalpha, 1.0 / eta, 0); } else { Ci = (Kr * Cs) * microfacet("default", N, U, xalpha, yalpha, eta, 1); Ci += (Kr * Cs) * microfacet("default", N, U, xalpha, yalpha, eta, 0); } }
High recurrence risk and use of adjuvant trastuzumab in patients with small, HER2-positive, node-negative breast cancers. Five randomized trials of adjuvant trastuzumab have reported significant improvements in recurrence-free survival (RFS) and overall survival. However, patients with node-negative tumors 1 cm or smaller were excluded from these trials. We assessed the recurrence risk and benefit of adjuvant therapy in such patients with small tumors. We identified patients with node-negative breast tumors 1 cm or smaller between April 2003 and December 2007. Patients were categorized according to HER2 status and pathological tumor size (pT <5 mm vs. 5-10 mm), hormone receptor (HR) status and adjuvant chemotherapy. The primary endpoint was RFS. Of 267 patients included in the analysis, 42 had HER2-positive tumors. The median follow-up was 4.3 years. RFS was worse in patients with HER2-positive tumors than HER2-negative tumors (90.5 vs. 97.7% at 5 years; P = 0.031). In the group with HER2-positive tumors, there were no recurrences in patients with pT<5 mm, but 4 recurrences in those with pT 5-10 mm. RFS was worse in patients with pT 5-10 mm than pT <5 mm (79.0 vs. 100%, P = 0.025). Furthermore 3 recurrences occurred in patients without adjuvant trastuzumab, and 1 recurrence occurred as soon as adjuvant trastuzumab was finished. Our results appear to establish the efficacy of adjuvant trastuzumab therapy. HR status and use of adjuvant chemotherapy were not significantly associated with RFS. Patients with HER2-positive, node-negative breast tumors 1 cm or smaller (especially 0.5-1.0 cm) have a significant recurrence risk and the decision to employ adjuvant trastuzumab therapy should be discussed with patients based on our results and those of other studies.
Lewisham bereavement project: death and the life that's left. Coping with bereaved relatives is a problem, both emotional and practical, for nursing staff. At Lewisham Hospital a scheme was set up bringing in the existing volunteer system to support the bereaved. Here, Janet Keyte, sector administrator; Bette Meade, voluntary services organiser; and Philip Nye, senior nursing officer, give the history of the Lewisham Volunteer Bereavement Project.
Q: Uncouple range input in UI from synchronous javascript processes I have an html5 input range element that sets the value on a processing intensive (largely synchronous) javascript function. The updated value has to be passed to the function with the mouse down on the input control at a fixed interval. The workaround of updating the value once the slider has settled (on change) is not an option. To prevent the slider from lagging in the UI I'm trying to setInterval on the internal value readout from the input range element to only update the javascript function with new values every 500 miliseconds. $("#slider").on("change", function(){ setInterval(function(){ //Calculate intensive function with value from #slider },500); }); <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script> <input type="range" id="slider"> The above code doesn't work because it freezes the UI. I'm sure there's an easier way than multithreading but I just can't wrap my head around this. A: I guess my question wasn't clear when I first asked but I just stumbled upon this old post and wanted to share my solution: What I was looking for was a custom throttle function that executes the callback every n milliseconds. Here's how I did it: throttle(function() { // calculation goes here... console.log('I only fire every 250 ms!'); }, 250)(); function throttle(fn, throttleTime, scope) { throttleTime = throttleTime || 250; var last, deferTimer; return function () { var context = scope || this; var now = +new Date(), args = arguments; if (last && now < last + throttleTime) { // hold on to it clearTimeout(deferTimer); deferTimer = setTimeout(function () { last = now; fn.apply(context, args); }, throttleTime); } else { last = now; fn.apply(context, args); } }; }
Benefiting the Hunter's Hope Foundation in memory of Parker Eugene Shoemaker who passed away from Krabbe Leukodystrophy. Since his diagnosis, the Shoemaker Family have been dedicated to the expansion of newborn screening in the state of Maryland and to supporting families affected by Krabbe Disease. Parker was born a seemingly happy and healthy baby. Within a few months, Parker struggled to gain weight, feed and became uncomfortable. In March of 2015, at four months old, Parker was diagnosed with Krabbe Leukodystrophy. Unfortunately, his diagnosis came too late to receive a cord blood transplant, the only treatment that could have saved his life. Parker went to heaven in September of 2015, when he was only 10 months old. Krabbe is not currently included in Maryland's newborn screening panel. Had the state of Maryland screened for Krabbe at birth, Parker could have been given life-saving treatment before the irreversible damage occurred. Please join us in raising awareness and funds for other families affected by Krabbe Disease in memory of Our Sweet Parker
Share This Story! Spring story lines fantasy owners will be following As games get underway in Florida and Arizona, it's time for fantasy owners to begin the information-gathering process. Here are some things to monitor this spring that will impact players' fantasy values. Although much of what happens in spring training has little bearing on what happens during the regular season, fantasy owners are always looking for even the slightest edge heading into our drafts. So as games get underway in Florida and Arizona, it's time to begin the information-gathering process. Some interesting things to watch this spring that will help shape player values for the 2014 season. Players returning from injuries Most players who've had surgery or are coming off injury-plagued seasons will be eased back into action. How soon they begin playing on a regular basis will be a good indicator of how ready they'll be for opening day. Los Angeles Dodgers outfielder Matt Kemp hasn't played a full season since 2011, the year he was fantasy's No. 1 overall player after hitting .324 with 39 home runs, 126 RBI and 40 stolen bases. He had ankle and shoulder surgery in the offseason, and although the shoulder seems to be fine, Kemp is no lock to be ready for the Dodgers' two-game opening series in Australia in late March. He's a first-round talent if healthy, so it would be encouraging to see him play in a few spring games before the Dodgers head Down Under. Colorado Rockies outfielder Carlos Gonzalez battled a finger injury that cut his 2013 season short. Despite playing 110 games, he hit 26 homers and stole 21 bases. A more pressing concern, however, is an emergency appendectomy he had Jan.10. Recovery can take anywhere from one to two months, so he should be back on the field in plenty of time to get ready for the regular season. His first-round status should be unaffected. Baltimore Orioles third baseman Manny Machado suffered a knee injury in September that required arthroscopic surgery. He is reportedly ahead of his rehab schedule and could be playing in spring games by mid-March. Machado went for a significant discount in the Fantasy Sports Trade Association mixed-league draft last month (Round 10, 120th overall), so use that as an absolute floor as long as he doesn't suffer a setback. The New York Yankees will be counting on bounce-back seasons from first baseman Mark Teixeira and shortstop Derek Jeter, but fantasy owners should be less optimistic. Teixeira (wrist) and Jeter (ankle) are on the high side of 30, and their injuries affect the most fantasy-relevant aspects of their game. They should arrive at camp close to 100%, but don't expect a return to their previous production levels. First baseman Albert Pujols of the Los Angeles Angels was shut down in August because of a foot injury, ending his streak of 12 consecutive 30-homer seasons. How much does a 34-year-old Pujols have left in the tank? He no longer is being drafted as an elite first baseman, but he could be a major value pick if he shows his foot is no longer an issue. Reds outfielder Billy Hamilton has been working on his bunting technique this offseason to help him improve his ability to get on base.(Photo: Frank Victores, USA TODAY Sports) Billy Hamilton's on-base percentage There's such a wide range of outcomes for the Cincinnati Reds' 23-year-old rookie center fielder. At one extreme, he's a game-changing stolen base machine who allows his owners to dominate the category from start to finish. At the other extreme, he struggles to make the transition to being a full-time major leaguer and ends up being nothing more than a pinch-running specialist. The determining factor will be Hamilton's ability to get on base. And in his case, a walk is most definitely as good as a hit. In the lower levels of the minor leagues, he did just that. The result was a record 155 steals in 2012 between ClassA and AA. Last season at Class-AAA Louisville, Hamilton found things a bit more difficult — hitting .256 with a .308 on-base percentage. But the attraction for fantasy owners came in his 13-game cameo with the Reds in September. Hamilton was successful in 13 of his 14 stolen base attempts and scored nine runs in limited playing time. That kind of production has fantasy owners dreaming of steal numbers not seen since the glory days of Rickey Henderson, Vince Coleman and Tim Raines in the 1980s. As a result, you can mark this down right now: Hamilton will be the most traded player in fantasy leagues this season — and it won't even be close. If he's a total bust and his fantasy owners are ready to cut their losses, there will always be another steals-deficient owner willing to take a chance on a late-season rebound. If he runs wild and his owners lock up first place in the stolen base category by mid-August, they'll be able to trade away the rest of his production to another team in the league that benefits them the most in the standings. Hamilton will be overdrafted in almost every league. And that's not necessarily a bad thing, because of the exceptional power he will give his owners to manipulate the stolen base category. There's simply no way to measure that extra value in Roto dollars, so even though Hamilton could earn $20 on his stats alone, he'll be worth considerably more — through not only the player(s) he'll bring back in a trade, but also the ability he'll give his owners to affect the overall standings. The latest Japanese import After posting an incredible 24-0 record and 1.27 ERA and leading the Rakuten Golden Eagles to the Japan Series title last year, 25-year-old right-hander Masahiro Tanaka will immediately be thrust onto the game's biggest stage with the Yankees. The easy comparison would be with countryman Yu Darvish, but the two aren't necessarily that similar. Darvish led the majors in strikeouts last season with 277 but occasionally got in trouble when he walked too many hitters. Tanaka is at the other end of the spectrum with an elite walk rate (1.4 per nine innings) and a strikeout rate (7.8 per nine innings) that would have ranked him 34th in the majors among last season's qualified starters. That puts him roughly equivalent to Chris Tillman, Matt Cain and James Shields. Double-digit wins seem like a fairly good bet as long as Tanaka stays healthy. His 1.44 ERA the last three seasons in Japan was aided by unusually high strand rates (87%, 82% and 88% last season) that are unlikely to continue. An ERA in the low to mid-3.00s seems more plausible. Tanaka's ADP surely will rise in the weeks leading into spring training as a member of the Yankees. I have him conservatively ranked No. 39 among starting pitchers and No.156 overall. That slots him as a No.3 starter in most mixed leagues but still leaves room for upward mobility before draft day if he performs well in spring training. However, don't look for him to pitch against any of the Yankees' American League East rivals this spring. We'll have to wait for the regular season for that. The latest Cuban import Over the last two seasons, fantasy owners have been treated to the slugging exploits of Yoenis Cespedes and Yasiel Puig. This year, the spotlight will shine on Chicago White Sox first baseman Jose Abreu. Signed to a six-year, $70 million contract, Abreu has a history of above-average power. He'll get to put that on display in what has been one of the most hitter-friendly home parks in the majors. Veteran Paul Konerko will likely ease into a platoon with Adam Dunn at designated hitter, leaving Abreu to man first base on a full-time basis. With power numbers declining throughout the majors the last several seasons, Abreu's addition to the talent pool could make a significant impact — if he can come close to what he did in Cuba. Spring training won't be a fair measuring stick because Abreu won't be hitting in major league parks, but his contact rate and fly-ball percentage will at least give us an indication of what kind of ceiling he might have.
The potential for New Brunswick’s new Tory government to partially lift a province-wide moratorium on fracking for natural gas should be known within days. The issue has been a contentious one, with much political jousting as the new Tory minority tries to lift the moratorium in the Sussex area, where Corridor Resources has been in gas production for 20 years. The Tories have introduced an amendment to their throne speech to urge the government to move ahead with gas development just in that region. The amendment says that communities in and around the town of Sussex have demonstrated their desire to proceed with shale gas development. Sussex Mayor Marc Thone said his council, and most people he has spoken with, are supportive. “In our community I’m sure that not 100 per cent of our citizens are going to be supportive of hydraulic fracturing, but we do believe that the majority of our region are supportive of it,” he said Wednesday. Story continues below advertisement “We’re not dependent on that moratorium being lifted but we see a brighter future for our region and all of New Brunswick if that moratorium is lifted,” he said. Tweet This READ: Panel of scientists to drill into safety and environmental impact of fracking Thorne said a number of companies have said they’d locate in Sussex or expand operations if there was a secure supply of natural gas. The decision of the former Tory government of premier David Alward to embrace the shale gas industry was polarizing – a series of public protests culminated in a violent demonstration in the fall of 2013 in Rexton that saw 40 people arrested and six police vehicles burned. Many people are concerned that fracking – which involves pumping water and chemicals deep underground at high pressure to fracture layers of shale and release pockets of gas – could have an impact on ground water supplies. While some People’s Alliance legislators say they’re against fracking, they will stick to their pledge to support the government on confidence votes, including the throne speech vote on Friday. People’s Alliance MLA Rick DeSaulniers has been very vocal about his opposition to fracking, but says he’ll have to put his opinion aside for the vote. “The last thing New Brunswickers want for Christmas is an election. I’m not going to cause an election over that issue. I will support the government on the throne speech because we gave our word to the lieutenant-governor that we would support the government on confidence votes. My opinion on fracking right now is irrelevant,” he said. Tweet This Story continues below advertisement People’s Alliance Leader Kris Austin said any attempt to allow fracking on a wider basis would be opposed. Meanwhile, the Liberals have introduced a bill, that if passed, would require any changes to a moratorium to go to a full vote of the legislature. Liberal Leader Brian Gallant, whose previous government imposed the moratorium in 2014, said any changes should go to a vote. READ: Fracking moratorium a wedge issue for New Brunswick politicians Corridor Resources currently has 32 producing wells in the Sussex area and operates a 50 kilometre pipeline, a gathering system comprising 15 kilometres of pipe, and a natural gas processing facility. In a corporate presentation released this month, the company said if the moratorium is lifted, they would drill five vertical evaluation wells, complete three existing wells, identify “sweet spots,” and drill a second round of up to five horizontal wells. However, when reached Wednesday, Corridor CEO Steve Moran was sticking to a prepared one-line comment. “We are encouraged by the actions of the government, but we are going to respond in greater detail at a later date,” Moran said by phone from his office in Calgary. Tweet This Premier Blaine Higgs said with dwindling gas supplies off Sable Island, gas prices will increase dramatically if new supplies aren’t developed in the region. Story continues below advertisement “The majority of the gas supply is now coming from the midwest and the pipeline costs are dramatic in the sense of what it means to consumers here in New Brunswick,” Higgs said. “Lets manage this through a manageable-sized development. Let’s look at what has been learned throughout Canada and the U.S. on the safe development of gas supplies,” he said.
NATS Announces Participants in Expanded 2017 Intern Program National professional development program for voice teachers now includes collaborative pianists posted on 2:48 PM, February 6, 2017 The executive office of the National Association of Teachers of Singing (NATS) announced this week that 15 members have been selected to participate in the 2017 NATS Intern Program, a 10-day forum that pairs experienced and recognized master teachers with talented, emerging professionals. In addition to the 12 voice interns selected, the program has been expanded to include three collaborative pianist interns. The executive office of the National Association of Teachers of Singing (NATS) announced that 15 members have been selected to participate in the 2017 NATS Intern Program, a 10-day forum that pairs experienced and recognized master teachers with talented, emerging professionals. In addition to the 12 voice interns selected, the program has been expanded to include three collaborative pianist interns. “Collaborative piano is an exciting addition to the Program after its first 25 years of successes — we’re so glad to offer this addition to our collaborative piano members, and can’t wait to be able to report on the coming together of voice and collaborative piano interns at this Program — our first in Canada,” said NATS Past-President Norman Spivey, who serves as the program’s director. This year's voice interns will work with master teachers Peggy Baroody, Kenneth Bozeman, Mary Saunders-Barton, and W. Stephen Smith, while the inaugural class of collaborative piano interns will work with master teacher Warren Jones. The program will be held June 2-12 at the University of Toronto in Toronto, Ontario, Canada. Spivey is the director of this year's program, and Lorna MacDonald is the on-site coordinator. More than 70 applicants were considered for the prestigious program, which has been in existence since 1991. This year’s class includes teachers who teach in university settings as well as those who operate independent studios. “We are excited to begin working with the class of 2017 Interns. The high number of applicants we had this year has given us a group of exceptionally skilled and promising talent,” said Spivey. With partial funding from the NATS Foundation, the NATS Intern Program is an exceptional training experience. The program environment is structured to improve the teaching skills of the interns as well as promote the interdependent relationships necessary to provide the best instruction for students, who often are independently taught by collaborative pianists and voice teachers. Within an intensive format designed to promote the dynamic exchange of ideas and techniques, the goal is to improve substantially the studio teaching skills of voice interns and the coaching skills of collaborative piano interns. The NATS Intern Program is held annually. Application materials for the 2018 Program will be available in late summer. If you are interested in contributing to the support of the program, donations can be made to the James McKinney Memorial Fund through the NATS Foundation. If your school or facility would be interested in coordinating/hosting a future NATS Summer Intern Program, please contact pastpresident [AT] nats.org for details and facility requirements. "I've often heard that the Intern Program is the best thing that NATS offers, and I couldn't agree more. The ripple effect of this Program is endless. Every Intern will forever be a better teacher and their students will be better teachers because of it. I'm so grateful for the experience and for the lifelong bonds that were formed during those formative weeks together." – Aaron Humble, former participant in the NATS Intern Program (class of 2016)
Key Drivers for Hotel and Resort Spa Profitability The global spa movement, which includes wellness tourism, amounts to upwards of $3 trillion dollars per year. What physical and strategic elements are key to driving bottom-line performance at traditional and wellness-focused spas? Relaxation and a sense of wellbeing are at the heart of the spa and wellness market. Hence, it’s no wonder that hotels, resorts, and spas have begun to reorganize their operations around wellness. The benefits, in the form of a stronger bottom line and appeal to demand segments, extend not only to guests but to hoteliers and hospitality companies, as well. Traditional resort spas cater to relaxation through a variety of services including aesthetics, facials, and massage. Some also offer salon services for hair and nails. Wellness-focused resort spas cater to diet and nutrition, spiritual counseling, and naturopathic health- and prevention-oriented services that extend beyond the scope of a traditional spa. This article looks at the scope of growth for traditional and wellness-focused spas worldwide, as well as the physical and operational keys to building stronger bottom-line performance. Asset Attributes Both traditional and wellness-focused spas are considered effective operating models that can add value to a guest’s hotel or resort destination experience. Moreover, they add value to the hospitality operation itself. These models have begun to merge, presenting a new subdivision of resort and hotel wellness-driven spa environments. The nuances and specifications of these spas vary extensively, as each property has its own unique selling points, specialties, and demographic advantages. One thing hotel and resort wellness spas have in common is that they are at the epicenter of one of the fastest-growing spa and wellness market segments. They are also charted for tremendous rolling growth for their marketability and the increasing demand for experiential and leisure travel. Coupled with new tactics for aiding prevention, increasing happiness, and relieving stress, this new spa “type” brings immediate benefits along with long-term opportunities for client engagement and retention. The Millennial generation and its relatively younger, health savvy members are a prime demographic for the wellness-oriented hotel and travel space. However, the Baby-Boomer market still comes in strong seeking longevity, anti-aging, and lifestyle services to improve overall quality of life. Revenue Traditional spas generate cash-based revenue for elected services. These services are priced based on treatment type, quality, duration of service, and packages. Additional revenue sources for spa services can include a daily fee for spa facility use and auxiliary services, such as poolside massage or treatment provisions provided in other areas of the hotel and guest spaces. While spas are a cash revenue producer, wellness centers comprise a mix of cash, insurance, memberships, and payment plans. Diversifying spa modalities and treatment options can abundantly increase the scope of treatment revenue. This can be a unique advantage based on the goals of the property, client demand, and guest profiles. While luxury resort spa pricing can come at a premium, spa and wellness-center costs are equally competitive, making the move to diversify services more intriguing and ultimately more lucrative. Owners and operators need to have a wide view of the potential revenue generators for a hotel or resort’s spa operation. This includes services, new modalities, and technology as well as retail sales. Whereas treatments and services are core to revenue performance, a well-performing retail segment can add meaningful value to a spa’s bottom line with an average continuum percentage between 10% and 35% of a spa’s annual revenue. Therefore, operators need to maximize efficiencies in the retail space to make it a high-acting outlet. This also requires sales talent and retail training that backs the process of creating higher product rotation and stronger retail sales growth. The following table charts the nearly $5 billion in overall growth of the global spa market between 2013 and 2015. As stated above, this growth has come in the form of new and innovative spa services, as well as product lines that appeal to a wide variety of wellness travelers, including corporate and leisure demand. Global Market Growth According to the Global Wellness Institute’s (GWI) 2017 Global Wellness Economy Monitor, the global spa market grew 2.3% between 2013 and 2015, resulting in a $98.6-billion market. Once considered an amenity (the pejorative term for what spas provide was “pampering”), spa facility revenues in 2015 were worth $77.6 billion globally, while revenue from supporting market sectors that enable spa businesses was reportedly worth $21 billion. These are big numbers, and they’re moving upwards. Between 2013 and 2015 alone, the number of new spa locations increased worldwide from 105,591 to 121,595, adding more than 16,000 new spa facilities and over 230,000 individuals to its workforce. Spa segment growth is anticipated to flourish by an additional 6%, to be worth $103.9 billion by 2020. The GWI study also reports that global wellness tourism revenues grew to $563 billion, a striking 14% rise from 2013 to 2015. The U.S., the #1 wellness market in the world, represented $202 billion of these revenues, nearly triple that of the #2 market. The GWI estimates that wellness tourism will grow another 37.5%, to $808 billion, by 2020. Katherine Johnston, a GWI fellow and senior researcher, speaks of “a profound shift in the way people consume wellness.” She refers to the “infusion” of wellness—in the form of fitness, nutrition, stress reduction, prevention, and other modes—into people’s everyday life, as opposed to a luxury or indulgence taken on once or twice a year. There is a profound upward shift in spa and wellness throughout the hospitality market. Data back this forecast and growth, and these features are no longer the counterpart of temporary trends. This momentum is escalating and long-lasting, led by increasing consumer awareness and higher experiential expectations. Investment Value The force of the spa and wellness industry’s success in recent years has changed the way hoteliers approach the expanse of demand for spa and wellness offerings at their hotels and resorts. Hyatt’s recent acquisition of wellness pioneer the Miraval Group illustrates the enthusiasm behind spa and wellness investment in hospitality. "Hyatt’s growth strategy includes a continued focus on growing wellness experiences and super serving the high-end traveler,” said Angee Smithee, Senior Director of Spas for Hyatt. “For several years, wellness has been a key area for the company as it strives to continue to better care for and understand our guests. Our recent acquisition of Miraval Group provides a proof point for Hyatt’s growth strategy, but more importantly, it is also a demonstration point around our core purpose of care. Hyatt is committed to increasing the lens through which we view our core customer desires,” said Smithee, “and clearly the $420-billion wellness tourism market is one where we are well positioned to capitalize on those opportunities.” The increase in wellness-related travel (transient and group) is leading hospitality giants like Hyatt to pursue spa and wellness models as a wise value-add to hotels and resorts. Corporate wellness programs and executive meetings have also diversified the growth in leisure and wellness tourism. New hotel developments, capital improvements, and spa and wellness program investments continue to rise in the global market. At the same time, there is powerful positioning bringing in stronger and swifter returns on investment. These investments and actions are driven by innovation and new technological options that back the design of substantial new program possibilities. Profitability A hotel spa that caters to wellness can provide a strong competitive advantage for the leisure and wellness-minded customer, as well as corporate groups. However, achieving an operational flow alongside profitability often presents a challenge, making it crucial to understand industry benchmarks that support this evolving market. Some key factors to consider include the square footage of the spa and the allocated square footage for treatment rooms. It is also important to factor in the square footage of a property’s fitness area(s) and the space created for wet and dry amenities. These can include steam rooms, showers, dry saunas, hot tub and pool space, and the spa’s dedicated space for relaxation and retail. In addition to square footage, there are multiple scenarios pertaining to auxiliary services, hotel occupancy rates, and a property’s unique selling points. Guestroom ratios based on seasonal or annual performance can represent upswings and dips in overall utilization. However, the ratios between internal and external marketing and promotions can also significantly sway the range and relationship of services between distinct departments. Done well, these assets can overlap, providing mutual support. Labor costs also affect profitability. Hence, operators must manage staffing logistics, employee satisfaction, and anticipate turnover to achieve a well-tooled operational structure and the most profit from their spa operation. Understanding how to leverage new tools, such as automation and technology, can foster more efficiency, reduce costs, and substantially increase spa revenue. Conclusion Spas and wellness-oriented operations have had a meteoric rise over the past several years and continue to make waves in the lodging industry, particularly at resorts. Hyatt and other hospitality companies highlight the shift toward wellness operations. While traditional performance methodologies still apply, the complexities surrounding the proper implementation and execution of the spa and wellness components remain keys to maximizing the asset’s revenue potential. A Director with HVS, Ryan Wall works extensively on consulting and appraisal assignments for hotels across Arizona and the southwestern U.S. Prior to joining HVS, Ryan held hands-on roles at water-park resorts, historic boutique hotels, and branded full-service properties. Ryan earned a BS from the School of Hospitality Business at Michigan State University. Contact Ryan at (608) 658-0587 or rwall@hvs.com 0 Comments Success Your comment has been submitted. It will be displayed once approved by an administrator. Thank you. Error Error Sending Message: Submit a Question or Comment *Your Name *Your Email *Comment Summary The global spa movement, which includes wellness tourism, amounts to upwards of $3 trillion dollars per year. What physical and strategic elements are key to driving bottom-line performance at traditional and wellness-focused spas?
Q: Why did this reversal from the left cosets of $\langle (1, 2, 3) \rangle$ in $A_4$ give me the right cosets? In this question How to derive the cosets of $A_4$? I derived that the left cosets are $$\{ 1\langle (1, 2, 3) \rangle, (143)\langle (1, 2, 3) \rangle, (142)\langle (1, 2, 3) \rangle, (341)\langle (1, 2, 3) \rangle \}$$ I derived the right cosets $$\{ \langle (1, 2, 3) \rangle 1, \langle (1, 2, 3) \rangle (341), \langle (1, 2, 3) \rangle (241), \langle (1, 2, 3) \rangle (143) \}$$ by simply reversing $$a = 1, (143), (142), (341)$$ to get $$b = 1, (341), (241), (143)$$ I think this has to do with properties of conjugation, cosets or subgroups or normal subgroups, but I don't know which. I think $\langle (1, 2, 3) \rangle$ is not normal because the cosets don't correspond. Remark based on Nicky Hekster's answer: I didn't realize it sooner! $(1, 2, 3)$ is simply $x$ in $S_3$ whose inverse is $x^2$ in both $S_3$ and in $S_4$ (and in $S_n, n\ge 3$ or even $n = 1,2$ if you want to be vacuous). A: This is because if $H \leq G$, $|G:H|=n$, then a set $\{g_1, g_2, \cdots, g_n\}$ represents the left cosets of $H$ if and only if $\{g_1^{-1}, g_2^{-1}, \cdots, g_n^{-1}\}$ represents the right cosets of $H$. This is easy to prove. And remember, writing a cycle from right to left gives you the inverse of this same cycle.
Q: How to get user's full name only from gmail in java/javascript I'm trying to make a website and I need to have a code in my server side (JAVA) or even in front (Javascript) so that when user enters someone's gmail, it automatically gets first and last name associated with that gmail and puts it in database. How is that possible to get full name from only gmail (if it exists) ? A: No, that is not possible without authorization. You either have to authenticate yourself or let the user perform the authentication at client side and use Google's user API with the token. Imagine Google giving your personal details to anyone just because he/she knows your email id, why'd they ever do that?
BATON ROUGE – Starting quarterback jobs for LSU coach Les Miles cannot be won in practice. The heat of the game will decide if sophomore Anthony Jennings or freshman Brandon Harris is LSU’s next full-time starter. “It’s going to be the time in the game where you have the opportunity to extend the play and make a play,” Miles said Sunday afternoon after welcoming 103 players for the start of practice Monday for the 2014 season. “And therein, self-interpretation at some point in time will be, in my opinion, by which you pick the starter.” The starter for the opener on Aug. 29 against Wisconsin in Houston may or may not be the starter for the rest of the season. “I think maturity is the whole deal,” Miles said. “I think recognizing the style of throw and the kind of play and seeing them understand what we’re trying to get accomplished, how we’re attacking defense. That’s something that I think both guys have a good solid base premise.” Jennings performed greatly at the most crucial of times last season late in the Arkansas game when he came in for injured starter Zach Mettenberger, who is now with the Tennessee Titans of the NFL. Jennings threw a 49-yard touchdown pass with 1:15 to go to beat Arkansas 31-27 and finished 4-of-7 for 76 yards with 26 yards on three carries. He did not play well in either the Outback Bowl win over Iowa or in the spring game, though. Harris looked spectacular in spots in the spring game as he threw three touchdown passes and scrambled for 77 yards, though his overall numbers were not great. Unlike many coaches, Miles does not plan to name a firm starter a week or so before the first game. “Never,” he said. “Never have. Never will. We’ll have to see each day how things go — how they proceed.” There have been times when Miles has simply not publicly named a starter at all. Jennings and Harris will be mixed and matched with the separate varsity and freshman practices over the first week of workouts. “One day, one quarterback will be with the morning group, and the next day he’ll work with the afternoon group,” Miles said. “We’ll go back and forth.” JALEN MILLS UPDATE: Junior cornerback/safety Jalen Mills remains indefinitely suspended after his arrest in June for felony battery of a woman, and he was not listed on LSU’s roster Sunday. Miles adjusted his stance on Mills, who started at cornerback in 2012 and ’13 before being moved to safety last spring. “I’m told everything’s pretty positive,” Miles said at the Baton Rouge Rotary Club last week. “It’s a very unfortunate situation. Somebody came to his apartment and pursued him. It’s unfortunate on both ends.” On Sunday, Miles did not offer such specifics and distanced himself from Mills’ legal situation. “And J. Mills (did not report), and again, I don’t know what’s going on there,” Miles said during his opening statement. “So I’ll just go forward.” When asked about the status of Mills’ legal case, Miles said, “I really don’t know. I have not tried to, nor do I intend to pressure the process in any way. Jalen Mills, as does everybody in this room (players’ meeting room), has a responsibility to handle his business. And this is his business.” East Baton Rouge Parish District Attorney Hillar Moore said recently that his office was “still investigating” Mills’ charges. VALENTINE DOES NOT REPORT: Other than Mills, the only other player not reporting for practice, according to Miles, was 2014 signee Travonte Valentine, the No. 3 ranked high school defensive tackle in the nation out of Champagnat Catholic High in Hialeah, Fla. Valentine’s grades at Champagnat are still under review by the NCAA Clearinghouse. “I know that the communication’s been regular,” Miles said. “I think the reality is it’s the high school and the Clearinghouse have to communicate. They’re doing that. They’re trying. Sometimes there are easy answers, and sometimes there are not. Hopefully, this will be an easy answer.” LEALAIMATAFAO NOT ON ROSTER: The name of true freshman Trey Lealaimatafao, a 2014 signee from San Antonio, Texas, did not appear on the roster given to reporters on Sunday. Lealaimatafao was recently arrested on a misdemeanor theft charge for allegedly stealing a bicycle on campus. Miles did not comment on Lealaimatafao, though he did say last week that he did not expect him to play this season, which could mean he will redshirt. Lealaimatafao also injured his shoulder when he punched a glass window in the LSU weight room last month. True freshman Davon Godchaux of Plaquemine was listed on the roster. He was arrested recently for misdemeanor criminal mischief after allegedly throwing firecrackers into another student’s room as a prank.
Introduction ============ Familial hypercholesterolaemia (FH) is primarily an autosomal dominant disorder, characterised by a lifelong elevation of serum cholesterol bound to low-density lipoprotein (LDL). The primary causative defects in approximately 85% of FH cases are mutations or deletions in the plasma membrane Low Density Lipoprotein Receptor (LDLR) encoding gene that is responsible for clearing LDL-cholesterol (LDL-C) from the blood stream by endocytosis and intracellular degradation \[[@B1]\]. Over 1000 different mutations in the LDLR gene on the distal short arm of chromosome 19 (p13.1-p13.3) have been described to date \[[@B2]\] and are recorded online at <http://www.ucl.ac.uk/ldlr/Current/>\[[@B3]\]. The second gene responsible for fewer than 10% of FH cases encodes the ligand for LDLR, namely Apolipoprotein B-100 (ApoB-100), located on the short arm of chromosome 2 (p24) \[[@B4]\]. Mutations in this gene reduce ligand affinity for the receptors and cause reduced clearance of LDL particles resulting in hypercholesterolemia \[[@B5]\], albeit normal LDLR activity. A mutation in the codon for amino acid 3500 (CGG-to-CAG) was found to be a CG mutation hotspot associated with defective LDLs and hypercholesterolemia \[[@B6]\]. The pathophysiological consequences from LDLR or ApoB mutations are loss of protein function, which lead to monogenic FH. Defects in a third gene, located on the short arm of chromosome 1 (p34.1-p32), have also been identified to cause monogenic FH \[[@B7]\]. The convertase subtilisin/kexin type 9 (PCSK9)-gene codes for an enzyme that has also been called \'\'neural apoptosis regulated convertase 1\'\', which has been proposed to be involved in degrading the LDLR protein in the lysosome and thus preventing it from recycling \[[@B8]\]. Gain of function mutations in the PCSK9 gene could therefore cause increased degradation of LDLRs, reduced numbers of receptors on the surface of the cell, and monogenic FH. An autosomal recessive form of FH caused by loss of function mutations in the LDLRAP1 gene, which is located on the short arm of chromosome 1p35-36.1, has also been documented \[[@B9]\]. The clinical phenotype of the autosomal recessive form is similar to that of the classic homozygous FH caused by defects in the LDLR gene, but it is generally less severe and more responsive to lipid-lowering therapy (reviewed in \[[@B10]\]). This article focuses on LDLR-associated FH reviewing, the encountered obstacles, the achieved progress and the future prospectives of LDLR-gene therapy for this disease. LDLR-associated FH ================== Owing to mutations in both alleles of the LDLR locus, homozygous LDLR-associated FH patients present with markedly elevated total serum cholesterol (\>500 mg/dL, 13 mmol/L) and LDL-cholesterol levels (LDL-C, \>450 mg/dL, 11.7 mmol/L). The deposition of insoluble cholesterol causes xanthomata on the tendons of the hands and feet, cutaneous planar and corneal arcus in early life \[[@B11],[@B12]\]. Atheroma of the aortic root and valve can lead to myocardial infarction (MI) and sudden death before the age of 30 years. Coronary artery disease (CAD) is more common and more extensive in receptor negative patients (mutations that completely eliminate receptor functions) than in those with the receptor-defective type (mutations that partially inactivate receptor function), where there is residual receptor activity \[[@B12],[@B13]\]. Heterozygous patients typically have a lower serum cholesterol level (250-450 mg/dL or 6.5-11.6 mmol/L) and LDL-C (200-400 mg/dL or 5.2-10.4 mmol/L) with positive age correlation. They develop the above clinical features at a less accelerated rate, but if untreated most suffer a severe MI and often sudden death or other cardiovascular events in the fourth or fifth decade of life. Due to several hormonal factors, approximately 80% of heterozygote men suffer from CAD, while only 20% to 30% of women are moderately affected \[[@B14]\]. In most investigated populations, the heterozygote form occurs in at least 1:500 and the homozygous form in one in one million individuals \[[@B15]\], although in some populations, for example the Afrikaner population in South Africa, heterozygosity is found in less than 1:80 individuals \[[@B16],[@B17]\]. This unusual high frequency is due to founder effects and no heterozygote advantage has been identified. Heterozygous FH is therefore the most frequent clinically relevant Mendelian trait, being more frequent than homozygous cystic fibrosis and sickle cell anaemia. Cholesterol levels alone are not sufficient to confirm a diagnosis of FH because blood cholesterol levels vary with age, gender and are population specific \[[@B18]\]. In addition, the range of blood cholesterol levels in FH overlaps with that of people with non-genetic multifactorial hypercholesterolaemia, which reduces diagnostic accuracy. Diagnostic criteria of FH, therefore, include clinical symptoms and laboratory findings as well as the family history of a dominant pattern of inheritance for either premature coronary heart disease or hypercholesterolaemia, (reviewed in \[[@B18]\]). The human LDLR is a multi-component single-chain glycoprotein, which contains 839 amino acids in its mature form, encoded by a gene of 45 kb in length \[[@B19]\]. The gene contains 18 exons of which 13 exons code for protein sequences that show homology to other proteins such as the C9 component \[[@B20]\], Epidermal Growth Factor (EGF) \[[@B21]\], blood coagulation factor IX, factor X (FX) and protein C \[[@B22]-[@B24]\]. The mRNA transcript is 5.3 kb in length and encodes a protein of 860 amino acids. About half of the mRNA constitutes a long 3\' untranslated region that contains two and a half copies of the *Alu*family of middle repetitive DNAs \[[@B25]\]. LDL-Receptors are expressed ubiquitously by almost all somatic cells under control of sterol negative feedback, mediated by three 16 bp imperfect repeats (sterol regulatory elements) and a TATA box like sequence in the promoter \[[@B26]\]. Their function is to bind to apolipoprotein ligands, apoB-100 and apoE. Uptake of LDL is mediated mainly through apoB-100 \[[@B27]\]. The mature human LDLR of 160 kDa is composed of five domains, Figure [1](#F1){ref-type="fig"}. Exon 1 encodes a short 5\' untranslated region and 21 hydrophobic amino acids that are not present in the mature protein. This sequence functions as a signal peptide to direct the receptor synthesising ribosomes to the Endoplasmic Reticulum (ER) membrane \[[@B25]\]. Other functional domains of the peptide correspond to the exons as indicated in Figure [1](#F1){ref-type="fig"}, 41 bp of exon 17 plus exon 16 encode the transmembrane domain and the reminder of exon 17 together with exon 18 encode the cytoplasmic domain. ![**Schematic representation of the human LDLR gene, mRNA and protein, A, B and C, respectively. UTR, untranslated region of the mRNA transcript.**Reproduced with modifications from\[[@B25]\].](1755-7682-3-36-1){#F1} Analyses of LDLR-associated FH variants estimated that there were 1066 LDLR gene mutations/rearrangements, 65% (n = 689) of which were DNA substitutions, 24% (n = 260) small DNA rearrangements (\<100 bp), and 11% (n = 117) large DNA rearrangements (\>100 bp) \[[@B2]\]. The DNA substitutions and small rearrangements occur along the length of the gene, with 839 in the exons (93 nonsense variants, 499 missense variants and 247 small rearrangements), 86 in intronic sequences, and 24 in the promoter region. The highest proportion of exon variants occurs in the ligand binding domain (exons 2-6) and the EGF precursor domain (exons 7-14) \[[@B2]\]. Clinical management of FH ========================= To date there is no cure for FH. The primary goal of clinical management in heterozygotes is to control hypercholesterolaemia by lifestyle modification and/or drug treatment in order to decrease the risk of atherosclerosis and to prevent CAD. Lifestyle modification involves educating patients to adhere to a low-fat diet, exercise and to reduce overweight or maintain an optimal body weight. An effective low-fat diet could lower LDL-C (LDL cholesterol) by 20% to 30% \[[@B28]-[@B30]\]. For patients who are not able to reach their LDL-C goal (\<129 mg/dI, 3.31 mmol/L) on the lifestyle modification program, drug therapy is the next step. The current recommendations for LDL-C goals from the National Cholesterol Education Program Adult Treatment Panel III guidelines are \<100 mg/dI, 2.586 mmol/L for patients with very high cardiovascular risk and \<129 mg/dI, 3.31 mmol/L for patients with moderate cardiovascular risk \[[@B31]\]. The preferred and most effective lipid-lowering agents are the 3-hydroxy-3-methylglutaryl-coenzyme A (HMG-CoA) reductase inhibitors, more commonly known as statins \[[@B32]\]. Statins are the best tolerated medication in patients of all ethnic groups, both sexes, and generally, all ages. They also have an excellent safety profile over the now nearly 20 years of widespread clinical use, and have the highest level of patient adherence among available lipid-lowering agents with low incidence of side effects \[[@B33]\]. Because different statins have variable potency, the therapeutic outcome ranging from 20% to 60% reduction in LDL-C \[[@B32]\], depends on the particular statin used, the dose and the type of LDLR mutation. Despite the powerful effect of statins, they may not be appropriate for those who are best treated with non-systemic therapy (eg, young adults, women of childbearing age), who require only a modest reduction in LDL-C, or those with active liver disease or increased liver function test values and who predominantly have hypertriglyceridemia. Increasing the statin dose to 80 mg (rosuvastatin to 40 mg) is associated with a threefold increase in liver toxicity or myopathy \[[@B34]\]. Therefore, treatment with non-statin cholesterol lowering agents, for example bile acid resin \[[@B35]\], niacin \[[@B36]\], fibrate \[[@B37]\] or cholesterol absorption inhibitor \[[@B38]\], is recommended for these patients. Bile acid binding resins are non-absorbable anion exchange resins that bind bile acids in the intestinal lumen, preventing their absorption from the ilium and therefore increasing their fecal excretion. The liver responds by up-regulating cholesterol 7-alpha hydroxylase, which increases the conversion of cholesterol to bile acids, thereby reducing the cholesterol concentration in the hepatocyte \[[@B39]\]. Gastrointestinal disturbances, and drug and/or fat-soluble vitamin malabsorption, which were associated with early generation bile acid resins, have been overcome with new generation agents \[[@B35]\]. Bile acid resins can lower LDL-C approximately 10% to 25% which is appropriate for patients who need only moderate LDL-C lowering \[[@B35]\]. Niacin, or nicotinic acid, is the oldest lipid-lowering drug dating back to the 1950s \[[@B39]\]. Depending on dose and formulation, LDL-C reductions of 12% to 20% maybe anticipated, along with good reductions in triglycerides and 17% to 31% increase in high-density lipoprotein cholesterol (HDL-C). The major drawback to niacin use is its side effects, which include itching, headaches and hepatotoxicity. It is contraindicated in patients with active liver disease or unexplained abnormalities in liver function tests \[[@B39]\]. A cholesterol absorption inhibitor, more commonly known as Ezetimibe, impairs dietary and biliary cholesterol absorption at the brush border of the intestine without affecting the absorption of triglycerides or fat-soluble vitamins \[[@B19]\]. It has been shown to be well tolerated and effective in lowering LDL-C when used as a monotherapy or when adding to statin therapy. Ezetimibe at a dose of 10 mg/day reduced LDL-C by approximately 17% with no adverse effect of myopathy or liver toxicity \[[@B40],[@B41]\]. However, recently concerns have been raised in respect to an independent atherogenic property of this drug, which appears to counteract its cholesterol-reducing action \[[@B42]\]. For patients who do not respond to a maximum dose of a statin and those who develop side effects with higher doses, a combination therapy of statin with one of the above agent, rather than an increase in the statin to high doses, may be more effective in achieving LDL-C goals and improving CAD outcomes while remaining at an acceptable safety profile \[[@B43]\]. Adding a bile acid resin or niacin to the statin can reduce LDL-C by approximately 50%, depending on the choice of statin and dosage prescribed \[[@B44],[@B45]\]. Co-administering 10 mg of ezetimibe with any dose of statin reduced LDL-C levels by an additional 25%, compared with the usual 6% attained by doubling the statin dose \[[@B46]\]. However, even after treatment with a combination therapy, the majority of homozygous and minority of heterozyogotes FH patients may still have extremely raised LDL-C serum levels \[[@B47]\] and their risk of CAD remains unacceptably high. Surgical interventions involving a portocaval shunt or an ileal bypass have yielded transient lowering of plasma LDL in these patients \[[@B48]\]. The preferred treatment at present is an aggressive programme of plasma apheresis or LDL apheresis, a physical procedure in which LDL is selectively removed from the blood by passing plasma over columns that bind the LDL. A small number of angiographic regression studies have been conducted and each weekly or fortnightly treatment has been demonstrated to lower LDL-C levels by about 55% and to delay onset and progression of atherosclerosis \[[@B49]-[@B53]\]. The most significant but also most aggressive metabolic correction is orthotopic liver transplantation in homozygous patients \[[@B54]-[@B56]\]. However, the morbidity and mortality risks as well as scarcity of donated organs are serious limitations. Several novel therapeutic approaches have also been developed recently to lower LDL-C, either as monotherapy or in combination with statins \[[@B57]\] including; squalene synthase inhibitors \[[@B58]\], microsomal triglyceride transfer protein inhibitors \[[@B59],[@B60]\], siRNA for PCSK9 \[[@B61]\] or for apolipoprotein B-100 \[[@B62]\] silencing, antisense PCSK9 \[[@B63]\], and antisense apolipoprotein B-100 (more commonly known as Mipomersen sodium (ISIS 301012)) \[[@B64],[@B65]\]. In August 2010, Genzyme Corp. and Isis Pharmaceuticals Inc. announced the completion of the four phase 3 clinical trials that are required in the initial United States and European of regulatory filings for mipomersen. Filings for therapeutic use in homozygous FH are expected in the first half of 2011 \[[@B66]\]. These double-blinded, placebo-controlled clinical trials have been conducted at several locations worldwide. They involve heterozygous FH patients \[[@B67]\], homozygous FH patients \[[@B68]\], and patients with severe hypercholesterolemia \[[@B69]\]. The latter are defined by LDL-C levels ≥200 mg/dL and baseline cardiovascular disease (CVD) or by LDL-C levels ≥300 mg/dL without CVD. The trials also include patients with high cardiovascular risk \[[@B70]\] and high cholesterol levels as defined by LDL-C levels ≥100 mg/dL who were already taking maximally tolerated lipid-lowering medications. At the end of the study, these patients had an average LDL-C reduction of 36-37% with no serious adverse effects. The reductions observed in the study were in addition to those achieved with the patients\' existing maximally tolerated statin regimens. The trial also met each of its three secondary endpoints with statistically significant reductions in apo-B, non-HDL-cholesterol and total cholesterol. All trials also demonstrated manageable safety and tolerability profile of mipomersen. Although each of these novel therapies effectively lowers LDL-C, challenges remain for clinical development in the assessment of long-term safety. Liver directed gene therapy for FH ================================== Patients who have undergone liver transplantation and have experienced substantial reductions in LDL-C levels provide indirect evidence that gene therapy targeted towards the liver could be effective for this disease. While LDLR is expressed by the majority of body cells, hepatic reconstitution of LDLR expression alone may be sufficient for metabolic correction \[[@B71],[@B72]\]. The liver is an attractive organ for FH gene delivery because of its large mass, its ability to synthesise large amounts of proteins, its central position in metabolism and its good accessibility through the portal vein \[[@B72],[@B73]\]. The homozygous form of FH would be an excellent candidate for gene therapy since the plasma lipid profile, total cholesterol, LDL-C, HDL-C and LDL/HDL ratio, can be measured providing a convenient clinical endpoint to evaluate the response to therapy \[[@B71],[@B72]\]. In addition, a sensitive non-invasive method using a scintillation camera is available to determine the location, magnitude, and duration of LDLR transgene expression which could provide functional transgene expression in gene therapy trials of FH \[[@B74]\]. Moreover, animal models are available, which include the Watanabe heritable hyperlipidemic (WHHL) rabbit \[[@B75]\], and rhesus monkeys \[[@B76]\], the ApoE-knockout (ApoE-/-) mouse \[[@B35]\], and the LDLR-knockout (LDLR-/-) mouse models \[[@B77]\]. The WHHL rabbit demonstrates hypercholesterolaemia due to natural deletion of 12 nucleotides in the LDL-binding domain of the LDLRcDNA \[[@B78]\]. This causes a delay in the post-translational processing of the 120 kDa LDLR-precursor to the 160 kDa mature form, leading to premature degradation of the mature form in the cytoplasm and consequently hypercholesterolaemia (700-1200 mg/dl at 12 months of age) \[[@B79]\]. The WHHL rabbit, therefore, demonstrates metabolic and clinical abnormalities similar to those in patients with FH and may be a more authentic FH model than the LDLR-/- or ApoE-/- mouse models \[[@B80]\] where the raised plasma cholesterol levels (225 ± 27 mg/dl) are lower unless the animals are subjected to a high cholesterol diet. There are also some intrinsic differences in the lipoprotein metabolism of mice compared to humans and rabbits. For instance, the main lipoprotein in plasma of FH patients and the WHHL rabbit is LDL, but in ApoE-/- mice \[[@B81]\] it is the VLDL fraction with apoB-48, and HDL and LDL in LDLR-/- mice \[[@B77]\]. The activity levels of the plasma cholesterol-ester transfer protein (CETP), which facilitates the transport of cholesteryl esters and triglycerides between the lipoproteins, and hence plays a role in LDL particle remodelling, are high in WHHL rabbits, although murine models lack this activity \[[@B80],[@B82]\]. Consequently, HDL levels in the plasma are low in WHHL rabbits but high in mice and rats. In contrast, the ApoB-editing enzyme is not expressed in the liver of rabbits \[[@B80]\], but murine models do have ApoB-editing activity in the liver \[[@B81]\]. Therefore, apoB-48-containing VLDL is secreted from the liver in mice \[[@B80],[@B81]\]. Selective breeding of WHHL rabbits resulted in coronary atherosclerosis-prone WHHL rabbits manifesting with features of coronary and aortic atherosclerosis and myocardial infarction, in contrast murine models are usually resistant to the development of myocardial infarction and features of coronary and aortic atherosclerosis \[[@B80]\]. For the above-described differences, the WHHL rabbit is thought to be a more authentic FH model similar to human subject (reviewed in \[[@B80]\]). Methods of gene delivery ======================== Gene transfer can be performed either *ex vivo*, involving isolation of autologous cells from the patient, their *in vitro*genetic modification and selection followed by reimplantation of the transduced cells, or it can be done *in vivo*, where the vector is delivered directly to the organ \[[@B83]\]. The advantage of the *ex vivo*approach is that the transduction/transfection conditions can be carefully controlled and optimised and individual clones with the most desirable characteristics can be isolated to eliminate unmodified cells or cells with deleterious mutations before re-implantation. While this approach is laborious and time consuming, it may also offer significantly greater safety and control with respect to vector mediated mutagenesis and possible germline transmission of the transferred genes, which is a risk of *in vivo*gene delivery. The disadvantages of the *ex vivo*approach are failure of cell engraftment and difficulties in returning the cells to the patient due to disease manifestations such as portal vein hypertension \[[@B83],[@B84]\]. The *in vivo*approach eliminates the need for engraftment after re-implantation and is therefore easier to perform, more cost effective and may be more applicable for use in countries with limited laboratory resources. The gene transfer vector is injected into the bloodstream (systemic delivery) aiming at somatic cell delivery only or by use of specific cell targeting, preferentially to the tissues of interest (targeted delivery). Organ specific delivery of the gene transfer vector includes intrahepatic injection or selective intravasular application routes. Disadvantages of *in vivo*gene transfer are vector dilution, ectopic transgene expression and non-targeted, random, potentially genotoxic insertion into the host genome. Gene transfer systems ===================== In addition to the method chosen for delivery, successful treatment of FH would ideally require safe and efficient gene transfer vectors that provide appropriate and sustained levels of transgene expression and long-term survival of treated cells. The use of a liver specific promoter would be the most physiological approach to achieve this. However, because of present problems in transfection-efficiency, strong heterologous promoters are commonly used instead for proof of principles studies on the effectiveness of lipid-lowering. The development of more effective vectors to achieve this remains a formidable challenge to gene therapy. The properties required of such a vector system and those that should be avoided are listed in Table [1](#T1){ref-type="table"}. ###### The properties required for development of an ideal vector system and those that need to be avoided. Properties needed Properties to be avoided --------------------------------------------- ---------------------------------------------- Stable high titre vectors Vector degradation Simple and reproducible production Replication competent virus Unlimited packaging capacity Expression of undesirable viral proteins Efficient gene transfer to the target cells Germline gene transmission Controlled genomic integration Insertional mutagenesis Regulated normal levels of expression Inappropriate toxic expression Ability to repeat delivery if needed Severe immune response against vector system Long-term expression Immune response against transgene products Gene transfer vectors are generally classified under two categories; they are either non-viral or virus mediated gene transfer systems. Non-viral gene transfer systems =============================== Gene therapy vectors based on modified viruses are unquestionably the most effective gene delivery systems in use today. Their efficacy at gene transfer is however tempered by their potential toxicity \[[@B85],[@B86]\]. An ideal vector for human gene therapy should deliver sustainable therapeutic levels of gene expression without compromising the viability of the host (at either the cellular or somatic level) in any way. Non-viral vectors are attractive alternatives to viral gene delivery systems because of their low toxicity, relatively easy production and great versatility \[[@B87]\]. Most of the non-viral vectors that have been described for gene therapy are based on complimentary DNA (cDNA) gene sequences driven by highly active promoters. The DNA in these vectors is typically formulated with cationic agents to form complexes, which protect the DNA and facilitate cell entry \[[@B87],[@B88]\]. DNA can, however, be driven into cells by physical means and the liver is particularly amenable to gene delivery via hydrodynamic delivery. Mahato *et al*reported that a standard tail vein injection of naked DNA into mice resulted in almost no gene expression in major organs due to its rapid *in vivo*degradation by nucleases and clearance by the monocular phagocyte system \[[@B89]\]. However, a very rapid injection of a large volume of naked plasmid DNA solution (e.g. 5-10 μg of DNA in 2.5 ml saline, which is almost equivalent to the blood volume of the animal, within 5-7 seconds) *via*the same route induced efficient gene transfer particularly in the liver \[[@B90]\]. This procedure was applied in one of the first non-viral approaches to reverse hypercholesterolaemia in an FH model. In these experiments a DNA construct was produced which encoded a fusion-protein consisting of a soluble form of the LDLR combined with transferrin. The strategy of this approach was based on the ability of the fusion protein to be capable of binding both plasma LDL and the cellular transferrin receptor. When applied *in vivo*following hydrodynamic injection \[[@B91]\], this protein was shown to bind circulating plasma LDL and to mediate its clearance through the transferrin receptor on hepatocytes. Although the system proved functional, a statistically significant change in the lipoprotein profile of an animal model was not demonstrated and the possible immunogenicity of the fusion protein potentially precludes its utility. In contrast to using a cDNA expression cassette, the use of a complete genomic DNA locus to deliver an intact transgene with its native promoter, exons, all intervening introns, and regulatory regions with flanking non-coding genomic DNA sequences may allow regulated complementation of LDLR deficiency in the liver of hypercholesterolaemic animals. In 2003, a bacterial artificial chromosome containing the entire LDLR genomic locus and based on the Epstein Barr Virus (EBV)-retention system was delivered to LDLR deficient Chinese hamster ovary cell line (CHOldlA7) \[[@B92]\], and achieved correction of the cells\' deficiency phenotype \[[@B93]\]. This vector construct was able to mediate LDLR expression at significant levels in the CHOldlA7 cells and in human fibroblasts derived from FH patients for 3 months and to retain the classical expression regulation by sterol levels in these cells. These initial studies paved the way for the development a more sophisticated vector which utilised a Scaffold Matrix Attachment Region (S/MAR) rather than a potentially toxic viral component to provide episomal maintenance \[[@B94]\]. In this study the LDLR genomic locus was incorporated into an HSV-1 amplicon vector, which was shown to remain episomal for 11 weeks and provided the complete restoration of human low density lipoprotein receptor LDLR function in CHOldlA7 cells to physiological levels. The vector comprised the LDLR gene driven by 10 kb of the human LDLR genomic promoter region including the elements, which are essential for physiologically regulated expression. By utilizing the genomic promoter region it was demonstrated that long-term, physiologically regulated gene expression and complementation of receptor deficiency could be obtained in culture for at least 240 cell-generations. Importantly, this vector was shown to be sensitive to the presence of sterols or statins, which modify the activity of the LDLR promoter. These *in vitro*studies finally lead to the successful administration of genomic LDLR vectors *in vivo*via hydrodynamic delivery \[[@B95],[@B96]\]. When administered hydrodynamically in mice it was demonstrated that efficient liver-specific delivery and statin-sensitive expression could be obtained for up to 9 months following delivery \[[@B96]\]. While the majority of studies were focused on treating FH by inhibition of hypercholesterolaemia through up-regulation of LDLR or other surrogate lipoprotein receptors (as will be discussed later), an alternative approach was to down-regulate apoB-100 LDLR-ligand or PCSK9 \[[@B63]\] expression. Down-regulation of apoB-100 by continues intravenous/subcutaneous administration of Mipomersen antisense apolipoprotein B-100 oligonucleotide had been attempted in several clinical trials achieving average LDL-C reduction of 36-37%. Although, the most common adverse event of these trials was erythema at the injection site due to the protocol \[[@B64],[@B65],[@B97]-[@B102]\], challenges remain for clinical development in the assessment of long-term safety. Recombinant virus-based gene transfer systems ============================================= Recombinant viral vectors are usually more effective than non-viral vectors in mediating cell entry and nuclear transfer of therapeutic genes in the target cells. In addition natural tropism of viral envelopes and serotypes can be employed to achieve targeting selectivity for particular host cells. Most of these vectors have mechanisms to avoid intracellular degradation and overcome cellular and immunological barriers to the delivery of the genetic cargo. Generation of a virus vector requires the transformation of a potentially harmful virus from a pathogen into a gene transfer agent whilst retaining the viral infectivity. Hence, the first step is to make the vector replication defective (incapable of producing infectious viral particles in the host\'s target cells). Replication deficient viral vectors are developed by deletion of crucial genes in the virus genome, which are then generally replaced by the therapeutic gene. The elements removed in this way have to be provided *in trans*in order to support vector production. This can be achieved by use of a helper virus or a packaging (production) cell line transfected with the plasmids expressing the genes coding for the required structural virus components and replication proteins. Helper virus must be purified away from the final vector batches intended for safe gene delivery. Recombinant viral vectors presently used are generally classified under two categories; integrating or non-integrating viral vectors \[[@B103]\]. This distinction is an important determinant of the suitability of each vector for a particular application. Present integrating vectors rely on random insertion of the transgenic DNA into the cell\'s genome, leading to stable integration and subsequent passage to the cell\'s progeny. This gene insertion via non-homologous end joining of vector DNA to that of the host using a virus integrase can be most efficiently achieved using retroviral or lenti-retroviral vectors. Adeno-associated viral vector integration is less frequent than that of the unmodified parent virus, which targets preferentially into chromosome 19 and does not show the locus specificity of wild-type virus. It is important to note that integration does not guarantee stable transgene expression due to host mediated gradual silencing of gene expression over time \[[@B104]\], immuno-elimination or physiological cell death of gene modified cells. Non-integrative vectors such as adenovirus and herpes simplex viral vectors allow transient episomal expression of a foreign gene in the target cells. Because of their episomal maintenance, the transferred genes are usually lost over time by dilution at cell division in actively dividing cells or by degradation in non-dividing cells \[[@B105]\]. A non-integrative vector could ideally be delivered repeatedly if required, as long as no immunological reactions develop against the vector or transgenic protein. Unlike adenovirus and herpes simplex viruses, EBV is stably maintained without integration in permissive proliferating cells due to the EBV nuclear antigen 1 protein-mediated replication and segregation, providing long-term transgene expression \[[@B106]\]. It is however unlikely to be used in a clinical setting due to its association with Burkitt\'s lymphoma. The properties of the most commonly used viral vectors are summarised in Table [2](#T2){ref-type="table"}. ###### General properties of the most commonly used viral vectors. Properties Adenoviruses AAV Retroviruses Lentiviruses ---------------------------------- -------------------------------------------------- --------------------------------- -------------------------------------------------------------- ---------------------------------------------- **Wild type viruses** 36 kb ds linear DNA 4.7 kb ssDNA 9.2 kb Diploid +ssRNA 8-10 kb Diploid +ssRNA **Pre-existing host antibodies** Yes Yes Unlikely Unlikely but (may be in HIV +ve individuals) **Packaging capacity** 8-30 kb 4 kb \<8 kb 8 kb expected **Viral titre (particles/ml)** \>10^13^ \>10^12^ \>10^9^ 10^9^ **Stability** Good Good Good Not tested **Integration** No \<10% integrated Yes Yes **Cellular localisation** Nuclear Nuclear Nuclear Nuclear **Cell range** Non-replicating and replicating Non-replicating and replicating Replicating only Non-replicating and replicating **Levels of expression** Very high Moderate Moderate Moderate **Duration of expression** Transient Long Long, but subject to shutdown Long **Immune response** Extensive Not known Few neutralis-ing antibodies Not known **Safety issues** Inflammatory and toxicity Rearrangement and inflammatory Insertional mutagenesis Insertional mutagenesis **Main advantages** Extremely efficient transduction of most tissues Non-inflammatory Non-pathogenic Long-term gene transfer in dividing cells Long-term gene transfer in dividing cells **Main disadvantages** Capsid mediates a potent inflammatory response Small packaging capacity Transduces only dividing cells and potential for oncogenesis Potential for oncogenesis kb, kilo base; ssDNA, single stranded DNA; dsDNA, double stranded DNA. Retrovirus based vectors ------------------------ Retroviruses (RVs) are a large family of enveloped RNA viruses, which are generally classified into three subfamilies; oncoretroviruses, lentiviruses and spumaviruses (foamy viruses). The RV particle is composed of two copies of an RNA genome held together primarily by a sequence called the dimer linkage, which is termed the leader region and found in some cases in *gag*coding region. The genome is surrounded by a spherical or cylindrical shaped core and an enveloped glycoprotein, (Figure [2-A](#F2){ref-type="fig"}). Upon infection, RVs are able to convert their RNA genome in the host cytoplasm to DNA through reverse transcription (RT) \[[@B107]\]. ![**Retrovirus virion, viral genome and RNA transcript**. **A.)**Schematic diagram of virion structure. **B.)**The genome organisation of an oncoretrovirus provirus DNA; locations of all genes and the LTR are indicated. **C.)**Viral RNA transcripts. The full-length transcript serves as the RNA genome and as a messenger RNA for Gag and Gag/Pol polyproteins. The Env is translated from the spliced transcript.](1755-7682-3-36-2){#F2} The genome size of simple RVs is approximately 8-12 kb and comprises three main genes; the group specific antigen encoding gene (*gag*), the polymerase encoding gene (*pol*), and the envelope glycoprotein encoding gene (*env*), which are flanked by elements called long terminal repeats (*LTR*s), Figure [2-B](#F2){ref-type="fig"}. The *gag*gene encodes the viral structural core proteins, which form the matrix, capsid and nucleocapsid, generated by protease cleavage of the Gag precursor protein. The *pol*gene expresses a complex of enzymes that are involved in particle maturation (protease), DNA metabolism (reverse transcriptase) and proviral integration (integrase). These enzymes are usually derived from the Gag/Pol precursor. The *env*gene encodes the surface glycoprotein and the transmembrane protein of the virion, which form a complex that interacts specifically with cellular receptor proteins. The genes in the viral DNA are bracketed by the *LTR*s, which define the beginning and the end of the viral genome. The *LTR*s are identical sequences that can be divided into three elements. *U3*is derived from a sequence unique to the 3\' end of the RNA, *R*is derived from a sequence repeated at both ends of the RNA, and *U5*is derived from a sequence unique to the 5\' end of the RNA. The genesis of the *LTR*elements lies in the process of reverse transcription. *U3*contains most of the transcriptional control elements of the provirus (viral genome, which has integrated into the chromosomal DNA of a cell), which include the promoter and multiple enhancer sequences responsive to cellular and in some cases viral transcriptional activator proteins. The site of transcription initiation is at the boundary between *U3*and *R*of the 5\' *LTR*and the site of poly(A) addition is at the boundary between *R*and *U5*at the 3\' *LTR*, as shown in Figure [2-C](#F2){ref-type="fig"}. The other boundaries of *U3*and *U5*are determined by the primer binding site (*PBS*) and the polypurine tract (*PTT*), which are important for reverse transcription. Just downstream of the 3\' end of the 5\' *LTR*, is a short packaging sequence (Psi,Ψ), which extends into *gag*and is responsible for encapsidation of the two viral RNA genomes into the capsid. The *att*sequences at the ends of the 5\' and 3\' *LTR*s are necessary for proviral integration \[[@B107]\]. The life cycle of a RV starts with high affinity binding of the viral envelope glycoprotein to its receptor on the outer layer of the cell membrane. This interaction leads to the fusion of the lipid envelope surrounding the virus, with the target cell membrane. Cell entry of the viral capsid containing the RNA genome allows the reverse transcriptase enzyme to copy the viral RNA genome into a double-stranded DNA, which becomes associated with viral proteins to form what is called a pre-integration complex (PIC). The PIC translocates to the nucleus where the viral enzyme integrase, which is part of PIC, mediates integration of the provirus DNA sequence into the chromosomal DNA of the host cell. The inserted sequence (provirus) is flanked by complete copies of *LTR*sequences. The 5\' *LTR*drives transcription of the RV genome, which gives rise to RNA that codes for the viral proteins Gag, Pol and Env as well as for the viral RNA genome, Figure [2-C](#F2){ref-type="fig"}. Gag and Gag/Pol proteins assemble as viral core particles at the plasma membrane which package the viral RNA genomes and bud from the cell membrane enveloped with plasma membrane lipid from the host, in which virus derived Env glycoproteins are embedded \[[@B107]\]. The first generation replication defective retroviral vectors were developed using Molony Murine Leukaemia Virus (MoMLV) as a prototype. Replication defective vector particles were produced by a deconstruction strategy, which aims to dissect/segregate the viral genome into two transcriptional units (plasmid constructs). They are the vector genome and the packaging constructs, Figure [3](#F3){ref-type="fig"}. The vector genome retains all the necessary *cis*elements of the vectors and is generated by replacing viral protein encoding sequences later to be provided in trans with the transgene of interest. Both the Ψ signal that is essential for packaging of the vector genome into the capsid and the viral *LTR*s, which are necessary for proviral integration, remain in the vector genome construct. Expression of the transgenic protein is driven by the promoter in the *U3*region of the 5\' *LTR*. The packaging construct provides all of the viral proteins in *trans*to the vector genome construct (Gag, Pol and Env). The packaging signal is deleted from the packaging construct to prevent its incorporation into viral particles. When both the vector genome and packaging constructs are present in a producer cell, retroviral vector particles, which are capable of delivering the vector genome with its inserted gene into new target cells, are released \[[@B108]\]. The process of gene transfer by such a vector is referred to as transduction. When these two constructs are present in cells in an integrated form, the cell becomes a stable virus producer. Alternatively, virus can also be produced for a short period of time after transient co-transfection of the viral genome alongside with packaging plasmids. ![**The genomic organisation of MoMLV and the basic retroviral vector design**.](1755-7682-3-36-3){#F3} The basic arrangement described above is functional but unsatisfactory for several reasons. Firstly, the sequence overlap that remains between the vector and packaging constructs could result in recombination to form infectious replication competent retrovirus (RCR). The overlap exists principally because extensive sequences of the *gag*gene are retained in the vector construct to enhance the efficiency of packaging, although Gag protein production is prevented by mutation. In addition, overlapping sequences also exist because the *LTR*s are retained in the packaging construct to provide both promoter and poly-adenylation sequences. Secondly, the early MoMLV based vectors were established in murine NIH 3T3 packaging cell lines, therefore, the possibility for RCR generation through recombination between vector constructs and defective endogenous MoMLV-like sequences present in the target cells cannot be excluded \[[@B109]\]. Thirdly, vector particles produced in murine cells can be sensitive to host compliment mediated inactivation after *in vivo*gene delivery \[[@B110],[@B111]\]. In order to minimise the risk of RCR production, an improved vector system was designed by segregating the *gag*/*pol*and *env*genes present on the packaging construct, onto discrete expression units, Figure [4](#F4){ref-type="fig"}. The risk of recombination was also further reduced by the use of heterologous envelope proteins that are derived from alternative viruses with no homology to parental virus sequences but are still able to be incorporated into the viral particle (a process referred as pseudotyping). Pseudotyping may also alter the tropism of the viral vector and can be used as a powerful tool for cell targeting different host tissues. Pseudotyping of MoMLV and other RVs with the murine ecotropic (recognising only receptors present on mouse cells), amphotropic (interacting with receptors on both mouse and human cells) or the vesicular stomatitis virus glycoprotein (VSV-G) envelopes (with broad host range including mammalian and even insect cells) has been achieved and proven useful \[[@B112],[@B113]\]. In this improved virus production system, part of the *gag*sequence present on the first generation MoMLV vector is removed from the vector genome without significant loss of packaging efficiency (it was subsequently found that part of the gag region is essential for efficient vector packaging) \[[@B114]\], Figure [4](#F4){ref-type="fig"}. ![**Schematic representation of the improved retrovirus three plasmid co-transfection system**. Viral genome is segregated into three expression plasmids; the vector genome, the Gag/Pol expressing plasmid, and the envelope expressing plasmid. For generation of viral particles, these plasmids are co-transfected into the HEK 293 producer cells, and virus is released into the supernatant.](1755-7682-3-36-4){#F4} The problem of overlapping sequences between the vector and the packaging construct has been solved by using heterologous promoters and polyadenylation signals to drive structural gene expression from the packaging constructs. Strong heterologous promoters like cytomegalovirus (CMV) can provide high virus titre production circumventing the limited titre offered by he MoMLV *LTR*s that give low-level gene expression in producer cell lines not of murine origin. In the vector genome construct itself, heterologous promoters have been used to replace the 5\' *U3*promoter. In addition, the 3\' *U3*sequences can be significantly deleted as long as the sequences necessary for recognition by the integrase protein are retained. This is the basis of self inactivating (SIN) vectors where deletion of the viral promoter and enhancer regions in the 3\' *U3*are duplicated during reverse transcription in the 5\' LTR to prevent *LTR*-driven transcription in infected host cells which could result in the expression of downstream inserted proto-oncogenes \[[@B115]\]. Transgene expression in these vectors is therefore typically and exclusively driven by an internal heterologous promoter, which allows the use of regulated and/or tissue specific expression. Finally, a non-murine producer cell line was used for vector production to prevent the possible generation of RCR through recombination with endogenous MoMLV-like sequences \[[@B110]\]. In the latest generation of RV based-vectors, improvements have also been made in the vector titre (number of colony-forming units per ml) by the development of transient plasmid co-transfection systems, which are capable of producing very high vector titres for a short period of time in the highly transfectable HEK 293 (human embryonic kidney epithelial cells) cell line \[[@B110]\]. Also some human cells used to generate packaging cell lines can produce a complement-resistant retroviral vector \[[@B111]\]. Transfection of HEK 293T cells using SV40 large T antigen to improve vector load and hence vector titre are used also to circumvent the cytotoxicity of the highly desirable VSV-G envelope that provides broad host range infection. Recombinant MoMLV-based vectors produced by the strategy described above are efficient gene transfer vehicles, reaching transfer levels *in vitro*of close to 100%. They can be produced at a high titre (10^9^infectious units (lU)/ml) and have the capacity to infect a wide variety of dividing cells including hepatocytes. The RV vector genome can also provide transfer of RNA of approximately 7.5 kb in length. The critical limitation to the use of RVs is their inability to infect non-dividing cells and as the liver is an only slowly proliferating tissue these vectors are not ideal for LDLR gene delivery to hepatocytes. Therefore, for direct *in vivo*transduction of the liver, cells have to be either in a naturally dividing state or to be induced to divide. Alternatively, the vectors can be used for *ex vivo*treatment. Hypercholesterolaemia has been ameliorated by RV-based vectors using *ex vivo*gene delivery in numerous experimental studies. The original procedure used for liver-directed gene therapy of FH was based on the *ex vivo*approach, which involved re-infusion of autologous hepatocytes that had been removed from a WHHL rabbit and subjected to *in vitro*genetic correction with RV vectors based on MoMLV. Animals transplanted with LDLR transduced celIs demonstrated a 30-50% reduction in total serum cholesterol levels persistent for the duration of the experiment (122 days). Recombinant derived LDLR mRNA was detected in liver cells for 6 months. There was no apparent immunological response to the recombinant derived rabbit LDLR \[[@B116]\]. This study illustrated the potential of the *ex vivo*approach to ameliorate hyperlipidaemia associated with FH using a RV-based vector. In preparation for human trials with RV-based vectors, the efficacy, safety and feasibility of *ex vivo*gene therapy for FH was further documented in non-human primates \[[@B117],[@B118]\]. Three baboons were subjected to a partial hepatectomy and their hepatocytes were isolated, cultured, and transduced with a RV containing the human low-density lipoprotein (hLDLRcDNA) sequence. Infusion of the genetically modified hepatocytes was performed through a catheter that had been placed into the inferior mesenteric vein at the time of liver resection. The baboons tolerated the procedures and were monitored for up to eight months \[[@B117]\]. The safety and efficacy of the *ex vivo*approach for delivery of gene transduced hepatocytes via the mesenteric circulation was further documented in a canine model \[[@B118]\]. The above studies demonstrated the feasibility and safety of the *ex vivo*approach, which was then carried out on a human patient in the first clinical trial for FH published in 1994. In this trial a 29 year-old woman with a homozygous receptor defective FH was subjected to *ex vivo*gene therapy using an amphotropic RV-based vector expressing human LDLRcDNA under control of the CMV enhanced chicken β-actin promoter. The patient tolerated the procedure and *in situ*hybridisation of liver tissue four months after therapy revealed evidence for engraftment of transgene expressing cells. The patient\'s LDL/HDL ratio declined from 10-13 before vector delivery to 5-8 after vector delivery, an improvement that remained stable for the duration of the reported observation (18 months). However, kinetic studies of LDL metabolism including LDL binding, uptake and degradation were not presented \[[@B119]\]. This trial was severely criticised with respect to both the suitability of the patient for this therapeutic intervention and for the aggressiveness of the protocol, which involved a 25% hepatectomy \[[@B120]\]. Grossman et al then reported four additional homozygous FH patients subjected to a surgical resection of the left lateral segment of the liver and re-infusion of the genetically modified hepatocytes \[[@B121]\]. The patients tolerated the infusions of autologous hepatocytes well without complications. Liver biopsies performed four months after treatment revealed LDLR transgene expression in a limited number of hepatocytes by *in situ*hybridisation in all four subjects. One of four patients had a significant and prolonged reduction of about 20% in his LDL-C levels. Kinetic studies of the LDL metabolism demonstrated that LDL catabolism was increased in the same patient, which was consistent with increased LDLR expression \[[@B121]\]. The reason for the only marginally successful lowering of cholesterol levels and the variable metabolic responses observed in the five subjects studied are presumably due to low gene transfer efficiency or low expression levels \[[@B121]\]. The variable metabolic response observed following low-level genetic reconstitution in the five patients precluded a broader application of *ex vivo*liver-directed gene therapy with RV based vectors, pending improvement of vector efficiency. The following sections review the preclinical work towards this goal with alternative vector system. Adenovirus based vectors ------------------------ Adenoviruses (Ads) are icosahedral particles consisting of linear, double stranded DNA with a non-enveloped virion, (Figure [5-A](#F5){ref-type="fig"}). There are at least 50 different human adenovirus serotypes with an approximate genome size of 36 kb. The Ad genome (Figure [5-B](#F5){ref-type="fig"}) is intimately associated with viral proteins (core) and is packaged in the viral capsid, which consists primarily of three proteins; hexon, penton base and fibre-knob. After infection, the virus genome does not integrate into the host chromosomal DNA, instead it is replicated as an episomal (extra-chromosomal) element in the host nucleus \[[@B122]\]. ![**Features of adenovirus particle**. **A.)**Structural features of Ad. **B.)**Genomic organisation of wild type Ad. Reproduced with modifications from original diagram provided kindly by Dr Simon Waddington.](1755-7682-3-36-5){#F5} Because of the ability of adenoviral vectors to infect a broad range of mammalian cell types regardless of their replication status, they have been widely used for a variety of gene transfer applications *in vitro*\[[@B123]\], *in vivo*\[[@B124]\] and in clinical trials \[[@B125]\]. Most adenoviral vectors currently used are derived from serotypes 2 or 5, which are endemic and cause upper respiratory tract infection in humans. Most human individuals have become immune-sensitised by natural infection during childhood \[[@B83]\]. Vectors derived from serotypes 2 and 5 enter the cells after attachment to the cellular receptor CAR (coxsackievirus and adenovirus receptor), through the knob of the fiber \[[@B126]\]. Virus entry occurs then through cIathrin-mediated endocytosis after binding of the penton base to integrins \[[@B127]\]. It is noteworthy that differences in the tropism of various Ad serotypes indicate that besides CAR, other cellular receptors also contribute, suggesting that the host range of Ad vectors can be altered by use of alternative serotypes. The first generation of replication deficient Ad vectors was constructed by replacing one or two viral early (E1 and E2) genes, which are essential for viral replication, with the transcriptional cassette of interest containing an enhancer-promoter element and the desired gene. Vectors in such a configuration have a packaging capacity of 6.5-8.3 kb. The recombinant vectors are replicated in cells that express the products of the E1 and/or E2 genes. Purified high titre stocks of 10^11^-10^12^Ad particles per ml, can be generated and allow high efficiency Ad mediated gene transfer with strong tropism for the liver. Cells that were transduced with these vectors express adenoviral genes at low levels, in addition to the transgenic protein \[[@B128]\]. The utility of replication defective first-generation recombinant Ad to mediate hLDLR gene transfer in hepatocytes derived from FH patients was first examined and documented in 1993 \[[@B123]\], using the β-actin promoter. The level of recombinant-derived LDLR protein in transduced FH hepatocytes exceeded the endogenous levels by at least 20-folds. Reversal of hypercholesterolaemia was then demonstrated in LDLR-/- mice fed with a high cholesterol diet after intravenous injection of a replication-defective Ad encoding the hLDLR driven by CMV promoter. This *in vivo*approach resulted in reduction of the elevated intermediate density lipoprotein (IDL)/LDL ratio to normal levels, four days after vector delivery \[[@B129]\]. Similarly, injection of a replication-defective Ad encoding the hLDLR driven by an optimised CMV promoter into the portal vein of WHHL rabbits, resulted in over-expression of hLDLR in the majority of hepatocytes that exceeded the levels in normal human liver by at least 10 fold. Transgene expression was stable for 7-10 days but diminished to undetectable levels within three weeks \[[@B130]\]. Similar studies were also conducted on WHHL rabbits with Ad vectors containing rabbit LDLRcDNA \[[@B131]\] or human LDLRcDNA \[[@B132]\]. These studies also resulted in strong but transient transgene expression. However, the high level of LDLR expression and substantial reduction of total and LDL cholesterol achieved by adenovirus LDLR gene transfer in these animal models led to a massive intracellular lipid (cholesterol and cholesterol ester) deposition in transduced cells \[[@B130],[@B133]\]. This accumulation resulted from non-physiological over-expression of LDLR mediated by the Ad vector, causing pathological intracellular accumulation of the lipid that could not be compensated by the hepatic cell metabolism \[[@B133],[@B134]\]. The transient expression was not solely due to the episomal nature of Ad infection but also a result of host immune responses against adenoviral proteins \[[@B124],[@B135],[@B136]\]. Co-administration of an Ad vector encoding hLDLR driven by a CMV promoter, with a blocking antibody directed against CD154 (CD40 ligand) to suppress immune responses against the vector and foreign transgene product in LDLR -/- mice, resulted in long-term expression of LDLR and maintained cholesterol levels within and below the normal range for at least 92 days post vector delivery. The loss of hLDLR expression in non anti-CD154-treated mice also demonstrated the importance of the host immune response against vector and transgene products \[[@B137]\]. In direct response to these immunological reactions and vector cytotoxicity, helper dependent adenovirus (HD-Ad) vectors were developed, in which additional viral coding sequences were deleted \[[@B138]\]. This also increases the insert capacity of the vector to approximately 30 kb. Nomura and colleagues \[[@B139]\] compared the efficiency of monkey LDLR gene therapy with that of monkey very low density lipoprotein receptor (VLDLR) gene therapy, using HD-Ad. High cholesterol diet fed LDLR-/- mice were injected with a single intravenous application of high (1.5 × 10^13^vector particles (vp)/kg) and low (5 × 10^12^vp/kg) doses of HD-Ad. Throughout the 24-week experiment, plasma cholesterol of LDLR-treated mice was lower than that of VLDLR-treated mice. Anti-LDLR antibodies developed in 2 of 10 mice treated with high-dose HD-Ad-LDLR but in none (0/14) of the other treatment groups. The antibody titre in the high-dose experiments was significantly above background, but was three orders of magnitude lower than that seen following first generation Ad-LDLR treatment, indicating that the marked pro-inflammatory adenoviral protein expression following FG-Ad-LDLR gene transfer could have acted as an adjuvant that stimulated antibody production in these mice. Long-term efficacy of low-dose HD-Ad-LDLR injected into 12-week old LDLR-/- mice was tested and after 60 weeks, atherosclerosis lesions covered approximately 50% of the surface of aortas of control mice whereas aortas of treated mice were essentially lesion-free. The lipid lowering effect of HD-Ad-LDLR lasted at least 108 weeks (\>2 years) when all control mice had died \[[@B139]\]. Despite the reported improvements achieved by HD-Ad, the cytotoxic effect resulting from immune response to high titre (3.8 × 10^13^lU/mI) administration of a 2^nd^generation adenoviral vector, which led to the unfortunate death of a patient in a non-FH clinical trial \[[@B125]\] stopped any further *in vivo*adenoviral vector delivery trials, pending improvement in vector design. In an attempt to address this issue, Jacobs and colleagues investigated the use of a relatively low dose (5 × 10^10^particles) of second generation E1E3E4-deleted adenoviral vectors for transfer of the LDLR or VLDLR, under control of the hepatocyte-specific human *α*~*1*~*-antitrypsin*promoter and 4 copies of the human *apo E*enhancer, into C57BL/6 LDLR-/- mice \[[@B140]\]. Evaluation was performed for 30 weeks after vector delivery in male and female mice fed either standard chow or an atherogenic diet. Compared to control mice, AdLDLR and AdVLDLR persistently decreased plasma non-HDL cholesterol in both sexes and on both diets and potently inhibit development of atherosclerosis in the ascending aorta. The non-physiologically regulated over-expression of LDLR or VLDLR, transferred by E1E3E4-deleted adenoviral vectors, significantly reduces tissue cholesterol levels in myocardium, quadriceps muscle, and kidney and does not lead to pathological intracellular accumulation of cholesterol and cholesterol esters in hepatocytes. The effectiveness of the vectors and expression cassette used in this study is stressed by the fact that, using vector doses that are 2-7.5-fold lower compared to those in other studies \[[@B139],[@B141]\], equivalent results were obtained in terms of lipid lowering and reduction of atherosclerosis \[[@B140]\]. However, immune response to the vector system to evaluate potential development of neutralizing antibody or immune rejection to the transgene and/or vector has not been shown. Adenoviral based vectors still remain the most efficient class of vector in terms of delivering to and expressing their genetic cargo in the cells of most tissues. However, because of their transient expression characteristics, while they remain useful for proof of principle for gene therapy they are not the vector of choice for the treatment of inherited monogenic diseases but will probably find application in the treatment of cancer in which cellular toxicity and immunogenicity might even enhance their anti-tumour effects \[[@B142]\]. Adeno-associated virus vectors ------------------------------ Vectors based on adeno-associated virus (AAV), a small (20-25 nm) non-enveloped DNA virus (Figure [6](#F6){ref-type="fig"}) that is non-pathogenic and replication-defective, have a number of attributes that make them suitable for gene transfer to the liver for the treatment of FH. A single administration of recombinant AAV (rAAV) into the liver results in long-term transgenic protein expression without toxicity in a variety of animal models \[[@B143]\]. These pre-clinical studies have lead to phase I/II trials of liver gene transfer for diseases such as haemophilia \[[@B144]\] for example, using AAV serotype 2, the first isolate to be characterised. ![**Genomic organisation of the AAV and basic AAV vector design**.](1755-7682-3-36-6){#F6} There are several current obstacles to AAV gene therapy that need to be addressed. Although AAV is not known to cause human disease, 85% of the adult population is sero-positive for AAV capsid proteins \[[@B145]\] and wild type (wt) AAV2 is endemic to humans. Thus most of the patients that participated in clinical trials are likely to have had pre-existing immunity to the serotype employed, as a result of prior natural infection. Cytotoxic T-cells resulting from wt-AAV infection can eliminate transduced cells and anti-AAV2 antibodies are able to block or reduce gene transfer with rAAV2 vectors. These factors may have limited transgenic hFIX protein expression in a recent hemophilia B gene therapy trial \[[@B144]\]. Switching the capsid protein to other AAV serotypes that are less prevalent in humans can overcome these immunological problems \[[@B146]\]. There are several AAV serotypes available that may prove useful in the future for clinical translation. Currently a high multiplicity of infection is needed to achieve therapeutic AAV mediated gene transfer. Efficient transduction of target cells is blocked at several levels during AAV cell infection and movement of the vector into the nucleus. The host gender appears to be an important consideration, since in mice exogenous androgens can increase stable hepatocyte gene transfer in females to levels observed in male mice \[[@B147]\]. Strategies such as blocking endosomal degradation of AAV with proteasome inhibitors significantly improve AAV transduction in mice \[[@B148],[@B149]\]. Switching AAV capsid proteins to an alternative serotype such as AAV8 can also enhance uncoating of the vector and release of the genome \[[@B146]\]. The dsDNA genome of the AAV vector can persist as an episomal element in transduced cells for long periods of time in a variety of molecular forms, including circular monomers, linear monomers and linear concatemers by head to tail recombination of the ITRs. Integration of single and concatemeric genomes into the chromosomal DNA of the host cells occurs at low frequency \[[@B103]\]. Because the transgene is predominantly expressed from the episomal form, expression usually declines over time due to dilution in the replicating cells or degradation in non-dividing cells \[[@B105]\]. A recent study found that administration of Ad 10-20 weeks after AAV gene transfer augmented AAV transgene expression two-fold by increasing the level of pro-viral mRNA \[[@B149]\] and this strategy may prove useful in clinical practice when transgenic protein expression levels fall. Slow conversion of the virus single stranded (ss) to the double stranded (ds) DNA genome is another issue. After the AAV virus enters the nucleus, the virus single stranded DNA genome (ssDNA) is converted to a transcriptionally active double stranded DNA (dsDNA) \[[@B150]\]. Unless the conversion happens, ssDNA is lost rapidly after transduction, leading to a drop in transgenic protein expression. This rate-limiting conversion process can be circumvented by modifying the configuration of the provirus so that it is packaged as complementary dimer as opposed to the conventional ss \[[@B151]\]. This self-complementary (sc) AAV vector configuration has been shown to significantly improve gene transfer to the liver for human factor IX, achieving levels of stable transduction that are almost one order of magnitude higher than those achieved with an equivalent dose of comparable ssAAV \[[@B151],[@B152]\]. Lowering the required dose of scAAV vector would be of benefit for safety considerations and for scaling up to clinical grade vector production. Modifying the promoter can alter the tissue-specific expression. Use of the liver-specific promoter, LP-1 for example in a self-complementary AAV2/3 vector driving the human factor IX (hFIX) protein, resulted in transgenic h(FIX) protein expression confined to the liver as detected by RT-PCR analysis \[[@B152]\]. This would be beneficial for FH gene therapy. One of the earliest studies on AAV vectors for FH gene therapy found promising results. Reversal of hypercholesterolaemia was demonstrated in LDLR-/- mice fed with a high cholesterol diet after intraportal vascular injection of 1 × 10^12^AAV-2 vector particles encoding the murine VLDLR driven by the CMV enhanced chicken β-actin promoter \[[@B153]\]. Western blot analysis and immunohistochemistry revealed high levels of VLDLR expression in approximately 2-5% of cells of liver harvested at 3 and 6 months after vector delivery with a low vector DNA copy number of 1 copy/cell. Serum cholesterol progressively declined after vector administration and by 6 months, the aortic atherosclerotic lesion area was reduced 33% compared with control mice injected with saline. Phenotypic correction was incomplete however, primarily due to immune activation by the vector products and low efficiency of gene transfer mediated by AAV-2. Lebherz and colleagues \[[@B154]\] compared the efficiency of AAV-2, -7 and -8 serotype vectors carrying the human LDLRcDNA expressed from a liver specific promoter based on the human thyroxin binding globulin \[[@B155]\]. A vector dose of 1 × 10^12^genome copies (gc) per mouse was injected into the portal veins of LDLR-/- mice that were fed a high-fat diet. Transduction efficiency was increased to 50 gc/cell and 10 gc/cell after treatment with an AAV-8 or AAV-7 vector respectively, compared with 2 gc/cell after administration of an AAV-2 vector. Animals receiving the AAV-LDLR serotype 7 and 8 achieved nearly complete normalization of serum lipids and failed to develop the severe atherosclerosis that characterized the untreated animals, with no apparent toxicity observed. Animals treated with the AAV-2 vector achieved partial lipid correction and only a modest improvement in atherosclerosis. Serotype 8 virus achieved stable transduction and expression of the transgene in up to 85% of the hepatocytes. These results are encouraging especially since no expression-terminating immune responses were detected \[[@B154]\]. There were similar findings in the apo-E mouse model of FH, where intravenous administration of AAV2/7- and AAV2/8-apoE vectors completely prevented atherosclerosis at 1 year \[[@B156]\]. Another approach using AAV vectors has been to try to counteract the development of atherosclerosis by gene transfer of interleukin-10 (IL10), an anti-inflammatory cytokine. Injection of AAV IL10 vector into the tail vein \[[@B157]\] of LDLR-knockout mice or into the tibial muscle \[[@B158]\] of apo-E deficient mice resulted in significantly lower levels of atherosclerosis. More recently, a single intravenous injection of an AAV8 vector containing the mouse LDLR gene to a humanized mouse model of FH, the LDLR-/-Apobec-/- mouse, was found to significantly reduce plasma cholesterol and non-HDL cholesterol levels in chow-fed animals at low doses. Treated mice realized an 87% regression of atherosclerotic lesions with substantial remodeling, after 3 months compared to baseline mice \[[@B159]\]. In summary, modifying the AAV vector system by altering the capsid (reviewed in \[[@B160]\]), including dsDNA and using a liver specific promoter may result in long term, stable and liver specific AAV mediated transgenic protein expression which may be suitable for FH gene therapy. Lentivirus based vectors ------------------------ Lentiviruses (LVs) are a complex sub-group of RVs responsible for a variety of immunological and neurological diseases. Their biological and molecular and properties have been used to classify them as lenti-(sIow) retroviruses. They can be subdivided into primate and non-primate viruses. The primate viruses are the human and simian immunodeficiency viruses (HIV and SIV), and the non-primate viruses include the feline and bovine immunodeficiency viruses, the caprine arthritis/encephalitis virus, the visna/maedi/ovine progressive pneumonia virus, and the equine infectious anaemia virus (EIAV) \[[@B107]\]. As for all RVs, the LV genome consists of a positive-strand polyadenylated RNA of about 10 kb and includes three genes; *gag*, *pol*, and *env*organised in the 5\' to 3\' orientation. Lentiviruses have additional unique small ORFs located between *pol*and *env*at the 3\' terminus, which contain genes for regulatory proteins \[[@B107]\]. Interest in LVs as putative gene transfer systems is derived from the fact that they have the potential to integrate efficiently into the genome of dividing and non-dividing cells providing the possibility for lifetime correction with a single administration of vector \[[@B161],[@B162]\]. Unlike the RV pre-integration complex, which can only reach the target cell nucleus when the nuclear membrane is disrupted during mitosis, the lentiviral PIC contains nuclear localisation signals, which mediate their transport through nuclear membrane pores into the nucleus during the cell interphase \[[@B163]-[@B165]\]. Although integration of linear DNA episome, provirus precursor, is generally regarded as the end point of gene transfer, two circular episomal types with intact viral coding regions are also generated by cellular proteins from retro- or lenti-viruses and their derived vectors \[[@B166]\]. The first type circularizes by non-homologous recombination of end-joining to form a circular episome with two adjacent LTRs (2-LTR circular episome) \[[@B167]\]. The second type circularizes by homologous recombination within the LTRs to form a circular episome with a single LTR (1-LTR circular episome) \[[@B168]\]. It has been estimated that approximately one-third of linear lentiviral DNA become circular episomal forms and can express proteins and remain metabolically stable and transcriptionally competent in target cells, although, the single LTR circular episomal forms are more prevalent than 2-LTR circles \[[@B166]\]. Using a LV backbone, two types of vector system can be produced and used for gene transfer, the first are integrated lentivirus based vectors (ILV) and the second are integration deficient lentiviral vectors (IDLV). Initial research on the development of lentivirus-based vectors has focused mainly on HIV-1 derived integrated LV vectors as prototype. This is facilitated by the abundance of knowledge that has been accumulated on this virus since its recognition in 1984 as the causative agent of acquired immuno-deficiency syndrome. Like other virally derived vectors, the initial problem to overcome is to maintain viral infectivity but to render the virus replication deficient \[[@B161],[@B162]\]. The LV based vector design is very similar to that of the three-plasmid co-transfection RV system based on MoMLV, described above. In addition, the emergence of a host immune response against lentiviral vectors has not been shown in most of the preclinical studies \[[@B169]-[@B173]\]. Due to the increased concern of insertional mutagenesis (IM) caused by integrating retro- and lentivirus based vectors (as will be discussed later), IDLVs has been thought of as a logical alternative to alleviate the risk of IM. IDLV particles can be generated by the use of integrase mutations that specifically prevent proviral integration resulting in the generation of increased levels of circular vector episomes in transduced cells, but not to compromise its other functions, Because these lentiviral circular episomes lack replication signals, they are gradually lost by dilution in the transduced actively dividing cells, but are stable for several months in transduced quiescent cells \[[@B174]-[@B176]\]. Compared to integrating lenti-vectors, IDLVs have a significantly reduced risk of causing IM, a lesser risk of generating RCRs, a reduced risk of transgene silencing \[[@B177]\], and also extremely low levels of integration (residual background integration frequencies of IDLVs in cultured cells through non-integrase pathways are within the range described for plasmid transfection (reviewed in \[[@B166],[@B178]\]). Recent studies using IDLVs have demonstrated effective gene transfer in the eye \[[@B176]\], brain \[[@B174],[@B179]\], muscle \[[@B180]\], and to a lesser extent in the liver \[[@B181]\], albeit at lower expression levels than with integrating vectors. In addition to gene transfer, IDLVs are also proficient vectors for gene repair and can be converted into stable, replicating circular episomes. These properties, combined with their highly reduced risk of causing IM, have led to increased interest on IDLVs for gene transfer and therapy. Because of the possibility of mobilization by superinfection with replication competent viruses, it has been suggested that future IDL-based vectors should carry *att*mutations in addition to those in the integrase to minimize integration in the event of vector mobilization (reviewed in \[[@B166],[@B178]\]). Long-term evidence for lack of genomic integration beyond residual levels warrants future investigation. To date, IDLVs have not been used for LDLR gene transfer and FH gene therapy. Many labs including ours \[[@B182]\] experienced difficulties to produce infectious ILVs for transfer and expression of human LDLR under control of a ubiquitous promoter. However, based on the utilisation of a previously characterised liver specific promoter (LSP) \[[@B183]\], Kankkonen and colleagues were able to demonstrate for the first time the successful construction and production of high titre (1 × 10^9^IU) third-generation HIV-1 based lentiviral vectors encoding rabbit LDLR. LSP-driven transgene expression was detected after *in vitro*gene transfer into human hepatoma (HepG2) cells, but not after transfer into HeLa cells, HEK 293 cells, or WHHL rabbit skin fibroblasts \[[@B183],[@B184]\]. *In vivo*injection of 1 × 10^9^infectious virus particles into the portal vein of WHHL rabbits resulted in liver-specific expression of the LDLR and clinical chemistry and histological analyses showed normal liver function and morphology during the 2-year follow-up without safety issues. This vector dose resulted in low transduction efficiency (\<0.01%) but demonstrated on average a147 ± 7% decrease in serum cholesterol levels during the first 4 weeks, a 44 ± 8% decrease at 1 year and a 34 ± 10% decrease at the 2-year time point, compared to the control rabbits infected with HIV-green fluorescent protein. During this period, 70% of the rabbits treated with the liver specific lentiviral LDLR vector demonstrated a positive treatment effect with lowered plasma cholesterol levels (25 ± 8%). However, the detailed pattern of bio-distribution after HIV-vector mediated gene transfer, to evaluate potential risks for possible IM and germ-line transmission, has not been investigated. Vector safety in gene therapy ----------------------------- The integration of RV and LV into the genome during gene therapy has caused concern because of the potential for vector-related deleterious side effects on the host. This is, in part, due to the fact that vector insertion occurs in a semi-random manner into actively transcribed genes. For RV vectors insertion preference is for gene promoter regions \[[@B185]-[@B188]\] whereas LVs appear to target the transcription unit of the gene \[[@B189],[@B190]\] and therefore are believed less likely to cause effects on host gene expression following integration \[[@B191]-[@B194]\]. Genotoxicity by RV vectors associated with insertional mutagenessis (IM) has been studied for several years and the theoretical calculated estimates of mutagenesis at a haploid locus are supported by *in vitro*studies using model systems based on mutagenesis of the *hprt*locus or genes that control promotion of growth factor independence at frequencies between 10^-5^-10^-7^per provirus insertion \[[@B191],[@B192]\]. Hence, the likelihood of adverse events caused by RV integration following therapeutic application was considered remote. Unfortunately and unexpectedly, however, development of clonal dominance has been observed in two patient trials that is attributed to RV mediated IM \[[@B86],[@B195]-[@B199]\]. In an *ex vivo*trial carried out in France that used patients\' own haematopoietic stem cells for transplantation after retroviral transduction to correct X-linked severe combined immuno-deficiency (X-SCID), clonally dominant clones have developed into leukaemias in 4 of these patients \[[@B85],[@B86],[@B196]\]. This also occurred in one patient in a British X-SCID trial \[[@B198]\]. In 4 of these cases integration by MoMLV is believed to have caused IM by inserting near the *LMO2*gene \[[@B196],[@B198]\]. In addition, insertions have been found in both *BMI1*and *CCND2*proto-oncogenes \[[@B196],[@B198]\]. Although 5 out of the 20 patients that enrolled in the French and British trials have developed leukaemia it is difficult to understand clearly the events leading to this disease because of existing genetic abnormalities in the patients\' cells that have also been identified. These include chromosomal translocations, gain-of-function mutations activating *NOTCH1*, deletion of tumour suppressor gene *CDKN2A*, 6q interstitial losses, and *SIL-TAL1*rearrangement \[[@B196],[@B198]\]. In a more recent trial for chronic granulomatous disease (CGD) clonal dominance has also been attributed to retrovirus mediated IM 5 month after vector delivery in 2 patients \[[@B199]\]. Vector integrations activated the zinc finger transcription factor homolog\'s MDS1/EVI1, PRDM16 or SETBP1 raising concerns that this could eventually cause tumourgenesis. The first affected patient died 2.5 years after vector delivery as a result of a severe sepsis and the second patient has undergone allogeneic transplant \[[@B199],[@B200]\]. In response to these findings, *ex-vivo*and *in vitro*models have been developed in order to examine RV and LV genotoxicity using haematopoietic cells. *Ex vivo*gene therapy using stem cells is considered a more controllable way of introducing genetic modification to the host than by direct systemic vector administration *in vivo*\[[@B201]-[@B205]\]. These models have confirmed that insertion of RV, and to a lesser extent SIN-RV and LV can contribute to leukaemic development \[[@B85],[@B201]-[@B206]\]. Factors implicated in this process include the integrated vector copy number, integration sites, vector configuration and even the transgene carried by the vector \[[@B85],[@B201]-[@B206]\]. Most recently, host cell transcription, in combination with the mutational potential of the vector, has been shown to be involved in the emergence of clonal dominance \[[@B206],[@B207]\]. In our laboratory we have developed a model more suited to gene therapy for FH where vectors may be delivered directly *in vivo.*In this model vector application *in utero*is performed via the fetal mouse circulation that results in gene transfer to most organs, although the liver is mainly transduced \[[@B208]\]. We found that using a primate HIV-1 based vector carrying the human factor IX (hFIX) gene to correct haemophilia in a knockout mouse model of this disease comprehensive cure was achieved without adverse effects, however, the use of a non-primate EIAV vector driving hFIX gene expression led to a high frequency of liver tumours in these mice \[[@B209]\]. This model is still under development, and we have also obtained similar results with the non-primate feline immuno-defificiency (FIV) vector (Themis *et al*. unpublished data). Most importantly in these tumours, we find insertions within genes assigned as candidate genes involved in cancer development (within a 100 kb integration site window - the theoretical distance by which vector insertion is believed to influence expression of a gene carrying the integrated vector). More than 50% of these genes are registered in the Mouse Retroviral Tagged Cancer Gene Database (RTCGD) \[[@B210]\]. Furthermore, many genes carrying insertions have altered gene expression suggestive of IM by the non-primate LV. Hence, using *in utero*gene delivery where genes are in a highly active transcription state, we are able to sensitively detect adverse effects caused by vector integration. The current models for vector associated genotoxicity all rely on the use of rodent cells as a measure of IM. As these cells are more predisposed to tumour development than human cells, each must be viewed with caution as reliable predictors for mutagenesis occurring in the clinic. The finding of vector genotoxicity in the clinic has, however, revived the use of models of genotoxicity to obtain useful information regarding safe vector design. They may also help to elucidate possible mechanisms relating to IM. In summary, the importance of genotoxicity assays to understand the cause and measure the risk of adverse effects by gene therapy of FH and indeed the treatment of any disease with these vectors cannot be overstated. With the current genotoxicity assays in place we are becoming more confident that gene therapy to FH homozygotes will be possible with minimal side effects. Conclusion ========== Several novel therapies have been developed recently to lower LDL-C in homozygous and heterozygous FH patients \[[@B57]-[@B65],[@B211]\]. However, their major drawback is the need for life-long repeated administration in a similar manner to conventional pharmacological drugs. The advantage of gene therapeutic intervention over other therapeutic regimes is the potential for lifetime correction with a single vector administration. Yet, this goal still needs to be achieved. Despite the considerable progress, made in optimising the two most commonly used gene therapy vector-groups based on retro- and adenoviruses, neither vector has been found to be ideal for *in vivo*and/or *ex vivo*gene transfer. Vectors derived from AAV and LVs are very promising. However, the oncogenesis risk from semi-random integration into actively transcribing genes of the host by LVs \[[@B189],[@B212],[@B213]\], possible germline transmission \[[@B214]\] and some immunological reaction after AAV gene transfer in the human haemophilia-B trials \[[@B144],[@B215]\] are critical drawbacks that require further vector development and improvement. In addition to the LDLR gene augmentation approach, the successful use of the VLDLR as an effective surrogate lipoprotein receptor gene \[[@B139]-[@B141],[@B153],[@B216],[@B217]\] for the complementation of mutated LDLR function in homozygote FH patients would also open an alternative therapeutic avenue, since it would avoid the immune problem in patients with no natural LDLR. Despite the fact that most of the pre-clinical and clinical studies were aimed at treatment of the homozygous form of FH, a minority of heterozygous FH patients, who are refractory to existing pharmacological therapy, are also possible targets. Therefore, once a safe and efficient transfer vector is developed and shown to be effective in homozygous FH, its application might be extended to severe heterozygous FH as well. Clearly there is also an urgent demand for safe and efficient vectors that would integrate into the host genome and provide long-term appropriate gene expression for *in vivo*and/or *ex vivo*gene therapy of FH and many other human diseases. Future work will generally focus on making gene transfer vectors safer by improving their immunogenic, integration, expression and targeting profile. Reducing the inherent oncogenic danger of integrating vectors by engineering conditional suicide genes into the vector backbone to provide a self-destructive mechanism in case of oncogenesis or by targeting their integration into specific pre-defined benign genomic sites, i.e. by zinc-finger nuclease technology, may help achieving this goal \[[@B218]\]. In combinations with the above strategies, the use of *ex vivo*transduction to reduce vector spread can also improve the safety outcome, particularly, if autologous or induced pluripotent stem cells are the target. The application of viral or non-viral, integrating or non-integrating vectors for long term persistence in stem cells with self renewal and differentiation capacities will also be important perspectives for gene-based stem cell therapy. Competing interest Disclosure ============================= The authors declare that they have no competing interests. Authors\' contributions ======================= FAA is responsible for conceiving this work and writing the manuscript. CC, SW, ALD, RH, and MT participated in the drafting of this manuscript. All authors read and approved the final manuscript. Author\'s information ===================== F. A. A. is an Assistant Professor of Genetics and Molecular Medicine, Department of Medical Genetics, Faculty of Medicine, Umm Al-Qura University, Al-Abedia Campus, Makkah 21955, Saudi Arabia. C. C. is an Emeritus Professor and Former Leader, Gene Therapy Research Group, Department of Molecular and Cell Medicine, Sir Alexander Fleming Building, Faculty of Medicine, Imperial College London, London SW7 2AZ, UK. S. W. is a Lecturer and Group Leader, Prenatal Gene Therapy Research Group, Department of Haematology, Haemophilia Centre and Haemostasis Unit, Royal Free and University College Medical School, London NW3 2PF, UK. R. H. is a Research Fellow and Gene Therapy Group Leader in the Section of Molecular Medicine in the Sir Alexander Fleming Building, NHLI, Imperial College London, London SW7 2AZ, UK. A. L. D. is a Senior Lecturer and Honorary Consultant in Obstetrics and Maternal/Fetal Medicine, and leads the Prenatal Cell and Gene Therapy Group, Institute for Women\'s Health, University College London and UCLH, 86-96 Chenies Mews, London, WC1E 6HX, UK. M. T. is a Lecturer and Group Leader, Gene Therapy and Genotoxicity Research Group, Brunel University, Heinz Wolff Building, Uxbridge, Middlesex, West London UB8 3PH, UK. Acknowledgements ================ This work was supported by joint grants from the King Abdulaziz City for Science and Technology (KACST), the Saudi Basic Industries Corporation and Umm-Alqura University, Kingdom of Saudi Arabia. AD is receiving funding from the Department of Health\'s NIHR Biomedical Research Centres funding scheme.
About Us Avery County Commissioners have extended a moratorium on High Impact Industries for another 90 days. According to Building Inspector Tommy Burleson, Commissioners want to make sure the newly drafted High Impact Industry ordinance is perfect before a Rock Quarry has the chance to build in Avery. “It’s going to have a big impact on the county,” he said, “And we don’t want to rush through this thing and miss things.” A special meeting will be held later this month, and a final draft of the ordinance is expected in September. The sudden interest in high impact industries is fueled by R.C. Landholdings’ permit request to build a rock quarry on Hanging Rock Road in the Green Valley Community of Avery County. Neighbors are concerned about the affect such an operation will have on potable water supplies and the surrounding environment. If the final draft is approved, a public hearing is expected in mid-September.
The father of a 2-year-old Jersey City girl whose death has been ruled "suspicious" said yesterday that he got an emotionless call from the child's mother from the Jersey City Medical Center Tuesday night saying the girl was dead. "She called me at 6:30 (p.m.) and told me to get to hospital as soon as possible and I said 'Why? Why?' and finally she said 'Your daughter passed away,'" Paul Lewin, 52, of Brooklyn, said of the call from Jennifer Cruz, 30, regarding the death of Karen Lewin. Lewin said, "She told me with no emotion, not crying, it was like a joke, but I still rushed there. I got to the hospital at 8:20 (p.m.). When I got there the doctor and the nurse said 'We have to talk to you.' I broke down from there. (Cruz) had already been arrested." On Wednesday, Cruz, of Garfield Avenue, made her first court appearance on the charges of endangering the welfare of the 2-year-old, as well as endangering the welfare of her 1-year-old son, Kevin. On May 14, Cruz struck the girl, "causing bruising to her forehead, left cheek, chest and left arm," criminal complaint says, adding that she bit Kevin "on the left shoulder, breaking the skin." An autopsy has been performed on the girl, but the Hudson County Prosecutor's Office has not revealed the results, and said the investigation is active. Lewin said he is the father of both children, as well as Cruz's 2-week-old girl who is hospitalized because she was born prematurely. He said he met Cruz about seven years ago and they have been separated for about 10 months. Cruz moved to Jersey City in late April to have a new "environment without bad influence and thought her life would be better there," Lewin said. Lewin said that about three weeks ago Cruz "told me she had a boyfriend, and I said 'I want to meet this person because if this person is a person who drinks like you, it's not going to be good for you." But Lewin said when he went to Cruz's home each weekend to make sure the children were OK and to buy groceries, the boyfriend was never there. He also said that after pressing Cruz to introduce him, "the person she introduced me to was the boyfriend's brother. I don't know why." Asked if Cruz was capable of fatally harming one of her children, Lewin said "absolutely not." He did say that during various visits he had noticed bruises on Karen's jaw and buttocks and that once she had a black eye. He said Cruz told him the girl played hard with boys and sometimes got a little hurt. He said the bruises "didn't look serious." Kevin has been placed in the care of the state Department of Children and Families, said Lewin, who does construction work. Cruz's bail has been set at $300,000 cash or bond. Lewin said he spoke to Cruz's 9-year-old son at the hospital Tuesday night and the boy gave him a version of events that occurred Tuesday. The Prosecutor's Office has not confirmed what the 9-year-old said. The father said he and Cruz had agreed that he would take Karen and Kevin to a home he owns in Florida for a month, so that Cruz could go back and forth to the hospital more freely to see their newborn. They were to leave for Florida yesterday.
I think they'll continue to up the action and physical displays. They established things in the first movie and showed some new tricks in The Avengers. The ground work is there to really open things up now and I think they will.
Grand Seas Resort Grand Seas Resort Select your stay dates to check availability at Grand Seas Resort Grand Seas Resort About the Hotel Property LocationWhen you stay at Grand Seas Resort in Daytona Beach, you'll be on the beach and close to Andy Romano Beachfront Park and Boardwalk Amusement Area and Pier. This beach condo is within close proximity of Our Lady of Lourdes Catholic Church and Daytona Playhouse. RoomsMake yourself at home in one of the 165 air-conditioned rooms featuring kitchens with refrigerators and stovetops. 32-inch flat-screen televisions can provide entertainment. Conveniences include microwaves and coffee/tea makers, as well as phones with free local calls. Rec, Spa, Premium AmenitiesDip into one of the 2 outdoor swimming pools or 3 spa tubs and enjoy other recreational amenities, which include a health club. This condo also features an arcade/game room and tour/ticket assistance. Business, Other AmenitiesFeatured amenities include a 24-hour front desk, multilingual staff, and laundry facilities. Free self parking is available onsite. Hotel Policy We have included all charges provided to us by the property. However, charges can vary, for example, based on length of stay or the room you book. Renovations and ClosuresThis property is undergoing renovations from 23 September 2015 to 31 December 2015 (completion date subject to change). The hotel will be renovating from 23 September 2015 to 31 December 2015 (completion date subject to change). The following areas are affected:
Wednesday, 8 June 2016 Let´s talk about- Gel Nails / Permanent Nail Art It was my engagement, I thought I’d put in a bit more effort to look my best. So, I decided to go for some arty nails, I went to a nail art salon just near my place to get it done. Since I have never done anything like this before (both nail art and gel nails, in fact I have never grown my nails properly) lol!! but I decided to give it a go this time. I was so satisfied and happy with them that I thanked the guy (who did the nail art) like 100 times;) My gel nails! But the sad part was that they did not tell me any of the disadvantages, until I found out myself! Firstly, I want to start this post by saying I personally haven´t conducted any scientific research on this subject. I´ve simply tried to examine the facts and help you know about it in details on what I´ve found. Here, I go- What are the benefits? Last a lot longer- Soak-off Gel lasts from 2-3 weeks with no chipping. Dry instantly- The UV light dries the polish within minutes which means no wait, no smudging, no dents. Easy to design absolutely anything- You can create some fabulous nail designs. Works on natural nails- It works well on short nails too while you can add extensions to it. You can layer polish on top– If you want to change your color mid-manicure, you can. Paint right over Soak-Off Gel with regular nail polish and remove it with non-acetone remover... whooaaaa!! No filing required- No need to file nails for three weeks or more...yay!! What are the negatives? High cost – Permanent nail art service is more costly than a traditional manicure as it can only be applied by a professional. Nail growth shows – If you choose a dark, solid color, by week two, growth will be very apparent. But if you opt for a transparent one like mine you can free yourself from this. Time – Getting a permanent nail art manicure can take much longer than a traditional one. Especially if you are using a dark color. In the case of dark colors, I’ve heard you need quite a few coats to get it the right color. Removal– Removing is kind of difficult as you need to visit the salon again for removing it in the mid way. Weak nail beds- The scraping from the nails tends to weaken the nail beds, which can lead to breakage (which is apparently more painful):( So to avoid it we need to follow some precautions (listed below). What precautions needs to be taken? In this procedure, nails are actually dead to begin with, so they don't need to breathe! Thus, we need to be little careful and easy on them during this phase - Base coat- Always apply a base coat before a nail paint on them. Avoid stains- If you are into kitchen work and more likely to have stains like turmeric, etc (especially for Indian girlies, like me) , clean it with a non- acetone remover first and then with water otherwise chances are that stains also becomes permanent like the art!! :) During pregnancy- It is safe to wear gel nails while you are pregnant, as long as you take precautions when having them applied and removed as the gel contains some chemicals which can cause allergies. Nail art is a big topic to discuss but I guess this much information is enough for any girl to decide on it.
Related Tags: One of the greatest shooters in NBA history, Stojakovic, 34, announced he will retire after 13 seasons in the NBA which finished with him winning his first ever championship with the Mavericks last season. “When you start competing against your body more than you’re preparing for the actual game,” Stojakovic said, “it’s a wakeup call.” Stojakovic said he was battling through neck and back issues and because of the physical demand of an NBA season, he just saw it as time to hang it up. “I feel so blessed to have been given the athletic gifts to play professional basketball,” Stojakovic said in a release. “I have always loved the game, and have great respect for it, and I know the time is right to step away. I promised myself a long time ago, if it came to the point where my heart and body were not 100% committed, I would step away. I have reached that point and I know the time is right to retire.” Stojakovic, a three-time All-Star, played for the Kings, Pacers, Hornets and Mavericks. He averaged 17 points per game for his career, 40 percent from 3-point range and fourth all-time with 1,760 3-pointers made. So with Stojakovic being one of the greatest shooters ever, it has to be asked: Is he Hall of Fame material? He will be, at least in terms of the international Hall of Fame committee. He was a star in Greece for a number of years and was a major part of the Serbian national team winning the 2001 Eurobasket tournament and the 2002 World Championship. As for NBA Hall of Famer, probably not. Though Peja did have some incredible years in Sacramento. Look at his run from 2000-2005. He averaged better than 20 ppg on 48 percent shooting and 40 percent shooting from 3. His 2003-04 season was outstanding: 24.2 ppg, 6.2 rpg, 48 percent from the field and 43.3 percent from 3. That’s incredible. After he finished in Sacramento, he had difficulty staying healthy, missing about 30 games on average every season after that. He’s an all-time great shooter and after multiple years of being so close in Sacramento, Stojakovic got his title in Dallas last season. Always a good way to go out.
Dear experts: Hello,I am an intern in rfmri.Now,i am involved in a project about diabetic cognitive dysfunction,aimed at studying changes in regard to the small-world feature of the brain function connectivity network.We plan to use DPARSF to process and contrast two groups:one is type 2 diabetes mellitus patients;one is normal persons.At present,we met some trouble and know little about how to deal with it.Therefore,we turn to you for help.Here are two pieces of code.Thank you in advance. I would like to start preprocessing in DPARSFA from Nifti images so I placed the images under the FunImg folder (which contains a folder for each subject). However, when I change the 'Starting Directory Name' to FunImg. I get the following warning: 'Please arrange each subject's DICOM images in one directory and then put them in FunRaw directory under the working directory' and the gui automatically revert to FunRaw (which I do not have as I want to start from nifti images). As a current member of OHBM, you are cordially invited to participate in the council election of the Organization for Human Brain Mapping (OHBM). The elected nominees will represent you to work on the OHBM Council and Program Committee.
Hodgkin's disease in children: clinico-roentgenologic features of the lesion in the chest. The roentgenologic features of Hodgkin's disease were studied in 105 patients under 14 years of age. The mediastinal and hilar nodes were involved in 64.7% of patients. Some consistency of extent and pattern of disease was observed in that mediastinal lymphatic lesions could be associated with cervico-supra-clavicular and retroperitoneal lesions. There was lung infiltration in 14.3% of patients and the frequency of this lesion dependent on the histological type. It was commoner in nodular sclerosis, mixed cellularity and lymphocytic depletion. Lung infiltration usually developed in continuity with the lymphatic gland lesion and only rarely in a metastasis-like form.
Minuscule 909 Minuscule 909 (in the Gregory-Aland numbering), α263 (von Soden), is a 12th-century Greek minuscule manuscript of the New Testament on parchment. The manuscript has survived in complete condition. It has marginalia. Description The codex contains the text of the Book of Acts, Catholic epistles, and Pauline epistles, on 268 parchment leaves (size ). According to the CSNTM description it has 271 leaves. The text is written in two columns per page, 24 lines per page. The leaves 74-80 are written in 25 lines per page. They were written by different hand. It also contains Prolegomena, Journeys and death of Paul, tables of the (tables of contents), subscriptions at the end of each of the Gospels with numbers of . Lectionary markings at the margin – for liturgical use – were added by later hand. It contains 8 images. Text The Greek text of the codex Kurt Aland did not place it in any Category. History According to the colophon the manuscript was written in 1108 by Kallistrus, a monk. According to the CSNTM it was written in 1107. Currently the manuscript is dated by the INTF to the 12th century. In 1554 it belonged to Demetrius. C. R. Gregory saw it in 1883. The manuscript was added to the list of New Testament manuscripts by Scrivener (198a, 280p) and Gregory (225a, 280p). In 1908 Gregory gave the number 909 to it. It was held in Cheltenham (Phillipps 7681). Currently it is housed in the Scriptorium (Van Kampen 902), at Orlando, Florida. See also List of New Testament minuscules Minuscule 908 Biblical manuscript Textual criticism References Further reading External links Minuscule 909 (GA) CSNTM Category:Greek New Testament minuscules Category:12th-century biblical manuscripts
Top Secret Stealth Helicopter Program Revealed in Osama Bin Laden Raid: Experts - kunle http://abcnews.go.com/Blotter/top-secret-stealth-helicopter-program-revealed-osama-bin/story?id=13530693 ====== tokenadult Previous extensive HN thread based on Wired News story: <http://news.ycombinator.com/item?id=2515811> ------ zx76 Can't help but trust this article more due to the word "Experts" in the heading. Sarcasm aside, referencing "experts" is usually a red flag for me in articles like this. What incentive is there for the actual experts to offer their opinions on the matter to ABC news? ------ jmvoodoo Hardly a first, or even anything that revolutionary. Meet the original quiet one: [http://www.airspacemag.com/military- aviation/the_quiet_one.h...](http://www.airspacemag.com/military- aviation/the_quiet_one.html) ------ jgh I like how the video autoplays and replaces the interesting image and caption you're trying to read. ~~~ alexg0 Kill-Flash addon for Chrome makes these pages browsing so much more pleasant.
Baba Adam's Mosque is known (locally) after a famous saint Baba Adam whose simple grave is close by, but anything special or historical is known about him except the popular tale of his fight with Ballal Sen. This is six domed mosque that was built in or around 1483 A.D. by the great Malik Kafur during the reign of Sultan Jalaluddin Fatah Shah. You can visit this Baba Adam's mosque easily from Munshigonj town at any time of the year.
-- delete.test -- -- execsql { -- DELETE FROM t3; -- SELECT * FROM t3; -- } DELETE FROM t3; SELECT * FROM t3;
Tuition & Fees Tuition 2014-2015 New York State Resident Tuition New York State residents who are not a resident of the sponsorship area and do not present a Certificate of Residency Full-time: $9,300/year Per credit hour: $324 Non-New York State Resident Tuition Full-time: $9,300/year Per credit hour: $324 Auditing Courses New York State Residents: $157/credit hour Non-Resident and Out-of-State: $324/credit hour Nursing Program Tuition Deposit Full-time: $50 Fees Activity Fee (on-campus, day & evening students) Full-time: $168 Per credit hour: $11.20 day; $5.50 evening Other Fees ID Card: $15/semester Insurance Fee Fall - $35/year Spring - $20/semester Health Center Fee Full-time: $55/semester Part-time: $3.60/credit hour Matriculation Fee: $50 (one time only) Returned Check Fee: $25/occurrence Transcript Fee Charge Per Service Rendered $ 8.00 Transcript Online Request - Paper $ 7.00 Transcript Online Request - Electronic $ 15.00 Transcript Manual Request and Payment $ 25.00 Transcript Emergency Service Technology Fee $20/credit hour Web Course Fee (Online Course) $6/credit hour Late Payment Fee Full-time: $20 Part-time: $10 Administrative Withdrawal Fee Full-time: $100/semester Part-Time: $10/credit Study Abroad Program Fee: $200 Refund Policy Fall/Spring Only; based on a 15-week schedule If you drop a course or withdraw from the College, you will be charged non-refundable tuition, fees, housing and meals according to the following schedule for 15-week courses. Non-refundable charges will be prorated on a similar schedule for courses less than 15 weeks. Payments in excess of final liability will be refunded to the student. Non-payment of tuition and fees does not constitute an automatic withdrawal. Prior to the start of classes: 0% During the first week of classes: 25% During the second week of classes: 50% During the third week of classes: 75% After the third week of classes: 100% Summer Only If you drop a course or withdraw from the College, you will be charged non-refundable tuition and fees according to the following schedule: On or before the last date to drop a course: 0% After the last date to drop a course: 100%
In a machine shop practice it is often necessary to repeat the same machine operating on a large number of workpieces, and powered workholders over hand-operated vices and the like has become widely accepted. These units require less physical effort by the machine tool operator, are faster, and are less likely to misalign or mis-grip a part. Examples of such holders are disclosed in U.S. Pat. No. 3,087,736, entitled "Collet Operator", issued to the present inventor, George N. Lukas, as well as in U.S. Pat. No. 3,338,573, entitled "Fluid Operated Vice" also issued to the present inventor, George N. Lukas. Such pieceholders and like hydraulic force units are commonly driven by a booster unit which is a compressed air to hydraulic fluid transducer. By controlling the application of compressed air to the booster, hydraulic pressure in a line from the booster to the force unit is controlled, which, in turn, drives the workpiece holder or like force unit. Such a system using quick connectors has a great deal of flexibility and allows numerous connections and reconnections of the fluid and air hoses for numerous applications. However, there are also some disadvantages to such a system which relate to the inherent nature of a hydraulic system to leak and the physical capacities of the units to displace hydraulic fluid. As long as the hydraulic fluid displaced in the power unit is moving from its retracted state to its maximum position is less than the effective volume of fluid in the hydraulic cylinder of the booster, the workpiece holder will, upon command, travel the required distance and exert great force against the workpiece. However, if that volume of fluid is just slightly under the needed volume, the unit travels to the workpiece, but the holding force drops off dramatically. The result is a loosely held piece which is undergoing machining. This can result in great damage to the workpiece, the machine tool, and, in certain circumstances, danger to the machine operator and others in the area.
The White House fired back Wednesday on reports that President Donald Trump is dissatisfied with Treasury Secretary Steven Mnuchin after a series of calls by Mnuchin to the nation's top banks to calm market fears left bank executives instead feeling "totally baffled" a day before a record plunge on Wall Street. “I am highly confident that the president is happy with Secretary Mnuchin,” White House economic adviser Kevin Hassett told NBC News reporter Hans Nichols on the White House lawn on Wednesday. Reports had surfaced Wednesday that indicated Mnuchin's position could be in "serious jeopardy" after he tried to assess liquidity and assuage investors following four straight days of losses on Wall Street. Despite Trump's promise that Americans would "make a fortune" on the stock market under his watch, the Dow Jones Industrial Average is down 9 percent for the year. Hassett also said Federal Reserve Chairman Jerome Powell's job is "100 percent" safe, despite widespread reports that Trump intended to fire him, blaming Powell for the steep market declines — though the authority for axing the man at the helm of the world's most influential central bank lies with Congress and not the president. NICHOLS: You’ve made it very clear that Secretary Mnuchin’s job is safe. Is the Fed Chairman’s job safe? HASSETT: Yes, of course, 100% yes. NICHOLS: 100%? The Fed Chairman’s job is not in jeopardy by this president? HASSETT: Absolutely. That’s correct. Yes. 10:30:23 — HansNichols (@HansNichols) December 26, 2018 While it’s rare for a sitting president to comment on the Fed, which is supposed to remain immune to political pressure, Trump has repeatedly criticized Powell, saying he is "far too aggressive" and seems to "enjoy raising rates." Appointed by Trump in November 2017, Powell, a multimillionaire Republican former hedge fund investor, took over the Fed from Janet Yellen in February and has presided over four rate hikes since, moves that Trump has variously described as "loco," "wild" and "ridiculous."
ROOT=.. PLATFORM=$(shell $(ROOT)/systype.sh) include $(ROOT)/Make.defines.$(PLATFORM) PROGS = fileflags hole mycat seek all: $(PROGS) setfl.o %: %.c $(LIBAPUE) $(CC) $(CFLAGS) $@.c -o $@ $(LDFLAGS) $(LDLIBS) clean: rm -f $(PROGS) $(TEMPFILES) *.o file.hole include $(ROOT)/Make.libapue.inc
Lauren Moyer Lauren Moyer (born May 13, 1995) is an American field hockey player for the American national team. She participated at the 2018 Women's Hockey World Cup. References Category:1995 births Category:Living people Category:American female field hockey players Category:Female field hockey midfielders Category:Sportspeople from York, Pennsylvania Category:Pan American Games bronze medalists for the United States Category:Pan American Games medalists in field hockey Category:Field hockey players at the 2019 Pan American Games
SAK YANT MEANING-YANT HANUMARN SONG SING Sak Yant meaning-Yant Hanumarn Song Sing Or Hanumarn Ong Gao. Yant Hanumarn Song Sing Or Hanumarn Ong Gao. Hanumarn Song Sing or in another name is Hanumarn Ong Gao. Hanumarn Song Sing is a Mokey god riding the king of lion or Phra Yaa Sing in Thai name. This is the most powerful Hanumarn design. They believe who wear Yant Hanumarn Song Sing can overcome all enemies. Yant Hanumarn Song Sing represent powerful, protection, luck, good fortune, succeed in life, succeed in work.
A lamp is sparking controversy on a local college campus. A Florida Atlantic University student says he was written up for having a lamp that was made out of a recycled liquor bottle in his dorm room. Now he says he's facing some serious consequences. Sophomore Christopher Valdes now has a warning on his student record and a hefty $150 fee to pay. That fee, he says, is for a mandatory online alcohol education course. And on top of that he has to do 5 hours of community service. Valdes says it's all because of a lamp. "I was a bit shocked and taken back," said Valdes. "I don't do anything. I follow the rules. " Valdes says an RA doing a regular room check of the dorms on the Jupiter campus wrote him up for having alcohol paraphernalia in his room. The violation specified "Bombay lamp." "There's a hole at the bottom. It's plugged in. It's a lamp," said Valdes. The lamp is a recycled Bombay Sapphire gin bottle turned into a lamp. Valdes says he got it at an arts festival with his dad in Greenacres. "For me to have to a possible mark on my future with this record or whatever for a lamp. And me have to explain that to grad schools…" The 19 year-old said the lamp wasn't new either. He says it had been in his dorm room for several months, so he was confused as to why it had just recently become an issue. He says he was charged was for violating the student code of conduct related to alcohol. Valdes even appealed the charge, explaining the lamp was decorative and that there was no alcohol. "I regret to inform you that your appeal has been denied. The sanctions issued are appropriate," said Valdes as he read the letter of denial from the University. We reached out to FAU about Valdes' case. The university said it could not comment because this was information protected by the Family Educational Privacy and Rights Act. "I'm just trying to show people this is really unfair and hopefully the school will do something about it." Valdes says there wasn't any alcohol in his room. He says he's worried that this will impact him when he applies to pharmacy school.
Aminoacylation at the Atomic Level in Class IIa Aminoacyl-tRNA Synthetases. Abstract The crystal structures of histidyl- (HisRS) and threonyl-tRNA synthetase (ThrRS) from E. coli and glycyl-tRNA synthetase (GlyRS) from T. thermophilus, all homodimeric class IIa enzymes, were determined in enzyme-substrate and enzyme-product states corresponding to the two steps of aminoacylation. HisRS was complexed with the histidine analog histidinol plus ATP and with histidyl-adenylate, while GlyRS was complexed with ATP and with glycyl-adenylate; these complexes represent the enzyme-substrate and enzyme-product states of the first step of aminoacylation, i.e. the amino acid activation. In both enzymes the ligands occupy the substrate-binding pocket of the N-terminal active site domain, which contains the classical class II aminoacyl-tRNA synthetase fold. HisRS interacts in the same fashion with the histidine, adenosine and α-phosphate moieties of the substrates and intermediate, and GlyRS interacts in the same way with the adenosine and α-phosphate moieties in both states. In addition to the amino acid recognition, there is one key mechanistic difference between the two enzymes: HisRS uses an arginine whereas GlyRS employs a magnesium ion to catalyze the activation of the amino acid. ThrRS was complexed with its cognate tRNA and ATP, which represents the enzyme-substrate state of the second step of aminoacylation, i.e. the transfer of the amino acid to the 3'-terminal ribose of the tRNA. All three enzymes utilize class II conserved residues to interact with the adenosine-phosphate. ThrRS binds tRNA(Thr) so that the acceptor stem enters the active site pocket above the adenylate, with the 3'-terminal OH positioned to pick up the amino acid, and the anticodon loop interacts with the C-terminal domain whose fold is shared by all three enzymes. We can thus extend the principles of tRNA binding to the other two enzymes.
a digital collection of historical math monographs The Cornell University Library Historical Mathematics Monographs is a collection of selected monographs with expired copyrights chosen from the mathematics field. These were monographs that were brittle and decaying and in need of rescue. These monographs were digitally scanned and facsimile editions on acid free paper were created. For more information, please visit the About page.
Preparation of Er(3+):Y3Al5O12/KNbO3 composite and application in innocent treatment of ketamine by using sonocatalytic decomposition method. A novel sonocatalyst, Er(3+):Y3Al5O12/KNbO3 composite, was synthesized, and then, characterized by X-ray diffractometer (XRD), scanning electron microscopy (SEM) and energy dispersive X-ray spectroscopy (EDX). In order to evaluate the sonocatalytic activity of prepared Er(3+):Y3Al5O12/KNbO3 composite, the sonocatalytic degradation of ketamine, a kind of narcotic drug, was studied. In addition, some influencing factors such as mass ratio, heat-treated temperature and heat-treated time on the sonocatalytic activity of prepared Er(3+):Y3Al5O12/KNbO3 powders and ultrasonic irradiation time on the sonocatalytic degradation of ketamine were examined by using GC-MS machine. The experimental results showed that the Er(3+):Y3Al5O12/KNbO3 composite is a good sonocatalyst in the field of ultrasonic chemistry and the sonocatalytic degradation was an effective method for the innocent treatment of ketamine.
best dating applications - Lesbian dating attraction A famous 1995 study that asked women to smell the sweaty t-shirts of men found that women preferred the smells of those who were genetically dissimilar to them. (Though notably this wasn't true for women on the pill.) Scientifically speaking, opposites really do attract. Though Boyfriend Twin may be a fun Tumblr, research shows that gay couples are actually a lot less likely to be homogamous than straight couples. Our narcissistic tendencies, or the quest to diversify our gene pool? An October study from Rutgers University found that a specific balance of chemicals affects what type of person each individual is attracted to. People with active dopamine levels (impulsive, curious types) or high serotonin levels (social, conscientious types) tended to like people similar to themselves.
// Copyright (c) Microsoft. All rights reserved. // Licensed under the MIT license. See LICENSE file in the project root for full license information. using System; using System.Collections.Generic; using MICore; using Microsoft.DebugEngineHost; using System.Diagnostics; using System.Linq; using System.Globalization; namespace Microsoft.MIDebugEngine { internal class EngineTelemetry { private const string Event_DebuggerAborted = @"VS/Diagnostics/Debugger/MIEngine/DebuggerAborted"; private const string Property_DebuggerName = @"VS.Diagnostics.Debugger.MIEngine.DebuggerName"; private const string Property_LastSentCommandName = @"VS.Diagnostics.Debugger.MIEngine.LastSentCommandName"; private const string Property_DebuggerExitCode = @"VS.Diagnostics.Debugger.MIEngine.DebuggerExitCode"; private const string Windows_Runtime_Environment = @"VS/Diagnostics/Debugger/MIEngine/WindowsRuntime"; private const string Property_Windows_Runtime_Environment = @"VS.Diagnostics.Debugger.MIEngine.WindowsRuntime"; private const string Value_Windows_Runtime_Environment_Cygwin = "Cygwin"; private const string Value_Windows_Runtime_Environment_MinGW = "MinGW"; public bool DecodeTelemetryEvent(Results results, out string eventName, out KeyValuePair<string, object>[] properties) { properties = null; // NOTE: the message event is an MI Extension from clrdbg, though we could use in it the future for other debuggers eventName = results.TryFindString("event-name"); if (string.IsNullOrEmpty(eventName) || !char.IsLetter(eventName[0]) || !eventName.Contains('/')) { Debug.Fail("Bogus telemetry event. 'Event-name' property is missing or invalid."); return false; } TupleValue tuple; if (!results.TryFind("properties", out tuple)) { Debug.Fail("Bogus message event, missing 'properties' property"); return false; } List<KeyValuePair<string, object>> propertyList = new List<KeyValuePair<string, object>>(tuple.Content.Count); foreach (NamedResultValue pair in tuple.Content) { ConstValue resultValue = pair.Value as ConstValue; if (resultValue == null) continue; string content = resultValue.Content; if (string.IsNullOrEmpty(content)) continue; object value = content; int numericValue; if (content.Length >= 3 && content.StartsWith("0x", StringComparison.OrdinalIgnoreCase) && int.TryParse(content.Substring(2), NumberStyles.AllowHexSpecifier, CultureInfo.InvariantCulture, out numericValue)) { value = numericValue; } else if (int.TryParse(content, NumberStyles.None, CultureInfo.InvariantCulture, out numericValue)) { value = numericValue; } if (value != null) { propertyList.Add(new KeyValuePair<string, object>(pair.Name, value)); } } properties = propertyList.ToArray(); return true; } public void SendDebuggerAborted(MICommandFactory commandFactory, string lastSentCommandName, /*OPTIONAL*/ string debuggerExitCode) { List<KeyValuePair<string, object>> eventProperties = new List<KeyValuePair<string, object>>(); eventProperties.Add(new KeyValuePair<string, object>(Property_DebuggerName, commandFactory.Name)); eventProperties.Add(new KeyValuePair<string, object>(Property_LastSentCommandName, lastSentCommandName)); if (!string.IsNullOrEmpty(debuggerExitCode)) { eventProperties.Add(new KeyValuePair<string, object>(Property_DebuggerExitCode, debuggerExitCode)); } HostTelemetry.SendEvent(Event_DebuggerAborted, eventProperties.ToArray()); } public enum WindowsRuntimeEnvironment { Cygwin, MinGW } public void SendWindowsRuntimeEnvironment(WindowsRuntimeEnvironment environment) { string envValue; if (environment == WindowsRuntimeEnvironment.Cygwin) { envValue = Value_Windows_Runtime_Environment_Cygwin; } else { envValue = Value_Windows_Runtime_Environment_MinGW; } HostTelemetry.SendEvent( Windows_Runtime_Environment, new KeyValuePair<string, object>(Property_Windows_Runtime_Environment, envValue)); } } }
Testing Fees Listed below are current fees for tests administered by Testing Services at MGA. Test Name Test Fee Administration Fee Total Fees CLEP $87 $25 $112 Accuplacer Entrance Exam Retake $35 $0 $35 Accuplacer Score Transfer Request $0 $35 $35 ACT Residual $60 $0 $60 Anatomy and Physiology Pre-Req $15 $0 $15 DANTES/DSST $85 $25 $110 eCore (*each midterm/final) $20 $0 $20* GA/US Constitution $15 $0 $15 GA/US History $15 $0 $15 Math Placement Exam $15 $0 $15 Oral Competency $15 $0 $15 Proctored Exam (Cochran campus) $0 $35 $35 Respiratory Entrance $15 $0 $15 Teacher Education Entrance Essay $15 $0 $15 TEAS $70 $0 $70 Technical Competency $15 $0 $15 CLEP and DSST currently waive Test Fees for DANTES funded testers for the first attempt at each CLEP or DSST exam. Eligible members include active-duty personnel, Reserve members, and National Guardsmen. In addition, MGA waives Administration Fees for all DANTES funded individuals for the first attempt at each CLEP or DSST exam as well. The MGA fee waiver is eligible ONLY at the Warner Robins campus. Tests will not be administered without fee payment. CLEP: The $85.00 CLEP fee must be paid PRIOR to your testing session at www.collegeboard.org/clep. You will be able to access the My Account tab on this page to register for your exam and print your exam ticket to bring to the testing center. If you are eligible for DANTES funding, you will make that selection in My Account as well. CLEP testing fees cannot be paid onsite at MGA locations. DSST/DANTES: If you are not eligible for DANTES funding, DSST Test Fees must be paid by debit/credit card on the computer station in the testing center. Please bring a valid form of payment to your exam. MGA Testing Services offers proctored exams at both the Macon and Cochran campuses. Please see the Proctored Exam page for more information.
[Theoretico-methodico-methodological problems in current research in psychotherapy]. The authors discuss theoretical and methodological problems of present-day psychotherapy research and try to arrive at a critical balance. They derive the task to find new forms of organisation of psychotherapy research in the GDR. In particular, they draw the attention to problems of the diversity of methods in psychotherapy and the study of group differences. They suggest to pay more attention than has been until now to questions of social capacity of learning in psychotherapy. Furthermore, aspects of the measurement of changes in individual cases in psychotherapy are dealt with.
HPE SimpliVity 380 has its deduplication- and compression engine embedded into a PCIe card, consisting of FPGA, NVRAM and DRAM, thus all deduplication/compression is hardware accelerated and fully offloaded from the hypervisor host.
5 Haziran 2012 Salı Global Insider: Turkey, Pakistan Stand By Each Other Global Insider Turkish Prime Minister Recep Tayyip Erdogan and Pakistani Prime Minister Yousuf Raza Gilani met in Pakistan two weeks ago under the auspices of the bilateral High-Level Cooperation Council. In an email interview, Ishtiaq Ahmad, Quaid-i-Azam Fellow at St. Antony’s College and senior research associate at the Center for International Studies at Oxford University, discussed relations between Turkey and Pakistan. WPR: How would you characterize modern Turkish-Pakistani relations, and how have they evolved over the past decade? Ishtiaq Ahmad: The Turkish-Pakistani relationship is rooted in history and defined by the existence of deep ethno-religious affinity between the people of both countries. Despite being geographically separated and ideologically distinct, the two countries have always aspired to expand mutual cooperation in the political, economic, security and cultural spheres. In the post-Cold War period, Turkish-Pakistani relations have made significant progress toward realizing tangible outcomes in these diversified areas of cooperation, especially in trade and investment. In the 1990s, three Turkish construction companies entered the Pakistani market with pledges of almost $1.5 billion. The past decade has seen increasing cooperation between the two countries in the security sphere, especially due to the war in Afghanistan, where Turkey is an important member of the International Security Assistance Force. They have also stood by each other in times of natural disaster. WPR: What are the main areas of cooperation and conflict between Turkey and Pakistan? Ahmad: At present, the focus of Turkish-Pakistani bilateral cooperation is on enhancing the level of bilateral trade, which is currently around $1 billion. Efforts are underway to double the level of trade this year by expediting the implementation of a currency swap agreement concluded in November 2001. Over the years, the two countries have created an array of institutional setups to foster bilateral trade, business, investment and defense production, including a Joint Ministerial Commission, a Defense Consultative Group and a High-Level Cooperation Council. The council, established in 2010, had its second meeting in Islamabad on May 22, during which the Turkish and Pakistani prime ministers signed nine agreements regarding Turkish investment in several developmental sectors in Pakistan, including transportation, communication and renewable energy. The two countries’ political ties have deepened to the extent that the Turkish leadership now even mediates between the Pakistani government and opposition leadership. And in regional diplomacy over Afghanistan, the Turkey-Afghanistan-Pakistan Trilateral Forum has emerged as an important platform. There is no major area of conflict, except the ongoing row over a Turkish rental power plant company whose assets were frozen after the Pakistani Supreme Court put a hold on the government’s rental power bid. Afghanistan could re-emerge as an area of divergence, but only if Pakistan actively seeks to support the Taliban’s political revival in Afghanistan. WPR: What role do the two countries play in their respective broader foreign policy objectives (Turkey in South Asia and Pakistan in the Mideast)? Ahmad: With an eastern impulse in foreign affairs under the present government, Turkey is engaged more proactively in South Asia. The trilateral mechanism with Afghanistan and Pakistan is an expression of this policy shift. As a NATO member and a longstanding friend of Pakistan, Turkey is trying to ensure that Pakistan is not regionally or internationally isolated as a result of the recent breakdown of U.S.-Pakistan relations. As for Pakistan’s role in the Middle East, the principal motivation behind Islamabad’s greater engagement with the Persian Gulf countries in the past few decades is the economic benefits it brings in the form of oil imports, investments and remittances. Pakistan looks favorably at the significant growth in Turkey’s Middle Eastern diplomatic profile in recent years -- a factor that may open up additional economic opportunities in the region through Turkish support.
Privacy Policy Privacy Policy The Lexington School and Center for the Deaf is committed to maintaining the privacy of our web site visitors and donors and upholds the confidentiality of your personal information. The Lexington School and Center for the Deaf does not share, sell, rent, or trade information about its donors and other contacts. The personal information you provide is solely utilized to process and receipt your donation. Donor anonymity will be respected if requested and where applicable. Upon request, we allow you full access to your information and we will maintain its accuracy according to your instructions. The Lexington School and Center for the Deaf strives to keep donors informed about how donations are used and their importance for continuing our programs. We send mailings and emails to invite financial support. Most Lexington School and Center for the Deaf supporters want to receive all of our mailings and emails. However, you may opt out of any and all mailings by contacting us with your request. Comments or questions regarding the Lexington School and Center for the Deaf's Privacy Policy should be directed to:
Dick Morris: House GOP Should Reject Ryan Budget House Republicans "would do well" to reject the budget plan unveiled Tuesday by Budget Chairman Paul Ryan because of its proposed cuts to Medicare over the next decade, political analyst Dick Morris says. "Why should the Republican Party give the Democrats ammunition for the next five elections?" Morris, who served in the Clinton administration, asks in an op-ed piece to be published Wednesday in The Hill. "Why should House Republicans put their necks on the line every two years for changes that are proposed to take effect a decade hence? Ryan, the Wisconsin congressman who was the 2012 GOP vice presidential candidate, proposed a budget that would slash $5.1 trillionin federal spending over the next decade and balance the government's books with cuts in programs such as food stamps and government-paid healthcare for the poor and working class. The plan would cut $2.1 trillion in Obamacare benefits; $732 billion in Medicaid and the Medicare Advantage program, which affects seniors and other low-income Americans; and nearly $1 trillion in food stamps, Pell Grants, farm subsidies, and similar programs. The proposal would reprise a voucher-like Medicare program for retirees who enroll in the program in 2024 that would allow them to purchase health insurance on the open market. Ryan has said the program would drive down government debt over the long term. It also would return Pentagon spending by 2017 to its level from before sequestration, to an increase of $483 billion over 10 years, which would be offset by the reductions. "By cutting wasteful spending, strengthening key priorities, and laying the foundation for a stronger economy, we have shown the American people there's a better way forward," Ryan said in introducing the budget plan. But in his op-ed piece, Morris contends that Ryan's support of the Medicare voucher program "cost the party dearly in the election of 2012," referring to the re-election of President Barack Obama and the Democrats' continued hold on the Senate. "By then, he had retreated from his original position and, with the cover of some support from wayward Democrats, had amended his plan to allow seniors to continue the current Medicare program," Morris says. Also, as the president's $500 billion in Medicare benefit cuts to finance Obamacare have driven more seniors to the Republican Party in recent years, "Ryan’s prescription for long-term cuts a decade away will give them pause in switching their votes," he says. "Democrats can easily counter the Medicare Advantage cut, which hurts one-third of all seniors, by saying that the GOP wants to cut Medicare, too." Historically, Republicans have "a great innate disadvantage" with Democrats when it comes to Medicare, Morris says. He notes that the GOP initially opposed the program when Democratic President Lyndon Johnson created it in 1965, and later sought to limit its growth — which led to a federal government shutdown for several months in 1995 and 1996. "The party is not the darling of America’s elderly," he said. "The Ryan budget just will serve to reignite fears that the GOP hasn’t changed and still is gunning for the program," Morris says. The political analyst cites recent Gallup polls showing that more seniors are voting Republican because of Obamacare and the Medicare cuts. "House Republicans should not adopt a budget that will drive them back from whence they came," Morris writes. "Were the Medicare cuts on our immediate agenda, it would be different. But since they are to take effect only in 2024, why must we go on record voting for them now?" He calls for a private healthcare system for seniors that is "paid for by government vouchers and subsidies." "But the elderly will still worry that the government payments will fall short, and will be concerned that the system as a whole will be fatally weakened by making participation in traditional fee-for-service Medicare voluntary," Morris says. "Ryan’s plan is a good one and deserves passage some years hence, but why vote for it today? "Republicans can make a virtue of necessity and trumpet their votes against the proposal as they campaign around the country this year," Morris concludes. "Has Ryan done them a favor by giving them the chance to vote 'no'?"
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE toolbar:toolbar PUBLIC "-//OpenOffice.org//DTD OfficeDocument 1.0//EN" "toolbar.dtd"> <!--*********************************************************** * * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. * ***********************************************************--> <toolbar:toolbar xmlns:toolbar="http://openoffice.org/2001/toolbar" xmlns:xlink="http://www.w3.org/1999/xlink" toolbar:id="toolbar"> <toolbar:toolbaritem xlink:href=".uno:CalloutShapes.rectangular-callout"/> <toolbar:toolbaritem xlink:href=".uno:CalloutShapes.round-rectangular-callout"/> <toolbar:toolbaritem xlink:href=".uno:CalloutShapes.round-callout"/> <toolbar:toolbaritem xlink:href=".uno:CalloutShapes.cloud-callout"/> <toolbar:toolbaritem xlink:href=".uno:CalloutShapes.line-callout-1"/> <toolbar:toolbaritem xlink:href=".uno:CalloutShapes.line-callout-2"/> <toolbar:toolbaritem xlink:href=".uno:CalloutShapes.line-callout-3"/> </toolbar:toolbar>
As easy as 1, 2, 3 - Following the success of Point 65’s modular recreational kayaks - here the touring version. The Point 65 Mercury 14/18 is a high performance, stable, decked modular touring kayak with a large cockpit with which to explore and then take back home in the trunk of your car. Like the recreational versions, As easy as 1, 2, 3 - Following the success of Point 65’s modular recreational kayaks - here the touring tandem version. The Point 65 Mercury 14/18 is a high performance, stable, decked modular touring kayak with a large cockpit with which to explore and then take back home in the trunk of your car. Like the recreational versions, the Mercury features the innovative snap tap solution (patent pending).