text
stringlengths
8
5.77M
Pamela Anderson, 50, puts on a VERY busty display in a skin-tight PVC dress and a Catwoman inspired mask as she enjoys London night out And Pamela Anderson proved she's still got what it takes, turning heads in a skin-tight PVC dress when she attended the launch of her exclusive Coco De Mer collection at London club Morton's on Tuesday evening. The 50-year-old actress was channelling her inner Catwoman in the figure-hugging ensemble, complete with a glamorous mask. Scroll down for video Buxom: Pamela Anderson was turning heads in a skin-tight PVC dress when she attended a private event at London club Morton's on Tuesday evening Pamela showed off a liberal amount of cleavage in the leather look dress, which boasted a low-cut neckline and sheer sleeves. Strike a pose: The beauty put on a glamorous display at her launch event Making waves: The star was chatting to Coco de Mer managing director Lucy Litwack She confirmed she was introduced to Assange through fashion designer Vivienne Westwood previously during a visit to the Embassy of Ecuador in London, where he resides. She was first interested in learning from him about ways to become 'more effective as an activist,' she said, while speaking with Kelly. 'How could I improve my foundation? What does he think? Could we brainstorm about something?,' she thought at the time. Assange has been living in solitude in political asylum for some time now, after being accused in 2010 of sexual assault and rape against two women in Sweden - which he since denied. When Kelly inquired about the actress' thoughts on the disturbing allegations, Anderson said, 'If you read through the reports and the UN findings, there is no evidence of rape.' Commanding attention: The actress sure knows how to work a room Leggy lady: Pamela pulled her look together with a simple pair of stilettos Stylish arrival: Pamela showed off a liberal amount of cleavage in the leather look dress, which boasted a low-cut neckline and sheer sleeves The eyes have it: The star was easily recognisable in spite of her mask Earlier this year, prosecutors in the country ended the investigation. Assange was not charged for the alleged crimes. But it seems that won't change the conditions of his daunting detainment - which Anderson described into grim detail. 'He lives in a very tiny space. He never sees the sunlight. He can't get outdoors. He doesn't go near windows, really, unless he goes out on that balcony once every few years,' she told Kelly. 'I'm there for four hours at a time and I see him all the time. He's happy to see me when I come (and) very sad when I leave.' Although confined, she said he is 'safe' where he's at. Sheer perfection: Pamela was rocking a sexy coat to match her outfit Glamorous: She styled her blonde locks in bouncy curls and set off her pout with a slick of pink lipstick 'If he were to leave the Embassy, he would be arrested,' she added. 'He's a really important person to me.' Anderson told the NBC reporter, during the first part of the interview that aired Thursday, that Harvey Weinstein accusers shouldn't have made the choice to go to 'a hotel room alone' with the hot head Hollywood powerhouse. 'It was common knowledge that certain producers or certain people in Hollywood or people to avoid, privately,' Anderson said. She further denied any form of 'victim blaming' while speaking with TMZ Friday when she said: '(I) will not get coerced into apology'. She also made a point to say the disgraced director is a 'sexist pig and bully.' In what appeared to be a jibe at his victims, she said it was 'no excuse' to presume the meetings were safe just because they were set up by agents - a claim which has been made by actresses such as Gwyneth Paltrow, who detailed run-ins with Weinstein. 'I just think there's easy ways to remedy that. That's not a good excuse,' Anderson said. Sitting pretty: The Baywatch beauty was the centre of attention at the event Romance: Pamela recently opened up about her much-speculated on relationship with Wikileaks founder Julian Assange, 46 Partying in style: Pamela was having a blast as she partied the night away Racy: A host of beautiful models were in attendance to showcase the collection
North Korean authorities are investigating recent fires at an arms factory and a train transporting military goods, sources said Monday. They said a huge fire broke out early this month on a train carrying military uniforms in Ryanggang Province, which is home to the North's armaments industry, causing considerable losses. In September, a fire broke out in an arms factory in North Pyongan Province. Both happened near the border with China. One source said it remains unclear what caused the fires and whether they are related, but they could have been the result of minor resistance to the regime of Kim Jong-un. The regime still has a firm grip on officials, soldiers and the public at large, making it extremely difficult to organize any major resistance. But sources say disgruntled citizens may be venting their frustration with arson targeting key facilities. Since Kim came to power in 2012, new high rises, water park and other leisure facilities have mushroomed in the capital Pyongyang, but people in rural areas are growing increasingly disgruntled with their poor living conditions.
This week Planned Parenthood launched a series of web ad attacks claiming that candidate for Texas Governor Greg Abbot refused to give rape victims justice. They made this claim to trash Abbott and to discourage people from voting for him in the governor’s race.
Q: php/mysql transaction I'm doing a transaction with PHP and MySQL. Using PHPMyAdmin I'm inserting queries into my University DB, where I'm supposed to use transactions in some tables. So far I've made this code for my Staff transactions, but my problem is how can I get the information inserted in addStaff.php so I can use it as a query on this code? right where it says //values(); <?php function begin() { mysql_query("BEGIN"); } function commit() { mysql_query("COMMIT"); } function rollback() { mysql_query("ROLLBACK"); } mysql_connect("localhost","username", "password") or die(mysql_error()); mysql_select_db("test") or die(mysql_error()); $query = "INSERT INTO Staff (id,name,position,phone,email,roomNumber,dnumber)" //values(); begin(); // BEGIN $result = mysql_query($query); if(!$result) { rollback(); // ROLLBACK echo "You rolled back"; exit; } else { commit(); // COMMIT echo "Transaction was succesful"; } ?> A: If I understand you question correct, you need to know how to prompt for data, accept it, and insert it into the database: <?php if ($_SERVER['REQUEST_METHOD'] == 'POST') { ... connect to the database ... $sometext = $_POST['textfield']; // retrieve the value from the form $qsometext = mysql_real_escape_string($sometext); // make it safe for the query $sql = "INSERT INTO mytable (textfield) VALUES ($qsometext);" // build the sql query $result = mysql_query($sql) or die(mysql_error()); // run the query } ?> <html> <body> <form method="POST"> <input type="text" name="textfield"><input type="submit"> </form> </body> </html> That's a barebones version of how to show a form, then insert the user's data into a database, the simply re-displays the form for more data.
Project Summary: The candidate is an MD/PhD with an excellent background in the molecular and cellular mechanisms of neuronal plasticity whose short-term goal is to make the transition to functional brain imaging and systems neuroscience. The candidate is also a trained clinical neurologist and his long-term career goal is to investigate the human brain's endogenous mechanisms for recovery and self-repair after stroke. The research project is driven by the realization that the dominant localizationist perspective cannot provide the answers we seek to understand brain function. Studying interhemispheric interactions is an important step toward understanding distributed brain networks. Using the novel technique of resting state functional connectivity MRI and traditional fMRI approaches will be an important step in this direction. In particular we hypothesize that resting state functional connectivity MRI can be used as an index ofthe amount of information processing taking place between the hemispheres and predicts behavioral performance. We will test this hypothesis by 1) determining resting connectivity across motor cortex in chronic stroke patients and in professional pianists compared to healthy controls and correlating connectivity with measures of hand dexterity. 2) Resting connectivity across motor cortex representing body parts of capable of different levels of unilateral movement will be studied. 3) BOLD fMRI signals generated in preparation for a unilateral hand movement will be used to study the importance of the ipsilateral BOLD signal for movement preparation and execution. Dr. Carter's career development plan will be mentored by Dr. Maurizio Corbetta, a leader in clinical neurorehabilitation and functional imaging. Consultants chosen for their expertise in functional imaging, motor control systems and computational neuroscience will provide additional guidance. Supervised research activities will be combined with didactic coursework tailored to meet Dr. Carter's needs and provide an intensive training experience. The project will be carried out at Washington University in Saint Louis, a premier site for brain imaging research.
The Proton Pump Inhibitor Nonresponder: a Behavioral Approach to Improvement and Wellness. Gastroesophageal reflux disease (GERD) is a difficult to treat medical condition, where nearly 40% of patients are refractory to standard medical intervention, which typically begins with a proton pump inhibitor (PPI). These PPI nonresponders represent a population of patients, where treatment planning must be individualized; multidisciplinary and psychiatric comorbidities should be considered. This review highlights treatment options that include neuromodulators, lifestyle, and psychological interventions for the PPI nonresponder. Mental health specialists in the field of psychogastroenterology can aid in the management of esophageal hypersensitivity, which can drive the symptom experience of a PPI nonresponder. Considerations for comorbid anxiety and depression in this population require careful assessment and treatment. Physicians are encouraged to create realistic expectations for symptom management and offer multidisciplinary options for treatment early in care. Patients will frequently benefit from working with a GI psychologist and find value in behavioral interventions.
Are professional athletes overpaid? Most people have an opinion about this, sparked by dollar amounts in the headlines when top players sign big deals. If you answered, “Yes!,” your logic may run something like this: how can a person playing a game for a few months a year possibly be worth tens of millions? It’s not as if they’re performing brain surgery or curing the common cold or finding a way to stop climate change. However, the fact is that market forces are alive and well in the arena of professional sports, and athletes are paid precisely what they’re worth (or at least what they’re perceived to be worth given limited information and the impossibility of seeing the future). The changes in the business of sports were brought home to me recently with the death of Stan Musial, legendary player for the St. Louis Cardinals and my primary boyhood hero, at the age of 92. Stan the Man’s heyday was the post-war era of the late 1940s and 1950s, and he was one of the truly elite who made $100,000 per year. He retired after the 1963 season, but remained active with the Cardinals organization for decades. A genuinely good guy, Musial symbolized the era of radio baseball (in fact, my first awareness of him came from the booming KMOX station in the years immediately before Major League baseball came to Texas). The contrast between professional sports in his day and now is striking in many ways; one of the most profound is the money involved. Even if you adjust for inflation, salaries for professional athletes are much higher today than they were decades ago. About 25 years ago, for example, a major league baseball player had to make $2 million in salary to make the list of 10 highest-paid players (according to a nifty database maintained by USA Today). Last year, making the top 10 required $21 million. By way of another perspective, Babe Ruth’s $80,000 in 1930 equates to about $1 million now. Clearly, things have changed in a big way. However, the large salaries are not without basis. Contract negotiations follow basic economic principles, with supply and demand determining price. In terms of the supply, how many people in the world can hit a baseball coming at them at 95 miles per hour, throw such a pitch, run bases at those speeds, and have that special something that makes them a great player? Few, as any kid on a playground, student on a school field, or college baseball player on a diamond will tell you. The incentives to play professional sports are huge (money and fame just to name two), and millions would love to do so. Obviously, however, the precise combination of genetics and opportunities needed for success is exceedingly rare. In other words, the supply of potential major leaguers is very, very small. On the other side of the equation is demand, which in this context is the willingness (and ability) of teams to pay the huge salaries. The decision process is purely economics, with salary ranges directly linked to the money the team hopes to make off of the player’s talent. In fact, disputes are often settled in arbitrations by examining “comparables” in much the same way one values a house or a business. As I write this column, rumor has it that Time Warner Cable is going to pay the Dodgers about $7 billion for rights to broadcast Los Angeles Dodgers games over the next two decades. The Dodgers, not coincidentally, have one of the highest salary rates in baseball. Time Warner, of course, views this as a business deal based on likely money made from advertising, subscriptions, and payments from other companies (such as the satellite TV people) to broadcast. Of course, the numbers of people signing up and watching is linked to the quality of the team; the better the players and results, the bigger the revenue for Time Warner. In all professional sports, ticket sales, merchandising, sponsorships, naming rights, and other transactions depend on the popularity of the team. While a portion of the fan base is of a “die hard” nature and will support the team whether winning or losing, there’s another segment that will follow success. When the team sits at the bargaining table, you can bet they have analyzed the potential contributions of a player every way you can imagine. The money they offer to pay is no more than the amount they expect to receive back (and then some). In other words, the player is paid only what they are worth to the team. Looking down a list of the value of professional sports teams (put together by Forbes) lets you know that many teams are doing this very well. The top two are soccer teams (Manchester United and Real Madrid), which both have huge sponsorships for team jerseys, practice jerseys, and merchandise. The third place is a tie: the New York Yankees and the Dallas Cowboys, both viewed to be worth an estimated $1.85 billion. The Cowboys make a fortune from their stadium ($100 million for premium seating and almost $60 million from sponsors each year), not to mention TV deals and merchandising. And, of course, it is important to note that these deals are ultimately driven by fans. As long as stadiums sell out, ticket prices will stay high. As long as people demand to watch the Dodgers, networks and cable companies will find a way to show them. These professional athletes may not be solving weighty world problems, but they are certainly fun to watch. As long as we keep watching and buying, their salaries will keep rising. I must admit a certain longing for the days when Stan Musial always played for the Cardinals and there were no free agents, strikes, or bidding wars. We all should miss an unassuming humanitarian who lived more than 70 of his 92 years in the public eye without a hint of scandal. As a matter of economics, however, the modern era reflects the market working at its finest. Dr. M. Ray Perryman is President and Chief Executive Officer of The Perryman Group (www.perrymangroup.com). He also serves as Institute Distinguished Professor of Economic Theory and Method at the International Institute for Advanced Studies.
Dot coms and academics will pick the Democrat nominee. But will they pick the president? Daniel Greenfield, a Shillman Journalism Fellow at the Freedom Center, is an investigative journalist and writer focusing on the radical Left and Islamic terrorism. Politics has its style and its substance. Style requires the 2020 candidates to stump in New Hampshire diners and eat corn dogs at Iowa fairs. These stylistic rites of passage in American politics are on the verge of irrelevance as the kingmakers in California push up their primary and as the effort to eliminate the electoral college gains traction among the 2020 Democrats and, more importantly, their donors. Forget the New Hampshire diners and Iowa corn dogs, the truth can be found if you follow the money. The 2020 race is all about touting the democracy of small donors with a 130,000 donor threshold for the third Democrat debate. But certain zip codes keep coming up for the top Democrat candidates. The 100XX zip codes of Manhattan, the 90XXX zip codes of Los Angeles, the 94XXX zip codes of San Francisco, the 98XXX zip codes of Seattle, the 20XXX zip codes of D.C. and the 02XXX zip codes of Boston. These are the core zip codes of the Democrat donor base. They are the pattern that recur in the campaign contributions lists of the top Democrats. And they explain the politics of the 2020 race. Providing free health care for illegal aliens at taxpayer expense may not be very popular nationwide, but is commonplace in New York, Los Angeles, San Francisco, Seattle and Boston. Gun control is a loser nationwide, but a sure thing in the big blue cities. Even proposals to take away private health plans, allow rapists and terrorists to vote from prison, and open the border pick up more support there. The 2020 Democrats aren’t speaking to Americans as a whole. Instead they’re addressing wealthy donors from 6 major cities, and some of their satellite areas, whose money they need to be able to buy teams, ads and consultants to help them win in places like New Hampshire and Iowa. New York, San Francisco and Los Angeles show up in the top 5 donor cities for most of the top 2020 candidates, including Bernie Sanders, Elizabeth Warren, Kamala Harris, Cory Booker and Pete Buttigieg. Boston shows up in the top 10, not only for Bernie and Warren, but for Kamala and Buttigieg. Seattle appears in the top 10 for Bernie, Warren, and Buttigieg. Washington D.C. features in the top 10 for Bernie, Booker, Warren, Kamala, and Buttigieg. And the rest of America doesn’t really matter. Not if you’re a Democrat. The democracy of small donors is illusory not only by zip code, but by industry. Google isn’t the largest company in America, but, according to the Center for Responsive Politics, its employees show up on the top company contributor lists for Kamala, Sanders, Buttigieg, and, Warren. Despite Warren’s supposed threat to break up big dot coms and Sanders’ talk of going after big companies, Google employees were the top backers of both candidates. What do they know that we don’t? Alphabet, Google’s parent company, does employ a lot people, but its number of employees is a fraction of those employed by Home Depot, Kroger or Wal-Mart. What Google does have is an enormous concentration of wealth and power through its monopolistic control over search advertising. That power also gives its radical employees a disproportionate ability to shape the 2020 Democrat field. Despite Warren’s supposed threats to break up big tech, their employees are some of her biggest backers. Besides Google, Microsoft, Apple and Yelp employees are some of her major backers. Again, what do the millionaire employees of big tech know about Warren’s plans that we don’t? Microsoft employees show up on the donor leaderboards for Bernie, Kamala, Warren, and, Buttigieg. Amazon employees are a major donor group for Bernie and Buttigieg. Pinterest, which recently made headlines for the dot com’s aggressive censorship of pro-life views, appears on Buttigieg’s donor board. Apple employees are some of the major donors to Bernie, Warren, and Kamala. There’s no question that big tech cash is helping shape the 2020 Democrat field. But it’s not just big tech. Some of the biggest financial players in shaping the 2020 field are government institutions. After Google, University of California employees are the biggest donors to both Bernie and Warren. They also show up, somewhat less surprisingly, on the donor leaderboards for Kamala Harris and Buttigieg. The prominence of California college employees on donor lists for candidates from the other side of the country shows the sheer financial wealth of taxpayer funded institutions in California. Aside from UC, employees of Berkeley, the city, show up as one of Bernie’s major donor groups. Employees of the State of California are a major donor group to Kamala Harris, a former state official. New York City employees are a major donor group for Bernie Sanders. The donor list roundups show the power of alumni networking with Warren tapping into a large donor base at Harvard and Buttigieg at Notre Dame. Harvard had positioned Warren for a profile in national politics and Notre Dame had made Buttigieg a viable candidate in a city where hardly anyone seems to even bother voting. And even Cory Booker managed to tap into his old Stanford connections University of Michigan and University of Massachusetts employees are some of Warren’s most prevalent institutional donors. University of Illinois, Michigan, and Massachusetts employees fuel Bernie. As do Stanford and Columbia University employees. Beyond the regional geography, there is a political and industrial geography shaping the 2020 field with New York City and Berkeley employees funding the candidacy of a Vermont socialist and the employees of public and private universities (but either way heavily subsidized by taxpayers) across the country funding the rise of a Massachusetts socialist with an academic background. By contrast, Trump is the only 2020 candidate whose top 5 donor groups don’t contain a single big data firm, but do contain employees of the United States Army and the Department of Defense. He’s also the only candidate whose top donor groups contain multiple branches of the military, the Army, Navy, and Air Force (Space Force still pending), but not a single college or FAANG tech monstrosity. In contrast to the 2020 Dems, there isn’t a single law firm, but there are several manufacturing firms. Meanwhile not a single of the top 2020 Dems appears to have a manufacturing donor base. The sharp contrast between Googlers and steelworkers, between professors and soldiers, draws a truer picture of the clash of cultures between the Democrats and Republicans, lefties and righties in America. Bernie Sanders claimed that his campaign was grass roots because his average donation was $27. Bernie, a 1 percenter socialist who claims to advocate for the poor from one of his three homes, was under the impression that $27 was what poor people could donate to a political campaign. Then President Trump raised $54 million. His average donation was four bucks. The parts of the country are also more diverse with Milwaukee, San Antonio, Greensboro, Dallas, and Houston appearing on the list of Trump donor bases. The 2020 election will come down to the question of whether six influential blue cities will be able to buy the election and dictate their politics to the country, whether the big tech firms and professors will be able to drown out the sailors and steelworkers, or whether the rest of the nation will be heard. The dot coms and academics of San Francisco and Boston, the financial firms of New York and the lobbyists of Washington D.C. will pick the Democrat nominee. But will they pick the president?
# Check every path through every method of UserDict from test import test_support, mapping_tests import UserDict d0 = {} d1 = {"one": 1} d2 = {"one": 1, "two": 2} d3 = {"one": 1, "two": 3, "three": 5} d4 = {"one": None, "two": None} d5 = {"one": 1, "two": 1} class UserDictTest(mapping_tests.TestHashMappingProtocol): type2test = UserDict.IterableUserDict def test_all(self): # Test constructors u = UserDict.UserDict() u0 = UserDict.UserDict(d0) u1 = UserDict.UserDict(d1) u2 = UserDict.IterableUserDict(d2) uu = UserDict.UserDict(u) uu0 = UserDict.UserDict(u0) uu1 = UserDict.UserDict(u1) uu2 = UserDict.UserDict(u2) # keyword arg constructor self.assertEqual(UserDict.UserDict(one=1, two=2), d2) # item sequence constructor self.assertEqual(UserDict.UserDict([('one',1), ('two',2)]), d2) self.assertEqual(UserDict.UserDict(dict=[('one',1), ('two',2)]), d2) # both together self.assertEqual(UserDict.UserDict([('one',1), ('two',2)], two=3, three=5), d3) # alternate constructor self.assertEqual(UserDict.UserDict.fromkeys('one two'.split()), d4) self.assertEqual(UserDict.UserDict().fromkeys('one two'.split()), d4) self.assertEqual(UserDict.UserDict.fromkeys('one two'.split(), 1), d5) self.assertEqual(UserDict.UserDict().fromkeys('one two'.split(), 1), d5) self.assertTrue(u1.fromkeys('one two'.split()) is not u1) self.assertIsInstance(u1.fromkeys('one two'.split()), UserDict.UserDict) self.assertIsInstance(u2.fromkeys('one two'.split()), UserDict.IterableUserDict) # Test __repr__ self.assertEqual(str(u0), str(d0)) self.assertEqual(repr(u1), repr(d1)) self.assertEqual(repr(u2), repr(d2)) # Test __cmp__ and __len__ all = [d0, d1, d2, u, u0, u1, u2, uu, uu0, uu1, uu2] for a in all: for b in all: self.assertEqual(cmp(a, b), cmp(len(a), len(b))) # Test __getitem__ self.assertEqual(u2["one"], 1) self.assertRaises(KeyError, u1.__getitem__, "two") # Test __setitem__ u3 = UserDict.UserDict(u2) u3["two"] = 2 u3["three"] = 3 # Test __delitem__ del u3["three"] self.assertRaises(KeyError, u3.__delitem__, "three") # Test clear u3.clear() self.assertEqual(u3, {}) # Test copy() u2a = u2.copy() self.assertEqual(u2a, u2) u2b = UserDict.UserDict(x=42, y=23) u2c = u2b.copy() # making a copy of a UserDict is special cased self.assertEqual(u2b, u2c) class MyUserDict(UserDict.UserDict): def display(self): print self m2 = MyUserDict(u2) m2a = m2.copy() self.assertEqual(m2a, m2) # SF bug #476616 -- copy() of UserDict subclass shared data m2['foo'] = 'bar' self.assertNotEqual(m2a, m2) # Test keys, items, values self.assertEqual(u2.keys(), d2.keys()) self.assertEqual(u2.items(), d2.items()) self.assertEqual(u2.values(), d2.values()) # Test has_key and "in". for i in u2.keys(): self.assertIn(i, u2) self.assertEqual(i in u1, i in d1) self.assertEqual(i in u0, i in d0) with test_support.check_py3k_warnings(): self.assertTrue(u2.has_key(i)) self.assertEqual(u1.has_key(i), d1.has_key(i)) self.assertEqual(u0.has_key(i), d0.has_key(i)) # Test update t = UserDict.UserDict() t.update(u2) self.assertEqual(t, u2) class Items: def items(self): return (("x", 42), ("y", 23)) t = UserDict.UserDict() t.update(Items()) self.assertEqual(t, {"x": 42, "y": 23}) # Test get for i in u2.keys(): self.assertEqual(u2.get(i), u2[i]) self.assertEqual(u1.get(i), d1.get(i)) self.assertEqual(u0.get(i), d0.get(i)) # Test "in" iteration. for i in xrange(20): u2[i] = str(i) ikeys = [] for k in u2: ikeys.append(k) keys = u2.keys() self.assertEqual(set(ikeys), set(keys)) # Test setdefault t = UserDict.UserDict() self.assertEqual(t.setdefault("x", 42), 42) self.assertTrue(t.has_key("x")) self.assertEqual(t.setdefault("x", 23), 42) # Test pop t = UserDict.UserDict(x=42) self.assertEqual(t.pop("x"), 42) self.assertRaises(KeyError, t.pop, "x") self.assertEqual(t.pop("x", 1), 1) t["x"] = 42 self.assertEqual(t.pop("x", 1), 42) # Test popitem t = UserDict.UserDict(x=42) self.assertEqual(t.popitem(), ("x", 42)) self.assertRaises(KeyError, t.popitem) def test_missing(self): # Make sure UserDict doesn't have a __missing__ method self.assertEqual(hasattr(UserDict, "__missing__"), False) # Test several cases: # (D) subclass defines __missing__ method returning a value # (E) subclass defines __missing__ method raising RuntimeError # (F) subclass sets __missing__ instance variable (no effect) # (G) subclass doesn't define __missing__ at a all class D(UserDict.UserDict): def __missing__(self, key): return 42 d = D({1: 2, 3: 4}) self.assertEqual(d[1], 2) self.assertEqual(d[3], 4) self.assertNotIn(2, d) self.assertNotIn(2, d.keys()) self.assertEqual(d[2], 42) class E(UserDict.UserDict): def __missing__(self, key): raise RuntimeError(key) e = E() try: e[42] except RuntimeError, err: self.assertEqual(err.args, (42,)) else: self.fail("e[42] didn't raise RuntimeError") class F(UserDict.UserDict): def __init__(self): # An instance variable __missing__ should have no effect self.__missing__ = lambda key: None UserDict.UserDict.__init__(self) f = F() try: f[42] except KeyError, err: self.assertEqual(err.args, (42,)) else: self.fail("f[42] didn't raise KeyError") class G(UserDict.UserDict): pass g = G() try: g[42] except KeyError, err: self.assertEqual(err.args, (42,)) else: self.fail("g[42] didn't raise KeyError") ########################## # Test Dict Mixin class SeqDict(UserDict.DictMixin): """Dictionary lookalike implemented with lists. Used to test and demonstrate DictMixin """ def __init__(self, other=None, **kwargs): self.keylist = [] self.valuelist = [] if other is not None: for (key, value) in other: self[key] = value for (key, value) in kwargs.iteritems(): self[key] = value def __getitem__(self, key): try: i = self.keylist.index(key) except ValueError: raise KeyError return self.valuelist[i] def __setitem__(self, key, value): try: i = self.keylist.index(key) self.valuelist[i] = value except ValueError: self.keylist.append(key) self.valuelist.append(value) def __delitem__(self, key): try: i = self.keylist.index(key) except ValueError: raise KeyError self.keylist.pop(i) self.valuelist.pop(i) def keys(self): return list(self.keylist) def copy(self): d = self.__class__() for key, value in self.iteritems(): d[key] = value return d @classmethod def fromkeys(cls, keys, value=None): d = cls() for key in keys: d[key] = value return d class UserDictMixinTest(mapping_tests.TestMappingProtocol): type2test = SeqDict def test_all(self): ## Setup test and verify working of the test class # check init s = SeqDict() # exercise setitem s[10] = 'ten' s[20] = 'twenty' s[30] = 'thirty' # exercise delitem del s[20] # check getitem and setitem self.assertEqual(s[10], 'ten') # check keys() and delitem self.assertEqual(s.keys(), [10, 30]) ## Now, test the DictMixin methods one by one # has_key self.assertTrue(s.has_key(10)) self.assertTrue(not s.has_key(20)) # __contains__ self.assertIn(10, s) self.assertNotIn(20, s) # __iter__ self.assertEqual([k for k in s], [10, 30]) # __len__ self.assertEqual(len(s), 2) # iteritems self.assertEqual(list(s.iteritems()), [(10,'ten'), (30, 'thirty')]) # iterkeys self.assertEqual(list(s.iterkeys()), [10, 30]) # itervalues self.assertEqual(list(s.itervalues()), ['ten', 'thirty']) # values self.assertEqual(s.values(), ['ten', 'thirty']) # items self.assertEqual(s.items(), [(10,'ten'), (30, 'thirty')]) # get self.assertEqual(s.get(10), 'ten') self.assertEqual(s.get(15,'fifteen'), 'fifteen') self.assertEqual(s.get(15), None) # setdefault self.assertEqual(s.setdefault(40, 'forty'), 'forty') self.assertEqual(s.setdefault(10, 'null'), 'ten') del s[40] # pop self.assertEqual(s.pop(10), 'ten') self.assertNotIn(10, s) s[10] = 'ten' self.assertEqual(s.pop("x", 1), 1) s["x"] = 42 self.assertEqual(s.pop("x", 1), 42) # popitem k, v = s.popitem() self.assertNotIn(k, s) s[k] = v # clear s.clear() self.assertEqual(len(s), 0) # empty popitem self.assertRaises(KeyError, s.popitem) # update s.update({10: 'ten', 20:'twenty'}) self.assertEqual(s[10], 'ten') self.assertEqual(s[20], 'twenty') # cmp self.assertEqual(s, {10: 'ten', 20:'twenty'}) t = SeqDict() t[20] = 'twenty' t[10] = 'ten' self.assertEqual(s, t) def test_main(): test_support.run_unittest( UserDictTest, UserDictMixinTest ) if __name__ == "__main__": test_main()
The rise and fall of Jerry Yang, the departing CEO of Yahoo, captured the imagination of an industry built on just such meteoric climbs and merciless tumbles. Just 17 months ago, Mr. Yang got a rare second chance as a cofounder of a start-up to take charge again of his creation in its hour of need. For some techies in Silicon Valley, the moment represented a pleasing break from the outside "suits" and "grown-ups" who invariably take over maturing start-ups at the cost of scrappy innovation. It held out the promise of mirroring another triumphant second act, that of Steve Jobs at Apple. But any honeymoon in the Valley for Yang ended quickly. He came under withering criticism for his handling of a Microsoft takeover, then for losing a partnership with Google. By the time Yang's step-down was announced Monday the only surprise seemed to be that it took the board of directors so long to act. Wall Street rewarded the move Tuesday, with Yahoo shares rising 11 percent to $11.82 as of press time. Investors apparently felt prospects for a Microsoft buyout have brightened – a point which divides analysts. Despite the darkening horizon for online advertising in a slowdown, many agree the company has plenty of strength left, provided the right leader can be tapped next. Yang didn't seem to be what Yahoo needed now: A founder's strengths differ from those of a turnaround CEO, analysts say. Few excel at both: Steve Jobs may just be that rare exception. "There are three different skill-sets needed to run a company," says Rob Enderle, principal analyst at Emerging Personal Technologies in San Jose, Calif. There are start-up leaders, transitional leaders, and sustaining managers. "Jerry was a start-up guy. He wasn't a transitional [figure] and certainly not a turnaround guy. He didn't have the demeanor, personality, or drive." Not another Steve Jobs Unlike Yang, who settled fairly early into a strategist role in Yahoo, Mr. Jobs was fired from Apple and spent time heading a couple of firms – NeXT and Pixar – before returning. He experienced "near failure" with both endeavors and learned from those mistakes, says Mr. Enderle. Jobs also had years on the outside to plot what he would do differently at Apple if he ever returned. Yang is widely described as affable, whereas Jobs can inspire fear. "He is a harsh and dictatorial leader," says Enderle. "That's kind of what you need to have with somebody who is running a turnaround. Once you decide the direction you need to go, everyone needs to stand up and go with you." Another difference: Yang seemed to cling to visions of Yahoo as it was in its heyday, whereas Jobs decided to upend the Apple cart. "Jobs' success at Apple has been predicated on his willingness to utterly discard what the company was before, during the time when his star was in ascendancy," says Charles King, principal analyst at Pund-IT. Once an also-ran competitor to Windows, Apple is now a consumer electronics company that has scrubbed "computer" from its moniker. "I think Yang was in a way trying to recapture some of Yahoo's glory days." The failed Microsoft deal Most observers fault Yang for his failed negotiations with Microsoft. The Seattle software giant placed multiple bids to acquire Yahoo, hoping to emerge in a more competitive position vis-à-vis Google in the online advertising market. "[Yang] kept saying we should get more money, we should get more money, and [he was] not realizing how precarious their position was," says Enderle. Others have attributed that blind spot to the founder's sentimental and dated view of Yahoo as a fast-rising company. Yang's negotiating behavior at times suggested he wasn't interested in bargaining as much as playing the role of renegade start-up. Yahoo executives reportedly high-fived when negotiations collapsed. Investors, led by now-board member Carl Icahn, reminded Yang of his fiduciary responsibility to them to maximize returns. They pressured Yang to show how he would raise the company's falling stock price to the level offered by Microsoft. Yang then struck a deal with Google to allow the industry leader to serve ads on Yahoo's network in exchange for a share of revenue. When anti-trust regulators began to raise eyebrows, Google backed out. Yang's critics fault him for not trying harder to salvage that deal. Both Enderle and Mr. King doubt Microsoft will return for a deal. Members of the team pushing for the takeover have left Microsoft, says Enderle. Adds King, "My own sense is they've moved on and there are other things on the table, other plans they've got. But never say never in the IT world."
Please register to participate in our discussions with 1.5 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads. sheena12 Senior Member Last Activity: Today 02:43 PM User Lists Visitor Messages (Public) Hi Sheena! RE: peanut sauce: I've used several different kinds as my grocery store keeps changing the one kind (yep, only one kind!) they sell. Their current kind is my least favorite (it seems to me to have a bit of a sour taste), but it's still not bad, and the Simply Asia Sweet & Spicy Saigon flakes make it taste great. I've also bought this a lot: Amazon.com : A Taste of Thai Peanut Sauce Mix, 3.5 Oz Pack -- 6 Per Case. : Grocery & Gourmet Food . I use lite coconut milk. I really like the taste (very peanut-y!) but it's very mild -- I have to figure out what to add to it to make it a bit spicier. Anyway, hope you & your family are all snug and warm at home! We are getting a bit more snow here but JUST a bit this weekend. I am sooooooooooo ready for spring!!!!!!! Thank you for your very kind note on my profile! I hope you and your family enjoy the holidays. (And BTW I will likely do vegetarian once or twice a week in 2015 ... so many of your posts in the Food forum make veggie food sound delicious! )
Featured Property Description This stunning 4 bedroom two bath condominium (over 2000 square feet) is located in the premier community of Vista Cay Resort and is perfect for families, business travelers, retirees, singles or couples. Living room is open to the kitchen with Granite countertops, Stainless Steel appliances. Large living area with stylish decor will make it hard for any member of your party to be in anyone’s way. Large sectional sofa in the living area, allows for seating for all while watching TV. So comfortable, you might just fall asleep and miss the ending of your show! while relaxing and watching the 50in plasma TV. Master suite has a King bed and private bath which has a separate shower, garden tub, and double vanity with an extra large walk in closet. The second bedroom has a king bed, and the third bedroom has a queen bed, The converted den (4th bedroom) has 2 full size beds. Located in the building closest to the Orange County Convention Center, its a short walk for the business traveler. The condo includes: Free Wireless Internet access, Cable television, a full size washer and dryer, microwave oven, refrigerator, stove with glass top range, dishwasher, coffee maker, toaster, central heat/air, towels, linen, iron with ironing board, hair dryer, dishes, cookware and utensils for your use. You will have access to all the community amenities available. Located in the building closest to the Orange County Convention Center, its a short walk for the business traveler. The condo includes: Free Wireless Internet access, Cable television, a full size washer and dryer, microwave oven, refrigerator, stove with glass top range, dishwasher, coffee maker, toaster, central heat/air, towels, linen, iron with ironing board, hair dryer, dishes, cookware and utensils for your use. You will have access to all the community amenities available. No sleeper in the living area. Please remember that this is a self-concierge condo. A 'starter' pack of 1 roll of paper towels, 2 rolls of TP, small soaps, DW tab, small dishwashing detergent, is provided. There are NO food items provided. Notes The premises will be available for occupation from 4:00 PM on the arrival date and must be vacated by 10:00 AM on the date of departure. Arrival and/or departure times may be altered under written consent and made at least 24 hours in advance of arrival and/or departure time. Fees may apply for early arrival or late departures. To guarantee a reservation all of the following conditions apply: a reservation deposit of 20% of the total room rate before taxes with a minimum of $250.00 is due; the rental agreement has been signed by the guest (electronically or physically) and received by the property care/management company along with a copy of a valid and legible driver’s license or passport of the person whose name the reservation is under; and the person whose name the reservation is under must be at least 21 years of age and will be staying on property during the rental period. We do require a Security Deposit in addition to room rate for each room and/or reservation. This security deposit can be taken care of one of two ways: either the purchase of an Accidental Rental Damage waiver for $50 or a refundable security deposit of $400 held prior to your arrival date. The security deposit will be refunded after your departure date assuming there are no outstanding balances for services or damages to the property. Please note that this is a self-concierge condo. A 'starter' pack of 1 roll of paper towels, 2 rolls of TP, small soaps, DW tab, small dishwashing detergent, is provided. There are NO food items provided. Community - Vista Cay Resort Vista Cay Inn by DENSCO L.L.C. is within walking distance of the Orange County Convention Center and just a few miles from Disney World, Universal Studios and Seaworld.
If you argue that something is useless or inferior to an alternative, then you need to prove that it is that for everybody, not just for some people. No I don't. I don't have to prove anything in this discussion, because I'm posting on an Internet message board and voicing my opinion. When I'm trying to get published in scientific journals, or if I'm on trial for something, those are the times I need to prove something. And in this case, I'm not even arguing that nobody should buy an XBox. I don't care what people do, and if the XBox is, for whatever reason, more convenient, by all means go buy one. I don't care very much what some random asshole on the Internet buys. You could go buy yourself an XBox for every room of the house, and hey, it's your money, you can do that. I'm still aloud to post on the Internet that it seems excessive and stupid. As far as whether streaming PC games to your XBox is a good idea, my guess is that the experience won't be great for twitch games, but if it's a good enough experience for you, then again, by all means, have at it. I'm not going to be an asshole and claim that you have to prove that's the best choice for everybody. At the same time, if what you really want is a method to stream your Steam games to your TV over your home network through a set-top box, I would guess that there are cheaper solutions than the XBox. You don't even need something with much 3D rendering performance to stream video. There are plenty of massively powered existing PCs not hooked up to the living room TV And there are plenty that are. And there are plenty of people who don't hook it up to the TV because they don't want to. And there are plenty of people who buy more than one computer, understanding that it's "redundant hardware", because that's what they want to do. In fact, that's what you're doing if you buy an XBox when you already have a good gaming PC anyway. And why are you getting butthurt because I don't want to buy an XBox? suppose you have some awesome... gaming PC, do not want to put it in the living room, want to use [it]... in to your living room. How do you propose solving this conundrum in the easiest and cheapest manner? Well the easiest and cheapest option is to quit being such a particular whiny bitch, and either play games in the game room or move your gaming rig to the living room. That's easy and cheap. It doesn't give you every little thing your heart desires, but it sure keeps things simple. All of the other solutions are going to have some trade-off between "cheap and easy" and "works well". Buying an XBox would still be redundant hardware, for the most part (excluding exclusive games). Also, at least for me, my office computer and my gaming PC aren't really redundant. For my office/productivity use, I'm content with an older computer with an integrated graphics chipset. It's not a gaming PC, but it's fast enough to open web pages. I'm not sure I understand why this would make steam machines useless. The main value of a steam machine, as I see it, is that it allows you to have the convenience of a console in what is essentially a generic gaming PC. That is, it has a controller and a GUI aimed at connecting it to a TV and not using a keyboard or mouse, but it's not a locked-down console. It's just generic hardware that will play all of your PC games, and those games don't become obsolete and unplayable when you upgrade to the next generation. The article says: if you can use your Xbox One to play your PC on your TV, then your Xbox One can use Steam and effectively become a Steam Machine. So what they're saying is, if you have a PC running Steam (which is really all a "Steam Machine" is) and an XBox One, then it's kind of the same as having a Steam Machine. Yes, it is... because you're starting with the scenario where you have a Steam machine. It's like saying, "There's no reason to buy a car, since if I already own a car and I buy a bicycle, it's like owning a car!" Look, you shouldn't assume that I want an XBox. I can get a PC with better graphics and avoid being locked into Microsoft's ecosystem. I can install game mods, my games don't all go unnecessarily obsolete with every new generation of PC, Steam often has very good sales, Steam doesn't make me pay a monthly subscription for online services, and I can use that PC for other things if I like. To me, the only thing that would want me to buy a console at this point is if there were an exclusive game that I really wanted to play, and I've found that I can live without it. I don't want an XBox, so it doesn't make sense to me to say, "If you buy a Steam machine and an XBox, then it's like having a Steam machine!" I'll just buy a Steam machine, thank you, even if it's not a branded "Steam Machine". They seem to think it is doing "something". Exactly what, may be in question. 8-) From what I read back when the last time this was a story, a few people were saying, "It seems to be generating thrust, but on the other hand, the amount of thrust we're measuring is basically within the margin of error, so... we need to keep testing this." So in your head, some people who got vaccinated should be included in the classification "those who cannot get vaccinated. Well that says a lot about the strength of your argument. Measles vaccination is a non-issue and non-risk. Using it to advance the principle that government can force people to inject stuff against their objections by exaggerating and fabricating numbers like "killing 3 million people" as if they had anything to do with measles is outrageously dishonest and deceptive. I didn't claim that measles would kill 3 million people. I was using simple math to point out that "a small percentage of the population" might still include a whole lot of people. Yes, but it's distinguished from the steam engine, from what I understand, in that the power output is comparable enough to the margin of error that they're still in the process of verifying that it's actually doing something. To be fair, it's not clear what you consider a "compromise", or even what features are desirable. For example, I want a very thin, lightweight, but sturdy phone, and any additional hardware you pack in there runs the risk of adding weight, and any port or removable piece is a potential weakness in the structural integrity. If you give me a SD card port, I won't use it. If you let me remove the battery, I'll pretty much never do that unless the battery actually fails within 2 years. Front speakers? For what? Now I'm not trying to argue here that these aren't good features or that you shouldn't want them. I'm just pointing out that when they say, "no compromises", it's inherently a claim without a specific meaning, and one man's "compromise" is another man's "that's exactly what I want". The only group that is really helped by other people's vaccinations is a small percentage of the population that cannot get vaccinated. Not true. It's true that there are some people who cannot be vaccinated, and those people are helped by other people being vaccinated. Aside from those people, vaccines are not 100% effective. Some portion of the people who are vaccinated may still get sick if exposed to the virus, and those people are also protected by other people getting vaccinated. In both of these cases, you can say, "it's a small percentage of the population." Small percentages of the population, however, can still represent a lot of people. If something kills 1% of the US population, that's still about 3 million people. It's worth noting that there's a big difference between those theories and this engine. With this engine, they're putting forward a piece of technology and saying, "We don't know how this works, but we're claiming it does." In the case of Newton and Einstein, they put forward a mathematical model that was internally consistent, and the question was whether it applied to reality. So in one case, they're putting forward a technology without a real explanation as to how it works, and in the other case, they're putting forward a coherent theory that seems to explain phenomena that we have witnessed. Also, both Newton and Einstein's theories had the benefit of providing a clean explanation to phenomena that we were having a lot of trouble explaining. I think some of the skepticism is not as to whether this might be an engine that produces some small amount of thrust. I mean, a little skepticism is a healthy response for any new scientific discovery, and it's not inappropriate to ask for proof. Since the thrust we're talking about is so small, the margin of error is large, and proving that it really works takes a bit of doing. I don't assume that it works, but I also don't really disbelieve it if NASA scientists say it does. However, when this was reported, it was reported in many places as "OMG! NASA has created a warp drive. We can go faster than light now!" I'm skeptical about those claims. It's even crazier to think that they'll manage privacy settings effectively across all the different online accounts that they have. Something like this would at least give a savvy person the possibility of managing privacy settings. I think that this is really part of a larger problem that eventually ties back to identity management and account management. That may sound like a strange thing to leap to, but hear me out. One of the problems I've noticed for years is that it's not easy to keep track of all my accounts. Every time I sign up for a new account or trial, I have to create a new account, create a username, create a password, associate it with an email account, choose security questions, bla bla bla. Dual-factor authentication is supposed to help with some of the security problems associated with all this nonsense, but it also adds another complication to the whole thing. Once all that's done, I need to keep track of all that information that I used to sign up. It's not so bad for individual accounts, but after a few decades of trying things out, abandoning accounts, signing up for trials that I end up not using, and all kinds of things, I really don't know what accounts I have available on which services, what the usernames are, or which email address they're associated with. When I answered security questions, I don't necessarily know what I answered with-- it asked for my favorite author, but was that my favorite author from 2 years ago or 10 years ago? Did I tell the truth when I answered it, or did I answer with a sarcastic joke answer? I honestly don't know for some accounts. I don't even know, for example, if I still have a MySpace account from roughly a decade ago, that I created, signed into a couple of times, and forgot about. You're thinking this is completely off-topic, but here's the thing: as you have an "Internet of things", there's a good chance that each of those items are going to have their own account on their own service. You have some program to control your lights at home? That program will need an account. Someone invents a smart-vacuum, and it's internet connected? That'll have it's own account. These days, companies don't want to collaborate and develop standard APIs, common platforms, open protocols, or whatever else. Every company developing an app or a website wants to do it's own thing it's own way, while locking out the competition from interoperability. So now, every new Internet-connected thing is going to add complexity to your online life. Asking to provide privacy controls to consumers is putting the cart before the horse. Even if you want to provide those controls, you're going to have different controls in different places in different UIs, all across different services with different accounts. Users won't be able to effectively manage those controls even if you provide them. What needs to happen first is that we need to develop some kind of identity management and SSO that begins to shrink the task of managing these various accounts. Once you have something like that, you could create APIs for managing those accounts, opening and shutting down accounts, viewing which private information is available in each account, and restricting/removing the private information as needed.
// // Generated by class-dump 3.5 (64 bit) (Debug version compiled Oct 15 2018 10:31:50). // // class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard. // #import <objc/NSObject.h> @class NEIKEv2AuthenticationProtocol, NEIKEv2ConfigurationMessage, NEIKEv2DHProtocol, NEIKEv2EAP, NEIKEv2IKESAConfiguration, NEIKEv2IKESAProposal, NEIKEv2IKESPI, NEIKEv2Identifier, NEIKEv2SessionConfiguration, NEIKEv2Transport, NSArray, NSData, NSError, NSMutableData, NSString, NWAddressEndpoint; @protocol NEIKEv2ConfigurationDelegate, NEIKEv2PacketDelegate, NEIKEv2TransportDelegate, OS_dispatch_queue; @interface NEIKEv2IKESA : NSObject { CDUnion_07c5b791 _dhECKey; BOOL _shouldSendStateUpdate; BOOL _isInitiator; BOOL _fragmentationSupported; BOOL _mobikeSupported; BOOL _useNATTraversal; BOOL _useTCPEncapsulation; BOOL _detectedOutgoingNAT; BOOL _detectedIncomingNAT; BOOL _isRekeying; BOOL _eapInProgress; BOOL _peerAuthenticated; BOOL _reportShortDPD; BOOL _usesPacketDelegate; unsigned short _shortDPDCounter; NEIKEv2IKESPI *_localSPI; NEIKEv2IKESPI *_remoteSPI; unsigned long long _state; NSError *_error; NWAddressEndpoint *_localAddress; NWAddressEndpoint *_remoteAddress; NEIKEv2IKESAConfiguration *_configuration; NEIKEv2SessionConfiguration *_sessionConfiguration; NEIKEv2IKESAProposal *_chosenProposal; double _lastReceivedDPD; NSData *_localNonce; NSData *_remoteNonce; NSMutableData *_dhPublicKey; NSData *_dhRemotePublicKey; struct OpaqueSecDHContext *_dhContext; unsigned long long _dhPublicKeySize; NEIKEv2DHProtocol *_remotePreferredDHProtocol; NSMutableData *_sKeySeed; NSMutableData *_skD; NSMutableData *_skAi; NSMutableData *_skAr; NSMutableData *_skEi; NSMutableData *_skEr; NSMutableData *_skPi; NSMutableData *_skPr; NSMutableData *_encryptCryptoCtx; NSMutableData *_localCertificateIdentity; NSMutableData *_digitalSignatureLocalPrivateKey; NSMutableData *_digitalSignatureLocalPublicKey; NSMutableData *_digitalSignatureRemotePublicKey; NSData *_cookie; NSData *_responderCookie2; NSData *_initiatorCookie2; NSData *_signHashData; NSString *_outgoingInterfaceName; NSData *_localFirstMessage; NSData *_remoteFirstMessage; NEIKEv2Identifier *_localIdentifierFromPacket; NEIKEv2Identifier *_remoteIdentifierFromPacket; unsigned long long _childSAModeFromPacket; NSArray *_childSAProposalsFromPacket; NEIKEv2AuthenticationProtocol *_authProtocolFromPacket; NSData *_authenticationDataFromPacket; NEIKEv2ConfigurationMessage *_configMessageFromPacket; NSArray *_initiatorTrafficSelectorsFromPacket; NSArray *_responderTrafficSelectorsFromPacket; NEIKEv2EAP *_eapClient; NEIKEv2Transport *_transport; NEIKEv2Transport *_natTransport; NEIKEv2Transport *_tcpTransport; NEIKEv2ConfigurationMessage *_activeConfiguration; NSData *_receivedDestinationHash; NEIKEv2Identifier *_internalRemoteIdentifier; NSMutableData *_fetchedPassword; NSMutableData *_fetchedSharedSecret; NSObject<OS_dispatch_queue> *_queue; id <NEIKEv2TransportDelegate> _transportDelegate; CDUnknownBlockType _socketGetBlock; id <NEIKEv2PacketDelegate> _packetDelegate; id <NEIKEv2ConfigurationDelegate> _configurationDelegate; unsigned long long _ikeSessionUniqueIndex; unsigned long long _ikeSAUniqueIndex; } + (id)copySharedSecretFromConfig:(id)arg1; + (BOOL)checkValidityOfDigitalSignature:(id)arg1 authenticationProtocol:(id)arg2 sessionConfiguration:(id)arg3 remoteSignedOctets:(id)arg4; + (BOOL)checkValidityOfDigitalSignature:(id)arg1 sessionConfiguration:(id)arg2 remoteSignedOctets:(id)arg3; + (id)createAuthenticationDataForSharedSecret:(id)arg1 octets:(id)arg2 prfProtocol:(id)arg3; - (void).cxx_destruct; @property(nonatomic) unsigned long long ikeSAUniqueIndex; // @synthesize ikeSAUniqueIndex=_ikeSAUniqueIndex; @property(nonatomic) unsigned long long ikeSessionUniqueIndex; // @synthesize ikeSessionUniqueIndex=_ikeSessionUniqueIndex; @property __weak id <NEIKEv2ConfigurationDelegate> configurationDelegate; // @synthesize configurationDelegate=_configurationDelegate; @property __weak id <NEIKEv2PacketDelegate> packetDelegate; // @synthesize packetDelegate=_packetDelegate; @property BOOL usesPacketDelegate; // @synthesize usesPacketDelegate=_usesPacketDelegate; @property(copy) CDUnknownBlockType socketGetBlock; // @synthesize socketGetBlock=_socketGetBlock; @property __weak id <NEIKEv2TransportDelegate> transportDelegate; // @synthesize transportDelegate=_transportDelegate; @property(retain) NSObject<OS_dispatch_queue> *queue; // @synthesize queue=_queue; @property(retain) NSMutableData *fetchedSharedSecret; // @synthesize fetchedSharedSecret=_fetchedSharedSecret; @property(retain) NSMutableData *fetchedPassword; // @synthesize fetchedPassword=_fetchedPassword; @property(retain) NEIKEv2Identifier *internalRemoteIdentifier; // @synthesize internalRemoteIdentifier=_internalRemoteIdentifier; @property(retain) NSData *receivedDestinationHash; // @synthesize receivedDestinationHash=_receivedDestinationHash; @property(retain) NEIKEv2ConfigurationMessage *activeConfiguration; // @synthesize activeConfiguration=_activeConfiguration; @property(retain) NEIKEv2Transport *tcpTransport; // @synthesize tcpTransport=_tcpTransport; @property(retain) NEIKEv2Transport *natTransport; // @synthesize natTransport=_natTransport; @property(retain) NEIKEv2Transport *transport; // @synthesize transport=_transport; @property(retain) NEIKEv2EAP *eapClient; // @synthesize eapClient=_eapClient; @property(retain, nonatomic) NSArray *responderTrafficSelectorsFromPacket; // @synthesize responderTrafficSelectorsFromPacket=_responderTrafficSelectorsFromPacket; @property(retain, nonatomic) NSArray *initiatorTrafficSelectorsFromPacket; // @synthesize initiatorTrafficSelectorsFromPacket=_initiatorTrafficSelectorsFromPacket; @property(retain, nonatomic) NEIKEv2ConfigurationMessage *configMessageFromPacket; // @synthesize configMessageFromPacket=_configMessageFromPacket; @property(retain, nonatomic) NSData *authenticationDataFromPacket; // @synthesize authenticationDataFromPacket=_authenticationDataFromPacket; @property(retain, nonatomic) NEIKEv2AuthenticationProtocol *authProtocolFromPacket; // @synthesize authProtocolFromPacket=_authProtocolFromPacket; @property(retain, nonatomic) NSArray *childSAProposalsFromPacket; // @synthesize childSAProposalsFromPacket=_childSAProposalsFromPacket; @property(nonatomic) unsigned long long childSAModeFromPacket; // @synthesize childSAModeFromPacket=_childSAModeFromPacket; @property(retain, nonatomic) NEIKEv2Identifier *remoteIdentifierFromPacket; // @synthesize remoteIdentifierFromPacket=_remoteIdentifierFromPacket; @property(retain, nonatomic) NEIKEv2Identifier *localIdentifierFromPacket; // @synthesize localIdentifierFromPacket=_localIdentifierFromPacket; @property(retain) NSData *remoteFirstMessage; // @synthesize remoteFirstMessage=_remoteFirstMessage; @property(retain) NSData *localFirstMessage; // @synthesize localFirstMessage=_localFirstMessage; @property(retain) NSString *outgoingInterfaceName; // @synthesize outgoingInterfaceName=_outgoingInterfaceName; @property(retain) NSData *signHashData; // @synthesize signHashData=_signHashData; @property(retain) NSData *initiatorCookie2; // @synthesize initiatorCookie2=_initiatorCookie2; @property(retain) NSData *responderCookie2; // @synthesize responderCookie2=_responderCookie2; @property(retain) NSData *cookie; // @synthesize cookie=_cookie; @property(retain) NSMutableData *digitalSignatureRemotePublicKey; // @synthesize digitalSignatureRemotePublicKey=_digitalSignatureRemotePublicKey; @property(retain) NSMutableData *digitalSignatureLocalPublicKey; // @synthesize digitalSignatureLocalPublicKey=_digitalSignatureLocalPublicKey; @property(retain) NSMutableData *digitalSignatureLocalPrivateKey; // @synthesize digitalSignatureLocalPrivateKey=_digitalSignatureLocalPrivateKey; @property(retain) NSMutableData *localCertificateIdentity; // @synthesize localCertificateIdentity=_localCertificateIdentity; @property(retain) NSMutableData *encryptCryptoCtx; // @synthesize encryptCryptoCtx=_encryptCryptoCtx; @property(retain) NSMutableData *skPr; // @synthesize skPr=_skPr; @property(retain) NSMutableData *skPi; // @synthesize skPi=_skPi; @property(retain) NSMutableData *skEr; // @synthesize skEr=_skEr; @property(retain) NSMutableData *skEi; // @synthesize skEi=_skEi; @property(retain) NSMutableData *skAr; // @synthesize skAr=_skAr; @property(retain) NSMutableData *skAi; // @synthesize skAi=_skAi; @property(retain) NSMutableData *skD; // @synthesize skD=_skD; @property(retain) NSMutableData *sKeySeed; // @synthesize sKeySeed=_sKeySeed; @property(retain) NEIKEv2DHProtocol *remotePreferredDHProtocol; // @synthesize remotePreferredDHProtocol=_remotePreferredDHProtocol; @property unsigned long long dhPublicKeySize; // @synthesize dhPublicKeySize=_dhPublicKeySize; @property struct OpaqueSecDHContext *dhContext; // @synthesize dhContext=_dhContext; @property(retain) NSData *dhRemotePublicKey; // @synthesize dhRemotePublicKey=_dhRemotePublicKey; @property(retain) NSMutableData *dhPublicKey; // @synthesize dhPublicKey=_dhPublicKey; @property(retain) NSData *remoteNonce; // @synthesize remoteNonce=_remoteNonce; @property(retain) NSData *localNonce; // @synthesize localNonce=_localNonce; @property BOOL reportShortDPD; // @synthesize reportShortDPD=_reportShortDPD; @property unsigned short shortDPDCounter; // @synthesize shortDPDCounter=_shortDPDCounter; @property double lastReceivedDPD; // @synthesize lastReceivedDPD=_lastReceivedDPD; @property(retain) NEIKEv2IKESAProposal *chosenProposal; // @synthesize chosenProposal=_chosenProposal; @property(retain) NEIKEv2SessionConfiguration *sessionConfiguration; // @synthesize sessionConfiguration=_sessionConfiguration; @property(retain) NEIKEv2IKESAConfiguration *configuration; // @synthesize configuration=_configuration; @property(retain) NWAddressEndpoint *remoteAddress; // @synthesize remoteAddress=_remoteAddress; @property(retain) NWAddressEndpoint *localAddress; // @synthesize localAddress=_localAddress; @property BOOL peerAuthenticated; // @synthesize peerAuthenticated=_peerAuthenticated; @property BOOL eapInProgress; // @synthesize eapInProgress=_eapInProgress; @property BOOL isRekeying; // @synthesize isRekeying=_isRekeying; @property BOOL detectedIncomingNAT; // @synthesize detectedIncomingNAT=_detectedIncomingNAT; @property BOOL detectedOutgoingNAT; // @synthesize detectedOutgoingNAT=_detectedOutgoingNAT; @property BOOL useTCPEncapsulation; // @synthesize useTCPEncapsulation=_useTCPEncapsulation; @property BOOL useNATTraversal; // @synthesize useNATTraversal=_useNATTraversal; @property BOOL mobikeSupported; // @synthesize mobikeSupported=_mobikeSupported; @property BOOL fragmentationSupported; // @synthesize fragmentationSupported=_fragmentationSupported; @property BOOL isInitiator; // @synthesize isInitiator=_isInitiator; @property BOOL shouldSendStateUpdate; // @synthesize shouldSendStateUpdate=_shouldSendStateUpdate; @property(retain) NSError *error; // @synthesize error=_error; @property unsigned long long state; // @synthesize state=_state; @property(retain) NEIKEv2IKESPI *remoteSPI; // @synthesize remoteSPI=_remoteSPI; @property(retain) NEIKEv2IKESPI *localSPI; // @synthesize localSPI=_localSPI; @property(readonly, nonatomic) NEIKEv2AuthenticationProtocol *authenticationProtocol; - (void)resetShortDPDParameters; - (BOOL)shouldReportShortDPD; - (unsigned long long)dpdRetryIntervalMilliseconds; @property(readonly) NSData *decryptionKey; @property(readonly) NSData *encryptionKey; @property(readonly) NSData *remoteIntegrityKey; @property(readonly) NSData *localIntegrityKey; @property(retain) NSData *responderNonce; @property(retain) NSData *initiatorNonce; - (unsigned char (*)[32])dhCurveKeyForDesc:(int)arg1; - (struct ccec_full_ctx *)dhECPKeyForDesc:(int)arg1; - (id)copyResponderIdentifier; - (id)copyInitiatorIdentifier; @property(retain, nonatomic) NEIKEv2Identifier *remoteIdentifier; @property(readonly, nonatomic) NEIKEv2Identifier *localIdentifier; @property(readonly) NSMutableData *sharedSecret; @property(readonly) NSMutableData *password; @property(retain) NSData *responderFirstMessage; @property(retain) NSData *initiatorFirstMessage; - (BOOL)resetRemoteAddress:(id)arg1; - (void)resetSessionConfiguration:(id)arg1; - (void)detachTransportWithShouldInvalidate:(BOOL)arg1; - (id)copyTransport; - (void)resyncAddress; @property(readonly) BOOL hasTransport; - (BOOL)supportsSignHash:(unsigned long long)arg1; - (BOOL)switchToTCPEncapsulation; - (BOOL)switchToNATTraversalPorts; @property(retain) NEIKEv2IKESPI *responderSPI; @property(retain) NEIKEv2IKESPI *initiatorSPI; - (void)assignRemoteSPI:(id)arg1; - (void)assignRemoteSPI:(id)arg1 disableWildCard:(BOOL)arg2; - (void)disableWildcard; @property(readonly) NWAddressEndpoint *responderAddress; @property(readonly) NWAddressEndpoint *initiatorAddress; - (void)sentStateUpdate; - (void)setState:(unsigned long long)arg1 error:(id)arg2; - (void)reset; - (void)dealloc; - (id)copyForRekey; - (id)copyChildConfig; - (id)copySessionConfig; - (void)updateConfiguration:(id)arg1; @property(readonly) NEIKEv2DHProtocol *preferredDHProtocol; - (id)initIKESAWithConfiguration:(id)arg1 sessionConfiguration:(id)arg2 queue:(id)arg3 initialTransport:(id)arg4 transportDelegate:(id)arg5 socketGetBlock:(CDUnknownBlockType)arg6 packetDelegate:(id)arg7 configurationDelegate:(id)arg8 ikeSessionUniqueIndex:(unsigned long long)arg9; - (id)description; - (BOOL)shouldReceiveWildcard; - (id)createLocalSPIForLocalAddress:(id)arg1 remoteAddress:(id)arg2; - (id)createResponderEAPAuthenticationData; - (id)createInitiatorEAPAuthenticationData; - (CDUnknownBlockType)copyValidateAuthBlock; - (BOOL)checkNonCertAuthData:(id)arg1; - (id)createResponderAuthenticationData; - (id)createInitiatorAuthenticationData; - (BOOL)checkValidityOfDigitalSignature:(id)arg1; - (BOOL)checkValidityOfCertificates:(id)arg1 signature:(id)arg2; - (id)createRemoteSignedOctets; - (id)createResponderSignedOctets; - (id)createInitiatorSignedOctets; - (id)createAuthenticationDataForSharedSecret:(id)arg1 octets:(id)arg2; - (id)copyDigitalSignatureSignedData:(id)arg1; - (id)copyCertSignedData:(id)arg1; - (id)copyLocalCertificateData; - (struct __SecIdentity *)copyLocalSecIdentity; - (id)copyRemoteCertificateAuthorityHashData; - (id)copyRemoteCertificateAuthorityDataArray; - (id)copyRemoteCertificateAuthorityArray; - (BOOL)generateAllValuesForRekey:(id)arg1; - (BOOL)generateLocalValues; - (BOOL)calculateSKEYSEEDDerivatives; - (BOOL)calculateSKEYSEEDForRekey:(id)arg1; - (BOOL)fetchLocalCertificateIdentity; - (BOOL)generateLocalNonce; - (BOOL)generateLocalDHValues; @end
Beasley Building The Beasley Building is a historic commercial building in downtown Athens, Ohio, United States. Constructed at the turn of the 20th century, this industrial building has been named a historic site. Built of brick with elements of iron, the Beasley Building is a three-story structure with a five-bay facade. Each bay features paired Romanesque Revival windows above a beltcourse with cornice, while an entablature of geometric shapes surrounds the building near its roofline. Upon its construction, the building was intended to convey a sense of architectural balance, contrasting the two-story height of the main windows with the beltcourse and frieze, as well as a sense of pure massiveness. Situated in downtown Athens, the Beasley Building lies within an area that has served as Athens' commercial center since the community's founding. Substantial industry in the area began in 1840 when the Hocking Canal was built through the area, and the coming of the Scioto and Hocking Valley Railroad in 1855 expanded its commercial importance. Charles Higgins, a local miller, was one of the partners in the firm of Eldridge and Higgins, which bought the building's site in 1904 and began construction, although it was then purchased by Frank Beasley, a prominent miller from nearby Amesville. His firm eventually turned the Beasley Building into the region's largest gristmill powered by electricity, although it eventually closed and was converted for grocery purposes. Late in 1982, the Beasley Building was listed on the National Register of Historic Places, qualifying both because of its architecture and its place in the area's history. One year later, the building was awarded approximately $1.1 million in federal rehabilitation tax credits. References Category:National Register of Historic Places in Athens County, Ohio Category:Grinding mills in Ohio Category:Food retailers of the United States Category:Grinding mills on the National Register of Historic Places in Ohio Category:Commercial buildings completed in 1905 Category:Buildings and structures in Athens, Ohio
Tag Archives: politics It is a land-based crustacean. While most other crustaceans live in the ocean or on the beach, the pill bug lives under a tree that fell over. That’s just poor judgment. Special powers The pill bug can curl up into a ball for defensive purposes and purposes of rolling around. It can also uncurl. Weaknesses Its poor judgment. Number of legs Fourteen. Aliases The pill bug is known to scientists as armadillidium vulgare. It is known in the flea circus as The Living Ball. It is known to its college friends as the potato bug, due to something crazy it did in the horticulture lab. It is known to its elementary friends as doodle bug, because young kids are bad at names. It is known as the sowbug to people who met it through a mutual acquaintance it didn’t expect to see again and gave a false name to years ago. It is known as the roly poly bug to its most intimate friends. Other ratings of the pill bug When asked to weigh in on the pill bug, 2016 presidential candidates had diverse opinions. Marco Rubio: “The pill bug has been nothing but a disaster for America.” Hillary Clinton: “I mean, maybe it’s not fun to have a pill bug. Maybe it’s more fun to have a dog or a cat. But you just have to suck it up and accept that sometimes your apartment complex doesn’t allow larger pets and it’s the most practical option. Thank you for your question, human friend.” Rand Paul: “I don’t need the federal government coming in and telling me what is and isn’t an insect. To me, the pill bug is an insect, and if you want me to think otherwise, then get the people of America to pass a Constitutional amendment that says so. Until then, it’s my protected right.” Jeb! Bush: “Uh, pass.” Ted Cruz: “They are, however, cherished among children, who enjoy keeping them as pets.”[1] Chris Christie: “On 9/11, the pill bug was nowhere to be seen. Not me, I was there when the first tower was hit right here in downtown! New! Jersey! Let me hear you! The Jerseyboys ride again!!” Mike Huckabee: “I think we were too quick to rush to judgment about Charles Manson.” Bernie Sanders: “Look, it is outrageous that here, in the richest country on the planet, when 80% of species are insects, that we are calling a crustacean a bug. The bottom 2% of 31% of fallen trees, in real numbers, year over year, accounting for inflation, are home to 89% of pill bugs with on average 95% of their expected legs still attached. I don’t think it should be radical to point that out.” Donald Trump: “The pill bug’s a loser; nobody respects it. Quite frankly, a lot of these crustaceans, they’re idiots, they’re parasites, they’re snapping people on their little butts with claws. And some, I assume, are nice. What I would do is get rid of the pill bug, get it out of here. And the second part of my plan is to solve all the problems.” What if it fought a bear? The pill bug can wait the bear out in a timed match, but it has no hope if it needs to get a KO. Is it noble? Moderately. Final rating I’m aware I am stepping in a hot political controversy by taking a stance on the pill bug. But that’s the kind of risk I accepted when I decided to get into the animal-rating game. So get ready for a hot take… 5/10 [1]This quote turned out to be plagiarized word for word from Wikipedia. By the Chinese zodiac, 2015 is the Year of the Sheep/Goat/Ram – proof that people dumb enough to believe in astrology don’t understand what different animals are. 2015 is gonna be a big year. I have a number of Bold Predictions for 2015, which I would like to list now: We’ll hit all 12 months again, in – and here’s the spooky part – the exact same order as last year. Sisqo will sing “Toyotathon-th-thon-thon-thon.” The new Helen Thomas (beloved stalwart White House press conference presence) will be a man named BuzzgrindTommy. Pink Floyd will finally get the Doors/Eagles style backlash it has delayed for years through a soon-to-expire contract with Satan. The truth about Area 51 (that it is the Seventh Flag of Six Flags) will be revealed. Justin Timberlake will announce, “I brought sexy back and if you aren’t more responsible with it, I’ll take it away again.” A popular news website will publish an editorial positing that “maybe the Kennedys should have cameled less.” A beloved actor who is now almost 90 years old will die. Jeff Dunham will become a martyr for many free speech advocates when he is hospitalized with stab wounds after his new puppet “Satchmo” comes to life. Arbor Day will be fraught with controversy in light of public sentiment turning against trees. A comparably themed day called Freedom Shrub Day will be celebrated. A brave new serialized drama will explore the murder of one woman, and how it affects a grumpy dude, over the course of a short season. 2015 will be Ryan Lewis’s year to shine. The 2016 U.S. Presidential race will heat up when Joe Biden promises “a stunt-ready dirtbike in every garage,” Jeb Bush takes a meeting with a major campaign supporter who turns out to be a sentient tire fire, Mitt Romney calls a taco “one of those delightful spicened rollers,” and Hillary Clinton takes to wearing a black cloak she claims helps her harness “the Darkforce.” The molemen will not reveal themselves fully to land-dwellers, but they will make their presence felt subtly. Pay close attention to the signs. Seahawks over Packers, by just a little. The Grammys will be cohosted by LL Cool J from NCIS: Los Angeles and Yass Cat from the phone application Vine. North Dakota will be canceled due to lack of interest. This is what happens when you let the goat have a whole year. Special powers Not that I dislike the goat, necessarily. It has many things going for it. It produces milk useful to humans. It’s equipped with horns for defense. It can double jump, allowing it to reach the highest platforms on most stages. I should also note that the goat is a wuminant – its stomach has 36 chambers. Weaknesses It will eat anything, even boots or old tin cans, and it doesn’t even put sriracha or something on there first. The goat’s eyes are unnatural nightmare portals. The goat has on several occasions served as the bridge that allowed real evil into our world. We think it’s unintentional. There’s some circumstantial evidence that it’s not. Number of legs Four. Number of men it respects The goat only respects one man. What if it fought a bear? Step one of fighting the bear is respecting the bear’s ability. That is a step the goat will fail. Is it noble? No. Final rating Assuming the goat isn’t actually a willing servant of the demonic, it’s perhaps the most charmingly goofy source of cheese that exists. That’s the kind of comfort we’re going to need to make it through the Year of the Goat. A conditional… You forgot to vote this week. Yeah, that was this week. You missed out on a totally free sticker. The elephant is disappointed in you. It’s not mad. The elephant is highly invested in the political process. Political cartoonists and logo designers have used it as a symbol of the United States Republican Party, but its actual views are much more diverse. It has cycled through a number of third parties in search of one that fully captures its unique opinions. To this end, it has been involved in the Bull Moose Party, the Hen Buffalo Party, the Brunch Party, the Plutocrats, the Aristocats, M.O.P., #TeamBreezy, the Baseball Furies, a group of hobos led by Brother Soupcon, and the Super Sweet Sixteen Party. It is currently registered as an Independent. Special powers Every study about the elephant is about its gentle artist’s soul and how emotionally supportive it is. The elephant went to therapy and learned to paint, so now it thinks it knows everything about relationships. Do not ask the elephant for advice. It might be pretty good, but it’s not worth the tone. The elephant has a trunk capable of taking in and spraying out water. It can also be used to grab things and play pranks on Kate Capshaw or anyone within one standard deviation of Kate Capshaw. The elephant has tusks, which are oversized incisor teeth, and don’t you feel less comfortable about them now? It can sleep standing up or lying down, so it’s got options. Maybe too many options. Weaknesses The elephant is susceptible to floppy trunk syndrome, one of the most adorably named forms of paralysis of all time. Number of legs Four Other ratings of the elephant “The elephant SAYS it’s working for regular pachyderms. But the TRUTH is it’s in the INCREDIBLY LARGE POCKET of BIG PEANUT.” – anti-elephant attack ad, paid for by a series of nested shell corporations “Loser loser, chicken dinner. The elephant is both ON the hook and ON the chain.” – Guy Fieri “Is the elephant good? Yes! But is it elite? Without a championship on its resume, I don’t think I can say it is.” – Jay Bilas “The female has a well-developed clitoris at up to 40 cm (16 in).” – Wikipedia What’s its astrological sign? Cappadonna. Military usage The elephant was used for wars because it was “nature’s tank, which is a comparison we will understand once the tank is invented.” What if it fought a bear? Well, have you ever heard a song called “War Bear?” Would you like to? Here’s my demo tape. But to answer the question at hand, elephant wins. Is it noble? Yes. Final rating The elephant may not have found a political identity that fits it yet, but there’s no need to put its stances in a box. What would you even do with the box once you had it? Commit an Operation Dumbo Drop? No one wants that. What we should want is to spend some time in the company of the sweet-natured elephant. The black house spider is one of three closely related species, the other two being the grey house spider, which also exists primarily in Australia and New Zealand, and the White House spider, which exists primarily in the District of Columbia. Special powers One does not live in Australia or New Zealand without developing serious toughness to survive the daily onslaught of deadly snakes and goblins. The black house spider has some venom. It’s not the strongest stuff, but how strong is your venom? Exactly. Glass houses, bro. It also has the standard spider ability of web building. Weaknesses The flip side of the black house spider’s web-making ability is that it has all the architectural understanding of that guy in your class who tried to make a tower out of single toothpicks stacked end-on-end, Kevin. Also like Kevin, it has never read a novel to completion. Number of legs Eight. This week in personal anecdotes of Wikipedians who are probably dead now “I’ve had a great opportunity to study a fine specimen (female, with spiderlings) in my bathroom window for 6 months now. I must confess to feeding her blowflies that foolishly enter the house. My boy and I think it’s better than T.V. to watch her hunt and kill. It was a very exciting event when the hatchling first emerged. They are growing fast – probably tripled in size in the first few weeks. I have observed both mother and children ‘drinking’ from the web when I have a shower and steam up the bathroom. They spread out on the web and glean the little droplets of dew condensating on the strands. All this time, I have never seen the spiderlings eat anything and yet they are growing well. There are fewer than when first hatched. Do they eat each other? They don’t seem interested in the flies I feed her. It’s a mystery to me. I wondered if anyone had any ideas?Shaun Gardner (talk) 23:19, 13 December 2010 (UTC)” What does Mark Trail think of it? What if it fought a bear? The White House spider could just order the bear arrested. The black house spider has no such recourse. Is it noble? Yes. Final rating It is man’s staunchest ally in the perpetual war against the insect world. Picture a jaguarundi. Now imagine something similar, but twice the size. What is this creature? It’s a mega-jaguarundi. But if you multiply the mega-jaguarundi by nearly five factors, now you have the cougar. Special powers The cougar is a big cat, so it does big cat stuff. I’m talking claws, speed, strength, agility. Its main power, however, is political. Each term, the vice president of the United States of America selects a cougar. Harry Truman’s cougar, Hairy S Puman. The vice president’s pet cougar is not, contrary to popular belief, mentioned at all in the Constitution. It’s merely a tradition started by John Adams, our first and – for now – last Federalist vice president. He wrote that “As the lion is the king of the African jungle, so the puma is the vice president of the American forest. I can think of no more fitting beast to have at my side.”[1] It’s all very similar to how presidential term limits of eight years were started unofficially by George Washington, our first and – for now – last cyborg president. This caused one angry Bostonian essayist to write that at that rate of change and the life expectancy of the time, “a man could live through THREE different prefidents! Fuch upheaval if unheard of. Fincerely, Fiffy Fpacek.[2]” Weaknesses Some of the cougar’s fancier powers were stolen by the loathsome thief Pumaman in a bid to become a superhero. This is the face of a bandit. Not living up to its full potential is not the cougar’s only weakness. There’s also its disastrous, scandal-tainted run as the mayor of Cougar Town. To this day the Cougar Town city council is distrustful of felines. Number of legs Four. Known aliases The cougar goes by many names. These include, among others: the puma the mountain lion the panther the ghost cat the catamount Catmandu Doc Giggles Maurice Countrykitty1138 What if it fought a bear? The bear has an immediate advantage in that it long ago got its powers back from Major Ursa the Human Bear.[3] Is it noble? Moderately. Final rating Look, I like big cats. The patriotic part of me likes that America has one. Still, I must be honest and unbiased. The cougar abandoned its child the jaguarundi, and it really set the Cougar Town economy back a few years. “Ghost cat” is kind of cool though. 6/10 [1]Adams also liked how silly it made Ben Franklin and his turkey look. My little cousin Randall needed to work on his writing and I needed to get a review of the agama written. Pictured here looking smug. So please enjoy what he turned in: Hi, my name is Randall. Today I’d like to talk to you about the agama. Urbandictionary.com defines “agama” as “Did you mean: param?” I tend to agree, enthusiastically. This essay will explain why and the reasons for why. The agama is a lizard that looks like this: It looks this way. I know about the agama in a direct personal experience from my own life, personally. Specifically what I mean by this is that my classmate LaTeisha[1] has an agama as a pet. This one time in class, LaTeisha told Mr. Foster “That’s what my dad said to my mom!” It was extremely hilarious. Alex’s mom said she shouldn’t have done a thing like such as that, but Mrs. Anderson laughed when we told her about it even though she pretended not to. Special powers The agama has very many cool colors, which is cool, for because it’s like the reptile version of human tattoos, which are the coolest thing you can put on a person’s skin. I’m gonna get one that’s a tribal symbol, because I’m like very in tune with nature as well as brotherhood. My dad won’t let me get one yet, though, so I got one on my iPod case, which is like an iPod’s skin. Weaknesses The agama is not a good-looking animal in terms of its attractiveness. It has a long tail, so it defiantly gets points for that. But like Beyonce is defiantly the most beautiful creature to ever walk this earth OR the moon’s, and she doesn’t have any tails at all. So I think this proves that a tail does not make an animal better looking. Also, it does not breathe fire, and that is some bullcrap – pardon my lingo. This is a cool picture I found. Number of legs Four. Wikipedia article status The agama article has been rated as “Low-importance.” Sick burn. What if it fought a bear? Okay, so like everybody thinks President Lincoln was just this Presidential person, but I saw in the documentary Ibrahim Lincoln the Vampire Slayer, directed by Stefan Spielberger, that he was also very much a vampire-hunter. It’s like, if Lincoln can sign the Exclamation Provocation when half the states are against it and a bunch more didn’t even know they were states yet like Colorado and Hawaii and Cuba, AND kill vampires, then I believe in my opinion that the agama can kill a bear, no offense. God bless America, and the United States in addition. Is it noble? Yes. Final rating Baby Got Back is a great song but it is also very much lyrics that are true in my life. In a conclusionary fashion, I would suggest that if Sir Mix-Em-All were writing it today, he would title it “Baby Got Agama,” which would actually be very much a better match for the anaconda. Last but not firstly, if I have calculated rightly I will be hitting my word count right about approximately now at this moment. Don’t check the margins. They’re fine. 8.5/10 [1]Who is white by the way. NOW who’s the racist simplestiltskin?[2] [2]I don’t know what Randall means by this. I think the last part is supposed to be “simpleton.” –Nathan The dog doesn’t make a lick of sense… Double Dare hosted by Marc Summers… we have to find Habib Marwan… tossed salad and scrambled eggs… “I’ll break your legs!”… Is it noble? WE NOW RETURN TO YOUR DOG REVIEW ALREADY IN PROGRESS… Is it noble? Yes. Breeds The dog is one of the most diverse of all animals. There are many, many breeds, and each of them is very distinct. Let me just run down some of the highlights. Saint Bernard: We begin with the Saint Bernard[1]. This dog specializes in rescuing mountain-climbers in the Alps and being an alcoholic. It’s rarely seen in public without a small flask of brandy around its neck. Notable Saint Bernards include Cujo the criminally insane and Ludwig van Beethoven, the composer. Whippet: This breed was so loved by Devo co-founder Mark Mothersbaugh that he penned a song about it, titled “Jocko Homo.” It is best known today for its refrain “Are we not men? / No, we are beautiful dogs.” Labradoodle: The labradoodle is a chimera. It pretends not to breathe fire, but it’s just an act to make humanity less uncomfortable with its existence. Irish wolfhound: If you see this huge breed in the wild, trace its steps back to the rainbow from which it originated and you will be granted a wish, as long as your wish falls within the category of “potatoes and potato-based products.” Golden receiver: The breed of Air Bud and all Air Buddies, this dog is gifted with incredible athletic prowess. A loophole in the U.S. constitution allowed it to serve as the 35thvice president from 1949 to 1953.[2] “Air” Force One was named in its honor. Boxer: It was just a nobody until it took a shot and challenged Apollo Creed. A true American hero. Doberman pinscher: This dog was developed by German scientists to be the ultimate “uberhund” or “super-dog,” so that no weaker dogs would dare challenge its iron-pawed rule. Miniature pinscher: This small dog was developed by little German scientists to be the ultimate little “kleinuberhund” or “wee super-dog,” so that no weaker dogs (tiny category) would dare challenge its itty-bitty iron-pawed rule. Newfoundland: A country. Chihuahua: The chihuahua must weigh in at six pounds or less to meet its breed standards. However, it also craves the delicious “Mexican” delights peddled by Taco Bell every Fourthmeal, like clockwork. Like the work of a fat, Dorito-dust-covered clock. This inherent dichotomy leads to widespread bulimia among the chihuahua’s ranks. Bloodhound: Taking the dog’s special power of keen sense of smell to new heights, the bloodhound can track the vaguest hint of a trail for miles. It also possesses deeper, subtler reserves of hate than any of its canine brothers. Kromfohrländer: The canine harbinger of Ragnarök, the events which will kill the gods and drown the world in water. Redbone coonhound: The greatest bluesmusician of all breeds, Redbone tragically died of a heroin overdose just four years and seventeen albums into its career. Great Dane: The Great Dane is a massive beast of a dog. It counts among its number Marmaduke, who is literally a beast – of Hell; Astro and Scooby-Doo, the most eloquent of all dogs (not that that’s saying much); and Claire Danes, who – haunted by the ghost of her father the king – murdered Claudius. Lesser Dane: Like the Great Dane, but less so. Sucky Dane: A real bummer of a dog. A total schlemiel. Notable Sucky Danes include Marmaserf and Scooby-Poo. Bull terrier: Though it was originally designed by H. R. Giger not to have any eyes at all, they were added to the bull terrier’s face when initial test screenings yielded questionnaires which frequently used the words “nightmare” and “hellborn.” Lassie dog: The kind of dog Lassie is. German Shepherd: The policeman of the dog world, and the police dog of man’s world. The German shepherd takes extremely well to advanced training in order to arrest suspects, search for drugs, defuse bombs, and test for semen at the crime scene. The only catch is that to instruct it, a trainer must learn a perhaps uncomfortable number of phrases from Mein Kampf. Austrian Stockbroker: Kind of like the German shepherd, but less good with sheep and criminals and better with numbers. Arnold Schwarzenegger has owned three Austrian stockbrokers, each stronger than the last. Papillon: Steve McQueen’s brain was cloned into a butterfly, and mankind mistook it for a dog. Bulldog: Completely separate from both the bull terrier, unrelated to the bull, and even distinct from the fidominotaur[3], the bulldog is just a stocky, wrinkly straight-up canine with a wicked underbite and a wickeder distrust of dental surgery. It snores. Caucasian shepherd dog: A racist. Pharaoh hound: The pharaoh hound can be recognized by the tattered ancient bandages trailing from it, its glowing yellow eyes, and the cortege of scarabs attending to it. Petting it is the Number 3 way of getting cursed in the world today.[4] Dalmatian: Most firefighters won’t admit this if you ask them, but the dalmatian is the only one who knows how to drive the fire engine. Many departments keep an extra one on hand just to ride in the back so people won’t think to look for the one in the driver’s seat. But it’s there. Weiner dog: The best dog of all, according to God’s message left on the golden plates found by Joseph Smith. Which, I mean, believe what you want, but come on. Better than the corgi? Look at this mother f***er. Final rating Even with the extended length afforded me by this two-part extravaganza, I still haven’t had space to cover all the many facets of the dog. With this much diversity, there’s something for every one. It is truly a great animal, albeit kind of a clingy one. The Fourth of July, you say! Then I haven’t missed it! The spirits did it all in just one night! They can do whatever they like. Of course they can. Of course they can! And hello to you, dear blog readers, on this fine Fourth of July! Bless you for reading. Fifty times, bless you! And what could I rate on this glorious day but the bald eagle. Apologies to my Canadian readers, as Canadian 4th of July is celebrated in May. Special powers Perhaps, if you are a particularly international or ignorant reader, you wonder why the bald eagle is so appropriate for this holiday. The answer is that the bald eagle is a national symbol of the United States of America, and as such is imbued by the Constitution with a great many executive powers. It is in the top two most powerful birds in America, along with the secretary bird. The bald eagle has incredible vision, hence the popular phrase and cinematic Avenger “Eagle Eye.” “Eagle Eye, assemble!” – Eagle Eye’s famous catchphrase Weaknesses This eagle is bald. In an effort to hide this fact, it has glued feathers to its head. The bald eagle was so desperate that it didn’t even stop to check if the colors matched. Though to be fair, it doesn’t own a mirror, so it would have had to go all the way to somebody else’s place to be sure. Number of legs Two. Diet The bald eagle eats all sorts of fish and small mammals and reptiles, and occasionally even smaller birds or popsicles, even if you lick it first. The bald eagle doesn’t care. Is it a victim of ethnic cleansing? Not entirely intentionally. For several decades, humans just murdered the heck out of the bald eagle whenever they got a chance, due to a rumor that one of the corpses would contain front-row Skynyrd tickets. The rumor was false – spread, some say, by the California condor to take some heat off itself for the rumor that it was a living piñata ready to burst with candy at the first hint of a bullet.* Finally, hunting was curbed by the United States Congress enacting the Come On, Guys Act, which stated that come on, guys, there’s no tickets inside the bald eagle; stop shooting it already. All those eagles did not die entirely in vain, however. Their essences were captured and transformed into the airbrushed denim jackets we so cherish today. The eagle’s greatest regret is that it can never know the freedom of movement enjoyed by motorcycle riders. Wikipedia’s Talk Page Asks “Please give me a Bald Eagle quote for a school speech. Thank you David” – David, presumably Professions Beyond its duties within the U.S. government (e.g. presiding over the Senate, deciding ties in boxing matches, doing flyovers of BCS games, filling in should the sitting Miss America be unable to execute the duties of her office, etc.), the bald eagle has done a number of other jobs. For example, the bald eagle carries the prayers of many Plains Indian tribes. It serves as press secretary for the Kwakwaka’wakw people. It briefly toured with Waka Flocka Flame. It buys particular brands of cigarettes so the other people in the store will want to follow suit. My international readers may not be aware there are four main branches of the United States government: legislative, executive, judicial, and shadow. Pictured: The judicial branch. The secretary bird is a key member of the fourth. Special powers The secretary bird does not possess many special powers in and of itself. Sure there’s the flight, the beak, the talons. But its greatest powers are vested in it by the authority of the United States government. These include diplomatic immunity, power over CIA, FBI, FDA, AARP and UCLA, a tunnel to Cuba, and a TV capable of airing PBS-Omega, the secret sub-channel within PBS, among other abilities which I wanted to tell you but was censored by [REDACTED]. Weaknesses Despite its wings, the secretary bird stays primarily on the ground. It claims it’s a simple preference, but rumors indicate it’s because it’s scared of clouds.* Pictured: A bird not flying Number of legs Two. Role in the shadow government The secretary bird reports directly to the shadow president, the highest rank in the branch, which performs numerous less public tasks than its executive counterpart.** The secretary bird’s position is roughly parallel to the entirety of the Cabinet wrapped up in one feathered individual. It is the shadow president’s closest advisor and confidante. Over the years, it has accumulated secrets from numerous high-level officials, which it always keeps until the government officials in question are long dead. Even then, the secretary bird has only revealed these factoids to Illuminati Beat, the inner circle’s self-published ‘zine. Lucky for you, I got a hold of the first quarter 2012 issue. Here’s a few choice tidbits I managed to read before Ms. Winfrey snatched it back: Jimmy Carter preferred to be called by the nickname POTUS Spunkmeyer. This informed his rap name Young Spunky P. General Patton bathed in motor oil every eight months or 5,000 miles. The cigarette-smoking man ate a whole tray of ashes once, just for the YouTube views. Everyone assumed that shadow president Jorge Washingtron had real steel teeth, but they were just cleverly painted wooden ones. Frank Sinatra mainly joined the Adjustment Bureau because he was deeply ashamed of his head tattoo of a map of Pangaea and wanted to wear the hat. Bizarre Wikipedia Quote “Africans sometimes call it the Devil’s Horse. As such it has often not been molested, although this is changing as traditional observances have declined.[7]” What if it fought a bear? The Extra-Secret Service is there to make sure the secretary bird never has to worry about this. Is it noble? No. Final rating I don’t agree with the actions of many shadow administrations – [REDACTED] and [REDACTED]: A Tail of Two Kitties, to name two – but the secretary bird has done its job (and stomped its mouse prey) so efficiently throughout the years, I have to grudgingly give it my respect. So, I’m going to finally go with… [REDACTED]/10 *The secretary bird once posted, then hastily deleted a tweet declaring cumulonimbus “tyrant of the monster-sky.” **Dick Cheney was the only shadow president to hold the office of vice president at the same time. In something of an existential crisis, he voluntarily vacated his records from both positions upon realizing that he was a replicant with all the memories of the original Cheney. On this Thanksgiving, I want to spotlight the delightful animal at the center of the holiday: The yam. This bad boy’s getting at least an 8.5. This bad boy’s getting at least an 8.5. … … Thanksgiving fools! Everyone knows the yam is a sucky animal. It maxes out at a 2. The true subject of today’s post is the turkey. Will it surpass 2? Let’s find out. Special powers The turkey is, first and foremost, delicious. I guess that’s not really a power, but it is a fact. Weaknesses The turkey’s wattle is a big exposed hunk of flesh that may as well have “Hit Me” written on it – and on several occasions, has. In combat situations, its only move is to flap its wings frantically, which doesn’t stop attackers so much as decorate them with shiny feathers. Number of legs Two. The turkey in U.S. government Many know that Benjamin Franklin, electrical wizard, was the turkey’s greatest supporter in the debate over what animal would become America’s national emblem. What they may not know is that John Adams had to recuse himself from the discussion on account of being the turkey’s cousin. The turkey learned its lesson from its failed campaign to represent the nation, however. Nowadays, its lobbying powers in Washington have expanded tremendously. The President even holds an annual press conference just to reaffirm that the turkey is worth keeping alive. It should also be noted that the turkey was briefly mayor of Peoria, Illinois. What if it fought a bear? The bear would look very festive afterward (see Weaknesses). Is it noble? Yes. Final rating The turkey has a very mixed reputation. A turkey is a bowler term for something good, but it’s also a person term for something bad. Look at those guys. It’s hard to disagree. Everyone gets excited about it twice a year (Thanksgiving and whenever it’s the footlong-of-the-month), but the rest of the year the turkey is a punchline. You may suspect the date to influence my decision, then. You would be wrong, sir/ma’am/decline to specify. I am not a slave to “Gregor” and his “calendar.” I am my own man. And the turkey is its own bird. But it’s not a great bird to be.
/* * Copyright 2015-2020 Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with * the License. A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions * and limitations under the License. */ package com.amazonaws.services.ec2.model; import javax.annotation.Generated; /** * */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public enum ListingState { Available("available"), Sold("sold"), Cancelled("cancelled"), Pending("pending"); private String value; private ListingState(String value) { this.value = value; } @Override public String toString() { return this.value; } /** * Use this in place of valueOf. * * @param value * real value * @return ListingState corresponding to the value * * @throws IllegalArgumentException * If the specified value does not map to one of the known values in this enum. */ public static ListingState fromValue(String value) { if (value == null || "".equals(value)) { throw new IllegalArgumentException("Value cannot be null or empty!"); } for (ListingState enumEntry : ListingState.values()) { if (enumEntry.toString().equals(value)) { return enumEntry; } } throw new IllegalArgumentException("Cannot create enum from " + value + " value!"); } }
import { observer } from 'mobx-react'; import * as React from 'react'; import { AppState } from '../state'; import { AddThemeDialog } from './dialog-add-theme'; import { AddVersionDialog } from './dialog-add-version'; import { BisectDialog } from './dialog-bisect'; import { GenericDialog } from './dialog-generic'; import { TokenDialog } from './dialog-token'; import { Settings } from './settings'; export interface DialogsProps { appState: AppState; } /** * Dialogs (like the GitHub PAT input). * * @class Dialogs * @extends {React.Component<DialogsProps, {}>} */ @observer export class Dialogs extends React.Component<DialogsProps> { public render() { const { appState } = this.props; const { isTokenDialogShowing, isSettingsShowing, isAddVersionDialogShowing, isThemeDialogShowing, isBisectDialogShowing, isGenericDialogShowing, } = appState; const maybeToken = isTokenDialogShowing ? ( <TokenDialog key="dialogs" appState={appState} /> ) : null; const maybeSettings = isSettingsShowing ? ( <Settings key="settings" appState={appState} /> ) : null; const maybeAddLocalVersion = isAddVersionDialogShowing ? ( <AddVersionDialog key="add-version-dialog" appState={appState} /> ) : null; const maybeMonaco = isThemeDialogShowing ? ( <AddThemeDialog appState={appState} /> ) : null; const maybeBisect = isBisectDialogShowing ? ( <BisectDialog key="bisect-dialog" appState={appState} /> ) : null; const genericDialog = isGenericDialogShowing ? ( <GenericDialog appState={appState} /> ) : null; return ( <div key="dialogs" className="dialogs"> {maybeToken} {maybeSettings} {maybeAddLocalVersion} {maybeMonaco} {maybeBisect} {genericDialog} </div> ); } }
1. Field of the Invention The disclosure relates generally to sealing systems for use with panels, such as a door or a window, within a frame and, more specifically, to an active sealing system for providing an improved seal between a panel and frame. 2. Description of the Related Art Certain types of panels, such as doors and windows, are positioned within openings of a wall and/or other structures using a frame. These panels may also open and close by pivoting relative to the frame. Alternatively, the one or more panel may slide relative to the frame. An issue associated with these types of panels is the integrity of the seals between the panels and the frame. In many instances, these seals are an insufficient barrier in preventing the transfer of such environmental elements as noise, weather, water, and insects from one side of the panel to the other side of the panel. Attempts have been made to address these issues by using various types of weather stripping between the panels and frame. For example, the weather stripping may be strip of felt, foam, or a pile of flexible synthetic material. In many instances, however, this weather stripping fails to act as a sufficient seal between the panels and frame. Another issue prevalent associated with the seals between a frame and panel or between adjacent panels is that these seals can become disjoined. Either intentionally or unintentionally, the alignment between the frame and panel or between adjacent panels may be disturbed which can degrade the quality of the seal, since, in many instances, the integrity of the seal relies upon these members having certain positional relationships relative to one another. Another issue associated with the movement of one or more panels relative to the frame is structural integrity and/or security of the panels relative to the frame. While in certain circumstances, allowing the panel to move relative to the frame is desirable, in other circumstances, not allowing the panel to move relative to the frame is desirable for the purpose of preventing undesired access through the panel. Means for providing these separate functionalities, however, can be incompatible with one another, and the means employed to provide both functions often involve tradeoffs that reduce the effectiveness of both functions. There is, therefore, also a need for a sealing system that effectively allows both a panel to move relative to the frame and also to selectively prevent movement of the panel relative to the frame. There is also a need for a sealing system that can be employed between a frame and panel that prevents the transfer from one side of the panel to the other side of the panel such environmental effects as noise, weather, water, heat/cold, and insects.
8 Reasons to Visit Chiang Mai Looking for reasons to visit Chiang Mai? You’ve come to the right place. When readers and friends ask for my thoughts on Thailand, my response is unwaveringly consistent. Between the country’s two largest cities, I’ll take Chiang Mai over Bangkok time and time again. It’s where I visited in 2008 and returned in 2015 for three months. I did eventually experience Thailand fatigue, but I have a special place in my heart for this northern Thai city. Here’s why: 1. It’s a Walkable City Bangkok, a sprawling urban jungle, is home to a population of over 8 million. In contrast, less than 1 million people live in Chiang Mai, making it a more laid-back city without the chaos and smog of Bangkok traffic. After the frenetic pace of Bangkok, many tourists welcome the quieter, relaxed vibe of Chiang Mai. Encounter vibrant scenes like this during special events like the Songkran Festival in April. Girls wait before their performance during the Songkran Festival. It’s also easy to navigate, with the historic Old City surrounded by a moat and the New City outside of it. Days and nights can be spent meandering through the streets with occasional stops at outdoor food stalls or in casual cafes and bars along the Ping River. For a complete sensory experience, hit up one of the outdoor markets, especially the Sunday Market (Night Bazaar) in the Old City where everything from trinkets and clothing can be haggled down to bargain prices. After the shopping, fill up on some of the best street food in the world as you take in the sights and sounds of Chiang Mai by night. 2. Historical and Cultural Treasures Abound Bangkok has worthy points of interest but it’s in Chiang Mai where you’ll find the more traditional, culturally rich Thailand. The city has undergone rapid urban development with the building of condos and shopping malls but it hasn’t abandoned its Thai roots. Modern structures and fast food restaurants stand alongside well-preserved, meticulously carved teak houses and ancient sites dating back over 700 years in a city that was once the centre of the Lanna Kingdom that ruled northern Thailand. The modern Maya mall in Nimmanhaemin outside of the Old City. Chiang Mai is also more socially conservative, which means less sex tourism and more cooking schools and art galleries. 3. Temples Everywhere With over 300 temples (wats) dotted throughout the city and in the surrounding areas, Chiang Mai has remained true to its Buddhist past. Temple-hopping is a cinch in a city that’s so walkable, it takes only 20 minutes to drive from one side of the city to the other. These religious complexes were exquisitely designed in a variety of architectural styles that reflect the various kingdoms that dominated the region throughout the centuries, notably the Lanna and Burmese kingdoms. Ornate and commonly adorned with golden stupas and serpent staircases, the Buddhist temples are smaller and older than those in Bangkok. Wat Meun Ngun Krong. A temple in Chiang Mai is a place of spiritual worship, monastery for young Buddhist novices, as well as a community, cultural and study centre. Bare-footed, saffron-robed monks can be seen inside or outside quietly tending to the gardens and conversing with foreigners. Wat Meun Ngun Krong. In fact, you’ll likely come across “Monk Chat” signs or posters, an invitation to gain insights into monastic life and the principles of Buddhism. Between lessons on the Four Noble Truths and the Eight Fold Path, you can even share stories about your home country or the latest scores of your favourite soccer team. It’s an informal setting and the monks are eager to interact with visitors. These cross-cultural exchanges are welcome and valuable opportunities for them to practise their English-speaking skills. If you want to visit only a handful of temples, Wat Phra Singh, Wat Chedi Luang and Wat Chiang Man are among the most significant and located closely together in the Old City. Wat Phra Singh. The golden Buddha at Wat Phra Singh. Wat Chedi Luang. Wat Chedi Luang. Arguably the most sacred temple in Chiang Mai is Doi Suthep, located on a mountain 30 minutes outside the Old City — a lavish, legendary temple with impressive views of the city. If you’d rather not climb the 306 steps to reach the top, hop in the cable car. 4. The Price is Right Thailand is known the world over for its low cost of living but did you know Chiang Mai is more affordable than Bangkok? Whether it’s for meals, accommodations or Thai massages (you need to experience this centuries-old tradition at least once during your visit), your dollar will go further in Chiang Mai. Oh, and if you need low-cost but high-quality dental work, you’ll find it here. Why not treat your health as well as your wanderlust at the same time? Read this post for a breakdown of prices in Chiang Mai from local transportation to my dental crown. 5. (Mostly) Comfortable Climate I love clear skies and the warmth of the sun but I’m a wimp when it comes to extreme heat and humidity (I’m Canadian, okay?). If you share the same aversion, know that Chiang Mai sits at a higher altitude than Bangkok, giving it cooler temperatures and less humidity. Make no mistake though: it’s still sweltering during the Thai summer. Locals cool off during the Songkran festival and largest waterfight in the world. This event takes place every April, the peak summer season. Tip: avoid visiting Chiang Mai in April, the hottest and most humid month of the year (unless, of course, you prefer that kind of climate). You may also want to skip the July-September monsoon season. 6. Friendly and Safe As a hotbed for expats, Chiang Mai is exceptionally foreigner-friendly and generally safe for female solo travellers. Never did I feel threatened even when I walked the streets alone at night. Statistics support my experience: this is a chill city low in violent crime. There are, however, some risks to be aware of such as pickpockets in crowded, tourist areas, as well as gem and tuk tuk scams. Most of all, beware of traffic and when riding motorbikes. Chiang Mai’s streets are nowhere near as dangerous as those of Bangkok but it still sees its fair share of traffic accidents and they typically involve two-wheeled vehicles. You’ll also want to stay on the right side of Thai law: Do not insult the Thai royal family (punishable by incarceration). Otherwise, you may suffer the same fate as this man’s. After publishing Facebook posts critical of the monarchy, he was sentenced to 35 years in prison. Do not, for the love of life, traffic narcotics, even marijuana. This is punishable by death. Avoid political demonstrations. Since 2014, Thailand has been ruled by a military junta but you’d hardly know it during your visit. You’ll rarely see a military presence, if at all, unless you find yourself caught up in a protest (in which case, get the hell out). Keep the above tips in mind and you should experience few troubles, if any. 7. The Food From local street food to upscale fare, the culinary offerings are without a doubt one of the most significant reasons to visit Chiang Mai. I ordered Thai roti on the regular from a food stall or cafe near my home. A thin parcelled crepe filled with bananas, egg and an optional topping of nutella or drizzled chocolate or condensed milk, this was one of my favourite sweet indulgences. Love coffee? You’ll never be far from a cafe serving Americanos and cappuccinos that are just as good as the ones at home. But Chiang Mai’s culinary star is northern Thailand’s most celebrated dish: khao soi. Soft egg noodles are served with a chicken drumstick in a rich, creamy coconut curry broth, topped with more noodles deep-fried to a crunch. Khao soi. For a bit of zest, diced red onions, pickled cabbage and sliced lime are served as an accompaniment. Chiang Rai is where I discovered the perfect bowl of khao soi but I passionately slurped countless, mouthwatering bowls of it in Chiang Mai too. Of course, you may want to take all the culinary secrets home to recreate your favourite Thai meals, and the many cooking schools throughout the Old City of Chiang Mai are there to teach you how. Often including a trip to the market, these cooking classes can last a half or full day. 8. Ideal Base for Day or Weekend Trips There is one downside to Chiang Mai. While Bangkok in the south is a major hub for both domestic and international flights, Chiang Mai in the north is less convenient when it comes to reaching Thailand’s famous beaches. But the areas surrounding the city make up for what it lacks. Pai, a tranquil, hippie town and magnet for artists, is surrounded by gorgeous landscapes and only 3 hours northwest. Chiang Rai, a small, sleepy city and home to the famous White Temple, is 3 hours northeast. The famous White Temple in Chiang Rai. Adrenaline junkies can also get their thrills on hiking, ziplining and white water rafting excursions. All these trips can be booked at one of the many travel agencies in the Old City but before handing over your tourist dollars, I strongly advise doing your research. Hill tribe treks, particularly those involving the Karen “long neck” tribes, are controversial. I joined one many years ago when I was unaware that the Karen tribes are Burmese refugees who are not recognized as citizens by the Thai government. They’re denied education and healthcare, geographically confined and often exploited for the tourism economy. I suggest reading this article for suggestions on how to select a responsible hill tribe tour. Animal tourism is no better. It’s a booming business but also ethically ambiguous in a country where animal cruelty is prevalent but well-hidden. Be wary of zoos, tiger attractions and elephant treks or “sanctuaries”. This Newsweek article highlights recent scandals involving the Tiger Temple, and my post about rampant elephant abuse in Thailand explains why you should think twice before riding elephants. It’s not all doom and gloom though. One animal attraction called Elephant Nature Park was in fact my top reason for visiting Chiang Mai a second time. Located 90 minutes from the city, this elephant rescue and rehabilitation centre is widely recognized as one of Thailand’s most ethical elephant sanctuaries.Although visitors are not permitted to ride the animals, they can feed and bathe the giant pachyderms that roam the park in near freedom. Elephant Nature Park was one of my most memorable experiences in Thailand. You can read about it here. I have my reasons to visit Chiang Mai. What are yours? Pin This Post to Pinterest Plan on visiting Chiang Mai? Search for hotels here. Disclosure: This is an affiliate link that allows me to earn a modest commission from Booking.com if you click on it and make a hotel reservation (at no cost to you). Thank you for your support! Comments Great 8 reasons. This 8 reasons really inspire any one to go there. I am a professional traveler. I read all reasons really I swear I am also interested to go there. I have a question in my mind about this place. I want to go there but how many problems I face there. Can you tell me? That is very important for me. I am waiting for your reply.
Saturday, September 15, 2007 Yippie yi ohhhhh, yippie yi yaaaaay My name's Aapo and I'm a Jyp fan. You can also call me Aapo, and, I tell you, not everybody can. The two "A" letters are pronounced as if they were one vowel and half in English, after them comes a "P" as in lavatories or in Finnish streets at weekends, and the last "O" to stretch your mouth and eyes wide open shares the same phonetics with her sisters within Olokkosen Grilli's Olokkonen. Hence I am not Apoo, Habo or Apu, thank you very much. My team is normally referred to as JYP, but by casually dropping the extra capitals and referring to it as Jyp - or Jyppi, if communicating in my mother tongue - I'm making a statement that I've followed the team for long enough to distinguish myself from other hockey wonks and to drop those extra capitals, casually and just like Seppo Mäkelä used to drop face-off pucks. Living in London (and thus being the only one of us without a national level hockey team in his city) I bring some expatriative equilibrium into this blog's contributorship. I was born in Suolahti, a small town relatively close to Jyväskylä, which is usually known for its contributions to Finnish metal, be it either the musical or the industrial side of it. Here you can see the Machine Men vocalist Antony with two of his fans - one being a three-time Selke Trophy winner, another the only man ever traded for Mike Ribeiro - whereas here you can watch Jyp players and their new coach, Risto Dufva, having a tour in our world-famous tractor factory. "Managing a hockey team is like managing a modern tractor assembly line", as they say. Suolahti boasts a hockey team of its own, too; 99 year young Urho play, to my knowledge, in the fourth tier. To a contemporary observer the best known player in Urho's history is probably Juha Junno, the CEO of Kärpät. Which by no means necessitates that I'd like Kärpät. When Jyp last time was having a satisfactory season, 2002-03, it was indeed Kärpät who emerged 02-03 victorious from our quarter-final series, and, as it happens, I have decided not to like any club who have beaten Jyp in quarter-finals, semi-finals or finals proper. Such clubs are many, and I may later elaborate my feelings towards every single of them - anatomising, for instance, that catharhic sensation I experienced in the evening of last Independence Day, when I and my task force witnessed Jyp snatching an overtime victory in Bagel's Hill, Kerho's atmospheric home lair - but later, indeed, means not now. Though let me state that I've recently felt rather neutral about all three from Helsinki. Maybe it's because against HIFK and Jokerit we've typically played (relatively) well, and that sausage team from their suburbia anyway never wins anything so, apart from unavoidable mischief, I haven't cared much for them. Until two seasons ago, when they won an eighth-final series (yes, we do have also those in SM-Liiga) against Jyp. That said, Jokerit, for their part, have actually beaten us in the real, ultimate finals, yet that happened with Selänne and Janecky in 1992, and the years have allowed my grudge to turn milder. Well, there's one eighth-final defeat after that, but you get my point; in hockey it takes approx fifteen seasons for the sins of your fathers to be forgiven. For the same reason I incite no hatred of massive scale against TPS, either, that another team ever to deny the Canada Bowl from Jyp, back in 1989. And Tepsi's recent fall from grace has been so striking that if you're to come across as a mature sport following individual you just pity them. They will be absolute crap this season. Jyp did okay in Kuopio on Thursday. Kalpa went down 3-1 and, more importantly, the comeback kids Immonen and Virtanen scored one each, with Tommi Hannus shooting the last one. All of them are expected to be industrious in offense, so it was nice from them to uncork their bottles before the party gets sweatier. Dwight Helminen, the older one of our Yankee brothers, having recovered from a broken jaw, is expected to debut on Saturday, meaning that pretty much for the first time since the days of Dolezal et al Jyp are experiencing an over-supply of decent forwards - which, at the end of the day, is hoped to more than match the shortage of solid defensemen. We'll see about that; I'm personally putting my faith in the younger Helminen and Mäntymaa from Tappara proving key players, and some of the old defense guard to improve from the last season. If that happens, and if the Egyptian remains the usual safe pair of hands, succumbing to no injuries, we stand a chance to make it into the top four. That ought to secure that the financial risk of this season - doubling the player budget - would pay off too. It'll be the first home match of the season and it'll be against Tappara, the team I probably hate most. This antagonism dates back to the turn of the millennium when Tappara started to exploit Jyp's plight and seduce our best players to the brighter lights of Hakametsä. Almost always it proved a wise career move for the lads, yet I've never been a man great enough to admit it, and then there was of course the eighth-finals in March 2005 when Jarkko Immonen and our fantastic Blue Jackets lockout duo, Westcott & Shelley, were meant to take us beyond the annual ice ceiling of the eighth-finals, and who knows how afar. Tappara were a piece of mustamakkara in the first game, but during its second intermission Westcott allegedly punched or headbutted Tappara's Pasi Puistola in the face and got a game misconduct with a two matches ban. Puistola was of course an innocent passer-by on the way to his intermission bottle of Smurf lemonade, so to him Reijo "Pim-Pom-Ding-Dong" Ringbom gave only sympathy. The second game in Hakametsä witnessed Jody Shelley giving a proper, rough but clean check to Robert "Cantor" Kantor but, as he was the physically bigger counterpart and those couple of crimson drops from Robert "Cantor" Kantor's nose were enough to convince the ref - someone else than Reijo "Pim-Pom-Ding-Dong" Ringbom - of Shelley's intrinsic brutality, the SM-Liiga policy on the encounters between bigger and smaller players and the drops of blood dictated that he was sent to an early shower. Tappara scored the only goal of the match during the five minute power play that was to follow, and the decisive third game I watched in Grand Star Cafe on Hämeenkatu, a sport bar full of Tappara-jerseyed locals. A Tappara woman next to me and my Chilliwackian (that's where the music video of Summer of '69 was filmed, cowboy) mate was spitting the floor, insulting Jyp players and swearing like women not from Tampere certainly don't swear. Then we lost. So, my name's Aapo and I'm a Jyp fan. I'll be following my team via SM-Liiga's impressively sluggish website and posting my varyingly random thoughts once in a while. When I say "not now", it does or does not mean "later". The readers who have made it this far get an Easter egg for their effort: the highlights of a pre-season match between JyP HT and Tappara, played in Mänttä, on 7th of September, 1993. The story behind the apostrophe (sometimes interpreted as a stick hooking the opponent player; one hooking gives you a penalty, ten hookings drain the spirit from the game) is closely related to the bizarreness of the old crest. It was perceived as commercially dysfunctional, and the rest of the story is narrated by an advertisement agency. It's supposed to picture a hurricane, but looks a mere tornado to me. I like it, though. It's simple enough and materialises as black and red home jerseys, which are the colours of the region. A pity that I can't trace the old logo anywhere in the net. If someone can help with that, then please do. I guess you have different kinds of hurricanes in Finland, the ones we have in North America are circular (like the one on Carolina's sweater). But I have to admit that the colours do work very well. And I realise that I failed to answer the implicit question in your sub-title. To the extent I was ever aware of how the phrase was spelled, it was always along the lines "Yippie-Aye-Oh, Yippie-Aye-Ay". Even allowing for some distortion occasioned by the distance between the wide open spaces of the West and the sidewalks of New York, what that lyrics site came up with is about as far from canonic as you can get. If you are an avid fitness walker or have been looking for [B][URL=http://www.mbtplus.com/]mbt shoes best prices[/URL][/B] different weight loss methods, than I am sure you have heard of MBT shoes. Also known [B]mbt sandals[/B] as the anti-shoe, it is a range of footwear that helps improve posture, work [U]footwear etc[/U] a lot of different muscle groups, and aids in burning more calories. But the biggest stumbling block [B]mbt discount shoes[/B] for most people when deciding to buy these shoes has [U][B]footwear etc[/U][/B] been its price tag of $255. Until recently, only the [U][B]mbt sneakers[/U][/B] affluent and wealthy could afford these sneakers. Now days though, you [U]MBT shoes[/U] can get the same quality styles for more than 40% of what people paid for [U]MBT[/U] them just a year ago. Buying MBT shoes on clearance is a great way [U][B]mbt shoes clearance[/U][/B] to save a bunch of money. Just because they are sold at [B]discount mbt shoes[/B] a discount does not mean it is an imitation or a damaged style. Most of the [U]buy mbt shoes[/U] models available at clearance prices are [B]mbt sandals[/B] just discontinued types that retailers have an abundance of, and are reasonably priced. Receiving the anti-shoe at discounted prices is not something that takes very [B]mbt shoes sale[/B] long. However, one must implement some simple steps that will help you pinpoint your [B]mbt walking shoes[/B] selections. One thing you should do first and foremost is [U][B]MBT shoes[/U][/B] to know your foot size. Go to any retailer and they will properly measure your width and length for [U]mbt shoes clearance[/U] you or just use the chart yourself. After you know your size, start looking on [U][B]mbt walking shoes[/U][/B] line for some of the best places to buy MBT shoes on the Internet. On the first [B][URL=http://www.mbtplus.com/]MBT[/URL][/B] couple pages of Google, you'll find the best on line retailers that sell the anti-shoe, but try adding the words [B]mbt shoes review[/B] clearance, discount, on sale to your normal search of "MBT shoes." Retailers know that [U]mbt sneakers[/U] they have to do what they can to stay in business during this economic meltdown. Some [U][B]mbt shoes clearance[/U][/B] people may shy away from MBT shoes clearance items, but most [B]mbt shoes review[/B] will find these styles more than satisfying to meet their [B]mbt discount shoes[/B] fitness requirements as well as saving a substantial amount of money. [b][url=http://www.uggsclearancebusiness.com/]www.uggsclearancebusiness.com[/url][/b] Your favourite Cartier replica watches below! The special style and design and high quality on the Cartier Reproduction watches has attracted many of its suporters globally. The entire watches are crafted to satisfy the exact specifications on the unique styles, we not only guarantee the reproduction watches search such as the originals but in addition which the bodyweight and dimensions are calculated for being as appropriate as possible. The most effective point about our designer impressed watches is always that they expenses a fraction of the cost when compared to their unique counterparts. [b][url=http://www.onlinesaleswebsite.com/]www.onlinesaleswebsite.com[/url][/b] We ve all experienced an knowledge of interacting with a person exactly where you can find an instantaneous sense of liking each other. It's easier to like another person if you have rapport, but liking somebody is just not precisely the same point as rapport. In fact you'll be able to create rapport with someone you don t like. [b][url=http://www.louisvuittonoutletmart.co.uk/]www.louisvuittonoutletmart.co.uk[/url][/b] Third, while King employed very simple, obvious language just about every superlative speaker does shaped catchy, attention-riveting term contrasts and mixtures. We obtain the photo when he refers to lonely island of poverty while in the midst of a large ocean of content prosperity. Drawing on his clergy qualifications, frequently he reported satisfaction would only appear when rolls down like waters and righteousness like a mighty stream. [b][url=http://www.onlinesaleswebsite.com/]www.onlinesaleswebsite.com[/url][/b] "Max Electronics just went intercontinental!"6. Get started the clock: "Buyers who act in advance of midnight Tuesday will help save an additional $50!"7. Give the reader one thing cost-free: "Free whatsit for your initial a hundred readers!"Mistake No. In this fast-changing society, an astounding number of manufacturers is usually found with this big market. Having a historical past of over 150 years, Louis Vuitton has all along been essentially the most fantastic and eye-catching a single. No woman could resist the temptation of the item which has a LV tag or LV styles. [b][url=http://www.uggsclearancebusiness.com/]uggs[/url][/b] Dolce and Gabbana is actually a brand name identify that demands no release. Luxurious and style are synonymous using this emblem and Men's Louis Vuitton Strip their most recent #flick# offering for your personal winter period collection echoes quantities about each features. This significant tote purse is often rear for 2011 many ladies adored them in before moments and so they preferred them back again for that motive that preserve such a large range of merchandise inside. [b][url=http://www.louisvuittonsalemarket.com/]louis vuitton sale[/url][/b] Devote destination for just a achieve the following massive wrestle perfectly really worth land, applying this method is simply not really greatest. It must 100 % capitalize on with every one of the lessened wrestle locations. about the advantages associated with purchasing through these local outlet merchants can be the actuality which you decide to usually see and also influence the particular Alternative Burberry Purses over and above within your case commit. [b][url=http://www.uggsclearancebusiness.com/]uggs boots clearance[/url][/b] Size of Protection: One more crucial question to ask you is "how very long will I want the protection?" There's Ohio short-term and long-term insurance coverage out there. Should you be searching for a plan to include you for six months or significantly less, when you are involving careers for instance, then a short-term insurance policy may be your ticket. However, if wellness insurance plan in Ohio just isn't presented by means of your function, you may have fun with the security and further advantages of a long-term insurance coverage system.. [b][url=http://www.uggsclearancebusiness.com/]uggs[/url][/b] Maintenance incorporates a ton to offer from the sense that you won't ever must undergo the harrowing knowledge of losing the cash you expended on getting the bag. Don't forget which the bag must have set you back a little something tangible. If your bag will not be nicely preserved, you can expect to drop that money and you may also have to go in quest of funds to interchange the harmed Gucci bag. [b][url=http://www.louisvuittonsalemarket.com/]www.louisvuittonsalemarket.com[/url][/b] At the time the antifreeze recycling devices chemical procedure continues to be concluded, the coolant will need to operate via a filtering program to take out the particles of additives which the coagulant has just established. The Viper 3400 Antifreeze Recycling Tools by Clore Automotive applied about three filters to approach the handled coolant. The first two filters are really a fifty micron and one micron rated filter. [b][url=http://www.louisvuittonoutletmart.co.uk/]www.louisvuittonoutletmart.co.uk[/url][/b] Our clothing is handmade with superior high quality tInfant fleece hat will extremely past and we present unique attributes for example the embroidered Deers, Daddy's Small Hunter and components for instance diaper bags and headbands. Other properly regarded opponents usually do not provide these things or features. I'm searching for that variety Toddler fleece hat is pointed, possessing a self tassle and may well utilize a tie put on it. [b][url=http://www.cheapuggsstore.com/]cheap uggs[/url][/b] I googled all-around and there's nothing else although the information above that I can find. Should you have any fears regarding your private overall health or even the health of your youngster, you ought to constantly seek advice from by using a physician or any other health care skilled. Make sure you review the Privacy Plan and Phrases of Use just before applying this web site.
Q: How to make query perform better using a dependent sub query in SQL? I am trying to run a query from two large tables of data. I am trying to join them but filter out the minimum date at the same time, the filtering date seems that it slows it down ALOT. But this is a must have, Is there any way I can speed it up? As the query stands, it just keeps loading and loading Here is what I'm getting in the EXPLAIN The query is - SELECT T1.id_no, T1.condition_code, Count(T1.condition_code) AS COUNT, T1.doe, T2.id_no, T2.trans_time, T2.from_routing_pos FROM attrcoll_month T1 JOIN live_trans T2 ON T1.id_no = T2.id_no WHERE T2.trans_time = (SELECT Min(trans_time) FROM live_trans T2_MIN WHERE T2_MIN.id_no = T2.id_no) AND T1.doe BETWEEN '2014-09-01 00:00:01' AND '2014-09-02 23:59:59' AND T1.unique_code = 'XXY' GROUP BY T2.from_routing_pos, T1.condition_code Snippets from each tables data - ATTRCOLL_MONTH T1 ID_NO DOE CONDITION_CODE UNQIUE_CODE 8442 25/09/2014 22:49 NEND XXY 8442 25/09/2014 22:49 SEND XXY 8442 25/09/2014 22:49 BS XXY 8442 25/09/2014 22:49 BS XXY 8442 25/09/2014 22:49 BS XXY 8442 25/09/2014 22:49 TD XXY 8511 25/09/2014 22:49 NEND XXY 8511 25/09/2014 22:49 SEND XXY 8511 25/09/2014 22:49 BS XXY 8511 25/09/2014 22:49 BS XXY 8511 25/09/2014 22:49 BS XXY 8511 25/09/2014 22:49 TD XXY 8511 24/09/2014 12:49 OF XXY 8511 24/09/2014 12:49 OF XXY 8675 24/09/2014 12:49 NEND XXY 8675 24/09/2014 12:49 SEND XXY 9081 24/09/2014 12:49 NEND XXY LIVE_TRANS T2 ID_NO TRANS_TIME UNQIUE_CODE FROM_ROUTING_POS 8442 2.12276E+17 XXY OD1 8442 2.12276E+17 XXY OD2 8445 2.12276E+17 XXY OD3 8214 2.12276E+17 XXY OD2 8325 2.12276E+17 XXY OD1 842 2.12276E+17 XXY OD3 2444 2.12276E+17 XXY OD3 Sorry about the table data formatting! Hope this is explained well, please let me know if you need more info A: First fetch record from t1 only into a temp table. Then Apply the join of temp Table and T2 and t2_min and get all min time and ids Then merge #1,#2 and t2 in join and apply group by. This will give some some boost in performance. Basic Idea is to limit the records that will be part of Join and to remove the subquery. This is sample:- --Fetch records from Table one based on all filtering conditions -- this will reduce the logical read when we apply join SELECT T1.id_no, T1.condition_code, T1.doe INTO #Temp FROM attrcoll_month T1 WHERE T1.doe >= '01/09/2014' AND T1.doe < '03/01/2014' AND T1.unique_code = 'XXY'; -- Get all the min time for only required ids. This will avoid the sub query and also read get reduced since records in #temp are limited SELECT MIN(trans_time) MinTime, T.id_no INTO #tempMinTime FROM #Temp T JOIN live_trans T2_MIN ON T.id_no = T2_MIN.id_no; --Merging #1 and #2 SELECT T1.id_no, T1.condition_code, COUNT(T1.condition_code) AS count, T1.doe, T2.id_no, T2.trans_time, T2.from_routing_pos FROM #Temp T1 JOIN #tempMinTime T ON T1.id_no = T.id_no JOIN live_trans T2 ON T.id_no = T2.id_no WHERE T2.trans_time = T.MinTime GROUP BY T2.from_routing_pos, T1.condition_code;
SUPER BOWL BETS | Avila | FRI 02/01/13 | 5PM KSNV Las VegasFeb. 01, 2013. 08:04 PM EST The Super Bowl is one of the biggest money makers for Las Vegas. Many people think our city is th... More » The Super Bowl is one of the biggest money makers for Las Vegas. Many people think our city is the second best place in the country to watch the game. The only place that beats Las Vegas, is New Orleans. In Las Vegas the focus is how much people are betting. As news 3's Sergio Avila shows us, this year could be a sports book record. « Less
--- abstract: 'In this note we investigate under which conditions the dual of the flow polytope (henceforth referred to as the ‘dual flow polytope’) of a quiver is k-neighborly, for generic weights near the canonical weight. We provide a lower bound on k, depending only on the edge connectivity of the underlying graph, for such weights. In the case where the canonical weight is in fact generic, we explicitly determine a vertex presentation of the dual flow polytope. Finally, we specialize our results to the case of complete, bipartite quivers where we show that the canonical weight is indeed generic, and are able to provide an improved bound on k. Hence, we are able to produce many new examples of high-dimensional, $k$-neighborly polytopes.' address: - 'Department of Mathematics, Washington University in St. Louis' - 'Department of Mathematics, University of Georgia' author: - Patricio Gallardo - Daniel Mckenzie bibliography: - 'Bibliography.bib' title: 'On the neighborliness of dual flow polytopes of quivers.' --- Introduction ============ The study of combinatorial properties of polytopes by relating them to appropriate geometric objects is an important technique in contemporary discrete geometry. Within that context the motivation of our work is two-fold. First, we recall that a $d$ dimensional polytope $P$ with $n$ vertices is $k$-neighborly if every set of $k$ vertices spans a face of $P$. One can show that if $k > \lfloor d/2\rfloor$, then $P$ is combinatorially equivalent to the simplex, hence it is natural to consider $k$-neighborly polytopes for $k \leq \lfloor d/2\rfloor$. $k$-neighborly polytopes are of interest in extremal combinatorics, but explicit examples, particularly in high dimension, remain hard to construct. This work studies when the dual of the flow polytope of a weighted quiver $(Q,\theta)$ is $k$-neighborly, and as a result we provide what we believe are new examples of $k$-neighborly polytopes.\ On the other hand, the flow polytope $P(Q,\theta)$ is associated to a moduli space $\mathcal{M}(Q, \theta)$ parametrizing representations of $Q$ satisfying a certain stability condition given by $\theta$. It seems natural to relate the combinatorial properties of $P(Q,\theta)$ with the geometric characteristics of the objects parametrized by $\mathcal M(Q, \theta)$. This relationship between a polytope $P$, a quiver $Q$ with weight $\theta$, and a moduli space $\mathcal M(Q, \theta)$ is done via toric geometry, and it has been used before for studying reflexive polytopes (see [@Altmann2009flow]). However, to the best of the authors’ knowledge, this is the first paper to study $k$-neighborliness.\ In our first result, we bound the $k$-neighborliness of the dual flow polytope $P^{\Delta}(Q,\theta)$ for $\theta$ close to the canonical weight. The proof utilizes earlier work of Jow [@Jow2011]. This bound is generic— it does not depend on the orientations of the arrows in $Q$—but is non-constructive: \[thm:main\] Let $Q$ be an acylic quiver such that its underlying graph $\Gamma = (V,E)$ is $r$-edge connected. Let $\delta_{Q}$ denote the canonical weight for this quiver. Then there exists an arbitrarily small perturbation $\theta$, of $\delta_{Q}$ such that $P^{\Delta}(Q,\theta)$ is a $|E| - |V| + 1$ dimensional polytope on $|E|$ vertices that is at least $\lfloor r/2 \rfloor$-neighborly. Our second result is more explicit. We verify that for a particular family of quivers associated to bipartite graphs the canonical weight is generic, and also deduce a better bound for $k$: \[thm:BipartitePolytopes\] Let $K_{p,q}$ denote the complete, bipartite graph with $p$ vertices on one side of the bipartition, and $q$ vertices on the other. Suppose further that $p$ and $q$ are co-prime. If $Q_{p,q}$ is the quiver formed from $K_{p,q}$ by orienting all edges left-to-right, then $\delta_{Q_{p,q}}$ is generic, and $P^{\Delta}(Q_{p,q},\delta_{Q_{p,q}})$ is a $\left(pq - p -q +1\right)$-dimensional $(\min\{p,q\}-1)$-neighborly polytope with $pq$ vertices. In Section \[sec:poly\] we describe an explicit algorithm for computing the vertex presentation of $P^{\Delta}(Q,\delta_{Q})$ and we provide sage code which does so.\ The polytopes constructed in Theorem \[thm:BipartitePolytopes\], or indeed in any case where $\delta_{Q}$ can be shown to be generic, enjoy a number of other desirable properties. For example, they are naturally lattice polytopes, and further are smooth and reflexive. Recent work of Assarf *et. al.* (see [@Assarf2014]) classified all smooth reflexive $d$-dimensional polytopes on at least $3d-2$ vertices. Since the polytopes constructed above always have fewer than $3d-2$ vertices, they are not covered by this list. Application to Compressed Sensing --------------------------------- In [@Donoho2005N; @Donoho2005] Donoho and Tanner show that if $P$ is a $k$-neighborly polytope with vertices ${{\bf v}}_1,\ldots,{{\bf v}}_n\subset\mathbb{R}^{d}$ then the matrix $A_{P} = [{{\bf v}}_1,\ldots, {{\bf v}}_n]$ is a good matrix for compressed sensing in that any ${{\bf x}}^{*} \in \mathbb{R}^{n}$ with $|\text{supp}({{\bf x}}^{*})| \leq k$ and ${{\bf x}}\geq 0$ may be recovered from ${{\bf y}}= A_{P}{{\bf x}}^{*}$ as the unique solution to the linear programming problem: $$\text{argmin}_{{{\bf x}}\in\mathbb{R}^{d}} \|{{\bf x}}\|_{1} \text{ subject to: } A_{P}{{\bf x}}= {{\bf y}}$$ Explicitly constructing matrices with this property (known as the $\ell_0$-$\ell_1$ equivalence) remains an interesting problem. In particular, one would like $d$ to be as small as possible, relative to $n$ and $k$. Probabilistic constructions yield $A\in \mathbb{R}^{d\times n}$ having $\ell_0$-$\ell_1$ equivalence with high probability for $d = O(k\log(n/k))$. Deterministic constructions [@Devore2007; @Li2012] are not as successful, with the $\ell_0$-$\ell_1$ equivalence only guaranteed for $d = O(k^{2})$. Letting $A_{Q_{p,q}}$ denote the matrix whose columns are the vertices of $P^{\Delta}(Q_{p,q},\delta_{Q_{p,q}})$, Theorem \[thm:BipartitePolytopes\] guarantees $A_{Q_{p,q}}$ has the $\ell_0$-$\ell_1$ equivalence property for $k = \text{min}(p,q)-1$, $n\approx k^2$ and $d \approx k^{2} - 2k$. We reiterate that $A_{Q_{p.q}}$ can rapidly be computed, by the results of §\[sec:poly\]. Moreover, $A_{Q_{p.q}}$ will be [*sparse*]{}, and have entries in $\{-1,0,1\}$. This could be useful when working with finite precision, or in the problem of sparse-integer recovery ([@Fukshansky2018]), where an integral sensing matrix is required. Existing constructions of $k$-neighborly polytopes -------------------------------------------------- For small values of $d$ and $n$, there exist explicit enumerations of all combinatorial types of $\lfloor d/2\rfloor$-neighborly polytopes, for $d = 4$, $n = 8$ ([@Grunbaum1967]), $d = 4$, $n = 9$ ([@Altshuler1973]) and $d = 4$, $n = 10$ ([@Altshuler1977]), $d=5$, $n = 9$ [@Finbow2015], [@Fukuda2013] and $d = 6$, $n = 10$[@Bokowski1987]. In high dimension, it is known that for large enough $n$ and $d = \delta n$ with $\delta\in (0,1)$ almost all randomly sampled polytopes are $k$-neighborly with $k \approx \rho_{N}(d/n)d$ (see [@Donoho2005N] for the definition of the neighborliness constant $\rho_{N}$ and more details). However, *families* of $k$-neighborly polytopes as much less studied; although the *Sewing* technique of Shemer ([@Shemer1982] and see also [@Padrol2013]) in principle iteratively describes an infinite family of explicit examples with $k = \lfloor d/2\rfloor$, they are all of the same dimension. The polytopes in Theorems \[thm:main\] and \[thm:BipartitePolytopes\] provide families of $k$-neighborly $d$-polytopes on $n$ vertices, where $k,n$ and $d$ all grow without bound. Outline of the proof of Theorem \[thm:main\]. --------------------------------------------- Given a quiver $Q = (Q_0,Q_1)$ and a weight $\theta:Q_{0} \to \mathbb{Z}$ with $\sum_{i\in Q_0}\theta(i) = 0$, there exist a space of thin-sincere representations which associate a one-dimensional vector space to each vertex and a linear map to each arrow. If we consider such representations up to isomorphism, then by work of King [@King1994] and Hille [@Hille1998] , there is an algebraic variety $\mathcal{M}(Q,\theta)$ that parametrizes the representations which satisfy an additional stability condition based on $\theta$. These representations are called $\theta$-semistable thin-sincere ones (see §\[sec:ModuliSpace\_Reps\] for the definition of thin-sincere representations). $\mathcal{M}(Q,\theta)$ can be constructed as a GIT quotient $\left( \mathbb{C}^{Q_1} \setminus Z(\chi_{\theta}) \right) /\!/\mathbb{C}^{(Q_0-1)}$ where the loci $Z(\chi_{\theta})$ parametrizes the [*unstable representations*]{}. Of particular interest here is that $Z(\chi_{\theta})$ is completely described combinatorially by $Q$ and $\theta$, as detailed in §\[sec:ModuliSpace\_Reps\]. In particular, we use this to obtain a lower bound on $\text{codim}\left(Z(\chi_{\theta})\right)$.\ If $Q$ is acyclic, $\mathcal{M}(Q, \theta)$ is in fact a projective toric variety and hence may also be constructed from the data of a lattice polytope. It turns out that this polytope is the flow polytope $P(Q,\theta)$ whose construction is detailed in §\[sec:poly\]. If we denote by $\Sigma(Q,\theta)$ the normal fan of $P(Q,\theta)$ then by results of [@Cox1996] there is a canonical quotient of the form $ \left( \mathbb C^{\Sigma(1)} \setminus Z^{\text{Cox}}\left(\Sigma(Q,\theta) \right) \right)/ G_{\Sigma} $ where $G_{\Sigma}$ is a group to be described in §\[sec:ToricVarieties\]. In §\[sec:UnstableLocus\], we show, under certain assumptions on $\theta$, that $ Z^{\text{Cox}}\left(Q,\theta)\right) = Z(\chi_{\theta})$. The aforementioned lower bound on $\text{codim}\left(Z(\chi^{\theta})\right)$ thus becomes a lower bound on $\text{codim}\left(Z^{\text{Cox}}\left(\Sigma(Q,\theta)\right)\right)$. We conclude our proof by using a result from [@Jow2011] that relates the the codimension of $Z^{\text{Cox}}\left(\Sigma(Q,\theta)\right)$ with the $k$-neighborliness of $P^{\Delta}(Q,\theta)$.\ The rest of the paper is laid out as follows. In §\[sec:Basics\] we collect some definitions and elementary properties of the main objects of study in this paper: polytopes, toric varieties and quiver representations. We do not aim to be encyclopedic, but rather use this section to establish notation and point the interested reader to the relevant literature. §\[sec:MainResults\] contains the main results of this paper. Specifically, we detail the algorithm for computing the vertex presentation of $P^{\Delta}(Q,\delta_{Q})$ in §\[sec:poly\] while in §\[sec:UnstableLocus\]–\[sec:mainProof\] we provide the details of the proof of Theorem \[thm:main\] outlined above. Finally in §\[sec:ProofBipartite\] we prove Theorem \[thm:BipartitePolytopes\]. Acknowledgements ---------------- P.G is grateful for the working environment of the Department of Mathematics in Washington University at St. Louis and the University of Georgia at Athens. D.M. also thanks the department of Mathematics at the University of Georgia, and acknowledges the financial support of the National Research Foundation (NRF) of South Africa. Definitions and Basic Properties {#sec:Basics} ================================ We shall work exclusively over the complex numbers, $\mathbb{C}$. We denote the multiplicative group of $\mathbb{C}$ as $\mathbb{C}^{\times}$. We begin with the necessary background on polytopes and quivers, see [@Ziegler2012], [@Craw2008b], [@Hille1998], and [@Joo2015], for a more detailed exposition of such topics. Polytopes and Fans {#sec:PolytopesAndFans} ------------------ By $d$ dimensional polytope ($d$-polytope for short) we mean the convex hull of a finite set of points in $\mathbb{R}^{d}$: $$P = \text{conv}(\{v_1,\ldots, v_n\}) := \{\sum_{j=1}^{n}\lambda_{j}v_{j}: \ \sum_{j=1}^{n}\lambda_{j} = 1 \text{ and } \lambda_{j} \geq 0 \text{ for all } j\} \subset \mathbb{R}^{d}$$ Suppose that we fix a lattice, $M \cong \mathbb{Z}^{d}$, and consider a polytope $P\subset M\otimes \mathbb{R} \cong \mathbb{R}^{d}$. We say $P$ is a *lattice polytope* if its vertices are all lattice points (that is, elements of $M$). Let $N$ denote the dual lattice to $M$. That is, $N = M^{\vee}:= \text{Hom}_{\mathbb{Z}}(N,\mathbb{Z})$. For a $d$-polytope with $0\in P$, we define its polar, or dual polytope as: $$P^{\Delta} := \{{{\bf c}}\in\mathbb{R}^{d} : {{\bf c}}\cdot {{\bf x}}\leq 1 \text{ for all }{{\bf x}}\in P\} \subset \left(\mathbb{R}^{d}\right)^{\vee}$$ If $P$ is an $M$-lattice polytope, it is not always the case that $P^{\Delta}$ is an $N$-lattice polytope. If this property holds, we say that $P$ is *reflexive*.\ A polyhedral cone is the conic hull of a finite set of points $S\subset \mathbb{R}^{d}$: $$\sigma = \text{cone}(S) := \{\sum_{i}^{\ell}\lambda_iv_i: \ \ell < \infty , \ \{v_1,\ldots, v_{\ell}\}\subset S \text{ and } \lambda_{i} \geq 0\ \forall i \}$$ We say a cone is *strictly convex* if it does not contain any full lines. As for polytopes, if we fix a lattice $N$ and consider a $\sigma \subset N\otimes \mathbb{R} \cong \mathbb{R}^{d}$, we say that $\sigma$ is a *rational, polyhedral cone* if there exists a finite set of lattice points $S\subset N$ such that $\sigma = \text{cone}(S)$. We typically think of cones and polytopes as living in spaces dual to each other. A *fan* is a finite set of strictly convex, polyhedral, rational (with respect to a lattice $N$) cones $\mathcal{F} = \{C_1,\ldots, C_n\}$ such that: 1. Every face of a cone in $\mathcal{F}$ is a cone in $\mathcal{F}$ and 2. $C_i\cap C_j\in\mathcal{F}$ for any $C_i,C_j\in\mathcal{F}$. We say that a polyhedral, rational cone $\sigma$ is *simplicial* if the minimal generators of its rays are independent over $\mathbb{R}$ (see Definition 1.2.16 in [@Cox2011]). A fan $\Sigma$ will be called simplicial if every $\sigma \in \Sigma$ is simplicial.\ Let $P$ be a $M$-lattice polytope such that $0$ is an interior point of $P$. This condition is not a restriction if $P$ is full dimensional, as we may then always translate $P$. There are two natural fans associated to $P$. First, its *face fan* $\mathcal{F}(P)\subset M\otimes\mathbb{R}$ is defined to be the set of cones spanned by proper faces of $P$ (see [@Ziegler2012 Sec. 7.1]) $$\label{def:ffan} \mathcal{F}(P) := \{\text{cone}(F) : \ F \text{ a proper face of } P\}.$$ Here $\text{cone}(F) = \{\sum_{i}^{\ell}\lambda_iv_i: \ \ell < \infty , \ \{v_1,\ldots, v_{\ell}\}\subset F \text{ and } \lambda_{i} \geq 0\ \forall i \}$. On the other hand, the *normal fan* $\mathcal N (P)\subset N\otimes \mathbb{R}$ of a polytope is defined to be the set of cones $\{N_{F}: \ F \text{ a non-empty face of }P\}$ where: $$N_{F} := \{{{\bf c}}\in \mathbb{R}^{d} : \ F\subset \{{{\bf x}}\in P : \ {{\bf c}}\cdot {{\bf x}}= \max_{{{\bf y}}\in P}{{\bf c}}\cdot{{\bf y}}\}\}$$ Both constructions are related by the following result \[thm:Polars\] For any polytope $P$ with $\mathbf{0}$ in its interior, $\mathcal{F}(P) \cong \mathcal{N}(P^{\Delta})$ and $\mathcal{N}(P) \cong \mathcal{F}(P^{\Delta})$ where $P^{\Delta}$ is the dual polytope of $P$. For a polytope $P$, denote by $P(k)$ the set of $k$ dimensional faces of $P$. Similarly, for a fan $\Sigma$, denote by $\Sigma(k)$ the set of $k$-dimensional cones in $\Sigma$. We say that a polytope $P$ is $k$-neighborly if every set of $k$ vertices $\{v_{i_1},\ldots, v_{i_k}\}$, span a face of $P$. That is: $$\text{conv}\left(\{v_{i_1},\ldots, v_{i_k}\}\right) \in P(k)$$ Equivalently, $P$ is $k$-neighborly if for all $1\leq \ell \leq k$, $\left| P(\ell) \right| = \left(\begin{array}{c} n \\ \ell+1 \end{array}\right)$ We shall say that a fan $\Sigma$ is $k$-neighborly if every set of $k$ rays $\{\sigma_{i_1},\ldots,\sigma_{i_k}\} \subset \Sigma(1)$, generate a cone in $\Sigma$. That is: $$\text{cone}\left(\{\sigma_{i_1},\ldots,\sigma_{i_k}\}\right) \in \Sigma(k)$$ Equivalently, $\Sigma$ is $k$-neighborly if for all $1\leq \ell \leq k$, $\left| \Sigma(\ell) \right| = \left(\begin{array}{c} n \\ \ell+1 \end{array}\right)$ The notions of neighborliness for cones and fans are related as follows: A polytope $P$ is $k$-neighborly if and only if its face fan $\mathcal{F}(P)$ is. \[thm:Neighborly\] By construction $P(\ell) \cong \left(\mathcal{F}(P)\right)(\ell)$, where the isomorphism is given by $F \mapsto \text{cone}(F)$. Hence$\left| P(\ell) \right| = \left(\begin{array}{c} n \\ \ell+1 \end{array}\right)$ for all $1\leq \ell \leq k$ if and only if $\left| \Sigma(\ell) \right| = \left(\begin{array}{c} n \\ \ell+1 \end{array}\right)$ for all $1\leq \ell \leq k$. Combining Propositions \[thm:Neighborly\] and \[thm:Polars\] we observe that: Let $P$ be a polytope with $\mathbf{0}\in \text{int}(P)$. If $\mathcal{N}(P)$ is a $k$-neighborly fan, then $P^{\Delta}$ is a $k$-neighborly polytope. \[lemma:Neighborly\_Fans\_and\_Polytopes\] Toric Varieties {#sec:ToricVarieties} --------------- A toric variety is an algebraic variety $X$ containing an algebraic torus $T$—that is, $T\cong (\mathbb{C}^{\times})^{d}$—as a dense subset such that the natural action of $T$ on itself extends to all of $X$. Given a fan $\Sigma$, integral with respect to a lattice $N$, there is a canonical construction of a toric variety $X_{\Sigma}$ containing the torus $T_{N} := N\otimes\mathbb{C}^{\times}$. We refer the reader to [@Cox2011] for further details on this construction. For all the relevant cases in our work $X_{\Sigma}$ does not have torus factors, equivalently the maximal cones of $\Sigma$ span $N \otimes R$ . We will assume such hypotheses without further mentioning them.\ If $\Sigma$ is the normal fan to some polytope $P$, then $X_{\Sigma}$ is in fact *projective* and many geometric invariants of the variety $X_{\Sigma}$ can be computed from the data of $\Sigma$, $P$, and $N$. In particular, let $\text{Cl}\left(X_{\Sigma}\right)$ be the divisor class group of $X_{\Sigma}$ [*i.e.*]{} the group of all divisors on $X_{\Sigma}$ modulo linear equivalence. To every ray $\rho\in \Sigma(1)$ there is associated a unique prime, torus invariant divisor $D_{\rho}$ and the group of torus invariant divisors on $X_{\Sigma}$ may be identified with $\bigoplus_{\rho \in \Sigma(1)}\mathbb{Z}D_{\rho} \cong \mathbb{Z}^{\Sigma(1)}$. The divisor class group may be computed from the short exact sequence: $$0 \to M \to \mathbb{Z}^{\Sigma(1)} \xrightarrow{\text{div}} \text{Cl}(X_{\Sigma}) \to 0 \label{equation:SESCox}$$ Here $M$ is the dual lattice to $N$, and the map $\text{div}$ sends the torus-invariant divisor represented by ${{\bf x}}\in \mathbb{Z}^{\Sigma(1)}$, namely $\sum_{\rho \in \Sigma(1)} x_{\rho} D_{\rho}$, to its equivalence class: $\text{div}({{\bf x}}) = \left[\sum_{\rho \in \Sigma(1)} x_{\rho} D_{\rho}\right]$. For further details on divisors on toric varieties, see Chpt. 4 of [@Cox2011].\ Applying $\text{Hom}_{\mathbb{Z}}(\cdot, \mathbb{C}^{\times})$ to and letting $G_{\Sigma}$ denote the group $\text{Hom}_{\mathbb{Z}}\left(\text{Cl}(X_{\Sigma}), \mathbb{C}^{\times}\right)$ we get: $$1 \to G_{\Sigma} \to (\mathbb{C}^{\times})^{\Sigma(1)} \to T_{N} \to 1$$ because $\text{Hom}_{\mathbb{Z}}(M,\mathbb{C}^{\times}) \cong N\otimes \mathbb{C}^{\times} = T_{N}$. Note that $G_{\Sigma}$ acts on $\mathbb{C}^{\Sigma(1)}$ via its embedding into $(\mathbb{C}^{\times})^{\Sigma(1)}$. (see [@Cox2011 Chp 5]) Let $\Sigma$ be a fan and for each $\rho\in\Sigma(1)$ introduce a coordinate $x_{\rho}$ on $\mathbb C^{\Sigma(1)}$. Define $Z^{\text{Cox}}(\Sigma)$ as the vanishing locus $$Z^{\text{Cox}}(\Sigma):= \left\{ \prod_{\rho \not\in \sigma } x_{\rho} = 0 \; \bigg| \; \sigma \; \; \text{is a cone of maximal dimension} \right\}.$$ In particular, $Z^{\text{Cox}}(\Sigma)$ is a union of coordinate subspaces. Suppose that $\Sigma$ is simplicial. Then: $$X_{\Sigma} \cong \left(\mathbb{C}^{\Sigma(1)}- Z^{\text{Cox}}(\Sigma)\right)/ G_{\Sigma}$$ Note that this is a *geometric quotient*. That is, points in $X_{\Sigma}$ are in one-to-one correspondence with closed $G_{\Sigma}$ orbits in $\mathbb{C}^{\Sigma(1)}- Z^{\text{Cox}}(\Sigma)$. ### GIT for Toric Varieties {#sec:GIT} Recall that for any group $G$, a *character* is a map $\chi: G \to \mathbb{C}^{\times}$. The set of all characters naturally forms a group $\text{Ch}(G) := \text{Hom}_{\mathbb{Z}}\left(G,\mathbb{C}^{\times}\right)$. We may associate to any character $\chi$ of $ G_{\Sigma}$ an *unstable locus* $Z(\chi)\subset \mathbb{C}^{\Sigma(1)}$ and a *GIT quotient* $\displaystyle \left(\mathbb{C}^{\Sigma(1)}-Z(\chi)\right)/\! \!/ G_{\Sigma}$, which is an algebraic variety (for a precise definition of $Z(\chi)$ see [@Cox2011]).\ By construction $\text{Ch}\left(G_{\Sigma}\right) = \text{Cl}(X_{\Sigma})$. Furthermore, the map $\text{div}$ in is surjective, thus we may write any $[D] \in \text{Cl}(X_{\Sigma})$ as $[D] = \text{div}({{\bf a}})$ for some ${{\bf a}}\in \mathbb{Z}^{\Sigma(1)}$. Following Cox *et al* in [@Cox2011], we denote the character associated to the divisor class $\text{div}({{\bf a}})$ as $\chi_{\text{div}({{\bf a}})}$. Varying $\text{div}({{\bf a}})$ leads to different characters and hence different quotients. However, we recover $X_{\Sigma}$ for a generic ample divisor because of the following theorem, which collects results Theorem 5.1.11, Prop. 14.1.9, 14.1.12 and Example 14.2.14 in [@Cox2011]. \[thm:CoxGIT\] Let $X_{\Sigma}$ be a toric variety without torus factors. If $\text{div}({{\bf a}})$ is ample and $\chi_{\text{div}({{\bf a}})}$ is generic, then $Z(\chi_{\text{div}({{\bf a}})}) = Z^{\text{Cox}}(\Sigma)$ and $$X_{\Sigma} \cong \left(\mathbb{C}^{\Sigma(1)}-Z(\chi_{\text{div}({{\bf a}})}) \right)/ \! \! / G_{\Sigma}$$ \[theorem:CoxQuotient\] Quivers ------- A quiver is a finite, directed graph, possibly with loops and multi edges. We shall denote the vertices by $Q_0$, and the arrows by $Q_1$. For any arrow $a\in Q_1$, $a^{+}\in Q_0$ will denote the head and $a^{-}\in Q_0$ will denote the tail. An integral weight of $Q$ is a function $\theta: Q_0 \to \mathbb{Z}$ such that $\displaystyle \sum_{i\in Q_0} \theta(i) = 0$. The set of all integral weights forms a lattice $\text{Wt}(Q)\subset \mathbb{Z}^{Q_0}$. \[def:circ\] An integral circulation is a function $f: Q_1 \to \mathbb{Z}$ such that: $$\sum_{a\in Q_1 \atop a^{-} = i}f(a) = \sum_{a\in Q_1 \atop a^{+} = i} f(a) \quad \quad \text{ for every } i\in Q_0$$ The set of all integral circulations forms a lattice $\text{Cir}(Q) \subset \mathbb{Z}^{Q_1}$. Frequently, we identify $f:Q_1 \to \mathbb Z$ with a vector $f$ in $\mathbb Z^{Q_1}$, so $f_i=f(i)$. Next, we define, as in [@Craw2008b], the *incidence map*: $\text{inc}: \mathbb{Z}^{Q_1} \to \text{Wt}(Q)$ by $$(\text{inc}(f))_{i} = \sum_{a\in Q_1 \atop a^{+} = i} f(a) - \sum_{a\in Q_1 \atop a^{-} = i} f(a) \quad \text{ for all } i \in Q_0$$ If $Q$ is connected we have the following short exact sequence: $$\label{equation:SESInc} 0 \to \text{Cir}(Q) \to \mathbb{Z}^{Q_1} \xrightarrow{\text{inc}} \text{Wt}(Q) \to 0$$ Applying $\text{Hom}_{\mathbb{Z}}(\cdot, \mathbb{C}^{\times})$ we obtain: $$1 \to \text{Hom}_{\mathbb{Z}}(\text{Wt}(Q), \mathbb{C}^{\times}) \to \left(\mathbb{C}^{\times}\right)^{Q_1} \to \text{Hom}_{\mathbb{Z}}(\text{Cir}(Q), \mathbb{C}^{\times}) \to 1$$ For future use we shall denote $G_{Q} := \text{Hom}_{\mathbb{Z}}(\text{Wt}(Q), \mathbb{C}^{\times}) $. Note that the above sequence gives a natural action of $G_{Q}$ on $\mathbb{C}^{Q_1}$, via its embedding in $\left(\mathbb{C}^{\times}\right)^{Q_1}$. We define the *canonical weight* of $Q$ as $$\delta_{Q}(i) := \sum_{a\in Q_1 \atop a^{+} = i} 1 - \sum_{a\in Q_1 \atop a^{-} = i} 1 \quad \text{ for all } i \in Q_0$$\[eq:can\] clearly $\delta_{Q} = \text{inc}(\mathbf{1})$, where $\mathbf{1}\in\mathbb{Z}^{Q_1}$ is the all-ones vector. ### Representations of Quivers {#sec:RepsOfQuivers} A sincere-thin representation $R$ of $Q$ assigns a vector space $R(i) \cong \mathbb C$ to each vertex $i\in Q_0$ and a linear map $R(a): R(a^{-}) \to R(a^{+})$ to each arrow. We can also think of such representations as assigning to the set of edges $Q_{1}$ a vector $\vec w_R= (w_1, \ldots, w_{|Q_1|})\in \mathbb{C}^{Q_1}$ such that the linear map $R(a)$ is defined as $ R(a)(x) = w_{a}x$. We will only work with sincere-thin representation, so we just call them representations.\ Let $\text{Rep}(Q)$ be the space of all representations of $Q$, so $\text{Rep}(Q) \cong \mathbb{C}^{Q_1}$. A morphism $L$ of representations $R$ and $R'$ is a set of linear maps $L(i): R(i) \to R'(i)$ for $i\in Q_0$ such that the following diagram commutes for all $a\in Q_1$. $$\xymatrix{ R(a^-) \ar[rr]^{L(a^-)} \ar[d]_{R(a)} & & R'(a^-) \ar[d]^{R'(a)} \\ R(a^+) \ar[rr]_{L(a^+)} & & R'(a^+) }$$ If $w_{R}=(w_1, \ldots, w_{|Q_1|})$ and $w_{R'}=(w'_1, \ldots, w'_{|Q_1|})$, then we can interpret $L: R \to R'$ as a vector $\vec v_{L} =(v_1, \ldots, v_{|Q_0|}) \in \mathbb{C}^{Q_0}$ such that $L(i)$ is defined as $L(i)(x)= v_ix$ where $w'_{a}v_{a^{-}} = v_{a^+}w_a$ for every arrow $a \in Q_1$. In particular, for any $g \in \left(\mathbb{C}^{\times}\right)^{Q_0}$, we have an action on $\text{Rep}(Q)$ given by $$(g\cdot R)(a) := g(a^{+})R(a)g^{-1}(a^{-}).$$ Equivalently, if we denote $g$ as $(t_1, \ldots, t_{|Q_0|})$, then the action is defined as $w_{a} \to t_{a^+} w_a t_{a^-}^{-1}$. The orbits of the action correspond to isomorphism classes of representations. This group does not act faithfully—any element of the form $(\lambda,\lambda,\ldots, \lambda)$ will act trivially. $G_{Q}$ however does act faithfully (see, for example, §4.4 of [@Craw2008]). A subrepresentation $R^{'}$ of $R$ is a representation of $Q$ such that $R^{'}(i)\subset R(i)$ for all $i\in Q_0$ and $R^{'}(a) = R(a)|_{R^{'}(a^{-})}$ for all $a\in Q_1$. ### The Moduli Space of Representations of a Quiver {#sec:ModuliSpace_Reps} As noted by King [@King1994], any $\theta : Q^{0} \to \mathbb{Z}$ defines a character of $(\mathbb{C}^{\times})^{Q_0}$ via: $$\chi_{\theta}(g) = \prod_{i\in Q_0}g(i)^{\theta(i)}$$ If $\theta$ satisfies the further condition $\sum_{i}\theta(i) = 0$, [*i.e.*]{} $\theta\in \text{Wt}(Q)$, then it defines a character $\chi_{\theta}$ of $G_{Q}$. Analogously to \[sec:GIT\], and following King [@King1994] and Hille [@Hille1998], we may define an unstable locus $Z(\chi_{\theta})$ and a GIT quotient $\displaystyle \mathcal M(Q,\theta) := \mathbb C^{Q_1}/ \! \! /_{\chi_{\theta}} G_{Q}$ which we call the [*quiver moduli space*]{}. One can easily extend this to non-integral weights, [*i.e.*]{} $\theta \in \text{Wt}(Q)\otimes\mathbb{R}$ [@Hille1998]. There is a combinatorial characterization of $\chi_{\theta}$-stability in terms of $\theta$, which we present as Proposition \[Prop:Stability\]. First: Consider a subquiver $Q^{'}\subset Q$ with $Q^{'}_{0} = Q_{0}$. We say a subset of vertices $V\subset Q_{0}$ is $Q^{'}$-successor closed if there is no arrow in $Q^{'}_{1}$ leaving $V$. That is, for all $a\in Q^{'}_{1}$ with $a^{-}\in V$, we also have $a^{+}\in V$ (see Figure \[fig:SucClosed\] for an example). \[fig:SucClosed\] Henceforth, all subquivers $Q^{'}\subset Q$ will be assumed to have $Q^{'}_{0} = Q_0$, and we shall not explicitly mention this condition. A subquiver $Q^{'}\subset Q$ is $\theta$-stable (resp. $\theta$-semi-stable) if, for all $Q^{'}$-successor closed subsets $V\subset Q_0$, we have that: $$\sum_{i\in V} \theta(i) > 0 \;\; \left( \text{resp.} \geq 0 \right)$$ We say a quiver is [*unstable*]{} if it is not semi-stable. Finally: The support quiver $\text{Supp}(R)$ of a representation $R$ is the quiver with arrows $a \in Q_1$ such that $R(a) \neq 0$ or equivalently $w_{a} \neq 0$. [@Hille1998 Lemma 1.4] $$Z(\chi_{\theta}) = \left\{ R\in \text{Rep}(Q_1): \ \text{supp}(R) \text{ is a $\theta$-unstable quiver} \right\}$$ \[Prop:Stability\] We shall call a weight $\theta$ *generic* if every $\theta$-semistable quiver is actually $\theta$-stable. Note that $\theta$ is generic if and only if $\chi_{\theta}$ is generic in the GIT sense. We highlight that for a fixed $\theta$, $Z(\chi_{\theta})$ is a closed subvariety. Finally, the following concept will be important later on: \[def:Tightness\] We say that $(Q,\theta)$ is tight if for all $i=1,\ldots, |Q_1|$ the subquivers $Q^{'}\subset Q$ with $Q^{'}_{1} = Q_1\setminus\{a_i\}$ are $\theta$-stable. Main results {#sec:MainResults} ============ The fan and polytope associated to $Q$ {#sec:poly} -------------------------------------- Let us define the flow polytope of $Q$. For $\theta\in \text{Wt}(Q)$, the flow polyhedron $P(Q,\theta) \subset \text{Cir}(Q)\otimes \mathbb{R}\!\subset\!\mathbb{R}^{Q_1}$ is: $$\begin{aligned} P(Q,\theta) &:= \text{inc}^{-1}(\theta) \cap \mathbb{R}^{Q_1}_{\geq 0}\\ &= \left\{ {{\bf x}}\in \mathbb{R}^{Q_1} \ : \ {{\bf x}}\geq \mathbf{0} \text{ and, for all $i\in Q_1$, } \theta(i) = \sum_{a\in Q_1 \atop a^{+} = i} x_a - \sum_{a\in Q_1 \atop a^{-} = i}x_a \right\}.\end{aligned}$$ Its normal fan shall be denoted as $\Sigma(Q,\theta)$ or $\Sigma_{\theta}$ if $Q$ is clear. When $Q$ is acyclic, more can be said: \[thm:PQT\] Suppose that $Q$ is acyclic (that is, $Q$ contains no directed cycles). Then: 1. $P(Q,\theta)$ is a polytope, integral with respect to $ \text{Cir}(Q) \cong \text{inc}^{-1}(0)\cap \mathbb{Z}^{Q_1}$. 2. If $(Q,\theta)$ is tight, then $\text{dim}(P(Q,\theta)) = |Q_1| - |Q_0| + 1$ 3. If $(Q,\theta)$ is tight, then the facets (i.e. maximal faces) of $P(Q,\theta)$ are in on-to-one correspondence with $Q_1$. 4. The projective toric variety associated to $P(Q,\theta)$ is the moduli space $\mathcal{M}(Q,\theta)$. Moreover, if $\theta$ is generic, then $\mathcal{M}(Q,\theta)$ is smooth. See remarks 3.3 and 2.20, and Corollaries 2.14 and 2.19 in [@Joo2015] and references therein. For the rest of this sub-section, we focus on the canonical weight. We start by describing a basis for the $M$-lattice, $\text{Cir}(Q)$, given in Definition \[def:circ\], with a view towards explicitly describing the vertex presentation of $P^{\Delta}(Q,\delta_{Q})$. Let $T = (Q_0, T_1)$ be a spanning tree of $Q$. Note that $|Q_{1}\setminus T_1| = |Q_1|-|Q_0| + 1 := d$, so enumerate these arrows as $Q_{1}\setminus T_1 = \{b_1,\ldots, b_d\}$. For each $b_i$, let $c^{i}_{T}$ denote the unique undirected primitive cycle in $T\cup \{b_i\}$. Define a circulation $f_{b_i} \in \text{Cir}(Q)$ as follows: $$f_{b_i}(a) = \left\{\begin{array}{cc} 1 & \text{ if } a \text{ is forwardly traversed by } c^{i}_{T} \\ -1 & \text{ if } a \text{ is traversed in the reverse direction by } c^{i}_{T} \\ 0 & \text{ otherwise} \end{array}\right. \label{eq:f_definition}$$ If $Q$ is a connected quiver, the set $\{f_{b_1},\ldots, f_{b_d}\}$ forms a basis for $\text{Cir}(Q)$, thought of as a sub-lattice of $\mathbb{Z}^{Q_1}$. See Prop. 2.12 of [@Joo2015] or the discussion above Theorem 1.7 in [@Hille1998]. \[thm:PolarConvex\] Suppose that $Q$ is acyclic and that $(Q,\delta_{Q})$ is tight. Let $P^{\Delta}(Q,\delta_{Q})$ denote the dual of $P(Q,\delta_{Q})$. Then: $$P^{\Delta}(Q,\delta_{Q}) = \text{conv}\left(\left\{ \begin{bmatrix} -f_{b_1}(a_i) \\ -f_{b_2}(a_i) \\ \vdots \\ -f_{b_d}(a_{i}) \end{bmatrix} \ : \ \text{ for } i=1,\ldots, |Q_1| \right\}\right)$$ and each $\left[ -f_{b_1}(a_i), \ldots -f_{b_d}(a_i) \right]^{\top}$ is a vertex of $P^{\Delta}(Q,\delta_{Q})$. For $a\in Q_1$, let $\text{ev}_{a}: \text{Cir}(Q)\otimes\mathbb{R} \to \mathbb{R}$ denote the evaluation map $\text{ev}_{a}: f \mapsto f(a)$. Because $\mathbf{1} \in P(Q,\delta_{Q})$, $\mathbf{0} \in P(Q,\delta_{Q}) - \mathbf{1}$. Note that we are abusing notation slightly by letting $P^{\Delta}(Q,\delta_Q)$ denote the dual of this shifted flow polytope. By remark 2.20 of [@Joo2015], or (3.2) in [@Altmann2009], the facet presentation of $P(Q,\delta_{Q}) - \mathbf{1}$ is: $$P(Q,\delta_{Q}) - \mathbf{1} = \{{{\bf x}}\in \text{Cir}(Q)\otimes\mathbb{R} : \ \text{ev}_{a}\left({{\bf x}}\right) \geq -1 \text{ for } a\in Q_1 \}$$ or equivalently $$P(Q,\delta_{Q}) - \mathbf{1} = \{{{\bf x}}\in \text{Cir}(Q)\otimes\mathbb{R} : \ -\text{ev}_{a}\left({{\bf x}}\right) \leq 1 \text{ for } a\in Q_1 \} \label{eq:FacetPres1}$$ With respect to the basis for $\text{Cir}(Q)$ given by $f_{b_1},\ldots, f_{b_d}$: $$\text{ev}_{a_i}\left({{\bf x}}\right) = \left[f_{b_1}(a_i), \ldots f_{b_d}(a_i)\right] \cdot \left[\begin{matrix} x_1 \\ \vdots \\ x_d \end{matrix} \right]$$ and so we may rewrite in matrix form as where $$A = - \begin{bmatrix} f_{b_1}(a_1) & \ldots & f_{b_d}(a_1) \\ \vdots & \ddots & \vdots \\ f_{b_1}(a_{|Q_1|}) & \ldots & f_{b_{d}}(a_{|Q_1|}) \end{bmatrix} \in \mathbb{R}^{|Q_1|\times d}$$ Thus $P^{\Delta}(Q,\delta_{Q})$ is given as the convex hull of the columns of $A^{\top}$ (and each column is a vertex) by Theorem 2.11, part (vii) in [@Ziegler2012]. \[rmk:fano\] From the definition of $f_{b_j}$, it is clear that $f_{b_j}(a_{i}) \in \{-1,0,1\}$. This shows that the coordinate vectors of the vertices of $P^{\Delta}(Q,\delta_{Q}) $ are in $\{-1,0,1\}^{d}$. As an aside, this directly shows that $P(Q,\delta_{Q})$ is reflexive, although this is well-known [@Altmann1999]. Considering the evaluation maps $\text{ev}_{a_i}$ as elements in $\text{Cir}(Q)^{\vee} = \text{Hom}_{\mathbb{Z}}\left(\text{Cir}(Q),\mathbb{Z}\right)$, it is clear from the above proof that they define the outward-pointing normal vectors of the facets of $P(Q,\delta_{Q})$. For any weight, one can give a complete description of $\Sigma_{\theta}$ in terms of $Q$: \[thm:QuiverCone\] Suppose that $Q$ is a connected acyclic quiver. Let $\rho_{i}$ denote the ray in $\text{Cir}(Q)^{\vee}\otimes\mathbb{R}$ spanned by $\text{ev}_{a_i}$. For any $\theta \in \text{Wt}(Q)$ and for $1\leq \ell\leq d$: $$\Sigma_{\theta}(\ell) = \left\{ \text{cone}(\left\{ \rho_{i_1},\ldots, \rho_{i_{\ell}}\right\}): \ Q_1\setminus\{a_{i_1},\ldots, a_{i_{\ell}}\} \text{ is a $\delta_{Q}$ stable subquiver of $Q$ }\right\}$$ See Theorem 1.7 in [@Hille1998], and also [@Craw2008b]. In principle, this completely describes the face lattice of $P^{\Delta}(Q,\theta)$, although enumerating all stable subquivers is a non-trivial task. On the unstable locus {#sec:UnstableLocus} --------------------- From Theorem \[thm:QuiverCone\] and the definition of tightness (Definition \[def:Tightness\]) we get that if $\theta$ is tight then $\Sigma_{\theta}(1) \cong Q_1$. Much more is true; in fact, by Remark 3.9 of [@Craw2008b] (and see also pg. 21 of [@Craw2008]) if $\theta$ is generic, from we have the following isomorphism of short exact sequences: $$\label{eq:exactsq} \begin{tikzcd} 0\rar &\text{Cir}(Q) \arrow{r} \arrow{d}{\sim} & \mathbb{Z}^{Q_1} \arrow{d}{\sim} \arrow{r}{\text{inc}}& \text{Wt}(Q) \arrow{d}{\sim} \rar & 0 \\ 0\rar & M \arrow{r} & \mathbb{Z}^{\Sigma_{\theta}(1)} \arrow{r}{\text{div}} & \text{Cl}(\mathcal{M}(Q,\theta)) \rar & 0 \\ \end{tikzcd}$$ In particular, it follows that the groups $G_{\Sigma_{\theta}}$ and $G_{Q}$ coincide, and for any ${{\bf a}}\in \mathbb{Z}^{Q_1}$ the characters $\chi_{\text{div}({{\bf a}})}$ and $\chi_{\text{inc}({{\bf a}})}$ are equal. We deduce the following theorem: \[thm:Equality\_of\_Cox\_and\_King\] Let $Q$ be a connected, acyclic quiver and let $\theta= \text{inc}({{\bf a}})$ be a generic tight weight such that $\text{div}({{\bf a}})$ defines an ample divisor on $\mathcal{M}(Q,\theta)$. Then $$Z\left(\chi_{\text{inc}({{\bf a}})}\right) = Z^{\text{Cox}}\left(\Sigma_{\theta}\right)$$ As $\chi_{\text{inc}({{\bf a}})}$ and $\chi_{\text{div}({{\bf a}})}$ are the same character, $\displaystyle Z(\chi_{\text{inc}({{\bf a}})}) = Z(\chi_{\text{div}({{\bf a}})})$. By assumption $\text{div}({{\bf a}})$ is ample, and $\chi_{\text{div}({{\bf a}})} = \chi_{\text{inc}({{\bf a}})}$ is generic, so by Theorem \[thm:CoxGIT\] $Z(\chi_{\text{div}({{\bf a}})}) = Z^{\text{Cox}}(\Sigma_{\theta})$ We remark that for generic weights tightness is easily verified: Suppose that $\theta$ is generic, and that $\text{codim}(Z(\chi_{\theta})) \geq 2$. Then $(Q,\theta)$ is tight. \[prop:VerifyTight\] Suppose that $\text{codim}(Z(\theta)) \geq 2$ but that $(Q,\theta)$ is not tight. Then there exists an arrow $a_i\in Q_1$ such that $Q^{'}$ with $Q^{'}_{1} = Q\setminus \{a_i\}$ is not stable. Since $\theta$ is generic, $Q^{'}$ is in fact unstable. Thus, every $R$ with $\text{supp}(R) = Q^{'}$ is unstable. But: $$\left\{ R \in \mathbb{C}^{|Q_1|}: \ \text{supp}(R) = Q^{'} \right\} = \left\{ R \in \mathbb{C}^{|Q_1|}: \ R(a_i) = 0 \right \} \subset Z(\theta)$$ is of codimension $1$, as it is defined by a single algebraic equation (namely $R(a_i) = 0$). This contradicts the assumption that $\text{codim}(Z(\chi_{\theta})) \geq 2$ Now considering the canonical weight $\delta_{Q}$: Suppose that $\delta_Q$ is generic and $(Q,\delta_Q)$ is tight. Then $Z(\chi_{\delta_{Q}}) = Z^{\text{Cox}}(\Sigma_{\delta_Q})$ Recall that $\delta_{Q} = \text{inc}({{\bf 1}})$ where ${{\bf 1}}\in\mathbb{Z}^{Q_1}$ is the all-ones vector. Observe that $\text{div}({{\bf 1}}) = \left[\sum_{\rho\in\Sigma(1)}D_{\rho}\right] = -K_{\mathcal M(Q, \delta_Q)}$, the anticanonical divisor on $\mathcal M(Q, \delta_Q)$. But by remark \[rmk:fano\] the polytope $P(Q,\delta_Q)$ is reflexive, hence $\mathcal{M}(Q,\delta_Q)$ is Fano. That is, $-K_{\mathcal M(Q, \delta_Q)}$ is ample. The Theorem now follows from Theorem \[thm:Equality\_of\_Cox\_and\_King\]. Unfortunately it can be difficult to check whether $\delta_{Q}$ is generic. In §\[sec:ProofBipartite\] we discuss a special case where this can be verified. In the following Lemma we show that one may always find another weight, arbitrarily close to $\delta_{Q}$ that is generic and ample. We remark that the possible presence of rational weights does not introduce additional complications because they can be scaled into a integral weight without altering the GIT quotient. Suppose that $(Q,\delta_Q)$ is tight. Then, there exists a generic weight $\theta = \text{inc}({{\bf a}})$ such that $\text{div}({{\bf a}})$ is ample on $\mathcal{M}(Q,\theta)$ and satisfies $\sum_{i\in Q_0}| \theta(i) - \delta_{Q}(i)| \leq \epsilon$ for any sufficiently small $\epsilon$. In particular we may take $\epsilon < 1$. \[lemma:WeightPertubation\] The anti-canonical divisor in $\mathcal M(Q,\delta_Q)$ is ample by Theorem \[thm:PolarConvex\]. Therefore, if $\delta_Q$ is generic, we can select $\theta$ to be $\delta_Q$. So we suppose that $\delta_Q$ is not generic. In that case, there exists a perturbation $\theta^{'}$ which is generic. Moreover, by [@Hille1998 Sec 3.2], we have a morphism $\pi: \mathcal M(Q,\theta^{'}) \to \mathcal M(Q,\delta_Q)$. The ample divisors in $\mathcal M(Q,\theta^{'})$ form a cone and it is well known that the pull-back of an ample divisor such as $-K_{\mathcal{M}(Q,\delta_{Q})}$ is in the boundary of the ample cone [*i.e*]{} the so-called nef cone. Therefore, we can find an arbitrarily small perturbation, $\text{div}({{\bf a}}),$ of $\pi^*(-K_{\mathcal{M}(Q,\delta_Q}))$ within the ample cone of $\mathcal{M}(Q,\theta^{'})$. Moreover, ${{\bf a}}$ may be chosen small enough such that $\theta := \text{inc}({{\bf a}})$ is within the interior of the same [*chamber*]{} [@Hille1998 Sec 3.2] of $\theta^{'}$, in which case $\mathcal{M}(Q,\theta) \cong \mathcal{M}(Q,\theta^{'})$ and $\theta$ is also generic. Neighborliness and Codimension ------------------------------ We recall that $X_{\Sigma}$ is said to be simplicial if the fan $\Sigma$ is simplicial. In particular, if $X_{\Sigma}$ is smooth, then it is certainly simplicial. The following Theorem of Jow relates the neighborliness of a fan to the codimension of $Z^{\text{Cox}}(\Sigma)$: [@Jow2011]\[thm:Jow\] Let $X_{\Sigma}$ be a projective toric variety associated to a fan $\Sigma$. Then the following are equivalent: 1. $Z^{\text{Cox}}(\Sigma)$ has codimension at least $k+1$ 2. For every set of rays $A \subset \Sigma(1)$ with $|A| \leq k$ there exist a maximal cone $\sigma$ of $\Sigma$ such that $A \subseteq \sigma(1)$. If $\Sigma$ is in addition simplicial, then Condition (2) above becomes: $\Sigma$ is $k$-neighborly. See Proposition 10 and Remark 11 in [@Jow2011]. Proof of Theorem \[thm:main\] {#sec:mainProof} ----------------------------- Let $Q$ be an acyclic quiver with underlying graph $\Gamma$, and let $\theta$ be the generic and ample weight whose existence is guaranteed by Lemma \[lemma:WeightPertubation\]. We shall verify that: $$\text{codim}\left(Z(\chi_{\theta} \right) \geq \lfloor r/2 \rfloor \label{eq:inq}$$ where $r$ is the edge-connectivity of $\Gamma$. Because $r \geq 3$, $\text{codim}\left(Z(\chi_{\theta})\right) > 1$ and thus it will follow from Proposition \[prop:VerifyTight\] that $\theta$ is in addition tight. Because $\theta$ is generic, tight and ample, from Theorem \[thm:Equality\_of\_Cox\_and\_King\] we will have that $Z(\chi_{\theta}) = Z^{\text{Cox}}(\Sigma_{\theta})$ hence $\text{codim}\left( Z^{\text{Cox}}(\Sigma_{\theta})\right) \geq \lfloor r/2 \rfloor$. By Theorem \[thm:PQT\] $\mathcal{M}(Q,\theta)$ is smooth and thus $\Sigma_{\theta}$ is simplicial. Applying Theorem \[thm:Jow\] we obtain that the fan $\Sigma_{\theta}$ is $(\lfloor r/2 \rfloor-1)$-neighborly, and finally, appealing to Lemma \[lemma:Neighborly\_Fans\_and\_Polytopes\], we obtain that $P^{\Delta}(Q,\theta)$ is $ (\lfloor r/2\rfloor -1)$-neighborly. Note that $P^{\Delta}(Q,\theta)$ is $|E| - |V| + 1$ dimensional by (2) of Theorem \[thm:PQT\]. $P^{\Delta}(Q,\theta)$ has $|E|$ vertices because $P(Q,\theta)$ has $|E|$ facets, by (3) of Theorem \[thm:PQT\].\ We proceed to prove . For any $a \in Q_1$, let $x_{a}$ denote its associated coordinate on $\text{Rep}(Q) \cong \mathbb{C}^{Q_1}$, so that $x_{a}(R) = R(a)$. For any $B\subset Q_1$, define $Z(B)\subset \mathbb{C}^{Q_1}$ to be the coordinate hyperplane defined by the vanishing of $x_a$ for all $a\in B$. Inequality follows from $$\begin{aligned} Z(\chi_{\theta}) \subset \bigcup_{B \subset Q_1 \atop |B| \geq r/2} Z(B) \label{equation:ContainedCodim}\end{aligned}$$ because clearly $\text{codim}(Z(B)) = |B|$. To show that holds, we show that every $R$ parametrized by $Z(\chi_{\theta})$ is contained in some $Z(B)$ with $|B| \geq \lfloor r/2\rfloor$. Indeed, consider any such $R$, and let $Q^{'} = \text{supp}(R)$. Let $B = Q_1\setminus Q_1^{'}$. Then $R \in Z(B)$ as if $a\in B$ then $a \notin \text{supp}(R)$, [*i.e.*]{} $x_{a}(R) = R(a) = 0$ as required.\ Finally, we bound the size of $|B|$. Because $Q^{'}$ is unstable, there exists a $Q^{'}$-successor closed vertex set $V\subset Q_0$ with $\sum_{i\in V}\theta_{Q}(i) < 0$. Partition $Q_1$ into four sets as follows: - The set $A_{1} = \{a\in Q_{1}: \ a^{+},a^{-}\in V \} $ of arrows starting and ending in $V$. - The set $A_{2} = \{a\in Q_{1}: \ a^{+},a^{-}\in V^{c} \}$ of arrows starting and ending in $V^c$. - The set $A_3 = \{a\in Q_{1}: \ a^{+} \in V,\ a^{-}\in V^{c} \}$ of arrows starting in $V^c$ and ending in $V$. - The set $A_{4} = \{a\in Q_{1}: \ a^{-} \in V,\ a^{+}\in V^{c} \}$ of arrows starting in $V$ and ending in $V^c$. By definition of $\theta$, for all $i\in Q_0$ we may write $\theta(i) = \delta_{Q}(i) + \epsilon(i)$ with $\sum_{i\in Q_0} |\epsilon(i)| < 1$. It follows that: $$\begin{aligned} 0 &> \sum_{i\in V} \theta(i) = \sum_{i\in V} \left( \delta_{Q}(i) + \epsilon(i)\right) = \sum_{i\in V}\left(\left( \sum_{a\in Q_{1} \atop a^{+} = i} 1 - \sum_{a\in Q_{1} \atop a^{-} = i} 1\right) + \epsilon(i) \right) \quad \text{(by definition of $\delta_Q$)}\\ & = \sum_{a\in Q_{1}}\left( \sum_{v\in V \atop v=a^{+}}1 - \sum_{v\in V \atop v = a^{-}}1\right) + \sum_{v\in V} \epsilon_{v} \quad \text{(switching order of summation)}\end{aligned}$$ Observe that the sums inside the parentheses can be simplified: $$\begin{aligned} \sum_{v\in V \atop v=a^{+}}1 = \left\{\begin{array}{cc} 1 & \text{ if } a^{+}\in V \\ 0 & \text{ otherwise} \end{array}\right. = \mathbf{1}_{V}(a^{+}) & & \text{ and similarly } & & \sum_{v\in V \atop v=a^{+}}1 = \mathbf{1}_{V}(a^{-}) \end{aligned}$$ where $\mathbf{1}_{V}(\cdot)$ denotes the indicator function of the set $V\subset Q_0$. Moreover, $\sum_{v\in V} \epsilon_{v} > -1$. It follows that: $$\begin{aligned} 1 & > \sum_{a\in Q_1}\left({{\bf 1}}_{V}(a^{+}) - {{\bf 1}}_{V}(a^{-})\right)\\ & = \sum_{a\in A_{1}}\left({{\bf 1}}_{V}(a^{+}) - {{\bf 1}}_{V}(a^{-})\right) + \sum_{a\in A_{2}}\left({{\bf 1}}_{V}(a^{+}) - {{\bf 1}}_{V}(a^{-})\right) + \sum_{a\in A_{3}}\left({{\bf 1}}_{V}(a^{+}) - {{\bf 1}}_{V}(a^{-})\right) \\ & + \sum_{a\in A_{4}}\left({{\bf 1}}_{V}(a^{+}) - {{\bf 1}}_{V}(a^{-})\right)\end{aligned}$$ We bound each of these four sums individually. For example, by definition if $a\in A_{1}$ then $a^{+},a^{-}\in V$. Hence $\displaystyle \sum_{a\in A_{1}}\left({{\bf 1}}_{V}(a^{+}) - {{\bf 1}}_{V}(a^{-})\right) = 0$. Appealing to the definitions of $A_{2},A_{3}$ and $A_{4}$ we similarly get that $\displaystyle \sum_{a\in A_{2}}\left({{\bf 1}}_{V}(a^{+}) - {{\bf 1}}_{V}(a^{-})\right) = 0$, $\displaystyle \sum_{a\in A_{3}}\left({{\bf 1}}_{V}(a^{+}) - {{\bf 1}}_{V}(a^{-})\right) = |A_3|$ and $\displaystyle \sum_{a\in A_{4}}\left({{\bf 1}}_{V}(a^{+}) - {{\bf 1}}_{V}(a^{-})\right) = -|A_4|$. Hence: $$1 > |A_3| - |A_4| \quad \Rightarrow |A_4| > (|A_3| + |A_4|)/2 - 1/2 \label{eq:Bound_on_A4}$$ Now removing $A_3$ and $A_4$ disconnects $V$ and $V^c$ in the underlying graph $\Gamma$. By assumption $\Gamma$ is $r$-edge-connected, so $|A_3| + |A_4| \geq r$. From $|A_4| > r/2 - 1/2$ and so $|A_4| \geq \lfloor r/2 \rfloor$.\ Recall that $B = Q_1\setminus Q_1^{'}$ where $Q^{'}_1$ is the arrow set of $\text{supp}(R)$. Because $V$ is $Q_1^{'}$-successor closed, no arrow leaving $V$ can be in $Q^{'}_1$. But by definition $A_{4}$ is the set of arrows in $Q_1$ leaving $V$, hence $A_4\subset B$. Thus $|B|\geq |A_4| \geq \lfloor r/2\rfloor$. The complete bipartite quiver {#sec:ProofBipartite} ----------------------------- If one is careful in picking the orientation of arrows in $Q$, one can guarantee that $\delta_Q$ is generic, and hence use the Theorem \[thm:main\] and Theorem \[thm:PolarConvex\] to compute the vertex presentations of $k$-neighborly polytopes. \[lemma:BipartiteGeneric\] Let $Q_{p,q}$ denote the complete bipartite quiver with partition $Q_{0} = Q_{L}\cup Q_{R}$ where $|Q_{L}| = p$, $|Q_{R}| = q$, and arrows oriented left-to-right. Then $\delta_{Q_{p,q}}$ is generic. Suppose $\delta_{Q_{p,q}}$ is not generic. Then there exists a representation $R$ which is semi-stable but not stable. Letting $Q^{'} = \text{supp}(R)$, this means that there exists a $Q^{'}$-successor closed proper subset $V \subset Q_0$ with $\displaystyle\sum_{i\in V} \delta_{Q}(i) = 0$. Define $n_{L} =|V\cap Q_{L}|$ and $n_{R} = |V \cap Q_{R}|$. Because every arrow is oriented left to right: $$\delta_{Q}(i) = -q \text{ for } i\in Q_{L} \text{ and } \delta_{Q}(i) = p \text{ for } i \in Q_{R}$$ Hence: $$0 = \sum_{i\in V} \delta_{Q}(i) = -qn_{L} + pn_{R} \label{eq:sumCoprime}$$ As $p$ and $q$ are co-prime, equation can only hold when $n_{L} = p$ and $n_{R} = q$, contradicting the assumption that $V$ is a proper subset of $Q_{0}$. Since the edge connectivity of $K_{p,q}$ is $\min\{p,q\}$, one can immediately apply Theorem \[thm:main\] to get that $P^{\Delta}(Q_{p,q},\delta_{Q_{p,q}})$ is at least $\left(\min\{p,q\}/2 - 1\right)$-neighborly. However, because we know the orientation, we can say more: \[lemma:BipartiteNeighborly\] The polytope $P^{\Delta}(Q_{p,q},\delta_{Q_{p,q}})$ is $(\min\{p,q\}-1)$-neighborly. We assume that $q < p$ (the proof for $q > p$ is similar), and we retrace the steps in the proof of Theorem \[thm:main\]. Let $R \in Z(Q_{p,q},\delta_{p,q})$ with $Q^{'} = \text{supp}(R)$. Let $V$ be a $Q^{'}$-successor closed vertex set such that $\displaystyle \sum_{i\in V}\delta_{{Q}_{p,q}}(i) < 0$ and define $A_1,A_2,A_3,A_4$ as in §\[sec:mainProof\]. It follows by the logic of the proof of Theorem \[thm:main\] that if $|A_4| \geq q$ then indeed $P^{\Delta}(Q_{p,q},\delta_{Q_{p,q}})$ is at least $(q-1)$-neighborly, which is what we show.\ Define $n_{L} =|V\cap Q_{L}|$ and $n_{R} = |V \cap Q_{R}|$. We shall show that for every possible value of $n_{L}$, $|A_4| \geq q$. By a short calculation one can verify that $$|A_4| = n_{L}(q - n_R) \label{eq:ComputeA4}$$ By assumption on $V$: $$\sum_{i\in V}\delta_{Q}(i) = -qn_{L} + pn_{R} < 0 \Rightarrow n_{R} < \frac{q}{p}n_{L} \label{eq:NLNR}$$ Combining and we get: $$|A_{4}| > n_{L}\left(q - \frac{q}{p}n_{L}\right) = -\frac{q}{p}n_{L}^{2} + qn_{L} =: f(n_{L}) \label{eq:A4Combined}$$ *A priori* $0 \leq n_{L} \leq p$. If $n_{L} = p$ then, because $V$ is assumed to be a proper subset of $Q$, $n_{R} \leq q-1$. It follows from that $|A_4| \geq p > q$. If $n_{L} = 1$ then from because $\frac{q}{p} < 1$ we have $n_{R} = 0$. Then $|A_{4}| = 1(q - 0) = q$. An analogous argument shows that if $n_{L} = p-1$ then $|A_{4}| \geq q$. Moreover if $n_{\ell} = 0$, equation implies that $n_{r} < 0$, which is not possible. We finish the proof by showing that for $2\leq n_{L} \leq p-2$ we have $f(n_{L}) \geq q$ and appealing to .\ By elementary calculus, one can verify that on the interval $[2,p-2]$, the function $f(n_{\ell})$ is concave down, and hence achieves its minimum at the endpoints. That is, $f(n_{\ell}) \geq f(2) = f(p-2) = q(2 - \frac{4}{p})$ for all $2\leq n_{\ell} \leq p-2$. By assumption $p \geq 4$, and so $q(2 - \frac{4}{p})\geq q$. Lemmas \[lemma:BipartiteNeighborly\] and \[lemma:BipartiteGeneric\] together give Theorem \[thm:BipartitePolytopes\]. Note that from (2) of Theorem \[thm:PQT\] the dimension of $P^{\Delta}(Q_{p,q},\delta_{Q_{p,q}})$ is $pq - (p+q) + 1$ and by (3) of Theorem \[thm:PQT\] $P(Q_{p,q},\delta_{Q_{p,q}})$ has $pq$ facets, hence $P^{\Delta}(Q_{p,q},\delta_{Q_{p,q}})$ has $pq$ vertices. Conclusions and Further Questions ================================= Certainly there are other explicit families, as in Theorem 1.2, of quivers for which it can be shown that $\delta_{Q}$ is generic. The reader is invited to check, for example, that a similar construction starting with a [*tripartite*]{} graph with $V = V_1 \cup V_2 \cup V_3$ and $|V_i| = p_i$ with the $p_i$ pairwise coprime will also yield a quiver with $\delta_Q$ generic. Could a well-chosen family of quivers provide polytopes with even better neighborliness properties? A second intriguing question would be to extend our approach to centrally-symmetric (cs) polytopes. Recall that a polytope $P$ is cs if for all ${{\bf x}}\in P$, $-{{\bf x}}$ is also in $P$. A cs polytope is cs-$k$-neighborly if any set of $k$ vertices, no two of which are antipodal, spans a face. Comparatively little is known about such polytopes [@Barvinok2013]. We leave these questions to future research.
Non-equivalent cooperation between the two nucleotide-binding folds of P-glycoprotein. To identify the roles of the two nucleotide-binding folds (NBFs) in the function of human P-glycoprotein, a multidrug transporter, we mutated the key lysine residues to methionines and the cysteine residues to alanines in the Walker A (WA) motifs (the core consensus sequence) in the NBFs. We examined the effects of these mutations on N-ethylmaleimide (NEM) and ATP binding, as well as on the vanadate-induced nucleotide trapping with 8-azido-[alpha-32P]ATP. Mutation of the WA lysine or NEM binding cysteine in either of the NBFs blocked vanadate-induced nucleotide trapping of P-glycoprotein. These results suggest that if one NBF is non-functional, there is no ATP hydrolysis even if the other functional NBF contains a bound nucleotide, further indicating the strong cooperation between the two NBFs of P-glycoprotein. However, we found that the effect of NEM modification at one NBF on ATP binding at the other NBF was not equivalent, suggesting a non-equivalency of the role of the two NBFs in P-glycoprotein function.
Progress thread support currently does not work, and may never be fully implemented. If you remove that configure option, it should work. I'm pretty sure we only left that option so developers could play at fixing it, though I don't know of anyone actually making the attempt at the moment (certainly, it would require significant changes to ORTE).
Electronic devices in the context of this application are understood to mean what are called organic electronic devices, which contain organic semiconductor materials as functional materials. More particularly, these are understood to mean OLEDs. The structure of OLEDs in which organic compounds are used as functional materials is described, for example, in U.S. Pat. No. 4,539,507, U.S. Pat. No. 5,151,629, EP 0676461 and WO 98/27136. In general, the term OLEDs is understood to mean electronic devices which have one or more layers comprising organic compounds and emit light on application of electrical voltage. In electronic devices, especially OLEDs, there is great interest in improving the performance data, especially lifetime, efficiency and operating voltage. In these aspects, it has not yet been possible to find any entirely satisfactory solution. A great influence on the performance data of electronic devices is possessed by layers having a hole-transporting function, for example hole-injecting layers, hole transport layers, electron blocker layers and also emitting layers. For use in these layers, there is a continuous search for new materials having hole-transporting properties. It is known in the prior art that triarylamines can be used in these layers as materials having hole-transporting properties. The triarylamines may be monotriarylamines as described, for example, in JP 1995/053955, WO 2006/123667 and JP 2010/222268, or bis- or other oligoamines, as described, for example, in U.S. Pat. No. 7,504,163 or US 2005/0184657. Known examples of triarylamine compounds as materials having hole-transporting properties for OLEDs include tris-p-biphenylamine, N,N′-di-1-naphthyl-N,N′-diphenyl-1,1′-biphenyl-4,4′-diamine (NPB) and 4,4′,4″-tris(3-methylphenylphenylamino)triphenylamine (MTDATA). Additionally known in the prior art is the use of spirobifluorene-arylamino compounds in OLEDs, including as hole transport materials (WO 2012/034627 and WO 2013/120577).
David Tyler (businessman) David Alan Tyler (born 23 January 1953) is a British business executive. , the chairman of Hammerson, and the chairman of Domestic and General. He is a former chairman of Sainsbury's, Logica and a former finance director of GUS. Personal background Tyler was educated at Rendcomb College from 1965 to 1970. He then read economics at Trinity Hall, Cambridge from 1971 to 1974, earning a bachelor's degree in 1974 and a master's degree in 1977. He has two children, and lives in central London with his wife, Margaret Fingerhut, the concert pianist. Professional background In 1974, Tyler joined Unilever as a management trainee. He worked there at Birds Eye, Wall's Ice Cream, BOCM Silcock and at Unilever's London headquarters on corporate strategy and on its agribusiness activities. He also qualified with CIMA as a management accountant, later becoming a FCMA and also a member of the Association of Corporate Treasurers. He then worked for National Westminster Bank as group financial controller and finance director of NatWest Investment Bank between 1986 and 1989, before being recruited as group finance director by Christie's, spending seven years there, which included two in New York City as president of Christie's American business. This was followed by ten years at GUS from 1997 to 2006 as group finance director. After the demerger of GUS, he entered into a plural career, becoming chairman of 3i Quoted Private Equity Plc (2007–09), chairman of Logica (2007–12), chairman of J. Sainsbury plc (2009 to 2019), chairman of Hammerson plc (2013 to date) and chairman of Domestic and General (2015 to date). He has been a non-executive director of Burberry (2002 to 2015), Experian (2006 to 2012) and Reckitt Benckiser (2007–09). Since 2012, Tyler has been chairman of Hampstead Theatre. References Category:1953 births Category:Living people Category:Alumni of Trinity Hall, Cambridge Category:British businesspeople Category:British corporate directors Category:People educated at Rendcomb College Category:Sainsbury's people
Q: How to do markererclusterer in android using both map apiv2 or map api v3 and do plz tell me the right emulator specification... can it be error of emulator...... I have tried by following links https://www.google.co.in/?gws_rd=cr&ei=iCf5Upm7KsWXrAedkoCoDg#q=marker+cluster+example+in+android http://karnshah8890.blogspot.in/2013/04/clustering-on-google-map-v2.html https://developers.google.com/maps/documentation/android/utility/marker-clustering https://developers.google.com/maps/documentation/android/utility/marker-clustering http://stackoverflow.com/questions/7447350/android-maps-point-clustering http://stackoverflow.com/questions/14204554/google-maps-marker-clusters-in-android https://github.com/twotoasters/clusterkraf/ https://github.com/nodesagency-mobile/Android-Google-Map-V2-Sample https://github.com/googlemaps/android-maps-utils/tree/master/demo/src/com/google/maps/android/utils/demo/model https://github.com/Bersh/MarkersCluster/blob/master/res/menu/activity_main.xml https://github.com/damianflannery/Polaris/blob/clustering/sample/src/com/cyrilmottier/android/polarissample/util/Config.java http://umut.tekguc.info/en/content/google-android-map-v2-step-step http://stackoverflow.com/questions/15495171/cluster-markers-in-google-maps-android-v2/15510054#15510054 I am trying to build the app which need marker clustered so i have tried by so many times read the Google API create the demo but every time it show error suggest me also that the web application is using map API v3 clustering the marker which API i have to used API v2 or apiv3 of map to build an app please help me out i am newbie at android or give me some link where i can found my solution .............................mainactivity class.......................................... package com.example.cluster; import java.util.ArrayList; import java.util.LinkedHashMap; import java.util.concurrent.ExecutionException; import android.graphics.Bitmap; import android.graphics.BitmapFactory; import android.graphics.Point; import android.os.Bundle; import android.support.v4.app.FragmentActivity; import android.view.Menu; import com.example.demo.MarkerClusterizer; import com.google.android.gms.maps.CameraUpdateFactory; import com.google.android.gms.maps.GoogleMap; import com.google.android.gms.maps.MapFragment; import com.google.android.gms.maps.model.BitmapDescriptorFactory; import com.google.android.gms.maps.model.CameraPosition; import com.google.android.gms.maps.model.LatLng; import com.google.android.gms.maps.model.MarkerOptions; public class MainActivity extends FragmentActivity { private ArrayList<MarkerOptions> markers = new ArrayList<MarkerOptions>(); private Bitmap markerImage; private float oldZoom = 0; private GoogleMap map; private static final int INTERVAL = 25; private LinkedHashMap<Point, ArrayList<MarkerOptions>> clusters; private final double initLat1 = 40.462740; private final double initLng1 = 30.039572; private final double initLat2 = 48.462740; private final double initLng2 = 35.039572; private static final int MAP_ZOOM_LEVEL = 4; @Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); setContentView(R.layout.activity_main); markerImage = BitmapFactory.decodeResource(this.getResources(), R.drawable.ic_launcher); map= ((MapFragment)getFragmentManager().findFragmentById(R.id.map)).getMap(); map.getUiSettings().setMyLocationButtonEnabled(true); LatLng position = new LatLng(initLat2, initLng2); map.animateCamera(CameraUpdateFactory.newLatLngZoom(position, MAP_ZOOM_LEVEL)); map.setOnCameraChangeListener(new GoogleMap.OnCameraChangeListener() { @Override public void onCameraChange(CameraPosition cameraPosition) { if (cameraPosition.zoom != oldZoom) { try { clusters = MarkerClusterizer.clusterMarkers(map, markers, INTERVAL); } catch (ExecutionException e) { e.printStackTrace(); } catch (InterruptedException e) { e.printStackTrace(); } } oldZoom = cameraPosition.zoom; } }); createMarkers(map); } @Override public boolean onCreateOptionsMenu(Menu menu) { getMenuInflater().inflate(R.menu.main, menu); return true; } private void createMarkers(GoogleMap map) { double initLat; double initLng; initLat = initLat1; initLng = initLng1; for (float i = 0; i < 2; i += 0.2) { LatLng pos = new LatLng(initLat + i, initLng + i); markers.add(new MarkerOptions().position(pos).icon(BitmapDescriptorFactory.fromBitmap(markerImage))); } initLat = initLat2; initLng = initLng2; for (float i = 0; i < 2; i += 0.2) { LatLng pos = new LatLng(initLat + i, initLng); markers.add(new MarkerOptions().position(pos).icon(BitmapDescriptorFactory.fromBitmap(markerImage))); } for (float i = 0; i < 2; i += 0.2) { LatLng pos = new LatLng(initLat, initLng + i); markers.add(new MarkerOptions().position(pos).icon(BitmapDescriptorFactory.fromBitmap(markerImage))); } } } ...............................markerclusterizer class............................... package com.example.demo; import java.util.ArrayList; import java.util.LinkedHashMap; import java.util.concurrent.ExecutionException; import android.graphics.Point; import android.os.AsyncTask; import com.google.android.gms.maps.GoogleMap; import com.google.android.gms.maps.Projection; import com.google.android.gms.maps.model.MarkerOptions; public class MarkerClusterizer { private static GoogleMap map; private static int interval; private static final int DEFAULT_INTERVAL = 25; public static LinkedHashMap<Point,ArrayList<MarkerOptions>>clusterMarkers(GoogleMap googleMap, ArrayList<MarkerOptions> markers) throws ExecutionException, InterruptedException { return clusterMarkers(googleMap, markers, DEFAULT_INTERVAL); } @SuppressWarnings("unchecked") public static LinkedHashMap<Point, ArrayList<MarkerOptions>> clusterMarkers(GoogleMap googleMap, ArrayList<MarkerOptions> markers, int i) throws ExecutionException, InterruptedException { map=googleMap; interval=i; Projection projection=map.getProjection(); LinkedHashMap<MarkerOptions, Point> points=new LinkedHashMap<MarkerOptions, Point>(); for(MarkerOptions markerOptions:markers){ points.put(markerOptions, projection.toScreenLocation(markerOptions.getPosition())); markerOptions.title(""); } map.clear(); CheckMarkersTask checkMarkersTask=new CheckMarkersTask(); checkMarkersTask.execute(points); return checkMarkersTask.get(); } private static class CheckMarkersTask extends AsyncTask<LinkedHashMap<MarkerOptions, Point>, Void, LinkedHashMap<Point, ArrayList<MarkerOptions>>> { private double findDistance(float x1, float y1, float x2, float y2) { return Math.sqrt(((x2 - x1) * (x2 - x1)) + ((y2 - y1) * (y2 - y1))); } @Override protected LinkedHashMap<Point, ArrayList<MarkerOptions>> doInBackground(LinkedHashMap<MarkerOptions, Point>... params) { LinkedHashMap<Point, ArrayList<MarkerOptions>> clusters = new LinkedHashMap<Point, ArrayList<MarkerOptions>>(); LinkedHashMap<MarkerOptions, Point> points = params[0]; for (MarkerOptions markerOptions : points.keySet()) { //go thru all markers Point point = points.get(markerOptions); double minDistance = -1; //Currently found min distance. This need for finding nearest point. Point nearestPoint = null; //Currently found nearest point double currentDistance; for (Point existingPoint : clusters.keySet()) { //try to find existing cluster for current marker currentDistance = findDistance(point.x, point.y, existingPoint.x, existingPoint.y); if ((currentDistance <= interval) && ((currentDistance < minDistance) || (minDistance == -1))) { minDistance = currentDistance; nearestPoint = existingPoint; } } if (nearestPoint != null) { clusters.get(nearestPoint).add(markerOptions); } else { ArrayList<MarkerOptions> markersForPoint = new ArrayList<MarkerOptions>(); markersForPoint.add(markerOptions); clusters.put(point, markersForPoint); } } return clusters; } @Override protected void onPostExecute(LinkedHashMap<Point, ArrayList<MarkerOptions>> clusters) { for (Point point : clusters.keySet()) { ArrayList<MarkerOptions> markersForPoint = clusters.get(point); MarkerOptions mainMarker = markersForPoint.get(0); int clusterSize = markersForPoint.size(); if (clusterSize > 1) { mainMarker.title(Integer.toString(clusterSize)); } map.addMarker(mainMarker); } } } } ![..............activity_main.xml............................................... <RelativeLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="match_parent" android:paddingBottom="@dimen/activity_vertical_margin" android:paddingLeft="@dimen/activity_horizontal_margin" android:paddingRight="@dimen/activity_horizontal_margin" android:paddingTop="@dimen/activity_vertical_margin" tools:context=".MainActivity" > <fragment android:id="@+id/map" android:name="com.google.android.gms.maps.MapFragment" android:layout_width="wrap_content" android:layout_height="match_parent"/>t </RelativeLayout> ..................manifest.xml................................................ <?xml version="1.0" encoding="utf-8"?> <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.example.cluster" android:versionCode="1" android:versionName="1.0" > <uses-sdk android:minSdkVersion="8" android:targetSdkVersion="17" /> <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION" /> <uses-permission android:name="android.permission.ACCESS_COARSE_LOCATION" /> <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE" /> <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" /> <uses-permission android:name="android.permission.INTERNET" /> <uses-permission android:name="com.google.android.providers.gsf.permission.READ_GSERVICES" /> <permission android:name="com.example.cluster.permission.MAPS_RECEIVE" android:protectionLevel="signature" /> <uses-permission android:name="com.example.demo.permission.MAPS_RECEIVE" /> <uses-feature android:glEsVersion="0x00020000" android:required="true"/> <application android:allowBackup="true" android:icon="@drawable/ic_launcher" android:label="@string/app_name" android:theme="@style/AppTheme" > <activity android:name="com.example.cluster.MainActivity" android:label="@string/app_name" > <intent-filter> <action android:name="android.intent.action.MAIN" /> <category android:name="android.intent.category.LAUNCHER" /> </intent-filter> </activity> <meta-data android:name="com.google.android.maps.v2.API_KEY" android:value="AIzaSyDqFw-lJjvppil-ixpHjBolINPqJO2b83Q" /> </application> </manifest>][1] A: Though I do so much R$D I found for single package name you have to generate single Api key for developing the map in android. though i have done create 2 3 api key for different project with same package name.
UNPUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT No. 13-1962 BESSIE MILLER, Plaintiff - Appellant, v. BALTIMORE CITY BOARD OF SCHOOL COMMISSIONERS; KEVIN SEAWRIGHT, Special Assistant to the COO Baltimore City Public Schools System; JEROME JONES, Labor Relations Associate Baltimore City Public School System, Defendants - Appellees. Appeal from the United States District Court for the District of Maryland, at Baltimore. William D. Quarles, Jr., District Judge. (1:10-cv-02038-WDQ) Submitted: March 31, 2014 Decided: April 10, 2014 Before NIEMEYER and THACKER, Circuit Judges, and DAVIS, Senior Circuit Judge. Affirmed by unpublished per curiam opinion. John H. Morris, Jr., Baltimore, Maryland, for Appellant. Edmund J. O’Meally, PESSIN KATZ LAW, P.A., Towson, Maryland, for Appellees. Unpublished opinions are not binding precedent in this circuit. PER CURIAM: Bessie Miller appeals the district court’s grant of summary judgment on her claim that the Baltimore City Board of School Commissioners (“the Board”) and its representatives violated her due process rights by coercing her retirement from her position as a school cafeteria manager. We affirm. We review de novo a district court’s order granting summary judgment, Bonds v. Leavitt, 629 F.3d 369, 380 (4th Cir. 2011), taking the facts in the light most favorable to Miller. Scott v. Harris, 550 U.S. 372, 380 (2007). In order to proceed on her due process claim, Miller was required to produce sufficient evidence “that [she] has a constitutionally protected ‘liberty’ or ‘property’ interest, and that [she] has been ‘deprived’ of that protected interest by some form of ‘state action’[.]” Stone v. Univ. of Md. Med. Sys. Corp., 855 F.2d 167, 172 (4th Cir. 1988) (internal citation omitted). Although the parties do not dispute that Miller had a protected interest in her continued employment, Miller contends that the Board coerced her relinquishment of that interest by placing her on suspension without pay. As we have explained, “[i]f [an employee] resign[s] of [her] own free will even though prompted to do so by events set in motion by [her] employer, [she] relinquished [her] property interest voluntarily and thus cannot establish that the state 2 ‘deprived’ [her] of it within the meaning of the due process clause.” Id. at 173. However, “[a] public employer obviously cannot avoid its constitutional obligation to provide due process by the simple expedient of forcing involuntary resignations.” Id. (internal quotation marks omitted). Accordingly, where an employee’s purported “resignation was so involuntary that it amounted to a constructive discharge, it must be considered a deprivation by state action triggering the protections of the due process clause.” Id. (internal quotation marks omitted). Generally, we have found resignations involuntary “where forced by . . . duress or coercion.” Id. at 174. Thus, we must examine whether the Board’s conduct deprived Miller of “a free and informed choice” regarding her retirement. Id. (discussing factors courts consider in making this objective determination). The common thrust of Miller’s arguments on appeal is that the facts of her case are distinguishable from those we examined in Stone. To that end, Miller first notes that, unlike the plaintiff in Stone, she is not a sophisticated, well- educated employee with considerable experience and seniority. However, Miller fails to appreciate that, also unlike in Stone, she was not rushed to accept the Board’s offer of a demotion, and she had, at all pertinent times, the aid of her union representative or counsel. Accordingly, as in Stone, there is 3 no concern that Miller either misunderstood her rights or was not granted an ample opportunity to discover them. Miller has never argued to the contrary, and, moreover, Miller was able to choose retirement, an option not even offered by the Board. See id. at 177-78. Next, Miller suggests that the Board lacked good cause to threaten her with termination, especially in light of the purported admission of a Board representative that he knew Miller had taken no money. Miller does not dispute, however, that the Board had sufficient evidence to accuse her of failing to comply with proper money handling procedures, regardless of whether she in fact misappropriated funds. Nor does Miller claim on appeal that her alleged mismanagement of cafeteria funds was insufficient to warrant her demotion or termination. See id. at 177. Finally, Miller asserts that her retirement was involuntary because, despite her request for further discussions regarding possible retaliation, the Board remained idle and stranded her in the financially untenable position of suspension without pay. Thus, Miller contends that the circumstances motivating her choice to retire were appreciably more coercive than those we examined in Stone. See id. at 170-71. Contrary to Miller’s suggestion that the voluntariness of an employee’s decision when facing the threat of termination turns on whether 4 the employee had the option of participating in some form of disciplinary process, we have explicitly cautioned against analyzing the willfulness of an employee’s actions in terms of a “waiver” of the process the employee might have otherwise received or been due. Id. at 173 n.7. Instead, “the proper analysis . . . recognize[s] that the public employee who resigns voluntarily has no procedural rights to waive because [she] has suffered no deprivation at the hands of the state.” Id. Accordingly, we conclude that the Board’s offer of a choice between demotion or termination was not coercive. ∗ See Shealy v. Winston, 929 F.2d 1009, 1011-13 (4th Cir. 1991) (finding retirement voluntary where employee was offered choice of retirement or demotion in rank). Accordingly, because Miller, with a full understanding of her options, voluntarily chose to retire, we affirm the district court’s judgment. We dispense with oral argument because the facts and legal contentions are adequately presented ∗ Although Miller also cites the Board’s failure to respond to her invitation to discuss whether the allegations against her might be motivated by her recent worker’s compensation claim as further evidence of coercion, Miller improvidently assumes that the Board was obliged to entertain or grant her request. Because the majority of Miller’s suspension without pay was precipitated by her ultimately ill-advised decision to attempt to engage the Board in negotiations it had no obligation to undertake, there was no coercion on the Board’s part. 5 in the materials before this court and argument would not aid the decisional process. AFFIRMED 6
Menu mantra Today marks my half anniversary of deciding one day that I want to be more active, and randomly thinking right after work “hey, I’m bored. Let’s go to the employee gym and run”. I cannot believe it has been 6 months of me going to the gym on a regular basis, because, 6 months ago, I never thought I’d run, or call myself a runner. 6 months ago, you couldn’t even convince me to do 8 minute abs*. So, to celebrate my six months of running, I decided at that very moment, I would run an 8:34 mile. I dropped the weights, and walked over to the treadmill. I stared at it, and asked myself, “Michelle, you’ve never run anything faster than a 10-minute mile. Are you ready to run a mile in 8 minutes and 34 seconds?” I nodded to myself. Done. I’ve signed my own personal contract. I stepped onto the treadmill, and hit “quick start” and held the ^ button until it the speed hit “7.0”. Okay. We’re running. The first minute passed. “Okay, first minute over,” I told myself. “Just do that 8 more times.” The second minute passed. I realized couldn’t figure out how to breathe with the speed I was going at, because, I’ve never sustained a 7.0 mph run. Short, sharp breaths. “It’s okay, another minute has passed. You just have to do that… 7 more times.” The next minute passed, and I still couldn’t figure out my breathing. I was hyperventilating. It hurt my lungs a little, and I was starting to panic. “Don’t worry. You just have to do that…. What was the math? How many minutes left?” I was absolutely miserable. The word “miserable” sounded so pretty. I stared at the stop button. Then I thought to myself, “I’ve never found a mantra to use while running. How could you run without a mantra! God, you’re so weak! You’re so fucking weak. SO. WEAK. If I just had a mantra….You always give up. Always. You’re terrible. Useless. Everyone else can run an 8 minute mile. The world is waiting for you to catch up to them. C’mon, Michelle…everyone is waiting.” I thought I was going to give up, when suddenly, I made up a mantra: “I’m a pussy, but I’ll do it anyway.” Weird. Yet inspiring. Yeah? Yeah! 3:58. 3:59. Yes! 4:00! Almost halfway there! I’m a pussy, but I’ll do it anyway!!! “Finally,” I thought. “I’m about to do something that challenges myself, and I’m about to break my low expectation of myself.” I hit the emergency stop button at 4 minutes. Fuck that. *Wait. You still can’t convince me to do 8 minute abs, because fuck that guy, I hate him. According to my research, his name is Jaime Brenkus, but when I’m doing 8 minute abs, his name is “motherfucker“, “asshole” and other assorted, not-safe-for work names. “If you do this right, it won’t hurt.” Jaime says. First of all, Jamie (“motherfucker!“), it hurts. Second of all, I never get abs, I get a fucking buff-ass neck. Your video should be renamed, “8-minute neck-straining exercises” or “8 minutes in hell” but not “8 minute abs“. And, yeah, okay, I don’t really think you’re an asshole or anything, but you sure are one when I am hurting like hell and you are asking me to “keep going!” because “we are almost done” (lie).
This invention relates generally to treatment of film, and more particularly concerns apparatus to remove dust from film slide surfaces guidedly advanced through a treatment zone, charged ions also being employed to neutralize static on such surfaces. Prior devices have employed nuclear pellets to ionize air blasted over film slides advanced by hand past such devices. The cost of such equipment is objectionable in view of the need for replacement of the nuclear pellets, and also no way was known to effectively treat a large number of such slides advanced in rapid succession. Also, dust temporarily removed from such prior slides tended to settle back on film surfaces.
Rafael Benitez has admitted for the first time that Demba Ba will be considered an equal to Fernando Torres in terms of who starts for Chelsea - and that the competition can "bring the best out of both of them". Previously, the former Newcastle United striker seemed to be seen as a mere back-up for the Spaniard, who has featured regularly for Chelsea this season. But, having scored twice on his debut in the FA Cup against Southampton at the weekend, Ba is already pushing for a primary role. When specifically asked whether Torres is still the team's first-choice striker - particularly since Chelsea mostly play a 4-2-3-1 - Benitez simply said he now has "two good players, two good options, and both will compete". Benitez said: "It is good for me because before I didn't have to think about that [choosing between Torres and another striker]. I'm pleased to be in this position. I prefer to be in a position where I can choose one or the other, keeping Fernando fit and now I can manage. It's important to have options, especially if you have two games in four days. We have different options. "I have an idea, but I'm not going to say it in a press conference. It depends on them how they feel and perform. There's no rule about one playing in this game and the other in the next. I've spoken to Fernando a lot, and with Demba, and they know what I am expecting of them. "We have now two good players, two good options and both will compete. I can see everything positive in terms of the team now. Talking with Demba and Fernando, they both know they have to compete and play well. It can bring the best out of both them."
The Ontario provincial election is still too close to call, with election day a week out. What began with Rob Ford and the Conservatives with a clear lead has become a much closer competition. Since May 1, Andrea Horwath and the NDP have been steadily rising in the polls: Slated to snag seats long held by the Liberal and Conservative parties. CBC's interactive Ontario Poll Tracker This is Horwath’s fourth provincial election—third as leader of the NDP—and she’s got her work cut out for her if she hopes to win. Paying close attention to the opinions and voices of voters across the province is paramount to any politician’s success, and MIREMS makes those voices—otherwise hidden behind language barriers—accessible. MIREMS is currently monitoring 616 multilingual and multicultural media sources in Ontario, ranging from Windsor’s Arabic Almohajer Al Jadeed, South Asian Saanj News in Caledon and Ottawa’s six Arabic and seven Chinese sources. A special collection of editorial and opinion stories from these sources over the past month highlight the role of multilingual and multicultural media in this election as well as Ontario politics year-round. Many reports covered the opinion that voters are leaning towards the NDP the same way they leaned towards the Liberals in the last federal election. The “keep the conservatives out” mentality has certainly moved some voters from Liberal to NDP, but this alone isn’t enough to swing the entire election. As Inacio Natividade wrote for Sol Portugues: “The idea is that given the polarization of the electorate, there’s still an undecided portion in the volatile electorate that could be a surprise factor and give Andrea Horwath a final victory.” The Canadian Punjabi Post called the rise of the NDP in the polls a “big surprise.” Christo Aivalis writing for the Philippine Canadian Inquirer went further. In his article titled: “How an NDP victory in Ontario is a real possibility” Aivalis comments on the surprising turn of events, with the race now almost neck and neck between Horwath and Ford; a contrast to first thoughts of Wynne and Ford’s race adding: “The momentum is with the NDP.” Some sources threw their support behind the NDP. A column in Share, a weekly newspaper serving the Black and Caribbean community in the GTA urges readers to give the NDP “genuine consideration.” Noting that Horwath’s platform’s focus on health care, pharma care and childcare “deeply resonate” with many Ontarians, mentioning as well, her party’s complete ban on police street checks. On CIAO 530 AM Morning with Tejinder Sidhu callers chimed in to support the NDP’s position on auto insurance policies. Other sources shared opinion and editorials that were more critical. Toronto’s Farsi Salam Toronto, a weekly paper weighed in on all three candidates' promises surrounding the price of gas, calling Horwath’s pledge “vague.” And an editorial on 51.ca the online Chinese source out of Toronto says “The New Democratic Party is handing out candy; their candy is sweeter and has nicer packaging than the Liberals'. In the end, however, perhaps voters only get to see the colourful wrappers, but don't actually get to eat the candy.” Multicultural and multilingual media has also given two NDP candidates a direct line to connect with their voters. Kingsley Kwok was introduced to the readers Chinese source Ming Pao Toronto in an article highlighting candidates in the area. Sandra Lozano, a Salvadoran-Canadian candidate for Vaughan-Woodbridge wrote an article for the Spanish source Correo Canadiense saying she’s proud to be the first Latina woman running in her region finishing with “I believe the NDP is the change that Ontario needs, a positive and energetic change." Four years ago, during the last provincial election, MIREMS paid close attention to the multilingual media. The Punjabi Post reported in 2014 on Horwath’s campaign launch in the incredibly multilingual and diverse city of Brampton where MIREMS monitors 22 multilingual and multicultural sources. This year, the NDP party leader kicked off her campaign in Hamilton, which has six sources covered by MIREMS consultants. As the next two weeks unfold, the polls will make their predictions, and news sources across the province will stay on the election trail. Ensuring that all Ontario voices are accessible is the foundation of MIREMS’ work, and could hold the key to swinging voters and winning seats. MIREMS 2014 Ontario Election Sample Report Look back at some stories and headlines from the 2014 election, as told to Ontario's multilingual and multicultural communities.
Q: How to find the difference between two timestamped rows whenever value changes between rows in MySQL My Data Set looks like this: The Output given in column D is derived as follows: Output against index 2 : TimeStamp in Index 3 - TimeStamp in Index 2 Output against index 6 : TimeStamp in Index 10 - TimeStamp in Index 6 Output against index 12 : TimeStamp in Index 15 - TimeStamp in Index 12 DataSet MySQL V2012 create table #temp11 (Index# int, TimeStamp# Datetime, Alarm int) insert into #temp11 values (1, '10/6/2019 00:08:01', 0), (2, '10/6/2019 00:08:13' ,1), (3, '10/6/2019 00:08:15' ,1), (4, '10/6/2019 00:10:47' ,0), (5, '10/6/2019 00:10:58' ,0), (6, '10/6/2019 00:10:59' ,1), (7, '10/6/2019 00:11:00' ,1), (8, '10/6/2019 00:11:01' ,1), (9, '10/6/2019 00:11:02' ,1), (10, '10/6/2019 00:11:03' ,1), (11, '10/6/2019 00:11:04' ,0), (12, '10/6/2019 00:11:05' ,1), (13, '10/6/2019 00:11:06' ,1), (14, '10/6/2019 00:11:07' ,1), (15,'10/6/2019 00:11:15' ,1) TIA A: This is a variant of the gaps-and-islands problem. Here is one way to solve it using window functions (available in MySQL 8.0): select t.*, case when alarm = 1 and row_number() over(partition by alarm, rn1 - rn2 order by TimeStamp) = 1 then timestampdiff( second, min(TimeStamp) over(partition by alarm, rn1 - rn2), max(TimeStamp) over(partition by alarm, rn1 - rn2) ) end out from ( select t.*, row_number() over(order by TimeStamp) rn1, row_number() over(partition by alarm order by TimeStamp) rn2 from mytable t ) t The inner query ranks record in the whole table and in partition of records sharing the same alarm. The difference between the ranks gives you the group each record belong to. Then, the outer query identifies the first record in each group with alarm = 1, and computes the difference between the first and last record in the group, in seconds.
Abdominal fat distribution and disease: an overview of epidemiological data. Recent prospective, epidemiological research has demonstrated the power of an increased waist/hip circumference ratio (WHR) to predict both cardiovascular disease (CVD) and non-insulin dependent diabetes mellitus (NIDDM) in men and women. Obesity, defined as an increased total body fat mass, seems to interact synergistically in the development of NIDDM, but not of CVD. Increased WHR with obesity (abdominal obesity) seems to be associated with a cluster of metabolic risk factors, as well as hypertension. This metabolic syndrome is closely linked to visceral fat mass. Increased WHR without obesity may instead be associated with lift style factors such as smoking, alcohol intake, physical inactivity, coagulation abnormalities, psychosocial, psychological and psychiatric factors. Direct observations show, and the risk factor associations further strengthen the assumption, that abdominal (visceral) obesity is more closely associated to NIDDM than CVD, while an increased WHR without obesity may be more closely linked to CVD than NIDDM. It remains to be established to what extent, if any, an increased WHR in lean men, and particularly in lean women, indicates fat distribution. Other components of the WHR measurement might be of more importance in this connection.
OITNB S4 E10 “Bunny, Skull, Bunny, Skull” was about: * Instead of a flashback, OITNB does a deep-dive into Aleida’s release from Litchfield. Aleida is released with nothing but her clothes, is picked up by Caesar’s other girlfriend, and finds out her nest egg was used without permission by her relatives. * Daya’s adjustment to life without her Mother with her inside Litchfield. Gloria tries to keep her away from the Dominican gang in the beauty shop but Daya ignores her saying that she wants to be around people her own age. Daya offers to do nail art, including alternating nails with bunny, skull, bunny, skull. * The continuing extra-judicial punishment of Blanca (who is being forced to stand on a table in the mess hall until she either apologizes or drops from exhaustion). The CO’s inform the rest of the inmates that if anyone helps Blanca they will be punished too. Piper decides what is happening is inappropriate and takes it to Piscatella who tells her to take her complaint and shove it up her ass (more or less). Piper responds by giving Blanca food. CO Dixon sees Piper’s gesture and orders her to stand on the table next to Blanca. * Sister Ingalls continuing attempts to acquire proof that Sophia is in the SHU. Things go horribly wrong when the cell phone she is hiding to take a picture of Sophia is discovered and confiscated. Eventually, Caputo shows up and after ordering Sister Ingalls to remain in SHU, he takes the cell phone, takes a picture of Sophia himself, and then delivers the phone to Danny so that he can use it against MCC (Danny is now a prison reform activist). Danny tells Caputo to let Linda “the Sea Witch,” that he said hello. * Red attempting to keep Nicky from using heroin by threatening all of the drug providers throughout the prison (including CO Dixon). Ultimately, Nicky appears to score marijuana from Luschek and maybe more, which infuriates Red. * Maritza dealing with her horror after being forced to eat a baby mouse by CO Humps (who is apparently a totally insane psychopath). At one point, two of the other CO’s are shown talking about knowing that Humps is disturbed but also committing to back his insanity out of loyalty. * Suzanne deciding to attempt to hook up with Kukudio again. Kukudio pretends to go along and then right as Suzanne is getting really excited, she stops abruptly as revenge for Suzanne walking out on her in the woods behind Litchfield (after everyone visited the Lake last season). * Taystee convincing Caputo to let her show The Wiz on movie night. The playing of the movie almost starts a race war between the Black Girls and the Nazi’s. The CO’s ultimately stop the movie early causing tensions to increase even more. During the increasing tensions, Cindy notices that Judy King leaves instead of standing with her and the rest of the African American girls. No FOIA As we talked about last week, private prison companies are often not under the same reporting requirements as State or Federally run prisons. As a result, abuses are much more easily covered up. If there is no Freedom of Information Act process, it becomes pretty hard to request the records of particular prisoners (like Sophia) or of disciplinary practices (like what the CO’s are doing to Blanca).
/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.alipay.lookout.client; import com.alipay.lookout.api.Registry; /** * Created by kevin.luy@alipay.com on 2017/6/1. */ public interface LookoutClient { /** * get the metrics registry * * @param <T> registry impl * @return metric registry */ <T extends Registry> T getRegistry(); /** * Closes this resource, relinquishing any underlying resources. * * @throws Exception if this resource cannot be closed */ void close() throws Exception; }
Q: how roll back few database on azure I have powershell script which execute sql script on few database. I need write code, which roll back all databases to a previous state, if any error occurred. How to make this mechanism? Each call powerchell script create "bacpac" file. But If I understand correct, this backup can't be roll back to exist database. A: Look up database transactions. They are an integral part of ACID database theory. There are lots of articles about transactions, the Technet page should be decent a starting point.
Sinful S mores Parfait-The only way to describe this dessert is sinful. This S’mores Parfait is quick and easy to make. It only has a few ingredients and it is no bake. It is even on the lighter side of t…
Susan McGrath-Champ - Newsroom articles ABC NewsRadio has interviewed Associate Professor Susan McGrath-Champ about part-time job numbers. Associate Professor McGrath-Champ says there is ongoing demand for part-time work and that is where the main growth is. Australia will be forced to take more workers from abroad to meet the skills and labour needs of the resources 'boom' because of a failure in recent years to train enough tradespeople and technical professionals, writes Associate Professor Susan McGrath-Champ. Read more
At least with Shanahan JC wouldn't be starting completely over since the basics of the WCO would be there. I agree. Its the main reason for us to "pull" for Shanahan to win the job. While I think there's a fairly low "ceiling" with Shanhan (we'll be 8-8 to 10-6 most years), we'd be fairly well positioned for immediate success - especially if he can be convinced to leave the defensive coaching staff and system more or less in tact. My biggest fear with Shanahan is that he'd want to clean house on the entire coaching staff. Shanahan's impatience with defensive coordinators is the #1 reason I think Denver never took it to the next level. I really don't think Shanahan is going to come here and work for Snyder. Especially when he worked for one of the most hands off owners in the NFL. He's not stupid and he doesn't need the money. So what offensive coach with HC experience is going to take this job? Snyder might not have any choice but to keep Zorn. Campbell should be offered every opportunity to stay. He has shown that if he has a decent (note, not good, decent; this O-Line is FAR from good, but it IS gelled together much better than in the beginning of the season) that he is a warrior. Okay, he still has issues, like over throwing, and he is not yet a quarterback that can put the team on his back and win a game when it's do or die ... but if his line can at least open up lanes for the run, and at least keep him standing for longer than three seconds, and his recievers can get on their damned routes and stay there - well, he WILL lead and his team WILL play and fight for him. He's going through his progressions much better, when he's connecting they're for big plays, he was in the top 5 QBs last week, and even after getting pounded into the ground week in and week out behind this just-playably-decent-line, he never complains, he gets up and dusts his arse off, and he goes in there like a damned soldier, and his teammates love him for that. He and his 'mates have been staying after practice, they have been giving it their all when there is absolutely nothing to play for but pride at this point, when they could just give up and no one would really blame them for it. Give this guy a solid line with some depth, allow him to finish transitioning into this offensive scheme, and he is going to be nasty. Maybe not elite, maybe not Bradyish or Favreish, but utterly reliable and a QB that can win us games because the rest of his team is solid. Jason Campbell was never wanted. He could march his team downfield every week for four touchdowns, like Sunday against the Raiders in Washington's most one-sided victory of the two-years-and-out Jim Zorn era. He could come into the game as the fifth-most sacked quarterback in the NFL, dodging large, menacing men paid to hurt him -- behind a duct-tape offensive line that many of those large, menacing men use like Rock Creek Parkway at rush hour -- and it still wouldn't matter. He could keep picking himself up, groggy from another hit, and pull his mud-caked No. 17 jersey over his exposed shoulder pad. On a cold and sloppy field in Northern California, he could win a game of last quarterback standing with knocked-out Bruce Gradkowski and JaMarcus Russell, still running from Andre Carter and Brian Orakpo. It still wouldn't matter. :::SNIP::: He is the most recent model of the impetuous people in control, enraptured by the sound of the train in the distance because they have no faith the one in the station can take them where they want to go. Antonio Pierce, Ryan Clark and Brad Johnson, a quarterback once replaced by another big name that didn't pan out, all have something in common. When the Redskins became enamored by someone else, they left and won Super Bowls elsewhere. Campbell is a restricted free agent in less than a month. Four and nine is 4-9. Understood. But no one can argue his continued progression and improvement the past month, despite losing every genuine offensive weapon he had coming into the season except Santana Moss, not to mention any semblance of experienced protection on his line. :::SNIP::: Campbell never so much as pointed a finger at a guy who failed to block for him or blamed Cerrato for looking out for his personal safety by fortifying the line through the draft. Whatever critical can be said about his play, especially early in the season, he kept taking physical and psychological hits and kept going forward. In many ways, he was the resilient character from the "Friday the 13th" films -- only this Jason was the victim. If the Redskins had shown complete confidence in him to begin with, Moss and others in the locker room sometimes wonder where the team would be. "You do wonder if he had different things in his mind at that point how he would have performed without all the pressure of him thinking he had to show everybody he belonged -- instead of just going out there knowing he was the guy, you know," Moss said Sunday night. "It's not for me to say, but when you go through how much he has this season, when you get plunged into the ground every week, when other people have tried to show you might not be the guy and all you do is say, 'I'm going to show you I belong,' and, 'I'm going to show you I wouldn't quit on you,' you can't turn your back on a guy like that. It's why, when someone quipped how Campbell had a lot in common with Tiger Woods's wife, Elin Nordegren, he managed a half-smile and allowed himself a moment to relish Sunday's game. "That's a good way to put it," he said. "I like that." Whether he stays or goes, Jason Campbell has been nothing if not honorable in the employ of the Washington Redskins. The same can't be said about his fickle bosses, forever convinced something better is out there than the quarterback they put through hell, who still managed to stay loyal and, amazingly, upright, in this crumbling, chaotic season. Amen, Mike. And thank Christ we didn't get either Sanchez or Cutler, despite the stuff I read around here and so many other places about how better off this team would be with either of them instead of The Soup back when the knives were being plunged in his back ... if we'd had either of them behind this line and during this freakshow of a season, things would be so much, much worse. Now, all that said, I think Campbell is out of here no matter what at the end of this season, due in no small part to the disloyalty the team and the fans have shown him, and the freakshow atmosphere this franchise engenders. He is going to be picked up by a thirsty team ready to make him "THE guy" at the position, they'll give him time instead of suffering from ADD and demanding instant perfection in yet another scheme, and he is going to shine and make us look really dumb for having bailed on him before he could show his mettle. The damage has been done, and the 'Skins, IMO, as an organization have no one to blame but themselves for what I see is inevitiable at this point. I hope I'm wrong, but I'm still of the same mind I was a month and a half ago that The Soup can't wait to get the eff out of this circus called the Washington Redskins... As indifferent as management has been towards Jason Campbell of late, I can't help but think what they have seen from him under trying circumstances does not warrant consideration. He's started every game the last two seasons, taken a beating and remained the consumate professional by never complaining. When one takes into consideration the circumstances under which he has had to perform, he IMO has earned the right to be here with a full complement of players surrounding him. Further, Jim Zorn has admitted making mistakes and has learned from them. Because he was stripped of his play-calling duties doen not neccessarily preclude him from being a head coach, many head coaches do not call plays. He has done a masterful job at keeping this team focused and playing hard despite the record, and should be commended for it. This entire unit, Sherm Lewis included, deserves to have the opportunity to build on the momentum they've started over the past several weeks. Changing coaches or QB at this point in time would be a set back as well a mistake. I may get an argument, but again this is just my opinion and some may beg to differ and that's cool too. I didn't read the story but I think most of us kinda figured that he would be here. I mean if there is no CAP then if the team wants to keep him they can for 1 more year. Most likely they would till either they get someone new or their new QB is understanding what he has to do. Latest rumor has the Redskins eyeing Jevan Snead as a late 2nd/early 3rd rounder (means they would have to trade of course). Not as a starter right away, but as someone that can be developed over the next couple of years. Could mean the end of Colt Brennan more than anything it means about Campbell. Snead had a poor year, but I think he's pretty solid. I watched Snead a few times this year and for the life of me can't figure out why someone would draft him in any of the top five rounds. He has NFL tools, but he isn't a football player and he is crazy erratic. Hope this is just another rumor? I just read several reviews that all question his mental toughness. Yikes! That's a death sentence in the NFL. Well now that the offense is hitting on all cylinders and Campbell is playing his best football of his career so far, do you really want to make major changes to the offense? If Sherm Lewis, Jim Zorn, and everybody else is out of D.C. at the end of the season, it may mean yet another new offensive scheme for everybody to learn. If this is the case, do you want to keep Campbell? He'll have to start from scratch just like he's done the past few seasons. Exactly. And then, when the new system hasn't brought a championship in two years, it will be switched again. It would be a good idea for the organization to avoid creating a classic catch-22 situation in which coaches need more than two years to create a successful system while at the same time need success within two years in order to keep their jobs. Exactly. And then, when the new system hasn't brought a championship in two years, it will be switched again. It would be a good idea for the organization to avoid creating a classic catch-22 situation in which coaches need more than two years to create a successful system while at the same time need success within two years in order to keep their jobs. We've been in business 77yrs. with 25 different coaches counting Gibbs twice. The math shows that to be a coaching change on average every 3 yrs. It's time for the constant change to take a bow. I think JC should be back. I think I lot of the problem he was having was due to Zorn's play-calling and o-line protection. I'd say that most of Campbell's problem was his trust in Zorn's play-calling and Zorn's trust in him. I think most people were wrong in assuming that an improved o-line play would be a greater impact than an improved quarterback play (regardless of how the o-line was performing). The offensive line has NOT played overwhelmingly better in the past 4-5 games, but Campbell has. His improved play has the redskins offense significantly playing better as a whole. I think the argument that I made before the redskins offense was performing better is being proven now - there is no greater impact on a team than how the quarterback is playing.
Xu Y, Ouyang T, Li J, et al. Predictive value of BRCA1/2 mRNA expression for response to neoadjuvant chemotherapy in BRCA‐negative breast cancers. Cancer Sci. 2018;109:166--173. <https://doi.org/10.1111/cas.13426> **Funding information** 973 Project (Grant/Award Number: '2013CB911004') National Natural Science Foundation of China (Grant/Award Number: '30973436','81071629'). CI : confidence interval DRFS : distant recurrence‐free survival ER : estrogen receptor HER2 : human epidermal growth factor receptor‐2 OR : odds ratio pCR : pathological complete response PR : progesterone receptor qPCR : quantitative polymerase chain reaction 1. INTRODUCTION {#cas13426-sec-0001} =============== *BRCA1* and *BRCA2* genes play important roles in DNA repair, cell cycle checkpoint control, transcriptional regulation, and ubiquitination.[1](#cas13426-bib-0001){ref-type="ref"}, [2](#cas13426-bib-0002){ref-type="ref"}, [3](#cas13426-bib-0003){ref-type="ref"} Thus, deficiencies in these genes can impact the response of cancer cells to chemotherapy drugs. Several studies have demonstrated that BRCA1 or BRCA2 germline mutation carriers were more sensitive than non‐carriers to chemotherapy drugs.[4](#cas13426-bib-0004){ref-type="ref"}, [5](#cas13426-bib-0005){ref-type="ref"}, [6](#cas13426-bib-0006){ref-type="ref"}, [7](#cas13426-bib-0007){ref-type="ref"}, [8](#cas13426-bib-0008){ref-type="ref"}, [9](#cas13426-bib-0009){ref-type="ref"} However, BRCA1/2 germline mutations are rarely observed in sporadic breast cancer, comprising only approximately 2% of breast cancers overall[10](#cas13426-bib-0010){ref-type="ref"}, [11](#cas13426-bib-0011){ref-type="ref"} and approximately 1.1% of breast cancer cases in China.[12](#cas13426-bib-0012){ref-type="ref"} In addition to BRCA1/2 germline mutations, other BRCA defects, including methylation of the BRCA1 promoter, low expression, and copy number deletions in some sporadic cancers share similar phenotypic characteristics with tumors that carry BRCA1/2 mutations.[13](#cas13426-bib-0013){ref-type="ref"} Decreased BRCA1 mRNA expression in breast cancer cell lines increased sensitivity to etoposide and cisplatin,[14](#cas13426-bib-0014){ref-type="ref"}, [15](#cas13426-bib-0015){ref-type="ref"} whereas overexpression of BRCA1 in murine ovarian cancer cells increased resistance to cisplatin, etoposide, and doxorubicin.[16](#cas13426-bib-0016){ref-type="ref"}, [17](#cas13426-bib-0017){ref-type="ref"} Consistent with these in vitro findings, we previously demonstrated that methylation of the BRCA1 promoter is significantly associated with sensitivity to adjuvant chemotherapy in triple‐negative breast cancer patients and with good outcome.[18](#cas13426-bib-0018){ref-type="ref"} However, several studies also showed that inhibition of BRCA1 expression resulted in resistance to paclitaxel and vincristine.[14](#cas13426-bib-0014){ref-type="ref"}, [19](#cas13426-bib-0019){ref-type="ref"} Moreover, relatively few studies to date have reported the relationship of BRCA2 mRNA expression and response to chemotherapy in breast cancers. Thus, the role of BRCA1 and BRCA2 as predictors of differential response to neoadjuvant chemotherapy in breast cancer has not been well established. In particular, few studies have excluded the effect of BRCA1/2 germline mutations to determine whether BRCA1 or BRCA2 mRNA expression levels contribute to response to chemotherapy agents. To address these problems, we measured mRNA expression levels of BRCA1 and BRCA2 in a cohort of 674 Chinese breast cancer patients without BRCA1/2 germline mutations who received neoadjuvant chemotherapy. We also evaluated the effect of BRCA1 and BRCA2 mRNA expression levels on the prediction of various neoadjuvant chemotherapy regimens. 2. MATERIALS AND METHODS {#cas13426-sec-0002} ======================== 2.1. Patients {#cas13426-sec-0003} ------------- This study included 774 operable primary breast cancer patients (stage I‐III) who received neoadjuvant chemotherapy at the Breast Center, Peking University Cancer Hospital from May 2004 to January 2011. Breast cancer was diagnosed by a core‐needle biopsy using a 14‐gauge needle at the Breast Center. Fresh core‐needle breast tumor samples were available for all patients. Of these 774 patients, 73 patients were excluded because tumor tissue was unavailable or insufficient for BRCA1 and BRCA2 assessment, poor quality of the RNA samples, or bad repeat results of real‐time quantitative PCR. Of these remaining 701 patients, 27 patients were excluded because they carried BRCA1 or BRCA2 germline mutations. Thus, a total 674 breast cancer patients who were assessed and confirmed as negative for BRCA1/2 germline mutations were analyzed in this study. Patient age at diagnosis ranged from 25 to 73 years, with a median of 49 years. Tumors were graded according to the modified Bloom‐Richardson system. Tumor stage was classified according to TNM classification of the Union International Cancer Control. Tumor size was defined as the maximum tumor diameter measured by a mammogram and/or ultrasound at the time of diagnosis. Treatments were obtained from review of medical records. This study was conducted in accordance with the ethics principles of the Declaration of Helsinki and approved by the Research and Ethics Committee of Peking University Cancer Hospital. All patients provided written informed consent. 2.2. Neoadjuvant chemotherapy regimens {#cas13426-sec-0004} -------------------------------------- Among the total 674 BRCA1/2 mutation‐negative patients, 94% received four to eight cycles of neoadjuvant chemotherapy. Treatments were categorized into three subgroups. A total of 531 patients received an anthracycline‐based regimen. Of these, 236 patients received anthracycline regimens; the common regimens were CTF (5‐fluorouracil, pirarubicin, and cyclophosphamide) or FEC (5‐fluorouracil, epirubicin, and cyclophosphamide) regimens, which were described previously;[20](#cas13426-bib-0020){ref-type="ref"} 118 patients received two cycles of anthracycline regimens followed by four cycles of paclitaxel alone (80 mg/m^2^ i.v. once a week for 12 weeks) or docetaxel plus cyclophosphamide (docetaxel 75 mg/m^2^ i.v. on day 1, cyclophosphamide 600 mg/m^2^ i.v. on day 1, every 3 weeks); and 177 patients received two cycles of anthracycline regimens followed by paclitaxel plus carboplatin (paclitaxel 175 mg/m^2^ i.v. on day 1, or paclitaxel 60 mg/m^2^ i.v. on day 1, day 8, and day 15, and carboplatin AUC6, i.v. on day 1, every 3 weeks).A total of 129 patients received a taxane‐based regimen without anthracyclines. Of these, 94 patients received four cycles of paclitaxel alone; 20 patients received paclitaxel plus carboplatin. The remaining 15 patients received docetaxel plus cyclophosphamide.The remaining 14 patients received other regimens. After completion of neoadjuvant chemotherapy, patients were treated with mastectomy (n = 398) or breast‐conserving surgery (n = 276) depending on tumor size, presence of multiple lesions or patient preference. pCR was defined as no invasive breast cancer cells in the breast after completion of neoadjuvant chemotherapy.[21](#cas13426-bib-0021){ref-type="ref"} 2.3. Real‐time quantitative PCR {#cas13426-sec-0005} ------------------------------- Breast tumor RNA was extracted from all core‐needle biopsy samples obtained before the start of neoadjuvant chemotherapy using Trizol reagent (Life Technologies Inc., Gaithersburg, MD, USA) according to the manufacturer\'s instructions. RNA (500 ng) was transcribed to cDNA in a total 20 μL RT reaction solution containing 4.0 μL 5 × first strand buffer, 2.0 μM DTT, 20 U RNase inhibitor, 1 mM dNTP, 1 μM random primer and 200 U superscript II reverse transcriptase (Invitrogen, Carlsbad, CA, USA). Real‐time quantitative PCR reactions of the *BRCA1* and *BRCA2* genes were carried out using the TaqMan Universal PCR Master Mix (Applied Biosystems, Foster City, CA, USA) in the Applied Biosystems StepOne‐plus Real‐time PCR System, following the manufacturer\'s instructions. We used commercially available primers and probes for PCR analyses (TaqMan Gene Expression Assays, Assay ID: Hs01556193_m1 for BRCA1, Hs00609073_m1 for BRCA2, and Hs99999903_m1 for β‐actin as an endogenous control; Applied Biosystems). PCR conditions were as follows: 95°C for 10 minutes, followed by 40 cycles at 95°C for 15 seconds and 60°C for 1 minute. Each sample was assayed in triplicate with RNase‐free water as negative control. Relative gene expression quantifications were calculated according to the comparative Ct method using β‐actin as an endogenous control and normal peripheral blood mononuclear cell RNA control as calibrators in each plate. Final results were determined by the formula 2^−ΔΔCt^ [22](#cas13426-bib-0022){ref-type="ref"} and were analyzed with DataAssist™ software. Results obtained were the mean of three independent experiments. 2.4. BRCA1 and BRCA2 germline mutation analysis by sequencing {#cas13426-sec-0006} ------------------------------------------------------------- Genomic DNA was isolated from peripheral mononuclear blood cells using the phenol‐chloroform assay. *BRCA1* and *BRCA2* genes were screened by PCR sequencing assay as described elsewhere.[23](#cas13426-bib-0023){ref-type="ref"} We screened the entire coding regions and exon‐intron boundaries of BRCA1 and BRCA2 for all 701 breast cancer patients. All fragments were sequenced using the BigDye Terminator Cycle Sequencing Kit and ABI 3730 automated sequencer (Applied Biosystems). Each mutation was confirmed in duplicate. Only the mutations that lead to a truncated protein or that have been previously reported as disease‐associated (according to Breast Cancer Information Core database) were considered to be deleterious. 2.5. ER, PR, and HER2 status {#cas13426-sec-0007} ---------------------------- ER, PR, and HER2 status were determined by immunostaining in the core‐needle biopsy breast cancer tissue obtained before the start of neoadjuvant chemotherapy. ER or PR immunostaining was considered positive when ≥1% of tumor cells showed positive nuclear staining. HER2 positivity was defined as a score of 3 + (immunohistochemistry) or *HER2* gene amplification (FISH) in core‐biopsy breast cancer tissue.[20](#cas13426-bib-0020){ref-type="ref"} 2.6. Statistical analysis {#cas13426-sec-0008} ------------------------- Median values and ranges were calculated for mRNA expression. To provide an easily interpretable evaluation of the effect of BRCA1 and BRCA2 mRNA expression, gene expression values were divided into tertiles. Associations between BRCA1 or BRCA2 mRNA levels, clinicopathological characteristics, and pathological response to neoadjuvant chemotherapy were determined by Pearson\'s chi‐squared test. A logistic regression model was applied to determine whether a factor was an independent predictor of pCR in multivariate analysis. DRFS was defined as the time from the date of diagnosis to first distant recurrence (not including second primary malignancies) or death from breast cancer without a recorded relapse. Survival curves were derived from Kaplan‐Meier estimates and compared using log‐rank tests. All statistical tests were two‐sided, and *P*‐values \<.05 were considered statistically significant. Statistical analyses were carried out using SPSS 20.0 software (SPSS Inc., Chicago, IL, USA). 3. RESULTS {#cas13426-sec-0009} ========== 3.1. Patient characteristics and BRCA1 and BRCA2 mRNA expression levels {#cas13426-sec-0010} ----------------------------------------------------------------------- We studied 674 patients who were previously tested and found to be negative for BRCA1/2 germline mutations.[24](#cas13426-bib-0024){ref-type="ref"}, [25](#cas13426-bib-0025){ref-type="ref"} We carried out quantitative real‐time PCR of BRCA1 and BRCA2 mRNA expressions in the 674 total samples negative for BRCA1/2 germline mutations, using the reference gene of β‐actin for normalization. Relative median mRNA expression levels of BRCA1 and BRCA2 were 1.71 (range 0.03‐34.72) and 1.33 (range 0.03‐43.87), respectively. Patients were subdivided into three groups based on low (0.03‐1.08; mean, 0.57), intermediate (1.10‐2.83; mean, 1.82), and high (2.85‐34.7; mean, 6.73) levels of BRCA1 mRNA relative expression. Patients were also divided into three subgroups based on BRCA2 mRNA relative expression: low (0.03‐0.88; mean, 0.52), intermediate (0.91‐1.89; mean, 1.33), and high (1.92‐68.29; mean, 5.17) levels. Table [1](#cas13426-tbl-0001){ref-type="table-wrap"} shows the clinicopathological characteristics for all patients (n = 674). Patients with low BRCA1 mRNA level were more likely to have ER‐negative (*P* = .002), PR‐negative (*P* = .006), and HER2‐positive expression (*P* = .025), whereas patients with low BRCA2 mRNA level were more likely to be ER‐positive (*P* = .032), PR‐positive (*P* = .01), HER2‐negative (*P* = .011), and lymph node positive (*P* = .027). Patients with low BRCA1 mRNA expression level were also more likely to be triple‐negative (*P* = .014). Neither BRCA1 nor BRCA2 mRNA expression was significantly associated with age at diagnosis or tumor size (Table [1](#cas13426-tbl-0001){ref-type="table-wrap"}). ###### Association of patient and tumor characteristics with BRCA1 or BRCA2 mRNA expression status Characteristic N BRCA1 *P* BRCA2 *P* ---------------------- ----- ------------ ------------ ------------ ------ ------------ ------------ ------------ ------ Age, years 674 225 225 224 .89 224 225 225 .23 ≤50 363 119 (52.9) 124 (55.1) 120 (53.6) 128 (57.1) 124 (55.1) 111 (49.3) \>50 311 106 (47.1) 101 (44.9) 104 (46.4) 96 (42.9) 101 (44.9) 114 (50.7) Tumor size, .55 .16 ≤2 cm 224 81 (36.0) 71 (31.6) 72 (32.1) 78 (34.8) 64 (28.4) 82 (36.4) \>2 cm 450 144 (64.0) 154 (68.4) 152 (67.9) 146 (65.2) 161 (71.6) 143 (63.6) Lymph node status .69 .027 Negative 355 123 (54.7) 119 (53.1) 113 (50.7) 102 (45.7) 130 (58.0) 123 (54.7) Positive 317 102 (45.3) 105 (46.9) 110 (49.3) 121 (54.3) 94 (42.0) 102 (45.3) Unknown 2 Tumor grade .17 .06 I 46 17 (7.8) 12 (5.5) 17 (7.8) 17 (7.9) 14 (6.4) 15 (6.8) II 501 155 (71.1) 176 (80.0) 170 (78.0) 175 (81.0) 167 (76.6) 159 (71.6) III 109 46 (21.1) 32 (14.5) 31 (14.2) 24 (11.1) 37 (17.0) 48 (21.6) Unknown 18 ER status .002 .032 Negative 230 97 (43.1) 64 (28.7) 69 (30.8) 65 (29.0) 74 (33.0) 91 (40.6) Positive 442 128 (56.9) 159 (71.3) 155 (69.2) 159 (71.0) 150 (67.0) 133 (59.4) Unknown 2 PR status .006 .01 Negative 299 119 (53.6) 88 (39.6) 92 (41.8) 82 (37.4) 102 (45.7) 115 (51.8) Positive 365 103 (46.4) 134 (60.4) 128 (58.2) 137 (62.6) 121 (54.3) 107 (48.2) Unknown 10 HER2 status .025 .011 Negative 465 149 (66.5) 146 (64.9) 170 (75.9) 171 (76.3) 151 (67.4) 143 (63.6) Positive 208 75 (33.5) 79 (35.1) 54 (24.1) 53 (23.7) 73 (32.6) 82 (36.4) Unknown 1 Triple‐negative .014 0.17 Yes 123 53 (23.6) 29 (12.9) 41 (18.3) 36 (16.1) 37 (16.4) 50 (22.2) No 551 172 (76.4) 196 (87.1) 183 (81.7) 188 (83.9) 188 (83.6) 175 (77.8) Surgery type .14 .19 BCS 276 91 (40.4) 103 (45.8) 82 (36.6) 91 (40.6) 83 (36.9) 102 (45.3) Mastectomy 398 134 (59.6) 122 (54.2) 142 (63.4) 133 (59.4) 142 (63.1) 123 (54.7) Chemotherapy .92 .35 Anthracycline‐ based 531 175 (77.8) 178 (79.1) 178 (79.5) 177 (79.0) 171 (76.0) 183 (81.3) Taxane 129 46 (20.4) 41 (18.2) 42 (18.8) 45 (20.1) 47 (20.9) 37 (16.4) Others 14 4 (1.8) 6 (2.7) 4 (1.8) 2 (0.9) 7 (3.1) 5 (2.2) BCS, breast‐conserving surgery; ER, estrogen receptor; HER2, human epidermal growth factor receptor‐2; PR, progesterone receptor. John Wiley & Sons, Ltd 3.2. Response to neoadjuvant chemotherapy {#cas13426-sec-0011} ----------------------------------------- Among the 674 BRCA1/2 germline mutation negative patients, 129 patients (19.1%, 129/674) achieved pCR. Patients with low BRCA1 mRNA level had a higher pCR rate than those with intermediate or high BRCA1 mRNA level (23.6% vs 18.7% or 15.2%, respectively; *P* = .077), but the difference did not reach statistical significance. Low, intermediate or high BRCA2 mRNA expression level was not significantly associated with pCR rate (18.7%, 18.2% or 20.4%, respectively; *P* = .82). Additional factors associated with pCR included tumor size (*P* = .003), lymph node status (*P* \< .001), tumor grade (*P* \< .001), ER status (*P* \< .001), PR status (*P* \< .001), and HER2 status (*P* = .01) (Table [2](#cas13426-tbl-0002){ref-type="table-wrap"}). ###### Pathological complete response rates by clinical characteristics and BRCA1 or BRCA2 mRNA expression level Characteristic N Non‐pCR pCR *P*‐value --------------------- ----- ------------ ----------- ----------- Age, years .28 ≤50 363 299 (82.4) 64 (17.6) \>50 311 246 (79.1) 65 (20.9) Tumor size, cm .003 ≤2 224 167 (74.6) 57 (25.4) \>2 450 378 (84.0) 72 (16.0) Lymph node status \<.001 Negative 355 262 (73.8) 93 (26.2) Positive 317 281 (88.6) 36 (11.4) Unknown 2 Tumor grade \<.001 I 46 41 (89.1) 5 (10.9) II 501 416 (83.0) 85 (17.0) III 109 70 (64.2) 39 (35.8) Unknown 18 ER status \<.001 Negative 230 149 (64.8) 81 (35.2) Positive 442 394 (89.1) 48 (10.9) PR status \<.001 Negative 299 210 (39.1) 89 (70.1) Positive 365 327 (60.9) 38 (29.9) HER2 status .01 Negative 465 388 (83.4) 77 (16.6) Positive 208 156 (75.0) 52 (25.0) Chemotherapy type .52 Anthracycline based 531 433 (81.5) 98 (18.5) Taxane 129 100 (77.5) 29 (22.5) Others 14 12 (85.7) 2 (14.3) BRCA1 .077 Low 225 172 (76.4) 53 (23.6) Intermediate 225 183 (81.3) 42 (18.7) High 224 190 (84.8) 34 (15.2) BRCA2 .82 Low 224 182 (81.3) 42 (18.7) Intermediate 225 184 (81.8) 41 (18.2) High 225 179 (79.6) 46 (20.4) BCS, breast‐conserving surgery; ER, estrogen receptor; HER2, human epidermal growth factor receptor‐2; pCR, pathological complete response; PR, progesterone receptor. John Wiley & Sons, Ltd Patients were also divided into three treatment subgroups according to treatment regimen. No significant differences in BRCA1 and BRCA2 mRNA expression were found among the anthracycline‐based treatment group, taxane‐treated group, and other regimen groups (*P* = .92 and *P* = .35, respectively) (Table [1](#cas13426-tbl-0001){ref-type="table-wrap"}). pCR rates were also not significantly different in the three treatment groups (18.5% vs 22.5% vs 14.3%, *P* = .52) (Table [2](#cas13426-tbl-0002){ref-type="table-wrap"}). Among the patients who received anthracycline with or without taxane‐based neoadjuvant chemotherapy regimen (n = 531), patients with low BRCA1 mRNA expression had significantly higher pCR rate than intermediate or high BRCA1 mRNA level patients (24.6% vs 16.9% or 14.0%, respectively; *P* = .031) (Table [3](#cas13426-tbl-0003){ref-type="table-wrap"}). In multivariate analysis, low BRCA1 mRNA expression showed a borderline significance (OR = 1.54; 95% CI, 0.93‐2.56; *P* = .094) for correlation with pCR to anthracycline‐based chemotherapy after adjusting for age, tumor size, tumor grade, ER and PR status, and HER2 status (Table [4](#cas13426-tbl-0004){ref-type="table-wrap"}). However, BRCA2 mRNA expression level was not associated with pCR rate in patients with anthracycline‐based neoadjuvant chemotherapy (16.9%, 17.5% and 20.8% in low, intermediate and high BRCA2 mRNA groups, respectively; *P* = .60) (Table [3](#cas13426-tbl-0003){ref-type="table-wrap"}). ###### pCR rate based on BRCA1 or BRCA2 mRNA expression status according to neoadjuvant chemotherapy regimens Regimens No. patients Non‐pCR pCR *P*‐value ------------------------------- -------------- --------- ------- ----------- ------ ------ Anthracycline‐based (n = 531) BRCA1 .031 Low 175 132 75.4 43 24.6 Intermediate 178 148 83.1 30 16.9 High 178 153 86.0 25 14.0 BRCA2 .60 Low 177 147 83.1 30 16.9 Intermediate 171 141 82.5 30 17.5 High 183 145 79.2 38 20.8 Taxane (n = 129) BRCA1 .71 Low 46 37 80.4 9 19.6 Intermediate 41 30 73.2 11 26.8 High 42 33 78.6 9 21.4 BRCA2 .82 Low 45 34 75.6 11 24.4 Intermediate 47 36 76.6 11 23.4 High 37 30 81.1 7 18.9 Others (n = 14) BRCA1 .57 Low 4 3 75.0 1 25.0 Intermediate 6 5 83.3 1 16.7 High 4 4 100.0 0 0 BRCA2 .18 Low 2 1 50.0 1 50.0 Intermediate 7 7 100.0 0 0 High 5 4 80.0 1 20.0 pCR, pathological complete response. John Wiley & Sons, Ltd ###### Multivariate analysis of pathological complete response in anthracycline‐based group Variable Pathological complete response -------------------------- -------------------------------- ----------- -------- Age ≤50 y vs \>50 y 1.19 0.71‐2.01 .50 ER status Negative vs Positive 3.01 1.43‐6.33 .004 PR status Positive vs Negative 1.50 0.70‐3.21 .30 HER2 status Negative vs Positive 1.43 0.85‐2.42 .18 Tumor size ≤2 cm vs \>2 cm 2.28 1.36‐3.82 .002 Tumor grade III vs I/II 2.41 1.32‐4.40 .004 Lymph node status Negative vs Positive 4.93 2.47‐9.84 \<.001 BRCA1 Low vs Intermediate/High 1.54 0.93‐2.56 .094 CI, confidence interval; ER, estrogen receptor; HER2, human epidermal growth factor receptor‐2; OR, odds ratio; PR, progesterone receptor. John Wiley & Sons, Ltd Among the patients who received taxane‐based neoadjuvant chemotherapy (n = 129), pCR rate was not significantly associated with BRCA1 mRNA (19.6%, 26.8% and 21.4% in low, intermediate and high BRCA1 groups, respectively; *P* = .71) or BRCA2 mRNA level (24.4%, 23.4% and 18.9%; *P* = .82) (Table [3](#cas13426-tbl-0003){ref-type="table-wrap"}). 3.3. Survival estimates {#cas13426-sec-0012} ----------------------- Follow‐up data were available for all patients; median follow‐up time was 66 months (range 5‐113 months). A total of 116 (17.2%) patients experienced a distant recurrence or died of breast cancer during the follow‐up period. The estimated 5‐year DRFS for the entire study population was 83.3% (95% CI, 80.4%‐86.2%). The estimated 5‐year DRFS rates for anthracycline‐based and taxane‐based treated groups were 82.3% (78.9%‐85.6%) and 87.4% (81.3%‐93.5%), respectively. The sample size of patients who received other regimens was relatively small, so the survival curve was not analyzed in this subgroup. Patients who achieved a pCR had a significantly better 5‐year DRFS rate than patients who did not, in the entire patient (92.8% vs 81.1%, *P* = .001) (Figure [1](#cas13426-fig-0001){ref-type="fig"}A) or in anthracycline‐based groups (91.7% vs 80.2%, *P* = .006) (Figure [1](#cas13426-fig-0001){ref-type="fig"}B). Among taxane‐based treated groups, patients who achieved pCR also had a better 5‐year DRFS rate than patients who did not, but the difference did not reach statistical significance (96.4% vs 86.6%, *P* = .12) (Figure [1](#cas13426-fig-0001){ref-type="fig"}C). ![Kaplan‐Meier estimates of distant recurrence‐free survival by pathological complete response (pCR) status in (A) the entire 674 breast cancer patients who received neoadjuvant chemotherapy, (B) the 531 patients who received anthracycline‐based neoadjuvant chemotherapy, and (C) the 129 patients who received taxane‐based neoadjuvant chemotherapy](CAS-109-166-g001){#cas13426-fig-0001} Because BRCA1 mRNA level was associated with pCR in the 531 patients who received anthracycline‐based neoadjuvant chemotherapy, we next analyzed the association between pCR and DRFS according to the BRCA1 mRNA level in this subgroup. There was no significant difference in 5‐year DRFS between BRCA1 low and intermediate or high mRNA level (84.7% vs 81.5%, *P* = .97) (Figure [2](#cas13426-fig-0002){ref-type="fig"}A). Patients who achieved pCR had better 5‐year DRFS compared with those who did not achieve pCR, in both BRCA1 low and intermediate or high mRNA groups (*P* = .044, Figure [2](#cas13426-fig-0002){ref-type="fig"}B). ![Kaplan‐Meier estimates of distant recurrence‐free survival (DRFS) by BRCA1 mRNA expression level and pathological complete response (pCR) status in 531 breast cancer patients who received anthracycline‐based neoadjuvant chemotherapy. (A) DRFS by BRCA1 mRNA expression level. (B) DRFS by BRCA1 mRNA expression level and pCR status](CAS-109-166-g002){#cas13426-fig-0002} 4. DISCUSSION {#cas13426-sec-0013} ============= In the present study, we investigated the association between BRCA1 and BRCA2 mRNA levels and response to neoadjuvant chemotherapy in 674 Chinese breast cancer patients without BRCA1/2 germline mutations. We found that patients with low expression of BRCA1 mRNA were more likely to respond to anthracycline‐based neoadjuvant chemotherapy than patients with intermediate or high BRCA1 mRNA levels. The total 674 breast cancer patients included in this study received different chemotherapy regimens. Among the 531 patients treated with an anthracyline‐based regimen, patients with low BRCA1 mRNA level had a significantly higher pCR rate than patients with intermediate or high BRCA1 mRNA level. However, among the 129 patients that received a taxane‐based regimen, pCR rate was not different in BRCA1 low, intermediate, and high mRNA level subgroups (*P* = .71). BRCA2 mRNA level was not associated with pCR rate in either the anthracyline‐based treated subgroup (*P* = .60) or the taxane‐based regimen subgroup (*P* = .82). Previous studies reported the association between BRCA1 and BRCA2 expression and response to chemotherapy; however, the results shown were less consistent.[26](#cas13426-bib-0026){ref-type="ref"}, [27](#cas13426-bib-0027){ref-type="ref"}, [28](#cas13426-bib-0028){ref-type="ref"} Some clinical data suggested that tumors with low BRCA1 or BRCA2 mRNA expression responded better to DNA‐damaging chemotherapy,[27](#cas13426-bib-0027){ref-type="ref"}, [28](#cas13426-bib-0028){ref-type="ref"}, [29](#cas13426-bib-0029){ref-type="ref"} whereas some showed no relationship between BRCA1 or BRCA2 expression and chemotherapy sensitivity.[28](#cas13426-bib-0028){ref-type="ref"}, [30](#cas13426-bib-0030){ref-type="ref"} However, the sample size of previous studies was relatively small. Moreover, the previous studies did not take the BRCA1/2 germline mutations into consideration when investigating the relationship between mRNA expression level of BRCA1/2 and response to neoadjuvant chemotherapy, as BRCA1 germline mutations may affect the response to some chemotherapy drugs.[31](#cas13426-bib-0031){ref-type="ref"} One advantage of the current study was that the germline mutations of *BRCA1* and *BRCA2* genes in this cohort had been analyzed through sequencing assay, and BRCA1/2 gene germline mutations status was clearly shown in our previous reports.[24](#cas13426-bib-0024){ref-type="ref"}, [25](#cas13426-bib-0025){ref-type="ref"} To the best of our knowledge, this is the first study to report that BRCA1 and BRCA2 mRNA expression level was associated with response to neoadjuvant chemotherapy in a relatively large sample size, excluding the effects of *BRCA1* and *BRCA2* gene mutations. *BRCA1* gene plays an important role in DNA damage repair, regulation of gene expression and cell cycle control. Tumors with low expression of BRCA1 mRNA are certainly different from typical tumors with BRCA1 germline mutation. However, there are some similarities between the morphology and molecular biology of breast cancer with low expression BRCA1 and BRCA1 mutated breast cancer that have led to the concept of "BRCAness". Both BRCA1 mutated breast cancers and reduced BRCA1 expression tend to be higher grade, hormone receptor‐negative, and HER2‐negative, or "triple negative" and frequently express a basal phenotype.[13](#cas13426-bib-0013){ref-type="ref"}, [32](#cas13426-bib-0032){ref-type="ref"}, [33](#cas13426-bib-0033){ref-type="ref"}, [34](#cas13426-bib-0034){ref-type="ref"} In vitro and in vivo studies have shown that cells deficient for BRCA1 could be more sensitive to chemotherapy agents that produce DNA damage through double‐strand DNA breaks, such as anthracyclines and etoposide.[14](#cas13426-bib-0014){ref-type="ref"}, [15](#cas13426-bib-0015){ref-type="ref"}, [17](#cas13426-bib-0017){ref-type="ref"}, [19](#cas13426-bib-0019){ref-type="ref"} These preclinical observations are consistent with our results. Our findings indicate that patients with low BRCA1 mRNA level were more likely to respond to anthracycline‐based neoadjuvant chemotherapy and gained more benefit from anthracycline‐based therapy compared with patients with intermediate or high BRCA1 mRNA level, but this was not evident for BRCA2 mRNA expression. This may be because the relative roles of BRCA1 and BRCA2 in DNA repair of DNA double‐strand breaks were not exactly the same. BRCA1 is a critical organizing molecule that has been linked to a range of cellular processes beyond DNA repair, such as transcriptional regulation and chromatin remodeling. Tumor cells with deficient BRCA1 may respond better to DNA‐damaging chemotherapy. BRCA2 function in homologous recombination is primarily through regulation of RAD51 activity.[1](#cas13426-bib-0001){ref-type="ref"}, [17](#cas13426-bib-0017){ref-type="ref"}, [35](#cas13426-bib-0035){ref-type="ref"} The present study had several limitations. Neoadjuvant chemotherapy regimens were not assigned randomly, and a small number of patients received taxane‐based neoadjuvant chemotherapy. In summary, our study suggests that in the absence of BRCA1/2 germline mutations, breast cancer patients with low BRCA1 mRNA expression have a higher pCR rate to anthracycline‐based neoadjuvant chemotherapy, but not to taxane regimens. Although BRCA2 plays an important role in DNA repair, BRCA2 mRNA expression may not predict response to anthracycline‐based or taxane neoadjuvant chemotherapy. Nevertheless, future studies are warranted to confirm our current findings. CONFLICT OF INTEREST {#cas13426-sec-0015} ==================== Authors declare no conflicts of interest for this article. Grant sponsor: 973 Project; Grant number: 2013CB911004. Grant sponsor: National Natural Science Foundation of China; Grant numbers: 30973436 and 81071629.
On a sprawling mesa just northwest of Taos, New Mexico, architect Michael Reynolds has spurred the development of a series of off-the-grid homes, nicknamed “Earthships.” These homes use passive solar technology, wind power, recycled water, old tires, car batteries, glass bottles and pretty much every off-the-grid technology there is except the kitchen sink. Most of the earthships are low-rise, single-story structures that are long and narrow, with one side generally built into a hill and its opposing side being two walls of glass, with plants usually occupying the space between the two walls. Many have some fanciful turrets or towers attached at some point, but plenty are very simple. Yet despite the variation, the common factor among them is that they were constructed by the homeowners themselves, reflecting their personal style. In 2007, Reynolds was the subject of a documentary entitled Garbage Warrior, which is a great introduction to his philosophy as well as telling the story of several of his building projects in both New Mexico and around the world. Visitors to the earthships can drive by on both Route 64 take a tour (either with a guide or without, but springing for the guide is suggested) and several can even be rented for the night as well. Or sign up for the Academy, where you can learn how to build your own earthship.
I have few tables in the database with parent table say P is having 1:1 relation with some child tables whereas having 1:M relation with other child tables. For this I have added DataSet at design time by 'Add -> New Item -> DataSet -> DataSet1.xsd' So, I have all the required tables along with their 1:1 or 1:M relations. I have applied some filter on main table adapter so that only selected records from parent table and their related child records are populated in the dataset. And finally, I want to write this data from DataSet to Xml file. But, I am getting one issue - the final dataset that I am getting is having all the records from child table. Instead it should have only those child records for which parent table is having related records. I am using following code - ParentDataSet parentDataSet = new ParentDataSet(); ParentTableAdapter parentTableAdapter = new ParentTableAdapter(); parentTableAdapter.Fill(parentDataSet.ParentTable, column1Value); // All fine until here as I have applied filter in tableAdapter SQL ChildTableAdapter childTableAdapter = new ChildTableAdapter(); //returns all rows in the child table -- shouldn't it return only those child records for which parent dataset table is having records?? childTableAdapter.Fill(parentDataSet.ChildTable); parentDataSet.WriteXml(xmlFilePath); 1 Answer 1 By default, the DataSet designer sets the DataRelations between parent-child tables as "Relation Only". This means that the DataSet will not enforce the foreign key constraints on the client, just your database... Try changing the type of the parent-child relation to a foreign key constraint. Then, check the SelectCommand property of the ChildTableAdapter. Is it filtering the data the way you expect? Thanks for your reply. It didn't solve the issue - So it seems I have to add filter for related tables as well as I have added for parent table. – inikiJan 4 '12 at 16:02 I ended up adding filter for parent as well as related child tables :-) – inikiMar 6 '12 at 22:48 @iniki Since my answer doesn't actually solve the problem, you should post your solution as a separate answer and accept it. (You can accept your own answer to a question that you asked.) – KimberlyMar 7 '12 at 14:52
Teaching the home care client. Patient education in home health care continues to hold many challenges for the professional nurse. With the changing climate of the health care delivery system, an increasing number of clients are returning to their home "quicker but sicker." The demand on the nurse to provide more in-depth patient education in the client's home will increase. The nurse must be prepared to make a thorough assessment of the client's learning needs, develop and implement an effective teaching plan, evaluate learning, and revise the plan as necessary, as well as document the teaching. All of this must be achieved to ensure continuity of quality patient care and reimbursement by third-party payers.
Q: PDOStatement::execute takes 11s, what to do? Our Drupal site is sslllooooowwwww, at best taking 3s for static-content pages, at worst 11s for shopping cart pages. Above is the profile for visiting the shopping cart. Profiling reveals that PDOStatement::execute is the #1 time consumer. Any advice why or what to do about it? Not sure if indicator that my connection has problems, Drupal is inefficiently sending data, or if it's time to learn how to tweak MySql. A: It could mean any of a bunch of things. PDOStatement::execute() is just the final method that gets called for each and every database query Drupal makes (which can be quite a few). First, make sure you Apache is configured properly, and that APC is installed and has enough memory. Then, I would make sure your MySQL instance has a decent starting point. Download, run, and follow the advice of mysqltuner. Then, download/install/enable the Performance Logging and Monitoring module and play around with the reports. Figure out what is slow, and fix it. There are also bunches of posts with other profiling advice, too, as well as advice for performance improvements beyond basic configuration (eg, advanced caching strategies). A: I suggest that you use the Devel module to debug this. You can turn on query logging in its option to list all the queries used in the display of the page and go from there. I would also try running the site on a different server - perhaps a dev server with plenty of resources - and see how it performs there. I would also check your syslog and mysql logs to see if there are any warnings there for you to consider or if your server is running out of resources.
Q: dompdf with codeigniter I followed this tutorial: https://github.com/EllisLab/CodeIgniter/wiki/PDF-generation-using-dompdf However, I can't seem to set the path right. On the config file of dompdf (config_dompdf.inc.php) I did the following: define("DOMPDF_DIR", realpath(dirname('./system/plugins/dompdf/'))); I get this error: Message: require_once(/var/www/myApp/system/plugins/include/functions.inc.php) [function.require-once]: failed to open stream: No such file or directory Filename: dompdf/dompdf_config.inc.php Line Number: 233 As per the tutorial, I placed the dompdf directory under system/plugins. But you can see above that on line 233, there is an error because of an incorrect path. How do I fix the path? (define("DOMPDF_DIR", realpath(dirname('./system/plugins/dompdf/')));) Thanks! A: A custom loader that is on autoload is conflicting with DOMPDF, that's the reason is doesn't work. Switched to TCPDF since the custom loader is used by all controllers of the app.
Oakland Food Trucks May Move Just a Few Blocks ... Oakland's lunch trucks will have to hit the road soon, but they may not have to drive far. City Councilman Bill Peduto is sponsoring a bill to create a "vending area" on DeSoto Street, between Fifth Avenue and O'Hara Street. The stretch of street, which currently has no parking meters, could be a new home for the soon-to-be-displaced trucks now parked in Schenley Parking Plaza. The lot, next to Hillman Library, will make way for a planned city park. Lunch-truck owners have until the end of February to leave. "I believe that council, when they understand that it won't take away parking, will be supportive," Peduto says of his bill, which keeps the trucks in his council district 8. It proposes the new truck location be used through June, so that the effects of the move can be observed, and perhaps later made permanent. The spot, on a steep hill bordered by Children's Hospital, Western Psych, UPMC Presby and the Petersen Events Center, is not as conveniently located to the campus as Hillman. But, Peduto says, the hospitals would provide more consistent traffic throughout the year than the university, since hospitals don't empty out for the summer. "We will get survival," says Vinay Patidar, whose truck, Kashmiri, has been at the Hillman location for six years. "I know that I'm going to lose some customers from CMU. I may get some from UPMC. Whatever they do, I guess we'll be all right." The first of two council votes on Peduto's resolution is set for Wed., Feb. 23. One of the main groups pushing to preserve the lunch trucks, college students, could represent an important young voting bloc, should Peduto enter the mayor's race as expected. But Peduto insists: "It's not a political issue. If I had never done anything for college students or the youth vote before, that argument could be made. The city had decided to turn its back and say, 'Tough luck.' I will not do that."
行, by itself, can be used as an adverb meaning "soon" or "before long," and 將 can be used as an auxiliary verb meaning "will," so 行將 translates as "will soon." The Korean equivalent is 곧. Notice that the adverb (行) comes before both the auxilliary verb (將) and the main verb (歸). Saturday, June 11, 2016 食 (식) means "to eat" and 此 (차) means "this," but what does 革 (혁) mean in the above sentence? Besides meaning "leather" or "animal hide," 革 can also mean "to reform," "to remove," or "to expel (from office)," but can it also mean "instead"? On Page 24 of "Du's Handbook of Classical Chinese Grammar," in the section explaining adverbs and modal verbs, 革食此 was one of the example sentences used to show how adverbs were placed before the verbs they modified in Classical Chinese. 革食此 (혁식차) was translated as "eat this instead," meaning that 革 was translated as "instead." Before now, I cannot remember ever seeing 革 translated as "instead," but words like 革新 (혁신), which means "reform" or "renovation," does seem to imply "instead," in that when you reform something, instead of the old way, you try a new way. Has anyone seen any other examples of 革 being used to mean "instead"?
/********************************************************************* * * Filename: old_belkin.c * Version: 1.1 * Description: Driver for the Belkin (old) SmartBeam dongle * Status: Experimental... * Author: Jean Tourrilhes <jt@hpl.hp.com> * Created at: 22/11/99 * Modified at: Fri Dec 17 09:13:32 1999 * Modified by: Dag Brattli <dagb@cs.uit.no> * * Copyright (c) 1999 Jean Tourrilhes, All Rights Reserved. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License as * published by the Free Software Foundation; either version 2 of * the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, * MA 02111-1307 USA * ********************************************************************/ #include <linux/module.h> #include <linux/delay.h> #include <linux/tty.h> #include <linux/init.h> #include <net/irda/irda.h> #include <net/irda/irda_device.h> /* * Belkin is selling a dongle called the SmartBeam. * In fact, there is two hardware version of this dongle, of course with * the same name and looking the exactly same (grrr...). * I guess that I've got the old one, because inside I don't have * a jumper for IrDA/ASK... * * As far as I can make it from info on their web site, the old dongle * support only 9600 b/s, which make our life much simpler as far as * the driver is concerned, but you might not like it very much ;-) * The new SmartBeam does 115 kb/s, and I've not tested it... * * Belkin claim that the correct driver for the old dongle (in Windows) * is the generic Parallax 9500a driver, but the Linux LiteLink driver * fails for me (probably because Linux-IrDA doesn't rate fallback), * so I created this really dumb driver... * * In fact, this driver doesn't do much. The only thing it does is to * prevent Linux-IrDA to use any other speed than 9600 b/s ;-) This * driver is called "old_belkin" so that when the new SmartBeam is supported * its driver can be called "belkin" instead of "new_belkin". * * Note : this driver was written without any info/help from Belkin, * so a lot of info here might be totally wrong. Blame me ;-) */ /* Let's guess */ #define MIN_DELAY 25 /* 15 us, but wait a little more to be sure */ static void old_belkin_open(dongle_t *self, struct qos_info *qos); static void old_belkin_close(dongle_t *self); static int old_belkin_change_speed(struct irda_task *task); static int old_belkin_reset(struct irda_task *task); /* These are the baudrates supported */ /* static __u32 baud_rates[] = { 9600 }; */ static struct dongle_reg dongle = { .type = IRDA_OLD_BELKIN_DONGLE, .open = old_belkin_open, .close = old_belkin_close, .reset = old_belkin_reset, .change_speed = old_belkin_change_speed, .owner = THIS_MODULE, }; static int __init old_belkin_init(void) { return irda_device_register_dongle(&dongle); } static void __exit old_belkin_cleanup(void) { irda_device_unregister_dongle(&dongle); } static void old_belkin_open(dongle_t *self, struct qos_info *qos) { /* Not too fast, please... */ qos->baud_rate.bits &= IR_9600; /* Needs at least 10 ms (totally wild guess, can do probably better) */ qos->min_turn_time.bits = 0x01; } static void old_belkin_close(dongle_t *self) { /* Power off dongle */ self->set_dtr_rts(self->dev, FALSE, FALSE); } /* * Function old_belkin_change_speed (task) * * With only one speed available, not much to do... */ static int old_belkin_change_speed(struct irda_task *task) { irda_task_next_state(task, IRDA_TASK_DONE); return 0; } /* * Function old_belkin_reset (task) * * Reset the Old-Belkin type dongle. * */ static int old_belkin_reset(struct irda_task *task) { dongle_t *self = (dongle_t *) task->instance; /* Power on dongle */ self->set_dtr_rts(self->dev, TRUE, TRUE); /* Sleep a minimum of 15 us */ udelay(MIN_DELAY); /* This dongles speed "defaults" to 9600 bps ;-) */ self->speed = 9600; irda_task_next_state(task, IRDA_TASK_DONE); return 0; } MODULE_AUTHOR("Jean Tourrilhes <jt@hpl.hp.com>"); MODULE_DESCRIPTION("Belkin (old) SmartBeam dongle driver"); MODULE_LICENSE("GPL"); MODULE_ALIAS("irda-dongle-7"); /* IRDA_OLD_BELKIN_DONGLE */ /* * Function init_module (void) * * Initialize Old-Belkin module * */ module_init(old_belkin_init); /* * Function cleanup_module (void) * * Cleanup Old-Belkin module * */ module_exit(old_belkin_cleanup);
Taxpayers who earn at least £1 million a year would be forced to make their tax records public under a Labour Government, John McDonnell has said. The shadow chancellor insisted that greater transparency would deter tax avoidance and evasion. He said Labour is drawing from the systems in Scandinavian countries, such as Norway and Sweden, where the practice is common.
Last updated on .From the section Women's Football England midfielder Jordan Nobbs has made three league appearances for Arsenal so far this season Arsenal Ladies midfielder Jordan Nobbs is "very close" to returning to full fitness, according to Gunners manager Pedro Martinez Losa. The 22-year-old picked up a hamstring injury while in Canada with England for the Women's World Cup. She was an unused substitute in Arsenal's 3-2 loss at home to Manchester City Women on Sunday. "We felt there was too much risk with her, and we don't want to lose again," Losa told BBC Sport. "We were told that she couldn't play so we have to respect the doctors. "She is very close. As soon as we can have all the players healthy, we can be more competitive." Arsenal face Women's FA Cup winners Chelsea in the Continental Cup group stage on Sunday.
5 Easy Facts About talking heads anh do video Described 5 Easy Facts About talking heads anh do video Described If punk rock was about bringing all of it again home, then post-punk was about accomplishing the same though also undercutting audience anticipations, together with skipping the blues, and heading even even further back to Africa. Therefore, with this tune you obtain all kinds of musical outcroppings of this creative trajectory, my favorite becoming bassist Tina Weymouth’s percussive, propulsive, and tenacious bassline; so tenacious that it soldiers on by out the music, even versus the grain of the chords, as well as verse-chorus-verse construction. ” She carries on, “They blend Specialist top quality audio with actual-time illustrations that arrive at life ahead of the viewer’s eyes, whiteboard animation makes even dry materials interesting.” I picked up a ring gentle for my videos and it’s been great (I’ve experienced many good feed back again on my welcome video on my web site), you can find it from Amazon (Stellar Photograph/Video Mild) it’s not The most cost effective matter on this planet but it surely’s a good light in a little space. Again magnificent write-up and declaring the basic principles for men and women to create on. Tip: When recording your video narration, it’s essential to look at the camera to create the illusion of eye-Speak to with your audience. It signifies that wherever your digital camera is, that’s where your notes (and so your eyes) must be. That report incorporates a breakthrough leading forty one for them in “Burning Down the House”, arguably their most identifiable tune amongst informal music listeners. It absolutely was the tail-close of an era that allowed inventive innovation to live really easily beside mainstream achievement. I didn’t understand it, but this exercise harm me. I didn’t get talking heads our house video sights on my YouTube videos from my internet site. I didn’t get YouTube subscribers from my web-site. All for the reason that I was shooting in 720p. Some individuals have the all-natural techniques to deliver excellent and unforgettable presentations without even helpful hints referring into a script. The words retain flowing gracefully out in their mouths and they enthrall the viewers correct from the start. Everything from products explainers, detailed software package launches and updates, and also whole blown fictional storytelling gain from whiteboard animation. The neuroscience is in, and whiteboard animation wins vs. a talking head video every time. Just add your front and stop bumpers with logos and phone to motion so you are all set to add on your blog or YouTube. Some will provide you with predicted ROI above a one thirty day period and six thirty day period period of time so you realize if video is value introducing. You’ll get an idea of influence it may need with your e-mail marketing and advertising too. Thanks for your script tip. You actually can’t go on digicam if you don’t know what you’ll be talking about! I am employing my camera’s microphone in my being overweight video, and a Zoom H4n in my “have confidence in you” video. Change up your speakers and listen to my first video. Could you hear this “shhhh” sound? This is what I check out this site removed in my next video with Zoom H4n. My voice is sharper way too. Technique just one is to implement an autocue. This lets the topic to read through from the screen although hunting into digital camera. The attention line will keep on being accurate as They're seeking via a bit of mirrored glass. If the director is trying to keep good notes then they will remember to request the subject for clarification or a photo at the conclusion of an interview.
Until now, coating application on the surface of a molded article has been widely carried out in order to give an additional value such as decoration properties or the like to resin molded articles used for automobiles, electrical appliances or building materials, or to prolong the lifetime of products by enhancing weathering resistance. As such a coating method, it is general to employ a spray coating method. Recently, the environmental problems have been strongly concerned, so that the urgent development of a technique in place of spray coating has been desired. This is because there is a tendency to set a strict limit to release of hazardous organic substances discharged from various factories to the atmosphere, and is from the standpoint of making much of the health care for employees. Under the circumstances, noted is a method of coating and molding in the mold such that a paint is injected into between the surface of a resin molded product molded in a mold and the mold cavity surface, this paint is cured in the mold, and thereby a monolithic molded article wherein the coating is adhered on the surface of the resin molded product is prepared (in-mold coating, hereinafter referred to as “IMC”). It is expected that this IMC method not only improve the quality of the molded article's surface by adhering a coating on the surface but also decrease costs by decreasing the coating steps. By reason that the paint used for in-mold coating molding of a thermoplastic resin is desired to have curing properties capable of curing at a temperature lower than the curing temperature of a paint for thermosetting resins, it is generally difficult to develop a paint having both of coating appearance and adhesion. Therefore, paints which have been already developed as a paint used for the in-mold coating molding method are limited to paints used for thermosetting resins and paints used for some thermoplastic resins such as nylon, ABS resins and the like. On this account, the kind of synthetic resins applicable to the in-mold coating molding method is limited to the thermosetting resins or some thermoplastic resins such as nylon, ABS resins and the like at present. Further, it has been considered that it is technically difficult in the structure of the resins to develop paints having sufficient adhesion to olefin resins such as polypropylene resin or polyethylene resin. Furthermore, it is also difficult in the structure of olefin resins such as polypropylene resin or polyethylene resin to adhere the paint to the olefin resins even by the general spray coating method. Therefore, for the olefin resins, a method of coating the resin surface with an intermediate layer such as primer or the like and then coating the coated primer surface with a paint is employed. Accordingly, it has been considered that it is technically very difficult to develop a polypropylene resin composition having sufficient coating adhesion in an in-mold one-component coating molding method such as IMC. As a method of applying the in-mold coating molding method to the polyolefin resin, JP-A-2001-170964 discloses a method such that on the polyolefin resin surface, a skin material having good adhesion with a paint is molded with lamination, the paint is injected into between the surface of the skin material and the mold cavity surface to thereby prepare a molded article with a coating monolithically formed on the polyolefin resin surface through the skin material. Under the circumstances, the present inventors have earnestly been studied and found that using a paint for in-mold coating prepared by adding in a specific ratio acryl modified chlorinated polyolefin containing a specific amount of chlorine, an organic peroxide and polyisocyanate to a vehicle component comprising an oligomer having a (meth)acrylate group and an ethylenically unsaturated monomer capable of copolymerizing with the oligomer, and a hydroxyl group-containing polypropylene resin composition having a specific hydroxyl value and containing a specific amount of rubber components, there can be obtained an in-mold coating molded article that the above paint for coating is monolithically formed on the surface of the resin molded product of the polypropylene resin composition, which is a polyolefin resin, in such a state as to have good adhesion. Accordingly, the present invention has been accomplished.
NO. 07-10-0061-CV IN THE COURT OF APPEALS FOR THE SEVENTH DISTRICT OF TEXAS AT AMARILLO PANEL D JANUARY 4, 2012 ______________________________ DALE BRAMLETT, INDIVIDUALLY AND AS INDEPENDENT ADMINISTRATOR OF THE ESTATE OF VICKI BRAMLETT, DECEASED; SHANE FULLER AND MICHAEL FULLER, APPELLANTS V. BENNY P. PHILLIPS, M.D., APPELLEE _________________________________ FROM THE 99TH DISTRICT COURT OF LUBBOCK COUNTY; NO. 2003-522,183; HONORABLE WILLIAM C. SOWDER, JUDGE _______________________________ Before QUINN, C.J., and CAMPBELL and PIRTLE, JJ. OPINION This appeal is from the trial court's entry of a judgment on remand from the Texas Supreme Court. Finding the trial court erred in the calculation of damages and the award of postjudgment interest, we reverse and remand. Background Because the underlying facts of this case are well-known to the parties, we focus only on those facts germane to this appeal. This medical malpractice cause of action was originally tried to a jury in 2005. That jury returned a verdict in favor of Appellants, Dale Bramlett, Individually and as Independent Administrator of the Estate of Vicki Bramlett, Deceased, Shane Fuller and Michael Fuller,1 and against Appellee, Benny P. Phillips, M.D., awarding $11 million in actual damages and $3 million in exemplary damages. The trial court denied Appellee's request to apply the statutory cap on damages in a medical malpractice action provided by article 4590i, section 11.02(a),2 and after post-trial adjustments,3 entered a judgment in favor of Appellants in the sum of $12,168,364.50 on October 18, 2005 (the "2005 judgment"). That judgment provided for postjudgment interest at the rate of 6.50% from the date of judgment. See Tex. Fin. Code Ann. § 304.003 (West 2006). The 2005 judgment was appealed to this Court 1 Where necessary to the discussion, Dale Bramlett, the Estate of Vicki Bramlett, Shane Fuller and Michael Fuller will be identified by name; otherwise, they will be collectively referred to as Appellants. 2 All references to section 11.02(a) or section 11.02(c) are references to the Medical Liability and Insurance Improvement Act of 1977. Act of June 16, 1977, 65th Leg., R.S., ch. 817, § 11.02, 1977 Tex. Gen. Laws 2039, 2052 (formerly Tex. Rev. Civ. Stat. Ann. art. 4590i). Article 4590i was repealed by Act of June 2003, 78th Leg., R.S., ch. 204, § 10.09, 2003 Tex. Gen. Laws 847, 884. Although repealed, this statute was effective at all times relevant to this litigation. 3 Before entering judgment, the trial court (1) reduced the jury award of medical expenses by $124,000.00 at Appellants' request, (2) applied a settlement credit of $2,300,000.00 resulting from Appellants' settlement with Covenant Health Systems, d/b/a Covenant Medical Center, (3) calculated prejudgment interest according to article 4590i, section 16.02(c), from the date of injury on October 29, 2002, until the day before judgment was signed on October 18, 2005, at 6.50% in accordance with sections 304.003 and 304.103 of the Texas Finance Code, and (4) offset prejudgment interest based on a written settlement offer in the amount of $200,000.00, made on February 21, 2005, pursuant to section 304.105(b) of the Texas Finance Code. References to the Texas Finance Code are to Tex. Fin. Code Ann. (West 2006). 2 where, on March 17, 2007, it was affirmed in part and reversed and remanded in part.4 Consistent with the remittitur suggested in that opinion, on April 30, 2007, this Court issued its Opinion on Order of Remittitur, which reformed the 2005 judgment by reducing the recovery of Shane Fuller and Michael Fuller for future pecuniary losses and associated prejudgment interest. Petition for review was granted by the Texas Supreme Court to consider the interrelationship between two provisions of the Medical Liability and Insurance Improvement Act of 1977. The first provision, section 11.02(a), capped the liability of a physician at a fixed amount, adjusted for inflation; whereas the second provision, section 11.02(c), created an exception to this cap when the physician's insurer negligently fails to settle within the meaning of the Stowers Doctrine,5 that is, when the physician's insurer negligently fails to settle a claim within the limits of the physician's liability policy. Ultimately, the Supreme Court determined that both provisions could be given effect by conforming the judgment against the physician to section 11.02(a)'s cap and reserving for another case any suit against the insurer under section 11.02(c)'s Stowers exception. 4 Phillips v. Bramlett, 258 S.W.3d 158 (Tex.App.--Amarillo 2007), rev'd, 288 S.W.3d 876, 882 (Tex. 2009) (Campbell, J., dissenting) (reversing and rendering a take-nothing judgment on the issue of gross negligence and exemplary damages, suggesting a remittitur of $220,000 as to both Shane Fuller and Michael Fuller on the issue of future pecuniary losses, and affirming the trial court's judgment in all other respects). 5 See generally, G.A. Stowers Furniture Co. v. Am. Indem. Co., 15 S.W.2d 544, 547 (Tex. Comm’n App. 1929, holding approved). 3 Accordingly, on March 6, 2009, the Supreme Court reversed the judgment of this Court6 and remanded the case to the trial court for entry of a judgment "consistent" with the Supreme Court's opinion.7 All motions for rehearing were denied and the Texas Supreme Court issued its mandate on September 29, 2009. After the Supreme Court issued its opinion, but prior to any action by the trial court, Appellants attempted to amend their petition to include claims against Appellee's insurance carrier, The Medical Protective Company of Fort Wayne, Indiana, Medical Protective Insurance Services, Inc., d/b/a The Medical Protective Company of Fort Wayne, Indiana (hereinafter "Med Pro"), and two adjusters, Dan Walston and Paul Rinaldi. Because Med Pro had previously filed a motion for rehearing before the Supreme Court,8 Appellants contended that Med Pro was a party to this proceeding and they filed a motion requesting the trial court to compel Med Pro to appear and answer Appellants' allegations. Both parties moved for judgment and without a new trial on the merits, a hearing on pending motions was held on November 19, 2009. On December 1, 2009, the trial court entered its second judgment (the "2009 judgment") in the sum of $1,717,649.61. In rendering that judgment, the trial court implicitly denied Appellants' attempt to add 6 Although the Supreme Court's opinion "reversed" the judgment of this Court, it did not address issues previously determined by this Court pertaining to the issue of gross negligence, the remittitur of damages for future pecuniary losses, or the findings of the trial court incorporated in the original judgment. 7 Phillips v. Bramlett, 288 S.W.3d 876, 883 (Tex. 2009). 8 The Supreme Court ultimately treated this filing as an amicus brief. 4 additional parties, recalculated damages,9 changed the rate and effective date for computing postjudgment interest, and omitted findings originally contained in the 2005 judgment. According to Appellants’ allegations, in rendering judgment, the trial court disregarded a Rule 11 agreement between the parties entered into after the 2005 judgment pertaining to the effective date for the computation of postjudgment interest. Appellants' motion to modify, correct, or reform that judgment was subsequently overruled by operation of law and this appeal followed. Appellants originally sought relief from the Supreme Court through a petition for writ of mandamus. The Supreme Court denied that relief without written opinion.10 While awaiting disposition of their requested mandamus relief, Appellants timely perfected this appeal of the trial court's 2009 judgment. Contending this Court lacked jurisdiction, Appellee moved to dismiss the appeal. Originally, we denied Appellee's motion to dismiss without written opinion; however, upon consideration of Appellee's motion for rehearing, we reaffirmed our denial by written opinion.11 Ultimately, by one issue, stated in seven different subparts, Appellants contend the trial court erred by failing to recite in the 2009 judgment that (1) facts exist which would enable Appellants to assert a cause of action pursuant to the "Stowers Doctrine," 9 In recalculating damages, the trial court made legal and factual decisions pertaining to the applicable date for computation of the statutory cap, as well as the applicable consumer price index to be applied in calculating that cap. 10 See In re Dale Bramlett, Individually and as Independent Administrator of the Estate of Vicki Bramlett, Deceased, Shane Fuller and Michael Fuller, No. 10-0025, (Tex. Feb. 5, 2010) (denied without written order) available at http://www.supreme.court.state.tx.us/opinions/casesearch.asp. 11 Bramlett v. Phillips, 322 S.W.3d 443 (Tex.App.--Amarillo 2010, no pet.). 5 (2) the amount of damages that would have been awarded Appellants but for the section 11.02(a) damages cap, (3) the apportionment of rights between Appellants and Appellee in any subsequent prosecution of a Stowers claim; and the trial court erred by exceeding the Supreme Court Mandate by (4) changing the effective date for and rate of postjudgment interest, (5) vacating the original judgment, (6) removing recitations and other language from the original judgment, and (7) misspelling Shane Fuller's name. Opinions and Judgments and Mandates! Oh, my!12 An intermediate appellate court must hand down a written opinion that addresses every issue raised that is necessary to final disposition of an appeal. Tex. R. App. P. 47.1. Upon disposition of that appeal, the court of appeals must also enter a judgment that either: (a) affirms the trial court's judgment in whole or in part; (b) modifies the trial court's judgment and affirms it as modified; (c) reverses the trial court's judgment in whole or in part and renders the judgment that the trial court should have rendered; (d) reverses the trial court's judgment and remands the case for further proceedings; (e) vacates the trial court's judgment and dismisses the case; or, (f) dismisses the appeal. Tex. R. App. P. 43.2. Following entry of the appellate court's judgment and the expiration of appropriate time periods, the clerk of that court issues a mandate. Tex. R. App. P. 18.1(a), 51.1. The mandate is the appellate court's directive commanding the lower court to comply with the appellate court's judgment. Tex. Parks & Wildlife Dep't v. Dearing, 240 S.W.3d 330, 347 (Tex.App.--Austin 2007, pet. denied). 12 "Lions and tigers and bears! Oh my!", Dorothy, Wizard of Oz (1939). Sometimes our imagination makes things seem more daunting than they really are. 6 Similarly, the Texas Supreme Court must hand down a written opinion in all cases in which it renders a judgment. Tex. R. App. P. 63. That judgment must either: (a) affirm the lower court's judgment in whole or in part; (b) modify the lower court's judgment and affirm it as modified; (c) reverse the lower court's judgment in whole or in part and render the judgment that the lower court should have rendered; (d) reverse the lower court's judgment and remand the case for further proceedings; (e) vacate the judgments of the lower courts and dismiss the case; or, (f) vacate the lower court's judgment and remand the case for proceedings in light of changes in the law. Tex. R. App. P. 60.2. Following entry of its judgment and expiration of appropriate time periods, the Clerk of the Supreme Court also issues a mandate. Tex. R. App. P. 18.1(b). When an appellate court affirms a trial court's judgment or renders the judgment a trial court should have rendered, the judgment of the appellate court becomes the judgment of both courts, as to those issues. Cook v. Cameron, 733 S.W.2d 137, 139 (Tex. 1987) (op. on rehearing); Dallas County v. Sweitzer, 971 S.W.2d 629, 630 (Tex.App.--Dallas 1998, no pet.). When a lower court's judgment is reversed in whole, that judgment is a nullity, leaving the judgment as if it had never been rendered. See Cessna Aircraft Co. v. Aircraft Network, LLC, 345 S.W.3d 139, 145 (Tex.App.--Dallas 2011, no pet.); In re S.S.G., 208 S.W.3d 1, 3 (Tex.App.--Amarillo 2006, pet. denied) (stating effect of reversal is to nullify the judgment); Flowers v. Flowers, 589 S.W.2d 746, 748 (Tex.App.--Dallas 1979, no writ) (holding reversal of a judgment completely nullifies it, leaving it as if it had never been rendered); In re Jerry F., 294 S.W.3d 297, 298 (Tex.App.--Fort Worth 2009) (orig. proceeding) (stating once reversed, the trial 7 court's judgment is of no force and effect). However, when a judgment is reversed in part, as to those issues on which the judgment was not reversed, unless otherwise modified, the judgment remains in force and effect. The scope of an appellate court's mandate is determined with reference to both the appellate court's opinion and the mandate itself. Cessna Aircraft Co., 345 S.W.3d at 144 (citing Truck Ins. Exchange v. Robertson, 89 S.W.3d 261, 263 (Tex.App.--Fort Worth 2002, no pet.). Therefore, whether a judgment is reversed in whole or in part does not depend solely upon the wording of the mandate itself, but must instead be discerned by looking at both the opinion and the mandate to determine the full intent of the reviewing court. Id. In this case, both the judgment and mandate of the Texas Supreme Court stated in pertinent part: IT IS THEREFORE ORDERED, in accordance with the Court's opinion, that: 1) The court of appeals' judgment is reversed; 2) The cause is remanded to the trial court for further proceedings consistent with this Court's opinion; and 3) Benny P. Phillips, M.D., shall recover, and Dale Bramlett, Individually and as Independent Administrator of the Estate of Vicki Bramlett, Deceased, Shane Fuller, and Michael Fuller shall pay, the costs incurred in this Court and in the court of appeals. (Emphasis added.) Although the Supreme Court's judgment and mandate "reversed" the judgment of this Court, its opinion did not address every issue previously determined by this Court, 8 including issues pertaining to the recovery of exemplary damages, the remittitur suggested on the issue of Shane and Michael's future pecuniary losses, or the inclusion of findings made by the trial court in the original judgment. Because those issues were not addressed by the Supreme Court in its opinion, we construe that opinion, judgment and mandate as only reversing that part of our judgment dealing with the interrelationship between section 11.02(a) and section 11.02(c) of the Medical Liability and Insurance Improvement Act of 1977. Therefore, as to those issues not addressed by the Supreme Court, the opinions and judgments of this Court remain in force and effect. Similarly, as to those issues not addressed by either the Supreme Court or this Court, the 2005 judgment of the trial court remains in force and effect. Jurisdiction of Trial Court on Remand When an appellate court remands a case with specific instructions, the trial court is limited to complying with the instructions and cannot re-litigate issues controverted at the former trial. Denton County v. Tarrant County, 139 S.W.3d 22, 23 (Tex.App.--Fort Worth 2004, pet. denied). We construe the mandate of the Supreme Court as vesting the trial court with the limited jurisdiction to determine the issue addressed in its opinion, to-wit: the interplay between "two provisions of the Medical Liability and Insurance Improvement Act of 1977, now repealed."13 Therefore, to the extent that the judgment of the trial court exceeds that limited scope of authority, it was done so without jurisdictional authority. 13 Bramlett v. Phillips, 288 S.W.3d 876, 877 (Tex. 2009). 9 Simply put, the Supreme Court found the trial court erred by failing to apply the statutory damages cap provided by section 11.02(a). The Supreme Court found the trial court's 2005 judgment, and the judgment of this Court, incorrectly assumed that the section 11.02(c) statutory Stowers exception waived the section 11.02(a) cap as to both the insurer and the insured, when, in fact, it only waived that cap as to the insurer. Because the cap was not waived as to the insured (Appellee), the trial court and this Court erred by not giving effect to that damages cap. Therefore, the only thing the trial court was authorized to do was to recalculate damages by applying the damages cap provided by section 11.02(a). To the extent the trial court did anything else, it exceeded its limited jurisdiction. The 2009 Judgment The 2009 judgment of the trial court does five things: (1) it vacates the court's 2005 judgment; (2) it calculates the amount of recoverable damages based upon the jury's verdict; (3) it provides that "the unpaid part of this Judgment shall bear post judgment interest at Five Percent (5.0%) per year compounded annually"; (4) it specifically reserves any claim under former article 4590i, section 11.02(c) for another case; and (5) it provides that all relief not expressly granted is denied. 10 1. Vacation of the Trial Court's 2005 Judgment Because that provision of the 2009 judgment vacating the 2005 judgment exceeds the limited scope of the trial court's jurisdictional authority, it was improper and is, hereby, vacated.14 2. Recalculation of Damages Appellants contend the trial court erred in its recalculation of damages because it exceeded the mandate of the Supreme Court by "[c]hanging the rate of postjudgment interest and the date from which postjudgment interest accrues from that in the original judgment, despite not having been directed to do so." Because the trial court did not explain the mathematical process by which it calculated damages, it is impossible for this Court to determine (1) the date upon which the adjusted cap on damages was calculated, (2) the consumer price index used to adjust that cap, (3) the application of settlement credits due to the settlement of another defendant, or (4) the application of an offset of prejudgment interest pursuant to section 304.105(b) of the Texas Finance Code. While this Court is unable to determine the actual methodology used by the trial court in its recalculation of damages, what is clear is that the trial court did not make those recalculations based upon the date of the 2005 judgment. Furthermore, it is 14 Justice Campbell's dissent accurately captures the essence of this issue wherein he discusses this Court's awareness of the impact this appeal could have on the anticipated Stowers action against Dr. Phillips's insurer. Where our opinions differ is in his conclusion that the majority implicitly finds the trial court erred in failing to include in its 2009 judgment the recitations included in its 2005 judgment. The majority opinion should not be read as making that finding. Indeed, reciting those findings in the 2009 judgment would have equally exceeded the limited scope of the trial court's jurisdictional authority. The import and effect of the recitations contained in the 2005 judgment is not a matter before the trial court or this Court at this time. That issue has neither been briefed nor argued by either party, and it should not be affected by inserting a finding in the 2009 judgment that those recitations are "vacated." That's another issue for another day. 11 patently clear from the face of the judgment that the trial court changed the rate of postjudgment interest. Because the trial court did not recalculate damages in accordance with the judgment of the Supreme Court, the trial court erred. 3. Postjudgment Interest When a judgment is rendered by an appellate court or remanded for the limited purpose of entering a new judgment, the judgment creditor is entitled to postjudgment interest on the corrected judgment calculated from the date of the original erroneous judgment. Thornal v. Cargill, 587 S.W.2d 384, 385 (Tex. 1979); D.C. Hall Transport, Inc. v. Hard, 335 S.W.2d 257, 260 (Tex.Civ.App.--Fort Worth 1962, writ ref'd n.r.e.). Even though the 2009 judgment does not specify the date from which postjudgment interest should be calculated, it clearly does not provide for postjudgment interest on the corrected judgment from the date of the original 2005 judgment. Therefore, the trial court erred in failing to specify that postjudgment interest would accrue from the date of the 2005 judgment. 4. Reservation of Section 11.02(c) Claim For Another Case The opinion of the Supreme Court made it clear that any Stowers claim would be the subject of subsequent litigation. Therefore, the trial court did not err in finding that any suit against Appellee's insurer under former article 4590i, section 11.02(c) is reserved for another case. 12 5. Relief Not Expressly Granted Is Denied Due to the limited jurisdiction of the trial court, the granting of additional relief would have exceeded the jurisdiction of the trial court. Therefore, the trial court did not err in denying relief not expressly granted. Conclusion Having found the trial court exceeded the limited jurisdiction granted by the mandate of the Supreme Court by vacating the 2005 judgment, and having found that the trial court erred in the recalculation of damages and the computation of postjudgment interest, Appellants' issue is sustained and the 2009 judgment is reversed. Accordingly, this cause is remanded to the trial court for the recalculation of damages. In calculating damages the trial court shall consider (1) the verdict of the jury, (2) Appellants' request to reduce the jury award of medical expenses by $124,000.00, (3) the judgment of this Court which reversed the award of exemplary damages, (3) this Court's Order of Remittitur, which reformed the 2005 judgment by reducing the recovery of Shane Fuller and Michael Fuller for future pecuniary losses, (4) the pretrial settlement of $2,300,000.00 received by Appellants from Covenant Health Systems d/b/a Covenant Medical Center, and (5) the judgment of the Supreme Court ordering the application of the statutory damages cap provided by section 11.02(a) as of October 18, 2005. Furthermore, in entering its judgment the trial court shall (1) calculate prejudgment interest pursuant to sections 304.003 and 304.103 of the Texas Finance Code from the date of injury, October 29, 2002, until the day before the date the original 13 judgment was signed, October 17, 2005.15 (2) offset prejudgment interest based upon the written settlement offer made February 21, 2005, (3) determine the applicable consumer price index and compute the adjusted section 11.02(a) damages cap as of October 18, 2005,16 and (4) determine the applicable rate for postjudgment interest in accordance with section 304.003 of the Texas Finance Code, as of October 18, 2005. Patrick A. Pirtle Justice Campbell, J., concurring and dissenting. 15 The 2005 judgment found that Appellants were entitled to 1,048 days of prejudgment interest. The actual number of days between date of injury and the day before the judgment was signed is 1,084 days. 16 The consumer price index is promulgated by the U.S. Department of Labor, Bureau of Labor Statistics. See http://www.bls.gov/ro3/fax_9160.htm (last visited December 22, 2011). 14
Q: SQL Server joining temp table takes a very long time I'm trying to add a column to the end of my results that shows if any item in a PO is stocked (with a 'Yes' or 'No'). opPOTRACK is my table with POs and other info that I want to display, inItemLocation is the table that has a row per item. They are (loosely) connection via opPOTRACK.cpono = inItemLocation.PONO after some text manipulation. So far I've figured that the best way would be to put the results in a temporary table and then join that table with my normal query. Two of the tables join on a column where I have to derive the PO number (I didn't design the database and can't change the schema). Doing the string manipulation doesn't slow down my first join, so I'm not sure if it is affecting my second join. When I added the second join it just chugs for several minutes (canceled after 4 minutes; not sure how long it would really take). I'm sure there is something messed up with how I'm joining. IF OBJECT_ID('tempdb..#StockedTbl') IS NOT NULL BEGIN DROP TABLE #StockedTbl END CREATE TABLE #StockedTbl ( ID int IDENTITY(1,1) PRIMARY KEY, PONo varchar(10), Stocked varchar(5) ) INSERT INTO #StockedTbl ( PONo, Stocked ) SELECT item.PONo, "Stocked" = CASE WHEN item.Loc LIKE 'ABC%' THEN 'No' ELSE 'Yes' END FROM inItemLocation item CREATE CLUSTERED INDEX IDX_C_StockedTbl_UserID ON #StockedTbl(PONo) SELECT * FROM (SELECT RIGHT(LEFT(item.PONo,6), 5) AS POTrunc, item.WhseLoc, po.cpono, po.Buyer, po.Vendno, po.OrderDate, po.StockDate, po.StockNote, po.Status, po.StatusChangeDate, ROW_NUMBER() OVER (PARTITION BY po.cpono ORDER BY po.cpono) AS RowNumber, st.Stocked FROM dbo.inItemLocation item LEFT JOIN dbo.opPOTRACK po ON RIGHT(LEFT(item.PONo,6), 5) = po.cpono LEFT JOIN #StockedTbl st ON RIGHT(LEFT(item.PONo,6), 5) = RIGHT(LEFT(st.PONo,6), 5) ) AS a WHERE a.RowNumber = 1 DROP TABLE #StockedTbl A: I would suggest this instead. First, why does the #temp table need an IDENTITY column, and why does it need to be the PRIMARY KEY? Second, why not make a column that facilitates the join better? CREATE TABLE #StockedTbl ( PONo varchar(10), Stocked varchar(5), PONoMatch AS CONVERT(CHAR(5), RIGHT(LEFT(PONo,6),5)) PERSISTED ); CREATE CLUSTERED INDEX x ON #StockedTbl(PONoMatch); Now at least you can take those calculations out of some of your clauses, but depending on where the work is being done (the execution plan can tell us that), you may want to consider computed columns on your base tables as well.
[A retrospective analysis of aborted pregnancy in women engaged in agricultural production in controlled areas of Ukraine]. A retrospective analysis was carried out of failure for a woman to be delivered of a child at the natural time in those female workers engaged in agricultural production in controlled territories of Ukraine (Narodichi and Ovruch districts of Zhytomir Province). Data files were studied of 5371 histories of labor (2440 those before and 2931 after the Chernobyl accident) and 525 records of spontaneous abortion (255 those before and 27 after the ChNPP breakdown). There has been found relationship between the frequency of incomplete pregnancies and density of contamination of soil with cesium-137 in certain settlements.
Recently, FM receivers which are adapted for receiving not only usual FM broadcasting signals, but also TV broadcasting sound signals have been developed. Such an FM receiver usually is provided with an FM receiving band and a TV sound receiving band. The bands are selected by a band selector. In a conventional multi-band FM receiver, however, the FM receiving band is assigned to receive the FM broadcasting signals and TV broadcasting sound signals of the lower frequency channels, i.e., the channels 1, 2 and 3. On the other hand, the TV sound receiving band is assigned to receive the TV broadcasting sound signals of the higher frequency channels, i.e., the channels 4, 5, ..., 12. This is because the frequencies of the lower frequency TV channels are closer to the frequencies of the FM broadcasting signals than to the frequencies of the higher frequency TV channels. Under the circumstances, the multiband FM receiver can be designed easily by assigning the lower frequency TV channels to the FM receiving band, instead of the TV sound receiving band. Thus, the TV channels are separated into at least two receiving bands in the conventional multi-band FM receiver. However, users of the conventional multi-band FM receiver must select the FM receiving band, when reception of the TV broadcasting sound signals of any the lower frequency channels is desired. Therefore, the conventional multi-band FM receiver has a drawback in that it confuses the users, due to the inconsistency between the use of the FM receiving band and the reception of the TV sound signals. In addition, the FM broadcasting signals and the TV broadcasting sound signals are different in the degree of FM modulation. The degree of FM modulation of the TV broadcasting sound signals is less than that of the FM broadcasting signals. As a result, different sound levels are output from the FM receiver for the FM broadcasting signals and the TV broadcasting sound signals. Thus, a user must operate the volume control for adjusting the output sound level, when changing between the FM broadcasting signals and the TV broadcasting sound signals in the FM receiving band.
Q: Find first occurrence of list item above specific class - JQuery So I have a list, and I'm trying to select the last occurrence of the 'nav-header' class in the list above the only list item with the class of 'active'. <li class="nav-header"><a href="#" class="slide" id="general">Main</a></li> <li class="general"><a href="index.php">Home</a></li> <li class="general"><a href="faq.php">FAQ</a></li> <li class="general"><a href="wiki.php">Wiki</a></li> <li class="general"><a href="tos.php">TOS</a></li> <li class="general"><a href="helpdesk.php">Help Desk</a></li> <li class="general"><a href="development.php">Changelog</a></li> <li class="general"><a href="tokens.php">Tokens</a></li> <li class="general"><a href="stats.php">Stats</a></li> <li class="nav-header"><a href="#" class="slide" id="community">Community</a></li> <li class="community"><a href="notepad.php">Notepad</a></li> <li class="community"><a href="messaging.php">Messaging</a></li> <li class="community"><a href="forums/vforum.php?page=1">Main Forum</a></li> <li class="community"><a href="cforum/vforum.php?page=1">Network Forum</a></li> <li class="community"><a href="online.php">Currently Online</a></li> <li class="community active"><a href="find.php">Search</a></li> <li class="community"><a href="gm.php">Global Market</a></li> <li class="community"><a href="bm.php">Black Market</a></li> <li class="community"><a href="mostwanted.php">Most Wanted</a></li> For example, when the 'Search' list item is active, I want to find and return ONLY the Community list item. I can get it to return both Community and Main via the .prevAll function, but can't for the life of me figure out how to return just one. Thanks for the help. A: Try the :first selector, see the demo. $('li.active').prevAll('.nav-header:first')
ARISS on NASA ISS Web site ARISS is mentioned on http://www.spaceflight.nasa.gov/station/. Located in the middle of the page they give a blurb about the Hochwald Gymnasium, Germany contact. 73 Alan Stumpf, KB3DHC kb3dhc@arrl.net ---- Via the sarex mailing list at AMSAT.ORG courtesy of AMSAT-NA. To unsubscribe, send "unsubscribe sarex" to Majordomo@amsat.org
Q: Should I prefer ContextCompat or PermissionChecker for permission checking on Android? I can choose from either of the following ways of checking to see if my app has a given permission. Which one is preferred? ContextCompat (from support-compat lib): ContextCompat.checkSelfPermission(context, Manifest.permission.WRITE_EXTERNAL_STORAGE) Or PermissionChecker (from support-core-utils lib): PermissionChecker.checkSelfPermission(context, Manifest.permission.WRITE_EXTERNAL_STORAGE) Note that (as of 25.3.1) -core-utils depends on -compat: | | +--- com.android.support:support-core-utils:25.3.1 | | | +--- com.android.support:support-annotations:25.3.1 | | | \--- com.android.support:support-compat:25.3.1 (*) A: Stepping into the source of PermissionChecker we can see that it first calls through to Context#checkPermission and bails early if the calling code does not have permission. If the calling code does have permission it then goes to the mysterious AppOpsManager asking if we have permissionToOp, followed by a check against the return of noteProxyOp. This gives us a hint about what this method is for, since the docs for noteProxyOp start with: Make note of an application performing an operation on behalf of another application when handling an IPC. Additionally, if we check the return value of the PermissionChecker method we see we get back one of 3 possible results: The permission check result which is either PERMISSION_GRANTED or PERMISSION_DENIED or PERMISSION_DENIED_APP_OP. That is, 0, -1 or -2 return values. This class appears to be intended for use by apps receiving inter-process communication and performing actions on behalf of other apps. ContextCompat on the other hand, simply grabs the current process ID and directly returns the result of Context#checkPermission: PERMISSION_GRANTED if the given pid/uid is allowed that permission, or PERMISSION_DENIED if it is not. So for most developers writing standard Android apps, use ContextCompat.
497 F.3d 710 (2007) Gary WILLIAMS, Plaintiff-Appellee, v. ROHM AND HAAS PENSION PLAN, Defendant-Appellant. No. 06-2555. United States Court of Appeals, Seventh Circuit. Argued June 6, 2007. Decided August 14, 2007. *711 James T. Malysiak, Lee A. Freeman, Jr. (argued), Jenner & Block, Chicago, IL, for Defendant-Appellant. Linda M. Doyle, McDermott, Will & Emery, Chicago, IL, M. Miller Baker (argued), McDermott, Will & Emery, Washington, DC, for Plaintiff-Appellee. Before RIPPLE, KANNE, and EVANS, Circuit Judges. KANNE, Circuit Judge. Gary Williams filed suit, individually and on behalf of all others similarly situated, alleging that the Rohm and Haas Pension Plan (Plan) violated the Employee Retirement Income Security Act (ERISA) by failing to include a cost-of-living adjustment (COLA) in his lump sum distribution from the Plan. 29 U.S.C. § 1054(c)(3). The district court granted class certification and entered summary judgment for Williams. The district court concluded that the terms of the Plan violated ERISA because the COLA was an accrued benefit as ERISA defines that term. We agree, and therefore affirm the judgment of the district court. I. BACKGROUND The Plan is a defined benefit pension plan under § 3(35) of ERISA. 29 U.S.C. § 1002(35). Section 3.1 of the Plan defines "Accrued Benefit" as "that portion of a Participant's Basic Amount of Normal Retirement Pension, expressed in terms of a monthly single life annuity beginning at or after his Normal Retirement Date, that has accrued as of any determination date in accordance with Article VII." Article VII provides a formula to calculate the "Normal Retirement Pension" as a function of the participant's years of service and level of compensation. The accrued benefit, under the terms of the Plan, is thus the result of this formula, expressed in terms of a monthly single life annuity. The Plan provides participants with a variety of payment options, as relevant here, either a one-time lump sum distribution or a monthly annuity payment. The Plan explains that the lump sum distribution is the actuarial equivalent of the accrued benefit, calculated using interest rates and mortality tables set by the Internal Revenue Code. COLAs are commonly applied to annuities in order to account for inflation. With a COLA, an annuitant's payments will increase each year at a level commensurate with the calculated rate. The Plan calculates each year's COLA based upon the previous year's Consumer Price Index for Urban Wage Earners and Clerical Workers and limits each Participant's COLA to three percent of their annual benefit. The Plan describes the COLA as an "enhancement." While participants who choose to *712 receive their pension payments as an annuity are automatically entitled to a COLA, those who choose a one-time lump sum payment do not qualify for the COLA enhancement. Williams was employed by Rohm and Haas from 1969 until his termination in 1997. As a participant in the Plan, he was entitled to his accrued benefit under the Plan upon his termination. Williams chose to receive his pension in a one-time lump sum distribution of $47,850.71. Six years later, Williams filed a class action suit against Rohm and Haas alleging that he was wrongfully denied benefits under the Plan because his lump sum distribution did not include the present value of the COLA he would have received had he chosen to receive his pension in the form of monthly annuity payments. The district court dismissed the complaint because Williams had not exhausted his administrative remedies. Williams exhausted the administrative process, to no avail, and filed the instant case in 2004. After granting class certification for former Plan participants who had received lump sum distributions without COLAs, the district court denied the Plan's motion for summary judgment and granted Williams's motion for summary judgment. II. ANALYSIS The issue before us is whether the Plan's COLA falls within ERISA's definition of "accrued benefit." If so, then the Plan violates ERISA by providing COLAs to participants who opt for annuity payments but denying COLAs to participants who opt for one-time lump sum distributions. 29 U.S.C. § 1054(c)(3). We review the district court's grant of summary judgment de novo, viewing all facts in the light most favorable to the non-moving party. Sperandeo v. Lorillard Tobacco Co., Inc., 460 F.3d 866, 870 (7th Cir.2006) (citing Vallone v. CNA Fin. Corp., 375 F.3d 623, 631 (7th Cir.2004)); see also Silvernail v. Ameritech Pension Plan, 439 F.3d 355, 357 (7th Cir.2006) (noting that, notwithstanding discretion afforded a plan administrator, claims that the plan as interpreted violates ERISA are reviewed de novo). Summary judgment is proper when "there is no genuine issue as to any material fact and . . . the moving party is entitled to a judgment as a matter of law." FED. R.CIV.P. 56(c). The parties agree that the plain terms of the Plan exclude the COLA from a participant's accrued benefit. Therefore, we need only decide whether this formulation complies with ERISA's requirements. ERISA and the Internal Revenue Code prescribe that if a defined benefit pension plan allows for a lump sum distribution, then that distribution must equal the present value of the accrued benefit expressed in the form of a single-life annuity. 29 U.S.C. § 1054(c)(3); 26 U.S.C. § 411(c)(3); 26 C.F.R. § 1.417(e)-1(d). We recognized this limitation in Berger v. Xerox Corp. Ret. Income Guarantee Plan, where we stated: "ERISA requires that any lump-sum substitute for an accrued pension benefit be the actuarial equivalent of that benefit." 338 F.3d 755, 759 (7th Cir.2003) (citing 29 U.S.C. § 1054(c)(3); May Dept. Stores Co. v. Fed. Ins. Co., 305 F.3d 597, 600 (7th Cir.2002); Esden v. Bank of Boston, 229 F.3d 154, 164, 173 (2d Cir.2000)); see also Call v. Ameritech Mgmt. Pension Plan, 475 F.3d 816, 817 (7th Cir.2007) ("When a participant in a defined-benefit pension plan is given a choice between taking pension benefits as an annuity or in a lump sum, the lump sum must be so calculated as to be the actuarial equivalent of the annuity."). So, what is an "accrued benefit" under ERISA? The Plan urges us to interpret "accrued benefit" to mean whatever the particular plan document says it *713 means. Indeed, it finds support for this interpretation in ERISA § 2(23)(A): "The term `accrued benefit' means — . . . the individual's accrued benefit determined under the plan and . . . expressed in the form of an annual benefit commencing at normal retirement age." 29 U.S.C. § 1002(23)(A). ERISA itself directs us to look at the individual plan's terms in order to discern the accrued benefit. See Bd. of Trs. of Sheet Metal Workers' Nat'l Pension Fund v. Comm'r, 318 F.3d 599, 602-03 (4th Cir. 2003). Under ERISA, "private parties, not the Government, control the level of benefits" provided to pension plan participants. Alessi v. Raybestos-Manhattan, Inc., 451 U.S. 504, 511, 101 S.Ct. 1895, 68 L.Ed.2d 402 (1981). Williams acknowledges that we must look to the individual plan document to determine what the "accrued benefit" is in any given case, but argues that ERISA does not accept the document's definition. Rather, the "accrued benefit" is that benefit a participant would be entitled to if he chose to receive it in the form of a single-life annuity, thus, forcing parity between annuity and lump sum distributions. In this case, the Plan considers the COLA to be an enhancement that is awarded to annuitants, over and above the accrued benefit. Under Williams's interpretation of ERISA, we simply ask: What would Williams get if he chose to receive his pension in annuity payments? The annuity, calculated based upon his years of service and compensation, plus the yearly COLA. That is the accrued benefit. Williams's lump-sum payment would then be the combined present value of the annuity and projected COLA. We considered a very similar issue in Hickey v. Chicago Truck Drivers, Helpers and Warehouse Workers Union, 980 F.2d 465 (7th Cir.1992). In Hickey, a plan terminated without providing funding for future COLAs. We held that the COLA was part of the accrued benefit and, as such, its elimination violated ERISA's anti-cutback provision. Id. at 470; see 29 U.S.C. § 1054(g)(1). In reaching our decision, we distinguished accrued benefits from ancillary benefits. Id. at 468 (citing H.R. Conf. Rep. No. 1280, 93d Cong., 2d Sess. 60, reprinted in 1974 U.S.C.C.A.N. 5038, 5054). Ancillary benefits are those that would be provided by a new employer, separate from any benefits provided by the current employer, such as health or life insurance. Id. (citing H.R.Rep. No. 807, 93d Cong., 2d Sess. 60, reprinted in 1974 U.S.C.C.A.N. 4670, 4726). "In contrast, the COLA [is] inseparably tied to the monthly retirement benefit as a means for maintaining the real value of that benefit. It [cannot], therefore, be said to be ancillary to the benefit, and it would not be provided by a new employer." Id. Accordingly, we stated that "[t]he term `accrued benefit' has a statutory meaning, and the parties cannot change that meaning by simply labeling certain benefits as `accrued benefits' and others, such as the COLA, as `supplementary benefits.'" Id. at 468. But this is precisely what the Plan has attempted to do in this case. It seeks to disguise a penalty exacted against lump sum recipients as a bonus afforded to annuitants. In fact, it appears that the Plan attempted to write around ERISA's limits by explicitly excluding the COLA from lump sum distributions after learning of a district court case holding that a COLA is, per se, an accrued benefit under ERISA. See Laurenzano v. Blue Cross & Blue Shield of Mass., Inc. Ret. Income Trust, 134 F.Supp.2d 189 (D.Mass.2001). The Plan argues that the district court's decision penalizes it for providing an enhanced benefit to annuitants, and that such a penalty is contrary to the purposes of ERISA. In support of this argument, the Plan relies primarily on the Fourth Circuit's opinion in Sheet Metal *714 Workers, quoting: "[I]f trustees of ERISA plans knew that providing an additional benefit to already-retired employees for a given year would lock that benefit in as a floor for all future years, they would be less likely to increase benefits gratuitously in years when the plans were particularly flush." Appellant's Br. p. 24 (quoting 318 F.3d at 605). The key to the quoted passage is that the participants were "already retired." The COLA in that case was in no way "accrued" because it was not included in the plan during the term of the participants' employment. Sheet Metal Workers, 318 F.3d at 601. Employers are not required to provide pension benefits, but when they do, their plans must comply with ERISA, and the promises they make can in no way be considered mere gratuities. See May Dept's Stores Co., 305 F.3d at 601. The Plan cannot avoid that which is dictated by the terms of ERISA. While ERISA generally allows each plan to select the monetary amount of benefits provided, it remains a paternalistic regulation designed to restrict the freedom of contract. Id. Hickey held that a COLA applied to a defined benefit pension plan annuity is an accrued benefit under ERISA, and that holding is determinative in this case. The Plan, as administered, violates ERISA. 29 U.S.C. § 1054(c)(3). If a defined benefit pension plan entitles an annuitant to a COLA, it must also provide the COLA's actuarial equivalent to a participant who chooses instead to receive his pension in the form of a one-time lump sum distribution. III. CONCLUSION For the foregoing reasons, the judgment of the district court is AFFIRMED; and this case is REMANDED to the district court for further proceedings, including calculating the value of the COLAs that were denied.
It’s a big game for… Andy Carroll. Having recovered from a long-term knee injury, the former Liverpool striker is in contention to feature against Arsenal as West Ham look for their first win in five. Carroll’s presence has been missed lately with the Hammers struggling to haul themselves out of the lower end of the league. If Slaven Bilic’s side are to stand any chance of taking something from their game against Arsenal, they’ll need the No 9 to recreate the heroics which saw him score a hat-trick in this fixture last season.
White Settlement: A man pulled out a shotgun at a Texas church service and killed two people before he was fatally shot by congregants who quickly returned fire, police say. Authorities praised the two congregants who opened fire as part of a volunteer security team at West Freeway Church of Christ in White Settlement, about 12 kilometres west of Fort Worth. In this still frame from livestreamed video provided by police, churchgoers take cover while a congregant armed with a handgun (top left) engages a man who opened fire (near top centre just right of windows) during a service at West Freeway Church of Christ in White Settlement, Texas. Credit:AP "This team responded quickly and within six seconds, the shooting was over. Two of the parishioners who were volunteers on the security force drew their weapons and took out the killer immediately, saving untold number of lives," said Lieutenant Governor Dan Patrick, who also hailed the state's gun laws at a news conference on Sunday evening (Monday morning AEDT). Britt Farmer, senior minister of the church, said: "We lost two great men today, but it could have been a lot worse."
Shameless land-banking ads show need for crackdown The fact that more than 300 sections are shamelessly being advertised on Trade Me as land-banking opportunities during a housing crisis shows the need for a crackdown on property speculators, Leader of the Opposition Andrew Little says. “Of the 328 land-banking opportunities being advertised, one third of them – or 110 – are in Auckland where families are desperate for homes to buy. “These advertisements include 1.9 hectares in Takanini in Papakura listed as ‘an opportunity to own this land bank’. It has an RV of $1,875,000 but the vendors are asking for $4.5 million. This property was only just sold a year ago for $2.566 million and sold for $1.85 million in December 2014. “Another advertised as a ‘Special Slice of Paradise – Land Bank Investment!’ is 10.59 hectares in Rodney/Helensville with a price guide of $2.8-$3.2 million. This section is marketed as outside future urban zoning for buyers to cash in on restrictive growth boundaries. However, Rodney is exactly the type of area near Auckland that needs to be developed if the housing crisis is to be addressed. “The most disturbing listing is for a ‘prime investment opportunity’ within the Otahuhu Special Housing Area which is described as one of the ‘last few large land banks’ left in the suburb. National’s Special Housing Areas were supposed to help cool the overheated Auckland housing crisis, not make it worse. “The Government’s failure to tackle the Auckland housing crisis has made it a paradise for speculators with investors now making up 46 per cent of purchasers. This is shutting first home buyers out of the market and putting the Kiwi dream of home ownership even further out of reach. “This is why the Government needs to adopt Labour’s plan to crack down on speculators by taxing those who flick on a property within five years, ending subsidies for major speculators by reforming negative gearing, and stopping the speculative frenzy on Auckland's boundary by abolishing the urban growth limit,” Andrew Little says.
// Copyright (c) 2011 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef CHROME_BROWSER_UI_COCOA_TABLE_ROW_NSIMAGE_CACHE_H_ #define CHROME_BROWSER_UI_COCOA_TABLE_ROW_NSIMAGE_CACHE_H_ #pragma once #import <Cocoa/Cocoa.h> #include "base/memory/scoped_nsobject.h" class SkBitmap; // There are several dialogs that display tabular data with one SkBitmap // per row. This class converts these SkBitmaps to NSImages on demand, and // caches the results. class TableRowNSImageCache { public: // Interface this cache expects for its table model. class Table { public: // Returns the number of rows in the table. virtual int RowCount() const = 0; // Returns the icon of the |row|th row. virtual SkBitmap GetIcon(int row) const = 0; protected: virtual ~Table() {} }; // |model| must outlive the cache. explicit TableRowNSImageCache(Table* model); ~TableRowNSImageCache(); // Lazily converts the image at the given row and caches it in |icon_images_|. NSImage* GetImageForRow(int row); // Call these functions every time the table changes, to update the cache. void OnModelChanged(); void OnItemsChanged(int start, int length); void OnItemsAdded(int start, int length); void OnItemsRemoved(int start, int length); private: // The table model we query for row count and icons. Table* model_; // weak // Stores strong NSImage refs for icons. If an entry is NULL, it will be // created in GetImageForRow(). scoped_nsobject<NSPointerArray> icon_images_; }; #endif // CHROME_BROWSER_UI_COCOA_TABLE_ROW_NSIMAGE_CACHE_H_
Q: Java Nested If condition I need to have nested if condition but i see my code has the same logic for the else portion as well. Syntax if(outer_condition){ if(inner_condition){ } else{ employee.setCompany("ABC"); employee.setAddress("DEF"); } } else{ employee.setCompany("ABC"); employee.setAddress("DEF"); } Both Else portion has to execute the same logic, is there a way to avoid this and make single Else condition ? Thanks A: You can combine both conditions with && operator. if (condition1 && condition2) { // If both conditions code } else { employee.setCompany("ABC"); employee.setAddress("DEF"); } Note If the code of the if statement is absent as it seams from your code is better to replace it with if (!condition1 || !condition2) { employee.setCompany("ABC"); employee.setAddress("DEF"); }
Synthesis and selective inhibitory activity against human COX-1 of novel 1-(4-substituted-thiazol-2-yl)-3,5-di(hetero)aryl-pyrazoline derivatives. Novel 1-(4-ethyl carboxylate-thiazol-2-yl)-3,5-di(hetero)aryl-2-pyrazoline derivatives were obtained by reacting 3,5-di(hetero)aryl-1-thiocarbamoyl-2-pyrazolines with the ethyl ester of α-bromo-pyruvic acid. The synthesized compounds were confirmed by spectroscopic data and assayed to evaluate their in vitro ability to inhibit both isoforms of human cyclooxygenase (hCOX). Some derivatives (compounds 5, 6, 13, 16, and 17) displayed promising selectivity against hCOX-1 in the micromolar range and were shown to have a selectivity index similar or better than the reference drugs (indometacin, diclofenac). The introduction of a phenyl or a 4-F-phenyl ring on the C5 associated with a 4-substituted phenyl or a heteroaryl group on the C3 of (4-substituted-thiazol-2-yl)pyrazoline derivatives improved the activity against hCOX-1. Thanks to these preliminary results it could be possible to extend our knowledge of the pharmacophoric requirements for the discovery of new pyrazoline-based hCOX-1 inhibitors.
Report: NSA collecting millions of contact lists WASHINGTON (AP) — The National Security Agency has been sifting through millions of contact lists from personal email and instant messaging accounts around the world — including those of Americans — in its effort to find possible links to terrorism or other criminal activity, according to a published report. The Washington Post reported late Monday that the spy agency intercepts hundreds of thousands of email address books every day from private accounts on Yahoo, Gmail, Facebook and Hotmail that move though global data links. The NSA also collects about a half million buddy lists from live chat services and email accounts. The Post said it learned about the collection tactics from secret documents provided by NSA leaker Edward Snowden and confirmed by senior intelligence officials. It was the latest revelation of the spy agency's practices to be disclosed by Snowden, the former NSA systems analyst who fled the U.S. and now resides in Russia. The newspaper said the NSA analyzes the contacts to map relationships and connections among various foreign intelligence targets. During a typical day last year, the NSA's Special Source Operations branch collected more than 440,000 email address books, the Post said. That would correspond to a rate of more than 250 million a year. Advertisement A spokesman for the national intelligence director's office, which oversees the NSA, told the Post that the agency was seeking intelligence on valid targets and was not interested in personal information from ordinary Americans. Spokesman Shawn Turner said the NSA was guided by rules that require the agency to "minimize the acquisition, use and dissemination" of information that identifies U.S. citizens or permanent residents. While the collection was taking place overseas, the Post said it encompassed the contact lists of many American users. The spy agency obtains the contact lists through secret arrangements with foreign telecommunications companies or other services that control Internet traffic, the Post reported. Earlier this year, Snowden gave documents to the Post and Britain's Guardian newspaper disclosing U.S. surveillance programs that collect vast amounts of phone records and online data in the name of foreign intelligence, often sweeping up information on American citizens. The collection of contact lists in bulk would be illegal if done in the United States, but the Post said the agency can get around that restriction by intercepting lists from access points around the world. The newspaper quoted a senior intelligence official as saying NSA analysts may not search or distribute information from the contacts database unless they can "make the case that something in there is a valid foreign intelligence target in and of itself." Commenting on the Post story, Alex Abdo, a staff attorney with the American Civil Liberties Union, said in an emailed statement: "This revelation further confirms that the NSA has relied on the pretense of 'foreign intelligence gathering' to sweep up an extraordinary amount of information about everyday Americans. The NSA's indiscriminate collection of information about innocent people can't be justified on security grounds, and it presents a serious threat to civil liberties."
// // Generated by Microsoft (R) HLSL Shader Compiler 10.1 // // // Buffer Definitions: // // cbuffer XeTextureLoadConstants // { // // uint xe_texture_load_guest_base; // Offset: 0 Size: 4 // uint xe_texture_load_guest_pitch; // Offset: 4 Size: 4 // uint2 xe_texture_load_guest_storage_width_height;// Offset: 8 Size: 8 // uint3 xe_texture_load_size_blocks; // Offset: 16 Size: 12 // uint xe_texture_load_is_3d_endian; // Offset: 28 Size: 4 // uint xe_texture_load_host_base; // Offset: 32 Size: 4 // uint xe_texture_load_host_pitch; // Offset: 36 Size: 4 // uint xe_texture_load_height_texels;// Offset: 40 Size: 4 // // } // // // Resource Bindings: // // Name Type Format Dim ID HLSL Bind Count // ------------------------------ ---------- ------- ----------- ------- -------------- ------ // xe_texture_load_source texture uint4 buf T0 t0 1 // xe_texture_load_dest UAV uint4 buf U0 u0 1 // XeTextureLoadConstants cbuffer NA NA CB0 cb0 1 // // // // Input signature: // // Name Index Mask Register SysValue Format Used // -------------------- ----- ------ -------- -------- ------- ------ // no Input // // Output signature: // // Name Index Mask Register SysValue Format Used // -------------------- ----- ------ -------- -------- ------- ------ // no Output cs_5_1 dcl_globalFlags refactoringAllowed dcl_constantbuffer CB0[0:0][3], immediateIndexed, space=0 dcl_resource_buffer (uint,uint,uint,uint) T0[0:0], space=0 dcl_uav_typed_buffer (uint,uint,uint,uint) U0[0:0], space=0 dcl_input vThreadID.xyz dcl_temps 8 dcl_thread_group 16, 32, 1 ishl r0.x, vThreadID.x, l(1) mov r0.yz, vThreadID.yyzy uge r1.xyz, r0.xyzx, CB0[0][1].xyzx or r0.z, r1.y, r1.x or r0.z, r1.z, r0.z if_nz r0.z ret endif ishl r0.yz, r0.xxyx, l(0, 2, 2, 0) ishl r0.y, r0.y, l(2) imad r0.z, vThreadID.z, CB0[0][2].z, r0.z imad r0.y, r0.z, CB0[0][2].y, r0.y iadd r0.y, r0.y, CB0[0][2].x ushr r0.z, CB0[0][2].y, l(4) ieq r0.w, CB0[0][0].y, l(-1) if_nz r0.w and r1.x, CB0[0][1].w, l(1) if_nz r1.x iadd r1.xy, CB0[0][0].wzww, l(31, 31, 0, 0) ishr r2.xyz, vThreadID.yzyy, l(4, 2, 3, 0) ushr r1.xy, r1.xyxx, l(4, 5, 0, 0) and r1.x, r1.x, l(0x0ffffffe) imad r1.x, r2.y, r1.x, r2.x ibfe r1.zw, l(0, 0, 27, 29), l(0, 0, 4, 2), vThreadID.xxxx imad r1.x, r1.x, r1.y, r1.z ishl r1.y, vThreadID.y, l(12) and r1.y, r1.y, l(0x00006000) bfi r1.y, l(3), l(10), r0.x, r1.y ishr r1.y, r1.y, l(6) iadd r1.z, r2.y, r2.z bfi r2.x, l(1), l(1), r1.z, l(0) iadd r1.w, r1.w, r2.x bfi r1.w, l(2), l(1), r1.w, l(0) bfi r1.z, l(1), l(0), r1.z, r1.w bfi r1.xw, l(18, 0, 0, 18), l(12, 0, 0, 15), r1.xxxx, l(0, 0, 0, 0) imad r1.xy, r1.yyyy, l(2, 16, 0, 0), r1.xwxx bfi r1.xy, l(2, 2, 0, 0), l(10, 13, 0, 0), vThreadID.zzzz, r1.xyxx bfi r1.w, l(1), l(4), vThreadID.y, l(0) ubfe r2.x, l(3), l(6), r1.x and r2.y, r1.z, l(6) bfi r1.z, l(1), l(8), r1.z, l(0) imad r1.z, r2.x, l(32), r1.z imad r1.z, r2.y, l(4), r1.z bfi r1.xy, l(6, 6, 0, 0), l(0, 3, 0, 0), r1.wwww, r1.xyxx bfi r1.y, l(9), l(3), r1.z, r1.y bfi r1.x, l(6), l(0), r1.x, r1.y else ibfe r1.yz, l(0, 27, 29, 0), l(0, 4, 2, 0), vThreadID.xxxx ishr r2.xy, vThreadID.yyyy, l(5, 2, 0, 0) iadd r1.w, CB0[0][0].z, l(31) ushr r1.w, r1.w, l(5) imad r1.y, r2.x, r1.w, r1.y ishl r1.w, vThreadID.y, l(7) and r2.xz, r1.wwww, l(1792, 0, 2048, 0) bfi r1.w, l(3), l(5), r0.x, r2.x bfi r1.w, l(21), l(11), r1.y, r1.w bfi r2.w, l(1), l(4), vThreadID.y, l(0) iadd r1.w, r1.w, r2.w ishl r3.xy, r2.xxxx, l(3, 2, 0, 0) bfi r3.xy, l(3, 3, 0, 0), l(8, 7, 0, 0), r0.xxxx, r3.xyxx bfi r3.xy, l(21, 21, 0, 0), l(14, 13, 0, 0), r1.yyyy, r3.xyxx imad r2.xw, r2.wwww, l(8, 0, 0, 4), r3.xxxy bfi r1.y, l(12), l(0), r2.z, r2.x and r2.x, r2.w, l(1792) iadd r1.y, r1.y, r2.x and r2.x, r2.y, l(2) iadd r1.z, r1.z, r2.x bfi r1.z, l(2), l(6), r1.z, l(0) iadd r1.y, r1.y, r1.z bfi r1.x, l(6), l(0), r1.w, r1.y endif else ishl r0.x, r0.x, l(4) iadd r1.y, CB0[0][1].y, l(31) and r1.y, r1.y, l(-32) imad r1.y, vThreadID.z, r1.y, vThreadID.y imad r1.x, r1.y, CB0[0][0].y, r0.x endif iadd r0.x, r1.x, CB0[0][0].x ushr r0.xy, r0.xyxx, l(4, 4, 0, 0) ushr r1.x, CB0[0][1].w, l(1) ld r2.xyzw, r0.xxxx, T0[0].yxzw ieq r1.xyz, r1.xxxx, l(1, 2, 3, 0) or r1.xy, r1.yzyy, r1.xyxx if_nz r1.x ishl r3.xyzw, r2.yxzw, l(8, 8, 8, 8) and r3.xyzw, r3.xyzw, l(0xff00ff00, 0xff00ff00, 0xff00ff00, 0xff00ff00) ushr r4.xyzw, r2.yxzw, l(8, 8, 8, 8) and r4.xyzw, r4.xyzw, l(0x00ff00ff, 0x00ff00ff, 0x00ff00ff, 0x00ff00ff) iadd r2.xyzw, r3.yxzw, r4.yxzw endif if_nz r1.y ushr r3.xyzw, r2.yxzw, l(16, 16, 16, 16) bfi r2.xyzw, l(16, 16, 16, 16), l(16, 16, 16, 16), r2.xyzw, r3.yxzw mov r3.xy, r2.ywyy else mov r3.xy, r2.ywyy endif ishl r4.xyz, r2.zzzz, l(3, 7, 12, 0) ushr r5.xyz, r2.zzzz, l(13, 4, 9, 0) mov r4.w, r5.x and r1.zw, r4.xxxw, l(0, 0, 248, 248) mov r5.xw, r4.zzzy and r2.yz, r5.wwzw, l(0, 0x0003f000, 0x0003f000, 0) iadd r1.zw, r1.zzzw, r2.yyyz and r2.yz, r5.xxyx, l(0, 0x0f800000, 0x0f800000, 0) iadd r1.zw, r1.zzzw, r2.yyyz ushr r2.yz, r1.zzwz, l(0, 5, 5, 0) and r2.yz, r2.yyzy, l(0, 0x00700007, 0x00700007, 0) iadd r1.zw, r1.zzzw, r2.yyyz ushr r2.yz, r1.zzwz, l(0, 6, 6, 0) and r2.yz, r2.yyzy, l(0, 3072, 3072, 0) iadd r1.zw, r1.zzzw, r2.yyyz ishl r2.y, r3.y, l(1) and r2.y, r2.y, l(0xaaaaaaaa) ushr r4.xyz, r3.yxxy, l(1, 8, 16, 0) and r2.z, r4.x, l(0x55555555) iadd r2.y, r2.z, r2.y ushr r2.z, r2.y, l(1) and r2.z, r2.z, l(0x55555555) xor r5.x, r2.z, r2.y mov r3.z, r4.y and r2.yz, r3.xxzx, l(0, 255, 255, 0) bfi r2.w, l(8), l(16), r2.x, l(0) iadd r2.w, r2.w, r4.z uge r3.x, r2.z, r2.y ushr r3.yz, r2.wwww, l(0, 1, 2, 0) and r3.w, r2.w, r3.y and r3.w, r3.w, l(0x00492492) ishl r4.x, r3.w, l(1) ushr r4.y, r3.w, l(1) iadd r3.w, r3.w, r4.x iadd r3.w, r3.w, r4.y and r4.x, r2.w, l(0x00249249) iadd r4.y, r4.x, l(0x00db6db6) and r4.y, r3.w, r4.y or r4.z, r2.w, r3.y and r6.xy, r3.yzyy, l(0x00249249, 0x00249249, 0, 0) or r3.y, r3.z, r4.z and r3.y, r3.y, l(0x00249249) xor r3.y, r3.y, l(0x00249249) not r4.zw, r6.xxxy and r3.z, r4.z, r4.x and r3.z, r4.w, r3.z or r2.w, r2.w, r3.y iadd r2.w, r2.w, l(0xffdb6db7) or r2.w, r3.z, r2.w ishl r3.yz, r3.zzzz, l(0, 2, 1, 0) or r4.x, r2.w, r3.y not r3.w, r3.w and r3.w, r3.w, r4.x or r3.w, r4.y, r3.w iadd r3.y, r3.z, r3.y or r2.w, r2.w, r3.y movc r2.w, r3.x, r3.w, r2.w not r4.x, r5.x ushr r4.yzw, r4.xxxx, l(0, 2, 4, 6) and r4.xyzw, r4.xyzw, l(3, 3, 3, 3) ushr r5.yzw, r5.xxxx, l(0, 2, 4, 6) and r6.xyzw, r5.xyzw, l(3, 3, 3, 3) imul null, r6.xyzw, r1.wwww, r6.xyzw imad r4.xyzw, r4.xyzw, r1.zzzz, r6.xyzw and r6.xyzw, r4.xyzw, l(1023, 1023, 1023, 1023) udiv r6.xyzw, null, r6.xyzw, l(3, 3, 3, 3) ishl r6.xyzw, r6.xyzw, l(16, 16, 16, 16) ubfe r7.xyzw, l(10, 10, 10, 10), l(10, 10, 10, 10), r4.xyzw udiv r7.xyzw, null, r7.xyzw, l(3, 3, 3, 3) bfi r6.xyzw, l(8, 8, 8, 8), l(8, 8, 8, 8), r7.xyzw, r6.xyzw ushr r4.xyzw, r4.xyzw, l(20, 20, 20, 20) udiv r4.xyzw, null, r4.xyzw, l(3, 3, 3, 3) or r4.xyzw, r4.xyzw, r6.xyzw ushr r3.y, r2.w, l(1) and r3.y, r2.w, r3.y and r3.y, r3.y, l(1170) ishl r3.z, r3.y, l(1) ushr r3.w, r3.y, l(1) iadd r3.y, r3.y, r3.z iadd r3.y, r3.y, r3.w not r3.z, r3.y and r3.yw, r2.wwww, r3.yyyz iadd r5.y, -r3.w, l(2925) and r3.z, r3.z, r5.y and r5.yz, r3.zzwz, l(0, 7, 7, 0) imul null, r5.z, r2.z, r5.z imad r5.y, r2.y, r5.y, r5.z udiv r5.y, null, r5.y, l(5) ubfe r6.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r3.zzzz ubfe r7.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r3.wwww imul null, r7.xyz, r2.zzzz, r7.xyzx imad r6.xyz, r2.yyyy, r6.xyzx, r7.xyzx udiv r6.xyz, null, r6.xyzx, l(5, 5, 5, 0) ishl r6.xyz, r6.xyzx, l(8, 16, 24, 0) or r3.z, r5.y, r6.x or r3.z, r6.y, r3.z or r3.z, r6.z, r3.z ishl r5.yzw, r3.yyyy, l(0, 5, 10, 15) and r5.yzw, r5.yyzw, l(0, 256, 0x00010000, 0x01000000) bfi r3.y, l(1), l(0), r3.y, r5.y iadd r3.y, r5.z, r3.y iadd r3.y, r5.w, r3.y imad r3.y, r3.y, l(255), r3.z not r3.z, r2.w and r3.w, r3.z, l(7) and r5.y, r2.w, l(7) imul null, r5.y, r2.z, r5.y imad r3.w, r2.y, r3.w, r5.y udiv r3.w, null, r3.w, l(7) ubfe r5.yzw, l(0, 3, 3, 3), l(0, 3, 6, 9), r3.zzzz ubfe r6.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r2.wwww imul null, r6.xyz, r2.zzzz, r6.xyzx imad r5.yzw, r2.yyyy, r5.yyzw, r6.xxyz udiv r5.yzw, null, r5.yyzw, l(0, 7, 7, 7) ishl r5.yzw, r5.yyzw, l(0, 8, 16, 24) or r3.z, r3.w, r5.y or r3.z, r5.z, r3.z or r3.z, r5.w, r3.z movc r6.w, r3.x, r3.y, r3.z ishl r6.xyz, r6.wwww, l(24, 16, 8, 0) and r6.xyzw, r6.xyzw, l(0xff000000, 0xff000000, 0xff000000, 0xff000000) or r4.xyzw, r4.xyzw, r6.xyzw store_uav_typed U0[0].xyzw, r0.yyyy, r4.xyzw imad r3.y, vThreadID.y, l(4), l(1) ilt r3.y, r3.y, CB0[0][2].z if_nz r3.y iadd r3.z, r0.z, r0.y ushr r4.x, r5.x, l(8) not r6.x, r4.x ushr r6.yzw, r6.xxxx, l(0, 2, 4, 6) and r6.xyzw, r6.xyzw, l(3, 3, 3, 3) ushr r4.yzw, r4.xxxx, l(0, 2, 4, 6) and r4.xyzw, r4.xyzw, l(3, 3, 3, 3) imul null, r4.xyzw, r1.wwww, r4.xyzw imad r4.xyzw, r6.xyzw, r1.zzzz, r4.xyzw and r6.xyzw, r4.xyzw, l(1023, 1023, 1023, 1023) udiv r6.xyzw, null, r6.xyzw, l(3, 3, 3, 3) ishl r6.xyzw, r6.xyzw, l(16, 16, 16, 16) ubfe r7.xyzw, l(10, 10, 10, 10), l(10, 10, 10, 10), r4.xyzw udiv r7.xyzw, null, r7.xyzw, l(3, 3, 3, 3) bfi r6.xyzw, l(8, 8, 8, 8), l(8, 8, 8, 8), r7.xyzw, r6.xyzw ushr r4.xyzw, r4.xyzw, l(20, 20, 20, 20) udiv r4.xyzw, null, r4.xyzw, l(3, 3, 3, 3) or r4.xyzw, r4.xyzw, r6.xyzw ushr r3.w, r2.w, l(12) ushr r5.y, r3.w, l(1) and r5.y, r3.w, r5.y and r5.y, r5.y, l(1170) ishl r5.z, r5.y, l(1) ushr r5.w, r5.y, l(1) iadd r5.y, r5.y, r5.z iadd r5.y, r5.y, r5.w not r5.z, r5.y and r5.yw, r3.wwww, r5.yyyz iadd r6.x, -r5.w, l(2925) and r5.z, r5.z, r6.x and r6.xy, r5.zwzz, l(7, 7, 0, 0) imul null, r6.y, r2.z, r6.y imad r6.x, r2.y, r6.x, r6.y ubfe r6.yzw, l(0, 3, 3, 3), l(0, 3, 6, 9), r5.zzzz ubfe r7.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r5.wwww imul null, r7.xyz, r2.zzzz, r7.xyzx imad r6.yzw, r2.yyyy, r6.yyzw, r7.xxyz udiv r6.xyzw, null, r6.xyzw, l(5, 5, 5, 5) ishl r6.yzw, r6.yyzw, l(0, 8, 16, 24) or r5.z, r6.y, r6.x or r5.z, r6.z, r5.z or r5.z, r6.w, r5.z ishl r6.xyz, r5.yyyy, l(5, 10, 15, 0) and r6.xyz, r6.xyzx, l(256, 0x00010000, 0x01000000, 0) bfi r5.y, l(1), l(0), r5.y, r6.x iadd r5.y, r6.y, r5.y iadd r5.y, r6.z, r5.y imad r5.y, r5.y, l(255), r5.z not r3.w, r3.w and r5.z, r3.w, l(7) ubfe r6.xyzw, l(3, 3, 3, 3), l(12, 15, 18, 21), r2.wwww imul null, r6.xyzw, r2.zzzz, r6.xyzw imad r2.w, r2.y, r5.z, r6.x udiv r2.w, null, r2.w, l(7) ubfe r7.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r3.wwww imad r6.xyz, r2.yyyy, r7.xyzx, r6.yzwy udiv r6.xyz, null, r6.xyzx, l(7, 7, 7, 0) ishl r6.xyz, r6.xyzx, l(8, 16, 24, 0) or r2.w, r2.w, r6.x or r2.w, r6.y, r2.w or r2.w, r6.z, r2.w movc r6.w, r3.x, r5.y, r2.w ishl r6.xyz, r6.wwww, l(24, 16, 8, 0) and r6.xyzw, r6.xyzw, l(0xff000000, 0xff000000, 0xff000000, 0xff000000) or r4.xyzw, r4.xyzw, r6.xyzw store_uav_typed U0[0].xyzw, r3.zzzz, r4.xyzw imad r2.w, vThreadID.y, l(4), l(2) ilt r2.w, r2.w, CB0[0][2].z if_nz r2.w ushr r2.x, r2.x, l(8) ushr r3.zw, r2.xxxx, l(0, 0, 1, 2) and r2.w, r2.x, r3.z and r2.w, r2.w, l(0x00492492) ishl r4.x, r2.w, l(1) ushr r4.y, r2.w, l(1) iadd r2.w, r2.w, r4.x iadd r2.w, r2.w, r4.y and r4.x, r2.x, l(0x00249249) iadd r4.y, r4.x, l(0x00db6db6) and r4.y, r2.w, r4.y or r4.z, r2.x, r3.z and r5.yz, r3.zzwz, l(0, 0x00249249, 0x00249249, 0) or r3.z, r3.w, r4.z and r3.z, r3.z, l(0x00249249) xor r3.z, r3.z, l(0x00249249) not r4.zw, r5.yyyz and r3.w, r4.z, r4.x and r3.w, r4.w, r3.w or r2.x, r2.x, r3.z iadd r2.x, r2.x, l(0xffdb6db7) or r2.x, r3.w, r2.x ishl r3.zw, r3.wwww, l(0, 0, 2, 1) or r4.x, r2.x, r3.z not r2.w, r2.w and r2.w, r2.w, r4.x or r2.w, r4.y, r2.w iadd r3.z, r3.w, r3.z or r2.x, r2.x, r3.z movc r2.x, r3.x, r2.w, r2.x ishl r2.w, r0.z, l(1) iadd r2.w, r0.y, r2.w ushr r4.x, r5.x, l(16) not r6.x, r4.x ushr r6.yzw, r6.xxxx, l(0, 2, 4, 6) and r6.xyzw, r6.xyzw, l(3, 3, 3, 3) ushr r4.yzw, r4.xxxx, l(0, 2, 4, 6) and r4.xyzw, r4.xyzw, l(3, 3, 3, 3) imul null, r4.xyzw, r1.wwww, r4.xyzw imad r4.xyzw, r6.xyzw, r1.zzzz, r4.xyzw and r6.xyzw, r4.xyzw, l(1023, 1023, 1023, 1023) udiv r6.xyzw, null, r6.xyzw, l(3, 3, 3, 3) ishl r6.xyzw, r6.xyzw, l(16, 16, 16, 16) ubfe r7.xyzw, l(10, 10, 10, 10), l(10, 10, 10, 10), r4.xyzw udiv r7.xyzw, null, r7.xyzw, l(3, 3, 3, 3) bfi r6.xyzw, l(8, 8, 8, 8), l(8, 8, 8, 8), r7.xyzw, r6.xyzw ushr r4.xyzw, r4.xyzw, l(20, 20, 20, 20) udiv r4.xyzw, null, r4.xyzw, l(3, 3, 3, 3) or r4.xyzw, r4.xyzw, r6.xyzw ushr r3.z, r2.x, l(1) and r3.z, r2.x, r3.z and r3.z, r3.z, l(1170) ishl r3.w, r3.z, l(1) ushr r5.y, r3.z, l(1) iadd r3.z, r3.z, r3.w iadd r3.z, r3.z, r5.y not r3.w, r3.z and r5.y, r2.x, r3.w iadd r5.z, -r5.y, l(2925) and r3.w, r3.w, r5.z and r5.z, r3.w, l(7) and r5.w, r5.y, l(7) imul null, r5.w, r2.z, r5.w imad r5.z, r2.y, r5.z, r5.w udiv r5.z, null, r5.z, l(5) ubfe r6.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r3.wwww ubfe r7.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r5.yyyy imul null, r7.xyz, r2.zzzz, r7.xyzx imad r6.xyz, r2.yyyy, r6.xyzx, r7.xyzx udiv r6.xyz, null, r6.xyzx, l(5, 5, 5, 0) ishl r6.xyz, r6.xyzx, l(8, 16, 24, 0) or r3.w, r5.z, r6.x or r3.w, r6.y, r3.w or r3.w, r6.z, r3.w and r3.z, r2.x, r3.z ishl r5.yzw, r3.zzzz, l(0, 5, 10, 15) and r5.yzw, r5.yyzw, l(0, 256, 0x00010000, 0x01000000) bfi r3.z, l(1), l(0), r3.z, r5.y iadd r3.z, r5.z, r3.z iadd r3.z, r5.w, r3.z imad r3.z, r3.z, l(255), r3.w not r3.w, r2.x and r5.y, r3.w, l(7) and r5.z, r2.x, l(7) imul null, r5.z, r2.z, r5.z imad r5.y, r2.y, r5.y, r5.z udiv r5.y, null, r5.y, l(7) ubfe r6.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r3.wwww ubfe r7.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r2.xxxx imul null, r7.xyz, r2.zzzz, r7.xyzx imad r6.xyz, r2.yyyy, r6.xyzx, r7.xyzx udiv r6.xyz, null, r6.xyzx, l(7, 7, 7, 0) ishl r6.xyz, r6.xyzx, l(8, 16, 24, 0) or r3.w, r5.y, r6.x or r3.w, r6.y, r3.w or r3.w, r6.z, r3.w movc r6.w, r3.x, r3.z, r3.w ishl r6.xyz, r6.wwww, l(24, 16, 8, 0) and r6.xyzw, r6.xyzw, l(0xff000000, 0xff000000, 0xff000000, 0xff000000) or r4.xyzw, r4.xyzw, r6.xyzw store_uav_typed U0[0].xyzw, r2.wwww, r4.xyzw imad r2.w, vThreadID.y, l(4), l(3) ilt r2.w, r2.w, CB0[0][2].z if_nz r2.w imad r2.w, l(3), r0.z, r0.y ushr r4.x, r5.x, l(24) not r5.x, r4.x ushr r5.yzw, r5.xxxx, l(0, 2, 4, 6) and r5.xyzw, r5.xyzw, l(3, 3, 3, 3) ushr r4.yzw, r4.xxxx, l(0, 2, 4, 6) and r4.xyzw, r4.xyzw, l(3, 3, 3, 3) imul null, r4.xyzw, r1.wwww, r4.xyzw imad r4.xyzw, r5.xyzw, r1.zzzz, r4.xyzw and r5.xyzw, r4.xyzw, l(1023, 1023, 1023, 1023) udiv r5.xyzw, null, r5.xyzw, l(3, 3, 3, 3) ishl r5.xyzw, r5.xyzw, l(16, 16, 16, 16) ubfe r6.xyzw, l(10, 10, 10, 10), l(10, 10, 10, 10), r4.xyzw udiv r6.xyzw, null, r6.xyzw, l(3, 3, 3, 3) bfi r5.xyzw, l(8, 8, 8, 8), l(8, 8, 8, 8), r6.xyzw, r5.xyzw ushr r4.xyzw, r4.xyzw, l(20, 20, 20, 20) udiv r4.xyzw, null, r4.xyzw, l(3, 3, 3, 3) or r4.xyzw, r4.xyzw, r5.xyzw ushr r1.z, r2.x, l(12) ushr r1.w, r1.z, l(1) and r1.w, r1.z, r1.w and r1.w, r1.w, l(1170) ishl r3.z, r1.w, l(1) ushr r3.w, r1.w, l(1) iadd r1.w, r1.w, r3.z iadd r1.w, r1.w, r3.w not r3.z, r1.w and r3.w, r1.z, r3.z iadd r5.x, -r3.w, l(2925) and r3.z, r3.z, r5.x and r5.xy, r3.zwzz, l(7, 7, 0, 0) imul null, r5.y, r2.z, r5.y imad r5.x, r2.y, r5.x, r5.y ubfe r5.yzw, l(0, 3, 3, 3), l(0, 3, 6, 9), r3.zzzz ubfe r6.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r3.wwww imul null, r6.xyz, r2.zzzz, r6.xyzx imad r5.yzw, r2.yyyy, r5.yyzw, r6.xxyz udiv r5.xyzw, null, r5.xyzw, l(5, 5, 5, 5) ishl r5.yzw, r5.yyzw, l(0, 8, 16, 24) or r3.z, r5.y, r5.x or r3.z, r5.z, r3.z or r3.z, r5.w, r3.z and r1.w, r1.w, r1.z ishl r5.xyz, r1.wwww, l(5, 10, 15, 0) and r5.xyz, r5.xyzx, l(256, 0x00010000, 0x01000000, 0) bfi r1.w, l(1), l(0), r1.w, r5.x iadd r1.w, r5.y, r1.w iadd r1.w, r5.z, r1.w imad r1.w, r1.w, l(255), r3.z not r1.z, r1.z and r3.z, r1.z, l(7) ubfe r5.xyzw, l(3, 3, 3, 3), l(12, 15, 18, 21), r2.xxxx imul null, r5.xyzw, r2.zzzz, r5.xyzw imad r2.x, r2.y, r3.z, r5.x udiv r2.x, null, r2.x, l(7) ubfe r6.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r1.zzzz imad r5.xyz, r2.yyyy, r6.xyzx, r5.yzwy udiv r5.xyz, null, r5.xyzx, l(7, 7, 7, 0) ishl r5.xyz, r5.xyzx, l(8, 16, 24, 0) or r1.z, r2.x, r5.x or r1.z, r5.y, r1.z or r1.z, r5.z, r1.z movc r5.w, r3.x, r1.w, r1.z ishl r5.xyz, r5.wwww, l(24, 16, 8, 0) and r5.xyzw, r5.xyzw, l(0xff000000, 0xff000000, 0xff000000, 0xff000000) or r4.xyzw, r4.xyzw, r5.xyzw store_uav_typed U0[0].xyzw, r2.wwww, r4.xyzw endif endif endif iadd r0.y, r0.y, l(1) movc r0.w, r0.w, l(2), l(1) iadd r0.x, r0.w, r0.x ld r2.xyzw, r0.xxxx, T0[0].yxzw if_nz r1.x ishl r4.xyzw, r2.yxzw, l(8, 8, 8, 8) and r4.xyzw, r4.xyzw, l(0xff00ff00, 0xff00ff00, 0xff00ff00, 0xff00ff00) ushr r5.xyzw, r2.yxzw, l(8, 8, 8, 8) and r5.xyzw, r5.xyzw, l(0x00ff00ff, 0x00ff00ff, 0x00ff00ff, 0x00ff00ff) iadd r2.xyzw, r4.yxzw, r5.yxzw endif if_nz r1.y ushr r1.xyzw, r2.yxzw, l(16, 16, 16, 16) bfi r2.xyzw, l(16, 16, 16, 16), l(16, 16, 16, 16), r2.xyzw, r1.yxzw mov r1.xy, r2.ywyy else mov r1.xy, r2.ywyy endif ishl r4.xyz, r2.zzzz, l(3, 7, 12, 0) ushr r5.xyz, r2.zzzz, l(13, 4, 9, 0) mov r4.w, r5.x and r0.xw, r4.xxxw, l(248, 0, 0, 248) mov r5.xw, r4.zzzy and r2.yz, r5.wwzw, l(0, 0x0003f000, 0x0003f000, 0) iadd r0.xw, r0.xxxw, r2.yyyz and r2.yz, r5.xxyx, l(0, 0x0f800000, 0x0f800000, 0) iadd r0.xw, r0.xxxw, r2.yyyz ushr r2.yz, r0.xxwx, l(0, 5, 5, 0) and r2.yz, r2.yyzy, l(0, 0x00700007, 0x00700007, 0) iadd r0.xw, r0.xxxw, r2.yyyz ushr r2.yz, r0.xxwx, l(0, 6, 6, 0) and r2.yz, r2.yyzy, l(0, 3072, 3072, 0) iadd r0.xw, r0.xxxw, r2.yyyz ishl r1.w, r1.y, l(1) and r1.w, r1.w, l(0xaaaaaaaa) ushr r2.yzw, r1.yyxx, l(0, 1, 8, 16) and r1.y, r2.y, l(0x55555555) iadd r1.y, r1.y, r1.w ushr r1.w, r1.y, l(1) and r1.w, r1.w, l(0x55555555) xor r4.x, r1.w, r1.y mov r1.z, r2.z and r1.xy, r1.xzxx, l(255, 255, 0, 0) bfi r1.z, l(8), l(16), r2.x, l(0) iadd r1.z, r1.z, r2.w uge r1.w, r1.y, r1.x ushr r2.yz, r1.zzzz, l(0, 1, 2, 0) and r2.w, r1.z, r2.y and r2.w, r2.w, l(0x00492492) ishl r3.x, r2.w, l(1) ushr r3.z, r2.w, l(1) iadd r2.w, r2.w, r3.x iadd r2.w, r2.w, r3.z and r3.x, r1.z, l(0x00249249) iadd r3.z, r3.x, l(0x00db6db6) and r3.z, r2.w, r3.z or r3.w, r1.z, r2.y and r5.xy, r2.yzyy, l(0x00249249, 0x00249249, 0, 0) or r2.y, r2.z, r3.w and r2.y, r2.y, l(0x00249249) xor r2.y, r2.y, l(0x00249249) not r5.xy, r5.xyxx and r2.z, r3.x, r5.x and r2.z, r5.y, r2.z or r1.z, r1.z, r2.y iadd r1.z, r1.z, l(0xffdb6db7) or r1.z, r2.z, r1.z ishl r2.yz, r2.zzzz, l(0, 2, 1, 0) or r3.x, r1.z, r2.y not r2.w, r2.w and r2.w, r2.w, r3.x or r2.w, r3.z, r2.w iadd r2.y, r2.z, r2.y or r1.z, r1.z, r2.y movc r1.z, r1.w, r2.w, r1.z not r5.x, r4.x ushr r5.yzw, r5.xxxx, l(0, 2, 4, 6) and r5.xyzw, r5.xyzw, l(3, 3, 3, 3) ushr r4.yzw, r4.xxxx, l(0, 2, 4, 6) and r6.xyzw, r4.xyzw, l(3, 3, 3, 3) imul null, r6.xyzw, r0.wwww, r6.xyzw imad r5.xyzw, r5.xyzw, r0.xxxx, r6.xyzw and r6.xyzw, r5.xyzw, l(1023, 1023, 1023, 1023) udiv r6.xyzw, null, r6.xyzw, l(3, 3, 3, 3) ishl r6.xyzw, r6.xyzw, l(16, 16, 16, 16) ubfe r7.xyzw, l(10, 10, 10, 10), l(10, 10, 10, 10), r5.xyzw udiv r7.xyzw, null, r7.xyzw, l(3, 3, 3, 3) bfi r6.xyzw, l(8, 8, 8, 8), l(8, 8, 8, 8), r7.xyzw, r6.xyzw ushr r5.xyzw, r5.xyzw, l(20, 20, 20, 20) udiv r5.xyzw, null, r5.xyzw, l(3, 3, 3, 3) or r5.xyzw, r5.xyzw, r6.xyzw ushr r2.y, r1.z, l(1) and r2.y, r1.z, r2.y and r2.y, r2.y, l(1170) ishl r2.z, r2.y, l(1) ushr r2.w, r2.y, l(1) iadd r2.y, r2.y, r2.z iadd r2.y, r2.y, r2.w not r2.z, r2.y and r2.yw, r1.zzzz, r2.yyyz iadd r3.x, -r2.w, l(2925) and r2.z, r2.z, r3.x and r3.xz, r2.zzwz, l(7, 0, 7, 0) imul null, r3.z, r1.y, r3.z imad r3.x, r1.x, r3.x, r3.z udiv r3.x, null, r3.x, l(5) ubfe r4.yzw, l(0, 3, 3, 3), l(0, 3, 6, 9), r2.zzzz ubfe r6.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r2.wwww imul null, r6.xyz, r1.yyyy, r6.xyzx imad r4.yzw, r1.xxxx, r4.yyzw, r6.xxyz udiv r4.yzw, null, r4.yyzw, l(0, 5, 5, 5) ishl r4.yzw, r4.yyzw, l(0, 8, 16, 24) or r2.z, r3.x, r4.y or r2.z, r4.z, r2.z or r2.z, r4.w, r2.z ishl r3.xzw, r2.yyyy, l(5, 0, 10, 15) and r3.xzw, r3.xxzw, l(256, 0, 0x00010000, 0x01000000) bfi r2.y, l(1), l(0), r2.y, r3.x iadd r2.y, r3.z, r2.y iadd r2.y, r3.w, r2.y imad r2.y, r2.y, l(255), r2.z not r2.z, r1.z and r2.w, r2.z, l(7) and r3.x, r1.z, l(7) imul null, r3.x, r1.y, r3.x imad r2.w, r1.x, r2.w, r3.x udiv r2.w, null, r2.w, l(7) ubfe r3.xzw, l(3, 0, 3, 3), l(3, 0, 6, 9), r2.zzzz ubfe r4.yzw, l(0, 3, 3, 3), l(0, 3, 6, 9), r1.zzzz imul null, r4.yzw, r1.yyyy, r4.yyzw imad r3.xzw, r1.xxxx, r3.xxzw, r4.yyzw udiv r3.xzw, null, r3.xxzw, l(7, 0, 7, 7) ishl r3.xzw, r3.xxzw, l(8, 0, 16, 24) or r2.z, r2.w, r3.x or r2.z, r3.z, r2.z or r2.z, r3.w, r2.z movc r6.w, r1.w, r2.y, r2.z ishl r6.xyz, r6.wwww, l(24, 16, 8, 0) and r6.xyzw, r6.xyzw, l(0xff000000, 0xff000000, 0xff000000, 0xff000000) or r5.xyzw, r5.xyzw, r6.xyzw store_uav_typed U0[0].xyzw, r0.yyyy, r5.xyzw if_nz r3.y iadd r2.y, r0.z, r0.y ushr r3.x, r4.x, l(8) not r5.x, r3.x ushr r5.yzw, r5.xxxx, l(0, 2, 4, 6) and r5.xyzw, r5.xyzw, l(3, 3, 3, 3) ushr r3.yzw, r3.xxxx, l(0, 2, 4, 6) and r3.xyzw, r3.xyzw, l(3, 3, 3, 3) imul null, r3.xyzw, r0.wwww, r3.xyzw imad r3.xyzw, r5.xyzw, r0.xxxx, r3.xyzw and r5.xyzw, r3.xyzw, l(1023, 1023, 1023, 1023) udiv r5.xyzw, null, r5.xyzw, l(3, 3, 3, 3) ishl r5.xyzw, r5.xyzw, l(16, 16, 16, 16) ubfe r6.xyzw, l(10, 10, 10, 10), l(10, 10, 10, 10), r3.xyzw udiv r6.xyzw, null, r6.xyzw, l(3, 3, 3, 3) bfi r5.xyzw, l(8, 8, 8, 8), l(8, 8, 8, 8), r6.xyzw, r5.xyzw ushr r3.xyzw, r3.xyzw, l(20, 20, 20, 20) udiv r3.xyzw, null, r3.xyzw, l(3, 3, 3, 3) or r3.xyzw, r3.xyzw, r5.xyzw ushr r2.z, r1.z, l(12) ushr r2.w, r2.z, l(1) and r2.w, r2.z, r2.w and r2.w, r2.w, l(1170) ishl r4.y, r2.w, l(1) ushr r4.z, r2.w, l(1) iadd r2.w, r2.w, r4.y iadd r2.w, r2.w, r4.z not r4.y, r2.w and r4.z, r2.z, r4.y iadd r4.w, -r4.z, l(2925) and r4.y, r4.y, r4.w and r4.w, r4.y, l(7) and r5.x, r4.z, l(7) imul null, r5.x, r1.y, r5.x imad r4.w, r1.x, r4.w, r5.x udiv r4.w, null, r4.w, l(5) ubfe r5.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r4.yyyy ubfe r6.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r4.zzzz imul null, r6.xyz, r1.yyyy, r6.xyzx imad r5.xyz, r1.xxxx, r5.xyzx, r6.xyzx udiv r5.xyz, null, r5.xyzx, l(5, 5, 5, 0) ishl r5.xyz, r5.xyzx, l(8, 16, 24, 0) or r4.y, r4.w, r5.x or r4.y, r5.y, r4.y or r4.y, r5.z, r4.y and r2.w, r2.w, r2.z ishl r5.xyz, r2.wwww, l(5, 10, 15, 0) and r5.xyz, r5.xyzx, l(256, 0x00010000, 0x01000000, 0) bfi r2.w, l(1), l(0), r2.w, r5.x iadd r2.w, r5.y, r2.w iadd r2.w, r5.z, r2.w imad r2.w, r2.w, l(255), r4.y not r2.z, r2.z and r4.y, r2.z, l(7) ubfe r5.xyzw, l(3, 3, 3, 3), l(12, 15, 18, 21), r1.zzzz imul null, r5.xyzw, r1.yyyy, r5.xyzw imad r1.z, r1.x, r4.y, r5.x udiv r1.z, null, r1.z, l(7) ubfe r4.yzw, l(0, 3, 3, 3), l(0, 3, 6, 9), r2.zzzz imad r4.yzw, r1.xxxx, r4.yyzw, r5.yyzw udiv r4.yzw, null, r4.yyzw, l(0, 7, 7, 7) ishl r4.yzw, r4.yyzw, l(0, 8, 16, 24) or r1.z, r1.z, r4.y or r1.z, r4.z, r1.z or r1.z, r4.w, r1.z movc r5.w, r1.w, r2.w, r1.z ishl r5.xyz, r5.wwww, l(24, 16, 8, 0) and r5.xyzw, r5.xyzw, l(0xff000000, 0xff000000, 0xff000000, 0xff000000) or r3.xyzw, r3.xyzw, r5.xyzw store_uav_typed U0[0].xyzw, r2.yyyy, r3.xyzw imad r1.z, vThreadID.y, l(4), l(2) ilt r1.z, r1.z, CB0[0][2].z if_nz r1.z ushr r1.z, r2.x, l(8) ushr r2.xy, r1.zzzz, l(1, 2, 0, 0) and r2.z, r1.z, r2.x and r2.z, r2.z, l(0x00492492) ishl r2.w, r2.z, l(1) ushr r3.x, r2.z, l(1) iadd r2.z, r2.z, r2.w iadd r2.z, r2.z, r3.x and r2.w, r1.z, l(0x00249249) iadd r3.x, r2.w, l(0x00db6db6) and r3.x, r2.z, r3.x or r3.y, r1.z, r2.x and r3.zw, r2.xxxy, l(0, 0, 0x00249249, 0x00249249) or r2.x, r2.y, r3.y and r2.x, r2.x, l(0x00249249) xor r2.x, r2.x, l(0x00249249) not r3.yz, r3.zzwz and r2.y, r2.w, r3.y and r2.y, r3.z, r2.y or r1.z, r1.z, r2.x iadd r1.z, r1.z, l(0xffdb6db7) or r1.z, r2.y, r1.z ishl r2.xy, r2.yyyy, l(2, 1, 0, 0) or r2.w, r1.z, r2.x not r2.z, r2.z and r2.z, r2.z, r2.w or r2.z, r3.x, r2.z iadd r2.x, r2.y, r2.x or r1.z, r1.z, r2.x movc r1.z, r1.w, r2.z, r1.z ishl r2.x, r0.z, l(1) iadd r2.x, r0.y, r2.x ushr r3.x, r4.x, l(16) not r5.x, r3.x ushr r5.yzw, r5.xxxx, l(0, 2, 4, 6) and r5.xyzw, r5.xyzw, l(3, 3, 3, 3) ushr r3.yzw, r3.xxxx, l(0, 2, 4, 6) and r3.xyzw, r3.xyzw, l(3, 3, 3, 3) imul null, r3.xyzw, r0.wwww, r3.xyzw imad r3.xyzw, r5.xyzw, r0.xxxx, r3.xyzw and r5.xyzw, r3.xyzw, l(1023, 1023, 1023, 1023) udiv r5.xyzw, null, r5.xyzw, l(3, 3, 3, 3) ishl r5.xyzw, r5.xyzw, l(16, 16, 16, 16) ubfe r6.xyzw, l(10, 10, 10, 10), l(10, 10, 10, 10), r3.xyzw udiv r6.xyzw, null, r6.xyzw, l(3, 3, 3, 3) bfi r5.xyzw, l(8, 8, 8, 8), l(8, 8, 8, 8), r6.xyzw, r5.xyzw ushr r3.xyzw, r3.xyzw, l(20, 20, 20, 20) udiv r3.xyzw, null, r3.xyzw, l(3, 3, 3, 3) or r3.xyzw, r3.xyzw, r5.xyzw ushr r2.y, r1.z, l(1) and r2.y, r1.z, r2.y and r2.y, r2.y, l(1170) ishl r2.z, r2.y, l(1) ushr r2.w, r2.y, l(1) iadd r2.y, r2.y, r2.z iadd r2.y, r2.y, r2.w not r2.z, r2.y and r2.yw, r1.zzzz, r2.yyyz iadd r4.y, -r2.w, l(2925) and r2.z, r2.z, r4.y and r4.yz, r2.zzwz, l(0, 7, 7, 0) imul null, r4.z, r1.y, r4.z imad r4.y, r1.x, r4.y, r4.z udiv r4.y, null, r4.y, l(5) ubfe r5.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r2.zzzz ubfe r6.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r2.wwww imul null, r6.xyz, r1.yyyy, r6.xyzx imad r5.xyz, r1.xxxx, r5.xyzx, r6.xyzx udiv r5.xyz, null, r5.xyzx, l(5, 5, 5, 0) ishl r5.xyz, r5.xyzx, l(8, 16, 24, 0) or r2.z, r4.y, r5.x or r2.z, r5.y, r2.z or r2.z, r5.z, r2.z ishl r4.yzw, r2.yyyy, l(0, 5, 10, 15) and r4.yzw, r4.yyzw, l(0, 256, 0x00010000, 0x01000000) bfi r2.y, l(1), l(0), r2.y, r4.y iadd r2.y, r4.z, r2.y iadd r2.y, r4.w, r2.y imad r2.y, r2.y, l(255), r2.z not r2.z, r1.z and r2.w, r2.z, l(7) and r4.y, r1.z, l(7) imul null, r4.y, r1.y, r4.y imad r2.w, r1.x, r2.w, r4.y udiv r2.w, null, r2.w, l(7) ubfe r4.yzw, l(0, 3, 3, 3), l(0, 3, 6, 9), r2.zzzz ubfe r5.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r1.zzzz imul null, r5.xyz, r1.yyyy, r5.xyzx imad r4.yzw, r1.xxxx, r4.yyzw, r5.xxyz udiv r4.yzw, null, r4.yyzw, l(0, 7, 7, 7) ishl r4.yzw, r4.yyzw, l(0, 8, 16, 24) or r2.z, r2.w, r4.y or r2.z, r4.z, r2.z or r2.z, r4.w, r2.z movc r5.w, r1.w, r2.y, r2.z ishl r5.xyz, r5.wwww, l(24, 16, 8, 0) and r5.xyzw, r5.xyzw, l(0xff000000, 0xff000000, 0xff000000, 0xff000000) or r3.xyzw, r3.xyzw, r5.xyzw store_uav_typed U0[0].xyzw, r2.xxxx, r3.xyzw imad r2.x, vThreadID.y, l(4), l(3) ilt r2.x, r2.x, CB0[0][2].z if_nz r2.x imad r0.y, l(3), r0.z, r0.y ushr r2.x, r4.x, l(24) not r3.x, r2.x ushr r3.yzw, r3.xxxx, l(0, 2, 4, 6) and r3.xyzw, r3.xyzw, l(3, 3, 3, 3) ushr r2.yzw, r2.xxxx, l(0, 2, 4, 6) and r2.xyzw, r2.xyzw, l(3, 3, 3, 3) imul null, r2.xyzw, r0.wwww, r2.xyzw imad r2.xyzw, r3.xyzw, r0.xxxx, r2.xyzw and r3.xyzw, r2.xyzw, l(1023, 1023, 1023, 1023) udiv r3.xyzw, null, r3.xyzw, l(3, 3, 3, 3) ishl r3.xyzw, r3.xyzw, l(16, 16, 16, 16) ubfe r4.xyzw, l(10, 10, 10, 10), l(10, 10, 10, 10), r2.xyzw udiv r4.xyzw, null, r4.xyzw, l(3, 3, 3, 3) bfi r3.xyzw, l(8, 8, 8, 8), l(8, 8, 8, 8), r4.xyzw, r3.xyzw ushr r2.xyzw, r2.xyzw, l(20, 20, 20, 20) udiv r2.xyzw, null, r2.xyzw, l(3, 3, 3, 3) or r2.xyzw, r2.xyzw, r3.xyzw ushr r0.x, r1.z, l(12) ushr r0.z, r0.x, l(1) and r0.z, r0.x, r0.z and r0.z, r0.z, l(1170) ishl r0.w, r0.z, l(1) ushr r3.x, r0.z, l(1) iadd r0.z, r0.z, r0.w iadd r0.z, r0.z, r3.x not r0.w, r0.z and r3.x, r0.w, r0.x iadd r3.y, -r3.x, l(2925) and r0.w, r0.w, r3.y and r3.y, r0.w, l(7) and r3.z, r3.x, l(7) imul null, r3.z, r1.y, r3.z imad r3.y, r1.x, r3.y, r3.z ubfe r4.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r0.wwww ubfe r3.xzw, l(3, 0, 3, 3), l(3, 0, 6, 9), r3.xxxx imul null, r3.xzw, r1.yyyy, r3.xxzw imad r3.xzw, r1.xxxx, r4.xxyz, r3.xxzw udiv r3.xyzw, null, r3.xyzw, l(5, 5, 5, 5) ishl r3.xzw, r3.xxzw, l(8, 0, 16, 24) or r0.w, r3.x, r3.y or r0.w, r3.z, r0.w or r0.w, r3.w, r0.w and r0.z, r0.z, r0.x ishl r3.xyz, r0.zzzz, l(5, 10, 15, 0) and r3.xyz, r3.xyzx, l(256, 0x00010000, 0x01000000, 0) bfi r0.z, l(1), l(0), r0.z, r3.x iadd r0.z, r3.y, r0.z iadd r0.z, r3.z, r0.z imad r0.z, r0.z, l(255), r0.w not r0.x, r0.x and r0.w, r0.x, l(7) ubfe r3.xyzw, l(3, 3, 3, 3), l(12, 15, 18, 21), r1.zzzz imul null, r3.xyzw, r1.yyyy, r3.xyzw imad r0.w, r1.x, r0.w, r3.x udiv r0.w, null, r0.w, l(7) ubfe r4.xyz, l(3, 3, 3, 0), l(3, 6, 9, 0), r0.xxxx imad r1.xyz, r1.xxxx, r4.xyzx, r3.yzwy udiv r1.xyz, null, r1.xyzx, l(7, 7, 7, 0) ishl r1.xyz, r1.xyzx, l(8, 16, 24, 0) or r0.x, r0.w, r1.x or r0.x, r1.y, r0.x or r0.x, r1.z, r0.x movc r1.w, r1.w, r0.z, r0.x ishl r1.xyz, r1.wwww, l(24, 16, 8, 0) and r1.xyzw, r1.xyzw, l(0xff000000, 0xff000000, 0xff000000, 0xff000000) or r1.xyzw, r1.xyzw, r2.xyzw store_uav_typed U0[0].xyzw, r0.yyyy, r1.xyzw endif endif endif ret // Approximately 855 instruction slots used
Q: Facebook "error 2" with Phonegap Build Facebook Connect Plugin on ios OK, I'm experiencing the "Error 2" problem and there are lots of questions / answers about this on this site. Here's a very well put-together one: com.facebook.sdk error 2 on iOS However, while my error is the same, my situation is different and none of the presented fixes have worked for me. I'm using Phonegap Build @ 2.5.0 with the included Phonegap Build Facebook Connect plugin. This works in all situations and on all devices except for iOS devices that the user has logged on to Facebook via Settings --> Facebook. I've confirmed that it makes no difference if the user is logged into the Facebook app, just if their phone is logged into Facebook. Here's the full error message: "The operation couldn't be completed. (com.facebook.sdk error 2.)" Other answers and other sites on the web have suggested these possible problems: BundleIdentifier and BundleURLName in my info.plist file don't match the Bundle ID under Native iOS app in the settings of my Facebook app. The app is still in Sandbox mode The app is disabled in the Facebook Settings (device's settings -> Facebook -> Allow These Apps To Use Your Account). iOS 6.0 doesn't allow for the asking of read and write permissions at the same time. However, my bundle IDs are correct. I'm not in Sandbox mode in Facebook. It's enabled under Facebook settings and I'm not asking for read and write permissions at the same time. I can fix the problem sure enough by logging out of the phone's connection to Facebook. Also, if I login to my app and then log the phone into Facebook, the app still works fine. This suggests a permission or error to me. Can anyone please shed some light on this for me? Thanks. A: For posterity, the problem was that I was asking for read permissions on the initial login and then I asked for ALL permissions again when I wanted to write. I only should have been asking for the incremental write permissions when I wanted to write to Facebook.
{ "name": "\u6d77\u5929OA", "author": "fofa", "version": "0.1.0", "matches": [ { "search": "body", "text": "HTVOS.js" } ] }
Q: Python3--How to implement binary search in number game Hello I am working on learning binary search trees. The program explains itself. I am confused on whether or not I should write a function to half the numbers. I am just confused on the logic of it all. If you could help I would greatly appreciate it. list_of_numbers = [i for i in range(1,101)] print("THIS IS YOUR LIST OF NUMBERS", list_of_numbers) lowest_number = 1 highest_number = len(list_of_numbers)-1 mid = (len(list_of_numbers)) / 2 print("IS THIS YOUR NUMBER???:", mid) number_of_guesses = 0 while lowest_number <= highest_number: print('Is your number: ', mid) print('please enter "<,>, or ="') first_guess = input("???:::::::::") first_answer = first_guess print(first_answer) equals = "=" greaterthan = ">" lessthan = "<" if first_answer == equals: print('Great JOB I GOT YOUR NUMBER ON THE FIRST TRY') break if first_answer == lessthan: print('The number is now between 49-1, half it.') break elif first_answer == greaterthan: print('The number is now between 51-100') break else: print('Type one of the answers') break number_of_guesses = number_of_guesses + 1 A: You don't need a function to simply divide by 2. What you should be doing for a binary search is keeping track of the upper and lower bounds for the number; then you can calculate the guess as (upper + lower) / 2. If the player says the guess is too high, then set the upper bound to the current guess. If they say the guess is too low, then set the lower bound to the current guess. Repeat that until the correct number is found. BTW, this isn't really a search tree, it's just a basic binary search. A search tree would be storing all the possible numbers in a connected tree graph and using that to search for the answer, which this isn't doing.
Engineer Scheduler Location: Luton Sector: Test & Maintenance Job type: Permanent Job reference: TNH1104/34 Salary: £25,000 - £28,000 This vacancy has now expired. Job description My client, a global organisation who manufacture Mechanical Process Equipment for all the major players in the Oil & Gas industry, have an urgent requirement for an Engineer Scheduler on a 12month Fixed Term Contract at their site in Bedfordshire. The ideal candidate for the Engineer Scheduler job working on a 12month Fixed Term Contract in Bedfordshire will be experienced with managing engineers and carry out problem solving and keeping documentation up to date.
Evidence for origin of certain childhood acute lymphoblastic leukemias and lymphomas in thymus-derived lymphocytes. Lymphoblasts from children with acute lymphoblastic leukemia (ALL) or malignant lymphoblastic lymphoma were studied using surface markers characteristic of T and B lymphocytes. A B-cell marker, i.e. surface immunoglobulin, was absent in all cases studied. Fouteen of 22 children (64%) had lymphoblasts with one or both markers of T lymphocytes, i.e. receptors for sheep erythrocytes (E) and/or human T-lymphocyte antigen (HTLA) detectable using heterologous antithymocyte sera absorbed with B lymphocytes. In all instances, lymphoblasts which carried E receptors also carried HTLA. However, lymphoblasts in 6 cases carried HTLA but not E receptors. It is possible that ALL may often involve T lymphocytes which are early in differentiation (i.e. prior to development of E receptors) or, alternatively, that E receptors may be lost from T cells following malignant transformation. Thymus enlargement was found only in cases of ALL or lymphoma where T markers were present. Lymphoblasts carried the same markers when examined in various sites and at various times from the same patient.
vagazette.com Balancing Act Opting for a storybook life instead of a cautionary tale Heidi Stevens Balancing Act July 7, 2013 Advertisement "I don't want my girls to grow up scared." It was this realization that sent Patty Chang Anker finally, cautiously, at age 39, up the steps of a high dive at her local pool, onto the wobbly wheels of a bicycle and into the waves of the Atlantic Ocean on a boogie board. (Not all on the same day.) Anker was raised to proceed with caution. "When my friends were out climbing trees and skinning knees, I was in the library reading about Laura Ingalls climbing trees and skinning knees," she writes in her upcoming book, "Some Nerve: Lessons Learned While Becoming Brave" (Riverhead Books). She spent her first four decades in safe pursuits and was well on her way to providing her daughters, now 12 and 7, a similarly circumspect existence. "Be careful!" she would call out. "It's a parking lot! A busy street! Those are train tracks! You could choke, you could fall, you could get electrocuted! Don't knock into things! Look where you're going!" She jokes that she might as well have stood on a street corner with a megaphone, shouting, "The end is near." Then, one day, a new friend casually invited her to the beach. And Anker, ignoring her "Greek Chorus of Perpetual Doubt," casually said yes. Seven minutes into the ride, she came clean. "I don't know how to ride a bike," she told her new pal. "I've never gone camping. I'm scared of the ocean. And rivers. And most things in nature, to be honest. I don't even know how to dive into a swimming pool. Or do a handstand. "I'm so afraid of getting hurt or looking stupid," she admitted, "that I don't try things." Then came the epiphany — about her daughters mostly, but also about how small her world had become. "Anxiety narrows the meaning of your life," Anker told me during a phone chat. "So the question became, 'What can I do about it?'" She joined Toastmasters, embarked on obstacle courses, took self-defense classes. She started a blog, "Facing Forty Upside Down." Not easy for the gal whose internal dialogue, upon being invited to the beach that momentous day, went like this: My husband worked long hours at a law firm and hadn't breathed fresh air in a decade. My Chinese immigrant parents would not approve. Had they sacrificed everything for their eldest child to squander her education and leave her job to stay home with children, and then have her put those children in camp, and leave laundry in the hamper, so she could go sit in the sun? "I had to lower the volume of other people's voices and raise the volume of my own voice," Anker said. "It was a lightning bolt in my life to come out from under the voices of my parents, my bosses, my small children and actually hear my own voice." She learned to bike and dive and surf and face her darkest fears, including death. And she watched her relationships flourish. "It has made every single relationship more real," she says. "I've been able to bring more of my true self to every interaction, and that fundamentally changes everything. The biggest, brightest aura you're ever going to give the world happens when you accomplish something you've never done before." Her story reminds me of a quote that may or may not be from Chinese philosopher Laotzu. (I read it on Facebook.) "If you do not change direction, you may end up where you are heading." How many of us, I wonder, like where we're heading? How many of us have the courage, like Anker, to change direction? In her book, Anker quotes writing coach Lawrence Block: "Someone once told me that fear and courage are like lightning and thunder. They both start out at the same time, but the fear travels faster and arrives sooner. If we just wait a moment, the requisite courage will be along shortly." She draws on Block's wisdom when her old fear arises. And when his words aren't enough? She listens to her older daughter. "As Gigi advised when I balked at the top of a spiral water slide, 'Say wheee!'" Anker writes. "'Wheee!' makes everything less scary."
Background {#Sec1} ========== The permanent growth in the development and improvement of new measurement techniques have led to a wealth of data from heterogeneous sources. The integration of all available data obtained from diverse studies has the potential to provide a more comprehensive and deeper understanding of the studied subject \[[@CR1]--[@CR3]\]. One example is the investigation of an organism's response to an external stimulus at different molecular levels. Large-scale studies at molecular levels like transcriptomics, proteomics, lipidomics or metabolomics can be summarized by the term 'omics levels'. These omics levels are linked to each other and are considered in their entirety. They describe the overall biological processes which occur in the analyzed organism. Potential links can be characterized by level-shared ('overlapping') components (such as genes or proteins) or the participation of components of different molecular levels in level-shared pathways. As widely reported, the integration and analysis of data from multiple levels measured with diverse techniques at different time points are challenging. In an intuitive and commonly used approach ('simple approach'), the analysis of several sets of omics data is based on the comparison of lists of differentially expressed genes (DEGs) and differentially synthesized proteins (DSyPs) identified in experimental datasets. However, the use of only DEGs and DSyPs is threshold-dependent and usually incomplete due to experimental limitations. For example, the use of liquid chromatography-mass spectrometry (LC-MS/MS)-based shotgun proteomics analysis for the identification of DSyPs is usually limited in the quantification of low abundant proteins due to the large dynamic range of protein abundances that needs to be covered \[[@CR4], [@CR5]\]. Other approaches, including diverse pathway enrichment analyses, assign both differentially and non-differentially expressed genes or their synthesized proteins to specific pathways which are part of biological processes. The level of activity of such pathways can be estimated by taking into account measurements of changes in gene expression or protein synthesis. However, as these approaches are based on pre-defined lists of pathways, they exclude unknown pathways which may also have important functions \[[@CR6]\]. Over the last decades, the analysis of protein-protein interaction networks (PPINs) has become a useful approach \[[@CR7]\]. By identifying direct (physical) contacts and indirect interactions (e.g., via regulatory cascades) between two or more proteins, PPINs point to structural and functional relationships between their nodes \[[@CR8]\]. Several de novo network enrichment approaches were developed to extract connected sub-networks from larger interaction networks. Such sub-networks containing sets of closely related proteins are defined as modules \[[@CR9]\]. There are many examples in the literature demonstrating the usefulness of modules in research data interpretation. For instance, Stuart et al. analyzed genetic modules to detect co-expressed genes that are involved in similar biological processes \[[@CR10]\], while Trevino et al. \[[@CR11]\] have shown the usefulness of investigating inter-module connectivity to identify molecular cross-talk between normal prostate epithelial and prostate carcinoma cells. Another very interesting application of modules is the identification of prognostic or drug response biomarkers \[[@CR12]\]. In this context, modules also show their potential for the characterization of drug-caused side effects occurring in addition to effects on the intended primary drug target. Wang et al. \[[@CR13]\] demonstrated that major contributing factors of such side effects can be investigated by considering the primary drug target and its local network structure. Several categories of modules have been described until now (Fig. [1](#Fig1){ref-type="fig"}). Examples are topological modules composed of proteins showing a high degree of inner-connectiveness or functional modules that contain proteins associated to specific biological functions \[[@CR14], [@CR15]\]. So-called regulatory modules are defined as sets of co-expressed genes which share a common function \[[@CR16]\]. Popular methods for the detection of regulatory modules are: DEGAS \[[@CR17]\], MATISSE \[[@CR15]\], KeyPathwayMiner \[[@CR18]\] and ModuleDiscoverer \[[@CR19]\]. Among them, the recently published ModuleDiscoverer (MD) includes a heuristic that approximates the PPIN's underlying community structure based on maximal cliques. While a community defines a group of proteins featuring a higher within-edge density in comparison to the edge density connecting them, a clique represents a set of proteins with edges between each pair of them. A clique is maximal if no node (e.g., protein) exists which extends that clique. MD was shown to be very efficient in the detection of regulatory modules for gene expression data in the context of animal models of non-alcoholic fatty liver disease \[[@CR19]\].Fig. 1Module categories. Exemplarily selected categories of modules within protein-protein interaction networks. Proteins are represented by circles, interactions by edges In this study, we applied the simple approach (SA), the recently published module-detection approach MD as well as KeyPathwayMiner to experimental data of different molecular levels, measurement techniques and time points. As a case study, we analyzed the molecular response of the human pathogenic fungus *Aspergillus fumigatus* to the antifungal drug caspofungin. *A. fumigatus* causes local and systemic infections in immunocompromised individuals \[[@CR20]\]. One therapeutic approach is the use of the lipopeptide caspofungin of the group of echinocandins. Caspofungin specifically targets the fungal cell wall by inhibiting the synthesis of the polysaccharide β-(1,3)-D-glucan \[[@CR21]\]. Fungal cells respond to caspofungin by the adaption of gene expression and, consequently, protein biosynthesis and secretion of molecules \[[@CR22]\]. Therefore, we analyzed the transcriptomic, proteomic and secretomic response of *A. fumigatus* to caspofungin at several time points to gain a deeper understanding of the overall molecular response of this fungus to this drug. We demonstrated the so far untested capacity of MD to integrate multilevel omics data and showed that this level of integration is not achievable using SA. Moreover, module-detecting approaches facilitate the identification of potential key players in the organism's stress response which are not detectable by commonly used approaches comparing lists of differentially abundant molecules. Methods {#Sec2} ======= Omics data and data processing {#Sec3} ------------------------------ Data analyses were performed in R version 3.4.1 using packages provided by Bioconductor \[[@CR23]\]. Strain and culture conditions {#Sec4} ----------------------------- Mycelia of the *Aspergillus fumigatus* strain CEA17 Δ*akuB* \[[@CR24]\] were pre-cultured for 16 h in *Aspergillus* minimal medium (AMM, \[[@CR25]\]) containing 50 mM glucose and 70 mM NaNO~3~ and then stressed with a sub-inhibitory concentration of caspofungin (100 ng/ml) as described in Altwasser et al. \[[@CR26]\]. Liquid cultures were inoculated with 1 × 10^6^ conidia/ml and cultivated at 37 °C with shaking at 200 rpm. Samples for analyzing the transcriptomic, proteomic and secretomic response of the fungus were taken at the indicated time points after treatment. Secreted proteins were precipitated overnight from culture supernatants as described below. Transcriptome data {#Sec5} ------------------ RNA extraction, cDNA library construction and RNA-Seq analysis by Illumina next-generation sequencing of samples taken at 0 h, 0.5 h, 1 h, 4 h and 8 h after caspofungin treatment were performed as described in \[[@CR26]\]. Likewise, data were pre-processed as described in \[[@CR26]\]. Genes were annotated by identifiers provided by the *Aspergillus* Genome Database (AspGD, as of September 2015 \[[@CR27]\]). In addition, identifiers provided by the Central *Aspergillus* Data Repository (CADRE) \[[@CR28]\] were obtained using the package *biomaRt* \[[@CR29]\] provided by Bioconductor as of February 2017. For each time point, expression values were compared to the control sample taken at 0 h. Only those genes with an absolute log2 Fold Change (log2FC) value greater 1 and a False Discovery Rate (FDR) corrected *p*-value below 0.05 were considered to be differentially expressed. Proteome and secretome data {#Sec6} --------------------------- Samples for proteome analysis were taken at 0 h, 4 h and 8 h after treatment. The mycelium was collected by filtering through Miracloth (Merck Millipore), subsequently washed with water and snap frozen with liquid nitrogen. Sample preparation of the mycelium for the proteome analysis was performed as previously described \[[@CR30]\]. Samples for secretome analysis were taken at 0 h and 8 h after treatment and prepared as follows: Cell free-filtered supernatant of AMM medium from *A. fumigatus* cultures was precipitated by trichloroacetic acid (TCA) at 15% (*w*/*v*) final concentration (4 °C, overnight). Precipitates were washed with acetone and resolubilized in trifluoroethanol (TFE) mixed 1:1 with 100 mM triethylammonium bicarbonate (TEAB). Samples containing 100 μg of total protein (in 100 μl) were reduced with 50 mM tris(2-carboxyethyl)phosphine (TCEP) for 1 h at 55 °C and subsequently cysteine thiols were alkylated with 12.5 mM iodoacetamide for 30 min at room temperature. Proteins were digested at 37 °C for 18 h with trypsin+LysC mix (Promega) at 1:25 protease:protein ratio. Proteome samples were labeled with tandem mass tags (TMT) 6plex and secretome samples were labeled with isobaric tags for relative and absolute quantification (iTRAQ) 4plex according to the manufacturer's protocols. LC-MS/MS analysis was performed as previously described \[[@CR30]\] with the following modifications: Eluents A (0.1% *v*/v formic acid in H~2~O) and B (0.1% v/v formic acid in 90/10 ACN/H~2~O *v*/v) were mixed for 10 h gradient elution: 0--4 min at 4% B, 15 min at 5.5% B, 30 min at 6.5%, 220 min at 12.5% B, 300 min at 17% B, 400 min at 26% B, 450 min at 35% B, 475 min at 42% B, 490 min at 51% B, 500 min at 60% B, 515--529 min at 96% B, 530--600 min at 4% B. Precursor ions were monitored at m/z 300--1500, *R* = 140 k (FWHM), 3e6 AGC (automatic gain control) target, and 120 maximum injection time (maxIT). Top ten precursor ions (0.8 Da isolation width; z = 2--5) underwent data-dependent higher-energy collisional dissociation (HCD) fragmentation at normalized collision energy (NCE) 36% using N~2~ gas. Dynamic exclusion was set to 40 s. MS^2^ spectra were monitored at *R* = 17.5 k (FWHM), 2e5 AGC target, and 120 maxIT. The fixed first mass was set to m/z 110 to match the iTRAQ reporter ions (m/z 114--117). Database searches were performed by Proteome Discoverer (PD) 1.4 (Thermo Fisher Scientific, Dreieich, Germany) using the AspGD protein database of *A. fumigatus* Af293 \[[@CR31]\] and the algorithms of MASCOT 2.4.1 (Matrix Science, UK), SEQUEST HT (integral search engine of PD 1.4), and MS Amanda 1.0. Two missed cleavages were allowed for tryptic digestion. The precursor mass tolerance and the integration tolerance (most confident centroid) were set to 5 ppm and the MS2 tolerance to 0.02 Da. Static modifications were carbamidomethylation of cysteine and either TMT6plex (proteome) or iTRAQ4plex (secretome) at lysine residues and the peptide N-terminus. Dynamic modifications were oxidation of methionine and either TMT6plex of threonine or iTRAQ4plex of tyrosine. Percolator and a reverse decoy database were used for *q*-value validation of the spectral matches (Δcn \< 0.05). At least two peptides per protein and a strict target FDR \< 1% were required for confident protein hits. The significance threshold for differential protein abundances for TMT and iTRAQ experiments was set to factor 1.5. With the aid of the *biomaRt* package, proteins were annotated using identifiers provided by AspGD as of September 2015 and CADRE as of February 2017. Chemical analysis of secondary metabolites {#Sec7} ------------------------------------------ For quantification of fumagillin, fungal cultures were extracted and run on a LC-MS system consisting of an HPLC, UltiMate 3000 binary RSLC with photo diode array detector (Thermo Fisher Scientific, Dreieich, Germany) and the mass spectrometer (LTQ XL Linear Ion Trap from Thermo Fisher Scientific, Dreieich, Germany) with an electrospray ion source as described in Jöhnk et al. \[[@CR32]\]. Data were obtained from three biological replicates and three technical replicates. A standard curve (1000, 500, 250, 125 and 62.5 μg/mL) using an authentic fumagillin standard (Abcam, United Kingdom) was calculated. The Xcalibur Quan Browser software (Thermo Fisher Scientific, Dreieich, Germany) was used to calculate the amounts of fumagillin. Application of module-detecting approaches {#Sec8} ------------------------------------------ A high-confidence (score \> 0.7) PPIN of *A. fumigatus* strain A1163 was downloaded from STRING version 10 \[[@CR33]\]. Both the PPIN and the pre-processed omics data were taken as input for the module-detecting approaches. Thereby, protein identifier annotations provided by CADRE were used. ModuleDiscoverer {#Sec9} ---------------- In order to apply MD for transcriptome data, the background contains all known *A. fumigatus* proteins described in AspGD. Analyzing proteome and secretome data, all proteins detected via LC-MS/MS were taken as background. The single-seed MD algorithm was applied to the input data as described by Vlaic et al. \[[@CR19]\]. In brief, maximal cliques were identified using only one seed node in the PPIN. Cliques were tested for their enrichment with DEGs/DSyPs/DSePs using a permutation-based test as described in Vlaic et al. \[[@CR19]\]. Cliques with a *p*-value \< 0.01 were considered significantly enriched. Based on the union of these significantly enriched cliques, the regulatory module was assembled. For the integration of different omics datasets, all regulatory modules were merged by forming the union of all nodes and edges. The resulting union regulatory module is defined as 'overall regulatory module' (ORM). Sub-modules with a number of nodes \< 10 were not considered. Cytoscape version 3.2.1 \[[@CR34]\] was used to visualize and analyze regulatory modules, for example, regarding their nodes' degree and betweenness centrality. KeyPathwayMiner {#Sec10} --------------- KeyPathwayMiner (KPM) detects maximal connected sub-networks. In these sub-networks, all but a specific number *K* components are DEGs, DSyPs or DSePs in all but at most a specific number *L* cases \[[@CR18]\]. In this study, cases are defined as the available time points. In a first analysis (I), KPM was applied to each single experimental dataset to receive one module for each time point of the respective molecular level. In the single-level analysis (II), the modules for each molecular level over all time points were identified. A third analysis (III) directly combined all of the experimental datasets to get the overall regulatory module. For the KPM input, one matrix for each time point (I) or molecular level ((II) and (III)) were generated consisting of information about the components' regulation at the respective time points. For (II) and (III), only those components were considered that were DEGs/DSyPs/DSePs in at least one of the time points of the respective molecular level. With these matrices, the *A. fumigatus* PPIN and with the aid of KeyPathwayMiner Cytoscape App \[[@CR18]\], sub-networks were computed using following settings: Ant colony optimization meta heuristic (ACO) as search algorithm, individual node exceptions (INEs) as search strategy, maximum of exception nodes *K* = 2. For (I) and (II), the maximal case exception parameter was set to *L* = 0. For the multilevel omics analysis (III), the logical connector of the different levels was set to the logical 'OR' and *L* was set to *L1* = 3 (transcriptome data),*L2* = 1 (proteome data) and *L3* = 0 (secretome data). These *L* values were based on the number of time points of the respective molecular level. The assumption was that the considered component is a DEG/DSyP/DSeP in at least one measured time point. For instance, as four measured transcriptome time points were available, a gene was allowed to be not differentially expressed in maximal three out of four time points. The top ten best-scoring sub-networks were selected for further analysis. A KPM regulatory module describes the union of these top ten sub-networks of the respectively considered datasets. Comparison of the simple approach and a module-detecting approach {#Sec11} ----------------------------------------------------------------- ### Overlap of components {#Sec12} The overlap (percentage value) is defined as fraction of the intersection of the respective datasets from the union of the datasets. For the simple approach (SA), the overlap of different molecular levels was analyzed by comparing lists of DEGs, DSyPs and DSePs at the considered time points. For the module-detecting approach, the overlap of all components of the respective regulatory modules was considered. In addition to the comparison of percentage values of overlapping components, a more objective measurement based on a permutation-based test was considered. Considering all known *A. fumigatus* proteins (*N*) described in AspGD, *D* ∈ *N* is a set of components (DEGs, DSyPs or DSePs) for each of the molecular levels. In *I* = 100,000 iterations, datasets *B* were created where each set consists of \|*D*\| components sampled from *N*. In every iteration, the overlap *P* of the molecular levels was calculated based on the generated datasets for transcriptome, proteome and secretome. The *p*-value was calculated by dividing the number of iterations in which *P* ≥ *O,* where *O* represents the overlap received by SA or MD, and the total number of iterations *I*. ### Correlation of the components' regulation {#Sec13} All components detected in at least one of the transcriptomic and one of the proteomic time points were considered for correlation analyses. The distance between results obtained for different molecular levels and time points was estimated based on the correlation of ranked lists of the components' absolute gene expression or protein synthesis regulation values (absolute log2FCs). Lists of ordered, absolute regulation values were rank-transformed. Indices corresponding to ties (equal values) were randomly ordered. Spearman's rank correlation coefficient *r* was calculated. The ranking was repeated 1000 times. Over all repeats, the final correlation between the regulation lists was averaged. The distance *d* is defined as *d =* 1 - *r*. Generalized topological overlap {#Sec14} ------------------------------- The ORM was clustered via the generalized topological overlap measure (GTOM) as described in \[[@CR35]\]. Matrix $\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {T}^{\left[m\right]}=\left[{t}_{ij}^{\left[m\right]}\right] $$\end{document}$ is called the *m*-th order GTOM matrix and includes the overlap of nodes reachable from the nodes *i* and *j* within *m* steps:$$\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$ {t}_{ij}^{\left[m\right]}=\frac{\left|{N}_m(i)\cap {N}_m(j)\right|+{a}_{ij}+{I}_{i=j}}{\mathit{\min}\left\{\left|{N}_m(i)\right|,\left|{N}_m(j)\right|\right\}+1-{a}_{ij}} $$\end{document}$$ *A* = \[*a*~*ij*~\] is defined as adjacency matrix, *N*~*m*~(*i*) as the set of neighbors of *i,* the Identity matrix *I*~*i* = *j*~equals 1 if *i = j* and zero else, \|·\| denotes the number of elements (cardinality) in its argument *j.* The clustering was performed for second-order connections. With the aid of the *hclust* function *(method = average),* a dendrogram based on all distances between proteins were generated. A cutoff of 0.65 was chosen to receive the clusters. R packages *RcolorBrewer* \[[@CR36]\] *a*nd *WGCNA* \[[@CR37]\] were applied for coloring the single clusters. Enrichment analysis (functional annotation of biological processes) {#Sec15} ------------------------------------------------------------------- Gene Ontology (GO) terms were applied for functional annotation concerning biological processes. Gene (gene product) terms of *A. fumigatus* were retrieved from AspGD as of October 2017. In particular, GO information about the Af293 strain was extracted and imported into R and was transformed into custom annotation objects by packages *AnnotationDbi* \[[@CR38]\] and *GSEABase* \[[@CR39]\] (each of version 1.38.2 as part of Bioconductor package collection version 3.5). In addition, the packages *GO.db* \[[@CR40]\], *GOstats* \[[@CR41]\] as well as the helper function *GSEAGOHyperGParams* of package *Category* \[[@CR42]\] were applied for the enrichment analysis. For SA, all *A. fumigatus* proteins described in AspGD were taken as background. For the MD approach, all proteins which are part of the PPIN downloaded from STRING, were taken as background. GO terms composed of at least two members, associated with at least two components and leading to *p*-values below 0.05 were considered as significantly enriched. Results {#Sec16} ======= Data overview {#Sec17} ------------- We used experimental omics data of a *A. fumigatus* study that investigated the stress response to the antifungal drug caspofungin at different molecular levels (transcriptome, proteome, secretome) including different time points. Figure [2a](#Fig2){ref-type="fig"} provides an overview of the available datasets including all genes and proteins detected by RNA-Seq and LC-MS/MS. Over all considered time points, 9881 genes were measured for the transcriptomic response, 3858 proteins for the proteomic response and 1110 proteins for the secretome. Filtering the data for DEGs, DSyPs and DSePs resulted in 1058 DEGs (498 upregulated (↑), 560 downregulated (↓)) at 0.5 h, 1237 DEGs (876 ↑, 361 ↓) at 1 h, 1322 DEGs (784 ↑, 538 ↓) at 4 h and 1068 DEGs (600 ↑, 468 ↓) at 8 h after caspofungin treatment. In the proteome, 230 DSyPs (88 ↑, 142 ↓) were identified at 4 h after treatment, and 204 DSyPs (114 ↑, 90 ↓) at the 8 h time point. 136 DSePs (118 ↑, 18 ↓) were detected for the secretome at 8 h after treatment (Fig. [2b](#Fig2){ref-type="fig"}). Complete lists of DEGs, DSyPs and DSePs are provided in the Additional file [1](#MOESM1){ref-type="media"}.Fig. 2Overview of the available datasets. **a** Number and overlap of all measured genes and proteins. **b** Number of differentially expressed genes (DEGs), differentially synthesized proteins (DSyPs) and differentially secreted proteins (DSePs) in all available experimental datasets Overlap of datasets of the different molecular levels {#Sec18} ----------------------------------------------------- We started to analyze the molecular level overlap by comparing all measured genes or proteins (hereafter called 'components') independently of their differential regulation and time points. This comparison showed that the overlap of all three molecular levels amounted to 10.5% (Fig. [2a](#Fig2){ref-type="fig"}). Applying SA and MD to the experimental data (Fig. [3](#Fig3){ref-type="fig"}), this level overlap accounted for 0.5% (SA) and 6.1% (MD). Considering only two out of three molecular levels (including data of all considered time points, respectively), both approaches resulted in the highest overlap for the proteome/secretome comparison (11.2% SA, 21.4% MD). This observation was not surprising as the secreted proteins are also included in the global proteome. We found that MD provided an up to 12-fold higher overlap than SA.Fig. 3Overlap of molecular levels. Overlap of transcriptome (T), proteome (P) and secretome (S) regarding their components (genes or proteins) A further analysis of overlapping components considered a more objective measurement based on a permutation-based test. In 100,000 iterations, random datasets for transcriptome, proteome and secretome were generated and the overlap of all three datasets was calculated. The median-value of all 100,000 random overlaps equaled 3. Thus, the level overlap accounted for 0.1%. For the SA-obtained overlap (11 components or 0.5% as presented in Fig. [3](#Fig3){ref-type="fig"}), we calculated a *p*-value = 2.8 × 10^− 4^ which is statistically significant in comparison to random overlaps. In contrast, the MD-received overlap (58 components or 6.1% as presented in Fig. [3](#Fig3){ref-type="fig"}) resulted in the smaller *p*-value = 1.0 × 10^− 5^. Comparing the overlap percentage values, SA produced 5-fold and MD even 61-fold higher overlap values than random overlaps. The comparison of the SA- and MD-received overlap values resulted in the above-mentioned 12-fold higher values for MD. Estimation of the best match of transcriptomic and proteomic time points {#Sec19} ------------------------------------------------------------------------ The selection of measured time points was based on the following assumption: The expression of a gene and the synthesis of its corresponding protein do not occur at the same time since they are consecutive processes. Thus, changes in the transcriptional regulation are also reflected in the differential synthesis of proteins at the proteomic level but most likely at a later time point. Therefore, different time points at the transcriptomic and proteomic level were selected to consider the delay between transcription and translation during the fungal response. Hence, we analyzed our results regarding best matches of level- and time point-dependent sub-responses. We tested two approaches for estimating the best transcriptome-proteome time point match: Comparison of components, and correlation of the components' regulation. The first estimation approach aimed at analyzing overlapping components in the transcriptome and proteome which can be observed, for instance, as transcripts and their synthesized proteins. For the second estimation approach, the correlation of the components' regulation was calculated based on absolute gene expression or protein synthesis regulation values. This approach represents the regulation of response pathways which not necessarily contain overlapping components but also other genes or proteins contributing to these pathways. Therefore, in this approach not only the overlapping components were analyzed but also components which are part from at least one of the respectively compared transcriptome and proteome time points. This leads to a higher number of considered components. Starting with the comparison of components (Fig. [4a](#Fig4){ref-type="fig"}), both SA and MD demonstrated the best match for the transcriptomic response 1 h and the proteomic response 4 h after caspofungin treatment (5.3% SA, 16.5% MD). While SA resulted in the best match of transcriptome at 8 h with proteome at 8 h (7.3%), MD showed the best match with transcriptome at 4 h (16.8%). Consequently, for both time point comparisons, MD-produced results indicated a delay of 3--4 h between the different sub-responses. Taking into account also the correlation of components' regulation, Fig. [4b](#Fig4){ref-type="fig"} shows that similar to the previous analyses MD provided a better, i.e., here lower, distance for MD values than for SA. Oppositely to SA, the MD results confirmed the best time point match of transcriptome at earlier time point (1 h) and proteome at the later one (8 h) (Fig. [4b](#Fig4){ref-type="fig"}), similarly to the aforementioned comparison of components (Fig. [4a](#Fig4){ref-type="fig"}). The lowest distances were observed for the proteome at 8 h and transcriptome at 1 h (Fig. [4b](#Fig4){ref-type="fig"}, highlighted in dark green), followed by the proteome at 4 h and transcriptome at 1 h (Fig. [4b](#Fig4){ref-type="fig"}, dark green). These findings were also in agreement with the highest and second highest overlap values in Fig. [4a](#Fig4){ref-type="fig"}. Together with the observation that both approaches showed very high distance values (yellow and light yellow) between the same transcriptome and proteome time points, our results support the assumption of a time delay between level-dependent sub-responses (transcription and translation). Tendencies in the coherence of time points and an estimation of the resulting time delay between molecular levels may be helpful for further wet-lab studies regarding time- and cost-saving by focusing on the most relevant time points.Fig. 4Transcriptome-proteome time point match. Estimation of the best time point match for transcriptome (T) and proteome (P) time points regarding **a** comparison of components and **b** correlation of the components' regulation. Distance is defined as 1 minus correlation coefficient Another observation can be made by comparing the respective results of the two estimation approaches: There is a tendency that the correlation-based approach resulted in best matches for earlier transcriptome time points than the overlap-based approach. This observation may be based on the activation of stress response pathways induced by the fungus shortly after the caspofungin treatment. As such response pathways could involve components from both molecular levels transcriptome and proteome, we assume that the actual regulation of response pathways represented by the correlation-based approach already starts before the main translation process of potentially involved components occurs (represented by the overlap-based approach). Integration of multilevel omics data {#Sec20} ------------------------------------ ### Analysis of the overall fungal response to caspofungin {#Sec21} All regulatory modules of each molecular level and time point identified by MD (Table [1](#Tab1){ref-type="table"} and Additional file [2:](#MOESM2){ref-type="media"} Table S1) can be considered to be part of the overall fungal response to caspofungin. Forming the union of them, the resulting overall regulatory module (ORM) was composed of five sub-modules including 894 components (Fig. [5](#Fig5){ref-type="fig"}). For a focused enrichment analysis based on the ORM's underlying topology, we performed a generalized topological overlap measurement regarding the main sub-module 1. Figure [5](#Fig5){ref-type="fig"} represents the ORM with its five sub-modules and the 15 clusters of sub-module 1, where the cluster membership of each protein is color-coded. An overview of all components of the ORM including sub-modules and clusters is available in Additional file [2](#MOESM2){ref-type="media"}: Table S2). GO term enrichment analyses showed that the clusters were significantly enriched with distinct biological functions (see Additional file [2](#MOESM2){ref-type="media"}: Tables S3--21) for a list of all significantly associated biological processes of each cluster and the remaining sub-modules). Examples of such processes are protein phosphorylation and response to oxidative stress (cluster 2, Additional file [2](#MOESM2){ref-type="media"}: Table S4), actin filament-based process (cluster 3, Additional file [2](#MOESM2){ref-type="media"}: Table S5), regulation of kinase activity (cluster 5, Additional file [2](#MOESM2){ref-type="media"}: Table S7), amino acid metabolic processes (cluster 6, Additional file [2](#MOESM2){ref-type="media"}: Table S8 and cluster 9, Additional file [2](#MOESM2){ref-type="media"}: Table S11), (1,3)-alpha-D-glucan biosynthesis (cluster 7, Additional file [2](#MOESM2){ref-type="media"}: Table S9), secondary and lipid metabolic process (cluster 12, Additional file [2](#MOESM2){ref-type="media"}: Table S14 and cluster 13, Additional file [2](#MOESM2){ref-type="media"}: Table S15) or transport mechanisms (cluster 15, Additional file [2](#MOESM2){ref-type="media"}: Table S17 and sub-module 5, Additional file [2](#MOESM2){ref-type="media"}: Table S21).Table 1Regulatory modules generated by ModuleDiscovererUnderlying experimental datasetNumber of nodes (components)Number of edges (interactions)Transcriptome 0.5 h5112967Transcriptome 1 h2561336Transcriptome 4 h3131604Transcriptome 8 h2561208Proteome 4 h147845Proteome 8 h124520Secretome 8 h2932413Overall regulatory module8946111Number of nodes (representing gene or protein components) and edges (representing interactions between the components) of the regulatory modules received by ModuleDiscovererFig. 5Overall regulatory module representing the response of *A. fumigatus* to caspofungin. The overall regulatory module identified by ModuleDiscoverer is composed of five sub-modules including 894 components (see Additional file [2](#MOESM2){ref-type="media"}: Table S2). Clusters with exemplarily selected significantly enriched biological processes are color-coded Polyubiquitin and CBF/NF-Y family transcription factor as potential key factors contributing to the caspofungin-induced response {#Sec22} -------------------------------------------------------------------------------------------------------------------------------- To investigate potential key factors in the fungal response contributing to, e.g., caspofungin-caused side effects, we analyzed the underlying topological network structure of the ORM. We took into account the network node-associated degree (number of edges connected to the node) and betweenness centrality (number of shortest paths that go through each node) \[[@CR13]\]. We identified the node representing polyubiquitin UbiD with the fifth highest degree (Table [2](#Tab2){ref-type="table"}) and the third highest betweenness centrality (Table [3](#Tab3){ref-type="table"}). It was furthermore the only node that could be found in the top ten lists of both measures. Ubiquitin is a highly conserved 76-residue protein which can be found in all eukaryotic organisms \[[@CR43]\]. In *Saccharomyces cerevisiae,* the orthologous gene UBI4, one out of four ubiquitin genes in yeast, was shown to be essential for resistance to different stresses including high temperatures and starvation \[[@CR44]\].Table 2Nodes of the overall regulatory module with highest degreeCADRE-IDsAspGD-IDsProtein namesDegreeBClog2FCT 0.5 hT 1 hT 4 hT 8 hP 4 hP 8 hS 8 hCADAFUBP00004294AFUB_043760Fatty acid synthase beta subunit, putative1460.126−1.159−0.628− 0.693− 0.828− 0.006− 0.1360.534CADAFUBP00004295AFUB_043770Fatty acid synthase alpha subunit FasA, putative1420.082−1.008−0.517− 0.678− 0.726−0.038− 0.1051.448CADAFUBP00002402AFUB_024590Acetyl-CoA carboxylase1240.122−1.697−0.812−1.285− 1.380− 0.456−0.6281.518CADAFUBP00004404AFUB_044900Nonribosomal peptide synthase SidE1140.0481.0771.9181.6131.229NANANACADAFUBP00006564AFUB_067450Polyubiquitin UbiD/Ubi4, putative1110.396−0.7620.238−0.248−0.688NANANACADAFUBP00007473AFUB_076690ATP citrate lyase, subunit 1, putative980.037−1.636−0.705−0.698− 0.584−0.474− 0.5210.683CADAFUBP00007537AFUB_077330Bifunctional pyrimidine biosynthesis protein (PyrABCN), putative820.073−0.438−0.468− 0.214−0.974− 0.206−0.3401.586CADAFUBP00000761AFUB_007730Glutamate synthase Glt1, putative740.035−2.168−0.525−0.119− 0.483−0.255− 0.2341.135CADAFUBP00001006AFUB_010250Succinyl-CoA synthetase, alpha subunit, putative720.021−0.497−0.2730.167−0.0110.2340.069NACADAFUBP00003062AFUB_031240Sulfite reductase, putative680.047−0.900−0.774− 0.103−0.598− 0.016−0.0221.5Top ten nodes of the overall regulatory module showing the highest degree and additional information regarding their betweenness centrality (BC) and gene- or protein-associated log2 Fold Change (log2FC) measured for the transcriptomic (T), proteomic (P) and secretomic (S) fungal response to caspofungin at all time points, respectivelyTable 3Nodes of the overall regulatory module with highest betweenness centralityCADRE-IDsAspGD-IDsProtein namesDegreeBClog2FCT 0.5 hT 1 hT 4 hT 8 hP 4 hP 8 hS 8 hCADAFUBP00007914AFUB_081260Peptidyl-arginine deiminase domain protein40.60.6963.1252.3281.647NANANACADAFUBP00001626AFUB_016580Long-chain-fatty-acid-CoA ligase, putative110.405−1.395−1.605−0.406−0.750NANANACADAFUBP00006564AFUB_067450Polyubiquitin UbiD/Ubi4, putative1110.396−0.7620.238−0.248−0.688NANANACADAFUBP00008739AFUB_089890Mandelate racemase/muconate lactonizing enzyme family protein100.3041.7910.5460.2470.055NANANACADAFUBP00003378AFUB_034540Lysophospholipase 350.3030.9061.3571.1851.3570.7060.9371.513CADAFUBP00002707AFUB_027690Lysophospholipase100.273−1.454−0.217−0.854−1.7000.3870.192NACADAFUBP00006379AFUB_065540Patatin-like phospholipase domain-containing protein100.273−0.639− 0.570−0.931−1.460NANANACADAFUBP00008747AFUB_089980Ribosome biogenesis protein (Rrs1), putative260.2591.045−0.096−0.1540.4130.1850.045NACADAFUBP00004062AFUB_041460Plasma membrane ATPase40.25−1.535−0.670−1.002−1.1520.041−0.0231.910CADAFUBP00005096AFUB_052070Plasma membrane ATPase40.25−0.378− 0.2990.4410.463NANANACADAFUBP00000491AFUB_004970Alcohol dehydrogenase, zinc-containing, putative30.167−1.712−1.178−1.125−0.941−0.759−0.4540.914Top ten nodes of the overall regulatory module showing the highest betweenness centrality (BC) and additional information regarding their node degree and gene- or protein-associated log2 Fold Change (log2FC) measured for the transcriptomic (T), proteomic (P) and secretomic (S) fungal response to caspofungin at all time points, respectively In addition to this topology-based approach, we also applied an approach focused on transcription factors. Transcription factors play an important role in regulating the compensatory stress response to drugs. However, in many cases, it is difficult to measure transcription factors' activity since they are often constitutively expressed and/or activated posttranscriptionally. Therefore, we scanned the ORM for transcription factors connected to DEG-associated proteins, DSyPs or DSePs (Table [4](#Tab4){ref-type="table"}). Among them, we detected the CBF/NF-Y family transcription factor. It shows similarities to DNA polymerase epsilon subunit *DPB4* of *S. cerevisiae* and *Schizosaccharomyces pombe*.Table 4Transcription factors within the overall regulatory moduleCADRE-IDsAspGD-IDsProtein nameslog2FCT 0.5 hT 1 hT 4 hT 8 hP 4 hP 8 hS 8 hCADAFUBP00000978AFUB_009970CBF/NF-Y family transcription factor, putative0.2300.447−0.1240.002−0.034−0.150NACADAFUBP00001789AFUB_018340HLH transcription factor, putative−1.441−0.2360.128−0.355NANANACADAFUBP00003751AFUB_038290Zinc knuckle transcription factor/splicing factor MSL5/ZFM1, putative0.3660.0620.1110.143−0.368−0.3223.379CADAFUBP00004232AFUB_043140Transcription elongation factor SPT6, putative−0.369−0.235− 0.177−0.5630.1430.188NACADAFUBP00005084AFUB_051950PHD transcription factor (Rum1), putative−1.0690.0360.089−0.780−0.071− 0.042NACADAFUBP00007653AFUB_078520Stress response regulator/HFS transcription factor, putative0.317−0.2710.034−0.102−0.1300.072NACADAFUBP00001318AFUB_013400TFIIH complex helicase Rad3, putative0.1540.034−0.055− 0.226−0.0320.222NACADAFUBP00003811AFUB_038920Ccr4-Not transcription complex subunit (NOT1), putative−0.786−0.0760.038−0.834− 0.100−0.041NATranscription factors detected in the overall regulatory module and their log2 Fold Change (log2FC) measured for the transcriptomic (T), proteomic (P) and secretomic (S) fungal response to caspofungin at all time points, respectively Both polyubiquitin and the CBF/NF-Y family transcription factor were detected in all transcriptome and, in case of the CBF/NF-Y family transcription factor, proteome time points but neither as DEG nor as DSyP. Figure [6](#Fig6){ref-type="fig"} represents these two nodes and their respective first neighbors (including DEGs, DSyPs or DSePs) within the ORM.Fig. 6Potential key factors within the overall regulatory module contributing to the caspofungin-caused fungal response. **a** Polyubiquitin and **b** CBF/NF-Y family transcription factor (centrally arranged, respectively) and their first neighbors in the overall regulatory module. DEG-associated proteins, DSyPs and DSePs are highlighted with a yellow border The investigation of potential key factors in the drug-induced response, like polyubiquitin and CBF/NF-Y family transcription factor, may help to better understand the position and dynamics of drug targets and associated proteins in the interaction network and can potentially contribute to increase the safety of drugs. Caspofungin induces increased production of the secondary metabolite fumagillin {#Sec23} ------------------------------------------------------------------------------- As described above, the ORM contained two clusters, cluster 12 and 13, which included several enzymes that are involved in the biosynthesis of secondary metabolites. In particular, transcripts and their corresponding proteins of the antimicrobial agent fumagillin biosynthesis gene cluster (11 out of 15 cluster genes) showed increased levels after exposure of *A. fumigatus* to caspofungin. To verify whether caspofungin triggers the production of this meroterpenoid, we extracted *A. fumigatus* cultures exposed for 8 h to caspofungin (100 ng/ml) and control cultures with ethyl acetate and determined the fumagillin concentration by LC-MS. In cultures without caspofungin the concentration of fumagillin was 67.3 ± 21.7 μg/ml, while in cultures with caspofungin the concentration increased by 3-fold to 208.1 ± 63.8 μg/ml (Fig. [7](#Fig7){ref-type="fig"}). The level of other secondary metabolites such as pseurotin A stayed almost unchanged (Additional file [3](#MOESM3){ref-type="media"}).Fig. 7Caspofungin-induced increased production of the secondary metabolite fumagillin. LC-ESI-ITMS extracted ion chromatograms (EIC) at m/z 459.0--459.4 amu (left), HPLC-UV/PDA chromatograms (center) and UV/PDA spectra at RT = 13.67 min (right) of 250 μg/ml fumagillin reference standard (top) and crude extract of *A. fumigatus* without (center) and with caspofungin treatment (bottom) Comparison of ModuleDiscoverer- and KeyPathwayMiner-generated regulatory modules {#Sec24} -------------------------------------------------------------------------------- To estimate the comprehensiveness of MD-generated regulatory modules, we applied another available module-detecting approach, KeyPathwayMiner (KPM), to our experimental datasets and compared the identified regulatory modules with those identified by MD (Table [5](#Tab5){ref-type="table"}).Table 5Comparison of ModuleDiscoverer- and KeyPathwayMiner-detected regulatory modulesUnderlying experimental datasetComponent number of MD modulesOverlap (percentage value regarding KPM module)Component number of KPM modulesTranscriptome 0.5 h511134 (75.7%)177Transcriptome 1 h25662 (63.9%)97Transcriptome 4 h313123 (74.1%)166Transcriptome 8 h25689 (65.0%)137Proteome 4 h14736 (75.0%)48Proteome 8 h12430 (63.8%)47Secretome 8 h29342 (93.3%)45Overall regulatory module894343 (59.6%)576Comparison of ModuleDiscoverer (MD) and KeyPathwayMiner (KPM) regarding their number of module components. The overlap is defined as fraction of the intersection of the respective datasets from the KPM datasets Table [5](#Tab5){ref-type="table"} shows the numbers of components of the KPM-produced regulatory modules for each time point and the overall regulatory module in comparison with those based on MD. Exemplarily, the comparison showed that the ORM received by MD contains a 1.5-fold higher number of components by covering more than 60% of KPM module components. Considering the modules of the single time point datasets, e.g. secretome at 8 h, we found an up to 6.5-fold higher component number by covering up to 93% of KPM components. Hence, we focused on the results received by MD. Nevertheless, additional KPM analyses regarding the overlap of molecular levels and the estimation of the best match of transcriptomic and proteomic time points are shown in Additional file [2](#MOESM2){ref-type="media"}: Figures S1 and S2 and Additional file [4](#MOESM4){ref-type="media"}. Discussion {#Sec25} ========== In this study, we focused on the integration of omics data derived from heterogeneous sources. Therefore, we used experimental data of an *A. fumigatus* study investigating the stress response to the antifungal drug caspofungin at different molecular levels and time points. For the analyses, we applied SA considering only DEGs/DSyPs/DSePs and the regulatory module-detecting single-seed MD approach considering DEGs/DSyPs/DSePs, non-DEGs/DSyPs/DSePs as well as structural PPIN information. We focused on the single-seed approach instead of the also available multi-seed MD approach since the single-seed approach is comparable with other well-established maximal clique enumeration problem-based algorithms (e.g., Barrenäs et al. \[[@CR45]\] or Gustafsson et al. \[[@CR46]\]). In addition, Vlaic et al. showed that the multi-seed-identified modules can be essentially considered as an extension of the single-seed modules. However, we also applied the multi-seed approach to our experimental data set. In summary, the multi-seed MD approach allows for effectively integrating multilevel omics data. Multi-seed-generated results contain the regulatory modules received by the single-seed approach and are even more comprehensive. The overall regulatory module generated by the multi-seed approach confirms the already observed key players and significantly associated processes. Details on the analyses can be found in the Additional files [2](#MOESM2){ref-type="media"} and [5](#MOESM5){ref-type="media"}. Relation of transcriptomic, proteomic and secretomic data {#Sec26} --------------------------------------------------------- The comparison of all three molecular levels regarding all measured, SA- or MD-considered components resulted in only small overlap values. This observation is in agreement with other integrative transcriptomic and proteomic studies reporting that there is no or only a weak correlation between different molecular levels \[[@CR47]--[@CR49]\]. Potential explanations are biological (e.g., translational regulation or differences in protein and mRNA half-lives in vivo*)* or methodological origins (e.g., detection limits of the techniques or the choice of measured time points) \[[@CR48], [@CR49]\]. Figures [2a](#Fig2){ref-type="fig"} and [3](#Fig3){ref-type="fig"} show an apparently contradictory outcome regarding the overlap of datasets of different molecular levels: Fig. [2a](#Fig2){ref-type="fig"} shows the highest overlap percentage value for transcriptome and proteome, Fig. [3](#Fig3){ref-type="fig"} for proteome and secretome. This can be explained by the fact that Figs. [2a](#Fig2){ref-type="fig"} and [3](#Fig3){ref-type="fig"} are based on analyses that considered diverse datasets. For Fig. [2a](#Fig2){ref-type="fig"}, all detected genes and proteins were analyzed. In contrast, Fig. [3](#Fig3){ref-type="fig"} comprises only a fraction of these components because of a further filtering step to only compare DEGs/DSyPs/DSePs (SA) or regulatory module components (DEGs/DSyPs/DSePs and associated background proteins, MD). Actually, in Fig. [3](#Fig3){ref-type="fig"}, both approaches MD and SA showed the highest overlap between proteome and secretome. On the one hand, this highest overlap percentage reflects the same underlying measurement technique. In this study, the transcriptome was measured by RNA-Seq, the proteome and secretome by LC-MS/MS. As the techniques themselves are very different, also differences in their respective outcome can be expected. Therefore, as the intracellular proteome and secretome are based on the same measurement technique, they are more similar to each other than, for instance, transcriptome and proteome. On the other hand, the highest overlap also demonstrates the biological similarity in terms of immediately consecutive protein-based levels. Thus, both levels consist of proteins which differ only in the secretion step via classical (i.e., N-terminal secretory signal peptide triggered) or non-classical (i.e., without involvement of N-terminal signal peptides) secretory pathways \[[@CR50]\]. Hence, proteome and secretome can be considered as immediately consecutive levels which can both be measured by LC-MS/MS. By a general comparison of MD- and SA-received results, we determined up to 12-fold higher overlap values provided by MD than those calculated by SA. This is reasonable as SA focuses on the comparison of lists of DEGs, DSyPs and DSePs, exclusively. Hence, non-DEGs/DSyPs/DSePs measured in the experimental background were not considered which results in a high loss of data for the analyses. In contrast, the additional information considered by MD led to a much higher number of (overlapping) components. Analysis of the overall fungal response and potential key factors {#Sec27} ----------------------------------------------------------------- With the aid of the ORM, we analyzed the *A. fumigatus* response to caspofungin over all molecular levels and time points. We found that ORM clusters are significantly enriched with biological functions like (1,3)-alpha-D-glucan biosynthesis and carbohydrate metabolic processes, actin filament-based processes, activation of protein kinase activity and response to oxidative stress. These results are in agreement with a genome-wide expression profiling study of *Aspergillus niger* in response to caspofungin \[[@CR51]\]. Here, many of the upregulated genes were predicted or confirmed to function in cell wall assembly and remodeling, cytoskeletal organization, signaling and oxidative stress response. Also, genes and proteins of the electron transport chain were specifically enriched which supports the hypothesis that caspofungin acts as an effector of mitochondrial oxidative phosphorylation \[[@CR52]\]. This is consistent with results from Cagas et al. \[[@CR47]\] who analyzed the proteomic response of *A. fumigatus* to caspofungin and identified the largest change in a mitochondrial protein that has a role in mitochondrial respiratory chain complex IV assembly. The significant enrichment of genes and proteins of the amino acid metabolic process is best explained by the growth inhibitory activity of caspofungin that leads to the downregulation of the primary metabolisms including amino acid biosynthesis \[[@CR53]\]. The cluster 5 represents (gene-associated) proteins involved in the activation of protein kinase activity. Mitogen-activated kinases (MAPK) are important regulators in the fungal response to stress that is induced by environmental changes or the disruption of cell wall integrity (\[[@CR54]\], and references therein) which are both consequences of the caspofungin treatment. Also cellular transport mechanisms were influenced by this antifungal drug leading to osmotic stress as already reported in Altwasser et al. \[[@CR26]\]. In addition, we observed the association of ORM cluster components with the (1,3)-alpha-D-glucan biosynthesis as well as carbohydrate metabolic processes. Consistently, caspofungin inhibits the synthesis of β-(1,3)-glucan which is the principal component of the fungal cell wall \[[@CR55]\]. As a compensatory response, the production of other cell wall polymers was stimulated. Another interesting finding was the increased production of the secondary metabolite fumagillin upon exposure of *A. fumigatus* to caspofungin. So far, only the release of the secondary metabolite gliotoxin has been reported for cultures of *A. fumigatus* in the presence of caspofungin \[[@CR56]\]. Fumagillin has anti-angiogenic activity \[[@CR57]\] and induces cell death in erythrocytes \[[@CR58]\]. It is therefore possible that administration of caspofungin induces the production of secondary metabolites that have adverse effects on host cells during the infection. Another interesting aspect of our finding is that the induction of fumagillin production upon caspofungin exposure may represent a form of 'microbial communication' between fungi, in particular taking into account that echinocandins like caspofungin are produced by a diverse set of fungi \[[@CR59]\]. As Wang et al. \[[@CR13]\] reported, studying key factors of a drug-induced response by analyzing the underlying network structure may help to better understand the position and dynamics of drug targets and associated proteins potentially involved in drug-caused side effects. Here, in addition to the main target β-(1,3)-D-glucan synthase, we detected polyubiquitin UbiD among the top five nodes of the ORM ranked by both node degree and betweenness centrality. Polyubiquitin is known to encode multiple ubiquitin units in tandem, each of these transcribed as a single transcript. It is involved in several metabolic pathways and plays an important role in the regulation of the proteasome-based protein degradation processes \[[@CR43], [@CR60]\]. Some recent studies have already reported the importance of polyubiquitin in the fungal stress response. In the pathogenic yeast *Candida albicans*, Leach et al. \[[@CR61]\] have shown that polyubiquitin is required for the adaption to sudden stress induced, e.g., by heat or caspofungin and is critical for the fungus' pathogenicity. In another study in *S. cerevisiae*, Lesage et al. \[[@CR62]\] described ubiquitin-related protein degradation as an important process in the compensation for defects in glucan biosynthesis. We hypothesize that polyubiquitin is an important player in the compensatory response of *A. fumigatus* to caspofungin. In line, the corresponding gene *ubi4* was shown to be induced upon heat-shock in *A. nidulans* \[[@CR43]\]. Exemplarily, CBF/NF-Y family transcription factor was detected among the list of TFs. Its *C. albicans* ortholog DPB4 represents a putative DNA polymerase epsilon subunit D and was shown to be involved in filamentous growth and maintenance of the mitochondrial DNA genome \[[@CR63]\]. This role in mitochondrial processes in conjunction with caspofungin treatment is in agreement with the in previous studies shown importance of mitochondrial functions for drug tolerance and virulence of fungal pathogens (\[[@CR47]\], and references therein). Also for *C. albicans*, Khamooshi et al. \[[@CR64]\] have reported that deletion of DPB4 results in a decreased resistance to caspofungin in drop plate assays. These facts could indicate an involvement of CBF/NF-Y family transcription factor in the resistance of *A. fumigatus* to caspofungin*.* Interestingly, in our study, both the polyubiquitin and the CBF/NF-Y family transcription factor were detected in all transcriptome and, in case of CBF/NF-Y family transcription factor, proteome time points but neither as DEG nor as DSyP. However, their location within the ORM had shown that they are closely related to DEGs, DSyPs or DSePs. Consequently, by considering DEGs, DSyPs or DSePs for data analyses by SA, these proteins would not have been taken into account as factors in the fungal response despite the fact that they likely have a strong influence on DEGs, DSyPs or DSePs as shown in the ORM. To our knowledge, the role of both the polyubiquitin and the CBF/NF-Y family transcription factor has not been examined yet in the context of caspofungin-induced stress in *A. fumigatus.* Hence, our analyses offer novel hypotheses which have to be verified in future studies. The module-detecting approach KeyPathwayMiner {#Sec28} --------------------------------------------- In addition to MD, also other approaches identifying regulatory modules are available, for instance, KPM. Similar to MD, KPM can be used for the analyses of both, single-level and multilevel omics data. However, it does not make assumptions about community structures. KPM combines DEGs, DSyPs or DSePs with non-DEG/DSyP/DSeP exception nodes acting as 'bridges' to detect maximal connected sub-networks \[[@CR15]\]. The comparison of MD- and KPM-generated regulatory modules showed that MD generates modules with a significant higher number of components than KPM. Additionally, these MD module components cover most of the KPM components. As these findings indicate that MD-generated modules are more comprehensive than modules derived by KPM, we focused on the results obtained by MD. PPIN information as limiting factor {#Sec29} ----------------------------------- The basis of module-detecting approaches like MD or KPM is information from underlying organism-specific PPINs. Hence, the quality of results provided by these approaches also depends on the comprehensiveness of the underlying PPIN itself. Only those components of the experimental data which do also occur in the PPIN are considered for the regulatory module. For example, the PPIN of *A. fumigatus* strain A1163 downloaded from STRING consists of 4123 proteins. But according to current information provided by CADRE, the fungus itself is known to comprise 9916 protein-coding genes. Hence, more than half of the known fungal components cannot be considered for analyses based on this PPIN. Consequently, the available PPIN information can be considered as limiting factor in the data analyses. Thus, while our results highlight the benefits and potential provided by the regulatory module detection-based analysis of multilevel omics data, future studies will have to focus on the expansion of organism-specific PPINs. Conclusion {#Sec30} ========== PPINs enable the consideration of both structural and functional relationships between network proteins. Thus, they facilitate a focused view on closely related components in terms of modules. In this study, we demonstrated so far untested capacity of the module-detecting MD approach to integrate omics data coming from different molecular levels and time points. Moreover, we showed that this level of integration is not achievable using a simple approach of comparing lists of DEGs/DSyPs/DSePs. The integration of these data in one ORM can provide an overview of the overall organism's response to an external stimulus. We presented several approaches for analyzing this response and potential key factors contributing to, e.g., drug-caused side effects in more detail. With the aid of the regulatory module-detecting approach, it is possible to identify potential response key factors which cannot be detected in commonly used approaches comparing DEGs, DSyPs and DSePs, exclusively. Additional files ================ {#Sec31} Additional file 1:Lists of differentially expressed genes, differentially synthesized proteins and differentially secreted proteins. (XLSX 227 kb) Additional file 2:Supplementary Materials. (PDF 3110 kb) Additional file 3:Quantification of the secondary metabolites fumagillin and pseurotin A. (XLSX 21 kb) Additional file 4:KeyPathwayMiner-generated overall regulatory module and significantly enriched biological processes. (XLSX 55 kb) Additional file 5:Significantly enriched biological processes of the MD-multi-seed-based overall regulatory module. (XLSX 49 kb) The authors would like to thank Silke Steinbach for excellent technical assistance. We also thank Dominik Driesch for fruitful discussions. Funding {#FPar1} ======= This work was supported by the Jena School for Microbial Communication (JSMC) \[to TC\], Deutsche Forschungsgemeinschaft (DFG) CRC/Transregio 124 'Pathogenic fungi and their human host: Networks of interaction' (subprojects A1 \[to AAB\], C5 \[to IJ\], INF \[to JL, RG\] and Z2 \[to OK, TK\]), Thüringer Aufbaubank (TAB) \[to JL\] and the German Federal Ministry of Education & Research (BMBF FKZ 0315439) \[to AAB, VV\]. Availability of data and materials {#FPar2} ================================== The datasets supporting the conclusion of this article are included within the article and its additional files. The mass spectrometry proteomics data have been deposited to the ProteomeXchange Consortium via the PRIDE \[[@CR65]\] partner repository with the dataset identifier PXD008153. The RNA-Seq data that support the findings of this study are available as mentioned in Altwasser et al. \[[@CR26]\]. TC, SGH, TK, JL and SV performed the data analyses. OK, DJM and VV performed the experiments. TC, OK, SGH, RG, IDJ, AAB, SV and JL interpreted the results. TC, OK, TK, SV and JL wrote the paper. All authors read and approved the final manuscript. Ethics approval and consent to participate {#FPar3} ========================================== Not applicable. Consent for publication {#FPar4} ======================= Not applicable. Competing interests {#FPar5} =================== The authors declare that they have no competing interests. Publisher's Note {#FPar6} ================ Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Teenager Marcus Rashford followed up two goals on his Manchester United debut in midweek with another double plus an assist as Louis van Gaal's team dented Arsenal's Premier League title hopes with a 3-2 win on Sunday. The result left third-placed Arsenal five points behind leaders Leicester City while United returned to fifth place above West Ham. The 18-year-old Rashford struck twice in three minutes in the first half before former United striker Danny Welbeck pulled one goal back for Arsenal. Rashford then set up Ander Herrera for United's third before Mesut Ozil reduced the deficit. With a dozen senior players unavailable, including captain Wayne Rooney, the under-pressure Van Gaal gave a first league appearance to Rashford, who responded brilliantly. After 28 minutes he was in the right place to capitalise as Arsenal defender Gabriel could only half-clear Guillermo Varela's right-wing cross. Only three minutes later he headed United's second as Jesse Lingard was given too much space to cross from the same area. Arsenal, needing a win to keep pace with local rivals Tottenham as challengers to Leicester, were given some hope before half-time when Welbeck -- who once played for the same Manchester boys club that produced Rashford -- glanced in Ozil's free-kick. It was the German's 18th assist of the season and he added a goal of his own in the second half but not until Rashford kept possession and his head before passing square to Herrera, whose 20-metre shot was deflected in off Arsenal defender Laurent Koscielny. The visitors had more than 20 minutes left to find an equaliser but could not do so. Meanwhile Van Gaal -- who delighted the home crowd at one point by throwing himself to the ground to illustrate a foul on Herrera -- sent on two more young debutants in defender Tim Fosu-Mensah and midfielder James Weir. The win was United's third in seven days after beating Shrewsbury Town 3-0 in the FA Cup and Denmark's Midtjylland 5-1 in the Europa League and had the Old Trafford crowd for once roaring their approval in a difficult season.
.deep-import-url { color: red; }
Bexar Democrats, Republicans cheer debaters Bexar County Democratic Party chairman Manuel Medina, center, gestures and shouts "Four more years!" at the end of Tuesday's debate between President Barack Obama and GOP nominee Mitt Romney. About 40 activists monitored the debate at the party headquarters. Photo By John W. Gonzalez/Express-News Dozens of GOP supporters monitored Tuesday's presidential debate at Pizzeria Venti in Helotes. The debate watch event was sponsored by the Republican Party of Bexar County. More Information Bexar County Democrats cheered wildly near the end of Tuesday's presidential debate, when President Barack Obama finally criticized Mitt Romney's legendary comment that 47 percent of voters count on entitlements. It was a reference the Democrats hoped would come in the candidates' first debate, but even though it was late, it drove the crowd of 40 people at Bexar County Democratic Party headquarters into a frenzy of whoops and cheers. But Republicans watching the debate at a gathering in Helotes had their own moments of celebration, as Romney assailed Obama's energy and job-creation policies. A crowd of at least 70 partisans meeting at Pizzeria Venti cheered Romney's portrayals of Obama's fiscal policies as bad for big and small businesses. “I was really pleased with Mitt Romney,” Republican Party of Bexar County chairman Curt Nelson said. “He really turned in another strong performance. He has a track record, he has experience, he's a problem solver, and that came through loud and clear.” He added, “The energy discussion was a strong suit for Romney.” That's when the crowd, which included U.S. Rep. Francisco “Quico” Canseco, R-San Antonio, loudly scoffed at Obama's defense of his energy policies and gas prices. Democrats had eagerly awaited the faceoff as Obama's opportunity to atone for a disappointing performance in the first debate Oct. 3 at the University of Denver in Colorado. Romney was credited with a more animated and aggressive style that night. Thursday's debate between Vice President Joe Biden and Republican candidate Paul Ryan was rated a more even contest. After Tuesday's debate, Democrats broke into chants of “Four more years!” before party chairman Manuel Medina exhorted them to hit the streets to assure Obama's re-election. “The president laid out the details about how he's going to keep this country going forward,” Medina said. “Over the past couple of debates, it's been a Romney that suddenly cares about the middle class, that all of a sudden cares about Latinos, cares about women,” Medina said. Tuesday's debate at Hofstra University in Hempstead, N.Y., followed a town-meeting format, allowing audience members to address questions directly to the candidates. It was moderated by CNN chief political correspondent Candy Crowley. Canseco said the format wasn't a true debate, “punch and jab and that sort of thing.” Instead, it was more of a discussion of issues, “and that's what the American people want to hear.” Local GOP and Democratic groups also plan watch parties for the third and final presidential debate on Monday.
With the increasing use of stylus and touch sensitive screens to input lines and images into a computer, one problem that has arisen is the poor quality of the freehand drawn lines and shapes, and the resulting difficulty in interpreting the user input. Further there are a number of other difficulties in processing freehand sketched lines and images. First, is difficult to determine whether a freehand sketched line, that would typically not be straight, is a multiple-segment line with successive segments at angles to each other (a polyline) or is a single straight segment. Further, polysided shapes are often so irregular that the freehand drawing looks sloppy at best and may not be understandable at all by user or computer. The problem then is how to improve a freehand sketch of a line or shape so it may be more clearly understood by the user or any computing system processing the drawings.
Interview: Dylan Buckingham, KFOR and The Franchise in Oklahoma City I’m joined by Dylan Buckingham of KFOR TV and The Franchise radio in Oklahoma City to discuss the Oklahoma Sooners, Lincoln Riley’s chances of going to the Browns, Oklahoma State’s confusing season, along with the entire Big 12 and who ends up in the conference championship game!
Board of Trustees Approves Three Facilities FAYETTEVILLE, Ark. – The University of Arkansas Board of Trustees approved the construction of three athletic related capital projects, a Track and Field High Performance Center at John McDonnell Field, a renovation and expansion of the Randal Tyson Indoor Track Center and a Baseball Performance Center at Baum Stadium, as part of the agenda of their regularly scheduled meeting held Thursday in Fort Smith. The Board also approved the selection of architect/engineer design and construction manager/general contractor teams for the facilities. The projects will be funded entirely by athletic revenues, gifts, and bond proceeds from a future bond issue. No University funds will be required to complete the projects. Fundraising for all three projects is ongoing and the Razorback Foundation is close to solidifying lead gifts for each of the facilities. “As we continue to focus on student-athlete success, we are pleased to be moving forward on three important projects to further support student-athletes in some of the most successful sports programs at the University of Arkansas,” Vice Chancellor and Director of Athletics Hunter Yurachek said. “Our baseball and men’s and women’s track and field programs consistently compete for SEC and national championships and we want to provide our student-athletes the resources they need to succeed. We are appreciative of the support of our Board of Trustees, President Don Bobbitt and Chancellor Joe Steinmetz on these projects and the continued pursuit of our vision To Be the Best.” The approximately 20,000 square foot Track and Field High Performance Center will be constructed just south of the track at John McDonnell Field. Based on the feasibility study, the total project cost of the facility is currently estimated at $8-$10 million. Hufft (Bentonville) will work with AECOM (Kansas City, Missouri) on the design of the facility. Flintco (Springdale and Tulsa, Oklahoma) will be the construction manager and general contractor on the Track Performance Center. The Randal Tyson Track Center will undergo an extensive renovation and expansion. The total project cost of the Randal Tyson Track Center Renovation and Expansion is currently estimated at $15-20 million. Polk Stanley Wilcox (Fayetteville and Little Rock) and Populous (Kansas City, Missouri) will lead the design team on the Randal Tyson Track Center Renovation and Expansion while CDI Constructors LLC (Fayetteville and Little Rock) will serve as the general contractor. A new, approximately 40,000+ square foot, Baseball Performance Center will be built beyond the right field wall on the southwest corner of Baum Stadium. The total project cost of the Baseball Performance Center is currently estimated at $20-25 million. WER (Fayetteville and Little Rock) and HKS (Dallas, Texas) will lead the design team on the baseball clubhouse project while Kinco Constructors (Springdale and Little Rock) will serve as the general contractor.
League: Enforcer's Kiwis exile may continue Since the Anzac test, Jared Waerea-Hargreaves has averaged more than 114 running metres and more than 28 tackles per game for the Roosters. Photo / Getty Images There are no guarantees Roosters prop Jared Waerea-Hargreaves will earn a recall to the Kiwis for the Four Nations in October, despite his impressive NRL form. Waerea-Hargreaves, who will be a major weapon against the Warriors today, was the shock omission from the Kiwis' Anzac test team in April. Despite already missing many key players through injury, Kiwis coach Stephen Kearney chose to leave out the renowned enforcer, citing "form" and a "focus on the future". The decision caused a strong reaction at the time, with Waerea-Hargreaves surprised at the lack of communication from the coach. "I think there should have been a call for sure," the player said at the time. "Obviously I am extremely disappointed, not just at not being selected but after hearing that it has got to do with form and the future plans of the Kiwis ... I am only 25. I'm not really coming to the end of my career." At the time, Kearney was unrepentant saying, "If I rang every player who has missed out ... my phone bill would be very, very high." Five months on and it's not certain the relationship has been repaired, as Kearney says he has not spoken to Waerea-Hargreaves "in the last few months". "I didn't think I had anything to patch up," Kearney said. "In a number of different sports players don't get selected - it happens all the time. We were picking on form and the guys who came in did a great job. "He has been left out before. Look at the 2012 end-of-season test. We have a lot of depth in that position and, if you look back over all our test matches, that has always been the case." Statistics backed Kearney up. Waerea-Hargreaves had been New Zealand's least effective forward in his last three matches against Australia, averaging less than 45 running metres and six tackles per game. He was also disappointing in the World Cup semifinal win over England, contributing only nine hitups for 56m. Since the Anzac test, Waerea-Hargreaves has averaged more than 114 running metres and more than 28 tackles per game for the Roosters. Hovering in the background is the cultural change Kearney and the NZRL want to achieve with the Kiwis. There's a determination to rebuild pride in the Kiwis' jersey. Selections are made not just on talent but also on character. "Jared will go into consideration just like any other player," Kearney said. "Of course he's in consideration and, if the Roosters go deep into the finals - which I think they will - that will only help his cause. Nothing has changed from what I said [in April]. We are picking on form, with an eye for the future." That future focus appears to rule out Steve Matai. The Manly centre hasn't represented his country since 2010 and intended playing for Samoa at the last World Cup before injury hit. "We have moved on," Kearney said. "We have Dean [Whare], Shaun [Kenny-Dowall] and guys like Konrad [Hurrell], so Steve won't be considered." It also seems unlikely Jeremy Smith will return in the near future. The Asada ban rules him out of the Four Nations and, despite his undoubted qualities, time is against the 2012 Kiwis player of the year. Kearney remains hopeful Thomas Warriors utility Leuluai will be part of the Four Nations campaign, despite his ongoing struggles with a groin injury. The 29-year-old is one of the Kiwis' most valuable players but is understood to be considering a complete off-season break to ensure a strong start to 2015.
San Diego is not like any other city in the world when it comes to Bitcoin, as their relationship is rather special. After local businesses like Hangtime Climbing started accepting cryptocurrency payments and especially since the creation of the platform Bitcoins in San Diego, Bitcoin’s presence and awareness in the city, located in the state of California (USA), has been steadily increasing. So we talked with Eric Camerino, who owns ITSA Bike Shop in San Diego, about the crypto-scene in town. This small business just started accepting Bitcoin “because of the security of its transactions through Coinbase”. Camerino says that he “felt that Bitcoin had a real value to it”. So, he asks, “why not accept it when I already accept credit cards?”. “To me, it’s just another form of ‘swiping’ for payment. Besides, technically there are fewer paper dollars out there than there is digitally (through credit) so I had a hard time conceiving a real reason to not try it out”, the merchant explains. Eric Camerino found out about the existence of Bitcoin “a few weeks ago, through a mutual friend of Paul Puey’s [from Hangtime Climbing], who also accepts Bitcoin. After verifying some information from Paul and him showing me the simplicity and security of using Bitcoin, I decided to add it to my forms of accepted payments at my establishment. I accept it because of the secure nature of Bitcoin transfer and its ease of use”.
//===----------------------------------------------------------------------===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// #include <spirv/spirv.h> #include "../../include/libdevice.h" #include <clcmacro.h> #define __CLC_FUNCTION __spirv_ocl_native_sin #define __CLC_BUILTIN __nv_sin #define __CLC_BUILTIN_F __CLC_XCONCAT(__CLC_BUILTIN, f) #include <math/unary_builtin.inc>
Q: Python 3 / QT Designer - Radio Buttons showing duplicate values in console I'm using QT designer to try and make a couple of radio buttons with a label that shows which button I've selected in a variable called URL. I've got the following code so far : self.radioButton.toggled.connect(self.myradioButton1_function) self.radioButton_2.toggled.connect(self.myradioButton1_function) def myradioButton1_function(self): staging = 'https://staging/URL' live= 'https://live/URL' if self.radioButton.isChecked()==True: URL=staging if self.radioButton_2.isChecked()==True: URL=live self.label.setText("URL is : " +str(URL)) print(URL) The label display works fine and switches perfectly between live and staging but the problem is with the variable in Python console, when switching between the two buttons - this prints the variable multiple times e.g. https://staging/URL https://live/URL https://live/URL https://staging/URL https://staging/URL https://live/URL https://live/URL I want to use the URL variable in another function so need this to store 1 value on selection of a radio button, can you please advise? Many Thanks. A: I fixed this by changing the toggled to clicked e.g. self.radioButton.clicked.connect(self.myradioButton1_function) self.radioButton_2.clicked.connect(self.myradioButton1_function)
Q: Solving abs equations with complex solution I want to solve equations containing absolute values for complex solutions. Eg: $$|x+2| - 7 = 0$$ has real solution as $\{-9, 5\}$ and complex solution as $\{-2 + 7\mathrm{e}^{\mathrm{i}θ}\}$. Real solutions can be easily derived but how do I get complex solutions? Also can I get some references where there is an explanation for this. Thanks in advance. A: $$|x+2|-7=0$$ means $$|x-(-2)|=7$$ It is a circle centered at $(-2,0)$ with radius $7$. $$x=-2+7\exp(i \theta), \theta \in [0, 2\pi)$$
Ryan Khojasteh, a San Francisco Bay area native, has big plans for California’s 12th congressional district. House Minority Leader Nancy Pelosi has represented this district since January, 2013, and served in House of Representatives almost continuously since 1987. Inquisitr previously reported that Progressive Stephen Jaffe is challenging Pelosi for her House seat. Now, it looks like the San Francisco Bay area voters have a second Progressive to choose from. Like Jaffe, Ryan Khojasteh is a Progressive. Like Jaffe, he supported Bernie Sanders during the Democratic primary of 2016 and says that his campaign will not accept PAC or Super-PAC donations. In an exclusive interview, Khojasteh told Inquisitr that he believes he can better represent the 12th congressional district than both Pelosi and Jaffe. Khojasteh says that, like many in his district, he knows what it’s like to grow up in middle class America without an extended family support system as the result of immigration policies. “My family is currently affected by the travel ban too. I know what it’s like from a young age to be a part of these late night kitchen table conversations about whether my parents needed to take out a second mortgage on the home, how they would send the kids to college, or how would they be able to pay the bills for the month. My dad is a small business owner, and I worked for him during high school. I have seen firsthand how hard it is for small businesses to keep their doors open and stay in business.” Pelosi’s newest challenger is a staff editor for the Hastings Women’s Law Journal. Ryan will graduate law school early and receive his Juris Doctorate degree in December, 2018, a mere three weeks before congressional inauguration day. He is the son of Iranian immigrants and the first member of his extended family born in the United States. He has $150,000 in student loans, and that is after accounting for his scholarship award. Ryan Khojasteh’s View Of The Democratic Party Ryan says that a light bulb went off in his head when Jon Ossoff lost his race, which was one of the most expensive congressional races in history. He says that he saw a headline the next morning that said that Handel beat Ossoff “after being linked to Pelosi.” “I really began to reflect. Our party isn’t necessarily representing the majority of Americans because a sizable chunk of those in charge never lived these issues to understand these issues,” Ryan told Inquisitr. “There is such a growing disdain towards the establishment.” Ryan says that Pelosi is leading a party that is becoming more flawed and more comfortable in its flawed ways at a time when it should be striving for a progressive future. “The party needs to change. Our leaders need to be held accountable. And I believe that if there ever was a time, 2018 would be that time. Changing the party, starts here in CA-12.” Ryan says that he’s not just thinking about a personal victory. He says that if he places in one of the top two spots during the primary election, his campaign will use that national stage to convince other people that they can and should run for office. He also wants to prove that no incumbent is invincible. Unseating Pelosi would do just that, he says. Featured image credit: Jose Luis Magana Ap Images Ryan Khojasteh On Immigration Reform Ryan Khojasteh currently serves on the Executive Committee of the Immigrant Rights Commission, appointed by the San Francisco Board of Supervisors after a unanimous recommendation. On that commission, he also serves as the Chair of the Comprehensive Immigration Reform Task Force. He works closely with the Chair of the Commission, Vice-Chair, and Executive Director of the Office of Immigrant Affairs and Civic Engagement to shape the commission’s agenda. He says that he was invited to Congresswoman Pelosi’s press conference about the DREAM Act in September. He says that he witnessed undocumented youth protesting, at which point Pelosi left. He said that the protesters stressed the need for comprehensive immigration reform. He says that the protesters said that they tried to get a meeting with Pelosi for years, but that they were “repeatedly turned down.” “This was unacceptable, and so at our midyear leadership retreat, I was inspired to fight for a clean DREAM Act and a broader comprehensive immigration reform package,” Ryan told Inquisitr. “As the chair, I authored two resolutions, unanimously approved by the Commission, that were presented to the Mayor and the Board of Supervisors.” The first resolution called for the Board of Supervisors and the mayor’s office to utilize their positions to influence federal lawmakers in an attempt to make a clean DREAM Act a legislative priority. The second resolution called for San Francisco to refrain from using the word “DREAMER.” Ryan says that the word “perpetuates the divisive good vs. bad immigrant narrative.” “I learned firsthand that undocumented youth and DACA recipients do not like this word because the true dreamers are all immigrants who came here in pursuit of the American dream, including their parents. All 11 million undocumented immigrants should be granted status. The more we use the word ‘DREAMER’ the more we inherently demonize everyone else.” Ryan Khojasteh’s Political Connections And Inspiration Ryan says that he never had any political connections. The first time he ever met an elected official was when he interned for Congressman Honda during his senior year of college which he called an “incredibly formative experience.” He said he was inspired to become involved in politics by the actions of Shirley Chisholm, the first African-American woman elected to Congress and the first woman to seek the Democratic nomination for the presidency, Harvey Milk, who ran a campaign against what Ryan calls “The Machine” and was elected to the San Francisco Board of Supervisors, and Bernie Sanders. On a personal note, he says he was also inspired by his father. “When you come from an Iranian-American family, your existence is inherently political. My dad always talked to me about the revolution, how hard it was to leave, how hard it was to plant roots here,” Ryan told Inquisitr. “My dad is potentially alive today because America exists. I have such deep respect for the American Dream that I am going to dedicate the rest of my life protecting it and preserving it for future generations.” Ryan says that he is not worried about splitting the Progressive vote during the primary. He says that with California’s “top two” primary system, the two candidates with the most votes will progress to the election in November, regardless of party. Ryan Khojasteh On Public Health Issues Ryan Khojasteh is a staunch advocate for single-payer healthcare. He also has plenty of ideas for changes in gun control laws. In addition to universal background checks, he’d like to ban semi-automatic rifles and modifications for all civilians, create a registry for anyone who owns more than 10 guns, increase trauma centers in non-metropolitan areas, prohibit anyone convicted of a hate crime from owning a gun, create more comprehensive gun safety classes, expand the definition of domestic abuse in relation to gun ownership, allow the CDC to study gun violence as a public health issue, consider gun owners’ liability insurance, and strengthen regulations regarding firearms and mental health. In California, vaccines have been a hot public health topic for years. Philosophical and religious vaccine waivers are no longer accepted for entry into schools, preschools, and daycare centers as part of state law. Ryan says that if he were a member of Congress, he would vote for federal legislation removing non-medical vaccine exemptions across the country, though he believes that such legislation would be challenged on Tenth Amendment grounds for infringing on state sovereignty. Ryan Khojasteh On GMOs, Labeling, Subsidizing, And Farming He was disappointed in President Obama for signing S. 764 into law. The industry-backed bill overturned Vermont’s GMO label law. He says that it could allow the national labeling standard to become incredibly weak and “provide almost no information to the consumers.” While on the topic of GMOs, it should also be noted that Ryan believes that the heavy subsidization of corn and soy to facilitate meat production and processed foods is backwards to public health. He thinks it makes more sense to subsidize fruit and vegetable production from the standpoint of public health and public health associated costs. Ryan says would also support a federal Right to Farm act protecting farmers from nuisance lawsuits, provided farmers employ standard and accepted farming practices. Ryan Khojasteh On Marijuana Legalization Ryan would like to see marijuana legalized and regulated like alcohol. He also would like to see marijuana possession convictions and non-violent marijuana distribution convictions expunged for those associated with small amounts of the plant. Ryan Khojasteh On Building Codes He says he would absolutely consider legislation federally exempting tiny houses from residential building codes to benefit veterans and homeless Americans. He also would support federal legislation that would codify or amend state residential housing codes to accommodate green options like grey water systems, composting toilets, and earth sheltered homes. Ryan Khojasteh On Native American Issues Ryan supported DAPL protesters and feels that “the Army Corps granting the final easement was egregious.” He says that after the Sioux sued over the loss of Black Hills and won their Supreme Court battle, they were awarded over $100 million in just compensation. Of course, they refused the funds, because they want their land, not the compensation. He says that our Constitution doesn’t provide a just remedy to this issue and would support a Constitutional amendment to the Takings Clause prohibiting the takings of Native land. “This land serves incredibly important purposes — traditional, spiritual, religious, historical. It is their home. No justification in my opinion is compelling enough to strip that land away.” Ryan favors changing the name of Columbus Day to Indigenous People’s Day. He says that as soon as the name change is adopted in his hometown, he will fight for it to change on a national level. Ryan Khojasteh’s Big Promise As the interview concluded, Ryan made a firm pledge that may surprise the voters of California’s 12th congressional district. Ryan says that if he is elected, he will return to his home district every weekend. He says he will use his own funds to travel back to California from Washington, D.C., every weekend to engage with the community and host town hall events. He says that his promise is barring only unforeseen emergencies or pressing issues in Washington. He says that should situations occasionally come up prohibiting his return to California on a particular weekend, he would notify the community and plan an extra event for the following weekend. “I will be back all 52 weekends of every year for as long as I am a member of Congress,” Khojasteh told Inquisitr. “Accessibility and transparency are two crucial factors in restoring truth in our government.”
Huge cache of arms and ammunition was recovered by police commandos in a follow up operation to the disclosure made by an arrested overground member of People Liberation Army (PLA), police said Wednesday. The recovered items were seven AK-series rifles with 14 magazines and 253 live rounds, one RPG, one sten carbine with magazine, an M-16 UBGL with one magazine and 70 ammunitions and four 9 mm pistol with four magazines, Imphal West Additional SP (ops), Dr Akoijam Jhalajit Singh said. According to a police officer, an overground member of the proscribed RPF/PLA identified as Naorem Komol alias Kamal Meitei (34) of Wabagai Yangbi, Thoubal was arrested from his residence today and his disclosure helped the joint team of Imphal West and Thoubal district police commandos to recover the arms. Further, additional SP said that Komol had been working under the Thoubal District PLA Commander Sanju and under cover of an NGO, Rapid Intervention and Care (RIAC), Wabagai as outreach worker.RIAC is an NGO getting grants from the Manipur State AIDS Control Society (MACS), he added.
Q: Maps, black and white/ gray scale printing I'm working on Mapserver to do beautiful maps with AGG rendering Until now, I've only thought about the best way to get color maps. Now, I have to think how to make color ones compatible with a grey scale printing http://en.wikipedia.org/wiki/Grayscale How do you deal with this? Any advices, tips or resources will be welcome. Edit : My question is really more relative to visual perception than Mapserver. It seems I will have to read Semiology of Graphics by Jacques Bertin (reedited this year http://www.esri.com/news/releases/10_4qtr/bertin.html ) or look on Edward Tufte various book/articles http://www.edwardtufte.com/tufte/ A: As you also asked for resources, I recommend taking a look at http://colorbrewer2.org/ - they help choosing colors for maps that convert well to grayscale.
Someday, perhaps soon, these Hoosiers’ flaws will catch up with them. Unless Juwan Morgan doesn’t allow them to. Morgan, a player impressing opposing coaches to the point of head-shaking amazement week after week, at times single-handedly hauled Indiana back from the dead Saturday in a 71-68 buzzer-beater win the Hoosiers led for a total of 93 seconds. “Rob (Phinisee) obviously will be the hero with the game-winner,” IU coach Archie Miller said, “but clearly, there's a lot of guys that did great things. “Juwan Morgan had as good of a game as I've been involved in in a long time.” More:Twitter reacts to Rob Phinisee's buzzer-beater to help IU beat Butler Sign up: Get the latest Hoosiers news delivered directly to your inbox Chris Mack raved about Morgan a week ago, before and after his Louisville team lost by one point in Bloomington. Notre Dame coach Mike Brey called him “fabulous” a year ago, delivering a succinct, admiring, “God did he beat us up” after Morgan scored what was then a Crossroads Classic-record 34 points in IU’s win over the Irish in 2017. On Saturday, Butler coach LaVall Jordan joined the chorus. “Juwan Morgan is a heck of a college basketball player,” Jordan said, minutes after Morgan’s 35 points (the new Crossroads record) sank a Butler team that had every right to feel hard done by the final score. The Bulldogs (7-3) were superb for all 40 minutes. They collapsed inside, hounded IU freshman star Romeo Langford, forced 15 turnovers. And that was just on defense. Sean McDermott hit six 3-pointers, scoring a team-high 20 points and disappearing again and again inside IU’s defense only to reemerge wide open seconds later. Kamar Baldwin finished with 16 points, four assists and four rebounds. Down the stretch, he was an impossible cover. Even the offensive glass — not often the Bulldogs’ strength — proved their worth: They finished with 11 offensive boards, and 12 second-chance points. “Give Butler a lot of credit, they're a heck of a team,” Miller said. “Have a lot of guys that have been in a lot of big ones and won a lot of big games.” Buzzer breakdown:Last-second shot by Rob Phinisee lifts IU over Butler Doyel:It wasn't how IU drew it up, but Rob Phinisee's buzzer-beater a perfect end Morgan outshined them all. He finished with those 35 points on a jaw-dropping 14 shots. He only missed two all game. He hit four of his team’s nine 3-pointers, and seven of its eight free throws. He finished with two steals, two blocks and seven rebounds. Robert Phinisee’s 31-foot 3-point heave to win the game as the buzzer sounded will be the moment that defines this game years from now, in the faded memories of IU fans. But none of it would have been possible without Morgan’s performance. It was fitting Morgan broke his own record and moved past 1,000 career points in the same game. He is the 52nd Hoosier in history to pass that career mark. At his current pace, assuming IU plays at least 23 more games this season, he’ll finish somewhere north of 1,400 career points, and he’s going to threaten the program’s top 10 all-time in rebounding. It almost feels pejorative to say that’s not bad for a player who spent the first two years of his college career as an injury-plagued reserve. But that’s probably the only reason why we aren’t talking about Morgan the way he deserves. Here, in his final season at IU, handed a team both frustratingly young and tantalizingly talented, Morgan has become not just the kind of big-time player, but also the kind of big-time personality, IU fans covet most. “Every day is the same,” Miller said. “Game day is no different than practice. Very few guys that can eliminate moodiness, the ability not to feel tired. For about two years straight, through about 150 practices, that's what I get to see every day.” Morgan is this team’s unquestioned leader. “He’s turned into a really good leader,” Miller said. “Vocally, he’s a guy that has really evolved over the last year and some change.” He is its dominant personality. “We can lean on him when times get rough,” Langford said. “He's not one of the veterans that leads by example. He leads by example and his voice.” As Saturday proved, when everything else is going wrong, he is the player who steers Indiana through the storm. “You love having guys like that, that have that about them,” Jordan said postgame. “We have a few guys like that, two of them are sitting with me, that will step up and make big shots, no matter how the game is going. … “That's why people talk about him as a good player, in the class that he's in.” Indiana has problems it needs to address. Flaws it needs to fix. No one reasonable argues this. The Hoosiers are turning the ball over too much. They still aren’t hitting enough of their free throws, an 8-of-10 performance against Butler notwithstanding. They’re young and banged up, and will probably remain both for the rest of the season. They’re also 9-2, with five KenPom top-50 wins. One of those wins came on a neutral floor. Another, on the road. They’re 2-0 in conference. A team that a season ago couldn’t even scratch the NIT bubble would be safely in the NCAA tournament field if it were selected right now. Don’t lose sight of what Indiana is purely to wonder what Indiana might become. And don’t lose sight of what you’re watching, here in the twilight of Juwan Morgan’s Indiana career. There were several program alumni courtside Saturday — Noah Vonleh, Wayne Radford, Keith Smart, Victor Oladipo. Few programs treasure past greats like Indiana, and the Bankers Life Fieldhouse crowd erupted when Oladipo was shown on the scoreboard. Erupted again when it was Smart’s turn. Morgan will join them soon. Mack was adamant last week about Morgan’s NBA prospects, saying: “If he’s not a first-round pick, I understand why some of these guys get fired at the next level.” After Saturday’s game, on his way back to IU’s bus, Morgan cut across the empty court at Bankers Life. IU fans remaining in a suite behind what was the Hoosiers’ bench shouted “We love you Juwan!” still holding what appeared to be, ahem, adult beverages. Two fans in a midcourt suite on the other side of the arena, considerably younger, jumped up and down, tugged at their IU jerseys and shouted Morgan’s name over and over. Morgan smiled, ice pack strapped to his leg, and waved both ways. He won’t be theirs much longer. IU fans should be doing whatever possible to enjoy him while they still can. Follow IndyStar reporter Zach Osterman on Twitter: @ZachOsterman. Sign up: Get the latest Hoosiers news delivered directly to your inbox
Cross-country comparisons of entrepreneurship are difficult due to the lack of standard empirical definitions of entrepreneurship. Measures focusing on small business activity and self-employment suggest that Europe has the same or higher rates of entrepreneurship than the U.S. and East Asia. However, most business activity is not entrepreneurial in the Schumpeterian sense. We rely on empirical measures that more closely tally Schumpeterian entrepreneurship: self-made dollar billionaires per capita who earned their wealth by creating firms, top global firms founded in recent decades, unicorn startups, and VC investment as a share of GDP. Western Europe is shown to underperform in all four measures of high-impact Schumpeterian entrepreneurship relative to the U.S. Once we account for Europe’s strong performance in technological innovation, an “entrepreneurship deficit” relative to East Asia also becomes apparent. This underperformance is missed by most standard measures. Finally, we also find that China performs surprisingly well in Schumpeterian entrepreneurship, especially compared to Eastern Europe. Contact This book explores the complex and ever-changing relationship between the European Union and its member states. The recent surge in tension in this relationship has been prompted by the actions of some member state governments as they question fundamental EU values and principles and refuse to implement common decisions seemingly on the basis of narrowly defined national interests.
Introduction {#sec1} ============ Hematological malignancy is relatively common, with a prevalence of 549 per 100,000 and approximately 328,000 cases in the United Kingdom[@bib1] at any one time. They consist of a heterogenous group of diseases that are treated with high dose chemotherapy, often followed by hematopoetic stem cell transplant (HSCT). The diseases themselves, as well as the treatments, lead to significant immunosuppression, leaving the patients susceptible to infections that often affect the respiratory system. As a consequence, approximately 50% of patients with a hematological malignancy develop respiratory infections during the course of their treatment.[@bib2] Although this article focuses on the infective complications of hematological malignancy, noninfectious disorders account for approximately half of respiratory complications post HSCT[@bib3] and must always be actively considered in the differential diagnosis. Table [1](#tbl1){ref-type="table"} shows some of the more common and serious noninfectious problems that arise post HSCT. As treatment for noninfectious disorders often requires increased immunosuppression, significant infection usually has to be excluded prior to commencing treatment for a noninfectious pulmonary complication of hematological disease. ###### Acute and subacute non-infectious respiratory complications in the immunosuppressed patient. Clinical problem Common radiological features ------------------------------------------------------------- ---------------------------------------------------------------------------------------------- *Acute presentation (hours to days)* Pulmonary edema Cardiomegaly, upper lobe diversion, interstitial oedema and pleural effusions Acute respiratory distress syndrome (ARDS) Bilateral ground glass, dependent consolidation, traction bronchiectasis Diffuse alveolar hemorrhage Rapidly progressive ground glass changes Engraftment syndrome Interstitial oedema and pleural effusions Thoracic air leak syndrome Pneumothorax, pneumomediastinum, subcutaneous emphysema Leukostasis Interstitial infiltrates and/or alveolar opacification *Subacute presentation (days to weeks)* Idiopathic pneumonia syndrome Diffuse bilateral infiltrates Organizing pneumonia Peribronchial and peripheral air space opacification Radiation pneumonitis Ground glass and consolidation within the radiation field developing into pulmonary fibrosis Drug toxicity Bilateral alveolitis (ground glass infiltrates), developing into pulmonary fibrosis *Chronic presentations (weeks to months)* Pulmonary veno-occlusive disease Enlarged pulmonary arteries, smooth interlobular septal thickening, ground glass opacities Lung graft versus host disease (GvHD) Mosaickism, progressive airway dilatation Post transplant lymphoproliferative disorder (PTLD) Pulmonary nodules and mediastinal lymphadenopathy Pleuroparenchymal fibroelastosis Fibrotic thickening of pleura and subpleural parenchyma Nonclassifiable interstitial pneumonia (pulmonary fibrosis) Ground glass, peribronchial crazy paving, reticulation and traction-bronchiectasis Sources of infecting organisms {#sec1-1} ------------------------------ Organisms causing infections reach the lung from a variety of sources. These pathogens include both common gram positive and negative pathogens such as *Staphylococcus aureus* and *Pseudomonas aeruginosa,* respectively, as well as anaerobes (see Table [2](#tbl2){ref-type="table"}).[@bib4] Many bacterial pathogens are nasopharyngeal commensals, which immunosuppressed individuals are less able to effectively clear from the lungs after aspiration. Respiratory pathogens are also commonly inhaled from infected contacts by droplet spread. The commonest causative organisms in this group are the respiratory viruses (see Table [3](#tbl3){ref-type="table"}), which usually only cause mild, self-limiting infections in immunocompetent individuals but in patients with hematological malignancy present with relatively severe symptoms, prolonged infection, and higher rates of pneumonia and death.[@bib5]^--^[@bib7] Less common causes of inhaled droplet lung infections are *Mycoplasma pneumoniae*, *Chlamydia pneumonia,* and *Mycobacterium tuberculosis* (Table [3](#tbl3){ref-type="table"}). Inhalation of environmental organisms that do not usually cause infection in an immunocompetent host is another significant source of respiratory infection. These include *Aspergillus* species, other filamentous fungi, *Nocardia*, and nontuberculous mycobacteria. *Aspergillus* in particular can affect up to 10% of patients with hematological malignancy.[@bib8] Immunosuppression associated with hematological malignancy may also allow reactivation of organisms that are either dormant or persist at low numbers within the lung. These pathogens include *Pneumocystis jirovecii,* which seems to be a lung commensal that replicates to cause disease in certain types of immunosuppression unless patients are given appropriate prophylaxis.[@bib9] Reactivation is also the mode of infection for pneumonitis caused by cytomegalovirus (CMV) and other herpes viruses, and for some cases of *M. tuberculosis* occurring in subjects with latent infection. Finally, infections from other parts of the body can spread to the lung via hematogenous spread, for example, *Candida* species and bacterial seeding as septic emboli from indwelling catheters and lines. ###### Bacteria that cause respiratory infection in patients with hematological malignancy. Gram positive Gram negative Anaerobes Atypical -------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------- ------------------------------------------------------------------ *Streptococcus pneumoniae Streptococcus pyogenes Staphylococcus aureus Nocardia asteroides Rhodococcus equi* *Pseudomonas* spp.*Klebsiella pneumoniae Escherichia coli Enterobacter cloacae Stenotrophomonas maltophilia Citrobacter* spp*. Serratia marcescens Acinetobacter baumanii Hemophilus influenzae Proteus* spp.*Burkholderia* spp.*Achromobacter* spp.*Moraxella catarrhalis* *Prevotella* spp.*Fusobacterium* spp.*Bacteroides* spp. *Mycoplasma pneumoniae Chlamydophila pneumoniae Legionella* spp. Modified from Evans and Ost.[@bib4] ###### Fungi, viruses, and mycobacteria that cause respiratory infection in patients with hematological malignancy. Fungi Viruses Mycobacteria ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- *Candida* spp.*Aspergillus* spp.Other filamentous fungi:*Fusarium* spp.*Scedosporium* spp.*Mucor* spp.*Rhizopus* spp.*Pneumocystis jirovecii*Environmental fungi:HistoplasmosisCoccidiomycosis*Cryptococcus neoformans* Respiratory viruses:Influenza A and BParainfluenza 1---3Human metapneumovirusAdenovirusCoronavirusRespiratory syncytial virusRhinovirusHerpesviruses:CytomegalovirusVaricella zosterHerpes simplexHuman herpes virus 6 *Mycobacterium tuberculosis*Nontuberculous mycobacteria:*Mycobacterium avium- intracellulare complexMycobacterium abscessusMycobacterium fortuitumMycobacterium kansasiiMycobacterium chelonae* Modified from Henkle and Winthrop[@bib43] and Evans and Ost.[@bib4] Clinical approach {#sec1-2} ----------------- The multiple potential infecting organisms, with a corresponding variety in antimicrobial treatment options, can make selection of the appropriate management strategy difficult. Fortunately, an understanding of the specific immune deficiencies that act as specific risk factors for specific organisms (Table [4](#tbl4){ref-type="table"}) in combination with clinical parameters such as speed of onset (Table [5](#tbl5){ref-type="table"}) and radiological appearance usually allows the differential diagnosis to be narrowed down. This in turn then allows the formation of a logical targeted diagnostic and treatment plan. In patients who do not improve rapidly with first-line therapy with broad spectrum antibiotics, cross-sectional thoracic CT imaging is essential as it provides much better definition of the pattern of radiological changes than a chest radiograph. These radiological patterns can be broken down into three main groups: consolidation, nodules (micro- and macro-), and diffuse changes, which can be further subdivided into ground glass and tree-in-bud patterns. We discuss the likely causes for each of these radiological patterns and how this guides the appropriate initial investigations and treatment options. ###### Common infective causes of respiratory symptoms in patients with hematology malignancy categorised by immune defect. Immune defect and common associations Common pathogens ----------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------- Neutropenia / functional neutrophil defects:LeukemiaAplastic anemia / bone marrow infiltrationsHSCTChemotherapy Bacterial pneumonia*Aspergillus* spp.Other filamentous fungiInvasive candidiasis Impaired T-cell functionHSCTImmunosuppressive therapiesLymphoma *P. jirovecii*Respiratory virusesCytomegalovirusOther herpesvirusesMycobacteriaNocardia Immunoglobulin deficiency (mainly IgG)CLLMyelomaHSCTB-cell depletion therapies Bacterial pneumoniaBacterial exacerbations of bronchiectasisRespiratory viruses Prolonged high dose corticosteroids *P. jiroveciiAspergillus* spp.Respiratory virusesCytomegalovirusMycobacteriaBacterial pneumonia Kinase inhibitorsJAK inhibitors (e.g., Ruxolitinib)BCR pathway inhibitors (e.g., Ibrutinib) *Aspergillus* spp.*P. jirovecii*Bacterial pneumonia*Aspergillus spp.P. jirovecii* ###### Causes of respiratory symptoms in hematological malignancy categorised by speed of onset. Speed of onset Infective causes Noninfective causes\* ---------------- ------------------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 1--3 days Bacterial pneumonia Pulmonary edemaDiffuse alveolar hemorrhageAdult respiratory distress syndromeEngraftment syndrome 3--7 days Bacterial pneumoniaRespiratory viruses*M. pneumoniae* Adult respiratory distress syndromeEngraftment syndrome 1--2 weeks Respiratory viruses*M. pneumoniae*CMV / other herpesviruses Drug / radiation pneumonitisIdiopathic pneumonitis 2--6 weeks *Aspergillus* spp.Other filamentous fungi*Nocardia* spp.*M. tuberculosisPneumocystis jirovecii* Drug / radiation pneumonitisIdiopathic pneumonitisLung GvHDOrganizing pneumoniaLymphoma / malignant infiltrationPTLD Months *M. tuberculosis*Nontuberculous mycobacteria Lymphoma / malignant infiltrationDrug / radiation pneumonitis (fibrotic phase)BronchiectasisOrganizing pneumoniaPTLDLung GvHDPost-allograft restrictive lung disease / Pleuroparenchymal fibroelastosis \*Pulmonary emboli can present in any time category. Consolidation {#sec1-3} ------------- Dense focal consolidation (Fig. [1](#fig1){ref-type="fig"}A) often develops rapidly in the context of fevers, dyspnoea and elevated C-reactive protein (CRP). This clinical pattern is highly suggestive of pneumonia caused by pyogenic bacterial pathogens[@bib10] associated with community and hospital acquired pneumonias, often originating from microaspiration of nasopharyngeal commensals. Blood and sputum cultures are essential, and treatment with broad-spectrum antibiotics incorporating gram negative cover should be commenced, and most patients will respond to these making invasive investigation with bronchoscopy unnecessary. However, if the patient does not respond rapidly, that is, within 48 to 72 hours, infection with a highly resistant organism such as methicillin-resistant *S. aureus* or multiresistant *P. aeruginosa* (resistant to three of the following: carbapenem, ceftazidime, tobramycin, or ciprofloxacin) should be considered. This will necessitate escalation to second-line antibiotics, and if the patient can tolerate bronchoscopy, bronchoalveolar lavage (BAL) of the affected lobe should be performed to try and obtain a clear microbiological diagnosis. ![Cross-sectional radiological images in respiratory complications of hematological disease. (**A**) Consolidation due to bacterial pneumonia, (**B**) halo with surrounding ground glass in invasive mould disease, (**C**) air crescent sign (white arrowhead demonstrates crescent) in partially treated invasive mould disease after neutrophil recovery, (**D**) ground glass changes due to *P. jirovecii,* (**E**) tree in bud changes due to respiratory viral infection, (**F**) atoll/reverse halo sign due to organizing pneumonia.](myy138fig1){#fig1} Focal consolidation with a subacute onset has a broader differential diagnosis; these include bacterial pneumonia, *Aspergillus* species, and *Nocardia* species (usually *asteroides*), and noninfectious causes such as organizing pneumonia and recurrence of hematological malignancy. Diagnostic tests including BAL for culture, galactomannan,[@bib11] and cytology are necessary. While transbronchial biopsy has low yield and is not recommended for the diagnosis of invasive fungal disease[@bib12] given the complication rate of pneumothorax in particular, it may be useful in confirming alternative diagnoses. Dense peripheral lesions adjacent to the pleura are amenable to CT guided percutaneous biopsy. Histology can rapidly confirm a diagnosis of invasive fungal disease (IFD), *Nocardia* infection, organizing pneumonia, or malignant infiltrations (e.g., lymphoma), and the biopsy material can also be sent for culture. Pulmonary nodules {#sec1-4} ----------------- Pulmonary nodules are rounded lesions within the lung with a diameter greater than 4 mm in diameter, but in the hematological malignancy population they are often substantially larger than this and can be termed macronodules. The presence of macronodules should always raise the suspicion of an IFD, the commonest of which is invasive aspergillosis, the majority of which are caused by *A. fumigatus*. Several other *Aspergillus* and filamentous fungi species such as mucormycetes can cause IFD and have similar clinical and radiological findings.[@bib8] The CT scan has several distinct appearances that increase the likelihood that a macronodule is caused by IFD, though are not necessarily very specific. A surrounding halo of ground glass (Fig. [1](#fig1){ref-type="fig"}B) is a classical sign of angioinvasive fungal disease, with the halo representing hemorrhage, and the air crescent sign (Fig. [1](#fig1){ref-type="fig"}C) due to the formation of a fungal ball within a cavity caused by fungal destruction of lung tissue is also highly suggestive of IFD.[@bib13]^,^[@bib14] Macronodules caused by IFD undergo a classic evolution of changes on CT as the infection is controlled, with the nodule developing the air crescent sign, followed by thinning of the cavity wall and shrinkage of its overall size, associated with clearance of the associated surrounding consolidation.[@bib15] A recently described CT sign that points to IFD is the occluded vessel sign,[@bib16] where pulmonary arteries are interrupted within areas of consolidation. This had an 89% sensitivity and 52% specificity for proven or probable IFD by EORTC criteria[@bib17] but does require a CT pulmonary angiogram protocol with contrast injection, with its attendant risks of renal toxicity and allergic reactions. Similarly, the hypodense sign, central hypoattenuation within a macronodule, has recently been shown to have a similar sensitivity (46%) and superior specificity (83%) to the halo sign for IFD.[@bib16]^,^[@bib18] The reverse halo (also termed the atoll sign) is a strong indicator for mucormycosis early in the disease course of neutropenic patients.[@bib19] Although CT appearances of macronodules can be highly suggestive of IFD, microbiological confirmation gives additional confidence in the diagnosis and ensures the patient receives antifungal treatment that is effective against the specific infecting fungal pathogen. Unfortunately, all existing microbiological tests for IFD have significant drawbacks. Culture of BAL[@bib20]^,^[@bib21] or sputa is insensitive,[@bib22] although when positive in the immunosuppressed patient is highly suggestive of active infection. Antigen testing using the serum galactomannan has a sensitivity of 41--78% and specificity of 60--95% when two sequential samples have an optical density \>0.5 giving a negative predictive value of up to 95% in azole naive patients in the highest risk groups (neutropenic patients)[@bib15]^,^[@bib23]^,^[@bib24] but does not confirm IFD species. Furthermore, serum galactomannan is less accurate in patients receiving triazole prophylaxis,[@bib24]^--^[@bib26] which is now in widespread use in hemato-oncology patients. Measuring galactomannan in BAL instead has a much greater sensitivity of 87% and specificity of 89% even in the setting of triazole prophylaxis,[@bib24] and hence a negative BAL galactomannan can allow de-escalation of treatment with antifungals. Mucormycetes have little galactomannan in their cell walls rendering serum and BAL analysis for this test insensitive.[@bib27]*Aspergillus* polymerase chain reaction (PCR) should be sensitive but may not be specific due to widespread presence of *Aspergillus* species in the environment, and as yet there is little standardization between kits and is not in widespread use.[@bib28] The lateral flow device provides a point of care test for fungal wall antigens that is as sensitive and specific as PCR[@bib29] and has significant clinical promise but is not yet in wide commercial use. As discussed above in the consolidation section, a CT guided percutaneous biopsy is a rapid way of identifying IFD in macronodules, as well as some other pathogens, and noninfective diagnoses. The biopsy material can also be sent for culture to identify the infecting species and antimicrobial resistance profile. Hemorrhage and pneumothorax are the main complications of percutaneous CT guided biopsies, with the former being a particular problem in hematological malignancy due to the prevalence of significant thrombocytopenia. However, targeting peripheral lesions and using platelet transfusions minimizes these risks. Overall, a specific diagnosis of invasive fungal disease can be difficult to achieve and microbiological diagnosis of IFD remains unreliable. Diagnosis is usually made with a consideration of multiple elements: clinical risk factors, radiological changes, biomarkers, and the use of triazole prophylaxis. As mortality without treatment is high,[@bib30]^,^[@bib31] empirical treatment is usually started in high-risk patients as soon as the clinical picture is compatible with an IFD. Although published data suggest that azoles such as voriconazole and posaconazole are as effective as amphotericin (if not more so),[@bib15]^,^[@bib32] liposomal amphotericin is often the first-line therapy in patients receiving azole prophylaxis due to fears about fungal resistance.[@bib33]^,^[@bib34] If azoles are used, ensuring that therapeutic levels are achieved by monitoring serum levels improves outcomes.[@bib35]^--^[@bib38] Newer azoles are being developed, and one of these isavuconazole has recently been shown to be noninferior to voriconazole and has the advantage of being effective against mucormycosis.[@bib39] Dual agent antifungal may have superior outcomes in IFD and could be considered in critically ill patients.[@bib40]^,^[@bib41] Other causes of nodules include septic emboli, *Nocardia*, mycobacterial infections, and noninfectious causes. Septic bacterial emboli cause distinctive radiological appearances of multiple cavitating nodules, usually in the lung periphery and often eroding into the pleural space to cause infected hydropneumothoraces. The most common sources are infected indwelling catheters, so line infection needs considering in any patient with radiological evidence of lung nodules, necessitating paired blood and line cultures. Multiple well-defined micronodules in the context of cell-mediated immune deficiency can be caused by *Nocardia*[@bib42] and mycobacterial species.[@bib43] Nocardial infection is associated with myeloablative conditioning and steroids, with a median time to infection of 10 months post HSCT.[@bib42] Pulmonary infection has a mortality rate up to 53% and requires treatment for 6--12 months with oral trimethoprim/sulphamethoxazole or parenteral treatment with carbapenems and/or amikacin. Prophylactic trimethoprim/sulphamethoxazole for pneumocystis also protects against *Nocardia*. Nontuberculous mycobacteria infection post HSCT has an incidence of between 0.4 and 10%,[@bib44] associated with GvHD and further immunosuppression, and has a 7--19% mortality rate.[@bib45]^,^[@bib46] Noninfectious causes of nodules such as lymphoma, other malignancies, and post transplant lymphoproliferative disorder (PTLD) need histological diagnosis. However, smaller size nodules may not be amenable to percutaneous biopsy, the yield of BAL remains poor, and in the nonresponding patient the diagnosis may require video assisted thoracoscopic biopsy. In these situations it is important to try and identify potential extrathoracic sites of disease that are more amenable to biopsy than the lung. Diffuse disease {#sec1-5} --------------- The differential diagnosis for diffuse, less dense, bilateral infiltrations on the CT scan is broad. These changes encompass two main patterns, ground glass infiltrates and tree-in-bud changes, which differ in their likely causes and are discussed separately below. The important microbiological tests are blood and sputum cultures, serum β-D-glucan antigen testing (a fungal cell wall component), blood CMV viral load, and multiplex PCR for respiratory viruses on nasopharyngeal aspirate. Inflammatory markers such as CRP can help differentiate between infectious and noninfectious causes, although CRP can also be significantly elevated in noninfective hyperinflammatory states. Serial full blood counts and coagulation status can help identify patients at risk of engraftment syndrome (clinical syndrome occurring at time of neutrophil recovery) or pulmonary hemorrhage. Obtaining BAL for cytology and microbiological testing is very helpful, but these patients are often too hypoxic to undergo a bronchoscopy. Ground glass infiltrates {#sec1-6} ------------------------ Bilateral ground glass infiltrates (Fig. [1](#fig1){ref-type="fig"}D) can be caused by a wide range of microbial pathogens including pyogenic bacteria, respiratory viruses, cytomegalovirus, *Pneumocystis jirovecii*, and multiple noninfective causes. This pattern is unlikely to be caused by an IFD. Often ground glass infiltrations are associated with areas of denser consolidation creating a mixed appearance on the CT scan. The likely causes of rapid onset of bilateral ground glass infiltrates over a few days include bacterial infections, pulmonary edema, and acute respiratory distress syndrome (ARDS), and less commonly alveolar hemorrhage or engraftment syndrome. Engraftment syndrome presents with widespread infiltrates associated with fever, rash, and other organ dysfunction within 4 days of granulocyte recovery post-HSCT.[@bib47] A subacute onset of respiratory symptoms over days and weeks with associated ground glass changes has similar causes as acute presentations, but the differential diagnosis needs to be expanded to include *P. jirovecii*, CMV, respiratory viruses, and drug- or radiotherapy-induced pneumonitis. There are some aspects of the clinical presentations of the above diseases that can suggest the underlying cause, and these are discussed below. *Pneumocystis* pneumonia (PJP, previously referred to as PCP in older publications) often has a distinct clinical presentation of progressive dyspnoea over several weeks associated with desaturation on exertion and then eventually hypoxemia. This is usually associated with only low-grade fevers and moderate increases in CRP. The incidence is as low as 0.1% in patients receiving prophylaxis.[@bib48] Pulmonary coinfection is common, particularly with CMV, and mortality rates have been reported to be as high as 30--60% in hematological malignancy,[@bib49] although in our experience it is considerably less than this. CT findings are often highly suggestive of PJP, classically showing diffuse bilateral ground glass shadowing with a predilection for the upper lobes and marked subpleural sparing. Serum antigen testing for β-D-glucan is very helpful, with a published sensitivity of 95% and specificity of 86% for PJP.[@bib50]^,^[@bib51] However, β-D-glucan levels can also be elevated with other fungi, in particular with candidemia, so need to be interpreted in the context of the overall clinical picture. The diagnosis of PJP can also be confirmed in some patients by identification of cysts in bronchoalveolar lavage using immunofluorescence, although this is often negative in hematology patients. Overall, in patients with a classical clinical and radiological presentation the diagnosis of PJP can be confirmed by the response to empirical treatment, usually with high dose co-trimoxazole or clindamycin and primaquine. Adjunct systemic corticosteroids are used in hypoxic patients but do complicate assessing the response to empirical treatment as noninfective causes of a pneumonitis can also improve with corticosteroid treatment. CMV pneumonitis is most often due to reactivation of latent infection during periods of impaired cell mediated immunity and T-cell depletion rather than primary infection, and has a high mortality of up to 50%.[@bib52] CT findings in CMV pneumonia are not that distinctive and include bilateral ground glass infiltrates and symmetrical micronodules.[@bib53] The diagnosis is suggested by highly elevated blood CMV viral load, especially if this has increased rapidly, and can be confirmed by obtaining BAL fluid for quantitative PCR[@bib54] and cytology to look for viral inclusion bodies. However, the patients are often too hypoxic for a safe bronchoscopy. Treatment is with intravenous ganciclovir, followed by conversion to valganciclovir, with foscarnet and cidofovir as second and third line agents.[@bib55] Although there can be clinical (e.g., rapid weight gain suggesting fluid retention and pulmonary oedema), and radiological features (Table [1](#tbl1){ref-type="table"}) that suggest specific causes, making a confirmed diagnosis of noninfective etiologies of bilateral infiltrates is often difficult. The diagnosis often partially depends on microbiological testing to try and exclude infective causes, including bronchoscopy if the patient is able to tolerate the procedure. Bronchoscopy can also be diagnostic for alveolar hemorrhage with similar or increasing recovery of bloody fluid with sequential lavage. The main clinical decision is whether to introduce systemic corticosteroids as a treatment for suspected noninfective causes such as drug- or radiation-pneumonitis, alveolar hemorrhage, or rarer complications of specific therapies such as all-trans retinoic acid differentiation syndrome. Tree-in-bud changes {#sec1-7} ------------------- Bilateral tree-in-bud (Fig. [1](#fig1){ref-type="fig"}E) changes are suggestive of acute respiratory viral infections (Table [3](#tbl3){ref-type="table"}) or widespread bacterial bronchiolitis. This can sometimes be seen in patients with bronchiectasis as a complication of hematological disease (e.g., secondary to hypogammaglobulinemia). Respiratory viral infections are very common in patients with hematological disease and can now be readily diagnosed by PCR on a nasopharyngeal aspirate. The CT often demonstrates widespread, diffuse, symmetrical tree-in-bud changes, although these infections can also cause ground glass infiltrates. In comparison to immunocompetent individuals, respiratory viral infections in patients with hematological malignancy (particularly after HSCT) are more prolonged, lasting weeks and even months, and lead to an increased risk of respiratory compromise due to the development of viral or secondary bacterial pneumonia.[@bib56] The viruses recognised to cause respiratory infection in hemato-oncology patients are noted in Table [3](#tbl3){ref-type="table"}. Some have specific treatments though the data for efficacy are largely limited to case series. Ribavirin is used for respiratory syncytial virus (RSV), although it appears to have little effect once patients develop respiratory failure.[@bib57] Adenovirus is often cultured, though less commonly causing infection, can be treated with Cidofovir.[@bib58]^,^[@bib59] Neuraminidase inhibitors reduce mortality due to influenza infection,[@bib60] although they are less effective in patients who are immunosuppressed, have GvHD, lymphopenia, or older age;[@bib61] preemptive vaccination is key in preventing infection.[@bib62] There are no recognized organism-specific treatments for parainfluenza,[@bib63] human metapneumovirus,[@bib7] and rhinovirus.[@bib64] Bronchiectasis is a common complication of many hematological diseases including multiple myeloma, chronic lymphocytic leukemia (CLL), B-cell depletion therapies, and HSCT, and can result in subacute bacterial bronchial infections. These cause patchy tree-in-bud infiltrates associated with bronchial wall thickening and dilatation and are usually caused by Gram negative pathogens such as *K. pneumoniae* or *P. aeruginosa* that will require prolonged therapy with appropriate antibiotics. Too short an antibiotic course will allow the infection to recur, and this can lead to a vicious cycle of recurrent infections with an inability to gain weight or fully recover before the next infection occurs. Antibiotic prophylaxis and correction of hypogammaglobulinemia with supplementary immunoglobulins is important for these patients and is also recommended in other patients with hematological malignancy and secondary antibody deficiency in the setting of recurrent infections.[@bib65] Treatment strategies {#sec1-8} -------------------- Almost all hematology patients presenting acutely with fever and dyspnoea will require broad-spectrum antibiotics. Starting antifungals with the initial fever does not improve outcomes compared to delaying to day 4 if the fever does not settle.[@bib66] Similarly, cross-sectional CT is only necessary if the symptoms do not resolve rapidly with antibiotics.[@bib67] If the fever persists, then characteristic CT changes in the clinical context (speed of onset, immune defects, other clinical features) will often indicate the need for specific treatments, for example, liposomal amphotericin or voriconazole in neutropenic patients with a macronodule with surrounding halo. However, the wide differential diagnosis means that empirical treatment targeting different infectious and noninfectious causes is often required. Microbiological confirmation remains variably successful; culture techniques are slow and sensitivity can be poor, hence the development of biomarkers and PCR to increase sensitivity. While invasive procedures such as bronchoscopy or biopsy can give vital diagnostic information and in particular allow the de-escalation of antifungals and make alternative diagnoses, patients can deteriorate rapidly and be too hypoxic for such investigations. Furthermore, many cases of respiratory problems in hematology patients have a combination of causes, so even when a microbe has been identified, this may not prevent broader treatment. Another significant issue is when to stop therapy in patients treated empirically with multiple agents who then improve, as the cause of the underlying problem may remain unclear. Most bacterial infections resolve with a few days of antibiotics, but aspergillosis can require prolonged therapy to prevent recurrence. Exactly how long antifungals should be continued is not known; serum galactomannan levels may have some utility, with a ≥35% reduction after 1 week associated with a good clinical outcome,[@bib68]^,^[@bib69] but mainly outcome is monitored by observing radiological responses. It is unclear at which stage during this evolution that it is safe to stop antifungals without leading to a significant risk of recurrence. Patients with hematological malignancy can develop a range of immune defects during the course of their illness or associated with the necessary treatments. These allow various pathogens to cause disease, and the respiratory tract is commonly affected; this is associated with significant morbidity and mortality. Infections must be treated promptly, requiring empirical therapy chosen to cover the most likely pathogens given the clinical presentation. An understanding of the relevant immune defect, along with the recognition of patterns of clinical presentation and findings on cross-sectional CT imaging, allows logical deduction of likely culprits and targeted microbiological and molecular investigations to help narrow the differential diagnosis. This is with the caveat that there is significant cross-over between radiological findings, and a high prevalence of noninfective respiratory complications that are often diagnoses of exclusion. As such, there are many occasions when the specific diagnosis is never discovered, and critically ill patients have to be treated for multiple organisms and noninfective complications empirically. There is an urgent need for improved rapid diagnostics with better sensitivity and specificity to allow more directed treatment of respiratory infections in hematological malignancy. Ideally, future research should focus on the development of point of care tests that accurately identify specific organisms. If possible, these will be noninvasive and easy to perform even on critically ill patients, allowing pathogen-specific treatments and minimising unnecessary drug-related toxicity. {#sec2} Declaration of interest {#sec2-1} ----------------------- The authors report no conflicts of interest. The authors alone are responsible for the content and the writing of the paper.
About US$ 155 4 Patriot Pens (you can choose the grip type in a survey sent after the funding period ends) with your choice of blue or black ink. Estimated delivery Aug 2015
Expression of cannabinoid receptors type 1 and type 2 in non-Hodgkin lymphoma: growth inhibition by receptor activation. Endogenous and synthetic cannabinoids exert antiproliferative and proapoptotic effects in various types of cancer and in mantle cell lymphoma (MCL). In this study, we evaluated the expression of cannabinoid receptors type 1 and type 2 (CB1 and CB2) in non-Hodgkin lymphomas of B cell type (n = 62). A majority of the lymphomas expressed higher mRNA levels of CB1 and/or CB2 as compared to reactive lymphoid tissue. With the exception of MCL, which uniformly overexpresses both CB1 and CB2, the levels of cannabinoid receptors within other lymphoma entities were highly variable, ranging from 0.1 to 224 times the expression in reactive lymph nodes. Low levels of the splice variant CB1a, previously shown to have a different affinity for cannabinoids than CB1, were detected in 44% of the lymphomas, while CB1b expression was not detected. In functional studies using MCL, Burkitt lymphoma (BL), chronic lymphatic leukemia (CLL) and plasma cell leukemia cell lines, the stable anandamide analog R(+)-methanandamide (R(+)-MA) induced cell death only in MCL and CLL cells, which overexpressed both cannabinoid receptors, but not in BL. In vivo treatment with R(+)-MA caused a significant reduction of tumor size and mitotic index in mice xenografted with human MCL. Together, our results suggest that therapies using cannabinoid receptor ligands will have efficiency in reducing tumor burden in malignant lymphoma overexpressing CB1 and CB2.
Q: jQuery selector of name attribute for different element types I have a table of rows. In one of the columns, some rows have a span with static text, some rows have a select with values to choose from. All elements in that one column have the same name attribute. In my form submit, I iterate thru the rows and want to get the values for all columns. I would prefer to have one jQuery selector statement to get the value from that element (span or select with name attribute of "materialValue"). How would I do that with jQuery? Here follows the html snippet. <table> <tr><td> <span id="materialValue1" name="materialValue>ONE</span> </td></tr> <tr><td> <span id="materialValue2" name="materialValue>TWO</span> </td></tr> <tr><td> <select id="materialValue3" name="materialValue> <option>ONE</option> <option>TWO</option> <option>THREE</option> </select> </td></tr> <tr><td> <select id="materialValue4" name="materialValue> <option>ONE</option> <option>TWO</option> <option>THREE</option> </select> </td></tr> </table> Edit: I'm used to specifying the element type then square brackets with the attribute name/value. I'm not sure how to specify the jquery selector without the element type name. e.g. $('span[name="materialValue"]', this). Is it legal to specify $('[name="materialValue"]', this)? looks weird to me. A: All you need is an attribute selector: $("[name='MaterialValue']") Also, you are missing closing quotes after your attribute name in your html Look here for reference: http://api.jquery.com/attribute-equals-selector/ A: Like this... $("[name=materialValue]") // Select element with name attribute with a specific value Attributes are selected using brackets. You can also use it like this in other cases... $("div[id]") // Select element with an id attribute $("[name*=test]") // Select all elements with *test* in the name attribute (partial) etc..
Always play it safe! Safety is a hot topic these days. The public fears danger and craves safety. Parents are afraid to let their kids play out of their sight. Drivers buy huge motor vehicles, for protection against other huge vehicles. Aspirin bottles have seals that can defy a safecracker. You can't be too safe! What does this have to do with bicycling? Plenty, it seems, because everyone "knows" about bikes and safety. People say "You could get run over, you know," or "A simple fall could leave you brain damaged!" In his book The Polar Bear Strategy, author John F. Ross cheerfully admitted to camping near potentially man-eating bears, but he expressed fear for cyclists riding on quiet streets! Better safe than sorry! Yes, many find bicycling very scary, because they "know" about the dangers of bicycling. Or do they know? What do they really know about the danger - or the safety - of bicycling? What do you know? Let's find out. This article is arranged in the form of a brief quiz. Answer each question with your best guess before moving on. Don't be afraid to make a mistake. We won't give out your score. We're not even keeping score. Your secret's safe with us. So, we're going to talk about the scary stuff. We're going to talk about the dangers of riding a bike. And this is the scariest: "You can get killed riding your bike!" Of course, you can get killed doing other things too. So let's start with a comparison: 1 . Rank these activities from MOST dangerous (#1) to LEAST dangerous (#5). Here, we're talking about the number of fatalities per million hours of people doing these activities. a) bicycling ____ b) swimming ____ c) on-road motorcycling ____ d) flying in small planes ____ e) walking near traffic ____ Answer Of course, fatalities aren't the only measure of safety. People can be injured - perhaps badly enough to need Emergency Room treatment. So: 2 . Rank these in order, giving #1 to the item causing the most ER visits per year in the USA; Give #5 to the activity or device causing the fewest ER visits per year. a) bicycling ____ b) basketball ____ c) beds ____ d) carpets & rugs ____ e) chairs & sofas ____ Answer But don't people fall off their bikes, hit their heads and die? Isn't that why you're told to never ride without a helmet? Let's do a multiple choice question: 3 . Of all the people who die of head injuries in the US, what percentage are killed while riding bicycles? a) 30% b) 20% c) 10% d) 5% e) less than 1% Answer Still, you can fall off your bike! Everybody knows that! So let's talk about crashes while cycling. 4. On average, how often do enthusiastic cyclists (that is, bike club members) crash badly enough to damage equipment or require medical treatment? Roughly every: a) 1500 miles b) 5000 miles c) 10000 miles d) 30000 miles e) 100000 miles Answer So serious crashes are not common. But we do know that cyclists sometimes end up at the hospital, so let's go back to the ER data. A trip to the ER for any reason sounds pretty serious! So: 5. For a cyclist being treated in an ER, rank the most common injury being treated #1, and rank the least common injury #5: a) minor injuries to legs (like skinned knees) ______ b) minor injuries to arms (like skinned elbows) ______ c) minor injuries to shoulders ______ d) moderate or worse injuries to arms ______ e) moderate or worse head injuries ______ (For those who know about the Abbreviated Injury Severity scale, we'll define "minor" as AIS #1: scratches, bruises, etc. AIS #2 injuries are described as "moderate," #3 are "serious," #4 are "severe," #5 "critical," and #6 " unsurvivable.") Answer So, what do the data tell us? To review the answers from questions #4 and #5: Eventually, you will fall off your bike - face it! But, you almost certainly won't get badly hurt. Even a trip to the ER is rare. If you do go to the ER, it's probably not going to be for something serious. The modern idea that every fall off a bike is a near-death experience is clearly false! 6. Now let's return to fatalities. Question #1, risk of fatality per hour, deliberately left out one of the most common activities: driving or riding in cars. If we now compare motoring and cycling, which is more dangerous, in terms of fatalities per hour? We must realize that the relative levels of danger are not the same in all countries. And certainly, different countries have different agencies collecting different data in different ways. We can't expect the answers to match. Still, how do you suppose cycling and motoring compare in the following countries? Take your guess for: France, Germany, Sweden, Switzerland, Netherlands, Australia, USA, and Great Britain. For each of those, regarding risk of fatality: is an hour of cycling safer, or more dangerous than an hour of motoring? Answer But saying something is "more dangerous" does not mean that activity is dangerous in any absolute sense. Washing dishes may be more dangerous than dusting, but that doesn't mean we must use only paper plates! So let's get a feeling for the actual level of danger. 7 . For the country whose comparison was worst, Great Britain, let's look again at dedicated cyclists - the members of Britain's Cyclists Touring Club, or CTC. These are people who frequently do long club rides, or who tour by bicycle. These people ride their bikes a lot. On average, how many person-years of CTC riding are there between fatalities? Or to put it another way, how long would the average CTC member have to ride to reach a 50% chance of dying on the bike? a) 100 person-years of cycling per fatality b) 500 person-years of cycling per fatality c) 1500 person-years of cycling per fatality d) 15000 person-years of cycling per fatality. Answer So, contrary to public belief, you are not likely to be killed by cycling. In fact, most people are far more likely to be killed while riding in a car. Next: If cycling doesn't cause you to die, is there a chance it will help you to live? 8 . Of the four top causes of all deaths (not just accidental deaths) in the USA, how many does cycling reduce or help prevent? a) 1 b) 2 c) 3 d) 4 Answer 9 . But perhaps that's not a fair comparison. Consider: if an 18 year old is killed while riding his bike, he may have lost 60 years of life. Perhaps an older gentleman who rides his bike daily postpones a fatal heart attack by five years. 60 years lost to five years gained - is that a good trade? So for all of society on average, in terms of years-of-life gained versus years-of-life-lost due to cycling: how does cycling do? Out of these approximations, pick your choice: a) one year of life is gained for every 10 years of life lost. (10 to 1 against biking) b) one year of life is gained for every year of life lost. (approximately a tie) c) 10 years of life are gained for every year of life lost. (10 to 1 in favor of biking) d) 20 years of life are gained for every year of life lost. (20 to 1 in favor of biking) Answer We've looked at a lot of data in terms of hours. Now let=s look at mileage, instead. 10 . Roughly how many miles do cyclists ride, on average, between bike fatalities? (This will be a rough average, putting together data from USA, Britain, and Australia) a) 15,000 miles of cycling per fatality b) 150,000 miles c) 1.5 million miles d) 15 million miles e) 150 million miles per fatality Answer Finally, a bonus question: Take your average annual mileage on your bike. Given the answer to the last question - 15 million miles of cycling per fatality - if you were of average skill, how many years would you have to ride to have a 50% chance of dying on your bike? As an example for that bonus question, let's consider a person who rides 3000 miles per year. Most people consider that to be a lot of cycling, although some ride much more. Dividing 3000 miles into 15 million miles per fatality, yields a 50/50 chance of dying on the bike after riding for 5000 years . And that's assuming the person riding 3000 miles per year has only average skill! That brings us to the most important fact about Bicycle Safety: 1) Bike Safety : We already have it! Cycling is NOT very dangerous! I think, for the general public, this would be a surprise. I've had people say "You ride your bike to work? Isn't that dangerous?" I've had people say "Oh, please be careful out there" - in the tone of voice they'd use for a person crossing Niagara Falls on a tightrope. Clearly, they think cycling is dangerous. Even avid cyclists frequently have a mistaken attitude. They cheerfully sign registration forms that say "I understand that cycling is a hazardous activity," and they give dire warnings about the terrible things that can happen if you make the smallest mistake. Do people make mistakes? Of course! We've all seen people riding bikes facing traffic, ignoring traffic lights, riding at night without lights, making improper turns, and riding bikes with bad brakes. Even some avid cyclists do those things! But is cycling a hazardous activity? No! It's hourly fatality rate in the US seems to be about half that of riding in a car; about 1/4 that of going for a swim. In absolute numbers, drowning during recreational swimming outnumber bike fatalities at least three to one! Cycling is not even on the map for head injury fatalities. Despite the dire warnings of the past decade, cycling is less than one percent of the head injury fatality problem in the U.S. (Riding in cars is roughly 50% of it, yet nobody proposes car helmets!) And cycling has benefits that balance out the cost to society of any injury that might occur. Should we tell people to stay off bikes, and use their cars more? If we do, there will be more air pollution, more traffic fatalities, more obesity, heart disease, cancer, diabetes, and yes, more fatal head injuries. What about having good equipment? Sadly, it's very easy to find bikes with bad brakes, loose parts, or suspicious-looking tires. Some cyclists even claim you shouldn't ride without the very latest equipment, saying the equipment used ten years ago had significant safety problems! But that, too, is false. Equipment that's completely broken - a brake that fails, or a crank that breaks in two - causes a small percentage of bike crashes. But again, "bike crashes" does not mean fatalities; it means falling off a bike. And if your bike's equipment is in good working order, it doesn't matter that your pedals were made in 1994 instead of 2004. So again, the first point to remember is: We have bike safety! CYCLING IS NOT VERY DANGEROUS. 2) It does us no good to pretend that cycling is dangerous. The acceptance of the "cycling is dangerous" idea is bad for cyclists. For example, cyclists are sometimes harmed by negligent, or even aggressive, motorists. Too often, police aren't willing to ticket motorists who are at fault, because they feel that in something as risky as cycling, you deserve whatever you get. Too often, cyclists do badly in the courts, because prosecutors, judges and juries think cyclists should expect to get hurt. The assumption that cycling is dangerous also leads to some terrible facility design. Examples are sidewalk bike paths that run cyclists through blind curves, alongside collision hazards, over terrible pavement - anything to keep cyclists away from cars. Why? Because designers believe riding near cars is so dangerous! There are communities that impose restrictive and inconsistent laws against cyclists. Astoundingly, there are municipalities that require riding on sidewalks, which are much more dangerous than roads, or even require walking bikes across all intersections. This is because the lawmakers know nothing about cycling, but they "know" that cycling is very dangerous. But overall, the "cycling is dangerous" idea hurts us worst by reducing the amount of cycling. Many people are afraid to ride a bicycle! Researchers have shown that when there are more cyclists, cycling is actually safer . Perhaps it's because motorists become accustomed to watching for cyclists and dealing with cyclists. Perhaps it's because when cycling is more common, transportation planners do a better job of accommodating cyclists. But cycling is even safer when there are more cyclists. Cycling should also be more pleasant when there are more cyclists. There would likely be bike racks on buses, bike parking in front of shopping centers, and perhaps special bike access connecting neighborhoods with adjoining shopping centers. Pretending cycling is a hazardous activity scares others away from cycling. It makes our society even more car-dependent, and it makes it worse for those of us who do ride bikes. So, again: IT DOES US NO GOOD TO PRETEND CYCLING IS DANGEROUS. Finally, it's good to remember a sad fact: The average cyclist's skill is not impressive. Most cyclists perform worse on the bike than they do when driving a car - and anyone who's complained about motorists knows that's sad, indeed! It's estimated that half of cyclists' serious injuries are caused by the cyclists' own mistakes, at least in America. And Jerrold Kaplan4 found that experienced cyclists who only "occasionally" obeyed traffic laws had an accident rate 38 percent higher than those who "usually" and "always" obeyed laws. In a way, this is good news. It means that not only is cycling safe, on average, but it's even safer for a competent, lawful cyclist. Ride by the rules, and your risks are even lower. In summary: Cycling is not very dangerous . It's at least as safe as many other common activities. And it does us no good to pretend cycling is dangerous . Doing so discourages cycling and makes conditions worse for cyclists, and for society as a whole. Now get out there and spread the word!
Adverse psychological outcomes in colorectal cancer screening: does health anxiety play a role? People who are anxious about their health are more likely to misinterpret health information as personally threatening and less likely to be reassured by medical investigations that show they are free from disease. Consequently, health anxious people would be expected to react more adversely to cancer screening, but this possibility has rarely been explored. The moderating role of health anxiety on the psychological impact of participating in colorectal cancer screening was examined among a sub-sample of 3535 participants in a large, community-based trial of colorectal cancer screening in the UK. The screening modality was flexible sigmoidoscopy, which examines the bowel for pre-cancerous polyps. It was predicted that health anxiety would be associated with more worry about cancer before screening, a greater increase in worry if polyps were detected, and less reassurance after a clear result. As expected, health anxious participants were more anxious and more worried about bowel cancer both before and after screening. However, they experienced greater reductions in anxiety and worry about cancer following the examination. They reported lower levels of reassurance following screening, but also expressed more positive reactions to the experience. The positive psychological benefits of attending medical investigations should be examined in future work, because this may go some way towards explaining why health anxious people repeatedly seek medical interventions.