text stringlengths 8 5.77M |
|---|
Violeta Riaubiškytė-Tarasovienė
Violeta Riaubiškytė-Tarasovienė (born 25 August 1974) is a famous Lithuanian singer and show host. She used to be the co-host of a Lithuanian music show "Penktadienio muzikos šou" (Friday Music Show) alongside Edmundas Kučinskas and also, and the co-host of a music show "Padainuokim!" (Let's Sing!) alongside her husband Vilius Tarasovas.
She was married to Robertas Merzvinskas and had a daughter, Elinga with him, however she divorced him at the age of 25. On 31 August 2007, she married B'Avarija star Vilius Tarasovas, and on 5 March 2008 her second daughter Gabrielė was born. Violeta Tarasovienė lives in a seaport Klaipėda. She has released three studio albums and three DVDs which made her one of the most famous and best paid Lithuanian performers. In particular, her hit "Kas Butu, (Jeigu Butu)" (What would it be like (if it happened)) was one of the TOP Lithuanian hits and stayed the top for well over nine weeks.
Early life and career
Violeta started her career being a dancer, at the age of 17 she began to sing in restaurants and was part of a small Lithuanian band "Belmondo". She studied for 6 years and graduated at the Balys Dvarionas Music School. At 18, when she graduated from secondary school, she received an offer to work in the United Arab Emirates. She accepted, because at that time, a singer in Lithuania was very far from being amongst highly paid jobs, whereas in the UAE the hotels/restaurants offered good money and also took full care of their employees. After a couple of years, when she returned to Lithuania, she was offered to sing with the group "Žvaigždių Kvartetai" and did so until she started her solo career through which she gained extreme popularity. She was later accepted to be the co-host of the comedy show "Orbita" alongside Algis Ramanauskas - Greitai, which gave her career a huge boost, transforming her into one of the most popular and wanted Lithuanian artists.
When the comedy show finished, Violeta received another two outstanding offers. Firstly, hosting a morning show on the radio station "M-1" and secondly being the co-host of the TV show "Penktadienio muzikos šou" (Friday Music Show) alongside Edmundas Kučinskas. By 2004, she released her first album "Ramunę baltąją" (Daisy the White, selling well over 40,000 copies which is double platinum in Lithuania) due to her enormous hit, after which the album was named. Similarly, by 2006, she released her second album "Su meile" (With Love, which contained of somewhat more adult oriented pop sound), and finally in 2008, her third album "Aš būsiu šalia" "I Will Be Close", was released, which is said to be her best and most popular album containing of music with extreme sense of feeling and emotion. She has released 2 DVDs alongside her first 2 albums, and another one with her third, on which both she and her husband performed their songs. Violeta has also released many singles including: The Song About You And Me, With You and many others.
Awards
"Bravo" (Female Artist of The Year)
"Kids' Voice Awards"
(Both as Best Singer)
Albums
"Ramunę Baltają" (2004)
Ramunę baltąją (White Daisy)
Man reikia tavęs (I need you)
Tegul Spindi Tavo Šypsena (with Edmundas Kučinskas) (Keep your smile everlasting)
O, Prašau, Nepalik Tik Manęs Tu (O, please, don't leave me)
Vaikinai Yra Vaikinai (A guy is a guy)
Visai Neseniai (Not so long ago)
Nebegrįšiu Laukų Takeliu (With Sadūnai) (I won't take the same path)
Kai Snaigės Nusileis Is Debesų (When snowflakes drop from the sky)
Kelias Pas Tave (with Povilas Meškėla) (The path to you)
Oi palauk, palauk (with her daughter Elinga on DVD) (Lithuanian Que Sera, Sera)
Paskutinį Sekmadienį (Last Sunday)
Su Tavim Gera (with Steponas Januška) (It's good to be with you)
Aš Būsiu Tokia (I'll be me)
Tu Visko Pradžia (Your everything's beginning)
Laiškas (with Žvaigždių Kvartetai) (Note)
Naktelė (The Night)
Meilės Istorija (Love's history)
Traviata. Užstalės daina (with Virgilijus Noreika) (La Traviata)
"Su Meile" (2006)
Pas Tave Einu (I'm coming to you) (Lithuanian: I will love again)
Vel Kvepia Žiedai (The petals are alive)
Sugrįžk (Come back)
Tiktai Tu (Only you)
Kai Myliu Tave (When I love you)
Lėkė Sakalėlis (Run bird, run)
Aš Tavo (With B'avarija) (I'm yours)
How Much Love?..
Aš Dar Tave Myliu (I still love you)
Lėlė (Doll)
Paleisk (Let Go!)
Tavo Glėbyje (In your arms)
"Aš Būsiu Šalia" (2008)
Kas Būtų, Jeigu Būtų (What would be, if it happened...)
Dek (Burn!)
Viskas Baigta (Everything's finished)
Aš Būsiu Šalia (I will be close)
Kol Tu Ne Čia (While you're not here)
Nenoriu (I don't want it)
Nieko Nera Geriau (There's nothing better)
Leiski Mylėt Tave (Let me love you)
Noriu Pranykti Tavyje (I want to disappear in you)
Vėl ir Vėl (Again and Again)
Laikas Pasakyti Myliu (It's to tell you: I love you)
Ar Žinai (Do you know?)
Tu Numegzk Man, Mama, Kelia (Mum, show me the way)
See also
Lithuania in the Eurovision Song Contest 1999
Lithuania in the Eurovision Song Contest 2005
Lithuania in the Eurovision Song Contest 2009
External links
Official Website
Music Videos
Category:1974 births
Category:Living people
Category:Lithuanian female singers
Category:Lithuanian television presenters
Category:Musicians from Vilnius
Category:21st-century women singers
Category:Women television presenters |
Why does doxepin cause weight gain? Does it change your metabolism in any way?
Answers (1)
Doxepin is a third generation TCA or tricyclic antidepressant. Common side effect of this drug class is weight gain which is accomplished in two different ways. Way one is prolonging metabolism and carb cravings. The second way (which is more common for third generation TCAs) is an increase in appetite due to its histamine blocking abilities. Can it cause you to gain weight? Yes. Will it? Maybe. Some people don't gain weight while others do. If you start to gain too much weight on it then ask your doctor to switch to something else.
Thank you so much. I saw my Doc. today and I told him I was off the ambien and sleeping so good with 10 mg of this, but I quit taking it after I saw all the people complaining of weight gain. He assured me he had numerous female patients who took a low dose to sleep and had not gained any weight. I'll go back and try it again. It was so frustrating to find something a little safer than ambien to sleep with and then see all the people complaining of side effects. Their dose was much higher also.
I have gone from 25mg to 10 mg of doxepin at night for 2 weeks now. I also, take Clonazepam with it. I am sleeping well. I started Pristiq 100 mg the same time I started the Doxepin 25 mg almost 2 years ago. I gained 45 pounds. I was able to cut the Pristiq in half to 50 mg about a year ago. That did not help the weight situation. Now I am off the Pristiq and on Wellbutrin 300 mg as of 2 weeks ago. My doctor wants to change me off the doxepin to Trazadone but I've taken that before and it makes me too drowsy in the AM. What could I change to instead of the Trazadone? I have been on many different drugs over the years.
I'm on 50mg of Doxepin at night. I sleep great but i've started gaining weight, about 10 lbs now over 3 months. I didn't take it last night and i feel less hungry today. I'm definitely talking to my doctor. I just lost that weight and gaining it back wasn't fun.
Drugs.com provides accurate and independent information on more than 24,000 prescription drugs, over-the-counter medicines and natural products. This material is provided for educational purposes only and is not intended for medical advice, diagnosis or treatment. |
Toyota to Move Manufacturing Plant
Published 8:00 pm, Thursday, January 3, 2002
Toyota Motor Corp. plans to shift its manufacturing of pickup truck beds from California to an assembly plant it expects to open on the eastern edge of Tijuana in 2004, company officials said Friday.
The Japanese automaker plans to continue producing other components at its plant in Long Beach, Calif., which employs 540 people. It does not anticipate layoffs there as a result of the new factory in Mexico, the company said.
"The Long Beach plant is still very much a part of our long-term future," said Dennis Cuneo, senior vice president for Toyota Motor Manufacturing North America Inc.
The automaker plans to produce about 160,000 beds annually for its Tacoma pickups that will be shipped by truck to Fremont, Calif., for final assembly at New United Motor Manufacturing Inc., a plant the company operates in a joint venture with General Motors Corp.
Toyota has acquired a 700-acre site in Tijuana, which is far more space than it needs to produce the steel pickup beds. The company has not decided where it will build its next full assembly plant in North America, but officials acknowledged that such a plant may be built at the site, which is just south of the U.S.-Mexico border.
"We tend to start small. If we're successful we often expand," Cuneo said.
Company officials said the Tijuana plant was part of its goal of increasing its presence in the North American market. Toyota plans to begin selling cars in Mexico this spring.
The company hasn't formalized the details of the new plant, including the size of its investment or the number of workers it expects to hire. The details will be announced later this year, Cuneo said.
Manufacturers have congregated along the southern side of the U.S.-Mexico border in order to have access to a lower-cost labor force and still be close enough to ship partially finished goods north to meet just-in-time production requirements. |
(-7)/3)/1 + 2. Let i = -11 + 10. Let n = 0 - 4. Which is the nearest to -2/9? (a) i (b) z (c) n
b
Let x = 392.3 + -392.2. Let n be -6*((-2)/(-8))/(-1). What is the closest to x in n, 0, 6?
0
Let l = 18.36 + -18. Let s = -0.46 + l. Which is the closest to s? (a) 4/7 (b) 0.2 (c) 5
b
Let l = 3.92 - 6.92. What is the closest to 0.1 in l, 23/3, 1?
1
Let p = -0.0081 - -0.5081. What is the closest to -1 in -0.4, 5, -0.5, p?
-0.5
Let r = -23.7 - -28.7. Suppose -2*k + 2 = -q, -2*q + 8*k = 3*k + 7. Let d be ((-3)/q)/((-6)/(-4)). Which is the nearest to 0? (a) 1/4 (b) d (c) r
a
Let z = -1617 + 1636. What is the closest to -2/3 in z, 2, 0.4?
0.4
Let z = -634 + 1900/3. What is the nearest to z in 1/5, -2/19, 6, -0.6?
-0.6
Let g = 1.54 + 3.46. What is the nearest to g in -4, -3, 8?
8
Let d = 1952 - 132729/68. Let q = 6/17 - d. What is the nearest to 1 in q, -1/5, 7?
q
Let n = 0.0321 + -0.1151. What is the nearest to 1 in 0.2, n, -1?
0.2
Let b = 473 - 472. What is the closest to b in 1/5, 0.1, 0?
1/5
Let f = 1.4182 + -3.4182. Let n be ((-2)/(-20))/(4/(-10)). Which is the nearest to 0? (a) n (b) -4 (c) f
a
Let m = -0.2 - -0.7. Let a = 0.079 + -32.079. Let p = a + 31.7. What is the closest to m in 5, p, -0.1?
-0.1
Let o = 0.3153 - 0.1153. Let y = -0.8 - -0.4. Which is the nearest to o? (a) 2 (b) y (c) -1/5
c
Let z(n) = -n**2 + 5*n + 7. Let s be z(5). Let i be 1/s + (-3)/21. Let b = 240 - 236. What is the closest to 1 in i, 1/4, b?
1/4
Let a(v) = -v**3 - 4*v**2. Suppose 0 = -8*p + 4*p. Suppose 0 = 2*n - b + 11, -2*n = 3*b - p - 1. Let k be a(n). What is the nearest to 0.1 in 4, -5, k?
k
Suppose -2*q + 158 - 62 = 0. Let p = -43 + q. Which is the nearest to 0.1? (a) p (b) 2/7 (c) 4
b
Let h = 16 - 16.15. Let k = -1.85 + h. Let o = 1 + k. What is the closest to 0.1 in 4, o, -2?
o
Let n be (3/(-5))/((-4)/10). Let g = -0.0014 - -0.0014. Which is the nearest to g? (a) n (b) 4 (c) 1
c
Let t be 1 - -4 - (15 + -3)/4. Suppose -7 = 2*u - j, 2*u - 11 = 5*u - t*j. Which is the nearest to -1/4? (a) 3 (b) u (c) -6/11
c
Suppose 0 = -3*g + 3*z + 126, -g + 4*z + 38 = z. Let w = g + -133/3. Let m = -95 - -90. Which is the nearest to -2/7? (a) m (b) w (c) -0.4
b
Let j(r) = r - 2. Let o be j(8). Suppose 7*g - o = 1. Which is the closest to g? (a) -5 (b) 5 (c) 0
c
Let v = 3 - 3.345. Let d = -0.055 + v. What is the closest to 0.2 in -5, d, -2/7?
-2/7
Let u be 2/(-5) - 28/30. Suppose -3*z - 18 = -2*r, 0 = 2*r - 3*r + 3. Let t = 3.19 + -5.19. What is the nearest to 2/5 in u, z, t?
u
Suppose 3*q - 2*d = 30, -d + 37 = 3*q - 2. Suppose q = -4*k + 4. Suppose -c + 3*u = 2*c - 3, 5*c - 5 = 2*u. What is the nearest to c in 1/6, k, 1?
1
Suppose 15*z + 54 = 13*z. Let f = -2951/2 + 1449. Let i = z - f. Which is the nearest to 2? (a) -1/10 (b) i (c) -3/5
a
Let j be ((-10)/45)/((-7)/9). Which is the nearest to 5/3? (a) -1/12 (b) j (c) -1
b
Let t = -0.3 - -1.3. Let o = 11 - 8.3. Let m = -3.1 + o. Which is the nearest to t? (a) -3 (b) m (c) 0.2
c
Let g = 68.79 - -2.71. Let i = -71 + g. What is the nearest to 1 in 0.7, i, -1/3?
0.7
Let o = -2/1261 + 2536/8827. What is the closest to o in 2, 4, 1.4?
1.4
Let i = -0.7 + -0.3. Suppose 5*h = -20, -t = -9*h + 13*h + 4. Which is the nearest to 1? (a) i (b) t (c) 4
a
Let n be (1463/55)/7 - 3. Which is the closest to n? (a) 2 (b) 8/5 (c) -2/19
b
Let l = 221 + -205.2. Let s = 16 - l. Let d = 7 + -5. What is the nearest to s in d, 8, 2/9?
2/9
Let r = -2.1 - -0.2. Let n = 2 + r. Let s = 0.9 + n. What is the closest to s in 4, 3/5, 1/5?
3/5
Let f = 0 + 2. Suppose -5*y = -2*q - q + 9, y = f*q + 1. Let s = -0.2 + 0. What is the nearest to s in -0.1, -3/7, y?
-0.1
Let h = 5.1 + -0.1. Let y(o) = -o**2 - 13*o - 22. Suppose 0 = -2*u - 12 - 10. Let n be y(u). Which is the closest to 4? (a) h (b) n (c) -2
a
Let h be (-2)/8 - 5/(-20). Let s = 5.8 + -0.8. What is the closest to h in -0.2, s, -16?
-0.2
Suppose -4*l - 31 = -3*f, 0 + 3 = -2*l - f. Let z be (-44)/85 + (-32)/(-80). Which is the nearest to 1? (a) l (b) -1/3 (c) z
c
Let b = -8.3 - -10.7. Let p = b + -2.4. What is the closest to p in 5, -0.4, -1?
-0.4
Let v = -6.7 + 7. Let z = -75 - -52. Let a = z - -24. What is the nearest to -2 in a, 5, v?
v
Let p = 2.1 - 2. Let t(n) = -21 + 6 + n + 8. Let w be t(7). What is the nearest to p in w, 0.3, 0.4?
w
Let d = -94 + 97. Let v = -6.9 + 7.4. Which is the closest to 1? (a) 1 (b) d (c) v
a
Let q = -124 + 1120/9. Let g = 44 + -48. Let h be (g/(-3))/(3 - -3). What is the closest to -1 in q, -0.2, h?
-0.2
Let l = 0.94 + -1.14. Which is the nearest to 2? (a) 5 (b) -3 (c) l
c
Let g = -1.04 + 0.04. Let k = g + 0.1. Let v = k + 0.6. Which is the closest to 1/2? (a) -7 (b) -1/4 (c) v
b
Let z = 14 + -15.9. Let x = z + -0.1. What is the closest to 0.2 in -5, x, -3/8?
-3/8
Let n = 17.4 + -16.9. What is the closest to -2 in n, -2/7, -2?
-2
Let v = -0.1 - -0.1. Let q = 3.2 + 0.8. Let j = 11201 - 11201. Which is the nearest to j? (a) v (b) 3 (c) q
a
Let j = 163.5 - 164. What is the nearest to 1/3 in j, -53, -1?
j
Let y be 3/1 - (-461)/(-154). Let j be (-6)/(-2) - 17828/5544. Let q = j - y. What is the closest to -1 in 1/2, q, -1/7?
q
Let i be 1/3 + (-26)/42. Suppose -20 = 5*k - 3*z + 44, 0 = -z + 3. Let b = k + 34/3. What is the nearest to 2 in i, -2/9, b?
b
Let r = -22.48 - -22.7. Which is the closest to -1/3? (a) 0.5 (b) 0.4 (c) r
c
Let f(v) = -v**2 - 6*v + 6. Let u be f(-6). Suppose -i - 10 = -u*i. Let k be (4 - 70/15)/i. What is the closest to -0.1 in -1, k, 0?
0
Let k = 2427 + -2429. Let v = 0 - 0. Let s = 0.2 - v. Which is the nearest to 0? (a) 0 (b) k (c) s
a
Let y = -33 + 30. Let r = 1.2 + -0.2. Let q = r - 1.1. What is the nearest to q in y, -2/5, -1/5?
-1/5
Let a be -4 - (9/6 + 3)*-1. What is the nearest to a in 1/2, 2/13, 1.2?
1/2
Let q = -1.3 + 0.6. Let k = 2.3 - q. Let v = -1 - k. Which is the closest to 1/2? (a) -5 (b) -2 (c) v
b
Let c = 32/3 - 97/9. What is the nearest to -0.02 in -1, 5, c?
c
Let z = 153/5 - 31. Let d = 0.1 + 0. Let l be 0 - ((-14)/(-8))/(-7). What is the closest to d in z, l, -5?
l
Let p(j) = -7*j + 7. Let q be p(1). Let s = -3 - -2.6. What is the closest to q in s, 4, 2?
s
Let n = -1 + 1.1. Suppose 0 = 2*f + 32*s - 33*s - 6, 3*f - 2*s - 11 = 0. Which is the closest to n? (a) f (b) -1 (c) -3
a
Let h(d) = -5*d**2 + 30*d - 1. Let c be h(6). Let v be -4*(-4)/16*1/c. Let l = -1/13 + 19/78. What is the closest to 0 in v, l, -1/8?
-1/8
Suppose -b - 96 = -4*g + 20, -3*b = -g + 18. Suppose 0 = 3*i + 3*i - g. What is the nearest to -0.1 in -5, i, -0.3?
-0.3
Let z = -219/5 - -43. Which is the nearest to 1/4? (a) -4 (b) z (c) 0
c
Let x = -386 + 385. What is the closest to 1/5 in 4, x, 1/5?
1/5
Let j = 1.4 + -1.44. Let a = j + -0.26. Let d = 1 - -1. What is the nearest to -1 in d, a, -5/4?
-5/4
Let r = -0.2 - -0.4. Let l = 4578 - 4580. What is the closest to r in -1, l, 1/3?
1/3
Let f be (0 + 1)*-2 + 14/6. Which is the nearest to 0? (a) 8/7 (b) 0.5 (c) f (d) -5
c
Suppose o + 5 = -3*m, 20 = -4*o - 0*o - 4*m. Let n(b) = 2*b - 2. Let h be n(3). What is the nearest to -1/5 in o, -3, h?
-3
Let w be -9 + 72/12 + 3/1. Let i = 0.11 - -0.09. What is the closest to i in -2/9, w, -4?
w
Let y = -6 - 4. Let l = 1 - -8.9. Let m = y + l. Which is the closest to m? (a) -6/5 (b) 5 (c) -4
a
Let f(m) = -m**2 - 13*m - 20. Let w be f(-7). Let z be (-2)/(-1) + w*(-6)/60. What is the nearest to -0.03 in 0.4, z, 2?
z
Let m be ((-14)/(-21))/(((-16)/18)/(-4)). Which is the nearest to -2/5? (a) -0.5 (b) m (c) -1 (d) 0
a
Let h = 98/129 - 4/43. Let p = -0.2 + 0.1. Let f = p - 0.1. What is the nearest to h in 4, 0, f?
0
Let h = 51 + -52. Let o = -16 - h. What is the nearest to 1 in -3, -1/4, o?
-1/4
Let t = 1078 + -1075. Suppose -8 = -5*d - 3. What is the closest to t in -0.06, -2/5, d?
d
Let f = -310.9 + 311. Which is the closest to -17? (a) -4 (b) 4 (c) f
a
Let f be ((-2282)/(-567) - 4)*(-2 + 5). Which is the closest to 2/5? (a) -4 (b) -0.5 (c) 0.2 (d) f
c
Let t(i) = -i + 11. Let h(s) = -s**2 - s + 6. Let g be h(0). Let z be t(g). Let y = 1 - 1. Which is the nearest to y? (a) z (b) -0.4 (c) 4
b
Let p = -0.6 - -0.5. Let m = p + 0. Let w = 0 - -2. What is the closest to -0.1 in w, 4, m?
m
Suppose |
77 Cal.App.3d 575 (1978)
143 Cal. Rptr. 671
PHILLIPS CONSTRUCTION COMPANY, Plaintiff and Appellant,
v.
ARGONAUT INSURANCE COMPANY, Defendant and Respondent.
Docket No. 40511.
Court of Appeals of California, First District, Division Three.
February 15, 1978.
*576 COUNSEL
Behrens, Nelson & Mackey, Robert W. Mackey and Irv Piotrkowski for Plaintiff and Appellant.
Adams & Philipps, Charles J. Philipps and Gregory J. Ryken for Defendant and Respondent.
*577 OPINION
SCOTT, Acting P.J.
Appellant Phillips Construction Company (hereinafter Phillips) sought recovery against Camille Enterprises (hereinafter Camille) and its bonding company, respondent Argonaut Insurance Company (hereinafter Argonaut), for work performed under a construction contract. Subsequent to the filing of the complaint, Camille became bankrupt. Judgment was entered in favor of respondent Argonaut.
Camille was the owner and general contractor-developer of two subdivisions in the City of Petaluma; one subdivision was known as Cherry Valley and the other as Mountain View. Golden West Savings & Loan financed both projects. Respondent Argonaut bonded Camille only on the Cherry Valley project. Phillips subcontracted curb, gutter and sidewalk construction in both subdivisions.
The Cherry Valley work by Phillips commenced first. A month after the Mountain View job started, Phillips submitted an invoice to Camille for $18,000 for work performed on the Mountain View job plus $2,000 as an advance for materials. Camille informed Phillips that further funds would be released on the Mountain View project only with the understanding that these funds be used to pay subcontractors on the Cherry Valley project. Camille's concern was with the fact that subcontractors on the Cherry Valley project had not been paid, despite the fact that Camille had disbursed funds to Phillips on the project, and that these subcontractors might file mechanic's liens which would interfere with the sale of the new homes. The parties agreed to Camille's request. The Phillips voucher relating to the Mountain View job was submitted to Golden West, who issued a check payable to Phillips c/o Camille. Phillips endorsed the check to Camille. Camille and Phillips agreed that Camille would issue a $5,000 check to Phillips for the Mountain View account and four joint checks totaling $15,000[1] to Phillips and its subcontractors on the Cherry Valley project. After initially crediting the Cherry Valley project, Phillips subsequently changed its billing to reflect the total $20,000 as a credit against the Mountain View account.
The trial court found that the four joint checks were properly applied to the Cherry Valley project, which resulted in full payment of the *578 Cherry Valley contract. It followed that Argonaut, as surety, was not liable to Phillips.
(1a) Phillips contends that the trial court erred in holding that payments from the Mountain View account could legally be applied to the Cherry Valley project. Phillips argues that because the $20,000 check was made payable directly to it for work performed on the Mountain View project, it had notice that Camille was without authority to determine the application of the funds and the attempt was ineffectual.
(2) Civil Code section 1479 provides in part that:
"Where a debtor, under several obligations to another, does an act, by way of performance, in whole or in part, which is equally applicable to two or more of such obligations, such performance must be applied as follows:
"One If, at the time of performance, the intention or desire of the debtor that such performance should be applied to the extinction of any particular obligation, be manifested to the creditor, it must be so applied."
In accordance with this section, when a debtor directs that a payment be applied to a particular debt, the creditor must apply payment to that debt. Where a creditor and a debtor agree to the application of a payment to a particular indebtedness, the application cannot be subsequently changed if to do so would adversely affect the right of third parties. (Johnston v. Groom (1929) 99 Cal. App. 462, 464 [278 P. 935].) (1b) To change the application of the payment here from the Cherry Valley to the Mountain View project would, of course, adversely affect the rights of Argonaut.
Phillips contends, however, that this case is governed by the holding of Modesto Lumber Co. v. Wylde (1933) 217 Cal. [19 P.2d 238] and its progeny.[2] In that case, the Modesto Lumber Company and Turner Hardware & Implement Company furnished materials to Bates, a contractor, who agreed to erect a residence on Wylde's property; the Modesto Building and Loan Association financed the construction with a loan to the owner, Wylde. The loan association had knowledge of the *579 terms of the building contract and the contractor had knowledge of the terms of the loan. The owner received no money directly from the loan association. Bates had a general account with both Modesto and Turner as well as special accounts identified by the ownership of the property upon which Bates constructed particular buildings. As a result, Bates owed money to Modesto and Turner in various capacities. The loan association issued a check payable to Modesto and delivered it to Bates with instruction that it be applied to the account of the materials furnished for the construction of the Wylde house. Bates delivered the check to Modesto and requested that it be credited to his personal account; he treated similar checks issued to Turner in like fashion. The issue confronting the court was whether Modesto and Turner had a duty to apply the proceeds of the checks to the Wylde account instead of the personal account of Bates.
The court initially noted that the general rule is that "where the materialman is furnishing at the same time materials to a contractor for the construction of buildings upon the property of different owners, the materialman may, in the absence of notice of the source of the funds, accept the same from the contractor and apply them upon any agreed account or as specified by law, even if in such case it develops that the contractor has violated his trust while using the funds of A to pay for materials used on the property of B." (Modesto Lumber Co. v. Wylde, supra, 217 Cal. at p. 425.) The court then pointed out that "it seems equally clear that where the materialman does have knowledge of the source and ownership of the funds delivered to him by the contractor, he may not apply them on the account of any other than the true owner, even though the contractor may have consented to their application elsewhere." (At p. 425.) The court recognized that the facts of the case before it differed from both the quoted general rule and the exception in that the materialman had notice that the loan association was financing more than one building and that Bates was "constructing more than one structure being so financed" (at p. 425). Given these circumstances and a check payable directly to it, the court imposed a duty on the materialman to inquire of the loan association as to the proper application of the funds. The court noted (at p. 425) that "The check not being made to the contractor was notice to the materialman that the contractor was without authority to determine finally the application of the funds. The agency conferred upon the contractor by entrusting the check to him was merely that of a messenger." Therefore, the materialmen were required to credit the respective checks received by them to the Wylde building account (at p. 428).
*580 In other fact situations, the recipients of funds have been found to have notice of their intended use or been under a duty to inquire. For example, in Edwards v. Curry (1957) 152 Cal. App.2d 726 [313 P.2d 613], a general contractor agreed with a materialman, who supplied a subcontractor, to make payments to the subcontractor in the form of a check payable jointly to him and the materialman; the court held that a general contractor has no liability as a guarantor (of the materialman's claim against the subcontractor) where the materialman applied part of the check proceeds to another account with the subcontractor. The materialman was charged with knowledge that the general contractor intended the payment to apply to the materials furnished on the project in question. (152 Cal. App.2d at pp. 730-731.)
Westwood Bldg. Materials Co. v. Valdez (1958) 158 Cal. App.2d 107 [322 P.2d 79], involved the issuance by the owner of homes under construction of checks made out jointly to the subcontractor and the materialman; although the checks contained no express indication that they were to pay the subcontractor's indebtedness to the materialman, the court held that the materialman was not free to use the checks as he and the subcontractor might agree (at p. 109). The court stated that the mere fact the checks were payable jointly to the subcontractor and the materialman should have alerted the materialman as to the owner's purpose in issuing the checks; the court thus affirmed the trial court's refusal to foreclose a mechanic's lien for the benefit of the materialman (at p. 113).
Despite the holdings of Modesto Lumber, Edwards, and Westwood that knowledge of the source of funds, or the presence of circumstances suggesting the source, may prevent a materialman from applying these funds to an account other than that intended by the payor, in cases where the owner and general contractor are aware of, and do not object to, the intention of the materialman to apply payments to prior balances due the materialman from the contractor and arising from other projects, the application is effective and the materialman can recover from the contractor and the owner for the materials provided. (Ewing Irrigation Products v. Rohnert Park Golf Course Corp. (1973) 29 Cal. App.3d 862, 868 [105 Cal. Rptr. 812].) A similar result obtains where there is an express agreement. (Petaluma Building Materials, Inc. v. Foremost Properties, Inc. (1960) 180 Cal. App.2d 83 [4 Cal. Rptr. 268].)
Phillips asserts that here there is no evidence that Golden West consented to or was aware of Camille's plan to apply the Mountain View *581 payment to the Cherry Valley project; therefore, Camille was without authority to determine the use of the funds and Phillips was obliged by law to credit its Mountain View account with the payment. Phillips urges that the Modesto Lumber rule be extended so as to prevent an owner-contractor from applying loaned funds to projects covered by different loan agreements. It maintains that where the owner is involved in the reapplication of funds from the lender, the lender needs the protection of the rule since the amount of the construction loan will usually exceed the value of the unimproved land and the lender will thus be looking to the increasing value of the improvements as construction progresses. In light of these factors, Phillips contends that the Modesto Lumber rule should be broadly applied so as to protect the lender.
Phillips' argument in favor of the extension of the Modesto Lumber rule to protect the lender is not compelling. Camille's and Phillips' agreement to apply part of the proceeds of the Golden West loan to the Cherry Valley account did not threaten the security interest of Golden West. A lien arising subsequent to a loan agreement between a lender and an owner providing for installments is subordinate to the lender's interest. (See 3 Witkin, Summary of Cal. Law (8th ed. 1973) Security Transactions in Real Property, §§ 46-50, pp. 1531-1534.) Phillips' argument that the allocation of a payment according to its source is necessary to ensure that there is adequate security to cover the amount of the loan is misapplied to cases like the present. Here nearly all of the payment in question was for work that had been completed on the Mountain View project. The conduct of neither Camille nor Phillips endangered Golden West's position.
The present case reveals an additional reason why it is not necessary to extend the Modesto Lumber rule to cases in which the owner is also the contractor. Here the voucher signed by Phillips and submitted by it to Golden West contains a waiver by Phillips of all rights to liens on the Mountain View project up to the time of the invoice. In addition, Phillips warrants that all labor and materials furnished by others (materialmen) have been fully paid for as of the time of the invoice. This device indicates that the lender is in a good position to take steps to ensure he is protected from threats to his security interest in the owner's property.
In light of this strong position of the lender, there is no reason to create a judicial exception to the provision of Civil Code section 1479 which gives the debtor the power to determine, by indication to the creditor, to *582 which of several obligations owed to the creditor the debtor's performance applies.
We conclude that Phillips is not within the class of persons protected by the Modesto Lumber rule. The concern of the courts in Modesto Lumber and its progeny is with the inability of an owner to protect himself from the misapplication of construction funds and with the injustice of compelling him to pay twice for labor and materials in circumstances where a subcontractor or materialman caused the misapplication. Where the owner, as in the present case, agrees to a particular application of funds, there is no reason for the rule.
Judgment is affirmed.
Feinberg, J., and Brown (I.A.), J.,[*] concurred.
NOTES
[1] At oral argument Phillips conceded that the total sum from the $20,000 check allocated to the Cherry Valley project was $11,500. The exact sum is not significant in view of our holding.
[2] Argonaut asserts that this case was tried below on a dispute as to the application of the proceeds from the $20,000 check. It was only in Phillips' posttrial brief that the argument of the Modesto Lumber rule was advanced.
[*] Assigned by the Chairperson of the Judicial Council.
|
Out of 15 teams in the Western Conference, only six have not made the playoffs in the last two years: the Stars and Blue Jackets in the Pacific and Central Divisions, respectively, and the Flames, Avalanche, Oilers and Wild from the Northwest Division.
In the Eastern Conference, the playoff picture is more competitive as well, with each division sending at least two teams each year to the playoffs, and 11 teams making it at least once in the last two years.
So why is the Northwest Division becoming a joke?
Partly it is because the Canucks are very good. Say what you want about playoff success, but no one can deny that the Canucks are regular-season powerhouses, winning back-to-back Presidents Trophies.
The Canucks were good against other Western teams, but they got a boost in the standings by slapping around their divisional “rivals” with 18-4-2 and 18-5-1 records in 2010-11 and 2011-12 respectively.
The Sedins rack up points against the divisional opponents like crazy, which actually is a bit counterintuitive.
You’d think that after being undressed game after game for years on end that the other teams would have video sessions devoted just on what not to do when playing the Sedins, since normal tactics don’t work against them.
The other side of the coin is that the other four Northwest Division teams are just bad.
The Edmonton Oilers are the brightest light in the division behind the Canucks, led by a whole power-play unit of first overall picks.
Once the kids get a little bit more experience and size, they should be a powerhouse and most likely will make some noise in the playoffs.But to get Hall, Eberle, Nugent-Hopkins, Yakupov and company, the Oilers had to be bad. Really, really bad. Worse-than-Columbus bad.
Like the Blackhawks being horrible, then drafting Toews, Kane and Keith, or the Penguins being a laughingstock and drafting Crosby and Malkin, the Oilers will turn it around. Or if Oilers fans want a more immediate comparison, the Canucks weren’t exactly a great team when they drafted the Sedins.
The Oilers should have been better sooner than this, but the windfall of picks and prospects from trading Pronger and Smyth were squandered, but that is in the past now. The future is bright in Edmonton.
But they are the only Alberta team with a bright future.
The Calgary Flames are a joke. Not good enough to make the playoffs, not bad enough to get into the lottery draft, multiple editions of the Flame’s management seem content to be the Maple Leafs east.
Rather than rebuild a core of aging veterans, the Flames are content to run with Iginla as long as he sells tickets and merchandise, rather than admit that as he nears 40, he can’t carry the team on his back into the playoffs anymore. Remind anyone of Sundin in Toronto?
And by trading draft picks and prospects for yet even more aging veterans in a vain attempt to finish ninth instead of 10th overall, the Calgary farm system is in bad shape.
The end is finally coming in Calgary, but they should have started the process three or four years ago. Now they will be a doormat for a few years after being forced into a proper rebuild.
Now I want to be clear that I have nothing but respect for Minnesota as a state. They have more people playing organized hockey on a per capita basis than any province in Canada. And I don’t rip them for playing boring, trap hockey for years after expansion; you do what you have to do to be competitive.
But the management of their team has made some horrible mistakes. By letting Gaborik walk as a free agent, there went the one true offensive threat the Wild had.
The management tried to rectify it with the extremely hypocritical hundred million dollar deals to Suter and Parise this season, but it’ll take a while to rebuild the roster.
Basically the Wild added a pair of Olympians to a roster that was full of players who have no business being on a playoff team. They’ll need a few years to rid themselves of the dead weight (Heatley in particular), but they also have a ton of good prospects coming up, unlike the Flames.
The Wild will be competitive in a year or two, but right now they are just staying afloat.
The Colorado Avalanche are an interesting case. They had started a rebuild-and-youth movement around the same time as the Oilers, then made the playoffs as recently as 2009-2010, but fell off the map in recent years.
A few puzzling trades and moves led to short-term pain but potential long-term gain, such as trading Craig Anderson to Ottawa, where he currently leads the NHL in most goalie stats, or playing contract hardball with Ryan O’Reilly, the 22-year-old center who led the team in points last season.
Still, led by 20-year-old captain Gabriel Landeskog, the Avs have some impressive youth and should be back challenging for the division crown that Denver fans consider their birthright in the next few years.
But in the near future, the Northwest Division belongs to the Canucks.
None of the other four teams look able to touch the Canucks, who have an impressive 6-0-1 record in seven divisional contests.
But the Oilers or Wild could conceivably scratch and claw their way into the playoffs this year. And we might even see a day when the Oilers, Wild and Avalanche join the Canucks in the playoffs in the same year. |
Kenny Lab
Research Interests
Our research focuses on the analysis of human genetic variation to address fundamental questions in biology, medicine and anthropology. We are interested in detecting patterns of demography in genomic data to inform our inference of human evolution and history, and result in better outcomes for medical genomics. We combine population genetics theory, complex disease mapping, statistical modeling and experimentation to gain a deeper understanding of the landscape of genetic variation in global populations and its impact on function, fitness and adaptation. A detailed description of current projects can be found here. |
Heart (4 am)
by Christos Polydorou
4 am, smoking on the empty street in front of my house, I asked the half empty moon for a sign, and a few quick moments later, I saw a fox cross the street. It still fills me with wonder to see wild animals in cities. Perhaps animals “don’t have souls” being souls themselves, in the flesh. |
Q:
Removing "\n" from a string depending on certain cases
I have this string that I build using the outputs of various functions which each return strings:
[resource_name,
duration,
project_name,
total_hours,
details,
booker,
user_details].join("\n")
Each of these functions return a string of information which, as a whole, builds a notification message. What I'm struggling to implement is each string is joined by a new line character, but sometimes the functions return an empty string, because the information isn't specified. For example if no project_name is specified, the string will be empty.
How do I make that whole line be deleted, rather than having an empty string followed by a new-line?, because that doesn't look presentable.
A:
You might try to prepare the array just before performing the join. Consider following code:
[resource_name,
duration,
project_name,
total_hours,
details,
booker,
user_details].compact
.reject { |s| s.empty? }
.join("\n")
Here I used compact method, to remove all nil elements from the array (if you are 100% sure there are no nil's, you can omit that one). The next step is to remove, or reject all empty? strings (please note, empty? is a method on string).
Good Luck!
|
<?xml version="1.0"?>
<ZopeData>
<record id="1" aka="AAAAAAAAAAE=">
<pickle>
<global name="Category Membership Divergence Tester" module="erp5.portal_type"/>
</pickle>
<pickle>
<dictionary>
<item>
<key> <string>id</string> </key>
<value> <string>source_payment_tester</string> </value>
</item>
<item>
<key> <string>portal_type</string> </key>
<value> <string>Category Membership Divergence Tester</string> </value>
</item>
<item>
<key> <string>tested_property</string> </key>
<value>
<tuple>
<string>source_payment</string>
</tuple>
</value>
</item>
<item>
<key> <string>title</string> </key>
<value> <string>source_payment divergence tester</string> </value>
</item>
<item>
<key> <string>workflow_history</string> </key>
<value>
<persistent> <string encoding="base64">AAAAAAAAAAI=</string> </persistent>
</value>
</item>
</dictionary>
</pickle>
</record>
<record id="2" aka="AAAAAAAAAAI=">
<pickle>
<global name="PersistentMapping" module="Persistence.mapping"/>
</pickle>
<pickle>
<dictionary>
<item>
<key> <string>data</string> </key>
<value>
<dictionary>
<item>
<key> <string>edit_workflow</string> </key>
<value>
<persistent> <string encoding="base64">AAAAAAAAAAM=</string> </persistent>
</value>
</item>
</dictionary>
</value>
</item>
</dictionary>
</pickle>
</record>
<record id="3" aka="AAAAAAAAAAM=">
<pickle>
<global name="WorkflowHistoryList" module="Products.ERP5Type.Workflow"/>
</pickle>
<pickle>
<dictionary>
<item>
<key> <string>_log</string> </key>
<value>
<list>
<dictionary>
<item>
<key> <string>action</string> </key>
<value> <string>edit</string> </value>
</item>
<item>
<key> <string>actor</string> </key>
<value> <string>zope</string> </value>
</item>
<item>
<key> <string>comment</string> </key>
<value> <string></string> </value>
</item>
<item>
<key> <string>error_message</string> </key>
<value> <string></string> </value>
</item>
<item>
<key> <string>serial</string> </key>
<value> <string>0.0.0.0</string> </value>
</item>
<item>
<key> <string>state</string> </key>
<value> <string>current</string> </value>
</item>
<item>
<key> <string>time</string> </key>
<value>
<object>
<klass>
<global name="DateTime" module="DateTime.DateTime"/>
</klass>
<tuple>
<none/>
</tuple>
<state>
<tuple>
<float>1300726605.03</float>
<string>GMT-3</string>
</tuple>
</state>
</object>
</value>
</item>
</dictionary>
</list>
</value>
</item>
</dictionary>
</pickle>
</record>
</ZopeData>
|
DSM-III, DSM-IV and ICD-10 as severity scales for drug dependence.
The construct of illness severity serves many scientific and clinical functions. This study tested the performance as severity scales of three systems for diagnosing drug dependence--DSM-III, DSM-IV and ICD-10--in a multisite regional sample of 370 clinical subjects. Both lifetime and current severity of four drug problems--alcohol, cannabis, cocaine and opiate dependence--was studied in three stages: (a) item difficulty and internal consistency analysis; (b) probabilistic modeling of distribution behavior; and (c) concurrent validation against a set of independent measures. All three systems, for most drugs correlated with most test variables, had good to excellent concurrent validity. Unexpectedly, DSM-III showed in some instances better item behavior, composite score behavior and concurrent validity than the other systems, though DSM-IV and ICD-10 are based on slimmer generic algorithms, and may represent a good balance between simplicity and concurrent validity. Results suggest that the design of future diagnostic algorithms start at the item level and strive for moderate levels of both internal consistency and difficulty. Composite score distributions can then be modeled in field research, and necessary item corrections can be made before the algorithm is widely promulgated. |
Tech rolls in Champs Sports Bowl
Ball threw two touchdown passes, ran for another score and led the Yellow Jackets to a 51-14 victory over Syracuse in the Champs Sports Bowl on Tuesday night.
Gailey has been critical of his sophomore quarterback all season, and he reiterated this week that Ball will have to win back the starting job next spring.
Ball certainly stated his case against the Orange, finishing 12-of-19 for 207 yards with an interception, and had 38 yards rushing.
''I just let loose,'' Ball said. ''I wasn't worried about proving anything. I know what I can do. I know what kind of leader I am.''
Ball also got plenty of help.
P.J. Daniels ran 17 times for 119 yards and two scores, Calvin Johnson set a school record for touchdowns by a freshman with his seventh, and the defense set the tone by returning an interception for a touchdown on the second play of the game. The unit added a safety with 1:42 to play.
Even special teams played a role, blocking a punt in the first quarter that the Yellow Jackets (7-5) converted into a touchdown.
The loss was the worst in a bowl game for Syracuse (6-6) since the 1953 Orange Bowl, a 61-6 drubbing by Alabama. It also means more questions about the future of embattled coach Paul Pasqualoni.
Syracuse chancellor Nancy Cantor gave Pasqualoni a vote of confidence earlier this month, saying he would be retained for a 15th season. But the school also named longtime Southern California administrator Daryl Gross the new athletic director last week.
Gross dispelled rumors that he was already thinking about a replacement. However, he also said he would evaluate the athletic department after he completes his move in late January.
Syracuse was making its first postseason appearance since beating Kansas State in the Insight Bowl to finish the 2001 season with a 10-3 record and No. 14 ranking. That improved Pasqualoni's career bowl record to 6-2.
Since then, the Orange have struggled to break even. They had to win three of their last four regular-season games to become bowl eligible this year.
Georgia Tech's dominance Tuesday certainly won't help Pasqualoni.
Chris Reis intercepted Perry Patterson's first pass and returned it 20 yards for a touchdown.
''From the first pass of the game, things seemed to go against us,'' Pasqualoni said. ''It was just one of those days where nothing we did went well.''
Syracuse looked to even the game when Patterson scored from 21 yards out, but Collin Barber pushed the extra point attempt wide right.
Georgia Tech then scored touchdowns on three consecutive possessions to pretty much put the game away before halftime.
''We punched them in the mouth, but they punched right back,'' Syracuse safety Diamond Ferri said. ''They deserved to win.''
Ball found Johnson for a 10-yard score to make it 14-6. After getting the ball back, Ball rolled right and found Nate Curry down the sideline for an 80-yard touchdown - the longest play of the season for the Yellow Jackets and the longest pass of Ball's career.
''He went out and performed extremely well, especially early in the ball game,'' Gailey said. ''He's had a lot of criticism this year and suffered through a lot of adversity. I'm happy for him.''
Syracuse went three-and-out on the ensuing possession, and Xavier McGuire blocked the punt to give his team the ball at the 14.
Ball completed a third-down pass to the 2, and Daniels took it in from there.
Johnson burned cornerback Tanard Jackson and made a spectacular 51-yard catch over Ferri. He scored six plays later on an end around from the 5-yard line. The Yellow Jackets led 35-6 at halftime, and Ball's 11-yard TD scamper made it 42-6 with 3:48 to play in third quarter.
He was done for the night.
So was Syracuse running back Walter Reyes. He sat out the second half after re-injuring his right shoulder.
Reyes, the second-leading rusher in school history, was hurt following an 18-yard reception early in the second quarter. He was forced out of bounds and landed awkwardly after vaulting an aluminum bench on the Georgia Tech sideline.
Besides his catch, Reyes also had 3 yards on five carries.
Reyes missed the previous two games after tearing three muscles behind his right shoulder on a vicious hit in Syracuse's double-overtime win over Pittsburgh on Nov. 6. |
Introduction
============
A two-dimensional periodic lattice of holes in a slab of material with a high refractive index, i.e., a photonic crystal slab (PCS), can exhibit a great number of fascinating optical phenomena^[@bib1],\ [@bib2],\ [@bib3],\ [@bib4]^. Some of these effects, which are intimately related to the in-plane periodicity of the photonic crystal, have been judiciously exploited to develop integrated photonic circuits^[@bib5]^, enhance light-matter interactions^[@bib6]^, create lasers with a lower threshold^[@bib7]^ or superior far-fields^[@bib8]^, design optical detectors with higher performance^[@bib9],\ [@bib10],\ [@bib11]^ and even efficiently convert the frequency of light^[@bib12]^. In the past, PCSs were often approximated as 2D photonic crystals in an effective index material, which is a useful model to describe the optical properties originating from the in-plane periodicity of a photonic crystal^[@bib13]^. The problem with this model is that it completely ignores interference effects between the out-of-plane interfaces. Finite difference time domain (FDTD) simulations are able and frequently used to calculate the exact field distribution in PCSs but are time consuming and provide little insight. For these reasons, the existence of bound states in the radiation continuum (BICs) has been reported only recently, even though photonic crystal slabs have been subject to research for more than a decade. BICs have been demonstrated in photonic crystals first at the Γ-point, where the BIC originates from geometric symmetry^[@bib14]^. Analogous phenomena, where a photonic bound state is decoupled from the continuum by symmetry, were reported earlier in other photonic structures, e.g., distributed feedback lasers and waveguide arrays^[@bib15],\ [@bib16]^. More recently, another type of BIC has been reported in PCSs, where the BICs are the result of accidental phase matching between in-plane and surface coupling waves at special points in the photonic band structure^[@bib17],\ [@bib18],\ [@bib19]^. These off-Γ BICs exist at seemingly random wave vectors. Hence, the analysis of off-Γ BICs requires a model that includes not only geometric symmetry and in-plane coupling but also coupling via the continuum.
In this paper, we demonstrate direct measurements of BICs using a photodetector embedded into a PCS. We propose a 3D rigorous coupled wave analysis (RCWA)^[@bib20]^ to analyze BICs and compare the theoretical results with the measured photonic band structure. This measurement technique allows us to directly measure the field intensity inside the PCS without an elaborate external optical setup. For the first time, this paper demonstrates an opto-electronic device that can directly measure optical bound states in the continuum. We discuss the fabrication of our PCS detector in the second section of this paper and explain the experimental setup. We compare the experimental measurements of the PCS band structures to those obtained using the 3D RCWA.
The photonic band structure of PCSs is far more complex than a 2D photonic crystal band structure. PCSs support higher order slab modes, which can couple to each other if they have some component of the same symmetry. To provide an intuitive understanding of the photonic band structure, we implemented a 2D plane wave model specifically designed for PCSs^[@bib21],\ [@bib22]^, which allows the analysis of mode symmetry and polarization mixing. In the third section of this paper, we describe polarization mixing in the photonic band structure. Finally, we report on the first direct measurement of a BIC using an embedded photodetector and provide a model for the detector response at the BIC based on temporal coupled mode theory.
Materials and methods
=====================
Our PCS detectors are processed from an active photodetector material, consisting of a series of GaAs quantum wells separated by AlGaAs barriers. This type of photodetector is called a Quantum Well Infrared Photodetector (QWIP)^[@bib23],\ [@bib24]^. Band structure engineering allows precise control of the peak absorption wavelength and absorption magnitude. The GaAs/AlGaAs heterostructure of the QWIP is grown by molecular beam epitaxy on a semi-insulating GaAs substrate. First, a 2-μm-thick Al~0.85~Ga~0.15~As sacrificial layer is grown. Later, this layer is selectively etched to obtain a free standing slab that confines the modes vertically. The QWIP consists of 26 periods of 4.5-nm-thick GaAs quantum wells separated by 45-nm-thick Al~0.3~Ga~0.7~As barriers. The quantum wells are doped (σ=4 × 10^11^ cm^−2^) to supply carriers for the absorption process. Electrical contacts are formed by a 350-nm-bottom and 100-nm-top doped contact layer. The total thickness of the slab consisting of the quantum well heterostructure and both contact layers is 2 μm. This thickness is required to provide sufficient mechanical strength of the membrane. The design wavelength for the peak absorption of the QWIP is 8 μm.
Fabrication of the device starts with reactive ion etching of the photonic crystal holes through the slab into the sacrificial layer. The mesa for the device is chemically etched in a solution of H~3~PO~4~:H~2~O~2~:H~2~O=3:2:40. Top and bottom contact layers are electrically insulated with a 400-nm-thick Si~3~N~4~ layer deposited by plasma-enhanced chemical vapor deposition. To provide electrical contacts, windows are opened into the Si~3~N~4~ isolation by reactive ion etching and Ge/Au/Ni/Au metal contacts are deposited by electron beam evaporation. The sample is annealed at 430 °C to form ohmic contacts. The last processing step is selective under-etching of the slab with HCl (32%) to remove the sacrificial layer below the photonic crystal. [Figure 1a](#fig1){ref-type="fig"} shows a scanning electron microscope (SEM) image of a finished device (left) compared with a schematic sketch (right). Mechanical stress accumulated during the epitaxial growth limits the size of the photonic crystal to approximately 100 × 100 μm. Larger membranes tend to collapse during fabrication.
[Figure 1b](#fig1){ref-type="fig"} shows the measurement setup for the PCS photodetector. Spectral characterization of the device is performed using Fourier transform infrared spectroscopy (FTIR). Inside the FTIR, a Globar source emits broadband radiation in the mid-infrared. The light is focused onto the sample using a ZnSe lens with a 2" focal length. To narrow the incidence angle of illumination onto the sample, an 8 mm aperture is placed in front of the lens. The resulting opening angle is approximately 4°. The sample is mounted inside a liquid He cryostat to operate the photodetector at 30 K, which minimizes electrical noise through thermal carrier excitation^[@bib24]^. After pre-amplification, the photocurrent from the sample is fed back into the FTIR to calculate the spectral response of the device.
The design of the device is similar to that of resonant photodetectors, but with a significantly higher doping concentration. A QWIP fabricated as a photonic crystal resonant photodetector would typically be doped two orders of magnitude lower^[@bib10]^. In resonant photodetectors, the absorption coefficient is kept sufficiently low to achieve large resonant absorption enhancement and high performance gain^[@bib25]^. In contrast, to accurately measure BICs, the doping concentration is tailored to be high enough that quantum well absorption is the dominating loss mechanism in the system. This point will be discussed in detail below. Because BICs arise from symmetry and phase matching, their existence is less dependent on in-plane losses.
The existence of BICs requires a structure with time-reversal symmetry *ε(r)=ε\*(r)* and inversion symmetry *ε(r)=ε(-r)*^[@bib17]^. We choose a photonic crystal slab with a hexagonal lattice, which fulfills these requirements^[@bib26]^. The lattice constant *a* of the photonic crystal is chosen to be 3.2 μm, with the hole radius *r* being 0.2*a*.
The photonic band structure is measured by means of a band structure mapping^[@bib27],\ [@bib28],\ [@bib29]^. Starting with the Γ-K direction, the device is rotated around the *y*-axis from 0° up to 70° in steps of 5°. At each step, a spectrum for *s*- and *p*-polarized light is measured. To also obtain the photonic band structure for Γ-M, the sample is then rotated by 90° around the *z*-axis. [Figure 2](#fig2){ref-type="fig"} shows examples of measured spectra. For reference, a spectrum of a standard mesa QWIP device without a photonic crystal is included ([Figure 2](#fig2){ref-type="fig"}, 1st spectrum). In the spectra of the PCS device, several sharp peaks appear at the photonic crystal resonances ([Figure 2](#fig2){ref-type="fig"}, 2nd spectrum). For surface normal incidence at the Γ-point, the *s*- and *p*-polarized spectra are degenerate. For any other angle, the resonance peaks for *s*- and *p*-polarized light are non-degenerate ([Figure 2](#fig2){ref-type="fig"}, 3rd and 4th spectrum).
The measured spectra obtained from sample rotation are combined into a two-dimensional color plot, immediately showing the photonic band structure of the PCS ([Figure 3a](#fig3){ref-type="fig"}). For comparison, the band structure has been simulated via rigorous coupled wave analysis (RCWA) using the freely available S4 software^[@bib20]^. The quantum well heterostructure is approximated as a homogenous and frequency independent medium, with a real part of the refractive index of *n*=3.12. Due to inter-sub-band selection rules, QWIPs absorb only photons polarized perpendicular to the quantum wells^[@bib30]^. Therefore, the absorption was modeled with an anisotropic imaginary permittivity. To simplify the simulation, it was set as constant over frequency to *ε*~*i*~=0.05 in the *z*-direction, which corresponds to an average value for the bound-to-continuum transition at higher frequencies. The RCWA simulation results in a transmission and a reflection spectrum. The absorptivity of the PCS is calculated as 1-R-T. The simulated absorption spectra are combined into the photonic band structure in the same fashion as the measured spectra ([Figure 3b](#fig3){ref-type="fig"}). A comparison between the measured and simulated band structure shows excellent agreement between the fabricated device and the simulated structure.
In an ideal PCS, the quality factor of the resonance peaks can theoretically go to infinity. However, in real devices, the resonance width is limited by various losses. The total *Q*-factor of the resonator can be written as
where *Q*~V~ is a measure of the coupling efficiency to incident light. In an ideal PCS without material absorption and an infinite lateral size, *Q*~V~ is equal to *Q*~total~. *Q*~H~ is the *Q*-factor derived from the horizontal in-plane losses due to the finite lateral extension of the PCS. *Q*~M~ represents the material losses, which in our case are dominated by the inter-sub-band absorption of the photodetector. The vertical *Q*-factor ranges from approximately 200 for resonances that couple efficiently to external fields and goes to infinity for resonances that do not couple at all. The horizontal *Q*-factor is limited by the finite size of the PCS. For the lateral device with dimensions of 100 × 100 μm, our PCS has 31 periods. From two-dimensional FDTD simulations, we determined that *Q*~H~ was well above 2000 for all resonances.
For light with constant intensity (i.e., no standing waves) in a homogenous material, the material quality factor is given by *Q*~M~*=Re*{*n*}/(2*Im*{*n*})^[@bib31]^. The complex refractive index is related to the absorption by *α*=4*πIm*{*n*}/*λ*. At the photocurrent maximum of the QWIP, the peak absorption is approximately 1350 cm^−1^ for the provided doping^[@bib24]^. At the absorption maximum at *λ*=8 μm, the material *Q*-factor is *Q*~M~ =20. The photonic crystal resonances are measured at higher frequencies, where the QWIP absorption is significantly lower. However, in the photonic crystal resonator, the electromagnetic field forms standing waves and the material is not homogenous. Furthermore, the absorption is non-zero only for an electric field in the growth direction. As a result, the effective absorption is given by
where *V*~abs~ is the volume of the absorbing material and *V* is the total volume^[@bib28]^.
The in-plane photonic crystal mode profile and the vertical slab mode profile have great impact on the effective absorption. Modes that are localized mainly inside the holes have less overlap with the absorbing material. Modes, which are close to their respective cut-off frequency of the slab waveguide, exhibit large field components along the non-pure transverse-electric/transverse-magnetic (TE/TM) directions. For TM-like modes, the effective absorption is reduced by 50-70%. For TE-like modes, which only have a small electric field component in the *z*-direction, the effective absorption is reduced to less than 1%. Owing to the small effective absorption for TE-like modes, the measured photonic band structure shows mainly TM-like modes. This effect helps greatly to identify the measured resonances when comparing to simulations.
Near the absorption maximum of the photodetector, the measured *Q*-factor is dominated by the material *Q*-factor. At higher frequencies, the material absorption is smaller and all *Q*-factors are in the same order of magnitude. Therefore, the measured *Q*-factor near the absorption maximum is approximately 100 and goes up to 500 at higher frequencies.
Results and discussion
======================
The photonic band structure of PCSs is complex compared with a purely 2D photonic crystal. Accidental phase matching between out-of-plane and in-plane waves gives rise to BICs. PCSs support higher order slab modes, which can couple to each other. This leads to polarization mixing and causes distortions of the photonic bands. Especially at frequencies at which modes from multiple slab orders overlap, the band structure is strongly distorted by polarization mixing and difficult to understand. To provide an intuitive understanding of the photonic band structure, we have computed the PCS photonic band structure using the revised plane wave expansion method (RPWEM)^[@bib21],\ [@bib22]^. This method accounts for the slab wave guiding by using an effective refractive index^[@bib13]^. However, it does not include 3D effects such as BICs and polarization mixing. Comparison of the RCWA and RPWEM simulated band structures allows the identification of BICs and polarization mixing throughout the entire photonic band structure.
The photonic band structure depends on the vertical mode profile in the slab. A separate photonic band structure exists for each slab mode. The confinement in the *z*-direction induces a blue-shift of the photonic crystal modes. Compared with the fundamental mode, the confinement of higher order modes is weaker and the blue-shift is stronger^[@bib32]^. In our structure, only the fundamental 0th order modes and the 1st order modes overlap in frequency with our photodetector absorption. [Figure 4](#fig4){ref-type="fig"} compares the TE- and TM-like bands for the 0th order and 1st order slab mode. The photonic bands of the 1st order slab mode are blue-shifted to higher frequencies with respect to the 0th order band structure.
Interactions between bands from different slab modes result in the formation of anti-crossings^[@bib27]^. Owing to the large number of additional bands originating from higher order slab modes and subsequent polarization mixing, the real photonic band structure is strongly distorted when compared with a 2D photonic crystal band structure without vertical confinement. The out-of-plane symmetry (along the *z*-axis) of the electromagnetic field in the PCS determines if polarization mixing occurs. Modes with even symmetry do not interact with odd symmetry modes^[@bib33]^. Therefore, the symmetric TM-like slab modes do not interact with the anti-symmetric TM modes. The same argument applies for the TE-like modes. However, symmetric TM-like modes have the same vertical symmetry as anti-symmetric TE-like modes, and polarization mixing between these modes is possible.
In [Figure 5a](#fig5){ref-type="fig"}, an anti-crossing in the *p*-polarized measured band structure is indicated by a shaded box. [Figure 5b](#fig5){ref-type="fig"} shows a close-up view of the shaded area. The gray lines are the results of the RCWA simulation and the green squares indicate the position of the measured resonance peaks. Comparison with the RPWEM simulation ([Figure 5c](#fig5){ref-type="fig"}) identifies the anti-crossing as an interaction between a 0th order TM-like mode (solid blue line) and a 1st order TE-like mode (solid orange line).
BICs were first observed in electronic superlattices^[@bib34]^ and recently also in photonic crystals^[@bib17],\ [@bib18],\ [@bib19],\ [@bib35]^. BICs in photonic crystals are the result of destructive interference between photonic crystal modes. The PCS modes can be coupled through in-plane wave propagation (non-radiative modes) or via the continuum within near fields (radiative modes). The BIC is formed when the radiation from all possible channels interferes destructively, causing the overall radiation to vanish.
BICs can be modeled using coupled wave theory, as described by Yang et al.^[@bib19]^. To understand the formation of BICs, we need to identify the dominant radiation channels. From Bloch's theorem, we know that all PCS modes are Bloch wave states. We can express the Bloch wave state as a Fourier series of plane waves, which are referred to as basic waves^[@bib36]^. [Figure 6a](#fig6){ref-type="fig"} illustrates the propagation of basic waves in the PCS and the coupling to the incident light via radiative modes.
We can develop an intuitive picture of BIC formation by considering only the basic waves close to the second-order Γ point, as shown in [Figure 6b](#fig6){ref-type="fig"}. We assume that the radiation from these Γ~2~ waves is the dominant contribution to the total radiation^[@bib37]^. This approximation works best for structures with low index contrast. In the Γ-K direction, all radiative contributions cancel out because of symmetry. This is not the case for the Γ-M direction. These components cancel out through destructive interference of basic waves via coupling to radiative modes, which happens as a result of accidental phase matching^[@bib19]^. These conditions can be fulfilled at many points in the photonic band structure.
Previous measurements of BICs were dependent on reflection measurements. In our device, we can directly measure the intensity inside the photonic crystal using the embedded photodetector. Because *Q*~V~ becomes very large at these points we cannot simply extract it from the measured resonance width. When the wavelength of the incident light is close to that of BICs, *Q*~total~ is always dominated by *Q*~M~, i.e., the absorption of the photodetector. Instead, we measure the change in photocurrent, which is directly related to *Q*~V~ because of the decrease in in-coupling efficiency.
The relation between absorption and the vertical *Q*-factor can be deduced using temporal coupled mode theory (TCMT)^[@bib38]^. [Figure 7](#fig7){ref-type="fig"} shows a simplified model, in which the PCS is modeled as a resonance *A* with lifetimes *τ*~1~ and *τ*~2~ for coupling from top and bottom. Together, these two lifetimes compose the vertical lifetime *τ*~1~=*τ*~2~=2*τ*~V~. The *Q*-factor is related to *τ* by *Q*=*ωτ*/2.
The material absorption and in-plane loss channels are added to the resonance through the lifetimes *τ*~M~ and *τ*~H~, respectively. The substrate at the distance *h*~2~ is represented by a reflection coefficient *r*~23~. Light in the air gap between the PCS and substrate propagates with the propagation constant *β*~2~. *r*~slab~ and *t*~slab~ are the complex reflection and transmission coefficients of the slab, respectively. The absorption is modeled as the transmission from the incoming light channel *S*~1+~ to the material loss channel *S*~M~. For the photodetector, this corresponds to the absorption quantum efficiency *η*:
To study changes in the vertical *Q*-factor in the presence of an absorber at the BIC, we consider the case *Q*~V~\>\>*Q*~M~, which is equivalent to *τ*~1,2~\>\>*τ*~M~. In this limit, the dominating term in the denominator of Equation [(3)](#equ3){ref-type="disp-formula"} is 2/*τ*~M~. For constant absorption, the photocurrent amplitude is then determined by the terms 2/*τ*~1~ and 2/*τ*~2~ in the numerator. With the photoconductive gain *g*~*ph*~, the measured photocurrent is related to the incident photon flux *ϕ* by^[@bib24]^
and from this, we obtain
Hence, the photocurrent is inversely proportional to the vertical *Q*-factor.
The measured photonic band structure shows several occurrences of BICs where the photocurrent goes to zero when moving along the band. [Figure 8a](#fig8){ref-type="fig"} shows the measured photonic band structure in the Γ-K direction for *s*-polarized light. The shaded area denotes a photonic band with a BIC. This photonic band is relatively flat, which means that the absorption of the photodetector and therefore the material *Q*-factor *Q*~M~ remains constant over the entire range of *k*-vectors.
The peaks of the measured photonic band overlap well with the simulated photonic band structure ([Figure 8b](#fig8){ref-type="fig"}). At the center of the photonic band, the photocurrent vanishes, indicating a BIC. The inverse of the measured photocurrent 1/*I*~*ph*~ is in excellent agreement with the vertical *Q*-factor *Q*~V~ predicted by the TCMT ([Figure 8c](#fig8){ref-type="fig"}). Because the substrate in our device breaks the vertical symmetry of the structure, the vertical *Q*-factor remains finite (solid line), as opposed to a perfectly symmetric structure (dashed line)^[@bib35]^. However, *Q*~V~ still exceeds 10^4^, which is sufficiently high to observe a vanishing photocurrent at the BIC. The deviation of the measured photocurrent from the simulation at high measurement angles near the light cone is caused by the cryostat window, which cuts off a fraction of the incident light.
Conclusions
===========
We designed and fabricated a photonic crystal slab with an embedded QWIP photodetector. This technique allows us to directly measure the light intensity inside the structure and calculate the photonic band structure from measured photocurrent spectra. Comparison of the RCWA and RPWEM provided us with an intuitive understanding of the photonic band structure. Our RCWA simulation accurately describes BICs and polarization mixing. We reported the first direct measurement of a BIC in an opto-electronic device and provided a model for the detector response at the BIC based on temporal coupled mode theory.
In addition to the fundamental aspect of the effects described in this paper, the ability to directly measure the field intensity inside a PCS represents an important milestone in the development of integrated opto-electronic devices using BICs, particularly for compact resonant sensing devices, in which a resonator is used to enhance the sensitivity. Such systems are found, e.g., in laser spectroscopy and environmental monitoring^[@bib39]^. These systems depend on low intrinsic absorption losses, which makes it unfeasible to embed the detector directly into the resonator. Sensors based on BIC photodetectors could open up a new class of compact sensing devices. Such devices would benefit from the extremely high *Q*-factor at the BIC, which is a result of phase matching and symmetry. Anything breaking the symmetry would be registered as a huge signal increase by the photodetector. Such a device could be used as a highly sensitive integrated particle detector for environmental sensing.
Future experiments could explore the effects of BICs coupled with photonic crystal defects such as waveguides and cavities. With the ability to measure the field intensity in a photonic crystal slab, our device is well suited to study these systems. Future research could also focus on lasers, nonlinear optics and optics-mechanics based on BICs.
The authors are grateful to N Engheta and YI Sohn for inspiring discussions. This research was supported by the Austrian Science Funds (FWF): F 4909-N23 (Next Lite), the PLATON project 35N within the Austrian NANO Initiative and the 'Gesellschaft für Mikro- und Nanoelektronik' GMe. PG gratefully acknowledges partial financial support from the European Research Council under the European Union's Horizon 2020 research and innovation program (Grant Agreement No. 639109).
The authors declare no conflict of interest.
{#fig1}
{#fig2}
{#fig3}
{#fig4}
{#fig5}
{#fig6}
{#fig7}
{#fig8}
[^1]: These authors contributed equally to this work.
|
Cohesion between sister chromatids must be established during DNA replication.
Cohesion between sister chromatids, which opposes the splitting force exerted by the mitotic spindle during metaphase, is essential for their segregation to opposite poles of the cell during anaphase. In Saccharomyces cerevisiae, cohesion depends on a set of chromosomal proteins called cohesins, which include structural maintenance of chromosomes 1p (Smc1p), Smc3p and sister chromatid cohesion 1p (Scc1p). Strains with mutations in the genes encoding these proteins separate sister chromatids prematurely and fail to align them in metaphase. This leads to missegregation of chromosomes in the following anaphase. In a normal cell cycle, Scc1p was synthesized and recruited to chromosomes at the onset of S phase. Using cells that expressed Scc1p exclusively from a galactose-inducible promoter, we showed that if Scc1p was synthesised only after completion of S phase, it still bound to chromosomes but failed to promote sister chromatid cohesion. Cohesion between sister chromatids must be established during DNA replication, possibly following the passage of a replication fork. Furthermore, Scc1p (and other cohesins) are needed both for maintaining cohesion during mitosis and for establishing it during S phase. Establishment of sister chromatid cohesion is therefore an essential but hitherto neglected aspect of S phase. |
"Attention!" "DEVILS ON THE DOORSTEP" "Left!" "Forward!" "Little Thresher!" "Er Bozi!" "Er Bozi!" "Sensei!" "Have you all been good?" "Have some candy." "Good boys!" "Watch this." "Which hand?" "Smart kid." "Try again." "Which hand?" "No." "This one!" "Clean water, no dirty water." "One, two, three." "Or I'll knock your block off." "Understand?" "Yes." "You'll have clean water tonight." "1945, NORTH CHINA THE JAPANESE OCCUPATION" " Let me look at you." " What for?" "Please, let me look!" "At what?" "No!" "Come on!" "Be quick" "Don't stop!" " Who's there?" " Me" " Who?" " Me" " Hurry!" " What'll you do?" "The usual" " Who is it?" " Me" "Close your eyes" "Name" "Dasan Ma" "What's this village called?" "Rack-Armor Terrace" "What are you doing up so late?" "Thinking" "Well, think away" "Listen to me" "I'm leaving two things with you" "I want them both back." "Both" "Don't let the Jap devils find out" "Any slipup and you're a dead man" "But they've got a blockhouse here" "It could be hard" "It'll be all right" ""The darkest place is under the candlestick."" " Understand?" " Yes" "If there's trouble, who's responsible?" "You" "Who was it?" "Don't know" "It's alive!" "I'll tell that guy!" "Dasan Ma!" "Listen." "In your spare time, interrogate them" "We'll collect them on New Year's Eve together with their statements" "Understand?" "Yes" "Who'll collect them?" "Me!" "It was like this" "Just like this!" "Then he jumped the wall and ran off" "So what was his name?" "Didn't say." "called himself "me."" "So, what'd he look like?" "Don't know." "My eyes were closed" "How about his clothes?" "Was he tall?" "With your eyes closed, can you see me?" "How many were there?" "I didn't dare open my eyes!" "So what exactly did he say?" "He said he'd leave 'em here till New Year's Eve when he'd come for 'em" "He sounded really fierce" "He said, "The darkest place is under the candlestick."" "I'll kill you, turtle-fucker!" "You can talk family business later" "Dasan's been with your son's widow for some time" "We have to talk" "With these good-for-nothings?" "Go to bed!" "Dad, have some water" "Don't call me dad." "Shameless slut" "A father-in-law can't talk this way" "Go for me, then!" "I'm fed up with you!" " I'll kill you, turtle-fucker!" " cut it out!" "Good fortune is having no troubles, but misfortune can't be avoided" "Well, is it fortune or misfortune?" "What should we do?" "Take 'em to the blockhouse." "I'm in with their chief" " What?" " Hand 'em over" "That's no good." "What'll I say?" "when that guy comes back for 'em?" "Tell him to see the Japs." "What would he dare do?" "You kidding?" "This guy ties up Japs in sacks!" "What wouldn't he dare do?" " What are you?" "A collaborator?" " Seems like it!" "I'll throttle one with each hand and then we'll bury 'em!" "That's it!" "We'll just dig a hole." "I'll do that" "You would?" "But that guy said if anything happens to 'em or if the Japs find out we'd be killed!" " Killed?" " Who'd be killed?" "He said he'd kill everyone in the village" "Nothing" " What?" " What?" "Forget it" "Speak" "I thought we could run away and leave the sacks here." "What could he do to us?" "Sit down!" "You made me say it" "If we all have to die anyway, why don't I just kill you?" "Stop it!" "If you don't, I'm going come back" "Sit down" "It's unheard of." "He's threatening us all?" "I'll throttle 'em, and we'll bury 'em" "Bury 'em" "No good will come from this" "Such deeds are not the work of idle men" "Provoke neither those who dwell in the hills nor those who come from the sea" "New Year's Eve is five days away." "On that day they'll come" "Steal away with them and disaster will be averted" "San" "For the sake of the village, act with care these next few days" " Er Bozi." " Yes, Old Uncle?" "Don't tell your mother about this" "She's got a big mouth" "I'll keep it to myself, all right?" "All right." "We can go home" "Wait!" "There's something else" "That guy said we should interrogate them" "Interrogate them?" "About what?" "Sensei!" "Have some candy" "Boy good!" "Have another" "Er Bozi, come here!" "coming." "Sensei" "Late no good" "If you're late once more one, two, three" "I'll knock your block off!" "Understand?" "Now, go away!" "ORAL STATEM ENT" "Name?" "Speak" "Go on" "Name?" "Speak" "Don't kill us" "DON'T KI LL US" " First tell me your name." " Hanchen Dong" " Age?" " 2 8" " Occupation?" " Translation official" "What sort of official is that?" "I turn Japanese into Chinese and Chinese into Japanese" "So... what's his name?" "Kosaburo Hanaya" "Have him tell us himself" "Shoot me." "Kill me." "If you've got the guts." "Cowards" "How come his name's so long?" "Come on, we don't want to be killed" "We don't understand." "Turn it into Chinese" "H is name's Kosaburo Hanaya." "He's 2 5" "Has he killed Chinese men?" "Violated Chinese women?" "Have you killed Chinese men?" "Raped Chinese women?" "Of course." "That's what I came to China for!" "He's new to china." "Hasn't seen any women yet" "He's killed no one." "He's a cook" "What's all this talk?" "They kill me now or I'll kill them." "Why are you doing this?" "I want to anger these cowards." "I won't cooperate with swine!" "Will you two stop chattering?" "Speak slower" "Wait for the questions" "He begs you not to kill him" "What else?" "could you ask him who was that me, person?" "Who was me,?" "Listen" "I want you to tell me who is "me"?" "You?" "Now I'm stumped" "How would I know who you are?" "Not me." "The me, who nabbed you" "Just tell us who brought you here" "If we knew, we wouldn't have let him get us" "You mean you don't know either?" "Where are we anyway?" "Who's interrogating whom." "Stick to the questions" "Just do it" "He begs you not to kill him" "Don't be afraid." "Listen" "I'll read it back to you" "Don't kill us" "Hanchen Dong." "Chinese 2 8." "Translation official" "Don't know" "Kosaburo Hanaya. 2 5" "Japanese" "Just arrived in china." "Hasn't killed anyone cook." "Don't kill me.," "Is that correct?" "Is it?" "More or less" "Well then do what must be done" "Hold on!" "I've got more to say!" "Kill me!" "I'm not afraid to die!" "It's a small unit!" "There are five machine guns!" "You can kill us, but never insult us!" "They have nine telephones, two radio sets " "I'll never surrender!" "Or betray the motherland!" "An ammunition depot!" "We'll be victorious!" "Long live the emperor!" " And 1 4 horses!" " Shoot me!" "That's it!" "Good." "I'm old enough to be your grandfather" "To me, you're still kids" "This business, we were asked to do it" "Give us your fingerprint." "We'll transfer you" "Old Uncle." "He's wounded" "It's bleeding" "Escape" "We've got to escape" "We've got to" "No matter what it involves" "Fool." "There's no escape." "Better to die now" "These peasants won't allow it" "It's the guys who captured us who'll decide our fate" "Idiot." "I want to die" "You don't get it, do you?" "Pig-brain" "Bastard." "What'd you say?" "I said, "You're a clever man. "" "Bastard" " Sensei." " Have some candy" "We're in here!" "Hurry!" "Help us!" "San, what'll we do?" "Help!" "Shut him up!" "Stop shouting!" "Bastards!" " San!" " Help!" " Yell, Dong, damn it!" " Hel p!" "Don't smother him" " Use Japanese!" " Hel p!" " Help!" " Try and shout now" "San, what'll we do?" "Help!" "San!" "San!" "Er Bozi!" "Er Bozi!" "San, are you crazy?" "Get down!" "Get down!" " What are you doing?" "Get down." " Move" "Help!" "We're in here!" "Quick!" "Help us!" " Go on, shout." " Hurry!" "Help!" "What's wrong?" "Shout" "I'll help" "Save us!" "Save us!" "Help!" "A gunboat is passing by" "You think they can hear you?" "I tried out front, and they couldn't hear" "How noisy is that" "It passes here every day." "Shout your head off if you like" "It seems it passes here everyday" "What were you thinking?" "We'll try again next time" "Forget it" "Between the noise of the boat and the band, they'll never hear us." "All right, enough talk." "Eat" "Nothing beats a good meal" "But we'd better change your bandage first" "I'll change your bandage" " I'll change your " " Move over" "It's for your own good, you idiot" "Dong, tell this woman she may touch me now, but I'll touch her later" " More than once or twice." " What did he say?" "And more than just touch." "Just ignore him" "Hanaya, she's helping you" "Don't you have a conscience?" "It's the Chinese who've got no conscience" " First they shoot, then they help." " Stop talking" "Mongrels can't even shoot straight" "If they could, you'd be dead" "I'll kill myself now" "San!" "What the hell is going on?" "What now?" "You faking it?" "You want to kill yourself?" "Use a sharp stone, not wood" "You stupid fucker" " Sister-in-law, ignore him." " I'm not your sister-in-law" "Shut up and eat" "Thank you, brother." "Brother, do me a favor" "Let me go." "We're both Chinese, after all" "Will you shut up?" " Hurry." " I am" "I was captured once before." "captain Eight let me go" "Don't give me that." "I have nothing to do with this" "We'll be pals if you do me a favor" "Of course." "Name it come as you are, leave as you are" "Don't make trouble." "And don't die on me" "All right?" "I'm treating you well enough." "Why are you so thoughtless?" "He's coming to" "I'll tell you one thing." "If you keep this up" "I could get nasty" " Who's there?" " It's me" "Wake up." "It's dawn" "Was it cold last night?" "It wasn't warm" " What's happening in there?" " Quiet so far" "If they don't settle down, they'll be the death of me" "Have a look" "Brother." "I'm so hot." "can't you take this off me?" "I won't kill myself, I promise" "Better hot than dead." "Show some thanks, will you?" "I'd be damn pleased if someone fed me and wiped my ass every day" "But why suffer like this, brother?" "I heard you coughing all night" "You were freezing" "Let's make this simple." "Release us" "I'm not putting your life in danger." "So don't put mine in danger" "All right?" "If I let you go, I'm a dead man" "Why aren't you eating?" "You've got to eat something" "Why isn't he eating?" "Move over" "You" "Lighten up" "You can't live without eating." "You're human come on, have some." "Eat" "That's good" "What the hell?" "Bastard!" "Humiliating an Imperial Army soldier!" "I'll kill you!" "Chinese pig!" " What's he want?" " White flour" "White flour?" "Where am I gonna get that?" "I wouldn't mind some myself." "Just eat" "Don't try to act like a captain-san here" "If he doesn't eat, he'll starve" "Starve?" "Don't eat, then." "But this is it" "Let's go" "I sent them to get flour" "Bastard!" "I'm not eating, And neither are you!" "They'll never find flour" "Without it, you can go on a hunger strike" "They're scared we'll die" "They'll let us go" "We'll be saved" "Fool" "What?" "Flour?" "Do I look like I'm made of flour?" " Eat me, why don't you?" " Now that's silly" "Isn't it a capital crime to hoard that stuff?" "Trying to send me to the gallows?" "Auntie." "This is a matter of decency" "Decency?" "You've a mistress in your bed and Japs in your cellar" "You've got some nerve talking about decency" "Son of a bitch" " You swearing at me?" " No, not you." "Er Bozi" "I'm his mother." "curses at him travel straight to me" "You don't understand." "He swears at me too" "He hasn't kept his word." "He said he wouldn't tell you" "If he lied to me he wouldn't be my son." "He'd be yours" "Whatever you say" "But I really need your help" "Auntie." "You're fond of me, aren't you?" "I've done so much for these two men -- for the sake of the village" "I've slept with my clothes on." "I've spent nights in the cellar" "I've used all my bedding to pad the walls and floors." "I've wrapped those men in my blankets" "That's your fault" "I had no choice." "The Jap's threatening suicide" "He won't eat unless his food's made of white flour." "Otherwise, he'll starve himself" "It's a mess" "If you care about me" "you won't let me leave empty-handed, will you?" "That's exactly how you'll leave today" "A man's going to starve" "Let him starve." "Japs are monsters anyway" "That's no good." "If they starve, our village is done for" "I'd rather die than be a collaborator" "What are you talking about?" "This guy risks his neck to bring 'em, asks us to look after 'em" "And we let 'em starve?" "What's a collaborator?" "That's a collaborator" "Keep talking, there's no flour" "Then... what's in here?" " Nothing." " There's flour inside the chest in a cloth bag" " Who told you that?" " Who?" "The one who keeps secrets." "He tells me stuff too" "That dam n son of mine." "I don't care anyway." "There is none" "Auntie" "How's this?" "I'll repay you double what I take" " Triple it." "There's none." " Four times" "Five times and there's still none" "How about six?" "Seven and I'll give none" "All right, eight then" "Dong." "Teach me some Chinese" " Why?" " I want to swear at them" "To use the most terrible words" "I'll infuriate them and they'll have to kill me" "The Chinese hate people who curse their ancestors" "Bastard!" "Teach me now" "Yes, sir" "cut it out" "At a time like this, thinking of that" "You've heard them call us brother and sister-in-law" "Besides, when I saw Auntie, I told her all about us" "What'd you say?" "I said... it is what it is" "Have you no shame?" "She said no story, no flour" "She wasn't nasty about it" "Things are what they are." "Why not just admit it?" "Don't push it" "They've all been too busy to think about us" "After tonight, when those two leave how can I walk in the streets with everyone talking behind my back?" "What can I do?" "If a big man like you doesn't know, why ask me?" "Well" "I'll... marry you" "You have to anyway" " What are you saying?" " You have no choice" " Who's there?" " Me" "It's him" "It's me" "Don't use that word." "It scares me" "I've got their statement." "When that guy comes give him this." "I'm glad I didn't forget" "Anyway, we've done it" "Right" "Once they've left we can celebrate New Year's all over again" "They're here, Dong" "The time's come" "I hear their footsteps" "I can see them taking up their weapons" "I want to turn the curses you've taught me into bullets to fire at them" "I want to enrage them" "Insult them" "Enrage them" "Insult them" "Dong" "Good-bye forever!" "Happy New Year, brother and sister-in-law!" "You're my granddad, I'm your son!" "Happy New Year, brother and sister-in-law" "You're my granddad" "I'm your son" "The words are nice." "Why does he sound so angry?" "Japs sound the same whether they're happy or angry" "Why do you think we call them devils?" "Happy New Year, brother and sister-in-law!" "You're my granddad" "I'm your son" "Enough, enough" "I get the message" "But your generations are mixed up." "If I'm your granddad you're my grandson." "Not my son." "See?" "How come they're not angry?" "The Japanese are always cursing them" "They're used to it" "Happy New Year, brother and sister-in-law!" "Okay, okay." "Shush." "Twice is enough" "We've made you dumplings" "Just what you asked for" " Did you teach him that?" " Yes." "It's the spring festival" "I taught him propitious phrases to thank you both" "Nice of you" "Now, eat up." "It's your last chance" "By tonight, you'll be on the road" " Let's bring the table over." " Okay" "Hold on." "We'll set this up." "Eat heartily" "Hoarders" "I'll kill you for sure" " No chance of that." " Why not?" ""On the road" means "to die" in Chinese" "This is our last meal" "We're goners" "Why don't they act like they're gonna kill us?" "Even when the Chinese kill someone, their expression doesn't change" "How are they gonna kill us?" " You afraid of dying?" " Of course not" "I just feel stupid dying this way" "But I'm not afraid" "I won't beg for mercy." "I won't" "Shall we do it?" "Move aside" "Let 'em finish their meal" "Untie them" "Please, one favor" "Send my parents a message for me, in the northeast" "Of course." "Don't worry" "You'll be on the road soon" "And whatever happens, happens" "Enjoy your dumplings" "All right!" "I will!" "And then I'll go on the road" "I lived by my mouth." "Now I'll die by it" "If only I hadn't learned Japanese" "In my next life, I'll come back a mute" "Eat up" "Or we'll be late" "Tell him we've still got to trouble you to get back into those sacks" "What?" "They're putting us back into those sacks" "What now?" "The Japs are like this." "They cry, they sing" "Well, maybe before he goes, we should give him a drink?" "I want a drink" "He'd like a drink" "Just what we were thinking" "Let's get some wine from old man Qi" "San" "Do you think they'll give us a reward?" "Advance" " It's time for lunch." " I'm not going" "Not going to the block house For lunch?" "No." "We're having Chinese chicken today" "You serious?" "Knowhow to get a chicken from a Chinese?" ""Excuse me, may I have a chicken?"" "Idiot." "You wouldn't get a fart that way" "Watch me" "Bastard!" "Handover that chicken!" "Bastard!" "Handover that chicken!" "You're pathetic." "You'll get thrashed." "Watch me" "You gotta stare 'em down." "Act like a devil and scare 'em" "Get it?" "Bastard!" "Give me that chicken!" "Holy crap!" "What the hell?" "Halt!" "Bastard" "You scared the shit out of me" "What you do?" "I'm from the village" "No leave village" " You go back." " Go" "Go over there" "Come here" "Head down" "Here, have another." "Come here" "Stand back" " No go out, understand?" " Yes" " No go out." " I understand" "Understand?" "Son of a bitch" " Understand?" " Yes" " Good." " Yes" "Let's go" "See?" "That's how you deal with them" "I see" "Hold on." "Get it" "Don't let it get away" "Halt" "You're back?" "What's wrong?" "Speak" "What's all this?" "Say something" "I'm going to eat you" "Look, it's him" "You." "Damn it." "What are you doing here?" "I ordered you to stay inside the circle." "Bastard!" "Japanese" "Japanese" "You must be dreaming" "No step out." "Understand?" " Yes." " Maruyama." "The chicken" "captain-san." "This what you're after?" " Bastard." "Handover that chicken." " Forget it, moron captain-san" "Want me to kill it?" " Now you're talking." " Let's sit over there" " No." " Bastard!" "I heard it. "Bastard."" "It's for real" "Japanese speaking Japanese" "Soldiers of the Imperial Army" "You stay here." "I'll get some kids to make noise" "The Japs want more water" "It's true." "There are Japanese up there" "Thank heavens" " How'd they get here?" " I ran into them" " You idiot." " Knock your block off captain-san" "Go fan the fire" "Our chicken is nearly ready" "I'm going to scream" "They still won't hear you" "Hanaya." "I've got an idea" "Don't worry about us" "We've got our own lunch" "We'll save you the bones" "It's goddamn delicious" "Why did he hit you?" " I said knock your block off., - can't you say the opposite?" "Well, you try" "I can only say bakayaro." "It's worse" "Say baka-no-yaro cut the crap." "I'll watch them." "If they head for the cellar" "I'll take 'em on" "Please save us" "Attack!" "Son of a bitch" "Sensei" "San, he's gone inside" "Move." "Move" "What are you doing with that?" "captain-san." "It's for killing the donkey" " Donkey?" " Eat donkey" "This moron is terrified at the very sight of us" "He thinks we can eat a donkey" "Idiot" "♪That pretty maid♪" "♪Is a bird on high♪" "♪I'm going to do my best --♪" "Maruyama." "Get your gun" "What are you doing?" "I'm getting you another chicken" "This guy-- very good" "Save it." "We eat next time" " Understand?" " Yes" " We should be at our posts." " Right." "Playtime's over." "Two telephone lines to set up" "Why's he always waving a knife around?" "Go back." "No move" " You scared?" " Course not." "Not with you around." "Sensei" "Look at this" "Dam n it" "What now?" "That idiot is still inside the circle" "You're something else." "You've got these mongrels worked out" "My respects" "I can teach you a few things." "I'm still learning too" " You?" "Still learning?" " You're never too old to learn" "How was that chicken?" "Delicious" " Fucking bastards." " What are you doing?" "Where's he going?" "Japanese soldiers!" "They're coming!" "Fuck you, J ap." "Fuck" "Fucking bastards!" "Move!" "Turtle-fuckers!" "What the fuck is this about?" "So you pull this on me?" "Trying to get me killed?" "Get this straight" "You try and get me killed and I'll kill you first" "I left the village crossed the river climbed the mountain entered the town went to ask for Pockmarked Li" " Get to the point." " This is the point" "You always leave the village, cross the river" "If I didn't leave the village, how could I cross the river?" " Give me some water." " Go on" " Where was I?" " crossing the river " "Get to the point" " You saw Pockmarked Li." " I didn't say that" " Yes, you did." " I said I saw captain Five" "What did captain Five say?" "He said, "Didn't I tell you what to do?"" "I said, "No, I've never met you before."" "He said, "Are you from Lower Village?"" "I said, "No." "I'm from Rack-Armor Terrace."" "He said, "Rack-Armor Terrace?" "We've never left anyone there." "Do whatever you have to."" "I said, "Like what?"" "He said, "Isn't there a blockhouse there?" "What are you waiting for?" "Do the deed."" "So this captain said "do the deed."" "Yeah." "He gestured like this" ""Do it."" "Tell us again." "What was that gesture?" "Was it like this?" "Or like that?" " Show me again." " Like this?" "Or like that?" " Like this." " So he meant kill 'em" " No." " What do you mean?" "Like this." "Like this" "Of course he meant kill 'em" "Looks like it" "There's an old saying:" "Better to obey than have respects to pay" "Well, better obey then" "Old Uncle, if he wanted us to kill 'em, why didn't he say so?" "Why say "do the deed"?" "Men in high positions can't always say what they mean" "It was so clear." "First those guys yelled out to the brass band" "Then, today, they tagged the chicken" "What's next?" "Our necks are on the line" "Did he say how to do it?" "No" "Or who should do it?" "No." "He doesn't know us." "How could he?" "He knows you" "He thought I was from Lower Village." "I never saw him before" " This is a hard one." " What's so hard?" "There's peeling the skin.," "Japs are all bastards." "More water" "You peel one, I'll throttle 'em" "Twist their necks and bury 'em!" "Shut up" "Bury 'em?" "That's an idea" "So..." " San." " Old Uncle" "It's not that I'm afraid." "How can I put this?" "It's just not right" "We were told to look after them" "We can't just decide to kill them." "It's not good" "Besides, that captain Five who Li u Wang found didn't drop 'em on us" "H is orders don't count" "What if captain Four or captain Seven comes for 'em?" "What then?" "So why don't you go yourself?" "Go find captain Four or Seven" "Don't be stupid" "It's up to you really." "You got them here." "Shouldn't you do it?" "What?" "I got them here?" "You think I went to their homes and invited them round?" "I had a gun to my head." "That's how I got them" "He forced me to look after them." "If we don't, he'll kill us all" "These last six months, I've eaten badly, hardly slept, and I'm in debt" "While you all slept soundly" "I haven't been under a quilt all winter" "Why?" "Isn't it for our whole village?" "Give me that water" "Slurping all over the place" "Dasan's got a point" " Of course I do." " Well..." " Er Bozi?" " Don't look at me like that" "I'm not a coward." "You must have a good reason to do that" "I've got a big mouth." "Just like my mother" "One slip of the tongue and we're all done for" "We are still here because I've kept my mouth shut" "I sensei this and that all day long to keep from talking" "That's my contribution" "Some contribution." "Sensei." "You collaborator" " You do it then." " Well, Li u Wang?" "Me?" "I could do it." "What am I afraid of?" "But let's get this straight" "You know the saying stick your neck out,?" "That's me" "I was nearly killed today" "Why do I go on about the village, the river?" "Because it makes me sick" "In my dreams it's leave, cross, leave, cross" "And you scold me for slurping?" "Give me that" "I'll throttle 'em and we'll dig a pit and bury 'em" "Shut up!" "Shut up!" "If none of you will do it, I will" " That's not right." " No?" "We'll draw lots then." "Fate will decide" "Whoever gets the red bean is it" "Old Uncle, it's too big a job for one person" "Well, add a second one" "Forget it." "I've got both" "Give me some water" "Give him some water" "Here you go, San" "San" "What can I say?" "What's there to say?" "Leave 'em to me." "I'll throttle 'em " "Shut up!" "I need two people." "Helpers" " I'll dig the pit." " So will I" "Good" "You two dig the pit." "Dasan will do the deed" "Let's not put it off." "Let's move tonight." "Agreed?" "Yes" "San." "The hole's ready" "It's right here." "We'll wait down there" "They've brought this over for you" "To help you over the shock" "Er Bozi's mother says don't worry about repaying the flour" "She says try and put it out of your head" " Eat up." "I'm off." " Yu'er" "What is it?" "Yu'er" "Don't touch me!" "Whatever you do, don't touch me" "If for nothing else for the child in my belly" " Are you all right?" " Don't touch me" " Who's there?" " Me" "Stop saying me.," "Here's some food" " Where's your mom?" " She's not coming" "No?" "This is terrible!" "Uncle San" "I'll kill you, turtle-fucker!" "I didn't kill anyone" "That's it" "Advance!" " You." " What's with you?" "Anybody see you?" "No one" "Quick." "Shut the door" "Ma, I'm back" "So you are" "Only one candy today." "What's with Uncle?" "Nothing." "Don't worry" " I'm going to Grandpa's." " Off you go" "Yu'er" "Let's... run away" "We'll take Little Thresher and the old man" "Well?" "Starting tomorrow, don't take them any food" "What?" "If I don't, who will?" "There are Japanese captives inside the Great Wall" "There are Japanese captives inside the Great Wall" "Too long." "The kid'll never remember it." "True" "Nihonjin means uncle" "Chojo is candy" "Iruyo is give" "Repeat after me" "Nihonjin chojo iruyo" ""Japanese inside the Great Wall. "" "You say it" "Japanese inside the Great Wall" "He can do it!" "Japanese inside the Great Wall" "Japanese." "Japanese" "Japanese" "Japs?" "Sensei" "Sensei" "The great Japanese" "The great Japanese have no candy for you today" " chop off my head!" " What are you doing?" "Me too!" "Go ahead!" "I can explain!" " Those guys are at Fenghuotai?" " Yes, inside the wall" "You taking them food?" "They still alive?" " Yes." "Listen " " Why?" "Enough's been said" "First they shout out to the brass band then they tag the chicken" "Now they're using Little Thresher." "Three times unlucky" "We're going to lose our heads" "No doubt about it" " I ask you." "Should they be killed?" " Sure" "So why didn't you do it?" "It's either them or us" "Where'd those guys come from?" "Who brought them?" "What are you saying?" "I don't know who brought 'em here" "You don't?" "It would take at least two men to drag those two sacks." "Even four" "Four?" "Try five or six" "And you saw nothing?" " Don't you have eyes?" " They were closed" "Really?" "You opened the door?" "You did it with your eyes closed?" "No, I closed 'em after" "I say you saw everything" "I didn't." "It was dark." "I couldn't see a thing cut it out." "Tell us what you're getting out of this" "Nothing" "Nothing?" "I don't believe it." "If not, why protect them?" "You said you'd pay me back eightfold." "Where's that coming from?" "Yes, we all see through it now" "You're just bullshitting about the threat to the village" "Who is this killer?" "Let him come" "I'll sit at home and wait." "Is he going to kill me?" "Would he dare?" "Only your life's in danger" " can you pipe down?" " Pipe down?" "What am I afraid of?" "The Japs have been here for eight years" "Eight years" "And have they touched a hair on my head?" "My behavior is right and proper" "Wherever I go, they look up to me" "Ma." "Enough" "Little Thresher, don't hide." "You speak Japanese?" "You can go to the blockhouse but First show Uncle San what you've learned" "Go on" "The Japanese are inside the Great Wall" "Don't hit him!" "H it me if you dare!" "come on!" "I'll be frank" "The child in my belly was conceived the night those men came here" "If Dasan kills 'em, it will curse my baby" "You want us to kill 'em?" "And then you ignore us?" "Dasan looks like a ghost" "Now that they're still alive, you come at us with this business" "We can't do anything right." "You know all the answers" "We didn't kill anybody." "We can't kill and we won't!" "We can't" "I'm afraid." "I couldn't do it" "Yu'er, how can you talk like that?" "We all see what's going on between you and Dasan but have we said anything?" "You defend him like he's your husband" "If you can't kill anyone, why should we?" "You're scared to bear a cursed child." "And us?" "We'll all be cursed souls soon enough" "Dasan." "I want my flour back." "Eightfold." "Pay me back now" "Look at yourself." "Do you look like a man?" "Whether Dasan's a man or not is for me to say" "Don't tell me you'd know better than me" "Wanna go to the blockhouse?" "Go then!" "I'll lead you there!" "No big deal!" "I'll tell you this, though" "If they come down after us, no one will escape" "We'll all pay with our lives." "Who are you threatening?" "If we go, we die and if we stay, we die" "If it's all the same, just behead me now" "Please, get it over with." "Otherwise, I'm not moving" "Say something, Old Uncle" "Good fortune is having no troubles, but misfortune can't be avoided" "I'm the youngest." "Kill me first" "I'm in this too." "Let him kill us all." "Here" "Don't push me" "If you push me, I could do anything" "Fine." "It's not too late for action" " I'll help you dig the trench." " Me too" " Let's do it." " Me?" "Do it?" "I'll run away" "Next" "Come here" " It's all beans." "All right" " Move." " Hold on!" "Halt!" "Show me" "Show me" "This way" "Beard, different with photo" "Cut short" "Understand?" " Cut short." " Short" " Understand, you?" " I understand" "Move it" "Next" "Bearded guy, come here" "Welcome the Japanese to the neighborhood 800 years ago, we were all one brood" "We all write with characters and our soups use pickles" "When they beat us, it really tickles" "If they call me bakayaro, I think it's good" "The Imperial Army gives us "mixi" food" "We love the Imperial Army like family " " Where you from?" " Rack-Armor Terrace" " Name?" " Dasan" " Who sent you?" " Old Uncle" "Old Uncle?" "No wonder you called me brother-in-law" "What's up?" "Well, where to start?" "You want to hi re an assassin" "Am I right?" "Didn't Old Uncle tell you about my marksmanship?" "He said you can hit a fly at 1 00 paces" "That's right -- but with a gun." "A nine-chamber automatic" "The further the target, the more accurate the shot" "Naturally" "There's a blockhouse at Rack-Armor Terrace, yeah?" "Yeah" " The village is as small as an ass cheek?" " Yeah" "How can you use a gun then?" "This is a job for a sword" "But Old Uncle is asking you." "You can't say no, can you?" " can't do it." " You can't do it?" "can't do it" "All right" " What are you doing?" " Going home" "You can go, but you gotta leave the beans" "What?" "You won't help, but you want the beans?" "I can't help you out, but you gotta leave them" "You want to kill a Jap but don't want anyone to know, right?" "Right" " It's a secret, right?" " Yeah" "So, I'll keep your secret." "It's like this" "If I don't take something as payment how can you trust me to keep quiet?" "I don't need your beans." "I just want you to feel okay about this" "Silly man." "You've simply come to the wrong place" "I make tofu." "If you throw in sorghum, would it still be tofu?" "The more sorghum you put in, the less it'll be like tofu" "In the future, remember:" "if you want a swordsman don't go to the one with the gun." "Do you get my logic?" " No." " No?" "Let me show you what I mean" "Attention!" "Attention!" "What'll we do?" "Take a detour" "Halt." "What are we afraid of?" "Running means we've done wrong" "Sensei" "Get down" "They must have lost this battle." "They usually kowtow before me" "They're back." "Yayoi." "Look" "They've been gone so long" "At last they're back" "Yayoi, what's wrong?" "Matsuno?" "Matsuno!" "Idiots!" "Go back Inside!" "What's all this fuss?" "Shameless hussy" "Look at him" "You need wits and bravery" "Silly man" "It's not just a family matter" "Besides, I've got a Chinese heart too" "So you do" "Let's go" "Brother-in-law." "Where are you taking me?" " To the military police." " What?" "To the bathhouse" "You know the em press Tz'u-hsi?" "Yeah" "How about the eight ministers?" "Yeah." "U h, no" "Didn't think you would" "Darlings of the court." "All beheaded" "Know who wielded the sword?" "No" " Old man Li u." " Really?" "The day of the beheadings, a sea of people surrounded North Gate" "It was packed" " South Gate." " Right, South Gate" "Did they come to see the eight ministers?" "No" "They cheered at every head old man Li u cut" "Watching him use his sword was like tasting the finest wine" "They even celebrated it in poems" "Old man Li u, does he worry that people will hate him?" "No." "They never hate him." "They're grateful" "The descendants of those he's executed bring him gifts every day, every year, every generation" "Old man Li u, which generation are we up to?" "See?" "The fifth generation" "Do you know why?" "No" "Because he's helped them up to heaven" "H is blade is like a passing breeze" "Before they know it, they're in the land of the immortals" "Their last vision is of Li u with his sword" "Gratitude wells up within them" "You know how they show it?" "No" "Their head rolls exactly nine times looks back at him and blinks three times" "The corners of their mouths turn up" "You've heard of greeting death with a smile,?" "That's it" "Say no more" "What can I give you to do this job?" "Oh." "If old man Li u likes you, he won't take a cent" "If he doesn't, mountains of gold won't move him" "Say no more." "Old man Li u" "I can't even offer you beans" "But I'll kowtow on behalf of my whole village" ""The Great Wall still stands, yet the emperor ch'in Shih Huang is no more!"" "Few Imperial Army soldiers get taken prisoner" "Fewer still are the prisoners of peasants" "I might be the only one" "Oh, Fate" "At least I've killed about 20 Chinese" "Worthless though their lives were" "Aren't 20 lives worth your one?" "Sure" "The Chinese are people too" "It's a pity" "A soldier should die in battle" "To die at the hands of these peasants is so unheroic" "Heroic?" "I can help you" "How the hell can you help me?" "I could eat your flesh like sashimi" "Shut your traps." "For fuck's sake" "What do you think?" "I'm speechless." "You're a master" "How's the time?" "The moon is bright, the stars are few." "Perfect" "And how are they?" " They've eaten their last meals." " Let's do it" "A Jap?" "I'm speechless" "A Chinese?" " Words fail me." " The Jap first" "collect the corpses" " You've worked hard." " It was nothing" "He's still alive!" "Grab him!" " They're not dead!" " Impossible" "They're jumping around!" "Headless chickens jump around too" "Stop" "But their heads are still on their shoulders" "Let me go!" " Got him?" " Grab him" " What's going on?" " They're not dead" "Try again!" "I'm not called "One Strike Liu" for nothing." "They're just not fated to die" "My brilliant reputation has been destroyed in an instant" "I never imagined that because of you I'd lose my honor" "Especially this late in life!" "Heaven help me!" "Old Uncle." "The slate is clean between us" "All of you take care." "We'll meet again" "But " " But " "Teach me to curse my emperor." "They'd love that" "They don't know who he is" "Teach me to say nice things." "I'll do anything not to be killed" "Hanaya, you've said all the n ice things there are to say" "What?" "Happy New Year, brother and sister-in-law" "You're my granddad, I'm your son.," " I won't say that again." " Remember?" "I'll never curse them again" "You never did curse them" "Happy New Year, brother and sister-in-law" "You're my grand dad, I'm your son." "That's what it meant" "You tricked me!" "Educated people are so evil" "I hate you educated people!" " What sort of shitty samurai are you?" " I'm no samurai!" "I'm a peasant!" "My family raises silk Not samurai!" "If a warrior dies with no witnesses, he's no warrior!" "You're no fucking actor either, just a sergeant" "I hate stupid Japanese people like you!" "Low life peasant!" "No fucking dignity at all!" "You're the lowlife!" " Worse than the peasants!" " Bastard" "The people here gave up their own rations to keep us alive these six months" "That woman even dressed my wounds" "She's got feelings for me" "Happy New Year, brother and sister-in-law" "She'd do the same for me if I was wounded" " You're so pathetic!" " Bastard!" "Stop it." "Stop it" " Shut up!" " Shut up" "It's not going to save your fucking life" "I've got an idea" "Hanaya says if we take them back home, we'll get two carts of grain" "It'll be New Year's Day every day" "Lives for grain" " You go." " You go" " You first." " You first" "Speak" "I say no deal" " I agree." "No deal." " No deal" " Why not?" " Don't know." "Doesn't feel right" " I say let's do it." " Why?" "Why not?" "I al ready said why." "It doesn't feel right" "That's not enough." "What'll we gain by not doing it?" "If you say no, take 'em home yourselves and look after 'em like a wife" "What'll we gain?" "You tell us what the disadvantages are?" "What if that guy comes back for 'em?" "He said he'd be here on New Year's Eve." "Half a year has passed" "What if he never comes?" "We gonna keep 'em our whole lives?" "Does a deal count as collaboration?" "collaboration?" "You always throw that word around" "You help Japs kill Chinese, you're a collaborator" "But asking them for some grain?" "If you return the Jap but don't ask for grain, that's collaboration" "Who grew it anyway?" "We Chinese did" "We've got our backs to the sun." "Our sweat flows, irrigating the soil" "Why should the Japs get it for free?" "I'll take the grain from their mouths and put it in ours" "And not just ours." "All our relatives will get their share" "That's collaborating?" "You'd call me a collaborator for that?" "Well, no" "If everyone was like us and took the Japs and traded 'em in what would the world be like then?" "The Japs would be the collaborators" "Say we agree" " I say no." " Explain yourself" "You're in with sensei, but I slapped Hanaya" "True." "And what about One Strike Liu?" " Say we disagree." " What do you mean?" "I was gonna say" "Li u Wang, the fact you hit Hanaya hardly counts" "How often have the Japs hit you?" "One Strike Liu is a more serious matter" "What do we do then?" "I've been thinking about it" "We'll say the guy who captured 'em came back to kill them" "We talked ourselves blue in the face, but got rid of him saving their lives." "That's believable" " I believe it." " And why not?" "They're not dead" "We saved 'em, didn't we?" "And for that, they're gonna punish you?" "They've got to reward you" "It still doesn't feel right" "Why not?" "I found One Strike Liu, and I'm not worried" "You won't eat food that's put in your mouth?" "Are you a coward?" "I give you men." "You give us grain." "I've done you no wrong" "Would you treat me badly?" "Aren't our hearts made of flesh?" "I'll throttle 'em both" " and twist their necks like fried dough." " Forget the fried dough" "No flour, no fried dough" "Li u Wang is right." "No flour, no fried dough" "If we don't go, we can't get the grain" "Grain." "There'll be enough grain to feed the whole village for a year" "Auntie, I said I'd pay you back eightfold" "It'll be eighty-fold" " You said it, not me." " I sure did" "Forget the two carts of grain" "If it was two carts of shit, I'd still do it" "I'd do it for nothing" "I don't want them another day" "If you're scared, don't come." "Fine." "I'll go myself" "I'll take those two carts of grain bag by bag" "I'll bring it back to you myself." "I'll deliver it and put it in your mouths if I have to." "You'll eat it and be grateful" "And you'll feel remorse in your gut cal m down." "No one said they weren't going" " No." " No" "So, we're going?" "What an effort" "Give me some water" "Why do you have to make him cry?" "Yes." "I'll make the decision for us" "Hanaya wants to see you" "Yes" "Hanaya." "I want to ask you three things" "Answer truthfully" "How will you guarantee our safety and how will you raise the question of the grain?" "I'll tell you how" "We all come from the same county" "Captain Inokichi Sakatsuka is from my village" "We grew up together." "We're friends." "Translate" "He says:" "We all come from the same village." "I know captain Sakatsuka" "We grew up together.," "No wonder." "The same village" " So he's a peasant too." "Just like us." " A son of the soil" "Yes, that's it" "I'm a son of the soil" "But I'm a sergeant too, in charge of food supplies" "The Imperial Army has a policy of rewarding those who help it" "So I can promise you will get your grain" "He says " "And I also want to say that I've been well treated here" "You saved my life." "You'll be perfectly safe." "Translate!" "I'm a sergeant in charge of foodstuffs" "The Imperial Army rewards those who help it." "You'll get your grain" "You've looked after me well" "You saved my life." "Your safety is guaranteed.," "I thought he was a cook." "Now he's a sergeant?" "Brother, I was afraid you were going to kill us." "So I made that up" "Made it up?" "Maybe you've made up all this too" "At a time like this, would I dare?" "What?" "They're afraid I'm making this up" "You better not be, Dong!" "It's a matter of life and death!" "Stop lying" "If I was playing games now" "I'd be the loser" " What are you talking about?" " He's afraid I'm lying" "If I was, I'd only be hurting myself" "Sit back down" "Sit down" "Listen." "I don't care what rank you hold" "Since you've been in our village, we've fed you looked after your wounds, cut your hair and beard" "In your heart, you know we've treated you well" " Very well." "What else is there?" " Ask him" "He says they've fed you, healed you cut your hair and treated you well, right?" "Like members of their own family" "Especially Dasan and his pregnant wife." "They've been great" "You've treated us like family, especially Dasan and his wife" "Look, let's not talk about that" "Don't talk about that" "What's the second question?" "And the second question?" "You answered it before I even asked" "Well is there anything else?" "You've answered everything." "He finally looks happy" "The swordsman wasn't one of you" "I could tell from his accent he was one of those who captured us" "You persuaded him to leave and saved our lives" "I've told him this." "We thank you" "It was nothing" "We were talking about the swordsman" " Nothing to do with you people." " That's right" "So long as you know that" "That's fine" "Sit back down" "Since that's the case, I'll read this back to you" "If you've no problem with it, you can sign it" "They've got an agreement to sign" "The Japanese Kosaburo Hanaya arrived in our village at year's end" "It was cold." "He was frightened disheveled, and wounded by a bullet" "Who brought him here, we do not know" "Six months passed." "Winter turned to summer" "The villagers were kind and righteous" "They did all they could to help -- clothing, sheltering and feeding him despite the hardship" "We've all been through this turmoil." "We'll never forget this experience" "Hanaya in gratitude promised us two carts of grain as a reward" "We happily accepted this offer" "Now Hanaya and his translator return to you" "And hereafter, both sides will live in peace" "Signed by the Chinese and the Japanese.," "Captain!" "Captain!" "Hanaya is back!" "Captain!" "Hanaya is back!" " What's happening?" " Hanaya is back!" "Captain!" "Hanaya is back?" "Yes." "Hanaya is back" "I'm back" "I'm really back!" "I'm back!" " How come he's still alive?" " What happened to h is uniform?" "Did he get taller?" "Attention!" "Captain, sir!" "Kosaburo Hanaya has returned to the ranks!" "Dasan." "Look." "What a mess" "Oh, no" "This is terrible." "Get off." "Off." "Give me a hand" "Pull 'em apart" " Push." " He won't budge" "We didn't plan this" ""We didn't plan this. "" "We didn't tell him to do that" ""We didn't tell him to do that. "" "Fucking hell" "captain-san." "We're so sorry" "Turn around!" "Attention." " Yes, sir" " Know why we're beating you?" " No" "What?" "Stupid pig." " Now you understand?" " Yes, sir" "Say it." "Why are we beating you?" "I shouldn't have come back alive" "You think dying would've solved it?" "Yes, but " "Your name's inscribed in the Yasukuni Shrine" "I've already. informed your father" "You're the goddamn hero of the village." "And now you're back, alive" "You have lost face for the village and the Imperial Army" "Worse, you've returned with a herd of Chinese swine" "Bastard" "They weren't the ones who captured me." "They saved me" "First they captured you, then the pigs saved you" "You know how many died in that battle?" "If they didn't ambush us, who did?" "I was taken to them only after I was shot." "I never meant to surrender." "I" "What are you saying?" "Swine" "Tell us, were you a prisoner or not?" "Speak" "Yes" "I passed out, and when I a woke" "I was tied up in a sack" "Because you passed out, you think it's all right?" "Couldn't you have committed suicide?" "I had no opportunity!" "Bastard!" "You need an opportunity to commit suicide?" "But " " You think you deserve to live?" " Move!" "You bastard." "Why aren't you helping?" "Feel sorry for him, do you?" "You want to forgive him?" "Hanaya wants to say something" " Bastard!" " I'm sorry" "Truly sorry." "So truly sorry" "And that makes everything all right?" "Let him speak." "Soon they'll have you on the rack with chili water up your nose." "Scared?" "Get a grip on yourself" "What are you scared of?" "Everyone's here" "A chopped-off head leaves a big scar." "Blame it all on me" "You can say I captured the Jap" "If we were scared, would we be here?" "We're just hanging around." "Why can't we talk?" "I thought everything was fine until your donkey started acting up." "He's got no sense of timing" "He could have chosen another horse besides the Jap's" "Please forgive me" "Please forgive me" "Please forgive me." "I'm so sorry" "Hanaya, let me read this letter to you" "Yes, sir" "The son of the Hanayas' is a great hero" "Each time I pass by their door, I lower my head in shame" "Hanaya is the pride of our village" "Son." "Kill more Chinese pigs for your father" "Serve the emperor well." "Solemnly yours " "San." "You kept Hanaya locked up for six months couldn't they do the same to us?" "Why do you always think the worst?" "You call that locked up?" "I call it looking after them" "Besides, we didn't capture him." "He wasn't our prisoner" "But now we're locked up here with nothing to eat or drink." "So aren't we the prisoners now?" "Prisoners?" "Don't you have two legs?" "You came here yourself" "If you're a prisoner, you're your own prisoner" "Dad." "How can you sleep?" " This is no good." "Move." " San" "I've got something to say to your captain-san" "Get back!" " I've got something to say " " Get back!" " I've got " " Get back!" " But I must talk to him." " Get back!" "Move again and I'll kill you" "Then " "Kosaburo Hanaya" "On August 15, 1945" "Zixuan Zhao, Dasan Ma" "Kosaburo Hanaya, Hanchen Dong, solemnly agreed to these terms." " Hanaya." " Yes, sir" "You groveled enough." "Why not mention this as well?" "I was about to" " Bastard." " Shut up" "Captain, you don't have to honor the agreement" "Shut up!" "Fool!" "Hanaya left h is fingerprint" "Unlike the Chinese, the Japanese are honorable people" "Get out!" "Yes, sir" " I humbly take my leave." " Get out" " Hanaya." " Yes, sir" "You've signed an agreement" "The Imperial Army honors its pledges." "I have no choice but to carry this through" "Hold on." "In my experience, the Chinese are unreliable mongrels" "If they say east, think west" "I'm sure it's not as simple as it seems." "There must be someone behind this" "Shut up." "Bastard" "Hanaya." "Standup" "This matter" "I'll do this for you" "All right?" "Yes, sir" "Attention!" "Who signed this agreement?" "What, afraid to admit you signed?" "I signed" "Good." "Come here" "Dasan Ma" "Dasan Ma" "Good." "Here, come" "San" "♪Fifty years♪" "♪Passes♪" "♪Like clouds♪" "♪In the sky♪" "♪An illusion♪" "Lieutenant Nonomura" "What is it, Inoue?" "Phone call" "Urgent phone call" "From Western Fortress Town" "They haven't called in over a month" "They must have a mission for us" "Charge!" " Follow me!" " Onwards!" "Is that Old Uncle?" "Old Uncle here" "It's me, Dasan" " Is that San?" " Yeah" "What's up?" "The grain will be there tonight" "It'll arrive by dusk" " What?" " Get everyone together" "Everyone must be there" "Do you understand me?" " What?" " can you hear me?" "Huh?" "What?" "I said, do you understand me?" "I hear you" "I hear you" "Gather everyone together" " Right?" " Right" "San" " Have a safe journey." " I will" "Take care" "Yeah" "I'm finished" "Yes, we know" "Captain." "Lieutenant Nonomura would like a word" "Hello?" "Yes, organize a celebration with the navy and infantry" "He's so far away." "But he sounded like he was in the next room" "Wasn't that amazing?" "It's no wonder " "What are you talking about?" "He says the captain is the kindest of men and the Imperial Army has the finest of things" "Hanaya stayed with you for six months" "He consumed much food and put you out" "So" "I will give you the two carts of grain." "and add four carts as a reward." "Six in all." "How's that?" "Translate" "The captain said, because of the grain eaten by Hanaya he will add four carts as a reward." "Six in all." "How's that?" " Six carts of grain?" " Thank the captain-san" "I'm speechless" "What's he saying?" "His gratitude knows no bounds." "He wishes to kowtow before you" "All right." "Load the carts." "Get their people together." "Hurry up" "Quickly, load the carts, before the Japs change their mind" " Load the carts?" "Great." " come back" " You've got to bow to the captain-san." " captain-san" " Well, San?" " What happened?" "You're going on the rack with chili water up your nose" "They've given us the two carts pl us four more." "Six in all" "That's wonderful!" "Let's load 'em up" "You can slap me if you like" "Go right, Captain" "can you take this for me?" "I want to pick up Yu'er and collect a few others as well" "Won't the old man get angry?" "Don't tell him." "Let him brood." "Forget him" "Okay" "Long live the emperor!" "Company, attention" " Nonomura at your service." " Sakatsuka at yours" "Old Uncle!" "We're back!" "Right turn!" "We've got the grain!" "Happy New Year, brother and sister-in-law" "You're my granddad, I'm your son" "Where's my stool?" "Rabbit-fucker" "Eat up" "We walk the straight and narrow path" "A healthy foot doesn't fear a twisted shoe" "Eat, drink and be merry" "Lieutenant Nonomura, strike up the band" "I want to say a few words." "Can they play the army theme?" "Oh, dear." "I'm sorry." "The naval tune is the only one we know" "We're just navy reserves, you see" "Music is our little hobby" "Then play your navy song" "You don't mind?" "Attention!" "Straighten up, Horie" " Well?" " Excellent" "Thank you" "How is it?" "Good?" "Woman" "Woman" " Man." " Man" " Woman pl us man equals good." " Good" "Good wine" "Good!" "The army and the navy together have invited the village to this feast." "We've prepared lots of good food" "We hope everyone has a great time" "The army and the navy together " "Don't talk with your mouth full" "Have invited all of you here." "It's a free meal" "So enjoy yourselves" "One, two, three" "♪Leaving home, we b ravel swore to return triumphant♪" "♪How can I die before victory♪" "♪The bugles play The flags float like a sea♪" "♪The earth, grass and trees are on fire The fields stretch out before the eye♪" "♪The Rising Sun flags and helmets advance♪" "♪I pat my horse's mane Who knows one's fate♪" "♪Thinking of today's battle of my comrade covered in blood♪" "♪Dying with a smile♪" "♪Long live the emperor♪" "♪His last, unforgettable cry♪" "A happy occasion lifts the spirits" "Just now, the Imperial Army has played music and sung a song" "What shall we do in turn?" "I am an old man, willing to make a fool of myself" "I'll sing for you" "♪The flowers and willows♪" "♪Love the spring sunshine♪" "♪The moon and wind♪" "♪Love the autumn chill♪" "♪The young maid♪" "♪Loves the talented man♪" "♪The hero♪" "♪Loves valor♪" "I forget the rest" "He said he forgot the rest of the lyrics" "♪You and I, we are an egg♪" "♪I'm the white and you're the yolk♪" "♪The white surrounds the yolk♪" "♪Just as I embrace you♪" "♪Into the wee hours♪" "♪We dance, enthralled♪" "♪Bathed in moonlight♪" "♪We are ecstatic♪" "There's an old saying" "People fear meeting, trees fear stripping" "Tonight I'll also risk em barras sing myself and sing a song" "♪I slipped in to sneak a look at the young man♪" "♪With my fingertip I poked a hole in the window♪" " You know, the paper window?" " Yes, I know" "Happy New Year, brother and sister-in-law" "Drink!" "Drink!" "♪He was as handsome as a prince♪" "♪Dark brows, big eyes A very special face♪" "♪My heart thrilled to the sight♪" "♪Back home I told my mother♪" "♪She wasn't pleased♪" "♪I made a face and lowered my head♪" "♪I pouted, I turned away♪" "♪I stiffened my neck and threw a fit♪" "♪I said, don't try and marry me to another♪" "The captain praises your singing" "Your mother's a real tease" "If there are more songs like this, there'll be trouble" "Pity they're all sung in chorus" "We sing ours individually" "Why don't you sing one yourself, to entertain us?" "All right" "Kosaburo Hanaya, give these people a song" "Hanaya, standup" "Were you speaking Chinese just now?" "Let's hear it." "Happy New Year, brother and sister-in-law" "And?" "You're my granddad, I'm your son" "Translate, Dong" "Happy New Year, brother and sister-in-law" "You're my granddad, I'm your son" "Give me a gun" "Kosaburo Hanaya is the scum of the Imperial Army" "I invite you to shoot him with this gun for our drinking entertainment" "Well?" "Who'll do it?" "Hanaya represents the scum of the army." "The captain invites you to shoot him" "For our drinking entertainment." "Any takers?" "How can he be scum?" "For six months you lived under Nonomura's blockhouse" "Is that true?" "It's no small amount of time" "Why didn't you contact Nonomura?" "If he was on the h ill, don't tell me he couldn't see you" "We had no opportunity" "What do you mean?" " We were locked up in the cellar." " I didn't ask you" "Hanchen Dong spoke the truth" "What?" "You didn't do too badly" "So besides learning some Chinese, what else did you do?" "It's only on account of your promise that I'm feeding these mongrels" "So that explains it" "So, asking them to kill you now is rather appropriate, isn't it?" "Come on." "Execute him, why don't you?" "come on, everyone, shoot him" "If you don't then I take it you forgive him?" "If you don't, that means you forgive him" "Turtle-fucker!" "Nonomura." "A favor" "Can we hear the whole tune from the top?" "Yes, sir" "This is our first visit here" "We'd never heard of Rack-Armor Terrace." "It means "put down weapons. "" "The story goes, a long time ago a famous general retired from battle and came here to live an ordinary life" "The Chinese say to "rack one's armor"" "and return to the fields is an extreme form of virtue" "I wish to express my deep respect" "Although the Japanese Army is fighting in China this won't go on forever" "One day." "I too will rack my armor." "And yet in a place that so dislikes warfare a Japanese soldier of the likes of Hanaya was kid napped and held captive" "It appears Rack-Armor Terrace doesn't deserve its name" "And you are not as wise as your fore fathers" "I've given you your grain" "I've fulfilled my end of the bargain" "But I have a question for you" "Who was it who brought this scum here?" "I don't know." "You have to ask Hanaya" " Hanaya, answer the question." " I really don't know" "Look." "Even he doesn't know." "How could I answer?" "Why not drop it?" "He's been returned." "Isn't that the end of it?" "Well, where's Dasan Ma gone?" "To fetch Yu'er" "Yu'er?" "How many men is she bringing?" "How many guns?" "She's pregnant." "She's staying at her mother's" "As for people, probably two or three." "But no guns" "They'll be back soon." "We're waiting for him to divide the grain" "Divide the grain?" "Surely not" "He's gone to get the men who captured Hanaya" "It looks like he's scared you." "Don't be afraid" "He'll be back soon." "You'll see" "You think I'm afraid?" "course you are." "You've got your guns out" "If that's not fear, what is it?" "Look at me." "I'm eating and drinking" "I'm not worried about anything." "Just relax" "Bastard!" "Why all the cursing?" "I understand bakayaro" "How can you say that?" "You fucking " "Li u Wang!" "Don't let anyone get away" "Don't stop." "Keep playing" "Bastards!" "Surround them!" "Don't!" "Don't go!" "Mongrel." "We should've killed you long ago" "You've got the heart of a wolf" " Translate." " We should've killed you long ago" "New soldiers" "A rare opportunity" " Yes, sir" "Pull it out yourself" "Harder." "Twist it" "Who was it who brought this scum here?" "Where's Dasan Ma?" "The baby's nearly due." "We'll get another share of the grain and I'll marry you" "Turtle-fucker!" "I'll kill you, Jap turtle-fucker!" "Ma!" "Get up." "Standup" "Japanese inside the Great Wall" "Let go." "Go away" "Nonomura." "You've been with them for too long" "You're getting too close to them -- like an auntie to these b rats" " Brat!" "Japanese inside the Great Wall" "Grab him!" "You bastard!" "Drag the old bastard over!" "I'll throttle you, turtle-fucker!" "Let go, you old swine!" "You'd dare strangle an Imperial Army soldier?" "Hold him!" "How come it's not cutting through?" "Let me try" "Stop dicking around!" "Bastard!" "Let me do it." "Move" "Throw him on the fire" "Die, you old mongrel!" "Ma!" "Swine." "You wanna die?" "I'll help you." "Hurry!" "Come on!" "Throw him in!" "Hurry!" "You haven't seen me rest, have you?" "Let's burn the grain and the village!" "Charge!" "Advance!" "Long live the emperor!" "No need for you to die" "The emperor has made a proclamation" "The Imperial Army has racked its armor" "But we weren't defeated on the battlefield" "Such a pity." "On account of this imperial order we have to stop fighting" "The war situation is no longer to Japan's advantage" "The enemy has employed a new, cruel bomb which has taken a toll of many innocent lives" "and has an incalculable destructive power" "Should we continue to fight not only would the Japanese nation be obliterated but human civilization would be extinguished" "Such being the case how are we to save our subjects and atone before the spirits of our ancestors?" "This is why we accepted the joint declaration of the powers" "Very good!" "Go away or I kill you!" "♪The smoke of war has desisted♪" "♪For eight years china resisted♪" "I have no money." "Will you take this?" "All right" "♪We've got the Japs holding their sorry asses♪" "You buy." "Very good" "I'm not buying this" "Fucking J ap." "Go blow up your mother with it" "Bastard." "I'll kill you" " china, U K, US, USSR!" " Together no one beats us!" "Quick, move this garbage" "I don't understand" "I'm sorry, sir." "I don't understand you" "Do you want to buy something?" "I'm ordering you back to the barracks" "In Tokyo, in Japan, these are very valuable" "I'm ordering you to stand still" "I'll throw in the hat for nothing" "♪And so the invasion has come to an inglorious end♪" "♪We welcome this day of victory♪" "♪And the recovery♪" "♪Of our beautiful land♪" "Move it." "But we were singing for them." "Do we deserve this?" "Fucking bastards" " Company, attention." " One, two, three, four" "Right" "Attention!" "At ease" "Reporting to the major." "All46Japanese POWs are here" "Reporting to the major:" "All 46 Japanese POWs are gathered here" "Good." "Back to your ranks" "Back to ranks" "As for those scum who aided the Japanese to slaughter their own com patriots" "we will not treat them lightly" "Bring Hanchen Dong here" "You have aided tyranny and avoided arrest." "Your crimes are great" "Your hands are stained with Chinese blood" "Only execution will quell the masses, anger" "Do you have anything to say?" "Is there anything you can say?" "Reporting to the major:" "He's laughing" "Laughing?" "Sure he's not crying?" "Reporting to the major:" "He's definitely laughing" "Well, he can go laugh in the netherworld!" "com patriots, if you know of other such scum report them immediately." "There will be a reward" "I now order the immediate execution of the collaborator, Hanchen Dong" "cigarettes for sale cigarettes" "Brother." "Wife" "Understand?" "You're Japanese?" "Yes." "Japanese" "Woman" "Work... girl" "My... your... work... wife" "Her... your..." "little sister... work" "Don't you understand?" "can we come home with you?" "No, we don't want to buy cigarettes" " Go away." " Look." "Someone's coming" "I wanna buy cigarettes." "Smokes" "It's going to rain." "Be quick" "I'll have a pack of cigarettes cigarettes" "Goodman" "Can I have two for free?" "Give me a light" "A light?" "Goodman" "Turtle-fucker" "Murder!" "commander Liu!" "There's trouble!" "commander Liu, trouble!" "Help!" "What the hell's going on?" "What are you doing?" "Grab him!" "Stop it!" "Help!" "Dasan Ma!" "What are you doing?" "Turtle-fucker!" "Chinese Army, help!" "Stop!" "Thank you, Chinese Army." "Thank you" "The Japanese have surrendered." "The war is over" "Peace has come at last" "Yet in the last few days one man has violated the agreement which Generalissimo Chiang" "President Truman, Prime Minister Churchill and Stalin in the interest of world peace, signed at Potsdam thus disturbing the social order and terrorizing people" "That person is Dasan Ma, who you see before you" "Perhaps some will say Dasan Ma only killed Jap devils, and call it "resistance., But what is "resistance,?" "Battles fought with Japanese troops, the struggle against invasion" "Those are acts of resistance" "But Dasan Ma's wanton slaughter of POWs who had lost the will to resist was a false resistance" "Perhaps some will argue that such profound hatred was the result of Japanese atrocities" "Who of our 400 mill ion com patriots doesn't hate the Japanese?" "My own parents were killed by Japanese bombs" "My left leg" "was shattered in the final battle" "Who could be more motivated to kill former Japanese soldiers?" "Who has the best reason for revenge?" "Me." "Major Gao" "And who is most constrained from such action?" "Me." "Major Gao" "Because I am a soldier, I must follow orders" "I take this opportunity to reissue this warning:" "only Nationalist soldiers can legally accept the surrender of Japanese troops" "War hasn't only brought catastrophe to china but to the people of Japan as well" "Are they not human too?" "I ask you." "Who among you would tolerate to see your husband's head chopped off?" "Anyone?" "No one!" "I ask you too." "Who among you would wish to see your wife, on her way to buy a bolt of cloth have her hand cut off?" "Anyone?" "No one!" "Dasan Ma." "Do you have anything to say for yourself?" "Is there anything you can say?" "Gag him" "Listen, everyone" "Ever heard a cry to heaven,?" " He is braying like a mule." " That's a cry to heaven.," "What distinguishes man from a beast?" "You don't deserve to be called Chinese" "You don't even deserve to be called human" "How can a Chinese soldier sully his hands with the blood of such scum?" "Inokichi Sakatsuka" "Inokichi Sakatsuka" "Attention!" "I nokichi Sakatsuka" "I order you to execute Dasan Ma" "Shoot him" "He orders you to carry out the execution" "Really?" "That's what he said" "What?" "You dare to disobey my command?" "We've put down our weapons." "We cannot use firearms" "I could obey your order, using a Japanese sword" "It's our customary weapon" "Translate that bit about the sword accurately" "Reporting to Major Gao:" "We've al ready handed in our firearms" "We're not permitted to use them anyway" "However, we must obey your order" "The Japanese warrior always carries a sword could he use a sword?" "What a pain." "Okay, give him a sword" " What a good story this is." " Indeed" "We'll write a great skit about this" "Kosaburo Hanaya" "Hanaya" "Reporting to Major Gao:" "The preparations are complete" "Please issue the go-ahead" "The preparations are complete" "Please issue the go-ahead" " Do it!" " Yes, sir!" |
Tag: rights
WE MEXICANS are really incensed. We have been disrespected, as they say in the ‘hood. Oh, the effrontery!
The pinche (look it up) Gringo President Trump wants to build a wall along the border. What a slap in our faces.
And how undeserving!
We’re mad as hell, and we’re going to stop shopping at Sears, Costco and Walmart. Of course, that would only put the Mexican employees out of work, but it’s a price worth paying, shooting ourselves in the foot.
Those of you above the border cannot imagine how insulted we Mexicans are at this wall idea. Insulted, I tell you!
Here’s a post we might have titled Border Wall for Dummies. It is the entire nasty matter in a nutshell.
First, both nations are equally — well, almost — at fault. For decades now, both Democrat and Republican administrations have ignored or even tacitly encouraged the immigrant invasion over the southern border.
Second, millions of Mexicans have been sneaking into the United States, tunneling below ground, climbing over fences, flying in with tourist visas and overstaying, backpacking across the arid deserts, you name it.
Some have been my relatives.
And all are in the United States illegally, millions, building neighborhoods, packing “sanctuary cities,” creating Little Mexicos all over the place.
Finding enchiladas has never been so simple.
It finally reached a boiling point for U.S. citizens, and that’s what put Trump into the Oval Office.
Americans are divided almost equally into two camps. On the left are the people who croon Kumbaya, reject national borders entirely and sincerely believe that all peoples, with a tiny bit of effort, can live in eternal peace.
In spite of there being absolutely no historical evidence to support this conviction. Quite the contrary.
It is the addled Flower Power mindset of the 1960s that has filtered down through the generations, and still thrives among a healthy percentage of the population.
These Kumbaya crooners, ironically, are the ones rioting in the streets and punching Republicans in the name of love.
On the Great Divide’s other side are people who believe in borders, who know that a nation is a tribe with a common culture, language, religion, race, something that merits and requires protection.
Reams of historical evidence support this fact.
* * * *
TWO TO TANGO
Here in Mexico, we have a couple of notorious Gringo enclaves, particularly San Miguel de Allende and Ajijic, Jalisco.
Mexico’s government puts the number of Americans living in Mexico at around 700,000.*
It’s very probable the overwhelming majority are here with visas or — like me — have become citizens, although that’s not very common.
Most are spread out quietly all over the nation, and most mind their own business. Mexican law forbids them from political activity, and marching in the streets waving U.S. flags and demanding “rights” would be outrageous.
You know, like illegals do in the United States.
It would lead to deportation.
Mexicans mostly ignore San Miguel and think it’s a cute place to visit. However, if there were hundreds of San Miguels instead of one, it would be very different.
And it would require hundreds of San Miguels and Ajijics across Mexico to be comparable to what now exists in the United States, to create an equivalency.
If there were hundreds of San Miguels full of Gringos here illegally, refusing to learn Spanish, opening little businesses selling grits, ham and red-eye gravy, there would be a national outcry. We would be apoplectic!
We would go postal!
Then the shoe would be on the other foot, and Mexicans might understand President Trump’s historic trip to the White House with a tad more clarity.
No nation really wants to be multicultural. Just up to a point, it’s interesting. After that, it gets nasty.
(No nation on earth apart from the white populations of North America and Western Europe embraces multiculturalism. Just those lands where hippies reigned in the 1960s. The Soviets shielded Eastern Europe from Flower Power.)
Mexico, in cahoots with the Democrat and Republican political establishments, brought us Trump.
It takes two to tango.
* * * *
* You’ll often read that one million Americans live in Mexico. This is a myth that has existed since before I moved south 17 years ago. I find the official 700,000 number a little difficult to believe, but perhaps it includes part-timers. And perhaps I misread, and it includes all foreigners, not just Gringos.
(Note: I saw on Twitter this morning that our President Peña Nieto has announced a new program to support and facilitate continuing education for young Mexicans who return from the United States. More positive effects from Trump.
(Furthermore, about 60 percent of Mexico’s exports currently go to the United States. Mexico recently announced it will begin widening its trade with other nations. This diversification is a positive thing, bought to us by Trump. ) |
1. Introduction
===============
More than 60 years have passed since the discovery of the structure of deoxyribonucleic acid (DNA)---the molecular basis of life \[[@B1-molecules-20-04136]\]. Beyond DNA technology and its major impact on the pharmaceutical industry, medicine, agriculture and crime scene investigations \[[@B2-molecules-20-04136],[@B3-molecules-20-04136],[@B4-molecules-20-04136]\], considerable research interest has focused on the use of DNA for the fabrication of catalytic systems for organic synthesis \[[@B5-molecules-20-04136],[@B6-molecules-20-04136],[@B7-molecules-20-04136]\]. Within this context, advances in DNA-templated organic synthesis (DTS)---a versatile method for controlling molecular reactivity by modulated effective molarities \[[@B8-molecules-20-04136],[@B9-molecules-20-04136]\]---have generated a large volume of literature. More recently, Chandra and Silverman have reported the catalysis of Diels-Alder reactions by modified DNA-based enzymes \[[@B10-molecules-20-04136]\]. Moreover, DNA-based hybrid materials for application in asymmetric catalysis have been developed by supramolecular or covalent ligation of DNA with a metal complex bearing a specific ligand \[[@B11-molecules-20-04136],[@B12-molecules-20-04136],[@B13-molecules-20-04136],[@B14-molecules-20-04136],[@B15-molecules-20-04136]\]. However, the potential catalytic role of unmodified DNA in organic reactions has only been scarcely investigated. These studies revealed that natural DNA facilitates nitroaldol (Henry) reactions \[[@B16-molecules-20-04136]\] and Michael additions \[[@B17-molecules-20-04136],[@B18-molecules-20-04136]\] in aqueous solutions.
During one of our research programs devoted to investigate the intrinsic catalytic role of biopolymers in C--C bond forming reactions under different conditions \[[@B19-molecules-20-04136],[@B20-molecules-20-04136],[@B21-molecules-20-04136],[@B22-molecules-20-04136]\], we discovered that some buffer aqueous solutions promote the nitroaldol reaction under mild conditions and in high yields. We believe this is a very important observation due to the fact that buffered solutions are traditionally considered as inert dissolution media with few exceptions \[[@B23-molecules-20-04136]\]. However, many biological buffers are based on dissociation equilibriums of organic molecules bearing different functional groups and, therefore, they could influence other chemical transformations. Consequently, we also decided to revisit the course of the nitroaldol reaction in the presence of natural DNA, but in non-buffered water in order to provide accurate information regarding the possible catalytic properties of the DNA.
2. Results and Discussion
=========================
We chose the reaction between 4-nitrobenzaldehyde (**1a**, 0.1 mmol) and nitromethane (**2a**, 1.9 mmol) at physiological temperature as a model nitroaldol reaction to study the possible background reaction in different solvents (*i.e.*, control experiments in the absence of catalyst) before evaluating the effect of DNA ([Table 1](#molecules-20-04136-t001){ref-type="table"}). To avoid any loss of product during work-up operations, the crude of the reaction mixtures were strictly analyzed by NMR spectroscopy using a suitable internal standard (see [Experimental Section](#sec3-molecules-20-04136){ref-type="sec"}). In good agreement with our previous studies \[[@B19-molecules-20-04136],[@B20-molecules-20-04136],[@B21-molecules-20-04136],[@B22-molecules-20-04136]\], formation of the desired β-nitroalcohol **3a** was not observed in organic solvents such as THF, toluene, DMSO or EtOH (entry 1). However, **3a** was formed in high yields when 20 mM buffers MES (pH 5.5), MOPS (pH 6.5), TRIS (pH 7.5) or HEPES (pH 7.5) were used as solvent (entries 2--5). Amongst these buffers, MOPS and TRIS were the most effective, affording **3a** in *ca*. 85% yield at 37 °C within 8 h. In sharp contrast, only traces (≤4%) of **3a** were detected in distilled water (pH 6.5) (entry 6). It is worth mentioning that there are several recipes for preparing a buffering medium, including the addition of different metal salts (e.g., NaCl, MgCl~2~) especially for biochemical reactions \[[@B24-molecules-20-04136]\]. Although preliminary experiments did not show major differences in the reaction outcome caused by the presence of those salts (entries 7 and 8), we decided to run the experiments in buffers without metal ions in order to completely exclude any background participation in the catalysis of the nitroaldol reaction (entry 7). In order to avoid any shift in dissociation, we also kept constant the concentration of the buffers and we prepared them at the same temperature at which we planned to perform the reactions (37 °C). In any event, the change of the corresponding p*K*~a~ values of the buffers used in this work is very small (∆p*K*~a~ \~0.2--0.5) when prepared at the same concentration within the range of temperature between 20 °C and 37 °C. Therefore, no major kinetics differences associated to the pH of the medium can be expected during the nitroaldol reaction in buffered solutions if temperature fluctuations occur within the mentioned range. These effects may be predicted using online calculators \[[@B25-molecules-20-04136]\].
molecules-20-04136-t001_Table 1
######
Effect of solvent in the model nitroaldol reaction between **1a** and **2a**. ^a^
Entry Solvent System Yield ^e^ of 3a (%)
------- ------------------------------ ---------------------
1 DMSO, EtOH, THF, toluene 0 ^f^
2 MES (pH 5.5) 70
3 MOPS (pH 6.5) 86
4 HEPES (pH 7.5) 71
5 TRIS (pH 7.5) 83
6 H~2~O (pH 6.5) ^b^ ≤2 (4) ^g^
7 H~2~O + MgCl~2~ (pH 6.5) ^c^ 5
8 H~2~O + NaCl (pH 6.5) ^d^ ≤2
^a^ Reaction conditions: **1a** (0.1 mmol), **2a** (1.9 mmol), solvent (0.5 mL), 37 °C, 8 h. No significant change in the pH of the medium was observed during the reaction (∆pH \< 0.1); ^b^ Medium's intrinsic pH. Reaction carried out without the adjustment of pH; ^c^ Reaction performed in the presence of 50 mM MgCl~2~; ^d^ Reaction carried out in the presence of 150 mM NaCl; ^e^ ^1^H-NMR yields that correspond to the average values of at least three independent experiments; ^f^ Formation of undesired side products was detected only in the case of EtOH. No attempts were made to separate and characterize these products; ^g^ Yield after 24 h.
Different aldehydes were also tested in the nitroaldol reaction with nitromethane (**2a**) in MOPS to ensure that the observed buffer effect was not specific of 4-nitrobenzaldehyde (**1a**) ([Table 2](#molecules-20-04136-t002){ref-type="table"}). Not surprisingly, electron-poor aromatic or heteroaromatic aldehydes such as 2-pyridinecarboxaldehyde (**1c**) were converted to the nitroaldol product **3** more efficiently than electron-rich aromatic aldehydes such as 4-chlorobenzaldehyde (**1d**).
The foregoing results point out that organic buffers are not inert and can interact with reactants during a chemical process \[[@B26-molecules-20-04136]\]. Contribution of these substances in aldol-like reactions with active methylene compounds is not totally unexpected if we take into consideration the chemical structures of the buffers bearing basic centers and their dissociation constants ([Figure 1](#molecules-20-04136-f001){ref-type="fig"}), as well as different mechanisms of the nitroaldol reaction under varied conditions (e.g., base-iminium catalysis, Brønsted-Lowry acid-base dual catalysis) \[[@B27-molecules-20-04136],[@B28-molecules-20-04136],[@B29-molecules-20-04136],[@B30-molecules-20-04136]\]. Thus, the existing equilibrium between the weak acid and its conjugate base in buffer solutions makes possible their participation (at least a small molar fraction) in other reversible processes (e.g., generation of *aci*-nitro intermediate via the formation of a complex between buffer and nitroalkane) with continuous pH restoration according to Le Chatelier's principle.
molecules-20-04136-t002_Table 2
######
Nitroaldol reaction in MOPS buffer between different aldehydes **1** and **2a**. ^a^
Entry R 1 Yield ^b^ of 3 (%)
------- -------------------- -------- --------------------
1 (4-NO~2~)-C~6~H~4~ **1a** 86
2 (2-NO~2~)-C~6~H~4~ **1b** 87
3 Pyrid-2-yl **1c** 90
4 (4-Cl)-C~6~H~4~ **1d** 21
5 Furfur-2-yl **1e** 27
^a^ Reaction conditions: **1** (0.1 mmol), **2a** (1.9 mmol), MOPS buffer (0.5 mL, pH 6.5), 37 °C, 24 h; ^b^ ^1^H-NMR yields that correspond to the average values of at least two independent experiments
![Dissociation steps and pK~a~ values at 25 °C and 37 °C of the buffers used in this work (values estimated at 20 mM concentration) \[[@B26-molecules-20-04136]\]. Buffer names: MES = 2-(N-morpholino) ethanesulfonic acid; MOPS = 3-(N-morpholino)propanesulfonic acid; HEPES = 4-(2-hydroxyethyl)-1-piperazineethanesulfonic acid; TRIS = tris(hydroxymethyl)aminomethane.](molecules-20-04136-g001){#molecules-20-04136-f001}
With these results in hand, we decided to use non-buffered purified water as solvent to unequivocally establish the potential catalytic role of DNA in the nitroaldol reaction at physiological temperature. Preliminary screening of the reactions conditions (see [Experimental Section](#sec3-molecules-20-04136){ref-type="sec"}, [Table 4](#molecules-20-04136-t004){ref-type="table"}) showed that 2 mg of double-stranded DNA-sodium salt from salmon sperm (ssDNA) and tenfold molar excess of **2a** with respect to **1a** were optimal to obtain the corresponding β-nitroalcohol **3a** in good yield (80%) within 24 h. Further increase of the reaction time to 48 h enhanced the yield to 93% but also the background reaction (*i.e.*, control without ssDNA) to 15%. This is an important observation because the use of even longer reaction times may increase considerably the background reaction. Higher loadings of ssDNA did not significantly improve the yield either. On the other hand, pure samples of sodium-free single-stranded ssDNA behaved similar to double-stranded ssDNA-sodium salt. No major differences where observed with pure DNA samples obtained from different sources (*i.e.*, salmon sperm, calf thymus). Interestingly, DNA from herring sperm (hsDNA) was totally inactive in the model reaction even at higher loading. While the reason for this remains unclear, the large differences in the number of base pairs between both DNA samples (ssDNA \~2000 bp; hsDNA \~50 bp) and partial degradation of commercial hsDNA sample may be in part responsible.
Although deoxyribose sugar molecules existing in the DNA are unlikely to participate in the nitroaldol reaction, the nitrogeneous nucleobases (%G-C content of DNA from salmon testes is 41.2%) could be involved in this base-catalyzed reaction. Moreover, the phosphate groups presented in the structure of the biomolecule could also provide a catalytic synergistic effect to the nucleobases. However, further research using different sequences of DNA samples is required to fully understand the specific catalytic centers of DNA involved in this process.
At this point, different aldehydes were tested using the optimized conditions in order to ascertain the substrate scope of the reaction ([Table 3](#molecules-20-04136-t003){ref-type="table"}). Aromatic aldehydes bearing strong or moderate electron-withdrawing groups satisfactorily reacted with nitromethane (**2a**) affording the β-nitroalcohols **3** in good yields within 24 h (entries 1, 3--4 and 12). Possible byproducts such as dehydrated (nitroalkenes) or 1,3-dinitro derivatives were only observed at higher temperatures (*vide infra*). The screening also showed the influence of the substitution position on the product yield, leading to a significant decrease with the *ortho*- and *meta*-substituted aldehydes in comparison to the *para*-substituted isomer (entries 3 and 4 *vs.* entry 1). Heteroaromatic aldehydes such as 2-pyridine-carboxaldehyde (entry 6) and furfural (entry 9) were also converted into the corresponding β-nitroalcohols **3** in good and modest yields, respectively. However, aliphatic aldehydes (e.g., isovaleraldehyde) remained unreacted under these conditions, whereas low yields were obtained with benzaldehyde (entry 10), 4-chlorobenzaldehyde (entry 8) or electron-rich aromatic aldehydes (e.g., entry 11) even after longer periods of time. While being out of the scope of this manuscript, the use of phase transfer co-catalysts (e.g., CTAB) could be also considered in order to improve these yields, at least to a certain extent \[[@B31-molecules-20-04136]\].
On the other hand, we found that the yields dropped significantly when nitroethane (**2b**) was used as donor instead of nitromethane (**2a**) (entries 2, 5 and 7 *vs.* entries 1, 4 and 6, respectively). Besides the higher water-solubility of **2a** *vs.* **2b** \[[@B32-molecules-20-04136]\], these results also suggest that the size of the carbanion plays a more important role than the p*K*~a~ of the donor (p*K*~a~ (**2a**) = 10.2; p*K*~a~ (**2b**) = 8.6 \[[@B33-molecules-20-04136]\]) in this process. Moreover, slight *syn*-diastereoselectivities were found in these examples. A water-assisted cyclic chair-like transition state, formed by hydrogen-bonding between the oxygen atom of the aldehyde and the hydrogen atom of the *aci*-nitro tautomer of nitroethane, has been recently proposed to explain preferential formation of *syn* nitroaldol products in phosphate buffer \[[@B31-molecules-20-04136]\].
molecules-20-04136-t003_Table 3
######
ssDNA-catalyzed nitroaldol reaction. ^a^
Entry R (1) 1 R\' 2 Yield ^b^ of 3 (%) dr ^d^ (*anti*/*syn*)
------- -------------------- -------- ------- -------- -------------------- -----------------------
1 (4-NO~2~)-C~6~H~4~ **1a** H **2a** 80 \-
2 (4-NO~2~)-C~6~H~4~ **1a** CH~3~ **2b** 18 (46) ^c^ 1:1.7
3 (3-NO~2~)-C~6~H~4~ **1f** H **2a** 57 \-
4 (2-NO~2~)-C~6~H~4~ **1b** H **2a** 51 \-
5 (2-NO~2~)-C~6~H~4~ **1b** CH~3~ **2b** 12 1:2.1
6 Pyrid-2-yl **1c** H **2a** 84 \-
7 Pyrid-2-yl **1c** CH~3~ **2b** 64 1:1.3
8 (4-Cl)-C~6~H~4~ **1d** H **2a** 19 ^c^ \-
9 Furfur-2-yl **1e** H **2a** 37 ^c^ \-
10 C~6~H~5~ **1g** H **2a** 4 ^c^ \-
11 (4-OH)-C~6~H~4~ **1h** H **2a** 6 ^c^ \-
12 (4-NC)-C~6~H~4~ **1i** H **2a** 61 \-
^a^ Reaction conditions: **1** (0.1 mmol), **2** (1.0 mmol), ssDNA (2 mg), H~2~O (0.5 mL), 37 °C, 24 h. No significant change in the pH of the medium was observed during the reaction (∆pH \< 0.1); ^b^ ^1^H-NMR yields that correspond to the average values of at least two independent experiments; ^c^ Yield after 48 h; ^d^ Diastereomeric ratio *anti/syn* determined by ^1^H-NMR analyses.
While the DNA could be reused for several runs in the nitroaldol reaction, a gradual deactivation of the catalyst was observed after each run (e.g., the yield of the model reaction between **1a** and **2a** ([Table 3](#molecules-20-04136-t003){ref-type="table"}, entry 1) dropped to *ca*. 30% in the 4th run). Such activity lost has been also described with other catalytic biopolymers, where factors such as the evolution of intermediate imines (e.g., formation of crosslinked aminals, reduction via Cannizaro-type reactions), the use of protic solvents and large excess of donor, as well as the slow reaction kinetics, could contribute to block the basic catalytic sites \[[@B17-molecules-20-04136],[@B18-molecules-20-04136]\]. In this sense, an inefficient molecular desorption from the catalyst seems to be a critical issue in biopolymer-catalyzed nitroaldol reactions, which require future studies in this direction.
Despite the unique chiral structure of the DNA, chiral HPLC of the reaction mixtures revealed negligible enantioselectivity during the nitroaldol reaction at 37 °C in pure water. This poor enantioselectivity has been also reported for other catalytic biopolymers in aldol-like reactions \[[@B19-molecules-20-04136],[@B20-molecules-20-04136],[@B21-molecules-20-04136],[@B22-molecules-20-04136],[@B34-molecules-20-04136],[@B35-molecules-20-04136],[@B36-molecules-20-04136],[@B37-molecules-20-04136]\]. However, slight enantioselectivity (*ca*. 20% ee) could be observed when DMSO was used as solvent.
The first-order kinetic analysis of the model reaction between **1a** and **2** established a slow rate constant of *k* = (4.2 ± 0.5) × 10^−2^ h^−1^ ([Figure 2](#molecules-20-04136-f002){ref-type="fig"}A). In addition, and keeping in mind recent reports dealing with 1,4-Michael additions catalyzed by DNA in aqueous media \[[@B17-molecules-20-04136],[@B18-molecules-20-04136]\], we explored the possibility to perform a nitroaldol-elimination-Michael tandem reaction using acetophenone or cyclohexanone as Michael donor. Unfortunately, the high temperatures (*ca*. 70 °C) required for both the formation of the nitroalkene intermediate and the subsequent Michael reaction caused the competitive formation of undesired side products such as 1,3-dinitro derivatives ([Figure 2](#molecules-20-04136-f002){ref-type="fig"}B), making the tandem process too impractical under these conditions. Interestingly, control kinetics studies revealed that ssDNA also catalyzes the formation of the 1,3-dinitro derivative at 70 °C. For instance, only traces (\< 5%) of this byproduct could be detected when the model mixture **1a** + **2a** was heated at 70 °C in pure water for 24 h. However, the 1,3-dinitro compound was formed in *ca*. 30% when the experiment was repeated in the presence of ssDNA. Further investigations are in progress in this direction.
{ref-type="table"}. C~∞~ = final concentration, at infinite time; C~t~ = concentration at given time t; C~0~ = initial concentration, at t = zero time. R^2^ = 0.99. Inset: Evolution of reaction conversion over time; (**B**) Formation of β-nitroalcohol **3a**, nitroalkene and 1,3-dinitro derivatives from the reaction between **1a** (0.1 mmol) and **2a** (1.0 mmol) catalyzed by ssDNA (2 mg) at 70 °C. Kinetics profile of the 1,3-dinitro compound in the absence of ssDNA is also shown.](molecules-20-04136-g002){#molecules-20-04136-f002}
3. Experimental Section {#sec3-molecules-20-04136}
=======================
3.1. Materials
--------------
Unless otherwise indicated, analytical grade solvents and reactants were commercially available and used as received without further purification. Aldehydes (purity by GC \> 98%) were mainly purchased from TCI Europe. Milli-Q water and freshly buffer solutions were used for the experiments in aqueous solutions. Pure double-stranded DNA sodium salt from salmon sperm (ssDNA; 41.2% G-C content; molecular mass 1.3 × 10^6^ Da; *ca*. 2000 bp; CAS 68938-01-2; Cat. No. D1626), sodium-free single-stranded DNA from salmon sperm (CAS 9007-49-2; Cat. No. D7656), DNA from herring sperm (hsDNA; partially degraded; \<50 bp; CAS 68938-01-2; Cat. No. D3159) and DNA sodium salt from calf thymus (CAS 73049-39-5; Cat. No. D1501) were supplied by Sigma-Aldrich. Buffers HEPES (CAS 7365-45-9; Cat. No. H3375), TRIS (CAS 77-86-1; Cat. Nr. T1503), MES (CAS 4432-31-9; Cat. Nr. M3671) and MOPS (CAS 1132-61-2; Cat. Nr. M1254) were purchased from Sigma-Aldrich.
3.2. Methods
------------
^1^H-NMR spectra were recorded on Avance 300 or Avance 400 spectrometers (Bruker) at 25 °C. Chemical shifts for ^1^H-NMR were reported as δ, parts per million, relative to external standards. Yields and diastereomeric ratios (*anti/syn*) were determined by ^1^H-NMR analyses of the crude product in CDCl~3~ using diphenylmethane (0.1 mmol, 16.7 µL), dimethyl acetamide (0.1 mmol, 9.2 µL) or 1,3,5-trimethoxybenzene (0.1 mmol, 16.8 mg) as internal standard after complete work-up of the reaction. Relative configurations were assigned by comparison with ^1^H-NMR data reported in the literature \[[@B38-molecules-20-04136],[@B39-molecules-20-04136]\]. For instance, in the model reaction between **1a** and **2b**, the *anti* diastereomer was identified by a doublet at 4.85 ppm (*J* = 8.3 Hz), whereas the *syn* diastereomer displayed the doublet at 5.41 ppm (*J* = 2.4 Hz). For kinetics calculations, the ^1^H-NMR analyses of the reaction mixtures were performed in the presence of an internal standard as above indicated. In general, given yield values correspond to the average of at least two independent measurements with STDV ±2%--4%. Among various kinetics models, the straight lines shown in the kinetics plots correspond to the best fit of the first-order model (e.g., \[nitromethane\] ≥ \[aldehyde\]). Analytical thin layer chromatography (TLC) was performed on fluorescent-indicating plates (aluminium sheets precoated with silica gel 60 F254, Merck). Reactions were monitored by TLC and visualized by the use of the phosphomolybdic acid as stain solution and UV light (254 nm). Column flash chromatography was performed using Merck silica gel (70--230 mesh) from Merck or silica gel (100--200 mesh). Mass spectra were recorded at the Central Analytical Laboratory at the Department of Chemistry of the University of Regensburg on a Varian MAT 311A (Palo Alto, CA, USA), Finnigan MAT 95 (Bremen, Germany), Thermoquest Finnigan TSQ 7000 or Agilent Technologies 6540 UHD Accurate-Mass Q-TOF LC/MS (Agilent Technologies, Santa Clara, CA, USA). High performance liquid chromatography was carried out on a HPLC 335 detector on a 325 system by Contron Instruments (Fairfield, NJ, USA). Phenomena Lux Cellulose-1, 4.6 mm × 250 mm, 5 µm column (eluent: *n*-heptane-*i*-PrOH 70:30; flow 1.0 mL/min; λ = 254 nm) was used to determine potential enantioselectivity.
3.3. Preliminary Optimization Experiments
-----------------------------------------
The model reaction between **1a** and **2a** was carried out at 37 °C under different experimental conditions of solvent, reaction time and catalyst loading. [Table 4](#molecules-20-04136-t004){ref-type="table"} shows a selection of the most relevant experiments.
molecules-20-04136-t004_Table 4
######
Initial screening of reaction conditions. ^a^
Entry Catalyst Solvent Time (h) Catalyst Loading (mg) Conditions Yield ^c^ of 3a (%)
------- ------------------ --------- ---------- ----------------------- ------------ ---------------------
1 hsDNA H~2~O 8 10 A 0
2 ssDNA H~2~O 8 10 A 25
3 ssDNA H~2~O 24 10 A 38
4 ssDNA H~2~O 48 10 A 77
5 ssDNA H~2~O 24 2 B 80
6 ssDNA H~2~O 48 2 B 93
7 hsDNA H~2~O 24 40 B 0
8 Na^+^-free ssDNA H~2~O 24 2 B 77
9 \- H~2~O 24 \- B 4
10 \- H~2~O 48 \- B 15
11 \- DMSO 24 \- B 31
12 ctDNA ^b^ DMSO 24 2 B 76
^a^ Reaction conditions: (A) **1a** (0.5 mmol), **2a** (9.5 mmol), DNA (2 mg), solvent (3 mL), 37 °C. (B) **1a** (0.1 mmol), **2a** (1.0 mmol), DNA (2 mg), solvent (0.5 mL), 37 °C. Note that studies at other temperatures were not performed in this project. Both selectivity and kinetics data could be altered at different temperatures; ^b^ DNA sodium salt from calf thymus; ^c^ ^1^H-NMR yields obtained from the average of at least two independent experiments.
3.4. General Procedure for ssDNA-catalyzed Henry Reaction
---------------------------------------------------------
ssDNA (2 mg) was added in one portion to a mixture of 4-nitrobenzaldehyde (**1a**, 0.1 mmol, 15.1 mg), nitromethane (**2a**, 1.9 mmol, 103 µL) and solvent (0.5 mL) placed into a screw cap vial (4 mL). The resulting reaction mixture was gently stirred (250 rpm) at 37 °C for 24 h. After completion, water (1 mL) was added. The reaction mixture was washed with EtOAc (3 × 5 mL), dried over anhydrous sodium sulfate, filtrated and evaporated under reduced pressure. To determine the NMR yield, the obtained crude product was dissolved in CDCl~3~ and the internal standard (*vide supra*) added to the solution. Note: The same procedure, albeit in the absence of ssDNA, was used for studying the effect of the buffers on the reaction.
3.5. Typical Recycling Procedure
--------------------------------
After the reaction, the aqueous phase was washed with EtOAc (4 × 3 mL) in the reaction vial. After removal of the organic phase, the vial with the aqueous phase was subjected to N~2~-flow prior addition of the reaction substrates for the next run.
4. Conclusions
==============
In conclusion, ssDNA is able to catalyze the reaction between electron-poor aromatic aldehydes or heteroaromatic aldehydes and nitroalkanes at physiological temperature in pure water. The process is governed by a first-order kinetics and the corresponding β-nitroalcohols are selectively formed within 24 h in good yields. The intrinsic catalytic activity of DNA should be therefore taken into account during the development of DNA-hybrid catalysts. Moreover, this investigation demonstrated that metal-free organic buffers (e.g., MES, pH 5.5; MOPS, pH 6.5; HEPES, pH 7.5; TRIS, pH 7.5) also efficiently promote the nitroaldol reaction when they are used as reaction media in the absence of external catalysts. Finally, we would like to stress that studying the potential of biopolymers to promote selective formation of C-C bonds (a prerequisite for all life in earth), even when they performance is usually inferior to standard catalysts, could bring important insights into the molecular mechanism underlying evolution, and also help for the design of safer and "greener" catalysts in the future. It is under this perspective where our research program acquires higher relevance.
Financial assistant by Universität Regensburg and SINCHEM Program (Erasmus Mundus Action 1 FPA 2013-0037) are gratefully acknowledged. D.D.D. thanks J.J. Marrero-Tellado for helpful discussions and DFG for the Heisenberg Professorship Award.
*Sample Availability*: Not apply.
MH, MMPM, DK and AP performed the experiments. FQ contributed to results discussion. DDD designed the experiments and wrote the paper. All authors took part in data analysis and discussion.
The authors declare no conflict of interest.
|
As the water-intensive practice of fracking continues to spread, the amount of wastewater being buried in disposal wells around Texas has skyrocketed. But the wells bring concerns about truck traffic and the possibility of groundwater contamination.
In drilling regions like the Permian Basin, where the water needs of fracking have run up against a historic drought, drillers are increasingly turning to brackish groundwater previously thought too expensive to use.
Most fracking operations use several million gallons of water. But with water increasingly scarce and costly around Texas, a few companies have begun using alternative liquids, such as propane. Experts say the technology still has far to go.
In Pennsylvania's Marcellus Shale, natural gas companies recycle water as a matter of course. But recycling is only getting started in the Texas oilfields because using freshwater for hydraulic fracturing is cheap.
The amount of water used in hydraulic fracturing has stirred concerns around Texas, especially as the drought wears on. Aware that they are under the spotlight, drillers are testing out recycling and other water-saving techniques. |
Q:
What is meant by "meaning systems" in this sentence?
I read a sentence in an article in The Hindu which was:
Certainly some people identify strongly with their community, others identify weakly, and still others move on and adopt the meaning systems of another community.
I don't know what "meaning systems" mean here. Any guesses? And I don't think it is anyhow related to premises it follows and those which follow it.
A:
The term "meaning system" refers to a manner in which a person or organization attributes meaning, along with the sources of held meanings (e.g., that person or organization's community) and how they interconnect.
https://www.tandfonline.com/doi/abs/10.1080/17439760600566008?journalCode=rpos20
|
Kansas Democrat Jan Pauls and her “religious freedom” campaign have earned her a Democratic primary opponent in the 2012 election cycle and that primary opponent is gay.
“Morality” used to be the established code word for anti-gay and anti-choice discrimination. It seems that “morality” has run it’s course, however, and it is now time for new and improved phraseology to push the anti-choice, anti-gay theological agenda in Kansas. The new catch phrase for discrimination is “religious freedom” and the queen bee of spreading the pollination of religious freedom in Kansas is Representative Jan Pauls.
Representative Pauls is another one of those anti-choice Democrats that pervades the Kansas political landscape. She has served in the Kansas Legislature since 1992 and has used her time there to sponsor numerous anti-choice bills. She wrote a law prohibiting same sex marriage in the state, backed the successful state constitutional amendment to prohibit same-sex marriage, and blocked the attempted repeal of Kansas’ antiquated sodomy ban.
Religious freedom has been creating a lot of buzz nationally and red-state legislatures and red-state politicians have latched on to this discriminatory defense as the life preserver that might “save” them from the evils of Obamacare. Pauls has provided not only her vote for two Kansas bills based upon the false premise of “religious freedom,” but also her strong words of favor. She heralded the Kansas legislature’s so-called “Preservation of Religious Freedom Act” and the expansion of the existing “Conscience Refusal Act,” which both gained momentum from “Obama outrage” over contraception care afforded under the Affordable Care Act.
Representative Pauls resides in Hutchinson, Kansas. Pauls’ stance on these “religious freedom” initiatives may garner her usual votes and favor from many of her constituents at large in this conservative Kansas community, but in this election cycle there is a question as to whether or not Pauls will earn a place on the general election ballot. This time around, Jan Pauls and her “religious freedom” have earned her a Democratic primary opponent, and that primary opponent is gay.
Sex. Abortion. Parenthood. Power. The latest news, delivered straight to your inbox. SUBSCRIBE
Erich Bishop is a member of the Kansas Equality Coalition, a gay rights organization that has waged a full on political war against Pauls for her public statements, votes and actions against the gay community. Pauls, for example, made the following comment on February 20, 2012…
“If any city or county wants to put in a new group as a protected class, we are then are saying that we are not protecting the religious liberty that we protect in our civil rights act, because in the civil rights act of the state of KS we protect religion. Peoples religious rights are being affected severely, destroyed in some instances by local ordinances, because we have two equal classes in conflict. If someone’s sincere religious beliefs are such that they don’t want someone of a different sex orientation working in their daycare or private foster care facility, this says that even if their religious beliefs say that is a lifestyle they don’t approve of, they don’t want people working in those situations with the children…we are saying that their religious beliefs are trumped by another class. This is a serious situation.”
Representative Pauls’ obvious insinuation is that LGBT people cannot be trusted with children. This comment was made during committee discussion of HB 2260, The Preservation of Religious Freedom Act. The bill would allow individuals the right to sue for perceived “religious discrimination” under local non-discrimination ordinances that afford protections to LGBT citizens, so that they may live and work with protection from being fired and evicted solely due to their sexual orientation or identity.
Representative Annie Kuether, who is also a Democrat who sits on the Judiciary Committee with Jan Pauls, responded by stating:
This bill was introduced last year by those that don’t agree with same sex marriage, now here we are again same bill, same language, but we’re talking about freedom of religion. This isn’t about freedom of religion, it’s about freedom to discriminate. I believe that it’s severely overstepping the separation of church and state and the right of local control.
Representative Pauls has not only consistently sparked the ire of the Kansas Equality Coalition and it’s membership, but has also proven herself as antagonizing to women who support a the right to choose abortion and access contraception without facing discrimination. The following is taken from Jan Pauls 2012 election candidate survey from the Hutchinson News:
Question: Would you strengthen state law on abortion? How? “I have always been unflinchingly pro life, as are many fellow Democrats. I would like to see the profit motive taken out of abortion and better education for young women who are often lured into self destructive lifestyles because of the fiction that abortion is an easy option.”
The following is a Jan Pauls quote from a discussion board on “when does life begin”….
“As medical science has advanced since the 1973 decision in Roe v Wade, we submit that the fetus can now be medically determined to be clearly a separate person from his or her mother,” Rep. Jan Pauls, D-Hutchison, said at the House Judiciary Committee hearing. “Roe vs Wade stated that if personhood is established, then the fetus has a right to life guaranteed by the 14th Amendment to the Constitution and Section 1 of the Bill of Rights of the Kansas Constitution.”
Progressive Kansas Democrats have long been frustrated by conservative representation, but the general attitude from within the State Democratic Party has been quiet tolerance for those with conservative ideologies within their midst. But, Jan Pauls’ public comments in the name of “religious freedom” finally pushed State Party Chair Joan Wagnon to speak out against this elected member of her own party at a State Party Democratic Convention in February of this year.
“In the last couple of weeks HB 2260 has gotten a lot of press attention and has caught people up in a controversial discussion about what it means. It is about civil rights and it is targeted at members of the gay community. It just seems to me to be wrong, in fact, it is repugnant and hateful. We don’t support the passage of legislation that takes away human rights. One of our legislators, Jan Pauls, has been outspoken on this issue and she has supported these issues. Legislators are elected officials and we don’t all think the same. Legislators are entitled to their particular opinion and their vote as they see fit from their values and their constituents, but I need to make it clear that what the KDP (Kansas Democratic Party) believes. We believe in our platform and we do not support HB 2260.”
This statement made by the Chair of the State Democratic Party, highlights the crossroads at which the party finds itself in terms of social issues and also potential for social issues to become pivotal points of decision for Democratic voters. Kansas is not known for contentious Democratic primaries. These kinds of inter-party conflicts have long been the mark of the Kansas Republican Party. While the Democratic Party is Kansas doesn’t hold enough power within the legislature for the primary of Jan Pauls to be considered pivotal in outcome, a win for Erich Bishop could hold a symbolic and emotional significance that could propel progressive Democrats to challenge conservative incumbents across the state. And word on the street is that Mr. Bishop stands a very good chance of beating Hutchinson’s standing Democratic incumbent.
Only time will tell and in the meantime, you will find Jan Pauls living in her church and praying for a win in her August 7th Democratic primary election. |
Our Symbol: The Flaming Chalice
A flame within a chalice is the primary symbol of the Unitarian Universalist faith tradition. You’ll see it many times during a visit to our church.
We open many of our gatherings, including Sunday services, by lighting the chalice and reciting our congregational covenant. In this way we create a space for reflection, prayer, meditation, and fellowship. At the end of a gathering, we say closing words together, and extinguish the flame.
The flaming chalice as a symbol of Unitarian Universalism has its origins in World War II. The Unitarian Service Committee, formed in 1940, worked to aid European refugees fleeing Nazi persecution. Hans Deutsch, an Austrian artist, was asked to create a symbol for the Committee. A symbol would not only give their efforts an official appearance, but also let Committee agents recognize one another.
Variations on the flaming chalice theme may incorporate additional symbolism. Many are enclosed by a circle or double circle, like the example below, representing eternity, wholeness, and the endless cycles of life. The chalice with its flame forms a cross, recalling the Christian ideals of love and sacrifice. To Unitarian Universalists today, the flaming chalice is a symbol of hope and love, along with the sacred, the quest for truth, the warmth of community, and the light of reason.
Community Church’s logo, visible at the top of this page, is uniquely ours, incorporating a beloved 200-year-old pecan tree that is a fixture on our property.
Announcements
Cottage/Safe Congregation Meeting - Our final Cottage/Safe Congregation meeting on new gun laws and our Church, will be held Wednesday, March 4, 6-7 pm in the sanctuary.
Communion of Names - Please write your Joys and Concerns in the book at the back of the sanctuary before the service begins so that they can be shared during the service. All items will be passed to the Caring Committee. |
Q:
How do I load an aggregate object from db in AxonFramework or any other Event-Sourcing frameworks?
I've had the question for a long time. For most samples on Internet. They always creat one aggregate object first and then operate the aggregate objects. My question is, how can I load one from db other than create one every time. I'll take e-sopping as an example. I treat one product as an aggregate object. I can't load all of them into my program memory. So how can I do?
What I do is, I write another constructor whit the parameter UpdateProductCommand as well as the constructor with parameter CreateProductCommand. In this constructor, I load it from db.Is this OK?
class Product{
public Product(){}
@CommandHandler
public Product(CreateProductCommand command){
apply(new CreateProductEvent(command.id));
}
@CommandHandler
public Product(UpdateProductCommand command){
load(command.id)
...
apply(new UpdateProductEvent(command.id));
}
}
A:
I am assuming that you want to use State-Stored Aggregates and you can check the link for more info.
To give you some light, I would have to see which field have you marked with @Id and @AggregateIdentifier but assuming you have one String id (which is your command.id and the @TargetAggregateIdentifier as well), Axon is responsible for loading the Aggregate from the database based on that field. Having said that, you don't have to take care of it yourself, just focusing on your business logic (which means validations) and applying new values when needed.
|
Betsy Hart
Betsy Hart aka Betsy Meade (born c. 1963) is a professional writer for the conservative organization The Heritage Foundation, syndicated columnist for the Scripps Howard News and conservative commentator who is a frequent contributor to CNN and the Fox News Channel. She also appeared frequently on ABC's show Politically Incorrect.
Works
Hart wrote a column on family and cultural issues titled “From the Hart”. The column is distributed each week to hundreds of newspapers all over the country. It appears regularly in mainstream newspapers such as the Chicago Sun-Times, the Rocky Mountain News, the Boston Herald, The Washington Times, among many others. Her radio program is titled "It Takes a Parent" and is featured on Chicago’s WYLL/AM1160 radio.
Appearances
Hart has also appeared on The Oprah Winfrey Show, where she was featured as one of America’s top five women columnists.
Family
Hart is the mother of four children and author of the book It Takes a Parent: How the Culture of Pushover Parenting is Hurting Our Kids... and What to Do About It. She is currently working on her next book Let's Look at Things a Little Differently. She is divorced her husband after 17 years of marriage and has since married Thomas Meade, a professor of chemistry at nearby Northwestern University. Betsy switches between identifying herself as Betsy Meade and Betsy Hart. She is raising her four children in Wilmette, a suburb of Chicago.
Views
Hart believes that production and consumption of organic food is less safe and more expensive than conventionally produced food, although she admits that if "people want to spend more on the stuff, that’s their deal." She does not believe that global warming is primarily a man-made condition. She thinks that comedy should not include cursing or masturbatory gestures. She also believes that schools not celebrating with Halloween parties is scary and Orwellian.
Education
In 1985 she graduated from the University of Illinois with a B.A. in Russian Studies.
References
External links
Jewish World Review Archives
Betsy Hart's Weblog
Category:University of Illinois at Urbana–Champaign alumni
Category:1960s births
Category:Living people
Category:American bloggers
Category:American columnists
Category:Commentators
Category:E. W. Scripps Company people
Category:21st-century American non-fiction writers |
With one start in between, Keegan Thompson picked up where he left off in the Carolina League.
The Cubs' 18th-ranked prospect gave up one hit over 6 1/3 innings in his second Double-A start on Saturday, pitching Tennessee to a 2-0 blanking of Chattanooga at Smokies Stadium.
"He had everything working tonight," Smokies pitching coach Terry Clark said. "His fastball was really on. When he missed, it was in a really good spot. He worked the hitters in really well, he was hard in on them. His curveball was really good, his slider was good. Changeup was outstanding. He had all four pitches really working tonight, he just did a really good job."
Thompson (1-1) lasted three innings in his Southern League debut on June 23 against Mobile and surrendered eight runs on nine hits. But in his final start for Class A Advanced Myrtle Beach on June 14, he pitched seven perfect frames.
"Believe it or not, the mound in Mobile is one of the worst in the league; all my pitchers struggle with it," Clark said. "To get the ball down in the zone was tough. It was also his first start, so he was a little hyped up and just up in the zone. But today he really pitched down in the zone well. He was in the bottom of the strike zone and really went out front of them and got on top of all his pitches. It was really fun to see after he had a bad start the first time. He turned around and showed what he could do."
Instead of mirroring that one bad start, Thompson was closer to the high note on which he ended his Carolina League stint.
Gameday box score
"The biggest change for him is these guys won't swing at a pitch in the dirt very often," Clark said. "He's going to have to push the issue and throw all his breaking pitches for strikes and his fastball for strikes to get them to understand that you do throw a lot of strikes. Then, if you do go out of the zone, they can chase it, but if you don't throw a first strike they're not going to swing at it. He did a great job with that tonight. He threw everything in the zone, but he when he wanted to he went outside of it and they chased it a couple of times."
The right-hander wasn't perfect on Saturday as he opened the game by walking Jimmy Kerrigan . But he retired the next 16 Lookouts before Alex Perez lined a one-out single to center field in the sixth.
"When he walked the first guy, they were on pretty good pitches, so I was like, 'OK, we'll see what he's made of tonight. Is he going to back off?' No, he didn't at all. He went right after the next guy, got him out, then the next guy," Clark said. "And we're sitting here like, 'Wow, he has a no-hitter after five.'"
Thompson struck out Sean Miller and retired Kerrigan on a fly ball to left to end the inning, then fanned Twins No. 7 prospect Brent Rooker to begin the seventh. He exited after walking Andy Wilkins .
Wyatt Short retired all four batters he faced and Jake Stinnett struck out two in a 1-2-3 ninth for his third save of the season. It was the Smokies' fifth shutout of the season.
Cubs No. 22 prospect Zack Short provided the Tennessee offense with a two-run homer in the sixth.
Chattanooga's Dietrich Enns (0-1) gave up two runs on four hits over seven innings, walking one and striking out five. It was his first since he was reassigned from Triple-A Rochester.
Marisa Ingemi is a contributor to MiLB.com. Follow her on Twitter @Marisa_Ingemi. |
Q:
Using graphics in FlashDevelop
I've been programming ActionScript 3 for some while and I've recently decided to ditch Flash Professional in favour of FlashDevelop. I'm glad of the choice, but I eventually found a small problem: Since I don't have access to Flash Professional's graphics library there's a lot of code that tries to reference non-existent clips. Let's work with this example where MC1 is an element of the FlashPro library:
public class GraphicElement
{
public var clip:DisplayObject;
function GraphicElement(theClip:DisplayObject)
{
this.clip = theClip;
}
}
//And in another Class:
var myGraphic:GraphicElement = new GraphicElement(new MC1() as DisplayObject);
In FlashDevelop, "new MC1()" means nothing. How do I import graphics to use with the DisplayObject class?
A:
Fixed. What I said was a very complicated phrasing for "How do I embed images to my project?" Found the answer here: http://www.streamhead.com/how-to-use-images-in-actionscript-3-with-flashdevelop-and-some-other-as3-tips/
|
<div class="overlay">
<div class="overlay-content">
<div class="overlay-heading">
Welcome to the GraphQL tutorial app
</div>
<div class="overlay-message">
Please login to continue
</div>
<div class="overlay-action">
<Button
id="qsLoginBtn"
type="button"
class="btn-margin loginBtn btn btn-primary "
(click)="loginHandlerWrapper()">
Log In
</Button>
</div>
</div>
</div> |
let rec fib n = match n with
| 0 -> 0
| 1 -> 1
| n -> fib (n-1) + fib (n-2)
let x1 = fib 1
let x2 = fib 2
let x3 = fib 3
let x4 = fib 4
let x5 = fib 5
let x6 = fib 6
let x7 = fib 7
let x8 = fib 8
let x9 = fib 9
(*!
// This is C++ code.
#include <cassert>
int main () { // We use printf in order to output readable assembly code.
// check the unsorted list
assert(x1::val == 1);
assert(x2::val == 1);
assert(x3::val == 2);
assert(x4::val == 3);
assert(x5::val == 5);
assert(x6::val == 8);
assert(x7::val == 13);
assert(x8::val == 21);
assert(x9::val == 34);
return 0;
}
*)
|
package com.code44.finance.ui.common.recycler;
import android.graphics.Canvas;
import android.graphics.Rect;
import android.support.v4.util.LongSparseArray;
import android.support.v7.widget.RecyclerView;
import android.view.View;
import android.view.ViewGroup;
import java.util.HashSet;
import java.util.Set;
public class SectionsDecoration extends RecyclerView.ItemDecoration {
private final LongSparseArray<RecyclerView.ViewHolder> activeViewHolders = new LongSparseArray<>();
private final Set<Long> drawnHeaderIds = new HashSet<>();
private final RecyclerView.RecycledViewPool recycledViewPool = new RecyclerView.RecycledViewPool();
private final boolean isHeaderFixedSize;
private final int heightMeasureSpec = View.MeasureSpec.makeMeasureSpec(0, View.MeasureSpec.UNSPECIFIED);
private int widthMeasureSpec;
public SectionsDecoration(boolean isHeaderFixedSize) {
this.isHeaderFixedSize = isHeaderFixedSize;
}
@Override
public void getItemOffsets(Rect outRect, View view, RecyclerView parent, RecyclerView.State state) {
super.getItemOffsets(outRect, view, parent, state);
final Adapter adapter = getAdapter(parent);
if (adapter == null) {
return;
}
if (!hasHeader(adapter, view, parent)) {
return;
}
if (widthMeasureSpec == 0) {
widthMeasureSpec = View.MeasureSpec.makeMeasureSpec(parent.getWidth(), View.MeasureSpec.EXACTLY);
}
final int position = parent.getChildPosition(view);
outRect.top += getViewHolder(adapter, parent, adapter.getHeaderId(position), position).itemView.getMeasuredHeight();
}
@Override
public void onDrawOver(Canvas c, RecyclerView parent, RecyclerView.State state) {
super.onDrawOver(c, parent, state);
final Adapter adapter = getAdapter(parent);
if (adapter == null) {
return;
}
drawnHeaderIds.clear();
final RecyclerView.LayoutManager layoutManager = parent.getLayoutManager();
for (int i = 0, childCount = parent.getChildCount(); i < childCount; i++) {
final View view = parent.getChildAt(i);
final int position = parent.getChildPosition(view);
final long headerId = adapter.getHeaderId(position);
if (!hasHeader(adapter, view, parent)) {
if (!drawnHeaderIds.contains(headerId)) {
final RecyclerView.ViewHolder viewHolder = activeViewHolders.get(headerId);
if (viewHolder != null) {
activeViewHolders.remove(headerId);
recycledViewPool.putRecycledView(viewHolder);
}
}
continue;
}
drawnHeaderIds.add(headerId);
drawHeader(c, getViewHolder(adapter, parent, headerId, position), layoutManager, view);
}
}
private Adapter getAdapter(RecyclerView parent) {
final RecyclerView.Adapter adapter = parent.getAdapter();
if (adapter instanceof Adapter) {
return (Adapter) adapter;
}
return null;
}
private boolean hasHeader(Adapter adapter, View view, RecyclerView parent) {
final int adapterPosition = parent.getChildPosition(view);
if (adapterPosition == 0) {
return true;
}
final long currentHeaderId = adapter.getHeaderId(adapterPosition);
final long previousHeaderId = adapter.getHeaderId(adapterPosition - 1);
return currentHeaderId != previousHeaderId;
}
private RecyclerView.ViewHolder getViewHolder(Adapter adapter, RecyclerView parent, long headerId, int position) {
RecyclerView.ViewHolder viewHolder = activeViewHolders.get(headerId);
if (viewHolder != null) {
return viewHolder;
}
viewHolder = recycledViewPool.getRecycledView(-1);
if (viewHolder != null) {
if (isHeaderFixedSize) {
bind(adapter, viewHolder, position);
activeViewHolders.put(headerId, viewHolder);
return viewHolder;
}
bind(adapter, viewHolder, position);
measure(viewHolder);
activeViewHolders.put(headerId, viewHolder);
return viewHolder;
}
viewHolder = adapter.onCreateHeaderViewHolder(parent);
bind(adapter, viewHolder, position);
measure(viewHolder);
activeViewHolders.put(headerId, viewHolder);
return viewHolder;
}
private void bind(Adapter adapter, RecyclerView.ViewHolder viewHolder, int position) {
//noinspection unchecked
adapter.onBindHeaderViewHolder(viewHolder, position);
}
private void measure(RecyclerView.ViewHolder viewHolder) {
viewHolder.itemView.measure(widthMeasureSpec, heightMeasureSpec);
}
private void drawHeader(Canvas canvas, RecyclerView.ViewHolder headerViewHolder, RecyclerView.LayoutManager layoutManager, View view) {
headerViewHolder.itemView.layout(0, 0, headerViewHolder.itemView.getMeasuredWidth(), headerViewHolder.itemView.getMeasuredHeight());
final int top = layoutManager.getDecoratedTop(view);
canvas.save();
canvas.translate(0, top);
headerViewHolder.itemView.draw(canvas);
canvas.restore();
}
public static interface Adapter<VH extends RecyclerView.ViewHolder> {
public long getHeaderId(int position);
public VH onCreateHeaderViewHolder(ViewGroup parent);
public void onBindHeaderViewHolder(VH viewHolder, int position);
}
}
|
Menu
Gridiron Rhetoric: Week 3
[Cross blogged for Leland Quarterly]
If you’re a fan of Stanford Football on Facebook—and you should be, seeing as there’s no greater way to declare your undying love for something than that alluring thumbs-up button on Facebook—you may have noticed some swanky new uniforms heading the Cardinal’s way for our game against Notre Dame in November, courtesy of Nike (and, I imagine, Nike’s founder Phil Knight, of Knight Management Center fame).
Awkward turtle.
If you then watched Nike’s debut video, you may have noticed this quote in between action shots of jukes and cleats:
C A R D I N A L R E Dis a rich metaphor for the very pulse of life.“forever and forever stanford red.”
Nike’s right, it’s a pretty decent metaphor. A rich red conjures up images of the heart, blood, vitality, etc., etc., etc. But I’d disagree with the “life” part. Football rhetoric is all about crushing your opponent into a bloody pulp. That’s what the blood-and-thunder color red is all about: death, destruction, rampaging and pillaging, extermination previously unknown to mankind. There’s a reason tackling the quarterback for loss is called sacking—it can be devastating.
Nowhere is this violent rhetoric more evident than in a university’s fight song, exhorting its vicious football warriors to dismember, maim, trample, and otherwise decimate its opponent. Which is why Nike goes on to quote from Stanford’s (official) fight song in that last line.
…Except our official fight song is called “Come Join the Band,” and the most violent lyrics are “When Stanford Red has won the day / Praising her name / Onto the field we’ll force our way.” It’s all about cheering and being supportive. No ad hominem attacks, no threats of violence, not even a single mention of the word “fight.” Even our de facto fight song, Free’s “All Right Now,” isn’t particularly violent, though it does smell slightly of a not-entirely-kosher sexual encounter.
Now, let’s compare our fight songs to some of the others in the Pac-12:
Our opponents this week, Arizona, have “Fight Wildcats Fight!,” which describes them as “A raging team of Wildcats / Growling for the fray” that will “Circle the ends and crash thru center, / Hit hard and gain on ev’ry play.”
“Mighty Oregon” urges its listeners to “Roar the praises of her warriors / Sing the story Oregon / On to victory urge the heroes”—downright Homeric.
USC’s fight song, “Fight On,” contains the lyrics “fight on,” and frankly not much else. They also have a warhorse. God, I hate that horse.
And the University of Washington? That red-bricked institution in the peaceful northwest, sitting calm under that serenely clouded sky, among its cherry trees and coffee houses? It’s fight song is called “Bow Down to Washington.”
Let’s face it, “Come Join the Band”—or even “All Right Now”—isn’t the most confrontational song. But we’re an erudite bunch here in Palo Alto. Leave the petty fisticuffs to that other riffraff. |
Q:
wordpress permalink set while create a custom post using code "register_post_type"
I have tried with set permalink when create a custom post: permalink structure "custom_post_name/year/month/post-id".
i have tried some following code but not work
add_action( 'init', 'video' );
function video() {
register_post_type( 'video',
array(
'labels' => array(
'name' => 'Video',
'singular_name' => 'video',
'add_new' => 'Add New',
'add_new_item' => 'Add New',
'edit' => 'Edit',
'edit_item' => 'Edit',
'new_item' => 'New',
'view' => 'View',
'view_item' => 'View',
'search_items' => 'Search',
'not_found' => 'No Video found',
'not_found_in_trash' => 'No Videos found in Trash',
'parent' => 'Parent'
),
'public' => true,
'menu_position' => 15,
'supports' => array( 'title', 'editor' ),
'rewrite'=>array('slug'=>'/video/%year%/%monthnum%/%post_id%/'),
'has_archive' => true
)
);
}
A:
'rewrite' => array('slug' => '/video/%year%/%monthnum%/%post_id%/', 'with_front' => FALSE)
This will solve your problem, and don't forget to goto [Settings -> Permalinks] and Save the changes for taking effect.
|
Q:
Create a Li-Polymer Battery Charger
I want to Create a battery Charger with the Arduino with real time battery status. I don't have any idea how to do that same time as the charging.
I know to use a serial monitor to get battery status but not to charge.
I would like to know how to do that simultaneously so that I don't over charge the battery.
This is the battery for Lumia 822
Nokia BP-4W 1800mAh 3.7v 6.7Wh
A:
(1) A simple method
BEST method is to use a proper charger - they are not high cost if you look around and doing it properly extends precious battery life.
Next best in this context is my "better" method in 2. below.
BUT, given the system you say you are using now, the following very simple method will greatly improve your result and ave your battery from an early death.
You need a 1 Ohm resistor and a voltmeter that you can trust to read a 4.1V votage accurately. Without these the simple method risks battery damage or destruction - just as your present method does.
Warning: Straight connection to a USB port is very unwise but may be viable if the port current-limits.
If the current is ever higher than the rated maximum then battery destruction may occur.
If the battery voltage ever exceeds 4.2V at room temperature battery damage WILL occur and battery destruction may occur.
Worst case a badly treated battery can turn into a flaming inferno in seconds.
A usably OK result can be gained by:
(1) Calculate Imax = same mA as battery mAh capacity.
LOWER is OK. Higher is not.
eg 1200 mAh battery = 1200 mA max and say 1000 or 500 or lower mA is OK.
(2) Connect a ONE OHM resistor in USB to battery line.
(3) Connect discharged LiPo battery to USB port via 1 Ohm.
(4) Measure voltage across the resistor. The voltage will be 0.001 Volt for every mA that flows. eg
1000 mA gives 1.000 Volt
789 mA gives 0.789 V.
1234 mA gives 1.234 V. etc.
If the measured mA is LESS THAN Imax in (1) above then this is OK to charge with.
(5) Use Arduino analogRead() function WHILE CHARGING to measure battery voltage.
BE SURE that the voltage that you read with the Arduino matches what a quality meter says.
When Vbattery (measured from Bat + to Bat- AT the battery) measures 4.1 V STOP CHARGING, remove voltage.
Battery will be perhaps 70% charged and will have a long cycle life (if not already damaged).
For 10 bit ADC = 1024 counts total (0-1023) then
for 5V reference 4.1V count = 4.1/5 x 1023
= 838 counts.
Using 830 counts to start with is safer.
When battery is at the upper charge limit, and before removing Vcharge, measure voltage at battery with calibrated quality meter. Result should be 4.1V using above system.
Even with a quality calibrated meter NEVER exceed 4.2V - and 4.1V is better.
The BEST method is to use a proper charger - they are not high cost if you look around and they extend precious battery life.
._______________________________
(2) A better method:
LiIon (Lithium Ion)and LiPo (Lithium Polymer) batteries are functionally the same for charging purposes. I'll use the term "LiPO" from here on. I'll assume single cell batteries as most in cellphones and similar are. If the terminal voltage is between about 2.5V (should really be higher) and 4.3V they are single cell,
LiPo batteries have 4 main charge areas.
Under about 2V = dangerously dead. Discard
2V to about 3V = under voltage - charge very slowly
3V to 4.2V = charge at CC = Constant Current.
On reaching 4.2V charge at CV = Constant Voltage until current reduces "automatically" (under battery chemistry control) to about 1/4 x max rate.
Max charge rate is set by the manufacturer but is almost always the numerical mAh rating in mA. eg for a 1000 mAh battery max rate is 1000 mA. For a 3300 mAh battery it's 3300 mA etc. In a very few cases it is lower - maybe =half standard values and for a very small number of cells its higher - assume you do not have those.
Max voltage MUST NOT exceed 4.2V at room temperature. Lower, say 4.1V, does no harm and increases battery cycle life while slightly reducing capacity per charge.
The battery mAh rating is known as "C".
If C = 1200 then a cahrage rate of 1200 mA = C/1,
a charge rate of 300 mA = C/4,
a charge rate of 12 mA = C/100 etc
An easy charging method that gives long cycle life and about 70% to 80% of max possible capacity and a fast charge is
Determine max charge rate = C = Imax = same mA as battery has mAh capacity.
If Vbattery is < 3V, charge at C/20 or less until Vbattery reaches 3V.
If Vbattery never reaches 3V it is dead.
When V_battery = >= 3V, charge at C/1 until Vbattery = 4.2V ( or 4.1V)
Finished!.
Remove applied voltage. DO NOT EVER leave 4.2V applied to a charged battery.
A more usual method that is only slightly harder is.
Monitor charge current.
Charge as above until Vbat = 4.2V.
While holding Vbat at 4.2V monitor charge current. This will fall as the battery absorbs additional charge.
When Icharge falls to C/2 or C/4, stop charge. C/4 adds slightly more charge than C/2 but shortens cycle life.
Again - DO NOT leave 4.2V applied to battery once charged. Doing so will destroy the battery rapidly. Remove all voltage once charged.
.______________________________
Battery University:
Charging Lithium Ion & LiPo
Increasing lifetime
Index
.______________________
Q&A
Q: This is a 3.7v battery by giving 4.2v will it destroy it or are you referring 4.2v to explain the concept.
Read the above material and the battery university pages.
4.1 V ABSOLUTE MAXIMUM is what I recommended.
Most LiPo single cell batteries are labelled as 3.6 V or 3.7 V as that is approximately the average voltage across the discharge cycle.
When fully charged they are at about 4.2 V (or 4.1 V if you take my advice - which you should :-).
As they discharge the voltage falls and by the time they get to just above 3 V they are essentially fully discharged. They should never be discharged below 3 V as it damages them and there is only a tiny amount of energy left.
So 4.1 V ABSOLUTE MAXIMUM is good
MEASURED WHILE CHARGING and
AT the battery terminals or very close to them.
ie no long leads or resistors or connectors.
If using an Arduino to measure battery voltage, connect an Arduino ground lead to battery negative with as short a wire as practical and the ADC +ve input to the battery +ve at the battery connection point.
So once more: A LiPo battery labelled as 3.6V or 3.7V can and should be charged to 4.1V maximum and never discharged to below 3V.
|
An apartment is currently being built with a total floor area of 140 square metre and would like to develop 3D drawings of the different possible interior designs for visualization. All technical 2D drawings will be provided.
Expected deliverable:
1. 3 different interior design visualizations in 3D prints. No need for video rendering.
2. Expected delivery of project - Within 45 days of acceptin...
Need experienced interior designer, who ideally finish up task on time. High proficiency in AutoCAD, Photoshop, Sketchup. We are looking for go-getters who can handle a design project from start to finish and deliver the same to our clients with utmost customer satisfaction
I need someone who can add something to my 3D model in Rhino 3d,
- Interior stair case for interior
-3 slabs
-put the model in a green site
I have the model but i need this additions to the model
,it should be rhino
A professional architect is required to design an external interface (3D) for a gas station with an area of 10,000 square meters with a promising interior design for a supermarket and a car service, and also make drawing for their details.
note: an architectural plan exists.
Renovation includes extension to four bedrooms and additions of en-suites for each; relocation of main entrance and new overhang; complete kitchen gut, relocation of new kitchen; more open concept flow between kitchen dining and living room; L-shaped stoep addition with stack doors. Plans drawn up waiting council submission. There is going to be quite a bit of demolition to get to open flow I desi...
I am looking for concept art for a futuristic, luxury, building complex. I will award twice, one for best exterior design and once for best interior design, the same artist can be awarded both if they provide the best entry for both.
The building should seem luxurious, and a little futuristic. A place where you will be greeted for other activities away from the building, but with areas to spen...
Hi,
I need to develop two image graphics that will look like the attached digital ad (Sample i.e., report cover lying on top of an open spread that shows two interior pages). I need to develop two ads that will feature images alone (no text). Both ads will feature an open booklet, showing the left and right interior spread, and another booklet that will lie on top of the open spread. The booklet ...
I am looking for concept art for a futuristic, luxury, large transport drone. I will award twice, one for best exterior design and once for best interior design, the same artist can be awarded both if they provide the best entry for both.
This will be a large vehicle, able to transport roughly 10 people, about the size of a personal jet. No cockpit needed, there will be no pilot, use all interio...
I want to create 3D animated drawings for the inside of a typical masjid that show movable partitions separating the masjid into 3 zones. The first zone is the first 3 lines of prayer mats, the second zone is the next 10 lines of prayer mats and the third zone includes the rest of the masjid. The partitions are triple glaze glass, movable in embedded tracks in the floor so they can open and close ...
I have just bought this small condo in Montreal which is ugly but I do not have much budget. So, I need a creative affordable design for the entire condo. I would like an open concept for the kitchen. Here is the link of the condo which is still on the Realtor.
[log ind for at se URL]%A9al-saint-laurent-others#view=neighbourhood
Thanks much,
Lubna
I need the base of this school bus made in 3D model. This includes the roof, bus two side bodies, front, back, details, and possibly hood. I also need the interior ceiling made inside. This will have to be made in midpoly in Blender. If you can take on this project, take on it. It must look how it is all the way in the photos. I will discuss further information via chat.
Dear all,
Kindly review the attached villa drawings files ,
And sample modern interior design
Looking for architecture who have good experiences
In modern interiors design to design all furniture and light and decorations ,
As well to provide all material list details .
Please only modern interior design people to bid
I have a shop in greece which is in retail and i do sell interior and exterior colors , plumbing , tools etc and i want to start an online image related to my store , im looking for a branding name and a logo idea for my business which is located in greece plus a domain availability for that name , i dont want a greek name , just a catchy related english name which i can evolve and relate with my ...
We are looking for a PP designer. The PP will be used to present our company to architects, interior designers and sophisticated owners. Our website would be an example of the type of project we pursue. We design sound, video, and lighting systems for hotel casinos, concert venues, stadia, arenas, nightclubs, and corporate environs. [log ind for at se URL]
We are looking for a 3D person who can convert conceptual views & references into realistic renders.
Sketchup file(2017) will be provided with all required furniture layout & material/color theme....you can replace or add furniture & fabric if required for enhancing views but try to keep color theme as provided
Also some reference images will be also share to get more clarity about c...
We are the distributors of LG Hausys' Benif (Interior Film) all over South India and LG Hausys' Hi-macs(Solid Surface) all over Karnataka. We want a video that would explain the ease of using Benif, it's ease in applicability and it's pros
I need a signature logo for my new design office. We will be designing interior design, architecture projects, and 3d rendering as a service.
-My company name is Design Flamingo.
- Flamingo should be represented in the logo.
-Our principles are being simple and elegant.
Both of these principles should be represented by our logo!
The logo will be used in the website and instagram and also for ...
I'm looking for a 3D designer to create 3D models to be used for printing small statues for interior design. The models will all be bulldog themed. I posted this before but didn't have time to progress it, now I have the time so reposting
I have a preliminary design on Chief Architect. It needs to be completed, such as adding interior features, completing the roof (flat trusses, flat parapet roof), exterior window overhangs, porch, front entrance, stone cladding, etc. I would need some renderings. I would also need a framing plan. |
Strato Pi – An Industrial Raspberry Pi - camtarn
https://www.sferalabs.cc/strato-pi/
======
nimbius
Ive worked in industrial manufacturing before, and I presently work as an
engine mechanic in a small chain of midwestern diesel repair stores. I use
_regular_ raspberry pi's to pull data from ECU/OBD systems, and I even store
that data on a PI server as part of a customers work ticket data.
the problem with anything thats 'industrialized' is that so many companies use
this as a chance to gin up the price and double down on rent-seeking behavior.
This thing takes a $45 pi and jacks the price up to $250USD. Some of the
goofier features include:
\- on-board buzzer. You know, because over the constant din of lathe, shave,
and heat treat assembly line systems you're surely going to pay attention to
the buzzer from something the size of a pack of smokes. anything essential
should be shown on the light tower or picked up by QA.
\- standard RS-232 and RS-485 interfaces to the Raspberry Pi serial line, with
opto-isolator and electrostatic discharge protection: Motoman, Fanuc,
Mitsubishi, and almost every other automation hardware have used cat5 for a
decade. doesnt the pi have grounded cat5?
CAN network support - god no. This jumps into the realm of medical systems,
elevator controls, and passenger vehicles. all of these are made of
intrinsically isolated circuits and go through some of the most rigorous
testing imaginable. For example, RF leakage common in a PI could cause
aberrant failures or signaling problems in robotics that arent expecting it.
CAN type controllers can withstand shock/heat/humidity many times that of what
a normal computer can handle. Introducing the PI as a CAN device is asking for
grievous bodily harm as a service.
~~~
joshvm
On the pricing front. I've designed systems which use the RPi as a base and
are sold for several hundred pounds (spectrometers).
The reason is basically margin and not going out of business. If you want to
make any money, you need to sell at around 3x your BOM cost to compensate for
distribution, optional sales events, labour, amortised certification costs and
so on.
Working backwards, $250 means about $85 in parts. A custom printed DIN rail
case probably costs $15-20 in small volume, the Pi is $45 and that only leaves
$20 or so for the PCB and components which seems easy enough if they've over-
specced it for industry. I wouldn't be surprised if this thing costs $100 to
build; not including labour, packaging and shipping.
This is a classic "I'm an engineer and could build this for 1/3 the price" \-
sure you could. But you couldn't sell it that cheaply and make a business out
of it.
~~~
jjeaff
Doesn't sound like he's saying that. Sounds like he is saying the $35 model
will work just fine. And it is already proven and produced on a mass scale.
~~~
joshvm
This is an extension kit to a well designed and well adopted embedded system.
The OPs complaints to me read as: nobody wants these features because the
stock model works for OP, and that the price was jacked up to cater to an
industrial market. I addressed the second point above - to stay in business,
hardware costs money.
On the first point, the product definitely provides benefits over the stock
Pi. If you need those improvements, you need them. The $35 model will die if
you plug in a logic level that isn't 3V3. It certainly won't handle standard
RS-232. It doesn't have a proper power jack - either USB Micro or two GPIO
pins (no latching). It also doesn't come with a DIN rail mounting system, nor
an RTC, nor a UPS, nor a good voltage regulator. Some people might want those
features (I've worked jobs where they would have been useful.)
Also on the buzzer front - not all DIN boxes are in factories. They're used
inside buildings for power distribution and fuses, in greenhouses to control
irrigation systems. These aren't necessarily noisy environments.
------
snops
The big problem with using the raspberry pi in industrial applications is the
single source and short production lifespan gauruntee (6 years [1]) making
maintainance or long term production difficult. Industrial machines (e.g.
printing presses) will easily last decades, and you often hear of problems
finding suitable replacement electronics for them, so basing your control
system on a single sourced component is a bit dangerous.
Other single board computers or system on module offer 10 year production
lifetimes from introduction, e.g Variscite. This is possible as the
manufacturer of the SoC (generally NXP or TI) also gauruntee to produce the
silicon for 10 years, and as (unlike Broadcom) they will sell to anyone,
alternative boards are available with the same processor should one board
manufacturer go bust. They are a bit more expensive, but a trivial percent of
the overall cost for an industrial application, and the difference isn't that
much once you add a case, protection, industrial power supply etc.
1\.
[https://www.raspberrypi.org/forums/viewtopic.php?t=193995](https://www.raspberrypi.org/forums/viewtopic.php?t=193995).
------
halbritt
I've been testing this one from Balena (formerly Resin)
[https://www.balena.io/fin/](https://www.balena.io/fin/)
It's a carrier for the Raspberry Pi compute module. Solves many of the
problems it has in an industrial environment. It takes 6-24vdc, has real eMMC
storage, an RTC, a hardware coprocessor that can be used as a watchdog and an
mPCIE. I think there's a DIN case for it as well.
All that for a bit over a hundred dollars plus the $40 for the compute module.
That seems pretty decent at that price. The next step up seems to be a "cheap"
x86 IPC at a few hundred dollars.
------
kehrlann
I've had numerous failures on older RPi models due to SD card corruption, even
in non-write intensive contexts. Not sure this is good enough when you want
reliability...
~~~
TickleSteve
Thats a well known issue with standard distributions, and there are fairly
well known ways around it...
Basically, don't do continuous writing to the card, turn off atime
updates,possibly even work entirely from the initrd if possible. Also, use
proper industrial sd cards, these have proper wear-levelling and bad-block
management unlike the consumer cards.
In other words, treat it as an embedded system and tailor it to your use-case.
~~~
sgt
I've tried all these "ways around it", but SD card corruption still happens on
Raspberry Pi's. We use them as dashboards around the office so having them
running 24/7 really tests these devices.
I've found that the only working recipe for a stable Raspberry Pi is a USB
hard drive (prefer SSD but mechanical also fine), and a UPS.
My simple advice is: do not try to run Raspberry Pi from SD cards in
"production" under any circumstances on a large scale, as you will run into
filesystem corruption and create a lot of work for yourself.
~~~
TickleSteve
I agree, which is why in a properly designed system you would run from initrd,
its a single purpose system after all. No need for any sd card access once the
image has been read into RAM. The SD card is read-only in this case. Also, I
wouldnt trust consumer sd cards at all, they typically lack to necessary
features to store data reliably anyway.
~~~
sgt
Would TinyCore be a good option for us? We just need to run RPi's and Chromium
to display a web page.
~~~
elcritch
Not familiar with TinyCore myself, but I’d recommend trying Nerves Kiosk if a
webpage kiosk is your primary goal [1]. Getting all of the FS settings right
and a tuned system like daviduum talks about is tricky IMHO. Though it should
be possible with Yocto Linux or similar as well I’d imagine, especially with
‘fwup’ or similar in the loop. Nerves uses ‘fwup’ [2] to create a R/O squashfs
filesystem for the core OS image which is also highly compressed.
1:
[https://github.com/LeToteTeam/kiosk_system_rpi3/blob/master/...](https://github.com/LeToteTeam/kiosk_system_rpi3/blob/master/README.md)
2: [https://github.com/fhunleth/fwup](https://github.com/fhunleth/fwup)
------
syntaxing
I can see specific usage of these but probably not large scale usage.
Industrial things need to work 100% of the time and has to easily talk to
other devices reliably usually in the form of some redudant network. It'll be
pretty hard to convince engineers to use these on industrial equipment. The
early 2010s were extremely lack luster for industrial electronics
technological advancement. Everything you used were ancient (development of
them started probably before I was born). But the mass adoption of
Ethernet/ethercat have been speeding things up.
------
dev_dull
> _Hardware watchdog_
I thought the broadcom chip provided a hw watchdog that's integrated directly
into the linux kernel?
~~~
mlaretallack
Its usual for an external watchdog to be added for industrial applications
that cannot be disable ( or fail to be enabled) by firmware/software.
------
berbec
I know I'm not the target market for their UPS addon, but is 91.00€ for a UPS
board [1] that does not include the required lead-acid battery sound
reasonable? I know they have gone through the certification process for
everything, but doesn't this seem fairly high?
The battery is not lithium, but lead-acid. For an application using a
Raspberry Pi, I generally assume size is a fairly major consideration.
Considering a lead acid battery will need to be three times the size for
similar charge capacity, doesn't this battery chemistry choice seem very
strange?
A quick google brought me to the PiJuice HAT [2], a $54 piHAT, with an
included 1820mAH LiPo. This device also doesn't massively increase the size of
the Pi. PiJuice claims "~4 to 6 hours in constant use". Let us assume this is
a vastly inflated figure designed by the marketing department. Isn't 2 hours
run time more than enough for a UPS? If the power failure is longer, I want my
UPS to allow me to safely shut down my gear.
1: [https://www.sferalabs.cc/product/strato-pi-ups-
board/](https://www.sferalabs.cc/product/strato-pi-ups-board/) 2:
[https://ameridroid.com/products/pijuice-
hat-1](https://ameridroid.com/products/pijuice-hat-1)
~~~
FullyFunctional
LiPo is a really terrible choice for a UPS; it'll wear out quite quickly. LiFo
is way better, like this:
[https://www.crowdsupply.com/silicognition/lifepo4wered-pi-
pl...](https://www.crowdsupply.com/silicognition/lifepo4wered-pi-plus)
~~~
snovv_crash
LiFePO4 is also much more fire resistant due to punctures, shocks and
overcharging, which is also good for an industrial setting.
------
wigiv
It's nice to see more options becoming available in this space. Industrial PCs
(and, in the same vein, PLCs) from the old-guard industrial automation
providers are generally lackluster for the cost, in my experience. So many
acts of industrial automation and robotic system integration can be achieved
with a Raspberry Pi and/or an Arduino, with a little hardening.
------
camtarn
As an example of how we might consider using these:
We work on a lot of short-lived one-off experimental projects, and we
currently use B&R industrial controllers for more or less everything. However,
these use a clunky Windows-only development environment and can only be
programmed in C/C++. For some projects - e.g. putting a data logger in a low
voltage electrical cabinet, which interfaces to some gear using
serial/modbus/CAN and analog/digital I/O and uploads the results to the cloud
- this could potentially be quite useful. We don't often work on safety-
critical systems, or require 5-nines uptime.
The only thing is that this system isn't _that_ cheap compared to B&R gear,
although not having to pay a subscription for the dev environment helps.
------
pmontra
A feature I didn't see anywhere is the ability to start the PI at a given time
or after receiving a wake on LAN packet. This would be useful in several
scenarios like performing some task, shutdown and boot again later, maybe at a
time programmed by the PI itself.
~~~
Doxin
a RPI uses so little power that it makes no sense to do wake-on-lan, and
indeed the RPI doesn't support wake on lan at all. Just leave it on and idle.
------
tossaway44
The other day I saw someone commenting on aMLC SD cards and their increased
tolerance to sudden power loss and generally rougher conditions. Can’t find
it, though. Anyone have a link?
~~~
Fnoord
I wrote about this in the past various times. For example here [1]. I learned
about it from HN as well though.
[1]
[https://news.ycombinator.com/item?id=18275494](https://news.ycombinator.com/item?id=18275494)
------
mdturnerphys
I've been using the PLCs from UniPi [0] for a few months. They started with
Raspberry-Pi-based systems but now have a Allwinner-H5-based system with built
in memory. They have a significant number of digital and analog ports,
depending on the model, and work with a number of different programming
solutions.
[0] [https://www.unipi.technology/](https://www.unipi.technology/)
------
dsl
It is awesome to see battery backup being added to the Pi. There aren't any
good solutions currently short of a full on UPS or a consumer grade battery
pack.
~~~
Havoc
Well given that the raspberry is decidedly consumer grade too I don't see an
issue with running it off a name brand powerbank.
~~~
bonzini
AdaFruit's "Powerboost 1000 charger" is not cheap but it's very good and also
has USB power pass-through pin, in order to detect power failures. However you
will need a 5V-3.3V level converter to feed it to the RPi's GPIO pins.
~~~
ficklepickle
I got some clones of these made in China to save money. All in all, pretty
happy. Although they really need a heatsink if you want to push 1A
continuously, and the IC is so small it is hard to dissipate all that heat.
One of them will push as much current as possible until it overheats and shuts
off, but the rest seem fine.
I plan on trying to use 2 in parallel to make a UPS for my pi.
I've used one with good results on a low power IoT door unlocker. When the
door is closed, a Qi charger make contact and powers the device. When the door
is open, it runs off battery.
------
DrNuke
These customised Pi packages are hit and miss indeed but you can very often
find a pretty neat plug-and-play solution for your particular problem that
saves you time, so paying $150 instead of $75 is great ROI for your business.
------
qwerty456127
Cool but is there something similar yet less expensive for not-really-
industrial usage? Built-in UPS and hardware watchdog seem really valuable for
almost everybody.
------
antpls
Could this be used for space projects, like satellites? (Thinking about the
name)
~~~
pas
The rPi chip itself is not rad-hardened, so it'd require a bulky shielding,
that'd increase the launch mass, which is a lot more expensive than a more
space suited chip. Also, launching into space requires a lot better
electronics. Sure, it'd work likely, but .. when a launch is that expensive,
you wouldn't accept these risks.
------
plumeria
Another option worth considering is the Modberry:
[https://modberry.techbase.eu/](https://modberry.techbase.eu/)
~~~
tomcam
Login just to see the prices? Classy!
~~~
plumeria
Well, we ended up quoting a custom build with them, and it was slightly
cheaper than the Strato Pi. I agree that pricing information for standard
configurations should be available.
|
Atrial natriuretic factor regulation of cyclic GMP levels and steroidogenesis in isolated fasciculata cells of rat adrenal cortex.
Isolated fasciculata cells of rat adrenal cortex, when incubated with atrial natriuretic factor (ANF), stimulated the levels of cyclic GMP and corticosterone production in a concentration-dependent manner without a rise in the levels of cyclic AMP. The ANF-dependent elevation of cyclic GMP was rapid, with a detectable increment in 30 s. ANF also stimulated the particulate guanylate cyclase. These results not only indicate the coupling of cyclic GMP and corticosterone production with ANF signal, but also demonstrate that, like the ACTH signal, cyclic AMP is not the mediator of ANF-induced adrenocortical steroidogenesis. |
Q:
What is not persisted in a database backup / restore? (SQL Server 2005)
If I take a backup of a database on a SQL 2005 Server, and then restore that backup to a different (new) database on the same database server instance, what things will not be persisted (things like cached execution plans, statistics etc...)
A:
Plans will be recreated at first run.
Otherwise, everything database level will be there except where it interacts at the instance level, such as:
replication
backup jobs/schedules
maintenance plans/schedules
login mappings to users
For a standard, everyday database, you've no worries.
A:
Orphaned Users are often the result of restoring MS SQL Server databases. Here's an article on fixing orphaned users.
|
Q:
C++ need find symbol from array
I need to create a program that searches how many comments (// symbols) are in .txt file.
This is my code:
#include <fstream>
using namespace std;
const char read[] = "read.txt";
const char result[] = "result.txt";
const int CMax = 256;
void Skaityti (char E[], int& n);
int main() {
char E[CMax];
int n,k;
Skaityti(E,n);
ofstream rs(result);
rs << k;
return 0;
}
void Skaityti (char E[], int & n)
{
ifstream fd(read);
int k;
char sim = '/';
for (n = 0; !fd.eof() && n < n+1; n++)
fd.get(E[n]);
for(int i = 0; i < n;i++) {
if(sim == E[n])
k++; }
fd.close();
}
Program read fine, but I can't get symbol from massive.
A:
I'm confused by your question... but I think you're asking to see how many times "//" appears in a file. I threw this together:
#include <fstream>
using namespace std;
int Skaityti()
{
ifstream fd("test.txt");
int count = 0;
while(fd.good())
{
char c = fd.get();
if(fd.good())
if(c == '/')
{
c = fd.get();
if(fd.good())
if(c == '/')
count++; // At this point we have two comments in a row
}
}
fd.close();
return count;
}
|
Hedge Fund Tycoon Convicted In Insider Trading Case
Former Goldman Sachs board member Rajat Gupta was found guilty today of conspiracy and securities fraud. Prosecutors had accused Gupta of passing on inside information about the firm to hedge fund tycoon Raj Rajaratnam. NPR's Jim Zarroli reports.
JIM ZARROLI, BYLINE: The verdict came on only the second day of deliberations. Gupta was acquitted of two charges but convicted of four others. The 63-year-old Indian-born Gupta is the most prominent business leader convicted so far in the government's ongoing insider trading investigation.
In addition to being on the board at Goldman, Gupta is the former head of the consulting firm McKinsey & Company. U.S. officials said he had long-standing personal and business ties with Rajaratnam, head of the Galleon Group hedge fund company.
Former criminal court judge Margaret Finnerty(ph) says the government was able to present evidence that Gupta would call Rajaratnam with information about Goldman right after learning it.
MARGARET FINNERTY: And then you saw trading activity by Galleon occurring within minutes after that. So I think there was such a pattern developed through the evidence that the jury realized this was not just a coincidence.
ZARROLI: The defense argued that the case against Gupta was circumstantial and that there was no proof Gupta ever benefitted from the illegal trades. But prosecutors painted a portrait of a man eager to move in the world of high-end money management and anxious to curry favor with the billionaire Rajaratnam.
The two men had also started a private equity fund together, and in the end, two jurors said the case against Gupta was just overwhelming. Prosecutors played tapes of wiretapped conversations in which Rajaratnam boasted about getting tips from a Goldman board member.
Gupta's lawyer, Gary Naftalis, said he would appeal the verdict. This is just round one, he said.
GARY NAFTALIS: We continue to believe Mr. Gupta's innocence of these charges, and we continue to fight for innocence, think he's an honorable man.
ZARROLI: For now, Gupta is scheduled to be sentenced in October. He's expected to get some jail time, although not as much as Rajaratnam, who is serving an 11-year term in federal prison. Jim Zarroli, NPR News, New York. Transcript provided by NPR, Copyright National Public Radio. |
NETWORK FINALS: ABC’s NBA game adjusted to 0.7. Elsewhere, the rerun of THE VOICE lost 0.1 in final numbers, and the primetime rerun SATURDAY NIGHT LIVE was down 0.2.
Broadcast Official Nationals Program Ratings Chart
CABLE HIGHLIGHTS: A&E’s LIVE PD led Saturday cable, up a tick to 0.55, with the lead-in hour down 0.03 to 0.28. ESPN’s COLLEGE BASKETBALL games were at 0.46/0.41/0.23/0.18/0.15/0.14. On Food Network, KITCHEN AT FN gained 0.03 to 0.25, and TRISHA’S SOUTHERN KITCHEN rose 0.06 to 0.22. Nickelodeon’s morning CASAGRANDES grew by 0.05 to 0.22, with lead-out ITS PONY up 0.04 to 0.20, and the primetime HENRY DANGER up 0.03 to 0.19. NBC Sports Net’s PREMIER LEAGUE match was at 0.20. Adult Swim’s line-up performed as follows: MY HERO ACADEMIA at 0.20 and 0.06/177K & 0.06/175K, compared to last week’s 0.07/196 & 0.09/202K, SWORD ART UNDERWORLD down 0.06 to 0.17, DEMON SLAYER down 0.06 to 0.16/313K, FOOD WARS down 0.05 to 0.15, BLACK CLOVER down 0.04 to 0.14/268K, JOJO’S BIZARRE ADVENTURE down 0.02 to 0.15/268K, NARUTO down 0.03 to 0.11/201K, PRIMAL at 0.10/174K, and SAMURAI JACK at 0.08/154K. HGTV’s NATE & JEREMIAH was at 0.19/0.12 compared to last week’s 0.20/0.17. TLC’s SAY YES TO THE DRESS was at 0.17/0.13 compared to last week’s 0.15/0.12. History’s ANCIENT ALIENS was steady at 0.16. Hallmark’s original movie BAD DATE CHRONICLES was at 0.15. OWN’s FAMILY OR FIANCE was at 0.06.
Top 50 Original Cable Telecasts with Demographic Detail
Top 150 Original Cable Telecasts
To search for a show: type Ctrl-F and type your show title in the search box.
Top 150 Original Cable Telecasts: Saturday February 29, 2020 P18-49 P2+ Rank Program Net Start Mins Rating (000s) 1 LIVE PD: 280 LIVE PD A&E NETWORK 9:00 PM 180 0.55 2,054 2 COLLEGE BKBL REG SSN L: MICHIGAN STATE/MARYLAND ESPN 8:11 PM 125 0.46 1,706 3 COLLEGE BKBL REG SSN L ESPN 6:03 PM 71 0.41 1,659 4 LIVE PD AC A&E NETWORK 8:07 PM 51 0.28 1,183 5 KITCHEN AT FN, THE FOOD NETWORK 11:00 AM 60 0.25 1,314 6 COLLEGE BKBL REG SSN L: ARIZONA/UCLA ESPN 10:16 PM 126 0.23 768 7 AMERICAS CHOICE 2020 CNN 7:00 PM 60 0.23 1,380 8 SPORTSCENTER 12AM L ESPN 12:22 AM 38 0.23 549 9 CASAGRANDES NICKELODEON 11:00 AM 30 0.22 747 10 TRISHAS SOUTHERN KITCHEN FOOD NETWORK 12:00 PM 30 0.22 1,148 11 CNN NEWSROOM CNN 2:00 PM 60 0.21 1,289 12 PREMIER LEAGUE L: LIVERPOOL/WATFORD NBC SPORTS NETWORK 12:27 PM 138 0.20 606 13 SPORTSCENTER 1AM L ESPN 1:00 AM 60 0.20 461 14 AMERICAS NEWS HQ FOX NEWS CHANNEL 2:00 PM 60 0.20 2,413 15 AMERICAS CHOICE 2020 CNN 9:00 PM 60 0.20 1,287 16 MY HERO ACADEMIA ADULT SWIM 11:30 PM 30 0.20 455 17 ITS PONY NICKELODEON 11:30 AM 30 0.20 601 18 AMERICAS CHOICE 2020 CNN 8:00 PM 60 0.19 1,310 19 AMERICAS CHOICE 2020 CNN 10:00 PM 60 0.19 1,188 20 COLLEGE GAMEDAY-BKBL L ESPN 11:00 AM 60 0.19 609 21 HENRY DANGER NICKELODEON 8:00 PM 30 0.19 846 22 GREG GUTFELD SHOW, THE FOX NEWS CHANNEL 10:00 PM 60 0.19 2,541 23 NATE & JERE:SAVE MY HOUSE HOME AND GARDEN TV 10:00 PM 60 0.19 1,078 24 AMERICAS CHOICE 2020 CNN 6:00 PM 60 0.19 1,045 25 AMERICAS NEWS HQ FOX NEWS CHANNEL 4:00 PM 60 0.18 2,143 26 SPORTSCENTER MORNING L ESPN 2:00 AM 60 0.18 394 27 LIGA MX SAT: AMERICA / NECAXA TUDN 8:00 PM 120 0.18 392 28 COLLEGE BKBL REG SSN L ESPN 4:15 PM 108 0.18 796 29 DECISION 2020: SOUTH CAROLINA PRIMARY MSNBC 6:00 PM 240 0.18 1,917 30 FNC 2020: SC PRIMARY FOX NEWS CHANNEL 8:00 PM 60 0.18 2,145 31 PREMIER LEAGUE L: CHELSEA/BOURNEMOUTH NBC SPORTS NETWORK 9:57 AM 132 0.17 502 32 SPORTSCENTER WEEKEND-AM L ESPN 10:00 AM 60 0.17 475 33 SYTTD: AMERICA TLC 8:00 PM 60 0.17 819 34 DECISION 2020 MSNBC 10:00 PM 60 0.17 1,601 35 UNXPLAINED, THE HISTORY 10:03 PM 62 0.17 1,009 36 SWORD ART:UNDERWORLD ADULT SWIM 12:00 AM 30 0.17 337 37 ANCIENT ALIENS HISTORY 9:00 PM 63 0.16 1,049 38 FNC 2020: SC PRIMARY FOX NEWS CHANNEL 7:00 PM 60 0.16 1,945 39 MOVIE- ACQUIRED PREM: DYING TO BE YOU LIFETIME TELEVISION 8:00 PM 123 0.16 773 40 JUSTICE W/ JUDGE JEANINE FOX NEWS CHANNEL 9:00 PM 60 0.16 2,574 41 DEMON SLAYER ADULT SWIM 12:30 AM 30 0.16 313 42 POWER RANGERS BM10 NICKELODEON 8:00 AM 30 0.16 455 43 COLLEGE BKBL REG SSN L: TEXAS/TEXAS TECH ESPN 12:00 PM 124 0.15 545 44 AMERICAS NEWS HQ FOX NEWS CHANNEL 1:00 PM 60 0.15 1,853 45 FOOD WARS ADULT SWIM 1:00 AM 30 0.15 295 46 ANNA HBO PRIME 8:00 PM 119 0.15 801 47 LIGA MX SAT 2: TIGRES UANL / UNAM TUDN 10:00 PM 125 0.15 318 48 AMERICAS NEWS HQ FOX NEWS CHANNEL 3:00 PM 60 0.15 1,832 49 TWO AND A HALF MEN AMC 10:30 AM 30 0.15 541 50 HALLMARK MOVIE: BAD DATE CHRONICLES HALLMARK CHANNEL 9:00 PM 120 0.15 1,623 51 AMERICAS CHOICE 2020 CNN 5:00 PM 60 0.15 1,043 52 TWO AND A HALF MEN AMC 10:00 AM 30 0.15 503 53 JOJOS ADV: GOLDEN WIND ADULT SWIM 2:00 AM 30 0.15 266 54 PREMIER LG LIVE STUDIO NBC SPORTS NETWORK 12:09 PM 18 0.15 450 55 FOX & FRIENDS SATURDAY FOX NEWS CHANNEL 9:00 AM 60 0.14 2,128 56 AMERICAS NEWS HQ FOX NEWS CHANNEL 5:00 PM 60 0.14 1,718 57 COLLEGE BKBL REG SSN L: BAYLOR/TCU ESPN 2:04 PM 131 0.14 565 58 SPORTSCENTER WEEKEND-AM L ESPN 8:00 AM 60 0.14 387 59 NASCAR XFINITY SERIES L: FONTANA FOX SPORTS 1 4:00 PM 179 0.13 1,190 60 CNN NEWSROOM CNN 3:00 PM 60 0.13 956 61 RESTAURANT IMPOSSIBLE FOOD NETWORK 4:00 PM 60 0.13 618 62 LIVE PD AC A&E NETWORK 3:00 AM 51 0.13 501 63 AMERICAS CHOICE 2020 CNN 4:00 PM 60 0.13 914 64 CNN NEWSROOM CNN 10:00 AM 60 0.13 836 65 YOUNG DYLAN NICKELODEON 8:30 PM 30 0.13 634 66 TWO AND A HALF MEN AMC 9:30 AM 30 0.13 468 67 SYTTD: ENGLAND TLC 9:00 PM 60 0.13 585 68 ALL THAT NEW NICK-AT-NITE 9:00 PM 31 0.12 438 69 FOX & FRIENDS SATURDAY FOX NEWS CHANNEL 8:00 AM 60 0.12 2,108 70 DECISION 2020 MSNBC 11:00 PM 60 0.12 1,090 71 SMERCONISH CNN 9:00 AM 60 0.12 861 72 CNN NEWSROOM CNN 11:00 AM 60 0.12 777 73 NATE & JERE:SAVE MY HOUSE HOME AND GARDEN TV 11:00 PM 60 0.12 811 74 MSNBC PRESS CONFERENCE MSNBC 1:51 PM 53 0.12 1,293 75 NBA REGULAR SEASON REPEAT: HOUSTON/BOSTON ESPN 4:00 AM 120 0.12 254 76 PAW PATROL NICK JR 9:00 AM 30 0.12 446 77 SPORTSCENTER WEEKEND-AM L ESPN 7:00 AM 60 0.12 320 78 CAVUTO LIVE FOX NEWS CHANNEL 11:00 AM 60 0.12 1,602 79 CNN NEWSROOM CNN 1:00 PM 60 0.12 855 80 FOX REPORT WITH JON SCOTT FOX NEWS CHANNEL 6:00 PM 60 0.12 1,715 81 CAVUTO LIVE FOX NEWS CHANNEL 10:00 AM 60 0.12 1,727 82 AMERICAS NEWS HQ FOX NEWS CHANNEL 12:00 PM 60 0.11 1,468 83 GIGANTOSAURUS DISNEY JUNIOR 8:30 AM 25 0.11 405 84 OTL – FIRST REPORT L ESPN 9:00 AM 60 0.11 341 85 TEEN TITANS GO THE CARTOON NETWORK 10:00 AM 15 0.11 447 86 APPLE & ONION THE CARTOON NETWORK 9:30 AM 15 0.11 392 87 MSNBC BREAKING NEWS MSNBC 2:44 PM 16 0.11 1,215 88 CNN NEWSROOM CNN 12:00 PM 60 0.11 757 89 TWO AND A HALF MEN AMC 9:00 AM 30 0.10 400 90 TIME MACHINE: ALCATRAZ: SEARCH FOR THE TRUTH HISTORY 12:00 PM 120 0.10 589 91 THUNDERCATS ROAR! THE CARTOON NETWORK 10:30 AM 15 0.10 416 92 TIME MACHINE: ROANOKE: SEARCH FOR LOST COLONY HISTORY 2:00 PM 120 0.10 569 93 INCREDIBLE DR POL NAT GEO WILD 9:00 PM 63 0.10 885 94 COLLEGE BKBL REG SSN L: TEXAS A&M/LSU ESPN2 12:00 PM 124 0.10 278 95 KOBE: FATHER, HUSBAND, LE BLACK ENTERTAINMENT TV 11:00 PM 60 0.10 368 96 FOX & FRIENDS SATURDAY FOX NEWS CHANNEL 7:00 AM 60 0.10 1,587 97 DECISION 2020 MSNBC 4:00 PM 60 0.10 923 98 COLLEGE BKBL REG SSN L: FLORIDA/TENNESSEE ESPN2 2:04 PM 123 0.10 335 99 COLLEGE BKBL REG SSN L ESPN2 4:07 PM 118 0.10 388 100 PREMIER LG LIVE STUDIO NBC SPORTS NETWORK 9:41 AM 16 0.09 290 101 LIGA MX L: PACHUCA / QUERETARO TUDN 5:55 PM 125 0.09 214 102 MSNBC BREAKING NEWS MSNBC 1:28 PM 23 0.09 1,200 103 NEW DAY SATURDAY CNN 8:00 AM 60 0.09 623 104 THUNDERCATS ROAR! THE CARTOON NETWORK 10:45 AM 15 0.09 362 105 DECISION 2020 MSNBC 5:00 PM 60 0.09 980 106 SEVEN WORLDS, ONE PLANET AMC 9:00 PM 90 0.09 404 107 CURSE OF OAK ISLAND SPCLS HISTORY 11:00 AM 60 0.09 520 108 PITBULLS AND PAROLEES ANIMAL PLANET 9:00 PM 61 0.09 556 109 SUPERCROSS: ATLANTA NBC SPORTS NETWORK 5:00 PM 180 0.08 241 110 TWO AND A HALF MEN AMC 8:30 AM 30 0.08 319 111 DECISION 2020 MSNBC 3:00 PM 60 0.08 972 112 CNN NEWSROOM LIVE CNN 5:00 AM 60 0.08 500 113 SPORTSCENTER WEEKEND-AM L ESPN2 9:00 AM 60 0.08 199 114 NEW DAY SATURDAY CNN 6:00 AM 60 0.08 568 115 FUTBOL MLS SAT: HOUSTON DYNAMO / LA GALAXY TUDN 3:30 PM 145 0.08 195 116 NASCAR RACEDAY: XFINITY L FOX SPORTS 1 3:30 PM 30 0.07 625 117 PREMIER LEAGUE GOAL ZONE NBC SPORTS NETWORK 2:45 PM 45 0.07 202 118 COLLEGE BKBL REG SSN L ESPN2 10:08 PM 115 0.07 279 119 LIGA PREMIER: WATFORD VS LIVERPOOL UNIVERSO 12:25 PM 130 0.07 131 120 VANDERPUMP RULES BRAVO 4:11 PM 62 0.07 202 121 NFL SCOUTING COMBINE: 2020 PRIMETIME DL, LB NFL NETWORK 7:00 PM 153 0.07 202 122 HEARTLAND DOCS, DVM NAT GEO WILD 10:03 PM 60 0.07 619 123 PURGATONY SYFY 12:35 AM 16 0.07 161 124 TWO AND A HALF MEN AMC 8:00 AM 30 0.07 285 125 FOX & FRIENDS SATURDAY FOX NEWS CHANNEL 6:00 AM 60 0.07 1,132 126 VET LIFE, THE ANIMAL PLANET 10:01 PM 61 0.07 442 127 NFL SCOUTING COMBINE: 2020 DL, LB NFL NETWORK 4:00 PM 180 0.07 211 128 HAUNTED HOSPITALS TRAVEL CHANNEL 10:00 PM 60 0.07 368 129 TWO AND A HALF MEN AMC 7:30 AM 30 0.07 228 130 NEW DAY SATURDAY CNN 7:00 AM 60 0.07 604 131 PREMIER LEAGUE L: CRYSTAL PALACE/BRIGHTON NBC SPORTS NETWORK 7:25 AM 136 0.07 201 132 VANDERPUMP RULES BRAVO 3:09 PM 62 0.07 186 133 CRIMINAL CONFESSIONS OXYGEN MEDIA 6:00 PM 60 0.06 339 134 FAMILY OR FIANCE OPRAH WINFREY NETWORK 9:00 PM 75 0.06 275 135 VANDERPUMP RULES BRAVO 2:07 PM 62 0.06 167 136 CNN NEWSROOM LIVE CNN 4:00 AM 60 0.06 331 137 NASCAR CUP SERIES QUAL L FOX SPORTS 1 2:30 PM 60 0.06 634 138 THESE WOODS ARE HAUNTED TRAVEL CHANNEL 9:00 PM 60 0.06 407 139 UP & VANISHED OXYGEN MEDIA 7:00 PM 60 0.06 331 140 TZGZ SHORTS SYFY 1:34 AM 13 0.06 113 141 WEEKENDS WITH ALEX WITT MSNBC 12:00 PM 88 0.05 867 142 FIFTH GEAR MOTOR TREND 9:00 PM 60 0.05 130 143 WEEKEND EXPRESS HLN 7:00 AM 60 0.05 287 144 AM JOY: SOUTH CAROLINA PRIMARY MSNBC 10:00 AM 120 0.05 908 145 DR. POL: DEJA MOO! NAT GEO WILD 8:00 PM 60 0.05 536 146 IFC MOVIE IFC TV 4:45 PM 75 0.05 149 147 NFL TOTAL ACCESS NFL NETWORK 3:00 PM 60 0.05 175 148 SPORTSCENTER WEEKEND-AM L ESPN2 11:00 AM 60 0.05 152 149 VELSHI: N/A MSNBC 8:00 AM 120 0.05 682 150 IFC MOVIE: TITANIC IFC TV 6:00 PM 180 0.05 139
PREVIOUS SATURDAY NETWORK SCORECARDS (FAST NATIONALS)
PREVIOUS SATURDAY CABLE & BROADCAST NATIONALS
### |
Q:
Enable decoration on rm output
This is not a question about PS1.
I am using bash, my prompt is colorful, output from ls has color, but rm outputs this:
20:08:15 ~> rm test.txt
rm: cannot remove âtest.txtâ: No such file or directory
20:08:30 ~>
How do I get âtest.txtâ to print properly?
env:
20:19:45 ~> cat env.txt
XDG_SESSION_ID=1336
TERM=xterm
SHELL=/bin/bash
SSH_TTY=/dev/pts/0
USER=ubuntu
LS_COLORS= ...really long line...
MAIL=/var/mail/ubuntu
PATH=/usr/local/sbin:/usr/local/bin ...
PWD=/home/ubuntu
LANG=en_US.UTF-8
PS1=\[\e[0;32m\]\t \W>\[\e[1;37m\]
SHLVL=1
HOME=/home/ubuntu
LOGNAME=ubuntu
LESSOPEN=| /usr/bin/lesspipe %s
XDG_RUNTIME_DIR=/run/user/1000
LESSCLOSE=/usr/bin/lesspipe %s %s
_=/usr/bin/env
A:
It's a locale problem.
rm is trying to print the left and right single quotation mark characters, probably in UTF-8. Either modify your locale settings so it uses only ASCII (export LANG=C will do that), or, better, configure your terminal emulator so it handles UTF-8 properly.
The locale command will show you your current locale settings, which are controlled by setting environment variables. Here's mine, just as an example:
$ locale
LANG=en_US.UTF-8
LANGUAGE=
LC_CTYPE="en_US.UTF-8"
LC_NUMERIC="en_US.UTF-8"
LC_TIME="en_US.UTF-8"
LC_COLLATE=C
LC_MONETARY="en_US.UTF-8"
LC_MESSAGES="en_US.UTF-8"
LC_PAPER="en_US.UTF-8"
LC_NAME="en_US.UTF-8"
LC_ADDRESS="en_US.UTF-8"
LC_TELEPHONE="en_US.UTF-8"
LC_MEASUREMENT="en_US.UTF-8"
LC_IDENTIFICATION="en_US.UTF-8"
LC_ALL=
|
Introduction
============
Oral cavity cancer has shown an increased incidence in recent years in Romania ([@b1-etm-0-0-8139]) and also worldwide ([@b2-etm-0-0-8139]). The most commune type of oral cavity cancer is squamous cell carcinoma (commonly referred as 'Head and Neck Squamous Cell Carcinoma', HNSCC). The disease affects several anatomic structures: Oral cavity, oropharynx, nasopharynx, hypopharynx and larynx ([@b3-etm-0-0-8139]--[@b5-etm-0-0-8139]). Most of HNSCC patients are, unfortunately, diagnosed when the disease has already progressed to an advanced stage. In this instance the therapeutic approach is complex and involves the combination of chemo and radiotherapy either before or after the surgical procedure based on the protocol established for each patient ([@b6-etm-0-0-8139]--[@b8-etm-0-0-8139]). Thus, the protocols are somewhat personalized, hower, the development of resistance to conventional treatments and an increased recurrence rate of primary tumors lead to a 5-year decline of the survival rate of patients with HNSCC ([@b9-etm-0-0-8139]--[@b12-etm-0-0-8139]). Therefore, additional clinical approaches of this complex disease are needed. The new therapeutic strategies have to tackle at least two points, besides increasing the survival rate, it should reduce the adverse effects of chemotherapy. The use of natural compounds as adjuvants can be beneficial by increasing the efficacy of conventional treatments and very importantly to limit the adverse reactions. The disruption of normal cellular mechanisms such as proliferation or apoptosis, is accountable for the development of tumoral processes in different types of cancer, including HNSCC. Apoptosis, known as 'programmed cell death', is a mechanism that provides crucial control over the cell homeostasis. Apoptosis enables the removal of cells having DNA mutations, aberrant cellular cycle and that are prone to malignant transformation ([@b13-etm-0-0-8139],[@b14-etm-0-0-8139]). Defects observed in the apoptotic pathway associated to cancer have an important role in conventional oncotherapies (radio- and chemotherapy) since apoptosis induction needs high dosages of therapeutic agents. Cisplatin (CisPt), one of the most used chemotherapeutic agent in HNSCC treatment, has the capacity to interact with DNA, RNA and different proteins, and by activation of specific mechanisms, some of them still incompletely known, can induce apoptosis ([@b15-etm-0-0-8139]--[@b17-etm-0-0-8139]).
The elucidation of the mechanisms pertaining to the apoptosis process is a key step. The restoration of the cellular mechanisms responsible for tumor cell apoptosis are of upmost importance in malignant transformation, tumor evasion and anticancer therapy ([@b18-etm-0-0-8139]--[@b20-etm-0-0-8139]). Factors that determine a damaged cell to go either through apoptosis or to repair the damage and continue the cell cycle, are still to be discovered. It is well known that one important apoptosis regulator is the tumor suppressor gene TP53 (TP53). TP53 tumor suppressor has mutations in 40--60% of the HNSCC cases ([@b21-etm-0-0-8139]). This is an untimely event, identified in precancerous lesions and associated with a poor prognosis. Some studies showed that the rehabilitation of the TP53 function in an early stage of the disease had no effect, but can lead to the regression of the tumor in advanced stages ([@b22-etm-0-0-8139],[@b23-etm-0-0-8139]). This suggests that TP53 tumor suppressor is not activated in the early phases of the disease, but can be activated in later phases of tumorigenesis ([@b24-etm-0-0-8139],[@b25-etm-0-0-8139]). Another important player in the regulation of cell tumorigenesis-related functions (proliferation, transformation, differentiation, apoptosis, angiogenesis) is activation of mitogen-activated protein kinases (MAPKs) pathways such as ERKs ([@b26-etm-0-0-8139]--[@b30-etm-0-0-8139]). There are studies showing that the activation of the MAPK pathway is correlated with the cancer prognosis influencing the therapeutic outcome in many types of cancer ([@b31-etm-0-0-8139]--[@b33-etm-0-0-8139]). Correlated once with the intimate deciphering of molecular pathways that regulate oncogenesis, new modern and specific therapies able to improve the current therapeutic methods will be developed. One of the approaches is to maximize the effectiveness of initial therapy by the use of a chemotherapeutic drug together with a supporting agent ([@b34-etm-0-0-8139]). Some studies have been focused on the discovery of new therapeutic agents obtained from natural compounds proving anticancer and anti-proliferation effects ([@b35-etm-0-0-8139],[@b36-etm-0-0-8139]). One of these compounds is curcumin (CRM). CRM is the principal compound of turmeric extracted from the plant *Curcuma longa* and has many diverse properties - anti-inflammatory, anti-bacterial, anti-fungal, anti-viral and anti-carcinogenic ([@b37-etm-0-0-8139]). The mechanisms through which CRM exerts its antitumoral effects are complex and diverse; they appear to act in the processes of growth and apoptosis and also in different stages of carcinogenesis ([@b38-etm-0-0-8139],[@b39-etm-0-0-8139]).
Acknowledging all the mentioned issues in the this type of carcinoma the focus of this study is to investigate how a natural adjuvant (CRM) supports the apoptotic process induced by a mono chemical standard agent (CisPt) in an *in vitro* experimental model using HNSCC standard cell lines. Moreover, in our study we investigated the ERK1/2 and/or p53 involvement in treatment response. The use of adjuvant might have a beneficial effect decreasing the CisPt doses, therefore reducing the adverse reactions induced by a chemotherapeutic agent.
Materials and methods
=====================
### Cell lines culture
The squamous carcinoma cell line PE/CA-PJ49 was from European Collection of Authenticated Cell Cultures (ECACC cat. no. 0060606). The cell line was obtained from a 57-year old male patient with tongue carcinoma. The FaDu cell line was obtained from the American Type Culture Collection (ATCC-HTB-43 cat.). The cell line was derived from a 56-year-old male patient with pharyngeal squamous cell carcinoma. Both lines are showing adherent epithelial type morphology. The cell lines were grown and maintained in Dulbecco\'s modified Eagle\'s medium (DMEM) supplemented with 10% fetal bovine serum (FBS), 2 mM glutamine, 1% penicillin, and 1% streptomycin at 37°C in 5% CO~2~. The sub-confluent cultures (70--80%) were split 1:4-1:8 (i.e. seeding at 1--3×10,000 cells/cm^2^) using trypsin-EDTA (0.25% trypsin, 0.03% EDTA).
The study protocol was approved by the Ethics Committee of 'Stefan S. Nicolau' Virology Institute.
### Drugs and treatments
CisPt and CRM (97% purity), were obtained from Sigma-Aldrich. They were initially dissolved in dimethyl sulfoxide (DMSO; Sigma-Aldrich) at a concentration of 5 mM. Further, milli-Q water was used to generate 1 mM stock solutions. The stock solutions were filtered using a cellulose acetate hydrophilic filter (0.20 µm) (Sigma-Aldrich). Dilutions used in the experimental model were done in DMEM to generate the following concentration ranges: 2--160 µM for CisPt and 5--100 µM for CRM. Tumor cells were incubated for 6, 24 or 48 h either in the presence of the drugs (CisPt and/or CRM) or vehicle control (DMSO ≤0.1%). For inhibition studies of ERK1/2 function, the cells were pre-incubated for 2 h with 25 µM PD98059 as previously reported ([@b40-etm-0-0-8139]). The treated tumor cells were used to determine cell proliferation, FISH, apoptosis and conserved as cell pellets at −80°C in order to obtain cell lysates used in ELISA assays. Non-treated cells were used as controls throughout the experiments.
### Cell viability assay
Tumor cells (1--2×10^3^ cell/well) were seeded in 96-microwell plates, incubated at 37°C for 24 h to accomplish full adherence and then treated with different concentrations of CisPt (2--160 µM) or CRM (5--100 µM). The cell viability was assessed by the ability of metabolically active cells to reduce the 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) (Sigma-Aldrich) to colored formazan compounds. The absorbance was measured with an enzyme-linked immunosorbent assay reader (Dynex plate reader; wavelength 450 nm) ([@b41-etm-0-0-8139]). The data are presented as the mean values from at least three different experiments. Untreated cells served as control having 100% viability. Viability % = (T-B)/(U-B) ×100, (where T, absorbance of treated cells; U, absorbance of untreated cells, iar B, absorbance of blank).
### Cell proliferation assay
CellTiter 96^®^ AQueous One Solution Cell Proliferation Assay (Promega) was used. The test is based on the reduction of yellow MTS tetrazolium salt by the viable cells and generation of colored formazan soluble in the culture medium. The product was spectrophotometrically quantified by measuring the absorbance at λ=490 nm ([@b42-etm-0-0-8139]) using a Dynex plate reader (DYNEX Technologies-MRS). Results were expressed as mean values of three determinations ± standard deviation (SD). Untreated cells served as control and considered to have proliferation index (PI) equal 1. PI = absorbance of treated cells/absorbance of untreated cells.
### Fluorescence in situ hybridization
FISH technique was performed after optimization of the protocol using commercially available probe from Abbott/Vysis (Vysis) ([@b43-etm-0-0-8139],[@b44-etm-0-0-8139]). According with the manufacturer\'s protocol Locus specific identifier LSA TP53/CEP17 FISH Probe Kit detects the LSI TP53 probe Spectrum Orange target located on chromosome 17p13.1 and CEP17 (17p11.1-q11.1 Alpha Satellite) probe Spectrum Green Dual Colour target located on the centromere of chromosome 17.
Cells and slide preparation: The slides were cleaned in an ice-cold mixture of 40% methanol and 60% distilled water, then air dryed and stored at 4°C. Cells were pelleted and suspended in 0.075 M KCl hypotonic solution for 20 min at 37°C. Tumor cells were pelleted by centrifugation at 300 × g for 5 min at 4°C and resuspended in 0.5 ml fixative (3:1 methyl alcohol and glacial acetic acid). Afterwards the cells were diluted at the appropriate density and distributed on several locations on the slide. The air dried slides were incubated at −20°C for 30 min.
FISH probe preparation and hybridization from cell culture: The slides were denatured for 5 min in 70% formamide/2X SSC at 73°C. Then the slides were dehydrated by immersion in 70, 80 and 100% cold ethanol solution, 5 min for each step. The slides were air-dried and 10 µl of the probe LSI TP53/CEP17 was added in the selected hybridization area. The smears were covered with a 22×22 mm coverslip, sealed and incubated overnight in a humid chamber at 37°C. Two washes were performed post hybridization, using washing solutions: 0.4X SSC/0.3% NP-40 at 73°C for 2 min, and 2X SSC/0.1% NP-40 for 2 min. The slides were air-dried and 4′,6-diamidino-2-phenylindole (DAPI II) was added for counterstaining. The slides were analyzed using a Zeiss Axio Imager M1 epifluorescence microscope (Zeiss) equipped with filters for DAPI, SpectrumOrange and SpectrumGreen and a triple filter (simultaneous DAPI/Orange/Green). Images were acquired at a magnification of ×1,000 and captured using MetaSystems digital camera. Images were analyzed using Isis version 5.2, MetaSystems software for quantitative analysis of samples generated by FISH technique (Altlussheim). For each sample hybridized signals were counted in 100 nuclei.
### ELISA assay
ELISA assays were used to measure both total and phosphorylated p53 and ERK1/2proteins in cell lysates. Briefly, untreated, CisPt and/or CRM treated tumor cells were lysed in PBS (pH 7.2--7.4) containing 1 mM EDTA, 0.5% Triton X-100, 5 mM NaF, 6 M urea, 10 µg/ml leupeptin, 10 µg/ml pepstatin, 100 µM PMSF, 3 µg/ml aprotinin, 2.5 mM sodium pyrophosphate, 1 mM sodium orthovanadate. The lysate was kept 30 min on ice with stirring every 5 min. The lysate was centrifuged at 2,000 × g for 5 min at room temperature. Furthermore, the obtained supernatant was centrifuged at 14,000 × g for 15 min at 4°C. Protein concentration of the lysates was measured using Bradford assay. DuoSet_IC Human Total p53 ELISA \[cat. no. DYC1043\]; DuoSet_IC Human Phospho-p53 (S15) ELISA \[cat. no. DYC1839\]; DuoSet_IC Human/Mouse/Rat Total ERK1/2 \[cat. no. DYC1940\] DuoSet_IC Human/Mouse/Rat Phospho- ERK1/2 ELISA \[cat. no. DYC1018B\] were purchased from R&D Systems Inc. The protein of interest was measured using a standard Streptavidin-HRP system ([@b45-etm-0-0-8139]). All experiments were performed in triplicates and sample O.D. was measured at λ=450 nm using Dynex plate reader.
### Analysis of apoptosis
The apoptosis assay was carried out with the Annexin V-FITC kit using the manufacturer\'s protocol (BD Pharmingen) ([@b46-etm-0-0-8139]). Treated and untreated 1×10^6^ cells/ml were resuspended in cold binding buffer and staining simultaneously with 5 µl FITC-Annexin V (green fluorescence) and 5 µl propidium iodide (PI) in the dark at room temperature for 15 min. Then 400 µl of Annexin V binding buffer was added and 10,000 cells/sample were acquired using BD Canto II flow cytometer. The analysis was performed using DIVA 6.2 software in order to discriminate viable cells (FITC^−^PI^−^) from necrotic cells (FITC^+^PI^+^) and early apoptosis (FITC^+^PI^−^) from late apoptosis.
### Statistical analysis
Data were analyzed using Student\'s t-test (paired type and one tailed distibution). One-way analysis of variation with P-value of \<0.05 was considered statistically significant.
Results
=======
### Culture parameters of the standardized cell lines used in in vitro experiments
In the present study two human HNSCC cell lines were used, FaDu derived from pharyngeal squamous carcinoma and PE/CA-PJ49 obtained from a tongue squamous carcinoma, both cell lines presenting adherent and epithelial-type morphology. To achieve the successive passages of cells kept in culture, the density of cells in the culture plates were carefully supervised in order to avoid over-population and any sign of aging. At the end of each experiment, samples from used cells were frozen to create a batch of cells that can be used anytime to repeat or continue the experiments. Some studies have shown that the number of cells that present with polysomy at the level of the 17th chromosome is raised in oral cavity squamous carcinomas and this may be correlated with the process of carcinogenesis ([@b47-etm-0-0-8139]). The exact role of genetic modifications of TP53 in different stages of the tumorigenesis process is not completely established, but it is known that the gene has the ability to induce the restoration of damaged DNA by activating certain proteins and by stopping the cellular cycle and induction of apoptosis. Thereby, it has been tried to identify some possible numeric aberrations of chromosome 17, such as deletion or amplification of TP53 gene in the FaDu and PE/CA-PJ49 cells. This genetic endeavor was done in order to discover possible explications between these abnormalities and the cellular response to therapy. Using the FISH technique, the intention was to obtain information on the TP53 gene status in the FaDu and PE/CA-PJ49 tumor cells before starting the experiments. The PE/CA-PJ49 tumor line showed an amplification of the TP53 gene since all analyzed cells had 4 signals for both TP53 (17p13) (red dots on [Fig. 1A](#f1-etm-0-0-8139){ref-type="fig"}) and 17(D17Z1) centromere probe (green dots on [Fig. 1A](#f1-etm-0-0-8139){ref-type="fig"}). FaDu did not show the amplification of TP53 gene on chromosome 17. In contrast to this, the cells had only one signal for TP53 (17p13) (red dot on [Fig. 1B](#f1-etm-0-0-8139){ref-type="fig"}) suggesting a deletion of the TP53 gene, without modification at the level of chromosome 17 which presented only two signals for the 17(D17Z1) centromere (green dots [Fig. 1B](#f1-etm-0-0-8139){ref-type="fig"}).
### Effects of cisplatin and/or curcumin treatment on the cellular viability of HNSCC
Cisplatin is one of the most utilized cytostatic drugs in the treatment of HNSCC. Unfortunately many patients develop relapses or cisplatin resistance. A natural compound such as curcumin might improve and maintain the antitumoral effect of cisplatin. In order to determine the optimal concentration of the drug needed to inhibit half of the maximum biological response (IC~50~) both tumor cell lines were treated with the following concentrations 0, 1, 5, 10, 20, 40, 80, 160 µM CisPt or 0, 5, 10, 15, 20, 25, 50, 100 µM CRM. To determine the optimal treatment time, cells were treated for different time periods (6, 24 or 48 h). The inhibitory effect of CisPt or CRM on the cellular viability was dose- and time-dependent ([Fig. 2](#f2-etm-0-0-8139){ref-type="fig"}). The results showed that 24 h CisPt treatment had an IC~50~=11.25 µM for FaDu cells and IC~50~=10.55 µM for PE/CA-PJ49 cells. CRM treatment for 24 h reduced the cellular viability with an IC~50~=13.72 µM for FaDu cells and IC~50~=15.20 µM for PE/CA-PJ49 tumor cells. Based on the obtained results the optimal time of treatment was 24 h and the optimal concentration was 10 µM for CisPt and 15 µM for CRM ([Fig. 2](#f2-etm-0-0-8139){ref-type="fig"}). We tested concentrations less than 2 µM (data not shown) and they did not have any effect on the treated FaDu or PE/CA-PJ49 cells.
### The effect of the CisPt and/or CRM treatment on the protein-kinase ERK1/2 expression
MAPKs transmit and amplify the signals involved in proliferation, as well as in cellular death. Using ELISA assay, we evaluated the expression and activation of protein-kinase ERK1/2 induced by CisPt and/or CRM treatment of FaDu and PE-CA/PJ49 tumor cells. The data show that in the tumor cells treated with CisPt and/or CRM for different time-points, the ERK1/2 protein-kinase is highly expressed after 24 h treatment. The untreated PE-CA/PJ49 cells (control) have a statistically significant higher expression of total ERK1/2 (4.3 ng/mg protein) compared to untreated FaDu cells (1.87 ng/mg protein) ([Fig. 3](#f3-etm-0-0-8139){ref-type="fig"}). The CisPt and/or CRM treatment applied individually or in combination did not significantly modify the expression of total ERK1/2 form in the two analyzed tumor cell lines ([Fig. 3A](#f3-etm-0-0-8139){ref-type="fig"}). In order to analyze the effect of CisPt and/or CRM treatment on the activation of ERK1/2, the level of ERK1/2 phosphorylation (% phospho-ERK1/ERK2) was quantified. The results show that FaDu cells responded differently to treatment compared to PE-CA/PJ49 cells.
In untreated FaDu cells 37% of ERK1/2 protein was phosphorylated and under the 10 µM CisPt and/or 15 µM CRM treatment the phosphorylation was not significantly modified compared to the untreated cells ([Fig. 3A and B](#f3-etm-0-0-8139){ref-type="fig"}). In untreated PE-CA/PJ49 cells 80% of ERK1/2 was phosphorylated ([Fig. 3B](#f3-etm-0-0-8139){ref-type="fig"}), 10 µM CisPt alone slightly reduced the level of phosphorylation of ERK1/2 to 73% (a; P=0.03), and 15 µM CRM per se induced a significant inhibition of ERK1/2 phosphorylation (41%, b; P=0.003) ([Fig. 3B](#f3-etm-0-0-8139){ref-type="fig"}).
The combined treatment, CisPt and CRM, led to a significant reduction (42%) of the ERK1/2 phosphorylation compared to the control (c; P=0.004) ([Fig. 3B](#f3-etm-0-0-8139){ref-type="fig"}). The data show that PE-CA/PJ49 cells having TP53 amplification are more sensitive to CRM treatment. CRM individually or in combination with CisPt can inhibit phosphorylation of protein ERK1/2 ([Fig. 3B](#f3-etm-0-0-8139){ref-type="fig"}). FaDu having a TP53 deletion and constitutively a lower expression of phospho ERK1/2, does not respond to any of the treatments ([Fig. 3B](#f3-etm-0-0-8139){ref-type="fig"}).
### ERK1/2 activation correlates with the proliferation of tumor cells in HNSCC treated with cisplatin and/or curcumin
PE/CA-PJ49 and FaDu cells were treated with CisPt and/or CRM for 6, 24 and 48 h. The cell proliferation index (PI) was not significantly changed during 6 h treatments. Moreover, PI for 48 h treatments was not significantly different compared to the 24 h of treatment. CRM treated cells also had a decreased PI (b; P=0.0004) for FaDu and for PE/CA-PJ49 (b; P=0.0006) compared to the control ([Fig. 4](#f4-etm-0-0-8139){ref-type="fig"}). CisPt treatment for 24 h determined a significant decrease of the proliferation process compared to the untreated cells, both in the case of tumoral cells FaDu (a; P=0.003) and in the cells PE/CA-PJ49 (a; P=0.0009). CRM treated cells also had a decreased PI (b; P=0.0004) for FaDu and for PE/CA-PJ49 (b; P=0.0006) compared to the control. A marked PI inhibition was observed in both cell lines when the cells were treated simultaneously with CisPt and CRM ([Fig. 4](#f4-etm-0-0-8139){ref-type="fig"}). The results are statistically significant when compared to the control (FaDu cells (c); P=0.0006 and PE/CA-PJ49 (c) P=0.0005) ([Fig. 4](#f4-etm-0-0-8139){ref-type="fig"}). Based on the obtained data, CRM had the capacity to potentiate the effect induced by CisPt treatment on human head and neck cancer cell lines ([Fig. 4](#f4-etm-0-0-8139){ref-type="fig"}).
Since the basal activation status of protein-kinase ERK1/2 in the analyzed tumor cell lines is different in the investigated cell lines, we studied the effect of ERK1/2 activation on the proliferation process as response to the drug treatment. Thus, the tumor cells were pretreated for 2 h with a specific ERK1/2 inhibitor, 25 µM PD98059 (concentration determined after sketching the dose-effect curve) was used for pretreatments, and then the cells were treated with CisPt and/or CRM for another 24 h. FaDu cells have a TP53 deletion ([Fig. 1](#f1-etm-0-0-8139){ref-type="fig"}) and a constitutively lower expression of phospho ERK1/2 ([Fig. 3B](#f3-etm-0-0-8139){ref-type="fig"}). The presence of the specific inhibitor PD98059 did not influence significantly the proliferation process compared to control cells (no. PD98059) (P\>0.05) ([Fig. 4](#f4-etm-0-0-8139){ref-type="fig"}).
PE-CA/PJ49 cells have TP53 amplification ([Fig. 1](#f1-etm-0-0-8139){ref-type="fig"}) and a constitutively high expression of phospho ERK1/2 ([Fig. 3B](#f3-etm-0-0-8139){ref-type="fig"}). Pretreating with the PD98059 inhibitor of the PE-CA/PJ49 cells induced an increase of the proliferative activity in the case of treated cells with CisPt (d; P=0.005) or CRM (e; P=0.007). Similar effect was obtained in the case of the combined treatment of CRM and CisPt (f; P=0.003), compared to the cells that were subject to the same treatment, but in the absence of the PD98059 inhibitor ([Fig. 4](#f4-etm-0-0-8139){ref-type="fig"}). These results show that the inhibition of the ERK1/2 activity facilitates the restoration of the proliferative process of the CisPt and/or CRM treated PE-CA/PJ49 cells. These observations lead to the hypothesis that proliferation of tumor cells depends on the level of protein-kinase ERK1/2 activation.
### The role of ERK1/2 in the activation of p53 in HNSCC cells treated with CisPt and/or CRM
FaDu and PE/CA-PJ49 were treated for 24 h as described, 10 µM CisPt (a; P\>0.05) did not affect the expression of total p53 protein in FaDu cells ([Fig. 5A](#f5-etm-0-0-8139){ref-type="fig"}). On the contrary, 15 µM CRM alone (b; P=0.003) or combined with CisPt (c; P=0.0001) induced a significant increase of total p53 expression compared to untreated cells ([Fig. 5A](#f5-etm-0-0-8139){ref-type="fig"}). In the same cell line, the expression of phospho-p53 protein was inhibited by CisPt treatment compared to untreated cells (a; P=0.003) ([Fig. 5A](#f5-etm-0-0-8139){ref-type="fig"}). The expression of phospho-p53 showed a significant increase in the presence of either CRM alone (b; P=0.005) or combined with CisPt (c; P=0.0007) compared to untreated cells ([Fig. 5A](#f5-etm-0-0-8139){ref-type="fig"}).
The analysis of total p53 expression in PE/CA-PJ49 cells showed that either CisPt (a; P=0.00006) or CRM treatment applied alone (b; P=0.002) induced a significant increase compared to control cells ([Fig. 5A](#f5-etm-0-0-8139){ref-type="fig"}). The same result was obtained when cells were treated with the combined treatment (c;P=0.0001) ([Fig. 5A](#f5-etm-0-0-8139){ref-type="fig"}). The p53 phosphorylation in PE/CA-PJ49 cells was amplified by either CisPt (a; P=0.001) or CRM (b; P=0.0005) treatment compared to untreated cells. The combined treatment of CisPt and CRM amplified the expression of phospho-p53 (c; P=0.0002) compared to control, but the effect of the two agents was not additive ([Fig. 5A](#f5-etm-0-0-8139){ref-type="fig"}).
In order to analyze the role of protein kinase ERK1/2 in the process of p53 phosphorylation, the HNSCC tumor cells were pretreated with 25 µM PD98059 (specific inhibitor of ERK1/2) for 2 h. Then, the cells were treated with CisPt and/or CRM for another 24 h.
As [Fig. 5B](#f5-etm-0-0-8139){ref-type="fig"} depicts the presence of PD98059 inhibitor did not significantly influence the level of total p53 expression (P\>0.05). Untreated FaDu cells in the presence of PD98059 inhibitor expressed phospho-p53 in 22%, while in the cells treated with CRM in 16% (b; P=0.03). In the case of cells treated with CisPt alone the process of phosphorylation seems to be less affected by the presence of PD98059, the phosphorylated form of protein p53 being expressed in 65% (a; P=0.0007). The combined CisPt and CRM treatment in the presence of ERK1/2 inhibitor led to the decrease of the expression of phosphorylated p53 to 42% (c; P=0.0004) ([Fig. 5B](#f5-etm-0-0-8139){ref-type="fig"}).
In the PE/CA-PJ49 untreated cells, the presence of PD98059 reduced the phospho-p53 expression to 53% ([Fig. 5B](#f5-etm-0-0-8139){ref-type="fig"}). The presence of the specific ERK1/2 inhibitor significantly affected the level of p53 phosphorylation induced by either CisPt (30%) (a; P=0.007) or CRM (27%) (b; P=0.005) treatment. The combined CisPt and CRM treatment in the presence of PD98059 kept the phosphorylated form of protein p53 to 30% (c; P=0.007) since the effect of the two agents was not additive ([Fig. 5B](#f5-etm-0-0-8139){ref-type="fig"}).
### ERK1/2 in the modulation of HNSCC apoptosis induced by CisPt and/or CRM treatment
FaDu and PE/CA-PJ49 were treated for 24 h with 10 µM CisPt, 15 µM CRM, combined treatment and compared to control cells (untreated). CisPt treated FaDu cells had 9 times enhancement of the apoptotic events (19.6%) compared to untreated cells (2.2%). CRM treated FaDu cells had a 12 times higher apoptosis (26.1%) than untreated cells. The combined treatment of CisPt and CRM induced 35.7% apoptosis. This indicates a 16 times higher apoptosis than in the untreated cells. Moreover, apoptosis was almost twice higher (1.8×) than the value obtained for CisPt treatment alone. This indicates that CRM amplified the apoptotic process and supported the tumoricidal effect of CisPt ([Fig. 6A](#f6-etm-0-0-8139){ref-type="fig"}).
CisPt treatment of PE/CA-PJ49 cells induced a 6× higher apoptosis (12.5%) compared to untreated cells (2.0%). In the same manner, apoptosis induced by CRM alone (28.8%) or combined treatment of CisPt and CRM (38.7%) was 14× and respectively 19× higher compared to untreated cells. CRM significantly amplified the effect induced by CisPt treatment on the PE/CA-PJ49 apoptotic process since apoptosis was 3× higher than the value obtained for CisPt treatment ([Fig. 6B](#f6-etm-0-0-8139){ref-type="fig"}).
Our data support the CRM apoptosis inducer capabilities considering that CRM had the capacity to induce apoptosis in both tumor lines. Also, CRM potentiated the effect induced by CisPt treatment.
In order to analyze the role of ERK1/2 protein kinase in the modulation of the apoptotic process, HNSCC tumor cells were pretreated for 2 h with 25 µM ERK1/2 specific inhibitor, PD98059. Then the cells were treated for 24 h with CisPt and/or CRM, and subjected to flow cytometric analysis of the apoptotic process. As shown in [Fig. 6C](#f6-etm-0-0-8139){ref-type="fig"}, the PD98059 inhibition of ERK1/2 protein kinase led to a decrease of the apoptotic cell percentage in both cell lines compared to untreated cells. The decreased was statistically significant for all treatments as follows: FaDu cells (a) CisPt treated P=0.007; (b) CRM treated P=4.4E-05; (c) combined treatment; P=0.004; PE/CA-PJ49 cells (a) CisPt treated P=0.006; (b) CRM treated P=5.1E-05; (c) combined treatment P=0.0003. These results demonstrate the involvement of ERK1/2 protein kinase in the apoptotic mechanisms induced by CisPt and/or CRM on the analyzed tumor cells.
Discussion
==========
The essential step during carcinogenesis of oral squamous cell carcinomas is the acquisition of genetic instability that occurs at the nucleotide or the chromosome level ([@b48-etm-0-0-8139]). The genotypic abnormalities such as polysomy of chromosome 17 may be associated with the development of an early recurrence or second primary tumors and can influence the therapy response ([@b49-etm-0-0-8139]). In this study the effect of CisPt and/or CRM treatment on two HNSCC tumor cell lines (FaDu and PE/CA-PJ49) were analyzed. One of the most frequent genetic abnormalities associated with HNSCC affects p53 onco-supressor gene. Abnormalities in the p53 gene cause an inefficient checkpoint system for the repair and destruction of mutant cells. The cell lines were analyzed using FISH analysis to detect the possible alterations of chromosome 17 involving the TP53 gene. PE/CA-PJ49 cell line had an amplification of the TP53 gene associated with polysomy in chromosome 17. FaDu tumor line presented a deletion in gene TP53, without chromosome 17 modifications. This data can explain the different response of each cell line to CisPt and/or CRM treatment.
Genetic modifications, as well as p53 protein expression alterations could influence the activation of several intracellular signaling pathways, such as ERK1/2 and therefore it could contribute to the modulation of the response to therapy. In many studies, the ERK signaling pathway is associated with proliferative ([@b50-etm-0-0-8139]) and cellular differentiation processes ([@b51-etm-0-0-8139]) on one hand, and on the other hand, there are studies showing that this pathway has a role in the apoptotic process ([@b52-etm-0-0-8139]--[@b54-etm-0-0-8139]). This suggests its importance in the modulation of the response to antitumor therapy ([@b55-etm-0-0-8139]). The activation status of ERK1/2 in HNSCC cell lines was evaluated to establish if the cellular response to CisPt and/or CRM treatment is influenced by the level of ERK1/2 activation. Expression of the total and phosphorylated ERK1/2 protein was quantified in treated and untreated cells. The data show that the total and phosphorylated ERK1/2 protein expression is much higher in untreated PE/CA-PJ49 than in FaDu cells. FaDu cell line treated with CisPt and/or CRM did not show a significant change of ERK1/2 phosphorylation. A significant decrease of phospho ERK1/2 was observed in PE/CA-PJ49 cells treated with CisPt and CRM. The constitutively expressed activated ERK1/2 protein-kinase was different in the two tumor cell lines. This was reflected in downstream events such as the cell proliferation process. The inhibition of ERK1/2 activity using PD98059 did not significantly affect the proliferation of the cells (e.g. FaDu) having a low expression of the protein. Cells with a constitutively high expression of ERK1/2 protein-kinase (PE/CA-PJ49) responded to the presence of the inhibitor by reversing the proliferative process. This suggests the existence of an ERK1/2 protein-kinase activation threshold which modulates the proliferative process of tumor cells.
How p53 responds to the drug treatment of tumor cells having a different expression pattern of ERK1/2 was evaluated. In untreated cells, the expression of total and phosphorylated p53 was higher in FaDu compared to PE/CA-PJ49 cells ([Fig. 5A](#f5-etm-0-0-8139){ref-type="fig"}). This difference can be associated with the amplification of p53 gene in PE/CA-PJ49 cells and the p53 deletion in tumor cells FaDu ([Fig. 1](#f1-etm-0-0-8139){ref-type="fig"}). CRM treatment induced an increase of the total p53 protein expression associated with an increase of the phosphorylation process in both cell lines. The response of FaDu cells to CisPt treatment led to a decrease of the phosphorylation process without affecting the expression of total p53 protein, while CisP induced a significant increase of p53 phosphorylation in PE/CA-PJ49 tumor cells ([Fig. 5A and B](#f5-etm-0-0-8139){ref-type="fig"}).
The response of FaDu CRM treated cells in the presence of ERK1/2 inhibitor PD98059 suggest that the ERK1/2 might be involved in the p53 phosphorylation. The response of FaDu CisPt treated cells to the presence of the same inhibitor suggests that p53 upstream events might follow a different pathway than ERK1/2. Regardless of the treatment of PE/CA-PJ49 cells, phosphorylation of p53 involved ERK1/2 activation. Moreover, the results support the involvement of ERK1/2 and phospho p53 in CisPt and/or CRM induced apoptosis. Many studies support the antitumor and pro-apoptotic effect of CRM ([@b56-etm-0-0-8139]--[@b58-etm-0-0-8139]). It is not well known if the effect of CRM is due to the existence of a link between the activation level of ERK1/2 and the apoptotic process. The results of our study show that CRM increased the apoptotic process in both tumor cell lines. CRM acts as an apoptosis-inducer factor and more importantly potentiates the effect induced by CisPt treatment ([Fig. 6](#f6-etm-0-0-8139){ref-type="fig"}).
Conclusions and future directions. The results showed that the tumor cell line FaDu presented a deletion of the TP53 gene, while cell line PE-CA/PJ49 presented polysomy. Both modifications are associated with cell proliferation and response to therapy. The use of an adjuvant (CRM) can increase the efficiency of chemotherapy (CisPt) effect by modulating cell activation processes such as ERK1/2 phosphorylation. The presence of the adjuvant can decrease the required dose of drug, therefore reducing the chemotherapeutic adverse reactions of the agent.
The data show that the ERK1/2 way of action either on cell proliferation or apoptosis depends on the type of cell characteristics and therapeutic agents. In order to achieve an efficient personalized therapy, more investigations are necessary for a better functional interpretation of the intracellular signaling pathways.
In conclusion, evaluating the level of ERK1/2 activation in tumor cells can be a useful tool for an individualized treatment plan, but in order to achieve this goal extended investigations on patient tumor specimens are needed.
Not applicable.
Funding
=======
This study was supported by Grants PN-III-P1-1.2-PCCDI-2017-0341/2018, PN-III-P1-1.2-PCCDI-2017-0782/2018, PN 19.29.01.01, and by Ministry of Research and Innovation in Romania, under Program 1 - The Improvement of the National System of Research and Development, Subprogram 1.2 - Institutional Excellence - Projects of Excellence Funding in RDI, contract no. 7PFE/16.10.2018.
Availability of data and materials
==================================
The data sets used and/or analysed during the present study are available from the corresponding author on reasonable request.
Authors\' contributions
=======================
MB and MTN, designed the research, data acquisition, analysis and interpretation of data, and wrote the manuscript. MB, MM and GGPM performed the experiments, data acquisition, analysis and interpretation of data, statistical analysis and manuscript drafting. VR, GI, LIB, RH, NR and CC contributed to data collection and interpretation, statistical analysis, critical revision of the manuscript for important intellectual content. All the authors read and approved the final manuscript, and had equal contribution.
Ethics approval and consent to participate
==========================================
The study protocol was approved by the Ethics Committee of 'Stefan S. Nicolau' Virology Institute.
Patient consent for publication
===============================
Not applicable.
Competing interests
===================
The authors declare that they have no competing interests.
CisPt
: cisplatin
CRM
: curcumin
ERK1/2
: extracellular signal-regulated kinase
FISH
: fluorescence *in situ* hibridization
PD98059
: (2′-amino-3′-methoxyflavone)
MTT
: (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide)
DMSO
: dimethyl sulfoxide
EDTA
: etylenediaminetetraacetic acid
PBS
: phosphate-buffered saline
FaDu
: human pharynx squamous cell carcinoma
PE/CA-PJ49
: human tongue squamous cell carcinoma
DMEM
: Dulbecco\'s modified Eagle\'s medium
FBS
: fetal bovine serum
TP53
: the tumor suppressor gene TP53
DAPI II
: 4′,6-Diamidino-2-phenylindole
SSC buffer
: the saline-sodium citrate buffer
NP-40
: detergent solution
FITC
: fluorescein isothiocyanate
PI
: propidium iodide
PMSF
: phenylmethylsulfonyl fluoride
ELISA
: enzyme-linked immunosorbent assay.
{#f1-etm-0-0-8139}
{#f2-etm-0-0-8139}
![Effect of CisPt and/or CRM treatment on ERK1/2 protein-kinase expression in HNSCC tumor cell lines. (A) Total or phosphorylated ERK1/ERK2 protein concentrations in the cellular lysates are expressed as protein of interest/total protein (ng/mg). (B) The percent of phospho-ERK1/2 is calculated by formula: % phospho-ERK1/2 = \[(ng phospho ERK1/2/ng ERK1/2 total) ×100\]. The experiments were done in triplicates, data shown are representative of three independent experiments and were expressed as mean ± SD. a, CisPt vs. Control; b, CRM vs. Control; c, CisPt+CRM vs. Control; P\>0.05, not significant.](etm-18-06-5041-g02){#f3-etm-0-0-8139}
{#f4-etm-0-0-8139}
![ERK1/2 in the activation of p53 in HNSCC cells treated with CisPt and/or CRM. (A) The total and phospho-p53 protein expression (ng/mg total protein lysate) in FaDu, PE/CA-PJ49 cells treated with CisPt and/or CRM. a, CisPt vs. Control; b, CRM vs. Control; c, CisPt+CRM vs. Control. (B) Inhibitory effect of PD98059 on the total and phospho-p53 expression. The experiments were performed in triplicates. Results are expressed as mean values of three determinations ± standard deviation (SD). \[PD98059 effect (%) = (protein expression+PD98059/protein expression-PD98059) ×100\]. a, CisPt vs. Control; b, CRM vs. Control; c, CisPt +CRM vs. Control.](etm-18-06-5041-g04){#f5-etm-0-0-8139}
{#f6-etm-0-0-8139}
|
The Houston Cougars coaching staff, like every other staff in the country are well into the spring evaluation period now and will continue to send new offers out to players they deem are a good fit for their program. One player the staff had already decided that on was San Antonio (TX) O'Connor offensive guard Baylen Brown who recently picked up an offer from the Cougars. |
Queen's Walk
Queens Walk, Queen's Walk or The Queen's Walk may refer to:
Queen's Walk, a path along the eastern side of Green Park in central London, England
Queen's Walk Congregational Church, a place of worship in Nottingham, England
Queens Walk (Nottingham), a pedestrian promenade dating from 1842 in Nottingham, England
The Queen's Walk (South Bank), a walk-way along the south bank of the River Thames in London, England |
Q:
Delphi XE8 - IDE Fixe Pack failed on startup
I upgraded to Windows 10. and when I start Delphi XE8 it shows the following dialog. I suppose it is to do with IDE Fix Pack but not sure how to get rid of it. The compiler still works.
A:
The new IDE Fix Pack 5.93 fixes this issue with Windows 10.
Windows 10 uses INT3 instead of NOP to align a function that IDE Fix Pack wants to hook, but IDE Fix Pack expected NOPs.
|
Q:
What is the difference between Responce.Redirect and Response.RedirectLocation?
If I redirect a page using Response.RedirectLocation ="login.aspx" then how it is different form Responce.Redirect("~/login.aspx")?
Thanks
A:
Response.Redirect(url); Causes a 302 redirect (A temporary redirect) and closes the response causing the user browser to be redirected to the alternative URL.
If you want to permanently update a URL, for example you have made changes in the URL structure and you wish to let the world know that this is a permanent change (ie. search engines to pass on the ranking from the old URL to the new), then this should be indicated via a 301 Permanent Redirect.
This can be done as follows:
Response.Status = "301 Permanent Redirect";
Response.StatusCode = 301;
Response.RedirectLocation = "http://newurl.com/";
Response.End();
Note: Response.RedirectLocation does not stop processing of preceding code (unlike Response.Redirect()). This means that unless you want to continue processing tasks, you need to close the connection.
To summarise:
Response.Redirect() always causes a 302 temporary redirect, and halts processing
Response.RedirectLocation allows more control, for example setting the correct status codes, or continue further processing if required.
A:
RedirectLocation sets the Location HTTP header. Redirect does so much more and completes the response with a 3xx status code.
|
1 divided by 709?
-60391/709
What is 2898 divided by 22167?
322/2463
What is 151301956 divided by 2?
75650978
Divide 24685370 by 3287.
7510
Calculate 7631226 divided by 16.
3815613/8
Divide 0 by -20248.
0
Divide 30581051 by 55501.
551
Divide -2 by -3687895.
2/3687895
Calculate -180 divided by -1673.
180/1673
179 divided by -4097342
-179/4097342
What is 244 divided by -280600?
-1/1150
Divide -166428 by 27738.
-6
What is 47623497 divided by -3?
-15874499
-1567 divided by 12
-1567/12
Calculate -19226620 divided by 961331.
-20
What is 3157655 divided by -631531?
-5
What is -50914798 divided by 3?
-50914798/3
Divide 2 by -22905144.
-1/11452572
What is 1 divided by -674628?
-1/674628
Calculate 14003300 divided by -5.
-2800660
What is 86697560 divided by 2?
43348780
Calculate -2929340 divided by -1490.
1966
Calculate 0 divided by 14066676.
0
Calculate -17123640 divided by 1.
-17123640
Calculate 24300627 divided by -1.
-24300627
What is 560718216 divided by 223929?
2504
-3195859 divided by 2
-3195859/2
What is 251100 divided by -31?
-8100
36044390 divided by -16
-18022195/8
What is -21272568 divided by -472?
45069
330 divided by -9277
-330/9277
Divide 313346488 by -1.
-313346488
46328718 divided by -17197
-2694
Calculate -5047474 divided by -2186.
2309
Divide -5967504 by -331528.
18
853643 divided by -16
-853643/16
Calculate -74239583 divided by 3.
-74239583/3
31264 divided by -28083
-31264/28083
Divide -310235763 by -103411921.
3
What is 3 divided by 31150443?
1/10383481
-2 divided by 2705016
-1/1352508
Calculate 348379432 divided by -174189716.
-2
Calculate 55872446 divided by -1.
-55872446
Calculate 0 divided by 3456028.
0
-12995177 divided by -13
999629
Divide -2003113 by -2003113.
1
What is 29493878 divided by -2?
-14746939
What is -43483517 divided by 6167?
-7051
Divide 13248036 by -36.
-368001
Divide -1572023 by 1572023.
-1
Divide -200 by -1543510.
20/154351
Divide -61380440 by 44.
-1395010
-1 divided by 140884053
-1/140884053
Divide 7654536 by 62232.
123
Calculate 132321608 divided by 136.
972953
Divide -25103484 by -4.
6275871
-13177175 divided by 13177175
-1
What is 10127094 divided by 3375698?
3
What is 15162780 divided by 5?
3032556
Calculate 5 divided by -6146936.
-5/6146936
What is 5787782 divided by 2?
2893891
What is 351 divided by -572989?
-351/572989
5 divided by 93268149
5/93268149
What is 137626 divided by 168?
68813/84
Calculate -353 divided by 37126.
-353/37126
Calculate 3 divided by -8062257.
-1/2687419
Calculate 319427402 divided by 97.
3293066
What is 5 divided by -6646543?
-5/6646543
What is -9742508 divided by -3?
9742508/3
Calculate 27063178 divided by 106.
255313
Calculate -277202673 divided by 9.
-30800297
Divide -4006901 by -17197.
233
Calculate -9030763 divided by 4.
-9030763/4
Calculate 41413809 divided by -3.
-13804603
Calculate 1073 divided by -68645.
-1073/68645
What is -49826 divided by 69?
-49826/69
What is 0 divided by 256803?
0
381871 divided by -3
-381871/3
Divide 182776625 by 25.
7311065
55 divided by -1057675
-11/211535
-39989152 divided by -1
39989152
What is -53614265 divided by 645955?
-83
Divide -3714618 by -2.
1857309
Divide -567177041 by -5.
567177041/5
Divide -30622230 by -3.
10207410
Divide 41 by -499651.
-41/499651
Calculate 130248 divided by 32562.
4
Calculate -456004848 divided by -5846216.
78
Divide 1973247 by 43.
1973247/43
-4495431 divided by -1613
2787
54356451 divided by 249
218299
What is 52371270 divided by -539910?
-97
What is -303368696 divided by 2?
-151684348
-38119011 divided by 1815191
-21
Calculate -20418 divided by 21529.
-20418/21529
-209970024 divided by 22803
-9208
Calculate -6 divided by -11611002.
1/1935167
What is 22327875 divided by -5?
-4465575
Calculate -915 divided by 208228.
-915/208228
-160 divided by 42746
-80/21373
-540860589 divided by -60095621
9
Calculate -9237 divided by 6751.
-9237/6751
What is 1416 divided by -3567?
-472/1189
What is -11749342 divided by 2?
-5874671
Divide -4 by 3729800.
-1/932450
What is -29010382 divided by 500179?
-58
15602 divided by -95
-15602/95
What is -3 divided by -14417519?
3/14417519
What is 51613 divided by -340?
-51613/340
Divide 42675885 by 7.
6096555
Calculate 129 divided by -58283.
-129/58283
What is -41 divided by -61490?
41/61490
Calculate -14603924 divided by 3650981.
-4
79 divided by 4325049
79/4325049
1 divided by 43887785
1/43887785
Calculate 357136 divided by -1717.
-208
Divide -425862 by 141954.
-3
Calculate 1614032 divided by -162.
-807016/81
What is -20513 divided by 137?
-20513/137
What is -4 divided by 696055?
-4/696055
What is 262 divided by -15123?
-262/15123
1241233524 divided by -1242476
-999
Calculate 381742 divided by 1144.
190871/572
Calculate 641190 divided by 711.
213730/237
Calculate 1493900 divided by 2.
746950
Divide -849 by 900484.
-849/900484
What is -32858274 divided by -10952758?
3
-235770 divided by 82
-117885/41
What is -8672720 divided by -6377?
1360
Divide -56124344 by 28062172.
-2
-71742018 divided by 28537
-2514
997429404 divided by 926979
1076
Calculate 68587 divided by 1177.
641/11
What is -7669557 divided by -47637?
161
Calculate 6425472 divided by 401592.
16
-3384483 divided by -114
1128161/38
What is -7597770 divided by 30270?
-251
Calculate -2473548 divided by 117788.
-21
Divide -148577744 by -2.
74288872
Calculate 0 divided by 155424.
0
What is -5881527 divided by -10?
5881527/10
What is -188135042 divided by -1?
188135042
Calculate 1 divided by -2444677.
-1/2444677
128101085 divided by 389365
329
-2459594856 divided by 6
-409932476
8 divided by -7138421
-8/7138421
Divide -38238 by 621.
-12746/207
Divide -844 by -347.
844/347
Calculate 2079462 divided by 98.
21219
-2510 divided by -12133
2510/12133
-12094 divided by -6335
12094/6335
What is 24053868 divided by -4?
-6013467
Divide 5 by -6437961.
-5/6437961
What is -4342353 divided by -10617?
409
Calculate 6 divided by 3380955.
2/1126985
50025879 divided by -4
-50025879/4
What is 25831650 divided by 150?
172211
Calculate -265084128 divided by -253912.
1044
Calculate -2261613 divided by -10327.
219
What is 100 divided by 40350?
2/807
Calculate 32 divided by -453594.
-16/226797
Calculate 229 divided by 9514.
229/9514
463 divided by -34883
-463/34883
Calculate -3123026 divided by 7.
-3123026/7
Divide -48024846 by 8004141.
-6
Divide -45233 by -3013.
45233/3013
Calculate 11702323 divided by -32597.
-359
Calculate -1 divided by -1841418.
1/1841418
-20301637 divided by -5
20301637/5
Divide -1217215908 by 343071.
-3548
Divide 65206024 by -1.
-65206024
What is 40947905 divided by -8189581?
-5
Calculate 140777 divided by -92.
-140777/92
What is -370 divided by 80488?
-185/40244
Divide 89767800 by -14961300.
-6
305841328 divided by 494
619112
What is -77856468 divided by -4?
19464117
Divide 0 by 9013270.
0
Divide 226466640 by -180.
-1258148
Divide -2 by 5595911.
-2/5595911
What is 72 divided by 51887?
72/51887
Divide 22223372 by -4.
-5555843
617137252 divided by 19
32480908
What is -2030044 divided by 2?
-1015022
Divide -13728860 by 17.
-807580
Divide -95456508 by 268.
-356181
Divide 65921488 by 3838.
17176
-402754797 divided by 47
-8569251
1 divided by 59666560
1/59666560
803681 divided by -3
-803681/3
What is 8039344 divided by -8039344?
-1
Divide -34948 by -923.
34948/923
Calculate -13389824 divided by 56.
-239104
What is -9630380 divided by 2407595?
-4
What is 169285590 divided by 9?
18809510
What is -165018966 divided by -238?
693357
0 divided by 339448
0
Calculate -19578429 divided by 1053.
-18593
Calculate -5455698 divided by -5455698.
1
Calculate 48799 divided by 1668.
48799/1668
Calculate 531905316 divided by 5933.
89652
Calculate -3 divided by 1682703.
-1/560901
Calculate 22678 divided by -537.
-22678/537
Calculate -217268348 divided by -4937917.
44
What is -6430929 divided by 2?
-6430929/2
Divide 5 by -227228042.
-5/227228042
Divide -1765 by 76931.
-1765/76931
-250848129 divided by 22107
-11347
Calculate 1701045 divided by 7.
1701045/7
-2924964 divided by 2924964
-1
-7266688 divided by 279488
-26
Calculate -84690970 divided by 50113.
-1690
Divide -150718408 by -2962.
50884
-571290287 divided by -4
571290287/4
Calculate 549661494 divided by -1050978.
-523
-45672 divided by -3768
1903/157
What is -833326 divided by 22?
-416663/11
What is -5 |
Flow cytometric method for simultaneous assay of foetal haemoglobin containing red cells, reticulocytes and foetal haemoglobin containing reticulocytes.
Level of foetal haemoglobin (HbF) containing red cells (F cells) is a parameter for monitoring sickle cell anaemia (SS) patients undergoing treatment with HbF modulating drugs (including hydroxyurea (HU)). One convenient technique for F cell assay is flow cytometry. A flow cytometric method for the simultaneous assay of F cells, reticulocytes and HbF-containing reticulocytes (F reticulocytes) is described in this paper. These three parameters can be obtained within 2 h using double colour staining flow cytometry. Glutaraldehyde fixation, Triton X-100 permeabilization, monoclonal antibody to HbF Tri-colour conjugate (MoAb-HbF-TC; deep-red fluorescence) immuno-staining and thiazole orange (TO; green fluorescence) are employed. The red cell gate was set on forward scatter (FSC) and logarithmic side scatter (logSSC) for 50 000 cells on the flow cytometer. Fluorescent signals were acquired from fluorescent channel 1 (FL1; green) and (FL4; deep-red). Coefficient of variation percent (%CVs) of intra- and inter-assay were less than 9% and 15%, respectively. EDTA, citrate, heparin and CTAD anticoagulants are all suitable; the samples can be stored at 4 degrees C for up to 6 days. The method is a simple, rapid, convenient, reproducible and useful way of determining F cell, reticulocyte and F reticulocyte levels in sickle cell and thalassaemic patients. |
---
archs: [ armv7, armv7s, arm64, arm64e ]
platform: ios
install-name: /System/Library/PrivateFrameworks/RemoteManagement.framework/RemoteManagement
current-version: 2
compatibility-version: 1
exports:
- archs: [ armv7, armv7s, arm64, arm64e ]
allowed-clients: [ AccountExtension, AppManagementExtension,
CloudMDMAppListTestApp, LegacyProfilesExtension,
ManagementTestExtension, MiniLauncher,
PasscodeSettingsExtension,
RemoteManagementAccountSettings,
"RemoteManagementAccountSettings-macOS",
RemoteManagementAccountsNotificationPlugin,
RemoteManagementAgent, RemoteManagementTests,
SettingsSharedSupport, Setup, "Setup Assistant",
SetupTests, exampled, remotemanagementd, rmdctl,
rmdinspect ]
symbols: [ _RMAccountAdditionalInfoKeyManagedByOlympus,
_RMAccountPropertyKeyAdditionalInfo,
_RMAccountPropertyKeyAltDSID,
_RMAccountPropertyKeyDSID,
_RMAccountPropertyKeyEnrollmentToken,
_RMAccountPropertyKeyManagementSourceIdentifier,
_RMAssetTypeImage, _RMAssetTypeUserIdentity,
_RMAssetTypeVPPOnDemand, _RMAuthenticationSchemeMAID,
_RMAuthenticationSchemeMAIDFieldAltDSID,
_RMAuthenticationSchemeMAIDFieldDSID,
_RMAuthenticationSchemeMAIDFieldLongLivedToken,
_RMAuthenticationSchemeMAIDFieldShortLivedToken,
_RMAuthenticationSchemeMAIDFieldUsername,
_RMAuthenticationSchemeTest,
_RMAuthenticationSchemeTestFieldToken,
_RMAuthenticationSchemeTestFieldUsername,
_RMConfigurationTypeAccountCalDAV,
_RMConfigurationTypeAccountCardDAV,
_RMConfigurationTypeAccountExchange,
_RMConfigurationTypeAccountGoogle,
_RMConfigurationTypeAccountMail,
_RMConfigurationTypeApplicationManagement,
_RMConfigurationTypeLegacyProfiles,
_RMConfigurationTypeManagementStatusSubscription,
_RMConfigurationTypeManagementTest,
_RMConfigurationTypePasscodeSettings, _RMErrorDomain,
_RMErrorUserInfoKeyDescriptionKey,
_RMHTTPStatusCodeKey, _RMMobileKeyBagErrorCodeKey,
_RMPersonaRestorationFailedException,
_RMStatusFileKeyIdentifier, _RMStatusFileKeyReasons,
_RMStatusFileKeyServerToken, _RMStatusFileKeyValid,
_RMXPCAgentMachServiceName,
_RMXPCDaemonMachServiceName ]
objc-classes: [ _RMAppInstallerController, _RMAsset, _RMAssetResolver,
_RMAuthenticationCredential,
_RMAuthenticationCredentialTransformer, _RMBundle,
_RMConfiguration,
_RMConfigurationEventStreamSubscriber,
_RMConfigurationStatusUpdater,
_RMConfigurationSubscriberClient,
_RMConfigurationSubscriberDescription,
_RMDeviceAuthenticationCredential,
_RMEnrollmentController, _RMErrorUtilities,
_RMEventDescription,
_RMExtensionConfigurationSubscriber,
_RMExtensionContext, _RMExtensionRequestHandler,
_RMExtensionStatusPublisher,
_RMGenericAuthenticationCredential, _RMHTTPLog,
_RMLocations, _RMLog, _RMManagementChannel,
_RMPersonaHelper, _RMPolicy, _RMPolicyStore,
_RMResolvedAsset, _RMResolvedDataAsset,
_RMResolvedFileAsset, _RMStatusPublisherDescription,
_RMUnresolvedDataAsset, _RMUnresolvedFileAsset,
_RMXPCProxy, _RemoteManagement_Subsystem ]
objc-ivars: [ _RMAppInstallerController._terminationAssertionLock,
_RMAppInstallerController._terminationAssertions,
_RMAsset._channel, _RMAsset._content,
_RMAsset._identifier, _RMAsset._serverToken,
_RMAsset._type, _RMAssetResolver._URLSession,
_RMAssetResolver._completionQueue,
_RMAssetResolver._statusUpdater,
_RMConfiguration._assetByIdentifier,
_RMConfiguration._channel, _RMConfiguration._content,
_RMConfiguration._identifier,
_RMConfiguration._serverToken,
_RMConfiguration._type,
_RMConfigurationEventStreamSubscriber._configurationTypes,
_RMConfigurationEventStreamSubscriber._delegate,
_RMConfigurationEventStreamSubscriber._delegationLock,
_RMConfigurationEventStreamSubscriber._eventStreamObserver,
_RMConfigurationSubscriberClient._connection,
_RMConfigurationSubscriberClient._connectionLock,
_RMConfigurationSubscriberDescription._principalClassName,
_RMConfigurationSubscriberDescription._types,
_RMEnrollmentController._connectionByServiceName,
_RMEnrollmentController._remoteManagementUserDefaults,
_RMEnrollmentController._synchronous,
_RMEventDescription._configurationSubscriberDescription,
_RMEventDescription._statusPublisherDescription,
_RMExtensionConfigurationSubscriber._applicator,
_RMExtensionConfigurationSubscriber._assetResolver,
_RMExtensionConfigurationSubscriber._configurationSubscriberClient,
_RMExtensionConfigurationSubscriber._configurationSubscriberClientLock,
_RMExtensionConfigurationSubscriber._configurationTypes,
_RMExtensionConfigurationSubscriber._policyStore,
_RMExtensionRequestHandler._configurationSubscriber,
_RMExtensionRequestHandler._statusPublisher,
_RMExtensionStatusPublisher._requestHandler,
_RMExtensionStatusPublisher._requestHandlerLock,
_RMGenericAuthenticationCredential._authenticationScheme,
_RMGenericAuthenticationCredential._properties,
_RMManagementChannel._accountDescription,
_RMManagementChannel._accountIdentifier,
_RMManagementChannel._enrollmentToken,
_RMManagementChannel._identifier,
_RMManagementChannel._type, _RMPolicy._configuration,
_RMPolicyStore._policyChangeLock,
_RMResolvedAsset._asset, _RMResolvedAsset._error,
_RMResolvedDataAsset._data,
_RMResolvedFileAsset._downloadedURL,
_RMStatusPublisherDescription._keyPaths,
_RMStatusPublisherDescription._principalClassName,
_RMUnresolvedDataAsset._asset,
_RMUnresolvedDataAsset._queryParameters,
_RMUnresolvedFileAsset._asset,
_RMUnresolvedFileAsset._downloadToFileURL,
_RMUnresolvedFileAsset._queryParameters ]
...
|
/* {[The file is published on the basis of YetiForce Public License 3.0 that can be found in the following directory: licenses/LicenseEN.txt or yetiforce.com]} */
'use strict';
jQuery.Class(
'Settings_BruteForce_Index_Js',
{},
{
container: false,
getContainer: function () {
if (this.container == false) {
this.container = jQuery('div.contentsDiv');
}
return this.container;
},
saveAjax: function (mode, params) {
app
.saveAjax(mode, params)
.done(function (data) {
var response = data.result;
var params = {
text: app.vtranslate(response.message),
type: 'info'
};
app.showNotify(params);
})
.fail(function (textStatus, errorThrown) {
app.showNotify({
text: app.vtranslate('JS_COULD_NOT_FINNISH_REACTION'),
type: 'error'
});
app.errorLog(textStatus, errorThrown);
});
},
registerSwitchEvents: function () {
this.getContainer()
.find('.js-switch--sent')
.on('change', (e) => {
$(e.currentTarget)
.closest('.form-group')
.find('.selectedUsersForm')
.toggleClass('d-none');
});
},
registerEvents: function () {
var thisInstance = this;
thisInstance.registerSwitchEvents();
var forms = thisInstance.getContainer().find('form');
forms.on('submit', function (e) {
var form = jQuery(e.currentTarget);
if (form.validationEngine('validate') == true) {
var paramsForm = form.serializeFormData();
paramsForm['active'] = form.find('[name="active"]').prop('checked') ? 1 : 0;
paramsForm['sent'] = form.find('[name="sent"]').prop('checked') ? 1 : 0;
delete paramsForm['_csrf'];
thisInstance.saveAjax(form.data('mode'), paramsForm);
return false;
} else {
app.formAlignmentAfterValidation(form);
}
});
forms.validationEngine(app.validationEngineOptions);
jQuery('.unblock').on('click', function (e) {
var progressIndicatorElement = jQuery.progressIndicator({
position: 'html',
blockInfo: {
enabled: true
}
});
var element = jQuery(e.currentTarget);
app.saveAjax('unBlock', element.data('id')).done(function (data) {
var response = data.result;
var params = { text: app.vtranslate(response.message) };
if (response.success) {
params.type = 'info';
element.parents('tr').hide();
}
progressIndicatorElement.progressIndicator({ mode: 'hide' });
app.showNotify(params);
});
});
}
}
);
|
the world was mean today |
Wow ! What a mess !I just dug into Xith javadoc, and ehhh there's a lot of packages, and some of them deprecated, bad-named, duplicated.. some classes are not in the good packages (IMHO) and.. eh there's a lot of work.Here is the list of packages and my comments
Collision System :com.xith3d.collidercom.xith3d.collider.forces These should be placed in a separate jar, I think. It's now broken, buggy and incomplete
com.xith3d.common Package name could be clearer. It contains only one class, SystemHelper, which is used for debug messages !!! Should be removed if not used. If it is, should be renamed OR moved.
com.xith3d.datatypes Nothing to say, except that there's no naming conventions. One is named ExtSomething3f and another Something4f. I'd say, all ExtSomething or all Something, but not two conventions
com.xith3d.gui The DisplayOptions class seems completely useless.. it justs contains two fields : USE_JAVA3D_ENGINE or USE_XITH_ENGINE. Don't see the use here.
com.xith3d.image com.xith3d.imaging I'd like to see the difference here... In fact xith3d.image is for "pixel processing" and imaging is in fact some image loaders. I don't understand their use.. I thought it was java.io (or any JDD class) that was doing the image loading job ?
com.xith3d.io Totally unknown package. I didn't know Xith was an I/O library !! I think it's outdated and should be removed.
com.xith3d.loaders com.xith3d.loaders.ase com.xith3d.loaders.texture The xith3d.loaders package contains some strange classes (Loader and Scene) that seems not to be used. I don't what we should do about them.I don't understand why the ASE loader is part of the core, and not the OBJ, MD2, 3DS, and COLLADA ones.
com.xith3d.occluder So we have occluder culling ? I thought it was broken..
com.xith3d.picking Arne's classes for advanced picking would be welcome here
com.xith3d.scenegraph.behavior Should be com.xith3d.behavior and, in fact should even be external to Xith3D. I didn't know Xith3D was a behavoring library either. And some behavior classes are in the toolkit, IIRC
com.xith3d.scenegraph.utility com.xith3d.scenegraph.utility.general Packages name not clear...... After investigations, utility contains a timer (should then be in com.xith3d.timer, or external to the core) and utility.general contains some comparator thingies I never heard of before.
com.xith3d.terrain Javadoc filled with "Created with IntelliJ IDEA" And seems magicosm-specific. Well I didn't succeeded to figure out what it was doing exactly.
com.xith3d.test com.xith3d.test.lesson37vs com.xith3d.test.tcm .test ok, but .lesson37vs and .tcm don't need seperate package ! or we must be doing sepearate packages for everything ! (model and texture loaders, renderers, lighting, and so on.) Test cases don't need to have "Xith3D" at the beginning of their name
com.xith3d.transients Classes should be in datatypes
com.xith3d.userinterface What's the difference with xith3d.gui ?
com.xith3d.utilities Useless, contains one class only, the "ModelRenderer", that renders a simple cube. Should be removed.
com.xith3d.utility.cache Don't understand what it's used for
com.xith3d.utility.cmdline What's the use ? And the syntax of the comand-line commands ?
com.xith3d.utility.events What does this has to do with Xith ? Is it used somewhere ?
com.xith3d.utility.exception Useless, contains one class, Check, that checks wether a value is true or false... To be removed
com.xith3d.utility.general To be splitted in utility.math & utility.compression. And the ZipUtility shouldn't be in Xith3D (and the JDK, IIRC, has classes that does that job)
com.xith3d.utility.geometry com.xith3d.utility.geometry.nvtristrip Is it used ? Classes with unclear names
com.xith3d.utility.image Classes with unclear names
com.xith3d.utility.interpolate OK
com.xith3d.utility.logs OK, but don't we use an external lib for logging (Log4j / java.util.logger ?)
com.xith3d.utility.memory OK
com.xith3d.utility.noise OK
com.xith3d.utility.profile Seems OK
com.xith3d.utility.properties Hmm.. is this serialization ?
org.xith3d.geometry Some classes' names to be changed for the sake of clarity, and conventions to be defined for geometric primitives
org.xith3d.loaders.md2 org.xith3d.loaders.md2.util org.xith3d.loaders.md2.util.cio org.xith3d.loaders.md2.util.pak org.xith3d.loaders.md2.util.pcx OK, but for PCX loading shouldn't it be handled elsewhere ? And do we need all these packages ?
org.xith3d.loaders.objOK
org.xith3d.loaders.tdsorg.xith3d.loaders.tds.model OK. Could it be in one and only package ?
com.xith3d.terrain Javadoc filled with "Created with IntelliJ IDEA" And seems magicosm-specific. Well I didn't succeeded to figure out what it was doing exactly.
for displaying terrains, but it doesn't support textures AFAIK. As far as I can remember there should also be example using it.
But on the whole you are pretty right I think, Xith is really very messy and also inconsistent. But you'll also have to know, that most of the changes you're suggesting would mean great work for everybody using Xith3d (for example everybody would have to change most of the import statements, if we would split com.xith3d.scenegraph into several subpackages)
But on the whole you are pretty right I think, Xith is really very messy and also inconsistent. But you'll also have to know, that most of the changes you're suggesting would mean great work for everybody using Xith3d (for example everybody would have to change most of the import statements, if we would split com.xith3d.scenegraph into several subpackages)
I think a cleanup could be done but it would need to progress incrementally.
The xith3d.loaders package contains some strange classes (Loader and Scene) that seems not to be used. I don't what we should do about them.
They actually are supposed to define a common interface for Model-Loaders. And for example croft uses them for his collada loader.
So the best to do is probably to adapt already existing loaders to this interface, eh ? But for the MD2/3DS/COLLADA loaders, where we have animation, I don't know how to do. Maybe we can define a common datastruct for animation data and make a shared "frame interpolator" (and a "skeleton interpolator" when we'll have Cal3D support ).. But that's a lot of work. Loaders are hack or ports..
But on the whole you are pretty right I think, Xith is really very messy and also inconsistent. But you'll also have to know, that most of the changes you're suggesting would mean great work for everybody using Xith3d (for example everybody would have to change most of the import statements, if we would split com.xith3d.scenegraph into several subpackages)
I think a cleanup could be done but it would need to progress incrementally.
@Croft : hmmm.. people won't like to see 50 different revisions, each time having to changes 20 imports...@Arne : maybe we can do a tool that refactor a source code to change imports correctly ^ ^
So here's a quick summary, after the big dug.The items striked are done or removed, italic are subject to polemic, and the others are proposals.For each item or group of item, I'll launch a poll and apply changes if the majority is for it.[size=12pt]Easy to do[/size]
001 Move all com.xith3d.collider packages to xith-cs.jar
002 Remove com.xith3d.gui package
008 Fix occlusion culling if broken. If not, say aloud it's a feature
009 Add arne's classes for Picking in com.xith3d.picking (I can submit a patch)
[/color]
[size=12pt]Break API compatibility (but easy to do)[/size]
003 Rename com.xith3d.imaging to com.xith3d.utility.image
004 Remove the com.xith3d.io package, if it doesn't bother anybody
005 Move com.xith3d.loader.ase to the toolkit, or change Core/Toolkit policy
ok first of all I'm against the merging of the sub-packages of the org.xith loaders packages (026, 027, 028) I think, if the designers of those packages decided to have parts in subpackes it's best to keep it like that.
about my picking algo: should it go to xith or to the xith-tk (dunno where, but it should go somewhere)I would also check it myself an do some dokumenting if you submit a patch for it. (009)
005 has already been done, the files just need removal from CVS (I was waiting a while so everyone has a chance to move over)006 is actually not that hard to do, and doesn't break backward compatability. There is an IssueZilla logged on it and it is in progress (commons logging has been added to the third-party directory)
I'm not a big fan for splitting up the scenegraph package, as I think it would violate the principle of tight cohesion and loose coupling. It is possible to take these organisational changes too far and I wonder if this would possibly be an instance off that. What would actually be gained by doing this?
While I havn't looked into all the cases to confirm, I agree in principle that dead code should be removed and packages with only a few underused classes could be merged into other packages.
The most important thing with non-backwards compatable changes (which cause Xith3D users pain) is that each change is justified and that the benifits outweigh the inconveniences.
On the topic of the Javadoc, I encourage everyone to take a class that they understand, javadoc it and submit a patch/changed file to IssueZilla (we could potentially setup a general Javadoc bug which can be used to track this) .
ok first of all I'm against the merging of the sub-packages of the org.xith loaders packages (026, 027, 028) I think, if the designers of those packages decided to have parts in subpackes it's best to keep it like that.
I'm not a big fan for splitting up the scenegraph package, as I think it would violate the principle of tight cohesion and loose coupling. It is possible to take these organisational changes too far and I wonder if this would possibly be an instance off that. What would actually be gained by doing this?
Well, what would be gained ? Clarity. Actually it's really difficult to distinguish (/classify) classes in the com.xith3d.scenegraph package. Took me nearly a half hour to create seperate packages and put the classes into them. So yeah it may take time to changes imports for Xith users but that the price to pay if you wanna have a clean API. Anyway it isn't absolutely needed. Hmm.. I'll look deeper into that.. (By the way : Can we consider Billboard as a primitive ? In fact I was surprised to see that it derived from TriangleArray, as I rather saw a Billboard as a Group that as Primitive)...
On the topic of the Javadoc, I encourage everyone to take a class that they understand, javadoc it and submit a patch/changed file to IssueZilla (we could potentially setup a general Javadoc bug which can be used to track this) .
A package should be mostly self-contained, which is the idea behind loose-coupling -- that it's better to reduce the package interdependancies and have tight-cohesion within the package. Xith3D isn't a shining example of the loose-coupling principle as it is, you gave a few examples of seemingly meaningless packages.
Perhaps what is needed is simply better non-javadoc non-source documentation explaining what the different features of the scene graph is? Java3D had this (e.g. the Java 3D API Jump Start book). We have the getting started guide which I think is quite good (disclaimer: I did write some of it ), but perhaps could have a more detailed explanation of the scenegraph.
Billboard is a type of node in Java3D which is probably why Xith3D treats it similarly. The actual implementation in Xith3D is a bit messy and could probably be optimised and cleaned up.
Just a quick point regarding the api. Xith was originally created with the idea in mind of having the same api as Java 3D (as at that time Java3D was in an indefinate holding pattern). If maintaining the same api as Java 3D is still a goal then sure the organisation should continue to reflect this? or be brought in line where it has drifted?
I think this has also lead to some of the missing parts in Xith as the api was based on Java3D, but only the bits needed for magicosm were written.
OK, I will also make some comments on this topic... Still have not too much time on this, but I think it is good to know how the situation was developing in the past.
Originally, big part was based on Java3D API and was created by David Yazel. There was absolutely no idea to develop Java3D replacement, but rather to ease proting of Java3D code to Xith3D - many developers started theit 3D efforts with Java3D, and after [even few years] recognized that Java3D has major problems (not discussing them here).
Maintaining 100% Java3D compatibility was never a goal, it was "good to have".
After I joined the development, (adding parallel projection, extra transparency sorting modes, some other significant additions) and in parallell decided that all the 3D projects being developed in my company move to Xith3D. Approximately that time other devs also made valuable contributions - Java Cool Dude aka jcd added shaders support (as far as I can recall), Artur Besiadovski aka abies added very important port of NVidia Stripifier, which allows to double up performance in some cases, etc. (I also have to mention William Dennis as community maintainer and our informal "PR chief" ).
Since the original release, I was trying to ensure that everybody follows internal concept of Xith3D - as I mentioned in other thread, state sorting mechanism in Xith3D is quite sophisticated and leaves a huge space for enhancements and optimizations. This is one of the reasons why the public API is as it is - it nearly did not change from the very beginning.
Another point that all the developers were (and are) focusing on the topics they are interested in - for example, I do not use BillBoards [now], so I did not check. Parts touched several times are working fine, others - not.
Unfortunately, Xith3D had never good ARB (Architecture Review Board). Having ARB is very important for keeping clean architecture evolving in correct direction. It is even not possible to design more or less big API and make an implementation of it without ARB coordinating the efforts. Even I with my not so big company of bit more than 40 developers have to have ARB. But ARB means strict following the formal procedures, and it slows down progress a lot - so I will pessimistically tell that it is not possible to develop good API fast. Look at JCP if you ever tried to take part as an expert - it is very very slow but 100% proper way how Sun is doing this.
Every developer pretends that he will improve the architecture, but it is only possible after really deep understanding the previous one [really no critics to anybody - just a general statement; I really really appreciate the efforts of Xith3D community].
If you ask me about the future of the API, I would suggest to create Xith3D API Generation 2, which will have more clean design, better organizing of the source code, etc. We should push the practice of commenting the changes, javadoc, etc. etc. etc.
...but you have to consider sometimes a big - really big - efforts of migrating to new API (for example, I have here more than a hundred thousand lines of code depending on existing Xith3D API now - I already migrated once from Java3D to "compatible" Xith3D, so I exacly know what does it mean for more or less big project).
Now on particular items:
Quote
Collision System :com.xith3d.collidercom.xith3d.collider.forces
Answer is generalized physics interface, or, even better, generalized scenegraph modification API -> just cleaner API design. Agree to be moved, but then we should make a coordinated repository of "Xith3D Components" (xith-tk is now such repository).
Quote
Is it used ? Is frustum culling functional ? (We don't have test cases for occlusion and frustum culling)
Yes, it is working. I can guarantee this, because of I was extensively debugging it. We just don't have test case.
Regarding all the utilites.* package, it is a megrer from xith_utilites.jar dependency introduced by David Yazel long long time ago. I think most of these packages should be factored out or moved (for example, nvstripifier should be moved, but it can be also one of components.
Personally I don't remember saying I was going to change Xith's architecture to make it better ^^ I studied a bit the architecture (mainly via Javadoc and Source sometimes for obscure parts..) but didn't changed the core (yet).
So you think we have to do an API redesign, make an ARB (= global spec, right ?)... so we should release a Xith version 1 and maintain it "correctly", and make an ARB for a Xith version 2 ?
I would be the first to be for this approach, but I'm afraid I don't have the software engineering competences to do that.But I will follow the process if it's engaged.
I just hope some competent people will collaborate, since IMHO it's not doable by one only person.
Personally I don't remember saying I was going to change Xith's architecture to make it better
As I mentioned - was no critics to anybody, so please even don't try to take it on your own account just because of you raised the topic.
Quote
So you think we have to do an API redesign, make an ARB (= global spec, right ?)... so we should release a Xith version 1 and maintain it "correctly", and make an ARB for a Xith version 2 ?
Well... ARB is just a process - The Board should review all the proposed changes and ensure they fit the concept. Now looks like I am playing the role of ARB - I guess you feel on nearly all my replies a kind of conservative opinion.
As of complete redesign, I don't think it is a good idea. I prefer evolutionary development rather than revolutionary - introducing a big architectural change is a game that never ends.
I think the first target we should concentrate on is a source code organizing and other efforts, that will help people to use AS MUCH AS POSSIBLE of Xith3D WITH MINIMUM EFFORTS.
It should be easy to start exploring the source code, easy to understand it even if it is big and complicated. I think that strategically more people understand the open-source system is better for the system. My idea (still not implemented) is to convince developers that it is easier for them to change/fix/add features in Xith3D than waiting for somebody else to do this.
Now it is too big effort to start contributing to Xith3D core - only few people can really do this correct way, unfortunately.
To improve this, if I would sign to do this [which is no chance - sorry] I would create a tutorial for beginners that teaches them how to use Xith3D, and in parallel by very small bits feeds them with an information about Xith3D internals with pointing to Xith3D source code, so the barrier of "It is too complicated to even start thinking about this" can be lowered slowly in the heads of developers.
It should be easy to start exploring the source code, easy to understand it even if it is big and complicated. I think that strategically more people understand the open-source system is better for the system.
And how to achieve that goal ? I don't mind working if I know what to do
At least, provide a kind of ready-to-use source setups for users of different IDEs, so, say, if one uses Eclipse, he can with single click install Xith3D sources, so his app will be already linked to Xith3D source via Ctrl+Click. This way we will provocate people to look at the sources more often, which leads to more knowledge about the source in general. For many people CVS checkout is a headache...
See how vendors of different microcontrollers do - they provide starter kits and sell development boards, so one can start playing with the chips in a minute.
I can do a tutorial with screenshots, really easy to follow, to add xith sources to Eclipse, but I don't know how to do a script for installing that with a single click. I will investigate that a bit more..
java-gaming.org is not responsible for the content posted by its members, including references to external websites,
and other references that may or may not have a relation with our primarily
gaming and game production oriented community.
inquiries and complaints can be sent via email to the info‑account of the
company managing the website of java‑gaming.org |
SUMMER BEAVER, Ont. — Nibinamik First Nation has declared a state of emergency because of a failing diesel generating system amid the COVID-19 pandemic.
The state of emergency came into effect on Wednesday night at 5 p.m.
“The approval processes to access supports to upgrade the diesel generator station, stabilizing power supply must be prioritized and streamlined,” the letter reads.
Nibinamik First Nation
ᓂᐱᓇᒥᐠ ᐊᓂᔑᓂᓂᐃᐧ ᑕᓇᐱᐃᐧᓂᐠ
Nibinamik First Nation (Ojibwe language: ᓃᐱᓇᒥᐦ ᐠ (Niibinamik, “Summerbeaver”); unpointed: ᓂᐱᓇᒥᐠ), also known as Summer Beaver Band, is a small Oji-Cree First Nation reserve in Northern Ontario, located on the Summer Beaver Settlement that is connected to the rest of the province by its airport, and a winter/ice road that leads to the Northern Ontario Resource Trail.
Related Articles:
ᑯᑕᑭᔭᐣ ᑫᑯᓇᐣ ᐊᓂᒧᒋᑫᐃᐧᓇᐣ
March 3, 2020
Ontario government supports north-south Ring of Fire link
(Click image to read the article)
March 3, 2020
What Would It Look Like to Take the First Nations Water Crisis Seriously? |
Does this mean Titanfall won’t have a definitive ‘end’, continuing indefinitely?
Titanfall will most definitely have an ending. It’s not a story if it doesn’t have an ending, but there are multiple sides to that story. It’s told from both the Militia and IMC perspectives, and to fully grasp Titanfall’s campaign, you’ll need to play it from both sides. And as with any good story, we’ve hopefully peppered it with enough detail and nuance that you’ll notice something new every time you replay it.
Can we expect a vast, overarching story about the fate of the universe? And if so, is this a nod towards lots of post-release updates?
Most consumers play the single-player campaign of any shooter only once, and then go on to play multiplayer for months or years. Single player campaigns take hundreds of thousands of hours to develop, and with a team as small as ours we couldn’t afford to sink that kind of development time into a four to eight hour journey people will only play once. What we’re hoping to achieve is to take an exciting cinematic experience and weave it into multiplayer gameplay so compelling, that players will continue to be engrossed in the universe of Titanfall for months and years after its release.
How have you added a sense of story-led progression? Will multiplayer progression – in terms of levels/XP – be tied to narrative advancement?
So we’ve only really spoken about one way to play Titanfall. That’s Campaign Multiplayer. You can join a lobby by yourself or with a party, but here’s where it gets different. You and your party or enlisted into a faction, either IMC or Militia. You’ll play the campaign and progress through the narrative hitting the missions in order until you’ve beaten the game on that faction. You’ll then have the option to play through again from the beginning on the other faction. Once you’ve beaten the game from both sides, you’ll be able to play any mission on either faction you like. There are traditional modes as well that you’d expect from a multiplayer FPS game and you can start playing those from the first time you run the game. No matter what you play, you earn XP and progress. |
Java Programming Course
Comprehensive Java programming that teaches you all the important skills that are necessary for you to become a solid and successful Java programmer. The course focuses on teaching various language features of Java as well as establishing solid grasp in Java object-orientation.
A printed copy of the course material will be provided onsite on the day course begins. In case of online training, an electronic version (PDF) of the material will be emailed to the participants at least two days before the training starts. Please contact us at material@admin@ejyle.academy if you haven't received it 2 days prior to the start of the training. |
This awful event happened Monday night in a town about an hour's drive from where I live. Apparently, the woman had taken shelter from her abusive husband at a local REACH house with her 13 year old son.
Wow. Very sad. I knew someone that was killed by her estranged husband. Still hard to believe. The guy John Woodring doesn't look dangerous. Just goes to show you cannot judge someone on looks. I feel so sorry for that 13 year old boy. How tragic.
I understand his natural father was coming up from Texas to take him back home with him, although the son will probably have to come back to testify if Woodring is caught and there is a trial.
There were some comments that were published by the paper, purportedly made by those who knew Woodring. They said he was a real mean sombitch when he thought he'd have the upper hand. That's pretty typical of abusers.
_________________
"Behind every great fortune lies a great crime."Honore de Balzac
"Democrats work to help people who need help. That other party, they work for people who don't need help. That's all there is to it."~Harry S. Truman
SYLVA – Police say a driver cut off by another car on a Midwestern toll road took note of its license plate, giving investigators in Jackson County what could be a break in the hunt for a murder suspect.
Law enforcement around the country received information Friday morning about John “Woody” Woodring, a fugitive since the shooting death of his wife Monday.
SYLVA – Almost a week after Bonnie Woodring was shot and killed in a Sylva domestic abuse shelter, police are enlisting the help of the “America’s Most Wanted” television show to find her suspected killer, John Woodring.
Sylva Police Chief Jeff Jamison said Saturday a crew was in town filming for the show. He said the program is scheduled to air Sept. 30.
The show has helped law enforcement officials catch 906 fugitives since it began airing in 1988. “America’s Most Wanted” is already featuring a profile of Woodring on its Web site.
Law enforcement around the country received information Friday about Woodring, a fugitive since the shooting death of his wife Monday.
“We have what we consider a viable lead,” Jamison said.
He said a motorist Thursday night on a toll road in the Midwest was cut off by a car with license plates matching the vehicle in which Woodring is believed to have fled.
Police believe Woodring stole an electric blue Honda Civic from a neighbor the night of the shooting.
“We’re working with the authorities to see if there would be some video,” he said.
Jamison would not disclose the location of the sighting but said it was “near a major city.”
I live in Sylva where the incident happen.. I know him personally.. and I would love nothing more than for them to catch him. Please let everyone know that he is now on America's Most Wanted which will be aired on Sept. 30th.
One week after he went missing after allegedly shooting his wife, John “Woody” Woodring is still a fugitive. However, there is a new lead this morning. Sylva Police Chief Jeff Jameson says they have located the 2006 Honda Civic behind the Greyhound bus station in Knoxville, Tennessee. Investigators are searching for clues there now and will follow up on any leads. Woodring is wanted for first-degree murder charges in the death of his wife, Bonnie, last week at the REACH Emergency Shelter.
In the reports.. the family has reported having a "dispute" many years ago. In his website he had stated that "he didn't have no family". They disowned him is what I gathered.
However.. the car he stole, was from a neighbor along with the gun and he took financial records of some sort.
my opinion.. he planned this out. He's either hopped the bus or he's had someone to meet him there. However, I do not believe that his family is helping him. At least I wouldn't think anyone would help someone like this.. unless it's another criminal themself.
I just want to reach out to the public and tell everyone to please post his picture everywhere.. in gas stations, hotels, everywhere possible.. along with all the other fugitives and terrorist.
We are a very small town.. and this was devastating news. It really hits home when you know the guy personally and had him repeatedily ask me out and follow me around for a couple months. That was about 3 years ago. I'm so thankful today that I trusted my "gut" instinct. I feel for Bonnie and her children.. |
Birmingham Hospital Trusts To Merge
Heart's been told two hospital trusts in Birmingham are going to merge to try and save money.
The University Hospitals Birmingham and Heart of England Foundation Trust say they can save around £3.5million just by working together more closely.
The outcome will be one Trust running the Queen Elizabeth Hospital Birmingham, Heartlands, Good Hope and Solihull hospitals, the Chest Clinic and Solihull Community Services, as well as the Trusts' satellite services.
Bosses say that money can better help patients that need treatment and there will be no job losses because even working together the hospitals will be understaffed.
Since November 2015, Dame Julie Moore has been Chief Executive of both UHB and HEFT. She said: "We have agreed that the current arrangements are not sustainable. If we are to continue working together to maximise clinical benefits for patients, we need to implement a transformation that will deliver better access to better quality services for patients, supported by the most effective structure.
"Patients are not getting that at the moment despite the tireless work of staff across both trusts. We need our hospitals and services focussed on doing the best for patients, not protecting their organisational boundaries.
"The single Trust will pool the best talent and leadership from both organisations. We will make the best use of the finite resources available. By reviewing, rationalising and sharing resource across non-frontline services, we can then channel resource and investment into sustaining and developing our clinical services and sites."
Dame Julie added: "The work undertaken between the two Trusts has so far provided greater sustainability and certainty for patients, the public and the health economy in the long term. The single organisation will build on this." |
Darrell Markewitz is a professional blacksmith who specializes in the Viking Age. He designed the living History program for L'Anse aux Meadows NHSC (Parks Canada) and worked on a number of major international exhibits. A recent passion is experimental iron smelting.
'Hammered Out Bits' focuses primarily on IRON and the VIKING AGE
Wednesday, May 28, 2014
Sorry about the lack of materials over the last month.
I had a booth set up at the International Congress for Medieval Studies in early May, then courses and a couple of in school / lecture sessions over the following week.
Right now I am engaged in what I hope (after 18 months marked by constant packing and loading) is my last moving adventure.
Check back next week (!!) for some commentary on:DARC at Upper Canada VillageScottish Late Iron Age Iron Smelt
... and likely some more of the general opinionated commentaries (you should be expecting those by now!)
Tuesday, May 06, 2014
Just been up to the nearby iron ore mine and picked up some samples.
There appear to be two different types, one a very black and heavy ore
which is very rusty, the other the more usual looking ore (From my
limited experience).
A couple of things :
(some of which Eden may be well aware of - this all related to the upcoming 'Turf to Tools' project at the Scottish Sculpture Workshop in mid August)
The direct process bloomery furnaces we will be building really need at
least 50 % Fe content to the ore to function. Closer to 60% would be a
lot better. This is pretty pure, as modern mines usually run closer to
25 - 30% as a viable ore body. This means it may be hard to find a
usable ore at an existing or abandoned mine.
Sauder & Williams are using ore from Colonial Era workings in
Virginia. They manage to find good ore because these were deposits
deemed too small / too remote for even the technologies of the late
1700's. So looking for long abandoned *small* workings might be a clue.
Lee Sauder suggests a very rough 'field test' for Fe content. Take a
sample that looks good / typical. Pound or grind it to small fragments
(sand sized). Place about a hand full in a glass jar and weigh. Fill the
jar with mild acid, something like muriatic / hydrochloric (pool
chemicals from the hardware store) or sulphuric (battery acid). Leave
this overnight, shake the jar now and then. Pour off the liquid and
refill the next day. Repeat until the acid stays clear. Now pour off the
last liquid and let the contents dry in the sun a couple of days. Weigh
the jar again.
The difference in weights should be the amount of iron removed, this
gives you a ball park number for your purity.
It would be great to smelt using a locally available (?) primary bog
iron ore.
Problem there is twofold:
1) Even if bog ore is present, actually finding an actual deposit area
can be pretty difficult.
2) Even if the geography allows for a deposit, is there enough ore
available for an effective smelt. (see below)
For the SSW project, it would be great to attempt a smelt using that
distinctive Macaulyite ore. Again, you will have to advise if you can
get enough of the material to allow for this. (see below)
As a back up, there are two possibilities I can see:
1) Source a suitable quantity of industrial taconite pellets.
With the long history of industrial iron production in Scotland, I would
expect this would not be massively difficult. Perhaps contacting one of
the (still existing?) industrial operations?
Usually even an abandoned modern plant has tons of this stuff piled /
spilled around. Given that we would be looking for at best a couple of 5
gallon pails of pellets, gathering up enough is more a problem of
getting to the source.
This also might suggest attempting to make some kind of sponsorship
arrangement with an existing corporation? At the least it would be
donation of taconite, but maybe this could be expanded into some project
funding? Even covering the cost of the charcoal for the project would be
a massive help. (Something like "'Scottish Steel' - From the Past and
into the Future") I certainly don't have any problem promoting a local
company / business who makes a significant contribution.
2) Making up a suitable ore analog.
This will require sourcing a local / regional pottery supplier. The raw
iron oxide, both red (Fe2O3) and black (Fe3O4) should be available as 20
kg amounts. We could easily at least roughly duplicate the components of
the Macaulyite by adding other oxides. The primary consideration there
would be cost, and to a certain extent the time required for the drying
of the mixed paste (?)
Any given smelt attempt will require ideally 20 kg of ore as a working
amount.
My experience with this size / type of furnace is that at least 8 kg is
needed to basically establish the working environment inside the furnace
itself, the slag bowl system. Any amount of ore *over* that 8 kg then
goes into the developing bloom.
The experience here is that given a suitable ore, 20 kg input should
give something in the order of 20 % + return as bloom.
This yield rises sharply as you increase the amount of ore used. Also
because the furnace system is established (heat and slag bowl), there is
a big efficiency increase with larger volume ore additions towards the
end of the working sequence.
However...
Remember the limits of manpower (and skills). As the blooms get larger
and larger, they become significantly more difficult to work. There is a
real limit to the ability of human hands to effect larger masses of
metal.* (Admittedly, with enough skilled strikers, even the largest
blooms possible via these small bloomery furnaces *can* be compacted and
forged. You do have to be honest with yourself - how many skilled hands
are realistically available?) Despite the improvement in yield /
efficiency, this manpower gap is why at Wareham I tend to aim for
smaller blooms - in the 3 - 5 kg range.
* Although only a very (!) rough way to think about this is :
Force applied by a hammer is more or less a multiplication of hammer
mass times swing velocity.
Control of the hammer declines with the weight of the head, modified of
course by the skill and body size of the worker.
All this combines to produce a real limit to heavy a hammer any
individual can be effective with - and how much force they can produce.
The bloom mass itself has a resistance to forming. Very (!) roughly this
can be thought of as closer to the *cube* of the volume (thus also the weight).
So a 5 kg bloom may take something closer to six times the amount of
hammer force to compress and shape it over a 3 kg one.
(Note - this is only intended as a rough ball park estimate - I'm really
not sure what the exact physics is here!)
Subscribe
Ontario Arts Council
Canada Council
Ontario Arts Council
February - May 2012 : 'Bloom to Bar' Project Grant
February 15 - May 15, 2012 : Supported by a Crafts Projects - Creation and Development Grant
COPYRIGHT NOTICE -
All posted text and images @ Darrell Markewitz. No duplication, in whole
or in part, is permitted without the author's expressed written permission.
For a detailed copyright statement : go HERE |
We want our finances to be transparent, so we’ve decided to post a quarterly statement of our expenses, which are provided in the following links. Your donations are greatly appreciated and we want you to know how your money is being spent.
Thank you for your support.
Second Quarter 2020 Expenses
First Quarter 2020 Expenses
Fourth Quarter 2019 Expenses
Third Quarter 2019 Expenses
Second Quarter 2019 Expenses
First Quarter 2019 Expenses
Fourth Quarter 2018 Expenses
Third Quarter 2018 Expenses
Second Quarter 2018 Expenses
First Quarter 2018 Expenses
Fourth Quarter 2017 Expenses
Third Quarter 2017 Expenses
Second Quarter 2017 Expenses
First Quarter 2017 Expenses
Fourth Quarter 2016 Expenses
Third Quarter 2016 Expenses
Second Quarter 2016 Expenses
First Quarter 2016 Expenses
Fourth Quarter 2015 Expenses
Third Quarter 2015 Expenses
Second Quarter 2015 Expenses
First Quarter 2015 Expenses
Fourth Quarter 2014 Expenses
Third Quarter 2014 Expenses
Second Quarter 2014 Expenses
First Quarter 2014 Expenses
Fourth Quarter 2013 Expenses
Third Quarter 2013 Expenses
Second Quarter 2013 Expenses
First Quarter 2013 Expenses
December 2012 Expenses
November 2012 Expenses
October 2012 Expenses
September 2012 Expenses
August 2012 Expenses |
The present disclosure relates to a gas turbine engine and, more particularly, to fuel nozzles with passages for both a liquid and a gas.
Gas turbine engines, such as Industrial Gas Turbines utilized in power production, mechanical drives as well as aero engines in commercial and military aircraft, include a compressor section to pressurize airflow, a combustor section to burn a hydrocarbon fuel in the presence of the pressurized air, and a turbine section to extract energy from the resultant combustion gases.
The combustor section includes a multiple of circumferentially distributed fuel nozzles that project into a forward section of a combustion chamber to supply fuel to mix with the pressurized airflow. The fuel nozzles may simultaneously utilize different types and combinations of fuel such as Jet-A, diesel, JP8, natural gas and others. Further, to facilitate lower NOx emissions, water may be injected though the nozzle as well.
Conventional dual fuel nozzles for aeroderivative industrial gas turbines employ separate passages for a gas and a liquid fuel. Aeroderivative industrial gas turbines are often designed to be as common as possible with the aero version to reduce cost. The fuel nozzle, however, is typically substantially different as industrial engines operate with both natural gas and liquid fuels, as well as combustor water injection. This may increase the size of the fuel nozzle and drive costly redesign of the combustor and diffuser case. |
The toddler crashed the Jeep into a neighbour’s home (Picture: AP/Myrtle Creek Police Department)
A three-year-old boy wearing only a nappy crashed a Jeep into a house before running home to watch cartoons like nothing had happened.
The toddler, from Myrtle Creek, Oregon, was said to have climbed into the vehicle on Tuesday evening and managed to move it by knocking it out of gear.
The Jeep, which belonged to his aunt, then rolled down the street before crashing into a neigbour’s house, according to witnesses.
The three-year-old ran back to his house to watch cartoons (Picture: AP/Myrtle Creek Police Department)
The boy made his escape, with police later confirming they found him on a couch at home watching TV.
An officer had initially spotted the youngster in the driver’s seat following the accident.
The Jeep rolled down an intersection (Picture: AP/Myrtle Creek Police Department)
The toddler’s mother, Brennan Pennington, 22, was reportedly in the bathroom when the boy left home and when she came back out he had already returned.
Police have since cited her for failing to supervise a child. |
Castell Mawr Rock
Castell Mawr (known in English as Castle Rock) is a large limestone rock that dominates the western shore of Red Wharf Bay in Anglesey, north Wales. It was probably once the site of an Iron Age fort, but today the rock is a protected refuge for nesting seabirds.
It is located between the village of Red Wharf Bay and the promontory where St. David's Holiday Park is sited. The closest large villages are Pentraeth and Benllech.
Currently, the site appears to be being used as a storage/dumping area for inert waste. The site is notable for being the only location on Anglesey displaying genuine karst development in a series of small caves and solutional cavities.
Castell Mawr was selected by the Countryside Council for Wales because of its geological interest, as it provides exposures of carboniferous limestone strata. The rock consists of limestone and sandstone layers, part of the Benllech Limestone formed during the Brigantian Stage of the lower Carboniferous period. The limestone was once mined and exported to other centres in the UK and Ireland.
References
Category:Mountains and hills of Anglesey
Category:Pentraeth |
from base import *
MAGIC = "This is the magic string"
DIR = "cgi-bin-perms1"
CONF = """
vserver!1!rule!2860!match = directory
vserver!1!rule!2860!match!directory = /%(DIR)s
vserver!1!rule!2860!handler = cgi
"""%(globals())
CGI_BASE = """#!/bin/sh
echo "Content-Type: text/plain"
echo
echo "%s"
""" % (MAGIC)
class Test (TestBase):
def __init__ (self):
TestBase.__init__ (self, __file__)
self.name = "CGI Wrong permissions"
self.request = "GET /%s/test HTTP/1.0\r\n" %(DIR)
self.conf = CONF
self.expected_error = 403
def Prepare (self, www):
d = self.Mkdir (www, DIR)
self.WriteFile (d, "test", 0400, CGI_BASE)
|
[Pharmacokinetics of zotepine and various factors affecting that of zotepine].
The single dose kinetics of zotepine, and effects of smoking and cytochrome P450 2C19 (CYP2C19) on the kinetics, together with pharmacokinetic interaction between zotepine and diazepam were investigated. 1) The pharmacokinetics of zotepine was investigated in 14 healthy volunteers, and was compared between 7 extensive metabolizers (EM) and 7 poor metabolizers (PM) of CYP2C19 or between 8 smokers (S) and 6 non-smokers (NS). 2) In 17 patients treated with zotepine alone, intraindividual changes in the plasma concentrations of zotepine before and after coadministration of diazepam were examined. The time of the maximal plasma concentration and the elimination half-life of zotepine in 14 volunteers were about 4 hours and 21 hours, respectively, which were found to be much longer than previously reported data. There were no significant differences in the pharmacokinetic parameters between the EM and PM groups or between the S and NS groups. The plasma concentrations of zotepine were significantly increased after coadministration of diazepam. Consequently, it is suggested that smoking does not affect the pharmacokinetics and metabolism of zotepine, and that the metabolism of zotepine is not mediated by CYP2C19. Elevation in the plasma concentrations of zotepine after coadministration of diazepam may be caused by the inhibitory effect of diazepam on zotepine metabolism. As a plausible explanation for this, the metabolism of zotepine and diazepam may be commonly mediated not by CYP2C19 but by cytochrome P450 3A4, and the pharmacokinetic interactions may result from competitive inhibition between these two drugs. |
Oliver König has revealed the 24-year-old is ‘feeling’ good in China and could make the deal permanent when the current loan deal expires
The 24-year-old completed a six-month loan deal to the club in the summer. The Ghana international has enjoyed an excellent start to life in the China, quickly becoming a crowd favourite. And the representative of the Ghana international Oliver König has confirmed the versatile African could stay at the club longer than expected
“Frank is under contract in China until December 31. By that time, the leaders will decide whether to raise the option or not,” said König
“What I can say to you is that Frank is now feeling very good in China and he is happy to evolve in this championship where he meets big stars every week. ”
“The club was badly loaded in the league and the coach had no more control over the locker room.A new coach arrived and he put the order back. It was a simple start for Frank, he had to adapt to a game totally different from what he knew in Europe. He ended up flourishing and Tianjin has successfully completed his rescue mission.”
Tianjin paid $ 3 million to sign the Ghanaian on loan and must add $ 3.5 million to sign him permanently.
The Chinese side are seeking to further midfield options ahead of next season and the Ghanaian appears firmly part of their plans.
And Tianjin Teda faithful will be boosted by the news the midfield star may join permanently. |
Q:
How can I post FileInfo to a web service using Yesod and Http-Conduit?
I am working with the default Yesod scaffolding project.
I have created a page that displays a simple form to upload files.
(The form will likely be created on the client using Javascript.)
For brevity, the form has a single file input:
<form method="post" action=@{UploadR}>
<input type="file" name="myfile">
<button type="submit">
My objective is to process the form data and then upload the file to a web service.
I have no trouble processing the form, my concern is interacting with the web service.
For example, given the following Yesod handler:
postUploadR :: Handler Html
postUploadR = do
mgr <- fmap httpManager getYesod
fi <- runInputPost $ ireq fileField "myfile"
let fSource = fileSource fi
fName = fileName fi
req <- parseUrl "http://webservice/upload"
let areq = req { method = methodPost
, requestBody = requestBodySourceChunked fSource
}
res <- httpLbs areq mgr
defaultLayout $ do
setTitle "file uploaded"
[whamlet|
<h3> Success
<p> You uploaded #{fName}.
|]
The webservice returns the error: fail post content-length, but everything else works as expected. Perhaps the server doesn't support a chunked request body?
A:
I think your guess about chunked request body is correct. What you need to do is:
Stream the uploaded contents into a temporary file.
Get the size of that file.
Use requestBodySource and provide the file length and its contents.
Fortunately, steps (1) and (2) can be handled quite easily by the sinkCacheLength function. You'll end up with something like:
(fSize, fSource) <- fileSource fi $$ sinkCacheLength
|
Q:
Modify main WordPress loop with a parse_query filter
I am trying to modify the main WordPress loop on my category pages like so:
add_filter('parse_query', 'my_modified_query');
function my_modified_query( $q ) {
if (!is_admin() && is_category()) {
$q->set( 'orderby', 'meta_value' );
$q->set( 'meta_key', 'my_key' );
}
return $q;
}
but it does not seem to work.
However modifying anything else like :
$q->set( 'order','title' );
$q->set( 'orderby', 'DESC');
works perfectly. Just not
$q->set( 'orderby', 'meta_value' );
$q->set( 'meta_key', 'my_key' );
any idea why that is?
A:
Ultimately all meta queries get run through _get_meta_sql.
wp-includes/meta.php
Line 402 - 403 in the _get_meta_sql function
The following coditional statement runs for any meta queries.
if ( empty( $meta_key ) && empty( $meta_value ) )
continue;
There's a ticket here for this which outlines what we should be able to do.
http://core.trac.wordpress.org/ticket/16735
What you can do however is purposely pass your query a meta_value your posts will never likely have and use the != (not equals) comparison, technically that should get you the right posts, eg..
$q->set( 'meta_key', 'my_key' );
$q->set( 'meta_value', 'WPSE_RULES!' );
$q->set( 'meta_compare', '!=' );
$q->set( 'orderby', 'meta_value' );
There's one further thing though, you've got these the wrong way round before..
$q->set( 'order','title' );
$q->set( 'orderby', 'DESC');
order sets the which direction to order the results by, valid values are asc or desc (upper or lowercase).
orderby sets what to the order the results by, eg. date, title, meta value, etc..
I didn't mention that there's actually a new method for querying posts based on meta now, using the meta_query parameter, but seeing as that won't avoid the problem i've mentioned above and older meta parameters still(in the end) get converted into a meta_query anyway, i'll simply offer up a link to some examples.
http://scribu.net/wordpress/advanced-metadata-queries.html
Hope that all helps.. :)
|
Merging ecology and genomics to dissect diversity in wild tomatoes and their relatives.
To understand the origin, history, and function, of natural biological variation, from nucleotide to community levels, is a fundamental promise of ecological genomics. The most fruitful systems for this work are those that possess both ecological and genomic resources. Such systems provide an opportunity to precisely dissect genetic and developmental mechanisms, and to connect genotypes to phenotypes, as well as to directly demonstrate the ecological and evolutionary relevance of this phenotypic variation. Here we synthesize findings emerging from our efforts to understand two fundamental evolutionary processes - speciation and adaptation - using ecological genomics approaches. Many of these studies have been in the wild tomato clade (Solanum section Lycopersicon), a group that has both exceptional diversity and genomic tools. We also highlight the expanding taxonomic reach of this work, especially in two genera - Capsicum and Jaltomata - that are closely related to Solanum. Parallel approaches in these ecologically and reproductively diverse clades enable us to examine novel questions and traits that are not captured within Solanum, while leveraging the power of comparative studies to understand shared ecological and evolutionary patterns. By synthesizing findings from phenotypic, ecophysiological, genetic, and comparative perspectives, our ultimate goal is to understand the complex mechanistic and evolutionary contributions to the formation of new traits and species diversity. |
5 September 2008
Kant+Sade = The Lacanian Ethic
There’s one more thing I wanted to note in Subjectivity and Otherness (2007), Chiesa’s book about Lacan. I’d forgotten what it was, but now it’s come back. It has to do with the primeval energy force that for Lacan is the source of creation of everything, including the unconscious: the immanent “sprite of the current” that’s perpetually active behind the scenes, assembling and setting everything in motion, including the unconscious from which human subjectivity emerges. Here Chiesa shears off from Lacan and starts linking him to Kant and Sade in a way that I found intriguing.
I’ll quote at some length from Chiesa (p. 170):
I have repeatedly pointed out that what one finds in the place of the real object that cannot be refound is not just the self-conscious representation of the objects of everyday reality, but also the unconscious Real-of-the-Symbolic (the object a); Seminar VII primarily associates the latter with the superegoic jouissance of the commandment, which is something “intemperate” in itself — since it paradoxically becomes “crueller and crueller as we offend it less and less” — and constitutes the other “obscene” side of the positive moral law. More importantly, Lacan shows how the “inner voice” of the superego which “substitutes itself” for the primordial Real — negatively represented in the Symbolic by the “dumbness” of das Ding — is its “opposite and the reverse,” yet, unexpectedly, taken at its purest, it is also “identical” to it.
(Allow me to pause briefly to let the reader savor not only the density of Chiesa’s language in explaining the already-abstruse Lacanian texts, but also the relative clarity of my own summaries (lol). Though Chiesa seems impatient with his readers’ dull-wittedness (“I have repeatedly pointed out…”), I still find his writing difficult to parse — which of course gives me liberty to rewrite his text as it suits me without anyone being the wiser.)
In his first sentence Chiesa repeats himself but he also seems to contradict himself. Earlier he said that the undead Real as a “hole” in the Symbolic is not the same as the always-already missing objet a, which acquires its meaning inside the Symbolic itself and which represents that which has been cut off (castrated) from the self through socialization (I see my clarity is already getting muddied). My understanding was that the hole in the Symbolic isn’t the lost object that’s always being sought in the Other, but rather the void through which the undead archaic Real occasionally irrupts. The void doesn’t induce the desire to find or to be the lost objet a; rather, it stimulates new creation in the Symbolic, which simultaneously swallows up and makes forever inaccessible another part of the Real. But we move on…
According to Chiesa, Lacan associates objet a with “the superegoic jouissance of the commandment.” To be embedded in the Symbolic order, the self has to be castrated from the primeval Real, a Real that is “killed” by being drained into the Symbolic. But the self derives pleasure from this painful excision, because by it the self is assigned a place the social order, an order that’s “commanded” by language imposed by the Other on the self. The command becomes “crueller and crueller as we offend it less and less,” says Lacan: this is because the more we embed ourselves in the Symbolic the more we’re cut off from the Real. Symbolic castration is a continual trauma to which we voluntarily subject ourselves. So the “law,” defined in the broadest terms as the Symbolic order itself, the “Word,” the psychosocial reality defined by language — the law claims virtue in embedding us in society, but its “obscenity” is its cruelty in leaving us cut off, with some part of us always missing or “holed.”
Chiesa says that, for Lacan, the superego substitutes for the primordial Real, both as the absence of the Real thing in itself and as the opposite of this absence. This absence and its opposite can’t be equated with the positive and negative features of the commandment, which operates within the Symbolic. Is it equated with the pleasure-and-its-opposite nature of jouissance? That doesn’t seem quite right either, since jouissance is the self’s emotional response to the bipolarity of the Symbolic commandment — which means that jouissance has to come after the Real has already been killed by the Symbolic. But “substitute” doesn’t necessarily mean “representation” or “trace”: the superego occupies the empty place that’s been vacated by the Real. So the superego needn’t resemble the Real-as-void any more than the Symbolic description of a thing resembles the thing-in-itself (see preceding post on this lack of correspondence between Real and Symbolic in Lacan).
But then we get the phrase that seems to overturn all that preceded it:
…yet, unexpectedly, taken at its purest, it is also “identical” to it.
So here is a seemingly irresolvable paradox: the superego both substitutes for the primordial Real and is identical to it. This identity suggests that the Real possesses the bipolar properties of the superego: it both incorporates and cuts off; it induces both pleasure and pain. We already observed in the prior post that, per Chiesa, Lacan regards the Real as something like the Holy Spirit, an immanent force that’s integral to the world itself. Does this mean that the Holy Spirit manifests this bipolarity of the superego? We move on to Chiesa’s next two paragraphs:
This is where Kant’s philosophy and Sade’s novels come on the scene, and reveal their utmost ethical significance and danger. According to Lacan, both Kant and Sade attempt to force their way to the Real of the Thing — and thus return to the pure jouissance of the primordial Real — precisely by radicalizing the ambivalent nature of the superegoic commandment in opposite ways, by transforming it into a universal maxim to be understood as “pure signifying system.” Indeed, such an (asymptotic) purification of the Symbolic, the complete symbolization of the Real, can eventually achieve a real-ization of the Symbolic, its disappearance…
More specifically, Kant’s ethics and Sade’s “anti-ethics” similarly endeavor to exacerbate and final break with the dialectic between law and desire as inherent transgression which Saint Paul expressed in the following way: “If it had not been for the law, I would not have known sin [transgression].” The lack of mediation between law and desire in favor of one of the two should hypothetically give rise to either a pure jouissance of the Law, in the case of Kant, or an — ultimately indistinguishable — pure law of Jouissance, in the case of Sade. In other words, the Kantian categorical imperative “Act in such a way that the maxim of your action may be accepted as a universal maxim” is nothing but a reduction of the law to its pure form; the Sadean imperative “Let us take as a universal maxim of our conduct the right to enjoy any other person whatsoever as the instrument of our pleasure” is nothing but the reduction of the law to its object, to the “right to jouissance.”
The idea is this: Kant regards his ethic as intrinsic to the universe, a natural universal law, so it’s natural for a human to act in accord with this ethic. Because the ethic is intrinsic to human nature, following the ethic brings pleasure in its own right — the pleasure of being at one with the universal — regardless of whatever other benefits the person might derive from ethical behavior. The Kantian ethic valorizes the kind of middle way of Aristotle and Confucius, along with the communal Golden Rule — in other words, it’s an ethic that’s familiar and sort of comforting. But Sade, whose ethic is very different indeed, shares something with Kant: he too believes that his ethic is a law of nature. According to Sade, because self-gratification naturally produces pleasure, it must be a natural law and therefore good. The forces of violence and destruction clear the way for new creation, so to act as an agent of these forces is to resonate with the universal spirit of creativity. Inflicting violence on others, or even to have violence inflicted on oneself, would therefore stimulate a natural pleasure of being in tune with the universal forces.
What’s important from Lacan’s perspective is this: the person who subscribes to the Sadean ethic derives pleasure from violating Kant’s ethic, while the follower of Kant is pleasured by violating Sade’s ethic. So what would be the result of combining the Kantian and the Sadean natural ethics, polar opposites of one another but both intrinsic to nature itself? Presumably whoever acts in accord with this bipolar ethic would simultaneously experience both pleasure and its opposite. This pleasure-antipleasure admixture would result from ethical action regardless of whether the actor is following the mandate of the Kantian pole or the Sadean. This for Lacan is the pleasure-pain of jouissance. It arises whether a person follows a law or violates that same law, because violation too operates according to law. The universal law of the real is bipolar, and so is the natural affective response.
So, to summarize (sort of): By being inscribed in the Symbolic order, the individual experiences loss of the Real. The Symbolic order operates according to a Law by which the individual becomes more and more fully incorporated into the Symbolic, more closely connected in communal bonds with others. But another Law is at work: the other who subjects the individual to the Law derives pleasure from exerting power and destroying something in the individual, and the individual derives pleasure from violating Law. To seek one kind of lawful pleasure is, paradoxically, to seek the pain of violating the inverse law. Desire is thus always infused with this ambivalent affect of jouissance. Fully pursuing this bipolar pleasure-pain of desire, becoming more and more fully inscribed in a Symbolic order that simultaneously includes its own opposite, paradoxically brings the person into closer and closer contact with the bipolar Real. Law and jouissance, emerging as replacements for the Real as the Real is progressively killed by the Symbolic, paradoxically transform themselves into a new Real that pushes through the Symbolic. It’s like a Möbius strip: you walk along one surface until eventually you find yourself on the other side.
Share this:
Like this:
Related
In the preceding post Parodycenter objected to my contention that Lacan is pessimistic. Says PC of Lacan, “his mission is to allow the subject to pursue his own jouissance – that’s not pessimistic, he merely acknowledges the fact that this is a very hard and demanding road.”
In a sense the Lacanian outlook is oddly optimistic for the individual subject. There is no pure pleasure to be had: the pleasure of formulating Symbolic knowledge in consciousness is attained at the price of the pain of losing contact with the Real; pursuing a Kantian good-pleasure means simultaneously renouncing a Sadean good-pleasure. But, if you can come to grips with this inevitable admixture of pleasure and pain that is jouissance, you stop having to worry about suboptimizing your life. If you feel pain you can surely discover the pleasure that accompanies this pain; if you feel that your pleasure isn’t perfect you can accept that this feeling of incompleteness is also a kind of pleasure-in-pain. One can come to a place of self-acceptance knowing that whatever one is feeling, one is surely also feeling the opposite at the same time. No guilt, no striving for improvement, no disappointment — or rather, each of these painful feelings comes with its own compensating pleasure. It’s a kind of Taoistic go-with-the-flow in which everything always contains its opposite.
You and I have had many discussions on Paul’s view of the Law and the Flesh. In light of your most recent research and posting on Lacan, do you have any updates to your interpretation of Paul?
As we’ve discussed: Paul seems to recognize the connection between the Flesh and the Law. The Flesh almost seems to define itself in terms of Law. And yet in Galatians 5, Paul seems to suggest that we can go beyond the Law-Flesh dialectic. Paul’s idea is to live a life of freedom through the Spirit: “walk with the Spirit and you will no longer satisfy the desires of the Flesh” and “If you live by the Spirit, you are no longer under law.”
Certainly when we were discussing this before, Erdman, I thought our reading of Paul fit well with Lacan’s ideas on law and freedom. My posts on Badiou reflected a similar outlook, which isn’t surprising since Badiou is in a sense Lacanian as well. I’m curious about what Affect is associated with freedom. We tend to think of it as jubilant or lighthearted, but if it’s jouissance then there might always be some degree of pain mixed with the pleasure. I think that’s certainly likely if one were to adopt the Pauline ethos of freedom-to-love. I’m not sure one would ever evade the pain of self-limitation mixed with the joy in satisfying the other’s well-being. I.e., “desiring the desire of the Other” almost has to leave one a bit hollow, unless the other desires your desire as well. I wonder also if there’s any pain associated with dying to the Law; i.e., is there a sense of loss of security that accompanies this freedom?
It should be remembered too that for Lacan the Law refers not just to moral injunctions but to the whole Symbolic order. All of language functions as a law in the sense of assigning meaning — to the world and to the self — in ways prescribed by the Other. We’ve discussed how the Law provokes the desire to violate that which is prohibited. But this occurs not just in morality but in all these ways in which society and language constrain us to be who the Other tells us we are. There is no getting out of Symbolic order and this lawlike function of language that defines us from outside ourselves. What Lacan regards as the breakthrough is attaining the realization that there is no Big Other — no actual entity behind language who assures us that the societally-accepted meanings are objectively true. This realization enables the individual to explore freedom without having constantly to rebel against this constraining Other. But freedom doesn’t take the individual beyond the Symbolic, beyond language. Rather it lets the individual start speaking his world and himself using his own meanings. In a sense the self doesn’t get completely beyond Law, but is freed to experiment with personally meaningful laws of his own discovery/creation. So if you’re dead to the Law it means that the Big Other no longer stands behind the externally-imposed structured codes. You are free not just to ignore these codes but to decide whether you are prepared to endorse some or all of them according to your own standards. I think this is the implication in Lacan world, though it surely needs more investigation and thought. I.e., I’m thinking that Lacan’s “no Big Other” formula doesn’t mean lawlessness but rather self-defined codes freed from societal mandate and threat of punishment for violation.
Thanks for these thoughts. I continue to glean some value from your perspective on Lacan.
K: What Lacan regards as the breakthrough is attaining the realization that there is no Big Other — no actual entity behind language who assures us that the societally-accepted meanings are objectively true. This realization enables the individual to explore freedom without having constantly to rebel against this constraining Other.
I appreciate your explanation here. I’m wondering, though, whether this would really constitute a “break through” for any and all. Doesn’t common observation teach us that most people are happy not to be free? That they prefer law to tell them what to do and how to think? This certainly seems to be the thinking of the Grand Inquisitor: radical freedom is too much of a burden for most people. The GI is complaining against Jesus b/c he feels Jesus came to save the few, while the GI cares about the masses of mankind. Nietzsche had comments about “the herd,” Kierkegaard had thoughts on “the crowd”…..all along these similar lines.
K: But freedom doesn’t take the individual beyond the Symbolic, beyond language.
Yes, this is kind of where I find myself asking questions. What does freedom look like after the “break through.” From what you describe here, the Lacanian freedom is a bit different from the Pauline idea of freedom. The Pauline vision ushers the individual into a new dimension, of sorts; one moves beyond the law-desire dynamic. This seems more radical than Lacan, but it all hinges on whether there is something external (“the Spirit”). In Lacanian terms (as I understand our discussion thus far), “the Real” might be that external reference point; however, I’m not clear as to whether it is realistic to expect to actually experience the Real…..but then again, I’m also wondering about the possibility of truly experiencing what Paul describes as “walking with the Spirit.”
“Doesn’t common observation teach us that most people are happy not to be free? That they prefer law to tell them what to do and how to think?”
Following Lacan, Law goes beyond moral imperative to practically everything in human existence: social relations, identity, understanding of the world. All of it is mediated by language, and the meaning of language precedes your and my appearance in the world. Per Lacan, this means that language itself defines us and our relationships to the world and to each other. The moral law is just a special case of this larger principle: by embedding us in the social order of human society, language cuts us off from the Real and embeds us in a socially agreed-upon matrix of signifiers and signifieds. You are Erdman not by virtue of who you are Really, but as that empty space left by all other words which are not-Erdman, as well as by all words others have used to describe you from their perspective. I think there’s some truth to this.
Morality works like this as well: resistance to the Law can be an act of rebellion against the Big Other who established the Law and against the Father in whose name your own father laid down this Law to you. But in so doing you’re still acting as if there is a Big Other who verifies the eternal Truth of this Law. It’s just societal convention, a structure of signifiers floating free from the Real. But freedom from this structure entails freeing oneself from the Symbolic order — from language and conscious thought — which means psychosis. Freedom is limited, says Lacan, to operating within the Symbolic order in a way that recognizes that no final authority stands behind any of it other than societal convention, which is a formidable constraint in its own right. To attempt to define yourself and your relation to the world without the social conventions of language and thought, and with the possibility of returning to the primeval Real forever barred, is likely to meet with only limited success. It’s not just an existential burden to be free of the Symbolic order; it’s an impossibility. Lacan, to my knowledge, never describes what it’s like, partly because he’s never seen a successful example of it, partly because by definition it’s beyond description by conventional language. Maybe that’s why Lacan’s writing is so elliptical and impenetrable — he’s trying to find his own Real, his own Symbolic order. Still, it’s the goal of Lacanian analysis: to loosen up the unconscious signifiers from social convention as to what they signify, to open up the possibility of the occasional irruption of the primeval Real that persists behind language, behind the unconscious.
I don’t see how Paul can be regarded as more radical than Lacan in this regard. While Paul isn’t the one who equates Jesus with the Word, he still seems to be writing both descriptively, in terms his audience can understand, and persuasively, to embed them in yet another Symbolic order — of which there have been many through history.
Going beyond the law-desire dynamic is what this particular post is about. It’s not just that law stimulates the desire it prohibits, which is the way we’ve been talking about it. Rather, every law also has an inverse law, so that following the one results in violating the other. So, e.g., “do unto others” is one universal law, and following it brings a kind of pleasure from being in touch with the way the universe works. But there’s another universal law which says to do as you please even if it hurts others, and following this law also brings pleasure because it’s in keeping with the way the universe works. So doing unto others means violating this inverse law of doing as you please, while doing as you please violates the inverse law of doing unto others. Therefore there is no pure pleasure to be had, says Lacan: there is only jouissance, pleasure-pain. This takes you beyond the law-desire-violation dialectic not by fully freeing oneself from law but by coming to some recognition that everything you do is bound by diametrically opposed Laws. So if you freely choose a course outside of Law you will not find unadulterated pleasure, because these mutually contradictory Laws continue to impinge on you through others, through your own habitual superego, and perhaps through the self-contradictory multiplicity of the Holy Spirit whose force propels itself through the world.
Does this make sense, Erdman? I think I’m just starting to get it myself.
to open up the possibility of the occasional irruption of the primeval Real that persists behind language, behind the unconscious.
hm, I don’t think it’s he wants to open up the irruption of the Real (he did not advocate the psychotization of his clients), rather, he wants to patch up the network that got tangled up in that suturing point where the Unconscious is decoded into the Conscious – it’s a translation job, really. When the unconscious thought gets ”decoded” back into the conscious, the client will be free of NEUROTIC confusions, bad feelings and upset coming from his misrecognition of the ”true” motives for his behavior, but he won’t be allowed entrance back to the womb. As I underlined many times before, psychoanalysis is no deliverance; it will not make you happy and it won’t make you feel better about yourself. If anything it will make you less rigid, more flexible in pursuing your confusing desires, but the desires themselves, where and how they come to be, remains beyond the grasp of PA and is the territory of religion – which has nothing to do with PA, except in Colonel Chabert’s imagination. (all these concerned Communists who were frowning on Freud for his alleged frolicking with Jesus)
I think a lot of the misunderstanding related to this comes from the melodramatic representation of PA in Hitchcock’s films (which Zizek only exacerbates) as something with a ”climax” and ”a catharsis” and ”deep feelings” involved. The typically hackneyed version would be ”Marnie”. No small amount of blame is to be put on hacks like Janov (”the primal scream”) or A. Loven who confabulated all these peak experiences and orgasmic climaxes – witness how sadly their thoughts bombed when all this tearjerker industry collapsed with the defeat of Communism.
This frustration must be an occupational hazard suffered by every Lacanian interpreter — maybe it’s part of the jouissance of knowing more than other people about something. I sent the Chiesa book back to the library already, but as I remember it he interprets Lacan as saying that things like Freudian slips constitute a kind of slippage in the tectonic plates of the Symbolic, revealing gaps in the structure. Through these gaps one can glimpse, however briefly, the Real, and through the gaps the unformulated Real can slip into consciousness where it can be formulated verbally and absorbed into the Symbolic. But I think in both of these cases the analysand can never directly engage the Real on its own terms: as you say, to do so requires a psychotic break from consciousness and a full immersion in the prelinguistic unconscious realm of signifiers floating free of signifieds.
The analysand never confronts the Real on its own terms, but the Real can make its presence felt — in symptoms, in cognitive-linguistic slippage, in jouissance — yes? These appearances reveal the need for further “translation,” for realigning the signifiers and signifieds, for loosening up overly rigid structures and making possible new arrangements. Does that seem right based on your experience, PC? Or can the analysand only hope to align himself consciously-Symbolically with the fixed structures that since early childhood have already established themselves in the unconscious? No, I think that’s not what you’re saying: “If anything it will make you less rigid, more flexible in pursuing your confusing desires.” But the desires, and the specific trajectories toward which they aim for the analysand: are these rigidly fixed for Lacan? And overcoming neurosis is becoming willing to acknowledge one’s own unique trajectory of desire, rather than trying to reorient that desire? Or is desire a congeries of aimless vectors shooting through the self which the self can direct or deflect at least to a certain degree, as per somebody like Deleuze?
You mention Zizek, but Badiou also focuses on the sudden unprecedented appearance of the Real, which he calls the Event, irrupting through the empty hole in the Symbolic structure, which he calls the Void. And it is evident that through human history people have become conscious of more and more phenomena, have extended the network of language farther and farther. So the Real must periodically appear and get progressively incorporated into the Symbolic. Lacan acknowledges as much by saying the Symbolic “kills” the Real: this couldn’t happen if the Symbolic never contacted the Real. This happens within children as well: they progressively become conscious of more and more things.
you might have more use of a direct account, so i will say here – though for reasons of privacy violation i can’t tell you exactly who the persons invovled were – that the kernel of my problem was something related to abandonment, and at one point in the analysis, which i feel retrospectively to have been its success, i had this totally overwhelming rush of exasperation and sadness; it was very unusual and not merely an emotional flood, as you’d have it when someone dies, but a kind of an existential insight into this condition of abandonment. once i was able to EXPERIENCE this horror, it became less detrimental and paralyzing to my communication with people. in the sense that i was later more able to deal with the concept of being abandoned.
Having never undergone an analysis it’s hard for me to recreate what it must feel like subjectively by reading theoretical accounts. It sounds as though you weren’t reliving through memory the trauma of an early historical experience of abandonment. Rather, you were experiencing what it’s like to live here and now a life that’s always tainted — haunted you might say — by the immanence of abandonment. This wasn’t an insight expressed in words, but maybe something like an affective tone or mood that precedes and shapes language. But you also refer to it as an insight, so there must also have been some conscious component to the experience. Having undergone this profound existential experience, your interpersonal communications subsequently change for the better — so somehow this insight either precipitated or reflected a reorganization not just of your past experiences but of the way you participate in new experiences. Really interesting. Do you remember what it was in the analysis that precipitated this insight, Dejan, if you don’t mind my asking? Was it triggered by memory, or by something in your relationship to your analyst, or some new insight into a general pattern in your life?
Was it triggered by memory, or by something in your relationship to your analyst, or some new insight into a general pattern in your life?
there was a love affair that I never quite recovered from, an instance of unrequited love, one of those fateful things. the insight i gained is that i don’t have to be so affixed (obsessed) by a single object.
I’m glad this went well for you, PC. I must say, though, that it sounds juicy. Being the sensitive type who doesn’t pry into other people’s affairs, I shan’t ask. However, if you feel the need to share…
I take it back — I shouldn’t make light of your experience, since I was asking specifically about something you said you’d rather not reveal too much about. Your experience reveals by way of contrast the shallowness of cognitive behavioral therapy. Of course it’s irrational to obsess on someone who doesn’t return your love — you already knew that when you walked in the therapist’s office. Coming up with an action plan for responding rationally to the situation is to repress the inner conflict in the name of getting back on your feet as quickly as possible. But beyond this failure of the CBT there remains this sense of looking for THE ONE, which it sounds like you foresook as a result of your existential insight. |
Project Management in Team Software Projects
Similar presentations
1 Project Management in Team Software Projects“The primary challenge of project management is to achieve all of the goals of the project charter while adhering to the four classic project constraints – scope, time, cost, quality”
3 Leeds Source-IT“Leeds Source-IT is a consultancy service staffed by high calibre Computing student programmers and managed by experienced staff. We undertake self contained projects on a fixed price basis. All projects are tightly specified up front and undertaken using Agile Programming techniques, monitored on-line with dedicated project management software and client sign off stages”
5 svn checkout <repository URI>Retrieving from SVNInitial check out of an existing project. The following command will check out a working copy of an existing project:svn checkout <repository URI>This will check out the project into the current directory.A particular revision can also be specified with “revision” number. ‘checkout’ can also be ‘co’.You are now ready to work using SVN. Subsequent commands require entry from the root of the checked out project directory.Notifying Subversion of local modifications
6 Adding to SVNModifications to existing files will be automatically detected by Subversion and included in future commits (and updates).Adds file to Subversion (to be included in the next commit). If file is a directory, file is added recursively, including all subdirectories and files.svn add <file>commit your changes now.
7 svn delete <file>Deleting to SVNSubversion must be notified of changes to the directory structure including notifications of additions, deletions, copies and moves:svn delete <file>Deletes file from the working copy and informs Subversion to delete the file from the repository at the next commitcommit your changes now.
8 svn commit [-m “Explanation of changes”]Pushing Changes to SVNTo share changes made to the local copy with other developers, the changes must be uploaded to the central repository:svn commit [-m “Explanation of changes”]Wait for other users to commit their files.
9 Pushing Changes to SVN IIUpdating the local copy with the latest changes in the repository. To update a local copy:svn updateThis command fetches the HEAD version of each file from the repository and lists each file with a prepended flag specifying the state of the file in relation to the current working copy.
10 Flag Description Flag Description UThe file has been updated with changes fro the server.AThe file or directory has been addedDThe file or directory has been deletedRThe file or directory has been replaced (an existing file was deleted, then a new file of the same name was created)GThe file has been changed locally and remotely, but the changes did not conflict and have been automatically merged by subversion.CThe file conflicts with changes from the server.Reference: c/files/documents/15/177/svn-ref.ps
11 Managing Conflicting ChangesSubversion will merge multiple changes to the project so that subsequent checkout commands will retrieve the latest version of each file in the repository.What happens if a file has been modified by multiple users since the last checkout/commit cycle?Subversion cannot know which version is correctinforms the user there is a conflictprevent further changes until this conflict is resolvedConflict needs to be resolved manuallyUsually this will require a discussion between the authors of the changes.The file can then be edited to the correct state.
12 Managing Conflict IIOnce a conflict has been resolved, Subversion must be informed of this resolution before the working copy is allowed to be committedsvn resolved filenameMarks the conflict on filename as resolved. The file can now be committed to the repository. Perform these steps again, so your partner can resolve a conflict.
13 Managing Conflict TaskIn groups discuss the following questions:1. Who decides which changes are kept and which is deleted?2. What impact do you see during code development?3. What mechanisms would you put in place to ensure the correct decisions are made?4. What are the different scenarios causing conflict (consider different orders of checkout, update, resolve and commit)SVNFile AUser 3File AUser 1File AUser 2
14 Tools and Infrastructure of Software DevelopmentThis section of the workshop demonstrates how to set up the Eclipse IDE for use with Leeds Source-IT infrastructure.
15 Installing an Eclipse Subversion plug-inTwo Eclipse plug-ins exist for Subversion:Subclipse from the original Subversion developers, andSubversive, from the Eclipse foundation.Both offer the same functionality and are presented in a similar way.This workshop discusses installing Subversive, but the steps are similar if your prefer Subclipse.
16 Installing SubversiveIn Eclipse, navigate to:Help | Software Updates...On the panel that appears, click the Add Site... button on the right and enter the following URL in the location field that is displayed:Select the following:Subversive SVN ConnectorsSVN Team ProviderSVN Team Provider LocalizationSVNKit (either version)Then click the Install... button.
17 Checking Out an Existing ProjectTo check out an existing project:File | New > Project...In the displayed dialog select SVN | Projects from SVNA new dialog will be displayed containing existing SVN repositories that Eclipse is aware of. Select a repository if it in the list, otherwise select the ‘Create a new repository location’ and click next. If a new repository is selected, enter your username and password and enter the URL to retrieve the SVNEach project will be running its own SVN and you will be provided with the correct URL to access the SVN for a projectA list of directories will be displayed (corresponding to available projects if a project name was not specified in the URL). Select the appropriate directory and click Finish to check out the project into an Eclipse project of the same name (Next will allow this default name to be changed).
18 Working with a Shared ProjectEclipse greatly simplifies using Subversion when compared to the command line approach.To update or commit a project right click the project name in the Project Explorer view and chooseTeam | Commit... to commit changes (and a commit message)Team | Update to get the latest changes.Team | Synchronise with Repository does a commit and shows any conflicts.Double clicking the conflicts opens an editor displaying the local copy and the latest repository copy side by sideOnce all conflicts have been resolved, the project will need to be recommitted (conflicts prevent the first commit from completing).As well as easing the conflict resolution task, Subversive handles changes to the directory structure by automatically performing the correct svn command for moves, deletes and copies.
19 Introduction to MylynMylyn extends the Eclipse SDK with sophisticated mechanisms for keeping track of tasks.A task is any unit of work that you want to recall or share with others, such as a user-reported bug or a note to yourself about improving a feature.Mylyn lets you store tasks locally in your workspace or work with tasks stored in one or more task repositories.Leeds Source-IT uses Redmine as a task repository and to coordinate all aspects of project management.To connect to the Leeds Source-IT task repository, you must have installed a Mylyn connector for a web based repository.
20 Installing MylynTo install Mylyn for your version of Eclipse, use the Eclipse Update Manager:Help > Software Updates > Find and install > Search for new features to installThe Mylyn web connector is currently in the Eclipse incubator, so will need to be added to Eclipse’ list of sites to search for updates. Click on Add Site and enter the following URL:Click OKNow select the Mylyn Connector: Web Templates (Advanced) and click on Install.
23 Leeds Source-IT Group Project ManagementWhat is Project Management?Sequence of tasksConsumes resourcesAchieves an objectiveResults in something newGolden Rules of Project SuccessDevelop a comprehensive, realistic plan and keep it up-to-dateGain consensus on project outcomesMake reasonable resource requirementsBuild the best team you can and take care of themKeep the stakeholders informedBe willing to change or to try new thingsThe Source-IT infrastructure provides all the necessary tools available to achieve these points if used correctly.Project Members need to keep the project information current
24 Project Stages Contract Set-up Phase(LSIT managers) liaise with clients to understand their requirements and agree the Specification.Price for the work will be derived from this, based on the agreed Skills List and estimated times.Hourly rates or a task based rate will be agreed and formalised within the Client Contract.We will use standard templates provided by University of Leeds Consultancy Ltd (ULCL).
25 Software Requirements Specification (SRS)Well-designed, well-written SRS accomplishes four major goals:1. It provides feedback to the customer.An SRS is the customer’s assurance that the development organization understands the issues or problems to be solved and the software behaviour necessary to address those problems.SRS should be written in natural language, in an unambiguous manner that may also include charts, tables, data flow diagrams, decision tables, etc.2. It decomposes the problem into component parts.The simple act of writing down software requirements in a well-designed format organizes information, places borders around the problem, solidifies ideas, and helps break down the problem into its component parts in an orderly fashion.3. It serves as an input to the design specification.SRS serves as the parent document to subsequent documents, such as the software design specification and statement of work.SRS must contain sufficient detail in the functional system requirements so that a design solution can be devised.4. It serves as a product validation check.SRS also serves as the parent document for testing and validation strategies that will be applied to the requirements for verification.
27 Draw the picture to the specification and requirements.Specification TaskSort yourself into groups and complete the following specifications and requirements.Specifications:Create a picture with geometrical shapes of various colours. The picture willhave a red star, a blue circle and a green triangle not overlapping with twodiagonal black lines crossing at the centre.Requirements:1. Diagonal lines1.1 lines are black and straight1.2 lines are drawn to intersect in the centre of the page1.3 First line is from the top left (below the corner) to bottom right(above the corner)1.4 Second line is from top right corner to bottom right corner2. Red star2.1 Start is red and colour filled2.2 Star is a six pointed star2.3 Star is positioned on the upper right section of the page2.4 Star is small in size3. Green triangle3.1 Triangle is green bordered with no fill3.2 Triangle is positioned on the top left below the line from top left to bottom right3.3 Triangle is large in size4. Blue circle4.1 Circle is blue with no fill4.2 Circle is position at the bottom of the page4.3 Circle is not touching the black lines4.4 Circle is medium in sizeDraw the picture to the specification and requirements.
28 Specification Task IIDiscuss any differences in the image and the specification.How does it differ?What specifications needed to be added to make it an exact replica.Question:What impact would differences here have on the development of software?
29 Issues: Features, Documents and BugsUsing the Source-IT infrastructure and online software for project management (Redmine).Issues are used to define features, documents and bugs needed for development and new versioning.Issues == Requirements == Features
30 Identifying and Linking Requirements to SourceRequirements (or issues in Source-IT) for development require the following fields:Requirement NumberUnique IdentificaitonRequirement TypeType as defined by the project and Source-ITSpecification NumbersTo map the requirement to the client specificationDescriptionOne sentence statement of the requirementOriginatorWho created the requirementFit CriterionThe measurement of the requirement to test is the solution matches the requirementPriorityRating of the customer valueSupporting MaterialPointers to documents that explain this document (probably the specification document)HistoryCreation, changes, deletions etc.In the Source-IT infrastructure, the requirements are added as Issues labeled Features within the Software Application. A unique ID is already allocated. Fields within the application.LowNormalHighUrgentImmediate
31 Redmine and RequirmentsDuring the team kick off meeting for a project. Clients, Source-IT management and consultants will discuss and set the specification requirements to create a Source-IT requirements specification document (technical document) to be signed off by the client and management. Each specification will have a unique id and allocated to a milestone agreed by the kick-off team and setup as an issue/feature within the Source-IT infrastructure. The above table specifies the process to create, implement and sign off a specification.
32 Penny Queue Exercise: Waterfall and AgileThis simple simulation exercise helps people to understand the efficiency that can come from moving away from a waterfall or large batch process. The exercise can be done with 20 pennies, 5 people and a clock with a second hand.The exercise simulates processing work in the form of flipping pennies from heads to tails and back. Four people in the Team sit at a table or other hard surface in a line beside each other. The surface must allow for easily sliding the pennies. The fifth person, the Manager, starts the process and times it.
33 Penny Queue Exercise: Waterfall and Agile IIFirst Pass - Waterfall Large Batch1. The Manager gives all the pennies to the first person in the Team and notes the start time. The pennies should be in a big jumble.2. The first Team member chooses a side (heads or tails) and flips all the pennies onto that side.3. The person with the pennies passes the whole pile of pennies to the next person. That person then flips all the pennies to the other side.4. Repeat step three until the last person on the Team has flipped them.5. The manager notes how long this took.
34 Penny Queue Exercise: Waterfall and Agile IIISecond Pass - Waterfall Small Batch1. The Manager gives all the pennies to the first person in the Team and notes the start time. The pennies should be in a big jumble.2. The first Team member chooses a side (heads or tails) and flips all the pennies onto that side. As each penny is flipped, the Team member passes it along to the next person.3. Each person flips their pennies as quickly as possible and immediately passes them on to next person.4. Do this until they are all flipped.5. The manager notes how long it took for the first penny to go through all four Team members, and how long it took for all of them to finish.
35 Penny Queue Exercise: Waterfall and Agile IVThird Pass - Parallel Small Batch1. All the pennies are in a random jumble in the middle of the table.2. One Team member calls heads or tails and the manager notes the start time.3. Each person grabs a penny at a time from the pile.4. All working at the same time as quickly as possible, each person flips the pennies first so they are all the same as the original call if needed, and then three more times5. As each penny is finished 3 or 4 flips (as appropriate) it is pushed into a separate done pile in the middle of the table.6. The Manager records the time for the first penny to be put into the done pile and for all of them to be completed.
36 MilestonesMilestones are arranged by Leeds Source-IT managers, you (the project team) and the clients.Develop An Overall Model - goal is to identify and understand the fundamentals of the domain that your system is addressingBuild Features List, grouping them into related sets and Subject areas. These first two steps map to the initial envisioning effort of AMDD .Plan By Feature, the end result being a development, the identification of class owners (more on this in a minute), and the identification of feature set owners.Design By Feature, design featureBuild By Feature, complete client values function
37 Milestones IIThe majority of the effort on an FDD project, roughly 75%, is comprised of the fourth and fifth steps Design By Feature and Build By Feature. These two activities are exactly what you’d expect, they include tasks such as detailed modeling, programming, testing, and packaging of the system.FDD also defines a collection of supporting roles, including: Domain Manager; Release Manager; Language Guru; Build Engineer; Toolsmith; System Administrator; Tester; Deployer; Technical Writer
38 Milestone and Features Allocation TaskSet yourself into groups of 5 (appoximately).From a set of tasks handed out,sort the task into a features listallocate who will do which task.Finish the tasks and write down your results for X.Question:What were your milestones?What problems did you encounter?Who ensures the issues and features have passed to close a milestone?Discussion adding requirement from tasks into Redmine. Think about allocation, completion and testing
40 Finding Faults EarlyIt is commonly believed that the earlier a defect is found the cheaper it is to fix it.
41 Testing Methods Specification Based Testingaims to test the functionality according to the requirements. (requires thorough test cases to be provided to the tester who then can simply verify that for a given input, the output value or behavior)Black Box Testingtreats the software as a black-box without any knowledge of internal implementation. methods include:equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-based testing, traceability matrix, exploratory testing, specification based testing, etc.Black Boxmethods include:equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-based testing, traceability matrix, exploratory testing, specification based testing, etc.White BoxThe following types of white box testing exist: - code coverage - creating tests to satisfy some criteria of code coverage. For example, the test designer can create tests to cause all statements in the program to be executed at least once. - mutation testing methods. - fault injection methods. - static testing - White box testing includes all static testing.White box testing methods can also be used to evaluate the completeness of a test suite that was created with black box testing methods (code completeness evaluation). This allows the software team to examine parts of a system that are rarely tested and ensures that the most important function points have been tested.Grey BoxManipulating input data and formatting output do not qualify as grey-box because the input and output are clearly outside of the black-box we are calling the software under test. This is particularly important when conducting integration testing between two modules of code written by two different developers, where only the interfaces are exposed for test. Grey box testing may also include reverse engineering to determine, for instance, boundary values or error messages.
42 Testing Methods II White Box Testingwhen the tester has access to the internal data structures and algorithms (and the code that implement these)Grey Box Testinginvolves having access to internal data structures and algorithms for designing test cases, but testing at the user, or black-box level.Black Boxmethods include:equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-based testing, traceability matrix, exploratory testing, specification based testing, etc.White BoxThe following types of white box testing exist: - code coverage - creating tests to satisfy some criteria of code coverage. For example, the test designer can create tests to cause all statements in the program to be executed at least once. - mutation testing methods. - fault injection methods. - static testing - White box testing includes all static testing.White box testing methods can also be used to evaluate the completeness of a test suite that was created with black box testing methods (code completeness evaluation). This allows the software team to examine parts of a system that are rarely tested and ensures that the most important function points have been tested.Grey BoxManipulating input data and formatting output do not qualify as grey-box because the input and output are clearly outside of the black-box we are calling the software under test. This is particularly important when conducting integration testing between two modules of code written by two different developers, where only the interfaces are exposed for test. Grey box testing may also include reverse engineering to determine, for instance, boundary values or error messages.
43 Non Functional Software TestingSpecial methods exist to test non-functional aspects of software.Performance testing checks to see if the software can handle large quantities of data or users. Generally referred to as software scalability.Usability testing is needed to check if the user interface is easy to use and understand.Security testing is essential for software which processes confidential data and to prevent system intrusion by hackers.Internationalization and localization is needed to test these aspects of software, for which a pseudolocalization method can be used.
46 Source-IT Project FinalisationOnce the project is internally signed off, it will be presented to the Client who will externally sign off.Note that this may be a staged process, depending on the contract, as Clients may wish to sign off each part of the work (see milestones).Once the Client has fully approved the work, they will be asked to sign a formal written Acceptance Form and the project will be terminated.Financial payments and invoicing will be carried out by ULCL (including debt chasing if necessary).
47 Risk Assessment for Student Consultants1. Students failing to complete work on time (for instance due to abilities, illness)Careful recruitment and selectionClear guidance and briefing of terms of workSupport in the case of lack of skillsStudents required to file work at least weekly, so that at most one week’s work (ie. 5 hours) will be lostStudents paid only on satisfactory completion of work2. Students unable to do work and withdrawing from all or part of a project As (1).Work allocated to another student asap.Client advised and extra time requested if necessary.3. Students making errors in workTest plan to be part of each projectStudents check each others’ workWeekly monitoring
48 Risk Assessment for Student Consultants II4. Clients dissatisfiedAgree very tight specification, to form part of a signed agreementClients involved in sign off at each stage of process5. Clients refusing to payRefer to ULCL for standard debt chasing procedures6. Clients taking us to courtRefer to ULCL7. Clients not providing sufficient support to process (eg. not attending project management meetings or providing details for specification)Support to project management procedures part of contract with clientThey need to agree either decisions made without them, or project delay.
49 Risk Assessment for Student Consultants III8. Hardware failures (particularly on student computers)Appropriate guidance on backing upEncourage students to use SoC facilities including SVNProvide 1-2 LSIT machines in dedicated LSIT office9. Software problems - delays due to need to install libraries or plug-ins for specific projectsSupport asked to give priority to LSIT when there are deadlinesInvestigate software requirements as part of specification and start up process10 Not enough work coming inStudents only paid if work available.Some costs of pilot phase could be covered by start up funding11. Too much work coming inManage client expectationsLook for appropriate partners who we could pass work to in busy timesConsider running a modified scheme based on vacation working
51 Homework Home work task for accepted ConsultantsFamiliarise yourself with RedmineOther sandbox management applications for Trac; Bugzilla etc. (search the web)Skill: Please complete the Skills section in Redmine when you have an usernamePDP: Please think what you wish to obtain from Source-IT (other than money)Select the categories and during your time on Source-IT add examples on work you are doing.If you wish to add any categories to the PDP, please contact a member of management |
Q:
Windows VEH - catch and discard a single step exception
In a 3rd party application I'm modifying by means of DLL injection, there's a chunk of code that throws an EXCEPTION_SINGLE_STEP exception if it detects changes to the code. To bypass this countermeasure, I wish to catch that exception and discard it completely. However, Windows keeps rethrowing it and therefore my exception handler is stuck in an endless loop.
My code currently:
LONG WINAPI VEH_Handler(struct _EXCEPTION_POINTERS *ExceptionInfo)
{
printf("Got an exception %X at address %X\n", ExceptionInfo->ExceptionRecord->ExceptionCode, ExceptionInfo->ExceptionRecord->ExceptionAddress);
if (ExceptionInfo->ExceptionRecord->ExceptionCode == EXCEPTION_SINGLE_STEP)
{
return EXCEPTION_CONTINUE_EXECUTION;
}
return EXCEPTION_CONTINUE_SEARCH;
}
//...
//in DllMain
AddVectoredExceptionHandler(1, VEH_Handler);
Is there a way for me to force Windows to forget about the exception and continue execution?
A:
I assume this is a follow-up on this question.
If the program you're injecting the DLL into is setting the processor's trap flag, then returning from the exception will restore the trap flag as well, which would explain why the trap exception is thrown again and windows will keep calling your exception handler.
You might check the stack, find where the pushed flags from the exception are saved, and clear the trap flag before returning (*flagptr &= ~0x100).
However, the fact that your application sets the trap flag in the first place might mean one of those two things:
The application has detected that you're trying to crack it, and sets the trap flag to make it crash, or enter the debugger in an inconvenient way. It might do anything else to your program as well.
The application installs a trap exception handler, sets the trap flag, and has the trap handler modify the code that's being executed (25 years ago, i've seen this in a dos application, where the trap handler decrypted instructions just before they got executed, and re-encrypted them immediately afterwards, so you never saw the real assembly in a whole, so that's hardly a new technique).
Both possibilities probably mean that just ignoring the traps won't help you much; you should find the code that sets the trap flag, check why it's doing this, and continue your analysis from there.
|
Do asthma patients with panic disorder really have worse asthma? A comparison of physiological and psychological responses to a methacholine challenge.
Panic disorder (PD) has been linked to worse asthma outcomes. Some suggest that asthmatics with PD have worse underlying asthma; others argue that worse outcomes are a result of their tendency to over-report symptoms. This study aimed to measure physiological and psychological responses to a simulated asthma attack (methacholine challenge test: MCT) in asthmatics with and without PD. Asthmatics with (n = 19) and without (n = 20) PD were recruited to undergo a MCT. Patients completed subjective symptom questionnaires (Panic Symptom Scale, Borg Scale) before and after a MCT. Physiological measures including heart rate (HR), and systolic and diastolic blood pressure (SBP/DBP) were also recorded. Analyses, adjusting for age and sex, revealed no difference in methacholine concentration required to induce a 20% drop in forced expiratory volume in one second (FEV1: F = 0.21, p = .652). However, PD patients reported worse subjective symptoms, including greater ratings of dyspnea (F = 8.81, p = .006) and anxiety (F = 9.44, p = .004), although they exhibited lower levels of physiological arousal (i.e., HR, SBP/DBP). An interaction effect also indicated that PD, relative to non-PD, patients reported more panic symptoms post-MCT (F = 5.05, p = .031). Asthmatics with PD report higher levels of subjective distress, despite exhibiting lower levels of physiological arousal, with no evidence of greater airway responsiveness. Results suggest that worse outcomes in PD patients may be more likely due to a catastrophization of bodily symptoms, rather than worse underlying asthma. Interventions designed to educate patients on how to distinguish and manage anxiety in the context of asthma are needed. |
Below is the text of Mr Major’s joint doorstep interview with the Australian Prime Minister, Mr Bob Hawke, in Harare on Tuesday 15th October 1991.
MR HAWKE:
I was very grateful to John for joining me with his colleagues and we had a very mutual discussion which covered essentially three areas: the conference itself and issues of importance this week and I think we had a lot of common ground on those issues; secondly we talked about broader international matters and may say from Australia's point of view perhaps the most important was the finalising of the GATT round, the Uruguay Round, and I was very pleased that John again emphasised, as he did in his role as Chairman of the G7 the commitment to a successful conclusion of that round, this is a matter of very very great importance for us in Australia but I think also for the whole world, and we spent some time on that; and then thirdly there were one or two bilateral matters that we were able to cover with mutual satisfaction - a good working breakfast.
QUESTION:
As aid donors, both of you, would you like now to turn your aid to human rights improvements?
MR HAWKE:
I think I can speak for John and certainly in my own terms I am not going to have my agenda set by the media or anyone else on this issue. I note that at the start of this conference there is an attempt to set this sort of agenda and I am not having the agenda set in that way. But obviously I would say this as I said at an earlier press conference, if you want to ask what is the distinguishing characteristic of the world in the last one or two years it is the move in so many quarters, not simply in the Soviet Union and Eastern Europe, to a democratic constitution and way of life. That is a fact and no-one can avoid that fact and it will inevitably be reflected I believe in discussions in any body like this.
QUESTION:
Mr Major do you agree with this?
PRIME MINISTER:
I absolutely share that view, I think that is entirely right, we are here at this Commonwealth conference to look forward, we have got reports in front of us which enable us to do so and I think there have been the most enormous, quite unprecedented and unexpected changes in the world in the last twelve months or so. That is going to have its impact on the Commonwealth as well and we want to look forward to what sort of government there is going to be in the future, what the relationships will be inside the Commonwealth. There are other important matters as well we will touch on, I am sure we will touch on the environment conference in Rio that will take place next year, a very important conference.
But this morning I would just like to echo what the Prime Minister said, we had an extremely useful discussion, particularly about GATT, as Chairman of the Cairns group he and I have kept in very close touch over the past few months, it is a matter of critical importance, critical importance, I cannot overstate it, that we actually get a satisfactory outcome to the Uruguay Round and it was extremely useful this morning to have the opportunity of exchanging views about that.
QUESTION:
Mr Major, do you favour the Commonwealth making some sort of statement about GATT?
PRIME MINISTER:
I am sure the Commonwealth will discuss a raft of matters including GATT, it is of very great interest to the Commonwealth, it is of very great interest to many of the developing countries that they are actually going to have access for their exports to the developed countries. It is not a great deal of good for the developed countries handing out aid on the one hand and closing their markets to exports from the developing countries with the other hand, that is absolutely self-defeating. So a successful outcome to the Uruguay Round is very important to the Commonwealth.
QUESTION:
Do you think the French will shift?
PRIME MINISTER:
I think we are going to get an agreement in the GATT Round, there are a lot of things to be determined, you mentioned the French, but there are many matters still to be determined, it is not only Prance who has difficulties with the present situation in the GATT Round. There is a great deal to be done, there are many countries that will have to make a move. What is absolutely critically important is that we do not lose the advances that are already there in the GATT Round and that we do reach a satisfactory conclusion.
QUESTION:
Will there be a conclusion?
PRIME MINISTER:
It may be a conclusion that not everybody likes and that everybody perhaps has to make some sacrifices to achieve. But we will all have to make much bigger sacrifices if we do not actually get that agreement.
QUESTION:
Do you foresee any problem for the United Kingdom supporting a CHOGM declaration on GATT?
PRIME MINISTER:
We have not started our discussions here yet and I have just been discussing very clearly, I could not have done it more clearly I think, how important I think it is that we actually get an agreement on the GATT Round, there are very few things that are more important than that if one takes the medium and long term view of the importance of the flow of world trade, the growth of world trade and the need for trade to flow in an uninhibited fashion. So I do not think there will be a great deal of difficulty, I hope that will be a universal view.
QUESTION:
On the question of human rights, what is the point of talking about good government if you do not introduce a means to enforce it?
PRIME MINISTER:
We are going to discuss human rights and we are going to point to peer pressure. There have been the most enormous changes over the last few years, some of them in the Commonwealth, many of them beyond the Commonwealth. I do not think any country in the world is immune from the sort of changes that we have seen over the last couple of years and I am surprise you think there will be so much difficulty about it. I think the fact that there have been such remarkable changes is clear to everyone and will be reflected in our discussions this week. |
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.ignite.internal.visor.node;
import java.io.IOException;
import java.io.ObjectInput;
import java.io.ObjectOutput;
import org.apache.ignite.configuration.ClientConnectorConfiguration;
import org.apache.ignite.internal.util.typedef.internal.S;
import org.apache.ignite.internal.util.typedef.internal.U;
import org.apache.ignite.internal.visor.VisorDataTransferObject;
import org.jetbrains.annotations.Nullable;
import static org.apache.ignite.internal.visor.util.VisorTaskUtils.compactClass;
/**
* Data transfer object for client connector configuration.
*/
public class VisorClientConnectorConfiguration extends VisorDataTransferObject {
/** */
private static final long serialVersionUID = 0L;
/** Host. */
private String host;
/** Port. */
private int port;
/** Port range. */
private int portRange;
/** Max number of opened cursors per connection. */
private int maxOpenCursorsPerConn;
/** Socket send buffer size. */
private int sockSndBufSize;
/** Socket receive buffer size. */
private int sockRcvBufSize;
/** TCP no delay. */
private boolean tcpNoDelay;
/** Thread pool size. */
private int threadPoolSize;
/** Idle timeout. */
private long idleTimeout;
/** JDBC connections enabled flag. */
private boolean jdbcEnabled;
/** ODBC connections enabled flag. */
private boolean odbcEnabled;
/** JDBC connections enabled flag. */
private boolean thinCliEnabled;
/** SSL enable flag, default is disabled. */
private boolean sslEnabled;
/** If to use SSL context factory from Ignite configuration. */
private boolean useIgniteSslCtxFactory;
/** SSL need client auth flag. */
private boolean sslClientAuth;
/** SSL connection factory class name. */
private String sslCtxFactory;
/**
* Default constructor.
*/
public VisorClientConnectorConfiguration() {
// No-op.
}
/**
* Create data transfer object for Sql connector configuration.
*
* @param cfg Sql connector configuration.
*/
public VisorClientConnectorConfiguration(ClientConnectorConfiguration cfg) {
host = cfg.getHost();
port = cfg.getPort();
portRange = cfg.getPortRange();
maxOpenCursorsPerConn = cfg.getMaxOpenCursorsPerConnection();
sockSndBufSize = cfg.getSocketSendBufferSize();
sockRcvBufSize = cfg.getSocketReceiveBufferSize();
tcpNoDelay = cfg.isTcpNoDelay();
threadPoolSize = cfg.getThreadPoolSize();
idleTimeout = cfg.getIdleTimeout();
jdbcEnabled = cfg.isJdbcEnabled();
odbcEnabled = cfg.isOdbcEnabled();
thinCliEnabled = cfg.isThinClientEnabled();
sslEnabled = cfg.isSslEnabled();
useIgniteSslCtxFactory = cfg.isUseIgniteSslContextFactory();
sslClientAuth = cfg.isSslClientAuth();
sslCtxFactory = compactClass(cfg.getSslContextFactory());
}
/**
* @return Host.
*/
@Nullable public String getHost() {
return host;
}
/**
* @return Port.
*/
public int getPort() {
return port;
}
/**
* @return Port range.
*/
public int getPortRange() {
return portRange;
}
/**
* @return Maximum number of opened cursors.
*/
public int getMaxOpenCursorsPerConnection() {
return maxOpenCursorsPerConn;
}
/**
* @return Socket send buffer size in bytes.
*/
public int getSocketSendBufferSize() {
return sockSndBufSize;
}
/**
* @return Socket receive buffer size in bytes.
*/
public int getSocketReceiveBufferSize() {
return sockRcvBufSize;
}
/**
* @return TCP NO_DELAY flag.
*/
public boolean isTcpNoDelay() {
return tcpNoDelay;
}
/**
* @return Thread pool that is in charge of processing SQL requests.
*/
public int getThreadPoolSize() {
return threadPoolSize;
}
/**
* @return Idle timeout.
*/
public long getIdleTimeout() {
return idleTimeout;
}
/**
* @return JDBC connections enabled flag.
*/
public boolean isJdbcEnabled() {
return jdbcEnabled;
}
/**
* @return ODBC connections enabled flag.
*/
public boolean isOdbcEnabled() {
return odbcEnabled;
}
/**
* @return JDBC connections enabled flag.
*/
public boolean isThinClientEnabled() {
return thinCliEnabled;
}
/**
* @return SSL enable flag, default is disabled.
*/
public boolean isSslEnabled() {
return sslEnabled;
}
/**
* @return If to use SSL context factory from Ignite configuration.
*/
public boolean isUseIgniteSslContextFactory() {
return useIgniteSslCtxFactory;
}
/**
* @return SSL need client auth flag.
*/
public boolean isSslClientAuth() {
return sslClientAuth;
}
/**
* @return SSL connection factory.
*/
public String getSslContextFactory() {
return sslCtxFactory;
}
@Override public byte getProtocolVersion() {
return V2;
}
/** {@inheritDoc} */
@Override protected void writeExternalData(ObjectOutput out) throws IOException {
U.writeString(out, host);
out.writeInt(port);
out.writeInt(portRange);
out.writeInt(maxOpenCursorsPerConn);
out.writeInt(sockSndBufSize);
out.writeInt(sockRcvBufSize);
out.writeBoolean(tcpNoDelay);
out.writeInt(threadPoolSize);
out.writeLong(idleTimeout);
out.writeBoolean(jdbcEnabled);
out.writeBoolean(odbcEnabled);
out.writeBoolean(thinCliEnabled);
out.writeBoolean(sslEnabled);
out.writeBoolean(useIgniteSslCtxFactory);
out.writeBoolean(sslClientAuth);
U.writeString(out, sslCtxFactory);
}
/** {@inheritDoc} */
@Override protected void readExternalData(byte protoVer, ObjectInput in) throws IOException, ClassNotFoundException {
host = U.readString(in);
port = in.readInt();
portRange = in.readInt();
maxOpenCursorsPerConn = in.readInt();
sockSndBufSize = in.readInt();
sockRcvBufSize = in.readInt();
tcpNoDelay = in.readBoolean();
threadPoolSize = in.readInt();
if (protoVer > V1) {
idleTimeout = in.readLong();
jdbcEnabled = in.readBoolean();
odbcEnabled = in.readBoolean();
thinCliEnabled = in.readBoolean();
sslEnabled = in.readBoolean();
useIgniteSslCtxFactory = in.readBoolean();
sslClientAuth = in.readBoolean();
sslCtxFactory = U.readString(in);
}
}
/** {@inheritDoc} */
@Override public String toString() {
return S.toString(VisorClientConnectorConfiguration.class, this);
}
}
|
Yasuzo Masumura
was a Japanese film director.
Biography
Masumura was born in Kōfu, Yamanashi. After dropping out of a law course at the University of Tokyo he worked as an assistant director at the Daiei Film studio, later returning to university to study philosophy; he graduated in 1949. He then won a scholarship allowing him to study film in Italy at the Centro Sperimentale di Cinematografia under Michelangelo Antonioni, Federico Fellini and Luchino Visconti.
Masumura returned to Japan in 1953. From 1955, he worked as a second-unit director on films directed by Kenji Mizoguchi, Kon Ichikawa and Daisuke Ito, before directing his own first film, Kisses, in 1957. Over the next three decades, he directed 58 films in a variety of genres.
Legacy
Japanese film critic Shigehiko Hasumi said, "Young and influential filmmaker Shinji Aoyama declared that Masumura is the most important filmmaker in the history of postwar Japanese cinema."
Filmography
Kisses (1957)
The Blue Sky Maiden (1957)
Warm Current (1957)
The Precipice (1958)
Giants and Toys (1958)
Futeki na Otoko (1958)
Oyafuko Dori (1958)
Saiko Shukun Fujin (1959)
Hanran (1959)
Bibo ni Tsumi Ari (1959)
Yami o Yokogire (1959)
Jokyo (1960)
Afraid to Die (1960)
The Woman Who Touched the Legs (1960)
A False Student (1960)
Koi ni Inochi o (1960)
A Lustful Man (1961)
A Wife Confesses (1961)
Urusai Imototachi (1961)
Tadare (1962)
The Black Test Car (1962)
Onna no Issho (1962)
Kuro no Hokokusho (1963)
Uso (1963)
Gurentai Junjoha (1963)
Gendai Inchiki Monogatari: Damashiya (1964)
Otto ga Mita 'Onna no Kobako' yori (1964)
Manji (1964)
Super Express (1964)
The Hoodlum Soldier (1965)
Seisaku's Wife (1965)
Irezumi (1966)
Nakano Spy School (1966)
Red Angel (1966)
Two Wives (1967)
Chijin no Ai (1967)
The Wife of Seishu Hanaoka (1967)
Dai Akuto (1968)
Sekkusu Chekku: Daini no Sei (1968)
Tsumiki no Hako (1968)
Nureta Futari (1968)
Blind Beast (1969)
Senbazuru (1969)
Jotai (1969)
Denki Kurage (1970)
Yakuza Zessyō (1970)
Shibire Kurage (1970)
Asobi (1971)
Shin Heitai Yakuza: Kasen (1972)
The Music (1972)
Hanzo the Razor:The Snare (1973)
Akumyo: Nawabari Arashi (1974)
Domyaku Retto (1975)
Lullaby of the Earth (1976)
Sonezaki Shinju (1978)
Eden no Sono (1980)
Konoko no Nanastu no Oiwai ni (1982)
References
External links
Category:1924 births
Category:1986 deaths
Category:People from Yamanashi Prefecture
Category:Japanese film directors
Category:Centro Sperimentale di Cinematografia alumni
Category:University of Tokyo alumni |
Converting the Found
“That terrible zone of confusion so evident in the whole life of the Christian community could be cleared up in one day if the followers of Christ would begin to follow Christ instead of each other. For our Lord was very plain in His teaching about the believer and the world.” AW Tozer
I came across an incredibly thoughtful article by Michael Kruger called The Power of De-Conversion Stories; How Jen Hatmaker is Trying to Change Minds About the Bible. Its a fascinating look at the ways some influential leaders are doing away with dusty old ‘traditional’ Christianity for a wider, more open, less dogmatic spirituality. The author references the “playbook” that often gets used to justify this new-found revelation or spin on traditional teachings and why it so easily entangles well-meaning Christians. I won’t dive into the specific arguments, I’d highly suggest reading the article, but I would like to lay out the basic arguments he uses as a jumping off point for some reflection. Here are five arguments that get used to bring others ‘out of the fold’ so to speak and into a more ‘culturally aware’ Christianity:
Recount the negatives of your fundamentalist past
Position yourself as the offended party who bravely fought the establishment
Portray your opponents as overly dogmatic while you are just a seeker
Insist your new theology is driven by the Bible and not a rejection of it
Attack the character of your old group and uplift the character of your new group
There’s a certain emotionalism attached to these points, and why not, we are not robots, but feeling human beings with God-given emotions and responses. All these arguments though, hinge on one main idea: how one group of sinners treats another group of sinners. The idea being, the church has behaved badly, therefore their beliefs were wrong all along. Perhaps if the ‘church’ were to actually believe and act Biblically there would be no need for a revamping of ideas in the first place?
“Evangelizing the found” as Kruger puts it, is a new-found passion for those who consider themselves more in-step with culture and the needs of hurting people than the average Christian. They must get the word out about how things have changed. Painting fellow believers as callous and uncaring while creating a new class of believer launches these teachers to success because it’s what our current culture thrives on. Something new, non-threatening and emotional. The masses have a history of being wrong though, Jesus told us that Himself:
“Enter by the narrow gate… because narrow is the gate and difficult is the way which leads to life and there are few who find it (Matthew 7:13-14).
It’s fascinating really, pulling people in with falsehoods and making the whole thing more about self than Jesus seems to be working like a charm. These arguments (taken from the article) are problematic to say the least: “When we struggled to find clarity… the Bible refused to cooperate; there’s never been unanimity ever on anything; reason and humility occupies too small a place in the analysis of the historical church and the progressive interpretation of Scripture; [we put in] an incredible amount of study and inquiry…”
Friends, the Bible has not once refused to cooperate with us, on any subject. The difficulty lies not in our inability to understand what it says, but as A.W. Tozer put it, “in persuading our untamed hearts to accept plain instruction.”That should sting a little. None of us are exempt from a rebellious heart. I certainly am not.
And there’s the rub: sinners among sinners, hearts with a choice to make, and we sit around looking at one another for assistance all while ignoring that dusty old book that has the answers. We’ve muddied the waters by making it about ourselves. Human pride is a force, a wicked force at that, and when it stands tall, we find ourselves in tangled mess of our own doing.
“For God is not the author of confusion, but of peace” (I Corinthians 14:33).
Hatmaker and many others have twisted themselves into pretzels trying to explain away what God is very clear about, under the guise of compassion. If God’s word is fuzzy and confusing and fluid, why would I want to bother with any of it? You simply cannot take two thousand years of Christianity and flip it inside out because of a recent cultural shift. Here’s the truth: sin makes life difficult. We can’t be so afraid of addressing it, because when done in a proper Biblical way, it leads not to the condemnation Hatmaker so adamantly rails against, but to conviction and freedom. There is a huge difference.
The very idea that we must somehow read the Bible differently than people did a hundred years ago is absurd. Tozer asks, “What would people say if you backed them into a corner with the question, “Do you think God has been forced to change His mind?” I do not think anybody would quite have the courage to say yes. Nevertheless, they do say it little by little… ”
I do not think myself better than these Christians who have wandered out of the fold, I don’t think my heart is any less prideful or my words any more eloquent. We have gotten many things wrong in the Church both collectively and individually, but I am not willing to toss the baby out with the bathwater. I am not willing to turn a blind eye to my sin because the culture has decided it’s not sin. We are focusing on how to adjust to our sin instead of eradicate it, and what a waste of time that is.
There’s a verse in 1 John that came to mind as I read all these arguments and justifications:
“But the anointing which you have received from Him abides in you, and you do not need that anyone teach you; but as the same anointing teaches you concerning all things, and is true, and is not a lie, and just as it has taught you, you will abide in Him.” (v.27)
It isn’t that we reject all Godly teaching, this verse is the answer to the previous verse: “These things I have written to you concerning those who will try to deceive you.”
The solution to all of this is that we have an anointing inside us from the Holy Spirit that keeps us protected from error. The enemy gets as close to the real thing as he can and then he twists it all up into a giant lie. We don’t need this friends. We don’t need to play down what God has already ordained as truth, I’m not sure why we try. This isn’t checking your brain at the door, it’s laying down your selfish desire to be everyone’s savior and center of attention.
Anyone who honestly wants to understand the Word of God and His ways will never be led to confusion. Jesus is just too good for that. We can be both Biblical and gracious in our dealings with sin and sinners, ourselves included, but we must not be deceitful. We all have our blind spots, and we must be patient with each other. We should fellowship and encourage one another, but never to the point where we replace Jesus with a person. Follow people who follow Jesus. Christ alone deserves the top spot on the pedestal, He is the only one who cannot fall from it.
Post navigation
8 thoughts on “Converting the Found”
if it ain’t broke, don’t fix it—and yet we are witnessing a modern society trying like mad to make Christianity and God’s Word into something new, up and coming…the new flavor of the month club tasty—rather than being steadfast, with nose to the grindstone, honoring God as God!
Great insight as always Shara |
Q:
How to rewrite sql query to linq
I'm trying to rewrite sql query to linq but can't do it myself.
The most problem for me is to get I,II and III aggregated values.
Sql query:
select o.Name,t.TypeID, SUM(e.I),SUM(e.II),SUM(e.III) from Expenditure e
join Finance f on f.FinanceId = e.FinanceId
join FinanceYear fy on fy.FinanceYearId = f.FinanceYearId and fy.StatusId = 1
join Project p on p.ProjectId = fy.ProjectId
join Organization o on o.OrganizationId = p.OrganizationId
join Type t on t.TypeID = p.TypeID
where fy.Year = 2018
group by o.Name,s.TypeID
and what I have done so far is:
var x = (from e in _db.Expenditures
join f in _db.Finances on e.FinanceId equals f.FinanceId
join fy in _db.FinanceYears on f.FinanceYearId equals fy.FinanceYearId and fy.StatusId = 1 // this does not work, cant join on multiple conditions?
join p in _db.Projects on fy.ProjectId equals p.ProjectId
join o in _db.Organizations on p.OrganizationId equals o.OrganizationId
join s in _db.Types on p.TypeId equals s.TypeId
group new { o, s } by new { o.OrganizationId, s.TypeId }
into grp
select new AggModel
{
OrganizationId = grp.Key.OrganizationId,
TypeId = grp.Key.TypeId,
I = ?,
II = ?,
III = ?,
}
);
A:
Try something like this:
group new { e, o, s } by new { o.OrganizationId, s.TypeId }
into grp
select new AggModel
{
OrganizationId = grp.Key.OrganizationId,
TypeId = grp.Key.TypeId,
I = grp.Sum(a => a.e.I),
II = grp.Sum(a => a.e.II),
III = grp.Sum(a => a.e.III),
}
You'll need to adjust the right side of the lambda to navigate to the correct property.
|
Q:
Pass user data (from Ion Auth) to view on Codeigniter
In my controller I check if an user is logged in, and if its true I tried to pass the data to the view
$user= $this->ion_auth->user()->row();
$this->load->view('niceview',$user);
And use it that data on the view:
echo 'Hi' . $user->first_name.' '.$user->last_name.'!';
But I Get the following error:
Message: Undefined variable: user
Looking for how to pass the data I pass by this question, but the question isn't clear, and the answer state that I could use:
$data['user']=$this->ion_auth->user()->row();
$this->load->view("filename",$data);
In that case, I tried to get the user back with:
$user=$data['user'];
But I got the same undefined error
Message: Undefined variable: data
So, How can I pass the data from the user with Ion Auth to a view?
A:
I just found my error.
When you pass the data to a view you don't call the variable data again, just what it's inside (you pass an array and on the view you need to work with the elements from the array).
So, I pass the user on the controller
$data['user']=$this->ion_auth->user()->row();
$this->load->view("filename",$data);
And on the view, I don't need to get the variable data, just the data inside it (that is the variable $user)... so I just remove this line from the view
$user=$data['user']; //I remove this line
And I could use the user with, for example, this
echo 'Hi' . $user->first_name.' '.$user->last_name.'!';
|
June 2017 Jerusalem attack
On 16 June 2017, two Palestinian men opened fire on Israeli police officers in the Old City of Jerusalem, injuring four of them. An additional attacker stabbed a policewoman, she was critically injured, and later died in hospital. All three attackers were shot and killed by the Israeli authorities.
The Islamic State of Iraq and the Levant has claimed responsibility for the attacks, but Palestinian militant organisations PFLP and Hamas rejected the claim, saying that the perpetrators were members of their groups. On 17 June, Israeli authorities said that the attack was under investigation and that there is no evidence yet for ISIL involvement.
The attack was the third major terrorist attack in Jerusalem in 2017 after the 2017 Jerusalem Light Rail stabbing in which British tourist was stabbed to death, and the 2017 Jerusalem truck attack in which four Israeli soldiers were killed and 17 others wounded.
Background
After a relatively quiet year in terms of terrorist attacks in Jerusalem, four soldiers were killed and 17 others injured in a truck ramming attack on . Several stabbing and shooting attacks followed, but most attacks resulted only in injuries or the attackers being killed. On 6 April, three months after the truck attack, an Israeli soldier was killed in a car ramming attack, making it the second deadly attack in Jerusalem in 2017.
The attack occurred as the daily Ramadan fast was ending, the month of Ramadan being a period of heightened alert for terrorist attacks, including expressed call by ISIL to attack western targets.
Attack
In the evening of 16 June 2017, a Palestinian man attacked a 23-year old policewoman with a knife, fatally injuring her before being shot dead. Moments after that attack, two Palestinian men armed with improvised "carlo" submachine guns opened fire on several other policemen in a different location, injuring four police officers before being shot dead. The victim of the attacks was identified as 23-year-old Hadas Malka.
The attackers were identified as 18-year-old Adel Hasan Ahmad Ankoush, 18-year-old Baraa Ibrahim Salih Taha, 19-year-old Osama Ahmad Dahdouh all from the West Bank village of Deir Abu Mash'al near Ramallah. According to the Israeli army at least two of the assailants were known to be part of a local cell and had been jailed in the past for throwing stones and firebombs.
Reactions
Fatah, the ruling faction of the Palestinian Authority, accused Israel of a war crime saying "Fatah condemns the war crime carried out by Israeli occupation forces in Jerusalem against three Palestinian teens,". The Israeli government, in response, demanded that the Palestinian Authority condemn the attack saying "The Prime Minister demands that the Palestinian Authority condemn the attack and expects the international community to do so too".
Hamas praised the attack, stating that "the attack in Jerusalem is new proof that the Palestinian people continue their revolution against the occupiers and that the intifada will continue until complete freedom is achieved."
UN Envoy Nickolay Mladenov said "I condemn yesterday's shooting and stabbing attack by Palestinian assailants in the vicinity of the Old City of Jerusalem", "Such terrorist acts must be clearly condemned by all", and "I am appalled that once again some find it appropriate to justify such attacks as 'heroic.' They are unacceptable and seek to drag everyone into a new cycle of violence".
Responsibility claims
The Islamic State of Iraq and the Levant has claimed responsibility for the attacks, but Palestinian militant organisations PFLP and Hamas rejected the claim, saying that the perpetrators were members of their groups. On 17 June, Israeli authorities said that the attack was under investigation and that there is no evidence yet for ISIL involvement.
While the number of lone wolf attacks has significantly increased in recent spikes of Israeli-Palestinian violence and ISIL began active incitement on the Palestinian arena, until June 2017 the terror group had not claimed responsibility for attacks in Israel. However, in two incidents - the attackers at June 2016 Tel Aviv shooting and at January 2016 Tel Aviv shooting were found by investigators to be inspired by the Islamic State of Iraq and the Levant and not belonging to any Palestinian nationalist militant group.
Media coverage
The BBC faced criticism in Israel over its coverage of the attack, which published an article titled "Three Palestinians killed after deadly stabbing in Jerusalem." Israeli Prime Minister Benjamin Netanyahu deemed the reporting biased for omitting the fact that the three perpetrators were neutralized because they killed an Israeli policewoman. Netanyahu ordered the Israeli Ministry of Foreign Affairs to reproach the BBC, which updated the article headline to read: "Israeli policewoman stabbed to death in Jerusalem." then the BBC issued an apology for this headline admitting that its focus on the slain assailants, not the Israeli victim, was inappropriate.
See also
List of terrorist incidents in June 2017
List of violent incidents in the Israeli–Palestinian conflict, 2017
Timeline of ISIL-related events (2017)
References
Category:2017 murders in Asia
Category:2010s in Jerusalem
Category:Deaths by stabbing in Israel
Category:Islamic terrorist incidents in 2017
Category:Israel Border Police
Category:Israeli–Palestinian conflict in Jerusalem
Category:June 2017 crimes in Asia
Category:Mass shootings in Israel
Category:Murder in Israel
Category:Palestinian terrorism
Category:Police officers killed in the line of duty
Category:Stabbing attacks in 2017
Category:Terrorist incidents in Israel in 2017
Category:Terrorist incidents in Jerusalem
Category:Terrorist incidents involving knife attacks
Category:Islamic State of Iraq and the Levant activities
Category:2010s mass shootings in Asia
Category:2017 mass shootings
Category:Terrorist incidents in Jerusalem in the 2010s |
# Copyright (C) 2015 Canonical Ltd.
# Copyright (C) 2017-2019 VMware INC.
#
# Author: Maitreyee Saikia <msaikia@vmware.com>
#
# This file is part of cloud-init. See LICENSE file for license information.
import os
import stat
from cloudinit import util
from cloudinit.sources.helpers.vmware.imc.config_custom_script import (
CustomScriptConstant,
CustomScriptNotFound,
PreCustomScript,
PostCustomScript,
)
from cloudinit.tests.helpers import CiTestCase, mock
class TestVmwareCustomScript(CiTestCase):
def setUp(self):
self.tmpDir = self.tmp_dir()
# Mock the tmpDir as the root dir in VM.
self.execDir = os.path.join(self.tmpDir, ".customization")
self.execScript = os.path.join(self.execDir,
".customize.sh")
def test_prepare_custom_script(self):
"""
This test is designed to verify the behavior based on the presence of
custom script. Mainly needed for scenario where a custom script is
expected, but was not properly copied. "CustomScriptNotFound" exception
is raised in such cases.
"""
# Custom script does not exist.
preCust = PreCustomScript("random-vmw-test", self.tmpDir)
self.assertEqual("random-vmw-test", preCust.scriptname)
self.assertEqual(self.tmpDir, preCust.directory)
self.assertEqual(self.tmp_path("random-vmw-test", self.tmpDir),
preCust.scriptpath)
with self.assertRaises(CustomScriptNotFound):
preCust.prepare_script()
# Custom script exists.
custScript = self.tmp_path("test-cust", self.tmpDir)
util.write_file(custScript, "test-CR-strip\r\r")
with mock.patch.object(CustomScriptConstant,
"CUSTOM_TMP_DIR",
self.execDir):
with mock.patch.object(CustomScriptConstant,
"CUSTOM_SCRIPT",
self.execScript):
postCust = PostCustomScript("test-cust",
self.tmpDir,
self.tmpDir)
self.assertEqual("test-cust", postCust.scriptname)
self.assertEqual(self.tmpDir, postCust.directory)
self.assertEqual(custScript, postCust.scriptpath)
postCust.prepare_script()
# Custom script is copied with exec privilege
self.assertTrue(os.path.exists(self.execScript))
st = os.stat(self.execScript)
self.assertTrue(st.st_mode & stat.S_IEXEC)
with open(self.execScript, "r") as f:
content = f.read()
self.assertEqual(content, "test-CR-strip")
# Check if all carraige returns are stripped from script.
self.assertFalse("\r" in content)
def test_execute_post_cust(self):
"""
This test is designed to verify the behavior after execute post
customization.
"""
# Prepare the customize package
postCustRun = self.tmp_path("post-customize-guest.sh", self.tmpDir)
util.write_file(postCustRun, "This is the script to run post cust")
userScript = self.tmp_path("test-cust", self.tmpDir)
util.write_file(userScript, "This is the post cust script")
# Mock the cc_scripts_per_instance dir and marker file.
# Create another tmp dir for cc_scripts_per_instance.
ccScriptDir = self.tmp_dir()
ccScript = os.path.join(ccScriptDir, "post-customize-guest.sh")
markerFile = os.path.join(self.tmpDir, ".markerFile")
with mock.patch.object(CustomScriptConstant,
"CUSTOM_TMP_DIR",
self.execDir):
with mock.patch.object(CustomScriptConstant,
"CUSTOM_SCRIPT",
self.execScript):
with mock.patch.object(CustomScriptConstant,
"POST_CUSTOM_PENDING_MARKER",
markerFile):
postCust = PostCustomScript("test-cust",
self.tmpDir,
ccScriptDir)
postCust.execute()
# Check cc_scripts_per_instance and marker file
# are created.
self.assertTrue(os.path.exists(ccScript))
with open(ccScript, "r") as f:
content = f.read()
self.assertEqual(content,
"This is the script to run post cust")
self.assertTrue(os.path.exists(markerFile))
# vi: ts=4 expandtab
|
Melissa Keighley: It’s my wedding and we’ll eat what I want
Two months to the wedding, and plans are progressing so smoothly I’m scared I must have forgotten something. I’ve a dress, veil, garter, groom, vicar, cake, photographer, overdraft….what else could I need?
Food, of course! We’ve 170 guests coming, and it seems they won’t be content merely to feast on my radiant smugness. Mass catering is problematic anytime, especially when your guests have nowhere to sit (Ramsgate Music Hall: great for cool, less great for formal seating arrangements).
And I decided to make matters much harder for myself by insisting the food all be vegan. Yes, Uncle Barry, sorry to break it to you, but even your dinner will be entirely free from suffering. It doesn’t seem right, somehow, to celebrate love and new beginnings with a gigantic blood bath.
Luckily Ramsgate is blessed with a veritable vegan paradise in the form of the Shakey Shakey Fish Bar, and they haven’t paid me to say so. Everything you could want from your local chippy – fish, fish cakes, burgers, Cornish pasties, even the odd battered sausage, all served with glamour, tastier than fast food has any right to be. And all vegan! I don’t know how they do it. I daren’t ask, for fear it’s witchcraft.
I couldn’t give a rat’s sphincter what you eat when I’m not paying. I’m not out to proselytise anyone. I’m aware of all the environmental, moral and health reasons for eschewing animal products, but in truth, I’m a vegetarian because corpses creep me out.
If I see a dead bird in the road I say “ewwww!” and look away, rather than getting any urge to lick it. Death is disgusting, mouldy and vile. Fish don’t smell: fish dishes have that funny lady parts stench because of the bacteria eating their dead mouldering forms. You need take care when storing and preparing meat because it’s full of the dangerous and horrid. And yeah, it’s breaking the planet, creating resistance to antibiotics, causing cancer, untold suffering to millions of sentient beings, but mainly, ewwww!
Ah, but it’s natural, they say. Eating meat is natural. You know what else is natural? Gonorrhoea. Cold sores. Tsunamis. Dying of a dental abscess before the age of 30. The whole history of civilisation charts the journey of man from a state of nature to a state of pleasant, polished enlightenment, and I’m all in favour of it.
Of course I’m privileged to be able to make that choice, but given that privilege, the enormous Sainsbury’s within walking distance, stuffed with aduki beans and carrots, it seems insane and offensive not to take advantage.
Weddings are meant to have themes these days, it seems. Mine doesn’t, unless it’s the wonder of me. But if any of my 170 guests chows down on a vegan fishcake and thinks, actually, that’s pretty scrummy, I’ll definitely be doing that again, then I’ll be thrilled. |
1. Field of the Invention
The present invention relates to a B picture mode determining method and apparatus in a video coding system, and more particularly, to a B picture mode determining method and apparatus in a video coding system in which direct prediction modes are selected as many as possible in a coding system using a B picture mode to thereby reduce a bit rate of the coding system.
2. Description of the Background Art
A ‘B’ picture in a video coding system such as an H.26L can be predicted from either or both of a previous and subsequent decoded ‘P’
Thus, a coding system using the ‘B’ picture can obtain an improved coding efficiency compared to a coding system that uses only the ‘P’ picture, and especially, it can obtain a considerable gain for low motion image sequences.
The B pictures in the video coding system are coded in five modes such as an intra prediction mode having 4×4 and 16×16 block size, a forward prediction mode, a backward prediction mode, a bi-directional prediction mode and a direct prediction mode.
Among the modes, the optimum mode determining method of a macro block (a basic unit of an image to be coded) as shown in FIG. 1 is that a sum of absolute difference (SAD) value, a prediction error measuring method between an original image and a predicted image, is calculated for the prediction modes, and one of them, which has the minimum SAD value, is selected as a prediction mode for the macro block.
In such a mode determining method, even though the optimum mode is determined on the basis of the SAD value according to the prediction error, there is always an overhead bit that is to be necessarily added according to a syntax of the mode.
The overhead bit affects the length of the overall bit stream, and accordingly, as bit rate is increased, degradation of coding performance of the video coding system may occur.
For example, if the bi-directional prediction mode is determined to be an optimum mode having the least SAD value, an overhead bit of four components such as reference frame information, forward and backward block size information, forward motion vector information and a backward motion vector information should be added to the bit stream to be coded, so that as the bit rate is increased, the coding performance of the video coding system is degraded. |
Tag Archives: Power
What does the good life look like to you? The image that comes to my mind is a sunny day at a sandy beach with the crystal-clear ocean beckoning me to wade in. For you the good life looks like … Continue reading →
Why do bad things happen to good people? This familiar question arises quite publicly in wake of a great tragedy, like the flooding in Chennai, India’s 4th largest city, earlier this month, that claimed lives of nearly 300 people. But … Continue reading →
This is a text dealing with justice, and for that very reason it is a very difficult passage. When we’re children, justice seems fairly simple: just keep everything the same. My piece of pumpkin pie needs to be the same … Continue reading →
The movie “Back to the Future II” has been in the news lately because of its prediction that the Chicago Cubs would win the World Series in 2015. As it turned out, while the Cubs made the playoffs, they did … Continue reading →
Scripture to consider: Isaiah 42.1–17 1 “Here is my servant, whom I uphold, my chosen one in whom I delight; I will put my Spirit on him, and he will bring justice to the nations. 2 He will not shout … Continue reading → |
{stdenv, fetchurl, pkgconfig, lua5, curl, quvi_scripts, libquvi, lua5_sockets, glib, makeWrapper}:
stdenv.mkDerivation rec {
pname = "quvi";
version="0.9.5";
src = fetchurl {
url = "mirror://sourceforge/quvi/quvi-${version}.tar.xz";
sha256 = "1h52s265rp3af16dvq1xlscp2926jqap2l4ah94vrfchv6m1hffb";
};
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ lua5 curl quvi_scripts libquvi glib makeWrapper ];
postInstall = ''
wrapProgram $out/bin/quvi --set LUA_PATH "${lua5_sockets}/share/lua/${lua5.luaversion}/?.lua"
'';
meta = {
description = "Web video downloader";
homepage = "http://quvi.sf.net";
license = stdenv.lib.licenses.lgpl21Plus;
platforms = stdenv.lib.platforms.linux;
maintainers = [ ];
};
}
|
Type C brachydactyly transmitted through four generations.
We report a type C brachydactyly transmitted through four generations, with incomplete penetrance and feet abnormalities in the proposita. |
/* Copyright (c) 2014 Nordic Semiconductor. All Rights Reserved.
*
* The information contained herein is property of Nordic Semiconductor ASA.
* Terms and conditions of usage are described in detail in NORDIC
* SEMICONDUCTOR STANDARD SOFTWARE LICENSE AGREEMENT.
*
* Licensees are granted free, non-transferable use of the information. NO
* WARRANTY of ANY KIND is provided. This heading must NOT be removed from
* the file.
*
*/
#include "ble_gap.h"
#include <stdint.h>
#include <string.h>
#include "ble_serialization.h"
#include "ser_sd_transport.h"
#include "ble_gap_app.h"
#include "app_error.h"
#include "app_ble_gap_sec_keys.h"
extern ser_ble_gap_app_keyset_t m_app_keys_table[SER_MAX_CONNECTIONS];
/**@brief Structure containing @ref sd_ble_gap_device_name_get output parameters. */
typedef struct
{
uint8_t * p_dev_name; /**< @ref sd_ble_gap_device_name_get p_dev_name output parameter. */
uint16_t * p_len; /**< @ref sd_ble_gap_device_name_get p_len output parameter. */
} gap_device_name_get_output_params_t;
/**@brief Structure containing @ref sd_ble_gap_appearance_get output parameters. */
typedef struct
{
uint16_t * p_appearance; /**< @ref sd_ble_gap_appearance_get p_appearance output parameter. */
} gap_appearance_get_output_params_t;
/**@brief Structure containing @ref sd_ble_gap_ppcp_get output parameters. */
typedef struct
{
ble_gap_conn_params_t * p_conn_params; /**< @ref sd_ble_gap_ppcp_get p_conn_params output parameter. */
} gap_ppcp_get_out_params_t;
/**@brief Structure containing @ref sd_ble_gap_sec_params_reply output parameters. */
typedef struct
{
ble_gap_sec_keyset_t const * p_sec_keyset; /**< @ref sd_ble_gap_sec_params_reply p_sec_keyset output parameter. */
uint16_t conn_handle; /**< @ref sd_ble_gap_sec_params_reply p_conn_handle output parameter. */
} gap_sec_params_reply_out_params_t;
/**@brief Union containing BLE command output parameters. */
typedef union
{
gap_device_name_get_output_params_t gap_device_name_get_out_params; /**< @ref sd_ble_gap_device_name_get output parameters. */
gap_appearance_get_output_params_t gap_appearance_get_out_params; /**< @ref sd_ble_gap_appearance_get output parameters. */
gap_ppcp_get_out_params_t gap_ppcp_get_out_params; /**< @ref sd_ble_gap_ppcp_get output parameters. */
gap_sec_params_reply_out_params_t gap_sec_params_reply_out_params;/**< @ref sd_ble_sec_params_reply output parameters. */
} gap_command_output_params_t;
static gap_command_output_params_t m_output_params; /**< BLE command output parameters. */
static void * mp_out_params[1];
static void tx_buf_alloc(uint8_t * * p_data, uint16_t * p_len)
{
uint32_t err_code;
do
{
err_code = ser_sd_transport_tx_alloc(p_data, p_len);
}
while (err_code != NRF_SUCCESS);
*p_data[0] = SER_PKT_TYPE_CMD;
*p_len -= 1;
}
/**@brief Command response callback function for @ref sd_ble_gap_adv_start BLE command.
*
* Callback for decoding the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_adv_start_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code = ble_gap_adv_start_rsp_dec(p_buffer, length, &result_code);
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_adv_start(ble_gap_adv_params_t const * const p_adv_params)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_adv_start_req_enc(p_adv_params,
&(p_buffer[1]),
&buffer_length);
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_adv_start_rsp_dec);
}
/**@brief Command response callback function for @ref ble_gap_device_name_get_req_enc BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_device_name_get_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code =
ble_gap_device_name_get_rsp_dec(p_buffer,
length,
m_output_params.gap_device_name_get_out_params.p_dev_name,
m_output_params.gap_device_name_get_out_params.p_len,
&result_code);
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_device_name_get(uint8_t * const p_dev_name, uint16_t * const p_len)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
m_output_params.gap_device_name_get_out_params.p_dev_name = p_dev_name;
m_output_params.gap_device_name_get_out_params.p_len = p_len;
const uint32_t err_code = ble_gap_device_name_get_req_enc(p_dev_name,
p_len,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_device_name_get_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_appearance_get BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_appearance_get_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code =
ble_gap_appearance_get_rsp_dec(p_buffer,
length,
m_output_params.gap_appearance_get_out_params.p_appearance,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_appearance_get(uint16_t * const p_appearance)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
m_output_params.gap_appearance_get_out_params.p_appearance = p_appearance;
const uint32_t err_code = ble_gap_appearance_get_req_enc(p_appearance,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_appearance_get_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_device_name_set BLE command.
*
* Callback for decoding the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_device_name_set_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code = ble_gap_device_name_set_rsp_dec(p_buffer, length, &result_code);
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_device_name_set(ble_gap_conn_sec_mode_t const * const p_write_perm,
uint8_t const * const p_dev_name,
uint16_t len)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_device_name_set_req_enc(p_write_perm,
p_dev_name,
len,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_device_name_set_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_appearance_set BLE command.
*
* Callback for decoding the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_appearance_set_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code = ble_gap_appearance_set_rsp_dec(p_buffer, length, &result_code);
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_appearance_set(uint16_t appearance)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_appearance_set_req_enc(appearance,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_appearance_set_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_ppcp_set BLE command.
*
* Callback for decoding the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_ppcp_set_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code = ble_gap_ppcp_set_rsp_dec(p_buffer, length, &result_code);
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_ppcp_set(ble_gap_conn_params_t const * const p_conn_params)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_ppcp_set_req_enc(p_conn_params,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_ppcp_set_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_adv_data_set BLE command.
*
* Callback for decoding the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_adv_data_set_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code = ble_gap_adv_data_set_rsp_dec(p_buffer, length, &result_code);
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_adv_data_set(uint8_t const * const p_data,
uint8_t dlen,
uint8_t const * const p_sr_data,
uint8_t srdlen)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_adv_data_set_req_enc(p_data,
dlen,
p_sr_data,
srdlen,
&(p_buffer[1]),
&buffer_length);
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_adv_data_set_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_conn_param_update BLE command.
*
* Callback for decoding the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_conn_param_update_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code = ble_gap_conn_param_update_rsp_dec(p_buffer, length, &result_code);
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_conn_param_update(uint16_t conn_handle,
ble_gap_conn_params_t const * const p_conn_params)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_conn_param_update_req_enc(conn_handle,
p_conn_params,
&(p_buffer[1]),
&buffer_length);
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_conn_param_update_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_disconnect BLE command.
*
* Callback for decoding the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_disconnect_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code = ble_gap_disconnect_rsp_dec(p_buffer, length, &result_code);
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_disconnect(uint16_t conn_handle, uint8_t hci_status_code)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_disconnect_req_enc(conn_handle,
hci_status_code,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_disconnect_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_sec_info_reply BLE command.
*
* Callback for decoding the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_sec_info_reply_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code;
const uint32_t err_code = ble_gap_sec_info_reply_rsp_dec(p_buffer, length, &result_code);
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_sec_info_reply(uint16_t conn_handle,
ble_gap_enc_info_t const * p_enc_info,
ble_gap_irk_t const * p_id_info,
ble_gap_sign_info_t const * p_sign_info)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_sec_info_reply_req_enc(conn_handle,
p_enc_info,
p_id_info,
p_sign_info,
&(p_buffer[1]),
&buffer_length);
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_sec_info_reply_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_sec_params_reply BLE command.
*
* Callback for decoding the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_sec_params_reply_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
uint32_t err_code = ble_gap_sec_params_reply_rsp_dec(p_buffer, length,
m_output_params.gap_sec_params_reply_out_params.p_sec_keyset, &result_code);
APP_ERROR_CHECK(err_code);
// If soft device returned error free security context
if (result_code)
{
err_code = app_ble_gap_sec_context_destroy(m_output_params.gap_sec_params_reply_out_params.conn_handle);
SER_ASSERT(err_code == NRF_SUCCESS, err_code);
}
return result_code;
}
uint32_t sd_ble_gap_sec_params_reply(uint16_t conn_handle,
uint8_t sec_status,
ble_gap_sec_params_t const * p_sec_params,
ble_gap_sec_keyset_t const * p_sec_keyset)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
uint32_t sec_tab_index = 0;
uint32_t err_code = NRF_SUCCESS;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
m_output_params.gap_sec_params_reply_out_params.p_sec_keyset = p_sec_keyset;
m_output_params.gap_sec_params_reply_out_params.conn_handle = conn_handle;
// First allocate security context for serialization
if (p_sec_keyset)
{
err_code = app_ble_gap_sec_context_create(conn_handle, &sec_tab_index);
SER_ASSERT(err_code == NRF_SUCCESS, err_code);
memcpy(&(m_app_keys_table[sec_tab_index].keyset), p_sec_keyset, sizeof(ble_gap_sec_keyset_t));
}
err_code = ble_gap_sec_params_reply_req_enc(conn_handle,
sec_status,
p_sec_params,
p_sec_keyset,
&(p_buffer[1]),
&buffer_length);
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_sec_params_reply_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_ppcp_get BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_ppcp_get_reply_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_ppcp_get_rsp_dec(
p_buffer,
length,
m_output_params.gap_ppcp_get_out_params.
p_conn_params,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_ppcp_get(ble_gap_conn_params_t * const p_conn_params)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
m_output_params.gap_ppcp_get_out_params.p_conn_params = p_conn_params;
const uint32_t err_code = ble_gap_ppcp_get_req_enc(p_conn_params,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_ppcp_get_reply_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_address_get BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_address_get_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_address_get_rsp_dec(p_buffer,
length,
(ble_gap_addr_t *)mp_out_params[0],
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_address_get(ble_gap_addr_t * const p_addr)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
mp_out_params[0] = p_addr;
const uint32_t err_code = ble_gap_address_get_req_enc(p_addr,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_address_get_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_address_set BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_address_set_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_address_set_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_address_set(uint8_t addr_cycle_mode, ble_gap_addr_t const * const p_addr)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_address_set_req_enc(addr_cycle_mode,
p_addr,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_address_set_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_adv_stop BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_adv_stop_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_adv_stop_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_adv_stop(void)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_adv_stop_req_enc(&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_adv_stop_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_auth_key_reply BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_auth_key_reply_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_auth_key_reply_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_auth_key_reply(uint16_t conn_handle,
uint8_t key_type,
uint8_t const * const key)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_auth_key_reply_req_enc(conn_handle, key_type, key,
&(p_buffer[1]), &buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_auth_key_reply_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_authenticate BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_authenticate_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_authenticate_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_authenticate(uint16_t conn_handle,
ble_gap_sec_params_t const * const p_sec_params)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_authenticate_req_enc(conn_handle, p_sec_params,
&(p_buffer[1]), &buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_authenticate_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_conn_sec_get BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_conn_sec_get_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_conn_sec_get_rsp_dec(
p_buffer,
length,
(ble_gap_conn_sec_t * *)&mp_out_params[0
],
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_conn_sec_get(uint16_t conn_handle, ble_gap_conn_sec_t * const p_conn_sec)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
mp_out_params[0] = p_conn_sec;
const uint32_t err_code = ble_gap_conn_sec_get_req_enc(conn_handle, p_conn_sec,
&(p_buffer[1]), &buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_conn_sec_get_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_rssi_start BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_rssi_start_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_rssi_start_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_rssi_start(uint16_t conn_handle, uint8_t threshold_dbm, uint8_t skip_count)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_rssi_start_req_enc(conn_handle,
threshold_dbm,
skip_count,
&(p_buffer[1]), &buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_rssi_start_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_rssi_stop BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_rssi_stop_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_rssi_stop_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_rssi_stop(uint16_t conn_handle)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_rssi_stop_req_enc(conn_handle,
&(p_buffer[1]), &buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_rssi_stop_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_tx_power_set BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_tx_power_set_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_tx_power_set_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_tx_power_set(int8_t tx_power)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_tx_power_set_req_enc(tx_power,
&(p_buffer[1]), &buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_tx_power_set_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_scan_stop BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_scan_stop_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_scan_stop_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_scan_stop(void)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_scan_stop_req_enc(&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_scan_stop_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_connect BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_connect_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_connect_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_connect(ble_gap_addr_t const * const p_addr,
ble_gap_scan_params_t const * const p_scan_params,
ble_gap_conn_params_t const * const p_conn_params)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_connect_req_enc(p_addr,
p_scan_params,
p_conn_params,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_connect_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_connect_cancel BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_connect_cancel_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_connect_cancel_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_connect_cancel(void)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_connect_cancel_req_enc(&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_connect_cancel_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_scan_start BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_scan_start_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_scan_start_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_scan_start(ble_gap_scan_params_t const * const p_scan_params)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_scan_start_req_enc(p_scan_params,
&(p_buffer[1]),
&buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_scan_start_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_encrypt BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_encrypt_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_encrypt_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_encrypt( uint16_t conn_handle,
ble_gap_master_id_t const * p_master_id,
ble_gap_enc_info_t const * p_enc_info)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_encrypt_req_enc( conn_handle, p_master_id, p_enc_info, &(p_buffer[1]), &buffer_length );
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_encrypt_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_rssi_get BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_rssi_get_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_rssi_get_rsp_dec(p_buffer,
length,
(int8_t *) mp_out_params[0],
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_rssi_get(uint16_t conn_handle,
int8_t * p_rssi)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
mp_out_params[0] = p_rssi;
const uint32_t err_code = ble_gap_rssi_get_req_enc(conn_handle, p_rssi, &(p_buffer[1]), &buffer_length);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_rssi_get_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_keypress_notify BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_keypress_notify_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_keypress_notify_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_keypress_notify( uint16_t conn_handle, uint8_t kp_not)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_keypress_notify_req_enc( conn_handle, kp_not, &p_buffer[1], &buffer_length );
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_keypress_notify_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_lesc_dhkey_reply BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_lesc_dhkey_reply_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_lesc_dhkey_reply_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_lesc_dhkey_reply( uint16_t conn_handle, ble_gap_lesc_dhkey_t const *p_dhkey)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_lesc_dhkey_reply_req_enc( conn_handle, p_dhkey, &(p_buffer[1]), &buffer_length );
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_lesc_dhkey_reply_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_lesc_oob_data_set BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_lesc_oob_data_set_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_lesc_oob_data_set_rsp_dec(p_buffer,
length,
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_lesc_oob_data_set(uint16_t conn_handle,
ble_gap_lesc_oob_data_t const *p_oobd_own,
ble_gap_lesc_oob_data_t const *p_oobd_peer)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
const uint32_t err_code = ble_gap_lesc_oob_data_set_req_enc(conn_handle, p_oobd_own, p_oobd_peer,
&(p_buffer[1]), &buffer_length );
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_lesc_oob_data_set_rsp_dec);
}
/**@brief Command response callback function for @ref sd_ble_gap_lesc_oob_data_get BLE command.
*
* Callback for decoding the output parameters and the command response return code.
*
* @param[in] p_buffer Pointer to begin of command response buffer.
* @param[in] length Length of data in bytes.
*
* @return Decoded command response return code.
*/
static uint32_t gap_lesc_oob_data_get_rsp_dec(const uint8_t * p_buffer, uint16_t length)
{
uint32_t result_code = 0;
const uint32_t err_code = ble_gap_lesc_oob_data_get_rsp_dec(p_buffer,
length,
(ble_gap_lesc_oob_data_t **) &mp_out_params[0],
&result_code);
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
return result_code;
}
uint32_t sd_ble_gap_lesc_oob_data_get(uint16_t conn_handle,
ble_gap_lesc_p256_pk_t const *p_pk_own,
ble_gap_lesc_oob_data_t *p_oobd_own)
{
uint8_t * p_buffer;
uint32_t buffer_length = 0;
tx_buf_alloc(&p_buffer, (uint16_t *)&buffer_length);
mp_out_params[0] = p_oobd_own;
const uint32_t err_code = ble_gap_lesc_oob_data_get_req_enc(conn_handle, p_pk_own, p_oobd_own,
&(p_buffer[1]), &buffer_length );
//@note: Should never fail.
APP_ERROR_CHECK(err_code);
//@note: Increment buffer length as internally managed packet type field must be included.
return ser_sd_transport_cmd_write(p_buffer,
(++buffer_length),
gap_lesc_oob_data_get_rsp_dec);
}
|
// CodeContracts
//
// Copyright (c) Microsoft Corporation
//
// All rights reserved.
//
// MIT License
//
// Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED *AS IS*, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
// File System.Web.UI.PageStatePersister.cs
// Automatically generated contract file.
using System.Collections.Generic;
using System.IO;
using System.Text;
using System.Diagnostics.Contracts;
using System;
// Disable the "this variable is not used" warning as every field would imply it.
#pragma warning disable 0414
// Disable the "this variable is never assigned to".
#pragma warning disable 0067
// Disable the "this event is never assigned to".
#pragma warning disable 0649
// Disable the "this variable is never used".
#pragma warning disable 0169
// Disable the "new keyword not required" warning.
#pragma warning disable 0109
// Disable the "extern without DllImport" warning.
#pragma warning disable 0626
// Disable the "could hide other member" warning, can happen on certain properties.
#pragma warning disable 0108
namespace System.Web.UI
{
abstract public partial class PageStatePersister
{
#region Methods and constructors
public abstract void Load();
protected PageStatePersister(Page page)
{
}
public abstract void Save();
#endregion
#region Properties and indexers
public Object ControlState
{
get
{
return default(Object);
}
set
{
}
}
protected Page Page
{
get
{
return default(Page);
}
set
{
}
}
protected IStateFormatter StateFormatter
{
get
{
return default(IStateFormatter);
}
}
public Object ViewState
{
get
{
return default(Object);
}
set
{
}
}
#endregion
}
}
|
Q:
Determine attributes of an Schannel connection -> returns unknown value
After successfully Creating a Secure Connection Using Schannel, I am obtaining its connection attributes using QueryContextAttributes(), passing SECPKG_ATTR_CONNECTION_INFO.
The returned structure SecPkgContext_ConnectionInfo contains the field aiExch, which holds the information I am looking for - namely the used key exchange algorithm.
I am using this for months, and it always returned one of the two predefined values CALG_RSA_KEYX or CALG_DH_EPHEM. But since a couple of weeks (when I believe a Schannel update patch was issued by Microsoft) it returns an unknown value: 0x0000ae06
Using these macros, the ALG_ID can be split into its components:
#define GET_ALG_CLASS(x) (x & (7 << 13))
#define GET_ALG_TYPE(x) (x & (15 << 9))
#define GET_ALG_SID(x) (x & (511))
According to that, 0x0000ae06 would mean:
Class: ALG_CLASS_KEY_EXCHANGE
Type: (7 << 9) -> which is undefined
SID: 6 -> whose meaning depends on the type of algorithm
Anyone ran into the same issue? Can anyone explain what happened, or what 0x0000ae06 stands for?
A:
Have a look at the code found here http://pastebin.com/TKQJ85Z9 notice that, the ID was added to the schannel library but apparently the VC headers weren't update, at any rate, as you can see from the above code (see pastebin URL), that ID corresponds to "ECDHE", that is Elliptic Curve DH with Ephemeral key exchange
[edit]
The real problem is that the value is unofficial and can only be found by some internet search, that's why I posted the link to some sample code; see, it just happened to me to find the answer by looking at this twit https://twitter.com/ericlaw/status/301083494203928576
At any rate, it sounds like the latest version of the Microsoft CNG SDK contains updated headers and libraries which add a new constant for the "QueryContextAttributes" API call, that is SECPKG_ATTR_CIPHER_INFO such a call returns a structure (see definition in code below) whose member named "szCipherSuite" reports the full string for the cipher in use, for example "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P384"
Here's some sample code for such a call
/*
// -- http://www.microsoft.com/en-us/download/details.aspx?id=1251
typedef struct _SecPkgContext_CipherInfo
{
DWORD dwVersion;
DWORD dwProtocol;
DWORD dwCipherSuite;
DWORD dwBaseCipherSuite;
WCHAR szCipherSuite[SZ_ALG_MAX_SIZE];
WCHAR szCipher[SZ_ALG_MAX_SIZE];
DWORD dwCipherLen;
DWORD dwCipherBlockLen; // in bytes
WCHAR szHash[SZ_ALG_MAX_SIZE];
DWORD dwHashLen;
WCHAR szExchange[SZ_ALG_MAX_SIZE];
DWORD dwMinExchangeLen;
DWORD dwMaxExchangeLen;
WCHAR szCertificate[SZ_ALG_MAX_SIZE];
DWORD dwKeyType;
} SecPkgContext_CipherInfo, *PSecPkgContext_CipherInfo;
*/
static void DisplayConnectionInfo(CtxtHandle *phContext)
{
SECURITY_STATUS Status;
SecPkgContext_CipherInfo CipherInfo = { SECPKGCONTEXT_CIPHERINFO_V1 };
Status = QueryContextAttributes( phContext, SECPKG_ATTR_CIPHER_INFO, &CipherInfo);
if(Status != SEC_E_OK)
{
printf("Error 0x%x querying cipher info\n", Status);
return;
}
printf("%S\n", CipherInfo.szCipherSuite);
}
for further infos, please get the MS CNG SDK and have a look at the included help and headers.
|
TLC will give your wheel and rim assemblies that care needed to ensure a long life.TLC has been formulated to reduce many of these costs by extending tyre life, easier wheel dismounting and early warning for potentially dangerous cracked wheels.
Arnco TLC benefits:
Arnco TLC prevents rust and will reduce rust over the life of your wheels
Provides tyre operators a faster, easier and more efficient way to dismount large OTR tyres – reduces downtime |
Due to g++/VC++ incompatibilities, MinGW support is unavailable for Pygame 1.9.2
These instructions are for Pygame 1.9.0, revision 1673 and up. For earlier Pygames, 1.8.0 and 1.8.1, look at the msys_build_deps.py document string for the list of relevant Pygame dependency versions and Msys/MinGW build tools.
Note that a source bundle and precompiled binaries of the Pygame 1.8 dependecies are available on the download page.
Choose, or create, a directory having a path with no spaces in it (Some library build scripts, and Msys's mount, fail when spaces are present.) Place all the dependency source code directories, along with the Pygame SVN trunk directory, in the directory. All build steps will be done from the Pygame trunk directory, where the necessary scripts are located.
Note that FLAC or ogg-vorbis audio support is not necessary for Pygame to function. The relate libraries can be omitted from the SDL_mixer build by using the msys_build_deps.py exclude option -e.
Add the DirectX headers in the tar.gz include director to the MinGW include directory. These are for the older DirectX 5 and do not conflict with those included with the win32api. Also NASM can go with the MinGW binaries.
Compiling python extensions at the MinGW Wiki. (Note 05/20/2010: MinGW Wiki has moved to here. Compiling Python Extensions has been moved to the FAQ, see topic Other: How do I create Python Extensions. At the top of the FAQ page there is a link to the old wiki, which has also changed addresses.) |
Cardiovascular death in rheumatoid arthritis: a population-based study.
To determine whether systemic inflammation confers any additional risk for cardiovascular death among patients with rheumatoid arthritis (RA), after adjusting for traditional cardiovascular risk factors and comorbidities. Using the population-based data resources of the Rochester Epidemiology Project, we assembled an incidence cohort of all Rochester, Minnesota residents ages >or=18 years who first fulfilled the American College of Rheumatology 1987 criteria for RA between January 1, 1955 and January 1, 1995. All subjects were followed up longitudinally through their complete (inpatient, outpatient) medical records, beginning at age 18 years and continuing until death, migration, or January 1, 2001. Detailed information on the occurrence of various cardiovascular risk factors (personal history of coronary heart disease [CHD], congestive heart failure, smoking, hypertension, dyslipidemia, body mass index [BMI], diabetes mellitus, menopausal status) as well as indicators of systemic inflammation and RA disease severity (rheumatoid factor [RF] seropositivity, erythrocyte sedimentation rate [ESR], joint swelling, radiographic changes, RA nodules, RA complications, RA treatments, disease duration) and comorbidities were collected on all subjects. Causes of death were ascertained from death certificates and medical records. Cox regression models were used to estimate the independent predictors of cardiovascular death. This inception cohort comprised a total of 603 RA patients whose mean age was 58 years, of whom 73% were women. During a mean followup of 15 years, 354 patients died and cardiovascular disease was the primary cause of death in 176 patients. Personal history of CHD, smoking, hypertension, low BMI, and diabetes mellitus, as well as comorbidities, including peripheral vascular disease, cerebrovascular disease, chronic pulmonary disease, dementia, ulcers, malignancies, renal disease, liver disease, and history of alcoholism, were all significant risk factors for cardiovascular death (P < 0.01 for each). Multivariable Cox regression analyses, controlled for cardiovascular risk factors and comorbidities, revealed that the risk of cardiovascular death was significantly higher among RA patients with at least 3 ESR values of >or=60 mm/hour (hazard ratio [HR] 2.03, 95% confidence interval [95% CI] 1.45-2.83), RA vasculitis (HR 2.41, 95% CI 1.00-5.81), and RA lung disease (HR 2.32, 95% CI 1.11-4.84). These results indicate that markers of systemic inflammation confer a statistically significant additional risk for cardiovascular death among patients with RA, even after controlling for traditional cardiovascular risk factors and comorbidities. |
Q:
sorting with a list in elasticsearch
I have a query where I ask elasticsearch for a list of records based on a list of ids. e.g.
match: ids: [1,2,3]
Would it be possible to tell elasticsearch to return the elements to me in that order? My list of ids will be in the hundreds and I'm paginating the elements in chunks of 25.
It would be great if I could so something like
{match: ids [1,2,3]
sort: ids [3,1,2}
Any suggestions would be very helpful. Thanks!
A:
If possible use Multi Get:
POST /orderbyids/_mget
{
"ids" : [12, 80, 44, 50]
}
An alternative is to use dynamic scripting:
POST /orderbyids/_search
{
"query": {
"function_score": {
"query": {
"ids": {
"values": [
50,
80,
44,
12
]
}
},
"script_score": {
"params": {
"ids": [
12,
80,
44,
50
]
},
"script": "return -ids.indexOf(doc['id'].value.intValue());"
}
}
}
}
The functionality have been discussed in a closed issue.
|
[Basal-like carcinoma of the breast--the actual review and clinico-pathological corelations].
Comprehensive review of current topic called basal-like carcinoma of the breast, focused on morphology, molecular biology and clinico-pathological aspects concerning biology, prognosis and rational therapy. Review article. Biopsy Lab s.r.o. and Sikl's Department of Pathology, Charles University and Faculty Hospital, Pilsen. Summarized are recent data, diagnostic principals and clinico-pathological recommendations of basal-like carcinoma and outlined is comprehensive guide for daily diagnostic and therapeutic practice. Basal-like carcinoma of the breast is a subset of tripple negative lesions (ER-/PR-/Her2-) and accounts for approximately 5-7% all ductal carcinomas. This is a highly aggressive tumor characterized by rapid systemic dissemination, especially to the lung and brain. By definition, there is expression of high molecular weight cytokeratins and in up to 50% of cases alteration of EGFR gene is found, which creates potential for targeted therapy with tyrosin kinase inhibitors. Basic morphology derives from medullary carcinoma with sharp margin from adjacent parenchyma and presents archetype of BRCA1 mutated familial cancer. Existence of the rare noninvasive in situ phase of the basal-like carcinoma having similar phenotype enables both early and reliable diagnosis even from small core biopsy specimens. Correct diagnosis of this relentless tumor not only brings the chance for effective monitoring specific organs apt to potential metastasis but also challenges for implementation of alternative therapeutic approach, because standard protocols usually fail. |
My name is Maggie!
I
found a new home!Plenty of my friends are looking
for one too. Find a pet to adopt.
Find a pet to adopt
Dogs
Cats
Zip / Postal
Zip / Postal
Maggie's Info...
I am already spayed, good with kids, good with dogs, and good with cats.
Maggie's Story...
Maggie came to us from a hoarding situation along with 12 other dogs. She is a tiny girl and very shy but she has a ton of potential. Maggie will make a great family dog. She also gets along well with other dogs.
Maggie will be spayed and vaccinated before her adoption. If you are interested in adopting her, please contact us at 918-696-5867.
Facts about Maggie
Breed: Chihuahua/Miniature Pinscher Mix
Color: Unknown
Age: Young
Size: Small 25 lbs (11 kg) or less
Sex: Female
ID#: D1380
Other Pets at Paws and Hooves Rescue Foundation
Why Adoption is a Great Option
Maggie, a Stilwell Chihuahua/Miniature Pinscher dog was adopted! Here's how you can benefit by looking at adoption as an option to buying a Chihuahua/Miniature Pinscher for sale in Stilwell, or seeking a Chihuahua/Miniature Pinscher dog from a breeder in Stilwell.
Rescues and shelter volunteers in Stilwell already know the personality and tendencies
of their pets. This means they can match you with the right pet. That will makes it
much easier transition to owning a pet for yourself and your new pet.
On average adoption fees are much less than you'd pay a Stilwell breeder,
or pet store. Plus most often rescue pets have already been to the veterinarian for
a check-up, had a round of vaccinations, and are spayed or neutered. That is a lot of
savings!
You will become a hero, and give a needy dog or cat a loving home.
In fact, there are even Chihuahua/Miniature Pinscher breeders who
help with Chihuahua/Miniature Pinscher rescue. One puppy or kitten
adopted in Stilwell paves the way for another one to be saved. |
Goku is back, now married and has a son, Gohan, but just when things were calm and settled a new threat comes which creates adventures and uncover the truth about Goku's origins as a Saiyan, a near to extinct race. Facing enemies far more powerful then before Goku needs to train harder and reach limits he never even dreamed of since what is at stake is the World itself. |
Nike Kyrie 4 Launching for NCAA March Madness
As you can see this Nike Kyrie 4 features a predominate White upper while a marble multicolor outsole is used. In addition we have textile overlays, iridescent Nike Swoosh logo and a Black speckled midsole. Completing the look is 3M Reflective detailing on the tongue tab.
Nike Kyrie 4 NCAA March Madness Release Date
The Nike Kyrie 4 March Madness is scheduled to release at select Nike Basketball retailers including online at Nike.com on March 22nd. Retail price is set at $120. Continue to scroll below to check out more images which will provide you with a detailed look. |
[A case report of long-term survival of advanced gastric cancer (P1CY1) after gastrectomy].
A-57-year-old male was performed a total gastrectomy (f-T3N2H0P1CY1M0, Stage IV) for gastric cancer in 2004. We kept performing chemotherapies until the seventh-line, and the patient at last had a long-term survival of 46 months after surgery. If we recognized a tumor that had a tendency to be progressive, the long-term survival may be obtained by changing a regimen as early as possible. |
Flexible films, particularly those made of comparatively inexpensive polymeric materials, have been widely employed for the protection and preservation and containment of various items and materials. Additionally, web materials having modified properties to provide a desired resistive force to an applied elongation force on the web are generally known. Such web materials are described in U.S. Pat. Nos. 5,518,801; 6,394,651; and 6,394,652.
The term “flexible” is utilized herein to refer to materials that are capable of being flexed or bent especially repeatedly such that they are pliant and yieldable in response to externally applied forces. Accordingly, “flexible” is substantially opposite in meaning to terms “inflexible,” “rigid,” or “unyielding.” Materials and structures that are flexible therefore may be altered in shape and structure to accommodate external forces and to conform to the shape of objects brought into contact with them without losing their integrity. Flexible films of the type commonly available are typically formed from materials having consistent physical properties throughout the film structure, such as stretch, tensile, and/or elongation properties.
Flexible film webs that have deformations formed in them are known. A known method for forming such films is by passing a continuous web between a pair of matched forming rollers to form an intentional pattern of deformations on the film. Illustrative of the state of the art with regard to such continuous webs and film materials having intentional patterns of deformations formed therein are described in U.S. Pat. Nos. 5,554,093; 5,575,747; 5,723,087; and 6,394,652. Accordingly, an object of the present invention is to provide web materials that exhibit differential elastic-like behavior in the direction of applied elongation without the use of added materials. As used herein, the term “elastic-like” describes the behavior of web materials that, when subjected to an applied elongation, the web materials extend in the direction of applied elongation. When the applied elongation is released, the web materials return to a substantial degree to their untensioned condition. While such web materials exhibiting an elastic-like behavior have a wide range of utility (for example, durable articles of apparel, disposable articles of apparel, covering materials such as upholstery, wrapping materials for complex shapes, and the like), they are particularly well suited for use as top sheets, back sheets, absorbent cores, and absorbent articles and for materials suitable for the containment of matter. |
The people of the Tenderloin finally have a place for French-cut pork chops, organic cantaloupe and caviar.
On Thursday, event planner Stanlee Gatti and business partner Bill Grzywacz opened Meraki Market in a Craftsman-style brick building they refurbished on Post Street. The deli-market offers the neighborhood a mixture of fresh produce, meat, fish and flowers, cheeses, prepared meals, paper-and-twine wrapped egg salad sandwiches, and pantry items like June Taylor jams and tomato sauces from Gattonelli Farm in Mendocino County. Wines come from local makers like Scribe and Robert Sinskey.
Chef Mouhssine Benhamacht and staff, who work in basement kitchen full of gleaming appliances, make many foods in-house, including meatballs, fried chicken, stocks, hummus and guacamole. The prices are mostly similar to what you’d find in other high-end stores, though a few, like a fried snapper sandwich for $16, are higher than you might expect.
Gatti has promised to bring in guests like Charles Phan, Alice Waters and other members of the celebrity chef universe he frequents as San Francisco’s most prominent party designer.
With a suited security guard posted outside, the market is part of the slow-and-steady gentrification happening in the neighborhood, where food shopping needs previously could only be met at corner stores, produce markets and Vietnamese grocers, along with a few supermarkets on the periphery of the district.
That issue prompted on commenter on Facebook to say: “We don't need a high-end market in the Tenderloin.” Another had the opposite perspective, saying “Welcome to the TL, Meraki Market!”
Gatti lived in the Tenderloin when he moved to the city 1978, so he’s seen it evolve longer than some. The next question is whether his little market will play a role in pushing the TL even farther away than where it was when he first got here.
Meraki Market, 927 Post St. (between Larkin and Hyde), San Francisco. Open 8 a.m. to 7 p.m. daily. |
Differentially expressed genes implicated in embryo abortion of mango identified by suppression subtractive hybridization.
Embryo abortion in mango severely damages mango production worldwide. The mechanisms by which the mango embryos abort have long been an intriguing question. We used subtractive suppression hybridization to investigate the differentially expressed genes involved in this process. We generated 2 cDNA libraries from normal seed and aborted seed embryos of mango cultivar 'Jinhuang'. One thousand five hundred and seventy-two high-quality expressed sequence tags (ESTs) were obtained, with 1092 from the normal seed tester library and 480 from the aborted seed tester library. These ESTs were assembled into 783 unigenes, including 147 contigs and 636 singletons in contigs; 297 singletons in gene ontology (GO) indicated coverage of a broad range of GO categories. Seven candidate genes from different categories were selected for semi-quantitative PCR analysis, and their possible functions in embryo abortion are discussed. These data provide new insight into the genetic regulation of embryo abortion in mango and may aid in further identification of novel genes and their functions. |
Mercurophilic interaction in novel polynuclear Hg(II)-2-aminoethanethiolates.
The reaction of 2-aminoethanethiol hydrochloride with Hg(2)Cl(2) in water yielded elemental mercury and one-dimensional polynuclear compounds [{Hg(3)Cl(5)(SCH(2)CH(2)NH(3))(3)}Cl](n) and [HgCl(SCH(2)CH(2)NH(2))(H(2)O)(2)](n) (2). The coordination environment around Hg in 1 and 2 is quite variable despite similar reaction conditions. The formation of a five-membered S/N chelate in 2 can be attributed to the use of base to produce a neutral ligand. Three independent types of Hg atoms, both three- and four-coordinate are observed in 1, whereas in 2, the Hg atom is tetracoordinate with S, N and Cl atoms in the primary coordination sphere. Despite distinct structural chemistry, the coordination environments in 1 and 2 are fairly similar with repeating units connected with bridged thiolate S atoms in addition to a terminal Cl attached to Hg. Intermolecular hydrogen-bonding involving amine protons, Cl and water molecules are responsible for a three-dimensional network in both 1 and 2. A short Hg...Hg distance of 3.564 A, indicates the presence of a mercurophilic interaction in 1. The compounds have been characterized by (1)H and (13)C NMR, UV-Vis, FT-IR, Raman, mass spectrometry, TGA and single X-ray crystallography. |
Golden nugget online casino spiele ohne anmeldung - Einzahlung
The property offers a quiet harbor, has been cared for over the years and is ready for your personal touches. Dschungel-Schätze bergen King of the Jungle. Among its many features are a bedroom and bath on ground level, a gourmet kitchen with a five-burner counter top, a wine refrigerator,separate laundry room and a three car garage. Call June Kubli at It is fun, profitable and free to participate. Den Jackpot knacken Take 5. This spacious, light and bright three bedroom, two bath home is located on a lovely street in the highly desired and much sought after community of University City where you find summer concerts in the park and convenient support services; this unbeatable location is near beaches, major universities, hospitals, biotech industries and major freeways. Here is a link to the full property report: Having a real estate agent that is knowledgeable in the area will be your most valuable asset. This home is situated on a 10, square foot cul-de-sac lot and has a huge usable back yard overlooking a serene canyon. Casino-Spiele Jackpot - Spielend echte Preise gewinnen. Feel free to gather your neighbors and have a multi-family sale. Moda para Guatemala y El Salvador. Den Jackpot knacken Mah Jongg Welt: Search Our Website Can't find what you need? Ein Imperium errichten Connect: Stop in and let your imagination fly- perfect for those looking for sweat equity or a fun flip. Den Jackpot knacken Take 5. Knobeln auf der Farm 7 Slots: Das Glück herausfordern 7 Slots. It is fun, profitable and free to participate.
Ran an die Nuggets! In previous years over homes have participated in this gigantic event. Den Jackpot knacken Take 5. The private back yard with a lovely professionally designed garden is ready for you to enjoy. Located in the heart of University City it is a quick walk to award winning Curie Elementary School and just minutes to the library, grocery store, pharmacy, restaurants, parks and other services. Wie empfehlen unseren kostenlosen t-online. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.