text
stringlengths
8
5.77M
Top trips in Chile Exodus offer a wide range of adventure and activity holidays to Chile. Holidays to Chile and Easter Island are an exploration of the 'thin' country at the southern end of the world is one of the great rewards for the adventure traveller. Patagonia is a heady cocktail of lakes, peaks, deserts, glaciers a... Read more nd no shortage of wildlife. It is a feast of wild places and astonishing scenery tailor made for walking. The biggest icons are the lakelands, dominated by the great Pucon volcano, the Atacama desert (the driest in the world), the vineyards, Torres del Paine, Tierra del Fuego and the marine life of the south Pacific Ocean. The magnificent mountains are bordered by windswept grasslands, with millions of sheep tended by a few intrepid gauchos who live under the spine of the continent - the imperious Andes. Photogenic, breathtaking and a true wilderness, Chile seldom disappoints.... Show less Activity level What activity levels mean Mixed You may be a total beginner or an experienced cross-country skier. Many destinations offer different level weeks or multi-grade skiing on the same week. Choose from ‘Classic’ and ‘Skate’ style holidays, or even a ski marathon race for the ultimate winter challenge. See below for more grading details. Leisurely You are healthy, enjoy the outdoors and want a relaxing trip. No experience is required. Moderate You are reasonably fit, enjoy the outdoors and are looking for some exercise. Some previous experience is preferable for activity based trips. Challenging You are moderately fit and possess a spirit of adventure. Some previous experience is required for most activity based trips. Tough You are moderately fit and have an interest in remote or challenging environments. Some previous experience is required for activity based trips. Tough+ You have a good level of fitness and are looking for a physically challenging holiday. Previous experience is essential for activity based trips. Exodus activities in Chile Gift Cards You recently looked at From the social networks Exodus Travels New Horizons, Old Friends Did you know you can now book an Exodus adventure just for you and your friends? http://bit.ly/1BDCAQi #JointheEx... Make an Exodus itinerary your own by taking your own friend with you, and still get a dedicated leader for the duration of the trip. Private Adventures for You & Yours3 hours 51 min ago. Responsible travel We realise that every holiday destination is also someone else's home and that we should leave places as we found them. Find out more about how we incorporate responsible travel into our adventure and activity holidays, and how you can help by donating to one of our responsible travel projects.
Spodek Law Group Service Oriented Law Firm WE'RE A BOUTIQUE NYC CRIMINAL DEFENSE LAW FIRM. YOU WORK WITH ONE OF OUR SENIOR ATTORNEYS PERSONALLY. Over 50 Years Experience WE'RE ONE OF NEW YORK'S OLDEST CRIMINAL DEFENSE LAW FIRMS. TRUST 50 YEARS OF EXPERIENCE. Multiple Offices WE HAVE OFFICES ALL OVER NYC, AND LONG ISLAND. WE MAKE IT EASY TO MEET AND SPEAK TO AN ATTORNEY. Manhattan Domestic Violence Offense Sentencing Lawyers Domestic violence can be a broad category of different laws because it’s more of an umbrella term to cover a variety of crimes. Some of those crimes include stalking, rape, assault, disorderly conduct and harassment. If you have been charged with one of these crimes, you should hire a competent and experienced attorney as soon as possible. In a domestic violence case, it happens between two people who have a romantic relationship or live under the same house. When violence occurs, it falls under the category of domestic abuse. What’s the Punishment for Domestic Violence? The punishment will largely depend on the type of domestic abuse that has taken place. For example, an assault charge will usually mean that a person faces a penalty of up to seven years in prison for a class B felony. A first-degree domestic assault charge will be anywhere from five to 25 years in prison. It largely depends on the extent of the damage to the other person, and if the crime had happened before in the past. For anyone accused of domestic assault, they could be charged with a misdemeanor or a felony. The District Attorney will consider a variety of factors, and they will decide how to proceed with charging you. Regardless of how you get charged, the consequences will almost always be serious. In general, you can expect an average sentence of between three to four years of probation. You might also have to attend a 52-week batterer treatment program. In addition, you could have around 30 days in jail, and you’d face some community service. Different Degrees of Assault The penalties for assault will range depending on the degree. In New York, you have first-degree, second-degree and third-degree assault. First-degree assault happens when the aggressor attempts to cause serious bodily harm, or he does cause serious injury to the victim. Finally, it happens if the aggressor attacks the person with a deadly weapon. Second-degree assault, on the other hand, will have some of the same elements as what you have with first-degree assault. However, the aggressor will either act recklessly or he will cause injury, but it’s not as serious of an injury. In second-degree assault, the attacker doesn’t use a deadly weapon. With third-degree assault, you have a lot of the same things that you’d have with first degree. However, the injury isn’t as serious. What are the Other Charges of Domestic Violence? Some of the other charges of domestic violence don’t involve physical injury. Nevertheless, you have the threat of physical injury. For example, the aggressor stalks the victim or acts menacing toward them. This will normally occur whenever an aggressor has repeatedly and intentionally tried to harass someone else. They might, for example, follow the person into public areas. They might also have a reasonable reason to feel fear of a physical injury because perhaps the aggressor has attacked them in the past. The Unseen Consequences Someone who has been charged with domestic violence will have a variety of unforeseen consequences. For example, domestic violence will go on the permanent record, and it could affect state licensing, employment and other benefits you want to receive. In addition, let’s say you were divorcing your husband or wife. If you have a prospective divorce court case that involves child custody, it will almost always be looked on negatively if you were accused of domestic violence. It could have a huge negative impact on your rights over who sees the child. If you’re having trouble with a domestic violence case, perhaps we can help. We are Spodek Law Group, and we can help you to win in your domestic abuse case. We have an insider’s knowledge of how to handle these cases, and you can have the charge dismissed or lowered when you have the right lawyer to fight for you. How the lawyer presents the evidence for your case will have a major impact on whether the ruling is favorable or not. Another danger of being the accused of domestic violence is how you can be punished numerous times in a couple different courts. You don’t want an unfavorable judgment and Spodek Law Group has the ability to help you take advantage of what’s available to you. Request Free Consultation Videos Newspaper articles Recent Case Results DUI (.03) Testimonial Very diligent, organized associates; got my case dismissed. Hard working divorce attorneys who can put up with your anxiousness. Definitely A law group that lays out all possible options and best alternative routes. Recommended for sure.
Hands-on startup advice for emerging entrepreneurs A version of this article previously appeared in Forbes. Sometimes being clueless makes you fearless. This was certainly the case with Hollywood star turned inventor, Hedy Lamarr. In 1937, Ms. Lamarr abandoned a successful European film career to become a Hollywood star. Although successful, she quickly became bored with the vapid nature of stardom, once saying, “Any girl can be glamorous. All she has to do is stand still and look stupid.” Unsatisfied with the intellectual limitations of Hollywood, Ms. Lamarr collaborated with an unlikely partner and together they created a fundamental invention which helped secure their lives of hundreds of thousands of servicemen and women. More significantly, their innovation subsequently became the basis one of the most significant products of the past century. A version of this article previously appeared in Forbes. There are two schools of thought regarding how to make anything go viral. In The Tipping Point, Malcolm Gladwell emphasizes the importance of the messenger. In contrast, Jonah Berger’s Contagious: Why Things Catch On proclaims that a properly structured message makes the messenger inconsequential. Which approach is correct? As with most business strategies which migrate from the classroom to the real world, the “correct approach” involves combining the appropriate elements from multiple theories and applying them to your specific situation. A version of this article previously appeared in Forbes. The Beatles’ Manager, Brian Epstein, was a 30-yr old, former furniture salesman when Beatlemania hit America in 1964. When he was approached by savvy Nicky Byrne to license the Beatles’ name and likeness for various novelty products and toys, he firmly stated that he would not accept a penny less than 10%. Nicky had a difficult time hiding his surprise, as the typical range for such licenses was between 30% to 50% of the product’s price. Mr. Byrne quickly signed dozens agreements with merchandisers that subsequently cost the Beatles approximately $100,000,000 in lost royalties. Mr. Epstein later re-negotiated the Beatles’ share to 45%, but by then, Beatlemania was on the wane and the financial damage had been done. A version of this article previously appeared in Forbes. In 1987, a representative of Michael Jackson approached the modest Sycamore Valley ranch house and knocked on the door. The owner of the ranch was shocked by the visitor’s message. He told the homeowner that he represented someone who wanted to purchase the ranch at a substantial premium over its current fair market value. He also indicated that the offer was non-negotiable and the home owner had to respond either “Yes” or “No” in a matter of hours. Although this is a somewhat unusual real estate transaction, it reflects a surprisingly common scenario in the business world of mergers and acquisitions, with one important distinction. A version of this article previously appeared in Forbes. When you can live where you want to live and make money doing what you love to do, you are, by my definition, a screaming success. Six outstanding entrepreneurs have created this sweet flavor of success in one of the most beautiful places on earth – Santa Barbara, California. Santa Barbara has become a high-tech startup mecca, rivaling cities many times its size. The latest evidence of the city’s dynamic startup ecosystem is the recent announcement by Citrix to investment significant resources in the Santa Barbara Innovator’s Program. The community is blessed with a temperate climate (average high temperatures between the mid-60's and mid-70's °F), which motivates accomplished people, who can afford to live anywhere, to make Santa Barbara their home. Many of these individuals become restless in their youthful “retirement” and begin investing and advising young companies. Combine this significant pool of sophisticated Angel capital and expertise with UC Santa Barbara’s world-class entrepreneurial program and throw in a critical mass of entrepreneurs bold enough to build businesses around their passions, it’s understandable how a modest-sized community has produced so many successful tech startups. From Lynda.com’s recent $1.5 billion dollar acquisition by LinkedIn to Bessemer’s substantial investment in ProCore, AppFolio’s recent IPO filing and Sonos’ $130 million secondary, the Santa Barbara tech scene is unquestionably on fire. However, less obvious is Santa Barbara’s rich history as a hotbed of lifestyle startups, a number of which have generated billions in revenue and garnered worldwide recognition. A version of this article previously appeared in Forbes. Congress' latest attempt to impose an "Internet sales tax" is just another misguided tax grab that will do more harm than good to American small businesses. The Remote Transaction Parity Act (RTPA), introduced by Representative Jason Chaffetz (R-UT), purports to simplify sales tax collections while also leveling the playing field between brick and mortar businesses and online sellers. Noble goals, no doubt. Unfortunately, it accomplishes neither. A version of this article previously appeared in Forbes. Facebook recently joined Google and Twitter by offering a click-to-call functionality in its ads, giving consumers an option to call businesses directly, versus emailing them or completing an online form - effectively making the plain old phone one of the most powerful on/offline marketing tools of the coming decade. A version of this article previously appeared in Forbes. During my 15-years as a startup executive, I relished being proven wrong. Knowing that I was had made a mistake empowered me to make the correct decision. Being wrong is much preferred to erroneously thinking you are right and relentlessly executing a losing strategy. Effective entrepreneurs reject dogmatism and embrace doubt. A version of this article previously appeared in Forbes. With top-ranked accelerators Lauchpad LA closing its doors and Y Combinator rebranding itself as a seed fund, it seems fair to ask the question, “Are Accelerators Dead?” Good news: a quick review of TechCrunch’s March 2015 List of Top 20 U.S. Accelerators, which includes two LA-based accelerators in the Top Ten (Mucker Lab and Amplify LA), proves that the overall health of the Accelerator landscape is sound. A version of this article previously appeared in Forbes. It sounds crazy to offer unlimited vacation time to your startup employees. Something to the left of socialism. Yet that is exactly what Richard Branson announced this past Fall. According to Branson, “We should focus on what people get done, not on how many hours or days worked. Just as we don’t have a nine-to-five policy, we don’t need a vacation policy.”
Blog Month: May 2015 Dr Singh who runs his botox clinic in Stevenage, Hertfordshire, in his latest blog shares his thoughts on botox and the potential side effects. Botox® treatments are well tolerated and have very few side effects. Botox® injections are extremely safe when undertaken by an experienced and qualified partitioners. The most common side effects reports by individuals include some swelling or bruising around where the injection was applied, headaches or flu-like symptoms. If the Botox® injections are not applied correctly, the toxin may spread to surrounding tissues and causing the following problems: There have also been a number of other side effects that can potentially occur, such as: Mild injection discomfort Swelling around the injection or treatment area Numbness around the injection area Headache Malaise – general feeling of uneasiness or ‘being of sorts’ Mild nausea Temporary upper lid or brow ptosis Weakness of the lower eyelid Neck weakness or stiffness Diplopi – known as double vision Bleeding in the area where the injection was administered Blurred vision Drooping of the eyelids Decreased eyesight Dry mouth Fatigue Rashes Wheezing or difficulty breathing As always, if you are worried please call your botox practitioner immediately. For more information about botox hertfordshire, please call us on 01438 300111. Dr Singh who runs his botox clinic in Stevenage, Hertfordshire, in his latest blog shares his thoughts on botox in the lower third of the face. Corners of the mouth Some patients have a reverse smile where the corners of the mouth are going downwards. This is the result of an over active Depressor Anguli Oris (DAO) which is responsible for lowering the corners of the lips and subsequently Marionette lines. The DAO is a triangularly shaped muscle. The easiest way to locate this muscle is to get the patient to do a sad face and you will see the muscle contracting just above the jaw line. It can also normally be found by drawing a line from the corner of the nose down to the corner of the mouth and continue this line just above the jaw. I inject 10 botox units per side, perpendicular to the muscle and superficially. Complications can occur if you inject too medially. The toxin can potentially diffuse into the Depressor labii inferiors and cause a protrusion of the lower lip, known as a Gomer Pyle appearance. if you inject too laterally, the toxin can diffuse into the Buccinator, causing the patient to bite and traumatise the buccal mucosa. Gummy smile This is the result of an over active Levator Labii Superioris Alaeque nasi (LLSAN) muscle. By administration toxin into the LLSAN you can lengthen the upper lip. You are looking to inject in the naso facial groove which is adjacent to the Ala. I inject at 45 degrees, deep and 5 botox units per side. It is worth being in mind Rubin’s 3 classifications of smile patterns: Mona Lisa smile – dominated by the Zygomaticus Major which elevates the oral commissures as the highest point of the smile. Do not treat with botox as this will exaggerate the Mona Lisa smile pattern. Canine smile pattern – dominated by the Levator Labii Superioris where the highest part of the smile is the central upper lip. Gummy smile – excessive display of the upper gingival when smiling I will sit the patient down and will get them to look at a mirror at eye level. then i will push the upper lip down by 3/4mm to show then the expected result and if agreeable, then will carry out the procedure. Masseter Over activity of this muscle can cause a square jaw look and potentially bruxism. I would get my patient to clench their teeth and observe where the bulk of the muscle contracting and bulging. I normally give 3 injection sites per side and would start of with 15 botox units per injection site and then review in 2 weeks for any top ups. Over dosing can reduce their biting force. I would inject deep into the belly of the muscle at 30 degrees to the muscle. Chin The Mentalis is responsible for pushing out the lower lip and contributes to chin wrinkles, also known as ‘orange peel’. This appearance is more common amongst gummy smilers and in anterior open bites. Even though the Mentalis is a pair of muscles, my preferred injection technique is for one injection site in the midline, very deep at 90 degrees. I would normally inject 10 botoxunits. Neck Contraction of the Platysma can lead to bands and premature ageing of the neck region. Toxin is rarely used in isolation in this area and normally treatments to improve the skin complexion such as mesotherapy will yield the optimal results for the patient. Ask the patient to contract their neck via clenching their teeth and then mark along the bands. I would normally inject between 4/5 sites per band and 10 botox units per site very superficially whilst the non injecting hand is pulling out and squeezing the band. In conclusion,I would rather under dose and get the patient back for any necessary top ups than be over optimistic on the first visit and over dose causing complications. By baby stepping in the lower third of the face you will greatly reduce the risks and have a happier patient and less sleepless nights. Dr Singh who runs his botox clinic in Stevenage, Hertfordshire, in his latest blog shares his thoughts on botox and the eyes. Botox® can be used to treat the lines around the eyes which appear when you smile. These lines are either known as smile lines or Crows feet. Before we use botox injections to treat these smile lines, we must first assess what type of smile you are. There are broadly speaking two types of smilers. The first type use their eyes to smile and they will have lines that are high up in the upper third of the eyes. The second type are cheek smilers and they will have smile lines in the lower third of the eyes and across their cheeks. You maybe asking so what, what difference does this make. With eye smilers and the lines high up, we can be confident of either reducing or eliminating these lines with our botox treatments. However the cheek smilers we need to be much more careful when treating with botox. We do not want to over freeze with botox in the border area of the eyes and cheeks. If we over freeze with botox in this area, when the patient tries to smile, the cheek will resist and cause unwanted lines across the cheek or even scrunching of the skin under the eyes in addition to varying the dose with botox when injecting lower down, we must also inject away from the eye at least 1cm away. Botox® can spread up to 1cm, so we want to avoid the delicate and important structures within the orbital rim. Botox® can work very well in treating unwanted lines around the eyes, but a detailed assessment of the patient is mandatory before any botox treatments is started. For more information about botox hertfordshire, please call us on 01438 300111. The majority of patients seeking treatment for fine lines and wrinkles will be mainly concerned initially with the upper third of the face, notably the forehead, frown and eye areas. In my experience once they have experienced your clinical and patient skills they will seek additional areas to be corrected with Botulinum Toxin A. In this article I will look at the areas we can treat in the lower third of the face. Before we look at specific areas, I need to draw your attention to the slightly different approach we have for treating the lower third of the face compared to the upper third. In the upper third of the face the muscles are large and generally independent of each other, therefore we are not overly concerned with the spread and diffusion of the toxin. However, in the lower third of the face, the muscles are generally much smaller and in close proximity to a number of other muscles. Therefore we need to be wary of the diffusion and spread of our toxin much more. I practice the technique of baby stepping when treating the lower third with toxin. I would rather they come back fro a review appointment and administer any top ups than over dose and cause unwanted side effects in neighbouring muscles. * When discussing specific units, I will be referring to Azzalure® and Speywood units in the following examples. Bunny Lines Not technically in the lower third of the face, but I thought it would be advantageous to talk about this area. These lines appear on the side of the nose when the patient scrunches their nose. The lines are the result of the contraction of the naslis muscles. I would normally inject 10 Speywood units on each side at a superficial level no more than 4mm depth maximum. you don’t want to go to deep since you will hit bone and this will be painful to the patient. You would inject where the biggest mass of muscle is. Smokers lines These are vertical rhytides that occur in the upper lip and lower lip region. These lines occur from the contraction of the Oribcularis Oris. This is a circular muscle around the lower and upper lip. It is responsible for the closure of the lip and pushing the lips forward (puckering/pouting). it is common, but not limited to smokers. There are 3 ways to treat these lines: toxin only dermal fillers only combination of both My criteria for treating with toxin only is if the lines are superficial, worsen when the patient pouts their lips and the patient does not want any fillers to increase the size of their lips. I do warn these patients that we cannot guarantee to eliminate the lines. The toxin is placed very superficially and I would place as a starting point no more than 5 Speywood units per injection site. I avoid the philtrum area and inject close the the vermillion border. I warn the patient that they may feel numb and find it hard to whistle or say certain letters for a couple of days post procedure. Dermal filers would be used in isolation if the patients main concerns are the lack of volume in the lips, lack of definition of the vermillion border and they do not want any toxin placed. If the lines are very deep and do not worsen when they pout their lips, then I would sue a combination of toxin and dermal fillers. The toxin will help relax the muscle and the dermal filler will increase the volume of the lips/borders to help stretch the skin and reduce the appearance of these lines. I always tell my patients that we cannot guarantee to eliminate the smokers lines and they may need additional treatments such as laser skin resurfacing. For more information about botox hertfordshire please click the link or call us on 01438 300111
Hey all. Sorry I've been gone for a while. I've kept up a little by lurking but haven't taken the time to log on. One of the reasons I've been so busy, besides work, is that I've gotten engaged. My boyfriend proposed at Disney World in a hugely romantic way. So now I have a wedding to plan and that is going to keep me quite busy for a while longer. We are thinking the date will be some time in the first 3 months of 2013. We have to talk to the church, go through our pre wedding classes/counseling, and see if our reception venue is available that night. Then I can announce the actual date. ......... My boyfriend proposed at Disney World in a hugely romantic way...... ~Amy Do tell! I love stories like these. Probaly because my story sucks! We were in Mexico in a pool. I thought he was joking when he asked (we had been horseplaying in the pool). And I splashed water in his face. I never had a clue that he was serious until two years later. His parents asked when we planned to get married and he said, "I have already asked her once and she splashed water on my face. I'm not asking her again." I was like . I had a conference at Disney that I was able to attend and had him go as well so we could make a vacation out of it as well. He had already picked the ring and didn't want me to ruin the surprise by seeing it so he had it shipped to the hotel where we were staying. Then he tied the ring inside his shorts every day just waiting for the right moment. It's amazing that he didn't lose it. We got there Tuesday morning early. He didn't propose until Sunday night. On Sunday we watched the last parade, the castle lights show, and the fireworks. Then we wanted to stay for the extra magic hours. He rode another ride and then we walked over towards TomorrowLand. As we walked past the castle and the rose garden we noticed that a photopass lady was still taking pictures. We decided to go ahead and take the moment to get a picture of us with the castle lit up behind us. As we stood in line he started complaining about a rock in his shoe. When it was our turn he told me he wanted the lady to take a picture of us with his phone as well so I went and stood in the right spot while he was showing her his phone. When he came over to stand with me he said that the rock was really bothering him and he needed to get it out right then. After a few seconds the photographer said, "okay." I thought she was getting irritated at him for taking up her time by messing with his shoe so I started to tell him to leave it and just take the picture. When I looked down he had the ring out and asked me to marry him. I was super shocked and she got that moment and the look on my face on film. That was what he was going for. He wanted that surprise proposal and my face captured. So it was very sweet and we have it all on film. He had apparently been plotting this the whole time including the rock in his shoe story. I had a conference at Disney that I was able to attend and had him go as well so we could make a vacation out of it as well. He had already picked the ring and didn't want me to ruin the surprise by seeing it so he had it shipped to the hotel where we were staying. Then he tied the ring inside his shorts every day just waiting for the right moment. It's amazing that he didn't lose it. We got there Tuesday morning early. He didn't propose until Sunday night. On Sunday we watched the last parade, the castle lights show, and the fireworks. Then we wanted to stay for the extra magic hours. He rode another ride and then we walked over towards TomorrowLand. As we walked past the castle and the rose garden we noticed that a photopass lady was still taking pictures. We decided to go ahead and take the moment to get a picture of us with the castle lit up behind us. As we stood in line he started complaining about a rock in his shoe. When it was our turn he told me he wanted the lady to take a picture of us with his phone as well so I went and stood in the right spot while he was showing her his phone. When he came over to stand with me he said that the rock was really bothering him and he needed to get it out right then. After a few seconds the photographer said, "okay." I thought she was getting irritated at him for taking up her time by messing with his shoe so I started to tell him to leave it and just take the picture. When I looked down he had the ring out and asked me to marry him. I was super shocked and she got that moment and the look on my face on film. That was what he was going for. He wanted that surprise proposal and my face captured. So it was very sweet and we have it all on film. He had apparently been plotting this the whole time including the rock in his shoe story.
The Simple Xray Mod 1.12 is a very useful mod that players can use to look through different resources in Minecraft world. Simple Xray Mod is probably the most powerful tools because it will add X-Ray vision which allows you to find ores with simple now. How to install: Use the official launcher to download and start once Minecraft 1.7.9. Go to the minecraft base folder (the official launchers shows it when you click “Edit Profile” as “Game Directory”) Go in subfolder “Versions” Rename the folder “1.7.9? to “1.7.9_extra” Go in the subfolder “1.7.9_extra” Rename “1.7.9.jar” to “1.7.9_extra.jar” Rename “1.7.9.json” to “1.7.9_extra.json” Open the file “1.7.9_extra.json” with a text editor and replace “id”:”1.7.9? with”id”:”1.7.9_extra” and save the file Copy the files from the Xray Mod zip file in “1.7.9_extra.jar” as usual and remove the META-INF folder from “1.7.9_extra”. Start the official launcher Click “Edit Profile” Select “Use version:” -> “release 1.7.9_extra” Click “Save Profile” Click “Play” or “Login” to start the game. If only “Play Offline” is available, then log out and log in again to fix it.
In a parts mounting process for mounting electronic parts on a substrate, the substrate is positioned and held while its downside is supported by a downside receiving section. A lower supporting pin method for supporting a downside of a substrate while a plurality of lower supporting pins remain in contact with the downside has widely been used as the method for receiving a downside of a substrate. Under the lower supporting pin method, when parts have already been mounted on a downside of a substrate in a preceding process, the lower supporting pins must be positioned by selecting locations where the lower supporting pins can receive the downside without interfering with the positions of the already-existing parts. After completion of work for positioning pins, a check is performed as to whether or not the lower supporting pins are actually positioned at the thus-selected correct locations. A method known as the method for checking the positions of the lower supporting pins is for recognizing leading ends, which remain in contact with the substrate, with a camera, thereby detecting positions of the lower supporting pins (see; for instance, Patent Document 1).
/* bender-tags: editor,panel */ /* bender-ckeditor-plugins: pagebreak,toolbar,clipboard,panel */ ( function() { 'use strict'; bender.editor = { creator: 'replace' }; function createBlock() { var parent = new CKEDITOR.dom.element( 'div' ); CKEDITOR.document.getBody().append( parent ); var block = new CKEDITOR.ui.panel.block( parent, { attributes: {} } ); for ( var i = 0; i < 4; i++ ) { var item = new CKEDITOR.dom.element( 'p' ); var link = new CKEDITOR.dom.element( 'a' ); item.append( link ); block.element.append( item ); } block.show(); return block; } bender.test( { 'test mark first panel block item': function() { var block = createBlock(), timeout = CKEDITOR.tools.setTimeout; block.onMark = sinon.spy(); CKEDITOR.tools.setTimeout = function( callback ) { callback(); }; block._.markFirstDisplayed(); CKEDITOR.tools.setTimeout = timeout; assert.isTrue( block.onMark.calledWith( block.element.getElementsByTag( 'a' ).getItem( 0 ) ) ); }, 'test mark first displayed panel block item': function() { var block = createBlock(), timeout = CKEDITOR.tools.setTimeout; block.onMark = sinon.spy(); block.element.getElementsByTag( 'p' ).getItem( 0 ).setStyle( 'display', 'none' ); CKEDITOR.tools.setTimeout = function( callback ) { callback(); }; block._.markFirstDisplayed(); CKEDITOR.tools.setTimeout = timeout; assert.isTrue( block.onMark.calledWith( block.element.getElementsByTag( 'a' ).getItem( 1 ) ) ); }, 'test mark first displayed item with aria-selected': function() { var block = createBlock(), itemIndex = 2, timeout = CKEDITOR.tools.setTimeout; block.onMark = sinon.spy(); block.element.getElementsByTag( 'a' ).getItem( itemIndex ).setAttribute( 'aria-selected', true ); CKEDITOR.tools.setTimeout = function( callback ) { callback(); }; block._.markFirstDisplayed(); CKEDITOR.tools.setTimeout = timeout; assert.isTrue( block.onMark.calledWith( block.element.getElementsByTag( 'a' ).getItem( itemIndex ) ) ); } } ); } )();
Now you can create your signature style wherever you are, thanks to our On The Go Compact Dryer, your perfect travelling companion. Our specially designed compact hair dryer comes with a foldable handle and compact diffuser, making it ideal for slipping into any bag, whether it’s for the gym or a hotel. And with two heat settings delivering a powerful 2000W, you can count on it to create a beautiful look every time, any time.
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.beam.sdk.io.aws2.kinesis; import java.util.NoSuchElementException; import java.util.Objects; import org.checkerframework.checker.nullness.qual.Nullable; /** * Similar to Guava {@code Optional}, but throws {@link NoSuchElementException} for missing element. */ abstract class CustomOptional<T> { @SuppressWarnings("unchecked") public static <T> CustomOptional<T> absent() { return (Absent<T>) Absent.INSTANCE; } public static <T> CustomOptional<T> of(T v) { return new Present<>(v); } public abstract boolean isPresent(); public abstract T get(); private static class Present<T> extends CustomOptional<T> { private final T value; private Present(T value) { this.value = value; } @Override public boolean isPresent() { return true; } @Override public T get() { return value; } @Override public boolean equals(@Nullable Object o) { if (!(o instanceof Present)) { return false; } Present<?> present = (Present<?>) o; return Objects.equals(value, present.value); } @Override public int hashCode() { return Objects.hash(value); } } private static class Absent<T> extends CustomOptional<T> { private static final Absent<Object> INSTANCE = new Absent<>(); private Absent() {} @Override public boolean isPresent() { return false; } @Override public T get() { throw new NoSuchElementException(); } @Override public boolean equals(@Nullable Object o) { return o instanceof Absent; } @Override public int hashCode() { return 0; } } }
###### Strengths and limitations of this study - This study includes a large number of participants and a nice participation rate (91%). There is very little missing data (\<1%). - Conditions were met to show an effect if it would exist: the minimal detectable OR was estimated to be 1.2. ```{=html} <!-- --> ``` - Comprehensive information on potential previous homes of children included in the study was not available. In particular, we do not know if they were born in a contaminated territory or not. - Some factors that may play a role in the occurrence of a cardiac arrhythmia have not been considered, such as hypertension, genetic factors and consumption of tobacco, alcohol or drugs. - ECGs and echocardiography examinations were performed only once on each child. Introduction {#s1} ============ On 26 April 1986, the worst industrial accident that released worldwide man-made environmental ionising radiation occurred at the Reactor Number 4 of the Chernobyl nuclear power plant in the former Soviet Union. The radioactive fallout that spread mainly over northern Ukraine, southwestern Russia and Belarus as a result of the tragedy reached a total of about 13.10^18^ Becquerel (Bq). It heavily exposed a large population of about 5 million individuals at the time of the accident, including around 1.2 million children and adolescents, to a mixture of radionuclides among which iodine-131 and caesium-137 (^137^Cs) are the most significant for the dose received by the affected people.[@R1] Apart from Chernobyl cohorts, the health effects of acute and protracted exposures to environmental radiation as a result of a nuclear event have been and are being widely studied, mainly in the Japanese survivors of the Hiroshima and Nagasaki bombings, and since March 2011 in the population exposed to the releases from the Fukushima Dai-chi nuclear power plant. Depending on the type of radiation exposure, dose rate and study population, short-term and long-term health risks of nuclear power plant accidents may include acute radiation syndrome, elevated rate of leukaemia and solid cancers, cataracts, circulatory diseases and increase in childhood thyroid cancers.[@R1] Besides these widely recognised radiation-induced pathologies, some authors claimed that exposed children may also exhibit various symptoms including chronic gastrointestinal pathology, gallbladder inflammation, chronic periodontitis, asthenia, apathy, tonsil hypertrophy, recurrent respiratory infections, endocrine disorders and cardiovascular symptoms, such as unstable blood pressure, sinus arrhythmia, repolarisation and conduction abnormalities.[@R11] However, these observations are still questionable as they are not based on significant statistical evidence and the causal link with an exposure to ionising radiation has not been demonstrated so far. Because the related publications have led to a recurrent debate and in the absence of well-designed studies, the Institut de Radioprotection et de Sûreté Nucléaire decided in 2005, together with the Russian Bryansk Diagnostic Center, to launch a research programme named 'EPICE' (acronym for 'Evaluation of Pathologies potentially Induced by CaEsium') aiming to explore the non-cancer effects exhibited in children living in Russian territories contaminated by the Chernobyl fallout versus control territories. This article presents the design and results of the first study that has been carried out in a group of about 18 000 Russian children to determine whether they suffer from cardiac arrhythmia and, if so, to confirm or refute the possible association with a chronic exposure to ^137^Cs, the major radionuclide to which the local population is still being exposed significantly more than 30 years after the Chernobyl catastrophe. Methods {#s2} ======= Study design {#s2a} ------------ This cross-sectional study using exposed/unexposed design was approved and validated by the Ethics Committee of the Russia's National Hematology Center in Moscow. It was conducted in the region of Bryansk from May 2009 to May 2013 on children aged 2--18 years. This study primarily intended to compare populations living in the least contaminated territories with those living in the most heavily contaminated territories. Children were selected on the basis of ^137^Cs soil deposition: according to two international entities, contaminated areas are defined *as those with ^137^Cs deposition levels \>37 kBq per square metre*.[@R15] Therefore, we have considered in our study control territories as territories with \[^137^Cs\]\<1 Ci (Curie) per square kilometre or 37 kBq per square metre (where children were considered as unexposed) and, contaminated territories as territories with \[^137^Cs\]\>15 Ci per square kilometre or 555 kBq per square metre (where children were considered as exposed). The flow chart presented in [figure 1](#F1){ref-type="fig"} illustrates the inclusion of the subjects. ![Flow chart of inclusion criteria. ^137^Cs, 137-caesium.](bmjopen-2017-019031f01){#F1} With regards to the control territories, the nine *raions* (a *raion* is a type of administrative unit of several post-Soviet states; the Bryansk region named 'Bryansk *oblast*' is divided into 27 *raions*) totally unpolluted with ^137^Cs were selected. Four were excluded due to the presence of polluting chemical plants and substantial differences especially related to diet. To reach the targeted number of participants, a sixth *raion* was selected randomly among 14 *raions* comprising control territories and territories with ^137^Cs soil deposition between 37 and 75 kBq per square metre. Children of this sixth *raion* came from unpolluted areas. Therefore, six *raions* (Zhukovsky, Kletnjansky, Dubrovsky, Rognedinsky, Zhiryatinsky and Bryansky) were found to be eligible for inclusion in the study. As of contaminated territories, the five *raions* were selected except one because of substantial population relocations (Novozybkovsky, Gordeevsky, Zlynkovsky and Krasnogorsky). Among eligible children 1794 did not accept to be surveyed because of various specific reasons (religious grounds, sport competition, fear of not being accepted in sport clubs or military institutions, refusal to undress, recent similar medical examination and ongoing medical care). Finally, out of 18 152 children examined, 455 children were excluded from the analysis because either they were suffering from a disease other than cardiac arrhythmia or from another disease leading to cardiac arrhythmia. Thus, the study included a total of 17 697 children. Procedures {#s2b} ---------- Data were collected by a Russian health professional team (interviewers, ultrasound practitioners, nurses, cardiologists and dosimetrists) who were on the field to meet children at schools where medical examinations were conducted. An informed consent was obtained from children or their parents. The participation in this study consisted first in completing a questionnaire and then undergoing several medical explorations. ### Questionnaire {#s2b1} Each study participant was assigned with a personal number notified in an administrative and medical questionnaire bringing together all necessary information (administrative, demographic and anthropometric data; anamnesis targeted on cardiovascular area; results of whole-body ^137^Cs activity, ECG, echocardiography and, when performed, a 24-hour Holter monitoring and blood tests; and conclusions of the cardiologist). ### Medical examination {#s2b2} After assessing their weight and height, all children were subjected to a direct measurement of whole-body ^137^Cs activity performed with a radiometer-spectrometer RSU-01 'Signal-M'. The ^137^Cs background activity was systematically assessed and subtracted from activity measured in children. The detection limit (DL) was evaluated to be around 1200 Bq for a 10 min counting time depending essentially on the background activity. Then, children underwent an ECG. The recorder was the CardioSoft V.6.5 resting ECG (GE Medical Systems Information Technologies). ECG was performed at rest for about 10 min and tracings were available for all children in the database. An echocardiography was also carried out using an ultrasound diagnostic scanner MyLab 30 CV (ESAOTE) with a phased array probe. For each echocardiography performed, among collected data we investigated more closely the following parameters: left ventricular diameter at end-systole, left ventricular diameter at end-diastole, left ventricle ejection fraction, left ventricular posterior wall thickness at end-diastole, left ventricle velocity, interventricular septum thickness at end-diastole, right ventricular diameter at end-diastole, mitral inflow velocity, left atrial diameter, aortic diameter, tricuspid peak velocity, trunk diameter of the pulmonary artery and pulmonary artery velocity; a later publication is being prepared to further explore these data. Only ultrasound images of pathological cases have been recorded into the database. For some randomly selected children, a 24-hour Holter monitoring was recorded with a CardioDay (Getemed Medizin). Blood tests to assess enzymatic (transaminases, Alkaline phosphatase (ALP), Lactate dehydrogenase (LDH), Gamma-glutamyltransferase (GGT), Creatine kinase (CK)), biochemical (Sodium (Na), Potassium (K), Calcium (Ca), Phosphorus (P), albumin), inflammatory (C-reactive protein (CRP)), renal (urea, creatinine), thyroid (Thyroid-stimulating hormone (TSH), Free thyroxine (FT4)) and cardiac (troponin T, Creatine kinase-MB (CK-MB)) profiles were performed. For blood assays, biologists employed a 9180 electrolyte analyser (Roche Diagnostics), an automated Enzyme immuno-assay (EIA) and chemistry analyser ChemWell (Awareness Technology), a biochemical analyser SYNCHRON CX4-CE (Beckman Coulter), a LIANA luminometer (Immunotech S.A.S.) and the Roche TROP T sensitive rapid assay. ### Medical diagnosis of cardiac arrhythmia {#s2b3} The diagnoses of cardiac arrhythmia (including cardiac conduction and cardiac rhythm disorders)[@R17] have been registered according to WHO's International Classification of Diseases Tenth Revision (2010).[@R18] Pathologies/syndromes identified in the course of the study belong to the following categories: atrioventricular and left bundle-branch block (I44.0; I44.1; I44.2; I44.4; I44.5); other conduction disorders (I45.0; I45.1; I45.2; I45.4; I45.5; I45.6; I45.8); paroxysmal tachycardia (I47.1); other cardiac arrhythmias (I49.1; I49.3; I49.4; I49.5; I49.8); and abnormalities of heart beat (R00.0; R00.1). Statistical analyses {#s2c} -------------------- The characteristics of the study population were described by number (percentages) for categorical variables and by mean (min--max) and median for continuous variable ('caesium burden': ^137^Cs whole-body burden). Age at diagnosis was categorised into tertiles based on the distribution among healthy children (\<10, 10--13, ≥14 years). Body mass index (BMI) was calculated as weight (kg) divided by squared height (m) and was categorised according to age and sex as recommended by WHO (underweight, normal weight, overweight, obesity).[@R19] As of ionising radiation exposure variables, two were considered: 'territory' (control, contaminated); 'caesium burden', which was categorised into quartiles based on the distribution among healthy children with a positive whole-body contamination (not detectable; \]DL--35\[; \[35-50\[; \[50-70\[;≥70 Bq/kg). The associations between territory or caesium burden and cardiac arrhythmia risk were analysed using a non-conditional logistic regression.[@R20] In multivariate analysis, all ORs with 95% CIs were adjusted for variables having a P value\<0.25 on univariate analysis. Tests for interaction were performed to assess whether territory or caesium burden association with the presence of cardiac arrhythmia risk were modified by parameters such as BMI, drug intake with cardiac arrhythmia as side effects, caesium burden or territory. A generalised linear model was used to determine the contribution of each variable to the caesium burden. Sensitivity analysis on children with cardiac arrhythmia who underwent blood test was conducted using χ[@R2] test. Other sensitivity analyses were undertaken on children with cardiac conduction disorders only, children with cardiac rhythm disorders only or all children diagnosed with also sinus arrhythmia. Statistical tests were two-sided and P values\<0.05 were considered statistically significant. Tests for trend were performed by considering categorical variables as continuous variables using the Wald χ^2^ statistic. All data were analysed with the use of SAS software V.9.2 (SAS Institute). Patient involvement {#s2d} ------------------- No patients were involved in setting the research question or the outcome measures, nor they were involved in developing plans for design or implementation of the study. No patients were asked to advise on interpretation or writing up of results. The authors plan to disseminate the results of the research to study participants through public meetings as soon as the article is published. Results {#s3} ======= The study included 8816 exposed and 8881 unexposed children. [Table 1](#T1){ref-type="table"} shows all characteristics of participants. ###### Description of the study population --------------------------------------------------------------------------------------------------------------------------------------------------------- Characteristics Contaminated territories\ Control territories\ (exposed population) (unexposed population) ------------------------------------------------------------------- --------------------------- ------------------------ ---------------------- --------- Sex  Male 4436 (50.3) 4534 (51.1)  Female 4380 (49.7) 4347 (48.9) Age (years)  \<10 3412 (38.7) 3057 (34.4)  10--13 2598 (29.5) 3109 (35.0)  ≥14 2806 (31.8) 2715 (30.6) Type of medical examination  ECG 8816  (100) 8881 \(100\)  Echocardiography  Caesium-137 whole-body activity  Holter† 1377 \(1536\) 2418 (27.2) Health condition  Healthy 7644 (86.7) 7527 (84.8)  With cardiac arrhythmia (including cardiac conduction disorders) 1172 (13.3) 1354 (15.2) Drug intake possibly responsible for cardiac arrhythmia  No 3933 (44.6) 8335 (93.9)  Yes 108 (1.2) 257 (2.9)  Unknown 4775 (54.2) 289 (3.3) Body mass index (WHO classification)  Underweight 179 (2.0) 204 (2.3)  Normal weight 6565 (74.5) 6550 (73.8)  Overweight 1219 (13.8) 1218 (13.7)  Obesity 853 (9.7) 909 (10.2) Place of residence  Rural area 2833 (32.1) 3165 (35.6)  Urban area 5983 (67.9) 5716 (64.4) Caesium burden (Bq/kg)  Not detectable 6925 (78.6) 7667 (86.3)  \]DL--35\[ 394 (4.5) 425 (4.8)  \[35--50\[ 454 (5.1) 349 (3.9)  \[50--70\[ 413 (4.7) 250 (2.8)  70 and more 630 (7.1) 190 (2.1)  Mean‡(min--max)   73.8 (14.3--2137.5)   47.3 (13.2--143.1)  Median‡   53.8   41.8 Dietary habits  Shop (clean food) 8128 (92.2) 7676 (86.4)  Personal farm (milk, meat, vegetables) 6448 (73.1) 6722 (75.7)  Forest (mushrooms, berries, meat) 5486 (62.2) 7171 (80.7)  Local reservoirs, rivers (fish, crayfish) 3862 (43.8) 4237 (47.7) --------------------------------------------------------------------------------------------------------------------------------------------------------- \*The percentages may not sum to 100 because of rounding. †Data were missing for 37 children. ‡Only among children with detectable caesium burden. Males and females were almost equally represented, and distribution of children by age category was quite similar. All children underwent three medical examinations (ECG, echocardiography and ^137^Cs whole-body activity measurement) and a 24-hour Holter monitoring was performed in 15.6% and 27.2% of exposed and unexposed children, respectively. It is understood that for children who were given both an ECG and a 24-hour Holter monitoring the final diagnosis has considered systematically the results of the Holter as a more sensitive examination compared with the ECG. Thereby, cardiac arrhythmia was diagnosed in 1172 exposed and 1354 unexposed children. The crude prevalence estimated to be 13.3% in contaminated territories was significantly lower than in control territories with 15.2% over the period 2009--2013 (P\<0.001). The prevalence ratio was 0.87 (95% CI 0.84 to 0.90). Considering caesium burden as exposure (data not shown), cardiac arrhythmia was found in 449 contaminated children and 2077 uncontaminated children, corresponding to an estimated crude prevalence of 14.5% and 14.2%, respectively, which does not differ significantly (P=0.74) and resulting in a prevalence ratio of 1.02 (95% CI 0.97 to 1.07). The distribution of caesium burden was described by a log-normal shape; 21.4% of children living in contaminated territories had a detectable ^137^Cs whole-body contamination compared with 13.6% of children living in control territories ([table 1](#T1){ref-type="table"}). The distribution of children living in contaminated territories rose with increasing ^137^Cs whole-body contamination in contrast with children living in control territories for whom the trend was reversed. Indeed, 4.5% and 4.8% of those children had a ^137^Cs whole-body contamination \<35 Bq/kg, while with ^137^Cs whole-body contamination exceeding 70 Bq/kg the gap was widening (7.1% and 2.1%, respectively). The calculation of the committed effective dose in the 3105 children with a detectable caesium burden showed that only 24 patients were \>1 mSv (with a maximum dose of 5.77 mSv per year). As of their lifestyle, characteristics were similar in both exposed and unexposed children: nearly two-thirds of children lived in urban area and dietary habits seemed to be similar except for consumption of forest products (mushrooms, berries, meat), which decreased in exposed children (62.2%) compared with unexposed children (80.7%). In both territories, the distribution of children according to BMI categories was balanced. The number of children with a high BMI (overweight and obesity combined) represented 23.5% and 23.9% in contaminated and control areas, respectively. When the participants were questioned about drug intake, it happens that a limited number of children took drugs, 1.2% and 2.9% in the contaminated and control territories, respectively. Among the identified drugs, more than three-quarters were vasoconstrictors, antibiotics, antihistaminics and bronchodilators. In univariate analysis, the risk of cardiac arrhythmia was significantly decreased with sex, drug intake, BMI and territory variables ([table 2](#T2){ref-type="table"}). However, children \>14 years had a 2.3-fold increase of cardiac arrhythmia risk compared with younger children (\<10 years). For caesium burden, children with contamination \<35 Bq/kg presented a significant higher risk of cardiac arrhythmia than children with no detectable contamination (OR 1.37; 95% CI 1.15 to 1.65). ###### Univariate analysis of associated factors related to cardiac arrhythmia Associated factors OR (95% CI) P values --------------------------------------------------------- ---------- ---------------- ---------- Sex   Male 1 --   Female **0.66** (0.61 to 0.72) \<0.01 Age (years)  \<10 1 --   10--13 0.97 (0.87 to 1.09)  ≥14 **2.27** (2.06 to 2.51) \<0.01\* Drug intake possibly responsible for cardiac arrhythmia   No 1 --   Yes 0.79 (0.58 to 1.09) 0.16   Unknown **0.89** (0.81 to 0.98) 0.02 Body mass index (WHO classification)   Underweight 1 --   Normal weight 0.88 (0.67 to 1.15)   Overweight **0.71** (0.53 to 0.95)   Obesity **0.62** (0.45 to 0.84) \<0.01\* Territory   Control 1 --   Contaminated **0.85** (0.78 to 0.93) \<0.01 Caesium burden (Bq/kg)   Not detectable 1 --   \]DL--35\[ **1.37** (1.15 to 1.65)   \[35--50\[ 0.98 (0.80 to 1.20)   \[50--70\[ 0.89 (0.70 to 1.12)   70 and more 0.84 (0.68 to 1.04) 0.17\* The ORs indicated in bold are statistically significant. \*P values for trend. The adjusted OR was no longer significant (0.90 with 95% CI 0.81 to 1.00; P=0.06) for the territory. Similarly, for caesium burden, the ORs close to 1 did not reach statistical significance (P values for trend=0.97) ([table 3](#T3){ref-type="table"}). ###### Multivariate logistic regression model for associated factors in relation to cardiac arrhythmia Associated factors OR[\*](#tblfn7){ref-type="fn"} (95% CI) P values ------------------------ -------------------------------- ---------------- ---------- Territory   Control 1 --   Contaminated 0.90 (0.81 to 1.00) 0.06 Caesium burden (Bq/kg)   Not detectable 1 --   \]DL--35\[ 1.07 (0.89 to 1.29)   \[35--50\[ 1.00 (0.81 to 1.23)   \[50--70\[ 1.04 (0.82 to 1.31)   70 and more 0.96 (0.77 to 1.20) 0.97 For caesium burden, adjustment for sex, age, drug intake, body mass index and territory. \*For territory, adjustment for sex, age, drug intake, body mass index and caesium burden. Thus, there was no evidence of any association between the presence of cardiac arrhythmia and territory or caesium burden. When we paid attention to the caesium burden, the ranking in the explanation of the variance of this variable was first territory, age (particularly \<10 years), ^137^Cs whole-body activity measurement performed during autumn season and consumption of forest products, by order of importance (results not shown). Furthermore, associations between the presence of cardiac arrhythmia and territory or caesium burden were not significantly different according to BMI, drug intake and territory or caesium burden (results not shown). Finally, we investigated the risk of all diagnosed cases with sinus arrhythmia cases (considered as pathological in Russia), cardiac conduction disorders cases only and cardiac rhythm disorders only (table A in online [supplementary appendix](#SP1){ref-type="supplementary-material"}). All results were similar to those of cardiac arrhythmia cases ([table 3](#T3){ref-type="table"}) except for the relationship between cardiac conduction disorders and territory for which the OR was statistically significant (0.82; 95% CI 0.69 to 0.99; P=0.04), thereby suggesting that living in a contaminated territory would not increase the risk to develop a cardiac arrhythmia. 10.1136/bmjopen-2017-019031.supp1 Another sensitivity analysis was performed for children with cardiac arrhythmia who had blood tests (n=1079). The results are shown in table B in online [supplementary appendix](#SP1){ref-type="supplementary-material"}. Among measured blood parameters were included calcium, potassium, and TSH and FT4 for thyroid function, which are the major biological parameters whose variations are often observed in a context of a cardiac arrhythmia.[@R21] The proportion of children with hypocalcaemia was significantly higher in control territories compared with contaminated territories (P=0.001) and the inverse was observed for children with hyperkalaemia (P=0.004). However, when considering caesium burden as exposure, no significant differences were evidenced (P=0.18 for children with hyperkalaemia and P=0.98 for children with hypocalcaemia) (data not shown). With respect to other biological parameters investigated, the sensitivity analysis did not evidence differences between children living in control territories compared with contaminated territories. Similar observations were made when considering caesium burden as exposure (data not shown). Discussion {#s4} ========== Health consequences of the Chernobyl accident in children internally exposed to ionising radiation {#s4a} -------------------------------------------------------------------------------------------------- The ways that usually characterise human radiation exposure are total or partial body irradiation, external contamination (radioactive particle skin deposit) and internal contamination (inhalation, ingestion, wound). The latter route that implies incorporation inside the body of radioactive material, which is inhaled and/or ingested, is of particular importance when assessing the health consequences for exposed children. Thus, while the scientific community was expecting after the Chernobyl accident an increased incidence in childhood leukaemia as observed in the Hiroshima and Nagasaki survivors, an increase in the frequency of thyroid cancer in children was observed since 1990.[@R23] This observation was lately confirmed in a number of publications along the decades that followed the accident.[@R1] The childhood thyroid cancer epidemic is now widely recognised as a major consequence of the Chernobyl accident despite doubts that some experts expressed about the accuracy of diagnosis and because of the short period of latency.[@R1] Indeed, according to the United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR) 2008 report, 6848 cases of thyroid cancer were reported in the affected territories of Belarus, Ukraine and Russia between 1991 and 2005 in children under age 18 years in 1986.[@R2] Actually the risk of developing a thyroid cancer after childhood exposure is known since years as described in an updated pooled analysis recently published.[@R24] However at the time of the Chernobyl accident, radiation-induced thyroid cancer was recognised as a potential consequence of an external irradiation only, delivered mainly in the context of childhood cancer therapies. In the Chernobyl situation, children were exposed mostly because of the ingestion of food and milk contaminated with iodine-131, short-lived radioactive iodines and tellurium. The radioactive iodines were accumulated into the thyroid, which was often deficient in stable iodine, leading thus to the development of thyroid cancer in children, especially in those who were under age 4 years at the time of the accident. Rationale of this study {#s4b} ----------------------- To date, thyroid cancer is the only disease undoubtedly attributable to ionising radiation in exposed Chernobyl children. However, arguing that children have been and are still exposed to ^137^Cs because of the consumption of foodstuffs such as mushrooms and berries locally produced and contaminated as a result of a transfer of radionuclides from the soil, some authors attribute to radiation exposure a number of other illnesses exhibited in children living in contaminated territories, such as various infections, gastric symptoms or cardiovascular diseases, among cardiac arrhythmias that are frequently mentioned.[@R14] These authors state that such diseases would be caused by a chronic incorporation and heterogeneous accumulation of radioactive caesium inside the body, particularly into the myocardium.[@R11] However, there is no indication of an accumulation into the myocardium in a publication presenting an update of the biokinetic models for radiocaesium and its progeny as these radionuclides are known to be distributed mainly in the skeletal muscles.[@R25] Because it was not possible to verify the scientific data put forward by these authors, we decided to launch the EPICE programme, recognising that it was not possible for us to address questions that several non-governmental organisations raised about cardiac arrhythmias exhibited in exposed children resulting from a chronic incorporation of ^137^Cs. To solve the question about a homogenous versus heterogeneous distribution of caesium into the body, we performed previously to this study some direct measurements of ^137^Cs activity in a group of 49 Russian children living in the Bryansk contaminated territories and suffering from cardiac arrhythmia, gastric symptoms and lens opacities. This work did not evidence an accumulation of ^137^Cs in the heart region compared with the neck region (including the thyroid), the abdominal region and skeletal muscles. Therefore, our results supported the hypothesis that ^137^Cs was homogeneously distributed inside the body of enrolled children (data not shown). Study design {#s4c} ------------ Cross-sectional studies do not permit the reconstruction of a time sequence between exposure and observed disease. The objective of the present study was to compare the prevalence of a disease between two geographical areas. Indeed, it would have been of added value to consider time trends in the frequency of arrhythmia among children after the Chernobyl accident. However, a cross-sectional design is not suitable for spatiotemporal approaches. One of the other classical potential biases of this type of study is the lack of control of population migration that is the capacity to know whether people in each area have moved since birth. In our study, comprehensive information on potential previous homes of children was not available. In particular, we do not know if they were born in a contaminated territory or not. However, it should be noted that these populations with limited financial resources were likely not geographically mobile, notably because of financial compensations which represented a strong argument that was very carefully considered by the families when deciding on to move or not to move to an unexposed area. In our protocol, the control group has been defined as children living in territories with \[^137^Cs\]\<37 kBq per square metre in the Bryansk oblast. We decided not to consider territories far away from the contamination to avoid too large differences in terms of socioeconomic living conditions, which are quite specific to the oblast of Bryansk compared with other Russian regions. Comparison with other studies {#s4d} ----------------------------- Two large studies addressing the prevalence of cardiac conduction disturbances in children have been published in the early 21st century. A first survey performed by questionnaire, electrocardiography, phonocardiography and physical examination was conducted in Taipei, Taiwan, between 1999 and 2001 in a population of 432 166 elementary and high school students aged from 6 to 20 years. In this study, the authors, after excluding students with congenital heart disease, assessed a prevalence of 0.75%.[@R26] A second analysis of disturbances of cardiac rhythm by using ECG performed as part of a cardiac screening test was carried out in Chiba City, Japan, between 1996 and 2001 in a population of 152 322 children. In this study, the prevalence of disturbances of cardiac rhythm was 1.25% in elementary school students aged from 5 to 6 years and 2.32% in junior high school students aged from 12 to 13 years.[@R27] To our understanding, the two studies mentioned above were performed in children not exposed to artificial sources of ionising radiation in a context of a large-scale screening. Another study explored arrhythmia in infants in the UK (Northern Region of England).[@R28] Nevertheless, this paper was dealing with incidence and so that conclusions of this study cannot be directly compared with our results since the present study considered the prevalence of childhood arrhythmia. To our knowledge, our study is the largest one having explored cardiovascular functions among children in a context of internal radiation contamination. The results of our work show a crude prevalence of cardiac arrhythmia significantly lower in children living in contaminated versus control territories (13.3% vs 15.2%). Compared with the studies performed in Taipei and Chiba, the assessed prevalence seems much higher. However, we do think that outcomes of our study are not comparable to those of the two Asian studies. Thus, the number of children included in our study is much smaller; the examinations on which we based our diagnosis of cardiac diseases are more comprehensive (ECG, echocardiography, Holter); and the two studies mentioned above were performed in Asian children living in very different socioeconomic conditions compared with our group of Caucasian children who lived in much more unfavourable conditions. Very importantly, this study does not observe an association between cardiac arrhythmia and territory or caesium burden, and even shows a higher number of arrhythmic patients living in control territories, despite a higher caesium burden in children enrolled in contaminated versus control territories. We note that the number of 24-hour Holter monitoring was higher in control territories than in contaminated territories (2418 and 1377, respectively). Therefore, we cannot exclude that this difference in the frequency of Holter may be linked to a higher number of cardiac arrhythmia in control territories. However, the percentage of children diagnosed with a cardiac arrhythmia on the basis of both positive ECG and positive Holter is similar in contaminated territories and control territories (56% and 54%, respectively). In addition, other factors not related to radiation exposure (eg, lifestyle) may also affect the frequency of arrhythmia in control territories. Focusing on the dose assessed in children measured with a detectable caesium burden, our study shows that only 24 among 3105 patients (0.8%) have received a radioactive dose above the annual exposure limit of 1 mSv recommended by the International Commission of Radiological Protection in a normal situation.[@R29] It seems to argue that the presence of an arrhythmia is related to neither the radioactive dose nor the contamination of the territory where children lived, which is not directly proportional to the ^137^Cs whole burden. Moreover, for the same ingested amount of ^137^Cs, some children will present a high body burden, while for others the radioactive caesium will not be detectable because of the interindividual variability in the behaviour of caesium in the body and weight differences from a child to another. Regarding the effect of the season on the measurement of whole-body ^137^Cs burden, a thorough analysis shows that among the 449 children with both cardiac arrhythmia and whole-body ^137^Cs activity above the DL, 259 live in the contaminated territories and 190 in the controlled territories. When looking at the season when the ^137^Cs measurement was performed, the results show that the majority of children were measured during the autumn or winter, with a comparable result between contaminated territories (67%) and controlled territories (61%). This result is, after all, rather not surprising because mushrooms, berries and game (eg, wild boar meat) are highly eaten in Russian families mostly along fall and winter. These forest products are known to be the most heavily contaminated with ^137^Cs in both contaminated and controlled territories. Finally we notice that the individuals with a detectable caesium burden and living in contaminated territories have been contaminated as a result of a long-lasting soil caesium contamination and not because they were exposed directly to the Chernobyl releases, notably radioactive iodines, as they were born several years after the accident. Conclusion {#s5} ========== The study presented in this article has been carried out in the largest group ever observed among children with cardiac arrhythmia in the Russian territories affected by the Chernobyl fallout. Our results show a higher prevalence of childhood cardiac arrhythmia over the period 2009--2013 in control versus contaminated territories in the Russian *oblast* of Bryansk where the study has been implemented. Also we do not observe an association between cardiac arrhythmia and ^137^Cs deposition levels in the Bryansk region exposed to Chernobyl fallout. The suspected increase in the frequency of childhood cardiac arrhythmia that some scientists evoked in children exposed to chronic incorporation of ^137^Cs is not confirmed. Therefore, it would not be recommended to implement a large-scale screening of cardiovascular diseases in children exposed to radioactive releases right after a nuclear accident comparable to the thyroid cancer screening that started just after the Fukushima accident.[@R30] However, these data may be useful for future comparative study of cardiac arrhythmia in children exposed to ionising radiation in other contexts, such as cancer radiation therapies. Also this study offered a unique opportunity to collect in a very large group of children an impressive amount of information related to the normal limits for the paediatric ECG and echocardiography that will certainly help to adjust the diagnostic criteria used so far by the paediatricians.[@R31] The publication of the results of this study will be followed by another article presenting the results of a large-scale screening of lens opacities in a similar group of children living in the same *oblast* of Bryansk. This ongoing study is being achieved and will hopefully provide some elements of answer to another question often raised when assessing the health consequences of childhood exposure to ionising radiation after a nuclear accident. Supplementary Material ====================== ###### Reviewer comments ###### Author\'s manuscript The authors thank Dr Dominique Laurier for his advice relevant to the result interpretation, as well as Dr Cecile Challeton-de Vathaire and Dr Eric Blanchardon for their help in the assessment of committed dose received to children enrolled in this study. The authors are also grateful to Dr Tarita Voldemar and colleagues from the Nikiforov Russian Center of Emergency and Radiation Medicine, EMERCOM, in St. Petersburg, Russia, for their support in the calibration of the radiation measurement device used in this study, and to the interpreters Nathalie Rutschkowsky and Oxana Gouliaeva for having facilitated the communication between Russian and French authors. J-RJ and GL contributed equally. **Contributors:** PG and JRJ had the idea for the study. JRJ, GL, VD, AS, IK and AB contributed to the design, the conduct of the study and the recruitment of patients. VD, AS, IK, and AB contributed to the collection of clinical data. IK contributed to the design of the database and the entry of computer data. JRJ, GL and ID contributed to medical diagnoses consultation. JRJ and GL contributed to literature search and drafted the report. DF and J-PH contributed to the analysis of dosimetry data. JRJ, GL and EC contributed to statistical data analysis and interpretation. All authors critically reviewed the manuscript and approved the final version of the draft. The research was designed, conducted, analysed and interpreted by the authors entirely independently of the funding sources. **Funding:** This study was entirely financed by the IRSN's research budget. This budget is allocated by the ministries to which the IRSN reports, notably the Ministry of Ecology. **Disclaimer:** The ministries had no role in study design, data collection, data analysis, data interpretation or writing of the report. **Competing interests:** None declared. **Patient consent:** Parental/guardian consent obtained. **Ethics approval:** This study was approved and validated by the Ethics Committee of the Russia's National Hematology Center in Moscow. The study was conducted in accordance with the principles of the Declaration of Helsinki. **Provenance and peer review:** Not commissioned; externally peer reviewed. **Data sharing statement:** Under ethical approval, patient-level data cannot be made available.
Q: What is the risk of allowing display of arbitrary HTML files? Github and Bitbucket allow README files in formats such as Markdown or reStructuredText, but not in HTML format. Is there a security risk in doing so? A: HTML files can contain Javascript which browsers will run with permission to the domain it's displayed on. If github allowed arbitrary HTML uploaded by users to show on the github.com domain, then for example an attacker could create a repository that when viewed caused your browser to copy the readme into all of your own repositories (by making AJAX requests against github.com), which would then continue to spread across the site. (The code could also have other functionality, like making all of your private repositories public, changing your profile info, etc.)
There is a need to provide a safe and effective means for preventing bacterial growth in a litter box that can be used on or near a cat's body without adverse effects on the cat. There is a further need to provide preparations that will inhibit and/or prevent the growth of odor causing bacteria. The problem of odors from bacteria can be especially noticed in litters that are not changed daily. Cat litters can comprise a variety of clays that may be admixed with various naturally occurring minerals, clumping agents may be added. Previously, hexachlorophene was widely used in many cat litter compositions to kill bacteria on contact and to prevent growth of bacteria and fungus. However, the hexachlorophene was used in direct contact with skin and was absorbable. Prolonged exposure to hexachlorophene was considered as being hazardous so that it was withdrawn from use in composition for human and pets. There is a need to provide hypoallergenic compositions, which are used on or near pet body parts for preventing bacterial and fungal growth, which do not adversely affect the cat. Phenols are the general standard for testing against microorganisms and parasites, however, free phenols quickly evaporate. U.S. Pat. No. 4,332,763 to Hempel et al discloses the use of a quaternary ammonium polymer obtained by the reaction of dimethyl sulfate with a mixed polymer of vinyl pyrrolidone and dimethylamino ethylmethacrylate. However, the quaternary ammonium action of this polymer degrades in clay and loses its efficacy. U.S. Pat. No. 3,872,128 to Byck, which is herein incorporated by reference, discloses anti-microbial ammonium polymer salts which are prepared from carboxyl-containing .alpha.-olefin polymers and quaternary ammonium salts. The polymers are used to form solid polymeric articles for hospitals and patient care. U.S. Pat. No. 3,404,134 to Rees, which is herein incorporated by reference, discloses a process for crosslinking copolymers of alpha olefin and alpha, beta ethylenically unsaturated carboxylic acid units. The copolymers are crosslinked utilizing diamine actions. None of the diamine actions are stated as being anti-microbial. Furthermore, the polymers are used to make molded articles and sheet material. It is understood that the term "di-quat" as used herein are biocidally active di quaternary ammonium compounds when ionically bonded maintain their biological activity. The term "polycarboxylic acid" is intended to mean a carboxylic acid compound having 2-4 carboxylic acid groups or anhydrides which when reacted behave as polycarboxylic acids or salts thereof.
Hundreds of companies are working to hammer down the language barrier, but Google’s about to bring in a wrecking ball. For the past year, the giant amongst search engines has been touting a new feature they will be bringing to their smart phones – it’s called ‘Conversation Mode’. Combining the high speed text translations of Google Translate and the text to speech/speech to text skills of Google Voice Actions, Conversation Mode allows users to speak in one language and have their phone speak in another. Google hasn’t announced any firm launch dates (it’s been ‘months away’ for months now) but they demonstrated the technology during IFA 2010 in September to great effect. You can watch the demo in the video clip below. We’ve seen smart phone based applications like this before, but not with the power or versatility of Google Translate behind them. For those who are keeping track, GT added its 57th language this year. Conversation Mode still has its bugs to work out, but it looks like a nearly universal translator could be coming to your phone in 2011. This video clip is from Eric Schmidt’s hour-long keynote address at IFA 2010 in September. You can watch the entire presentation here. We’ve been talking about universal translators a lot recently because there have been so many wonderful demonstrations of the technology in the past 18 months. Smart phone applications capable of translating a single language to English have been available for a while, with great examples for Spanish and Arabic appearing in late 2009. (Prototype software, of course, has been around for much longer.) In those same 18 months we’ve also seen advancements in text to speech/speech to text programs, and the number of applications using that capability continues to increase. I think it’s clear that we’re approaching a perfect storm moment in the development of universal translators. We have the necessary pieces to start cobbling a UT together, and in my mind that’s what Conversation Mode really is. Glue Voice Actions to Google Translate and you get a system that can handle 50+ languages with lag times of just a few seconds. And there’s every reason to believe that Conversation Mode will be free. How incredible is that? Of course, not everything about a Google created voice translator will be perfect. Google Translate is definitely a cloud-based service, meaning that Conversation Mode will likely require connectivity to work. Not very useful if you’re in the middle of nowhere and can’t get a signal. Also, as you could clearly see in the video above, the Conversation Mode demo took three attempts to properly translate “color”. The first generation of this service is likely to require some major amounts of patience. Yet one of the most promising things about Conversation Mode is that it will get better with time. Possibly much better. Google Translate learns how to convert between languages by examining millions of documents and developing rules for translation that constantly evolve. Because it is cloud-based, you can access improvements in Google Translate almost as soon as they are made. Conversation Mode (and its successors) won’t just be a great semi-universal translator, it will be a tool that changes as the languages of the world change. A UT not just for today, but for the future in perpetuity. In five years I expect I will be able to travel around the world and never need a translator besides my phone. In ten I think the language barrier will be so crumbled that we will take it for granted that we are crossing over it many times each day. It’s going to be amazing. [sources: Google at IFA (video), The Times]
Q: Postfix: How to configure Postfix with virtual Dovecot mailboxes? I have configured a Postfix mail server for two domains: domain1.com and domain2.com. In my configuration domain1 has both virtual users with Maildirs and aliases to forward mail to local users (eg. root, webmaster) and some small mailing lists. It also has some virtual mappings to non-local domains. Domain2 on the other hand has only virtual alias mappings, mainly to corresponding 'users' at domain1 (eg. mails to root@domain2.com should be forwarded to root@domain1.com). My problem is that currently Postfix accepts mail even for those users that don't exist in the system. Mail to existing users and /etc/aliases works fine. Postfix documentation states that the same domain should never be specified in both mydestination and virtual_mailbox_maps, but If I specify mydestination as blank then postfix validates recipients against virtual_mailbox_maps but rejects mail for local aliases of domain1.com. /etc/postfix/main.cf: myhostname = domain1.com mydomain = domain1.com mydestinations = $myhostname, localhost.$mydomain, localhost virtual_mailbox_domains = domain1.com virtual_mailbox_maps = hash:/etc/postfix/vmailbox virtual_mailbox_base = /home/vmail/domains virtual_alias_domains = domain2.com virtual_alias_maps = hash:/etc/postfix/virtual alias_maps = hash:/etc/aliases alias_database = hash:/etc/aliases virtual_transport = dovecot /etc/postfix/virtual: domain1.com right-hand-content-does-not-matter firstname.lastname user1 [more aliases..] domain2.com right-hand-content-does-not-matter @domain2.com @domain1.com /etc/postfix/vmailbox: user1@domain1.com user1/Maildir user2@domain1.com user2/Maildir /etc/aliases: root: :include:/etc/postfix/aliases/root webmaster: :include:/etc/postfix/aliases/webmaster [etc..] Is this approach correct or is there some other way to configure Postfix with Dovecot (virtual) Maildirs and Postfix aliases? A: Yes, you can't have domain in both mydestination and virtual_mailbox_maps. To overcome this you need set mydestination in main.cf mydestination = localhost.$mydomain, localhost and in /etc/postfix/virtual root@domain1.com root@localhost webmaster@domain1.com webmaster@localhost with this setup, email to root@domain1.com will be redirected root@localhost. Because localhost listed in mydestination then postfix will apply alias in /etc/aliases
In 1933, prior to the annexation of Austria into Germany, the population of Germany was approximately 67% Protestant and 33% Catholic.[1] A census in May 1939, six years into the Nazi era[2] and incorporating the annexation of mostly Catholic Austria into Germany, indicates that 54% considered themselves Protestant (including non-denominational Christians), 40% Catholic, 3.5% self-identified as "gottgläubig" (lit. "believers in god", often described as predominately creationist and deistic[3]), and 1.5% as non-religious. Nazism wanted to transform the subjective consciousness of the German people—their attitudes, values and mentalities—into a single-minded, obedient "national community". The Nazis believed they would therefore have to replace class, religious and regional allegiances.[4] Under the Gleichschaltung process, Hitler attempted to create a unified Protestant Reich Church from Germany's 28 existing Protestant churches. The plan failed, and was resisted by the Confessing Church. Persecution of the Catholic Church in Germany followed the Nazi takeover. Hitler moved quickly to eliminate political catholicism. Amid harassment of the Church, the Reich concordat treaty with the Vatican was signed in 1933, and promised to respect Church autonomy. Hitler routinely disregarded the Concordat, closing all Catholic institutions whose functions were not strictly religious. Clergy, nuns, and lay leaders were targeted, with thousands of arrests over the ensuing years. The Church accused the regime of "fundamental hostility to Christ and his Church". Smaller religious minorities such as the Jehovah's Witnesses and Bahá'í Faith were banned in Germany, while the eradication of Judaism by the genocide of its adherents was attempted. The Salvation Army, Christian Saints and Seventh Day Adventist Church all disappeared from Germany, while Astrologers, Healers and Fortune tellers were banned. The small pagan "German Faith Movement", which worshipped the sun and seasons, supported the Nazis.[5] Many historians believed that Hitler and the Nazis intended to eradicate Christianity in Germany after winning victory in the war.[6][7] Christianity has ancient roots among Germanic peoples dating to the missionary work of Columbanus and St. Boniface in the 6th–8th centuries. The Reformation, initiated by Martin Luther in 1517, divided German Christians between a majority of Protestants and a minority of Roman Catholics. The south and west remained mainly Catholic, while north and east became mainly Protestant.[8] The Catholic Church enjoyed a degree of privilege in the Bavarian region, the Rhineland and Westphalia as well as parts in south-west Germany, while in the Protestant North, Catholics suffered some discrimination.[9][10] Bismarck's Kulturkampf ("Battle for Culture") of 1871–78 had seen an attempt to assert a Protestant vision of German nationalism over Germany, and fused anticlericalism and suspicion of the Catholic population, whose loyalty was presumed to lie with Austria and France, rather than the new German Empire. The Centre Party had formed in 1870, initially to represent the religious interests of Catholics and Protestants, but was transformed by the Kulturkampf into the "political voice of Catholics".[11] Bismarck's Culture Struggle failed in its attempt to eliminate Catholic institutions in Germany, or their strong connections outside of Germany, particularly various international missions and Rome.[12] Christianity in Germany has, since the Protestant Reformation, been divided into Catholicism and Protestantism. As a specific outcome of the Reformation in Germany, the large Protestant denominations are organized into Landeskirchen (roughly: Federal Churches). The German word for denomination is Konfession. For the large churches in Germany (Catholic and evangelisch i.e., Protestant ) the German government collects the church tax, which is then given to the Churches. For this reason, membership in the Catholic or Protestant (evangelische) Church is officially registered.[14] It is apparent they were politically motivated. For this reason Historian Richard Steigmann-Gall argues that "nominal church membership is a very unreliable gauge of actual piety in this context"[15] and determining someone's actual religious convictions should be based on other criteria. It is important to keep this 'official aspect' in mind when turning to such questions as the religious beliefs of Adolf Hitler or Joseph Goebbels. Both men had ceased to attend Catholic mass or to go to Confession long before 1933, but neither had officially left the Church and neither of them refused to pay his church taxes.[14] Historians have taken a look at the numbers of people who left their church in Germany during the 1933-45 period. The option to be taken off the church rolls (Kirchenaustritt) has existed in Germany since 1873, when Otto von Bismarck had introduced it as part of the Kulturkampf aimed against Catholicism.[16] For parity this was made possible for Protestants, too, and for the next 40 years it was mostly they who took advantage of it.[16] Statistics exist since 1884 for the Protestant churches and since 1917 for the Catholic Church.[16] An analysis of this data for the time of the Nazis' rule is available in a paper by Sven Granzow et al., published in a collection edited by Götz Aly. Altogether more Protestants than Catholics left their church, however, overall Protestants and Catholics decided similarly.[17] The spike in the numbers from 1937-38 is the result of the annexation of Austria in 1938 and other territories. The number of Kirchenaustritte reached its "historical high"[18] in 1939 when it peaked at 480,000. Granzow et al. see the numbers not only in relation to the Nazi policy towards the churches,[19] (which changed drastically from 1935 onwards) but also as indicator of the trust in the Führer and the Nazi leadership. The decline in the number of people who left the church after 1942 is explained as resulting from a loss of confidence in the future of Nazi Germany. People tended to keep their ties to the church, because they feared an uncertain future.[18] The historian Richard J Evans wrote that, by 1939, 95% of Germans still called themselves Protestant or Catholic, while 3.5% identified as "gottgläubig" (lit. "believers in god", a non-denominational nazified outlook on god beliefs, often described as predominately based on creationist and deistic views[3]) and 1.5% atheist. According to Evans, those members of the affiliation gottgläubig "were convinced Nazis who had left their Church at the behest of the Party, which had been trying since the mid 1930s to reduce the influence of Christianity in society".[20]Heinrich Himmler, who himself was fascinated with Germanic paganism[citation needed], was a strong promoter of the gottgläubig movement and didn't allow atheists into the SS, arguing that their "refusal to acknowledge higher powers" would be a "potential source of indiscipline".[21] The majority of the three million Nazi Party members continued to pay their church taxes and register as either Roman Catholic or Evangelical Protestant Christians.[22] According to the BBC, the Salvation Army, Christian Saints and Seventh Day Adventist Church all disappeared from Germany during the Nazi era.[5] Sicherheitsdienst des Reichsführers-SS or SD members withdrew from their Christian denominations, changing their religious affiliation to gottgläubig, while nearly 70% of the officers of the Schutzstaffel SS did the same.[23] Hitler never portrayed himself and the Nazi movement to the German people as outspoken proponents of atheism, but rather as faithful Christians.[24][25] He publicly declared: "We tolerate no one in our ranks who attacks the ideas of Christianity ... in fact our movement is Christian."[26] As a measure in the struggle for power against the influence of the churches (Kirchenkampf) the Nazis tried to establish a "third denomination" called positive Christianity, aiming to replace the established churches to reduce their influence. Historians have suspected this was an attempt to start a cult worshipping Hitler as the new Messiah. However, in a diary entry of 28 December 1939, Joseph Goebbels wrote that "the Fuhrer passionately rejects any thought of founding a religion. He has no intention of becoming a priest. His sole exclusive role is that of a politician."[27] In Hitler's political relations dealing with religion he readily adopted a strategy "that suited his immediate political purposes."[28] Christianity remained the dominant religion in Germany through the Nazi period, and its influence over Germans displeased the Nazi hierarchy. Evans wrote that Hitler believed that in the long run National Socialism and religion would not be able to co-exist, and stressed repeatedly that Nazism was a secular ideology, founded on modern science: "Science, he declared, would easily destroy the last remaining vestiges of superstition". Germany could not tolerate the intervention of foreign influences such as the Pope and "Priests, he said, were 'black bugs', 'abortions in black cassocks'".[29] During Hitler's dictatorship, more than 6,000 clergymen, on the charge of treasonable activity, were imprisoned or executed.[30] The same measures were taken in the occupied territories; in French Lorraine, the Nazis forbade religious youth movements, parish meetings, and scout meetings. Church assets were taken, Church schools were closed, and teachers in religious institutes were dismissed. The episcopal seminary was closed, and the SA and SS desecrated churches, religious statutes and pictures. 300 clergy were expelled from the Lorraine region, monks and nuns were deported or forced to renounce their vows.[31] The Nazi leadership made use of indigenous Germanic pagan imagery and ancient Roman symbolism in their propaganda. However, the use of pagan symbolism worried some Protestants.[32] Many Nazi leaders, including Adolf Hitler,[30] subscribed either to a mixture of pseudoscientific theories, particularly Social Darwinism,[33] or to mysticism and occultism, which was especially strong in the SS.[34][35] Central to both groupings was the belief in Germanic (white Nordic) racial superiority. The existence of a Ministry of Church Affairs, instituted in 1935 and headed by Hanns Kerrl, was hardly recognized by ideologists such as Alfred Rosenberg or by other political decision-makers.[36] A relative moderate, Kerrl accused dissident churchmen of failing to appreciate the Nazi doctrine of "Race, blood and soil" and gave the following explanation of the Nazi conception of "Positive Christianity", telling a group of submissive clergy in 1937:[37] Dr Zoellner and [Catholic Bishop of Munster] Count Galen have tried to make clear to me that Christianity consists in faith in Christ as the son of God. That makes me laugh... No, Christianity is not dependent upon the Apostle's Creed... True Christianity is represented by the party, and the German people are now called by the party and especially the Fuehrer to a real Christianity... the Fuehrer is the herald of a new revelation". The National Reich Church claims exclusive right and control over all Churches. The National Church is determined to exterminate foreign Christian faiths imported into Germany in the ill-omened year 800. The National Church demands immediate cessation of the publishing and dissemination of the Bible. The National Church will clear away from its altars all Crucifixes, Bibles and pictures of Saints. On the altars there must be nothing but Mein Kampf and to the left of the altar a sword.[38] When exploring the Nazi party's public speeches and writings, Steigmann-Gall notes that they can provide insight into their "untempered" ideas.[39] We are no theologians, no representatives of the teaching profession in this sense, put forth no theology. But we claim one thing for ourselves: that we place the great fundamental idea of Christianity in the center of our ideology [Ideenwelt]- the hero and sufferer Christ himself stands in the center."[40] — Hans Schemm, Nazi Gauleiter The Nazi propaganda minister, Joseph Goebbels, among the most aggressive anti-Church Nazis, wrote that there was "an insoluble opposition between the Christian and a heroic-German world view".[41] Hanns Kerrl (center). A relative moderate, as Reichsminister of Church Affairs, he described Hitler as the "herald of a new revelation" and said that Nazi-backed "Positive Christianity" was not dependent on the Apostle's Creed or belief in Christ as the son of God.[42] Prior to the Reichstag vote for the Enabling Act under which Hitler gained the "temporary" dictatorial powers with which he went on to permanently dismantle the Weimar Republic, Hitler promised the Reichstag on 23 March 1933, that he would not interfere with the rights of the churches. However, with power secured in Germany, Hitler quickly broke this promise.[43][44] Various historians have written that the goal of the Nazi Kirchenkampf (Church Struggle) entailed not only ideological struggle, but ultimately the eradication of the Churches.[45][46][47][48][49][50][51][52][53][54] However, leading Nazis varied in the importance they attached to the Church Struggle. William Shirer wrote that "under the leadership of Rosenberg, Bormann and Himmler, who were backed by Hitler, the Nazi regime intended to destroy Christianity in Germany, if it could, and substitute the old paganism of the early tribal Germanic gods and the new paganism of the Nazi extremists."[55] But according to Steigman-Gall, some Nazis, like Dietrich Eckart (d.1923) and Walter Buch, saw Nazism and Christianity as part of the same movement.[56] Aggressive anti-Church radicals like Joseph Goebbels and Martin Bormann saw the conflict with the Churches as a priority concern, and anti-church and anti-clerical sentiments were strong among grassroots party activists.[41] Hitler himself possessed radical instincts in relation to the continuing conflict with the Catholic and Protestant Churches in Germany. Though he occasionally spoke of wanting to delay the Church struggle and was prepared to restrain his anti-clericalism out of political considerations, his "own inflammatory comments gave his immediate underlings all the license they needed to turn up the heat in the 'Church Struggle, confident that they were 'working towards the Fuhrer'".[41] According to the Goebbels Diaries, Hitler hated Christianity. In an 8 April 1941 entry, Goebbels wrote "He hates Christianity, because it has crippled all that is noble in humanity."[57] In Bullock's assessment, though raised a Catholic, Hitler "believed neither in God nor in conscience", retained some regard for the organisational power of Catholicism, but had contempt for its central teachings, which he said, if taken to their conclusion, "would mean the systematic cultivation of the human failure".[58][59] Bullock wrote:[58] In Hitler's eyes, Christianity was a religion fit only for slaves; he detested its ethics in particular. Its teaching, he declared, was a rebellion against the natural law of selection by struggle and the survival of the fittest. Writing for Yad Vashem, the historian Michael Phayer wrote that by the latter 1930s, church officials knew that the long-term aim of Hitler was the "total elimination of Catholicism and of the Christian religion", but that given the prominence of Christianity in Germany, this was necessarily a long-term goal.[60] According to Bullock, Hitler intended to destroy the influence of the Christian churches in Germany after the war.[61] In his memoirs, Hitler's chief architect Albert Speer recalled that when drafting his plans for the "new Berlin", he consulted Protestant and Catholic authorities, but was "curtly informed" by Hitler's private secretary Martin Bormann that churches were not to receive building sites.[62] Kershaw wrote that, in Hitler's scheme for the Germanization of Eastern Europe, he made clear that there would be "no place in this utopia for the Christian Churches'.[63] Geoffrey Blainey wrote that Hitler and his Fascist ally Mussolini were atheists, but that Hitler courted and benefited from fear among German Christians of militant Communist atheism.[64] (Other historians have characterised Hitler's mature religious position as a form of deism.) "The aggressive spread of atheism in the Soviet Union alarmed many German Christians", wrote Blainey, and with the National Socialists becoming the main opponent of Communism in Germany: "[Hitler] himself saw Christianity as a temporary ally, for in his opinion 'one is either a Christian or a German'. To be both was impossible. Nazism itself was a religion, a pagan religion, and Hitler was its high priest... Its high altar [was] Germany itself and the German people, their soil and forests and language and traditions".[64] According to Kershaw, following the Nazi Takeover, Race policy and the 'Church Struggle' were among the most important ideological spheres: "In both areas, the party had no difficulty in mobilizing its activists, whose radicalism in turn forced the government into legislative action. In fact the party leadership often found itself compelled to respond to pressures from below, stirred up by the Gauleiter playing their own game, or emanating sometimes from radical activists at a local level".[65] As time went on, anti-clericalism and anti-church sentiment among grass roots party activists "simply couldn't be eradicated", wrote Kershaw and they could "draw on the verbal violence of party leaders towards the churches for their encouragement.[66] Unlike some other Fascist movements of the era, Nazi ideology was essentially hostile to Christianity and clashed with Christian beliefs in many respects.[67] Nazism saw the Christian ideals of meekness and conscience as obstacles to the violent instincts required to defeat other races.[67] From the mid-1930s anti-Christian elements within the Nazi party became more prominent; however, they were restrained by Hitler because of the negative press their actions were receiving, and by 1934 the Nazi party pretended a neutral position in regard to the Protestant Churches.[68] Alfred Rosenberg, an "outspoken pagan", held among offices the title of "the Fuehrer's Delegate for the Entire Intellectual and Philosophical Education and Instruction for the National Socialist Party".[55] In his "Myth of the Twentieth Century" (1930), Rosenberg wrote that the main enemies of the Germans were the "Russian Tartars" and "Semites" - with "Semites" including Christians, especially the Catholic Church:[69]Joseph Goebbels, the Nazi Minister for Propaganda, was among the most aggressive anti-Church Nazi radicals. Goebbels led the Nazi persecution of the German clergy and, as the war progressed, on the "Church Question", he wrote "after the war it has to be generally solved... There is, namely, an insoluble opposition between the Christian and a heroic-German world view".[41]Martin Bormann became Hitler's private secretary and de facto "deputy" fuhrer from 1941. He was a leading advocate of the Kirchenkampf, a project which Hitler for the most part wished to keep until after the war.[70] Bormann was a rigid guardian of National Socialist orthodoxy and saw Christianity and Nazism as "incompatible".[71] He said publicly in 1941 that "National Socialism and Christianity are irreconcilable".[55] In a confidential message to the Gauleiter on June 9, 1941, Martin Bormann, had declared that "National Socialism and Christianity are irreconcilable."[72] He also declared that the Churches' influence in the leadership of the people "must absolutely and finally be broken." Bormann believed Nazism was based on a "scientific" world-view, and was completely incompatible with Christianity.[72] Bormann stated: Martin Bormann, Hitler's "deputy" from 1941, also saw Nazism and Christianity as "incompatible" and had a particular loathing for the Semitic origins of Christianity.[67] Alfred Rosenberg, the official Nazi philosopher. A proponent of "Positive Christianity", he planned the "extermination of the foreign Christian faiths imported into Germany", and for the Bible and Christian cross to be replaced with Mein Kampf and the swastika.[42] When we National Socialists speak of belief in God, we do not mean, like the naive Christians and their spiritual exploiters, a man-like being sitting around somewhere in the universe. The force governed by natural law by which all these countless planets move in the universe, we call omnipotence or God. The assertion that this universal force can trouble itself about the destiny of each individual being, every smallest earthly bacillus, can be influenced by so-called prayers or other surprising things, depends upon a requisite dose of naivety or else upon shameless professional self-interest.[73] As the Nazi Party began its takeover of power in Germany in 1933 the struggling, but still nominally functioning Weimar government, led by its President, Paul von Hindenburg, and represented by his appointed Vice-Chancellor, Franz von Papen, initiated talks with the Holy See concerning the establishment of a concordat. The talks lasted three and half months while Hitler consolidated his hold on power.[68] This attempt achieved the signing of the Reichskonkordat on July 20, 1933, which protected the freedom of the Catholic Church and restricted priests and bishops from political activity.[68] Like the idea of the Reichskonkordat, the notion of a Protestant Reich Church, which would unify the Protestant Churches, also had been considered previously.[74] Hitler had discussed the matter as early as 1927 with Ludwig Müller, who was at that time the military chaplain of Königsberg.[74] The Catholic Church was particularly suppressed in Poland: between 1939 and 1945, an estimated 3,000 members (18%) of the Polish clergy, were murdered; of these, 1,992 died in concentration camps.[75] In the annexed territory of Reichsgau Wartheland it was even more harsh: churches were systematically closed and most priests were either killed, imprisoned, or deported to the General Government. Eighty per cent of the Catholic clergy and five bishops of Warthegau were sent to concentration camps in 1939; 108 of them are regarded as blessed martyrs.[75] Religious persecution was not confined to Poland: in Dachau concentration camp alone, 2,600 Catholic priests from 24 different countries were killed.[75] A number of historians maintain that the Nazis had a general covert plan, which some argue existed before the Nazis' rose to power,[76] to destroy Christianity within the Reich.[47][77][78][79][80][81][82] To what extent a plan to subordinate the churches and limit their role in the country's life existed before the Nazi rise to power, and exactly who among the Nazi leadership supported such a move remains contested."[76] However, a minority of historians maintain, against consensus,[original research?] no such plan existed.[83][84][85][86][87][88] Summarizing a 1945 Office of Strategic Services report, New York Times columnist Joe Sharkey, stated that the Nazis had a plan to "subvert and destroy German Christianity," which was to be accomplished through control and subversion of the churches and to be completed after the war.[46][51] However, the report stated this goal was limited to a "sector of the National Socialist party," namely Alfred Rosenberg and Baldur von Schirach.[89] Historian Roger Griffin maintains: "There is no doubt that in the long run Nazi leaders such as Hitler and Himmler intended to eradicate Christianity just as ruthlessly as any other rival ideology, even if in the short term they had to be content to make compromises with it."[47] In his study The Holy Reich, the historian Richard Steigmann-Gall comes to the opposite conclusion, "Totally absent, besides Hitler's vague ranting, is any firm evidence that Hitler or the Nazis were going to 'destroy' or 'eliminate' the churches once the war was over."[83] Regarding his wider thesis that, "leading Nazis in fact considered themselves Christian" or at least understood their movement "within a Christian frame of reference",[90] Steigmann-Gall admits he "argues against the consensus that Nazism as a whole was either unrelated to Christianity or actively opposed to it."[91] Although there are high-profile cases of individual Lutherans and Catholics who died in prison or in concentration camps, the largest number of Christians who died would have been Jewish Christians or mischlinge who were sent to death camps for their race rather than their religion.[citation needed] Kahane (1999) state that the total number of Christians of Jewish descent in the Third Reich is estimated at around 200,000.[92] Among the Gentile Christians 11,300 Jehovah's Witnesses were placed in camps, and about 1,490 died, of whom 270 were executed as conscientious objectors.[93] Dachau had a special "priest block." Of the 2,720 priests (among them 2,579 Catholic) held in Dachau, 1,034 did not survive the camp. The majority of these priests were Polish (1,780), of whom 868 died in Dachau. During the First and Second World War, German Protestant leaders used the writings of Luther to support the cause of German nationalism.[94] At the 450th anniversary of Luther's birth, which took place only a few months after the Nazi Party began its seizure of power in 1933, there were celebrations conducted on a large scale both by the Protestant Churches and the Nazi Party.[95] At a celebration at Königsberg, Erich Koch, at that time Gauleiter of East Prussia, made a speech which, among other things, compared Adolf Hitler and Martin Luther and claimed that the Nazis fought with Luther's spirit.[95] Such a speech might be dismissed as mere propaganda,[95] but, as Steigmann-Gall points out: "Contemporaries regarded Koch as a bona fide Christian who had attained his position [of the elected president of a provincial Church synod] through a genuine commitment to Protestantism and its institutions."[96] Even so, Steigmann-Gail states that the Nazis were not a Christian movement.[97] The prominent Protestant theologian Karl Barth, of the Swiss Reformed, opposed this appropriation of Luther in the German Empire and Nazi Germany, when he stated in 1939 that the writings of Martin Luther were used by the Nazis to glorify the State and state absolutism:"The German people suffer under his error of the relation between law and bible, between secular and spiritual power",[98] in which Luther divided the temporal State from the inward focusing spiritual, thus limiting the ability of the individual or the church to question the actions of the State,[99] which was seen as a God ordained instrument.[100] On February 1940, Barth accused German Lutherans specifically of separating Biblical teachings from its teachings of the State and thus legitimizing the Nazi state ideology.[101] He was not alone with his view. A few years earlier on October 5, 1933, Pastor Wilhelm Rehm from Reutlingen declared publicly that "Hitler would not have been possible without Martin Luther",[102] though many have also made this same statement about other influences in Hitler's rise to power. Anti-Communist historian Paul Johnson has said that "without Lenin, Hitler would not have been possible".[103] Different German states possessed regional social variations as to class densities and religious denomination.[104] Richard Steigmann-Gall alleges a linkage between several Protestant churches and Nazism.[105] The "German Christians" (Deutsche Christen) were a movement within the Protestant Church of Germany with the aim of changing traditional Christian teachings to align with the ideology of National Socialism and its anti-Jewish policies.[106] The Deutsche Christen factions were united in the goal of establishing a national socialist Protestantism[107] and abolishing what they considered to be Jewish traditions in Christianity, and some but not all rejected the Old Testament and the teaching of the Apostle Paul. In November 1933, A Protestant mass rally of the Deutsche Christen, which brought together a record 20,000 people, passed three resolutions: The "German Christians" selected Ludwig Müller (1883–1945) as their candidate for Reich bishop in 1933.[109] In response to Hitler's campaigning,[110] two-thirds of those Protestants who voted elected Ludwig Müller, a neo-pagan candidate, to govern the Protestant Churches.[68] Müller was convinced that he had a divine responsibility to promote Hitler and his ideals,[111] and together with Hitler, he favoured a unified Reichskirche of Protestants and Catholics. This Reichskirche was to be a loose federation in the form of a council, but subordinated to the National Socialist State.[112] The level of ties between Nazism and the Protestant churches has been a contentious issue for decades. One difficulty is that Protestantism includes a number of religious bodies many of whom had little relation to each other. Added to that, Protestantism tends to allow more variation among individual congregations than Catholicism or Eastern Orthodox Christianity, which makes statements about "official positions" of denominations problematic. The "German Christians" were a minority within the Protestant population,[113] numbering one third to one forth of the 40 million Protestants in Germany.[106] With Bishop Müller's efforts and Hitlers support "The German Evangelical Church" was formed and recognized by the state as a legal entity on July 14, 1933, with the aim of melting State, people and Church into one body.[114] Dissenters were silenced by expulsion or violence.[115] The support of the "German Christian" movement within the churches was opposed by many adherents of traditional Christian teachings.[116] Other groups within the Protestant church included members of the Confessing Church, prominent members of the Bekennende Kirche (Confessing Church), included Martin Niemöller and Dietrich Bonhoeffer;[117] both rejected the Nazi efforts to meld volkisch principles with traditional Lutheran doctrine.[118] Martin Niemöller organized the Pastors' Emergency League which was supported by nearly 40 percent of the Evangelical pastors.[119][120] They were, however, (as of 1932) in the minority within the Protestant church bodies in Germany. But in 1933, a number of Deutsche Christen left the movement after a November speech by Reinhold Krause that urged, among other things, the rejection of the Old Testament as Jewish superstition.[121] So when Ludwig Müller could not deliver on conforming all Christians to National Socialism, and after some of the "German Christan" rallies and more radical ideas generated a backlash, Hitler's condescending attitudes toward Protestants increased and he lost all interest in Protestant church affairs.[110] The resistance within the churches to Nazi ideology was the longest lasting and most bitter of any German institution.[122] The Nazis weakened the churches' resistance from within but the Nazis had not yet succeeded in taking full control of the churches, evidenced by the thousands of clergy sent to concentration camps.[123] Rev. Martin Niemöller was imprisoned in 1937, charged with "misuse of the pulpit to vilify the State and the Party and attack the authority of the Government."[124] After a failed assassination on Hitler's life in 1943 by members of the military and members of the German Resistance movement,[125] of which Dietrich Bonhoeffer and others in the Confessing Church movement belonged to, Hitler ordered the arrest of Protestant, mainly Lutheran clergy. However, even the "Confessing Church made frequent declarations of loyalty to Hitler".[126] But later many Protestants were solidly opposed to Nazism after the nature of the movement was better understood but a number also maintained until the end of the war that Nazism was compatible with the church. The small Methodist population at times was deemed foreign; this stemmed from the fact that Methodism began in England, while it did not develop in Germany until the nineteenth century with Christoph Gottlob Müller and Louis Jacoby. Because of this history they felt the urge to be "more German than the Germans" to avoid suspicion. Methodist Bishop John L. Nelsen toured the U.S. on Hitler's behalf to protect his church, but in private letters indicated that he feared and hated Nazism, and so retired/fled to Switzerland. Methodist Bishop F. H. Otto Melle took a far more collaborationist position that included apparently sincere support for Nazism. He was also committed to an asylum near the war's end. To show his gratitude to the latter bishop, Hitler made a gift of 10,000 marks in 1939 to a Methodist congregation to purchase an organ. The money was never used.[127] Outside of Germany, Melle's views were overwhelmingly rejected by most Methodists. The leader of pro-Nazi segment of Baptists was Paul Schmidt. The idea of a "national church" was possible in the history of mainstream German Protestantism, but National Churches devoted primarily to the state were generally forbidden among the Anabaptists, Jehovah's Witnesses, and the Catholic Church. The forms or offshoots of Protestantism that advocated pacificism, anti-nationalism, or racial equality tended to oppose the Nazi state in the strongest terms. Prominent Protestant, or Protestant offshoot, groups known for their efforts against Nazism include the Jehovah's Witnesses. In 1934, the Watch Tower Bible and Tract Society published a letter entitled "Declaration of Facts".[128] In this personal letter to then Reich Chancellor Hitler, J. F. Rutherford stated that "the Bible Researchers of Germany are fighting for the very same high ethical goals and ideals which also the national government of the German Reich proclaimed respecting the relationship of humans to God, namely: honesty of the created being towards its creator".[129][130] However, while the Jehovah's Witnesses sought to reassure the Nazi government that their goals were purely religious and non-political and expressed hope that the government would allow them to continue their preaching, Hitler still restricted their work in Nazi Germany. After this J. F. Rutherford began denouncing Hitler in articles through his publications potentially making the plight of Jehovah's Witnesses in Nazi Germany worse.[131] Jehovah's Witnesses or "Bible Researchers" (Bibelforschers) as they were known in Germany, comprised 25,000 members and were among those persecuted by the Nazi government. All incarcerated members were identified by a unique purple triangle. Some members of the religious group refused to serve in the German military or give allegiance to the Nazi government, for which 250 were executed.[132] An estimated 10,000 were arrested for various crimes, and 2,000 were sent to Nazi concentration camps, where approximately 1,200 were killed.[132] Jehovah's Witnesses were among the few who could leave the concentration camps simply by signing a document renouncing their religious beliefs.[133] The attitude of the Nazi party to the Catholic Church ranged from tolerance, to near total renunciation and outright aggression.[134] Bullock wrote that Hitler had some regard for the organisational power of Catholicism, but utter contempt for its central teachings, which he said, if taken to their conclusion, "would mean the systematic cultivation of the human failure".[58] Many Nazis were anti-clerical in both private and public life.[135] The Nazi party had decidedly pagan elements.[136] One position is that the Church and fascism could never have a lasting connection because both are a "holistic Weltanschauung" claiming the whole of the person.[134]Adolf Hitler himself has been described as a "spiritualist" by Laqueur; but by Bullock as a "rationalist" and "materialist" with no appreciation of the spiritual side of humanity;[137] and a simple "atheist" by Blainey.[138] His Fascist comrade Benito Mussolini was an atheist. Both were anticlerical, but understood that it would be rash to begin their Kulturkampfs against Catholicism prematurely. Such a clash, possibly inevitable in the future, was put off while they dealt with other enemies.[139] The nature of the Nazi Party's relations with the Catholic Church was also complicated. As Hitler rose to power, many Catholic bishops, priests, religious and lay leaders vociferously opposed Nazism on the grounds of its incompatibility with Christian morals. In early 1931, the German bishops issued an edict excommunicating all leaders of the Nazi Party and banned Catholics from membership.[140] The ban was conditionally modified in 1933 when State law mandated all Trade Union workers and Civil Servants must be members of the Nazi Party. In July 1933 a Concord Reichskonkordat was signed with the Vatican which prevented political activity by the Church in Germany; however, the Vatican continued to speak out on issues of faith and morals opposing Nazi philosophy. In 1937 Pope Pius XI issued the encyclicalMit brennender Sorge condemning Nazi ideology, notably the Gleichschaltung policy directed against religious influence upon education, as well as Nazi racism and antisemitism. His death prevented the issuing of a planned encyclical Humani generis unitas, but the similar Summi Pontificatus was the first encyclical released by his successor (Pius XII), in October 1939. This encyclical strongly condemned both racism and totalitarianism, without the anti-Judaism present in the draft presented to Pope Pius XI for Humani generis unitas. The massive Catholic opposition to the euthanasia programs led them to be quieted on 28 August 1941, (according to Spielvogel pp. 257–258). Catholics, on occasion, actively and openly protested Nazi antisemitism through several bishops and priests such as Bishop Clemens von Galen of Münster. In Nazi Germany, political dissenters were imprisoned, and some German priests were sent to the concentration camps for their opposition, including the pastor of Berlin's Catholic Cathedral Bernhard Lichtenberg and the seminarian Karl Leisner.[141] In 1941 the Nazi authorities decreed the dissolution of all monasteries and abbeys in the German Reich, many of them effectively being occupied and secularized by the Allgemeine SS under Himmler. However, on July 30, 1941 the Aktion Klostersturm (Operation Monastery) was put to an end by a decree of Hitler, who feared the increasing protests by the Catholic part of German population might result in passive rebellions and thereby harm the Nazi war effort at the eastern front.[142] Historian Heinz Hürten (professor emeritus at the Catholic University of Eichstaett) noted that the Nazi party had plans for the Roman Catholic Church, according to which the Church was supposed to "eat from the hands of the government." The sequence of these plans, he states, follow this sequence: an abolition of the priestly celibacy and a nationalisation of all church property, the dissolution of monasticreligious institutes, and an end to the influence of the Catholic Church upon education. Hutzen states that Hitler proposed to reduce vocations to the priesthood by forbidding seminaries from receiving applicants before their 25th birthdays, and thus had hoped that these men would marry beforehand, during the time (18 – 25 years) in which they were obliged to work in military or labour service. Also, along with this process, the Church's sacraments would be revised and changed to so-called "Lebensfeiern", the non-Christian celebrations of different periods of life.[143] There existed some considerable differences among officials within the Nazi Party on the question of Christianity. Goebbels is purported to have feared the creation of a third front of Catholics against their regime in Germany itself. In his diary, Goebbels wrote about the "traitors of the Black International who again stabbed our glorious government in the back by their criticism", by which Hutzen states meant the indirectly or actively resisting Catholic clergymen (who wore black cassocks).[144] Hitler called a truce in the Church conflict with the outbreak of war, wanting to back away from policies likely to cause internal friction in Germany. He decreed at the outset of war that "no further action should be taken against the Evangelical and Catholic Churches for the duration of the war". According to John Conway, "The Nazis had to reckon with the fact that, despite all Rosenberg's efforts, only 5 percent of the population registered themselves at the 1930 census as no longer connected with Christian Churches."[145] The support of millions of German Christians was needed in order for Hitler's plans to come to fruition. It was Hitler's belief that if religion is a help, "it can only be an advantage". Most of the 3 million Nazi Party members "still paid the Church taxes" and considered themselves Christians.[146] Regardless, a number of Nazi radicals in the hierarchy determined that the Church Struggle should be continued.[147] Following victory in Poland, the repression of the Churches was extended, despite their early protestations of loyalty to the cause.[148] Goebbels' Ministry of Propaganda issued threats and applied intense pressure on the Churches to voice support for the war, and the Gestapo banned Church meetings for a few weeks. In the first few months of the war, the German Churches complied.[149] No denunciations of the invasion of Poland, nor the Blitzkrieg were issued. On the contrary, Bishop Marahrens gave thanks to God that the Polish conflict was over, and "that He has granted our armies a quick victory." The Ministry for Church Affairs suggested Church bells across Germany ring for a week in celebration, and pastors and priests "flocked to volunteer as chaplains" for the German forces.[150] The Catholic bishops asked their followers to support the war effort: "We appeal to the faithful to join in ardent prayer that God's providence may lead this war to blessed success for Fatherland and people."[151] Likewise, the Evangelicals proclaimed: "We unite in this hour with our people in intercession for our Fuhrer and Reich, for all the armed forces, and for all who do their duty for the fatherland."[151] Even in the face of evidence of Nazi atrocities against Catholic priests and lay people in Poland, which were broadcast on Vatican Radio, German Catholic religious leaders continued their support of the Nazi war effort. They urged their Catholic followers to "fulfill their duty to the Fuhrer".[151] Nazi war actions in 1940 and 1941 similarly prompted the Church to voice its support. The bishops declared that the Church "assents to the just war, especially one designed for the safeguarding to the state and the people" and wanted a "peace beneficial to Germany and Europe" and called the faithful to "fulfill their civil and military virtues." [150] But the Nazis strongly disapproved of the sentiments against war expressed by the Pope through his first encyclical, Summi Pontificatus and his 1939 Christmas message, and were angry at his support for Poland and the "provocative" use of Vatican Radio by Cardinal Hlond of Poland. Distribution of the encyclical was banned.[152] Conway wrote that anti-church radical Reinhard Heydrich estimated in a report to Hitler of October 1939, that the majority of Church people were supporting the war effort - though a few "well known agitators among the pastors needed to be dealt with".[147] Heydrich determined that support from church leaders could not be expected because of the nature of their doctrines and internationalism, so he devised measures to restrict the operation of the Churches under cover of war time exigencies, such as reducing resources available to Church presses on the basis of rationing, and prohibiting pilgrimages and large church gatherings on the basis of transportation difficulties. Churches were closed for being "too far from bomb shelters". Bells were melted down. Presses were closed.[148] With the expansion of the war in the East from 1941, there came also an expansion of the regime's attack on the churches. Monasteries and convents were targeted and expropriation of Church properties surged. The Nazi authorities claimed that the properties were needed for wartime necessities such as hospitals, or accommodation for refugees or children, but in fact used them for their own purposes. "Hostility to the state" was another common cause give for the confiscations, and the action of a single member of a monastery could result in seizure of the whole. The Jesuits were especially targeted.[153] The Papal Nuncio Cesare Orsenigo and Cardinal Bertram complained constantly to the authorities but were told to expect more requisitions owing to war-time needs.[154] Rather than focusing on religious differentiation, Hitler maintained it was important to promote "an antisemitism of reason", one that acknowledged the racial basis of Jewry.[155] Interviews with Nazis by other historians show that the Nazis thought that their views were rooted in biology, not historical prejudices. For example, "S. became a missionary for this biomedical vision... As for anti-Semitic attitudes and actions, he insisted that "the racial question... [and] resentment of the Jewish race... had nothing to do with medieval anti-Semitism..." That is, it was all a matter of scientific biology and of community."[156] In his history of Christianity, Geoffrey Blainey wrote that "Christianity could not escape some indirect blame for the terrible Holocaust. The Jews and Christians had been rivals and sometimes enemies for a long period of history. Furthermore it was traditional for Christians to blame Jewish leaders for the crucifixion of Christ...", but, noted Blainey, "At the same time, Christians showed devotion and respect. They were conscious of their debt to the Jews. Jesus and all the disciples an all the authors of his Gospels were of the Jewish race. Christians viewed the Old Testament, the holy book of the synagogues as equally a holy book for them...".[157] Laurence Rees noted that "emphasis on Christianity" was absent from the vision expressed by Hitler in Mein Kampf and his "bleak and violent vision" and visceral hatred of the Jews had been influenced by quite different sources: the notion of life as struggle he drew from Social Darwinism, the notion of the superiority of the "Aryan race" he drew from Arthur de Gobineau's The Inequality of the Human Races; and from Alfred Rosenberg he took the idea of a link between Judaism and Bolshevism.[158] Hitler espoused a ruthless policy of "negative eugenic selection", believing that world history consisted of a struggle for survival between races, in which the Jews plotted to undermine the Germans, and inferior groups like Slavs and defective individuals in the German gene pool, threatened the Aryan "master race". Richard J. Evans wrote that his views on these subjects have often been called "social Darwinist", but that there is little agreement among historians as to what the term may mean.[159] According to Evans, Hitler "used his own version of the language of social Darwinism as a central element in the discursive practice of extermination...", and the language of Social Darwinism, in its Nazi variant, helped to remove all restraint from the directors of the "terroristic and exterminatory" policies of the regime, by "persuading them that what they were doing was justified by history, science and nature".[160] In the Appendix of The Nazi Persecution of the Churches, Conway has included a document: "List of sects prohibited by the Gestapo up to December 1938." It mentions the "International Jehovah's Witness" under No.1, but also includes a so-called "Study group for Psychic Research" and even the "Bahai Sect."[161] Astrologers, Healers and Fortune tellers were banned under the Nazis, while the small pagan "German Faith Movement", which worshipped the sun and seasons, supported the Nazis.[5] On October 13, 1933, Deputy FührerRudolf Hess issued a decree stating: "No National Socialist may suffer any detriment on the ground that he does not profess any particular faith or confession or on the ground that he does not make any religious profession at all."[162] However, the regime strongly opposed "godless communism"[163][164] and most of Germany's freethinking (freigeist), atheist, and largely left-wing organizations were banned the same year.[165][166] In a speech made during the negotiations for the Nazi-Vatican Concordant of 1933, Hitler argued against secular schools, stating: "Secular schools can never be tolerated because such schools have no religious instruction, and a general moral instruction without a religious foundation is built on air; consequently, all character training and religion must be derived from faith."[167] One of the groups closed down by the Nazi regime was the German Freethinkers League. Christians appealed to Hitler to end anti-religious and anti-Church propaganda promulgated by Free Thinkers,[168] and within Hitler's Nazi Party some atheists were quite vocal in their anti-Christian views, especially Martin Bormann.[169]Heinrich Himmler, who himself was fascinated with Germanic paganism,[170] was a strong promoter of the gottgläubig movement and didn't allow atheists into the SS, arguing that their "refusal to acknowledge higher powers" would be a "potential source of indiscipline".[21] Several elements of Nazism were quasi-religious in nature. The cult around Hitler as the Führer, the "huge congregations, banners, sacred flames, processions, a style of popular and radical preachings, prayers-and-responses, memorials and funeral marches" have been described by historian of Esotericism Nicholas Goodrick-Clarke as "essential props for the cult of race and nation, the mission of Aryan Germany and victory over her enemies."[171] These kinds of religious aspects of Nazism have led some scholars to consider Nazism, like communism, a kind of political religion.[172] Hitler's plans, for example, to erect a magnificent new capital at Berlin (Welthauptstadt Germania), has been described as attempting to build a version of the New Jerusalem.[173] Since Fritz Stern's classical study The Politics of Cultural Despair, most historians have viewed the relation of Nazism and religion in this way. Some historians see the Nazi movement and Adolf Hitler as fundamentally hostile to Christianity, though not irreligious.[who?] In the first chapter of The Nazi Persecution of the Churches, historian John S. Conway elaborates that Christian Churches in Germany had lost their appeal in the time of the Weimar Republic, and that Hitler offered "what appeared to be a vital secular faith in place of the discredited creeds of Christianity."[174] Hitler's chief architect, Albert Speer, wrote in his memoirs that Hitler himself had a negative view toward the mystical notions pushed by Himmler and Alfred Rosenberg. Speer quotes Hitler as having said of Himmler's attempt to mythologize the SS:[175] What nonsense! Here we have at last reached an age that has left all mysticism behind it, and now [Himmler] wants to start that all over again. We might just as well have stayed with the church. At least it had tradition. To think that I may some day be turned into an SS saint! Can you imagine it? I would turn over in my grave... Scholar of fascism, Stanley Payne notes that fundamental to fascism was the foundation of a purely materialistic "civic religion" that would "displace preceding structures of belief and relegate supernatural religion to a secondary role, or to none at all", and that "though there were specific examples of religious or would-be 'Christian fascists,' fascism presupposed a post-Christian, post-religious, secular, and immanent frame of reference."[176] One theory is that religion and fascism could never have a lasting connection because both are a "holistic weltanschauung" claiming the whole of the person.[177] Along these lines, Yale political scientist, Juan Linz and others have noted that secularization had created a void which could be filled by another total ideology, making secular totalitarianism possible,[178][179] and Roger Griffin has characterized fascism as a type of anti-religious political religion.[180] However, Robert Paxton finds that "Fascists often cursed ... materialist secularism" and adds that the circumstances of past fascism does not mean that future fascisms can not "build upon a religion in place of a nation, or as the expression of national identity. Even in Europe, religion-based fascisms were not unknown: the Falange Española, Belgian Rexism, the Finnish Lapua Movement, and the Romanian Legion of the Archangel Michael are all good examples".[181] Separately, Richard L. Rubenstein maintains that the religious dimensions of the Holocaust and Nazi fascism were decidedly unique.[182] There has been significant literature on the potential religious aspects of Nazism. Wilfried Daim suggests Hitler and the Nazi leadership planned to replace Christianity in Germany with a new religion in which Hitler would be considered a messiah. In his book on the connection between Lanz von Liebenfels and Hitler, Daim published a reprint of an alleged document of a session[clarification needed] on "the unconditional abolishment of all religious commitments (Religionsbekenntnisse) after the final victory (Endsieg) ... with a simultaneous proclamation of Adolf Hitler as the new messiah."[183] This session report came from a private collection. Griffin, RogerFascism's relation to religion in Blamires, Cyprian, World fascism: a historical encyclopedia, Volume 1, p. 10, ABC-CLIO, 2006: “There is no doubt that in the long run Nazi leaders such as Hiltz and Himmler intended to eradicate Christianity just as ruthlessly as any other rival ideology, even if in the short term they had to be content to make compromises with it.” Shirer, William L., Rise and Fall of the Third Reich: A History of Nazi Germany, p. p 240, Simon and Schuster, 1990: “And even fewer paused to reflect that under the leadership of Rosenberg, Bormann and Himmler, who were backed by Hiltz, the Nazi regime intended eventually to destroy Christianity in Germany, if it could, and substitute the old paganism of the early tribal Germanic gods and the new paganism of the Nazi extremists.” Dill, Marshall, Germany: a modern history , p. 365, University of Michigan Press, 1970: “It seems no exaggeration to insist that the greatest challenge the Nazis had to face was their effort to eradicate Christianity in Germany or at least to subjugate it to their general world outlook.” ^Bendersky, Joseph W., A concise history of Nazi Germany, p. 147, Rowman & Littlefield, 2007: “Consequently, it was Hitler’s long range goal to eliminate the churches once he had consolidated control over his European empire.” ^Dill, Marshall, Germany: a modern history , p. 365, University of Michigan Press, 1970: “It seems no exaggeration to insist that the greatest challenge the Nazis had to face was their effort to eradicate Christianity in Germany or at least to subjugate it to their general world outlook.” ^Bendersky, Joseph W., A concise history of Nazi Germany, p. 147, Rowman & Littlefield, 2007: “Consequently, it was Hitler’s long rang goal to eliminate the churches once he had consolidated control over his European empire.” ^Shirer, William L., Rise and Fall of the Third Reich: A History of Nazi Germany, p. p 240, Simon and Schuster, 1990: “And even fewer paused to reflect that under the leadership of Rosenberg, Bormann and Himmler, who were backed by Hitler, the Nazi regime intended eventually to destroy Christianity in Germany, if it could, and substitute the old paganism of the early tribal Germanic gods and the new paganism of the Nazi extremists.” ^Bendersky, Joseph W. (2007). A concise history of Nazi Germany. Rowman & Littlefield, p. 147: "Consequently, it was Hitler’s long rang goal to eliminate the churches once he had consolidated control over his European empire." ^Shirer, William L. (1990). Rise and Fall of the Third Reich: A History of Nazi Germany. New York: Simon and Schuster, p. 240: "And even fewer paused to reflect that under the leadership of Rosenberg, Bormann and Himmler, who were backed by Hitler, the Nazi regime intended eventually to destroy Christianity in Germany, if it could, and substitute the old paganism of the early tribal Germanic gods and the new paganism of the Nazi extremists." ^Dill, Marshall (1970). Germany: a modern history. University of Michigan Press, p. 365: "It seems no exaggeration to insist that the greatest challenge the Nazis had to face was their effort to eradicate Christianity in Germany or at least to subjugate it to their general world outlook." ^Charlotte Kahane - Rescue and Abandonment: The Complex Fate of Jews in Nazi Germany 1999 ".3 "The total number of Christians of Jewish descent in the Third Reich is estimated at around 200000 — although the true figure remains unknown, as many Mischlinge tried to hide their real status. The Jews remained unprotected " ^Richard J. Evans; In Search of German Social Darwinism: The History and Historiography of a Concept; a chapter from Medicine & Modernity: Public Health & Medical Care in 19th and 20th Century Germany; Press Syndicate of the University of Cambridge; 1997; pp.55-57 ^"The Nazi crusade was indeed essentially religious in its adoption of apocalyptic beliefs and fantasies including a New Jerusalem (cf. Hitler's plans for a magnificent new capital at Berlin)..." Nicholas Goodrick-Clarke, The Occult Roots of Nazism, p. 203.
The use of the oyster Saccostrea glomerata as a biomonitor of trace metal contamination: intra-sample, local scale and temporal variability and its implications for biomonitoring. Cu, Cd, Zn, Pb and Se concentrations were measured in the bivalve mollusc Saccostrea glomerata(Iredale and Roughly) from two uncontaminated locations, Clyde River Estuary, Batemans Bay and Moona Moona Creek, Jervis Bay, to determine natural variability of metals associated with mass, gender, age, tissue type and site within location. Trace metals were also measured in the Clyde River Estuary over an 11 year period and in five other NSW estuaries (Hastings River, Hunter River, Georges River, Tillgerry Creek and Lake Pambula) over a 13-month period to determine temporal variability and if diploid and triploid oysters accumulate trace metals differently. There were few significant relationships between trace metal concentrations and mass and no significant differences in trace metal concentrations between female and male oysters. Younger oysters (1.3 years) had significantly higher copper concentrations and higher trace metal variability than mature oysters (3 years). Different tissues have different trace metal concentrations with muscle tissues having lower concentrations. Considerable inherent variability occurs in oyster cohorts. Analysing specific tissues did not reduce variability of trace metal concentrations. Comparison of trace metal concentrations at two sites within the Clyde Estuary showed a significant difference in zinc concentrations. Cu, Cd, Zn and Se concentrations were generally higher and less variable in triploids than diploids. Pb had a variable pattern of accumulation with no consistent elevation in diploids or triploids. Inter annual variability of trace metal concentrations was considerable and trace metal concentrations also fluctuated throughout an annual cycle with no clear seasonal trends. Measurement of trace metals at known contaminated locations showed that Saccostrea glomerata accumulates metals in response to contamination. Saccostrea glomerata meet most of the requirements to be a biomonitor of trace metal contamination as they are abundant, sessile/sedentary, easy to identify, provide sufficient tissue for analysis, and accumulate trace metals in response to contamination. However, as trace metal concentrations can vary with mass, age, estuary position, ploidy type and temporally, care must be taken to collect individual organisms of similar mass, age and ploidy type to minimise variability, and from similar consistent positions and times to allow for seasonal changes in environmental conditions. Trace metal concentration variability is higher in young animals, thus to reduce variability, older mature animals could be selected. However, with immature oysters there are no complications because of the effects of spawning i.e. sudden loss of trace metals or body mass.
Law School Lecture Series Unravels the Financial Crisis Lexington, VA • Wednesday, March 10, 2010 The financial crisis that emerged in the U.S. in 2007 has wrought havoc on financial systems and economies around the world. In a series of lectures between Mar. 16 and 22, Washington and Lee law faculty will discuss the causes and consequences of the crisis. This lecture series is sponsored by the American Constitution Society and the Business Law Society. The events are open to the public at no charge. On Tuesday, Mar. 16, Prof. Christopher Bruner will provide an overview of the crisis, describing the dangerous build-up of leverage and risk in the U.S. financial system through the development of complex "securitized" financial products, notably mortgage-backed securities. On Thursday, Mar. 18, Prof. Adam Scales will describe the role of credit default swaps in the crisis and assess the regulatory challenges they pose. And finally, on Monday, Mar. 22, Prof. Lyman Johnson and Prof. David Millon will join Bruner and Scales for a panel discussion on various regulatory efforts to contain the damage and reform the financial system to prevent such a catastrophe from occurring again.
Q: How to synchronize directories outside the Google Drive directory I installed Google Drive and want to use it in order to backup some data scattered across my HDD. I cannot get it to use these different directories because I can set only one folder in Google apps. I tried to create junctions and hard links to the outer directories, however it does not work ... any ideas how to correctly set it? A: You could use what I used when I had the same issue with Dropbox. And that's to use: NTFS Junction Points like you said. It's pretty much a worm hole in the file system that makes a shortcut without appearing like one to applications. There are downsides to using these as an antivirus would scan both folders (despite physically being the same), amongst other things. Try something like Junction Link Magic instead of command lines if it helps. Update: it appears JLM does not create junction points the way we wanted. Instead use Junction Master which creates hard links, and that will lie to applications the way we need it to. You can read more here. Creating a link in Junction Master will allow Google Drive to see it in the options. If we look at it in terms of shortcuts, consider a Junction Link as the shortcut file, and Destination as the original location. And consider looking at tutorials to do this for Dropbox, as Google Drive similarly has only a single sync folder. Oh and I'd avoid juntion points between drives! A: I have significant experience with Junction Points and Symlinks and note the following results: Junctions & SymLinks inside the Google Drive directory did NOT sync Hardlinks offered no direct solution Moving the actual directory to the Google Drive and creating the Junction from the ORIGINAL location TO the NEW (Google Drive) location DID sync (probably this would work for SymLinks as well) Also: I haven't seen a problem with having junctions cross (LOCAL) drive boundaries (C: -> F:) and have done this extensively over the years). SymLinks are required to cross MACHINE boundaries (C: -> NetworkShare). It's a PITA to move the directory and then link (and feels 'unnatural') but it works fine that way. A: You could drag the actual folder to the Google Drive folder. Then create a shortcut to it where you originally had the folder.
Red Wharf Bay Traeth Coch (Welsh for "red beach") is a wide sandy bay and an area of outstanding natural beauty on the east coast of the island of Anglesey in Wales. The bay is also known in English as Red Wharf Bay and lies between the villages of Pentraeth and Benllech. It is also close to Castell Mawr Rock, thought to be the site of an Iron Age fort. Red Wharf Bay beach itself has an immense expanse of sand; at low tide almost of sand is uncovered. The sand and the sea life disappears beneath the waves twice a day and reappears just a few hours later. Village The village of Red Wharf Bay is situated on the western shore of the bay. It is small but perfectly formed. The village is linked to Benllech and Pentraeth via the Anglesey Coastal Path. Red Wharf Bay offers convenient places to eat or drink, with three restaurants—The Tavern on the Bay, The Ship Inn, and The Boathouse—all boasting stunning views of the bay. Wildlife The bay attracts an abundance or wildlife, including a large number of waterfowl and wading birds, such as oystercatchers, shelduck, purple sandpipers, curlew and dunlin. The bay is bordered by salt marshes and sand dunes. Some of these dunes are rich in shell fragments that support the flora common to lime-rich areas, including the pyramidal orchid. Events Each year the Red Wharf Bay Sailing Club Anglesey Offshore Dinghy Race takes place from Beaumaris to Traeth Bychan. The race runs up the Menai Strait and down the Anglesey coast. History There was once a railway line which terminated at the bay, the Red Wharf Bay branch line, which left the Anglesey Central Railway at Pentre Berw. Stone for the Admiralty Arch, Holyhead was quarried near the bay. References External links 360 Panoramic view of Red Wharf Bay (North side)- uses QuickTime Category:Llanfair-Mathafarn-Eithaf Category:Pentraeth Category:Bays of Anglesey
Occurrence of Ichthyophthirius multifiliis within the peritoneal cavities of infected channel catfish Ictalurus punctatus. Ichthyophthirius multifiliis is a ciliated protozoan parasite that infects the skin and gills of freshwater fish. This report describes the unusual finding of I. multifiliis within the peritoneal cavities of experimentally infected channel catfish Ictalurus punctatus. Twenty catfish fingerlings were exposed to I. multifiliis theronts using a standardized protocol. Five infected fish and 2 control fish were killed at various time points after infection and their tissues examined. Formalin-fixed, paraffin embedded sections were processed for light microscopy and immunohistochemical detection of I. multifiliis immobilization antigen. Trophonts were observed in skin and gill sections of all exposed fish. Parasites were associated with epithelial hyperplasia, focal areas of cellular disruption and necrosis. In addition to these usual sites of infection, individual trophonts were unexpectedly found within the peritoneal cavities of 4 fish. Staining for parasite antigen facilitated their detection within abdominal adipose tissue or adjacent to intestines. This discovery is interesting as it suggests I. multifiliis may be found in tissues other than the skin and gills during the course of a normal infection.
Rated 4 / 5 stars2014-09-01 19:10:32 Rated 4 / 5 stars2014-08-07 14:04:15 Very funny stuff. A must see for anyone who loves MGS. However, a warning to those who aren't familiar with this game: If you watch this, you're not gonna get it. So, track down and play a copy of MGS before doing so. Also, fuck you for having never played MGS before.
How To Make Sandals Work With Every Outfit How To Make Sandals Work With Every Outfit There's something about an open-toe shoe that's simply irresistible between now and September. (Heck, we'll don 'em with socks for the colder months, too.) And, fun fact: There's nothing they don't match. That powder-blue suit you got dry cleaned for your Monday-morning meeting? Pair it with a white strappy sandal to complement the pastel hue. For date-night shoes that won't destroy your arches, mid-heels will keep you prepared for impromptu, romantic strolls. And, we wouldn't even consider running errands in anything but our trusty Birkenstocks. While shoe shopping to your heart's content is okay by us, it's only one piece of the sartorial puzzle. That's why we crafted five perfect sandal outfits to take you from work to gallery openings to everything in between. After a fresh pedicure, your feet will sincerely appreciate the air time.
Prevalence and risk factors of myocardial remodeling in hemodialysis patients. Left ventricular hypertrophy (LVH) is an independent risk factor for morbidity/mortality in patients with end stage renal disease (ESRD). Our study aimed to identify prevalence as well as independent risk factors that contribute to the development of LV geometric remodeling in our HD patients. The left ventricles of 116 HD patients were classified echocardiographically into four different geometric patterns on the basis of LV mass and relative wall thickness. Furthermore, we measured inferior vena cava (IVC) diameter and its collapsibility index (CI) by echocardiography. Finally, we modeled a stepwise multiple regression analysis to determine the predictors of LV geometry. Our study provides evidence that HD patients had a prevalence of abnormal LV geometry in 92% and LVH in 81%. We found all four geometric models of LV. Most dominant were eccentric LVH. Concentric LVH was observed in 37, normal geometry (NG) in 9, and concentric remodeling (CR) in 13 of HD patients. Mean arterial blood pressure was significantly higher in the cLVH group (95 +/- 10 mmHg) than in the NG and CR groups (81.6 +/- 12.3 and 80 +/- 11.8, respectively, p < 0.001). The cLVH and eCLVH groups had significantly lower mean hemoglobin (10.3 +/- 1.4 g/dL and 10.6 +/- 1g/dL, respectively) compared with the NG group (11.9 +/- 1.4 g/dL), p < 0.001. Furthermore, interdialytic weight gain (kg) was significantly higher in eCLVH group (3.13 +/- 0.8) than in NG group (2.3 +/- 1.1), p < 0.001. Mean IVC index of the eLVH group (10.83 +/- 2.07 mm/m(2)) was significantly higher than corresponding indexes of NG (10.83 +/- 2.07 mm/m(2)), CR (8.31 +/- 1.32 mm/m(2)) and cLVH (8.12 +/- 2.06 mm/m(2)) groups (p < 0.001 for each comparisons). Mean arterial pressure, hemoglobin, IVC index, and interdialytic weight gain were found to be independent predictors of LV geometry (R(2) = 0.147; p < 0.001) in HD patients.
A bench headed by Chief Justice Altamas Kabir posted the hearing on the plea for July 13. The Centre had on February 20 notified final award of the Cauvery Waters Dispute Tribunal, six years after the order was passed by the tribunal. As per the law, Cauvery Management Board and Cauvery Water Regulation Committee are to be be constituted which will have representatives from all the co-basin states, experts in hydrology and agriculture. They will be headed by an officer of the central government and will be under the control of the Centre. The tribunal, comprising chairman Justice N P Singh and members N S Rao and Sudhir Narain, in a unanimous award in February 2007 had determined the total availability of water in the Cauvery basin at 740 TMC feet at the Lower Coleroon Anicut site. The proceedings of the tribunal, set up in June 1990, went on for more than 16 years. In what was then described as a balancing act, the tribunal gave Tamil Nadu 419 tmc of water (as against the demand of 562 tmc); Karnataka 270 tmc (as against its demand of 465 tmc); Kerala 30 tmc and Puducherry 7 tmc. For environmental protection, it had reserved 10 tmc.
Swiss auction house HDV (Hotel des Ventes) was established in 1978, and in 2006 acquired by Bernard Piguet – by that time an art dealer with 20 years of experience in the art market. In September 2016 the auction house celebrated its 10th anniversary. During this period Piguet – Hotel Des Ventes has become the fastest-growing auction house in the French-speaking part of Switzerland with the turnover grown from CHF 1,2M to CHF 22M (2016). Today its team numbers 30 employees including 15 specialists. Besides traditional auctions each year in December, Bernard Piguet runs “Russian art auctions”, which have become the biggest in Switzerland. Château de Gingins Château d'Hauteville Villa «Aigue-Marine» Bernard Piguet run auctions with exceptional results at Chateau de Gingins in 2013; Chateau d’Hauteville in 2015; at the villa of Molly de Balkany «Aigue-Marine» in 2017. The 10th anniversary of the auction house was met with the new logo, new name and new website. The website piguet.com has been technologically improved by the introduction of new functions, such as the opportunity of direct contact with the specialist and the option of online bidding, while following the auction online at the same time. Bernard Piguet is targeting the expansion of the international reach of the auction house: Piguet – Hotel Des Ventes Team «Due to the growing number of international buyers at auctions, the name “Hotel des Ventes” is no longer suitable. Our new name and logo should allow us to be more understandable in English. The website address is also changed from hoteldesventes.ch to piguet.com» emphasizes Bernard Piguet. Although the auction house of Mr. Piguet seeks modernisation and development, Mr. Piguet does not forget the values, which provided him strong reputation: the development of his auction house is more an evolution rather than a radical change. At Piguet – Hotel des Ventes all lots with the estimate higher than 2000 CHF are checked with The Art Loss Register. Auctioneer Bernard Piguet Auctioneer Bernard Piguet Bernard Piguet had a dreamt of becoming an auctioneer since his childhood. In the beginning of his career Mr. Piguet received experience working with the law firm, after which he graduated with business degree from HEC Lausanne, and later studied at Sotheby’s Institute of Art. For six years Mr. Piguet worked at jewellery department of Sotheby’s in Geneva. Having accumulated all the experience, he decided to create his own auction house according to the business plan of the present auction house Piguet – Hotel des Ventes. Bernard Piguet is a grandson of the founder of Banque Piguet & Cie SA, which had existed since 1856, and now is a part of Banque Cantonale Vaudoise. He is also related to the famous Paris-based fashion designer Robert Piguet, who was a mentor for Christian Dior, Pierre Balmain and Hubert de Givenchy. 12-15 March 2018 spring auction to be held at Piguet – Hotel des Ventes in Geneva, Switzerland. The portrait of legendary Edmonde Guy by Kees van Dongen to be offered at auction together with the paintings of Swiss painters, modern and contemporary artwork. Next... Letters, postcards and photographs of Olga Alexandrovna Romanova and Xenia Alexandrovna Romanova from the collection of Ferdinand Thormeyer to be offered at auction at Piguet – Hotel des Ventes 11-14 December 2017. Next...
[Erythrocyte metabolism during chemotherapy in pulmonary tuberculosis patients]. Pre- and posttreatment (13 months after polychemotherapy) activity of key bioenergetic enzymes (LDG and G-6-FDG) and enzymes of antioxidant defense (GPO and GR) was measured in red cells of 88 patients with pulmonary tuberculosis. Pretreatment red cell metabolism of such patients was characterized by compensatory and pathological changes: LDG and GR activity enhanced, while G-6-FDG and GPO activity inhibited. Three months after the treatment LDG, GPO and GR activities completely or partially returned to normal values. G-6-FDG activity in quick treatment responders remained low, in poor response this enzyme activity tended to a decrease. Administration of riboxin as the antihypoxant or ascorbic acid as the antioxidant prevented progressive inhibition of G-6-FDG activity during the chemotherapy and led to a significant improvement of the treatment results.
The Department of Geography offers a program which has three principal objectives: to promote the understanding of the locational dimensions of human behavior in their environmental context; to offer a curriculum where geographic concepts and methods are applied to understanding economic, environmental and social problems at the urban and regional scale; and to promote international understanding through area studies. Thus, the purposes of the program are to contribute an important dimension to the university student's liberal education and to provide practical training in important contemporary areas of concern as well as the background appropriate for certain vocations. Graduating majors of the department have found careers in business and industry, in urban and regional planning agencies, in departments of federal and state governments, and in teaching. Job titles include city or regional planner, cartographer, demographer, resource analyst, land or economic developer, location analyst, and teacher. Many graduates find that an undergraduate degree in geography is an excellent foundation for advanced graduate work or professional training in planning, business or law. Special facilities of the department include fully equipped laboratories in computer cartography, geographic information systems, remote sensing, and physical geography with a variety of other specialized locational analysis programs for both instruction and research. Geography Major (Bachelor of Arts) Required: 122 semester hours Concentrations Urban Planning Earth Science/Environmental Studies The Geography Major requires four courses from a selection of fourteen and requires a minimum of 24 semester hours in geography above the 100-level. Students may elect a general geography major or they may complete additional courses for a concentration in Urban Planning or Earth Science/Environmental Studies. All students must meet the All-University Liberal Education Requirements (AULER). The College of Arts and Sciences, however, has established liberal education requirements for its programs which, while including those of AULER, contain additional requirements in several categories. Therefore, students following this program should adhere to the College requirements. Please note that students who satisfy the College Liberal Education Requirements (CLER) will also satisfy the All-University Liberal Education Requirements (AULER). See College requirements and courses meeting AULER/CLER requirements. Major Requirements A minimum of 24 hours in geography above the 100-level. Only grades of "C-" or higher will count toward completion of the major and concentrations. Core Courses for Geography Major and Concentrations 1. One geographic techniques course from GEO 321, 322, 323 2. One earth science course: GEO 103 3. One human geography course from GEO 105, 114, 202, 301, 302, 303 4. One regional geography course from GEO 102, 104, 313, 344 Urban Planning Concentration The inter-regional shift of people and jobs in the United States and elsewhere over the past decades coupled with the movement away from large central cities has increased the need for formal urban and regional planning. Planners are needed in the private sector as well as in state and local governments to provide the appropriate kinds of economic and community development that will ensure a high quality of life in both developed and developing countries. In a growth region like the Southeast, geographers with a planning background are in increasing demand. In addition to the core courses in geography listed above, students choosing this concentration are required to take GEO 202, 301 and 105 or 303, plus five courses from the following: GEO 302, 320, 321, 322, 344, 502, 522, 533. Earth Science/Environmental Studies Concentration A central theme of geography is human interaction with the earth's physical environment. This concentration permits students to apply the basic scientific principles of physical geography, cartography and natural resource analysis to the problem of ensuring a high quality of life through maintenance of the natural processes that support human existence. This concentration also provides training to enhance the employment opportunities of students with a strong interest in environmental assessment and resource evaluation. In addition to the core courses in geography listed above, required courses for students choosing this concentration are GEO 311, 311L, 314, 314L, and five courses selected from the following: GEO 205, 305, 312, 321, 323, 330, 521, 523. Related Area Requirements for General Geography Major No specific additional courses beyond the core are required. Suggested courses in other departments and schools are recommended by the department, depending on the interest of the student. Geography As A Second Major A student may obtain a second major in geography along with any other major. The student should take 24 hours, including four core courses listed above for the Geography Major. Students considering this option should consult a faculty member in the department. Geography Minor Any six courses (18 semester hours) constitute a minor, but the following suggested course sequences will be of interest to certain students pursuing specific majors and with certain career objectives such as planning, environmental conservation, or business: 5. Geography Minor for majors in the School of Business and Economics - For the major who wishes to acquire knowledge of industrial location, international trade, demographic change and environmental impact any six courses from: 103, 105, 202, 301, 302, 303, 344, 522, 533. Teacher Licensure in Social Studies Students seeking teacher licensure should see "Teacher Education" in Part 7. Licensure in social studies is available for geography majors. See Teacher Licensure in Social Studies in Teacher Education Programs. Majors planning to teach geography/social studies in the secondary schools should plan their programs to include one of the following: GEO 102, 104, or 344 and one of the following courses: GEO 105, 114, or 202. Geography Courses (GEO) Courses For Undergraduates 102 The Historical Geography of the Western World (3:3). A study of the geographical factors which combine to form the major cultural regions of North America, Europe, and Australia-New Zealand. [HP, CHP-CMO]. 103 Introduction to Earth Science (3:3). Survey of basic concepts and processes integrating the nature of the earth's three primary physical systems: the solid earth and continents; the ocean basins and the oceans; and the atmosphere's weather. [NS, CPS]. 104 The Geography of the Nonwestern World (3:3). A study of the geographical factors which combine to form the major culture regions of Africa, Asia, and the Soviet Union. [NW, CNW]. Introduction to the nature, origin, processes, and dynamics of the atmosphere. Consideration also of human modification of the atmosphere and of climatic change. [NS, CPS]. 311L Climatology Laboratory (1:0:3). Pr. concurrent registration in 311. Laboratory work to accompany 311. [NS, CPS]. 312 Geomorphology of North America(3:3). A survey of the various landscape regions of the North America. Emphasis on the relationships between the geologic, erosional, and climatic processes occurring in each region. 313 Natural Resource Regions of North America (3:1:6). Pr. 103 or 314 and permission of instructor. Regional natural resource use and associated human interaction with the natural environment. Instruction takes place during an extended field trip across portions of North America. 314 Physical Geography: Landscape Processes (3:3). Pr. 103 or equivalent, and concurrent registration in GEO 314. Examination of the processes responsible for the development of the earth's varied terrain characteristics. Analysis of environmental problems involving human impact on landscape and river systems. [NS, CPS]. 314L Physical Geography Laboratory (1:0:3). Pr. concurrent registration in GEO 314. Laboratory demonstrations and map interpretation exercises to accompany GEO 314, which must be taken concurrently. [NS, CPS]. The science of cartography with an emphasis on the use of maps as descriptive and analytical tools. Laboratory work introduces computer mapping, compilation, design, and symbolization. 322 Research Methods in Geography (3:3). Use of the scientific method, data collection, spatial analysis, and technical writing. Development of fundamental research and quantitative skills in geography. 323 Remote Sensing (3:2:3). Acquisition, analysis, and interpretation of digital and photographic imagery. Emphasis on use of satellite and aircraft imagery for classification and monitoring of the earth's physical and cultural landscape. 330 Elements of Hydrology (3:3). Pr. 103 or 311 or 314, or consent of instructor. Introduction to the origin, properties, occurrence, circulation of the waters of the earth, including the application of hydrologic techniques for the evaluation of regional water budgets and problems relating to the conservation of water resources. 338 Regions of Latin America (3:3). Geographic distinctiveness of Latin American regions, with an emphasis upon the physical foundation, bases of past development, and recent transformation. Major consideration given to Mexico/Central America, Peru/Bolivia, and Brazil. 344 Geography of the United States and Canada (3:3). Study of the human and physical characteristics of the United States and Canada, with emphasis on the former. [SB, CSB]. 490 Special Problems in Geography (3). Pr. consent of faculty member with whom student wishes to work and at least 3 hours of previous work in geography. Opportunity for advanced students to undertake independent study of field research of special interest. 491 Current Topics in Population (3:3). May be repeated for credit when topic varies. Multidisciplinary seminar dealing with major topics concerned with national and international issues. (Not offered every year.) 493 Honors Work (3-6). See prerequisites under Honors Program, XXX 493. May be repeated for credit if the topic of study changes. 495 Internship in Geography (3:0:9). Pr. written permission required before registering for the internship. Practical experience in a professional setting related to the student's main topic of interest. Includes a research paper linking the topic to the experience. (FA,SP,SU) Courses For Advanced Undergraduates and Graduate Students 502 Urban Planning (3:3). Pr. 302 or consent of instructor. Experiences in planning and primary concepts and procedures utilized by planners in city and local government agencies for improving the quality of the urban environment.
When Bridget’s parents came to town, we knew we’d found the perfect excuse to return to C-House. C-House is classy, comfortable, and daring without the weirdness of micro-gastronomy — in short, the perfect place to impress the folks without breaking the bank. We think it meets exacting foodie muster, too. Listen to the podcast and tell us if you agree.
## Part 6: working with lists This is the last section before we're done implementing the language, and compared to the last part it should be relatively easy. Any proper language needs good data structures, and *lists* are one of them. To be able to work properly with lists, we’ll introduce four new forms to our language: - `cons` is used to construct lists from a "head" element, and the rest of the list (the "tail"). - `head` extracts the first element of a list - `tail` returns the rest of the elements, once the first is dropped. - `empty` takes a list as input, and returns `#t` if it is empty and `#f` otherwise. Go on then, finish your language. ```bash nosetests tests/test_6_working_with_lists.py --stop ``` ### What's next? With the language implementation done, it's time to use our language in [part 7](7.md).
DECEMBER JOBS: Hiring And Unemployment Steady This is an archived article and the information in the article may be outdated. Please look at the time stamp on the story to see when it was last updated. DECEMBER JOBS: Hiring And Unemployment Steady NEW YORK (CNNMoney) — Hiring remained moderate at the end of the year as employers appeared undaunted by the fiscal cliff gridlock in December. Overall, the labor market’s performance in 2012 was pretty lackluster and hiring was not strong enough to get the nation out of its economic rut, economists said. The economy added 155,000 jobs in December, bringing the total number of jobs created in 2012 to 1.84 million, the Labor Department said Friday. The unemployment rate held steady at 7.8%. Economists surveyed by Briefing.com expected the report to show that 150,000 jobs were created last month and the unemployment rate remained unchanged. Friday’s report reflected revisions the Labor Department made for 2012, which included raising the November unemployment rate to 7.8%, up from the original 7.7%. The private sector continued to drive the growth, adding 168,000 jobs, while government employers shed 13,000 positions. Employment increased in health care, food services and drinking places and manufacturing. Construction jobs were also up, likely as a result of rebuilding efforts after Hurricane Sandy. Friday’s report appeared a day after a separate survey by payroll processor ADP showed private employers boosted their hiring last month, adding 215,000 jobs. But December’s overall figures were only slightly better than 2012’s average growth of 153,000 per month, which mirrored the 2011 pace. That’s not enough to make a significant dent in the unemployment rate, economists said. Still, it seems clear the labor market is less resilient than it has been for much of the post-World War II period, said Patrick O’Keefe, director of economic research at CohnReznick. “The job market doesn’t appear to have the bounce it once did,” he said. There remains a deep hole left by the financial crisis and millions are still out of work. The number of long-term unemployed stayed essentially unchanged at 4.8 million, or 39.1% of the jobless. One positive note is that there was a notable rise in the number of unemployed re-entering the market, O’Keefe said. The figure jumped nearly 8% in December, possibly signaling a renewed sense of optimism among the jobless. Wage growth also remained unimpressive, with average hourly earnings rising 2.1% in 2012. But that was not sufficient to keep pace with rising prices. “It’s better than backsliding, but it’s not enough for workers to get ahead of inflation,” O’Keefe said.
Lidice (film) Lidice (also known as Fall of the Innocent in the UK) is a 2011 Czech drama film produced by Adam Dvořák from a screenplay by Zdenek Mahler. It was initially directed by Alice Nellis, but after she contracted Lyme disease (borreliosis), Petr Nikolaev took over. It tells a story involving the Nazi massacre at—and destruction of—the Czech village of Lidice. It was released in June 2011. The film is streaming on Amazon Prime under the title Fall of the Innocent (US, 15 April 2018). The budget of the film was around 65-70 million Kč (around US $4 million). Plot The film is presented as a true story set during World War II. With the German takeover of Europe under way, the deputy Reichsprotektor Reinhard Heydrich arrives in Prague and his underlings begin enforcing his authority in the towns and villages across the occupied country. In Lidice, the film's main protagonist, František Šíma, is sent to prison following a family dispute that boils over resulting in the accidental death of one of his sons. During Šíma's incarceration one of the other villagers, Václav Fiala, strings along his mistress with lies about his bravery as a resistance fighter against the Germans. Heydrich is assassinated and during the Gestapo investigation that follows, a letter Fiala has written describing his supposed heroism comes to their attention. It leads to the total destruction of Lidice and the mass execution and deportations of its citizens. Throughout the atrocity, Šima remains in jail, where news of what happened is kept from him. On his release, he returns to Lidice, where he finds the village has been obliterated and finally learns of the tragic events. Cast Karel Roden as František Šíma Zuzana Fialová as Marie Vaňková Zuzana Bydžovská as Anezka Símová Marek Adamczyk as Václav Fiala Veronika Khek Kubařová as Anička Roman Luknár as Vlček Ondřej Novák as Karel Síma Adam Kubista as Eda Síma Norbert Lichý as Mayor Jan Budař as Safecracker Petiška Václav Jiráček as Josef Horák Joachim Paul Assböck as Harald Wiesmann Sabina Remundová as Tonicka Farská Anna Kratochvílová as Ruzenka Ondrej Havel as Toník Marika Soposká as Helenka Detlef Bothe as Reinhard Heydrich Production Filming started on 26 July 2010 at the Mladá Boleslav prison, with Karel Schwarzenberg attending the first cut. The shoot lasted 49 days and involved locations including Nové Strašecí, and a secondary school in Kladno. The scenes portraying Lidice were shot at the village of Chcebuz near Štětí. The first promotional posters appeared at the film festival in Karlovy Vary 2010 on 8 July 2010. References External links Fall of the Innocent https://www.amazon.com/Fall-Innocent-Karel-Roden/dp/B079NL6HTB Category:2011 films Category:2010s war drama films Category:Czech films Category:Slovak films Category:Czech-language films Category:World War II films based on actual events Category:Films about Operation Anthropoid Category:Films about war crimes Category:Films set in 1938 Category:Films set in 1939 Category:Czech war drama films Category:Slovak drama films Category:Films about massacres
Evangeline Russell Evangeline Frances Russell (August 18, 1902 – February 22, 1966) was an American actress known for her work on silent Westerns of the 1920s. She was the daughter of actor John Lowell Russell and screenwriter Lillian Case Russell. Her brother was Academy Award–nominated cinematographer John L. Russell. Biography Russell was born in Manhattan to actor John Russell Lowell and screenwriter Lillian Case Russell. She had a brother, John L. Russell, who became a cinematographer. She was noted as an expert horsewoman and race car driver. She pursued a career as an actress in Westerns, often playing the wife of characters played by her father (in scripts written by her mother). Her credits include films like The Isle of Sunken Gold, The Big Show, and Lost in a Big City. She was something of a method actor; she recounted trying to harden her feet by walking barefoot for six weeks in preparation for a role in 1927's Hawk of the Hills. Russell was married at least five times; her husbands included director William P.S. Earle (her final husband), producer J. Stuart Blackton, Roy Wayne, actor Carey Harrison, and rancher Raymond Claymore; she divorced him when she found out he was "a full-blooded Indian".. She had two children with Harrison, neither of whom were interested in the family business. After Blackton (whose fortune was lost in the Great Depression) died in a car accident in 1941, she fell on hard times, taking on work as a babysitter, stuntwoman, extra, and taxi driver to supplement her income and support her children. She died in Los Angeles in 1966; she was survived by Earle and her two children, Frank and Elizabeth, from her marriage to Harrison. Selected filmography Hawk of the Hills (1929) The Isle of Sunken Gold (1927) Hawk of the Hills (1927) The Big Show (1926) Married? (1926) It Might Happen to You (1925) (short) Red Love (1925) Floodgates (1924) Lost in a Big City (1923) References Category:20th-century American actresses Category:American film actresses Category:Actresses from New York City Category:1902 births Category:1966 deaths Category:Western (genre) film actresses Category:American silent film actresses
INTRODUCTION {#h0.0} ============ Many pathogenic bacteria have evolved specialized virulence proteins, known as effectors, which are secreted into the host during the infection process. These proteins modulate a variety of host-driven processes for the benefit of the bacterium, such as immune evasion or modulation of the host cell to promote a replication-permissive environment. Effectors drive many of the physiological effects that are attributed to an infection. Thus, it is desirable to elucidate the interactions occurring between the effector protein and its host target(s) ([@B1] [@B2] [@B3]). Translocation of effectors from the bacterium into the host is achieved via a variety of mechanisms, including specialized secretion systems, the flagellum, and vesicular secretion ([@B4]). The type III secretion system (T3SS) evolved from the flagellar apparatus and represents a common mechanism for secretion of effector proteins. Consequently, it is used by many Gram-negative bacteria to support pathogenesis ([@B5], [@B6]). The T3SSs are particularly common among the pathogenic members of the *Enterobacteriaceae* family of bacteria, which includes the genera *Salmonella*, *Escherichia*, *Yersinia*, *Klebsiella*, *Enterobacter*, and *Citrobacter*. Interestingly, effectors usually have low sequence similarity to other proteins; even orthologous effectors of related pathogens have limited sequence identity ([@B7], [@B8]). This phenomenon is partly driven by horizontal gene transfer events with apparent strong selective pressures for effectors mediated by host defense processes rather than inheritance from a common ancestor ([@B9]). While bacterial effectors and their host interaction partners have been studied for some time, the diversity of effectors offers opportunities to systematically discover and evaluate interactions between effectors and host proteins. Protein-protein interaction screens, including yeast two-hybrid (Y2H) assays, fluorescent resonance energy transfer (FRET) analyses, mutagenesis with phenotype assays, and coimmunoprecipitations (co-IP), have increased our understanding of effector-driven pathogenesis ([@B10]). An alternative technique is that of affinity purification (AP) followed by mass spectrometry (AP-MS) ([@B11]), which is highly sensitive and benefits greatly from parallelization to provide greater specificity of interactions ([@B12]). In addition, the use of known contaminant protein databases ([@B13]) and of statistical methods ([@B14]) has further improved the confidence of identifications and reduced the false-discovery rates of AP-MS. Here we selected a set of effectors from two *Enterobacteriaceae* species, *Salmonella enterica* serovar Typhimurium and *Citrobacter rodentium*, to apply an AP-MS method, leading to the identification of 75 effector-host protein interactions. We validated several effector-host protein interactions, including a previously characterized interaction, such as the *Salmonella* effector SspH1---host kinase PKN1 interaction, by Western blot analysis. To illustrate the potential of our approach, we further studied the interaction between the host mitogen-activated protein (MAP) kinase, extracellular signal-regulated kinase 2 (ERK2), and *Salmonella* secreted effector protein SsrB regulated factor H (SrfH), also known as *Salmonella* secreted effector I (SseI). This interaction was shown to also affect the phosphorylation of ERK2, which implies a role in the regulation of this kinase's activity. RESULTS AND DISCUSSION {#h1} ====================== Identification of novel host binding partners of bacterial secreted effectors by AP-MS. {#s1.1} --------------------------------------------------------------------------------------- To identify host targets of bacterial effectors, we used recombinant proteins from two members of the *Enterobacteriaceae* family, *Citrobacter rodentium* and *Salmonella* Typhimurium, as bait for *in vitro* AP-MS. Since *C. rodentium* infects epithelial cells and since *S*. Typhimurium infects leukocytes and epithelial cells, APs were performed using HeLa and RAW 264.7 macrophage-like cell lysates, respectively. Following AP, samples were digested with trypsin and subjected to liquid chromatography-tandem mass spectrometry (LC-MS/MS) for peptide identification and quantification. Then, we filtered the resulting data using the abundance of interacting proteins in the AP sample relative to that of the no-bait control and the statistical score provided by the SAINT ([s]{.ul}ignificance [a]{.ul}nalysis of the [int]{.ul}eractome) tool ([@B15]). The well-characterized interaction between the *Salmonella* effector SspH1 and the host protein kinase PKN1 ([@B16], [@B17]) was used as a guide to filter the data that included proteins with at least 10-fold enrichment in the affinity purification versus non-bait-containing samples and a SAINT probability score larger than 0.6 ([Fig. 1](#fig1){ref-type="fig"}; see also [Table S1](#tabS1){ref-type="supplementary-material"} in the supplemental material). Data from host proteins that interacted with more than 3 effectors ([@B12]) or had above 10 spectral counts on average in the CRAPome database ([@B13]) were considered to represent nonspecific interactions and were also filtered out of the final data set. Since many of the interactions that failed to meet these criteria can represent false negatives, they were separated into a group of intermediate-confidence interactions. Interactors that were highly (\>10-fold) enriched in the affinity purification but had a poor SAINT probability score and interactors that had a high (\>0.6) SAINT score but showed lower (\<10-fold) enrichment were considered to represent intermediate-confidence interactions (see [Table S1](#tabS1){ref-type="supplementary-material"}). The intermediate-confidence interactors also included hits that were filtered out on the basis of their binding to multiple bait proteins and of their presence in the CRAPome database. 10.1128/mSystems.00032-15.5 Identified *Salmonella* effector-host protein interactions. *Salmonella* effectors fused to SBP tags were submitted to coaffinity purifications using RAW 264.7 cell lysates and analyzed by liquid chromatography-tandem mass spectrometry. Quantitative analysis was performed with spectral counts, and interactions were tested for significance using SAINT. Download Table S1, XLSX file, 0.03 MB. Copyright © 2016 Sontag et al. 2016 Sontag et al. This content is distributed under the terms of the Creative Commons Attribution 4.0 International license . ![Identification of host targets of *Salmonella* secreted effector proteins. (A) Network of *Salmonella* secreted effector proteins (green elliptical nodes) and host targets (rectangle nodes). The host targets are colored according to their fold enrichment in the affinity purification compared to control levels, and the edges are represented according to the significance score calculated by SAINT. (B to G) Several identified interacting pairs were validated by Western blot experiments as follows. (B) *Salmonella* effector SspH1 and host kinase PKN1. (C) *Salmonella* effector GtgE and host tyrosine kinase LYN. (D) *Salmonella* effector GtgE and host sterol *O*-acyltransferase (SOAT1). (E) *Salmonella* secreted deubiquitinase SseL and ubiquitin-like protein NEDD8. (F) *Salmonella* secreted deubiquitinase SseL and ubiquitin. (G) *Salmonella* effector GtgE and Golgi-associated PDZ and coiled-coil motif-containing (GOPC) protein. Abbreviations: AP, affinity purification; RAW, cell lysate of RAW 264.7 cells.](sys0041620370001){#fig1} Host proteins targeted by *Salmonella* effectors. {#s1.2} ------------------------------------------------- *Salmonella* effectors GogA, GtgA, GtgE, SpvC, CigR, PipB2, SifA, SrfH, SseL, SspH1, SssA, and SssB, which represent several well-characterized ([@B18] [@B19] [@B25]) and recently identified ([@B26]) bacterial effectors, were used as bait proteins ([Fig. 1](#fig1){ref-type="fig"}; see also [Table S1](#tabS1){ref-type="supplementary-material"} in the supplemental material). A total of 54 protein-protein interactions with the GogA, GtgA, GtgE, SpvC, SrfH, SseL, SspH1, and SssB effectors were identified, whereas no significant interactor was detected for CigR, PipB2, SifA, and SssA ([Fig. 1A](#fig1){ref-type="fig"}). It is possible that some of these effectors need cofactors or processing not available in an *in vitro* system. We next validated several of the effector-host protein interactor pairs by performing AP followed by Western blot analyses, with the known SspH1 effector and PKN1 host protein interactor pair included as a positive control ([Fig. 1B](#fig1){ref-type="fig"}). We also verified an interaction between GtgE and host LYN tyrosine kinase and multiple isoforms of Golgi-associated PDZ and coiled-coil motif-containing (GOPC) protein ([Fig. 1C](#fig1){ref-type="fig"} and [D](#fig1){ref-type="fig"}). Since GtgE was shown to be a secreted protease that targets host Rab29 and Rab32 ([@B27], [@B28]), we tested whether this effector would cleave the GOPC protein. However, we found no evidence of GOPC cleavage by GtgE, at least in *in vitro* experiments performed using recombinant proteins and cell lysates (data not shown). Since our group recently identified novel substrates for *Salmonella* secreted deubiquitinase SseL ([@B29]), S100A6, and heterogeneous nuclear ribonucleoprotein M (hnRNP M), we further interrogated the interacting partners via AP-MS. We were able to confirm an SseL-S100A6 interaction in this new data set but not an hnRNP K interaction. This could have been due to the fact that only a small portion of ubiquitinated hnRNP K specifically binds to SseL, whereas some unmodified forms bind nonspecifically to the beads to some extent ([@B29]). Another interesting putative interactor was NEDD8, a ubiquitin-like protein modifier, which was also confirmed by Western blot analysis ([Fig. 1E](#fig1){ref-type="fig"}). We further investigated whether or not SseL has deNEDDylase activity by incubating cell lysates with recombinant SseL followed by Western blot analysis. No deNEDDylase activity was detected (see [Fig. S1](#figS1){ref-type="supplementary-material"} in the supplemental material); however, there is a possibility that SseL is very specific to a small number of NEDDylated substrates. Interestingly, SseL seems to interact with free (unconjugated) NEDD8. Considering that NEDD8 is a homolog of ubiquitin, a reaction product of SseL activity, and considering that reaction products should be released by the enzyme, it is reasonable to think that SseL should not interact with free ubiquitin or NEDD8. Therefore, we also tested the ability of SseL to interact with free ubiquitin. This interaction was validated by Western blotting ([Fig. 1F](#fig1){ref-type="fig"}). Since it is unusual for enzymes to interact with reaction products, we speculate that SseL may harbor activities involved in modulating the ubiquitination pathway in addition to the previously observed deubiquitination activity ([@B24]). 10.1128/mSystems.00032-15.1 DeNEDDylase enzyme assay with *Salmonella* deubiquitinase SseL. RAW 264.7 cell lysate was incubated for 15 min with 2 µg SseL/mg lysate for 15 min (A) or 20 µg SseL/mg lysate for 18 h (B) and analyzed by Western blotting using anti-NEDD8 antibody. M, molecular weight marker; 1, untreated control; 2, lysate treated with SseL. Download Figure S1, TIF file, 0.3 MB. Copyright © 2016 Sontag et al. 2016 Sontag et al. This content is distributed under the terms of the Creative Commons Attribution 4.0 International license . In the pool of intermediate-confidence interactors, 227 interacting pairs were identified for all of the tested effectors, with the exception of SssA (see [Table S1](#tabS1){ref-type="supplementary-material"}). This pool of proteins contained hits such as tubulin, which is considered a common contaminant in AP-MS experiments ([@B13]), and heat shock proteins that are known to bind to unfolded proteins ([@B30]). Despite the low scores, several of the interacting pairs from this pool might represent true positives, although it is virtually impossible to distinguish them from the false positives just by statistical analysis. To illustrate the utility of this pool of intermediate-confidence interactions, we performed a Western blot analysis and were able to validate the interaction between GtgE and sterol *O*-acyltransferase (SOAT1) ([Fig. 1G](#fig1){ref-type="fig"}). Host proteins targeted by *Citrobacter* effectors. {#s1.3} -------------------------------------------------- *Citrobacter* effectors EspA, EspT, NleA, NleC, NleE, NleG1, NleG8, and NleK were used as bait proteins in AP experiments using HeLa cell lysates. Using the same filters as those applied to the *Salmonella* data, a total of 21 interacting proteins corresponding to EspT, NleA, NleG1, and NleK were identified ([Fig. 2](#fig2){ref-type="fig"}; see also [Table S2](#tabS2){ref-type="supplementary-material"} in the supplemental material). In addition, 157 interacting proteins against all tested *Citrobacter* effectors were identified with intermediate confidence (see [Table S2](#tabS2){ref-type="supplementary-material"}). Among the identified high-confidence interacting partners, we were able to verify the previously described interaction between *Citrobacter* NleA and the protein transport protein Sec23A ([@B31]) ([Fig. 2A](#fig2){ref-type="fig"}). Among the newly identified interactions, we validated the interaction between NleK and heterogeneous nuclear ribonucleoprotein M (hnRNP M) by AP and subsequent Western blotting ([Fig. 2B](#fig2){ref-type="fig"}). Interestingly, hnRNP M protein is known to be targeted by viral proteases facilitating infection ([@B32]), but its function during bacterial infections is largely unknown. 10.1128/mSystems.00032-15.6 Identified *Citrobacter* effector-host protein interactions. *Citrobacter* effectors fused to SBP tags were submitted to coaffinity purifications using HeLa cell lysates and analyzed by liquid chromatography-tandem mass spectrometry. Quantitative analysis was performed with spectral counts, and interactions were tested for significance using SAINT. Download Table S2, XLSX file, 0.02 MB. Copyright © 2016 Sontag et al. 2016 Sontag et al. This content is distributed under the terms of the Creative Commons Attribution 4.0 International license . ![Identification of host targets of *Citrobacter* secreted effector proteins. (A) Network of *Citrobacter* secreted effector proteins (green elliptical nodes) and host targets (rectangle nodes). The host targets are colored according to their fold enrichment in the affinity purification compared to control levels, and the edges are represented according to the significance score calculated by SAINT. (B) Validation of the interaction between the *Citrobacter* effector NleK and the host factor hnRNP M by affinity purification and Western blotting.](sys0041620370002){#fig2} *Salmonella* effector SrfH interaction with host kinase ERK2. {#s1.4} ------------------------------------------------------------- SrfH showed a significant interaction with ERK2 kinase by AP-MS. ERK2 (extracellular signal-regulated kinase 2) is a mitogen-activated protein (MAP) kinase that plays a central roles in eukaryotic cell cycle, cell migration, and phagocytosis ([@B33]). Furthermore, previous work has shown that SrfH is an important effector for systemic infection of *Salmonella* Typhimurium ([@B34]), which motivated us to further study this interaction. Since ERK1 and ERK2 are highly conserved, it is possible that SrfH could bind to both. We performed an immunoprecipitation experiment using SrfH as bait against RAW 264.7 cell lysate and probed the interaction by Western blotting using an antibody that recognizes both ERK1 (44 kDa) and ERK2 (42 kDa). The results showed an enrichment of the band at 42 kDa, while some nonspecific binding of ERK1 (44 kDa) was also observed ([Fig. 3A](#fig3){ref-type="fig"}), suggesting that SrfH has a preference for ERK2. We also performed a Western blot experiment, using a monoclonal antibody specific to the ERK2 isoform, which demonstrated the enrichment of the 42-kDa band ([Fig. 3B](#fig3){ref-type="fig"}). To further confirm this interaction, we expressed green fluorescent protein (GFP) alone or fused to SrfH (GFP::SrfH) in HEK293T cells and performed coimmunoprecipitation (co-IP) using anti-GFP antibodies. The results demonstrated that ERK2 was enriched in AP with GFP::SrfH but not GFP alone ([Fig. 3C](#fig3){ref-type="fig"}). We next examined if SrfH could bind active (phosphorylated) forms of ERK1 and ERK2 by performing AP of SrfH against RAW 264.7 cell lysates and a Western blot experiment using an antibody that recognizes the phosphorylated forms of both ERK2 and ERK1. As observed for the total ERK forms, SrfH interacted with the phosphorylated form of ERK2 but not with that of ERK1 ([Fig. 3D](#fig3){ref-type="fig"}). Collectively, these results demonstrated that SrfH bound to both the nonphosphorylated and phosphorylated forms of ERK2 but not to those of the paralogous ERK1. ![Validation of *Salmonella* effector SrfH interaction with the host kinase ERK2. (A and B) Affinity purification of RAW 264.7 cell lysates using SrfH as bait and analysis by Western blotting using anti-ERK antibodies (A) or anti-ERK2 antibodies (B). (C) Coimmunoprecipitation (co-IP) of HEK293T cells transfected with green fluorescent protein (GFP) fused to SrfH (GFP::SrfH) or GFP alone and probed against GFP, ERK2, IQGAP, and tubulin. (D) Affinity purification of RAW 264.7 cell lysates using SrfH as bait and analysis by Western blotting using anti-phospho-ERK antibodies.](sys0041620370003){#fig3} Having validated the interaction, we sought to define the region of SrfH that bound to ERK2. HEK293 cells were transfected with a plasmid encoding GFP alone (GFP) or fused to the N terminus (GFP::SrfH 1 to 140) or C terminus (GFP::SrfH 137 to 322) of SrfH. Co-IP and Western blot experiments were performed using an anti-GFP antibody. Enrichment of ERK2 was detected only when full-length SrfH or the C-terminal construct of SrfH was present, indicating that the binding domain occurs within the C-terminal 185-amino-acid region of SrfH ([Fig. 4](#fig4){ref-type="fig"}). ![ERK2 interactions with different SrfH domains. HEK293T cells transfected with green fluorescent protein (GFP) fused to full-length or truncated forms of SrfH (GFP::SrfH) or GFP alone were coimmunoprecipitated (co-IP) with anti-GFP antibodies and probed against GFP, ERK2, and tubulin.](sys0041620370004){#fig4} SrfH has three well-characterized host targets: thyroid receptor interacting protein 6 (TRIP6), IQ containing GTPase activating protein 1 (IQGAP1), and filamin ([@B34] [@B35] [@B36]). Interestingly, binding to these targets has been proposed to have very different roles during infection, although they are all related to cytoskeleton and cellular movement. Whereas SrfH binding to TRIP6 has been reported to promote phagocyte mobility and systemic dissemination, IQGAP1 interactions were shown to suppress *Salmonella* migration to the spleen ([@B34], [@B35]). These contradictory phenotypes might be due to a single nucleotide polymorphism that dictates SrfH binding to TRIP6 ([@B37]). SrfH from *Salmonella* Typhimurium 14028s bears a glycine residue at position 103, whereas the allele from serovar SL1344 has an aspartic acid residue at the same position which abolishes the binding to TRIP6 ([@B37]). The relationships among different SrfH targets are still unknown, but, interestingly, IQGAP1 is known to be regulated by ERK2 ([@B38]) whereas TRIP6 is regulated by other kinases ([@B39]). Thus, it is possible that IQGAP1 and TRIP6 are regulated directly or indirectly by SrfH action on ERK2. SrfH regulates ERK2 phosphorylation. {#s1.5} ------------------------------------ To gain further insight into the interaction between SrfH and ERK2, we aimed to determine if SrfH affected the levels of ERK2 phosphorylation during infection. RAW 264.7 cells were infected with either wild-type (WT) or Δ*srfH* mutant *S*. Typhimurium for 24 h, after which cells were harvested and lysed in the presence of phosphatase inhibitors. The lysates were analyzed by Western blotting to determine if total ERK or phospho-ERK levels were altered in either proteoform. While the levels of total ERK2 were slightly reduced (relative to that of total protein), levels of phospho-ERK were dramatically decreased in the infection with the wild-type strain compared to the mutant infection results ([Fig. 5](#fig5){ref-type="fig"}). These results suggested that SrfH decreases the level of phospho-ERK or somehow prevents ERK from being phosphorylated in RAW 264.7 cells. Interestingly, the levels of phosphorylated ERK2 and ERK1 were similarly altered, although we did not detect a direct interaction between SrfH and ERK1 ([Fig. 3](#fig3){ref-type="fig"}). We speculate that regulation of ERK1 by SrfH could be an indirect effect. It is also worth noting that the phospho-ERK antibodies used in our study target sites that activate the enzyme when phosphorylated; thus, the reduction of phosphorylation levels by SrfH suggests an inhibition of ERK2 activity. ![Regulation of ERK2 phosphorylation levels by SrfH. RAW 264.7 cells were infected with either the wild-type (WT) strain or a SrfH deletion strain (Δ*srfH*), lysed, and analyzed by Western blotting using anti-phospho-ERK (pERK) or anti-total ERK2 (tERK2) antibodies. A relative densitometry value, normalized to that of the loading (Ponceau stain), is listed below each band.](sys0041620370005){#fig5} Structural elucidation of SrfH showed similarities to enzymes containing cysteine in the active site, including cysteine protease, glutamine deamidase, and transglutaminase ([@B40]). Thus, to try to find a potential mechanism of action, we tested the possibility that SrfH is a protease or glutamine deamidase but found no supporting evidence (see [Text S1](#textS1){ref-type="supplementary-material"} and [Fig. S2](#figS2){ref-type="supplementary-material"} to [S3](#figS3){ref-type="supplementary-material"} in the supplemental material). Since SrfH decreased the levels of ERK2 phosphorylation in RAW 264.7 cells infected with *Salmonella*, we examined whether SrfH had phosphatase or irreversible phosphorylase activity, as previously shown for *Salmonella* secreted effectors SptP and SpvC, known to interact with ERK2 ([@B41], [@B42]). Thus, we examined the levels of phosphorylated peptides of ERK2 after treatment with SrfH. Although a total of three phosphopeptides, corresponding to three modification sites, were identified and quantified, none of them decreased in abundance after treatment with SrfH (see [Fig. S4](#figS4){ref-type="supplementary-material"}), suggesting that SrfH did not act directly on ERK2 phosphorylation sites. We cannot exclude the possibility that host cofactors not present *in vitro* assays may be required for enzymatic activity. Interestingly, SpvC, SptP, and SrfH target ERK2. This targeting may appear redundant, but these effectors have distinct localizations within the host cell. While SrfH targets the plasma membrane ([@B43]), SpvC is evenly distributed in the cytoplasm ([@B42]), and SptP resides within the *Salmonella*-containing vacuoles ([@B44]), suggesting that these effectors modulate different ERK2-driven pathways. Indeed, whereas SpvC decreases inflammation in the host gut, SrfH has a role in the pathogen dissemination ([@B34], [@B35], [@B45]). 10.1128/mSystems.00032-15.2 *In vitro* proteolysis assay. Recombinant ERK2 was incubated with different amounts of SrfH in the presence or absence of different protease inhibitors, namely, metalloprotease inhibitor EDTA, proteinase inhibitor cocktail (HALT), and cysteine protease inhibitor N-ethylmaleimide (NEM). Reaction products were analyzed by Western blotting using anti-ERK2 antibodies. \*, the molecular weight shift seen with NEM-treated samples might have been due to alkylation of ERK2 cysteine residues by this reagent. Download Figure S2, TIF file, 0.1 MB. Copyright © 2016 Sontag et al. 2016 Sontag et al. This content is distributed under the terms of the Creative Commons Attribution 4.0 International license . 10.1128/mSystems.00032-15.3 Quantification of glutamine and asparagine deamidation sites on ERK2. ERK2 was incubated in different ratios with SrfH, and products were separated by SDS-PAGE and analyzed by LC-MS/MS. Peptide identification and extraction of peak areas were performed with MaxQuant. The abundance of each deamidated peptide was normalized to that of its unmodified version. No significant changes were observed by Student's *t* test. The data in this figure represent averages of the results of two independent experiments performed in technical replicates. Download Figure S3, TIF file, 0.3 MB. Copyright © 2016 Sontag et al. 2016 Sontag et al. This content is distributed under the terms of the Creative Commons Attribution 4.0 International license . 10.1128/mSystems.00032-15.4 Quantification of phosphorylation sites on ERK2. ERK2 was incubated in different ratios with SrfH, and products were separated by SDS-PAGE and analyzed by LC-MS/MS. Peptide identification and extraction of peak areas were performed with MaxQuant. The abundance of each phosphorylated peptide was normalized to that of its unmodified version. No significant decrease on phosphorylation levels were observed by Student's *t* test. The data in this figure represent averages of the results of two independent experiments performed in technical replicates. Download Figure S4, TIF file, 0.1 MB. Copyright © 2016 Sontag et al. 2016 Sontag et al. This content is distributed under the terms of the Creative Commons Attribution 4.0 International license . 10.1128/mSystems.00032-15.7 Supplemental Materials and Methods, Results, and Discussion. Download Text S1, DOCX file, 0.03 MB. Copyright © 2016 Sontag et al. 2016 Sontag et al. This content is distributed under the terms of the Creative Commons Attribution 4.0 International license . Conclusions. {#s1.6} ------------ Screening approaches for protein-protein interactions have different strengths and weaknesses. It is possible to identify interactions using a variety of methodologies, including yeast two-hybrid assays, protein microarrays ([@B46]), and AP-MS ([@B11]). Validation of an interaction generated using one method can often be difficult to confirm using a second assay. Affinity tags, antibodies, and/or constructs can often induce or abrogate specific interactions. However, these tools can be incredibly powerful as the foundation for new studies of mechanism function. Here we utilized AP-MS to identify, validate, and provide more-detailed insights into bacterial secreted effector proteins and their host binding targets. This approach was highlighted by our investigation of the SrfH effector protein, where we examined potential enzymatic activities and functional consequences of interactions with ERK2. In total, we confidently identified 75 secreted effector protein-host protein interactions. These newly identified host-interacting partners can serve as a resource and will hopefully help clarify how these pathogenic bacteria subvert specific aspects of the host-cellular environment. MATERIALS AND METHODS {#h2} ===================== Cloning, expression, and purification of SBP-tagged proteins. {#s2.1} ------------------------------------------------------------- Effectors were amplified on the basis of sequences of *Salmonella* Typhimurium strain 14028s and *Citrobacter rodentium* genomic DNA. Then, each gene was cloned in pET vectors containing His6/streptavidin-binding peptide (SBP) and a tobacco etch virus (TEV) protease cleavage site fused to its N terminus and was expressed in *Escherichia coli* strain BL21. Expression and purification of each bait protein were performed as described previously in detail ([@B29]). Cell culture/lysate preparation. {#s2.2} -------------------------------- RAW 264.7 macrophage-like cells (ATCC tib-71; ATCC, Manassas, VA) were cultured in Dulbecco's modification of Eagle's medium, whereas HeLa cells (ATCC ccl-2) were cultured in minimal essential medium; both cell lines were supplemented with 10% fetal bovine serum, 100 IU/ml penicillin, and 100 µg/ml streptomycin. Cells were maintained in an atmosphere of 95% humidity and 5% CO~2~ at 37°C before passage 15. Cells were harvested in a reaction mixture consisting of phosphate-buffered saline (PBS) containing 1% Triton X-100, 1× HALT protease inhibitor (Thermo Scientific, Rockford, IL), 5 mM EDTA, and 20 mM sodium orthovanadate or of 50 mM HEPES containing 1% Triton X-100, 1× HALT protease inhibitor, 5 mM EDTA, 5 mM *N*-ethylmaleimide (NEM), and 0.5 mM Tris(2-carboxyethyl)phosphine (TCEP) for SseL pulldown. Proteins were extracted by sonication at 100% amplitude using pulses of on/off cycles of 0.5 s each for 3 repetitions at 30 s per repetition along with vigorous vortex mixing. The crude lysate was clarified by centrifugation at 10,000 × *g* for 15 min at 4°C, snap frozen in liquid N~2~, and stored at −80°C. Affinity purification, protein digestion, and Western blot analysis. {#s2.3} -------------------------------------------------------------------- RAW 264.7 or HeLa whole-cell lysate (7.5 mg) was combined with 4 nM purified, SBP-tagged effector protein in a streptavidin-binding buffer (SBB) containing 5 mM 2-mecaptoethanol, 2 mM EDTA, and 0.1% (vol/vol) Triton X-100 at pH 7.4. This solution was incubated at 4°C, overnight, with end-over-end rotation to allow the effectors and host targets to interact. Then, effector-host protein complexes were captured by adding 50 µl of High Capacity streptavidin agarose resin (Thermo Scientific, Rockford, IL) and rotating at 4°C for 1 h. The beads were harvested by centrifugation at 2,500 × *g* for 2 min and washed twice with SBB to remove noninteracting proteins. For LC-MS/MS analysis, the washing step was repeated twice with PBS before elution of the bound proteins with 300 µl of elution buffer (2 nM biotin--SBB) was performed for 1 h with rotation. Eluted protein complexes were precipitated with 1 ml of ice-cold acetone overnight. After they were dried to completeness in a SpeedVac concentrator, samples were suspended in 50 µl of a mixture of 100 mM NH~4~HCO~3~, 8 M urea, and 1 mM TCEP and were incubated at 55°C with shaking for 15 min. Free thiols were alkylated by addition of 5 µl of 100 nM NEM and were incubated at 37°C with shaking for 1 h, after which samples were diluted 8-fold with 25 mM NH~4~HCO~3~ to decrease the urea concentration to 1 M. Trypsin (0.5 µg) and CaCl~2~ (1 nM final concentration) were added, and digestion was allowed to proceed overnight at 37°C. Peptides were desalted by C18 solid-phase extraction using Bond Elut Omix tips (Agilent), dried, and suspended in 20 µl of 0.1% formic acid. For Western analysis, independent experiments were performed similarly to the AP-MS ones, with the difference that the beads were washed once with PBS after the SBB washes and boiled for 10 min in lithium dodecyl sulfate (LDS) sample buffer containing 5 mM TCEP to elute the proteins. Proteins were then separated on 4% to 12% bis-Tris polyacrylamide gels and transferred to a polyvinylidene difluoride (PVDF) membrane for immunoblot analysis. Membranes were blocked and antibodies diluted with 5% (wt/vol) nonfat dry milk--PBS--0.1% Triton X-100. Primary and secondary antibodies were diluted using a dilution range of 1:200 to 1:3,000, according to the manufacturer's recommendations. Images were acquired on a FluorChemQ system (Bio-Techne, Minneapolis, MN). Due to the propensity of NleK to bind to the beads, an exception was made which required four washes with SBB before washing with PBS and treating with elution buffer. The proteins were lyophilized before being analyzed by Western blotting using an anti-hnRNP M antibody. Proteomic analysis. {#s2.4} ------------------- Digested peptides were subjected to LC-MS/MS in a custom-made 4-column LC system connected to an Orbitrap mass spectrometer (LTQ Orbitrap XL; Thermo Scientific, San Jose, CA) using previously described parameters ([@B47]). Tandem mass spectra were searched with the MS-GF+ database search tool ([@B48]) against bait (20 sequences) and *E. coli* K-12 (4,305 entries, downloaded on 18 June 2015) protein sequences in combination with human (68,485 entries, downloaded on 20 May 2015) or mouse (45,263 entries, downloaded on 20 May 2015) reference proteomes from the Uniprot Knowledge Base. Search parameters included tryptic digestion of at least one peptide terminus, methionine oxidation and cysteine alkylation (carbamidomethylation or addition of NEM, depending on the sample treatment) as variable modifications, and 20-ppm parent-mass tolerance. All peptides were filtered with MS-GF scores of ≤1.0E−8, and, to provide higher confidence, each protein further required ≥2 peptides and at least 1 peptide with an MS-GF score of ≤1.0E−10. Spectral counting was used for semiquantitation of putative interaction partner proteins, and high-confidence interactors were selected using the spectral count version of SAINTexpress ([@B15]). *Salmonella* infection of RAW 264.7 cells. {#s2.5} ------------------------------------------ *Salmonella* Typhimurium (ATCC 14028) was used as the wild-type parental strain. A SrfH deletion mutant (Δ*srfH*) was constructed using the phage λRed recombination system ([@B49]). Cell culture infection was performed as previously described ([@B50]), with the following modifications: (i) macrophages were not pretreated with interferon gamma; and (ii) the bacterial inoculum was centrifuged on macrophage cells and washed with gentamicin (25 µg/ml), and time zero was recorded immediately after washing (i.e., without a further 30-min incubation). Transfections and coimmunoprecipitation. {#s2.6} ---------------------------------------- HEK293T cells were transfected with plasmids encoding GFP alone or GFP-tagged WT SrfH (GFP::SrfH) and its truncated forms (amino acids 1 to 140 and 137 to 322) using X-fect transfection reagent (Clontech, Mountain View, CA). For pulldown assays, these transiently transfected HEK293T cells were lysed using 50 mM Tris-HCl (pH 7.5), 5 mM EDTA, 150 mM NaCl, 1% Triton X-100, and protease inhibitor. The postnuclear supernatant was generated by spinning the lysates at 13,000 rpm at 4°C. Meanwhile, anti-rabbit Dynabeads (Life Technologies) were conditioned by washing three times with PBS and incubation with rabbit polyclonal anti-GFP antibody (Santa Cruz Biotechnologies, Dallas, TX). The antibody was cross-linked to the beads, and the beads were incubated with the transfected HEK293T cell lysates overnight at 4°C. The next day, the beads were washed three times with lysis buffer and resuspended in sample buffer for SDS-PAGE analysis followed by Western blotting using either mouse monoclonal anti-GFP or anti-ERK2 antibodies (Cell Signaling Technologies, Danvers, MA). *In vitro* enzymatic assays. {#s2.7} ---------------------------- A DeNEDDylase assay for analysis of SseL deubiquitinase activity was performed as described in detail previously ([@B29]). An *In vitro* cleavage assay was performed using purified SrfH and ERK2 (Novus Biologicals, Littleton, CO) mixed with 0.1% Triton X-100--PBS and incubation at 25°C with shaking for 4 h. Reaction was stopped with the addition of 4× LDS loading buffer with 5 mM TCEP with heating at 95°C for 10 min, and the reaction mixture was analyzed by Western blotting with anti-ERK2 antibody. Cleavage was assessed by quantification of lower-molecular-weight products along with the disappearance of the expected molecular-weight band in SrfH-treated samples. For *in vitro* deamidation assay, purified SrfH was incubated with ERK2, separated by SDS-PAGE, digested with endoproteinase Glu-C, and analyzed by LC-MS/MS, as described in detail in the Supplemental Material and Methods (see [Text S1](#textS1){ref-type="supplementary-material"} in the supplemental material). Accession numbers. {#s2.8} ------------------ All LC-MS/MS data files were deposited in the PRIDE archive-proteomics data repository (<http://www.ebi.ac.uk/pride/archive/>) under accession numbers PXD003943, PXD004002, and PXD003304. This research was funded in part by grants from the National Institutes of Health (grants GM094585, GM094623, and P41 GM103493-10). The work was partly performed in the Environmental Molecular Sciences Laboratory (EMSL), a DOE-BER national scientific user facility at Pacific Northwest National Laboratory (PNNL). PNNL is a multiprogram national laboratory operated by Battelle Memorial Institute for the DOE under contract DE-AC05-76RLO 1830. R.L.S., E.S.N., R.N.B., E.D.C., and J.N.A. planned the research and designed experiments; R.L.S., E.S.N., R.N.B., G.S.N., M.A.S., O.S., S.-Y.L., and K.K.W. performed the experiments; R.L.S., R.N.B., E.S.N., and C.A. analyzed the data; A.S. and E.D.C. contributed resources and reagents; R.L.S., E.S.N., R.N.B., E.D.C., and J.N.A. wrote the manuscript. [^1]: Present address: Roslyn N. Brown, Cepheid, Inc., Sunnyvale, California, USA; George S. Niemann, Calypte Biomedical, Portland, Oregon, USA. [^2]: R.L.S. and E.S.N. contributed equally to this article. [^3]: **Citation** Sontag RL, Nakayasu ES, Brown RN, Niemann GS, Sydor MA, Sanchez O, Ansong C, Lu S-Y, Choi H, Valleau D, Weitz KK, Savchenko A, Cambronne ED, Adkins JN. 2016. Identification of novel host interactors of effectors secreted by *Salmonella* and *Citrobacter*. mSystems 1(4):e00032-15. doi:[10.1128/mSystems.00032-15](http://dx.doi.org/10.1128/mSystems.00032-15).
A DFT study of the interresidue dependencies of scalar J-coupling and magnetic shielding in the hydrogen-bonding regions of a DNA triplex. Scalar coupling constants and magnetic shieldings in the imino hydrogen-bonding region of Hoogsteen-Watson-Crick T.A-T and C(+).G-C triplets have been calculated as a function of the distance between proton donor and acceptor nitrogen atoms. The Fermi contact contributions to (h2)J((15)N-H...(15)N), (1)J((15)N-(1)H), and (h1)J((1)H...(15)N) were computed using density functional theory/finite perturbation theory (DFT/FPT) methods for the full base triplets at the unrestricted B3PW91/6-311G level. Chemical shifts delta((1)H) and delta((15)N) were obtained at the same level using the gauge including atomic orbital (GIAO) method for magnetic shielding. All three scalar couplings and all three chemical shifts are strongly interrelated and exhibit monotonic changes with base pair separation. These correlations are in conformity with experimental data for a 32-nucleotide DNA triplex. The results suggest that both chemical shifts and coupling constants can be used to gain information on H-bond donor-acceptor distances in nucleic acids. In addition to the DFT/FPT calculations, a simple three-orbital model of the N-H...H bond and a sum-over-states analysis is presented. This model reproduces the basic features of the H-bond coupling effect. In accordance with this model and the DFT calculations, a positive sign for the (h2)J(NN) coupling is determined from an E.COSY experiment.
Having monopolized the earth, the world's richest man turns his attention toward the stars. On Thursday, billionaire Amazon CEO Jeff Bezos will unveil plans for upcoming missions to the moon, according to Reuters. The plans will be tailored to the US government's renewed push to establish a lunar outpost over the next five years. The plans will also likely put Bezos in direct competition with Elon Musk's SpaceX, who is also working on similar "lunar plans." Bezos will host a media event at 4pm EDT on Thursday on behalf of his space exploration company, Blue Origin. The event will provide “an update on our progress and share our vision of going to space to benefit Earth," according to Bezos. The company has, for the most part, been quiet about its strategy for moon exploration. However, people familiar with the plans told Reuters that Bezos will lay out details on both lunar mission and a new lunar lander spacecraft that Blue Origin is developing. The idea of a human outpost on the moon is also expected to be up for discussion. Back in March, Vice President Mike Pence called on NASA to build a space platform in lunar orbit and to put American astronauts back on the moon by 2024 "by any means necessary". This timeline is 4 years quicker than previously planned and Bezos is expected to tailor his plans to align with Pence's timeline request. Meeting the timeline could help Blue Origin attract funds from NASA and one source has said that the company has been working to accelerate its strategy specifically based on Pence's comments. Blue Origin hinted at the announcement with a Twitter post last month showing the ship used by explorer Ernest Shackleton on an expedition to Antarctica. Reuters, without sarcasm, said that the Tweet could be "a possible reference to an impact crater on the lunar south pole sharing the man’s name." One hopes that Bezos' lunar ambitions don't meet the same end. Bezos, like his competitor Musk, has shared a broader vision of a future where millions live and work in space. Bezos also faces competition from United Launch Alliance, a partnership between Boeing Co and Lockheed Martin. Blue Origin is working on its New Shepard rocket for short space trips and a rocket called New Glenn for potential satellite launch contracts. Its timeline target for delivering its New Glenn rocket is 2021, while its plans to launch humans in a suborbital flight in New Shepard are set for later this year.
Development and validation of an HPLC method for the rapid and simultaneous determination of 6-mercaptopurine and four of its metabolites in plasma and red blood cells. An HPLC method has been developed and validated for the rapid determination of mercaptopurine and four of its metabolites; thioguanine, thiouric acid, thioxanthine and methylmercaptopurine in plasma and red blood cells. The method involves a simple treatment procedure based on deproteinisation by perchloric acid followed by acid hydrolysis and heating for 45min at 100 degrees C. The developed method was linear over the concentration range studied with a correlation coefficient >0.994 for all compounds in both plasma and erythrocytes. The lower limits of quantification were 13, 14, 3, 2, 95pmol/8 x 10(8) RBCs and 2, 5, 2, 3, 20ng/ml plasma for thioguanine, thiouric acid, mercaptopurine, thioxanthine and methylmercaptopurine, respectively. The method described is selective and sensitive enough to analyse the different metabolites in a single run under isocratic conditions. Furthermore, it has been shown to be applicable for monitoring these metabolites in paediatric patients due to the low volume requirement (200microl of plasma or erythrocytes) and has been successfully applied for investigating population pharmacokinetics, pharmacogenetics and non-adherence to therapy in these patients.
package cn.it.shop.dao; import java.util.List; import cn.it.shop.model.Forder; import cn.it.shop.model.Product; import cn.it.shop.model.Sorder; public interface SorderDao extends BaseDao<Sorder> { //查询热点商品的销售量 public List<Object> querySale(int number); }
The present invention relates to a novel locking device for a rotatable operating lever. More particularly the invention relates to a device for locking a rotatable operating lever which, like the throttle operating lever of a remote control unit for marine engines, must be frequently turned during navigation and also locked to a suitable turned position to propel the boat at a constant speed. FIGS. 1 and 2 show a conventional device for locking such a rotatable operating lever. The locking device comprises a driven member 40 mounted at its shaft portion 42 on a casing 36 and turnable in the direction of an arrow F or arrow B, a lever 30 attached to the outer side of the casing 36 by the shaft 42 and rotatable by a handle 32 in the direction of an arrow D or arrow E, a locking member 44 having a tapered portion 46 and an internally threaded portion 48 non-rotatably in engagement with an externally threaded outer peripheral portion of the lever 30, a locking plate 50 fixedly attached to the casing 36 and formed with a circular arc V-groove 52 concentric with the shaft 42, retaining means 56 for preventing the lever 30 from slipping off the driven member 40, and an end shaft 54 of a control cable having one end pivoted to the driven member 40 and the other end connected, for example, to an unillustrated throttle member. When rotated in one direction, the lever 30 brings the tapered portion 46 into pressing contact with the V-grooved portion 52, whereby the lever 30 can be locked to the desired position. Since the throttle lever 30 adapted for use with marine engines is usually locked to an approximately definite turned position (for example, to the position indicated in two-dot-and-dash lines in FIG. 1), so as to propel the boat economically at a constant speed, the V-grooved portion 52 wears away rapidly at this position. When the lever 30 is slightly rotated in the other direction to unlock the tapered portion 46 from such a locally worn portion of the locking plate 50 and the tapered portion 46 is slightly moved away from the V-groove 52 of the plate 50, the tapered portion 46 will sometimes come into pressing contact with an unworn part of the V-grooved portion 52 upon turning the lever, thus preventing the turn of the lever 30 at an undesired position. The lever 30 can then be turned to another unworn position only after the lever 30 has been further rotated in the other direction. If the lever 30 is thus inadvertently lockable at an undesired position, the lever 30 is not operable as quickly as is desired. A dangerous situation, such as a collision, could then result. The conventional device has another drawback. When the tapered portion 46 is held pressed against a slanting portion on either side of the worn grooved portion, the vibration of the boat is liable to shift the tapered portion 46 to the lowest position of the worn grooved portion. Thus the lever will shift abruptly.
American registered, multinational cruise company Carnival Corp. announced that four ships of its new fleet will break the current record for passenger capacity, according to the Miami Herald on June 15. Carnival Corp. chairman Micky Arison noted that this announcement was unorthodox for the company, but they released the information since their boats would support the greatest number of passengers in the world. The boats would be able to carry 6,600 passengers. Arison added that the new vessels’ design would make sure that each space would be fully utilized. Two of the new megaships will be joining the AIDA fleet – which caters to the German market – by 2019 and 2020. As for the other two, they will either join the AIDA or the Italian cruises – the Costa Cruises.
Air Force Extends Secret Space Plane’s Mysterious Mission The Air Force’s mysterious X-37B space plane just got a little more mysterious. The 29-foot-long, reusable mini-shuttle was designed to spend up to 270 days in orbit. The 270th day of the winged spacecraft’s second flight is today, but the military has no intentions of bringing the billion-dollar robotic vehicle back to Earth just yet. “It’s still up there,” Maj. Tracy Bunko told MSNBC. Exactly what the X-37B is doing is a secret. The Air Force insists the X-37B, built by Boeing in its soon-to-be-closed “Building 31″ facility, is meant only for conducting orbital science experiments in its pickup-bed-size cargo bay, but analysts say the X-37B is capable of much more than that. It could be an orbital spy. It could even be used to sneak up on and tamper with enemy satellites. It could haul small batches of supplies to the International Space Station. In October, Boeing program manager Art Grantz proposed to build an enlarged X-37C model that could also carry astronauts to the station, filling a gap left by the retired NASA Space Shuttle. Whatever it’s up to, the X-37B will be doing it longer than anyone imagined when the diminutive spacecraft launched atop an Atlas rocket for the first time in April last year. The Air Force said last year that the X-37B could last nine months in orbit before its power and fuel ran out. (In comparison, the longest manned shuttle mission lasted just 17 days.) In October, Air Force program manager Lt. Col. Tom McIntyre said an extension might be possible. Now it appears the Air Force is taking it day by day, carefully monitoring the X-37B “as it sips power and fuel like a Prius,” in the words of one source involved in the development of military spacecraft. “It’s working so well that they are thumbing their noses at everyone else as they break their own records, and rightly so,” the source said of the Air Force. The Air Force “gets greedy on X missions,” the insider added, using shorthand for “experimental” missions. In other words, the flying branch will want to squeeze every ounce of utility out of a unique spacecraft. The insider said it’s also possible that another spacecraft — a satellite, most likely — is slated to take over some of the X-37B’s duties once the space plane lands. If that satellite got diverted for emergency use over, say, Afghanistan, then the X-37B would need to stay in orbit longer. It’s not clear how long the X-37B might hold out. Once in space, the airplane-shaped X-37B unfurls solar panels to soak up the sun’s energy, stretching its power supply. But there’s no way to top off the onboard rocket fuel that allows the vehicle to maneuver. All the same, careful planning could extend the mission to a full year, in theory. “It could be on station into April for all I know,” the insider told Danger Room.
Made in China A lot of products are rip-offs. Recently, though, I’ve come across one that is especially galling; a fake that had obviously been specifically designed — as lawyers would say, “with malice aforethought” — to trick customers. Here’s the story: A few years back, a “perpetual flashlight” was developed, with a captive magnet, a coil, and some electronics to change the mechanical force from the flashlight being shaken into electrical energy to power it. (White LEDs are much more efficient than incandescent lights, which made this feasible.) These don’t work as well as you might like, but they do work, and can sit on the shelf for many years and be recharged any time by shaking. It didn’t take long for this to catch on, since shake-to-recharge flashlights were “green,” relatively easy and inexpensive to make, as well as new and innovative. For well under $20, you could pick one up at Wal-Mart and have — in theory, anyway — a flashlight that would always work, no matter what. They made decent stocking stuffers, and were a pretty good deal for the money. (The required electronics meant they cost a little more than basic flashlights.) As I found out a few months later, it also didn’t take long for someone in China to realize that these “shake flashlights” were selling very quickly — and that a very similar effect could be produced for roughly one-tenth of the cost. (The original flashlight design isn’t that expensive, but the costs for the necessary supercapacitors, diodes, magnet, and sufficient wire to make an efficient coil do add up.) Soon, these “new generation flashlights” (a very clever usage of weasel words, when you think about it) came on the market. You might have seen them at flea markets and dollar stores. They look and feel very similar to actual “shake” flashlights, but are smaller and cost much less. What the packaging doesn’t tell you, though, is that these are not generating flashlights like the originals. They don’t have a supercapacitor, Wheatstone bridge network of diodes for current rectification, or even a magnet and coil. What they *do* have is a simple circuit board, a few turns of copper wire for looks, and a cheap chunk of metal to rattle back and forth ineffectively. These flashlights were *specifically designed* to fool the customer into thinking that they are actual shake-to-recharge flashlights. The coil and piece of metal serve no purpose other than to deceive. These flashlights have just the bare minimum of parts required to work as a flashlight at all: a white LED, a very simple metal switch, and two CR2025 batteries. The “new generation” marketing-speak is, in a legal sense, referring to chronology and not the source of electrical power. I recently bought one at a flea market (knowing what it was; I’d seen these before). Here are some photos of the inside. Time permitting, I plan to investigate what is required to convert it to an actual generating flashlight — maybe this summer. I’ll post the results here if I do. The flashlight, removed from the packaging. An observant Electronics geek would be starting to wonder why it has so few turns of copper wire — and whether those two discs just behind the switch were really supercapacitors… Yes, it actually does at least work as a flashlight. Not well, mind — but it does work. For now. Nothing up top (the wire snapped off as I disassembled the light. Nice construction)… …and nothing hidden underneath. Not only are there not enough turns to make an effective coil… …the coil isn’t even connected to anything! Star Trek has a word for this: it’s a GNDN! Power is provided by these two discs — which are cheap CR2025 nonrechargeable batteries! Everything about it says “lowest bidder.” Bottom line: There are thousands of these things out there — maybe millions. Don’t be ripped off. (One good way to tell if a flashlight is the real deal is to turn it on and observe the brightness for a few seconds, shake it, then look again quickly. If it brightens, it’s probably the real thing.) For what it’s worth, the larger flashlights that I’ve seen in Wal-Mart are genuine. The fakes are usually found at flea markets and antique /variety stores. (The store dealer may very well not know the difference, so he or she isn’t necessarily trying to rip you off.)
<?php /** * Magento * * NOTICE OF LICENSE * * This source file is subject to the Academic Free License (AFL 3.0) * that is bundled with this package in the file LICENSE_AFL.txt. * It is also available through the world-wide-web at this URL: * http://opensource.org/licenses/afl-3.0.php * If you did not receive a copy of the license and are unable to * obtain it through the world-wide-web, please send an email * to license@magento.com so we can send you a copy immediately. * * DISCLAIMER * * Do not edit or add to this file if you wish to upgrade Magento to newer * versions in the future. If you wish to customize Magento for your * needs please refer to http://www.magento.com for more information. * * @category design * @package rwd_default * @copyright Copyright (c) 2006-2015 X.commerce, Inc. (http://www.magento.com) * @license http://opensource.org/licenses/afl-3.0.php Academic Free License (AFL 3.0) */ ?> <?php $_shipment=$this->getShipment() ?> <?php $_order=$this->getOrder() ?> <?php if ($_shipment && $_order && $_shipment->getAllTracks()): ?> <table cellspacing="0" cellpadding="0" border="0" width="650" style="border:1px solid #EAEAEA;"> <thead> <tr> <th align="left" bgcolor="#EAEAEA" style="font-size:13px; padding:3px 9px"><?php echo $this->__('Shipped By') ?></th> <th align="center" bgcolor="#EAEAEA" style="font-size:13px; padding:3px 9px"><?php echo $this->__('Tracking Number') ?></th> </tr> </thead> <tbody> <?php $i=0; foreach ($_shipment->getAllTracks() as $_item): $i++ ?> <tbody> <td align="left" valign="top" style="padding:3px 9px"><?php echo $this->escapeHtml($_item->getTitle()) ?></td> <td align="center" valign="top" style="padding:3px 9px"><?php echo $this->escapeHtml($_item->getNumber()) ?></td> </tr> <?php endforeach ?> </tbody> </table> <?php endif; ?>
Surgical treatment for deltoid contracture in adults. In a retrospective study, 60 shoulders in 38 adults with deltoid contracture were surgically treated by proximal or distal releases. Twenty-three patients, representing 34 treated shoulders, were followed up for at least 2 years (median was 4 years). By the last follow-up, all patients achieved satisfactory outcomes: freedom from pain, full range of motion, and normal muscle power. The proximal release was used in patients with one-portion (one of the deltoid origins) involvement, and the distal release was used in patients with two- or three-portion involvement. Three shoulders (5%) had postoperative complications in the form of intramuscular hematomas, which were resorbed spontaneously within 3 weeks. The authors recommend surgical release to treat deltoid contracture whenever indicated.
/* Generated by RuntimeBrowser on iPhone OS 3.0 Image: /System/Library/PrivateFrameworks/iTunesStoreUI.framework/iTunesStoreUI */ @class UIImageView, <SUComposeReviewHeaderDelegate>, ISReview, SUComposeTextFieldListView, SURatingControl; @interface SUComposeReviewHeaderView : UIView { UIImageView *_backgroundView; <SUComposeReviewHeaderDelegate> *_delegate; SURatingControl *_ratingControl; ISReview *_review; unsigned int _showNicknameField : 1; SUComposeTextFieldListView *_textFieldListView; } @property(readonly) NSString *nickname; @property float rating; @property(readonly) NSString *title; @property(retain) ISReview *review; /* unknown property attribute: V_review */ @property <SUComposeReviewHeaderDelegate> *delegate; /* unknown property attribute: V_delegate */ - (id)initWithFrame:(struct CGRect { struct CGPoint { float x_1_1_1; float x_1_1_2; } x1; struct CGSize { float x_2_1_1; float x_2_1_2; } x2; })arg1; - (void)dealloc; - (void)layoutSubviews; - (void)sizeToFit; - (id)nickname; - (float)rating; - (void)setRating:(float)arg1; - (void)setReview:(id)arg1; - (id)title; - (NSUInteger)numberOfFieldsInTextFieldList:(id)arg1; - (id)textFieldList:(id)arg1 configurationForFieldAtIndex:(NSUInteger)arg2; - (void)textFieldListValidityDidChange:(id)arg1; - (void)textFieldListValuesDidChange:(id)arg1; - (id)review; - (id)delegate; - (void)setDelegate:(id)arg1; @end
The toy makers of Chenghai The news from China is of manufacturing industry in trouble, factories closing down in their thousands, tens of millions of migrant workers out of work. But a closer look at Chenghai in Guangdong province, one of the centres of Chinese toy making, reveals a different story It was an April mid-morning and the streets of Chenghai were humming with activity. Auto rickshaws zigzagged against the flow of traffic, motorbikes carried gravity-defying pyramids of parcels, open-topped vans overflowed with toy parts, and huge lorries were piled high with boxes for the neighbouring port or delivery across China. This administrative district of Shantou town at the eastern extremity of Guangdong province had been bustling since daybreak. The frenzied activity continued until dusk (which falls at around six), but it let up during the lunch break, from 11.30 to 1.30, often the time for a siesta. Thousands of workers then appeared and wandered off in small groups to hang out in shopping centres, sit and eat on boxes or benches, doze under the shade of a tree or play cards and dice. During working hours they disappeared again, and it was hard to find a factory worker on the streets, or even that common sight in China: job seekers with cardboard panels showing their trades around their necks or tied to bicycle handlebars or just placed in front of them on street corners. Chenghai specialises in manufacturing children’s toys, which government officials say is the industry most affected by the global economic crisis. Officially, there are 3,000 toy factories in Chenghai; unofficially, the figure is three to four times higher. A young woman appeared around a corner with a baby in her arms. She was wearing typical factory workers’ clothes – a pair of faded jeans, a cheap jacket, a cotton t-shirt, trainers of some unknown Chinese brand. “I’m not working at the moment because I’m minding my six-month old daughter,” she explained. Her name was Mei Lan, and she was a migrant worker from a village in Guangxi province. “My husband’s working, of course,” she continued. “I’ll have no problem finding a job again. The factories in the region need workers so badly that they don’t mind if mothers bring their children to work. Right now I prefer to look after her myself, but (...)
import javax.xml.parsers.*; import org.w3c.dom.*; import org.xml.sax.SAXException; import java.io.*; public class XMLUtil { //该方法用于从XML配置文件中提取具体类类名,并返回一个实例对象 public static Object getBean() { try { //创建文档对象 DocumentBuilderFactory dFactory = DocumentBuilderFactory.newInstance(); DocumentBuilder builder = dFactory.newDocumentBuilder(); Document doc; doc = builder.parse(new File("config.xml")); //获取包含类名的文本节点 NodeList nl = doc.getElementsByTagName("className"); Node classNode=nl.item(0).getFirstChild(); String cName=classNode.getNodeValue(); //通过类名生成实例对象并将其返回 Class c=Class.forName(cName); Object obj=c.newInstance(); return obj; } catch(Exception e) { e.printStackTrace(); return null; } } }
--- title: MkDir Statement keywords: vblr6.chm1008975 f1_keywords: - vblr6.chm1008975 ms.prod: office ms.assetid: b79fdad3-a1c2-7af3-c679-09d35d4b0d87 ms.date: 06/08/2017 --- # MkDir Statement Creates a new directory or folder. **Syntax** **MkDir** _path_ The required _path_ [argument](vbe-glossary.md) is a [string expression](vbe-glossary.md) that identifies the directory or folder to be created. The _path_ may include the drive. If no drive is specified, **MkDir** creates the new directory or folder on the current drive. If the directory or folder already exists, **MkDir** will fail with run-time error 75 (Path/File access error.) ## Example This example uses the **MkDir** statement to create a directory or folder. If the drive is not specified, the new directory or folder is created on the current drive. ``` MkDir "MYDIR" ' Make new directory or folder. ```
Wayne Tribue Wayne Luis Tribue (born April 30, 1990) is an American football guard who is currently a free agent. He played college football at Temple. He was signed as an undrafted free agent by the Denver Broncos in 2012. Professional career Denver Broncos Tribue signed with the Denver Broncos as an undrafted free agent following the 2012 NFL Draft. New Orleans Saints Tribue was signed by the Saints on December 17, 2012. San Francisco 49ers Tribue signed with the San Francisco 49ers on January 23, 2013. He was released by the 49ers on August 31, 2013. Portland Thunder On December 20, 2013, Tribue was selected by the Portland Thunder during the 2014 AFL Expansion Draft. Philadelphia Soul On February 20, 2014, Tribue was traded to the Philadelphia Soul for future considerations. Dallas Cowboys After finished the season with the Soul, Tribue signed with the Dallas Cowboys of the National Football League. The Cowboys waived Tribue on August 26, 2014. Jacksonville Sharks On November 24, 2014, Tribue was assigned to the Jacksonville Sharks. Philadelphia Soul On December 3, 2015, Tribue was assigned to the Soul once again. On August 26, 2016, the Soul beat the Arizona Rattlers in ArenaBowl XXIX by a score of 56–42. He earned AFL Offensive Lineman of the Year and First Team All-Arena honors in 2017. On August 26, 2017, the Soul beat the Tampa Bay Storm in ArenaBowl XXX by a score of 44–40. Beijing Lions Tribue was selected by the Beijing Lions of the China Arena Football League (CAFL) in the first round of the 2016 CAFL Draft. He earned All-Pro North Division All-Star honors in 2016. He is listed on the Lions' roster for the 2018 season. References External links Temple Owls bio Category:1990 births Category:Living people Category:Sportspeople from Philadelphia Category:Players of American football from Pennsylvania Category:American football offensive guards Category:Temple Owls football players Category:Denver Broncos players Category:San Jose SaberCats players Category:Portland Thunder players Category:Philadelphia Soul players Category:Jacksonville Sharks players Category:Beijing Lions players
From Syria to Yemen in the Middle East, Libya to Somalia in Africa, Afghanistan to Pakistan in South Asia, an American aerial curtain has descended across a huge swath of the planet. Its stated purpose: combatting terrorism. Its primary method: constant surveillance and bombing — and yet more bombing. Its political benefit: minimizing the number of U.S. “boots on the ground” and so American casualties in the never-ending war on terror, as well as any public outcry about Washington’s many conflicts. Its economic benefit: plenty of high-profit business for weapons makers for whom the president can now declare a national security emergency whenever he likes and so sell their warplanes and munitions to preferred dictatorships in the Middle East (no congressional approval required). Its reality for various foreign peoples: a steady diet of “Made in USA” bombs and missiles bursting here, there, and everywhere. Think of all this as a cult of bombing on a global scale. America’s wars are increasingly waged from the air, not on the ground, a reality that makes the prospect of ending them ever more daunting. The question is: What’s driving this process? For many of America’s decision-makers, air power has clearly become something of an abstraction. After all, except for the 9/11 attacks by those four hijacked commercial airliners, Americans haven’t been the target of such strikes since World War II. On Washington’s battlefields across the Greater Middle East and northern Africa, air power is always almost literally a one-way affair. There are no enemy air forces or significant air defenses. The skies are the exclusive property of the U.S. Air Force (and allied air forces), which means that we’re no longer talking about “war” in the normal sense. No wonder Washington policymakers and military officials see it as our strong suit, our asymmetrical advantage, our way of settling scores with evildoers, real and imagined. Bombs away! In a bizarre fashion, you might even say that, in the twenty-first century, the bomb and missile count replaced the Vietnam-era body count as a metric of (false) progress. Using data supplied by the U.S. military, the Council on Foreign Relations estimated that the U.S. dropped at least 26,172 bombs in seven countries in 2016, the bulk of them in Iraq and Syria. Against Raqqa alone, ISIS’s “capital,” the U.S. and its allies dropped more than 20,000 bombs in 2017, reducing that provincial Syrian city to literal rubble. Combined with artillery fire, the bombing of Raqqa killed more than 1,600 civilians, according to Amnesty International. Meanwhile, since Donald Trump has become president, after claiming that he would get us out of our various never-ending wars, U.S. bombing has surged, not only against the Islamic State in Syria and Iraq but in Afghanistan as well. It has driven up the civilian death toll there even as “friendly” Afghan forces are sometimes mistaken for the enemy and killed, too. Air strikes from Somalia to Yemen have also been on the rise under Trump, while civilian casualties due to U.S. bombing continue to be underreported in the American media and downplayed by the Trump administration. U.S. air campaigns today, deadly as they are, pale in comparison to past ones like the Tokyo firebombing of 1945, which killed more than 100,000 civilians; the atomic bombings of Hiroshima and Nagasaki later that year (roughly 250,000); the death toll against German civilians in World War II (at least 600,000); or civilians in the Vietnam War. (Estimates vary, but when napalm and the long-term effects of cluster munitions and defoliants like Agent Orange are added to conventional high-explosive bombs, the death toll in Southeast Asia may well have exceeded one million.) Today’s air strikes are more limited than in those past campaigns and may be more accurate, but never confuse a 500-pound bomb with a surgeon’s scalpel, even rhetorically. When “surgical” is applied to bombing in today’s age of lasers, GPS, and other precision-guidance technologies, it only obscures the very real human carnage being produced by all these American-made bombs and missiles. This country’s propensity for believing that its ability to rain hellfire from the sky provides a winning methodology for its wars has proven to be a fantasy of our age. Whether in Korea in the early 1950s, Vietnam in the 1960s, or more recently in Afghanistan, Iraq, and Syria, the U.S. may control the air, but that dominance simply hasn’t led to ultimate success. In the case of Afghanistan, weapons like the Mother of All Bombs, or MOAB (the most powerful non-nuclear bomb in the U.S. military’s arsenal), have been celebrated as game changers even when they change nothing. (Indeed, the Taliban only continues to grow stronger, as does the branch of the Islamic State in Afghanistan.) As is often the case when it comes to U.S. air power, such destruction leads neither to victory, nor closure of any sort; only to yet more destruction. Such results are contrary to the rationale for air power that I absorbed in a career spent in the U.S. Air Force. (I retired in 2005.) The fundamental tenets of air power that I learned, which are still taught today, speak of decisiveness. They promise that air power, defined as “flexible and versatile,” will have “synergistic effects” with other military operations. When bombing is “concentrated,” “persistent,” and “executed” properly (meaning not micro-managed by know-nothing politicians), air power should be fundamental to ultimate victory. As we used to insist, putting bombs on target is really what it’s all about. End of story — and of thought. Given the banality and vacuity of those official Air Force tenets, given the twenty-first-century history of air power gone to hell and back, and based on my own experience teaching such history and strategy in and outside the military, I’d like to offer some air power tenets of my own. These are the ones the Air Force didn’t teach me, but that our leaders might consider before launching their next “decisive” air campaign. Ten Cautionary Tenets About Air Power 1. Just because U.S. warplanes and drones can strike almost anywhere on the globe with relative impunity doesn’t mean that they should. Given the history of air power since World War II, ease of access should never be mistaken for efficacious results. 2. Bombing alone will never be the key to victory. If that were true, the U.S. would have easily won in Korea and Vietnam, as well as in Afghanistan and Iraq. American air power pulverized both North Korea and Vietnam (not to speak of neighboring Laos and Cambodia), yet the Korean War ended in a stalemate and the Vietnam War in defeat. (It tells you the world about such thinking that air power enthusiasts, reconsidering the Vietnam debacle, tend to argue the U.S. should have bombed even more — lots more.) Despite total air supremacy, the recent Iraq War was a disaster even as the Afghan War staggers on into its 18th catastrophic year. 3. No matter how much it’s advertised as “precise,” “discriminate,” and “measured,” bombing (or using missiles like the Tomahawk) rarely is. The deaths of innocents are guaranteed. Air power and those deaths are joined at the hip, while such killings only generate anger and blowback, thereby prolonging the wars they are meant to end. Consider, for instance, the “decapitation” strikes launched against Iraqi autocrat Saddam Hussein and his top officials in the opening moments of the Bush administration’s invasion of 2003. Despite the hype about that being the beginning of the most precise air campaign in all of history, 50 of those attacks, supposedly based on the best intelligence around, failed to take out Saddam or a single one of his targeted officials. They did, however, cause “dozens” of civilian deaths. Think of it as a monstrous repeat of the precision air attacks launched on Belgrade in 1999 against Slobodan Milosevic and his regime that hit the Chinese embassy instead, killing three journalists. Here, then, is the question of the day: Why is it that, despite all the “precision” talk about it, air power so regularly proves at best a blunt instrument of destruction? As a start, intelligence is often faulty. Then bombs and missiles, even “smart” ones, do go astray. And even when U.S. forces actually kill high-value targets (HVTs), there are always more HVTs out there. A paradox emerges from almost 18 years of the war on terror: the imprecision of air power only leads to repetitious cycles of violence and, even when air strikes prove precise, there always turn out to be fresh targets, fresh terrorists, fresh insurgents to strike. 4. Using air power to send political messages about resolve or seriousness rarely works. If it did, the U.S. would have swept to victory in Vietnam. In Lyndon Johnson’s presidency, for instance, Operation Rolling Thunder (1965-1968), a graduated campaign of bombing, was meant to, but didn’t, convince the North Vietnamese to give up their goal of expelling the foreign invaders — us — from South Vietnam. Fast-forward to our era and consider recent signals sent to North Korea and Iran by the Trump administration via B-52 bomber deployments, among other military “messages.” There’s no evidence that either country modified its behavior significantly in the face of the menace of those baby-boomer-era airplanes. 5. Air power is enormously expensive. Spending on aircraft, helicopters, and their munitions accounted for roughly half the cost of the Vietnam War. Similarly, in the present moment, making operational and then maintaining Lockheed Martin’s boondoggle of a jet fighter, the F-35, is expected to cost at least $1.45 trillion over its lifetime. The new B-21 stealth bomber will cost more than $100 billion simply to buy. Naval air wings on aircraft carriers cost billions each year to maintain and operate. These days, when the sky’s the limit for the Pentagon budget, such costs may be (barely) tolerable. When the money finally begins to run out, however, the military will likely suffer a serious hangover from its wildly extravagant spending on air power. 6. Aerial surveillance (as with drones), while useful, can also be misleading. Command of the high ground is not synonymous with god-like “total situational awareness.” It can instead prove to be a kind of delusion, while war practiced in its spirit often becomes little more than an exercise in destruction. You simply can’t negotiate a truce or take prisoners or foster other options when you’re high above a potential battlefield and your main recourse is blowing up people and things. 7. Air power is inherently offensive. That means it’s more consistent with imperial power projection than with national defense. As such, it fuels imperial ventures, while fostering the kind of “global reach, global power” thinking that has in these years had Air Force generals in its grip. 8. Despite the fantasies of those sending out the planes, air power often lengthens wars rather than shortening them. Consider Vietnam again. In the early 1960s, the Air Force argued that it alone could resolve that conflict at the lowest cost (mainly in American bodies). With enough bombs, napalm, and defoliants, victory was a sure thing and U.S. ground troops a kind of afterthought. (Initially, they were sent in mainly to protect the airfields from which those planes took off.) But bombing solved nothing and then the Army and the Marines decided that, if the Air Force couldn’t win, they sure as hell could. The result was escalation and disaster that left in the dust the original vision of a war won quickly and on the cheap due to American air supremacy. 9. Air power, even of the shock-and-awe variety, loses its impact over time. The enemy, lacking it, nonetheless learns to adapt by developing countermeasures — both active (like missiles) and passive (like camouflage and dispersion), even as those being bombed become more resilient and resolute. 10. Pounding peasants from two miles up is not exactly an ideal way to occupy the moral high ground in war. The Road to Perdition If I had to reduce these tenets to a single maxim, it would be this: all the happy talk about the techno-wonders of modern air power obscures its darker facets, especially its ability to lock America into what are effectively one-way wars with dead-end results. For this reason, precision warfare is truly an oxymoron. War isn’t precise. It’s nasty, bloody, and murderous. War’s inherent nature — its unpredictability, horrors, and tendency to outlast its original causes and goals — isn’t changed when the bombs and missiles are guided by GPS. Washington’s enemies in its war on terror, moreover, have learned to adapt to air power in a grimly Darwinian fashion and have the advantage of fighting on their own turf. Who doesn’t know the old riddle: If a tree falls in the forest and no one is there to hear it, does it make a sound? Here’s a twenty-first-century air power variant on it: If foreign children die from American bombs but no U.S. media outlets report their deaths, will anyone grieve? Far too often, the answer here in the U.S. is no and so our wars go on into an endless future of global destruction. In reality, this country might do better to simply ground its many fighter planes, bombers, and drones. Paradoxically, instead of gaining the high ground, they are keeping us on a low road to perdition. To stay on top of important articles like these, sign up to receive the latest updates from TomDispatch.com here.
For years there has been a variety of flashing signal lights which are battery-powered and designed to meet particular needs. One example is the flashing signal light which is attached to life jackets to locate a person in a man overboard situation. Another type of flashing signal is used in road construction and repair where a barrier light provides a flashing warning signal for oncoming traffic to warn about a hazard. Flashing strobe signal lights are nearly universally installed permanently on aircraft to provide a brilliant flashing light warning to other aircraft. I have found that many of these flashing signal lights are relatively expensive because of their need to fill specific requirements of an application and in many case cases such signal lights require specific certification or an expensive installation. It appeared to me that an all-purpose battery-powered signaling light could be produced to provide a high intensity intermittent flashing signal over 360 degrees azimuth. The light should provide signaling for a period of time as long as one-year without battery or lamp replacement and with a high degree of reliability. It also needs to be waterproof so that such a signal light can be adapted to marine uses such as commercial or sport fishing needs as well as for any type of land based or other use. It is conceivable that such a lighting device could be of immeasurable value in locating lost hikers, hunters, or the like, who carry such a light and become the subject of search. The signal light must be light in weight and small in size in order to be easily carried in a pocket or mounted on any floating device such as buoy or attached to a donut shaped float. The signal device likewise needs suitable attaching means such as a lanyard or a theft resistant cable where the device is expected to remain unattended for long periods of time. It is important for the signaling device that a broad or full 360-degree azimuth beam of high intensity be provided. The use of particular lens configurations can be important to the provision of any particular requirement but I have found that a 360-degree fan shaped beam of intermittent white light is of the greatest universal use. In order to achieve long service life without change of batteries, the signal light should have a low duty cycle flashing sequence, for example, 40 milliseconds flash, 30 flashes per minute. Where the signal is only required at night, a night sensor option is needed.
Q: What happens to a short seller, who wants to close his position, but there are no shares available for sale? For the sake of argument, let's assume a scenario, where the company is very illiquid, and there are no shares for sale and even increasing the buy order doesn't produce sellers. What happens to the short seller, who wants to cover his short position in this scenario? Or a second scenario: A company like Tesla goes private. The short sellers are not able to buy enough stock in time and they end up unable to cover their short positions. Does something like this need to be settled between the lender and the shorter or is there a mechanism for this type of situation? A: Oh, he will find them. The question is AT WHAT PRICE. Short covering rallies are the worst and most brutal ones you have ever seen. The investor may end up getting ridiculous executions and owing his broker a significant amount of money. Now... Or a second scenario: A company like Tesla goes private. The short sellers are not able to buy enough stock in time and they end up unable to cover their short positions. Ah, no. Basically they will be covered at the price it is taken private. You seem to assume they get stuck with a short for the rest of the universe - no, there are provisions for this.
/* * Copyright (C) 2007 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.android.dexgen.rop.cst; import com.android.dexgen.rop.type.Type; import java.util.HashMap; /** * Constants that represent an arbitrary type (reference or primitive). */ public final class CstType extends TypedConstant { /** {@code non-null;} map of interned types */ private static final HashMap<Type, CstType> interns = new HashMap<Type, CstType>(100); /** {@code non-null;} instance corresponding to the class {@code Object} */ public static final CstType OBJECT = intern(Type.OBJECT); /** {@code non-null;} instance corresponding to the class {@code Boolean} */ public static final CstType BOOLEAN = intern(Type.BOOLEAN_CLASS); /** {@code non-null;} instance corresponding to the class {@code Byte} */ public static final CstType BYTE = intern(Type.BYTE_CLASS); /** {@code non-null;} instance corresponding to the class {@code Character} */ public static final CstType CHARACTER = intern(Type.CHARACTER_CLASS); /** {@code non-null;} instance corresponding to the class {@code Double} */ public static final CstType DOUBLE = intern(Type.DOUBLE_CLASS); /** {@code non-null;} instance corresponding to the class {@code Float} */ public static final CstType FLOAT = intern(Type.FLOAT_CLASS); /** {@code non-null;} instance corresponding to the class {@code Long} */ public static final CstType LONG = intern(Type.LONG_CLASS); /** {@code non-null;} instance corresponding to the class {@code Integer} */ public static final CstType INTEGER = intern(Type.INTEGER_CLASS); /** {@code non-null;} instance corresponding to the class {@code Short} */ public static final CstType SHORT = intern(Type.SHORT_CLASS); /** {@code non-null;} instance corresponding to the class {@code Void} */ public static final CstType VOID = intern(Type.VOID_CLASS); /** {@code non-null;} instance corresponding to the type {@code boolean[]} */ public static final CstType BOOLEAN_ARRAY = intern(Type.BOOLEAN_ARRAY); /** {@code non-null;} instance corresponding to the type {@code byte[]} */ public static final CstType BYTE_ARRAY = intern(Type.BYTE_ARRAY); /** {@code non-null;} instance corresponding to the type {@code char[]} */ public static final CstType CHAR_ARRAY = intern(Type.CHAR_ARRAY); /** {@code non-null;} instance corresponding to the type {@code double[]} */ public static final CstType DOUBLE_ARRAY = intern(Type.DOUBLE_ARRAY); /** {@code non-null;} instance corresponding to the type {@code float[]} */ public static final CstType FLOAT_ARRAY = intern(Type.FLOAT_ARRAY); /** {@code non-null;} instance corresponding to the type {@code long[]} */ public static final CstType LONG_ARRAY = intern(Type.LONG_ARRAY); /** {@code non-null;} instance corresponding to the type {@code int[]} */ public static final CstType INT_ARRAY = intern(Type.INT_ARRAY); /** {@code non-null;} instance corresponding to the type {@code short[]} */ public static final CstType SHORT_ARRAY = intern(Type.SHORT_ARRAY); /** {@code non-null;} the underlying type */ private final Type type; /** * {@code null-ok;} the type descriptor corresponding to this instance, if * calculated */ private CstUtf8 descriptor; /** * Returns an instance of this class that represents the wrapper * class corresponding to a given primitive type. For example, if * given {@link Type#INT}, this method returns the class reference * {@code java.lang.Integer}. * * @param primitiveType {@code non-null;} the primitive type * @return {@code non-null;} the corresponding wrapper class */ public static CstType forBoxedPrimitiveType(Type primitiveType) { switch (primitiveType.getBasicType()) { case Type.BT_BOOLEAN: return BOOLEAN; case Type.BT_BYTE: return BYTE; case Type.BT_CHAR: return CHARACTER; case Type.BT_DOUBLE: return DOUBLE; case Type.BT_FLOAT: return FLOAT; case Type.BT_INT: return INTEGER; case Type.BT_LONG: return LONG; case Type.BT_SHORT: return SHORT; case Type.BT_VOID: return VOID; } throw new IllegalArgumentException("not primitive: " + primitiveType); } /** * Returns an interned instance of this class for the given type. * * @param type {@code non-null;} the underlying type * @return {@code non-null;} an appropriately-constructed instance */ public static CstType intern(Type type) { CstType cst = interns.get(type); if (cst == null) { cst = new CstType(type); interns.put(type, cst); } return cst; } /** * Returns an interned instance of this class for the given * {@code Class} instance. * * @param clazz {@code non-null;} the underlying {@code Class} object * @return {@code non-null;} an appropriately-constructed instance */ public static CstType intern(Class clazz) { return intern(Type.intern(clazz)); } /** * Constructs an instance. * * @param type {@code non-null;} the underlying type */ public CstType(Type type) { if (type == null) { throw new NullPointerException("type == null"); } if (type == type.KNOWN_NULL) { throw new UnsupportedOperationException( "KNOWN_NULL is not representable"); } this.type = type; this.descriptor = null; } /** {@inheritDoc} */ @Override public boolean equals(Object other) { if (!(other instanceof CstType)) { return false; } return type == ((CstType) other).type; } /** {@inheritDoc} */ @Override public int hashCode() { return type.hashCode(); } /** {@inheritDoc} */ @Override protected int compareTo0(Constant other) { String thisDescriptor = type.getDescriptor(); String otherDescriptor = ((CstType) other).type.getDescriptor(); return thisDescriptor.compareTo(otherDescriptor); } /** {@inheritDoc} */ @Override public String toString() { return "type{" + toHuman() + '}'; } /** {@inheritDoc} */ public Type getType() { return Type.CLASS; } /** {@inheritDoc} */ @Override public String typeName() { return "type"; } /** {@inheritDoc} */ @Override public boolean isCategory2() { return false; } /** {@inheritDoc} */ public String toHuman() { return type.toHuman(); } /** * Gets the underlying type (as opposed to the type corresponding * to this instance as a constant, which is always * {@code Class}). * * @return {@code non-null;} the type corresponding to the name */ public Type getClassType() { return type; } /** * Gets the type descriptor for this instance. * * @return {@code non-null;} the descriptor */ public CstUtf8 getDescriptor() { if (descriptor == null) { descriptor = new CstUtf8(type.getDescriptor()); } return descriptor; } }
/* (c) 2014 Open Source Geospatial Foundation - all rights reserved * (c) 2001 - 2013 OpenPlans * This code is licensed under the GPL 2.0 license, available at the root * application directory. */ package org.geoserver.security.web.role; import java.io.IOException; import java.util.ArrayList; import java.util.Collection; import org.apache.wicket.WicketRuntimeException; import org.apache.wicket.model.LoadableDetachableModel; import org.geoserver.security.GeoServerSecurityManager; import org.geoserver.security.impl.GeoServerRole; import org.geoserver.web.GeoServerApplication; public class RolesModel extends LoadableDetachableModel<Collection<GeoServerRole>> { @Override protected Collection<GeoServerRole> load() { GeoServerSecurityManager secMgr = GeoServerApplication.get().getSecurityManager(); try { return new ArrayList(secMgr.getActiveRoleService().getRoles()); } catch (IOException e) { throw new WicketRuntimeException(e); } } }
Comparative study on toxicity of extracellularly biosynthesized and laboratory synthesized CdTe quantum dots. Nanobiosynthesis belongs to the most recent methods for synthesis of nanoparticles. This type of synthesis provides many advantages including the uniformity in particle shape and size. The biosynthesis has also a significant advantage regarding chemical properties of the obtained particles. In this study, we characterized the basic properties and composition of quantum dots (QDs), obtained by the extracellular biosynthesis by Escherichia coli. Furthermore, the toxicity of the biosynthesized QDs was compared to QDs prepared by microwave synthesis. The obtained results revealed the presence of cyan CdTe QDs after removal of substantial amounts of organic compounds, which stabilized the nanoparticle surface. QDs toxicity was evaluated using three cell lines Human Foreskin Fibroblast (HFF), Human Prostate Cancer cells (PC-3) and Breast Cancer cells (MCF-7) and the MTT assay. The test revealed differences in the toxicity between variants of QDs, varying about 10% in the HFF and 30% in the MCF-7 cell lines. The toxicity of the biosynthesized QDs to the PC-3 cell lines was about 35% lower in comparison with the QDs prepared by microwave synthesis.
Referring now to the accompanying drawings, an example of a wireless remote control system with a pointing device of prior art is described below, which, for example, is typically described in the Japanese Patent Application No. 5-7721 of 1993. FIG. 1. describes a electric circuit of a wireless remote control system with a pointing device of a prior art. A remote controller 6 comprises a key input device 1, a pointing device 2, a first controller 3, a second controller 4, and optical output device 5. Usually, a computer key board may be the key input device 1 and mouse or track ball may be the pointing device 2. The key input device 1 is provided to input a character, text data and the like to a computer or to operate a computer itself. The operations of the computer itself are, for example, the picture adjustment of the computer display, changing the input source of the computer, an operate of a memory device and the like. As described below, the key input device 1 outputs a key code signal to the first controller 3. The pointing device 2 is provided to move a pointer on the computer display. The pointing device 2 outputs a pointer control signal to the second controller 4. The first controller 3 is provided for encoding the key code signal to a remote control signal by means of a carrier-wave-modulation. The second controller 4 encodes the pointer control signal to a remote control signal. The optical output device 5 outputs the remote control signal in a form of infrared rays to the receiver 10. The receiver 10 comprises a receive device 7, a decoder 8 and a controller 9. The receive device 7 receives a remote control signal from optical output device 5 of the remote controller 6. A receptor unit is preferably used as the receive device 7. The decoder 8 decodes a remote control signal received by the receive device 7 to a key code signal or a pointer control signal and outputs them to the controller 9, The controller 9 outputs a control signal to a computer on the bases of said key code signal or coordinate signal. FIG. 2. shows a structure of the remote control signal. The remote control signal comprises Reader Codes, Custom Codes, and Data Codes. The remote control signals are consisting of digital signals which transformed by the pulse modulation. The Leader Codes are identification codes for discriminating the remote control signal from noises. The Custom Codes are identification codes for specifying the equipment which is controlled with the remote controller. The order which inputted with the key input device 1 or the pointing device 2 is discriminated by the Data Codes. A user of the computer makes an order to control the computer with the key input device 1 and the pointing device 2. The operation in this constitution of prior art is explained as follows; (1) When the receive device 7 receives the remote control signal of the key code signal inputted with the key input device 1, the decoder 8 decodes the remote control signal to the key code signal and controller 9 transforms the key code signal to the control signal in the form of the controlled computer to input characters or text data to the computer or to bring the computer itself in control by order of the key input device 1 . (2) When the receive device 7 received the remote control signal of the pointer control signal inputted with the pointing device 2, the decoder 8 decodes the remote control signal to the pointer control signal and controller 9 transforms the pointer control signal to the coordinate signal in the form of the controlled computer to move a pointer on the computer display by order of the pointing device 2. Thus, according to this constitution of a prior art, a computer input system with a key board and a pointing device can be wireless from a computer. However, the remote control system with a pointing device of a prior art can not implement the order of controlling the computer it self with the pointing device 2 because the key code signal and pointer control signal which decoded by the decoder 8 are independently inputted to controller 9.
From the sidelines of the Group of 20 world leaders’ summit in Hamburg, Germany, Ivanka Trump, a senior White House adviser to her father, launched the Women Entrepreneurs Finance Initiative to help advance the economic empowerment of women around the world. President Donald Trump said Saturday the U.S. would contribute $50 million to the new World Bank fund conceived by his daughter that aims to help women entrepreneurs access capital and other support. World Bank Group President Jim Yong Kim said the fund had raised more than $325 million so far for projects and programs to support women and women-led businesses by improving access to capital and markets, providing technical assistance, training and mentoring, and pushing public policy. The fund grew out of conversations between Ivanka Trump and Kim early in Trump’s administration. “This is not a cute little project,” Kim said during a panel discussion, arguing the effort would spur real economic growth and critical investments. President Trump, Canadian Prime Minister Justin Trudeau and German Chancellor Angela Merkel also spoke at the event, where Trump said the fund would help eliminate barriers for women to launch businesses, help transform “millions and millions of lives,” and “provide new hope to these women from countless communities all across the world.” The commitment comes as the Trump administration has proposed dramatic cuts to diplomatic and development funding in line with the president’s “America First” foreign policy doctrine. His proposal would cut money for the State Department and U.S. Agency for International Development by more than 31 percent in the budget year beginning in October. He’s also banned federal dollars from going to international groups working on issues such as HIV, AIDS and maternal and child health if they perform abortions or even provide information on the procedure. The president has been criticized for crude remarks he’s made about women over the years, including a recent tweet focusing on a television news host’s appearance. Trump’s senior staff is dominated by men, despite the considerable influence of his daughter. In addition to the U.S., Germany and Canada, the new fund has also received contributions from Saudi Arabia, the United Arab Emirates, Japan, Australia, China, Denmark, the Netherlands, Norway, and South Korea. During his 2016 campaign, Trump frequently criticized rival Hillary Clinton’s ties to her family’s Clinton Foundation, which received millions in donations from Saudi Arabia, the United Arab Emirates and several other Mideast nations for charitable work. During an October general election debate in Las Vegas, Trump demanded that Clinton “give back the money you’ve taken from certain countries that treat certain groups of people so terrible.” He said then: “Saudi Arabia giving $25 million, Qatar, all of these countries. You talk about women and women’s rights? So these are people that push gays off … buildings. These are people that kill women and treat women horribly. And yet you take their money.” Officials stressed that Ivanka Trump will not have an operational or fundraising role with the fund, which will be run by a governing committee of contributors. Trump also took the opportunity to praise Ivanka Trump, who at one point Saturday was spotted sitting in her father’s seat at an official G-20 event after he had left the room. Trump said he’d been proud of her since “day one,” and offered a rare, self-deprecating assessment of the challenges he’s added to her life. “If she weren’t my daughter, it would be so much easier for her,” he said with laugh, adding: “That might be the only bad thing she has going, if you want to know the truth.” Ivanka Trump has faced sustained criticism from opponents of her father who’d hoped she would be able to push him to adopt more moderate policies. Many have labeled her “complicit” in his agenda. Engage with us on Twitter Engage with us on Fb get involved Citizens For Trump is looking for enthusiastic volunteers to help coordinate, plan, promote, and execute strategies that will achieve measurable results and be a blessing to the Trump administration. Please submit your application through the Volunteer Recruitment Form below. Answering all of the following questions will help us match your volunteer application with a suitable volunteer role. All volunteer applications will be reviewed and responded to within 3-5 business days. Thank you for committing your valuable time to help. Fields marked * are mandatory. Contact Details First name * Last name * Email address * Address 1 Address 2 City State * Select your state Zip code * Home phone Cell phone Campaign Experience This is my first time volunteeringSome campaign experienceProfessional campaign experience Availability * Select your time commitment availability. Travel distance Select the distance you're willing to travel from home. Best time to contact me Select the time frame you'd like us to contact you during. My interests and skill sets are in: * Please click in the "select some options" box above and select the skills/interests that apply to you. You must add at least one. Click back in the box to continue adding skills/interests. Thank you. How would you like to help? * I would like to volunteer my time on the groundI would like to volunteer my time onlineI would to volunteer my time on the phone
- 14.08.2018 - Hello all, Here's GLN Reward Spreadsheet - https://docs.google.com/spreadsheets/d/1QUQlnoHpps4-YMSyJrCDEzKdwfJE-t0ogZkiVYlJLuU/edit?usp=sharing - The amount to be distributed is 1,5 Million tokens. - Distribution date will be announced in a few weeks. - KYC will be required for the participants. - More info about KYC in a few weeks. - Follow GLN social media for more information about the progress. These are the latest information given by the management. If you have any questions or complaints you can contact us here - https://t.me/moonbounties Thanks all, it was amazing to work with you! 06.08.2018 - Hello all, I am happy to announce we have successfully ended our bounty program for Game Loot Network! We will publish the final spreadsheet in one week from now. For any questions you may have, feel free to ask them in our MoonBounties group - https://t.me/moonbounties Thank you all, it was super nice to work with you! Kind regards, Ratko Game Loot Network Bounty Program The Stake System General Rules Translation and Moderation- 10% Signatures - 10% Reddit - 10% Twitter - 10% Facebook - 10% Blogs/Articles/Reviews - 15% Videos - 10% Telegram - 5% Instagram - 5% Medium - 5% Influencers - 5% Bonus - 5% Dates per week Complaints and other bounty-related questions @RatkoStambolija on Telegram. You can also send a direct message on BitcoinTalk to Ratko1922 or send us an email to bounty@gamelootnetwork.com If you have any questions, please contacton Telegram. You can also send a direct message on BitcoinTalk toor send us an email to Translation Resources: Editable whitepaper: https://files.fm/u/3fad565u Editable website text: https://files.fm/u/mmjybxrs Video subtitles: https://files.fm/u/r7a2kqbx Website translation: 500 stakes Whitepaper translation: 1000 stakes Video subtitle translation: 300 stakes ANN thread and Bounty thread translation: 150 stakes each Moderation: 5 stakes for each post (only OP) Bounty manager contact: Telegram - @ratkostambolija BitcoinTalk - Ratko1922 Email - Telegram - @ratkostambolijaBitcoinTalk - Ratko1922Email - bounty@gamelootnetwork.com Language Whitepaper Website Video Subs ANN Bounty Arabic joker989898 joker989898 joker989898 joker989898 joker989898 Chinese lilac835 lilac835 lilac835 lilac835 lilac835 Czech Wewa Wewa Wewa Available Available Croatian dannysavage dannysavage dannysavage dannysavage dannysavage Dutch Joeri124 Joeri124 Joeri124 joerip joerip French Alan97417 Alan97417 Alan97417 Alan97417 Alan97417 German without without without without without Hindi kryptogunner kryptogunner kryptogunner kryptogunner Available Indonesian clponyu clponyu clponyu clponyu clponyu Italian mikfresh mikfresh mikfresh mikfresh mikfresh Japanese kazuki.t kazuki.t kazuki.t kazuki.t kazuki.t Korean wipeout0 wipeout0 wipeout0 wipeout0 wipeout0 Polish Shavedcoconut Shavedcoconut Shavedcoconut Available Available Portuguese Guaipeca Guaipeca Guaipeca Available Available Russian Anjikbel Pharaohandtrasher Anjikbel Pharaohandtrasher Pharaohandtrasher Spanish Timotron Timotron Timotron Timotron Timotron Turkish cryptobaro cryptobaro cryptobaro cryptobaro cryptobaro Vietnamese snowblack ChuckBuck ChuckBuck ChuckBuck ChuckBuck Needed Languages Signatures Hero/Legendary Code: [center][table][tr][td][url=https://gamelootnetwork.com][size=2pt][tt][color=#788895] ▄███████[color=#FF8200]██▄[/color] [color=#A2A7A3] ▄███████[color=#F18501]██████▄[/color] [color=#818F9A] ▄███████▀ [color=#7D8997] ▄███████▀ [color=#788895]▄▄▄▄▄▄▄▄[/color][color=#F78100]▄▄[/color] [color=#78858E]▄███████▀ [color=#A2A7A3]▄███████[/color][color=#FF9A3C]█████▄ ██[/color]████▀ [color=#818F9A]▄███████▀[/color] [color=#FF890C]██████ █████[/color] [color=#7D8997]▄███████▀[/color][color=#FF8602] ▀████ ██████▄[/color] [color=#788895]▀▀▀▀▀▀▀▀[/color] [color=#788895]▄███[color=#FF8400]███ ▀███████▄[/color] [color=#788895]▄███████[color=#FF8400]▀ ▀███████▄[/color] [color=#7D8997]▄███████▀ [color=#FF8400] ▀███████▄[/color] [color=#818F9A]▄███████▀ [color=#FF8400] ▀█████[/color][color=#A2A7A3]████████▀ [color=#FF8400] ▀█[/color][color=#788895]████████▀[/url][/td] [td][center][url=https://gamelootnetwork.com][font=arial][size=16pt][b][color=#7F8B99]game[color=#FF8806]loot[/size] [size=7pt][color=#7F8B99]N E T W O R K[/size][/font][/url][/td] [td][center][font=arial black][url=https://gamelootnetwork.com][size=9pt][b][glow=#3C4980,2,300][color=#3C4980].....[/color][color=#fff]GAMING [color=#FF8806]POWERED BY[/color] A[color=#3C4980].....[/color] [color=#3C4980].....[/color][color=#fff]BLOCKCHAIN UNIVERSE[color=#3C4980]....[size=5pt].[/size][/color][/glow][/size][/url] [size=1pt].[/size] [size=5pt][color=#FF8806]▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬[/td] [td][url=https://gamelootnetwork.com][size=16pt][glow=#FF8806,2,300][color=#FF8806].[ [size=9pt][sup][size=9pt][b][font=arial black][color=#fff][u] [color=#fff]LOOT ICO [/u][/font][/size][/sup][/size] [font=impact][size=16pt][color=#13E260]❱ ❱ ❱ [color=#3C4980]A p r i l 2 1 [size=13pt][sup]st[/sup][/size][/size][/font] ].[/glow][/size][/url] [font=arial black][size=5pt][url=https://gamelootnetwork.com/form.html][size=8pt][i][color=#7F8B99]JOIN WHITELIST [/size][/url][color=#FF8806]▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬[/size][/td][td][/td][td][/td] [td][center][color=transparent][size=2pt].[/color] [url=https://www.facebook.com/gamelootnetwork/][color=#3C4980][size=2pt][tt]▄▄███████▄▄ ▄███████[glow=#FF8806,2]█▀ ▄[/glow] ████████[glow=#FF8806,2]█ ▄▄█[/glow]█ █████████[glow=#FF8806,2]█ █[/glow]█████ ███████[glow=#FF8806,2]█ █[/glow]██ ███████[glow=#FF8806,2]█▄▄ ▄▄█[/glow]███ ████████[glow=#FF8806,2]█ █[/glow]████ ▀██████[glow=#FF8806,2]█ █[/glow]██▀ ▀▀███[glow=#FF8806,2]█ [/glow]▀▀ [color=transparent][size=2pt].[/color] [size=6pt][font=arial][b]FACEBOOK[/td][td][/td][td][/td] [td][center][color=transparent][size=2pt].[/color] [url=https://twitter.com/gamelootnetwork][color=#FF8806][size=2pt][tt]▄▄███████▄▄ ▄█████████████▄ [glow=#3C4980,2]███▀█████▀ ▀▀▀██ ████ ▀▀ ████ ████▄ █████ █████▄ ██████ ██▄▀ ▄▄██████[/glow] ▀█████████████▀ ▀▀███████▀▀ [color=transparent][size=2pt].[/color] [size=6pt][font=arial][b]TWITTER[/td][td][/td][td][/td] [td][center][color=transparent][size=2pt].[/color] [url=https://t.me/gamelootnetwork_ico][color=#3C4980][size=2pt][tt]▄▄███████▄▄ ▄█████████████▄ [glow=#FF8806,2]███████████▀▀████ ███████▀▀▀ █████ ███▀ ▄▀ ▄█████ █████▄▄█ ██████ ██████ ▄█▄ ▄█████[/glow] ▀█████████████▀ ▀▀███████▀▀ [color=transparent][size=2pt].[/color] [size=6pt][font=arial][b]TELEGRAM[/td][td][/td][td][/td] [td][center][color=transparent][size=2pt].[/color] [url=https://medium.com/@gamelootnetwork][color=#FF8806][size=2pt][tt]▄▄███████▄▄ ▄█████████████▄ [glow=#3C4980,2]██▄ ▀████ ▄██ ████▌ ▀██ ████ ████▌▐▄ ▀ ▐ ████ ████▌▐█▄ ▐█ ████ ██▀ ▀█▄▐█▀ ▀██[/glow] ▀█████████████▀ ▀▀███████▀▀ [color=transparent][size=2pt].[/color] [size=6pt][font=arial][b]MEDIUM[/td][/tr][/table][/center] Quote Sr. Member Code: [center][table][tr][td][url=https://gamelootnetwork.com][size=2pt][tt][color=#788895] ▄███████[color=#FF8200]██▄[/color] [color=#A2A7A3] ▄███████[color=#F18501]██████▄[/color] [color=#818F9A] ▄███████▀ [color=#7D8997] ▄███████▀ [color=#788895]▄▄▄▄▄▄▄▄[/color][color=#F78100]▄▄[/color] [color=#78858E]▄███████▀ [color=#A2A7A3]▄███████[/color][color=#FF9A3C]█████▄ ██[/color]████▀ [color=#818F9A]▄███████▀[/color] [color=#FF890C]██████ █████[/color] [color=#7D8997]▄███████▀[/color][color=#FF8602] ▀████ ██████▄[/color] [color=#788895]▀▀▀▀▀▀▀▀[/color] [color=#788895]▄███[color=#FF8400]███ ▀███████▄[/color] [color=#788895]▄███████[color=#FF8400]▀ ▀███████▄[/color] [color=#7D8997]▄███████▀ [color=#FF8400] ▀███████▄[/color] [color=#818F9A]▄███████▀ [color=#FF8400] ▀█████[/color][color=#A2A7A3]████████▀ [color=#FF8400] ▀█[/color][color=#788895]████████▀[/url][/td] [td][center][url=https://gamelootnetwork.com][font=arial][size=16pt][b][color=#7F8B99]game[color=#FF8806]loot[/size] [size=7pt][color=#7F8B99]N E T W O R K[/size][/font][/url][/td] [td][font=arial black][url=https://gamelootnetwork.com][size=9pt][b] [color=#3C4980]GAMING [color=#FF8806]POWERED BY[/color] A [color=#3C4980]BLOCKCHAIN UNIVERSE[/size][/url] [size=1pt].[/size] [size=5pt][color=#FF8806]▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬[/td] [td][url=https://gamelootnetwork.com][size=16pt][color=#13E260][ [size=9pt][sup][size=9pt][b][font=arial black][color=#3B7AE1][u] [color=#FF8806]LOOT ICO [/u][/font][/size][/sup][/size] [font=impact][size=16pt][color=#13E260]❱ ❱ ❱ [color=#3C4980]A p r i l 2 1 [size=13pt][sup]st[/sup][/size][/size][/font] ][/size][/url] [font=arial black][size=5pt][url=https://gamelootnetwork.com/form.html][size=8pt][i][color=#7F8B99]JOIN WHITELIST [/size][/url][color=#FF8806]▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬[/size][/td][td][/td][td][/td] [td][center][color=transparent][size=2pt].[/color] [url=https://www.facebook.com/gamelootnetwork/][color=#3C4980][size=2pt][tt]▄▄███████▄▄ ▄████████▀ ▄ █████████ ▄▄██ ██████████ ██████ ████████ ███ ████████▄▄ ▄▄████ █████████ █████ ▀███████ ███▀ ▀▀████ ▀▀ [color=transparent][size=2pt].[/color] [size=6pt][font=arial][b]FACEBOOK[/td][td][/td][td][/td] [td][center][color=transparent][size=2pt].[/color] [url=https://twitter.com/gamelootnetwork][color=#FF8806][size=2pt][tt]▄▄███████▄▄ ▄█████████████▄ ███▀█████▀ ▀▀▀██ ████ ▀▀ ████ ████▄ █████ █████▄ ██████ ██▄▀ ▄▄██████ ▀█████████████▀ ▀▀███████▀▀ [color=transparent][size=2pt].[/color] [size=6pt][font=arial][b]TWITTER[/td][td][/td][td][/td] [td][center][color=transparent][size=2pt].[/color] [url=https://t.me/gamelootnetwork_ico][color=#3C4980][size=2pt][tt]▄▄███████▄▄ ▄█████████████▄ ███████████▀▀████ ███████▀▀▀ █████ ███▀ ▄▀ ▄█████ █████▄▄█ ██████ ██████ ▄█▄ ▄█████ ▀█████████████▀ ▀▀███████▀▀ [color=transparent][size=2pt].[/color] [size=6pt][font=arial][b]TELEGRAM[/td][td][/td][td][/td] [td][center][color=transparent][size=2pt].[/color] [url=https://medium.com/@gamelootnetwork][color=#FF8806][size=2pt][tt]▄▄███████▄▄ ▄█████████████▄ ██▄ ▀████ ▄██ ████▌ ▀██ ████ ████▌▐▄ ▀ ▐ ████ ████▌▐█▄ ▐█ ████ ██▀ ▀█▄▐█▀ ▀██ ▀█████████████▀ ▀▀███████▀▀ [color=transparent][size=2pt].[/color] [size=6pt][font=arial][b]MEDIUM[/td][/tr][/table][/center] Quote Full Member Code: [center][font=arial black][url=https://gamelootnetwork.com][color=#FF8806][u] [color=#7F8B99]Game [color=#FF8806]Loot[/color] Network[/color] [/u][/color] [color=#3C4980]GAMING [color=#FF8806]POWERED BY[/color] A BLOCKCHAIN UNIVERSE[/color] [font=Verdana][color=#13E260][[/color][/font] [color=#FF8806]LOOT ICO[/color] [color=#13E260]❱ ❱ ❱[/color] [color=#3C4980]A p r i l 2 1 st[/color] [font=Verdana][color=#13E260]][/color][/font][/url][/font] [b][font=arial narrow][url=https://www.facebook.com/gamelootnetwork/][color=#FF8806]FACEBOOK[/color][/url] [url=https://twitter.com/gamelootnetwork][color=#3C4980]TWITTER[/color][/url] [color=#FF8806]│ [i][url=https://gamelootnetwork.com/form.html][color=#7F8B99]JOIN WHITELIST[/color][/url][/i] │[/color] [url=https://t.me/gamelootnetwork_ico][color=#3C4980]TELEGRAM[/color][/url] [url=https://medium.com/@gamelootnetwork][color=#FF8806]MEDIUM[/color][/url][/font][/b][/center] Quote Member Code: [center][url=https://gamelootnetwork.com][u] Game Loot Network [/u] GAMING POWERED BY A BLOCKCHAIN UNIVERSE [ LOOT ICO ❱ ❱ ❱ A p r i l 2 1 st ][/url] [url=https://www.facebook.com/gamelootnetwork/]FACEBOOK[/url] [url=https://twitter.com/gamelootnetwork]TWITTER[/url] │ [i][url=https://gamelootnetwork.com/form.html]JOIN WHITELIST[/url][/i] │ [url=https://t.me/gamelootnetwork_ico]TELEGRAM[/url] [url=https://medium.com/@gamelootnetwork]MEDIUM[/url][/center] Quote Jr. Member Code: [[center][u] GameLootNetwork.com [/u] GAMING POWERED BY A BLOCKCHAIN UNIVERSE [ LOOT ICO ❱ ❱ ❱ A p r i l 2 1 st ][/center] Quote GameLootNetwork.com GAMING POWERED BY A BLOCKCHAIN UNIVERSE [ LOOT ICO ❱ ❱ ❱ A p r i l 2 1 st ] Reddit 1. Subreddit support 2. Reddit Sharing Twitter Quote Twitter Number in the spreadsheet Profile URL Week number Retweets: 1. 2. 3. 4. 5. Tweets: 1. 2. Facebook Quote Facebook Number in the spreadsheet Profile URL Week number Shares: 1. 2. 3. 4. 5. Posts: 1. 2. Blog/Articles/Reviews Videos Telegram Telegram channel URL: https://t.me/gamelootnetwork_ico Instagram Bounty Program Terms and Conditions Game Loot Network (GLN) bounty campaign will be explained in details below. The total allocation for the bounty is 1% of the total token supply sold. This means that if all 425,000,000 tokens are sold 4,250,000 will be distributed amongst bounty participants. With the initial price of the Loot tokens set to 0.35 USD, it means that the value of the bounty prize pool could beBounty participants will be split into bounty pools based on their method of contribution with each pool having its own distribution Loot tokens. The fairest way to share the tokens in the bounty is by using the “stakes” system.You will be awarded "stakes" for each task you successfully complete in each pool. At the end of the token sale, the entire value of the pool will be distributed to the stakeholders based on the number of stakes they hold.The campaign will end when ICO finishes or when we sell all tokens. This means that the Bounty will end when the ICO ends, or before if all tokens are sold. The latest day the bounty program will end is January 2019.The bounty budget is divided into the following categories:Any submission of the shares/posts on this bounty thread before and beyond inclusive dates of each week will not be counted.Week 1 - March 19, 2018 - March 25, 2018Week 2 - March 26, 2018 - April 1, 2018Week 3 - April 2, 2018 - April 8, 2018Week 4 - April 9, 2018 - April 15, 2018Week 5 - April 16, 2018 - April 22, 2018Week 6 - April 23, 2018 - April 29, 2018Week 7 - April 30, 2018 - May 6, 2018Week 8 - May 7, 2018 - May 13, 2018Week 9 - May 14, 2018 - May 20, 2018Week 10 - May 21, 2018 - May 27, 2018Week 11 - May 28, 2018 - June 3, 2018Week 12 - June 4, 2018 - June 10, 2018Week 13 - June 11, 2018 - June 17, 2018Week 14 - June 18, 2018 - June 24, 2018Week 15 - June 25, 2018 - July 1, 2018Week 16 - July 2, 2018 - July 8, 2018Week 17 - July 9, 2018 - July 15, 2018Week 18 - July 16, 2018 - July 22, 2018Week 19 - July 23, 2018 - July 29, 2018Week 20 - July 30, 2018 - August 5, 2018Once a week our bounty-manager will be checking and renewing your status in the spreadsheet. Weeks will start on Monday (00:00 GMT) and end on Sundays (23:59 GMT). The spreadsheets will be updated eachfor the previous week.You can join the Bounty Campaign at any time, but you can’t get stakes for the weeks that you have missed. Naturally, the sooner you do it, the more stakes you will get.The final spreadsheet stating all the stakes earned by each participant will be available within ten days after the end date of ICO. KYC form will be required for every participant of this bounty program.Each participant will be personally notified on BitcoinTalk when the tokens are sent.The following rules are mandatory for all participants of the bounty:1. Join our Telegram channel: https://t.me/gamelootnetwork_ico 2. Like our Facebook page: https://www.facebook.com/gamelootnetwork/ 3. Follow us on Twitter: https://twitter.com/gamelootnetwork Help us reach the entire world by translating our materials into your native language!Payments:To reserve a language please post your interest with some of your previous translation work or contact the bounty manager., fill in this form with your translation and other details:Spreadsheet of completed translations:Rules and Terms:1: Translations must be original, using any kind of tools such as Google Translate is not allowed. If found the translator will be blacklisted.2: ANN thread translator will be responsible for the moderation as well (we have additional rewards for moderation).3: Always ask before beginning translation and post your previous translation work.4: Translations must be delivered within 20 days of reservation. We only accept translation reservations for the first two weeks.5: Manager and owners reserve the rights to add rules, or do any kind of reasonable changes.Join our signature campaign and help us spread the word about our project among the community!Terms:We are looking for regularly active members.Negative trust members are not allowed to join this campaign.Regular posts in the alternate cryptocurrencies section are desired.Users that spam will be banned from the campaign and payment will be denied.We don't allow multiple signatures for the same user.Please change your avatar to the GLN supplied avatar according to your rank (below).Weekly posts will be counted until Saturday 23:59 forum time.Rewards:Junior Member: 10 stakes / WeekMember: 20 stakes / WeekFull Member: 30 stakes / WeekSr. Member: 40 stakes / WeekHero Member / Legendary: 60 stakes / WeekRules:1. If you want to join this bounty, please wear the signature based on your rank (below).2. The signature should be kept until the end of the ICO. Removal of this during the ICO, results in a disqualification.3. During this period you must post on BitcoinTalk at least 5 posts per week.4. Only high-quality contributions are counted. Contributions without any meaningful and constructive benefit, with the intention of increasing the number of contributions, will be disqualified.5. Payment will be made after the shares have been determined after the end of the ICO.6: Please keep your signature, even after the end of the ICO, in your Bitcointalk profile. The calculation of your shares can take more than a week.Apply to join the campaign here:View the list of participants and rewards here:The Reddit bounty program will consist out of two parts. One will be related to the support of our subreddit and other one to direct promotion on the platform.Support us on Reddit and earn stakes!Apply to join the campaign here:Terms:1. Subscribe to our subreddit -2. Upvote all our posts3. Post commentsRewards1. Subscribing to our subreddit 5 stakes2. Upvoting our posts (whole campaign) 100 stakes3. Comments 10 stakes each (max 1000 stakes per participant)View the list of participants and rewards here:Help us spread the word about GLN on Reddit.Apply to join the campaign here:Rewards:10 upvotes on your post: 10 stakes20 upvotes on your post: 20 stakes50 upvotes on your post: 50 stakes100 upvotes on your post: 100 stakes300 upvotes on your post: 300 stakesTerms:1. For a post to be counted, it needs to be posted in one of the following subreddits, or cryptocurrency related subreddits: r/bitcoin, r/ethereum, r/ethtrader, r/icocrypto, r/ico, r/icoanalysis, r/cryptocurrency.2. Posts and Comments with negative Karma will not be accepted. Any kind of spam will not be rewarded either.3. Bonus stakes will be awarded when comments or posts have at least 10 upvotes.4. External posts should link tohttps://gamelootnetwork.com/View the list of participants and rewards here:Apply to join the campaign here:Follow our official Twitter Account https://twitter.com/gamelootnetwork Your twitter account must have at least 100 real followers.Only one twitter account per person is allowed.You need to have at least 80% real followers (we will use https://www.twitteraudit.com for checking)You have to retweet at least 4 tweets per week from our Official twitter accountYou have to post at least 1 tweets per week about GLN with the hashtag #GLNTokenSALE.The form for reports in BitcoinTalk:View the list of participants and rewards here:Note: We check tweets and retweets manually, so please be patient.Rewards:100 - 299 real followers: 2 stakes/week300 - 999 real followers: 4 stakes/week1000 - 3999 real followers: 6 stakes/week4000 - 9999 real followers: 8 stakes/week10000+ real followers: 10 stakes/weekApply to join the campaign here:Follow and Like the official GLN facebook page: https://www.facebook.com/gamelootnetwork/ Only one Facebook account per person is allowed.You have to like and repost at least 4 posts per week from our official Facebook pageYou have to make at least 2 posts per week about GLN, with the hashtag #GLNTokenSale. Only 1 post per day allowed.The form for reports in BitcoinTalk:View the list of participants and rewards here:Rewards:30 - 300 friends: 2 stakes/week301 - 600 friends: 4 stakes/week601 - 1500 friends: 6 stakes/week1501 - 4000 friends: 8 stakes/week4001+ friends: 10 stakes/weekSupport our project by writing an article, blog or a review about us.Submit the posts here:Rules:The article/review/blog post must have at least 500 words.The audience for the posted article must be crypto related or match a use for GLN or promote the token sale to a suitable audience.The website must have a genuine audience.Medium, Steemit and other free Blogs are allowed. but one person can only write 1 Article in each of these.5 articles allowed in premium blogs and websites with .com, .net. .org etc domains.Rewards:Copy-paste quality - 20 stakesNormal quality - 80 stakesMedium quality - 160 stakesGood quality - 300 stakesSuperb quality - 600 to 1000 stakesAll articles, reviews, blog posts should also contain certain keywords or tags, like: GLN, Ethereum, Token Sale, cryptocurrency, coin. You should also include links to our social media pages for readers to follow us. Here are the social media links to include:Telegram: https://t.me/gamelootnetwork_ico Facebook: https://www.facebook.com/gamelootnetwork/ Twitter: https://twitter.com/gamelootnetwork Headlines for all articles/blog/review posts must be SEO friendly and contain the keywords GLN ICO.Writers should familiarize themselves with the official white papers to ensure an accurate depiction of GLN's strategy, features, uses and technology.View the list of participants and rewards here:We are giving a large number of stakes to motivate users to create videos about GLN ICO.Submit the videos here:Rules:Describe GLN, ICO, and its features.Video must be in good resolution.Video length must be minimum 60 seconds.You can upload them to Youtube, Vimeo and other sites.3 videos is a maximum per person.Add the links to our website and BitcoinTalk ANNWe will give stakes according to the quality and audience of the article/review/blog post/video. The better it is, more stakes you receive. The amount of stakes assigned is non-negotiable.View stakes assigned here:Estimated Rewards (per item):Low quality & audience: 100 stakesNormal quality & audience: 200 stakesMedium quality & audience: 400 stakesHigh quality & audience: 800 stakesSuperb quality & audience: 1200 to 3000 stakesIdeas:You can promote the crowdfunding ICO, or the concept, but you can also promote the Bounty Program itself to bloggers and social media influencers. The larger the audience and growth of GLN, the greater the value of your Loot tokens will be on the exchanges.Join our channel and get the stakes!Each member that joins will receive 25 stakes. Members must stay in the group until the end of the campaign. This is a one-time offer.All those users that stay active until the end of the bounty by posting constructive messages and encourage discussion will receive additional 100 stakes.Apply here:View stakes assigned here:Help us to become famous by participating in our Instagram campaign!Apply here:Rewards:Follow GLN on Instagram - 25 stakesProject-related posts with the hashtag #GLNICO are rewarded according to the following schedule:50 - 300 followers: 25 stakes/post301 - 1000 followers: 50 stakes/post1001 - 4000 followers: 100 stakes/post4001 - 10000 followers: 150 stakes/post10000+ followers: 200 stakes/postThe bounty is limited to 2000 stakes per participant. We will update the number of stakes each week.View stakes assigned here:GL
[Circadian biorhythms and flight planning]. It has been shown that circadian rhythms of functional systems of the human body exert a noticeable effect on psychophysiology and reliability parameters of pilots and cadets which may be of special importance in flights on a shift basis. The dysbalance in work--rest cycles and circadian biorhythms decreases strongly qualitative and quantitative indices of pilot activities. In some cases this may cause erroneous actions, contingent situations and accidents.
Deoxyribonucleic acid (DNA) sequence data volumes are increasing rapidly. In some scenarios, the inability to efficiently store and retrieve DNA sequence data can impact scientific progress.
Fat replacement of the malignant pancreatic tissue after neoadjuvant therapy. Pancreatic lipomatosis is characterized as massive lipid infiltration of the pancreatic tissue. Although its etiology is ill defined; obesity, diabetes mellitus, chronic pancreatitis, hereditary pancreatitis, and conditions that cause pancreatic ductal obstruction, for example tumors and stones, are related to its pathogenesis. Recently, with the increased use of computerized tomography and magnetic resonance imaging, it has become possible to observe the fat replacement of the pancreas. Herein, we report a 60-year-old man complaining of abdominal pain and weight loss. Preoperative work-up revealed a locally advanced (Stage III) pancreatic adenocarcinoma. Multimodal treatment was carried out and a 100% complete response was detected after neoadjuvant therapy. The patient underwent a standard pancreaticoduodenectomy, without complications. The tissue pathology revealed lipomatosis of the pancreas. He was disease-free and symptom-free at 1 year follow-up. To our knowledge, this is the first report in the literature of pancreatic head carcinoma with total fat replacement of the pancreas after neoadjuvant chemoradiotherapy.
By Mike Thomson Presenter, Document The major event of the year was the Suez episode Formerly secret documents unearthed from the National Archives have shown Britain and France considered a "union" in the 1950s. On 10 September 1956 French Prime Minister Guy Mollet arrived in London for talks with his British counterpart, Anthony Eden. These were troubled times for Mollet's France. Egypt's President Gamel Abdel Nasser had nationalised the Suez Canal and, as if that was not enough, he was also busy funding separatists in French Algeria, fuelling a bloody mutiny that was costing the country's colonial masters dear. Monsieur Mollet was ready to fight back and he was determined to get Britain's help to do it. Formerly secret documents held in Britain's National Archives in London, which have lain virtually unnoticed since being released two decades ago, reveal the extraordinary proposal Mollet was about to make. Really I am stuttering because this idea is so preposterous Henri Soutou Historian The following is an extract from a British government cabinet paper of the day. It reads: "When the French Prime Minister, Monsieur Mollet was recently in London he raised with the prime minister the possibility of a union between the United Kingdom and France." Mollet was desperate to hit back at Nasser. He was also an Anglophile who admired Britain both for its help in two world wars and its blossoming welfare state. There was another reason, too, that the French prime minister proposed this radical plan. Tension was growing at this time along the border between Israel and Jordan. France was an ally of Israel and Britain of Jordan. If events got out of control there, French and British soldiers could soon be fighting each other. With the Suez issue on the boil Mollet could not let such a disaster happen. Secret document So, when Eden turned down his request for a union between France and Britain the French prime minister came up with another proposal. HAVE YOUR SAY We could have been a considerable force today had we gone ahead with a union Daniel Cook, UK Send us your comments A secret document from 28 September 1956 records the surprisingly enthusiastic way the British premier responded to the proposal when he discussed it with his Cabinet Secretary, Sir Norman Brook. It says: "Sir Norman Brook asked to see me this morning and told me he had come up from the country consequent on a telephone conversation from the prime minister who is in Wiltshire. "The PM told him on the telephone that he thought in the light of his talks with the French: "That we should give immediate consideration to France joining the Commonwealth "That Monsieur Mollet had not thought there need be difficulty over France accepting the headship of her Majesty "That the French would welcome a common citizenship arrangement on the Irish basis" Seeing these words for the first time, Henri Soutou, professor of contemporary history at Paris's Sorbonne University almost fell off his chair. Stammering repeatedly he said: "Really I am stuttering because this idea is so preposterous. The idea of joining the Commonwealth and accepting the headship of Her Majesty would not have gone down well. If this had been suggested more recently Mollet might have found himself in court." Textbooks Nationalist MP Jacques Myard was similarly stunned on being shown the papers, saying: "I tell you the truth, when I read that I am quite astonished. I had a good opinion of Mr Mollet before. I think I am going to revise that opinion. "I am just amazed at reading this because since the days I was learning history as a student I have never heard of this. It is not in the textbooks." It seems that the French prime minister decided to quietly forget about his strange proposals. No record of them seems to exist in the French archives and it is clear that he told few other ministers of the day about them. This might well be because after Britain decided to pull out of Suez, the battle against President Nasser was lost and all talk of union died too. Instead, when the EEC was born the following year, France teamed up with Germany while Britain watched on. The rest, it seems, is history. Document's A Marriage Cordial will be broadcast on Radio 4 at 2000 GMT on Monday.
Reproduction in alcoholic mice: I. Treated females. A study of the influence of alcohol on ovarian activity, prenatal mortality and sex ratio. 1. When female mice are treated with light doses of alcohol fumes, (45 minutes a day starting at four weeks) and compared with their untreated sisters from the same litter of inbred lines: a) the time between mating and birth of a litter tends to be lengthened; b) the age at the opening of the vaginal orifice and at the first oestrous shown by smears, is questionably increased; c) the length of the oestrous cycle, the number of corpora lutea, size of litter (father untreated), natal and prenatal mortality, show no modification. 2. In isolated cases when the oestrous cycles were recorded before treatment began, the alcohol was associated with cycles whose length' was roughly doubled; this effect was more frequent when the heavy treatment was used. When female mice are treated with completely anesthetizing doses of alcohol fumes (five days a week starting at four weeks), are mated with normal males, and are compared with their untreated sisters from the same litter and mated with the same normal male: a) the treatment tends to delay the birth of the first litter and increases the intervals of time between successive births, when all young are killed at birth and the mothers remated at once; b) the number of corpora lutea per pregnancy is slightly increased without regard to whether the treatments are suspended during the last week of each pregnancy (series A) or not (series B); c) litter size is reduced by 0,5 mice in series A and 0,7 mice in series B; d) pregnancies yielding no full term young ("zero" litters) are slightly more frequent; e) the proportion of young found dead at birth is increased, in series A by 4,5%, in series B by 9,4%; and in both test and control litters, the proportion of females dead is slightly higher than the males; f) the prenatal mortality is increased by from one to two embryos per litter; g) the sex ratios show no modification: the combined totals give 51,2% males in 2857 mice; h) the occurrence of abnormalities among the young is not influenced.
Allowing cyclists to ride both ways on one-way streets in the city will make the roads “safer for everyone”, it has been claimed. According to a report for Cambridgeshire County Council: “Allowing cyclists to be exempt from no-entry restrictions, and to travel both ways on one-way streets, is a cost effective and easy way of expanding the city cycle network. With better permeability for cyclists it also encourages residents to cycle, rather than use a car for short, local journeys.” Read More Speaking at the city joint area committee at Cambridgeshire County Council yesterday (January 24), Romsey councillor Dave Baigent said people were already riding both ways down many streets, and making it formal would at least mean car drivers were on the look-out for cyclists. Cambridge has been described as the UK's cycling capital He said: “I think there are problems associated with two-way traffic, but the point is it is already happening, so it makes it safer that cars are aware cycles will be coming towards them. Read More “I am 100 per cent behind this, it makes it safer for everyone using the streets.” Many restricted streets have already been opened up to two-way cycling over the last 10 years, including Mawson Road. There have been no reported accidents associated with two-way cycling on these streets. Read More Martin Lucas-Smith of the Cambridge Cycling Campaign said: “We welcome the changes. The major benefit of this is it allows people to use smaller roads and avoid the major streets.” Mr Lucas-Smith said people should be encouraged to find effective routes through the city and that cars should be aware of people, especially children, using the roads. He expressed his disappointment over Willis Road and Brookside. Read More Some, however, were unsure of the move. Cllr Nick Avery, who represents Trumpington at Cambridge City Council, said the message he was hearing from residents was that two-way cycling in some streets in his ward would be “unsafe and undesirable”. Cllr Richard Robertson said he welcomed the scheme, but noted that proper signage and road markings would need to be put in place.
Eyre Massey, 1st Baron Clarina Eyre Massey, 1st Baron Clarina (24 May 1719 – 17 May 1804), was an Anglo-Irish British army officer of the 18th century, known primarily for his successful action at La Belle-Famille during the French and Indian War. In 1800, he was made Baron Clarina in the Peerage of Ireland. Life and career Born on 24 May 1719, he was fifth son of Colonel Hugh Massey of Duntrileague, County Limerick, and his wife Elizabeth, fourth daughter of the Right Hon. George Evans, the father of George Evans, 1st Baron Carbery. His eldest brother was Hugh Massy, 1st Baron Massy. In a memoir he states that he 'purchased a pair of colours' in the 27th foot in 1739, and went with the regiment to the West Indies as lieutenant of the grenadiers. The 27th foot, of which his fellow Limerickman General William Blakeney was colonel, was at Porto Bello, with Admiral Vernon, in 1739, and the few survivors returned home in December 1740. Military records show the dates of Massey's commissions in the 27th foot as ensign, 25 January 1741. Massey served with his regiment in Scotland in 1745–1746, and was made captain-lieutenant, and captain in the regiment by the Duke of Cumberland, apparently in 1747, captain 24 May 1751, and major 10 December 1755. French and Indian War In 1757 he went out to North America as a major 46th foot, of which he became lieutenant-colonel in 1758, and the year after commanded the regiment in the expedition to Niagara, succeeding to the command of the king's troops when Brigadier-general John Prideaux was killed. Massey states in his memoirs that as Sir William Johnson was in command of a large body of Indians, who were lukewarm in the British cause, he waived the chief command in favour of Johnson. Massey commanded in the action at La Belle-Famille, where with five hundred militia, men of the 46th, and four hundred Indians he routed eighteen hundred French regulars and Canadians, together with five hundred Indians, taking all the French officers but one prisoner. This action took place in view of Fort Niagara, which surrendered immediately afterwards, leaving the whole region of the Upper Ohio in possession of the British. Massey was transferred to his old regiment, the 27th Inniskillings, at his own request, and commanded the grenadiers of the army in the advance on Montreal in 1760. He commanded a battalion of grenadiers at the capture of Martinique in 1762, and at the conquest of Havana in 1762. During these campaigns he was wounded several times. Later career After the secession of peace, Massey commanded the 27th in New York and Quebec from 1763 to 1769, and afterwards in Ireland. He was appointed colonel of the regiment on 19 February 1773. Massey was then deployed to Nova Scotia in 1776 as a Major-General, and commanded the troops in Halifax for four years. Later he held command at Cork. A plan of his for the defence of Cork in 1780 is in the British Museum (Add. MS. 33178, f. 240). For many following years he remained unemployed by the military. From 1790 to 1797 he served as Member of Parliament for Swords in the Parliament of Ireland. However, in some letters to General Sir John Vaughan around 1793–4, Massey relates his disappointments in not obtaining a military command, and his vexations at the appointment by the Marquis of Buckingham, the lord-lieutenant, of 'Popish children' (Master Talbot, aged eight, Master Skerritt, aged nine, and others), to ensigncies in his regiment. Later in 1794 he obtained the Cork command, which he held until his promotion to full general in 1796. The command had difficulties with new regiments, which the government persisted in 'drafting' in defiance of their recruiting engagements. He quelled a mutiny of two thousand of these young troops at Spike Island in 1795. Massey was raised to the Peerage of Ireland on 27 December 1800, under the title of Baron Clarina of Elm Park, co. Limerick. He died a full general, colonel of the 27th Inniskilling foot, Marshal of the Army in Ireland, and governor of Limerick and of the Royal Hospital, Kilmainham, on 17 May 1804, aged 85. Marriage and issue Massey married Catherine, sister of Robert Clements, 1st Earl of Leitrim, by whom he had four children. Two of his successors in the title—his second and only surviving son, Nathaniel William, second baron, who died a major-general on the staff in the West Indies in 1810, and his great-grandson, the fourth baron (died 1897), who served in the 95th regiment in the Crimea and the Indian mutiny—rose to general's rank. References Attribution Category:1719 births Category:1804 deaths Category:Barons in the Peerage of Ireland Category:Peers of Ireland created by George III Category:Anglo-Irish people Category:27th Regiment of Foot officers Category:British Army personnel of the Seven Years' War Category:Irish MPs 1790–1797 Category:Members of the Parliament of Ireland (pre-1801) for County Dublin constituencies
Q: Error inserting a vertex in a 2D Delaunay triangulation I would like to add N random vertex to a 2D Delaunay triangulation. My code is: template <class Kernel, class TDS> class DT : public CGAL::Delaunay_triangulation_2<Kernel,TDS> { public: typedef typename Kernel::FT FT; typedef typename Kernel::Point_2 Point; typedef typename CGAL::Delaunay_triangulation_2<Kernel,TDS> Dt2; // random number between zero and max FT r(FT max = 1.0) { return max * (FT)rand() / (FT)RAND_MAX; } void generators_random(unsigned int nb_generators) { Dt2::clear(); Point p(r(), r()); for(unsigned int i = 0; i < nb_generators; i++) insert(p); } But when I call the generators_random method, the compiler gives this error: /home/lucas/Algorithmes géometriques/TP2/src/dt.h:83:12: note: cannot convert ‘p’ (type ‘DT<CGAL::Epick,CGAL::Triangulation_data_structure_2 <My_vertex_base<CGAL::Triangulation_vertex_base_2<CGAL::Epick> >, CGAL::Triangulation_face_base_2<CGAL::Epick> > >::Point {aka CGAL::Point_2<CGAL::Epick>}’) to type ‘std::ostream& {aka std::basic_ostream<char>&}’ insert(p); Instead of casting FT, I tried also double, float, but nothing works. What's wrong with it? Thanks. A: I've solved the problem. Instead of using insert(), I used push_back() For the record, this is the working version: // random number between zero and max FT r(FT max = 1.0) { return max * (FT)rand() / (FT)RAND_MAX; } // random (uniform) void generators_random(unsigned int nb_generators) { Dt2::clear(); for(unsigned int i = 0; i < nb_generators; i++) this->push_back(Point(r(), r())); }
IPL 2016: Zaheer Khan announced as Delhi Daredevils captain The left arm Indian seamer had announced that this season could be his last. Former Indian pacer Zaheer Khan has been appointed skipper of Indian Premier League (IPL) side Delhi Daredevils for the upcoming edition. This is only the second season of the 37-year-old with the IPL franchise. The Daredevils are looking to start afresh this season — the ninth of the tournament — having roped in Indian cricket's big names in an effort to better their performance. The Delhi-based outfit had roped in "The Wall" Rahul Dravid as team mentor earlier this month. Paddy Upton, former Indian assistant coach to Gary Kirsten, was also roped in as head coach. Delhi Daredevils have never been able to win the IPL. They reached the semifinals only in the first two editions of the tournament. This time, however, the Delhi side are looking for glory, and appointing one of the best former Indian bowlers as captain could be a steps towards that. Zaheer took 17 wickets in his 17 T20I appearances for India between 2006 and 2012. He also announced last year this edition of the IPL would be his last. "It is a huge honour to captain Delhi Daredevils. To get this responsibility is a way for me to give back to the game," the left-arm seamer said in a statement. "I firmly believe that with the players currently involved we have the makings of a very good side, a young side that can surprise people. "The potential of this group of players is immense and it is now up to us as players to turn that potential into consistent performances." Delhi Daredevils' mentor Dravid also heaped praise on the 37-year-old and said the bowler was a proven leader. "Zaheer has been a leader for a very long time. Anyone who has followed Indian cricket will know the impact Zak has had. He has always proven himself to be one of the leaders," Dravid said. "Zak has a big personality, but it is the steel, focus and drive behind the outward confidence which I think he will bring to the captaincy and that I am sure will inspire the rest of the team. "He has the respect of the dressing room and the franchise is proud to have him as our captain. I would like to congratulate him on the appointment and wish him, and the rest of the squad all the very best."
(CNN) -- Apple is known for building excitement over its latest gadgets, but the company's next closely watched event has nothing to do with a product. Instead, anticipation is growing over the scheduled return of Apple's charismatic CEO. Steve Jobs looks gaunt at an event in October. He began a leave of absence three months later. It's been almost six months since Steve Jobs -- who co-founded Apple and has thrilled the public by launching consumer tech favorites such as the iPhone and the iPod -- announced that he was taking a medical leave of absence until the end of June. As that time quickly approaches, Apple fans, investors and observers have been gripped by questions. Will he come back as promised? If so, in what capacity? And how crucial is he still to the company's success? Jobs, who is a pancreatic cancer survivor, revealed at the beginning of this year that a hormone imbalance caused the considerable weight loss that had some speculating whether his cancer had returned. See a timeline of Jobs' life and career » "The remedy for this nutritional problem is relatively simple and straightforward, and I've already begun treatment," Jobs wrote in a letter addressed to the "Apple community" on January 5. "But, just like I didn't lose this much weight and body mass in a week or a month, my doctors expect it will take me until late this spring to regain it." Don't Miss There had been little news since. But that all changed Saturday when The Wall Street Journal reported Jobs, 54, had a liver transplant about two months ago in Tennessee. He has been recovering well, but may work part time for several weeks when he returns to work, the newspaper reported. Fortune: Inside Steve Jobs' liver transplant The fact that the article appeared just hours after Apple began selling its new iPhone 3GS had some bloggers questioning the timing of the report, with some suggesting that the excitement over the rollout helped draw attention away from the revelations about Jobs' health. "Steve continues to look forward to returning to Apple at the end of June, and there is nothing further to say," said Apple spokesman Steve Dowling. Dowling declined to provide a specific date for Jobs' return or say whether Jobs would be making any public appearances or statements. 'Iconic figure' "This feels like they're clearing the way for his return. But it wouldn't be out of character for Apple to let the deadline slip a bit," said Philip Elmer-DeWitt, who writes the Apple 2.0 blog for Fortune magazine and has been covering the company since 1982. "The real issue of Steve coming back is: How much does the company need him?" How much, indeed? Investors have been painfully aware of how any development regarding Jobs' health -- real or rumor -- can affect Apple's stock price. But experts say Apple has been taking steps to ensure that its fortunes are not linked with Jobs taking an active role in the company. Watch how Jobs' health has affected Apple "He's an iconic figure that everybody wants around, he's the world's greatest salesman and that's irreplaceable," said Gene Munster, a senior research analyst at Piper Jaffray who has been covering Apple since 2003. "But as far as the product direction and the product quality, the road map for the next five years is already in place [at Apple]." Munster described Jobs as a visionary and someone with the ability to figure out what the next big thing is. But he said Piper Jaffray's "Buy" recommendation on the company's stock wouldn't change even if Jobs doesn't come back, based on the strength of products such as the iPhone. Still, few companies have been so closely associated with their CEOs. Munster likened the situation to Henry Ford and the car company he founded at the beginning of the 20th century. Elmer-DeWitt said it could be compared to Walt Disney and the entertainment giant he created. Jobs is also much more than just a CEO. His knack for developing must-have gadgets, his signature black turtlenecks and dramatic delivery during product launches have made him a cultural icon beyond Silicon Valley. He was even hilariously impersonated on "Saturday Night Live." Smaller role Observers say Apple and Jobs himself have made efforts in recent years to "wean" the public off his presence, such as including other people onstage with him during events and de-emphasizing his role. "Last year a lot of pundits were [saying that] if Steve Jobs left the company, the company would just immediately fall into ruin," said Daniel Eran Dilger, a contributing editor for AppleInsider.com. "And what's interesting is after he went on leave, and he's been gone for six months now, the company has had a couple of major announcements and events and has gone on fine." When he began his leave of absence, Jobs put Apple Chief Operating Officer Tim Cook in charge of the company's day-to-day operations. If Jobs decides to step down, Cook can take over and probably will, Elmer-DeWitt said. "There are lots of smart people at Apple and most people have sort of accepted the idea that ... Jobs trained an executive team to operate the company without him," he added. "And that his DNA, the thing that makes Apple different from all the other companies, has been baked into the leadership team and that the company will do fine." What may be lacking years down the road if Jobs retires or leaves is his "X-factor" and his unique stamp on every little piece of design. "Once you get a bunch of people in a room, none of whom is more powerful than the other, you start to get products that are literally designed by committee and that's what Apple products never were," Elmer-DeWitt said. "They were always designed by very smart people that Steve chose. But ultimately there was one guy who had final say on them. It remains to be seen whether there's someone at Apple who can step up and take over that role."
CNN interview on Catalonian referendum In the wake of the referendum for independence in Catalonia, I gave an interview on CNN this week. I mentioned, among other things, how the Spanish constitution is intentionally ambiguous when it comes to the state of the autonomous regions, since this was a necessary move for the constitution to be approved in a deeply divided Spain in 1978. The government response to the referendum has been criticised for being too harsh and violent. One should keep in mind that Rajoy’s government has implemented a range of legislative changes which gives more power to the Civil Guard, which means that they can easily approach protesters with the use of force. You can watch the interview here.
Q: Zeroing WAL segments in Postgres We have a relatively low-volume Postgres database with continuous archiving set up to compress each WAL segment and send it to S3. Because it's a low-volume system, it hits an archive_timeout every 10 minutes or so and archives the mostly-unused WAL segment, which used to compress very well as it was mostly just zeroes. However, Postgres recycles its WAL segments to avoid the cost of allocating new files at each WAL switch, which is useful in a high-load situation but it means that after a burst of heavier-than-normal activity our WAL segment files are now full of junk from previous segments and do not compress very well at all. We're storing a lot of copies of all of this junk. Is there a way to reduce the amount of space we're using to keep our WAL archive? Some suboptimal possibilities: Prevent Postgres from recycling the WAL segments somehow, so it starts out with a zeroed file each time. The docs do not indicate that there is an option for doing this but I might have missed it. Have Postgres zero the WAL segment file when it starts/finishes using it. Again, the docs do not seem to suggest this is possible. Externally zero or remove some of the WAL segment files while they're not in use. Is there a safe way to determine which files this is? Zero the unused portion of the segment before archiving it using the output from pg_xlogdump to find where the junk starts. Possible, although I don't fancy it. At least by doing this in the archive command you can be sure that Postgres isn't going to reuse the file. Only archive the used portion of the segment file, again by interpreting the output of pg_xlogdump somehow, and then pad it with zeroes during restore. Also sounds possible although I don't really fancy it. A: Starting in version 9.4, it now automatically zeroes the tail end of the WAL file. (Actually it is just mostly zero, there are some block headers that don't get zeroed, but still the result is very compressible). In version 9.2, there is a program named pg_clearxlogtail you can use. You can add it into your archive_command before the compression step. If you are using 9.3, you are out of luck. Note that checkpoints do not inherently cause log file switches. It is probably archive_timeout which is causing the switches.
Planning a Fishing Holiday? Tired of your local lakes? Search & discover some of the UK’s favourite carp lakes in our guide below! We’ve unearthed some real gems for you all in our comprehensive carp lake guide – ticket prices, lake rules and on-site facilities … we’ve left no stone unturned! If your lake isn’t featured, or you’re a fishery owner keen to get your venue out there, contact us so we can share with the carp community. Just click a county to start! Bedfordshire Manor Farm offers 7 specialist lakes set in 0ver 100 acres of bedfordshire woodlands. The site has a huge tackle shop, and even includes a ‘bivvy barn’ showcasing the latest carp bivvies and shelters. For those wanting a longer session, or just a holiday, there is plenty of room for up to 18 caravans with eelctric hook-up points. Manor Farm Information 7 Lakes (Carp, Bream, Pike & Match Lake) 100 Acre Site Includes CampSite (up to 18 Caravans) Shower Block Toilets (including disabled facilities) Shop provides Refreshments Huge Tackle Shop Easy Access from A1 Manor Farm Fishing Prices (correct as of 26/07/17) Concession Day Ticket: £11 Night Fishing: £26 (4pm to 4pm) ** 50% Booking Deposit Required – see website Visit Manor Farm Fishery Website | Visit Facebook page Toddington Fisheries, Milton Keynes Toddington Fishery is set in a quiet corner of rural Bedfordshire and was dug out to become a lake some 15 years ago – and improvements are still been made year-on-year. Stock includes other species such as roach, perch, tench and bream. It holds carp up to 22lb and even catfish as big as 37lb for those that like to mix it up. Toddington Fishing Prices Day tickets are £7 for One Rod, £10 for Two (can be booked on-site) (can be booked on-site) Matches can be organised/booked online Night Fishing is by appointment only Visit Toddington Fisheries Website | Visit Facebook page Tall Trees Fishery, Aspley Guise Set in a tranquil location of Bedforshire, Tall Trees is a real fishing gem. At over 100 years old, this 2-acre intimate lake offers carp anglers a perfect setting to relax amongst the wildlife and enjoy paradise. Tall Trees offers a good array of stock (it holds one 40lb Common and four at 30lb) and holds some real warriors. A truly stunning carp lake! Tall Trees Information A beautiful 130-year old 2-acre lake Online Tackle Shop Bait Boat Hire available Approx. 120 Carp (from 8lb to 40lb) Summer House (with TV) Toilets & Shower Room On-site Electricity Local Takeaways Available to Deliver Membership Available Tall Trees Fishing Prices No Day Tickets Available Weekend Hire which is £300 for up to 8 anglers Weekly Hire is £700 Visit Facebook page Berkshire or Seven Lakes, Reading Seven Lakes is, well 7 lakes! The lakes are available to fish day and night and vary in size from 0.4 acres to 3.3 acres in a tranquil setting with ample parking. They are stocked with mirrors, commons, perch, roach and pike. Recently, permission has been granted for a complete overhaul of the lakes, including re-stocking. Seven Lakes Information Members of The Angling Trust – 10% off with membership card Lake 7 is the specimen with carp up to 20lb Annual Season Ticket Available Seven Lakes Prices Adults Day Tickets: One Rod – £6, Two Rods – £10, Three Rods – £14 Under 12’s Day Prices: One Rod – £4, Two Rods – £6 Over 65’s Day Tickets: Same as U12’s Night Fishing: Overnight (4pm to 9am) – £15, 24 hours – £20 Season Tickets: Adult – £75, Others – £55 (Application form availale online) Visit Seven Lakes Website Visit Facebook page Wasing Fishery, Reading The Wasing Estate is an extensive area of around 100 acres with a number of lakes and rivers set in the beautiful Berkshire countryside. Through sustainable fishery management, carp anglers can be assured of a peaceful setting amongst an incredible woodland setting. Created in the 17th century – the wooded lakes stock carp (up to 32lb), tench and rudd. These spring fed gravel pits offer superb angling in a tranquil setting. Wasing Carp Fishing Information For all enquiries, you can e-mail Wasing Estates to find out how you can fish this exclusive Berkshire resort. Or Contact 0118 971 4140 Visit Wasing Fishery via Facebook Sandhurst Lake, Yateley Sandhurst is the jewel in the crown of carp angling in the UK. Part of the Yateley Complex – it really needs no introduction – having been featured in most carp publications and many TV shows over the years. With the lake record standing at 44lb, there are very few lakes that can boast a realistic shot at a 40lb dream carp. A relatively shallow lake, with depths from 2ft to 10ft – offering 30 swims for you to tackle. Sandhurst Lake Information 400+ Carp Stock 30 Swims Premier UK Day Ticket Water 26lb Average Carp Completely Secure Site No Bait Boats Allowed Toilet Facilities Total Zig Rig Ban Sandhurst Lake Prices 12 hours – £20 (2 rods), £25 (3 rods) 24 hours – £25 (2 rods), £30 (3 rods) Venue can be booked for exclusive events Tickets available online Also can be purchased via Crowthorne Angling Centre Visit Sandhurst Lake Website Visit Facebook Page [metaslider id=4815] Cheshire Coole Acres Fishery A purpose built fishery located in the beautiful and relaxing South Cheshire countryside on Coole Lane – midway between the town of Nantwich and the village of Audlem. From the original purchase of the land in 2007 (it was a simple 20 acre field of grazing land back then), the area has been very carefully designed and constructed to provide a location for true fishing enthusiasts. There is three stunning lakes to choose from, and these are stocked with a wide range of fish in sizes to suit both the relaxing pleasure angler and the seasoned sport and specimen angler. Offers Night Fishing 3 Lakes Day Ticket Price: £10 Visit Facebook Page | Visit Coole Acres Fishery Gawsworth Fisheries, Macclesfield Gawsworth Fisheries are situated in between Macclesfield and Congleton and is one of Cheshire’s premier day ticket fisheries, Gawsworth Fisheries is an all round fishery that comprises of five lakes Wall Pool, Wood Pool, Park Pool Coppice Pool and Spring Bank Pool as well as its own private canal, all the waters are extremely well stocked and will accommodate all anglers from the novice to the Specimen Carp Hunter alike. Facilities at the fisheries include ample parking for all pools as well as toilet facilities. 5 Lakes & 1 Canal NO Baitboats Allowed Day Ticket Price: £9 VISIT Gawsworth Fisheries, Macclesfield Cornwall Bake Lakes, the “Jewel in Cornwall’s Angling Crown” with 9 lakes and ponds set in 30 acres of glorious Cornish countryside is the true ‘ONE STOP’ angling destination offering something for everyone. Situated in the stunning, peaceful Cornish countryside Bake Lakes provides that quiet, ‘get away from it all’ just a few minutes away from Trerulefoot roundabout on the main A38 road between Saltash and Liskeard. First class coarse or specimen fishing in a wide variety of settings suitable for the expert and beginner alike, on site tackle and bait shop, qualified and licenced tuition in coarse fishing. 8 Lakes On-site Facilities, including shop Also offer Fly Fishing Day Ticket Price: See Website Visit Facebook Page | Visit Bake Lakes, Trerulefoot Oakside Fishery, Newquay This is an excellant carp fishing venue, well stocked with both young carp and mature wiley individuals reaching up to the 30lb mark, so if you hook one of these babies be ready for the ride! With well spaced maintained swims, islands to target, secluded lily covered coves, overhanging trees and mature reed beds, you will love the feel of the lake. Plenty of bivvy space for the overnight carp enthuisiast and fresh free-range hen, bantam or duck eggs available from Sandra, the perfect compliment to your bacon for breakfast. Brian has day tickets, night tickets and season tickets all available at very reasonable prices. Prices DAY TICKETS…(dawn to dusk) ROD ALLOWED PRICE ADULTS 2 RODS £7.00 OAPs,JUNIORS,DISABLED 2 RODS £6.00 NIGHT TICKETS…(dusk till dawn) ADULTS 2 RODS £7.00 OAPs,JUNIORS,DISABLED 2 RODS £6.00 24hr TICKETS ADULTS 2 RODS £12.00 OAPs,JUNIORS,DISABLED 2 RODS £11.00 SEASON DAY TICKETS ADULTS 2 RODS £85.00 OAPs,JUNIORS,DISABLED 2 RODS £75.00 SEASON DAY AND NIGHT TICKETS ADULTS 2 RODS £110.00 OAPs,JUNIORS,DISABLED 2 RODS £95.00 Derbyshire Visit Willesley Carp Fishery The lake has many hundreds of carp with a mixture of both mirror and common carp. There is a good stock of twenty to thirty pounders and recently a couple of carp exceeding thirty pounds have been landed. The lake also has a large stock of Coarse fish including bream, roach, cruscian carp, tench, perch and gudgeon. Day tickets: 1 rod: £6 2 rods: £12 24 hours £20 Season ticket – contact for availability Visit Willesley Carp Fishery Pride Lake, Derby Devon Furzebray Lakes, South Molton Digger Lakes, Culm Valley Emperor Lakes, Loddiswell Dorset Todber Manor 3 Specimen Carp Lakes Holiday Cottages/Caravan Club 24 Hour Ticket: £24 Day Ticket Price: £12 Visit Facebook Page Essex Honeypot Lakes Newland Hall Fishery, Chelmsford Oak Lakes Fisheries, Southminster Par Fishery Hampshire Willow Park Fishery Hollybush Lakes, Aldershot Hertfordshire Willows Lakes Carthagena Fishery, Lee Valley Park Hook Lake, Hertford Kent Cottington Lake Fishery Monk Lakes, Marden Lancashire Borwick Fishing, Carnforth Pilsworth Fishery Pendle View Fisheries Lincolnshire Old Mill Lakes, Market Rasen Hunter’s Lodge Fishery Alderfen Fisheries Bain Valley Fisheries Nuddock Wood Lake, Burringham Langdale Lakes, Lincoln Leicestershire Frisby Lakes Whetstone Gorse, Whetstone Cromwell Lake London Picks Cottage Fishery, Chingford Bury Hill Fisheries, Dorking Bedfont Lakes, Hounslow Walthamstow Reservoirs Birchmead Lake, Thamesmead Claverhambury Carp Lakes, Waltham Abbey Norfolk Taswood Lakes, Norwich Airfield Lakes, Waveney Valley Billingford Lakes Middlesex Farlows Lake, Colne Valley Wraysbury 1 Bury Hill Fisheries Cowley Lake Oxfordshire Linear Fisheries, Witney Orchid Lakes, Dorchester-on-Thames Linch Hill Fishery, Stanton Harcourt Shropshire Merrington Carp Fishery, Shrewsbury Earls View Fishery, Shrewsbury Somerset Avalon Fisheries, Westhay Emerald Pool Pavyotts Mill Summerhayes Fisheries Stafffordshire Millbrook Fisheries, Stoke-on-Trent Willesley Carp Lake Cudmore Fisheries Surrey Shillinglee Coarse Fishery Priory Farm, Nr.Redhill Willinghurst Fishery, Shamley Green Warwickshire Makins Fishery, Nuneaton Clifton Lakes, Rugby Bishops Bowl Fishery, Harbury Arden Lakes, Stratford-upon-Avon West Midlands Coppice Lane Pools, Nr. Brownhills Yorkshire Swillington Park Fishing, Leeds Fairview Lake, Selby Oakland Waters, Goole Millfield Pool, Wakefield Newbridge Lakes, Burstwick Ravenfield Ponds, Brinsworth Redwood Park, York Carpvale Doubles, Malton Conifer Lake, Allerthorpe
Q: Call async function in angular 7 interceptor I'm trying to create an interceptor which should call a function to refresh the session when a 401 error is returned. This is what I have so far but it won't build and I can't work out how to do this: intercept( request: HttpRequest<any>, next: HttpHandler ): Observable<HttpEvent<any>> { request = request.clone({ withCredentials: true }); return next.handle(request).pipe( catchError((error: HttpErrorResponse) => { if (error.status === 401) { return this.userAPI .refreshSession(this.authService.getRefreshToken()) .then(res => { this.authService.setAuthenticated(false); return next.handle(request); }); } else { this.authService.setAuthenticated(false); } }) ); } VS Code reports: Type 'Observable<HttpSentEvent | HttpHeaderResponse | HttpProgressEvent | HttpResponse<any> | HttpUserEvent<any> | Observable<HttpEvent<any>>>' is not assignable to type 'Observable<HttpEvent<any>>'. A: catchError must return an observable. Try below or something similar: intercept( request: HttpRequest<any>, next: HttpHandler ): Observable<HttpEvent<any>> { request = request.clone({ withCredentials: true }); return next.handle(request).pipe( catchError((error: HttpErrorResponse) => { if (error.status === 401) { return this.userAPI .refreshSession(this.authService.getRefreshToken()) .then(res => { this.authService.setAuthenticated(false); return next.handle(request); }); } else { this.authService.setAuthenticated(false); // Add this return next.handle(request); } }) ); }
Nestled along the banks of the Ohio River surrounded by rolling foothills of the Appalachian Mountains, Ashland is a city in Boyd County, Kentucky. Formerly known as Poage Settlement, Ashland occupies approximately 12 square miles and is home to more than 21,000 people. As the second largest city within the Huntington-Ashland, WV-KY-OH, Metropolitan Statistical Area, Ashland serves as a significant economic and medical center for northeast Kentucky. Recreational, leisure, athletic and cultural activities are abound in Ashland. The historic Paramount Arts Center, in particular, serves as an important venue for the arts in eastern Kentucky and the surrounding states of Ohio and West Virginia. Built in 1930, the Paramount Arts Center was one of the first transitional theatres built for "talking pictures". The city's early industrial growth was a result of Ohio's pig iron industry. It was not until 1854, that growth began with the charter of the Kentucky Iron, Coal and Manufacturing Company. Major industrial employers in the early 1900s included Armco, Ashland Oil and Refining Company, C&O Railroad, Allied Chemical and Dye Company's Semet Solvay and Mansbach Steel. Today, some of Ashland’s top employers are AK Steel, North American Refractories, Kentucky Electric Steel, Mansbach Metal, and King's Daughters Medical Center. We have confirmed that Ashland, Kentucky has a number of jobsites where asbestos exposure occurred. Workers and their loved ones exposed to asbestos materials may be at risk to develop an asbestos-related cancer such as malignant mesothelioma. If you or a loved one has been diagnosed with mesothelioma, scroll down to see a list of mesothelioma doctors located in and around Ashland. Asbestos lawyers may also be able to assist you if you or a loved one were exposed to asbestos in Ashland. Other Asbestos Exposure Sites in Ashland, Kentucky If you worked at any of these companies and/or job sites in Ashland, Kentucky, you may have been exposed to harmful asbestos which is known to cause mesothelioma cancer. A. C. Lawrence Leather Company Allied Chemical Corporation American Rolling Mill Company Armco Oil Refinery Armco Steel Const West Works Armco Steel Corporation Ashland Artificial Ice Company Ashland Asphalt Ashland Coal & Coke Ashland Coke Plant Ashland Electric Ashland Fire Brick Company Ashland Floor Ashland Iron and Mining Company Ashland Leather Company Ashland Oil & Refinery Company Ashland Steel Company Ashland Vocational School Ashland Works AW Rolling Mill Company Bellefonte Plant Betsy Ross Bakery Brooks Bottling Camden and Interstate Railway Company Capital Manufacturing Corbin Realty Dawkins Building Delco General Refractories General Sales General Telephone Gulf Oil Guyan Chevrolet Harbison-Walker Refractories Holland Furnace Hooker Chemical Inland Steel J N Canden For Ashland and Cattlettsburg Railway Company Kentucky Electric Steel Kentucky Solvay Coke Company Linde Air Products Company (Union Carbide & Carbon Corporation) Maggard & Sons Mansbach Metal Middlestate Concrete National Mine Service North American Refractories Norton Iron Works Ohio Valley Electric Railway O'Neal Roofing Company Paul Walker Construction Sears Semet Solvay Company Sixth St. Siding Union Boiler Union Pipe & Concrete United Carbon United Steel Fabricators Valley Lines Waller Construction West Works Find a Mesothelioma Doctor near Ashland, Kentucky If you need help getting an accurate diagnosis or developing a treatment plan, the following mesothelioma doctors and oncologists who practice near Ashland, Kentucky have the expertise to assist you. More detailed information about each doctor is available by clicking on the appropriate doctor detail link. Details about their background, areas of expertise, professional affiliations and contact information is provided. Locate a Cancer Center near Ashland, Kentucky If you need help getting an accurate diagnosis or developing a treatment plan, the following mesothelioma cancers near Ashland, Kentucky have the resources available to assist you. More detailed information about each cancer center is available by clicking on the appropriate cancer center detail link. Mesothelioma Patient Support Services near Ashland The following cancer support services may be of help to you while you are receiving treatment for mesothelioma. Support services for mesothelioma patients include patient transport, temporary housing, physical therapy and counseling. Physical Therapy Filing a Mesothelioma Lawsuit in Ashland If you were exposed to asbestos at a commercial, residential or military site in Ashland, Kentucky and have been diagnosed with mesothelioma, you may be entitled to compensation. Don’t lose your right to file a lawsuit to hold those responsible accountable. You must act quickly and file your claim within the appropriate statute of limitations for the state of Kentucky. Asbestos Lawyers Servicing Ashland, Kentucky Early, Lucarelli, Sweeney and Meisenkothen is a national law firm recognized for its representation of over 3,000 hardworking men and women who have been exposed to asbestos and diagnosed with mesothelioma. ELSM's experience in asbestos litigation spans four decades. At Gori Julian and Associates, P.C., we have handled hundreds of mesothelioma lawsuits on behalf of people throughout the United States. This experience allows us to choose jurisdiction in which to file your case based on many factors including but not limited to state of residence, jobsites, and previous and current employers. As one of the nation’s leading mesothelioma law firms, Simmons Hanly Conroy has a proven track record. Every mesothelioma lawyer at the firm is committed to helping families affected by mesothelioma and asbestos-related diseases. Notice: This website and its content are sponsored by JAMES F. EARLY, LLC, a law firm specializing in asbestos injury litigation. Attorney Advertising. Prior results do not predict a similar outcome. Please read our disclaimer for more information.
The 10 Most Insulting Things Video Games Charged Money For Downloadable content (DLC) for games sounds like a great idea, just like stronger government for struggling postwar Germany. You buy a game for money, and if you like it you buy more game for more money. Unfortunately the only word in that sentence companies heard was "money" several times and then a bunch of cash register sound effects. They've come out with more insulting offers than a drunk frat boy at a strip club -- the defense "if you don't like it, don't do it" just isn't enough. #10. Horse Armor (Oblivion) In 2006, Bethesda Game Studios used their popular open world game The Elder Scrolls IV: Oblivion to test the waters of DLC, and decided to go about it like they were trying to capture drunk fish with wallets. The first DLC they rolled out invited players to "Protect your horse from danger with this beautiful handcrafted armor." Unfortunately, it turned out that the armor didn't serve much of a function within the game, so they were asking you to spend $2.50 on pretty virtual horse-clothes. While this was an enticing offer to anyone who had accidentally installed Oblivion instead of My Little Pony, none of those people were clever enough to steal their mom's credit card. Even the horse looks surprised you fell for this. The Internet exploded with rage, and Bethesda seemed to realize that DLC wasn't actually free money after it was pointed out to them that evern prison showers have seen subtler attempts to screw their users. Later Oblivion DLC included entire extra quests loaded with characters and items for the same price. Players congratulated themselves on the victory, and swore no one would ever be so stupid again. #9. Weapon Skins (Gears of War 3) Many more people were so stupid. Again. Five years after Oblivion's failure, Gears of War 3 launched with more ridiculous frills than a ballerina's wardrobe. Except ballerinas are good at something real and are meant to look like that. Gears of War players were asked to buy dozens of "weapon skins," which would be awesome if the weapon in question was a Terminator, and the wrapping was human flesh in the shape of Arnold Schwarzenegger. Instead, players who purchased the DLC got a paint job for their gun. The complete set is offered at a bargain 3600 points. That's only $45! Or three-quarters of the cost of the game. This went beyond being just useless, since you were paying money to paint your weapon a bright color in an environment where anything that isn't "dirt brown" gets seen and shot immediately. That dead guy on the right? Tiny bit of blue visible. To confirm that they hated the people who they were scamming, many of the skins are "cute flowers" and "animated rainbows," though makers Epic Games managed to hold themselves back from releasing "our sweaty balls" drawn on the side of the Lancer. We have to assume they got the idea after observing all the homoerotic trash talk on Xbox chat, and deciding to create an ill-advised feature for the many gay men who play their game. #8. Paying for Power-ups (Dead Space) The "Speed Kills" add-on sells you slightly faster versions of half the guns you already have in the main game for $2.25. Every cent of which goes toward replacing the silk underwear EA ruined with excitement when they realized they could charge for power-ups. Press B to enter your credit card information, then fire. Increasing weapon speed is just changing a variable. That's not even a single line of code and they're charging over two dollars. By this math the whole game should cost Saudi Arabia. Even Microsoft knows this is a sucker deal as the only description text is "Includes faster-firing Force Gun, Line Gun, and Plasma Cutter. There are no refunds for this item." Half its own sales pitch is "Haha, you'll never get that cash back, sucker." GettyI felt bad about ripping people off, until I realized they were dumb enough to fall for it! It's not even faster weapons -- it's some faster weapons. To get the others accelerated you need the Scorpion Weapon Pack, another $2.25, and for your mother to have belly-flopped her way through her third trimester. If you buy both, EA just starts charging your account at random because you clearly don't even understand money. #7. Warden's Keep (Dragon Age: Origins) Dragon Age: Origins has an incredibly immersive story, which the DLC shatters like a sledgehammer. Several hours into the game you make camp and go around talking to every single character. If you aren't familiar with this stage, you probably think an RPG is a rocket-powered grenade launcher. Though this is also meaningful character interaction. As you chat everyone up, you meet a man who tells you of the forsaken "Warden's Keep" and you think "Woohoo! Sidequest!" He promises adventure, items and even a glimpse into the involved history of the game world. Anyone who makes it through the several pages of conversation has likely been moved by his impassioned pleas, and is ready to say, "Yes, desperate stranger, I will aid you in this valiant quest!" To which he replies "[THAT WILL BE SEVEN REAL HUMAN DOLLARS.]" Machines haven't ruined a narrative so badly since the Matrix sequels. "Your life is the sum of a remainder of an unbalanced bunch of bullshit which isn't kickass action sequences." They only tell you it's DLC after you've already decided to play. It's not in a shop, or a marketplace menu, it's embedded in the game world. You're left hating the developers more than the in-game enemies. After all, the Darkspawn might be an eldritch force of horror bent on destroying the world but at least the bastards turn up to kill you when you've already spent $60. Worse, this was launch-day content, meaning it was finished before the game was sold. Instead of trying to make the best possible game, companies are now precisely aiming for "good enough" to get you to pay more money for the best possible version of the game. #6. Rezurrection (Call of Duty: Black Ops) Call of Duty is such a great game they've released it eight times. The franchise has shot so many people in so many sequels, Rambo and John McClane are thinking about staging an intervention. To avoid making the games too repetitive, they're adding new modes to keep people interested, but their imaginations are so atrophied the most original thing they can think of is "Zombies!" And even that wasn't original because they'd done it before. CoD: World at War featured a fun extra zombie mode for free. CoD: Black Ops released the same mode two years later as a $15 add-on. It's either a blatant mockery of customers or truly meta-attempt at representing zombification -- re-animating something that died a while ago and making it much worse the second time round. I really hate pop culture for making zombie nazis in space boring. This isn't extra content -- they amputated part of the previous game so they could sell it for extra money. Of course they did do some extra work to create a new map, and that's "a" as in only one, because four of the five maps are from the original zombie mode. You know, the free one you already had if you are devoted enough to consider paying for this version. It doesn't help that both were made by Treyarch, official silver-medal winners in the two-contestant "Making Good Call of Duty games" event.
Incorporation of project-based learning into an occupational health course. Use of an appropriate teaching approach is a major concern for faculty members who are involved in occupational health and safety academic education. The challenge is to explore teaching tools to equip students with knowledge and skills to prepare them for their practices, in which they will encounter occupational health and safety issues in various occupational settings. The current study presents the design and implementation of a team project-based learning approach for undergraduate occupational health students to examine the appropriateness and perceptions of students and educators with regard to such a learning experience. Steps were taken to guide the educators and students through the learning process based on projects completed in teams. The research tools for collecting data were a questionnaire and semi-structured interviews with participants. The results illustrated that use of the proposed teaching approach as part of occupational health education may have the potential to motivate and enhance the active roles of educators and students in the learning process, and improve students' technical and social skills that are crucial for practice in the occupational health field. The study findings showed that project-based learning may provide a promising teaching strategy in the education and training of occupational health students. In addition, academic institutions should encourage educators to plan, introduce and evaluate the effectiveness of project-based learning.
"People didn't think we had a chance, but we did." Tallahassee Mayor Andrew Gillum speaks with @DonLemon after CNN projects he'll win the Democratic primary for Florida governor https://t.co/OSZ3ufHzRw pic.twitter.com/heZnSb9YVo On Tuesday’s “CNN Tonight,” Tallahassee Mayor and Florida Democratic Gubernatorial nominee Andrew Gillum stated that running “Republican-lite” isn’t a winning strategy. Gillum said, “[R]unning Republican-lite in the state of Florida is not a strategy for winning. A strategy for winning is by speaking to our voters, by giving our voters something to go out and vote for and not just against. We’ve got to move more black voters, more brown voters, more young voters, more progressive voters, all of those to the polls. And I have to tell you, Don, it’s been my experience that whether we’re in red parts of the state or blue parts of the state or purple parts of the state, that folks are frustrated.” Follow Ian Hanchett on Twitter @IanHanchett
Vasily Gorshkov • Honoured Artist of Russia• Prize-winner at the International Competition of Young Opera Singers (Perm, 1993)• Prize-winner at the All-Russian Vocalists' Competition (Belgorod, 1991) Vasily Gorshkov was born in Novosibirsk. Graduated from the Novosibirsk State Glinka Conservatoire in 1992. Soloist with the Novosibirsk State Academic Theatre of Opera and Ballet from 1989. Made his Mariinsky Theatre debut in 1991 as Andrei in Tchaikovsky's Mazepa. Mariinsky Theatre soloist in 1995. Soloist with the Novosibirsk State Academic Theatre of Opera and Ballet from 1996-2000.Soloist with the St Petersburg State Academic Musorgsky Theatre of Opera and Ballet from 2000-2001. Soloist with the Krasnodar State Theatre of Opera and Ballet from 2001-2002.Mariinsky Theatre soloist since 2002. In 2001 took part in the Musorgsky Theatre of Opera and Ballet's production of Puccini's Tosca (as Cavaradossi) in Japan (Tokyo). Has performed solo concerts in Sweden, Austria, Turkey, China and Italy. Has toured to Egypt, Portugal, Spain, Italy, the Netherlands, Denmark and USA (Los Angeles).
150,000+ kg Per Year, High-Technology, Ultra Efficient, Low-Cost Facility Designed and Engineered by Aurora Larssen Projects (ALPS) TSX: ACB EDMONTON, April 16, 2018 /CNW/ - Aurora Cannabis Inc. ("Aurora" or the "Company") (TSX: ACB) (OTCQB: ACBFF) (Frankfurt: 21P; WKN: A1C4WM) today announced it is acquiring approximately 71 acres of land in Medicine Hat, Alberta, where the Company intends shortly to commence construction on a new high-technology hybrid greenhouse cannabis production facility. To this end, the Company has signed a memorandum of understanding with the City of Medicine Hat, concerning terms and a general understanding of potential transactions, including a prospective 10-year, 42 MW energy supply agreement. The new facility, to be designed and engineered by the Company's wholly owned Aurora Larssen Projects Inc. division, will be named "Aurora Sun" in recognition of Medicine Hat's status as the sunniest city in Canada, with more than 2,500 hours of sunshine per year. At 1,200,000 square foot, or over 21 football fields, the footprint of Aurora Sun will be 50% larger than Aurora's Sky, a 100,000+ kg per year Health Canada licensed facility the Company is completing at Edmonton International Airport. To date, Aurora has approximately 280,000 kg per year of funded capacity. With the addition of Aurora Sun, total capacity will increase to over 430,000 kg per year. In addition to the domestic medical cannabis market, in which the Company already services approximately 45,000 patients, the new facility is intended to serve both the pending legal Canadian adult consumer market, and the quickly expanding international market. The global market is experiencing a massive excess of demand over supply for legal, regulated medical cannabis, with extremely rapid growth. This situation is expected to continue for a number of years, and only a small number of producers around the world have the experience in regulated cultivation, the production capacity and the access to capital to successfully exploit this opportunity. Aurora, currently exporting to Germany and Italy, with a combined population in excess of 140 million, intends to supply additional European medical cannabis markets now coming online, and will devote a significant proportion of its increasing production capacity to export the Company's high-quality cannabis products into these undersupplied high-margin markets. Facility Characteristics Like Aurora Sky, currently the world's most advanced cannabis production facility, and Aurora Nordic, soon to begin construction in Denmark, Aurora Sun will be a high-technology, highly automated facility designed to deliver massive capacity, high production efficiency, ultra-low operating costs and robust margins. The facility measures 1,200,000 square feet, the size of more than 21 football fields, and is readily expandable to 1,500,000 square feet The facility will have approximately 850,000 square feet of flowering space, larger than the entire Aurora Sky facility Like all Aurora facilities, Aurora Sun will be built in compliance with European Union (EU) Good Manufacturing Practices (GMP) standards, ensuring product from the facility can be exported anywhere in the world where cannabis is nationally legal for medical or (in future) adult usage purposes will be built in compliance with European Union (EU) Good Manufacturing Practices (GMP) standards, ensuring product from the facility can be exported anywhere in the world where cannabis is nationally legal for medical or (in future) adult usage purposes The facility will be characterized by the use of advanced technologies, such as: Forced air, positive pressure (closed system), minimizing risk of contamination The closed system conserves energy Fully automated plant and bench movement, maximizes plant density, accelerates crop turnover, minimizes human plant interaction (reduced contamination risks), and ultimately results in increased yield per square foot and superior economic efficiencies (costs per gram) Robotized internal logistics, resulting in improved workflow through the facility and allowing a further increase in plant density Specialty glass ensuring optimal light penetration, shadow reduction and diffusion to support plant growth, and, ultimately reducing electrical consumption Specialized, custom nutrient delivery systems, optimized for each respective strain growing in the facility at any time. Furthermore, the irrigation system reduces waste and supports plant health Best-in-class HVAC system ensuring optimized climate conditions Precipitation collection for reuse within the facility and irrigation processes Low-carbon footprint design Key Project Metrics and Timelines Due to the high degree of automation, high plant density, rapid turnover of crops and optimized grow conditions, the new facility will be ultra-efficient. Management anticipates production costs to fall to well below $1 per gram at full capacity. per gram at full capacity. Based on the experience gained during the construction of Aurora Sky, the Company anticipates an accelerated construction timeline, shortening time to market. Site preparation and construction will commence in the coming weeks. Management anticipates first planting in the first half of calendar 2019, and completion of the full facility in the second half of calendar 2019. Medicine Hat Following a thorough review of potential locations across a broad set of parameters, management selected Medicine Hat, Alberta, as the home for Aurora Sun. The chosen location provides a number of key advantages: Medicine Hat is located in the sunniest area (sunbelt) of Canada , which by comparison offers approximately 12.5% more annual sunlight hours than Ontario's Niagara region, resulting in significant power savings. is located in the sunniest area (sunbelt) of , which by comparison offers approximately 12.5% more annual sunlight hours than Niagara region, resulting in significant power savings. Medicine Hat offers low-cost electricity prices and affordable taxes. offers low-cost electricity prices and affordable taxes. Medicine Hat has a "business friendly" attitude, ensuring a smooth, efficient and rapid permitting process. has a "business friendly" attitude, ensuring a smooth, efficient and rapid permitting process. Medicine Hat owns its own power, gas, water and sewage utilities. Commentary "Aurora Sun exemplifies our cultivation and production philosophy focused on purpose-built, high technology, highly automated facilities with industry-leading efficiency, resulting in ultra-low production costs to ensure robust margins in all our markets," said Terry Booth, CEO. "We have significantly differentiated Aurora from our peers by investing in and rapidly building the world's most advanced model of cannabis production on a mass scale. We believe the Aurora Standard of cannabis production represents the most effectively replicable and scalable system to establish a successful global footprint." Mr. Booth added, "We are grateful to the City of Medicine Hat, which has proven to be a very agile, capable and pro-active partner in making this project possible. We look forward to establishing ourselves both as an important local investor and employer, with more than 450 full time jobs anticipated, and a significant impact on the local economy for years to come." Ted Clugston, Mayor of Medicine Hat, added, "With Aurora, we look forward to welcoming a growing international company committed to creating significant employment in our city. Medicine Hat's stable and reliable cost-competitive electricity and business-friendly environment are attracting high-technology operations, such as Aurora Sun. The Memorandum of Understanding signals our intention to work with Aurora to arrive at a mutually beneficial agreement that will best serve the residents of Medicine Hat." The Honourable Deron Bilous, Minister of Economic Development and Trade for Alberta, added, "Large-scale capital investments – like Aurora's – are essential for driving diversification and giving more Albertans an opportunity to earn a good living for themselves and their families. Aurora is making our province proud attracting international attention and investment as we work together to build an economic recovery that lasts." ALPS Aurora Sun is designed by Aurora's in-house facility design, engineering and construction oversight division Aurora Larssen Projects (ALPS), the world's leading authority in advanced greenhouse design for the cannabis industry. ALPS currently is engaged in 15 cannabis greenhouse projects globally, including: Aurora Sky, an 800,000 square foot facility under construction in Edmonton, Alberta, Aurora Nordic, a 1,000,000 square foot facility to be constructed as a joint venture in Odense, Denmark, and an 850,000 square foot Valleyfield, Quebec facility for The Green Organic Dutchman (TGOD), in which Aurora holds a 17.62% ownership interest. Suppliers Aurora anticipates working with the group of suppliers and contractors that have been involved with the construction of Aurora Sky. The close working relationship established during this project, the quality of the products, technology and workmanship, and the shared experience are anticipated to result in accelerated project delivery. About Aurora Aurora's wholly-owned subsidiary, Aurora Cannabis Enterprises Inc., is a licensed producer of medical cannabis pursuant to Health Canada's Access to Cannabis for Medical Purposes Regulations ("ACMPR"). The Company operates a 55,200 square foot, state-of-the-art production facility in Mountain View County, Alberta, known as "Aurora Mountain", and a second 40,000 square foot high-technology production facility known as "Aurora Vie" in Pointe-Claire, Quebec on Montreal's West Island. In January 2018, Aurora's 800,000 square foot flagship cultivation facility, Aurora Sky, located at the Edmonton International Airport, was licensed. Once at full capacity, Aurora Sky is expected to produce over 100,000 kg per annum of cannabis. Aurora is completing a fourth facility in Lachute, Quebec utilizing its wholly owned subsidiary Aurora Larssen Projects Inc. Aurora is close to completion of the acquisition of all the outstanding shares of CanniMed Therapeutics Inc, Canada's most experienced licensed producer of medical cannabis, adding over 20,000 kg per annum in funded capacity, as well as Canada's strongest medical cannabis brand. Aurora also owns Berlin-based Pedanios, the leading wholesale importer, exporter, and distributor of medical cannabis in the European Union. The Company owns 51% of Aurora Nordic, which will be constructing a 1,000,000 square foot hybrid greenhouse in Odense, Denmark. The Company offers further differentiation through its acquisition of BC Northern Lights Ltd. and Urban Cultivator Inc., industry leaders, respectively, in the production and sale of proprietary systems for the safe, efficient and high-yield indoor cultivation of cannabis, and in state-of-the-art indoor gardening appliances for the cultivation of organic microgreens, vegetables and herbs in home and professional kitchens. Aurora holds a 19.88% ownership interest in Liquor Stores N.A., who intend to develop a cannabis retail network in Western Canada. In addition, the Company holds approximately 17.23% of the issued shares in leading extraction technology company Radient Technologies Inc., and has a strategic investment in Hempco Food and Fiber Inc., with options to increase ownership stake to over 50%. Aurora is also the cornerstone investor in two other licensed producers, with a 22.9% stake in Cann Group Limited, the first Australian company licensed to conduct research on and cultivate medical cannabis, and a 17.62% stake in Canadian producer The Green Organic Dutchman Ltd., with options to increase to majority ownership. Aurora's Common Shares trade on the TSX under the symbol "ACB". Forward looking statements This news release includes statements containing certain "forward-looking information" within the meaning of applicable securities law ("forward-looking statements"). Forward-looking statements are frequently characterized by words such as "plan", "continue", "expect", "project", "intend", "believe", "anticipate", "estimate", "may", "will", "potential", "proposed" and other similar words, or statements that certain events or conditions "may" or "will" occur. Forward looking statements made in this release include: (i) statements regarding the expected commencement of construction of Aurora sun; (ii) statements regarding the potential power supply agreement; (iii) statements regarding the facility characteristics including its size, growing and capacity; (iv) statements regarding the rapid growth of international markets, Aurora's intention to supply those markets, and Aurora's intention to use products grown at Aurora Sky to supply those markets and the Canadian marketplace;and (v) information regarding key metrics including predicted production costs. These statements are only predictions. Various assumptions were used in drawing the conclusions or making the projections contained in the forward-looking statements throughout this news release. Certain of the assumptions relied upon include: (i) the assumption that Aurora will be able to complete land acquisition in Medicine Hat, obtain necessary zoning changes, building permits, and commence construction; (ii) that Aurora will conclude a power supply agreement with the City of Medicine Hat; (iii) that the facility as permitted and constructed will meet the design characteristics described in this news release, (iv) that international markets for cannabis will continue to grow, and Aurora will be able to obtain necessary licenses and permits not only for the Aurora Sky facility, but to be able to sell its products in such international markets; and (v) that the facility will perform in line with Aurora's past practices and expected design parameters. Forward-looking statements are based on the opinions and estimates of management at the date the statements are made, and are subject to a variety of risks and uncertainties and other factors that could cause actual events or results to differ materially from those projected in the forward-looking statements. Factors that could cause actual results to vary from those made in this news release include risks that: (i) the Company is unable to obtain all necessary regulatory approvals and licenses for construction and operation of the facility; (ii) the Company's zoning application is denied or requires amendment; (iii) the facility isnot completed to design capacity; (iv) the market for cannabis does not develop as expected. The Company is under no obligation, and expressly disclaims any intention or obligation, to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise, except as required by applicable law. Neither TSX nor its Regulation Services Provider (as that term is defined in the policies of Toronto Stock Exchange) accepts responsibility for the adequacy or accuracy of this release. AURORA CANNABIS INC. Terry Booth CEO SOURCE Aurora Cannabis Inc. For further information: Marc Lakmaaker, Director, Investor Relations and Corporate Development, +1.647.269.5523, [email protected], www.auroramj.com; Craig MacPhail, NATIONAL Equicom, +1 416 586-1938, [email protected]; For Medicine Hat: City of Medicine Hat, Ted Clugston, Mayor, +1.403.529.8181; For the Ministry of Economic Development and Trade: Jean-Marc Prevost, Press Secretary, +1 780 644-8554, [email protected]
The recruiting profiles of both teams are similar. Both starting lineups had an average star rating of 2.4 as high school prospects. (Full ratings below, via the 247Sports Composite.) Neither team boasts a former five-star recruit in its two-deep, and both have four former four-stars. Seattle has 11 former three-stars, while New England has nine. This isn't that surprising, as five-stars make up less than 1 percent of all FBS/FCS recruits, four-stars less than 10 percent, and three-stars roughly 37 percent. About 55 percent are rated two-stars or unrated. And while neither Super Bowl team will start a five-star, the four teams in the College Football Playoff had lots of them. Tom Brady was an unrated recruit at a time when few recruits were rated on a national level, but he was thought of well enough to earn a scholarship offer from Michigan, which was contending for Big Ten titles on an annual basis. If the star system was around in 1995 when Brady graduated from high school, he would have likely been rated as a four- or five-star recruit. Patriots star Rob Gronkowski was highly rated. Out of Pittsburgh, Gronkowski was the No. 4 tight end nationally according to Rivals.com, two spots behind former New England teammate Aaron Hernandez. Gronkowski chose Arizona over Ohio State, Penn State, Clemson, Maryland, and other major offers. When Marshawn Lynch signed with Cal in 2004 out of Oakland Tech, Bears fans were quite happy, as he was rated the No. 2 running back in the nation, behind only Adrian Peterson. Lynch chose Cal over Oregon, UCLA, USC, Arizona State, and Washington State, among others. Russell Wilson was only a three-star recruit. Wilson was productive in football and baseball out of Richmond, Virginia, but he was 5'11, 180, a stature that hurt his rating. Size should impact a quarterback's rating, particularly because ratings have a major projection element, but Wilson overcame it to be a college and NFL star. Seahawks Name Position College Rating Russell Wilson QB NC State/Wisconsin 3 star Russell Okung LT Oklahoma State 3 star James Carpenter LG Alabama 4 star Max Unger C Oregon 3 star J.R. Sweezy RG NC State 2 star Justin Britt RT Missouri 3 star Luke Willson TE Rice 2 star Doug Baldwin WR Stanford 2 star Jermaine Kearse WR Washington 3 star Ricardo Lockette WR Fort Valley State NR Marshawn Lynch RB California 4 star Michael Bennett DE Texas A&M NR Tony McDaniel DT Tennessee 3 star Kevin Williams DT Oklahoma State N/A (too old) Cliff Avril DE Purdue 3 star Bruce Irvin LB West Virginia 4 star Bobby Wagner LB Utah State 2 star K.J. Wright LB Mississippi State 3 star Richard Sherman CB Stanford 3 star Earl Thomas FS Texas 3 star Kam Chancellor SS Virginia Tech 3 star Byron Maxwell CB Clemson 4 star Steven Hauschka K NC State NR Jon Ryan P Regina (Canada) N/A (from Canada) Patriots
Q: why do all softphones fail to authenticate after receiving 401 unauthorized from Asterisk? When I attempt to connect to the Asterisk server from CSipSimple, over a Cisco router, on the same network, Asterisk logs show the attempted connection: <-------------> [Mar 23 20:01:34] VERBOSE[4067] chan_sip.c: [Mar 23 20:01:34] --- (8 headers 0 lines) --- [Mar 23 20:01:34] NOTICE[4067] chan_sip.c: Outbound Registration: Expiry for nat5.babytel.ca is 55 sec (Scheduling reregistration in 40 s) [Mar 23 20:01:34] VERBOSE[4067] chan_sip.c: [Mar 23 20:01:34] Really destroying SIP dialog '5e070a0021f200c72308ddad6fe2521c@192.168.0.99' Method: REGISTER [Mar 23 20:02:01] VERBOSE[20423] manager.c: [Mar 23 20:02:01] == Manager 'sendcron' logged on from 127.0.0.1 [Mar 23 20:02:01] VERBOSE[20423] manager.c: [Mar 23 20:02:01] == Manager 'sendcron' logged off from 127.0.0.1 [Mar 23 20:02:06] VERBOSE[20436] manager.c: [Mar 23 20:02:06] == Manager 'sendcron' logged on from 127.0.0.1 [Mar 23 20:02:06] VERBOSE[20436] manager.c: [Mar 23 20:02:06] == Manager 'sendcron' logged off from 127.0.0.1 [Mar 23 20:02:10] VERBOSE[4067] chan_sip.c: [Mar 23 20:02:10] <--- SIP read from UDP:192.168.0.15:39462 ---> REGISTER sip:192.168.0.99 SIP/2.0 v: SIP/2.0/UDP 99.99.99.99:39462;rport;branch=z9hG4bKPjiUEFUHN08Wvs9xG2Q9tzRMOxFYJ323dO Route: <sip:192.168.0.99;transport=udp;lr> Max-Forwards: 70 f: <sip:201@192.168.0.99>;tag=HVPwJ.kg.9MW6PypcpObrVPGC3l3B-Uh t: <sip:201@192.168.0.99> i: QIsF0rZ0wYvzKC9S2P0rWhnYGsQ9FQbI CSeq: 56288 REGISTER User-Agent: CSipSimple_v1-16/r2457 m: <sip:201@99.99.99.99:39462;ob>;+sip.ice Expires: 900 Allow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, INFO, SUBSCRIBE, NOTIFY, REFER, MESSAGE, OPTIONS l: 0 <-------------> [Mar 23 20:02:10] VERBOSE[4067] chan_sip.c: [Mar 23 20:02:10] --- (13 headers 0 lines) --- [Mar 23 20:02:10] VERBOSE[4067] chan_sip.c: [Mar 23 20:02:10] Sending to 192.168.0.15:39462 (NAT) [Mar 23 20:02:10] VERBOSE[4067] chan_sip.c: [Mar 23 20:02:10] <--- Transmitting (NAT) to 192.168.0.15:39462 ---> SIP/2.0 401 Unauthorized Via: SIP/2.0/UDP 99.99.99.99:39462;branch=z9hG4bKPjiUEFUHN08Wvs9xG2Q9tzRMOxFYJ323dO;received=192.168.0.15;rport=39462 From: <sip:201@192.168.0.99>;tag=HVPwJ.kg.9MW6PypcpObrVPGC3l3B-Uh To: <sip:201@192.168.0.99>;tag=as0986faf4 Call-ID: QIsF0rZ0wYvzKC9S2P0rWhnYGsQ9FQbI CSeq: 56288 REGISTER Server: Asterisk PBX 1.8.29.0-vici Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE Supported: replaces, timer WWW-Authenticate: Digest algorithm=MD5, realm="asterisk", nonce="10600450" Content-Length: 0 CSipSimple itself fails to connect to the local Asterisk server. Because Jitsi shows similar errors, it doesn't seem to be client specific. Because both Jitsi on a Mac and CSipSimple on an Android phone can make voice calls out, that, to my mind, positively eliminates a firewall on the router as a cause. In the meantime, I've disabled the firewall on the server to eliminate that as a potential issue, which, admittedly, probably, wasn't necessary. When Asterisk replies with 401 Unauthorized how do I know why the connection is unauthorized? The full log is too large to post here. While sip set debug on didn't provide any output, the output from that command is here, although that was with Jitsi. A: The 401 Unauthorized isn't an error: is how authentication mechanism works on SIP (see this answer) The line: [Mar 23 20:02:10] NOTICE[4067] chan_sip.c: Registration from '<sip:201@192.168.0.99>' failed for '192.168.0.15:39462' - Wrong password Seems clear: the password in your SIP client is wrong and the authentication doesn't succeed. SIP password in sip.conf by the "secret" parameter inside your peer definition (201).
Q: Is there a way to override this message in my outlook plugin? I am developing an outlook plugin that will be distributed among several users and I keep getting a message saying that "A program is trying to access e-mail address information stored in outlook." Is there a way for me to disable this on every machine that downloads my plugin or disable it for my specific plugin? The program is written in c# Many thanks the message A: Firstly, you should never get that prompt in an Outlook addin as long as you use the Outlook.Application object passed to your addin. Never create a new instance of that object. To work around that prompt (not that you need to) see http://www.outlookcode.com/article.aspx?id=52 for the detailed list of your options.
On Thursday, Wisconsin officials released new unemployment numbers, claiming that Wisconsin’s unemployment rate is at the lowest point in 15 years. Wisconsin’s Department of Workforce Development (DWD) says the rate dropped from 4.4 percent in April to 4.2 percent in May. However, experts tell TODAY’S TMJ4 that those numbers may not tell the whole story. “The major concern with the statistic is that anyone who does not have a job and is not actively looking for one is not counted as unemployed and is also not counted as member of the labor force,” said Dr. Scott Drewianka, an Associate Labor Economics Professor at the University of Wisconsin-Milwaukee. Drewianka says most economists would argue that the state’s numbers aren’t the best indication of the status of labor demand. Another issue he raised with the DWD numbers –--- the numbers don’t speak to the quality of jobs. "It is certainly possible for the unemployment rate to be low and yet for many workers to have jobs beneath their qualifications or with lower-than-expected compensation,” Drewianka said. The numbers also don’t factor in those working less than full-time hours. He also noted that Wisconsin's business cycle tends to lag behind the national cycle by a few months. “So it is possible that things might not get much better from here, Drewianka added. A Marquette University professor found additional problems with Wisconsin’s stats. “The main problem is that the 4.2 number is the BLS preliminary estimate. In other words it is subject to final revision. Hence, I wouldn’t claim a record just yet,” said Marquette University Economics professor Dr. Joseph Daniels. At least one elected official agreed. "Gov. Walker shouldn’t pop the cork on the champagne just yet. While unemployment is down, poverty is up, and that is not something anyone should celebrate," said Senator Lena Taylor (D-Milwaukee) in a written statement to TODAY'S TMJ4. According to Daniels, the last confirmed full unemployment rate for Wisconsin was 8.3 percent. That number comes from the Bureau of Labor and Statistics. Noting that Milwaukee is the primary economic driver of the state, Daniel’s says that number also doesn’t discern among racial and ethnic groups. “You will see that African American unemployment was 9.6% and for African American men 10.3%. For the state of Wisconsin the respective numbers are 11.1% and 11.3%,” Daniels said. That’s nearly three times the numbers the state released. “I would assume any claimed record (by Wisconsin officials) will bring little comfort to African Americans in Wisconsin,” Daniels added. University of Wisconsin-Milwaukee Economics professor Scott Adams agreed. “Black unemployment remains very high. This 4.2% only includes those who are out of work and looking for a job, not those who have left the labor force, taken part-time jobs for economic reasons, are underemployed, etc.,” Adams said. Gov. Scott Walker fell short when it came to his top 2010 campaign promise -- that the state would add 250,000 private-sector jobs in his first term, reports PolitiFact. State employers added an estimated 53,400 jobs in 2014, bringing the total numbers of new jobs for his four-year term to 146,795. That's about 59 percent of the total Walker promised as a candidate, PolitiFact says. TODAY'S TMJ4 reached out to Gov. Walker's office, but no one was available for comment. A Marquette University Law School poll released Wednesday showed pessimism about the state's economy. The poll says 29 percent of respondents think Wisconsin's economy got worse over the past year while 25 percent say it improved and 44 percent think it has remained about the same. Gov. Scott Walker blamed the poll results on the media, saying "headlines are always about negative and bad things." TODAY'S TMJ4 also reached out to DWD officials. They released the following statement. It is important to look at multiple indicators to understand the complete picture of the state of Wisconsin's economy and workforce. Whether through monthly job estimates, quarterly wage data or Unemployment Insurance claims, the indicators show Wisconsin's economy is growing and adding jobs: Wisconsin had the nation's sixth-highest rate of growth in average weekly private sector wages from December 2014 to December 2015, according to Quarterly Census of Employment & Wages data. More people are employed in Wisconsin than ever before in state history. The state unemployment rate of 4.2% is a half percentage point below the national rate of 4.7% and hasn't been this low since March 2001. This is the rate that the federal government publishes every month and is the most commonly cited rate across the country. The 8.3% rate attributed to Wisconsin in your story is below the comparable US rate of 10.4% and is the 13th lowest in the country, below Illinois (10.9%), Michigan (11.4%), Indiana (9%) and Ohio (10.1)%. Our state's labor force participation rate outpaces the nation's by 6.1%. Year 2016 initial Unemployment Insurance claims are at their lowest levels since 1989. Wisconsin was one of only 10 states with an annual average unemployment rate in 2015 lower than 2007, the year that the Great Recession began. Today's JobCenterofWisconsin.com count has 88,903 job postings.
Meta-analysis of feeding trials investigating cadmium accumulation in the livers and kidneys of sheep. Human cadmium intake derives mainly from food sources, and cadmium can be present in high concentrations in some offal. A meta-analysis using random effects modeling was carried out to integrate the results of 21 controlled randomized trials in which sheep were fed diets with elevated cadmium levels and cadmium concentrations in their livers and kidneys were recorded after slaughter. Resulting predictions of cadmium accumulation in sheep are applicable to a broad set of exposure situations allowing the critical examination of cadmium in the human food chain. The product of the cadmium concentration in the feed and the duration of exposure to that feed were significant predictors of the cadmium concentration in livers and kidneys. The predominantly organic rather than inorganic form of cadmium in the feed further increased accumulation. Other variables (dry matter intake, the vehicle of the elevated cadmium in the diet, animal age, weight, and sex) were not significant. As a result, the prime measure to decrease the risk of cadmium from animal origin adversely affecting human health should be restricting the animals' cumulative cadmium intake. It is suggested that this might be achieved by preventing the livers and kidneys of older animals from entering the human food chain.
Prevalence and trends in overweight and obesity among children and adolescents in Thessaloniki, Greece. Obesity is the most prevalent nutrition-related problem in Western societies. Childhood obesity is rapidly emerging as a global epidemic that will have profound public health consequences, as overweight children become overweight adults. The aim of this study was to investigate the prevalence of overweight and obesity among children and adolescents in the city of Thessaloniki, and evaluate the trends in Greece by comparing our results to those of other cross-sectional studies. Data concerning the height and weight of 2,458 schoolchildren aged 6 to 17 years (1,226 6-10 years, 1,232 11-17 years) of 27 primary and secondary public schools were collected. BMI was calculated from the two measurements. In the analyses, the estimations of the prevalence of overweight and obesity are based on recently established international BMI percentile curves and cut-off points from 2-18 years. To investigate the secular trends in obesity in Greece, data of schoolchildren from four successive surveys were used. In the younger group (6-10 yr), the prevalence of overweight and obesity were 25.3% and 5.6%, while for adolescents (11-17 yr) they were 19.0% and 2.6%, respectively. The prevalence was 25.9% and 5.1% for all males, and 19.1% and 3.2% for all females, respectively. As far as trends are concerned, an increase of BMI was found among males when the results of our survey were compared with those of the previous three. However, the trends for girls are different. An increase was found when the results of our study were compared with 1942. A decrease of BMI at most ages was found when the results of our study were compared with those of the 1982 survey, while an increase was recorded only for younger girls below 13 years compared to the 1984-5 study. This study demonstrates that the prevalence of overweight and obesity among schoolchildren is 22.2% and 4.1%, respectively, and has been increasing in the last decades, especially among boys.
/* * Copyright (c) 2010, 2013, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package jdk.nashorn.internal.ir; import java.util.Arrays; import java.util.Collections; import java.util.List; import jdk.nashorn.internal.codegen.types.ArrayType; import jdk.nashorn.internal.codegen.types.Type; import jdk.nashorn.internal.ir.annotations.Immutable; import jdk.nashorn.internal.ir.visitor.NodeVisitor; import jdk.nashorn.internal.objects.NativeArray; import jdk.nashorn.internal.parser.Lexer.LexerToken; import jdk.nashorn.internal.parser.Token; import jdk.nashorn.internal.parser.TokenType; import jdk.nashorn.internal.runtime.JSType; import jdk.nashorn.internal.runtime.ScriptRuntime; import jdk.nashorn.internal.runtime.Undefined; /** * Literal nodes represent JavaScript values. * * @param <T> the literal type */ @Immutable public abstract class LiteralNode<T> extends Expression implements PropertyKey { private static final long serialVersionUID = 1L; /** Literal value */ protected final T value; /** Marker for values that must be computed at runtime */ public static final Object POSTSET_MARKER = new Object(); /** * Constructor * * @param token token * @param finish finish * @param value the value of the literal */ protected LiteralNode(final long token, final int finish, final T value) { super(token, finish); this.value = value; } /** * Copy constructor * * @param literalNode source node */ protected LiteralNode(final LiteralNode<T> literalNode) { this(literalNode, literalNode.value); } /** * A copy constructor with value change. * @param literalNode the original literal node * @param newValue new value for this node */ protected LiteralNode(final LiteralNode<T> literalNode, final T newValue) { super(literalNode); this.value = newValue; } /** * Initialization setter, if required for immutable state. This is used for * things like ArrayLiteralNodes that need to carry state for the splitter. * Default implementation is just a nop. * @param lc lexical context * @return new literal node with initialized state, or same if nothing changed */ public LiteralNode<?> initialize(final LexicalContext lc) { return this; } /** * Check if the literal value is null * @return true if literal value is null */ public boolean isNull() { return value == null; } @Override public Type getType() { return Type.typeFor(value.getClass()); } @Override public String getPropertyName() { return JSType.toString(getObject()); } /** * Fetch boolean value of node. * * @return boolean value of node. */ public boolean getBoolean() { return JSType.toBoolean(value); } /** * Fetch int32 value of node. * * @return Int32 value of node. */ public int getInt32() { return JSType.toInt32(value); } /** * Fetch uint32 value of node. * * @return uint32 value of node. */ public long getUint32() { return JSType.toUint32(value); } /** * Fetch long value of node * * @return long value of node */ public long getLong() { return JSType.toLong(value); } /** * Fetch double value of node. * * @return double value of node. */ public double getNumber() { return JSType.toNumber(value); } /** * Fetch String value of node. * * @return String value of node. */ public String getString() { return JSType.toString(value); } /** * Fetch Object value of node. * * @return Object value of node. */ public Object getObject() { return value; } /** * Test if the value is a string. * * @return True if value is a string. */ public boolean isString() { return value instanceof String; } /** * Test if tha value is a number * * @return True if value is a number */ public boolean isNumeric() { return value instanceof Number; } /** * Assist in IR navigation. * * @param visitor IR navigating visitor. */ @Override public Node accept(final NodeVisitor<? extends LexicalContext> visitor) { if (visitor.enterLiteralNode(this)) { return visitor.leaveLiteralNode(this); } return this; } @Override public void toString(final StringBuilder sb, final boolean printType) { if (value == null) { sb.append("null"); } else { sb.append(value.toString()); } } /** * Get the literal node value * @return the value */ public final T getValue() { return value; } private static Expression[] valueToArray(final List<Expression> value) { return value.toArray(new Expression[value.size()]); } /** * Create a new null literal * * @param token token * @param finish finish * * @return the new literal node */ public static LiteralNode<Object> newInstance(final long token, final int finish) { return new NullLiteralNode(token, finish); } /** * Create a new null literal based on a parent node (source, token, finish) * * @param parent parent node * * @return the new literal node */ public static LiteralNode<Object> newInstance(final Node parent) { return new NullLiteralNode(parent.getToken(), parent.getFinish()); } /** * Super class for primitive (side-effect free) literals. * * @param <T> the literal type */ public static class PrimitiveLiteralNode<T> extends LiteralNode<T> { private static final long serialVersionUID = 1L; private PrimitiveLiteralNode(final long token, final int finish, final T value) { super(token, finish, value); } private PrimitiveLiteralNode(final PrimitiveLiteralNode<T> literalNode) { super(literalNode); } /** * Check if the literal value is boolean true * @return true if literal value is boolean true */ public boolean isTrue() { return JSType.toBoolean(value); } @Override public boolean isLocal() { return true; } @Override public boolean isAlwaysFalse() { return !isTrue(); } @Override public boolean isAlwaysTrue() { return isTrue(); } } @Immutable private static final class BooleanLiteralNode extends PrimitiveLiteralNode<Boolean> { private static final long serialVersionUID = 1L; private BooleanLiteralNode(final long token, final int finish, final boolean value) { super(Token.recast(token, value ? TokenType.TRUE : TokenType.FALSE), finish, value); } private BooleanLiteralNode(final BooleanLiteralNode literalNode) { super(literalNode); } @Override public boolean isTrue() { return value; } @Override public Type getType() { return Type.BOOLEAN; } @Override public Type getWidestOperationType() { return Type.BOOLEAN; } } /** * Create a new boolean literal * * @param token token * @param finish finish * @param value true or false * * @return the new literal node */ public static LiteralNode<Boolean> newInstance(final long token, final int finish, final boolean value) { return new BooleanLiteralNode(token, finish, value); } /** * Create a new boolean literal based on a parent node (source, token, finish) * * @param parent parent node * @param value true or false * * @return the new literal node */ public static LiteralNode<?> newInstance(final Node parent, final boolean value) { return new BooleanLiteralNode(parent.getToken(), parent.getFinish(), value); } @Immutable private static final class NumberLiteralNode extends PrimitiveLiteralNode<Number> { private static final long serialVersionUID = 1L; private final Type type = numberGetType(value); private NumberLiteralNode(final long token, final int finish, final Number value) { super(Token.recast(token, TokenType.DECIMAL), finish, value); } private NumberLiteralNode(final NumberLiteralNode literalNode) { super(literalNode); } private static Type numberGetType(final Number number) { if (number instanceof Integer) { return Type.INT; } else if (number instanceof Double) { return Type.NUMBER; } else { assert false; } return null; } @Override public Type getType() { return type; } @Override public Type getWidestOperationType() { return getType(); } } /** * Create a new number literal * * @param token token * @param finish finish * @param value literal value * * @return the new literal node */ public static LiteralNode<Number> newInstance(final long token, final int finish, final Number value) { assert !(value instanceof Long); return new NumberLiteralNode(token, finish, value); } /** * Create a new number literal based on a parent node (source, token, finish) * * @param parent parent node * @param value literal value * * @return the new literal node */ public static LiteralNode<?> newInstance(final Node parent, final Number value) { return new NumberLiteralNode(parent.getToken(), parent.getFinish(), value); } private static class UndefinedLiteralNode extends PrimitiveLiteralNode<Undefined> { private static final long serialVersionUID = 1L; private UndefinedLiteralNode(final long token, final int finish) { super(Token.recast(token, TokenType.OBJECT), finish, ScriptRuntime.UNDEFINED); } private UndefinedLiteralNode(final UndefinedLiteralNode literalNode) { super(literalNode); } } /** * Create a new undefined literal * * @param token token * @param finish finish * @param value undefined value, passed only for polymorphism discrimination * * @return the new literal node */ public static LiteralNode<Undefined> newInstance(final long token, final int finish, final Undefined value) { return new UndefinedLiteralNode(token, finish); } /** * Create a new null literal based on a parent node (source, token, finish) * * @param parent parent node * @param value undefined value * * @return the new literal node */ public static LiteralNode<?> newInstance(final Node parent, final Undefined value) { return new UndefinedLiteralNode(parent.getToken(), parent.getFinish()); } @Immutable private static class StringLiteralNode extends PrimitiveLiteralNode<String> { private static final long serialVersionUID = 1L; private StringLiteralNode(final long token, final int finish, final String value) { super(Token.recast(token, TokenType.STRING), finish, value); } private StringLiteralNode(final StringLiteralNode literalNode) { super(literalNode); } @Override public void toString(final StringBuilder sb, final boolean printType) { sb.append('\"'); sb.append(value); sb.append('\"'); } } /** * Create a new string literal * * @param token token * @param finish finish * @param value string value * * @return the new literal node */ public static LiteralNode<String> newInstance(final long token, final int finish, final String value) { return new StringLiteralNode(token, finish, value); } /** * Create a new String literal based on a parent node (source, token, finish) * * @param parent parent node * @param value string value * * @return the new literal node */ public static LiteralNode<?> newInstance(final Node parent, final String value) { return new StringLiteralNode(parent.getToken(), parent.getFinish(), value); } @Immutable private static class LexerTokenLiteralNode extends LiteralNode<LexerToken> { private static final long serialVersionUID = 1L; private LexerTokenLiteralNode(final long token, final int finish, final LexerToken value) { super(Token.recast(token, TokenType.STRING), finish, value); //TODO is string the correct token type here? } private LexerTokenLiteralNode(final LexerTokenLiteralNode literalNode) { super(literalNode); } @Override public Type getType() { return Type.OBJECT; } @Override public void toString(final StringBuilder sb, final boolean printType) { sb.append(value.toString()); } } /** * Create a new literal node for a lexer token * * @param token token * @param finish finish * @param value lexer token value * * @return the new literal node */ public static LiteralNode<LexerToken> newInstance(final long token, final int finish, final LexerToken value) { return new LexerTokenLiteralNode(token, finish, value); } /** * Create a new lexer token literal based on a parent node (source, token, finish) * * @param parent parent node * @param value lexer token * * @return the new literal node */ public static LiteralNode<?> newInstance(final Node parent, final LexerToken value) { return new LexerTokenLiteralNode(parent.getToken(), parent.getFinish(), value); } /** * Get the constant value for an object, or {@link #POSTSET_MARKER} if the value can't be statically computed. * * @param object a node or value object * @return the constant value or {@code POSTSET_MARKER} */ public static Object objectAsConstant(final Object object) { if (object == null) { return null; } else if (object instanceof Number || object instanceof String || object instanceof Boolean) { return object; } else if (object instanceof LiteralNode) { return objectAsConstant(((LiteralNode<?>)object).getValue()); } return POSTSET_MARKER; } /** * Test whether {@code object} represents a constant value. * @param object a node or value object * @return true if object is a constant value */ public static boolean isConstant(final Object object) { return objectAsConstant(object) != POSTSET_MARKER; } private static final class NullLiteralNode extends PrimitiveLiteralNode<Object> { private static final long serialVersionUID = 1L; private NullLiteralNode(final long token, final int finish) { super(Token.recast(token, TokenType.OBJECT), finish, null); } @Override public Node accept(final NodeVisitor<? extends LexicalContext> visitor) { if (visitor.enterLiteralNode(this)) { return visitor.leaveLiteralNode(this); } return this; } @Override public Type getType() { return Type.OBJECT; } @Override public Type getWidestOperationType() { return Type.OBJECT; } } /** * Array literal node class. */ @Immutable public static final class ArrayLiteralNode extends LiteralNode<Expression[]> implements LexicalContextNode, Splittable { private static final long serialVersionUID = 1L; /** Array element type. */ private final Type elementType; /** Preset constant array. */ private final Object presets; /** Indices of array elements requiring computed post sets. */ private final int[] postsets; /** Ranges for splitting up large literals in code generation */ private final List<Splittable.SplitRange> splitRanges; private static final class ArrayLiteralInitializer { static ArrayLiteralNode initialize(final ArrayLiteralNode node) { final Type elementType = computeElementType(node.value); final int[] postsets = computePostsets(node.value); final Object presets = computePresets(node.value, elementType, postsets); return new ArrayLiteralNode(node, node.value, elementType, postsets, presets, node.splitRanges); } private static Type computeElementType(final Expression[] value) { Type widestElementType = Type.INT; for (final Expression elem : value) { if (elem == null) { widestElementType = widestElementType.widest(Type.OBJECT); //no way to represent undefined as number break; } final Type type = elem.getType().isUnknown() ? Type.OBJECT : elem.getType(); if (type.isBoolean()) { //TODO fix this with explicit boolean types widestElementType = widestElementType.widest(Type.OBJECT); break; } widestElementType = widestElementType.widest(type); if (widestElementType.isObject()) { break; } } return widestElementType; } private static int[] computePostsets(final Expression[] value) { final int[] computed = new int[value.length]; int nComputed = 0; for (int i = 0; i < value.length; i++) { final Expression element = value[i]; if (element == null || !isConstant(element)) { computed[nComputed++] = i; } } return Arrays.copyOf(computed, nComputed); } private static boolean setArrayElement(final int[] array, final int i, final Object n) { if (n instanceof Number) { array[i] = ((Number)n).intValue(); return true; } return false; } private static boolean setArrayElement(final long[] array, final int i, final Object n) { if (n instanceof Number) { array[i] = ((Number)n).longValue(); return true; } return false; } private static boolean setArrayElement(final double[] array, final int i, final Object n) { if (n instanceof Number) { array[i] = ((Number)n).doubleValue(); return true; } return false; } private static int[] presetIntArray(final Expression[] value, final int[] postsets) { final int[] array = new int[value.length]; int nComputed = 0; for (int i = 0; i < value.length; i++) { if (!setArrayElement(array, i, objectAsConstant(value[i]))) { assert postsets[nComputed++] == i; } } assert postsets.length == nComputed; return array; } private static long[] presetLongArray(final Expression[] value, final int[] postsets) { final long[] array = new long[value.length]; int nComputed = 0; for (int i = 0; i < value.length; i++) { if (!setArrayElement(array, i, objectAsConstant(value[i]))) { assert postsets[nComputed++] == i; } } assert postsets.length == nComputed; return array; } private static double[] presetDoubleArray(final Expression[] value, final int[] postsets) { final double[] array = new double[value.length]; int nComputed = 0; for (int i = 0; i < value.length; i++) { if (!setArrayElement(array, i, objectAsConstant(value[i]))) { assert postsets[nComputed++] == i; } } assert postsets.length == nComputed; return array; } private static Object[] presetObjectArray(final Expression[] value, final int[] postsets) { final Object[] array = new Object[value.length]; int nComputed = 0; for (int i = 0; i < value.length; i++) { final Node node = value[i]; if (node == null) { assert postsets[nComputed++] == i; continue; } final Object element = objectAsConstant(node); if (element != POSTSET_MARKER) { array[i] = element; } else { assert postsets[nComputed++] == i; } } assert postsets.length == nComputed; return array; } static Object computePresets(final Expression[] value, final Type elementType, final int[] postsets) { assert !elementType.isUnknown(); if (elementType.isInteger()) { return presetIntArray(value, postsets); } else if (elementType.isNumeric()) { return presetDoubleArray(value, postsets); } else { return presetObjectArray(value, postsets); } } } /** * Constructor * * @param token token * @param finish finish * @param value array literal value, a Node array */ protected ArrayLiteralNode(final long token, final int finish, final Expression[] value) { super(Token.recast(token, TokenType.ARRAY), finish, value); this.elementType = Type.UNKNOWN; this.presets = null; this.postsets = null; this.splitRanges = null; } /** * Copy constructor * @param node source array literal node */ private ArrayLiteralNode(final ArrayLiteralNode node, final Expression[] value, final Type elementType, final int[] postsets, final Object presets, final List<Splittable.SplitRange> splitRanges) { super(node, value); this.elementType = elementType; this.postsets = postsets; this.presets = presets; this.splitRanges = splitRanges; } /** * Returns a list of array element expressions. Note that empty array elements manifest themselves as * null. * @return a list of array element expressions. */ public List<Expression> getElementExpressions() { return Collections.unmodifiableList(Arrays.asList(value)); } /** * Setter that initializes all code generation meta data for an * ArrayLiteralNode. This acts a setter, so the return value may * return a new node and must be handled * * @param lc lexical context * @return new array literal node with postsets, presets and element types initialized */ @Override public ArrayLiteralNode initialize(final LexicalContext lc) { return Node.replaceInLexicalContext(lc, this, ArrayLiteralInitializer.initialize(this)); } /** * Get the array element type as Java format, e.g. [I * @return array element type */ public ArrayType getArrayType() { return getArrayType(getElementType()); } private static ArrayType getArrayType(final Type elementType) { if (elementType.isInteger()) { return Type.INT_ARRAY; } else if (elementType.isNumeric()) { return Type.NUMBER_ARRAY; } else { return Type.OBJECT_ARRAY; } } @Override public Type getType() { return Type.typeFor(NativeArray.class); } /** * Get the element type of this array literal * @return element type */ public Type getElementType() { assert !elementType.isUnknown() : this + " has elementType=unknown"; return elementType; } /** * Get indices of arrays containing computed post sets. post sets * are things like non literals e.g. "x+y" instead of i or 17 * @return post set indices */ public int[] getPostsets() { assert postsets != null : this + " elementType=" + elementType + " has no postsets"; return postsets; } private boolean presetsMatchElementType() { if (elementType == Type.INT) { return presets instanceof int[]; } else if (elementType == Type.NUMBER) { return presets instanceof double[]; } else { return presets instanceof Object[]; } } /** * Get presets constant array * @return presets array, always returns an array type */ public Object getPresets() { assert presets != null && presetsMatchElementType() : this + " doesn't have presets, or invalid preset type: " + presets; return presets; } /** * Get the split ranges for this ArrayLiteral, or null if this array does not have to be split. * @see Splittable.SplitRange * @return list of split ranges */ @Override public List<Splittable.SplitRange> getSplitRanges() { return splitRanges == null ? null : Collections.unmodifiableList(splitRanges); } /** * Set the SplitRanges that make up this ArrayLiteral * @param lc lexical context * @see Splittable.SplitRange * @param splitRanges list of split ranges * @return new or changed node */ public ArrayLiteralNode setSplitRanges(final LexicalContext lc, final List<Splittable.SplitRange> splitRanges) { if (this.splitRanges == splitRanges) { return this; } return Node.replaceInLexicalContext(lc, this, new ArrayLiteralNode(this, value, elementType, postsets, presets, splitRanges)); } @Override public Node accept(final NodeVisitor<? extends LexicalContext> visitor) { return Acceptor.accept(this, visitor); } @Override public Node accept(final LexicalContext lc, final NodeVisitor<? extends LexicalContext> visitor) { if (visitor.enterLiteralNode(this)) { final List<Expression> oldValue = Arrays.asList(value); final List<Expression> newValue = Node.accept(visitor, oldValue); return visitor.leaveLiteralNode(oldValue != newValue ? setValue(lc, newValue) : this); } return this; } private ArrayLiteralNode setValue(final LexicalContext lc, final Expression[] value) { if (this.value == value) { return this; } return Node.replaceInLexicalContext(lc, this, new ArrayLiteralNode(this, value, elementType, postsets, presets, splitRanges)); } private ArrayLiteralNode setValue(final LexicalContext lc, final List<Expression> value) { return setValue(lc, value.toArray(new Expression[value.size()])); } @Override public void toString(final StringBuilder sb, final boolean printType) { sb.append('['); boolean first = true; for (final Node node : value) { if (!first) { sb.append(','); sb.append(' '); } if (node == null) { sb.append("undefined"); } else { node.toString(sb, printType); } first = false; } sb.append(']'); } } /** * Create a new array literal of Nodes from a list of Node values * * @param token token * @param finish finish * @param value literal value list * * @return the new literal node */ public static LiteralNode<Expression[]> newInstance(final long token, final int finish, final List<Expression> value) { return new ArrayLiteralNode(token, finish, valueToArray(value)); } /** * Create a new array literal based on a parent node (source, token, finish) * * @param parent parent node * @param value literal value list * * @return the new literal node */ public static LiteralNode<?> newInstance(final Node parent, final List<Expression> value) { return new ArrayLiteralNode(parent.getToken(), parent.getFinish(), valueToArray(value)); } /** * Create a new array literal of Nodes * * @param token token * @param finish finish * @param value literal value array * * @return the new literal node */ public static LiteralNode<Expression[]> newInstance(final long token, final int finish, final Expression[] value) { return new ArrayLiteralNode(token, finish, value); } }
127 F.Supp. 617 (1955) Russell H. WILLIAMS, d/b/a Williams Equipment Co., and Reed & Martin, Inc., A Corporation v. The UNITED STATES. No. 50403. United States Court of Claims. January 11, 1955. William H. Ferguson, Seattle, Wash., Donald McL. Davidson, Washington, D. C., on the briefs, for plaintiffs. Kendall M. Barnes, Washington, D. C., Warren E. Burger, Asst. Atty. Gen., for defendant. Before JONES, Chief Judge, and LITTLETON, WHITAKER, MADDEN and LARAMORE, Judges. JONES, Chief Judge. This case involves a contract between the plaintiffs and the defendant for the construction of a paved road at Fairbanks, Alaska. The facts have been set out in detail in our findings and will be referred to only to the extent necessary for an understanding of the issues which gave rise to the suit. The principal issue has to do with the amount of borrow material which was excavated by the plaintiffs and put in place on the road. The contract provided for payment for the borrow material at $1.29 per cubic yard and the payment for hauling the material beyond a certain distance at a unit price of 32 cents per cubic-yard mile. The borrow material yardage to be paid for was to be measured in its original position in the borrow pit, which yardage was to be *618 computed by the average end area method, and the overhaul item was to be paid upon the measurement of material in its original position times the overhaul distance in miles and fractions thereof. In other words, an important consideration in determining the amount due the plaintiffs was a determination of the amount of borrow material in its original position. The face of the quarry rose from a flat surface at a steep, though not vertical, angle. The average end area method contemplated that surveys be made of the vertical profile of the quarry at frequent intervals along its face, both at the beginning and at the end of the quarrying operations. The extent to which the profile upon final survey had receded from its original position would then be the basis for measuring the amount of material that had been removed from the quarry. At or about the time the plaintiffs began work a survey was made of the quarry. After some 30 or 40 percent of the excavation work had been completed, a slide occurred at the quarry in which a large amount of material moved downward and outward toward the base line where the plaintiffs were operating. The amount of material moved was estimated by a witness for the defendant as from 30,000 to 50,000 cubic yards, and by witnesses for the plaintiffs as from 200,000 to 400,000 cubic yards. A fair statement from the evidence would be that defendant's witness was too conservative and the estimates of plaintiffs' witnesses excessive. Whatever may be the correct amount, when we consider that the total amount of material moved, as computed by plaintiffs, was 99,592 cubic yards and that 34,596 had been removed at the time of the slide, the possible effect of such a slide on the computation of material in place by the average end area method can be seen.[1] Not only did material come into the area from outside for which no cross section had been prepared, but also certain points on the original survey were wiped out. After the contract was completed the contracting officer caused a final survey to be made and on a comparison of that survey with the original survey computed the borrow material excavated as 69,349.7 cubic yards. During the course of the contract plaintiffs had been paid for this item on a truck-measurement basis, on which basis the borrow material removed had been computed at 99,592 cubic yards, that is, some 30,000 more than the contracting officer computed on the average end area method. The plaintiffs took an appeal from that decision of the contracting officer to the Commissioner of Roads for Alaska, the designated *619 representative of the head of the department, who affirmed the decision of the contracting officer. This suit followed. When this case was tried and when a report thereon was filed by the commissioner, the last word on the question of the finality of the decision of the head of the department had been stated by the Supreme Court in United States v. Wunderlich, 342 U.S. 98, 72 S.Ct. 154, 96 L.Ed. 113, in which the Court said that a decision made by the head of the department under the "Disputes" clause of a government contract was final and conclusive unless fraud on his part was alleged and proved. The commissioner found that fraud, as measured by the formula set out by the Supreme Court in that decision, had not been established by the plaintiffs. However, after the report had been filed, the Congress passed and the President signed Public Law 356, 83d Congress, 2d Session, 41 U.S.C.A. §§ 321, 322, which provided that the decision of the head of any department or agency in any contractual dispute shall not be final and conclusive where "the same is fraudulent or capricious or arbitrary or so grossly erroneous as necessarily to imply bad faith, or is not supported by substantial evidence." We are satisfied from the evidence and have found as a fact that the decision of the head of the department was not supported by substantial evidence. In reaching this conclusion we have considered the evidence on both sides in order to determine whether it appears that the evidence in support of the administrative decision can fairly be said to be substantial in the face of opposing evidence. See Willapoint Oysters v. Ewing, 9 Cir., 174 F.2d 676, certiorari denied 338 U.S. 860, 70 S.Ct. 101, 94 L.Ed. 527. In a recent decision by the Supreme Court, Universal Camera Corp. v. National Labor Relations Board, 340 U.S. 474, 487, 71 S.Ct. 456, 464, 95 L.Ed. 456, the Court made the following statement with respect to the rule relating to substantiality of evidence to support an administrative decision: "Whether or not it was ever permissible for courts to determine the substantiality of evidence supporting a Labor Board decision merely on the basis of evidence which in and of itself justified it, without taking into account contradictory evidence or evidence from which conflicting inferences could be drawn, the new legislation [Administrative Procedures Act, 5 U.S.C.A. § 1001 et seq., and Taft-Hartley Act, 29 U.S.C.A. § 141 et seq.] definitely precludes such a theory of review and bars its practice. The substantiality of evidence must take into account whatever in the record fairly detracts from its weight. This is clearly the significance of the requirement in both statutes that courts consider the whole record." The fact that there is evidence, considered of and by itself, to support the administrative decision is not sufficient where there is opposing evidence so substantial in character as to detract from its weight and render it less than substantial on the record as a whole. As we view the evidence, it is difficult to see how it could be said that there was substantial evidence to support the decision made by the contracting officer and the head of the department in the face of the opposing evidence. What these administrative officials tried to do was to compute the amount of borrow material removed by the use of a method which had been made impossible of accurate application because of the slide which had occurred. It is true that the contract provided for the use of this method but only as a means of determining the amount of material removed for which the plaintiffs were to be paid. The real question was how much material had been removed. Not only were some of the original survey elevations wiped out but also substantial amounts of material came from outside into the area where the plaintiffs were working and from which material had been removed. These factors contributed to errors in comparing the original survey with the final *620 survey for the purpose of a comparison of the material removed. Defendant recognized some of these difficulties and undertook through interpolations or estimates to supply the original survey elevations which were wiped out, and otherwise compensate for the changed conditions. That it did not do so in a satisfactory manner is plainly evident from the opposing evidence which was before the administrative officials when the final decision was made and which they contend confirmed the original decision. In the first place, when the plaintiffs complained of the decision of the contracting officer, the possibility of error was recognized and an effort made to check that computation. The first method used was to have a mass diagram prepared of material in place on the road.[2] Then a computation was prepared which would show the amount of borrow material in place in its original position in the quarry which would be required to produce the material in place on the road as shown by the mass diagram. This computation resulted in a determination of 66,566.5 cubic yards of borrow material as compared with 64,735.9 cubic yards used in the contracting officer's determination for roadway embankment (69,349.7 less 4,613.8, which represented material rejected in spoils pile at the quarry and overburden). While the amount so computed was not substantially greater than the amount computed by the contracting officer, it failed to take into account as shown by finding 25, substantial amounts of material which were used and for which the plaintiffs were entitled to be paid. With these omitted amounts added to the 66,566.5 cubic yards which were computed, the amount becomes substantially greater than that allowed in the final determination. A second check on the accuracy of the average end area method was made while the appeal was pending through what is known as a specific gravity test. By such a test it was expected that a determination could be made of a change in volume from a solid rock condition of the material in the quarry to a disturbed condition of the same material in a truck, that is, a determination of the percentage of swells or voids in the material loaded in a truck as compared with the material in a solid condition in the quarry.[3] In spite of the fact that in making the test a 3-ton truck was used *621 instead of a 6-ton or larger truck of the type in use by the plaintiffs during their operations, and that the allowance for the swell factor was unfavorable to the plaintiffs, a yardage was computed of 76,000 cubic yards instead of 69,349.7 determined by the contracting officer. We are convinced that with the use of a truck of the proper size and with the swell factor appropriately resolved an even greater disparity would have been shown. The third type of evidence before the head of the department when the final decision was made was the truck-measurement basis contended for by the plaintiffs. Prior to the commencement of the hauling operation, defendant's resident engineer and a representative of the plaintiffs measured each of the trucks on the job and calculated the dimensions of their gross load when heaped full. The volume of each truck as measured was reduced by a swell factor to allow for voids in the material in the trucks as compared with the material in its undisturbed state in the quarry. Each load was checked by inspectors of the defendant both upon departure from the borrow pit and on delivery at the road. Monthly progress payments were made to the plaintiffs by the defendant on the basis of these tabulations. The total yardage computed by this method was 99,592 cubic yards. The major objection raised by the defendant to the accuracy of such computation was that sufficient allowance was not made for swells or voids in the material. In our findings we have agreed that some more allowance should be made for voids than was made in that computation but we are satisfied from the evidence that such allowance should be less than that contended for by the defendant and therefore the amount computed on this basis would likewise be substantially more than that allowed by the head of the department. What we have, therefore, is a situation wherein the head of the department made a determination of an amount of material removed which was substantially less than the amount computed by any one of three other methods. When we consider the inaccuracies which would certainly result from an attempted use of the average end area method under the changed conditions resulting from the slide, it is difficult to see how three other computations, all of which resulted in substantially greater amounts, could be said to give anything approaching a confirmation of the amount determined by the head of the department. The contradictory and conflicting evidence so detracts from the weight of the evidence in support of the decision as to leave it without substantial support. On the contrary we are convinced that the substantial weight of the evidence supports an amount in excess of that allowed by the head of the department. In our findings we have found that 84,471 cubic yards of borrow material were excavated which is 15,121.3 cubic yards more than that allowed by the defendant. Since the contract price was $1.29 per cubic yard for the excavation of this borrow material, the *622 plaintiffs are entitled to recover $19,506.48 on this item. Since the amount allowable for the overhaul item varies in direct proportion to the volume of borrow material removed, the cubic-yard miles allowable on this item is 267,727.8 instead of 217,032.4, that is, 50,695.4 cubic-yard miles more than allowed by the defendant. At the contract price of 32 cents per cubic-yard mile, this amounts to $16,222.53, which the plaintiffs are entitled to recover on this item. The other issue in the case involves questions of law and arises out of an entirely different set of facts from those just discussed. One of the items involved in the contract was the paving of the road with asphalt. In order to do this work, the plaintiffs had considered renting or buying an asphalt plant in the State of Washington. The rental cost of such a plant would have been approximately $10,700. After the job got under way, the plaintiffs learned that there was a plant located at Ladd Air Force Base which was under the jurisdiction of one Major Russell who was responsible for the maintenance of the roads at the Air Force Base. One of the plaintiffs made inquiry of Major Russell as to whether arrangements could be made for the plaintiffs to use the plant. Major Russell suggested that certain roads on the Base needed seal coating and if plaintiffs would do this work they could use the plant on the road job. After certain negotiations during which Major Russell represented that he had been given authority to enter into the agreement, the plaintiffs submitted a written proposal which was accepted by Major Russell as Air Installation Officer, whereby the plaintiffs agreed to seal coat the main paved roads on the base in return for the use of the asphalt plant to produce asphalt for the road job. Upon the approval of that agreement by Major Russell, the plaintiffs proceeded to carry out their part of the agreement which they did by seal coating some nine or ten miles of roads in a manner satisfactory to the Air Force Base authorities. The value of such work was in excess of $10,000. In the meantime, Major Russell had forwarded to his superior officer copies of the agreement which he had approved for seal coating of the roads in return for the use of the asphalt plant by the plaintiffs. Shortly after the seal-coating job had been completed but prior to the time when the asphalt plant had been delivered to the plaintiffs, Major Russell's superior officer advised him that there was no authority for such an agreement and that work thereunder should be stopped immediately. Major Russell replied that the work had already been completed and urged that since the plaintiffs had carried out their part of the agreement and since the agreement was in the best interests of the Government, the plaintiffs should be permitted to use the asphalt plant. However, Major Russell's superior officer refused to change his position. Major Russell advised the plaintiffs of his inability to carry out the agreement but suggested that arrangements be made to have the plant borrowed by the Alaska Road Commission and then rented by the Commission to the plaintiffs. Major Russell stated that if this could be arranged he would arrange for payment for the work which had already been done by the plaintiffs at Ladd Field. As a result the asphalt plant was turned over by Major Russell to the Alaska Road Commission which, in turn, made it available to the plaintiffs at a rental figure of $1.30 per ton. In agreeing orally to that rental figure, the plaintiffs relied upon the assurance previously given by Major Russell that they would be paid for the work which they had already performed at Ladd Field. The plaintiffs used the asphalt plant in paving the roads under their contract. At or about the time the paving was completed, Major Russell advised the plaintiffs that payment could not be made by the defendant for the seal-coating work which had been performed by them at Ladd Field. Thereupon the plaintiffs *623 refused to sign a change order prepared by the Alaska Road Commission reducing the unit price of asphalt by $1.30 per ton. However, the contracting officer, in the final settlement under the plaintiffs' contract, directed that the change order be considered a written order changing the specifications and that the rental stipulated therein be deemed to be an equitable adjustment of the contract price. Upon completion of the contract, it was determined that 7,820.3 tons of asphalt had been actually used and accordingly $10,166.39 was deducted from payments to the plaintiffs. On appeal to the head of the department, the decision of the contracting officer was affirmed. No amount has been paid to the plaintiffs on account of the work which they did at Ladd field. What the plaintiffs are suing for is the amount just referred to which was deducted from amounts otherwise due them under the contract involved in this proceeding. No question is raised by the defendant as to the fact that the plaintiffs performed the services or that the services were worth at least the amount now sued for. The sole defense of the defendant is that since Major Russell was not a contracting officer with full authority to bind the Government in the fullest contractual sense, the plaintiffs cannot recover on this item. Surely, compelling reasons would be required to have any court sanction any such inequitable result and we do not think such reasons exist. Whatever might be said with respect to the lack of authority on the part of Major Russell to enter into a binding contract, it is certainly true that the plaintiffs proceeded in an entirely appropriate and proper manner in entering into the agreement and did so only after they were assured by Major Russell that he had authority to do so. Likewise, Major Russell had also proceeded in good faith in the entire matter and had been assured by Washington that such an arrangement would be satisfactory. The roads that were seal coated were wholly within the base where the contracting officer was located. It seems incredible that he did not know all about the agreement and by his inaction ratify it. Certainly he did not repudiate the agreement, and he did not appear as a witness. The plaintiffs carried out their part of the agreement for which the Government received the benefit. We feel that there then arose an implied contract under which the defendant was obligated to pay the value of the services rendered by the plaintiffs. Recovery is accordingly allowable for this item in the amount deducted under the contract, $10,166.39. Cf. W. H. Armstrong and Company v. United States, 98 Ct.Cl. 519, 529; Stiers v. United States, 121 Ct.Cl. 157, 172; and Pacific Maritime Association v. United States, 123 Ct.Cl. 667, 676. Judgment will accordingly be entered for $19,506.48 for the material item, $16,222.53 for the overhaul item, and $10,166.39 for the asphalt plant item, making a total of $45,895.40. It is so ordered. LARAMORE, MADDEN, WHITAKER, and LITTLETON, Judges, concur. NOTES [1] The slide created several difficulties in applying this method of measurement. A considerable part of the material which had broken loose as a result of the slide was still on the face of the quarry at the time of the final survey. In fact, in certain parts of the quarry the final survey profiles indicated that the face of the cliff had expanded over the original profile lines. The slide material, as a result of having been dislodged from its original position, had expanded considerably beyond the volume it occupied in the original position. This expansion tended to make the profile lines of the final survey appear to have receded less than they would otherwise have done. To the extent, therefore, that such slide material was still on the face of the quarry the end area method tended to understate the net volume of material in place actually removed from the face of the quarry by the plaintiffs. The slide also created fissures, some of which had the effect of moving the face of the quarry forward beyond the point where it would otherwise have been. This again tended to understate the amount of material removed by plaintiffs when using the end area method. The defendant made no corrections for these factors in its computations. Furthermore, the slide carried substantial amounts of material from parts of the quarry that had not originally been surveyed into parts when the plaintiffs' quarrying operations were going forward. It became necessary, therefore, to find out the original profile of the unsurveyed parts of the quarry. This could be done only by use of interpolations from those parts of the quarry which had been surveyed at the beginning, a process which tended to create some inaccuracies. [2] This diagram was evidently made by comparing the plans of the vertical cross sections before and after the road was built. The road as finished deviated in certain respects from the plans with the result that additional borrow was required over that contemplated on the plans. Furthermore, the new road was built on top of an old road which sank in some places during the construction and thus required additional fill. Neither of these factors was accounted for in the mass diagram. [3] The specific gravity method used by the defendant consisted of two parts. The first part determined that a 3-ton truck loaded level to the bed of the truck contained 33 percent voids and 67 percent solid rock by volume. The 33 percent figure was arrived at by taking the specific gravity of representative samples of rock and applying this specific gravity to the weight and volume of the load of a 3-ton truck loaded level to the top of its bed. It does not appear, however, that this 33 percent figure was intended to represent the exact increase in the volume of material from its virgin state to its volume loaded on the truck since no account was taken of voids that might occur in the material in the virgin state. Furthermore, the amount of voids in a small 3-ton truck might well be considerably less than the voids in 6-, 7-, or 8-ton trucks which were the types of sizes actually used. The following computation, though not made by defendant's engineers, is significant. Assuming that the total cubic yards of plaintiffs' truck-count figures took into account a uniform swell factor of 25 percent, then the uncorrected volume of material removed amounts to 132,789 cubic yards; if the plaintiffs' truck-count figure used a swell factor of 20 percent, then the uncorrected volume amounts to 124,490 cubic yards. Applying the 33 percent swell factor of the specific gravity test to those figures yields 88,946 and 83,408 cubic yards, respectively. The other part of the specific gravity method determined the percentage of voids in the heaped load on a truck having a sideboard level capacity of 6.35 cubic yards. The bed of this truck had inside dimensions of 6.6' × 10.0' × 2.6' as compared to 6.5' × 7.96' × 1.56' of the truck that was used in the previous test. The volume of the heap on such a truck was estimated to be ten-eighths of the volume of the heap on a test truck, or ten-eighths of 1.28 cubic yards which equals 1.60 cubic yards. The total load yardage for such a truck in heaped condition was, therefore, 6.35 cubic yards plus 1.60 cubic yards, which equals 7.95 cubic yards. Applying the 33 percent figure computed above, the engineers arrived at an actual volume of rock of 5.33 cubic yards. The defendant's engineers further assumed that such heaped 6.35 cubic yard trucks were credited with actually having hauled seven cubic yards of material in the plaintiffs' truck-count computation. The basis for this assumption is not clear. Dividing 5.33 into 7, the defendant determined that plaintiffs had only excavated 76 percent of the amount with which they were credited under the truck-count method. This percentage was then applied generally to the total cubic yardage which the truck-count method had credited to the plaintiffs, that is, 76 percent of 99,592 cubic yards, which is approximately 76,000 cubic yards.
Alternate Views Try It on For illustrative purposes only, individual results may vary. Click here for full T&C's. Remember, if you share your picture via a social media platform, it will be governed by their T&Cs and privacy policy. Keywords 8h wear – intensity – comfort Benefits The dream lipstick Type Lipstick For a sophisticated look, use Smooth silk lip pencil first, then fill lips with Rouge d’Armani. Apply directly from the stick & blend over lips using the Maestro Lip Brush. For a lacquer effect, apply Ecstasy Lacquer as a finishing touch. TRIMETHYLSILOXYPHENYL DIMETHICONE ISOHEXADECANE OCTYLDODECYL NEOPENTANOATE POLYETHYLENE HYDROGENATED STYRENE/METHYL STYRENE/INDENE COPOLYMER VP/HEXADECENE COPOLYMER HYDROGENATED POLYISOBUTENE ACRYLIC ACID/ISOBUTYL ACRYLATE/ISOBORNYL ACRYLATE COPOLYMER OZOKERITE SYNTHETIC FLUORPHLOGOPITE VP/EICOSENE COPOLYMER HYDRATED SILICA MAGNESIUM SILICATE CALCIUM ALUMINUM BOROSILICATE CALCIUM SODIUM BOROSILICATE SILICA DIMETHICONE PENTAERYTHRITYL TETRA-DI-T-BUTYL HYDROXYHYDROCINNAMATE TIN OXIDE METHICONE ALUMINA Online Boutique Privileges Complimentary UK Standard Delivery Receive your order in 3-5 working days with a luxury Giorgio Armani Gift Box Exclusive Secure payment Recommended products subscribe to our newsletter SIGN UP TO OUR EMAIL NEWSLETTER & RECEIVE 10% OFF YOUR 1st PURCHASE subscribe to our newsletter Email You can unsubscribe at any time through the link in each communication we send. We’ll use your data to send you personalised emails, and for analytics. For more information on how we use your personal data, please see our privacy policy. Armani is part of L'Oréal (UK) Limited. subscribe to our newsletter SIGN UP TO OUR EMAIL NEWSLETTER & RECEIVE 10% OFF YOUR 1st PURCHASE subscribe to our newsletter Email You can unsubscribe at any time through the link in each communication we send. We’ll use your data to send you personalised emails, and for analytics. For more information on how we use your personal data, please see our privacy policy. Armani is part of L'Oréal (UK) Limited.
Doce da Consolação Pastry Barcelos Description / Facilities For more than 50 years, this pastry makes the most delicious confectionery. This establishment was born in 1968, making biscuits, but soon it dedicated to the production of Doce de Romaria ou Doces Brancos (little cakes made with sugar, flour, eggs and with sugar cover). This is the house speciality, but here it is produced all kind of pastry.
* 1 . Is the Iran nuclear deal, on balance, more positive or negative for Armenia?
Entire Dolphin Families Dying in Fishing Nets Below: Next story in Science Dolphins that die after accidentally becoming entangled in fishing nets are often related, with mothers and their offspring being among the most likely to perish together, according to a new study in the latest issue of PLoS ONE. It has long been suspected that related dolphins die together as bycatch, but the new study is among the first to prove it using genetic analysis. The research focused on Franciscana dolphins -- one of the world's smallest dolphins -- but porpoises, other dolphins and small marine mammals anywhere are likely at risk too. Franciscana dolphins live in the Atlantic off the coasts of Brazil, Uruguay and Argentina "Any fishery that impacts small cetaceans as bycatch could potentially impact family groups," project leader Martin Mendez, a postdoctoral researcher at the Sackler Institute for Comparative Genomics at the American Museum of Natural History, told Discovery News. He said such mammals die together as bycatch because "they are highly social animals that frequently move around in family groups." Mendez and his team looked at over 250 Franciscana dolphin bycatch deaths that occurred over a decade. DNA connections showed that most of the deceased were genetic relatives that perished in nets set out by artisanal fisheries. The researchers estimate that between 2 percent to 5 percent of the Franciscana dolphin population near Argentina dies each year as bycatch. That's equal to the average population growth rate of this species. An additional problem affecting population growth is that since reproducing females and the next generation of dolphins are the most common bycatch victims, the species is particularly vulnerable to decline. The females are attracted to the fish-full nets and their young calves simply tag along with them. Trevor Spradlin, a marine mammal biologist for the NOAA Fisheries Office of Protected Resources, told Discovery News that pilot whales and killer whales, both members of the dolphin family, also frequently travel together and therefore relatives can get entangled in fishing nets at the same time. Sue Rocca, a biologist at the Whale and Dolphin Conservation Society of North America, told Discovery News that whales, dolphins and other marine mammals get entangled in lobster pot gear too. "Even if they can get to the surface, the line can wrap around the mouth or cut around bone, which has got to be incredibly painful," she said, adding that shellfish consumers should look for lobster caught in Massachusetts waters, since the state promotes whale-safe lobster fishing practices. In Argentina, study co-author Pablo Bordino and his colleagues at Fundacion Aquamarina have been trying a number of different strategies to minimize Franciscana dolphin deaths. "We have used pingers (subaquatic alarms to alert dolphins about fishing rates); have provided fishermen with 'reflective nets' that are acoustically easier to detect than regular gillnets; have proposed seasonal shifting of fishing operations in areas we suspect are frequently used by Franciscanas to calve or feed; and are currently implementing a combination of all these strategies," Mendez said. Thus far, no single solution appears to be foolproof. "The pinger is supposed to drive away animals," Rocca noted, "but for some it's like a dinner bell."
Wombat Gyrocopters Wombat Gyrocopters was a British aircraft manufacturer based in St Columb, Cornwall and founded in 1991 by Chris Julian. The company specialized in the design and manufacture of autogyros in the form kits for amateur construction. Julian was known as a motorcycle speedway racer. The company was formed by Julian to manufacture kits for his Wombat autogyro design. On 4 November 1991 the CAA issued the Wombat a restricted Permit to Test, allowing test flights to commence. In May 1997, when Julian was 60 years old, he was killed in the crash of a different model gyroglider at the Kemble airfield and that ended the enterprise. After Julian's death the rights to the Wombat design passed in July 2000 to former helicopter pilot Mark Harrisson. Harrisson had intended to put the aircraft back into production, but this plan was not completed. In 2013 he donated the prototype to The Helicopter Museum in Weston-super-Mare, where it arrived on 9 July 2013 and remains on display in the autogyro section of the museum. A total of four Wombats were registered in the United Kingdom with the CAA. All later had their registrations cancelled by the CAA. Aircraft References External links Photo of the prototype Wombat in The Helicopter Museum, Weston-super-Mare Category:Defunct aircraft manufacturers of the United Kingdom Category:Homebuilt aircraft Category:Autogyros
Kevin Rushby explores the Berwyn range’s contours and landmarks from the comfort of his home – finishing the hike with a well deserved, but fantasy, pint The method is simple: I examine my pile of Ordnance Survey maps, some battered and torn, others barely used, and find an area of Britain that I would like to visit. But I have no map, so I order the sheet I need online. I am going for a virtual walk there. No one can stop me, not even the Derbyshire constabulary. Off the chart: the big comeback of paper maps Read more My virtual travel on maps started when I was eight and confined to my bed for six long weeks after an operation. I’d get the atlas out and trace my finger along African mountain ranges and up South American rivers, trying to imagine what those places were like (this was before David Attenborough’s Planet Earth). Years later, shivering with malaria in a Sudanese hut, I stuck the three Michelin maps that covered all of Africa on the wall and did much the same. Now, suffering another enforced confinement, I find myself going back to the static map-reading habit. I could do it all online with Open Streets or Dorset Explorer, but my internet connection is horrible and I love the big perspective that unfolded paper can give, filling the kitchen table with tantalising patches of green and yellow, lines of wriggling blue and, best of all, the darkening shadows of contour lines huddling close together. Facebook Twitter Pinterest Kevin Rushby studying his OS map at home in Wales. Photograph: Kevin Rushby. The Berwyns are a Welsh mountain range that I ought to know well, but do not. The reason must be the proximity of Snowdonia. The gravitational pull of that massif is too strong and the poor old Berwyns, about 30 miles east, are neglected. I open up OS Explorer MAP (255) Llangollen and Berwyn. The first question in my mind is the meaning of Berwyn, but a call to a Welsh-speaking friend sorts that out: “White summit.” So, the white hills? Are they bare, then? I’m not going to Google Images, I want to work out as much as possible from the map. My first surprise is that the hills are a national nature reserve. The actual range does look pretty bare: an expanse of naked contour lines that vaguely resembles a dragon, snarling at Snowdonia away to the west, but prevented from leaping at its rival by the River Dee, which borders to the north and west. Facebook Twitter Pinterest The main Berwyns ridge. Photograph: Julian Cartwright/Alamy On the actual hills the lack of human habitation is stark, but they are high: Cadair Berwyn, the White Mountain, is marked at 827 metres (over 2,700 feet). That is where my virtual walk must go. I trace a path back from the summit to a village on the Dee, Llandrillo, where there is a campsite marked. That is where I will sleep the night before. I allow myself a Google search and discover that there is a pub, the Dudley Arms. Explore the world: 10 of the best maps for children Read more But now I am distracted by the map. Over the river from the campsite there is a cairn circle, then heading upriver I find an ancient bridge, Pont Cilan (square bridge?), a little further there is a “motte” (maybe a ruined castle?) and several islands. In my mind’s eye I see myself slipping a canoe into the river on a summer night and paddling across. Annoyingly, a salmon leaps into the boat and begs to be pan-fried over a camp fire while I sample some Welsh whisky. I give up this fantasy and return to the mountain walk. From the camp I head east up a small wooded valley containing the Afon Lynor (river). After two miles I emerge from the trees and walk up to a memorial stone (to who?) and take a permissive path south. I’m now climbing on to the ridge that leads first to Cadair Bronwen and then Berwyn itself. The presence of grouse butts suggests I’ll hear the grumpy croak of those birds. Facebook Twitter Pinterest The outskirts of the village of Llangynog. Photograph: Alamy The ridge looks impressive with a 200-metre drop on both sides, steeper on the east side. Once again I am distracted. What does Bwrdd Arthur mean? My Welsh-speaker helps out, again: Arthur’s Table. This is plainly an ancient landscape: just beyond the next peak, Moel Sych (Bare Dry peak?) I find a stone circle, a cairn and a stone row, all in close proximity. I follow the path down into a valley and see there’s a marked waterfall, Pistyll Rhaeadr, which rings a bell. I’ve been there, 20 years ago, and remember a cafe. Lunch. The falls are 80 metres high and well worth a visit. I’ve done about 10 miles, I reckon, but I’m determined to keep going as the next shoulder of hill has a tumulus and a fort, before dipping down past more waterfalls through the village of Llangynog, where I cross the River Tanat and take the Melangell Path. At the head of this valley is a place I have heard about but never seen, a chapel dedicated to the hare, the long-eared fleet-footed variety. This being a virtual walk I still feel full of energy, despite the 16 miles, and press on up the hill, yomping the nine miles back to the campsite in record time. The Dudley Arms in Llandrillo, a mile short of the campsite, beckons for a well-deserved pint. I fold up my OS255 and put it on top of the pile, ready, I hope, for later this year. This article contains affiliate links, which means we may earn a small commission if a reader clicks through and makes a purchase. All our journalism is independent and is in no way influenced by any advertiser or commercial initiative. By clicking on an affiliate link, you accept that third-party cookies will be set. More information.
package edu.stanford.nlp.sempre; import java.util.Arrays; /** * SimpleAnalyzer takes an utterance and applies simple methods to pre-process * * @author akchou */ public class SimpleAnalyzer extends LanguageAnalyzer { // Stanford tokenizer doesn't break hyphens. // Replace hypens with spaces for utterances like // "Spanish-speaking countries" but not for "2012-03-28". public static String breakHyphens(String utterance) { StringBuilder buf = new StringBuilder(utterance); for (int i = 0; i < buf.length(); i++) { if (buf.charAt(i) == '-' && (i + 1 < buf.length() && Character.isLetter(buf.charAt(i + 1)))) buf.setCharAt(i, ' '); } return buf.toString(); } private static final String[] numbers = {"zero", "one", "two", "three", "four", "five", "six", "seven", "eight", "nine", "ten"}; public LanguageInfo analyze(String utterance) { LanguageInfo languageInfo = new LanguageInfo(); // Clear these so that analyze can hypothetically be called // multiple times. languageInfo.tokens.clear(); languageInfo.posTags.clear(); languageInfo.nerTags.clear(); languageInfo.nerValues.clear(); languageInfo.lemmaTokens.clear(); // Break hyphens utterance = breakHyphens(utterance); // Default analysis - create tokens crudely StringBuilder buf = new StringBuilder(); for (int i = 0; i < utterance.length(); i++) { char c = utterance.charAt(i); // Put whitespace around certain characters. // TODO(pliang): handle contractions such as "can't" properly. boolean boundaryBefore = !(i - 1 >= 0) || utterance.charAt(i - 1) == ' '; boolean boundaryAfter = !(i + 1 < utterance.length()) || utterance.charAt(i + 1) == ' '; boolean separate; if (c == '.') // Break off period if already space around it (to preserve numbers like 3.5) separate = boundaryBefore || boundaryAfter; else separate = (",?'\"[]".indexOf(c) != -1); if (separate) buf.append(' '); // Convert quotes if (c == '"') buf.append(boundaryBefore ? "``" : "''"); else if (c == '\'') buf.append(boundaryBefore ? "`" : "'"); else buf.append(c); if (separate) buf.append(' '); } utterance = buf.toString().trim(); if (!utterance.equals("")) { String[] tokens = utterance.split("\\s+"); for (String token : tokens) { languageInfo.tokens.add(LanguageAnalyzer.opts.lowerCaseTokens ? token.toLowerCase() : token); String lemma = token; if (token.endsWith("s") && token.length() > 1) lemma = token.substring(0, token.length() - 1); languageInfo.lemmaTokens.add(LanguageAnalyzer.opts.lowerCaseTokens ? lemma.toLowerCase() : lemma); // Is it a written out number? int x = Arrays.asList(numbers).indexOf(token); if (x != -1) { languageInfo.posTags.add("CD"); languageInfo.nerTags.add("NUMBER"); languageInfo.nerValues.add(x + ""); continue; } try { Double.parseDouble(token); languageInfo.posTags.add("CD"); languageInfo.nerTags.add("NUMBER"); languageInfo.nerValues.add(token); } catch (NumberFormatException e) { // Guess that capitalized nouns are proper if (Character.isUpperCase(token.charAt(0))) languageInfo.posTags.add("NNP"); else if (token.equals("'") || token.equals("\"") || token.equals("''") || token.equals("``")) languageInfo.posTags.add("''"); else languageInfo.posTags.add("UNK"); languageInfo.nerTags.add("UNK"); languageInfo.nerValues.add("UNK"); } } } return languageInfo; } }
Q: Running two parallel custom receiver streams in local setup with Spark streaming for local test I am currently learning how to use Spark streaming and would like to do some experiments with joining parallel streams. For this purpose I would like to setup two parallel streams with custom Receiver classes just generating random numbers. So far I got everything setup. However there seems to be a problem with running two custom receivers instances of the same receiver class on one Spark context. When I run only one everything works perfectly. As soon as I wire in the second one there seems to be some infinite loop error. The symptom is that I do not get any output anymore. For better understanding I put a simple example showing the problem on github If you clone the project everything should work fine. Just uncomment line 18 in Application.java and you should see that the output of the print call is gone. This is either a bug in Spark streaming or my understanding of how the library works is not good enough to use it properly. Either way I hope there are some experts here, who are able to help me with the issue. A: headdeask Luckily there is a "Related" feature in Stackoverflow. Just found my solution by looking over the "Related" threads. The accepted answer to the following thread also solves the problem described here. So the solution is, that in a local setup if you use the master URL "local[2]" you only get 2 worker threads. Both are used by the custom receivers in this setup. To get a third processing thread one needs to use the master URL "local[3]".
The Hoop-Dee-Doo Musical Revue is a fun, rollicking, Western themed vaudeville dinner show. It takes place in Pioneer Hall located in Fort Wilderness. (Since this resort restricts vehicular traffic, extra travel time is needed.) Pioneer Hall has the main floor and a balcony. Seating is pre-assigned. Dinner is served family style and includes a Dinner Salad, buckets of Barbecue Spare Ribs and Fried Chicken, Corn, Baked Beans, and Strawberry Shortcake. Unlimited Soft Drinks, Coffee, Tea, Milk, Beer, Wine and Sangria are included. Category 1 seating will be on the first floor closest to the stage Category 2 seating will be on the first floor behind the Category 1 section below the balcony, or the center of the balcony on the second level Category 3 seating will be on the right or left hand side of the balcony on the second level Guests requiring wheelchair access may only be seated in category 1. Categories 2 and 3 may require ascending a flight of stairs. This dinner show can be booked by calling 407-WDW-DINE. Hoop-Dee-Doo Musical Revue MENU NOTE: All menu items/prices are subject to change If you have menu discrepancies or corrections about Hoop-Dee-Doo Musical Revue, please let us know If there is an asterisk (*) below next to a menu item, this indicates that the meal is a buffet or that it's served family-style at your table. The price reflected is the total cost of the all-you-care-to-enjoy meal. Please note that the pricing on buffet meals will vary slightly based on the time of year (peak season versus regular season), and day of the week (weekday versus weekend) that you visit. The pricing below is a general range for these meals, but if you need an exact figure, you may call Disney Dining at (407) WDW-DINE and they will provide an exact quote based on the date of your reservation. All prices you see are subject to change and may vary slightly during your vacation.
<component name="libraryTable"> <library name="Maven: org.apache.maven.shared:maven-dependency-analyzer:1.11.1"> <CLASSES> <root url="jar://$MAVEN_REPOSITORY$/org/apache/maven/shared/maven-dependency-analyzer/1.11.1/maven-dependency-analyzer-1.11.1.jar!/" /> </CLASSES> <JAVADOC> <root url="jar://$MAVEN_REPOSITORY$/org/apache/maven/shared/maven-dependency-analyzer/1.11.1/maven-dependency-analyzer-1.11.1-javadoc.jar!/" /> </JAVADOC> <SOURCES> <root url="jar://$MAVEN_REPOSITORY$/org/apache/maven/shared/maven-dependency-analyzer/1.11.1/maven-dependency-analyzer-1.11.1-sources.jar!/" /> </SOURCES> </library> </component>
An Indiana church will close at the end of this year, which saw a large number of congregants walk out in January after forcing its gay choir director to resign. David Mantor, pastor of the First United Methodist Church in Alexandria, said attendance and donations had been spiraling downward for 30 years. “This is a problem that’s going on everywhere, and that’s why we’re closing,” Mantor said. ADVERTISEMENT He insisted the Dec. 31 closure had nothing to do with Adam Fraley, who had attended the church for six years with his partner and was hired by the congregation to lead the choir. Congregants said Mantor was hired at the same time with the stipulation that he accept Fraley as a colleague, but they said he reneged after he took over as minister. David Steele, a former lay leader for the church, said Mantor asked him to resign, as well, after he asked the minister to reconsider his position on Fraley. Steele, who has not been back to the church he attended for 60 years since stepping down in January, said about 80 percent of the congregation had left the church following the ousters. Steele’s daughter, Danielle, said donations had plummeted because congregants left the church over Mantor’s anti-LGBT stance. ADVERTISEMENT “This church is closing precisely because of David Mantor, precisely because of the issues surrounding gay rights in the church,” Danielle Steele told The Raw Story. United Methodist Church law allows LGBT people to attend church services but says “self-avowed, practicing homosexuals are not to be certified as candidates, ordained as ministers, or appointed to serve.” A spokesperson for the Indiana Conference of the United Methodist Church said LGBT people were prohibited from being ordained as ministers, but church leadership was authorized to make decisions on other roles. ADVERTISEMENT Steele said the church’s congregation included up to 700 people when his father, Clayton Steele, was minister. The church was founded in the late 1800s, and its current location was built in 1901 and renovated in 2002. ADVERTISEMENT Updated Dec. 18 at 9:16 a.m.: Clarified details about Fraley’s removal as choir director and added comments from Danielle Steele.
export declare class LayoutModule { } export { BreakpointObserver, BreakpointState } from './breakpoints-observer'; export { Breakpoints } from './breakpoints'; export { MediaMatcher } from './media-matcher';
The present invention relates to compensated crystalline superlattice ferrimagnets. The ferrimagnets include multiple crystalline ferromagnetic layers in combination with crystalline antiferromagnetically coupled layers. The superlattice ferrimagnets may be used in such applications as thermally assisted magnetic data storage disks and the like. Ferrimagnets are magnetic materials in which the magnetic spins of one class of atoms are opposed to the magnetic spins of another class of atoms within the same material. Compensated ferrimagnets have the additional feature that there exists a temperature for which the spins on the two classes of atoms cancel. An example is the amorphous rare-earth transition metal alloys used in magneto-optical disks. Compensated ferrimagnets have the useful property that their magnetizations vary from zero at the compensation temperature to large values at temperatures remote from the compensation temperature. This leads to large variations in coercivity, which varies inversely with magnetization. These variations can be exploited for various applications such as magneto-optical disks. Ferrimagnets have been proposed for use as data storage or memory layers in thermally assisted magnetic recording systems. For example, U.S. Pat. No. 5,889,641 to Belser et al., which is incorporated herein by reference, discloses the use of a DyFeCo ferrimagnetic alloy as a data storage layer in a thermally assisted magnetic recording system. In some applications, crystalline materials are grown directly on the ferrimagnet, e.g., optically assisted magnetic recording (OAMR). This is difficult to accomplish with conventional amorphous ferrimagnet materials currently in use. Furthermore, amorphous ferrimagnetic materials based on rare earth-transition metal alloys are susceptible to environmental corrosion due to the high chemical reactivity of the rare earth components. OAMR and other applications, such as near-field optical recording and thermally assisted magnetic recording systems, require the recording head structure to be positioned in close proximity to the recording layer. This may preclude the use of a thick protective overcoat layer, thus rendering conventional RE-TM alloys susceptible to corrosion. Although some types of crystalline compensated ferrimagnets such as rare-earth transition metal compounds are known, they exhibit additional problems. First, the crystalline materials are difficult to make with traditional vacuum deposition techniques unless a post-anneal treatment is used, which can destroy many types of substrates. Second, their compensation temperatures are difficult to adjust because the crystalline compounds will typically only form at precise ratios of the constitutive elements. This results in very limited choices of compensation temperatures. Finally, many of the materials have a cubic crystal structure that yields a multi-directional magnetic anisotropy. This can be a disadvantage because uniaxial anisotropy is often desired. It is known that a superlattice consisting of one layer of Co alternating with two layers of Rh or Ir produces an antiferromagnet (R. H. Victora and J. M. MacLaren, J. Appl. Phys. 70, 5880, 1991). In this superlattice, antiferromagnetic coupling occurs within the Rh or Ir layers and appears to be independent of the ferromagnet material chosen, provided that the ferromagnet material has sufficient magnetic strength to polarize the Rh or Ir layers. The present invention has been developed in view of the foregoing. The present invention .provides compensated crystalline superlattice ferrimagnets which include different alternating ferromagnetic layers separated by antiferromagnetically coupled layers. If the ferromagnetic layers have different temperature dependence of the magnetization, then a compensation point may be provided. For example, the structure may consist of the following repeating structure: A/B/B/C/BIB; where A and C are ferromagnetic layers and B represents antiferromagnetically coupled layers. The ferromagnetic A and C layers may comprise metals or alloys such as Ni, Co or Fe, while the antiferromagnetically coupled B layers may comprise metals or alloys such as Rh, Ir, Cr, Ru, Os, W, Mn and the like. Each of the layers need not be a single element but rather may comprise alloys of different metals. The thickness of each B layer may be one monolayer, and the thickness of each A and C layer may be selected to yield a compensation point at the desired temperature. For example, the A layer(s) may be chosen to be a trilayer of Ni, while the C layer(s) may be a monolayer of Co. Fine-tuning may be accomplished by adding a dopant to change Curie temperatures or magnetizations. The present superlattice structures provide advantages in comparison with other crystalline materials. The superlattice materials can be easily deposited without post-anneal treatments. For example, sputtering techniques using a rotating substrate may be used to control the thickness and dopants of the ferromagnetic layers in order to obtain the desired compensation temperature. Furthermore, the present materials may exhibit uniaxial anisotropy. An aspect of the present invention is to provide a compensated crystalline superlattice ferrimagnet comprising a first ferromagnetic layer, a second ferromagnetic layer having a different magnetic disordering temperature than the first ferromagnetic layer, and antiferromagnetically coupled layers between the first and second ferromagnetic layers. Another aspect of the present invention is to provide a method of making a compensated crystalline superlattice ferrimagnet. The method comprises depositing a first ferromagnetic layer on a substrate, depositing antiferromagnetically coupled layers on the first ferromagnetic layer, and depositing a second ferromagnetic layer on the antiferromagnetically coupled layers. A further aspect of the present invention is to provide a thermally assisted magnetic recording media comprising a substrate, a memory layer deposited on the substrate, and a copy layer deposited on the memory layer. The memory layer . comprises a compensated crystalline superlattice ferrimagnet including a first ferromagnetic layer, a second ferromagnetic layer having a different magnetic disordering temperature than the first ferromagnetic layer, and antiferromagnetically coupled layers between the first and second ferromagnetic layers. These and other aspects of the present invention will be more apparent from the following description.
The death of if/else cascades, a lightweight alternative - kyleburton http://leftrightfold.com/?p=85 ====== DrJokepu Forgive my ignorance but how is this different from a switch statement? Besides the slightly different syntax, of course. Many modern languages interpret switch statements as lookup tables. And that in compiled languages the lookup table is generated at compile time and this approach generates the lookup table at runtime, possibly wasting expensive CPU cycles. Basically we're dealing here with a special set of condition-action pairs. The property that makes them special is that the conditions are mutually exclusive, that is, the order of condition checks is not important. Of course, most of the time, non-exclusive conditions can be restructured to exclusive conditions as long as the conditions checks themselves don't have side effects (that it, they don't modify the state). This is a solved problem in software construction. For binary conditions, you use if statements (or the equivalent in Your Favourite Language), for simple multiple conditions, you use a switch statement and for complex state-condition check you create a class/closure that takes the state and determines if the condition evaluates to true and then another function executes the action and then you loop through the condition checkers. We're talking about concepts that have been around for almost half a century. There's no need to reinvent the wheel. Instead, read some books and learn how developers solved these basic software construction problems in the past. The problem is, many developers are too smart for their own good. They come up with new "design patterns" while ignoring the mountains of experience and knowledge past programmers have built up. More often than not these "groundshaking new ideas" lead to huge pains one way or other later down the codebase lifecycle. This is why C++ is so hard; you can come up with many "innovative" ways to do stuff only to discover a year later that your "innovation" made your codebase completely unmaintainable. Don't get me wrong, innovation is really cool and I support it but it doesn't hurt to consult the existing knowledge (either by research or asking more experienced developers) before going down your path. ~~~ nostrademons Dispatch tables give you some additional flexibility. For example, say that you want to wrap each function with some statistic-gathering in debug mode. You could implement this easily with: if(DEBUG) { for(var key in actions) { actions[key] = wrapDebug(key, actions[key]); } } In a switch or nested if-else, you would need to include that debug processing inline with each alternative, instead of factoring it out into its own closure-generating function. Similarly, compilers often use this approach for instruction generation. The set of available machine instructions is stored as a table; if you move to a different architecture, you just replace the table with one appropriate to the new architecture. This is not a new idea. SICP has a whole section on data-directed programming, and MapReduce and many other internal bits of Google infrastructure use this extensively. ~~~ DrJokepu Compilers are special because their input/output data is code and instructions. However the code of the compiler itself is clearly separated from the code the compiler emits. When the compiler uses the lookup table to look up the code to emit it really looks up data for output and not code to be executed (right away). ------ iamaleksey This is much better handled in languages with pattern matching. And you can match on arbitrary fields. Erlang: surf(Channels) -> lists:foreach(fun process/1, Channels). process(#channel{genre = "football"} = Channel) -> record(Channel); process(#channel{genre = "comedy", repeat = false} = Channel) -> record(Channel); process(#channel{genre = "crime", show_title = "Cops"}) -> skip; process(#channel{genre = "crime"} = Channel) -> record(Channel); process(_) -> skip. Full gist: <http://gist.github.com/250304> ~~~ daleharvey the problem with pattern matching is that its hard to dynamically change the dispatch table, in javascript I can just do dispatch_table[newthing].handler = function() ..... ~~~ silentbicycle You can change the clause database in Prolog by asserta/assertz/retract, but that runs headfirst into the typical trade-offs involving mutable state, as does your Javascript example. Erlang also lets you change patterns by hot- loading code, but its design goes to great pains to do so with reasonable safety. Also, pattern matching doesn't require all of the variables to be bound. A pattern may specify some values but just partially specify (a list with at least one remaining value) or constrain (any positive integer) others. This makes it vastly more flexible than just dispatching based on one value. ~~~ daleharvey certainly, I am an erlang programmer and do love pattern matching, but as much as I pretend to hate javascript, I do love that modules/namespaces whatever are a first class citizen in a way they certainly arent with erlang, (they are at the vm level, but not so much the language, smerl is quite handy for that). I should probably play with match specs more often ------ barrkel Two points. First, there's the distinction between essential complexity and non-essential complexity. What the OP is talking about is trying to reduce the non-essential complexity by using a more appropriate abstraction. Nested if-then-else can introduce non-essential complexity merely by having dead nested cases which are actually obviated by outer cases; looking at a complex version of this code, it can become quite difficult to see where exactly the code is supposed to flow under what circumstances, as there can seem to be conflicting assumptions in different areas. Secondly, once upon a time I invented a scheme to solve this problem in the best way I thought possible, and called it "matrix inheritance". The problem with inheritance and subclassing is that it only handles a single dimension of customization. Suppose you have two dimensions, genre and type, such as [comedy, drama] and [movie, series]. If you were to try and classify any given thing under a classical type breakdown, you could subclass by one axes or the other, but you would need to duplicate subclassing for the remaining axes. So, you could end up with Programme, Comedy <: Programme, Drama <: Programme, but then you'd need ComedyMovie, ComedySeries, DramaMovie, DramaSeries, duplicating the kind axis in the two different branches. The matrix inheritance concept basically takes the cartesian product of all option axes, essentially modelling it as an n-dimensional space, and then applies behaviour to sub-spaces of this space. So, you could apply conditions to [drama, _] and [_ , series], with these two representing slices of the example 2-dimensional space described above. The advantage of modelling things this way is that it is declarative: you can analyse overlaps and identify un- covered space. ~~~ sjs Have you seen Subtext? It's an interesting semi-visual language from Jonathan Edwards at MIT. [1] <http://en.wikipedia.org/wiki/Subtext_programming_language> [2] <http://subtextual.org/subtext2.html> (demo) These days the idea is developed under the name Coherence. Jonathan recently released another paper on the subject at OOPSLA. [3] <http://coherence-lang.org/> ~~~ scrod Thank you for posting this! I'd seen this system a while ago and have been wishing I'd bookmarked it ever since! ------ amix This is a common practice in Python and most of the implementations I have seen (and used) use it in a following way: handler = { 'football': handle_football, 'comedy': handle_comedy, 'crime': hendle_crime }.get handler('crime')(...) ~~~ domnit As a dynamic language, Python already has similar tables built in. You can use something like: getattr(self, 'handle_%s' % action) ~~~ kyleburton If action comes from outside the program, this can open up unexpected behavior. The dispatch table is closed - there's less chance that user input will invoke something unintended. ~~~ domnit In a real world program you would validate input and make sure you get something callable (with either technique). The only additional unexpected behavior is when there could be unexpected handle_xxx attributes. If we take for granted that the programmer defines the dict for the explicit dispatch table, though, we can also assume that the programmer defines the object for the implicit table. ~~~ eru I feel the version from the original comment is most Pythonic. The other version is close to an eval-function, which seems to be frowned up on in Python. ~~~ cma The second version is slower too. Here's what I use for e.g. a state machine, which follows "don't repeat yourself" a little better than the first example: # {state_name: state_action} states = {} state = ['start'] def reg(func): states[func.__name__] = func return func # define and simultaneously register the states @reg def start(): state[0] = 'second' @reg def second(): state[0] = 'last' @reg def last(): state[0] = None # run the state machine while state[0]: print state[0] states[state[0]]() ~~~ eru Is the second version slower because the string won't get intern-ed? ~~~ cma Yeah, and the string must be reinterpolated every time (possibly barring some of the more exotic python implementations). ------ thaumaturgy I must be turning into a cranky oldpants programmer. As I see it, this eliminates a large block of logic, but it doesn't actually make the program less complex. That is, the program is still making the same decisions, and you still have the same amount of fragmented business logic handling all of your special cases; it's just no longer dropping into those special cases by way of a monolithic if/else statement. On the other hand, this is potentially adding a dangerous bug in the program; if your dispatch table gets corrupted for some reason, or an OBO gets introduced (that _never_ happens!), you could end up trying to jump to a random pointer address. EDIT: Higher level languages, like Javascript, will handle it somewhat more gracefully of course. But, it would still cause an error of some kind. ~~~ fragmede Cranky pants. :) How would the dispatch table get corrupted? If the dispatch table is compiled down into an executable in exactly the same manner an if/else would be, then I can't think of a reasonable corruption vector that would corrupt a compiled-in dispatch table, but not a similarly compiled-in if/else block of code. As for an off-by-one, that /never/ happens in an if-else block either, and as long as you do bounds checking, you might call the wrong function, but that's not a 'random pointer address'. You have a very good point that this technique doesn't actually lessen program complexity. It does, however, help the fragmented business logic into tables that are more easily dealt with when the business end changes. The 'error of some kind' is just as much an error as a missing 'else' in a long if/else if/else if block or a 'default' section in a switch. ~~~ swolchok > How would the dispatch table get corrupted? If the dispatch table is > compiled down into an executable in exactly the same manner an if/else would > be, then I can't think of a reasonable corruption vector that would corrupt > a compiled-in dispatch table, but not a similarly compiled-in if/else block > of code. Without doing any actual experiments and assuming native code, the dispatch table is liable to go into the .data section of the binary with the rest of the globals/statics, which should be read/write (if you're lucky, you made it const and it's in .rdata which is read-only). An unmitigated buffer overflow in a different item in .data is liable to corrupt the table. Typically, the .text section (the program code) is not writable. ------ domnit Schematic tables [<http://subtextual.org/OOPSLA07.pdf>] are an extension of this idea that can handle arbitrarily complex conditionals. Unfortunately, they only work in Subtext [<http://subtextual.org/>], an unreleased research language. Schematic tables take advantage of the 2-dimensional visual layout of Subtext (as opposed to linear text, like most languages); it would be very interesting to see something similar in text. ------ randallsquared > New behavior can be injected without changing any core code. While it probably is easier to change the dispatching part of this code now, I'd hesitate to call the dispatching part the "core" code; it seems like the functions that actually do the work have a better claim to that, so what this does is to move the core code away from the calling location, and removes the name, so the core code has to be found by tracing or simulation, rather than by reading. Of course, a comment pointing at the file and line of the actions table would be nice, but might get out of date, and since the table is passed rather than global, at some point there's going to be more than one actions table that do other things as well... This code will be a nightmare to debug when there's a few thousand lines of similar redirections. :/ ~~~ Deestan > This code will be a nightmare to debug when there's a few thousand lines of > similar redirections. :/ It is. The SConstruct build tool is a prime example of this technique being used so much that it hampers debugging. Using this pattern successfully requires hard discipline; you have to concentrate to keep your code readable. ------ DannoHung This technique is ancient for anyone that has an associative array and function objects. ~~~ rbanffy The design patter of one is the syntax of another. ------ zaphar Erlangs pattern matching is a superior form of this concept. Clojures multimethods also implement a similar style to erlangs pattern matching dispatch. Both of those avoid some of the objections described in other comments here. The code is still in core and is easier to read than a dispatch table. ------ xtho Instead of mimicing method dispatch, shouldn't this be handled by a factory that returns an appropriate action object? Okay, the author writes: > Skeptics may say, that problem has been solved in the Object Oriented world > by [...] Wow, that is a lot of work, and think about the number of classes > and lines of code you will end up with! First, you don't have classes in a prototype-based language. Secondly, do it right or don't do it at all. ------ Nycto This looks like a functional (The paradigm, not the adjective) version of the Visitor pattern: <http://en.wikipedia.org/wiki/Visitor_pattern> ------ clistctrl So this strikes me as a fairly common problem. If I was going to solve it I don't think i would use a "dispatch table" I wold prefer to use polymorphism. In C# maybe i would have an interface with the common method. An abstract class to provide a default implementation. Then several classes which either implement the interface directory, or inherit the abstract class. ------ clistctrl if/else cascades will live as long as long as junior developers themselves. Jeez some of the code I've personally written when I was younger...