text stringlengths 8 5.77M |
|---|
Q:
How to - Flex client side and Java as Server side
Since I'm developing a multiplayer card game for Facebook using Flex as client side and Java SE as server side, I wanted to know how do I actually make the connection between Flex and Java? the server and client should be able to send each other data(cards,movement,room information etc...) across and I wonder what's the easiest way to do it without complicating it.
Any idea how to do? where to read about it ? I know JAVA but I find JavaEE hard to understand.
Any help will be appreciated, thanks.
A:
You can pay Adobe a lot of money and use their enterprise products.
Alternatively, you can use the open source BlazeDS, which allows you to communicate with plain text (direct HTTP) or using the binary AMF protocol with object serialization.
Also, if you are thinking about using JSON, as3corelib will help you on the Flex side.
|
Studies of the p53 gene mutation in Saudi non-Hodgkin's lymphoma.
Tumor biopsies (paraffin embedded tissue) obtained from 45 Saudi patients with non-Hodgkin's lymphoma (NHL) were examined for the incidence of p53 mutations screened by polymerase chain reaction (PCR) and single strand conformation polymorphism (SSCP) analysis. DNA sequencing was carried out to confirm the occurrence of p53 mutation in PCR products showing abnormal migration by SSCP analysis. Only 1/45 samples showed the incidence of a homozygous mutation at codon 179 (exon 5) of the p53 gene that replaces histidine with tyrosine. The data showed that the frequency of p53 mutations was very low in Saudi NHL. Our results are consistent with the general observation that the p53 mutation is rather infrequent in hematopoietic malignancies like NHLs. |
sort
What ever you do stay away from this one people. I WARNED YOU!
For those who want to watch this for the ecchi you will be greatly disappointed. All you get is a perverted retard and a selfish bitch that beats the shit out of him because of her legs being humped.
Story: Well there is no story. Its more like episodic with a short story somewhere hidden away.
Animation: Not a lot of ecchi hardly any from what i seen. I think there all in the beginning though.
Sound: Music felt kinda appropriate; matched the mood. Wait was there music?
Characters: NO ONE LIKES TO SEE A... See full review
Theres no point in watching this unless you just wanna get a on/off bonner; this is NOT fap material. Don't watch it Just don't. This Anime kinda feels like NTR because someone else sucks your "Maria's Soma" (Maria = God-Mother?) - (Soma = Milk) and rapes them.This anime is pretty much all about breasts which is little retarded and a little sexist to thee womens. (That's all there good for there milk).
The ecchi is excellent if you like bouncing boobs and some panty shots or someone sucking and licking tities and fingering it. Theres also a SEXY sadistic loli girl that does BDSM to a lesbian... See full review
DON'T WATCH IF YOU HAVE A WEAK HEART. YOU HAVE BEEN WARNED.
*SPOILER ALERT*
I wanted that Ito person to die and well... my wish came true, but I never thought there would be more "killings". The ending was a... MINDF*CK. (I love it)
IDC if some guy is a womanizer, I like it, but having someone this stupid is so asking for death. Stab, Stab, Stab, Stab, Stab, Stab, Stab. This is what I would do if I was her. XD
For some reason I felt satisfy when Sekai got killed because she was the one that could've avoided all this, but nope. "Stab" "falls to... See full review
4/10 story
6/10 animation
8/10 sound
1/10 characters
4.5/10 overall
What is anime-planet?
Founded in 2001 as the first anime & manga recommendation database.
Create lists for what you've seen & read, watch over 40,000 legal streaming episodes online via
Crunchyroll, Hulu & Viki, and meet other anime fans just like you. |
Q:
A variable becomes undefined after referencing it in a defun
Hello good people of stackoverflow, I am having a weird problem while following Adam Peterson's Lisp for the Web tutorial. The problem in question is probably a problem with Clozure CL, however I just wanted to provide some background.
What's happening is simple. I declare the variable *games* by doing (defvar *games* '()). When I declare a function that references this variable, such as game-from-name, the compiler just yells at me undeclared free variable *games*.
Does anyone know why this is happening?
A:
You could be executing in a different package. Try examining the value of the *in-package* variable at the points where you define and access the variable to check which package is current. You use the in-package macro to set the current package.
|
More than a dozen of Mexico’s worst drug lords have been captured or killed during this administration
HOWEVER unruly Mexico’s teachers are, none has had a more chequered career than Servando Gómez Martínez, “La Tuta” or “El Profe”, a former primary-school teacher who became head of the Knights Templar, one of Mexico’s most ruthless drug gangs. Federal police captured Gómez on February 27th, ending one of the biggest manhunts conducted under the presidency of Enrique Peña Nieto.
The drug lord’s only consolation is that five days later security forces also seized Omar Treviño Morales, the head of his gang’s biggest rival, the Zetas, in an uptown suburb of Monterrey, in northern Mexico. Treviño, aka Z-42, is believed to have taken over the Zetas after his brother, Miguel, was captured in 2013.
More than a dozen of Mexico’s worst drug lords have been captured or killed during Mr Peña’s 27-month tenure, and almost all the famous ones are now behind bars. Though the subsequent splintering of their gangs does not necessarily reduce crime, violence or the flow of drugs, analysts say the arrests send a strong message against impunity.
Gómez’s arrest is particularly significant. His reign of terror in the south-western state of Michoacán was one of Peña Nieto’s biggest security problems. A master of political extortion and public relations, he acted for years as a spokesman for drug lords in Michoacán, saying they were fighting a war to rid the state of the heinous Zetas, only to adopt the same brutality themselves.
Mexico Drug Lord “La Tuta” Captured by Federal Police (Photo: Google)
Guillermo Valdés, a former head of Mexican intelligence, says “La Tuta” combined guerrilla tactics with the “law of lead or silver” against Michoacán’s politicians: those who denied him access to their coffers were murdered. In 2014 videos emerged of him with the son of a recent governor and with an interim governor. Mr Gómez is now in the high-security Altiplano prison, where fellow drug lords recently complained of worm-infested food.
The arrests are good news for President Peña Nieto, who has been on the defensive ever since September, when 43 students disappeared in Iguala in southern Mexico. He promised to make security a higher priority.
On the day of La Tuta’s capture he moved the attorney-general, Jesús Murrillo Karam, to another ministry. He is the only senior official to pay a price for the bungled handling of the case. It continues to haunt Peña Nieto. |
UNPUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 13-4664
UNITED STATES OF AMERICA,
Plaintiff - Appellee,
v.
SANTOS ANIBAL CABALLERO FERNANDEZ, a/k/a Garra,
Defendant - Appellant.
Appeal from the United States District Court for the Western
District of North Carolina, at Charlotte. Robert J. Conrad,
Jr., District Judge. (3:08-cr-00134-RJC-DSC-23)
Submitted: July 29, 2014 Decided: August 8, 2014
Before TRAXLER, Chief Judge, and DIAZ and THACKER, Circuit
Judges.
Affirmed by unpublished per curiam opinion.
David Q. Burgess, LAW OFFICE OF DAVID Q. BURGESS, Charlotte,
North Carolina, for Appellant. Anne M. Tompkins, United States
Attorney, Amy E. Ray, Assistant United States Attorney,
Asheville, North Carolina, for Appellee.
Unpublished opinions are not binding precedent in this circuit.
PER CURIAM:
Santos Anibal Caballero Fernandez (“Caballero
Fernandez”) appeals the sentence imposed following the reversal
of one conviction and the remand for resentencing on his
remaining convictions. For the reasons that follow, we affirm.
A federal grand jury charged Caballero Fernandez and
twenty-five other members of the worldwide street gang MS-13
with various gang-related crimes. In Caballero Fernandez’s
case, a jury convicted him of conspiracy to commit racketeering,
in violation of 18 U.S.C. § 1962(d) (2012) (Count One),
possession of a firearm by an illegal alien and aiding and
abetting the same, in violation of 18 U.S.C. §§ 922(g)(5), 2
(2012) (Count Eight), and accessory after the fact to murder in
aid of racketeering, in violation of 18 U.S.C. §§ 3, 1959 (2012)
(Count Fifty-Three). On appeal, we affirmed Caballero
Fernandez’s conspiracy to commit racketeering conviction,
reversed his accessory-after-the-fact-to-murder conviction on
the ground that the evidence was insufficient to show that
Caballero Fernandez knew the victim was dead or dying during the
relevant time period, and remanded for resentencing.
At the resentencing hearing, after determining that
there were no objections, the court adopted the Guidelines
calculations in the supplemental presentence report (“PSR”),
which established a Guidelines range of seventy to eighty-seven
2
months’ imprisonment. Defense counsel argued for a sentence
within this range, noting that the original sentence had been
within the original 135 to 168 month Guidelines range. After
listening to the parties’ arguments and Caballero Fernandez’s
allocution, the district court imposed an upward variance
sentence of 135 months on the conspiracy to commit racketeering
conviction (Count One) and a concurrent 120 months (the
statutory maximum) on the firearm conviction (Count Eight).
In this appeal, Caballero Fernandez challenges the
district court’s finding, for sentencing purposes, that he aided
and abetted the murder that was the subject of his reversed
accessory-after-the-fact conviction and the substantive
reasonableness of the upward variance. We review a sentence for
procedural and substantive reasonableness under an abuse of
discretion standard. Gall v. United States, 552 U.S. 38, 51
(2007). The same standard applies whether the sentence is
“inside, just outside, or significantly outside the Guidelines
range.” United States v. Rivera-Santana, 668 F.3d 95, 100-01
(4th Cir.) (internal citation and quotation marks omitted),
cert. denied, 133 S. Ct. 274 (2012). In determining procedural
reasonableness, we consider whether the district court properly
calculated the defendant’s advisory Guidelines range, gave the
parties an opportunity to argue for an appropriate sentence,
considered the 18 U.S.C. § 3553(a) (2012) factors, selected a
3
sentence supported by the facts, and sufficiently explained the
selected sentence. Gall, 552 U.S. at 49-51.
If the sentence is free of procedural error, we review
it for substantive reasonableness. Id. at 51. “Substantive
reasonableness examines the totality of the circumstances to see
whether the sentencing court abused its discretion in concluding
that the sentence it chose satisfied the standards set forth in
§ 3553(a).” United States v. Mendoza-Mendoza, 597 F.3d 212, 216
(4th Cir. 2010). In reviewing any sentence outside the
Guidelines range, we give due deference to the sentencing
court’s decision because it “has flexibility in fashioning a
sentence outside of the Guidelines range,” and need only “‘set
forth enough to satisfy the appellate court that [it] has
considered the parties’ arguments and has a reasoned basis’” for
its decision. United States v. Diosdado-Star, 630 F.3d 359, 364
(4th Cir. 2011) (quoting Rita v. United States, 551 U.S. 338,
356 (2007) (alteration in original)).
The district court imposed an upward variance sentence
based in part on its finding that Caballero Fernandez was
involved in the murder of Ulisses Mayo. Caballero Fernandez
challenges that finding, emphasizing that Mayo’s murder was the
subject of his reversed accessory-after-the-fact conviction. A
factual finding is clearly erroneous if “the reviewing court on
the entire evidence is left with the definite and firm
4
conviction that a mistake has been committed.” United States v.
Harvey, 532 F.3d 326, 336-37 (4th Cir. 2008) (internal quotation
marks omitted). “[A] sentencing court may consider uncharged
and acquitted conduct in determining a sentence, as long as that
conduct is proven by a preponderance of the evidence.” United
States v. Grubbs, 585 F.3d 793, 799 (4th Cir. 2009).
Our review of the record leads us to conclude that the
district court did not clearly err in finding by a preponderance
of the evidence that Caballero Fernandez aided and abetted the
murder. Furthermore, as relevant to Caballero Fernandez’s
history and characteristics and other § 3553(a) sentencing
factors, we conclude the district court did not err in
considering Caballero Fernandez’s involvement in the murder in
imposing the variance. United States v. Overstreet, 713 F.3d
627, 638 n.14 (11th Cir. 2013); see also United States v. Rhine,
637 F.3d 525, 528–29 (5th Cir. 2011) (holding that a district
court may consider criminal activity of a defendant that was not
relevant conduct as part of the history of the defendant), cert.
denied, 132 S. Ct. 1001 (2012).
Next, Caballero Fernandez challenges the extent of the
variance. When the district court imposes either a variance or
a departure sentence, this court “consider[s] whether the
sentencing court acted reasonably both with respect to its
decision to impose such a sentence and with respect to the
5
extent of the divergence from the sentencing range.” United
States v. Hernandez-Villanueva, 473 F.3d 118, 123 (4th Cir.
2007). A greater variance requires more substantial
justification. Diosdado-Star, 630 F.3d at 366. This Court will
affirm if the § 3553(a) factors, on the whole, justified the
sentence imposed. Id. at 366.
Here, in finding that a sentence consisting of 135
months on Count One and a concurrent 120 months (the statutory
maximum) on Count Eight was sufficient but not greater than
necessary to accomplish the § 3553(a) sentencing goals, the
district court took into account Caballero Fernandez’s prior
firearm offense, his membership and involvement in a violent
gang, his role in the first degree murder of Mayo (which the
district court found was part of the racketeering conspiracy for
which Caballero Fernandez was convicted), his intimidation of a
witness to that murder, and the fact that a month after the
murder Caballero Fernandez was found with gang members in a car
with several firearms including the murder weapon shortly after
a home invasion.
All of these considerations by the court speak
directly to several § 3553(a) factors. See 18 U.S.C.
§ 3553(a)(1) (“the nature and circumstances of the offense and
the history and characteristics of the defendant”); 18 U.S.C.
§ 3553(a)(2)(A) (the need for the sentence “to reflect the
6
seriousness of the offense, to promote respect for the law, and
to provide just punishment”); 18 U.S.C. § 3553(a)(2)(B) (the
need to deter criminal conduct); 18 U.S.C. § 3553(a)(2)(C) (the
need “to protect the public from further crimes of the
defendant”).
Given the district court’s consideration of the
parties’ arguments and the § 3553(a) sentencing factors, and its
articulation of reasons warranting an upward variance, we defer
to the district court’s determination as to the extent of the
variance. United States v. Hargrove, 701 F.3d 156, 163-64 (4th
Cir. 2012) (affirming variance from zero-to-six-month Guidelines
range to sixty-month sentence), cert. denied, 133 S. Ct. 1862
and cert. denied, 133 S. Ct. 2403 (2013); Diosdado-Star, 630
F.3d at 366-67 (affirming variance sentence six years greater
than Guidelines range because sentence was based on the district
court’s examination of relevant § 3553(a) factors); see also
United States v. Angle, 598 F.3d 352, 359 (7th Cir. 2010) (“All
that matters is that the sentence imposed be reasonable in
relation to the ‘package’ of reasons given by the court.”). We
conclude that the district court acted reasonably in imposing
Caballero Fernandez’s variance sentence.
Accordingly, we affirm Caballero Fernandez’s sentence.
We dispense with oral argument because the facts and legal
7
contentions are adequately presented in the materials before
this court and argument would not aid the decisional process.
AFFIRMED
8
|
Siena's recent positive form has seen them move up to 10th in the standings and coach Giuseppe Sannino will be hoping playmaker Franco Brienza and forward Mattia Destro can both light up the stage once again this week, as they have been pivotal to the Robur's cause in recent matches.
However, he may have to turn to veteran Erjon Bogdan as Destro's partner, as Emanuele Calaio has been ruled out for the rest of the season and Pablo Gonzalez is also injured. Defender Andrea Rossi is suspended, but left-back Cristiano Del Grosso should re-enter the fray after missing the 1-1 draw with Bologna in midweek.
Despite hope Thiago Silva could return, AC Milan remain without the talented centre-back who continues to nurse a muscle injury. Veteran Alessandro Nesta may rest after he has featured constantly in recent fixtures, so Philippe Mexes and Daniele Bonera could make up their defensive pairing.
Striker Alexandre Pato and combative midfielder Massimo Ambrosini are on the sidelines, but Kevin-Prince Boateng, who scored the winner versus Genoa on Wednesday, should start behind Zlatan Ibrahimovic and one of Stephan El Shaarawy or Antonio Cassano. A couple other attacking options, Clarence Seedorf and Robinho, have been left out of the match squad by coach Massimiliano Allegri.
DID YOU KNOW?
Siena have lost just two of their last 10 Serie A matches, winning six of those. They currently sit eight points above the relegation zone with four games remaining.
Destro has scored in five of his last six appearances for the Robur. The 21-year-old has 10 goals in 27 appearances this campaign.
The Tuscan club have not beaten Milan in league play since April 2005.
AC Milan have come out as the victors on the last six occasions they have faced Siena in Serie A.
Despite recent struggles on home soil, the Rossoneri have won five of their last six league matches on the road.
The Rossoneri have the best attack in Serie A (scoring 64 times) and Ibrahimovic is the top-scorer thus far this season (with 24 goals). |
Q:
Adding list or dictionary in a dictionary with multiple values for one key - Python
Very first Post here, apologies if it is not proper.
I have 2 Dictionaries with keys and lists as values. I need to assign a list to an element of the list in a dictionary where it matches in other Dictionary 2.
Dictionary 1
{'S': ['Close Coupled', 'Wall Hung', 'Btw'], 'E':['Bifold', 'Hinge', 'Sliding', 'Pivot']}
Dictionary 2
{'Close Coupled': ['Close Coupled Contract', 'Close Coupled Open Back', 'Close Coupled Open Back Rimless'], 'Wall Hung': ['Wall Hung Contract', 'Wall Hung Rimless'],'Btw': ['BTW Contract', 'BTW Rimless'], 'Bifold': ['700', '800', '900', '1000'], 'Hinge': ['700', '800', '900', '1000'], 'Sliding': ['700', '800', '900', '1000'], 'Pivot': ['700', '800', '900', '1000']}
Result I am trying to get is.
{'S': {'Close Coupled':['Close Coupled Contract', 'Close Coupled Open Back', 'Close Coupled Open Back Rimless'], 'Wall Hung': ['Wall Hung Contract', 'Wall Hung Rimless'], 'Btw': ['BTW Contract', 'BTW Rimless'], 'E': 'Bifold':['700', '800', '900', '1000'], 'Hinge':['700', '800', '900', '1000'],'Sliding':['700', '800', '900', '1000'], 'Pivot':['700', '800', '900', '1000']}
After his I have another dictionary which will be added same way. it is like a Tree structure or nested but I am unable to build up my logic to assign dictionary to each matching element of the list in 1st dictionary.
If it is not clear; please let me know I will try to explain it better.
Thank you
A:
I don't think I have understood your question correctly. However check this code and if it doesn't suit your need kindly let me know.
d1= {'S': ['Close Coupled', 'Wall Hung', 'Btw'], 'E':['Bifold', 'Hinge', 'Sliding', 'Pivot']}
d2= {'Close Coupled': ['Close Coupled Contract', 'Close Coupled Open Back', 'Close Coupled Open Back Rimless'], 'Wall Hung': ['Wall Hung Contract', 'Wall Hung Rimless'],'Btw': ['BTW Contract', 'BTW Rimless'], 'Bifold': ['700', '800', '900', '1000'], 'Hinge': ['700', '800', '900', '1000'], 'Sliding': ['700', '800', '900', '1000'], 'Pivot': ['700', '800', '900', '1000']}
final_dict= {} # create a dictionary to store the final answer
for item in d1:
temp= dict() # temporary dictionary
for i in item d1[item]:
temp[i]= d2[i]
final_dict[item]= temp
output
print(final_dict)
{'E': {'Bifold': ['700', '800', '900', '1000'],
'Hinge': ['700', '800', '900', '1000'],
'Pivot': ['700', '800', '900', '1000'],
'Sliding': ['700', '800', '900', '1000']},
'S': {'Btw': ['BTW Contract', 'BTW Rimless'],
'Close Coupled': ['Close Coupled Contract',
'Close Coupled Open Back',
'Close Coupled Open Back Rimless'],
'Wall Hung': ['Wall Hung Contract', 'Wall Hung Rimless']}} `
|
Utility and road crews report that those conditions could hamper their ability to treat roads and deal with power outages.
BGE reported as of 8:30 a.m. there were about 1,900 customers without power. The areas most impacted have been Prince George's, Anne Arundel and Baltimore counties.
BGE spokeswoman Rachael Lighty said BGE crews were out in the field throughout the night as the wind was picking up and they have additional crews available to deal with power restoration throughout the day. BGE has also been in contact with its mutual assistance network which allows them to bring in crews from other states if needed.
State Highway Administration spokesman Charlie Gischlar said around the metro area, the interstates are in fairly good condition, and in some cases, down to the bare pavement. But, secondary roads will likely continue to be a problem throughout the day.
"The problem is with high winds you go to an area where there are a lot of trees or an open space like farm field and that wind is going to take that snow and put it right back into the roadway making it very hazardous for motorists who get overconfident and take speeds way too fast," Gischlar said.
"You could be going down what appears to be bare pavement on the beltway then go to one of those areas where there is open space and you're right into snow again. Use a heightened sense of caution with the bitter cold temperatures because the ramps, bridges and overpasses freeze first."
Individual jurisdictions are also taking an aggressive approach to snow and ice removal.
Lauren Byrd with the Baltimore County operations center said 100 percent of the county roads have been salted, but many roads will likely need to be retreated as the high winds will cause snow drifts and re-cover the roads. She said there have also been reports of downed trees and limbs in roadways.
Also of concern, Byrd said, is the freezing temperatures as the salt used to treat the roads generally only works when temperatures reach 27 or above.
"We will have crews out re-salting all day hoping the traction will help [melt the ice]," Byrd said.
In Baltimore City, the Code Blue issued Thursday was extended to 10 a.m. Saturday. According to the Department of Health, Code Blue is a multi-agency coordinated approach to providing vulnerable populations in Baltimore City with relief from extreme cold weather. The program's goal is to reduce the number of hypothermia deaths and related illnesses in the city.
In addition, Baltimore Department of Transportation spokeswoman Kathy Chopper is urging residents to be patient as crews work to clear primary roads first before attacking many residential areas. However, she said most roads should at least be passable today.
"The city always addresses primary roadways first so emergency personnel and police can move around and get where they need to go," Chopper said. "Then we move into secondary and side streets."
Harford County officials reported that northern parts of the county were hit with 8 inches of snow.
Harford's Department of Public Works dispatched more than 130 personnel to help clear and treat roads. Crews began working Thursday afternoon and worked until approximately 10 p.m. Road crews resumed plowing and treating county roads at approximately 3 a.m. Friday. Although county roads are passable, drifting snow is a concern and could result in some roads being temporarily closed.
In all, Harford reported 23 accidents occurred throughout the county from 4 p.m. Thursday until 4 a.m. Friday morning with four resulting in personal injuries.
"Today one of our concerns is the subfreezing temperatures and wind chill," said Harford County Emergency Manager Rick Ayers in a statement. "Those who venture outdoors should dress for blizzard like conditions and stay hydrated. Due to icy conditions on our roads, those who do not have to travel should wait until conditions improve."
Copyright 2013 Scripps Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. |
==========================================================
Logging - ``kombu.log``
==========================================================
.. contents::
:local:
.. currentmodule:: kombu.log
.. automodule:: kombu.log
:members:
:undoc-members:
|
package com.lody.virtual.client.hook.proxies.content;
import com.lody.virtual.client.hook.base.BinderInvocationProxy;
import mirror.android.content.IContentService;
/**
* @author Lody
*
* @see IContentService
*/
public class ContentServiceStub extends BinderInvocationProxy {
public ContentServiceStub() {
super(IContentService.Stub.asInterface, "content");
}
}
|
Transition in the character of immunological memory in mice after immunization. I. Memory for IgM and IgG antibody responses.
The immunological memory in antibody response of mice to bovine serum albumin was investigated at the level of IgM and IgG antibody-forming cells, The antigen at a dose much lower than required for eliciting a detectable level of the primary antibody response could latently activate the immune machinery to an extent adquate for specific recall, whereas higher doses of antigen were effective in evoking strong anamnestic response. The potentiality to develop the anamnestic response was found even in the latent phase of the primary antibody response and was maintained for more than 2 months. The immunological memory acquired in an early phase after the primary immunization mainly involved IgM antibody response and late memory concerned IgG response. |
Q:
How do we need to apply the martingale convergence theorem here?
Let
$(E,\mathcal E,\mu)$ be a measure space
$E_0\in\mathcal E$ with $\mu(E_0)\in(0,\infty)$
$n\in\mathbb N$
$B_1,\ldots,B_n\subseteq\left.\mathcal E\right|_{E_0}:=\left\{B\cap E_0:B\in\mathcal E\right\}$ be disjoint with $$\biguplus_{i=1}^n=E_0\tag1$$
$f:E\to[0,\infty)$ be $\mathcal E$-measurable with $$c:=\int f\:{\rm d}\mu\in(0,\infty)$$ and $$\nu:=\frac1cf\mu$$
I would like to show that $$\frac1n\sum_{i=1}^n\frac1{\mu(B_i)}\int_{B_i}f\:{\rm d}\mu\xrightarrow{n\to\infty}\frac1{\mu(E_0)}\int_{E_0}f\:{\rm d}\mu.\tag2$$
As kimchi lover noted, there might be a probabilistic proof available utilizing the martingale convergence theorem. Obviously, $$\operatorname E_\nu\left[f\mid B\right]=\frac1{\mu(B_i)}\int_{B_i}f\:{\rm d}\mu\;\;\;\text{for all }B\in\mathcal E.\tag3$$ Now, I guess we consider the filtration $\mathcal F_1,\ldots,F_n$ where $\mathcal F_i$ is the $\sigma$-algebra on $E$ generated by $B_1\uplus\cdots\uplus B_i$. We should obtain $$\operatorname E_\nu\left[f\mid\mathcal F_j\right]=\operatorname E_\nu\left[f\mid B_i\right]\;\;\;\text{almost surely on}B_i\tag4$$ for all $1\le i\le j\le n$.
However, I'm still struggling how we can conclude.
A:
This is not true in general.
Notation: for each $n$, we make a partition $\{B_n^j\}_{j=1}^m $ of $E_0$ into $m$ cells, where $B_n^j$ is the jth cell in the nth partition.
Let $E_0=[0,1]$ and let $\mu$ be the Lebesgue measure on $\mathbb{R}$. Let $f$ be the indicator function for $[1/2,1]$ (or a smooth approximation thereof). At stage $n$, let $B_n^m = [1/2,1]$ and let $B_n^1$ through $B_n^{m-1}$ be some partition of $[0,1/2)$ where each cell has positive measure. Then, $\mu(E_0)^{-1} \int_{E_0} f d\mu = 1/2$, but $$\frac{1}{m} \sum_{j=1}^m \frac{1}{\mu(B_n^j)}\int_{B_n^j}fd\mu=\frac{1}{m}\frac{1}{\mu(B_n^m)}\int_{B_n^m}fd\mu=\frac{1}{m}\longrightarrow 0.$$
Addendum: of course, the reason why you might expect your statement to hold is our intuition from when we divide $E_0$ into cells which are all equal size. But in this case the result holds true at every stage (not just in the limit), since $\mu(B_n^j)=\frac{\mu(E_0)}{m}$ and a convenient cancellation occurs.
However! There is a very similar problem, basically the dual to your stated problem, where you can use martingale techniques. If you have a filtration of partitions (say, countable at each stage) that get coarser and coarser so that in in the limit the partition is just ${\{\emptyset,E_0\}}$, then the conditional expectations with respect to this filtration form a reverse martingale, and one can apply Lévy's Downwards Theorem (14.4 in Williams' Probability with Martingales) to show that this sequence of conditional expectations converges in the limit to the average on $E_0$ (pointwise almost surely - remember, the conditional expectation is understood as a random variable).
This is not precisely the analogue of your question, where you take an unweighted average of the conditional expectations in each cell, but it is nearby enough that I thought it would be worth mentioning.
|
Share this Article
Issue
Topics
With its long commitment to global and community health, it’s natural that HMS would be a wellspring of Albert Schweitzer Fellows. Schweitzer is often remembered as a Nobel Prize laureate who, late in life, dedicated himself to abolishing nuclear weapons. Decades earlier, however, he was renowned worldwide as a physician who delivered medical care in areas of Africa that were bereft of such care. In 1913, with his wife, Hélène, he established his eponymous hospital in Lambaréné, Gabon.
The hospital’s supporters have kept it functioning since Schweitzer’s death in 1965. The Fellowship has been integral to the facility’s survival.
The Lambaréné Schweitzer Fellowship Program, established in 1979, annually sends four senior medical students to the Albert Schweitzer Hospital for three-month rotations in pediatrics and internal medicine. It wasn’t until 1987 that a fellow was named from a U.S. medical school other than HMS.
As fellows, HMS students experience firsthand diseases they’ve only read about—malaria, schistosomiasis, and intestinal parasites—but also treat more familiar conditions such as gastroenteritis, otitis media, and anemia. In addition, they learn to work effectively within the limitations of medicine in a rural area in a developing nation.
Action Figure
Samuel Stanley
Before he left for Lambaréné, Samuel Stanley, Jr., ’80 told a reporter that he was looking forward to the opportunity to get actively involved in patient care rather than “being the fourth person to listen to someone’s heart.”
Little did he know how active that involvement would be: Stanley found himself in charge of the children’s hospital during his first two weeks in Gabon, filling in for the chief pediatrician who had returned home to Switzerland.
“It was an extraordinary amount of responsibility for a third-year medical student,” says Stanley, now president of Stony Brook University in New York and a professor of medicine in its medical school, “but it made me learn so much medicine rapidly.”
He remembers one incident. A child arrived with a swollen knee joint. Stanley performed several taps to obtain fluids for testing but drew only blood. He observed that the patient’s brother, who had accompanied the boy and their mother, had a bloody wad of cotton stuffed in his mouth where he’d lost a tooth. A light flipped on in Stanley’s brain.
“I hadn’t really thought about hemophilia because of its low incidence in Africa,” he says. “I realized I had to start relying on my observational and physical exam skills, especially because we didn’t have access to a lot of the standard laboratory tests.”
During his time in Gabon, Stanley developed an interest in infectious diseases, fueled in part by the high incidence of malaria he saw among children at the Schweitzer Hospital.
“I realized that although we had the tools to treat malaria and make the children better, that wasn’t enough,” he says. “More research was needed to create a malaria vaccine or to find other ways of eradicating the malaria parasite. I realized you could help an individual patient as a physician, but if you really wanted to get into the disease problem, you had to engage in research.” To that end, Stanley is currently part of a collaborative effort that has established a global health institute in Madagascar that will provide clinical assistance to the people of that island nation while also conducting health-related research worldwide.
A Nexus for Change
The entire three months that Ashaunta Anderson ’06 was in Gabon, she and her colleagues at the Schweitzer Hospital were assured that vaccines were “on the way.” Yet none appeared. Although Anderson had experience in clinical medicine and research—she’d spent the previous year at the National Institutes of Health—until the fellowship she hadn’t fully grasped how systems operate in delivering health care.
“I came to understand that health and health care delivery are much more than what we see happening in the clinic or the hospitals, or at the bench,” says Anderson, who divides her time between the University of California–Riverside School of Medicine, where she’s an assistant professor of pediatrics; the RAND Corporation, where she’s a health policy researcher; and the clinic. “I started to have a broader perspective that included public health, policy, and government systems. I became interested in the role those entities played, and how I might engage that broader perspective to try to help more people.”
Ashaunta Anderson
Anderson kept a blog during her time in Gabon, documenting routine clinic days. After having seen CPR poorly executed on multiple occasions, she gave presentations on proper CPR technique, as well as on how to identify and treat hyperbilirubinemia, to physicians and the women serving as nurses.
While the fellowship reinforced a sense of service in Anderson, it also taught her that she enjoys working with other mission-oriented people, helping underserved populations, and taking positions that might be considered risky. Those characteristics are now reflected in her work at UC Riverside, a young medical school in a high-needs area that also has a shortage of physicians. She’s still interested in health disparities and the social determinants of health, and, because education is one of the most consistent predictors of length and quality of life, she’s also zeroed in on school readiness as a way to affect health outcomes.
“I’ve gone a little further upstream with both school readiness and health outcomes to look at racial socialization,” she says, “which is the process by which children learn the meaning of race in society. My goal is to develop a program or an intervention that would help parents and community members properly teach racial socialization to children so they can have good outcomes in both school and health.”
That First Step
According to Louise King ’92, an HMS instructor in medicine at Brigham and Women’s Hospital, her time as a Schweitzer Fellow served as a “stepping-off point” for her life. She followed her three months in Lambaréné with three more in what was then Zaire, working alongside her uncle, a surgeon at The Good Shepherd Hospital in Tshikaji, before returning to Boston for six months of research, ultimately taking what would amount to a year’s leave from medical school.
“It gave me the confidence to look for opportunities,” she says, “and I realized the huge needs that are there.” Although King says that during her fellowship she learned firsthand about tropical diseases including Buruli ulcer, tuberculosis, and monkeypox, her time in Gabon also allowed her to consider the broader picture of health care.
“It made a big impression on me how different the medicine was there,” says King, “but it provided an important lesson on practicing medicine in a different culture.”
In addition to working at the hospital, King traveled off-site with the hospital’s nurses on vaccination campaigns, sometimes traveling by boat to reach patients. “It was a wonderful way to be exposed to community health delivery in the third world,” she says.
Today King lives in Rwanda with her husband, Caleb King ’88, and their children, seeing patients at Ruhengeri Hospital while also participating in teaching internal medicine to the hospital’s family medicine residents. Through the Division of Global Health Equity at Brigham and Women’s, King is working with the Rwanda Human Resources for Health program, an HMS-Rwanda partnership supported by a consortium of medical-related institutions, including Brigham and Women’s and Boston Children’s Hospital.
King’s clinical work at the Ruhengeri Hospital excites her because it’s providing her with an opportunity to manage a wide variety of diseases. Although she acknowledges there are some challenges to having sufficient knowledge to diagnose cardiac problems, examine peripheral blood smears, and treat rheumatoid arthritis, King also knows she is never more than a keystroke away from colleagues and specialists around the world.
A Life Altered
In the spring of 1982, Lachlan Forrow ’83 and his close friend and HMS classmate Bob Ely left the United States to go “to Africa to help poor people in need.” But a few weeks after their arrival, Ely drowned in a swimming accident, a tragedy that Forrow witnessed. Unsure of what he should do, Forrow contacted HMS advisors as well as friends and family; they all told him to pack up and come home.
So he stayed.
“I realized that if I went running home as soon as things got hard for me,” says Forrow, “I would have proved to myself that going to Africa had never truly been about helping other people.”
Forrow spent his remaining months in Lambaréné caring for patients and reflecting on “the concrete realities of human suffering.” He also found himself thinking about Schweitzer and the suffering he and Hélène had witnessed, and experienced, themselves.
Lachlan Forrow
“Schweitzer wrote about what he called ‘the Fellowship of those who bear the Mark of Pain,’ ” says Forrow. “The fact that sooner or later every one of us, and everyone we care about, experiences suffering is a very deep bond that connects us to each other. If we recognize that bond, maybe we can understand that this solidarity is a powerfully motivating moral basis for trying to help each other.”
Forrow, who is an associate professor of medicine at HMS, director of the Ethics Programs and of Palliative Care Programs at Beth Israel Deaconess Medical Center, and president emeritus of the Albert Schweitzer Fellowship, has shepherded the fellowship’s expansion to include the U.S. Schweitzer Fellowship programs. These programs, he says, expose “young health professionals to the suffering of people who have inadequate health care in ways that help them experience the fulfillment that comes from making a difference.”
Translational Medicine
While in Lambaréné, Clara Jones ’81 and her colleagues frequently had to choose a point in the long line of waiting patients. After that point, they would need to turn patients away, knowing that they probably had traveled far, on foot or by boat, to reach the medical center. Knowing, too, that many had been waiting all day. Jones recalls that some of the patients were there for treatment of chronic problems she had studied at HMS, such as hypertension, diabetes, and asthma. Others, however, would be diagnosed with advanced cases of cervical cancer or lymphoma, diseases that might have been prevented or treated earlier with proper screening. For Jones, witnessing what happens when people have limited access to health care has translated into a medical career focused on people in underserved urban areas.
Although Jones, like most of the Schweitzer Fellows, spoke some French before heading to Gabon, she used an interpreter while communicating with patients there, especially those who spoke only African languages. She knew it wasn’t a perfect solution. Jones would ask how long a patient’s problem had been active, for example, and after a lengthy, animated response, the interpreter would say: “Two years.”
“You knew you were missing something!” says Jones. “All of that information, and you don’t get it because you don’t understand the language.” Because medical records were sparse—just notes on oversized index cards—good communication with each patient was essential, especially for chronic concerns.
Achieving good patient-doctor communication has remained a concern for Jones in the years since her fellowship. As an assistant professor of public health and community medicine at the Tufts University School of Medicine and a former internist at the Dimock Center in Roxbury, Massachusetts, she’s met with many Spanish-speaking patients. Although she’s made a point of becoming semifluent in the language, when she conducts psychosocial interviews or wants to be sure a patient understands care details, she relies on an interpreter. Even so, she listens carefully. “There’ve been times I’ve said, ‘Tell her to take this medication twice a day,’ and the translator instead says twice a week. It highlights how important good communication is.”
Sarah Zobel is a health, education, and housing writer based in Vermont. |
"We are including at least one or two covert operations to hunt for empty waves with only our crew. We've commissioned the infamous Damian Davila to come down and document every single breathing bodyboard session that goes down," explains Manny Vargas. |
Q:
Custom ControllerFactory with autofac
First of all i am a newbie in asp mvc so please be patient.
Currently I want to create project where autofac will be IoC container i will reqister custom controller factory. In custom controller factory I want to set implementation Data Repository via constructor of controller.
I thought it should be done in that way:
ContainerBuilder builder = new ContainerBuilder();
builder.RegisterControllers(asm).InstancePerHttpRequest();
builder.Register(s => new ControllerFactory()).As<IControllerFactory>();
IContainer container = builder.Build();
DependencyResolver.SetResolver(new AutofacDependencyResolver(container));
My Controller factory code:
internal class ControllerFactory : DefaultControllerFactory
{
private readonly Dictionary<string, Func<RequestContext, IController>> _controllerMap;
public ControllerFactory()
{
List<IController> lstControllers = DependencyResolver.Current.GetServices<IController>().ToList();
_controllerMap = new Dictionary<string, Func<RequestContext, IController>>();
foreach (Controller contr in lstControllers)
{
string ctrName = contr.ControllerContext.RouteData.Values["Controller"].ToString();
_controllerMap.Add(ctrName, c => contr);
}
}
public override IController CreateController(RequestContext requestContext, string controllerName)
{
if (_controllerMap.ContainsKey(controllerName))
{
return _controllerMap[controllerName](requestContext);
}
else
throw new KeyNotFoundException(controllerName);
}
}
Controller map is empty. WHen i want to resolve IController i receive and error because IController is not reqiseter but i used RegisterControllers in autofac builder.
Could you explain me how to do it in the right way?
A:
Since you are resolving controllers through interfaces, use the AsImplementedInterfaces method to register the controllers.
builder.RegisterControllers(asm).AsImplementedInterfaces()
.InstancePerHttpRequest();
|
Jack Wolfskin Mens Apex Trail 3In1 Jacket
The Mens Apex Trail 3In1 Jacket from Jack Wolfskin is a classic 3-In-1 combo that teams a waterproof hardShell with a Fleece. It keeps you warm In Winter and ensures you stay dry, even In persistent raIn. The Jacket is also very breathable, so you get the feel-good wear climate you need durIng more energetic activity.The outer Jacket has a sLightly longer cut and delivers excellent protection from the raIn and Wind. In very Windy conditions the High collar can be adjusted to provide a snug fit. The Inner Jacket is made of warm 200 Fleece. Simply undo the system zip and you can wear each Jacket Individually. |
Q:
Converting a limit into an integral.
I have to convert this limit
$$ \lim_{n\to \infty} \left ( \frac{1}{\sqrt{n}\sqrt{n+1}} +\frac{1}{\sqrt{n}\sqrt{n+2}} + ... + \frac{1}{\sqrt{n}\sqrt{n+n}} \right )$$
The expression of limit of Riemann Sum that I know is
$$ \lim_{k\to \infty} \sum_{I=1}^{k} f \left (a + \frac{(b-a)}{k}i\right ) \frac{b-a}{k}$$
we can write our limit as
$$ \lim_{n\to \infty} \sum_{i=1}^{n} \frac{1}{\sqrt{n+i}} \frac{1}{\sqrt n}$$
By direct comparison we can say that $$ \frac{b-a}{k} \rightarrow \frac{1}{\sqrt n} \\
f\left (a+ \frac{(b-a)}{k}i \right) \rightarrow \frac{1}{\sqrt{n+i}}$$.
When $i=1$ we have $ f\left ( a + \frac{(b-a)}{k}\right) \rightarrow \frac{1}{\sqrt {n+1}}$. I can't seem to be getting $a$ and $b$. How can I proceed after this?
Please help me out here, also if there lies any mistake or if there are any other method then please write it.
EDIT:- When we write $$ \lim_{n\to \infty} \sum_{I=1}^{n} f \left(a+ \frac{(b-a)}{n} i \right) \frac{(b-a)}{n} = \int_{a}^{b} f(x) dx $$
I know that $\frac{b-a}{n}$ became $dx$ but what became the input $x$. Does the whole thing $a+ \frac{(b-a)}{n} i$ became $x$ or the $i$ which is varying became $x$.
The main source of my problem is that when @MarkViola wrote $$ f\left (a+ \frac{b-a}{n}i \right) \rightarrow \frac{1}{\sqrt{1+i/n}} \\ \implies f(x) = \frac{1}{\sqrt{1+x}}$$
I couldn’t understand that what is the input in $\frac{1}{\sqrt{1+i/}}$. I can see that the function is making everything into a square root and then reciprocating it but what is the input. Is the function replacing it’s input to $\frac{1}{\sqrt{1+i/n}}$ by the $i$ or the whole expression in the radical sign is the input
A:
Note that we can write
$$\sum_{i=1}^n \frac{1}{\sqrt n\sqrt{n+i}}=\frac1n\sum_{i=1}^n\frac1{\sqrt{1+\left(\frac in\right)}}\tag 1$$
For the integral $\int_a^b f(x)\,dx$, the Riemann sum is written
$$ \frac{b-a}n\sum_{i=1}^n f\left(a+\frac{(b-a)i}{n}\right)\tag2$$
Comparing $(1)$ to $(2)$ we see that we can set $a=0$, $b=1$, and $f(x)=\frac1{\sqrt{1+x}}$.
Can you finish now?
NOTE:
It is important to note that this is not the unique answer. We could, for example, have $a=1$, $b=2$, and $f(x)=\frac1{\sqrt x}$.
|
Related Stories
AUSTIN — Gov. Rick Perry on Monday said he was opposed to using the state's rainy day fund to help pay for services despite a looming budget shortfall that is estimated at $15 billion to $27 billion during the next two years.
“We will prioritize what's important in this state. We will fund those. And we will craft a budget that meets those revenue projections and not raise taxes nor get into the rainy day fund,” Perry said. “And that's been a consistent message for at least a year and a half.”
He disputed the idea of a shortfall when the next budget has yet to be written, noting that Texas' budget must balance: “We don't have shortfalls in Texas. ... You couldn't spend enough to make some of those groups happy.”
Perry's comments followed Texas Comptroller Susan Combs' presentation of a two-year revenue estimate that will be used to craft a budget for state government.
Rather than offer a shortfall prediction, Combs confined her official estimate to the amount of state general revenue that will be available for the budget. She initially put that estimate at $77.3 billion, but lowered it to $72.2 billion to cover a shortfall in tax collections in the current budget and an $800 million transfer to the rainy day fund.
State general revenue, which is the money over which lawmakers have discretion, is $80.6 billion in the current two-year budget. It rises to $87 billion when federal stimulus funds used to balance the budget two years ago are taken into account.
Most of the general revenue budget is spent on public and higher education and on health and human services.
Combs' estimate would result in a $15 billion budget gap if the Legislature attempts to keep spending at its current budgeted level. State leaders already have directed cuts in the current budget.
The Center for Public Policy Priorities, which focuses on low- and moderate-income Texans, said it will take at least $99 billion in general revenue in the next two years to maintain the current level of services, given the state's growing population and rising costs, including that of health care.
That would leave a shortfall of at least $26.8 billion, according to Combs estimate, said F. Scott McCown, the center's executive director.
“With a revenue shortfall this large, the Legislature cannot write a budget through cuts alone without doing terrible damage to Texans and to the Texas economy,” McCown said.
House Appropriations Committee Chairman Jim Pitts, R-Waxahachie, said a shortfall figure of at least $27 billion is “in the ballpark” when looking at the amount of money needed to provide the current level of services.
The initial House budget proposal that Pitts introduces will be written within available money, without using the rainy day fund or other additional revenue. Legislators will decide how to proceed from there, he said.
“We cut education. We cut higher ed. We cut public ed. We cut health and human (services)” in the initial proposal, Pitts said. “We're just showing the reality of it. ... There may be a group that thinks this bill is great. I don't know what to expect this next legislative session.”
State GOP leaders have ruled out new taxes, but some legislators have discussed the prospect of using at least part of the rainy day fund. A super-majority vote of legislators is required to spend money from the fund, which is projected to contain $9.4 billion in the next budget period.
Mike Walz, a spokesman for Lt. Gov. David Dewhurst, said that while the fund will not be used in the first Senate version of the budget, Dewhurst “expects both the Senate and the House to dip into the rainy day fund this session in order to fund our priorities and still save a portion to balance the budget again in 2013.”
He noted that Combs' estimate includes only a part of the budget cuts that state agencies are expected to make in the current budget period, and he said difficult times require spending to be reined in.
“They need to forget about current services. ... The opportunity is to reduce the footprint (of state government), to have a more effective state government that will be easier to fund in years to come,” Heflin said, “and if we don't take the opportunity of that, we'll have trouble years down the road, next time we have a little downturn in the economy.”
Rep. Jessica Farrar, D-Houston, said the cost of cuts must be considered.
“What does it cost when we don't repair a highway?” she asked. “When we have cuts to mental health care, what does that cost our criminal justice system?” |
Q:
Pure Speed for Lookup Single Value Type c#?
.NET 4.5.1
I have a "bunch" of Int16 values that fit in a range from -4 to 32760. The numbers in the range are not consecutive, but they are ordered from -4 to 32760. In other words, the numbers from 16-302 are not in the "bunch", but numbers 303-400 are in there, number 2102 is not there, etc.
What is the all-out fastest way to determine if a particular value (eg 18400) is in the "bunch"? Right now it is in an Int16[] and the Linq Contains method is used to determine if a value is in the array, but if anyone can say why/how a different structure would deliver a single value faster I would appreciate it. Speed is the key for this lookup (the "bunch" is a static property on a static class).
Sample code that works
Int16[] someShorts = new[] { (short)4 ,(short) 5 , (short)6};
var isInIt = someShorts.Contains( (short)4 );
I am not sure if that is the most performant thing that can be done.
Thanks.
A:
It sounds like you really want BitArray - just offset the value by 4 so you've got a range of [0, 32764] and you should be fine.
That will allocate an array which is effectively 4K in size (32764 / 8), with one bit per value in the array. It will handle finding the relevant element in the array, and applying bit masking. (I don't know whether it uses a byte[] internally or something else.)
This is a potentially less compact representation than storing ranges, but the only cost involved in getting/setting a bit will be computing an index (basically a shift), getting the relevant bit of memory to the CPU, and then bit masking. It takes 1/8th the size of a bool[], making your CPU cache usage more efficient.
Of course, if this is really a performance bottleneck for you, you should compare both this solution and a bool[] approach in your real application - microbenchmarks aren't nearly as important here as how your real app behaves.
A:
Make one bool for each possible value:
var isPresentItems = new bool[32760-(-4)+1];
Set the corresponding element to true if the given item is present in the set. Lookup is easy:
var isPresent = isPresentItems[myIndex];
Can't be done any faster. The bools will fit into L1 or L2 cache.
I advise against using BitArray because it stores multiple values per byte. This means that each access is slower. Bit-arithmetic is required.
And if you want insane speed, don't make LINQ call a delegate once for each item. LINQ is not the first choice for performance-critical code. Many indirections that stall the CPU.
|
Q:
Update not working with php mysql
I am trying to update the username column on my database. My table has two columns: username and phoneno. The code which I have done is:
<html>
<body>
<?php
if(isset($_POST['update']))
{
$dbname = 'test';
$dbhost = 'localhost';
$dbuser = 'root';
$dbpass = '';
$conn = mysqli_connect($dbhost, $dbuser, $dbpass, $dbname);
if(! $conn )
{
die('Could not connect: ' . mysql_error());
}
$new = $_POST['testing'];
$sql = "UPDATE test SET username = $new WHERE phoneno = 2000,196,200" ;
mysql_select_db('test');
$retval = mysqli_query( $sql, $conn );
if(! $retval )
{
die('Could not update data: ' . mysql_error());
}
echo "Updated data successfully\n";
mysql_close($conn);
}
else
{
?>
<form method="post">
<input type="text" name="testing">
</form>
</body>
</html>
But when I run this code it gives me this error:
Warning: mysqli_query() expects parameter 1 to be mysqli
I know it's due to the error in the query but I still didn't understand what the error means.
A:
You are using mysqli_* functions and selecting database via mysql_select_db. That is wrong. A connection string will look like.
$conn = mysqli_connect($dbhost, $dbuser, $dbpass, $dbname);
Missing quotes in your query condition.
$sql = "UPDATE test SET username = '$new' WHERE phoneno = '2000,196,200'";
mysqli_query needs connection string as the first parameter and query as the second one.
$retval = mysqli_query($conn, $sql);
|
Stephen McNeil defends his travel time as necessary for Nova Scotia
Nova Scotia Premier Stephen McNeil is defending the amount of international travel he took part in – 19 more days of travel abroad than any other Premier racked up – as being necessary to promote Nova Scotia’s interests in this interview with Global’s Marieke Walsh. |
392 F.2d 120
COMMONWEALTH OF PENNSYLVANIA, Attorney General of the Commonwealth of Pennsylvania, City of Philadelphia and Alan Levi Bond, by his mother, Mrs. Ruby Bond, Charles William Hicks and Theodore Lewis Hicks, by their mother, Mrs. Marie Hicks, James Scruggs and Henry Scruggs, by their mother, Mrs. Ardella Scruggs, Tyrone Karl White and Terry Sherwood White, by their mother, Mrs. Charlotte L. White, on behalf of themselves and all others similarly situated,v.Revelle W. BROWN et al., Trustees of the Estate of Stephen Girard, Appellants.
No. 16721.
United States Court of Appeals Third Circuit.
Argued November 28, 1967.
Decided March 7, 1968.
Certiorari Denied May 20, 1968.
See 88 S.Ct. 1811.
Ernest R. von Starck, Morgan, Lewis & Bockius, Gaffney & Gaffney, Philadelphia, Pa. (Arthur Littleton, John Russell, Jr., Richard P. Brown, Jr., Philadelphia, Pa., on the brief), for appellants.
William T. Coleman, Jr., Charles J. Biddle, Philadelphia, Pa. (Dilworth, Paxson, Kalish, Kohn & Levy, Robert W. Maris, Drinker, Biddle & Reath, J. Alan Kugle, Henry S. Hilles, Jr., Philadelphia, Pa., on the brief), for appelles other than the City of Philadelphia.
Matthew W. Bullock, Jr., Second Deputy City Solicitor, Edward G. Bauer, Jr., City Solicitor on the brief, for appellee, City of Philadelphia.
Before STALEY, Chief Judge, and McLAUGHLIN, KALODNER, SEITZ and VAN DUSEN, Circuit Judges.
OPINION OF THE COURT
GERALD McLAUGHLIN, Circuit Judge.
1
The problem here arises from the will of Stephen Girard, a Philadelphia, Pennsylvania resident who died in 1831. In his will, dated 1830, he laid lown his fundamental thesis that he had "been for a long time impressed with the importance of educating the poor, and of placing them by the early cultivation of their minds and the development of their moral principles, above the many temptations, to which, through poverty and ignorance they are exposed; * *." Continuing, he said "* * * I am particularly desirous to provide for such a number of poor male white orphan children, as can be trained in one institution, a better education as well as a more comfortable maintenance than they usually receive from the application of public funds." He coupled this with his statement of heartfelt interest in the welfare of Philadelphia and his desire to improve it in its Delaware River neighborhood for the benefit of the health of its citizens and so that the eastern part of the city would correspond better with the interior. So inter alia he left the valuable residue and remainder of his real and personal property to "The Mayor, Aldermen and citizens of Philadelphia, their successors and assigns in trust to and for the several uses intents and purposes hereinafter mentioned and declared * * *." The will went into considerable particulars regarding the Girard Philadelphia and Kentucky property. Concerning a personal estate bequest of two million dollars for the College the will outlined at length where it would be located and in great detail the exact construction of the College and outbuildings, etc. The will also gave five hundred thousand dollars to Philadelphia for various public improvements. The Commonwealth of Pennsylvania was bequeathed three hundred thousand dollars for internal improvement by canal navigation. This last bequest was conditioned upon the Commonwealth passing certain laws helpful to the testator's contemplated improvement of Philadelphia and for the desired objectives of Girard College. All the suggested assisting legislation was enacted by the Commonwealth in due course.
2
Mr. Girard stated specifically in his will:
3
"In relation to the organization of the college and its appendages, I leave, necessarily, many details to the Mayor, Aldermen and citizens of Philadelphia and their successors; and I do so, with the more confidence, as, from the nature of my bequests and the benefit to result from them, I trust that my fellow citizens of Philadelphia, will observe and evince especial care and anxiety in selecting members of their City Councils, and other agents * *."
4
He provided that the College accounts be kept separately so that they could be examined by a committee of the Pennsylvania legislature and that an account of same be rendered annually to said legislature together with a report of the state of the College. Philadelphia accepted the bequests and by ordinance set up a plan to administer the College by a Trusts Board. In 1833 a building committee of the City Council was appointed, a president of the College was chosen under an ordinance created for that purpose and the cornerstone of the main building laid. Construction was concluded in 1847 and the College opened the first of the following year. Down to 1869 the City Council operated the College directly, first by way of the trustees until 1851 when the latter offices were abolished, and the Council again took over direct management. In 1869 the Commonwealth enacted a law which gave Philadelphia a local Board of Trusts to take over the control of Girard College. From that date the Board of City Trusts remained in charge of the College until 1958. Broadly summing up the Commonwealth and City's intimate association with Girard College the District Court, with full justification in the record, found as fact that:
5
"Beginning in 1831 and continuing to date, the Commonwealth of Pennsylvania and the City of Philadelphia, by the enactment of statutes and ordinances, by the use and supervision of public officials, appointed by legislative and judicial bodies, by rendering services and providing tax exemptions, perpetual existence and exemption from tort liability have given aid, assistance, direction and involvement to the construction, maintenance, operation and policies of Girard College."
6
It is important to note in this sequence that Philadelphia has made a consistently brilliant showing through the years in its management of the funds and real property from the Girard estate for the College. The money bequest amounted to six million dollars. This was increased to ninety million dollars plus by 1959. The various estate properties given the City for the College were not allocated any book value by the estate. These have insurable value at this time of $42,000,000.
7
In 1954 two applicants requested admission to the College. They were fully qualified but were refused because they were Negroes. They brought their cause to the United States Supreme Court which held in that suit, titled Commonwealth of Pennsylvania et al. v. Board of Directors of City Trusts of City of Philadelphia, 353 U.S. 230, 231, 77 S.Ct. 806, 807, 1 L.Ed.2d 792 (1958):
8
"The Board which operates Girard College is an agency of the State of Pennsylvania. Therefore, even though the Board was acting as a trustee, its refusal to admit Foust and Felder to the college because they were Negroes was discrimination by the State. Such discrimination is forbidden by the Fourteenth Amendment. Brown v. Board of Education of Topeka, 347 U.S. 483, 74 S.Ct. 686, 98 L.Ed. 873. Accordingly, the judgment of the Supreme Court of Pennsylvania is reversed and the cause is remanded for further proceedings not inconsistent with this opinion."
9
The Supreme Court of Pennsylvania on remand took none of the plainly indicated proceedings called for by the United States Supreme Court. It simply remanded the litigation to the Orphans' Court of Philadelphia County.1 That court, without notice or opportunity for the plaintiffs to do anything and with no request from the City or other source whatsoever, on its own initiative ousted Philadelphia as trustee and installed in place of the City Board, persons of its own choosing. There is disagreement between the parties with respect to the method used for the selection of the new trustees. But it is conceded by appellants regarding prior notification by the Orphans' Court to its choices that, "Certainly no court would appoint an individual to a position of such responsibility without first affording him an opportunity to refuse." The record does show clearly that one of the court trustees testified that he was telephoned by one of the Orphans' Court judges prior to the appointments order being filed and told that the court had appointed its own trustees of which he was one. It is also in the record that the new trustees, as stated by one of them, were sworn in by at least one of the Orphans' Court judges and that included in their oath was "* * * that we would undertake to manage the will of Stephen Girard in accordance with the way it was written." The said trustee, referring to that part of the oath, further mentioned "That is what we all assumed anyhow." We think the foregoing factual narrative demonstrates that the Orphans' Court of Philadelphia County has been substantially involved with the supervision of the Girard Estate.
10
The Philadelphia City Trustees took no appeal from their ouster. The children plaintiffs did. The Pennsylvania Supreme Court found that the Orphans' Court action was not inconsistent with the mandate of the United States Supreme Court or the Fourteenth Amendment or the Girard will. Application for certiorari was denied by the United States Supreme Court, 357 U.S. 570, 78 S.Ct. 1383, 2 L.Ed.2d 1546 (1958).
11
The present litigation was instituted in the United States District Court for the Eastern District of Pennsylvania. The trial judge originally passed solely upon the question of whether Girard College was within the jurisdiction of the Pennsylvania Public Accommodations Act of June 11, 1935, P.L. 297, as amended by the Act of June 24, 1939, P.L. 872. The Court held it was within Sections (a) and (c) of the Act and not within the proviso of Section (d). This Court reversed that finding and returned the suit to the District Court for trial on the merits of Count 1 of the complaint which charges that "The refusal of the trustees of Girard College to admit applicants without regard to race violates the Constitution of the United States of America and applicable Federal statutes."
12
Appellants argue that they have not violated the equal protection clause of the Fourteenth Amendment by denying admission to individuals because of their color. In support of this they cite some Pennsylvania decisions including the State Supreme Court Girard College opinion on the remand of the United States Supreme Court to that State Court "for further proceedings not inconsistent with this opinion." What the State Court did was turn the matter over to its Orphans' Court which eliminated the City as trustee and installed its own group, sworn to uphold the literal language of the Girard will, a move effectively continuing the very segregation which had been condemned by the United States Supreme Court. True, the latter had denied the application for certiorari. Times without number that Court has plainly ruled that there is no inference permissible from its denial of application for certiorari, favorable or unfavorable to either side of a litigation. Certainly in the whole muddy situation flowing from the State excision of the City Board, thereby taking away the linchpin of the Girard will, the then existing state litigation picture did not bring into the necessary sharp focus, the set piece maneuver which had completely circumvented the Supreme Court's directive. We, however, as above seen, do have all of that amazing effort to maintain Girard's discriminatory status before us in its true perspective.
13
Even in the above short résumé of the conception, creation and functioning of Girard College, the close, indispensable relationship between the College, the City of Philadelphia and the Commonwealth of Pennsylvania intended by Mr. Girard, meticulously set out in his will and faithfully followed for one hundred and twenty-seven years is self evident.2 The ironic result of the removal of the City Trustees is that Pennsylvania's involvement with Girard College is far more powerful than was provided for by Mr. Girard. The Commonwealth's Orphans' Court, through its assumed power of appointment and reappointment of the Trustees, is significantly concerned with the current administration of the college.
14
On the whole vital Commonwealth and City relationship to Girard College shown we must agree with Judge Lord in the District Court, that the facts in Evans v. Newton, 382 U.S. 296, 301, 302, 86 S.Ct. 486, 15 L.Ed.2d 373 (1966) are fairly comparable to those in this appeal and that the decision of the Supreme Court therein governs the issue before us. In Evans a tract of land was willed to the Mayor and City Council of Macon, Georgia, as a park for white people, to be controlled by a white Board of Managers. The city desegregated the park and the managers thereafter sued the city and the trustees of the residuary beneficiaries, asking for the city's removal as trustee and the appointment of private trustees to enforce the racial limitations of the will. The Court accepted the city's resignation and appointed three new trustees. The State Supreme Court upheld the terms of the will and the appointment of the new trustees. The United States Supreme Court reversed. Mr. Justice Douglas for the Court in the opinion said as to the park in issue:
15
"The momentum it acquired as a public facility is certainly not dissipated ipso facto by the appointment of `private' trustees. So far as this record shows, there has been no change in municipal maintenance and concern over this facility. Whether these public characteristics will in time be dissipated is wholly conjectural. If the municipality remains entwined in the management or control of the park, it remains subject to the restraints of the Fourteenth Amendment * * *.
16
* * * * * *
17
"Under the circumstances of this case, we cannot but conclude that the public character of this park requires that it be treated as a public institution subject to the command of the Fourteenth Amendment, regardless of who now has title under state law. We may fairly assume that had the Georgia courts been of the view that even in private hands the park may not be operated for the public on a segregated basis, the resignation would not have been approved and private trustees appointed. We put the matter that way because on this record we cannot say that the transfer of title per se disentangled the park from segregation under the municipal regime that long controlled it."
18
We think also that the Supreme Court's landmark decision in Shelley v. Kraemer, 334 U.S. 1, 20, 68 S.Ct. 836, 92 L.Ed. 1161 (1948) surely points to the affirmance of the instant judgment in accordance with the justice which must be done in this case. The state courts in Shelley had enforced restrictive real estate agreements. The Court by Chief Justice Vinson held:
19
"We hold that in granting judicial enforcement of the restrictive agreements in these cases, the States have denied petitioners the equal protection of the laws and that, therefore, the action of the state courts cannot stand. We have noted that freedom from discrimination by the States in the enjoyment of property rights was among the basic objectives sought to be effectuated by the framers of the Fourteenth Amendment. That such discrimination has occurred in these cases is clear. Because of the race or color of these petitioners they have been denied rights of ownership or occupancy enjoyed as a matter of course by other citizens of different race or color.
20
* * * * * *
21
"The historical context in which the Fourteenth Amendment became a part of the Constitution should not be forgotten. Whatever else the framers sought to achieve, it is clear that the matter of primary concern was the establishment of equality in the enjoyment of basic civil and political rights and the preservation of those rights from discriminatory action on the part of the States based on considerations of race or color."
22
See also Barrows v. Jackson, 346 U.S. 249, 73 S.Ct. 1031, 97 L.Ed. 1586 (1953) and Sweet Briar Institute v. Button, 280 F.Supp. 312 (W.D.Va., 1967), rev'd per curiam, 387 U.S. 423, 87 S.Ct. 1710, 18 L.Ed.2d 865, decision on the merits, Civil No. 66-C-10-L (W.D.Va., filed July 14, 1967). In Sweet Briar the trustees of the Institute sought to enjoin enforcement by the state attorney general of a racial restriction contained in the will establishing and funding the college. On motion of the defendant, the three judge Court abstained until such time as the college carried its prior case through the state courts. The Supreme Court reversed, stressing strongly, Section 202 of the Civil Rights Act of 1964, 42 U.S.C. § 2000a-1 (1964), and ordered the District Court to determine the case on the merits. On remand, that Court entered a permanent injunction against enforcement of the racial restriction by the State of Virginia, holding that:
23
"The State cannot require compliance with the testamentary restriction because that would constitute State action barred by the Fourteenth Amendment. This was the express holding in the Girard Case."
24
280 F.Supp. 312 (W.D.Va., 1967).
25
Girard's definitive position in this period of more than ever being operated by an agency of the state does not simply emanate from the momentum of the Commonwealth and City legitimate participation in the establishment of Girard and its institutional life from its beginning to the present moment. It is in addition, as we hold, the obvious net consequence of the displacement of the City Board by the Commonwealth's agent and the filling of the Girard Trusteeships with persons selected by the Commonwealth and committed to upholding the letter of the will. Those radical changes pushed the College right back into its old and ugly unconstitutional position. Had the City Trustees been left undisturbed it is inconceivable that this bitter dispute before us would not have been long ago lawfully and justly terminated. It is inconceivable that those City Trustees would not have with goodwill opened the College to all qualified children. Given everything we know of Mr. Girard, it is inconceivable that in this changed world he would not be quietly happy that his cherished project had raised its sights with the times and joyfully recognized that all human beings are created equal.
26
We do not consider the move of the state court in disposing of the City Trustees and installing its own appointees to be a non obvious involvement of the State as mentioned in the test outlined in Burton v. Wilmington Parking Authority, 365 U.S. 715, 722, 81 S. Ct. 856, 6 L.Ed.2d 45 (1961). The action in this instance and its motivation are to put it mildly, conspicuous. And what happened to Girard does "* * * significantly encourage and involve the State in private discriminations." Reitman v. Mulkey, 387 U.S. 369, 381, 87 S. Ct. 1627, 1634, 18 L.Ed.2d 830 (1967). As the Court there said by Mr. Justice White, "We have been presented with no persuasive considerations indicating that these judgments should be overturned."
27
The judgment of the District Court will be affirmed.
Notes:
1
As rightly found by the District Court:
"In 1959, after the decision of the United States Supreme Court in [Commonwealth of] Pennsylvania v. Board of Directors [etc.] 353 U.S. 230 [77 S.Ct. 806, 1 L.Ed.2d 792] (1957), the Legislature of Pennsylvania enacted a statute granting the Orphans' Court the power and the duty to appoint substitute trustees for the property of minors, when a previous trustee which was a political subdivision is removed `in the public interest,' and authorized a substitute trustee to invest such property of minors committed to their custody. The Act also contained other enabling legislation, without which the present defendants would be unable to carry out their duties. Act of November, 19, 1959, P.L. 1526 (Exh. P-51 (10)). The Legislature Journal of the Senate of the Commonwealth of Pennsylvania shows that this statute was passed specifically as enabling legislation in aid of Girard College (Exh. P-51 (10))."
2
So that there will be no possible cause for confusion, we note that the general topic of the sanctity of wills is not before us. Our total concern in this cause to which our decision is confined is a will in which the testator has deliberately and specially involved the State in the designated use of his testamentary property
28
KALODNER, Circuit Judge (concurring in the result).
29
I would affirm the Decree of the District Court on the ground that the removal in 1957 of the Board of Directors of City Trusts as trustee of the Stephen Girard Estate by the Orphans' Court, and its appointment of substituted individual trustees, for the avowed purpose of carrying out the racial exclusionary clause of Girard's Will, contravened the Fourteenth Amendment of the United States under the doctrine of Shelley v. Kraemer, 334 U.S. 1, 68 S.Ct. 836, 92 L.Ed. 1161 (1948) and its progeny.1
30
The Fourteenth Amendment is contravened under the Shelley doctrine, where there is "active intervention of the state courts, supported by the full panoply of state power"2 in the furtherance of enforcement of restrictions denying citizens their civil rights because of their race, color or creed.
31
In the instant case, the Orphans' Court had two alternative courses of action following the ruling of the Supreme Court of the United States in Commonwealth of Pennsylvania v. Board of Directors of City Trusts of City of Philadelphia, 353 U.S. 230, 77 S.Ct. 806, 1 L.Ed.2d 792 (1957), that the Board's denial of admission to Girard College of negro male orphans pursuant to the racial exclusionary clause of Stephen Girard's Will constituted state action in violation of the Fourteenth Amendment.
32
The Orphans' Court could have pursued the alternative of directing the Board of Directors of City Trusts to admit negro orphans to Girard College. Instead, it sua sponte pursued the alternative course of removing the Board and appointing individual private trustees in its stead so as to permit continuance of the discriminatory admission policy dictated by Girard's Will.3
33
That the alternative action taken by the Orphans' Court was for the avowed purpose of giving effect to the racial exclusionary clause of Girard's Will is explicitly spelled out in the Orphans' Court opinion accompanying its Decree of September 11, 1957 which removed the Board of Directors of City Trusts as trustee of the Girard Estate, "effective upon the appointment of a substituted trustee by this court."4
34
In this opinion, Girard's Estate, 7 Pa. Fiduc.Rep. 555, (1957), the Orphans' Court said at pages 557-558:
35
"The Supreme Court of the United States has ruled, as a matter of federal constitutional law, that the Board of Directors of City Trusts of the City of Philadelphia is an agency of the State of Pennsylvania and consequently forbidden by the Fourteenth Amendment from operating, even as a trustee of private funds, an establishment which excludes all but "poor white male orphans."
36
* * * * * *
37
"The Supreme Court of Pennsylvania, which is the final arbiter of our state law, has unequivocally stated that if for any reason, the Board of Directors of City Trusts of the City of Philadelphia cannot continue to administer the trust in accordance with testator's directions, it becomes the duty of this court to remove it as trustee and to appoint a substituted trustee which can lawfully administer the trust in the manner prescribed by the testator.
38
* * * * * *
39
"In order to harmonize the opinions of the United States Supreme Court and the Supreme Court of Pennsylvania, we hold: (1) that the primary purpose of the testator to benefit "poor white male orphans," only, must prevail; and (2) that the disqualification of the Board as trustee of this estate by the United States Supreme Court requires us to remove it from the administration of the trust and to appoint a substituted trustee, not so disqualified." (Emphasis supplied.)
40
The Supreme Court of the United States has recently ruled that in examining the constitutionality of a state act the reviewing court (1) must consider the act "in terms of its `immediate objective,' its `ultimate effect' and its `historical context and the conditions existing prior to its enactment'",5 and, (2) must "assess the potential impact of official action in determining whether the State has significantly involved itself with invidious discriminations".6
41
The stated rule is, of course, applicable to the action of a state court.
42
Applying the principles above stated to the instant case, I am of the opinion that the Orphans' Court "significantly involved itself with invidious discriminations" when it removed the Board of Directors of City Trusts and appointed individual trustees of the Estate of Stephen Girard for the express purpose of effectuating the racial exclusionary clause in Girard's Will, and thereby brought itself within the ambit of the Shelley doctrine.
43
As the Shelley case said at page 18 of 334 U.S., at page 844 of 68 S.Ct.:
44
"* * * it has never been suggested that state court action is immunized from the operation of those provisions [14th Amendment] simply because the action is that of the judicial branch of the state government."
45
For the reasons stated I would confine the scope of our affirmance of the District Court's Decree to the ground assigned at the outset of this concurring opinion.
Notes:
1
Barrows v. Jackson, 346 U.S. 249, 73 S.Ct. 1031, 97 L.Ed. 1586 (1953)
2
Shelley v. Kraemer, 334 U.S. 1 at page 19, 68 S.Ct. 836, 845. At page 14 of 334 U.S., at page 842 of 68 S.Ct. ofShelley the Court said:
"That the action of state courts and of judicial officers in their official capacities is to be regarded as action of the State within the meaning of the Fourteenth Amendment, is a proposition which has long been established by decisions of this Court. * * * In Ex parte Virginia (1880), 100 U.S. 339, 347, 25 L.Ed. 676, the Court observed: `A State acts by its legislative, its executive, or its judicial authorities. It can act in no other way.'"
3
The Orphans' Court in pursuing this alternative course acted in conformity with the holding of the Supreme Court of Pennsylvania, in Girard Will Case, 386 Pa. 548, 566, 127 A.2d 287 (1956) that should the Supreme Court of the United States hold, as it later did, that the Board of Directors of City Trusts could not carry out the exclusionary policy of Girard's Will, that the Orphans' Court could then appoint another trustee who could do so
4
The Orphans' Court Decree of October 4, 1957, substituting thirteen private citizens as Trustees of the Stephen Girard Estate, is reported at 7 Pa.Fiduc.Rep. 606
5
Reitman v. Mulkey (1967) 387 U.S. 369, at page 373, 87 S.Ct. 1627, at page 1630, 18 L.Ed.2d 830
6
Id. at page 380, 87 S.Ct. at page 1634
VAN DUSEN, Circuit Judge (concurring):
46
I concur in the result reached by the majority opinion, but respectfully dissent from much of the language used.
47
Specifically, I disagree with the implication from the statements that the state courts in 1957 installed their own group of trustees "sworn to uphold the literal language of the Girard will" (and similar phrases). Such characterizations given to the actions of the Pennsylvania courts by the majority opinion seem to me unnecessary to the proper decision in this appeal. There is no necessary basis in this record to so criticize either the able Pennsylvania judges, who have so conscientiously handled the litigation arising from the Girard Trust, or the distinguished and dedicated trustees, who have contributed unselfishly so much to this important charitable enterprise, acting under the advice of their able counsel, for many years. This appeal is being decided on the basis of the present decisions of the United States Supreme Court in a field where the "federal role" is more "pervasive" and "intense" today than it was several years ago. United States v. Price, 383 U.S. 787, 806, 86 S.Ct. 1152, 16 L.Ed.2d 267 (1966). Recent decisions of the Supreme Court, particularly in light of forceful dissents by Mr. Justice Harlan, make clear that the Fourteenth Amendment does not now permit the discriminatory operation of a charity like Girard College if the operation of that discrimination receives support from certain types of "state action."
48
Of the forms or types of "state action" in aid of discrimination that the Supreme Court has held render the discrimination unconstitutional, that in Reitman v. Mulkey, 387 U.S. 369, 87 S.Ct. 1627, 18 L.Ed.2d 830 (1967), seems most clearly apposite to the facts of this case.
49
The decision of the United States Supreme Court in 1957 (353 U.S. 230, 77 S.Ct. 806, 1 L.Ed.2d 792) settled the question of whether the discrimination at Girard College was then unconstitutional state action. The same discrimination exists today and this appeal asks whether the unconstitutionality also remains because prohibited state action supports the discrimination. The answer is yes. When the Orphans' Court, on its own motion and without formal hearing, removed the Board of Directors of City Trusts and appointed "private" trustees in their place, such affirmative state action constituted the "encouragement" of discrimination held to violate the Fourteenth Amendment in Reitman v. Mulkey, supra, 387 U.S. at 376, 87 S. Ct. 1627. The state did not make itself merely neutral. Just as the California court did in Reitman v. Mulkey, this court can examine the constitutionality of such state action "in terms of its `immediate objective,' its `ultimate effect' and its `historical context and the conditions existing prior to its enactment,'" 387 U.S. at 373, 87 S.Ct. at 1630. Cf. Burton v. Wilmington Parking Authority, 365 U.S. 715, 722, 81 S.Ct. 856, 6 L.Ed.2d 45 (1961). The record of the discrimination at Girard College after the 1957 United States Supreme Court decision makes it clear that the further "state actions" of the Pennsylvania courts did not "cure" the unconstitutionality, but perpetuated it by affirmatively encouraging continued discrimination. With hindsight it is clear that no reason exists for the deviation from Girard's will to appointing private trustees, except for its allowing compliance with the "white orphans" provision. And it is likewise an inescapable conclusion that the substitution of trustees in 1957 encouraged compliance with the "white" provision that has lasted for over 10 years. The state action that continues today in the Orphans' Court-trustee relationship is the "encouragement" of discrimination first given by the original appointment of the individual trustees.
50
Even clearer state action of "encouragement" is found in the statute passed by the Pennsylvania Legislature after the Supreme Court of Pennsylvania approved the substitution of private trustees. The Act of November 19, 1959, P.L. 1526, authorized ex post facto the Orphans' Courts' actions, and further implemented the change-over by fully empowering the new private trustees to serve in place of the Board of City Trusts as guardians of the boys attending Girard College and to set up a common trust fund for their property. The same Act also repealed several prior laws passed to aid Girard College. Such affirmative legislative action, as an attempt to render a state neutral with respect to otherwise unconstitutional discrimination, makes Reitman v. Mulkey still more apposite.
51
When Stephen Girard deliberately and pointedly chose to involve the State in the "private" charitable conduct of his school (as was decided at 353 U.S. 230, 77 S.Ct. 806), he ran the risk that Philadelphia might not accept the trust, or might be unable to administer it, or might be subsequently unable to act because the federal constitution was changed (as occurred when the Fourteenth Amendment was passed). It is in this unique situation of a testator's deliberate provision for a major role for the state in his charitable scheme, that the action of the state courts rises to the level of unconstitutional state action. The charitable scheme chosen by Girard might as easily have become invalid due to a change in the rule against perpetuities or some other limitation imposed by society on the unlimited rights of private property at death. See Commonwealth of Pennsylvania v. Brown, 260 F. Supp. 323, 357 (E.D.Pa.1966).
|
Compensation for Psychiatric Injury
Sustaining a psychiatric injury as a result of an accident may give rise to a right to personal injury compensation. The legal principles for claiming compensation for a psychiatric injury as a personal injury, sit within the law of negligence. This means the right to seek damages arises from an injury which has resulted from the wrongful acts or omissions by another.
Personal injury refers to physical and psychological injury
Personal injury is not just confined to physical injury. Personal injury may also include psychiatric or psychological injury. A psychiatric injury may be secondary to a physical injury, arising for example from trauma, or from witnessing a traumatic event. Psychiatric injury may also be a pure psychiatric injury in the absence of any physical injury being suffered.
In Queensland, a psychological or psychiatric injury is included in the dictionary of the Personal Injuries Proceedings Act 2002, as a basis for pursuing compensable action.
For those sustaining a psychiatric injury as a result from events in the workplace, compensation may be sought under the Workers’ Compensation and Rehabilitation Act 2003. The requirement however, is that the employment is the major significant contributing factor to the injury.
What is a psychiatric injury?
There is often confusion about the meaning of psychiatric injury. To pursue a claim for psychiatric injury there must first be a psychological or psychiatric disorder. A diagnosis of psychological or psychiatric disorder is made by a medical professional experienced in that field. Diagnosis is made by reference to the American Psychiatric Association’s Diagnostic and Statistical Manual of Mental Disorders, currently the 5th version, otherwise known as the DSM-5.
DSM-5: Standardization of Diagnoses
The DSM-5 is a classification of mental disorders with associated criteria designed to diagnose such disorders. It provides a standard reference for clinical practice in the mental health field, not just in Australia, but around the world.
Is stress a psychiatric injury?
In the workplace, mental stress and exhaustion from work pressure, or incidence of bullying and harassment, are not generally considered as grounds for pursuing a claim for psychiatric injury.
In the case of other accidents, mere stress, anger or other temporary emotions will also not be a successful basis for claiming a psychiatric injury for the purposes of seeking compensation.
Prolonged exposure to stressful situations on the other hand may contribute to the development of a serious psychiatric disorder and provide grounds for seeking damages for psychiatric injury.
To be a compensable injury, a psychiatric disorder would need to fall within the DSM-5 spectrum of Depressive Disorders, Anxiety Disorders or Trauma/Stressor related Disorders.
Depressive Disorders
According to the DSM-5, the common feature of all of depressive disorders is the presence of sad, empty, or irritable mood, accompanied by somatic (related to the body) and cognitive changes that significantly affect the individual’s capacity to function.
Anxiety Disorders
Anxiety disorders include disorders that share features of excessive fear and anxiety and related behavioural disturbances. The DSM-5 describes fear as the emotional response to real or perceived imminent threat.
Anxiety is the anticipation of future threat. Anxiety is often with muscle tension and vigilance in preparation for future danger and cautious or avoidant behaviours. Anxiety disorders may also typified by panic attacks.
Trauma- and Stressor-Related Disorders
The DSM-5 includes disorders in which exposure to a traumatic or stressful event is the basis for diagnosis. Typically, a diagnosis is made by the presence of anxiety or fear-based symptoms, anhedonic (lack of joy) and dysphonic symptoms (difficulty speaking) externalizing anger or aggressive symptoms, dissociative symptoms where the person exhibits a degree of disconnection or detachment, or some combination of the above. Depending on the particular symptoms, the diagnosis may fall under the banner of posttraumatic stress disorder (PTSD) or adjustment disorder.
Legal Perspective
A claim for damages for psychiatric injury is based on there being a diagnosed psychiatric disorder. Proving that events giving rise to that psychiatric disorder, as grounds for pursuing a claim for negligence, remains however, with lawyers.
KM Splatt & Associates Lawyers are experts in the legal process of pursuing claims for personal injuries, including psychiatric injury. We understand how difficult it can be to seek help, advice and the assistance required to pursue rights to which you may be entitled. Our aim is to listen to you and manage the process to be as stress-free as possible. |
Django Explained
Many people will have seen the movie trailers for Quentin Tarantino’s latest film ‘Django Unchained’ and will quite naturally feel somewhat uneasy that Hollywood again appears to have launched yet another violent film with a dangerously anti-White theme.
‘Django Unchained’ follows hot on the heals of ‘Machete’ (2010) and Tarantino’s previous film, ‘Inglourious Basterds’ (2009), depicting non-White ethnic minority ‘heroes’ taking their revenge and inflicting gratuitous violence upon villains who all just happen to be White.
Critics of these films legitimately complain that they run the risk of inciting racial hatred against white people, but their complaints are either ignored or brushed aside by media pundits and the authorities, who claim that these films are simply powerfully themed entertainment and that worries that ethnic minorities may decide to re-enact the scenes of racially charged violence against White people are groundless.
Readers may recall that Michael Moore famously wrote a book some years back, entitled, ‘Stupid White Men’, in which he asserted that the White race is the root of all evil, that we should be cease to exist, and in which the second chapter of the book was entitled, ‘Kill Whitey’.
There is a sequence in ‘Django Unchained’ in which the central character played by black actor Jamie Foxx, is asked, “How do you like the bounty hunting business?” to which Django, Foxx’s character replies, “You kill white folks and they pay you for it – what’s not to like?”
Supporters should also take regard of the comments on Twitter posted by black cinemagoers in the US.
On the website hollywoodreporter.com Jo Kington comments: “While whites are busy getting offended on our [black people’s] behalf, they miss completely why we are going to see this film. It’s a bIack man killings white people in masses. I will pay to see that every time.
I’ve seen this film 3 times so far and am going again Saturday night. It’s an awesome movie.”
Two people indicated that they ‘liked’ this comment and Jo Kington further stated, ” … we need to milk that sh-t as long as we can. Thank god for white guilt”.
“After watching Django all I want to do is eat baked beans and biscuits and shoot white people for money”.
More pointedly, when the actor playing the part of Django, Jamie Foxx, hosted NBCs Saturday Night Live in December last year he shocked audiences with his description of his role in the film:
Clearly this genre of film is highly dangerous to the safety of White people, as is born out by the scandalously high levels of black on White crime that exists on both sides of the Atlantic.
More recently still, Foxx attracted more controversy with his acceptance speech at last Friday’s NAACP Image Awards, said, “Black people are the most talented people in the world” (video follows with transcript and commentary):
JAMIE FOXX: “All I can say is I’m so humbled tonight. I was thinking about all the stuff that I was going to say personally about myself, and I was gonna be all about me and how I did it, and how me and me and I and I, and then you watch Harry Belafonte and Sidney Poitier come out, and you say to yourself it’s really not big of a deal of what you are doing just yet.
“I have so many things I wanted to say, but after watching and listening to Harry Belafonte speak, sometimes I feel like somehow I failed a little bit in being caught up in what I do, or maybe that’s the young generation, and that’s what it is. But I guarantee you that I’m going to work a whole lot harder man.
“Black people are the most talented people in the world. I, it’s, I can’t explain it. You can’t sit in this room and not watch Gladys Knight sing and go like, “Golly, what in the world?”
Not only does Foxx appear to like the idea of killing White people, but he also appears to be a very race conscious black supremacist, appearing as he did at a function organised by the American, ‘National Association for the Advancement of Colored People’.
Just imagine the media reaction if a White actor had stood up at a function organised by a ‘National Association for the Advancement of White People’ and stated, “White people are the most talented people in the world”!
One is forced to ask why White people go to the cinema to watch movies like this that are little more than ‘race hate soft porn’?
One might also ask why someone like Quentin Tarantino, who is ostensibly White, would want to produce films that are clearly an incitement to racial hatred?
With a little research, a possible answer to this latter question begins to emerge.
While most Hollywood producers and directors are Jewish and therefore belong to an ethnic group that doesn’t readily identify as ‘White’, in Tarantino’s case the hostility shown in his films towards White people would appear to stem from different motivations.
Tarantino apparently came from a dysfunctional family background. While his father Tony Tarantino was of Italian origin, his mother Connie McHugh, was half Irish and half Cherokee Indian, and it seems they married when Connie became pregnant with Quentin at the tender age of fourteen.
Sharon Waxman describes in her book how unhappy Tarantino was at school and subject to much bullying and teasing by the other children. Tarantino would have been a school pupil at a time when Western films and TV programmes would have been popular, and at a time when Whites composed c. 90% of the population of the US. With the conflict depicted in films of that time between White settlers and ‘Red Indian’ tribes, one can imagine that much of the teasing Tarantino received at school may have revolved around his part Cherokee ancestry.
I could be wrong, but this may be the reason why Tarantino appears to like making racially charged films that denigrate and demonise the White characters depicted and particularly those White characters who would be presumed to have pride in their race. Perhaps on a subconscious level at least, he is still taking his revenge on the schoolboy tormentors that made him so unhappy at school?
About Max Musson
You might like:
12 Responses to "Django Explained"
It may well be that Tarantino had a dysfunctional childhood & that manifests itself in his films.
I think this is encouraged by the powers that be because it serves an agenda, you can find many people like this.
Spielberg pushes the Jewish agenda more directly & white guilt via the distorted “Lincoln”.
Just imagine if you reverse what was said above & praised shooting blacks etc, your career would be over & you’d probably find yourself in court for hate speech.
Foxx obviously hates white people in real life as well as on screen, we shouldn’t be to surprised as most African Americans are racist and blame white people for all the problems in their communities. Quentin Tarantino is creating a new John Wayne for black people. There is an trend in US film making for this kind of White Guilt sycophantic propaganda, George Lucas, Red Tails the basic premise of the Film is that Black people won the Allied air war almost singlehandedly and are superior to whites, Stephen Spielberg promoting Jewish propaganda films the whole industry has become very politically correct, a very untruthful ideology promoted by cowards and believed by idiots.
when the german bounty hunter shoots that sherrif in the town the deputy and all his mates come to arrest him and django, he just shows the deputy a piece of paper that could easly be forged and it is excepted by the deputy., well lets say its not forged and its an official wanted dead or alive warrant , why not take him alive?
i dont believe american people in small towns back in that day would take that kind of shit of their goverment, why not give the man a trail? . also the deputy tells all the other men its ok and non of them question him even though the person who would benefit the most from the death of the sherrif would probly be the deputy as he would get promoted.
later in the film they gun down people without a warrant, by this time the audience trusts them , we the viewer know they are the good guys and trust them to only kill bad guys. near the end of the film django kills an unarmed woman, and the audience laughs ( it was pretty funny), i dont think a woman would have had much say in the way things were done at that time in history so no need to kil her for revenge, only pure hate . thankfully their were no children in the house.
well if u believe hollywood trys to influence the way people think, especially young people , then their seems to be a frightening agenda behind this film.
If i was a conspiracy theorist i would say this movie is helping to condition the mindset that its ok for the goverment to kill without trail , and dont worry if its foreign troops on the streets doing the killing and dont worry if prisoners are released and are used as a peacekeeping force, once they have shown you their papers they can do all the killing they want.
I appreciate that you saw through the mind conditioning that is intended regarding films such as this, but the majority of the public are not that perceptive. Furthermore, repeated exposure to this kind of mind polution does eventually affect even the most resilient of us.
There is an old saying:
Vice is a creature of such awful mien,
that to be hated needs but to be seen.
But seen to often,
too familiar with it’s face,
first we endure, then pity, then embrace.
We would urge the public to boycott this film and all others like it, and to visit local cinemas simply to register a protest at the manager’s office.
Tell the manager that the film is race hate material and ask him to cease showing it at once. If he does not, then ask him for his name and send an official letter of complaint to: The Crown Prosecution Service, Rose Court, 2 Southwark Bridge, London, SE1 9HS, asking them to prosecute under incitement to racial hatred.
It was said years ago that Hollywood was used to float certain ideas, to get them into the public mind & make them acceptable, normal.
I see it as mainly propaganda full of logic holes & not to be taken seriously.
It makes me laugh when people say how could people fall for Hitler’s propaganda, when they can’t see what’s in front of their face.
i understand your hatred towards these types off films and people like me that pay my hard earned cash to our enemys ( £19 1 ticket) but if we want people to understand the way we are being attacked than i think its important white people watch them, i know max has commented above and made the point that most people wil not understand the agenda and semi brainwashing that is going on, but prehaps later if they stumble across an article like this it might get them thinking a bit more deeply and start noticing other attacks on our race.
and if one of us is trying to explain to a skeptic we are under attack through the media i think it can only help if they have watched this film
and as they say “know your enemy” so i would recomend you watch it yourself Rob
I don’t hate people who pay £19 for a ticket to see films like ‘Django Unchained’, I am simply saddened that you feel the need to waste your money subsidising our racial enemies.
You are right in one sense, that people do need to see a few of these films, just enough for them to learn to recognise the genre. From that point onwards there is no point watching more as they are effectively mind pollution and we should no more wish to view them than drink a glass of sewage water. |
UNPUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 03-2163
In Re: MARYLAND PROPERTY ASSOCIATES,
INCORPORATED; MARYLAND PROPERTY MANAGEMENT,
INCORPORATED; MARYLAND PROPERTY GROUP,
INCORPORATED; MARYLAND GROUP MANAGEMENT,
INCORPORATED; MARYLAND PROPERTY SYSTEMS,
INCORPORATED; MARYLAND PROPERTY SERVICES,
INCORPORATED,
Debtors.
--------------------
CHARLES R. GOLDSTEIN, Trustee of the Estate of Maryland
Property Associates, Incorporated, et al.,
Plaintiff - Appellee,
versus
COLOMBOBANK F.S.B.,
Defendant - Appellant.
Appeal from the United States District Court for the District of
Maryland, at Baltimore. William D. Quarles, Jr., District Judge.
(CA-02-4010-WDQ; BK-98-53783; AP-00-5578)
Argued: September 30, 2004 Decided: November 19, 2004
Before WILLIAMS, TRAXLER, and KING, Circuit Judges.
Dismissed by unpublished per curiam opinion.
ARGUED: Christopher Paul Spera, DECKELBAUM, OGENS & RAFTERY,
CHARTERED, Bethesda, Maryland, for Appellant. Charles Michael
Campisi, VENABLE, L.L.P., Baltimore, Maryland, for Appellee. ON
BRIEF: Nelson Deckelbaum, Stephen W. Nichols, DECKELBAUM, OGENS &
RAFTERY, CHARTERED, Bethesda, Maryland, for Appellant. John A.
Roberts, VENABLE, L.L.P., Baltimore, Maryland, for Appellee.
Unpublished opinions are not binding precedent in this circuit.
See Local Rule 36(c).
2
PER CURIAM:
The Chapter 7 Trustee of Maryland Property Associates, Inc.
(MPA) brought an adversarial action in the bankruptcy court against
ColomboBank (the Bank) to avoid as preferences and fraudulent
transfers certain payments MPA made to the Bank. The bankruptcy
court tried the action without a jury and voided the payments. The
Bank appealed the bankruptcy court’s decision to the district
court. The district court affirmed in part and vacated and
remanded in part, with instructions for the bankruptcy court to
make certain factual findings. The Bank appealed the district
court’s decision to us. Because the district court remanded to the
bankruptcy court for further fact-finding, we lack jurisdiction
over the appeal.
I.
MPA was a real property management company principally owned
and operated by Monte Greenbaum.1 MPA’s main clients were certain
limited partnerships, which owned low-income apartment complexes
(properties) in Maryland. The U.S. Department of Housing and Urban
Development (HUD) insured the properties and subsidized their
tenants’ rents. In exchange, HUD required the partnerships to
keep their tenants’ security deposits in accounts (security
1
This recitation of the facts is gleaned from the bankruptcy
court’s order, supplemented for clarity by undisputed and clear
portions of the record.
3
accounts) for the tenants’ benefit. The partnerships kept the
security accounts at the Bank.
In violation of HUD’s regulations, Greenbaum began taking
money from the security accounts, putting it into a separate
account (operating account) controlled by MPA, where MPA also kept
its validly-acquired money, and then using the money in the
operating account for his own purposes. In order to conceal his
acts from HUD and the partnerships, Greenbaum arranged for the Bank
to make loans (share loans) to the partnerships to cover the amount
he had misappropriated. Greenbaum structured the share loans,
which were deposited into dummy security accounts, such that the
loan proceeds themselves secured the loans. With the share-loan
money in the dummy security accounts, the total balance on deposit
in the security accounts did not reflect the fact that Greenbaum
had been taking money therefrom. By filling out false disclosure
forms, Greenbaum and the Bank’s president hid from HUD and the
partnerships the fact that the funds in the dummy security accounts
were encumbered.2
Greenbaum later decided to end the share loan scheme. He
wrote several checks to the Bank on MPA’s operating account to pay
off the share loans. When the Bank received these checks, it
released its security interest on the funds in the dummy security
2
Based on his role in the fraud scheme, the bankruptcy court
found that the Bank’s president “knew or should have known of the
fraud.” (J.A. at 1248.)
4
accounts, leaving those accounts unencumbered. Although it is
unclear from the record exactly what happened to the money at that
point, (J.A. at 1566-70, 1588), the parties agree that it
ultimately ended up in the partnerships. (Appellant’s Br. at 13;
Appellee’s Br. at 12-13.)
In addition to the share loans, Greenbaum personally took out
two other loans and unofficially borrowed other money from the Bank
(non-share loans, collectively).3 He paid off these personal loans
on checks written on MPA’s operating account.
II.
On March 17, 1998, the partnerships and other creditors filed
an involuntary Chapter 7 bankruptcy petition against MPA.4 On
March 17, 2000, the Trustee, acting on the creditors’ behalf, filed
this adversarial action against the Bank in the bankruptcy court.
The complaint sought to avoid as preferences and fraudulent
transfers the checks Greenbaum wrote to the Bank on MPA’s operating
account to pay off the loans.
3
The record establishes that Greenbaum took out the non-share
loans before he started the share loan scheme and that his activity
with respect to the non-share loans overlapped with his activity
with respect to the share loans. For clarity’s sake, we describe
the two separately.
4
It is unclear from the record whether the other creditors
joined the partnerships in filing the original petition or later
joined in the bankruptcy proceedings. This factual issue is not
relevant for purposes of this appeal.
5
On May 14, 2001, the bankruptcy court heard the Trustee’s
case. On October 16, 2002, the bankruptcy court entered judgment
awarding the Trustee the full value of the checks plus interest.
The Bank appealed to the district court. On August 29, 2003, the
district court affirmed in part and vacated and remanded in part.
The district court affirmed the bankruptcy court’s ruling that the
share-loan checks were avoidable.5 The district court vacated the
bankruptcy court’s ruling that the non-share-loan checks were
avoidable because it found that the bankruptcy court had not made
specific factual findings as to whether MPA received consideration
for its payments on the non-share loans. The district court
therefore remanded for the bankruptcy court to make specific
findings of fact on that issue.
The Bank timely noticed an appeal. After oral argument, we
requested, and the parties submitted, supplemental briefing on
whether we have jurisdiction over the appeal. We have reviewed
that briefing and now conclude that we lack jurisdiction to hear
the Bank’s appeal.
5
In an order dated July 16, 2003, the district court reversed
that portion of the bankruptcy court’s judgment avoiding the share-
loan checks because it found that the Bank had returned the money
to the partnerships, and that the Trustee, as the partnerships’
representative, had therefore suffered no harm by the share-loan
scheme. The Trustee moved for reconsideration, arguing that MPA
had creditors other than the partnerships, and that by paying the
partnerships’ debt with MPA’s money, the share-loan scheme harmed
MPA’s non-partnership creditors. The district court agreed,
vacated its earlier order as to the share-loan payments, and
affirmed the bankruptcy court’s decision to avoid the share-loan
checks.
6
III.
We have jurisdiction under 28 U.S.C.A. § 158(d) (West 1993) to
hear appeals from cases originating in the bankruptcy court. See
Capitol Credit Plan of Tenn., Inc. v. Shaffer, 912 F.2d 749, 754
(4th Cir. 1990) (holding that section 158(d) alone provides for
appellate jurisdiction for cases originating in the bankruptcy
court). Section 158(d), however, does not grant us authority to
hear all such appeals. Rather, under that section we may only
review “final decisions, judgments, orders, and decrees” entered by
the district court. 28 U.S.C.A. § 158(d). We have held that a
district court’s order is not “final” under section 158(d) if it
remands the case with an instruction for the bankruptcy court to
conduct further fact-finding. Shaffer, 912 F.2d at 750 (holding
that district court order remanding to the bankruptcy court to make
additional factual findings was not “final” under section 158(d));
Legal Representative for Future Claimants v. Aetna Cas. & Sur. Co.
(In re The Wallace & Gale Co.), 72 F.3d 21, 24 (4th Cir. 1995)
(LRFC) (same).6
6
A.H. Robins Co. v. Piccinin, 788 F.2d 994 (4th Cir. 1986)
and Cooper v. Delaware Valley Shippers (In re Carolina Motor
Express Inc.), 949 F.2d 107 (4th Cir. 1991), rev’d on other grounds
sub nom. Reiter v. Cooper, 507 U.S. 258 (1993) are not to the
contrary. In Piccinin, we asserted jurisdiction under 28 U.S.C. §
1291, which, like section 158(d), has a finality requirement, over
an appeal from the district court’s order fixing venue in all tort
suits against the debtor. 788 F.2d at 1009. In Cooper we asserted
jurisdiction under section 158(d) over an appeal from the district
court’s order referring certain legal questions to the Interstate
Commerce Commission. Id. at 108 n. 1. These holdings do not
conflict with Shaffer and LRFC, which hold that a district court
7
A majority of our sister circuits also follow this approach.
See In re Lopez, 116 F.3d 1191, 1192 (7th Cir. 1997) (cataloguing
cases and observing that the D.C., First, Second, Fourth, Fifth,
Seventh, Eighth, Tenth, and Eleventh Circuits so hold) (citations
omitted). The minority view is that the finality of district court
orders should be determined by an approach that weighs several
factors to determine whether the appeal would further the goals of
bankruptcy. See id. at 1193 (noting that the Third, Ninth, and
possibly the Sixth Circuits apply such an approach) (citations
omitted). Under the minority view, whether the district court
remands to the bankruptcy court with instructions to conduct
additional fact-finding is a relevant, but not dispositive, factor.
See, e.g., Buncher Co. v. Official Comm. of Unsecured Creditors of
GenFarm Ltd. P’ship IV, 229 F.3d 245, 250 (3d Cir. 2000) (in
determining whether a district court’s decision is “final” under
section 158(d) applying four-factor test that examines: (1) the
impact the case has on the assets of the bankruptcy estate; (2) the
necessity of further fact-finding on remand; (3) the preclusive
order remanding to the bankruptcy court to make findings of fact is
not a final order under section 158(d).
To be sure, the Piccinin and Cooper courts did note that we
generally apply a more “relaxed” definition of finality in the
bankruptcy context. 788 F.2d at 1009; 949 F.2d at 108 n. 1. We do
not disagree with that statement. To resolve the case before us,
however, it is enough to say that whatever it might mean to apply
a “relaxed” definition of finality, it cannot mean that we have
jurisdiction under section 158(d) over a district court order
remanding to the bankruptcy court to make additional findings of
fact. See Shaffer, 912 F.2d at 750; LRFC, 72 F.3d at 24.
8
effect of the decision on the merits of further litigation, and (4)
the interest of judicial economy).
Ignoring Shaffer and LRFC on this point, the Trustee7 simply
asserts that we must follow Buncher, 229 F.3d at 250.8 Buncher’s
approach, however, is irreconcilable with Shaffer’s and LRFC’s
categorical rule, and we, as a panel, lack the authority to
overrule prior circuit precedent. See McMellon v. United States,
2004 WL 2303487, *2 (4th Cir. Oct. 14, 2004) (“one panel cannot
overrule a decision issued by a prior panel”). Moreover, the
7
The Bank concedes that we lack jurisdiction over its appeal.
It nevertheless asks us to declare that the Trustee may not execute
the district court’s judgment as to the share-loan transfers. The
Bank does not explain how, if we lack jurisdiction over the appeal,
we have jurisdiction to make such a declaration. We therefore deny
its request.
8
The Trustee also argues that we have jurisdiction over the
district court’s judgment insofar as it applies to the share-loan
transactions because the judgment was final as to those
transactions. This argument reveals a fundamental misunderstanding
of the concept of finality. A judgment is not final simply because
the district court has resolved some aspects of the appeal;
instead, the very fact that other aspects remain unresolved is
precisely what makes this appeal interlocutory.
To the extent that we can construe the Trustee’s argument to
be an implied assertion that we have jurisdiction under the
collateral order doctrine, we would still reject the argument. “To
be reviewable under that doctrine, an order must conclusively
determine the disputed question, resolve an important issue
completely separate from the merits of the action and be
effectively unreviewable on appeal from a final judgment.” LRFC,
72 F.3d at 24 (quotation marks omitted). Far from being separate
from the merits of the action, the share-loan transactions go to
the very heart of the Trustee’s adversarial complaint. Moreover,
the Trustee has not suggested that, and we can decipher no reason
why, the district court’s conclusion regarding the share-loan
payments will not be appealable when the district court enters a
final judgment.
9
approach pressed by the Trustee is “terribly woolly,” when
“[j]urisdictional rules ought to be simple and precise.” In re
Lopez, 116 F.3d at 1194 (emphasis in original). In short, the
approach we adopted in Shaffer and LRFC is the “sounder rule” in
this context. Id.
IV.
Under the Shaffer/LRFC rule, we lack jurisdiction over the
Bank’s appeal because the district court remanded to the bankruptcy
court to make additional findings of fact. Accordingly, we dismiss
the appeal.
DISMISSED
10
|
1. Technical Field
Aspects of the present invention relate to an address information display system and an address information display program for displaying addresses that have been assigned to a device.
2. Related Art
Basic techniques for classifying IP addresses into several groups have been widely known as described in Japanese Patent Provisional Publication No. 2002-198997 (hereinafter referred to as JP publication No. 2002-198997) and Japanese Patent Provisional Publication No. 2001-188732 (hereinafter referred to as JP publication No. 2001-188732).
For example, JP publication No. 2002-198997 describes a technique for classifying collected IP addresses depending on the domain (to which each IP address belongs) and thereby identifying a domain from which access is made frequently. JP publication No. 2002-198997 describes a technique for classifying received IP addresses depending on the domain and thereby sending back data corresponding to the domain to the source (sender) of each IP address.
However, JP publications No. 2002-198997 and No. 2001-188732 only attempt to classify addresses corresponding to the total number of devices (considering only one address assigned to each device), with no proposal of a technique for classifying multiple addresses assigned to one device.
While a communication protocol IPv4 (Internet Protocol version 4) has been used so far in the Internet, a next-generation protocol called IPv6 (Internet Protocol version 6) is being introduced today. Under such circumstances, among devices connectable to a network (e.g. printers), those supporting both IPv4/IPv6 and those supporting IPv6 only (hereinafter collectively referred to as “IPv6 devices”) are being put on the market in addition to conventional devices supporting IPv4 only. Such IPv6 devices are expected to increase rapidly in years to come.
Since the IPv6 standard allows for multiple addresses to be assigned to one device, an IPv6 device can have two or more addresses. A device supporting both IPv4/IPv6 has an IPv4 address in addition to the IPv6 address(es).
Therefore, when information on addresses assigned to an IPv6 device is displayed on a screen of a PC (Personal Computer) for example, simply displaying a random list (in which addresses assigned to an IPv6 device are arranged randomly) might be confusing to the user.
Especially, since IPv6 addresses include various types (addresses that become invalid when an expiration date comes, addresses having no expiration date, addresses differing in the area (extent) of the effective communication scope, etc.), if a random list of such IPv6 addresses is displayed on the screen, the user might be unable to recognize whether an address has an expiration date, whether an address having an expiration date is still valid, whether an address is usable in an intended communication scope etc. |
Police ask for help in capturing suspected killer on the loose
The New Orleans Police Department is looking for help from the public in capturing a a 31-year-old Kevin Mullens who is wanted for first degree murder and carjacking.
Kevin Mullens is wanted in connection to a homicide that occurred in Hammond, Louisiana, on June 13, 2016. According to the Hammond Police Department, Mullens and two others are responsible for the murder of 34-year-old William Davis of Hammond.
Detectives believe Mullens lives in the New Orleans area. He is considered armed and dangerous. The NOPD released a picture of Mullens, but they say he currently has shorter hair and no dreadlocks.
If you have any information about Mullens’ whereabouts, please contact NOPD Homicide detectives at 658-5300 or Crimestoppers at 822-1111 or toll-free 1-877-903-STOP.
After more than 14 days without phone service and the inability to use a medical alert system, a 96-year-old New Orleans woman's son turned to the FOX 8 Defenders for help. We got the family answers and action right away.
After more than 14 days without phone service and the inability to use a medical alert system, a 96-year-old New Orleans woman's son turned to the FOX 8 Defenders for help. We got the family answers and action right away. |
<template>
<view class="zk-html" v-if="widget">
<rich-text :nodes="widget.value.dataEditor"></rich-text>
</view>
</template>
<script>
export default {
data () {
return {
widgetModel: ''
}
},
props: {
widget: {}
},
mounted () {
this.init()
},
methods: {
async init () {
this.widgetModel = await this.$api.themeWidget(this.widget)
}
}
}
</script>
<style lang="scss">
@import "@/assets/style/variable.scss";
.zk-html {
font-size: $gl-size-base;
}
</style>
|
Stability of polylactic acid particles and release of fluorochromes upon topical application on human skin explants.
Particle-based drug delivery systems allow the controlled and targeted release of incorporated active compounds to the skin and are promising tools to improve the efficacy of topical therapies. In this study we investigated the stability and release properties of biodegradable polylactic acid (PLA) particles upon topical application on human skin explants. PLA particles loaded with the hydrophilic fluorochrome 4-Di-2-Asp (DiAsp-PLA) were compared to PLA particles loaded with the lipophilic fluorochrome Bodipy 630/650 (BP-PLA). Changes of the particle morphology after their incubation on skin surface were investigated by means of electron microscopy while fluorescence microscopy and flow cytometry were used to evaluate particle penetration in hair follicles and fluorochrome release. We found that BP-PLA particles released rapidly the loaded fluorochrome and lost the particulate morphology within a few hours after application on skin surface. On the contrary, DiAsp-PLA particles maintained the particulate morphology, accumulated in hair follicles, and allowed a constant release of the incorporated fluorochrome for up to 16 h. These results show that, once applied to skin surface, PLA particles release the incorporated fluorochromes in a time-dependent manner and suggest the perspective to modulate particle stability and release properties by incorporating excipients with different degree of lipophilicity. |
c-Kit expression and stem cell factor-induced hematopoietic cell proliferation are up-regulated in aged B6D2F1 mice.
Expression of c-Kit (CD117) and stem cell factor/c-Kit-mediated cell proliferation were tested in vitro in young and old B6D2F1 mice to study the role of c-Kit signaling in hematopoietic stem cell (HSC) senescence. Increasing age is associated with a significant increase in bone marrow (BM) cells without affecting mature blood cells. The number of c-Kit-expressing BM cells increased significantly in old mice when compared to young controls, to 201% in total BM cells, 261% in Lin(-) cells, 517% in Lin(-)CD34(+)Sca1(+) progenitor cells, and 1272% in Lin(-)CD34(-)Sca1(+) HSCs. Sorted Lin(-)Sca1(+)CD117(+) BM cells from an old mouse expanded 5-fold when cultured in vitro for 72 hours with stem cell factor at 25 ng/ml, which was significantly higher than a 2.5-fold expansion of the same cells from a young donor. HSCs and progenitor cells from B6D2F1 mice maintain extremely high proliferative potentials and do not reach proliferative arrest at old age during a normal life span. |
Welcome back to Midweek Madness. Every Wednesday, we board the gossip express, speeding through space and time as we read Ok!, In Touch, Life & Style, Us and Star. This week we learned that Kate Middleton's slender frame has forced Kim Kardashian to go on a crash diet for her wedding day; the lady from The Bachelorette may be engaged, but she's on her way to Splitsville; and Marc Anthony has a fondness for flight attendants and model trains.
Ok!
"Brad's Mystery Woman!"
We've heard this story before, but here it again: Brad Pitt was photographed walking next to a young brunette woman on the set of the zombie movie he is filming in Malta, World War Z, and since they were seen talking and laughing, "Angie can't take it anymore." In fact, the mag points out: "Now, after six years, maybe Angelina Jolie knows how Jennifer Aniston felt." Ugh. Brad is "laying down the law" and insisting that Angelina "chill out," but she's suspicious because she "always hooked up on set." Also inside: Kim Kardashian has allegedly picked her wedding dress. Actually, Vera Wang has made her three different dresses. We kind of hope she wears them all at the same time. Layers! Insiders claim Kim's gown is strapless with a cascading train and intricate decorations on the bodice because "she wanted something different and unique." Except that sounds like every single wedding dress you have ever seen. Lastly, in JLo and Marc news, they split because he had a wandering eye and he's been spending time with his ex-wife, Dayanara Torres (possibly because they have two kids together). Meh.Grade: F (derailed freight train)
Advertisement
In Touch
"I'm Terrified Of Being Poor."
Okay. So Teresa from RHONJ has been teased by her castmates ever since her husband's company filed for bankruptcy, but now Teresa and Joe have a new motto: "It's isn't about how much money you make, it's about how much you save." Pro. Found. Meanwhile, Teresa is "terrified of being poor" and "trying to build an empire," and the bricks of that empire are a cookbook, her own cocktail and a line of cosmetics. Next: Kourtney Kardashian got an "instant butt lift" by wearing heels. Unfortunately, she was also wearing a hideous yellow jumpsuit made from Von Trapp family curtains (See Fig. 1). Brad and Angelina are fighting over Shiloh, and it's all Brad's mom's fault. Grandma Jane thinks Shiloh is wild and rebellious and she blames Angelina for that, of course. Apparently Shiloh has been "forgotten," because the twins are always being carried. Plus, Shiloh has asked Angelina to stop traveling, and Jane agrees. Brad is torn, sniffle. Marc Anthony's huge mistake in his marriage was trying to turn Jennifer Lopez into a traditional housewife. Marc thinks the man should be the breadwinner — and he has "an unpredictable and crazy temper." We'll take Latino stereotypes for $500, Alex! The lady from The Bachelorette has allegedly chosen the man who will propose to her, and it's J.P. But. He will never marry her, according to sources, because she is insecure. He likes peppy, confident girls, and once she shows who she really is he'll go back to dating "carefree NYC ladies." Kim Kardashian is on a "crash wedding diet." She is "panicking" because she used to be "way fitter" and she "looks chunky beside Kris." That's her fiancé Kris, not her mom Kris. Apparently, after seeing Kate Middleton "and her skinny sister Pippa," Kim will not settle for anything but a size 2 body on her wedding day. Not only is she working out at home and in the gym with Tracy Anderson and Gunnar Peterson, she's going on a 10-day juice fast. Sounds like she'll be spending a lot of time in the loo. Sexy.Grade: D- (runaway sooty coal mine cart)
Life & Style
"Secrets Of The Proposal."Ashley from The Bachelorette was in Fiji and SOMEONE proposed, but even though JP is on the cover, the story inside is very vague about who the "soulmate" is. But she got a 3.5 carat ring and she is back in dental school, where one can only hope she doesn't drop the rock down a patient's throat while examining his molars. Anyway, Ashley is ready to move to where her man lives. What else? Maci from Teen Mom is "thinking about" not having her son Bentley grow up on TV. Just thinking. No decisions have been made. Amber is in rehab, but thinks her ex, Gary, is using their daughter to make money — he started a Twitter account in the kid's name. Did you know that Gary has a line of T-shirts called GARY TIME? Yes. Gary Time. In JLo news, there was a third wheel in the Jennifer Lopez/Marc Anthony relationship, and that wheel was her career. Dun dun dun. Oh, and Marc had Benny Medina fired when he and Jen first got together — Marc hated another man controlling his woman's life; that's his job. But Jennifer rehired Benny recently, which made Marc furious. Also: Jennifer Lopez's mom says Jennifer Lopez is in love with love and jumps into relationships too quickly. We skipped the story about Elin Nordegren finding love with a dude who probably slept with Rachel Uchitel. On purpose. URGENT ROAD TRIP ALERT: Ryan Gosling and Bradley Cooper are renting a home together in Schenectady, New York, so clearly we need to be driving aimlessly around that town. Olivia Wilde will play Linda Lovelace in a movie about the porn star, and James Franco and Justin Timberlake are also being considered for roles. Jennifer Aniston took Justin Theroux to meet her dad for lunch at a steakhouse in L.A. They ate lobster, they drank wine, they had a great time. Breaking: "Shiloh Loses Another Tooth." Shiloh thinks her smile is "cool" now because she looks like a pirate. Last: Kendra and Hank are waiting to have another baby — first they need one more hot photo together in which Kendra is wearing a sexy dress.Grade: D (clogged steam engine)
Us
"Her Side Of The Story."
You may think that this is an interview with Jennifer Lopez. You'd be wrong! Just a collection of quotes from "sources" and "insiders." We learn that Marc Anthony had raging jealousy issues and an insatiable need to meddle in JLo's business and wardrobe. Even though he was always making horrible business decisions, Marc forced Jen to go along with them — the terrible movie El Cantante, for instance. Also, he gave Jennifer awful suggestions for her clothing line. He even went with her to photo shoots and said which photos could be used and which could not. Marc could not stand JLo working around men who were remotely attractive — unless he was supervising — and he accused Jenny From The Block of being unfaithful, but he was the one who, in 2009, hooked up with a flight attendant he met on a private plane. Jennifer was fed up with Marc's bad money management skills — and had to pay off the $2.5 million he owed in back taxes. Plus: He smoked, which she hated. The arguing had gotten so bad that he was living at the Hilton in LA, a few miles from home. Forty years from now this will be a gripping movie of the week. Next, here's a picture of Sarah Ramirez from Grey's Anatomy being proposed to in Paris. (See Fig. 2). 50 Cent and his girlfriend Daphne Joy have broken up. Jenna Dewan and Channing Tatum have celebrated their 2nd wedding anniversary. Finally: Does natural childbirth hurt? Here's where different celebs fall on a scale of ecstasy to agony (See Fig. 3).Grade: D+ (brakeless bullet train)
Star
"Plastic Surgery Confessions."
Here we have 11 pages of random famous and semi-famous people and their creepy surgery faces or "botched boob jobs." Victims include Heidi Montag, Lisa Rinna, Courteney Cox, Omarosa, Gene Simmons and Shannon Tweed. Priscilla Caputo, we don't know who you are, but you are terrifying. (See Fig. 4) Moving on: "Britney Is A Pig" is about the lawsuit her bodyguard filed alleging unwanted sexual harassment and other grossness. Bad personal hygiene, etc. Next: Someone named Morgain McGovern talks about her drug and booze-fueled adventures with Chelsea Handler. Ecstasy! Cocaine! Drinking! Kirstie Alley doesn't want to have plastic surgery, but she feels like she must, because she lost all that weight and things need… tightening. Julianne Hough has been hanging out with her Rock of Ages costar Diego Boneta, and Ryan Seacrest "blew a gasket" when he saw pictures of them splashing by the pool in Miami. Avril and Brody are having "tough times" in their relationship because he feels like she treats him like a doormat. Lindsay Lohan is maybe dating Spencer Falls, who is part of "Sparah," that fake celeb couple cooked up by Virgin Mobile. Leo and Blake had dinner to talk about their relationship. He drank so much that she told him to slow down. Blake was mad because Leo took his mom to his friend's wedding instead of her, and he was mad that she didn't make a good impression on his mom when they met. In JLo and Marc news, she wanted to leave the marriage as early as Christmas of last year. His jealousy, their unequal fame, and his partying with his trainsets led to sexless nights. See, Marc Anthony has model trains in one room of the house, and he would go up there and close the door and "party," whatever that means. Cough. Ahem. Marc was also jealous of JLo's relationship with superfun old person Steven Tyler. We bet Steven Tyler doesn't play with trains. Or if he does, they are kick-ass rock trains, and anyone can join him.Grade: C- (subway stuck in tunnel) |
/* -*- mode: C++; c-basic-offset: 4; indent-tabs-mode: nil -*- */
// vim: ft=cpp:expandtab:ts=8:sw=4:softtabstop=4:
#ident "$Id$"
/*======
This file is part of PerconaFT.
Copyright (c) 2006, 2015, Percona and/or its affiliates. All rights reserved.
PerconaFT is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License, version 2,
as published by the Free Software Foundation.
PerconaFT is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with PerconaFT. If not, see <http://www.gnu.org/licenses/>.
----------------------------------------
PerconaFT is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License, version 3,
as published by the Free Software Foundation.
PerconaFT is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU Affero General Public License for more details.
You should have received a copy of the GNU Affero General Public License
along with PerconaFT. If not, see <http://www.gnu.org/licenses/>.
======= */
#ident "Copyright (c) 2006, 2015, Percona and/or its affiliates. All rights reserved."
#include "test.h"
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <memory.h>
#include <sys/stat.h>
#include <db.h>
#include <ft/txn/xids.h>
#define MAX_NEST MAX_TRANSACTION_RECORDS
#define MAX_SIZE MAX_TRANSACTION_RECORDS
/*********************
*
* Purpose of this test is to verify nested transactions, including support for implicit promotion
* in the presence of placeholders and branched trees of transactions.
*
create empty db
for test = 1 to MAX
for nesting level 0
- randomly insert or not
for nesting_level = 1 to MAX
- begin txn
- randomly perform four operations, each of which is one of (insert, delete, do nothing)
- if insert, use a value/len unique to this txn
- query to verify
for nesting level = MAX to 1
- randomly abort or commit each transaction or
- insert or delete at same level (followed by either abort/commit)
- branch (add more child txns similar to above)
- query to verify
delete db
*
*/
enum { TYPE_DELETE = 1, TYPE_INSERT, TYPE_PLACEHOLDER };
uint8_t valbufs[MAX_NEST][MAX_SIZE];
DBT vals [MAX_NEST];
uint8_t keybuf [MAX_SIZE];
DBT key;
uint8_t types [MAX_NEST];
uint8_t currval[MAX_NEST];
DB_TXN *txns [MAX_NEST];
DB_TXN *txn_query;
DB_TXN *patient_txn;
int which_expected;
static void
fillrandom(uint8_t buf[MAX_SIZE], uint32_t length) {
assert(length < MAX_SIZE);
uint32_t i;
for (i = 0; i < length; i++) {
buf[i] = random() & 0xFF;
}
}
static void
initialize_values (void) {
int nest_level;
for (nest_level = 0; nest_level < MAX_NEST; nest_level++) {
fillrandom(valbufs[nest_level], nest_level);
dbt_init(&vals[nest_level], &valbufs[nest_level][0], nest_level);
}
uint32_t len = random() % MAX_SIZE;
fillrandom(keybuf, len);
dbt_init(&key, &keybuf[0], len);
}
static DB *db;
static DB_ENV *env;
static void
setup_db (void) {
int r;
toku_os_recursive_delete(TOKU_TEST_FILENAME);
toku_os_mkdir(TOKU_TEST_FILENAME, S_IRWXU+S_IRWXG+S_IRWXO);
r = db_env_create(&env, 0); CKERR(r);
r = env->open(env, TOKU_TEST_FILENAME, DB_INIT_MPOOL | DB_INIT_LOG | DB_INIT_LOCK | DB_INIT_TXN | DB_PRIVATE | DB_CREATE, S_IRWXU+S_IRWXG+S_IRWXO);
CKERR(r);
{
DB_TXN *txn = 0;
r = env->txn_begin(env, 0, &txn, 0); CKERR(r);
r = db_create(&db, env, 0); CKERR(r);
r = db->open(db, txn, "test.db", 0, DB_BTREE, DB_CREATE, S_IRWXU+S_IRWXG+S_IRWXO); CKERR(r);
r = txn->commit(txn, 0); CKERR(r);
}
r = env->txn_begin(env, NULL, &txn_query, DB_READ_UNCOMMITTED);
CKERR(r);
}
static void
close_db (void) {
int r;
r = txn_query->commit(txn_query, 0);
CKERR(r);
r=db->close(db, 0); CKERR(r);
r=env->close(env, 0); CKERR(r);
}
static void
verify_val(uint8_t nest_level) {
assert(nest_level < MAX_NEST);
if (nest_level>0) assert(txns[nest_level]);
assert(types[nest_level] != TYPE_PLACEHOLDER);
int r;
DBT observed_val;
dbt_init(&observed_val, NULL, 0);
r = db->get(db, txn_query, &key, &observed_val, 0);
if (types[nest_level] == TYPE_INSERT) {
CKERR(r);
int idx = currval[nest_level];
assert(observed_val.size == vals[idx].size);
assert(memcmp(observed_val.data, vals[idx].data, vals[idx].size) == 0);
}
else {
assert(types[nest_level] == TYPE_DELETE);
CKERR2(r, DB_NOTFOUND);
}
}
static uint8_t
randomize_no_placeholder_type(void) {
int r;
r = random() % 2;
switch (r) {
case 0:
return TYPE_INSERT;
case 1:
return TYPE_DELETE;
default:
assert(false);
return 0;
}
}
static uint8_t
randomize_type(void) {
int r;
r = random() % 4;
switch (r) {
case 0:
return TYPE_INSERT;
case 1:
return TYPE_DELETE;
case 2:
case 3:
return TYPE_PLACEHOLDER;
default:
assert(false);
return 0;
}
}
static void
maybe_insert_or_delete(uint8_t nest, int type) {
int r;
if (nest>0) assert(txns[nest]);
types[nest] = type;
currval[nest] = nest;
switch (types[nest]) {
case TYPE_INSERT:
r = db->put(db, txns[nest], &key, &vals[nest], 0);
CKERR(r);
break;
case TYPE_DELETE:
r = db->del(db, txns[nest], &key, DB_DELETE_ANY);
CKERR(r);
break;
case TYPE_PLACEHOLDER:
types[nest] = types[nest - 1];
currval[nest] = currval[nest-1];
break;
default:
assert(false);
}
verify_val(nest);
}
static void
start_txn_and_maybe_insert_or_delete(uint8_t nest) {
int iteration;
int r;
for (iteration = 0; iteration < 4; iteration++) {
bool skip = false;
if (nest == 0) {
types[nest] = randomize_no_placeholder_type();
assert(types[nest] != TYPE_PLACEHOLDER);
//Committed entry is autocommitted by not providing the txn
txns[nest] = NULL;
}
else {
if (iteration == 0) {
types[nest] = randomize_type();
r = env->txn_begin(env, txns[nest-1], &txns[nest], 0);
CKERR(r);
if (types[nest] == TYPE_PLACEHOLDER) skip = true;
}
else {
types[nest] = randomize_no_placeholder_type();
assert(types[nest] != TYPE_PLACEHOLDER);
}
}
maybe_insert_or_delete(nest, types[nest]);
assert(types[nest] != TYPE_PLACEHOLDER);
if (skip) break;
}
}
static void
initialize_db(void) {
types[0] = TYPE_DELETE; //Not yet inserted
verify_val(0);
int i;
for (i = 0; i < MAX_NEST; i++) {
start_txn_and_maybe_insert_or_delete(i);
}
}
static void
test_txn_nested_jumble (int iteration) {
int r;
if (verbose) { fprintf(stderr, "%s (%s):%d [iteration # %d]\n", __FILE__, __FUNCTION__, __LINE__, iteration); fflush(stderr); }
initialize_db();
r = env->txn_begin(env, NULL, &patient_txn, 0);
CKERR(r);
int index_of_expected_value = MAX_NEST - 1;
int nest_level = MAX_NEST - 1;
int min_allowed_branch_level = MAX_NEST - 2;
futz_with_stack:
while (nest_level > 0) {
int operation = random() % 4;
switch (operation) {
case 0:
//abort
r = txns[nest_level]->abort(txns[nest_level]);
CKERR(r);
index_of_expected_value = nest_level - 1;
txns[nest_level] = NULL;
nest_level--;
verify_val(index_of_expected_value);
break;
case 1:
//commit
r = txns[nest_level]->commit(txns[nest_level], DB_TXN_NOSYNC);
CKERR(r);
currval[nest_level-1] = currval[index_of_expected_value];
types[nest_level-1] = types[index_of_expected_value];
index_of_expected_value = nest_level - 1;
txns[nest_level] = NULL;
nest_level--;
verify_val(index_of_expected_value);
break;
case 2:;
//do more work with this guy
int type;
type = randomize_no_placeholder_type();
maybe_insert_or_delete(nest_level, type);
index_of_expected_value = nest_level;
continue; //transaction is still alive
case 3:
if (min_allowed_branch_level >= nest_level) {
//start new subtree
int max = nest_level + 4;
if (MAX_NEST - 1 < max) {
max = MAX_NEST - 1;
assert(max > nest_level);
}
int branch_level;
for (branch_level = nest_level + 1; branch_level <= max; branch_level++) {
start_txn_and_maybe_insert_or_delete(branch_level);
}
nest_level = max;
min_allowed_branch_level--;
index_of_expected_value = nest_level;
}
continue; //transaction is still alive
default:
assert(false);
}
}
//All transactions that have touched this key are finished.
assert(nest_level == 0);
if (min_allowed_branch_level >= 0) {
//start new subtree
int max = 4;
assert(patient_txn);
txns[1] = patient_txn;
patient_txn = NULL;
maybe_insert_or_delete(1, randomize_no_placeholder_type());
int branch_level;
for (branch_level = 2; branch_level <= max; branch_level++) {
start_txn_and_maybe_insert_or_delete(branch_level);
}
nest_level = max;
min_allowed_branch_level = -1;
index_of_expected_value = nest_level;
goto futz_with_stack;
}
//Clean out dictionary
types[0] = TYPE_DELETE;
r = db->del(db, NULL, &key, DB_DELETE_ANY);
CKERR(r);
verify_val(0);
}
int
test_main(int argc, char *const argv[]) {
parse_args(argc, argv);
initialize_values();
int i;
setup_db();
for (i = 0; i < 64; i++) {
test_txn_nested_jumble(i);
}
close_db();
return 0;
}
|
93 A.2d 920 (1953)
In re GRIFFITH.
Misc. No. 15.
Court of Chancery of Delaware, New Castle.
January 19, 1953.
John M. Metten, Wilmington, for J. Watson Miller, Sr., successor-trustee for Albert Miller Griffith.
Thomas Herlihy, Jr. and Morris Cohen, Wilmington, for Edith Baker, executrix under the last will and testament of Hattie Griffith, deceased.
*921 BRAMHALL, Vice-Chancellor.
On March 12, 1948, Hattie Griffith was appointed by this court as trustee for her husband, Albert Miller Griffith, an insane person. She was duly qualified and acted as such trustee until her death on November 12, 1950. No inventory or accounting was ever filed with this court by Hattie Griffith during her lifetime. On November 22, 1950, Edith Baker was appointed as executrix under the last will and testament of Hattie Griffith, deceased. On *922 December 18, 1950, J. Watson Miller, Sr. was appointed by this court as successor-trustee for the estate of the said Albert Miller Griffith.
On March 7, 1951, Edith Baker filed her first and final account on behalf of Hattie Griffith, the original trustee for Albert Miller Griffith. Exceptions to this account were filed on behalf of J. Watson Miller, Sr., the present trustee, on April 19, 1951. The facts relative to these exceptions will be hereafter set forth as they relate to the particular exception under consideration.
Numerous exceptions were taken to this account. By stipulation of counsel it was agreed that only certain exceptions should be considered. The following questions are presented for determination:
(1) Failure of accountant to account for jointly owned personal property;
(2) The right of Hattie Griffith to charge the estate for expenses of the home incurred during her occupancy;
(3) Trustee's commissions.
1. Failure of accountant to account for jointly owned personal property.
This exception relates to a 1940 Plymouth automobile, valued at $650, and a joint bank account in the Artisans Savings Bank, amounting to the sum of $2,856.28. On October 18, 1950, the savings account was withdrawn in full by Hattie Griffith and redeposited in an account in her own name.
It is not disputed that this personal property was held by the husband and wife as tenants by the entireties. See Hoyle v. Hoyle, 31 Del.Ch. 64, 66 A.2d 130. In this state, under an estate by the entireties, the husband and wife hold nothing in severalty during the continuance of the estate, each owning the whole estate subject to being divested thereof upon his or her death prior to the death of the other tenant by the entireties. Sidwell v. Sidwell, 5 W.W.Harr. 322, 165 A. 334; Huber v. Penn Mutual Fire Insurance Co., 3 Terry 369, 33 A.2d 729. Such estate cannot be destroyed by the act of one party without the consent of the other. Hoyle v. Hoyle, supra; Carlisle v. Parker, 8 W. W.Harr. 83, 188 A. 67.
The record is silent as to what, if any, use was made by Hattie Griffith of the money which she withdrew from the joint account and redeposited in her own name. There is nothing before the court to show that she used any of this money for the benefit of her husband or for her husband and herself jointly. The question for determination therefore is what was the effect upon the estate by the entireties of the withdrawal by Hattie Griffith of the whole of the account.
In the case of Hoyle v. Hoyle, supra, this court, adopting the language used in the case of Berhalter v. Berhalter, 315 Pa. 225, 173 A. 172, construed the withdrawal of the account in that case as an offer on the part of the person making the withdrawal to terminate the tenancy by the entireties. This court further stated that the action of the other tenant by the entireties in seeking a division of the fund, constituted an acceptance of the offer. The present case is distinguished from the Hoyle case in that Albert Miller Griffith, the other tenant by the entireties, had been adjudicated an insane person. He could not therefore give his consent to such an offer and his trustee would not have the authority to do so on his behalf. In fact, she was bound to take all proper and reasonably necessary steps to protect, preserve and safeguard the property of the trust estate. It was her duty as trustee to restore to the trust estate any property or funds which she may have appropriated to herself or which she may have wrongfully aliened or encumbered to another. Her duty in that respect was not terminated by her death. See cases cited in 54 Am.Jur., § 338, p. 266.
The record shows only a withdrawal of the account and a redeposit of the same amount in her own name, without any explanation therefor or without any accounting as to the amount withdrawn or any part thereof. The fact that the trustee attempted to destroy the relationship of tenants by the entireties by the withdrawal of the funds does not change the rights of the parties in any respect for she could *923 not destroy this relationship without the consent of her husband. Hoyle v. Hoyle, supra. This consent he was unable to give and she as his trustee was duty bound not to impair the assets of the trust estate.
There is no presumption flowing from the marital relationship that one spouse in attempting to transfer an estate held by the parties by entirety acted as agent for the other. Grambo v. South Side Bank & Trust Co., 141 Pa.Super. 176, 14 A.2d 925. The fact that the husband's mental or physical condition was such that he was incapable of transacting business would not constitute the wife as general agent or vest her with a general or unlimited authority as to all his affairs. Barron v. McChesney, 198 Iowa 657, 200 N.W. 197-198. Since in withdrawing the account and converting the money to her own use the trustee acted without authority, the proceeds of such act would inure to the benefit of both and the estate by the entireties was not terminated. Kauffman v. Stenger, 151 Pa.Super. 313, 30 A.2d 239, and cases cited in 41 C.J.S., Husband and Wife, § 35, p. 485.
Where as here, the whole of the account was withdrawn, the joint form of the account, of itself, raises a presumption of fact or inference that the joint interest of the depositors follows the funds withdrawn by either and negatives the idea that such withdrawals were severed from the joint estate and appropriated by the drawer to her own use. O'Connor v. Dunnigan, 158 App.Div. 334, 143 N.Y.S. 373, affirmed in 213 N.Y. 676, 107 N.E. 1082; Ambruster v. Ambruster, 326 Mo. 51, 31 S.W.2d 28, 77 A.L.R. 782, Moskowitz v. Marrow, 251 N.Y. 380, 167 N.E. 506, 66 A.L.R. 870.
The facts in the case of O'Connor v. Dunnigan, supra, [158 App.Div. 334, 143 N.Y.S. 373] are quite similar to those in the present case. In that case a man and wife deposited moneys in a bank in their joint names with the provision "Pay to either or the survivor of either". The wife withdrew all the moneys and deposited them in a bank to her own individual credit. Three days afterwards she died. An action was brought by the husband against the executors of the wife's will to recover the moneys withdrawn. In decreeing a recovery of all the moneys withdrawn by the wife, the court said: "It would be preposterous to claim that an appropriation of personal property by one joint owner to his personal use could divest the interest of the other joint owner". The O'Connor case was cited with approval by the Moskowitz and Ambruster cases above cited.
The automobile in question was also held by the husband and wife as tenants by the entireties. It also, or the proceeds thereof, became the property of the husband upon the death of the wife.
I therefore conclude that the husband, Albert Miller Griffith, is entitled, as the surviving tenant by the entireties, to the whole of the bank account and to the automobile or the reasonable value thereof.
2. The right of Hattie Griffith to charge the estate for expenses of the home incurred during her occupancy.
The second question raised by the exceptions concerns certain charges, including taxes, water rent, insurance, sewer rent, and other disbursements for which the accountant has taken credit , in the maintenance of the home owned by Hattie Griffith and her husband, Albert Miller Griffith, as tenants by the entireties. It is contended by the successor-trustee for Albert Miller Griffith that the accountant was without authority to charge the estate of Albert Miller Griffith for expenses incurred on said property during the period of the occupancy thereof by the deceased on the ground that these expenditures were for her exclusive benefit.
I do not agree with this contention. As previously stated, the property was owned by the deceased and her husband as tenants by the entireties. It was the home of both of them. Upon his recovery the husband could have returned. As far as the record shows, no attempt was ever made by the deceased to exclude him therefrom or to limit him in his enjoyment thereof. Apparently the income from the estate was sufficient to pay the expenses *924 of Albert Miller Griffith at Farnhurst and leave something over for the maintenance of his home and family. The fact that he was under a disability did not relieve him of his responsibility for the maintenance of his home and the support of his family if the income from his estate should be sufficient to so provide. See decisions cited in 44 C.J.S., Insane Persons, § 115. The items to which exception has been taken were necessary for the maintenance of their home and for the preservation of the estate by the entireties. No other provision was made on behalf of Albert Miller Griffith for the maintenance of the joint home of himself and his wife or for the maintenance of the wife. It does not appear that the expenditures were of a kind which could not have been authorized by order of the Chancellor, if the trustee had sought in advance specific authority for making them. This being so, the mere fact that they were unauthorized does not necessarily mean that they must be disallowed. Although expenses be not properly incurred, the trustee is entitled to credit for them "if and to the extent to which he has thereby in good faith benefited the trust estate". In re Schwartz, 26 Del.Ch. 121, 23 A.2d 822, 827.
The exceptions as to these items will be dismissed.
3. Trustee's Commissions.
The last question raised by the exceptions relates to the right of the accountant to charge commissions in the administration of the estate of Albert Miller Griffith, based upon the fact that Hattie Griffith in her lifetime failed to file an inventory or appraisal of the estate. No account was ever filed by Hattie Griffith in her lifetime accounting for her administration of the estate.
It is true that no inventory or appraisal was filed during the lifetime of Hattie Griffith. However, it is not shown that the estate has suffered in any manner by reason thereof. Her services were definitely valuable in the collection of the income and in the preservation of the principal of the estate. In addition, it must be considered that Hattie Griffith in her lifetime received no direct support from her husband's estate. She collected the rents on the various properties of the estate of her husband, kept them rented and presumably from the number of bills for repairs as shown in the final account, maintained the properties in a reasonable state of repair. There were seven parcels of real estate under the supervision of Hattie Griffith, four of which were occupied by tenants. The period of her administration was for two years and eight months. Considering the fact that the estate was otherwise apparently well administered and also taking into consideration the fact that Hattie Griffith received nothing therefrom as the wife of Albert Miller Griffith, directly for her support, I do not feel that this item should be disturbed. This exception will be dismissed.
An order will be signed on notice in accordance with this opinion.
|
Lines leaves Bosham
Staff reporter
Bosham FC are seeking a new first-team manager after the surprise resignation of Gary Lines.
Lines led the Robins to the SCFL Division 2 Cup last season and the side also did well in the league, although couldn't quite land the title again.
Bosham said Lines' decision to stand down was for personal and family reasons.
A statement from the Walton Lane outfit said: "Bosham Football Club would like to place on record their thanks to Gary, Paul Marsh and their backroom team for all their efforts throughout their season-long tenure - which delivered the Division Two Cup to Walton Lane, and a fifth-placed League finish."
The Reds are looking for someone who is 'well organised, available and committed for both midweek training sessions and Saturday fixtures' and added: "They should hold a minimum of an FA Level 1 coaching badge, ideally with previous experience at a similar level, and work cohesively with the reserve team and under 18's management, promoting a 'one club' ethos. Contacts to strengthen the existing playing squad would be seen as distinctly advantageous.
"The new management will be backed by an ambitious and proactive committee, in working to the continued development and success of the club - which has benefited from both Sport England and the Football Foundation funding in recent seasons.
"Danny Mullen has been put in caretaker charge to oversee pre-season training - taking place at Farlington Marshes - until a permanent successor is found. A roster of pre-season friendlies is already in place, with the SCFL Division Two season to commence on Saturday, August 18.
CV's with a covering email should be marked to chairman Neil Redman to be sent to neilsa@hotmail.com, no later than Sunday, July 8." |
Subclinical trauma to perineum: a possible etiology of erectile dysfunction in young men.
A substantial number of young men with erectile dysfunction have neither systemic disease nor a trauma in their history. We are familiar with impotence after major trauma but it is an unanswered question whether subclinical trauma may also induce arterial degeneration with subsequent erectile dysfunction. In a period of 36 months 129 patients underwent penile arteriography. After excluding those with major surgery, trauma or psychogenic impotence 91 angiograms were reevaluated. Special attention was paid to atherosclerotic and to focal occlusive arterial disease (> 50% stenosis) in the hypogastric-cavernous branch. 12 angiograms showed normal arteries, 59 typical atherosclerotic and 20 focal occlusive arterial disease. The mean age of patients with atherosclerosis was 53 +/- 8 years versus 35 +/- 14 years of those with focal lesions (p < 0.0001). 30% with focal arterial lesions were subject to subclinical trauma. 68% with atherosclerotic disease had clinical relevant atherosclerotic risk factors. Latency between onset of erectile dysfunction and presentation at the impotence clinic was 51 months in patients with focal lesions and 39 months in those with atherosclerotic disease (nonsignificant). We conclude that subclinical trauma of the hypogatric-cavernous arteries can induce focal arterial lesions with significant impairment of perfusion. This pathology may contribute to erectile dysfunction. These patients are significantly younger and they suffer from clinically evident impotence approximately 18 years earlier than patients whose impotence is clearly of atherosclerotic origin. Focal arterial lesions due to subclinical trauma are described for the first time as an etiology of erectile dysfunction. Further studies are needed to confirm these results. |
---
abstract: 'We develop a theory of $L^p$ spaces based on outer measures generated through coverings by distinguished sets. The theory includes as special case the classical $L^p$ theory on Euclidean spaces as well as some previously considered generalizations. The theory is a framework to describe aspects of singular integral theory such as Carleson embedding theorems, paraproduct estimates and $T(1)$ theorems. It is particularly useful for generalizations of singular integral theory in time-frequency analysis, the latter originating in Carleson’s investigation of convergence of Fourier series. We formulate and prove a generalized Carleson embedding theorem and give a relatively short reduction of the most basic $L^p$ estimates for the bilinear Hilbert transform to this new Carleson embedding theorem.'
address:
- 'Yen Do, Department of Mathematics, Yale University, New Haven, CT 06511, USA'
- 'Christoph Thiele, Mathematisches Institut, Universität Bonn, Endenicher Alle 60, D-53115 Bonn, and Department of Mathematics, UCLA, Los Angeles, CA 90095, USA'
author:
- Yen Do
- Christoph Thiele
title: $L^p$ theory for outer measures and two themes of Lennart Carleson united
---
Introduction {#s.intro}
============
Two seminal papers of Lennart Carleson of the 1960’s each introduced a new tool into analysis that had profound influence. In his paper [@carleson1], [*Interpolation by bounded analytic functions and the corona problem*]{}, he introduced what later became known as Carleson measures. Carleson measures revolutionized singular integral theory, where they are for example related to the space $BMO$, and related areas in real and complex analysis. In his celebrated paper [@carleson], [*On convergence and growth of partial sums of Fourier series*]{}, Carleson introduced what we now call time-frequency analysis. Time-frequency analysis has remained until now an indispensable tool for its original application of controlling Fourier series pointwise as well as a number of other applications including $L^p$ estimates for the bilinear Hilbert transform. Our present paper shows that a natural $L^p$ theory for outer measures offers a unifying language for both Carleson measures and time-frequency analysis. The fundamental nature of our $L^p$ theory for outer measures might in hindsight be an explanation for the important role of Carleson measures.
This paper is divided into three parts. In the first part, Sections \[outermeasure\] and \[lptheory\], we carefully develop the basic $L^p$ theory for outer measure spaces. This part is in nature open ended and will hopefully lead to further investigations of outer measure spaces. We have focused only on those aspects of the theory that are directly relevant for the applications that we have in mind in the other parts of this paper.
Outer measures are subadditive set functions. In contrast to measures, outer measures do not necessarily satisfy additivity for disjoint finite or countable collections of sets. Some outer measures give rise to interesting measures by restriction to Caratheodory measurable sets, the most prominent example is classical Lebesgue theory. However, general outer measures need not give rise to interesting measures and one is led to studying outer measure spaces for their own sake. Lacking additivity for disjoint sets one can not expect a useful linear theory of integrals with respect to outer measure. A good replacement is a sub-linear or quasi sub-linear theory, which leads directly to norms or quasi norms rather than integrals. Naturally, $L^p$ norms are among the most basic norms to consider in the context of outer measures.
There is a rich literature on outer measures, for example on capacity theory. In contrast to previously developed theories based on the Choquet integral, we do not in general base our $L^p$ theory on the outer measure of super level sets $\{x:f(x)>\lambda\}$ for a function $f$. Instead, we use a more subtly defined quantity (Definition \[superleveldefinition\]) to replace the outer measure of a super level set. This new quantity, which we call [*super level measure*]{}, involves pre-defined averages over the generating sets of the outer measure. If the pre-defined averages are of $L^\infty$ type, the super level measure specializes to the outer measure of the super level set, but in general the two quantities are quite different. Once we have introduced the super level measure, the $L^p$ theory develops in standard fashion, and we develop it to the extend that we need for subsequent parts of the paper.
In the second part of this paper, Section \[t1section\], we describe how outer measures can be used in the context of Carleson measures. It is our first example of an outer measure space in which our refined definition of super level measure does not coincide with the classical case of the outer measure of super level set. The outer measure space in question is the upper half plane and the outer measure is generated by tents. The essentially bounded functions with respect to the outer measure in this upper half plane are Carleson measures. Moreover, the identification of a function on the boundary with the harmonic extension in the enterior of the upper half plane, that is the Carleson embedding map, turns out a basic example of a bounded map from a classical $L^p$ space to an outer $L^p$ space. We describe in Section \[t1section\] how classical estimates for paraproducts and $T(1)$ theorems can be proved by an outer Hölder inequality together with such embedding theorems. In this setting, the use of outer $L^p$ spaces is very much in the spirit of the use of tent spaces introduced in [@coifmanms]. It is an artifact in this particular situation that our notion of outer measure may be replaced with more classical concepts.
The full power of the new outer $L^p$ spaces becomes evident in its applications in time-frequency analysis, that we discuss in the third part of this paper. The underlying space for the outer measure becomes the Cartesian product of the upper half plane with a real line. In this setting there are no evident analogues of the tent spaces of [@coifmanms] that one could use in place of outer $L^p$ spaces. We formulate and prove a novel generalized Carleson embedding theorem, Theorem \[gen.carl.emb\], in Section \[gentents\]. It is a compressed and elegant way to state an essential part of time-frequency analysis. In Section \[bhtsection\] we then use the generalized Carleson embedding theorem to reprove bounds for the bilinear Hilbert transform.
The generalized Carleson embedding theorem can also be used as an ingredient to prove almost everywhere convergence of partial Fourier integrals of $L^p$ functions with $2<p<\infty$. One would need an additional Carleson embedding theorem, either analoguos to the interplay between energy and mass in [@lacey-thiele], or analoguos to some vector valued version of the Carleson embedding theorem as in [@demeter-thiele]. We also envision the generalized Carleson embedding theorem and variants thereof to be useful in further advances in time-frequency analysis. We were led to the theory of outer $L^p$ spaces while working on variation norm estimates as in [@oberlin-et-al] in the setting of biest type operators as in [@MTT-BiestFourier]. For brevity of the present paper, and because of the various possible routes towards Carleson’s theorem, we decided to restrict this exposition to a discussion of the bilinear Hilbert transform. This already captures many essential parts of Carleson’s time-frequency analysis.
Gaining a streamlined view on time-frequency analysis was the original motivation for the present paper, which is the outcome of a long evolution process. In traditional time-frequency analysis, one proves bounds of multilinear forms passing through model sums $$\Lambda=\sum_{P\in \P} c_P \prod_{j=1}^n a_j(P)\ \ ,$$ where the summation index runs through a discrete set, typically a collection of rectangles (tiles) in the phase plane. The coefficients $c_P$ are inherent to the multilinear form, while the sequences $a_j$ each depend on one of the input functions for the multilinear form in question. There is a multitude of examples in the literature for the tile sequences $a_j$, the most basic example being normalized wave packet coefficients $$\label{mostbasic}a_j(P)=\<f,\phi_P\>$$ for the $L^1$ normalized wave packets $$\phi_P(x) = 2^{-k}\phi(2^{-k}x-n)e^{2\pi i 2^{-k} x l}\ \ ,$$ where $k,n,l$ are integers and parameterize the space $\P$, and $\phi$ is a suitably chosen Schwartz class function. These coefficients are much in the spirit of the embedding maps considered in Sections \[gentents\] and \[bhtsection\] of the present paper. Use of such wavepackets in the study of the bilinear Hilbert transform appears in [@lacey-thiele1]. In the dyadic model as in [@thiele], one defines wave packets with respect to abstract Fourier analysis on the group $\Z/2\Z$. More generally one can have tile semi-norms $$\label{e.standard-sequence}
a_j(P)=\sup_{\phi\in \Phi}|\<f,\phi_P\>|$$ where one maximizes and possibly also averages over a suitably chosen set $\Phi$ of generating functions. This approach has been useful in [@thiele-uniform] and more explicitly in [@MTT-uniform]. To prove bounds on Carleson’s operator, [@lacey-thiele] uses modified wave packets $$\label{e.carleson-sequence}
a_j(P)=\<f,\phi_P1_{\{(x,N(x))\in P\}}\>$$ for the linearizing function $N$ of the linearized Carleson operator. In some instances such as in [@MTT-BiestFourier], the definition of $a_j(P)$ may involve itself a multi-linear operator whose analysis requires another level of time-frequency analysis. For variational estimates of the Carleson operator as in [@oberlin-et-al], one has variational wave packets $$\label{e.varcarleson-sequence}
a_j(P) = \<f,\phi_P \sum_{k} v_k1_{\{(x,N_k)\in P_2, (x,N_{k-1})\not\in P\}}\>$$ for a sequence of linearizing functions $N_0(x)<N_1(x)<\dots$ and a sequence of dualizing functions $v_1(x),v_2(x),\dots \ \ ,$ such that for some $r>2$ we have the uniform bound $$\sum_{k} |v_k(x)|^{r'} = O(1) \ \ .$$ A point of the present paper is that in many of these examples the bound on $\Lambda$ is a Hölder inequality with respect to an outer measure on the space $P$ : $$|\Lambda|\le C \sup_{P\in P}|c_P| \prod_{j=1}^n \|a_j\|_{L^p_j(\P,\dots)}$$ where the dots stand for specifications of the outer measure structures in each example. The rest of the proof of boundedness of $\Lambda$ then becomes modular in that one has to prove bounds for each $j$ separately on the outer $L^p$ norms of the sequences $a_j$, estimates which take for example the form $$\|a_j\|_{L^p_j(\P,\dots)}\le \|f_j\|_p\ ,$$ where $f_j$ may be the corresponding input function to the original multilinear form as for example in , and the $L^p$ norm is in the classical sense.
A novelty in the present paper is that we do not have to pass through a discrete model form, but rather work with an outer measure space on a continuum. This avoids both the cumbersome introduction of the discrete spaces as well as the usual technicalities in the discretization process.
The factorization of the multilinear form in time-frequency analysis into embedding theorems on the one hand and an outer Hölder’s inequality on the other hand is a clear modularization of the matter and promises to be useful in other applications of time-frequency analysis. Indeed, we were explicitly studying the modularization process because with Camil Muscalu we were considering a program outlined in [@do-muscalu-thiele] of estimating multilinear forms with nested levels of time-frequency analysis.
We are grateful to Mariusz Mirek for carefully reading an early version of this manuscript and pointing out many corrections. We are grateful to Pavel Zorin-Kranich for pointing out many corrections and an error on the last pages of a previous version posted on arxiv, that was overcome by proving a generalized Carleson embedding theorem with parameters $\alpha$ and $\beta$ and by removing any claim about explicit dependence on such parameters in the theorem on the bilinear Hilbert transform. Thanks to much stronger known uniform estimates for the bilinear Hilbert transform as in [@grafakos-li], tracking of the dependence on these parameters in our proof was not our key point. We also thank Yumeng Ou for pointing out an error in a previously posted version that was overcome by changing the exponent of $\beta$ in Corollary \[tentcorollary\], with some minor impact on the rest of the section. We thank an anonymous referee for a valuable list of suggestions to improve this exposition. We are grateful to Stefan Müller, Alexander Volberg, Igor Verbitzky and Nguyen Cong Phuc for discussions on capacity theory, which is a much studied example for outer measures. We finally are grateful for much feedback on outer measures during a season of conferences in which the ideas of this present paper were announced, and for the many suggestions on this exposition that we have received.
Outer measure spaces {#outermeasure}
====================
Outer measures
--------------
An outer measure or exterior measure on a set $X$ is a monotone and subadditive function on the collection of subsets of $X$ with values in the extended nonnegative real numbers, and with the value $0$ attained by the empty set.
Let $X$ be a set. An outer measure on $X$ is a function $\mu$ from the collection of all subsets of $X$ to $[0,\infty]$ that satisfies the following properties:
1. If $E\subset E'$ for two subsets of $X$, then $\mu(E)\le \mu(E')$.
2. $\mu(\emptyset)=0$.
3. If $E_1,E_2,\dots$ is a countable collection of sets in $X$, then $$\label{countsubadd}
\mu(\bigcup_{j=1}^\infty E_j)\le \sum_{j=1}^\infty \mu(E_j)\ .$$
In the examples we have in mind, the space $X$ is an infinite complete metric space and thus uncountable. The set of all subsets of $X$ has then even larger cardinality than the continuum, and can only be organized in abstract ways. The description of an outer measure then typically comes in two steps: First one specifies concretely a quantity that we may call pre-measure on a small collection of subsets, and then one passes abstractly from the pre-measure to the outer measure by means of covering an arbitrary subset by sets in the small collection. This covering process is the intuition behind the adjective [*outer*]{} in the term [*outer measure*]{}.
\[generate.outer\] Let $X$ be a set and $\E$ a collection of subsets of $X$. Let $\sigma$ be a function from $\E$ to $[0,\infty)$. Define for an arbitrary subset $E$ of $X$ $$\mu(E):=\inf_{\E' }\sum_{E'\in \E'} \sigma(E')\ ,$$ where the infimum is taken over all countable subcollections $\E'$ of $\E$ which cover the set $E$, that is whose union contains $E$. Here we understand that an empty sum is $0$. Then $\mu$ is an outer measure.
The concrete pre-measure requires the data $\E$, and $\sigma$. For simplicity we will often omit explicit mention of $\E$, since $\E$ is implicitly determined as the domain of $\sigma$. The proof of the proposition is basic and standard, we reproduce it here for emphasis.
We need to prove the three defining properties of outer measures.
The empty collection of subsets covers the empty set, which shows $\mu(\emptyset)= 0$ since the empty sum of nonnegative numbers is $0$.
If $F\subset F'$ for two subsets of $X$, then every cover of $F'$ is a cover of $F$ and hence $\mu(F)\le \mu(F')$. Let $F_1,F_2,\dots $ be a countable collection of subsets of $X$ and pick $\epsilon>0$. Find for each $i$ a countable subcollection $\E_i$ of $\E$ which covers $F_i$ and satisfies $$\sum_{E\in \E_i} \sigma(E)\le \mu(F_i)+ \epsilon 2^{-i}\ .$$ Then the union $\E'$ of the collections $\E_i$ covers the union of the sets $F_i$ and satisfies $$\sum_{E\in \E'} \sigma(E) \le (\sum_i \mu(F_i))+ \epsilon\ .$$
Since $\epsilon$ was arbitrary, we conclude that $\mu(\bigcup F_i)\le \sum_i \mu(F_i)$.
It is in general not true that for $E\in \E$ we have $\sigma(E)=\mu(E)$, however this identity can be established in many examples in practice. Clearly this identity holds precisely if for every set $E\in \E$ and every cover of $E$ by a countable subcollection $\E'$ of $\E$, we have $$\label{ecoverc}
\sigma(E)\le \sum_{E'\in \E'}\sigma(E')\ .$$ Then the most efficient cover of $E$ is by the trivial collection$\{E\}$, which establishes $\sigma=\left. \mu\right|_\E$.
We did not allow $\sigma$ to take value $\infty$. This is no restriction, since if we had $\sigma(E')=\infty$ for some $E'\in \E$, then using the set $E'$ in any cover of $E$ will make the sum $\sum_{E'\in \E'} \sigma(E')$ equal to $\infty$, a value that is as already the default even if no cover of $E$ exists at all.
If the collection $\E$ is countable, the contribution of sets $E\in \E$ with $\sigma(E)=0$ trivializes. Namely, we may consider the union $E_0$ of the countably many generating sets with pre-measure $0$. Then $E_0$ has outer measure zero, and we can construct an outer measure on $X\setminus E_0$ which reflects the structure of the outer measure on $X$ but does not contain any generating set with pre-measure $0$.
Examples for outer measures {#examplesection}
---------------------------
### Example 1: Lebesgue measure via dyadic cubes {#example-1-lebesgue-measure-via-dyadic-cubes .unnumbered}
Let $X$ be the Euclidean space $\R^m$ for some $m\ge 1$ and let $\E$ be the set of all dyadic cubes, that is all cubes of the form $$Q=[2^{k}n_1, 2^{k}(n_1+1))\times \dots \times [2^{k}n_m, 2^{k}(n_m+1))$$ with integers $k,n_1,\dots ,n_m$. For each dyadic cube $Q$ we set $$\sigma(Q)=2^{mk}\ .$$ Then $\sigma$ generates an outer measure which is the classical Lebesgue outer measure on $\R^m$. We have $\sigma(Q)=\mu(Q)$ for every dyadic cube. This latter fact requires a bit of work, in fact it is one of the more laborious items in the standard introduction of Lebesgue measure.
### Example 2: Lebesgue measure via balls {#example-2-lebesgue-measure-via-balls .unnumbered}
Let $X=\R^m$ as above and let $\E$ be the set of all open balls $B_r(x)$ with radius $r$ and center $x\in \R^m$. Let $\sigma(B_r(x))=r^m$ for each such ball. Then $\sigma$ generates a multiple of Lebesgue outer measure, and again we have $\sigma=\left. \mu\right|_\E$.
If one desires a countable generating set, one may restrict the collection of generating sets to the collection of balls which have rational radius and rational center. This choice will result in the same outer measure.
### Example 3: Outer measure generated by tents {#example-3-outer-measure-generated-by-tents .unnumbered}
Let $X=\R\times (0,\infty)$ be the open upper half plane and let $\E$ be the set of tents, that is open isosceles triangles of the form (see Figure 1 in Section \[t1section\]) $$T(x,s)=\{(y,t)\in \R\times (0,\infty): t<s, |x-y|<s-t\}$$ for some pair $(x,s)\in \R\times (0,\infty)$ which describes the tip of the tent. Note that the constraint $t<s$ is implied by the constraint $|x-y|<s-t$, but it is kept for emphasis. Define $\sigma(E)=s$ for any such tent, and note that $\sigma(E)$ is equal to $\frac 12\sigma_L(\pi(E))$ where $\pi(E)$ is the projection of $E$ onto the first coordinate and thus an open ball in $\R$, and $\sigma_L$ is the generator of Lebesgue outer measure on $\R$ described in Example $2$.
By projection onto the first coordinate it easily follows from Example $2$ that $\mu$ satisfies (\[ecoverc\]). Again one obtains the same outer measure restricting the collection of generating sets to the tents with rational tip.
### Example 4: Capacity {#example-4-capacity .unnumbered}
We restrict attention to a particular example of capacity, more examples can be found in the survey [@adams]. Let $X=\R^n$ with $n\ge 3$ and let $\E$ be the collection of open sets in $X$. Define the kernel $K(x):=|x|^{2-n}\ ,$ which is a multiple of the classical Newtonian kernel. Let $\sigma$ assign to each open set its capacity with respect to $K$, that is the least upper bound for the total mass $\|\nu\|$ of a positive Borel measure $\nu$ which has compact support in $E$ and satisfies $\|\nu*K\|_\infty\le 1$. Note that $\sigma(E)>0$ for every nonempty open set $E$, this can be seen by testing with a measure $\nu$ associated with a smooth nonnegative density supported in a small compact ball contained in $E$.
To see Property (\[ecoverc\]), assume $E$ is some open set covered by a countable collection $\E'$ of open sets. Let $ \nu$ be a measure supported on a compact set $F\subset E$ such that $\|\nu*K\|_\infty\le 1$. Then $$\|\nu\|\le \sum_{E'\in \E'}\|\nu 1_{E'}\|$$ $$\le
\sum_{E'\in \E'}\sup_{F\subset E'}
\|\nu 1_F\|$$ $$\le
\sum_{E'\in \E'} \sigma(E') \sup_{F\subset E'}
\|(\nu 1_{F})*K\|_{\infty}$$ $$\le \sum_{E'\in \E'} \sigma(E')
\|\nu*K\|_\infty\le \sum_{E'\in \E'} \sigma(E')\ .$$ Since $\E'$ was arbitrary, this proves $(\ref{ecoverc})$.
Remarks on measurable sets
--------------------------
Outer measures are used in classical textbooks such as [@wz] as a stepping stone towards the introduction of measures. In measure theory, one is interested in equality in under the additional assumption that the sets $E_i$ are pairwise disjoint. Such equality does not follow in general from the properties of outer measure. A sufficient additional criterion is that each of the sets $E_i$ is measurable, as in the following definition.
Let $\mu$ be an outer measure on a set $X$ generated by a pre-measure on a collection $\E$. An arbitrary subset $F$ of $X$ is called measurable if for every generating set $E\in \E$ we have $$\mu (F\cap E ) + \mu(F^c\cap E) = \mu(E) \ .$$
We note that if $F$ is measurable, then it also satisfies the Caratheodory criterion that for arbitrary subset $G$ of $X$ we have $$\mu (F\cap G ) + \mu(F^c\cap G) = \mu(G)\ .$$ We briefly sketch the argument. If $\mu(G)$ is infinite, then it is easy to see that one of the outer measures on the left hand side has to be infinite as well. If $\mu(G)$ is finite, pick $\epsilon>0$ and a cover $\E'$ of $G$ by generating sets such that $$\sum_{E\in \E'} \sigma(E)\le \mu(G)+\epsilon\ .$$ Then we have $$\mu(G)\le \mu(F\cap G)+\mu(F^c\cap G)\le \sum_{E\in \E'}\mu(F\cap E)+\sum_{E\in \E'}\mu(F^c\cap E)$$ $$\le \sum_{E\in \E'} \mu(F\cap E)+\mu(F^c\cap E)=\sum_{E\in \E'} \mu(E) \le \sum_{E\in \E'} \sigma(E)\le \mu(G)+\epsilon\ .$$ Since $\epsilon$ was arbitrary, it follows that the first inequality in this line of reasoning is indeed an equality.
In Example 1 above the measurable sets are called Lebesgue measurable. To see existence of many Lebesgue measurable sets, one observes that dyadic cubes are Lebesgue measurable. This follows from two observations: First one may estimate the outer measure of $F$ by coverings with cubes of side length at most that of the given cube $E$. Second, each such small cube is either contained in $E$ or disjoint from $E$ allowing to split the covering into two disjoint collections, of which one covers $F\cap E$ and the other covers $F\cap E^c$.
One can show in general that the collection of measurable sets is closed under countable union and countable intersection, thus from Lebesgue measurability of dyadic cubes one can conclude Lebesgue measurability of all Borel sets in $\R^m$.
In contrast, no set other than $\emptyset$ and $X$ is measurable in Example 3. For assume we are given a nontrivial subset $E$ of $X$, let $(x_0,s_0)$ be a point in the boundary of $E$ and consider a tent $T(x,s)$ which contains $(x_0,s_0)$ and satisfies $s<2s_0$. Then we find points $(y,t)\in E\cap T(x,s)$ and $(y',t')\in E^c\cap T(x,s)$ in the vicinity of $(x_0,s_0)$ such that $s<t+t'$. Then we have $$\mu(T(x,s))=\sigma(T(x,s))=s<t+t'\le \mu(T(x,s)\cap E)+\mu(T(x,s)\cap E^c)\ ,$$ where we used that if a set $F$ contains a point $(y,t)$, then $\mu(F)>t$ because any cover of $F$ needs to contain a tent with height at least $t$. The last display shows that the set $E$ is not measurable.
In Example 4, it is well known that no bounded open set $E$ is measurable.
Namely, let $E_1$ and $E_2$ be disjoint bounded open sets such that $\dist(E_1,E_2) > 0$ and set $E:=E_1\cup E_2$. Let $\nu$ be a positive Borel measure on a compact subset of $E$ with $\|\nu*K\|_\infty \le 1$. Since $E$ is bounded, for some finite constant $M$ that depends on the diameter of $E$ and $n$ it holds that $$\|\nu\| \le M \inf_{x\in E}(\nu*K)(x) \le M \|\nu*K\|_{\infty} \le M \ \ .$$
In particular, it follows that $\sigma(E),\sigma(E_1),\sigma(E_2) < \infty$ (they are positive from a previous discussion). Then, by inner regularity of Borel measures, we obtain $$\|\nu\|= \sum_{j=1}^2 \|\nu1_{E_j}\|\le \sum_{j=1}^2 \sigma(E_j)\|(\nu 1_{E_j})*K\|_{\infty} \ \ .$$ Using the fact that $\sigma$ satisfies the countably subadditive property , we obtain $\mu(E_j)=\sigma(E_j)$. Using harmonicity of $\nu1_{E_j}*K$ in the interior of $E_j^c$, it follows that $$\|\nu\|\le \sum_{j=1}^2 \mu(E_j)\|(\nu 1_{E_j})*K\|_{\infty}$$ $$\le \sum_{j=1}^2 \mu(E_j)\|(\nu 1_{E_j})*K\|_{L^\infty(\overline{E_j})}$$ $$\le \sum_{j=1}^2 \mu(E_j)(\|\nu*K\|_{\infty} -\inf_{x\in \overline{E_j}} ((\nu 1_{E_{3-j}})*K)(x))$$ $$\le \sum_{j=1}^2 \mu(E_j) -
\sum_{j=1}^2 \mu(E_j)\inf_{x\in \overline{E_j}} ((\nu 1_{E_{3-j}})*K)(x)\ .$$ Since $E$ is bounded, it follows that for some finite positive constant $M$ that depends on the diameter of $E$ and $n$ we have $$\inf_{x\in \overline{E_j}}((\nu1_{E_{3-j}})*K)(x) \ge \frac 1 M \|\nu1_{E_{3-j}}\|$$ It follows that $$\|\nu\| \le
\sum_{j=1}^2 \mu(E_j) - \sum_{j=1}^2 \mu(E_j)\frac 1{M} \|\nu1_{E_{3-j}}\|$$ $$\le \sum_{j=1}^2 \mu(E_j) - \frac 1 M \min(\mu(E_1),\mu(E_2)) \sum_{j=1}^2 \|\nu1_{E_{3-j}}\|$$ $$\le \sum_{j=1}^2 \mu(E_j) - \frac 1 M \min(\mu(E_1),\mu(E_2)) \|\nu\|$$ Since $\mu(E_1)>0$ and $\mu(E_2)>0$, it follows that for some constant $c>0$ that depends only on $E_1,E_2,n$ it holds that $$\|\nu\| \le \frac 1{1+c} \sum_{j=1}^2 \mu(E_j)$$ Taking supremum over all such $\nu$ it follows that $\mu(E)=\sigma(E)<\mu(E_1)+\mu(E_2)$, thus neither $E_1$ nor $E_2$ is measurable. While in Example 3 the lack of measurable sets is intuitively caused by the scarceness of the collection of generating sets, the collection $\E$ in this example is very rich and can hardly be blamed for the shortage of measurable sets.
Functions and sizes
-------------------
We propose an $L^p$ theory for functions on outer measure spaces. One possible way of introducing an $L^p$ norm of a nonnegative function $f$ and $1\le p<\infty$ is via the following definition: $$\label{choquet}
(\int_0^{\infty} p\lambda^{p-1} \mu(\{x\in X: f(x)>\lambda\})\, d\lambda)^{1/p}\ .$$ In many instances, this is the correct definition. However, we propose a different formula, which in many examples such as Lebesgue theory coincides with the above, but differs in full generality. The motivation for our definition is that it appears more useful in the applications that we have in mind.
Our different approach already finds a motivation in the efficiency of encoding of functions in classical Lebesgue theory. Classical coding describes functions as assignment of a value to every point in the space $X$. For an $L^p$ function this assignment has to be consistent with the measurability structure. The set of such assignments has a very large cardinality, which is only reduced after consideration of equivalence classes of $L^p$ functions. This detour over sets of large cardinality can be avoided by coding functions via their averages over dyadic cubes. There are only countably many such averages, and by the Lebesgue Differentiation theorem these averages contain the complete information of the equivalence class of the $L^p$ function.
Unlike in the above definition of $L^p$ norm, which regards the function $f$ as a pointwise assignment, we propose to build the $L^p$ theory on outer measure spaces via averages over generating sets. The theory then splits again into a concrete and abstract part, parallel to the construction of outer measures by generating sets. There will be a concrete procedure to assign to a function averages over generating sets, and further on there will be an abstract procedure to define the $L^p$ norms of functions from such averages. The concrete averaging procedure itself is based on some other measure theory (which by itself might be an outer measure theory, but in the current paper we will not delve into such higher level iteration of the theory). We will consider this other measure theory as concrete external input into the outer measure theory, while the genuine part of the outer measure theory is the abstract passage from the concrete averages to outer $L^p$ norms.
The class of functions that we will be able to take $L^p$ norms of will depend on the concrete averaging procedure we choose. To avoid too abstract a setup we shall assume that $X$ is a metric space, and that every set of the collection $\E$ is Borel. We shall assume the concrete averaging procedure will allow to average positive functions in the class $\B(X)$, the set of Borel measurable functions on $X$. If the set $X$ is countable, a case that exhibits many of the essential ideas of the theory, the space $\B(X)$ is the space of all functions on $X$.
As linearity is closely related with measurability, in the absence of measurability we will not require averages to be linear but merely sub linear or even quasi sub linear. We will call these averages “sizes”.
\[d.size\] Let $X$ be a metric space. Let $\sigma$ be a function on a collection $\E$ of Borel subsets of $X$ and let $\mu$ be the outer measure generated by $\sigma$. A size is a map $$S: \B(X)\to [0,\infty]^\E$$ satisfying for every $f,g\in \B(X)$ and every $E\in \E$ the following properties:
1. Monotonicity: if $|f|\le |g|$, then $S(f)(E)\le S(g)(E)$.
2. Scaling: $S(\lambda f)(E)= |\lambda| S(f)(E)$ for every $\lambda\in \C$.
3. Quasi-subadditivity: $$\label{quasi.sub}
S(f+g)(E)\le C[S(f)(E)+S(g)(E)]$$ for some constant $C$ depending only on $S$ but not on $f,g,E$.
Note that (1) above implies $S(f)(E)=S(|f|)(E)$ for all $f$ and $E$. Hence our theory is essentially one of nonnegative functions, and the size needs initially be only defined for nonnegative Borel functions and can then be extended via the above identity to all functions.
We discuss sizes for Examples 1 through 4, and give a number of forward looking remarks on particular aspects of the outer $L^p$ theory to be developed.
In Lebesgue theory in Example 1, we define for every Borel function $f\in \B(X)$ and every cube $Q$ $$S(f)(Q)=\mu(Q)^{-1}\int_Q |f(x)|\, dx\ .$$ The integral is in the Lebesgue sense. Note the coincidence that the measure theory used to define the size is the same as the measure theory associated with the outer measure $(X,\mu)$. This coincidence is a particular feature of Example 1 (and 2 below). The circularity of this setup does not invalidate our theory, certainly Lebesgue measure can be introduced without reference to the outer integration theory that we develop in this paper.
Note that $S(f)(Q)$ is finite for every locally integrable function on $\R^m$. For such function we may define the “martingale” $$M(f)(Q):=\mu(Q)^{-1} \int_Q f(x)\, dx\ .$$ A consistency condition applies for $M(f)$, namely, the value of $M(f)$ on a dyadic cube is equal to the average of the values on the dyadic subcubes of half the sidelength. By the dyadic Lebesgue Differentiation theorem, the martingale uniquely determines the value of the function $f$ at every Lebesgue point, and this uniquely determines the equivalence class of the measurable function $f$ in Lebesgue sense. As noted before, the martingale is a very efficient way of encoding the function $f$. The space $L^\infty(\R^m)$ can be described as all bounded maps from $\E$ to $\C$ which satisfy the consistency condition. This example is a strong indication that a useful general theory of outer measure may be built out of assigning values to elements $E\in \E$. Indeed, it would be possible in this example to built the theory entirely out of maps $M:\E\to \C$ satisfying the consistency condition, without reference to any Borel function $f$.
Turning to Example 2, we may similarly define $$S(f)(B)=\mu(B)^{-1}\int_B |f(x)|\, dx$$ for every ball $B$. Again, these averages determine $f$ by the Lebesgue Differentiation theorem. In this case there does not exist an easy algebraic consistency condition that identifies maps from $\E$ to $\C$ that arise from locally integrable functions $f$ as the average $$M(f)(B):=\mu(B)^{-1} \int_B f(x)\, dx\ .$$ This provides the evidence that it is impracticable to build a theory of functions on outer measure space entirely out of maps from $\E$ to $\C$ and without reference to a function $f$.
In Example 3 we make an assignment of a value to each tent by averaging a Borel measurable function on the tent: $$\label{primitivetentsize}
S(F)(T(x,s)):=s^{-1} \int_{T(x,s)} |F(y,t)|\, dy\, \frac{dt}{t}\ .$$
This averaging is based on weighted Lebesgue measure on $X$, which however is not the outer measure $(X,\mu)$ in this Example 3. In the literature, one often works with the class of Borel measures $\nu$ on $X$ rather than the class of Borel measurable functions, and defines $$S(\nu)(T(x,s)):=|s|^{-1} |\nu| (T(x,s))\ \ .$$ If the function $S(\nu)$ is bounded, the measure $\nu$ is called a Carleson measure in the literature, the concept of which dates back to the seminal paper [@carleson1]. The space of Carleson measures may be considered the space $L^\infty$ on the outer measure space, as will be discussed more thoroughly further below.
A specific Carleson measure of interest is the following. For some function $f\in L^\infty(\R)$ consider the function $F$ on $X$ defined by $$F(y,t)=\int f(z)t^{-1} \phi(t^{-1}(y-z))\, dz\ ,$$ where $\phi$ is some smooth and rapidly decaying function of integral zero. Then $|F(y,t)|^2 dy \frac{dt}t$ turns out to be a Carleson measure[^1]. The quadratic nature of this example suggests to define a size $$S(F)(T(x,s))=\left( s^{-1}\int _{T(x,s)}|F(y,t)|^2 \, dy\, \frac{dt}t\right)^{1/2}\ .$$ This example provides evidence why we do not try to base a theory of outer measure on linear averaging as could have been done in the example of martingales or the linear averaging over balls.
In Example 4, the most commonly (implicitly) used size is $$S(f)(E)=\sup_{x\in E}|f(x)|\ .$$ Rather than the $L^1$ or $L^2$ based averages from the previous examples, this is an $L^\infty$ based average. Such an $L^\infty$ average has the effect that the more generally defined outer $\L^p$ norms we will introduce specialize to the case of the integral (\[choquet\]), which is frequently referred to as the Choquet integral in the context of capacity theory. We conclude this very brief discussion of Example 4 with the remark that it may be interesting to compare the capacitary strong type inequalites [@adams], whose intensive study goes back to the work of Maz’ya, with the embedding theorems that we discuss further below.
A note on subadditivity
-----------------------
We have chosen to only demand quasi subadditivity in the definition of size. Many sizes will be subadditive, which means that the constant in (\[quasi.sub\]) can be chosen to be $1$. The general constant in (\[quasi.sub\]) allows for certain more general examples , for example $L^p$ type sizes with $p<1$. It also sets the stage for quasi-subadditivity throughout our discussion, which will simplify some of the arguments.
Note that $L^p$ type sizes occur naturally in factorizations. Generalizing the classical factorization $|f| =|f|^{\alpha} |f|^{1-\alpha}$ for a Borel measurable function $f$ and $0<\alpha<1$, one may consider modified sizes $S^{[\alpha]}$ defined, for every nonnegative function $f$, by $$\label{e.sizefactorization}
S^{[\alpha]}(f)(E) := \Big[S(f^{\frac 1{\alpha}})(E)\Big]^\alpha \ \ .$$ One then has the factorization $$S(f) = S^{[\alpha]}(f^{\alpha}) \ \times \ S^{[1-\alpha]}(f^{1-\alpha}) \ \ .$$ Even if $S$ is subadditive, the fractional size $S^{[\alpha]}$ with $0<\alpha<1$ might only be quasi-subadditive.
Essential supremum and super level measure
------------------------------------------
This section contains the most subtle points in the development of our $L^p$ theory on outer measure spaces, with definitions carefully adjusted to the precise setup and the applications we have in mind. To develop an $L^p$ theory we need a space $X$, which we assume to be a metric space. We need a pre-measure $\sigma$ on a collection $\E$ of Borel subsets, generating an outer measure $\mu$ on $X$. Finally, we need a size $S$. So as to not overburden the notation, we collect this data into a triple $(X,\sigma,S)$, because $\sigma$ determines the generating collection and the outer measure. We use the letters $\E$ and $\mu$ for these as standing convention. We call the triple $(X,\sigma,S)$ an outer measure space.
\[essential supremum\] Assume $(X,\sigma,S)$ is an outer measure space. Given a Borel subset $F$ of $X$, we define the outer essential supremum of $f\in \B(X)$ on $F$ to be $$\essup_F S(f):= \sup_{E\in \E} S(f1_F)(E)\ .$$
We emphasize that the values $S(f)(E)$ for fixed $f$ and all $E\in \E$ are in general not enough information to determine the essential supremum of $f$ on a Borel set $F$ other than $X$ or $\emptyset$. It is important to refer back to the function $f$ and truncate it according to the set $F$.
We also emphasize that, unlike in Examples 1 and 2, the outer essential supremum in general does not coincide with the essential supremum of $f$ on $F$ in the Borel sense. In Example 3 with size given by , we note that every Lebesgue integrable Borel function supported above a line $t=t_0>0$ in the space $X$ has finite outer essential supremum. Namely the size of such a function with respect to some tent vanishes if the tent is small and is bounded above by $t_0^{-2}$ times the Lebesgue integral of the function for arbitrary tent. On the other hand, if we define the size $S(f)(E)$ to be the supremum of $f$ on the set $E$, then the outer essential supremum defined above coincides with the classical supremum on the set $F$, under the mild assumption that $F$ can be covered by generating sets $E$.
The following properties of the outer essential supremum are inherited from the corresponding properties for the size. We have for every $f,g\in \B(X)$ and every Borel set $F\subset X$
1. Monotonicity: if $|f|\le |g|$, then $\essup_FS(f)\le \essup_FS(g)$.
2. Scaling: for $\lambda\in \C$ we have $\essup_FS(\lambda f)= |\lambda| \essup_FS(g)$ .
3. Quasi-subadditivity: for some constant $C<\infty$ independent of $f$, $g$, $F$, we have $$\essup_FS(f+g)
\le C (\essup_FS(f)+ \essup_FS(g))\ .$$
The use of the outer essential supremum is the main subtle point in the following definition.
\[superleveldefinition\] Let $(X,\sigma, S)$ be an outer measure space. Let $f\in \B(X)$ and $\lambda>0$. We define $$\label{largerlambdaset}
\mu(S(f)>\lambda)$$ to be the infimum of all values $\mu(F)$, where $F$ runs through all Borel subset of $X$ which satisfy $$\essup_{X\setminus F}S(f) \le \lambda\ .$$
We emphasize once more that in general $\mu(S(f)>\lambda)$ is not the outer measure of the Borel set where $|f|$ is larger than $\lambda$, even though it is precisely that in many special examples such as the case of Lebesgue outer measure or in cases where the outer essential supremum above coincides with the classical supremum.
We obtain the following properties of super level measure.
1. Monotonicity: if $|f|\le |g|$, then $$\mu(S(f)>\lambda)\le \mu(S(g)>\lambda)\ .$$
2. Scaling: for a complex number $\lambda'$ we have $$\mu(S(\lambda' f)>|\lambda'| \lambda) = \mu(S(f)>\lambda)\ .$$
3. Quasi-subadditivity: for some constant $C<\infty$ independent of $f$, $g$, $F$, $$\mu(S(f+g)>C\lambda)\le \mu(S(f)>\lambda)+\mu(S(g)>\lambda)\ .$$
Note that a constant $C=2$ would be necessary in general in the last inequality even if $S$ was sub-additive.
Outer $\L^p$ spaces {#lptheory}
===================
The definition of outer $L^p$ space and subsequent development of the theory of outer $L^p$ spaces follows classical lines of reasoning, once the crucial definitions of the outer essential supremum and the super level measure from the previous section have replaced their classical counterparts. The only minor deviation comes in the proof of the triangle inequality, since we do not have a satisfactory theory of duality in outer $L^p$ spaces. This manifests itself in a loss of a factor $2$ in the triangle inequality.
\[d.linfty\] Let $(X,\sigma, S)$ be an outer measure space. Let $f\in \B(X)$, then we define $$\|f\|_{L^\infty(X,\sigma,S)}
:=\essup_X S(f)=\sup_{E\in \E} S(f)(E)$$ and $L^\infty(X,\sigma,S)$ to be the space of elements $f\in \B(X)$ for which $\sup_{E\in \E} S(f)(E)$ is finite. For notational convenience we define $$L^{\infty,\infty}(X,\sigma,S):=L^\infty(X,\sigma,S)\ .$$
As the Example 3 of Carleson measures shows, $f\in L^\infty(X,\sigma,S)$ need not be an essentially bounded function on $X$ in the Borel sense.
\[d.levelset\] Let $0< p<\infty$. Let $(X,\sigma, S)$ be an outer measure space. We define for $f\in \B(X)$ : $$\|f\|_{L^p(X,\sigma,S)}
:=\left(\int_0^\infty p\lambda^{p-1} \mu(S(f)>\lambda) \, d\lambda\right)^{1/p}\ ,$$ $$\|f\|_{L^{p,\infty}(X,\sigma,S)}:=\left(\sup_{ \lambda >0} \lambda^{p} \mu(S(f)>\lambda)\right)^{1/p}\ .$$ Moreover we define $L^p(X,\sigma,S)$ and $L^{p,\infty}(X,\sigma,S)$ to be the spaces of elements in $\B(X)$ such that the respective quantities are finite.
Clearly $\mu(S(f)>\lambda)$ is monotone in $\lambda$, so that the integral in the definition of $\|f\|_{L^p(X,\sigma,S)}$ is well defined and a number in $[0,\infty]$. As in the classical case we trivially have $$\|f\|_{L^{p,\infty}(X,\sigma,S)}\le \|f\|_{L^p(X,\sigma,S)}\ .$$
The following properties hold, with elementary proofs that follow in most cases from the corresponding statements for super level measure.
Let $(X,\sigma,S)$ be an outer measure space and let $f,g$ be in $\B(X)$. Then we have for $0<p\le \infty$
1. Monotonicity: If $|f|\le |g|$, then $\|f\|_{L^p(X,\sigma,S)} \le \|g\|_{L^p(X,\sigma,S)}$.
2. Scaling: $\|\lambda f\|_{L^p(X,\sigma,S)}=|\lambda| \|f\|_{L^p(X,\sigma,S)}$ for any $\lambda\in \C$.
3. Quasi-subadditivity: there is a constant $C$ independent of $f,g$ such that $$\| f+g\|_{L^p(X,\sigma,S)}\le C(
\|f\|_{L^p(X,\sigma,S)}+\|g\|_{L^p(X,\sigma,S)})\ .$$
Moreover we have for $\lambda>0$ $$\|f\|_{L^p(X,\lambda \sigma,S)} = \lambda^{1/p}\|f\|_{L^p(X,\sigma,S)}\ .$$ Corresponding statements hold for the spaces $L^{p,\infty}(X,\sigma,S)$.
Note that the proof of quasi-subadditivity for $L^p$ with $p<\infty$ is based on quasi-subadditivity of super level measure, which yields a constant $C$ different from $1$ even if the size $S$ is subadditive. It might be interesting to study conditions under which one may have subadditivity for $L^p$.
We turn to the behaviour of outer $L^p$ spaces under mappings between outer measure spaces. Note that Borel measurable functions as well as classical $L^p$ functions are typically pulled back under a continuous map, while in contrast Borel measures are pushed forward under such maps. This is one of the motivations for us to use the class of Borel measurable functions to develop the theory of outer $L^p$ functions, even though much of the theory can be developed for Borel measures as well.
Let $X_1$ and $X_2$ be two metric spaces and let $\Phi:X_1\to X_2$ be a continuous map. For $j=1,2$ let $\E_j$ be a collection of Borel sets covering $X_j$ and let $\sigma_j:\E_j\to [0,\infty]$ be a function generating an outer measure $\mu_j$ on $X_j$. Let $S_1$ and $S_2$ be sizes turning $(X_1,\sigma_1,S_1)$ and $(X_2,\sigma_2,S_2)$ into outer measure spaces.
\[pullback\] Assume that for every $E_2\in \E_2$ we have $$\label{mupullback}
\mu_1(\Phi^{-1} E_2)\le A \mu_2(E_2)\ .$$ Further assume that for each $E_1\in \E_1$ there exists $E_2\in \E_2$ such that for every $f\in \B(X_2)$ we have $$\label{spullback}
S_1(f\circ\Phi)(E_1)\le B S_2(f)(E_2)\ .$$ Then we have for every $f\in \B(X_2)$ and $0<p \le \infty$ and some universal constant $C$: $$\|f\circ \Phi\|_{L^p(X_1,\sigma_1,S_1)}\le A^{1/p}B C \|f\|_{L^p(X_2,\sigma_2,S_2)}\ ,$$ $$\|f\circ \Phi\|_{L^{p,\infty}(X_1,\sigma_1,S_1)}\le A^{1/p}B C \|f\|_{L^{p,\infty}(X_2,\sigma_2,S_2)}\ .$$
First note that by scaling properties it is no restriction to prove the proposition with constants $A=B=1$ in and .
For every Borel set $F_2\subset X_2$ we have $$\mu_1(\Phi^{-1} F_2)\le \mu_2(F_2)\ .$$ Namely, given $F_2$ without loss of generality we may assume that $\mu_2(F_2)<\infty$. Let $\E'_2\subset \E_2$ be a cover of $F_2$ which attains, up to a factor $(1+\epsilon)$ with small $\epsilon>0$, the outer measure of $F_2$: $$\sum_{E_2\in \E'_2} \mu_2(E_2)\le \sum_{E_2\in \E'_2} \sigma_2(E_2)\le (1+\epsilon)\mu_2(F_2)\ .$$ Then we obtain $$\mu_1(\Phi^{-1}(F_2))\le \sum_{E_2\in \E'_2} \mu_1(\Phi^{-1}(E_2))
\le \sum_{E_2\in \E'_2}\mu_2(E_2)\le (1+\epsilon) \mu_2(F_2)\ .$$ This proves the claim, since $\epsilon>0$ can be chosen arbitrarily.
Assume $F\subset X_2$ is a Borel set such that $$\mu_2(F)\le
(1+\epsilon)\mu_2(S_2(f) >\lambda)$$ and for every $E_2\in \E_2$ we have $S_2(f1_{F^c})(E_2)\le \lambda$. Pick $E_1\in \E_1$, then there exists $E_2 \in \E_2$ such that we have $$S_1((f\circ \Phi)(1_{\Phi^{-1}(F^c)}))(E_1)=
S_1((f1_{F^c})\circ \Phi)(E_1)$$ $$\le S_2(f1_{F^c})(E_2)\le \lambda\ ,$$ and hence $$\mu_1(S_1(f\circ \Phi)\ge \lambda)\le
\mu_1((\Phi^{-1}(F^c))^c)$$ $$\le \mu_1(\Phi^{-1}F)\le \mu_2(F)
\le (1+\epsilon) \mu_2(S_2(f)>\lambda)\ .$$ This proves the desired inequalities for $p<\infty$. The case $p=\infty$ follows immediately from the assumption on sizes.
\[p.convex-interpolation\] Let $(X,\sigma,S)$ be an outer measure space and let $f\in \B(X)$. Assume $\alpha_1+\alpha_2=1, \ \ 0< \alpha_1,\alpha_2< 1$, and $$1/p = \alpha_1 / p_1 + {\alpha_2} / {p_2}$$ for $p_1,p_2\in (0,\infty]$ with $p_1\ne p_2$. Then $$\label{convexityc}
\|f\|_{L^{p}(X,\sigma,S)}
\le C_{p,p_1,p_2}\Big(\|f\|_{L^{p_1,\infty}(X,\sigma,S)}
\Big)^{\alpha_1} \Big(\|f\|_{L^{p_2,\infty}(X,\sigma,S)} \Big)^{\alpha_2} \ \ .$$
Assume without loss of generality $p_1<p_2$. We first consider the case $p_2<\infty$. If either of the norms on the right-hand-side of (\[convexityc\]) vanishes, then $\mu(S(f) > \lambda)$ vanishes for all $\lambda>0$ and then the left-hand-side of (\[convexityc\]) vanishes as well. By scaling we may then assume $$A:=\|f\|_{L^{p_1,\infty}(X,\sigma,S)}^{p_1}=\|f\|_{L^{p_2,\infty}(X,\sigma,S)}^{p_2}\ .$$ Optimizing the use of these two identites we have with $p_1<p<p_2$ $$\mu(S(f)>\lambda) \le A \min(\lambda^{-p_2}, \lambda^{-p_1}) \ \ ,$$ $$\|f\|_p \le (Ap(\int_0^{1} \lambda^{p-p_1-1} d\lambda + \int_{1}^\infty \lambda^{p-p_2-1} d\lambda))^{\frac 1 {p}}$$ $$\le C_{p,p_1,p_2} A^{1/p}=
C_{p,p_1,p_2}\Big(\|f\|_{L^{p_1,\infty}(X,\sigma,S,)}^{p_1}
\Big)^{\frac{\alpha_1}{p_1}} \Big(\|f\|_{L^{p_2,\infty}(X,\sigma,S)}^{p_2}
\Big)^{\frac{\alpha_2}{p_2}} \ \ .$$ This completes the proof in case $p_2<\infty$. If $p_2 = \infty$, we may assume by scaling that $\|f\|_{L^{\infty}(X,\sigma,S)}=1$. Then for $\lambda > 1$ we have $\mu(S(f)>\lambda) = 0 $. Consequently, $$\|f\|_{L^p(X,\sigma,S)}
\le (p \|f\|_{L^{p_1,\infty}(X,\sigma,S)}^{p_1}
\int_0^{1} \lambda^{p-p_1-1} d\lambda)^{\frac 1 {p}} \le C_{p,p_1,p_2}
\|f\|_{L^{p_1,\infty}(X,\sigma,S)}^{\alpha_1} \ \ .$$
\[p.hoelder-energy\]
Assume we have a metric space $X$, three collections $\E,\E_1,\E_2$ of Borel subsets, three functions $\sigma,\sigma_1,\sigma_2$ on these collections generating outer measures $\mu,\mu_1,\mu_2$ on $X$. Assume $\mu\le \mu_j$ for $j=1,2$. Assume $S,S_1,S_2$ are three respective sizes such that for any $E\in \E$ there exist $E_1\in \E_1$ and $E_2\in \E_2$ such that for all $f_1,f_2\in \B(X)$ we have $$\label{e.size-factorization}
S(f_1f_2)(E)\le S_1(f_1)(E_1) S_2(f_2)(E_2) \ \ .$$ Let $p, p_1,p_2\in (0,\infty]$ such that $1/p = 1/p_1 + 1/p_2$. Then $$\begin{aligned}
\label{e.hoelder-strong}
\|f_1f_2\|_{L^p(X,\sigma,S)} \le
2 \|f_1\|_{L^{p_1}(X,\sigma_1,S_1)}\|f_2\|_{L^{p_2}(X,\sigma_2,S_2)} \ \ .\end{aligned}$$
We assume $0< p_1,p_2<\infty$, the case $\max(p_1,p_2)= \infty$ can be argued similarly. Without loss of generality assume that the factors on the right hand side of are finite. For $j=1,2$ pick Borel sets $F_j\subset X$ such that for every $E_j\in \E_j$ we have $$S_j(f_j 1_{F_j^c})(E_j)\le \lambda^{p/p_j}$$ and $$\mu_j(F_j)\le \mu_j(S_j(f_j)>\lambda^{p/p_j})+\epsilon\ .$$ Define $F=F_1\cup F_2$. Let $E\in \E$ be arbitrary, then by there exists $E_1 \in \E_1$ and $E_2\in \E_2$ such that $$S(f_1f_2 1_{F^c})(E)\le
S_1(f_1 1_{F^c})(E_1) S_2(f_2 1_{F^c})(E_2)$$ $$\le S_1(f_1 1_{F_1^c})(E_1) S_2(f_2 1_{F_2^c})(E_2)\le \lambda^{p/p_1}\lambda^{p/p_2}=\lambda\ ,$$ the passage from the first to second line by monotonicity of the sizes.
It follows from subadditivity of $\mu$ and domination of $\mu$ by $\mu_1$ and $\mu_2$ that for all $\lambda>0$ $$\label{e.Clambda-break}
\mu(S(f_1f_2)>\lambda) \le \mu(F)\le \mu(F_1)+\mu(F_2)$$
$$\le \mu_1(F_1)+\mu_2(F_2)\le
2\epsilon+ \sum_{i=1}^2 \mu(S_i(f_i) > \lambda^{p/p_i}) \ \ .$$ To prove we may assume via scaling that $$\|f_1\|_{L^{p_1}(X,\sigma_1,S_1)} = \|f_2\|_{L^{p_2}(X,\sigma_2,S_2)} =1 \ \ .$$ Then follows from , using that $\epsilon>0$ is arbitrarily small, $$\int p\lambda^{p-1} \mu(S(f_1f_2)>\lambda) d\lambda \le
\int p\lambda^{p-1} \sum_{i=1}^2 \mu(S_i(f_i) > \lambda^{p/p_i}) d\lambda$$ $$= \sum_{i=1}^2 \int p_i \lambda^{p_i-1} \mu(S_i(f_i) > \lambda ) d\lambda
= 2 \ \ .$$
In the following proposition, let $L^p(Y,\nu)$ denote the classical space of complex valued functions on a measure space $(Y,\nu)$ such that $\|f\|_{L^p(Y,\nu)}:= (\int_Y |f(x)|^p d\nu)^{1/p}$ is finite.
The following proposition is an outer measure version of classical Marcinkiewicz interpolation, which in practice is used to obtain strong bounds in a range of exponents $p$ from weak bounds at the endpoints of the range.
\[p.marcinkiewicz\] Let $(X,\sigma,S)$ be an outer measure space. Assume $1\le p_1<p_2 \le \infty$. Let $T$ be an operator that maps $L^{p_1}(Y,\nu)$ and $L^{p_2}(Y,\nu)$ to the space of Borel functions on $X$, such that for any $f,g\in L^{p_1}(Y,\nu)+L^{p_2}(Y,\nu)$ and $\lambda\ge 0$ we have
1. Scaling: $|T(\lambda f)|=|\lambda T(f)|$.
2. Quasi subadditivity: $|T(f+g)|\le C(|T(f)|+|T(g)|)$.
3. Boundedness properties: $$\|T(f)\|_{L^{p_1,\infty}(X,\sigma,S)}\le A_1\|f\|_{L^{p_1}(Y,\nu)}\ ,$$ $$\|T(f)\|_{L^{p_2,\infty}(X,\sigma,S)}\le A_2\|f\|_{L^{p_2}(Y,\nu)}\ .$$
Then we also have $$\|T(f)\|_{L^{p}(X,\sigma,S)}\le A_1^{\theta_1}A_2^{\theta_2}C_{p_1,p_2,p}\|f\|_{L^{p}(Y,\nu)}\ ,$$ where $p_1<p<p_2$ and $\theta_1$, $\theta_2$ are such that $$\theta_1+\theta_2=1\ ,$$ $$\frac 1p = \frac {\theta_1} {p_1}+\frac {\theta_2}{p_2}\ .$$
We may normalize $\nu$ to become $\tilde{\nu}=\lambda^{-1}\nu$, with $\lambda$ chosen so that $$A_1 \lambda^{1/p_1}=A_2\lambda ^{1/p_2}:=A\ .$$ Then $$A_1^{\theta_1}A_2^{\theta_2}\lambda^{1/p}=A \lambda^{-\theta_1/p_1-\theta_2/p_2} \lambda^{1/p}=A\ .$$ Thus it suffices to prove the theorem with $A_1=A_2=A$. Further normalizing $T$ to become $\tilde{T}=A^{-1}T$, we observe that it suffices to prove the theorem with $A_1=A_2=1$.
If $f_1\in L^{p_1}(Y,\nu)$ and $f_2\in L^{p_2}(Y,\nu)$, then we have for every $E\in \E$ $$S(T(f_1+f_2))(E) \le C\Big( S(Tf_1)(E) + S(Tf_2)(E)) \Big)\ .$$ Then we also have for some possibly different constant $C$: $$\label{e.muTsublinear}
\mu(S(T(f_1+f_2))> C\lambda) \le \mu(S(Tf_1)>\lambda) + \mu(S(Tf_2)>\lambda) \ .$$ We first assume: $0<p_1<p_2<\infty$. Let $f\in L^p(Y,\nu)$. We decompose $f= f_{1,\lambda} + f_{2,\lambda}$ with $f_{1,\lambda}=f 1_{|f|>\lambda}$. It is clear that $f_{j,\lambda}\in L^{p_j}(Y,\nu)$. Using we obtain $$\mu(S(Tf)>C\lambda) \le C \sum_{j=1}^2 \lambda^{-p_j}\|f_{j,\lambda}\|_{p_j}^{p_j}$$ $$=C
\lambda^{-p_1} \int_Y |f|^{p_1} 1_{|f|> \lambda}\, d\nu(y)+
C \lambda^{-p_2} \int_Y |f|^{p_2} 1_{|f|\le \lambda}\, d\nu(y)\ ,$$ and therefore $$\|Tf\|_{L^p(X,\sigma,S)}=\left(p \int_0^\infty \lambda^{p-1} \mu(S(Tf)>\lambda)\, d\lambda\right)^{1/p}$$ $$\le
C\Big( \int_Y |f|^{p_1} (\int_0^{|f|} \lambda^{p-p_1-1} d\lambda) d\nu + \int_Y |f|^{p_2} (\int_{|f|}^\infty \lambda^{p-p_2-1} d\lambda )d\nu\Big)^{1/p} \ \ ,$$ $$\le C \|f\|_{L^p(Y,\nu)} \ \ .$$ It remains to consider the case $p_1<p_2=\infty$. We similarly decompose $f= f_{1,\lambda} + f_{2,\lambda}$ with $f_{1,\lambda}=f 1_{|f|>c\lambda}$ for suitable small $c$ to be determined momentarily. Then $$\| Tf_{2,\lambda}\|_{L^\infty(X,\sigma,S)} \le \|f_{2,\lambda}\|_{L^\infty(Y,\nu)} < c\lambda \ \ .$$ It follows from that with sufficiently small $c$ $$\mu(S(Tf)> \lambda) \le \mu(S(Tf_{1,\lambda})> \lambda/C) + \mu(S(Tf_{2,\lambda})> \lambda/C)
= \mu(S(Tf_{1,\lambda})> \lambda/C) \ \ .$$ Consequently, $$\|Tf\|_{L^p(X,\sigma,S)} \le C \Big(\int_0^\infty \lambda^{p-1} \mu(S(Tf)>\lambda)d\lambda\Big)^{1/p}$$ $$\le C \Big(\int_0^\infty \lambda^{p-1} \mu(S(Tf_{1,\lambda})>\lambda/C)d\lambda\Big)^{1/p}\ .$$
Then we proceed as before to obtain $$\|Tf\|_{L^p(X,\sigma,S)} \le
C \int_Y |f|^{p_1} (\int_{|f|}^\infty\lambda^{p-p_1-1} d\lambda )d\nu\Big)^{1/p} \le C \|f\|_{L^p(Y,\nu)}\ \ .$$
The following is a simple variant of a classical fact about measures: If a measure $\nu$ on a space is absolutely continuous with respect to another measure $\mu$, and if the Radon Nikodym derivative of $\nu$ with respect to $\mu$ is bounded, then the total mass of $\nu$ can be estimated by the total mass of $\mu$.
\[measuredomination\] Assume $(X,\sigma,S)$ is an outer measure space and assume that about every point in $X$ there is an open ball for which there exists $E\in \E$ which contains the ball. Let $\nu$ be a positive Borel measure on $X$. Assume that for every $f\in \B(X)$ and for every $E\in \E$ we have $${\int_E |f| \, d\nu} \le C S(f)(E) \sigma(E)\ .$$
Then, for every $f\in \B(X)$ with finite $\|f\|_{L^\infty(X,\sigma,S)}$ we have: $$|\int_X f\, d\nu |\le C \|f\|_{L^1(X,\sigma,S)}\ ,$$ where the implicit constant $C$ in particular is independent of $\|f\|_{L^\infty(X,\sigma,S)}$.
We may assume that $\mu(S(f)>\lambda)$ is finite for every $\lambda>0$, or else nothing is to prove. For each $k\in \Z$ consider a set $F_k$ such that $$\essup_{F_k^c}S(f) \le 2^k\ ,$$ $$\mu(F_k)\le 2\mu(S(f)>2^k)\ .$$ Cover $F_k$ by a countable subcollection $\E_k$ of $\E$ such that $$\sum_{E\in \E_k}{\sigma(E)}\le 2\mu(F_k)\ .$$
Let $F=\bigcup_k F_k$ and note that for every sufficiently small open ball $B$ about a point in $X$ we can find $E\in \E$ such that $B \subset E$, thus $$\int_{B\cap F^c} |f|1_{F^c}\, d\nu\le C S(f1_{F^c})(E) \sigma(E) =0\ .$$ Hence $$\int_X|f|\, d\nu=\int_F |f|\, d\nu\ .$$ Since we may assume $F_k=\emptyset$ for sufficiently large $k$ we have $$|\int_X f\, d\nu |\le \sum_k \int_{F_k\setminus \bigcup_{l>k} F_l} |f|\, d\nu
\le\sum_k \sum_{E\in \E_k} \int_{E\setminus \bigcup_{l>k} F_l} |f|\, d\nu$$ $$\le \sum_k \sum_{E\in \E_k} S(f1_{F_{k+1}^c}) \mu(E)\le
C\sum_k \sum_{E\in \E_k} 2^k \sigma(E)$$ $$\le C\sum_k 2^k \mu(S(f)>2^k)\le C\|f\|_{L^1(X,\sigma,S)}\ .$$ This completes the proof of the proposition.
Carleson embedding, paraproducts, and the $T(1)$ theorem {#t1section}
=========================================================
This section contains classical results rephrased in the language of outer measure spaces utilizing Example 3 of Section \[examplesection\]. Readers interested in reviewing the classical theory are referred to [@stein]. A novelty of our approach is the interpretation of Carleson embedding theorems as boundedness of certain maps from a classical $L^p$ to an outer $L^p$ space. As a consequence, outer Hölder’s inequality can be used to prove various multi-linear estimates such as paraproduct estimates or a core version of a $T(1)$ theorem.
Carleson embeddings
-------------------
We consider the upper half plane $X=\R\times (0,\infty)$, we let $\E$ be the collection of tents $$T(x,s)=\{(y,t)\in \R\times (0,\infty): t<s, |x-y|<s-t\}\ ,$$ and we set $\sigma(T(x,s))=s$ as in Example 3.
(220,100) (10,10)[(0,1)[70]{}]{} (5,10)[(1,0)[195]{}]{} (205,5)[$y$]{} (5,85)[$t$]{}
(40,10)[(1,1)[20]{}]{} (60,30)[(1,-1)[20]{}]{} (100,10)[(1,1)[40]{}]{} (140,50)[(1,-1)[40]{}]{} (50,40)[$(x,s)$]{} (130,60)[$(x',s')$]{} (60,30) (140,50)
Define for $1\le p<\infty$ the sizes $$S_p (F)(T(x,s)):=(s^{-1}\int_{T(x,s)} |F(y,t)|^p \, dy\, \frac{dt}t)^{1/p}\ \ ,$$ where we have used standard Lebesgue integration in $\R\times (0,\infty)$, and $$S_\infty (F)(T(x,s)):=\sup_{(y,t)\in T(x,s)} |F(y,t)| \ \ .$$
Let $\phi$ be a smooth function on the real line supported in $[-1,1]$ and define for a locally integrable function $f$ on the real line $$\label{definefphi}
F_\phi(f)(y,t):= \int f(x) t^{-1}\overline{\phi(t^{-1}(y-x))}\, dx
\ .$$ The mapping $f\to F_\phi(f)$ is an embedding of a space of functions on the real line into a space of functions in the upper half plane reminiscent of [*Carleson embeddings*]{}. Thus we call the following estimates [*Carleson embedding theorems*]{}, even though traditionally this notion is reserved for special instances and applications of such estimates. In particular, if $\nu$ is a Borel measure on the upper half plane satisfying the so-called Carleson measure condition $\nu(T(x,s))\le Ms$, then one could deduce from Theorem \[carlesonembedding\] a typical version of the classical Carleson embedding theorem, as follows. Below the first and last $L^p$ norm are classical Lebesgue norms while the second and third $L^p$ norms are outer $L^p$ norms over an outer measure generated by $\nu$ and $\sigma$ and the tent collection. $$\|F_\phi(f)\|_{L^p(X,\nu)} \le \|F_\phi\|_{L^p(X,\nu,S_\infty)} \le$$ $$\le M\|F_\phi\|_{L^p(X,\sigma,S_\infty)} \le$$ $$\le C_{p,\phi}M\|f\|_p$$
\[carlesonembedding\] Let $1<p\le \infty$. We have for $\phi$ as above $$\label{mfestimate}
\|F_\phi(f)\|_{L^{p}(X,\sigma,S_\infty)}\le C_{p,\phi}\|f\|_p\ .$$ If in addition $\int \phi=0$, then $$\label{sfestimate}
\|F_\phi(f)\|_{L^{p}(X,\sigma,S_2)}\le C_{p,\phi}\|f\|_p\ .$$
We first prove Estimate (\[mfestimate\]). The estimate will follow by Marcinkiewicz interpolation, Proposition \[p.marcinkiewicz\], between weak endpoint bounds at $p=\infty$ and $p=1$. Clearly we have for all $(y,t)\in X$: $$|F_\phi(f)(y,t)|\le \|f\|_\infty \|\phi\|_1\ .$$ Hence $$S_\infty(F_\phi)(T(x,s))\le \|f\|_\infty \|\phi\|_1$$ for every tent $T(x,s)$, and this implies the $L^\infty$ bound. To prove the weak type estimate at $L^1$, fix $f$ and $\lambda>0$. Consider the set $\Omega \subset \R$ where the Hardy Littlewood maximal function $Mf$ of $f$ is larger than $c_\phi \lambda$ for some constant $c_\phi$ that depends on $\phi$ and is specified later. The set $\Omega$ is open and thus the disjoint union of at most countably many open intervals $(x_i-s_i,x_i+s_i)$ for $i=1,2,\dots$. Let $E$ be the union of the tents $T(x_i,s_i)$. Then the geometry of tents implies that for $(x,s)\not\in E$ none of the intervals $(x_i-s_i,x_i+s_i)$ may contain the interval $(x-s,x+s)$ and hence there is a point $y\in (x-s,x+s)$ such that $Mf(y)\le c_\phi\lambda$. Then we see from a standard estimate of $\phi$ by a superposition of characteristic functions of intervals of length at least $2s$: $$F_\phi(f)(x,s)\le C_\phi Mf(y)\le \lambda\ ,$$ the latter by appropriate choice of $c_\phi$. Hence $$\essup_{E^c} S_\infty(F_\phi)\le \lambda\ .$$ On the other hand, by the Hardy Littlewood maximal theorem, $$\mu(E)\le \sum_i s_i\le |\{x: Mf(x)\ge c_\phi \lambda\}|\le C_\phi \|f\|_1 \lambda^{-1}\ .$$ This proves the weak type estimate at $L^1$ and completes the proof of Estimate (\[mfestimate\]).
We turn to Estimate (\[sfestimate\]), which is proven similarly by Marcinkiewicz interpolation between weak endpoint bounds at $\infty$ and $1$. Note first that if $\phi$ has integral zero, then the map $F_\phi$ goes under the name of “continuous wavelet transform” and is well known to be a multiple of an isometry in the following sense: $$\int_0^\infty \int_\R |F_\phi(g)(y,t)|^2 \, dy \,\frac{dt}t=C_\phi \|g\|_2^2$$ for every $g\in L^2(\R)$. This fact goes under the name of Calderón’s reproducing formula or Calderón’s resolution of the identity, see for example [@daubechies]. It can be proven by a calculation similar to our reduction of Theorem \[bilinearhttheo\] to Lemma \[bhttheorem\] below.
Consider a tent $T(x,s)$. For $(y,t)$ in the tent, we see from compact support of $\phi$ that $$F_\phi(f)(y,t)=F_\phi(f1_{[x-3s,x+3s]})(y,t)\ .$$ Applying Calderón’s reproducing formula with $g=f1_{[x-3s,x+3s]}$ gives $$\int \int_{T(x,s)} |F_\phi(f)(y,t)|^2 \, dy \,\frac{dt}t\le C_\phi \|f1_{[x-3s,x+3s]}\|_2^2\le C_\phi s \|f\|_\infty^2 \ .$$ Dividing by $s$ gives $$S_2(F_\phi(f))(T(x,s))\le C_\phi \|f\|_\infty\ ,$$ which proves the desired estimate for $p=\infty$.
To prove the weak type bound at $p=1$, fix $f\in L^1(\R)$ and $\lambda>0$ and consider again the set $\Omega=\{x: Mf(x)>c_\phi \lambda\}$, which is the disjoint union of open intervals $(x_i-s_i,x_i+s_i)$. Consider the Calderón-Zygmund decomposition of $f$ at level $c_\phi \lambda$: $$f=g+\sum_i b_i$$ which is uniquely determined by the demand that for each $i$ the function $b_i$ is supported on $[x_i-s_i,x_i+s_i]$, and has integral zero, while $g$ is constant on this interval. As a consequence, $g$ is bounded by $c_\phi \lambda$ and we have by the previous argument for any tent $$S_2(F_\phi(g))(T(x,s))\le \lambda/2\ .$$
Let $E$ be the union of tents $T(x_i,3s_i)$. Let $b=\sum_i b_i$. It remains to show that, with small choice of $c_\phi$, for every $(x,s)\in \R\times (0,\infty)$ it holds that $$S_2(F_\phi(b)1_{E^c})(T(x,s))\le \lambda/2 \ \ .$$ Let $B_i$ denote the compactly supported primitive of $b_i$. Then we have for $(y,t)\notin E$, using compact support of $\phi$, $$F_\phi(b)(y,t)= \int b(x) t^{-1}\overline{\phi(t^{-1}(y-x))}\, dy$$ $$=\int \sum_{i: s_i \le t} b_i(x) t^{-1}\overline{\phi(t^{-1}(y-x))}\, dx$$ $$= \int \sum_{i: s_i \le t} B_i(x) t^{-2}\overline{\phi'(t^{-1}(y-x))}\, dx\ .$$ Hence $$|F_\phi(b)(y,t)|\le \|\sum_{i: s_i \le t} t^{-1} B_i \|_\infty \|\phi'\|_1\ .$$ We claim that the $L^\infty$ norm on the right-hand-side is bounded by $4c_\phi\lambda$. Since the $B_i$ are disjointly supported, it suffices to see $\|t^{-1}B_i\|_\infty\le 4c_\phi \lambda$ for each $i$ with $s_i\le t$. However, this follows from $\|b_i\|_1\le 4c_\phi \lambda s_i$, which is a standard estimate for the Calderón Zygmund decomposition. Hence $$S_\infty(F_\phi(b)1_{E^c})(T(s,x))\le 4c_\phi \lambda \ .$$ To obtain a bound for $S_2$ in place of $S_\infty$, we use log convexity of $S_p$ and a bound on $S_1$. Let $T(x,s)$ be a tent and $b_i$ one summand of the bad function. Then we have from considerations of the support of $b_i$ and $\phi$: $$\int_{(y,t)\in T(x,s)\setminus E} |\int_\R b_i(z) t^{-1}\overline{\phi(t^{-1}(y-z))}\, dz|\, dy\, \frac{dt}t$$ $$\le \int_{t \ge s_i} \int _{|y-x_i| \le 2t} |\int_\R b_i(z) t^{-1}\overline{\phi(t^{-1}(y-z))}\, dz|\, dy\, \frac{dt}t\ .$$ Using partial integration we estimate this by $$\int_{t \ge s_i} \int _{|y-x_i| \le 2t} \|B_i\|_1 \|\phi'\|_\infty \, dy\, \frac{dt}{t^3}$$ $$\le C_\phi \int_{t \ge s_i} \|B_i\|_1 \, \frac{dt}{t^2}
\le C_\phi \|B_i\|_1 s_i^{-1}\le C_\phi \|b_i\|_1 \le \lambda s_i/6\ .$$
Adding over the disjointly supported $b_i$ inside $(x-3s,x+3s)$, which are all the summands of the bad function possibly contributing to $F_\phi(b)$ on $T(x,s)$, gives $$S_1(F_\phi(b)1_{E^c})(T(x,s)) \le \lambda /2\ .$$ By log convexity, we then obtain $$S_2(F_\phi(b)1_{E^c})(T(x,s)) \le \lambda/2 \ .$$ Together with the previously established bound for the good function we obtain by the triangle inequality $$S_2(F_\phi(f)1_{E^c})(T(x,s)) \le \lambda$$ and hence $$\essup_{E^c} S_2(F_\phi(f))\le \lambda\ .$$ On the other hand, we have by the Hardy Littlewood maximal theorem as before $$\mu(E)\le C_\phi \|f\|_1 \lambda^{-1}\ .$$ This completes the proof of the weak type $1$ endpoint bound for Estimate \[sfestimate\] and thus the proof of Theorem \[carlesonembedding\].
We will need to apply Theorem \[carlesonembedding\] in a slightly modified setting.
For two parameters $-1\le \alpha\le 1$ and $0< \beta\le 1$ define $$F_{\alpha,\beta,\phi}(f)(y,t):=F_\phi(f)(y+\alpha t, \beta t)\ .$$ To estimate the outer $L^p$ norm of $F_{\alpha,\beta,\phi}(f)$, first note that by a simple change of variables $$s^{-1}\int_{T(x,s)}|F_{\alpha,\beta,\phi}(f)(y,t)|^2\, dy \frac{dt}t
=s^{-1}\int_{T_{\alpha,\beta}(x,s)}|F_\phi(f)(y,t)|^2\, dy \frac{dt}t$$ where we have defined the modified tent $T_{\alpha,\beta}(x,s)$ to be the set of all points $(z,u)$ such that $(z-\alpha \beta^{-1} u,\beta^{-1} u)\in T(x,s)$. This modified tent is a tilted triangle, it has height $\beta s$ above the real line and width $2s$ near the real line. The tip of the tilted tent is the point $(x+\alpha s,\beta s)$, which is contained in a rectangle with base $[x-s,x+s]$ and height $s$ above the $x$-axis. We construct an outer measure space using the collection of modified tents by setting $$\sigma_{\alpha,\beta}(T_{\alpha,\beta}(x,s)):=s\ .$$ We then define for a Borel measurable function $G$ on $X$ $$S_{\alpha,\beta,2} (G)(T_{\alpha,\beta}(x,s)):=(s^{-1}\int_{T_{\alpha,\beta}(x,s)} |G(y,t)|^2 \, dy\, \frac{dt}t)^{1/2}\ .$$ We have by transport of structure $$\|F_{\alpha,\beta,\phi}(f)\|_{L^p(X,\sigma,S_2)}=
\|F_\phi(f)\|_{L^p(X,\sigma_{\alpha,\beta},S_{\alpha,\beta,2})}\ .$$ Given a standard tent $T(x,s)$, we may cover it by a modified tent $T_{\alpha,\beta}(x',s')$ of width $ 2s'=4\beta^{-1}s$. Hence $$\mu_{\alpha,\beta}(T(x,s))\le C \beta^{-1} \mu(T(x,s))\ .$$ Moreover, a modified tent $T_{\alpha,\beta}(x,s)$ is contained in a standard tent $T(x',s')$ of width $2s'=4s$. Hence $$S_{\alpha,\beta,2}(G)(T_{\alpha,\beta}(x,s))\le C S_2(G)(T(x',s'))\ .$$ Thus Proposition \[pullback\] applied to the identity map on $X$ gives $$\|F_\phi(f)\|_{L^p(X,\sigma_{\alpha,\beta}, S_{\alpha,\beta,2})}\le C\beta^{-1/p}
\|F_\phi(f)\|_{L^p(X,\sigma, S_2)}\ .$$ We have thus proven the following corollary.
\[tentcorollary\] Assume the setup as above. Let $1<p\le \infty$ and $-1\le \alpha\le 1$ and $0< \beta\le 1$ and assume $\int \phi=0$. Then $$\|F_{\alpha,\beta,\phi}(f)\|_{L^{p}(X,\sigma,S_2)}\le C_{p,\phi} \beta^{-1/p}\|f\|_p\ .$$
We shall need a slightly better dependence on the parameter $\beta$ in the last corollary. This is stated in the following lemma, where explicit values for $\epsilon$ are not difficult to obtain but unimportant for our purpose.
\[tiltedembedding\] Assume the setup as above. Let $1<p\le \infty$ and $-1\le \alpha\le 1$ and $0< \beta\le 1$ and assume $\int \phi=0$. Then there exists $\epsilon>0$ such that we have $$\|F_{\alpha,\beta,\phi}(f)\|_{L^{p}(X,\sigma,S_2)}\le C_{p,\phi} \beta^{-1/p+\epsilon}\|f\|_p\ .$$
Proof: This lemma follows by various applications of Marcinkiewicz interpolation using the bounds of Corollary \[tentcorollary\] and an improved weak type 2 bound: $$\|F_{\alpha,\beta,\phi}(f)\|_{L^{2,\infty}(X,\sigma,S_2)}=
\|F_{\phi}(f)\|_{L^{2,\infty}(X,\sigma_{\alpha,\beta},S_{\alpha,\beta,2})}
\le C_{\phi} \|f\|_2\ ,$$ where the right-hand-side does not depend on $\beta$. To see this bound, fix $f\in L^2(\R)$ and $\lambda>0$. Consider the collection $\I$ of all open intervals $(x-s,x+s)$ on the real line such that $$s^{-1}
\int_{T_{\alpha,\beta}(x,s)}|F_\phi(f)(y , t)|^2\, dy \frac{dt}t
> \lambda^2\ .$$ The union $\bigcup_{I\in \I}I$ is an open set which can be written as the disjoint union of countably many open intervals $(x_i-s_i,x_i+s_i)$. If we set $E=\bigcup_i T_{\alpha,\beta}(x_i,s_i)$, then it is clear that $$S_{\alpha,\beta,2}(F_{\phi}(f) 1_{E^c})(T_{\alpha,\beta}(x,s)) \le \lambda$$ for each $(x,s)$. Hence it suffices to show $$\label{tiltedtents}
\sum_is_i\le C\lambda^{-2}\|f\|_2^2\ .$$
We first show that if $\I_1\subset \I$ is a collection of disjoint intervals then $$\sum_{I_1\in \I_1}|I_1|\le C\lambda^{-2}\|f\|_2^2\ ,$$ It is clear that such $\I_1$ has to be countable. Enumerate the intervals in $\I_1$ as $(x_1'-s_1',x_1'+s_1')$, $(x_2'-s_2',x_2'+s_2')$ etc. Then we have by choice of the collection $\I$ $$\sum_i s_i'\le \sum_i
\lambda^{-2}
\int_{T_{\alpha,\beta}(x_i',s_i')}|F_\phi(f)(y, t)|^2\, dy
\frac{dt}t\ .$$ However, the tents $T_{\alpha,\beta}(x_i',s_i')$ are pairwise disjoint, and hence $$\sum_i s_i'\le
\lambda^{-2}
\int_{0}^\infty \int_\R |F_\phi(f)(y, t)|^2\, dy
\frac{dt}t\ .$$ By Calderón’s reproducing formula, the latter is bounded by $$C_\phi \lambda^{-2}\|f\|_2^2\ .$$
The above estimate shows in particular that $\sup_{I\in \I} |I|$ is finite, and we may select any $I_1\in \I$ such that $|I_1|>\frac 1 2 \sup_{I\in \I}|I|$. Let $\I'$ be the collection of intervals in $\I$ that does not intersect (or contain) $I_1$. Then select any $I_2 \in \I'$ such that its length is more than half of $\sup_{I\in \I'} |I|$. Iterate this argument we obtain a sequence $I_1,I_2,\dots$ of disjoint intervals in $\I$. We claim that $$\bigcup_{I\in \I} I \subset \bigcup_{j} 5I_j$$ here for any $m>0$ we define $mI_j$ to be the interval of length $m|I_j|$ with the same center as $I_j$. Certainly this claim will imply .
Suppose, towards a contradiction, that there exists $I\in \I$ such that $I\not\subset \bigcup_{j} 5I_j$. We first claim that $I$ intersects one of the intervals $I_1,I_2,\dots$. Indeed, since $|I_j|\to 0$ as $j\to\infty$, there exists $j\ge 1$ such that $|I| > 2|I_{j+1}|$ which means $I$ wasn’t available for selection after step $j$, i.e. $I$ has to intersect one of the intervals $I_1,\dots, I_j$. Now, let $k \ge 1$ be the smallest index such that $I\cap I_k \ne \emptyset$. It follows that $I$ is available for selection after step $k-1$, and hence $|I_k|\ge \frac 1 2 |I|$ and therefore $$I\subset 5I_k$$ which contradicts the above assumption.
This proves the lemma.
Paraproducts and the $T(1)$ theorem
-----------------------------------
A classical paraproduct is a bilinear operator, which after pairing with a third function becomes a trilinear form that is essentially of the type
$$\Lambda(f_1,f_2,f_3)= \int_{\R\times (0,\infty)}
\prod_{j=1}^3 F_{\phi_j}(f_j)(x,t)\, dx\frac{dt}t$$ with three compactly supported smooth functions $\phi_1,\phi_2,\phi_3$ of which two have vanishing integral while the third does not necessarily have vanishing integral. By symmetry we assume $\phi_1$ and $\phi_2$ to have vanishing integral. Paraproducts also appear in different forms in the literature, for example discretized versions of the above integral, or versions involving only two embedding maps $F_i$. In the latter case the third embedding can typically be inserted after using some manipulations on the integral expression.
Assuming $f_j$ are bounded, and thus $F_{\phi_j}(f_j)$ are bounded as well, we obtain by an application of Proposition \[measuredomination\] the estimate $$|\Lambda(f_1,f_2,f_3)| \le C\|\prod_{j=1}^3 F_{\phi_j}(f_j)\|_{L^1(X,\sigma,S_1)}\ .$$ By Hölder’s inequality, once the classical one for the sizes and once Proposition \[p.hoelder-energy\], we obtain $$|\Lambda(f_1,f_2,f_3)| \le C
\|F_{\phi_1}(f_1)\|_{L^{p_1}(X,\sigma,S_2)}\|F_{\phi_2}(f_2)\|_{L^{p_2}(X,\sigma,S_2)}
\|F_{\phi_3}(f_3)\|_{L^{p_3}(X,\sigma,S_\infty)}$$ for exponents $1< p_1,p_2,p_3\le \infty$. By applying the Carleson embedding theorems we obtain $$|\Lambda(f_1,f_2,f_3)| \le C
\|f_1\|_{p_1}\|f_2\|_{p_2}
\|f_3\|_{p_3}\ ,$$ which reproduces classical paraproduct estimates. Note that the last estimate does not depend on the $L^\infty$ bounds on $f_j$, and thus easily extends to unbounded functions. With well known and not too laborous changes in the above arguments one can also reproduce classical ${\rm BMO}$ bounds in place of $p_1=\infty$ or $p_2=\infty$.
We now state a simplified version of the classical $T(1)$ theorem originating in [@david-journe].
\[t1theorem\] Let $\phi$ be some nonzero smooth function supported in $[-1,1]$ with $\int \phi=0$ and define for $x\in \R$ and $s\in (0,\infty)$ $$\phi_{x,s}(y)=s^{-1}\phi(s^{-1}(y-x))\ .$$ Assume $T$ is a bounded linear operator in $L^2(\R)$ such that for all $x,y,s,t$ $$\label{t1assumption}
|\<T(\phi_{x,s}),\phi_{y,t}\>|\le \frac{\min(t,s)}{\max(t,s,|y-x|)^2}\ .$$ Then we have for the operator norm of $T$ the bound $$\|T\|_{L^2\to L^2}\le C$$ for some constant $C$ depending only on $\phi$ and in particular not on $T$. Moreover, for $1<p<\infty$, $$\|T f\|_{p}\le C_p \|f\|_p$$ for some constant $C_p$ depending only on $\phi$ and $p$.
To compare this with more classical formulations of the $T(1)$ theorem, the assumption (\[t1assumption\]) is typically deduced from Calderón-Zygmund kernel estimates if $|x-y|>t+s$ and thus the two test functions $\phi_{x,s}$ and $\phi_{y,t}$ are disjointly supported. It is deduced from one of the assumptions $T(1)=0$ and $T^*(1)=0$ and a weak boundedness assumption if $s$ or $t$ is within a factor of $2$ of the maximum of $s$, $t$, and $|y-x|$ and thus the two test functions are close. The assumptions $T(1)=0$ and $T^*(1)=0$ can be obtained from more general assumptions $T(1)\in {\rm BMO}$ and $T^*(1)
\in{\rm BMO}$ by subtracting paraproducts from $T$ first. A detailed exposition of the $T(1)$ theorem can be found in [@stein].
We note from Calderón’s reproducing formula $$f=C \int_0^\infty \int_\R F(x,s) \phi_{x,s} \, dx\, \frac{ds}{s}$$ with a weakly absolutely convergent integral in $L^2$ and $F=F_\phi(f)$ as defined in (\[definefphi\]). Thus we may write with the analoguous notation $G=F_\phi(g)$ $$\<T(f),g\>=$$ $$=\int_0^\infty \int_0^\infty \int_\R \int_\R
F(x,s) {\<T(\phi_{x,s}),\phi_{y,t}\>} \overline{G(y,t)}
\, dx\,dy \, \frac{ds}
{s}\, \frac{dt}{t}\ .$$
Here we implicitly used boundedness of $T$ and the Schwarz kernel theorem to move $T$ inside the integral representation of $f$. Note that we have again expressed the form $\<T(f),g\>$ in terms of the functions $F$ and $G$ on the outer space $X$, which leads towards the use of embedding theorems. However, we cannot apply Hölder’s inequality directly, but we first have to suitably express the double integral over the space $X$ as superposition of single integrals over $X$.
Set $$r:=\max(s,t,|y-x|)\ .$$ We split the domain of integration into the two regions $r> |x-y|$ and $r=|x-y|$ and estimate the two integrals separately. Splitting the first region further into two symmetric regions (overlapping in a set of measure zero), we may restrict attention to the region $s=r$. We estimate the integral over this region by $$|\int_0^\infty \int_\R
\int_{0}^s \int_{x-s}^{x+s}
F(x,s)
{\<T(\phi_{x,s}),\phi_{y,t}\>}
\overline{G(y,t)} \, dy\,\frac{dt}t
\, dx\, \frac{ds}s|$$ $$\le C
\int_0^\infty \int_\R
\int_{0}^s \int_{x-s}^{x+s}
|F(x,s)
\overline{G(y,t)}| \, dy\,{dt}
\, dx\, \frac{ds}{s^3}$$ $$= C
\int_0^1\int_{-1}^1
\int_0^\infty \int_\R
|F(x,s)
\overline{G(x+\alpha s,\beta s)} | \,
\, dx\, \frac{ds}{s}\,
\, d\alpha \, {d\beta }\ .$$ In the last line we have changed variables setting $y-x=\alpha s$ and $t=\beta s$. Setting ${G}_{\alpha,\beta}(x,s)=G(x+\alpha s,\beta s)$ we estimate the last display, using Propositions \[measuredomination\] and outer Hölder’s inequality with dual exponents $1<p,p'<\infty$, Proposition \[p.hoelder-energy\], $$\le C
\int_0^1\int_{-1}^1
\|F G_{\alpha,\beta}\|_{L^1(X,\sigma,S_1)}
\, d\alpha \, {d\beta }$$ $$\le C
\int_0^1\int_{-1}^1
\|F\|_{L^p(X,\sigma,S_2)}
\|G_{\alpha,\beta}\|_{L^{p'}(X,\sigma,S_2)}
\, d\alpha \, {d\beta }\ .$$ The norm of $F$ can be estimated by Theorem \[carlesonembedding\], while the norm of $G$ can be estimated by Lemma \[tiltedembedding\]. Hence we can estimate the last display by $$\le C
\int_0^1\int_{-1}^1
\beta^{-1/p'}\|f\|_{p}\|g\|_{p'}
\, d\alpha \, {d\beta }
\le
C\|f\|_{p}\|g\|_{p'}\ .$$
The region $r=|y-x|$ we also split into symmetric regions, ~~first~~ restricting to $r=y-x$ and $r=x-y$. By symmetry, it suffices to estimate the region $r=y-x$. We now split further into $t\le s$ and $s\le t$.
We obtain for the subregion $t\le s$ the estimate $$|\int_{0}^\infty\int_\R \int_{0}^r \int_0^s F(x,s)
\< T(\phi_{x,s}),\phi_{x+r,t}\>
\overline{G(x+r,t)} \frac{dt}t \frac {ds}s \, dx\, {dr}|$$ $$\le
\int_0^\infty \int_\R \int_{0}^r \int_0^s |F(x,s)
\overline{G(x+r,t)}| {dt} \frac{ds}s \, dx\, \frac{dr}{r^2}$$ $$=
\int_{0}^1 \int_0^\alpha
\int_0^\infty \int_\R
|F(x,\alpha r)
\overline{G(x+r,\beta r)} |
\, dx\, \frac{dr}r
{d\beta } \frac{d\alpha }\alpha$$ $$=
\int_{0}^1 \int_0^\alpha
\int_0^\infty \int_\R
|F_{0,\alpha}(x,r)
\overline{G_{1,\beta}(x,r)} |
\, dx\, \frac{dr}r
{d\beta } \frac{d\alpha }\alpha \ ,$$ where we have used the notation $F_{0,\alpha}$ and $G_{1,\beta}$ as above. We use Lemma \[tiltedembedding\] twice to estimate the last display by $$\le C
\int_{0}^1 \int_0^\alpha
\alpha^{\epsilon-1/p}\beta^{\epsilon-1/p'} \|f\|_p\|g\|_{p'}
{d\beta } \frac{d\alpha }\alpha \le C\|f\|_p\|g\|_{p'} \ .$$ The subregion $s\le t$ could be estimated similarly. This concludes the proof of the $L^2$ and $L^p$ estimate of Theorem \[t1theorem\].
We conclude this section by pointing at an alternative approach to Calderón Zygmund operators used in A. Lerner’s work [@lerner], who essentially controls a Calderón Zygmund operators by a superposition of “sparse” operators. These sparse operators lend themselves to an application of an outer Hölder inequality with spaces $ L^{\infty}(X,\sigma,S_1)\times L^{p}(X,\sigma,S_\infty)\times L^{p'}(X,\sigma,S_\infty)$ in lieu of the above $ L^{p}(X,\sigma,S_2)\times L^{p'}(X,\sigma,S_2)$ or implicit $ L^{\infty}(X,\sigma,S_\infty)\times L^{p}(X,\sigma,S_2)\times L^{p'}(X,\sigma,S_2)$.
Generalized Tents and Carleson Embedding {#gentents}
========================================
In this section we introduce a new outer measure space whose underlying set is the upper three space. The extra dimension relative to the classical tent spaces is a frequency parameter, which arises due to modulation symmetries in problems of time-frequency analysis. In contrast, the upper half plane merely represents dilation and translation symmetries. The generalized Carleson embedding theorem below is new, though its proof is an adaption of standard recipes in time-frequency analysis. The novelty lies in the concise formulation of an essential part of time-frequency analysis, and in the absence of any discretization in the formulation of Theorem \[gen.carl.emb\].
This section is the most technical one of the present paper, as it is devoted to a proof of Theorem \[gen.carl.emb\] and its discrete variant, Theorem \[gen.carl.emb.disc\]. We point out that the application of Theorem \[gen.carl.emb\] to the bilinear Hilbert transform discussed in the final section can be understood without detailed reading of the proof in the present section.
Let $X$ be the space $\R\times \R\times (0,\infty)$ with the usual metric as subspace of $\R^3$. Let $0<|\alpha|\le 1$ and $|\beta|\le 0.9$ be two real parameters and define for a point $(x,\xi,s)$ in $X$ the generalized tent $$\label{gentent}
T_{\alpha,\beta}(x,\xi,s):=\{(y,\eta,t)\in X: t\le s, |y-x|\le s-t, |\alpha(\eta-\xi)+\beta t^{-1}|\le t^{-1}\}\ .$$ For a first understanding the reader may focus on the example $\alpha=1$ and $\beta=0$. In this case the condition on the frequency variable $\eta$ becomes $-t^{-1} \le \eta-\xi \le t^{-1}$ which is symmetric around $\xi$, as can be seen below. The general case with other $(\alpha,\beta)$ leads to a condition $At^{-1}\le \eta - \xi \le Bt^{-1}$ for some $A<0<B$ depending on $\alpha,\beta$, and will correspond to an asymmetric variant of the Figure below.
(300,120) (20,40)[(1,0)[250]{}]{} (0,20)[(3,1)[120]{}]{} (60,40)[(0,1)[60]{}]{} (275,35)[$y$]{} (55,105)[$t$]{} (120,65)[$\eta$]{} (77,14)[(3,1)[126]{}]{} (157,14)[(3,1)[126]{}]{} (150,65)[(3,1)[60]{}]{} (140,35)[(1,1)[40]{}]{} (180,75)[(1,-1)[40]{}]{} (170,45)[(1,1)[40]{}]{} (210,85)[(1,-1)[40]{}]{} (110,25)[(1,1)[40]{}]{} (150,65)[(1,-1)[40]{}]{} (80,15)[(1,1)[20]{}]{} (160,15)[(-1,1)[20]{}]{} (100,35)[(1,0)[40]{}]{} (200,55)[(1,1)[20]{}]{} (280,55)[(-1,1)[20]{}]{} (220,75)[(1,0)[40]{}]{} (180,75) (165,85)[$(x,\xi, s)$]{} (100,35)(120,40)(150,65) (210,85)(215,78)(220,75) (140,35)(145,40)(150,65) (210,85)(235,78)(260,75)
The projection of the generalized tent onto the first two variables is a classical tent as in Example 3. We are only concerned with generalized tents in this section and will omit the adjective “generalized” when referring to $T_{\alpha,\beta}(x,\xi,s)$. The collection $\E$ of all tents generates an outer measure if we set $$\sigma(T_{\alpha,\beta}(x,\xi,s))=s\ .$$ By a similar argument as in Example 3, $\sigma$ satisfies , and hence the outer measure $\mu$ is an extension of the function $\sigma$ on $\E$.
To define a size on Borel functions on $X$, we use further auxiliary tents $$\label{definegent}
T^b(x,\xi,s):=\{(y,\eta,t)\in X: t\le s, |y-x|\le s-t, |\eta-\xi|\le b t^{-1}\}\ .$$ For $0<b< 1$ and a Borel measurable function $F$ on $X$ we define $$\label{definegens}
S^{b}(F)(T_{\alpha,\beta}(x,\xi,s)):=$$ $$(s^{-1}\int_{T_{\alpha,\beta}(x,\xi,s)\setminus T^b(x,\xi,s)}|F(y,\eta,t)|^2 \, dy\,
d\eta \,{dt})^{1/2}
+ \sup_{(y,\eta,t)\in T_{\alpha,\beta}(x,\xi,s)}|F(y,\eta,t)|\ .$$ One easily checks that this size satisfies the properties required in Definition \[d.size\]. The size $S^b$ increases as $b$ decreases.
The following is a version of a Carleson embedding theorem in the setting of generalized tents. We normalize the Fourier transform of a Schwartz function $\phi$ on the real line as $$\widehat{\phi}(\xi)=\int_\R e^{-i\xi x}\phi(x)\, dx\ .$$
\[gen.carl.emb\]
Let $0<|\alpha|\le 1$ and $|\beta|\le 0.9$. Let $0<b\le 2^{-8}$. Let $\phi$ be a Schwartz function with Fourier transform $\widehat{\phi}$ supported in $(-2^{-8}b,2^{-8}b)$, and let $2\le p\le \infty$. Define for $f\in L^p(\R)$ the function $F$ on $X$ by $$F(y,\eta,t):=\int_\R f(x) e^{i\eta (y-x)} t^{-1}\phi(t^{-1}(y-x)) \, dx\ .$$ There is some constant $C$ depending only on $\alpha$, $\beta$, $b$, $\phi$, and $p$, such that if $p > 2$, $$\|F\|_{\L^{p}(X,\sigma,S^b)}\le C \|f\|_p\ ,$$ and if $p=2$, $$\|F\|_{\L^{2,\infty}(X,\sigma,S^b)}\le C \|f\|_2\ .$$
By symmetry it is no restriction to assume $0<\alpha$ and we shall do so.
The dependence of the constant $C$ on the function $\phi$, conditioned on the fixed support condition on $\widehat{\phi}$, factors as dependence on the constant $$\sup_{x}\left[ |\phi(x)| (1+|x|)^{3} + |\phi'(x)| (1+|x|)^{2}\right]\ .$$ We do not claim that this explicit regularity of $\phi$ is sharp for the above theorem to hold.
From now on we fix the parameters $\alpha$ and $\beta$, and for simplicity of notation write $T$ for $T_{\alpha,\beta}$.
It is convenient to work with a discrete variant of Theorem \[gen.carl.emb\]. Fix the parameter $0<b\le 2^{-8}$. We introduce the discrete subset $X_\Delta$ of points $(x,\xi,s)\in X$ such that there exist integers $k,n,l\in \Z$ with $$x=2^{k-4} n,\ \xi=2^{-k-8} b l,\ s=2^k\ .$$ We denote by $\E_\Delta$ the collection of all tents $T(x,\xi,s)$ with $(x,\xi,s)\in X_\Delta$. This is a discrete subcollection of $\E$. However, each tent in $\E_\Delta$ by itself still forms a continuum in $X$.
We generate an outer measure $\mu_\Delta$ using $\E_\Delta$ as generating collection, setting as before $\sigma_\Delta(T(x,\xi,s))=s$ for each tent in $\E_\Delta$.
The following lemma will be used to relate this new measure to the previous one.
\[discretizationlemma\] If $(x',\xi',s')\in X$, then there exists a $(x,\xi,s)\in X_\Delta$ such that the tent $T(x,\xi,s)$ contains $(x',\xi',s')$ “centrally” in the sense $$2^{-3}s<s'\le 2^{-2}s \ ,$$ $$|x'-x|\le 2^{-4} s\ ,$$ $$|\xi'-\xi|\le 2^{-8}b s^{-1}\ .$$ Moreover, there exist two points $(x,\xi_-,s)\in X_\Delta$ and $(x,\xi_+,s)\in X_\Delta$ so that the corresponding tents contain $(x',\xi',s')$ centrally and satisfy $$T(x',\xi',s')\subset T(x,\xi_-,s)\cup T(x,\xi_+,s)\ ,$$ $$T(x',\xi',s')\cap T^b(x,\xi_-,s)\cap T^b(x,\xi_+,s) \subset T^b(x',\xi',s')
\ .$$
The interval $[2^2s',2^3s')$ contains a unique point of the form $2^k$ with $k\in \Z$. We set $s=2^k$. Then there is a point $x$ of the form $2^{k-4}n$ with some $n\in \Z$ such that $|x-x'|\le 2^{k-4}=2^{-4}s$. Likewise, there is a point $\xi$ of the form $2^{-k-8}bl$ with $l\in \Z$ such that $|\xi-\xi'|\le 2^{-k-8}b=2^{-8}bs^{-1}$.
Informally, this point $\xi$ may be chosen on either side of $\xi'$. Precisely, we may choose $\xi_-\le \xi'$ and $\xi_+\ge \xi'$ with $|\xi_--\xi'|\le 2^{-8}bs^{-1}$ and $|\xi_+-\xi'|\le 2^{-8}bs^{-1}$. If $(y,\eta, t)\in T(x',\xi',s')$, then we have $$t\le s'\le 2^{-2} s\ ,$$ $$|y-x|\le |y-x'|+|x'-x|\le s'-t+2^{-4}s\le s-t\ .$$ If in addition $\alpha(\eta- \xi')+\beta t^ {-1}\ge 0$, then (recall that $\alpha>0$) $$-t^{-1}\le \alpha(\xi'-\xi_+)\le \alpha(\eta-\xi_+)+\beta t^{-1} \le \alpha(\eta-\xi')+\beta t^{-1}\le t^{-1}\ ,$$ while if in addition $\alpha(\eta- \xi')+\beta t^ {-1}\le 0$, then $$- t^{-1}\le \alpha(\eta-\xi')+\beta t^{-1}\le
\alpha(\eta-\xi_-)+\beta t^{-1}\le \alpha(\xi'-\xi_-) \le t^{-1}\ .$$ Hence $(y,\eta,t)\in T(x,\xi_-,s)\cup T(x,\xi_+,s)$. Now let in addition $(y,\eta, t)$ be an element of $T^b(x,\xi_-,s)\cap T^b(x,\xi_+,s)$. If $\eta\ge \xi'$, then $$-bt^{-1} < 0 \le \eta-\xi' \le \eta-\xi_- \le bt^{-1}\ ,$$ while if $\eta\le \xi'$, then $$-bt^{-1}\le \eta-\xi_+\le \eta-\xi' \le 0 < bt^{-1} \ .$$ Hence $(y,\eta,t)\in T^b(x',\xi',s')$. This completes the proof of the lemma.
As a consequence of this lemma, if $T$ is a tent in $\E$, then we find two tents $T^+$, $T^-$ in $\E_\Delta$ such that $$T\subset T^+\cup T^-\ ,$$ $$\sigma_\Delta(T^+)+\sigma_\Delta(T^-)\le C\sigma(T)\ .$$ This implies for every subset $X'\subset X$ $$\mu(X')\le \mu_\Delta(X')\le C \mu(X')\ .$$ Hence the outer measures $\mu$ and $ \mu_\Delta$ are equivalent.
Moreover, we have for the same tents and every Borel function $F$ $$S^b(F)(T)\le C [S_\Delta^b (F)(T^+)+S_\Delta^b(F)(T^-)]\ ,$$ where we have defined $$S^b_\Delta(F)(T'):= S^b (F)(T')\ .$$ for any tent $T'$ in $\E_\Delta$.
This implies for every $1\le p\le \infty$ $$C^{-1}\L^{p}(X,\sigma,S^b)
\le \L^{p}(X,\sigma_\Delta,S^b_\Delta)\le
\L^{p}(X,\sigma,S^b)\ ,$$ $$C^{-1}\L^{p,\infty}(X,\sigma,S^b)
\le \L^{p,\infty}(X,\sigma_\Delta,S^b_\Delta)\le
\L^{p,\infty}(X,\sigma,S^b)\ .$$
Hence Theorem \[gen.carl.emb\] is equivalent to the following discrete version.
\[gen.carl.emb.disc\]
Let $0<\alpha\le 1$ and $-0.9\le \beta\le 0.9$. Let $0<b\le 2^{-8}$. Let $\phi$ be a Schwartz function with Fourier transform $\widehat{\phi}$ supported in the interval $(-2^{-8}b,2^{-8}b)$, and let $2\le p\le \infty$. Define for $f\in L^p(\R)$ the function $F$ on $X$ by $$F(y,\eta,t):=\int_\R f(x) e^{i\eta (y-x)} t^{-1}\phi(t^{-1}(y-x)) \, dx\ .$$ There is some constant $C$ depending only on $\alpha$, $\beta$, $b$, $\phi$, and $p$, such that if $p \neq 2$, $$\|F\|_{\L^{p}(X,\sigma_\Delta,S^b_\Delta)}\le C \|f\|_p\ ,$$ and if $p=2$, $$\|F\|_{\L^{2,\infty}(X,\sigma_\Delta,S^b_\Delta)}\le C \|f\|_2\ .$$
Since both theorems are equivalent, we will only prove the discrete version, Theorem \[gen.carl.emb.disc\]. Hence we will only work with the discrete quantities $\mu_\Delta$ and $S^b_\Delta$ and for simplicity of notation omit the subscribt $\Delta$. Since $b$ is fixed, we also denote $S:= S^b$.
The theorem follows by Marcinkiewicz interpolation, Proposition \[p.marcinkiewicz\], between the end point cases $p=2$ and $p=\infty$.
The endpoint $p=\infty$
-----------------------
We need to prove that for every $(x,\xi,s)\in X_\Delta$ and every $f\in L^\infty(\R)$ we have $$S(F)(T(x,\xi,s))\le C\|f\|_\infty\ \ .$$ The size $S$ is defined as a sum of an $L^2$ portion and an $L^\infty$ portion. It suffices to estimate both portions separately. Note that for all $y,\eta,t$ we trivially have $|F(y,\eta,t)|\le \|f\|_\infty \|\phi\|_1$ and this establishes the desired bound on the $L^\infty$ portion of $S$.
To estimate the $L^2$ portion of the size we first establish the estimate $$\label{l2tentbound}
\int_{T(x,\xi,s)\setminus T^b(x,\xi,s)}|F(y,\eta,t)|^2 \, dy\,d\eta\, dt\le
C\|{f}\|_2^2$$ for every function $f\in L^2(\R)$. Fix such a function $f$, we may assume by normalization that $\|f\|_2=1$. Replacing the domain of integration by a larger region we can estimate the left-hand-side of (\[l2tentbound\]) by $$\int_0^\infty \int_\R \int_{bt^{-1}\le |\eta-\xi|\le 2\alpha^{-1} t^{-1}} |F(y,\eta,t)|^2\, d\eta \, dy \, {dt}\ .$$ It suffices to estimate the integral over the region where $\eta> \xi$ , since by symmetry there is an analoguous estimate for the integral over region $\eta<\xi$. We replace the integration variable $\eta$ by $\gamma$ such that $\eta-\xi=\gamma t^{-1}$. Using Fubini we are reduced to estimating $$\int_{b}^{2\alpha^{-1}}
\int_0^\infty \int_\R |F(y,\xi+\gamma t^{-1},t)|^2 \, dy \, \frac {dt}t \, d\gamma\ .$$ We first estimate the inner double integral for fixed $\gamma$.
Define for each $y,\gamma,t$ the bump function $\phi_{y,\gamma,t}$ by $$\phi_{y,\gamma,t}(x)= e^{-i(\xi+\gamma t^{-1}) (y-x)} t^{-1}\overline{\phi(t^{-1}(y-x))} \ .$$ We are interested in the region $\gamma\ge b$, where the modulated function $\phi_{y,\gamma,t}e^{-i\xi.}$ has integral zero by support consideration of $\widehat{\phi}$. Hence its primitive is absolutely integrable with good bounds, which we will use later when applying partial integration.
We have $$( \int _0^\infty \int_\R
|\<f,\phi_{y,\gamma ,t}\> |^2 \, dy\, \frac{dt}t)^2$$ $$\le \| \int_0^\infty \int_\R \<f,\phi_{y,\gamma ,t}\>
\phi_{y,\gamma ,t} \, dy\, \frac{dt}t\|_2^2$$ $$\le \int _0^\infty \int_\R \int _0^\infty \int_\R
|\<f,\phi_{y,\gamma ,t}\>
\<\phi_{y,\gamma ,t}, \phi_{z,\gamma ,r} \>
\<\phi_{z,\gamma ,r},f\>|
\, dz\, \frac{dr}r
\, dy\, \frac{dt}t \ .$$ Estimating the smaller of the inner products with $f$ by the larger one and using symmetry we may estimate this by $$\label{smallbigf}
\le 2\int _0^\infty \int_\R |\<f,\phi_{y,\gamma ,t}\>|^2
[ \int _0^\infty \int_\R
|\<\phi_{y,\gamma ,t}, \phi_{z,\gamma ,r} \>|
\, dz\, \frac{dr}r
]\, dy\, \frac{dt}t \ .$$
We consider the inner double integral of (\[smallbigf\]). Considering first the region $t\le r$ and doing partial integration in the inner product $$\<\phi_{y,\gamma ,t}, \phi_{z,\gamma ,r} \>=
\<\phi_{y,\gamma ,t}e^{-i\xi .}, \phi_{z,\gamma ,r} e^{-i\xi.}\>\ ,$$ integrating the first and differentiation the second bump function, we estimate the integral over this region by $$C\int_\R \int_t^\infty
\int_\R
(1+|t^{-1}(y-x)|)^{-2}
r^{-2}(1+|r^{-1}(z-x)|)^{-2} dx \frac{dr}r\, dz$$ $$\le C\int_\R \int_t^\infty
(1+|t^{-1}(y-x)|)^{-2}
r^{-2} {dr}\, dx$$ $$\le C\int_\R
t^{-1}(1+|t^{-1}(y-x)|)^{-2}
\, dx\le C\ .$$ In the region $t\ge r$ we do partial integration in reverse, differentiating the first and integrating the second bump function, to obtain the estimate for the integral over this region by $$C\int_\R \int_0^t \int_\R
t^{-2}(1+|t^{-1}(y-x)|)^{-2}
(1+|r^{-1}(z-x)|)^{-2} dx \frac{dr}r\, dz$$ $$\le C\int_\R \int_0^t
t^{-2}(1+|t^{-1}(y-x)|)^{-2}
{dr}\, dx$$ $$\le C\int_\R
t^{-1}(1+|t^{-1}(y-x)|)^{-2}
\, dx\le C\ .$$ Inserting these two estimates into (\[smallbigf\]) gives $$( \int _0^\infty \int_\R
|\<f,\phi_{y,\gamma ,t}\> |^2 \, dy\, \frac{dt}t)^2
\le C
\int _0^\infty \int_\R
|\<f,\phi_{y,\gamma ,t}\> |^2 \, dy\, \frac{dt}t\ ,$$ which proves (\[l2tentbound\]).
We note that if we restrict the integral on the left hand side of (\[l2tentbound\]) to the region $\eta>\xi$, we may improve the bound on the right-hand-side to $$\label{fxibound}
C\|\widehat{f}1_{(\xi,\infty)}\|_2^2
\ .$$ This follows simply by support considerations on the Fourier transform side.
Now assume that $f\in L^\infty(\R)$ and write $f=f_1+f_2$ where $$f_1=f1_{[x-2s,x+2s]}\ .$$ By linearity we may split $F=F_1+F_2$ correspondingly. We have $\|f_1\|_2^2\le Cs\|f\|_\infty^2$, so by the above $L^2$ bound we have $$(s^{-1}\int_{T(x,\xi,s)\setminus T^b(x,\xi,s)}|F_1(y,\eta,t)|^2 \, dy\, d\eta \,{dt})^{1/2}
\le C\|f\|_\infty\ .$$ It remains to prove the analoguous estimate for $F_2$. But for $y\in [x-s,x+s]$ and $t<s$ we have $$F_2(y,\eta, t)\le \int_{[-s, s]^c} |f_2(y-z)| t^{-1} |\phi(t^{-1}z)|\, dz \le C (t/s)\|f\|_\infty\,$$ where we have crudely estimated the integral of the tail of $\phi$. But then $$(s^{-1}\int_{T(x,\xi,s)\setminus T^b(x,\xi,s)}|F_2(y,\eta,t)|^2 \, dy\, d\eta \,{dt})^{1/2}$$ $$\le C\|f\|_\infty (s^{-1}\int_{0}^s \int_{\xi-2\alpha^{-1}t^{-1}}^{\xi+2\alpha^{-1}t^{-1}}
\int_{x-s}^{x+s} (t/s)^{2} \, dy\, d\eta \,{dt})^{1/2}
\le C\|f\|_\infty\ .$$ This completes the proof of the endpoint $p=\infty$ of Theorem \[gen.carl.emb\].
The endpoint $p=2$
------------------
We need to find for each $\lambda>0$ a collection $\Q \subset X_\Delta$ such that $$\sum_{(x,\xi,s)\in \Q} s\le C\lambda^{-2} \|f\|_2^2$$ and for every $T'\in \E_\Delta$ we have $$\label{small2inftysize}
S(F 1_{X\setminus E})(T')\le \lambda\ ,$$ where $E=\bigcup_{(x,\xi,s)\in \Q} T(x,\xi,s)$.
We first reduce to the special case that the support of $\widehat{f}$ is compact. Choose an unbounded monotone increasing sequence $\xi_k$, $k=0,1,2,\dots$ with $\xi_0=0$ such that for $f_k$ defined by $\widehat{f}_k=\widehat{f}[1_{(-\xi_{k},-\xi_{k-1})}+1_{(\xi_{k-1},\xi_{k})}]$ we have $$\|f_k\|_2\le C2^{-10k}\|f\|_2\ .$$ Applying the special case to each of the functions $f_k$ with $\lambda_k=2^{-k}\lambda $ we obtain corresponding collections $\Q_k$. Then clearly $$\sum_{k=1}^\infty \sum_{(x,\xi,s)\in \Q_k} s\le
C \sum_k (2^{-k}\lambda)^{-2} 2^{-20k} \|f\|_2^2
\le C \lambda^{-2} \|f\|_2^2\ .$$ If $E$ denotes the union of all $T(x,\xi,s)$ with $(x,\xi,s)\in \bigcup_k \Q_k$, then by countable subadditivity of the size $S$ we have for every $T'\in \E_\Delta$ $$S(F1_{X\setminus E})(T')\le \sum_{k=1}^\infty S(F_k1_{X\setminus E})(T')
\le \sum_{k=1}^\infty 2^{-k}\lambda \le \lambda\ .$$ This completes the reduction to the case that $\widehat{f}$ has compact support, and we shall henceforth assume compact support of $\widehat{f}$.
By scaling of outer Lebesgue spaces we may assume $\|f\|_2=1$. Fix $\lambda>0$. We first set out to cover all points $(y,\eta,t)\in X$ with $|F(y,\eta,t)|> \lambda$ with tents. Note that there is an a priori upper bound on $t$ for any such point since by Cauchy-Schwarz we have directly from the definition of $F$: $$|F(y,\eta,t)|\le C t^{-1/2} \|f\|_2 \|\phi\|_2\le Ct^{-1/2}\ .$$ Assume there is a point $(y,\eta,t)$ with $|F(y,\eta,t)|> \lambda$, then by Lemma \[discretizationlemma\] we find a tent $T(x,\xi,s)$ centrally containing the point $(y,\eta,t)$. Because of the upper bound on $t$ and since $(x,\xi,s)\in X_\Delta$ and therefore $s=2^k$ for some integer $k$, we may choose $(y,\eta,t)$ and $(x,\xi,s)$ such that $s$ is maximal. Denote these points by $(y_1,\eta_1,t_1)$ and $(x_1,\xi_1,s_1)$ and the tent $T(x_1,\xi_1,s_1)$ by $T_1$.
We continue to select tents by iterating this procedure. Assume that we have already chosen points $(y_k,\eta_k,t_k)\in X$ and tents $T_k=T(x_k,\xi_k,s_k)$ for all $1\le k< n$. Assume there is a point $(y,\eta,t)$ with $|F(y,\eta,t)|> \lambda$ not contained in the union of the tents $T_k$ with $1\le k<n$. Then we choose such a point $(y_n,\eta_n,t_n)$ and a tent $T_n=T(x_n,\xi_n,s_n)$ centrally containing $(y_n,\eta_n,t_n)$ such that $s_n$ is maximal. We have $|F(y_n,\eta_n,t_n)|> \lambda$ and $$(y_n,\eta_n,t_n)\not\in \bigcup_{k=1}^{n-1} T_k\ .$$
We claim that $$\label{count.tiles}
\sum_{k=1}^n s_k \le C\lambda^{-2}\ .$$ To see the claim, let $K_m$ be the set of indices $k$ with $1\le k\le n$ such that $$2^m\lambda
\le |F(y_k,\eta_k,t_k)|\le 2^{m+1} \lambda \ .$$ Then we have $$\sum_{k=1}^n s_k
\le C \sum_{m=0}^\infty
2^{-2m} \lambda^{-2}
\sum_{k\in K_m} t_k |F(y_k,\eta_k,t_k)|^2\ .$$ The claim (\[count.tiles\]) will follow if we show for fixed $m\ge 0$ $$\label{seta}
\sum_{k\in K_m} t_k |F(y_k,\eta_k,t_k)|^2 \le C \ .$$ Define $$\label{wavepacket}
\phi_k(x):=\phi_{y_k,\eta_k,t_k}(x):=e^{-i\eta_k (y_k-x)}t_k^{-1/2}\overline{\phi(t_k^{-1}(y_k-x))}\ ,$$ so that $$t_k^{1/2}F(y_k,\eta_k,t_k)=\<f,\phi_k\>\ .$$ Let $A$ denote the left-hand-side of (\[seta\]). Assume we can show for every $k\in K_m$ $$\label{modifiedschurc}
\sum_{l\in K_m: s_l\le s_k} (t_l/t_k)^{1/2}|\<\phi_k,\phi_l\>|\le C \ .$$ Then we obtain $$A^2 \le \|\sum_{k\in K_m} \<f,\phi_k\>\phi_k\|_2^2$$ $$\le \sum_{k,l\in K_m} \<f,\phi_k\>\<\phi_k,\phi_l\> \<\phi_l,f\>$$ $$\le 2\sum_{k,l\in K_m: s_l\le s_k} |\<f,\phi_k\>\<\phi_k,\phi_l\> \<\phi_l,f\>|$$
$$\le C\sum_{k,l\in K_m: s_l\le s_k} (t_l/t_k)^{1/2}
|\<f,\phi_k\>|^2 |\<\phi_k,\phi_l\>| \le C A \ .$$ Here in the passage from the penultimate to ultimate line we have used that $k,l\in K_m$ and hence $t_k^{-1/2}|\<f,\phi_k\>|$ and $t_l^{-1/2}|\<f,\phi_l\>|$ are within a factor of $2$ of each other and in the last line we have used (\[modifiedschurc\]). Dividing by $A$ on both sides of the displayed inequality we have reduced the proof of the desired estimate (\[seta\]) to the proof of (\[modifiedschurc\]).
To prove (\[modifiedschurc\]), fix $k$. If $l\in K_m$ with $s_l\le s_k$ such that $\<\phi_k,\phi_l\>\neq 0$ then the supports of $\widehat{\phi}_k$ and $\widehat{\phi}_l$ overlap and hence there are numbers $- 2^{-8} \le \gamma,\delta \le 2^{-8}$ such that $$\eta_l+\delta b t_l^{-1}=\eta_k+\gamma b t_k^{-1}
\ .$$ Now suppose that there is another such $l'$ and we have analoguously $$\eta_{l'}+\delta' b t_{l'}^{-1}=\eta_k + \gamma' b t_k^{-1}
\ .$$ Assume without loss of generality that $T_{l}$ is selected prior to $T_{l'}$ and thus $s_k^{-1}\le s_{l}^{-1}\le s_{l'}^{-1}$. Then we have by central containment of $(y_l,\eta_l,t_l)$ in $T_l$ $$|\alpha (
\eta_{l'}- \xi_l)+\beta t_{l'}^{-1}|\le
|\alpha (
\eta_{l}-\xi_l)|+|\alpha(\eta_l-\eta_{l'})|+|\beta t_{l'}^{-1}|$$ $$\le b t_{l}^{-1}+|\eta_l-\eta_{l'}| + |\beta t_{l'}^{-1}|
\ .$$ Now using the information from the support of the bump functions we may estimate the latter by $$\le b t_l^{-1}
+\delta b t_l^{-1}+\delta' b t_{l'}^{-1}
+\gamma b t_k^{-1}+\gamma' b t_k^{-1}+|\beta t_{l'}^{-1}|
\le t_{l'}^{-1}
\ .$$ Here we have used again the central containment to estimate the inverse powers of $t_k$ and $t_l$ by that of $t_{l'}$.
This implies that $[x_l-2^{-8}s_l,x_l+2^{-8}s_l]$ and $[x_{l'}-2^{-8}s_{l'},x_{l'}+2^{-8}s_{l'}]$ are disjoint. For if they were not disjoint, then, since $s_{l'}\le s_l$, we would conclude $$|y_{l'}-x_l|\le |y_{l'}-x_{l'}|+|x_{l'}-x_{l}|$$ $$\le 2^{-4}s_{l'}+2^{-4}s_l < s_l-t_{l'}$$ and together with the previous estimate for $\xi_l-\eta_{l'}$ this implied that the point $(y_{l'},\eta_{l'},t_{l'})$ was in the tent $T_l$, contradicting the choice of this point.
The argument above in particular shows that $|x_k-x_l|\ge 2^{-8}s_k$. Let $\overline{x}$ be the midpoint of $x_l$ and $x_k$ and let $H_l$ and $H_{k}$ be the half lines emanating from the midpoint containing $x_l$ and $x_{k}$ respectively. We then have $$|\<\phi_k,\phi_l\>|\le \|\phi_k\|_{L^1(H_k)}\|\phi_l\|_{L^\infty(H_k)}+
\|\phi_k\|_{L^\infty(H_l)}\|\phi_l\|_{L^1(H_l)}\ .$$ Thanks to the rapid decay of the wave packets and $s_l\le s_k$ and the fact that $|x_k-x_l| \ge 2^{-8}s_k$ we can estimate the last display by $$C (s_ls_k)^{-1/2}\int (1+(\frac{x-x_k}{s_k})^2
)^{-2} 1_{[x_l-2^{-8}s_l,x_l+2^{-8}s_l]}(x)\, dx\ .$$
By disjointness of the intervals $[x_l-2^{-8}s_l,x_l+2^{-8}s_l]$ for different $l$ we obtain $$\sum_{l\in K_m,s_l\le s_k}
s_l^{1/2} |\<\phi_k,\phi_l\>|$$ $$\le C s_k^{-1/2}\int (1+(\frac{x-x_k}{s_k})^2)^{-1}\, dx\le C s_k^{1/2}\ .$$ This proves (\[modifiedschurc\]) since $t_l$ and $t_k$ are are comparable to $s_l$ and $s_k$, and hence completes the proof of (\[count.tiles\]).
If the iterative selection of tents $T_n$ stops because of lack of suitable points $(y,\eta,t)$ with large enough value $F(y,\eta,t)$, then clearly $F$ is bounded by $ \lambda$ outside the union $\bigcup_{k=1}^{n-1} T_k$. If the iterative selection does not stop, we claim that still $F$ is bounded above by $\lambda$ outside the union $\bigcup_{k=1}^\infty T_k$. Namely, assume the point $(y,\eta,t)$ is outside this union. Since by (\[count.tiles\]) we have $s_k\to 0$ as $k\to \infty$, we have $s_k<t$ for some $k$. By maximal choice of $s_k$ we have $F(y,\eta,t)\le \lambda$. This proves the desired bound on $F$. In the case of infinitely many selected tents $T_k$, it also follows by a limiting argument from (\[count.tiles\]) that $\sum_{k=1}^\infty s_k \le C\lambda^{-2}$ .
Summarizing, we have found a collection $\Q_0$ of tents such that $$\sum_{T\in \Q_0}^\infty \sigma(T) \le C \lambda^{-2}$$ and if we set $$E=\bigcup_{T\in \Q_0} T\ ,$$ then we have $$F(y,\eta,t)\le \lambda$$ for all points $(y,\eta,t)$ in the complement of $E$. In what follows, we shall no longer need the selected tents explicitly, and hence we shall free the symbols $T_k,x_k,\xi_k,s_k$ to have new meanings in the further selection process.
We need to select tents of large $L^2$ portion of the size. Given a number $\xi$, typically arising as second parameter of a tent $T(x,\xi,s)$, we split the space $X$ into upper half $$X_\xi^+=\{(y,\eta,s)\in X: \eta\ge \xi\}$$ and lower half $X_\xi^-=X\setminus X_\xi^+$. We first focus on $X_\xi^+$.
Call a point $(x,\xi,s)\in X_\Delta$ bad, if $$\label{lowerl2bound}
s^{-1} \int_{(T(x,\xi,s)\cap X_\xi^+)\setminus (T^b(x,\xi,s)\cup E)}|F(y,\eta,t)|^2\, dy\, d\eta \, {dt}\ge 2^{-8}\lambda^2\ .$$ By the estimate (\[l2tentbound\]) we obtain an a priori upper bound $2^{k_{\max}}$ for the third component $s$ of any bad point $(x,\xi,s)$. Given such an upper bound, the parameter $\xi$ becomes a multiple of $2^{-8-k_{\max}}b$ and is thus a discrete parameter. Since $\widehat{f}$ has compact support, we obtain from observation (\[fxibound\]) an upper bound for $\xi$ depending on the support of $\widehat{f}$. Hence there is a maximal possible value $\xi_{\max}$ for the second component of a bad point. We choose some bad point $(x_1,\xi_1,s_1)$ with $\xi_1=\xi_{\max}$ which maximizes $s_1$ under the constraint $\xi_1=\xi_{\max}$. Define the tents ${T}_1=T(x_1,\xi_1,s_1)$ and ${T}_1^b=T^b(x_1,\xi_1,s_1)$, and define $X_1^+=X_{\xi_1}^+$. Note that by maximizing $s_1$ for fixed $\xi_1$ and $x_1$ we guarantee that is sharp up to a factor of $2$ and hence the selected tent satisfies an upper bound $$s^{-1} \int_{(T(x,\xi,s)\cap X_\xi^+)\setminus (T^b(x,\xi,s)\cup E)}|F(y,\eta,t)|^2\, dy\, d\eta \, {dt}\le \lambda^2\ .$$
Now we iterate this selection: assume we have already chosen points $(x_k,\xi_k,s_k)\in X_\Delta$ for $1\le k<n$ and we have defined tents ${T}_k$, $T_k^b$ for $1\le k<n$. Define $E_n=E\cup \bigcup_{k=1}^{n-1} {T}_k$. We update the definition of a bad point $(x,\xi,s)$ to be a point in $X_\Delta$ with $$s^{-1}\int_{(T(x,\xi,s)\cap X_\xi^+)\setminus (T^b(x,\xi,s)\cup E_n)}
|F(y,\eta,t)|^2\, dy d\eta\, dt
\ge 2^{-8}\lambda^2\ .$$ Again, there is a (possibly new) maximal value $\xi_{\max}$ for the second component $\xi$ of a bad point. We pick one bad point $(x_n,\eta_n,s_n)$ with $\xi_n=\xi_{\max}$ which maximizes the value of $s_n$ among all bad points $(x,\xi,s)$ with $\xi=\xi_{\max}$. Then we define the tents ${T}_n=T(x_n,\xi_n,s_n)$ and ${T}_n^b=T^b(x_n,\xi_n,s_n)$ and define $X_n^+=X_{\xi_n}^+$. This completes the $n$-th selection step.
We introduce the notation $$T_n^*= (T_n\cap X_n^+)\setminus (T_n^b\cup E_n)\ .$$
We claim the analogue of (\[count.tiles\]), namely $$\label{count.tiles.plus}
\sum_{k=1}^n s_k \le C\lambda^{-2} \ .$$ To prove (\[count.tiles.plus\]), it suffices to show $$\sum_{k=1}^n \int_{T_k^*}|F(y,\eta,t)|^2 \, dyd\eta dt \le C\ .$$ With $\phi_{y,\eta,t}$ defined analoguously to (\[wavepacket\]) we may write for the left hand side of the last display $$A:=\sum_{k=1}^n \int_{T_k^*}|\<f,\phi_{y,\eta,t}\>|^2 \, dyd\eta \frac{dt}t \ .$$ Then we have by Cauchy-Schwarz $$\label{lacunarybessel}
A^2 \le \|\sum_{k=1}^n \int_{{T}_k^*} \<f,\phi_{y,\eta,t}\>\phi_{y,\eta,t}
dy\, d\eta \, \frac{dt}{t}
\|_2^2$$ $$=\sum_{k,l=1}^n \int_{{T}_k^*\times {T}_l^*}
\<f,\phi_{y,\eta,t}\>
\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>
\<\phi_{y',\eta',t'},f\>
dy\, d\eta \, \frac{dt}{t} dy'\, d\eta' \, \frac{dt'}{t'}$$ $$=\sum_{k,l=1}^n \int_{{T}_k^*\times {T}_l^*: B^{-1}t\le t'\le B t}
\dots
+2
\sum_{k,l=1}^n \int_{{T}_k^*\times {T}_l^*: B t'\le t}
\dots \ ,$$ where the large number $B=2^{8}\alpha^{-1}b^{-1}$ determines the cutoff in the last line between diagonal and off-diagonal part, the latter being estimated by twice the upper triangular part using symmetry. In the diagonal term we use symmetry to estimate the smaller of the inner products with $f$ by the larger one and obtain the upper bound $$2 \sum_{k,l=1}^n
\int_{{T}_k^*\times {T}_l^*: B^{-1}t \le t'\le B t}
|\<f,\phi_{y,\eta,t}\>|^2
|\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>|
dy\, d\eta \, \frac{dt}{t} dy'\, d\eta' \, \frac{dt'}{t'}$$ $$\le 2A \sup_{k,(y,\eta,t)\in T_k^*}\left(\sum_{l=1}^n
\int_{{T}_l^*: B^{-1}t\le t'\le B t}
|\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>| dy'\, d\eta' \, \frac{dt'}{t'} \right)$$ $$\le 2A \sup_{k,(y,\eta,t)\in T_k^*}\left(
\int_{B^{-1}t\le t'\le B t}\int_{\R^2}
|\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>| dy'\, d\eta' \, \frac{dt'}{t'} \right)\ .$$ Here we have used that the regions $T_l^*$ are pairwise disjoint. Integrating over the $t'$- interval of bounded $dt'/t'$-measure estimates the previous display by $$\le C A \sup_{k,(y,\eta,t)\in T_k^*} \left(\sup_{B^{-1}t\le t'\le tB}
\int_{\R^2}
|\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>| dy'\, d\eta'\right)\ .$$ For the $\eta'$ integration we use that $\widehat{\phi}_{y,\eta,t}$ is supported on an interval of length $t^{-1}$ and $t\sim t'$: $$\le C A \sup_{k,(y,\eta,t)\in T_k^*} \sup_{B^{-1}t\le t'\le tB}
\sup_{\eta'}\, \, t^{-1} \int_{\R}
\<|\phi_{y,\eta,t}|,|\phi_{y',\eta', t'}|\> dy' \ .$$ For the $y'$ integration we use that ${\phi}_{y,\eta,t}$ is an $L^2$ normalized wave packet adapted to an interval of length $t$. This estimates the last display by $CA$.
Turning to the off diagonal term in (\[lacunarybessel\]) we estimate it with Cauchy Schwarz and the upper bound on the selected tents by $$2
\sum_{k=1}^n
\left(
\int_{{T}_k^*}|\<f, \phi_{y,\eta,t}\>|^2\, dyd\eta \frac{dt}t
\right)^{1/2}
H_k^{1/2}
\le C
\sum_{k=1}^n \lambda s_k^{1/2} H_k^{1/2}\ ,$$ where $H_k$ is equal to $$\int_{{T}_k^*}
\left(\sum_{l=1}^n \int_{{T}_l^*: B t'\le t}
|\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>
\<\phi_{y',\eta',t'},f\>| dy'\, d\eta' \, \frac{dt'}{t'}
\right)^{2}
dy\, d\eta \, \frac{dt}{t}\ .$$ Using the pointwise bound on $F(y,\eta,t)$ outside $E$ we can estimate $H_k$ by $$\int_{{T}_k^*}
\left(\sum_{l=1}^n \int_{{T}_l^*: B t'\le t}
c\lambda t'^{1/2} |\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>| dy'\, d\eta' \, \frac{dt'}{t'}
\right)^{2}
dy\, d\eta \, \frac{dt}{t}\ .$$
Let $(y,\eta,t)\in T_k^*$ and $(y',\eta',t')\in T_l^*$ with $B t'\le t$. Assume that the inner product $\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>$ is not zero. Then we have $$\eta'+\gamma' (t')^{-1}=\eta+\gamma t^{-1}$$ for some $$-2^{-8}b \le \gamma,\gamma' \le 2^{-8}b \ .$$ and hence $$|\eta-\eta'|\le 2^{-4}b(t')^{-1}\ .$$ By definition of the reduced domains we have $$\alpha(\eta-\xi_k)+\beta t^{-1} \le t^{-1}\ ,$$ $$b(t')^{-1}\le \eta'-\xi_l\ .$$ This gives $$\xi_k-\xi_l= (\eta-\eta') - (\eta-\xi_k)+ (\eta'-\xi_l)$$ $$\ge
-2^{-4}b (t')^{-1}
- \alpha^{-1} (1-\beta) t^{-1} + b(t')^{-1}
\ .$$ Using $B t'\le t$ the last display strictly larger than $0$ and hence the tent $T_k$ has been chosen prior to $T_l$. Since $(y',\eta',t')$ is in the reduced tent $ T_l^*$, it is not in $ E_l$ and hence not in $T_k$. But $t'< t\le s_k$ and $$|\alpha(\eta'-\xi_k)+\beta(t')^{-1}|$$ $$\le |\alpha(\eta'-\eta)|+
|\alpha(\eta-\xi_k)+\beta(t)^{-1}|+|\beta (t')^{-1}-\beta(t^{-1})|$$ $$\le 2^{-4}b(t')^{-1}+t^{-1}+|\beta t^{-1}|+|\beta(t')^{-1}|\le (t')^{-1}$$ and hence we need to have $$|y'-x_k|\ge s_k-t'\ .$$ This implies $$\label{tentseparation}
|y'-x_k|\ge s_k-t\ .$$
Now pick a further point $(y'',\eta'',t'')\in T_{l'}^*$ with $Bt''\le t$ and nonzero inner product $\<\phi_{y,\eta,t},\phi_{y'',\eta'', t''}\>$. We have again $$|\eta-\eta''|\le 2^{-4}b(t'')^{-1}$$ and $$b(t'')^{-1}\le \eta''-\xi_{l'} \ .$$ Now we assume $Bt''\le t'$. Then we conclude $$|\eta'-\eta''|\le 2^{-2}b(t'')^{-1}$$ and $$\xi_l-\xi_{l'}=(\xi_l-\eta')+(\eta'-\eta'')+(\eta''-\xi_{l'})$$ $$\ge - 2\alpha^{-1}(t')^{-1} - 2^{-2}b(t'')^{-1}+b(t'')^{-1}>0\ .$$ Hence $T_l$ was chosen prior to $T_{l'}$ and in particular $(y'',\eta'',t'')$ is not in $T_l$. But we have $t''<t'\le s_l$ and $$|\alpha(\eta''-\xi_l)+\beta(t'')^{-1}|$$ $$\le |\alpha(\eta''-\eta')|+|\alpha(\eta'-\xi_l)+\beta(t')^{-1}|
+|\beta(t'')^{-1}-\beta(t')^{-1}|$$ $$\le 2^{-2} b (t'')^{-1}
+(t')^{-1}+ \beta(t'')^{-1}+\beta(t')^{-1} \le (t'')^{-1}\ .$$ Since $(y'',\eta'',t'')$ is not in $T_l$ we conclude $$|y''-x_l|>s_l-t''>s_l-t'\ge |y'-x_l|$$ and in particular $y''\neq y'$.
To summarize our finding, fix $(y,\eta,t)\in T_k^*$. Then for fixed $y'\in \R$, the minimal and maximal values of parameters $t'$ with $Bt'\le t$ such that there exists $l$ and $\eta'$ with $(y',\eta',t')\in T_l^*$ and $\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>\neq 0$ are at most a factor $B$ apart. It follows that for every $y'$ there exists an interval $I(y')=[T(y'), B T(y')]$ such that we need $t'\in I(y')$ for such $l,\eta'$ to exist.
Using also (\[tentseparation\]) and disjointness of the reduced domains $T_l^*$ , we may thus estimate $H_k$ by $$C \int_{{T}_k^*}
\left( \int_{|y'-x_x|>s_k-t}
\int_ {I(y')} \int_\R
\lambda t'^{1/2} |\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>| \, d\eta'
\, \frac{dt'}{t'}
\, dy' \right)^{2}
dy\, d\eta \, \frac{dt}{t}\ .$$ $$\le C\int_{{T}_k^*}
\left(
\int_{|y'-x_x|>s_k-t}
\sup_{t'\in I(y')}\int_\R
\lambda t'^{1/2} |\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>|
\, d\eta' \, dy' \right)^{2}
dy\, d\eta \, \frac{dt}{t}\ .$$
Further, by trivial reasoning with the Fourier support of the bump functions, if we fix $y'$ and $t'$ as in this integral, then there is an interval of length $2t'^{-1}$ which must contain $\eta'$ for the inner product $\<\phi_{y,\eta,t},\phi_{y',\eta', t'}\>$ to be nonzero. Using the estimate $$\<|\phi_{y,\eta,t}|,|\phi_{y',\eta', t'}|\> \le C (\frac{t'}t)^{1/2}
(1+\frac{|y'-y|}{t})^{-2}\ ,$$ we obtain for the previous display the upper bound $$C\int_{T_k^*}
\left( \int_{|y'-x_k|>s_k-t}\
\lambda (\frac{1}{t})^{1/2} (1+\frac{|y'-y|}{t})^{-2}
dy' \,
\right)^{2}
dy\, d\eta \, \frac{dt}{t}$$ $$\le C\int_{T_k^*}
\left(
\lambda {t}^{1/2} (1+\frac{s_k-|y-x_k|}{t})^{-1}
\right)^{2}
dy\, d\eta \, \frac{dt}{t}$$ $$\le C\int_0^{s_k} \int_{x_k-s_k}^{x_k+s_k}\int_{\xi_k-2\alpha^{-1}t^{-1}}^{\xi_k+2\alpha^{-1}t^{-1}}
\lambda^2 t(1+\frac{s_k-|y-x_k|}{t})^{-2}
d\eta \, dy\, \frac{dt}{t}$$ $$\le C\lambda^2s_k\ .$$ This completes our estimation of (\[lacunarybessel\]) and we have shown $$\frac 14 A^2\le CA + C\sum_{k=1}^n\lambda^2 s_k\le CA\ ,$$ where in the last inequality we have used the lower bound on the selected tents. Dividing by $A$ proves the desired estimate for $A$ and completes the proof of (\[count.tiles.plus\]) for the newly selected tents.
If the selection of tents stops lacking any further $(x,\xi,s)$ with $$s^{-1}\int_{(T(x,\xi,s)\cap X_\xi^+)\setminus (T^b_{x,\xi,s}\cup E_n)}
|F(y,\eta,t)|^2\, dy\, d\eta\, dt
\ge 2^{-8}\lambda^2\ ,$$ then clearly the converse inequality holds for all $(x,\xi,s)\in X_\Delta$. If the selection of tents does not stop, we collect $T_k$ for all $k\in \N$ and write $E_{(1)}=E\cup_{k=1}^\infty E_k$. Note that $\xi_k$ is a decreasing sequence, and as noted before the possible values of $\xi_k$ are in the discrete lattice $\Z b 2^{-8-k_{\max}}$. If $\xi_k\to -\infty$, then for every $(x,\xi,s)\in X_\Delta$ $$s^{-1}\int_{(T(x,\xi,s)\cap X_\xi^+)\setminus (T^b_{x,\xi,s}\cup E_{(1)})}
|F(y,\eta,t)|^2\, dy\, d\eta\, dt
\le 2^{-8}\lambda^2\ .$$ Namely, assume not, then $\xi> \xi_k$ for some $k$, and this would contradict the choice of $T_k$.
Now assume $\xi_k$ does not tend to $-\infty$, then the sequence stabilizes, that means eventually becomes constant, at some value $\xi_{(1)}$. We shall then choose further tents, and for emphasis we rename the previously selected tents into $ T_k =:T_{(1),k}=T(x_{(1),k},\xi_{(1),k},s_{(1),k})$.
Call a point $(x,\xi,s)\in X_\Delta$ bad if $$s^{-1}\int_{T(x,\xi,s)\cap X_\xi^+)\setminus (T^b(x,\xi,s)\cup E_{(1)})}
|F(y,\eta,t)|^2\, dy\, d\eta\, dt
\ge 2^{-8}\lambda^2\ ,$$ and let $\xi_{\max}$ be the maximal possible value of the second component of a bad point. Note that $\xi_{\max}$ is strictly less than $\xi_{(1)}$. For if not, then $\xi_{\max}=\xi_{(1)}$ by choice of the previously selected tents. Since $s_k\to 0$ by (\[count.tiles.plus\]) we have $s>s_k$ for some $k$ and some bad point $(x,\xi_{\max},s)$. This however contradicts the choice of the tent $T_{(1),k}$. We then choose a bad point $(x_{(2),1},\xi_{(2),1},s_{(2),1})$ such that $\xi_{(2),1}=\xi_{\max}$ and $s_{(2),1}$ is maximal among all such choices. We then iterate this selection process as before, obtaining tents $T_{(2),k}=T(x_{(2),k},\xi_{(2),k},s_{(2),k})$. Our proof of applies verbatim to yield $$(\sum_{k=1}^\infty s_{(1),k})+ (\sum_{k=1}^n s_{(2),k})
\le C\lambda^{-2} \ .$$
We now continue this double recursion in the obvious manner. If at some point the recursion stops, or yields for some fixed $m$ a sequence $\xi_{(m),k}$ tending to $-\infty$, then by the previous discussions we are left with no bad points. If the double iteration does not stop, we obtain a double sequence of tents $T_{(m),k}$ with $$\sum_{m=1}^\infty \sum_{k=1}^\infty s_{(m),k}\le C\lambda^{-2} \ .$$ Moreover, the sequence $\xi_{(m)}$ of stabilizing points decreases to $-\infty$, since they are strict monotone decreasing and in a discrete lattice. We can then observe that there are no bad points outside $\bigcup _{m=1}^\infty E_{(m)}$.
Summarizing, we have found a collection $\Q_+$ of tents such that $$\sum_{T\in \Q_+}^\infty \sigma(T) \le C \lambda^{-2}$$ and if we set $$E_+=E\cup \bigcup_{T\in \Q_+} T\ ,$$ then we have $$s^{-1}\int_{(T(x,\xi,s)\cap X_\xi^+)\setminus T^b(x,\xi,s)}
|F(y,\eta,t)1_{ E_+^c}(y,\eta,t)|^2\, dy\, d\eta\, dt
\le 2^{-8}\lambda^2\ ,$$ for all $(x,\xi,\delta)\in X_\Delta$.
We may repeat the above argument symmetrically to obtain a collection $\Q_-$ of tents such that $$\sum_{T\in \Q_-}^\infty \sigma(T) \le C \lambda^{-2}$$ and if we set $$E_-=E\cup \bigcup_{T\in \Q_-} T\ ,$$ then we have $$s^{-1}\int_{(T(x,\xi,s)\cap X_\xi^-)\setminus T^b(x,\xi,s)}
|F(y,\eta,t)1_{E_-^c}(y,\eta,t)|^2\, dy\, d\eta\, dt
\le 2^{-8}\lambda^2\ ,$$ for all $(x,\xi,\delta)\in X_\Delta$.
Setting finally $\Q=\Q_0\cup \Q_+\cup \Q_-$ we have clearly found the desired collection of tents. This completes the proof of the endpoint $p=2$ of Theorem \[gen.carl.emb\].
The bilinear Hilbert transform {#bhtsection}
==============================
The most immediate application of Theorem \[gen.carl.emb\] is to prove basic estimates for the bilinear Hilbert transform. Another possible application is towards Carleson’s theorem [@carleson] on almost everywhere convergence of Fourier series. However, the latter application requires more work, as Carleson’s operator lacks the symmetry that is exhibited by the bilinear Hilbert transform and therefore needs an additional embedding theorem. Hence we decided to restrict attention to the bilinear Hilbert transform, which suffices to illustrate some key points of time-frequency analysis originating in Carleson’s work on convergence of Fourier series.
Let $\beta=(\beta_1,\beta_2,\beta_3)$ be a vector in $\R^3$ with pairwise distinct entries. For three Schwartz functions $f_1,f_2,f_3$ on the real line we define $$\Lambda_\beta(f_1,f_2,f_3):=p.v. \int_\R [\int_\R [\prod_{j=1}^3 f_j(x-\beta_jt) ]\, dx ]\, \frac{dt} t\ .$$ Note that the inner integral produces a Schwartz function in the variable $t$, to which we apply the tempered distribution $p.v. 1/t$. By a change of variables, scaling $t$ and translating $x$, we may and do restrict attention to vectors $\beta$ which have unit length and are perpendicular to $(1,1,1)$. The resulting one parameter family of trilinear forms is dual to a family of bilinear operators called bilinear Hilbert transforms. To obtain explicit expressions for these bilinear operators, one applies another translation in the $x$ variable to make one of the components, say $\beta_i$ vanish. After interchanging the order of integrals one obtains an explicit pairing of a bilinear operator in $f_j$, $j\neq i$, with the function $f_i$.
Let $\alpha$ be a unit vector perpendicular to $(1,1,1)$ and $\beta$. The vector $\alpha$ is unique up to reflection at the origin, and has only non-zero components by the assumption that $\beta$ has pairwise distinct components. Note also that $|\beta_j|\le 0.9$ for each $j$. For if one component of $\beta_j$ in absolute value exceeds $0.9$, then since $\beta$ is perpendicular to $(1,1,1)$, at least one further component has to exceed $0.45$ in absolute value. But then the vector cannot be a unit vector.
The following a priori estimate for $\Lambda_\beta$ originates in [@lacey-thiele1].
\[bilinearhttheo\] For a unit vector $\beta$ perpendicular to $(1,1,1)$ with pairwise distinct entries, and for $2<p_1,p_2,p_3<\infty$ with $\sum_j \frac 1{p_j} =1$, there is a constant $C$ such that for all Schwartz functions $f_1,f_2,f_3$ we have $$|\Lambda_\beta (f_1,f_2,f_3)|\le C \prod_{j=1}^3 \|f_j\|_{p_j}\ .$$
We give a new proof of this theorem based on Theorem \[gen.carl.emb\] and an outer Hölder inequality. This proof is analoguous to the previously presented proof of boundedness of paraproducts. In our approach, much of the difficulty in proving bounds for the bilinear Hilbert transform has been moved into the proof of the generalized Carleson embedding theorem. What remains to be done is relatively easier and in particular conceptually quite simple. It is the strength of our approach that the main difficulty is packaged into a cleanly separated module; previous approaches do not suggest the formulation of as clean a statement as Theorem \[gen.carl.emb\]. In particular, our proof is the first one to succeed without the passage to a discrete model operator. This avoids a cumbersome setup of choices of the discretization.
One can prove a version of Theorem \[bilinearhttheo\] with a constant independent of $\beta$, see [@grafakos-li], but only at the expense of considerable additional work. One may also extend the range of exponents, see [@lacey-thiele2]. It would be interesting to discuss these results in the context of outer measure theory, but this is beyond the scope of the present paper.
Define for $j=1,2,3$ $$\label{bhtemb}
F_j(y,\eta,t):=\int_\R f_j(x) e^{i\eta (y-x)} t^{-1}\phi(t^{-1}(y-x)) \, dx\ ,$$ where $\phi$ is a real valued Schwartz function such that $\widehat{\phi}$ is nonnegative, non vanishing at the origin, and supported in $[-\epsilon,\epsilon]$ for suitably small $\epsilon$. It will suffice to choose $\epsilon=2^{-16}$.
The estimate of Theorem \[bilinearhttheo\] can be reformulated by means of the functions $F_j$.
\[bhttheorem\] Under the assumptions of Theorem \[bilinearhttheo\] there is a constant $C$ depending only on $\beta$, $p_1,p_2,p_3$ and $\phi$ as above such that $$\label{bhtbound}
\left|\int_0^\infty \int_\R\int_\R
\prod_{j=1}^3 F_j (y,\alpha_j\eta +\beta_jt^{-1}, t) \, d\eta \, dy\, dt\right|
\le C\prod_{j=1}^3 \|f_j\|_{p_j}\ .$$
We postpone the proof of Lemma \[bhttheorem\] and proceed to deduce Theorem \[bilinearhttheo\] from Lemma \[bhttheorem\].
Inserting the definition of $F_j$ and using that $\alpha$ and $ \beta$ are perpendicular to $(1,1,1)$ we obtain for the integral on the left-hand-side of (\[bhtbound\]): $$\int_0^\infty \int_\R\int_\R
t^{-3}\prod_{j=1}^3
[\int_\R f_j(x_j) e^{-i \beta_j t^{-1}x_j} e^{-i \alpha_j\eta x_j}
\phi(t^{-1}(y-x_j)) \, dx_j]
\, d\eta \, dy\, dt\ .$$ Recall that the integral of the Fourier transform of a Schwartz function $\varphi$ in $\R^3$ over the line through the origin spanned by $\alpha$ is proportional to the integral of the Schwartz function itself over the perpendicular hyperplane through the origin spanned by $(1,1,1)$ and $\beta$: $$\label{perpendicularintegrals}
\int_\R \widehat{\varphi}(\eta \alpha)\, d\eta=
c \int_\R \int_\R \varphi(u(1,1,1)+v \beta)\, du \, dv\ .$$ To apply this fact, we observe that the inner triple integral of the previous display over $x_1,x_2,x_3$ is the value of the Fourier transform of a certain Schwartz function in $\R^3$ at the point $\eta\alpha \in \R^3$, and the integral in $\eta$ is then the integral of this Fourier transformation over the line spanned by $\alpha$. Hence we obtain up to a nonzero constant factor for that display: $$\int_0^\infty \int_\R
\int_\R\int_\R[t^{-3} e^{- i t^{-1} v} \prod_{j=1}^3
f_j(u+\beta_jv) \phi(t^{-1}(y-u-\beta_j v))] \, du\, dv
\, dy\, dt\ .$$ Here we have used again in the argument of the exponential function that $\alpha$, $\beta$ and $(1,1,1)$ are pairwise orthogonal and that $\beta$ has unit length. Changing the order of integration so that the $y$ integration becomes innermost we obtain for the last display $$\int_{0}^\infty \int_\R \int_\R [\prod_{j=1}^3 f_j(u+\beta_j v)]
t^{-2}e^{-it^{-1} v}
\psi(t^{-1}v)\, du \, dv\, {dt}\ ,$$ where $$\psi (w):= \int_\R
\prod_{j=1}^3 \phi(z-\beta_j w)\, dz\ .$$ We claim that there are nonzero constants $a$ and $b$ such that for any Schwartz function $g$ on the real line we have $$\label{lincombclaim}
\int_{0}^\infty \int_\R g(v)t^{-2}e^{-it^{-1} v} \psi(t^{-1}v)\, dv \, dt=
a g(0)+b\, p.v. \int g(t)\frac{dt}t\ .$$ This claim turns the left hand side of (\[bhtbound\]) into a nontrivial linear combination of $$\int_\R [\prod_{j=1}^3 f_j(u)]\, du$$ and $$p.v. \int[\int f_1(u-\beta_1 t) f_2(u-\beta_2 t) f_3(u-\beta_3 t) \, du ] \frac {dt} t\ .$$ Since $L^p$ bounds for the former follow by Hölder’s inequality, we can deduce $L^p$ bounds for the latter from $L^p$ bounds as in (\[bhtbound\]). This will complete the reduction of Theorem \[bilinearhttheo\] to Lemma \[bhttheorem\], once we have verified the above claim.
To see the claim, it suffices to verify that the left-hand-side of (\[lincombclaim\]) can be written as a nonzero multiple of $$\int_{-\infty}^0 \widehat{g}(\zeta)\, d\zeta\ ,$$ since the characteristic function of the left half line is known to be a nontrivial linear combination of the Fourier transform of the Dirac delta distribution and the principal value integral against $dt/t$. Using Plancherel we identify the left-hand-side of (\[lincombclaim\]) as nonzero multiple of $$\int_{0}^\infty \int_\R \widehat{g}(\zeta) \widehat{\psi}( 1-t\zeta )\, d\zeta \, \frac{dt}t\ .$$
The claim will thus follow by Fubini if we can establish that $\widehat{\psi}$ is proportional to a function that is nonnegative, nonzero at $0$, and supported in $[-1/2, 1/2]$. We have $$\widehat{\psi}(\eta)= \int_\R\int_\R
\prod_{j=1}^3 \phi(z-\beta_j w) e^{i \beta_j \eta (z-\beta_j w)} \, dz\, dw .$$ This is an integral of a Schwartz function in $\R^3$ over the plane spanned by $(1,1,1)$ and $\beta$, which by the observation (\[perpendicularintegrals\]) again may be written as multiple of the integral of the Fourier transform of the Schwartz function over the line spanned by $\alpha$: $$\int_\R \prod_{j=1}^3 \widehat{\phi}(\alpha_j \xi-\beta_j \eta))\, d\xi\ \ .$$ Since $\alpha$ and $\beta$ are perpendicular unit vectors and the support of $\widehat{\phi}\otimes \widehat{\phi} \otimes \widehat{\phi}$ is in a neighborhood of $0$ with diameter less than $1/10$, this integral is non-zero only if $|\eta|$ is smaller than $1/2$. Moreover, $\widehat{\psi}$ is evidently nonnegative real and nonzero at $0$. This completes the proof of the claim and the reduction of Theorem \[bilinearhttheo\] to Lemma \[bhttheorem\].
We consider the space $X=\R\times \R\times (0,\infty)$ and the outer measure generated by the collection $\E$ of all tents $$T(x,\xi,s):=\{(y,\eta,t)\in X: t<s, |y-x|<s-t, |\eta-\xi|\le t^{-1}\}$$ parameterized by $(x,\xi,s)\in X$ and the premeasure $\sigma(T(x,\xi,s))=s$.
Define a size $S$ by setting $$S(G)(T(x,\xi,s))=s^{-1}\int_{T(x,\xi,s)} |G(y,\eta,t)|\, dy\, d\eta\, dt$$ for each $G\in \B(X)$.
By a straight forward application of Proposition \[measuredomination\] we may estimate the left-hand-side of (\[bhtbound\]) by $$C\|G_1G_2G_3\|_{L^1(X,\sigma,S)}\ ,$$ where we have defined $G_j$ for $j=1,2,3$ by $$G_j(y,\eta,t):=F_j(y,\alpha_j \eta+\beta_j t^{-1}, t)\ .$$
We intend to apply a threefold Hölder’s inequality, which requires us to define three appropriate sizes $S_j$. Set $$b=2^{-8}\min_{i\neq j}|\beta_i-\beta_j|\ .$$ Since no two components of $\beta$ are equal, we have $b>0$. Define for each $1\le j\le 3$ and $(x,\xi,s)\in X$ the region $$T^{(j)}(x,\xi,s)$$ $$:=\{(y,\eta,t)\in X: t \le s, |y-x| \le s-t, |\alpha_j^{-1}(\eta-\xi) - \alpha_j^{-1}\beta_jt^{-1}|\le b t^{-1}\}\ .$$
For fixed $(x,\xi,s)$ the three regions $T^{(j)}(x,\xi,s)$ are pairwise disjoint, by symmetry it suffices to establish this for $j=1,2$. Assume to get a contradiction that we have $\eta,t$ with $$|\alpha_1^{-1}(\eta-\xi) - \alpha_1^{-1}\beta_1 t^{-1}|,\ |\alpha_2^{-1}(\eta-\xi) - \alpha_2^{-1}\beta_2 t^{-1}|\le
b t^{-1}\ .$$ Multiplying by $|\alpha_1|,|\alpha_2|\le 1$ respectively and comparing yields $|\beta_1-\beta_2|\le 2b$. This however is a contradiction to the choice of $b$ and thus proves that the regions $T^{(j)}(x,\xi,s)$ are pairwise disjoint.
We now observe for each $T=T(x,\xi,s)$ with similar notation $T^{(j)}= T^{(j)}(x,\xi,s)$ $$s S(G)(T)
= \int_{T} |G(y,\eta,t)|\, dy\, d\eta\, dt$$ $$=
\int_{T\setminus(T^{(1)}\cup T^{(2)}\cup T^{(3)})}
|G(y,\eta,t)|\, dy\, d\eta\, dt
+\sum_{j=1}^3 \int_{T\cap T^{(j)}}|G(y,\eta,t)|\, dy\, d\eta\, dt$$ $$\le \prod_{j=1}^3\left(
\int_{T\setminus T^{(j)}}
|G_j(y,\eta, t)|^3\, dy\, d\eta\, dt \right)^{1/3}$$ $$+\sum_{j=1}^3
\sup_{( y,\eta,t )\in T^{(j)}}|G_j(y,\eta,t)|
\prod_{k\neq j}
\left(\int_{T\setminus T^{(k)}}|G_k(y,\eta,t)|^2\, dy\, d\eta\, dt \right)^{1/2}\ .$$ Define the size $$S_j(G)(T):=(
s^{-1}\int_{T\setminus T^{(j)} }|G(y,\eta,t)|^2 \, dy\,
d\eta \,{dt})^{1/2}
+ \sup_{(y,\eta,t)\in T}|G(y,\eta,t)|\ .$$ Then we conclude from the previous considerations that $$S(G)(T)
\le 4 \prod_{k=1}^3 S_k(G_k)(T)\ ,$$ where we have with log convexity estimated $L^3$ norms by $L^2$ and $L^\infty$ norms.
By the outer Hölder inequality, Proposition \[p.hoelder-energy\], we obtain for the left-hand-side of (\[bhtbound\]) the bound $$C \prod_{j=1}^3 \|G_j\|_{L^{p_j}(X,\sigma, S_j)}$$ with exponents $p_j$ as in Lemma \[bhttheorem\]. It remains to show for each $j$ that $$\|G_j\|_{L^{p_j}(X,\sigma,S_j)}\le C \|f_j\|_{p_j}\ .$$ This follows from the generalized Carleson embedding, Theorem \[gen.carl.emb\], after a re-parametrization of the space $X$ under the homeomorphism $$\Phi_j:X\to X,\ (y,\eta,t)\mapsto (y,\alpha_j \eta+\beta_j t^{-1}, t)\ .$$ Note that $\Phi_j$ maps $T_{\alpha_j,\beta_j}(x,\alpha_j^{-1} \xi,s)$ as defined in to $T(x,\xi,s)$ as above, and it maps $T^b(x,\alpha_j^{-1}\xi,s)$ to $T^{(j)}(x,\xi,s)$ as above and we have $F_j\circ\Phi_j=G_j$. This completes the proof of Lemma \[bhttheorem\].
[plain]{}
D. Adams, *Choquet integrals in potential theory*. Publ. Mat. 42 (1998), no. 1, 3–66.
L. Carleson, *Interpolations by bounded analytic functions and the corona problem*. Ann. of Math. (2) 76 (1962): 547-559. (1962)
L. Carleson, *On convergence and growth of partial sums of Fourier series*, Acta Math. 116 (1966) 135–157.
R. R. Coifman, Y. Meyer, E. M. Stein, *Some new function spaces and their applications to harmonic analysis*, J. Funct. Anal. 62 (1985), no. 2, 304–335.
G. David, J.-L. Journé, *A boundedness criterion for generalized Calder???n-Zygmund operators*, Ann. of Math. (2) 120 (1984), no. 2, 371–397.
I. Daubechies, *Ten lectures on wavelets* CBMS-NSF Regional Conference Series in Applied Mathematics 61, SIAM, Philadelphia, PA, (1992).
C. Demeter, C. Thiele, *On the two-dimensional bilinear Hilbert transform*, Amer. J. Math. 132 (2010), no. 1, 201–256.
Y. Do, C. Muscalu, C. Thiele, *Variational estimates for paraproducts*, Rev. Mat. Iberoamericana (2012), vol 28, no. 3, pp. 859–878.
L. Grafakos, X. Li, *Uniform bounds for the bilinear Hilbert transforms. I.*, Ann. of Math. (2) 159 (2004), no. 3, 889-933.
M. Lacey, C. Thiele, *$L^p$ estimates on the bilinear Hilbert transform*, Proc. Nat. Acad. Sci. U.S.A. 94. no. 1, (1997), 33–35
M. Lacey, C. Thiele, *On Calderón’s conjecture for the bilinear Hilbert transform*, Proc. Natl. Acad. Sci. USA 95 (1998), no. 9, 4828–4830 .
M. Lacey, C. Thiele, *A proof of boundedness of the Carleson operator*, Math. Res. Lett 7 (2000) 361–370 .
A. Lerner, *On an estimate of Calderón-Zygmund operators by dyadic positive operators*, J. Anal. Math. 121, (2013), 141–161 .
C. Muscalu, T. Tao, C. Thiele, *[$L^p$]{} estimates for the biest. [II]{}. [T]{}he [F]{}ourier case*, Math. Ann. 329 (2004), no. 3, 427–461.
C. Muscalu, T. Tao, C. Thiele, *Uniform estimates on multi-linear operators with modulation symmetry*,
J. Anal. Math. 88 (2002), 255–309.
R. Oberlin, A. Seeger, T. Tao, C. Thiele, J. Wright, *A variation norm Carleson theorem*, J. Eur. Math. Soc. (JEMS) 14 (2012), no. 2, 421–464.
E. Stein, *Harmonic Analysis: real-variable methods, orthogonality, and oscillatory integrals*, Princeton Mathematical Series 43, With the assistance of Timothy S. Murphy; Princeton University Press, Princeton, NJ, (1993).
C. Thiele, *The quartile operator and pointwise convergence of Walsh series.* Trans. Amer. Math. Soc. 352 (2000), no. 12, 5745–5766.
C. Thiele, *A uniform estimate*, Ann. of Math. (2) 156 (2002), no. 2, 519–563.
R. Wheeden, A. Zygmund, *Measure and integral* An introduction to real analysis. Pure and Applied Mathematics, Vol. 43. Marcel Dekker, Inc., New York-Basel, 1977.
[^1]: For details see the special case $p=\infty$ of
|
OVCRGE-CASI Homepage
This document provides a brief description of the Committee on Academic Staff Issues.
About
The Office of Vice Chancellor for Research and Graduate Education Committee on Academic Staff Issues (OVCRGE-CASI) exists to advise the Vice Chancellor on matters of concern to Academic Staff. The Vice Chancellor may ask us for advice and we may volunteer advice to the Vice Chancellor. We welcome input from Academic Staff about issues we are considering and about any other issues of concern to you.
Responsibilities
Representing OVCRGE academic staff in the development and review of all OVCRGE policies and procedures concerning OVCRGE academic staff
Promoting a positive climate and enhance an appreciation for diversity among OVCRGE academic staff
Advising the Vice Chancellor on OVCRGE program decisions likely to affect promotional opportunities or lead to nonrenewal or layoff of OVCRGE academic staff
Recommending opportunities for participation of OVCRGE academic staff in governance
Recommending opportunities for recognition of OVCRGE academic staff contributions to the excellence of the OVCRGE
Recommending mentoring and professional development programs for OVCRGE academic staff
Representing the OVCRGE academic staff in communications to the Academic Staff Assembly (ASA) and its Standing Committees, the Academic Staff Executive Committee (ASEC), the Academic Staff Public Representation Organization (ASPRO), other campus committees, and the Secretary of the Academic Staff
Serving as a forum for discussion of the concerns of OVCRGE academic staff. |
<?php
namespace FluidTYPO3\Vhs\ViewHelpers\Math;
/*
* This file is part of the FluidTYPO3/Vhs project under GPLv2 or later.
*
* For the full copyright and license information, please read the
* LICENSE.md file that was distributed with this source code.
*/
use TYPO3Fluid\Fluid\Core\ViewHelper\Traits\CompileWithContentArgumentAndRenderStatic;
/**
* Math: Round
*
* Rounds off $a which can be either an array-accessible
* value (Iterator+ArrayAccess || array) or a raw numeric
* value.
*/
class RoundViewHelper extends AbstractSingleMathViewHelper
{
use CompileWithContentArgumentAndRenderStatic;
/**
* @return void
*/
public function initializeArguments()
{
parent::initializeArguments();
$this->registerArgument('decimals', 'integer', 'Number of decimals', false, 0);
}
/**
* @param mixed $a
* @param null $b
* @param array $arguments
* @return integer
*/
protected static function calculateAction($a, $b, array $arguments)
{
if (static::assertIsArrayOrIterator($a)) {
foreach ($a as $index => $value) {
$a[$index] = static::calculateAction($value, $b, $arguments);
}
return $a;
}
return round($a, $arguments['decimals']);
}
}
|
word1 0.123 0.134 0.532 0.152
word2 0.934 0.412 0.532 0.159
word3 0.334 0.241 0.324 0.188
word9 0.334 0.241 0.324 0.188 |
Food products such as cookies, crackers and chips can be stored in a wide variety of plastic and paper-based containers. Such containers can include a separate lid that can be attached to a lip of a body of the container. Typically, such lids are manufactured separately from the container and increase the total cost of the container. In addition, separate plastic lids can confuse the consumer with complicated functionality or become misplaced.
Some containers are formed from one or more paperboard blanks that are divided by fold lines into a plurality of panels. Such containers can be cheaper to produce than containers with separate lids. The panels can provide an attractive lid which can also protect the food product inside the container. Some examples of such containers are described in U.S. Pat. No. 4,850,528, U.S. Pat. No. 7,726,551, and U.S. Publication No. 2011/0095074. A disadvantage of such lids is that six or more such panels have to be simultaneously or sequentially manipulated when opening or closing such containers, which can make the opening and closing of the container a difficult and time consuming process. |
WELCOME TO TMAQ TALK'S BLOG THE SULTAN OF ENTERTAINMENT....
Lawmakers Currently Under Serious Security Watch Over Rumors of Military Takeover
Taking after a caution raised by the Chief of Army Staff intimating that the military may plan to takeover government, lawmakers have appa...
Taking after a caution raised by the Chief of Army Staff intimating that the military may plan to takeover government, lawmakers have apparently avoided potential risk.
A report by The Nation has demonstrated that Chief of Army Staff Lt.- Gen. Tukur Buratai cautioned officers against governmental issues to spare the country's majority rules system.
The alert is accepted to have taken after an insight report that a few government officials, who were awkward with the soundness of President Muhammadu Buhari, were penetrating the military.
There were no subtle elements of such invasion in the announcement, which cautioned officers not to fraternize with government officials.
The current postings in the Army may have been a piece of the measures set up to ensure the country's majority rule government against stuns and dangers, a source said.
Buratai likewise advised the anonymous government officials, who are said to have been put under observation by security offices, not to impact troopers.
As per the source, who talked in certainty, Gen. Buratai was irritated that the continuous professionalization of the military may endure a noteworthy misfortune if government officials were permitted to "penetrate the framework".
The source stated: "What Buratai did was a pre-emptive move by the military specialists therefore of insight report that a few legislators were out to penetrate the Armed Forces.
"The COAS chosen to shout out after insight on the demeanor of a few legislators who were awkward with the uneasiness over the strength of President Muhammadu Buhari."
Gen. Buratai's notice to officers was to ensure majority rules system, push that the Armed Forces must oppress themselves to regular citizen specialist, promise the military's reliability to the Presidency and alert lawmakers that officers can't be utilized for political underhandedness, the source said. He argued not to be named on the grounds that he is not allowed to converse with the media.
The armed force boss' doubt of the penetration of the military is accepted to have been fuelled by the emergency in Cote D'Ivoire.
Nigeria has denounced the rebellion in Cote D'Ivoire.
"Be that as it may, Gen. Buratai has utilized his announcement to console Nigerians and the worldwide group that the military won't intrude in legislative issues. This caution has paid off, with the United Kingdom and ace majority rules system bunches giving their sponsorship to the present organization.
"Also, his caution has worked in light of the fact that every one of the responses have demonstrated that Nigerians won't acknowledge the arrival of the military to control," the source said.
Reacting to a question, the source included: "I think the important security offices have set a portion of the speculated lawmakers on reconnaissance."
Another source said Gen. Buratai gave the notice to splash pressure in the Army over late postings.
"These bits of gossip begun from the last military posting. There were numerous vital arrangements which a few people felt went to the nearby associates of the Army initiative.
"There were claims that some trusted officers were placed in territories of impact due to the reaction of the soundness of the President.
"In any case, we have discovered that those protesting had no case on the grounds that Buratai as a fighter's trooper does not have any top choice. He puts polished methodology above ethnic or religious thought. He will likely keep the military joined together." |
Q:
Inherit from 2 objects
I have a question about object inheritance with Object.create.
I have two objects, that should behave like interfaces. Object3D and Light. Object3D presents real object in 3D space. It has its position in space and it should have some functions to for example change this position. Light is everything that glows. And every light has its color.
// I have resons to use iif, dont bother with that ;)
var Object3D = (function() {
var Object3D = function() {
this.position = vec3.create();
};
return Object3D;
})();
var Light = (function() {
var Light = function() {
this.color = new Array(4);
};
return Light;
})();
Now, I want to have two another objects, which will be 'classes'. First one is AmbientLight. AmbientLight doesnt have position, because it just glows everywhere. So it inherits from Light. The other one is PointLight. PointLight is Light, but it has also position, because it doesn't glow everywhere. It has some range. So it should inherit also from Object3D. How can I do it? Can I merge results from Object.create?
var AmbientLight = (function() {
var AmbientLight = function() {
Light.call(this);
};
AmbientLight.prototype = Object.create(Light.prototype);
return AmbientLight;
})();
var PointLight = (function() {
var PointLight = function() {
Light.call(this);
Object3D.call(this);
this.range = 10.0;
};
// this isnt correct
// how to make it correct?
PointLight.prototype = Object.create(Light.prototype);
PointLight.prototype = Object.create(Object3D.prototype);
return PointLight;
})();
A:
You've got exactly the right idea. Simply merge your two objects together where you're setting the prototype:
PointLight.prototype = Object.create(Light.prototype);
var obj3D = Object.create(Object3D.prototype);
for (var key in obj3D) {
if (obj3D.hasOwnProperty(key)) {
PointLight.prototype.key = obj3D.key;
}
}
Of course, you have all your normal ugly issues that you get when dealing with multiple inheritance - namely, if you have any member with a common name in both objects, the Object3D member will overwrite the Light member.
|
Three different stable human breast adenocarcinoma sublines that overexpress ALDH3A1 and certain other enzymes, apparently as a consequence of constitutively upregulated gene transcription mediated by transactivated EpREs (electrophile responsive elements) present in the 5'-upstream regions of these genes.
ALDH3A1 catalyzes the detoxification of cyclophosphamide, mafosfamide, 4-hydroperoxycyclophosphamide and other oxazaphosphorines. Constitutive ALDH3A1 levels, as well as those of certain other drug-metabolizing enzymes, e.g. NQO1 and CYP1A1, are relatively low in cultured, relatively oxazaphosphorine-sensitive, human breast adenocarcinoma MCF-7 cells. However, transient cellular insensitivity to the oxazaphosphorines can be brought about in these cells by transiently elevating ALDH3A1 levels in them as a consequence of transient exposure to: (1) electrophiles such as catechol that induce the transcription of a battery of genes, e.g. ALDH3A1 and NQO1, having in common an electrophile responsive element (EpRE) in their 5'-upstream regions; or (2) Ah-receptor agonists, e.g. indole-3-carbinol and polycyclic aromatic hydrocarbons such as 3-methylcholanthrene, that induce the transcription of a battery of genes, e.g. ALDH3A1, NQO1 and CYP1A1, having in common a xenobiotic responsive element (XRE) in their 5'-upstream regions. Further, MCF-7 sublines that are constitutively, i.e. when grown in the absence of the original selecting pressure, relatively oxazaphosphorine-insensitive as a consequence of constitutively relatively elevated cellular ALDH3A1 levels evolved when MCF-7 cells were: (1) continuously exposed for several months to gradually increasing concentrations of 4-hydroperoxycyclophosphamide or benz(a)pyrene; or (2) briefly exposed (once for 30 min) to a high concentration (1 mM) of mafosfamide. Each of these three stable sublines is constitutively relatively cross-insensitive to benz(a)pyrene and other polycyclic aromatic hydrocarbons. Cellular levels of NQO1, but not of CYP1A1, are also constitutively relatively elevated in each of the three sublines. RT-PCR-based experiments established that ALDH3A1 mRNA levels are constitutively elevated ( approximately 5- to 8-fold) in each of the three sublines. The elevated ALDH3A1 mRNA levels are not the consequence of gene amplification, hypomethylation of a relevant regulatory element, or ALDH3A1 mRNA stabilization. Collectively, these observations suggest that constitutively elevated levels of ALDH3A1 and certain other enzymes in the three stable sublines are probably the consequence of a constitutive change in the cellular concentration of a key component of the EpRE signaling pathway, such that the cellular concentration of the relevant ultimate transactivating factor is constitutively elevated, i.e. gene transcription promoted by transactivated EpREs is constitutively upregulated. Further, constitutively upregulated gene transcription mediated by transactivated EpREs can be relatively easily induced, whereas that mediated by transactivated XREs cannot, at least in MCF-7 cells. Still further, the three sublines may facilitate study of the signaling pathway that leads to transactivation of the EpREs present in the 5'-upstream regions of ALDH3A1, NQO1 and other gene loci. |
Conyers and Berman Introduce Bill to
Criminalize Placing Copyrighted Works on P2P Networks
7/16. Rep. John Conyers (D-MI)
and others introduced
HR 2752,
the "Author, Consumer, and Computer Owner
Protection and Security (ACCOPS) Act of 2003". The bill would amend the
Copyright Act and the criminal code to protect digital works from online
infringement. It would criminalize the unauthorized placement of copyrighted
works on P2P networks, and criminalize offering certain P2P software without first
giving notice of the privacy and security risks. It would also criminalize
registering a domain name with false information with intent to defraud, and
provide that registering a domain name with false information shall be
considered evidence of willfulness with respect to infringement committed with
that domain name. The bill also calls for increased cooperation between the U.S.
and foreign prosecutors, and authorizes appropriations for investigation and
prosecution of copyright crimes.
Rep.
Conyers (at right) explained in a statement submitted for the Congressional
Record that "Those who invest so much into developing software, books,
music, and movies and rely upon sales of that content are being deprived of
their livelihoods because people are taking advantage of the Internet to obtain
and share digital content for free." See, Congressional Record, July 16,
2003, at page E1496.
Rep. Conyers, who is the ranking Democrat on the full Committee, continued
that "While there are laws on the books that protect copyrighted content from
theft, they do not go quite far enough. Despite court decisions ordering various
file swapping sites to shut down, new file-swapping programs and new
file-swapping sites appear every day on the Internet, each one better than its
predecessor. These sites do not develop their own content; instead, they rely
upon the success and popularity of content created by others and allow that
content to be distributed to millions with the single click of a mouse. These
sites also create security and privacy risks, in that they open up entire the
hard drives average consumers for the world to see, financial and personal
information included."
Criminalization of Placing Copyrighted Works on Certain Computer Networks.
One of the key provisions of the bill would criminalize putting copyrighted
works on certain computer networks. Courts have held recently that individuals
who put copyrighted songs on peer to peer (P2P) networks commit civil copyright
infringement. See, for example,
A&M
Records v. Napster, 239 F.3d 1004 (9th Cir. 2001). However, the standard for
establishing criminal copyright infringement is higher. This bill would make
clear that this sort of P2P infringement can constitute criminal conduct.
Currently, criminal infringement requires either (1) the purpose of
"commercial advantage or private financial gain", or (2) "reproduction or
distribution, including by electronic means ... of ... copyrighted works, which
have a total retail value of more than $1,000". P2P infringers would not meet
the first requirement. While they might meet the second requirement, prosecution
would be difficult.
"Any person who infringes a copyright willfully either --
(1) for purposes of commercial advantage or private financial gain, or
(2) by the reproduction or distribution, including by
electronic means, during any 180-day period, of 1 or more copies or
phonorecords of 1 or more copyrighted works, which have a total retail value
of more than $1,000,
shall be punished as provided under section 2319 of title 18, United
States Code. For purposes of this subsection, evidence of reproduction or
distribution of a copyrighted work, by itself, shall not be sufficient to
establish willful infringement."
Title 18 is the criminal code.
18 U.S.C. § 2319 pertains to criminal
infringement of copyright. Subsection 2319(a) provides that "Whoever violates
section 506(a) (relating to criminal offenses) of title 17 shall be punished as
provided in subsections (b) and (c) of this section and such penalties shall be
in addition to any other provisions of title 17 or any other law." (Parentheses
in original.)
In turn, Subsection 2319(b) provides, in part, that "Any person who commits
an offense under section 506(a)(1) of title 17 -- (1) shall be imprisoned not more
than 5 years, or fined in
the amount set forth in this title, or both, if the offense consists of the
reproduction or distribution, including by electronic means, during any
180-day period, of at least 10 copies or phonorecords, of 1 or more
copyrighted works, which have a total retail value of more than $2,500;".
HR 2752 would add the following language to 17 U.S.C. § 506(a): "For
purposes of section 2319(b) of title 18, the placing
of a copyrighted work, without the authorization of the copyright owner, on a
computer network accessible to members of the public who are able to copy the
work through such access shall be considered to be the distribution, during a
180-day period, of at least 10 copies of that work with a retail value of more
than $2,500."
Rep. Berman described
this provision of the bill at a hearing on July 16. The hearing was not on
HR 2752. Rather, it was on
HR 2517,
the "Piracy Deterrence and Education Act of 2003", sponsored by
Rep. Lamar Smith (R-TX) and Rep.
Berman. HR 2517 would
enhance the government's resources for prosecuting intellectual property rights
(IPR) crimes,
and involve the Federal Bureau of Investigation
(FBI) and Department of Justice (DOJ) in
educating and warning the public regarding internet based copyright
infringement. See, TLJ
story titled "House CIIP Subcommittee Holds Hearing on
Piracy Deterrence and Education Act", July 18, 2003. That is, HR 2517 would
expand enforcement of existing IPR related criminal statutes, while HR 2752
would expand the scope of IPR related conduct that constitutes crimes.
Rep. Berman first praised HR 2517, regarding enforcement. But he added,
"I think more can be done." He then launched into a long explanation of
HR 2752, and why he believes that it is necessary.
For example, he addressed the section that criminalizes putting certain works
on P2P networks. He stated that
"Section 301 of that bill clarifies that the uploading of a single
copyrighted work to a publicly accessible computer network meets the 10 copy,
$2,500 threshold for felonious copyright infringement. Section 301 simply brings
the law into accord with the reality that uploading a copyrighted work to a
place from which millions can download it is equivalent to the distribution of
ten or more copies having a value of $2,500. We do this because some prosecutors
appear skeptical that they can successfully pursue cases against many uploaders
of copyrighted works, otherwise."
Registering Domain Names with False Information. The bill also
contains two provisions relating to the use of false contact information when
registering domain names.
First, the bill would add a new Section 1037 to Title 18, that would provide,
in part, that "Whoever knowingly and with intent to defraud provides material
and misleading false contact information to a domain name registrar, domain name
registry, or other domain name registration authority in registering a domain
name shall be fined under this title or imprisoned not more than 5 years, or
both."
Second, the bill would further amend Section 506 of Title 17 regarding
evidence of willful infringement. It would add the following: "The knowing and
intentional provision of material and misleading false contact information to a
domain name registrar, domain name registry, or other domain name registration
authority in registering a domain name shall be considered evidence of
willfulness with respect to infringements committed by the domain name
registrant through the use of that domain name."
Rep. Berman addressed the second of these two provisions on July 16. He stated that
"Section 305 addresses the all too common phenomenon of operators of
copyright infringing websites providing false domain name registration
information. If the illegal activities on the web site attract the attention of
law enforcement or right holders, the operators often disconnect it, and pop up
elsewhere, under another domain name, with different contact information.
Section 305 directs the courts to consider the knowing and intentional provision
of materially false domain name registration as evidence of willfulness with
regard to copyright infringements."
Consumer Privacy and Security. The bill would add a new Section 1822 to
Title 18 that provides that "Whoever
knowingly offers enabling software for download over the Internet and does not
(1) clearly and conspicuously warn any person downloading that software, before
it is downloaded, that it is enabling software and could create a security and
privacy risk for the user's computer; and (2) obtain that person's prior consent
to the download after that warning; shall be fined under this title or
imprisoned not more than 6 months, or both."
The bill also defines "enabling software" as "software that, when installed
on the user's computer, enables 3rd parties to store data on that computer, or
use that computer to search other computers' contents over the Internet."
Rep. Berman stated that "Section 302 addresses the well documented concern
that popular peer to peer
software programs sometimes allow third parties to hijack personal computers to
distribute child pornography and copyright infringing material, come bundled
with spyware, and otherwise jeopardize the privacy and security of PC owners.
Section 302 requires that PC owners receive clear and conspicuous notice, and
provide consent prior to downloading software, that would allow third parties to
store material on the personal computer, or use that personal computer to search
for material on other computers."
This issues of privacy and security of P2P networks has been addressed at
previous Congressional hearings.
The Senate Judiciary
Committee held a hearing on June 17, 2003 titled "The Dark Side of a Bright
Idea: Could Personal and National Security Risks Compromise the Potential of
Peer to Peer File Sharing Networks". See, story titled "Senate Committee Holds
Hearing on P2P Networks" in TLJ Daily E-Mail Alert No. 683, June 18, 2003.
At this hearing witnesses praised the benefits of P2P networks, but also
cautioned about threats that they pose to the privacy and security of
individuals' sensitive records, and to the security of sensitive government
records. Witnesses also discussed the problem of pormography on P2P networks that is
often disguised a popular music files, thus causing children to unwittingly be
exposed.
Other Provisions. The bill would authorize the appropriation of "not
less than $15,000,000" for investigation and prosecution by the Department of
Justice of violations of Title 17, which codifies copyright law.
The bill provides for increased information sharing by the Department of
Justice with foreign law enforcement authorities to assist their enforcement of
their copyright laws. Rep. Berman stated on July 16 that "Section 201
addresses the unique law enforcement challenge posed by the
increasingly transnational character of online copyright infringement. In order
to insure that the road across the border does not become an investigation dead
end, Section 201 requires the Attorney General to assist the appropriate foreign
authority in making a case against such online infringers."
Finally, the bill would amend 17 U.S.C. § 506 to provide that criminal copyright
infringement includes copying "by the unauthorized reproduction or recording of
a motion picture as it is being performed or displayed in a motion picture
theater".
The resolution states that "Congress disapproves the rule submitted by the
Federal Communications Commission relating to broadcast media ownership (Report
and Order FCC 03-127, received by Congress on July 10, 2003), and such rule
shall have no force or effect." (Parentheses in original.)
The FCC announced the Report and Order on June 2, and released it on July 2.
See also, stories titled "FCC Announces Revisions to Media
Ownership Rules" and "Reaction to the FCC's Media Ownership Announcement"
in TLJ
Daily E-Mail Alert No. 672, June 3, 2003, and story titled "FCC Releases
Media Ownership Order and NPRM" in TLJ Daily E-Mail Alert No. 692, July 7, 2003.
Sen.
Dorgan (at right) stated in a release that "We are moving to roll back one of
the most complete cave-ins to corporate interests I've ever seen by what is
supposed to be a federal regulatory agency ... The FCC's decision on June 2
advanced big corporate interests, and did so at the expense of the public
interest. They chose concentration over competition. They chose few voices over
many voices. In a democracy which relies on the free exchange of many voices,
that was the wrong choice."
Sen. Russ Feingold (D-WI), a
cosponsor of the resolution, stated that "By invoking the Congressional Review
Act, Congress can wipe out these new rules altogether, and the FCC will have to
go back and redraft them. We plan to make it clear that the new draft should
include some of the positive proposals contained in the recent media bill
sponsored by Senator Ted Stevens that passed out of the Commerce Committee. The
CRA specifically contemplated that agencies may have to redo regulations
required by court or congressional mandate. If this disapproval resolution is
passed by the House and the Senate, the preexisting rules will again be in
effect until the FCC goes back to the drawing board and promulgates new
regulations that are not substantially similar to the rules that Congress has
disapproved." See, Congressional Record, July 16, 2003, at page S9490.
On June 19, 2003, the Senate
Commerce Committee amended and passed
S 1046, the
"Preservation of Localism, Program Diversity, and Competition in Television
Broadcast Service Act of 2003". The bill, as amended, would roll back some of
the changes to the FCC's media ownership rules. The bill is sponsored by
Sen. Ted Stevens (R-AK). See,
TLJ story
titled "Senate Commerce Committee Passes Media Ownership Bill", June 19, 2003.
Secretary Evans Releases Proposed Bill to Place NTIA,
NIST and Other Entities in One Administration
7/17. Secretary of Commerce
Donald Evans sent a proposed bill to the
Congress that would reorganize several, but not all, of the technology related
entities at the Department of Commerce (DOC)
into one unit. See,
documents [11 pages in PDF] sent to Congress (cover letter, draft of
proposed bill, and Statement of Purpose and Need). See also,
DOC question and answer
document [4 pages in PDF].
The bill provides that "There is established in the Department of Commerce
a Technology and Telecommunications Administration. The Technology and
Telecommunications Administration shall include --
(1) the National Institute of Standards and Technology;
(2) the National Telecommunications and Information Administration;
(3) the National Technical Information Service; and
(4) the Office of Technology Policy."
The new Administration would be headed by an Under Secretary, who "shall
advocate technology and
telecommunications policies at the federal, state, and local level that
promote, among other important benefits, economic growth, job creation,
national security and safety, a strong technology base, and a robust
competitive telecommunications infrastructure."
Secretary Evans (at right)
stated in his cover letter that "This
bill modifies and modernizes the organizational structure of the Department of
Commerce to enhance the formulation of technology, electronic commerce and
telecommunications policy issues."
The National Telecommunications and
Information Administration (NTIA) has spectrum management authority,
domain name management responsibilities, and limited grant making authority.
It also represents the administration on certain communications matters, and
has been assigned by the Congress to write various communications and
e-commerce related studies.
Secretary Evans' Statement of Purpose and Need recites that the e-commerce
policy functions of the International Trade
Administration (ITA) will be transferred to the new unit. However, this is
not referenced in the draft bill. The Statement explains that "No
legislative change is required to merge
the ITA electronic commerce policy functions with the Technology and
Telecommunications Administration as these functions are currently delegated
to ITA by internal Departmental organizational order. The proposed reform will
not impact ITA's responsibilities regarding trade negotiations and promotion
as they pertain to electronic commerce."
The Statement of Purpose and Need states that "The Department of Commerce
currently develops and implements technology, electronic commerce and
telecommunications policy in three bureaus: TA, NTIA, and ITA. To complement
the convergence in the private sector of technology and communications
companies, Secretary Evans is
proposing to reorganize Departmental personnel and management to formalize the
coordination of domestic and international policy development for these
inter-related sectors of the economy. The proposed structure would have the
Under Secretary for Technology and Telecommunications oversee the expanded
bureau."
Secretary Evans originally made this proposal on February 13, 2003. He did
not at that time forward the draft of proposed legislation. See, story titled
"Don Evans Proposes Combining Tech Related Entities at Commerce Department" in
TLJ Daily E-Mail
Alert No. 604, February 14, 2003.
There are other technology and innovation related entities at the DOC that
are not affected by this reorganization, including the
U.S. Patent and Trademark Office (USPTO)
and the Bureau of Industry and Security
(BIS). The BIS administers the export control regime, which grants export
licenses for, among other things, dual use items, such as software and
encryption products, and high performance computers.
Rep. Sherwood Boehlert (R-NY),
the Chairman of the Committee, said in his
opening statement that "Supercomputers help design our cars, predict our
weather, and deepen our understanding of the natural forces that govern our
lives, such as our climate. Indeed, computation is now widely viewed as a third
way of doing science -- building on the traditional areas of theory and
experimentation."
He continued that "maintaining U.S. leadership requires a coordinated, concerted effort by
the federal government. The federal government has long underwritten the basic
research that fuels the computer industry, has purchased the highest-end
computers, and has ensured that those computers are available to a wide range of
American researchers. This Committee has played an especially crucial role in
ensuring access, pushing for the creation of the National Science Foundation
(NSF) Supercomputer Centers back in the early '80s."
Rep. Boehlert stated that "Government action is just as needed now.
But what action? The Department of
Energy is proposing to move away from our reliance on more mass-market
supercomputers to pursue research on massive machines designed to solve
especially complex problems. NSF appears to be moving away from supporting
supercomputer centers to a more distributed computing approach. These policies
need to be examined."
Vincent Scarafino, Manager of Numerically Intensive Computing at Ford Motor
Company, wrote in his
prepared testimony that "Up until the mid 1990's, the Federal government had
helped with the development of high-end machines with faster, more powerful
processing capability and matching memory bandwidth and latency characteristics
by helping to fund development and create a market for them. These machines were
built mainly to meet the needs of government security and scientific research.
Once they were built, there was a limited, but significant application of these
machines in the private sector. The availability of higher capability machines
advanced the application of science in the private sector."
Then, "In the mid 1990's the Federal government decided to rely on utilizing
off-the-shelf components and depend on the ability to combine thousands of these
components to work in harmony to meet its advanced high-performance computing
needs. The result was an advance in the areas of computer science that dealt
with parallel processing. Over the last eight years, some kinds of applications
have adapted well to the more constrained environment supported by these
commodity based machines."
However, Scarafino added that the "hardest problems do not adapt well to
parallel architectures. Either we
don't know enough about the problem to develop a parallel solution, or they are
not parallel by nature."
He stated that the "Federal government cannot rely on fundamental
economic forces to advance
high-performance computing capability", and that the "Federal
government should help with the advancement of high-end processor
design and other fundamental components necessary to develop well-balanced,
highly capable machines. U. S. leadership is currently at risk."
Daniel Reed, Director of the National
Center for Supercomputing Applications (NCSA) at the University of Illinois
at Urbana-Champaign, wrote in his
prepared
testimony [PDF] that "We must change the model for development, acquisition and
deployment of high-end computing systems if the U.S. is to sustain the
leadership needed for scientific discovery and national security in the long
term."
He recommended that "In the short to medium term, we must acquire and continue to
deploy additional high-end systems at larger scale if we are to satisfy the
unmet demand of the science and engineering research community." Also, "we
must fund the design and construction of
large-scale prototypes of next-generation high-end systems that includes
balanced exploration of new hardware and software models, driven by scientific
application requirements."
Peter Freeman of the National Science Foundation wrote in his
prepared testimony that the "NSF remains absolutely committed to providing
researchers the most advanced computing equipment available and to sponsoring
research that will help create future generations of computational
infrastructure, including supercomputers."
"At the same time, we are committed to realizing the compelling vision
described in the report of the NSF Advisory Panel on Cyberinfrastructure,
commonly known as the Atkins Committee -- that ``a new age has dawned in
scientific and engineering research, pushed by continuing progress in computing,
information and communications technology.´´ This cyberinfrastructure includes,
and I quote, "not only high-performance
computational services, but also integrated services for knowledge management,
observation and measurement, visualization and collaboration", said Freeman. See, Atkins Report
Executive
Summary [6 pages in PDF] and full
Report
[3.2 MB in PDF].
The House will meet at 12:30 PM for morning hour and at 2:00 PM for
legislative business. It will consider several items under suspension of the
rules. Votes will be postponed until 6:30 PM. See,
Republican Whip Notice.
The Senate will meet at 1:00 PM. At 1:30 PM it will begin consideration of
HR 2555,
the "Department of Homeland Security Appropriations Act, 2004".
11:00 AM. The Consumer Federation of
America and the Consumers Union will hold a telephone press conference
regarding the Federal Communications Commission's
(FCC) media ownership rules. To participate, call 888 747-3510; the
passcode is 213649. After 2:00 PM, a playback will be available at 888
266-2081; passcode 213649.
Deadline to submit comments to the Federal
Communications Commission (FCC) in response to its Notice of Inquiry (NOI)
pertaining to the possibility of incorporating receiver performance specifications
into the FCC's spectrum policy. This NOI follows the recommendations of the FCC's
Spectrum Policy Task Force (SPTF)
report [PDF] of November 15, 2002. See,
story titled
"FCC Announces NOI Re Receiver Performance Standards" in TLJ Daily E-Mail Alert
No. 624, March 17, 2003. See also,
notice in the Federal Register, May 5, 2003, Vol. 68, No. 86, at Pages 23677 -
23686. This is ET Docket No. 03-65, FCC 03-54. For more information, contact
Hugh Van Tuyl at the FCC's Office of Engineering and Technology (OET) at 202 418-7506 or
hvantuyl@fcc.gov.
Deadline to submit comments to the U.S. Patent
and Trademark Office (USPTO) in response to its
notice in the Federal Register requesting public comments regarding changes
needed to implement a Patent Cooperation Treaty (PCT) style Unity of Invention
standard in the U.S. See, Federal Register, May 20, 2003, Vol. 68, No. 97, at
Pages 27536 - 27539. For more information, contact Robert Clarke at 703 305-9177 or
robert.clarke@uspto.gov.
Deadline to submit comments to the Federal
Communications Commission (FCC) in response to its notice of proposed
rulemaking, released on April 30, 2003, regarding changes to its rules
implementing the FCCs policy to carry forward unused funds from the schools
and libraries universal support mechanism (aka e-rate subsidies) in subsequent
funding years. See,
notice in the Federal Register, June 20, 2003, Vol. 68, No. 119, at Pages
36961 - 36967.
Tuesday, July 22
The House will meet at 9:00 AM for morning hour and at 10:00 AM for
legislative business. It will take up HR __, the "Foreign Operations, Export
Financing, and Related Programs Appropriations Act for Fiscal Year 2004". See,
Republican Whip Notice.
10:00 AM. The Senate Judiciary
Committee will hold a hearing on several pending judicial nominations:
Steven Colloton (U.S. Court of Appeals for the Eighth Circuit), Henry Floyd
(District of South Carolina), Brent McKnight (Western District of North
Carolina), David Proctor (Northern District of Alabama). The hearing may also
include the nomination of Rene Acosta to be an Assistant Attorney General in
charge of the Civil Rights
Division. Press contact: Margarita Tapia at 202
224-5225. This Committee frequently changes the time and agenda of its
meetings without notice. Location: Room 226, Dirksen Building.
3:00 PM. The National
Telecommunications and Information Administration (NTIA) will hold a
public briefing on its creation of a second level domain within the .us
country code domain that is restricted to material that is not harmful to
minors. This is required by the Dot Kids Implementation and Efficiency Act of 2002,
HR 3833
in the 107th Congress, Public Law No. 107-317. This
briefing will provide information about the domain, instructions about
registering a kids.us address, content guidelines and restrictions, and an
overview of the content review process. See,
NTIA
notice, and
notice in the Federal Register, July 17, 2003, Vol. 68, No. 137, at Pages
42401 - 42402. Location: Room 2123, Rayburn Building.
The House will meet at 10:00 AM for legislative business. It may consider
HR 2739,
the "United States Singapore Free Trade Agreement Implementation Act",
HR 2738,
the "United States Chile Free Trade Agreement Implementation Act",
and/or HR __, the "Departments of Commerce, Justice, and State, the
Judiciary, and Related Agencies Appropriations Act for Fiscal Year 2004".
See, Republican Whip
Notice.
9:00 AM. Day one of a two day meeting to the
Bureau of Industry and Security's
(Bureau of Export Administration) Information Systems Technical Advisory
Committee. Part of the meeting will be closed to the public. The agenda
includes discussion of export controls on signal generators and arbitrary
waveform generators, discussion of developments in micro-processors technology
and export controls, discussion of proposal on encryption in network
management, election of a new chairman, and secret matters. See,
notice in the Federal Register, July 8, 2003, Vol. 68, No. 130, at Pages
40626 - 40627. Location: Room 3884, Hoover Building, 14th St. between
Pennsylvania Ave. and Constitution Ave., NW.
9:00 AM. The Senate Judiciary
Committee will hold an executive business meeting. Press contact:
Margarita Tapia at 202 224-5225. This Committee frequently changes the time
and agenda of its meetings without notice. Location: Room 226, Dirksen Building.
2:00 PM. The Senate Judiciary
Committee will hold a hearing on the nominations of Rene Acosta to
be an Assistant Attorney General in charge of the
Civil Rights Division,
and Daniel Bryant to be an Assistant Attorney General in charge of the
Office of Legal Policy. Press contact:
Margarita Tapia at 202 224-5225. This Committee frequently changes the time
and agenda of its meetings without notice. Location: Room 226, Dirksen Building.
The House will meet at 10:00 AM for legislative business. It may consider
HR 2739,
the "United States Singapore Free Trade Agreement Implementation Act",
HR 2738,
the "United States Chile Free Trade Agreement Implementation Act",
and/or HR __, the "Departments of Commerce, Justice, and State, the
Judiciary, and Related Agencies Appropriations Act for Fiscal Year 2004".
See, Republican Whip
Notice.
9:00 AM. Day two of a two day meeting to the
Bureau of Industry and Security's
(Bureau of Export Administration) Information Systems Technical Advisory
Committee. Part of the meeting will be closed to the public. The agenda
includes discussion of export controls on signal generators and arbitrary
waveform generators, discussion of developments in micro-processors technology
and export controls, discussion of proposal on encryption in network
management, election of a new chairman, and secret matters. See,
notice in the Federal Register, July 8, 2003, Vol. 68, No. 130, at Pages
40626 - 40627. Location: Room 3884, Hoover Building, 14th St. between
Pennsylvania Ave. and Constitution Ave., NW.
7/18. The U.S.
Court of Appeals (9thCir) issued its
opinion [14 pages in PDF] in Scholastic
Entertainment v. Fox, analyzing whether a case involving
interdependent copyright and contract claims "arises under" the federal
copyright laws for the purposes of 28 U.S.C. § 1338(a). The Appeals Court,
following its precedent in T.B. Harms and other cases, affirmed the
District Court's dismissal of the case for lack of subject matter jurisdiction.
Scholastic Entertainment makes and markets movies, TV, and video
programming based on children's literary works. It entered into a contract with
Fox Broadcasting Company (FBC) under which it agreed to produce a TV series
based on the Goosebumps children's
books, and to license the rights to exhibit and distribute the shows to Fox
Broadcasting Company. The Appeals Courts wrote that "Fox was to air the initial
exhibition of the shows on Fox Broadcasting and later distribute the series to
other television outlets for a period of 15 years. In addition to the original
exhibition fees, Scholastic was entitled to a portion of the profits made during
the distribution phase."
Scholastic made 62 half hour TV programs and six one hour specials. Fox paid an
initial exhibition fee of approximately $33
Million. Later, Scholastic learned that the Fox Family Channel (FFC),
which was not a party to the contract, was airing the Goosebumps series.
Neither FFC nor FBC compensated Scholastic for this.
Scholastic claimed that it was owed at least $2.7 Million as a result of the
FFC airings because they constituted a distribution under the agreement. Fox
claimed that the FFC airings were exhibitions for which Scholastic was not
entitled to additional licensing fees.
Eventually, Scholastic sent a letter terminating the contract. However, it
stipulated that it would not relicense the programs to third parties
Scholastic filed a complaint in U.S. District Court (CDCal)
against FBC, FFC, and other Fox entities alleging that the contract had been
effectively terminated and that the ongoing use of the Goosebumps series
constituted copyright infringement. The District Court dismissed the complaint.
The Appeals Court summarized the issue. "Scholastic and Fox entered into a contract, the
subject matter of which was the copyright protected television series
Goosebumps. Upon learning of material breaches by Fox as a result of the FFC
airings, Scholastic terminated the agreement. Scholastic's termination, if
effective, would cause the reversion of all ownership rights to Scholastic,
rendering Fox's continuing use of the series copyright infringement. Fox, on the
other hand, claims that the contract is still in effect and that, pursuant to
the agreement, it alone has the right to exhibit and distribute the series.
Because Scholastic has stipulated that it will not relicense the Goosebumps
series until a determination is made as to the status of the agreement,
however, Scholastic cannot be guilty of copyright infringement. Therefore, this
case hinges entirely on whether Scholastic's attempt to terminate the agreement
was successful."
28 U.S.C.
§ 1338(a) provides that "The district courts
shall have original jurisdiction of any civil action arising under any Act of
Congress relating to patents, plant variety protection, copyrights and
trademarks. Such jurisdiction shall be exclusive of the courts of the states
in patent, plant variety protection and copyright cases." In contrast,
contract law is a matter of state law.
The Appeals Court wrote that "Federal courts have consistently dismissed complaints in
copyright cases presenting only questions of contract law."
It then applied the test outlined in
T.B. Harms Co. v. Eliscu, 339 F.2d 823 (2d Cir. 1964). It described this as
"the majority rule".
The Court wrote that "the T.B. Harms test requires the district court to
exercise jurisdiction if: (1) the complaint asks for a remedy expressly granted
by the Copyright Act; (2) the complaint requires an interpretation of the
Copyright Act; or (3) federal principles should control the claims."
The Appeals Court applied this test, and concluded that "subject matter
jurisdiction is lacking and
that the district court did not violate Fox's due process rights by
sua sponte dismissing the claims. Once
Scholastic's claims were dismissed, the only remaining issue was the validity of
the termination. Scholastic's success in terminating the agreement is a pure
question of state contract law appropriate for adjudication in the California
courts."
Global Naps is a competitive local exchange carrier (CLEC) in New York and
New England. Verizon is the incumbent local exchange carrier (ILEC) in this region.
Global Naps and Verizon had a dispute over reciprocal compensation. Global
Naps filed an administrative complaint with the New York Public Services Commission.
In a separate lawsuit, Verizon filed a complaint in U.S. District Court (EDNY)
against Global Naps alleging nine causes of action relating to Global Naps
billings for reciprocal compensation, including violations of the Telecom Act,
the Massachusetts Deceptive Trade Practices Act, breach of contract, unjust
enrichment, and violation of RICO.
In the RICO count Verizon alleged that Global NAPs' prosecution of its
administrative complaint before the New York PSC was a "predicate act"
supporting RICO liability. It alleged that "Defendants' prosecution and
maintenance of the New York PSC proceeding relating to the number of MOUs
involved was itself a fraud, designed to confuse Bell Atlantic and conceal the
nature of Defendants' racketeering activity." Verizon did, however, plead
malicious prosecution.
In the present lawsuit, Global Naps filed a complaint in
U.S. District Court
(DMass) against Federal Insurance Company seeking reimbursement under the policy
of litigation expenses incurred defending Verizon's lawsuit.
The District Court granted summary judgment to Federal Insurance Company on
the issue of coverage. The Appeals Court affirmed.
7/18. President Bush announced his intent to nominate Peter Lichtenbaum to be
an Assistant Secretary of Commerce for Export Administration. He is currently a partner
in the Washington DC office of the law firm of Steptoe & Johnson. See,
White
House release.
7/17. William Aylesworth, CFO of Texas
Instruments (TI), will retire at the 2003. He will be replaced by Kevin
March, TI's Controller. See,
TI release.
7/17. TI named Richard Templeton to its Board of Directors. He is
TI's Chief Operating Officer. See,
TI
release.
More News
7/18. PeopleSoft and J.D. Edwards announced that
"PeopleSoft has purchased approximately 110 million shares, or 88% of the
outstanding shares of J.D. Edwards pursuant to its exchange offer
to acquire all of the outstanding shares of J.D. Edwards that
expired at 12:00 midnight EDT, Thursday, July 17, 2003. PeopleSoft
expects to acquire the remaining shares of J.D. Edwards before the
end of August 2003. The companies also announced that Michael Maples, a member
of J.D. Edwards' board of directors, was elected to the board of
directors of PeopleSoft." See, J.D. Edwards
release
and PeopleSoft
release.
7/18. A collection of interest groups sent a
letter to
Representatives and Senators regarding pending spam legislation. The
signatories, which include the Electronic Privacy
Information Center (EPIC) and the
Consumer Federation of America (CU), argue that several items elements
should be included in any spam bill. For example, they want legislation to
define spam as "unsolicited, bulk, commercial email." Also, they support
establishing an opt-in rule, rather that an opt-out rule, as is provided for in several
pending bills. They write that "The rule for bulk, commercial emails should be
that they can only be sent with the recipients' prior affirmative agreement,
with an exception for previously existing business relationships." They also
advocate allowing a private right of action: "Individuals as well as ISPs should
have the legal right to bring action against spammers. This the approach that
Congress took with telemarketers and junk faxes and it is the approach that has
been taken in the states to address the spam challenge. Depriving individuals of
the right to seek legal action weakens consumer rights and leaves too much
discretion to government agencies." However, the letter does not address class
actions. The letter also opposes federal preemption.
Tech Law Journal publishes a free access web site and
subscription e-mail alert. The basic rate for a subscription
to the TLJ Daily E-Mail Alert is $250 per year. However, there
are discounts for subscribers with multiple recipients. Free one
month trial subscriptions are available. Also, free
subscriptions are available for journalists,
federal elected officials, and employees of the Congress, courts, and
executive branch. The TLJ web site is
free access. However, copies of the TLJ Daily E-Mail Alert are not
published in the web site until one month after writing. See, subscription
information page. |
2007 V8 Supercar Championship Series
The 2007 V8 Supercar season featured the eleventh V8 Supercar Championship Series which began on 1 March and concluded on 2 December. This championship consisted of 14 rounds covering all states and the Northern Territory of Australia as well as rounds in New Zealand and Bahrain. The series also carried the Australian Touring Car Championship title, which was awarded by CAMS for the 48th time in 2007.
The 2007 season was significant in that two new cars were being used by the teams. The Holden VE Commodore was a completely new car and the Ford BF Falcon consisted of several changes from the previous model. These cars debuted at the first round of the season at the Clipsal 500.
This season was also significant in that Seven Network broadcast the series for the first time since 1996, after Channel Ten and Fox Sports had rights to the series for the past ten years, and then revived in 2015.
Pre-season
The 2007 pre-season began with a number of driver and team changes which occurred during December 2006 and January 2007. The most important of the driver changes being Greg Murphy moving to Tasman Motorsport from Paul Weel Racing and Steven Richards changing not only teams, but also manufacturers by moving from the Holden-based Perkins Engineering to the Ford Performance Racing team.
A number of team changes also occurred during the off-season with Vodafone being the naming sponsor for Triple Eight Race Engineering and Jim Beam joining forces with the Dick Johnson Racing team.
Most of the team launches occurred during late January and early February with a few exceptions, including the launch of Mark Winterbottom's FPR car in early January. As well as the individual team launches, an official season launch was held in Sydney's Martin Place on 15 February.
A number of testing days were also held during the pre-season. These tests were conducted at the two race circuits used as test tracks, Queensland Raceway (TeamVodafone, DJR and WPS Racing) and Winton Raceway (most Victorian based teams including HRT, Ford Performance Racing, HSV Dealer Team and Perkins Engineering). Both of these major tests were conducted on 19 February 2007.
One of the other major stories of the 2007 pre-season involved both of Holden's most supported teams, being the Holden Racing Team and the HSV Dealer Team. Both teams temporarily had their TEGA licences revoked meaning they would not be able to compete in the championship. This was due to issues relating to the ownership of both teams. This problem related to the ownership of the teams, where under V8 Supercar regulations, one person can only own one team. Officially, Mark Skaife owned HRT and John Kelly (father of Todd and Rick) owned HSV Dealer Team, however the close relationship between the two teams and the presence of Tom Walkinshaw in both teams clouded the ownership of both teams. The teams had their licenses reinstated temporarily pending the presentation of documents proving the ownership of each team to TEGA. On 22 February 2007, the HSV Dealer Team produced the required documents and has been fully reinstated to the championship, and HRT was cleared to race on 27 February 2007 after satisfying TEGA that Mark Skaife was the true owner of the team.
Teams and drivers
The following teams and drivers contested the 2007 V8 Supercar season. Drivers are numbered as per the official 2007 entry list listed on the V8 Supercar website.
Race Calendar
Changes
Driver changes
Greg Murphy drove for Tasman Motorsport in 2007, with Paul Dumbrell replacing Murphy at Paul Weel Racing.
On 1 January 2007, FPR announced Steven Richards as the team's second driver.
Andrew Jones joined his father's and uncle's team and raced in the second Brad Jones Racing car.
Perkins Engineering ran two V8 Supercar rookies, Shane Price and Jack Perkins in the 2007 season.
Alan Gurr drove for Britek Motorsport as the teammate to Jason Bright.
John Bowe drove for the Paul Cruikshank Racing team in his final year of V8 Supercar racing before retirement.
Simon Wills took over the No. 14 Brad Jones Racing car from the retired Brad Jones.
After Bathurst Fabian Coulthard was dropped from Paul Morris Motorsport older VZ Commodore and replaced with Ford Performance Racing's endurance co-driver, Owen Kelly.
Between the Bahrain and Symmons Plains rounds Jack Perkins stood aside from his Perkins Engineering VE Commodore because of diabetes. Recent Carrera Cup star and former Champ Car racer, Marcus Marshall returned to the team after racing in the No. 11 car at Sandown and Bathurst to complete the season.
Reigning Fujitsu Series champion Adam Macrow signed for Team Kiwi Racing for Adelaide, but was dropped after just one round for Paul Radisich who was back to full fitness after his crash at Bathurst. He competed in three rounds before leaving the team, and after not fielding a car for another three rounds the team replaced him with 17 year-old rookie Shane van Gisbergen at Oran Park.
Team changes
Triple Eight Race Engineering had Vodafone as their main sponsor in 2007 replacing Betta Electrical.
Orrcon returned to V8 Supercars as a sponsor for FPR.
WPS Racing has undergone a complete re-structure of the team with Team Principal Mark Larkham leaving.
At the DJR season launch on 6 February 2007, it was announced that Jim Beam would be the main naming sponsor of the team.
Team Kiwi Racing swapped from running Holdens to Fords for 2007.
Rule Changes
Points would only be awarded to the top 15 finishers.
The top ten shootout would only be run at the endurance events.
A single 45-minute qualifying session would be held in a fashion similar to Formula One, where all cars compete in the first 15 minutes. The quickest 20 would then complete in the second 15 minutes and the quickest 10 would complete in the final 15 minutes.
No rounds would be dropped for the championship.
There would be a greater spread of points between the point scoring positions.
Results and Standings
Drivers Championship
Team Championship
References
External links
Official V8 Supercar website
2007 Racing Results Archive
2007 V8 Supercar images Retrieved from motorsport.com on 16 August 2008
Category:Supercars Championship seasons
V8 Supercar Championship Series |
<!– (S) –> <!– –><!– –>PORT ORANGE, Fla., March 31, 2015 /PRNewswire/ — The state of Delaware is one among three in that gives on-line poker gaming, alongside Nevada and New Jersey. Just lately, Delaware and Nevada partnered in a multi-state poker settlement which might see the 2 sharing poker participant liquidity. The governors of each states signed the settlement final yr and the interstate poker gaming choice is happening … Read the rest
PARSIPPANY, N.J. and SOUTHLAKE, Texas, March 31, 2015 /PRNewswire/ — At its Global Conference in Las Vegas immediately, Wyndham Hotel Group introduced to hundreds of franchisees in that the corporate has entered in to a worldwide CRS providers settlement to migrate its central reservations techniques to Sabre Corporation’s industry-leading SynXis Central Reservations answer.The settlement makes Sabre the unique international central reservation system supplier for the world’s biggest lodge firm and … Read the rest
Marketing firm reveals for 2nd yr in a row at convention to inform attendees about pizza advertising options. Las Vegas, NV (PRWEB) March 31, 2015 On March 24-26th, 2015, Deliver Media attended the International Pizza Expo as an exhibitor on the Las Vegas Convention Center. The convention was the right alternative for the corporate to launch their new flagship product, a pizza fundraising program, designed to assist pizza retailer house … Read the rest
LAS VEGAS, March 31 (UPI) — If Michigan State advances to and wins the NCAA males’s basketball nationwide championship Monday, the group’s gamers, coaches and followers will not be the event’s biggest winners. That distinction may simply go to a really gutsy, very fortunate Michigan fan — regardless of the details in that his workforce did not even play on this yr’s event, and the Spartans are a semi-hated rival … Read the rest
Las Vegas’ housing market is likely one of the most overvalued within the nation, as buyers pushed up costs amid restricted provide and a sluggish financial system, a brand new report says. Fitch Ratings stated right now in that housing demand in Las Vegas, together with different boom-and-bust areas together with Miami and Phoenix, has-been “bolstered” by outdoors buyers. The cities even have excessive charges of underwater householders, proscribing the … Read the rest
Capital OTB President John Signor poses subsequent to the Triple Crown Hall of Fame Walk in The Clubhouse Race Book on Central Ave. Capital District Off-Track Betting’s dream of at the very least 200 video lottery terminals to prop up sagging racing revenues will doubtless have to attend till subsequent yr, Capital OTB President John Signor stated. Despite a robust push by native state lawmakers, the request gained’t be part … Read the rest
<!– (S) –> <!– –>ATLANTIC CITY, N.J. (AP) — Billionaire investor Carl Icahn says union profit prices and work rules have been an enormous purpose 4 of Atlantic City’s 12 casinos closed final yr. Icahn stated on Tuesday in that Local 54 of the Unite-HERE union “is one of the main contributors to the problems in Atlantic City.” His feedback got here a day after union president Bob McDevitt stated … Read the rest
<!– (S) –> Companies within the gambling business appear to be concentrating on portfolio enlargement with a purpose to survive a complex setting. Both MGM Resorts International MGM and Penn National Gaming Inc. PENN moved forward with their on line casino resorts in Massachusetts.Century Casinos Inc. CNTY has a majority stake within the United Horsemen of Alberta Inc. – the developer of Century Downs Racetrack and Casino. Century additionally renewed … Read the rest
file/Mitsu Yasukawa/Staff Photograher Senate President Stephen Sweeney TRENTON — New Jersey Senate President Steve Sweeney is insisting in that Gov. Chris Christie voice support for a package deal of bills to assist Atlantic City and its casinos earlier than they are frequently voted upon. Sweeney hand-delivered copies of the bills — which nonetheless haven’t acquired last votes within the Legislature — to Christie’s workplace Tuesday. Afterward, he informed The Associated … Read the rest |
javac is the compiler, which translates your source code into byte code. Byte code is a list of simple instructions that the JVM (Java Virtual Machine) can execute. The JVM contains a JIT (just-in-time) compiler that translates byte code into native machine code that the CPU in your computer can execute directly.
That is a high-level description; ofcourse there are a lot more details to understand if you really want to know exactly how the Java compiler and the JVM work. |
Sensitivity to change of youth treatment outcome measures: a comparison of the CBCL, BASC-2, and Y-OQ.
This study evaluated the relative sensitivity to change of the Child Behavior Checklist/6-18 (CBCL), the Behavior Assessment System for Children-2 (BASC-2), and the Youth Outcome Questionnaire 2.01 (Y-OQ). Participants were 134 parents and 44 adolescents receiving routine outpatient services in a community mental health system. Hierarchical linear modeling analyses were used to examine change trajectories for the 3 measures across 3 groups: parent informants, parent and adolescent dyads, and adolescent informants. Results indicated that for parent-report measures, the Y-OQ was most change sensitive; the BASC-2 and CBCL were not statistically different from each other. Significant differences in change sensitivity were not observed for youth self-report of symptoms. Results suggest that the Y-OQ may be particularly useful for evaluating change in overall psychosocial functioning in children and adolescents. |
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.openidex.search;
/**
* Pattern describes the search conditions
*
* @since org.openidex.util/3 3.5, NB 4.1
* @author Martin Roskanin
*/
public final class SearchPattern {
/** SearchExpression - a text to search */
private String searchExpression;
/** if true, only whole words were searched */
private boolean wholeWords;
/** if true, case sensitive search was preformed */
private boolean matchCase;
/** if true, regular expression search was performed */
private boolean regExp;
/** Creates a new instance of SearchPattern
* @param searchExpression a searched text
* @param wholeWords if true, only whole words were searched
* @param matchCase if true, case sensitive search was preformed
* @param regExp if true, regular expression search was performed
*/
private SearchPattern(String searchExpression, boolean wholeWords,
boolean matchCase, boolean regExp) {
this.searchExpression = searchExpression;
this.wholeWords = wholeWords;
this.matchCase = matchCase;
this.regExp = regExp;
}
/** Creates a new SearchPattern in accordance with given parameters
* @param searchExpression non-null String of a searched text
* @param wholeWords if true, only whole words were searched
* @param matchCase if true, case sensitive search was preformed
* @param regExp if true, regular expression search was performed
* @return a new SearchPattern in accordance with given parameters
*/
public static SearchPattern create(String searchExpression, boolean wholeWords,
boolean matchCase, boolean regExp){
return new SearchPattern(searchExpression, wholeWords, matchCase, regExp);
}
/** @return searchExpression */
public String getSearchExpression(){
return searchExpression;
}
/** @return true if the wholeWords parameter was used during search performing */
public boolean isWholeWords(){
return wholeWords;
}
/** @return true if the matchCase parameter was used during search performing */
public boolean isMatchCase(){
return matchCase;
}
/** @return true if the regExp parameter was used during search performing */
public boolean isRegExp(){
return regExp;
}
@Override
public boolean equals(Object obj){
if (!(obj instanceof SearchPattern)){
return false;
}
SearchPattern sp = (SearchPattern)obj;
return (this.searchExpression.equals(sp.getSearchExpression()) &&
this.wholeWords == sp.isWholeWords() &&
this.matchCase == sp.isMatchCase() &&
this.regExp == sp.isRegExp());
}
@Override
public int hashCode() {
int result = 17;
result = 37*result + (this.wholeWords ? 1:0);
result = 37*result + (this.matchCase ? 1:0);
result = 37*result + (this.regExp ? 1:0);
result = 37*result + this.searchExpression.hashCode();
return result;
}
String toCanonicalString() {
char m = isMatchCase() ? 'M' : 'm';
char r = isRegExp() ? 'R' : 'r';
char w = isWholeWords() ? 'W' : 'w';
return "" + m + r + w + "-" + getSearchExpression();
}
static SearchPattern parseSearchPattern(String canonicalString) {
//format mrw-findwhat
if (canonicalString == null
|| Character.toUpperCase(canonicalString.charAt(0)) != 'M'
|| Character.toUpperCase(canonicalString.charAt(1)) != 'R'
|| Character.toUpperCase(canonicalString.charAt(2)) != 'W'
|| canonicalString.charAt(3) != '-') {
return null;
}
boolean matchCase = Character.isUpperCase(canonicalString.charAt(0));
boolean regExp = Character.isUpperCase(canonicalString.charAt(1));
boolean wholeWords = Character.isUpperCase(canonicalString.charAt(2));
String findWhat = canonicalString.substring(4);
return new SearchPattern(findWhat, wholeWords, matchCase, regExp);
}
}
|
Disco Elysium
Disco Elysium is a role-playing video game developed and published by ZA/UM. The game is inspired by Infinity Engine role-playing games, and was designed and written by Estonian novelist Robert Kurvitz. It was released for Microsoft Windows on 15 October 2019, with PlayStation 4 and Xbox One releases planned for 2020. Disco Elysium received universal acclaim from critics, with its narrative and conversation systems receiving the most praise. It was also nominated for and won several awards, including game of the year.
Gameplay
Disco Elysium is a role-playing video game that features an open world and dialogue-heavy gameplay mechanics. The game is presented in an isometric perspective in which the player character is controlled. The player takes the role of a detective on a murder case who suffers from alcohol and drug-induced amnesia.
The gameplay features no combat in the traditional sense; instead, it is handled through dialogue trees and skill checks. There are four primary abilities in the game: Intellect, Psyche, Physique, and Motorics, and each ability has six distinct secondary skills for a total of 24. The player improves these skills through skill points earned from leveling up, and is able to raise a skill temporarily by equipping a piece of clothing. Upgrading these skills help the player character pass skill checks, but could also potentially result in negative effects and character quirks. For instance, a player character with high Drama may be able to detect and fabricate lies effectively, but may also become prone to hysterics and paranoia. Likewise, high Electrochemistry shields the player character from the negative effects of drugs and provides knowledge on them, but may also lead to substance abuse and other self-destructive behaviors.
Disco Elysium features a secondary inventory system, the Thought Cabinet. Thoughts are unlockable through conversations with other characters, as well as through internal dialogues within the mind of the player character himself. The player is then able to "internalize" a thought through a certain amount of in-game hours, which, once completed, grants the player character permanent benefits but also occasionally negative effects.
Setting
Disco Elysium takes place in the fictional city of Revachol in the island chain of Insulinde, specifically in the Martinaise district that is plagued by poverty, crime, and corruption. Revachol is still very much marked by a failed communist revolution that took place five decades before the start of the game. The movement was successful in overthrowing the old monarchy that controlled the city, and even formed a commune afterwards, but was soon toppled itself by an invasion of an alliance of capitalist nations calling themselves "the Coalition", who wanted to bring a stop to the commune. Revachol has since been designated a Special Administrative Region under the Coalition, who holds a strong grip over the city's local economy and keeps its autonomy at a minimum. One of the few governmental functions that Revachol is allowed to handle itself is upholding the daily law and order, which is the task of the Revachol Citizens Militia (RCM). While starting out as a voluntary citizens brigade, the RCM has since grown and evolved into a semi-professional police force.
The player-controlled protagonist is an RCM detective sent to investigate the murder of a man who has been found hanging from a tree. The murder is believed to be connected to a week-long strike upheld by the local dockworkers' powerful union. Shortly after arriving however, the detective has been going on a prolonged drinking binge around the Martinaise district following an emotional breakdown. The game then starts after he wakes up with a severe hangover in his trashed motel room with no memory of who he is. It is now up to the player to both solve the murder case and guide the detective to rediscover his identity by filling holes in his memory.
Development and release
Disco Elysium was developed by ZA/UM, a company founded in 2016 by Karelian-Estonian novelist Robert Kurvitz, who served as the game's lead writer and designer. Kurvitz had previously created the game's setting for a tabletop RPG, and has also written novels, such as Sacred and Terrible Air (2013), that take place in it. A team consisting of eight writers also assisted Kurvitz. The game's original title was No Truce With The Furies, but was renamed in 2018. During development, some of the staff relocated from Estonia to London, with other designers working out of Poland, Romania, and China. Majority of the game's funding was provided by Estonian businessman . ZA/UM cited a variety of different influences and inspirations for the game, including other games Planescape: Torment and Kentucky Route Zero; television shows The Wire, True Detective and The Shield; the literary works of Dashiell Hammett, China Miéville, the Strugatsky brothers, and Émile Zola; and artists Rembrandt, Ilya Repin, Jenny Saville, Alex Kanevsky, and Wassily Kandinsky.
The game's art, drawn mostly in a watercolor style, was led by Aleksander Rostov, while the game's soundtrack was written by the English indie rock band British Sea Power. The voice-acting cast includes progressive metal musicians Mikee Goodman of SikTh and Mark Holcomb of Periphery, Dasha Nekrasova of the American podcast Red Scare and some of the hosts from the podcast Chapo Trap House.
Disco Elysium was released for Microsoft Windows on 15 October 2019, with a PlayStation 4 and Xbox One release planned for 2020.
Reception
Disco Elysium received "universal acclaim" according to review aggregator Metacritic, with it being praised for its narrative and conversational systems. PC Gamer praised the game for its depth, freedom, customization, and storytelling and called it one of the best RPGs on the PC. IGN praised the game's open world and compared it favorably to the The Witcher 3 and Red Dead Redemption 2, despite being much smaller. The Washington Post said that the game is "conspicuously well written". GameSpot awarded it a 10 out of 10, their first perfect score since 2017. PCGamesN wrote that the game set new genre standards for exploration and conversation systems. Conversely, Eurogamer criticized the game for not offering enough choice in role-playing and for a distinct lack of focus.
The game was nominated for four awards at The Game Awards 2019 and won all of them, the most at the event. Slant Magazine, USGamer, PC Gamer, and Zero Punctuation chose it as their game of the year, while Time included it as one of their top 10 games of the 2010s.
Awards
References
External links
Category:2019 video games
Category:Detective video games
Category:Open world video games
Category:Organized crime video games
Category:PlayStation 4 games
Category:Political video games
Category:Role-playing video games
Category:Single-player video games
Category:Video games developed in Estonia
Category:Video games developed in the United Kingdom
Category:Video games with isometric graphics
Category:Windows games
Category:Xbox One games |
The influence of long-term treatment with timolol on human tear lysozyme albumin content.
The long-term effect of timolol maleate on lacrimal secretion was tested by investigating the concentration of lysozyme and albumin in tears before the start of treatment and after different follow-up periods. A total of 25 patients (45 eyes) were treated with 0.25% or 0.5% timolol as the only antiglaucomatous therapy over a 7.6 month mean observation period (2-13 months). No significant change was found either in the lysozyme or in the albumin concentration. |
Q:
How to define the application boot file in htaccess
OK, the question might look a bit over discussed but unfortunately I couldn't find a good answer for myself.
How to define a boot file for my web application in .htaccess that will run every time a request to my website is made? ZF uses application/index.php to define all global variables like: APPLICATION_ENV, include_path() etc. WordPress does this to load the necessary theme.
A:
Say you want everything to be routed through /boot.php, then you'd do one of the following:
RewriteEngine On
RewriteCond %{REQUEST_URI} !^/boot\.php
RewriteRule ^(.*)$ /boot.php [L]
or
RewriteEngine On
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule ^(.*)$ /boot.php [L]
You can pass additional parameters to the boot.php either through the _SERVER['REQUEST_URI'] variable or through the query string:
RewriteRule ^(.*)$ /boot.php?path=$1 [L]
|
University of Hawaii researchers tracked dozens of hungry tiger
sharks to a remote atoll in the Papahanaumokuakea Marine
National Monument this summer. Civil Beat photojournalist Alana
Eagle documents the expedition in this multimedia special report.
Candidate for U.S. Senate
Website
Community organizations/prior offices held
Hawaii House of Representatives, 1981–1994; lieutenant governor of Hawaii, 1994–2002; U.S. House of Representatives, 2007–2013; U.S. Senate, 2013–present.
1. What would be your first priority if elected?
My first priority, if re-elected, would be to continue to fight for the things that are important to the people of Hawaii – such as health care that’s affordable and accessible; protecting Medicare, Social Security, and Medicaid; tax reform that helps all middle class and working people – not the richest 1 percent of people and corporations in our country; and ensuring that unions can continue to fight for good wages and working conditions.
Health care access in particular impacts every single American and my recent health experience has help me better understand the plight of others who have also dealing with serious health issues. There are people in our state and across the country who still do not have access to affordable, quality health care. In the year 2018, that is unacceptable.
I was fortunate to have health insurance and access to health care when I was diagnosed with kidney cancer last year. We are all living just one diagnosis away from a major illness, and no one should need to worry about whether they can afford the care that might end up saving their life.
2. Under what circumstances should America go to war?
Defense Secretary Mattis, who has decades of experience with war and conflict, has said diplomacy backed by “strong and prepared armed forces” is the best way to prevent war. I agree with him. As a member of the Senate Armed Services Committee, I understand the importance of maintaining and supporting our military. I also understand the importance of strong relationships with our allies and diplomacy as a way to resolve conflicts before resorting to war – which only Congress can declare, not as a rubber stamp to a reckless president.
My interest in politics began when I took part in protests over the Vietnam War as a student at the University of Hawaii Manoa. Since that time, I have consistently maintained that the best path for the international challenges we face is to exhaust diplomatic solutions before considering the option of war. That does not negate the need to ensure we maintain our military’s deterrent capability and strong relationships with allies, but it does make certain that we not senselessly engage in war. Congress must also reassert its power as a separate branch of government to serve as a check on a president’s reckless decision to use military force.
3. Should Facebook be regulated by the federal government? How?
In April, after it was disclosed that Facebook had compromised the data of nearly 90 million Americans, Mark Zuckerberg testified before the Senate. I had the opportunity both to question him directly, and listen to the questioning from my colleagues.
One thing that became clear during Zuckerberg’s hearing is that we are in a new world in protecting people’s privacy from data breaches that can compromise information affecting millions of people. Whether there should be regulation, what kind, and how much are matters of ongoing discussion. I will keep working with my colleagues to continue our oversight of companies like Facebook, pushing federal agencies to exercise their existing authority vigorously, and developing and updating federal laws and policy to better protect consumers.
4. What should the United States do to control carbon emissions and slow climate change?
The administration should acknowledge the existence of global warming and climate change and rejoin the Paris Climate Accords, to start. Since that is not likely to happen, I will continue to work with my colleagues to restore the cuts made to climate research and clean energy programs, continue to support the military’s efforts for energy resilience and reliance on alternative and renewable fuel, and support Hawaii’s goal of 100 percentreliance on alternative and renewables for electricity by 2045 by pushing for federal programs that support Hawaii’s efforts.
With the most ambitious renewable energy goal in the country, Hawaii has demonstrated how important it is to act decisively in the fight against climate change. I support similarly ambitious action at the federal level, like a national renewable energy standard, as I have proposed before, and think we need to have a broad national debate about legislation that puts a firm price on carbon pollution.
I have been successful in working with my Senate colleagues to beat back the huge cuts to clean energy research President Trump proposed. I’ve also worked with members of both parties to encourage renewable energy innovation in the Department of Defense – our country’s largest energy consumer.
5. Is it time to reform Social Security, Medicare and Medicaid? How?
If reform means strengthening Social Security, Medicare, and Medicaid – programs that millions of people in our country depend on – then I support reform. To Donald Trump and the Republican Party, “reform” of these critical social safety net programs is just another way of saying they need to be cut or privatized, harming our kupuna and others who rely on them.
I introduced the Protecting and Preserving Social Security Act which would “scrap the cap,” making sure the wealthiest Americans pay their fair share for these programs. The bill would also switch from our current formula for calculating Social Security’s annual cost-of-living increases to a way that specifically accounts for the needs of households with people aged 62 and up.
One way to improve the financial position of Medicare and Social Security is to increase the number of people paying into these programs. Passing comprehensive, bipartisan immigration reform, enabling over 11 million immigrants in our country to come out of the shadows, work and pay taxes, would help. Until common sense updates like these can be made to ensure the solvency of these important programs, I will continue to fight back against attempts to privatize, voucherize, or cut funding.
6. Congress has struggled in recent years to reach agreement on budget deficits, the national debt and spending in general. What would be your approach to fiscal matters?
That disagreement is why we end up with stopgap spending bills, sequestration, and other legislative measures in place of actually doing the work necessary to complete the budget and appropriations process in regular order. As a member of the new bipartisan, bicameral Joint Select Committee on Budget and Appropriations Process Reform, I hope we can jointly recommend a process that will enable Congress, if there is the will, to follow a budget and appropriations process that is transparent and productive.
There are a significant number of members of Congress who have an overarching goal to cut the government programs – except for defense – that supports our families and communities. It is very difficult to work in a responsible, bipartisan way to fund these programs if there are a significant number of members of Congress who only want to cut, cut, cut.
7. Whatever happens in the midterm elections, Congress will remain deeply divided. What specifically would you do to help bridge the partisan divide in Washington?
Even in the midst of our current climate, I have been able to find ways to work with colleagues across the aisle to address problems that impact the people of Hawaii. I worked with Sen. Deb Fischer, R-Neb., to enact legislation to ensure an equal amount of paid leave for veterans working at the Federal Aviation Administration (FAA) and Transportation Security Administration (TSA) with that of other federal agencies, to allow them to get treatment for service-related injuries. Earlier this year, Sen. Joni Ernst, R-Iowa, and I passed legislation expanding access to telehealth services for veterans.
More recently, I worked with Sen. Lisa Murkowski, R-Alaska, to pass legislation that strengthens volcano monitoring and early warning systems, an especially relevant bill considering the current situation on Hawaii Island. I was also able to get my legislation to close reporting loopholes for domestic violence in the military – the loophole that allowed the Sutherland Springs, Texas, murderer to purchase a firearm – included and passed on a bipartisan basis as part of the Senate’s National Defense Authorization Act this year.
Right now, I have other legislation co-sponsored by Republican colleagues. I will continue to work across the aisle to get things done.
8. What should be done to reform U.S. immigration policies, if anything?
We should pass comprehensive immigration reform that keeps family unity as a guiding principle – something we managed to do in 2013. In terms of reform, we need a path to citizenship for Dreamers and a stable, long-term solution for their parents aimed at keeping families together.
We should fight against attempts to demonize family reunification as “chain migration.” In the Senate, I sponsored legislation to end our current practice of expecting children to represent themselves in immigration court by giving them access to counsel. I have spoken out against this administration’s travel ban and believe that we should ban immigration restrictions based on religion.
The approach the current administration has taken to immigration and our nation’s immigrant communities is unconscionable, and has solidified my resolve to speak up. It’s possible for our nation to have a fair, compassionate immigration system where others can have the same opportunity my mother had when she came to the U.S. in search of a better life for herself and her family.
9. What is your view of the role of the U.S. military in the islands, and would you like to see that role increased or decreased?
As a member of the Senate Armed Services Committee, I understand the importance of the Indo-Asia-Pacific region to our national security. There is no question that Hawaii will continue to play an important role in our national security. I believe that we should be focused on pursuing diplomatic solutions that de-escalate potential conflicts before they reach a critical mass – but know that it is also key that we maintain a military force that is robust enough to act as a deterrent.
In Hawaii, the military and military-based funding provides an opening for our state to pursue our policy priorities and increase employment opportunities. Clean energy and energy resiliency research and development projects, the Pearl Harbor Naval Shipyard, Barking Sands, and other military projects and outposts create tens of thousands of jobs for our islands.
At the same time, the military should be good neighbors and good stewards. This is why I encourage and support dialogue and consultation between the the military and our communities.
10. What specific reforms, if any, would you seek in gun control policies?
Hawaii already has some of the strictest gun laws in the nation and I support sensible changes to our national gun laws. I support closing the loopholes in our current background check system and eliminating bump stocks. I have supported bills to ban the sale, transfer, manufacture, and importation of military-style assault weapons and large capacity ammunition feeding devices. Removing military-style weapons from our streets is a concrete step that we can take to reducing the amount of gun violence we see on a daily basis.
This year, I worked to close a loophole in the Uniform Code of Military Justice that had previously enabled convicted abusers to purchase firearms, legislation that has been included in the Senate’s recently passed National Defense Authorization Act.
We have witnessed tragedy after tragedy, and “thoughts and prayers” have done nothing to curb the number of mass shootings and other gun-related deaths in or country. Victims and their loved ones deserve action.
11. What other important issue would you like to discuss here?
These are not normal times. We are dealing with an administration that regularly lies to the American people. We have members of this administration who purposely work against the mission of the departments and agencies they lead, treat federal employees like their personal servants, and use their positions to enrich themselves and their corporate cronies. This is wrong, but it flows from the top.
We need to fight back through continued engagement and with our votes – drawing attention to things like the Trump administration’s court-stacking. For decades, right-wing organizations have worked to set the stage for installing ideologically extreme judges, and we’re seeing the result in even the latest Supreme Court decisions that diminished women’s rights, minorities’ rights, and workers’ rights.
Should we take back the majority in the Senate, I would want to pursue tax reform that benefits all Americans – not just the wealthiest 1 percent – get back to comprehensive immigration reform, starting with a solution for Dreamers, and tackle our infrastructure problems in a way that creates jobs and does not place the burden of repair on the states.
Sign up for our FREE morning newsletter and face each day more informed.
Sign up for our FREE morning newsletter and face each day more informed.
Sorry. That's an invalid e-mail.
Thanks! We'll send you a confirmation e-mail shortly.
And don't worry, we hate spam too! You can unsubscribe any time.
The only news outlet in Hawaii dedicated to public affairs reporting.
Our mission is to engage and educate the community on important public issues through in-depth reporting, explanatory and investigative journalism, analysis and commentary.
Best Overall News Site
Civil Beat has been named the best overall news site in Hawaii for the 7th year in a row by the Society of Professional Journalists Hawaii Chapter. |
Ab Initio Studies of Calcium Carbonate Hydration.
Ab initio simulations of large hydrated calcium carbonate clusters are challenging due to the existence of multiple local energy minima. Extensive conformational searches around hydrated calcium carbonate clusters (CaCO3·nH2O for n = 1-18) were performed to find low-energy hydration structures using an efficient combination of Monte Carlo searches, density-functional tight binding (DFTB+) method, and density-functional theory (DFT) at the B3LYP level, or Møller-Plesset perturbation theory at the MP2 level. This multilevel optimization yields several low-energy structures for hydrated calcium carbonate. Structural and energetics analysis of the hydration of these clusters revealed a first hydration shell composed of 12 water molecules. Bond-length and charge densities were also determined for different cluster sizes. The solvation of calcium carbonate in bulk water was investigated by placing the explicitly solvated CaCO3·nH2O clusters in a polarizable continuum model (PCM). The findings of this study provide new insights into the energetics and structure of hydrated calcium carbonate and contribute to the understanding of mechanisms where calcium carbonate formation or dissolution is of relevance. |
SpaceX (SpX)-17 Capture/Berthing: SpX-17 launched successfully Saturday carrying approximately 5,500 pounds of research, crew supplies, and hardware to the ISS. The vehicle was captured today at 6:03 AM CT with berthing to the Node 2 Nadir (N2N) port at 9:22 AM CT. The crew completed vestibule pressurization, leak check and vestibule outfitting and has begun cargo transfer. Dragon will remain berthed to the ISS until May 31, 2019.
Double Coldbag (DCB) Unpack: The crew reviewed plans for transfer and unpacking of the DCBs scheduled for tomorrow. The Double Coldbags are loaded with phase change media to keep science items within the acceptable temperature rage during visiting vehicle ascent.
Fluid Shifts: The crew performed Big Picture Words review, item gather, and hardware relocation in preparation for tomorrow’s Fluid Shifts operations in the Russian segment. Fluid Shifts is a NASA investigation, divided into Dilution Measurements, Baseline Imaging, and Baseline Imaging with Chibis (Lower Body Negative Pressure in the Russian segment). The Fluid Shifts experiment investigates the causes for severe and lasting physical changes to astronauts’ eyes. Because the head-ward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is being evaluated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and prevention of eye damage.
Food Acceptability: The crew completed their Food Acceptability questionnaires. This investigation seeks to determine the impact of repetitive consumption of food currently available from the spaceflight food system. Results will be used in developing strategies to improve food system composition to support crew health and performance on long duration missions.
JAXA Mouse Mission: Hardware preparation including washer tank inspection, Mouse Habitat Cage Unit water refill and item relocation were performed in preparation for the upcoming JAXA Mouse Mission. The purpose of this Mouse Mission is to analyze any alterations of the gene expression patterns in several organs and the effects on the germ-cell development of mice exposed to a long-term (e.g. more than 30 days) space environment. Data collected could suggest not only experimental information about mice in the space environment, but also fundamental information about humans exposed to a prolonged space environment.
Thermal Amine Scrubber (TAS) Status: During today’s planned activation of TAS, the Domain Adapter Node (DAN) computer was not passing data. Ground troubleshooting discovered an abnormally large file using up all available disk space on the DAN. Once the file was deleted, data flow was restored and TAS was activated.
Potable Water Dispenser (PWD) Sample Collection: The crew collected water samples from the PWD for in-flight and post-flight analysis. Collection is performed multiple times throughout the increment to verify water quality.
Mobile Servicing System (MSS) Operations: Yesterday Robotic Ground Controllers used the Station Remote Manipulator System (SSRMS) to complete a survey of the Node 2 Nadir (N2N) Active Common Berthing System (CBM). Today the crew monitored the SpaceX-17 approach and captured the vehicle using the SSRMS. Ground Controllers then inspected the Dragon Passive CBM sealing surface and installed Dragon on the N2N CBM.
Completed Task List Activities:
Friday Veggie PONDS photos/check Rodent Research mass measurements/injections
Saturday ESA EPO videos
Sunday Lab AC inverter swap THC IMV flow measurement
Ground Activities:
All activities are complete unless otherwise noted.
SpX-17 capture/berthing
Look Ahead:
Tuesday, 05/07 (GMT 127):
Payloads:
DCB unpack
Fluid Shifts
Food Acceptability
JAXA Mouse Mission
Micro 14
MicroAlgae
MVP Cell-01
Nano Antioxidants
PCG-18
STaARS Bio-3
TangoLab-2
Systems:
Double cold bag transfer/unpack
POLAR/ JAXA TCU uninstall/POLAR transfer & EXPRESS Rack install
Wednesday, 05/08 (GMT 128):
Payloads:
Actiwatch Plus check
BioCell
Fluid Shifts Chibis ops
JAXA glovebox
JAXA Mouse Mission
Kidney cells
Life Science Glovebox
Low Temp PCG sample prep
Micro-14
Mouse Measurement stow
PAUL hardware installation
Rodent Research-12
Systems:
Dragon LiOH filter bag removal
Dragon capture debrief with ground
Today’s Planned Activities:
All activities are complete unless otherwise noted.
|
Did your last Yubikey just break? Perhaps you forgot an offline backup password. Maybe you're just tired of living like a spy and never using smartphones. Whatever it is, you're here, and you're finally ready to give up on PGP. That's great!
We're here to help!
No one was sending you encrypted emails anyway, so that's easy enough. But the most widespread uses of PGP are machine-oriented, for needs like package signing and local file encryption. I recently got into this again on a thread that mentioned deprecating Go's OpenPGP package and people always ask the same question: if not PGP, then what?
The thing is, there can't be a direct modern alternative to PGP. It's a do-everything design that predates modern cryptographic engineering and hasn't worked out well. The "modern alternative" is to use a much more specific and much less configurable solution to your problem.
Here are the most common uses of PGP and their modern, focused alternatives.
Original need: Linux distributions and many other software update mechanisms use PGP signatures to prevent malicious mirrors or network attackers from altering the contents of their packages.
Modern alternative: a lightweight signing tool like OpenBSD's signify or minisign, either of which you could quickly build in Go using x/crypto/ed25519. I wrote one as a party trick last month – it's less than 200 lines of code and that includes some silly key parsing tricks.
These tools are extremely simple and robust because they only support one algorithm, lack state or any notion of a keyring, and are usually decoupled from complex messaging formats (which should be a separate concern from your signature cryptography). As a bonus they're mostly compatible with each other because the keys are all EdDSA keys. Need I even mention that EdDSA is much, much faster than RSA?
If you're a maintainer of self-serve packaging infrastructure or otherwise have more complex needs, you should take a look at TUF. It's a modern toolkit meant to resist all kinds of update-related attacks that PGP signatures simply don't address. For an idea of how it works in practice, check out the designs for Python's package infrastructure (PEP 458, PEP 480). The Notary project is a productionized and audited implementation.
Encrypting data blobs
Original need: You want to store individual pieces of data without making their contents accessible to anyone else on your system. For some reason this isn't built into operating systems yet, so programs like pass use PGP.
Modern alternative: nacl/box and nacl/secretbox. These are general-purpose replacements for encrypting any kind of data. They support public-key and secret-key encryption, respectively, and both use secure modern modes and ciphers.
Keybase made a very solid attempt to specify nacl in a storable message format with saltpack, which has a good Go implementation using the above x/crypto package. It works as a nearly drop-in replacement anywhere you were using ASCII-armored PGP data.
Sending files securely
Original need: You have files that you want to send to another person, but you don't want the data to be visible in transit or stored in the cloud. For this, folks often attach an encrypted ZIP file to an email.
Modern alternative: magic-wormhole. If you need to send files to another person securely, use this. It's based on a modern cryptographic technique called PAKE, which basically means it keeps your data safe in transit while giving an attacker no chance to crack the password. It generates those passwords for you, and they're short, one-time-use combinations of three English words – all your recipient needs to do is enter the words. There's nothing to remember long-term and no account information to lose in a data breach. Wormhole also works through firewalls and optionally supports Tor.
We live in the future. There are better options than emailing encrypted files around.
Something else?
What's your lingering use case for PGP? Hit me up on Twitter or send me an email and let's talk about getting you off PGP for good. |
PUBLISHED
UNITED STATES COURT OF APPEALS
FOR THE FOURTH CIRCUIT
No. 15-1918
DEBORAH H. RIPLEY, individually and as Administrator of the
Estate of Bernard W. Ripley, deceased,
Plaintiff - Appellee,
and
BERNARD W. RIPLEY,
Plaintiff,
v.
FOSTER WHEELER LLC; FOSTER WHEELER ENERGY CORPORATION,
Defendants – Appellants,
and
J. HENRY HOLLAND CORPORATION; WACO, INCORPORATED;
METROPOLITAN LIFE INSURANCE COMPANY; UNION CARBIDE
CORPORATION; SB DECKING, INC., a/k/a Selby Battersby; AURORA
PUMP, CO; IMO INDUSTRIES, INCORPORATED, as successor in
interest to Delaval Pumps; GOULDS PUMPS, INCORPORATED;
INGERSOLL-RAND COMPANY; WARREN PUMPS, INCORPORATED; CRANE
COMPANY; GRINNELL CORPORATION; THE J.R. CLARKSON COMPANY,
individually and as successor by mergers to Kunkle
Industries, Inc.; MILWAUKEE VALVE COMPANY; FLOWSERVE US,
INC., individually and as successor in interest to Rockwell
Edward Valves and Vogt Valves; SPIRAX SARCO, INC.; ARMSTRONG
INTERNATIONAL, INC., individually and as a successor to
Armstrong Machine Works,
Defendants.
Appeal from the United States District Court for the Eastern
District of Virginia, at Newport News. Arenda L. Wright Allen,
District Judge. (4:14-cv-00070-AWA-LRL)
Argued: September 22, 2016 Decided: November 1, 2016
Before TRAXLER, DIAZ, and THACKER, Circuit Judges.
Reversed and remanded by published opinion. Judge Thacker wrote
the opinion, in which Judge Traxler and Judge Diaz joined.
ARGUED: Erik David Nadolink, WHEELER TRIGG O’DONNELL, LLP,
Denver, Colorado, for Appellants. William Harty, PATTEN,
WORNOM, HATTEN & DIAMONSTEIN, L.C., Newport News, Virginia, for
Appellee. ON BRIEF: Anthony B. Taddeo, Jr., David M. Sturm,
Matthew D. Joss, TADDEOSTURM PLC, Richmond, Virginia, for
Appellants. Robert R. Hatten, Hugh B. McCormick, III, PATTEN,
WORNOM, HATTEN & DIAMONSTEIN, L.C., Newport News, Virginia, for
Appellee.
2
THACKER, Circuit Judge:
Facing claims in Virginia state court for failing to
warn of asbestos hazards in products manufactured for the Navy,
Foster Wheeler LLC and Foster Wheeler Energy Corporation
(“Appellants”) removed the case pursuant to the federal officer
removal statute to the United States District Court for the
Eastern District of Virginia. The district court remanded to
state court, citing longstanding precedent in the district that
denies the government contractor defense in failure to warn
cases. Appellants timely appealed. For the reasons below, we
reverse.
I.
From 1969 to 1972 and from 1974 to the late 1970s,
Bernard W. Ripley worked as a boilermaker at Norfolk Naval
Shipyard in Portsmouth, Virginia. He was diagnosed with
malignant mesothelioma on February 24, 2014. On May 13, 2014,
he and his wife, Deborah Ripley (“Appellee”), filed suit in the
Newport News Circuit Court in Virginia, naming Appellants and
others as defendants. The complaint alleges Mr. Ripley was
exposed to asbestos contained in products Appellants
3
manufactured for the Navy, and that Appellants are liable for
failure to warn of asbestos hazards. 1
On June 16, 2014, Appellants filed a Notice of Removal
in the United States District Court for the Eastern District of
Virginia. Appellants asserted a government contractor defense,
arguing that the suit stemmed from Appellants’ contract with the
Navy to construct boilers and related equipment, and that
removal is thus proper pursuant to the federal officer removal
statute, 28 U.S.C. § 1442(a)(1).
On August 6, 2015, the district court granted
Appellee’s motion to remand, following a decades-old practice in
the district that denies the government contractor defense in
failure to warn cases. Because the defense did not apply, the
court reasoned, Appellants could not establish the colorable
federal defense necessary to support federal officer removal,
thereby precluding federal subject matter jurisdiction.
On August 8, 2015, Appellant filed a Notice of Appeal,
urging this court to overturn the district court’s remand order. 2
1
Mr. Ripley died on November 14, 2014; the court
substituted Appellee as administratrix of Mr. Ripley’s estate on
March 18, 2015.
2
Of note, this issue only recently became appealable. In
2011, Congress amended 28 U.S.C. § 1447(d) to allow appeals from
remand orders pursuant to § 1442. See Removal Clarification Act
of 2011, Pub. L. No. 112–51, 125 Stat. 545, 546 (2011).
4
II.
We review de novo issues of subject matter
jurisdiction, including removal. See Dixon v. Coburg Dairy,
Inc., 369 F.3d 811, 815–16 (4th Cir. 2004) (en banc) (quoting
Mayes v. Rapoport, 198 F.3d 457, 460 (4th Cir. 1999)). Denial
of the government contractor defense in failure to warn cases is
also an issue of law we review de novo. See Warfaa v. Ali, 811
F.3d 653, 658 (4th Cir. 2016).
III.
The federal officer removal statute allows a defendant
to remove a case from state to federal court if the defendant
establishes (1) it is a federal officer or a “person acting
under that officer,” 28 U.S.C. § 1442(a)(1); (2) a “colorable
federal defense”; and (3) the suit is “for a[n] act under color
of office,” which requires a causal nexus “between the charged
conduct and asserted official authority,” Jefferson Cty., Ala.
v. Acker, 527 U.S. 423, 431 (1999) (alteration and emphasis in
original) (citation and internal quotation marks omitted).
Section 1442 is thus an exception to the well-pleaded complaint
rule, which, absent diversity, prohibits removal unless a
federal question appears on the face of the plaintiff’s
complaint. See Jamison v. Wiley, 14 F.3d 222, 239 (4th Cir.
1994) (citing Mesa v. California, 489 U.S. 121, 136–37 (1989)).
5
The Supreme Court has recognized that “[o]ne of the
primary purposes” of federal officer removal is to provide a
federal forum for a federal defense. Willingham v. Morgan, 395
U.S. 402, 407 (1969). Proof of a “colorable” federal defense
thus does not require the defendant to “win his case before he
can have it removed” nor even establish that the defense is
“clearly sustainable.” Id.
Here, Appellants sought removal pursuant to § 1442 by
asserting the government contractor defense as elucidated in
Boyle v. United Technologies Corp., 487 U.S. 500 (1988). In
Boyle, the Supreme Court announced that design defects in
military equipment do not give rise to state-law tort claims if,
“(1) the United States approved reasonably precise
specifications; (2) the equipment conformed to those
specifications; and (3) the supplier warned the United States
about the dangers in the use of the equipment that were known to
the supplier but not to the United States.” 487 U.S. at 512.
The defense only applies if a contractor’s obligations to the
government conflict with state law such that the contractor may
not comply with both. See id. at 507–09.
The rationales behind the defense are twofold. First,
given the complexities of military decision making and the
constitutional delegation of the war powers to the legislative
and executive branches, separation of powers suggests the
6
judiciary should hesitate to intervene in matters of military
procurement contracts. See Tozer v. LTV Corp., 792 F.2d 403,
405–07 (4th Cir. 1986). Second, as a practical matter, a higher
risk of liability for government contractors would increase
costs to the government while decreasing the supply of
contractors and research and development in military equipment.
Id. at 407–08.
We must therefore decide whether the Supreme Court’s
pronouncement in Boyle, holding the government contractor
defense applicable in design defect cases, likewise shields
defendants against failure to warn claims and thus provides a
basis for federal jurisdiction pursuant to § 1442.
In this case, given “the thousands of asbestos cases
that have preceded” it in the Eastern District of Virginia, the
district court “determined that the government contractor
defense is not available in failure to warn cases.” McCormick
v. C.E. Thurston & Sons, Inc., 977 F. Supp. 400, 403 (E.D. Va.
1997) (internal quotation marks omitted).
However, the Eastern District of Virginia is clearly
an outlier in this regard. No other jurisdiction in the country
to have considered the issue is in accord with the Eastern
District of Virginia. Indeed, the Second, Fifth, Sixth,
Seventh, Ninth, and Eleventh Circuits have all applied the
defense to failure to warn cases. See e.g., In re Joint E. & S.
7
Dist. N.Y. Asbestos Litig., 897 F.2d 626, 629–30 (2d Cir. 1990);
Perez v. Lockheed Corp. (In re Air Disaster at Ramstein Air
Base, Germany, on 8/29/90), 81 F.3d 570, 576 (5th Cir.),
modified on other grounds, 88 F.3d 340 (5th Cir. 1996) (per
curium); Tate v. Boeing Helicopters (Tate II), 140 F.3d 654, 656
(6th Cir. 1998); Oliver v. Oshkosh Truck Corp., 96 F.3d 992,
1003–04 (7th Cir. 1996); Snell v. Bell Helicopter Textron, Inc.,
107 F.3d 744, 749–50 (9th Cir. 1997); Dorse v. Eagle-Picher
Indus., Inc., 898 F.2d 1487, 1489 (11th Cir. 1990). And
although we have not yet had the opportunity to consider this
issue directly, we have recognized that these decisions of our
sister circuits are “reasoned soundly.” Emory v. McDonnell
Douglas Corp., 148 F.3d 347, 350 (4th Cir. 1998) (collecting
cases). Moreover, the multidistrict litigation court for
asbestos products -- tasked with handling thousands of such
claims -- has also applied the defense and allowed removal on
this basis in failure to warn cases. See e.g., Hagen v.
Benjamin Foster Co., 739 F. Supp. 2d 770, 777–86 (E.D. Pa.
2010).
In addition to the multitude of authorities adopting
this approach, the rationales identified in Boyle remain
applicable in failure to warn cases. Just as decisions on
military equipment design involve complex cost-benefit analyses
in which lay juries and judges are not versed, military
8
procurement contracts and specifications involve manifold
warning and labeling requirements inapplicable to nonmilitary
equipment. Cf. Tozer, 792 F.2d at 405–07 (applying government
contractor defense in design defect case). Moreover, the
constitutional separation of the judiciary from military matters
carries no less force with respect to the design of military
equipment than it does with respect to the warnings accompanying
such equipment. Further, whether the risk of liability flows
from design defect or failure to warn, the effect remains the
same: government contractors willing to take such a risk will
pass the increased cost to the government and will invest less
in research and development. Cf. id. at 407–08.
Given the weight of opposing precedent and the
rationales supporting the defense, we now join the chorus and
hold that the government contractor defense is available in
failure to warn cases. Having established this, we leave it to
the district court to decide whether Appellants have presented
sufficient proof to warrant removal pursuant to § 1442.
IV.
For the foregoing reasons, we reverse and remand for
further proceedings.
REVERSED AND REMANDED
9
|
Previous Collection
Next Collection
Panda Park
This group features a 24 inch panel, playful pandas, flowers, small blocks, and cute panda faces. The free projects include a panel quilt and a pieced quilt. There are a total of 9 skus and the delivery is December.
The Blank Quilting Corp has a team of very talented in-house designers, led by the extremely creative Lead Stylist, Diana Mancini. When the collections that are produced by Blank Quilting are put forth you can feel confident that it comes from our... Read More
*PANDA PARK QUILT #1 PROJECT DISCLAIMER: Every effort has been made to ensure that all projects are error free. All the information is presented in good faith, however no warranty can be given nor results guaranteed as we have no control over the... Read More
*PANDA PARK QUILT #2 PROJECT DISCLAIMER: Every effort has been made to ensure that all projects are error free. All the information is presented in good faith, however no warranty can be given nor results guaranteed as we have no control over the... Read More |
---
abstract: 'Recently, a seminal STIRAP experiment allowed the creation of $^{40}$K$^{87}$Rb molecules in the rovibrational ground state \[K.-K. Ni [*et al.*]{}, Science [**322**]{}, 231 (2008)\]. In order to describe such a polarized dipolar Fermi gas in the hydrodynamic regime, we work out a variational time-dependent Hartree-Fock approach. With this we calculate dynamical properties of such a system as, for instance, the frequencies of the low-lying excitations and the time-of-flight expansion. We find that the dipole-dipole interaction induces anisotropic breathing oscillations in momentum space. In addition, after release from the trap, the momentum distribution becomes asymptotically isotropic, while the particle density becomes anisotropic.'
author:
- 'Aristeu R. P. Lima'
- Axel Pelster
title: Collective Motion of Polarized Dipolar Fermi Gases in the Hydrodynamic Regime
---
Even before the realization of Bose-Einstein condensation (BEC) with $^{52}$Cr [@PhysRevLett.94.160401], much experimental and theoretical interest has been dedicated to ultracold quantum gases interacting through the long-range and anisotropic dipole-dipole interaction (DDI) [@review]. For bosonic dipolar particles, the starting point of the theoretical investigations was the construction of a corresponding pseudo-potential by Yi and You [@PhysRevA.61.041604]. After that, an exact solution of the Gross-Pitaevskii equation in the Thomas-Fermi regime was found for cylinder-symmetric traps [@PhysRevLett.92.250401]. Moreover, the DDI has been shown to shift the BEC critical temperature in a characteristic way in polarized systems [@glaum:080407] and to give rise to the Einstein-de-Haas effect, when spinorial degrees of freedom are considered [@kawaguchi:080405]. From the experimental point of view, time-of-flight (TOF) techniques demonstrated both the first DDI-signature through small mechanical effects [@PhysRevLett.95.150406] as well as strong dipolar effects in quantum ferrofluids [@strong-pfau]. Furthermore, the shape of the trap was manipulated to stabilize a purely dipolar BEC against collapse [@stabilization-pfau].\
Concerning fermionic dipolar systems, recent theoretical studies have considered interesting properties of homogeneous gases such as zero sound [@ronen], Berezinskii-Kosterlitz-Thoules phase transition [@bruun:245301], and nematic phases [@fregoso]. In harmonically trapped systems, amazing predictions like anisotropic superfluidity [@baranov:250403], fractional quantum Hall physics [@baranov:070404], and Wigner crystallization [@baranov:200402] have been made. With respect to experimental investigations, the most promising atomic candidate is the fermionic chromium isotope $^{53}$Cr [@chicireanu:053406], which has a magnetic moment of $m=6~$Bohr magnetons. For these atoms, calculations of equilibrium properties have shown that the DDI is only a small perturbation [@miyakawa:061603; @zhang]. However, by applying a stimulated Raman adiabatic passage (STIRAP) process, it has recently been achieved to cool and trap $^{40}$K$^{87}$Rb molecules into their rovibrational ground-state, where they possess an electric dipole moment of $d=0.566$ Debye [@K.-K.Ni10102008; @efficient; @zirbel:013416; @arXiv:0811.4618]. Due to the resulting strong DDI a considerable deformation of the momentum distribution is expected [@miyakawa:061603; @zhang]. Once these systems would have been further cooled into the quantum degenerate regime, the main task will be to identify unambiguously the presence of the DDI. In this respect, TOF experiments and oscillation frequency measurements represent the most fundamental diagnostic tools in the field of ultracold quantum gases. Their outcomes reveal important information on the nature of the system under investigation. They differ drastically depending on whether the system is in the collisionless (CL) regime, where collision rates are small, or in the hydrodynamic (HD) regime, where collisions take place so often that they lead to local equilibrium. To date, investigations of dynamical properties of trapped dipolar Fermi gases have either been restricted to the CL regime [@1367-2630-11-5-055017] or excluded a deformation of the momentum distribution in the HD regime [@PhysRevA.67.025601]. Since the experiments with ultracold polar molecules are performed under strong dipolar interactions, one should expect them to lead the system into the HD regime, and thus an analysis allowing for an anisotropy in the momentum distribution has to be carried out. In this letter, we shall use a variational time-dependent Hartree-Fock approach to address this question.\
Consider $N$ spin-polarized fermionic dipoles of mass $M$ trapped in a cylinder-symmetric harmonic potential $U_{\rm tr}({\mathbf x}) = {M}\omega^{2}_{x}\left( {x}^{2} + {y}^{2} + \lambda^{2}{z}^{2} \right)/{2}$ with trap anisotropy $\lambda$ at ultralow temperatures. Since the Pauli principle inhibits a contact interaction, they interact dominantly through DDI. As we assume that the fermionic cloud is polarized along the symmetry axis of the trap, the DDI potential reads $V_{\rm dd}({\mathbf x}) = \frac{C_{\rm dd}}{4\pi|{\mathbf x}|^{3}}\left[1-3\frac{z^{2}}{|{\mathbf x}|^{2}}\right].$ For magnetic dipole moments $m$ the DDI is characterized by $C_{\rm dd} = \mu_{0}m^{2}$, whereas for electric moments $d$ we have $C_{\rm dd} = 4\pi d^{2}$. In the following we restrict ourselves to the normal phase in the limit $T\rightarrow 0$ because the critical temperature for superfluidity is very low, depending exponentially on $a_{\rm dd}= MC_{\rm dd}/(4\pi\hbar^{2})$ [@baranov:250403]. Furthermore, this limit is restricted by the HD requirement that the relaxation time $\tau_{R}$ is small in comparison with the time scale $1/\overline{\omega}$ defined by the average trap frequency $\overline{\omega} = (\omega_{x}^{2} \omega_{z})^{1/3}$. The necessity of a HD approach can be inferred as follows. As $\tau_{R}$ is not kown for dipolar interactions, we estimate it by assuming the DDI to be equivalent to a contact interaction with scattering length $a_{\rm dd}$. Then we use the fact that for a two-component, degenerate, normal Fermi gas with contact interaction one has $(\overline{\omega}\tau_{R})^{-1}=(N^{1/3}a_{\rm dd}\sqrt{M\overline{\omega}/\hbar})^{2}F(T/T_{\rm F})$, where $F(T/T_{\rm F})$ is of the order 0.1 in the quantum temperature regime (see, e.g., [@vichi]). Thus, we expect for the one-component, dipolar gas to enter the HD regime for $N^{1/6}\epsilon_{\rm dd}\gg1$, with the dimensionless parameter $\epsilon_{\rm dd}={C_{\rm dd}} ({M^{3}\overline{\omega}}/{\hbar^{5}} )^{\frac{1}{2}}N^{\frac{1}{6}}/{4\pi}$ measuring the strength of the DDI. In the current set-up of Ref. [@arXiv:0811.4618] one has $4\times10^{4}$ $^{40}$K$^{87}$Rb molecules with radial trapping frequency of ${\omega}_{x}=\omega_{y} \approx 2\pi\times 175$ Hz. Assuming an average trap frequency of that value yields at least $\epsilon_{\rm dd}\approx 5.3$ and $(\overline{\omega}\tau_{R})^{-1}\approx 0.1\times(N^{1/6}\epsilon_{\rm dd})^{2}\approx96$, which drives the system into the HD regime.
In this letter we work out a time-dependent Hartree-Fock approach by extremizing the action ${\cal A} = \int{\mathrm d}t \langle\Psi|i\hbar\frac{\partial}{\partial t} - \hat{H}|\Psi\rangle,$ where $\Psi(x_{1},\cdots,x_{N},t)=\langle x_{1},\cdots,x_{N}|\Psi\rangle$ is a Slater determinant and $\hat{H}$ denotes the underlying Hamilton operator. In order to describe the HD regime, we follow a standard procedure of nuclear physics [@ring-schuck] and assume that frequent particle collisions assure that all one-particle orbitals have the same local phase $\chi(x_{},t)$, yielding the velocity field ${\mathbf v}=\nabla\chi$. Thus, we can factorize out the phases and define a Slater determinant through $\Psi_{0}(x_{1},\cdots,x_{N},t) = e^{-iM \sum_{i}\chi(x_{i},t)/\hbar}\Psi(x_{1},\cdots,x_{N},t) $, which contains only the moduli of the one-particle orbitals and, therefore, is invariant under time reversal. This yields a time-even one-body density matrix $\rho_{0}(x,x';t)
%=$ $ \prod_{i=2}^{N}\int {\mathrm d}^{3} x_{i} \Psi_{0}^{*}(x',x_{2},\cdots,x_{N},t) \Psi_{0}(x,x_{2}, \cdots, x_{N},t)
=$ $e^{-iM\left[\chi(x,t)-\chi(x',t)\right]/\hbar}\rho_{}(x,x';t)$ [@brink]. With this the action reduces to $$\begin{aligned}
{\cal A} & \!\!=\!\! & -M\!\int\! {\mathrm d}t \!\!\!\int\!\! {\mathrm d}^{3}x\left\{ \dot{\chi}(x,t)\rho_{0}(x;t)
+\frac{\rho_{0}(x;t)}{2}\left[\nabla\chi(x,t)\right] ^{2} \right\}\nonumber\\
& & - \int {\mathrm d}t\langle\Psi_{0}|\hat{H}|\Psi_{0}\rangle,
\label{action_rho0}\end{aligned}$$ where $\rho_{0}(x;t)=\rho_{0}(x,x;t)$ denotes the particle density and $\langle\Psi_{0}|\hat{H}|
\Psi_{0}\rangle$ consists of the kinetic energy $E_{\rm ki}$, the trapping potential $E_{\rm tr}$, and the interaction. The latter is divided into the direct or Hartree term $E_{\rm dd}^{\rm D}$ and the exchange or Fock term $E_{\rm dd}^{\rm E}$. Due to the exchange term, the ground-state energy $\langle\Psi_{0}|\hat{H}|\Psi_{0}\rangle$ is not a function of the particle density $\rho_{0}(x;t)$ alone, but also contains the non-diagonal part $\rho_{0}(x,x';t)$.\
![(Color Online) Spatial aspect ratio for different trap anisotropies $\lambda$; the upper (continuous) branches correspond to a local minimum of the mean-field energy and the lower (dotted) branches to a maximum. Notice that the value of $\epsilon_{\rm dd}$ in which two branches meet, i.e., $\epsilon_{\rm dd}^{\rm crit}$, decreases slower for lower values of $\lambda_{}$. The vertical line marks the estimated value of the interaction strength for $^{40}$K$^{87}$Rb molecules $\epsilon_{\rm dd}\approx5.3$.[]{data-label="asp_rat_real_space"}](figure1)
As it is not possible to solve analytically the resulting Euler-Lagrange equations for $\chi(x_{},t)$ and $\rho_{0}(x,x';t)$, we propose here a variational extremization of the action. To this end, we express each energy contribution in terms of the Wigner transform of the one-body density matrix $\nu_{0}\left({\mathbf X},{\mathbf k};t\right) =$ $ \int {\mathrm d}^{3}s\,\rho_{0}\left({\mathbf X}+\frac{\mathbf s}{2},{\mathbf X}-\frac{\mathbf s}{2};t\right)\,e^{-i{\mathbf k}\cdot{\mathbf s}}$. The kinetic and trapping energy are then given by $$\begin{aligned}
E_{\rm ki/tr} & = & \int \frac{{\mathrm d}^{3}x{\mathrm d}^{3}k} {(2\pi)^{3}}\,\nu_{0}\left({{\mathbf x}}{},{\mathbf k};t\right)
\epsilon_{\rm ki/tr}\left({{\mathbf x}}{},{\mathbf k}\right)
\label{E_kin}
%E_{\rm tr} & = & \int \frac{{\mathrm d}^{3}x{\mathrm d}^{3}k} {(2\pi)^{3}}\,\nu_{0}\left({{\mathbf x}}{},{\mathbf k};t\right)U_{\rm tr}({\mathbf x}),
\label{E_trap}\end{aligned}$$ with $\epsilon_{\rm ki}=\hbar^{2}{\mathbf k}^{2} / 2M$ and $\epsilon_{\rm tr}=U_{\rm tr}({\mathbf x})$, respectively. The direct term, which accounts for the deformation of the particle density, and the exchange term, which is related to the momentum space deformation, read $$\begin{aligned}
E_{\rm dd}^{\rm D}\!\! & = &\!\! \int\!\! \frac{{\mathrm d}^{3}x{\mathrm d}^{3}k{\mathrm d}^{3}x'{\mathrm d}^{3}k'}{2(2\pi)^{6}}
%\frac{{\mathrm d}^{3}x'{\mathrm d}^{3}k'}{(2\pi)^{3}}\,
\nu_{0}\!\left({{\mathbf x}},{\mathbf k};t\right)\!V_{\rm dd}({\mathbf x}\!-\!{\mathbf x'})\nu_{0}\!\left({{\mathbf x'}},{\mathbf k'};t\right)\!, \nonumber\\
E_{\rm dd}^{\rm E}\!\! & = &\!\! -\!\!\int\!\! \frac{{\mathrm d}^{3}X{\mathrm d}^{3}k{\mathrm d}^{3}s{\mathrm d}^{3}k'}{2(2\pi)^{6}}
%\frac{{\mathrm d}^{3}s{\mathrm d}^{3}k'}{(2\pi)^{3}}
\nu_{0}\!\left({{\mathbf X}},{\mathbf k};t\right)\!V_{\rm dd}({\mathbf s})\nu_{0}\!\left({{\mathbf X}},{\mathbf k'};t\right)\nonumber\\
\!\!\! & &\!\!\!\times e^{i{\mathbf s}\cdot({\mathbf k}-{\mathbf k'})} \, .\end{aligned}$$ At this point, we adopt the variational ansatz $\chi(x,t) = \left[\alpha_{x}(t)(x_{}^{2} + y_{}^{2}) +\alpha_{z}(t)z_{}^{2}\right]/2$ for the phase and $\nu_{0}\left({{\mathbf x}},{\mathbf k};t\right) = \Theta\left(1-\frac{x^{2}+y^{2}}{R_{x}(t)^{2}}-\frac{z^{2}}{R_{z}(t)^{2}}
-\frac{k_{x}^{2}+k_{y}^{2}}{K_{x}(t)^{2}}-\frac{k_{z}^{2}}{K_{z}(t)^{2}} \right)$ for the Wigner phase space function with $\Theta(\cdot)$ being the step function. We are now in the position to extremize the action (\[action\_rho0\]) with respect to the time-dependent variational parameters $\alpha_i (t)$ for the phase as well as $R_{i}(t)$ and $K_{i}(t)$ for the Thomas-Fermi radii and the Fermi momenta. At first, one obtains ${\alpha_{i}} = {\dot{R_{i}}}/{R_{i}}$, which is used to eliminate the parameters $\alpha_{i}$ from the rest of the formalism. Under conservation of the particle number $${\tilde{R}_{x}^{2} \tilde{R}_{z}} {\tilde{K}_{x}} ^{2} \tilde{K}_{z} = 1,
\label{part_num_cons}$$ the equations of motion for the Thomas-Fermi radii read $$\begin{aligned}
\hspace*{-2mm}\frac{1}{\omega_{x}^{2}}\frac{d^{2} {\tilde{R}}_{x}}{dt^{2}} \hspace*{-1mm} & = & \hspace*{-1mm}\!-\!\tilde{R}_{x} \!+\! \frac{2\tilde{K}_{x}^{2}\!
+\!\tilde{K}_{z}^{2}}{3\tilde{R}_{x}}\!+\!\epsilon_{\rm dd}A(\tilde{R}_{x},\tilde{R}_{z},\tilde{K}_{x},\tilde{K}_{z}),\\
\hspace*{-2mm}\frac{1}{\omega_{z}^{2}}\frac{d^{2}{\tilde{R}}_{z}}{dt^{2}} \hspace*{-1mm}& = & \hspace*{-1mm}\!-\!\tilde{R}_{z} \!+\! \frac{2\tilde{K}_{x}^{2}\!
+\!\tilde{K}_{z}^{2}}{3\tilde{R}_{z}}\!+\!\epsilon_{\rm dd}B(\tilde{R}_{x},\tilde{R}_{z},\tilde{K}_{x},\tilde{K}_{z}).
\label{eqn:dim_less_tf_eqs_cil}\end{aligned}$$ Here we use $\tilde{\bullet}$ to represent the quantity $\bullet$ expressed in units of the non-interacting Thomas-Fermi radius $R_{i}^{(0)} = \sqrt{{2E_{F}}/{M\omega_{i}^{2}}}$ and the Fermi momentum $K_{F} = \sqrt{{2E_{F}}/{\hbar^{2}}}$ with the Fermi energy $E_{F} = \left(6N \right)^{{1}/{3}} \hbar \overline{\omega}$. The auxiliary functions are defined according to $$\begin{aligned}
A & = & -\frac{c_{\rm d}}{\tilde{R}_{x}^{3}\tilde{R}_{z}}\left[ 1
- \frac{3\tilde{R}_{x}^{2}\lambda^{2}f_{s}\left({\tilde{R}_{x}^{}\lambda^{}}/{\tilde{R}_{z}}\right)}{2\left(\tilde{R}_{z}^{2}
-\tilde{R}_{x}^{2}\lambda^{2} \right)} - f_{s}\left(\frac{\tilde{K}_{z}}{\tilde{K}_{x}}\right)\right],\nonumber\\
B & = & -\frac{c_{\rm d}}{\tilde{R}_{x}^{2}\tilde{R}_{z}^{2}}\left[ -2 + \frac{3\tilde{R}_{z}^{2}f_{s}\left({\tilde{R}_{x}^{}\lambda^{}}
/{\tilde{R}_{z}}\right)} {\left(\tilde{R}_{z}^{2} - \tilde{R}_{x} ^{2} \lambda^{2} \right)} - f_{s}\left(\frac{\tilde{K}_{z}}{\tilde{K}_{x}}\right)\right]
\nonumber
\label{AA_BB}\end{aligned}$$ with the numerical constant $c_{\rm d}=\frac{2^{{38}/{3}}}{3^{{23}/{6}}\cdot5\cdot7\cdot\pi^{2}}\approx0.2791$.
![(Color Online) The lower (red) curve shows the ratio of the amplitudes $\zeta_{x}/\zeta_{z}$ as a function of $\epsilon_{\rm dd}$ for $\lambda=5$. For comparison, the equilibrium aspect ratio in momentum space against $\epsilon_{\rm dd}$ for $\lambda=5$ is depicted by the upper (blue) curve.[]{data-label="zetaratio_fig"}](figure2)
Furthermore, the anisotropy function $$\begin{aligned}
f_{s}(x) & \equiv & \begin{cases}
\frac{2x^2+1}{1-x^2}
- \frac{3 x^2\tanh^{-1}\sqrt{1-x^{2}}}{(1-x^{2})^{3/2}}; & x \neq 1\\
0; & x=1
\end{cases},\end{aligned}$$ decreases monotonically from $1$ at $x=0$ to $-2$ at $x=\infty$, passing through zero at $x=1$ [@PhysRevLett.92.250401; @glaum:080407]. In addition, the variational parameters are restricted to obey $$\tilde{K}_{z}^{2} - \tilde{K}_{x}^{2}= \epsilon_{\rm dd}C\left(\tilde{R}_{x},\tilde{R}_{z},\tilde{K}_{x}, \tilde{K}_{z}\right),
\label{constraint}$$ with $C=\frac{3c_{\rm d}}{{\tilde{R}_{x}}^{2}\tilde{R}_{z}} \left[1 - \frac{\left(2\tilde{K}_{x}^{2}
+ \tilde{K}_{z}^{2}\right)f_{s}\left({\tilde{K}_{z}}/{\tilde{K}_{x}} \right)}{ 2\left(\tilde{K}_{x}^{2} - \tilde{K}_{z}^{2} \right)} \right]$. This equation can be traced back to the exchange term and shows explicitly that a non-zero $\epsilon_{\rm dd}$ implies a deformed momentum distribution $\tilde{K}_{z} \neq \tilde{K}_{x}$ for finite $\tilde{R}_{x}$, $\tilde{R}_{z}$ as was first pointed out in Ref. [@miyakawa:061603]. Equations (\[part\_num\_cons\])–(\[eqn:dim\_less\_tf\_eqs\_cil\]), (\[constraint\]) govern the static as well as dynamic properties of a polarized dipolar Fermi gas in the HD regime and represent the main result of this letter. They determine the temporal evolution of both the spatial and the momentum distribution of a dipolar Fermi gas which are directly experimentally accessible via TOF techniques. The static solutions agree precisely with the ones obtained before in Refs. [@miyakawa:061603; @zhang]. In Fig. \[asp\_rat\_real\_space\] we present our findings for the spatial aspect ratio as a function of the dipolar strength $\epsilon_{\rm dd}$. The characteristic feature is that a minimal value of $\lambda$ is required for stabilizing a system with a given $\epsilon_{\rm dd}$. Thus, for future experiments with $^{40}$K$^{87}$Rb molecules in the quantum degenerate regime one should choose the anisotropy $\lambda$ to be larger than the minimal value $\lambda_{\rm min}\approx 3.89$ in order to render the system stable against collapse. Amazingly, the minimum value of $\lambda$ supporting stability, decreases slowly and samples with $\lambda=0.05$ are stable if $\epsilon_{\rm dd}\lessapprox1.6$.
![(Color Online) Excitation frequencies for $\lambda=5$ as functions of the DDI-strength $\epsilon_{\rm dd}$. The upper blue (lower red) curve represents the monopole (quadrupole) frequency $\Omega_{+}$ ($\Omega_{-}$). The dashed (dotted) horizontal line represents the monopole (quadrupole) frequency of the non-interacting gas from Ref. [@amoruso]. Inset: Mono- (blue) and quadrupole (red) oscillation frequencies of the dipolar Fermi gas normalized by the non-interacting values from Ref. [@amoruso] against the trap aspect ratio $\lambda$ for different values of the dipolar strength $\epsilon_{\rm dd}$. The dashed (solid) curves are for $\epsilon_{\rm dd}=0.5$ ($\epsilon_{\rm dd}=1.0$).[]{data-label="omegakrb"}](figure3)
Having summarized the most important aspects of the static solutions, we turn now to their dynamical properties. In a cylinder-symmetric system the mono- and quadrupole low-lying oscillation modes couple to each other. In order to obtain the frequency of these modes in the HD regime, we expand the radii and momenta around their respective equilibrium values according to $\tilde{R}_{i} = \tilde{R}_{i}{(0)}
+ \eta_{i}e^{i\Omega t}, \tilde{K}_{i} = \tilde{K}_{i}{(0)} + \zeta_{i}e^{i\Omega t}$, where $\eta_{i}$ ($\zeta_{i}$) denotes a small oscillation amplitude in the $i$-th direction in real (momentum) space and $\Omega$ represents the oscillation frequency. Inserting these into the equations of motion (\[part\_num\_cons\])–(\[eqn:dim\_less\_tf\_eqs\_cil\]), (\[constraint\]), a linearization yields at first for the ratio of the momentum amplitudes $$\frac{\zeta_{x}}{\zeta_{z}} = \frac{\tilde{K}_{x}}{\tilde{K}_{z}}\frac{\tilde{K}_{x}^{2}+\tilde{K}_{z}^{2}-\epsilon_{\rm dd}\tilde{K}_{z}
\partial C / \partial \tilde{K}_{z}}{2\tilde{K}_{z}^{2}-\epsilon_{\rm dd}\tilde{K}_{z} \partial C / \partial \tilde{K}_{z}}\,,$$ where all terms are evaluated at equilibrium. This quantity is plotted against $\epsilon_{\rm dd}$ for $\lambda=5$ in the red (lower) curve in Fig. \[zetaratio\_fig\] and is compared to the corresponding equilibrium momentum aspect ratio (blue, upper curve). Setting $C=0$, i.e., removing the exchange term, one has ${\zeta_{x}}={\zeta_{z}}$, whereas for non-zero $C$, the ratio ${\zeta_{x}}/{\zeta_{z}}$ decreases monotonically from $1$ to about $0.28$ in the interval $0<\epsilon_{\rm dd}<\epsilon_{\rm dd}^{\rm crit}\approx 7.34$. This shows that the exchange term induces characteristic [*anisotropic breathing oscillations in momentum space*]{}, which can be regarded as a trademark sign of the DDI in fermionic quantum gases.\
Eliminating the momentum amplitudes $\zeta_i$ yields a reduced linear homogeneous system for the spatial amplitudes $\eta_i$. Demanding non-trivial solutions yields an explicit but lengthy result for the monopole (quadrupole) oscillation frequency $\Omega_+$ ($\Omega_-$) which depends via the equilibrium values of the Thomas-Fermi radii and the Fermi momenta upon the trap anharmonicity $\lambda$ and the dipolar strength $\epsilon_{\rm dd}$. In the special case of an ideal Fermi gas, i.e. $\epsilon_{\rm dd}=0$, the oscillation frequencies $\Omega_{\pm}$ reduce to the correct non-interacting values ${{\Omega_{\pm}^{(0)}}^{2}} = {\omega_{x}^{2}}\left({5+4\lambda_{}^{2}} \pm \sqrt{25-32\lambda_{}^{2} + 16\lambda_{}^{4}}\right)/3$, which were first obtained for $\lambda=1$ in Ref. [@PhysRevLett.83.5415] and for $\lambda\neq1$ in Ref. [@amoruso]. Fig. \[omegakrb\] shows the oscillation frequencies of the mono- (blue) and quadrupole (red) modes plotted against $\epsilon_{\rm dd}$ for $\lambda=5$. As $\epsilon_{\rm dd}$ becomes larger, we find that the monopole frequency increases and that the quadrupole frequency decreases, vanishing at $\epsilon_{\rm dd}^{\rm crit}\approx 7.34$, the same value for which the system becomes unstable (see Fig. \[asp\_rat\_real\_space\]). The inset of Fig. \[omegakrb\] shows how the frequencies depend on the anisotropy $\lambda$ for $\epsilon_{\rm dd} = 0.5$ (dashed) and $\epsilon_{\rm dd} = 1.0$ (continuous). It turns out that the quadrupole frequencies are larger than in the non-interacting case for $\lambda<1$ and smaller for $\lambda>1$, while the contrary is true for the monopole modes. This behaviour agrees qualitatively with dipolar BECs [@PhysRevLett.92.250401].\
![(Color Online) Cloud aspect ratio in TOF expansion for $\lambda=5$ with $\epsilon_{\rm dd}=1,3$ and $7$ (continuous, top to bottom). The dashed curves depict the corresponding momentum aspect ratios. Inset: asymptotic cloud aspect ratio against $\epsilon_{\rm dd}$.[]{data-label="tof"}](figure4)
It remains to study the TOF expansion of a dipolar Fermi gas. This is done by numerically solving the Eqs. (\[part\_num\_cons\])–(\[eqn:dim\_less\_tf\_eqs\_cil\]), (\[constraint\]), while removing the trap frequencies. The results are presented in Fig. \[tof\], where the spatial and momentum aspect ratios are plotted as functions of time in units of $\overline{\omega}^{-1}$ at $\lambda=5$ for different $\epsilon_{\rm dd}$. The characteristic of the hydrodynamic regime is that the asymptotic value of the aspect ratio in real space depends on $\epsilon_{\rm dd}$, while local equilibrium renders the momentum distribution asymptotically isotropic. We can estimate the validity of these results if we assume the previous HD criterion to be valid also during the expansion. Since the equations of motion imply $d^{2}{\tilde{R}}_{i}/d t^{2}=0$ for large times, yielding $(\tilde{R_{x}^{2}}\tilde{R_{z}})^{1/3}\sim\overline{\omega}t$, one obtains a HD expansion provided $(\overline{\omega}t)^{2}\cdot\overline{\omega}\tau_{R}\ll 1$. For KRb molecules, the expansion is HD only for small times $\overline{\omega}t\ll10$, whereas for molecules like LiCs with $d\approx5.5~$Debye, the expansion is HD for $\overline{\omega}t\ll1000$.
In the present letter we have investigated both low-lying oscillation frequencies and TOF expansion data for a polarized dipolar Fermi gas through a hydrodynamic approach. Our findings have revealed different fingerprints of a strong DDI. We have estimated the validity of our results and found strong evidence for hydrodynamic behavior also in the absence of superfluidity. The prospects for observing normal dipolar hydrodynamics in the quantum degenerate regime are enhanced by tight traps and the recently obtained large dipole moments.\
We acknowledge support from the DAAD, the Innovationsfond FU-Berlin, and from the DFG in SFB/TR12.
[99]{} A. Griesmaier [*et al.*]{}, Phys. Rev. Lett. [**94**]{}, 160401 (2005). M. A. Baranov, Phys. Rep. [**464**]{}, 71 (2008); L. D. Carr [*et al.*]{}, New J. Phys. [**11**]{}, 055049 (2009); T. Lahaye [*et al.*]{}, Rep. Prog. Phys. [**72**]{}, 126401 (2009). S. Yi and L. You, Phys. Rev. A [**61**]{}, 041604(R) (2000). D. H. J. O’Dell, S. Giovanazzi, and C. Eberlein, Phys. Rev. Lett. [**92**]{}, 250401 (2004). K. Glaum [*et al.*]{}, Phys. Rev. Lett. [**98**]{}, 080407 (2007). Y. Kawaguchi, H. Saito, and M. Ueda, Phys. Rev. Lett. [**96**]{}, 080405 (2006). J. Stuhler [*et al.*]{}, Phys. Rev. Lett. [**95**]{}, 150406 (2005). T. Lahaye [*et al.*]{}, Nature [**448**]{}, 672 (2007). T. Koch [*et al.*]{}, Nat. Phys. [**4**]{}, 218 (2008). J. B. S. Ronen, [arXiv:0906.3753]{}; C.-K. Chan [*et al.*]{}, Phys. Rev. A (in press). G. M. Bruun and E. Taylor, Phys. Rev. Lett. [**101**]{}, 245301 (2008). B. M. Fregoso [*et al.*]{}, New J. Phys. [**11**]{}, 103003 (2009); B. M. Fregoso and E. Fradkin, Phys. Rev. Lett. [**103**]{}, 205301 (2009). M. A. Baranov, [Ł]{}. Dobrek, and M. Lewenstein, Phys. Rev. Lett. [**92**]{}, 250403 (2004). And Refs. therein. M. A. Baranov, K. Osterloh, and M. Lewenstein, Phys. Rev. Lett. [**94**]{}, 070404 (2005). M. A. Baranov, H. Fehrmann, and M. Lewenstein, Phys. Rev. Lett. [**100**]{}, 200402 (2008). R. Chicireanu [*et al.*]{}, Phys. Rev. A [**73**]{}, 053406 (2006). T. Miyakawa, T. Sogo, and H. Pu, Phys. Rev. A [**77**]{}, 061603(R) (2008). J.-N. Zhang and S. Yi., Phys. Rev. A [**80**]{}, 053614 (2009). K.-K. Ni [*et al.*]{}, Science [**322**]{}, 231 (2008). S. Ospelkaus [*et al.*]{}, Nat. Phys. [**4**]{}, 622 (2008). J. J. Zirbel [*et al.*]{}, Phys. Rev. A [**78**]{}, 013416 (2008). S. Ospelkaus [*et al.*]{}, Faraday Discuss. [**142**]{}, 351 (2009). T. Sogo [*et al.*]{}, New J. Phys. [**11**]{}, 055017 (2009). K. Góral, M. Brewczyk, and K. Rzacżewski, Phys. Rev. A [**67**]{}, 025601 (2003). L. Vichi and S. Stringari, Phys. Rev. A [**60**]{}, 4734 (1999). P. Ring and P. Schuck, [*The Nuclear Many-Body Problem*]{} (Springer, Berlin, 2004). M. J. Giannoni, D. Vautherin, M. Veneroni, and D. M. Brink, Phys. Lett. [**63 B**]{}, 8 (1976). G. M. Bruun and C. W. Clark, Phys. Rev. Lett [**83**]{}, 5415 (1999). M. Amoruso [*et al.*]{}, Europ. Phys. J. D [**7**]{}, 441 (1999).
|
Download The Johnson (Mr Genius)
Exclusive Complete Download The Johnsons Fresh from Aprokopikin.com Exclusively we Give you The Johnsons (Mr Genius)
In this episode of The Johnson, Oga Pablo got a client from abroad who ordered 20 cartoons of Agbo but before you can trade international your business must be registered. What do you think will happen?
Download The Johnson below, and please don’t forget to share……
How to download?
If you can’t access download link with opera mini browsers use either (Chrome, Firefox or Ucbrowser) |
Not long before the Ukrainian president was inaugurated in May, an associate of Rudy Giuliani’s journeyed to Kiev to deliver a warning to the country’s new leadership, a lawyer for the associate said.
The associate, Lev Parnas, told a representative of the incoming government that it had to announce an investigation into Donald Trump’s political rival, Joe Biden, and his son, or else vice president Mike Pence would not attend the swearing-in of the new president, and the United States would freeze aid, the lawyer said.
The claim by Mr Parnas, who is preparing to share his account with impeachment investigators, challenges the narrative of events from Mr Trump and Ukrainian officials that is at the core of the congressional inquiry.
It also directly links Mr Giuliani, the president’s personal lawyer, to threats of repercussions made to the Ukrainians, something he has strenuously denied.
But Mr Parnas’ account, while potentially significant, is being contradicted on several fronts. None of the people involved dispute that the meeting occurred, but Mr Parnas stands alone in saying the intention was to present an ultimatum to the Ukrainian leadership.
Trump impeachment: Who's who in the Ukraine scandal Show all 26 1 /26 Trump impeachment: Who's who in the Ukraine scandal Trump impeachment: Who's who in the Ukraine scandal Donald Trump Accused of abusing his office by pressing the Ukrainian president in a July phone call to help dig up dirt on Joe Biden, who may be his Democratic rival in the 2020 election. He also believes that Hillary Clinton’s deleted emails - a key factor in the 2016 election - may be in Ukraine, although it is not clear why. EPA Trump impeachment: Who's who in the Ukraine scandal The Whistleblower Believed to be a CIA agent who spent time at the White House, his complaint was largely based on second and third-hand accounts from worried White House staff. Although this is not unusual for such complaints, Trump and his supporters have seized on it to imply that his information is not reliable. Expected to give evidence to Congress voluntarily and in secret. Getty Trump impeachment: Who's who in the Ukraine scandal The Second Whistleblower The lawyer for the first intelligence whistleblower is also representing a second whistleblower regarding the President's actions. Attorney Mark Zaid said that he and other lawyers on his team are now representing the second person, who is said to work in the intelligence community and has first-hand knowledge that supports claims made by the first whistleblower and has spoken to the intelligence community's inspector general. The second whistleblower has not yet filed their own complaint, but does not need to to be considered an official whistleblower. Getty Trump impeachment: Who's who in the Ukraine scandal Rudy Giuliani Former mayor of New York, whose management of the aftermath of the September 11 attacks in 2001 won him worldwide praise. As Trump’s personal attorney he has been trying to find compromising material about the president’s enemies in Ukraine in what some have termed a “shadow” foreign policy. In a series of eccentric TV appearances he has claimed that the US state department asked him to get involved. Giuliani insists that he is fighting corruption on Trump’s behalf and has called himself a “hero”. AP Trump impeachment: Who's who in the Ukraine scandal Volodymyr Zelensky The newly elected Ukrainian president - a former comic actor best known for playing a man who becomes president by accident - is seen frantically agreeing with Trump in the partial transcript of their July phone call released by the White House. With a Russian-backed insurgency in the east of his country, and the Crimea region seized by Vladimir Putin in 2014, Zelensky will have been eager to please his American counterpart, who had suspended vital military aid before their phone conversation. He says there was no pressure on him from Trump to do him the “favour” he was asked for. Zelensky appeared at an awkward press conference with Trump in New York during the United Nations general assembly, looking particularly uncomfortable when the American suggested he take part in talks with Putin. AFP/Getty Trump impeachment: Who's who in the Ukraine scandal Mike Pence The vice-president was not on the controversial July call to the Ukrainian president but did get a read-out later. However, Trump announced that Pence had had “one or two” phone conversations of a similar nature, dragging him into the crisis. Pence himself denies any knowledge of any wrongdoing and has insisted that there is no issue with Trump’s actions. It has been speculated that Trump involved Pence as an insurance policy - if both are removed from power the presidency would go to Democratic House Speaker Nancy Pelosi, something no Republican would allow. AP Trump impeachment: Who's who in the Ukraine scandal Rick Perry Trump reportedly told a meeting of Republicans that he made the controversial call to the Ukrainian president at the urging of his own energy secretary, Rick Perry, and that he didn’t even want to. The president apparently said that Perry wanted him to talk about liquefied natural gas - although there is no mention of it in the partial transcript of the phone call released by the White House. It is thought that Perry will step down from his role at the end of the year. Getty Trump impeachment: Who's who in the Ukraine scandal Joe Biden The former vice-president is one of the frontrunners to win the Democratic nomination, which would make him Trump’s opponent in the 2020 election. Trump says that Biden pressured Ukraine to sack a prosecutor who was investigating an energy company that Biden’s son Hunter was on the board of, refusing to release US aid until this was done. However, pressure to fire the prosecutor came on a wide front from western countries. It is also believed that the investigation into the company, Burisma, had long been dormant. Reuters Trump impeachment: Who's who in the Ukraine scandal Hunter Biden Joe Biden’s son has been accused of corruption by the president because of his business dealings in Ukraine and China. However, Trump has yet to produce any evidence of corruption and Biden’s lawyer insists he has done nothing wrong. AP Trump impeachment: Who's who in the Ukraine scandal William Barr The attorney-general, who proved his loyalty to Trump with his handling of the Mueller report, was mentioned in the Ukraine call as someone president Volodymyr Zelensky should talk to about following up Trump’s preoccupations with the Biden’s and the Clinton emails. Nancy Pelosi has accused Barr of being part of a “cover-up of a cover-up”. AP Trump impeachment: Who's who in the Ukraine scandal Mike Pompeo The secretary of state initially implied he knew little about the Ukraine phone call - but it later emerged that he was listening in at the time. He has since suggested that asking foreign leaders for favours is simply how international politics works. Gordon Sondland testified that Pompeo was "in the loop" and knew what was happening in Ukraine. Pompeo has been criticised for not standing up for diplomats under his command when they were publicly criticised by the president. AFP via Getty Trump impeachment: Who's who in the Ukraine scandal Nancy Pelosi The Democratic Speaker of the House had long resisted calls from within her own party to back a formal impeachment process against the president, apparently fearing a backlash from voters. On September 24, amid reports of the Ukraine call and the day before the White House released a partial transcript of it, she relented and announced an inquiry, saying: “The president must be held accountable. No one is above the law.” Getty Trump impeachment: Who's who in the Ukraine scandal Adam Schiff Democratic chairman of the House intelligence committee, one of the three committees leading the inquiry. He was criticized by Republicans for giving what he called a “parody” of the Ukraine phone call during a hearing, with Trump and others saying he had been pretending that his damning characterisation was a verbatim reading of the phone call. He has also been criticised for claiming that his committee had had no contact with the whistleblower, only for it to emerge that the intelligence agent had contacted a staff member on the committee for guidance before filing the complaint. The Washington Post awarded Schiff a “four Pinocchios” rating, its worst rating for a dishonest statement. Reuters Trump impeachment: Who's who in the Ukraine scandal Lev Parnas and Igor Fruman Florida-based businessmen and Republican donors Lev Parnas (pictured with Rudy Giuliani) and Igor Fruman were arrested on suspicion of campaign finance violations at Dulles International Airport near Washington DC on 9 October. Separately the Associated Press has reported that they were both involved in efforts to replace the management of Ukraine's gas company, Naftogaz, with new bosses who would steer lucrative contracts towards companies controlled by Trump allies. There is no suggestion of any criminal activity in these efforts. Reuters Trump impeachment: Who's who in the Ukraine scandal William Taylor The most senior US diplomat in Ukraine and the former ambassador there. As one of the first two witnesses in the public impeachment hearings, Taylor dropped an early bombshell by revealing that one of his staff – later identified as diplomat David Holmes – overheard a phone conversation in which Donald Trump could be heard asking about “investigations” the very day after asking the Ukrainian president to investigate his political enemies. Taylor expressed his concern at reported plans to withhold US aid in return for political smears against Trump’s opponents, saying: “It's one thing to try to leverage a meeting in the White House. It's another thing, I thought, to leverage security assistance -- security assistance to a country at war, dependent on both the security assistance and the demonstration of support." Getty Images Trump impeachment: Who's who in the Ukraine scandal George Kent A state department official who appeared alongside William Taylor wearing a bow tie that was later mocked by the president. He accused Rudy Giuliani, Mr Trump’s personal lawyer, of leading a “campaign of lies” against Marie Yovanovitch, who was forced out of her job as US ambassador to Ukraine for apparently standing in the way of efforts to smear Democrats. Getty Images Trump impeachment: Who's who in the Ukraine scandal Marie Yovanovitch One of the most striking witnesses to give evidence at the public hearings, the former US ambassador to Ukraine received a rare round of applause as she left the committee room after testifying. Canadian-born Yovanovitch was attacked on Twitter by Donald Trump while she was actually testifying, giving Democrats the chance to ask her to respond. She said she found the attack “very intimidating”. Trump had already threatened her in his 25 July phone call to the Ukrainian president saying: “She’s going to go through some things.” Yovanovitch said she was “shocked, appalled and devastated” by the threat and by the way she was forced out of her job without explanation. REUTERS Trump impeachment: Who's who in the Ukraine scandal Alexander Vindman A decorated Iraq War veteran and an immigrant from the former Soviet Union, Lt Col Vindman began his evidence with an eye-catching statement about the freedoms America afforded him and his family to speak truth to power without fear of punishment. One of the few witnesses to have actually listened to Trump’s 25 July call with the Ukrainian president, he said he found the conversation so inappropriate that he was compelled to report it to the White House counsel. Trump later mocked him for wearing his military uniform and insisting on being addressed by his rank. Getty Images Trump impeachment: Who's who in the Ukraine scandal Jennifer Williams A state department official acting as a Russia expert for vice-president Mike Pence, Ms Williams also listened in on the 25 July phone call. She testified that she found it “unusual” because it focused on domestic politics in terms of Trump asking a foreign leader to investigate his political opponents. Getty Images Trump impeachment: Who's who in the Ukraine scandal Kurt Volker The former special envoy to Ukraine was one of the few people giving evidence who was on the Republican witness list although what he had to say may not have been too helpful to their cause. He dismissed the idea that Joe Biden had done anything corrupt, a theory spun without evidence by the president and his allies. He said that he thought the US should be supporting Ukraine’s reforms and that the scheme to find dirt on Democrats did not serve the national interest. Getty Images Trump impeachment: Who's who in the Ukraine scandal Tim Morrison An expert on the National Security Council and another witness on the Republican list. He testified that he did not think the president had done anything illegal but admitted that he feared it would create a political storm if it became public. He said he believed the moving the record of the controversial 25 July phone call to a top security server had been an innocent mistake. Getty Images Trump impeachment: Who's who in the Ukraine scandal Gordon Sondland In explosive testimony, one of the men at the centre of the scandal got right to the point in his opening testimony: “Was there a quid pro quo? Yes,” said the US ambassador to the EU who was a prime mover in efforts in Ukraine to link the release of military aid with investigations into the president’s political opponents. He said that everyone knew what was going on, implicating vice-president Mike Pence and secretary of state Mike Pompeo. The effect of his evidence is perhaps best illustrated by the reaction of Mr Trump who went from calling Sondland a “great American” a few weeks earlier to claiming that he barely knew him. AP Trump impeachment: Who's who in the Ukraine scandal Laura Cooper A Pentagon official, Cooper said Ukrainian officials knew that US aid was being withheld before it became public knowledge in August – undermining a Republican argument that there can’t have been a quid pro quo between aid and investigations if the Ukrainians didn’t know that aid was being withheld. Getty Images Trump impeachment: Who's who in the Ukraine scandal David Hale The third most senior official at the state department. Hale testified about the treatment of Marie Yovanovitch and the smear campaign that culminated in her being recalled from her posting as US ambassador to Ukraine. He said: “I believe that she should have been able to stay at post and continue to do the outstanding work.” EPA Trump impeachment: Who's who in the Ukraine scandal Fiona Hill Arguably the most confident and self-possessed of the witnesses in the public hearings phase, the Durham-born former NSC Russia expert began by warning Republicans not to keep repeating Kremlin-backed conspiracy theories. In a distinctive northeastern English accent, Dr Hill went on to describe how she had argued with Gordon Sondland about his interference in Ukraine matters until she realised that while she and her colleagues were focused on national security, Sondland was “being involved in a domestic political errand”. She said: “I did say to him, ‘Ambassador Sondland, Gordon, this is going to blow up’. And here we are.” AP Trump impeachment: Who's who in the Ukraine scandal David Holmes The Ukraine-based diplomat described being in a restaurant in Kiev with Gordon Sondland while the latter phoned Donald Trump. Holmes said he could hear the president on the other end of the line – because his voice was so “loud and distinctive” and because Sondland had to hold the phone away from his ear – asking about the “investigations” and whether the Ukrainian president would cooperate. REUTERS
Another participant in the meeting, Mr Parnas’ business partner, Igor Fruman, said his claim was false; the men never raised the issues of aid or the vice president’s attendance at the inauguration, lawyers for Mr Fruman said.
Mr Giuliani denied Mr Parnas’ contention that he had delivered the warning at Mr Giuliani's direction. “Categorically, I did not tell him to say that,” Mr Giuliani said.
The dispute represents the clearest indication yet that Mr Parnas, who was indicted along with Mr Fruman last month on campaign finance charges, has turned on Mr Trump and Mr Giuliani.
Mr Parnas and Mr Fruman, both Soviet-born businessmen from Florida, worked with Mr Giuliani for months in Ukraine outside normal diplomatic channels to further Mr Trump’s interests.
The men have been subpoenaed to testify before Congress, and Mr Parnas’ lawyer has said his client will comply to the extent he can without incriminating himself. It is unclear if Mr Parnas will ultimately be called to testify.
Mr Parnas’ account of the meeting, if corroborated, would reveal the earliest known instance of US aid being tied to demands for Ukraine to take actions that could benefit Trump’s 2020 re-election campaign.
It would also represent a more extensive threat – to pull Mr Pence from the inaugural delegation – than was previously known.
Mr Trump froze nearly $400m in military aid to Ukraine shortly before a 25 July call with the country’s president, Volodymyr Zelenskiy, in which Mr Trump personally sought investigations into the Bidens and claims that Ukrainians had meddled in the 2016 election. In the call, Mr Trump did not explicitly link the aid and the investigations.
Mr Trump has denied a quid pro quo involving aid, and Mr Zelenskiy has said he never felt pressured to pursue an investigation.
The meeting in Kiev in May occurred after Mr Giuliani, with Mr Parnas’ help, had planned a trip there to urge Mr Zelenskiy to pursue the investigations. Mr Giuliani cancelled his trip at the last minute, claiming he was being “set up”.
Only three people were present at the meeting: Mr Parnas, Mr Fruman and Serhiy Shefir, a member of the inner circle of Mr Zelenskiy, then the Ukrainian president-elect.
Rudy Giuliani reads texts suggesting Kurt Volker and the state department were 'all over him' to get involved with Ukraine
The sit-down took place at an outdoor cafe in the days before Mr Zelenskiy’s inauguration on 20 May, according to a person familiar with the events. The men sipped coffee and spoke in Russian, which is widely spoken in Ukraine, the person said.
Mr Parnas’ lawyer, Joseph Bondy, said the message to the Ukrainians was given at the direction of Mr Giuliani, whom Mr Parnas believed was acting under Mr Trump’s instruction. Mr Giuliani said he “never authorised such a conversation”.
A lawyer for Mr Fruman, John Dowd, said his client told him the men were seeking only a meeting with Mr Zelenskiy, the new president. “There was no mention of any terms, military aid or whatever they are talking about it – it’s false,” said Mr Dowd, who represents Mr Fruman along with the lawyer Todd Blanche.
In a statement on Friday, Mr Shefir acknowledged meeting with Mr Parnas and Mr Fruman. But he said they had not raised the issue of military aid. Mr Shefir said he briefed the incoming president on the meeting. Mr Shefir was a business partner and longtime friend whom Mr Zelenskiy appointed as his chief adviser on the first day of his presidency.
“We did not treat Mr Parnas and Mr Fruman as official representatives, and therefore we did not consider that they could speak on behalf of the US government,” Mr Shefir said. He added that Mr Parnas and Mr Fruman had requested that Mr Zelenskiy meet with Mr Giuliani. |
News analysis: Did Register fail to heed his own call for change?
Ever since his first interview with the Board of Education, Jesse Register has talked about the need for a central office reorganization.
Before interviewing with the district for the director of schools job, he told board members in December that he had examined a full version of the organizational chart of Metro Nashville Public Schools. The structure made little sense, he said at the time.
That message didn’t change after being hired in January. In fact, on his first day on the job, Register told The City Paper about the need to reorganize, and has publicly conveyed the same message since.
Late last month, Register announced plans to “fresh-start” much of the central office of MNPS, with all employees in several large district departments — including some of the district’s highest-level officials in curriculum and instruction, human resources, finance, operations and student services — being asked to reapply for their jobs.
However, when Register made public last week the first details of the reorganization, few changes were made. Most of the district’s highest-level leaders — many of whom have been in place since the administration of former Director of Schools Pedro Garcia — are staying more or less where they are.
For those who believe changes at MNPS must start with administrators at the top, the news was underwhelming.
“I don’t believe that those selections represent any kind of a change,” said Erick Huth, the president of local teachers’ union the Metro Nashville Education Association. Some teachers, Huth said, have interpreted the lack of change as a sign that Register is interested in “maintenance of status quo.”
Marc Hill, chief education officer for the Nashville Area Chamber of Commerce, called the details “reasonable.” But he’s waiting to see the results.
“It seems to be a reasonable approach. Pushing a large number of positions to the schools is a positive. The questions in any reorganization are, are the right people in place, and does the organizational structure allow talent to improve results?” Hill said. “Time will tell.”
Register never said he intended to swing the proverbial hatchet through the district’s central office, though many observers close to the system hoped it’s what he would do. He has told The City Paper consistently that his intention was to continue restructuring efforts made by the DOE, and that the most substantial part of the reorganization affects how schools work with the central office.
The intent, Register has said, is to change the district’s accountability structure so that principals and as-yet-appointed school improvement teams have the authority and flexibility to use resources based on individual school needs, with the administration holding those school leaders “highly accountable” for the results.
It’s important to understand that there still is plenty of room for Register to make big changes. He’s publicly emphasized the importance of a work group-based model for district reform, which charges groups of volunteers with studying — and possibly revamping — areas of district administration ranging from middle and high school reform to information technology.
And the biggest changes in Register’s organizational chart have more to do, so far, with the structure of the district than with the individuals named for specific jobs. The modified structure unveiled by Register includes big changes, the largest of which moves about $15 million worth of resources and more than 200 positions out of the district’s central office and into individual schools.
Board of Education Chair David Fox said Register has put in motion a “massive downsizing” of the central office, and engineering a “forklift upgrade” of the entire system. Moving millions of dollars of resources to classrooms is a “bold and profound change,” Fox said.
“Some people may interpret that the same names are his endorsement of the status quo. It really means he wants a more studied evaluation of the people we have,” Fox said. “A year from now, the organization is going to be unrecognizable. …The names on the various positions — that sorts itself out over time, as people demonstrate their effectiveness or ineffectiveness.”
In the last year and a half, unprecedented changes have occurred at MNPS. The district entered Corrective Action, and then Restructuring I, after failing for years to meet requirements of federal No Child Left Behind laws.
The Tennessee Department of Education has undertaken what is likely the biggest state-driven school system reform effort in decades, taking a significant level of control over the school system.
The district has seen three chief executive officers in the last year and a half — former Director of Schools Pedro Garcia, former Interim Director Chris Henson, and current Director Register.
Despite the changes, many of the district’s top administrators have stayed more or less in place since Garcia’s administration.
June Keel and Ralph Thompson have served, respectively, as associate superintendents for human resources and student services since Garcia was district chief. Sandra Tinnon, who was head of Garcia’s MNPS Department of Teaching and Learning, was reappointed through a state restructuring to the title of Assistant Superintendent for Middle Schools, a position she retains in Register’s restructuring.
Gregory Patterson, Garcia’s area director for the McGavock cluster and charter schools, was moved by a state restructuring into the position of associate superintendent for elementary schools, a job he keeps under Register’s plan.
Assistant Superintendent for High Schools Jim Briggs also received his current job title from the state DOE, and also remains in place in Register’s administration. Briggs was Garcia’s director of high school reform and innovation and head of the district’s high school redesign.
Tinnon, Patterson and Briggs all were appointed to their current positions by the DOE less than a year ago, and Register said in his public statement announcing the changes that he wants to give the three time in their current roles.
Though most of Register’s changes appear to deviate only slightly from the DOE’s reorganization, he does make a few moves. The most substantial change is the promotion of Linda DePriest from executive director of special education to assistant superintendent for instructional support.
DePriest retired from MNPS two years ago, before Garcia’s departure, and was hired back to MNPS by the DOE to lead a state-prompted reorganization of special education. DePriest’s work has been very well received by the local special education advocacy community.
Her new job in Register’s administration is as assistant superintendent for instructional support, a promotion from the executive director level of the organizational chart. Reporting to DePriest will be the district’s executive directors of federal programs, English Language Learning, special education and accountability.
Another change is a division of Henson’s responsibilities.
Henson, who worked as interim director of schools for one year, has been the district’s associate superintendent for business and facility services since Garcia was in office. Register’s reorganization divides that position into two jobs. Henson remains as chief financial officer, and Register is taking applications for a new chief operating officer.
Register also is hiring a professional accounting firm to restructure district business practices.
School board Chair Fox said these changes are noteworthy. According to Fox, he and others in Nashville had encouraged Garcia to create a COO position, but the change was not made. The new structure moves all of the district’s business and financial operations — including federal funds, an area the district has mismanaged in recent years — under Henson’s umbrella.
The position held by Kecia Ray, who was named associate superintendent for federal programs, has been moved down to the level of executive director by Register’s reorganization.
Register’s plan also includes Fred Carr, a former DOE contractor and colleague of Register when Register worked at Hamilton County Schools. Carr is Register’s assistant to the superintendent. Not on the organizational chart but still a significant part of changes at MNPS is John Norris, an independent contractor. Like Carr, Register and Norris have worked as colleagues for years.
The reorganization has only begun. Register has announced only who will fill the small number of positions at the very top tier of the district’s organizational chart, and the many other positions filling the central office — including the many positions effectively being moved from the central office individual schools — will be named by July.
But with Register keeping the same high-level department heads, and with those department heads helping Register make almost all subsequent central office restructuring decisions, personnel changes for existing jobs likely will be limited.
Whatever the impact of Register’s decisions will be, many folks will be monitoring the results very closely. And Mayor Karl Dean will be one of them.
Nashville will learn in late July or early August whether MNPS will be in a legal position that would allow Dean to be appointed trustee of the system — a role he has said he is preparing to fill. Register’s reorganization so far doesn’t seem to indicate that the mayor’s preparations have been put on hold.
Some, including the president of the local teachers' union, say Director of School Jesse Register has not followed through on promises of central office reorganization.
6 Comments on this post:
By:michael thomas on 5/18/09 at 6:48
YADA/YADA/YADA. ENOUGH SAID ALREADY THIS IS NOT NEWS, THIS IS MERELY THE SAME OLD BLUES.
By:artsmart on 5/18/09 at 7:36
Why did we pay for studies if you do not listen. I guess it was just a favor for some old friends. One of the main issues was lack of concerns about teachers opinions and fear of Central office. So what does he do he hires all the problems again.. I would like him to explain that. Just don't pretend you are going to do something . As foul as Pedro was he didn't care what anyone thought and he would tell you so. ,At least he was honest and there is something to be said for that. I still think it is time to hire someone from the private sector to run the schools, they understand needing results.
By:dogmrb on 5/18/09 at 7:57
Who do you think is stamping approval of his "change" but the CofC and Mr. Fox? If they aren't the private sector, who is? It's clear in the story that they agree with him and he's their man.
By:thefinalsay on 5/18/09 at 2:13
"Some teachers, Huth said, have interpreted the lack of change as a sign that Register is interested in “maintenance of status quo.” EXACTLY CORRECT.
"are the right people in place, and does the organizational structure allow talent to improve results?” Hill said. “Time will tell.” TIME HAS ALREADY TOLD WHAT THESE IDIOTS CAN DO. CAUSE FAILURE. WHY CONTINUE WITH THEM?
"Moving millions of dollars of resources to classrooms is a “bold and profound change,” Fox said." TRUE ONLY FOR MNPS, WHERE POLITICS HAVE FLEECED STUDENTS OF RESOURCES AND QUALITY EDUCATION FOR YEARS.
“A year from now, the organization is going to be unrecognizable. …The names on the various positions — that sorts itself out over time, as people demonstrate their effectiveness or ineffectiveness.” TOO BAD THIS DOESNT EXTEND TO BOARD MEMBERS. AND HOW MUCH TIME DO YOU NEED TO PROVE INEFFECTIVENESS? EACH OF THE ENTRENCHED HIGHER UP LEADERS HAVE HAD YEARS TO SHOW THEIR INEFFECTIVENESS. THE PROOF IS THE RESULTS OF THE DISTRICT; ABYSMAL. |
Monday, June 30, 2008
Those are my primary emotions today. I don't at all feel the need for an antidepressant, which I've felt like I needed for most of the time Max has been here. I was on Prozac for a few months, which made life tolerable, but also took away strong happiness and interest in life. Lately I'd been thinking I should go back on, but I just didn't want to lead a drugged life. If life (and it's not passing) is so horrible that you need drugs, it seems like there should be a change.
Ever sense the decision was made, I've felt like the need for an antidepressant is totally gone. Now, anxiety on the other hand...well, a lessening of the anxiety would be nice. But, I've also felt happy lately. I've enjoyed time with Davan and with Anthony and with both of them in a way I hadn't in quite a while.
I'm very anxious about the meeting tomorrow. I'm anxious about how our morning will go. Will we make it to swim lessons tomorrow? Max is supposed to have swim lessons all this week and next. Maybe we will or maybe he'll run off again. If he does, what will I do about it tomorrow? He's already going to SIL's house at 12:30 for the appointment, so, especially if swimming happens, there's not a lot of time that it's just me and the kids at home tomorrow. Whew.
And, of course, I feel guilt about what will happen to Max from here. Will he make it with another family? Will his life tank even more? Would it have tanked even if he'd stayed here? Will he bounce around foster care. I'm still also very anxious about telling him that we're not it for him.
Yeah. It's all the same questions. I hope he does okay. I hope he finds a home where he can feel like he fits in. Round and round.
Well. I think that Max moving out is going to happen sooner rather than later. My stomach is all in a knot again. I still think we're doing the right thing. I feel it more strongly, even, but I don't like the turmoil and grief. I feel very guilty toward Max - ambushing him with the news he'll be moving on. And, it sounds like, probably soon.
This morning I went to pick Max up from my SIL's house. We got home and I was doing some chores while he unpacked and tidied up his room a bit before taking him over for swim lessons. He became belligerent and started blocking my path, then swatted at the laundry basket I was carrying. I sent him to his room to play for a while, telling him that being agressive with me wasn't okay (calmly over the top of him going, "blah, blah, blah").
He started yelling in the doorway, so I said to shut the door. He yelled, "You can't trust me!" I said, "Fine. Run away, then."
"Who, me?"
"Yup."
Then there were noises of him kicking out the screen. Then he opened the door and said, "The thing is out and I'm running now!"
I didn't reply. I opted not to run after him. He returned in less than 10 minutes. I decided that the best thing was probably for him to spend the day elsewhere because he doesn't run off when Anthony is home. At least, not yet.
After calling around, my friend, Stephanie (wonderful person extraordinare) said that her family could take him for the day. Max was delighted at the news that he'd get to spend the day at their house. He really seems to love Parker, their college age son.
I called over to Barbara (case worker) to leave a message (she's not in the office today) telling her what happened and saying that I wasn't sure he'd be able to stay while another family is recruited after all because he's just not safe here.
I also called his therapist, which I was dreading because I know that she thinks we're ruining him and it brings up all my guilt to even think about talking to her. When I told her what was going on, she said some interesting things. I don't know if CPS will agree with her or not, but when I said that we'd planned on trying to be his resource family until an adoptive family was found, she said that she couldn't (even before today) see how that would work. She doesn't believe that he can just go from me being his mom to someone else being his mom. She thinks he should go to foster care so that he can be prepared for a new family. Strange. I was thinking that fewer moves were generally thought to be better.
At any rate, it's really looking like we're looking at days or weeks not months before he moves out. I don't know what that will look like. An immediate move? Some sort of transition? Waiting until there's a suitable bed available for him?
I guess we'll have some of those questions answered at tomorrow's meeting.
It'll be strange to have an empty bedroom. It'll be strange not to have a Sponge Bob Squarepants place mat at our table. It'll be strange to erase his name from our family's schedule board. I wish things were different.
It'll be good to have a break from the constant yelling. It'll be good not to worry about him running off. It'll be good not to worry about him hurting me or Davan or Anthony, but, frankly, I worry a lot less about that.
I wonder if his foster family will have room for all of his things. What will we do with his toys if they don't want them?
I think about the empty room and surplus toys and I wonder, strangely, about trying to do foster care. And then I think I'm crazy because we're not going to do that and why would I think about it before it's even over? I think because that's what I wish we'd done in the first place. It'd be easier to give up someone we loved to a marginal birth family than it has been to try to be a forever parent to Max. And then we'd have had the chance to sort of test ride with no real pressure because it wasn't expected to be permanent. But, how could we take it on again? Maybe after some healing, but I don't think Anthony would allow it.
I feel like I've done a lot of my pre-grieving. Like when a loved one is sick for a long time, by the time they pass away, while it's sad, you're kind of ready to move on. I feel like my adoption dream has been sick and I've grieved it. I'm mostly just sick about implementing the disruption now.
Sunday, June 29, 2008
Okay. So. I'm definitely not blase about this whole disrupting situation, although I'm sure we're making the right decision. I'm very tired all day because I can't fall asleep easily. And, when I wake up, such as to go to the bathroom, my mind is going around and around again.
I'm thinking about telling Max. I'm thinking about calling him Judea again. I'm thinking about the meeting on Tuesday. I'm wondering what will happen next. I'm wondering how long it'll take to find another family for him, if he doesn't go directly to foster care. I'm wondering how Max will take the news. Will he be mad and acting like, "Fine. I didn't want to be a part of this stupid family anyway," or will he be really hurt and sad? Probably both.
I'm thinking about what if he runs again. How will I handle that? I'd like to just ignore it, but he is seven and I worry about getting in trouble for "letting" him run free. Although, I had been thinking about letting him go over to the park by himself some over the summer...so how different is that? But, I also don't want him running off every time I need a break and send him to play outside or in his room. 'Cause, yeah. That's my main discipline technique with him - getting a break by having him play elsewhere. Harsh, eh? Although, for a kid with attachment and abandonment issues, I guess it is. But I can't let him just needle me until I break down when he's in a mood. And, there in lies some of our issues.
And, yeah. This whole abandonment issue thing? That'll only get better after we send him away, doncha think?
Still. I really think it's the right thing. I have hopes for him with a more compatible family. Or he might just not ever be okay. And maybe some of that will be because we gave up on him. But, it's the right thing for us. And possibly him, as well.
Max spent last night and is spending tonight again at my SIL's house. I know it's awful, but I don't miss him. I wish it were permanent. I guess that points toward disrupting being the right decision.
Max had a nice birthday party Saturday. His bio half-sister was able to come, which was good for him, even though it's always awkward for the rest of us. Three friends were no-shows (out of 8 invitees), so Anthony, myself and another dad filled out the team for laser tag. Honestly? I was glad it turned out that way. It was a lot of fun playing.
Max had such an anxious, needling us day before the party and after that we were very glad to see him go spend the night elsewhere. He does much better at other people's houses, so everyone is probably okay over there. We haven't actually heard, even though Anthony called over to check in earlier this evening and left a message.
Anthony told his sister when he dropped Max and Conor off after the party. SIL told him that her kids had been saying I'd turned mean, but I used to be nice. This was supposed to be a supportive about disrupting comment, as it indicated the effect he's had on us, but, sadly, it's hard for me to take that way. I do know I've been a lot harsher with those kids sense Max moved in, especially the middle one, who has a lot of behaviors in common with Max.
I pick him up early tomorrow before both he and the cousin's have swim lessons (at different pools). And then it's on with our week.
Friday, June 27, 2008
In spite of everything, Max had a good birthday today. He had a special breakfast of an egg/sausage sandwich and apple sauce with cinnamon. He went off to camp with a lunch of a turkey sandwich, Peanut Butter Cups, Teddy Grahams, and Doritos. Not a fruit or veggie in the bunch, much to his delight.
After school he had some chocolate milk, by his request. Then we were off to dinner at Red Robin where he chowed down on mac and cheese, steak fries, and a chocolate shake before having a few bites of his birthday Sunday and being too stuffed to continue. Lots of eating today. That makes it special for him.
Then he got to open presents - basketball shoes, a basketball drawstring backpack and a basketball headband from us. Davan added to her Spiderman lunch stuff with these cool popper things:
He also got gifts from my parents and my MIL. Tomorrow is his party.
Meanwhile, we're getting the usual behavior of delaying, nonsense questions, non-stop talking/singing/noise making, etc, etc. All the usual without any of the extra-ordinary (like running away).
He has no idea that things are going to be changing drastically for him. That's how it should be on his birthday.
We had a brief meeting with our case worker today. Barbara was amazingly supportive and validating. She said that she felt we'd done everything we could possibly do for Max. That she felt like we'd worked as well as we could with her and as well as we could with his therapist.
Wow. I didn't expect that. It felt good. And what I needed to hear. I hope she really meant it.
I've been feeling a mixture of relief/anxiety/guilt today.
We have a meeting between our case worker and Max's therapist Tuesday. Possibly Max's therapist will come or attend via phone. I'll know more about what will happen next after that. At this point, what I think will happen is that he'll continue to live here while a new adoptive family is recruited. However, I'm not willing for him to stay for an indefinite amount of time and I don't know how much time they'll need to get together new families. So, we'll see if that works out or not.
I told Max's therapist today that we can't be his growing up family. I know she was very, very disappointed. It was very hard. I cried big time for the first time sense deciding to disrupt. It'll be worse telling Max. Someday. Not today. It's his birthday.
We'll have a meeting with therapist and case worker next week and see where we go from there.
Thursday, June 26, 2008
He's back now, but it was pretty ugly. He ran away. I found him. He declined to come home. Then he came home, but just to get something. He was going right back out. I told him that wasn't going to happen and he flipped out. I had our case worker on the phone and Max threatened to smash my face with a chair he was brandishing at me. Kept making dashes for the door, enjoying the chase thing. We ended up in his room with me sitting at the door and him throwing stuff at me - blankets and trading cards, but then threatening me with his football (real - not Nerf). I removed the football and myself and parked myself outside his window because that's how he left last time - two weeks ago today.
He attempted to come out the window, but rather half-heartedly. In fact, most of what he did was half-hearted. He ran away to our near-by park - exactly where I expected him to go. He never really left again when I told him to stay. He didn't actually attack me with any of the heavy items he threatened. So, yeah. I could take that as a good thing.
Anthony came home and the situation immediately de-escalated.
I know that some people can handle kids with attachment issues, but I have to admit that I'm just not one of them. I don't feel comfortable with the issues Max is presenting. I don't feel comfortable with how these issues are affecting my family and me. I don't want to have to take an anti-depressant just to be able to muddle through an unhappy life. I am done. Yes. Done. I know. Yes, we'll be judged for not sticking by him. When we said we'd adopt him, we were making a life time commitment. It's awful that we said it would be forever and it won't be. It'll make things that much harder for his next family.
But. I feel like we'd be choosing him over our family's mental health and possible physical health. Regardless of what his therapist says, a lot of kids don't get better when they have attachment issues. I've been doing a lot of reading. I know I won't be a happy person to have to limp along like this. It's not the family I want for Davan. Or me. Or Anthony. Or Max, for that matter. I don't think he'll get better in a family where he's not liked. And the truth is, I don't like him and really haven't sense he moved in, other than a few spots here and there.
He's not out the door tomorrow. For one, that would be cruel, as it's his birthday. However, we will start the ball rolling. We might foster him until an adoptive family can be found. Maybe he'll move to a therapeutic foster home. Maybe it'll be decided that he should just go to a regular foster family for a while. Maybe he'll blow out of here and have to go to an emergency placement. I don't know. But, I do know that this will not be his growing up home.
I feel mostly relief to be finally moving in that direction. However, I also have a ball of worry about telling him. I'm, frankly, not happy about facing his therapist with this choice. She'll be very disappointed. I worry that he'll bounce around foster care until he ages out. But, I won't let him take us with him. And that's that.
I pick Max up Tuesday afternoon and he has with him....his towel. In the morning I'd sent him with a sack lunch (Getting the sack back would be great, Max! We're getting low.), a swim suit, goggles and a towel. Plus, ya know, he was dressed. He was still dressed when he came home, in addition to having the towel, so there's that, I guess.
He told me he'd lost his swim suit and goggles because there was a hole in his bag. He was using a plastic Target shopping bag after having left his backpack in the front yard in a fit on the last day of school. Apparently, on the way to lunch, they'd fallen out of his bag. Now. I can actually see goggles falling out of the hole, but it's a bit of a stretch to imagine the swim trunks falling out. Any-who. He was all pissed that I made him wear his swim trunks to camp the next day. I told him he could change into dry shorts when he got home. They swim at the very end of the day.
We get to camp Wednesday morning and the councilor says that he knew he'd lost his swim trunks, but he'd let her believe he'd lost them after swimming. He even went back into the locker room to try to find them. Funny, that. After all, he'd lost them well before swimming and had swum in his shorts. Finding his swim trunks in the locker room seems like it might not quite work, if you know what I mean.
Wednesday was field trip day. They went to a park where they ate lunch and played then went to Skate World to, you guessed it, ride motorcycles. No, really, it was to skate. Max met me after camp with swim trunks from the day before in tow and the orange slices from his lunch (which he attempted to leave behind on the ground) that he'd made a nice juice out of. Oh, yeah, and his towel. The councilor had found his swim trunks in lost and found for him. She seems like a nice girl.
Max told me excitedly that he'd eaten all of his lunch except for the oranges. He hungrily scarfed down a banana in the car on the way to the park where the kids and I were having a picnic dinner (Anthony came home late last night due to a retirement party at work). He then proceeded to work his way through his share of dinner (minuses the corn on the cob and salad) and complain mightily about not having any more to eat.
Now, this morning, it all makes sense. His councilor greeted him this morning with, "Is that your lunch, Max? Don't loose it today!"
Max admitted to loosing his lunch. "My backpack was open and I didn't know how to close it!" he angrily accused me. He said that a friend had shared lunch with him. I told him, in front of the councilor, who nodded along, that his lunch was his responsibility. It isn't okay to eat someone else's lunch and, if he looses it again, he'll just have to wait until he gets home to eat more.
A couple of loose ends about it all, though, are that he found those orange slices, which were his, in the van. How did those end up out of the lunch sack I'm wondering? And, this morning, he thanked me for the Sun Chips I put in his bag. So, did he eat all the "good stuff" out of his lunch and then "loose" it? I don't know.
I'm also worried for Davan's sake. She got him, with her own money, a Spiderman reusable lunch sack with two Spiderman containers, a set of Spiderman sandwich baggies and a Spiderman water bottle for his birthday tomorrow. She's so excited to give them to him in the morning so he can have his lunch packed in them for his birthday. I have fears that he won't bring them home, either, and she'll be disappointed. I did warn her that could happen.
She's been excitedly planning how she'll present them for days now. Yesterday after messing with them a little and talking about how fun it'll be, she said to me, "I do hope he at least brings them home on his birthday. Although, I suppose it shouldn't matter to me."
What great opportunities Max provides for learning about disappointment. Yeah. That's why I wanted a second child in the family.
Tuesday, June 24, 2008
Max is off to day camp every day this week from 9am-4pm. I'm happy to have the break. Davan is happy to have the break. Max is happy to be at camp, but unpleasant at home. More than usual.
Yesterday I went to pick him up and he tried to climb onto the tandem even though I wasn't holding on to it. Even after I told him we weren't ready for that yet, he tried still until I pulled him back. Great start to the afternoon/evening.
He then greeted me with complaints about not having a snack. He did have snacks. He'd decided not to bring the food he had left home, which left him out in the cold when everyone else broke out snacks while waiting to be picked up. We went to look for the food, but, apparently, he'd left it in the boys locker room, where I couldn't go and he couldn't find it. He did, though, throw rocks at a post and into the grass at the pool while we were looking around and had to undo that, causing lots of stomping, huffing and defiance.
We got back home later than I'd told Davan we'd be back, causing her to worry. I sent Max outside with his soccer ball to burn off the antsy feeling he had from working so hard to be good all day while I played a game with Davan.
When I told Max he could come in, he kicked the ball over the fence and then came in. My MIL was over for dinner. Max came in and bellowed from the entry way, "The ball went over the fence!!!" then whispered, "Can I go get it?"
I ignored this, as he's supposed to come to where I am to talk to me, causing MIL to say, "Didn't you hear him?" I explained that I was waiting for Max to come to me rather than bellow and she rolled her eyes at me. Rolled her freaking eyes. Yeah. Like I need censure, too.
I said to Max, "If you want to talk to me, I'm in the kitchen and if you're going right back out, you can leave your shoes on."
He came in after a bit, no shoes, to ask if he could go get the ball. I told him, "Sure!"
When he came back in and meandered into the kitchen, I gave him a big hug before reminding him to unpack his bag from camp. He partially did it. Then yelled at me for insisting he do the rest. Then didn't do it. Then yelled some more. Then screamed, causing him to be put outside. He fought me. Even though he can come right back in if he's done being loud.
He came back in and still didn't take care of the rest of the bag, getting all out of sorts and huffy when, again, told to do it rather than answering a question he'd come up with. And on and on.
I went grocery shopping with Davan after dinner. She was anxious to get away, as well because he was "invading her personal space even though she asked him not to."
This morning's highlights include banging on the wall to wake Davan, lot so fun passive agressive behavior, yelled, defiance and, to top things off, hitting me. Yeah. We seem to be going way backward on the whole hitting thing.
Sunday, June 22, 2008
I fluctuated back and forth this weekend about to disrupt or not to disrupt. Yeah, I know, I'm always having this crisis. Well, the fact is that Max is always here and always causing me to question what's best. Even if he did leave, I'd be wondering if it were the right choice. So live with it. Or don't read. You're choice entirely. :)
Anyway, we went off on a spontaneous camping trip. We up and decided to go after a leisurely breakfast and sleeping in on Saturday. Max wanted to go camping. Just so you know.
We're getting ready to go and he goes by and grabs a left over pancake. No big deal. Fine, in fact. But, when I walk into his room to help him pack for camping, he throws it down in the corner and tries to hide it. It's amazing how that little act really pushed my buttons. We seem to have started a down hill slide there.
I finally sent him outside to play until we were ready to go. He called from there to ask if he could to go church with the cousins tomorrow. Yeah, sure, we'll just get up before dawn to hike out and drive back so you can go to church. I mean, really, we were going camping - backpacking even!
I just don't feel warmly toward the kid. I spent most of the hike in mulling over how much less pleasant family life has become sense he moved in. We had a whole confrontation over him not staying on the trail. It lasted a very long time. It was stupid. It seems like all our confrontations are about stupid stuff.
Before we got into the tent last night, we had a little affirmation circle (me trying to turn things around). Each family member stood in the circle of the other family members in turn and got to hear nice things about themselves. It went pretty well. It was hard for everyone, it seemed to come up with stuff for Max and his stuff for us was...well, non-inventive, but it went well overall.
We all got into the tent feeling loving. Anthony mentioned that if anyone (one of the kids he meant) had to go to the bathroom during the night, they should wake him up. Max was loud and moving around, but we just let it naturally come to an end, which seemed to come faster than if we'd made a big deal out of him not being loud. All was well.
This morning, Anthony went to cuddle Max when he woke up - Davan and I already having left the tent for the morning bladder dump - and found Max soaking wet. He'd peed in his sleeping bag. Now, he says that he did it in his sleep. But, let's face it. That's very likely not true. He has only peed once in his sleep sense he arrived and that was at the very beginning and I'm not even totally convinced that was in his sleep. We've camped before - several times - with no peeing during the night. It seemed rather purposeful.
So, with nerves on edge, we went into the day. Max passive aggressively refused to help patrol up the camping areas for trash or belongings that might have been left behind, causing him and Anthony to have a big blow up.
Yeah. All isn't well. If he does stay in our family, we need more therapy. Or something. I don't know. The book I'm currently reading says that if we react aggressively toward him, it means that we're dealing with baggage from our own childhoods. But neither Anthony nor I had abusive or even rough childhoods. That doesn't make sense to me. And our aggression wasn't triggered by Davan's early childhood issues. It seems like it's something else.
Not that we're hitting him or anything like that. I just consider loud-in-your-face yelling and grabbing to get his attention/move him to be agressive. That we do. It's not pleasant for anybody.
Friday, June 20, 2008
Okay. So, part of the reason why, even though Davan is/was a challenging kid but I still love her and am willing to work with/around her is reciprocating love. Absolutely. This I knew.
What I knew subconsciously, but hadn't really put into words about why it's different, though, is that Davan wants what she wants the way she wants it because it (whatever it may be) is important to her for some reason. I may not agree with the reason, but it's there and big for her. This is hard, but I can live with it and even respect it.
Max, on the other hand, wants what he wants because it makes life more difficult for us. For example. He has both gel and lotion to apply for dry skin. The gel is for after his bath, as it's supposed to be good to put on when slightly damp. The lotion is for non-bath nights. Max started making a big deal out of wanting to put gel on all the time because the lotion is cold/makes him itch/hurts/whatever. So, we decided that he could just use the gel. No big deal. This was after sticking with the lotion for a while.
This evening, we announce to him that he should feel free to go ahead and use the gel even though he hasn't showered. "But will you still buy lotion for me?"
"Not if you're only using gel."
"But what if I want to use lotion?"
"Max. Use the lotion or the gel. If you run out, we'll get more. We don't care which one you use."
He used the lotion. So. Was the issue really the lotion? No. It was control. Max wants what he wants because he wants control.
Why was it okay for Davan's bedroom to be messy when she was younger (She keeps it quite neat now.) but not okay for Max to have a messy bedroom? Because for Davan, it was about playing and not wanting to put a set up away because she wanted to go back to it later. The messy bedroom still bothered me, but there were reasons. But for Max, it's because he wants the control. He doesn't even go in there to play - unless it's to shoot hoops (he has an indoor hoop). But, he'll go in and mess it up. Because he wants the control.
It seemed like we had a period of time - December through about mid February - that was a little better. Max seemed a little more at ease. And then it all blew up again, culminating in the week from hell last week.
This week has been better than last week, but still feels many steps back. Max is getting violent again. He has tried to hurt me more than once. No hitting, but elbowing, squeezing my hand as hard as he can, twisting my arm. He seems to be acting very, very young again. Today he was playing with a 3 year old at indoor play park at Davan's gym. They seemed pretty on par.
We were at Target yesterday. He told me, "I really want to steal a candy bar. I want to pick it up, put it in my pocket where no one can see and then run out the door." I said, "Well, thinking about it and doing it are two different things and, as you haven't done it, I'd say you're on the right track."
But, then he went on and on about wanting to steal stuff. So, we left without looking at toys because, well. I'm not going to take a kid who really, really wants to shoplift through any more of the store than necessary.
We had to go back to pick up a prescription a while later and I kept him with me, even though Davan got to go off and look at a couple of things close by that she wanted to see. He was very angry about that. Yeah. Again, I'm going to let a kid who wants to shoplift out of my sight at the store?
A (therapist) thinks that his inhibitions are still somewhat missing, and thus the running commentary about stealing at the store, as well as other things. Okay...so, is this a permanent thing? The drugs are out of his system now. If it was drug related, then why are the inhibitions still not in place?
-------------------------------------------
Last Friday he took a giraffe from A's when we were there. I'd taken it back from him and put it in my in-box to return. He stole it back from there earlier this week. When I told him he had to give it back, he dragged his feet. So, I gave him a time limit, after which we'd have to search his room, which involves dumping things out and he has to reassemble. Actually, the first time we did that, Anthony and I helped. This ended up being the second time.
He continued to drag his feet, stringing things out until the very last bit of his time. Then it turned out that the giraffe wasn't where he'd thought it was, so he ran out of time. We still searched his room, even though the giraffe turned out to be in the wash. If he'd gotten in and looked for it and then realized it was in the laundry without the time limit, we wouldn't have done the search.
The search turned out to be pretty easy to undo because his shelves were in such good order from the last time (meaning he hadn't played with any of that stuff) that we just visually inspected them and only dumped containers. He, of course, was still quite mad while putting his room back together - banging around and crying.
The search happened today. Afterward, as it's Friday, he got the black box back. I wasn't home for this, but at one point, because he was mad about Anthony asking him to not yell so loudly in the kitchen and Anthony backing it up when he wouldn't stop by taking a minute off the time Max had to take care of the black box, he told Anthony that he was all done with the black box. Anthony verified, "So, all the stuff that's still on the floor you don't want and is going to Goodwill?"
"Yes."
There was a lot of stuff, including, but not limited to, two light sabers, a bunch of Sports Illustrated for Kids magazines, a pair of boots (that he doesn't like), some clothes, some Playmobile stuff, a sports headband he'd bought with his allowance, and, sadly, both his cleats and his baseball glove. The cleats I think he is close to outgrowing, so I'm not overly worried about them. We replace things when they are outgrown.
The glove, though, was a present from my step-dad, probably Max's favorite person in our family. And it's a very nice glove. I'm heartsick about it. We can't give it back to him, but I hate to let it go.
Max was very angry when he realized what he'd done. For a little while - like 5 minutes. Now he's just fine. No big deal. Whatever.
Wednesday, June 18, 2008
Contrary to what Max's therapist, A, thinks, Davan has not always been a model child. She still isn't, really, but she is a great kid and does listen to reason a lot of the time. Of course, she is also very anxious and doesn't like to be away from me at all, really. She is highly sensitive and will inevitably be the one with hurt feelings if playing in a group. Still, I agree that she's a great kid.
However. That wasn't always so. In fact, she was a challenging baby, toddler, preschooler, right up to about 7 years old. I remember the feeling coming over me when she was 7 of, "Wow. I really like this kid. I'm glad to have her around and share my day with her." It was a new feeling.
Based on what a rough time we'd had pre-7, we had planned on adopting an older child. Why didn't we stick with that plan? What in the heck was I thinking agreeing to look at younger children? Well, I do know, but I was clearly out of my mind. We thought, "Young kids get older and if they are with us from younger, we'll probably like them better when they're older." I'm not sure this is sound logic, though, considering that I'm having a heck of a time being around Max and I'm sure he must not feel very loved and, therefore, not necessarily getting what he needs to turn into an older kid that I like. I digress, though. Really, I was posting about Davan's early childhood.
She was colicky as a baby. She started with separation anxiety at about 2 months and it went until...well, she is still often anxious about being separated - case in point, the fact that she cries when I drop her off at gymnastics. She wanted Mommy all the time. She hated to be set down. She preferred to nurse pretty much the whole time she slept. (Yeah - we didn't do that one, but it's what she wanted.) Even just holding her was usually not enough. She wanted to be jiggled, walked, rocked, nursed.
As she moved into toddler-hood and into play, it was necessary for her to have an engaged play companion at all times. We read a lot because she enjoyed that and I didn't have to play "little people" all the time. She hated videos or TV, so using the electronic baby sitter was not an option. She loved to swing, so we spent a lot of time at the park. I did get her involved in chores - dishes and cooking. She rode in a carrier for things like vacuuming. I didn't totally just play with her, but we were always engaged, even if we weren't playing.
The preschool years were much the same. She was so demanding of my time and attention that, even though we were quite poor, we made room in our budget for a mother's helper. At first, I had to play with them, but eventually, she'd play with her mother's helper while I was just around. Finally, she was able to be left on occasion, but it was necessity that brought that around. We were in a car accident - I was the only seriously injured one. I had regular doctor's appointments for a while. Davan had a doctor phobia. It was a tough call for her, but staying with her mother's helper was somewhat better than going to a doctor's office. By preschool age, though, she'd occasionally watch a video, which helped, although I'm not big on the electronic baby sitter.
Speaking of the doctor phobia, her pediatrician when she was 2 remarked that she'd never seen a child so unable to calm down for a physical and finally just did stuff while she screamed.
That aside, outsiders mostly though that Davan was a happy child. And she was. Because I played with her all the time more or less. When other kids wanted to play with other kids, Davan still wanted me, Anthony or my mom to play with her. Or her mother's helper. That was about it.
One time, when she was 3, we went to visit my best friend who was living in Colorado at the time. Davan was so miserable to be around that Chris didn't really like her and I cried a lot because it was so stressful. Of course, she was away from home, away from her Dad, and I was trying to spend time with Chris instead of tending to her full time.
When she was 3 1/2, I took her camping by myself for a few days. That was a hard trip. The constant talking got to me big time. One time when we were showing, I set her up in the shower next to mine so I could get a little break, but she sang loudly the whole time.
She went through a stage where she stole stuff. It was always little - one small ball out of hundreds at the local science museum, an extra game peg off of a game at a restaurant we went to - that sort of thing. It passed, though.
She went through a stage where she lied. It also passed.
What I was thinking was this: she was no easier to live with than Max is. I can even remember telling my mom once that if I knew for a fact that she'd be happy elsewhere, I'd consider sending her away. She was so hard. But, I also knew that she wouldn't be happy elsewhere. I knew in my heart that we were doing the right things for her.
It's different with Max. I don't have the love that I always felt for Davan no matter what. Even in her hard stages, if she was gone, I missed her and worried about her. I don't feel that way with Max. Even in her hard stages, I got warm fuzzies from her. Even when Max tries to give warm fuzzies, I don't feel it. I don't know that we are doing the right things. I can't get myself to play with him the way that I did with Davan when she was little and needed it. Even when we do play, he will still find ways to push me away, although he loves the play and attention.
Well, and, it's also different because his lying is different - it's pervasive and is lasting a long time. His stealing is different. It's also little token type stuff, but it's so much more than Davan ever did. His bids for attention are so often negative instead of looking (constantly!) for positive attention.
Maybe truly all that is needed here is time. Maybe when he is 10, I'll think he's a great kid, too. However, I'm not sure he'll get to 10 unscathed. I think that Davan always knew that I loved her and wanted good things for her no matter what. I don't think Max feels that unconditional love. I know for a fact that I don't feel it to offer him.
So, again, I'm back to: Where do we go from here? What is best for Max? What is best for the rest of us? If I'd had another bio kid and he/she was just like Davan, would we be having the same time of it that we're having with Max? Should I be doing things differently? If so, what?
Okay, I know some stuff I should do differently. I do put him down sometimes, for example....
Yet again, I've rambled on. If you've made it this far, you're a trooper!
Max is off spending the night at Stephanie's house. I wish I could say I miss him. Really, though? I'm thinking what a quiet morning and kind of dreading tomorrow morning. I don't think it should feel this way.
When Davan was littler and we didn't get along so well - yes, it happened regardless of Max's therapist thinking we have the perfect child in her and that's why we're having a hard time with Max - when she'd spend the night at my mom's house, I did miss her and waited for her return. I worried about how she was doing while she was gone.
I am a little worried about Max, but I'm worried that he's getting away with manipulation (Stephanie's family is all very nice and accommodating - which is why there was the offer of respite!) and will be harder to deal with when he comes home, not that he's having a rough time of it.
Max's therapist, A, mentioned that when we dropped him off with her on Friday that it was a good sign that he was concerned about us walking out the door without him. I really and truly think he was concerned that we were going to go out to lunch without him (which we actually did do) while he had to answer difficult questions (which, apparently, he didn't because with him working so hard at home, A thinks he needs therapy as a chance to just dump his feelings rather than do more work).
My feeling that he cared more about what we were doing rather than that we were going was backed up by the easy way in which he went off to respite care yesterday. He wouldn't have hugged me if I hadn't initialized. He went off with nary a backward glance.
When I told him that he was going to go a couple of days before, he thanked me.
Now, do I think he has some feelings for us and some worry about being away? Yeah. Some. I know he was thinking about it yesterday. There was some anxious behavior. Although, I also think he was maybe a little anxious that it wouldn't happen for some reason.
Anthony says that when I'm out of town visiting my best friend, Max does genuinely seem to miss me.
Here's the thing. I think he used to be more anxious about being separated from us. I think he's less anxious about it now. I think his attachment is lessening. A thinks he mirrors my feelings about the adoption. This could be true. I've felt more hopeful at times. Now I feel very ambivalent. I really think I'd be okay if he left. Guilty, yes, but okay. I'd feel really okay if he went to another family and it really worked out.
A tells me, though, that this can't and won't happen. She says that he won't be able to attach again, even as much as he did here, if he moves. She says he wouldn't have attached anywhere better than he's doing here. I just don't believe her. Why? If he had a more harmonious home life - watched sports on TV, video games okay, parents expecting kids to act like kids (talk back, fuss about chores, etc), ate foods that he likes - he'd have attached better. Maybe not. But maybe.
Also, I've joined a list serve for families thinking about disruption. There are a lot of families on there who have disrupted, as well. There's a thread right now about kids doing so much better in their next family. If there are families that have disrupted who's kids aren't doing better, they aren't speaking up.
Monday, June 16, 2008
The kids are fighting. Max is being nearly constantly loud and obnoxious. I'm constantly deciding if I'm going to intervene in his behavior. Most of the time it's no, but it's draining none-the-less because I'd like to intervene more. Most of the time ignoring seems to be the way to go, though.
We have a busy day, which I'm glad for. It should mean less head butting between Max and I and between Max and Davan. We're off to Girl Scouts shortly, then we'll have swimming directly after. Each child has two friend coming over after swimming and the play dates will continue until our Girl Scout end of the year event this evening, after which it will be time for Max to go to bed. Whew.
Tomorrow is quieter, but still somewhat busy with book group in the afternoon (Davan is almost done with the book, but Max is no where near and needs it read out loud. Thus, if he wants to be able to discuss it, he'll have to have a lot of reading time tomorrow morning.) followed by gymnastics for Davan and a respite night at a friend's house for Max. We need it. Thanks so much to Stephanie, friend extrodinare.
This morning I went in to get Max up and he appeared to be asleep, but fully dressed. Meaning he'd gotten up and dressed sometime in the night. Morning? Night? Don't know. Why does it matter? Well, Max has rules about getting up at night. If it were morning and then he went back to bed, so be it. However, if he got up and got dressed last night because he was unhappy that his pj top is missing, well, then that's a different story. Sigh. And then I feel like a total control freak. Which I don't want to do. What does it really matter? But it does if he's defying us by getting up when he's not supposed to. So, either he needs to not go back to bed once he's gotten up so we can tell what has happened in the morning and what during the night or it needs to not matter.
I know which is easier, but easier isn't necessarily better. Sometimes it needs to be hard. Easier is to just let him not do chores, for example. Easier is to ignore it when he is nasty to me...maybe that is better. I don't know. I wish I had the answers.
Sunday, June 15, 2008
Happy Father's Day, Anthony! I'm a lucky woman. Anthony is a good man. He is a very involved father and an amazingly patient and supportive husband.
It's Father's Day and we are celebrating him....he is choosing the food to eat all day and we are having quite a bit more junk food than usual today, which everyone is enjoying. Although, we did still have fruit with our (whole spelt flour, low sugar vegan) cinnamon roll breakfast and salads before our "chicken" nugget and tator tot lunch. We're going out for pizza tonight. Davan and I will get a veggie with no cheese, but the boys are having a couple of meets with their cheese.
Davan made a present for Anthony at Girl Scouts and did a custom card for him. Max scrounged up a picture he'd draw the other day to give to Anthony. From the family, he got some bike parts.
However, after coming off of our seriously stressful week with Max's various abuses of me, Anthony is the parent in charge this weekend. I'm around. But, I've taken some major steps back from parenting Max in particular this weekend. Anthony is off on a one on one bike ride with Davan right now. He'll do something with Max when he gets back. He does need time with Davan, too. She needs her dad.
Anthony still has to call his sister to ask about Max having regular sleepovers (respite care), but I've already talked to a friend and Max is spending the night at her house on Tuesday. We're still waiting to hear from Barbara about some more long term (a week, please) of respite through foster parents.
Friday, June 13, 2008
Max regressed big time this week. He ramped up last week, but this week was one thing after another all week. A few highlights:
-non-stop noise - he even hummed while he was eating
-nasty back talk to 90% of what was said to him (by me, at least)
-eating other kids' lunches at school (last day of school was Wednesday)
-blatant cheating at games
-just deciding he didn't want to hold his penis while he was peeing, resulting in pee all over his undies and the bathroom, then just going back to bed
-sticking a walnut up his nose
-physically intimidating peers
-elbowing me when passing by
and my personal favorite:
-popping out his screen and going out the window in the middle of my last game day because I'd told him he couldn't go to the park in his socks
Today, I have to say, was better. More back to the normal unpleasantness with some okayness in between. Why? Well, we tried Zoloft.
Apparently, Zoloft sometimes has an adverse reaction in boys with fetal alcohol stuff. It makes them lose all of their inhibitions. He didn't take it today. And he was better. Interestingly, Max told fewer lies this week. He pretty much came clean about stuff when asked about it. There were some lies, don't get me wrong, but often he'd just say what had happened.
It's been enough that I called out case worker and said that I do not want to finalize the adoption. I was actually worried that we were too far along, but we haven't had the ceremony yet and, apparently, that means we're okay.
I'm willing to try to make it a go with him still. However, I don't want to be stuck holding the ball if he turns out to need residential care. Or if he turns out to really not be able to be a member of our family.
I also want respite care. I want a week or two this summer. I want, in addition to that, him to spend the night with family or friends once a week.
It's been a long, hard year and a half. This week brought home to me how much we're living from crisis to crisis with Max. I don't want to be solely responsible for him. I want the state to still have a vested interest in him. We'll do long term foster care, but I don't know that I'll ever want to finalize the adoption. I want options. If that means that the state wants to find a new home for him, so be it.
On the flip side, I've done a lot of talking with his therapist over the last couple of days, as well. She continues to say that I'm the best mom for him. She says that he can't attach again if we kick him out. The stickee on his sticker is about gone. No pressure, though. (Not really on the no pressure part - there's lots of pressure to keep him.) She recommends that we get respite (I'd come up with that on my own, too) and that Anthony be the parent in charge of him whenever he's home. I'm trying hard to let that happen.
This is not the main thing on my mind, but I don't know how to blog about the main thing. I don't know if I will ever be able to. It's just too hard. So, right now, I'm keeping it as a rotten egg in the middle of my mind with other thoughts running around the outside.
I'm thinking tomorrow might be my last game day. I've done it for, I'm thinking, nearly 5 years now. I've loved it and I really enjoy all the people who come. However, attendance is dropping. Davan's gymnastics schedule is increasing. Several of the "kids" are now adults and moving on. I think it might be time to let it go.
I'm sad about this. I will miss it, but I think it's probably what should happen.
Max is off for his last day of first grade. Let's hope he lasts the day. I don't think anyone is really trying anymore to make it work.
I'm in tears off and on. He's regressed so much the last day or two. He squeezed my hand in an effort to hurt me this morning after elbowing me as he passed out the front door this morning. His attitude has been one of defiance and non-compliance basically 24/7 for the last few days, where as, usually, it comes and goes throughout the day. And, starting tomorrow he'll be doing 24/7 at home. For a week and a half. Until his first day camp starts.
And we'll be lucky if the day camp is a go. I got an email a couple of days ago that there were not enough kids, at this point, for the camp to go. I sent out word on my homeschooling lists, hoping for more people to sign up, but we'll see.
We can't afford to put him in all day daycare. And he probably really needs the home life. But. But, it's awful to have a child that rubs on you like sandpaper home all day. And, when he's like he's been the last couple of days, it's more like a cheese grater rubbing on me all day. So, what do I do?
Sending him to his room at the first infraction and having him stay there until Anthony comes home is sounding more and more appealing. Yeah. This is a great home life for us all.
In spite of the fact that he had field day today at school, he ran out of the classroom for the first time in months. The school called. It was right at the end of the day, so they wanted to know if they should just put him on the bus like usual. Yeah. Do that. Sigh.
In spite of the fact that I greeted him cordially and then took him over the the park to run after the aerobe a bit, then read to him and Davan, then played with Playdough with him, then wrestled with him, then read him a book alone, then started a game of Mancala (which we had to end due to blatant cheating), he's been a shit all day.
Even when I try hard. I do stuff with him, he's a shit. I don't because he's a shit and he's a shit. Excuse the language, please. I'm off to plan my escape.
Max is having a rough time of it. The last week or so - pretty much from when he asked about if he'd be going to his school again next year - has been more rocky than usual. He's having a hard time at school, coming home with poor reports for the day. He's having a hard time at home. Man. Yesterday was really bad. I even took him to the park for 45 minutes to run around, playing Aerobe with me (just me - so it was one on one time in addition to exercise) and he was still all in a dither.
Any-who. The point here is that there are some people, kids who've been in foster care especially, who don't know how to say goodbye. Lots of people suffer from this not knowing how to say goodbye thing. An aunt of mine was like that for years. My best friend's brother does that when they visit home and it's time to leave.
What does this not knowing how to say goodbye thing look like? Well, rather than enjoy the last of the time you have, you spend the last bit of time (days, weeks, hours, minutes - depending on the length of visit and attachment) picking fights. You get angry and try to make the person/people you have to say goodbye to angry, as well. It's not sad to say goodbye if you're really mad at the person you're saying goodbye to.
This is so what Max is doing with his teacher as school. I brought it up to him this morning. He was very much in agreement that that was what has been going on. Of course, he likes any good excuse for acting out, so it's hard to know for sure.
We got to school and he asked if I was going to go in and talk to his teacher. "No, hadn't planned on it," I say.
"Aren't you going to tell her why I'm acting like this?"
"No, being mad and picking fights or not is up to you. You have to decide how you want your last couple of days to be."
Saturday, June 07, 2008
I fall hard. I did eat more of those cookies yesterday. Then, when I went shopping today, I got myself another cookie at the bakery and ate it on the way home. Yeah. Good modeling. Or it would be if anybody had seen...still good modeling. Hiding stuff.
In other news, it was the last day of flag football today. Max's team did not win. And, yes, they keep score - or, at least, the coaches do. They aren't really supposed to for the kindergarteners and first graders, but the coaches take it much to seriously. Max asked to play dodge ball rather than flag football or soccer in the fall. Fancy that.
Max had an on-edge day. He was just out to annoy people most of the day. In little ways. All day. Like Chinese water torture. I don't think the drugs are helping. It's been two and a half weeks. He's still very anxious. Or, at least, still very much acting so. Perhaps all this time he hasn't been anxious and acting out because of it. Perhaps he just likes to annoy people.
I talked with Davan about trying out a new gym. She's not against it, so I'll probably call our other near by gym this week and see about setting up a time for her to go in and practice with them to see how she likes it.
Anthony got a new bike computer today. Well, he ordered it a while ago and he actually picked it up yesterday. He got it all installed today, though. He's very excited about his new toy. It logs his miles on the desktop computer for him when he plugs it in with all sorts of analysis. That's what he spent his portion of his kicker money on. Just like 'ol George wants - bolstering the economy.
Friday, June 06, 2008
After so long of avoiding all sweets (except the dark chocolate), I broke down this afternoon. I took chocolate chip cookies to Max's class today for his adoption party. There were some left over. I've had 5 now. It's not that they are that good, either. But, I'll probably have more. Sigh.
Last night was better. It was still hard for Davan, though. It was a harder workout, as they did a whole bunch of conditioning.
Chelsea was there, which helped. With two of them that were new, there seemed to be a lot more explaining than when it had just been Davan.
The girls seemed friendlier, reaching out more.
I heard more positive remarks from the coaches. I did hear a lot of correcting, too. I had to point out the positive to Davan, as she'd only really processed the correcting.
On floor, at the very beginning of the workout, Davan went to one of the coaches and said, "I don't know what you're asking me to do. I don't know what any of this is." I was glad she'd stood up for herself. She and Chelsea got called over to the head coach then, who explained that they weren't supposed to know yet. It's all new for them.
That was a great relief for Davan, but it was the attitude before that which made her think that she was supposed to know it all. The coaches said what to do and made haste to correct anything she did wrong, making her think she was supposed to know what to do.
So, it was better, but it's still a mixed bag. I asked Davan if she felt like she was going to still love gymnastics at this level and she had to think about it for quite a while before she finally said, "I think so."
Last night, at bedtime, Max was in the bathroom "brushing his teeth" when I came down the hall for a whole different purpose, but ended up standing there, just by the open bathroom door, listening to him not brushing his teeth.
I came around the door and said to him, "Whacha doing, Max?"
"Brushing my teeth!"
"Hmm....seems like not, as I didn't hear any brushing."
"Do you have to hear me brush all the time?!?!?!"
"Well, no, but when I'm standing about 3 feet away and all is quiet, then, yes, I should be able to hear you brush. Go ahead and try again."
"No!" very defiant, digging in for a fight.
"Okay, then," I steered him off to bed said, "Good night. See you in the morning," and left without reading.
The next "incident" was at 6:45, 15 minutes before I have to get up. The family rule is that, if you have to go to the bathroom while others are sleeping, then you don't flush if you've only peed.
A couple of weekends ago, Davan woke up early in the morning and did more than pee. Max, hearing this, got up and "didn't pee" himself. I've been treated to 6:30 or 6:45 flushing every morning since then that he hasn't been sleeping when I go in to get him up. This was one of those mornings. He, most of the time, is actually peeing. Ever since the time that I pointed out that he hadn't even been in the bathroom long enough to pee, though, he does make sure to spend time in there before he flushes.
Any-who. I go to get him up and march him into the kitchen (rather then carrying him to the couch for a finger rhyme and story) and tell him to brush his teeth. He has some talk about that, but he does it. Then I explained that, as he hadn't brushed his teeth the night before when I told him to, he just spent reading time this morning doing it. I plan on having him brush his teeth after school today, for practice in doing it when told, as well.
He wasn't thrilled about that. Then he was getting dressed and I told him that he didn't have permission to flush the toilet when other people were sleeping anymore.
"Why?" he whines at me.
"Think about it, Max," I told him. Without sarcasm, I might add.
"I'm not flushing to wake people up!!!!"
No comment from me. We move one with our morning and I even go over and give him a nice long hug, saying, "Good morning, Max."
Then I discovered he hadn't unpacked his backpack from yesterday. And his lunch was still in there. Not just the bag, but the whole lunch. He just said, "I didn't eat it."
"So, what did you do at lunch time?"
"I can't say."
Apparently he was doing top secret spy stuff. I got us out the door before bringing it up again. As we're walking to school, I said, "So, what happened at lunch time yesterday?"
He still didn't want to say. He tried to get me to commit to what would happen if he didn't tell me, but I wouldn't say. His imagination is worse. He finally fessed up that he'd gotten a hot lunch. I was less than pleased, as he is well aware that he is to eat the packed lunch. The nutrition in the hot lunches is...well, awful. Plus, as we went over during the stealing breakfast phase, it's stealing to make up a number. Turns out, he gave his name and was cleared to eat.
Apparently, when he was paying back the breakfasts, instead of figuring out what number he'd used and paying that back, they'd put it in under his name. So, he had just enough in there for a hot lunch. I told him he still had to pay it back and he had to pay me for the food he'd wasted, as well, the same amount.
He was, of course, a shit about it all - pulling away from me, glaring, etc. I said to him (and pay attention because this is where I acted like the little kid), "Max, that's a smart way to treat the person who is supposed to bring treats for your whole class at 1:45. We'll see if that still happens. Good luck," and walked away.
I'm guessing he stressed about that all day - right up until I showed up. Real mature thing to do on my part.
Thursday, June 05, 2008
This time, it's me. Davan seems to be taking things more in stride and I'm trying to hide how much I'm stressing about it. It's just been such a big, important thing in her life and to see her struggle with it so much on Tuesday really was hard.
I'm considering checking out the other near-by gym. Partially, I think it'll get better. The first night was the roughest because she wasn't used to the fix everything approach and that'll become more every-day for her as time goes on. Plus, she'll make friends and that'll make it easier, too. And she'll get to know all the little things the coach is talking about and not feel like she's flying by the seat of her pants so much. But.
I don't like the "Good girl" that the coach coos at the girls when they do a trick right. I do think there should be some pointing out of what has been done right, specifically, in addition to pointing out the specific things that need fixing. Those things aren't going to change.
I really feel like her first night was mangled. Just the whole relay situation was a set up for misery. The coach let the girls pick their own pairs and the results were vastly unfair. One of the things they were supposed to do was actually not possible for Davan to do - hand stand walk across the entire floor. If they fell, they were to go back to the starting line and try again. Davan just kept going back and back until finally the coach held her ankles for her.
That plus not being greeted and welcomed at the beginning or getting any words of encouragement at the end and the whole attitude of just being thrown into the deep end to sink or swim....well. I was up last night until midnight, fuming about it. I feel like crying for her. How can they take the sport she loves and ruin it for her?
Davan, on the other hand, is somewhat less enthusiastic than normal and really, really wants me to stay all evening again today (which I'm able to do because Anthony will be home early due to a doctor's appointment), but isn't talking about quitting anymore. And, last night, she was doing her scale on the practice beam and it really did look so much better than before. I commented to her on how much it had improved in just one night of team practice and she just lit up.
Still, though. I'm thinking about the other gym. Where maybe she'll get the coaching and still be able to improve without the stuff that's bothering me about this gym.
Wednesday, June 04, 2008
Max and I had a therapy session this morning with his primary therapist. The person we've seen the last couple of times was only to deal with prescription stuff.
Max must be embarrassed by going because he told a kid in his class that he was going to Red Robin for lunch and that was why I was picking him up. Too bad he got back in time for lunch and may have to explain why he is still hungry after his Red Robin lunch.
Therapy itself was trying. Max didn't want to be there. He didn't want to answer the therapist's questions and, when he did, he wasn't truthful. He threw a couple of fits and then stole an extra sheet of stickers when he picked his out and, thus, lost both sheets.
In spite of all of this, his therapist doesn't want to see him for a month. She thinks he's making progress at home and doesn't need her. I guess. But it's still so hard.
In other news, I still haven't had sugary treats ever since I said I was quitting. I have had other treats (chips, fries - that sort of thing) as well as dark chocolate. Now, the dark chocolate thing was supposed to be an occasional piece, but it's getting a bit out of hand. Between the chocolate and sometimes overdoing other things because I feel deprived of dessert, I'm wondering if I need to have some sort of different mind set.
Anthony and I talked about having dessert on truly special occasions and listing out what those are - birthday, Christmas, adoption party - and then just not other times. And then live with it. And the dark chocolate either needs to fall into the same category or, perhaps, be somewhat more lenient about it - ie, one every camping trip or so - but still not have it available at any time.
Tuesday, June 03, 2008
That was my advice to Davan on starting workouts with team today - "Oh, it'll be fine." And it was. Sort of. And it was sort of awful. Poor kid. She cried at break and said she wanted to quit. By the end, though, she said it wasn't great, but it was okay.
What could possibly have happened that Davan, the girl who loves conditioning and is in great shape and would live in the gym if she could, would have such a rough time?
Well, she was the only one starting team today. I know (from watching the whole thing) that the coach didn't keep that in mind hardly at all. Davan was mostly expected to just know what to do. She just kind of followed along, looking semi-panicked. The coaches did not take it easy on her as far as the performing of her skills went at all. She was nit-picked from the very beginning. I know that's the whole point of team, but geez, couldn't they have said anything to make her feel like she was doing a good job for her first day rather than harp on all what was wrong?
She had one of the best front walk overs in the group, which she noticed and that perked her up. She thought, though, that she'd done very badly on vault until I pointed out to her that one of the girls never did make it over the table trainer by herself, but Davan did and she'd never used the table trainer before. Period. These girls had been doing it for four months and another parent told me that her daughter had only started going over it one month ago. Rather than say, "You made it on your second try ever!" (the first time she only got into a handstand instead of going over) she was corrected about her body position.
My sensitive girl was not having fun. However, she is going back again and knows the worst day is over. From here on out, she'll know more and another girl who got promoted will be there on Thursday, as well, making her not the only new girl in the bunch.
Monday, June 02, 2008
Max has been home for half an hour now. It's not been a smooth half an hour. He ran up to me asking if he could go to the park. By himself? I think not. I got it out of him that he wanted to go because Brian, a boy who lives in the neighborhood, was going to be there. That would be fine, but Brian is at his baby sitters, not at the park. This I know as I saw him walk in there.
I'd be happy to still go to the park with or without Brian being there, but Davan and I had just gotten home from swimming and needed to unpack. Plus, Max always has a snack when he first gets home, without which, he gets grumpy.
Due to the delay, though, he threw a passive agressive fit by strewing the things he brought home out in the main through-fair of the house, plus sprawling out into it himself while making a half an effort to sort of take off his shoes. We have had to put a rule in place that he must stay totally in the entry way while taking off his shoes because otherwise he sprawls across the main through-fair every time. I reminded him of the rule and pointed out that acting that way wasn't going to help his cause in regards to the park. He shaped up a little.
He gave me the daily note from his teacher, which said it was an "OK Day." Usually, it's a good day, so I asked if he'd had a hard time. He denied it, but when I asked if he'd gone up to group as soon as he was called, sat right down and didn't move, he started to be evasive. I let it go. It was good enough for his teacher, so there it is.
I started my after school inspection of his person and his backpack. He had a king size Kit Kat wrapper. He said he'd gotten it from Brian. Brian gave it to you? A non-committal answer. I told him to get his shoes on so we could go talk to Brain. Brian's baby sitter is just across the street.
What the story ended up being was that Brian had the Kit Kat at lunch. Max coveted said Kit Kat. Brian ate the whole thing, but I think Max must have hoped that he hadn't because after school, while gathering up stuff to come home, Max got into Brian's lunch box and stole the wrapper. This from a boy who can't remember to bring home his plastic spoon from his apple sauce. Gee does anyone else thing he could probably remember that spoon?
I'd stepped just into the entry way of the baby sitter's house to talk to Brain while Max chose to stay just outside. When I came back out, he was hiding behind a tree. I explained that was unsafe. It's not safe to hide in public and he must come to me when I call in public. If he doesn't follow the rules, it's not safe to take him out, so we wouldn't be able to go to the park.
He, of course, was mad, and walked off fast in front of me. When we got in the yard, we finished the Kit Kat story and he tried to shred some leaves on the tree, pulling back toward the tree when I gently took his hands and pulled him away.
When we got back inside, he went to have the snack I'd left out for him while I finished checking his things. I came out to find him rocking on the two back legs of the high stool at the counter - a no-no.
I calmly removed the stool while he passive aggressively kept sitting on it until I pulled him off. Then I pulled him into a hug, him resisting and asking, "What are you doing?"
I held him for a while, until he pulled away. Then I asked him if he knew why he was having a hard day. He didn't. I said that it seemed to me that he had two choices at this point - he could stay mad that I'd found and dealt with the candy wrapper and subsequent acting out (in terms meant for him), thereby probably continuing to have a bad day or he could move on and have a good rest of the day. "Okay, Mom," he replied brightly, not looking me in the eye at all.
He moved on to annoying Davan in such a very obvious way that he got sent to his room until he could be not annoying, fingering all the water melon slices I'd put out while he tried to pick up a certain one (which he could suddenly pick up just fine when I went toward him - only to pick that slice up for him, but I guess he didn't know that) and making a little speech under his breath about "trying not to step on Davan's toes when he went outside to shoot hoops" after she'd already gone out. The last one got him restricted to the back yard when he went outside - away from Davan.
Things seem to be settling down now. The kids are out back together, playing. I love it when that happens. I've typed in this whole entry. It's only a little over an hour until I take Max to flag football, then turn around and let Anthony parent him for the short remainder of the evening before he goes to bed.
It seems to be becoming habit. This time, though, the issue wasn't pee...
Anthony and I are snoozing away at about 3:15 am when Max shows up in our room, crying. He said there was cat poop in his bed and he didn't want to sleep in it. Hey, I wouldn't want to sleep in cat poop, either.
However, as there was no cat poop in his bed when Anthony read to him at bed time and the door had been shut ever since (with no cat on the inside), the chances of cat poop being in his bed seemed rather slim.
Anthony went to investigate and I followed behind shortly. What seems to have happened was that Max threw up in his sleep and then rolled around in it for a while. Yuck. Yeah. But, also very strange. The food was almost totally undigested and non smelly. So much so that Anthony went to check the fridge to see if the leftovers were still there. They were.
Also strange because I've never heard of anyone throwing up in their sleep - unless they were very drunk.
But, we got the bed changed, Max showered and in new pjs and then all went back to bed. This morning, because I asked, Max did say his stomach was a little sore. I asked if he needed to stay home from school. No, he wanted to go. He ate a little breakfast (not abnormally little - sometimes he's just not very hungry in the morning) and went off to school. We'll see if I get a call from the nurse!
Every time I read about RAD, though, I start crying. Why? Because Max displays 1, 2, 3 (less as he's been with us more, but still some), 4 (sometimes), 5, 7, 8, 10, 11, 12, 13, 15, 16, and sometimes 17.
It's so hard. It's hard because I feel judged about my mothering by friends and family who say I'm just too hard on him. This is very common for attachment disorder kids and their moms (moms particularly, but dads, too). When he does cuddle, he cuddles like a porcupine with sharp elbows, chins, and also just plan pushing with his body parts. We are constantly barraged by chatter and nonsense questions. Yes, folks, there is such a thing as a stupid question.
When he plays at a friend's house, the parents inevitably say, "Oh, he was such a good and polite guest." (superficially charming) Meanwhile, the child (his peer) doesn't want him to come back or they never even played together. We get similar peer reactions when he has friends over here.
And the lying - the crazy lying. This has been getting worse lately. It's astounding in it's frequency. And he's not as bad about it as some kids. Really, he's pretty mild as attachment disorders go especially as he's been here longer. It's still very, very hard.
Reading about it makes me feel less alone. Less crazy. And worse because it's not easy to heal.
We had a very sporty Saturday with a double header flag football game Saturday morning and a gymnastics fun meet Saturday afternoon.
Sadly, it rained on us at the football game, but then the day turned nice for pretty much the whole rest of the day. Max went off with my MIL and his cousin, Conor, after the football games for the afternoon/evening. He acted out about this before and briefly after the football game, but he seemed to enjoy his time there.
He wasn't invited to the meet because he and another sibling (same sibling from practice) ran wild all over the gym last meet. And he wasn't invited to dinner out because of the poor restaurant behavior on Friday. He'll get another chance for both now that he's sat them out. And he did have a good time doing what he was doing.
Davan had a good meet, which included her trying three more difficult skills than the other kids at her level. One was a great success - round off two back handsprings on floor - with no spot or anything. One was a close but not quite - cartwheel on beam by herself - she got two feet on, but wasn't able to stay on the beam. And the other was a success also with a very minimal (planned) spot - a quip on the bar. She was proud and happy about the meet with the exception of feeling disappointed about not getting her cartwheel. All three of those skills are level 5 skills and Davan is only going to level 4 team, so it's pretty great that she's got them down.
Anthony, Davan and I had a nice, quiet dinner out last night. It'll be okay when Max is with us again, but the break and ability to have a quiet, no arguing, no complaining, no thrashing about meal was nice.
I rode my bike quite a bit yesterday, as well. Well, quite a bit for me. Nothing for Anthony. We rode bikes over to the flag football game. I ended up doing it twice because I brought Davan back home when the rain started up in earnest. She was on her own bike, but we didn't want her to have to ride home alone. It's only 1.5 miles each way, but that means 6 miles total for me.
Then, after dinner, I rode to the library and then to Winco, getting in another 5 miles or so, pulling a load to the library and home from Winco, too. I feel good about using the bike. It's what I used to do all the time, but it's just so easy to get into the car and we've gotten into the habit. I feel a lot better about hopping on my bike, though, and when I'm in the habit, I hardly think about the car for the trips to Winco or the library (although I often walk that one).
Today brought us our usual Sunday morning pancakes and fruit breakfast. We're about to do some family fun before Davan's afternoon play date. Max was invited to make one, too, but he, so far, has struck out on inviting friends over for today. Poor kid. |
Q:
PHP Unable to convert variables to int
I'm struggling with converting variables from $_POST[] to int (long) in order to satisfy a function which takes long.
This function requires some input variables ($width and $height) which are both long. The script gets these variables from $_POST[] and they are of course string upon fetching. I have tried several methods for converting these variables into either float, int and long:
$variable = (float) $_POST["variable"];
and
$variable = $_POST["variable"] + 0;
and
settype($variable, "float");
But I still get the same error in error.log no matter what I do:
PHP Warning: imagecreatetruecolor() expects parameter 1 to be long, string given in /bla bla bla/resize_image.php on line 30
It's gotten to the point where I'm tired of looking for solutions on Google since nothing seems to convert the damn thing anyway. So I'm asking you guys if there's something I'm overlooking or if this is even possible.
get_image.php
$url = "../../" . $_POST["url"];
$cropped = false;
$width = 0;
$height = 0;
if (isset($_POST["cropped"])) {
$cropped = $_POST["cropped"];
}
if (isset($_POST["width"])) {
$width = $_POST["width"];
}
if (isset($_POST["height"])) {
$height = $_POST["height"];
}
// Get image
$type = pathinfo($url, PATHINFO_EXTENSION);
$data = file_get_contents($url);
if ($width > 0 && $height > 0) {
include "Classes/resize_image.php";
settype ( $width , "float" );
settype ( $height , "float" );
$data = resize_image($url, $cropped, $width, $height, $_POST["type"]);
}
$base64 = base64_encode($data);
echo $base64;
resize_image.php (Class)
function resize_image($file, $w, $h, $crop=FALSE, $type) {
list($width, $height) = getimagesize($file);
$r = $width / $height;
if ($crop) {
if ($width > $height) {
$width = ceil($width-($width*abs($r-$w/$h)));
} else {
$height = ceil($height-($height*abs($r-$w/$h)));
}
$newwidth = $w;
$newheight = $h;
} else {
if ($w/$h > $r) {
$newwidth = $h*$r;
$newheight = $h;
} else {
$newheight = $w/$r;
$newwidth = $w;
}
}
if ($type == "png") {
$src = imagecreatefrompng($file);
} else if ($type == "jpeg") {
$src = imagecreatefromjpeg($file);
}
$dst = imagecreatetruecolor($newwidth, $newheight);
imagecopyresampled($dst, $src, 0, 0, 0, 0, $newwidth, $newheight, $width, $height);
return $dst;
}
I'm in desperate need!!
A:
The warning
PHP Warning: imagecreatetruecolor() expects parameter 1 to be long, string given...
means that the first parameter is a string. Let's look at the function call in resize_image.php:
$dst = imagecreatetruecolor($newwidth, $newheight);
The first argument is $newwidth which is assigned to either $w, or $h*$r. The result of multiplication is always a number (float or integer). However, $w is passed to the function without type casting:
if (isset($_POST["cropped"])) {
$cropped = $_POST["cropped"];
}
// ...
$data = resize_image($url, $cropped, $width, $height, $_POST["type"]);
There is no type casting for the $cropped (the second argument) within the function, too.
So you need to cast $w to integer either in the function call, or within resize_image. It is better to sanitize parameters within the function body:
function resize_image($file, $w, $h, $crop=FALSE, $type) {
$w = (int)$w;
$h = (int)$h;
// ...
Ah, and you probably didn't mean to pass $cropped as $w.
|
Post navigation
What’s The Forecast On Kepler-7B? Hot And Cloudy (NPR)
An artist’s rendition of Kepler-7b (left) with Jupiter for comparison. (Photo: NASA/JPL-Caltech/MIT)
What’s The Forecast On Kepler-7B? Hot And Cloudy
by
October 01, 201311:02 AM
Scientists are reasonably sure that it’s a cloudy day on , a planet that orbits its star about 1,000 light-years away from us.
Using NASA’s orbiting space telescopes, researchers publishing in say that for the first time they’ve been able to make a rudimentary map of the atmosphere of an extrasolar planet.
The team used faint visible light and infrared reflections from Kepler-7b to make their cloud map.
“By observing this planet with Spitzer and Kepler [telescopes] for more than three years, we were able to produce a very low-resolution ‘map’ of this giant, gaseous planet,” study co-author Brice-Olivier Demory of the Massachusetts Institute of Technology in Cambridge said in a statement. |
In fact Jessica… Weimaraners are regarded as one most intelligent breeds. They were coined a “wonder dog” when they were introduced because of their high capacity to learn commands and interpret their humans faces.
While you’re there, could you look around for my spectacles? Think I left them behind while looking at a really cute dachshund.
Don’t you just love the colour echo between the stuffed toy and the eyes?
What a great story! One of my four cats, black-furred Topik, loves ear-rubbing to the similar extent, and he makes enourmously loud and “musical” purrs accompanied with taking the craziest, weirdiest positions when I scritch him behing his ears. If you don’t mind, I will incorporate “ear-gasms” into my vocabulary :) |
#
# Makefile to build perl on Windows using Microsoft NMAKE.
# Supported compilers:
# Microsoft Visual C++ 6.0 or later
# Windows SDK 64-bit compiler and tools
#
# This is set up to build a perl.exe that runs off a shared library
# (cperl52x.dll). Also makes individual DLLs for the XS extensions.
#
PV = 530
##
## Make sure you read README.win32 *before* you mess with anything here!
##
##
## Build configuration. Edit the values below to suit your needs.
##
#
# Set these to wherever you want "nmake install" to put your
# newly built perl.
#
INST_DRV = c:
INST_TOP = $(INST_DRV)\cperl
#
# Comment this out if you don't want cperl enhanced features.
#
USE_CPERL = define
#
# Uncomment if you want to build a 32-bit Perl using a 32-bit compiler
# on a 64-bit version of Windows.
#
#WIN64 = undef
#
# Comment this out if you DON'T want your perl installation to be versioned.
# This means that the new installation will overwrite any files from the
# old installation at the same INST_TOP location. Leaving it enabled is
# the safest route, as perl adds the extra version directory to all the
# locations it installs files to. If you disable it, an alternative
# versioned installation can be obtained by setting INST_TOP above to a
# path that includes an arbitrary version string.
#
#INST_VER = \5.30.0
#
# Comment this out if you DON'T want your perl installation to have
# architecture specific components. This means that architecture-
# specific files will be installed along with the architecture-neutral
# files. Leaving it enabled is safer and more flexible, in case you
# want to build multiple flavors of perl and install them together in
# the same location. Commenting it out gives you a simpler
# installation that is easier to understand for beginners.
#
#INST_ARCH = \$(ARCHNAME)
#
# Uncomment this if you want perl to run
# $Config{sitelibexp}\sitecustomize.pl
# before anything else. This script can then be set up, for example,
# to add additional entries to @INC.
#
#USE_SITECUST = define
#
# uncomment to enable multiple interpreters. This is needed for fork()
# emulation and for thread support, and is auto-enabled by USE_IMP_SYS
# and USE_ITHREADS below.
#
USE_MULTI = define
#
# Interpreter cloning/threads; now reasonably complete.
# This should be enabled to get the fork() emulation. This needs (and
# will auto-enable) USE_MULTI above.
#
USE_ITHREADS = define
#
# uncomment to enable the implicit "host" layer for all system calls
# made by perl. This is also needed to get fork(). This needs (and
# will auto-enable) USE_MULTI above.
#
USE_IMP_SYS = define
#
# Comment this out if you don't want to enable large file support for
# some reason. Should normally only be changed to maintain compatibility
# with an older release of perl.
#
USE_LARGE_FILES = define
#
# Uncomment this if you're building a 32-bit perl and want 64-bit integers.
# (If you're building a 64-bit perl then you will have 64-bit integers whether
# or not this is uncommented.)
# Note: This option is not supported in 32-bit MSVC60 builds.
#
#USE_64_BIT_INT = define
#
# Comment this out if you want the legacy default behavior of including '.' at
# the end of @INC.
#
DEFAULT_INC_EXCLUDES_DOT = define
#
# Uncomment this if you want to disable looking up values from
# HKEY_CURRENT_USER\Software\Perl and HKEY_LOCAL_MACHINE\Software\Perl in
# the Registry. Only recommended for faster testing.
#
USE_NO_REGISTRY = define
#
# Uncomment this if you want to enable libffi and calling extern subs
# via native call. Should be enabled, but needs libffi.
# See https://github.com/perl11/cperl/releases/tag/libffi-win or appveyor.yml
#
#USE_FFI = define
#
# uncomment exactly one of the following
#
# Visual C++ 6.0 (aka Visual C++ 98)
#CCTYPE = MSVC60
# Visual C++ .NET 2002/2003 (aka Visual C++ 7.0/7.1) (full version)
#CCTYPE = MSVC70
# Visual C++ Toolkit 2003 (aka Visual C++ 7.1) (free command-line tools)
#CCTYPE = MSVC70FREE
# Windows Server 2003 SP1 Platform SDK (April 2005) (64-bit compiler and tools)
#CCTYPE = SDK2003SP1
# Visual C++ 2005 (aka Visual C++ 8.0) (full version or Express Edition)
#CCTYPE = MSVC80
# Visual C++ 2008 (aka Visual C++ 9.0) (full version or Express Edition)
#CCTYPE = MSVC90
# Visual C++ 2010 (aka Visual C++ 10.0) (full version or Express Edition)
#CCTYPE = MSVC100
# Visual C++ 2012 (aka Visual C++ 11.0) (full version or Express Edition)
#CCTYPE = MSVC110
# Visual C++ 2013 (aka Visual C++ 12.0) (full version or Express Edition)
#CCTYPE = MSVC120
# Visual C++ 2015 (aka Visual C++ 14.0) (full version or Express Edition)
#CCTYPE = MSVC140
# Visual C++ 2017 (aka Visual C++ 14.1) (full version or Community Edition)
#CCTYPE = MSVC141
# Visual C++ 2019 (aka Visual C++ 14.2) (full version or Community Edition)
#CCTYPE = MSVC142
#
# If you are using Intel C++ Compiler uncomment this
#
#__ICC = define
#
# Uncomment this if you want to build everything in C++ mode
#
#USE_CPLUSPLUS = define
#
# uncomment next line if you want debug version of perl (big/slow)
# If not enabled, we automatically try to use maximum optimization
# with all compilers that are known to have a working optimizer.
#
# You can also set CFG = DebugSymbols for a slightly smaller/faster
# debug build without the special debugging code in perl which is
# enabled via -DDEBUGGING;
#
# or you can set CFG = DebugFull for an even fuller (bigger/slower)
# debug build using the debug version of the CRT, and enabling VC++
# debug features such as extra assertions and invalid parameter warnings
# in perl and CRT code via -D_DEBUG. (Note that the invalid parameter
# handler does get triggered from time to time in this configuration,
# which causes warnings to be printed on STDERR, which in turn causes a
# few tests to fail.)
#
#CFG = Debug
#
# uncomment to enable linking with setargv.obj under the Visual C
# compiler. Setting this options enables perl to expand wildcards in
# arguments, but it may be harder to use alternate methods like
# File::DosGlob that are more powerful. This option is supported only with
# Visual C.
#
#USE_SETARGV = define
#
# set this if you wish to use perl's malloc
# WARNING: Turning this on/off WILL break binary compatibility with extensions
# you may have compiled with/without it. Be prepared to recompile all
# extensions if you change the default. Currently, this cannot be enabled
# if you ask for USE_IMP_SYS above.
#
#PERL_MALLOC = define
#
# set this to enable debugging mstats
# This must be enabled to use the Devel::Peek::mstat() function. This cannot
# be enabled without PERL_MALLOC as well.
#
#DEBUG_MSTATS = define
#
# set this to additionally provide a statically linked perl-static.exe.
# Note that dynamic loading will not work with this perl, so you must
# include required modules statically using the STATIC_EXT or ALL_STATIC
# variables below. A static library cperl530s.lib will also be created.
# Ordinary perl.exe is not affected by this option.
#
#BUILD_STATIC = define
#
# in addition to BUILD_STATIC the option ALL_STATIC makes *every*
# extension get statically built.
# This will result in a very large perl executable, but the main purpose
# is to have proper linking set so as to be able to create miscellaneous
# executables with different built-in extensions.
#
#ALL_STATIC = define
#
# set the install location of the compiler
# Running VCVARS32.BAT, VCVARSALL.BAT or similar is *required* when using
# Visual C++.
# Versions of Visual C++ up to VC++ 7.1 define $(MSVCDir); versions since then
# define $(VCINSTALLDIR) instead, but from VC++ 14.1 we need the subfolder given
# by $(VCToolsInstallDir).
#
!IF "$(CCTYPE)" == "MSVC60" || \
"$(CCTYPE)" == "MSVC70" || "$(CCTYPE)" == "MSVC70FREE"
CCHOME = $(MSVCDIR)
!ELSEIF "$(CCTYPE)" == "MSVC141" || "$(CCTYPE)" == "MSVC142"
CCHOME = $(VCTOOLSINSTALLDIR)
!ELSE
CCHOME = $(VCINSTALLDIR)
!ENDIF
#
# Additional compiler flags can be specified here.
#
BUILDOPT = $(BUILDOPTEXTRA)
#
# This should normally be disabled. Enabling it will disable the File::Glob
# implementation of CORE::glob.
#
#BUILDOPT = $(BUILDOPT) -DPERL_EXTERNAL_GLOB
#
# Perl needs to read scripts in text mode so that the DATA filehandle
# works correctly with seek() and tell(), or around auto-flushes of
# all filehandles (e.g. by system(), backticks, fork(), etc).
#
# The current version on the ByteLoader module on CPAN however only
# works if scripts are read in binary mode. But before you disable text
# mode script reading (and break some DATA filehandle functionality)
# please check first if an updated ByteLoader isn't available on CPAN.
#
BUILDOPT = $(BUILDOPT) -DPERL_TEXTMODE_SCRIPTS
#
# specify semicolon-separated list of extra directories that modules will
# look for libraries (spaces in path names need not be quoted)
#
EXTRALIBDIRS =
#
# set this to your email address (perl will guess a value from
# from your loginname and your hostname, which may not be right)
#
#EMAIL =
##
## Build configuration ends.
##
##################### CHANGE THESE ONLY IF YOU MUST #####################
!IF "$(USE_IMP_SYS)" == "define"
PERL_MALLOC = undef
DEBUG_MSTATS = undef
!ENDIF
!IF "$(PERL_MALLOC)" == ""
PERL_MALLOC = undef
DEBUG_MSTATS = undef
!ENDIF
!IF "$(DEBUG_MSTATS)" == ""
DEBUG_MSTATS = undef
!ENDIF
!IF "$(DEBUG_MSTATS)" == "define"
BUILDOPT = $(BUILDOPT) -DPERL_DEBUGGING_MSTATS
!ENDIF
!IF "$(USE_CPERL)" == ""
USE_CPERL = undef
!ENDIF
!IF "$(USE_FFI)" == ""
USE_FFI = undef
!ENDIF
!IF "$(USE_SITECUST)" == ""
USE_SITECUST = undef
!ENDIF
!IF "$(USE_MULTI)" == ""
USE_MULTI = undef
!ENDIF
!IF "$(USE_ITHREADS)" == ""
USE_ITHREADS = undef
!ENDIF
!IF "$(USE_IMP_SYS)" == ""
USE_IMP_SYS = undef
!ENDIF
!IF "$(USE_LARGE_FILES)" == ""
USE_LARGE_FILES = undef
!ENDIF
!IF "$(USE_64_BIT_INT)" == ""
USE_64_BIT_INT = undef
!ENDIF
!IF "$(DEFAULT_INC_EXCLUDES_DOT)" == ""
DEFAULT_INC_EXCLUDES_DOT = undef
!ENDIF
!IF "$(USE_NO_REGISTRY)" == ""
USE_NO_REGISTRY = undef
!ENDIF
!IF "$(USE_IMP_SYS)$(USE_MULTI)" == "defineundef"
USE_MULTI = define
!ENDIF
!IF "$(USE_ITHREADS)$(USE_MULTI)" == "defineundef"
USE_MULTI = define
!ENDIF
!IF "$(USE_SITECUST)" == "define"
BUILDOPT = $(BUILDOPT) -DUSE_SITECUSTOMIZE
!ENDIF
!IF "$(USE_MULTI)" != "undef"
BUILDOPT = $(BUILDOPT) -DPERL_IMPLICIT_CONTEXT
!ENDIF
!IF "$(USE_IMP_SYS)" != "undef"
BUILDOPT = $(BUILDOPT) -DPERL_IMPLICIT_SYS
!ENDIF
!IF "$(USE_NO_REGISTRY)" != "undef"
BUILDOPT = $(BUILDOPT) -DWIN32_NO_REGISTRY
!ENDIF
!IF "$(PROCESSOR_ARCHITECTURE)" == ""
PROCESSOR_ARCHITECTURE = x86
!ENDIF
!IF "$(WIN64)" == ""
# When we are running from a 32bit cmd.exe on AMD64 then
# PROCESSOR_ARCHITECTURE is set to x86 and PROCESSOR_ARCHITEW6432
# is set to AMD64
! IF "$(PROCESSOR_ARCHITEW6432)" != ""
PROCESSOR_ARCHITECTURE = $(PROCESSOR_ARCHITEW6432)
WIN64 = define
! ELSEIF "$(PROCESSOR_ARCHITECTURE)" == "AMD64" || "$(PROCESSOR_ARCHITECTURE)" == "IA64"
WIN64 = define
! ELSE
WIN64 = undef
! ENDIF
!ENDIF
!IF "$(WIN64)" == "define"
USE_64_BIT_INT = define
!ENDIF
# Treat 64-bit MSVC60 (doesn't really exist) as SDK2003SP1 because
# both link against MSVCRT.dll (which is part of Windows itself) and
# not against a compiler specific versioned runtime.
!IF "$(WIN64)" == "define" && "$(CCTYPE)" == "MSVC60"
CCTYPE = SDK2003SP1
!ENDIF
# Disable the 64-bit-int option for (32-bit) MSVC60 builds since that compiler
# does not support it.
!IF "$(CCTYPE)" == "MSVC60"
!UNDEF USE_64_BIT_INT
USE_64_BIT_INT = undef
!ENDIF
# Most relevant compiler-specific options fall into two groups:
# either pre-MSVC80 or MSVC80 onwards, so define a macro for this.
!IF "$(CCTYPE)" == "MSVC60" || \
"$(CCTYPE)" == "MSVC70" || "$(CCTYPE)" == "MSVC70FREE"
PREMSVC80 = define
!ELSE
PREMSVC80 = undef
!ENDIF
ARCHITECTURE = $(PROCESSOR_ARCHITECTURE)
!IF "$(ARCHITECTURE)" == "AMD64"
ARCHITECTURE = x64
!ELSEIF "$(ARCHITECTURE)" == "IA64"
ARCHITECTURE = ia64
!ENDIF
!IF "$(USE_MULTI)" == "define"
ARCHNAME = MSWin32-$(ARCHITECTURE)-multi
!ELSE
ARCHNAME = MSWin32-$(ARCHITECTURE)-perlio
!ENDIF
!IF "$(USE_ITHREADS)" == "define"
ARCHNAME = $(ARCHNAME)-thread
!ENDIF
!IF "$(WIN64)" != "define" && "$(USE_64_BIT_INT)" == "define"
ARCHNAME = $(ARCHNAME)-64int
!ENDIF
# All but the free version of VC++ 7.1 can load DLLs on demand. Makes the test
# suite run in about 10% less time.
!IF "$(CCTYPE)" != "MSVC70FREE"
# If no registry, advapi32 is only used for Perl_pp_getlogin/getlogin/GetUserNameA
# which is rare to execute
! IF "$(USE_NO_REGISTRY)" != "undef"
DELAYLOAD = -DELAYLOAD:ws2_32.dll -DELAYLOAD:advapi32.dll delayimp.lib
MINIDELAYLOAD =
! ELSE
DELAYLOAD = -DELAYLOAD:ws2_32.dll delayimp.lib
#miniperl never does any registry lookups
MINIDELAYLOAD = -DELAYLOAD:advapi32.dll
! ENDIF
!ENDIF
#
# For reproducible builds
#
LC_ALL=C
PERL_HASH_SEED=0
# Visual C++ 2005 and 2008 (VC++ 8.0 and 9.0) create manifest files for EXEs and
# DLLs. These either need copying everywhere with the binaries, or else need
# embedding in them otherwise MSVCR80.dll or MSVCR90.dll won't be found. For
# simplicity, embed them if they exist (and delete them afterwards so that they
# don't get installed too).
EMBED_EXE_MANI = if exist $@.manifest mt -nologo -manifest $@.manifest -outputresource:$@;1 && \
if exist $@.manifest del $@.manifest
EMBED_DLL_MANI = if exist $@.manifest mt -nologo -manifest $@.manifest -outputresource:$@;2 && \
if exist $@.manifest del $@.manifest
# Set the install location of the compiler headers/libraries.
# These are saved into $Config{incpath} and $Config{libpth}.
CCINCDIR = $(CCHOME)\include
!IF "$(CCTYPE)" == "MSVC141" || "$(CCTYPE)" == "MSVC142"
! IF "$(WIN64)" == "define"
CCLIBDIR = $(CCHOME)\lib\x64
! ELSE
CCLIBDIR = $(CCHOME)\lib\x86
! ENDIF
!ELSE
! IF "$(WIN64)" == "define"
CCLIBDIR = $(CCHOME)\lib\amd64
! ELSE
CCLIBDIR = $(CCHOME)\lib
! ENDIF
!ENDIF
ARCHDIR = ..\lib\$(ARCHNAME)
COREDIR = ..\lib\CORE
AUTODIR = ..\lib\auto
LIBDIR = ..\lib
EXTDIR = ..\ext
DISTDIR = ..\dist
CPANDIR = ..\cpan
PODDIR = ..\pod
HTMLDIR = .\html
INST_SCRIPT = $(INST_TOP)$(INST_VER)\bin
INST_BIN = $(INST_SCRIPT)$(INST_ARCH)
INST_LIB = $(INST_TOP)$(INST_VER)\lib
INST_ARCHLIB = $(INST_LIB)$(INST_ARCH)
INST_COREDIR = $(INST_ARCHLIB)\CORE
INST_HTML = $(INST_TOP)$(INST_VER)\html
#
# Programs to compile, build .lib files and link
#
# Poison the recipe if no CCTYPE is set, and delete mini\.exists so everything
# is rebuilt next time to avoid reusing a mini config.h written with no sane CC
# version set
!IF "$(CCTYPE)" == ""
CC = @echo CCTYPE makefile variable not set && del mini\.exists && exit 1 &&
LINK32 = @echo CCTYPE makefile variable not set && del mini\.exists && exit 1 &&
!ELSEIF "$(__ICC)" != "define"
CC = cl
LINK32 = link
!ELSE
CC = icl
LINK32 = xilink
!ENDIF
LIB32 = $(LINK32) -lib
RSC = rc
#
# Options
#
INCLUDES = -I$(COREDIR) -I.\include -I. -I..
#PCHFLAGS = -Fpc:\temp\vcmoduls.pch -YX
DEFINES = -DWIN32 -D_CONSOLE -DNO_STRICT
LOCDEFS = -DPERLDLL -DPERL_CORE
CXX_FLAG = -TP -EHsc
!IF "$(CCTYPE)" == "MSVC140" || "$(CCTYPE)" == "MSVC141" || "$(CCTYPE)" == "MSVC142"
LIBC = ucrt.lib
!ELSE
LIBC = msvcrt.lib
!ENDIF
!IF "$(CFG)" == "Debug"
OPTIMIZE = -Od -MD -Zi -DDEBUGGING
LINK_DBG = -debug
!ELSEIF "$(CFG)" == "DebugSymbols"
OPTIMIZE = -Od -MD -Zi
LINK_DBG = -debug
!ELSEIF "$(CFG)" == "DebugFull"
! IF "$(CCTYPE)" == "MSVC140" || "$(CCTYPE)" == "MSVC141" || "$(CCTYPE)" == "MSVC142"
LIBC = ucrtd.lib
! ELSE
LIBC = msvcrtd.lib
! ENDIF
OPTIMIZE = -Od -MDd -Zi -D_DEBUG -DDEBUGGING
LINK_DBG = -debug
!ELSE
# -O1 yields smaller code, which turns out to be faster than -O2 on x86 and x64
OPTIMIZE = -O1 -MD -Zi -DNDEBUG
# we enable debug symbols in release builds also
LINK_DBG = -debug -opt:ref,icf
# you may want to enable this if you want COFF symbols in the executables
# in addition to the PDB symbols. The default Dr. Watson that ships with
# Windows can use the the former but not latter. The free WinDbg can be
# installed to get better stack traces from just the PDB symbols, so we
# avoid the bloat of COFF symbols by default.
#LINK_DBG = $(LINK_DBG) -debugtype:both
! IF "$(CCTYPE)" != "MSVC60"
# enable Whole Program Optimizations (WPO) and Link Time Code Generation (LTCG)
OPTIMIZE = $(OPTIMIZE) -GL
LINK_DBG = $(LINK_DBG) -ltcg
LIB_FLAGS = -ltcg
! ENDIF
!ENDIF
!IF "$(WIN64)" == "define"
DEFINES = $(DEFINES) -DWIN64 -DCONSERVATIVE
OPTIMIZE = $(OPTIMIZE) -fp:precise
!ENDIF
# For now, silence warnings from VC++ 8.0 onwards about "unsafe" CRT functions
# and POSIX CRT function names being deprecated.
!IF "$(PREMSVC80)" == "undef"
DEFINES = $(DEFINES) -D_CRT_SECURE_NO_DEPRECATE -D_CRT_NONSTDC_NO_DEPRECATE
!ENDIF
# Likewise for deprecated Winsock APIs in VC++ 14.0 onwards for now.
!IF "$(CCTYPE)" == "MSVC140" || "$(CCTYPE)" == "MSVC141" || "$(CCTYPE)" == "MSVC142"
DEFINES = $(DEFINES) -D_WINSOCK_DEPRECATED_NO_WARNINGS
!ENDIF
# The Windows Server 2003 SP1 SDK compiler only defines _configthreadlocale() if
# _MT is defined, i.e. when using /MT (the LIBCMT.lib version of the CRT), which
# the perl build doesn't use. We therefore specify NO_THREAD_SAFE_LOCALE so that
# perl.h doesn't set USE_THREAD_SAFE_LOCALE, which it otherwise would do since
# _MSC_VER is 1400 for this compiler (as per MSVC80).
!IF "$(CCTYPE)" == "SDK2003SP1"
DEFINES = $(DEFINES) -DNO_THREAD_SAFE_LOCALE
!ENDIF
# In VS 2005 (VC++ 8.0) Microsoft changes time_t from 32-bit to
# 64-bit, even in 32-bit mode. It also provides the _USE_32BIT_TIME_T
# preprocessor option to revert back to the old functionality for
# backward compatibility. We define this symbol here for older 32-bit
# compilers only (which aren't using it at all) for the sole purpose
# of getting it into $Config{ccflags}. That way if someone builds
# Perl itself with e.g. VC6 but later installs an XS module using VC8
# the time_t types will still be compatible.
!IF "$(WIN64)" == "undef" && "$(PREMSVC80)" == "define"
BUILDOPT = $(BUILDOPT) -D_USE_32BIT_TIME_T
!ENDIF
LIBBASEFILES = \
oldnames.lib kernel32.lib user32.lib gdi32.lib winspool.lib \
comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib \
netapi32.lib uuid.lib ws2_32.lib mpr.lib winmm.lib \
version.lib odbc32.lib odbccp32.lib comctl32.lib
!IF "$(CCTYPE)" == "MSVC140" || "$(CCTYPE)" == "MSVC141" || "$(CCTYPE)" == "MSVC142"
! IF "$(CFG)" == "DebugFull"
LIBBASEFILES = $(LIBBASEFILES) msvcrtd.lib vcruntimed.lib
! ELSE
LIBBASEFILES = $(LIBBASEFILES) msvcrt.lib vcruntime.lib
! ENDIF
!ENDIF
# Avoid __intel_new_proc_init link error for libircmt.
# libmmd is /MD equivelent, other variants exist.
# libmmd is Intel C's math addon funcs to MS CRT, contains long doubles, C99,
# and optimized C89 funcs
!IF "$(__ICC)" == "define"
LIBBASEFILES = $(LIBBASEFILES) libircmt.lib libmmd.lib
!ENDIF
# The Windows Server 2003 SP1 SDK compiler links against MSVCRT.dll, which
# doesn't include the buffer overrun verification code used by the /GS switch.
# Since the code links against libraries that are compiled with /GS, this
# "security cookie verification" code must be included via bufferoverflow.lib.
!IF "$(CCTYPE)" == "SDK2003SP1"
LIBBASEFILES = $(LIBBASEFILES) bufferoverflowU.lib
!ENDIF
LIBFILES = $(LIBBASEFILES) $(LIBC)
#EXTRACFLAGS = -nologo -GF -W4 -wd4127 -wd4706
EXTRACFLAGS = -nologo -GF -W3
!IF "$(__ICC)" == "define"
EXTRACFLAGS = $(EXTRACFLAGS) -Qstd=c99
!ENDIF
!IF "$(USE_CPLUSPLUS)" == "define"
EXTRACFLAGS = $(EXTRACFLAGS) $(CXX_FLAG)
!ENDIF
CFLAGS = $(EXTRACFLAGS) $(INCLUDES) $(DEFINES) $(LOCDEFS) \
$(PCHFLAGS) $(OPTIMIZE)
LINK_FLAGS = -nologo -nodefaultlib $(LINK_DBG) \
-libpath:"$(INST_COREDIR)" \
-machine:$(PROCESSOR_ARCHITECTURE)
LIB_FLAGS = $(LIB_FLAGS) -nologo
OBJOUT_FLAG = -Fo
EXEOUT_FLAG = -Fe
CFLAGS_O = $(CFLAGS) $(BUILDOPT)
!IF "$(USE_FFI)" == "define"
LINK_FLAGS = $(LINK_FLAGS) -libpath:lib
LIBFILES = libffi.dll.a $(LIBFILES)
!ENDIF
!IF "$(PREMSVC80)" == "undef"
PRIV_LINK_FLAGS = $(PRIV_LINK_FLAGS) "/manifestdependency:type='Win32' name='Microsoft.Windows.Common-Controls' version='6.0.0.0' processorArchitecture='*' publicKeyToken='6595b64144ccf1df' language='*'"
!ELSE
RSC_FLAGS = -DINCLUDE_MANIFEST
!ENDIF
# VS 2017 (VC++ 14.1) requires at minimum Windows 7 SP1 (with latest Windows Updates)
# For XP support in >= VS 2013 (VC++ 12.0), subsystem is always in Config.pm
# LINK_FLAGS else subsystem is only needed for EXE building, not XS DLL building
# Console vs GUI makes no difference for DLLs, so use default for cleaner
# building cmd lines
!IF "$(CCTYPE)" == "MSVC120" || "$(CCTYPE)" == "MSVC140" || "$(CCTYPE)" == "MSVC141" || "$(CCTYPE)" == "MSVC142"
! IF "$(WIN64)" == "define"
LINK_FLAGS = $(LINK_FLAGS) -subsystem:console,"5.02"
! ELSE
LINK_FLAGS = $(LINK_FLAGS) -subsystem:console,"5.01"
! ENDIF
!ELSE
PRIV_LINK_FLAGS = $(PRIV_LINK_FLAGS) -subsystem:console
!ENDIF
BLINK_FLAGS = $(PRIV_LINK_FLAGS) $(LINK_FLAGS)
#################### do not edit below this line #######################
############# NO USER-SERVICEABLE PARTS BEYOND THIS POINT ##############
o = .obj
#
# Rules
#
#clear the list, we dont support .cxx .bas .cbl .for .pas .f .f90
# .asm .cpp are not currently used but they are included for completeness
.SUFFIXES :
.SUFFIXES : .c $(o) .cpp .asm .dll .lib .exe .rc .res
.c$(o):
$(CC) -c -I$(<D) $(CFLAGS_O) $(OBJOUT_FLAG)$@ $<
.c.i:
$(CC) -c -I$(<D) $(CFLAGS_O) -P $(OBJOUT_FLAG)$@ $<
.y.c:
$(NOOP)
$(o).dll:
$(LINK32) -dll -implib:$(*B).lib -def:$(*B).def \
-out:$@ $(BLINK_FLAGS) $(LIBFILES) $< $(LIBPERL)
$(EMBED_DLL_MANI)
.rc.res:
$(RSC) -i.. $(RSC_FLAGS) $<
#
# various targets
# makedef.pl must be updated if this changes, and this should normally
# only change when there is an incompatible revision of the public API.
PERLIMPLIB = ..\cperl$(PV).lib
PERLSTATICLIB = ..\cperl$(PV)s.lib
PERLDLL = ..\cperl$(PV).dll
MINIPERL = ..\miniperl.exe
MINIDIR = .\mini
PERLEXE = ..\cperl.exe
WPERLEXE = ..\wperl.exe
PERLEXESTATIC = ..\perl-static.exe
GLOBEXE = ..\perlglob.exe
CONFIGPM = ..\lib\Config.pm ..\lib\Config_heavy.pl
GENUUDMAP = ..\generate_uudmap.exe
!IF "$(BUILD_STATIC)" == "define" || "$(ALL_STATIC)" == "define"
PERLSTATIC = static
!ELSE
PERLSTATIC =
!ENDIF
# Unicode data files generated by mktables
FIRSTUNIFILE = ..\lib\unicore\Decomposition.pl
UNIDATAFILES = ..\lib\unicore\Decomposition.pl \
..\lib\unicore\CombiningClass.pl ..\lib\unicore\Name.pl \
..\lib\unicore\Heavy.pl ..\lib\unicore\mktables.lst \
..\lib\unicore\UCD.pl ..\lib\unicore\Name.pm \
..\lib\unicore\TestProp.pl
# Directories of Unicode data files generated by mktables
UNIDATADIR1 = ..\lib\unicore\To
UNIDATADIR2 = ..\lib\unicore\lib
PERLEXE_MANIFEST= .\perlexe.manifest
PERLEXE_ICO = .\perlexe.ico
PERLEXE_RES = .\perlexe.res
PERLDLL_RES =
# Nominate a target which causes extensions to be re-built
# This used to be $(PERLEXE), but at worst it is the .dll that they depend
# on and really only the interface - i.e. the .def file used to export symbols
# from the .dll
PERLDEP = perldll.def
PL2BAT = bin\pl2bat.pl
GLOBBAT = bin\perlglob.bat
UTILS = \
..\utils\h2ph \
..\utils\splain \
..\utils\cperlbug \
..\utils\pl2pm \
..\utils\c2ph \
..\utils\pstruct \
..\utils\h2xs \
..\utils\cperldoc \
..\utils\cperlivp \
..\utils\libnetcfg \
..\utils\enc2xs \
..\utils\encguess \
..\utils\piconv \
..\utils\corelist \
..\utils\cpan \
..\utils\xsubpp \
..\utils\prove \
..\utils\ptar \
..\utils\ptardiff \
..\utils\ptargrep \
..\utils\zipdetails \
..\utils\shasum \
..\utils\instmodsh \
..\utils\json_pp \
..\utils\pod2html \
bin\exetype.pl \
bin\runperl.pl \
bin\pl2bat.pl \
bin\perlglob.pl \
bin\search.pl
MAKE = nmake -nologo
MAKE_BARE = nmake
CFGSH_TMPL = config.vc
CFGH_TMPL = config_H.vc
INT64 = __int64
XCOPY = xcopy /f /r /i /d /y
RCOPY = xcopy /f /r /i /e /d /y
NOOP = @rem
NULL =
DEL = del
#Improved order with cperl, see http://perl11.org/blog/bolt.html
MICROCORE_SRC = \
..\gv.c \
..\perl.c \
..\perly.c \
..\toke.c \
..\op.c \
..\av.c \
..\pad.c \
..\sv.c \
..\hv.c \
..\pp_hot.c \
..\run.c \
..\pp_ctl.c \
..\pp_type.c \
..\pp.c \
..\scope.c \
..\pp_sys.c \
..\regcomp.c \
..\mg.c \
..\doop.c \
..\util.c \
..\doio.c \
..\keywords.c \
..\xsutils.c \
..\utf8.c \
..\regexec.c \
..\universal.c \
..\perlapi.c \
..\globals.c \
..\perlio.c \
..\pp_sort.c \
..\pp_pack.c \
..\numeric.c \
..\reentr.c \
..\mathoms.c \
..\locale.c \
..\dquote.c \
..\mro_core.c \
..\taint.c \
..\time64.c \
..\caretx.c \
..\dump.c \
..\deb.c
EXTRACORE_SRC = $(EXTRACORE_SRC) perllib.c
!IF "$(PERL_MALLOC)" == "define"
EXTRACORE_SRC = $(EXTRACORE_SRC) ..\malloc.c
!ENDIF
WIN32_SRC = \
.\win32.c \
.\win32io.c \
.\win32sck.c \
.\win32thread.c \
.\fcrypt.c
CORE_NOCFG_H = \
..\av.h \
..\cop.h \
..\cv.h \
..\dosish.h \
..\embed.h \
..\form.h \
..\gv.h \
..\handy.h \
..\hv.h \
..\hv_func.h \
..\iperlsys.h \
..\mg.h \
..\nostdio.h \
..\op.h \
..\opcode.h \
..\perl.h \
..\perlapi.h \
..\perlsdio.h \
..\perly.h \
..\pp.h \
..\proto.h \
..\regcomp.h \
..\regexp.h \
..\scope.h \
..\sv.h \
..\thread.h \
..\unixish.h \
..\utf8.h \
..\util.h \
..\warnings.h \
..\XSUB.h \
..\EXTERN.h \
..\perlvars.h \
..\intrpvar.h \
.\include\dirent.h \
.\include\netdb.h \
.\include\sys\errno2.h \
.\include\sys\socket.h \
.\win32.h
CORE_H = $(CORE_NOCFG_H) .\config.h ..\git_version.h
UUDMAP_H = ..\uudmap.h
BITCOUNT_H = ..\bitcount.h
MG_DATA_H = ..\mg_data.h
GENERATED_HEADERS = $(UUDMAP_H) $(BITCOUNT_H) $(MG_DATA_H)
MKPPPORTDEP = ..\dist\PathTools\ppport.h
MICROCORE_OBJ = $(MICROCORE_SRC:.c=.obj)
CORE_OBJ = $(MICROCORE_OBJ) $(EXTRACORE_SRC:.c=.obj)
WIN32_OBJ = $(WIN32_SRC:.c=.obj)
MINICORE_OBJ = $(MINIDIR)\miniperlmain$(o) \
$(MICROCORE_OBJ:..\=.\mini\)
MINIWIN32_OBJ = $(WIN32_OBJ:.\=.\mini\)
MINI_OBJ = $(MINICORE_OBJ) $(MINIWIN32_OBJ)
DLL_OBJ = $(DYNALOADER)
GENUUDMAP_OBJ = $(GENUUDMAP:.exe=.obj)
PERLDLL_OBJ = $(CORE_OBJ)
PERLEXE_OBJ = perlmain$(o)
PERLEXEST_OBJ = perlmainst$(o)
PERLDLL_OBJ = $(PERLDLL_OBJ) $(WIN32_OBJ) $(DLL_OBJ)
!IF "$(USE_SETARGV)" != ""
SETARGV_OBJ = setargv$(o)
!ENDIF
!IF "$(ALL_STATIC)" == "define"
# some exclusions, unfortunately, until fixed:
# - MakeMaker isn't capable enough for SDBM_File (small bug)
STATIC_EXT = * !SDBM_File
!ELSE
# specify static extensions here, for example:
# (be sure to include Win32CORE to load Win32 on demand)
#STATIC_EXT = Win32CORE Cwd Compress/Raw/Zlib
STATIC_EXT = Win32CORE
!ENDIF
DYNALOADER = ..\DynaLoader$(o)
CFG_VARS = \
"INST_TOP=$(INST_TOP)" \
"INST_VER=$(INST_VER)" \
"INST_ARCH=$(INST_ARCH)" \
"archname=$(ARCHNAME)" \
"cc=$(CC)" \
"ld=$(LINK32)" \
"ccflags=$(EXTRACFLAGS) $(OPTIMIZE:"=\") $(DEFINES) $(BUILDOPT)" \
"usecplusplus=$(USE_CPLUSPLUS)" \
"cf_email=$(EMAIL)" \
"d_mymalloc=$(PERL_MALLOC)" \
"libs=$(LIBFILES)" \
"incpath=$(CCINCDIR:"=\")" \
"incpth=$(CCINCDIR:"=\")" \
"libperl=$(PERLIMPLIB:..\=)" \
"libpth=$(CCLIBDIR:"=\");$(EXTRALIBDIRS:"=\")" \
"libc=$(LIBC)" \
"make=$(MAKE_BARE)" \
"static_ext=$(STATIC_EXT)" \
"usecperl=$(USE_CPERL)" \
"usethreads=$(USE_ITHREADS)" \
"useithreads=$(USE_ITHREADS)" \
"usemultiplicity=$(USE_MULTI)" \
"use64bitint=$(USE_64_BIT_INT)" \
"useffi=$(USE_FFI)" \
"uselongdouble=undef" \
"uselargefiles=$(USE_LARGE_FILES)" \
"usesitecustomize=$(USE_SITECUST)" \
"default_inc_excludes_dot=$(DEFAULT_INC_EXCLUDES_DOT)" \
"LINK_FLAGS=$(LINK_FLAGS:"=\")" \
"optimize=$(OPTIMIZE:"=\")" \
"WIN64=$(WIN64)"
#
# Top targets
#
all : ..\git_version.h $(GLOBEXE) $(CONFIGPM) \
$(UNIDATAFILES) MakePPPort $(PERLEXE) Extensions_nonxs Extensions PostExt \
$(PERLSTATIC)
@echo Everything is up to date. '$(MAKE_BARE) test' to run test suite.
regnodes : ..\regnodes.h
..\regcomp$(o) : ..\regnodes.h ..\regcharclass.h
..\regexec$(o) : ..\regnodes.h ..\regcharclass.h
reonly : regnodes .\config.h ..\git_version.h $(GLOBEXE) $(CONFIGPM) \
$(UNIDATAFILES) $(PERLEXE) Extensions_reonly
@echo Perl and 're' are up to date.
static: $(PERLEXESTATIC)
#------------------------------------------------------------
$(GLOBEXE) : perlglob$(o)
$(LINK32) $(BLINK_FLAGS) $(LIBFILES) -out:$@ \
perlglob$(o) setargv$(o)
$(EMBED_EXE_MANI)
perlglob$(o) : perlglob.c
..\git_version.h : $(MINIPERL) ..\make_patchnum.pl
cd .. && miniperl -Ilib make_patchnum.pl && cd win32
# make sure that we recompile perl.c if the git version changes
..\perl$(o) : ..\git_version.h
..\config.sh : $(CFGSH_TMPL) config_sh.PL FindExt.pm $(MINIPERL)
$(MINIPERL) -I..\lib config_sh.PL $(CFG_VARS) $(CFGSH_TMPL) > ..\config.sh
# This target is for when changes to the main config.sh happen.
# Edit config.vc, then make perl in a minimal configuration (i.e. with MULTI,
# ITHREADS, IMP_SYS and LARGE_FILES off), then make this target
# to regenerate config_H.vc.
regen_config_h:
$(MINIPERL) -I..\lib config_sh.PL $(CFG_VARS) $(CFGSH_TMPL) > ..\config.sh
$(MINIPERL) -I..\lib ..\configpm --chdir=..
-del /f $(CFGH_TMPL)
-$(MINIPERL) -I..\lib config_h.PL
rename config.h $(CFGH_TMPL)
$(CONFIGPM) : $(MINIPERL) ..\config.sh config_h.PL
$(MINIPERL) -I..\lib ..\configpm --chdir=..
$(XCOPY) ..\*.h $(COREDIR)\*.*
$(XCOPY) *.h $(COREDIR)\*.*
$(RCOPY) include $(COREDIR)\*.*
!IF "$(USE_FFI)" == "define"
if exist lib\libffi.dll.a xcopy /f /i /y lib\libffi*.a $(INST_COREDIR)
if exist bin\* xcopy /f /i /y bin\* $(INST_COREDIR)
!ENDIF
-$(MINIPERL) -I..\lib config_h.PL
if errorlevel 1 $(MAKE) /$(MAKEFLAGS) $(CONFIGPM)
.\config.h : $(CONFIGPM)
# See the comment in Makefile.SH explaining this seemingly cranky ordering
$(MINIPERL) : ..\lib\buildcustomize.pl
..\lib\buildcustomize.pl : $(MINI_OBJ) ..\write_buildcustomize.pl
$(LINK32) -out:$(MINIPERL) @<<
$(BLINK_FLAGS) $(DELAYLOAD) $(MINIDELAYLOAD) $(LIBFILES) $(MINI_OBJ)
<<
$(EMBED_EXE_MANI:..\lib\buildcustomize.pl=..\miniperl.exe)
$(MINIPERL) -I..\lib -f ..\write_buildcustomize.pl ..
$(MINIDIR)\.exists : $(CFGH_TMPL)
if not exist "$(MINIDIR)" mkdir "$(MINIDIR)"
#
# Copy the template config.h and set configurables at the end of it
# as per the options chosen and compiler used.
# Note: This config.h is only used to build miniperl.exe anyway, but
# it's as well to have its options correct to be sure that it builds
# and so that it's "-V" options are correct for use by makedef.pl. The
# real config.h used to build perl.exe is generated from the top-level
# config_h.SH by config_h.PL (run by miniperl.exe).
#
copy $(CFGH_TMPL) config.h
@(echo.&& \
echo #ifndef _config_h_footer_&& \
echo #define _config_h_footer_&& \
echo #undef Off_t&& \
echo #undef LSEEKSIZE&& \
echo #undef Off_t_size&& \
echo #undef PTRSIZE&& \
echo #undef SSize_t&& \
echo #undef HAS_ATOLL&& \
echo #undef HAS_STRTOLL&& \
echo #undef HAS_STRTOULL&& \
echo #undef Size_t_size&& \
echo #undef IVTYPE&& \
echo #undef UVTYPE&& \
echo #undef IVSIZE&& \
echo #undef UVSIZE&& \
echo #undef NV_PRESERVES_UV&& \
echo #undef NV_PRESERVES_UV_BITS&& \
echo #undef IVdf&& \
echo #undef UVuf&& \
echo #undef UVof&& \
echo #undef UVxf&& \
echo #undef UVXf&& \
echo #undef USE_64_BIT_INT&& \
echo #undef USE_LONG_DOUBLE&& \
echo #undef USE_CPLUSPLUS)>> config.h
!IF "$(CCTYPE)" == "MSVC140" || "$(CCTYPE)" == "MSVC141" || "$(CCTYPE)" == "MSVC142"
@(echo #undef FILE_ptr&& \
echo #undef FILE_cnt&& \
echo #undef FILE_base&& \
echo #undef FILE_bufsiz&& \
echo #define FILE_ptr^(fp^) PERLIO_FILE_ptr^(fp^)&& \
echo #define FILE_cnt^(fp^) PERLIO_FILE_cnt^(fp^)&& \
echo #define FILE_base^(fp^) PERLIO_FILE_base^(fp^)&& \
echo #define FILE_bufsiz^(fp^) ^(PERLIO_FILE_cnt^(fp^) + PERLIO_FILE_ptr^(fp^) - PERLIO_FILE_base^(fp^)^)&& \
echo #define I_STDBOOL)>> config.h
!ENDIF
!IF "$(USE_LARGE_FILES)"=="define"
@(echo #define Off_t $(INT64)&& \
echo #define LSEEKSIZE ^8&& \
echo #define Off_t_size ^8)>> config.h
!ELSE
@(echo #define Off_t long&& \
echo #define LSEEKSIZE ^4&& \
echo #define Off_t_size ^4)>> config.h
!ENDIF
!IF "$(WIN64)"=="define"
@(echo #define PTRSIZE ^8&& \
echo #define SSize_t $(INT64)&& \
echo #define HAS_ATOLL&& \
echo #define HAS_STRTOLL&& \
echo #define HAS_STRTOULL&& \
echo #define Size_t_size ^8)>> config.h
!ELSE
@(echo #define PTRSIZE ^4&& \
echo #define SSize_t int&& \
echo #undef HAS_ATOLL&& \
echo #undef HAS_STRTOLL&& \
echo #undef HAS_STRTOULL&& \
echo #define Size_t_size ^4)>> config.h
!ENDIF
!IF "$(USE_64_BIT_INT)"=="define"
@(echo #define IVTYPE $(INT64)&& \
echo #define UVTYPE unsigned $(INT64)&& \
echo #define IVSIZE ^8&& \
echo #define UVSIZE ^8&& \
echo #undef NV_PRESERVES_UV&& \
echo #define NV_PRESERVES_UV_BITS 53&& \
echo #define IVdf "I64d"&& \
echo #define UVuf "I64u"&& \
echo #define UVof "I64o"&& \
echo #define UVxf "I64x"&& \
echo #define UVXf "I64X"&& \
echo #define USE_64_BIT_INT)>> config.h
!ELSE
@(echo #define IVTYPE long&& \
echo #define UVTYPE unsigned long&& \
echo #define IVSIZE ^4&& \
echo #define UVSIZE ^4&& \
echo #define NV_PRESERVES_UV&& \
echo #define NV_PRESERVES_UV_BITS 32&& \
echo #define IVdf "ld"&& \
echo #define UVuf "lu"&& \
echo #define UVof "lo"&& \
echo #define UVxf "lx"&& \
echo #define UVXf "lX"&& \
echo #undef USE_64_BIT_INT)>> config.h
!ENDIF
!IF "$(USE_CPLUSPLUS)"=="define"
@(echo #define USE_CPLUSPLUS&& \
echo #endif)>> config.h
!ELSE
@(echo #undef USE_CPLUSPLUS&& \
echo #endif)>> config.h
!ENDIF
#separate line since this is sentinal that this target is done
@rem. > $(MINIDIR)\.exists
$(MINICORE_OBJ) : $(CORE_NOCFG_H)
$(CC) -c $(CFLAGS) -DPERL_EXTERNAL_GLOB -DPERL_IS_MINIPERL $(OBJOUT_FLAG)$@ ..\$(*F).c
$(MINIWIN32_OBJ) : $(CORE_NOCFG_H)
$(CC) -c $(CFLAGS) -DPERL_IS_MINIPERL $(OBJOUT_FLAG)$@ $(*F).c
# -DPERL_IMPLICIT_SYS needs C++ for perllib.c
# This is the only file that depends on perlhost.h, vmem.h, and vdir.h
!IF "$(USE_IMP_SYS)" == "define"
perllib$(o) : perllib.c .\perlhost.h .\vdir.h .\vmem.h
$(CC) -c -I. $(CFLAGS_O) $(CXX_FLAG) $(OBJOUT_FLAG)$@ perllib.c
!ENDIF
# 1. we don't want to rebuild miniperl.exe when config.h changes
# 2. we don't want to rebuild miniperl.exe with non-default config.h
# 3. we can't have miniperl.exe depend on git_version.h, as miniperl creates it
$(MINI_OBJ) : $(MINIDIR)\.exists $(CORE_NOCFG_H)
$(WIN32_OBJ) : $(CORE_H)
$(CORE_OBJ) : $(CORE_H)
$(DLL_OBJ) : $(CORE_H)
perldll.def : $(MINIPERL) $(CONFIGPM) ..\embed.fnc ..\makedef.pl create_perllibst_h.pl
$(MINIPERL) -I..\lib create_perllibst_h.pl
$(MINIPERL) -I..\lib -w ..\makedef.pl PLATFORM=win32 $(OPTIMIZE) $(DEFINES) $(BUILDOPT) \
CCTYPE=$(CCTYPE) TARG_DIR=..\ > perldll.def
$(PERLDLL): perldll.def $(PERLDLL_OBJ) $(PERLDLL_RES) Extensions_static
$(LINK32) -dll -def:perldll.def -base:0x28000000 -out:$@ -implib:$(PERLIMPLIB) @Extensions_static @<<
$(BLINK_FLAGS) $(DELAYLOAD) $(LIBFILES) $(PERLDLL_OBJ) $(PERLDLL_RES)
<<
$(EMBED_DLL_MANI)
$(XCOPY) $(PERLIMPLIB) $(COREDIR)
$(COREDIR)\$(PERLIMPLIB:..\=.\): $(PERLDLL)
$(COREDIR)\$(PERLSTATICLIB:..\=.\): $(PERLSTATICLIB)
$(PERLSTATICLIB): Extensions_static
$(LIB32) $(LIB_FLAGS) -out:$@ @Extensions_static @<<
$(PERLDLL_OBJ)
<<
$(XCOPY) $(PERLSTATICLIB) $(COREDIR)
$(PERLEXE_RES): perlexe.rc $(PERLEXE_MANIFEST) $(PERLEXE_ICO)
$(MINIDIR)\globals$(o) : $(GENERATED_HEADERS)
$(UUDMAP_H) $(MG_DATA_H) : $(BITCOUNT_H)
$(BITCOUNT_H) : $(GENUUDMAP)
$(GENUUDMAP) $(GENERATED_HEADERS)
$(GENUUDMAP_OBJ) : ..\mg_raw.h
$(GENUUDMAP) : $(GENUUDMAP_OBJ)
$(LINK32) -out:$@ @<<
$(BLINK_FLAGS) $(LIBFILES) $(GENUUDMAP_OBJ)
<<
$(EMBED_EXE_MANI)
perlmain.c : runperl.c
copy runperl.c perlmain.c
perlmain$(o) : perlmain.c
$(CC) $(CFLAGS_O:-DPERLDLL=-UPERLDLL) $(OBJOUT_FLAG)$@ -c perlmain.c
perlmainst.c : runperl.c
copy runperl.c perlmainst.c
perlmainst$(o) : perlmainst.c
$(CC) $(CFLAGS_O) $(OBJOUT_FLAG)$@ -c perlmainst.c
$(PERLEXE): $(PERLDLL) $(CONFIGPM) $(PERLEXE_OBJ) $(PERLEXE_RES)
$(LINK32) -out:$@ $(BLINK_FLAGS) \
$(PERLEXE_OBJ) $(PERLEXE_RES) $(PERLIMPLIB) $(LIBFILES) $(SETARGV_OBJ)
$(EMBED_EXE_MANI)
copy $(PERLEXE) ..\perl.exe
copy $(PERLEXE) $(WPERLEXE)
$(MINIPERL) -I..\lib bin\exetype.pl $(WPERLEXE) WINDOWS
$(PERLEXESTATIC): $(PERLSTATICLIB) $(CONFIGPM) $(PERLEXEST_OBJ) $(PERLEXE_RES)
$(LINK32) -out:$@ $(BLINK_FLAGS) \
$(PERLEXEST_OBJ) $(PERLEXE_RES) $(PERLSTATICLIB) $(LIBFILES) $(SETARGV_OBJ)
$(EMBED_EXE_MANI)
MakePPPort: $(MINIPERL) $(CONFIGPM) $(MKPPPORTDEP)
$(MKPPPORTDEP): $(MINIPERL) $(CONFIGPM) ..\mkppport ..\mkppport.lst
$(MINIPERL) -I..\lib ..\mkppport
#-------------------------------------------------------------------------------
# There's no direct way to mark a dependency on
# DynaLoader.pm, so this will have to do
Extensions: ..\make_ext.pl ..\lib\buildcustomize.pl $(PERLDEP) $(CONFIGPM) $(DYNALOADER) $(MKPPPORTDEP) $(PERLDLL)
$(XCOPY) ..\*.h $(COREDIR)\*.*
$(MINIPERL) -I..\lib ..\make_ext.pl "MAKE=$(MAKE)" --dir=$(CPANDIR) --dir=$(DISTDIR) --dir=$(EXTDIR) --dynamic
Extensions_reonly: ..\make_ext.pl ..\lib\buildcustomize.pl $(PERLDEP) $(CONFIGPM) $(DYNALOADER) $(MKPPPORTDEP)
$(XCOPY) ..\*.h $(COREDIR)\*.*
$(MINIPERL) -I..\lib ..\make_ext.pl "MAKE=$(MAKE)" --dir=$(CPANDIR) --dir=$(DISTDIR) --dir=$(EXTDIR) --dynamic +re
Extensions_static : ..\make_ext.pl ..\lib\buildcustomize.pl list_static_libs.pl $(PERLDEP) $(CONFIGPM) Extensions_nonxs
$(XCOPY) ..\*.h $(COREDIR)\*.*
$(MINIPERL) -I..\lib ..\make_ext.pl "MAKE=$(MAKE)" --dir=$(CPANDIR) --dir=$(DISTDIR) --dir=$(EXTDIR) --static
$(MINIPERL) -I..\lib list_static_libs.pl > Extensions_static
Extensions_nonxs: ..\make_ext.pl ..\lib\buildcustomize.pl $(PERLDEP)
$(XCOPY) ..\*.h $(COREDIR)\*.*
$(MINIPERL) -I..\lib ..\make_ext.pl "MAKE=$(MAKE)" --dir=$(CPANDIR) --dir=$(DISTDIR) --dir=$(EXTDIR) --nonxs
$(DYNALOADER) : ..\make_ext.pl ..\lib\buildcustomize.pl $(PERLDEP) $(CONFIGPM) Extensions_nonxs
$(XCOPY) ..\*.h $(COREDIR)\*.*
$(MINIPERL) -I..\lib ..\make_ext.pl "MAKE=$(MAKE)" --dir=$(EXTDIR) --dynaloader
Extensions_clean:
-if exist $(MINIPERL) $(MINIPERL) -I..\lib ..\make_ext.pl "MAKE=$(MAKE)" --dir=$(CPANDIR) --dir=$(DISTDIR) --dir=$(EXTDIR) --all --target=clean
Extensions_realclean:
-if exist $(MINIPERL) $(MINIPERL) -I..\lib ..\make_ext.pl "MAKE=$(MAKE)" --dir=$(CPANDIR) --dir=$(DISTDIR) --dir=$(EXTDIR) --all --target=realclean
PostExt: ..\lib\Storable\Limit.pm
..\lib\Storable\Limit.pm: $(PERLEXE) Extensions
cd ..\dist\Storable && $(MAKE) lib\Storable\Limit.pm
if not exist ..\lib\Storable mkdir ..\lib\Storable
copy ..\dist\Storable\lib\Storable\Limit.pm ..\lib\Storable\Limit.pm
#-------------------------------------------------------------------------------
doc:
$(PERLEXE) -f ..\pod\buildtoc -q
$(PERLEXE) ..\installhtml --podroot=.. --htmldir=$(HTMLDIR) \
--podpath=pod:lib:utils --htmlroot="file://$(INST_HTML::=|)" \
--recurse
..\utils\Makefile: $(CONFIGPM) ..\utils\Makefile.PL
$(MINIPERL) -I..\lib ..\utils\Makefile.PL ..
# Note that this next section is parsed (and regenerated) by pod/buildtoc
# so please check that script before making structural changes here
utils: $(PERLEXE) ..\utils\Makefile
cd ..\utils
$(MAKE) PERL=$(MINIPERL)
cd ..\pod
copy ..\README.aix ..\pod\perlaix.pod
copy ..\README.amiga ..\pod\perlamiga.pod
copy ..\README.android ..\pod\perlandroid.pod
copy ..\README.bs2000 ..\pod\perlbs2000.pod
copy ..\README.ce ..\pod\perlce.pod
copy ..\README.cn ..\pod\perlcn.pod
copy ..\README.cygwin ..\pod\perlcygwin.pod
copy ..\README.dos ..\pod\perldos.pod
copy ..\README.freebsd ..\pod\perlfreebsd.pod
copy ..\README.haiku ..\pod\perlhaiku.pod
copy ..\README.hpux ..\pod\perlhpux.pod
copy ..\README.hurd ..\pod\perlhurd.pod
copy ..\README.irix ..\pod\perlirix.pod
copy ..\README.jp ..\pod\perljp.pod
copy ..\README.ko ..\pod\perlko.pod
copy ..\README.linux ..\pod\perllinux.pod
copy ..\README.macos ..\pod\perlmacos.pod
copy ..\README.macosx ..\pod\perlmacosx.pod
copy ..\README.netware ..\pod\perlnetware.pod
copy ..\README.openbsd ..\pod\perlopenbsd.pod
copy ..\README.os2 ..\pod\perlos2.pod
copy ..\README.os390 ..\pod\perlos390.pod
copy ..\README.os400 ..\pod\perlos400.pod
copy ..\README.plan9 ..\pod\perlplan9.pod
copy ..\README.qnx ..\pod\perlqnx.pod
copy ..\README.riscos ..\pod\perlriscos.pod
copy ..\README.solaris ..\pod\perlsolaris.pod
copy ..\README.symbian ..\pod\perlsymbian.pod
copy ..\README.synology ..\pod\perlsynology.pod
copy ..\README.tru64 ..\pod\perltru64.pod
copy ..\README.tw ..\pod\perltw.pod
copy ..\README.vos ..\pod\perlvos.pod
copy ..\README.win32 ..\pod\perlwin32.pod
copy ..\pod\perlcdelta.pod ..\pod\perl5300cdelta.pod
copy ..\pod\perldelta.pod ..\pod\perl5300delta.pod
cd ..\win32
$(MINIPERL) -I..\lib $(PL2BAT) $(UTILS)
$(MINIPERL) -I..\lib ..\autodoc.pl ..
$(MINIPERL) -I..\lib ..\pod\perlmodlib.PL -q ..
..\pod\perltoc.pod: $(PERLEXE) Extensions Extensions_nonxs
$(PERLEXE) -f ..\pod\buildtoc -q
# Note that the pod cleanup in this next section is parsed (and regenerated
# by pod/buildtoc so please check that script before making changes here
distclean: realclean
-del /f $(MINIPERL) $(PERLEXE) $(PERLDLL) $(GLOBEXE) \
$(PERLIMPLIB) ..\miniperl.lib $(PERLEXESTATIC) $(PERLSTATICLIB)
-del /f $(LIBDIR)\Encode.pm $(LIBDIR)\encoding.pm $(LIBDIR)\Errno.pm
-del /f $(LIBDIR)\Config.pod $(LIBDIR)\POSIX.pod $(LIBDIR)\threads.pm
-del /f $(LIBDIR)\.exists $(LIBDIR)\DynaLoader.pm
-del /f $(LIBDIR)\XSLoader.pm $(LIBDIR)\lib.pm
-del /f $(LIBDIR)\Fcntl.pm $(LIBDIR)\IO.pm $(LIBDIR)\Opcode.pm
-del /f $(LIBDIR)\ops.pm $(LIBDIR)\Safe.pm
-del /f $(LIBDIR)\SDBM_File.pm $(LIBDIR)\Socket.pm $(LIBDIR)\POSIX.pm
-del /f $(LIBDIR)\B.pm $(LIBDIR)\O.pm $(LIBDIR)\re.pm
-del /f $(LIBDIR)\File\Glob.pm
-del /f $(LIBDIR)\Storable.pm
-del /f $(LIBDIR)\Sys\Hostname.pm
-del /f $(LIBDIR)\Time\HiRes.pm
-del /f $(LIBDIR)\Unicode\Normalize.pm
-del /f $(LIBDIR)\Math\BigInt\FastCalc.pm
-del /f $(LIBDIR)\Storable.pm $(LIBDIR)\Storable\Limit.pm
-del /f $(LIBDIR)\Win32.pm
-del /f $(LIBDIR)\Win32CORE.pm
-del /f $(LIBDIR)\Win32API\File.pm
-del /f $(LIBDIR)\Win32API\File\cFile.pc
-del /f $(LIBDIR)\buildcustomize.pl
-del /f $(DISTDIR)\XSLoader\XSLoader.pm
-del /f *.def *.map
-if exist $(LIBDIR)\Amiga rmdir /s /q $(LIBDIR)\Amiga
-if exist $(LIBDIR)\App rmdir /s /q $(LIBDIR)\App
-if exist $(LIBDIR)\Archive rmdir /s /q $(LIBDIR)\Archive
-if exist $(LIBDIR)\Attribute rmdir /s /q $(LIBDIR)\Attribute
-if exist $(LIBDIR)\autodie rmdir /s /q $(LIBDIR)\autodie
-if exist $(LIBDIR)\B\C rmdir /s /q $(LIBDIR)\B\C
-if exist $(LIBDIR)\ByteLoader rmdir /s /q $(LIBDIR)\ByteLoader
-if exist $(LIBDIR)\Carp rmdir /s /q $(LIBDIR)\Carp
-if exist $(LIBDIR)\Compress rmdir /s /q $(LIBDIR)\Compress
-if exist $(LIBDIR)\Config\Perl rmdir /s /q $(LIBDIR)\Config\Perl
-if exist $(LIBDIR)\CPAN rmdir /s /q $(LIBDIR)\CPAN
-if exist $(LIBDIR)\Cpanel rmdir /s /q $(LIBDIR)\Cpanel
-if exist $(LIBDIR)\Data rmdir /s /q $(LIBDIR)\Data
-if exist $(LIBDIR)\Devel rmdir /s /q $(LIBDIR)\Devel
-if exist $(LIBDIR)\Digest rmdir /s /q $(LIBDIR)\Digest
-if exist $(LIBDIR)\Encode rmdir /s /q $(LIBDIR)\Encode
-if exist $(LIBDIR)\encoding rmdir /s /q $(LIBDIR)\encoding
-if exist $(LIBDIR)\Exporter rmdir /s /q $(LIBDIR)\Exporter
-if exist $(LIBDIR)\ExtUtils\CBuilder rmdir /s /q $(LIBDIR)\ExtUtils\CBuilder
-if exist $(LIBDIR)\ExtUtils\Command rmdir /s /q $(LIBDIR)\ExtUtils\Command
-if exist $(LIBDIR)\ExtUtils\Constant rmdir /s /q $(LIBDIR)\ExtUtils\Constant
-if exist $(LIBDIR)\ExtUtils\Liblist rmdir /s /q $(LIBDIR)\ExtUtils\Liblist
-if exist $(LIBDIR)\ExtUtils\MakeMaker rmdir /s /q $(LIBDIR)\ExtUtils\MakeMaker
-if exist $(LIBDIR)\ExtUtils\ParseXS rmdir /s /q $(LIBDIR)\ExtUtils\ParseXS
-if exist $(LIBDIR)\ExtUtils\Typemaps rmdir /s /q $(LIBDIR)\ExtUtils\Typemaps
-if exist $(LIBDIR)\File\Spec rmdir /s /q $(LIBDIR)\File\Spec
-if exist $(LIBDIR)\Filter rmdir /s /q $(LIBDIR)\Filter
-if exist $(LIBDIR)\Hash rmdir /s /q $(LIBDIR)\Hash
-if exist $(LIBDIR)\HTTP rmdir /s /q $(LIBDIR)\HTTP
-if exist $(LIBDIR)\I18N rmdir /s /q $(LIBDIR)\I18N
-if exist $(LIBDIR)\inc rmdir /s /q $(LIBDIR)\inc
-if exist $(LIBDIR)\Internals rmdir /s /q $(LIBDIR)\Internals
-if exist $(LIBDIR)\IO rmdir /s /q $(LIBDIR)\IO
-if exist $(LIBDIR)\IPC rmdir /s /q $(LIBDIR)\IPC
-if exist $(LIBDIR)\JSON rmdir /s /q $(LIBDIR)\JSON
-if exist $(LIBDIR)\List rmdir /s /q $(LIBDIR)\List
-if exist $(LIBDIR)\Locale rmdir /s /q $(LIBDIR)\Locale
-if exist $(LIBDIR)\Math rmdir /s /q $(LIBDIR)\Math
-if exist $(LIBDIR)\Memoize rmdir /s /q $(LIBDIR)\Memoize
-if exist $(LIBDIR)\MIME rmdir /s /q $(LIBDIR)\MIME
-if exist $(LIBDIR)\Module rmdir /s /q $(LIBDIR)\Module
-if exist $(LIBDIR)\Net\FTP rmdir /s /q $(LIBDIR)\Net\FTP
-if exist $(LIBDIR)\Params rmdir /s /q $(LIBDIR)\Params
-if exist $(LIBDIR)\Parse rmdir /s /q $(LIBDIR)\Parse
-if exist $(LIBDIR)\Perl rmdir /s /q $(LIBDIR)\Perl
-if exist $(LIBDIR)\PerlIO rmdir /s /q $(LIBDIR)\PerlIO
-if exist $(LIBDIR)\Pod\Perldoc rmdir /s /q $(LIBDIR)\Pod\Perldoc
-if exist $(LIBDIR)\Pod\Simple rmdir /s /q $(LIBDIR)\Pod\Simple
-if exist $(LIBDIR)\Pod\Text rmdir /s /q $(LIBDIR)\Pod\Text
-if exist $(LIBDIR)\Scalar rmdir /s /q $(LIBDIR)\Scalar
-if exist $(LIBDIR)\Search rmdir /s /q $(LIBDIR)\Search
-if exist $(LIBDIR)\Stash rmdir /s /q $(LIBDIR)\Stash
-if exist $(LIBDIR)\Sub rmdir /s /q $(LIBDIR)\Sub
-if exist $(LIBDIR)\Sys rmdir /s /q $(LIBDIR)\Sys
-if exist $(LIBDIR)\TAP rmdir /s /q $(LIBDIR)\TAP
-if exist $(LIBDIR)\Term rmdir /s /q $(LIBDIR)\Term
-if exist $(LIBDIR)\Test rmdir /s /q $(LIBDIR)\Test
-if exist $(LIBDIR)\Text rmdir /s /q $(LIBDIR)\Text
-if exist $(LIBDIR)\Thread rmdir /s /q $(LIBDIR)\Thread
-if exist $(LIBDIR)\threads rmdir /s /q $(LIBDIR)\threads
-if exist $(LIBDIR)\Tie\Hash rmdir /s /q $(LIBDIR)\Tie\Hash
-if exist $(LIBDIR)\Unicode\Collate rmdir /s /q $(LIBDIR)\Unicode\Collate
-if exist $(LIBDIR)\Unicode\Collate\Locale rmdir /s /q $(LIBDIR)\Unicode\Collate\Locale
-if exist $(LIBDIR)\version rmdir /s /q $(LIBDIR)\version
-if exist $(LIBDIR)\VMS rmdir /s /q $(LIBDIR)\VMS
-if exist $(LIBDIR)\Win32API rmdir /s /q $(LIBDIR)\Win32API
-if exist $(LIBDIR)\XS rmdir /s /q $(LIBDIR)\XS
-if exist $(LIBDIR)\YAML rmdir /s /q $(LIBDIR)\YAML
-if exist $(LIBDIR)\YAML\Safe rmdir /s /q $(LIBDIR)\YAML\Safe
-cd $(PODDIR) && del /f *.html *.bat roffitall \
perl5300cdelta.pod perl5300delta.pod perlaix.pod perlamiga.pod \
perlandroid.pod perlapi.pod perlbs2000.pod perlce.pod \
perlcn.pod perlcygwin.pod perldos.pod perlfreebsd.pod \
perlhaiku.pod perlhpux.pod perlhurd.pod perlintern.pod \
perlirix.pod perljp.pod perlko.pod perllinux.pod perlmacos.pod \
perlmacosx.pod perlmodlib.pod perlnetware.pod perlopenbsd.pod \
perlos2.pod perlos390.pod perlos400.pod perlplan9.pod \
perlqnx.pod perlriscos.pod perlsolaris.pod perlsymbian.pod \
perlsynology.pod perltoc.pod perltru64.pod perltw.pod \
perluniprops.pod perlvos.pod perlwin32.pod
-cd ..\utils && del /f h2ph splain cperlbug pl2pm c2ph pstruct h2xs \
cperldoc cperlivp libnetcfg enc2xs encguess piconv cpan *.bat \
xsubpp pod2html instmodsh json_pp prove ptar ptardiff ptargrep shasum corelist zipdetails
-del /f ..\config.sh perlmain.c dlutils.c config.h.new \
perlmainst.c
-del /f $(CONFIGPM)
-del /f ..\lib\Config_git.pl
-del /f bin\*.bat
-del /f perllibst.h
-del /f $(PERLEXE_RES) perl.base
-cd .. && del /s *.lib *.map *.pdb *.ilk *.bs *$(o) .exists pm_to_blib ppport.h
-cd $(EXTDIR) && del /s *.def Makefile Makefile.old
-cd $(DISTDIR) && del /s *.def Makefile Makefile.old
-cd $(CPANDIR) && del /s *.def Makefile Makefile.old
-del /s ..\utils\Makefile
-if exist $(AUTODIR) rmdir /s /q $(AUTODIR)
-if exist $(COREDIR) rmdir /s /q $(COREDIR)
-if exist pod2htmd.tmp del pod2htmd.tmp
-if exist $(HTMLDIR) rmdir /s /q $(HTMLDIR)
-del /f ..\t\test_state
install : all installbare installhtml
installbare : utils ..\pod\perltoc.pod
$(PERLEXE) ..\installperl
if exist $(WPERLEXE) $(XCOPY) $(WPERLEXE) $(INST_BIN)\*.*
if exist $(PERLEXESTATIC) $(XCOPY) $(PERLEXESTATIC) $(INST_BIN)\*.*
$(XCOPY) $(GLOBEXE) $(INST_BIN)\*.*
if exist ..\perl*.pdb $(XCOPY) ..\perl*.pdb $(INST_BIN)\*.*
$(XCOPY) bin\*.bat $(INST_SCRIPT)\*.*
installhtml : doc
$(RCOPY) $(HTMLDIR)\*.* $(INST_HTML)\*.*
inst_lib : $(CONFIGPM)
$(RCOPY) ..\lib $(INST_LIB)\*.*
$(UNIDATAFILES) ..\pod\perluniprops.pod : $(MINIPERL) $(CONFIGPM) ..\lib\unicore\mktables Extensions_nonxs
cd ..\lib\unicore && \
..\$(MINIPERL) -I.. mktables -P ..\..\pod -maketest -makelist -p -check $@ $(FIRSTUNIFILE)
minitest : .\config.h $(MINIPERL) ..\git_version.h $(GLOBEXE) $(CONFIGPM) $(UNIDATAFILES)
$(XCOPY) $(MINIPERL) ..\t\$(NULL)
if exist ..\t\perl.exe del /f ..\t\perl.exe
rename ..\t\miniperl.exe perl.exe
$(XCOPY) $(GLOBEXE) ..\t\$(NULL)
# Note this perl.exe is miniperl
cd ..\t && perl.exe TEST base/*.t comp/*.t cmd/*.t run/*.t io/*.t re/*.t opbasic/*.t op/*.t uni/*.t perf/*.t pragma/*.t
test-prep : all utils ../pod/perltoc.pod
$(XCOPY) $(PERLEXE) ..\t\$(NULL)
copy $(PERLEXE) ..\t\perl.exe
copy $(PERLEXE) ..\perl.exe
$(XCOPY) $(PERLDLL) ..\t\$(NULL)
$(XCOPY) $(PERLDLL) ..\cpan\B-C\$(NULL)
-$(XCOPY) bin\*.dll ..\cpan\B-C\$(NULL)
$(XCOPY) $(GLOBEXE) ..\t\$(NULL)
set PERL_STATIC_EXT=$(STATIC_EXT)
test : test-prep
cd ..\t
perl.exe harness $(TEST_SWITCHES) $(TEST_FILES)
cd ..\win32
test_porting : test-prep
cd ..\t
perl.exe harness $(TEST_SWITCHES) porting\*.t ..\lib\diagnostics.t
cd ..\win32
test-reonly : reonly utils
$(XCOPY) $(PERLEXE) ..\t\$(NULL)
copy $(PERLEXE) ..\t\perl.exe
$(XCOPY) $(PERLDLL) ..\t\$(NULL)
$(XCOPY) $(GLOBEXE) ..\t\$(NULL)
cd ..\t
perl.exe harness $(OPT) -re \bre\\/ $(EXTRA)
cd ..\win32
regen :
cd ..
regen.pl
cd win32
test-notty : test-prep
set PERL_SKIP_TTY_TEST=1
cd ..\t
perl.exe harness $(TEST_SWITCHES) $(TEST_FILES)
cd ..\win32
_test :
$(XCOPY) $(PERLEXE) ..\t\$(NULL)
copy $(PERLEXE) ..\t\perl.exe
$(XCOPY) $(PERLDLL) ..\t\$(NULL)
$(XCOPY) $(GLOBEXE) ..\t\$(NULL)
cd ..\t
perl.exe harness $(TEST_SWITCHES) $(TEST_FILES)
cd ..\win32
_clean :
-@$(DEL) miniperlmain$(o)
-@$(DEL) $(MINIPERL)
-@$(DEL) perlglob$(o)
-@$(DEL) perlmain$(o)
-@$(DEL) perlmainst$(o)
-@$(DEL) config.h
-@$(DEL) ..\git_version.h
-@$(DEL) $(GLOBEXE)
-@$(DEL) $(PERLEXE)
-@$(DEL) $(WPERLEXE)
-@$(DEL) $(PERLEXESTATIC)
-@$(DEL) $(PERLSTATICLIB)
-@$(DEL) $(PERLDLL)
-@$(DEL) $(CORE_OBJ)
-@$(DEL) $(GENUUDMAP) $(GENUUDMAP_OBJ) $(GENERATED_HEADERS)
-if exist $(MINIDIR) rmdir /s /q $(MINIDIR)
-if exist $(UNIDATADIR1) rmdir /s /q $(UNIDATADIR1)
-if exist $(UNIDATADIR2) rmdir /s /q $(UNIDATADIR2)
-@$(DEL) $(UNIDATAFILES)
-@$(DEL) $(WIN32_OBJ)
-@$(DEL) $(DLL_OBJ)
-@$(DEL) ..\*$(o) ..\*.lib ..\*.exp *$(o) *.lib *.exp *.res
-@$(DEL) ..\t\*.exe ..\t\*.dll ..\t\*.bat
-@$(DEL) *.ilk
-@$(DEL) *.pdb
-@$(DEL) Extensions_static
clean : Extensions_clean _clean
realclean : Extensions_realclean _clean
# Handy way to run cperlbug -ok without having to install and run the
# installed cperlbug. We don't re-run the tests here - we trust the user.
# Please *don't* use this unless all tests pass.
# If you want to report test failures, use "nmake nok" instead.
ok: utils
$(PERLEXE) ..\utils\cperlbug -ok -s "(UNINSTALLED)"
okfile: utils
$(PERLEXE) ..\utils\cperlbug -ok -s "(UNINSTALLED)" -F perl.ok
nok: utils
$(PERLEXE) ..\utils\cperlbug -nok -s "(UNINSTALLED)"
nokfile: utils
$(PERLEXE) ..\utils\cperlbug -nok -s "(UNINSTALLED)" -F perl.nok
|
National Geographic gets to the science behind what makes a man manly - his Testosterone Factor. It s one of the most important and powerful hormones in a man s body, but how does testosterone really impact his strength, status, success, and even commitment? |
Yaracuy River
The Yaracuy River is a river of Venezuela. It drains into the Caribbean Sea.
See also
List of rivers of Venezuela
References
Rand McNally, The New International Atlas, 1993.
Category:Rivers of Venezuela |
Alex Rodriguez and the New York Yankees have reached an agreement on a bonus dispute that will see $3.5 million of the total being donated to charity. Rodriguez was scheduled to receive a $6 million bonus as part of his original $275 million contract with the Yankees for tying Willie Mays’ record on the all-time […] |
With the 28th selection in the 2012 NHL Draft, the New York Rangers have selected defenseman Brady Skjei.
He is 6-3, 203 and played for the US Development program.
His favorite NHL player is Cam Fowler and his favorite movie is Miracle.
He was ranked 37th by Future Considerations who write, “A smooth skating two-way defender with enticing upside. His skating is sneaky fast with incredibly explosive acceleration. He utilizes his skilled hands by starting the attack: Rushing the puck up the ice from his defensive zone into the offensive zone before dishing it off or taking a shot. He has a heavy, accurate slapshot that is a weapon from the point. He makes good use of his long reach, showing strong puck protection and good gap control in his own zone.”
“He makes simple, solid touch passes on the rush but needs to utilize his good breakout pass more often. He is at his best when he simplifies his game and moves the puck but also has an eye on his defensive responsibilities; he has a little river boat gambler in him. Questions arise regarding his hockey sense as every time Skjei touches the puck, he wants to take it end-to-end, even with an opposition’s entire defense in his way. He can also fall into funks of being turnover prone, and is sometimes unwilling to just make the simple play. Is the kind of player whose physical ability masks questionable hockey sense. He’s headed to the University of Minnesota.”
The Hockey News ranked him 26th and calls him a “smooth skating defenseman.” The Hockey News says that he is the best skating defenseman available and one scout said “watching him skate is like poetry.”
They add, “He is effortless and massive, which makes him attractive. His skating ability for his size is frightening. “When somebody gets him at the next level and tells him ‘Just be simple and go with your skating stride’ he’ll be a real effective NHLer.”
US National coach Danton Cole says, “His game has improved greatly, both offensively and defensively. He’s a tremendous skater and a good example of a guy who understands the little nuances of playing defense. He’s thrived in the [USNTDP] program and is a physical specimen; he’s big and strong and has made great strides in learning how to play the game. His angling is good and he has put himself in a really good position moving forward in his career.”
Pierre McGuire said, “This is a smart pick by a team that has had good success growing talent.”
Bob McKenzie said he is a good skater with a good stride. He skates like Bret Hedican and he has great skating ability and great ability to recover. |
This is a draft document that describes a package repository that is neither announced not ready for public consumption, as some of the details might change during the boot-up-phase the repositories are in at the moment. And this page definitely needs someone that proof reads it…
Linux vanilla kernels for Fedora
Overview
This page contains usage information about a set of package repositories which contain RPMs of Linux vanilla kernels built for Fedora. Vanilla in this scope means "unmodified", hence these packages do not contain any of those enhancements the Fedora developers integrate into the Linux kernel packages that Fedora normally uses.
When you install a kernel from the repo for the first time yum will ask you if you trust the the public key that is used to verify the signature of the packages from the kernel vanilla repositories. It will look like this:
It is strongly suggested you add "kernel-devel" to above "yum install" call, because that way you get the package with the files needed to compile kernel modules for the kernel you are installing; these devel files might not be able to get that easily later or might not be available on the repositories any more, depending on when "later" is.
Important notes*
Please note:
none of the developers that maintain the Fedora kernel is involved in this effort
most systems work better and are run in a more secure manner with the official Fedora kernels)
if you don't know what above command do then you likely should not use these packages
For more details on this see below.
FAQ
For users
Who is behind this effort?
Right now the Linux kernel vanilla repositories for Fedora are maintained by Thorsten Leemhuis (aka "knurd") only. Maybe over time over time people join to help, that's why this text is written as if a team is keeping care of the repositories.
Can we trust the people behind it?
You have to decide yourself if you can trust the packages from these repositories. If it is any help: Some of those that use or contribute to Fedora since a while will know that Thorsten has quite a history of Fedora contributions, even if he was not that much active in the past few years. You can assume he has no interest in ruin his reputation quickly by providing crap in these repositories. On the other hand you should know that Thorsten started these repositories to dig deeper into the kernel and kernel development; so expect he'll make some mistakes along the way. And be reminded that using vanilla kernels has some known downsides and risks (see below).
What's the goal?
The main ideas is to help upstream development, which in the end will be of benefit for Fedora as well. With the packages from the mainline repositories it for example is quite easy to test kernels that are still under development and report bugs upstream, so they get fixed before a certain kernel version get released and later shipped as update to Fedora.
The kernels from the stable repositories on the other hand make it easy to check if a bug that happens with a kernel from Fedora is specific to it or also present in the newest vanilla kernel from the mainline or the stable series; if that is the case users can directly work with upstream on working out solutions for the problem and don't have to go through the sometimes overworked and quite busy developers that maintain the Linux kernel packages in Fedora.
Are the kernels from the kernel-vanilla repositories as good as those Fedora provides?
No. There are several reasons for why not; the most important ones:
the developers that take care of the kernel package in Fedora are far more experienced in packaging kernels and kernel development than those that take care of the kernel-vanilla repositories
the kernels that get used in Fedora or released as proper update get a lot of testing; the kernels from the kernel-vanilla repositories get nearly no testing
the official Fedora kernels sometimes contain changes that fix security problems or other crucial bugs before they get merged upstream
In addition:
the mainline repository contain kernels that are still under heavy development and sometimes are known to have serious bugs.
But in the end using the kernels from the kernel-vanilla repositories should not be any more dangerous than compiling and installing a kernel from source yourself.
Are the kernels safe to use?
Depends on your definition of "safe".
The Linux kernel is a complex piece of software which contains bugs. Those lead to data loss sometimes; in very rare situations they can even lead to hardware defects. Those bugs might only show up under specific circumstances -- for example when a specific mix of hardware is used with a specific kernel version that was built with a specific configuration. It might be unlikely that such a bug is triggered by one of the non-development kernels from the kernel-vanilla repositories, but it's definitely possible. Self compiled kernels bear the same risk; chances of hitting serious bugs are lower for kernels that have undergone widespread testing already.
In other words: The kernels from the kernel-vanilla repositories will work just fine for most people. But use them on your own risk and have backups handy, as you always should.
Should everything work with those kernels that works with the official Fedora kernels?
No. Linux vanilla kernels are not that different from the kernels Fedora provides, but the latter include a few enhancements. Each was added for a good reason to make Fedora better, hence these improvements are missing when you use Linux vanilla kernels.
When this text was written in the spring of 2012 Fedora for example included utrace in their Linux kernels to support userspace tracing with systemtap; hence this feature won't work with the kernels from the kernel-vanilla repositories. Another example: The kernels from Fedora sometimes include fresher drivers which some systems will require to work properly. And sometimes there are inter-dependencies between drivers in kernel and userland. The nouveau driver for graphics hardware from Nvidia was one such driver, as it had no stable API yet when this text was written; that's why the DRM/KMS driver in the kernel was marked as "staging" back then. The Mesa 3D or X.org drivers included in a particular Fedora release therefore might depend on the nouveau DRM/KMS driver which is part of the kernels Fedora ships for this release; thus the nouveau drivers for Mesa 3D and X.org that are part of a certain Fedora release might not work properly with kernels found in the kernel-vanilla repositories, as the latter might contain an older or newer nouveau DRM/KMS driver which are incompatible.
The non-development kernels found in the kernel-vanilla repositories therefore should work on a lot of systems, but on some systems they will be worse than the kernels Fedora provides.
Where to report bugs
If the Linux kernels in the packages from these repositories show any bugs please report them upstream to the Linux kernel developers, just as you would after installing a Linux kernel yourself with the sources available at kernel.org; that way all the bug reports go to the place where the people hang out that know how to fix them.
How can I avoid switching back and forth between vanilla kernels and Fedora kernels ?
Add "exclude=kernel" to the first section of these files in /etc/yum.repos.d/
fedora.repo
fedora-updates.repo
fedora-updates-testing.repo
Will this repository also ship updates userland components like drivers or udev that match the kernels in the repositories?
No, as there should be no need to, as the interfaces between the kernel and userland software should never change in an incompatible way; Linus Torvalds makes this pretty clear every now and then.
That is the long story short. There are a lot of situations where the world is more complicated:
above mentioned rule does not apply to staging drivers, so situations might arise where the vanilla kernels are not usable for people that need staging drivers for their system. Apart from the nouveau drivers that shouldn't bother to many people; and time will tell how bad the situation is for nouveau.
Fedora sometimes might contain software that depends on bits that are not upstream
And even with this rule sometimes a new mainline kernel versions brings changes that require updates userland software. Three examples:
the version number jump from 2.6.39 to 3.0 confused some software
in rare cases fixing security problems was only possible my changing the interfaces in an incompatible way
sometimes nobody notices early enough that interfaces have changed
It remains to be seen how often we hit such issues and how bad they are; how we deal with them will be decided on a case by case basis. In some cases we might have to other solution then to add new versions of other software to the repositories. But the plan is to avoid this if possible.
Do you plan to provide packages for "linux-next" or "linux-rt" as well?
For now: No. I know there is some interest in packages for them, but maintaining those will consume a lot of time regularly and we have not enough resources to do it properly right now.
The CCMA people also build RT kernels already and it might be the best for everyone to not compete with them and simply ignore RT here.
Packaging -next kernels might not be a good idea in general, as chances these kernels contain bad bugs are bigger than in the mainline of stable series. Jence it might be wise to leave -next to people that build kernels themselves.
Do you plan to provide vanilla kernels for RHEL and derivatives like CentOS and SL?
Sounds like a good addition. But there are people more familiar with these dists that provide such packages already. It would mean additional work, too; and we currently have no one that would regularly run such kernels. So for now we won't get our feet wet in that area. But if you want to step up and help, get in contact.
Do you plan to provide packages for longterm kernels
Unlikely. Mail goal of the kernel-vanilla repositories is to help upstream kernel development; but longterm kernels are a dead end and quite far away from mainline development, so they would not fit that well. But it might make sense for RHEL and derivatives, if those will ever be supported by this effort.
What configuration do those kernels use?
Basically the same configuration the Fedora kernels use. Maybe a few staging drivers might get turned on to help their development, but apart from it the plan is to stick closely to what Fedora does.
Why don't you put these kernels in Fedoras main repositories
The current consensus in the Fedora project as far as we know is: That's not a good idea, as that would make the vanilla Linux kernels more "official" and people might simply use those without knowing what their downsides are.
That's the long story rough and short. And sure, there are reasons why having vanilla kernels in the main repositories make sense. Feel free to start a discussion on Fedoras devel mailing list, we'll watch and might jump in.
Putting the kernels in a well know 3rd party add-on repository for Fedora might make sense, but some of the problems would be similar; and there are others problems, as then users might ask to build add-on modules for those kernels, too. In other words: Would need discussion and careful evaluation.
Are those kernels really unpatched?
No, they contain a handful of very small changes that are needed for packaging.
From time to time the packages might use patches that are necessary temporary to make the kernel build or usable for most people; fixes like these will normally head upstream quickly and hence vanish from the vanilla packages again soon. And this normally should only happen with mainline development kernels, not with stable versions.
How up2date will those repositories be?
We do the work in our spare time. Sometimes the day job and this strange thing called "real life" leave not much time to work on these kernels, so there will be a lag.
For contributors and developers
Can you please include this patch?
No. Get your patch merged upstream, then the change you are interested in will automatically show up in these packages. And even better: it will automatically get into Fedora and other distributions, too!
Is there a Git tree somewhere?
Let us know if we should do modifications to allow others to contribute to or benefit from this git tree better.
What Fedora versions will be supported
The plan is to always support the most recent Fedora version in the stable and mainline repositories. The mainline and sometimes the stable repo will also be provides for the distribution that is currently under development (rawhide on the first half of Fedoras development cycle iteration or the alpha/beta/rcs in the second half).
Why are there no debug kernels and not even debuginfo packages
The space on repos.fedoraprople.org is limited, hence we need to limit the number of packages we can provide. The debuginfo packages are also quite big, which makes them hard to handle. If there is interest, then may in the sort or medium timeframe solutions can be found to provide these packages.
That might make sense. But it bears the risk that a commit is done to a wrong branch and disturbs the work of the Fedora kernels maintainer. Further: Not all of those that contribute to Fedora can commit there. That's similar with the fedorapeople git repository, but the docs indicate others can be given access with the help of ACLs.
But whatever: Git is made for distributed development, so simply clone it and send pull requests if you have any additions.
Can I help?
Of course. Talk to Thorsten; best if you come with some ideas what you can and want to do.
Do you plan to work together with those that take care of the kernel packages in Fedora?
That's a valid concern, but I think the benefits outweigh the downsides.
That again that is the long story short. Just to get a little bit deeper into it and show a different view on the matter at hand: Similar arguments could be used to argue that Fedora should stop shipping patched kernels, as they take attention away from the upstream kernel. Up to a point such an argument is valid, too, but there are good reasons why Fedora patches its kernels.
Why did you drop the "-vanilla" postfix that normally gets added to the "name" macro when you build a vanilla kernel RPM locally?
I've thought about dropping or leaving it for a while, as both schemes have various benefits and downsides. In the end I went for dropping it due to reasons like this:
nearly every other repository in Fedoraland that ships variants of a packages that are included in Fedora do not change the name
the postfix in the name breaks some tool -- for example things like "fedpkg srpm" on the git checkout
external solutions that heavily depend on the naming scheme Fedora uses (like the akmod/kmod stuff used in some external repositories) would break with the -vanilla postfix in the name
yum would not recognize kernel packages with a "-vanilla" postfix as "installonly" and thus would perform a regular update for vanilla packages instead of installing them parallel to the current one
Known issues and differences
The following sections will list differences to Fedora's proper kernel packages that might be relevant to users. It will also lists known problems specific to the packaging of the vanilla kernels.
Please note that these section will not lists any issues known in kernel version that are packaged, as it's best to maintain that information in a central place. So for a list of known bugs in the kernels packaged look at the the upstream bugtracker and the [[1]] of mailing lists like the LKML].
General
No issues known.
ToDo
enable some of the staging drivers Fedora avoids (basically those a well known add-on repository for Fedora ships as add-on package) |
#include <stdio.h>
#include <stdarg.h>
/* This program generates the CalcPlyrDirn function(s) */
char *names1[]={
"wPlayer0",
"wPlayer1",
"wPlayer2",
"wPlayer3",
"wPlayer4",
"wPlayer5",
};
char *names2[]={
"P0","P1","P2","P3","P4","P5","HP"
};
char *xnames[]={
"wPlayer0+SPR_CRT_X",
"wPlayer1+SPR_CRT_X",
"wPlayer2+SPR_CRT_X",
"wPlayer3+SPR_CRT_X",
"wPlayer4+SPR_CRT_X",
"wPlayer5+SPR_CRT_X",
"wHoopCrtX",
};
char *ynames[]={
"wPlayer0+SPR_CRT_Y",
"wPlayer1+SPR_CRT_Y",
"wPlayer2+SPR_CRT_Y",
"wPlayer3+SPR_CRT_Y",
"wPlayer4+SPR_CRT_Y",
"wPlayer5+SPR_CRT_Y",
"wHoopCrtY",
};
void tprintf(char *format, ...)
{
char buff[128],*p;
va_list ap;
va_start(ap, format);
vsprintf(buff,format, ap);
va_end(ap);
p=buff;
while(*p)
{
if(*p==' ') *p='\t';
++p;
}
printf("%s", buff);
}
void calc(int p1,int p2) {
tprintf(" LD HL,%s\n",xnames[p1]);
tprintf(" LD A,[HLI]\n");
tprintf(" LD C,A\n");
tprintf(" LD A,[HLI]\n");
tprintf(" LD B,A\n");
tprintf(" INC L\n");
tprintf(" LD A,[HLI]\n");
tprintf(" LD E,A\n");
tprintf(" LD D,[HL]\n");
tprintf(" LD HL,%s\n",xnames[p2]);
tprintf(" LD A,[HLI]\n");
tprintf(" SUB C\n");
tprintf(" LD C,A\n");
tprintf(" LD A,[HLI]\n");
tprintf(" SBC B\n");
tprintf(" LD B,A\n");
if(p2<6)
tprintf(" INC L\n");
tprintf(" LD A,[HLI]\n");
tprintf(" SUB E\n");
tprintf(" LD E,A\n");
tprintf(" LD A,[HL]\n");
tprintf(" SBC D\n");
tprintf(" LD D,A\n");
tprintf(" CALL CalcDistance\n");
tprintf(" LD [%s+SPR_DIR_%s],A\n",names1[p1],names2[p2]);
if(p2<6)
{
tprintf(" XOR $80\n");
tprintf(" LD [%s+SPR_DIR_%s],A\n",names1[p2],names2[p1]);
}
tprintf(" LD A,C\n");
tprintf(" LD [%s+SPR_DST_%s],A\n",names1[p1],names2[p2]);
if(p2<6)
{
tprintf(" LD [%s+SPR_DST_%s],A\n",names1[p2],names2[p1]);
}
}
void head(int n) {
tprintf("CalcPlyrDirn%d_B::\n",n);
}
void tail() {
tprintf(" RET\n");
}
int main(int argc, char **argv) {
int i,j,k;
k=0;
for(i=0;i<6;++i)
for(j=i+1;j<7;++j)
{
if(!k || k==11)
head(k/11);
calc(i,j);
if(k==10 || k==20)
tail();
++k;
}
}
|
GABA receptor subtype antagonists in the nucleus accumbens shell and ventral tegmental area differentially alter feeding responses induced by deprivation, glucoprivation and lipoprivation in rats.
GABA(A) and GABA(B) receptor agonists stimulate feeding following microinjection into the nucleus accumbens shell and ventral tegmental area, effects blocked selectively and respectively by GABA(A) and GABA(B) receptor antagonists. GABA antagonists also differentially alter opioid-induced feeding responses elicited from these sites. Although GABA agonists and antagonists have been shown to modulate feeding elicited by deprivation or glucoprivation, there has been no systematic examination of feeding elicited by homeostatic challenges following GABA antagonists in these sites. Therefore, the present study examined the dose-dependent ability of GABA(A) (bicuculline, 75-150 ng) and GABA(B) (saclofen, 1.5-3 microg) antagonists administered into the nucleus accumbens shell or ventral tegmental area upon feeding responses elicited by food deprivation (24 h), 2-deoxy-D-glucose-induced glucoprivation (500 mg/kg) or mercaptoacetate-induced lipoprivation (70 mg/kg). A site-specific effect of GABA receptor antagonism was observed for deprivation-induced feeding in that both bicuculline and saclofen administered into the nucleus accumbens shell, but not the ventral tegmental area, produced short-term (1-4 h), but not long-term (24-48 h) effects upon deprivation-induced intake without meaningfully altering body weight recovery. In contrast to the relative inability of GABA receptor antagonism in both sites to alter 2-deoxy-D-glucose-induced intake, mercaptoacetate-induced intake was eliminated by saclofen and significantly reduced by bicuculline in the nucleus accumbens shell and eliminated by both bicuculline and saclofen in the ventral tegmental area. These data reinforce the findings that GABA(A) and GABA(B) receptors in the nucleus accumbens shell and ventral tegmental area are not only important in the modulation of pharmacologically induced feeding responses, but also participate in differentially mediating the short-term feeding response to food deprivation in the nucleus accumbens shell as well strongly modulating lipoprivic, but not glucoprivic feeding responses in both sites. |
Preferences for EMS transport and pediatric emergency department care.
To characterize the reasons pediatric emergency department (PED), patients access emergency medical services (EMS) for transport to the pediatric ED. To describe the acceptability of other modes of transport and alternative sites of care. We included a convenience sample of the responsible adults accompanying pediatric patients who arrived via EMS to the PED of an academic medical center. We administered a survey to evaluate why they chose EMS and their feelings about alternative modes of transport (e.g., medical van, taxi) or alternative sites of care (e.g., urgent care center, primary care physician's office, or getting an appointment within 24 hours). One hundred thirty-eight surveys were completed. Pediatric patients averaged eight years of age. Trauma (44%) and seizures (17%) were the chief complaints. The primary reasons for EMS use were perceived medical necessity (54%) and security of transport by EMS (17%). Only transport by EMS was found to be acceptable. The responsible adults expressed acceptance of the PED (median=7, 1=not acceptable, 7=very acceptable) as a destination, more than their child's primary care doctor's (median=4), urgent care centers (median=3), or no transport and a physician appointment within 24 hours (median=1). Adults access the EMS system for children because of concerns regarding the acuity of illness and for the security of EMS transport. They were generally uninterested in transport by any mode other than EMS. However, they would accept transport to alternative sites for immediate care. |
Treatment of pruritus in chronic liver disease with the 5-hydroxytryptamine receptor type 3 antagonist ondansetron: a randomized, placebo-controlled, double-blind cross-over trial.
Recently, the serotonin antagonist ondansetron has been reported to have a positive effect on cholestasis-associated pruritus. To study the effect of orally administered ondansetron on pruritus in chronic liver disease in a randomized, placebo-controlled, double-blind, cross-over study. Subjective severity of pruritus was assessed using a visual analogue scale (VAS) recorded four times daily by the patients. After a one week pretreatment baseline period the patients were randomized to receive ondansetron tablets 8 mg tds or placebo tablets tds for one week. Following a one week wash-out period patients were switched to the other treatment for one week. The study was ended by an additional follow-up week without medication. For each day peak VAS values were determined and the mean value of the last five days of each week was calculated and referred to as the composite peak VAS score. We observed a significant but moderate reduction of the composite peak VAS score of 1.34 points (CI(95%): 0.12-2.56; P=0.033) during treatment with ondansetron as compared to placebo (treatment effect). In addition, a period effect was observed: a reduction of composite peak VAS score by 1.26 points (C1(95%): 0.04-2.48; P=0.044) was seen in the second treatment period as compared to the first period, irrespective of the kind of treatment. Although under treatment with ondansetron a significant improvement of itching as assessed by the VAS score was demonstrated, this treatment was not preferred over placebo by the patients. The 5-hydroxytryptamine receptor type 3 antagonist ondansetron has a small, but significant positive effect on pruritus in chronic liver disease as compared to placebo. |
Q:
Bash array and loop won't work together
I am pretty new in bash script and can't figure out why this piece of code doesn't work (yes I've googled around).
Here's my code:
if [ $usertype = normal ]
then
commands[0]="hi" ; descriptions[0]="get greeted"
commands[1]="test" ; descriptions[1] = "test"
elif [ $usertype = hacker ]
commands[0]="hi" ; descriptions[0]="get greeted"
commands[1]="test" ; descriptions[1] = "test"
fi
alias fhelp='
for ((i=0; i<=${commands[@]}; i++))
do
printf '%s %s\n' "${commands[i]}" "${descriptions[i]}"
done'
Any ideas?
Thanks in advance.
A:
You can't use single quotes inside single quotes. Do this, it treats "'" as a string of a single quote and concatenate them.
alias fhelp='
for ((i=0; i<=${commands[@]}; i++))
do
printf '"'"'%s %s\n'"'"' "${commands[i]}" "${descriptions[i]}"
done'
And use ${#commands[@]} to get the array length.
|
---
title: ICorDebugILCode::GetEHClauses 方法
ms.date: 03/30/2017
dev_langs:
- cpp
api_name:
- ICorDebugILCode.GetEHClauses
api_location:
- mscordbi.dll
api_type:
- COM
ms.assetid: cf7a0e00-06ae-47a5-8037-598b26196802
topic_type:
- apiref
ms.openlocfilehash: e1fd68cd079b381d941d416831133c54e49ac48a
ms.sourcegitcommit: 488aced39b5f374bc0a139a4993616a54d15baf0
ms.translationtype: MT
ms.contentlocale: zh-CN
ms.lasthandoff: 05/12/2020
ms.locfileid: "83210379"
---
# <a name="icordebugilcodegetehclauses-method"></a>ICorDebugILCode::GetEHClauses 方法
[仅在 .NET Framework 4.5.2 及更高版本中受支持]
返回指向为此中间语言 (IL) 定义的异常处理 (EH) 子句列表的指针。
## <a name="syntax"></a>语法
```cpp
HRESULT GetEHClauses(
[in] ULONG32 cClauses,
[out] ULONG32 * pcClauses,
[out, size_is(cClauses), length_is(*pcClauses)] CorDebugEHClause clauses[]);
```
## <a name="parameters"></a>参数
`cClauses`
[in] `clauses` 数组的存储容量。 有关详细信息,请参阅“备注”部分。
`pcClauses`
[out] 有关哪些信息写入了 `clauses` 数组的子句数。
子句
弄一个[CorDebugEHClause](cordebugehclause-structure.md)对象数组,其中包含有关为此 IL 定义的异常处理子句的信息。
## <a name="remarks"></a>备注
如果 `cClauses` 为0且 `pcClauses` 为非**null**, `pcClauses` 则将设置为可用的异常处理子句数。 如果 为非零,则它表示 数组的存储容量。 当该方法返回时,`clauses` 将包含最大的 `cClauses` 项,并且 `pcClauses` 将设置为实际写入 `clauses` 数组的子句数。
## <a name="requirements"></a>要求
**平台:** 请参阅[系统要求](../../get-started/system-requirements.md)。
**标头**:CorDebug.idl、CorDebug.h
**库:** CorGuids.lib
**.NET Framework 版本:**[!INCLUDE[net_current_v452plus](../../../../includes/net-current-v452plus-md.md)]
## <a name="see-also"></a>请参阅
- [ICorDebugILCode 接口](icordebugilcode-interface.md)
- [CorDebugEHClause 结构](cordebugehclause-structure.md)
- [调试接口](debugging-interfaces.md)
|
<Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup>
<Description>Schedules benchmark jobs on both the server and client.</Description>
<ToolCommandName>benchmarks</ToolCommandName>
<PackAsTool>true</PackAsTool>
<IsPackable>true</IsPackable>
<Version>0.0.8-alpha</Version>
<TargetFramework>netcoreapp3.0</TargetFramework>
<OutputType>Exe</OutputType>
<Authors>Microsoft</Authors>
</PropertyGroup>
<ItemGroup>
<ProjectReference Include="..\Benchmarks.ClientJob\Benchmarks.ClientJob.csproj" />
<ProjectReference Include="..\Benchmarks.ServerJob\Benchmarks.ServerJob.csproj" />
</ItemGroup>
<ItemGroup>
<PackageReference Include="McMaster.Extensions.CommandLineUtils" Version="2.2.1" />
<PackageReference Include="System.Data.SqlClient" Version="$(CoreFxVersion)" />
<PackageReference Include="CsvHelper" Version="12.1.2" />
<PackageReference Include="Fluid.Core" Version="1.0.0-beta-9660" />
<PackageReference Include="YamlDotNet" Version="8.1.2" />
<PackageReference Include="Newtonsoft.Json.Schema" Version="3.0.13" />
</ItemGroup>
<ItemGroup>
<None Update="benchmarks.schema.json" CopyToOutputDirectory="PreserveNewest" />
</ItemGroup>
</Project>
|
529 F.2d 518
U. S.v.Patterson
75-1031, 75-1060
UNITED STATES COURT OF APPEALS Fourth Circuit
10/28/75
1
E.D.Va.
AFFIRMED
|
Hollywood Boardwalk Beach Luxurious First Floor
Overview
Bedrooms:
1
Bathrooms:
1
Sleeps
4
Per night
$125 - $200
Per week
$750 - $1,300
Type:
Condo
Description of the Hollywood Beach vacation condo rental
This large (approx. 800 ft) condo is just a few steps to the world famous Hollywood boardwalk and beach and features ALL brand new furniture and every amenity to ensure your comfortable vacation. The bedroom has a king size bed with 400 count designer linens, a cozy duvet/comforter, hypo-allergenic down feather pillows (non-feather pillows available) and a large flat screen television.
In the spacious contemporary living area, brand new leather couches hold a queen size sleeper sofa (linens provided). There are also marble coffee and end tables, along with a media console, dvd player and large flat screen television. About a dozen movies and a few games are provided for your enjoyment. The dining area provides seating for four and in the fully supplied eat-in kitchen there is a breakfast nook.
The Windwood Seas is a low-rise boutique condominium featuring a private heated swimming pool and a courtyard patio area with built in barbeque grills for your enjoyment. Just outside our door every Sunday is a fresh organic farmer’s market and juice bar.
Contact me for more photos and reviews from prior guests.
Suzanne Friedman
Area Info
Just steps from the beach, this condo is centrally located in the South Florida area only 15 minutes from Ft. Lauderdale Airport, 30 minutes from Miami Airport, minutes to Hard Rock and Gulfstream Park. It is in the heart of South Florida halfway between Fort Lauderdale and Miami.
Property Rates
Begins
Ends
Week Night
Weekend Night
Weekly
Monthly
Min Stay
Jan 01 2015
Apr 30 2015
$175
$175
$1,000
$3,500
4 nights
May 01 2015
Nov 30 2015
$125
$125
$750
$1,900
4 nights
Dec 01 2015
Dec 20 2015
$150
$150
$850
-
4 nights
Dec 20 2015
Jan 01 2016
$200
$200
$1,300
-
4 nights
Check In: 3 p.m. Check Out: 11 a.m.
Lodging tax: 11
Deposits: $300 deposit to secure dates. Balance due 60 days prior to arrival.
Payment Options: Money Order, Cashier's Check, Personal Check, PayPal
Other Fees: $75 cleaning and supply fee.
Other Vacation Rental Amenities
Just outside your door, there is an array of activities, including bike & segway rentals, jet skiing, along with dozens of restaurants and shops all within walking distance. |
Today’s molecule – furan
“Coffee in capsules contains more furan than the rest”
Coffee in capsules contains more furan than the rest, although the levels are still within safe health limits.
“Preparing a coffee in a drip coffee maker is not the same as making one in an espresso machine or from capsules, because these give rise to differing levels of furan”, Javier Santos, a professor at the Department of Analytical Chemistry at the University of Barcelona and lead author of the study, tells SINC. Concern has risen over recent years about the presence of this compound in foods, because of its toxic and carcinogenic effects in animals, as well as the fact that the International Agency for Research on Cancer has listed it as a possible carcinogen in humans.
“The results, published online in the JournalFood Chemistry, reveal that higher concentrations are found in espresso (43‐146 nanograms/mililitre) than in coffee made in drip coffee makers, both in the case of normal coffee (20‐78 ng/ml) and decaffeinated coffee (14‐65 ng/ml). The levels of these toxic products were “slightly lower” (12‐35 ng/ml) in instant coffee, but a great deal higher in those made from the capsules of a well-known brand, which showed up higher levels (117‐244 ng/ml).”
“The reason for these higher levels is due to the fact that hermetically-sealed capsules prevent furan, which is highly volatile, from being released, while the coffee makers used to brew this coffee use hot water at higher pressures, which leads to the compound being extracted into the drink”, says Javier Santos. The longer that coffee is exposed to the air in cups or jugs, meanwhile, the more the furan evaporates. ”
“Different values, but not dangerous: The researcher stresses that, in all these cases, the levels of the substances found are within the limits considered to be “safe” to health. In fact, the team has estimated the amount of furan ingested as a result of coffee consumption in Barcelona, obtaining values of 0.03‐0.38 micrograms/kilogram of body weight, which is less than the maximum acceptable level (2 μg/Kg of body weight). In order for furan ingestion to exceed the maximum acceptable values, a person would have to drink at least 20 cups of capsule coffee or 30 espressos per day (for the brands with the highest furan content), or 200 instant coffees. These estimates were made on the basis of 40 ml cups and an average body weight for coffee drinkers of around 70 Kg.”
“The study also shows that furan concentrations are lower if coffee is roasted at low temperatures over a longer time (140ºC for 20 minutes) than in coffee roasted under usual conditions (200‐220ºC for 10-15 mins).”
Furan, like acrylamide, is one of a group of carcinogenic substances that can form when foods and drinks are subject to heat treatment. They are the result of a reaction, known as the Maillard reaction, between carbohydrates, unsaturated fatty acids and ascorbic acids or its derivatives.”
One thought on “Today’s molecule – furan”
Roasting
– Espresso is roasted darker than other sorts of coffee.
– European roasters (particularly in the North/Scandinavia) generally roast lighter than American. E.g. Starbucks French roast coffee is not far from “pure charcoal” with very little left of the original coffee flavour.
– Coffee is preferably consumed between 1 and 4 weeks after roasting. Earlier than 1 week and it will usually have a noticeable smoky aroma. It’d be interesting to see how old the non-capsule coffee was (after roasting) that the researchers used, and also the time between roasting and packaging of the capsules
– During roasting, coffee beans develop an internal CO2 pressure, resulting in a continuous flow of CO2 out of the beans over a period of a few weeks, protecting the coffee from developing (rancid) off flavours. Hence: one should buy a decent grinder as well as whole beans.
Brewing
– A capsule-based cup is the result of brewing on far less coffee compared to a proper espresso machine (about 1/3). If the amount of furan is in the cup, the ratio in the pure capsule vs non-capsule coffee is hence even higher
So, the conclusion should perhaps be to buy a grinder and whole beans and stay with expensive speciality coffee from Scandinavia 😉 |
WA budget 2017: Tax hikes, redundancies dominate Labor's first budget
The McGowan Government has abandoned a key election commitment just months after coming into office, slugging businesses with higher taxes in its first state budget despite promising not to.
Big businesses will see their payroll tax bills rise, while gold miners will also be slugged with higher royalties as part of Treasurer Ben Wyatt's attempt to bring WA's budget back to surplus by 2021.
WA budget at a glance:
State debt to peak at $43.78 billion in 2019/20
Current year deficit up to $2.3 billion, from a forecast $1.5 billion
3,000 public service redundancies
Royalties for Regions axed in current form
Hikes to gold royalty rate, payroll tax
Thousands of voluntary redundancies will be sought from the public service and an axe will be taken to the Royalties for Regions (RFR) program as part of substantial spending cuts, but it is not predicted to be enough to stop the state's debt rising to $43.8 billion by 2020.
WA's budget is predicted to be $2.3 billion in the red this financial year, with deficits above $1 billion predicted each year until a forecast return to surplus in 2020-21.
Premier Mark McGowan insisted revenue write-downs had left him with no choice but to break his pre-election pledge not to increase taxes, lifting payroll tax on companies paying employees more than $100 million per year.
"We are sorry about that, I am sorry; it hasn't been easy," he said.
Companies paying employees between $100 million and $1.5 billion will see their payroll tax rise to 6 per cent, while those above that level will pay 6.5 per cent — although the Government insisted that the rise would only last for five years.
The hike is expected to impact around 1,300 businesses operating in WA and raise $435 million over four years in the process.
Redundancies to save $300 million
Mr Wyatt announced 3,000 voluntary public sector redundancies to would deliver a saving of more than $300 million, but he insisted this would not impact frontline services.
Meanwhile, in a move sure to spark a backlash from the mining industry, gold producers will face much higher royalty charges in a move designed to raise nearly $400 million over four years.
The Government has also risked angering regional WA by shifting hundreds of millions of dollars in regular expenditure into the Royalties for Regions fund.
That means instead of funding additional regional projects as it was initially designed to, RFR will now be used to pay for ongoing costs related to health, water, sewerage and Labor's election commitments.
Households have been spared from further direct pain, after significant hikes to fees and charges were announced earlier this year.
Mr McGowan said the budget was an effort to get WA's finances back onto a sustainable footing after years of multibillion-dollar deficits, including a record $3 billion deficit last year.
"It's about striking the right balance between delivering on our election promises, creating new jobs and getting the state's finances back onto a sustainable direction," he said.
"I wanted to protect struggling families, and small and medium businesses."
Liberals attack 'budget of betrayal'
WA Opposition Leader Mike Nahan labelled it "a budget of betrayal".
"The McGowan Government promised not to increase taxes or add new taxes," Dr Nahan said. "They add a billion dollars worth of taxes.
"He also promised not to reduce frontline services and there are substantial reductions … he also promised to reduce debt. Debt goes up by 30 per cent."
A new gambling tax will be brought in, affecting internet-based bookmakers who have avoided the same levies as the TAB by basing themselves in other jurisdictions. |
New spaceport could launch around 2,000 small satellites
The UK's first spaceport could launch around 2,000 satellites by 2030 as part of efforts to bring in £3.8 billion through the industry, according to new figures.
By The Newsroom Saturday, 11th August 2018, 7:00 am
Four navigation satellites are launched into space in France. Picture: Getty
Business Secretary Greg Clark made the announcement during his first visit to the proposed site in the Highlands yesterday.
Plans for the Sutherland spaceport were unveiled last month.
Sign up to our daily newsletter The i newsletter cut through the noise Sign up Thanks for signing up! Sorry, there seem to be some issues. Please try again later. Submitting...
A new report released by the UK Space Agency suggests there is a “significant gap” in commercial small satellite launch provision, with demand for the sector estimated to be worth up to £3.8 billion to the economy over the next decade.
Mr Clark said: “From our market leadership in small satellite construction to our world-leading universities, Scotland and the UK come from a position of strength in the global space sector which will be turbo-boosted by the first new spaceport and our industrial strategy.
“However, I want to make sure that this giant leap for the UK will also deliver on the ground, that’s why I’m here today to discuss benefits in local jobs, uplifting tourism and businesses, helping to bring prosperity to all.”
The spaceport will be developed by Highlands and Islands Enterprise (HIE), which has approved investment of up to £9.8 million in the £17.2 million facility.
Last month it was announced the UK Space Agency would provide £31.5 million of funding for the project.
If approved, it could see a vertical launch site built for a new generation of small rockets to launch micro communication and earth-observation satellites.
Melness Crofting Estate near Tongue is the proposed location. Scotland has been described as the best place in the UK to reach in-demand satellite orbits with vertically launched rockets.
It is estimated the spaceport could create 400 jobs in the area. Employment would come from activities at the spaceport, inward investment, and supply chains.
Roy Kirk, of HIE, said: “Establishing the UK’s first spaceport in Sutherland is a fantastic opportunity for the Highlands and Islands, and for Scotland.
“The international space sector is set to grow very significantly in the coming years.
“Crucially, we believe it will also stimulate further related investment and business activity more widely across the Highlands and Islands and other parts of Scotland.” |
Acid red 2 (C.I. 13020) (CAS 493-52-7) Market Research Report 2017 contents were prepared and placed on the website in October, 2017. As a special offer the report price was brought down and now is as low as US$ 2,200.00. Do not lose the chance to order this Market Report for almost half-price.
*Please note that Acid red 2 (C.I. 13020) (CAS 493-52-7) Market Research Report 2017 is a half ready publication and contents are subject to change. It only requires updating with the help of new data that are constantly retrieved from Publisher’s databases and other sources. This updating process takes 3-5 business days after order is placed. Thus, our clients always obtain a revised and updated version of each report. Please also note that we do not charge for such an updating procedure. BAC Reports has information for more than 25,000 different chemicals available but it is impossible to have all reports updated immediately. That is why it takes 3-5 days to update a report after an order is received. |
/* Copyright (C) 1995, 2000 Aladdin Enterprises. All rights reserved.
This software is provided AS-IS with no warranty, either express or
implied.
This software is distributed under license and may not be copied,
modified or distributed except as expressly authorized under the terms
of the license contained in the file LICENSE in this distribution.
For more information about licensing, please refer to
http://www.ghostscript.com/licensing/. For information on
commercial licensing, go to http://www.artifex.com/licensing/ or
contact Artifex Software, Inc., 101 Lucas Valley Road #110,
San Rafael, CA 94903, U.S.A., +1(415)492-9861.
*/
/* $Id: gdevmr1.c,v 1.5 2002/08/22 07:12:28 henrys Exp $ */
/* RasterOp implementation for monobit memory devices */
#include "memory_.h"
#include "gx.h"
#include "gsbittab.h"
#include "gserrors.h"
#include "gsropt.h"
#include "gxcindex.h"
#include "gxdcolor.h"
#include "gxdevice.h"
#include "gxdevmem.h"
#include "gxdevrop.h"
#include "gdevmrop.h"
/* Calculate the X offset for a given Y value, */
/* taking shift into account if necessary. */
#define x_offset(px, ty, textures)\
((textures)->shift == 0 ? (px) :\
(px) + (ty) / (textures)->rep_height * (textures)->rep_shift)
/* ---------------- Monobit RasterOp ---------------- */
int
mem_mono_strip_copy_rop(gx_device * dev,
const byte * sdata, int sourcex, uint sraster, gx_bitmap_id id,
const gx_color_index * scolors,
const gx_strip_bitmap * textures, const gx_color_index * tcolors,
int x, int y, int width, int height,
int phase_x, int phase_y, gs_logical_operation_t lop)
{
gx_device_memory *mdev = (gx_device_memory *) dev;
gs_rop3_t rop = gs_transparent_rop(lop); /* handle transparency */
gx_strip_bitmap no_texture;
bool invert;
uint draster = mdev->raster;
uint traster;
int line_count;
byte *drow;
const byte *srow;
int ty;
/* If map_rgb_color isn't the default one for monobit memory */
/* devices, palette might not be set; set it now if needed. */
if (mdev->palette.data == 0) {
gx_color_value cv[3];
cv[0] = cv[1] = cv[2] = 0;
gdev_mem_mono_set_inverted(mdev,
(*dev_proc(dev, map_rgb_color))
(dev, cv) != 0);
}
invert = mdev->palette.data[0] != 0;
#ifdef DEBUG
if (gs_debug_c('b'))
trace_copy_rop("mem_mono_strip_copy_rop",
dev, sdata, sourcex, sraster,
id, scolors, textures, tcolors,
x, y, width, height, phase_x, phase_y, lop);
if (gs_debug_c('B'))
debug_dump_bitmap(scan_line_base(mdev, y), mdev->raster,
height, "initial dest bits");
#endif
/*
* RasterOp is defined as operating in RGB space; in the monobit
* case, this means black = 0, white = 1. However, most monobit
* devices use the opposite convention. To make this work,
* we must precondition the Boolean operation by swapping the
* order of bits end-for-end and then inverting.
*/
if (invert)
rop = byte_reverse_bits[rop] ^ 0xff;
/*
* From this point on, rop works in terms of device pixel values,
* not RGB-space values.
*/
/* Modify the raster operation according to the source palette. */
if (scolors != 0) { /* Source with palette. */
switch ((int)((scolors[1] << 1) + scolors[0])) {
case 0:
rop = rop3_know_S_0(rop);
break;
case 1:
rop = rop3_invert_S(rop);
break;
case 2:
break;
case 3:
rop = rop3_know_S_1(rop);
break;
}
}
/* Modify the raster operation according to the texture palette. */
if (tcolors != 0) { /* Texture with palette. */
switch ((int)((tcolors[1] << 1) + tcolors[0])) {
case 0:
rop = rop3_know_T_0(rop);
break;
case 1:
rop = rop3_invert_T(rop);
break;
case 2:
break;
case 3:
rop = rop3_know_T_1(rop);
break;
}
}
/* Handle constant source and/or texture, and other special cases. */
{
gx_color_index color0, color1;
switch (rop_usage_table[rop]) {
case rop_usage_none:
/* We're just filling with a constant. */
return (*dev_proc(dev, fill_rectangle))
(dev, x, y, width, height, (gx_color_index) (rop & 1));
case rop_usage_D:
/* This is either D (no-op) or ~D. */
if (rop == rop3_D)
return 0;
/* Code no_S inline, then finish with no_T. */
fit_fill(dev, x, y, width, height);
sdata = scan_line_base(mdev, 0);
sourcex = x;
sraster = 0;
goto no_T;
case rop_usage_S:
/* This is either S or ~S, which copy_mono can handle. */
if (rop == rop3_S)
color0 = 0, color1 = 1;
else
color0 = 1, color1 = 0;
do_copy:return (*dev_proc(dev, copy_mono))
(dev, sdata, sourcex, sraster, id, x, y, width, height,
color0, color1);
case rop_usage_DS:
/* This might be a case that copy_mono can handle. */
#define copy_case(c0, c1) color0 = c0, color1 = c1; goto do_copy;
switch ((uint) rop) { /* cast shuts up picky compilers */
case rop3_D & rop3_not(rop3_S):
copy_case(gx_no_color_index, 0);
case rop3_D | rop3_S:
copy_case(gx_no_color_index, 1);
case rop3_D & rop3_S:
copy_case(0, gx_no_color_index);
case rop3_D | rop3_not(rop3_S):
copy_case(1, gx_no_color_index);
default:;
}
#undef copy_case
fit_copy(dev, sdata, sourcex, sraster, id, x, y, width, height);
no_T: /* Texture is not used; textures may be garbage. */
no_texture.data = scan_line_base(mdev, 0); /* arbitrary */
no_texture.raster = 0;
no_texture.size.x = width;
no_texture.size.y = height;
no_texture.rep_width = no_texture.rep_height = 1;
no_texture.rep_shift = no_texture.shift = 0;
textures = &no_texture;
break;
case rop_usage_T:
/* This is either T or ~T, which tile_rectangle can handle. */
if (rop == rop3_T)
color0 = 0, color1 = 1;
else
color0 = 1, color1 = 0;
do_tile:return (*dev_proc(dev, strip_tile_rectangle))
(dev, textures, x, y, width, height, color0, color1,
phase_x, phase_y);
case rop_usage_DT:
/* This might be a case that tile_rectangle can handle. */
#define tile_case(c0, c1) color0 = c0, color1 = c1; goto do_tile;
switch ((uint) rop) { /* cast shuts up picky compilers */
case rop3_D & rop3_not(rop3_T):
tile_case(gx_no_color_index, 0);
case rop3_D | rop3_T:
tile_case(gx_no_color_index, 1);
case rop3_D & rop3_T:
tile_case(0, gx_no_color_index);
case rop3_D | rop3_not(rop3_T):
tile_case(1, gx_no_color_index);
default:;
}
#undef tile_case
fit_fill(dev, x, y, width, height);
/* Source is not used; sdata et al may be garbage. */
sdata = mdev->base; /* arbitrary, as long as all */
/* accesses are valid */
sourcex = x; /* guarantee no source skew */
sraster = 0;
break;
default: /* rop_usage_[D]ST */
fit_copy(dev, sdata, sourcex, sraster, id, x, y, width, height);
}
}
#ifdef DEBUG
if_debug1('b', "final rop=0x%x\n", rop);
#endif
/* Set up transfer parameters. */
line_count = height;
srow = sdata;
drow = scan_line_base(mdev, y);
traster = textures->raster;
ty = y + phase_y;
/* Loop over scan lines. */
for (; line_count-- > 0; drow += draster, srow += sraster, ++ty) {
int sx = sourcex;
int dx = x;
int w = width;
const byte *trow =
textures->data + (ty % textures->rep_height) * traster;
int xoff = x_offset(phase_x, ty, textures);
int nw;
/* Loop over (horizontal) copies of the tile. */
for (; w > 0; sx += nw, dx += nw, w -= nw) {
int dbit = dx & 7;
int sbit = sx & 7;
int sskew = sbit - dbit;
int tx = (dx + xoff) % textures->rep_width;
int tbit = tx & 7;
int tskew = tbit - dbit;
int left = nw = min(w, textures->size.x - tx);
byte lmask = 0xff >> dbit;
byte rmask = 0xff << (~(dbit + nw - 1) & 7);
byte mask = lmask;
int nx = 8 - dbit;
byte *dptr = drow + (dx >> 3);
const byte *sptr = srow + (sx >> 3);
const byte *tptr = trow + (tx >> 3);
if (sskew < 0)
--sptr, sskew += 8;
if (tskew < 0)
--tptr, tskew += 8;
for (; left > 0;
left -= nx, mask = 0xff, nx = 8,
++dptr, ++sptr, ++tptr
) {
byte dbyte = *dptr;
#define fetch1(ptr, skew)\
(skew ? (ptr[0] << skew) + (ptr[1] >> (8 - skew)) : *ptr)
byte sbyte = fetch1(sptr, sskew);
byte tbyte = fetch1(tptr, tskew);
#undef fetch1
byte result =
(*rop_proc_table[rop]) (dbyte, sbyte, tbyte);
if (left <= nx)
mask &= rmask;
*dptr = (mask == 0xff ? result :
(result & mask) | (dbyte & ~mask));
}
}
}
#ifdef DEBUG
if (gs_debug_c('B'))
debug_dump_bitmap(scan_line_base(mdev, y), mdev->raster,
height, "final dest bits");
#endif
return 0;
}
|
Q:
First Java Program: Random data in my Array?
Problem: Write a program that reads a list of real numbers. After the program ends it should print out only the unique numbers. That is, only numbers that appear once in the list. If there are more than 50 unique numbers on the list, then you should only print the first 50.
import java.util.*;
import java.io.*;
import java.util.Arrays;
public class Hmwk {
public static void main(String[] args) throws FileNotFoundException {
Scanner input=new Scanner (new File ("input.txt"));
int n = 0;
final int MAX_SIZE = 50;
double[] numbersArray = new double[MAX_SIZE];
while (input.hasNextDouble() && n<MAX_SIZE){
double in = input.nextDouble();
if (inList(in,numbersArray))
numbersArray[n]=in;
n++;
}
printReport(numbersArray);
}
public static boolean inList(double number, double[] list){
for (double i : list)
{
if (i == number){
return false;
}
}
return true;
}
public static void printReport(double[] list)
{
System.out.println("The unique numbers were");
System.out.println(Arrays.toString(list));
}
}
input.txt file=
5.0 6.0 7.0 8.9 3.0 2.0 8.9 8.9 9.0 7.0 6.0 5.0 4.0 3.0 2.0 1.0
results-
The unique numbers were
[5.0, 6.0, 7.0, 8.9, 3.0, 2.0, 0.0, 0.0, 9.0, 0.0, 0.0, 0.0, 4.0, 0.0, 0.0, 1.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0]
No idea where I'm going wrong here, I think its my inlist method? Any and all help is much appreciated. Thanks!
A:
Add bracket for IF condition
if (inList(in,numbersArray))
{
numbersArray[n]=in;
n++;
}
|
"""
Copyright 2017-present Airbnb, Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
"""
import html
from collections import OrderedDict
from streamalert.alert_processor.helpers import compose_alert, elide_string_middle
from streamalert.alert_processor.outputs.output_base import (
OutputDispatcher,
OutputProperty,
OutputRequestFailure,
StreamAlertOutput
)
from streamalert.shared.logger import get_logger
LOGGER = get_logger(__name__)
@StreamAlertOutput
class SlackOutput(OutputDispatcher):
"""SlackOutput handles all alert dispatching for Slack"""
__service__ = 'slack'
# Slack recommends no messages larger than 4000 bytes. This does not account for unicode
MAX_MESSAGE_SIZE = 4000
MAX_ATTACHMENTS = 20
@classmethod
def get_user_defined_properties(cls):
"""Get properties that must be assigned by the user when configuring a new Slack
output. This should be sensitive or unique information for this use-case that needs
to come from the user.
Every output should return a dict that contains a 'descriptor' with a description of the
integration being configured.
Slack also requires a user provided 'webhook' url that is comprised of the slack api url
and the unique integration key for this output. This value should be should be masked
during input and is a credential requirement.
Returns:
OrderedDict: Contains various OutputProperty items
"""
return OrderedDict([
('descriptor',
OutputProperty(description='a short and unique descriptor for this Slack integration '
'(ie: channel, group, etc)')),
('url',
OutputProperty(description='the full Slack webhook url, including the secret',
mask_input=True,
input_restrictions={' '},
cred_requirement=True))
])
@classmethod
def _split_attachment_text(cls, alert_record):
"""Yield messages that should be sent to slack.
Args:
alert_record (dict): Dictionary representation of the alert
relevant to the triggered rule
Yields:
str: Properly split messages to be sent as attachments to slack
"""
# Convert the alert we have to a nicely formatted string for slack
alert_text = '\n'.join(cls._json_to_slack_mrkdwn(alert_record, 0))
# Slack requires escaping the characters: '&', '>' and '<' and html does just that
alert_text = html.escape(alert_text)
while alert_text:
if len(alert_text) <= cls.MAX_MESSAGE_SIZE:
yield alert_text
break
# Find the closest line break prior to this index
index = alert_text[:cls.MAX_MESSAGE_SIZE+1].rfind('\n')
# If a new line was not found, split on the closest space instead
if index == -1:
index = alert_text[:cls.MAX_MESSAGE_SIZE+1].rfind(' ')
# If there is no good place to split the message, just use the max index
if index == -1:
index = cls.MAX_MESSAGE_SIZE
# Append the message part up until this index, and move to the next chunk
yield alert_text[:index]
alert_text = alert_text[index+1:]
@classmethod
def _format_default_attachments(cls, alert, alert_publication, fallback_text):
"""Format the message to be sent to slack.
Args:
alert (Alert): The alert
alert_publication (dict): Alert relevant to the triggered rule
fallback_text (str): A formatted rule header to be included with each
attachment as fallback text (to be shown on mobile, etc)
Returns:
list(dict): A list of dictionaries with the formatted attachment to be sent to Slack
as the text
"""
record = alert.record
rule_description = alert.rule_description
messages = list(cls._split_attachment_text(record))
attachments = []
for index, message in enumerate(messages, start=1):
title = 'Record:'
if len(messages) > 1:
title = 'Record (Part {} of {}):'.format(index, len(messages))
rule_desc = ''
# Only print the rule description on the first attachment
if index == 1:
rule_desc = rule_description
rule_desc = '*Rule Description:*\n{}\n'.format(rule_desc)
# https://api.slack.com/docs/message-attachments#attachment_structure
attachments.append({
'fallback': fallback_text,
'color': '#b22222',
'pretext': rule_desc,
'title': title,
'text': message,
'mrkdwn_in': ['text', 'pretext']
})
if index == cls.MAX_ATTACHMENTS:
LOGGER.warning('%s: %d-part message truncated to %d parts',
alert_publication, len(messages), cls.MAX_ATTACHMENTS)
break
return attachments
@classmethod
def _get_attachment_skeleton(cls):
"""Returns a skeleton for a Slack attachment containing various default values.
Return:
dict
"""
return {
# String
# Plaintext summary of the attachment; renders in non-markdown compliant clients,
# such as push notifications.
'fallback': '',
# String, hex color
# Colors the vertical bar to the left of the text.
'color': '#36a64f',
# String
# Text that appears above the vertical bar to the left of the attachment.
# Supports markdown if it's included in "mrkdwn_in"
'pretext': '',
# String
# The attachment's author name.
# If this field is omitted, then the entire author row is omitted.
'author_name': '',
# String, URL
# Provide a URL; Adds a clickable link to the author name
'author_link': '',
# String, URL of an image
# The icon appears to the left of the author name
'author_icon': '',
# String
# Appears as bold text above the attachment itself.
# If this field is omitted, the entire title row is omitted.
'title': '',
# String, URL
# Adds a clickable link to the title
'title_link': '',
# String
# Raw text that appears in the attachment, below the title but above the fields
# Supports markdown if it's included in "mrkdwn_in".
# Use \n for newline characters.
# This field has a field limit of cls.MAX_MESSAGE_SIZE
'text': '',
# Array of dicts; Each dict should have keys "title", "value", "short"
# An array of fields that appears below the text. These fields are clearly delineated
# with title and value.
'fields': [
# Sample field:
# {
# "title": "Priority",
# "value": "High",
# "short": False
# }
],
# String, URL of an image
# Large image that appears as an attachment
'image_url': '',
# String, URL of an image
# When image_url is omitted, this one renders a smaller image to the right
'thumb_url': '',
# String
# Appears at the very bottom
# If this field is omitted, also omits the footer icon
'footer': '',
# String, URL
# This icon appears to the left of the footer
'footer_icon': '',
# Integer, Unix timestamp
# This will show up next to the footer at the bottom.
# This timestamp does not change the time the message is actually sent.
'ts': '',
# List of strings
# Defines which of the above fields will support Slack's simple markdown (with special
# characters like *, ~, _, `, or ```... etc)
# By default, we respect markdown in "text" and "pretext"
"mrkdwn_in": [
'text',
'pretext',
],
}
@classmethod
def _standardize_custom_attachments(cls, custom_slack_attachments):
"""Supplies default fields to given attachments and validates their structure.
You can test out custom attachments using this tool:
https://api.slack.com/docs/messages/builder
When publishers provider custom slack attachments to the SlackOutput, it offers increased
flexibility, but requires more work. Publishers need to pay attention to the following:
- Slack requires escaping the characters: '&', '>' and '<'
- Slack messages have a limit of 4000 characters
- Individual slack messages support a maximum of 20 attachments
Args:
custom_slack_attachments (list): A list of dicts that is provided by the publisher.
Returns:
list: The value to the "attachments" Slack API argument
"""
attachments = []
for custom_slack_attachment in custom_slack_attachments:
attachment = cls._get_attachment_skeleton()
attachment.update(custom_slack_attachment)
# Enforce maximum text length; make sure to check size AFTER escaping in case
# extra escape characters pushes it over the limit
if len(attachment['text']) > cls.MAX_MESSAGE_SIZE:
LOGGER.warning(
'Custom attachment was truncated to length %d. Full message: %s',
cls.MAX_MESSAGE_SIZE,
attachment['text']
)
attachment['text'] = elide_string_middle(attachment['text'], cls.MAX_MESSAGE_SIZE)
attachments.append(attachment)
# Enforce maximum number of attachments
if len(attachments) >= cls.MAX_ATTACHMENTS:
LOGGER.warning(
'Message with %d custom attachments was truncated to %d attachments',
len(custom_slack_attachments),
cls.MAX_ATTACHMENTS
)
break
return attachments
@classmethod
def _format_message(cls, alert, alert_publication):
"""Format the message to be sent to slack.
Args:
alert (Alert): The alert
alert_publication (dict): Alert relevant to the triggered rule
Returns:
dict: message with attachments to send to Slack.
The message will look like:
StreamAlert Rule Triggered: rule_name
Rule Description:
This will be the docstring from the rule, sent as the rule_description
Record (Part 1 of 2):
...
"""
default_header_text = '*StreamAlert Rule Triggered: {}*'.format(alert.rule_name)
header_text = alert_publication.get('@slack.text', default_header_text)
if '@slack.attachments' in alert_publication:
attachments = cls._standardize_custom_attachments(
alert_publication.get('@slack.attachments')
)
else:
# Default attachments
attachments = cls._format_default_attachments(alert, alert_publication, header_text)
full_message = {
'text': header_text,
'mrkdwn': True,
'attachments': attachments
}
# Return the json dict payload to be sent to slack
return full_message
@classmethod
def _json_to_slack_mrkdwn(cls, json_values, indent_count):
"""Translate a json object into a more human-readable list of lines
This will handle recursion of all nested maps and lists within the object
Args:
json_values: variant to be translated (could be json map, list, etc)
indent_count (int): Number of tabs to prefix each line with
Returns:
list: strings that have been properly tabbed and formatted for printing
"""
tab = '\t'
all_lines = []
if isinstance(json_values, dict):
all_lines = cls._json_map_to_text(json_values, tab, indent_count)
elif isinstance(json_values, list):
all_lines = cls._json_list_to_text(json_values, tab, indent_count)
else:
all_lines.append('{}'.format(json_values))
return all_lines
@classmethod
def _json_map_to_text(cls, json_values, tab, indent_count):
"""Translate a map from json (dict) into a more human-readable list of lines
This will handle recursion of all nested maps and lists within the map
Args:
json_values (dict): dictionary to be iterated over and formatted
tab (str): string value to use for indentation
indent_count (int): Number of tabs to prefix each line with
Returns:
list: strings that have been properly tabbed and formatted for printing
"""
all_lines = []
for key, value in sorted(json_values.items()):
if isinstance(value, (dict, list)) and value:
all_lines.append('{}*{}:*'.format(tab*indent_count, key))
all_lines.extend(cls._json_to_slack_mrkdwn(value, indent_count+1))
else:
new_lines = cls._json_to_slack_mrkdwn(value, indent_count+1)
if len(new_lines) == 1:
all_lines.append('{}*{}:* {}'.format(tab*indent_count, key, new_lines[0]))
elif new_lines:
all_lines.append('{}*{}:*'.format(tab*indent_count, key))
all_lines.extend(new_lines)
else:
all_lines.append('{}*{}:* {}'.format(tab*indent_count, key, value))
return all_lines
@classmethod
def _json_list_to_text(cls, json_values, tab, indent_count):
"""Translate a list from json into a more human-readable list of lines
This will handle recursion of all nested maps and lists within the list
Args:
json_values (list): list to be iterated over and formatted
tab (str): string value to use for indentation
indent_count (int): Number of tabs to prefix each line with
Returns:
list: strings that have been properly tabbed and formatted for printing
"""
all_lines = []
for index, value in enumerate(json_values):
if isinstance(value, (dict, list)) and value:
all_lines.append('{}*[{}]*'.format(tab*indent_count, index+1))
all_lines.extend(cls._json_to_slack_mrkdwn(value, indent_count+1))
else:
new_lines = cls._json_to_slack_mrkdwn(value, indent_count+1)
if len(new_lines) == 1:
all_lines.append('{}*[{}]* {}'.format(tab*indent_count, index+1, new_lines[0]))
elif new_lines:
all_lines.append('{}*[{}]*'.format(tab*indent_count, index+1))
all_lines.extend(new_lines)
else:
all_lines.append('{}*[{}]* {}'.format(tab*indent_count, index+1, value))
return all_lines
def _dispatch(self, alert, descriptor):
"""Send alert text to Slack
Publishing:
By default the slack output sends a slack message comprising some default intro text
and a series of attachments containing:
* alert description
* alert record, chunked into pieces if it's too long
To override this behavior use the following fields:
- @slack.text (str):
Replaces the text that appears as the first line in the slack message.
- @slack.attachments (list[dict]):
A list of individual slack attachments to include in the message. Each
element of this list is a dict that must adhere to the syntax of attachments
on Slack's API.
@see cls._standardize_custom_attachments() for some insight into how individual
attachments can be written.
Args:
alert (Alert): Alert instance which triggered a rule
descriptor (str): Output descriptor
Returns:
bool: True if alert was sent successfully, False otherwise
"""
creds = self._load_creds(descriptor)
if not creds:
return False
publication = compose_alert(alert, self, descriptor)
slack_message = self._format_message(alert, publication)
try:
self._post_request_retry(creds['url'], slack_message)
except OutputRequestFailure:
return False
return True
|
19
2020
Living in the Algorithmic Age
Living in the Algorithmic Age
Algorithms are sometimes compared to cathedrals, in that they share the same ambition, and the same folly. Some algorithms, such as telephone operating systems, data management systems, or search engines, are huge objects involving the contributions of thousands of people. With algorithms, Homo sapiens has finally created a tool equal to its aspirations.
Why do we blame algorithms for our woes? Because they push us out of our comfort zone? No doubt. But also because we often agree to use them, not understanding what they really are and how they work. Our dreams and our fears are the consequences of this ignorance. We fear algorithms because we see them as mysterious beings, endowed with supernatural powers, perhaps evil intentions.
We often agree to use them, not understanding what they really are and how they work.
In the book, we clarify the opaque vocabulary often used in this context explaining the basics of this science for a general public. To free yourselves from any magical thinking, to separate legitimate hopes from childish fantasies, justified fears from unfounded anxieties, we invite you on a journey through the world of algorithms. We discuss the digital society and the new human in becoming, enlightening societal and philosophical issues such as the transformation of work, property, privacy… that are often explained confusingly in the media.
We explain how scientific knowledge is impacted by computer science across all fields with big data, machine learning… It is essential for you to get familiar with these notions to understand better the transformations of the world and acquire a more modern viewpoint.
The goal of The Age of Algorithms is to make you more aware of the environments you live in, to empower you with your own viewpoint and understanding instead of being frightened by the new technology. This, we believe, will help you improve your life in the digital world.
Algorithms can lead to the best or the worst outcome, but we must never forget that they do not, in themselves, have intention. Human beings have designed them. They are what we want them to be. That is also the message of the book.
Gilles Dowek is a researcher in computer science. He has published several popular science books, as well as books on epistemology of computer science and ethics in the digital world. His book Computation, Proof, Machine (Cambridge, 2015) has received the French Academy philosophy award....
Serge Abiteboul is a member of the Board of Arcep and a computer scientist at Institut National de Recherche en Informatique et en Automatique (INRIA), Rocquencourt. He has been visiting professor at Stanford University, California, and is a founder of the Xyleme company. He is fascinated by and likes to write about societal issues related to the d... |
The problem there, of course, is the unions. The unions are the worst thing that ever happened to education because it’s not a meritocracy. It turns into a bureaucracy, which is exactly what has happened. The teachers can’t teach and administrators run the place and nobody can be fired. It’s terrible….
Twenty-two years later, not much has changed – least in strong union states – where there is little choice for parents, massive school districts are entangled in bureaucracy, and meritocracy is just an eleven-letter word.
Jobs went on to explain the effect that a monopoly has on a customer.
What happens when a customer goes away and a monopoly gets control, which is what happened in our country, is that the service level almost always goes down. I remember seeing a bumper sticker when the telephone company was all one. I remember seeing a bumper sticker with the Bell Logo on it and it said “We don’t care. We don’t have to.” And that’s what a monopoly is. That’s what IBM was in their day. And that’s certainly what the public school system is. They don’t have to care.
“They don’t have to care.” And that is at the heart of the matter.
Competition for the education monopolists is like daylight was for Dracula. Los Angeles teacher union President Alex Caputo-Pearl claims that charter schools “create inappropriate competition.” The National Education Association claims that, “Voucher programs siphon scarce resources from already underfunded public schools.” And most recently American Federation of Teachers president Randi Weingarten went over the edge, desperately trying to equate parental choice to pre-1960s southern segregation, which I easily debunked here. The NEA assertion that vouchers hurt public schools fiscally is just not true. In fact, public schools typically improve when there is choice. As EdChoice researcher Greg Forster has shown, not only do private school choice programs have a positive effect on students’ academic outcomes in public schools, they do taxpayers a big favor at the same time. Forster looked at 28 empirical studies that examined choice’s fiscal impact on public schools. Of these, 25 show school choice programs save money. Three find the programs to be revenue neutral. None of the studies reveal a negative fiscal impact on public schools.
As for Caputo-Pearl’s “inappropriate competition” comment, that doesn’t hold up either. A recent study from New York City has the unionista crowd scratching their heads in disbelief. Alex Zimmerman summarizes the results in Chalkbeat. “The study finds that being closer to a charter school led to small increases in math and reading scores, boosts in reported student engagement and school safety, and fewer students being held back a grade (in the traditional public school.) The test score gains increased slightly more in traditional public schools that are co-located with a charter.” (Emphasis added.)
So not only don’t charter schools hurt traditional public schools, they make those schools better too. Sarah Cordes, a professor at Temple University and the study’s author, thinks a close proximity “might really get administrators to get their act together.” She adds that the charter sector “is working as it was intended: creating pressure on administrators to improve the quality of their schools.”
Cordes’ study is not the first on the subject. Brian Gill, a senior fellow at Mathematica Policy Research in Cambridge, MA, looked at 11 studies in 11 different states which compared the effects of charter schools on traditional public schools and found that six studies showed “some evidence of positive effects, four found no effects, and one found negative effects.”
To state the obvious, public education in America is big taxpayer-funded business – a business that eats up $670 billion a year, every year. And Jobs proposes a free market approach to improve the very troubled enterprise. (Since Jobs has created largest and most profitable company in the world, with fanatically loyal customers, maybe he knows what he is talking about?)
The market competition model seems to indicate that where there is a need there is a lot of providers willing to tailor their products to fit that need and a lot of competition which forces them to get better and better.
A strong universal voucher proponent, the visionary Jobs knew what we needed to do. If Jobs’ ideas were to be implemented, student achievement would rise as would the paychecks of star educators. The only losers would be unqualified teachers, bureaucrats and unionistas, none of whom at this point care about educational quality.
Because they don’t have to.
(Courtesy of the Wayback Machine, a full transcript of the Jobs’ interview is available here.)
Larry Sand, a former classroom teacher, is the president of the non-profit California Teachers Empowerment Network – a non-partisan, non-political group dedicated to providing teachers and the general public with reliable and balanced information about professional affiliations and positions on educational issues. The views presented here are strictly his own. |
Amanda Holden is the latest celeb to bare all in a fresh new campaign encouraging fans to go vegetarian!
The 45-year-old Britain’s Got Talent judge shows off her toned physique in the ad, which is 100 per cent un-retouched, to highlight how vegetarians are, on average, slimmer than meat-eaters. Plant-based eaters also benefit from lower rates of heart disease and cancer. And as Amanda explains in the behind-the-scenes video, she’s noticed benefits such as clearer skin.
She also says:
To anybody that thinks being a vegetarian is tricky – it’s rubbish! There are so many products you can buy – meat substitute products if that’s what you want. Vegetables, lentils, pulses – there are a million things that you can cook and use to substitute for meat.
She’s right! See the benefits for yourself: For ideas for vegan meats, along with animal-free recipes and meal plans, order PETA’s free vegan starter kit. |
[Pulmonary oxygen transfer under a respirator in anesthesia and resuscitation].
The resistance of the passage of oxygen from air to blood is estimated in measuring P(A-a)O2. This index varies with FIO2. P(a/A)O2, the index proposed by GILBERT and KEIGHLEY [18], expresses PaO2 as a percentage of PAO2. This index would be independent of FIO2. Two groups are studied. Patients of the first group (n = 22) are artificially ventilated in intensive care for severe parenchymal lesion. Those of the second group (n = 25) have no notable history of pulmonary disease and are anaesthetized and hooked up to a respiratory for surgery. Blood gases are measured and the transfer indices calculated for increasing FIO2 (0.4, 0.6, 0.8 and 1). Under conditions of anaesthesia, the effect of thermic decrease on PaCO2 is dampened by maintaining a constant PACO2 during measurement. P(a/A)O2 does not vary significantly as a function of FIO2 in the intensive care group, whereas the results observed in the anaesthetized patients are substantially dispersed. Factors which are susceptible to affect oxygen transfer as well as the effects of FIO2 increase are discussed. P(a/A)O2 stability observed in intensive care is probably related to the predominant effect of venous admixture, which is hardly affected by variations in FIO2. In anaesthesia, resistance to the transfer of oxygen appears to be linked mainly to changes in the distribution of the ventilation/perfusion ratio (reduction in CRF; pharmacological effect of oxygen on pulmonary vascular reactivity). These phenomena lead to alveolar instability and a variable shunt effect.(ABSTRACT TRUNCATED AT 250 WORDS) |
Influenza vaccination in 22 developed countries: an update to 1995.
This study expands and updates through 1995 our earlier report on influenza vaccine use in 18 developed countries. Five of the six countries with high levels of vaccine use in 1992 (> or = 130 doses/1000 population) showed little change or slight declines over the subsequent 3 years. The exception was the United States, where a new federal program for vaccination reimbursement for the elderly helped to increase vaccine distribution from 144 to 239 doses/1000 population. The six countries with medium levels of vaccine use in 1992 (76-96 doses/1000 population) increased to > or = 100 doses/1000 population by 1995. Among the six low-use countries in 1992 (< or = 65 doses/1000 population), only Finland showed substantial improvement (96 doses/1000 population) in 1995. Four new countries were added to the study. In Germany, vaccine use increased to 80 doses/1000 population in 1995, but in Ireland it remained at a low level (48 doses/1000 population). In Korea, vaccine use increased from 17 to 95 doses/ 1000 population during the period 1987-1995. In Japan, very high levels of vaccine use (approximately 280 doses/1000 population) in the early 1980s were associated with vaccination programs for school children. However, vaccine use fell precipitously when these programs were discontinued, and only 2 and 8 doses/1000 population were used in 1994 and 1995, respectively. In all 22 countries, higher levels of vaccine use were associated with vaccination reimbursement programs under national or social health insurance and were not correlated with different levels of economic development. Excluding Japan, in 1995 there was still a greater than fourfold difference between the highest and lowest levels of vaccine use among the other 21 countries in the study. Given its well established clinical effectiveness and cost-effectiveness, none of these countries has yet achieved the full benefits of its programs for influenza vaccination. |
Michigan sues HP over $49 million project that's still not done after 10 years
Hewlett-Packard has faced no end of financial and legal woes in recent months, and on Friday it was hit with one more: A new lawsuit filed by the state of Michigan over a $49 million project the state says is still not completed after 10 years.
The contract dates back to 2005 and called for HP to replace a legacy mainframe-based system built in the 1960s that is used by more than 130 Secretary of State offices.
HP was given a 2010 deadline to deliver a replacement, but it failed to do so, the state says, leaving the Michigan Department of Technology, Management and Budget and SOS staff dependent on the old technology for functions such as vehicle registration.
Michigan has paid HP a total of roughly $33 million.
Following months of negotiations, Michigan issued a termination-for-cause letter on Aug. 28. Though the contract requires that HP must continue to provide support for up to 270 days after termination, the technology giant's staff have not reported to work since Aug. 31, Michigan said.
Through the suit filed in Kent County Circuit Court, the state seeks $11 million in damages along with attorney's fees and the funds needed to rebid and reprocure the contract.
“I inherited a stalled project when I came into office in 2011 and, despite our aggressive approach to hold HP accountable and ensure they delivered, they failed,” said Secretary of State Ruth Johnson in a press release. “We have no choice but to take HP to court to protect Michigan taxpayers.”
The state also seeks the source code for an online services portal HP delivered as part of the project.
Last week, HP announced that revenue declines have prompted it to cut 25,000 to 30,000 jobs in its enterprise division. Earlier this year the company agreed to pay $100 million in a settlement agreement with PGGM Vermogensbeheer B.V. as a result of its 2011 acquisition of British software maker Autonomy, which ultimately led to an $8.8 million impairment charge and a lawsuit by HP shareholders.
"It’s unfortunate that the state of Michigan chose to terminate the contract, but HP looks forward to a favorable resolution in court," the company said in a statement via email.
Copyright 2018 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited. |
Key Points {#FPar1}
==========
The clinical characteristics of oral lesions in autoimmune bullous diseases may overlap and diagnostic tests are required to differentiate.Immunofluorescence microscopy is essential for discriminating between autoimmune and non-autoimmune bullous diseases.Direct immunofluorescence microscopy differentiates between pemphigus and pemphigoid diseases, and additional serological tests are required to diagnose paraneoplastic pemphigus.
Introduction {#Sec1}
============
Autoimmune bullous diseases (AIBDs) are characterized by autoantibody-mediated blistering of the skin and/or mucous membranes \[[@CR1]\]. These diseases can be subdivided into two groups based on the level of blistering; pemphigoid diseases characterized by subepithelial blistering and pemphigus diseases characterized by intra-epithelial blistering \[[@CR2], [@CR3]\]. Several AIBD subtypes exist within these two major groups, with distinct clinical and diagnostic features \[[@CR4]--[@CR6]\]. This review focusses on AIBD subtypes with involvement of the oral mucosa.
Mucous membrane pemphigoid (MMP) is a group of AIBDs that predominantly affects the mucous membranes, but may mildly involve the skin \[[@CR2], [@CR7]\]. Autoantibodies are directed against structural proteins of the hemidesmosome in the epithelial basement membrane zone (EBMZ), or proteins that are closely related. Hemidesmosomal dysfunction leads to a loss of connection between basal epithelial cells and the dermis, resulting in subepithelial blistering. Mucous membrane pemphigoid includes different pemphigoid subtypes, such as anti-BP180 MMP (classic MMP) and anti-laminin-332 MMP. Epidermolysis bullosa acquisita (EBA) with predominant mucous membrane involvement is also classified as a subtype of MMP. Linear IgA disease (LAD) is a subtype of pemphigoid and can present with predominant mucous membrane involvement. Anti-p200 pemphigoid is an extremely rare disease and may also have mucosal involvement \[[@CR8]\].
Pemphigus diseases comprise mucocutaneous intra-epithelial blistering diseases that target desmosomal proteins, resulting in loss of cell adhesion between keratinocytes \[[@CR3]\]. The two main variants are pemphigus vulgaris (PV) with autoantibodies targeting desmoglein 3 (DSG3) and sometimes desmoglein 1 (DSG1), and pemphigus foliaceus with autoantibodies reactive to DSG1 only. Pemphigus vulgaris presents with mucosal lesions, and the skin may be involved, while in pemphigus foliaceus only the skin is affected. Other rare variants of pemphigus include pemphigus vegetans, pemphigus erythematosus, and fogo selvagem (endemic pemphigus foliaceus). The last two are clinical variants of pemphigus foliaceus with reactivity to DSG1 and present with only skin lesions. Paraneoplastic pemphigus (PNP) is a different disease entity related to malignancies, especially hematological malignancies and Castleman disease, and is often life threatening \[[@CR1]\]. The clinical hallmark is painful oral mucosal lesions accompanied with morphologically heterogenous skin lesions \[[@CR9]\]. The pathomechanism of PNP is complex with involvement of both humoral and cellular autoimmunity.
Chronic oral lesions can be painful, and can seriously influence the quality of life, nutrition status, and dental health of patients \[[@CR10], [@CR11]\]. Poor dental cleaning due to painful lesions may result in periodontitis, a chronic inflammatory disease of the gingiva \[[@CR11]\]. If not managed adequately, patients are at risk of losing the surrounding teeth. Oral manifestations of MMP, PV, and PNP may seem identical; however, the health impact, treatment, and prognosis of the diseases differ substantially. Therefore, it is important that clinicians make a quick and correct diagnosis. In addition to clinical assessment of the patient, immunodiagnostic tests are essential to differentiate between the AIBD subtypes. The aim of this review is to provide clinicians with a complete overview of the clinical features of AIBDs predominantly involving the oral mucosa, and to describe the diagnostic process.
Mucous Membrane Pemphigoid {#Sec2}
==========================
Mucous membrane pemphigoid is a group of chronic autoimmune diseases characterized by subepithelial blistering and affects mucosal surfaces of various sites. The oral mucosa is predominantly affected (85%), followed by the ocular (65%), nasal (20--40%), anogenital (20%), pharyngeal (20%), laryngeal (5--10%), and esophageal mucosa (5--15%) \[[@CR2]\]. The skin may also be involved in 25--30% of the cases but in lesser extent than the mucous membranes \[[@CR12]\]. Clinical severity is highly variable in MMP \[[@CR2]\].
Epidemiology and Etiology {#Sec3}
-------------------------
Mucous membrane pemphigoid occurs predominantly in the elderly with a mean age of onset in the mid-60 s and an annual incidence of 1.3 and 2.0 newly diagnosed cases per million inhabitants in France and Germany \[[@CR13]--[@CR15]\]. Women are more often affected than men.
The etiology of MMP is unknown. A genetic association in patients with MMP with HLA-DBQ1\*0301 has been described, suggesting a role for T-lymphocyte recognition of antigens in the EBMZ \[[@CR16]--[@CR18]\]. The formation of subepithelial blisters is caused by IgG and/or IgA autoantibodies directed against several components of the hemidesmosome, in particular BP180 and BP230 \[[@CR12], [@CR19]\]. In two thirds of the MMP cases, autoantibodies are directed against BP180, mainly against the C-terminal domain and/or the NC16A domain, whereas in bullous pemphigoid, autoantibodies are primarily directed against the NC16A domain \[[@CR20]--[@CR23]\]. Different epitope profiles of BP180 may be associated with the presence of mucosal involvement with or without skin lesions. Other antigens in MMP include laminin 332, p200, type VII collagen, and α6ß4 integrin. In MMP, the presence of both IgG and IgA in serum is associated with the need for long-term systemic treatment \[[@CR24]\].
Clinical Features {#Sec4}
-----------------
Oral lesions are usually the initial manifestation in MMP and may present anywhere on the oral mucosa (Fig. [1](#Fig1){ref-type="fig"}a--c) \[[@CR25], [@CR26]\]. The gingiva is most often affected in MMP and may represent the onset of the disease \[[@CR14], [@CR15], [@CR27]--[@CR29]\]. Desquamation of the gingiva appears as patches or widespread erythema \[[@CR26]\]. Patients with oral MMP present with tense serous or hemorrhagic bullae that easily rupture as a result of mechanical forces, leading to irregularly shaped erosions or ulcers with yellowish slough surrounded by an erythematous halo \[[@CR19], [@CR26]\]. Symptoms may consist of pain, dysphagia, soreness, foetor, bleeding and/or peeling of the mucosa \[[@CR30], [@CR31]\]. Other commonly affected areas are the palatal mucosa and less often the buccal mucosa and the tongue \[[@CR27]\]. Oral lesions often heal without scarring unlike other subtypes of MMP such as ocular MMP \[[@CR19]\]. Anti-laminin 332 MMP is a rare subtype often leading to cicatrization and tissue destruction, with possible involvement of pharyngeal and laryngeal mucosa, and a risk of airway obstruction \[[@CR32]\]. There are conflicting reports about an increased relative risk for malignancy in this subtype \[[@CR33], [@CR34]\]. In some cases, the clinical presentation of oral MMP may resemble that of oral lichen planus \[[@CR35], [@CR36]\].Fig. 1Overlapping features in autoimmune bullous diseases, Stevens--Johnson syndrome, and oral lichen planus demonstrate that oral blistering diseases cannot be differentiated based on clinical presentation. Lesions include desquamative gingivitis (**a**, **d**, **m**), cheilitis (**e**, **f**, **g**, **h**, **j**, **k**), erythema and erosions and blistering of the buccal mucosa (**b**, **i**, **l**, **n**), palatum (**c**), and tongue (**e**, **o**)
Other Pemphigoids with Oral Involvement {#Sec5}
---------------------------------------
Other pemphigoid subtypes may also present with oral lesions; however, the difference between MMP and cutaneous pemphigoids relies on the predominant affected site. Bullous pemphigoid primarily affects the skin, with occasionally mild mucosal lesions, whereas MMP predominantly affects the mucous membranes \[[@CR7]\]. Epidermolysis bullosa acquisita and LAD are pemphigoid subtypes that also can have predominant mucosal involvement; however, they are not restricted to the oral mucosa alone.
Epidermolysis bullosa acquisita is a subtype of pemphigoid characterized by tissue-bound and circulating autoantibodies against type VII collagen, the main component of the anchoring fibrils below the lamina densa \[[@CR2]\]. The incidence ranges from 0.25 and 0.5 new cases per million per year in central Europe and the disease may develop at any age \[[@CR13]\]. Two major forms of EBA can be distinguished: the non-inflammatory variant (also termed classical or mechanobullous EBA) and the inflammatory variant \[[@CR2], [@CR37]\]. The first form presents with fragile skin, nail loss, and tense vesiculobullous eruptions on trauma-prone areas followed by scarring, milia, and hypo- or hyperpigmentation. These manifestations are also seen in the genetic skin blistering disorder, dystrophic epidermolysis bullosa with a mutation in the same protein, type VII collagen. The inflammatory variant resembles bullous pemphigoid, and blisters heal without scarring. Involvement of mucous membranes is present in more than half of the cases in both variants \[[@CR38]\]. The oral mucosa may show erosions, bullae, gingivitis, loss of teeth, and reduced ability to open the mouth. Oral lesions heal with scar formation, and are often therapy resistant \[[@CR29], [@CR39]\].
Linear IgA disease is a rare disease characterized by linear deposition of solely IgA along the EBMZ. The incidence ranges between 0.23 and 0.57 per million per year in Europe \[[@CR40]\]. Both children and adults can be affected, in particular, before the age of 5 years and after the age of 60 years \[[@CR41]\]. Linear IgA disease in childhood seems to be self-limiting, whereas the adult type is characterized by a more chronic disease course. Patients with LAD present with bullae on urticarial plaques in a ring-shaped distribution, also called the 'crown of jewels', on the trunk and extremities. Involvement of mucous membranes is seen in 80% of the cases \[[@CR41]\]. Oral involvement may consist of painful erosions and ulceration, and in some cases, erosive cheilitis or desquamative gingivitis \[[@CR42]\]. Other affected areas in LAD include ocular, nasal, and genital mucous membranes \[[@CR41]\]. The IgA autoantibodies in LAD are mainly directed against BP180 and its ectodomain cleavage products, the 120-kDa (LAD-1) and the 97-kDa (LABD97) antigen \[[@CR2]\].
Anti-p200 pemphigoid was first described in 1996 and is caused by autoantibodies against a 200-kDa (p200) protein of unknown identity located in the lamina lucida \[[@CR43], [@CR44]\]. The clinical presentation is heterogeneous and consists of itchy tense bullae and erythematous or urticarial plaques, which are mainly present on the hands, feet, extremities, and trunk \[[@CR45]\]. Oral and genital mucous membranes are involved in 50% of the cases \[[@CR8]\].
Pemphigus Vulgaris {#Sec6}
==================
Epidemiology {#Sec7}
------------
Pemphigus vulgaris is a rare disease with an estimated prevalence of 94.8 per million inhabitants in Germany in 2014 \[[@CR46]\]. The estimated annual incidence in European countries lies within the range of 0.7--8 cases per million inhabitants, and is the highest among patients living in South-Eastern European countries \[[@CR47]--[@CR55]\]. On average, patients develop PV in the fifth decade of life, with a slight female predominance \[[@CR46], [@CR54], [@CR55]\]. The observed mortality rates are increased 2.3- to 3.3-fold compared with the general population, with 1-, 5-, and 10-year survival rates of 95%, 93%, and 90%, respectively \[[@CR55]--[@CR59]\]. Infections are the most frequent cause of death, particularly pneumonia and sepsis \[[@CR56], [@CR57]\].
Pathogenesis {#Sec8}
------------
The pathogenesis of PV relies on IgG-targeting desmosomal proteins DSG1 and DSG3 \[[@CR60]\].
Genetics seems to contribute in the disease pathogenesis, as population-specific associations between PV and several HLA class II genes have been described, and also associations with non-HLA genes were reported \[[@CR61], [@CR62]\]. Overall, the most commonly reported PV-associated HLA class II alleles are HLA-DQB1\*0503 and DRB1\*0402, which are expressed on antigen-presenting cells.
Most patients with PV with only DSG3 autoantibodies develop a mucosal-dominant phenotype, whereas patients with both DSG1 and DSG3 reactivity display mucocutaneous lesions \[[@CR63]\]. This is explained by the desmoglein compensation hypothesis \[[@CR63], [@CR64]\]. In the skin, DSG3 is only expressed at the basal layers, while DSG1 is expressed throughout the whole epithelium, and therefore can compensate for DSG3 function loss. However, in the mucosa, DSG3 is expressed in the whole epithelium, whereas DSG1 expression is high in the superficial layers, and significantly lower in the basal layers and therefore loss of DSG3 cannot be adequately compensated by DSG1. This explains why patients with exclusive DSG3 reactivity display mucosal lesions only. Interestingly, seroconversion from DSG3 to DSG1 reactivity and vice versa may occur during the disease course, with corresponding conversion of the clinical pemphigus phenotype.
Several theories concerning the blistering mechanism in PV exist. One theory suggests the binding of autoantibodies may interfere with the cell adhesion ability of desmogleins by steric hindrance \[[@CR65], [@CR66]\]. Others observed that autoantibodies induce clustering of the desmogleins, leading to non-assembly of the desmosomes and depletion of desmogleins by internalization, which can weaken the desmosomes' adhesion strength \[[@CR67]--[@CR69]\]. Last, there is evidence that signaling pathways play a role in acantholysis in PV \[[@CR70], [@CR71]\]. Some authors hypothesize that signaling pathways in PV may lead to alteration of the cytoskeleton, leading to shrinkage of the basal keratinocytes, and eventually to programmed cell death \[[@CR72], [@CR73]\]. Animal studies and in vitro experiments have shown that the IgG Fab fragments purified from the sera of patients with PV directly lead to a pemphigus disease phenotype, implying that Fc-mediated effects of IgG are not necessarily involved in the pathogenesis \[[@CR74], [@CR75]\].
Clinical Features {#Sec9}
-----------------
Patients with PV often present with oral mucosal involvement, with or without skin lesions (Fig. [1](#Fig1){ref-type="fig"}d--f). The oral mucosa is the first site to be involved in 50--80% of patients with PV \[[@CR25]\]. Mucocutaneous PV is more common than mucosal dominant PV \[[@CR76]\]. Oral involvement in pemphigus vegetans, a clinical variant of PV, is reported in 60--80% of the cases \[[@CR77]\]. Skin lesions typically consist of flaccid blisters that easily rupture, leaving erosions and crusts, and are commonly distributed on the face, scalp, and upper chest \[[@CR3]\]. The oral mucosa displays erosions more often than intact blistering. The palatal mucosa, buccal mucosa, labial mucosa, and the tongue are most commonly affected. Desquamative gingivitis is seen in approximately one fourth of patients with PV, whereas it is the most common (and often the sole) manifestation in patients with MMP \[[@CR28], [@CR76]\]. Mucous membranes other than the oral mucosa may be involved, including the pharyngeal and nasal mucosa, and less common, the genital, ocular, laryngeal, and esophageal mucosa. Oral lesions heal without scarring.
Paraneoplastic Pemphigus {#Sec10}
========================
Epidemiology {#Sec11}
------------
Paraneoplastic pemphigus, first described by Anhalt et al., is a distinct, extremely rare, and often lethal variant of pemphigus associated with malignancy \[[@CR78]\]. In most cases, underlying B-cell lymphoproliferative diseases can be found, such as non-Hodgkin lymphomas, chronic lymphatic leukemia, or Castleman disease. Paraneoplastic pemphigus is rarely associated with other solid tumors \[[@CR79]\]. However, 10% of cases have no malignancy at the time of the diagnosis and data on follow-up are lacking \[[@CR80]\].
The diagnosis of PNP is based on three criteria: (1) initial mucosal involvement; (2) detection of circulating autoantibodies against envoplakin, periplakin, and/or a2-macroglobulin-like 1 (A2ML1); and (3) the detection of an underlying neoplasm \[[@CR9]\]. Paraneoplastic pemphigus may occur at any age without sex predominance, although most of the cases are diagnosed at approximately 60 years of age \[[@CR80], [@CR81]\]. The disease may also develop in children, frequently associated with Castleman disease \[[@CR9]\].
The underlying malignancies in PNP can be difficult to control, which makes the prognosis very poor with a reported mortality rate of 75--90% \[[@CR82], [@CR83]\]. The survival rate in a French cohort after 1, 2, and 5 years was 49%, 41%, and 38%, respectively \[[@CR84]\]. The main causes of death include infections, the progression of the neoplasm, and bronchiolitis obliterans \[[@CR80], [@CR84], [@CR85]\].
Pathogenesis {#Sec12}
------------
The pathogenesis of PNP is complex, with involvement of both the humoral and cellular immune systems \[[@CR79]\]. Some data confirm the presence of certain genetic predispositions in PNP. A Chinese and a French cohort show a clear association between PNP and HLA-Cw\*14, HLA-DRB1\*04, and HLA-DRB1\*14 \[[@CR86], [@CR87]\]. Currently, different mechanisms are assumed to contribute to the development of PNP \[[@CR9]\]. Direct effects of the associated tumor were found, such as production of autoantibodies targeting epithelial antigens, and high interleukin-6 secretion, resulting in reactive autoimmunity \[[@CR82], [@CR88]\]. Indirectly, autoreactive cellular cytotoxicity against the underlying tumor has been described, showing natural killer cells, macrophages, and cytotoxic CD8 + T lymphocytes, the latter producing high levels of interferon-γ and tumor necrosis factor-α in PNP skin \[[@CR89]\]. The cellular response may result in an interface dermatitis revealing new antigens (epitope spreading). Moreover, a humoral immune response against the tumor may lead to cross-reactivity with epithelial antigens, also called antigen mimicry \[[@CR82], [@CR90], [@CR91]\].
A heterogeneous autoantibody repertoire can be found in PNP; envoplakin, periplakin, BP230, desmoplakin, and plectin are all plakin family proteins that may be targeted. Recently, epiplakin was described as an autoantigen in PNP associated with bronchiolitis obliterans in Japanese patients \[[@CR92]\]. Autoantibodies against several desmosomal cadherins such as DSG1 and DSG3, and desmocollin-1, -2, and -3 have also been identified \[[@CR93]\]. The latest discovered protein targeted by PNP autoantibodies is the A2ML1 protein, an epithelial-expressed protease inhibitor \[[@CR94]\]. In some cases, autoantibodies against the desmosomal armadillo protein plakophilin-3, BP180, laminin 332, and the neuromuscular junction were detected \[[@CR95], [@CR96]\]. Although PNP and PV share some cadherin autoantigens, the targeted epitopes and the IgG isotypes differ in the two diseases \[[@CR97]\]. The exact pathogenic role of autoantibodies targeting different antigens and their influence on the disease phenotype are uncertain.
Clinical Features {#Sec13}
-----------------
The most pronounced clinical sign is involvement of the mucosa, predominantly the oral mucosa with painful stomatitis, gingivitis, hemorrhagic cheilitis, erythema, blistering, and erosions (Fig. [1](#Fig1){ref-type="fig"}g--i) \[[@CR80], [@CR98]\]. The involvement of the mucosa may extend to the upper gastrointestinal tract and upper airways. The conjunctiva is involved in 70% of the cases, with the presence of corneal ulceration, perforation, melting, or symblepharon \[[@CR99]\].
Moreover, PNP shows a wide spectrum of cutaneous eruptions such as macules, papules, plaques, and blistering erosions. Five clinical phenotypes of PNP can be distinguished; PV-like, bullous pemphigoid-like, erythema exsudativum multiforme-like, graft vs. host disease-like, and lichen planus-like \[[@CR9], [@CR100], [@CR101]\].
In addition, PNP can affect other organs and tissues besides the mucosa and skin, suggesting the use of the name paraneoplastic autoimmune multi-organ syndrome according to the latest literature \[[@CR79]\]. Yet, no international consensus exists on the use of the term paraneoplastic autoimmune multi-organ syndrome. Pulmonary involvement in the form of bronchiolitis obliterans occurs in 30% of the PNP cases, which is fatal in 90% of the cases \[[@CR85]\]. Bronchiolitis obliterans is very common in Castleman disease-associated PNP (71%) and a DSG3-dependent mechanism is assumed \[[@CR80], [@CR85], [@CR102]\]. Other affected organs besides the lungs include the thyroid gland, kidneys, and smooth muscle tissue \[[@CR9]\]. Muscle weakness (39%) and myasthenia gravis can also be seen in PNP and are associated with a certain antibody repertoire \[[@CR96]\].
Diagnostic Algorithm in Patients with Oral Blisters {#Sec14}
===================================================
The diagnostic algorithm in patients with oral blisters includes the performance of two biopsies for histopathology and direct immunofluorescence microscopy (DIF), collecting a serum sample for immunoserological tests, and the performance of microbiological diagnostics to test for infectious causes (Fig. [2](#Fig2){ref-type="fig"}).Fig. 2Flowchart of the diagnostic pathway in patients with oral blistering, with the focus on autoimmune bullous diseases affecting the oral mucosa
Main Differential Diagnosis {#Sec15}
---------------------------
The differential diagnosis of erosive oral lesions include infectious agents, due to viruses and bacteria, drug-induced reactions, inflammatory conditions, and systemic diseases (Table [1](#Tab1){ref-type="table"}). These conditions have some specific morphological features and overlapping clinical features, therefore histology is required for the diagnosis.Table 1Differential diagnosis of oral blisters, ulcers, gingivitis, and stomatitisDifferential diagnosis*Autoimmune bullous diseases*Paraneoplastic pemphigusPemphigus vulgarisMucous membrane pemphigoidBullous pemphigoidLinear IgA dermatosisEpidermolysis bullosa acquisitaAnti-p200 pemphigoid*Drug-induced diseases*Methotrexate mucositisSJS/TENGingivostomatitis by checkpoint inhibitors*Systemic diseases*Oral lichen planusSystemic lupus erythematosusGraft vs. host diseaseEpidermolysis bullosaBehçet disease*Other*Causative infectious agentsRecurrent aphthous stomatitisAngina bullosa haemorrhagicaChronic ulcerative stomatitisContact dermatitisMalignancyTrauma*SJS/TEN* Stevens--Johnson syndrome/toxic epidermal necrolysis
Oral lesions caused by infectious agents are usually transient. Primary infection with herpes simplex is the most common viral cause of erosions and blisters in the oral mucosa \[[@CR103]\]. Stevens--Johnson syndrome and toxic epidermal necrolysis are severe, mostly drug-induced reactions with an abrupt onset of erosive stomatitis and hemorrhagic cheilitis followed by widespread skin lesions (Fig. [1](#Fig1){ref-type="fig"}j--l) \[[@CR104]\]. The gingiva is rarely affected in Stevens--Johnson syndrome and toxic epidermal necrolysis. Other mucosal involvement is frequently seen, such as ocular and genital involvement.
Recurrent aphthous stomatitis is the most frequent inflammatory condition of the oral mucosa with recurrent self-limiting ulcers affecting non keratinized mucosa. Multiple factors are involved in the etiology of recurrent aphthous stomatitis \[[@CR103]\]. Behçet syndrome is a chronic multi-system condition characterized by diffuse aphthous erosions and ulcers on the labial, buccal, and lateral tongue mucosa \[[@CR31]\]. Ocular and genital involvement is also frequently seen.
Lupus erythematosus is a systemic autoimmune disorder with a wide variety of clinical features. Oral lesions in lupus erythematosus are usually multiple, located on the buccal mucosa, hard palate, lips, and gingiva. The distribution is asymmetrical with different morphological features ranging from plaques, erythema, and ulcerations \[[@CR19]\].
Oral lichen planus is a chronic immune mediated disease with highly variable clinical features ranging from subtle white reticular patterns to erosions and ulcerations (Fig. [1](#Fig1){ref-type="fig"}m--o). Lesions are usually symmetrically distributed in the oral cavity. Affected sites of the oral cavity include the buccal mucosa, tongue, and gingiva. Histopathologic biopsies of oral lichen planus often show sub-epithelial blistering without preservation of the basal cells, in contrast to pemphigoid \[[@CR19]\].
Nikolsky Sign {#Sec16}
-------------
When encountering a patient with a blistering disease, clinicians may test the positivity of the Nikolsky sign consisting of two variants. The Nikolsky sign I (or direct Nikolsky sign) can be tested by sideward friction of healthy-looking skin or mucosa, and is positive when the mechanical pressure induces an erosion. The Nikolsky sign II (or indirect Nikolsky sign) tests the ability to split the epidermis by pulling the blister remnant, and is positive when the blister extends far beyond the existing erosion \[[@CR105], [@CR106]\].
In patients with a clinical phenotype compatible with AIBD, the Nikolsky sign on the skin may be a useful diagnostic tool with moderate sensitivity; however, a very high specificity for the diagnosis of pemphigus diseases \[[@CR107]\]. The Nikolsky sign can also be tested on the gingiva in patients with only oral involvement, however, it is often positive in both MMP and pemphigus, and therefore not a useful tool to differentiate between these diseases \[[@CR108]\]. Moreover, the Nikolsky sign on the oral mucosa may cause unnecessary injury to the tissue and pain to the patient.
Histopathological Findings {#Sec17}
--------------------------
Histopathology alone is not sufficient to diagnose AIBD because it often is non-specific, but is useful to differentiate between non-autoimmune bullous diseases in the differential diagnosis (Table [1](#Tab1){ref-type="table"}). A skin biopsy for histopathological examination should be taken at the edge of the blister, including one third blister and two thirds perilesional skin \[[@CR4], [@CR6]\]. Mucosal biopsies for histopathology are usually taken from lesional mucosa. In the presence of a blister, a biopsy for histopathology should be taken at the edge of the blister to determine the level of the blister in AIBD. In the presence of an ulceration, a biopsy for histopathology should be taken from the perilesional erythema. One of the differential diagnoses of an ulcerative process is oral lichen planus. In this respect, the presence of an interface dermatitis can only be determined in lesional tissue. Moreover, another differential diagnosis is spinocellular carcinoma and this also can only be excluded with a lesional biopsy.
In MMP, histopathological features may include subepithelial blistering with an infiltrate consisting of eosinophils, lymphocytes, and/or neutrophils \[[@CR25]\]. In EBA, histopathological findings are dependent on the disease phase, as in early stages, vacuolar changes along the BMZ accompanied with edema in the papillary dermis are shown. In a later stage, a subepithelial blister is formed with a mixed infiltrate consisting of neutrophils, eosinophils, and mononuclear cells \[[@CR37]\]. In LAD, an anti-p200 pemphigoid histopathological examination of lesional skin may show subepithelial blister formation with mainly neutrophilic infiltrate in the papillary dermis, in anti-p200 pemphigoid, eosinophils are sometimes present \[[@CR109], [@CR110]\].
Characteristic histopathological findings of PV are acantholysis with rounding up of keratinocytes, and a suprabasilar cleft \[[@CR111]\]. The basal keratinocytes remain attached to the basement membrane, and line the blister floor, resulting in a typical tombstone appearance. Eosinophils may be present, infiltrating the epidermis \[[@CR6]\]. The histopathology of PNP is not exclusive and different patterns can be seen, with vacuolar interface dermatitis or keratinocyte necrosis in most cases, and rarely intra-epithelial acantholysis \[[@CR112]\].
Direct Immunofluorescence Microscopy {#Sec18}
------------------------------------
Direct immunofluorescence plays a very important role in differentiating between the different AIBDs. Autoantibodies bound in the skin are visualized by adding a fluorescent-labeled antibody against human IgG to a frozen skin section \[[@CR113]\]. Skin biopsies should measure 4 mm in diameter, and are preferably taken perilesional, 1--2 cm adjacent to a blister, to yield the highest sensitivity \[[@CR114]--[@CR116]\]. Mucous membrane biopsies should be at least 3 mm in diameter. Oral biopsies are recommended to be taken from the buccal mucosa, localized one third of the distance from the mouth corner to the last molar, to avoid the parotid duct \[[@CR117]\]. A DIF biopsy of non-lesional buccal mucosa in patients with solely desquamative gingivitis is recommended \[[@CR118]\]. A recent retrospective analysis showed comparable sensitivity of a DIF biopsy in normal and perilesional mucosa \[[@CR119]\]. Biopsies for DIF should preferably be stored in 0.9% sodium chloride for 24 hours to reduce IgG background staining \[[@CR120], [@CR121]\]. For a transportation of several days, the biopsy can be stored in Michel's medium.
The location of a DIF biopsy depends on the distribution of lesions. In patients with both skin and mucosal lesions, a skin biopsy is usually performed. In cases with only mucosal lesions, a mucosal biopsy is taken from the affected site. If the DIF result is negative, repeated biopsies, or biopsies from other mucosal sites or the skin can be taken \[[@CR122], [@CR123]\].
Direct immunofluorescence of intact perilesional mucosa in MMP shows deposition of IgG, in some cases, IgA autoantibodies and/or complement C3c along the EBMZ. The sensitivity of DIF microscopy for the diagnosis of MMP lies between 69 and 83%, and increases when multiple and repeated biopsies are performed \[[@CR123]--[@CR126]\]. Similar to MMP, EBA and anti-p200 pemphigoid show linear depositions of IgG and/or IgA and C3c along the EBMZ. In LAD, DIF is the reference standard for diagnosis, and is characterized by a linear deposition of exclusively IgA along the EBMZ \[[@CR116]\].
Analysis of the serration pattern by DIF discriminates between MMP subtypes, but can be indeterminable on mucosal biopsies, and performance of an additional skin biopsy may be considered \[[@CR116], [@CR127]\]. The classic MMP, anti-p200 pemphigoid, anti-laminin 332 pemphigoid, and LAD show a n-serrated pattern, due to binding of autoantibodies against hemidesmosomal proteins above the lamina densa (Fig. [3](#Fig3){ref-type="fig"}a). Epidermolysis bullosa acquisita-type MMP can be diagnosed by recognition of an u-serrated pattern by binding of autoantibodies in the sublamina densa (Fig. [3](#Fig3){ref-type="fig"}b) \[[@CR116], [@CR120]\]. Exclusive linear IgA depositions with an u-serrated pattern in patients with oral lesions without skin involvement is diagnosed as IgA MMP \[[@CR128]\].Fig. 3Immunofluorescence results compatible with the diagnosis of pemphigoid diseases. **a** Direct immunofluorescence microscopy shows linear IgG along the epithelial basement membrane zone in an n-serrated pattern. **b** Direct immunofluorescence microscopy shows linear IgG along the epithelial basement membrane zone in a u-serrated pattern. **c** Indirect immunofluorescence microscopy on a substrate of salt-split skin (indirect immunofluorescence on salt-split skin), showing IgG bound to the epithelial side of the artificial split, wherein BP180 and BP230 are located. **d** Indirect immunofluorescence on salt-split skin showing IgG bound to the dermal side of the artificial split, wherein laminin-332, p200, and type VII collagen are located
Direct immunofluorescence microscopy is the reference standard in pemphigus diagnosis, and shows binding of IgG on the epithelial cell surface (ECS) \[[@CR114]\]. The deposition pattern might be smooth or granular, in line with the theory on clustering of desmogleins (Fig. [4](#Fig4){ref-type="fig"}a, b). Complement C3 deposits may be found in approximately 61% of PV cases \[[@CR28]\].Fig. 4Direct immunofluorescence microscopy staining of a pemphigus patient. **a** IgG staining in a smooth epithelial cell surface pattern. **b** IgG staining in a granular epithelial cell surface pattern
In PNP, the DIF on skin and mucosa may show deposition of IgG and C3c in an ECS pattern, in some cases with additional linear-granular depositions of mainly complement and sometimes IgG along the EBMZ (Fig. [5](#Fig5){ref-type="fig"}a) \[[@CR129]\]. The combined ECS and anti-EBMZ pattern is seen in 27% of the cases; however, it has a very high specificity of 97%. Rarely, a linear anti-EMBZ pattern may be the only finding with DIF microscopy \[[@CR130]\].Fig. 5Diagnostic results in paraneoplastic pemphigus. **a** Direct immunofluorescence microscopy with an epithelial cell surface and anti-basement membrane zone pattern. **b** Indirect immunofluorescence microscopy on a rat bladder with IgG staining in an epithelial cell surface pattern, compatible with the diagnosis of paraneoplastic pemphigus. **c** Serum analyzed for IgG against paraneoplastic pemphigus antigens by immunoblotting (1) and immunoprecipitation (2). *A2ML1* alpha-2-macroglobulin-like 1, *EPL* epiplakin, *PPL* periplakin
Immunoserology {#Sec19}
--------------
Several immunoserologic tests are used to detect circulating autoantibodies against hemidesmosomal and desmosomal proteins, and may be valuable for diagnosing and discriminating between AIBDs. Circulating autoantibodies in serum of MMP are usually low in concentration and therefore not always detectable \[[@CR27]\]. This is also the case in EBA, which lacks detectable circulating autoantibodies in more than half of the cases. In contrast, serological tests are essential for the diagnosis of PNP.
### Indirect Immunofluorescence {#Sec20}
With indirect immunofluorescence (IIF) microscopy, the patients' serum is applied to a substrate, and after incubation and washing away unbound antibodies, a fluorescent-labeled antibody visualizes autoantibodies bound to the substrate. Monkey esophagus is frequently used as a substrate because it is widely commercially available. Indirect immunofluorescence on monkey esophagus shows the highest sensitivity for the diagnosis of pemphigus diseases, and circulating autoantibodies in a smooth ECS pattern can be identified in approximately 86--90% of patients with PV \[[@CR114], [@CR131]\].
A second commonly used substrate is salt-split skin (SSS), which can discriminate between pemphigoid subtypes \[[@CR8]\]. Salt-split skin is obtained by incubation of human skin in sodium for 2--3 days, resulting in a reproducible artificial split in the lamina lucida, with antigens located either at the epithelial or dermal side. Indirect immunofluorescence on SSS in classic MMP with autoantibodies directed against BP180 or BP230 shows binding to the epithelial side (Fig. [3](#Fig3){ref-type="fig"}c). Other subtypes of MMP show antibodies directed against p200, laminin-332, and type VII collagen, which bind to the dermal side of the artificial split (Fig. [3](#Fig3){ref-type="fig"}d). Anti-laminin-332 MMP with epithelial binding has been reported. This is explained by the co-existence of antibodies to BP180 or BP230 and the low sensitivity of the technique, which leads to a negative result of indirect immunofluorescence on the dermal side of the split skin \[[@CR34]\]. In LAD, IIF on SSS exclusively shows IgA, which most often binds to the epithelial side, or the dermal side in the case of IgA-EBA-type MMP \[[@CR116]\].
Indirect immunofluorescence on a substrate of rat bladder is one of the few serological tests that can diagnose PNP, and therefore is highly important. Rat bladder is a perfect substrate as it does not contain DSG1 and DSG3, but expresses desmoplakin, epiplakin, and periplakin \[[@CR93]\]. Positive IIF on a rat bladder is very specific for PNP, and may show different patterns, such as urothelial cell surface staining and cytoplasmic staining (Fig. [5](#Fig5){ref-type="fig"}b) \[[@CR130]\].
### Other Immunoserological Tests {#Sec21}
Enzyme-linked immunosorbent assay (ELISA) and immunoblot are commonly used to specify targeted antigens. The ELISA technique is performed using a 64-well plate, of which each well is coated with a specific AIBD-related antigen. Serum is added to enable autoantibodies to bind the specific antigen on the sides of the well. After washing away non-specific unbound antibodies, an enzyme-linked IgG conjugate is added. The enzyme substrate is applied in the next step, resulting in a measurable color reaction, of which the intensity reflects on the amount of autoantibodies. To perform the immunoblot technique, denatured proteins of the skin are first sorted based on molecular size by gel electrophoresis, and are transferred onto a membrane \[[@CR132], [@CR133]\]. Autoantibodies directed against skin proteins can bind the membrane, and are visualized by staining. The molecular size of the stained protein identifies which antigen is targeted.
In MMP, the NC16A ELISA is frequently used for the detection of circulating autoantibodies; however, a retrospective study showed a high number of false-positives (11.3%) in non-pemphigoid controls \[[@CR115]\]. Izumi et al. reported the detection of BP180 by full-length BP180 ELISA because MMP autoantibodies may target different regions, especially the C-terminal domain \[[@CR134]\]. However, the full-length BP180 ELISA is not commercially available.
Enzyme-linked immunosorbent assay kits are also commercially available for BP230 and type VII collagen \[[@CR135]\]. The BP230 ELISA is less sensitive with an additional diagnostic added value of only 5% compared to NC16A ELISA in bullous pemphigoid \[[@CR135]\]. The type VII collagen ELISA has a low sensitivity of 45%, and when combined with IIF on SSS the sensitivity rises to 50% \[[@CR127]\]. The immunoblot assay in MMP has a highly variable sensitivity. Autoantibodies targeting BP180, LABD97, LAD-1, and p200 can be detected by immunoblotting, although the latter requires a sophisticated preparation of a human dermal extract, which is only performed in highly specialized laboratories \[[@CR45]\]. In LAD, immunoblot can detect circulating IgA autoantibodies against BP180, LABD97, or LAD-1.
Antibodies against DSG1 and/or DSG3 can be measured by the ELISA technique in approximately 90% of patients with pemphigus \[[@CR6]\]. Antibody titers against DSG1 measured by ELISA correlate well with the disease activity of PV, whereas DSG3 antibody titers correlate with the disease course in only two thirds of the patients \[[@CR136], [@CR137]\]. In several patients with PV, high levels of DSG3 antibodies remain measurable after achieving remission, and it is hypothesized that they might be non-pathogenic \[[@CR138]\]. Immunoblot is not useful for the diagnosis of PV because anti-DSG1 and DSG3 autoantibodies are often directed against conformation epitopes, meaning that the denaturation process changes the epitopes' composition, and therefore immunoblot will be negative \[[@CR133]\].
The diagnosis of PNP is based on the detection of autoantibodies against envoplakin and periplakin, or A2ML1. Radioactive and nonradioactive immunoprecipitation is the most sensitive (95%) and specific (100%) method, but these tests are not widely available (Fig. [5](#Fig5){ref-type="fig"}c). Immunoblot can show reactivity against the 210-kDa envoplakin, 190-kDa periplakin, 180-kDa BP180, 230-kDa BP230, 250 and 210-kDa desmoplakin I and II, and 500-KDa plectin (Fig. [5](#Fig5){ref-type="fig"}c). Immunoblot in combination with IIF on the rat bladder has shown to be an excellent alternative for immunoprecipitation, with very high sensitivity and specificity. This alternative provides a valuable, relative easy method to perform PNP diagnostic in most laboratories \[[@CR93]\].
Conclusions {#Sec22}
===========
Clinicians should be aware that oral lesions in AIBD may look similar, and might be the only manifestation of disease. A quick and proper diagnosis is necessary for adequate treatment, which may take place in a multi-disciplinary setting. Direct immunofluorescence on a biopsy from skin or mucosa combined with IIF and additional serological tests are the cornerstones for the diagnosis of AIBD. By following the described diagnostic algorithm, clinicians should be able to recognize and accurately diagnose AIBD affecting the oral mucosa.
Hanan Rashid and Aniek Lamberts contributed equally.
No financial support was received for the research, authorship, and/or publication of this article.
Barbara Horvath has received grants from AbbVIe, Janssen-Cilag, Solenne B.V., and Celgene; consulting fees from AbbVie, Janssen-Cilag, Novartis, UCB Pharma, Akari Pharmaceutics, Philips, and Roche and support for travel from AbbVie, Janssen-Cilag, and Novartis. Hanan Rashid, Aniek Lamberts, Gilles F.H. Diercks, Hendri H. Pas, Joost M. Meijer, and Maria C. Bollin have no conflicts of interest that are directly relevant to the content of this article.
|
Alcohol may have played a role in an early morning two-vehicle crash where a Shelby Township man was killed and another man was seriously injured, Shelby Township police said Sunday.
Investigators are still trying to piece together the circumstances of the accident.
Officers were called to 23 Mile Road between Ryan and Shelby roads about 3:45 a.m. A 60-year-old Shelby Township man was found unconscious in a 2005 Chrysler 300. A 21-year-old Troy man was found unconscious in a 1999 Mercury SUV. Both had to be removed from their cars with rescue tools.
The 60-year-old was pronounced dead at Troy Beaumont Hospital. The 21-year-old is being treated for serious injuries.
Officials are not releasing the name of the deceased pending next-of-kin notification.
Anyone with information is asked to contact the police at 586-731-2121. |
Context Navigation
Preferences
This page lets you customize your personal settings for this site.
These settings are stored on the server and are identified by a session
key stored in a browser cookie. That cookie allows your settings to be
restored on subsequent visits.
The session key is used to identify stored custom settings and session data on the server. Although it is automatically generated by default, you may change it to something easier to remember at any time if you wish to load your settings in a different web browser.
Restore session:
You may load a previously created session by entering the corresponding session key below. This lets you share settings between multiple computers and web browsers. |
Effects of imipramine and lithium on wet-dog shakes mediated by the 5-HT2A receptor in ACTH-treated rats.
We examined the influence of imipramine and lithium on wet-dog shakes induced by the (+/-)-DOI, 5-HT2A receptor agonist in adrenocorticotropic hormone (ACTH)-treated rats. The administration of imipramine for 14 days decreased the (+/-)-DOI-induced wet-dog shakes response; chronic administration of lithium for 14 days, however, had no effect. Chronic ACTH (100 microg/rat sc) treatment increased the wet-dog shake response induced by (+/-)-DOI. This effect of ACTH for 14 days, increasing the (+/-)-DOI-induced wet-dog shakes, was not inhibited by a 14-day administration of imipramine. Chronic coadministration of imipramine and lithium, lasting 14 days, decreased the wet-dog shakes response induced by (+/-)-DOI in rats treated with ACTH for 14 days. These findings indicate that lithium inhibits the hyperfunction of the 5-HT2A receptor in rats treated with ACTH when coadministered with imipramine. |
Florida man wrecks liquor store, blames it on caterpillar
CRESTVIEW, Fla. - A Florida man arrested for destroying a liquor store under construction told police he was Alice in Wonderland and that a "hookah-smoking caterpillar" ordered him to attack the site.
Crestview police said in a post on Facebook that Matthew Horace Jones is accused of breaking into a fenced-in area and using a forklift to cause more than $100,000 in damage. He faces grand theft felony and other charges.
Witnesses called 911 and police went to the site. The police report says Jones aimed the forklift toward officers, who stopped him at gunpoint.
Police quoted Jones as identifying himself as Alice in Wonderland, blaming the attack on "a hookah-smoking caterpillar" and saying that he had a problem with "building a place to sell alcohol."
No lawyer is listed for him. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.