text
stringlengths
8
5.77M
Here’s the full transcript of Michelle’s Obama’s speech which she delivered this morning at the Regina Mundi Church in Soweto. It was moving, inspiring and perfectly delivered: MRS. OBAMA: Thank you. Thank you so much. It is such a pleasure and an honor to be here with all of you today. I want to start by thanking Graca Machel for that just gracious, kind introduction. It is overwhelming. And I want to thank her for her lifetime of service as a champion for women and children. And from the bottom of my heart, I want to thank you for all of the kindness and generosity that you have shown my family for our visit here. Thank you so much. (Applause.) I am also honored to share the stage with another remarkable leader, Baleka Mbete. (Applause.) She has played a vital role in advancing equality and promoting development here in South Africa. Thank you to the both of you for joining us here for sharing this moment with all of us. I also want to thank the Archbishop of Johannesburg for honoring us today with his presence. And of course, I want to recognize our guests of honor –- these 76 extraordinary young women leaders from here in South Africa and across the continent. (Applause.) These are young women transforming their communities and their countries, and let me tell you I am so impressed by all of them. I am so proud of everything they have achieved. And finally, I want to thank the leaders and the congregation of Regina Mundi for hosting us in this sacred space today. It has been more than three decades, but those bullet holes in the ceiling, this broken altar still stand as vivid reminders of the history that unfolded here. And you all know the story –- how 35 years ago this month, a group of students planned a peaceful protest to express their outrage over a new law requiring them to take courses in Afrikaans. Thousands of them took to the streets, intending to march to Orlando Stadium. But when security forces opened fire, some fled here to this church. The police followed, first with tear gas, and then with bullets. And while no one was killed within this sanctuary, hundreds lost their lives that day, including a boy named Hector Pieterson, who was just 12 years old, and Hastings Ndlovu, who was just 15. Many of the students hadn’t even known about the protest when they arrived at school that morning. But they agreed to take part, knowing full well the dangers involved, because they were determined to get an education worthy of their potential. And as the Archbishop noted, that June day wasn’t the first, or the last, time that this church stood in the crosscurrents of history. It was referred to as “the parliament of Soweto.” When the congregation sang their hymns, activists would make plans, singing the locations and times of secret meetings. Church services, and even funerals, often became anti-Apartheid rallies. And as President Mandela once put it, “Regina Mundi became a world-wide symbol of the determination of our people to free themselves.” It is a story that has unfolded across this country and across this continent, and also in my country — the story of young people 20 years ago, 50 years ago, who marched until their feet were raw, who endured beatings and bullets and decades behind bars, who risked, and sacrificed, everything they had for the freedom they deserved. And it is because of them that we are able to gather here today. It is because of them that so many of these young women leaders can now pursue their dreams. It is because of them that I stand before you as First Lady of the United States of America. (Applause.) That is the legacy of the independence generation, the freedom generation. And all of you -– the young people of this continent -– you are the heirs of that blood, sweat, sacrifice, and love. So the question today is, what will you make of that inheritance? What legacy will you leave for your children and your grandchildren? What generation will you be? Now, I could ask these questions of young people in any country, on any continent. But there is a reason why I wanted to come here to South Africa to speak with all of you. As my husband has said, Africa is a fundamental part of our interconnected world. And when it comes to the defining challenges of our times –- creating jobs in our global economy, promoting democracy and development, confronting climate change, extremism, poverty and disease — for all this, the world is looking to Africa as a vital partner. That is why my husband’s administration is not simply focused on extending a helping hand to Africa, but focusing on partnering with Africans who will shape their future by combating corruption, and building strong democratic institutions, by growing new crops, caring for the sick. And more than ever before, we will be looking to all of you, our young people, to lead the way. And I’m not just saying that to make you all feel good. (Laughter.) The fact is that in Africa, people under 25 make up 60 percent of the population. And here in South Africa, nearly two-thirds of citizens are under the age of 30. So over the next 20 years, the next 50 years, our future will be shaped by your leadership. And I want to pause for a moment on that word -– leadership — because I know that so often, when we think about what that word means, what it means to be a leader, we think of presidents and prime ministers. We think of people who pass laws or command armies, run big businesses, people with fancy titles, big salaries. And most young people don’t fit that image. And I know that often when you try to make your voices heard, sometimes people don’t always listen. I know there are those who discount your opinions, who tell you you’re not ready, who say that you should sit back and wait your turn. But I am here today because when it comes to the challenges we face, we simply don’t have time to sit back and wait. I’m here because I believe that each of you is ready, right here and right now, to start meeting these challenges. And I am here because I know that true leadership -– leadership that lifts families, leadership that sustains communities and transforms nations –- that kind of leadership rarely starts in palaces or parliaments. That kind of leadership is not limited only to those of a certain age or status. And that kind of leadership is not just about dramatic events that change the course of history in an instant. Instead, true leadership often happens with the smallest acts, in the most unexpected places, by the most unlikely individuals. I mean, think about what happened here in Soweto 35 years ago. Many of the students who led the uprising were younger than all of you. They carried signs made of cardboard boxes and canvass sacks. Yet together, they propelled this cause into the consciousness of the world. And we now celebrate National Youth Day and National Youth Month every year in their honor. I mean, think about the giants of the struggle –- people like Albertina Sisulu, whose recent passing we all mourn. Orphaned as a teenager, she worked as a nurse to support her siblings. And when her husband, Walter Sisulu, became Secretary-General of the ANC, it was up to her to provide for their family. When he was imprisoned for 26 years, it was up to her to continue his work. And that she did. With a mother’s fierce love for this country, she threw herself into the struggle. She led boycotts and sit-ins and marches, including the 1956 Women’s March, when thousands of women from across this country, converged on Pretoria to protest the pass laws. They were women of every color, many of them not much older than all of you. Some of them carried their babies on their backs. And for 30 minutes, they stood in complete silence, raising their voices only to sing freedom songs like Nkosi Sikelel iAfrica. Their motto was simple, but clear: “If you strike a woman, you strike a rock.” (Applause.) Ma Sisulu, the students of Soweto, those women in Pretoria, they had little money, even less status, no fancy titles to speak of. But what they had was their vision for a free South Africa. What they had was an unshakeable belief that they were worthy of that freedom –- and they had the courage to act on that belief. Each of them chose to be a rock for justice. And with countless acts of daring and defiance, together, they transformed this nation. Together they paved the way for free and fair elections, for a process of healing and reconciliation, and for the rise of South Africa as a political and economic leader on the world stage. Now, I know that as your generation looks back on that struggle, and on the many liberation movements of the past century, you may think that all of the great moral struggles have already been won. As you hear the stories of lions like Madiba and Sisulu and Luthuli, you may think that you can never measure up to such greatness. But while today’s challenges might not always inspire the lofty rhetoric or the high drama of struggles past, the injustices at hand are no less glaring, the human suffering no less acute. So make no mistake about it: There are still so many causes worth sacrificing for. There is still so much history yet to be made. You can be the generation that makes the discoveries and builds the industries that will transform our economies. You can be the generation that brings opportunity and prosperity to forgotten corners of the world and banishes hunger from this continent forever. You can be the generation that ends HIV/AIDS in our time — (applause) — the generation that fights not just the disease, but the stigma of the disease, the generation that teaches the world that HIV is fully preventable, and treatable, and should never be a source of shame. (Applause.) You can be the generation that holds your leaders accountable for open, honest government at every level, government that stamps out corruption and protects the rights of every citizen to speak freely, to worship openly, to love whomever they choose. You can be the generation to ensure that women are no longer second-class citizens, that girls take their rightful places in our schools. (Applause.) You can be the generation that stands up and says that violence against women in any form, in any place — (applause) — including the home –- especially the home –- that isn’t just a women’s rights violation. It’s a human rights violation. And it has no place in any society. You see, that is the history that your generation can make. Now, I have to be honest. Your efforts might not always draw the world’s attention, except for today. (Laughter.) You may not find yourself leading passionate protests that fill stadiums and shut down city streets. And the change you seek may come slowly, little by little, measured not by sweeping changes in the law, but by daily improvements in people’s lives. But I can tell you from my own experience –- and from my husband’s experience -– that this work is no less meaningful, no less inspiring, and no less urgent than what you read about in the history books. You see, it wasn’t that long ago that my husband and I were young, believe it or not — (laugher) — just starting out our careers. After he graduated from university, Barack got a job as a community organizer in the struggling neighborhoods on the South Side of Chicago. A lot of people there were out of work and barely getting by. Children had few opportunities and little hope for their future. And trust me, no one thought that this skinny kid with the funny name — (laughter) — could make much of a difference. But Barack started talking to people. He urged them to start working on the change they wanted to see. Soon, slowly, folks started coming together to fight for job training programs and better schools and safer housing for their families. Slowly, the neighborhoods started to turn around. Little by little, people started feeling hopeful again. And that made Barack feel hopeful. And I had a similar experience in my own career. Like my husband, I came from a modest background. My parents saved and sacrificed everything they had so that I could get an education. And when I graduated, got a job at a big, fancy law firm — nice salary, big office. My friends were impressed. My family was proud. By all accounts, I was living the dream. But I knew something was missing. I knew I didn’t want to be way up in some tall building all alone in an office writing memos. I wanted to be down on the ground working with kids, helping families put food on the table and a roof over their heads. So I left that job for a new job training young people like yourselves for careers in public service. I was making a lot less money. My office wasn’t so nice. (Laughter.) But every day, I got to watch those young people gain skills and build confidence. And then I saw them go on to mentor and inspire other young people. And that made me feel inspired. It still does. See, my husband and I, we didn’t change any laws, we didn’t win any awards, get our pictures in the paper. But we were making a difference in people’s lives. We were part of something greater than ourselves. And we knew that in our own small way, we were helping to build a better world. And that is precisely what so many young people are doing every day across this continent. These 76 young women are outstanding examples. Take Gqibelo Dandala from here in South Africa. She left a lucrative career in investment banking to found the Future of the African Daughter Project, an organization that lifts up young women in rural and township areas. Of her work, she says: “…we are building a legacy which will outlive and outgrow us…” And then there’s Robyn Kriel. She’s a young reporter from Zimbabwe who has written about corruption and human rights abuses in her country. She was beaten by police; her home raided, her mother imprisoned. But she still hasn’t lost her passion for reporting, because, as she put it, the people of Zimbabwe “want their stories to be told.” And then there’s Grace Nanyonga, who joins us today from Uganda. Hey, Grace! (Applause.) You go, girl. (Laughter.) Orphaned at the age of 13, she started cooking and selling fish during her school vacations to support her six siblings. Determined to get an education, she founded her own company, and she made enough money to put herself through university. And she’s now started an organization that trains local women to work at her company so that they can support their own families. (Applause.) Of her achievements, she says, simply — these are her words — “I made it against all odds” and “I want to be an example for girls in my country and beyond.” Now, Grace could have been content to make lots of money, and just provide for her own family. Gqibelo could have climbed the corporate ladder, and never looked back. Where is she? Please stand. Grace got to stand. (Laughter.) Come on, where is she? Is she out there? (Applause.) And no one would’ve blamed Robyn — where’s Robyn? (Applause.) No one would have blamed Robyn if after all she’d been through she decided to quit reporting and pursue an easier career. But these young women — and these are just examples of stories that go on and on — these young women could not be content with their own comfort and success when they knew that other people were struggling. You see, that’s how people of conscience view the world. It’s the belief, as my husband often says, that if any child goes hungry, that matters to me, even if she’s not my child. (Applause.) If any family is devastated by disease, then I cannot be content with my own good health. If anyone is persecuted because of how they look, or what they believe, then that diminishes my freedom and threatens my rights as well. And in the end, that sense of interconnectedness, that depth of compassion, that determination to act in the face of impossible odds, those are the qualities of mind and heart that I hope will define your generation. I hope that all of you will reject the false comfort that others’ suffering is not your concern, or if you can’t solve all the world’s problems, then you shouldn’t even try. Instead, as one of our great American presidents, Teddy Roosevelt, liked to say, I hope that you will commit yourselves to doing “what you can, with what you’ve got, where you are,” because in the end, that is what makes you a lion. Not fortune, not fame, not your pictures in history books, but the refusal to remain a bystander when others are suffering, and that commitment to serve however you can, where you are. Now it will not be easy. You women know that already. You will have failures and setbacks and critics and plenty of moments of frustration and doubt. But if you ever start to lose heart, I brought you all here today because I want you to think of each other. Think about Grace, supporting her family all by herself. And think about Robyn, who endured that beating so she could tell other people’s stories. Think about Ma Sisulu, raising her kids alone, surviving banishment, exile, and prison. When reflecting on her journey, Ma Sisulu once said, with her signature humility, she said, “All these years, I never had a comfortable life.” So you may not always have a comfortable life. And you will not always be able to solve all the world’s problems all at once. But don’t ever underestimate the impact you can have, because history has shown us that courage can be contagious, and hope can take on a life of its own. It’s what happens when folks start asking questions — a father asks, “Why should my son go to school, but not my daughter?” Or a mother asks, “Why should I pay a bribe to start a business to support my family?” Or a student stands up and declares, “Yes, I have HIV, and here’s how I’m treating it, and here’s how we can stop it from spreading.” See, and then soon, they inspire others to start asking questions. They inspire others to start stepping forward. And those are the “ripples of hope” that a young U.S. senator named Robert Kennedy spoke of when he came here to South Africa 45 years ago this month. In his words, he said, the “numberless diverse acts of courage and belief which can sweep down the mightiest walls of oppression and resistance.” And that is how a church can become a parliament. That is how a hymn can be a call to action. That is how a group of young people with nothing more than some handmade signs and a belief in their own God-given potential can galvanize a nation. And that’s how young people around the world can inspire each other, and draw strength from each other. I’m thinking today of the young activists who gathered at the American Library here in Soweto to read the speeches of Dr. Martin Luther King for their inspiration. And I’m thinking of how Dr. King drew inspiration from Chief Luthuli and the young people here in South Africa. And I’m thinking about how young South Africans singing the American civil rights anthem “We Shall Overcome” in the streets of Cape Town and Durban. And I’m thinking of how Nkosi Sikelel iAfrica echoed through university campuses in the U.S., as students -– including my husband –- planned boycotts to support students here in South Africa. And I’m thinking of this church and how those stained windows depicting the struggle were donated by the people of Poland, and how the peace pole in the park outside was donated by people from Japan, and how every week, visitors from every corner of the globe come here to bear witness and draw inspiration from your history. And finally, I’m thinking of the history of my own country. I mean, America won its independence more than two centuries ago. It has been nearly 50 years since the victories of our own civil rights movement. Yet we still struggle every day to perfect our union and live up to our ideals. And every day, it is our young people who are leading the way. They are the ones enlisting in our military. They’re the ones teaching in struggling schools, volunteering countless hours in countless ways in communities. And in this past presidential election, they were engaged in our democracy like never before. They studied the issues, followed the campaign, knocked on doors in the freezing snow and the blazing sun, urging people to vote. They waited in line for hours to cast their ballots. And I have seen that same passion, that same determination to serve in young people I have met all across the world, from India to El Salvador, from Mexico to the United Kingdom to here in South Africa. So today, I want you to know that as you work to lift up your families, your communities, your countries and your world, know that you are never alone. You are never alone. As Bobby Kennedy said here in South Africa all those years ago: “…you are joined with fellow young people in every land, they struggling with their problems and you with yours, but all joined in a common purpose…determined to build a better future.” And if anyone of you ever doubts that you can build that future, if anyone ever tells you that you shouldn’t or you can’t, then I want you to say with one voice –- the voice of a generation –- you tell them, “Yes, we can.” (Applause.) What do you say? Yes, we can. (Applause.) What do you say? Yes, we can! Comments Incredibly inspirational speech by a woman of obvious substance and diamond hard personal and functional integrity. So proud that she has echoed the central theme of my book (“The Other – without fear, favour or prejudice”) in insisting that “an ordinary life becomes extraordinary when you commit to seeking and defending truth for social justice”. The First Lady’s speech was a inspirational reminder to the African citizens practical challenges and opportunties of the global and local communities that face continued challenges of a social, cultural and spiritual nature. The historic address also comes at the right time, moment and place, in reminding the sacrifice made by the youth of Soweto, and it’s impact and contribution in bringing about the political changes in the new South Africa. The visit of Michelle Obama also confirms that the young women and sisterhood, are at the very heart of the future and diverse hopes and dreams of Soweto, Africa and beyond. The speeches of both Michelle Obama and Oprah last week were inspirational. It is a pity that so many in SA were so intent on shooting the American messengers that they missed the essence of the messages themselves. (what do these Western imperialists know after all?) About I am a working mother. Work is my retreat. Home is my challenge. I share my life with a nine-year-old daughter, a six-year-old son, and a four-year-old "baby" girl. Once exclusively my love interest, my husband is now the co-navigator through our madness.
The focus of this proposal is to define the systemic and local immune responses to administration of adenovirus (Ad) gene transfer vectors to normal humans. Although Ad vectors can transfer genes in vivo to a wide variety of organs, both humoral and cellular immune responses to Ad vectors present formidable hurdles to the effective use these vectors to treat human disease. In an attempt to circumvent these hurdles, a great deal of effort is being made to design Ad vectors "stealth" to the immune system, or to use immune suppressive drugs to limit host responses to Ad vectors. It is the central concept of this proposal that the definition of local and systemic immune responses to Ad vectors in normal humans will help in the effort to use Ad vectors to deliver therapeutic genes to humans with disease. It is the hypothesis of this proposal that intrabronchial administration of Ad vectors to normals will elicit local (lung epithelial) and systemic humoral and cellular immunity directed against the Ad vector, but that these anti-vector responses will be mild. In contrast, the systemic (but not lung) immune response generated by intradermal administration will be far more robust. To evaluate this hypothesis, a clinical study has been developed to define systemic and local immune responses to administration of an Ad vector to normal individuals. The vector to be used is Ad5CMV.Null2, an E1a-, partial E1b-, partial E3-, Ad vector that is "null", i.e., it contains an expression cassette with a promoter, but no transgene (to eliminate the variable of the immune response against the transgene). The vector will be administered to the bronchial epithelium or intradermal (one time, as well as repetitively, in ascending doses to different individuals), and the local (lung epithelial and dermal) and systemic humoral and cellular immune responses to the vector evaluated. These studies have the following objectives: (1) to define the local (lung epithelial) and systemic humoral and cellular immune responses to single and repetitive intrabronchial administration of a replication deficient Ad vector to normal individuals; (2) to define the systemic and lung epithelial humoral and cellular (cytotoxic T-lymphocyte) responses to single and repetitive intradermal administration of a replication deficient Ad vector to normal individuals; (3) to examine the differences in the local and systemic humoral and cellular immune responses to an Ad vector elicited by intrabronchial compared to intradermal administration of the Ad vector to normal individuals.
AIB uses cookies to enhance your browsing experience and to create a secure and effective website for our customers. By using this site you agree that we may store and access cookies on your devices, unless you have disabled your cookies. AIB First Loan - Personal Loan Planning for tomorrow starts today. Now you can make those plans a reality with the flexible AIB First Loan Sometimes the idea of getting a loan can be daunting so we developed the AIB First Loan especially for you - 18 to 30 year olds! To get you started, we will guide you through the process, keep it simple and get you on your AIB First Loan journey. We can help you: find out how much you can borrow, answer your questions here, or in a branch AIB First Loan - What you need to know? You can borrow up to 3 times your net monthly salary, from €1,000 to €8,000 Pay it back over a term from 6 to 60 months or up to the end of your job contract whichever is shorter Choose from weekly, fortnightly or monthly repayments Planned repayment holidays available when you take out your loan. You can request to take a repayment break at a set time every year, e.g. at Christmas, so your annual loan repayments are spread over 11 months instead of 12. This repayment option may impact on the amount and/or term of the loan and is only available if requested during loan application No charge for unscheduled repayments - that means, we won’t charge you extra if you make a payment to your loan outside of your normal scheduled repayment Get a quick quote for a First Loan Note: This information is provided for illustrative purposes only. It does not constitute a contract. We are not recording and will not use the information quoted by you in our calculators unless it is being provided as part of a product application. The results are the current offered rate for Personal Loans, which is variable. The total amount repayable is based on the assumption that the interest rate remains unchanged for the duration of the loan term. The minimum loan amount is €1,000 and the maximum is €8,000. A typical €1,500 one year loan with a variable interest rate of 8.65% and 8.95% APR (Annual Percentage Rate), where the APR does not vary during the term, will have monthly repayments of €130.48, and a total cost of the credit (the total amount repayable less the amount of the loan) of €65.76. Related Products Personal Overdraft Giving you peace of mind that additional funds are available if you need them. Before proceeding please read our Site Use Terms and Conditions, Privacy & Cookie statements which apply to your use of this website. AIB and AIB Group are registered business names of Allied Irish Banks, p.l.c. Registered Office: Bankcentre, Ballsbridge, Dublin 4
This is supposed to be a base coat for neon colors, but it's so translucent that there's no way that neon would pop on top of it. Also when it does go on, it's not very smooth. It leaves streaks and takes a long time to dry. I would not recommend this to anyone. Looking for uneven streaks of a milk, crappy white that takes forever to dry? This is your product! The coverage was terrible and goopy. I expected that since it was called a base coat, a single coat would do the trick, but even two coats wasn't enough. I just gave up on it at that point, removed it from my fingernails, and threw it away.
{ "created_at": "2015-02-27T22:27:56.544739", "description": "Angularjs developer guide example using uliweb", "fork": false, "full_name": "zhangchunlin/angular-uliweb-examples", "language": "Python", "updated_at": "2015-02-27T23:41:59.581537" }
The Labyrinth Chapter 11 Years went by and nothing more came out about the murder and I heard nothing about where Ed Carey had gone. I stopped going through the papers every day. I’d mostly lost touch with everyone from the old neighborhood and my old schools, and the ache I’d felt for so long about the murder slowly started to seep away. Sometimes it would suddenly come back to me, though, and I’d feel almost like it had happened only a day or a week before. I’d get out the old newspaper articles that I now kept in a metal box and read through them. They had turned yellowish and brittle from age by that time, and I held them carefully so they wouldn’t fall apart. I picked up the business card the detective had given me who had questioned me and read it like I was seeing it for the first time. So many times I had wanted to just spill my guts about it to someone, and a couple of times I almost did—to Charlotte and to Heather—but just about the time I felt like I knew them well enough to tell them about it or I thought they loved me enough to do it, the relationship ended, and I crammed the whole story back down into my head again. I made an appointment with a psychiatrist once and was going to talk to him about it, but the day before I cancelled it, because I just couldn’t go through with telling the story to a stranger. I began to think that maybe my life would go on more or less normally, like the murder never happened, that maybe I would die with nothing more happening than that it would haunt me sometimes or I’d see it again once in a while in a nightmare, that no one but me and Ed Carey would ever know the truth. I tried. I tried everything I could, but I couldn’t get Jenna off my mind. I decided that I’d overreacted to seeing her that night, given that I’d only gone out with her once myself and couldn’t really expect anything from her because of it. I thought about giving her a call. But then I remembered her with “Neil” laughing, and his smart ass grin, and everything Vanessa had told me, and was determined to stay away from her. Then my attitude softened, and I remembered Jenna the way she was the afternoon we went for a walk. I was in one of those moods when I called her again. But there was no answer, and when I tried calling a couple other times, Angela told me she wasn’t there. So I decided I’d stick with Vanessa for a while, and surprisingly, she seemed to mean what she said about no strings. The day after the night we’d spent together she was just as casual as always around me. She wasn’t more friendly or affectionate, nor was there any trace of regret in her words or looks. She went on with her painting and the rest of her life, and I went on with mine. A few nights later we slept together again, sharing laughter and wine, but the next day, again, she acted like nothing had happened between us. Still, I found myself avoiding her. I sought out solitude. I took long walks, and sat for hours by the Red Cedar River as the last autumn leaves tumbled down. The campus seemed strangely quiet to me. It was different now that the big protests against the war were over. Some people were still protesting the war, but the war was winding down, and the leaders of the anti-war movement couldn’t draw big crowds anymore. Some students were getting into the McGovern campaign, but unless you were into it yourself, you hardly noticed it. The state of the anti-war movement was symbolized, I thought, by the tattered, dirty post-bills that were wearing off posts and the sides of buildings, telling of protest rallies of years past. When I watched people’s faces as they walked by me, I decided that most people were doing OK. Although there were still plenty of disillusioned, cynical, bitter people, they seemed to me to be the exception rather than the rule. Either that or they were hiding it pretty well, but I preferred to think they weren’t. For miles and miles I walked, all over the campus, into Sanford Woodlot, around town. I suppose part of it was I was hoping I’d run into Jenna. But I never did. It was a Friday night, about eight o’clock. Vanessa had gone out with some of her wild friends about four and I didn’t suppose would be back till late. She’d asked me to go with them, but I wasn’t in the mood. Roxie was out, too, and Paul was upstairs studying. The big house was quiet. I was sitting around more or less doing nothing. Simon & Garfunkel’s Bridge Over Troubled Waters was on the stereo, and I was drinking a beer and occasionally reading a few pages of Steppenwolf. I half regretted not having gone out with Vanessa, even though I knew I probably would have had to pay for it with a hangover in the morning. I was glad when the doorbell rang, because I was bored and ready for any kind of diversion. Well, I got all the diversion I could have wanted, because when I opened the door, there stood Jenna, with a tentative questioning look that quickly changed to a smile. My heart felt like it was going to beat out of my chest, and I felt for a moment like I wouldn’t be able to talk, to get any words to come out of my mouth. “Hiya,” Jenna said. “Mind if I come in a minute?” I gave her a glazed look and didn’t smile or seem glad to see her. “Well—” She walked in and sat down on the sofa. We looked warily at each other but didn’t say a word. “I was wondering why you hadn’t called,” finally. “I tried. You were always out.” “Oh.” There was an awkward silence. “What have you been up to lately?” “Not much, really. Nothing really worth talking about.” Silence again, only longer and more uncomfortable. Jenna got up. “Oh, well. Guess I’ll go now. I was just passing by, you know, and thought I’d drop in and say hello. Good-by.” I nodded. She walked slowly to the door. I got up. “Jenna.” She stopped. I walked over to her and she turned around. I was right in front of her. “Christ, am I glad to see you again,” I said. We put our arms around each other and laughed, and I picked her up and twirled her around. “Not half as glad as I am to see you.” “How about a glass of wine to celebrate?” “Sounds great. I’d love to.” Jenna looked up at me happily, and we kissed long and tenderly. Then I got the wine and we made a comic toast and sat and talked. We caught up on what we’d been doing since we’d last seen each other, and Jenna told me some funny stories about the nursery school kids she’d been working with as a field project for one of her classes. After about the second glass of wine, though, she got worried. “Are you sure Vanessa isn’t going to come home pretty soon?” “I’m as sure of that as I am that you’re gorgeous.” “In other words, you’re not sure.” “When she goes out with those friends, she never gets back before the bars close. And half the time she doesn’t come home at all. We can leave before there’s any chance of her coming back.” “Well—as long as you’re sure. I’m sure you know by now how we feel about each other, and I can imagine the stories she must have told you. I saw her at Dooley’s before I walked over here, otherwise I wouldn’t have had the guts to do it. I’ve walked by your house before but I was afraid to stop because of Vanessa and because I didn’t know how you’d act. Don’t you think it’s getting around the time she might think about coming home if she started early enough?” “No, I don’t. Stop worrying about it, all right?” amused, curious as to what would happen if they did meet. Jenna seemed to forget about Vanessa after that, and we drank more wine and listened to a Lightfoot album. “It took an awful lot of guts for me to come over here the way I did tonight, you know,” she said. “That’s what I thought.” “You can imagine how I felt at first when you played it so cool.” “It was fun to see you humble, even if it was only for a second.” “So it was an act, eh? Just to see poor little Jenna humble?” She put a mock offended look on her face, and I laughed. “No, it wasn’t that way at all. I was too surprised to do any acting. I just didn’t know what to say or how I should act, that’s all.” “Well, that’s better. I was beginning to think you deserved a good punch.” “Oh yeah?” bringing my fists up like a boxer. “Yeah. And if you think the Ali-Frazier fight was tough, just wait till you see this. Not really. The hardest punch I’d give you right now is a Hawaiian punch.” “That I wouldn’t mind.” “I liked you the first time I met you, because I thought you looked so romantic, although I’m not sure now that’s quite the right word. Maybe vagabond romantic would be better. I thought that, but I thought you’d try to hide it if you really were. To me that just made you more interesting. I’ve always thought I could tell a lot about a person just by looking at them. Don’t you think it’s remarkable that I could figure all that out just by looking at you?” “Looks can be deceiving,” like I was mocking the cliché. “I doubt mine were. I think you put up a mask to try to hide your real self, but it’s like the mask is made of glass, and it’s a cinch to see through it, at least for people who look for things like that.” “Is that so.” “Or maybe you don’t realize it yourself,” with a curious smile. “It’s often easier for someone else to see a person as he really is than it is for himself. If they just know where to look.” “I didn’t know you were really Dr. Joyce Brothers.” “You will when you get my bill. But I realize I may be all wrong. Whenever I try to figure someone out I assume their motivations are the same as mine would be if I were in their shoes. But maybe you’re nothing like me. Now I’m romantic.” “Oh, yeah? How are you such a romantic?” “Well, I’ll tell you. It’s partly just because I like to imagine things. I could see a rock by a stream and imagine it’s a castle by a river, and that I’m queen of the castle. I could imagine, say, that the king is ugly and sinister, with warts on his face, and that I had to marry him, even though I loved someone else. I could imagine a masquerade party in the castle, in a huge ballroom with enormous tapestries on the walls, and the room crowded with people in lavish costumes. The dancing would go on and on, and the wines flow like water. I could imagine myself dancing with you, a dashing knight, and in the confusion when everyone unmasked, I could find you, and we could sneak off together. We could take a walk in the moonlight. We could kiss under a willow tree by the river, and while we were kissing, a black horse with a golden saddle could come up, and we could ride off on him to a magic kingdom and live happily ever after. Now isn’t that romantic?” She’d spoken in a theatrical and humorous manner, I mean this woman was born to be on stage, and her story made me think of the stories that Lonnie used to make up. I smiled like I was thinking of something else. “What’s that for?” Jenna said. “Your story made me think of someone I used to go out with.” “Did you meet her at a masquerade party at a castle?” “No, but she used to make up stories a lot. She was always the star.” “Hmm. One of your many, I suppose.” “There haven’t been that many, really. But maybe I’ve had more than were good for me. Or maybe I just get involved with the wrong sort of women.” “I’ll bet you’ve never gone out with as sweet, lovable, and reliable a woman as me before, have you?” “If you’re reliable, I’m Santa Claus.” “I can imagine it. In about fifty years.” “Somehow I can’t imagine you that old.” “That’s because I’m never going to get old.” “Oh yeah? How are you going to arrange that?” “I’m going to meet Peter Pan, and she’s going to take me to Never-Never Land. Want to come with me?” “Nope. Seventy years is long enough for me.” “Even though you’ve met me?” “I refuse to answer that question on the grounds that my answer may tend to incriminate me,” trying to imitate a Mafia man. “Want to find out how long you will live?” “Nope. I like surprises.” “Let me read your palm, anyway, and see what I see.” I held my hand out and she took it in both her hands and looked at it intently. She put a finger on the lines and traced them as she talked. “Your life line’s long, so you’re going to be around a while. You’re going to meet a short, dark-haired woman with black hair and a funny name and fall madly in love with her.” “’I wonder who that could be?” “You’re going to inherit a fortune, and live like a country gentleman, fox hunting and going to teas and junk like that.” “In that case you can shorten my life line. I’d rather be dead than live like that. I can’t imagine anything more boring.” “You’re going to have lots of kids, and establish a dynasty out on your country estate.” “I don’t know how much of that will end up happening. But the first part’s by far the best.” “I sure think so.” We kissed, and lay down on the sofa. “There’s something we still have to get straight,” I said, in a little while. “I can’t understand why you changed so much. You seemed to do everything you could for weeks to try to show me you didn’t give a damn about me, and now, after not seeing me all that time and not answering my phone calls, you drop by and act like you couldn’t wait to see me again. It doesn’t make a whole lot of sense.” “I know it must seem like I was being a real bitch, like I was really playing games with you, but I was actually being more of a coward than a bitch. Sometimes I was even home when you called but didn’t come to the phone because I just didn’t know what to say to you. But I never forgot you and never felt that I didn’t want to see you again. Once I even saw you on campus and followed you almost all the way back to your house. But I finally decided I shouldn’t talk to you. The timing wasn’t right. There was another guy, and I was really confused about what to do, so I just tried to block it all out of my mind. I wouldn’t have blamed you at all if you’d just run me right out tonight. You would have had every right, but I’m so glad you didn’t,” holding me closer and kissing me. “If you can overlook that, I’d like us to try going together. I’ll try to make sure you’ll never regret it.” I replied by looking amused. “What’s so funny?” “I’m just trying to take this all in. This is so much different than the Jenna I’d come to know and love.” “Well, I didn’t want to make it too easy for you.” “There wasn’t too much danger of that happening. When I ran into you that night, I thought you were probably more interested in that guy with a beard. I thought it was all over for me.” “No,” laughing. “He was no fun. He only had one thing on his mind. And he certainly doesn’t have your eyes. Your eyes are your fortune, you know.” “So I’ve been told. But—” The front door opened. There were women’s voices and laughter. The overhead light went on just as Jenna and I were sitting up, and Vanessa was standing there with two of her drinking buddies. “Well, well, look what we’ve stumbled on. How cozy,” she said. She was jealous and mad, obviously. So much for no strings. “You never know what you’ll run into when you come home at this hour, living with Romeo here.” She and her friends laughed. “But slightly better than a rapist or a deranged murderer, I guess,” but pursing her lips like she wasn’t sure. Vanessa and her friends came in and sat down. One of them had in her hand a half empty bottle of cold duck. I whispered to Jenna that we should leave. “Has John told you about me, Jenna?” Vanessa said as we were getting up. “No, he probably didn’t want to bore me,” with a hateful stare. “Didn’t he tell you we’re lovers?” laughing, lighting a cigarette. “He’s not bad. I’m sure you’ll like him, even with all your experience.” “Go to hell.” Jenna gave me a hard, angry look and then got up and left the house. “You goddamn bitch,” I said to Vanessa. “You’re the biggest hypocrite I’ve ever met.” But she and her friends just laughed. I went out the door and ran up to Jenna. “I’m sorry, Jen. She was too drunk to know what the hell she was saying. But I don’t give a damn about her, and for two cents I’d never talk to her again.” Finally, I stopped her and turned her around. I held her shoulders so that we were face to face. “Don’t,” she said. “Let me go. You lied to me. I just want to go home.” “All right,” letting go of her. “But I’m disappointed. I didn’t think that you, of all people, could be intimidated so easily.” “I wasn’t intimidated. I just don’t like being lied to.” She started to walk away. “That’s probably the earliest she’s ever come home when she’s gone out with them. How in the hell could I have known?” She was quite a ways away now. “Thanks for dropping by,” I yelled. “I enjoyed it,” with a note of sarcasm. I was as mad at Vanessa as I’d ever been at anyone. I felt like going back and strangling her. But when I went back to the house, she and her friends were already gone. I suppose they were afraid of what would happen if I came back and just took right off again. And when I saw that no one was on the first floor and that the house was silent, somehow my anger drained out of me. So I got out a bottle of wine, rolled a joint and lit it, and put on a Pink Floyd album. As hard as I could, I tried to keep any thoughts about Vanessa and Jenna out of my head, but of course that didn’t work. I ended up going over and over the events of the night, and wondering about Jenna. Though she was offbeat, it hardly seemed possible to me, now that I’d spent a little more time with her, that she could be what Vanessa had made her out to be. I must have finally drifted into a stupor, because I fell asleep on the sofa and didn’t wake up until the sun was up. I looked around the room and it seemed to spin. I had a stabbing headache. My mouth was dry. Rubbing my eyes, I looked down at the coffee table in front of me, strewn with magazines and album covers. When Vanessa came downstairs about two o’clock that afternoon, her face was pale and haggard and her eyes were puffy. The look of contrition and humility she wore might have fooled me once, but it didn’t now. The meeker she was, the easier it was for me to see the phoniness that was always just behind it. I was sitting in the living room reading Steppenwolf. “John.” I waited a few seconds and finally looked up. “I just wanted to say that I’m sorry about last night. I know that’s not good enough,” she added quickly, “but I wanted to say it anyway. I was drunk and didn’t know what I was doing.” “You knew what you were doing.” I went back to my book. “OK, maybe I was jealous when I saw you with Jenna. Or maybe I just didn’t want to see her make a fool out of you.” “She doesn’t have to. You’re doing a pretty good job of that yourself.” “If she’s really what you want, I’m sure I didn’t do any real harm. Tell her I’m a liar if you want to.” “She already knows that.” “I promise it won’t happen again.” I put the book on the coffee table. I could still hear a trace of phoniness in her voice. There didn’t seem to be anything she could do to hide it completely. I suppose she still thought it would be easy to manipulate me. “The next time you get drunk you’ll forget that promise just like you’ll forget everything else.” “I didn’t really say what I said to Jenna because I was drunk.” “Then what in the hell did you use that as an excuse for?” almost shouting. “I don’t know. I just hate her so much. If it had been anyone else, I wouldn’t have minded. I just wish there were some way I could make it up to you.” “Well, there isn’t. I’m moving pretty soon, though, so the problem shouldn’t come up again. I should have stuck with what I said about not getting involved with any of the women at the house. But I didn’t, and now I have to move because of it.” “Don’t move, John. Please. What happened last night won’t happen again. If it does you can take all my paintings and drawings and put them in a big pile and burn them.” I looked at her skeptically. “It’ll be a cold day in hell—” “Go ahead and move then, you son of a bitch. I don’t give a damn.” I was enjoying seeing her upset, and now it seemed real. “If you won’t forgive me for anything, I don’t want you around anyway. The hell with you.” And she ran back upstairs. In Dr. Blume’s History of Skepticism class, about three in the afternoon, I was half daydreaming, half listening to the discussion of Hume’s The Skeptic, hoping Dr. Blume wouldn’t call on me to give my opinion on one of the points of the discussion—I hadn’t read the book. He had seemed strange from the first day of class. He’d walked in and sat on top of his desk Indian style and read a long passage from Fichte’s The Vocation of Man. He had small, intense eyes, a swarthy complexion, and curly black hair that was thinning. He wore tweed sport jackets, white shirts, always, thin dark ties, and thick black glasses. Depending on what was called for in an argument his face artfully expressed sarcasm, satisfaction, or puzzlement. He liked to walk back and forth across the room, stopping and bringing his hand to his chin when he pretended to be puzzled, to prod some student to come up with the answer to a difficult question. He called philosophers by their first names, like they were all his friends, and that seemed pretty comical sometimes. Still, he was the most brilliant prof I ever had, and he was totally unpretentious. He liked to quote from literature, and knew more about it than most English profs. He could elucidate Einstein’s theory of relativity if that was needed to clarify a point, or refer to a comic strip from yesterday’s paper. “What then, is the point of it all?” he said, almost as if he were threatening us, opening a book of Hume essays to read from it. “David tells us that, ‘in a word, human life is more governed by fortune than by reason; is to be regarded more as a dull pastime than a serious occupation, and is more influenced by a particular humor, than by general principles. Shall we engage ourselves in it with passion and anxiety? It is not worthy of so much concern. Shall we be indifferent about what happens? We lose all the pleasure of the game by our phlegm and carelessness. While we are reasoning concerning life, life is gone; and death awaits alike the fool and the philosopher.’ Now surely, there’s something fallacious here; surely, there’s more to our existence than the shards and tatters David offers us,” with heavy irony, scanning the room for a response. The woman who most often sparred with Dr. Blume raised her hand. “Yes, Miss Anderson?” “Couldn’t you just respond to that by saying that such a belief is itself just a product of a certain humor, and just as likely to give way to another belief as any other? And that therefore it can’t be taken seriously either or accepted as the ultimate reality of our lives?” “Yes, but in doing so wouldn’t we just be further confirming Hume’s premise that all belief is a product of particular humors or constitutions, and that there is no objective truth?” “Perhaps, but even Hume admits that nature has an artifice which makes us believe that our existence is meaningful, so that sort of reasoning, ultimately, is of little consequence to us, of no more value, say, than a philosophy degree in the job market.” Most of the class laughed and Dr. Blume smiled. “It’s like those arguments about the ultimate reality of a chair. No matter what you believe about them, when you’re tired you’re still going to sit on one.” I must have gone off daydreaming and lost the train of the discussion, because before I knew it Dr. Blume was in the middle of one of his Hume stories. “David was quite well off as tutor to the Marquis of Annandale and secretary to the Earl of Hertford,” he said. “Indeed, he became so complacent that when asked why he wouldn’t complete his remarkable history of England, he replied, ‘too old, too fat, too lazy.’” That was the kind of story Dr. Blume relished, and you could see the pleasure he took in relating it. But he quickly knitted up his brow, and proceeded to move the discussion along. “But how is Hume different than the others we’ve studied, Plato in the Theaetetus, and Sextus Empiricus? Hasn’t he really just restated tired arguments that had been expounded for more than two thousand years?” A guy raised his hand and was called upon. “There’s a difference in emphasis, at least. Hume is more concerned with the individual, and would never have called for a withdrawal from the affairs of men and the world in the manner of Sextus Empiricus.” And so the discussion went on, bouncing from one plane of discussion to the next, until the class ended. The quote Dr. Blume had read from Hume, though, about the uncertainty and pointlessness of life, had really hit me. It just seemed so sad and so true that I couldn’t get it off my mind, even though it was something that I’d heard in one form or another many times before, was something that everyone suspects at least some of the time, and that’s always lurking at the edge of consciousness, ready to mock us and spoil everything. I was still thinking of it after class when Jim Fraser and I walked to the Olde Worlde Bread & Ale. It was windy, the sky was gray, and the trees were almost bare. In the air you could feel snow was coming. Almost everyone had on winter coats, except for those few people who seem almost oblivious to the weather and always wait a few extra weeks to start dressing for a new season, who wear windbreakers at the beginning of December, and parkas in April. “That Blume is amazing,” I said as we walked. “I didn’t think it was possible for anyone to know that much.” “He’s a strange son of a bitch,” Jim said. “He’s living in an imaginary world with all those dead geniuses. He’d have it made if he could sit around a fire and talk with Schopenhauer and Hume and Dr. Johnson. I don’t know what’s going to happen to him when the revolution comes. There won’t be any place for him.” “But how do you know what the ultimate reality is?” smiling. “Is it the world of ideas or the world as perceived through the senses? How do you know that I’m real or that tree over there?” pointing to a large oak. “If we can’t determine what the ultimate reality is, the idea of revolution is meaningless. If there is no knowable reality, maybe we should take the advice of Sextus Empiricus and seek a state of quietude, putting ourselves above the passions and tumult of the world.” I wanted to see how stirred up I could get Jim. “That may be interesting to talk about in class, but you can’t live your life thinking like that. You make me think of those professors who say they don’t believe in an objective reality, then go out and march against the war. All that talking won’t help the millions of poor people in the world who are starving. Philosophical speculation is practically immoral when you come right down to it, because it can lessen people’s commitment to doing something about the mess we’re in.” “But how do you know millions of people are starving? You’d never convince Sextus Empiricus of that. It could be that your perception is based on a false epistemology. They could all be living in the lap of luxury, or not exist at all.” I could see Jim was starting to steam, so I decided to lay off. “I was just kidding, man,” I said, laughing. “You know I don’t take any of that stuff seriously.” It felt good to walk into the Olde Worlde and feel the warm air and hear people talking and the smell of warm hoagies. We brought a carafe of rosé and sat down at a booth. We didn’t talk much at first, just drank the wine. Jim seemed more down than usual, and I wondered if it didn’t have something to do with the fact that Nixon had just been reelected in a landslide. I thought he took politics and world problems much too seriously. He had intense brown eyes that showed he was thoughtful but rarely showed laughter or warmth. He had long, scruffy brown hair and a scruffy beard that he thought showed his contempt for the conventions of American society. He wasn’t involved much with radical organizations, though. He wasn’t a joiner. And he wasn’t serious all the time. When he’d get drunk or high he’d loosen up and start joking around. He really wasn’t a bad looking guy, and probably could have done pretty well with women if he’d wanted to, but he hardly seemed to give a damn. I’d met him in the philosophy class. “You still bummed out about the election?” I said. “I don’t even like to think about it, man. It’s too depressing. Four more years of Nixon!” “I don’t suppose McGovern will run again.” “He wasn’t really any good, anyway. All he wanted to do was bandage up a dying system, when what we really need is a complete overhaul. Maybe it was better that he lost,” unconvincingly. “Now maybe the country will boil over faster and revolution will come sooner.” “I think you’re dreaming. I think the country’s going the other way. Just look around you. Everybody’s getting more conservative. You’re fighting a lost cause.” “You’re probably right. We’re probably headed for a fascist state.” To Jim, the political future was conceivable only in terms of extremes, Marxism or fascism. The idea that the country might muddle through with the half-baked system it had always had hardly seemed conceivable to him. “Or maybe just more of the same old shit. Maybe we’ll have another Red Scare.” “It wouldn’t surprise me one bit. That’s the favorite Republican trick when they want to distract people from the real problems of the country. And Fürhrer Nixon is an expert at it.” “I can see it now: You up on the stand before the House Un-American Activities Committee, being questioned by some fiery young Nazi from Utah or Alabama. ‘Isn’t it true, Mr. Fraser, that you ate breakfast with a communist in 1954?’” “Shit, I was only three years old.” “‘Just answer the question, Mr. Fraser, and refrain from the use of obscenities. Did you or did you not eat breakfast in 1954 with one Mr. Elmer Fudd, a card-carrying communist and fellow traveler?’” “I’d spit in his face.” “‘And isn’t it true you were eating communist baby food at that breakfast, baby food manufactured in that card-carrying, communist front state of Massachusetts, which of course you know is just a part of Russia that was snuck over here by Alger Hiss’s great-great-great-great grandfather when he came over on the Mayflower, that he secretly towed behind the ship?”’ Jim looked amused, reluctantly. “‘And isn’t it true that in 1955 you attended a meeting of the Little Friends of China—that giant yellow menace of the East—whose goal was to encourage pen pals between Chinese and American children. Which would have encouraged atheistic communism with its ugly tentacles to sweep through the United States and thereby crush God, motherhood, the flag, and apple pie? Which would have caused people to throw the Bible out the window and run naked through the streets like they do in China?”’ “You ought to run for Congress, man. Just talk like that, and you’ll win by a landslide.” “Sure. Can’t you just see me as part of the Nixon team?” “Well, you do almost seem like you’re happy he won sometimes.” “I didn’t want him to win, but I don’t really care anymore. Right now, all I really care about is Jenna McAllister, the most beautiful woman this side of the Red Cedar,” as if I’d forgotten what had happened the last time I’d seen her. “You’ve been brainwashed by the media to believe in a bunch of romantic crap that acts as a bourgeois smokescreen to keep people from seeing the injustices and class divisions in our society,” only half seriously. “And loving every minute of it.” “You’ve fallen right into the trap.” “You may be right about that.” “But hell, let’s drop this heavy philosophical discussion. I never should have let you drag me into it,” smiling. “What do you say we just drop the whole thing?” After a couple of more carafes of wine, I decided to go see Jenna. Jim said he wanted to come with me so he could meet this “vision of bourgeois loveliness” as he called her, and I said OK, as long as he didn’t hang around too long. Naturally, he made a couple of sarcastic remarks about romanticism when I told him I wanted to stop at Barnes Floral to pick up some flowers for Jenna. The flower shop was a real trip. Jim whistled “Light My Fire” while I looked in the coolers at the flowers, opening and closing the sliding doors again and again. The scent made me think of funerals. I suspected the old man minding the store thought we were drunk or high. He looked at us disgustedly and asked a couple of stupid questions to see if we had any real intention of buying anything. I finally decided to get an assortment of daisies, roses, and carnations, which really cost more than I should have spent. But when I paid, the old man just grunted, like he wasn’t even happy to get the money. I felt like shoving the flowers in his face. I thought it was really strange for a guy like that to be working in a flower shop. “Now I’ll be able to see romantic love in its highest level of bourgeois development,” Jim said as we walked to Jenna’s. “The young Romeo laying flowers at the feet of his Juliet.” “You’re just jealous. I’ll bet when we get over there, you’ll end up falling in love yourself with Jenna’s roommate Angela.” “Oh yeah? What’s she like? A fellow struggler against the forces of oppression and injustice?” “No. She’s a Jesus freak, but really nice and friendly. Her father is a vice president of Dow Chemical.” Jim abruptly stopped. “You’re putting me on, man.” “No, it’s true. He’s vice president in charge of napalm sales and development.” Jim laughed. “Now I know you’re putting me on.” “That napalm part was a lie. But he really is a vice president at Dow.” “Maybe I’d better not go with you then. I’m afraid of what I might say about him. It could end up being a real bad scene.” “You won’t say anything wrong. Just get it out of your system before we get there.” “Ho-ho, Ho Chi Minh, the Viet Cong are gonna win,” he yelled, along with a few obscenities about Nixon, the War, and General Motors, as we started walking again. It was getting dark, and snow was falling softly. I didn’t really have any idea how Jenna would feel about seeing me, but I thought it was about time I talked to her again, and I had all the confidence wine can give. My doubts disappeared the moment I saw her. She was obviously glad to see me and hardly even seemed surprised. With curious amusement she looked at me, as if to say, Well, I wondered how long it was going to be until you came to see me. “It’s about time,” she said. “Flowers for a flower,” I said, with a flourish, handing her the white box the flowers were in. She took them out and sniffed them. Angela came into the room and went over by Jenna to look at the flowers. “Thanks, John. They’re lovely, and I’ll do my very best to keep them in top form, starting out by putting them in my very best vase. Angela, my very best vase, please.” I introduced Jim to Jenna, and Jenna introduced Jim and me to Angela. She had blonde hair and big, green eyes that shined when she smiled. She looked happy and innocent but shy. It was unthinkable now that Jim would go into a tirade against Dow Chemical. Even Hitler would have had a hard time getting mad at a woman like her. Jim had clammed up as soon as we’d got to Jenna’s anyway. We all sat down and there was a little awkwardness at first. “I hope we’re not interrupting any serious studying,” I said. “Oh, no!” Jenna said. “Our studying is never serious, is it, Ange?” “No,” laughing. “Jim and I just came from our History of Skepticism class. The prof is a real character. He calls all the philosophers by their first names, like they all live on the same block.” “Oh really?” Jenna said. “Do they ordinarily serve booze during philosophy class? You two smell like you just got back from The Brewery,” which was a local nightclub. “No. Only on the birthdays of famous philosophers. Today just happens to be the birthday of Sextus Empiricus, by the way.” “Well, la de da. Bring out the brass bands and circus clowns.” “Actually, Jim and I did stop and have a spot of wine to unwind after class. It’s the thinking man’s drink.” “You look unwound, all right. You look like a ball of string that’s come all undone. Just kidding, of course.” “We just continued the lofty discussion we were having in class,” Jim said. “I’ll bet I know the topic,” Jenna said. “Wine, women, and song.” Jim and I looked at each other, as if to say, she must be reading our minds. “Jim’s a radical,” I said. “He thinks there’s going to be a revolution pretty soon, and he hates big corporations.” Angela frowned just slightly and looked embarrassed. Jim looked over at me like he’d have liked to break me in two. But I was enjoying putting him on the spot. The wine had brought out a perverse sense of humor in me. “I don’t hate them, man. How can you hate something that only exists on paper? And besides, I don’t hate anything. I believe in love and brotherhood among all men. And that goes for women, too.” I had to admire the way he handled that. “Wasn’t it a lovely day out today?” Angela said, yanking us to a new subject. “There’s something about the first snow that’s nicer than the snow the whole rest of the winter.” “I couldn’t get into it too much myself,” I said. “It reminds me too much of what it’s going to be like around here until April.” “It can be very beautiful, though.” Angela seemed so nice, I didn’t know what I wanted to do more: Hug her or punch her. In a little while, Jim left and Angela went to her bedroom. Jenna was silent. We sat on opposite sides of the room. She looked down, then right at me. “Are you still mad about that scene over at my place?” I said. “Mmm. Maybe this much,” holding her hand out and making a tiny space between her thumb and forefinger. The wine was wearing off and I felt a little uneasy. Jenna got up and sniffed the flowers I’d given her, then came to me and sat on my lap. “But not so much that I don’t think it’s just great that I’m with you again. And thank you again for the lovely flowers.” We kissed, a long soul kiss. “I wish you hadn’t waited so long to come see me. But I suppose I could have called you or somehow met you half way. Hopefully, we won’t have any more misunderstandings like that,” smiling. “Fat chance. But then I guess that’s what makes relationships interesting.” “If you like soap operas.” “I’d offer you something to drink, but I imagine you’ve had enough to drink today.” “I’ll have a glass of wine, if you have any on hand.” “Coffee did you say?” “Yeah. Irish coffee.” “All right, all right. I’ll get you a glass of wine, since you insist. And one for me, too.” After a couple of glasses of wine, we lay down on the sofa. Except for a dim light in one corner, the room was dark. We kissed for quite a while. Then we stopped kissing and Jenna looked at me thoughtfully. I moved her hair off her forehead with my hand where it had almost fallen down to her eyes. “A penny for your thoughts,” I said. “Haven’t you heard of inflation? The correct term now is dollar for your thoughts.” “All right then. Dollar for your thoughts. Put it on my bill.” “How’s things going between you and Vanessa?” “I hardly see her and we hardly talk.” “You know that I can’t come to see you as long as you’re living with her, don’t you?” “I thought about moving. But I’ve got a lease there. It would cost me a lot of money I don’t have.” “It would make things a lot better between us if you did.” “I’ll move out of there as soon as I can.” We got to kissing again, and I started unbuttoning Jenna’s shirt. But she stopped me. “You’d better not, John. Angie might come out.” “I almost forgot,” with my best imitation of an Errol Flynn smile. We were silent a few moments. “I’m trying to decide how much I trust you. I’m still not sure about us. There’s so much about you that I don’t know, and that you don’t know about me.” “I’d like to spend about five years finding out.” “Do you want to stay with me tonight, John?” “All right, but it’s only fair to warn you, I’ve really been known to hog the covers.” “Well, if I have anything to say about it, we’ll be so close it won’t make a bit of difference.” That’s how easy it was for us to get things right between us. We went into Jenna’s bedroom, sat on the bed and kissed, and teased each other as we undressed. Then we were naked, and a thrill went all through me as we got under the covers and came close together. When we made love, Jenna whispered to me that she loved me, and I whispered to her that I loved her. And even though I wasn’t sure exactly what that meant or whether I was capable of really loving anybody, it felt good to say it, to believe that I really did love her. Later, we lay facing each other and talked. “You look great in the dark,” Jenna said. “Just like Robert Redford.” Actually, there was enough light from a streetlight coming through the window so that would see each other OK. “So do you. Just like Marilyn Monroe.” “Hey, she’s dead.” “I think I just beat you at your own game.” “All right, smart guy,” laughing. She brought her fist up under my chin, then opened the hand with the fist and caressed my side with it. “There’s no telling where we’ll end up, you know. We could end up hating each other or loving each other forever or almost anything in between. Or, worst of all, just bored with each other.” “It would spoil the fun if we knew, though, wouldn’t it?” “I suppose. I just hope everything works out well, and we’re happy together. In fact, I’m going to propose a toast on it.” She held her hand up like she had a glass in it. “To us, the craziest two people I know, may the future be bright.” I pretended I was holding a glass, and as we brought our pretend glasses together, Jenna made a clink sound. “Cheers,” I said. In the morning we slept late and lay in bed talking. “There’s something I’ve got to ask you about,” I said, after we’d been talking a long time. “I don’t really believe it, or at least I don’t believe the slant it was told to me from was fair, but I can’t pretend that I don’t know.” “Oh really,” seeming curious but not like she imagined what it was I was about to tell her. I told her what Vanessa had told me about her father and about her being in a mental hospital and the rest of it. She listened with less emotion than I expected. “I’m not surprised she told you that,” Jenna said. “But it’s all lies. That’s all she’s known how to do since the day she could talk. First of all, I never took any boyfriend away from her. The guy practically threw himself at me, and I couldn’t drop him because I never went with him in the first place. He really wasn’t that great. Vanessa and I haven’t been friends since then, even though there was nothing I could do about her losing him. Also, my father never raped me. That’s just a figment of her filthy imagination. I know that rumor’s been around town in Elkton before, though, and Vanessa may even have been the one who started it. I’ve never been in a mental hospital, either. The place I was in that I assume she’s talking about was more like a rest home for kids. I went in there when my parents busted up, because for a while my mom couldn’t quite handle anything. All the kids went somewhere for a while, and that’s where I went. But there was nothing really wrong with me. As for her saying I try to hide the fact that my stepdad isn’t my real dad, how could that possibly be true in a town as small Elkton, where everybody knows everybody? Do you think anyone would be stupid enough to even try a thing like that and think they could get away with it?” Her argument was, indeed, hard to dispute. “Sorry for dredging up those bad memories. Maybe I shouldn’t even have mentioned it. I just thought it wouldn’t be fair if I didn’t tell you.” “I’m not mad at you. I’m glad you told me so I could expose Vanessa’s lies and not have you think I’m a complete bitch. I’m surprised you even wanted to speak to me again. It just makes me hate her more, because she’s been so cruel to me for nothing.” I believed her now, not Vanessa, so I didn’t pursue the subject any further. I figured I’d done enough prying for one day anyway. And besides, I didn’t want to ruin our first night sleeping together. Jenna looked into my eyes as if to reassure me, then pulled me close to her. Other Collections About Us: Inkitt is the world’s first reader-powered book publisher, offering an online community for talented authors and book lovers. Write captivating stories, read enchanting novels, and we’ll publish the books you love the most based on crowd wisdom.
package Paws::Personalize::CreateDatasetImportJob; use Moose; has DatasetArn => (is => 'ro', isa => 'Str', traits => ['NameInRequest'], request_name => 'datasetArn' , required => 1); has DataSource => (is => 'ro', isa => 'Paws::Personalize::DataSource', traits => ['NameInRequest'], request_name => 'dataSource' , required => 1); has JobName => (is => 'ro', isa => 'Str', traits => ['NameInRequest'], request_name => 'jobName' , required => 1); has RoleArn => (is => 'ro', isa => 'Str', traits => ['NameInRequest'], request_name => 'roleArn' , required => 1); use MooseX::ClassAttribute; class_has _api_call => (isa => 'Str', is => 'ro', default => 'CreateDatasetImportJob'); class_has _returns => (isa => 'Str', is => 'ro', default => 'Paws::Personalize::CreateDatasetImportJobResponse'); class_has _result_key => (isa => 'Str', is => 'ro'); 1; ### main pod documentation begin ### =head1 NAME Paws::Personalize::CreateDatasetImportJob - Arguments for method CreateDatasetImportJob on L<Paws::Personalize> =head1 DESCRIPTION This class represents the parameters used for calling the method CreateDatasetImportJob on the L<Amazon Personalize|Paws::Personalize> service. Use the attributes of this class as arguments to method CreateDatasetImportJob. You shouldn't make instances of this class. Each attribute should be used as a named argument in the call to CreateDatasetImportJob. =head1 SYNOPSIS my $personalize = Paws->service('Personalize'); my $CreateDatasetImportJobResponse = $personalize->CreateDatasetImportJob( DataSource => { DataLocation => 'MyS3Location', # max: 256; OPTIONAL }, DatasetArn => 'MyArn', JobName => 'MyName', RoleArn => 'MyRoleArn', ); # Results: my $DatasetImportJobArn = $CreateDatasetImportJobResponse->DatasetImportJobArn; # Returns a L<Paws::Personalize::CreateDatasetImportJobResponse> object. Values for attributes that are native types (Int, String, Float, etc) can passed as-is (scalar values). Values for complex Types (objects) can be passed as a HashRef. The keys and values of the hashref will be used to instance the underlying object. For the AWS API documentation, see L<https://docs.aws.amazon.com/goto/WebAPI/personalize/CreateDatasetImportJob> =head1 ATTRIBUTES =head2 B<REQUIRED> DatasetArn => Str The ARN of the dataset that receives the imported data. =head2 B<REQUIRED> DataSource => L<Paws::Personalize::DataSource> The Amazon S3 bucket that contains the training data to import. =head2 B<REQUIRED> JobName => Str The name for the dataset import job. =head2 B<REQUIRED> RoleArn => Str The ARN of the IAM role that has permissions to read from the Amazon S3 data source. =head1 SEE ALSO This class forms part of L<Paws>, documenting arguments for method CreateDatasetImportJob in L<Paws::Personalize> =head1 BUGS and CONTRIBUTIONS The source code is located here: L<https://github.com/pplu/aws-sdk-perl> Please report bugs to: L<https://github.com/pplu/aws-sdk-perl/issues> =cut
Herpes simplex virus: a tool for neuroscientists. Herpes viruses have received a great deal of attention due to their widespread and ubiquitous prevalence in the human population and to the diverse range of diseases caused as a result of an infection. During the last 20-25 years, many research laboratories have investigated the pathogenesis and molecular biology of these viruses; particularly herpes simplex virus (HSV). As a result of this research, HSV has begun to get the attention of neuroscientists. In fact, in the last few years there has been an explosion of research involving the use of HSV and related viruses as tools or model systems for different areas of neuroscience research. This brief review will describe several of these areas including demyelinating diseases, neuronal tracings, and genetic therapy.
To learn more about zebras' mysterious stripes, researchers decided to put black- and white-striped capes over horses. And, aside from feeling more fashionable, the horses attracted less flies, according to researchers from the University of Bristol in the U.K. and University of California Davis. In a study published Wednesday in the peer-reviewed journal PLOS ONE, researchers at a farm in Great Britain detail how flies land on captive zebras and horses dressed in black, white and also black-and-white stripes. Three zebras and nine horses were observed for a total of about 16 hours. Flies appeared just as attracted to naked horses as they were to zebras or horses wearing costumes, but Tim Caro of the University of California notes that flies hardly ever landed on stripes. So, horses wearing black-and-white striped coats appeared to have a sort of insect repellent compared to the animals wearing a solid color. "Stripes may dazzle flies in some way once they are close enough to see them with their low-resolution eyes," Royal Society University Research Fellow Martin How said in a statement. Researchers note this effect was only observed in European flies and flies might not behave the same in Africa. Caro told USA TODAY the next phase of this research will include experimenting with different varieties of stripes and color combinations to try and determine how the stripes "confuse" flies. Follow Ashley May on Twitter: @AshleyMayTweets
There is a typo on the document under the zone 3 section. The colors should beREDYELLOWGREEN respectively, not red green blue. RED indicated that cuts were okay. YELLOW indicated cuts might be considered. GREEN indicated cuts would not be acceptable. All of the public service employees of Ormond Beach strive to provide the citizens with the best service possible. It is not easy with the staffing changes and cuts that have already been made. We all appreciate your support. EVERYTHING BELOW THIS POINT WAS THE ORIGINAL POSTING REGARDING THE CUTS IN SERVICE SUFFERED AS A RESULT OF REMOVAL OF LADDER 93 FROM SERVICE IN DECEMBER OF 2008... On December 12th 2008 Ormond Beach Fire Administration sent out notification that Ladder 93 was to be taken out of service immediately. The decision came without any input from Ormond Beach citizens or firefighters. Ladder 93 was one of five front line emergency response vehicles. Removing it from service equates to a 20% reduction in FIRE/EMS (Emergency Medical Services) responding units. It was an ALS (Advanced Life Support) capable unit, meaning it was equipped and licensed to provide the same level of medical care that an ambulance service, or any other EMS service provider can give. It was dispatched to over eight hundred calls in 2008, more than two hundred of which were EMS calls where it was the primary response vehicle. These numbers cannot be ignored. Taking this unit out of service will continue to have a negative impact on the level of service provided by the Ormond Beach Fire Department. The resultant reduction of services will not be recognized by you, the citizens of Ormond Beach, until you need emergency services (911). Wouldn't you expect to be informed of something as important as a decrease in the level of emergency services being provided to you and paid for with your tax dollars? No one thinks about emergency services until they need care themselves, and no one ever thinks they are going to need that care (it won't happen to me), yet every day someone does. When they do, they expect immediate response and the best care available. If this is what you expect then you have to ensure that your fire departments level of service is maintained.If you ignore your emergency services they will go away. Don't allow diminished services to delay the care you need in your time of emergency. What can I do to help restore the level of service provided prior to this change? You as a citizen are the voice of the city. The Commissioners are elected by you to serve your interests. You can contact your Commissioners by e-mail or telephone. Links are provided below. The best way to ensure your voice is heard is to attend a Commission Meeting. Any citizen of Ormond can speak for up to three minutes during the "Audience Remarks" session at the beginning of the meetings. All you have to do is arrive early enough to fill out a card (located on a table at the entrance to the chambers) and present it the City Clerk (she sits to the far left of the room) before the start of the meeting. The meetings are held the first and third Tuesday of every month at 7 p.m. in the Commission Chambers at City Hall, 22 S. Beach Street. You do not have to elaborate on any specific items, all you have to do is state that you do not accept the reduction of service resulting from the removal of Ladder 93 from service and would like to see it returned to its former level of service. The Commission needs to hear it from you, or they will continue down the path of diminishing services, and you will pay the price. When you call 911 it may take up to twice as long (and possibly longer) for an emergency vehicle to arrive at your location. This delay happens as a result of the first due unit in your district being obligated to a prior call when your call comes in. It is not uncommon for there to be several calls in one district simultaneously. In that situation the next closest unit responds to your emergency. Should that unit be obligated to a prior call then the next closest unit responds, and so on. Having Ladder 93 available and staffed provided an additional unit that responded to your emergency and enabled the first due unit in another district to remain in its district for coverage. Without the Ladder when two or more calls come simultaneously to one district, the next closest district is stripped of its coverage. So not only does it take longer for an emergency vehicle to arrive at the second call in the first district, it also takes longer for another unit to respond to the call in the second district, because its first due unit is now in the first district responding to the second call in that district. This sounds very confusing, but the point is clear: less units responding means reduced service and increased response times. The negative impacts of having one less response vehicle at a centrally located station are significant. An ISO (Insurance Services Office) audit of Ormond Beach Fire Department was conducted in the August of 2008. According to the information received from Administration, ISO stated they would be increasing Ormond Beach's insurance rating (which in turn increases insurance rates to home and business owners) unless the following changes were made: Station 94 would have to be staffed with four firefighters instead of three, and Ladder 93 would have to be relocated to Station 92. The issues and the original solutions ISO's issue with station 94 is its location. It is more than five road miles from any other Ormond Beach station. As a result, ISO would require a minimum of four people to be assigned there, due to the lengthy response of additional units to fires in that district. The staffing change for Station 94 was originally going to be accomplished by moving the Battalion Commanders (Battalion Commanders are the on-shift supervisors of the department. They respond to major incidents and fires.) from Station 92 to Station 94. The Battalion Commanders would then only have to respond (in the same vehicle they always use) to fire calls along with Rescue Engine 94. This would have been accepted by ISO as an adequate solution to their stated issue. This change would have had a minimal impact to the day to day duties of the Battalion Commanders and seemed to be an easy, inexpensive solution. Some changes would have to be made to the station to accommodate the Battalions for sleeping quarters and office space but there were already plans made to implement this change. ISO's issue with Ladder 93 was merely its location. They require it to be housed at Station 92, so it would be more centrally located. This may actually have resulted in improved response times, as Station 92 is the busiest station in the city, therefore more apt to require the response of Ladder 93 for coverage of simultaneous calls in district 92. The problem with moving Ladder 93 to Station 92 is that it will not fit in the bays. The solution to this problem is simply to move a non-loadbearing wall of the weight room back far enough to accommodate Ladder 93. The cost estimates to complete this task were less than $10,000. Implementing these changes would have an initial cost of less than (probably significantly less than) $20,000. There would have been absolutely no negative impact to service delivery. The unsavory alternative The alternative that was chosen by City Leadership is what is known as the "Quint Concept". This is a highly debated concept that has been accepted by ISO as an alternative to operating a true Ladder Truck. Small departments, such as ours, have historically implemented this concept as a means to reduce staffing and maintain their ISO ratings, with no regard for maintaining service levels. While negative service level impacts may not be high when this concept is utilized in large departments that can afford to run all Quints, it should be noted that these units are usually run in conjunction with rescue units (ambulances). This means that they have more units responding per station (district) than one. Our department can't afford to run multiple units out of every station or run all Quints (Quints cost from $550,000 to $750,000), so it is arguable that this concept is not the best choice for our department. Under the Quint concept at least half of our first response units would have to be Quints. We already have one Quint in service, so we would be required to purchase a second. These two units would count as the equivalent of one ladder truck for ISO rating purposes. For that credit to be applied, both Quints would have to respond to all structure fires regardless of the district the fire is in. This means where we previously responded to structure fires with three engines (considering the Quint we already have as an engine) and one ladder truck, leaving one of our own units available to cover our city, situations could now arise requiring the response of all four of our units (four is all we would have) on the first alarm, leaving no coverage for our city. If the outside agencies that we rely on to cover in these situations are busy, our city will have very extensive waits for emergency response. We should not have to rely so heavily on outside agencies for protection of our city. This years budget includes funds to replace one of our front line fire engines. The budgeted amount set aside for this is $325,000. This amount will buy a state of the art, completely equipped (all hoses, nozzles, tools, fans, etc...), ready-to-run fire engine. What is currently proposed is for that allowance to be put toward the cost of a second Quint. Our department apparatus committee was instructed to obtain quotes for a Quint apparatus. The recommendation of the committee was for a unit that came with no equipment (tools, hose, etc...) at a cost of $591,046. The Ladder would be accepted as a trade-in to the manufacturer of the Quint recommended by the committee at a value of $208,000. This amount added with the previously budgeted $325,000 still leaves a shortfall of $58,046 that the city would have to fund. The Ladder was purchased in 2002 for more than $500,000. That means the department would be taking a loss of approximately $300,000 for a unit that is very much capable of remaining in service for another seven to ten years. Less service at an initial expense to the city of $58,046 (plus the loss of a $500,000 apparatus) or continuing the same level of service already having been provided over the last several years for less than $20,000. What do you consider the better deal? That question can only be answered by City Leadership. Our assumption is that it would provide a means for the city to reduce fire department staffing without a decrease in ISO rating. They finally brought the topic of lay-offs to light at the January 20th Commission Meeting. They also discussed the possibility of a buy-out or a combination of both. They specifically stated that they did not want to replace any positions vacated as a result of any buy-out. A reduction in staffing on top of the reduction in response units would be detrimental to the service provided to the city. We as firefighters see the impacts of changes that have already been made every shift, and fear the impacts of decreased staffing levels. Staffing levels are addressed on the right side of this page. As it applies to our department, Ladder 93 is a 105' aerial Ladder with a permanent piped waterway, equipped with a full compliment of ground Ladders, extrication tools (jaws of life), exhaust and ventilation fans, salvage covers, forcible entry tools, large assortment of hand and power tools for entry and ventilation, cribbing, rope rescue equipment, and EMS equipment. It does not have a pump, but is capable of flowing very large volumes of water when connected to a fire engine. The increase in storage space gained from not having a pump allows the Ladder to carry additional specialty equipment for fighting fire, affecting rescue, and performing stabilization and extrication on motor vehicle accidents. It has a generator and several lighting options for scene lighting. Our current Quint carries some of the same equipment as the Ladder, as do our engines, however it has significantly less storage area. It has a 75' aerial Ladder with a permanent piped waterway and a pump. It is capable of flowing very large volumes of water without the need to be connected to an engine. It also has a generator and a significant amount of scene lighting. The problem with the Quints is how they are required to be equipped by ISO. For ISO to give credit to the department for a Ladder, two Quints must be utilized (in our situation) and each must carry half of the equipment previously carried on the Ladder. One Quint must operate as a Ladder on the fireground, and the other must operate a an engine. This creates confusion in determining what your job duties will be upon arrival to the fire. ISO also recommends four to six personnel be assigned to a Quint. In order to truly understand the impact of this reduction you must understand how Ormond Beach FIRE/EMS services work. Ormond Beach has four fire stations. One in each of four response zones called districts (91, 92, 93, and 94). Each station has one front line response unit and other units that are task specific (brush trucks for wildland firefighting, a tanker for water supply in non-hydranted areas, a marine unit for water rescue, a squad for large incidents that require extended scene times and/or additional equipment, and two back-up engines). Additionally there were two first response units at station 93 (Rescue-Engine 93 and Ladder 93). As stated before, all of Ormond's first response units (fire trucks) are ALS licensed, staffed, and equipped. They are currently staffed with a minimum of three personnel, with the exception of Ladder 93 which carried a minimum staffing of two personnel. Each unit has at least one Paramedic, and all personnel are trained as EMT's. When you dial 911 your call goes to a dispatch center. They in turn dispatch the appropriate FIRE/EMS/POLICE response vehicles. If your emergency is medical in nature the dispatchers will send an Ormond Beach fire truck and an ambulance. Volusia County has a private transport agency (ambulance service) that operates independently of any fire department. Like Ormond fire units, they provide both ALS (Advanced Life Support) and BLS (Basic Life Support) services. They are the only agency in Volusia County that transports patients to hospitals. When a medically related emergency call comes in, the first due fire truck and an ambulance are dispatched. If either of these two units dispatched is delayed this redundancy becomes crucial. The majority of the time our fire trucks arrive before the ambulance. This is a result of the stations being placed to facilitate fast response times. The private ambulance service stages its ambulances in strategic locations across the county. It is unusual for there to be more than two ambulances staged in Ormond at one time. Sometimes there may only be one in service due to others being obligated to prior calls. When the fire department arrives we provide the same level of care that the ambulance service provides until they arrive and care is transferred to them for transport to the hospital. If your emergency is fire related, the appropriate assignment of fire trucks respond depending on whether it is a structure fire, vehicle fire, brush fire, etc... For a residential structure fire, first alarm response previously included Ladder 93 and three of our four engines, leaving one of our engines available for coverage of the city. Under the Quint concept we would either be dispatching all four of our front line engines, relying on outside agencies to cover our city, or having the outside agencies respond on the first alarm. Depending on the location of the fire we do rely on outside agencies for response if their unit is closer than one of ours and is available. This reliance on outside agencies has been increased with the change to the Quint concept, primarily because we have one less unit available for response (a 20% reduction in responding units). There is an agreement between our department, Volusia County, Holly Hill, and other agencies to provide closest unit response. If this sharing of resources becomes one sided (we use them more than they use us) by a margin of more than twenty five calls, we could begin to incur expenses to the tune of $900 per call. Having one less response vehicle in our city is sure to increase our dependency on outside agencies. If your emergency is a motor vehicle accident, a single unit or multiple units may respond depending on the location, severity, number and type of vehicles involved. Sometimes even single vehicle accidents require more than one fire apparatus. Motor vehicle accidents can require specialty equipment that was formerly carried on Ladder 93. Motor vehicle accidents often require coordinated efforts of multiple resources for mitigation of the incident. Your fire department has become the catch-all safety organization for most emergency situations, front line defense and homeland security. We are tasked with responding to hazardous materials incidents, medical emergencies, motor vehicle accidents, bomb threats, assaults, fires, aircraft emergencies, train wrecks, water rescue, rope rescue, confined space rescue, fuel spills, gas leaks, painting and flow testing of hydrants, conducting inspections, and providing public education and safety awareness. Oh yeah, we still have to clean the toilets, mop the floors, take out the trash, vacuum, wash the dishes, do paperwork, complete monthly training, wash the trucks, clean the bay floors, check out the equipment, decontaminate our medical equipment, maintain our supply inventories, wash our uniforms, shine our boots, and smile when people say we are over paid and under utilized. Obviously there are a lot more incident types, and specifics that were not covered here. Hopefully enough information has been given for you to make an informed decision regarding the level of services you would like to receive as a citizen of Ormond Beach. If you have any questions or comments please click the following link to send us an email. info@iaff3499.com City Leaders finally brought the topic of lay-offs to light at the January 20th Commission Meeting. They also discussed the possibility of a buy-out or a combination of both. They specifically stated that they did not want to replace any positions vacated as a result of any buy-out. A reduction in staffing on top of the already imposed reduction in response units would be detrimental to the level of service provided to the city. We as firefighters see the impacts of changes that have already been made every shift, and fear the impacts of decreased staffing levels. Decreased staffing causes delays of fire suppression activities as a result of having to wait for additional units to respond to accumulate enough personnel to safely conduct fireground operations. Extensive data and experience gained over more than one hundred years of fighting fire provides the same information: insufficient staffing levels increases the time it takes to extinguish fire and conduct search and rescue operations, leads to quickly fatigued personnel, increases the risk of injuries, and decreases the efficiency and effectiveness of all emergency operations. There have been surveys conducted by independent organizations, one of which stated that Ormond Beach Fire Department should have four personnel assigned to each of its units including the Ladder for effective and efficient operations. That would be a total of twenty personnel on shift. Four personnel on five apparatus. This mirrors the standard set forth in NFPA (National Fire Protection Association) 1710. This nationally recognized standard states that to conduct safe and effective fireground operations fourteen to seventeen personnel must be on the first alarm assignment for a residential structure fire. Ormond Beach Fire Department currently falls into the low end of this standard by having fourteen personnel on our first alarm assignment. We are already operating at the minimum standard for staffing levels, and now our City Leaders want to reduce our staffing even further. They are discussing eliminating up to six positions. That would be two positions per shift. That would put our first alarm assignment at as low as 12 personnel. In order to meet the NFPA standard one additional unit would have to be added. This unit would have to come from the closest outside agency. As a result of pulling that additional unit out for the fire, now not only would our entire city be stripped of its response units, the next closest unit that would normally cover our city would be on our fire. We would then be relying on the second closest unit to come to cover our city. Who will cover their districts during these times? How long will it take for them to respond? Who will suffer the most? The citizens of Ormond Beach. As you can see the impacts of reduced staffing are huge on fires. It is also significant on motor vehicle accidents, as they often require many resources and personnel to operate effectively. On medical calls our staffing is barely adequate. Our department cannot absorb the increased work loads and stresses brought on by reductions in staff. Below are some links to information that was submitted to the Commissioners of Ormond by former Fire Chief Baker and your firefighters. This information was gathered and submitted as a result of fear of staffing cuts when, in 2007, the Commission requested worst case scenario budget reduction options for each department within the city. Those worst case scenario budget reductions for the fire department included laying off nine firefighters. It should be noted that some municipalities have been held liable for injuries and deaths resulting from fire departments knowingly operating below the nationally recognized standards for staffing on fires. Also note that the Fire Department in 2007 and 2008 accomplished savings to the city of more than $800,000 annually; well more than any other department. Isn't it time the City finds somewhere else to cut its budget that doesn't impact your safety?
// ------------------------------------------------------------------------------ // Copyright (c) Microsoft Corporation. All Rights Reserved. Licensed under the MIT License. See License in the project root for license information. // ------------------------------------------------------------------------------ // **NOTE** This file was generated by a tool and any changes will be overwritten. // <auto-generated/> // Template Source: Templates\CSharp\Model\EntityType.cs.tt namespace Microsoft.Graph { using System; using System.Collections.Generic; using System.IO; using System.Runtime.Serialization; using Newtonsoft.Json; /// <summary> /// The type Device. /// </summary> [JsonObject(MemberSerialization = MemberSerialization.OptIn)] public partial class Device : DirectoryObject { ///<summary> /// The Device constructor ///</summary> public Device() { this.ODataType = "microsoft.graph.device"; } /// <summary> /// Gets or sets account enabled. /// true if the account is enabled; otherwise, false. Required. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "accountEnabled", Required = Newtonsoft.Json.Required.Default)] public bool? AccountEnabled { get; set; } /// <summary> /// Gets or sets alternative security ids. /// For internal use only. Not nullable. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "alternativeSecurityIds", Required = Newtonsoft.Json.Required.Default)] public IEnumerable<AlternativeSecurityId> AlternativeSecurityIds { get; set; } /// <summary> /// Gets or sets approximate last sign in date time. /// The timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. Read-only. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "approximateLastSignInDateTime", Required = Newtonsoft.Json.Required.Default)] public DateTimeOffset? ApproximateLastSignInDateTime { get; set; } /// <summary> /// Gets or sets compliance expiration date time. /// The timestamp when the device is no longer deemed compliant. The timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z'. Read-only. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "complianceExpirationDateTime", Required = Newtonsoft.Json.Required.Default)] public DateTimeOffset? ComplianceExpirationDateTime { get; set; } /// <summary> /// Gets or sets device id. /// Unique identifier set by Azure Device Registration Service at the time of registration. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "deviceId", Required = Newtonsoft.Json.Required.Default)] public string DeviceId { get; set; } /// <summary> /// Gets or sets device metadata. /// For interal use only. Set to null. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "deviceMetadata", Required = Newtonsoft.Json.Required.Default)] public string DeviceMetadata { get; set; } /// <summary> /// Gets or sets device version. /// For interal use only. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "deviceVersion", Required = Newtonsoft.Json.Required.Default)] public Int32? DeviceVersion { get; set; } /// <summary> /// Gets or sets display name. /// The display name for the device. Required. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "displayName", Required = Newtonsoft.Json.Required.Default)] public string DisplayName { get; set; } /// <summary> /// Gets or sets is compliant. /// true if the device complies with Mobile Device Management (MDM) policies; otherwise, false. Read-only. This can only be updated by Intune for any device OS type or by an approved MDM app for Windows OS devices. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "isCompliant", Required = Newtonsoft.Json.Required.Default)] public bool? IsCompliant { get; set; } /// <summary> /// Gets or sets is managed. /// true if the device is managed by a Mobile Device Management (MDM) app; otherwise, false. This can only be updated by Intune for any device OS type or by an approved MDM app for Windows OS devices. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "isManaged", Required = Newtonsoft.Json.Required.Default)] public bool? IsManaged { get; set; } /// <summary> /// Gets or sets mdm app id. /// Application identifier used to register device into MDM. Read-only. Supports $filter. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "mdmAppId", Required = Newtonsoft.Json.Required.Default)] public string MdmAppId { get; set; } /// <summary> /// Gets or sets on premises last sync date time. /// The last time at which the object was synced with the on-premises directory.The Timestamp type represents date and time information using ISO 8601 format and is always in UTC time. For example, midnight UTC on Jan 1, 2014 would look like this: '2014-01-01T00:00:00Z' Read-only. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "onPremisesLastSyncDateTime", Required = Newtonsoft.Json.Required.Default)] public DateTimeOffset? OnPremisesLastSyncDateTime { get; set; } /// <summary> /// Gets or sets on premises sync enabled. /// true if this object is synced from an on-premises directory; false if this object was originally synced from an on-premises directory but is no longer synced; null if this object has never been synced from an on-premises directory (default). Read-only. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "onPremisesSyncEnabled", Required = Newtonsoft.Json.Required.Default)] public bool? OnPremisesSyncEnabled { get; set; } /// <summary> /// Gets or sets operating system. /// The type of operating system on the device. Required. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "operatingSystem", Required = Newtonsoft.Json.Required.Default)] public string OperatingSystem { get; set; } /// <summary> /// Gets or sets operating system version. /// The version of the operating system on the device. Required. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "operatingSystemVersion", Required = Newtonsoft.Json.Required.Default)] public string OperatingSystemVersion { get; set; } /// <summary> /// Gets or sets physical ids. /// For interal use only. Not nullable. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "physicalIds", Required = Newtonsoft.Json.Required.Default)] public IEnumerable<string> PhysicalIds { get; set; } /// <summary> /// Gets or sets profile type. /// The profile type of the device. Possible values:RegisteredDevice (default)SecureVMPrinterSharedIoT /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "profileType", Required = Newtonsoft.Json.Required.Default)] public string ProfileType { get; set; } /// <summary> /// Gets or sets system labels. /// List of labels applied to the device by the system. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "systemLabels", Required = Newtonsoft.Json.Required.Default)] public IEnumerable<string> SystemLabels { get; set; } /// <summary> /// Gets or sets trust type. /// Type of trust for the joined device. Read-only. Possible values: Workplace - indicates bring your own personal devicesAzureAd - Cloud only joined devicesServerAd - on-premises domain joined devices joined to Azure AD. For more details, see Introduction to device management in Azure Active Directory /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "trustType", Required = Newtonsoft.Json.Required.Default)] public string TrustType { get; set; } /// <summary> /// Gets or sets member of. /// Groups that this group is a member of. HTTP Methods: GET (supported for all groups). Read-only. Nullable. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "memberOf", Required = Newtonsoft.Json.Required.Default)] public IDeviceMemberOfCollectionWithReferencesPage MemberOf { get; set; } /// <summary> /// Gets or sets registered owners. /// The user that cloud joined the device or registered their personal device. The registered owner is set at the time of registration. Currently, there can be only one owner. Read-only. Nullable. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "registeredOwners", Required = Newtonsoft.Json.Required.Default)] public IDeviceRegisteredOwnersCollectionWithReferencesPage RegisteredOwners { get; set; } /// <summary> /// Gets or sets registered users. /// Collection of registered users of the device. For cloud joined devices and registered personal devices, registered users are set to the same value as registered owners at the time of registration. Read-only. Nullable. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "registeredUsers", Required = Newtonsoft.Json.Required.Default)] public IDeviceRegisteredUsersCollectionWithReferencesPage RegisteredUsers { get; set; } /// <summary> /// Gets or sets transitive member of. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "transitiveMemberOf", Required = Newtonsoft.Json.Required.Default)] public IDeviceTransitiveMemberOfCollectionWithReferencesPage TransitiveMemberOf { get; set; } /// <summary> /// Gets or sets extensions. /// The collection of open extensions defined for the device. Read-only. Nullable. /// </summary> [JsonProperty(NullValueHandling = NullValueHandling.Ignore, PropertyName = "extensions", Required = Newtonsoft.Json.Required.Default)] public IDeviceExtensionsCollectionPage Extensions { get; set; } } }
et k = 0.31 + 12.69. Let s = k + -12.94. Round s to 2 dps. 0.06 Let w = -36 - -36.065. What is w rounded to 2 decimal places? 0.07 Let h = 0.66 + -0.47. What is h rounded to 1 dp? 0.2 Let w = 23 - 44. Let b = -21.38 - w. Round b to one dp. -0.4 Let o = -11180 + 11293.66. Let h = -115 + o. What is h rounded to one decimal place? -1.3 Let u = -44810503.7 + 44810716.699901. Let q = u + -213. Round q to five decimal places. -0.0001 Let l = -572312 - -572309.60011. Let j = -2.22 + -0.18. Let r = j - l. Round r to 4 decimal places. -0.0001 Suppose -4*c = -30136 + 84536. Round c to the nearest one thousand. -14000 Let v = 2.51 + 17.79. Let q = -20.29903 + v. Round q to four decimal places. 0.001 Let d = 578.046 - 578.1079973. Let h = 0.062 + d. Round h to six dps. 0.000003 Let k = -22526989.01000077 + 22526978.21. Let n = -10.8 - k. Round n to 7 decimal places. 0.0000008 Let a(m) = -5*m - 3. Let z be a(2). Let g be (-561)/z - 4/26. What is g rounded to the nearest 10? 40 Let h be (-3)/4 + 714/24. What is h rounded to the nearest 10? 30 Let i be (18796 + 4)/(1 + -2). Round i to the nearest 1000. -19000 Suppose a - 4*a - 159000 = 0. What is a rounded to the nearest ten thousand? -50000 Suppose -w + 5*l = -178 - 121, -4*w - l + 1112 = 0. Round w to the nearest one hundred. 300 Let h = -0.144 - -0.1523. Round h to 3 dps. 0.008 Let i(y) = 3000001*y + 3. Let d be i(-3). Round d to the nearest one million. -9000000 Let u be 3/1 - (-2 + 5). Suppose 5*c + 2 = 5*m - 18, -15 = -3*m. Let d be 5599999*(u + 1) + c. Round d to the nearest one million. 6000000 Let d = -982 + 982.461. Let t = 0.42 - d. Round t to two dps. -0.04 Let g = 7.3 + -1.3. Let t = 15.5 - g. Round t to 0 decimal places. 10 Let c = -4 - 0. Let j = -4.00001 - c. Round j to four decimal places. 0 Let x = -7.6999929 + 7.7. What is x rounded to 6 dps? 0.000007 Let g = -525.03921 + -1.95679. Let s = -525 - g. Let c = s + -2. Round c to two decimal places. 0 Let t = -79052.909 - -79007. Let f = t + 46. Round f to two dps. 0.09 Let r be (9 - 1)*(-1 + 501). What is r rounded to the nearest 1000? 4000 Let u = 0.06 - 0.36. Let a = u + 0.1. Round a to 0 decimal places. 0 Let s = 0.01 - 0.06. Let u = s - -0.0499995. What is u rounded to 6 decimal places? -0.000001 Let x = 0.207 + 3.433. Round x to 1 dp. 3.6 Let l(y) = -y**2 + y + 2. Let j be l(2). Let o(x) = 99*x - 6. Let k be o(-6). Let z be 80000/(-12)*(j - k). Round z to the nearest one million. -4000000 Let u = 4 - -33. Let h = u + 32. Let i = h + -77.1. What is i rounded to the nearest integer? -8 Suppose 0*l = -2*l + 5*v + 7, 2*v = l - 4. Let y be 15602/l - 1/3. What is y rounded to the nearest one thousand? 3000 Let s = 626 + -671.7. Round s to the nearest integer. -46 Let a = -12.6 + 10. Round a to 0 decimal places. -3 Let m be (35/10 + -3)*136. What is m rounded to the nearest ten? 70 Let p(t) = 390*t**3 - 4*t**2 + 4*t - 22. Let g be p(9). What is g rounded to the nearest one hundred thousand? 300000 Let u be 12/(-28) - (-17010003)/7. Round u to the nearest 100000. 2400000 Let q = -68 + 68.573. Let g = q - 0.5012. Let t = 0.07 - g. What is t rounded to three dps? -0.002 Let m = 38 + -37.985. Round m to 3 decimal places. 0.015 Let l = 1455235 + -1455317.9937. Let z = l - -83. What is z rounded to three decimal places? 0.006 Let g = 13400 - 13399.37173. Let y = 0.63 - g. What is y rounded to 4 decimal places? 0.0017 Let u = 13 + 24.4. Let p = 6.6 + u. Let x = p + -43.9999962. Round x to six dps. 0.000004 Suppose -14*l - 1288 = -10*l. Let n = 1150 - -182. Let s = l + n. Round s to the nearest one hundred. 1000 Let o = 133 + -133.114. Round o to 2 dps. -0.11 Let v = 1.2 + 7.2. Let p = v - -0.6. Let r = p + -9.000035. Round r to 5 decimal places. -0.00004 Let h = -0.417 - -0.264. Let r = 0.15299834 + h. What is r rounded to seven dps? -0.0000017 Let l = -0.0322 - -0.2101. What is l rounded to two decimal places? 0.18 Let s = 276.79 - 278. What is s rounded to one dp? -1.2 Let f = 8309.929936 + -8310. Let s = f - -0.07. What is s rounded to 5 dps? -0.00006 Let z(r) = 1170001*r**3 - 2*r + 1. Let l be z(1). What is l rounded to the nearest one hundred thousand? 1200000 Let y = -3135 + 15135. What is y rounded to the nearest ten thousand? 10000 Let c = -13.724 + 14. Let r = c + -0.2. Let b = -0.07600033 + r. Round b to 7 dps. -0.0000003 Let o = 14 - 23. Let q = 9.0006 + o. Round q to four decimal places. 0.0006 Let l = -0.31741 - -0.319. Round l to 4 decimal places. 0.0016 Let p = -91.99999842 + 92. What is p rounded to 7 decimal places? 0.0000016 Let j = 1.93 + -4.87. Let a = -27.54 - j. Round a to zero dps. -25 Suppose 4*m - 8 = 16. Let n be (-2 - 0) + (m - -71). Round n to the nearest ten. 80 Let d = -1.9 - -2.2. Let u = -0.2999998 + d. What is u rounded to 6 dps? 0 Let b = -0.6 + 0.55. Let u = b - 1.95. Let c = u + 2.00000044. Round c to seven dps. 0.0000004 Let r = -202 + 382. Let n = 189.3 - r. What is n rounded to zero decimal places? 9 Let m = -42819 + -5181. What is m rounded to the nearest 10000? -50000 Let d = -0.0361 + 0.0360789. Round d to five decimal places. -0.00002 Let q = 15.999991 + -16. What is q rounded to five dps? -0.00001 Let l be (-15 + -5)/(3/(-1500)). Round l to the nearest ten thousand. 10000 Let b(f) = -105555*f**2 + 2*f - 8. Let t(p) = -p - 7. Let c be t(-10). Suppose -c*l = 2 + 16. Let a be b(l). What is a rounded to the nearest one million? -4000000 Let m = 0.071 - -0.215. Let k = m + 140.714. Let y = k - 140.99941. What is y rounded to 4 dps? 0.0006 Suppose -1 = 2*h + 5, -4*y + 72 = 4*h. Let f be (-6)/y + 5390002/7. What is f rounded to the nearest 100000? 800000 Let q be (-1772)/(-1)*-16 - 1. Let c = q - -15353. What is c rounded to the nearest 10000? -10000 Let g(l) = 8*l**2 + 5 + 8*l + l**3 - 2 + 4 - 3. Let q be g(-7). Let y be (270 - 0)*(q + 4). What is y rounded to the nearest one hundred? 300 Suppose -22000 = -26*g + 15*g. Round g to the nearest ten thousand. 0 Let z = 1312.7 + -1384. Let j = -0.8 - -76.8. Let w = j + z. What is w rounded to 0 decimal places? 5 Let w = 145.796 + 0.204. Let y = w + -145.17. Round y to 1 decimal place. 0.8 Let f(x) = -9287*x**2 - 3*x + 2. Let y be f(-3). Let z = y - -223572. What is z rounded to the nearest ten thousand? 140000 Let x = -0.961197 - 4.038795. Let n = 18 + -13. Let t = n + x. Round t to 5 decimal places. 0.00001 Let f be (55/3)/((-5)/9000). What is f rounded to the nearest ten thousand? -30000 Let w = 3 - 1. Suppose -w*b - 23600000 = 3*h, -3*b + 35400000 = -6*b + 5*h. Round b to the nearest one million. -12000000 Let c = -228.26 - -215. Let d = c + 7.062. Let f = d + -0.002. Round f to zero decimal places. -6 Let s = -83.94 + 86. Let w = s + -2.05999871. Round w to 7 dps. 0.0000013 Let t = -341067215 - -341064194.09579. Let g = -2988.9042126 - t. Let b = 32 - g. What is b rounded to six dps? 0.000003 Let x(g) = -266796*g + 100. Let k be x(-25). What is k rounded to the nearest one million? 7000000 Let p(y) = 35*y + 11. Let c(m) = 9*m + 3. Let k = -31 + 49. Let g(u) = k*c(u) - 4*p(u). Let z be g(-7). Round z to the nearest 10. -140 Let r = 0.4 + -0.46. Let c = r - -0.059988. What is c rounded to six decimal places? -0.000012 Let g = 58 - 58.39. Let r = 0.389916 + g. What is r rounded to five dps? -0.00008 Let z = -2.2 + 3.6. Let d = 712.35645 - 710.95644957. Let v = z - d. What is v rounded to 7 dps? -0.0000004 Let g(v) be the second derivative of 8000*v**4/3 - v**3/6 + 5*v**2/2 + 2*v. Let j be g(5). Round j to the nearest one hundred thousand. 800000 Let t(w) = 20170*w + 20. Let p be t(-6). What is p rounded to the nearest 10000? -120000 Let x = 94 - 92.36. Let v = 26.9 - 25. Let p = x - v. What is p rounded to 1 dp? -0.3 Let v = -1859011.0289 - -1858875. Let o = -136 - v. What is o rounded to three decimal places? 0.029 Let g = -14 - -13.9986. What is g rounded to 3 decimal places? -0.001 Let t = -7.82 - -7.8199509. Round t to five decimal places. -0.00005 Suppose -5*d = -d. Suppose -3*n + 9 = 3*p, d = -10*p + 5*p - 4*n + 12. Suppose p = -0*u + 4*u - 7080. What is u rounded to the nearest one hundred? 1800 Let j(s) = 283*s**3 - 3*s**2 + 2*s - 5. Let h be j(3). Suppose -5*q = -5*d - 89590, 2*q = d + 2*d + 35839. Let f = h - q. Round f to the nearest 1000. -10000 Let h
Darrell Wallace Jr. makes NASCAR history with victory Nate Ryan | USA TODAY Sports Show Caption Hide Caption Darrell Wallace Jr. on historic win NASCAR Camping World Truck Series driver talks about his victory at Martinsville Speedway. He is fourth black driver to race in one of three NASCAR national touring series At 20%2C he has first win in just 19 starts on Camping World Truck Series circuit MARTINSVILLE, Va. – Becoming the second African-American driver to win a NASCAR national series race was a triumph of patience for Darrell Wallace Jr. He hopes it's also worth the wait for a sport that has spent much of the past decade trying to diversify a traditionally lily-white roster of drivers after claiming only one black winner in its first 65 years. "I want to be a role model and inspiration to the younger kids and just change the sport as a whole and for the better, and winning helps everything," Wallace, 20, said. "I think that'll help kind of pave its own way there and hopefully get my name out there even more. That's what I've been trying to do is to get my name out there to keep pushing (and) striving for kids younger than me to get in the sport." Wallace, a graduate of NASCAR's Drive for Diversity program that was formed in 2004 to help multicultural and female drivers advance from the grass-roots series, led the final 50 laps of Saturday's Kroger 200 Camping World Truck Series race at Martinsville Speedway in becoming the first black winner in one of NASCAR's national series since Wendell Scott's Dec. 1, 1963 win at Jacksonville, Fla. Scott is a native of nearby Danville (about 30 miles east of the track), and a Virginia historical marker was erected on a nearby highway marker in April to honor the career of Scott, who didn't celebrate in victory lane because he wasn't recognized as the winner until the next day. An emotional Wallace, who admitted lifting off the throttle of his No. 54 Tundra with a big lead while entering the race's final turn because he was in tears, said it was special "to do it in Wendell Scott's backyard" after befriending the family of Scott, who died in 1990. "If Wendell Scott was alive I would like to call him, but I can call Wendell Scott Jr.," he said. "(Wendell Scott) was watching over me this race. It all goes to him." The Mobile, Ala., native is in his rookie season driving the No. 54 Toyota for Kyle Busch Motorsports on the truck circuit and is the fourth African-American to drive full time in one of NASCAR's top three national series, joining Scott, Willy T. Ribbs and Bill Lester. After the race, he also took to Twitter to celebrate: "We Came. We Saw. We Conquered," he wrote. "We congratulate Darrell Wallace Jr. on his first national series victory, one that will be remembered as a remarkable moment in our sport's history," NASCAR chairman Brian France said in a release. "Darrell's success, following fellow NASCAR Drive for Diversity graduate Kyle Larson's win earlier this season, is indicative of a youth and multicultural movement that bodes well for NASCAR's future growth." Larson, a Japanese-American graduate of the Drive for Diversity program, won at Rockingham Speedway in April in just his fifth truck start. He led 187 of 205 laps. Wallace's victory, which came in his 19th truck start, also was impressive. He started third, led a race-high 96 laps and held his own against Sprint Cup veterans Denny Hamlin and Kevin Harvick. He wasn't challenged again after taking the lead from Ty Dillon on a lap 151 restart, withstanding three more restarts that put his lead in jeopardy. It was redemption for his last result at Martinsville in April when he started second and led 34 laps but finished fifth after spinning his tires on a final restart. Wallace also singled out races at Charlotte Motor Speedway, Kentucky Speedway and Michigan International Speedway as those he also could have won but "this is my rookie season, and you've got to wreck to learn, and I've learned my lesson. "I had so much confidence coming into this race," he said. "I told everybody that asked if I was going to win, 'Hell yeah' every time. So before, it was, 'No, maybe we're going to try,' this one was, 'For sure,' and we capitalized. This means a lot. "It's indescribable. I'm bawling my eyes out." He teared up again when told during a postrace interview that Sprint Cup veteran Mark Martin had tweeted that Wallace "drove like a hero." Said team owner Kyle Busch, also a championship contender in the Sprint Cup Series: "This is certainly a monumental day and hopefully one that he'll remember for a long time and can cherish. The first one is always the most important one because it seems like they can just come right after that pretty easily. We've seen great things out of Darrell this year, and he's really come a long ways throughout the season." The victory also was important because Wallace's future is uncertain. Busch has said his team still needs sponsorship to run a truck full time next year. "I would have to say this certainly has to help," Busch said. "We've been trying for a month or so to try to continue to put things together for Darrell. I want to see him back in our trucks. We just need to be able to put the pen to the paper and call it a 2014 season." Wallace also is under contract with Joe Gibbs Racing and has aspirations of advancing to the Nationwide and Sprint Cup circuits with the team owned by the former NFL coach, who called Wallace in victory lane. "We are just thrilled for him and his entire family on the win in Martinsville," Gibbs said in a statement. "We obviously think a lot about Darrell. He has tremendous talent, and we really believe he can have a huge impact on our sport." Asked about the impact his win could have on African-American involvement in racing, Wallace said, "hopefully it makes it easier. This sport isn't easy at all for sure. It's taken us 18 races (to win). With this (victory), hopefully it'll just make them want to jump in it now. "You've got to be willing to do it and stick out through the thick and the thin. In this sport, it's more thick than anything. But you've just got to keep chugging along, man. This is one of many, I hope." SATURDAY'S RESULTS Lap length: .526 miles (Start position in parentheses) 1. (3) Darrell Wallace Jr., Toyota, 200 laps, 146.9 rating, 48 points. 2. (15) Brendan Gaughan, Chevrolet, 200, 92.6, 42. 3. (9) Jeb Burton, Chevrolet, 200, 97.3, 41. 4. (14) Ben Kennedy, Chevrolet, 200, 83.7, 40. 5. (24) Ryan Blaney, Ford, 200, 77.9, 39. 6. (1) Denny Hamlin, Toyota, 200, 119.5, 0. 7. (6) German Quiroga, Toyota, 200, 88.8, 37. 8. (2) Johnny Sauter, Toyota, 200, 111.4, 37. 9. (28) Scott Riggs, Chevrolet, 200, 76.3, 0. 10. (7) James Buescher, Chevrolet, 200, 79.7, 34. 11. (26) Max Gresham, Chevrolet, 200, 61.9, 33. 12. (22) Joey Coulter, Toyota, 200, 73.6, 32. 13. (17) John Wes Townley, Toyota, 200, 73.9, 31. 14. (8) Ross Chastain, Ford, 200, 100.7, 31. 15. (11) Jeff Agnew, Chevrolet, 200, 63, 29. 16. (30) John Hunter Nemechek, Toyota, 200, 62.8, 28. 17. (13) Matt Crafton, Toyota, 200, 90.3, 27. 18. (29) Dakoda Armstrong, Chevrolet, 200, 56.4, 26. 19. (23) Brandon Jones, Chevrolet, 200, 64.7, 25. 20. (12) Chase Elliott, Chevrolet, 200, 80.4, 24. 21. (20) Miguel Paludo, Chevrolet, 200, 58.1, 23. 22. (5) Ty Dillon, Chevrolet, 200, 103.6, 23. 23. (19) Caleb Holman, Chevrolet, 199, 47.4, 21. 24. (31) Brennan Newberry, Chevrolet, 199, 49.4, 20. 25. (18) Ryan Sieg, Chevrolet, 197, 34.7, 19. 26. (10) Timothy Peters, Toyota, 195, 81.9, 18. 27. (36) Clay Greenfield, Ram, 195, 34, 0. 28. (4) Ron Hornaday Jr., Chevrolet, 194, 78.1, 16. 29. (35) Norm Benning, Chevrolet, 193, 33.4, 15. 30. (21) Kevin Harvick, Chevrolet, accident, 189, 84.5, 0. 31. (27) Timmy Hill, Chevrolet, 186, 37.8, 0. 32. (16) Daniel Hemric, Chevrolet, 140, 35, 12. 33. (33) Bryan Silas, Ford, accident, 137, 37.2, 11. 34. (32) Brad Riethmeyer, Chevrolet, clutch, 52, 37.6, 10. 35. (25) Chris Jones, Chevrolet, brakes, 11, 26.9, 9. 36. (34) Jimmy Weller III, Toyota, rear gear, 6, 26.2, 8. ——— Race Statistics Average Speed of Race Winner: 66.601 mph. Time of Race: 1 hour, 34 minutes, 49 seconds. Margin of Victory: 1.673 seconds. Caution Flags: 10 for 52 laps. Lead Changes: 7 among 5 drivers. Lap Leaders: J.Sauter 1-9; D.Wallace Jr. 10-40; D.Hamlin 41-105; D.Wallace Jr. 106-120; R.Chastain 121-134; T.Dillon 135-150; D.Wallace Jr. 151-200. Leaders Summary (Driver, Times Led, Laps Led): D.Wallace Jr., 3 times for 96 laps; D.Hamlin, 1 time for 65 laps; T.Dillon, 1 time for 16 laps; R.Chastain, 1 time for 14 laps; J.Sauter, 1 time for 9 laps. Top 10 in Points: 1. M.Crafton, 680; 2. T.Dillon, 623; 3. J.Buescher, 622; 4. J.Burton, 598; 5. M.Paludo, 592; 6. J.Sauter, 588; 7. R.Blaney, 576; 8. T.Peters, 574; 9. D.Wallace Jr., 566; 10. B.Gaughan, 553.
site number? True Is 8947 a prime number? False Is 1222711 composite? True Is 20819 prime? False Is 381509 prime? True Is 918703 a composite number? True Is 1660921 a composite number? False Is 302249 composite? True Is 494609 a prime number? True Is 78467 a composite number? False Is 368167 a composite number? True Is 356387 a prime number? True Is 29789 composite? False Is 584733 a prime number? False Is 55021 prime? True Is 186551 a prime number? True Is 38113 composite? False Is 220757 composite? False Is 1399 a composite number? False Is 71607 prime? False Is 991007 composite? True Is 191531 a composite number? False Is 81979 a composite number? True Is 22381 a prime number? True Is 247 prime? False Is 10495 a prime number? False Is 85585 a prime number? False Is 1151 composite? False Is 66839 a prime number? False Is 4721 a prime number? True Is 347962 a prime number? False Is 8661 composite? True Is 9637 a prime number? False Is 30211 a prime number? True Is 316993 prime? False Is 34514 prime? False Is 17603 a prime number? False Is 157391 prime? False Is 4859 prime? False Is 987559 a composite number? False Is 493 prime? False Is 844283 composite? True Is 43867 composite? False Is 3147 a composite number? True Is 2707 a prime number? True Is 3000749 a prime number? False Is 13891 prime? False Is 59606 prime? False Is 21059 a prime number? True Is 762989 a prime number? True Is 151127 composite? True Is 160078 a composite number? True Is 1008659 prime? True Is 403387 composite? False Is 3831 a prime number? False Is 18661 a prime number? True Is 161 a prime number? False Is 256127 prime? False Is 250489 prime? True Is 210391 a prime number? True Is 287 a prime number? False Is 323 prime? False Is 424243 prime? True Is 49661 composite? True Is 1423547 composite? False Is 4609 a prime number? False Is 100679 prime? False Is 322607 composite? False Is 29851 a composite number? False Is 9743 composite? False Is 706 a prime number? False Is 4981 a prime number? False Is 349211 a prime number? True Is 1409 a composite number? False Is 1390967 prime? True Is 72421 prime? True Is 16487 composite? False Is 452671 prime? True Is 37757 a prime number? False Is 201 composite? True Is 51031 prime? True Is 11714 a composite number? True Is 9609 composite? True Is 205 a prime number? False Is 75133 composite? False Is 500519 prime? True Is 50849 a prime number? True Is 5623 a composite number? False Is 19289 prime? True Is 2361899 a prime number? True Is 1059209 composite? False Is 1226417 prime? True Is 6113 a prime number? True Is 287791 composite? True Is 4721 a composite number? False Is 7997 composite? True Is 80599 prime? True Is 2735519 a prime number? True Is 5279 prime? True Is 72613 a prime number? True Is 6247 composite? False Is 174989 composite? False Is 469 a composite number? True Is 18181 a composite number? False Is 10673 prime? False Is 90479 a prime number? False Is 23099 prime? True Is 109789 a composite number? False Is 3907 a composite number? False Is 10459327 a prime number? True Is 7963 prime? True Is 49319 a prime number? False Is 155693 prime? True Is 4699 a composite number? True Is 1117 composite? False Is 13739 composite? True Is 14501 prime? False Is 596009 a composite number? False Is 336307 a composite number? False Is 233743 a composite number? False Is 2654 a composite number? True Is 8497 a composite number? True Is 55457 a composite number? False Is 1993991 a prime number? True Is 696239 a prime number? True Is 43499 prime? True Is 54449 composite? False Is 2146427 composite? True Is 1901 a prime number? True Is 39647 a prime number? False Is 1194631 a composite number? False Is 879 composite? True Is 54083 composite? False Is 3595 a prime number? False Is 33563 composite? False Is 351919 prime? True Is 15338 a composite number? True Is 35291 composite? False Is 742193 a prime number? True Is 1139 prime? False Is 67021 composite? False Is 77003 prime? True Is 93701 a composite number? False Is 136393 a composite number? False Is 29009 prime? True Is 68422 prime? False Is 1774273 a prime number? False Is 257369 a composite number? True Is 19121 a prime number? True Is 41443 a prime number? True Is 83299 composite? False Is 2531 prime? True Is 304961 composite? False Is 160315 prime? False Is 271967 composite? False Is 136231 a prime number? False Is 6131 composite? False Is 555461 prime? True Is 1501471 a prime number? True Is 295991 a prime number? False Is 474139 a composite number? True Is 33679 a composite number? False Is 923263 a composite number? True Is 5431 a composite number? False Is 128099 composite? False Is 249419 a prime number? True Is 3193 prime? False Is 512303 a composite number? True Is 25409 a composite number? False Is 2333 a composite number? False Is 3251 a prime number? True Is 164127 prime? False Is 1129915 composite? True Is 737309 a composite number? False Is 4847 a composite number? True Is 1509621 prime? False Is 12077 composite? True Is 15746 composite? True Is 2579 composite? False Is 58297 a composite number? True Is 22993 composite? False Is 574789 a prime number? True Is 11777 a prime number? True Is 25733 a prime number? True Is 9551 prime? True Is 17147 a composite number? True Is 3787 composite? True Is 6031 a prime number? False Is 53 a composite number? False Is 31643 a prime number? True Is 19037 composite? False Is 109097 composite? False Is 1824827 composite? False Is 8641 a composite number? False Is 1803745 a composite number? True Is 331651 a composite number? False Is 211403 composite? False Is 7151 prime? True Is 16237 composite? True Is 251231 composite? False Is 6073 a prime number? True Is 120567 prime? False Is 14845 a composite number? True Is 54077 composite? True Is 4721 a prime number? True Is 553 composite? True Is 16163 composite? True Is 61513 prime? False Is 80221 composite? False Is 145645 composite? True Is 275071 a composite number? True Is 445358 a composite number? True Is 6 a prime number? False Is 17843 prime? False Is 101513 a composite number? False Is 823393 prime? False Is 3989 a prime number? True Is 79757 prime? True Is 1393 a prime number? False Is 2881 a prime number? False Is 821 prime? True Is 38639 a prime number? True Is 490829 a composite number? False Is 1201163 a prime number? True Is 3017 a prime number? False Is 75281 prime? False Is 8083 a composite number? True Is 12347 prime? True Is 6065 a prime number? False Is 8141 composite? True Is 4629 a composite number? True Is 82309 prime? False Is 105943 prime? True Is 202669 a prime number? False Is 52907 prime? False Is 28387 composite? False Is 26099 prime? True Is 191153 prime? False Is 6389 a prime number? True Is 369933 a prime number? False Is 15013 composite? False Is 3626803 a prime number? True Is 14501 composite? True Is 183743 a prime number? False Is 83542 a prime number? False Is 11199 a composite number? True Is 4987 a prime number? True Is 169379 a prime number? False Is 124687 prime? False Is 5581 composite? False Is 478 prime? False Is 2682217 a composite number? False Is 23783 composite? True Is 21041 a prime number? False Is 21059 a prime number? True Is 23461 composite? True Is 244297 prime? True Is 3523 a prime number? False Is 7069 composite? False Is 119653 composite? False Is 7837 composite? True Is 427781 a composite number? False Is 1527 composite? True Is 288023 a composite number? False Is 97921 prime? False Is 4686277 a prime number? True Is 276007 a prime number? True Is 1901 composite? False Is 14983 a composite number? False Is 40231 prime? True Is 2649677 a prime number? True Is 244421 a composite number? True Is 118291 a composite number? True Is 39631 prime? True Is 766829 composite? True Is 86677 a composite number? False Is 875293 a composite number? True Is 348149 prime? True Is 1996517 a prime number? True Is 5381 prime? True Is 21631 prime? False Is 446179 a composite number? False Is 100141 a prime number? False Is 12237 prime? False Is 40813 a composite number? False Is 3989 composite? False Is 235203 composite? True Is 636517 a composite number? True Is 123479 prime? True Is 206399 prime? True Is 1249 prime? True Is 6803 a prime number? Tr
Play under way at French Open after rain delay Spectator sit under an umbrella on center court as matches were delayed because of the rain for the French Open tennis tournament at the Roland Garros stadium Tuesday, May 28, 2013 in Paris. (AP Photo/Christophe Ena) PARIS (AP) — Play began Tuesday at the French Open after a rain delay of 2½ hours that left center-court spectators longing for the tournament's planned retractable roof. With the schedule still in the first round on the third day of action, Frenchwoman Marion Bartoli faced Olga Govortsova in the opening match on center court, but rain began falling shortly before the players were scheduled to take the court. The start of action on 14 other courts was also delayed before getting under way in cloudy, 55-degree weather. The schedule included the two champions from the Australian Open in January, No. 1-seeded Novak Djokovic and No. 3 Victoria Azarenka, along with past major titlists Petra Kvitova and Samantha Stosur. Last week, tournament officials said they would move ahead with plans to build a retractable roof over center court, despite a judicial ruling last month that put the project on hold. The roof would be completed in 2018 as part of a $440 renovation million project at Roland Garros. The men's final last year between Djokovic and Rafael Nadal was halted because of rain in the fourth set, forcing an overnight suspension and the completion of the tournament on a Monday. It was the first time in 39 years the French Open didn't finish on time. The weather was sunny Monday, when Maria Sharapova began a bid for her fifth Grand Slam title with a rather quick and simple 6-2, 6-1 victory over 42nd-ranked Hsieh Su-wei. Sharapova completed a career Grand Slam by winning the French Open last year, adding the title to the ones from Wimbledon in 2004, the U.S. Open in 2006 and the Australian Open in 2008. She never got the chance to defend that last one in 2009, because she was sidelined with an injured right shoulder; Sharapova had surgery on it in 2010. "It's nice to come back to a place where you feel like you're part of its history," Sharapova said, "where your name will always be (engraved) somewhere on the wall or on the trophy." Rafael Nadal, an 11-time major champion, also knows that feeling rather well, of course — especially in Paris, where he has won a record seven titles, including the past three. His bid to become the only man with eight championships at any Grand Slam tournament got off to a slow start Monday, before he restored order by coming back to beat 59th-ranked Daniel Brands 4-6, 7-6 (4), 6-4, 6-3. For the better part of two sets, it wasn't all that different from Nadal's previous match at a Slam: Early round, main stadium, unknown opponent taking risky swings and putting everything in. At Wimbledon nearly a year ago, it was 100th-ranked Lukas Rosol who took it to Nadal and beat him in the second round. "He was trying to hit every ball as hard as he can," said Nadal, who improved to 37-2 this season, with 16 victories in a row. "He made me suffer, I can tell you." Brands came in 0-4 at the French Open, and with a sub-.500 career record in all tour matches, and his strategy was right out of Rosol's playbook: Keep points short and aim for the lines. "That's the way. If you give Nadal time, there's no chance. You have to be aggressive. That's my view," Rosol, who's now ranked 36th, said Monday after winning his first-round match. "If other players play aggressive against him, that's the only way to beat him." Toni Nadal, who is Rafael's uncle and coach, saw similarities with the last time his nephew played at a Grand Slam. "Yes, it was a little the same," Toni said. "Against Rosol, in the fifth set, we couldn't do anything." But when a reporter wanted to know whether there's a pattern being established as to the type of foe who can bother Rafael, Toni shrugged that off, replying: "When you play against an opponent who serves really well, who puts in a high percentage of first serves, and who hits balls really fast, it's complicated for everyone — not just for Rafael." In other Day 2 action, French wild-card recipient Gael Monfils surprised No. 5 Tomas Berdych 7-6 (8), 6-4, 6-7 (3), 6-7 (4), 7-5, while Australia's Nick Kyrgios, at 18 the youngest player in the men's draw, made a successful Grand Slam debut by eliminating 34-year-old Radek Stepanek 7-6 (4), 7-6 (8), 7-6 (11). Two U.S. men won to set up a meeting for a spot in the third round: John Isner and Ryan Harrison. Li and Radwanska both play Americans next. Li goes up against Bethanie Mattek-Sands, who got past Lourdes Dominguez Lino of Spain, part of a 6-1 day for U.S. women, including wins by No. 17 Sloane Stephens, No. 29 Varvara Lepchenko, Melanie Oudin, Vania King and Madison Keys.
Targeted treatment of choroidal neovascularization using integrin-mediated sterically stabilized liposomes loaded with combretastatin A4. The objective of this study was to develop an efficient vasculature-targeted liposomal combretastatin A4 (CA4), by the modification of the sterically stabilized liposomes (SSL) with a ligand of integrins and to explore the possibility of such system for the treatment of choroidal neovascularization (CNV). CA4-loaded liposomes were prepared by thin-film dispersion method. The linear arginine-glycine-aspartic acid tripeptide (RGD) with affinity for integrins such as alphavbeta3 expressed on rapidly proliferative vascular endothelial cells was coupled to the distal end of polyethylene glycol (PEG) connected on the surface of SSL. The liposome delivery system was characterized in terms of size and size distribution profiles by dynamic light scattering method, entrapment efficiency, and leakage properties by high-performance liquid chromatography (HPLC). The uptake efficiency by human umbilical vein endothelial cells (HUVECs) was evaluated by confocal microscopy. The therapeutic efficacy was quantitatively assessed by choroidal flat mounts. CA4-loaded RGD-SSL (RGD-SSL-CA4) was obtained with an entrapment efficiency over 70% and an average diameter of approximately 120 nm. The leakage property of RGD-SSL-CA4 was similar with SSL-CA4, both were slower than CA4 ethanol solution. Confocal microscopy studies revealed that RGD-SSL could facilitate the liposomes' uptake into HUVECs. Rats treated with two intravenous injections of 7 mg/kg RGD-SSL-CA4 resulted in a significant reduction in the area of CNV compared with control group (P < 0.05). RGD-modified SSL loaded with CA4 can be successfully prepared, and the vasculature-targeted liposome system would increase the uptake of HUVECs and improve the therapeutic efficacy of CA4 on CNV compared with the control formulations.
1. Field of the Invention The invention relates to the field of printing systems, and in particular, to methods and systems for color conversions. 2. Statement of the Problem In color printing, displaying, and reproduction, the term gamut represents the set of colors that a color-reproduction device is physically able to generate. Every device that displays or reproduces an image, such as a printer, monitor, scanner, or digital camera, may have its own unique color gamut. When an image is transferred from one device to another, the color gamut of each device is examined. The color gamut generally has two components that are considered when performing a color conversion. Those components include the gamut boundary and the number of colors that are realizable within the gamut boundary. The gamut boundary of a device represents the outermost extent of the device's capabilities in a reference color space. Because of quantization in color reproduction systems, such as those of color halftone printers, not all colors within a device's boundary are realizable. Moreover, the shape of the boundaries can vary dramatically. When an input color space is larger than the gamut of an output color device, gamut mapping algorithms are applied. The gamut mapping process transforms a point in the source gamut to a realizable color inside the gamut of the output device. The form of this transformation can dramatically impact the quality of the reproduced images. As such, care is taken in the design and implementation of gamut mapping transformations. Certain current gamut mapping algorithms map all out-of-gamut points directly to the destination gamut. For example, clipping algorithms clip out-of-gamut points to the destination gamut boundary. Scaling algorithms, on the other hand, scale an input color gamut to an output color gamut such that some of the out-of-gamut points are mapped inside the destination gamut while others are mapped to the boundary of the destination gamut. The large variability in past color gamut mapping studies suggests that ideal gamut mapping depends on image content, preservation of perceived hue throughout color space and the extent of the gamut mismatch in various regions of color space. Thus, image dependent and regional-dependent gamut mappings have been preferred. One such gamut mapping includes a linear conversion function that interpolates color space source data to printer specific color space data by subdividing the source data into a plurality of subsets and interpolating the data for each subset using one or more linear conversion functions. A problem, however, exists with the linear conversion function as it does not generate an optimum interpolation for each subset. To compensate for sub-optimal interpolations of subsets, one or more of a plurality of conversion functions may be selected for each subset, optimizing the interpolation for each subset. The converted subsets, however, still do not optimally combine to form a target data set. Perceptual gamut mapping is also used in color reproduction. Perceptual gamut mapping modifies both in-gamut and out-of-gamut colors from their colorimetric representation in order to provide a pleasing or perceptual appearance. The results of the perceptual gamut mapping normally depend on the input color range and the device color gamut. However, if the input color range is much larger than the actual output color range, as is normally the case, the reproduced colors have lower chroma and are less vivid. Accordingly, there exists a need to map colors from the gamut of one device to the gamut of another device while ensuring that the colors remain aesthetically pleasing and vivid.
#pragma once #include <glm/glm.hpp> class Scene { protected: glm::mat4 model, view, projection; public: int width; int height; Scene() : m_animate(true), width(800), height(600) { } virtual ~Scene() {} void setDimensions( int w, int h ) { width = w; height = h; } /** Load textures, initialize shaders, etc. */ virtual void initScene() = 0; /** This is called prior to every frame. Use this to update your animation. */ virtual void update( float t ) = 0; /** Draw your scene. */ virtual void render() = 0; /** Called when screen is resized */ virtual void resize(int, int) = 0; void animate( bool value ) { m_animate = value; } bool animating() { return m_animate; } protected: bool m_animate; };
1. Field of Invention Aspects of the invention can relate to gray scale correction processing of image data. More specifically, the invention can relate to gray scale correction processing, such as color correction or gamma (γ) correction based on lookup tables (LUTs). 2. Description of Related Art Related art gamma correction processing is processing for adjusting display characteristics of image data in accordance with characteristics of a display device, such as a CRT or an LCD in an image display apparatus for displaying image data. Generally, gamma correction processing can be carried out using, for example, an LUT storing gamma characteristics data (gray scale correction characteristics data) created on the basis of the display characteristics of a display device. Gamma characteristics define relationship between input gray scale values and output gray scale values. The image display apparatus obtains output gray scale values corresponding to input gray scale values of input image data by referring to the gamma characteristics, and displays an image corresponding to the image data on a display device according to the output gray scale values. Also, when the image display apparatus performs color correction on input image data to achieve desired color characteristics for display, an LUT storing color conversion characteristics prepared in advance is used. An example of such related art color correction and gamma correction is disclosed in Japanese Unexamined Patent Application Publication No. 9-271036. With the recent improvement in picture quality in cellular phones and other electronic apparatuses, the capacity of a storage device, such as a RAM needed to implement an LUT for gray scale correction characteristics data increases as the number of gray scale levels of image data increases. In view of this, a method has been proposed in which gray scale correction characteristics data for a number of gray scale levels smaller than the number of gray scale levels of input image data is stored in an LUT and gray scale correction characteristics data for the insufficiency is interpolated by linear approximation or the like. (Refer to, for example, PCT Japanese Translation Patent Publication No. 2002-534007). In order to interpolate gray scale correction characteristics data by linear approximation or the like, output gray scale values of two endpoints of a portion to be interpolated are needed, so that reading operation must be executed twice with an LUT storing a single set of gray scale correction characteristics data. Thus, power consumption increases due to the increased number of times of reading operation, and a clock rate higher than a normal clock rate is required.
Basic vapor exposure for tuning the charge state distribution of proteins in negative electrospray ionization: elucidation of mechanisms by fluorescence spectroscopy. Manipulation for simplifying or increasing the observed charge state distributions of proteins can be highly desirable in mass spectrometry experiments. In the present work, we implemented a vapor introduction technique to an Agilent Jet Stream ESI (Agilent Technologies, Santa Clara, CA, USA) source. An apparatus was designed to allow for the enrichment of the nitrogen sheath gas with basic vapors. An optical setup, using laser-induced fluorescence and a pH-chromic dye, permits the pH profiling of the droplets as they evaporate in the electrospray plume. Mechanisms of pH droplet modification and its effect on the protein charging phenomenon are elucidated. An important finding is that the enrichment with basic vapors of the nitrogen sheath gas, which surrounds the nebulizer spray, leads to an increase in the spray current. This is attributed to an increase in the electrical conductivity of water-amine enriched solvent at the tip exit. Here, the increased current results in a generation of additional electrolytically produced OH(-) ions and a corresponding increase in the pH at the tip exit. Along the electrospray plume, the pH of the droplets increases due to both droplet evaporation and exposure to basic vapors from the seeded sheath gas. The pH evolution in the ESI plume obtained using pure and basic seeded sheath gas was correlated with the evolution of the charge state distribution observed in mass spectra of proteins, in the negative ion mode. Taking advantage of the Agilent Jet Stream source geometry, similar protein charge state distributions and ion intensities obtained with basic initial solutions, can be obtained using native solution conditions by seeding the heated sheath gas with basic vapors.
Euclid–Euler theorem The Euclid–Euler theorem is a theorem in mathematics that relates perfect numbers to Mersenne primes. It states that every even perfect number has the form , where is a prime number. The theorem is named after Euclid and Leonhard Euler. It has been conjectured that there are infinitely many Mersenne primes. Although the truth of this conjecture remains unknown, it is equivalent, by the Euclid–Euler theorem, to the conjecture that there are infinitely many even perfect numbers. However, it is also unknown whether there exists even a single odd perfect number. Statement A perfect number is a natural number that equals the sum of its proper divisors, the numbers that are less than it and divide it evenly. For instance, the proper divisors of 6 are 1, 2, and 3, which sum to 6, so 6 is perfect. A Mersenne prime is a prime number of the form ; for a number of this form to be prime, itself must also be prime. The Euclid–Euler theorem states that an even natural number is perfect if and only if it has the form , where is a Mersenne prime. History Euclid proved that is an even perfect number whenever is prime (Euclid, Prop. IX.36). This is the final result on number theory in Euclid's Elements; the later books in the Elements instead concern irrational numbers, solid geometry, and the golden ratio. Euclid expresses the result by stating that if a finite geometric series beginning at 1 with ratio 2 has a prime sum , then this sum multiplied by the last term in the series is perfect. Expressed in these terms, the sum of the finite series is the Mersenne prime and the last term in the series is the power of two . Euclid proves that is perfect by observing that the geometric series with ratio 2 starting at , with the same number of terms, is proportional to the original series; therefore, since the original series sums to , the second series sums to , and both series together add to , two times the supposed perfect number. However, these two series are disjoint from each other and (by the primality of ) exhaust all the divisors of , so has divisors that sum to , showing that it is perfect. Over a millennium after Euclid, Alhazen conjectured that even perfect number is of the form where is prime, but he was not able to prove this result. It was not until the 18th century that Leonhard Euler proved that the formula will yield all the even perfect numbers. Thus, there is a one-to-one relationship between even perfect numbers and Mersenne primes; each Mersenne prime generates one even perfect number, and vice versa. Proof Euler's proof is short and depends on the fact that the sum of divisors function is multiplicative; that is, if and are any two relatively prime integers, then . For this formula to be valid, the sum of divisors of a number must include the number itself, not just the proper divisors. A number is perfect if and only if its sum of divisors is twice its value. One direction of the theorem (the part already proved by Euclid) immediately follows from the multiplicative property: every Mersenne prime gives rise to an even perfect number. When is prime, The divisors of are . The sum of these divisors is a geometric series whose sum is . Next, since is prime, its only divisors are and itself, so the sum of its divisors is . Combining these, Therefore, is perfect. In the other direction, suppose that an even perfect number has been given, and partially factor it as , where is odd. For to be perfect, the sum of its divisors must be twice its value: The odd factor on the right side of (∗) is at least 3, and it must divide , the only odd factor on the left side, so is a proper divisor of . Dividing both sides of (∗) by the common factor and taking into account the known divisors and of gives For this equality to be true, there can be no other divisors. Therefore, must be , and must be a prime of the form . References Category:Theorems in number theory Category:Articles containing proofs Category:Leonhard Euler
Alkaloids from Esenbeckia pilocarpoides. A preliminary screening showed the occurrence of alkaloids only in root bark and roots of ESENBECKIA PILOCARPOIDES H. B. K., (Rutaceae). Six alkaloids have been isolated and identified from root bark: one acridone, 1-hydroxy-3-methoxy- N-methyl-acridone; four furoquinolines, maculine, flindersiamine, kokusaginine, kokusagine; the sixth, isomaculine, a furo-4-quinolone, known as a synthetic product, has been isolated for the first time from a natural source.
This NCI Shipping Scale will weigh up to 150lbs is NTEP approved and designed for shipping applications. Description This scale is accurate up to 150lbs, weighing increments of 0.05lbs. The 7815 has an NCI protocol to interface with UPS Worldship & FedEx. RS-232 interface with cable included and has a rugged ABS plastic platform for durability. Specifications 150lb x 0.05lb NTEP approved AC power RS-232 interface (cable included) NCI protocol ABS plastic platform Details Assembled Country USA Assembled Size 12.5" X 14" X 4.2" Component Country USA Ask & Answer Warranty Information This product is covered by the Sam's Club Member Satisfaction Guarantee. There is no additional information available for this item. Stay Connected Mobile apps Email Updates Get the Sam's Club Insider email and save even more. At this time, registration for email is unavailable in Puerto Rico. For more information, visit our privacy policy.
Calimera Yati Beach All Inclusive Calimera Yati Beach All Inclusive Calimera Yati Beach All Inclusive About the Hotel Property LocationWith a stay at Calimera Yati Beach All Inclusive in Midoun, you'll be on the beach and within the region of El Ghriba Synagogue and Borj El K'bir Fort. This 4-star resort is within the region of Houmt Souq Harbour and Guellala Museum. RoomsMake yourself at home in one of the 394 air-conditioned rooms featuring LCD televisions. DiningThis resort is all inclusive. Rates include meals and beverages at onsite dining establishments. Charges may be applied for dining at some restaurants, special dinners and dishes, some beverages, and other amenities. You can enjoy a meal at a restaurant serving the guests of Calimera Yati Beach All Inclusive, or find a snack in a coffee shop/café. Relax with a refreshing drink from a poolside bar or one of the 2 bars/lounges. Business, Other AmenitiesFeatured amenities include multilingual staff, luggage storage, and a safe deposit box at the front desk.
Q: Disable jQuery dialog on refresh I have a jQuery Dialog set to autoOpen:true. Thus it pops up on page load. The dialog contains two buttons one closes it, the other opens a form, , when I submit the form, I have set a redirect to the same page. I would rather this `dialog' does not appear again when the redirect (kind of refresh) happens. I have tried using $_SERVER['HTTP_REFERER'] and $_SERVER['REQUEST_URI'] as below: var ref_url = $('#referring_url').val(); var cur_url = $('#current_url').val(); var refresher = true; if(ref_url = cur_url) refresher = false; else refresher = true; I have set the dialog autoOpen value to refresher and then to parse the uri values from php i have used the hidden input boxes below: <input id="referring_url" name="referring_url" id="referring_url" type="hidden" value="<?php echo $_SERVER['HTTP_REFERER']; ?>" /> <input id="current_url" name="current_url" id="current_url" type="hidden" value="<?php echo $_SERVER['REQUEST_URI']; ?>" /> A: You are using assignment in the if expression. if(ref_url = cur_url){ this statement should be if(ref_url == cur_url){
D-glucose-induced alterations in the electrical parameters of human erythrocyte cell membrane. The alterations of the passive electrical parameters (the permittivity epsilon and the electrical conductivity sigma) of human erythrocyte cell membrane induced by the presence of glucose in the extracellular medium have been investigated by means of dielectric spectroscopy measurements. The membrane permittivity epsilon(s) and the permittivity epsilon(p) and electrical conductivity sigma(p) of the cytosol have been evaluated on the basis of a recent analytical model proposed by Prodan et al., 1983 [16], that takes into account the whole dielectric spectrum of a cell suspension, consisting of both the low-frequency alpha-dispersion and the high-frequency beta-dispersion. Our results show a marked increase of the membrane permittivity epsilon(s) close to a glucose concentration of 20mM. On the contrary, the electrical properties of the cytosol do not change appreciably. This finding strengthens the hypothesis that glucose interactions involve primarily the cell membrane and the mechanism of the transport is briefly discussed.
House Committee Axes Bill To Allow Certain 18 Military Members To Drink Alcohol (KMIT) — The House State Affairs Committee heard a bill that would drop the legal age to consume alcohol to 18 years old for certain active members of the military. House Bill 1132 was sponsored by Representative Tim Goodwin. He testified that if a person can fight for the country, then that person should be allowed to consume alcohol.
Pochettino: 'Dybala among world's best' By Football Italia staff Tottenham boss Mauricio Pochettino looks set to leave Toby Alderweireld out against Juventus and believes Paulo Dybala is “one of the best in the world.” The first leg of their Champions League Round of 16 is on Tuesday in Turin. According to the latest reports coming out of England, defender Alderweireld will be left at home rather than make the trip to Italy. He made his comeback for 90 minutes in the FA Cup replay win over Newport County on Wednesday, but was out of action for three months with a hamstring injury. It seems Spurs would prefer he work on his fitness levels in training rather than be part of the squad. Juventus have their own concerns, as Andrea Barzagli and Dybala have a race against time to be fit, while Juan Cuadrado, Blaise Matuidi and Benedikt Howedes are definitely out of action. “I think Dybala will recover and I hope he does, because I think it’s always nice to play against the best in the world,” Pochettino told Rai Sport. “I put Dybala in that category, because he is a special talent and seeing him on the pitch is wonderful, even if he might cause your team a few problems.” Watch Serie A live in the UK on Premier Sports for just £9.99 per month including live LaLiga, Eredivisie, Scottish Cup Football and more. Visit: https://www.premiersports.com/subscribenow
Characterization of an erbium-doped fiber amplifier as a light source and development of a near-infrared spectrophotometer based on the EDFA and an acoustooptic tunable filter. A novel light source for the near-infrared region which has the highest intensity and widest spectral bandwidth of all near-IR light sources has been developed. The system is based on a single-mode fiber (about 18 m long) doped with Er3+ ion. The doped ion produces amplified spontaneous emission (ASE) in the near-IR region (from 1500 to 1600 nm) when it is excited by a diode laser at 980 nm. Because the diode laser is fusion-spliced directly to the doped fiber, the system is compact, all-solid-state, reliable, and stable and requires little maintenance. Its ASE output intensity was found to be comparable with those of diode lasers currently available for this near-IR region and is much higher than those of conventional halogen-tungsten lamps and the so-called (high-intensity) superluminescent light emitting diodes (SLEDs). Its spectral bandwidth is, however, much wider than those of the diode lasers and the SLEDs. Even higher intensity can be obtained from the doped fiber when a low-intensity (1 mW) light from a 1550-nm laser diode is introduced into the doped fiber. The intensity is enhanced (up to 7 times compared to the ASE) because the input light is amplified by the doped fiber. Furthermore, the output intensity of this erbium-doped fiber amplifier (EDFA) can be appropriately adjusted to provide relatively higher output intensity at any range of wavelengths (within this 1500-1600-nm region) by simply changing the temperature and/or the driven current of the input diode laser. Subsequently, an acoustooptic tunable filter was used to provide a means to spectrally tune the EDFA rapidly and to develop an all-solid-state, compact near-IR spectrophotometer which not only is very sensitive, stable, and reliable but also has a very high throughput. This spectrophotometer can detect water in ethanol at a limit of detection of 10 ppm. More importantly, the high through-put makes it possible to use the instrument to measure spectra of highly absorbing samples (e.g., absorption spectrum of 1.0 M Pr3+ aqueous solution through four sheets of paper); measurements which are currently not possible with halogen-tungsten lamp-based spectrophotometers.
Activation of Mechanosensitive Transient Receptor Potential/Piezo Channels in Odontoblasts Generates Action Potentials in Cocultured Isolectin B4-negative Medium-sized Trigeminal Ganglion Neurons. Various stimuli to the dentin surface elicit dentinal pain by inducing dentinal fluid movement causing cellular deformation in odontoblasts. Although odontoblasts detect deformation by the activation of mechanosensitive ionic channels, it is still unclear whether odontoblasts are capable of establishing neurotransmission with myelinated A delta (Aδ) neurons. Additionally, it is still unclear whether these neurons evoke action potentials by neurotransmitters from odontoblasts to mediate sensory transduction in dentin. Thus, we investigated evoked inward currents and evoked action potentials form trigeminal ganglion (TG) neurons after odontoblast mechanical stimulation. We used patch clamp recordings to identify electrophysiological properties and record evoked responses in TG neurons. We classified TG cells into small-sized and medium-sized neurons. In both types of neurons, we observed voltage-dependent inward currents. The currents from medium-sized neurons showed fast inactivation kinetics. When mechanical stimuli were applied to odontoblasts, evoked inward currents were recorded from medium-sized neurons. Antagonists for the ionotropic adenosine triphosphate receptor (P2X3), transient receptor potential channel subfamilies, and Piezo1 channel significantly inhibited these inward currents. Mechanical stimulation to odontoblasts also generated action potentials in the isolectin B4-negative medium-sized neurons. Action potentials in these isolectin B4-negative medium-sized neurons showed a short duration. Overall, electrophysiological properties of neurons indicate that the TG neurons with recorded evoked responses after odontoblast mechanical stimulation were myelinated Aδ neurons. Odontoblasts established neurotransmission with myelinated Aδ neurons via P2X3 receptor activation. The results also indicated that mechanosensitive TRP/Piezo1 channels were functionally expressed in odontoblasts. The activation of P2X3 receptors induced an action potential in the Aδ neurons, underlying a sensory generation mechanism of dentinal pain.
Q: Latest version of Xamarin Studio (v6.1 or v6.2) does not launch/show I installed XamarinStudio-6.1.1.15-0.msi and the install went fine with a success message at the end. Now I'm trying to launch it from the Start Menu as well as right clicking a solution file (.sln) but XS does not show. I see the process in Task Manager (task name is XamarinStudio.exe *32). I do have Visual Studio 2015 installed and had Xamarin Studio 4.1 previously installed and which I installed XS 6.1.1 over it. I checked out the log files in "..\AppData\Local\XamarinStudio-6.0\Logs" and here's the content: INFO [2016-12-21 20:54:40Z]: Starting Xamarin Studio 6.1.1 (build 15) INFO [2016-12-21 20:54:40Z]: Running on Microsoft .NET 4.0.30319.42000 INFO [2016-12-21 20:54:40Z]: Operating System: Windows 6.1.7601.65536 (64-bit) INFO [2016-12-21 20:54:40Z]: Found GTK# version 2.12.22 A: Your GTK# seems to be really old (2.12.22), you can get the latest installer here: http://www.mono-project.com/download/#download-win
SEEfest Honors Filmmaker Robert Dornhelm with Legacy Award For its 13th annual film festival, SEEfest has honored filmmaker Robert Dornhelm with the SEEfest Legacy Award. Robert Dornhelm was born in 1947 in Timișoara, Romania and emigrated in 1961 to Austria, where he studied film at the Vienna Academy of Film, Music and Performing Arts. He started his career very early, directing numerous documentaries on social and cultural subjects, many of them in Eastern Europe (Vladimir Vysotsky, Neizvestny). His 1977 documentary on the Kirov School of Ballet, The Children of Theater Street, featured Princess Grace of Monaco in a rare film appearance as presenter and narrator. The film was shown in Cannes and established Dornhelm internationally when he received an Academy Award® nomination in 1978. Dornhelm subsequently moved to Los Angeles and made his first American film, She Dances Alone, a docudrama on the life of Václav Nijinsky told through the eyes of his daughter, Kyra. It starred Bud Cort, Max von Sydow and Patrick DuPont with Federico DeLaurentis producing. It opened Directors’ Fortnight in Cannes. His next film was Echo Park, which dealt with the Los Angeles culture and dreams of success and featured Susan Dey and Tom Hulce. Cold Feet, starring Sally Kirkland, Keith Carradine, and Tom Waits, was an attempt at using the Western genre. In 1989, Dornhelm returned to Romania to deal with the troubles of his native country with Requiem for Dominic, a personal film about a childhood friend. It was shown at the Venice Film Festival, awarded at the Belgrade FEST, and nominated for the Golden Globes and Spirit Award. Ms. Lee Harvey Oswald, with Helena Bonham Carter, was his first U.S. TV project. The Unfisch took him back to the Austrian Alps to make a film about love and false morality, which starred Maria Schrader as a character who fulfills her dreams inside a stuffed whale. The Venice Project, which was made in 2000 and featured Dennis Hopper and Lauren Bacall, dealt with the state of the art at the end of the millennium. Anne Frank, with Sir Ben Kingsley, Brenda Blethyn and Hannah Taylor Gordon, won an Emmy for Best Miniseries in 2001. Numerous period dramas with stellar casts followed: Spartacus, The Ten Commandments, The Crown Prince, War and Peace, Hotel Sacher, Maria Theresa. In addition to working on big television event movies, Dornhelm continues to shoot documentaries (Karajan, or Beauty as I See It, about the famed conductor Herbert von Karajan) and direct opera on film and on stage, such as La Bohème, with Anna Netrebko and Rolando Villazon, and Tosca, with Martina Serafin.
DDT and its metabolites in breast milk from two regions in Saudi Arabia. A cross sectional study was designed to measure DDT residues and its metabolites in breast milk samples collected randomly from Saudi lactating mothers living in Al-Ehssa region; which was under leishmania control until 1995, and compare them to samples from mothers living in Riyadh region where no spraying activities was involved. p,p'-DDE, p,p'-DDD and p,p'-DDT residues were measured in 878 breast milk samples by Gas Chromatography/Electron Capture Detector (GC/ECD) and confirmed by Gas Chromatography/Mass Spectrometer Detector (GC/MSD). Variation in the DDT and its metabolites levels were investigated with respect to regional distribution. Wilcoxon rank sum tests showed that the average ranks of p,p'-DDE, p,p'-DDD, p,p'-DDT and sigma p,p'-DDT in lactating mothers from Al-Ehssa region were significantly higher than those living in Riyadh region. These differences supported our hypothesis that the implications of the spraying activities to control vector borne diseases in Al-Ehssa region are obvious. We estimated that 99.2% of infants of lactating mothers living in Al-Ehssa region had sigma p,p'-DDT daily intakes that exceeded 20 micrograms/Kg-day of body weight, the WHO/UNEP Acceptable Daily Intakes for a 5-Kg infant. Exposure of infants to these chemicals through breast-feeding is clearly a public health concern. Because the bulk of literature highlights the adverse health effects of DDT and its metabolites on children and infants, public health polices should enforce the ban of DDT use and advise pregnant and lactating women to avoid DDT containing food or any other type of exposure.
Enjoy beautiful photos Here are photos and life moments that you will definitely like Clint Dempsey World Cup 2017 Celebration Information about Clint Dempsey World Cup 2017 Celebration A native of Nacogdoches, Texas, Dempsey spent his youth career with the Dallas Texans before joining Furman University's men's soccer team in 2001. In 2004, Dempsey was drafted by the New England Revolution, where he scored 25 goals in 71 appearances. Between 2007 and 2012, Dempsey played for Fulham in the Premier League, eventually becoming the club's leading Premier League goalscorer. Dempsey also became the first American player to score a hat-trick in the Premier League during a 5–2 win against Newcastle United in 2012.
The invention relates to safety apparatus. More particularly, the invention relates to apparatus for preventing a child or an unauthorized individual from plugging in an electrical apparatus.
Electronic products are subject to miniaturising. Therefore, electronic components of these products need to be ever smaller and lighter. As a result, more and more integrated and high integrated circuits are required within even smaller packages. Connection pins in former dual-in-line (DIL) packages have been produced with 2,54 mm masks. Quad Flat Packages (QFP) were provided with 0,5 mm masks. Reducing the sizes of the masks and increasing the number of connection pins generated the need for new designs, such as pin grid arrays (PGA) and ball grid arrays (BGA). The particulars of these designs are that they provide their connection pins throughout the whole array surface, rather than just on its periphery, as was the case with former designs. To further reduce the size of the packages, it has been proposed to use flip chip technology and chip scale/size packages (CSP). Chip size packages are characterized in that the area of the package may not be larger than the die itself. For chip scale packages, the area of the package may not be larger than 1.2 times the size of the die. CSPs being mounted on a carrier substrate and being connected to the substrate by bonding require complicated processing steps. In particular ball grid arrays and CSPs are subject to significant failures in electronic components. These failures, which may be a consequence of a shock impacted from drop and fatigue from thermal and bending cycling, also apply to any other type of packages, interconnections and connection types, such as soldering and glueing. The packages fail mainly due to failure in the interconnection between the component and the printed wiring board, in particular in the solder joints or in the printed wiring board (PWB) build-up. As failures within the electrical coupling elements are the reason for most of the malfunctions of electronic components and devices, there is a need to determine the components where the failure occurred. To allow easy, fast and inexpensive repair of electronic devices, it is required to find the components which are subject to broken coupling elements quickly. The lack of knowledge of broken components requires intensive laboratory analysis and long service time for end users, in case the equipment malfunctions. Current failure mode analysis is based on try and error methods. As the failure usually cannot be located exactly, often more components are replaced than necessary.
Category: Real Estate The Best Sealcoating Manufactures and How to Find Them Searching for the best sealcoating company today may not be that easy at all. You can find sealcoating contractors almost everywhere and because of there are too many of them out there, finding the best and the most reputable one can be very hard. However, if […] Why Tourists Need To Book At Gatlinburg Cabin Rentals Gatlinburg rental cabins are mostly comfortable retreats where people can get to relax, enjoy the silence and try to get back to their natural sense of […]
United Airlines failed to fully... INCOMPLETE INSPECTION. April 28, 1989 SEATTLE — INCOMPLETE INSPECTION. United Airlines failed to fully inspect a cargo door that later blew off a Boeing 747, causing the deaths of nine passengers, according to testimony Thursday at a federal hearing. A United executive said mechanics made a partial inspection after repairs in late December, two months before the disaster. The company testified it was unaware it was under regulations to do a full inspection. ''I am convinced the check . . . verified that the door was working,'' said Robert Doll, United vice president for technical services. He admitted the inspection was not as thorough as the Federal Aviation Administration required.
Jimbi Media Sites AFRICAphonieAFRICAphonie is a Pan African Association which operates on the premise that AFRICA can only be what AFRICANS and their friends want AFRICA to be. Jacob NguniVirtuoso guitarist, writer and humorist. Former lead guitarist of Rocafil, led by Prince Nico Mbarga. Postwatch MagazineA UMI (United Media Incorporated) publication. Specializing in well researched investigative reports, it focuses on the Cameroonian scene, particular issues of interest to the former British Southern Cameroons. Bernard FonlonDr Bernard Fonlon was an extraordinary figure who left a large footprint in Cameroonian intellectual, social and political life. Fonlon-Nichols AwardWebsite of the Literary Award established to honor the memory of BERNARD FONLON, the great Cameroonian teacher, writer, poet, and philosopher, who passionately defended human rights in an often oppressive political atmosphere. Omoigui.comProfessor of Medicine and interventional cardiologist, Nowa Omoigui is also one of the foremost experts and scholars on the history of the Nigerian Military and the Nigerian Civil War. This site contains many of his writings and comments on military subjects and history. Victor Mbarika ICT WeblogVictor Wacham Agwe Mbarika is one of Africa's foremost experts on Information and Communication Technologies (ICTs). Dr. Mbarika's research interests are in the areas of information infrastructure diffusion in developing countries and multimedia learning. Martin JumbamThe refreshingly, unique, incisive and generally hilarous writings about the foibles of African society and politics by former Cameroon Life Magazine columnist Martin Jumbam. Enanga's POVRosemary Ekosso, a Cameroonian novelist and blogger who lives and works in Cambodia. Francis NyamnjohFrancis B. Nyamnjoh is Associate Professor and Head of Publications and Dissemination with the Council for the Development of Social Science Research in Africa (CODESRIA). Ilongo SphereNovelist and poet Ilongo Fritz Ngalle, long concealed his artist's wings behind the firm exterior of a University administrator and guidance counsellor. No longer. Enjoy his unique poems and glimpses of upcoming novels and short stories. Tuesday, 18 April 2017 Cameroon and the Anglophone problem: How to quench the erupting volcano? Today Cameroon should be attracting and reassuring investors in view of its emergence slated for 2035. But the country is rather facing poignant emergencies such as rampant corruption, massive youth unemployment, daunting insecurity with attacks by Boko Haram, etc. And worse still, in these final weeks of 2016, it is the Anglophone problem that can throw the country into disarray. It is up to the State authorities and the elites, without any distinction of political leanings, to understand this crisis and work out appropriate solutions in full responsibility. This can only be achieved through a serene and honest dialogue with the real representatives of the angry but not desperate Anglophone community, whose obvious wish is to be considered and listened to, and not insulted or ignored as it has so far been the case.I - What exactly is the Anglophone problem?Maybe the average Francophone cannot fully grasp the problem with Anglophones. Only the one wearing tight shoes can feel the pinch, but the powers that be should understand it and stop turning a blind eye to the issue. The Anglophone problem is a set of demands formulated in various ways and on many occasions by Anglophones in Cameroon. These are identity and language claims that actually question the form of the State. Indeed in 1961, the Anglophones formed a two-state federation with the Francophones, but today Anglophones are merely two administrative regions out of ten. Their grievances should be received and examined, accepted or rejected, just like in any normal democratic setup. But Anglophones cannot simply be contemptuously turned away or ignored, accused of identifying themselves in relation to a foreign language, told that the malaise is national and not just Anglophone, or be brutalized by the police. Such responses from the State exacerbate tensions in a country where the right to protest is guaranteed.Anglophones are not just Cameroonians who speak English as their first official language, as opposed to those whose first official language is French. As Simo Bobda (2001) argues, being an Anglophone in Cameroon is a more ethnic, cultural and regional concept than a linguistic categorization. This definition excludes the Francophones who have long settled in the Anglophone area, even though they may possess economic assets or family ties there, as we analyzed in our book Fifty Years of Bilingualism in Cameroon - What Perspectives in Africa? (L'Harmattan, Paris, 2010). This approach also excludes Francophones with Anglo-Saxon education, and those who have studied in Anglophone schools in French-speaking Cameroon. In short, Anglophones in Cameroon do have a particular cultural identity, a limited geographical space and a specific sociopolitical history, even before being a linguistic community. With this clarification in mind, we can better and fully grasp the nature and the scope of the Anglophone problem, which is today causing riots and tensions in the South-West and in the North-West.II - A brief historical flashbackWhen France and Great Britain took over from Germany in Cameroon from 1916, this created a Cameroonian Anglophone community living in 1/5 of the territory on the one hand, and a Francophone community living in 4/5 of the country on the other hand. The Anglophone minority was used to relative political and cultural autonomy during the British indirect rule colonization. But France applied a strict Jacobin type of centralism in the Francophone zone, coupled with linguistic and cultural assimilation, though Cameroon was not technically a French colony. One can therefore understand Anglophones' uneasiness within a highly centralized State, which the first Francophone president saw as the best way to achieve rapid development in peace and unity. After adopting French-English bilingualism based on biculturalism in 1961, reunited Cameroon became the meeting ground of French and English, two of the most prestigious languages ​​in the world.Indeed, the new political dispensation allowed the country to take advantage of the great heritage of French (a beautiful language of Latin origin spoken by more than 400 million people worldwide, full of refinement, enriched and defended since 1539 by generations of writers and scholars, and present in more than 70 countries and territories). In addition, the country would benefit from the prestige of English (an international language spoken by one billion people around the world, which is dominant in strategic sectors such as communication, diplomacy, business, etc.). But the blessing of adopting English in Cameroon has seemingly become a curse, or at least has contributed in giving rise to the Anglophone problem. Why? Just because in the course of its implementation since 1961, Cameroon's bilingualism has run into a number of difficulties: the law of the majority has conferred a de facto preponderance on French, despite all relevant constitutional provisions; the promotion of bilingualism has remained minimal or just academic, instead of being systematically implemented through specific laws and regulations in each sector like in South Africa; bilingualism has become lopsided as it is not always supported by strict biculturalism. In the end, Anglophones cannot culturally enrich or impact the governing system in Cameroon, hence their feeling of being assimilated by the Francophones. In that respect, in 1964 in the Cameroon cultural review Abbia, Bernard Fonlon in an article entitled We Should Make or Mar, had the following complaint to make: "After Reunification, we now drive our cars on the right, the franc has replaced the pound as our currency, the academic year has been aligned with that of the Francophones, the metric system has replaced the British measurement units, but in vain have I have looked for a single institution brought back from Anglophone Cameroon. Anglophones' cultural influence is virtually nil ".Even when Anglophones are appointed to high positions in the administration, their cultural and linguistic specificities should be protected by relevant and binding laws and regulations. In his book entitled My Faith, a Cameroon to Refurbish (Véritas, Douala, 2010), Christian Cardinal Tumi writes: "The daily anguish of the Anglophone Prime Minister on certain issues, the repeated, chronic and open disregard for him from some members of the government just aggravate a situation which is already very embarrassing ". Official bilingualism cannot just be used to conceal or cover up the State's failures in other important aspects of national unity or harmony.III – What are Anglophones' Worries?The main threat to the Anglophone sociological entity in Cameroon came on May 20, 1972: Ahmadou Ahidjo organized a referendum to put an end to the federal system that had been in place since 1961. Under that dispensation, the Anglophones constituted a federated state and were able to manage their own local and regional affairs without any interference from the Francophones. But of what significance are the Soviet-like results of a popular consultation organized in a context of tyranny and single-party politics? Ahidjo's political maneuver was just a trick to neutralize and better assimilate the Anglophones, with the overt and covert complicity of France. In that connection Christian Cardinal Tumi, still in his book quoted above, writes (on page 33) that a French diplomat in Rome had told him that France's policy in Cameroon was "to wipe out the Anglo-saxon culture of the Anglophone minority in Cameroon ".At any rate, since 1972 the Anglophones in Cameroon have been able to realize, with Ahidjo and even after him, the real meaning of the unitary State for them: adamant political marginalization, impossibility for them to head a number of key ministerial departments (Finance, Foreign Affairs, Territorial Administration, Education, Defense, etc.), Francophone administrative authorities in Anglophone areas, the absence of good roads linking the South-west to the North-West, the growing political divide between the two Anglophone regions, the dilution of the Anglophone cultural heritage, the non-respect of the Anglophone Prime Minister by some Francophone cabinet members, the publication of official texts mostly in French, etc. It was after realizing that huge trickery that John Ngu Foncha, who had led the Anglophones to the 1961 Reunification, opted to resign in 90s and demanded a return to federalism.With the return to a multiparty system in the 90s, Anglophone group unity began to crumble. Political opposition between their two regions was exacerbated. After the All Anglophone Conference (AAC) and the meeting of Anglophone teachers and parents in Buea in 1993, the two Anglophone regions remained politically divided. Worse still, through their elites and traditional rulers, they engaged a fierce competition for the State favors. The contention intensified in the 1990s after Achidi Achu (from the North-West) and Mafany Musonge (from the South-West) were alternately appointed prime ministers, from 1992 to 1996 for the former, and from 19996 to 2004 for the latter. They both proclaimed that politic na njangi, just a way to say that politics is a game of interest in which the ruling party gives favors only to the constituencies that have given them their votes. That mercantilist and non-democratic conception of power politics, which gave rise to unspeakable backstage maneuvers for appointment positions, was detrimental to the values ​​that characterized Anglophones: restraint, hard work, moral probity, transparency, honesty, selflessness and dedication. And not surprisingly many Anglophones were subsequently seen indulging in fraud, the rigging of elections, the corruption of traditional rulers, the embezzlements of public funds, etc.Concerning the educational system, a serious threat to the Anglophone entity was the francophonization of technical and vocational education. Indeed, technical secondary schools in the English-speaking area have operated since 1972 like in the francophone zone, and their pupils had to write the same examinations such as the CAP, the technical Probatoire and the Bac, even after the GCE Board was created. Worse still, most technical education teachers were Francophones until the year 2009, when the first Higher Teachers' Training College for Technical Education was opened in Bambili in the North-West region. Moreover, since colonial times the Anglophones have always made it a point of honor to inculcate civic values to young children (good morality and citizenship, hard work, obedience, etc.). That was achieved through religion and moral education courses taught at all levels, in public schools as well as in secular and denominational institutions. These two subjects were officially disqualified in 1976 by presidential decree as criteria for admission to university or to employment in Cameroon. The Anglophones saw in that move a desire to radically francophonize their school subsystem.Following the creation of Anglo-Saxon universities after the massive failures of Anglophone students in the bilingual national universities, the Anglophones noted that Francophone lecturers were appointed to teach or to manage those Anglo-Saxon institutions. This could be seen as real attack on the Anglophones' specific cultural identity. A similar threat was the migration to the Anglophone areas of thousands of Francophone students attracted by the high quality of the Anglophone subsystem. Indeed, many Francophone students and their parents had discovered, after the inception of the GCE Board in 1993 and the admission of Cameroon to the Commonwealth in 1995, that Anglophone certificates could open up more doors worldwide than Francophone diplomas. As a result, France was no longer the first destination for serious undergraduate or post-graduate studies: Cameroonian students preferred to study in the US, Canada, the RSA, India, etc. And to get better prepared for that, the Anglophone subsystem was the ready answer. These new linguistic Anglophones, expected to increase in number as time goes by, can gradually turn the original ethnic Anglophones into a minority among all English-speaking Cameroonians.IV - The Responsibility of the StateSuch are the hard facts, as seen through Anglophones' eyes. What should the State do at this point in time? The difficulties faced by Anglophones are of identity, socio-political and linguistic in nature, with many psychological implications. Therefore the first measure towards solving the Anglophone problem is human and communicational: finding credible mediators who can really build the bridges and destroy the walls, in order to (re)establish dialogue between the concerned parties. Then the second step should be technical and scientific. The 1996 Constitution, by establishing a decentralized unitary State, has visibly failed to create the desired level of harmony in Cameroon. The persistence of the Anglophone malaise is clear evidence of that failure. The country needs a strong national unity combined with a real regional autonomy. That is the system at work in the US, in South Africa, in Germany, and even in neighboring Nigeria. It is called federalism. It allows democratically elected officials placed at different levels of hierarchical responsibility - local, regional and federal - to manage the country according to the rule of law, and with due respect for objectivity, fairness and accountability. But Cameroonian experts and constitutionalists could also invent for their country a form of federalism that is even more adapted.The government and the governed, to preserve the unity of the nation, must stop seeing anglophonization as a threat to some, and francophonization as death to others. Besides, the governed are sometimes ahead of the government: many Francophone families in Yaoundé and Douala have anglophonized their children without getting the green light from the State. The future of Cameroon will be a judicious anglophonisation/francophonisation of a number of cultural elements that came to us either from France or from England. And if our national interest one day requires us to borrow some ways of doing things from Germany, China or Japan, shall we refuse that move just to keep our cherished Francophone or Anglophone identity? It is high time we changed our way of thinking, and started behaving as Cameroonians aware of building their future as Africans in a global context of rapid change.Indeed, as discussed in my recent book Time for Africa's Emergence? With Focus on Cameroon (USA, 2016), in this era of globalization, Africa's emergence will rely more on our geography than on our history. It is therefore up to us to strike the right balance between our identity and our aspirations that is between our roots and our wings. But it should be noted that federalism in Cameroon would be a boon not only to Anglophone regions, but also to many other regions whose elites have been sending memoranda for years to the central government. These regionalist claims clearly express the thirst of all Cameroonians for a better distribution of national wealth, a better conduct of local affairs, and a better management of regional peculiarities. Obviously each and every region would like to be part of a well-managed country where all the citizens, in harmony with one another, can develop their full potential through hard work, in strict respect of their individual as well as collective rights? ConclusionToday the urgency for the State in Cameroon, conscious of its obligations before History, should be to appease Anglophones while correcting or redressing any institutional dysfunctions to preserve or perfect our national unity. The Anglophone problem (or any other similar set of grievances) is actually a thermometer that reveals high temperature, the urgent need to reform our institutions to enhance our living together. In that respect, and by way of example, the educational system is a great tool for a sound homogenization of the rising generations without sacrificing natural regional diversity, and not a nursery where short-sighted politicians can sow the seeds of future hatred and discord. More importantly, what the Anglophone regions are asking for (that is more freedom, autonomy, political initiative, better local government, etc.) is also good for other regions in the country. In the final analysis, the Anglophone problem is the manifestation of the discomfort of a community aspiring to better living conditions, but it also reveals a need that can be found all over the country. Obviously 22 million Cameroonians cannot be governed today with the same reflexes, methods and institutions as in 1972, when the country had only 6 million inhabitants. Courtesy, Sa'ah François GUIMATSIA
Introduction ============ The Ethiopian mustard \[syn. Abyssinian mustard; *Brassica carinata* *A. Braun*. (2n = 4× = 34); genome B~c~B~c~C~c~C~c~\], is an important leafy vegetable and oilseed crop in northeast Africa ([@B49]). It is evolved as a result of a few interspecific hybridization events between *Brassica nigra* (BB genome, 2n = 2 × = 16) and *Brassica oleracea* (CC genome, 2n = 2× = 18) in Ethiopia. In recent years, this crop is also being utilized for biodiesel production due to its fatty acid composition. In addition, *B. carinata* harbors several genes for resistance to lodging, diseases, and pod shattering; and tolerance to abiotic stresses ([@B15]; [@B46]; [@B30]; [@B12]; [@B50]; [@B44]), which make it also an ideal candidate for broadening the narrow genetic base of canola -- the world's second largest oilseed crop ([@B9]). Dehiscence of fruiting structures is an orchestrated natural mechanism for seed dispersal and survival of many plant species. In Ethiopian mustard and other members of the Brassicaceae family, a dehiscence zone (DZ) is developed between the two valves and the replum, as the pods mature. The highly differentiated cells in DZ weaken the strength of the pods, leading to seed dispersal at maturity. Pod shattering is a highly undesirable trait for commercial seed production in *Brassica* crops and causes significant yield losses of up to 70% in canola ([@B8]). Generally, oilseed Brassicas are 'windrowed' to reduce seed loss due to shattering but this practice is not completely effective ([@B31]). Seed losses accelerate further with the prevalence of high wind velocity and extremely high temperatures during the time of harvesting in Australia. One of the foci of many *Brassica* breeding programs is to develop improved varieties for resistance to pod shattering so the standing crop can be directly harvested with combines without any significant seed loss. Natural variation for shatter resistance exists in the *B. rapa, B. juncea, B. napus*, and *B. carinata* germplasm ([@B22], [@B24]; [@B35]; [@B31]; [@B48]; [@B39]; [@B56]). However, shatter resistance in *B. napus* germplasm is insufficient to reduce yield loss under severe weather conditions ([@B39]). *B. carinata* is reported to be more resistant to seed shattering than *B. napus, B. rapa*, and, *B. juncea* ([@B56]). Interestingly, *B. carinata* is also known to hybridize with the A*~r~* (*B. rapa*) and A~n~C~n~ (*B. napus*) genome species and produce viable 'new type' napus plants (A~n~A~n~C~n/c~C~n/c~) with diverse C~c~ genome ([@B32]; [@B47]; [@B4]; [@B10]). This knowledge prompted us to characterize genetic variation and identify genetic loci for pod shatter resistance in *B. carinata* to improve the level of shattering resistance in other *Brassica* crops, especially in canola. The testing of germplasm for pod shatter resistance under field conditions is often practiced in breeding programs but it is unreliable and confounded with growing environment. However, the availability of test methods like the random impact test and pendulum test to assess the pod strength have made possible the assessment of germplasm to categorize them into shatter tolerant/susceptible under laboratory conditions ([@B22]; [@B29]; [@B18]). The pendulum test relies on the inherent difference in pod strength measured as 'energy used to rupture pods' \[rupture energy (RE)\] ([@B29]). In *B. rapa* and *B. napus*, loci for pod shatter resistance have been delineated using molecular markers ([@B31]; [@B19]; [@B51]; [@B39]; [@B28]). For example, [@B39] reported that several quantitative trait loci (QTL) on chromosomes A03, A09, A10, and C03 account for genetic variation in shatter resistance in the doubled haploid (DH) population derived from BLN2762/Surpass400 as well as in a diverse panel of 181 lines of *B. napus*. Subsequently, [@B28] identified six significant QTL for resistance to pod shatter located on chromosomes A01, A06, A07, A09, C02, and C05 in a diverse panel of 143 *B. napus* accessions, and bi-parental DH and intermated populations derived from the maternal parent, 'R1' (resistant to pod shattering) and the paternal parent, 'R2' (prone to pod shattering). Both these described studies showed that at least one consistent locus on linkage group A09, which maps in the vicinity of *AUXIN RESPONSIVE REGULATOR 18* (*ARR18*) and MADS-box gene, *SHATTERPROOF (BnShp1)*, controls pod shatter resistance in Australian and Chinese germplasm. Several genes which are involved in a complex regulatory network, such as *SHATTERPROOF1 (SHP1)*; *SHATTERPROOF2 (SHP2)*; *FRUITFULL (FUL)*; *INDEHISCENT (IND)*; *ALCALTRAZ (ALC)*; and *REPLUMLESS (RPL)*, control pod shatter resistance in *Arabidopsis thaliana*, and other heterologous systems ([@B14]; [@B38]; [@B42]; [@B26], [@B25]; [@B6]; [@B16]). Some of these genes such as *IND* and *ALC* interact with various hormonal pathways involved in auxin, gibberellins and ABA biosynthesis and regulate pod shattering ([@B45]; [@B3]). To our best knowledge, loci associated for natural variation for pod shatter resistance in *B. carinata* have not been identified yet. This study aims to (i) characterize genetic variation for pod shatter resistance in *B. carinata* accessions, (ii) identify the QTL associated with pod strength in an F~2~ population and a set of 83 accessions, and (iii) determine the physical location of associated QTL on the *B. nigra* (BB genome), *B. juncea* (AB genome), *B. oleracea* (CC genome), and *B. napus* (AC genome) genomes to identify candidate genes underlying shattering resistance in *B. carinata*. Materials and Methods {#s1} ===================== Plant Materials --------------- A diversity panel of 200 accessions of *Brassica* and related species including *B. carinata* (83), *B. rapa* (90), one accession each of *B. barrelieri*, *B. deflexa*, *B. juncea*, *B. maurorum*, *B. oxyrrhina*, *B. ruvo*, *B. tournefortii*, *E. sativa*, *M. longipetala*, *S. alba*, and *S. erysimoides*, two accessions each of *A. thaliana*, *B. nigra*, *B. napus*, and *S. arvensis* and eight accessions of *B. oleracea* were obtained from the Australian Grains Genebank, Horsham ([@B40]). In addition, the F~2~ population comprising 300 individuals was developed from a single F~1~ cross between BC73526 (shatter resistant with high RE) and BC73524 (shattering prone with low RE) to identify the QTL associated with pod shatter resistance. Both parental lines were selected on the basis of their contrasting rupture energy values among 83 accessions of *B. carinata*. Each F~2~ line was selfed to generate F~2:3~ population to confirm phenotypes. Evaluation for Pod Shatter Resistance ------------------------------------- The diversity panel comprising 200 accessions was grown in white plastic pots (10 inch diameter, Garden Plastic city, Australia) in 2012 and 2013 at the Wagga Wagga Agricultural Institute, New South Wales, Australia. Both trials consisted of a 4 range by 100 row array with two replications. Five plants were grown per pot. Passport data on days to first flowering (first open flower on at least two plants in a pot) were recorded. At maturity, five pods from each plant were collected to evaluate for shatter resistance using the pendulum test as described previously ([@B39]). Pod length from each test sample was measured with a scale excluding the length of 'beak' to adjust the position of the pod when pendulum strikes. In the present study, we only focused on 83 *B. carinata* accessions for pod shatter resistance (**Table [1](#T1){ref-type="table"}**). ###### Natural variation for pod shatter resistance in *Brassica carinata* accessions grown under birdcage conditions in 2012 and 2013. Species AGG accession ID Square root predicted means for RE (mJ) Square root SE Backtransformed predicted means for RE (mJ) Square root predicted means for RE (mJ) Square root SE Backtransformed predicted means for RE (mJ) --------------- ------------------ ----------------------------------------- ---------------- --------------------------------------------- ----------------------------------------- ---------------- --------------------------------------------- *B. carinata* ATC90258 1.99 0.18 3.94 1.59 0.19 2.53 *B. carinata* ATC90259 3.29 0.15 10.82 2.50 0.18 6.27 *B. carinata* ATC90260 2.50 0.22 6.26 2.42 0.25 5.84 *B. carinata* ATC90261 3.10 0.19 9.61 2.73 0.18 7.45 *B. carinata* ATC90262 2.63 0.16 6.94 2.83 0.18 8.02 *B. carinata* ATC90263 1.80 0.34 3.22 1.73 0.18 2.99 *B. carinata* ATC90264 2.94 0.20 8.63 2.38 0.23 5.67 *B. carinata* ATC90265 2.96 0.15 8.73 2.45 0.18 6.01 *B. carinata* ATC90266 2.59 0.15 6.73 2.43 0.18 5.91 *B. carinata* ATC93184-1 2.68 0.15 7.18 2.33 0.18 5.44 *B. carinata* ATC93879 3.02 0.16 9.12 1.93 0.18 3.74 *B. carinata* ATC93881 2.29 0.16 5.22 2.72 0.18 7.37 *B. carinata* BC73524 3.16 0.20 9.96 2.18 0.18 4.77 *B. carinata* ATC93884 2.39 0.20 5.73 2.11 0.18 4.43 *B. carinata* ATC93885 2.24 0.16 5.04 2.02 0.18 4.08 *B. carinata* ATC93886 2.16 0.16 4.68 2.76 0.18 7.62 *B. carinata* ATC93887 2.54 0.16 6.47 2.46 0.18 6.04 *B. carinata* ATC93888 2.08 0.26 4.32 1.95 0.18 3.81 *B. carinata* ATC93889 1.53 0.15 2.33 2.68 0.18 7.21 *B. carinata* ATC93890 3.16 0.22 9.98 2.45 0.19 6.00 *B. carinata* ATC93892 2.28 0.15 5.21 2.29 0.18 5.27 *B. carinata* ATC93895 2.88 0.22 8.28 2.14 0.19 4.58 *B. carinata* ATC93896 2.19 0.25 4.78 1.88 0.18 3.55 *B. carinata* ATC93897 2.26 0.34 5.12 \- \- \- *B. carinata* ATC93898 2.63 0.23 6.91 2.69 0.19 7.24 *B. carinata* ATC93899 2.33 0.34 5.44 2.27 0.19 5.14 *B. carinata* ATC93954 3.08 0.24 9.50 2.94 0.25 8.65 *B. carinata* ATC93969 2.70 0.17 7.31 2.76 0.19 7.59 *B. carinata* ATC93971 3.46 0.15 11.96 3.83 0.18 14.67 *B. carinata* ATC93972 3.29 0.21 10.79 3.05 0.19 9.28 *B. carinata* ATC93973 2.06 0.22 4.24 2.09 0.21 4.35 *B. carinata* ATC93974 2.51 0.17 6.28 2.52 0.20 6.35 *B. carinata* ATC93975 3.52 0.18 12.37 3.16 0.18 10.01 *B. carinata* ATC93976 2.69 0.22 7.24 2.68 0.19 7.19 *B. carinata* ATC93977 2.97 0.18 8.80 2.64 0.22 6.95 *B. carinata* ATC93978 3.27 0.27 10.69 3.26 0.20 10.61 *B. carinata* ATC94009 2.39 0.16 5.73 2.32 0.20 5.37 *B. carinata* ATC94010 2.39 0.15 5.72 2.82 0.18 7.96 *B. carinata* ATC94011 2.56 0.15 6.53 1.96 0.18 3.84 *B. carinata* ATC94023 3.15 0.22 9.92 3.09 0.20 9.55 *B. carinata* ATC94024 2.20 0.34 4.85 2.49 0.25 6.19 *B. carinata* ATC94025 \- \- \- 3.04 0.28 9.24 *B. carinata* ATC94035 3.49 0.20 12.17 3.19 0.22 10.15 *B. carinata* ATC94037 2.91 0.22 8.48 2.72 0.25 7.43 *B. carinata* ATC94039 3.23 0.22 10.40 2.63 0.23 6.92 *B. carinata* ATC94041 2.84 0.27 8.09 3.45 0.20 11.90 *B. carinata* ATC94042 3.28 0.26 10.76 1.91 0.18 3.65 *B. carinata* ATC94043 3.27 0.17 10.70 2.90 0.18 8.41 *B. carinata* ATC94044 2.65 0.15 7.00 2.27 0.18 5.15 *B. carinata* ATC94045 3.29 0.18 10.80 3.02 0.18 9.12 *B. carinata* ATC94046 3.10 0.16 9.63 3.69 0.18 13.63 *B. carinata* ATC94047 3.54 0.15 12.50 3.20 0.19 10.26 *B. carinata* ATC94048 2.66 0.16 7.09 2.64 0.18 6.97 *B. carinata* ATC94049 2.98 0.34 8.91 2.53 0.18 6.38 *B. carinata* ATC94050 2.14 0.34 4.58 2.41 0.20 5.80 *B. carinata* ATC94109 2.96 0.19 8.79 3.12 0.21 9.72 *B. carinata* ATC94111 3.06 0.20 9.37 2.01 0.18 4.03 *B. carinata* ATC94113 2.77 0.20 7.70 3.02 0.25 9.14 *B. carinata* ATC94114 3.32 0.21 11.03 2.41 0.28 5.83 *B. carinata* ATC94116 2.41 0.27 5.83 2.56 0.40 6.56 *B. carinata* ATC94117 2.26 0.22 5.12 2.30 0.18 5.31 *B. carinata* ATC94119 2.85 0.17 8.11 2.89 0.19 8.38 *B. carinata* ATC94120 1.76 0.18 3.08 1.96 0.19 3.84 *B. carinata* ATC94125 2.28 0.16 5.21 2.58 0.18 6.66 *B. carinata* ATC94126 4.01 0.17 16.11 4.44 0.20 19.75 *B. carinata* ATC94134 2.67 0.15 7.15 2.15 0.18 4.64 *B. carinata* ATC94135 2.41 0.15 5.82 1.88 0.19 3.55 *B. carinata* ATC94137 2.46 0.17 6.05 1.80 0.18 3.24 *B. carinata* ATC94138 2.06 0.21 4.26 2.51 0.18 6.30 *B. carinata* ATC94139 2.90 0.16 8.43 1.89 0.18 3.56 *B. carinata* ATC94192 1.91 0.24 3.64 2.05 0.19 4.22 *B. carinata* ATC94409 2.08 0.38 4.33 2.70 0.22 7.30 *B. carinata* ATC94411 2.66 0.34 7.08 2.34 0.21 5.47 *B. carinata* ATC94416 2.82 0.26 7.93 2.45 0.22 6.01 *B. carinata* ATC94427 2.15 0.34 4.60 \- \- \- *B. carinata* ATC94429 3.24 0.22 10.51 2.68 0.18 7.17 *B. carinata* ATC94455 2.27 0.18 5.15 2.22 0.18 4.91 *B. carinata* ATC94457 4.50 0.17 20.26 4.56 0.19 20.82 *B. carinata* ATC94458 4.22 0.15 17.83 4.55 0.18 20.74 *B. carinata* ATC94461 2.46 0.18 6.04 2.45 0.20 5.99 *B. carinata* ATC94463 2.39 0.22 5.73 1.89 0.23 3.58 *B. carinata* ATC95065 2.60 0.19 6.74 2.59 0.20 6.70 *B. carinata* ATC95199 2.17 0.15 4.72 2.16 0.18 4.67 *B. napus* BLN2762 1.68 0.16 2.82 1.47 0.18 2.16 Brassica carinata lines were accessed from the Australian Grains Genebank (AGG), Horsham. B. napus accession, BLN2762 was accessed from the Australian National Brassica Germplasm Improvement Program, Wagga Wagga. Pod shatter resistance was tested with pendulum test and expressed as rupture energy (RE) in Millijoule (mJ). RE values were initially square rooted and then back transformed. SE and -, represent to standard error (SE) and missing data, respectively. The two parental lines and their F~2~ population of 300 plants were grown in 2015 in white plastic pots (10 inch diameter, Garden Plastic city, Australia) under birdcage conditions at the Wagga Wagga Agricultural Institute, New South Wales, Australia. Plants were watered daily, fertilized weekly using in-line liquid fertilizers, and protected from aphids. A total of 71 F~2~ plants showed abnormal phenotypes with flower sterility; these individuals were discarded from genetic analysis. Five pods from 229 F~2~ plants (normal phenotype) were collected in the 50 mL tubes containing a silica sachet for further testing of pod rupture energy. Days to flowering was recorded daily for each F~2~ plant. All 229 F~2~ plants were enclosed with pollination bags to get pure F~3~ progenies, while leaving the primary stem out for the natural pod development for shatter testing. Ten F~3~ plants from 229 F~2~ families were grown in 2016 in a 20 row × 12 column array design including nine controls and two parents at Wagga Wagga. Five pods were collected per F~3~ plant. For validation, 58 F~2:3~ families (29 high RE and 29 low RE) and parents were tested with pendulum test as described earlier ([@B39]). Microscopic Analysis of Pod Anatomy ----------------------------------- Anatomical features of pod DZ were observed in 30 random F~2~ plants and five F~2:3~ progenies from 20 F~2~ plants selected on the basis of their rupture energy (10 each with low RE and high RE). Pods were collected at 35--40 days after anthesis. Hand sections were prepared from one cm from the pedicel end of the pod. Fresh sections were observed for autofluorescence using a fluorescence microscope at the Charles Sturt University, Wagga Wagga. Photographs were taken using a Zeiss Axiphot microscope fitted with a Sony Cyber-shot digital camera. Statistical Analyses of Phenotypic Data --------------------------------------- The rupture energy data of an F~2~ population and of a set of 83 diversity lines were square-root transformed to normalize and further analyzed using ASREML in R. Genotype was considered as a fixed effect and environment as random effects. The estimated means for each genotype were used for further genome-wide association analysis. The correlation between rupture energy in 2012 and 2013 was calculated using Pearson's correlation coefficient. RE of five pods of each F~2~ plant was averaged and used for QTL analysis. DNA Isolation and Genotyping ---------------------------- Young leaf tissue of the field grown plants was collected for DNA isolation. Tissue were ground in liquid nitrogen and extracted using a method described in [@B41]. The diversity panel of 83 *B. carinata* accessions and the F~2~ population comprising 300 lines were genotyped with the genotyping-by-sequencing based DArTseq marker approach ([@B39]) at the DArT P/L, University of Canberra, Australia. Genetic Relatedness and Population Structure -------------------------------------------- In order to determine molecular diversity in *B. carinata*, we genotyped 83 accessions with high-quality DArTseq markers having call rate of ≥90%, ≤5% of missing data and minor allele frequency (MAF) of \>0.05. Hierarchical cluster analysis based on Euclidian distance was conducted using the software, PRIMER 6 ([@B7]). Principal coordinate analysis was performed to understand the global diversity among accessions. Bayesian clustering was performed to infer the number of sub-populations among 83 accessions using the software package STRUCTURE v 2.3.4 ([@B37]). The program was run using admixture model with correlated allele frequencies. The presumed sub-population number (*k*) was set from 1 to 5. Ten runs for each *k* were performed with 20,000 burn in period and 50,000 Markov Chain Monte Carlo iterations per run, with no prior information on the origin of individuals. The best *k* value was determined by using the (i) logarithm likelihood for each *k* \[L(*k*)\], (ii) an *ad hoc* quantity (Δ*k*) according to [@B43] and Δ*k* method described by [@B13], respectively. Genotypes were classified into subpopulations based on their membership coefficients estimated in STRUCTURE. Map Construction and QTL Identification for Pod Shatter Resistance ------------------------------------------------------------------ The linkage map of F~2~ population was constructed using DArT P/L's OCD MAPPING program ([@B34]). Markers were clustered into linkage groups according to the method described by [@B52]. Markers with identical genotypes are placed in redundant bins, and the resulting markers/bins within each linkage group were ordered using the traveling salesman path solver program Concorde ([@B2]). The linkage map was constructed for each parent by combining the relevant *in silico* DArT and SNP markers. A linkage map was chosen to be seed map and then a consensus map was constructed using the markers in common for the complete F~2~ population. Two QTL mapping strategies implemented in software packages, GAPIT in the R ([@B27]) and SVS (Golden Helix, Bozeman, MT, United States) were used to identify loci associated with pod shatter tolerance. For GAPIT analysis, we did not correct population structure using principal components in the F~2~ mapping population. Linear marker regression analysis was performed to determine trait-marker associations in the SVS package. The same approach was also followed to reveal the genome-wide association between DArTseq markers and rupture energy among 83 accessions. For GWAS, we selected a set of 54,034 high quality markers which were genotyped across all accessions. To control spurious trait-marker associations, the first 10 eigenvectors (principal components) were calculated in the SVS package. Cryptic relatedness due to ancestry by descent was controlled with the Identity-by-Decent matrix (K matrix). The Mixed Linear Model ([@B36]; [@B55]) adjusted with K-matrix and population structure matrix with PC1 -- PC10 was used to test the trait-marker associations in the SVS package. The *p*-values were adjusted to control the false discovery rate (FDR) of 5%. The significance threshold was determined by applying Bonferroni correction \[*p* = 0.05/6464 (total of markers mapped): 7.73515E~-06~\]. Trait-markers with significance ≤ log(~10~)*p* of 5.11153 were 'declared' as true associations for pod shatter resistance in an F~2~ population. Manhattan plots were generated in the SVS package. Alignment of Markers with the *Brassica* Reference Genomes ---------------------------------------------------------- The physical map positions of significant markers associated with pod shatter resistance were determined using the reference *B. nigra, B. oleracea*, *B. juncea*, and *B. napus* genomes by BlastN ([@B1]) searches, as detailed in [@B39]. The physical positions of pod shatter resistance genes in *A. thaliana* (accessed from TAIR^[1](#fn01){ref-type="fn"}^) were also determined by searching sequence identities with the reference genomes. The top blast significant hits (≥E^-10^) were considered to infer the putative physical positions of markers/candidate genes on the reference genomes, while blast hits to multiple loci with the same top E value were considered to be unmapped onto the reference genome. Results ======= Phenotypic Variation for Pod Shatter Resistance in *B. carinata* Accessions --------------------------------------------------------------------------- There were significant differences (*p* \< 0.001) within the 83 *B. carinata* accessions tested with respect to pod rupture energy that ranged from 1.52 to 4.5 mJ in 2012, and 1.6 and 4.6 mJ in 2013 (**Figures [1A,B](#F1){ref-type="fig"}**). A positive strong correlation (*r* = 0.69) among accessions evaluated across both the 2012 and 2013 growing environments was observed, indicating that RE is genetically controlled (**Figure [1C](#F1){ref-type="fig"}**). Three *B. carinata* accessions, ATC94126, ATC94457, and ATC94458 had 9.14 to 9.63 times higher RE compared to the *B. napus* control genotype, BLN2762 (**Table [1](#T1){ref-type="table"}**). ![**(A)** Natural variation for pod shatter resistance in 83 accessions of *Brassica carinata* evaluated under 2012 and **(B)** 2013 environments, and **(C)** correlation of rupture energy (RE) scores of 83 accessions evaluated under 2012 and 2013 environments. Pod shatter resistance was measured with pendulum test as RE. RE presented for different accessions are square root transformed.](fpls-08-01765-g001){#F1} Genetic Diversity and Population Structure ------------------------------------------ A set of 54,037 high quality DArTseq markers with call rates of \>90% and a reproducibility of \>95% were selected for genetic diversity and population structure analyses to determine whether shatter resistant sources are genetically diverse (**Table [1](#T1){ref-type="table"}**). Hierarchical cluster analysis based on the Euclidean distance revealed five distinct groups at 60% similarity (**Figure [2A](#F2){ref-type="fig"}**). The cluster I was the largest with 75 accessions, followed by three accessions in cluster II (ATC94120, ATC93973, and ATC94192) and cluster IV (ATC90258, ATC94011, and ATC93888). Both cluster III (ATC94409), and cluster V (ATC94109) contained only one accession (**Figure [2A](#F2){ref-type="fig"}**). The overall genetic diversity among accessions was assessed with PCO analysis (**Figure [2B](#F2){ref-type="fig"}**), which revealed similar clustering. There were four clear groups with the majority of the accessions in cluster I. The first three coordinates (PC1 = 15.9%, PC2 = 5.3%, and PC3 = 4.3%) accounted a total of 25.39% of the genetic variation (**Figure [2B](#F2){ref-type="fig"}**), suggesting a weak population structure. The Bayesian -- based clustering analysis using the maximum likelihood distribution LnP(D) of 83 accessions identified two sub-populations as shown in **Figure [2C](#F2){ref-type="fig"}**. The Wilcoxon test also revealed the presence of two subpopulations. Seventy nine accessions were in sub-population I and four accessions were in sub-population II. The STRUCTURE analysis supported the results of cluster analysis; all 83 accessions were grouped in two clusters at 90% similarity (**Figure [2A](#F2){ref-type="fig"}**). ![Molecular diversity among *B. carinata* accessions revealed by 54,034 DArTseq markers. **(A)** Dendrogram of 83 *B. carinata* accessions based on Euclidean distance. A total of 1,000 bootstraps were performed. Clusters with dotted lines were non-significant at the 5% level of significance. Parental lines, BC73526 and BC732524 are markers with inverted triangle (![](fpls-08-01765-i001.jpg)) and square (![](fpls-08-01765-i002.jpg)), respectively. **(B)** A 3D plots of the first three principal coordinates (PCO) of (PCO1, PCO2, and PCO3) showing distribution of the *B. carinata* accessions. The proportion of variation by these axes is given in *parentheses.* **(C)** Population structure of *B carinata* accessions by STURUCTURE. Each accession is represented by a *vertical bar* (labeled as 1 to 83, representing different accessions; detailed in **Table [1](#T1){ref-type="table"}**). Red and light green color bars represent to two subpopulations I and II, respectively. Number of subpopulations were determined on Δ*k* \[the rate of change of LnP(D)\] as shown in **Supplementary Figure [S1](#SM1){ref-type="supplementary-material"}**.](fpls-08-01765-g002){#F2} Genetic Variation and Inheritance for Pod Shatter Resistance ------------------------------------------------------------ Based on the pod shatter resistance (RE) scores, two single plant selections were made from accessions BC73526 (high RE) and BC73524 (low RE) to generate an F~2~ population, representing cluster I (**Figure [2A](#F2){ref-type="fig"}**). Both parental lines of the F~2~ mapping population from the cross, BC73524/BC73526 differed significantly from each other with respect to pod shatter resistance; the shatter prone, maternal parent (BC73524) had the lower RE of 2.2 mJ^(1/2)^ (4.8 mJ) and the resistant, paternal parent (BC73526) had the higher RE of 4.4 mJ^(1/2)^ (19.8 mJ; **Table [1](#T1){ref-type="table"}**). The F~2~ population showed a continuous distribution of RE scores, ranging from 2.2 to 4.7 mJ^(1/2)^ with the mean score of 2.71 mJ^(1/2)^ (**Figure [3](#F3){ref-type="fig"}**). This was typical for quantitative traits such as pod shattering resistance. In order to validate these F~2~ RE scores, we evaluated the F~2:3~ progenies (Supplementary Table [S1](#S3){ref-type="supplementary-material"}). Our results showed that there was a strong positive correlation (*r* = 0.83) between RE scores of F~2~ plants and their F~2~:~3~ progenies, suggesting that phenotypic scores in F~2~ were accurate. ![Frequency distribution of pod shattering scores (rupture energy) in the F~2~ segregation population, containing 229 individuals, derived from BC73526/BC73524. The average RE scores of the parental lines, BC73526 and BC73524 are indicated by solid arrows.](fpls-08-01765-g003){#F3} Multiple Genes Control Pod Shatter Resistance in *B. carinata* -------------------------------------------------------------- A total of 6,464 markers that showed polymorphism between the parents, and segregated in the complete set of F~2~ population (300 lines) were selected for the genetic linkage map construction (Supplementary Table [S1](#S3){ref-type="supplementary-material"}). All of the mapped markers were assigned to the 17 linkage groups, equivalent of haploid genome of *B. carinata*. Of them, 4,981 marker loci were located on the 8 linkage groups of B~c~ subgenome and 1,483 loci were on the 9 linkage groups of C~c~ subgenome, covering a total genetic distance of 1622.82 cM (**Table [2](#T2){ref-type="table"}**). The marker density ranged from 1.07 (C4) to 7.35 (B01) with an average density of 3.98 cM. Chromosome C5 had the least number of markers (78) as compared to B4 (881). This genetic linkage map was further used for the QTL identification. ###### Summary of segregating markers and their coverage on the linkage genetic map of the F~2~ population derived from the BC73524/BC73526 of *B. carinata*. Chromosome Mapped Map length Average ------------------------------ -------- ------------ --------- B1 835 113.61 7.35 B2 634 128.87 4.92 B3 591 117.05 5.05 B4 881 148.70 5.92 B5 667 130.15 5.12 B6 386 90.28 4.28 B7 445 93.27 4.77 B8 542 141.86 3.82 Subtotal of Bc subgenome 4981 963.80 5.17 C1 120 68.19 1.76 C2 113 36.09 3.13 C3 348 109.79 3.17 C4 94 88.12 1.07 C5 78 26.41 2.95 C6 212 71.98 2.95 C7 130 65.11 2.00 C8 120 82.94 1.45 C9 268 110.40 2.43 Subtotal of the Cc subgenome 1483 659.04 2.25 Total of the B~c~C~c~ genome 6464 1622.842 Mean 380.23 95.46 3.98 LG were assigned to eight chromosomes of the B C subgenome and nine chromosomes of the C C subgenome of B. carinata on the basis of their physical map locations on the reference genomes of B. nigra, B. juncea cv\. Tumida (for the B subgenome), B. oleracea (T1000) and B. napus cv\. Darmor (for the C subgenome). We identified five significant QTL (LOD = 3) associated with pod shatter resistance, *Qpsr.wwai-B1a, Qpsr.wwai-B1b*, *Qpsr.wwai-B3*, *Qpsr.wwai-B8*, and *Qpsr.wwai-C5* in the BC73524/BC73526 population (**Table [3](#T3){ref-type="table"}**, **Figure [4A](#F4){ref-type="fig"}** and Supplementary Table [S1](#S3){ref-type="supplementary-material"}). Two QTL; *Qpsr.wwai-B1a* tagged with the *in silico* DArT marker 5863583, and *Qpsr.wwai-B1b* tagged with DArTseq-SNP marker 5858104\|F\| 0-14:A \> T, were located 7.4 cM apart on chromosome B1. Other three QTL, *Qpsr.wwai-B3*, *Qpsr.wwai-B8*, and *Qpsr.wwai-C5* were identified on chromosomes B3, B8, and C5, respectively (**Table [3](#T3){ref-type="table"}**). Of these, *Qpsr.wwai-B1b* accounted for the maximum (5.27%) of the phenotypic variation and the *Qpsr.wwai-C5* accounted for the least (3.71%). All five QTL explained a total of 23.73% of the phenotypic variation for RE. The shatter resistant parent, BC73526 contributed the favorable allele as envisaged by pod strength, and thus reduced pod shattering in progenies. DArTseq markers were assigned the physical positions on *B. carinata* genome, by comparing their sequence identities with the reference genomes of *B. nigra*, *B. juncea, B. oleracea*, and *B. napus*. Our results showed that the *Qpsr.wwai-B1a, qPSR.wwai-B1b*, *Qpsr.wwai-B3*, *Qpsr.wwai-B8*, and *Qpsr.wwai-C5* were located to the pseudomolecules of B1, B3, B8, and C5, respectively (**Supplementary Figure [S2](#SM2){ref-type="supplementary-material"}** and Table [S2](#S4){ref-type="supplementary-material"}). ###### Quantitative trait loci (QTL) associated with pod shatter resistance in the F~2~ population from the BC73526/BC73524. QTL Highly significant marker Chromosomal location Chromosomal position LOD score *R*^2^ (%) *Brassica* reference genome Physical map position (bp) Nearest candidate gene for pod shatter resistance from significant SNP association Physical distance between SNP and candidate gene (kb) ----------------- ---------------------------- ---------------------- ---------------------- ----------- ------------ ----------------------------- ---------------------------- ------------------------------------------------------------------------------------ ------------------------------------------------------- *Qpsr.wwai-B1a* 5863583 B1 49.8 9.86E-05 5.09 *B. nigra*/CM004491.1"\_B1 19,563,260 *FUL* 63.12 *Qpsr.wwai-B1b* \#5858104\|F\| 0-14:A \> T B1 57.2 7.45E-05 5.27 CM007195.1"\_B1 Unknown *FUL* 8263.23 *Qpsr.wwai-B3* 4119205\|F\|0-39:G \> A B3 58.5 0.0002 4.65 *B. nigra* CM0044931.1"\_B3 32,518,934 *IND* 2493.1 *Qpsr.wwai-B8* 5847615 B8 77.0 0.0001 5.01 *B. nigra*/CM004498.1"\_B8 31,742,473 *RPL* 1131.55 *Qpsr.wwai-C5* 3107471 C5 16.2 0.000832 3.71 *B. oleracea*"\_/C~n~5 11,396,951 *FUL* 454.62 Reference genomes of B. nigra , B. juncea cv\. tumida, version 1.0, B. oleracea (T1000) and B. napus version 4.1, were used for sequence alignments against B. carinata sequences. Details of alignments with the pseudomolecules of B. juncea and B. napus are given in the Supplementary Table S2 . \#Appropriate physical location based on the bin markers. ![Manhattan plots showing **(A)** marker- pod shatter resistance associations and **(B)** marker-pod length associations, in the F~2~ population from BC73524/BC73526 using GAPIT analysis. Highly significant markers are also shown; marker depicted with \>denotes DArTseq SNP markers and without \>symbol denotes *in silico* DArT. The suggestive threshold LOD value (3.0) for trait-marker association is shown as dashed line.](fpls-08-01765-g004){#F4} To establish whether pod length relates to pod shattering, we mapped QTL associated with pod length in the F~2~ population. Our results showed that one significant marker, 5859132\|F\| 0--7:T \> G at QTL (LOD = 3.55) was associated with pod length in the F~2~ population (**Figures [3](#F3){ref-type="fig"}**, **[4B](#F4){ref-type="fig"}**, and Supplementary Tables [S2](#S4){ref-type="supplementary-material"}, [S3](#S5){ref-type="supplementary-material"}). This QTL was identified on chromosome B8 and mapped 1 cM apart from the pod shatter resistance QTL, *Qpsr.wwai-B8*. Two other markers, 5832583 and 5863583 on chromosome B1 also showed association with pod length (LOD scores of 2.7 to 2.9, Supplementary Table [S3](#S5){ref-type="supplementary-material"}). GWAS analysis using 54,034 markers based polymorphisms was performed to verify the alleles for pod shatter resistance in diverse *B. carinata* accessions Although, we used a small number of accessions for this analysis, we found 19 statistically significant SNP associations between markers and pod shatter resistance (RE scores) based on the Bonferroni corrected threshold --log 10(*p*) = 9.25292E^-07^ (Supplementary Table [S3](#S5){ref-type="supplementary-material"}). By controlling type 1 error using kinship coefficients (IBS) and first 10 principal components at least 16 consistent significant associations were identified across both 2012 and 2013 trials with LOD score of ≤5.35 (Supplementary Tables [S3](#S5){ref-type="supplementary-material"}, [S4](#S6){ref-type="supplementary-material"}). Physical Mapping of Significant QTL and Alignment with *Brassica* Reference Genomes ----------------------------------------------------------------------------------- Of 6464 DArTseq markers mapped, the chromosomal positions of 5,080 markers could be linked with the pseudomolecule positions to the published genome sequences of *B. oleracea*, *B. napus, B. juncea*, and *B. nigra* (Supplementary Table [S1](#S3){ref-type="supplementary-material"}). We also anchored several scaffolds which have been unmapped yet to the pseudomolecules of *B. juncea* genome assembly in an F~2~ population. Furthermore, marker sequences targeting QTL were aligned with the sequenced reference B, C and AC genomes and physical intervals harboring candidate genes for pod shatter resistance. Of the seven pod shatter resistance genes of *A. thaliana* searched, *FUL --* a MADS box gene negatively regulated by *APETALA1* (TAIR ID: AT5G60910.1), was located 63.1 kb away from the significant SNP marker, 5863583 on chromosome 1B (**Table [3](#T3){ref-type="table"}**). Other candidate genes were located 0.4 to 8.3-Mbp apart from corresponding QTL regions in the F~2~ population (Supplementary Tables [S4](#S6){ref-type="supplementary-material"}, [S5](#S7){ref-type="supplementary-material"}). We identified 40 GWAS SNP associations (LOD ≤ 3) in the proximity (5.1 kb to 16 Mbp) of genes controlling pod shattering in *A. thaliana*. Of them, three orthologs of *FUL* were located on chromosome B1 (5.1 kb), B6 (97.4 kb) and on the LFLV01001230.1scaffold_28.1 of the reference genome of *B. nigra* (34.69 kb), while two orthologs of *IND* were located on chromosome B1 (53.69 kb) and B2 (96.77 kb). One ortholog of *SHP2* was also identified within 77 kb region of chromosome B5 corresponding to SNP association with 100067358\|F\| 0-31:T \> C marker (Supplementary Table [S5](#S7){ref-type="supplementary-material"}). Pod Shatter Resistance Is Related with Pod Dehiscence Zone Differentiation in *B. carinata* ------------------------------------------------------------------------------------------- Pod structure was observed (40 days after anthesis) under a fluorescence microscope to determine any link between the pod DZ differentiations and shatter resistance in *B. carinata*. The anatomical feature of parents displayed a distinctive difference in the valve margin formation (**Figure [5](#F5){ref-type="fig"}**). The shatter prone parent, BC73524 had the well-developed DZ comprising thin walled parenchymatous cells (**Figure [5a](#F5){ref-type="fig"}**) compared to the shatter resistant parent, BC73526 (**Figure [5b](#F5){ref-type="fig"}**). Thirty randomly selected F~2~ plants exhibited a varied level of DZ development pattern (**Figures [5d](#F5){ref-type="fig"}--[i](#F5){ref-type="fig"}**). For example, there was either clear DZ along the whole valve margin (**Figure [5e](#F5){ref-type="fig"}**), similar to shatter prone parent (**Figure [5a](#F5){ref-type="fig"}**); loss of DZ proximal to the main vascular bundle (mv) as well as near the outer part of the replum (**Figure [5d](#F5){ref-type="fig"}**), similar to the shatter tolerant parent (**Figure [5c](#F5){ref-type="fig"}**); and DZ proximal to the main vascular bundle (mv) but did not extend near the outer part of the replum (**Figure [5h](#F5){ref-type="fig"}**). In *B. napus*, a well-developed DZ was clearly evident (**Figure [5c](#F5){ref-type="fig"}**) similar to the shatter prone *B. carinata* parent, BC73524. ![Anatomical features of dehiscence zone also called abscission layer in parents and F~2~ plants of the BC73524/BC73526. **(a)** BC73524, **(b)** BC73526, **(c)** *B. napus* advanced breeding line, BLN2762 and **(d--i)** F~2~ plants with varying level of dehiscence zone development. Transverse pod section of BC73524 showing well-developed DZ whereas BC73526 showing almost no DZ differentiation. V: valve, VB: vascular bundle of ruplum, en: endocarp, ep: epicarp, me: mesocarp.](fpls-08-01765-g005){#F5} Discussion ========== Considering the commercial value of oilseed *Brassica* crops (*B. napus*, *B. rapa*, and *B. juncea*) worldwide, genetic improvement for pod shatter resistance is of paramount importance to reduce unwanted losses. Despite of limited genetic diversity in *B. carinata* germplasm ([@B21]; [@B17]), several accessions were found to be useful in uncovering genetic variation for resistance to pod shatter (**Table [1](#T1){ref-type="table"}**). For example, we found three accessions which had more than nine times higher pod RE as compared to the *B. napus* control genotype, BLN2762. Genetic variation in these accessions could be harnessed for further genetic improvement of *B. carinata* as well as other *Brassica* species. We determined the pod strength (RE) in *B. carinata* with pendulum test, as a proxy for shatter resistance. This method was found to be reliable and repeatable in determining the extent of pod-shatter resistance and mapping QTL in *B. carinata* (this study, **Table [3](#T3){ref-type="table"}** and Supplementary Table [S4](#S6){ref-type="supplementary-material"}). Similar findings were made in previous studies on genetic variation for pod shatter resistance in *B. rapa* and *B. napus* ([@B22], [@B24]; [@B35]; [@B31]; [@B48]; [@B39]; [@B56]). We revealed that pod shatter resistance is due to multiple genes in the F~2~ population of *B. carinata* derived from the BC73524/BC73526. Multigenic inheritance for pod shatter resistance in *B. carinata* (this study) is consistent with previous findings in *B. rapa* and *B. napus* ([@B31]; [@B51]; [@B39]; [@B28]). In this study, a linkage map of a F~2~ population was constructed utilizing 6,464 DArTseq markers and subsequently used for QTL analysis. The marker density of this linkage map (**Table [2](#T2){ref-type="table"}**) was comparable with the linkage map of a DH population of *B. carinata* derived from YW ([@B57]). The majority of DArTseq markers were linked with the physical positions on the reference genomes of *B. nigra/B. juncea* and *B. oleracea*/*B. napus*. In addition, several scaffolds which were unassembled in the reference *B. juncea* sequence ([@B54]) could be mapped to the linkage map of *B. carinata* population (Supplementary Table [S1](#S3){ref-type="supplementary-material"}). Our results suggested that the reference genomes are useful in anchoring different linkage groups to pseudomolecules and facilitating molecular marker and candidate gene discovery. One of the QTL, *Qpsr.wwai-B1a* delimited with marker 5834957 was mapped to the B1 pseudomolecule of *B. nigra* within 63.12 kb of Arabidopsis *FUL* ortholog (Supplementary Table [S4](#S6){ref-type="supplementary-material"}). [@B33] showed that ectopic expression of the Arabidopsis *FUL* gene in *B. juncea* is sufficient to produce pod shatter resistance, via negative regulation of the valve-margin identity genes ([@B14]). However, the transgenic *B. juncea* fruit produced were too tightly closed. Similar observations were made in this study, the shatter resistant accession BC73526 did not dehisce under natural field conditions and there was no clear separation between valve margin and replum (**Figure [5](#F5){ref-type="fig"}**). A close link between pod shatter resistance and DZ differentiation was observed, the shatter prone and shatter tolerant accessions could be differentiated based on pod anatomy. The shatter prone accession (BC73524) had a well-developed DZ as compared with shatter resistant (BC73526). Similar observations have been made in *A. thaliana*, *B. rapa*, *B. napus*, and *B. carinata* ([@B23]; [@B20]; [@B14]; [@B45]; [@B39]). Several genes; *FUL*, *SHP1*, *SHP2*, *ALC*, *IND*, and *RPL* have been implicated in the development of the valve-margin separation layer, and lignification of the endocarp layer ([@B11]). [@B16] showed that homozygous *braA.ind.a* mutants showed a clear loss of valve margin formation in *B. rapa* and *B. oleracea.* The marker 5834957 at *Qpsr.wwai-B1a* also showed the complete linkage with other loci; 5861424, 5832583, 5843024, 5854441, 5842255, 5843155, and 5849931. These markers were mapped at the 49.81 cM of the F~2~ map and showed significant sequence identities with the A09 reference genome sequence of *B. juncea* (coordinates 6,440,430 to 7,118,167 CM007193.1_chromosome_A9, coordinate 6480570bp, 1.84E-25) (Supplementary Table [S1](#S3){ref-type="supplementary-material"}). In previous studies, a major QTL for pod shatter resistance was located on chromosomes A09/C08, in the vicinity of *SHATTERPROOF* gene in *B. napus* populations ([@B19]; [@B39]; [@B28]). We searched the *SHP1* and *SHP2* orthologs in the reference genome of *B. juncea*. One of the *SHP1* homologs was mapped ∼35 Mb away from the highly significant SNP marker 5834957 on pseudomolecule A09 of *B. juncea* \[sequence identity = 323 bits (163), Expect = 3e-86, 211/227 (92%); coordinates 45,984,225 to 45983999 (Supplementary Table [S4](#S6){ref-type="supplementary-material"})\]. While, one of the six *SHP2a* (JQ973082.1 *B. napus SHATTERPROOF* mRNA) homologs was located in the vicinity of the highly significant SNP marker 5834957 on chromosome B1/A09 \[313 bits, score: 2e-83, Identities = 176/182 (96%)\]. In addition to *SHP2* and *FUL*, other genes controlling pod shatter resistance such as *IND* were also mapped near the statistical significant marker associations (**Table [3](#T3){ref-type="table"}**), suggesting the markers identified for pod shatter resistance herein are reliable. Conclusion ========== We mapped QTL controlling pod shatter resistance in *B. carinata* and identified sequence-based molecular markers. These trait-marker associations with respect to reference genomes of *B. napus*, and *B. juncea* could also pave the way for delineation of pod shatter resistance QTL involved in natural variation, map-based cloning of those QTL and unravel the molecular architecture of pod shatter resistance genes in natural germplasm of *B. carinata*. In addition, molecular markers identified herein will enable us to trace the introgression of pod shatter resistance alleles for strategic improvement of *B. carinata*, *B. napus*, and other related species. Previous studies have reported that there is limited genetic variation for pod shatter resistance in the natural *B. napus* germplasm ([@B5]; [@B39]). Several research groups around the world are currently using *B. carinata* to expand the narrow genetic base of *B. napus* germplasm ([@B9]; [@B10]). In this study, only one QTL, *Qpsr.wwai-C5* was identified on the C subgenome of *B. carinata* (chromosome C05), while other QTL were identified on the B subgenome (B1, B3, and B8). Previous studies have shown that fertile plants of *B. napus* carrying B genome introgressions can be generated ([@B32]; [@B10]). It remains to be established whether B and C genome derived lines exhibit pod shatter resistance expression or get silenced in the resynthesized *B. napus* ([@B53]). Nevertheless, our results provide valuable information on donor sources for pod shatter resistance, genetic inheritance, genetic map location of QTL, and associated markers for marker-assisted selection. The markers identified in this study can be assayed on any sequencing platform and/or converted into simple KASP assay for high throughput analysis. Author Contributions ==================== RR and HR designed the study, and prepared the manuscript. RR developed F~2~ and F~3~ populations, conducted the experiments and analyzed the data. NC designed the field trials and RR and NC analyzed the data, YQ assisted in phenotyping, performed pod anatomy, and DNA extractions. AK and JS aligned DArTseq data with the reference genomes. All authors reviewed and edited the manuscript. Conflict of Interest Statement ============================== AK is the director of Diversity Arrays Technology Pty Ltd. and JS was employed by Diversity Arrays Technology Pty Ltd. All other authors declare no competing interests. **Funding.** We thank the Grains Research and Development Corporation and NSW DPI for the investment made to support this research under the project, DAN00208. Authors thank Dr. Bob Redden, Australian Grains Genebank, Horsham, Australia for providing the *B. carinata* accessions, Ms. Louisa Slinger and Mr. John Bromfield for pendulum testing. <https://www.arabidopsis.org> Supplementary Material ====================== The Supplementary Material for this article can be found online at: <https://www.frontiersin.org/articles/10.3389/fpls.2017.01765/full#supplementary-material> ###### Click here for additional data file. **FIGURE S1 \|** Analysis of the population structure of 83 *B. carinata* accessions. The likelihood values \[Ln(P(D\] for each successive K. ###### Click here for additional data file. ###### Click here for additional data file. **FIGURE S2 \|** Manhattan plots showing marker-pod shatter resistance associations in the F~2~ population using the SVS package. A linear markers regression analysis was performed to identify loci associated with pod rupture energy. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. ###### Click here for additional data file. [^1]: Edited by: *Maoteng Li, Huazhong University of Science and Technology, China* [^2]: Reviewed by: *Yan Long, Chinese Academy of Agricultural Sciences, China; Liezhao Liu, Southwest University, China* [^3]: This article was submitted to Crop Science and Horticulture, a section of the journal Frontiers in Plant Science
// Copyright (c) 2017 Uber Technologies, Inc. // // Permission is hereby granted, free of charge, to any person obtaining a copy // of this software and associated documentation files (the "Software"), to deal // in the Software without restriction, including without limitation the rights // to use, copy, modify, merge, publish, distribute, sublicense, and/or sell // copies of the Software, and to permit persons to whom the Software is // furnished to do so, subject to the following conditions: // // The above copyright notice and this permission notice shall be included in // all copies or substantial portions of the Software. // // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN // THE SOFTWARE. package main import ( "github.com/m3db/m3/src/cmd/services/m3em_agent/agentmain" ) func main() { agentmain.Run() }
Breitenstein (mountain) Breitenstein is a 1,622 m high mountain of the Bavarian Prealps. Normal routes The most common route is from Fischbachau to the Kesselalm continuing via the Hubertushütte to the summit. Category:Mountains of Bavaria Category:Mountains of the Alps
Q: Can we change status of jira ticket on bamboo deploy. Not on bamboo build There is this following link: https://confluence.atlassian.com/bamboo/integrating-builds-with-your-issues-workflow-750396089.html But this seems specific to when the build happens. We would like to do this when the deploy happens. But this seems very specific to the build. Is there some way to accomplish updating jira tickets on deploy? A: Yes, you can. Short answer: Install 'Pre-Post Build Command Runner' on Bamboo (https://marketplace.atlassian.com/plugins/com.sysbliss.bamboo.plugins.prepost-build-command/server/overview) Add two stages to your build: a 'build stage and a 'deployment' stage Add a job to the 'build' stage with tasks that package the files you want to deploy to an artifact Add a job to the 'deployment' stage with tasks that send the artifact to your server of choice and unpack it there Open JIRA, go to your workflows, open the desired workflow in text mode and note/write down the respective transition id (you can find it in brackets to the right of the transition name) Assuming that your build is triggered by a commit to your repository with a respective JIRA issue key in commit message (e.g. JIRA-123): Write a script that polls your repository, gets the message of the last commit in a desired branch, extracts the respective JIRA issue key from it and writes it down in a .txt file. Save it on your Bamboo server with a distinct name. Write a script that reads your .txt file, extracts issue key from there, sends a POST request to JIRA API with respective transition id and issue key. Save it on your Bamboo server with a distinct name. Go to your Bamboo build configuration, open the 'build' stage, open the 'miscellaneous' tab, enter the location of the first script in the 'Command' line of the 'Pre Build Commands' section, tick 'Run on Bamboo Server' and press 'Save'. Go to your Bamboo build configuration, open the 'deployment' stage, open the 'miscellaneous' tab, enter the location of the second script in the 'Success Command' line of the 'Post Build Commands' section, tick 'Run on Bamboo Server' and press 'Save'. Make sure both Bamboo and JIRA are authenticated to mess with one another. You can set up the credentials in JIRA and Bamboo settings under 'Application links'. It took me about 15 hours to figure it out. The in-built 'Builds workflow' didn't transition my issue statuses and the answer to my question to Atlassian support is still pending. Some hints (assuming your Bamboo runs on Linux): Installing 'Pre-Post Build Command Runner' a. Log onto your Bamboo server and navigate to Bamboo plugins directory: cd ~/atlassian-bamboo-X.X.X/atlassian-bamboo/WEB-INF/lib b. Download 'Pre-Post Build Command Runner': wget https://marketplace-cdn.atlassian.com/files/artifact/3f77baa2-8624-4a80-9b5d-1f6029fc1133/prepost-build-command-5.6.3.jar c. Restart Bamboo cd ~/atlassian-bamboo-5.9.7/bin ./stop-bamboo.sh ./start-bamboo.sh d. Go to 'Bamboo Administration/Add-ons' and click 'Pre-Post Build Command Runner' under 'User-installed add-ons' e. Check that all its modules are enabled (it should say 'X of X modules enabled') Configuring scripts a. Install jq sudo apt-get install jq b. Script for polling your repository (assuming it's Bitbucket) #!/bin/bash message=$(curl --user <bitbucket-username>:<bitbucket-password> https://bitbucket.org/api/1.0/repositories/<bitbucket-username>/<bitbucket-repository>/branches/ | jq '.<branch-name>.message') message="${message%\"}" message="${message#\"}" IFS=' ' read -a array <<< $message issue=${array[0]} echo $issue > issue.txt c. Script for JIRA issue transition #!/bin/bash issue=$(<issue.txt) curl -D- -u <jira-username>:<jira-password> -X POST --data '{"transition":{"id":"<transition-id>"}}' -H "Content-Type: application/json" https://<jira-base-url>/rest/api/latest/issue/$issue/transitions?expand=transitions.fields rm issue.txt Things to keep in mind: a. Make sure both scripts are in the same location b. Make sure to run 'chmod +X ' on both scripts c. Make sure that JIRA issue key is included first in the commit message, e.g. 'JIRA-123 added some stuff' d. Make sure to disable concurrent builds in Bamboo in case there's a chance another developer might push a commit to repository when your build is running P.S. I intentionally included two stages, 'Build' and 'Deployment', in a build plan so that you can build on top of the two scripts and add intermediary scripts (e.g. post a comment to respective JIRA issue when the 'Build' stage passes or fails) P.P.S I had to strip down my scripts to make this answer shorter, so there might be some mistakes. In case the scripts do not work, please, feel free to tell me about that in comments and I'll see what's broken. UPDATE: Atlassian did answer my question of why Bamboo won't transition my JIRA ussue statuses in the following way: I'm afraid the functionality, to autotransition an issue based on the Bamboo build result, is only available if you have Bamboo Cloud + JIRA Cloud. We do have requests open to have this feature with Bamboo server https://jira.atlassian.com/browse/BAM-1362 and https://jira.atlassian.com/browse/BAM-14044 I encourage you to vote or comment on these requests to increase their visibility.
Alex Dunn and John Dagdelen have a smashing bet going: Who will break their phone first? “I have the beefiest case money can buy,” says Mr. Dunn, 23 years old. “He walks around with a phone not in a case, which is kind of bonkers. I said, ‘Dude, you’re going to break your phone.” Mr. Dagdelen says that will never happen. Like Nik Wallenda...
Metallurgical Coal Testing As part of our extensive coal analysis service, Standard Labs features metallurgical coal testing. Metallurgical coal (or coke) is a high-ash coal derivative widely used in the iron and steel industries, where it plays a big role in metal smelting. Our commitment to high-quality metallurgical coal testing and analysis is an extension of our commitment to meeting the needs of the coal and mining process industries nationwide. We use a range of chemical and petrographic processes, such as pilot scale carbonization testing, to assess metallurgical coke quality and provide our clients with a comprehensive analysis of their sample. With the most skilled lab technicians in the field and over 50 years of experience, Standard Labs is pleased to staff over 35 labs in the US. To learn more about our metallurgical coal testing services, please contact us for more information.
Chile at the 2010 Winter Olympics Chile competed in the 2010 Winter Olympics in Vancouver, British Columbia, Canada. Alpine skiing Men Women Earthquake in Chile On 27 February 2010, an 8.8 magnitude earthquake struck Chile. As a result, Chilean athletes Jorge Mandrú and Maui Gayme chose not to take part in the closing ceremony out of respect for the victims of the earthquake. Noelle Barahona, the only athlete to remain at Vancouver, carried the flag at the closing ceremony. See also Chile at the Olympics Chile at the 2010 Winter Paralympics Notes and references Notes References Category:Nations at the 2010 Winter Olympics 2010 Category:2010 in Chilean sport
--- abstract: 'We have measured the equivalent width of the H$\alpha$ emission line for 11006 galaxies brighter than $M_b=-19$ ($\Omega_\Lambda=0.7$, $\Omega_m=0.3$, $H_0=70\kmsmpc$) at $0.05<z<0.1$ in the 2dF Galaxy Redshift Survey (df), in the fields of seventeen known galaxy clusters. The limited redshift range ensures that our results are insensitive to aperture bias, and to residuals from night sky emission lines. We use these measurements to trace $\mu^\ast$, the star formation rate normalized to $L^\ast$, as a function of distance from the cluster centre, and local projected galaxy density. We find that the distribution of $\mu^\ast$ steadily skews toward larger values with increasing distance from the cluster centre, converging to the field distribution at distances greater than $\sim 3$ times the virial radius. A correlation between star formation rate and local projected density is also found, which is independent of cluster velocity dispersion and disappears at projected densities below $\sim 1$ galaxy (brighter than $M_b=-19$) per Mpc$^{2}$. This characteristic scale corresponds approximately to the mean density at the cluster virial radius. The same correlation holds for galaxies more than two virial radii from the cluster centre. We conclude that environmental influences on galaxy properties are not restricted to cluster cores, but are effective in all groups where the density exceeds this critical value. The present day abundance of such systems, and the strong evolution of this abundance, makes it likely that hierarchical growth of structure plays a significant role in decreasing the global average star formation rate. Finally, the low star formation rates well beyond the virialised cluster rule out severe physical processes, such as ram pressure stripping of disk gas, as being completely responsible for the variations in galaxy properties with environment.' author: - | Ian Lewis$^{1,2}$, Michael Balogh$^{3}$, Roberto De Propris$^{4}$, Warrick Couch$^{4}$, Richard Bower$^{3}$, Alison Offer$^{2}$, Joss Bland-Hawthorn$^2$, Ivan K. Baldry$^{5}$, Carlton Baugh$^{3}$, Terry Bridges$^2$, Russell Cannon$^2$, Shaun Cole$^3$, Matthew Colless$^6$, Chris Collins$^7$, Nicholas Cross$^{6,8}$, Gavin Dalton$^1$, Simon P. Driver$^{6,8}$, George Efstathiou$^9$, Richard S. Ellis$^{10}$, Carlos S. Frenk$^3$, Karl Glazebrook$^2$, Edward Hawkins$^{11}$, Carole Jackson$^{6}$, Ofer Lahav$^9$, Stuart Lumsden$^{12}$, Steve Maddox$^{11}$, Darren Madgwick$^{9}$, Peder Norberg$^3$, John A. Peacock$^{13}$, Will Percival$^{13}$, Bruce A. Peterson$^6$, Will Sutherland$^{13}$, Keith Taylor$^{10}$\ $^{1}$Astrophysics, Nuclear and Astrophysics Laboratory, Keble Road, Oxford OX1 3RH, UK\ $^{2}$Anglo-Australian Observatory, P.O. Box 296, Epping, NSW 1710, Australia\ $^{3}$Department of Physics, University of Durham, South Road, Durham DH1 3LE, UK\ $^{4}$School of Physics, University of New South Wales, Sydney 2052, Australia\ $^{5}$Department of Physics and Astronomy, Johns Hopkins University, 3400 North Charles Street, Baltimore, MD 21218-2686 USA\ $^6$Research School of Astronomy & Astrophysics, The Australian National University, Weston Creek, ACT 2611, Australia\ $^7$Astrophysics Research Institute, Liverpool John Moores University, Twelve Quays House, Egerton Wharf, Birkenhead, L14 1LD, UK\ $^{8}$School of Physics and Astronomy, University of St. Andrews, North Haugh, St Andrews, Fife KY16 9SS, UK\ $^9$Institute of Astronomy, University of Cambridge, Madingley Road, Cambridge\ $^{10}$California Institute of Technology, Pasadena, CA, 91125-2400, U.S.A.\ $^{11}$School of Physics and Astronomy, University of Nottingham, University Park, Nottingham, NG7 2RD, UK\ $^{12}$Department of Physics & Astronomy, E C Stoner Building, Leeds LS2 9JT, UK\ $^{13}$Institute of Astronomy, University of Edinburgh, Royal Observatory, Edinburgh EH9 3HJ, UK\ bibliography: - 'ms.bib' title: 'The 2dF Galaxy Redshift Survey: The environmental dependence of galaxy star formation rates near clusters' --- galaxies: clusters Introduction ============ The effect of local environment on galaxy evolution in general is not well understood. Studies of environmental effects in the past have been largely devoted to the study of galaxies in the cores of rich clusters, which differ so dramatically from more common galaxies [e.g. @Dressler; @DTS; @CS87; @B+97; @PSG; @P+99; @MW00; @C+01; @Solanes01]. However, galaxies in cluster cores comprise only a small fraction of the stellar content within the universe, and thus it is not obvious that the processes which effect these galaxies are important for galaxy evolution in general. More recently, however, work has begun to show that star formation is suppressed in cluster galaxies far from the core. From the CNOC1 cluster sample, @B+97 [@B+98] found that the mean cluster galaxy star formation rate may be suppressed as far as twice the virial radius ($R_v$) from the cluster centre, relative to a field sample selected in the foreground and background of the clusters. However, the data at large radii were sparse, and being derived from only a few clusters were sensitive to the effects of substructure and non-sphericity. Thus it is not possible to draw strong conclusions about the relative cluster galaxy star formation rate beyond the $R_v$ from these data. Wide field photometric analysis of clusters using Subaru has recently suggested that the tight red sequence of early type galaxies first presents itself in small groups of galaxies within the infall region of the massive cluster Cl0939+47 at $z=0.39$ [@Kodama_cl0939]. This is the first work to suggest that a “critical” environment for galaxy evolution exists. A larger survey, designed specifically to study the outer regions of clusters is the Las Campanas/Anglo Australian Observatory Rich Cluster Survey (LARCS), a sample of 17 rich, X-ray bright clusters, with photometry and spectroscopy extending out to very large radii ($\sim 6$ Mpc). Early results confirm the radial gradient in photometric and spectroscopic properties out to the virial radius and, perhaps, beyond [@OHely; @kap1; @kap2]. It therefore seems likely that galaxy star formation rates are reduced before they are accreted by a cluster, for example in smaller groups. If this is the case, the implications could be profound, as most galaxies at the present day are in groups [@TG72; @Cfa3; @Tully87; @CNOC_groups]; if environmental processes are important in these regions, they will clearly be reflected in the evolution of the universe as a whole. As structure builds up in the universe, more and more galaxies can be found in groups and, if these environments serve to terminate star formation, the mean star formation rate of the universe will decline. This might explain at least part of the observed decline in global star formation with cosmic time [@L96; @Madau; @Cowie+99]. The 2dF galaxy redshift survey (df) allows the unprecedented opportunity to study the spectroscopic properties of galaxies at an arbitrarily large distance from any given cluster. The details of the survey strategy are given elsewhere [@2dF_colless], but summarized briefly in Section \[sec-specdat\]. Analysis of the whole sample will allow a definitive study of any correlation between spectral properties (i.e. emission line strength) as a function of a continuous variable like local density. For this preliminary study, we are specifically interested in establishing precisely where galaxies in the vicinity of known clusters begin to exhibit properties which differ from those of the average galaxy. We base this on a sample of 17 known rich clusters within the df, from the catalogue of @deP_clus. Our cluster selection, galaxy sample, and star formation rate measurements are described in Section \[sec-data\]. In Section \[sec-results\] we show the trend of increasing star formation activity with both increasing cluster-centric distance, and decreasing local projected density. This is compared with numerical models in Section \[sec-discuss\]. We summarize our findings in Section \[sec-conc\]. Throughout this paper, we use a cosmology with $\Omega_\Lambda=0.7$, $\Omega_m=0.3$, $H_0=70\kmsmpc$. We use the symbol $M_b$ to denote absolute magnitudes measured in the 2dFGRS photographic blue system. Data Analysis {#sec-data} ============= Spectroscopic Data {#sec-specdat} ------------------ The 2dF Galaxy Redshift Survey has obtained over 220000 spectra of galaxies located in two contiguous declination strips, plus 99 randomly located fields. One strip is in the southern Galactic hemisphere and covers approximately 80${^\circ}\times15{^\circ}$ centred close to the SGP. The other strip is in the northern Galactic hemisphere and covers 75${^\circ}\times10{^\circ}$. The 99 random fields are located over the entire region of the APM galaxy catalogue in the southern Galactic hemisphere outside of the main survey strip. Full details of the survey strategy are given in @2dF_colless. The survey spectra cover the wavelength range 3600–8000Å at 9Å  resolution. Only the wavelength range of 3600–7700Å is used during the line fitting procedure due to poor signal to noise and strong sky emission in the red part of the spectrum. The wide wavelength range is made possible by the use of an atmospheric dispersion compensator (ADC) within the 2dF instrument [@2dF]. Cluster Selection ----------------- We select 17 clusters from the catalogue of @deP_clus, in which clusters from the Abell catalogues [@A58; @ACO], the APM [@APM] and the EDCC [@EDCC] were cross-referenced with the df. This catalogue is still partially incomplete, but the completeness is generally better than 75% within $\sim 5$ Mpc of the cluster centres. The mean redshift and velocity dispersions of the clusters in this catalogue have been recomputed from the df spectra, and the cluster centroid is taken to be the brightest cluster galaxy with early-type morphology, identified from POSS plates. For this analysis, we extract from the df all galaxies within $\sim20$ Mpc of the centre of 17 clusters, selected to lie at $18\,000\;{\rm km\,s}^{-1}<cz<29\,000\;{\rm km\,s}^{-1}$. The lower velocity bound is chosen to limit the angular size to a reasonably small, manageable value; the upper limit is defined as the velocity at which H$\alpha$ is redshifted into the first set of strong night-sky OH emission lines. Ten clusters were selected to have velocity dispersions $\sigma>800$ km/s, while the remaining seven are systems with $400$ km s$^{-1}$$<\sigma<800$ km s$^{-1}$. The redshift histograms for the 17 clusters, including all galaxies brighter than $M_b=-19$ within 5 Mpc (projected) of the centre, are shown in Fig. \[fig-himass\]. Details of the clusters, including their redshifts ($cz$), velocity dispersions ($\sigma$), number of cluster members brighter than $M_b=-19$, and completeness (within 5 Mpc), are summarized in Table \[tab-clus\]. @deP_clus resolved Abell 1238 into two clusters aligned along the line of sight; we here consider the lower redshift cluster, designated Abell 1238L. The cluster centres and velocity dispersions are generally better determined than they appear in Fig. \[fig-himass\], as they are computed including fainter galaxies over a smaller projected area (where the contrast with the field is greater). [lcccccccc]{} Name & R.A.  & Dec.  & $cz$ & $N_{\rm mem}$&$\sigma$& Completeness& $R_v$ & $R_v$ (alt.) & 2[(B1950)]{} & (km s$^{-1}$)& &(km s$^{-1}$)&(within 5 Mpc)&(Mpc)&(Mpc) S0258&02:23:33.21&$-$29:50:26.9&18060&31&583&0.72&1.6&1.9ED652&02:25:11.88&$-$29:51:00.7&18001&21&564&0.75&1.4&1.8A3094&03:09:16.42&$-$27:07:08.4&20475&63 &774&0.84&2.0&2.4S0333&03:13:04.34&$-$29:25:41.3&20042&40 &998&0.90&1.6&3.2S0340&03:17:55.68&$-$27:11:45.6&20281&18 &939&0.87&1.2&3.0A0933&10:05:14.50&+00:45:25.7&29180&72 &420&0.54&2.4&1.3A0954&10:11:11.10&+00:07:40.2&28622&74 &832&0.77&2.2&2.5A1189&11:08:30.14&+01:21:42.6&28824&51 &814&0.77&1.9&2.5A1200&11:10:03.25&$-$02:56:27.6&24970&38 &825&0.83&1.7&2.6A1238L&11:20:20.36&+01:23:19.4&22160&53 &586&0.82&1.9&1.8A1620&12:47:29.78&$-$01:16:07.1&25513&51 &1095&0.89&1.8&3.4A1651&12:56:47.48&$-$03:55:36.9&25152&46 &817&0.47&2.1&2.5A1663&13:00:18.05&$-$02:14:57.7&24827&75 &884&0.80&2.1&2.7A1692&13:09:41.25&$-$00:39:59.7&25235&49 &686&0.80&1.8&2.1A1750&13:28:36.52&$-$01:28:15.9&25647&83 &981&0.62&2.4&3.0ED119&22:13:32.57&$-$25:55:10.7&25546&38 &1112&0.84&1.7&3.4S1086&23:02:06.51&$-$32:49:14.8&25605&74 &502&0.53&2.4&1.5 H$\alpha$ measurements {#sec-measure} ---------------------- All of the measurements of equivalent width have been performed using a completely automatic procedure. For each spectrum we remove the continuum by subtracting the median over a 133Å (31 pixel) wide window after first excluding known absorption and emission line regions by making use of the known galaxy redshift. Bad pixels and sky line residuals and the atmospheric and fibre absorption bands are also excluded from the continuum fitting. Both emission and absorption lines are fitted with Gaussian profiles which are adequate for most of the emission lines and cores of the absorption lines. Up to 20 individual absorption and emission lines are fitted simultaneously using a modified Levenberg-Marquardt algorithm. The width and height of each line are fitted together with a small perturbation of the observed redshift. Some lines were constrained to be emission or absorption. Others were allowed to be either. Note that the relative wavelength spacing of all lines remains fixed, but the fitted redshift is allowed to vary slightly (typically $\Delta z \sim 0.00025$, and always $\Delta z < 0.005$). By fitting many lines simultaneously we avoid individual line fits shifting to the nearest available peak or dip in the spectrum. By fitting both absorption and emission lines we ensure that the method is robust to the redshift solution whatever type of spectrum is being fitted. With this technique of simultaneous line fitting it is possible to allow for line blends by simply requesting two or more lines to be fitted to the blend. For example H$\beta$ is best fitted by a combination of a narrow emission and a broad absorption line, and the H$\alpha$ emission line can be accurately deblended from the adjacent \[N[ii]{}\]$\lambda6548$Å and \[N[ii]{}\]$\lambda$6583Å lines, despite the 9Å resolution of the spectra. The \[N[ii]{}\] lines are constrained to be in emission while the H$\alpha$ line may be either emission or absorption. To fit the Gaussian profile to the data points a consideration has to be made for the effect of the undersampling of the data. The solution is to model a Gaussian profile which, when undersampled, fits the observed data closely. Fig. \[fig-ijl\] shows the resulting fit for four spectra with varying \[N[ii]{}\]/H$\alpha$ ratios, and demonstrates the effect of the undersampling. After line fitting, the parameters of the fit (amplitude, sigma and area) and the rms residuals are used to classify the quality of the line fit. Usual reasons for rejecting a fit are if the line is too narrow (e.g. a noise spike or residual cosmic ray hit), or too broad (for a forbidden line). Some combinations of lines are also rejected, for example H$\alpha$ absorption combined with \[N[ii]{}\] emission. Lines which are too weak for a good fit are also flagged; however they are not rejected from the analysis, so that we retain a dispersion in the flux which reflects the measurement uncertainties. Partial failures are flagged often due to large rms residuals to the fit (broad non-thermal emission lines are poorly fitted by Gaussian profiles) or a poor wavelength calibration at the blue end of the spectrum, which can lead to a poor line profile for \[O[ii]{}\]. The latter is usually the case when the observed spectrum was close to the edge of the CCD. Care is also taken when a bad pixel has been masked out from the spectrum within 2$\sigma$ of the line centroid. Equivalent widths are then simply calculated using the continuum fit and the measured line flux. A small number of spectra are degraded by poor sky subtraction at the data reduction stage, which can result in a negative continuum, making the EW meaningless. These cases can be easily removed from subsequent analysis. Sample Selection and Star formation Rates {#sec-sample} ----------------------------------------- df spectra within 20 Mpc of each cluster centre were extracted from the database. The extreme ends of spectra taken earlier than August 1999 are severely affected by problems with the ADC [@2dF]; hence we restrict our analysis to data taken after this date. This leaves us with 53018 galaxies, but to limit the effect of aperture bias and sky-subtraction residuals, we restrict the sample to those galaxies which lie within $0.05<z<0.1$. Within this redshift range, the galaxy sample is complete to $M_b=-19$, and we adopt this as our luminosity limit. This leaves us with 12020 galaxies. For computations of star formation rates, we exclude galaxies in which the continuum was negative, or a Gaussian was a poor fit to the line (see Section \[sec-measure\]). This removes an additional 734 galaxies from the sample ($\sim 6$%). Finally, for galaxies with a significant H$\alpha$ equivalent width ($W_{\rm H\alpha}>10$ Å) we exclude galaxies in which the equivalent width of the adjacent \[N[ii]{}\]$\lambda$6583 line is greater than 0.55$W_{\rm H\alpha}$. These 280 galaxies (2.3% of the sample) are likely to have a significant non-thermal component [@VO87]. This leaves us with a final sample of 11006 galaxies. We take cluster members to be those within 3$\sigma$, where $\sigma$ is the cluster velocity dispersion determined by @deP_clus, shown in Table \[tab-clus\]. The number of such members within the virial radius (see below) is denoted $N_{\rm mem}$ in the table. Note that for the three highest redshift clusters A0933, A0954 and A1189, the highest velocity members are not included due to our overall redshift cut ($0.05<z<0.1$); however, all galaxies within 2$\sigma$ are still available. 5829 galaxies in our final sample are thus defined as cluster members. @K83 [@K92] derived a conversion from H$\alpha$ luminosity to star formation rate, under the assumptions of Case B recombination, no escape of Lyman-$\alpha$ photons, and a Salpeter-like initial mass function. This may underestimate the current star formation rate by a small factor, due to extinction in the line-emitting regions [@CL]. Also, if the nature of star formation is burst-like, the instantaneous star formation rate may not be representative of the average over even short ($\sim 100$ Myr) timescales [@S+01]. However, neither of these effects are likely to affect a comparison of galaxy populations with similar luminosity functions, as is the case in the present work. Since the df spectra are not flux calibrated, we cannot derive H$\alpha$ luminosities, or star formation rates. However, after making a small (2Å) correction for the underlying stellar absorption, we can use the equivalent widths to calculate the star formation rate normalised to a fiducial luminosity (essentially a star formation rate per unit normalized luminosity). If $\mu$ is the star formation rate in units of $M_\odot$ yr $^{-1}$ and $L_{\rm H\alpha}$ is the total luminosity of the $H\alpha$ emission line in ergs s$^{-1}$, we can define $$\eta=\mu/L_{\rm H\alpha}.$$ We will use the “average” conversion factor of $\eta=7.9\times10^{-42}$ $M_\odot$ s yr$^{-1}$ ergs$^{-1}$[@K92]. The equivalent width of H$\alpha$, corrected for stellar absorption, is given by $$W_{\rm H\alpha}\approx L_{\rm H\alpha}/L_c,$$ where $L_c$ is the continuum luminosity in units of ergs s$^{-1}$Å$^{-1}$. We can then calculate $\mu^\ast$ as $$\mu^\ast = {\mu\over L_c/L^\ast}=\eta W_{\rm H\alpha} L^\ast,$$ where $L^\ast$ is a characteristic luminosity, for normalisation, in units of ergs s$^{-1}$Å$^{-1}$. We take $L^\ast$ to correspond to the knee in the luminosity function in the $r^\prime$ band (near rest-frame H$\alpha$), as determined by @Sloan_lf, $M_R=-21.8$ ( $\Omega_\Lambda=0.7$, $\Omega_m=0.3$, $h=0.7$), or $L^\ast=1.1\times10^{40}$ ergs s$^{-1}$Å$^{-1}$. Therefore, we have $$\mu^\ast = 0.087 W_{\rm H\alpha},$$ which gives the star formation rate, in units of $M_\odot$yr$^{-1}$, normalized to $L^\ast$. We measure the projected distance of each galaxy from the cluster, as defined by the brightest central galaxy. In some cases the cluster membership of a galaxy is ambiguous, because it lies within 20 Mpc and the 3$\sigma$ redshift limits of more than one cluster (e.g. clusters S0258 and ED652). In this case, the galaxy is assumed to belong to the cluster which is nearest in projected distance. In order to put all the clusters (which span more than a factor of two in velocity dispersion) on a common scale, and to facilitate comparison with theory, we need to relate projected distances to the virial radius, $R_v$, of the cluster. We show the spatial distribution of the cluster members within 1 degree of the centre for each cluster in Fig. \[fig-spatial\]. From this figure it is evident that many of our clusters are not spherically symmetric. Thus we must be cautious in our interpretation of $R_v$ as a physically meaningful scale, particularly when considering individual clusters. The definition of $R_v$ is $$\label{eqn-rv} \bar{\rho}(<R_v)=\Delta_c (z)\rho_c(z)=\Delta_c(z)\rho_b(z)/\Omega_m(z),$$ where $\bar{\rho}(<R_v)$ is the mean cluster mass density within $R_v$, $\rho_c$ and $\rho_b$ are the critical density and mean background mass density, respectively, and $\Delta_c$ is the redshift-dependent contrast parameter, determined from spherical collapse theory. For a flat $\Omega_m=1$ universe, $\Delta_c=178$; for our adopted cosmology at $z=0.07$, $\Delta_c\approx 107$ [@ECF], and $\Omega_m(z)=0.343$, so $\Delta_c(z)/\Omega_m(z)=312$. We will assume that the number density of galaxies is directly proportional to the dark matter density, independent of scale or galaxy luminosity. In this case, we can take the mean background density $\rho_b$ from the luminosity function. Integrating the best fit Schechter function from @2dF-LFBVD, we find that the number density of galaxies brighter than $M_b=-19$ is $\rho_b=0.0076$ Mpc$^{-3}$ ($h=0.7$). We determine $\bar{\rho}(<R_v)$ by counting the number of cluster members $N$ within $R_v$ (weighting by the completeness given in Table \[tab-clus\]) and assuming a spherical cluster geometry, so $\bar{\rho}(<R_v)=3N/(4\pi R_v^3)$. Substituting this into Equation \[eqn-rv\], we need to solve $R_v=0.465 N^{1/3}$. This is done iteratively, by first estimating $R_v$, counting the number of members $N$ within $R_v$, and then recomputing $R_v$. This is repeated until the solution converges, usually within $\sim 3$ iterations. These measurements of $R_v$ are given in column 7 of Table \[tab-clus\]. Alternatively, the virial radius can be determined directly from the velocity dispersion, under various assumptions, as outlined in @Girardi98. If $M_v$ is the virialised mass, and $R_v$ is the cluster virial radius, we have $$\Delta_c={{3 M_v} \over{4\pi \rho_c R_v^3}}.$$ The virial mass can be related to the velocity dispersion $\sigma$ and $R_v$ under the assumption of spherical symmetry, through $$M_v=3G^{-1}\sigma^2R_v,$$ so we have $$R_v={3\sigma \over 4\pi G \rho_c \Delta_c}=\sqrt{6 \over \Delta_c}{\sigma /H_0}.$$ For either a flat, $\Omega_m=1$ cosmology (with $h=0.5$) or the $\Omega_\Lambda$-dominated cosmology we have adopted ($h=0.7$), the virial radius in Mpc is $R_v\approx 3.5 \sigma (1+z)^{-1.5}$, for $\sigma$ in units of $1\,000\;{\rm km\,s}^{-1}$. For 9 of the 17 clusters, this calculation (listed as $R_v$ (alt.) in Table \[tab-clus\]) agrees with the previous one to within $\sim 20$%. For most of the remaining cases, where there is a large discrepancy between the two measurements of $R_v$, the velocity histograms are significantly non-Gaussian, and thus the velocity dispersion is likely to be a poor tracer of the mass. For this reason, we will always adopt the first calculation of $R_v$ as the most likely to be correct. Moreover, this occaisional discrepancy, and the non-Gaussianity of the corresponding velocity histograms, likely implies that the computed velocity dispersions are not always simply related to the virialised mass. For example, some clusters (ED119, S0333, S0340) may have velocity dispersions which are artificially inflated by the presence of foreground and background structures. Thus, our division of the sample into two based on velocity dispersion may not reflect a perfect division into low- and high-mass clusters. We will draw the reference field population from the 2400 galaxies more than $6\sigma$ from the cluster redshift; i.e. in the foreground and background of the clusters. Due to the small redshift range considered, $0.05<z<0.1$, and the use of an absolute luminosity limit, the field sample is also volume limited. The luminosity function of the field sample is comparable to that of the cluster sample, as shown in Fig. \[fig-lfunc\] [see also @deP_clus]. Results {#sec-results} ======= General Cluster Properties -------------------------- In Fig. \[fig-sfrdist\] we show the distribution of normalized star formation rate, $\mu^\ast$, in the cluster and field samples, excluding galaxies with relatively strong \[N[ii]{}\]$\lambda$6583 emission (see Section \[sec-sample\]). The cluster sample is limited to the 440 members within $R_v$, while the field sample is drawn from the 2400 galaxies beyond 6$\sigma$ in velocity. [*The difference between the distributions is highly significant[^1], with the field galaxy population weighted toward galaxies with stronger star formation*]{}. Radial Dependences ------------------ It is well known that star formation activity in clusters increases with distance from the centre [@B+97; @B+98; @PSG]. In Fig. \[fig-sfrrad\] we show how the mean and median value of $\mu^\ast$ depend on radius in our cluster sample, and compare that with the field value. We also show, in the third panel, the fraction of galaxies with $\mu^\ast>1$, which represent the tail of the distribution, comprised of galaxies that are currently forming stars at a high rate relative to their luminosity. The sample is also broken up into clusters with high ($\sigma>800$ km s$^{-1}$, triangles) and low velocity dispersions ($\sigma<800$ km s$^{-1}$, crosses). The properties of the field sample are shown as the horizontal, solid line. The dashed lines bracketing the field line represent the 1-$\sigma$ standard deviation from field to field, computed by ordering the field galaxies in right ascension and treating every 200 galaxies as an individual sample. This gives some estimate of the expected cosmological variance in the field value. All three statistics demonstrate that the cluster distribution of $\mu^\ast$ becomes equivalent to the field value only well outside the virial radius, at $R\gtrsim 3 R_v$, in excellent agreement with preliminary results from the Sloan Digital Sky Survey [@Sloan_sfr]. The implications of this are that a representative sample of field galaxies cannot be obtained within $\lesssim 6$ Mpc of the cluster core. Thus, photometric studies of clusters which attempt a statistical background subtraction by taking the field from the cluster outskirts [e.g. @KB01; @kap2] are not subtracting enough star-forming galaxies, and artificially inflating the number of blue galaxies within the cluster. Since many of the clusters are not spherically symmetric, the interpretation of radial gradients, and the physical meaning of $R_v$, is not straightforward. From Fig. \[fig-spatial\] it is clear that there is often considerable structure, both within and without the virial radius. Furthermore, the galaxies with strongest H$\alpha$ emission (solid points in Fig. \[fig-spatial\]) appear to be spread evenly throughout the field, avoiding the densest regions, regardless of clustercentric distance. Thus, in the following section we consider the correlation between star formation rate and local density. Density Dependences {#sec-density} ------------------- There has been controversy over whether or not galaxy populations correlate most closely with cluster-centric radius [@WGJ] or local density [@Dressler; @PG84]. If radius is the primary determinant anywhere, it is most likely only within the very central regions of the cluster [@DML]. Studies which stack many clusters to approximate a spherically symmetric supercluster circumvent this difficulty, since average density becomes a monotonic function of radius within $R_v$ [e.g. @B+97; @B+98]. In our case, the outer regions of the clusters often contain several large groups or other clusters of galaxies (see Fig. \[fig-spatial\]). Thus, it is probably more appropriate to consider the local density of the galaxies as the most physically interesting variable. To compute the local density of cluster members, we consider all galaxies in the spectroscopic catalogue (including those with bad ADC or H$\alpha$ measurements) brighter than $M_b=-19$, and within 3$\sigma$ of the cluster redshift. We then take the distance to the tenth nearest galaxy, in projected radius, as $r_{10}$; the local projected density is then $\Sigma=10/\pi r_{10}^2$. For galaxies near the boundary of a cluster catalogue, this will underestimate the true density. To partially account for this, we only consider galaxies within 18 Mpc of the cluster centre, so they are at least 2 Mpc from the edge of the catalogue. In some cases, however, the current df database is incomplete within the 20 Mpc extracted area, and the densities of galaxies near these incomplete regions will still be underestimated. In Fig. \[fig-dendist\] we show the distribution of density, for galaxies in three radial bins. In the cluster centre, almost all galaxies are in regions of very high local density. However, at large radii galaxies can be found in a wide range of environments; in particular it is not uncommon to find galaxies at $R>3R_v$ with local densities as large as those within the virialized region. Within the virial radius, the distribution of $\Sigma$ is similar for both high and low velocity dispersion clusters; the means are the same within $\sim 5$%, and the probability that both distributions are drawn from the same population is 0.12 as determined by a Kolmogorov-Smirnov test. Between $1<R_v<5$, however, there is a significant ($>99.999$%) difference, and the mean local density of the clusters with $\sigma>800$ km s$^{-1}$ is more than twice as large as that of the lower velocity dispersion clusters. In Fig. \[fig-sfrden\], we show the properties of the cluster $\mu^\ast$ distribution, as in Fig. \[fig-sfrrad\], but plotted against $\Sigma$. The vertical line shows the mean projected density of galaxies within the virial radius, $N(<R_v)/\pi R_v^2$ (note that this is not the same as the average of the $\Sigma$ values calculated for each galaxy). As in Fig. \[fig-sfrrad\], the horizontal lines show the values of each statistic in the field. The field actually spans a range of densities, likely similar to that seen far ($>5 R_v$) from the cluster centre (see Fig. \[fig-dendist\]); however, our density estimate in clusters is a measure of the galaxy density projected along a line-of-sight column of unknown length, and thus cannot be directly applied to field galaxies to obtain a comparable measurement of local density. Thus, it is evident that star formation is suppressed at densities of $\Sigma\sim 1.5$ galaxies Mpc$^{-2}$, approximately 2.5 times lower than the mean projected density of the cluster virialized region. As in Fig. \[fig-sfrrad\], the star formation rate distribution at a given density is similar in both high- and low-velocity dispersion clusters. This suggests that galaxy star formation rates depend only on the local density, regardless of the larger-scale structure in which they are embedded, although we repeat our caution that the velocity dispersions may not be directly related to the cluster mass in all cases. Furthermore, as we show in Fig. \[fig-sfrden2r\], the correlation of star formation rate with density holds at $r>2R_v$, well outside the virialised cluster region. This demonstrates that star formation is low relative to the global average in [*any*]{} region exceeding the critical density of 1 galaxy (brighter than $M_b=-19$) per Mpc$^{2}$, regardless of its proximity to a rich cluster [see also @PG84]. Discussion {#sec-discuss} ========== Comparison with the morphology-density relation {#sec-morph} ----------------------------------------------- We have shown that the dependence of star formation rate on local galaxy density is independent of cluster velocity dispersion and thus, presumably, mass (see Section \[sec-density\]). In a recent photometric study based on [*Hubble Space Telescope*]{} imaging of 17 clusters, @lowlx-morph found some evidence that the morphology-density relation [*does*]{} depend on cluster X-ray luminosity, which is likely to be a better tracer of mass than velocity dispersion; at a given local density, low-mass clusters have more disk-dominated galaxies than high-mass clusters. Furthermore, they showed that this is most likely due to a difference in the population of galaxy bulges; the disk luminosity function at a fixed local density does not depend on cluster mass. Since star formation is generally limited to the galaxy disk, our results are consistent with this picture. The luminosity of a disk, and its star-forming activity, depend only on galaxy density, while the luminosity of the bulge component has an additional, small dependence on the mass of the embedding structure. It would be of great interest to compare the dependence of $\mu^\ast$ on density with the similar density-dependence of morphology, to determine the degree to which the two correlations are independent. In particular, any difference between the two shows that cluster galaxies differ from their morphological counterparts in the field, which supports the hypothesis that they have undergone a physical transformation [@B+98]. However, we note that this test is not conclusive; if the star formation rate of a spiral galaxy is reduced gradually, on timescales similar to that for morphological change, the correlation between morphology and star formation rate may be retained, despite the transformation. Unfortunately, morphological classifications are not yet available for our sample. However, we can use the local morphology-density relation computed by @Dressler, assuming that it is universal. The luminosity limit of our sample ($M_b=-19$) is similar to that of Dressler, $M_b\approx -19.2$, after accounting for the difference in cosmology and making the transformation $M_b = M_V + 0.72(B-V)$, assuming an average galaxy colour $B-V=0.8$ [@F+95]. Thus, our density measurements should be comparable. We will assume that the field galaxy sample is composed of 18% E, 23% S0 and 59% spiral and irregular galaxies [@WGJ; @D+97]. We therefore divide the field galaxy $\mu^\ast$ distribution (Fig \[fig-sfrdist\]) into three populations, identifying the lowest 18% of $\mu^\ast$ values with the E population, the next 23% with the S0s, and the remainder with spirals. It is then straightforward to recompute the statistics shown in Fig. \[fig-sfrden\] for any morphological mix. We show the expected $\mu^\ast$-density relation computed in this way, assuming Dressler’s morphology-density relation, as the solid curves in Fig. \[fig-sfrden\]. Two things are immediately clear. First, at $\Sigma=1$ Mpc$^{-2}$, the lowest density point in Dressler’s study, the cluster morphological mix is close to that adopted for the field, so the predicted curve is in good agreement with our measurements. Note that this is dependent on an accurate determination of the early-type fraction in the field, estimates of which have increased from the 20% adopted by @Dressler, to 30% [@ST81], adopted by @PG84, and finally to the 41% used here and elsewhere [@WGJ; @D+97]. This high value for the early-type fraction is a consequence of the bright luminosity limit, and is consistent with that derived from type-dependent luminosity functions of @marzke_cfa_morph [40% at $M^\ast$]. The second point is that the predicted $\mu^\ast$-density correlation appears to be shallower than the observed relation. This suggests that the morphology-density relation may be distinct from the star formation-density relation. In making this comparison we have made the extreme assumption that the lowest values of $\mu^\ast$ are associated with elliptical galaxies, and the highest values with spiral galaxies. Any dispersion in the natural morphology-$\mu^\ast$ relation will serve to further flatten the predicted $\mu^\ast$-density relation and increase the discrepancy with the data. On the other hand, there is an important caveat, as @Dressler did not subdivide the late-type morphology class, and Sa galaxies are known to have much less current star formation than irregular galaxies [@K92; @Jansen]. If the fraction of Sa galaxies relative to later types increases with density, this will steepen the curves in Fig. \[fig-sfrden\]. Possible mechanisms: comparison with theoretical models ------------------------------------------------------- These results show conclusively that suppressed star formation is not limited to the cores of rich clusters, but is found in any environment in which the local projected galaxy density exceeds one galaxy brighter than $M_b=-19$ per Mpc$^{-2}$. This is in approximate agreement with the results of [@Kodama_cl0939], though a direct comparison is not possible because that survey probes much deeper down the luminosity function, so the local projected galaxy densities are higher in the same environments. Whatever mechanism is responsible for terminating star formation in galaxies, then, is not particular to the cores of rich clusters, but is associated with dense groups in the cluster infall regions as well. This means that ram pressure stripping of galaxy disks cannot be completely responsible for the correlation of star formation with local density, since this is only expected to take place in the cores of rich clusters [@GG; @Fujita-rps; @QMB]. Most hierarchical models of galaxy formation do not include a calculation of ram-pressure stripping of the cold, disk gas, nor of other physical processes like galaxy harassment [@harass] which might play a role in dense environments. The only environmental effect on star formation rate in these models – apart from a possible difference in merging history – is related to the hot, halo gas hypothesised to surround every isolated galaxy. It is assumed that galaxies maintain the supply of cold gas – fuel for star formation – via continuous cooling from a hot, diffuse gas halo associated with the dark matter potential [@SP99; @KCDW; @Cole2000]. In haloes with more than one galaxy, this hot gas is only associated with the central galaxy; satellite galaxies are assumed to lose their supply of fresh fuel through ram pressure stripping and tidal effects (though these are not directly modelled). In these models, therefore, star formation rates begin to decline for any satellite galaxy, whether in a poor group or a rich cluster. These models are able to reproduce radial gradients in star formation within the virial radius of clusters to a remarkably high degree of accuracy [@Diaferio; @Okamoto]. In particular, @Diaferio predict that the mean star formation rate should be equivalent to the field value beyond $\sim 2 R_v$, in physical (i.e. not projected) space. The model of @infall is a greatly simplified version of this more complete model, as the properties of the field galaxy population are not modelled directly, but are taken empirically from observations of the $z\sim 0.3$ field. The advantage is that the effects of the halo-stripping can be seen directly, since that is the only physical process (apart from gravity) which is accounted for. In Fig. \[fig-model\], we show the predictions of this model, for the mean star formation rate relative to the field, as a function of local projected density. The simulations on which the model is based were kindly provided by Julio Navarro. Here, local density is defined as the projected surface mass density, computed by finding the radius encompassing the ten nearest (in projection) particles in the simulations. The model is the “group” model in Fig. 1 of @infall; galaxies are assumed to lose their reservoir of hot gas when they are associated with a group with circular velocity $V_c>600~$km s$^{-1}$. While a direct comparison with the data is not possible, since these simulations only provide the dark matter density, a comparison relative to the mean surface density within $R_v$ should be fair if mass traces light. First we note that the approximately power-law dependence on local projected density has a similar slope in the data and the model; the mean star formation rate decreases by a factor of $\sim 3$ for every factor 10 increase in surface density. Secondly, in the model the correlation flattens out at surface densities $\sim 1/7$ that of the mean projected density within $R_v$. Although this threshold is a factor $\sim 2$ lower than seen in the data, given the crudity of the model, we consider the agreement reassuring. Unfortunately, the simulations used in this model did not include a large enough volume to probe beyond a few $R_v$. Thus, the low density regions in the simulations are not drawn from the same regions in space as the low density regions in the observations, most of which are found well beyond $2R_v$. Thus, models in which halo-stripping is the only direct environmental-influence on the galaxy star formation rate provide a reasonably good match to the data. This is especially remarkable given that the stripping is not even directly modelled; it is simply assumed that every satellite galaxy has [*no*]{} reservoir of hot gas, immediately after it merges with a larger halo. Improvement in this respect alone may well improve the models’ success in the lower density regions, far from the cluster core. Consequences on the evolution of the global star formation rate --------------------------------------------------------------- What mechanisms are responsible for driving the strong observed evolution of the global star formation rate [e.g. @L96]? One possibility is that the decline in star formation activity is related to physics internal to individual galaxies — for example, consumption of a limited gas supply, or a time-dependent cooling rate — regardless of their environment. On the other hand, some of the decline is likely to be tied to the hierarchical growth of structure; as time progresses, more and more galaxies are locked up in clusters where, perhaps, star formation is directly inhibited. According to extended Press-Schechter theory [@PSext; @B+91] the fraction of mass in haloes greater than $10^{14}M_\odot$, approximately the limit of our cluster sample, is only 11% at the present day, and negligible by $z=1$. Thus it is not immediately obvious that the lower star formation rates in these systems can have any effect on the global average. However, we have shown that lower star formation rates are seen in environments with densities $\sim0.3$ times lower than the mean cluster density, regardless of their proximity to the cluster. This density corresponds approximately to the density [*at*]{} the virial radius; by definition, if mass traces light then any virialised structure will have a mean density which exceeds this threshold. Since our density estimate is based on the tenth nearest galaxy brighter than $M_b=-19$, we cannot be sure how our results apply to systems with fewer than ten such galaxies. A virialised system with more than ten galaxies brighter than this limit is expected to have a total gravitational mass $M\gtrsim10^{13} M_\odot$, assuming a total mass-to-light ratio of 100 [e.g. @G+02]. In contrast with the more massive clusters, these haloes account for $\sim 35$% of the mass in the present day Universe, and contribute significantly to the global average star formation rate. Furthermore, at $z=1$ only about 10% of the mass was in such environments; the rapid growth to $z=0$ on these mass scales may well be able to explain the rapid evolution in the global star formation rate. The hypothesis that the growth of structure is largely responsible for the observed decline in star formation with cosmic time [e.g. @L96] therefore becomes much more attractive. Conclusions {#sec-conc} =========== We have presented a study of seventeen known galaxy clusters, using redshifts and H$\alpha$ equivalent widths measured from df spectra. We have used this to trace the dependence of relative star formation rates as a function of radius and local density. We conclude the following: - The distribution of star formation rates is correlated with both distance from the cluster centre, and with local projected density. The distribution becomes equivalent to that of the global average for radii $\gtrsim 3 R_v$, and local projected densities $\lesssim0.3$ times that of the mean cluster virialized region. These results are in good agreement with preliminary results from the Sloan Digital Sky Survey [@Sloan_sfr]. - The correlation between star formation rate and local projected density holds for galaxies more than two virial radii from the cluster centre. Thus, star formation rates depend primarily on the local density, regardless of their proximity to a rich cluster. - This means that galaxy transformation is not primarily driven by processes like ram pressure stripping, which only operate in the most extreme environments, but by processes which are effective in lower density, group environments. - The dependence of star formation rate on density is the same for clusters with $\sigma>800$ km s$^{-1}$ and for clusters with $\sigma<800$ km s$^{-1}$, which implies that the star formation rate is insensitive to the global, large-scale structure in which the galaxy is embedded. - The correlation between star formation and density that is predicted from the morphology-density relation of @Dressler is less steep than observed. This provides conditional support for the view that the correlations with density are due to physical transformation of galaxies in dense regions, and that morphological change occurs on a different timescale from changes to the current star formation rate. However, it may also be explained by a lower fraction of early type spiral galaxies, relative to late types. Acknowledgements {#acknowledgements .unnumbered} ================ We thank an anonymous referee for useful comments. MLB acknowledges support from a PPARC rolling grant for extragalactic astronomy at Durham. R.D.P. and W.J.C. acknowledge funding from the Australian Research Council. We thank Julio Navarro for providing the numerical simulations, and the Sloan Digital Sky Survey collaboration for sharing their results in advance of publication. We gratefully acknowledge the support of the staff of the Anglo-Australian Observatory for their assistance supporting 2dF throughout the survey, and of the Australian and UK time assignment committees for their continued support for this project. [^1]: The probability that the two distributions are not drawn from the same population is $>99.999$% as determined by a Kolmogorov-Smirnov test.
Q: Binding @Provides method as eager singleton I want to make a binding using a method annotated with @Provides into an eager singleton. I've found bug 216, which suggests this isn't possible, but doesn't mention the @Provides annotation explicitly. I currently have a class that requests the eager singletons in time by itself being a singleton, but it's not a very nice solution. public class LogicModule extends AbstractModule { @Override public void configure() { bind(SomeDep.class); bind(MyWorkaround.class).asEagerSingleton(); } // cannot add eager requirement here @Provides @Singleton Logic createLogic(SomeDep dep) { return LogicCreator.create(dep); } private static class MyWorkaround { @Inject Logic logic; } } Can I change something near the comment that would make the workaround class obsolete? A: Why not to use bind(Logic.class).toInstance(LogicCreator.create(dep)); //ohh we missing dep then we can do this class LogicProvider implements Provider<Logic> { private final SomeDep dep; @Inject public LogicProvider(SomeDep dep) { this.dep = dep; } @Override public Logic get() { return LogicCreator.create(dep); } } and then bind(Logic.class).toProvider(LogicProvider.class).asEagerSingleton(); You can even pass SomeDep dep to your provider as Provider<SomeDep> and then call providerDep.get() in LogicCreator.create() that would be a bit more robust.
Use HTTPS,redirect to Non-WWW with AWS S3,Cloudfront,Route53 with Custom Domain - marcanuy https://simpleit.rocks/redirect-http-to-https-and-www-to-non-www-with-aws-s3-bucket-cloudfront-route-53-and-a-custom-domain/ ====== QuinnyPig I'd make one minor addition-- once the CloudFront distribution is set up, enable a bucket policy that locks the S3 bucket down to only permits CloudFront access. No point in leaving the S3 bucket open to the world...
It's the second week of the offseason, and of course, the Blazers kept busy:
Vicious firecracker prank causes havoc A young Port Elizabeth schoolboy was severely injured at the weekend when a firecracker exploded in his face after it was offered to him by three young men as a “cigarette” and then lit. The three brothers from Summerstrand – the sons of a police colonel, all in their 20s – have now been linked to an investigation of assault with intent to cause grievous bodily harm, which could be changed to attempted murder. As a result of the explosion , Shane Witbooi, 12, a Grade 6 pupil at Rufane Donkin Primary School, in Gelvandale, is in hospital with burns to his face and arms, his eyes swollen shut, and unable to speak . The extent of the damage to his eyes and ears will be known after more testing. The “prank” took place in the early hours of Sunday, when Humewood and Summerstrand residents reported hearing loud bangs and explosions. Hospital staff say that, although Witbooi is no longer in a critical condition, he is in severe pain and the extent of permanent damage remains to be seen. Because of the severity of the teenager’s injuries the police are considering altering the charge to attempted murder. During an interview at his bedside yesterday afternoon, Witbooi slurred: “Pray for me, pray for me.” Shocked nurses said he was in pain and crying for his grandparents yesterday morning. His devastated and angry grandparents James Witbooi, 61, and Beatrice, 62 – who look after the boy – said they were glad he was alive after he went missing on Saturday afternoon. Beatrice asked: “Who does this to a child? How would you feel if this was your child lying here?” Police spokesman Colonel Priscilla Naidu said the incident happened at about 2am on Sunday, when three males approached two people in the parking area across from McDonald’s in Beach Road. “According to police information, a ‘cigarette’ was offered to vagrants and a 12-year-old accepted it. The ‘cigarette’ was allegedly lit by one of the three men and seconds later it blew up in the face of the child,” Naidu said. Naidu – who confirmed that three prime suspects in the crime are the children of a police colonel – said the police were alerted and the registration number of the vehicle was traced to a house in Summerstrand. Humewood police station commander Brigadier Ronald Koll said yesterday: “This is a very serious incident and has likely changed this youngster’s life forever.”
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en"> <head> <title>10.1.11.1 HAL Support 3.2.11</title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link rel="stylesheet" href="../css/main.css" type="text/css" media="screen, print" title="Style" charset="utf-8"/> <link rel="stylesheet" href="../css/pdf.css" type="text/css" media="print" title="PDF" charset="utf-8"/> <script type="text/javascript"> function addJsClass() { var classes = document.body.className.split(" "); classes.push("js"); document.body.className = classes.join(" "); } </script> </head> <body class="body" onload="addJsClass();"> <div id="navigation"> <div class="navTitle"> The Grails Framework </div> <div class="navLinks"> <ul> <li> <div id="nav-summary" onmouseover="toggleNavSummary(false)" onmouseout="toggleNavSummary(true)"> <a href="../../guide/index.html" class="button">Table of contents</a> <div id="nav-summary-childs" style="display:none;"> <div class="toc-item" style="margin-left:0"><a href="../../guide/introduction.html"><strong>1</strong><span>Introduction</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/gettingStarted.html"><strong>2</strong><span>Getting Started</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/upgrading.html"><strong>3</strong><span>Upgrading</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/conf.html"><strong>4</strong><span>Configuration</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/commandLine.html"><strong>5</strong><span>The Command Line</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/profiles.html"><strong>6</strong><span>Application Profiles</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/GORM.html"><strong>7</strong><span>Object Relational Mapping (GORM)</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/theWebLayer.html"><strong>8</strong><span>The Web Layer</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/traits.html"><strong>9</strong><span>Traits</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/webServices.html"><strong>10</strong><span>Web Services</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/async.html"><strong>11</strong><span>Asynchronous Programming</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/validation.html"><strong>12</strong><span>Validation</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/services.html"><strong>13</strong><span>The Service Layer</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/staticTypeCheckingAndCompilation.html"><strong>14</strong><span>Static Type Checking And Compilation</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/testing.html"><strong>15</strong><span>Testing</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/i18n.html"><strong>16</strong><span>Internationalization</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/security.html"><strong>17</strong><span>Security</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/plugins.html"><strong>18</strong><span>Plugins</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/spring.html"><strong>19</strong><span>Grails and Spring</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/hibernate.html"><strong>20</strong><span>Grails and Hibernate</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/scaffolding.html"><strong>21</strong><span>Scaffolding</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/deployment.html"><strong>22</strong><span>Deployment</span></a> </div> <div class="toc-item" style="margin-left:0"><a href="../../guide/contributing.html"><strong>23</strong><span>Contributing to Grails</span></a> </div> </div> </div> </li> <li class="separator selected"> <a id="ref-button" onclick="localToggle(); return false;" href="#">Quick Reference</a> </li> </ul> </div> </div> <table id="colset" border="0" cellpadding="0" cellspacing="0"> <tr> <td id="col1"> <div id="main" class="corner-all"> <div class="toc-item prev-left"><a href="../../guide/traits.html">&lt;&lt; <strong>9</strong><span>Traits</span></a></div> <span id='toggle-col1' class="toggle">(<a href="#" onclick="localToggle(); return false;">Quick Reference</a>)</span> <div class="toc-item next-right"><a href="../../guide/async.html"><strong>11</strong><span>Asynchronous Programming</span> >></a></div> <div class="project"> <h1>10.1.11.1 HAL Support</h1> <p><strong>Version:</strong> 3.2.11</p> </div> <h2 id="hal">10.1.11.1 HAL Support</h2> <div class='contribute-btn'> <button type='button' class='btn btn-default' onclick='window.location.href="https://github.com/grails/grails-doc/edit/3.2.x/src/en/guide/webServices/REST/hypermedia/hal.adoc"'> <i class='fa fa-pencil-square-o'></i> Improve this doc </button> </div> <div class="paragraph"> <p><a href="http://stateless.co/hal_specification.html">HAL</a> is a standard exchange format commonly used when developing REST APIs that follow HATEOAS principals. An example HAL document representing a list of orders can be seen below:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="javascript">{ <span class="key"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/orders</span><span class="delimiter">&quot;</span></span> }, <span class="key"><span class="delimiter">&quot;</span><span class="content">next</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/orders?page=2</span><span class="delimiter">&quot;</span></span> }, <span class="key"><span class="delimiter">&quot;</span><span class="content">find</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/orders{?id}</span><span class="delimiter">&quot;</span></span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">templated</span><span class="delimiter">&quot;</span></span>: <span class="predefined-constant">true</span> }, <span class="key"><span class="delimiter">&quot;</span><span class="content">admin</span><span class="delimiter">&quot;</span></span>: [{ <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/admins/2</span><span class="delimiter">&quot;</span></span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">Fred</span><span class="delimiter">&quot;</span></span> }, { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/admins/5</span><span class="delimiter">&quot;</span></span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">Kate</span><span class="delimiter">&quot;</span></span> }] }, <span class="key"><span class="delimiter">&quot;</span><span class="content">currentlyProcessing</span><span class="delimiter">&quot;</span></span>: <span class="integer">14</span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">shippedToday</span><span class="delimiter">&quot;</span></span>: <span class="integer">20</span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">_embedded</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">order</span><span class="delimiter">&quot;</span></span>: [{ <span class="key"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/orders/123</span><span class="delimiter">&quot;</span></span> }, <span class="key"><span class="delimiter">&quot;</span><span class="content">basket</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/baskets/98712</span><span class="delimiter">&quot;</span></span> }, <span class="key"><span class="delimiter">&quot;</span><span class="content">customer</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/customers/7809</span><span class="delimiter">&quot;</span></span> } }, <span class="key"><span class="delimiter">&quot;</span><span class="content">total</span><span class="delimiter">&quot;</span></span>: <span class="float">30.00</span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">currency</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">USD</span><span class="delimiter">&quot;</span></span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">status</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">shipped</span><span class="delimiter">&quot;</span></span> }, { <span class="key"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/orders/124</span><span class="delimiter">&quot;</span></span> }, <span class="key"><span class="delimiter">&quot;</span><span class="content">basket</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/baskets/97213</span><span class="delimiter">&quot;</span></span> }, <span class="key"><span class="delimiter">&quot;</span><span class="content">customer</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">/customers/12369</span><span class="delimiter">&quot;</span></span> } }, <span class="key"><span class="delimiter">&quot;</span><span class="content">total</span><span class="delimiter">&quot;</span></span>: <span class="float">20.00</span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">currency</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">USD</span><span class="delimiter">&quot;</span></span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">status</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">processing</span><span class="delimiter">&quot;</span></span> }] } }</code></pre> </div> </div> <div class="sect3"> <h4 id="_exposing_resources_using_hal">Exposing Resources Using HAL</h4> <div class="paragraph"> <p>To return HAL instead of regular JSON for a resource you can simply override the renderer in <code>grails-app/conf/spring/resources.groovy</code> with an instance of <code>grails.rest.render.hal.HalJsonRenderer</code> (or <code>HalXmlRenderer</code> for the XML variation):</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="keyword">import</span> <span class="include">grails.rest.render.hal.*</span> beans = { halBookRenderer(HalJsonRenderer, rest.test.Book) }</code></pre> </div> </div> <div class="paragraph"> <p>You will also need to update the acceptable response formats for the resource so that the HAL format is included. Not doing so will result in a 406 - Not Acceptable response being returned from the server.</p> </div> <div class="paragraph"> <p>This can be done by setting the <code>formats</code> attribute of the <code>Resource</code> transformation:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="keyword">import</span> <span class="include">grails.rest.*</span> <span class="annotation">@Resource</span>(uri=<span class="string"><span class="delimiter">'</span><span class="content">/books</span><span class="delimiter">'</span></span>, formats=[<span class="string"><span class="delimiter">'</span><span class="content">json</span><span class="delimiter">'</span></span>, <span class="string"><span class="delimiter">'</span><span class="content">xml</span><span class="delimiter">'</span></span>, <span class="string"><span class="delimiter">'</span><span class="content">hal</span><span class="delimiter">'</span></span>]) <span class="type">class</span> <span class="class">Book</span> { ... }</code></pre> </div> </div> <div class="paragraph"> <p>Or by updating the <code>responseFormats</code> in the controller:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="type">class</span> <span class="class">BookController</span> <span class="directive">extends</span> RestfulController { <span class="directive">static</span> responseFormats = [<span class="string"><span class="delimiter">'</span><span class="content">json</span><span class="delimiter">'</span></span>, <span class="string"><span class="delimiter">'</span><span class="content">xml</span><span class="delimiter">'</span></span>, <span class="string"><span class="delimiter">'</span><span class="content">hal</span><span class="delimiter">'</span></span>] <span class="comment">// ...</span> }</code></pre> </div> </div> <div class="paragraph"> <p>With the bean in place requesting the HAL content type will return HAL:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="error">$</span> curl -i -H <span class="string"><span class="delimiter">&quot;</span><span class="content">Accept: application/hal+json</span><span class="delimiter">&quot;</span></span> <span class="key">http</span>:<span class="comment">//localhost:8080/books/1</span> HTTP/<span class="float">1.1</span> <span class="integer">200</span> OK <span class="key">Server</span>: Apache-Coyote/<span class="float">1.1</span> Content-<span class="predefined-type">Type</span>: application/hal+json;charset=ISO-<span class="integer">8859</span>-<span class="integer">1</span> { <span class="string"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books/1</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/hal+json</span><span class="delimiter">&quot;</span></span> } }, <span class="string"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="char">\&quot;</span><span class="content">The Stand</span><span class="char">\&quot;</span><span class="delimiter">&quot;</span></span> }</code></pre> </div> </div> <div class="paragraph"> <p>To use HAL XML format simply change the renderer:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="keyword">import</span> <span class="include">grails.rest.render.hal.*</span> beans = { halBookRenderer(HalXmlRenderer, rest.test.Book) }</code></pre> </div> </div> </div> <div class="sect3"> <h4 id="_rendering_collections_using_hal">Rendering Collections Using HAL</h4> <div class="paragraph"> <p>To return HAL instead of regular JSON for a list of resources you can simply override the renderer in <code>grails-app/conf/spring/resources.groovy</code> with an instance of <code>grails.rest.render.hal.HalJsonCollectionRenderer</code>:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="keyword">import</span> <span class="include">grails.rest.render.hal.*</span> beans = { halBookCollectionRenderer(HalJsonCollectionRenderer, rest.test.Book) }</code></pre> </div> </div> <div class="paragraph"> <p>With the bean in place requesting the HAL content type will return HAL:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="error">$</span> curl -i -H <span class="string"><span class="delimiter">&quot;</span><span class="content">Accept: application/hal+json</span><span class="delimiter">&quot;</span></span> <span class="key">http</span>:<span class="comment">//localhost:8080/books</span> HTTP/<span class="float">1.1</span> <span class="integer">200</span> OK <span class="key">Server</span>: Apache-Coyote/<span class="float">1.1</span> Content-<span class="predefined-type">Type</span>: application/hal+json;charset=UTF-<span class="integer">8</span> Transfer-<span class="key">Encoding</span>: chunked <span class="predefined-type">Date</span>: Thu, <span class="integer">17</span> Oct <span class="integer">2013</span> <span class="octal">02</span>:<span class="integer">34</span>:<span class="integer">14</span> GMT { <span class="string"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/hal+json</span><span class="delimiter">&quot;</span></span> } }, <span class="string"><span class="delimiter">&quot;</span><span class="content">_embedded</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">book</span><span class="delimiter">&quot;</span></span>: [ { <span class="string"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books/1</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/hal+json</span><span class="delimiter">&quot;</span></span> } }, <span class="string"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">The Stand</span><span class="delimiter">&quot;</span></span> }, { <span class="string"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books/2</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/hal+json</span><span class="delimiter">&quot;</span></span> } }, <span class="string"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">Infinite Jest</span><span class="delimiter">&quot;</span></span> }, { <span class="string"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books/3</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/hal+json</span><span class="delimiter">&quot;</span></span> } }, <span class="string"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">Walden</span><span class="delimiter">&quot;</span></span> } ] } }</code></pre> </div> </div> <div class="paragraph"> <p>Notice that the key associated with the list of <code>Book</code> objects in the rendered JSON is <code>book</code> which is derived from the type of objects in the collection, namely <code>Book</code>. In order to customize the value of this key assign a value to the <code>collectionName</code> property on the <code>HalJsonCollectionRenderer</code> bean as shown below:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="keyword">import</span> <span class="include">grails.rest.render.hal.*</span> beans = { halBookCollectionRenderer(HalCollectionJsonRenderer, rest.test.Book) { collectionName = <span class="string"><span class="delimiter">'</span><span class="content">publications</span><span class="delimiter">'</span></span> } }</code></pre> </div> </div> <div class="paragraph"> <p>With that in place the rendered HAL will look like the following:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="error">$</span> curl -i -H <span class="string"><span class="delimiter">&quot;</span><span class="content">Accept: application/hal+json</span><span class="delimiter">&quot;</span></span> <span class="key">http</span>:<span class="comment">//localhost:8080/books</span> HTTP/<span class="float">1.1</span> <span class="integer">200</span> OK <span class="key">Server</span>: Apache-Coyote/<span class="float">1.1</span> Content-<span class="predefined-type">Type</span>: application/hal+json;charset=UTF-<span class="integer">8</span> Transfer-<span class="key">Encoding</span>: chunked <span class="predefined-type">Date</span>: Thu, <span class="integer">17</span> Oct <span class="integer">2013</span> <span class="octal">02</span>:<span class="integer">34</span>:<span class="integer">14</span> GMT { <span class="string"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/hal+json</span><span class="delimiter">&quot;</span></span> } }, <span class="string"><span class="delimiter">&quot;</span><span class="content">_embedded</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">publications</span><span class="delimiter">&quot;</span></span>: [ { <span class="string"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books/1</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/hal+json</span><span class="delimiter">&quot;</span></span> } }, <span class="string"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">The Stand</span><span class="delimiter">&quot;</span></span> }, { <span class="string"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books/2</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/hal+json</span><span class="delimiter">&quot;</span></span> } }, <span class="string"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">Infinite Jest</span><span class="delimiter">&quot;</span></span> }, { <span class="string"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="string"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books/3</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="string"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/hal+json</span><span class="delimiter">&quot;</span></span> } }, <span class="string"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">Walden</span><span class="delimiter">&quot;</span></span> } ] } }</code></pre> </div> </div> </div> <div class="sect3"> <h4 id="_using_custom_media_mime_types">Using Custom Media / Mime Types</h4> <div class="paragraph"> <p>If you wish to use a custom Mime Type then you first need to declare the Mime Types in <code>grails-app/conf/application.groovy</code>:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy">grails.mime.types = [ <span class="key">all</span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">*/*</span><span class="delimiter">&quot;</span></span>, <span class="key">book</span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/vnd.books.org.book+json</span><span class="delimiter">&quot;</span></span>, <span class="key">bookList</span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/vnd.books.org.booklist+json</span><span class="delimiter">&quot;</span></span>, ... ]</code></pre> </div> </div> <div class="admonitionblock warning"> <table> <tr> <td class="icon"> <i class="fa icon-warning" title="Warning"></i> </td> <td class="content"> It is critical that place your new mime types after the 'all' Mime Type because if the Content Type of the request cannot be established then the first entry in the map is used for the response. If you have your new Mime Type at the top then Grails will always try and send back your new Mime Type if the requested Mime Type cannot be established. </td> </tr> </table> </div> <div class="paragraph"> <p>Then override the renderer to return HAL using the custom Mime Types:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="keyword">import</span> <span class="include">grails.rest.render.hal.*</span> <span class="keyword">import</span> <span class="include">grails.web.mime.*</span> beans = { halBookRenderer(HalJsonRenderer, rest.test.Book, <span class="keyword">new</span> MimeType(<span class="string"><span class="delimiter">&quot;</span><span class="content">application/vnd.books.org.book+json</span><span class="delimiter">&quot;</span></span>, [<span class="key">v</span>:<span class="string"><span class="delimiter">&quot;</span><span class="content">1.0</span><span class="delimiter">&quot;</span></span>])) halBookListRenderer(HalJsonCollectionRenderer, rest.test.Book, <span class="keyword">new</span> MimeType(<span class="string"><span class="delimiter">&quot;</span><span class="content">application/vnd.books.org.booklist+json</span><span class="delimiter">&quot;</span></span>, [<span class="key">v</span>:<span class="string"><span class="delimiter">&quot;</span><span class="content">1.0</span><span class="delimiter">&quot;</span></span>])) }</code></pre> </div> </div> <div class="paragraph"> <p>In the above example the first bean defines a HAL renderer for a single book instance that returns a Mime Type of <code>application/vnd.books.org.book+json</code>. The second bean defines the Mime Type used to render a collection of books (in this case <code>application/vnd.books.org.booklist+json</code>).</p> </div> <div class="admonitionblock note"> <table> <tr> <td class="icon"> <i class="fa icon-note" title="Note"></i> </td> <td class="content"> <code>application/vnd.books.org.booklist+json</code> is an example of a media-range (<a href="http://www.w3.org/Protocols/rfc2616/rfc2616.html" class="bare">http://www.w3.org/Protocols/rfc2616/rfc2616.html</a> - Header Field Definitions). This example uses entity (book) and operation (list) to form the media-range values but in reality, it may not be necessary to create a separate Mime type for each operation. Further, it may not be necessary to create Mime types at the entity level. See the section on "Versioning REST resources" for further information about how to define your own Mime types. </td> </tr> </table> </div> <div class="paragraph"> <p>With this in place issuing a request for the new Mime Type returns the necessary HAL:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="bash">$ curl -i -H &quot;Accept: application/vnd.books.org.book+json&quot; http://localhost:8080/books/1 HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: application/vnd.books.org.book+json;charset=ISO-8859-1 { &quot;_links&quot;: { &quot;self&quot;: { &quot;href&quot;: &quot;http://localhost:8080/books/1&quot;, &quot;hreflang&quot;: &quot;en&quot;, &quot;type&quot;: &quot;application/vnd.books.org.book+json&quot; } }, &quot;title&quot;: &quot;\&quot;The Stand\&quot;&quot; }</code></pre> </div> </div> </div> <div class="sect3"> <h4 id="_customizing_link_rendering">Customizing Link Rendering</h4> <div class="paragraph"> <p>An important aspect of HATEOAS is the usage of links that describe the transitions the client can use to interact with the REST API. By default the <code>HalJsonRenderer</code> will automatically create links for you for associations and to the resource itself (using the "self" relationship).</p> </div> <div class="paragraph"> <p>However you can customize link rendering using the <code>link</code> method that is added to all domain classes annotated with <code>grails.rest.Resource</code> or any class annotated with <code>grails.rest.Linkable</code>. For example, the <code>show</code> action can be modified as follows to provide a new link in the resulting output:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="groovy"><span class="keyword">def</span> <span class="function">show</span>(<span class="predefined-type">Book</span> book) { book.link <span class="key">rel</span>:<span class="string"><span class="delimiter">'</span><span class="content">publisher</span><span class="delimiter">'</span></span>, <span class="key">href</span>: g.createLink(<span class="key">absolute</span>: <span class="predefined-constant">true</span>, <span class="key">resource</span>:<span class="string"><span class="delimiter">&quot;</span><span class="content">publisher</span><span class="delimiter">&quot;</span></span>, <span class="key">params</span>:[<span class="key">bookId</span>: book.id]) respond book }</code></pre> </div> </div> <div class="paragraph"> <p>Which will result in output such as:</p> </div> <div class="listingblock"> <div class="content"> <pre class="CodeRay highlight"><code data-lang="javascript">{ <span class="key"><span class="delimiter">&quot;</span><span class="content">_links</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">self</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books/1</span><span class="delimiter">&quot;</span></span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">type</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">application/vnd.books.org.book+json</span><span class="delimiter">&quot;</span></span> } <span class="string"><span class="delimiter">&quot;</span><span class="content">publisher</span><span class="delimiter">&quot;</span></span>: { <span class="key"><span class="delimiter">&quot;</span><span class="content">href</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">http://localhost:8080/books/1/publisher</span><span class="delimiter">&quot;</span></span>, <span class="key"><span class="delimiter">&quot;</span><span class="content">hreflang</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="content">en</span><span class="delimiter">&quot;</span></span> } }, <span class="key"><span class="delimiter">&quot;</span><span class="content">title</span><span class="delimiter">&quot;</span></span>: <span class="string"><span class="delimiter">&quot;</span><span class="char">\&quot;</span><span class="content">The Stand</span><span class="char">\&quot;</span><span class="delimiter">&quot;</span></span> }</code></pre> </div> </div> <div class="paragraph"> <p>The <code>link</code> method can be passed named arguments that match the properties of the <code>grails.rest.Link</code> class.</p> </div> </div> <div style="clear:both;margin-top:15px;"></div> <div class="toc-item prev-left"><a href="../../guide/traits.html">&lt;&lt; <strong>9</strong><span>Traits</span></a></div> <div class="toc-item next-right"><a href="../../guide/async.html"><strong>11</strong><span>Asynchronous Programming</span> >></a></div> <div style="clear:both"></div> </div> </td> <td id="col2"> <div class="local clearfix"> <div class="local-title"> <a href="../../guide/index.html" target="mainFrame">Quick Reference</a> <span class="toggle">(<a href="#" onclick="localToggle(); return false;">hide</a>)</span> </div> <div class="menu"> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Command Line</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Command%20Line/Usage.html">Usage</a></div> <div class="menu-item"><a href="../../ref/Command%20Line/bug-report.html">bug-report</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/clean.html">clean</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/compile.html">compile</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/console.html">console</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-app.html">create-app</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-command.html">create-command</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-controller.html">create-controller</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-domain-class.html">create-domain-class</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-functional-test.html">create-functional-test</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-hibernate-cfg-xml.html">create-hibernate-cfg-xml</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-integration-test.html">create-integration-test</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-interceptor.html">create-interceptor</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-plugin.html">create-plugin</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-profile.html">create-profile</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-script.html">create-script</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-service.html">create-service</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-taglib.html">create-taglib</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/create-unit-test.html">create-unit-test</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/dependency-report.html">dependency-report</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/docs.html">docs</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/generate-all.html">generate-all</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/generate-controller.html">generate-controller</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/generate-views.html">generate-views</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/help.html">help</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/install-templates.html">install-templates</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/list-plugins.html">list-plugins</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/list-profiles.html">list-profiles</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/package-plugin.html">package-plugin</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/package.html">package</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/plugin-info.html">plugin-info</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/profile-info.html">profile-info</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/run-app.html">run-app</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/run-command.html">run-command</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/run-script.html">run-script</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/schema-export.html">schema-export</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/shell.html">shell</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/stats.html">stats</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/stop-app.html">stop-app</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/test-app.html">test-app</a> </div> <div class="menu-item"><a href="../../ref/Command%20Line/war.html">war</a> </div> </div> </div> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Constraints</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Constraints/Usage.html">Usage</a></div> <div class="menu-item"><a href="../../ref/Constraints/attributes.html">attributes</a> </div> <div class="menu-item"><a href="../../ref/Constraints/bindable.html">bindable</a> </div> <div class="menu-item"><a href="../../ref/Constraints/blank.html">blank</a> </div> <div class="menu-item"><a href="../../ref/Constraints/creditCard.html">creditCard</a> </div> <div class="menu-item"><a href="../../ref/Constraints/email.html">email</a> </div> <div class="menu-item"><a href="../../ref/Constraints/inList.html">inList</a> </div> <div class="menu-item"><a href="../../ref/Constraints/matches.html">matches</a> </div> <div class="menu-item"><a href="../../ref/Constraints/max.html">max</a> </div> <div class="menu-item"><a href="../../ref/Constraints/maxSize.html">maxSize</a> </div> <div class="menu-item"><a href="../../ref/Constraints/min.html">min</a> </div> <div class="menu-item"><a href="../../ref/Constraints/minSize.html">minSize</a> </div> <div class="menu-item"><a href="../../ref/Constraints/notEqual.html">notEqual</a> </div> <div class="menu-item"><a href="../../ref/Constraints/nullable.html">nullable</a> </div> <div class="menu-item"><a href="../../ref/Constraints/range.html">range</a> </div> <div class="menu-item"><a href="../../ref/Constraints/scale.html">scale</a> </div> <div class="menu-item"><a href="../../ref/Constraints/size.html">size</a> </div> <div class="menu-item"><a href="../../ref/Constraints/unique.html">unique</a> </div> <div class="menu-item"><a href="../../ref/Constraints/url.html">url</a> </div> <div class="menu-item"><a href="../../ref/Constraints/validator.html">validator</a> </div> <div class="menu-item"><a href="../../ref/Constraints/widget.html">widget</a> </div> </div> </div> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Controllers</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Controllers/Usage.html">Usage</a></div> <div class="menu-item"><a href="../../ref/Controllers/actionName.html">actionName</a> </div> <div class="menu-item"><a href="../../ref/Controllers/allowedMethods.html">allowedMethods</a> </div> <div class="menu-item"><a href="../../ref/Controllers/bindData.html">bindData</a> </div> <div class="menu-item"><a href="../../ref/Controllers/chain.html">chain</a> </div> <div class="menu-item"><a href="../../ref/Controllers/controllerName.html">controllerName</a> </div> <div class="menu-item"><a href="../../ref/Controllers/defaultAction.html">defaultAction</a> </div> <div class="menu-item"><a href="../../ref/Controllers/errors.html">errors</a> </div> <div class="menu-item"><a href="../../ref/Controllers/flash.html">flash</a> </div> <div class="menu-item"><a href="../../ref/Controllers/forward.html">forward</a> </div> <div class="menu-item"><a href="../../ref/Controllers/grailsApplication.html">grailsApplication</a> </div> <div class="menu-item"><a href="../../ref/Controllers/hasErrors.html">hasErrors</a> </div> <div class="menu-item"><a href="../../ref/Controllers/namespace.html">namespace</a> </div> <div class="menu-item"><a href="../../ref/Controllers/params.html">params</a> </div> <div class="menu-item"><a href="../../ref/Controllers/redirect.html">redirect</a> </div> <div class="menu-item"><a href="../../ref/Controllers/render.html">render</a> </div> <div class="menu-item"><a href="../../ref/Controllers/request.html">request</a> </div> <div class="menu-item"><a href="../../ref/Controllers/respond.html">respond</a> </div> <div class="menu-item"><a href="../../ref/Controllers/response.html">response</a> </div> <div class="menu-item"><a href="../../ref/Controllers/responseFormats.html">responseFormats</a> </div> <div class="menu-item"><a href="../../ref/Controllers/scope.html">scope</a> </div> <div class="menu-item"><a href="../../ref/Controllers/servletContext.html">servletContext</a> </div> <div class="menu-item"><a href="../../ref/Controllers/session.html">session</a> </div> <div class="menu-item"><a href="../../ref/Controllers/withForm.html">withForm</a> </div> <div class="menu-item"><a href="../../ref/Controllers/withFormat.html">withFormat</a> </div> </div> </div> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Database Mapping</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Database%20Mapping/Usage.html">Usage</a></div> <div class="menu-item"><a href="../../ref/Database%20Mapping/autoImport.html">autoImport</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/autoTimestamp.html">autoTimestamp</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/batchSize.html">batchSize</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/cache.html">cache</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/cascade.html">cascade</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/column.html">column</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/comment.html">comment</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/discriminator.html">discriminator</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/dynamicInsert.html">dynamicInsert</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/dynamicUpdate.html">dynamicUpdate</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/fetch.html">fetch</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/id.html">id</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/ignoreNotFound.html">ignoreNotFound</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/indexColumn.html">indexColumn</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/insertable.html">insertable</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/joinTable.html">joinTable</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/lazy.html">lazy</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/order.html">order</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/sort.html">sort</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/table.html">table</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/type.html">type</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/updateable.html">updateable</a> </div> <div class="menu-item"><a href="../../ref/Database%20Mapping/version.html">version</a> </div> </div> </div> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Domain Classes</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Domain%20Classes/Usage.html">Usage</a></div> <div class="menu-item"><a href="../../ref/Domain%20Classes/addTo.html">addTo</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/attach.html">attach</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/belongsTo.html">belongsTo</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/clearErrors.html">clearErrors</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/constraints.html">constraints</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/count.html">count</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/countBy.html">countBy</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/createCriteria.html">createCriteria</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/delete.html">delete</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/discard.html">discard</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/embedded.html">embedded</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/errors.html">errors</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/executeQuery.html">executeQuery</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/executeUpdate.html">executeUpdate</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/exists.html">exists</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/fetchMode.html">fetchMode</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/find.html">find</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/findAll.html">findAll</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/findAllBy.html">findAllBy</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/findAllWhere.html">findAllWhere</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/findBy.html">findBy</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/findOrCreateBy.html">findOrCreateBy</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/findOrCreateWhere.html">findOrCreateWhere</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/findOrSaveBy.html">findOrSaveBy</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/findOrSaveWhere.html">findOrSaveWhere</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/findWhere.html">findWhere</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/first.html">first</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/get.html">get</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/getAll.html">getAll</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/getDirtyPropertyNames.html">getDirtyPropertyNames</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/getPersistentValue.html">getPersistentValue</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/hasErrors.html">hasErrors</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/hasMany.html">hasMany</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/hasOne.html">hasOne</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/ident.html">ident</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/instanceOf.html">instanceOf</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/isAttached.html">isAttached</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/isDirty.html">isDirty</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/last.html">last</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/list.html">list</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/listOrderBy.html">listOrderBy</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/load.html">load</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/lock.html">lock</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/mapWith.html">mapWith</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/mappedBy.html">mappedBy</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/mapping.html">mapping</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/merge.html">merge</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/namedQueries.html">namedQueries</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/properties.html">properties</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/read.html">read</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/refresh.html">refresh</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/removeFrom.html">removeFrom</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/save.html">save</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/transients.html">transients</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/validate.html">validate</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/where.html">where</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/whereAny.html">whereAny</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/withCriteria.html">withCriteria</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/withNewSession.html">withNewSession</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/withSession.html">withSession</a> </div> <div class="menu-item"><a href="../../ref/Domain%20Classes/withTransaction.html">withTransaction</a> </div> </div> </div> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Plug-ins</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Plug-ins/Usage.html">Usage</a></div> <div class="menu-item"><a href="../../ref/Plug-ins/URL%20mappings.html">URL mappings</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/codecs.html">codecs</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/controllers.html">controllers</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/core.html">core</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/dataSource.html">dataSource</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/domainClasses.html">domainClasses</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/hibernate.html">hibernate</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/i18n.html">i18n</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/logging.html">logging</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/scaffolding.html">scaffolding</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/services.html">services</a> </div> <div class="menu-item"><a href="../../ref/Plug-ins/servlets.html">servlets</a> </div> </div> </div> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Services</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Services/Usage.html">Usage</a></div> <div class="menu-item"><a href="../../ref/Services/scope.html">scope</a> </div> <div class="menu-item"><a href="../../ref/Services/transactional.html">transactional</a> </div> </div> </div> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Servlet API</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Servlet%20API/request.html">request</a> </div> <div class="menu-item"><a href="../../ref/Servlet%20API/response.html">response</a> </div> <div class="menu-item"><a href="../../ref/Servlet%20API/servletContext.html">servletContext</a> </div> <div class="menu-item"><a href="../../ref/Servlet%20API/session.html">session</a> </div> </div> </div> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Tag Libraries</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Tag%20Libraries/Usage.html">Usage</a></div> <div class="menu-item"><a href="../../ref/Tag%20Libraries/actionName.html">actionName</a> </div> <div class="menu-item"><a href="../../ref/Tag%20Libraries/controllerName.html">controllerName</a> </div> <div class="menu-item"><a href="../../ref/Tag%20Libraries/flash.html">flash</a> </div> <div class="menu-item"><a href="../../ref/Tag%20Libraries/pageScope.html">pageScope</a> </div> <div class="menu-item"><a href="../../ref/Tag%20Libraries/params.html">params</a> </div> <div class="menu-item"><a href="../../ref/Tag%20Libraries/request.html">request</a> </div> <div class="menu-item"><a href="../../ref/Tag%20Libraries/response.html">response</a> </div> <div class="menu-item"><a href="../../ref/Tag%20Libraries/servletContext.html">servletContext</a> </div> <div class="menu-item"><a href="../../ref/Tag%20Libraries/session.html">session</a> </div> </div> </div> <div class="menu-block"><h1 class="menu-title" onclick="toggleRef(this.parentNode.childNodes[1])">Tags</h1><div class="menu-sub"> <div class="menu-item"><a href="../../ref/Tags/actionSubmit.html">actionSubmit</a> </div> <div class="menu-item"><a href="../../ref/Tags/actionSubmitImage.html">actionSubmitImage</a> </div> <div class="menu-item"><a href="../../ref/Tags/applyLayout.html">applyLayout</a> </div> <div class="menu-item"><a href="../../ref/Tags/checkBox.html">checkBox</a> </div> <div class="menu-item"><a href="../../ref/Tags/collect.html">collect</a> </div> <div class="menu-item"><a href="../../ref/Tags/cookie.html">cookie</a> </div> <div class="menu-item"><a href="../../ref/Tags/country.html">country</a> </div> <div class="menu-item"><a href="../../ref/Tags/countrySelect.html">countrySelect</a> </div> <div class="menu-item"><a href="../../ref/Tags/createLink.html">createLink</a> </div> <div class="menu-item"><a href="../../ref/Tags/createLinkTo.html">createLinkTo</a> </div> <div class="menu-item"><a href="../../ref/Tags/currencySelect.html">currencySelect</a> </div> <div class="menu-item"><a href="../../ref/Tags/datePicker.html">datePicker</a> </div> <div class="menu-item"><a href="../../ref/Tags/each.html">each</a> </div> <div class="menu-item"><a href="../../ref/Tags/eachError.html">eachError</a> </div> <div class="menu-item"><a href="../../ref/Tags/else.html">else</a> </div> <div class="menu-item"><a href="../../ref/Tags/elseif.html">elseif</a> </div> <div class="menu-item"><a href="../../ref/Tags/external.html">external</a> </div> <div class="menu-item"><a href="../../ref/Tags/field.html">field</a> </div> <div class="menu-item"><a href="../../ref/Tags/fieldError.html">fieldError</a> </div> <div class="menu-item"><a href="../../ref/Tags/fieldValue.html">fieldValue</a> </div> <div class="menu-item"><a href="../../ref/Tags/findAll.html">findAll</a> </div> <div class="menu-item"><a href="../../ref/Tags/form.html">form</a> </div> <div class="menu-item"><a href="../../ref/Tags/formatBoolean.html">formatBoolean</a> </div> <div class="menu-item"><a href="../../ref/Tags/formatDate.html">formatDate</a> </div> <div class="menu-item"><a href="../../ref/Tags/formatNumber.html">formatNumber</a> </div> <div class="menu-item"><a href="../../ref/Tags/grep.html">grep</a> </div> <div class="menu-item"><a href="../../ref/Tags/hasErrors.html">hasErrors</a> </div> <div class="menu-item"><a href="../../ref/Tags/header.html">header</a> </div> <div class="menu-item"><a href="../../ref/Tags/hiddenField.html">hiddenField</a> </div> <div class="menu-item"><a href="../../ref/Tags/if.html">if</a> </div> <div class="menu-item"><a href="../../ref/Tags/img.html">img</a> </div> <div class="menu-item"><a href="../../ref/Tags/include.html">include</a> </div> <div class="menu-item"><a href="../../ref/Tags/isAvailable.html">isAvailable</a> </div> <div class="menu-item"><a href="../../ref/Tags/isNotAvailable.html">isNotAvailable</a> </div> <div class="menu-item"><a href="../../ref/Tags/javascript.html">javascript</a> </div> <div class="menu-item"><a href="../../ref/Tags/join.html">join</a> </div> <div class="menu-item"><a href="../../ref/Tags/layoutBody.html">layoutBody</a> </div> <div class="menu-item"><a href="../../ref/Tags/layoutHead.html">layoutHead</a> </div> <div class="menu-item"><a href="../../ref/Tags/layoutTitle.html">layoutTitle</a> </div> <div class="menu-item"><a href="../../ref/Tags/link.html">link</a> </div> <div class="menu-item"><a href="../../ref/Tags/localeSelect.html">localeSelect</a> </div> <div class="menu-item"><a href="../../ref/Tags/message.html">message</a> </div> <div class="menu-item"><a href="../../ref/Tags/meta.html">meta</a> </div> <div class="menu-item"><a href="../../ref/Tags/pageProperty.html">pageProperty</a> </div> <div class="menu-item"><a href="../../ref/Tags/paginate.html">paginate</a> </div> <div class="menu-item"><a href="../../ref/Tags/passwordField.html">passwordField</a> </div> <div class="menu-item"><a href="../../ref/Tags/radio.html">radio</a> </div> <div class="menu-item"><a href="../../ref/Tags/radioGroup.html">radioGroup</a> </div> <div class="menu-item"><a href="../../ref/Tags/render.html">render</a> </div> <div class="menu-item"><a href="../../ref/Tags/renderErrors.html">renderErrors</a> </div> <div class="menu-item"><a href="../../ref/Tags/resource.html">resource</a> </div> <div class="menu-item"><a href="../../ref/Tags/select.html">select</a> </div> <div class="menu-item"><a href="../../ref/Tags/set.html">set</a> </div> <div class="menu-item"><a href="../../ref/Tags/sortableColumn.html">sortableColumn</a> </div> <div class="menu-item"><a href="../../ref/Tags/submitButton.html">submitButton</a> </div> <div class="menu-item"><a href="../../ref/Tags/textArea.html">textArea</a> </div> <div class="menu-item"><a href="../../ref/Tags/textField.html">textField</a> </div> <div class="menu-item"><a href="../../ref/Tags/timeZoneSelect.html">timeZoneSelect</a> </div> <div class="menu-item"><a href="../../ref/Tags/unless.html">unless</a> </div> <div class="menu-item"><a href="../../ref/Tags/uploadForm.html">uploadForm</a> </div> <div class="menu-item"><a href="../../ref/Tags/while.html">while</a> </div> </div> </div> </div> </div> </td> </tr> </table> <div id="footer"> Copies of this document may be made for your own use and for distribution to others, provided that you do not charge any fee for such copies and further provided that each copy contains this Copyright Notice, whether distributed in print or electronically. </div> <script type="text/javascript" src="../js/docs.js"></script> </body> </html>
In her strongest comments so far about Erdogan's statement, Merkel said the Nazi comparisons were "sad" and "so incredibly misplaced that one really can't comment, but they cannot be justified." German Chancellor Angela Merkel (L) and Turkish President Recep Tayyip Erdogan during their meeting in Istanbul. Germany said on November 25, 2016 "We will not allow the victims of the Nazis to be trivialized," she said. "These comparisons with the Nazis must stop." Erdogan made the comment on the weekend after several German municipalities canceled rallies that Turkish Cabinet ministers had planned to address in support of a national referendum to give the Turkish president more powers. Officials have cited problems with overcrowding and fire safety, and other issues. Mrs Merkel said the provocative comparisons to the Nazis were deeply unhelpful About 1.4 million people of Turkish descent living in Germany are eligible to vote in the referendum. In a step back from the heated rhetoric of recent days, Turkish Prime Minister Binali Yildirim told reporters in Ankara Thursday that Germany seems to be taking sides in the upcoming referendum, but he did not repeat the Nazi comparison. Asked about Merkel's comments, Yildirim said Germany "may be disturbed" that a yes vote is likely in the referendum, but that if it is interfering in the process it amounts to "meddling" in another country's affairs and is "very wrong." He told the AP that the way ahead "doesn't lie in any more public statements that are made from one side or the other." "Rather Germany should take steps to get rid of the restrictions we are currently facing in terms of the access we have to millions of voters living in those countries," he said. Turkish Foreign Minister Mevlut Cavusoglu, who himself had repeated Erdogan's Nazi comments, backtracked somewhat in Ankara on Thursday, saying nobody was calling Merkel or other German leaders Nazis.
Q: Create a View against an API controller? I need to create a website where some of it's pages should be accessible from external clients via an API, but I still want to make regular MVC Razor views to retrieve, display and manipulate the same data. What's the best way to achieve this? Update What the API will have to expose is just data manipulation. For the web pages, I still want to benefit from the razor chtml views, I prefer not polluting my views with redundant jQ or JS nor data- attributes that consume the data. A: Just create an MVC project with the pages you want, and then create ApiControllers (from the Web API framework) to serve as RESTful endpoints. You can program your views to retrieve data from the API actions as JSON objects, and consume them with javascript. Other people can hit the same API actions and use the data in some other way. If you want to start with a WebApi, and build basic views based on the same data that someone else could access via that API, you could inject your WebApi controllers into your normal MVC controllers, and invoke their methods to get the data that you need to build your ViewModels. This should work all right as long as your API controllers don't need to do anything "outside the box" like inspecting the Request object directly. A more robust method would be to create a "Manager" layer that handles all the business logic of your application, and then have your ApiControllers be nothing but thin wrappers around calls to their respective Manager classes. This would add a little maintenance cost, but it would adhere to the Single Responsibility Principle a little better.
Immunolocalization of PCNA, Ki67, p27 and p57 in normal and dexamethasone-induced intrauterine growth restriction placental development in rat. Intrauterine growth restriction (IUGR) is a major clinical problem which causes perinatal morbidity and mortality. Although fetuses with IUGR form a heterogeneous group, a major etiological factor is abnormal placentation. Despite the fact that placental development requires the coordinated action of trophoblast proliferation and differentiation, there are few studies on cell cycle regulators, which play the main roles in the coordination of these events. Moreover it is still not determined how mechanisms of coordination of proliferation and differentiation are influenced by dexamethasone-induced IUGR in the placenta. The aim of the study was to investigate the spatial and temporal immunolocalization of proliferating cell nuclear antigen (PCNA), Ki67, p27 and p57 in normal and IUGR placental development in pregnant Wistar rats. The study demonstrated altered expressions of distinct cell cycle proteins and cyclin dependent kinase inhibitors (CKIs) in IUGR placental development compared to control placental development. We found reduced immunostaining of PCNA and Ki67 and increased immunostaining of p27 and p57 in the dexamethasone-induced IUGR placental development compared to control placental development. In conclusion, our data show that the cell populations in the placenta stain for a number of cell cycle related proteins and that these staining patterns change as a function of both gestational age and abnormal placentation.
Konus Quick Release Mounts story continues below... As well as a large range of scopes, Konus also manufacture binoculars, bipods, red dot sights, tripods, spotting scopes, torches and scope mounts. It requires precision and patience to mount a scope to a rifle and to get everything set just right, quality mounts help make this task easier. The quick release (QR) models from Konus are manufactured from steel, making them strong and durable. They are designed to fit Weaver/Picatinny style rails and are sold as a pair of split rings. They are available for 1” or 30mm body tubes and are available in low, medium and high profiles. The design incorporates well profiled top caps, which are secured using four Torx screws and also include cross-bars on the underside of the mounts. These locate into the slots of the rail, so that the scope and rings cannot move under recoil. This feature also makes re-attaching the optic in the same position much easier. Being QR, means that no tools are required to put them on or take them off. The design incorporates individual thumb levers on each base, which can be tightened or undone in an instant by hand. These mounts are heavier than some aluminium alternatives; however, they are well made and extremely versatile.
Q: Constrain Window to certain proportions I'm experienced with iOS development, but I'm trying my hand at MacOS development tonight. Is there a way to constrain my window to certain proportions? I don't mind if the user wants to make the window larger or smaller, I just want to make sure that it always has the same height/width ratio. EDIT: - (NSSize)windowWillResize:(NSWindow *)sender toSize:(NSSize)frameSize { float ratio = self.window.frame.size.height / self.window.frame.size.width; NSSize newSize = NSMakeSize(frameSize.width, frameSize.height / ratio); return newSize; } A: The easiest way to constrain a window to a given ratio is to use either -[NSWindow setAspectRatio:] or -[NSWindow setContentAspectRatio:]. A: I stumbled upon this question, and it was exactly my needs .. However, the answer wasn't clear enough for a 1 sec realization ^^; Here is the code you would want: If you have the ratio of the whole window (including the title bar) - (NSSize)windowWillResize:(NSWindow *)sender toSize:(NSSize)frameSize { frameSize.width = frameSize.height * 1.333; return frameSize; } If you (like me) want to constrain the window size without considering the title bar. - (NSSize)windowWillResize:(NSWindow *)sender toSize:(NSSize)frameSize { NSSize contentSize = [sender contentRectForFrameRect:NSMakeRect(0, 0, frameSize.width, frameSize.height)].size; contentSize.height = contentSize.width * 0.75; return [sender frameRectForContentRect:NSMakeRect(0, 0, contentSize.width, contentSize.height)].size; } Replace the width/height ratio you want instead of 1.333, and the height/width ration instead of 0.75 My Case: I needed the iPad ratio 1024/768 = 1.333 ... A: Assign a delegate to your window if you haven't already, and implement the -windowWillResize:toSize: delegate method. The requested size is passed as the second argument; you can modify that and return a different size that matches the ratio you want. http://developer.apple.com/library/mac/documentation/Cocoa/Reference/NSWindowDelegate_Protocol/Reference/Reference.html#//apple_ref/occ/intfm/NSWindowDelegate/windowWillResize:toSize:
/* * libata-acpi.c * Provides ACPI support for PATA/SATA. * * Copyright (C) 2006 Intel Corp. * Copyright (C) 2006 Randy Dunlap */ #include <linux/module.h> #include <linux/ata.h> #include <linux/delay.h> #include <linux/device.h> #include <linux/errno.h> #include <linux/kernel.h> #include <linux/acpi.h> #include <linux/libata.h> #include <linux/pci.h> #include <linux/slab.h> #include <scsi/scsi_device.h> #include "libata.h" #include <acpi/acpi_bus.h> unsigned int ata_acpi_gtf_filter = ATA_ACPI_FILTER_DEFAULT; module_param_named(acpi_gtf_filter, ata_acpi_gtf_filter, int, 0644); MODULE_PARM_DESC(acpi_gtf_filter, "filter mask for ACPI _GTF commands, set to filter out (0x1=set xfermode, 0x2=lock/freeze lock, 0x4=DIPM, 0x8=FPDMA non-zero offset, 0x10=FPDMA DMA Setup FIS auto-activate)"); #define NO_PORT_MULT 0xffff #define SATA_ADR(root, pmp) (((root) << 16) | (pmp)) #define REGS_PER_GTF 7 struct ata_acpi_gtf { u8 tf[REGS_PER_GTF]; /* regs. 0x1f1 - 0x1f7 */ } __packed; /* * Helper - belongs in the PCI layer somewhere eventually */ static int is_pci_dev(struct device *dev) { return (dev->bus == &pci_bus_type); } static void ata_acpi_clear_gtf(struct ata_device *dev) { kfree(dev->gtf_cache); dev->gtf_cache = NULL; } /** * ata_acpi_associate_sata_port - associate SATA port with ACPI objects * @ap: target SATA port * * Look up ACPI objects associated with @ap and initialize acpi_handle * fields of @ap, the port and devices accordingly. * * LOCKING: * EH context. * * RETURNS: * 0 on success, -errno on failure. */ void ata_acpi_associate_sata_port(struct ata_port *ap) { WARN_ON(!(ap->flags & ATA_FLAG_ACPI_SATA)); if (!sata_pmp_attached(ap)) { u64 adr = SATA_ADR(ap->port_no, NO_PORT_MULT); ap->link.device->acpi_handle = acpi_get_child(ap->host->acpi_handle, adr); } else { struct ata_link *link; ap->link.device->acpi_handle = NULL; ata_for_each_link(link, ap, EDGE) { u64 adr = SATA_ADR(ap->port_no, link->pmp); link->device->acpi_handle = acpi_get_child(ap->host->acpi_handle, adr); } } } static void ata_acpi_associate_ide_port(struct ata_port *ap) { int max_devices, i; ap->acpi_handle = acpi_get_child(ap->host->acpi_handle, ap->port_no); if (!ap->acpi_handle) return; max_devices = 1; if (ap->flags & ATA_FLAG_SLAVE_POSS) max_devices++; for (i = 0; i < max_devices; i++) { struct ata_device *dev = &ap->link.device[i]; dev->acpi_handle = acpi_get_child(ap->acpi_handle, i); } if (ata_acpi_gtm(ap, &ap->__acpi_init_gtm) == 0) ap->pflags |= ATA_PFLAG_INIT_GTM_VALID; } /* @ap and @dev are the same as ata_acpi_handle_hotplug() */ static void ata_acpi_detach_device(struct ata_port *ap, struct ata_device *dev) { if (dev) dev->flags |= ATA_DFLAG_DETACH; else { struct ata_link *tlink; struct ata_device *tdev; ata_for_each_link(tlink, ap, EDGE) ata_for_each_dev(tdev, tlink, ALL) tdev->flags |= ATA_DFLAG_DETACH; } ata_port_schedule_eh(ap); } /** * ata_acpi_handle_hotplug - ACPI event handler backend * @ap: ATA port ACPI event occurred * @dev: ATA device ACPI event occurred (can be NULL) * @event: ACPI event which occurred * * All ACPI bay / device realted events end up in this function. If * the event is port-wide @dev is NULL. If the event is specific to a * device, @dev points to it. * * Hotplug (as opposed to unplug) notification is always handled as * port-wide while unplug only kills the target device on device-wide * event. * * LOCKING: * ACPI notify handler context. May sleep. */ static void ata_acpi_handle_hotplug(struct ata_port *ap, struct ata_device *dev, u32 event) { struct ata_eh_info *ehi = &ap->link.eh_info; int wait = 0; unsigned long flags; spin_lock_irqsave(ap->lock, flags); /* * When dock driver calls into the routine, it will always use * ACPI_NOTIFY_BUS_CHECK/ACPI_NOTIFY_DEVICE_CHECK for add and * ACPI_NOTIFY_EJECT_REQUEST for remove */ switch (event) { case ACPI_NOTIFY_BUS_CHECK: case ACPI_NOTIFY_DEVICE_CHECK: ata_ehi_push_desc(ehi, "ACPI event"); ata_ehi_hotplugged(ehi); ata_port_freeze(ap); break; case ACPI_NOTIFY_EJECT_REQUEST: ata_ehi_push_desc(ehi, "ACPI event"); ata_acpi_detach_device(ap, dev); wait = 1; break; } spin_unlock_irqrestore(ap->lock, flags); if (wait) ata_port_wait_eh(ap); } static void ata_acpi_dev_notify_dock(acpi_handle handle, u32 event, void *data) { struct ata_device *dev = data; ata_acpi_handle_hotplug(dev->link->ap, dev, event); } static void ata_acpi_ap_notify_dock(acpi_handle handle, u32 event, void *data) { struct ata_port *ap = data; ata_acpi_handle_hotplug(ap, NULL, event); } static void ata_acpi_uevent(struct ata_port *ap, struct ata_device *dev, u32 event) { struct kobject *kobj = NULL; char event_string[20]; char *envp[] = { event_string, NULL }; if (dev) { if (dev->sdev) kobj = &dev->sdev->sdev_gendev.kobj; } else kobj = &ap->dev->kobj; if (kobj) { snprintf(event_string, 20, "BAY_EVENT=%d", event); kobject_uevent_env(kobj, KOBJ_CHANGE, envp); } } static void ata_acpi_ap_uevent(acpi_handle handle, u32 event, void *data) { ata_acpi_uevent(data, NULL, event); } static void ata_acpi_dev_uevent(acpi_handle handle, u32 event, void *data) { struct ata_device *dev = data; ata_acpi_uevent(dev->link->ap, dev, event); } static struct acpi_dock_ops ata_acpi_dev_dock_ops = { .handler = ata_acpi_dev_notify_dock, .uevent = ata_acpi_dev_uevent, }; static struct acpi_dock_ops ata_acpi_ap_dock_ops = { .handler = ata_acpi_ap_notify_dock, .uevent = ata_acpi_ap_uevent, }; /** * ata_acpi_associate - associate ATA host with ACPI objects * @host: target ATA host * * Look up ACPI objects associated with @host and initialize * acpi_handle fields of @host, its ports and devices accordingly. * * LOCKING: * EH context. * * RETURNS: * 0 on success, -errno on failure. */ void ata_acpi_associate(struct ata_host *host) { int i, j; if (!is_pci_dev(host->dev) || libata_noacpi) return; host->acpi_handle = DEVICE_ACPI_HANDLE(host->dev); if (!host->acpi_handle) return; for (i = 0; i < host->n_ports; i++) { struct ata_port *ap = host->ports[i]; if (host->ports[0]->flags & ATA_FLAG_ACPI_SATA) ata_acpi_associate_sata_port(ap); else ata_acpi_associate_ide_port(ap); if (ap->acpi_handle) { /* we might be on a docking station */ register_hotplug_dock_device(ap->acpi_handle, &ata_acpi_ap_dock_ops, ap); } for (j = 0; j < ata_link_max_devices(&ap->link); j++) { struct ata_device *dev = &ap->link.device[j]; if (dev->acpi_handle) { /* we might be on a docking station */ register_hotplug_dock_device(dev->acpi_handle, &ata_acpi_dev_dock_ops, dev); } } } } /** * ata_acpi_dissociate - dissociate ATA host from ACPI objects * @host: target ATA host * * This function is called during driver detach after the whole host * is shut down. * * LOCKING: * EH context. */ void ata_acpi_dissociate(struct ata_host *host) { int i; /* Restore initial _GTM values so that driver which attaches * afterward can use them too. */ for (i = 0; i < host->n_ports; i++) { struct ata_port *ap = host->ports[i]; const struct ata_acpi_gtm *gtm = ata_acpi_init_gtm(ap); if (ap->acpi_handle && gtm) ata_acpi_stm(ap, gtm); } } /** * ata_acpi_gtm - execute _GTM * @ap: target ATA port * @gtm: out parameter for _GTM result * * Evaluate _GTM and store the result in @gtm. * * LOCKING: * EH context. * * RETURNS: * 0 on success, -ENOENT if _GTM doesn't exist, -errno on failure. */ int ata_acpi_gtm(struct ata_port *ap, struct ata_acpi_gtm *gtm) { struct acpi_buffer output = { .length = ACPI_ALLOCATE_BUFFER }; union acpi_object *out_obj; acpi_status status; int rc = 0; status = acpi_evaluate_object(ap->acpi_handle, "_GTM", NULL, &output); rc = -ENOENT; if (status == AE_NOT_FOUND) goto out_free; rc = -EINVAL; if (ACPI_FAILURE(status)) { ata_port_printk(ap, KERN_ERR, "ACPI get timing mode failed (AE 0x%x)\n", status); goto out_free; } out_obj = output.pointer; if (out_obj->type != ACPI_TYPE_BUFFER) { ata_port_printk(ap, KERN_WARNING, "_GTM returned unexpected object type 0x%x\n", out_obj->type); goto out_free; } if (out_obj->buffer.length != sizeof(struct ata_acpi_gtm)) { ata_port_printk(ap, KERN_ERR, "_GTM returned invalid length %d\n", out_obj->buffer.length); goto out_free; } memcpy(gtm, out_obj->buffer.pointer, sizeof(struct ata_acpi_gtm)); rc = 0; out_free: kfree(output.pointer); return rc; } EXPORT_SYMBOL_GPL(ata_acpi_gtm); /** * ata_acpi_stm - execute _STM * @ap: target ATA port * @stm: timing parameter to _STM * * Evaluate _STM with timing parameter @stm. * * LOCKING: * EH context. * * RETURNS: * 0 on success, -ENOENT if _STM doesn't exist, -errno on failure. */ int ata_acpi_stm(struct ata_port *ap, const struct ata_acpi_gtm *stm) { acpi_status status; struct ata_acpi_gtm stm_buf = *stm; struct acpi_object_list input; union acpi_object in_params[3]; in_params[0].type = ACPI_TYPE_BUFFER; in_params[0].buffer.length = sizeof(struct ata_acpi_gtm); in_params[0].buffer.pointer = (u8 *)&stm_buf; /* Buffers for id may need byteswapping ? */ in_params[1].type = ACPI_TYPE_BUFFER; in_params[1].buffer.length = 512; in_params[1].buffer.pointer = (u8 *)ap->link.device[0].id; in_params[2].type = ACPI_TYPE_BUFFER; in_params[2].buffer.length = 512; in_params[2].buffer.pointer = (u8 *)ap->link.device[1].id; input.count = 3; input.pointer = in_params; status = acpi_evaluate_object(ap->acpi_handle, "_STM", &input, NULL); if (status == AE_NOT_FOUND) return -ENOENT; if (ACPI_FAILURE(status)) { ata_port_printk(ap, KERN_ERR, "ACPI set timing mode failed (status=0x%x)\n", status); return -EINVAL; } return 0; } EXPORT_SYMBOL_GPL(ata_acpi_stm); /** * ata_dev_get_GTF - get the drive bootup default taskfile settings * @dev: target ATA device * @gtf: output parameter for buffer containing _GTF taskfile arrays * * This applies to both PATA and SATA drives. * * The _GTF method has no input parameters. * It returns a variable number of register set values (registers * hex 1F1..1F7, taskfiles). * The <variable number> is not known in advance, so have ACPI-CA * allocate the buffer as needed and return it, then free it later. * * LOCKING: * EH context. * * RETURNS: * Number of taskfiles on success, 0 if _GTF doesn't exist. -EINVAL * if _GTF is invalid. */ static int ata_dev_get_GTF(struct ata_device *dev, struct ata_acpi_gtf **gtf) { struct ata_port *ap = dev->link->ap; acpi_status status; struct acpi_buffer output; union acpi_object *out_obj; int rc = 0; /* if _GTF is cached, use the cached value */ if (dev->gtf_cache) { out_obj = dev->gtf_cache; goto done; } /* set up output buffer */ output.length = ACPI_ALLOCATE_BUFFER; output.pointer = NULL; /* ACPI-CA sets this; save/free it later */ if (ata_msg_probe(ap)) ata_dev_printk(dev, KERN_DEBUG, "%s: ENTER: port#: %d\n", __func__, ap->port_no); /* _GTF has no input parameters */ status = acpi_evaluate_object(dev->acpi_handle, "_GTF", NULL, &output); out_obj = dev->gtf_cache = output.pointer; if (ACPI_FAILURE(status)) { if (status != AE_NOT_FOUND) { ata_dev_printk(dev, KERN_WARNING, "_GTF evaluation failed (AE 0x%x)\n", status); rc = -EINVAL; } goto out_free; } if (!output.length || !output.pointer) { if (ata_msg_probe(ap)) ata_dev_printk(dev, KERN_DEBUG, "%s: Run _GTF: " "length or ptr is NULL (0x%llx, 0x%p)\n", __func__, (unsigned long long)output.length, output.pointer); rc = -EINVAL; goto out_free; } if (out_obj->type != ACPI_TYPE_BUFFER) { ata_dev_printk(dev, KERN_WARNING, "_GTF unexpected object type 0x%x\n", out_obj->type); rc = -EINVAL; goto out_free; } if (out_obj->buffer.length % REGS_PER_GTF) { ata_dev_printk(dev, KERN_WARNING, "unexpected _GTF length (%d)\n", out_obj->buffer.length); rc = -EINVAL; goto out_free; } done: rc = out_obj->buffer.length / REGS_PER_GTF; if (gtf) { *gtf = (void *)out_obj->buffer.pointer; if (ata_msg_probe(ap)) ata_dev_printk(dev, KERN_DEBUG, "%s: returning gtf=%p, gtf_count=%d\n", __func__, *gtf, rc); } return rc; out_free: ata_acpi_clear_gtf(dev); return rc; } /** * ata_acpi_gtm_xfermode - determine xfermode from GTM parameter * @dev: target device * @gtm: GTM parameter to use * * Determine xfermask for @dev from @gtm. * * LOCKING: * None. * * RETURNS: * Determined xfermask. */ unsigned long ata_acpi_gtm_xfermask(struct ata_device *dev, const struct ata_acpi_gtm *gtm) { unsigned long xfer_mask = 0; unsigned int type; int unit; u8 mode; /* we always use the 0 slot for crap hardware */ unit = dev->devno; if (!(gtm->flags & 0x10)) unit = 0; /* PIO */ mode = ata_timing_cycle2mode(ATA_SHIFT_PIO, gtm->drive[unit].pio); xfer_mask |= ata_xfer_mode2mask(mode); /* See if we have MWDMA or UDMA data. We don't bother with * MWDMA if UDMA is available as this means the BIOS set UDMA * and our error changedown if it works is UDMA to PIO anyway. */ if (!(gtm->flags & (1 << (2 * unit)))) type = ATA_SHIFT_MWDMA; else type = ATA_SHIFT_UDMA; mode = ata_timing_cycle2mode(type, gtm->drive[unit].dma); xfer_mask |= ata_xfer_mode2mask(mode); return xfer_mask; } EXPORT_SYMBOL_GPL(ata_acpi_gtm_xfermask); /** * ata_acpi_cbl_80wire - Check for 80 wire cable * @ap: Port to check * @gtm: GTM data to use * * Return 1 if the @gtm indicates the BIOS selected an 80wire mode. */ int ata_acpi_cbl_80wire(struct ata_port *ap, const struct ata_acpi_gtm *gtm) { struct ata_device *dev; ata_for_each_dev(dev, &ap->link, ENABLED) { unsigned long xfer_mask, udma_mask; xfer_mask = ata_acpi_gtm_xfermask(dev, gtm); ata_unpack_xfermask(xfer_mask, NULL, NULL, &udma_mask); if (udma_mask & ~ATA_UDMA_MASK_40C) return 1; } return 0; } EXPORT_SYMBOL_GPL(ata_acpi_cbl_80wire); static void ata_acpi_gtf_to_tf(struct ata_device *dev, const struct ata_acpi_gtf *gtf, struct ata_taskfile *tf) { ata_tf_init(dev, tf); tf->flags |= ATA_TFLAG_ISADDR | ATA_TFLAG_DEVICE; tf->protocol = ATA_PROT_NODATA; tf->feature = gtf->tf[0]; /* 0x1f1 */ tf->nsect = gtf->tf[1]; /* 0x1f2 */ tf->lbal = gtf->tf[2]; /* 0x1f3 */ tf->lbam = gtf->tf[3]; /* 0x1f4 */ tf->lbah = gtf->tf[4]; /* 0x1f5 */ tf->device = gtf->tf[5]; /* 0x1f6 */ tf->command = gtf->tf[6]; /* 0x1f7 */ } static int ata_acpi_filter_tf(struct ata_device *dev, const struct ata_taskfile *tf, const struct ata_taskfile *ptf) { if (dev->gtf_filter & ATA_ACPI_FILTER_SETXFER) { /* libata doesn't use ACPI to configure transfer mode. * It will only confuse device configuration. Skip. */ if (tf->command == ATA_CMD_SET_FEATURES && tf->feature == SETFEATURES_XFER) return 1; } if (dev->gtf_filter & ATA_ACPI_FILTER_LOCK) { /* BIOS writers, sorry but we don't wanna lock * features unless the user explicitly said so. */ /* DEVICE CONFIGURATION FREEZE LOCK */ if (tf->command == ATA_CMD_CONF_OVERLAY && tf->feature == ATA_DCO_FREEZE_LOCK) return 1; /* SECURITY FREEZE LOCK */ if (tf->command == ATA_CMD_SEC_FREEZE_LOCK) return 1; /* SET MAX LOCK and SET MAX FREEZE LOCK */ if ((!ptf || ptf->command != ATA_CMD_READ_NATIVE_MAX) && tf->command == ATA_CMD_SET_MAX && (tf->feature == ATA_SET_MAX_LOCK || tf->feature == ATA_SET_MAX_FREEZE_LOCK)) return 1; } if (tf->command == ATA_CMD_SET_FEATURES && tf->feature == SETFEATURES_SATA_ENABLE) { /* inhibit enabling DIPM */ if (dev->gtf_filter & ATA_ACPI_FILTER_DIPM && tf->nsect == SATA_DIPM) return 1; /* inhibit FPDMA non-zero offset */ if (dev->gtf_filter & ATA_ACPI_FILTER_FPDMA_OFFSET && (tf->nsect == SATA_FPDMA_OFFSET || tf->nsect == SATA_FPDMA_IN_ORDER)) return 1; /* inhibit FPDMA auto activation */ if (dev->gtf_filter & ATA_ACPI_FILTER_FPDMA_AA && tf->nsect == SATA_FPDMA_AA) return 1; } return 0; } /** * ata_acpi_run_tf - send taskfile registers to host controller * @dev: target ATA device * @gtf: raw ATA taskfile register set (0x1f1 - 0x1f7) * * Outputs ATA taskfile to standard ATA host controller. * Writes the control, feature, nsect, lbal, lbam, and lbah registers. * Optionally (ATA_TFLAG_LBA48) writes hob_feature, hob_nsect, * hob_lbal, hob_lbam, and hob_lbah. * * This function waits for idle (!BUSY and !DRQ) after writing * registers. If the control register has a new value, this * function also waits for idle after writing control and before * writing the remaining registers. * * LOCKING: * EH context. * * RETURNS: * 1 if command is executed successfully. 0 if ignored, rejected or * filtered out, -errno on other errors. */ static int ata_acpi_run_tf(struct ata_device *dev, const struct ata_acpi_gtf *gtf, const struct ata_acpi_gtf *prev_gtf) { struct ata_taskfile *pptf = NULL; struct ata_taskfile tf, ptf, rtf; unsigned int err_mask; const char *level; const char *descr; char msg[60]; int rc; if ((gtf->tf[0] == 0) && (gtf->tf[1] == 0) && (gtf->tf[2] == 0) && (gtf->tf[3] == 0) && (gtf->tf[4] == 0) && (gtf->tf[5] == 0) && (gtf->tf[6] == 0)) return 0; ata_acpi_gtf_to_tf(dev, gtf, &tf); if (prev_gtf) { ata_acpi_gtf_to_tf(dev, prev_gtf, &ptf); pptf = &ptf; } if (!ata_acpi_filter_tf(dev, &tf, pptf)) { rtf = tf; err_mask = ata_exec_internal(dev, &rtf, NULL, DMA_NONE, NULL, 0, 0); switch (err_mask) { case 0: level = KERN_DEBUG; snprintf(msg, sizeof(msg), "succeeded"); rc = 1; break; case AC_ERR_DEV: level = KERN_INFO; snprintf(msg, sizeof(msg), "rejected by device (Stat=0x%02x Err=0x%02x)", rtf.command, rtf.feature); rc = 0; break; default: level = KERN_ERR; snprintf(msg, sizeof(msg), "failed (Emask=0x%x Stat=0x%02x Err=0x%02x)", err_mask, rtf.command, rtf.feature); rc = -EIO; break; } } else { level = KERN_INFO; snprintf(msg, sizeof(msg), "filtered out"); rc = 0; } descr = ata_get_cmd_descript(tf.command); ata_dev_printk(dev, level, "ACPI cmd %02x/%02x:%02x:%02x:%02x:%02x:%02x (%s) %s\n", tf.command, tf.feature, tf.nsect, tf.lbal, tf.lbam, tf.lbah, tf.device, (descr ? descr : "unknown"), msg); return rc; } /** * ata_acpi_exec_tfs - get then write drive taskfile settings * @dev: target ATA device * @nr_executed: out parameter for the number of executed commands * * Evaluate _GTF and execute returned taskfiles. * * LOCKING: * EH context. * * RETURNS: * Number of executed taskfiles on success, 0 if _GTF doesn't exist. * -errno on other errors. */ static int ata_acpi_exec_tfs(struct ata_device *dev, int *nr_executed) { struct ata_acpi_gtf *gtf = NULL, *pgtf = NULL; int gtf_count, i, rc; /* get taskfiles */ rc = ata_dev_get_GTF(dev, &gtf); if (rc < 0) return rc; gtf_count = rc; /* execute them */ for (i = 0; i < gtf_count; i++, gtf++) { rc = ata_acpi_run_tf(dev, gtf, pgtf); if (rc < 0) break; if (rc) { (*nr_executed)++; pgtf = gtf; } } ata_acpi_clear_gtf(dev); if (rc < 0) return rc; return 0; } /** * ata_acpi_push_id - send Identify data to drive * @dev: target ATA device * * _SDD ACPI object: for SATA mode only * Must be after Identify (Packet) Device -- uses its data * ATM this function never returns a failure. It is an optional * method and if it fails for whatever reason, we should still * just keep going. * * LOCKING: * EH context. * * RETURNS: * 0 on success, -ENOENT if _SDD doesn't exist, -errno on failure. */ static int ata_acpi_push_id(struct ata_device *dev) { struct ata_port *ap = dev->link->ap; acpi_status status; struct acpi_object_list input; union acpi_object in_params[1]; if (ata_msg_probe(ap)) ata_dev_printk(dev, KERN_DEBUG, "%s: ix = %d, port#: %d\n", __func__, dev->devno, ap->port_no); /* Give the drive Identify data to the drive via the _SDD method */ /* _SDD: set up input parameters */ input.count = 1; input.pointer = in_params; in_params[0].type = ACPI_TYPE_BUFFER; in_params[0].buffer.length = sizeof(dev->id[0]) * ATA_ID_WORDS; in_params[0].buffer.pointer = (u8 *)dev->id; /* Output buffer: _SDD has no output */ /* It's OK for _SDD to be missing too. */ swap_buf_le16(dev->id, ATA_ID_WORDS); status = acpi_evaluate_object(dev->acpi_handle, "_SDD", &input, NULL); swap_buf_le16(dev->id, ATA_ID_WORDS); if (status == AE_NOT_FOUND) return -ENOENT; if (ACPI_FAILURE(status)) { ata_dev_printk(dev, KERN_WARNING, "ACPI _SDD failed (AE 0x%x)\n", status); return -EIO; } return 0; } /** * ata_acpi_on_suspend - ATA ACPI hook called on suspend * @ap: target ATA port * * This function is called when @ap is about to be suspended. All * devices are already put to sleep but the port_suspend() callback * hasn't been executed yet. Error return from this function aborts * suspend. * * LOCKING: * EH context. * * RETURNS: * 0 on success, -errno on failure. */ int ata_acpi_on_suspend(struct ata_port *ap) { /* nada */ return 0; } /** * ata_acpi_on_resume - ATA ACPI hook called on resume * @ap: target ATA port * * This function is called when @ap is resumed - right after port * itself is resumed but before any EH action is taken. * * LOCKING: * EH context. */ void ata_acpi_on_resume(struct ata_port *ap) { const struct ata_acpi_gtm *gtm = ata_acpi_init_gtm(ap); struct ata_device *dev; if (ap->acpi_handle && gtm) { /* _GTM valid */ /* restore timing parameters */ ata_acpi_stm(ap, gtm); /* _GTF should immediately follow _STM so that it can * use values set by _STM. Cache _GTF result and * schedule _GTF. */ ata_for_each_dev(dev, &ap->link, ALL) { ata_acpi_clear_gtf(dev); if (ata_dev_enabled(dev) && ata_dev_get_GTF(dev, NULL) >= 0) dev->flags |= ATA_DFLAG_ACPI_PENDING; } } else { /* SATA _GTF needs to be evaulated after _SDD and * there's no reason to evaluate IDE _GTF early * without _STM. Clear cache and schedule _GTF. */ ata_for_each_dev(dev, &ap->link, ALL) { ata_acpi_clear_gtf(dev); if (ata_dev_enabled(dev)) dev->flags |= ATA_DFLAG_ACPI_PENDING; } } } /** * ata_acpi_set_state - set the port power state * @ap: target ATA port * @state: state, on/off * * This function executes the _PS0/_PS3 ACPI method to set the power state. * ACPI spec requires _PS0 when IDE power on and _PS3 when power off */ void ata_acpi_set_state(struct ata_port *ap, pm_message_t state) { struct ata_device *dev; if (!ap->acpi_handle || (ap->flags & ATA_FLAG_ACPI_SATA)) return; /* channel first and then drives for power on and vica versa for power off */ if (state.event == PM_EVENT_ON) acpi_bus_set_power(ap->acpi_handle, ACPI_STATE_D0); ata_for_each_dev(dev, &ap->link, ENABLED) { if (dev->acpi_handle) acpi_bus_set_power(dev->acpi_handle, state.event == PM_EVENT_ON ? ACPI_STATE_D0 : ACPI_STATE_D3); } if (state.event != PM_EVENT_ON) acpi_bus_set_power(ap->acpi_handle, ACPI_STATE_D3); } /** * ata_acpi_on_devcfg - ATA ACPI hook called on device donfiguration * @dev: target ATA device * * This function is called when @dev is about to be configured. * IDENTIFY data might have been modified after this hook is run. * * LOCKING: * EH context. * * RETURNS: * Positive number if IDENTIFY data needs to be refreshed, 0 if not, * -errno on failure. */ int ata_acpi_on_devcfg(struct ata_device *dev) { struct ata_port *ap = dev->link->ap; struct ata_eh_context *ehc = &ap->link.eh_context; int acpi_sata = ap->flags & ATA_FLAG_ACPI_SATA; int nr_executed = 0; int rc; if (!dev->acpi_handle) return 0; /* do we need to do _GTF? */ if (!(dev->flags & ATA_DFLAG_ACPI_PENDING) && !(acpi_sata && (ehc->i.flags & ATA_EHI_DID_HARDRESET))) return 0; /* do _SDD if SATA */ if (acpi_sata) { rc = ata_acpi_push_id(dev); if (rc && rc != -ENOENT) goto acpi_err; } /* do _GTF */ rc = ata_acpi_exec_tfs(dev, &nr_executed); if (rc) goto acpi_err; dev->flags &= ~ATA_DFLAG_ACPI_PENDING; /* refresh IDENTIFY page if any _GTF command has been executed */ if (nr_executed) { rc = ata_dev_reread_id(dev, 0); if (rc < 0) { ata_dev_printk(dev, KERN_ERR, "failed to IDENTIFY " "after ACPI commands\n"); return rc; } } return 0; acpi_err: /* ignore evaluation failure if we can continue safely */ if (rc == -EINVAL && !nr_executed && !(ap->pflags & ATA_PFLAG_FROZEN)) return 0; /* fail and let EH retry once more for unknown IO errors */ if (!(dev->flags & ATA_DFLAG_ACPI_FAILED)) { dev->flags |= ATA_DFLAG_ACPI_FAILED; return rc; } ata_dev_printk(dev, KERN_WARNING, "ACPI: failed the second time, disabled\n"); dev->acpi_handle = NULL; /* We can safely continue if no _GTF command has been executed * and port is not frozen. */ if (!nr_executed && !(ap->pflags & ATA_PFLAG_FROZEN)) return 0; return rc; } /** * ata_acpi_on_disable - ATA ACPI hook called when a device is disabled * @dev: target ATA device * * This function is called when @dev is about to be disabled. * * LOCKING: * EH context. */ void ata_acpi_on_disable(struct ata_device *dev) { ata_acpi_clear_gtf(dev); }
Winning in any of those series will get you “recognized”, though I suppose it depends on what your definition of “recognized” is. The national series are all fairly expensive to enter. That’s why they’re meant for the most serious competitors who feel they have the best chance to win. WKA is next to dead. If you want top-level competition and to be “the man”, you gotta win at USPKS, SKUSA Pro Tour, Rotax national events, or Florida Winter Tour Rotax. You shouldn’t start in these events though. These are where the best are racing. You need to work your way up by running local races first, then once you’ve bested everyone there, you move to regional racing, then national racing. Jumping into the deep end will only make the people lapping you really upset. Unfortunately there isn’t a true licensing system in karting, preventing you from competing above your skill level, though some classes require you to have a minimum amount of experience before allowing you to enter.
/* * Copyright (C) 2005 Sascha Hauer, Pengutronix * Copyright (C) 2007 Wolfgang Grandegger <wg@grandegger.com> * * This program is free software; you can redistribute it and/or modify * it under the terms of the version 2 of the GNU General Public License * as published by the Free Software Foundation * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ #include <linux/kernel.h> #include <linux/module.h> #include <linux/interrupt.h> #include <linux/netdevice.h> #include <linux/delay.h> #include <linux/pci.h> #include <linux/platform_device.h> #include <linux/irq.h> #include <linux/can.h> #include <linux/can/dev.h> #include <linux/can/platform/sja1000.h> #include <linux/io.h> #include "sja1000.h" #define DRV_NAME "sja1000_platform" MODULE_AUTHOR("Sascha Hauer <s.hauer@pengutronix.de>"); MODULE_DESCRIPTION("Socket-CAN driver for SJA1000 on the platform bus"); MODULE_LICENSE("GPL v2"); static u8 sp_read_reg(const struct sja1000_priv *priv, int reg) { return ioread8(priv->reg_base + reg); } static void sp_write_reg(const struct sja1000_priv *priv, int reg, u8 val) { iowrite8(val, priv->reg_base + reg); } static int sp_probe(struct platform_device *pdev) { int err; void __iomem *addr; struct net_device *dev; struct sja1000_priv *priv; struct resource *res_mem, *res_irq; struct sja1000_platform_data *pdata; pdata = pdev->dev.platform_data; if (!pdata) { dev_err(&pdev->dev, "No platform data provided!\n"); err = -ENODEV; goto exit; } res_mem = platform_get_resource(pdev, IORESOURCE_MEM, 0); res_irq = platform_get_resource(pdev, IORESOURCE_IRQ, 0); if (!res_mem || !res_irq) { err = -ENODEV; goto exit; } if (!request_mem_region(res_mem->start, resource_size(res_mem), DRV_NAME)) { err = -EBUSY; goto exit; } addr = ioremap_nocache(res_mem->start, resource_size(res_mem)); if (!addr) { err = -ENOMEM; goto exit_release; } dev = alloc_sja1000dev(0); if (!dev) { err = -ENOMEM; goto exit_iounmap; } priv = netdev_priv(dev); dev->irq = res_irq->start; priv->irq_flags = res_irq->flags & IRQF_TRIGGER_MASK; priv->reg_base = addr; priv->read_reg = sp_read_reg; priv->write_reg = sp_write_reg; priv->can.clock.freq = pdata->clock; priv->ocr = pdata->ocr; priv->cdr = pdata->cdr; dev_set_drvdata(&pdev->dev, dev); SET_NETDEV_DEV(dev, &pdev->dev); err = register_sja1000dev(dev); if (err) { dev_err(&pdev->dev, "registering %s failed (err=%d)\n", DRV_NAME, err); goto exit_free; } dev_info(&pdev->dev, "%s device registered (reg_base=%p, irq=%d)\n", DRV_NAME, priv->reg_base, dev->irq); return 0; exit_free: free_sja1000dev(dev); exit_iounmap: iounmap(addr); exit_release: release_mem_region(res_mem->start, resource_size(res_mem)); exit: return err; } static int sp_remove(struct platform_device *pdev) { struct net_device *dev = dev_get_drvdata(&pdev->dev); struct sja1000_priv *priv = netdev_priv(dev); struct resource *res; unregister_sja1000dev(dev); dev_set_drvdata(&pdev->dev, NULL); if (priv->reg_base) iounmap(priv->reg_base); res = platform_get_resource(pdev, IORESOURCE_MEM, 0); release_mem_region(res->start, resource_size(res)); free_sja1000dev(dev); return 0; } static struct platform_driver sp_driver = { .probe = sp_probe, .remove = sp_remove, .driver = { .name = DRV_NAME, .owner = THIS_MODULE, }, }; static int __init sp_init(void) { return platform_driver_register(&sp_driver); } static void __exit sp_exit(void) { platform_driver_unregister(&sp_driver); } module_init(sp_init); module_exit(sp_exit);
Digital Literacy At Literacy KC, we believe in the multifaceted nature of literacy, including digital literacy. All Ticket to Read program students complete a Digital Life Skills class where students review the basics of computers, learn new skills, and become familiar and comfortable with using our on-site community computer lab. Digital literacy instruction is embedded in all of our programs, where we utilize everything from educational applications for family reading to Khan Academy for math skills. Digital skills have become a necessity in today’s society, so we reach beyond the traditional pen and paper instruction methods. Literacy KC is pleased to host a full-time Digital Inclusion Fellow, who works both inside our walls and out in the community to ensure access, devices, and digital training for all. “Literacy skills have opened the door to computer skills for me, and now I am on my way to a better job.”
Q: Powershell Custom column returning empty value with certain cmdlets When adding a custom column with the get-mailbox cmdlet i get an empty value. I'm trying to add a custom column using select @{} on the get-mailbox cmdlet. no matter what i tried the result is always an empty value, i changed the original cmdlet and replaced it with say get-process and then it did work. I even tried with explicitly providing a username and not relying on the pipeline variable, and it didn't work. get-mailbox <username> | select name, @{name="size"; expression={Get-MailboxStatistics $_.samaccountname | select -ExpandProperty TotalItemSize}} Thanks in advance for any help. Edit 1: The reason my question is not the same as Powershell script with Get-Mailbox and Get-MailboxStatistics missing output, as in the mentioned question the person was getting some results from their custom columns, just they were having issues with one row on one column, i don't even get results on the second or third rows. Edit 2: I know i can create my own object, but i was trying to not to have to, this above code should be working (in a perfect world atleast). also the reason i'm not piping directly, i would've but i was trying to present my question with the least code possible to make it easier for the community to replicate it and to dissect it, the actual code i wanted to run is this get-mailbox <username> | Get-MailboxStatistics | select displayname,TotalItemSize,@{name="Archive size";expression={Get-MailboxStatistics $_.samaccountname -archive | select -ExpandProperty TotalItemSize}} My end goal was to get a table with a list of users with their mailbox size and their archive size. Edit 3: never mind, i tried creating my own object and the same issue persisted. Provided my code used for the object. get-mailbox <username> | foreach {[pscustomobject]@{name = $_.name; "mailbox size" = Get-MailboxStatistics $_.samaccountname | select -expand TotalItemSize; "Archive size" = Get-MailboxStatistics $_.samaccountname -archive | select -expand TotalItemSize}} Thanks again! A: Got it. Your code read like this: get-mailbox <username> | Get-MailboxStatistics | select displayname,TotalItemSize,@{name="Archive size";expression={Get-MailboxStatistics $_.samaccountname -archive | select -ExpandProperty TotalItemSize}} has an error. Your expression includes reference to samaccountname which is in Get-Mailbox output but not in Get-MailboxStatistics output, thus you're querying a null mailbox. To fix, query archive mailbox with a displayName attribute. get-mailbox <username> | Get-MailboxStatistics | select displayname,TotalItemSize,@{name="Archive size";expression={Get-MailboxStatistics $_.displayname -archive | select -ExpandProperty TotalItemSize}}
/********************************************************************** *These solidity codes have been obtained from Etherscan for extracting *the smartcontract related info. *The data will be used by MATRIX AI team as the reference basis for *MATRIX model analysis,extraction of contract semantics, *as well as AI based data analysis, etc. **********************************************************************/ pragma solidity ^0.4.23; /** * @title Ownable * @dev The Ownable contract has an owner address, and provides basic authorization control * functions, this simplifies the implementation of "user permissions". */ contract Ownable { address public owner; event OwnershipRenounced(address indexed previousOwner); event OwnershipTransferred( address indexed previousOwner, address indexed newOwner ); /** * @dev The Ownable constructor sets the original `owner` of the contract to the sender * account. */ constructor() public { owner = msg.sender; } /** * @dev Throws if called by any account other than the owner. */ modifier onlyOwner() { require(msg.sender == owner); _; } /** * @dev Allows the current owner to transfer control of the contract to a newOwner. * @param newOwner The address to transfer ownership to. */ function transferOwnership(address newOwner) public onlyOwner { require(newOwner != address(0)); emit OwnershipTransferred(owner, newOwner); owner = newOwner; } /** * @dev Allows the current owner to relinquish control of the contract. */ function renounceOwnership() public onlyOwner { emit OwnershipRenounced(owner); owner = address(0); } } /** * @title Pausable * @dev Base contract which allows children to implement an emergency stop mechanism. */ contract Pausable is Ownable { event Pause(); event Unpause(); bool public paused = false; /** * @dev Modifier to make a function callable only when the contract is not paused. */ modifier whenNotPaused() { require(!paused); _; } /** * @dev Modifier to make a function callable only when the contract is paused. */ modifier whenPaused() { require(paused); _; } /** * @dev called by the owner to pause, triggers stopped state */ function pause() onlyOwner whenNotPaused public { paused = true; emit Pause(); } /** * @dev called by the owner to unpause, returns to normal state */ function unpause() onlyOwner whenPaused public { paused = false; emit Unpause(); } } /** * @title SafeMath * @dev Math operations with safety checks that throw on error */ library SafeMath { /** * @dev Multiplies two numbers, throws on overflow. */ function mul(uint256 a, uint256 b) internal pure returns (uint256 c) { if (a == 0) { return 0; } c = a * b; assert(c / a == b); return c; } /** * @dev Integer division of two numbers, truncating the quotient. */ function div(uint256 a, uint256 b) internal pure returns (uint256) { // assert(b > 0); // Solidity automatically throws when dividing by 0 // uint256 c = a / b; // assert(a == b * c + a % b); // There is no case in which this doesn't hold return a / b; } /** * @dev Subtracts two numbers, throws on overflow (i.e. if subtrahend is greater than minuend). */ function sub(uint256 a, uint256 b) internal pure returns (uint256) { assert(b <= a); return a - b; } /** * @dev Adds two numbers, throws on overflow. */ function add(uint256 a, uint256 b) internal pure returns (uint256 c) { c = a + b; assert(c >= a); return c; } } contract CopaMarket is Ownable, Pausable { using SafeMath for uint256; CopaCore private copaCore; uint256 private lockedEth; uint256 public cut; uint256 public tradingFee; bool private secureFees; struct Buy { uint256 cardId; uint256 count; uint256 ethAmount; bool open; } mapping(address => Buy[]) private buyers; struct Sell { uint256 cardId; uint256 count; uint256 ethAmount; bool open; } mapping(address => Sell[]) private sellers; struct Trade { uint256[] offeredCardIds; uint256[] offeredCardCounts; uint256[] requestedCardIds; uint256[] requestedCardCounts; bool open; } mapping(address => Trade[]) private traders; event NewBuy(address indexed buyer, uint256 indexed id, uint256 cardId, uint256 count, uint256 ethAmount); event CardSold(address indexed buyer, uint256 indexed id, address indexed seller, uint256 cardId, uint256 count, uint256 ethAmount); event CancelBuy(address indexed buyer, uint256 indexed id, uint256 cardId, uint256 count, uint256 ethAmount); event NewSell(address indexed seller, uint256 indexed id, uint256 cardId, uint256 count, uint256 ethAmount); event CardBought(address indexed seller, uint256 indexed id, address indexed buyer, uint256 cardId, uint256 count, uint256 ethAmount); event CancelSell(address indexed seller, uint256 indexed id, uint256 cardId, uint256 count, uint256 ethAmount); event NewTrade(address indexed seller, uint256 indexed id, uint256[] offeredCardIds, uint256[] offeredCardCounts, uint256[] requestedCardIds, uint256[] requestedCardCounts); event CardsTraded(address indexed seller, uint256 indexed id, address indexed buyer, uint256[] offeredCardIds, uint256[] offeredCardCounts, uint256[] requestedCardIds, uint256[] requestedCardCounts); event CancelTrade(address indexed seller, uint256 indexed id, uint256[] offeredCardIds, uint256[] offeredCardCounts, uint256[] requestedCardIds, uint256[] requestedCardCounts); constructor(address _copaCoreAddress, uint256 _cut, uint256 _tradingFee, bool _secureFees) public { copaCore = CopaCore(_copaCoreAddress); cut = _cut; tradingFee = _tradingFee; secureFees = _secureFees; lockedEth = 0; } function getCopaCoreAddress() view external onlyOwner returns (address) { return address(copaCore); } function setCopaCoreAddress(address _copaCoreAddress) external onlyOwner { copaCore = CopaCore(_copaCoreAddress); } function setCut(uint256 _cut) external onlyOwner { require(_cut > 0); require(_cut < 10000); cut = _cut; } function setTradingFee(uint256 _tradingFee) external onlyOwner { require(_tradingFee > 0); tradingFee = _tradingFee; } function getSecureFees() view external onlyOwner returns (bool) { return secureFees; } function setSecureFees(bool _secureFees) external onlyOwner { secureFees = _secureFees; } function getLockedEth() view external onlyOwner returns (uint256) { return lockedEth; } function getEthBalance() view external returns (uint256) { return address(this).balance; } function withdrawEthBalanceSave() external onlyOwner { uint256 _ethBalance = address(this).balance; owner.transfer(_ethBalance - lockedEth); } function withdrawEthBalance() external onlyOwner { uint256 _ethBalance = address(this).balance; owner.transfer(_ethBalance); } function getBuy(uint256 _id, address _address) view external returns (uint256, uint256, uint256, bool){ return (buyers[_address][_id].cardId, buyers[_address][_id].count, buyers[_address][_id].ethAmount, buyers[_address][_id].open); } function getSell(uint256 _id, address _address) view external returns (uint256, uint256, uint256, bool){ return (sellers[_address][_id].cardId, sellers[_address][_id].count, sellers[_address][_id].ethAmount, sellers[_address][_id].open); } function getTrade(uint256 _id, address _address) view external returns (uint256[], uint256[], uint256[], uint256[], bool){ return (traders[_address][_id].offeredCardIds, traders[_address][_id].offeredCardCounts, traders[_address][_id].requestedCardIds, traders[_address][_id].requestedCardCounts, traders[_address][_id].open); } function addToBuyList(uint256 _cardId, uint256 _count) external payable whenNotPaused returns (bool) { address _buyer = msg.sender; uint256 _ethAmount = msg.value; require(_ethAmount > 0); require(_count > 0); uint256 _id = buyers[_buyer].length; buyers[_buyer].push(Buy(_cardId, _count, _ethAmount, true)); lockedEth += _ethAmount; emit NewBuy(_buyer, _id, _cardId, _count, _ethAmount); return true; } function sellCard(address _buyer, uint256 _id, uint256 _cardId, uint256 _count, uint256 _ethAmount) external whenNotPaused returns (bool) { address _seller = msg.sender; uint256 _cut = 10000 - cut; uint256 _ethAmountAfterCut = (_ethAmount * _cut) / 10000; uint256 _fee = _ethAmount - _ethAmountAfterCut; require(buyers[_buyer][_id].open == true); require(buyers[_buyer][_id].cardId == _cardId); require(buyers[_buyer][_id].count == _count); require(buyers[_buyer][_id].ethAmount == _ethAmount); buyers[_buyer][_id].open = false; lockedEth -= _ethAmount; copaCore.transferFrom(_seller, _buyer, _cardId, _count); _seller.transfer(_ethAmountAfterCut); if (secureFees) { owner.transfer(_fee); } emit CardSold(_buyer, _id, _seller, _cardId, _count, _ethAmount); return true; } function cancelBuy(uint256 _id, uint256 _cardId, uint256 _count, uint256 _ethAmount) external whenNotPaused returns (bool) { address _buyer = msg.sender; require(buyers[_buyer][_id].open == true); require(buyers[_buyer][_id].cardId == _cardId); require(buyers[_buyer][_id].count == _count); require(buyers[_buyer][_id].ethAmount == _ethAmount); lockedEth -= _ethAmount; buyers[_buyer][_id].open = false; _buyer.transfer(_ethAmount); emit CancelBuy(_buyer, _id, _cardId, _count, _ethAmount); return true; } function addToSellList(uint256 _cardId, uint256 _count, uint256 _ethAmount) external whenNotPaused returns (bool) { address _seller = msg.sender; require(_ethAmount > 0); require(_count > 0); uint256 _id = sellers[_seller].length; sellers[_seller].push(Sell(_cardId, _count, _ethAmount, true)); copaCore.transferFrom(_seller, address(this), _cardId, _count); emit NewSell(_seller, _id, _cardId, _count, _ethAmount); return true; } function buyCard(address _seller, uint256 _id, uint256 _cardId, uint256 _count) external payable whenNotPaused returns (bool) { address _buyer = msg.sender; uint256 _ethAmount = msg.value; uint256 _cut = 10000 - cut; uint256 _ethAmountAfterCut = (_ethAmount * _cut) / 10000; uint256 _fee = _ethAmount - _ethAmountAfterCut; require(sellers[_seller][_id].open == true); require(sellers[_seller][_id].cardId == _cardId); require(sellers[_seller][_id].count == _count); require(sellers[_seller][_id].ethAmount <= _ethAmount); sellers[_seller][_id].open = false; copaCore.transfer(_buyer, _cardId, _count); _seller.transfer(_ethAmountAfterCut); if (secureFees) { owner.transfer(_fee); } emit CardBought(_seller, _id, _buyer, _cardId, _count, _ethAmount); return true; } function cancelSell(uint256 _id, uint256 _cardId, uint256 _count, uint256 _ethAmount) external whenNotPaused returns (bool) { address _seller = msg.sender; require(sellers[_seller][_id].open == true); require(sellers[_seller][_id].cardId == _cardId); require(sellers[_seller][_id].count == _count); require(sellers[_seller][_id].ethAmount == _ethAmount); sellers[_seller][_id].open = false; copaCore.transfer(_seller, _cardId, _count); emit CancelSell(_seller, _id, _cardId, _count, _ethAmount); return true; } function addToTradeList(uint256[] _offeredCardIds, uint256[] _offeredCardCounts, uint256[] _requestedCardIds, uint256[] _requestedCardCounts) external whenNotPaused returns (bool) { address _seller = msg.sender; require(_offeredCardIds.length > 0); require(_offeredCardCounts.length > 0); require(_requestedCardIds.length > 0); require(_requestedCardCounts.length > 0); uint256 _id = traders[_seller].length; traders[_seller].push(Trade(_offeredCardIds, _offeredCardCounts, _requestedCardIds, _requestedCardCounts, true)); for (uint256 i = 0; i < _offeredCardIds.length; i++) { copaCore.transferFrom(_seller, address(this), _offeredCardIds[i], _offeredCardCounts[i]); } emit NewTrade(_seller, _id, _offeredCardIds, _offeredCardCounts, _requestedCardIds, _requestedCardCounts); return true; } function tradeCards(address _seller, uint256 _id) external payable whenNotPaused returns (bool) { address _buyer = msg.sender; uint256 _ethAmount = msg.value; uint256[] memory _offeredCardIds = traders[_seller][_id].offeredCardIds; uint256[] memory _offeredCardCounts = traders[_seller][_id].offeredCardCounts; uint256[] memory _requestedCardIds = traders[_seller][_id].requestedCardIds; uint256[] memory _requestedCardCounts = traders[_seller][_id].requestedCardCounts; require(traders[_seller][_id].open == true); require(_ethAmount >= tradingFee); traders[_seller][_id].open = false; for (uint256 i = 0; i < _offeredCardIds.length; i++) { copaCore.transfer(_buyer, _offeredCardIds[i], _offeredCardCounts[i]); } for (uint256 j = 0; j < _requestedCardIds.length; j++) { copaCore.transferFrom(_buyer, _seller, _requestedCardIds[j], _requestedCardCounts[j]); } if (secureFees) { owner.transfer(_ethAmount); } emit CardsTraded(_seller, _id, _buyer, _offeredCardIds, _offeredCardCounts, _requestedCardIds, _requestedCardCounts); return true; } function cancelTrade(uint256 _id) external whenNotPaused returns (bool) { address _seller = msg.sender; uint256[] memory _offeredCardIds = traders[_seller][_id].offeredCardIds; uint256[] memory _offeredCardCounts = traders[_seller][_id].offeredCardCounts; uint256[] memory _requestedCardIds = traders[_seller][_id].requestedCardIds; uint256[] memory _requestedCardCounts = traders[_seller][_id].requestedCardCounts; require(traders[_seller][_id].open == true); traders[_seller][_id].open = false; for (uint256 i = 0; i < _offeredCardIds.length; i++) { copaCore.transfer(_seller, _offeredCardIds[i], _offeredCardCounts[i]); } emit CancelTrade(_seller, _id, _offeredCardIds, _offeredCardCounts, _requestedCardIds, _requestedCardCounts); return true; } } contract CopaCore is Ownable, Pausable { using SafeMath for uint256; CopaMarket private copaMarket; uint256 public packSize; uint256 public packPrice; uint256 public totalCardCount; mapping(address => uint256[1200]) public balances; struct PackBuy { uint256 packSize; uint256 packPrice; uint256[] cardIds; } mapping(address => PackBuy[]) private packBuys; event Transfer(address indexed from, address indexed to, uint256 indexed cardId, uint256 count); event TransferManual(address indexed from, address indexed to, uint256[] cardIds, uint256[] counts); event BuyPack(uint256 indexed id, address indexed buyer, uint256 packSize, uint256 packPrice, uint256[] cardIds); event BuyPacks(uint256 indexed id, address indexed buyer, uint256 packSize, uint256 packPrice, uint256 count); constructor(uint256 _packSize, uint256 _packPrice, uint256 _totalCardCount) public { packSize = _packSize; packPrice = _packPrice; totalCardCount = _totalCardCount; } function getCopaMarketAddress() view external onlyOwner returns (address) { return address(copaMarket); } function setCopaMarketAddress(address _copaMarketAddress) external onlyOwner { copaMarket = CopaMarket(_copaMarketAddress); } modifier onlyCopaMarket() { require(msg.sender == address(copaMarket)); _; } function setPackSize(uint256 _packSize) external onlyOwner { require(_packSize > 0); packSize = _packSize; } function setPrice(uint256 _packPrice) external onlyOwner { require(_packPrice > 0); packPrice = _packPrice; } function setTotalCardCount(uint256 _totalCardCount) external onlyOwner { require(_totalCardCount > 0); totalCardCount = _totalCardCount; } function getEthBalance() view external returns (uint256) { return address(this).balance; } function withdrawEthBalance() external onlyOwner { uint256 _ethBalance = address(this).balance; owner.transfer(_ethBalance); } function balanceOf(address _owner, uint256 _cardId) view external returns (uint256) { return balances[_owner][_cardId]; } function balancesOf(address _owner) view external returns (uint256[1200]) { return balances[_owner]; } function getPackBuy(address _address, uint256 _id) view external returns (uint256, uint256, uint256[]){ return (packBuys[_address][_id].packSize, packBuys[_address][_id].packPrice, packBuys[_address][_id].cardIds); } function transfer(address _to, uint256 _cardId, uint256 _count) external whenNotPaused returns (bool) { address _from = msg.sender; require(_to != address(0)); require(_count > 0); require(_count <= balances[_from][_cardId]); balances[_from][_cardId] = balances[_from][_cardId].sub(_count); balances[_to][_cardId] = balances[_to][_cardId].add(_count); emit Transfer(_from, _to, _cardId, _count); return true; } function transferMultiple(address _to, uint256[] _cardIds, uint256[] _counts) external whenNotPaused returns (bool) { address _from = msg.sender; require(_to != address(0)); for (uint256 i = 0; i < _cardIds.length; i++) { uint256 _cardId = _cardIds[i]; uint256 _count = _counts[i]; require(_count > 0); require(_count <= balances[_from][_cardId]); balances[_from][_cardId] = balances[_from][_cardId].sub(_count); balances[_to][_cardId] = balances[_to][_cardId].add(_count); emit Transfer(_from, _to, _cardId, _count); } emit TransferManual(_from, _to, _cardIds, _counts); return true; } function transferFrom(address _from, address _to, uint256 _cardId, uint256 _count) external onlyCopaMarket returns (bool) { require(_to != address(0)); require(_count > 0); require(_count <= balances[_from][_cardId]); balances[_from][_cardId] = balances[_from][_cardId].sub(_count); balances[_to][_cardId] = balances[_to][_cardId].add(_count); emit Transfer(_from, _to, _cardId, _count); return true; } function buyPack(uint256 _count) external payable whenNotPaused returns (bool) { address _buyer = msg.sender; uint256 _ethAmount = msg.value; uint256 _totalPrice = packPrice * _count; require(_count > 0); require(_ethAmount > 0); require(_ethAmount >= _totalPrice); for (uint256 i = 0; i < _count; i++) { uint256[] memory _cardsList = new uint256[](packSize); for (uint256 j = 0; j < packSize; j++) { uint256 _cardId = dice(totalCardCount); balances[_buyer][_cardId] = balances[_buyer][_cardId].add(1); _cardsList[j] = _cardId; emit Transfer(0x0, _buyer, _cardId, 1); } uint256 _id = packBuys[_buyer].length; packBuys[_buyer].push(PackBuy(packSize, packPrice, _cardsList)); emit BuyPack(_id, _buyer, packSize, packPrice, _cardsList); } emit BuyPacks(_id, _buyer, packSize, packPrice, _count); return true; } function getPack(uint256 _count) external onlyOwner whenNotPaused returns (bool) { require(_count > 0); for (uint256 i = 0; i < _count; i++) { uint256[] memory _cardsList = new uint256[](packSize); for (uint256 j = 0; j < packSize; j++) { uint256 _cardId = dice(totalCardCount); balances[owner][_cardId] = balances[owner][_cardId].add(1); _cardsList[j] = _cardId; emit Transfer(0x0, owner, _cardId, 1); } uint256 _id = packBuys[owner].length; packBuys[owner].push(PackBuy(packSize, 0, _cardsList)); emit BuyPack(_id, owner, packSize, 0, _cardsList); } emit BuyPacks(_id, owner, packSize, 0, _count); return true; } uint256 seed = 0; function maxDice() private returns (uint256 diceNumber) { seed = uint256(keccak256(keccak256(blockhash(block.number - 1), seed), now)); return seed; } function dice(uint256 upper) private returns (uint256 diceNumber) { return maxDice() % upper; } }
Oceanhorn: Monster of Uncharted Seas Has Sold Over 1 Million Across All Platforms October 15, 2016Written by Zarmena Khan FDG Entertainment has announced that its action adventure title, Oceanhorn: Monster of Uncharted Seas, has topped one million units sold across all platforms. While the game has been out on mobile devices and PC for quite some time, it released on the PlayStation 4 and Xbox One just last month. A few weeks ago, FDG shared a photo of Oceanhorn on the PS Vita, confirming that a port is underway but we’re not sure when to expect it. In related news, some PS4 players have reported that they’re unable to obtain a Platinum trophy in the game due to a glitch. FDG has said that it’s a rare save game issue and that an upcoming patch should trigger the trophy. The fix is apparently ready but will take some time to roll out due to necessary testing so stay put.
Authenticated Encryption - brunov http://blog.woobling.org/2009/10/authenticated-encryption.html ====== tptacek I think interfaces like this are a step in the right direction, not because they're likely to be correct, but because there's only one implementation to get correct instead of thousands. The AE modes --- CCM, EAX, and GCM being the most popular --- are your safest bet when picking a block cipher mode. But ask yourself: if you're being asked to think about what a block cipher mode is, are you working at the right level of abstraction? For instance: we've beat CCM constructions that couldn't properly generate a nonce at cold start (you combine a flaw like that with a crasher bug and you have a weaponizable attack), and we've seen CCM schemes whether the counter didn't have enough granularity and could be forced to wrap, which can make your scheme vulnerable to pencil-and-paper attacks. Do you know what I'm talking about here? If not, that's kind of my point. I really appreciate anybody who takes the time to point out that encryption is not the same as authentication, and that you have to do both to make a system secure. And I really appreciate anybody who evangelizes for a high-level interface, as opposed to one where you have to know that you're encrypting byte-by-byte (EAX) instead of block-by-block (CBC). I still think the soundest advice you can get is, "rely on TLS if you're moving data, and rely on PGP/GPG if you're storing it; if you have a problem that doesn't fit these perfectly, refactor your problem". ~~~ hy3lxs Another "leave it to the experts to handle the encryption details" effort is Google Keyczar: <http://www.keyczar.org/> Here's some sample code in python: <http://code.google.com/p/keyczar/wiki/SamplePythonUsage> ~~~ sweis And the experts have a hard time of it too: [http://rdist.root.org/2009/05/28/timing-attack-in-google- key...](http://rdist.root.org/2009/05/28/timing-attack-in-google-keyczar- library/) [http://groups.google.com/group/keyczar- discuss/browse_thread...](http://groups.google.com/group/keyczar- discuss/browse_thread/thread/781c4db2c0b72b36?pli=1) Back on the topic of this thread: Keyczar authenticates all symmetric ciphertexts by default. However, it HMACs the output, rather than using one of the authenticated cipher modes. ~~~ tptacek HMAC is definitely slower and might be less secure than the MAC functions used by the AE modes, which (especially with CCM and EAX) are based on AES instead of hash functions. On the other hand, there is more public code implementing HMAC than there is for EAX. ~~~ sweis Yes, they're certainly faster than HMAC. I've found that OCB is faster than CCM or EAX because it's only one pass, but unfortunately is patented. It can be used under the GNU GPL, though. Phil Rogaway considers EAX to have been "supplanted by SIV". I'm not sure if I agree with that, but do like SIV for applications requiring deterministic, authenticated output with tight length overhead.
This invention relates generally to capturing biometric data, and more particularly, to methods and systems for capturing biometric data from users during enrollment in authentication systems and during authentication transactions. Users conduct transactions with many different service providers in person and remotely over the Internet. Network-based transactions conducted over the Internet may involve purchasing items from a merchant web site or accessing confidential information from a website. Service providers that own and operate such websites typically require successfully identifying users before allowing a desired transaction to be conducted. Users are increasingly using smart devices to conduct such network-based transactions and to conduct network-based biometric authentication transactions. However, some users have difficulty orienting the smart device to capture biometric data usable for generating trustworthy authentication transaction results. For example, some users have been known to position the smart device near their waist when capturing face biometric data. Many users still look downwards even if the device is held somewhere above waist level. Such users typically do not appreciate that differently positioning the smart device should result in capturing better quality biometric data. Consequently, enrolling and authenticating such users desiring to conduct network-based transactions has been known to be an annoying, inconvenient and timely endeavor.
Robert More (MP for Dartmouth) Robert More (fl. 1386) was an English politician. More was a Member of Parliament for Dartmouth in 1386. References Category:Year of birth missing Category:Year of death missing Category:14th-century births Category:English MPs 1386
<?xml version="1.0" encoding="utf-8"?> <Script xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema"> <Commands> <ScriptAction> <ScriptCommand xsi:type="CommentCommand" CommandName="CommentCommand" IsCommented="false" SelectionName="Add Code Comment" DefaultPause="250" LineNumber="1" PauseBeforeExeucution="false" v_Comment="Read JSON from file into variable" CommandEnabled="true" /> </ScriptAction> <ScriptAction> <ScriptCommand xsi:type="ReadTextFileCommand" CommandName="ReadTextFileCommand" IsCommented="false" SelectionName="Read Text File" DefaultPause="250" LineNumber="2" PauseBeforeExeucution="false" CommandEnabled="true" v_FilePath="D:\Dropbox\Environment Folders\Desktop\sample.json" v_userVariableName="vJSON" /> </ScriptAction> <ScriptAction> <ScriptCommand xsi:type="CommentCommand" CommandName="CommentCommand" IsCommented="false" SelectionName="Add Code Comment" DefaultPause="250" LineNumber="3" PauseBeforeExeucution="false" v_Comment="Display JSON" CommandEnabled="true" /> </ScriptAction> <ScriptAction> <ScriptCommand xsi:type="MessageBoxCommand" CommandName="MessageBoxCommand" IsCommented="false" SelectionName="Show Message" DefaultPause="250" LineNumber="4" PauseBeforeExeucution="false" CommandEnabled="true" v_Message="{vJSON}" v_AutoCloseAfter="0" /> </ScriptAction> <ScriptAction> <ScriptCommand xsi:type="CommentCommand" CommandName="CommentCommand" IsCommented="false" SelectionName="Add Code Comment" DefaultPause="250" LineNumber="5" PauseBeforeExeucution="false" v_Comment="Quick JSON Selection - Show Store in 1st position" CommandEnabled="true" /> </ScriptAction> <ScriptAction> <ScriptCommand xsi:type="MessageBoxCommand" CommandName="MessageBoxCommand" IsCommented="false" SelectionName="Show Message" DefaultPause="250" LineNumber="6" PauseBeforeExeucution="false" CommandEnabled="true" v_Message="{vJSON =&gt; $.Stores[0]}" v_AutoCloseAfter="0" /> </ScriptAction> <ScriptAction> <ScriptCommand xsi:type="CommentCommand" CommandName="CommentCommand" IsCommented="false" SelectionName="Add Code Comment" DefaultPause="250" LineNumber="7" PauseBeforeExeucution="false" v_Comment="Extract Prices &gt;50 from JSON, Loop, and Display" CommandEnabled="true" /> </ScriptAction> <ScriptAction> <ScriptCommand xsi:type="ParseJsonCommand" CommandName="ParseJsonCommand" IsCommented="false" SelectionName="Parse JSON" DefaultPause="250" LineNumber="8" PauseBeforeExeucution="false" v_Comment="" CommandEnabled="true" v_InputValue="{vJSON}" v_JsonExtractor="$..Products[?(@.Price &gt;= 50)].Name" v_applyToVariableName="vParseResults" /> </ScriptAction> <ScriptAction> <ScriptCommand xsi:type="BeginListLoopCommand" CommandName="BeginListLoopCommand" IsCommented="false" SelectionName="Loop List" DefaultPause="250" LineNumber="9" PauseBeforeExeucution="false" CommandEnabled="true" v_LoopParameter="vParseResults" /> <AdditionalScriptCommands> <ScriptCommand xsi:type="MessageBoxCommand" CommandName="MessageBoxCommand" IsCommented="false" SelectionName="Show Message" DefaultPause="250" LineNumber="10" PauseBeforeExeucution="false" CommandEnabled="true" v_Message="{vParseResults}" v_AutoCloseAfter="0" /> </AdditionalScriptCommands> <AdditionalScriptCommands> <ScriptCommand xsi:type="EndLoopCommand" CommandName="EndLoopCommand" IsCommented="false" SelectionName="End Loop" DefaultPause="0" LineNumber="11" PauseBeforeExeucution="false" CommandEnabled="true" /> </AdditionalScriptCommands> </ScriptAction> </Commands> <Variables> <ScriptVariable> <VariableName>vJSON</VariableName> <VariableValue xsi:type="xsd:string"></VariableValue> </ScriptVariable> <ScriptVariable> <VariableName>vParseResults</VariableName> <VariableValue xsi:type="xsd:string"></VariableValue> </ScriptVariable> </Variables> </Script>
Q: exclude a category from a search on a specific page I have a search bar on 2 pages in my site and on my page called archive I want to exclude a category called economics (id - 9) from the search. I have placed this in my functions.php file: function archive_search_filter( $query ) { if ( $query->is_search && $query->is_main_query() ) { $query->set( 'category__not_in' , '9' ); } } add_filter( 'pre_get_posts', 'archive_search_filter' ); and it works perfectly but I want to only have this implemented on the page called archive. If I try an if statement with is_page('archive') along with this it is not working and I'm not sure of a solution. I'm wondering if the functions.php loads before it can tell what page it is and if there is another way to get this to work. A: The problem is that pre_get_posts is called after you leave the page, so you must also test to see if the search was done from there and for that you can use wp_get_referer() So (in theory, sorry I haven't the time to test this) you could have if ( !is_admin() && $query->is_search() && $query->is_main_query() && wp_get_referer() == "http://www.example.com/archive" ) { Hope that helps PS: Always add a !is_admin() check to make double-sure you're not effecting admin queries... belt & braces!
Sikh man attacked in US, Harsimrat thanks Swaraj for intervention. In a tweet Harsimrat informed that the Swaraj has asked the Indian Embassy in the USA to take up the issue with the American authorities. “I just received a call from @SushmaSwaraj Ji. She has taken a note of the racial attack and has asked @Sikh man attacked Chandigarh – Union Food Processing Minister Harsimrat Kaur Badal on Thursday asked Chief Minister Captain Amarinder Singh to walk the talk if he was really serious about boosting farmer earnings by announcing an immediate bonus of Rs 100 per quintal on paddy instead of playing politics by dubbing the historic increase of Rs 200 per Chandigarh – Union Cabinet Minister Harsimrat Kaur Badal on Tuesday thanked Prime Minister Narendra Modi and Union Home Minister Rajnath Singh for the decision of the Union government to sanction Rs 2.16 crore to compensate 40 Sikhs, who had been illegally picked up from Sri Harmandir Sahib after the then Prime Minister Indira Gandhi ordered Chandigarh – Opposition Shiromani Akali Dal on Tuesday held statewide protest dharnas against the “high” rate of taxes on petrol and diesel in Punjab. The protests were held at the district headquarters in Ludhiana, Tarn Taran, Rupnagar, Mansa, Pathankot, Jalandhar, Nawanshahr, Ferozepur, Amritsar and other cities with SAD members submitting memoranda to the representatives of Chandigarh – Union Food Processing Minister Harsimrat Kaur Badal on Friday urged Union External Affairs minister Sushma Swaraj to take up the issue of identifying Punjabis detained at Oregon detention centre in the United States as well as intervening with her US counterparts to ensure they received consular as well as legalaccess.In a statement here, Harsimrat Nakodar – Leaders of different political parties paid tributes to former Nakodar MLA and SGPC member Jathedar Kuldeep Singh Wadala at his native village Wadala during the bhog ceremony and antim ardas on Saturday. Shiromani Akali Dal (SAD) president and former Deputy Chief Minister Sukhbir Singh Badal led the party in paying tribute to the Akali Chandigarh – The Shiromani Akali Dal (SAD) on Thursday established a helpline to come to the aid of beleaguered farmers whose standing paddy crops are being destroyed on the orders of the Congress government, even as it asked its senior as well as district leadership to forcefully oppose this move across the state. In a Sangrur – To inspect various activities, being conducted by Krishi Vigyan Kendra (KVK), Kherri (Sangrur), Union Minister for Food Processing Industries, Harsimrat Kaur Badal, on Monday visited the KVK, Kherri. During her visit, she evaluated various extension activities, being performed by the Kendra, like on-farm trials, front line demonstrations, farmers and farm women trainings, skill development New Delhi/Chandigarh – Just a day after meeting BJP president Amit Shah in Chandigarh, the top leadership of the Shiromani Akali Dal met Prime Minister Narendra Modi in New Delhi on Friday and emphasised that the BJP-Akali Dal alliance in Punjab was “durable and time-tested”. The meeting with the Prime Minister assumes significance in view of NEW DELHI: Food Process – ing Minister Harsimrat Kaur Badal on Friday said she has written to the Uttar Pradesh government for expediting the process for Baba Ramdev’s Patanjali Ayurved to set up the proposed Rs 6,000-crore mega food park. “I have written to the Uttar Pradesh Chief Minister to sort out all the issues NEW DELHI: More than 3.85 lakh jobs have been created in the food processing sector in the last four years and 4 lakh more will be generated by the end of current fiscal as 15 new mega food parks become operational, Union Minister Harsimrat Kaur Badal said on Monday. Besides, 3.4 lakh direct and indirect jobs New Delhi – As farmers’ protest entered 6th day in several states, Union Minister Harsimrat Kaur Badal on Monday blamed the Congress’ 70-years ‘misrule’ for the current plight of farmers and described the party as ‘pot calling the kettle black. She further said the Congress president Rahul Gandhi should first address the agrarian crisis in Punjab where CHANDIGARH: Shiromani Akali Dal (SAD) president Sukhbir Singh Badal on Monday announced the first officebearers’ list of Chandigarh unit after making considerable deliberations with Hardeep Singh Butrela, the party head in the UT. Releasing the list from the party headquarters, Badal said that all the dedicated and hardworking people including leaders as well as party Chandigarh – The SAD president Sukhbir Singh Badal and Union Minister Harsimrat Kaur Badal on Friday thanked the Prime Minister Narendra Modi, the BJP president Amit Shah and Finance Minister Arun Jaitley for the decision to grant exemption on GST on purchases for langar in gurdwaras and other religious shrines in the country. The decision will Chandigarh – Shiromani Akali Dal (SAD) president Sukhbir Singh Badal on Thursday thanked the party rank and file for working tirelessly to retain the party vote share in Shahkot bye-election to emerge as the principal opposition party. In a statement here, the SAD president said the SAD retained its vote share polling 43,944 votes against Chandigarh – Union Food Processing Industry Minister Harsimrat Kaur Badal on Saturday rebuked Chief Minister Captain Amrinder Singh led Congress government in the state for turning down the central government’s pro-poor health insurance scheme, saying it had been proved time and again that the welfare of people was not on the Congress government’s agenda. In a Bathinda – Shiromani Akali Dal (SAD) president Sukhbir Singh Badal on Monday thanked Union Transport and Highways Minister Nitin Gadkari for a slew of projects given to Punjab by the NDA government two of which including the Zirakpur-Bathinda and Amritsar-Bathinda highways, were inaugurated on Monday.Addressing a huge public gathering at Goniana as a thanksgiving gesture to Sangrur – Union Minister for Food Processing Industries Harsimrat Kaur Badal on Sunday inaugurated a ‘Pradhan Mantri Kaushal Kendra’ in Sunam, about 15-km from here. This is the fourth ‘Kaushal Kendra’ in Punjab. These training centres are being established to skill the unskilled population of the country. Inaugurating the centre, Harsimrat said: “These centres will opened BATHINDA: Union Minister for Food Processing Industries Harsimrat Kaur Badal on Saturday underlined the need for skill development of youths so that they are gainfully engaged and become financially independent. Badal on Saturday inaugurated two centres under the Pradhan Mantri Kaushal Kendra (PMKK) scheme at Bathinda and Mansa.Speaking on the occasion, Harsimrat expressed gratitude to Chandigarh – Senior SAD leader and Union Minister Harsimrat Kaur Badal has urged the Prime Minister Narendra Modi to waive GST on ingredients used to make ‘langars’ in gurdwaras. In her April 26 letter to the PM, Harsimrat said she hopes that the religious institutions serving free ‘langar’ will be exempted from the central Goods and
Olympics February 12, 1986|By Larry Greene LINGERING COSTS. The 1976 Summer Olympic Games will have cost more than $3.5 billion by the time Montreal makes its last payment on the debt in 1995. The figure, calculated using data provided by the city and the province's Olympic Installations Board, includes interest payments of $763 million on loans negotiated by the Quebec government and $520 million on loans made by the city.
/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with this * work for additional information regarding copyright ownership. The ASF * licenses this file to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the * License for the specific language governing permissions and limitations * under the License. */ package org.apache.hadoop.hbase.io.encoding; import java.nio.ByteBuffer; import org.apache.hadoop.hbase.KeyValue; import org.apache.hadoop.hbase.util.ByteBufferUtils; /** * Stores the state of data block encoder at the beginning of new key. */ class CompressionState { int keyLength; int valueLength; short rowLength; int prevOffset = FIRST_KEY; byte familyLength; int qualifierLength; byte type; private final static int FIRST_KEY = -1; boolean isFirst() { return prevOffset == FIRST_KEY; } /** * Analyze the key and fill the state. * Uses mark() and reset() in ByteBuffer. * @param in Buffer at the position where key starts * @param keyLength Length of key in bytes * @param valueLength Length of values in bytes */ void readKey(ByteBuffer in, int keyLength, int valueLength) { readKey(in, keyLength, valueLength, 0, null); } /** * Analyze the key and fill the state assuming we know previous state. * Uses mark() and reset() in ByteBuffer to avoid moving the position. * <p> * This method overrides all the fields of this instance, except * {@link #prevOffset}, which is usually manipulated directly by encoders * and decoders. * @param in Buffer at the position where key starts * @param keyLength Length of key in bytes * @param valueLength Length of values in bytes * @param commonPrefix how many first bytes are common with previous KeyValue * @param previousState State from previous KeyValue */ void readKey(ByteBuffer in, int keyLength, int valueLength, int commonPrefix, CompressionState previousState) { this.keyLength = keyLength; this.valueLength = valueLength; // fill the state in.mark(); // mark beginning of key if (commonPrefix < KeyValue.ROW_LENGTH_SIZE) { rowLength = in.getShort(); ByteBufferUtils.skip(in, rowLength); familyLength = in.get(); qualifierLength = keyLength - rowLength - familyLength - KeyValue.KEY_INFRASTRUCTURE_SIZE; ByteBufferUtils.skip(in, familyLength + qualifierLength); } else { rowLength = previousState.rowLength; familyLength = previousState.familyLength; qualifierLength = previousState.qualifierLength + keyLength - previousState.keyLength; ByteBufferUtils.skip(in, (KeyValue.ROW_LENGTH_SIZE + KeyValue.FAMILY_LENGTH_SIZE) + rowLength + familyLength + qualifierLength); } readTimestamp(in); type = in.get(); in.reset(); } protected void readTimestamp(ByteBuffer in) { // used in subclasses to add timestamp to state ByteBufferUtils.skip(in, KeyValue.TIMESTAMP_SIZE); } void copyFrom(CompressionState state) { keyLength = state.keyLength; valueLength = state.valueLength; rowLength = state.rowLength; prevOffset = state.prevOffset; familyLength = state.familyLength; qualifierLength = state.qualifierLength; type = state.type; } }
Libidibia ferrea presents antiproliferative, apoptotic and antioxidant effects in a colorectal cancer cell line. Colorectal cancer is noted for being one of the most frequent of tumors, with expressive morbidity and mortality rates. In new drug discovery, plants stand out as a source capable of yielding safe and high-efficiency products. Well known in Brazilian popular medicine, Libidibia ferrea (Mart. Ex Tul.) L.P. Queiroz var. ferrea (better known as "ironwood" or "jucá"), has been used to treat a wide spectrum of conditions and to prevent cancer. Using methodologies that involved flow cytometry, spectrophotometry and RT-qPCR assays, crude extracts of the fruits of L. ferrea (20T, 40T, 60T and 80T) were evaluated at 24h and/or 48h for: their ability to inhibit cell proliferation; induce apoptosis through Bcl-2, caspase-3 and Apaf-1; their antioxidant activity and effects on important targets related to cell proliferation (EGFR and AKT) in the HT-29 human colorectal cancer lineage. The results revealed high antiproliferative potential as compared to the controls, induction of apoptosis through the intrinsic pathway, and probable tumor inhibition activity under the mediation of important targets in tumorigenesis. In addition, L. ferrea revealed antioxidant, lipid peroxidation and chemoprotective effects in healthy cells. Thus, L. ferrea derivatives have important anticancer effects, and may be considered promising candidate for colorectal cancer therapy.
Actinobacillus actinomycetemcomitans, a major pathogen in certain human periodontal diseases, elaborates a potent leukotoxin. This polypeptide kills human neutrophils, monocytes and T lymphocytes and may impair host antibacterial resistance by destroying or perturbing these cells in infected tissues. Results of current studies indicate that the toxin disrupts and permeability barrier of the plasma membrane of susceptible cells. This results in a rapid influx of Ca2+ (and probably other ions) and water into the cells and ultimately leads to osmotic lysis. In the proposed study, we shall more completely define the lytic mechanism of action of the leukotoxin. In Aim #1, experiments will explore whether toxin-induced membrane disturbances are a consequence of the formation of "foreign", ion- permeant pores in the plasmalemma or whether the toxin perturbs existing channels or carrier systems in the membrane. In Aim #2, experiments will delineate whether Ca2+ plays a functional role in the leukocidal reaction. the sustained rise in cytoplasmic free Ca2+ seen during intoxication may be important because high levels of this electrolyte can have deleterious effects on numerous cellular functions. Preliminary data indicate that the leukotoxic reaction is inhibited by omitting Ca2+ from the cell culture medium. Aim #3 relates to the role of phospholipase A2 in the leukocidal process: the toxin is a powerful activator of this enzyme and we have found that anti-phospholipase drugs inhibit leukotoxicity. Phospholipase A2 hydrolyzes membrane phospholipids and gives rise to products and metabolites with membranolytic properties. Experiments are proposed to study the mechanism and consequences of leukotoxin stimulation of phospholipase A2. Finally in Aim #4, a strategy is presented to identify the specific domain(s) on the toxin responsible for disrupting the plasma membrane and activating phospholipase A2. Recombinant DNA techniques will be employed to express toxin-derived peptides which will be analyzed for biological activities. Fundamental insights into the pathobiology of the Actinobacillus leukotoxin will bring us closer to a molecular definition of its role in human periodontal infections. In addition, detailed studies on the action of the Actinobacillus leukotoxin will contribute to a better understanding of the biology of other membrane-active bacterial cytolysins.
package com.alibaba.jvm.sandbox.qatest.core.util; import java.io.File; import java.io.FileOutputStream; import java.io.IOException; import java.nio.charset.Charset; import java.util.LinkedHashMap; import java.util.Map; import java.util.jar.JarEntry; import java.util.jar.JarOutputStream; import java.util.jar.Manifest; import static com.alibaba.jvm.sandbox.qatest.core.util.QaClassUtils.toByteArray; import static org.apache.commons.io.IOUtils.closeQuietly; import static org.apache.commons.lang3.StringUtils.replace; public class JarBuilder { private final File targetJarFile; private final Manifest manifest = new Manifest(); private final Map<String, byte[]> entryDataMap = new LinkedHashMap<String, byte[]>(); public JarBuilder(File targetJarFile) { this.targetJarFile = targetJarFile; } public JarBuilder manifest(String name, String value) { manifest.getMainAttributes().putValue(name, value); return this; } public JarBuilder putEntry(Class<?> clazz) throws IOException { entryDataMap.put( replace(clazz.getName(), ".", "/") + ".class", toByteArray(clazz) ); return this; } public JarBuilder putEntry(String name, byte[] dataArray) { entryDataMap.put(name, dataArray); return this; } public JarBuilder putEntry(String name, String text, Charset charset) { entryDataMap.put(name, text.getBytes(charset)); return this; } public JarBuilder putEntry(String name, String text) { entryDataMap.put(name, text.getBytes()); return this; } private static Manifest mergeJarManifest(final Manifest targetJarManifest) { Manifest mergeManifest = new Manifest(); if (null != targetJarManifest) { mergeManifest.getEntries().putAll(targetJarManifest.getEntries()); } mergeManifest.getMainAttributes().putValue("Manifest-Version", "1.0"); mergeManifest.getMainAttributes().putValue("Created-By", "QaJarUtils"); mergeManifest.getMainAttributes().putValue("Author", "oldmanpushcart@gmail.com"); return mergeManifest; } public File build() throws IOException { JarOutputStream jos = null; try { jos = new JarOutputStream(new FileOutputStream(targetJarFile), mergeJarManifest(manifest)); for (Map.Entry<String, byte[]> entry : entryDataMap.entrySet()) { jos.putNextEntry(new JarEntry(entry.getKey())); jos.write(entry.getValue()); } } finally { closeQuietly(jos); } return targetJarFile; } public static JarBuilder building(final File targetJarFile) { return new JarBuilder(targetJarFile); } }
*q + 3094. Determine s(10). 664 Let y(s) = -4*s**2 + 413*s - 9600. Calculate y(68). -12 Let n(h) = -237*h - 16107. Give n(-68). 9 Let w(o) = 14*o**2 + 63*o - 7. Determine w(-4). -35 Let n(q) = q**3 + q**2 - 39*q - 12. What is n(-8)? -148 Let k(f) = f**3 - 2*f**2 - 84*f + 21. Calculate k(10). -19 Let g(n) = n**3 - 65*n**2 + 679*n - 103. Give g(52). 53 Let x(u) = -415*u - 481. Calculate x(-1). -66 Let p(k) = -5*k**2 - 21*k + 12. What is p(-8)? -140 Let u(o) = -o**3 - 15*o**2 - 54*o + 18. Determine u(-9). 18 Let r(g) = -g**3 + 9*g**2 + g - 35. Calculate r(0). -35 Let j(r) = 4*r + 225. What is j(-55)? 5 Let k(c) = 20*c - 128. Calculate k(6). -8 Let a(k) = -41*k + 67. Give a(4). -97 Let q(w) = 15*w**3 - 2*w**2 + 128*w - 253. Determine q(2). 115 Let k(f) = 262*f + 526. Give k(-2). 2 Let a(y) = 136*y - 14515. Give a(107). 37 Let u(n) = -3*n**3 + 164*n**2 + 55*n + 3. Give u(55). 3 Let i(u) = -3*u**2 - 130*u + 59. Determine i(-43). 102 Let w(p) = 4*p**2 - 44*p + 56. Give w(17). 464 Let c(n) = n**2 - 24*n - 189. Determine c(29). -44 Let m(i) = -13*i + 75. Give m(20). -185 Let j(p) = -p**2 - 11*p - 14. Give j(5). -94 Let n(f) = 94*f**2 + 1134*f + 79. What is n(-12)? 7 Let l(r) = r**2 + 50*r - 21. Calculate l(0). -21 Let c(j) = j**2 + 59*j + 325. Give c(-7). -39 Let q(h) = 70*h - 134. Calculate q(0). -134 Let k(z) = -4*z + 120. Give k(-27). 228 Let q(o) = -o**3 - 96*o**2 + 207*o + 1071. Give q(-98). -7 Let o(k) = 671*k + 15415. What is o(-23)? -18 Let v(s) = 3*s**2 + 118*s - 273. What is v(-41)? -68 Let y(z) = -2*z**3 + 31*z**2 - 6*z - 133. Give y(15). 2 Let p(w) = -w**3 + 39*w**2 + 491*w - 39. Calculate p(49). 10 Let c(l) = -2*l**2 + 5*l + 121. Calculate c(8). 33 Let n(p) = -97*p - 70. Give n(-1). 27 Let r(k) = -6*k**3 - k**2 + 32*k + 32. Calculate r(-1). 5 Let a(d) = -7*d**2 - 196*d - 1147. What is a(-6)? -223 Let c(n) = -6*n - 66. What is c(11)? -132 Let z(j) = 25*j**2 + 369*j - 88. Determine z(-15). 2 Let y(r) = 1445*r + 14468. What is y(-10)? 18 Let t(d) = 4*d**2 + 10*d - 10. Give t(-3). -4 Let g(y) = 115*y + 19. Calculate g(4). 479 Let g(h) = -26*h**2 + 29*h - 53. Calculate g(2). -99 Let k(h) = 3*h**2 - 24*h - 28. Give k(-1). -1 Let t(c) = -4755*c + 47552. Give t(10). 2 Let s(t) = t**2 - 126*t - 2159. Determine s(-15). -44 Let o(q) = q**3 - 2*q**2 - 2*q + 11. Give o(5). 76 Let l(a) = a**3 + 84*a**2 + 2*a + 145. Determine l(-84). -23 Let b(w) = w**3 + 6*w**2 + 5*w + 86. Calculate b(-7). 2 Let w(c) = c**3 - 11*c**2 + 16*c + 52. Determine w(9). 34 Let k(u) = 2*u**3 + 75*u**2 - 47*u - 80. Give k(-38). 262 Let f(m) = m**2 - 1645*m - 48535. Calculate f(-29). 11 Let m(h) = -37*h + 741. Determine m(20). 1 Let h(t) = -5*t - 180. Determine h(-27). -45 Let x(n) = -39*n - 635. Determine x(-16). -11 Let z(l) = -l**3 + 33*l**2 - 3*l + 132. Give z(33). 33 Let f(z) = -70*z - 1007. What is f(-10)? -307 Let s(f) = -f**3 + 3*f**2 - 189*f - 1004. Determine s(-5). 141 Let o(r) = -4*r - 160. Determine o(26). -264 Let p(g) = 3*g**2 + 12*g - 10. What is p(-6)? 26 Let h(a) = -1191*a - 3577. What is h(-3)? -4 Let k(p) = -p**3 + 10*p**2 + 83*p - 140. Give k(15). -20 Let p(y) = -y**3 + 26*y**2 - 33*y + 199. Determine p(25). -1 Let v(o) = 8*o + 120. Give v(-21). -48 Let p(s) = -s**3 + 85*s**2 + 1853*s - 19. Calculate p(-18). -1 Let s(m) = -2*m**3 - 26*m**2 + 13*m - 13. Calculate s(-13). -182 Let h(u) = u**3 + 131*u**2 + 128*u - 257. What is h(-130)? 3 Let u(i) = -i**3 - 17*i**2 - 65*i + 17. Calculate u(-11). 6 Let j(x) = -2*x**2 - 42*x + 189. What is j(5)? -71 Let d(i) = 106*i**2 - 945*i - 74. What is d(9)? 7 Let c(z) = 2*z**3 - 23*z**2 - 21*z + 117. Determine c(12). 9 Let h(n) = -38*n - 23. Determine h(-5). 167 Let l(h) = -h**2 + 52*h - 93. Determine l(51). -42 Let f(b) = b**3 + 14*b**2 - 29*b - 185. Determine f(-15). 25 Let i(f) = 3*f - 60. Give i(4). -48 Let c(b) = b**3 + 8*b**2 - 30*b - 103. Give c(-10). -3 Let l(p) = -20*p**2 - 8*p - 2. What is l(-4)? -290 Let d(b) = -b**3 + 130*b**2 + 1399*b + 132. Calculate d(140). -8 Let m(q) = -113*q - 11753. Give m(-104). -1 Let f(i) = 247*i - 22975. Determine f(93). -4 Let c(g) = g**3 + 2*g**2 - 12*g - 28. Give c(-6). -100 Let i(x) = -13*x**2 + 2071*x - 630. Determine i(159). 6 Let y(a) = a**2 - 1452*a - 42951. What is y(-29)? -2 Let c(i) = 14*i**2 - 65*i + 64. Give c(3). -5 Let b(f) = f**3 + 16*f**2 - 36*f - 22. Give b(-18). -22 Let m(r) = -441*r + 3139. Determine m(7). 52 Let k(q) = q**2 + 577*q + 1719. What is k(-3)? -3 Let u(h) = 12*h - 28. What is u(8)? 68 Let g(u) = -2*u**3 + 70*u**2 + 3*u - 79. Determine g(35). 26 Let j(s) = -29*s**2 + 15*s + 36. Determine j(-3). -270 Let y(l) = -l**3 - 47*l**2 + 3*l + 392. What is y(-47)? 251 Let u(b) = 10*b**2 + 393*b + 66. Calculate u(-39). -51 Let n(i) = -i**3 + 47*i**2 - 114*i + 1087. Give n(45). 7 Let w(r) = -28*r**2 - 1678*r + 115. Give w(-60). -5 Let j(k) = 7*k**2 + 477*k + 196. Determine j(-68). 128 Let b(d) = d**3 - 62*d**2 - 23*d + 5127. Give b(61). 3 Let s(u) = 200*u**2 + 11001*u + 79. Determine s(-55). 24 Let w(y) = 342*y + 2386. Determine w(-7). -8 Let k(a) = 45*a**2 + 2166*a + 283. Give k(-48). -5 Let k(s) = -9*s - 133. Calculate k(-17). 20 Let p(q) = -2*q**3 + 111*q**2 - 169*q + 366. Give p(54). -12 Let k(d) = d**3 + 16*d**2 + 3*d + 44. What is k(-16)? -4 Let i(k) = -k**3 - 13*k**2 - 3*k - 815. Calculate i(-16). 1 Let j(y) = 7*y**3 + 154*y**2 - 22*y - 479. Calculate j(-22). 5 Let f(w) = -28*w - 121. Give f(4). -233 Let r(d) = -d**3 - 8*d**2 - 11*d + 24. Calculate r(-6). 18 Let p(q) = -q**3 - 125*q**2 - 5*q - 770. Give p(-125). -145 Let r(c) = -c**3 + 10*c**2 + 254*c - 1084. Calculate r(20). -4 Let l(w) = -w**3 - 15*w**2 + 46*w - 286. Give l(-18). -142 Let s(c) = -3*c**3 + 40*c**2 - 103*c - 179. What is s(6)? -5 Let x(u) = -3*u**2 + 44*u + 189. What is x(19)? -58 Let v(p) = p + 99. Determine v(-109). -10 Let r(j) = 2*j - 116. Give r(34). -48 Let x(g) = -g**2 - 28*g + 31. Give x(-12). 223 Let g(x) = -x**3 - 19*x**2 - 30*x + 13. What is g(-2)? 5 Let h(f) = -f**2 - 2*f + 14. Determine h(-5). -1 Let t(a) = -a**2 + 9*a - 217. What is t(0)? -217 Let k(q) = q**2 - 72*q + 378. Give k(6). -18 Let s(h) = -h**3 - 9*h**2 + 17*h + 87. What is s(-9)? -66 Let l(k) = 9*k**2 + 255*k + 288. Give l(-27). -36 Let m(v) = -v**3 + 20*v**2 - 8*v - 15. Calculate m(17). 716 Let d(v) = 26*v - 1063. Give d(40). -23 Let q(x) = 3*x**2 + 4*x - 1. Give q(-3). 14 Let c(y) = 36*y + 380. Give c(-7). 128 Let k(u) = -338*u + 5439. Give k(16). 31 Let x(j) = -j**3 + 46*j**2 + 263*j - 357. What is x(51)? 51 Let u(f) = -431*f - 3043. What is u(-7)? -26 Let f(y) = y**2 + 74*y - 658. Give f(-82). -2 Let v(f) = f**3 - 14*f**2 - 40*f + 24. Give v(16). -104 Let p(z) = 21*z**2 - 277*z + 298. Calculate p(12). -2 Let g(f) = f**3 + 18*f**2 - 23*f + 2. Determine g(-19). 78 Let n(i) = -268*i + 5091. Give n(19). -1 Let a(y) = -5*y**2 - 29*y - 39. Give a(-5). -19 Let r(y) = -167*y + 39. Give r(2). -295 Let z(c) = c**3 - 32*c**2 + 4*c + 23. Calculate z(32). 151 Let l(f) = 15*f + 1059. Give l(-72). -21 Let v(s) = -s**3 - 103*s**2 + s + 97. Calculate v(-103). -6 Let x(j) = j**2 - 62*j - 222. Calculate x(-4). 42 Let g(s) = 2*s**2 - 21*s + 28. What is g(8)? -12 Let y(n) = n**2 + 116*n - 7245. What is y(-161)? 0 Let f(s) = -s**3 + 13*s**2 + 9*s - 205. What is f(7)? 152 Let z(p) = p**3 - 2*p**2 - 44*p - 88. Determine z(0). -88 Let x(h) = 2*h**3 + 23*h**2 + 12*h - 13. Determine x(-11). -24 Let g(s) = -12*s - 732. What is g(-69)? 96 Let w(x) = 1078*x + 25881. What is w(-24)? 9 Let k(q) = -3*q**2 + 138*q - 108. Calculate k(45). 27 Let s(r) = 132*r - 3132. Determine s(24). 36 Let c(b) = b**3 + 4*b**2 - 46*b - 151. What is c(-3)? -4 Let y(i) = -i**3 + 12*i**2 - 23*i - 34. What is y(9)? 2 Let k(w) = 12*w - 144. Give k(13). 12 Let t(l) = -l**2 + 17*l + 11. Determine t(16). 27 Let o(a) = -62*a**2 - 2296*a - 80. What is o(-37)? -6 Let j(a) = a**2 + 36*a + 221. Give j(-30). 41 Let w(g) = g**3 + 4*g**2 + 13*g - 50. Calculate w(4). 130 Let d(y) = -367*y - 2225. Give d(-6). -23 Let p(h) = -h**3 - 51*h**2 - 150*h - 290. Give p(-48). -2 Let z(j) = 32*j - 31. Calculate z(7). 193 Let r(c) = -93*c**2 - 7537*c - 325. Give r(-81). -1 Let g(i) = -63*i + 2187. Give g(39). -270 Let a(m) = m**2 - 4*m - 52. Determine a(-5). -7 Let f(i) = 4*i - 576. Determine
The Topical Microbicide Safety and Efficacy Evaluation in Nonhuman Primates contract provides preclinical testing (safety and efficacy) of topical microbicides, with or without barrier devices, using nonhuman primate models. All test products, provided by NIAID, will first complete safety evaluation with repeated intravaginal product application. If an acceptable safety profile results from these studies, a product will progress (with NIAID approval) to efficacy studies involving one or more STI. Safety measures include microbiologic and pH assessments and documentation of mucosal tissue responses as evidenced by colposcopic evaluation. Efficacy will be determined by a product's ability to prevent infection by the challenge pathogen.
Bars where Pete has had a Drink (3,476 bars; 1,545 bars in Seattle) - Click titles below for Lists: Bars where Pete has had a drink Sunday, September 28, 2014 The Triplehorn Brewing "Micropub" is an archetypal suburban craft brewery, with a small tasting carved out of the brewery warehouse, with food trucks and various events ("Hordefest") in the parking lot. Saturday, September 27, 2014 The city of Duvall, it is said, was officially incorporated for the purpose of having a saloon (city status was apparently required to establish one in 1913). The Hix Market and the Grange Hall here were moved here from the Snoqualmie riverside in 1909, along with the rest of the town, then called Cherry Valley, to make way for the railroad. It's now a city of about 7,000 people, with a Main Street section that's been gussied up with public art and broad walking space. The Duvall Grille and Tap Room fits comfortably into this modest span between locals and sprinkles of tourists -- nothing fancy, but a homey sort of setting where you can get a good beer, burger or breakfast. Thursday, September 25, 2014 Woodinville is bedroom community northeast of Seattle, where an old logging and farming community now looks like everything was built in the last five years. Today it is now best known for the 80 wineries in the area, their carefully manicured lawns alternating with warehouses and industrial parks. In one of the latter, Kat Stremlau and Jan Newton established a small craft beer bar in December of 2012. The setting is as soul-less as you would expect from an industrial park, but they do deliver on the beer, with 44 interesting choices on tap, along with sandwiches and various small plates. Wednesday, September 24, 2014 I love Josh Henderson's Westward, and quite like his Hollywood Tavern, but I just have never understood what all the fuss is about over Skillet Diners. So I could post about how average I have always found the food, drinks, and decor. But given that apparently every single other person in Seattle thinks they're fantastic, I must just be off my rocker on this one, and won't waste your time. While the horse is well out of this barn, some of my age group would still have us despair of the gentrification and hipification of north Seattle's old Scandinavian shake mill and fishing community of Ballard. But while I prefer dive bars filled with crusty old blue collar workers over faceless condo buildings as much as anyone, bars as good as Percy's simply leave one no option but to capitulate. Percy's & Co. Apothecary Bar and Restaurant is in an old bar location -- built in 1898 according to the owners and in 1893 according to the Ballard Historical Society -- which first housed Percy Sankey's "Ballard Bar." It has hosted various bars and types of bars since then, including, according to rumor, throughout the years of prohibition. Seattle hipster hotspot owners Wade Weigel (Ace Hotel, Rudy's Barber Shops) and Jeff Ofelt (Bimbo's, Cha Cha, King's Hardware) upgraded the food considerably and made what had been a fairly attractive bar substantially more elegant, as well as increasing the nods to the history of the location and neighborhood. They host classic movies on the patio and live music from blue grass to garage rock. More to the point, they induced craft cocktailers Kyle Taylor and Joe Petersen of New York's "Apotheke" to join them, and to create delicious and creative drinks with an antique herbal pharmacist spin. Even with the old Smoke Shop and Hattie's Hat still serving the dive crowd, it is increasingly rare to run into someone like the old fisherman I met in a joint up the street, who used to trade salmon for drinks, and proudly told me that in all his years of walking back to his boat from the bars, he'd only fallen in the water once. And the space that is now Percy's is a world away from the seedy old Silver Spot Beer Parlor, which took over after prohibition. But while the condo buildings rise relentlessly around it, this old avenue has preserved its century-old buildings, even while it has become awash in great places to eat and drink -- unmatched in Seattle outside of Capitol Hill. And damned if Percy's isn't one of the best of them. Sunday, September 21, 2014 For three and a half decades this was a Greek diner with a lounge in back -- the kind that had murals of ancient Greece painted on the walls, belly dancers, and coin operated plungers that sprayed cologne in the mens room. It has now been taken over by Ridgley Kuan, who runs the well-regarded Green Leaf Vietnamese restaurants in Seattle. This location is not another Green Leaf; while it contains some similar dishes it seems to focus on Chinese American dishes, which are pretty good. The lounge is not a major attraction, but my visit was pleasant thanks to very accommodating bartender Peter. There isn't much to the bar of this little southern Italian bistro, although you can get a nice glass of wine or sangria. But the food is quite good. Early reports had well known Seattle restaurateur Enza Sorrentino (AKA "Mama Enza") as the executive chef, but there was apparently some falling out between her and the owners, sending the latter scrambling and flying to Naples to import another chef. In any case, it's a modest, breezy setting with an open kitchen and offering nice southern Italian plates for lunch, dinner or snacking. Historical notes: I've found no bars in this space, although there was a pre-prohibition saloon owned by Nick Cunningham in the earlier 1900s next door, in the space currently occupied by the Endless Knot shop. The building is well over 100 years old, though there is relatively scant visible evidence of that after remodels. Saturday, September 20, 2014 For people who've lived a while in the greater Seattle area, all you need to know about Chinook's is that it is part of the Anthony's chain. What this means is that you'll have a very solid selection of seafood, nothing super fancy, not cheap but not expensive, and a really nice view of some body of water. The setting for Chinooks is sometimes called "non-touristy" because it is a more industrial seaport setting than the others, but at the same time it's commonly recommended as a place that will please both you and your elderly relatives visiting from the midwest. The bar too is nothing cutting edge, but reliable on the basics. Matt Storm (Malt and Vine) owns this small craft beer joint in lower Queen Anne and manages the beer selections, with Lucas Neve (Cafe Lago) handling the small, wood-fired pizzas. Both are pretty good, and the space is a bit spare, but with a relaxed, pleasant crowd. Thursday, September 18, 2014 The Woodman Lodge is set a restored lumberman's fraternal hall constructed in 1902, and now filled with nice wood, antiques, old photos and grand taxidermy. From this very pleasant setting they serve a fairly standard contemporary steakhouse menu, including several seafood choices, along with a good selection of wines and common cocktails. It's a good place for a reliable and satisfying meal and feels like eating in a historical museum. I'd eat here a lot if I lived in this town. I may get banned from Seattle for saying this, but I don't much like Rachel's Ginger Beer. That amount of sparkly sweet carbonation is just not my thing. I also don't like RGB in my cocktails, as it tends to overwhelm the other ingredients (I don't like most champagne cocktails either). However, I could well be the only person in the greater Puget Sound region that feels this way, as it seems like everybody else loves, loves, loves Rachel's Ginger Beer. In any case, I do like seeing these local entrepreneurs making it, I like seeing this sort of shop in the market, I like that it has various cocktails made with RGB, even if they are not my favorites, and I love the Montana bar that Rachel and co. run. So I'm still a sort of fan, and my lack of love is not shared by anyone else I know. Wednesday, September 17, 2014 This is an airy, woody, two-story building named after the favorite Montana fishing hole of owner/chef Eric Donnelly (Sazerac, Oceanaire, Toulouse Petit), and serving upscale seafood dishes made from ingredients from around the world. I was not overwhelmed by either my dishes or cocktails, but lots of people love the place and I do see some great pictures of their dishes online, so I will need to give it another go. This modest, ordinary place is one of the older locations for a bar in the Seattle area. There was a Hideaway Beer Parlor listed at 12505 Aurora in 1934 and it appears to have moved to this address by 1935. It appears to have been established in its current form of bar and cardroom in 1976, sitting conveniently just across the street from the Seattle city limits and regulations. It is now dominated by the 7 poker tables, filled with men of all ages and a few little old ladies. The American-Chinese food values are quite good -- e.g. you can get a massive bowl of soup for $3. Saturday, September 06, 2014 Lynnwood, north of Seattle, is the 30th largest city in the state of Washington, and I consider it to be the largest city in the state without a single interesting bar. I'm referring to the physical places, food, and drinks, and lots of very boring bar locations can be quite enjoyable because of the fun and interesting people who come there, so I am not ruling that out. But I prefer a place with character -- ANY kind of character -- that adds some kind of personal touch and distinguishes it from hundreds of other bars across the country. Lynnwood's bars are mostly chains and seems determined to squeeze out what little remaining character there is -- e.g. minimizing the nautical theme of Daverthumps and at least the interesting name of "None Of Your Business" and replacing them with cookie cutter BSSBs (Banal Suburban Sports Bars). The most remarkable feature of BSSBs is that they have no remarkable feature. Like hundreds of other BSSBs, they generally include the following: All or virtually all decorations and wall hangings are corporate paraphernalia -- Budweiser, NASCAR, etc. No personal items, local photos, etc. Usually in the outer parts of cities, or in medium-sized towns, often in a strip mall Again, the most important part of a bar is probably the people there, so bar settings with no personality can sometimes be a great bar stop if they attract a fun and unusual crowd. I went at the wrong time of day to know if that's the case with Shots and Scores, so maybe I'd be surprised. Friday, September 05, 2014 This new instance of the Alibi Room in a small Greenwood strip mall does not have the sexy space of the original off a cobblestone alley under Pike Place Market, but it's definitely a nice addition for people like me who live nearby. They have decent cocktails, good wood-fired pizzas and some simple but very tasty appetizers, including their apple and brie plate. Tuesday, September 02, 2014 Downtown Bellevue seems like an odd place for a jazz club, and Bake's is in an odd part of downtown Bellevue. It's away from any considerable foot traffic and away from the malls, but still in the business core at the foot of a pedestrian 8-floor office building. It's not the sort of space that attracts people who don't know where they are going, but that doesn't appear to be a major problem for Craig Baker, who's been pulling fairly large crowds in for music performances in various other unlikely venues, including his basement and the Washougal, WA Grange Hall. It's pretty sedate when the music is not playing, but that may not be a problem as virtually every evening it morphs into a swanky, relaxed yet formal jazz club, or sometimes blues, R&B or Latin music. It quite intentionally has a vibe similar to Seattle's Jazz Alley, with a crowd and space that emphasize listening to the musicians rather than a steady road of chit chat. The food and cocktails are better than average, and after much negotiation they've become able to use the patio of the building, which is one of the nicer lunch spots in the area on sunny afternoons.
Sur La Table® Nonstick Jumbo Muffin Pan Our exclusive Sur La Table nonstick bakeware is made with premium-gauge steel and has removable red silicone grips for slip-free transportation and easy cleaning. Perfect for the novice or accomplished baker, this superior bakeware will provide consistent...Read More Description Our exclusive Sur La Table nonstick bakeware is made with premium-gauge steel and has removable red silicone grips for slip-free transportation and easy cleaning. Perfect for the novice or accomplished baker, this superior bakeware will provide consistent baking results for years to come.
Wedding Memories Photo Canvas Options Price : $19.99 each Qty "March, 19, 2018 02:31:48 PM" Similar Products Recommended Products DETAILSSHIPPING Wedding Memories Photo Canvas Product Code : CVSPHO-CVSPHO4 Our Wedding Photo Canvas is just one example of what you can do with this unique photo canvas. Photo canvas prints are gifts that will be remembered for years to come and a creative way to remember all those treasured moments in one's life. Each Wedding Photo Canvas features a stretched canvas over a 16" x 20" wooden frame ready for mounting directly on walls, in an exterior frame or use an easel to display on counters and mantels. Creating your Wedding Photo Canvas is easy; just upload your favorite portrait or landscape photo and we'll take care of the rest.Picture hangers not included.Photo Canvas IdeasGreat for printing children's art...just scan it in to your computer and upload.Great for printing inexpensive art for your home (favorite vacation photos and landscape photos work perfectly).Print a series of 3 or more to hang on a wall.Perfect for baby/kids and family photos.Use for special events such as graduation, anniversary, or milestone birthdays. Please allow ample time for delivery. Our estimated delivery date for this product is noted in checkout. Many items are shipped separately, so please allow extra time for these items to arrive. Shipping charges are based on the value of the merchandise and not the number of shipments. For additional shipping information, please contact our Customer Service Department at (csr@shindigz.com or 1-800-314-8736). This requires a photo to be uploaded on the canvas. You will not be able to proceed without uploading a photo. You can add the wedding couples initials as well but you must include a photo on the canvas. If you submit a color photo that is what will be printed. We cannot change your photo from color to black and white or vice versa. If you are wanting a black and white photo you must upload a black/white to be printed on a photo canvas. Answered on 10/24/2011 by csr Q: Can this be written on? thinking of using it for guests to write on instead of a guest book Description: This Spiderman WallJammer has the ability to stick to most surfaces, much like the super-hero. It measures 48 inches square. Printed on thick highly durable vinyl that resists tearing. It can be removed and reapplied. Description: Indoor/Outdoor Banners - Our most popular banner! The perfect way to decorate for your event - inside or outside. Make the day special with these 10 oz. vinyl banners. The UV inks are rich and bright on a brilliant white background. The grommets make it easy to hang almost anywhere. ... Description: Indoor/Outdoor Banners - Our most popular banner! The perfect way to decorate for your event - inside or outside. Make the day special with these 10 oz. vinyl banners. The UV inks are rich and bright on a brilliant white background. The grommets make it easy to hang almost anywhere. ... Description: Indoor/Outdoor Banners - Our most popular banner! The perfect way to decorate for your event - inside or outside. Make the day special with these 10 oz. vinyl banners. The UV inks are rich and bright on a brilliant white background. The grommets make it easy to hang almost anywhere. ...
Abstract BALB/c mice infected with murine cytomegalovirus (MCMV) developed myocarditis. Athymic nu/nu mice infected with the virus did not develop myocarditis, in contrast to heterozygous T-cell competent nu/+mice. MCMV-infected BALB/c mice given cyclosporin A(CsA) a drug which inhibits the activation of T cells, showed a delay in the development of myocarditis relative to CsA-untreated mice infected with MCMV. However, BALB/c mice infected with MCMV, regardless of CsA treatment, developed both anti-MCMV antibodies and autoantibodies. Nu/nu mice infected with MCMV did not produce the anti-MCMV antibody response or the multiple autoantibody response which was observed in nu/+ MCMV-infected mice. Both nu/nu and CsA-treated animals displayed greater organ distribution of viral antigen than control MCMV-infected animals. These results suggest that the presence of a thymus is required for both the development of myocarditis and the multiple autoantibody response, which includes autoantibodies to cardiac muscle, and that CsA immunosuppression does not abrogate either myocarditis or the antibody response in mice following MCMV infection.
Introduction {#Sec1} ============ The Gram-negative encapsulated bacterium *Neisseria meningitidis* is a common commensal found exclusively in the human nasopharyngeal mucosa. It is the leading cause of epidemic meningitis and sepsis^[@CR1]^. Invasive meningococcal disease (IMD) is mainly caused by meningococci expressing specific capsular groups (i.e. serogroups) and belonging to particular hyperinvasive lineages^[@CR2],[@CR3]^, which have a changing global distribution over time. An increase in IMD due to serogroup Y occurred in the United States in the 1990s, and from the end of the 2000s this was also the case in Europe^[@CR4],[@CR5]^. This serogroup was the most prevalent cause of IMD in Sweden between 2010 and 2015, representing 53% of all IMD in 2015^[@CR6]^. Characterization by multilocus sequence typing (MLST) and sequencing of the antigens FetA, FHbp, PenA, PorA, and PorB, revealed that three serogroup Y strain types were responsible for IMD in Sweden, in particular those with the genotype Y: P1.5-2, 10-1: F4-1: ST-23 clonal complex 23 (cc23) along with PorB allele 3--36, FHbp allele 25, and PenA allele 22, referred to as strain YI^[@CR7]^. Illumina whole genome sequencing (WGS) of 185 serogroup Y genomes from Sweden showed that the majority of those causing IMD clustered with strain YI, belonging to the WGS lineage 23.1^[@CR8]^. Analysis of genes core to the meningococcus (cgMLST) revealed that this cluster, although antigenically identical, contained an average of 100 core loci with allelic differences, delineating it into sublineages 1 and 2^[@CR8]^. Analysis on a limited selection of 177 loci hypothesized to play a role in meningococcal virulence showed that 10 of these loci differed between the two sublineages. Because 213 core loci were incompletely assembled in at least one isolate in the draft genomes, the genetic analysis was only based on 1,241 completely assembled genes. However, the study showed that the temporal distribution of the two sublineages in Sweden coincided with an increase in serogroup Y IMD due to one of the sublineages, appearing in Sweden after 2006. Single molecule real-time (SMRT) PacBio sequencing also includes data on DNA methylation in the form of N6-methyladenine (m6A), N4-methylcytosine (m4C) and C5-methylcytosine (m5C), only poorly at best. Enzymes that methylate (MTases) are part of the restriction-modification (RM) system, which acts as a defence mechanism against the invasion of foreign DNA in prokaryotes^[@CR9]^. The restriction endonucleases (REases) cleave double stranded DNA with specific patterns, and methyl groups are added by MTases to specific motifs in order to prevent degradation by the REases. There are four types of RM systems, three of which have been found in *Neisseria*^[@CR10],[@CR11]^. Type I systems consist of three subunit proteins: R (restriction), M (modification), and S (specificity). Type II systems consist of individual RM enzymes that bind to and cleave at the same position, or close to that sequence. Type III systems are composed of two protein subunits, Mod and Res that recognize non-palindromic motifs^[@CR12]^. Although DNA methylation is best known for its role in prokaryotic defence, and is important for genetic flux, it has also been shown to have roles in gene expression^[@CR13],[@CR14]^, DNA replication initiation^[@CR15],[@CR16]^, virulence^[@CR17]^ and are often phase variable^[@CR11]^. The aim of this study was to robustly identify all genetic alterations and differences in methylation between sublineage 1 (responsible for the serogroup Y increase in Sweden) and sublineage 2 using high-quality PacBio-derived finished genomes, thereby enhancing our understanding of how invasive meningococci may emerge over time. Materials and Methods {#Sec2} ===================== Isolate collection and genome sequencing {#Sec3} ---------------------------------------- Eight isolates belonging to YI sublineages 1 and 2 were chosen based on the phylogenetic clustering generated using Illumina-derived WGS of serogroup Y isolates from Sweden between 1995 and 2012^[@CR8]^ (Fig. [1](#Fig1){ref-type="fig"}). All isolates had the following designation: Y: P1.5-2,10-1,36-2: F4-1: ST-23 (cc23), and had PorB allele 3--36, FHbp allele 25, and PenA allele 22, except for isolate 98--182: FHbp allele 276, isolate 11--14: PorB allele 3--117, and isolate 12--176: PorA VR2 10--85. Sublineage 1 (n = 59) and sublineage 2 (n = 32) HiSeq genomes^[@CR8]^ were used to confirm differences in presence/absence and premature stop codons of genes delineating the two sublineages. PubMLST *Neisseria* database identification numbers are shown in Supplementary Table [1](#MOESM1){ref-type="media"}.Figure 1Neighbour-net network based on the comparison of 1,605 *Neisseria meningitidis* core genome loci. Panel a shows strain YI from Sweden subclustered into sublineage 1 and sublineage 2^[@CR8]^. These two sublineages belong to sublineage 23.1^[@CR8]^, as shown in panel b of all clonal complex 23 genomes in the pubMLST *Neisseria* database (n = 1,576; accessed 20/01/10). Isolates from the present study are marked in blue. Isolate IDs for isolates belonging to sublineages 1 (n = 59) and 2 (n = 32) are provided in Supplementary Table [1](#MOESM1){ref-type="media"}. The scale bars denote the number of loci with allelic differences. This figure was generated using SplitsTree v 4.15.1 (<http://www.splitstree.org/>) and subsequently exported to Inkscape v0.92 (<https://inkscape.org/>) for additional edits. Isolates were cultured on chocolate agar at 37 °C in a 5% CO~2~ enriched atmosphere overnight and archived at −70 °C. Genomic DNA was extracted using the Wizard Genomic DNA purification kit (Promega) according to the manufacturer's instructions. Libraries were prepared using the Pacific Biosciences 10 kb library preparation protocol. Size selection of the final libraries was performed using BluePippin (Sage Science) or AMPure PB beads (PacBio). The libraries were sequenced on a Pacific Biosciences RS II sequencer using P4-C2 or P6-C4 chemistry with 1--3 SMRT cells each. One of the genomes (12--221) was sequenced with \>1000x coverage in order to detect m5C motifs. Genome assembly and annotation {#Sec4} ------------------------------ Reads were assembled *de novo* using HGAP v3 (Pacific Biosciences, SMRT Analysis Software v2.3.0, smrtanalysis_2.3.0.140936.p5.167094). Sequencing and assembly metrics are shown in Supplementary Table [2](#MOESM1){ref-type="media"}. Quiver^[@CR18]^ was used to correct sequencing errors in the assemblies by mapping the raw reads back to the PacBio assembly. Mimimus2 software from the Amos package^[@CR19]^ was used to circularize the genomes. Illumina HiSeq 2000 100 bp reads from a previous study^[@CR8]^ (ERR405856, ERR405873, ERR405911, ERR405968, ERR405969, ERR406012, ERR406017, and ERR406024) were filtered at Q30 and mapped onto the genomes obtained from the Pacific Biosciences RS II sequencer using CLC Genomics Workbench v8.0.1 (Qiagen) to detect any assembly and sequencing errors. To strengthen any corrections made, PacBio subreads were mapped onto the PacBio assemblies. All errors with \>50% mapping frequency of the HiSeq reads and 9--28% of the mapped PacBio reads in agreement with the HiSeq reads were manually corrected. Thirty errors were found using these criteria; twenty-nine of the 30 corrections were single nucleotide insertions in homopolymeric tracts (5--9 nucleotides long) and one was in a repetitive region (Supplementary Table [3](#MOESM1){ref-type="media"}). The chromosome was adjusted so that the first base was upstream of the *dnaA* gene. PacBio assemblies were annotated in two ways: (i) using the rapid bacterial annotation software Prokka^[@CR20]^ and (ii) using the PubMLST *Neisseria* database (<http://pubMLST.org/neisseria/>) where genome data have been deposited. Genes were labelled using the locus tag prefix "NEIS". NEIS identifiers were linked to an alias table, enabling cross-linking with Prokka annotations. Alleles were automatically assigned to and annotated with the appropriate allele number within the PubMLST *Neisseria* database when these were a ≥98% match to previously defined loci in the database. New alleles ≤98% identical were manually curated and assigned. Allele frequency was determined using the allele designations field filter when browsing all genomes deposited in the PubMLST *Neisseria* database. All eight genomes have been deposited in NCBI under BioProject number PRJNA386981; the PubMLST *Neisseria* database identification numbers are shown in Table [1](#Tab1){ref-type="table"}.Table 1Genome metrics of the single molecule real-time sequenced *Neisseria meningitidis* serogroup Y isolates (n = 8).IsolatePubMLST IDCollection yearSub-lineageChromosome size (nt^a^)CDS^b,c^tRNAsrRNAsGC content (%)95--13441337199522,165,9842144591251.7198--18241338199822,167,9952159591251.7006--17841339200612,167,9202150581251.7011--741340201122,157,4312148591251.7711--1441341201112,156,5392143581251.7512--17641342201212,168,6152150581251.6712--22189521201212,167,9472082581251.6912--33041344201212,167,9442151581251.69^a^nt = nucleotide.^b^CDS **=** coding sequence.^c^CDS features without a/pseudo or/pseudogene qualifier. Genome analyses {#Sec5} --------------- Annotated genomes were compared using Artemis^[@CR21]^, ACT^[@CR22]^, Mauve^[@CR23]^, and BRIG^[@CR24]^. To identify variations in coding sequences (CDS) among sublineages, the Genome Comparator Tool, available in the PubMLST *Neisseria* database, was employed using a sublineage as a reference as described previously^[@CR25]^. Briefly, the Genome Comparator Tool compares genomes using any number of predefined loci in the database or a reference genome. For each locus, the allele sequences, designated by allele numbers, are compared and used to generate a distance matrix based on the number of variable loci across a genome. Distance matrices can subsequently be visualized using the neighbour-net algorithm^[@CR26]^. The Genome Comparator Tool output includes a list of loci that are: (i) identical; (ii) variable; (iii) missing/absent; and (iv) incomplete (partially present in the genome due to incomplete assembly). Core and pan genome {#Sec6} ------------------- A total of 1,605 loci have been identified as core to meningococci, as they are present in ≥95% *N. meningitidis* isolates (cgMLST, v1.0)^[@CR27]^. Neighbour-net diagrams were constructed using distance matrices generated by the PubMLST Genome Comparator Tool^[@CR27]^ and visualized using SplitsTree4^[@CR28]^. Loci core to the whole genome based lineage 23^[@CR27]^ were identified through the combined use of Prokka and Genome Comparator. Initially, all loci defined using Prokka were BLAST searched against all of the loci and associated alleles found in the PubMLST *Neisseria* database. This allowed identification of novel loci not yet defined in the PubMLST *Neisseria* database. All novel loci were subsequently verified using Artemis to ensure the correct start and stop codons had been annotated. These were then compared using Genome Comparator in all MLST cc23 isolates deposited in the PubMLST *Neisseria* database (978 cc23 isolates at the time of the study). A whole genome based lineage 23 core and pan genome scheme was then generated. Methylation motifs {#Sec7} ------------------ The RS_Modification_and_Motif_Analysis pipeline analysis platform SMRT Portal (Pacific Biosciences, SMRT Analysis Software v2.3.0, smrtanalysis_2.3.0.140936.p5.167094) was used for genome-wide analysis of modified motifs with quality value (QV) limit \> 60. DNA methyltransferase genes associated with the different methyltransferase recognition motifs identified were searched using SEQWARE routines as described previously^[@CR29]^, and deposited in the Restriction Enzyme Database REBASE^[@CR30]^. Motif summary files have been deposited in the NCBI submission PRJNA386981 (see Supplementary Table [4](#MOESM1){ref-type="media"} for a summary). Enzymatic cleavage with MspJI and FspEI {#Sec8} --------------------------------------- MspJI and its homologue FspEI (New England Biolabs) was used to enzymatically verify the activity of predicted m5C methylations. These enzymes cleave at a fixed distance from the top-strand m5C (12 or 16 bases), leaving a 4-base 5′ overhang, and the resulting fragments were sequenced to determine the recognition site^[@CR31]^. MspJI and FspEI cleavage was performed as previously described^[@CR31]^. In short, 0.5 µg genomic DNA was digested with MspJI and FspEI (New England Biolabs) according to the manufacturer\'s instructions, and then separated on a 20% polyacrylamide gel electrophoresis (PAGE) in 0.5x TBE buffer and stained with SYBR GOLD. The 30--35 bp gel fragments were excised and purified using the NEB Monarch Nucleic Acid Purification Kit (New England Biolabs). Libraries were prepared for sequencing using the NEBNext Fast DNA Library Prep Set (New England Biolabs) according to the manufacturer's instructions, except excluding the size selection and running only 12 cycles of PCR. The bioinformatics analysis was performed as previously described^[@CR31]^. Results {#Sec9} ======= General genome features and comparative genomics {#Sec10} ------------------------------------------------ Eight *N. meningitidis* serogroup Y genomes were sequenced using PacBio RS II and each assembled into a single contiguous sequence. The median genome length was 2,167,932 nucleotides and the median number of predicted CDS was 2,149 (Table [1](#Tab1){ref-type="table"}). The genomes had similar structure and gene synteny (Supplementary Figure [1](#MOESM1){ref-type="media"}), with dissimilarities between sublineages found mainly in transposases, hypothetical proteins and non-coding intergenic regions (IGRs) located between genes involved in metabolism, methyltransferases, and prophages (Fig. [2](#Fig2){ref-type="fig"}).Figure 2BLAST ring comparing *N. meningitidis* sublineages 1 (in blue; n = 5) and 2 (in purple; n = 2), with isolate 11--7 (sublineage 2) used as reference. The innermost circle shows the GC skew. The protein function of coding regions with low identity between the sublineages are indicated on the outermost circle. This figure was generated using BRIG v 0.95 (<http://brig.sourceforge.net/>) and subsequently exported to Inkscape v0.92 (<https://inkscape.org/>) for additional edits. Gene-by-gene comparisons of all CDS identified allelic differences in 97 loci between isolates in the two sublineages (Fig. [3](#Fig3){ref-type="fig"} and Supplementary Table [5](#MOESM1){ref-type="media"}). Of these loci, 73 had non-synonymous differences, including genes implicated in: adhesion (*opcA*); lipooligosaccharide (LOS) production (*galE*, *galE2*, *lgtA*, *lgtB*, *lot*, and *yhbG*); type IV pili production (*pilI*, *pilQ*, and *pilX*); and iron acquisition (NEIS0669). CRISPR-associated endonuclease Cas1 also differed in one amino acid residue (188 V→A) between sublineages 1 and 2 in all but two isolates among the collection of 91 draft genomes^[@CR8]^.Figure 3Functions of loci that contained allelic differences resulting in synonymous or non-synonymous changes distinguishing the two sublineages. AA = amino acid change. Classification is according to the scheme in the PubMLST *Neisseria* database^[@CR27]^. This figure was generated using Microsoft Excel 2016. Among all CDS in isolates belonging to sublineages 1 and 2, only seven CDS with premature stop codons distinguished the sublineages (Table [2](#Tab2){ref-type="table"}), encoding a hypothetical protein, DNA repair protein, metabolic protein, a RM protein, and inner and outer membrane proteins. Two of these were due to phase variability: NEIS2198 (*opcA*) and NEIS2535. OpcA, which is involved in adhesion to epithelial and endothelial cells important in the infection process^[@CR32],[@CR33]^, has been shown to be phase variable and regulated by homopolymeric cytidine residues in the promoter sequence; ≤ 10 or ≥ 15 cytidine residues suppress expression, 12--13 cytidine residues lead to efficient expression, and 11 or 14 lead to intermediate expression^[@CR34]^. Sublineage 2 isolates had ≤ 8 contiguous C residues and sublineage 1 isolates had ≥ 14, putatively leading to *opcA* being phase variable off in to both sublineages. Moreover, sublineage 1 had an insertion transposase inserted in NEIS2535 encoding the Type I restriction system specificity protein determining the specificity of the restriction and the modification reactions.Table 2Presence/absence of genes or genes with premature stop codons delineating sublineage 1 and 2.Locus tagProduct/functionSize (bp^a^)Presence in^b^sublineage 1 (frequency)sublineage 2 (frequency)NEIS0627Hypothetical protein117Absent (59/59)Present (32/32)NEIS1059Hypothetical protein606Stop codon (58/59)Present (32/32)NEIS1174DNA repair protein RadC714Stop codon (59/59)Present (32/32)NEIS1965Putative inner membrane transport protein825--846Stop codon (59/59)Present (32/32)NEIS2535^e^Type I restriction-modification system S protein1158--1203Stop codon^c^ (59/59)Present (29/32)NEIS2479Putative membrane protein906--1017Stop codon^c^ (59/59)Present (32/32)NEIS2931Hypothetical protein699Absent (59/59)Present (31/32)NEIS1126ABC transporter ATP-binding protein1893--1932Present (57/59)^d^Stop codon (28/32)NEIS2198 (*opcA*)^e^Outer membrane protein786--824Present (59/59)Stop codon (32/32)^a^bp = base pairs.^b^Among the sublineage 1 (n = 59) and sublineage 2 (n = 32) HiSeq genomes.^c^Stop due to insertion of a transposase.^d^Two isolates had incompletely assembled loci.^e^Phase variable. Only two genes were absent when comparing both sublineages. Genes NEIS0627 and NEIS2931 (both encoding hypothetical proteins) were absent in all sublineage 1 isolates but present in all sublineage 2 isolates (Table [2](#Tab2){ref-type="table"}). The frequency of these genes in the larger collection of HiSeq genomes (Supplementary Table [1](#MOESM1){ref-type="media"}) is shown in Table [2](#Tab2){ref-type="table"}. NEIS2931 was found to share sequence identity with a cornifin small proline rich (SPR) family protein that is strongly induced during differentiation of human epidermal keratinocytes^[@CR35]^. NEIS0627 was highly prevalent among the 20,357 genomes deposited in the PubMLST *Neisseria* database (accessed 20/09/2019): only 985 of the 20,357 genomes lacked this locus. These 985 isolates were primarily cc23 isolates (167/985) and non-meningococcal isolates *N. lactamica* and *N. gonorrhoeae* (484/985). NEIS2931 was prevalent in cc23 isolates. Although a difference was observed in the number of genes absent or probably not expressed due to stop codons between sublineages 1 and 2 (7/1988 and 2/1975 respectively), this difference was not statistically significant (p=0.01). A lineage 23^[@CR27]^ pan genome was defined containing 1,757 core loci and 24 accessory loci. Accessory loci included genes encoding seven hypothetical proteins, a MafB toxin, and a Type I RM system protein (Supplementary Table [6](#MOESM1){ref-type="media"}). Of the 2,452 loci defined in the PubMLST *Neisseria* database, 466 were absent in all eight genomes in the present study, some of which putatively associated with pathogenic interactions (Supplementary Table [7](#MOESM1){ref-type="media"}). Horizontal gene transfer {#Sec11} ------------------------ There were nine regions in which allelic differences were adjacent (2--5 genes in succession) and therefore putatively a consequence of horizontal gene transfer (HGT). These included genes implicated in capsule synthesis, metabolism, iron acquisition, antibiotic resistance, and LOS (Supplementary Table [5](#MOESM1){ref-type="media"}). Alleles from sublineage 1 in the putative HGT region including NEIS0625, NEIS0626, and NEIS0628 were unique to cc23 genomes, the majority of which were from Sweden (\> 89%) (accessed 14/12/2017). Another putative HGT event included loci NEIS0667, NEIS0668, NEIS0669, NEIS0671, and NEIS0672, resulting in sublineage 2 isolates containing alleles more commonly found in *Neisseria gonorrhoeae* (\> 96% for NEIS0667, NEIS0669, and NEIS0671). Alleles from sublineage 2 in the putative HGT event involving NEIS1901 (*lgtB*), NEIS1902 (*lgtA*), NEIS1903, and NEIS1904 were found in 80, 84, 70, and 80 isolates respectively; 55--64% of these were from Swedish cc23 genomes, and the remainder belonged to cc41/44. Isolate 12--330 (sublineage 1) had the shorter *tbpB* isotype characteristic of ST-11 meningococci^[@CR36]^. Another three isolates belonging to sublineage 1 from the larger 185-isolate collection from our previous study^[@CR8]^ had the same shorter *tbpB* isotype. The other sublineage 1 and 2 isolates had isotype II found among meningococci belonging to the hyper-invasive clonal complexes including ST-8, ST-18, ST-32, and ST-41/44 as well as *N. gonorrhoeae* isolates. Methylome analysis {#Sec12} ------------------ Eleven putative RM systems were identified (putative RM systems for isolate 12--221 are shown in Fig. [4](#Fig4){ref-type="fig"}). Initially, the genome-wide analysis of the methylomes identified two m6A and one m5C modified motif: G**A**TC, C**A**CNNNNN**T**AC, and G**G**NN**C**C (Table [3](#Tab3){ref-type="table"}). C**A**CNNNNN**T**AC was found exclusively in isolates belonging to sublineage 2; in sublineage 1, the specificity subunit of the candidate Type I RM system (NEIS2535) was disrupted by a transposase insertion. The motif C**A**CNNNNN**T**AC was only found in one other meningococcal isolate in REBASE, belonging to cc23, suggesting that this may be a cc23 specific motif. Isolate 12--221 was sequenced with higher coverage (1266x) in order to detect m5C motifs that were potentially missed with lower sequencing depth due to the lower effect on delaying the polymerase during PacBio sequencing. Three additional motifs were discovered using higher coverage (Supplementary Table [4](#MOESM1){ref-type="media"}). Two of them (CGGCACGCNNNA and CGNGGTAACV) had low signal but were probable m5C motifs; however, no known enzymes could be assigned because the correct motifs could not be determined. The third motif found, a m6A: AC**A**CC, has previously been described as methylated by the MTase encoded by the phase variable gene *modA12*^[@CR37]^. *modA12* was only putatively expressed by isolates 11--7, the remaining isolates with exception for 12--221 were switched off through translational phase variation by slipped strand mispairing due to a variable number of 5′-AGCC-3′ in the coding region of the gene^[@CR38]^. Isolate 12--221, belonging to sublineage 1, had one less adenine residue at 1,505 bp resulting in a premature stop codon. This *modA* allele could not be found in any other isolates in the pubMLST *Neisseria* database indicating that this could be the result of a sequencing error. Furthermore, although *modA12* in isolate 11--7 had ON status, the AC**A**CC motif could not be detected in this isolate.Figure 4A circular view of the predicted restriction modification (RM) systems in the genome of *N. meningitidis* sublineage 1. ORF = open reading frame. This figure was generated in REBASE (<http://rebase.neb.com/rebase/rebase.html>) and subsequently exported to Inkscape v0.92 (<https://inkscape.org/>) for additional edits.Table 3Putative restriction modification (RM) systems and target motifs found in *N. meningitidis* sublineage 1 (n = 5) and sublineage 2 (n = 3) isolates.MotifDetected byFraction (%)RMS TypeMeth typeREBASE entryCorresponds to NEIS locusProductORF status (frequency)Sublineage 1Sublineage 2C**[A]{.ul}**CNNNNN**[T]{.ul}**ACPacBio93--99I gammam6AM.Nme12ORF4850PNEIS2535Type I restriction enzyme system specificity proteinOFF (5/5)^d^ON (3/3)--REBASEI gammam6AM.Nme12ORF2755PNEIS2361NgoAV Type I RM system, DNA methyltransferase subunit MON (5/5)ON (3/3)G**[AT]{.ul}**CPacBio94--100II alpham6AM1.Nme12ORF55PNEIS0327 (*dam*)DNA adenine methylaseON (5/5)ON (3/3)GATCREBASEII betam6AM2.Nme12ORF55PNEIS0328 (*dpnIIB*)modification methylaseON (4/5)ON (3/3)--REBASEII gammam6ANme12ORF6960APNEIS2524hypothetical proteinON (5/5)ON (3/3)--REBASEII gammam6ANme12ORF6960BPNEIS2523putative methyltransferaseON (5/5)ON (3/3)CCWGG^a^REBASEIIm5CM.Nme12ORF5195PNEIS2442DNA cytosine methylaseON^e^ (5/5)ON^e^ (3/3)G**[G]{.ul}**NN**[C]{.ul}**C^a,b^PacBio75--100IIm5CM.Nme12ORF4970PNEIS1180 (*nlaIV*)DNA modification methylaseON (5/5)ON (3/3)--REBASEIIm5CM.Nme12ORF3425PNEIS2555DNA cytosine methylaseON (5/5)ON (3/3)CCAGA^a^REBASEIIm5CM.Nme12ORF2740PNEIS0771DNA cytosine methylaseON (5/5)ON (3/3)GGTGA^c^REBASEIIm6AM1.Nme12ORF10280PNEIS2910modification methylaseOFF^f^ (5/5)OFF^f^ (3/3)--REBASEIIm5CM2.Nme12ORF10280PNEIS2854D12 class adenine-specific DNA methyltransferaseON (5/5)ON (3/3)AC**[A]{.ul}**CC^b^PacBio70III betam6AM.Nme12IANEIS1310 (modA)Type III RM system methyltransferase (ModA12)OFF (5/5)OFF (2/3)^a^Enzymatically verified as active.^b^Poorly detected by PacBio, only found in some isolates.^c^Enzymatically verified as non-active.^d^Fragmented due to transposase.^e^Shorter version: 1,011 nt instead of 1,014 nt.^f^Frameshifted. Five m5C genes were bioinformatically predicted from the sequences, but only three motifs (G**C**RY**G**C, G**G**NN**C**C, and C**C**A**G**R) were confirmed as methylated using MspJI and FspEI cleavage (Table [3](#Tab3){ref-type="table"}). The apparent C**C**A**G**R motif may be the result of two MTases, one recognizing C**C**W**G**G and the other C**C**A**G**A. Discussion {#Sec13} ========== The increase in incidence of IMD caused by serogroup Y meningococci began in the 1990s and late 2000s in North America and Europe, respectively. In the United States, the increase in cc23 serogroup Y IMD was accompanied by an antigenic shift of the three outer membrane proteins: PorA, FetA, and PorB. The most prevalent serogroup Y strain in Sweden possessed the same antigenic profile; however, Illumina WGS analysis resolved this strain further into two distinct sublineages^[@CR8]^. One of these sublineages was associated with patients with IMD after 2006, resulting in a marked increase in IMD in Sweden. Variations among the Illumina WGS could not be ruled out as being the result of incomplete genomes, and it was therefore not possible to distinguish robustly differences between these two sublineages, particularly in more complex regions such as IGRs, which are abundant in meningococci, or in the presence or absence of genes. In the present study, PacBio sequencing provides a single contiguous sequence for each genome, which were comprehensively annotated and enabled lineage 23 core and pan genomes to be determined. Comparison of complete PacBio-derived genome sequences from sublineages 1 and 2 identified sequence differences, mostly limited to IGRs, transposases, and genes encoding hypothetical proteins (Fig. [2](#Fig2){ref-type="fig"}). Non-synonymous allelic differences were more abundant among genes encoding hypothetical and metabolic proteins but were also found among genes potentially associated with pathogenicity, such as those implicated in adhesion, LOS production, type IV pili production, and iron acquisition^[@CR39]^. As with genes involved in pathogenicity, metabolic genes undergo high rates of HGT in meningococci^[@CR40],[@CR41]^ and this is the most likely reason that such were dominant among the genes distinguishing the two sublineages. Nevertheless, functional genomic studies on meningococci during colonization and invasion have shown the importance of metabolic adaptation in the interaction with host cells^[@CR42]^, which suggests that the differences in metabolic genes identified here may also have contributed to the difference in the emergence of sublineage 1. In contrast to the draft genomes generated by Illumina sequencing previously^[@CR8]^, the complete PacBio genomes enabled comparison of presence and absence of genes. Only two CDS were absent in sublineage 1 but present in sublineage 2, and only seven were putatively differentially expressed due to premature stop codons, two of them through phase variation. Sequences obtained following WGS will be consensus sequences resulting from a population of colonies rather than a single colony. As a result, it is not possible to reliably infer expression and phase on or off status. Nevertheless, a pattern of phase variation was observed between sublineages 1 and 2. The absence of the hypothetical protein NEIS0627 in sublineage 1 was likely the result of HGT, as this locus was situated with other loci associated with HGT. Finally, the allelic similarities in putative HGT regions with other cc23 isolates and in some cases *N. lactamica* and *N. gonorrhoeae* suggests recombination mainly within cc23 but also potentially with other *Neisseria* species. The present study revealed that sublineage 1 could not express the Type I restriction system specificity protein due to a transposon, which led to a difference in methylation between the two sublineages. RM systems are known to be located adjacently to mobility-related genes such as transposons in order to promote their own survival^[@CR43]--[@CR45]^ and truncation of Type I specificity proteins has been previously described^[@CR46]^. No other motifs or predicted RM systems were associated with a particular sublineage. Four more m5C MTases were predicted than actually detected. The detection of m5C methylation is difficult using PacBio sequencing; however, deeper sequencing coverage did indicate that more m5C motifs were probably present. It is therefore possible that there are additional m5C motifs unique to a specific sublineage, although enzymatic digestions and ORF status of the predicted m5C MTases did not indicate any such association. Genes specific to the Type I RM system as well as *modB* and *modD*, which encode phase variable DNA methyltransferases involved in the Type III RM system mediating epigenetic regulation^[@CR11],[@CR38],[@CR47],[@CR48]^ were absent (Supplementary Table [7](#MOESM1){ref-type="media"}). *modB* and *modD* have been described to regulate biofilm formation, adherence and invasion of human epithelial cells as well as increased oxidative stress resistance^[@CR14]^. These results are consistent with previous results showing that the compositions of different RM systems are clade-specific, suggesting that the population structure is dependent on the restriction of gene flow between clades caused by distinct RM systems^[@CR49],[@CR50]^. This in turn suggests that the unique RM system of cc23 isolates consists of a different set of Type I and III RM systems, which will most likely result in a specific DNA methylation pattern unique to this particular cc, as has been shown in previous studies^[@CR50]^. In line with a study by Krauland *et al*.^[@CR4]^, where pyrosequencing was used to complete the whole genomes of two cc23 strains responsible for the serogroup Y increase in the United States, the genomes in the present study lacked genes encoding the TspB, HmbR, NadA proteins, and the meningococcal disease associated (MDA) islands. These gene products are involved in adhesion, iron acquisition, bacterial immune system, endotoxin production, and mobile elements, and have been associated with meningococcal hyperinvasive lineages^[@CR38],[@CR51]--[@CR56]^. Their absence could therefore explain the particular clinical outcomes such as pneumonia commonly associated with serogroup Y disease^[@CR57]--[@CR60]^. Furthermore, CRISPR-associated genes *cas1* and *cas2*, which were found among all cc23 genomes, have previously been shown to be associated with carriage isolates^[@CR53]^. Notably, other genes were absent in all the serogroup Y genomes investigated in this study (Supplementary Table [7](#MOESM1){ref-type="media"}) and in Krauland *et al*.^[@CR4]^; these have not been directly linked to virulence of the meningococcus, but are involved in RM, iron acquisition, and mobile elements that potentially play a role in pathogenicity. Shared differences were found between the early and late strain type in the Krauland *et al*. study and the sublineages in the present study, namely in the gene *pilI* involved in the type IV pili structure. None of the other differences in antigen profile or iron acquisition/uptake genes separating the early and late strain types in Krauland\'s study could be found among the two sublineages in this study; this suggests that the non-synonymous changes in type IV pili encoding genes may play an important role in the emergence of these serogroup Y strains. Because many of the genes previously regarded as virulence genes have been found in commensal *Neisseria* species^[@CR38],[@CR61]^, and the genomes of carrier and invasive strains are very similar^[@CR62]^, differences in the presence or absence of genes cannot be the sole reason for the emergence of invasive disease. Instead, our results suggest that point mutations in genes involved in host cell interactions have led to a change in adhesion to epithelial cells, which may have improved colonization, in turn increasing transmission and resulting in expansion of this sublineage. This is also supported by a study showing that no significant differences were found in mortality or clinical outcome between the Swedish strain YI sublineages^[@CR60]^. It is therefore probable that sublineage 1 has lower virulence but higher transmissibility; this may be due to either the genetic differences found in the present study or an immunologically-naïve host population. Increased transmission or carriage in connection with increased incidence of serogroup Y has been shown in the UK^[@CR63],[@CR64]^ and the United States^[@CR65]^, and preliminary data from an ongoing carriage study in Sweden indicate similar results but remain to be confirmed. Conclusions {#Sec14} =========== PacBio sequencing enabled a full comparison of all CDS, complex regions, IGRs, and methylation motifs among isolates belonging to two serogroup Y sublineages. The YI sublineages were distinguished by non-synonymous mutations in genes involved in metabolism, adhesion, iron acquisition, and endotoxin production, as well as differences observed in methylation motifs, which may have played a role in the emergence of sublineage 1. Additional omics approaches including transcriptomics will be needed to study the effects on gene expression. Supplementary information ========================= {#Sec15} Supplementary Information. **Publisher's note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Supplementary information ========================= is available for this paper at 10.1038/s41598-020-59509-y. The sequencing service was provided by the Norwegian Sequencing Centre (<http://www.sequencing.uio.no/>), a national technology platform hosted by the University of Oslo and supported by the "Functional Genomics" and "Infrastructure" programs of the Research Council of Norway and the Southeastern Regional Health Authorities. This publication made use of the Neisseria Multi Locus Sequence Typing website (<http://pubmlst.org/neisseria/>) developed by Keith Jolley and hosted at the University of Oxford^25^. The development of this site was funded by the Wellcome Trust (Grant number 218205/Z/19/Z) and the European Union. This study was supported by grants from the Örebro County Council Research Committee and Nyckelfonden. MCJM and OBH are funded by the Wellcome Trust (Grant numbers: 218205/Z/19/Z and 214374/Z/18/Z). Open access funding provided by Örebro University. B.S.: Conceptualization, formal analysis, investigation, writing of the original draft. L.E.: Formal analysis, investigation. A.T.K.: Software, investigation, resources. O.B.H.: Formal analysis, validation, investigation, review & editing of the text. H.B.B.: Formal analysis, investigation, review & editing of the text. J.E.B.: Software. B.P.A.: Formal analysis, validation, resources, investigation, review & editing of the text. A.F.: Formal analysis, validation, resources, investigation. S.T.H.: Conceptualization, methodology, review & editing of the text. R.J.R.: Conceptualization, methodology, Investigation, review & editing of the text. M.C.J.M.: Conceptualization, methodology, review & editing of the text. P.M.: Conceptualization, methodology, funding acquisition, review & editing of the text. R.J.R., B.P.A. and A.F. work for New England Biolabs, a company that sells research reagents including restriction enzymes and DNA methyltransferases to the scientific community. The commercial affiliation of these authors does not alter our adherence policies on sharing data and materials. All other authors have no conflicts to declare.
Q: heroku django south does not appear to use migrations I'm having trouble with Django south migrations. It may be related to how we've laid our project out but it was working previously, and it works fine locally. I pushed new code last night that contained a migration in my_app app. So in my local environment... $ ./manage.py migrate --list socialaccount (*) 0001_initial (*) 0002_genericmodels (*) 0003_auto__add_unique_socialaccount_uid_provider (*) 0004_add_sites (*) 0005_set_sites (*) 0006_auto__del_field_socialapp_site (*) 0007_auto__add_field_socialapp_client_id (*) 0008_client_id (*) 0009_auto__add_field_socialtoken_expires_at (*) 0010_auto__chg_field_socialtoken_token (*) 0011_auto__chg_field_socialtoken_token payments (*) 0001_initial users (*) 0001_initial my_app (*) 0001_initial (*) 0002_auto__add_organizerapplication In heroku, it doesn't recognize my_app as an app with migrations. When I attempt to migrate that app.... $ heroku run my_app/manage.py migrate my_app --app=my_app Running my_app/manage.py migrate my_app attached to terminal... up, run.5016 The app 'my_app' does not appear to use migrations. ./manage.py migrate [appname] [migrationname|zero] [--all] [--list] [--skip] [--merge] [--no-initial-data] [--fake] [--db-dry-run] [--database=dbalias] If I list the migrations, you'll notice my_app isn't listed... $ heroku run my_app/manage.py migrate --list --app=my_app Running my_app/manage.py migrate --list attached to terminal... up, run.8264 socialaccount (*) 0001_initial (*) 0002_genericmodels (*) 0003_auto__add_unique_socialaccount_uid_provider (*) 0004_add_sites (*) 0005_set_sites (*) 0006_auto__del_field_socialapp_site (*) 0007_auto__add_field_socialapp_client_id (*) 0008_client_id (*) 0009_auto__add_field_socialtoken_expires_at (*) 0010_auto__chg_field_socialtoken_token (*) 0011_auto__chg_field_socialtoken_token payments (*) 0001_initial users (*) 0001_initial I'm not sure it's relevant but my_app is listed in my INSTALLED_APPS when I check. UPDATE The issue was that this particular migrations dir was missing __init__.py. Running commands like convert_to_south through Heroku don't impact this as local file changes don't stick. Pushing the repo again with that file got the migrations recognized. I then just had to fake the first migration and I was good. A: Make sure you have a init.py file in the migrations folder of the app you want to migrate. South will work locally, but not in production on heroku. Simply copy an init.py file from one of your apps, and put it into the migrations folder for the app you are getting the error for. Push that change to production, and then migrate.
Family Stories When a child gets a life-threatening illness, everything changes. Parents often lose their jobs because of the time needed to care for their child. Families struggle with everyday living expenses. Here are some of their stories. Our Events We host a golf tournament each summer and a formal gala or a comedy night in the spring. Money raised through these events is our main source of revenue. And with low overhead, the money goes to help families. Create a Campaign Now you can create your own fundraising campaign right on our website! No matter how big or small, all donations help. Examples: a lemonade stand, a school dance, a dinner for friends or even dedicate your birthday! Our mission Caruso Family Charities is dedicated to assisting families of a child, adolescent or young adult being treated in Colorado for a life-threatening illness or life-altering event. Our mission is to help relieve some of the financial pressures so the family may focus on caring for their sick child. FEATURED CAMPAIGN Thank you for donating to Caruso Family Charities. Your donation goes directly to helping families who need a hand while their child is gravely ill. We help with the most pressing needs like rent, power bills, building wheelchair ramps, automobile repairs, medical supplies and other important goods and services. Help is immediate and hands-on. Needs are personally assessed by our staff and visits are paid to the families. Many are so happy to know that there are people in their community (like you) who care enough to help. Enter your pledge amount $10.00 $25.00 $50.00 $75.00 $100.00 $250.00 $500.00 Campaigns Thank you for donating to Caruso Family Charities. Your donation goes directly to helping families who need a hand while their child is gravely ill. We help with the most pressing needs like rent, ... ByLeslieJ 2017 Donation Campaign 10% Current $985.00 Target $10,000.00 Backers 6 Thank you for donating to Caruso Family Charities. Your donation goes directly to helping families who need a hand while their child is gravely ill. We help with the most pressing needs like rent, power ... Read more $10.00 $25.00 $50.00 $75.00 $100.00 $250.00 $500.00 Lighting the Path of Hope this holiday season. The 2016 Caruso Family Charities Holiday Giving campaign is underway. We hope you'll join us in raising money to give Colorado families a warm and Merry ... ByLeslieJ 2016 Holiday Giving Campaign 125% Current $6,250.00 Target $5,000.00 Backers 17 Lighting the Path of Hope this holiday season. The 2016 Caruso Family Charities Holiday Giving campaign is underway. We hope you'll join us in raising money to give Colorado families a warm and Merry Christmas ... Read more Please join in celebration of the life of Nicole Kay Archer, beloved daughter of Clyde and Theda Archer. This year marks the twenty-fifth anniversary of Nicole’s untimely passing, and her friends and family wish ... ByFriends of the Archer Family Nicole Archer Remembrance Campaign 100% Current $4,000.00 Target $4,000.00 Backers 42 Please join in celebration of the life of Nicole Kay Archer, beloved daughter of Clyde and Theda Archer. This year marks the twenty-fifth anniversary of Nicole’s untimely passing, and her friends and family wish to ... Read more
Massachusetts Route 16 Route 16 is an east–west state highway in Massachusetts. It begins in the west at an intersection with Route 12 and Route 193 in Webster, just north of the Connecticut state border. It runs in a generally southwest-northeast routing through a number of Boston's suburbs and runs to the west and then north of the city before ending in Revere at an intersection with Route 1A and Route 60. Much of Route 16 east of the Newton-Wellesley town line, and especially from Cambridge eastward, is a multi-lane parkway, although it is not limited access for any significant length of road. Segments of Route 16 are also known as the Mystic Valley Parkway, the Alewife Brook Parkway, and the Revere Beach Parkway, among other names. From the western end of the Route 135 concurrency in Wellesley to Route 30 (Commonwealth Avenue) in Newton, the route serves as a part of the Boston Marathon, from the halfway point to just before Mile 18 and the hills. Route description Webster to Milford Route 16 begins at Routes 12 and 193, not far from the Connecticut border. In Webster, along the shore of Lake Chaubunagungamaug, it intersects I-395. After passing I-395, the route continues to the northeast, going through Douglas (with a trip through the Douglas State Forest), the Blackstone River Valley National Heritage Corridor, Uxbridge, Mendon, Hopedale, and Milford, while passing beneath I-495 shortly thereafter. Milford to Newton From I-495, Route 16 goes northeasterly past Holliston and the Elm Bank Reservation in Sherborn. The road then crosses into Natick while traveling next to the Dover line, and goes through Wellesley, where Wellesley College and Babson College are located. Entering Newton, the route travels past Lasell College before crossing into Middlesex County. Newton to Revere In Newton, Route 16 crosses Route 30 and Route 128 (Interstate 95), later crossing I-90, the Massachusetts Turnpike, in West Newton; Pike Exit 16 here provides access to and from the east only. It enters Watertown shortly before crossing the Charles River, and intersects U.S. Route 20 in Watertown Square. The route passes by Mount Auburn Cemetery before entering Cambridge. Continuing east, Route 16 joins U.S. Route 3 and Route 2, turning north to pass by Fresh Pond and the large parking garage at the MBTA Alewife Station. From there, Route 2 splits off at the eastern end of the freeway portion of the Concord Turnpike, while Routes 3 and 16 continue north on Alewife Brook Parkway. Route 3 exits west at Massachusetts Avenue, while Route 16 continues north on the parkway into Somerville, meeting up with the Mystic Valley Parkway just south of the Mystic River. Route 16 follows the Mystic Valley Parkway generally eastward, traveling beside the Mystic River downstream and eventually crossing it into Medford. It soon is joined from the north by Massachusetts Route 38, and passes near Medford Square (after recrossing the river), where Route 38 exits to the south on Main Street. Route 16 then crosses Interstate 93 in a series of ramps that include onramps to the north and south of I-93 from Route 16's eastbound lanes, and a ramp from I-93 southbound to Route 16 east. Route 16 then crosses the Mystic River again, reaching the Wellington Circle junction with Massachusetts Route 28 in Medford. This junction marks the end of the Mystic Valley Parkway and the beginning of the Revere Beach Parkway, on which Route 16 continues eastward, passing the Wellington MBTA station and crossing the Malden River. The route continues east through Everett (where it has an interchange with Massachusetts Route 99) and Chelsea, where it has an interchange with U.S. Route 1 at the border with Revere. The stretch between Wellington Circle and Route 1 is characterized by a fairly dense mixture of residential, industrial, and commercial uses, in contrast to the more residential and park-like settings of the section between Wellington and Route 2. Continuing eastward from Route 1, Route 16 has an interchange with Massachusetts Route 107 at Cronin Park before heading north to a junction with Winthrop Ave, where the Revere Beach Parkway and Massachusetts Route 145 turn right. Route 16 goes a short way further north, before it ends near Revere Beach and the Atlantic Ocean at Timothy J. Mahoney Circle, a junction with Routes 1A and 60 in Revere. History Parts of Route 16 were historically maintained by the Metropolitan District Commission (MDC), and while the MDC no longer exists, the parkway portions of the route are still patrolled by the Massachusetts State Police and maintained by the Massachusetts Department of Conservation and Recreation as a remnant of the former MDC jurisdiction. Major intersections References 016 Category:Parkways in the United States Category:Transportation in Middlesex County, Massachusetts Category:Transportation in Norfolk County, Massachusetts Category:Transportation in Suffolk County, Massachusetts Category:Transportation in Worcester County, Massachusetts Category:Holliston, Massachusetts
78 B.R. 187 (1987) In re NINE WEST DIVISION, INC., Debtor. William ORSI and Seven West Division, Inc., Plaintiffs, v. NINE WEST DIVISION, INC., d/b/a BBC, Defendant. Bankruptcy No. 86 B 4411, Adv. No. 86 A 888. United States Bankruptcy Court, N.D. Illinois, E.D. July 28, 1987. Deborah K. Ebner, Wildman, Harrold, Allen & Dixon, Chicago, Ill., for defendant. Christopher J. Horvay, Holleb & Coff, Chicago, Ill., for plaintiffs. MEMORANDUM OPINION AND ORDER ON DEFENDANT'S MOTION TO DISQUALIFY PLAINTIFFS' COUNSEL JACK B. SCHMETTERER, Bankruptcy Judge. This cause comes before the Court upon the motion of Defendant Nine West Division, Inc. ("Debtor") to disqualify the law firm of Holleb & Coff and its attorneys from representing William Orsi ("Orsi") and Seven West Division, Inc. ("Seven *188 West") (collectively, the "Plaintiffs") in both the underlying bankruptcy proceedings and the above-captioned adversary proceeding. For the reasons set forth below, the Court sets this matter for trial on controverted matters pertaining to that Motion. FACTS The parties have not yet offered evidence but rather submitted several affidavits. Debtor filed affidavits of: Martin Gutilla ("Gutilla"), president and sole shareholder of Debtor; and Robert J. Melone ("Melone"), attorney for Gutilla and Debtor. Plaintiff filed the affidavits of: William Orsi, president and sole shareholder of Seven West; and Theodore L. Koenig ("Koenig"), at various times attorney for Orsi, Seven West Debtor and allegedly Gutilla; and Morris J. Coff ("Coff"), a shareholder of the law firm Holleb & Coff. The undisputed facts as determined from the affidavits are described below. Likewise, those facts in dispute by the parties are specifically noted. Prior to June, 1985, Koenig had no relationship of any kind with Debtor, Seven West, Orsi or Gutilla. Beginning in June, 1985, while employed as an associate at the law firm of Winston & Strawn, Koenig represented Orsi in negotiating Orsi's acquisition of partial ownership in Seven West and Debtor. Koenig also represented Orsi in negotiating written leases for the respective properties at which Seven West and Debtor conducted their operations. Those negotiations culuminated in the execution of an agreement on July 2, 1985 (the "1985 Agreement"). Pursuant to the 1985 Agreement, Orsi received fifty percent of the shares of stock in both Seven West and Debtor. Gutilla received the other fifty percent of the shares of each corporation. The parties dispute whether Koenig represented only Orsi during the June, 1985 negotiations. Koenig and Orsi assert that Koenig represented only Orsi. Gutilla attests that Koenig represented Debtor, Seven West, and Gutilla as well as Orsi. Koenig claims that he told Gutilla that he represented only Orsi and if Gutilla had any interest different from Orsi or any personal concerns he should employ his own counsel. According to Koenig, Gutilla indicated that he had no such concerns and chose not to retain counsel. Gutilla denies that Koenig ever gave such advice. Subsequent to execution of the 1985 Agreement, Koenig represented both Seven West and Debtor. The parties do not agree as to the scope of Koenig's representation at that time. Koenig and Orsi contend that Koenig represented both corporations for the limited purpose of negotiating with the Internal Revenue Service and the Illinois Department of Revenue to obtain agreements for the payment of certain tax arrearages. Gutilla attests that the tax matters were only some of Koenig's duties. Gutilla asserts that Koenig also received confidential information regarding the financial and business affairs of Debtor in addition to information relevant to the tax liabilities. Sometime around September, 1985, Orsi and Gutilla decided that instead of each controlling a fifty percent interest in Debtor and Seven West, they should exchange certain of their respective interests so that Gutilla would be the sole owner of Debtor and Orsi would be the sole owner of Seven West. Negotiations concerning that plan then began. Koenig alleges that he advised Gutilla that he was Orsi's attorney only and that due to the potential conflict of interest Gutilla should retain counsel if he desired. According to Koenig, Gutilla indicated that he was aware of the risks and chose not to be represented. Gutilla denied that Koenig ever gave such advice. From September to December, 1985, Koenig participated in the negotiations to exchange shares of stock. Once again, the parties disagree as to the scope of Koenig's representation. Gutilla asserts that Koenig represented Debtor, Seven West, Orsi *189 and Gutilla. According to Gutilla, Koenig was acting as a counselor rather than an advocate. Koenig and Orsi allege that Koenig represented only Orsi and Seven West. In early December of 1985, Melone attended a meeting at which were Orsi, Orsi's brother, Gutilla and Koenig. Melone was there on behalf of a potential outside investor in Debtor. It was Melone's understanding that Koenig was acting as attorney for all of the parties. Subsequent to that meeting, Melone was retained by Gutilla and Debtor for the purpose of representing their interests in working out the exchange agreement. Koenig continued to represent Debtor for the limited purpose of obtaining extensions on the tax matters. On February 5, 1986, an agreement (the "Exchange Agreement") was executed by Orsi and Gutilla in their capacities as individuals and President of Seven West and Debtor, respectively, whereby Orsi became sole shareholder of Seven West and Gutilla sole shareholder of Debtor. The Exchange Agreement also included a provision concerning the allocation of rents under certain lease agreements. That provision of the Exchange Agreement is in issue in this adversary proceeding. The circumstances surrounding signing of the February 5, 1986 agreement are in dispute. Melone was not informed of the meeting. Gutilla alleges that Koenig requested him to attend the meeting. Koenig and Orsi assert that Orsi arranged the meeting. Gutilla also alleges that Koenig represented that Melone had approved the terms of the Agreement and that he, Gutilla, relied upon Koenig's representation in signing the Agreement. Koenig contends that Gutilla's actions at the February 5, 1986 meeting belie Gutilla's allegations of misrepresentation. Shortly after February 5, 1986, Koenig discontinued his representation of Debtor. On February 28, 1986, Koenig left Winston & Strawn and became an associate of the law firm of Holleb & Coff. Koenig brought with him to Holleb & Coff the documents regarding the negotiations of the Agreement. Koenig continues to represent Orsi and Seven West. Koenig has continued in this case to participate actively on behalf of Orsi and Seven West in the dispute with Debtor over the rent provision in the Exchange Agreement. Debtor filed for bankruptcy under Chapter 11 of the Bankruptcy Code on March 20, 1986. This original adversary complaint in this case was filed on August 5, 1986. Between April, 1986 and February, 1987, Debtor, Gutilla and their counsel engaged in numerous settlement discussions with Orsi, Seven West and their attorneys at Holleb & Coff. Koenig was present at every discussion. Settlement discussions broke off on February 16, 1987. Within ten days after settlement discussions ended, Holleb & Coff was orally requested by Debtor's current counsel to withdraw voluntarily from the representation of Orsi and Seven West. Holleb & Coff declined to do so. On March 2, 1987, Debtor filed the present motion to disqualify Holleb & Coff. DISCUSSION The standard for disqualification of an attorney who undertakes litigation against a former client is the so-called "substantial relationship" test adopted by the Seventh Circuit. LaSalle Nat'l Bank v. County of Lake, 703 F.2d 252, 255 (7th Cir.1983); Westinghouse Electric Corp. v. Gulf Oil Corp., 588 F.2d 221 (7th Cir.1978). The test has been described as embodying the substance of Canon 4 of the A.B.A. Code of Professional Responsibility, which protects the confidences of a client against disclosure and possible use against him, and also Canon 9, which provides that an attorney must avoid even the appearance of impropriety. Thus, the question before a court considering a motion for disqualification is whether it could reasonably be said that during the former representation the attorney might have acquired information substantially related to the subject matter of the subsequent representation, LaSalle, 703 F.2d at 255. If a substantial relationship is found, it is unnecessary for the movant to prove that the attorney in *190 question actually received during the course of his formal employment confidential information relevant to matters involved in the subsequent representation. Analytica, Inc. v. NPD Research, Inc., 708 F.2d 1263, 1266-67 (7th Cir.1983). The question before this Court, therefore, is not whether Koenig received any specific information relevant to the present litigation during any representation of Debtor, but whether there is a substantial relationship between the subject matter of any prior and the present representation. The Seventh Circuit has directed that a three-level inquiry be undertaken in order to determine if such a substantial relationship exists. First, the trial judge must make a factual reconstruction of the scope of the prior legal representation. Second, it must be determined whether it is reasonable to infer that the confidential information allegedly given would have been given to a lawyer representing a client in those matters. Third, it must be determined whether that information is relevant to the issues raised in the litigation pending against the former client. Westinghouse, 588 F.2d at 225. After evaluating the facts of this case according to this three-part standard, if the Court finds that such a substantial relationship did exist, there arises a rebuttable presumption that the attorney received confidential information during his prior representation. LaSalle, 703 F.2d at 256. In this case, the parties dispute the threshold issue: the scope of Koenig's prior representation of Debtor. Affidavits cannot resolve that dispute. Therefore, the Court is presently unable to properly conduct the three-step inquiry to determine whether a substantial relationship exists between prior and present representations. Accordingly, an evidence hearing will be held solely on this motion to disqualify. Plaintiffs contend the "substantial relationship" rule cannot apply in this case. The rule rests upon the presumption that confidences potentially damaging to the client have been disclosed to the attorney during the former period of representation. According to Plaintiffs, this presumption cannot apply here because there could be no confidences as Orsi already knew all of the facts about financial condition of both corporations from negotiations concerning the Exchange Agreement. However, the parties dispute as to who managed the business of Debtor. Gutilla asserts he managed the actual running of the business and that Orsi was not present during business hours. Orsi alleges Gutilla took no active role in the management of Debtor and that it was he, Orsi, who took care of the financial end of the business. Based on the present record, the Court cannot say Orsi was aware of every confidence concerning Debtor passed on to Koenig by Gutilla. Moreover, Plaintiffs' argument interprets too narrowly an attorney's duty to preserve the confidences and secrets of a client. This ethical precept exists "without regard to the nature or source of information or the fact that others share the knowledge," ABA Code of Professional Responsibility, EC 4-4 (1978).[1] Information acquired during the attorney-client relationship is sheltered from use by the attorney against his client and this is true without regard to whether someone else may be privy to it. Brennan's, Inc. v. Brennan's Restaurant's, Inc., 590 F.2d 168, 172 (5th Cir.1979). Therefore, the need to safeguard the attorney-client relationship by possible disqualification is not diminished by the fact that the prior representation may have been joint with the attorney's present client. Accordingly, the Court finds the "substantial relationship" rule fully applicable to this case. Brennan's, 590 F.2d at 172. Plaintiffs also argue that Debtor waived any right it may have had to object to Holleb & Coff's representation of Orsi and Seven West by failing to object until more than a year-and-a-half after Melone began representing Debtor. According to Plaintiffs, *191 any conflict of interest should have been apparent in December, 1985 and yet Debtor never objected to Koenig's representation of Orsi and Seven West until settlement negotiations broke down in February, 1987. The Seventh Circuit has indicated that a client's consent will not justify the use of confidential information against the client. See Westinghouse Electric Corp. v. Gulf Oil Corp., 588 F.2d 221, 228 (7th Cir.1978). Whether this rule applies to non-confidential information is unclear. However, there is also authority for the proposition that a former client's consent to a lawyer's representation of an adverse party on a matter substantially related for the sole purpose of settlement negotiations does not necessarily constitute a waiver of the right to object to the lawyer's representing the adverse party in litigation. See Koehring Co. v. Manitowic Co., Inc., 418 F.Supp. 1133 (E.D.Wisc.1976). That is not a per se rule but rather places the burden on the lawyer to show a clear and unequivocal waiver of objection to potential conflicts for all purposes. Id. at 1138-39. No such waiver has been demonstrated by the continued representation without objection during settlement discussions. Koehring, Id. Nor has it otherwise been demonstrated by affidavits. Finally, Debtor contends that Holleb & Coff should be disqualified because Koenig may be called as a witness. If an attorney ought to be called as a witness to testify to any controverted matter, then the attorney shall withdraw from the conduct of the trial. May's Family Centers, Inc. v. Goodman's Inc., 590 F.Supp. 1163 (N.D.Ill.1984). The parties dispute whether any matters Koenig may testify to are controverted. As the Court noted in May's, this issue is one that must first be illuminated by Debtor and its counsel in light of all the fact issues and their contemplated trial strategy. May's, 590 F.Supp. at 1165 n. 7. Therefore, this Court will adopt procedure used by the District Court in May's. Disqualification under the attorney-as-witness rule is not mandated at this stage of the adversary proceeding, whereas there is a need to determine Holleb & Coff's possible disqualification under the substantial relation rule. A pretrial has not yet been held in the underlying litigation and the parties have not concluded framing the issues involved therein. If it is hereafter determined that Koenig ought to testify at trial to any controverted matter, he and his firm will be disqualified from representing Orsi and Seven West in this matter. Apart from the question of Holleb & Coff's possible disqualification under the substantial relationship rule, if Koenig will be testifying to truly uncontroverted matters, or if it later becomes clear he need not testify at all, then he and his firm will not be disqualified on witness grounds. Holleb & Coff argues that in light of its long-standing relationship with Orsi, its involvement with this litigation from the beginning and financial hardship to the client, disqualification would work a substantial hardship on its client. Courts that have considered the question have not found "distinctive value" or great merit in arguments about long-standing relationships with the client, involvement in the litigation from its inception, or financial hardship to the client. See May's, 590 F.Supp. at 1165. Holleb & Coff's reasons in that regard do not meet the tests earlier described. Disqualification at this early stage in the case would not be a substantial hardship on the Plaintiff clients merely because of "the distinctive value of the lawyer or his firm as counsel in the particular case." ABA Code of Professional Responsibility DR 5-101(B)(4) as incorporated by DR 5-102. The ethical principles addressed are of such significance that where applicable they must be observed in advance so clients will not incur unnecessary expense, inconvenience or detriment. When disqualification is later mandated, some adverse consequences will usually flow to the client. No unusual consequences to the client have been demonstrated here. It is the responsibility of attorneys to avoid placing their clients in the position of being hurt by a successful disqualification motion. *192 CONCLUSION This matter is therefore set for hearing on October 5th and 6th, 1987 at 2:00 P.M. each day to take evidence as to Debtor's motion to disqualify Holleb & Coff. A separate Pretrial Order is entered this date concerning that hearing. Though the great effort and resources devoted by the parties to this issue will only serve interests peripherial to issues in the main litigation, this question must be decided before the underlying case proceeds further. NOTES [1] The present ABA Rules of Professional Conduct 1.6 provides that "a lawyer shall not reveal information relating to representation of a client unless the client consents after consultation." (Emphasis added).
All the good things in life. Tag: sunset From Interstate 5 in northern California, there are a few Wildlife areas, which are very pristine. These historic natural wetlands formed from runoff from the Sacramento river and Butte Creek. Located in Butte and Glenn counties, the Upper Butte Basin Wildlife Area is a sight to see. Sunset at Llano Seco wetlands. I was passing by the Llano Seco around sunset. I went to see Storm Large at the Laxson Auditorium, at Chico State. She rocks! Look up her website. She sings with Pink Martini also. They have a song, called Veronique. Storm Large Pictured a sunset from last February. Lnano Seco was beautiful that evening. There is a boarded walkway out that you can walk out on and get a good view of the wetlands, panoramic also. Beautiful sunset at Llano Seco. This is one of the finest wetland habitats in northern California. Below is a link to the Dept of Fish and Wildlife, with maps and much more details about the Wildlife area. It’s a great place for bird watching, there are many species of birds. There are so many birds to see, here are just a few. There are pelicans, hawks, eagles, falcons, cuckoo, sparrows, cranes, herons, starlings, swallows, larks, blackbirds, and so many more I won’t list. Go to the website, and look at the pdf file, Bird Checklist. There are so many they need a check list. Lake Tahoe, is gorgeous, at any time of the day. Sunsets near Lake Tahoe are even more gorgeous! California has beautiful sunsets, but up in Tahoe, they are particularly magnificent. This sunset was at Rustic Cottages on Lake Tahoe, in Tahoe Vista. They have a beautiful meadow behinds some of the cabins and houses, and the sunset was gorgeous there. Rustic Cottages is a great place to vacation, especially with family! I was driving up north one evening and manged to get this photo on my android. I stopped at Granzella’s in Williams. It’s agreat place to stop and take a break, eat, shop, have a coffee, gelato, or a deli sandwich. They have excellent olives which they make, and also a full restaurant, and a full bar. They also have a hotel. Caught this sunset while visiting Granzellas at Williams.
Q: Javascript autoslider does not work correctly Function function autoHeadline(time) { var elem = $('div#main-headline ul.main-headline-item li.x'); var id = elem.index(); if(id==-1) { id = 0; elem = $('ul.main-headline-item li.x').eq(id); } $('div#main-headline ul.main-headline-item li').removeClass('active').removeClass('x'); $('div#main-headline ul.main-headline-item li').eq(id).addClass('active'); $('div#main-headline ul.main-headline-item li').eq(id+1).addClass('x'); $('div#main-headline ul.main-headline-number li').removeClass('active'); $('div#main-headline ul.main-headline-number li').eq(id).addClass('active'); headlineTime = setTimeout('autoHeadline('+time+')', time); } This is JS for slider: $('.image-news span.btn').click(function slider() { var container = $(this).parent(); var type = $(this).data('type'); var index = container.find('ul li.active').index(); var count = container.find('ul li').size()-1 ; var timer = setInterval(slider,1000); if(type == 'prev') { index -= 1; } else { index += 1; } if(index < 0) { index = count; } else if(index > count) { index = 0; } container.find('ul li.active').removeClass('active') container.find('ul li').eq(index).addClass('active'); }, function() { autoHeadline(headlineDelay); }); Auto slider doesn't work. Only when I click arrow one time then auto slider is working. How can I fix it? I want my slider changing by itself. A: Currently, you only make the initial autoHeadline call when your button is clicked. You need to call it first when the page loads in order to kick off the chain. Since you're using jQuery, you should have a $(document).ready(...) call. In that handler function, call autoHeadline(headlineDelay).
1 INTRODUCTION ============== Suicide is a multidimensional event. It is the result of a process with risk and protective factors in the cultural, social, psychological, psychiatric and biological fields. A risk factor is represented by a measurable characteristic that precedes an outcome in time, and it increases the probability of the outcome. Moscicki suggested distinguishing between proximal and distal risk factors. Distal risk factors represent a 'foundation,' they are 'necessary but not sufficient' for suicide, while proximal risk factors (precipitating events) are neither necessary nor sufficient ([@b1-sjph-54-03-238]). Suicide is not a result of the effect of one single risk factor, but rather of an interaction of factors that lead to the necessary and sufficient conditions for suicide ([@b1-sjph-54-03-238]). Genetic vulnerability for suicidal behaviour could be considered as a distal risk factor. 1.1 A Historical Perspective ---------------------------- Motto argued that 'history can provide a valuable perspective on contemporary questions' ([@b2-sjph-54-03-238]). 'The prevalent attitude of a society to suicide is shaped and fashioned from time to time by the beliefs of its people in the different periods of its history' ([@b3-sjph-54-03-238]). As such, nowadays experts are the heirs of the 19th century psychosocial tradition ([@b4-sjph-54-03-238]). In addition to centuries of philosophical and moral writings, Fedden noticed new perspectives emerging in the 19th century ([@b5-sjph-54-03-238]). Indeed, observations suggested that there could be a genetic heredity of suicide ([@b6-sjph-54-03-238]--[@b8-sjph-54-03-238]). Falret, a student of Pinel and Esquirol, who became the head of the clinic 'la Salpêtrière' in Paris, was amongst the first to apply statistical data. In his book 'De l'hypochondrie et du suicide,' he pointed at the interaction of causal risk factors, which he grouped into four categories, namely: predisposing factors including heredity; accidental direct factors, such as passions; accidental indirect factors, such as pain or illness; and civilization including religious fanaticism ([@b9-sjph-54-03-238]--[@b10-sjph-54-03-238]). Winslow stressed the impact of heredity further on: 'It is not necessary that the disposition to suicide should manifest itself in every generation; it often passes over one, and appears in the next, like insanity unattended with this propensity.' And: 'the suicidal tendency descending from one generation to another \[...\] has been observed much more among insane persons, who have committed self-destruction, than among the sane' ([@b11-sjph-54-03-238]), thus Bucknill & Tuke who also discussed the heredity of mental illnesses ([@b12-sjph-54-03-238]). Masaryk completed a sociological monograph on suicide.[1](#fn1-sjph-54-03-238){ref-type="fn"} Taking into consideration social factors and mental illnesses regarding suicidal heredity, he concluded: 'Obviously, psychical inheritance occurs indirectly in a physiological, morphological and pathological way, but how we are to conceive of this no one yet perceives' ([@b13-sjph-54-03-238]). Almost simultaneously, Morselli reflected further on the complex and interacting causality of suicide, incorporating both environmental and heritable aspects: '\[I\]f it were possible to know exactly the physiological temperament of all selfdestroyers, and, above all, the hereditary transmission, direct or indirect, of the morbid germs, we should be able to trace back the fatal determination of their last act to its true and efficient cause' ([@b14-sjph-54-03-238]). The historical perspective of the question of heredity of suicidal behaviour could be expanded by many more, such as Moore, Burrows, Westcott, Tuke and Savage, Durkheim, as presented by Goldney and Schioldann ([@b8-sjph-54-03-238]). In addition, Motto's review of the 19th century editions of the American Journal of Insanity (later renamed as the American Journal of Psychiatry) ([@b2-sjph-54-03-238]) and the presentations by Berrios and Mohanna ([@b15-sjph-54-03-238]) and Berrios are interesting windows to that period ([@b16-sjph-54-03-238]). However, early contemporary research, such as the observation of Ringel, saw that suicidal behaviour was transmitted at least partly independent from psychiatric disorders ([@b17-sjph-54-03-238]). The psychological autopsy study by Farberow and Simon conducted on two samples of fifty suicides in two cities, found three parental suicides in each group -- a rate 88 times higher than the expected rate ([@b18-sjph-54-03-238]). More sceptical regarding a genetic influence was Baechler: 'It is clear that one does not inherit a solution \[suicide\] but at most a disposition to consider a solution of this nature' ([@b19-sjph-54-03-238]). Exploring causal pathways to suicide, Maris compared a sample of 266 suicides with suicide attempts and natural deaths by means of psychological autopsies. He found that suicides were distinguished from natural deaths by increased levels of a wish to die, seeing death as an escape from pain, not wanting to change things regarding the past life, hopelessness, no social participation, dissatisfaction with life, and suicide in the history of first-degree relatives (0% for the natural deaths vs. 11% for the suicides) ([@b20-sjph-54-03-238]). Murphy and Wetzel interviewed 127 patients who were hospitalised after a suicide attempt. A family history of suicide, attempted suicide, and suicide threats was found in 14%, 24% and 6% of the patients, respectively. Suicidal behaviour was found in 36% of the study group, with the highest rates in the subgroups with personality disorders (including addictions) and primary affective disorders. As an explanation, the authors stated that they were 'not bound to a genetic, or even to a familial, hypothesis.' They rather adhered to the hypothesis of 'assortative association' and 'shared deviance' ([@b21-sjph-54-03-238]). Mitterauer presented results from five studies (two population and three clinical studies) focusing on suicide of one specific area, Salzburg in Austria. At the population level, 49.6% of the suicides had a family history of suicide, compared with as much as 69.7% of the suicidal mental health patients. These high figures resulted from gathering the information from general practitioners, elders, clergy, etc. Indeed, only 39% of the suicide positive families had been reported by the relatives. Findings from the two studies, on bipolar mood disorder and suicide, and on psychosis and suicide, indicated the existence of an independent vulnerability to suicide. However, he was cautious, contending that 'not every case of suicide must have a genetic disposition.' Rather, it is 'a matter of finding the appropriate role that each of the three factors - the genetic disposition, the life history and the socio-cultural situation -- plays in suicide' ([@b22-sjph-54-03-238]), a statement that could be equal to the current 'interplay between genes and environment' ([@b23-sjph-54-03-238]--[@b24-sjph-54-03-238]). 1.2 The Clinical Perspective versus the Population Perspective -------------------------------------------------------------- Suicide prevention strategies can be developed from the health-care/clinical perspective focused on high risk groups, and the public health perspective focused on the general population ([@b25-sjph-54-03-238]). The same distinction can be made regarding the research on genetic vulnerability. The reviews of Bondy et al. ([@b26-sjph-54-03-238]), Brent and Mann ([@b27-sjph-54-03-238]), Pedersen and Fiske ([@b28-sjph-54-03-238]), Roy ([@b29-sjph-54-03-238]), Roy et al. ([@b30-sjph-54-03-238]) and Rujescu et al. ([@b31-sjph-54-03-238]) looked at clinical, twin, adoption and genetic studies, and concluded that there is a genetic aspect that manifests itself when a person experiences major stress or a psychiatric disorder. In the same line, the reviews of Träskman-Bendz and Mann ([@b32-sjph-54-03-238]), Mann et al. ([@b33-sjph-54-03-238]) and Van Heeringen ([@b34-sjph-54-03-238]) on the biological processes in suicidal behaviour concluded that there probably exists a genetic influence on suicide risk independent of the genetic risk of psychiatric disorders. Wasserman stated that genetic inheritance does not equal 'predestination.' The biological vulnerability will be activated through life conditions and experiences, which may lead to stress, hopelessness and psychiatric conditions ([@b25-sjph-54-03-238]). When investigating genetic contributions to suicidal behavior, one should not overlook family studies. In these, the risk for suicidal behaviour among family members of those who have already expressed suicidal behaviour is compared with the same risks among relatives of those who have not expressed suicidal behaviour. Many studies have been reported in reviews so far, but Baldessarini and Hennen aggregated the risk estimates from almost all these family-study reports, and reported the overall risk ratio of almost 3 ([@b35-sjph-54-03-238]). So-called natural experiments of natural clones (monozygotic twins who share 100% of their genes) and adoption studies have the potential to disentangle genetic familial contribution from environmental familial contributions (e.g., raising children, role models, etc.). These have already been extensively and profoundly reviewed by the above mentioned authors, as well as in a recent systematic review ([@b36-sjph-54-03-238]) and a meta-analysis ([@b37-sjph-54-03-238]). 2 AIM ===== Starting with a historical perspective, this paper reviews current knowledge of a genetic vulnerability to suicidal behaviour, distinct from the genetic vulnerability to psychiatric disorders, with the focus on clinical and population-based studies, and recent findings from molecular genetics association studies. 3 METHOD ======== Databases PubMed/Medline and PsycINFO were searched with the following search words: gene, meta-analysis, offspring, proband, suicide, and suicidal behavi\*, to retrieve peer-reviewed research articles and review papers from the professional literature in English language. With no restriction for publication dates, the search identified 208 papers. Studies not related to genetic aspects of suicide were excluded. The references of relevant papers were checked. 4 RESULTS ========= 4.1 Genetic Studies Based on Clinical Samples --------------------------------------------- Looking for biological markers of depression, Åsberg and colleagues focused on the serotonin metabolite 5-hydroxyindolacetic acid (5-HIAA) in cerebrospinal fluid (CSF). Almost by coincidence, they found that forty percent of the subgroup with low 5-HIAA had attempted suicide compared to fifteen percent in the subgroup without suicide attempt. Since their first publication in 1976, the serotonergic system has been studied extensively across psychiatric disorders both with living subjects and post mortem ([@b32-sjph-54-03-238]--[@b34-sjph-54-03-238], [@b42-sjph-54-03-238]--[@b43-sjph-54-03-238]). The research that led to the formulation of the stressdiathesis model confirmed the genetic transmission of aggression. According to this model, certain people are more vulnerable to suicidal behaviour due to a predisposition for strong feelings and cognitions of hopelessness and suicidal ideation on the one hand (state), and aggression and impulsivity on the other hand (trait), when they suffer from stress and adverse life conditions ([@b38-sjph-54-03-238]). The cognitive and behavioural components of the diathesis are related with neurochemistry, more specifically with the serotonergic and noradrenergic neurotransmitter systems ([@b34-sjph-54-03-238], [@b38-sjph-54-03-238]--[@b42-sjph-54-03-238], [@b44-sjph-54-03-238]--[@b45-sjph-54-03-238]). The potential role of the dopaminergic system is not clear, since this has received only little research attention ([@b25-sjph-54-03-238], [@b41-sjph-54-03-238]). The neurobiology is mostly genetically determined, but early childhood experiences and head injuries may alter this ([@b25-sjph-54-03-238], [@b33-sjph-54-03-238], [@b40-sjph-54-03-238]--[@b41-sjph-54-03-238]). It was proposed that impulsivity and aggression correlate with a dysfunction of the serotonergic system, and that hopelessness correlates with a dysfunction of the noradrenergic system ([@b40-sjph-54-03-238], [@b41-sjph-54-03-238]). Further, it was found that the biological correlates of suicidal behaviour differ from the biological correlates of major psychiatric disorders ([@b24-sjph-54-03-238], [@b32-sjph-54-03-238]--[@b33-sjph-54-03-238], [@b39-sjph-54-03-238], [@b41-sjph-54-03-238], [@b43-sjph-54-03-238], [@b45-sjph-54-03-238]--[@b47-sjph-54-03-238]). Clinical studies are summarized in [Table 1](#t1-sjph-54-03-238){ref-type="table"}. Brent and co-workers studied mood disordered suicide attempters in two relatively small samples ([@b48-sjph-54-03-238]--[@b49-sjph-54-03-238]). The first study found a statistically significant elevated risk for attempted suicide in the offspring of people with a mood disorder who had attempted suicide, when compared with offspring of people with mood disorders who had not attempted suicide. The majority of the attempts occurred in the context of a mood disorder; and the transmission of suicidal behaviour was related to the trans-generational transmission of sexual abuse (an original finding), and to increased aggression. On the other hand, there was no evidence of time clustering between parent and child suicide attempts, counter speaking the hypothesis of transmission through the role models in the family ([@b48-sjph-54-03-238]). The second study ([@b49-sjph-54-03-238]) compared the offspring of three groups of adults with mood disorders: 1) suicide attempters with siblings concordant for suicidal behaviour, 2) suicide attempters with siblings discordant for suicidal behaviour and 3) suicide attempters with siblings concordant for no suicidal behaviour. The study found that suicide attempts in the parents not only increased the risk of suicide attempts and impulsive aggression in the offspring, but also lowered the age of the first suicidal behaviour ([@b49-sjph-54-03-238]). The strongest predictor of attempted suicide in parents and offspring, and early first attempt in offspring, was impulsive aggression, thus confirming other studies that had identified this trait as being part of a diathesis for suicidal behaviour. Family loading of mood disorders was not related with early first attempt, contrary to the history of physical and sexual abuse of offspring. The third study of the same researchers ([@b54-sjph-54-03-238]) looked at a large sample of mood-disordered probands, and focussed on suicidal behaviour and mood disorders among their first-degree relatives. They found that 23.2% of the attempted suicide probands had a first-degree relative who had attempted suicide, compared with 13.2% of the probands without an attempt. 30.8% of the relatives with mood disorders had developed suicidal behaviour, compared with 6.6% of the relatives without mood disorders. But the incidence of mood disorders in first-degree relatives was similar in probands with and without the history of suicide attempt, 50.6% vs. 48.1%, respectively. Childhood abuse and aggression (26.1% vs. 14.1%) were higher in probands with suicide attempts and with family loading of suicidal behaviour. And early age of onset of proband mood disorders was associated with aggression, childhood abuse, mood disorders and suicidal behaviour in relatives. The authors concluded that mood disorders only do not explain the occurrence of suicidal behaviour, and that genetic vulnerability as described in the stress-diathesis model should be considered. In addition, as in the previous studies ([@b48-sjph-54-03-238]--[@b49-sjph-54-03-238]), childhood abuse and sexual abuse seem to be independent risk factors for suicidal behaviour. The interaction between abuse, aggression (as a cause and as a result of abuse), mood disorders and suicidal behaviour needs to be studied. The prevention of abuse and treatment of victims had the potential to prevent suicidal behaviour. Common limitations for all three studies were that they involved an inpatient population, mostly females with mood disorders, and studies focused on attempted suicide, not on suicide. Farmer et al. ([@b52-sjph-54-03-238]), Burke et al. ([@b50-sjph-54-03-238]), and Klimes-Dougan et al. ([@b53-sjph-54-03-238]) specifically studied depressed probands. Farmer et al. found that 66% of the depressed probands reported to have experienced suicidal ideation in the previous week, while the control probands and their siblings reported 5% and 7%, respectively. The occurrence of suicidal ideation was related to personality measures of neuroticism and psychoticism, and to having experienced severe threatening life events (the article did not specify what events were involved). The authors concluded that ideation probably is a state, rather than a partly genetic determined trait related to suicide ([@b52-sjph-54-03-238]). However, the study did not include the link between ideation and, for instance, impulsivity and aggression. In the study of Burke et al., almost half (47%) of the offspring were exposed to suicidal behaviour, and the proband diagnosis was not related to offspring exposure or suicidal attempt. The exposed offspring were more likely to report lifetime suicide attempt than the unexposed offspring, and neither timing, degree nor the number of exposures were associated with the risk for suicide attempt. The results of their study therefore do not support the causal pathway of imitation or modelling explanation (exposure prior to suicide attempt), but they suggest that individuals with a higher risk of suicidal behaviour may show a tendency for aggregation ([@b51-sjph-54-03-238]). Klimes-Dougan et al. in a longitudinal study, from childhood through adolescence, followed depressed mothers, and compared their offspring to the offspring of mothers without psychiatric diagnosis. The study demonstrated that the offspring of mothers with a major depressive disorder had an earlier onset and a more persistent suicidality than the offspring of mothers with bipolar disorder and mothers without psychiatric diagnosis ([@b53-sjph-54-03-238]). Therefore, this offspring represents an important vulnerable group for preventive interventions. Trémeau et al. studied the family history (up to third-degree relatives) of suicide and attempted suicide in three different groups of psychiatric disorders, namely: inpatients with depression, schizophrenia, and opioid dependent patients. Family history of suicidal behaviour significantly increased the risk of suicide attempt. Family history was also a risk factor for multiple suicide attempts and for the use of highly lethal methods (1 in 4 of the depressed group, and in more than half of the two other groups). Almost 60% of the suicide attempts in this population occurred before the age of 25. On the other hand, there were no relations with the age of the first attempt, with receiving mental health care in the period before the first attempt, or with the diagnostic group ([@b57-sjph-54-03-238]). However, the findings point to a need to better detect, treat, and assess suicide risk at an early age. Studying family history of suicidal behaviour and alcohol dependence, Roy determined that both, suicide and suicide attempt in the family history, were significantly more often present in subjects who attempted suicide than among those who did not attempt suicide (29.8% and 11.5%, respectively) ([@b55-sjph-54-03-238]). By means of psychological autopsies, Cheng et al. examined psychosocial and psychiatric risk factors in suicides and community controls in Taiwan. The suicides had higher rates of previous suicide attempts, more early parental deprivation, and more first-degree relatives with suicide, attempted suicide, depression, and emotionally unstable personality disorder, but not more substance abuse. The latter could be explained by high alcohol consumption in general in Taiwan. The effect of family history of suicidal behaviour was independent of demographic, psychosocial and psychiatric factors, and of environmental factors, such as parental deprivation or family history of psychopathology. Other independent factors were depression, substance abuse, unstable personality disorder, and loss events. The authors concluded that the independent factors influence or cause psychosocial factors, and that genetic vulnerability could increase due to these factors. Effective intervention should focus on loss events and major depression among emotionally unstable people with a family history of suicidal behaviour and substance abuse ([@b51-sjph-54-03-238]). A nested-case control study on suicide victims and their psychiatric history was performed by Stenager and Qin. They investigated psychiatric hospitalisation as a risk factor for completed suicide in adolescents and young adults under 35 years of age in Denmark between 1981 and 1997. They demonstrated that a diagnosis of schizophrenia was a strong risk factor for completed suicide, which peaked immediately after admission to, or discharge from, psychiatric hospital. In addition, paternal history of admission to a psychiatric hospital represented a strong predictor for suicide, being more pronounced for mothers than fathers and female than male group of suicide victims ([@b56-sjph-54-03-238]). 4.2 Population-Based Studies ---------------------------- Goodwin et al. studied associations between parental and offspring suicidal ideation and suicide attempts among adult offspring in community samples. All participants were examined for psychiatric disorders, suicidal ideation and suicide attempt, as well as for family history of suicidal ideation and suicide behaviour. The lifetime prevalence of suicidal ideation in the cohort was 13.5% and the history of suicide attempt was 4.6%. The results showed that parental suicidal ideation and attempt was associated with a significantly increased likelihood of suicidal ideation and suicide attempt among offspring. Co-morbid mental disorders contributed to the strength of associations, but the significance remained after adjustment. In this study, suicidal ideation and behaviour were assessed each with only one question. As such, as authors proposed, a more extensive evaluation of suicide ideation and suicidal behaviour would be needed ([@b60-sjph-54-03-238]). Mittendorfer-Rutz et al. focussed on suicide attempts. They analysed a large record-linkage database with the data from hospitalized youth suicide attempters, and matched community controls for gender, month of birth and county. Among the cases, 12% had a history of suicide attempt in the family and 2% of suicide in the family. The strongest independent familial risk factors for youth suicide attempt were siblings', maternal and paternal suicide attempt, and paternal and maternal suicide completion. The boys were more prone to attempting suicide when having a family member who died by suicide than girls. Although the study avoided common research limitations, like recall and selection bias, the study was not able to include suicide attempts when individuals were not hospitalised ([@b63-sjph-54-03-238]). Runeson and Åsberg compared suicide rates of people bereaved by suicide with those bereaved after other causes of death. The data was collected from the Swedish death register. The authors found 9.4% and 4.6% suicides in both groups of relatives, respectively. Previous psychiatric treatment and family history of suicide had the strongest predictive value for suicide, with the latter as an independent factor. No gender difference was found. The study showed that the bereaved by suicide are a risk group for suicide ([@b67-sjph-54-03-238]). The finding was extended by results of the first total population study that provided estimates for familial suicide risk in relatives with varying genetic and environmental backgrounds ([@b68-sjph-54-03-238]). Tidemalm et al. compared relatives of suicides (from 1952 to 2003) with relatives of community controls. They revealed patterns of familial aggregation of suicide: the risk for suicide was higher in the population of first-degree relatives of suicide probands, which was also higher in the group of maternal siblings. Furthermore, they determined that siblings and offspring of suicide victims had a high risk for suicide, but it was more pronounced in the first group ([@b68-sjph-54-03-238]). Qin et al. studied suicides between 1981 and 1997, and matched living controls, regarding family history of suicide and psychiatric illness, and socioeconomic, demographic, and psychiatric data ([@b64-sjph-54-03-238], [@b65-sjph-54-03-238]). Major findings were that both, family history of suicide and psychiatric disorder, significantly and independently increased the suicide risk ([@b64-sjph-54-03-238], [@b65-sjph-54-03-238]). Furthermore, a history of psychiatric hospitalisation was the strongest risk factor for suicide, and more in females than in males. Suicide risk was highest shortly after discharging from hospital. Single marital status and being an age pensioner were the two next important factors. Economic stressors, such as unemployment and low income, increased suicide risk in males more than in females. Being a parent of a young child was a protective factor. The authors reported the finding of family clustering of suicidal behaviour which would not be explained by familial loading of mental disorders. Lastly, living in urban areas decreased the suicide risk for males, but increased the risk for females ([@b65-sjph-54-03-238]). This finding was replicated in the study on suicide risk in relation to the level of urbanicity by Qin ([@b70-sjph-54-03-238]). Agerbo et al. retrieved data from several population and hospital registers of young people who had died by suicide between 1981 and 1997. They found that mental disorders of a young person (measured by psychiatric admission, 15% of suicide cases), and suicide or mental disorder of a parent were the most important risk factor for youth suicide. After controlling for these factors, the importance of socioeconomic factors, such as unemployment, low income, poor schooling, etc., decreased. As such, the authors recommended early recognition and treatment of mental disorders in young people as an important prevention strategy. The study confirmed clinical findings of the importance of mental disorders and suicidal behaviour in first degree relatives as risk factors ([@b58-sjph-54-03-238]). Strengths of these studies ([@b58-sjph-54-03-238], [@b64-sjph-54-03-238], [@b65-sjph-54-03-238]) were a case-control study design based on a huge database, and focused on suicide as the outcome. Important findings were the gender differences regarding risk and protective factors. A shortcoming was that the data on previous suicide attempts as a major risk factor for suicide was not available in the databases. However, as mentioned by Goldney, the population attributable risk (PAR) assessment allows us to weight different risk factors, and may thus help us to target prevention efforts ([@b71-sjph-54-03-238]). Lieb and co-workers performed a four-year follow-up study on maternal transmission of suicidality on the adolescents and young adults born from 1970 to 1981 ([@b62-sjph-54-03-238]). About one-third of the mothers reported lifetime suicidal ideation and 2.3% reported suicide attempts. In comparison, about one-third of the study subjects reported suicidal ideation in their lifetimes and 5% reported suicide attempts. Suicidal ideation and suicide attempts were more common in female offspring than in male (OR = 1.7 and OR = 2.5, respectively). The odds for suicidal ideation and the odds for suicide attempts were higher in the offspring of the mothers who had ever attempted suicide compared to the offspring of the mothers without any suicidality. The results remained after control for psychopathology of the mothers. The authors concluded that familial risk acts similarly in females and males, but that an earlier onset of the first suicide attempt in the offspring tends to be predicted by maternal history of suicide attempts. However, the manifestation of suicidality has to be understood as a complex interplay of multiple factors, with maternal suicidality being just one of the risk factors ([@b62-sjph-54-03-238]). In the family study by Kim et al., the majority (80%) of the suicide completers was diagnosed with a major axis I disorder (alcohol or drug abuse or dependence, depressive disorder) and 56% was diagnosed with an axis II personality disorder, while 4% of the control subjects was diagnosed with the latter. The study found a significant difference in the presence of aggressive behaviour in first-degree relatives of suicide completers (OR = 3.97). Moreover, the relatives of suicide victims were more likely to attempt or complete suicide than the relatives of comparison subjects after controlling for psychopathology. The study findings confirmed the existence of a strong familial component of suicidal behaviour, and that aggressive behaviour with severe suicidal ideation might be implicated in familial transmission of suicidal behaviour ([@b61-sjph-54-03-238]). Waern conducted a pioneer study regarding the family history of suicide among elderly suicides, by means of psychological autopsies and data from health care facilities. The subgroup of elderly suicides with offspring suicide had more substance abuse, and contrary to sibling/parent suicide, offspring suicide could have played a role in the elderly suicide ([@b69-sjph-54-03-238]). This study highlighted a few interesting questions, such as the specificity of offspring suicide, the role of bereavement, and the role of substance abuse in a diathesis for suicidal behaviour. Limitations of the study were the use of a small sample size and non-consideration of attempted suicide in the family history. A quite different approach to the study on population level was provided by Marušič and Farmer ([@b72-sjph-54-03-238]) and Marušič ([@b73-sjph-54-03-238]). They observed a geographical area in a 'J-shaped curve' from Finland in the north of Europe, to Austria and Slovenia in the south. These were the European countries with suicide rates above 20/100,000. A shared genetic background/history would at least partly account for the shared high suicide rates, in interaction with environmental aspects. The authors concluded that prevention in vulnerable populations would require a combination of medical, psychosocial and environmental strategies. 4.3 Molecular Genetic Association Studies ----------------------------------------- More straightforward information on the role of a genetic background of suicidal behaviour could be found in studies of different candidate genes that were proposed to be involved in various behavioural disorders. So far, the most comprehensive study has been performed by Schild et al., who analysed all meta-analyses in the field of single nucleotide polymorphisms (SNPs) and suicidal behaviour published by May 2012 ([@b74-sjph-54-03-238]). Based on their results and on even more recently published meta-analyses the study findings point at several genes that show association with suicidal behaviour and are involved in the serotonergic neurotransmission. Also other genes, whose protein products, like the brain-derived neurothropic factor (BDNF), are closely linked to the serotonergic function. The first and probably the most extensively studied gene in the field of psychiatric genetics is the serotonin transporter gene (*SLC6A4*). Clayden et al. ([@b75-sjph-54-03-238]) conducted the largest meta-analysis of 44-base pairs long insertion (L) or deletion (S) polymorphism in the promoter region of *SCL6A4* (5-HTTLPR), and found an association with attempted suicide (OR = 1.13, 95% CI 1.05--1.21). When studies on completed suicide were analysed, there was no statistically significant association. Another gene, also often studied, is the gene coding for tryptophan hydroxylase 1 (*TPH1*). The protein, TPH1, namely, plays a very important role in the serotonin synthesis, since it catalyses the first and the rate-limiting step. Positive association was, again, determined by Clayden et al. ([@b75-sjph-54-03-238]) for the polymorphism A218C and attempted suicide, but not for completed suicide. In an even more recent study of González-Castro et al. ([@b76-sjph-54-03-238]), the locus A218C/A779C has been associated with suicidal behaviour at a clinical level. The association was confirmed based on fixed effects model, and also separately on Asian and Caucasian populations ([@b76-sjph-54-03-238]). For the neuronal isoform of TPH, designated as TPH2, there are fewer studies interrogating its polymorphisms in association with suicidal behaviour, and only two meta-analyses conducted by González-Castro et al. ([@b76-sjph-54-03-238]) and Choong et al. ([@b77-sjph-54-03-238]). The association of two polymorphisms, rs7305115 and 1386486, with suicidal behaviour has been determined by the latter; however, there was a high heterogeneity among the included studies ([@b77-sjph-54-03-238]). The genetic polymorphisms of the gene of one of the key enzymes for degradation of catecholamines, catechol-o-methyl transferase (COMT), were investigated in few meta-analyses. First results indicated an association of the substitution of amino acid valine to methionine on the position 158 ([@b78-sjph-54-03-238]). However, the latest and even more comprehensive meta-analysis of this polymorphism, and also other polymorphisms, by Clayden et al. ([@b75-sjph-54-03-238]) and Calati et al. ([@b79-sjph-54-03-238]), failed to confirm the association. Nevertheless, they found an association with particular personality traits, like angry reaction and irritability ([@b79-sjph-54-03-238]), which are also important when considering suicidal behaviour. So far, there is only one meta-analysis on the polymorphisms of the monoamine oxidase A gene (*MAOA*), whose protein product deaminates neurotransmitters noradrenaline, adrenaline, dopamine and serotonin. It has been previously associated with the pathogenesis of suicidal behaviour, but the results of the meta-analysis on the most extensively studied polymorphism in the promoter region, uVNTR, could not confirm its implication in suicide attempt, either among psychiatric patients or when stratified for psychiatric diagnosis ([@b80-sjph-54-03-238]). Beside the relatively large number of studies on genes of serotonergic system, other genes are not as extensively investigated. Currently, only studies of an important protein that regulates neuronal growth, plasticity, and also effects mood, cognition, behaviour, and stress response, the neurotrophin BDNF, seem to offer promising results. For the *BDNF* gene, Zai et al. ([@b81-sjph-54-03-238]) in their meta-analysis, reported association of methionine allele on position 66 with suicide (OR = 1.16, 95% CI 1.01--1.32), and also with the history of suicide attempt. The accumulating results of case-control studies of serotonergic as well as of other genes are quite inconclusive, and there are only a few more polymorphisms that were included in meta-analyses. In general, the differences between study designs, particularly in the sample characteristics, contribute substantially to the heterogeneity. It has been determined that suicide attempts and completions should be considered separately, as two phenotypes, and that adjustment for psychiatric comorbidities is necessary ([@b75-sjph-54-03-238]). Beside the hypothesis-driven approach of case-control studies of existing candidate genes, the development of technology now offers the possibility of genome screening. The microarray technology and next generation sequencing are probably the best ways for the determination of SNPs, RNA expression and epigenetic patterns, in order to identify new candidate genes and pathways that may be involved in the suicidal process. One particular way of such hypothesis-generating approach represents genome-wide association studies (GWAS). There are three types of GWAS, namely: SNP-by-SNP, gene-wide GWAS, and pathway/network GWAS, which enable either identification of significant SNP-associations, or selection of most significant SNP(s) that is (are) in the linkage disequilibrium of a gene, or grouping of SNPs that are known to belong to the same pathway and/or proteinprotein interaction networks ([@b82-sjph-54-03-238]). As determined in the review of Sokolowski et al. ([@b82-sjph-54-03-238]), so far, eight GWAS studies, where suicidal behaviour has been included in the analysis, exist. The results show that there are only a few findings that could be genome-wide significant; however, the replication of results needs further attention. It is of particular importance to stress that none of these studies was initially designed to study suicidal behaviour, but psychiatric disorders. The studies differ among each other also in the sample sizes, study designs and definitions, psychiatric diagnoses, analysis methods, and also in the techniques used for the SNPs interrogation ([@b82-sjph-54-03-238]). Due to all these differences, it is not possible to conclude that there are any important already discerned findings in the narrow field of suicide research. However, the potential of GWAS studies is big and more studies are needed. With a growing number of genetic/epigenetic studies of suicidal behaviour, and with the development of modern bioinformatic approaches that would enable disentangling the vast spectrum of accumulated data, one could expect the next step in the understanding of biological aspects of suicidal behaviour. However, the translation of the results into suicide prevention and management still seems rather farfetched. 5 ETHICAL CONSEQUENCES ====================== It is very likely that, in the future, evidence will confirm some genetic risk factors for suicidal behaviour, most probably a small, additive effect. In such case, being able to identify people who may be at a higher risk for suicidal ideation and/or behaviour will have several implications. In particular, as argued by Marušič and McGuffin, and Marušič and Swapp, a number of ethical public policy issues will be raised ([@b24-sjph-54-03-238], [@b83-sjph-54-03-238]). As with any other research in mental health and in genetics, it must be guaranteed that potential subjects in genetic research are asked to provide informed consent. They have to be informed that their participation is voluntary and that they may withdraw at any time. The risks and benefits of the study must be clearly stated, and alternatives to the study should be made available to the participants. It is also important to protect the confidentiality of the data of individuals, both suicidal cases and their controls, from whom the material for molecular genetics research of suicidal behaviour has been taken ([@b24-sjph-54-03-238], [@b83-sjph-54-03-238]). Furthermore, if genetic testing for suicidal behaviour once becomes possible, the question of who (suicidal subjects, their relatives...), when (are results valid enough?), and how (after genetic counselling) to present information will have to be addressed ([@b24-sjph-54-03-238], [@b83-sjph-54-03-238]). Given the recent developments of genetic research in suicidology and neighbouring fields, the importance of a possible impact should not be underestimated. One needs to plan strategically in advance for the challenges that undoubtedly lie ahead. Lastly, the bridge between the study of genetics and suicide researchers will have to be built. One way forward would be to improve the awareness and knowledge of genetics among suicidologists, and vice versa. A review as the present one definitively presents an attempt to build such a bridge. 6 CONCLUSION ============ The overview of the clinical, population and genetic studies clearly shows that there are many differences across the studies, regarding the aims, study groups, methods and outcome measurements. Despite these limitations, there are plausible indications for the existence of a genetic vulnerability to suicidal behaviour that could be transmitted independently from psychiatric or other risk factors. At the aggregate level, surviving relatives, after a suicide, have an increased risk for suicide. The assessment of suicide risk should routinely include the family history of suicidal behaviour. Individual risk increases when there is co-morbidity or interaction with psychiatric problems, environmental stressors, such as sexual abuse, and impulsive aggression. Possibly, there could be also certain gender differences. Currently, it is not yet decided what genes, of the estimated 20,000 that are involved in the functioning of the brain, specifically are involved, but the research tends to focus on the tryptophan hydroxylase, the serotonin transporter and receptor genes ([@b30-sjph-54-03-238], [@b33-sjph-54-03-238]--[@b34-sjph-54-03-238], [@b46-sjph-54-03-238]--[@b47-sjph-54-03-238]). In fact, McGuffin et al. estimated that approximately 43% of the variance of the occurrence of suicide could be attributed to genetic influences ([@b47-sjph-54-03-238]), a figure almost identical with the 45% found in a major twin study regarding suicidal thoughts and behaviour ([@b84-sjph-54-03-238]). However, the presence of genetic vulnerability would be one (of many) distal risk factor only. 'Suppose we take Jeff, a lad of 18 years, and suppose his family background is marked with depression \[let us add also a genetic vulnerability to suicide\]; he is isolated; his pain is unbearable; and he sees no escape from his malaise, but suicide. Suppose that 70% of such young adults, having a similar background, become suicidal. Does that mean that Jeff himself has a 70% chance of killing himself? ...The answer is -- not at all. Jeff is a unique being' ([@b85-sjph-54-03-238]). It's important to keep this in mind for any either aggregate or individual prevention strategy. Morselli, already in 1881, warned against the ecological fallacy, saying that 'statistics cannot presume to learn the true mental state' or the psychic process that precedes suicide ([@b14-sjph-54-03-238]). Given the fact that the vulnerability to suicide is multifactorial, future research should integrate biological, clinical and population aspects to better understand the protective and risk factors in the diathesis. As knowledge increases, important ethical questions, as mentioned above, need to be addressed. But with due impediments, he was appointed as a lecturer at the Viennese Faculty of Philosophy (Austria), since sociology was not yet recognised as a scientific discipline. Masaryk would became the founder, and from 1918, the first president of Czechoslovakia. **CONFLICTS OF INTEREST** The authors declare that no conflicts of interest exist. **FUNDING** Karl Andriessen is supported by a PhD scholarship from the Anika Foundation for Adolescent Depression and Suicide. Alja Videtič Paska is supported by the Slovenian Research Agency Programe Grant no. P1-0104. **ETHICAL APPROVAL** Not applicable. ###### Clinical studies of suicidal probands: the risk of offspring suicidal behaviour. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Author Year Proband Risk Co-transmission ---------------------------------------------- ------ -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Brent et al. ([@b48-sjph-54-03-238]) 2002 Mood-disordered suicide attempters (n=81) vs. mood disordered non-attempters (n=55). Offspring of attempters had a 6-fold increased risk for suicide attempt vs. offspring of non-attempters: 12% vs. 2% (p = 0.008). Mood disorders; Sexual abuse and impulsive aggression. Brent et al. ([@b49-sjph-54-03-238]) 2003 Mood-disordered suicide attempters:\ Attempted suicide risk:\ Impulsive aggression (and not mood disorder) predicted an earlier age of the onset of suicidal behaviour in the offspring of group 1, compared with the offspring of groups 2 and 3. - group 1 - with siblings who attempted suicide (n=19),\ - in group 1: 18.8%,\ - group 2 - with non-attempted suicide siblings (n=73).\ - in group 2: 8.5%,\ Non-suicide attempters with non-suicide attempting siblings (group 3, n=73). - in group 3: 4.2%. (p = 0.0005) Burke et al. ([@b50-sjph-54-03-238]) 2010 Parents (n=255) with lifetime history of mood disorder (major depression, depression not otherwise specified, dysthymic disorder, or bipolar disorder) vs. offspring (n=449) over the age of 10. Offspring (n=212) exposed to suicide attempt were 4 times more likely to report a lifetime suicide attempt compared with unexposed offspring (n=237). Increased odds of suicide attempt. Cheng et al. ([@b51-sjph-54-03-238]) 2000 Suicides (n=113) vs. living community controls (n=226). Independent risk factors:\ Depressive disorders. - major depressive episode (p \< 0.001),\ - substance use disorder (p = 0.05),\ - emotionally unstable disorder (p = 0.034),\ - loss events (p = 0.001),\ - suicidal behaviour in first-degree relatives (p = 0.022) Farmer et al. ([@b52-sjph-54-03-238]) 2001 Depressed subjects (n=108) with suicidal ideation (without attempts) and nearest age siblings, and healthy controls (n=105) and nearest-age siblings. The study did not find a family risk for suicidal ideation. Suicidal ideation was associated with life events, and with levels of neuroticism and psychoticism. Klimes-Dougan et al. ([@b53-sjph-54-03-238]) 2008 Probands with mood disorders aged 17 years and older (n=457). 51.9% of probands had attempted suicide. Significant predictors of suicide attempt in first-degree relatives of mood disordered probands:\ Early onset of depression. Aggressive/impulsive traits may be related to childhood abuse. - mood disorder in first-degree relative (*p* \< 0.0001);\ - proband history of abuse (*p* \< 0.02). Roy ([@b55-sjph-54-03-238]) 2000 Alcohol-dependent subjects (n=333) with and without suicide attempts. Family loading of suicidal behaviour among suicide attempters vs. non-suicide attempters: 15.3% vs. 4.3% (*p* \< 0.001). Not reported. Stenager & Qin ([@b56-sjph-54-03-238]) 2008 Suicide victims under 35 years of age (n=4,142) vs. matched living controls (n=82,840) Personal history of psychiatric hospitalization (OR (males) = 13.5, OR (females) = 38.9); risk for suicide with peak immediately after admission or discharge.\ Parental psychiatric history. Parental history of admission to a psychiatric hospital.\ Risk increased progressively with numbers of psychiatric admission.\ The highest risk for schizophrenia spectrum disorders, affective disorders or substance abuse. Trémeau et al. ([@b57-sjph-54-03-238]) 2005 Three psychiatric populations with: unipolar depression (n=160), schizophrenia (n=160), and opioid- dependence (n=160). Family history of suicide increased the risk of attempted suicide: OR= 2.4 (p = 0.001), with no significant differences between the three groups. Early onset: 60% of the suicide attempts occurred before the age of 25. ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ###### Population-based studies of suicidal probands: the risk of offspring suicidal behaviour. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Author Year Proband Risk Co-transmission -------------------------------------------------- ------ --------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------- Agerbo et al. ([@b58-sjph-54-03-238]) 2002 Young people (\<21 years old) suicides (n=496) vs. community controls (n=24,800). Percentage-attributable risk (PAR) of father suicide (1.1) and admission for mental disorders (3.9).\ Psychiatric disorders PAR of mother suicide (1.4) and mental hospital admission (6.4).\ PAR subject individual admission: 15.0. Brent et al. ([@b59-sjph-54-03-238]) 1998 Adolescent suicides (n=58) vs. community controls (n=55) Increased rates of suicide attempts and completions (and not of suicidal ideation) in first-degree relatives of suicide probands vs. controls after controlling for psychiatric disorders (OR = 4.3). Aggression Goodwin et al. ([@b60-sjph-54-03-238]) 2004 National US representative sample (n=8,098), aged 15--54 years. After controlling for psychiatric disorders, parental suicidal ideation was related with offspring ideation (OR = 1.7), and parental suicide attempt was associated with offspring ideation (OR = 2.0) and offspring attempt (OR = 2.2.). All: *p* \< 0.05. Not reported Kim et al. ([@b61-sjph-54-03-238]) 2005 Male suicides (n=25) and their relatives (n=247) vs. community controls (n=25) and their relatives (n=171). After controlling for psychopathology, relatives of male suicides were more likely to complete or attempt suicide: OR = 10.62 (p \< 0.05).\ Not reported Past or present suicide ideation did not differ in the two groups of relatives, but the level of suicidal ideation was higher among the relatives who committed suicide (p = 0.008). Lieb et al. ([@b62-sjph-54-03-238]) 2005 933 adolescents whose biological mothers had participated in the parent survey. Increased suicidal ideation in the offspring of mothers with suicide attempts vs. mothers without suicidality: OR = 5.1.\ Earlier onset of suicidal behaviour.\ Increased suicide attempts in this offspring: OR = 9.0 (*p* \> 0.05).\ Impulsivity and aggression.\ Differences remained significant after controlling for socio-demographic factors, and psychopathology. Irritabilities in families directed inward or outward, stable over time and generations. Mittendorfer-Rutz et al. ([@b63-sjph-54-03-238]) 2008 Hospitalised suicide attempters (n=14,440) vs. community controls (n=144,400). The strongest independent familial risk factor for youth suicide attempt were siblings' (OR = 3.4), maternal (OR = 2.7) and paternal (OR = 1.9) suicide attempts, and paternal (OR = 1.9) and maternal (OR = 1.8) suicide completion. Familial personality and substance abuse disorders. Qin et al. ([@b64-sjph-54-03-238]) 2002 Suicides between the ages of 9 and 45 (n=4,262) vs. community controls (n=80,238). Family history of suicide (OR = 2.58) and family history of psychiatric disorder (OR = 1.31) independently increased suicide risk in relatives (p \< 0.01).\ Not reported. A suicide risk was increased after a suicide death of a mother, father and sibling, but not after non-suicide deaths. Qin et al. ([@b65-sjph-54-03-238]) 2003 Suicides between the ages of 9 and 103 (n=21,169) vs. population controls (n=423,128). Psychiatric admission increased the suicide risk in males: OR = 28.23, and in females: OR = 77.77 (*p* \< 0.01).\ Protective effect of parenthood for fathers with a child \< 2 years old, and for mothers with a child up to 6 years old. A suicide risk was highest soon after discharge (\<8 days) in males: OR=137.48, and in females: OR = 493.45 (*p* \< 0.01).\ The history of first-degree relative suicide in male subjects: OR = 1.90, and in female subjects: OR = 2.95 (*p* \< 0.01). Runeson ([@b66-sjph-54-03-238]) 1998 58 consecutive suicides, between the ages of 15 and 29. An early onset (\< 20 years old) for males in families with a history of mental disorders vs. families without such a history (p = 0.03).\ Possibly:\ Longer duration of the suicidal process (\> 2 years), and several suicide attempts. - mental disorders,\ - substance abuse,\ - personality traits. Runeson & Åsberg ([@b67-sjph-54-03-238]) 2003 First-degree relatives (n=33,173) of suicide victims (n=8,396) vs. controls who died from other causes (n=7,568) and their first-degree relatives (n=28,945). The history of psychiatric care and of suicide was higher among the relatives sof suicide victims vs. relatives of controls (*p* \< 0.001). Possibly:\ - aggressive/impulsive behaviour,\ - social learning. Tidemalm et al. ([@b68-sjph-54-03-238]) 2011 Suicide among family members of suicides (n=83,951) vs. suicides among relatives in population controls Patterns of familial aggregation of suicide among relatives to suicide decedents suggested genetic influences on suicide risk; the risk among full siblings (OR = 3.1, 95% CI 2.8--3.5,), maternal half-siblings (OR = 1.7, 95% CI 1.1--2.7), despite similar environmental exposure. Shared (familial) environmental influences were also indicated; siblings to suicide decedents had a higher risk than offspring (OR = 3.1, 95% CI 2.8--3.5 vs. OR = 2.0, 95% CI 1.9--2.2. Not reported Waern ([@b69-sjph-54-03-238]) 2005 Elderly suicide victims (\> 65 years old) with (n=13) and without (n=72) family member suicide. Elderly with family member suicide had more previous suicidal behaviour: 100% vs. 65% (*p* \< 0.01). All elderly suicides with offspring suicide had a substance use disorder (correlation). -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Mangold Confirms B&W Version of 'Logan' Coming to Theaters in May Good news, Wolverine fans! Director James Mangold has confirmed via Twitter recently that there will be a special black & white version of the Wolverine movie Logan and it will be shown in theaters for one night only. According to Mangold, the B&W version will be shown on May 16th (Tuesday) in cinemas only in the US. In my interview with James Mangold from earlier this year, we talked about a B&W version. At the time (right after the premiere of the film at the Berlin Film Festival), he said he wouldn't have originally made it in B&W for financial reasons, but when asked about creating a special version (like with Mad Max: Fury Road) he had only started thinking about it. "We could [do that]. That might be fun. I haven't had a chance [to think about it yet], I'd be curious about it." Well, now it's official, and it will be playing on the big screen. Here's the tweets from Mangold (@mang0ld) about the B&W release of Logan, along with a few replies: Suggestion. Hard core B&W loving LOGAN fans should not make any plans on the evening of May 16th. — Mangold (@mang0ld) April 28, 2017 @KarlAlden @Aldo7heApache Won't be on a TV. And the answer is no. To make a great B&W version of a film, the whole thing's gotta be regraded & timed shot by shot. — Mangold (@mang0ld) April 28, 2017 @AlleynLemarr @KarlAlden @Aldo7heApache Yes, but it will be on big screens on the 16th. — Mangold (@mang0ld) April 28, 2017 That second tweet is interesting, because in my interview, Mangold originally said fans could just use their TV. "I'm also mystified when fans seem unable to find the chroma button on their television. Obviously we can time the color and shift. You can use color filters in a sense to shift the blacks and enrich them and whatever. But the quest for fans to have new products to buy… you can already watch it in black & white." Indeed, but now he has gone on the record to say the version they've created for release is properly color timed and shifted and updated for a nicer black & white presentation. This all originated because the very first photos Mangold put out on Twitter while filming were black & white shots (most likely taken on a still camera) and many of us originally wondered if it was being made in B&W. Obviously not (as we now know), but still. Over a year later and here we are, now actually getting a B&W version of Logan in theaters soon. Update! The event has been officially announced as "Logan Noir" - for more info visit Alamo Drafthouse: Who's planning to see this? Anyone excited to see the B&W version? More info (including exact theaters) should be out soon. Follow @mang0ld for news - he tweets often and will usually reply if you ask a question.
Leonora (singer) Leonora Colmor Jepsen (born 3 October 1998), also known simply as Leonora, is a Danish singer and former competitive figure skater. As a figure skater, she was a two-time national junior champion in singles in 2015, 2016 and represented her country at the 2016 World Junior Championships. As a singer, she won the 2019 Dansk Melodi Grand Prix and represented Denmark at that year's Eurovision Song Contest in Tel Aviv, finishing 12th with 120 points. Early life Born and raised in Hellerup to the north of Copenhagen where she still lives, Leonora received her high school diploma from Gammel Hellerup Gymnasium. She has written many songs of her own, performing in cafés, libraries and small school concerts. Career As a figure skater, she competed in the ISU World Junior Championships in 2016 and in the ISU JGP Riga Cup 2015. In December 2016, Leonora and her brother Linus were gold medallists at the Danish figure-skating championships. She had previously been Denmark's junior champion skating solo. She now no longer competes but works as a figure-skating trainer and choreographer. She represented in the Eurovision Song Contest 2019 in Tel Aviv with the song "Love Is Forever". She won Danish Melodi Grand Prix 2019 after gaining 42% of the public and jury vote in the superfinal, beating favorites Julie & Nina, and Sigmund. Her song "Love Is Forever", written by Lise Cabble, Melanie Wehbe and Emil Lei, combines four different languages: English, Danish, German and French. Competitive highlights JGP: Junior Grand Prix Discography Singles References External links Leonora Jepsen on Instagram Category:Danish female singers Category:1998 births Category:Living people Category:Dansk Melodi Grand Prix winners Category:People from Gentofte Municipality Category:Danish pop singers Category:Danish figure skaters Category:Danish female single skaters Category:Eurovision Song Contest entrants of 2019
Q: RSPEC fails, doesn't initialize factory In my app, project has_many another_project. I have the following test: describe 'some test' do let(:project) { create(:live_project) } let(:another_project) { create(:another_project, :project => project ) } # before do # another_project # end it 'does something' do expect ... end end It fails unless the commented code runs. This seems strange because the line with another_project doesn't do anything. It seems as if the factory isn't properly initialized until something points to it. What could be the issue that makes it fail/work with/without those commented lines? A: It seems as if the factory isn't being properly initialised until something points to it. That's a feature. Lazy initialization, it's called. If a thing is not used, why do the work of creating it? Either use a let! instead of let, for things you want to always be created. Or create them in a before block.
################################################################################ # # glibmm # ################################################################################ GLIBMM_VERSION_MAJOR = 2.36 GLIBMM_VERSION = $(GLIBMM_VERSION_MAJOR).1 GLIBMM_LICENSE = LGPLv2.1+ (library), GPLv2+ (tools) GLIBMM_LICENSE_FILES = COPYING COPYING.tools GLIBMM_SOURCE = glibmm-$(GLIBMM_VERSION).tar.xz GLIBMM_SITE = http://ftp.gnome.org/pub/gnome/sources/glibmm/$(GLIBMM_VERSION_MAJOR) GLIBMM_INSTALL_STAGING = YES GLIBMM_DEPENDENCIES = libglib2 libsigc host-pkgconf $(eval $(autotools-package))
Changing patterns of brain activation during maze learning. Recent research has found that patterns of brain activation involving the frontal cortex during novel task performance change dramatically following practice and repeat performance. Evidence for differential left vs. right frontal lobe activation, respectively, during episodic memory encoding and retrieval has also been reported. To examine these potentially related issues regional cerebral blood flow (rCBF) was measured in 15 normal volunteers using positron emission tomography (PET) during the naive and practiced performance of a maze task paradigm. SPM analysis indicated a largely right-sided, frontal lobe activation during naive performance. Following training and practice, performance of the same maze task elicited a more posterior pattern of rCBF activation involving posterior cingulate and precuneus. The change in the pattern of rCBF activation between novel and practiced task conditions agrees with results found in previous studies using repeat task methodology, and indicates that the neural circuitry required for encoding novel task information differs from that required when the same task has become familiar and information is being recalled. The right-sided preponderance of activation during naive performance may relate to task novelty and the spatially-based nature of the stimuli, whereas posterior areas activated during repeat performance are those previously found to be associated with visuospatial memory recall. Activation of these areas, however, does not agree with previously reported findings of left-sided activation during verbal episodic memory encoding and right-sided activation during retrieval, suggesting different neural substrates for verbal and visuospatial processing within memory.
astraphobia PRONUNCIATION: (as-truh-FO-bee-uh) MEANING: noun: An abnormal fear of lightning and thunder. ETYMOLOGY: From Greek astrape (lightning). Ultimately from the Indo-European root ster- (star) that is also the source of star, asterisk, asteroid, astrology, disaster, stellar, constellation, Persian sitareh (star), and the names Stella and Esther. NOTES: Also known as astrapophobia and brontophobia (from Greek bronte-, thunder, which also gave us brontosaurus). USAGE: "In the USA, it is estimated around 10 per cent of people suffer from astraphobia to some degree." Don White; Weatherwatch; Daily Telegraph (Sydney, Australia); Dec 11, 2001. Any advertisement in public space that gives you no choice whether you see it or not is yours. It belongs to you. It's yours to take, re-arrange, and re-use. Asking for permission is like asking to keep a rock someone just threw at your head. -Banksy, street artist (b. 1974)
Q: How many 10 letter 'words' can be made with no repeated letters and at least 8 consonants? Need a little bit of help with this one. How many 10 letter 'words' can be constructed which have no repeated letters and at least 8 consonants? where 'word' is defined as any combination of the 26 letters of the english alphabet, and by consonant, (obviously) a letter of the english alphabet that are not either a,i,u,e, or o. This is where I am at: We need to choose the positions for the 8 consonants which is $c(10,8)$ Then we need to choose the 8 consonants which I think is $p(21,8)$? (not sure about this one) Choose the remaining 2 letters: We have already used 8 letters so we only have 18 letters to choose from so $p(18, 2)$ What else needs to be calculated? Do we need to choose the position of the remaining 2 letters? A: I think the best way would be to separate it into 3 non-overlapped groups: Words with exactly 8 consonants Words with exactly 9 consonants Words with exactly 10 consonants Logic would be similar with Arturo. Arvin comments wouldn't work, because you count same words several time. Once when the consonant is one of the 8, and again, when it happens to be one of the two remaining letters. For the 8 consonants: Select 8 positions - C(10,8) Select the 8 consonants out of the 21, in order - P(21,8) Select the 2 vowels in order - P(5,2) So answer is: c(10,8) * p(21,8) * p(5,2) = (10!/(2!*8!)) * (21!/13!) * (5!/3!) = 45 * (21!/13!) * 20 Similarly, do the same for 9 and 10: 9 consonants: C(10,9) * P(21,9) * P(5,1) = 10 * (21!/12!) * 5 = 50 * (21!/12!) 10 consonants: C(10,10) * P(21,10) * P(5,0) = (21!/11!) Sum the 3 answers. A: Your argument has a couple of problems: You don't specify where the last two letters selected go; you pick the two letters, but you never place them; placing them in different order gives you different solution. Likewise, you never say how you will distribute the 8 consonants you pick; you select the 8 locations, but you don't say which letter goes where. Finally, your solution counts some words too many times. Say you first select the eight consonants b,c,d,f,g,h,j,k and the first eight positions for them (in that order). Then you select two more letters, say m,n, and place them in order in positions nine and ten. You will "count" this word again if your eight selected consonants are b,c,d,f,g,h,m,n, the eight positions selected are positions one through six, nine, and ten (in that order); and then the other two letters you select are j and k and you place them in positions seven and eight. You will count this word several times through your process. So: perhaps it's better if we start by counting how many 10 letter strings have exactly eight consonants and no repeated letters. My recommendation: First select the eight positions that will contain the consonants. Then select the consonants and place them in those positions in order (that is, which consonant you select first matters, because that will go in the leftmost selected position). Finally, select the two vowels that will fill the remaining two positions, again in order. Then count how many of your strings have exactly 9 consonants in a similar manner; then how many have all letters consonants (that will be the simplest one).
Demographic and temporal trends of hexabromocyclododecanes (HBCDD) in an Australian population. Hexabromocyclododecanes (HBCDD) were measured in 67 pooled serum samples collected between 2002 and 2015 in South East Queensland, Australia. These data are the first report of HBCDD in Australian human serum. Temporal and demographic (age and gender) trends were investigated. HBCDD were detected in measurable concentrations in 69% of samples. The average ∑HBCDD concentration was 3.1ng/g lipid, whilst the range was <0.5 to 36ng/g lipid. α-HBCDD was the dominant stereoisomer making up an average of 60% of ∑HBCDD. The remainder was made up by γ-HBCDD. In contrast to another group of brominated flame retardants (BFRs, (polybrominated diphenyl ethers (PBDEs)), HBCDD were found in the lowest concentrations in pools from children aged 0-4 years. This could be attributed to differences in exposure, usage, and/ or the much lower half-life of HBCDD in the human body compared to PBDEs. HBCDD concentrations appear to be significantly higher in females than in males, however the reasons for this are unclear.
Another Million Subscribers Cut the Pay TV Cord Last Quarter Third quarter earnings data indicates that a million more US pay TV subscribers cut the TV cord last quarter. Only five of the seven biggest pay TV providers have released their third quarter subscriber data, but collectively these companies saw a net loss of 632,000 pay TV subscribers during the period (385,000 for AT&T and DirecTV, 125,000 for Comcast, 104,000 for Charter, 18.000 for Verizon FiOS TV). Dish has yet to report its own cord cutting tallies, but the company is again expected to be among the hardest hit due to a high level of retransmission fee feuds and a lack of broadband bundles. Also yet to report is Altice Communications, which now owns Optimum (formerly Cablevision) and Suddenlink. News Jump Charter Relaunches Free 60-day Internet And Wi-Fi Offer; NCTA: FCC Should Stick With 25/3 Speed Threshold; + more news Comcast Shuts Off Internet for Subs Who Were Sold Service Illegally; AT&T, Verizon Team To Stop T-Mobile 5G; + more news California Defends Its Net Neutrality Law; AT&T's Traffic Up 20% Despite Data Traffic Actually Being Down; + more news Are The Comcast-Charter X1 Talks Dead In The Water?; AT&T May Offer Phone Plans With Ads For Discounts; + more news Europe's Top Court: Net Neutrality Rules Bar Zero Rating; ViacomCBS To Rebrand CBS All Access As Paramount+; + more news Verizon To Buy Reseller TracFone For $7B; 5G Not The Competitive Threat To Cable Many Thought It Would Be; + more news MS.Wants Records From AT&T On $300M Project; Google Fiber Outages In Austin, Houston, Other Texan Cities; + more news States With The Biggest Decreases In Speed; AT&T Hopes You'll Forget Its Fight Against Accurate Maps; + more news AT&T's CEO Has A Familiar $olution To US Broadband Woes; EarthLink Files Suit Against Charter; + more news 5G Doesn't Live Up To Hype, AT&T's 5G Slower Than Its 4G; Cord-Cutting Now In 37% of Broadband Households; + more news ---------------------- this week last week most discussed Most recommended from 33 comments adam1991 join:2012-06-16 united state 12 recommendations adam1991 Member Do the math, ESPN A million subs, $7/month...that's $7 million/month less revenue. That's $94 million/year less revenue. JUST AS A RESULT OF THE LAST QUARTER. Imagine extrapolating that to a whole year. Is ESPN losing $350 million to $400 million per year in revenue lately? I can't *wait* to see that particular trickle-down effect. Roadkill Premium Member join:2008-06-17 united state 12 recommendations Roadkill Premium Member Another million What will be the lesson learned by pay TV operators? Will they bend the knee and look for a better way to operate, or will the ISP use caps and charge more? Pay TV has long been a cash cow with a few hundred trash channels and 10 or less channels of real interest. People want to pay for what they watch instead of ever increasing rates for sports and endless copy-cat Reality TV. Trimline Premium Member join:2004-10-24 Windermere, FL 114.5 12.1 9 recommendations Trimline Premium Member You Know It Is Getting Bad When Burger King Antenna TV You know it is getting bad when Burger King cuts the cord and goes antenna TV. dickie757 join:2013-04-30 Suffolk, VA 1 edit 2 recommendations dickie757 Member Voting with your wallet Voting with your wallet It would be great to be able to do this with local government. Hold back tax dollars/put into escrow if the elected/appointed screw with our already paid for infrastructure. Or receive subsidies like the corporealations... I vote, but I will never get back the tax dollars that go to injust decisions.
Cutaneous T-cell lymphoma sparing resolving dermatomal herpes zoster lesions: an unusual phenomenon and implications for pathophysiology. Exclusion of cutaneous T-cell lymphoma (CTCL) by another dermatosis has not been reported. The mechanism for the epidermotropism of helper T lymphocytes in this indolent malignancy is not known. Although there is evidence that Langerhans cells (LC) play a role in the epidermotropism of lymphocytes in CTCL, clinical or in vivo support is lacking. We describe a patient with CTCL who developed herpes zoster involving the left T8 dermatome. When his CTCL became widespread after the herpes zoster healed, the previously affected areas of herpes zoster and their periphery were clinically free of lymphoma. Immunohistochemical analysis of a clinically uninvolved patch revealed absence of CD1a(+) cells in the epidermis, consistent with loss of LC in the areas spared by CTCL. There was no loss of LC in areas affected by CTCL. This is an unusual inhibition of CTCL by a prior viral infection. The loss of LC in the clinically spared skin suggests a role for LC in the epidermotropism of lymphocytes in CTCL.
President Trump Donald John TrumpBubba Wallace to be driver of Michael Jordan, Denny Hamlin NASCAR team Graham: GOP will confirm Trump's Supreme Court nominee before the election Southwest Airlines, unions call for six-month extension of government aid MORE's outgoing national security adviser H.R. McMaster said the U.S. has "failed to impose sufficient costs" on Russia, which has resulted in the Kremlin becoming more emboldened. "We have failed to impose sufficient costs" on Russia, McMaster said at an Atlantic Council event with Baltic leaders on Tuesday. "The Kremlin's confidence is growing," he continued. "Russia has used old and new forms of aggression to undermine our open societies." ADVERTISEMENT The comments marked McMaster's first remarks since Trump announced he would be replacing him with former U.S. Ambassador to the United Nations John Bolton. McMaster did offer praise for the Trump administration's handling of Russian aggression, including its response to a nerve-agent attack on a former Russian spy in the U.K. last month. "In the United States, President Trump ordered the removal of dozens of Russian intelligence officers and the closure of the Russian consulate in Seattle. This action will also help protect our democratic institutions and processes as these Russian officers orchestrate Russia's sustained campaign of propaganda, disinformation and political subversion," he said. Trump issued his strongest action against Russia last week when he ordered the expulsion of 60 Russian diplomats in the U.S. in the wake of the U.K. nerve-agent attack. The president on Tuesday said during a press conference that he has been tougher on Russia than any of his predecessors, despite facing frequent criticism over his relationship with Russian President Vladimir Putin. “Ideally we want to get along with Russia. Getting along with Russia is a good thing, not a bad thing. Maybe we will, maybe we won’t,” Trump said. “Probably no one has been tougher to Russia than Donald Trump."