text
stringlengths
8
5.77M
#include "kvlAverageAtlasMeshPositionCostAndGradientCalculator.h" #include "kvlAtlasMeshCollection.h" namespace kvl { // // // AverageAtlasMeshPositionCostAndGradientCalculator ::AverageAtlasMeshPositionCostAndGradientCalculator() { } // // // AverageAtlasMeshPositionCostAndGradientCalculator ::~AverageAtlasMeshPositionCostAndGradientCalculator() { } // // // void AverageAtlasMeshPositionCostAndGradientCalculator ::Rasterize( const AtlasMesh* mesh ) { // //std::cout << "Starting rasterization" << std::endl; // Sanity check if ( ( m_Positions.size() == 0 ) || ( m_Ks.size() != m_Positions.size() ) ) { itkExceptionMacro( << "No positions set or Ks don't not same number as positions" ); } // Initialize from a clean slate //std::cout << "Initializing" << std::endl; m_MinLogLikelihoodTimesPrior = 0; m_PositionGradient = AtlasPositionGradientContainerType::New(); AtlasPositionGradientType zeroEntry( 0.0f ); for ( AtlasMesh::PointsContainer::ConstIterator pointIt = mesh->GetPoints()->Begin(); pointIt != mesh->GetPoints()->End(); ++pointIt ) { m_PositionGradient->InsertElement( pointIt.Index(), zeroEntry ); } // For each positon/K pair, generate a mesh of which we're only ever going to change // a pointer to its position container. For efficiency purposes we'll cache these since // computing each mesh's ReferenceTetrahedronInfo's (cellData) takes some time if ( m_CachedInternalMeshes.size() == 0 ) { //std::cout << "Building internal meshes" << std::endl; for ( int meshNumber = 0; meshNumber < m_Positions.size(); meshNumber++ ) { //std::cout << " meshNumber: " << meshNumber << std::endl; AtlasMeshCollection::Pointer helper = AtlasMeshCollection::New(); helper->GenerateFromSingleMesh( const_cast< AtlasMesh* >( mesh ), 0, m_Ks[ meshNumber ] ); helper->SetReferencePosition( const_cast< AtlasMesh::PointsContainer* >( m_Positions[ meshNumber ].GetPointer() ) ); m_CachedInternalMeshes.push_back( const_cast< AtlasMesh* >( helper->GetReferenceMesh().GetPointer() ) ); } } // Now loop over all meshes, each time setting the mesh's position to the current one, and then computing the cost // and gradient of only the deformation prior //std::cout << "Rasterizing internal meshes" << std::endl; for ( int meshNumber = 0; meshNumber < m_CachedInternalMeshes.size(); meshNumber++ ) { //std::cout << " meshNumber: " << meshNumber << std::endl; // Set up mesh to rasterize AtlasMesh::Pointer internalMesh = m_CachedInternalMeshes[ meshNumber ]; internalMesh->SetPoints( const_cast< AtlasMesh::PointsContainer* >( mesh->GetPoints() ) ); // Now do the work AtlasMeshPositionCostAndGradientCalculator::Pointer calculator = AtlasMeshPositionCostAndGradientCalculator::New(); calculator->Rasterize( internalMesh ); // If successful, add contribution to cost const double minLogLikelihoodContribution = calculator->GetMinLogLikelihoodTimesPrior(); if ( minLogLikelihoodContribution == itk::NumericTraits< double >::max() ) { // Problem with this mesh - abort //std::cout << "Aborting" << std::endl; m_MinLogLikelihoodTimesPrior = itk::NumericTraits< double >::max(); return; } else { m_MinLogLikelihoodTimesPrior += minLogLikelihoodContribution; } // Also add contribution to gradient AtlasPositionGradientContainerType::ConstIterator sourceIt = calculator->GetPositionGradient()->Begin(); AtlasPositionGradientContainerType::Iterator targetIt = m_PositionGradient->Begin(); for ( ; targetIt != m_PositionGradient->End(); ++sourceIt, ++targetIt ) { targetIt.Value() += sourceIt.Value(); } } // End loop over meshes // Make sure boundary conditions are respected this->ImposeBoundaryCondition( mesh ); } } // end namespace kvl
/*---------------------------------------------------------------------------*\ ========= | \\ / F ield | OpenFOAM: The Open Source CFD Toolbox \\ / O peration | \\ / A nd | Copyright (C) 2011-2013 OpenFOAM Foundation \\/ M anipulation | ------------------------------------------------------------------------------- License This file is part of OpenFOAM. OpenFOAM is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. OpenFOAM is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with OpenFOAM. If not, see <http://www.gnu.org/licenses/>. Application surfacePointMerge Description Merges points on surface if they are within absolute distance. Since absolute distance use with care! \*---------------------------------------------------------------------------*/ #include "triSurface.H" #include "triSurfaceTools.H" #include "argList.H" #include "OFstream.H" #include "boundBox.H" using namespace Foam; // * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * // int main(int argc, char *argv[]) { argList::noParallel(); argList::validArgs.append("surfaceFile"); argList::validArgs.append("merge distance"); argList::validArgs.append("output surfaceFile"); argList args(argc, argv); const fileName surfFileName = args[1]; const scalar mergeTol = args.argRead<scalar>(2); const fileName outFileName = args[3]; Info<< "Reading surface from " << surfFileName << " ..." << endl; Info<< "Merging points within " << mergeTol << " metre." << endl; triSurface surf1(surfFileName); Info<< "Original surface:" << endl; surf1.writeStats(Info); triSurface cleanSurf(surf1); while (true) { label nOldVert = cleanSurf.nPoints(); cleanSurf = triSurfaceTools::mergePoints(cleanSurf, mergeTol); Info<< "After merging points:" << endl; cleanSurf.writeStats(Info); if (nOldVert == cleanSurf.nPoints()) { break; } } cleanSurf.write(outFileName); Info<< "End\n" << endl; return 0; } // ************************************************************************* //
Japan gave $500k for -post Yolanda relief The Japanese government and the International Labor Organizaton (ILO) have allocated $500,000 to help support the post-relief response in several parts of Visayas, which has been severaly battered by Typhoon Yolanda earlier this month. The Ministry of Health, Labour and Welfare of Japan has provided the funds under the ILO/Japan Fund for Building Social Safety Nets in Asia and the Pacific. The fund is to be used to support the recovery from natural disaster, the statement from ILO said. “The ILO is grateful to the Government of Japan for this valuable financial contribution, which will be used to support the affected population who lost their jobs and source of livelihood due to Typhoon Haiyan,” Yoshiteru Uramoto, ILO assistant director-general and regional director for Asia and the Pacific said. “The ILO estimates that some 5.2 million workers have seen their livelihoods destroyed or disrupted. Among these, 2.3 million were already in vulnerable employment and living in poverty before typhoon Haiyan struck. This funding will help ensure occupational safety and skills training for workers involved in recovery activities.” Typhoon Yolanda swept through the Central Philippines on November 8, killing more than 5,000 and causing damage in 36 provinces across nine regions. Over 13 million people have had their lives turned upside down and over one million houses were either destroyed or severely damaged. The ILO/Japan Fund for Building Social Safety Nets (SSN) in Asia and the Pacific was set up following the signing of an agreement between the ILO and the Ministry of Health, Labor and Welfare in June 2011. The SSN Fund aims to support countries in Asia and the Pacific to build and strengthen the basis of social safety nets through capacity building and networking, enhance activities of trade unions and employers’ organizations and promote disaster relief. BERNICE CAMILLE V. BAUZON
Disable Welfare Trust of India Disable Welfare Trust of India (DWTI) is an Indian non governmental organisation based in Surat, Gujarat, India, working in the areas of education, environment and the empowerment of women. Profile The Disable Welfare Trust of India was formed in 1991 by Kanubhai Hasmukhbhai Tailor, a physically disabled person who suffered permanent disability to his legs due to poliomyelitis he contracted at the age of eleven. The primary aim of the organisation was to provide education and vocational training to the disabled children and work for their rehabilitation. The activities during the initial years were limited due to paucity of funds but Tailor conducted a survey where he identified 1280 disabled children. A chance meeting, in 1997, with the then Police Commissioner of Surat, P. C. Pande and S. R. Rao, the Municipal Commissioner, helped the trust to get 10 rooms in a primary school. Here, Kanubhai started a school, on 1 July 1957, with the financial assistance of 51,000 from Pande. Starting with four children, the trust grew to a student strength of 118 by the year end, and provided free transportation, educational aids, lunch and physiotherapy treatment to them. In 2000, the school moved to a larger facility with 18 rooms given by the Municipal corporation at Khatodara, Surat and the student strength grew to 400. Later, on a free land measuring 4500 square yards, a new facility was constructed in 2006, the foundation stone laid by the then Vice President of India, Bhairon Singh Shekhawat and the construction completed with the assistance of Reliance Industries and Larsen and Toubro. The trust claims that the project is a success with many students going on to complete various professional degrees in management, engineering and medicine. The Trust is constructing a new facility to accommodate 1000 children and has plans to set up a hospital for corrective surgeries for disabilities. It also has a scheme to guide physically handicapped people from the villages for availing loans, from 150,000 to 500,000 for setting up own businesses from the Handicapped Finance and Development Corporation, a government run institution. The main source of funding is through donations for which the government has extended tax exemption facility. See also Kanubhai Hasmukhbhai Tailor References External links Category:Charities based in India Category:Disability organisations based in India Category:1991 establishments in India Category:Organizations established in 1991 Category:Organisations based in Gujarat
On the Way to School Quietly Reveals the Heroic Journeys Kids Take to Get to Class February 4, 2015 It’s not surprising to learn that in underdeveloped countries, kids whose parents are able to provide them with an education often have arduous daily treks between home and school. But it’s quite a different thing to see it, and in the documentary On the Way to School, director Pascal Plisson intercuts the stories of four groups of children living in Kenya, Morocco, Patagonia, and Bengal as they leave home in the morning laden with books, bound for their schools. Jackson Saikong and his sister Salome travel fifteen kilometers each day across Kenyan plainlands across which giraffes, gazelles, and elephants roam. Moroccan Zahira travels twenty-two kilometers once a week to her boarding school with two of her classmates, a live hen in her bag. Eleven-year-old Carlos in Patagonia rides horseback with his sister across eighteen kilometers each day. And Samuel, a Bengalese kid with polio, is pulled in his wheelchair four kilometers to school by his two brothers. Plisson’s crew opts against interview segments until the film’s final moments, instead unobtrusively observing the encounters, challenges, and very real dangers the children confront on the road and in the wilderness. Jackson and Salome attempt to skirt a family of elephants that wanders perilously close to their path. Samuel’s wheelchair loses a tire, and his small brothers have to find a repair shop. As Carlos and his sister descend from a harrowing mountain pass into Patagonian lowlands, they speed their horse to a gallop as cinematically heroic music pulses; the film quietly reveals these four small stories as epically heroic and timeless journeys.
Rishtey Cineplex to launch in UK on 29 Sep as FTA MUMBAI: Viacom18 will launch its Hindi movie channel Rishtey Cineplex in the UK on 29 September. Distributed by IndiaCast Media Distribution, the channel will be available on free-to-air (FTA) basis on Sky Network on channel #797. This will be the third channel from Viacom18 portfolio to be launched in the UK. Rishtey Cineplex, an extension of the Rishtey brand, will also launch in North America (US and Canada) in October. The channel will showcase the best from Viacom18’s library of films as well as newly acquired movies from across genres including dramas, romance, action, comedy and much more. The channel will air audience favourite films like ‘Bajirao Mastani’, ‘Airlift’, ‘Pyaar Ka Punchnama 2’, ‘Kapoor & Sons’, ‘Ki & Ka’ and upcoming films like ‘Force 2’ and ‘Ae Dil Hai Mushkil’. Viacom18 group CEO Sudhanshu Vats said, “The Indian film industry has been growing in size, both in terms of reach and revenue, to have become the largest producer of movies in the world today. Our cinema, led by Bollywood movies, continues to increase its pull with the Indian diaspora abroad. Rishtey Cineplex, Viacom18’s first premium Hindi movie channel, has curated a repertoire of titles from across cinemas of India. It is our endeavour, as a future-ready organisation, to take Indian cinema, as a holistic entertainment package, to our loyal viewers in Europe and North America, allowing us to further strengthen our presence in the regions.” Viacom18 CEO of Hindi mass entertainment Raj Nayak said, “Rishtey Cineplex has every ingredient that a movie buff would want to be engaged with. Global audiences today celebrate Indian films, and with the channel’s launch in Europe and North America, we are bringing this celebration to their living rooms. Indian films now have a universal appeal, as a result of which they taste tremendous success in international markets. The trend in consumption has been extremely encouraging, and we are certain that the viewers will lap up our content offering with great zeal.” Rishtey Cineplex promises a host of properties like the morning, matinee, primetime and weekend line-ups consisting of blockbuster Hindi films and South Indian dubbed content. Along with films, the channel will showcase many interesting concepts including vignettes from various film festivals, behind-the-scenes trivia and coverage of exclusive red carpet
<?xml version="1.0" encoding="UTF-8"?> <Scheme LastUpgradeVersion = "0600" version = "1.3"> <BuildAction parallelizeBuildables = "YES" buildImplicitDependencies = "YES"> <BuildActionEntries> <BuildActionEntry buildForTesting = "YES" buildForRunning = "YES" buildForProfiling = "YES" buildForArchiving = "YES" buildForAnalyzing = "YES"> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9D496489195C8BBD0012707E" BuildableName = "Displaying Images with UIImageView.app" BlueprintName = "Displaying Images with UIImageView" ReferencedContainer = "container:Displaying Images with UIImageView.xcodeproj"> </BuildableReference> </BuildActionEntry> </BuildActionEntries> </BuildAction> <TestAction selectedDebuggerIdentifier = "Xcode.DebuggerFoundation.Debugger.LLDB" selectedLauncherIdentifier = "Xcode.DebuggerFoundation.Launcher.LLDB" shouldUseLaunchSchemeArgsEnv = "YES" buildConfiguration = "Debug"> <Testables> <TestableReference skipped = "NO"> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9D49649B195C8BBD0012707E" BuildableName = "Displaying Images with UIImageViewTests.xctest" BlueprintName = "Displaying Images with UIImageViewTests" ReferencedContainer = "container:Displaying Images with UIImageView.xcodeproj"> </BuildableReference> </TestableReference> </Testables> <MacroExpansion> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9D496489195C8BBD0012707E" BuildableName = "Displaying Images with UIImageView.app" BlueprintName = "Displaying Images with UIImageView" ReferencedContainer = "container:Displaying Images with UIImageView.xcodeproj"> </BuildableReference> </MacroExpansion> </TestAction> <LaunchAction selectedDebuggerIdentifier = "Xcode.DebuggerFoundation.Debugger.LLDB" selectedLauncherIdentifier = "Xcode.DebuggerFoundation.Launcher.LLDB" launchStyle = "0" useCustomWorkingDirectory = "NO" buildConfiguration = "Debug" ignoresPersistentStateOnLaunch = "NO" debugDocumentVersioning = "YES" allowLocationSimulation = "YES"> <BuildableProductRunnable> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9D496489195C8BBD0012707E" BuildableName = "Displaying Images with UIImageView.app" BlueprintName = "Displaying Images with UIImageView" ReferencedContainer = "container:Displaying Images with UIImageView.xcodeproj"> </BuildableReference> </BuildableProductRunnable> <AdditionalOptions> </AdditionalOptions> </LaunchAction> <ProfileAction shouldUseLaunchSchemeArgsEnv = "YES" savedToolIdentifier = "" useCustomWorkingDirectory = "NO" buildConfiguration = "Release" debugDocumentVersioning = "YES"> <BuildableProductRunnable> <BuildableReference BuildableIdentifier = "primary" BlueprintIdentifier = "9D496489195C8BBD0012707E" BuildableName = "Displaying Images with UIImageView.app" BlueprintName = "Displaying Images with UIImageView" ReferencedContainer = "container:Displaying Images with UIImageView.xcodeproj"> </BuildableReference> </BuildableProductRunnable> </ProfileAction> <AnalyzeAction buildConfiguration = "Debug"> </AnalyzeAction> <ArchiveAction buildConfiguration = "Release" revealArchiveInOrganizer = "YES"> </ArchiveAction> </Scheme>
Q: How to make the text inside the facebook like button white? I am using the facebook like button on a page with a red gradient background. I would like the text inside this share button to be white not the dark blue that it currently is (the "be the first of your friends to like this" text): I'm not sure how to go about this though. This is the code used to generate the button: <div class="fb-like" data-href="<current page's url here>" data-send="true" data-width="360" data-show-faces="false" data-font="arial"></div> The code generated according to firebug is this: <div data-font="arial" data-show-faces="false" data-width="360" data-send="true" data-href="<current page's url here>" class="fb-like fb_edge_widget_with_comment fb_iframe_widget"> <span> <iframe scrolling="no" id="f29d650aad23b3a" name="fc2a4f4faf238e" style="border: medium none; overflow: hidden; height: 29px; width: 360px;" title="Like this content on Facebook." class="fb_ltr" src="http://www.facebook.com/plugins/like.php?api_key=271291652883209&amp;channel_url=https%3A%2F%2Fs-static.ak.fbcdn.net%2Fconnect%2Fxd_proxy.php%3Fversion%3D3%23cb%3Df28525cd54eb78%26origin%3Dhttp%253A%252F%252F<current page's url here>&amp;extended_social_context=false&amp;font=arial&amp;href=http%3A%2F%2F<current page's url here>%2Ftag%2Fzach-galifianakis&amp;layout=standard&amp;locale=en_US&amp;node_type=link&amp;sdk=joey&amp;send=true&amp;show_faces=false&amp;width=360"></iframe> </span> </div> Any ideas how to make that text white? A: According to Facebooks TOS Item IV. 7. d. “You must not obscure elements of the Like button or Like box plugin.” http://developers.facebook.com/policy/ If you go to this page you can make it dark. Under Color Scheme you can chose "dark". https://developers.facebook.com/docs/reference/plugins/like Here is a blog entry where someone disguises the like button. http://www.esrun.co.uk/blog/disguising-a-facebook-like-link/
When it comes to kids craft projects, imagination is the only limit. Our inventory of supplies for jewelry crafts gives children everything they need to make jewelry as unique as they are. Our low prices make it easy to stock up on jewelry making supplies for a wide variety of kids jewelry making Find craft projects for preschool and elementary school kids and craft ideas for every age and skill level. Kids love making jewelry to wear or give as gifts. Our beads and buttons, jewelry craft kits and other jewelry craft supplies include all the essentials for making rings, bracelets, earrings and necklaces. Save money on jewelry-making basics at Oriental Trading while ensuring that your little ones are prepared for holiday gift-giving or those rainy-day, spur-of-the-moment jewelry craft projects.
Q: How to get the start time of a long-running Linux process? Is it possible to get the start time of an old running process? It seems that ps will report the date (not the time) if it wasn't started today, and only the year if it wasn't started this year. Is the precision lost forever for old processes? A: You can specify a formatter and use lstart, like this command: ps -eo pid,lstart,cmd The above command will output all processes, with formatters to get PID, command run, and date+time started. Example (from Debian/Jessie command line) $ ps -eo pid,lstart,cmd PID CMD STARTED 1 Tue Jun 7 01:29:38 2016 /sbin/init 2 Tue Jun 7 01:29:38 2016 [kthreadd] 3 Tue Jun 7 01:29:38 2016 [ksoftirqd/0] 5 Tue Jun 7 01:29:38 2016 [kworker/0:0H] 7 Tue Jun 7 01:29:38 2016 [rcu_sched] 8 Tue Jun 7 01:29:38 2016 [rcu_bh] 9 Tue Jun 7 01:29:38 2016 [migration/0] 10 Tue Jun 7 01:29:38 2016 [kdevtmpfs] 11 Tue Jun 7 01:29:38 2016 [netns] 277 Tue Jun 7 01:29:38 2016 [writeback] 279 Tue Jun 7 01:29:38 2016 [crypto] ... You can read ps's manpage or check Opengroup's page for the other formatters. A: The ps command (at least the procps version used by many Linux distributions) has a number of format fields that relate to the process start time, including lstart which always gives the full date and time the process started: # ps -p 1 -wo pid,lstart,cmd PID STARTED CMD 1 Mon Dec 23 00:31:43 2013 /sbin/init # ps -p 1 -p $$ -wo user,pid,%cpu,%mem,vsz,rss,tty,stat,lstart,cmd USER PID %CPU %MEM VSZ RSS TT STAT STARTED CMD root 1 0.0 0.1 2800 1152 ? Ss Mon Dec 23 00:31:44 2013 /sbin/init root 5151 0.3 0.1 4732 1980 pts/2 S Sat Mar 8 16:50:47 2014 bash For a discussion of how the information is published in the /proc filesystem, see https://unix.stackexchange.com/questions/7870/how-to-check-how-long-a-process-has-been-running (In my experience under Linux, the time stamp on the /proc/ directories seem to be related to a moment when the virtual directory was recently accessed rather than the start time of the processes: # date; ls -ld /proc/1 /proc/$$ Sat Mar 8 17:14:21 EST 2014 dr-xr-xr-x 7 root root 0 2014-03-08 16:50 /proc/1 dr-xr-xr-x 7 root root 0 2014-03-08 16:51 /proc/5151 Note that in this case I ran a "ps -p 1" command at about 16:50, then spawned a new bash shell, then ran the "ps -p 1 -p $$" command within that shell shortly afterward....) A: As a follow-up to Adam Matan's answer, the /proc/<pid> directory's time stamp as such is not necessarily directly useful, but you can use awk -v RS=')' 'END{print $20}' /proc/12345/stat to get the start time in clock ticks since system boot.1 This is a slightly tricky unit to use; see also convert jiffies to seconds for details. awk -v ticks="$(getconf CLK_TCK)" 'NR==1 { now=$1; next } END { printf "%9.0f\n", now - ($20/ticks) }' /proc/uptime RS=')' /proc/12345/stat This should give you seconds, which you can pass to strftime() to get a (human-readable, or otherwise) timestamp. awk -v ticks="$(getconf CLK_TCK)" 'NR==1 { now=$1; next } END { print strftime("%c", systime() - (now-($20/ticks))) }' /proc/uptime RS=')' /proc/12345/stat Updated with some fixes from Stephane Chazelas in the comments; thanks as always! If you only have Mawk, maybe try awk -v ticks="$(getconf CLK_TCK)" -v epoch="$(date +%s)" ' NR==1 { now=$1; next } END { printf "%9.0f\n", epoch - (now-($20/ticks)) }' /proc/uptime RS=')' /proc/12345/stat | xargs -i date -d @{} 1 man proc; search for starttime.
/* Document : dash_plugin_dummy.js Created on : Aug 29, 2013, 00:22:07 PM Author : Artur Barseghyan (artur.barseghyan@gmail.com) Description: Dummy plugin specific scripts for django-dash. */ ;
/* This example code was written by Juliusz Chroboczek. You are free to cut'n'paste from it to your heart's content. */ /* For crypt */ #define _GNU_SOURCE #include <stdio.h> #include <stdlib.h> #include <errno.h> #include <string.h> #include <unistd.h> #include <fcntl.h> #include <sys/time.h> #include <arpa/inet.h> #include <sys/types.h> #include <sys/socket.h> #include <netdb.h> #include <sys/signal.h> #include "dht.h" #define MAX_BOOTSTRAP_NODES 20 static struct sockaddr_storage bootstrap_nodes[MAX_BOOTSTRAP_NODES]; static int num_bootstrap_nodes = 0; static volatile sig_atomic_t dumping = 0, searching = 0, exiting = 0; static void sigdump(int signo) { dumping = 1; } static void sigtest(int signo) { searching = 1; } static void sigexit(int signo) { exiting = 1; } static void init_signals(void) { struct sigaction sa; sigset_t ss; sigemptyset(&ss); sa.sa_handler = sigdump; sa.sa_mask = ss; sa.sa_flags = 0; sigaction(SIGUSR1, &sa, NULL); sigemptyset(&ss); sa.sa_handler = sigtest; sa.sa_mask = ss; sa.sa_flags = 0; sigaction(SIGUSR2, &sa, NULL); sigemptyset(&ss); sa.sa_handler = sigexit; sa.sa_mask = ss; sa.sa_flags = 0; sigaction(SIGINT, &sa, NULL); } const unsigned char hash[20] = { 0x54, 0x57, 0x87, 0x89, 0xdf, 0xc4, 0x23, 0xee, 0xf6, 0x03, 0x1f, 0x81, 0x94, 0xa9, 0x3a, 0x16, 0x98, 0x8b, 0x72, 0x7b }; /* The call-back function is called by the DHT whenever something interesting happens. Right now, it only happens when we get a new value or when a search completes, but this may be extended in future versions. */ static void callback(void *closure, int event, unsigned char *info_hash, void *data, size_t data_len) { if(event == DHT_EVENT_SEARCH_DONE) printf("Search done.\n"); else if(event == DHT_EVENT_VALUES) printf("Received %d values.\n", (int)(data_len / 6)); } static unsigned char buf[4096]; int main(int argc, char **argv) { int i, rc, fd; int s = -1, s6 = -1, port; int have_id = 0; unsigned char myid[20]; time_t tosleep = 0; char *id_file = "dht-example.id"; int opt; int quiet = 0, ipv4 = 1, ipv6 = 1; struct sockaddr_in sin; struct sockaddr_in6 sin6; struct sockaddr_storage from; socklen_t fromlen; memset(&sin, 0, sizeof(sin)); sin.sin_family = AF_INET; memset(&sin6, 0, sizeof(sin6)); sin6.sin6_family = AF_INET6; while(1) { opt = getopt(argc, argv, "q46b:i:"); if(opt < 0) break; switch(opt) { case 'q': quiet = 1; break; case '4': ipv6 = 0; break; case '6': ipv4 = 0; break; case 'b': { char buf[16]; int rc; rc = inet_pton(AF_INET, optarg, buf); if(rc == 1) { memcpy(&sin.sin_addr, buf, 4); break; } rc = inet_pton(AF_INET6, optarg, buf); if(rc == 1) { memcpy(&sin6.sin6_addr, buf, 16); break; } goto usage; } break; case 'i': id_file = optarg; break; default: goto usage; } } /* Ids need to be distributed evenly, so you cannot just use your bittorrent id. Either generate it randomly, or take the SHA-1 of something. */ fd = open(id_file, O_RDONLY); if(fd >= 0) { rc = read(fd, myid, 20); if(rc == 20) have_id = 1; close(fd); } fd = open("/dev/urandom", O_RDONLY); if(fd < 0) { perror("open(random)"); exit(1); } if(!have_id) { int ofd; rc = read(fd, myid, 20); if(rc < 0) { perror("read(random)"); exit(1); } have_id = 1; close(fd); ofd = open(id_file, O_WRONLY | O_CREAT | O_TRUNC, 0666); if(ofd >= 0) { rc = write(ofd, myid, 20); if(rc < 20) unlink(id_file); close(ofd); } } { unsigned seed; read(fd, &seed, sizeof(seed)); srandom(seed); } close(fd); if(argc < 2) goto usage; i = optind; if(argc < i + 1) goto usage; port = atoi(argv[i++]); if(port <= 0 || port >= 0x10000) goto usage; while(i < argc) { struct addrinfo hints, *info, *infop; memset(&hints, 0, sizeof(hints)); hints.ai_socktype = SOCK_DGRAM; if(!ipv6) hints.ai_family = AF_INET; else if(!ipv4) hints.ai_family = AF_INET6; else hints.ai_family = 0; rc = getaddrinfo(argv[i], argv[i + 1], &hints, &info); if(rc != 0) { fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(rc)); exit(1); } i++; if(i >= argc) goto usage; infop = info; while(infop) { memcpy(&bootstrap_nodes[num_bootstrap_nodes], infop->ai_addr, infop->ai_addrlen); infop = infop->ai_next; num_bootstrap_nodes++; } freeaddrinfo(info); i++; } /* If you set dht_debug to a stream, every action taken by the DHT will be logged. */ if(!quiet) dht_debug = stdout; /* We need an IPv4 and an IPv6 socket, bound to a stable port. Rumour has it that uTorrent works better when it is the same as your Bittorrent port. */ if(ipv4) { s = socket(PF_INET, SOCK_DGRAM, 0); if(s < 0) { perror("socket(IPv4)"); } } if(ipv6) { s6 = socket(PF_INET6, SOCK_DGRAM, 0); if(s6 < 0) { perror("socket(IPv6)"); } } if(s < 0 && s6 < 0) { fprintf(stderr, "Eek!"); exit(1); } if(s >= 0) { sin.sin_port = htons(port); rc = bind(s, (struct sockaddr*)&sin, sizeof(sin)); if(rc < 0) { perror("bind(IPv4)"); exit(1); } } if(s6 >= 0) { int rc; int val = 1; rc = setsockopt(s6, IPPROTO_IPV6, IPV6_V6ONLY, (char *)&val, sizeof(val)); if(rc < 0) { perror("setsockopt(IPV6_V6ONLY)"); exit(1); } /* BEP-32 mandates that we should bind this socket to one of our global IPv6 addresses. In this simple example, this only happens if the user used the -b flag. */ sin6.sin6_port = htons(port); rc = bind(s6, (struct sockaddr*)&sin6, sizeof(sin6)); if(rc < 0) { perror("bind(IPv6)"); exit(1); } } /* Init the dht. This sets the socket into non-blocking mode. */ rc = dht_init(s, s6, myid, (unsigned char*)"JC\0\0"); if(rc < 0) { perror("dht_init"); exit(1); } init_signals(); /* For bootstrapping, we need an initial list of nodes. This could be hard-wired, but can also be obtained from the nodes key of a torrent file, or from the PORT bittorrent message. Dht_ping_node is the brutal way of bootstrapping -- it actually sends a message to the peer. If you're going to bootstrap from a massive number of nodes (for example because you're restoring from a dump) and you already know their ids, it's better to use dht_insert_node. If the ids are incorrect, the DHT will recover. */ for(i = 0; i < num_bootstrap_nodes; i++) { dht_ping_node((struct sockaddr*)&bootstrap_nodes[i], sizeof(bootstrap_nodes[i])); usleep(random() % 100000); } while(1) { struct timeval tv; fd_set readfds; tv.tv_sec = tosleep; tv.tv_usec = random() % 1000000; FD_ZERO(&readfds); if(s >= 0) FD_SET(s, &readfds); if(s6 >= 0) FD_SET(s6, &readfds); rc = select(s > s6 ? s + 1 : s6 + 1, &readfds, NULL, NULL, &tv); if(rc < 0) { if(errno != EINTR) { perror("select"); sleep(1); } } if(exiting) break; if(rc > 0) { fromlen = sizeof(from); if(s >= 0 && FD_ISSET(s, &readfds)) rc = recvfrom(s, buf, sizeof(buf) - 1, 0, (struct sockaddr*)&from, &fromlen); else if(s6 >= 0 && FD_ISSET(s6, &readfds)) rc = recvfrom(s6, buf, sizeof(buf) - 1, 0, (struct sockaddr*)&from, &fromlen); else abort(); } if(rc > 0) { buf[rc] = '\0'; rc = dht_periodic(buf, rc, (struct sockaddr*)&from, fromlen, &tosleep, callback, NULL); } else { rc = dht_periodic(NULL, 0, NULL, 0, &tosleep, callback, NULL); } if(rc < 0) { if(errno == EINTR) { continue; } else { perror("dht_periodic"); if(rc == EINVAL || rc == EFAULT) abort(); tosleep = 1; } } /* This is how you trigger a search for a torrent hash. If port (the second argument) is non-zero, it also performs an announce. Since peers expire announced data after 30 minutes, it's a good idea to reannounce every 28 minutes or so. */ if(searching) { if(s >= 0) dht_search(hash, 0, AF_INET, callback, NULL); if(s6 >= 0) dht_search(hash, 0, AF_INET6, callback, NULL); searching = 0; } /* For debugging, or idle curiosity. */ if(dumping) { dht_dump_tables(stdout); dumping = 0; } } { struct sockaddr_in sin[500]; struct sockaddr_in6 sin6[500]; int num = 500, num6 = 500; int i; i = dht_get_nodes(sin, &num, sin6, &num6); printf("Found %d (%d + %d) good nodes.\n", i, num, num6); } dht_uninit(); return 0; usage: printf("Usage: dht-example [-q] [-4] [-6] [-i filename] [-b address]...\n" " port [address port]...\n"); exit(1); } /* Functions called by the DHT. */ int dht_blacklisted(const struct sockaddr *sa, int salen) { return 0; } /* We need to provide a reasonably strong cryptographic hashing function. Here's how we'd do it if we had RSA's MD5 code. */ #if 0 void dht_hash(void *hash_return, int hash_size, const void *v1, int len1, const void *v2, int len2, const void *v3, int len3) { static MD5_CTX ctx; MD5Init(&ctx); MD5Update(&ctx, v1, len1); MD5Update(&ctx, v2, len2); MD5Update(&ctx, v3, len3); MD5Final(&ctx); if(hash_size > 16) memset((char*)hash_return + 16, 0, hash_size - 16); memcpy(hash_return, ctx.digest, hash_size > 16 ? 16 : hash_size); } #else /* But for this example, we might as well use something weaker. */ void dht_hash(void *hash_return, int hash_size, const void *v1, int len1, const void *v2, int len2, const void *v3, int len3) { const char *c1 = v1, *c2 = v2, *c3 = v3; char key[9]; /* crypt is limited to 8 characters */ int i; memset(key, 0, 9); #define CRYPT_HAPPY(c) ((c % 0x60) + 0x20) for(i = 0; i < 2 && i < len1; i++) key[i] = CRYPT_HAPPY(c1[i]); for(i = 0; i < 4 && i < len1; i++) key[2 + i] = CRYPT_HAPPY(c2[i]); for(i = 0; i < 2 && i < len1; i++) key[6 + i] = CRYPT_HAPPY(c3[i]); strncpy(hash_return, crypt(key, "jc"), hash_size); } #endif int dht_random_bytes(void *buf, size_t size) { int fd, rc, save; fd = open("/dev/urandom", O_RDONLY); if(fd < 0) return -1; rc = read(fd, buf, size); save = errno; close(fd); errno = save; return rc; }
From the Laboratory to the Field: Updating Capacity Building in Medical Entomology. Training and innovation in the field of medical entomology are essential to mitigate the burden of vector-borne diseases globally. However, there is a shortage of medical entomologists worldwide, and there are large discrepancies in capacity building in this field. In this article, we discuss the current situation, what is needed from the medical entomologist of today, and how we can bridge this gap.
The United States is one of the top nations for prematurely born infants and has a correspondingly high day- one infant mortality rate. Expanding our understanding of alveologenesis is a critical step toward promoting proper lung formation in preterm infants. This, however, remains an unsolved challenge as no systematic study of the molecular components of normal lung development during late term and early childhood has previously been conducted. For this reason, NHLBI is establishing four research centers to develop a molecular atlas of the developing lung (LungMAP). In response to this call, we have assembled a research team with the necessary experience to successfully establish a molecular atlas of the mouse and human lung based on spatial imaging and cell-specific -omic technologies. Within organs such as the lung, the relationship between space, anatomy, and function is fundamental. Therefore, our approach will include imaging techniques with high spatial resolution, as well as cell-specific -omics. The future correlation of these complementary data collection methods will facilitate the establishment of cell-specific spatial informatics acros the developing lung. Specifically, we will accomplish our goal of an integrated molecular atlas of lung development through the following aims: (1) Spatial imaging for a molecular atlas of the developing mouse and human lung (2) Cell type- specific omics for a molecular atlas of the developing mouse and human lung (3) Manage data and metadata to facilitate collaboration and data integration. Overall, these aims will create the first spatial-temporal molecular atlas of the mammalian lung during alveologenesis, which in coordination with the other LungMAP centers will provide an unprecedented array of information about the healthy developing lungs in mouse and human. The novel imaging approaches and the suite of integrated pan-omics capabilities (i.e. proteomics, lipidomics, metabolomics and activity-based protein profiling) developed and available in a single laboratory at PNNL represents a unique strength of the Research Center. (End of Abstract)
Policy — One citizen demands: "Do you know why Oakland is spying on me and my wife?" A low “hit rate” Specialized LPR cameras mounted in fixed locations or on police cars typically scan passing license plates using optical character recognition technology, checking each plate against a "hot list" of stolen or wanted vehicles. The devices can read up to 60 plates per second and typically record the date, time, and GPS location of any plates—hot or not. (There have been incidents where LPR misreads have led to dangerous confrontations.) Some cities have even mounted such cameras at their city borders, monitoring who comes in and out, including the wealthy city of Piedmont, California, which is totally surrounded by Oakland. LPR collection began in Oakland back in 2006, and an early OPD analysis showed that the overwhelming majority of the data collected was not a “hit.” In April 2008, the OPD reported to the city council that after using just four LPR units for 16 months, it had read 793,273 plates and had 2,012 hits—a “hit rate” of 0.2 percent. In other words, nearly all of the data collected by an LPR system concerns people not currently under suspicion. In addition to LPR data, Ars obtained a list of OPD vehicles and found that the most frequently seen one is plate number 1275287, a 2007 Crown Victoria marked patrol car. Between January 15, 2012 and May 31, 2014, the OPD scanned that vehicle 879 times all over town, primarily in the downtown and North Oakland areas. In fact, nearly all of the 100 most frequently seen cars were other OPD vehicles scanned several hundred times each. Enlarge/ License plate 1275287, a 2007 Crown Victoria marked OPD patrol car, was the most frequently scanned car. It was seen 539 times between January 2011 and May 2014. Cyrus Farivar Law enforcement policies vary widely as to how long LPR information can be stored. In California, the wealthy Silicon Valley city of Menlo Park (home to Facebook) retains data for just 30 days. By contrast, the Los Angeles Police Department (LAPD) retains data for two years. Neither the Oakland City Council nor the OPD has ever imposed a formal data retention limit, though OPD has deleted older LPR data as needed to make room for newer data. As LPR devices and storage prices continue to fall, it's likely the volume and rate of such data collection will continue to rise, and its retention time can become longer. “If I’m law enforcement, I would keep it forever,” Brian Owsley, a former federal judge turned law professor at Indiana Tech, told Ars. “That’s the privacy advocates’ concern is that this stuff goes into a database—gigabytes are essentially free now—and this stuff stays forever.” There's no evidence that the OPD has abused its database. But absent any strict controls, auditing, or even basic guidelines, it’s hard to know what might or might not have been done. “Anyone can get this information” Further Reading To make sense of the LPR data—which was originally provided in 18 separate Excel spreadsheet files with hundreds of thousands of lines each—Ars hired Mike Tahani, a Bay Area data visualization specialist. Tahani created a simple tool allowing us to search any given plate and plot the locations on a map. We did not use the data for any purpose beyond our journalistic attempt to understand what such a large license plate reader dataset reveals. While OPD and other law enforcement agencies have the ability to match a given plate with registration records from the Department of Motor Vehicles and the National Crime Information Center, revealing a car's owner, Ars does not. In cases where we searched a known individual's plates, we did so only with their explicit consent. Howard Matis, a physicist who works at the Lawrence Berkeley National Laboratory, told Ars that he didn’t know that OPD even had LPRs. With his permission, we ran his plate and showed him a map of the five instances where a camera had captured his car, guessing that they were near where he lived or worked. Matis replied by e-mail: “You are correct, they are places that I and my wife go all the time.” Matis wasn't worried about OPD capturing such data, but he was less comfortable knowing that the data was released to the media. “If anyone can get this information, that’s getting into Big Brother,” he told Ars. “If I was trying to look at what my spouse is doing, [I could]. To me, that is something that is kind of scary. Why do they allow people to release this without a law enforcement reason? Searching it or accessing the information should require a warrant.” Matis immediately fired off an e-mail to Dan Kalb, his city council member: Dan, Do you know why Oakland is spying on me and my wife? We haven't done anything too radical or illegal. I gave my license plate to a journalist and he found my wife's and my car in their database. One of the locations is right near our house. The astounding thing about this information is that anyone, and I mean anyone, can get this information. Some of the information is more than two years old. I can see lawyers using this information for lawsuits. I can check where my wife is located. Car companies can see my habits. Insurance companies can check up on their clients. We have entered the world of 1984 with the difference that anyone can get the information. Ars contacted every member of the Oakland City Council, including newly elected mayor Libby Schaaf, to show them the Oakland LPR data. Dan Kalb, the recipient of Matis' e-mail, was the only council member who agreed to meet. (Neither Mayor Schaaf nor the recently departed mayor, Jean Quan, responded to requests for an interview.) Kalb represents District 1, which includes some of the city’s richer neighborhoods—including Oakland Hills and Rockridge—and other less affluent regions in the city’s northwest. Enlarge/ Dan Kalb was the only member of the city government who would sit down with Ars to discuss LPRs. Seated in Kalb's cluttered City Hall office, Ars explained the LPR issue. We asked for Kalb's plate number and, within seconds, showed him what the OPD knew about his travels. Our tool revealed that OPD had seen the councilman 51 times between May 2012 and May 2014. On 16 occasions, Kalb’s car was scanned parked on the street just outside City Hall in the spaces reserved for council members. On another 20 occasions, at various times of day, Kalb’s car was spotted in a tight group on a certain block in the Temescal neighborhood. When Ars guessed that this block must be where he lives, he said that it was. “I knew these things existed, but I had not delved into the level of detail that you're sharing with me,” he said. Kalb is relatively new to City Hall, having only been elected in 2012. Though he did know that the city had LPRs, he said he didn’t know the extent of its usage. “My awareness is that we have something like this, these mobile LPRs, and I presumed that their primary purpose was to track down stolen vehicles or assist in the investigations of other crimes that knowing the license plate would help,” he told Ars. “It raises the question: what's the purpose of retaining records for a long period of time?” Share this story Cyrus Farivar Cyrus is a Senior Tech Policy Reporter at Ars Technica, and is also a radio producer and author. His latest book, Habeas Data, about the legal cases over the last 50 years that have had an outsized impact on surveillance and privacy law in America, is out now from Melville House. He is based in Oakland, California. Emailcyrus.farivar@arstechnica.com//Twitter@cfarivar
Jennifer Ward-Lealand Jennifer Cecily Ward-Lealand (born 8 November 1962) is a New Zealand actor and director whose screen credits includes the in 1993 movie Desperate Remedies as well as appearances in The Footstep Man, the soap Shortland Street and Australian comedy series Full Frontal. Biography Ward-Lealand was born in Wellington, New Zealand to Philippa "Pippa" Mary (née Ward) and Conrad Ainsley Lealand. She has an older sister, Diana Mary Ward-Pickering and a half brother Simcha Lindt. She is married to actor Michael Hurst of Hercules: The Legendary Journeys fame. They have two sons, born in 1997, and 1999. Her first ongoing television role was as Jan in Close to Home (1978–1980). After leaving school she spent a year touring New Zealand in a community theatre group, performing clown shows and Chekhov. In 1982 Ward-Lealand completed a year-long diploma in acting from Auckland's then influential Theatre Corporate. In between the theatre work that followed, Ward-Lealand appeared in short-lived TV drama Seekers, before her breakthrough television role in "Danny and Raewyn", an episode from the About Face series. Filmed largely in an Auckland flat so cramped the cameraman sometimes had to sit on the stove, this tale of working class relationship breakdown would win Ward-Lealand a GOFTA Best Actress Award. The same year Ward-Lealand made her big screen debut as nightclub singer Costello – and sang three songs – in Wellington crime thriller Dangerous Orphans. From 1989 to 1990 she appeared with Harry Sinclair and Don McGlashan in theatre/musical group The Front Lawn, winning a number of awards and accolades, and acting in Front Lawn film Linda's Body. In 1993 she appeared in the first series of TV skit comedy show, Full Frontal. As an actress, singer and director of theatre, Ward-Lealand has a number of credits and accolades, and acted in New Zealand plays The Bach, Via Satellite, and The Sex Fiend. In 2007, she toured her acclaimed Marlene Dietrich cabaret show, Falling in Love Again (also the name of her first solo CD) in New Zealand and Australia. She later toured with the same show in 2018. Jennifer Ward-Lealand is fluent in Te Reo Māori, the native language of New Zealand. Ward-Lealand, who herself is not Māori, started learning the language after not being able to respond to a traditional mihi or welcome speech. Ward-Lealand has also been an advocate for improving actors' working conditions and pay. Filmography Accolades Ward-Lealand's contribution to New Zealand theatre was recognised in 2007 New Year Honours with her investiture as an Officer of the New Zealand Order of Merit, for services to theatre and the community. In October 2018 she was presented with a Scroll of Honour from the Variety Artists Club of New Zealand for her contribution to New Zealand entertainment. In the 2019 New Year Honours, Ward-Lealand was appointed a Companion of the New Zealand Order of Merit, for services to theatre, film and television and for her advocacy for actors' working conditions and pay. Ward-Lealand won the New Zealander of the Year Award in 2020, being recognised for her dedication to performing arts and her commitment and passion for te reo Māori. References External links The official website of Jennifer Ward-Lealand Jennifer Ward-Lealand interview with her husband Michael Hurst for the Cultural Icons project. Audio and video. Category:1962 births Category:Living people Category:New Zealand television actresses Category:New Zealand stage actresses Category:New Zealand soap opera actresses Category:Companions of the New Zealand Order of Merit Category:20th-century New Zealand actresses Category:21st-century New Zealand actresses
Willy Taylor Willy Taylor (5 January 1916 – 2 November 2000) was a fiddler from Northumberland, England. He performed with Joe Hutton and Will Atkinson as the Shepherds. Music career He was born at Lilburn Tower near Wooler. When he was a boy, he learned the fiddle. He lost the first finger of his left hand while preparing food for sheep, and he temporarily switched to melodeon before returning to the fiddle. For most of his life, he was a shepherd in the Cheviot Hills. He composed melodies in his head on the way home after a day of herding sheep. He attributed his musical style in part to the time he spent with Geordie Armstrong, a shepherd who was also a fiddler. He walked miles through hilly country to perform at dances and festivals in nearby villages. He won competitions at Northumbrian Gatherings in the early 1950s, and he was recorded by Peter Kennedy for the BBC in 1954, playing both fiddle and melodeon. He was a founding member of the Border Strathspey and Reel Society, based at Langholm in Dumfriesshire. He was also one of the leading members of the Alnwick Pipers' Society, who published several of his compositions in their two tunebooks. In 1983, he recorded Harthope Burn, with the mouth organ player Will Atkinson and the piper Joe Hutton. This group, known as The Shepherds, travelled widely, playing at clubs and folk festivals across Britain. They also made some broadcasts, often with Alistair Anderson, the English concertina player. After his retirement from farming, he made a solo album Welcome to the Dene. Some recordings of his club performances, solo and with the Shepherds, are available on the FARNE folk audio archive. Partial list of compositions Many of his songs are named after members of his extended family. "The Dene" refers to Middleton Dene, the last farm he worked before retiring. "The Pearl Wedding" "Tich's Reel" "Nancy Taylor's Reel" "Snowy Monday" "Shirley's Reel" "The Shining Pool" "Neil Taylor's Jig" "Christine Taylor's Jig" "Kerry's Welcome to the Dene" "Farewell to the Dene" Discography Ranting and Reeling (Topic, 1954, 1991) Harthope Burn (MWM, 1983) Welcome to the Dene (Common Ground, 1990) Northumberland Rant (Smithsonian Folkways, 1986, 1994, 1996) References Sources Reg Hall's notes to Ranting and Reeling Bert Feintuch's notes to Northumberland Rant Interview with Willy Taylor and Will Atkinson on FARNE External links Farne Folk Archive audio, requires RealPlayer Category:English folk musicians Category:1916 births Category:2000 deaths Category:20th-century English musicians
[Dynamic of lectin activity during germination of bean seeds (Phaseolus vulgaris L.)]. PHA quantity and activity dynamics during early germination of bean seed were investigated. Electrophoretic characteristics, subunits composition and carbohydrate-binding specificity of lectin extracted from white kidney bean cv. Bilozerna were studied. It was shown that investigated lectin consisted of 2 subunits E and L with molecular weight 34 and 36 kDa, respectively, analogously to purified PHA ("Serva", Germany), and specifically bound N-acetyl-D-galactosamin and galactose. During germination both quantity and activity of PHA were dramatically decreasing in embryonic axes and in cotyledons, possibly, as a result of the lectin release from seeds to the environment. It is very likely that one of the defence mechanisms of germinating seeds is related with the releasing of lectins that are able to bind components of the bacterial cell wall and to inhibit their growth.
### Examples ```js const Card = () => ( <FlexView column style={{ paddingRight: 30 }}> <div style={{ fontSize: 28, fontWeight: 'bold', color: '#313d4f', marginBottom: 10 }}> The last days of disco </div> <div style={{ fontSize: 14, color: '#313d4f', marginBottom: 10 }}> by <span style={{ color: '#1a91eb' }}>Luella Todd</span> | 7th of March </div> <img width="100%" style={{ marginBottom: 10 }} src="scroll.gif" /> <div style={{ fontSize: 18, lineHeight: 1.4, color: '#727a86' }}> Vinyl pug cray meh, pabst lyft retro fashion axe pickled. Tbh seitan unicorn, raw denim wayfarers edison bulb letterpress shoreditch put a bird on it lomo. Helvetica scenester cronut, trust fund lumbersexual normcore cray pour-over pinterest single-origin coffee pug glossier. Godard slow-carb kitsch, heirloom pug intelligentsia art party cornhole chicharrones lumbersexual man bun. Subway tile shabby chic narwhal, hella pour-over paleo coloring book intelligentsia bushwick selvage migas gentrify single-origin coffee. Schlitz chicharrones fanny pack trust fund green juice, gochujang hexagon drinking vinegar slow-carb truffaut pabst pitchfork. Retro gentrify synth, pop-up snackwave lo-fi blue bottle bicycle rights fanny pack iceland. </div> </FlexView> ); <FlexView height={500}> <ScrollView> <Card /> </ScrollView> </FlexView>; ```
Pamela Geller organized the “Draw Muhammad” contest and art exhibition held Sunday in Garland, Texas, where two gunmen opened fire before being killed by police. Geller also placed an order for subway and bus ads in New York City that linked Islamic leaders to Hitler, leading the New York Metropolitan Transportation Authority to vote Wednesday for a blanket ban on “viewpoint advertising” to avoid ever having to show ads like Geller’s again. It’s not a quirk of timing that places Geller at the heart of two controversies over provocative speech about Islam within a week. The little data we have shows that although anti-Islam groups have multiplied in the United States over the past several years, only a small group of people are behind many of these organizations. Geller is one of them. The Southern Poverty Law Center (SPLC) began identifying anti-Muslim “hate groups” in 2010 after controversy flared over the proposed Cordoba House mosque, a few blocks from the World Trade Center site. In 2010, there were five active anti-Muslim hate groups — organizations that, by the SPLC’s criteria, “exhibit extreme hostility toward Muslims” and “broadly defame Islam, which they tend to treat as a monolithic and evil religion.” (A group does not need to advocate violence explicitly to be included on the SPLC list.) The SPLC’s tally ballooned to 30 in 2011 and then 36 in 2012 and 2013. The SPLC’s Spring 2015 Intelligence Report’s count of 24 represents the first decline in anti-Muslim hate groups since the SPLC began its watch, and was part of an overall decline in labeled hate groups from 939 in 2013 to 784 in 2014. (Of course, the number of groups and the number of supporters of those groups are two different things. Information on membership is frequently not available.) But the simple count of anti-Islam groups can be deceptive. Growth in anti-Muslim groups seems to be driven as much by a few key leaders founding multiple organizations as by new people forming independent groups. When Geller held her “Draw Muhammed” event, she did so under the aegis of the American Freedom Defense Initiative, of which she is the executive director. The ads that Geller ordered in New York mention the American Freedom Defense Initiative in their disclaimers but direct readers to Jihad Watch, Atlas Shrugs and Truth About Quran. The American Freedom Defense Initiative, Jihad Watch and Atlas Shrugs are listed by SPLC as hate groups. Atlas Shrugs’s website simply redirects to Geller’s personal website, and according to tax filings, Geller is also president of Jihad Watch. Robert Spencer, the writer who runs Jihad Watch, also co-founded Stop Islamization of America (SIOA) with Geller. The website of SIOA, which is also on the hate-group list, redirects to a subsite of the American Freedom Defense Initiative. In other words, Geller and Spencer are, between the two of them, the leaders of 17 percent (four of 24) of all the anti-Muslim groups that the SPLC tracks. Mark Potok, a senior fellow at the SPLC, explained that his organization lists each group separately because the groups may engage in different patterns of activity. A 2014 report by the Council on American-Islamic Relations (CAIR) found a similar pattern of centralization among anti-Islam organizations. CAIR listed 37 active groups in the “inner core” of what it considers Islamophobia activism and 32 additional groups in an “outer core.” Inner-core organizations tend to be focused particularly on Islam; outer-core groups provide financial or other supports to the inner core but may work on a wider array of issues. Board membership and funding sources frequently overlapped between nominally separate groups. A Center for American Progress (CAP) report in 2011 — titled “Fear, Inc.” — had similar findings. It identified seven top funders of anti-Islamic research and rhetoric. These groups contributed $42.6 million to “Islamophobia think tanks” between 2001 and 2009. All of these funders gave to at least three of the eight Islamophobic groups that CAP tracked. All that money buys the appearance of a growing movement, but although Geller and a few others will continue to hold events and issue challenges, the most prominent anti-Muslim hate groups remain the product of a small group of leaders acting under many different names and logos.
South East London blogzine - things that are happening, things that happened, things that should never have happened. New Cross, Brockley, Deptford and other beauty spots. EMAIL US: transpontineblog at gmail.com Transpontine: 'on the other (i.e. the south) side of the bridges over the Thames; pertaining to or like the lurid melodrama played in theatres there in the 19th century'. Monday, May 31, 2010 Not sure mentioning a South London location in passing is enough to be included in the Great Transpontine Songbook, but Carrion by British Sea Power certainly deserves an honorable mention: Carry on inside of your heartUnder the brine you won't notice the darkCan stone and steel and horses heelsEver explain the way you feel?From Scapa Flow to Rotherhithe,I felt the lapping of an ebbing tide Saturday, May 29, 2010 Here's an odd story from the struggle for women's suffrage. First of all, a report from Votes for Women, paper of the Women's Social and Political Union (WSPU) from November 21 1913: Death of Suffragist Protester'Death cannot kill what cannot die' - William Penn With the deepest regret we have to record the death of William Edward Bethell, of Brockley, who, for bravely reminding a Cabinet Minister of the Government's duty to the women of the country, was so brutally injured on November 7 by the Liberal stewards who ejected him, that he has since succumbed to heart failure as a result of the treatment he received. Mr Bethell's brother has more than once raised his voice at Liberal meetings on behalf of the women's cause, but last Friday week was the first occasion on which Mr William Edward Bethell determined that he too would join the band of brave protestors, who, although knowing beforehand what to expect, do not shrink from running the most serious risks to life and limb when they hear that a member of the Cabinet is to address a Liberal audience. So he was one of those who went to the North Camberwell Radical Club, Albany Road, on November 7, to remind Dr Macnamara, Secretary to the Admiralty, of the women's struggle for liberty that the Government are trying so hard to suppress. A man and a woman, both of whom had dared to utter a Suffragist protest, were thrown out before him with considerable violence. Then his turn came. He rose to his feet and dealt his first and last blow in the cause of women's freedom. No sooner did he open his mouth to speak than he was set upon by a number of stewards, dragged out of the meeting, and so savagely assailed that his nose was broken and his knee put out. The full particulars of what followed are not yet available, but it is known that he arrived home later in the evening, his knee and head in bandages, and was so ill that he was obliged to stay in bed all Saturday and Sunday. Being a bricklayer's labourer, he made an effort on the Monday morning (November 10) to go to work, but he rapidly became so much worse that he had to return home in the course of the day and again take to his bed. He never got up again. Last Sunday he passed away. The report goes on to mention that his brother, whose address is given as 49 Hardcastle Road, Peckham, had been beaten up by stewards in a similar incident in August 1912. But was the story true? A couple of weeks later The Times reported that police 'have been inquiring into the matter at Brockley and Peckham, but it is understood that they have been unable to trace the death of Bethell'. Furthermore 'Bethell's father, who lives at Coldbath-street, Brockley, states that his son William Edward went to Canada last year, and so far as he knows is still there'. The Times confirms that the North Camberwell meeting did take place, but reports Dr Macnamara's denial that there had been any violence (Times Dec 1 1913). What's more a Bethell family history site shows that William Edward Bethell did indeed go to Canada, where he lived until his death in 1951 after an active life including being injured at the Battle of the Somme. It does confirm that he was a bricklayer when he arrived in Canada, and that his parents lived at 58 Cold Bath Street (now Coldbath Street, SE13). As for the brother, Walter the source of the seemingly untrue story, the family history site states that he was born at 98 Foxberry Road, Brockley, and that in 1905 he was convicted of fraud. Was the suffragist death story an attempted fraud for financial gain? A mischievous or malicious prank at his brother's expense? Who knows... Friday, May 28, 2010 There are elephants all over London at the moment, more than 250 in fact, as part of the Elephant Parade to raise awareness of the endangered Asian elephant. These fine specimens are next to the river by County Hall . My favourite is this one by More London (Tooley Street, SE1), decorated with a map of parts of London. It is surely the only Elephant in the world - indeed the only statue of any kind in the world - with the words 'New Cross Gate' written above its mouth. Thursday, May 27, 2010 Community Action Lewisham is a new activist group, planning to tackle issues such as housing and racism in the local area. They meet on the first Wednesday of the month upstairs in the Amersham Arms in New Cross. Next one is on Wednesday 2nd June, 7.30 pm. Thanks to them I just found out that there's also a Food not Bombs group locally: 'Bexley/Lewisham/Dartford Food Not Bombs is a group of volunteers who take good quality within-date food which would have been thrown away by businesses, cook it up, and distribute it to homeless hostels and day centres... We collect food from Kelsey's Farm, Ruxley Farm Shop and Swanley Bakery (Sidcup and Swanley branch), and then cook and serve it up at St Mungo's Pagnell Street, a homeless hostel near New Cross station'. More South London rap, this time from Joe Grind (think Giggs is his brother). Step Back features the Aylesbury Estate, Portland Street, Bells Garden Estate, Peckham Hill Street and various other Pecknam and Walworth locations. Wednesday, May 26, 2010 Rambling a little further afield than the New Cross, Deptford, BrockleyTranspontine heartland, the first in a new series of wanderings through SE1 (who knows maybe eventually I will get to wander all the streets in the SE postcode area, but that may take some time). Anyway to start with here's Holy Trinity Church, in Trinty Church Square in Borough (historically known as Trinity Square). Built in the 1820s it has been out of use as a Church since the 1960s and is now the home of Henry Wood Hall, a rehearsal and recording space for the London Philharmonic and other orchestras. Among the musical luminaries who have used its facilities are Leonard Bernstein and GyörgyLigeti. The statue in the foreground has some interesting folklore. I have read the tale several times that it is the oldest statue in London, a medieval depiction of King Alfred the Great moved to the square from Westminster Hall. However an alternative theory has recently been put forward that it was in fact the work of the sculptor James Bubb and was made at a similar time to the construction of the church (i.e. 1820s). The arguments are quite convincing, namely that it is the wrong shape and material to be one of the Westminster Hall 14th century statues. The 'oldest statue in London' theory seems to date back to the 1920s - a 1911 survey of Royal statues in London mentions it as the only London statue of an early English king, but makes no claims for its antiquity. Indeed it was stated at the time that the oldest statue in London was actually of Queen Elizabeth, in St Dunstans Church, Fleet Street (report of a lecture on London statues by FW Hill, Ottowa Citizen, 17 April 1911). Trinity Square was developed at the same time as the Church by Trinity House, the body responsible for lighthouses. Indeed rent and other income from the square is a significant source of revenue for the lighthouse authority. The body had its origins in Deptford - indeed its full name is the 'Corporation of Trinity House of DeptfordStrond'. But that's another story. Monday, May 24, 2010 A great exodus from South East London yesterday on the first full day of the extended London Overground East London Line, celebrated by Brockley Central and others. I went to Columbia Road flower market in the morning and then back again to a party in Mare Street, Hackney later on. Left the party at 9:45 pm, took two buses to Dalston Junction and was back in New Cross Gate by 10:30. Others headed to Brick Lane and Spitalfields. Seemingly, as Diamond Geezer reports, many from the other side of London took the train south to check out what we have to offer. Must have been like this when the Berlin wall came down! As I said here before, the Line could shift people's mental geography of the city to an East/West polarity rather than just a north/south divide: 'By directly linking Croydon and Hackney (or at least Dalston) via Brockley and New Cross it could generate a sense of East London that crosses the river. Today when people talk about East London they generally mean the Eastern part of the city north of the Thames, whereas in Victorian times for instance, Deptford was often described as being in East London'. Canadian punk band D.O.A. toured the UK in 1990. Their last gig was in New Cross, and they split up soon after (though they later reformed). In his book 'I, Shithead: A Life in Punk', Joe Keithley from the band recalls the famous hospitality of the Venue's bouncers: 'Our last show of that tour was in London at the Venue in New Cross on JUne 7. The show was packed and we played a raunchy set. I was hoarse as hell. There was a shitty aspect to the show. The club had hired rugby hooligans to do securtiy. We couldn't see much from the stage, but Jay Scott had a bird's eye view of what was going on from the closed-circuit camera in the club's office. The bouncers were roughing up the punks at the door and bashing anybody who had been thrown out of the pit. One kid got really hurt, and somebody called the cops. Scott could see the bouncers running to throw their brass knuckles and the small truncheons they had been carrying into a bucket. The bucket was hidden in a back room before the cops arrived and the bar manager helped hide the blood evidence'. Sunday, May 23, 2010 Students and staff at Goldsmiths in New Cross have been mounting a vigorous campaign against the new 'points based' system for immigration. They say that the 'rules represent a serious threat to campus democracy and freedom of speech. They require non-EU students and staff to have biometric ID cards, involve demands on the financial background of applicants and mean that staff are obliged to report students to the UK Border Agency when they have not attended regularly'. The Students not Suspects campaign has highlighted a number of cases where this bureaucratic nightmare has resulted in serious disruption to students' lives. The campaing has held a number of big meetings at the college and has produced some snazzy t-shirts for both students and staff. The staff version, below, states 'we are not border agents' - since the rules do in effect ask college staff to become an extension of the border police. The latest initiative is a petition to Pat Loughrey, the new Warden of Goldsmiths, calling on the college managment to support the campaign: 'I am writing to express my grave concerns with the implementation of the UK Border Agency's (UKBA) Points Based System of Immigration (PBSI) at Goldsmiths. By imposing the UKBA's agenda of national security and border control on universities, PBSI has effectively turned students into suspects and staff into border agents. These xenophobic and reactionary tendencies run counter to the openness and free exchange of ideas necessary for research, teaching, and learning to occur. Furthermore, the UKBA has transferred the financial and administrative burden of PBSI, which is considerable, onto individual staff and students, resulting in elevated workloads and stress. By increasing the cost and complexity of the visa application process, the UKBA has rendered universities less accessible and less welcoming to non-EU nationals, thus potentially damaging the reputation of higher education in the UK. The result will be less cultural and social diversity in higher education, to the detriment of Goldsmiths and the sector overall'. Given that this is an area with a high migrant population, it would be good too to link with non-students in the area who are also at the receiving end of Border Agency attention. For instance, in October 2009, the Bromley and Lewisham local immigration team raided homes across the area, detaining a Bolivian man in New Cross Road, two Turkish men in Pomeroy Street, a Nigerain woman in Catford and a Brazilian man in Forest Hill (Border Agency press release, 29 Oct. 2009; see also this raid in February 2009). The Border Agency are sometimes to be seen out on force on New Cross Road, mounting joint operations with the Transport Police. The deal seems to be that if someone is caught with the wrong ticket or not enough money on their Oyster card they can then be questioned by the Border Agency and ultimately detained. A similar proposal in Arizona has quite rightly been criticised as outrageous, but nobody much seems to notice that it is already happening here. Perhaps next time this happens in New Cross, students and others should demonstrate against it. Saturday, May 22, 2010 A couple of free film screenings coming up at The Broca (4 Coulgate Street, Brockley, London, SE4 ) courtesy of local author and activist Andy Worthington. Thursday May 27, 7 pm: “Outside the Law: Stories from Guantánamo” (Dir. Polly Nash and Andy Worthington, 2009 ). This new documentary tells the story of Guantanamo, focusing on three British prisoners and providing a powerful rebuke to those who believe that Guantanamo holds "the worst of the worst." Tuesday June 1, 7 pm, “Operation Solstice" (Dir. Gareth Morris and Neil Goodwin, 1991) - rare screeing of this documentary about The Battle of the Beanfield, on the 25th anniversary of this often-overlooked confrontation between travellers/political activists and the State (under Margaret Thatcher). I have seen this a few times and it is essential, if harrowing, viewing. Both films followed by a Q&A with Andy who has written about both subjects. Copies of his books "The Guantanamo Files," "The Battle of the Beanfield" and "Stonehenge: Celebration and Subversion" will be for sale at these events. Friday, May 21, 2010 South London Folk Blog is written by Dick Philpott, a singer who put on an open mic night at the Nelson Arms in Wimbledon. As the location suggests, Dicks's focus is on the western lands of South London. Good to see that he has himself contributed to the ever expanding Great South London Songbook, as he has released an album called South London Stroll featuring a sad love song to the River Wandle entitled 'The River is Dead'. Thursday, May 20, 2010 Loads going on at the Brockley Max festival from May 28 to 5 June: music, dance, comedy, art... You can download the full programme here, so I'll just mention a few of the music events for now. It all kicks off with the opening night (Friday 28th) from 4:30 pm in the streets by Brockley station, with bands/performers including Anita Maj, Ben Travers, Jake Twyford, Matt Dolphin, Monkey Rush and Brand Nu, bands from the Felix School of Rock, Mazaika and the Montage Theatre street Jazz dance group (last year's opening party was fun in the sun). Later that same night (9 pm), local singer-songwriter Ceri James is at the Wickham Arms - nice guy with nice voice. On Thursday 3 June, Brockley Central will be promoting a music evening at the Ladywell Tavern. No news yet on the line up, but their night last year was apparently really good. Ten years ago today - that is May 20th 2000 - I was at the Paradise Bar (now the Royal Albert) in New Cross Road for the legendary '2000 Troubled Teenagers' night. Well legendary for those who were there, as it was in the pre-blogging days of the early internet there's barely a trace of it online, so now is the time for a very late review! (programme cover - click to enlarge) The event was styled 'An evening dedicated to the Scottish group Belle & Sebastian', and basically consisted of a packed bar of B&S fans dancing to lots of B&S with some tracks by The Smiths and various indie-poppers. I seem to recall some Japanese people playing B&S cover versions too. A whole night of B&S was not enough for some - I think some people had a picnic first on Greenwich Hill to get in the mood. Yes it was arguably the peak of B&S obsessive fandom, though I'd still say they are my favourite band of the 1990s (and indeed still made some great tracks in the noughties). There was a competition to make plasticine models on a B&S theme, inspired by the line in the band's song Expectations about a girl 'making life size models of the Velvet Underground in clay'. It was won by a girl who made a sculpture entitled 'Fox with a Sombrero to Wear in the Snow' (referencing another B&S song, Fox in the Snow). I believe the night was mainly put on by DJs Joe Egg and Nervous Stephen Fowler. Joe also put on gay indie/retro nights at the Paradise Bar. I see from the programme that Harriet Vine and Rosie Wolfenden were also involved, the founders of Tatty Devine jewellery. The name of the night comes, inevitably, from a yet another B&S song, Beautiful: 'If you knew what's going on in her life, There'd be two hundred troubled teenagers to sit with her. And to talk to her'. Wednesday, May 19, 2010 On St George's Day round Borough market last month there was a bit of Catalonia/England link up with food and music to remind people that it was also La DiadadeSantJordi, when lovers exchange books and roses in Barcelona (a connection also made at Shunt this time last year). The best thing was that it was a very sunny Friday and there were lots of people out drinking in the streets from lunchtime onwards. Outside Southwark Cathedral (and elsewhere in the area too), the Lion's Part theatre performed a George and Dragon folk play. Around the pubs there were also quite a few drinkers dressed up in various George and Dragon outfits. I started off the evening pondering whether, as Billy Bragg would have it, these stories and symbols should be actively wrestled from the BNP, English Defence League and co. who lay claim to them (on the same day the BNP launched its unsuccessful election campaign with a press conference where Nick Griffin was flanked by some bruiser dressed up as St George). By the time I'd moved from Brindisa, to the Market Porter and on to the Miller in Snowsfields I'd stopped pondering as my critical faculties dissolved in the drunken bonhomie. The Guardian column is written by Johnny Dee, once immortalised in The Chesterfields 1987 indie pop anthem Ask Johnny Dee. I wonder if they ever played at The Fountain (now Noodle King), Deptford indie pop central in the late 1980s? Monday, May 17, 2010 The Damned were the first UK punk band to release a single (New Rose in 1976) and the first to get an album out (Damned Damned Damned in February 1977). The band had a strong Croydon connection. They played there first gig there, at a free festival, and bassist Captain Sensible (Ray Burns) was working as a cleaner at Fairfield Hall when he first met drummer Rat Scabies (Chris Millar). But their early rehearsal studio was in Deptford. Their original manager was John Krevine, who owned the Acme Attractions shop in the Kings Road. The latter sold retro clothes and was a key hang out/breeding ground for early punk; Don Letts worked in the shop, playing reggae. According to Scabies: 'John Krevine saw this whole kind of group/punk thing going on and it was initially him who offered to manage us and it was him who had the warehouse down in Deptford that we used to go down and rehearse'. Captain Sensible recalled 'We rehearsed in Krevine's storage arch in Deptford which was an opportunity to purloin some of his retro garb while there'(quoted in The Roxy London WC2: a punk history by Paul Marko). So it may very well have been in a Deptford railway arch that one of my favourite tracks of all times was first written and rehearsed. For me the first 30 seconds of New Rose still constitute the most exciting introduction to a song imaginable - the opening quote from the Shangri-Las'Leader of the Pack' ('is she really going out with him?') , the powerful drums, then Brian James's guitar chords, then the punctuating 'Ah' before the song takes off... perfection. Sunday, May 16, 2010 Burgess Park is such a huge, well-established green space that many people don't realize that it was once a densely populated area of housing, demolished by bombs and slum clearance (an area sometimes known as North Camberwell). If you want to know more about it, there a talk and slideshow on its history, entitled 'Bibles, Baths and Bombs' at East Street Library, 168-170 Old Kent Road, SE17 next Thursday 20 May, 6 - 7:30 pm. The Cuming Museum on Walworth Road was fairly packed on Friday for its Museums at Night event, with a talk on its Lovett collection of urban folklore by Keith from the museum and Chris Roberts telling some Walworth tales. There's a temporary exhibition on at the moment telling the story of Carnaval del Pueblo, the annual Latin American carnival held in Southwark, with costumes, masks and background information on display. Worth checking out, it runs until May 28th. Thursday, May 13, 2010 On a market stall in East Dulwich I recently came across a clipping from the Illustrated London News. It is undated, but various stories on it suggest that it was from Summer 1860. It includes an illustration and account of a banquet at Crystal Palace with guests including Gladstone (then Chancellor of the Exchequer) and 'many members of Parliament and eminent scientific literary men': 'On Saturday week Sir Joseph and Lady Paxton gave a charming fete at their beautiful residence, Rockhills, adjoining the Crystal Palace... After enjoying a promenade in the grounds attached to Sir Joseph's villa, the company, at seven o'clock, proceeded to the north wing of the Crystal Palace, where an elegant dinner was served, covers being laid for 350 persons. After the banquet a ball was improvised, and at ten o'clock the whole upper range of fountains in the Crystal Palace gardens were set in motion, and illumined with various coloured lights, the effect of which upon the falling water was singularly beautiful'. Quite a party evidently. During this period too, the Crystal Palace became a key theme in Russian literature, as Sarah J Young (a CP based lecturer in Russian) discusses at her blog. Essentially the argument was between the writers Chernyshevsky and Dostoevsky. The former, active in revolutionary politics, used the Palace on Sydenham Hill as an image of utopia in his novel What is to be Done? The latter, who wrote about a visit to the Palace in 1863, saw the Crystal Palace and indeed the whole utopian impulse as a doomed attempt at a rationalisation of human life that could never banish the human taste for doubt, suffering and chaos. Sarah has also started exploring wider depictions of the Crystal Palace area in literature. Some of them I had heard of, but I had no idea that 'Lawrence Durrell’s The Black Book (1938) is set at the Queen’s Hotel (in the novel called the Regina) on Church Road, Crystal Palace'. More to come apparently. Tuesday, May 11, 2010 Back in 1999, I was playing three-sided football in Kennington Park with the Association of Autonomous Astronauts (a long story) and somebody told me that Bob Marley had played football of the more traditional two-sided variety there. I filed this away in my brain and then remembered it today - prompted via twitter that this was the anniversary of the great man's death. A quick google search shows that this was apparently true. In fact the wikipedia entry for Kennington Park states that in 1977 Marley frequently visited the Rastafarian Temple in St Agnes Place, next to the park, while he was in London recording the Exodus album, and that 'He also enjoyed playing football with friends in the park'. This Thursday May 13th at South East London Folklore Society, storyteller Janet Dowling talks on Fierce and Fearlesss Women in traditional stories: girls and women who go on adventures, get into scraps, and don't need rescuing! 8 pm start at The Old King's Head, Kings Head Yard, 45-49 Borough High Street, SE1. The last SELFS event I went to was the excellent Southwark Lore back in March at the Old Mayfair Carpet Gallery (301-303 Borough High Street, SE1), a pop up gallery that has since popped off. That night featured a glittering array of south london mythologists including John Constable performing parts of the Southwark Mysteries (subsequently performed in full at Southwark Cathedral last month); Nigel of Bermondsey singing songs including one about Crossbones cemetery; Scott Wood performing his story The Temple of Bacchus (imagining pilgrims visiting the off license of that name in Camberwell in the hope that it is an ancient site), accompanied by the electronica of Richard Sanderson; Vanessa Woolf-Hoyle and Niall Boyce telling chilling tales of Bermondsey in the Blitz and time travel at the George Inn respectively; Chris Roberts extolling the wonders of Walworth and...er....Neil Transpontine, talking about the Lovett collection of good luck charms, held in the Cuming Museum. On the latter subject, this Friday May 14th sees an evening of Superstition and folklore , 6pm - 8pm at the aforementioned Cuming Museum, The Old Town Hall, 151 Walworth Road, London, SE17 1RY (admission free). As part of Museums at Night 2010 there will be a chance to get up close and hands on with some of the museum's stranger objects and the Lovett collection of charms and superstitions. A chance also to share your own superstitions, stories and charms - bring them along if you have them! Monday, May 10, 2010 Written especially to be performed at this year's 'Nunhead & District Museum and Art Gallery', 'They fell asleep' by 'The Nunhead Cemeteries' (featuring one Neil Transpontine) is a song made up of lines from gravestones in Nunhead Cemetery: The darling, the tenderDevoted and treasuredWho fell asleepWho fell asleep Beloved, departedThe deeply regrettedWho fell asleepWho fell asleep The fair and faithful and the brightAlive at noon but dead at nightWho fell asleepWho rest in peace The angel, the mournedWhose time was too shortWho fell asleepWho fell asleep Thursday, May 06, 2010 Sat 8th May: The Lucky Strikes plus Reverend Jim Casy. The Lucky Strikes are a blues/Americana five piece delivering tales of outlaws, desperadoes and chain gangs in 1930s Mississippi. Heavy guitars, impassioned vocals, and bluegrass fiddle and banjo. They hale from Southend but dress like the James Gang. Reverend Jim Casy are honky-tonk-rockabilly preachers. Sat 15th May: Tina Pinder plus New Orleans New Cross Honky-Tonk Acoustic Jam. Tina plays 'swamp music from the Lea Delta'. Her smoky voice and guitar picking bring you blues-riddled songs of heart-stopping drama, in a Tom Waits-meets-Melanie chocolate-and-gravel concoction. Followed by the monthly-ish jam around the old piano. Wednesday, May 05, 2010 'Stories and Songs for South London at the New Cross Inn SE14: London dreamtime will tell tales of monsters in the Blitz, Nigel of Bermondsey will sing lovely songs including One Eye Grey, This is How it Feels and Maximum Wheelie. Stu will play the dulcimer, Chris will do an acoustic set and Jackie will read her own true story of children on fire from "Smoke" magazine'. Don't know all these folk, but Nigel has a lovely voice and this sounds right up Transpontine street. £2 in. Did you know that Britain's most famous Nazi was once a Dulwich-based young Conservative? William Joyce, was born in New York to a Southern Irish loyalist family. According to Martin Pugh: 'After his family settled in Dulwich in 1923 he joined the Junior Imperial League, the youth organisation of the Conservative Party, but he felt betrayed by the British establishment for abandoning the Union with Ireland. Increasingly consumed with hatred towards Catholics, Communists and Jews, he saw fascism as the best means of prosecuting his crusade against his and the nation's enemies' (Hurrah for the Blackshirts! Fascists and Fascism in Britain between the Wars). Pugh states that Joyce joined the British Fascists in December 1923, though he seems to have been active in Conservative politics for longer. After becoming prominent in Mosley's British Union of Fascists (a different organisation from the earlier BF), Joyce left for Germany in 1938. From there he famously broadcast Nazi propaganda, earning the nickname Lord Haw Haw. He was executed in 1946 for treason. So his youthful ambition of becoming the Conservative MP for Chelsea was not to be realized! A number of sites refer to the story that his family home at 7 Allison Grove, SE21, was one of the first hit by a German bomb in the early days of the Blitz. Whether this is true or folklore I am not sure. Tuesday, May 04, 2010 One of the alarming aspects of a potential increase in votes for the BNP on Thursday is that this could be accompanied by an upsurge in violence from emboldened racist/fascist thugs. There have been several attacks in South London during the election campaign. Yesterday, Cormac Hollingsworth, standing as a Labour candidate for Council in South Bermondsey, was leafleting an estate in the area 'when he was punched three times in the face and kicked. Meanwhile the attacker kept up a stream of insults and shouted pro-BNP slogans' (full story at TMP online). South Bermondsey is the only Southwark ward where the BNP is standing a candidate in the election, represented by Nigel Seary of Nelson Square, SE1. I suppose there's some comfort to be taken that they couldn't get anyone to stand who actually lives around the South Bermondsey/Blue Millwall heartland. Meanwhile David Clarke, the BNP candidate for Heathfield ward (Croydon Council) was convicted last week of two separate assaults on anti-racist campaigners who had been giving out leaflets outside East Croydon station. Full story at Croydon Advertiser. The 1959 classic film Room at the Top is 'a savage story of lust and ambition' set in Yorkshire. However, according to film location site Reel Streets the closing shots were actually filmed in Pepys Road, New Cross. Looking at these, I think they are right. The car seems to be heading up to the junction of Pepys and Musgrove Road (on the left). Sunday, May 02, 2010 Kit and Cutter's May Day special at the Deptford Arms last night was really special. It was packed, as indeed it should have been for the presence of one of the most important figures in the last 50 years of English music - Martin Carthy. His two sets were great, a mixture of some of the finest played guitar tunes you are ever likely to hear with awesome folk songs. As a nod to his South London audience he sang Georgie, a song about poaching and gallows on Shooters Hill. A few years ago I sang this on Shooters Hill at the start of a South East London Folklore Society walk. Let's just say his version was better! But his was not the only good voice on display. Keith Kendrick and Sylvia Needham were a revelation to me, they sounded amazing. Highlight for me was Ball O'Yarn - a song that begins 'In the merry month of may, when the men were making hay...' is followed by a predictable end nine months later. Club hosts Kit and Cutter also sing beautifully - would like to see them do a full set some time. The Belles of London City coped admirably with the small and crowded stage to perform some high energy morris dancing (they recently explained it all to Paul Morley - check video here). So obviously it was a great privilege for me to share the bill with this lot. The Neil Transpontine contribution was a short talk/slideshow giving a quick history of May Days in South London (will post up the talk later in the week). That was the last Kit & Cutter at the Deptford Arms, as the pub looks set to be bookiefied. I am sure putting on a folk club there with its smelly toilets and noisy drunks in the public bar has been a bit of a challenge, but it's great to see this kind of music filling rooms in high street pubs. Hopefully they will find another venue soon not too far away. From the Murky Depths reports that a planning application has been submitted to build flats on the site of the Aladdin's Cave' s... Editorial policy - No personal attacks; - No party politics; - No puff pieces for commercial businesses (but reserve the right to say nice things about pubs, cafes and bookshops) - Mentioning something here doesn't imply an endorsement. If you don't like it leave a comment or start your own blog. Comments are subject to approval mainly to prevent spam, critical ones are welcome, but personal attacks or racist nonsense won't get approved.
I close my eyes and listen To the impeccable silence of a January day. Only it isn’t silence, Just absence of human noise— Except for that one small propeller plane Droning across the blue sky. The breath-fogging air is filled with bright pockets of sound. In front of me the rapid flutter of chickadee wings, Followed by a shrill chirp announcing safe arrival in the spirea bush. Behind me a hairy woodpecker’s rhythmic rapping Up and down the trunk of the maple, Probing for insect larvae stunned into stillness by the cold. Above, one long keening call from a red-tailed hawk, A triplet of croaks from a raven, Their swirling flight paths intersecting over my head. In my right ear, a squirrel rasping the shell off a black walnut, In my left, the wind riffling through a cluster of persistent oak leaves. And let’s not forget the cat, Mewing around my boots, Complaining of hunger Or boredom Or both. It’s that time of year again; my halls are decked with dripping snow boots, pants, hats, and mittens. We’ve been frolicking in the fluffy stuff, building forts, packing snowballs, snapping snow scenes for holiday cards. First out the door on a snow day is Dahlia, our resident snow cat. Ever since she was a kitten she’s loved the snow. Her mother, on the other hand, is happy to sit on the doorstep, soaking up the rays, but not setting paw anywhere near that disgusting cold, wet, white stuff. Love it or hate it, we all fall somewhere on the snow spectrum. As a child I was way over to the left, under radically obsessed. The fact that we rarely ever got more than a mushy millimeter of snow in Ireland may have had something to do with it. Even a good frost classified as a “snowy” day. And then one year we got the mother of all snowfalls. It snowed for twenty-four hours straight, and by the end of it, the country was in total lock down, which lasted for weeks. I remember walking along snow banks with the tops of hedges poking out, and coming across cars buried in snow caves at the side of the road. My toddler brother owes his continued existence to his red snow suit. But for that, we’d have lost him, sunk up to his little uxters in a snowdrift. Needless to say, I was in heaven. Now, living in the Northeast US, we get at least one good footer of a storm a year, and sometimes more. When the local forecasters go into hyperbolic mode about the massive storm barreling our way, I still feel that tingle of excitement. And even if I don’t always want to run out and make snow angels, I delight in the transformed landscape, and drink in the sharp tang of snowy air. I believe I inherited my love of snow from my father. He never failed to get excited about a flake of snow, and often, when I call him up and tell him of our latest snowfall, he’ll express deep envy. My mother—not so much. She falls on the other end of the spectrum. Happy to look at a pristine landscape through a window, while snuggled up with a good book and a cup of tea, don’t ask her to step outside. Where do you fall on the snow spectrum? Love it, hate it, or somewhere in between? I have a confession: I hate my cat. Am I ashamed? Mildly so But I make no bones about it She smells She’s fat I have to wipe her ass I didn’t ask her to stay She snuck into the basement and gave birth– How could I say no to five kittens and two eager kid faces? Didn’t think she’d stick around After they were weaned. She did. I had her spayed. She got fat, Didn’t want to live in the basement any more. Winter was coming, How could I refuse? And she’s been lying around ever since. I could buy myself a fur coat with all the money I’ve spent on vet bills, And then she has the nerve To up and leave. Just when I think she’s dead and gone And I’m on the brink of tossing the kitty litter for good, Dredging up a few fond memories to send her on her way, She shows up again. My husband says she’s found herself a fancy man I say, it’s someone with a readier can opener than mine. And yet, what can I say, The animal’s tenacious, A born survivor, Still alive and kicking at 17 You’ve got to admire that In a cat.
Image copyright Getty Images It is the world after taxi app Uber made your smartphone broadcasting your location seem normal. In 2015, after you've paid for your Mocha Frappuccino on your mobile, Starbucks will experiment with bringing it straight to you. Own a Volvo? Since February, Volvo On Call pilot Roam has let couriers leave parcels and groceries in the boot of your car. And in parts of the US, crowdsourced couriers, location data and top secret algorithms seem to be taking the place of dispatchers with two-way radios. We have seen the future, and it is wearing a GPS device. Image copyright volvo Image caption Volvo's Roam service means couriers can find your car wherever you've parked it Image copyright volvo Image caption Your online shopping order can then be left in your boot - while you're doing something more interesting instead Brring brring Same-day delivery firms Urbanfetch, which halted operations in 2000, and Webvan and Kozmo.com - both ceasing trading in 2001 - were prominent names in the dotcom bubble which burst in 2001. Kozmo was particularly memorable for not charging delivery fees, although its overheads included large warehouses full of inventory. What is different today? For one, purchasing on mobile devices is growing by 50% annually, compared with the rest of the e-commerce sector at 10%. It is transforming the way we shop. And mobiles can increasingly be used in delivery as well as purchase. For four years, Jaron Waldman headed Apple's Geo team, leading projects on location services, local search, user positioning, and geo-coding. Image copyright curbside Image caption Curbside lets people take delivery after pulling alongside the kerb of the road. Or, the curb if you're American He left to co-found his own start-up, Curbside. "In a sense, we felt those same-day delivery services are fighting the last war a little bit, trying to get the goods to your house, where what's important is instant," says Mr Waldman. When customers purchase a product and come to collect it, Curbside uses their background location to alert store staff they are on their way. "As you come up, they greet you by name, put it in your backseat, 15 seconds, a really delightful experience," he says. There were two problems he had to solve. Image copyright curbside Image caption Curbside's Jaron Waldman One was getting to the point Curbside could reliably notify shops that someone was nearby to pick up an order, without draining the customer's battery. The second was accurately representing inventory. Store inventory systems are not always perfect, and a shopper might have items in a trolley, while the database believes it is on the shelf. Mr Waldman says he is walking in the footsteps of earlier attempts such as Milo, acquired by eBay in December 2010 for $75m (£48m; €61m). Since then, retailers have put more inventory records online, customers have moved towards mobile purchasing, and mobile devices now need less battery to share a shopper's location. The company plans to experiment in different test markets in San Francisco, which with its proximity to Silicon Valley, has an unusual concentration of early adopters and marketplace noise, says Mr Waldman. Going postal Bastian Lehmann moved to Silicon Valley from London to begin Postmates, a GPS delivery service he describes as an "anti-Amazon system". "Amazon comes along and builds a warehouse outside a city," he says. "We like to say the city's our warehouse. We try to understand the inventory available, hacking the city, and having a fleet of delivery people that distribute these inventories." The company's delivery people operate on bicycles, motorcycles, and in cars, and its fleet has become the largest on-demand delivery service in the US. Postmates does more than 25,000 deliveries a week, covering 17 cities. It costs from $5 to $12 (£3.18-£7.64, €4.06-€9.75) depending on the distance, with additional charges during peak times. Mr Lehmann had the idea for Postmates in 2005, but, like Mr Waldman, says boom in smartphones "made all of this possible". Postmates is now principally constrained by its number of couriers, rather than customers, says Mr Lehmann. Image copyright Sonya Yu Image caption Postmates can pick up dinner from your favourite restaurant and deliver it to your home Image copyright POstmates Image caption You can track your delivery as it moves closer on your smartphone "Getting my laundry done was quite easy in Latin America, but in America I had trouble," quips Jordan Metzner, founder and chief executive of Washio. He had spent five years building a chain of burrito restaurants in Latin America. Spurred by his own need for clean clothes, and intrigued by the success of Uber, Mr Metzner began developing an on-demand service for laundry and dry cleaning. It went live in March 2013 and now operates in six US cities. Users select 30-minute slots for their clothes to be picked up and returned, and there is a one-day turnaround. Like the other entrepreneurs, Mr Metzner says that without smartphones his company would not be possible. "We've built our own algorithm, allowing drivers - we call them ninjas - to be routed and re-routed," he says. "If one was to be delayed or not be able to find parking, his future orders would then be re-routed to other drivers, and orders would be re-fed back to him as soon as he was back on track." Mr Metzner says the company's trade has grown by a factor of eleven in the year leading up to October. In general, he believes, on-demand commerce represents "a massive opportunity and a market that has never been available till now". Image copyright Washio Image caption To posh to wash? Washio will have your smalls picked up, washed, and returned to your door Image copyright Washio Image caption Washio's Jordan Metzner A decade of delivery Much of the innovation has taken place in Silicon Valley. But in the UK, the Samwer brothers' firm Rocket Internet - specialising in cloning successful US models for other markets - launched the EatFirst food delivery app for the City of London in August, followed in November by a laundry app for central London, ZipJet. "Most people consider it an honour when they rip off your business," says Washio's Jordan Metzner. Image copyright Getty Images Image caption GPS tracking technology means you've got a better chance of finding the right chimney - without being left high and dry GPS-driven courier delivery service Shutl has operated in the UK since 2010, and was bought by eBay last year. Its first employee, Guy Westlake, recently left to launch a network of home-based delivery launderers, called Lavanda, currently operating in Islington. Fifteen years after Kozmo, smartphones have made all the difference. Rare outside Japan before the 2004-6 spread of the Blackberry and the 2007 launch of the iPhone, 58% of US adults now own one, and the number is higher in Britain, at 72%. Fifteen years ago, in the dot-com boom, instant-courier services promised much. But now, with smartphones increasingly in every pocket, it seems GPS delivers.
Q: Understanding analog pins in pinMode When passing the pin number in pinMode its possible to use A0 - A7, does it apply only to that methode? How can pinMode expect a number (is it int?) type in case of digital pin another (is it then string?) in case of analog pin? I want to use that in my class methode, is there a way to use that and have my code more readable or should I use the pin numbers? P.S. I have tried to read the source code but I don't understand the uin8_t (I know its a byte, but not how it can understand A5 as an int) Tnx a lot A: pinMode is actually declared as void pinMode(uint8_t, uint8_t); in arduino.h A0 is a defined as a number (somewhere depending on the actual hardware), on an Uno/Nano it translates to 14, and when executing pinMode it translates to the appopriate bit in the correct DDRx register.
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="description" content=""> <meta name="author" content=""> <title>SB Admin 2 - Bootstrap Admin Theme</title> <!-- Bootstrap Core CSS --> <link href="css/bootstrap.min.css" rel="stylesheet"> <!-- MetisMenu CSS --> <link href="css/plugins/metisMenu/metisMenu.min.css" rel="stylesheet"> <!-- Custom CSS --> <link href="css/sb-admin-2.css" rel="stylesheet"> <!-- Custom Fonts --> <link href="font-awesome-4.1.0/css/font-awesome.min.css" rel="stylesheet" type="text/css"> <!-- HTML5 Shim and Respond.js IE8 support of HTML5 elements and media queries --> <!-- WARNING: Respond.js doesn't work if you view the page via file:// --> <!--[if lt IE 9]> <script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script> <script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script> <![endif]--> </head> <body> <div id="wrapper"> <!-- Navigation --> <nav class="navbar navbar-default navbar-static-top" role="navigation" style="margin-bottom: 0"> <div class="navbar-header"> <button type="button" class="navbar-toggle" data-toggle="collapse" data-target=".navbar-collapse"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a class="navbar-brand" href="index.html">SB Admin v2.0</a> </div> <!-- /.navbar-header --> <ul class="nav navbar-top-links navbar-right"> <li class="dropdown"> <a class="dropdown-toggle" data-toggle="dropdown" href="#"> <i class="fa fa-envelope fa-fw"></i> <i class="fa fa-caret-down"></i> </a> <ul class="dropdown-menu dropdown-messages"> <li> <a href="#"> <div> <strong>John Smith</strong> <span class="pull-right text-muted"> <em>Yesterday</em> </span> </div> <div>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque eleifend...</div> </a> </li> <li class="divider"></li> <li> <a href="#"> <div> <strong>John Smith</strong> <span class="pull-right text-muted"> <em>Yesterday</em> </span> </div> <div>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque eleifend...</div> </a> </li> <li class="divider"></li> <li> <a href="#"> <div> <strong>John Smith</strong> <span class="pull-right text-muted"> <em>Yesterday</em> </span> </div> <div>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Pellentesque eleifend...</div> </a> </li> <li class="divider"></li> <li> <a class="text-center" href="#"> <strong>Read All Messages</strong> <i class="fa fa-angle-right"></i> </a> </li> </ul> <!-- /.dropdown-messages --> </li> <!-- /.dropdown --> <li class="dropdown"> <a class="dropdown-toggle" data-toggle="dropdown" href="#"> <i class="fa fa-tasks fa-fw"></i> <i class="fa fa-caret-down"></i> </a> <ul class="dropdown-menu dropdown-tasks"> <li> <a href="#"> <div> <p> <strong>Task 1</strong> <span class="pull-right text-muted">40% Complete</span> </p> <div class="progress progress-striped active"> <div class="progress-bar progress-bar-success" role="progressbar" aria-valuenow="40" aria-valuemin="0" aria-valuemax="100" style="width: 40%"> <span class="sr-only">40% Complete (success)</span> </div> </div> </div> </a> </li> <li class="divider"></li> <li> <a href="#"> <div> <p> <strong>Task 2</strong> <span class="pull-right text-muted">20% Complete</span> </p> <div class="progress progress-striped active"> <div class="progress-bar progress-bar-info" role="progressbar" aria-valuenow="20" aria-valuemin="0" aria-valuemax="100" style="width: 20%"> <span class="sr-only">20% Complete</span> </div> </div> </div> </a> </li> <li class="divider"></li> <li> <a href="#"> <div> <p> <strong>Task 3</strong> <span class="pull-right text-muted">60% Complete</span> </p> <div class="progress progress-striped active"> <div class="progress-bar progress-bar-warning" role="progressbar" aria-valuenow="60" aria-valuemin="0" aria-valuemax="100" style="width: 60%"> <span class="sr-only">60% Complete (warning)</span> </div> </div> </div> </a> </li> <li class="divider"></li> <li> <a href="#"> <div> <p> <strong>Task 4</strong> <span class="pull-right text-muted">80% Complete</span> </p> <div class="progress progress-striped active"> <div class="progress-bar progress-bar-danger" role="progressbar" aria-valuenow="80" aria-valuemin="0" aria-valuemax="100" style="width: 80%"> <span class="sr-only">80% Complete (danger)</span> </div> </div> </div> </a> </li> <li class="divider"></li> <li> <a class="text-center" href="#"> <strong>See All Tasks</strong> <i class="fa fa-angle-right"></i> </a> </li> </ul> <!-- /.dropdown-tasks --> </li> <!-- /.dropdown --> <li class="dropdown"> <a class="dropdown-toggle" data-toggle="dropdown" href="#"> <i class="fa fa-bell fa-fw"></i> <i class="fa fa-caret-down"></i> </a> <ul class="dropdown-menu dropdown-alerts"> <li> <a href="#"> <div> <i class="fa fa-comment fa-fw"></i> New Comment <span class="pull-right text-muted small">4 minutes ago</span> </div> </a> </li> <li class="divider"></li> <li> <a href="#"> <div> <i class="fa fa-twitter fa-fw"></i> 3 New Followers <span class="pull-right text-muted small">12 minutes ago</span> </div> </a> </li> <li class="divider"></li> <li> <a href="#"> <div> <i class="fa fa-envelope fa-fw"></i> Message Sent <span class="pull-right text-muted small">4 minutes ago</span> </div> </a> </li> <li class="divider"></li> <li> <a href="#"> <div> <i class="fa fa-tasks fa-fw"></i> New Task <span class="pull-right text-muted small">4 minutes ago</span> </div> </a> </li> <li class="divider"></li> <li> <a href="#"> <div> <i class="fa fa-upload fa-fw"></i> Server Rebooted <span class="pull-right text-muted small">4 minutes ago</span> </div> </a> </li> <li class="divider"></li> <li> <a class="text-center" href="#"> <strong>See All Alerts</strong> <i class="fa fa-angle-right"></i> </a> </li> </ul> <!-- /.dropdown-alerts --> </li> <!-- /.dropdown --> <li class="dropdown"> <a class="dropdown-toggle" data-toggle="dropdown" href="#"> <i class="fa fa-user fa-fw"></i> <i class="fa fa-caret-down"></i> </a> <ul class="dropdown-menu dropdown-user"> <li><a href="#"><i class="fa fa-user fa-fw"></i> User Profile</a> </li> <li><a href="#"><i class="fa fa-gear fa-fw"></i> Settings</a> </li> <li class="divider"></li> <li><a href="login.html"><i class="fa fa-sign-out fa-fw"></i> Logout</a> </li> </ul> <!-- /.dropdown-user --> </li> <!-- /.dropdown --> </ul> <!-- /.navbar-top-links --> <div class="navbar-default sidebar" role="navigation"> <div class="sidebar-nav navbar-collapse"> <ul class="nav" id="side-menu"> <li class="sidebar-search"> <div class="input-group custom-search-form"> <input type="text" class="form-control" placeholder="Search..."> <span class="input-group-btn"> <button class="btn btn-default" type="button"> <i class="fa fa-search"></i> </button> </span> </div> <!-- /input-group --> </li> <li> <a href="index.html"><i class="fa fa-dashboard fa-fw"></i> Dashboard</a> </li> <li> <a href="#"><i class="fa fa-bar-chart-o fa-fw"></i> Charts<span class="fa arrow"></span></a> <ul class="nav nav-second-level"> <li> <a href="flot.html">Flot Charts</a> </li> <li> <a href="morris.html">Morris.js Charts</a> </li> </ul> <!-- /.nav-second-level --> </li> <li> <a href="tables.html"><i class="fa fa-table fa-fw"></i> Tables</a> </li> <li> <a href="forms.html"><i class="fa fa-edit fa-fw"></i> Forms</a> </li> <li class="active"> <a href="#"><i class="fa fa-wrench fa-fw"></i> UI Elements<span class="fa arrow"></span></a> <ul class="nav nav-second-level"> <li> <a class="active" href="panels-wells.html">Panels and Wells</a> </li> <li> <a href="buttons.html">Buttons</a> </li> <li> <a href="notifications.html">Notifications</a> </li> <li> <a href="typography.html">Typography</a> </li> <li> <a href="grid.html">Grid</a> </li> </ul> <!-- /.nav-second-level --> </li> <li> <a href="#"><i class="fa fa-sitemap fa-fw"></i> Multi-Level Dropdown<span class="fa arrow"></span></a> <ul class="nav nav-second-level"> <li> <a href="#">Second Level Item</a> </li> <li> <a href="#">Second Level Item</a> </li> <li> <a href="#">Third Level <span class="fa arrow"></span></a> <ul class="nav nav-third-level"> <li> <a href="#">Third Level Item</a> </li> <li> <a href="#">Third Level Item</a> </li> <li> <a href="#">Third Level Item</a> </li> <li> <a href="#">Third Level Item</a> </li> </ul> <!-- /.nav-third-level --> </li> </ul> <!-- /.nav-second-level --> </li> <li> <a href="#"><i class="fa fa-files-o fa-fw"></i> Sample Pages<span class="fa arrow"></span></a> <ul class="nav nav-second-level"> <li> <a href="blank.html">Blank Page</a> </li> <li> <a href="login.html">Login Page</a> </li> </ul> <!-- /.nav-second-level --> </li> </ul> </div> <!-- /.sidebar-collapse --> </div> <!-- /.navbar-static-side --> </nav> <div id="page-wrapper"> <div class="row"> <div class="col-lg-12"> <h1 class="page-header">Panels and Wells</h1> </div> <!-- /.col-lg-12 --> </div> <!-- /.row --> <div class="row"> <div class="col-lg-4"> <div class="panel panel-default"> <div class="panel-heading"> Default Panel </div> <div class="panel-body"> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> <div class="panel-footer"> Panel Footer </div> </div> </div> <!-- /.col-lg-4 --> <div class="col-lg-4"> <div class="panel panel-primary"> <div class="panel-heading"> Primary Panel </div> <div class="panel-body"> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> <div class="panel-footer"> Panel Footer </div> </div> </div> <!-- /.col-lg-4 --> <div class="col-lg-4"> <div class="panel panel-success"> <div class="panel-heading"> Success Panel </div> <div class="panel-body"> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> <div class="panel-footer"> Panel Footer </div> </div> </div> <!-- /.col-lg-4 --> </div> <!-- /.row --> <div class="row"> <div class="col-lg-4"> <div class="panel panel-info"> <div class="panel-heading"> Info Panel </div> <div class="panel-body"> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> <div class="panel-footer"> Panel Footer </div> </div> </div> <!-- /.col-lg-4 --> <div class="col-lg-4"> <div class="panel panel-warning"> <div class="panel-heading"> Warning Panel </div> <div class="panel-body"> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> <div class="panel-footer"> Panel Footer </div> </div> </div> <!-- /.col-lg-4 --> <div class="col-lg-4"> <div class="panel panel-danger"> <div class="panel-heading"> Danger Panel </div> <div class="panel-body"> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> <div class="panel-footer"> Panel Footer </div> </div> </div> <!-- /.col-lg-4 --> </div> <!-- /.row --> <div class="row"> <div class="col-lg-4"> <div class="panel panel-green"> <div class="panel-heading"> Green Panel </div> <div class="panel-body"> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> <div class="panel-footer"> Panel Footer </div> </div> <!-- /.col-lg-4 --> </div> <div class="col-lg-4"> <div class="panel panel-yellow"> <div class="panel-heading"> Yellow Panel </div> <div class="panel-body"> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> <div class="panel-footer"> Panel Footer </div> </div> <!-- /.col-lg-4 --> </div> <div class="col-lg-4"> <div class="panel panel-red"> <div class="panel-heading"> Red Panel </div> <div class="panel-body"> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> <div class="panel-footer"> Panel Footer </div> </div> <!-- /.col-lg-4 --> </div> </div> <!-- /.row --> <div class="row"> <div class="col-lg-12"> <div class="panel panel-default"> <div class="panel-heading"> Collapsible Accordion Panel Group </div> <!-- .panel-heading --> <div class="panel-body"> <div class="panel-group" id="accordion"> <div class="panel panel-default"> <div class="panel-heading"> <h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#collapseOne">Collapsible Group Item #1</a> </h4> </div> <div id="collapseOne" class="panel-collapse collapse in"> <div class="panel-body"> Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. </div> </div> </div> <div class="panel panel-default"> <div class="panel-heading"> <h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#collapseTwo">Collapsible Group Item #2</a> </h4> </div> <div id="collapseTwo" class="panel-collapse collapse"> <div class="panel-body"> Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. </div> </div> </div> <div class="panel panel-default"> <div class="panel-heading"> <h4 class="panel-title"> <a data-toggle="collapse" data-parent="#accordion" href="#collapseThree">Collapsible Group Item #3</a> </h4> </div> <div id="collapseThree" class="panel-collapse collapse"> <div class="panel-body"> Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum. </div> </div> </div> </div> </div> <!-- .panel-body --> </div> <!-- /.panel --> </div> <!-- /.col-lg-12 --> </div> <!-- /.row --> <div class="row"> <div class="col-lg-6"> <div class="panel panel-default"> <div class="panel-heading"> Basic Tabs </div> <!-- /.panel-heading --> <div class="panel-body"> <!-- Nav tabs --> <ul class="nav nav-tabs"> <li class="active"><a href="#home" data-toggle="tab">Home</a> </li> <li><a href="#profile" data-toggle="tab">Profile</a> </li> <li><a href="#messages" data-toggle="tab">Messages</a> </li> <li><a href="#settings" data-toggle="tab">Settings</a> </li> </ul> <!-- Tab panes --> <div class="tab-content"> <div class="tab-pane fade in active" id="home"> <h4>Home Tab</h4> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> <div class="tab-pane fade" id="profile"> <h4>Profile Tab</h4> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> <div class="tab-pane fade" id="messages"> <h4>Messages Tab</h4> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> <div class="tab-pane fade" id="settings"> <h4>Settings Tab</h4> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> </div> </div> <!-- /.panel-body --> </div> <!-- /.panel --> </div> <!-- /.col-lg-6 --> <div class="col-lg-6"> <div class="panel panel-default"> <div class="panel-heading"> Pill Tabs </div> <!-- /.panel-heading --> <div class="panel-body"> <!-- Nav tabs --> <ul class="nav nav-pills"> <li class="active"><a href="#home-pills" data-toggle="tab">Home</a> </li> <li><a href="#profile-pills" data-toggle="tab">Profile</a> </li> <li><a href="#messages-pills" data-toggle="tab">Messages</a> </li> <li><a href="#settings-pills" data-toggle="tab">Settings</a> </li> </ul> <!-- Tab panes --> <div class="tab-content"> <div class="tab-pane fade in active" id="home-pills"> <h4>Home Tab</h4> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> <div class="tab-pane fade" id="profile-pills"> <h4>Profile Tab</h4> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> <div class="tab-pane fade" id="messages-pills"> <h4>Messages Tab</h4> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> <div class="tab-pane fade" id="settings-pills"> <h4>Settings Tab</h4> <p>Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.</p> </div> </div> </div> <!-- /.panel-body --> </div> <!-- /.panel --> </div> <!-- /.col-lg-6 --> </div> <!-- /.row --> <div class="row"> <div class="col-lg-4"> <div class="well"> <h4>Normal Well</h4> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> </div> <!-- /.col-lg-4 --> <div class="col-lg-4"> <div class="well well-lg"> <h4>Large Well</h4> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> </div> <!-- /.col-lg-4 --> <div class="col-lg-4"> <div class="well well-sm"> <h4>Small Well</h4> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue.</p> </div> </div> <!-- /.col-lg-4 --> </div> <!-- /.row --> <div class="row"> <div class="col-lg-12"> <div class="jumbotron"> <h1>Jumbotron</h1> <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing, posuere lectus et, fringilla augue. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum tincidunt est vitae ultrices accumsan. Aliquam ornare lacus adipiscing.</p> <p><a class="btn btn-primary btn-lg" role="button">Learn more</a> </p> </div> </div> <!-- /.col-lg-12 --> </div> <!-- /.row --> </div> <!-- /#page-wrapper --> </div> <!-- /#wrapper --> <!-- jQuery Version 1.11.0 --> <script src="js/jquery-1.11.0.js"></script> <!-- Bootstrap Core JavaScript --> <script src="js/bootstrap.min.js"></script> <!-- Metis Menu Plugin JavaScript --> <script src="js/plugins/metisMenu/metisMenu.min.js"></script> <!-- Custom Theme JavaScript --> <script src="js/sb-admin-2.js"></script> </body> </html>
Q: How do I optimize this logic? I have following scenario:- if( condition1 == true ) { /* a code block or fuction call */ } else { if( condition2 == true ) { /* same code block or function call */ } } Here, a particular block of code has to be executed if a condition1 is true. Else if condition1 is false but if condition2 is true, then also same block of code has to be executed. How can I write this logic in an efficient way so as to not write same block twice, or call same fuction twice. A: With a simple logical OR (very basic stuff for any language). if(condition1 || condition2) { // Code } Using == (or !=) is often discouraged, since adds verbosity needlessly. Writing condition1 is the same as condition1 == true and testing for false can be made with !condition1 (the logical NOT operator).
--- abstract: | Two red supergiants of the Per OB1 association, RS Per and T Per, have been observed in H band using the MIRC instrument at the CHARA array. The data show clear evidence of departure from circular symmetry. We present here new techniques specially developed to analyze such cases, based on state-of-the-art statistical frameworks. The stellar surfaces are first modeled as limb-darkened discs based on SATLAS models that fit both MIRC interferometric data and publicly available spectrophotometric data. Bayesian model selection is then used to determine the most probable number of spots. The effective surface temperatures are also determined and give further support to the recently derived hotter temperature scales of red supergiants. The stellar surfaces are reconstructed by our model-independent imaging code SQUEEZE, making use of its novel regularizer based on Compressed Sensing theory. We find excellent agreement between the model-selection results and the reconstructions. Our results provide evidence for the presence of near-infrared spots representing about 3-5% of the stellar flux. author: - 'F. Baron, J. D. Monnier, L.L. Kiss, H. R. Neilson, M. Zhao, M. Anderson, A. Aarnio, E. Pedretti, N. Thureau, T.A. ten Brummelaar, S.T. Ridgway, H.A. McAlister, J. Sturmann, L. Sturmann, N. Turner' title: | CHARA/MIRC observations of two M supergiants in Perseus OB1:\ Temperature, Bayesian modeling, and compressed sensing imaging --- Introduction ============ Red supergiants (RSGs) represent an important but still poorly characterized evolutionary phase of massive stars. As He-burning evolved stars, their surfaces present very cool effective temperatures between 3400 and 4100 K (spectral type of late-K to M) and average luminosities 20 000 to 300 000 $L_{\odot}$ [@Levesque2005; @Levesque2006]. RSGs are amongst the largest stars, with radii up to 1500 $R_\odot$ and masses in the 10-25 $M_{\odot}$ range [@Levesque2005; @Massey2008; @Levesque2010]. The resulting low gravity has the consequence that material from the outer envelope can easily escape to the interstellar medium, giving rise to circumstellar envelopes [@Danchi1994] and very significant mass-loss rates ranging between $10^{-8}$ to $10^{-4} M_{\odot}$ $\text{yr}^{-1}$ [@Massey2005; @Verhoelst2009; @Sargent2011]. The actual mechanism of the mass loss is still unknown but is likely to involve the combined effects of turbulent pressure from large convection cells and radiation pressure on molecular lines [@Josselin2007], as well as stellar magnetism [@Grunhut2010; @Auriere2010] and Alfv[é]{}n winds [@Cuntz1997; @Airapetian2010]. Through these processes, RSGs are key agents of nucleosynthesis and chemical enrichment of the Galaxy. In the last decade, photometric and spectroscopic observations have allowed several breakthroughs in our understanding of their dynamical convective patterns. RSGs have long been known for their semi-regular short term optical variations with periods of the order of hundreds of days [@Kiss2006]. Historically, this variability was usually attributed to radial pulsation, and while this path is still being investigated [@Yang2012], the full explanation is now thought to involve variation of a few large granules on the surface of the RSGs. Such huge convection cells are suggested by theory and simulations [@Schwarzschild1975; @Stothers2010], and supported by recent spectroscopic observations that detected large amounts of material moving through the photosphere of RSGs [@Josselin2007; @Gray2008; @Ohnaka2009; @Ohnaka2011; @Ohnaka2013]. Modeling these convection effects requires a precise determination of the temperature of the RSGs. The last decade of measurements of effective temperatures of RSGs seemed to indicate much cooler temperatures than predicted by stellar evolutionary theory, until @Levesque2005 used MARCS stellar atmosphere models with state-of-the art (at the time) treatment of molecular opacities [@Gustafsson1975; @Plez2003] to fit moderate-resolution optical spectrophotometry of Galactic RSGs. They derived a warmer effective temperature scale for RSGs of Galactic metallicity than previous studies, in rough agreement with the Geneva evolutionary tracks [@Meynet2003; @Levesque2006]. Long-baseline interferometry brings unique insights to the study of RSGs. Because optically resolving RSGs by interferometry gives direct access to their angular diameters, it is complementary to spectrophotometry. In a recently published survey of $74$ RSGs with the Palomar Testbed Interferometer (PTI), @vanBelle2009 thus derived a slightly warmer temperature scale than that of @Levesque2005. Convection processes are involved in the creation of hotspots, and determining how the formation and evolution of hotspots is correlated to the fundamental stellar parameters is a difficult task. The presence of spots and large convection cells affects the estimation of these fundamental parameters, as it leads to short-term photometric variability [@Chiavassa2011] in addition to long-term effects [@Kiss2006], while also producing photocenter shifts that throw off diameter determination [@Chiavassa2009]. High angular resolutions techniques are becoming essential tools to understand these hotspots. Using aperture masking at the William Herschel Telescope, @Buscher1990 and @Tuthill1997 found bright asymmetries at visible wavelengths on the surface of M-supergiants ($\alpha$ Ori $\alpha$ Sco, $\alpha$ Her), with timescale variations of order a few months possibly explained by the presence of hotspots. Due to its large angular size, $\alpha$ Ori then became the best-studied individual RSG in terms of multi-wavelength surface imaging. Using the COAST interferometer, @Young2000 found a strong variation in the apparent asymmetry as a function of wavelength, with the detection of hotspots in the visible, but only featureless disk in J-band. This has led to the suggestion that the bright spots are unobscured regions of elevated temperature, seen through a geometrically-extended and line-blanketed atmosphere, in which the features are seen along lines of sight for which the atmospheric opacity has been reduced as the result of activity (e.g. convection) at the stellar surface. In H or J band, the continuum opacity is close to minimum in these cool atmospheres [@Woodruff2009], one would expect to see the photosphere, with negligible or no evidence of hotspots at this band. However, interferometric observations of AGB stars (somewhat less massive and less luminous than RSGs) have revealed that a significant fraction of these present strong closure phase signals [@Ragland2006]. These signals may be explained by unresolved bright spots, though circumstellar emission could not ruled out. While the envelopes and dust shells of several RSGs have been successfully imaged and shown to be very often asymmetric [@Monnier2004a; @Kervella2011], resolving actual surface features has proved more difficult. It is only recently that @Haubois2009 reported the unambiguous detection of two hotspots on $\alpha$ Ori by the IOTA interferometer in H band, while @Chiavassa2010a found a similar number of spots in the same band on VX Sgr using with VLTI/AMBER. These spots are thought to be the imprint of giant convection cells based on 3D stellar convection models [@Freytag2002; @Chiavassa2009; @Stothers2010; @Chiavassa2010b]. We present in section \[sec:obs\] of this paper our observations of two RSGs from the Per OB1 association, T Per and RS Per, using the world-leading resolution of the CHARA Array to resolve their surface in H-band. Then in Section \[sec:modeling\] we attempt to model the stellar surface asymmetries as spots, and we devise a procedure to determine the probabilities of these models based on state-of-the-art Bayesian techniques. Using our best estimates of the stellar diameters, we then derive the linear sizes, bolometric fluxes, and temperatures of both stars. Finally in Section \[sec:image\_reconstruction\] we present model-independent images of both RSGs obtained with the latest version of the software SQUEEZE and a new regularizer developed for spotted star reconstruction. Observations {#sec:obs} ============ ![Combined ([*u, v*]{}) coverage of our observations of T Per (left) and RS Per (right). The telescope configuration used was S2-E2-W1-W2. The radial dispersion is due to the use of MIRC low spectral mode with 8 channels.](tper_uv.eps "fig:"){width="0.5\linewidth"}![Combined ([*u, v*]{}) coverage of our observations of T Per (left) and RS Per (right). The telescope configuration used was S2-E2-W1-W2. The radial dispersion is due to the use of MIRC low spectral mode with 8 channels.](rsper_uv.eps "fig:"){width="0.5\linewidth"} [ccccc]{} 2007 Jul 28 & T Per & 2 & HD 9022 & Chopper\ 2007 Jul 29 & T Per & 1 & $\upsilon$ And & Fiber\ 2007 Jul 30 & RS Per & 1 & $\upsilon$ And & Chopper\ 2007 Jul 31 & RS Per & 1 & 37 And & DAQ\ 2007 Aug 2 & RS Per & 2 & $\sigma$ Cyg, $\upsilon$ And & DAQ\ \[tab:calibrators\] RS Per and T Per ---------------- In the following we will present our observations of two Red Supergiants from the Per OB1 association, RS Per (HD 14488) and T Per (HD 14142). RS Per is a firmly established member of the $\chi$ Per/NGC 884 cluster, while T Per lies about 2 degrees North above the Double Cluster. Both are M supergiants, with RS Per classed as M4I, and T Per as M2I. Based on previous results [@Gonzalez2000; @Slesnick2002; @Levesque2005], T Per has a temperature typical of most M supergiants in the Per OB1 association (average temperature in the litterature $T \simeq 3850$ K), while RS Per is thought to be slightly cooler ($T \simeq 3500$ K). It is interesting to note that they both display comparable long photometric periods, $2500 \pm 460$ days for T Per, $4200 \pm 1500$ days for RS Per [@Kiss2006], thought to be related to a global pulsation mode. RS Per also displays a shorter period of $245$ days. CHARA/MIRC observations ----------------------- Our observations were carried out on five nights in July-August 2007 at the Georgia State University Center for High Angular Resolution Astronomy (CHARA) interferometer array using the Michigan Infra-Red Combiner (MIRC). The CHARA array, located on Mount Wilson, consists of six 1 m telescopes. Thanks to its 15 baselines ranging from 34 m to 331 m, it achieves the highest angular resolution of optical interferometers, up to $\sim$0.5 mas in $H$ band [@tenBrummelaar2005]. The Michigan InfraRed Combiner (MIRC) instrument was used to combine the H-band light ($1.5$-$1.8 \mu$m) of four CHARA telescopes at low spectral resolution (R=$30$). This provided six visibilities, four closure phases, and four triple amplitudes simultaneously in each of the eight 30-nm wide spectral channels [@Monnier2004b; @Monnier2006]. Using the same W1-W2-S2-E2 configuration of CHARA that was used for surface imaging of Altair [@Monnier2007], we achieved adequate ([*u,v*]{}) coverage of each target for imaging. The longest baseline in this configuration is $251.3$ m, corresponding to a resolution of $1.3$ mas at $1.6 \mu$m. We secured 4 data blocks for RS Per and 3 for T Per, each data block corresponding to a continuous observation of a target during about 20 minutes. The data were reduced by the latest version of the MIRC pipeline written by John Monnier (as of November 2012) and previously described in @Monnier2007. The pipeline computes the squared visibilities using Fourier Transforms, then averages them. The bispectrum is formed using the phases and amplitudes of three baselines that form a closed triangle. For each data block we use the best method available for amplitude calibration: for T Per the fluxes were estimated by the chopper method, and for RS Per both the chopper and DAQ method [@Monnier2008]. Our targets were observed along reference calibrators to correct for the usual transfer function variations that occur during the night due to atmospheric and optical changes in the beam path [@Perrin2003]. Our observations were typical of July-August weather, with transfer functions remaining very stable (less than 0.2 drop in visibility during the nights). The calibrators were modeled as uniform discs as indicated in Table \[tab:calibrators\]. Note that $37$ And has recently been resolved by MIRC as a binary ; however the flux ratio of the components is greater than 1:100 and thus this does not significantly impact our calibration. As the brightness distributions of both targets is not expected to vary significantly during our observing run (see Table \[tab:calibrators\] for the exact observing dates), all nights were combined into a single data file for each target, resulting in data sets that total 419 power spectra and 264 bispectra for T Per and 523 power spectra and 326 bispectra for RS Per. Systematic errors are taken into account by applying additive and multiplicative errors on the data. All the following nominal values were determined based on the expertise of the MIRC group with MIRC 2007 data (Monnier, private comm.), and based on the in-depth study of $\upsilon$ And data acquired during the same nights [@Zhao2011]. Additive errors, that correct for biases at low fringe contrast were set to $2 \times 10^{-4}$ for squared visibilities and $10^{-5}$ for triple amplitudes. Multiplicative errors, that correct for the uncertainties in the transfer function, were $20\%$ on squared visibilities and $30\%$ on triple amplitudes. Based on the analysis of the closure phase statistics made by @Zhao2011, an error floor of $1 {\ensuremath{^\circ}}$ is chosen on closure phases. To account for the unreliability of closure estimation at low flux, each closure error is further increased by $30/S_\text{T3amp}^2$ degrees, where $S_\text{T3amp}$ is the signal-to-noise of the corresponding triple amplitude. Finally, to account for the difficulty of estimating rapidly varying closures, an error equal to 10% of the closure gradient in the spectral domain is further added. Model-fitting {#sec:modeling} ============= ![Power spectrum and closure phase fits for T Per. []{data-label="fig:fits_tper"}](tper_pow.eps "fig:"){width="\linewidth"} ![Power spectrum and closure phase fits for T Per. []{data-label="fig:fits_tper"}](tper_clos.eps "fig:"){width="\linewidth"} ![Power spectrum and closure phase fits for RS Per.[]{data-label="fig:fits_rsper"}](rsper_pow.eps "fig:"){width="\linewidth"} ![Power spectrum and closure phase fits for RS Per.[]{data-label="fig:fits_rsper"}](rsper_clos.eps "fig:"){width="\linewidth"} All the available square visibilities and closure phases are plotted on Fig. \[fig:fits\_tper\] and Fig. \[fig:fits\_rsper\] as a function of their spatial frequency. The power spectrum curves are typical of limb-darkened stellar discs, while the closure phases clearly depart from zero, indicating the presence of strong resolved asymmetries on the stellar surfaces. Based on the previous interferometric results on M supergiants in the literature, we expect these to be due to the presence of spots. Spotless models: limb-darkening {#sec:ldd} ------------------------------- ![Constraints on the limb-darkening. Top panel: $\chi^2$ surface for the linearly limb-darkened discs of T Per (left) and RS Per (right) based on interferometric data. Bottom panel: SATLAS limb-darkening models for a range of temperature, gravity, and mass values compatible with previous observations of RS Per and T Per.[]{data-label="fig:ldd"}](tper_ldd.eps "fig:"){width="0.5\linewidth"}![Constraints on the limb-darkening. Top panel: $\chi^2$ surface for the linearly limb-darkened discs of T Per (left) and RS Per (right) based on interferometric data. Bottom panel: SATLAS limb-darkening models for a range of temperature, gravity, and mass values compatible with previous observations of RS Per and T Per.[]{data-label="fig:ldd"}](rsper_ldd.eps "fig:"){width="0.5\linewidth"} ![Constraints on the limb-darkening. Top panel: $\chi^2$ surface for the linearly limb-darkened discs of T Per (left) and RS Per (right) based on interferometric data. Bottom panel: SATLAS limb-darkening models for a range of temperature, gravity, and mass values compatible with previous observations of RS Per and T Per.[]{data-label="fig:ldd"}](atlas_ldd.eps "fig:"){width="\linewidth"} Before attempting a spot search, we first sought to roughly characterize the size and brightness distribution of the stellar discs. Our model-fitting code FITNESS was used to fit several limb-darkening models (square root, quadratic, power law) to the power spectra and triple amplitudes. FITNESS is a straightforward combination of grid search to identify the global $\chi^2$ minima and Levenberg-Marquardt to refine the parameters. The best fits were obtained for the linear law and the Hestroffer power law [@Hestroffer1997], but they both show the existence of a strong covariance between the limb-darkened angular diameter and the limb-darkening coefficient. The issue is illustrated on Figure \[fig:ldd\] (top), where the reduced $\chi^2$ surface is plotted as a function of both parameters. For both targets, the problem is mainly due to the lack of high signal-to-noise data on the first visibility lobes. To increase the precision of the fit on the angular diameter, the limb-darkening coefficients have to be constrained. @Haubois2009 reported successfully fitting the visibility curve of $\alpha$ Ori (M2 type, $T_{\text{eff}} \simeq 3600$ K) with a linear coefficient $\alpha = 0.43 \pm 0.03$ (roughly corresponding to a Hestroffer law with coefficient $0.3$–$0.4$). Beyond this empirical result, it seems non-obvious whether conventional plane-parallel 1D radiative codes such as ATLAS [@Kurucz1992; @Castelli2004] or MARCS [@Gustafsson1975] may be reliably predict the intensity profiles of RSGS. RSGs are notoriously difficult to model: their atmospheres are very extended, which invalidates the assumption of plane-parallel geometry, and their very cool temperatures require an advanced treatment of molecular opacities. However more recent codes that assume spherical geometry such as MARCS-spherical [@Gustafsson2008], SATLAS [@Lester2008] and PHOENIX [@Hauschildt1999] have demonstrated successful results on comparably cool M giants or supergiants [@Wittkowski2004; @Wittkowski2006; @Wittkowski2012]. We used the latest SATLAS code (with improved ODF treatment and fixed H2O lines) to weakly constrain the limb-darkening in H band for both RSGs, with parameters based around the values found in @Gonzalez2000 and @Slesnick2002: temperatures ranging from 3100 K to 4000 K (steps of 100K), $\log g = -0.5$ to $0.5$ and a fixed metallicity $[\text{Fe/Z}]=-0.5$ [@Gonzalez2000]. Figure \[fig:ldd\] (bottom) presents the results of these simulations as a band of possible brightness distributions. The intensity profiles are weakly dependent on the temperature and are mostly determined by the mass and surface gravity. They are characteristics of spherical codes, showing a sudden drop of intensity at the Rosseland radius, where the Rosseland mean opacity equals unity and where most photons escape the atmosphere. As shown on Figure \[fig:ldd\], the brightness distributions can adequately be bounded by two Hestroffer laws with coefficients $0.29$ and $0.36$. Injecting this prior into the fit, we found the Hestroffer limb-darkening coefficients to be $\alpha = 0.32 \pm 0.2$ for T Per and $\alpha = 0.34 \pm 0.2$ for RS Per. Assuming that both RSGs have similar masses, as the angular diameter of T Per is smaller, we expect a stronger gravity at its surface, which indeed corresponds to a lower limb-darkening coefficient. Taking into account all statistical errors due to the visibility measurements and the calibration via data bootstrapping, we also obtained the following limb-darkened diameters: for T Per: $\theta_{\rm LD} = 2.01\pm 0.03$ mas, with $\chi^2=1.92$ at the nominal values. For RS Per, $\theta_{\rm LD} = 3.05\pm 0.05$ mas and with $\chi^2=2.37$. Because non-zero closure phases cannot be fitted by a limb-darkening model, the “full” $\chi^2$ – including the closure phase data – are larger, $\chi^2 = 7.8$ for RS Per and $\chi^2 = 9.4$ for T Per, unambiguously indicating the presence of significant asymmetries on the stellar surfaces. Models with one or two spots ---------------------------- ![Simple modeling of T Per: likelihood maps for one- and two-spot models (top); corresponding best fitting images for a dark spot, bright spot and two spots (bottom).[]{data-label="fig:tper_spots"}](tper_chi2one.eps "fig:"){width="0.5\linewidth"}![Simple modeling of T Per: likelihood maps for one- and two-spot models (top); corresponding best fitting images for a dark spot, bright spot and two spots (bottom).[]{data-label="fig:tper_spots"}](tper_chi2two.eps "fig:"){width="0.5\linewidth"} ![Simple modeling of T Per: likelihood maps for one- and two-spot models (top); corresponding best fitting images for a dark spot, bright spot and two spots (bottom).[]{data-label="fig:tper_spots"}](tper_onespot.eps "fig:"){width="0.33\linewidth"}![Simple modeling of T Per: likelihood maps for one- and two-spot models (top); corresponding best fitting images for a dark spot, bright spot and two spots (bottom).[]{data-label="fig:tper_spots"}](tper_brightspot.eps "fig:"){width="0.33\linewidth"}![Simple modeling of T Per: likelihood maps for one- and two-spot models (top); corresponding best fitting images for a dark spot, bright spot and two spots (bottom).[]{data-label="fig:tper_spots"}](tper_twospots.eps "fig:"){width="0.33\linewidth"} ![Simple modeling of RS Per: likelihood map of the spot location (left) and best fitting image with a dark spot (right).[]{data-label="fig:rsper_spots"}](rsper_chi2one.eps "fig:"){width="0.5\linewidth"}![Simple modeling of RS Per: likelihood map of the spot location (left) and best fitting image with a dark spot (right).[]{data-label="fig:rsper_spots"}](rsper_onespot.eps "fig:"){width="0.5\linewidth"} [lcccc]{} $\chi^2$ & $9.4$ & 2.24 & 2.64 & 1.95\ $\log Z (\pm 0.02)$ & $-0.35$ & $0.87$ & $1.23$ & $0.20$\ $\theta_{\star}$ & 2.01 & 2.02 & 2.02 & 2.02\ $f_{\text{spot}}$ & $\ldots$ & 4 % & 5% & 3%, 4%\ $(r_{\text{spot}}, \theta_{\text{spot}})$ & $\ldots$ & $0.21, -135 {\ensuremath{^\circ}}$ & $0.22, 134 {\ensuremath{^\circ}}$ & $0.22, 134 {\ensuremath{^\circ}}$\ & & & & $0.73, 238 {\ensuremath{^\circ}}$\ \[tab:tper\_fits\] [lcc]{} $\chi^2$ & $7.8$ & 1.2\ $\log Z (\pm 0.05)$ & $-0.35$ & $0.32$\ $\theta_{\star}$(mas) & 3.05 & 3.06\ $f_{\text{spot}}$ & $\ldots$ & 4 %\ $r_{\text{spot}}$(mas), $\theta_{\text{spot}}$ & $\ldots$ & $1.43, 147 {\ensuremath{^\circ}}$\ \[tab:rsper\_fits\] The most economical assumption to explain the closure phases is the presence of spots on the stellar surface. The formation of complex granulations is expected on the surface [@Freytag2002; @Chiavassa2011], and at the resolution and dynamic contrast provided by interferometry, these appear as compact spots. Here we attempted to search only for the most prominent features, with the assumption that the stellar surface could be described as a limb-darkened disc with a limited number of these spots. Previous studies on $\alpha$ Ori demonstrated that spots may be modeled well by Gaussians or uniform ellipses [@Young2000; @Haubois2009]. We also chose to use ellipses, so that each spot is modeled by six parameters: its coordinates on the stellar surface, its size, its flux contribution, its orientation angle and its ellipticity. Our priors on these parameters were flat. During model-fitting, spots were not constrained to be brighter than the stellar surface (hot) and thus dark (cold) spots were not ruled out. Spots lying on the circumference of the stellar disc were also searched for. Fitting spots is a difficult numerical problem due to the properties of the $\chi^2$. First, while the bispectrum probability density is generally approximated by a convex normal distribution [@Meimon2005; @Thiebaut2008], this approximation breaks down for small triple amplitudes, e.g. for very resolved targets such as these RSGs. Therefore we revert to use separate $\chi^2$ expressions for closures and triple amplitudes. The likelihood expression for the closure phases may then be chosen based $2\pi$-wrapped normal distribution [@Haniff1991] or the von Mises distribution, and in general is non-convex. Moreover, because the phase information is only partially retrieved from closure phases, the $\chi^2$ is multimodal, i.e. there exist local minima into which minimizers can easily get trapped [@Meimon2008]. The $\chi^2$-minimization strategy has then to take both non-convexity and multimodality into account. Due to the relatively large number of parameters (eight to fourteen: two for the stellar disc description, plus six per spot), our strategy consisted in a grid search on the positions of the spots, with a three-step Levenberg-Marquardt minimization at each given position. During the first step, only the stellar disc parameters (diameter and Hestroffer coefficient) and the spot flux are allowed to vary. During the second step, the shape of the spots (size, aspect ratio, orientation) is optimized, then in the third step consists all the parameters become free to settle. Figure \[fig:fits\_tper\] and Figure \[fig:fits\_rsper\] show that overall the fits provided by our models are not very satisfactory on the short baselines, where our models underestimated the visibilities. This is due to our naive assumption of a linearly limb-darkened disc model, compared to more refined models (e.g. SATLAS, Figure \[fig:ldd\]), and possibly to the presence of circumstellar material further obscuring the stellar discs at their edges. Note that model-independent image reconstruction, carried out in Section \[sec:image\_reconstruction\], also shows evidence for strong darkening at the periphery. However these considerations do not significantly affect our spot analysis, relying on medium and long baseline visibilities. Figure \[fig:tper\_spots\] and Figure \[fig:rsper\_spots\] presents the $\chi^2$ surface as a function of the spot position, as well as the corresponding best one-spot and two-spot models for T Per and RS Per. In all cases, we found that the total flux contribution of the spots represent roughly $\sim 4\%$ of the stellar flux. The reduced $\chi^2$ and parameters for these models are given in Table \[tab:tper\_fits\] and \[tab:rsper\_fits\], with error bars derived using the classic bootstrapping technique. For T Per, our results imply the presence of a spot on along the diagonal NW-SE. Based solely on the $\chi^2$ metrics, a dark spot in the SE quadrant ($\chi^2 = 2.24$), or a bright spot on the NW quadrant seem equally probable ($\chi^2 = 2.35$). There is also a slight decrease of $\chi^2$ ($\chi^2 = 1.9$) when attempting to fit an additional spot to the dark spot model. For RS Per, the results are clearer, with evidence of a single dark spot in the SW. In particular no solution involving any bright spot could be found. Bayesian spot model selection ----------------------------- In general the reduced-$\chi^2$ metric is ill-adapted to truly assess the relative probabilities of models [@Marshall2006]. The $\chi^2$ decrease that results from the addition of a new set of spot parameters can be due to modeling a real spot or simply to over-fitting, with emergence of artifacts due to imperfect ([*u,v*]{}) coverage. Here we present a general framework to treat the problem of fitting spots, based on Bayesian model selection. Model-fitting consists in estimating the most probable model coefficients ${\boldsymbol{C}}=\{ c_1, c_2, \ldots c_n\}$ of a model ${\boldsymbol{M}}_i$. To do so we actually maximize the posterior probability $p({\boldsymbol{C}}|{\boldsymbol{D}},{\boldsymbol{M}}_i)$: $$p({\boldsymbol{C}}| {\boldsymbol{D}}, {\boldsymbol{M}}_i)= \frac{p({\boldsymbol{D}}|{\boldsymbol{C}},{\boldsymbol{M}}_i) p({\boldsymbol{C}}|{\boldsymbol{M}}_i)}{p({\boldsymbol{D}}|{\boldsymbol{M_i}})} , \label{eq:bayes}$$ where $p({\boldsymbol{D}}|{\boldsymbol{C}},{\boldsymbol{M}}_i)$ is the likelihood of the model coefficients, $p({\boldsymbol{C}}|{\boldsymbol{M}}_i)$ is the prior probability of the coefficients, and $p({\boldsymbol{D}}|{\boldsymbol{M_i}})$ is the marginal likelihood, also often called “Bayesian evidence” in astronomy. The evidence appears in Eq. \[eq:bayes\] as the denominator, its role being to normalize the posterior probability. For a given model ${\boldsymbol{M_i}}$, the evidence is constant. To determine the ${\boldsymbol{C}}$ coefficients it is then sufficient to maximizing the denominator only: i.e the likelihood (i.e. $\chi^2$) under prior constraints (mostly physical constraints such as positivity for the stellar diameters, spots within the stellar discs). However when comparing two spot models, the ratio of their evidence is to be considered. The ratio of the probabilities of two models ${\boldsymbol{M}}_1$ and ${\boldsymbol{M}}_2$ given the data can be expressed as: $$\frac{p({\boldsymbol{M_1}}|{\boldsymbol{D}})}{p({\boldsymbol{M}}_2|{\boldsymbol{D}})}= \frac{p({\boldsymbol{M}}_1)}{p({\boldsymbol{M}}_2)} \frac{p({\boldsymbol{D}}|{\boldsymbol{M_1}})}{p({\boldsymbol{D}}|{\boldsymbol{M_2}})} \label{eq:model_selection}$$ where $p({\boldsymbol{M}}_i)$ is the [*a priori*]{} probability of model ${\boldsymbol{M}}_i$. As we have no specific preference for a model in the absence of data, $p({\boldsymbol{M}}_1)/p({\boldsymbol{M}}_2) = 1$, and therefore the most probable model corresponds to the model with the largest evidence. For a given data set, the evidence $Z({\boldsymbol{M_i}}) = p({\boldsymbol{D}}|{\boldsymbol{M_i}})$ for model ${\boldsymbol{M_i}}$ is defined as the marginalized likelihood: $$Z({\boldsymbol{M_i}}) = \int\limits_{C_1}\ldots\int\limits_{C_n} p({\boldsymbol{D}}|{\boldsymbol{C}},{\boldsymbol{M}}) p({\boldsymbol{C}}|{\boldsymbol{M}}) dC_1 \ldots dC_n. \label{eq:evidence_marginalization}$$ Computing the evidence and its associated error bar with good precision requires the exploration and integration of the posterior probability by specialized Monte-Carlo Markov Chain algorithms. Our model-fitting code FITNESS uses the MultiNest library [@Feroz2008; @Feroz2009] to compute the logarithm of the evidence $\log Z$ with the Nested Sampling algorithm [@Skilling2006]. Because the ratio of evidence intervenes in Eq. \[eq:model\_selection\], differences of $\log Z$ encode the relative model probabilities and can be interpreted (with caution) using the Jeffrey’s scale [@Kass1995]. Contrary to the reduced-$\chi^2$, $\log Z$ does not directly take into account the raw number of parameters, but it is based on their actual relevance to the fitting process. A good model has the minimal number of parameters required to explain the data (Occam’s razor), which corresponds to a high $\log Z$. Bad models may be less predictive, or may be too generic due to the overabundance of parameters, and the are characterized by low $\log Z$. We give the $\log Z$ for all our models in Table \[tab:tper\_fits\] and Table \[tab:rsper\_fits\]. For T Per, $\log Z$ points overwhelmingly in favor of the single bright spot model. Despite having better $\chi^2$, the single dark spot and the two-spot models are found to be much less probable. For RS Per, a comparison of the $\log Z$ for the spotted and non-spotted models indicate that the dark spot in the SW is probably real, though with a low confidence index. Both these results will be confirmed by image reconstruction in Section \[sec:image\_reconstruction\]. Effective surface temperatures {#sec:temperatures} ------------------------------ The effective temperature of a star $T_{\rm eff}$ and its bolometric flux $F_{\rm bol}$ follow the Stefan-Boltzmann law, $F_{\rm bol} = \sigma T_{\rm eff}^4$. The measured bolometric flux on Earth $f_{\rm bol}$ is weaker by a factor $\theta^2/4$, where $\theta$ is the angular diameter of the star. The effective temperature is then given by: $$T_{\rm eff}= \left(\frac{4 f_{\rm bol}}{\sigma_B \theta^2}\right)^{\frac{1}{4}},\label{eq:temperature}$$ where $\sigma_B$ is the Stefan-Boltzmann constant. As recommended by @Scholz1987, $\theta$ is chosen to be the Rosseland angular diameter. Considering the relatively low signal-to-noise of the data, we assume here the Rosseland diameter to be equal to the limb-darkened diameter $\theta_{\text{LD}}$ fitted in \[sec:modeling\]. ![Spectral energy distributions of T Per (top) and RS Per (bottom). The plain lines show the dereddened SATLAS fit to the optical and near-IR parts of the spectra.[]{data-label="fig:seds"}](tper_sed.eps "fig:"){width="\linewidth"}\ ![Spectral energy distributions of T Per (top) and RS Per (bottom). The plain lines show the dereddened SATLAS fit to the optical and near-IR parts of the spectra.[]{data-label="fig:seds"}](rsper_sed.eps "fig:"){width="\linewidth"} To compute $f_{\rm bol}$ for our targets, we derived the spectral energy distributions (SEtDs) from public catalog records. Visible and near-ultraviolet data were obtained from Johnson UBVRI measurements [@Johnson1966; @Mendoza1967; @Morel1978; @Ducati2002] and from @Slesnick2002. In addition we used observations in the Geneva [@Rufener1999], Strömgren [*uvby$\beta$*]{} [@Marco2001] and Vilnius UPXYZVS systems [@Straizys1995]. The near-infrared data (JHKs) was obtained from @Morel1978 and @Ducati2002, as well as 2MASS [@Currie2010; @Skrutskie2006]. Because the 2MASS data is saturated for both stars, the corresponding JHK fluxes are estimated using the less accurate profile method. Mid-infrared data was acquired by ISO-SWS [@Sloan2003], AKARI/IRC [@Ishihara2010], WISE [@Wright2010; @Cutri2012], IRAS/LRS [@Neugebauer1984], and the Midcourse Space Experiment Point Source Catalog [@Egan2003]. Far-infrared data came from IRAS [@Neugebauer1984] and AKARI/FIS [@Ishihara2010] observations. The SEDs were de-reddened by adopting the extinction parameters found for the Double Cluster in @Slesnick2002, i.e. a distance modulus of $11.85 \pm 0.05$ and color excesses of $E(B-V) = 0.53 \pm 0.02$ for RS Per and $E(B-V) = 0.56 \pm 0.02$ for T Per. Based on the analysis of @McCall2004 and the recommendations of @Massey2005, we attempted to de-redden the data using two different empirical laws for the reddening curves: first using the reddening curve from @Cardelli1989 updated in the near-uv with coefficients from @ODonnell1994, and with a total-to-selective ratio of absorption $R_V= 4.15$ ; and second using the curve derived by @Fitzpatrick1999 with $R_V = 3.8$. In both cases we extended the de-reddening to the longest wavelengths, using equations from @Chiar2006 for $\lambda > 5\mu$m. Figure \[fig:seds\] presents the final de-reddened SEDs using the Cardelli de-reddenning. Both SEDs show significant amount of circumstellar emission in the mid-IR and far-IR, though is this much more pronounced for RS Per. The infrared excess of RS Per around $7.6 \mu$m is attributed to PAH emission [@Verhoelst2009], and a peak at 9.7 $\mu$m indicate strong silicate emission [@Speck2000]. Both constitute evidence of ongoing dust production. Moreover its far-infrared excess at 60$\mu$m is characteristic of extended circumstellar emission [@Stencel1988; @Stencel1989] and indicates significant mass-loss through a circumstellar outflow whose typical size can be estimated to about 4 arcminutes [@Stencel1989]. In contrast, T Per does not appear as active, but still displays broad dust emission between 9-13 $\mu$m range. To determine the effective surface temperature, integration of the spectrophotometric data has to be restricted to photospheric emission. To this purpose we fitted SATLAS models only to the ultraviolet, visible and near-infrared wavelengths where the stellar photosphere clearly dominates the emission (i.e. $< 3 \mu$m). The SATLAS models were using ODF sampling with improved H2O lines and the following parameters: sub-solar metallicity ${[\rm Fe/Z]} = -0.5$, based on the assumed typical metallicity of the double cluster ${[\rm Fe/Z]} = -0.35$ from @Gonzalez2000; a medium micro-turbulence level $\chi_t = 5$ km/s ; surface gravities $\log g = -0.5$ to $0.5$, and total mass $7-25 M_{\odot}$, typical of M supergiants; effective temperatures range $T = 3300-4000$ K, based on previous estimates [@Gonzalez2000; @Levesque2005; @Verhoelst2009]. In order to check the independence of our results from the specificities of SATLAS, we also fitted spherical MARCS models using the same parameters, and we obtained identical fit results. We found that the SED of T Per was fitted well by models with temperatures in the 3700K–3800K range and $\log g\simeq 0$; and for RS Per, temperature of 3500K–3600K and $\log g \simeq -0.5$. To derive the bolometric fluxes, the photosphere SEDs was integrated with a Gaussian quadrature algorithm (in logarithm space). The SATLAS model was used instead of the actual SED only for wavelengths affected by circumstellar emission (i.e. $> 3 \mu$m). Our estimates of bolometric fluxes and the derived absolute bolometric magnitude) are presented in Table \[tab:sed\_fits\]. The 1-$\sigma$ errors are mostly dominated by the uncertainties arising from the de-reddening parameters, and from the probable inclusion of circumstellar emission. We note that our estimate of RS Per’s absolute bolometric magnitude, $\text{Mbol}=-7.47 \pm 0.12$, falls in the middle range of literature values: $-7.21$ in @Slesnick2002, $-7.48$ in @Gonzalez2000, $-7.74$ in @Verhoelst2009, and $-8.15$ in @Levesque2005. Using Equation \[eq:temperature\], we derive the effective temperatures $T = 3685 \pm 30~K$ for T Per and $T= 3470 \pm 90~K$ for RS Per. Our error bars take into account both the spectrophotometric and interferometric errors. The dominant uncertainties lie in interstellar reddening: though relatively well-characterized, the extinction to the Double Cluster is considerable due to its distance, and the choice of de-reddening law significantly affect the bolometric magnitude. These temperatures are consistent with previous literature estimates [@Gonzalez2000; @Slesnick2002; @Verhoelst2009]. Figure \[fig:tempscales\] presents our results in relation with four RSG temperature scales from the literature. Both scales from @Humphreys1984 and @Massey2003 were derived by averaging previous observations from public catalogs, but they most likely suffered from de-reddening issues, underestimating the RSG temperatures. @Levesque2005 used spherical-geometry MARCS models (with the then-new opacity sampling method, later published in @Gustafsson2008) and improved de-reddening of the sources, reconciling the observations with both predicted temperatures and evolutionary tracks. Finally, @vanBelle2009 estimated the temperature by fitting the SED with stellar templates derived from @Pickles1998 in place of synthetic models, and independently estimated stellar diameters using the interferometer PTI (Palomar Tested Interferometer). Note that the spatial resolution of our CHARA observations is at least twice that of PTI, therefore it should provide more reliable diameter estimates. Our results confirm the hotter temperature scales of RSGs, falling in-between the results of @Levesque2005 and @vanBelle2009 for T Per, and slightly under the Levesque’s curve for RS Per. Hence, and taking into account the limits of our analysis (noisy 2007 data compared to current CHARA/MIRC data), we are reasonably confident in the quality of our temperature estimates. [ccc]{} $R_{\text{ross}}$ ($R_{\odot}$) & $ 510 \pm 20$ & $ 770 \pm 30 $\ $M_{\rm bol}$ & $-6.90 \pm 0.07$ & $-7.47\pm 0.12$\ $T_{\rm eff} (K)$ & $3750 \pm 60$ & $3470 \pm 90$\ $M_{\star} (M_{\odot})$ & 9-12 & 12-15\ $\log L/L_{\odot}$ & $4.66 \pm 0.04$ & $4.89 \pm 0.05$\ $\log g$ (cgs) & $0.06 \pm 0.05$ & $-0.2 \pm 0.05$\ \[tab:sed\_fits\] ![Effective temperatures for T Per and RS Per, compared to four temperatures scales from the literature. Our results confirm the hotter scale of @Levesque2005 and @vanBelle2009.[]{data-label="fig:tempscales"}](temperature_scales.eps){width="\linewidth"} Linear radii, luminosity, mass, and surface gravity --------------------------------------------------- Assuming a distance of $d = 2345 \pm 55$ pc [@Slesnick2002], our estimates of the linear radii are $R_{\text{ross}}=510 \pm 20 R_{\odot}$ for T Per and $R_{\text{ross}}=770 \pm 30~R_{\odot}$ for RS Per. This corresponds to luminosities $\log L/L_{\odot} = 4.66 \pm 0.04$ for T Per and $\log L/L_{\odot} = 4.90 \pm 0.05$ for RS Per, comparable to that of $\alpha$ Ori. To get estimates of the stellar masses, we used the most recent evolutionary tracks from @Ekstrom2012 and the new Geneva tracks from @Neugent2012, that both demonstrated their (relative) reliability on RSGs. The range of possible masses appears to be $M= 9-12 M_{\odot}$ for T Per, and $M= 12-15 M_{\odot}$ for RS Per, which translates into $\log g = 0.06 \pm 0.05$ for T Per and $\log g = - 0.2 \pm 0.05$ for RS Per. These results support the assumptions made during our selection of SATLAS models in sections \[sec:ldd\] and \[sec:temperatures\]. Image reconstruction {#sec:image_reconstruction} ==================== Regularized maximum likelihood ------------------------------ As four telescope data is secured on both objects, there exists enough phase information in our data sets to attempt “model-independent image reconstruction”. Here the prefix “model-independent” signifies that the image reconstruction process will not rely on a specific astrophysical model. The target image ${\boldsymbol{i}}$ is modeled as an array of pixel fluxes $\widehat{{\boldsymbol{i}}}=\{i_0, \ldots i_{n-1}\}$. As the data is assumed to be normally distributed, to each image we can associate a $\chi^2({\boldsymbol{i}})$ metric that measure the distance between the observed data (power spectra and bispectra) and the same quantities derived from the current image. Maximizing the likelihood of the image by minimizing its $\chi^2$ unfortunately does not lead to reasonable images. The reason is that image reconstruction belongs to the class of “ill-posed” inverse problems: the number of pixels to reconstruct is typically a few thousand, while we only have a few hundreds interferometric data points. Under these conditions, maximum likelihood leads to an overfitting the data. It is thus essential to “regularize” the solution by introducing reasonable but noncommittal prior expectations about the image. This is usually done through regularization functions that control the flux distribution within the image. In addition to preventing over-fitting, good regularizers fulfill other roles. As underlined during model-fitting, the $\chi^2$ is heavily multimodal. Most classic regularization function $R({\boldsymbol{i}})$ effectively allow to discriminate between these local minima and thus ease minimization of Eq. \[eq:reconst\]. In effect, regularizers help extrapolate the missing information from the phase lost to the atmosphere and the gaps in the data coverage of the ([*u,v*]{}) plane. A competent choice of regularizers ensures that high frequencies are extrapolated well, and image reconstruction has demonstrated it achieves super-resolution [@Renard2011], i.e. that the effective resolution of the reconstructed images is typically about three to four times greater than the interferometer resolution. This regularized maximum likelihood approach constitutes the current framework for image reconstruction in optical interferometry [@Baron2010; @Thiebaut2010]. Formally, the target image minimizes the sum of the $\chi^2({\boldsymbol{i}})$ metric and of $K$ regularizers $R_k({\boldsymbol{i}})$: $$\widehat{{\boldsymbol{i}}} = \underset{i \in \mathbb{R}^n}{\operatorname{argmin}} \left \{ \chi^2 ({\boldsymbol{i}}) + \sum_{k=1}^{K} \mu_k R_k({\boldsymbol{i}}) \right \}\label{eq:reconst} ,$$ under the constraints of image positivity ($\forall n, i_n \ge 0$) and of normalization of the image to unity ($\sum_n i_n = 1$). The factors $\mu_k$ in Eq. \[eq:reconst\] control the relative weight of the $\chi^2$ and regularization terms. Reconstructing spotted stars with current software {#sec:oldreg} -------------------------------------------------- Reconstructing spotted stars is currently difficult with available software. To date, the only published model-independent interferometric reconstructions of stellar spots are that of the large convection cells of $\alpha$ Ori [@Young2000; @Haubois2009; @Chiavassa2010a] and of VX Sgr [@Chiavassa2010b]. Resolving spots entails that the stellar disc is proportionally much larger, which implies very low visibility amplitudes, and consequently bad signal-to-noise. Moreover, the conventional convex approximations of the $\chi^2$ expression should then be ruled out. And as exemplified by the difficult reconstruction of VX Sgr, the minimization of the non-convex $\chi^2$ is very prone to appearance of artifacts when using conventional tools such as BSMEM [@Baron2010] or MIRA [@Thiebaut2010]. To solve this issue we suggest the use of non-convex reconstruction codes, such as those based on Markov Chain Monte Carlo (MCMC) approach. In this paper, the software SQUEEZE [@Baron2010] was used to obtain the reconstructions presented in this paper. SQUEEZE uses parallel tempering to tentatively find the global minimum of the criterion in Eq. \[eq:reconst\], and therefore is well-adapted to non-convex problems. SQUEEZE is multi-threaded, with each thread conducting minimization by simulated annealing at a different temperature and starting with a different random seed. Compared to its predecessor MACIM [@Ireland2006], it is less sensitive to the initial condition of the Markov Chains (i.e. the starting image). Thus, the quality of its reconstructions mostly depends on the choice of regularization. To select the best regularizer, we generated a synthetic test dataset simulating the observation of a spotted star using the OIFITS-SIM tools [@oifitssim]. The original image used to create the data was chosen as the T Per “bright spot” model from Figure \[fig:tper\_spots\], and we use the same ([*u,v*]{}) coverage and signal-to-noise as the actual T Per data. We then reconstructed the stellar surface using the two most successful regularizers as benchmarked by @Renard2011: maximum entropy and total variation [@Rudin1992]. Maximum entropy was implemented using the multiplicity expression from @Sutton2006, which is well adapted to our MCMC implementation: $$R_{\Gamma}({\boldsymbol{i}}) = \sum_{n} \log \Gamma(i_n +1).$$ where $i_n$ is the flux in pixel $n$. Total variation (hereafter, TV) is defined as the $\ell_1$ norm of the spatial gradient ${\boldsymbol{g}}$: $$R_{\text{TV}}({\boldsymbol{i}}) = \ell_1({\boldsymbol{g}}) = \sum_{n} |g_{n}| .$$ Several practical expressions are available to discretize ${\boldsymbol{g}}$ on the image grid. In the context of this paper, we implemented the classic isotropic formulation of ${\boldsymbol{g}}$, i.e. for each pixel coordinate $(n, m)$ in the two-dimensional image ${\boldsymbol{i}}$, the local gradient was given by: $$g_{n,m}({\boldsymbol{i}}) = \sqrt{|i_{n+1, m}-i_{n,m}|^2 + |i_{n, m+1}-i_{n,m}|^2}.$$ Figure \[fig:reconst\_compare\] compares regularization obtained with both these regularizers on our synthetic dataset (the full reconstruction procedure is detailed in Section \[sec:reconst\_proc\]). Our results demonstrate that the maximum entropy image suffers from several flaws: the stellar background is excessively non-uniform, and the precise location of spot is lost. The total variation reconstruction is definitively superior on both aspects. Moreover, and unlike maximum entropy, total variation does not require an additional prior to constrain the flux to stay within a given diameter. The good performance of total variation are in line with the empirical results of @Renard2011 but also theoretical predictions. Total variation is indeed a direct application of the Compressed Sensing theory, a recent mathematical framework that supersedes the conventional Shannon sampling theorem when applied to sparse images, i.e., images that may be described with small number of non-zero coefficients in some give basis. Here, on first order, our model spotted star consist of a (mostly) uniform disc with compact spots or cells. The spatial gradient of the image is sparse, with only the perimeters of the stellar disc and the spots as non-zero components. Total variation enforces the sparsity of the spatial gradient so that the reconstruction is piecewise constant with sharp transitions, though this is not apparent on Figure \[fig:reconst\_compare\] as these images are actually Markov Chain averages as explained further in Section \[sec:reconst\_proc\]. ![Reconstructions of a synthetic spotted star with the same same [uv]{} coverage and signal-to-noise as the T Per data. Top left: the original image convolved to the expected effective resolution (using a super-resolution factor of 3); Top right: reconstruction regularized by maximum entropy and a prior constraining the flux to stay within the stellar diameter; Bottom left: reconstruction regularized by total variation ; Bottom right: reconstruction regularized by the spot regularizer presented in Section \[sec:newreg\]. []{data-label="fig:reconst_compare"}](reconst_original.eps "fig:"){width="0.5\linewidth"}![Reconstructions of a synthetic spotted star with the same same [uv]{} coverage and signal-to-noise as the T Per data. Top left: the original image convolved to the expected effective resolution (using a super-resolution factor of 3); Top right: reconstruction regularized by maximum entropy and a prior constraining the flux to stay within the stellar diameter; Bottom left: reconstruction regularized by total variation ; Bottom right: reconstruction regularized by the spot regularizer presented in Section \[sec:newreg\]. []{data-label="fig:reconst_compare"}](reconst_maxent.eps "fig:"){width="0.5\linewidth"} ![Reconstructions of a synthetic spotted star with the same same [uv]{} coverage and signal-to-noise as the T Per data. Top left: the original image convolved to the expected effective resolution (using a super-resolution factor of 3); Top right: reconstruction regularized by maximum entropy and a prior constraining the flux to stay within the stellar diameter; Bottom left: reconstruction regularized by total variation ; Bottom right: reconstruction regularized by the spot regularizer presented in Section \[sec:newreg\]. []{data-label="fig:reconst_compare"}](reconst_tv.eps "fig:"){width="0.5\linewidth"}![Reconstructions of a synthetic spotted star with the same same [uv]{} coverage and signal-to-noise as the T Per data. Top left: the original image convolved to the expected effective resolution (using a super-resolution factor of 3); Top right: reconstruction regularized by maximum entropy and a prior constraining the flux to stay within the stellar diameter; Bottom left: reconstruction regularized by total variation ; Bottom right: reconstruction regularized by the spot regularizer presented in Section \[sec:newreg\]. []{data-label="fig:reconst_compare"}](reconst_bm.eps "fig:"){width="0.5\linewidth"} A novel regularizer for spotted stars {#sec:newreg} ------------------------------------- To derive a novel regularizer for use on spotted stars, we built upon the idea of spatial gradient sparsity, adding two noncommittal requirements. The first requirement is that for a given flux to distribute into possible spots, the regularizer should prefer a single spot to two spots, as per Occam’s razor prescription. The second requirement is that for a given flux to attribute to a spot, the size of the spot should be determined solely by the data. This implies that the regularizer value should be independent of the spot size. It is straightforward to demonstrate that TV violates this second requirement. Let us consider an idealized stellar disc, and two cases: either two small spots of diameter $D$, or a single large spot of diameter $2D$. Let us assume the brightness distribution of the disc and the spots as uniform, so that the spatial gradient is null everywhere except on the perimeters of these components. The actual contribution of the spots to the spatial gradient is then proportional to the spot perimeters – equal to $2 \pi D$ in both cases – multiplied by the flux density for each case. Assuming that a combined flux $F$ is emitted by the spots, the spot flux density is then $F / ( \pi D^2)$ for the single spot case, and $2 F / ( \pi D^2)$ for the two spot case. Consequently the total variation is $\operatorname{TV}(\text{one spot}) = F/D$ for a single spot and $\operatorname{TV}(\text{2 spots}) = 2F/D$ for two spots. While this implies that TV does favor a single spot, this also demonstrates that the regularization depends on the size of the spot, and therefore it may bias a reconstruction toward larger spots. In contrast the regularizer $R_{\text{spot}}$ defined by: $$R_{\text{spot}}({\boldsymbol{i}}) = \ell_{\frac{1}{2}}({\boldsymbol{g}}) = \left(\sum_{n} \sqrt{|g_{n}|} \right)^2 .$$ meets both our requirements for an ideal regularizer, with $R_{\text{spot}}(\text{one spot}) = 4 \pi F$ and $R_{\text{spot}}(\text{two spots}) = 8 \pi F$. Figure \[fig:reconst\_compare\] confirms our analysis, and our spot regularizer demonstrates a significant improvement over total variation. Reconstruction procedure and results {#sec:reconst_proc} ------------------------------------ The instrumental resolution is given by the largest CHARA baseline in our data sets (S2-W1 or E2-W1, $\simeq 250$ meters), corresponding to $1.3$ mas in H band. Taking into account a super-resolution factor of four, the effective resolution of the reconstructed images should be about $0.3$ mas. In order to avoid excessive pixellation of the images, the actual resolution of the reconstruction was set to $0.1$ mas. We ran five batches of multi-threaded SQUEEZE with $16$ threads each, corresponding to a total of $80$ independent Markov chains that were averaged to reconstruct the final images. The number of pixel elements in each chain was set to $5000$, with a length of $500$ iterations. In addition to the spot regularizer derived in the previous section, we made use of the fitting results from section \[sec:ldd\] to constrain the reconstruction. The fitted limb-darkening discs were used to initialize the chains to sensible starting points.The factors $\mu_k$ were chosen so that the actual reduced $\chi^2$ is roughly unity for the reconstructed image. The final reconstructions are presented on Figure \[fig:images\]. For T Per, the spot location in North West quadrant agrees with the conclusions of Bayesian model selection. For RS Per, there is indeed a darker area in the South West. However the correct interpretation is unclear: this may be a dark spot, or most of the surface could be understood as a temporary hot convection cell. Without data outside the 2007 July/August period, we cannot conclude from this single RS Per image. To exclude the possibility that the surface features on Figure \[fig:images\] are due to ([*u,v*]{}) coverage or to noisy data, we ran an ”artifact test" on both targets. We generated synthetic observations of the limb-darkening discs derived from model fitting, with exactly the same ([*u, v*]{}) coverage and signal-to-noise as the real data sets. We then reconstructed the images using the same procedure outlined above, and we found that the reconstructions did not display any significant surface features. ![Reconstructed images of T Per (left) and RS Per (right) with the SQUEEZE-MCMC engine and the ”spot regularizer” presented in section \[sec:newreg\]. The angular diameters estimated by model-fitting are indicated by white circles.[]{data-label="fig:images"}](tper_image.eps "fig:"){width="0.5\linewidth"}![Reconstructed images of T Per (left) and RS Per (right) with the SQUEEZE-MCMC engine and the ”spot regularizer” presented in section \[sec:newreg\]. The angular diameters estimated by model-fitting are indicated by white circles.[]{data-label="fig:images"}](rsper_image.eps "fig:"){width="0.5\linewidth"} Discussion and Conclusion ========================= We have analyzed the CHARA/MIRC data taken in H band on two red supergiants T Per and RS Per and presented evidence for the existence of spots on their surfaces. For this we developed a set of tools dedicated to the analysis of spotted stars. As the utility of simple model-fitting procedures is limited for spotted stars, we demonstrated that Bayesian model selection is capable of assessing the relative probabilities of various models, the Bayesian evidence constituting a more reliable metric than the reduced $\chi^2$. Our results on T Per confirm that hot spots can indeed be observed in $H$-band. If considered together with similar results on $\alpha$ Ori by [@Haubois2009] and on VX Sgr by [@Chiavassa2010a], it seems we should expect a significant proportion of RSGs to have bright spots, as is thought to be the case for AGB stars [@Ragland2006]. Considering the typical continuum opacity curves in such cool atmospheres [@Woodruff2009], the continuum opacity should be close to minimum in H band, where our MIRC observations took place. These spots must be generated very close to the photosphere, and therefore it seems currently doubtful that their enhanced contrast may be explained by opacity effects. As the correct approach to model these objects is not really to model spots, but to interpret the surface in terms of convective cells using 3D models [@Chiavassa2010b], inhomogeneous granulation temperatures may explain the spots. Our detection of a ”dark spot“ on RS Per probably corresponds to a cooler granulation, imaged with the reduced dynamic contrast typical of current interferometry. We also found that classic regularizers are hardly adequate to reconstruct model-independent images of spotted surfaces. Hence we derived a novel regularizer tailored for this task, based on simple Compressed Sensing and Occam’s razor principles. Our reconstructions of T Per and RS Per were found to essentially agree with the Bayesian spot selection. It should be underlined that the data quality from MIRC circa 2007 was a major limiting factor in the present analysis. Fortunately since 2007, the MIRC combiner underwent a series of hardware upgrades which drastically improved its performance. MIRC-6T can now simultaneously combine all six CHARA telescopes with thrice higher signal-to-noise and much lower systematic errors. A survey of several RSGs over longer periods of time with MIRC-6T would allow to conclude to whether spots on M supergiants are ubiquitous, and in particular if a relationship can be found between circumstellar activity/infrared excess and the complexity of observed surface features. Our future work will thus focus on the analysis of new RSG data collected with MIRC-6T, with a systematic application of Bayesian model selection to 3D hydrodynamical models, and the development of better reconstruction algorithms for RSGs. The authors would like to acknowledge funding from the NSF through award AST-0807577 to the University of Michigan, as well as funding by the Australian Research Council and the “Lendület Fiatal Kutatói Program” of the Hungarian Academy of Sciences for the initial work on these objects. This work is based on observations collected at the Center for High Angular Resolution Astronomy (CHARA) operated by the Georgia State University at Mt. Wilson, California. This research also relied on observations with AKARI, a JAXA project with the participation of ESA, and made use of data products from the Wide-field Infrared Survey Explorer (a joint project of the University of California, Los Angeles, and the Jet Propulsion Laboratory/California Institute of Technology, funded by the National Aeronautics and Space Administration), and from the Two Micron All Sky Survey (a joint project of the University of Massachusetts and the Infrared Processing and Analysis Center/California Institute of Technology, funded by the National Aeronautics and Space Administration and the National Science Foundation). [103]{} natexlab\#1[\#1]{} , V., [Carpenter]{}, K. G., & [Ofman]{}, L. 2010, , 723, 1210 , M., [Donati]{}, J.-F., [Konstantinova-Antova]{}, R., [Perrin]{}, G., [Petit]{}, P., & [Roudier]{}, T. 2010, , 516, L2 Baron, F., Monnier, J., & Kloppenborg, B. 2010, , 7734, 77342I , D. F., [Baldwin]{}, J. E., [Warner]{}, P. J., & [Haniff]{}, C. A. 1990, , 245, 7P , J. A., [Clayton]{}, G. C., & [Mathis]{}, J. S. 1989, , 345, 245 , F., & [Kurucz]{}, R. L. 2003, in IAU Symposium, Vol. 210, Modelling of Stellar Atmospheres, ed. N. [Piskunov]{}, W. W. [Weiss]{}, & D. F. [Gray]{}, 20P , J. E., & [Tielens]{}, A. G. G. M. 2006, , 637, 774 , A., [Freytag]{}, B., [Masseron]{}, T., & [Plez]{}, B. 2011, , 535, A22 , A., [Haubois]{}, X., [Young]{}, J. S., [Plez]{}, B., [Josselin]{}, E., [Perrin]{}, G., & [Freytag]{}, B. 2010, , 515, A12 , A., [Plez]{}, B., [Josselin]{}, E., & [Freytag]{}, B. 2009, , 506, 1351 , A., [et al.]{} 2010, , 511, A51 , M. 1997, , 325, 709 , T., [et al.]{} 2010, , 186, 191 , R. M., [et al.]{} 2012, [Explanatory Supplement to the WISE All-Sky Data Release Products]{}, Tech. rep. , W. C., [Bester]{}, M., [Degiacomi]{}, C. G., [Greenhill]{}, L. J., & [Townes]{}, C. H. 1994, , 107, 1469 , J. R. 2002, VizieR Online Data Catalog, 2237, 0 , M. P., [et al.]{} 2003, VizieR Online Data Catalog, 5114, 0 , S., [et al.]{} 2012, , 537, A146 , F., & [Hobson]{}, M. P. 2008, , 384, 449 , F., [Hobson]{}, M. P., & [Bridges]{}, M. 2009, , 398, 1601 , E. L. 1999, , 111, 63 Freytag, B., Steffen, M., & Dorch, B. 2002, Astronom. Nach., 323, 213 Gonzalez, G., & Wallerstein, G. 2000, , 119, 1839 , D. F. 2008, , 135, 1450 , J. H., [Wade]{}, G. A., [Hanes]{}, D. A., & [Alecian]{}, E. 2010, , 408, 2290 , B., [Bell]{}, R. A., [Eriksson]{}, K., & [Nordlund]{}, A. 1975, , 42, 407 , B., [Edvardsson]{}, B., [Eriksson]{}, K., [J[ø]{}rgensen]{}, U. G., [Nordlund]{}, [Å]{}., & [Plez]{}, B. 2008, , 486, 951 , C. A. 1991, , 8, 134 Haubois, X., [et al.]{} 2009, , 508, 923 , P. H., & [Baron]{}, E. 1999, Journal of Computational and Applied Mathematics, 109, 41 Hestroffer, D. 1997, , 327, 199 Humphreys, R., & McElroy, D. 1984, , 284, 565 , M. J., [Monnier]{}, J. D., & [Thureau]{}, N. 2006, in , Vol. 6268 , D., [et al.]{} 2010, VizieR Online Data Catalog, 2297, 0 , H. L., [Mitchell]{}, R. I., [Iriarte]{}, B., & [Wisniewski]{}, W. Z. 1966, Communications of the Lunar and Planetary Laboratory, 4, 99 , E., & [Plez]{}, B. 2007, , 469, 671 Kass, R. E., & Raftery, A. E. 1995, Journal of the American Statistical Association, 90, 773 , P., & [Fouqu[é]{}]{}, P. 2008, , 491, 855 , P., [Perrin]{}, G., [Chiavassa]{}, A., [Ridgway]{}, S. T., [Cami]{}, J., [Haubois]{}, X., & [Verhoelst]{}, T. 2011, , 531, A117 Kiss, L. L., Szabó, G. M., & Bedding, T. R. 2006, , 372, 1721 , B., & [Baron]{}, F. 2013, [OIFITS-SIM]{}, <https://github.com/bkloppenborg/oifits-sim>, \[Online\] , R. L. 1992, in IAU Symposium, Vol. 149, The Stellar Populations of Galaxies, ed. B. [Barbuy]{} & A. [Renzini]{}, 225 , J. B., & [Neilson]{}, H. R. 2008, , 491, 633 , E. M. 2010, New Astronomy Reviews, 54, 1 Levesque, E. M., Massey, P., Olsen, K. a. G., Plez, B., Josselin, E., Maeder, A., & Meynet, G. 2005, , 628, 973 , E. M., [Massey]{}, P., [Olsen]{}, K. A. G., [Plez]{}, B., [Meynet]{}, G., & [Maeder]{}, A. 2006, , 645, 1102 , A., & [Bernabeu]{}, G. 2001, , 372, 477 , P., [Rajguru]{}, N., & [Slosar]{}, A. 2006, , 73, 067302 , P., [Levesque]{}, E. M., [Plez]{}, B., & [Olsen]{}, K. A. G. 2008, in IAU Symposium, Vol. 250, IAU Symposium, ed. F. [Bresolin]{}, P. A. [Crowther]{}, & J. [Puls]{}, 97–110 Massey, P., & Olsen, K. a. G. 2003, , 126, 2867 , P., [Plez]{}, B., [Levesque]{}, E. M., [Olsen]{}, K. A. G., [Clayton]{}, G. C., & [Josselin]{}, E. 2005, , 634, 1286 , M. L. 2004, , 128, 2144 , S., [Mugnier]{}, L. M., & [Le Besnerais]{}, G. 2005, , 22, 2348 —. 2008, , 26, 108 , E. E. 1967, Boletin de los Observatorios Tonantzintla y Tacubaya, 4, 149 Mérand, A., Bordé, P., & [Coudé du Foresto]{}, V. 2005, , 433, 1155 , G., & [Maeder]{}, A. 2003, , 404, 975 Monnier, J., [et al.]{} 2006, in , Vol. 6268 (Spie), 62681P , J. D., [Berger]{}, J.-P., [Millan-Gabet]{}, R., & [ten Brummelaar]{}, T. A. 2004, in , Vol. 5491, 1370 , J. D., [et al.]{} 2004, , 605, 436 Monnier, J. D., [et al.]{} 2007, Science, 317, 342 , J. D., [et al.]{} 2008, in , Vol. 7013 , M., & [Magnenat]{}, P. 1978, , 34, 477 , G., [et al.]{} 1984, , 278, L1 , K. F., [Massey]{}, P., [Skiff]{}, B., & [Meynet]{}, G. 2012, , 749, 177 , J. E. 1994, , 422, 158 , K., [Hofmann]{}, K.-H., [Schertl]{}, D., [Weigelt]{}, G., [Baffa]{}, C., [Chelli]{}, A., [Petrov]{}, R., & [Robbe-Dubois]{}, S. 2013, , 555, A24 , K., [et al.]{} 2009, , 503, 183 —. 2011, , 529, A163 , G. 2003, , 400, 1173 , A. J. 1998, , 110, 863 , B. 2003, in , Vol. 298, GAIA Spectroscopy: Science and Technology, ed. U. [Munari]{}, 189 , S., [et al.]{} 2006, , 652, 650 , S., [Thi[é]{}baut]{}, E., & [Malbet]{}, F. 2011, , 533, A64 Rudin, L., Osher, S., & Fatemi, E. 1992, Physica D: Nonlinear Phenomena, 60, 259 , F. 1999, VizieR Online Data Catalog, 2169, 0 , B. A., [Srinivasan]{}, S., & [Meixner]{}, M. 2011, , 728, 93 , M., & [Takeda]{}, Y. 1987, , 186, 200 Schwarzschild, M. 1975, , 195, 137 Skilling, J. 2006, Bayesian Analysis, 1, 833 , M. F., [et al.]{} 2006, , 131, 1163 Slesnick, C., Hillenbrand, L., & Massey, P. 2002, , 576, 880 , G. C., [Kraemer]{}, K. E., [Price]{}, S. D., & [Shipman]{}, R. F. 2003, , 147, 379 , A. K., [Barlow]{}, M. J., [Sylvester]{}, R. J., & [Hofmeister]{}, A. M. 2000, , 146, 437 , R. E., [Pesce]{}, J. E., & [Bauer]{}, W. H. 1989, , 97, 1120 , R. E., [Pesce]{}, J. E., & [Hagen Bauer]{}, W. 1988, , 95, 141 , R. B. 2010, , 725, 1170 , V., [Kazlauskas]{}, A., [Jodinskiene]{}, E., & [Bartkevicius]{}, A. . 1995, VizieR Online Data Catalog, 2157, 0 Sutton, E. C., & Wandelt, B. D. 2006, , 162, 401 ten Brummelaar, T. a., [et al.]{} 2005, , 628, 453 Thiebaut, E. 2008, , 7013, 70131I Thiébaut, E., & Giovannelli, J. 2010, Signal Processing Magazine, IEEE, 27, 97 Tuthill, P., Haniff, C., & Baldwin, J. 1997, , 285, 529 , G. T., [Creech-Eakman]{}, M. J., & [Hart]{}, A. 2009, , 394, 1925 , T., [van der Zypen]{}, N., [Hony]{}, S., [Decin]{}, L., [Cami]{}, J., & [Eriksson]{}, K. 2009, , 498, 127 , M., [Aufdenberg]{}, J. P., [Driebe]{}, T., [Roccatagliata]{}, V., [Szeifert]{}, T., & [Wolff]{}, B. 2006, , 460, 855 , M., [Aufdenberg]{}, J. P., & [Kervella]{}, P. 2004, , 413, 711 , M., [Hauschildt]{}, P. H., [Arroyo-Torres]{}, B., & [Marcaide]{}, J. M. 2012, , 540, L12 , H. C., [et al.]{} 2009, , 691, 1328 , E. L., [et al.]{} 2010, , 140, 1868 , M., & [Jiang]{}, B. W. 2012, , 754, 35 Young, J. S., [et al.]{} 2000, , 315, 635 Zhao, M., [et al.]{} 2011, , 123, 964
--- name: Test Driven Development Studio desc: An environment for practicing Kent Beck style Test Driven Development site: https://github.com/tddstud10/tddstud10 tags: - tdd - unit-testing - f# - visual-studio - vscode - mono upforgrabs: name: up for grabs link: https://github.com/tddstud10/tddstud10/labels/up%20for%20grabs stats: issue-count: 8 last-updated: '2016-10-31T03:11:53Z'
PlayStation 4 users can currently claim a free 14-day PS Plus trial subscription for free via the PSN store, and one gamer has found a loophole on the marketplace that allows repeat spamming of the offer. He’s now a free PS Plus member until the year 2035 without paying a penny.
Multiple access schemes are employed by modern radio systems to allow multiple users to share a limited amount of bandwidth, while maintaining acceptable system performance. Common multiple access schemes include Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA). System performance is also aided by error control codes. Nearly all communications systems rely on some form of error control for managing errors that may occur due to noise and other factors during transmission of information through a communication channel. These communications systems can include satellite systems, fiber-optic systems, cellular systems, and radio and television broadcasting systems. Efficient error control schemes implemented at the transmitting end of these communications systems have the capacity to enable the transmission of data including audio, video, text, etc., with very low error rates within a given signal-to-noise ratio (SNR) environment. Powerful error control schemes also enable a communication system to achieve target error performance rates in environments with very low SNR, such as in satellite and other wireless systems where noise is prevalent and high levels of transmission power are costly, if even feasible. Interleave Division Multiple Access (IDMA) is a multiple access technique where different users that share the same bandwidth and time slots are separated by user specific interleavers. As the bandwidth and power become scarce to support the ever increasing throughput requirements, more complex but more efficient techniques play more important roles in future communication systems. IDMA is an effective technique that trades extra receiver complexity with bandwidth and power savings. On the other hand, in systems where the number of users is high and the block size is large, storage of a high number of long interleavers may be undesirable. Scrambled Coded Multiple Access (SCMA) addresses this complexity by using a single scrambling sequence with different shift factors for different users without any performance penalty. With SCMA, the user specific interleavers of IDMA are replaced with user specific scrambler sequences. While there is no noticeable performance difference between the two approaches, generation and implementation of scrambler sequences is significantly simpler. In fact, the same scrambler sequence with different rotation factors can be used for different users with no impact on performance, which further reduces receiver complexity. With SCMA, therefore, all of the benefits of IDMA are achieved with reduced complexity. Similar to IDMA or random waveform Code Division Multiple Access (CDMA), SCMA is a non-orthogonal multiple access technique. While orthogonal multiple access schemes such as Time Division Multiple Access (TDMA) or Frequency Division Multiple Access (FDMA) are implicitly too restrictive to achieve theoretical limits in fading channels, non-orthogonal CDMA, IDMA or SCMA have the potential of achieving these limits. Further, as discussed above FEC coding is typically used to improve the performance. The main difference between CDMA and SCMA is that, while in CDMA different users are separated with different signature sequences with a spreading factor greater than one, in SCMA even a spreading factor of one would be enough to detect overlapped users based on user specific scrambler sequences and iterative multiuser cancellation with FEC decoding. As a result, the available bandwidth can be used for very low rate coding which gives SCMA extra coding gain that is not available in CDMA. Actually it is also possible to use SCMA with a spreading factor greater than one. Another benefit of the iterative receiver structure of SCMA is that the system performance actually improves with power variations among the users, which eliminates the need of power control, an important requirement of traditional CDMA. At the receiver, iterative multiuser detection or interference cancellation followed by decoding is performed to approach maximum likelihood (ML) receiver performance without excessive complexity. But for coded CDMA systems, even this iterative receiver may lead to complicated algorithms especially when the number of users is large. Typically with CDMA, the complexity of multiuser detection or soft interference cancellation algorithms grows in polynomial form with the number of users/user terminals. On the other hand, similar to IDMA, SCMA lends itself to a simple chip by chip detection algorithm whose total complexity grows only linearly with the number of users. Further, uncoded SCMA systems perform at least as well as and usually better than uncoded CDMA, and the performance gap between the two classes of schemes grows bigger for heavily loaded systems. Further, in conventional burst mode communication systems, a transmitter transmits burst mode signals at a certain frequency, phase and timing, which is received by a receiver through a communication channel. In conventional burst mode communication systems, it is necessary to quickly estimate various parameters of the received bursts as they arrive. These parameters include detection of the presence of a burst (start time), frequency, initial phase, timing and amplitude. In typical burst transmission systems, a unique word is used to facilitate the identification of the beginning of a transmitted burst and the determination of phase offset, by the receiver. The term “Unique Word” (UW) refers to a known, pre-determined pattern (known a priori to the receiver) that is transmitted at the beginning of each burst, whereby the receiver detects the UW and synchronizes with the received bursts (i.e., the receiver estimates the burst parameters based on the detected UW). For classical TDMA systems, the same UW is used by all of the terminals. While the complexity of SCMA grows only linearly with the number of users, however, with larger systems (e.g., having upwards of tens or hundreds of thousands of user terminals), SCMA system implementations can become relatively complex with each user/user terminal having a distinct scrambling signature. What is needed, therefore, is an approach for an SCMA system that scales more efficiently, and in a relatively less complex manner, to support a relatively large number of users/user terminals. Some Example Embodiments Embodiments of the present invention advantageously address the foregoing requirements and needs, as well as others, by providing an approach for an SCMA system that scales more efficiently in a relatively less complex manner, whereby individual terminals utilize respective assigned unique words and the receiver correlates received signal bursts against these UWs, which supports larger numbers of users/user terminals. Example embodiments of the present invention provide a new SCMA multiple access approach that facilitates random access to a communications channel by a network of terminals in an efficient manner without prior coordination. In accordance with such example embodiments, unique words are respectively assigned to individual terminals, and each terminal utilizes its assigned UW for each transmitted burst. At the receiver side, a receiver correlates the received signal bursts against these UWs to determine whether one or more terminals is accessing the channel and the number of terminals accessing the channel (assuming there is at least one), to identify the scrambling signature or initial vector each such terminal is utilizing to access the channel, and to synchronize with (e.g., determine the timing and phase of) each individual received modulated signal for proper demodulation and decoding. By way of example, a moderately sized set of UWs is assigned to the terminal population, where each different UW is associated with a respective scrambling signature (or, in the case of the use of the same scrambling signature with a different seed or initial vector, each different UW is associated with a respective initial vector) for the scrambler. Accordingly, a receiver separates overlapping transmissions from multiple terminals at the same frequency and the same time slot, based on a UW correlation process employed to detect the transmitted UWs in parallel and thereby identify the number of terminals accessing the channel and the scrambling signature/initial vector of each such terminal, and to synchronize with each individual received modulated signal for proper demodulation and decoding. In accordance with example embodiments, a communications terminal comprises and encoder, a scrambler and a modulator. The encoder is configured to encode a source digital data signal to generate an encoded signal, wherein the source digital data signal comprises a source bit stream. The scrambler is configured to scramble the encoded signal based on a scrambling signature. The modulator is configured to modulate a received sequence of data frames to generate a transmission signal for transmission via a random access channel of a wireless communications system, wherein each data frame comprises a data payload, which includes a block of the scrambled encoded signal, and a frame header, which includes a start of frame (SOF) sequence associated with the scrambling signature. The use of the SOF sequence for each frame of the sequence of data frames provides a reference for synchronization on frame boundaries and serves to designate use of the associated scrambling signature for descrambling and decoding the respective data payload of the frame. The use of the SOF sequence for each frame of the sequence of data frames serves to distinguish between the data frame and at least one data frame originating from a further communications terminal, transmitted via a common time slot of the random access channel, for which a different scrambling signature was used to scramble a respective encoded signal thereof. In accordance with further example embodiments, a multiple access communications scheme is provided. A source digital data signal is encodes to generate an encoded signal, wherein the source digital data signal comprises a source bit stream. The encoded signal is scrambled based on a scrambling signature. A received sequence of data frames is modulated to generate a transmission signal for transmission by a communications terminal via a random access channel of a wireless communications system, wherein each data frame comprises a data payload, which includes a block of the scrambled encoded signal, and a frame header, which includes a start of frame (SOF) sequence associated with the scrambling signature. The use of the SOF sequence for each frame of the sequence of data frames provides a reference for synchronization on frame boundaries and serves to designate use of the associated scrambling signature for descrambling and decoding the respective data payload of the frame. The use of the SOF sequence for each frame of the sequence of data frames serves to distinguish between the data frame and at least one data frame originating from a further communications terminal, transmitted via a common time slot of the random access channel, for which a different scrambling signature was used to scramble a respective encoded signal thereof. In accordance with example embodiments, a further multiple access communications scheme is provided. A transmitted signal is received via a random access channel of a wireless communications network, wherein the transmitted signal originated from a first communications terminal. A first start of frame (SOF) sequence of the transmitted signal is identified, and synchronization is attained on a frame boundary of a first data frame associated with the first SOF sequence. A first scrambling signature is determined based on the identified SOF sequence, and the first data frame is decoded using the determined scrambling signature. The first SOF sequence serves to distinguish between the respective data frame and at least one data frame originating from a further communications terminal, transmitted via a common time slot of the random access channel, for which a different scrambling signature was used to scramble a respective encoded signal thereof. In accordance with example embodiments, a system comprises a first communications terminal and a second communications terminal. The first communications terminal comprises a first encoder, a first scrambler and a first modulator. The first encoder is configured to encode a first source digital data signal to generate a first encoded signal, wherein the first source digital data signal comprises a first bit stream. The first scrambler is configured to scramble the first encoded signal based on a first scrambling signature. The first modulator is configured to modulate a received first sequence of data frames to generate a first transmission signal for transmission via a random access channel of a wireless communications system, wherein each data frame comprises a data payload, which includes a block of the scrambled first encoded signal, and a frame header, which includes a first start of frame (SOF) sequence associated with the first scrambling signature. The second communications terminal comprises a second encoder, a second scrambler and a second modulator. The second encoder is configured to encode a second source digital data signal to generate a second encoded signal, wherein the second source digital data signal comprises a second bit stream. The second scrambler is configured to scramble the second encoded signal based on a second scrambling signature. The second modulator is configured to modulate a received second sequence of data frames to generate a second transmission signal for transmission via the random access channel of the wireless communications system, wherein each data frame comprises a data payload, which includes a block of the scrambled second encoded signal, and a frame header, which includes a second start of frame (SOF) sequence associated with the second scrambling signature. The use of the first SOF sequence for each frame of the first sequence of data frames provides a reference for synchronization on frame boundaries and serves to designate use of the first scrambling signature for descrambling and decoding the respective data payload of the frame, and the use of the second SOF sequence for each frame of the second sequence of data frames a reference for synchronization on frame boundaries and serves to designate use of the second scrambling signature for descrambling and decoding the respective data payload of the frame, even where at least one frame of the first sequence of data frames and at least one frame of the second sequence of data frames are received in a common time slot of the random access channel. Still other aspects, features, and advantages of the present invention are readily apparent from the following detailed description, simply by illustrating a number of particular embodiments and implementations, including the best mode contemplated for carrying out the present invention. The present invention is also capable of other and different embodiments, and its several details can be modified in various obvious respects, all without departing from the spirit and scope of the present invention. Accordingly, the drawing and description are to be regarded as illustrative in nature, and not as restrictive.
The iso-algorithm is an innovative blend of established theorems from both the investment and actuarial fields. ‘iso’ stands for isomorphic-stochastic optimization. Taking price information as its input, the iso-algorithm neither assumes normality nor non-normality exclusively, but seeks to profit from both instances of normality and non-normality which can occur in the same stock over different periods. A key assumption is that non-normality is the resultant mixed effect of normal distributions in other domains. As such, the iso-algorithm processes price behavior in a non-time domain, optimizes the selected portfolio, then converts back to a time series for trade execution. A strength of the system lies in the fact that it is able to identify opportunities in any market using key characteristics of price behavior.
click to enlarge Sen. Sanders deplanes in Reno, Nev. It took an hour last Friday afternoon for Bern Force One to traverse a lonely stretch of the Great Basin Desert from tiny Elko, Nev., to Reno. Through the windows of Sen. Bernie Sanders' (I-Vt.) chartered Boeing 737, the snowcapped mountains of northern Nevada, pocked with gold and silver mines, morphed into an arid desert northeast of Lake Tahoe and the Sierras. The jet — partially filled with 64 campaign staffers, Secret Service agents, journalists, crew members and a presidential candidate — hit an updraft as it approached Reno-Tahoe International Airport and began to shudder and shake. A flight attendant, who had been collecting the remnants of the turkey club sandwiches served for lunch, stumbled in the aisle and took a seat where he was to ride out the turbulence. click to enlarge Paul Heintz Bern Force One on the tarmac in Elko, Nevada "Our father, who art in heaven, hallowed be thy name," recited a staffer who was slumming it with reporters near the back of the plane. "Thy kingdom come, thy will be done, on Earth as it is in heaven." He was joking. I think. As the wings of the plane flexed alarmingly, the captain finally turned on the seatbelt signs. "Oh, now?!" a CNN producer exclaimed. "Are you fucking kidding me?" Over the PA, the captain explained that he would have to take another pass at the runway from the opposite direction because the wind had shifted. When the plane finally touched down a few minutes later, the press section let out a collective sigh of relief. As Bern Force One taxied across the airfield, half a dozen Secret Service agents — seated in the middle of the plane between the press and campaign staff — hopped to their feet and hustled toward the rear exit. They were met on the tarmac by yet more agents and local law enforcement, who pulled up to the plane in a nine-vehicle motorcade. Eventually, the 22 reporters, photographers and producers accompanying Sanders on a 900-mile air journey across Nevada filtered out the rear door and onto a waiting bus. click to enlarge Paul Heintz Sen. Sanders' traveling press corps board a bus at Reno-Tahoe International Airport A few photographers cut away from the group to document the senator's descent from the front of the blue and white plane, emblazoned with Eastern Air Lines' retro logo. Their shutters whirred as a familiar mop of white hair made its way down a mobile staircase and into a black Ford Expedition. After a Secret Service agent closed the door behind Sanders, the motorcade sped off toward a nearby casino. It wasn't always like this. When I first followed Sanders on an exploratory trip to Iowa in September 2014, he made his way through the cornfields in a rented Toyota Camry with an entourage of two: longtime state director Phil Fiermonte and spokesman Michael Briggs. There were no advance teams or camera risers or security cordons — just three guys and a car. Back then, Sanders hadn't yet decided whether to seek the presidency — and few reporters seemed to care if he would. That weekend, 200 journalists showed up in Indianola for Hillary Clinton's first appearance in the state since the 2008 election. Only a handful dropped by Sanders' town hall meetings in Dubuque, Waterloo and Des Moines. Fast-forward 16 months to mid-January. As polls showed Sanders gaining on Clinton in Iowa and running away with New Hampshire, the campaign unveiled a big blue bus branded with its logo. Four days before the Iowa caucuses, I arrived in the Mississippi River town of Davenport and tossed my duffel bag on the chartered coach that trailed the Bernie Bus, carting reporters from rally to rally. click to enlarge Paul Heintz Sen. Sanders' bus last month in Davenport, Iowa Aboard the press bus was a trio of journalists who had been following Sanders since his campaign took off the summer before: the Washington Post's John Wagner, ABC's MaryAlice Parks and BuzzFeed News' Evan McMorris-Santoro. They were now joined by a dozen more reporters from the New York Times, the Associated Press and even the Italian daily La Repubblica, among others. Conducting the orchestra was Sanders' new director of traveling press, René Spellman, an Obama campaign veteran who serves as den mother to the reporters — making sure they are fed, housed and, most important of all, on time. She made clear that at the end of each event, we were to race back to the bus as soon as the senator breathed the words "thank you" to his audience. The arrangement was an improvement over my three previous trips to Iowa, during which I would often drive a rental car six hours a day, speeding from event to event, only to stumble into a motel room at night to write. Now I could transcribe my recordings and file stories from the back of a Windstar Lines charter as we chugged along I-80. Spellman ran a tight ship, but some things were out of her control. The morning after I boarded the bus, its battery died in the Hampton Inn Dubuque parking lot, briefly stranding us. And with the convenience of the bus came new limitations on our movement. Later that day, Sanders delivered short pep talks for volunteers in Charles City and Waverly. But due to space limitations at the venues, Spellman told us, only a small pool of reporters would be allowed to attend. The rest of us were deposited for the next four hours at a shopping mall in a Cedar Rapids suburb. McMorris-Santoro, a bear of a man with a beard resembling that of an Appalachian Trail thru-hiker, convinced a few of us to pass the time at HuHot Mongolian Grill, a chain restaurant with the charm of a Red Lobster. After fetching our food from a buffet line and watching black-clad chefs sauté it on a circular grill, we sat together at a corner table, chatting occasionally about a forthcoming Des Moines Register poll and other news of the day. But work on the campaign trail — especially for those hoping to break the next scooplet on Politico or BuzzFeed — never really stops. Even as we ostensibly socialized, we all had at least one eye on our inbox or Twitter feed. "There's such a weird set of small talk traveling reporters have," McMorris-Santoro later told me. "No. 1 is: What's your hotel points system, and what level of points do you have? No. 2 is: When was the last time you were home, and are you going home soon?" For McMorris-Santoro, the answers to the second set of questions seemed to be "ages ago" and "no." Three weeks later in Nevada, I overheard him telling another reporter that it'd been "several weeks" since he'd last seen his wife. "I think I still have friends back in the city," he told me, referring to his home in Washington, D.C. "I don't know. I haven't heard from them in a while." The morning after our Lindale Mall excursion, a television producer showed off to her fellow passengers the red Eddie Bauer jacket she'd bought after leaving HuHot. As we motored from Iowa City to Waterloo, Spellman told us we would likely have more time to kill after the next rally. "And then, I don't know, maybe we'll find another mall," she said. "Is that a threat?" a reporter asked. "That was definitely a threat," Spellman responded. click to enlarge Paul Heintz Secret Service agents deplane Bern Force One in Reno, Nevada A week after Sanders nearly tied Clinton at the Iowa caucuses, I met up with the traveling press corps again — this time in Bow, N.H. In the interim, the Sanders campaign had requested Secret Service protection for a reason it declined to reveal. Things had changed again. Inside the Hampton Inn Bow, agents rifled through our baggage and scanned us with metal detecting wands. They led us in a group to our new ride: one of two luxury buses in an 11-vehicle convoy. The seats were leather and spacious — a step up from the Windstar — and a kitchenette in back was stocked with snacks and a Keurig coffee machine. For security reasons, our movements were now even more restricted. As we raced down I-93 toward Nashua's Daniel Webster College, Spellman informed us that we would not be allowed to leave the secure press zones at each of the day's rallies to talk to voters, take a phone call or even take a piss — unless we asked permission. If we dawdled on our way back to the motorcade, we would be jettisoned from the bus for the rest of the day. That night, I glimpsed another aspect of campaign-trail life. As we drove through a light blizzard to Sanders' final Granite State event — a concert featuring Edward Sharpe and the Magnetic Zeros — an AP reporter sitting in front of me video-chatted with her two-year-old daughter. A McClatchy reporter sitting across the aisle from me frantically tried to track down a babysitter upon learning that her child's Washington, D.C., school would be closed the next day. After Sanders' big win in New Hampshire, he upgraded modes of transport once again. Within the next week, his traveling press corps was flying in the chartered 737 to Minnesota, Nevada, Colorado, Michigan, South Carolina and Georgia. McMorris-Santoro, who attended Sanders' hastily arranged campaign announcement last April in Washington, D.C., said the evolution has been "just wild" to witness. "There's all this structure around him now: the Secret Service, the planes, the advance teams," he said. "But it doesn't really feel like a new campaign. It feels like the same campaign in this whole new wrapping paper." He added: "One of the things that's stayed the same throughout this whole process is, really, fundamentally, Bernie." That can be a problem for reporters looking for a new story to tell. From rally to rally, Sanders delivers a remarkably consistent stump speech. Only in the first few minutes of his hourlong presentation does he occasionally toss out a tasty tidbit, such as a new critique of Clinton. For reporters trapped on the bus or plane and unable to pee without permission, it can be a challenge to get the flavor of a city or even talk to a real voter. As Sanders takes fewer questions from his audiences and holds fewer press conferences, spontaneity has become a scarce commodity. click to enlarge Sanders spokesman Michael Briggs So the traveling press corps seemed relieved last Friday in Nevada when his motorcade took an unexpected detour on its way to Elko Regional Airport and pulled up to the Coffee Mug Family Restaurant. Spellman let the photographers out of the bus first so that they could catch the candidate's arrival. Then she told the rest of us that we would have to wait outside the establishment while he dined with his wife, Jane, stepdaughter Heather Titus and her husband, Marc Titus. Grumbling ensued. After a few minutes, Sanders sent word to Spellman that the unwashed journalistic masses could be permitted entry after all, so long as we left our cameras on the bus. Inside, the reporters took seats in the middle of the diner and pretended to ignore Sanders and his family, seated at a booth in back. I sidled up to a mustachioed man at the counter, who was sipping a cup of coffee, and asked him what he made of the scene. "To be sittin' here, eating breakfast and seeing the Secret Service and a candidate come in," said Scott Crandall, a maintenance foreman at a local gold mine. "A little bit of a surprise. It's usually a little quieter." After quizzing Crandall about his political preferences — he did not sound likely to vote for Sanders — I noticed a commotion behind me. Spellman had given the traveling press corps the go-ahead to briefly photograph Sanders at his table. They swooped in like vultures to snag a morsel of something that at least appeared unscripted. I excused myself from the counter and joined the mob. Sanders played it cool — as if it was perfectly normal for nearly two dozen adults to document one's tea drinking — and offered a quick wave of acknowledgment. Spellman hustled us out of the Coffee Mug. We got another taste of pseudo-spontaneity that night after Bern Force One landed at McCarran International Airport, barely a mile from the Las Vegas strip. On the way to Sanders' now-traditional caucus-eve concert, the motorcade pulled into a parking garage in the bowels of Caesars Palace. Spellman led us through a back entrance, down an escalator and through a hallway lined with hanging uniforms. We entered an employee cafeteria, where casino workers ate by themselves and in small groups. Our den mother instructed us to hang back in one corner as Sanders worked the room. We would be permitted to approach him, a few at a time, to take photos and capture the conversation. There wasn't much of it. "Ha-lohhh," Sanders said as he worked his way though the cafeteria. "Ha-lohhh." The senator has never excelled at glad-handing, but he has learned over the course of the campaign to smile when posing for a selfie. Despite Spellman's admonitions, we soon surrounded Sanders as he made his way across the room. We held up our iPhones and tape recorders in search of a video or sound bite. When we got back to the bus, Spellman scolded us, gently, for overstepping our bounds. The next afternoon, Sanders lost the Nevada caucuses. His concession speech, delivered ahead of schedule in a sparsely filled pavilion 10 miles from Vegas, was the shortest I've seen since he joined the race last spring. It lasted just seven minutes. As he said the words "thank you," I watched the traveling press corps dutifully close their laptops and follow Spellman out of the venue. They were on their way, via Bern Force One, to South Carolina, Massachusetts, Virginia and beyond. I flew home on a commercial plane. When I spoke to McMorris-Santoro two days later, he said the mood on the plane had shifted. "Nevada was the first bad day," he said. "It seems like people on the campaign — I'm not sure about the candidate himself — are taking it pretty hard." For the past eight months, he noted, Sanders had enjoyed a steady upward trajectory. "There is a sense now that we can have bad days," the reporter said. "I think that's a different thought than people had even three or four days ago."
/*! * ClockPicker v0.0.7 (http://weareoutman.github.io/clockpicker/) * Copyright 2014 Wang Shenwei. * Licensed under MIT (https://github.com/weareoutman/clockpicker/blob/gh-pages/LICENSE) * * Further modified * Copyright 2015 Ching Yaw Hao. */ ;(function(){ var $ = window.jQuery, $win = $(window), $doc = $(document); // Can I use inline svg ? var svgNS = 'http://www.w3.org/2000/svg', svgSupported = 'SVGAngle' in window && (function() { var supported, el = document.createElement('div'); el.innerHTML = '<svg/>'; supported = (el.firstChild && el.firstChild.namespaceURI) == svgNS; el.innerHTML = ''; return supported; })(); // Can I use transition ? var transitionSupported = (function() { var style = document.createElement('div').style; return 'transition' in style || 'WebkitTransition' in style || 'MozTransition' in style || 'msTransition' in style || 'OTransition' in style; })(); // Listen touch events in touch screen device, instead of mouse events in desktop. var touchSupported = 'ontouchstart' in window, mousedownEvent = 'mousedown' + ( touchSupported ? ' touchstart' : ''), mousemoveEvent = 'mousemove.clockpicker' + ( touchSupported ? ' touchmove.clockpicker' : ''), mouseupEvent = 'mouseup.clockpicker' + ( touchSupported ? ' touchend.clockpicker' : ''); // Vibrate the device if supported var vibrate = navigator.vibrate ? 'vibrate' : navigator.webkitVibrate ? 'webkitVibrate' : null; function createSvgElement(name) { return document.createElementNS(svgNS, name); } function leadingZero(num) { return (num < 10 ? '0' : '') + num; } // Get a unique id var idCounter = 0; function uniqueId(prefix) { var id = ++idCounter + ''; return prefix ? prefix + id : id; } // Clock size var dialRadius = 135, outerRadius = 110, // innerRadius = 80 on 12 hour clock innerRadius = 80, tickRadius = 20, diameter = dialRadius * 2, duration = transitionSupported ? 350 : 1; // Popover template var tpl = [ '<div class="clockpicker picker">', '<div class="picker__holder">', '<div class="picker__frame">', '<div class="picker__wrap">', '<div class="picker__box">', '<div class="picker__date-display">', '<div class="clockpicker-display">', '<div class="clockpicker-display-column">', '<span class="clockpicker-span-hours text-primary"></span>', ':', '<span class="clockpicker-span-minutes"></span>', '</div>', '<div class="clockpicker-display-column clockpicker-display-am-pm">', '<div class="clockpicker-span-am-pm"></div>', '</div>', '</div>', '</div>', '<div class="picker__calendar-container">', '<div class="clockpicker-plate">', '<div class="clockpicker-canvas"></div>', '<div class="clockpicker-dial clockpicker-hours"></div>', '<div class="clockpicker-dial clockpicker-minutes clockpicker-dial-out"></div>', '</div>', '<div class="clockpicker-am-pm-block">', '</div>', '</div>', '<div class="picker__footer">', '</div>', '</div>', '</div>', '</div>', '</div>', '</div>' ].join(''); // ClockPicker function ClockPicker(element, options) { var popover = $(tpl), plate = popover.find('.clockpicker-plate'), holder = popover.find('.picker__holder'), hoursView = popover.find('.clockpicker-hours'), minutesView = popover.find('.clockpicker-minutes'), amPmBlock = popover.find('.clockpicker-am-pm-block'), isInput = element.prop('tagName') === 'INPUT', input = isInput ? element : element.find('input'), label = $("label[for=" + input.attr("id") + "]"), self = this, timer; this.id = uniqueId('cp'); this.element = element; this.holder = holder; this.options = options; this.isAppended = false; this.isShown = false; this.currentView = 'hours'; this.isInput = isInput; this.input = input; this.label = label; this.popover = popover; this.plate = plate; this.hoursView = hoursView; this.minutesView = minutesView; this.amPmBlock = amPmBlock; this.spanHours = popover.find('.clockpicker-span-hours'); this.spanMinutes = popover.find('.clockpicker-span-minutes'); this.spanAmPm = popover.find('.clockpicker-span-am-pm'); this.footer = popover.find('.picker__footer'); this.amOrPm = "PM"; // Setup for for 12 hour clock if option is selected if (options.twelvehour) { var amPmButtonsTemplate = [ '<div class="clockpicker-am-pm-block">', '<button type="button" class="btn-floating btn-flat clockpicker-button clockpicker-am-button">', 'AM', '</button>', '<button type="button" class="btn-floating btn-flat clockpicker-button clockpicker-pm-button">', 'PM', '</button>', '</div>' ].join(''); var amPmButtons = $(amPmButtonsTemplate); if(!options.ampmclickable) { $('<button type="button" class="btn-floating btn-flat clockpicker-button am-button" tabindex="1">' + "AM" + '</button>').on("click", function() { self.amOrPm = "AM"; self.amPmBlock.children('.pm-button').removeClass('active'); self.amPmBlock.children('.am-button').addClass('active'); self.spanAmPm.empty().append('AM'); }).appendTo(this.amPmBlock); $('<button type="button" class="btn-floating btn-flat clockpicker-button pm-button" tabindex="2">' + "PM" + '</button>').on("click", function() { self.amOrPm = 'PM'; self.amPmBlock.children('.am-button').removeClass('active'); self.amPmBlock.children('.pm-button').addClass('active'); self.spanAmPm.empty().append('PM'); }).appendTo(this.amPmBlock); } else { this.spanAmPm.empty(); $('<div id="click-am">AM</div>').on("click", function() { self.spanAmPm.children('#click-am').addClass("text-primary"); self.spanAmPm.children('#click-pm').removeClass("text-primary"); self.amOrPm = "AM"; }).appendTo(this.spanAmPm); $('<div id="click-pm">PM</div>').on("click", function() { self.spanAmPm.children('#click-pm').addClass("text-primary"); self.spanAmPm.children('#click-am').removeClass("text-primary"); self.amOrPm = 'PM'; }).appendTo(this.spanAmPm); } } //force input to type ( disable type=time ) input.attr('type','text'); //get the default value var value = ((this.options['default'] || this.input.prop('value') || 'now') + '').split(':'), submit = ((this.options['default'] || this.input.prop('value') || 'now') + '').split(':'); if(this.options.twelvehour && !(typeof value[1] === 'undefined')) { var hour = parseInt(value[0]); value[0] = (hour == 0) ? 12 : ((hour > 12) ? (hour - 12) : hour); value[1] = value[1] + ((hour < 12) ? 'AM' : 'PM'); } if (value[0] === 'now') { this.options.default = 'now'; var now = new Date(+ new Date() + this.options.fromnow), hour = now.getHours(), minute = now.getMinutes(); if( options.twelvehour ) { value = [ leadingZero((hour == 0) ? 12 : ((hour > 12) ? (hour - 12) : hour)), (leadingZero(minute) + (hour < 12 ? 'AM':'PM')) ]; } else { value = [ leadingZero(hour), leadingZero(minute) ]; } submit = [ leadingZero(hour), leadingZero(minute), '00' ]; input.prop({ default:submit.join(':') }).data({ default:submit.join(':'), submit:submit.join(':') }).attr({ 'data-default':submit.join(':'), 'data-submit':submit.join(':') }); } else { input.prop({value:(value[0] +':'+ value[1])}) .data({submit:submit.join(':')}) .attr({ value:(value[0] +':'+ value[1]), 'data-submit':submit.join(':') }); } if(options.darktheme) popover.addClass('darktheme'); // If autoclose is not setted, append a button $('<button type="button" class="btn-flat clockpicker-button" tabindex="' + (options.twelvehour? '3' : '1') + '">' + options.donetext + '</button>').click($.proxy(this.done, this)).appendTo(this.footer); $('<button type="button" class="btn-flat clockpicker-button" tabindex="' + (options.twelvehour? '4' : '2') + '">' + options.cleartext + '</button>').click($.proxy(this.clearInput, this)).appendTo(this.footer); this.spanHours.click($.proxy(this.toggleView, this, 'hours')); this.spanMinutes.click($.proxy(this.toggleView, this, 'minutes')); // Show or toggle input.on('focus.clockpicker click.clockpicker', $.proxy(this.show, this)); // Build ticks var tickTpl = $('<div class="clockpicker-tick"></div>'), i, tick, radian, radius; // Hours view if (options.twelvehour) { for (i = 1; i < 13; i += 1) { tick = tickTpl.clone(); radian = i / 6 * Math.PI; radius = outerRadius; tick.css('font-size', '140%'); tick.css({ left: dialRadius + Math.sin(radian) * radius - tickRadius, top: dialRadius - Math.cos(radian) * radius - tickRadius }); tick.html(i === 0 ? '00' : i); hoursView.append(tick); tick.on(mousedownEvent, mousedown); } } else { for (i = 0; i < 24; i += 1) { tick = tickTpl.clone(); radian = i / 6 * Math.PI; var inner = i > 0 && i < 13; radius = inner ? innerRadius : outerRadius; tick.css({ left: dialRadius + Math.sin(radian) * radius - tickRadius, top: dialRadius - Math.cos(radian) * radius - tickRadius }); if (inner) tick.css('font-size', '120%'); tick.html(i === 0 ? '00' : i); hoursView.append(tick); tick.on(mousedownEvent, mousedown); } } // Minutes view for (i = 0; i < 60; i += 5) { tick = tickTpl.clone(); radian = i / 30 * Math.PI; tick.css({ left: dialRadius + Math.sin(radian) * outerRadius - tickRadius, top: dialRadius - Math.cos(radian) * outerRadius - tickRadius }); tick.css('font-size', '140%'); tick.html(leadingZero(i)); minutesView.append(tick); tick.on(mousedownEvent, mousedown); } // Clicking on minutes view space plate.on(mousedownEvent, function(e) { if ($(e.target).closest('.clockpicker-tick').length === 0) mousedown(e, true); }); // Mousedown or touchstart function mousedown(e, space) { var offset = plate.offset(), isTouch = /^touch/.test(e.type), x0 = offset.left + dialRadius, y0 = offset.top + dialRadius, dx = (isTouch ? e.originalEvent.touches[0] : e).pageX - x0, dy = (isTouch ? e.originalEvent.touches[0] : e).pageY - y0, z = Math.sqrt(dx * dx + dy * dy), moved = false; // When clicking on minutes view space, check the mouse position if (space && (z < outerRadius - tickRadius || z > outerRadius + tickRadius)) return; e.preventDefault(); // Set cursor style of body after 200ms var movingTimer = setTimeout(function(){ self.popover.addClass('clockpicker-moving'); }, 200); // Place the canvas to top if (svgSupported) plate.append(self.canvas); // Clock self.setHand(dx, dy, !space, true); // Mousemove on document $doc.off(mousemoveEvent).on(mousemoveEvent, function(e){ e.preventDefault(); var isTouch = /^touch/.test(e.type), x = (isTouch ? e.originalEvent.touches[0] : e).pageX - x0, y = (isTouch ? e.originalEvent.touches[0] : e).pageY - y0; if (! moved && x === dx && y === dy) // Clicking in chrome on windows will trigger a mousemove event return; moved = true; self.setHand(x, y, false, true); }); // Mouseup on document $doc.off(mouseupEvent).on(mouseupEvent, function(e) { $doc.off(mouseupEvent); e.preventDefault(); var isTouch = /^touch/.test(e.type), x = (isTouch ? e.originalEvent.changedTouches[0] : e).pageX - x0, y = (isTouch ? e.originalEvent.changedTouches[0] : e).pageY - y0; if ((space || moved) && x === dx && y === dy) self.setHand(x, y); if (self.currentView === 'hours') self.toggleView('minutes', duration / 2); else if (options.autoclose) { self.minutesView.addClass('clockpicker-dial-out'); setTimeout(function(){ self.done(); }, duration / 2); } plate.prepend(canvas); // Reset cursor style of body clearTimeout(movingTimer); self.popover.removeClass('clockpicker-moving'); // Unbind mousemove event $doc.off(mousemoveEvent); }); } if (svgSupported) { // Draw clock hands and others var canvas = popover.find('.clockpicker-canvas'), svg = createSvgElement('svg'); svg.setAttribute('class', 'clockpicker-svg'); svg.setAttribute('width', diameter); svg.setAttribute('height', diameter); var g = createSvgElement('g'); g.setAttribute('transform', 'translate(' + dialRadius + ',' + dialRadius + ')'); var bearing = createSvgElement('circle'); bearing.setAttribute('class', 'clockpicker-canvas-bearing'); bearing.setAttribute('cx', 0); bearing.setAttribute('cy', 0); bearing.setAttribute('r', 2); var hand = createSvgElement('line'); hand.setAttribute('x1', 0); hand.setAttribute('y1', 0); var bg = createSvgElement('circle'); bg.setAttribute('class', 'clockpicker-canvas-bg'); bg.setAttribute('r', tickRadius); var fg = createSvgElement('circle'); fg.setAttribute('class', 'clockpicker-canvas-fg'); fg.setAttribute('r', 5); g.appendChild(hand); g.appendChild(bg); g.appendChild(fg); g.appendChild(bearing); svg.appendChild(g); canvas.append(svg); this.hand = hand; this.bg = bg; this.fg = fg; this.bearing = bearing; this.g = g; this.canvas = canvas; } raiseCallback(this.options.init); } function raiseCallback(callbackFunction) { if(callbackFunction && typeof callbackFunction === "function") callbackFunction(); } // Default options ClockPicker.DEFAULTS = { default: '', // default time, 'now' or '13:14' e.g. fromnow: 0, // set default time to * milliseconds from now (using with default = 'now') donetext: 'Done', // done button text cleartext: 'Clear', // done button text autoclose: false, // auto close when minute is selected ampmclickable: false, // set am/pm button on itself darktheme: false, // set to dark theme twelvehour: true, // change to 12 hour AM/PM clock from 24 hour vibrate: true, // vibrate the device when dragging clock hand submit: '' // Submit display text }; // Show or hide popover ClockPicker.prototype.toggle = function() { this[this.isShown ? 'hide' : 'show'](); }; // Set popover position ClockPicker.prototype.locate = function() { var element = this.element, popover = this.popover, offset = element.offset(), width = element.outerWidth(), height = element.outerHeight(), align = this.options.align, self = this; popover.show(); }; // Show popover ClockPicker.prototype.show = function(e){ this.setAMorPM = function(option) { var active = option; var inactive = (option == "pm"? "am":"pm"); if(this.options.twelvehour) { this.amOrPm = active.toUpperCase(); if(!this.options.ampmclickable) { this.amPmBlock.children('.' + inactive + '-button').removeClass('active'); this.amPmBlock.children('.' + active + '-button').addClass('active'); this.spanAmPm.empty().append(this.amOrPm); } else { this.spanAmPm.children('#click-' + active + '').addClass("text-primary"); this.spanAmPm.children('#click-' + inactive + '').removeClass("text-primary"); } } } // Not show again if (this.isShown) { return; } raiseCallback(this.options.beforeShow); $(':input').each(function() { $(this).attr('tabindex', -1); }) var self = this; // Initialize this.input.blur(); this.popover.addClass('picker--opened'); this.input.addClass('picker__input picker__input--active'); $(document.body).css('overflow', 'hidden'); if (!this.isAppended) { // Append popover to options.container if(this.options.hasOwnProperty('container')) this.popover.appendTo(this.options.container); else this.popover.insertAfter(this.input); this.setAMorPM("pm"); // Reset position when resize $win.on('resize.clockpicker' + this.id, function() { if (self.isShown) { self.locate(); } }); this.isAppended = true; } // Get the time var value = ((this.options['default'] || this.input.prop('value') || 'now') + '').split(':'); if(this.options.twelvehour && !(typeof value[1] === 'undefined')) { if(value[1].includes('AM') || parseInt(value[0]) < 12 ) this.setAMorPM("am"); else this.setAMorPM("pm"); value[1] = value[1].replace("AM", "").replace("PM", ""); } if (value[0] === 'now') { var now = new Date(+ new Date() + this.options.fromnow); if (now.getHours() >= 12) this.setAMorPM("pm"); else this.setAMorPM("am"); value = [ now.getHours(), now.getMinutes() ]; } this.hours = + value[0] || 0; this.minutes = + value[1] || 0; this.spanHours.html(leadingZero(this.hours)); this.spanMinutes.html(leadingZero(this.minutes)); // Toggle to hours view this.toggleView('hours'); // Set position this.locate(); this.isShown = true; // Hide when clicking or tabbing on any element except the clock and input $doc.on('click.clockpicker.' + this.id + ' focusin.clockpicker.' + this.id, function(e) { var target = $(e.target); if (target.closest(self.popover.find('.picker__wrap')).length === 0 && target.closest(self.input).length === 0) self.hide(); }); // Hide when ESC is pressed $doc.on('keyup.clockpicker.' + this.id, function(e){ if (e.keyCode === 27) self.hide(); }); raiseCallback(this.options.afterShow); }; // Hide popover ClockPicker.prototype.hide = function() { raiseCallback(this.options.beforeHide); this.input.removeClass('picker__input picker__input--active'); this.popover.removeClass('picker--opened'); $(document.body).css('overflow', 'visible'); this.isShown = false; $(':input').each(function(index) { $(this).attr('tabindex', index + 1); }); // Unbinding events on document $doc.off('click.clockpicker.' + this.id + ' focusin.clockpicker.' + this.id); $doc.off('keyup.clockpicker.' + this.id); this.popover.hide(); raiseCallback(this.options.afterHide); }; // Toggle to hours or minutes view ClockPicker.prototype.toggleView = function(view, delay) { var raiseAfterHourSelect = false; if (view === 'minutes' && $(this.hoursView).css("visibility") === "visible") { raiseCallback(this.options.beforeHourSelect); raiseAfterHourSelect = true; } var isHours = view === 'hours', nextView = isHours ? this.hoursView : this.minutesView, hideView = isHours ? this.minutesView : this.hoursView; this.currentView = view; this.spanHours.toggleClass('text-primary', isHours); this.spanMinutes.toggleClass('text-primary', ! isHours); // Let's make transitions hideView.addClass('clockpicker-dial-out'); nextView.css('visibility', 'visible').removeClass('clockpicker-dial-out'); // Reset clock hand this.resetClock(delay); // After transitions ended clearTimeout(this.toggleViewTimer); this.toggleViewTimer = setTimeout(function() { hideView.css('visibility', 'hidden'); }, duration); if (raiseAfterHourSelect) raiseCallback(this.options.afterHourSelect); }; // Reset clock hand ClockPicker.prototype.resetClock = function(delay) { var view = this.currentView, value = this[view], isHours = view === 'hours', unit = Math.PI / (isHours ? 6 : 30), radian = value * unit, radius = isHours && value > 0 && value < 13 ? innerRadius : outerRadius, x = Math.sin(radian) * radius, y = - Math.cos(radian) * radius, self = this; if(svgSupported && delay) { self.canvas.addClass('clockpicker-canvas-out'); setTimeout(function(){ self.canvas.removeClass('clockpicker-canvas-out'); self.setHand(x, y); }, delay); } else this.setHand(x, y); }; // Set clock hand to (x, y) ClockPicker.prototype.setHand = function(x, y, roundBy5, dragging) { var radian = Math.atan2(x, - y), isHours = this.currentView === 'hours', unit = Math.PI / (isHours || roundBy5? 6 : 30), z = Math.sqrt(x * x + y * y), options = this.options, inner = isHours && z < (outerRadius + innerRadius) / 2, radius = inner ? innerRadius : outerRadius, value; if (options.twelvehour) radius = outerRadius; // Radian should in range [0, 2PI] if (radian < 0) radian = Math.PI * 2 + radian; // Get the round value value = Math.round(radian / unit); // Get the round radian radian = value * unit; // Correct the hours or minutes if(options.twelvehour) { if(isHours) { if(value === 0) value = 12; } else { if(roundBy5) value *= 5; if(value === 60) value = 0; } } else { if(isHours) { if(value === 12) value = 0; value = inner ? (value === 0 ? 12 : value) : value === 0 ? 0 : value + 12; } else { if(roundBy5) value *= 5; if(value === 60) value = 0; } } if (isHours) this.fg.setAttribute('class', 'clockpicker-canvas-fg'); else { if(value % 5 == 0) this.fg.setAttribute('class', 'clockpicker-canvas-fg'); else this.fg.setAttribute('class', 'clockpicker-canvas-fg active'); } // Once hours or minutes changed, vibrate the device if (this[this.currentView] !== value) if (vibrate && this.options.vibrate) // Do not vibrate too frequently if (! this.vibrateTimer) { navigator[vibrate](10); this.vibrateTimer = setTimeout($.proxy(function(){ this.vibrateTimer = null; }, this), 100); } this[this.currentView] = value; this[isHours ? 'spanHours' : 'spanMinutes'].html(leadingZero(value)); // If svg is not supported, just add an active class to the tick if (! svgSupported) { this[isHours ? 'hoursView' : 'minutesView'].find('.clockpicker-tick').each(function(){ var tick = $(this); tick.toggleClass('active', value === + tick.html()); }); return; } // Place clock hand at the top when dragging if (dragging || (! isHours && value % 5)) { this.g.insertBefore(this.hand, this.bearing); this.g.insertBefore(this.bg, this.fg); this.bg.setAttribute('class', 'clockpicker-canvas-bg clockpicker-canvas-bg-trans'); } else { // Or place it at the bottom this.g.insertBefore(this.hand, this.bg); this.g.insertBefore(this.fg, this.bg); this.bg.setAttribute('class', 'clockpicker-canvas-bg'); } // Set clock hand and others' position var cx1 = Math.sin(radian) * (radius - tickRadius), cy1 = - Math.cos(radian) * (radius - tickRadius), cx2 = Math.sin(radian) * radius, cy2 = - Math.cos(radian) * radius; this.hand.setAttribute('x2', cx1); this.hand.setAttribute('y2', cy1); this.bg.setAttribute('cx', cx2); this.bg.setAttribute('cy', cy2); this.fg.setAttribute('cx', cx2); this.fg.setAttribute('cy', cy2); }; // Clear clock text ClockPicker.prototype.clearInput = function() { this.label.removeClass('active') this.input.val(""); this.hide(); if(this.options.afterDone && typeof this.options.afterDone === "function") this.options.afterDone(this.input, null); }; // Hours and minutes are selected ClockPicker.prototype.done = function() { raiseCallback(this.options.beforeDone); this.hide(); this.label.addClass('active'); var last = this.input.prop('value'), value = leadingZero(this.hours) + ':' + leadingZero(this.minutes); submit = leadingZero(this.hours) + ':' + leadingZero(this.minutes) + ':00'; if (this.options.twelvehour) { value = value + this.amOrPm; if ( this.amOrPm == 'PM' ) submit = ((this.hours < 12) ? (this.hours + 12) : 12) + ':' + leadingZero(this.minutes) + ':00'; else submit = ((this.hours < 12) ? leadingZero(this.hours) : '00') + ':' + leadingZero(this.minutes) + ':00'; } this.input .prop({'value': value}) .data({'submit':submit}) .attr({'value': value, 'data-submit':submit}); //Force data this.options.default = submit; if(value !== last) { this.input.triggerHandler('change'); if(!this.isInput) this.element.trigger('change'); } if(this.options.autoclose) this.input.trigger('blur'); console.log(this.input, submit) if(this.options.afterDone && typeof this.options.afterDone === "function") this.options.afterDone(this.input, submit) }; // Remove clockpicker from input ClockPicker.prototype.remove = function() { this.element.removeData('clockpicker'); this.input.off('focus.clockpicker click.clockpicker'); if (this.isShown) this.hide(); if (this.isAppended) { $win.off('resize.clockpicker' + this.id); this.popover.remove(); } }; // Extends $.fn.clockpicker $.fn.pickatime = function(option){ var args = Array.prototype.slice.call(arguments, 1); return this.each(function(){ var $this = $(this), data = $this.data('clockpicker'); if (!data) { var options = $.extend({}, ClockPicker.DEFAULTS, $this.data(), typeof option == 'object' && option); $this.data('clockpicker', new ClockPicker($this, options)); } else { // Manual operatsions. show, hide, remove, e.g. if (typeof data[option] === 'function') data[option].apply(data, args); } }); }; }());
<?php $expected = array('Weakref($o1)', ); $expected_not = array('MyClass', ); ?>
News: PD.com: "the lot of you are some of the most vicious, name calling, vile examples of humanity I've had the misfortune of attempting to communicate with. Even attempting to mimic the general mood of the place toward people who think differently leaves a slimy feel on my skin. Reptilian, even." " It's just that Depeche Mode were a bunch of optimistic loveburgers."- TGRR, shaming himself forever, 7/8/2017 "Billy, when I say that ethics is our number one priority and safety is also our number one priority, you should take that to mean exactly what I said. Also quality. That's our number one priority as well. Don't look at me that way, you're in the corporate world now and this is how it works."- TGRR, raising the bar at work. " It's just that Depeche Mode were a bunch of optimistic loveburgers."- TGRR, shaming himself forever, 7/8/2017 "Billy, when I say that ethics is our number one priority and safety is also our number one priority, you should take that to mean exactly what I said. Also quality. That's our number one priority as well. Don't look at me that way, you're in the corporate world now and this is how it works."- TGRR, raising the bar at work. I don't know, as a broken image, it could have still worked, as some kind of weird metaphor. A metaphor of what, I don't know, but it would have been resonant and shit. I have a very clear mental image of a computer monitor set up in a modern art gallery, with a browser open, displaying a broken image link. Visitors can open a new tab and copypaste the link to see the image.
Q: Left vs right degree of skew-field extensions Artin in his book, Geometric Algebra, says the connection between the left degree and right degree of a skew-field extension is unknown. Since I'm not an expert, I was wondering if someone knew the answer to this question. The book is rather old and there must have been some developments since that time. A: Anything that might happen does happen. In Schofield, A. H., Artin’s problem for skew field extensions, Math. Proc. Camb. Philos. Soc. 97, 1-6 (1985). ZBL0574.16008. it is shown that for any integers $m,n>1$ there is a skew field extension with left degree $m$ and right degree $n$. Cohn had previously proved the corresponding fact for an arbitrary pair of cardinals (greater than $1$) under the assumption that at least one is infinite.
--- title: VM への送受信ネットワーク トラフィック フローのログ記録 - チュートリアル - Azure Portal | Microsoft Docs description: Network Watcher の NSG フロー ログ機能を使用して、VM への送受信ネットワーク トラフィック フローをログに記録する方法を説明します。 services: network-watcher documentationcenter: na author: damendo tags: azure-resource-manager Customer intent: I need to log the network traffic to and from a VM so I can analyze it for anomalies. ms.assetid: 01606cbf-d70b-40ad-bc1d-f03bb642e0af ms.service: network-watcher ms.devlang: na ms.topic: tutorial ms.tgt_pltfrm: na ms.workload: infrastructure-services ms.date: 04/30/2018 ms.author: damendo ms.custom: mvc ms.openlocfilehash: da7d56a0fd8571e796567331a7543074f0bf1eda ms.sourcegitcommit: ad66392df535c370ba22d36a71e1bbc8b0eedbe3 ms.translationtype: HT ms.contentlocale: ja-JP ms.lasthandoff: 06/16/2020 ms.locfileid: "84808703" --- # <a name="tutorial-log-network-traffic-to-and-from-a-virtual-machine-using-the-azure-portal"></a>チュートリアル:Azure portal を使用して仮想マシンへの送受信ネットワーク トラフィックをログに記録する > [!div class="op_single_selector"] > - [Azure Portal](network-watcher-nsg-flow-logging-portal.md) > - [PowerShell](network-watcher-nsg-flow-logging-powershell.md) > - [Azure CLI](network-watcher-nsg-flow-logging-cli.md) > - [REST API](network-watcher-nsg-flow-logging-rest.md) > - [Azure Resource Manager](network-watcher-nsg-flow-logging-azure-resource-manager.md) ネットワーク セキュリティ グループ (NSG) により、仮想マシン (VM) への着信トラフィックと 送信トラフィックをフィルターできます。 Network Watcher の NSG フロー ログ機能により、NSG を通過するネットワーク トラフィックをログに記録できます。 このチュートリアルでは、以下の内容を学習します。 > [!div class="checklist"] > * ネットワーク セキュリティ グループで VM 作成する > * Network Watcher を有効にして、Microsoft.Insights プロバイダーを登録する > * Network Watcher の NSG フロー ログ機能を使用して、NSG のトラフィック フローのログを有効にする > * ログに記録されたデータをダウンロードする > * ログに記録されたデータを表示する Azure サブスクリプションをお持ちでない場合は、開始する前に [無料アカウント](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) を作成してください。 ## <a name="create-a-vm"></a>VM の作成 1. Azure Portal の左上隅にある **[+ リソースの作成]** を選択します。 2. **[Compute]** を選択し、 **[Windows Server 2016 Datacenter]** またはいずれかのバージョンの **Ubuntu Server** を選択します。 3. 次の情報を入力するか選択し、それ以外の設定では既定値をそのまま使用して、 **[OK]** を選択します。 |設定|値| |---|---| |名前|myVm| |ユーザー名| 任意のユーザー名を入力します。| |Password| 任意のパスワードを入力します。 パスワードは 12 文字以上で、[定義された複雑さの要件](../virtual-machines/windows/faq.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json#what-are-the-password-requirements-when-creating-a-vm)を満たす必要があります。| |サブスクリプション| サブスクリプションを選択します。| |Resource group| **[新規作成]** を選択し、「**myResourceGroup**と入力します。| |場所| **[米国東部]** を選択します。| 4. VM のサイズを選択して、 **[選択]** を選択します。 5. **[設定]** で、すべての既定値をそのままにして、 **[OK]** を選択します。 6. **[概要]** の **[作成]** で **[作成]** を選択して、VM のデプロイを開始します。 VM のデプロイには数分かかります。 残りの手順を続行する前に、VM がデプロイを完了するまで待ちます。 VM の作成には数分かかります。 VM の作成が完了するまで、残りの手順を続行しないでください。 ポータルで、VM が作成される際に、**myVm nsg** という名前のネットワーク セキュリティ グループも作成され、それが VM のネットワーク インターフェイスに関連付けられます。 ## <a name="enable-network-watcher"></a>Network Watcher を有効にする 米国東部リージョンで既に Network Watcher を有効にしている場合は、「[Insights プロバイダーの登録](#register-insights-provider)」に進んでください。 1. ポータルで **[すべてのサービス]** を選択します。 **[フィルター]** ボックスに、「*Network Watcher*」と入力します。 結果に **[Network Watcher]** が表示されたら、それを選択します。 2. 次の図に示すように、 **[リージョン]** を選択して展開し、 **[米国東部]** の右側の **[...]** を選択します。 ![Network Watcher を有効にする](./media/network-watcher-nsg-flow-logging-portal/enable-network-watcher.png) 3. **[Network Watcher の有効化]** を選択します。 ## <a name="register-insights-provider"></a>Insights プロバイダーの登録 NSG フローのログ記録には、**Microsoft.Insights** プロバイダーが必要です。 このプロバイダーを登録するには、次の手順を実行します。 1. ポータルの左上隅の **[すべてのサービス]** を選択します。 [フィルター] ボックスに「*Subscriptions*」と入力します。 検索結果に **[Subscriptions]** が表示されたら、それを選択します。 2. サブスクリプションの一覧から、プロバイダーを有効にするサブスクリプションを選択します。 3. **[設定]** で、 **[リソース プロバイダー]** を選択します。 4. 次の図に示すように、**microsoft.insights** プロバイダーの **[状態]** が **[登録済み]** であることを確認します。 状態が **[未登録]** である場合、プロバイダーの右側の **[登録]** を選択します。 ![プロバイダーの登録](./media/network-watcher-nsg-flow-logging-portal/register-provider.png) ## <a name="enable-nsg-flow-log"></a>NSG フロー ログの有効化 1. NSG フロー ログ データは Azure Storage アカウントに書き込まれます。 Azure Storage アカウントを作成するには、ポータルの左上隅の **[+ リソースの作成]** を選択します。 2. **[ストレージ]** 、 **[ストレージ アカウント - Blob、File、Table、Queue]** の順に選択します。 3. 次の情報を入力するか選択し、それ以外の情報は既定値をそのまま使用して、 **[作成]** を選択します。 | 設定 | 値 | | --- | --- | | 名前 | 3 ~ 24 文字の長さで、小文字の英数字のみを含めることができ、すべての Azure Storage アカウントで一意である必要があります。 | | 場所 | **[米国東部]** を選択します。 | | Resource group | **[既存のものを使用]** 、 **[myResourceGroup]** の順に選択します | ストレージ アカウントの作成には、しばらくかかる場合があります。 ストレージ アカウントが作成されるまで、残りの手順を続行しないでください。 どのような場合でも、ストレージ アカウントは、NSG と同じリージョンに存在する必要があります。 4. ポータルの左上隅の **[すべてのサービス]** を選択します。 *[フィルター]* ボックスに「**Network Watcher**」と入力します。 検索結果に **[Network Watcher]** が表示されたら、それを選択します。 5. 次の図に示すように、 **[ログ]** の  **[NSG フロー ログ]** を選択します。 ![NSG](./media/network-watcher-nsg-flow-logging-portal/nsgs.png) 6. NSG の一覧から **myVm-nsg** という名前の NSG を選択します。 7. **[フローのログ設定]** の下で **[オン]** を選択します。 8. フロー ログのバージョンを選択します。 バージョン 2 には、フローセッションの統計 (バイトおよびパケット) が含まれます。 ![フロー ログのバージョンの選択](./media/network-watcher-nsg-flow-logging-portal/select-flow-log-version.png) 9. 手順 3 で作成したストレージ アカウントを選択します。 > [!NOTE] > NSG フロー ログは、[階層型名前空間](https://docs.microsoft.com/azure/storage/blobs/data-lake-storage-namespace)が有効になっているストレージ アカウントでは正しく動作しません。 1. ポータルの左上隅の **[すべてのサービス]** を選択します。 *[フィルター]* ボックスに「**Network Watcher**」と入力します。 検索結果に **[Network Watcher]** が表示されたら、それを選択します。 10. **[リテンション期間 (日数)]** を 5 に設定し、 **[保存]** を選択します。 ## <a name="download-flow-log"></a>フロー ログのダウンロード 1. ポータルの Network Watcher から、 **[ログ]** の下の **[NSG フロー ログ]** を選択します。 2. 次の図に示すように、 **[構成済みのストレージ アカウントからフローのログをダウンロードできました。]** を選択します。 ![フロー ログをダウンロードする](./media/network-watcher-nsg-flow-logging-portal/download-flow-logs.png) 3. 「[NSG フロー ログの有効化](#enable-nsg-flow-log)」の手順 2 で構成したストレージ アカウントを選択します。 4. **[Blob service]** で **[コンテナー]** を選択し、 **[insights-logs-networksecuritygroupflowevent]** コンテナーを選択します。 5. 次の図に示すように、コンテナー内のフォルダー階層を PT1H.json ファイルに到達するまで移動します。 ログ ファイルは、次の名前規則に従ってフォルダー階層に書き込まれます。 https://{storageAccountName}.blob.core.windows.net/insights-logs-networksecuritygroupflowevent/resourceId=/SUBSCRIPTIONS/{subscriptionID}/RESOURCEGROUPS/{resourceGroupName}/PROVIDERS/MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/{nsgName}/y={year}/m={month}/d={day}/h={hour}/m=00/macAddress={macAddress}/PT1H.json ![フローのログ](./media/network-watcher-nsg-flow-logging-portal/log-file.png) 6. PT1H.json ファイルの右側の **[...]** を選択し、 **[ダウンロード]** を選択します。 ## <a name="view-flow-log"></a>フロー ログの表示 次の json は、データがログに記録される各フローについて、PT1H.json ファイルに表示される内容の例です。 ### <a name="version-1-flow-log-event"></a>バージョン 1 のフロー ログ イベント ```json { "time": "2018-05-01T15:00:02.1713710Z", "systemId": "<Id>", "category": "NetworkSecurityGroupFlowEvent", "resourceId": "/SUBSCRIPTIONS/<Id>/RESOURCEGROUPS/MYRESOURCEGROUP/PROVIDERS/MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/MYVM-NSG", "operationName": "NetworkSecurityGroupFlowEvents", "properties": { "Version": 1, "flows": [ { "rule": "UserRule_default-allow-rdp", "flows": [ { "mac": "000D3A170C69", "flowTuples": [ "1525186745,192.168.1.4,10.0.0.4,55960,3389,T,I,A" ] } ] } ] } } ``` ### <a name="version-2-flow-log-event"></a>バージョン 2 のフロー ログ イベント ```json { "time": "2018-11-13T12:00:35.3899262Z", "systemId": "a0fca5ce-022c-47b1-9735-89943b42f2fa", "category": "NetworkSecurityGroupFlowEvent", "resourceId": "/SUBSCRIPTIONS/00000000-0000-0000-0000-000000000000/RESOURCEGROUPS/FABRIKAMRG/PROVIDERS/MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/FABRIAKMVM1-NSG", "operationName": "NetworkSecurityGroupFlowEvents", "properties": { "Version": 2, "flows": [ { "rule": "DefaultRule_DenyAllInBound", "flows": [ { "mac": "000D3AF87856", "flowTuples": [ "1542110402,94.102.49.190,10.5.16.4,28746,443,U,I,D,B,,,,", "1542110424,176.119.4.10,10.5.16.4,56509,59336,T,I,D,B,,,,", "1542110432,167.99.86.8,10.5.16.4,48495,8088,T,I,D,B,,,," ] } ] }, { "rule": "DefaultRule_AllowInternetOutBound", "flows": [ { "mac": "000D3AF87856", "flowTuples": [ "1542110377,10.5.16.4,13.67.143.118,59831,443,T,O,A,B,,,,", "1542110379,10.5.16.4,13.67.143.117,59932,443,T,O,A,E,1,66,1,66", "1542110379,10.5.16.4,13.67.143.115,44931,443,T,O,A,C,30,16978,24,14008", "1542110406,10.5.16.4,40.71.12.225,59929,443,T,O,A,E,15,8489,12,7054" ] } ] } ] } } ``` 前の出力の **mac** の値は、VM の作成時に作成されたネットワーク インターフェイスの MAC アドレスです。 **flowTuples** のコンマで区切られた情報を次に示します。 | サンプル データ | データが表す内容 | 説明 | | --- | --- | --- | | 1542110377 | タイム スタンプ | UNIX EPOCH 形式でフローが発生した際のタイム スタンプ。 前の例では、日付は 2018 年 5 月 1 日午後 2:59:05 GMT に変換されます。 | | 10.0.0.4 | 送信元 IP アドレス | フローが発生したソース IP アドレス。 10.0.0.4 は、「[VM の作成](#create-a-vm)」で作成した VM のプライベート IP アドレスです。 | 13.67.143.118 | 宛先 IP アドレス | フローが送信された宛先 IP アドレス。 | | 44931 | 発信元ポート | フローが発生したソース ポート。 | | 443 | 宛先ポート | フローが送信された宛先ポート。 トラフィックの送信先はポート 443 であったため、ログ ファイルの **UserRule_default-allow-rdp** という規則によって、フローが処理されました。 | | T | Protocol | フローのプロトコルが TCP (T) かまたは UDP (U) か。 | | O | Direction | トラフィックが受信 (I) かまたは送信 (O) か。 | | A | アクション | トラフィックが許可された (A) かまたは拒否された (D) か。 | C | フロー状態 (**バージョン 2 のみ**) | フローの状態をキャプチャします。 次の状態があります。**B**:開始。フローが作成された時点です。 統計は提供されません。 **C**: 継続中。フローが進行中です。 5 分間隔で統計が提供されます。 **E**:終了。フローが終了した時点です。 統計が提供されます。 | | 30 | 送信済みパケット数 - 送信元から宛先 (**バージョン 2 のみ**) | 最後の更新以降に送信元から宛先に送信された TCP または UDP パケットの総数。 | | 16978 | 送信済みバイト数 - 送信元から宛先 (**バージョン 2 のみ**) | 最後の更新以降に送信元から宛先に送信された TCP または UDP パケットのバイト数の合計。 パケットのバイト数には、パケット ヘッダーとペイロードが含まれます。 | | 24 | 送信済みパケット数 - 宛先から送信元 (**バージョン 2 のみ**) | 最後の更新以降に宛先から送信元に送信された TCP または UDP パケットの総数。 | | 14008| 送信済みバイト数 - 宛先から送信元 (**バージョン 2 のみ**) | 最後の更新以降に宛先から送信元に送信された TCP および UDP パケットのバイト数の合計。 パケットのバイト数には、パケット ヘッダーとペイロードが含まれます。| ## <a name="next-steps"></a>次のステップ このチュートリアルでは、NSG の NSG フローのログ記録を有効にする方法について説明しました。 また、ファイルに記録されたデータをダウンロードし、表示する方法も説明しました。 Json ファイル内の生データは解釈が難しい場合があります。 フロー ログのデータを視覚化する際は、[Azure Traffic Analytics](traffic-analytics.md) や [Microsoft Power BI](network-watcher-visualize-nsg-flow-logs-power-bi.md) などのツールを使用できます。 [PowerShell](network-watcher-nsg-flow-logging-powershell.md)、[Azure CLI](network-watcher-nsg-flow-logging-cli.md)、[REST API](network-watcher-nsg-flow-logging-rest.md)、[ARM テンプレート](network-watcher-nsg-flow-logging-azure-resource-manager.md)など、他の方法でも、NSG フロー ログを有効にしてみましょう。
This invention relates, in general, to a fluid compressor, and, more particularly, to a compressor having an improved inlet valve arrangement. Most current reciprocating compressor cylinders utilize a piston that reciprocates in a compressor cylinder formed in a frame with outer heads used to close off the ends of the cylinder. Inlet and discharge xe2x80x9ccheck typexe2x80x9d valves are provided for controlling the intake into, and the discharge from, the cylinder, and the reciprocating piston compresses the fluid internally within the compressor cylinder confines. The valves can be mounted tangentially to the bore of the cylinder or in the heads at a variety of angles to the axis of the piston. However half the available area is usually allocated to the inlet valves and porting, and the other half to the discharge valves and porting. Thus, only a relatively low number of inlet valves can be used at each end of the compressor. This, of course, limits the inlet valve area and therefore the compression efficiency of the compressor.
Control of photosynthate partitioning in spinach leaves : Analysis of the interaction between feedforward and feedback regulation of sucrose synthesis. Experiments were carried out to estimate the elasticity coefficients and thence the distribution of control of sucrose synthesis and photosynthate partitioning between cytosolic fructose-1,6-bisphosphatase and sucrose-phosphate synthase (SPS), by applying the dualmodulation method of Kacser and Burns (1979, Biochem. Soc. Trans. 7, 1149-1161). Leaf discs of spinach (Spinacia oleracea L.) were harvested at the beginning and end of the photoperiod and illuminated at five different irradiances to alter (i) the extent of feedback inhibition and (ii) the rate of photosynthesis. The rate of CO2 fixation, sucrose synthesis and starch synthesis were measured and compared with the activation of SPS, and the levels of fructose-2,6-bisphosphate (Fru2,6bisP) and metabolites. Sucrose synthesis increased progressively with increasing irradiance, accompanied by relatively large changes of SPS activity and Fru2,6bisP, and relatively small changes of metabolites. At each irradiance, leaf discs harvested at the end of the photoperiod had (compared with leaf discs harvested at the beginning of the photoperiod) a decreased rate of sucrose synthesis, increased starch synthesis, decreased SPS activity, increased Fru2,6bisP, a relatively small (20%) increase of most metabolites, no change of the glycerate-3-phosphate: triose-phosphate ratio, a small increase of NADPmalate dehydrogenase activation, but no inhibition of photosynthesis. The changes of sucrose and starch synthesis were largest in low light, while the changes of SPS and Fru2,6bisP were as large, or even larger, in high light. It is discussed how these results provide evidence that the control of sucrose synthesis is shared between SPS and fructose-1,6-bisphosphatase, and provide information about the in-vivo response of these enzymes to changes in the levels of their substrates and effectors. At low fluxes, feedback regulation is very effective at altering partitioning. In high light, changes of SPS activation and Fru2,6bisP can be readily overriden by increasing levels of metabolites.
Washington (AFP) – Donald Trump rejected calls to step aside as the Republican presidential nominee over lewd remarks he made about women, telling The Wall Street Journal on Saturday there is “zero chance I’ll quit.” “I never, ever give up,” the newspaper quoted Trump as saying in response to calls by some Republicans that he quit the race after being caught in a 2005 videotape boasting of groping women’s genitals with impunity.
“There's no special, secret sauce there. It’s about having real conversations with real people, and when you do that you stay tethered to the things that matter. And that’s what people want,” said Gov. Gretchen Whitmer of Michigan. | Bill Pugliano/Getty Images 2020 elections Midwest governors to 2020 Dems: ‘Show up’ The governors of Michigan, Pennsylvania and Wisconsin urged 2020 Democrats to seek consensus — and to visit their states. The class of Democratic governors that swept to victory in three key Midwestern states has some advice for Democratic presidential candidates: Keep it simple. Don’t overpromise. And most important, don’t ignore their states. Democratic Govs. Gretchen Whitmer of Michigan, Tom Wolf of Pennsylvania and Tony Evers of Wisconsin aren't known for fiery rhetoric. But in interviews with POLITICO on the sidelines of the National Governors Association’s winter meetings, the three Democrats — all from states President Donald Trump pried out of the Democratic presidential coalition in 2016 — stressed in uncharacteristically pointed language the importance of drilling down on issues that affect people every day, like health care, education and infrastructure, to reassemble a winning Democratic electoral map in 2020. The governors’ incremental recommendations put them at odds with the ascendant left in the Democratic Party, which is pushing expansive environmental and health care policies like the Green New Deal and “Medicare for All.” But most of all, Whitmer, whose direct “fix the damn roads” campaign slogan helped her to an easy victory in 2018, said 2020 Democrats need to start just by showing their faces in the states that sent Trump to the White House. Hillary Clinton infamously spent little time campaigning in Michigan or Wisconsin after the primaries in 2016. “What any candidate should do in any race, frankly, is to show up,” Whitmer said. “There’s no special, secret sauce there. It’s about having real conversations with real people, and when you do that you stay tethered to the things that matter. And that’s what people want.” COUNTDOWN TO 2020 The race for 2020 starts now. Stay in the know. Follow our presidential election coverage. Email Sign Up By signing up you agree to receive email newsletters or alerts from POLITICO. You can unsubscribe at any time. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Wolf, who coasted to a second term in Pennsylvania, said Democrats need to make that face-to-face pitch to rebuild trust in their party. “I think before anybody starts talking about issues we’ve got a trust problem,” Wolf said, adding: “If I’m 100 percent of where you want me to be on policy but you don’t trust me you won’t support me.” “People voted in ’16 to blow it up,” Wolf continued. “And it’s up to either party to come back in 2020 with candidates who can convince voters that they can put it back together.” Evers, the former education superintendent in Wisconsin who beat Republican incumbent Scott Walker by less than 30,000 votes last year, urged fellow Democrats to home in on health care, education, and infrastructure — and not to promise the moon. “I think the important thing for me is someone that is willing to address those issues in a proactive way but also make people feel comfortable that they can actually accomplish something,” Evers said. “Treat[ing] people with dignity and respect and not being hard-edged about everything — I think it’s important,” Evers added. “People like their leaders to be reasonable and find common ground.” Winning back these three Midwestern states, which went Democratic in six straight presidential elections from 1992 to 2012 but flipped to Trump by less than 1 percentage point apiece in 2016, is the clearest path back to the White House for Democrats, though the party will also target some fast-changing states in the South and Southwest. Democratic Sen. Amy Klobuchar has made her electoral success in Minnesota a key piece of her campaign, while appealing to white working-class Midwesterners is central to the rationales of Sen. Sherrod Brown (D-Ohio) and former Vice President Joe Biden as they consider presidential campaigns. They would face intense competition from more strident ideologues in the Democratic presidential field, as did the governors now offering their advice to the candidates. Evers was never regarded as the most exciting candidate among eight in his Democratic primary in Wisconsin last year. Whitmer, meanwhile, fielded criticism for being too conservative on health care compared to her opponents for the Democratic nomination in Michigan, and Wolf has forged a relatively low national profile in his fifth year as governor of Pennsylvania, where he has largely stayed out of intraparty policy fights. But even as their party gears up for an ideological and potentially divisive presidential primary, the governors preached unity among Democrats. “I don’t think there’s a big fundamental disagreement of what we ought to do,” Wolf said. Evers noted that health care was a winning issue for Democrats of all stripes in the midterms. “I’d continue that,” Evers said. Their states have not gotten a huge amount of personal attention from Democratic presidential candidates so far this year, though Klobuchar recently made a stop in Wisconsin. But Whitmer said she will offer as much help as she can to candidates who want to come to her state. “I’m going to invite every Democratic candidate who wants to come into Michigan, we’ll make sure they've got all the same access to all the same tools and they should show up and talk to people,” Whitmer said. “And that way, the people of Michigan can make a decision based on who they think is really going to show up for them in the White House.”
Q: Compare two sheets and find differences, copy to third sheet I have been trying to compare two sheets. The sheets are versions, one made in August, the other in September. In Sheet1, column C I have a unique ID that could also be in sheet 2, but could also be not present. On the other hand, I could have NEW ID's in sheet 2, that are not present in Sheet1. I am trying to: Identify IDs not in "other" sheet, copy entire row to sheet3 Check if C-column value exists in other sheet, then it has to find the differences in THOSE two rows, 12 columns out Example, in sheet1: ID Jan Feb Mar Apr May 14578596 125 125 125 0 10 22345697 10 10 10 10 20 12563654 150 150 75 75 75 85745896 890 890 890 890 790 and in sheet 2: ID Jan Feb Mar Apr May 14578596 125 125 125 0 10 12563654 150 150 75 75 75 85745896 890 890 790 890 790 87544545 0 0 0 0 10 In sheet 3, it should copy over the newly added ID 87544545 and all the values in the following columns. It should copy over the ID's 22345697 entire row as well, as being non-existing in the other sheet is considered a difference. For the others, that exist in both sheets, it should Take "Jan-Jan" and return the difference value. So it should lookup if "ID" exists in other sheet, if it does, compare the Jan-Feb-Mar with each other. Note that ID's are NOT in the same position in the sheets. With ID 85745896 it would return: ID Jan Feb Mar Apr May 85745896 0 0 100 0 0 I have tried to look at topics such as Compare data from 2 sheets and find mismatches and Check if two rows are the EXACT SAME in MS Excel but can't seem to make them work for my challenge here. A: Sub compare() For i = 1 To last_cell_mainSheet For j = 1 To last_cell_sheet2 If Worksheets("main_sheet").Range("a" & i).Value = Worksheets("sheet2").Range("a" & j).Value Then Worksheets("main_sheet").Range("C" & i).Value = Worksheets("sheet2").Range("b" & j).Value End If Next j Next i End Sub
But how can you be arguably the best player on a team and still be one passed by on first glance through a roster or stat sheet? Injuries. For Walsh, it's been a barrage of injuries that have limited the senior winger to just 77 career games entering this weekend. Twice his hip has needed to be surgically repaired to get him back onto the ice playing again, most recently last spring. The latest surgery cut short Walsh's junior year, one in which he had 10 points in eight games played and was well on his way to making a real name for himself outside of Hanover. "It has been very difficult missing so much time due to injury, especially since the time of my injury last year came when I thought I was playing the best hockey of my life," the Shannonville, Ontario, native said. "So coming back and still not feeling as good as I have in the past has made it difficult to get back the confidence I had last year. But every weekend my hip feels better and better and with that comes a little more confidence in my game." Walsh was around the team after having the surgery, but his presence in the locker room further cast light on the hole in the team's lineup on the ice each Friday and Saturday night from January on. A Montreal Canadiens prospect after being selected in the 2009 NHL Entry Draft, Walsh came to Dartmouth with hefty expectations. Those expectations have continued as one college hockey media outlet tabbed him as this season's ECAC Hockey Preseason Player of the Year. However, he had a familiar face to help him adjust to the college game and media attention once he got here. Older brother Nick Walsh '12 had already been in Hanover for a year when the recruiting of Dustin started. Offers to go play elsewhere were not as appetizing as suiting up alongside his brother in a Big Green sweater for three years. "The recruiting process for me was a pretty easy decision to come here. My brother was already playing here and told me he loved it. Coach Peters offered for me to come in as an 18-year old, which was something I knew I wanted to do and not go back for an extra year of junior." Now the lone Walsh brother as Nick has graduated and gone on to the pro hockey ranks, Dustin is left to make a solo mark on Dartmouth's program. "At first it was really weird coming back to school without Nick and not having him around, but I was also pretty close with that entire class and losing such a big group of close friends was definitely strange for the first few weeks of school." Gone are the 10 from the class of 2012 that were on last year's team, leaving just five seniors to lead ECAC Hockey's youngest team made up of 18 underclassmen. Walsh is a vital part of that leadership group, wearing the 'A' as one of the team's alternate captains. "Being named one of the assistant captains was an honor for me, but I don't feel as though my role has changed much," the reserved and soft-spoken Walsh said. "I have never been a big talker in the dressing room or on the bench. I've always considered myself a 'lead-by-example' guy and I just try to work hard every day to get better and stronger and stay positive when things aren't going our way. I leave the speeches and stuff like that to the guys that are more comfortable in that role." A beloved teammate, Walsh has had the opportunity to learn from the top coaches in the world, attending Canadiens prospect development camps during the summers. There, he has shaped his NHL-style work ethic that has made him more than just a talented player, but one driven to constantly look for ways to improve his game. "Canadiens development camps are always a good experience every summer. They have a skating coach there that I work a lot with to keep improving my speed and acceleration, my two main areas of focus. They want me to keep improving on my skating and continue to get stronger, which is what I really work on when I'm here in Hanover." With Dartmouth in the midst of what could be one of its best seasons in program history, Walsh knows that the team's current hiccup will pass and better things are ahead for 2013. "We have a really strong team this year and I also think our guys know we are better than what we've been in the last three games. I just think we need to relax a little and get back to playing the game that got us this far. Some guys need to calm down a bit and stop gripping the stick so tight and we can get back to scoring the way we were before the break." He doesn't talk often. He sits at the back of the bus and watches movies on his laptop during road trips. He's not the player you hear cracking jokes at the dinner table either. But when he does talk, people take notice.?
The Fritt Ord Tribute 2017 Leo Ajkic and "the shameless girls" The Freedom of Expression Foundation Tribute is awarded to Leo Ajkic for his innovative contributions to the TV series “Escape”, which has engendered considerable insight into the situation of refugees, opening new perspectives in the immigration and integration debate, and to “the shameless girls”, represented by three of them, Amina Bile, Nancy Herz and Sofia Srour, for their personal, valiant efforts to shed light on the strong social control existing in minority groups. Leo Ajkic, Amina Bile, Nancy Herz and Sofia Srour. Leo Ajkic Leo Ajkic hosts the NRK TV series "Escape” (Flukt), produced by Pandora Film of Bergen. The series was broadcast in January and February 2017. In “Escape”, Ajkic has cleverly used his own background as a refugee to convey the personal, dramatic stories of refugees in Europe and Norway: Who are they? How do they live? What do they think? What do they dream about? The series has attracted large numbers of viewers, and “Escape” has given rise to a great deal of constructive, informative debate, not least among young people. There are 65 million displaced people in the world today. Ajkic gives the viewers insight into their situation with empathy and clarity. Leo Ajkic. Photo: Tom A. Kolstad, Aftenposten. Leo Ajkic (33) was born in Mostar, Bosnia. He and his family were displaced for four years before he arrived in Bergen as an 11-year-old refugee. He currently lives in Oslo. Ajkic has 10 years of experience as a programme host on radio and TV, not least with several creative series for young people. He also works as a musician and music producer. Amina Bile, Nancy Herz, Sofia Srour “The shameless girls” became a buzzword after Nancy Herz used the phrase in a debate column in the daily newspaper Aftenposten in spring 2016. In that context, she wrote: “We are the shameless Arab girls, and our time has come. We are seeing a growing number of girls from minority groups standing up and defying our own.” Numerous young Norwegian women from ethnic minority backgrounds have been particularly concerned about this same topic over the past year, among them, Amina Bile and Sofia Srour. They have set their own agendas in debates on topics not previously discussed in depth, e.g. cultures of honour, gender roles and social control of women in minority groups. These young women are leaving a clear footprint on the public debate. They speak and write based on totally different experiences as individuals, usually without organisations behind them. Brave young women have inspired them, and now we see that many are beginning to follow. Three of the most prominent “shameless girls” have been selected to receive the Freedom of Expression Foundation Tribute: Amina Bile (18) is from Skien, goes to school in Porsgrunn, and leads the Socialist Youth League in Telemark County. Amina Bile. Photo: Torstein Bøe, NTB Scanpix. Nancy Herz (20) is from Haugesund, comes from a Lebanese background, and is currently studying law in Oslo. She is 1st deputy on the Board of Amnesty International Norway. Nancy Herz. Photo: Harald Nordbakken, Haugesunds Avis. Sofia Srour (22) is from Nøtterøy, and is currently working on a master’s degree in law in Oslo. Sofia Srour. Photo: Maria Gossé. The Freedom of Expression Foundation Tribute The Freedom of Expression Foundation Tribute is accompanied by a cash award of NOK 100 000, and it is awarded by the Fritt Ord Foundation’s Board to show appreciation for constructive activities to promote freedom of speech, often in conjunction with relevant issues. The Fritt Ord Foundation’s Board awards the Freedom of Expression Foundation Tribute. The award ceremony for Leo Ajkic, Amina Bile, Nancy Herz and Sofia Srour took place from 1 – 3 p.m. on 15 March at the Fritt Ord Foundation’s premises.
You are here Saukville In case anyone forgot, Monday’s heavy rains reminded everyone that Saukville is a river community as much of the central village was covered in high water and Highway 33 was closed most of the day. With the bridge over the Milwaukee River closed to traffic, morning commuters were directed south to Grafton, reportedly causing gridlock there. In Saukville, Mill Street, Green Bay Avenue and Highway W were closed to traffic Monday morning. The downtown triangle and Grady Park and nearby parking lots also were underwater as the stormwater system was overwhelmed by the deluge. The Saukville Village Board approved a new two-year contract with its police union last week. The contract with the Labor Association of Wisconsin, which represents seven Saukville patrol officers and one sergeant, calls for a 2.25% annual pay increase in 2019 and 2020 and expands funeral leave to include more family members. The new contract takes effect Jan. 1, 2019. Village President Barb Dickmann was pleased with how negotiations went. “They are excellent people to work with and the process went very smoothly,” she said. The judge, prosecutor and victims were all ready to conclude a case that began nearly two years ago. The only person missing from the Ozaukee County courtroom last week was Lynette R. Whitford, the woman who in May pleaded no contest and was convicted of embezzling tens of thousands of dollars from the Blue Heron Wildlife Sanctuary in the Town of Saukville. The 47-year-old Saukville woman, who had been free in lieu of $3,500 bail since being charged in October 2016, was scheduled to be sentenced for her crime on Thursday, Aug. 16. The downtown Saukville “bank” building has been sold to a couple who own two pizza restaurants in West Bend and Kewaskum. According to Ozaukee County Register of Deeds records, Michael and Deborah Herbert, who own the two Michaleno’s Pizzarias, bought the distinctive brick building on the village triangle at 234 Dekorah St. at the end of July for $92,900 from E-Collectique, a luxury resale clothing store owned by Mikelle Flanner of Grafton, that used to occupy the site.
Very important points about women's relative reluctance to invest their hard-earned cash and why to do about changing attitudes: http://www.learnvest.com/2013/10/the-sit-it-out-syndrome-why-women-are-afraid-to-invest-their-hard-earned-cash/?utm_source=email&utm_medium=internal&utm_campaign=Monday%20One%20Daily%202013-10-14
Researchers collect fish using backpack electrofishing. Image courtesy South Carolina Department of Natural Resources The problem of invasive species is a slippery one for fisheries managers. One of the most notorious invaders, Asian carp, now dominates large portions of freshwater in the central U.S., and keeping them out of the Great Lakes could cost upward of $18 billion, according to a recent study by the U.S. Army Corps of Engineers. There are a number of preventative measures in place to keep invasives from entering new waters. But at present there are few measures that fisheries managers can use to get rid of invasive fish once they’ve established themselves: basically, toxic chemicals, or targeted fishing. But a better remedy may be as simple as a small dose of electricity. That’s the idea behind a recent study, which found that electrically charged wands can help eradicate invasive fish in small streams with less collateral damage to the ecosystem. Battle of the Trout For years, ecologists in Montana have been tracking an underwater fight. Brook trout, an invasive species in the Upper Missouri River Basin, have increasingly replaced the native westslope cutthroat trout. The two species compete for scarce food, and brook trout appear to be winning. This concerns local ecologists because populations of the westslope cutthroat trout, Montana’s state fish, are in steep decline. The standard response in other waterways has been to use toxic chemicals called piscicides. But these chemicals are problematic – they kill native and invasive fish alike, and also kill many of the aquatic insects that fish eat, says Reuben Goforth, a professor at Purdue University. So the Montana team wanted to try a better way. They turned to backpack electrofishing, a technique that’s widely used at present to sample fish populations. It works like this: Researchers carry backpacks with electricity generators powered by 24-volt batteries. Those generators are hooked up to wands that carry a flow of positive electric charges. (If you’re imagining a setup that looks like the Ghostbusters proton pack, you’re not far off.) The researchers dunk the wands into streams. Soon, fish begin to cluster near the positive charges, a phenomenon known as galvanotaxis. With both natives and invasives gathered, the researchers send an electric burst of 100 to 600 volts into the water, which stuns the fish. The researchers net the temporarily immobilized fish, separate out the invasives (which can be cooked) and return the natives to the stream. Proof of Concept The researchers used this technique on four streams in the Montana Rockies over the course of 13 years. They performed the electrofishing twice yearly: in the fall, when the fish spawn, and in the early winter, when they congregate. Today, after killing an estimated 17,000 invasive fish, the researchers say they have completely eliminated invasive brook trout from the treated stream segments, which ranged in size from 0.3 to 1.8 miles. And they did so without having to use piscicides. “The cost we figured for electrofishing removal was comparable to piscicides in these smaller streams,” says Brad Shepard, the study’s lead author. The results were published in September, in the North American Journal of Fisheries Management. Other Pesky Invasives Shepard says that backpack electrofishing could be used to fend off any invasive fish in smaller streams—including escapees from fish farms. Farmed Atlantic salmon, he notes, have escaped from their pens and been found in streams on Canada’s west coast. Researchers fear that the fish could crowd out native Pacific salmon. Backpack electrofishing could be used in spawning runs to weed out the Atlantic salmon. Asian carp could also be dealt a punch from electrofishing. Purdue’s Goforth has caught numerous Asian carp with boat-mounted electrofishing gear. But because the fish are rarely found in small streams, backpack electrofishing wouldn’t as be as effective as larger versions of the technology, he said, such as the boat-mounted version. So, backpack electrofishing might not be the key weapon against Asian carp. But if you’re a weekend trout fisher, you might consider ditching your fishing rod. A little jolt of electricity could net you a few more dinners.
Q: Joda time does time conversion 'too soon' We have an application where the timing is critical. We're using joda to do time conversions and storing all data in UTC time. We've been in production for a while and everthing has been be perfect BUT... Now we notice that events occuring a few hours before the time change are already converted too early! In fact, the UTC times saved to the database are off by an hour. Here is an example. My event occurs at on 11/6/2010 @ 9pm PDT and would normally be saved as 11/7/2010 @ 4am. However, because Daylight Savings Time ended on the 7th (presumably at 2am), this time gets shifted and stored as 11/7/2010 @ 5am. We need the DST change to not be recorded until it actually occurs in the PST region, at 2am PST. I assumed joda would handle this, especially since it is touted to be much improved over java's default functionality. Any feedback you have would be helpful, especially if you can get it to us before the time change tomorrow! After that it'll be academic, but still a useful discussion. Here is some of the code we use to perform a timezone change and get the result as a regular java date object. public Date convertToTimeZone(Date dt, TimeZone from, TimeZone to){ DateTimeZone tzFrom = DateTimeZone.forTimeZone(from); DateTimeZone tzTo = DateTimeZone.forTimeZone(to); Date utc = new Date(tzFrom.convertLocalToUTC(dt.getTime(), false)); Date convertedTime = new Date(tzTo.convertUTCToLocal(utc.getTime())); return convertedTime; } Edit: Code sample for comments below public Date convert(Date dt, TimeZone from, TimeZone to) { long fromOffset = from.getOffset(dt.getTime()); long toOffset = to.getOffset(dt.getTime()); long convertedTime = dt.getTime() - (fromOffset - toOffset); return new Date(convertedTime); } Complete Unit Test Example package com.test.time; import java.util.Calendar; import java.util.Date; import java.util.TimeZone; import org.joda.time.DateTime; import org.joda.time.DateTimeZone; import org.joda.time.Instant; import org.junit.Before; import org.junit.Test; public class TimeTest { Calendar nov6; Calendar nov1; Calendar nov12; @Before public void doBefore() { // November 1st 2010, 9:00pm (DST is active) nov1 = Calendar.getInstance(); nov1.setTimeZone(TimeZone.getTimeZone("US/Arizona")); nov1.set(Calendar.HOUR_OF_DAY, 21); nov1.set(Calendar.MINUTE, 0); nov1.set(Calendar.SECOND, 0); nov1.set(Calendar.YEAR, 2010); nov1.set(Calendar.MONTH, 10); // November nov1.set(Calendar.DATE, 1); // November 6st 2010, 9:00pm (DST is still active until early AM november 7th) nov6 = Calendar.getInstance(); nov6.setTimeZone(TimeZone.getTimeZone("US/Arizona")); nov6.set(Calendar.HOUR_OF_DAY, 21); nov6.set(Calendar.MINUTE, 0); nov6.set(Calendar.SECOND, 0); nov6.set(Calendar.YEAR, 2010); nov6.set(Calendar.MONTH, 10); // November nov6.set(Calendar.DATE, 6); // November 12th 2010, 9:00pm (DST has ended) nov12 = Calendar.getInstance(); nov12.setTimeZone(TimeZone.getTimeZone("US/Arizona")); nov12.set(Calendar.HOUR_OF_DAY, 21); nov12.set(Calendar.MINUTE, 0); nov12.set(Calendar.SECOND, 0); nov12.set(Calendar.YEAR, 2010); nov12.set(Calendar.MONTH, 10); // November nov12.set(Calendar.DATE, 12); } @Test public void test1() { // System.out.println("test1"); timeTestJava(nov1.getTime(), "equivalent", "US/Arizona", "US/Pacific"); timeTestJodaOld(nov1.getTime(), "equivalent", "US/Arizona", "US/Pacific"); timeTestJodaNew(nov1.getTime(), "equivalent", "US/Arizona", "US/Pacific"); timeTestJava(nov6.getTime(), "equivalent", "US/Arizona", "US/Pacific"); timeTestJodaOld(nov6.getTime(), "equivalent", "US/Arizona", "US/Pacific"); timeTestJodaNew(nov6.getTime(), "equivalent", "US/Arizona", "US/Pacific"); timeTestJava(nov12.getTime(), "minus1", "US/Arizona", "US/Pacific"); timeTestJodaOld(nov12.getTime(), "minus1", "US/Arizona", "US/Pacific"); timeTestJodaNew(nov12.getTime(), "minus1", "US/Arizona", "US/Pacific"); } private void timeTestJodaOld(Date startTime, String text, String from, String to) { System.out.println("joda_old: " + startTime); Date output = convertJodaOld(startTime, TimeZone.getTimeZone(from), TimeZone.getTimeZone(to)); System.out.println(text + ": " + output + "\n"); } private void timeTestJodaNew(Date startTime, String text, String from, String to) { System.out.println("joda_new: " + startTime); Date output = convertJodaNew(startTime, TimeZone.getTimeZone(from), TimeZone.getTimeZone(to)); System.out.println(text + ": " + output + "\n"); } private void timeTestJava(Date startTime, String text, String from, String to) { System.out.println("java: " + startTime); Date output = convertJava(startTime, TimeZone.getTimeZone(from), TimeZone.getTimeZone(to)); System.out.println(text + ": " + output + "\n"); } // Initial Joda implementation, works before and after DST change, but not during the period from 2am-7am UTC on the day of the change public Date convertJodaOld(Date dt, TimeZone from, TimeZone to) { DateTimeZone tzFrom = DateTimeZone.forTimeZone(from); DateTimeZone tzTo = DateTimeZone.forTimeZone(to); Date utc = new Date(tzFrom.convertLocalToUTC(dt.getTime(), false)); Date convertedTime = new Date(tzTo.convertUTCToLocal(utc.getTime())); return convertedTime; } // New attempt at joda implementation, doesn't work after DST (winter) public Date convertJodaNew(Date dt, TimeZone from, TimeZone to) { Instant utcInstant = new Instant(dt.getTime()); DateTime datetime = new DateTime(utcInstant); datetime.withZone(DateTimeZone.forID(to.getID())); return datetime.toDate(); } // Java implementation. Works. public Date convertJava(Date dt, TimeZone from, TimeZone to) { long fromOffset = from.getOffset(dt.getTime()); long toOffset = to.getOffset(dt.getTime()); long convertedTime = dt.getTime() - (fromOffset - toOffset); return new Date(convertedTime); } } A: Your code is fundamentally broken, because a Date object can't be "converted" between time zones - it represents an instant in time. getTime() returns the time in millis since the UTC Unix epoch. A Date doesn't depend on a time zone, so the idea of converting an instance of Date from one time zone to another is meaningless. It's a bit like converting an int from "base 10" to "base 16" - bases only make any sense when you think about a representation in digits rather than the fundamental number. You should be using LocalDateTime to represent date/times without a fixed time zone, or DateTime to represent date/times with a specific time zone, or Instant to represent the same sort of concept as java.util.Date. Once you use the appropriate types, I'm sure you won't have any problems. EDIT: If your actual code is using a Calendar with the right time zone, you don't need to do anything to convert that to UTC. Just call calendar.getTime() and it will give you the appropriate Date. For example: // Display all Date values as UTC for convenience TimeZone.setDefault(TimeZone.getTimeZone("UTC")); // November 6st 2010, 9:00pm (DST is still active until // early AM november 7th) Calendar nov6 = Calendar.getInstance(); nov6.setTimeZone(TimeZone.getTimeZone("US/Arizona")); nov6.set(Calendar.HOUR_OF_DAY, 21); nov6.set(Calendar.MINUTE, 0); nov6.set(Calendar.SECOND, 0); nov6.set(Calendar.YEAR, 2010); nov6.set(Calendar.MONTH, 10); // November nov6.set(Calendar.DATE, 6); // Prints Sun Nov 07 04:00:00 UTC 2010 which is correct System.out.println("Local Nov6 = " + nov6.getTime()); Basically it's not clear to me why you're trying to convert from US/Arizona to US/Pacific when you talk about trying to save to UTC...
This invention relates to improvements in sanding, buffing and polishing wheels rendering them economical to fabricate yet more rugged in construction, more efficient and satisfactory in use, adaptable to a wider variety of applications and less likely to lend themselves to malfunction in use. The invention is particularly advantageous when embodied in a device capable of being fixed in the chuck of the power drive unit of a hand held tool and will be so described for purposes of illustration, but not by way of limitation. The prior art of which the present inventors are aware comprises the following: ______________________________________ U.S. Pat. No. Inventor Date ______________________________________ 394,747 H. G. Wolcott December 18, 1888 564,587 W. Black July 28, 1896 2,194,577 A. Vonnegut March 26, 1940 2,418,966 T. L. Bonkowski April 15, 1947 2,535,637 B. L. Johnson December 26, 1950 2,767,526 J. O. Moran October 23, 1956 3,132,452 A. Block May 12, 1964 3,165,867 E. E. Murray January 19, 1965 3,486,276 A. Block December 30, 1969 3,540,169 G. R. Mahoney November 17, 1970 3,774,354 Donald M. Taylor November 27, 1973 ______________________________________ The present invention achieves an elimination of various undesirable features of the prior art devices. It enables a greater loading capacity for a wheel of the type described, with respect to the sanding, buffing or polishing material which it utilizes for its intended function. At the same time, it features a unique mode of projecting such material from and with respect to the outer peripheral surface of the wheel, as and when required. The design of the housing for the abrasive surface material is such to lend it strength and at the same time to facilitate an optimal orientation of the material in use. An improved backing device for the working portions of the abrasively surfaced strip material which the invention employs insures a firmly backed relation of those portions of the abrasive material which are operative and in a manner to facilitate the adapting of the material to the work surface to which it is applied to provide it with a uniform surfacing operation, the uniformity being to a degree not heretofore found in the art. These and other features of distinction which lend improvements over the prior art will become evident from the following description of a preferred embodiment.
390 So.2d 1265 (1980) Sandra Leblanc SIMON et al. v. SOUTHWEST LOUISIANA ELECTRIC MEMBERSHIP CORPORATION et al. Nos. 67311, 67356. Supreme Court of Louisiana. October 20, 1980. Rehearing Denied December 15, 1980. *1266 Oscar W. Boswell, II, Harrington & Boswell, Crowley, for plaintiff-applicant in No. 67311; for plaintiff-respondent in No. 67356. Larry T. Richard, Cline, Miller, Richard & Miller, Rayne, for plaintiff-applicant in No. 67356 and for plaintiff-respondent in No. 67311. Lawrence G. Pugh, Jr., Pugh & Craton, Crowley, J. J. Davidson, for defendants-respondents in both cases. BLANCHE, Justice. Plaintiffs in these two lawsuits are the wives and minor children of two Acadia Parish residents who were fatally electrocuted on June 8, 1975. Plaintiffs respectively brought suits in damages for the wrongful death and for the survival action of Marvin G. Vincent and Harold John Simon against Southwest Louisiana Electric Membership Corporation (SLEMCO), the owner of the electric lines which transmitted the fatal shocks, and its insurer, United States Fidelity & Guaranty Company. The electrocutions occurred on a lot in Pine Acres subdivision near Crowley, Louisiana when a drilling pipe came in contact with, or close proximity to, an uninsulated electrical line in the course of a water well drilling operation undertaken by family members and friends of lot owner, Michael Vincent. Marvin Vincent, a brother of Michael Vincent, was electrocuted during his participation in the removal of the drilling pipe from the well hole, and Harold John Simon died from electrical shocks he received when he attempted to rescue Marvin and other persons injured in the accident. The two lawsuits brought by decedents' survivors were consolidated and tried before a jury in the Fifteenth Judicial District Court, Parish of Acadia. The jury returned a verdict for defendant in both instances, finding no liability on the part of SLEMCO for the deaths of Vincent and Simon. In reviewing that jury verdict, the Third Circuit Court of Appeal ruled that the verdict was not erroneous as a matter of law. 380 So.2d 1242. We affirm for the following reasons. The undisputed facts reveal this chain of events: Michael Vincent planned to drill a water well on his land with the aid of family members and friends. The chosen drilling site proved to be approximately fifteen feet away from a point on the ground where a charged SLEMCO electrical line hung 25.1 to 26.7 feet above the ground. A few days prior to the actual drilling operation, SLEMCO employees were working near the proposed drilling site when they were informed by Percy Vincent, the father of the landowner, Michael Vincent, that they planned to drill a well there. The well had been "started", or marked, by broken ground and the SLEMCO employees were persuaded by Percy Vincent and his offer of $5.00 to drill down a few feet through the harder ground with a mechanized auger attached to the SLEMCO truck. On Sunday, June 8, 1975, the actual completion of the drilling took place along with a Vincent family gathering and barbeque. The persons engaging in the drilling effort were Michael Vincent, his brother, Marvin (one of the decedents), their brother, Heulan, their father, Percy, Bufford Richard and Jerry Thompson. Harold John Simon, the other decedent, prepared the barbeque for the gathering. The parties employed a method of drilling more common in earlier times whereby lengths of 3/4-inch pipe were *1267 attached to a hand-turned auger as the auger dug deeper into the ground. These lengths of pipe and auger were periodically pulled out of the hole so that the accumulated mud and sand could be removed from around the auger. When the flexible ¾-inch drilling pipe became lengthy, one of the men stood on a ladder to balance it as the entire pipe was pulled out of the hole, the auger cleaned, and the pipe fed back into the hole. It was a slow process, and approximately seven hours was spent before the desired depth was reached. The accident occurred when the pipe was removed for the final time before plastic casing could be placed in the well hole. The pipe had, at this point, reached a length of about 42 feet. Heulan Vincent was balancing the pipe as it was removed from the hole. He stood on the ladder and grasped the pipe at approximately 18 feet above the ground. When the drilling pipe was completely removed from the hole, about 24 feet of it extended above his grip. This portion of the pipe apparently swayed over toward the nearby electrical lines as the men attempted to begin laying it down on the ground. Electricity was transmitted through the drill pipe, fatally shocked Marvin Vincent, and injured other parties aiding in the drilling. When Harold John Simon saw what had happened, he attempted to remove the pipe with his hands from where it had fallen onto the bodies of some of the men. Upon his second attempt he, too, was fatally shocked. There is a direct conflict in the testimony or inferences from the facts on the following key points. SLEMCO employees testified that they warned Percy Vincent, the father of the owner of the land where the well was drilled, that the selected well location was near the electric lines in question, that the lines were charged, and that it would be dangerous if any contact was made with these lines. They allegedly gave this warning when they were working near the well site a few days prior to the planned drilling and when they agreed with Percy Vincent to drill "a ways down into the ground" with the SLEMCO truck auger. Percy Vincent maintained that the SLEMCO employees gave him no such warning. The other major area of dispute was as to the visibility, or the knowledge, of the drilling party's members of the existence of the electrical lines near the well site. All witnesses for the plaintiffs who participated in the drilling testified that they had never seen the wires and were unaware that they were there. The facts indicate that these lines were only approximately 15 feet from the well where the workers drilled for about 7 hours prior to the accident. Further, as related above, the drilling pipe was periodically removed from the hole and balanced in the air by a person grasping the pipe 18 feet above the ground on a ladder. The participants in the drilling operation would, therefore, have cause to frequently look upward in the course of their efforts. Although Percy Vincent was one of the drillers who testified he did not know there were power lines near the well site, SLEMCO employees testified they informed him of the existence of these lines. Finally, a photograph of the scene of the accident introduced in evidence by the defense depicts the electrical lines. These lines were slightly obscured by trees, but appear to be visible to even a casual observer working nearby. We recognize that electric companies who utilize and maintain high power lines are required to exercise the utmost care to reduce hazards to life as far as is practicable. Nessmith v. Central La. Electric Co., 257 So.2d 744 (La.App.3d Cir. 1972), writ den., 259 So.2d 921, 922 (La.1972). If it should be reasonably anticipated that persons may come into contact with electric lines, the operator of those lines is required to insulate them, or to give adequate warning of the danger, or to take other proper and reasonable precautions to prevent injury. Nessmith, supra. However, an electric company is not legally bound to safeguard against occurrences that cannot be reasonably expected or contemplated. Bordelon v. Continental Casualty Co., 229 So.2d 761 (La. App.3d Cir. 1969), writ den., 231 So.2d 396 *1268 (1970). We agree with the court of appeal that operators of power lines are not required to anticipate every possible accident which may occur and are not the insurers of safety of persons moving around power lines in the course of everyday living. The power line in question was 26.7 feet above the ground at the point of contact with the drilling pipe, a height of 11.7 feet in excess of the requirements of the National Bureau of Standards Safety Rules for the Installation and Maintenance of Electrical Transmission Lines. Compliance with these safety standards does not, per se, relieve SLEMCO from negligence, and SLEMCO must take additional steps to protect persons from injury due to contact with power lines where the surface below the lines is used for reasonably foreseeable purposes. McKowen v. Gulf States Utilities Co., 358 So.2d 675 (La.1978). In 1940, when wells were more commonly drilled by the method utilized in the case at hand, the Second Circuit Court of Appeal was confronted with a factual situation similar to the instant case. Under the facts of Webb v. La. Power & Light Co., 199 So. 451 (La.App.1940), the plaintiff's husband and friends had removed a well pipe from a well hole and contacted an electrical line 24 feet above the ground and 18 feet away from the well hole. The court resolved the issue of foreseeable use and liability in favor of the defendant electric company, reasoning as follows: "It appears to us that defendant fulfilled all legal duties imposed on it. Although the wires in question were not insulated, there was a compliance with the other alternative, namely, the placing of them beyond the danger line of contact with human beings. While engaged in the ordinary course of their affairs, pedestrians would experience no harm from them. Defendant could not have reasonably anticipated that decedent would withdraw from the ground connected well pipe of a length, here more than 30 feet, that would make contact with the transmission line. On the contrary, it could have reasonably expected that in the event of the pulling of the pipe from the well, a disassembling of it, joint by joint, would be the course pursued." Webb, at 453. It is admitted by all persons testifying on point in the case at hand that the lengths of pipe could have been disassembled from each other one at a time rather than removing the entire connected pipe from the hole at once. Plaintiffs contend that their case is distinguishable from the Webb, facts. The alleged distinction is that SLEMCO was apprised, through its employees' conversation with Percy Vincent, that a dangerous well-drilling operation would be undertaken on the Vincent property. Due to this knowledge, plaintiffs argue that SLEMCO had a duty to deenergize a line which, as admitted by SLEMCO, would deprive only one customer of service. Under the facts of this case, we find that SLEMCO owed no duty to decedents to ascertain the exact time of drilling and deenergize its line. It is true that SLEMCO may be charged with the knowledge of its employees that a well would be drilled on the Vincent property approximately fifteen feet from the SLEMCO power lines. However, the employees testified that they warned Percy Vincent to take care in the planned drilling operation and warned him of the potential danger should contact be made with the electric lines. Percy Vincent is the well site landowner's father, he was present at the well site a few days prior to the drilling when he requested SLEMCO to aid him in drilling a portion of the well at the point he indicated and he, in fact, participated in the actual well-drilling operation the day of the accident. Under the circumstances, this warning by SLEMCO employees to this individual, coupled with SLEMCO's placement of these lines so that their presence was apparent to others, were sufficient to discharge the duty of care owed to the decedents by SLEMCO. Plaintiffs cite the case of Boure v. New Orleans Public Service, Inc., 255 So.2d 776 (La.App.4th Cir. 1971), writ ref. 257 So.2d 432 (La.1972), in which the court of appeal *1269 found a warning by an electric supplier insufficient and found it incumbent upon that supplier to deenergize its lines. We find the Bouré case distinguishable from the instant case. In that case, a painter received an electrical shock when a spray paint apparatus he was operating came in contact with a "live" wire while he was painting the underside of an interstate bridge. The key factual distinction between Bouré and this case is that in Bouré, the supplier of electricity was aware of the painting operation in progress, and was aware of the continuous close proximity of the painters to the electric wires as they proceeded, for weeks, to paint the bridge. The facts in the case at hand show that SLEMCO had no notice of the exact time of the drilling operation, had no knowledge of the depth to which the well was to be drilled or of the type of drilling equipment or method to be used, or how close that equipment could potentially come to the high wire lines placed 26 feet above the ground and, certainly, SLEMCO did not observe the one-day drilling operation in progress. As we view the record, and as did the court of appeal, there is sufficient evidence to support a jury determination that SLEMCO was free from negligence in this case. The jury apparently resolved conflicting testimony against the plaintiffs and in favor of the defendants. We regard such a resolution of conflicting evidence as one of the essential functions of a trier of fact and find no manifest error in the conclusion of the jury. Since we rule that the evidence supports a finding that SLEMCO was free from negligence, it is unnecessary to discuss any potential contributory negligence on the part of either of the decedents. Also, as the court of appeal noted, although Harold John Simon was a rescuer and, therefore, occupies a special status in the law, none of the plaintiffs may recover where SLEMCO is found to be free from any negligence. For the above reasons, the decision of the court of appeal is affirmed. AFFIRMED. DIXON, C. J., and CALOGERO, J., dissent. WATSON, J., dissents and assigns reasons. WATSON, Justice, dissenting. This matter is factually indistinguishable from Bouré v. New Orleans Public Service, Inc., 255 So.2d 776 (La.App. 4 Cir. 1971) writ refused 257 So.2d 432 (La.1972). Slemco's employees knew exactly where this water well was to be dug. Slemco's employees also knew that the drilling would take place that Sunday. Slemco's employees probably knew how the well would be drilled, that is, with a hand turned auger, because they started the well with their mechanical auger. These employees were aware of the danger; their testimony was that they warned Percy Vincent, the father of the landowner.[1] Since Slemco, through its employees, knew the day and location of the proposed drilling, they should have re-energized the "hot" line. In Bouré, New Orleans Public Service offered to de-energize its line. It is undisputed that this possibility was not mentioned to the Vincents by Slemco's employees. Slemco had knowledge of the proposed activity adjacent to its dangerous line. Its employees were aware of the hazard. Otherwise, they would not have warned Percy Vincent. The warning to him was of no benefit to the others. It was not communicated to them. The danger should have been foreseen by Slemco. Slemco admitted in answers to interrogatories *1270 that they had turned off electric current in a line when similar activities were taking place and no reason is shown for not doing so here. Slemco's "hot" line did not, in and of itself, pose an unreasonable risk of injury. However, when Slemco became aware through its employees of the proposed drilling activity, failure to shut off the power in the line that Sunday created an unreasonable risk of foreseeable harm. Allien v. Louisiana Power & Light Co., 202 So.2d 704 (La.App. 3 Cir. 1967) writ denied 251 La. 392, 204 So.2d 574. The utility of the line to the one customer it served was outweighed on this particular day by the hazard it presented to those drilling the well. Balancing the two, it is clear that Slemco should be strictly liable for the harm. Contributory negligence is not a defense to strict liability. See Rodrigue v. Dixilyn Corp., 620 F.2d 537 (5 Cir. 1980). Here, as in Dixilyn the jury was erroneously charged that contributory negligence would bar plaintiff's recovery. Even if there were a voluntary assumption of a known risk on the part of those actively engaged in drilling the well, this would not bar recovery by rescuer Simon, who disregarded the danger and lost his own life trying to save his friends. I respectfully dissent. NOTES [1] There is some question whether a warning was actually issued. When John LeJeune was called on cross-examination he refused to repeat his earlier testimony to that effect. See page 163 of the transcript: "Q. Isn't it a fact Mr. LeJeune that you did not tell Percy Vincent, Michael Vincent, or Marvin Vincent anything at all about that hot line. "A. (No response). "Q. Isn't that a fact? "A. (No response)."
This application relates to the art of valves and, more particularly, to valves of the type that are pressure imbalanced in the closed direction. The invention is particularly applicable for use in bubbler valves for drinking fountains and will be described with specific reference thereto. However, it will be appreciated that the invention has broader aspects and can be used for controlling flow of liquids in other environments. Excessive water line pressure can cause a water stream from a bubbler valve on a drinking fountain to overshoot the drain pan and cause damage. It would be desirable to have a bubbler valve that would maintain a substantially uniform flow of water over a wide range of inlet pressures.
Article content Ottawa police have charged a husband with stabbing his wife in a violent Mother’s Day outburst in Navan that ended after he was stabbed by the couple’s daughter. Jeff Lambert, 58, remains in hospital but has been charged with six counts of aggravated assault and assault for the attack on his family. We apologize, but this video has failed to load. tap here to see other videos from our team. Try refreshing your browser, or Husband charged in Mother's Day stabbing of wife, remains in hospital after daughter stabbed him Back to video Police responded to a 911 emergency call to Kentucky Lane in the city’s southeast end on Sunday after Lambert’s son reported that his sister had stabbed their father. Officers arrived to find Lambert with what paramedics described as multiple life-threatening stab wounds. Despite suffering more serious injuries than his wife or daughter, detectives allege Lambert was the aggressor. Police believe Lambert first stabbed his wife, 49, in the lower body. Their daughter, 23, then intervened and repeatedly stabbed him. The daughter was also taken to hospital with cuts and scrapes to her head and lower body. No criminal charges related to the incident have been laid against her. Lambert is expected to appear in court on Wednesday. He has yet to make an in-person appearance while he remains in hospital. His injuries are no longer considered life-threatening. With files from Aedan Helmer syogaretnam@postmedia.com twitter.com/shaaminiwhy
late the remainder when 31276 is divided by 1006. 90 Calculate the remainder when 256449 is divided by 9. 3 Calculate the remainder when 42925 is divided by 2860. 25 What is the remainder when 48 is divided by 33? 15 What is the remainder when 2159218 is divided by 970? 968 What is the remainder when 1448124 is divided by 9? 6 What is the remainder when 169001 is divided by 44? 41 What is the remainder when 207577 is divided by 91? 6 Calculate the remainder when 2772 is divided by 39. 3 What is the remainder when 1235 is divided by 96? 83 What is the remainder when 7819 is divided by 23? 22 What is the remainder when 2430 is divided by 808? 6 Calculate the remainder when 297213 is divided by 9006. 15 What is the remainder when 773 is divided by 297? 179 Calculate the remainder when 1729 is divided by 722. 285 Calculate the remainder when 389843 is divided by 129894. 161 Calculate the remainder when 505003 is divided by 2988. 31 Calculate the remainder when 37441 is divided by 7487. 6 What is the remainder when 9549 is divided by 17? 12 Calculate the remainder when 751687 is divided by 866. 865 Calculate the remainder when 495507 is divided by 7. 5 What is the remainder when 328258 is divided by 266? 14 Calculate the remainder when 111838 is divided by 37279. 1 What is the remainder when 8464 is divided by 8447? 17 Calculate the remainder when 24487 is divided by 155. 152 Calculate the remainder when 48806 is divided by 1682. 28 Calculate the remainder when 745 is divided by 163. 93 What is the remainder when 321086 is divided by 231? 227 Calculate the remainder when 2501 is divided by 635. 596 What is the remainder when 5381 is divided by 203? 103 Calculate the remainder when 1406 is divided by 38. 0 What is the remainder when 45917 is divided by 205? 202 Calculate the remainder when 24783 is divided by 3539. 10 Calculate the remainder when 9126 is divided by 17. 14 What is the remainder when 217492 is divided by 2? 0 What is the remainder when 29715 is divided by 1021? 106 What is the remainder when 4050 is divided by 506? 2 Calculate the remainder when 19765 is divided by 2193. 28 Calculate the remainder when 2914 is divided by 100. 14 What is the remainder when 5858 is divided by 21? 20 Calculate the remainder when 22105 is divided by 21969. 136 What is the remainder when 7491 is divided by 478? 321 What is the remainder when 10217 is divided by 538? 533 What is the remainder when 2500 is divided by 15? 10 What is the remainder when 634 is divided by 116? 54 What is the remainder when 13578 is divided by 13569? 9 Calculate the remainder when 1425719 is divided by 417. 413 What is the remainder when 9127 is divided by 9? 1 What is the remainder when 608 is divided by 18? 14 What is the remainder when 7718 is divided by 776? 734 Calculate the remainder when 2633 is divided by 2615. 18 What is the remainder when 7390 is divided by 1211? 124 Calculate the remainder when 1686 is divided by 290. 236 What is the remainder when 1598 is divided by 532? 2 What is the remainder when 1090 is divided by 343? 61 What is the remainder when 26653 is divided by 98? 95 Calculate the remainder when 6607 is divided by 546. 55 Calculate the remainder when 4169 is divided by 3. 2 Calculate the remainder when 32561 is divided by 402. 401 Calculate the remainder when 98581 is divided by 764. 25 What is the remainder when 8675 is divided by 379? 337 What is the remainder when 2771 is divided by 450? 71 What is the remainder when 31002 is divided by 301? 300 What is the remainder when 80735 is divided by 79? 76 Calculate the remainder when 14449 is divided by 30. 19 Calculate the remainder when 23877 is divided by 682. 7 Calculate the remainder when 895056 is divided by 99. 96 What is the remainder when 273736 is divided by 273661? 75 What is the remainder when 725344 is divided by 90668? 0 Calculate the remainder when 225306 is divided by 713. 711 Calculate the remainder when 20914 is divided by 4174. 44 What is the remainder when 479545 is divided by 69? 64 What is the remainder when 17447 is divided by 1453? 11 Calculate the remainder when 3790 is divided by 724. 170 Calculate the remainder when 12171 is divided by 140. 131 Calculate the remainder when 67986 is divided by 24. 18 Calculate the remainder when 30637 is divided by 326. 319 What is the remainder when 8925 is divided by 68? 17 What is the remainder when 29972 is divided by 25? 22 What is the remainder when 14339 is divided by 1590? 29 What is the remainder when 3978 is divided by 83? 77 What is the remainder when 152 is divided by 129? 23 What is the remainder when 1022 is divided by 94? 82 Calculate the remainder when 7199 is divided by 45. 44 What is the remainder when 134397 is divided by 16? 13 What is the remainder when 3132 is divided by 283? 19 Calculate the remainder when 729342 is divided by 103. 102 What is the remainder when 77587 is divided by 163? 162 Calculate the remainder when 22049 is divided by 126. 125 What is the remainder when 12133 is divided by 338? 303 What is the remainder when 31646 is divided by 93? 26 Calculate the remainder when 1995 is divided by 490. 35 Calculate the remainder when 4313 is divided by 4313. 0 Calculate the remainder when 19045 is divided by 8. 5 Calculate the remainder when 5917 is divided by 1488. 1453 What is the remainder when 9347 is divided by 76? 75 Calculate the remainder when 59342 is divided by 50. 42 What is the remainder when 8501 is divided by 6? 5 Calculate the remainder when 1439 is divided by 19. 14 Calculate the remainder when 3120 is divided by 31. 20 What is the remainder when 33645 is divided by 306? 291 Calculate the remainder when 284709 is divided by 11. 7 What is the remainder when 1316 is divided by 436? 8 Calculate the remainder when 20288 is divided by 73. 67 What is the remainder when 14472 is divided by 3606? 48 Calculate the remainder when 7953 is divided by 418. 11 What is the remainder when 86741 is divided by 79? 78 What is the remainder when 22993 is divided by 14? 5 Calculate the remainder when 2433 is divided by 327. 144 Calculate the remainder when 8932 is divided by 1112. 36 Calculate the remainder when 29111 is divided by 13. 4 What is the remainder when 76870 is divided by 76870? 0 What is the remainder when 9664 is divided by 3218? 10 Calculate the remainder when 18441 is divided by 4607. 13 Calculate the remainder when 19194 is divided by 14. 0 Calculate the remainder when 91051 is divided by 435. 136 Calculate the remainder when 41752 is divided by 146. 142 What is the remainder when 5551 is divided by 403? 312 Calculate the remainder when 51774 is divided by 25. 24 What is the remainder when 90255 is divided by 10028? 3 What is the remainder when 588233 is divided by 51? 50 What is the remainder when 751668 is divided by 1820? 8 Calculate the remainder when 283597 is divided by 70899. 1 Calculate the remainder when 101390 is divided by 1913. 1 Calculate the remainder when 19369 is divided by 552. 49 Calculate the remainder when 113 is divided by 113. 0 What is the remainder when 2699 is divided by 9? 8 Calculate the remainder when 361237 is divided by 1384. 13 What is the remainder when 100243 is divided by 2948? 11 What is the remainder when 242 is divided by 46? 12 Calculate the remainder when 62327 is divided by 46. 43 Calculate the remainder when 4675 is divided by 1227. 994 Calculate the remainder when 2973 is divided by 166. 151 What is the remainder when 110239 is divided by 8? 7 Calculate the remainder when 26559 is divided by 77. 71 Calculate the remainder when 71881 is divided by 163. 161 Calculate the remainder when 4151 is divided by 1537. 1077 What is the remainder when 21136 is divided by 1407? 31 Calculate the remainder when 15355 is divided by 480. 475 What is the remainder when 2428 is divided by 435? 253 What is the remainder when 38105 is divided by 121? 111 Calculate the remainder when 54126 is divided by 76. 14 What is the remainder when 3140 is divided by 98? 4 Calculate the remainder when 14419 is divided by 4777. 88 What is the remainder when 10608 is divided by 20? 8 What is the remainder when 7560 is divided by 476? 420 What is the remainder when 6016 is divided by 301? 297 What is t
'About Cherry' Poster Premiere: James Franco and Heather Graham Explore the World of Porn We've heard the story of a small-town girl who moves to the big city and gets involved in the wrong scene, but we're not sure we've heard it told like this before, from the perspective of those who've experienced it. Directed and cowritten by former sex worker Stephen Elliott, About Cherry stars Ashley Hinshaw as Angelina, an 18-year-old girl who escapes her unstable home life in search of new beginnings in San Francisco with her best friend, played by Dev Patel. It's there, though, that she meets Frances (James Franco), a well-off lawyer who's got problems of his own, which eventually leads Angelina -- using the name "Cherry" -- to dabble in the world of porn under the direction of porn star-turned-filmmaker Margaret (Heather Graham). About Cherry is unique in that it was actually shot in the San Francisco Armory, which is home to the largest adult-film studio in the world. About Cherry premieres on VOD on August 9th, and in theaters on September 21st. According to its press materials, it's a film that "challenges common assumptions about pornography, sexuality and the idea of success in general," and should be an entertaining and somewhat informative watch for any youngster who's currently out in the world trying to find themselves and discover their true identity. Movies.com, the ultimate source for everything movies, is your destination for new movie trailers, reviews, photos, times, tickets + more! Stay in the know with the latest movie news and cast interviews at Movies.com.
Indirect spectrophotometric determination of propranolol hydrochloride and piroxicam in pure and pharmaceutical formulations. Two simple and sensitive indirect spectrophotometric methods for the assay of propranolol hydrochloride (PPH) and piroxicam (PX) in pure and pharmaceutical formulations have been proposed. The methods are based on the oxidation of PPH by a known excess of standard N-bromosuccinimide (NBS) and PX by ceric ammonium sulfate (CAS) in an acidic medium followed by the reaction of excess oxidant with promethazine hydrochloride (PMH) and methdilazine hydrochloride (MDH) to yield red-colored products. The absorbance values decreased linearly with increasing concentration of the drugs. The systems obeyed Beer's law over the concentration ranges of 0.5 - 12.5 and 0.3 - 16.0 microg/ml for PPH, and 0.4 - 7.5 and 0.2 - 10 microg/ml for PX with PMH and MDH, respectively. Molar absorptivity values, as calculated from Beer's law data, were found to be 1.36 x 10(4) and 2.55 x 10(4) l mol(-1) cm(-1) for PPH, and 2.08 x 10(4) and 2.05 x 10(4) l mol(-1) cm(-1) for PX with PMH and MDH, respectively. The common excipients and additives did not interfere with their determinations. The proposed methods have been successfully applied to the determinations of PPH and PX in various dosage forms. The results obtained by the proposed methods compare favorably with those of official methods.
#!/usr/bin/env python # Copyright 2015 the V8 project authors. All rights reserved. # Use of this source code is governed by a BSD-style license that can be # found in the LICENSE file. import mergeinfo import shutil import unittest from collections import namedtuple from os import path from subprocess import Popen, PIPE, check_call TEST_CONFIG = { "GIT_REPO": "/tmp/test-v8-search-related-commits", } class TestMergeInfo(unittest.TestCase): base_dir = TEST_CONFIG["GIT_REPO"] def _execute_git(self, git_args): fullCommand = ["git", "-C", self.base_dir] + git_args p = Popen(args=fullCommand, stdin=PIPE, stdout=PIPE, stderr=PIPE) output, err = p.communicate() rc = p.returncode if rc != 0: raise Exception(err) return output def _update_origin(self): # Fetch from origin to get/update the origin/master branch self._execute_git(['fetch', 'origin']) def setUp(self): if path.exists(self.base_dir): shutil.rmtree(self.base_dir) check_call(["git", "init", self.base_dir]) # Add fake remote with name 'origin' self._execute_git(['remote', 'add', 'origin', self.base_dir]) # Initial commit message = '''Initial commit''' self._make_empty_commit(message) def tearDown(self): if path.exists(self.base_dir): shutil.rmtree(self.base_dir) def _assert_correct_standard_result( self, result, all_commits, hash_of_first_commit): self.assertEqual(len(result), 1, "Master commit not found") self.assertTrue( result.get(hash_of_first_commit), "Master commit is wrong") self.assertEqual( len(result[hash_of_first_commit]), 1, "Child commit not found") self.assertEqual( all_commits[2], result[hash_of_first_commit][0], "Child commit wrong") def _get_commits(self): commits = self._execute_git( ["log", "--format=%H", "--reverse"]).splitlines() return commits def _get_branches(self, hash): return mergeinfo.get_branches_for_commit(self.base_dir, hash) def _make_empty_commit(self, message): self._execute_git(["commit", "--allow-empty", "-m", message]) self._update_origin() return self._get_commits()[-1] def testCanDescribeCommit(self): commits = self._get_commits() hash_of_first_commit = commits[0] result = mergeinfo.describe_commit( self.base_dir, hash_of_first_commit).splitlines() self.assertEqual( result[0], 'commit ' + hash_of_first_commit) def testCanDescribeCommitSingleLine(self): commits = self._get_commits() hash_of_first_commit = commits[0] result = mergeinfo.describe_commit( self.base_dir, hash_of_first_commit, True).splitlines() self.assertEqual( str(result[0]), str(hash_of_first_commit[0:7]) + ' Initial commit') def testSearchFollowUpCommits(self): commits = self._get_commits() hash_of_first_commit = commits[0] message = 'Follow-up commit of ' + hash_of_first_commit self._make_empty_commit(message) self._make_empty_commit(message) self._make_empty_commit(message) commits = self._get_commits() message = 'Not related commit' self._make_empty_commit(message) followups = mergeinfo.get_followup_commits( self.base_dir, hash_of_first_commit) self.assertEqual(set(followups), set(commits[1:])) def testSearchMerges(self): self._execute_git(['branch', 'test']) self._execute_git(['checkout', 'master']) message = 'real initial commit' self._make_empty_commit(message) commits = self._get_commits() hash_of_first_commit = commits[0] self._execute_git(['checkout', 'test']) message = 'Not related commit' self._make_empty_commit(message) # This should be found message = 'Merge ' + hash_of_first_commit hash_of_hit = self._make_empty_commit(message) # This should be ignored message = 'Cr-Branched-From: ' + hash_of_first_commit hash_of_ignored = self._make_empty_commit(message) self._execute_git(['checkout', 'master']) followups = mergeinfo.get_followup_commits( self.base_dir, hash_of_first_commit) # Check if follow ups and merges are not overlapping self.assertEqual(len(followups), 0) message = 'Follow-up commit of ' + hash_of_first_commit hash_of_followup = self._make_empty_commit(message) merges = mergeinfo.get_merge_commits(self.base_dir, hash_of_first_commit) # Check if follow up is ignored self.assertTrue(hash_of_followup not in merges) # Check for proper return of merges self.assertTrue(hash_of_hit in merges) self.assertTrue(hash_of_ignored not in merges) def testIsLkgr(self): commits = self._get_commits() hash_of_first_commit = commits[0] self._make_empty_commit('This one is the lkgr head') self._execute_git(['branch', 'remotes/origin/lkgr']) hash_of_not_lkgr = self._make_empty_commit('This one is not yet lkgr') branches = self._get_branches(hash_of_first_commit); self.assertTrue(mergeinfo.is_lkgr(branches)) branches = self._get_branches(hash_of_not_lkgr); self.assertFalse(mergeinfo.is_lkgr(branches)) def testShowFirstCanary(self): commits = self._get_commits() hash_of_first_commit = commits[0] branches = self._get_branches(hash_of_first_commit); self.assertEqual(mergeinfo.get_first_canary(branches), 'No Canary coverage') self._execute_git(['branch', 'remotes/origin/chromium/2345']) self._execute_git(['branch', 'remotes/origin/chromium/2346']) branches = self._get_branches(hash_of_first_commit); self.assertEqual(mergeinfo.get_first_canary(branches), '2345') def testFirstV8Version(self): commits = self._get_commits() hash_of_first_commit = commits[0] self._execute_git(['branch', 'remotes/origin/chromium/2345']) self._execute_git(['branch', 'remotes/origin/chromium/2346']) branches = self._get_branches(hash_of_first_commit); self.assertEqual(mergeinfo.get_first_v8_version(branches), '--') self._execute_git(['branch', 'remotes/origin/5.7.1']) self._execute_git(['branch', 'remotes/origin/5.8.1']) branches = self._get_branches(hash_of_first_commit); self.assertEqual(mergeinfo.get_first_v8_version(branches), '5.7.1') self._execute_git(['branch', 'remotes/origin/5.6.1']) branches = self._get_branches(hash_of_first_commit); self.assertEqual(mergeinfo.get_first_v8_version(branches), '5.6.1') if __name__ == "__main__": unittest.main()
Q: Rearrangement of series in a (not necessarily Banach) normed vector space. If $X$ is a Banach space, then the following theorem holds: Let $\sum x_n$ be a series in $X$ which converges absolutely. Then every rearrangement $\sum x_{\sigma(n)}$ converges, and they all converge to the same value. Proof: Let $(s_n')$ be the sequence of the partial sums of $\sum x_{\sigma(n)}$. Since $\sum x_n$ is absolutely convergent, given $\epsilon>0$ there is an integer $n_0$ such that $$\sum_{k=n_0}^m ||x_k|| <\epsilon$$ for all $m\geq n_0$. Let $$p=\max_{1\leq i< n_0}\sigma^{-1}(i).$$ If $n>p$, we have that $\{1,2,\dotsc,n_0-1\}$ is a subset of $\{\sigma(1),\sigma(2),\dotsc,\sigma(n)\}$. Hence all the $x_i$ for $i=1,2,\dots,n_0-1$ are cancelled in $s_n-s_n'$. So, $$||s_n-s_n'||\leq \sum_{k=n_0}^m ||x_k|| <\epsilon.$$ We conclude that $(s_n')$ converges to the same value as $(s_n)$. However, if $X$ is a normed vector space which is not necessarily Banach, is any of the following true? If $\sum x_n$ converges absolutely, then any rearrangement converges absolutely. or If $\sum x_n$ is a convergent series which converges absolutely, then any rearrangement converges absolutely. or If $\sum x_n$ is a convergent series which converges absolutely, then any rearrangement converges. If so, it's possible to modify my proof to handle the more general result? A: Every normed space $X$ can be thought of as a subspace of $\widetilde{X}$, the completion of $X$, which is Banach. All your propositions follow immediately. Edit: Here is the more detailed version. Let $X$ be a normed space. In particular, $X$ is a metric space, and so, it has a metric completion $\widetilde{X}$, which is a Banach space. (The norm on $\widetilde{X}$ is defined to be the unique continuous extension of the one on $X$). Now, let $\sum x_n$ be an absolutely convergent series in $X$. In particular, it is in $\widetilde{X}$, which is Banach. It follows that every reordering of $\sum x_n$ converges to the same limit. We're done.
With Joy-Con drift making headlines again over the past month thanks to lawsuits filed in the US, it’s easy to see the phenomenon as a potential disaster for Nintendo. Many gamers have had absolutely no problems with Switch's detachable controllers, but a huge percentage have encountered issues, often multiple times, and it’s common enough to make us think twice about purchasing a Switch Lite until we’re certain the issue is resolved. The drift debacle is an embarrassing state of affairs for Nintendo, perhaps amplified thanks to its reputation for delivering remarkably sturdy, long-lasting hardware. We’ve seen the company respond (albeit slowly) with free repairs and refunds for previously repaired Joy-Con in some territories. While this will incur significant cost, it’s a very long way from developing into the Xbox 360 ‘Red Ring of Death’ disaster we’ve seen it compared to. That infamous design fault cost Microsoft over a billion dollars to make good and restore customer confidence. If execs were looking for silver linings, at least it worked; we joke about RROD but 360 is fondly remembered for its brilliant library and how it defined the modern online console environment with Xbox Live. Joy-Con drift might be irritating, but it’s unlikely to tarnish the legacy of Switch or Nintendo in the long run. We wanted to put the Joy-Con drift issue into historical context, so we decided to ask for your experiences with faulty Nintendo hardware. As with any electronics, faults crop up from time to time and we wanted to see if any particular system had more issues than others. Our experiences As enthusiastic Nintendo fans, we here at Nintendo Life have collectively assembled a considerable number of consoles and accessories over the years. In our experience, Nintendo kit is second-to-none when it comes to durability. A quick survey around the office revealed the following hardware faults, failures or issues not related to accidental damage or overzealous wear-and-tear: One dead PAL Super Nintendo (GPU died after 21 years loyal service) Several ‘floppy’ Nintendo 64 analogue sticks (too much Mario Party , no doubt) , no doubt) Two cracked DS Lite hinges The odd ‘phantom’ input on a DS touchscreen Two GameCubes that stopped reading discs One Wii which stopped reading dual-layer discs (such as Super Smash Bros. Brawl ) ) Two cracked Switch cases Multiple incidents of Joy-Con drift On the whole, not bad considering the metric ton of hardware we have between us. Joy-Con drift certainly appears to be the most consistent issue among staff. Anecdotal it may be, but the trend appears to be the more modern the system, the more faults we find. That might seem backwards – surely the older systems should fail first? – until we consider their sheer complexity of modern consumer electronics. When discussing malfunctioning or faulty hardware, it's natural to fall back on a couple of old adages which we should really avoid... Myth #1 “They don’t make ‘em like they used to” Well, that may be true, but it’s actually a good thing and the sentiment is a little reductive. The main reason your original NES stands a good chance of still working in 2019 is how technologically simple it is. Even back in the mid-1980s, the Famicom / Nintendo Entertainment System was a modest little machine. Nearly 35 years later, tiny devices in your pocket outperform it a thousand-fold or more thanks to the wonders of miniaturisation and improved processing power, but the design involved in reducing size while increasing performance is hugely complex. Compare your Switch to a Wii U and its GamePad and think about just how much is squeezed into the newer, more powerful console’s tiny case by comparison. And they’re only a generation apart! Exact figures for microprocessor manufacturing yields are hard to come by, but the average consumer might be shocked to hear how low they can be. A 2005 study found that the yield for 45 nanometer chips was around 30% - so, for every ten chips produced, only three would be defect-free and usable. The Tegra X1 chip in the launch Switch was built using a smaller 20nm fabrication process (still relatively large by modern, bleeding-edge standards). Obviously, manufacturing processes advance as well, but it’s important to remember the incredibly complex engineering behind all our gadgets. No wonder they go wrong sometimes. There's another common response from fellow gamers when something in your gaming set-up goes sideways... Myth #2 "You obviously don’t look after your things” Ah, this old chestnut. This one can be difficult, especially if you’re anything like us when it comes to protecting your kit. We remember going over to friends' houses and being shocked to see loose carts and discs lying around the place, greasy controllers stuffed down the sides of sofas and consoles gently roasting themselves on a crumb-filled carpet. How do you live like this??? While some of us are perhaps too far the other way – the kind of people that put N64 carts back in their original plastic pouches inside the box – it’s easy to assume that everyone else is a careless oaf dripping pizza grease into their analogue sticks, using GameCube discs as coasters and throwing handhelds into drawers with keys, rocks and broken glass. This is rarely the case. Yes, there will always be some confused person wondering why their console is broken after letting the kids pump loose change into the disc tray or pour Mountain Dew in the grilles. As a rule, though, if someone says their hardware has developed a fault, we should take them at their word. So, now for some informal, anecdotal science! We've asked before about Switch casing cracks and Joy-Con issues, but here we've expanded the scope a little to put these problems in the context of all Nintendo platforms. Take a look at the questions below and feel free to answer. We all know only cockroaches and Game Boys would survive nuclear annihilation, but let's see how the other Nintendo consoles have held up over the years... Which Nintendo system(s) have you experienced problems with? (tick all that apply) (2,514 votes) Nintendo Entertainment System 7% Super Nintendo Entertainment System 2% Nintendo 64 7% GameCube 6% Wii 12% Wii U 6% Switch 24% Game Boy (incl. Pocket) / Game Boy Color 2% Game Boy Advance (incl. SP and Micro) 3% Nintendo DS (incl. Lite) 11% Nintendo DSi (incl. XL) 3% Nintendo 3DS (incl. XL) / 2DS 12% New Nintendo 3DS / 2DS (incl. XL variants) 5% Please login to vote in this poll. To the best of your knowledge, where did the fault lie? (tick all that apply) (1,520 votes) Controller issue 46% Power supply issue 9% Cartridge / Disc read issue 23% Image / Screen issue 16% What am I, an engineer? No idea 7% Please login to vote in this poll. Did the problem make you think twice about buying Nintendo products in the future? (967 votes) Yes 5% It made me a little wary 18% No, of course not! How else am I going to play Zelda? 77% Please login to vote in this poll. In your experience, which of the three main console manufacturers suffers from the most hardware issues? (884 votes) Nintendo 14% Sony 23% Microsoft 62% Please login to vote in this poll. How long do you believe console hardware should reasonably last before you'd expect it to develop faults or need repair? (999 votes) 3 years 5% 5 years 27% 7 years 22% 10+ years 46% Please login to vote in this poll. Thank you for your contributions to Science! Yes, we left out Virtual Boy - the four of you reading this who've got one in the cupboard may comment on its reliability below! Did any of the results surprise you? Feel free to share your stories of incredibly durable or short-lived hardware below...
On Linux (and FreeBSD) nss-mdns has been providing decent low-level integration of mDNS at the nsswitch level for ages. In fact it even predates Avahi by a few months. Porting it to Solaris would have been almost trivial. And, Sun engineers even asked about nss-mdns, so I am quite sure that Sun knew about this. You claim that our C API was internal? I wonder who told you that. I definitely did not. The API has been available on the Avahi web site for ages and is relatively well documented [1], I wonder how anyone could ever come to the opinion that it was "internal". Regarding API stability: yes, I said that we make no guarantees about API stability -- but I also said it was a top-priority for us to keep the API compatible. I think that is the best you can get from any project of the Free Software community. If there is something in an API that we later learn is irrecoverably broken or stupid by design, then we take the freedom to replace that or remove it entirely. Oh, and even Sun does things like that in Java, Just think of the Java 1.x java.lang.Thread.stop() API. nss-mdns does not make any use of D-Bus. It never did, it never will. GNOME never formally made the decision to go Avahi AFAIK. It's just what everyone uses because it is available on all distributions. Also, a lot of GNOME software can also be compiled against HOWL/Bonjour. Implementing the Avahi API on top of the Bonjour API is just crack. For a crude comparison: this is like implementing a POSIX compatiblity layer on top of the DOS API. Crack. Just crack. There is lot of functionality you can *never* emulate in any reasonable way on top of the current Bonjour API: properly integrated IPv4+IPv6 support, AVAHI_BROWSER_ALL_FOR_NOW, the fact that the Avahi API is transaction-based, all the different flag definitions, and a lot more. From a technical persepective emulating Avahi on top of Bonjour is not feasible, while the other way round perfectly is. Let's also not forget that Avahi comes with a Bonjour compatibility layer, which gets almost any Bonjour app working on top of Avahi. And in contrast your Avahi-on-top-of-Bonjour stuff it is not inherently borked. Yes, our Bonjour compatibility layer is not perfect, but should be very easy to fix if there should still be an incompatibility left. And the API of that layer is of course as much set in stone as the upstream Bonjour API. Oh, and you wouldn't have to run two daemons instead of just one. And you would only need to ship and maintain a single mDNS package. Oh, and the compatibility layer would only be needed for the few remaing applications that still use Bonjour exclusively, and not by the majority of applications. So, in effect you chose Bonjour because of its API and added some Avahi'sh API on top and this all is totally crackish. If you'd have done it the other way round you would have gotten both APIs as well, but the overall solution would not have been totally crackish. And let's not forget that Avahi is much more complete than Bonjour. (Maybe except wide-area support, Federico!). Anyway, my original rant was not about the way Sun makes its decision but just about the fact that your Avahi-to-Bonjour-bridge is ... crack! And that it remains.
Q: How to divide a map into zipcodes using d3, javascript, and a json file? I'm trying to create a nyc map with zipcode areas I can color in based on census data (like color an area red if majority white or blue if majority nonwhite). I am simply using one of the shape files I found online from here ( https://data.cityofnewyork.us/Business/Zip-Code-Boundaries/i8iw-xf4u/data ). I converted the shp file to a geojson and then a topojson file. I'd appreciate it if someone could look at my code below, and let me know how I can go about doing this. Code: <!DOCTYPE html> <meta charset="utf-8"> <style> </style> <body> <script src="//d3js.org/d3.v3.min.js" charset="utf-8"></script> <script src="//d3js.org/topojson.v1.min.js"></script> <script> var width = 500, height = 500; var svg = d3.select("body").append("svg") .attr("width", width) .attr("height", height); var projection = d3.geo.albers() .center([0,40.7]) .rotate([74,0]) .translate([width/2,height/2]) .scale(65000); var path = d3.geo.path() .projection(projection); d3.json("zipcode.json", function(error, uk) { console.log(uk) console.log(uk.objects) console.log(uk.objects.zipcode) if (error) return console.error(error); var subunits = topojson.feature(uk, uk.objects.zipcode); svg.append("path") .datum(subunits) .attr("d", path); }); Output: The last part of my code (and the first part) is modeled after https://bost.ocks.org/mike/map/. I understand I am trying to "Select All" of the some sort of feature array from the json file I am using in order to create paths. In my data, there's a coordinates array, which I am trying to access and use. My code doesn't throw any errors so I'm not sure where to look to debug. Also, I'm I supposed to color the areas the paths create in this step or after I create the paths? A: This answer uses d3 v3 and considers census tracts rather than zip codes (reflecting the original edit, but the principles remain the same) The selection's role in adding features: I understand I am trying to "Select All" of the some sort of feature array from the json file I am using in order to create paths. Rather than selecting something from the json file, you are selecting elements in the DOM. D3 will bind the data in the json to the features where they exist, produce an enter() selection where they don't, and produce an exit() selection where there are excess DOM elements selected in relation to the json data. This is why the initial appending of data with a selectAll(type).data(data) statement is followed with an .enter() statement generally. The enter returns the elements that must be added to the DOM: svg.selectAll(".tract") // bind data to the selection .data(topojson.feature(uk, uk.objects.nyct2010).features) .enter() // set properties for the new elements: .append("path") .attr("class", "tract") .attr("d", path); If you were updating the data - say showing some year by year property in your maps, you wouldn't need the .enter() if the number of geographic features was constant (likely the case), you would just set the data and then modify the properties. If the number of elements in your new data array is the same as the old one, then the enter() selection will actually be empty. The intial append with this method generally assumes the selectAll statement is empty, so that all items in the data are appended with the enter selection, this causes many people a lot of grief (a) (b) (c) (d) (e) (f). When using the alternate approach: svg.append('path') .datum(subunits) .attr('d',path') You just append one path element encompassing all features, which makes styling individual areas impossible. In contrast, the top approach appends one path for each element in your json. Setting map attributes: You may have difficulty in setting the the class of each path to d.coordinates. Using topojson.feature(data, data.objects.features).features returns geojson from your topojson. The coordinates property of each feature is an array - which might not won't work with a class declaration. But, you have the right approach. An inline function can set attributes easily: var color = d3.scale.category20(); svg.selectAll("path") .data(subunits) // from the question code. .enter() .append('path') .attr('fill',function(d,i) { return color(i); }) .attr("d", path); Using this I get: (block) But, let's look at d in that inline function above ( .attr('fill',function(d,i) { console.log(d); return color(i); }) ). It is a geojson object: Object { type: "Feature", properties: Object, geometry: Object } If you don't see any properties (it'll always have a properties property, but it might be empty or contain only methods), you have some bad news, the properties are empty. Consequently, there are no properties containing data that can be displayed - eg coloring the map. There are also no identifiers in the data. This makes joining outside data to each feature impossible and there is no data in the feature to show. Topojson doesn't compress properties so you should be able to see them if they are present in the text of the file: ..."Polygon","properties":{"CTLabel":"1223","BoroCode":"4","BoroName":"Queens","CT2010":"... Showing properties of geographical features You'll need to find a geographical dataset that has properties. Property-less features might be great for backgrounds, but less useful for everything else. I found a source of the 2010 census tracts here. I downloaded the shapefile and converted it to topojson at mapshaper.org (be sure to copy all the files into the window - drag and drop - so that the data and the projection data is transfered). The data is already projected (to the New York State Plane), so you should unproject/'project' it to WGS84 by typing proj wgs84 in the console. This answer might help in terms of understanding projected/unprojected data and d3 The file I'm working with has the property BoroCode which I'll use to display in a choropleth type display: svg.selectAll("path") .data(topojson.feature(data, data.objects.nyct2010).features) .enter() .append('path') .attr('fill',function(d) {return color(d.properties.BoroCode); }) .attr("d", path); This gives me: (block) Joining data to features Many shapefiles, topojsons, geosjons, feature classes etc don't include many properties/attributes. These files containing geographic coordinates are often joined to files that contain properties/attributes (but no coordinates) in a data join based on an identifier shared in each data source. There is an excellent example here on that in practice, though a better explanation might be here. I'll use the one of the few files I could find (relatively quickly and free) with census tract identifiers. Census information is generally great as it contains standardized identifiers. This file is a csv containing disposable income data. Now with the shared identifier, we can show the geographic shapes and assign colors to them based on the income values in the csv. Once both files are loaded, I'll make a dictionary: var lookup = {}; income.forEach(function(d) { lookup[d.tractID] = +d.disposable_income; }); and then I'll show the features, almost the same as above: svg.selectAll("path") .data(topojson.feature(data, data.objects.nyct2010).features) .enter() .append('path') .attr('fill',function(d) { return color(lookup[parseInt(d.properties.CT2010)] ); }) .attr("d", path); I used parseInt as I modified the csv's in Excel and lost the leading zeros in the csv, parseInt drops the leading zeros from my geojson identifiers. The end result looks something like: (block) If you took a look at the block, you'll see I nested d3.csv inside the d3.json callback function. Each of these is asynchronous, so unless we use a library like queue.js we'll need to wait until the json is loaded before loading the csv. This nested approach solves the problem of potentially styling the features before the csv is loaded This should cover how to color a map either based on increment, property within the geo/topo json and/or by joining the data from a non-spatial source to the spatial shapes. See the blocks for the implementation of a color scale, without a proper scale color(i) won't return anything.
Whole genome analysis of Vietnamese G2P[4] rotavirus strains possessing the NSP2 gene sharing an ancestral sequence with Chinese sheep and goat rotavirus strains. Because imminent introduction into Vietnam of a vaccine against Rotavirus A is anticipated, baseline information on the whole genome of representative strains is needed to understand changes in circulating strains that may occur after vaccine introduction. In this study, the whole genomes of two G2P[4] strains detected in Nha Trang, Vietnam in 2008 were sequenced, this being the last period during which virtually no rotavirus vaccine was used in this country. The two strains were found to be >99.9% identical in sequence and had a typical DS-1 like G2-P[4]-I2-R2-C2-M2-A2-N2-T2-E2-H2 genotype constellation. Analysis of the Vietnamese strains with >184 G2P[4] strains retrieved from GenBank/EMBL/DDBJ DNA databases placed the Vietnamese strains in one of the lineages commonly found among contemporary strains, with the exception of the NSP2 and NSP4 genes. The NSP2 genes were found to belong to a previously undescribed lineage that diverged from Chinese sheep and goat rotavirus strains, including a Chinese rotavirus vaccine strain LLR with 95% nucleotide identity; the time of their most recent common ancestor was 1975. The NSP4 genes were found to belong, together with Thai and USA strains, to an emergent lineage (VIII), adding further diversity to ever diversifying NSP4 lineages. Thus, there is a need to enhance surveillance of locally-circulating strains from both children and animals at the whole genome level to address the effect of rotavirus vaccines on changing strain distribution.
Introduction {#sec1-1} ============ Psoriasis is a life-long chronic inflammatory skin condition affecting approximately 2% of the general population.\[[@CIT1][@CIT2]\] There are many clinical variants of psoriasis. Most patients have plaques with silver-white scale and an erythematous base. Some patients have joint involvement. There is strong evidence in favor of psoriasis being an immune-mediated disease with T-cells playing a central role.\[[@CIT3][@CIT4]\] However, the pathogenesis of psoriasis is complex and likely includes mediators of both the innate and adaptive immune systems. In support of an immune etiology, psoriasis can either develop or go into remission following a bone marrow transplantation.\[[@CIT5][@CIT6]\] To date, there is no consensus as to the antigens involved in the autoreactive immune response that is responsible for psoriasis. However, the cytokine secretion profile of the T-cells has been well characterized and both Th1 and Th17 cells have been found to play a role in the pathogenesis of psoriasis.\[[@CIT7]\] Th1 differentiation is mediated by IL-12. In contrast, Th17 cells develop in the presence of IL-1, IL-6, and TGF-α. Once differentiated, IL-23 is then required for their maintanance. Th1 cells release mediators such as TNF-α and IFN-α that lead to vasodilation, leukocyte migration and activation of keratinocytes.\[[@CIT4]\] This in turn leads to further activation of dendritic cells, creating a cycle of inflammation. Th-17 cells also stimulate keratinocyte activation and proliferation through secretion of IL-17 and IL-22.\[[@CIT8]--[@CIT10]\] A schematic of the activation process is shown in [Figure 1](#F0001){ref-type="fig"}. ![Biologics in psoriasis and their possible mechanisms. TNF- α secreted by antigen-presenting cells; Th-1 cells and keratinocytes can be neutralized by the anti-TNF biologics infliximab, etanercept, adalimumab, and golimumab. Adalimumab and golimumab are fully human antibodies directed against TNF-α. Infliximab was developed from a mouse anti-TNF antibody that was then partially humanized. Etanercept is a molecullarly engineered molecule formed by linking the TNF-α receptor to the Fc portion of an antibody. Ustekinumab and ABT-874 are directed against the p40 subunit of IL-12 and IL-23. IL-12 is needed for differentiation of naive cells into Th-1 cells and IL-23 is needed for the maintenance of IL-17-secreting Th17 cells. IFN-α secreted by Th-1 cells and IL-17 and IL-22 secreted by Th-17 cells activate keratinocytes, which in turn proliferate and secrete IL-12 and TNF-α.](IJD-55-161-g001){#F0001} Biological therapy is the use of agents that can specifically target an immune or genetic mediator of a pathophysiological process. The introduction of biological-based therapies has greatly improved treatment of psoriasis. Several biological therapies have emerged over the past decade for psoriasis alone \[[Table 1](#T0001){ref-type="table"}\]. Earlier agents disrupted activation and migration of T-cells and these include alefacept and efalizumab. Later agents have targeted TNF-α and these include infliximab, etanercept, and adalimumab. Recently, agents that target the p40 subunit shared by both IL-12 and IL-23 have been developed and these include ustekinumab and ABT-874. The sites of action of the anti-TNF and the anti-IL12/IL23 agents are indicated in [Figure 1](#F0001){ref-type="fig"}. Clinical trials that have investigated the role of biologics in psoriasis therapy are reviewed in [Table 2a](#T0002){ref-type="table"} and [2b](#T0003){ref-type="table"}. ###### Biologics in treatment of psoriasis Biologic Immunological construct Mechanism of action Manufacturer Route ------------- -------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------- ------- Alefacept Human fusion protein of the first extracellular domain of LFA-3 fused Fc portion of human IgG1 LFA-3 portion binds to CD2 on memory T-cells to block their activation. Fc portion binds to CD 16 on natural killer cells to induce apoptosis of memory T-cells Astellas Pharma USA, Inc. IV Infliximab Chimeric (murine-human) antibody against TNF-α Binds TNF to neutralize its effects Centocor Ortho Biotech Inc. IV Etanercept Human fusion protein of the TNF receptor to Fc portion of IgG1 Binds TNF to neutralize its effects Amgen® and Wyeth® SC Adalimumab Human monoclonal antibody against TNF Binds TNF to neutralize its effects Abbot Laboratories SC Golimumab Human monoclonal antibody against TNF Binds TNF to neutralize its effects Centocor Ortho Biotech Inc. SC Ustekinumab Human monoclonal antibody against the p40 subunit of IL-12 and IL-23 from human immunoglobulin transgenic mice Blocks the actions of IL-12 and IL-23 Centocor Ortho Biotech Inc. SC ABT-874 Human monoclonal antibody against the p40 subunit of IL-12 and IL-23 isolated from human anti body phage display library Blocks the actions of IL-12 and IL-23 Abbot Laboratories SC ###### Clinical trials of biologics for psoriasis Biologic Study Study design Duration of study Dosing Antibody formation against Bologic ------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Alefacept Phase 2 -- 229 patients with CPP\[[@CIT1]\]Phase 3 -- 553 patients with CPP\[[@CIT2]\]Phase 3 -- 507 patients with CPP\[[@CIT3]\] DB, PC, PG study at 22 sites in USADB, PC, PG study at 51 sites in USA and Canada with crossover at 12 weeksDB, PC, PG study at 64 sites in USA, Canada, and Europe 12 week treatment phase with a 12 week follow-up12 week treatment phase with a 12 week followup, followed by another 12 week treatment phase with a 12 week follow up; Cohort 1: Alefacept-Alefacept, Cohort 2: Alefacept-Placebo, Cohort 3: Placebo-Alefacept12 week treatment phase with 12 week follow-up IV once a week: placebo, 0.025 mg/kg, 0.075 mg/kg, 0.15 mg/kgIV once a week: placebo, 7.5 mgIM once a week: placebo, 10 mg, 15 mg One patient developed "low" antibody titerFive patients developed "low" antibody titers4% of patients tested in alefacept-treated patients; Antibodies were not neutralizing and had titers\<1:40; one of the placebo patients had antialefacept antibodies Infliximab Phase 2 -- 249 patients with CPP\[[@CIT4]\]Phase 3 -- 378 patients with CPPPhase 3 -- 835 patients with CPP\[[@CIT5]\] DB, PC, PG study at 24 sites in USADB, PC, PG study at 32 sites in Canada and Europe with placebo crossoverDB, PC, PG study at 63 sites in USA, Canada, and Europe with rerandomization to scheduled or "as needed" treatment 6 week induction treatment phase with a 20 week follow-up6 week induction phase with placebo-controlled treatment phase to 24 weeks followed by placebo crossover to 46 weeks6 week induction phase followed by rerandomization to either "as needed" infusions or scheduled 8 week infusions to 50 weeks IV given at week 0, 2, and 6: placebo, 3 mg/kg, 5 mg/kgIV given at week 0, 2, and 6 and then every 8 weeks: placebo, 5 mg/kg; at 24 weeks placebo crossed over to receive 5 mg/kgIV given at week 0, 2, and 6: placebo, 3mg/kg, 5 mg/kg. Re-randomized at week 14 to either scheduled or "as needed" dosing. Placebo started scheduled dosing (5 mg/kg) at 8 weeks 27% and 20% of patient in 3 mg/kg and 5 mg/kg, respectivelyCumulatively 27% of patients formed antibodies; antibody formation associated with loss of responseAt week 66, 49% and 39% of patients formed antibodies in the 3 mg/kg and 5 mg/kg treatment groups, respectively; 61.5% of titers were\<1:40; antibody formation was related to loss of response Etanercept Phase 2 -- 112 patients with CPP\[[@CIT6]\]Phase 3 -- 652 patients with CPP\[[@CIT7]\]Phase 3 -- 611 patients with CPP\[[@CIT8]\]Phase 3 -- 618 patients with CPP\[[@CIT9]\]Phase 3 -- 211 children with CPP\[[@CIT10]\] DB, PC, PG multiple sites in USADB, PC, PG at 47 sites in USA with placebo crossoverDB, PC, PG at 50 sites in USA, Canada, Western Europe followed by open label treatment phaseDB, PC, PG at 39 sites in USA and Canada with open label extensionDB, PC, PG at 42 sites in USA and Canada followed by open label and then double-blind withdrawalreadministration phase 24 week treatment phase12 week placebo-controlled treatment phase followed by another 12 week treatment phase where placebo was crossed over to treatment group12 week placebo-controlled treatment phase followed by a 12 week open label treatment phase12 week placebo-controlled treatment phase followed by open label extension to 96 weeks12 week placebo-controlled treatment phase followed by 24 week open label phase followed by a 12 week double blind withdrawalreadministration phase Subcutaneous given every other week: placebo, 25 mgSubcutaneous: placebo, low (25 mg/week), medium (25 mg twice a week), high (50 mg twice a week); After 12 weeks placebo received medium dosingSubcutaneous: placebo, 25 mg, 50 mg twice weekly; After 12 weeks all patients received 25 mg twice weeklySubcutaneous: placebo, 50 mg twice weekly; after 12 weeks, all patients received 50 mg twice weekly for total treatment of 96 weeksSubcutaneous: placebo, 0.8 mg/kg (up to 50 mg) per week Not reportedEight patients developed antibodies and no titers reported1.1% and 1.6% developed antibodies in first and second treatment phases respectively; antibodies did not affect efficacy; 73% of these patients had no antibodies at subsequent testing18.3% of patients had antibodies and titers were not reported; presence of antibody did not affect efficacy of treatmentNot reported Adalimumab Phase 2 -- 147 patients with CPP\[[@CIT11]\]Phase 3 -- 271 patients with CPP\[[@CIT12]\]Phase 3 -- 1212 patients with CPP\[[@CIT13]\] DB, PC, PG at 18 sites in USA and Canada with placebo crossover and open label extensionDB, PC, PG at 28 sites in Europe and CanadaDB, PC, PG at 81 sites in USA and Canada with placebo crossover openlabel extension and blinded withdrawal 12 week placebo controlled treatment phase followed by a 12 week blinded treatment phase with placebo crossover followed by 36 weeks of open label treatment phase16 week treatment trial of placebo vs. adalimumab vs. methotrexate16 week placebo controlled treatment phase followed by 17 week open-label phase followed by a 19 week blinded placebo controlled withdrawal phase Subcutaneous: placebo, 80 mg and then 40 mg every other week, 80 mg and then 40 mg weekly; after 12 weeks, placebo group received 80 mg and then 40 mg every other weekAdalimumab subcutaneous 80 mg once and then 40 mg every other week; methotrexate orally escalated from 5 mg to 25 mg; PlaceboSubcutaneous: placebo, 40 mg every other week Not reportedNot reported8.8% of adalimumab-treated patients developed antibodies at some point during the study; titers not reported; presence of antibody correlated with loss of response Ustekinumab Phase 3 -- 766 patients with CPP\[[@CIT14]\]Phase 3 -- 1230 patients with CPP\[[@CIT15]\] DB, PC, PG at 48 sites in USA, Canada, and BelgiumDB, PC, PG at 70 sites in USA, Canada, Europe 12 week placebo-controlled treatment phase followed by placebo in randomized crossover to treatment group; nonresponders (\<50% reduction in PASI) discontinued at week 28 and at week 40 all remaining patients in groups were placed in placebo-controlled randomized withdrawal phase12 week placebo-controlled treatment phase followed by placebo in randomized crossover to treatment group; nonresponders (\<50% reduction in PASI) discontinued at week 28 and at week 28 all remaining patients in groups were placed in randomized dose intensification phase. Subcutaneous: placebo, 45 mg, 90 mg at week 0 and week 4 and then every 12 weeks; placebo group in randomized crossover to 45 mg or 90 mg at week 12; at week 40 PASI\<75 received doses every 8 weeks and all others entered a randomized withdrawal phaseSubcutaneous: placebo, 45 mg, 90 mg at week 0 and week 4 and then every 12 weeks; placebo group in randomized crossover to 4 5mg or 90 mg at week 12; at week 28 partial responder received doses every 8 weeks and all others received doses at every 12 weeks 5.1% developed antibodies with titers that were\<1:360At week 52, 12.7% and 2% of partial responders and full responders had antibodies respectively; the antibodies were neutralizing ABT-874 Phase 2 -- 180 patients with CPP\[[@CIT16]\] DB, PC, PG at 24 sites in USA and Canada 12 week treatment phase Subcutaneous: placebo (a), 200 mg once (b), 200 mg weekly for four weeks (c), 100 mg every other week (d), 200 mg every other week (e), 200 mg every week (f) Not reported DB = double-blind, PC = placebo controlled, PG = parallel group, CPP = chronic plaque psoriasis, IV = intravenous, PASI = psoriasis area and severity index ###### Efficacies of biologics in clinical trials for psoriasis Biologic Efficacy at primary endpoint Notes ------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Alefacept At 2 weeks after treatment phase, reduction in mean PASI (primary end point) was 21%, 38%, 53%, 53% in the placebo, 0.025 mg/kg, 0.075 mg/kg, and 0.15 mg/kg treatment groups, respectively. Patients achieving 75% reduction in PASI were 10%, 21%, 33%, and 31% in the placebo, 0.025 mg/kg, 0.075 mg/kg, and 0.15 mg/kg treatment groups, respectively.At 2 weeks after first treatment phase a 75% reduction in the PASI (primary end point) was 4% and 14% in the placebo and the 7.5 mg treatment groups, respectively.At 2 weeks after treatment phase, reduction in mean PASI (primary end point) was 21%, 34%, 44% in the placebo, 10 mg, and 15 mg treatment groups, respectively Efficacies of treatment was better than placebo at 12 weeks after treatment phase; higher dropout rate in the placebo group; data collection and analysis was performed by employees at sponsoring companyPatients receiving two courses of Alefacept had enhanced control of psoriasis; IV infusion was associated with chills; dose reduced by 33% for subjects that weighed less than 50 kg; no opportunistic infections were noted; higher dropout rate in the placebo group;Study was underpowered at the primary end point of 15% mean reduction of PASI scores at 2 weeks after treatment for 10 mg treatment group; higher dropout rate in the placebo group; data analysis performed by study sponsor Infliximab At 10 weeks, a 75% reduction in the PASI (primary end point) was 6%, 72%, 88% in the placebo, 3 mg/kg, and 5mg/kg treatment groups respectively.At 10 weeks, a 75% reduction in the PASI (primary end point) was 3% and 80% in the placebo and infliximab treatment groups, respectively.At 10 weeks, a 75% reduction in the PASI (primary end point) was 1.9%, 70.3%, 75.5% in the placebo, 3 mg/kg, and 5 mg/kg treatment groups, respectively. Higher response efficacies were noted in the scheduled treatment group in comparison to the "as needed" treatment group. Power analysis not reported; higher dropout rate in the placebo group; site of data analysis not specified; Patient who developed anti-dsDNA did not develop lupus like symptoms;Nail psoriasis improved in treatment group; data analysis performed by study sponsor;Most frequent adverse effects in treatment group were sinusitis and headache; higher dropout rate in the placebo group; site of data not specified; several patients developed lupus like symptoms Etanercept At 12 weeks, a 75% reduction in the PASI (primary end point) was 2% and 30% in the placebo and etanercept treatment groups, respectively. At 24 weeks, a 75% reduction in the PASI was 5% and 56% in the placebo and etanercept treatment groups, respectively. At 24 weeks, DLQI improvement was 7% and 65% in the placebo and the 25 mg treatment groups, respectively.At 12 weeks, a 75% reduction in the PASI (primary end point) was 4%, 14%, 34%, and 49% in the placebo, low, medium, and high treatment groups, respectively. At 24 weeks, a 75% reduction in the PASI was 25%, 44%, and 59% in the low, medium, and high treatment groups, respectively. At 24 weeks, DLQI improvement was 7% and 65% in the placebo and the 25 mg treatment groups, respectively.At 12 weeks, a 75% reduction in the PASI (primary end point) was 3%, 34%, and 49% in the placebo, 25 mg, and 50 mg biweekly treatment groups, respectively.At 12 weeks, a 75% reduction in the PASI (primary end point) was 5% and 47% in the placebo and the etanercept treatment groups, respectively. During the open label period, PASI 75 levels decreased with duration of therapy.At 12 weeks, a 75% reduction in the PASI (primary end point) was 11% and 57% in the placebo and the etanercept treatment groups, respectively. Placebo group approached PASI levels of treatment group during open label treatment phase. Withdrawal-retreatment phase data was not reported. Higher rates of sinusitis and upper respiratory infections in the treatment group; higher dropout rate in the placebo group; site of data analysis not reported; two cases of nonplaque psoriasis reported in treatment group;Not sufficient power to detect difference between placebo and low treatment group; data analysis was performed by the sponsorRetrospective power analysis (?); Higher dropout rate in the placebo group; injection site reactions were worse in the treatment group and were mild to moderate in severity; data analysis performed by sponsorHigher dropout rate in the placebo group; data analysis performed by investigators; tachyphylaxis with duration of therapy although this was related to the presence of antibodiesRetrospective power analysis; data storage and analysis performed by the sponsor; higher placebo dropout rate; treatment group had higher rate of streptococcal pharyngitis. Adalimumab At 12 weeks, a 75% reduction in the PASI (primary end point) was 4%, 53%, and 80% in the placebo, 40 mg every other week, and 40 mg weekly treatment groups, respectively. Efficacies of achieving PASI 75 decreased with duration of therapy.At 16 weeks, a 75% reduction in the PASI (primary end point) was 18.9%, 35.5%, and 79.6% in the placebo, methotrexate, and adalimumab treatment groups, respectively.At 16 weeks, a 75% reduction in the PASI (primary end point) was 7% and 71% in the placebo and adalimumab treatment groups, respectively. All patients that achieved PASI 75 at week 16 had a 92% improvement in their PASI by week 33. Re-randomization to placebo in withdrawal phase led to higher loss of response. Efficacy of achieving PASI 75 decreased with duration of therapy; placebo crossover group was similar to treatment group by end of study; site of data analysis not reportedData analysis was performed by sponsor; higher placebo dropout rate; all patients received folate supplementation; methotrexate started low with slow increase of dosageData analysis performed by sponsor; higher placebo dropout rate; higher injection site reactions in adalimumab treatment group Ustekinumab At 12 weeks, a 75% reduction in the PASI (primary end point) was 3.1%, 67.1%, and 66.4% in the placebo, 45 mg, and 90 mg treatment groups, respectively. By week 40, placebo crossover groups had similar efficacies to ustekinumab treatment groups.At 12 weeks, a 75% reduction in the PASI (primary end point) was 3.7%, 66.7%, and 75.7% in the placebo, 45 mg, and 90 mg treatment groups, respectively. Partial responders did not benefit from escalated dosing at 45 mg but had higher PASI 75 rates with escalated dosing at 90 mg. Data analysis performed by sponsor; higher dropout rate in the placebo group; similar adverse reaction between treatment and placebo groupsData analysis performed by sponsor; higher dropout rate in the placebo group; similar adverse reactions between treatment and placebo group ABT-874 At 12 weeks, a 75% reduction in the PASI (primary end point) was 3%, 63%, 90%, 93%, 93%, and 90% in the a, b, c, d, e, and f treatment groups, respectively. Data analysis was performed by sponsor and investigators; high placebo dropout rate; treatment group had higher rate of nasopharyngitis Non-cytokine Biologics {#sec1-2} ====================== Alefacept {#sec2-1} --------- Alefacept was designed to block the CD2/LFA-3 interaction important for T-cell function. Clinical trials with either IV\[[@CIT11][@CIT12]\] or IM\[[@CIT13]\] alefacept have found it to be effective in the treatment of psoriasis. All of these trials were 12 weeks in length, and tested for improvement at 2 weeks as their primary end point. Efficacy was maintained at 12 weeks. In one of the studies, alefacept was found to reduce the amount of memory effector T-cells without affecting the naïve T-cell population.\[[@CIT11]\] Another study included three different cohorts with a placebo crossover and placebo withdrawal. This trial found that the cohort that received two courses of alefacept had improved treatment efficiencies compared to the placebo crossover or withdrawal cohorts.\[[@CIT12]\] A meta-analysis showed that alefacept treated patients had an overall 9% increased risk of adverse events.\[[@CIT14]\] The most common adverse effects noted in these studies were dizziness,\[[@CIT11]\] nausea,\[[@CIT11]\] infusion-related chills,\[[@CIT11][@CIT12]\] pharygitis,\[[@CIT12][@CIT13]\] headache,\[[@CIT13]\] and pruritus.\[[@CIT13]\] A meta-analysis of the safety of alefacept showed coronary artery disease in four subjects, cellulitis in three subjects, and myocardial infarction in three subjects, while none of these serious adverse events were noted in the placebo groups. IV dosing was noted to increase the incidence of serious adverse effects over IM dosing.\[[@CIT14]\] Anti-alefacept antibodies were noted to develop in all three studies with up to 4% in the study in which alefacept was administered IM. These antibodies were found to be non-neutralizing.\[[@CIT13]\] No adverse events were correlated with the presence of the antibody. Efalizumab {#sec2-2} ---------- Efalizumab has been voluntarily withdrawn from the market in the USA partly due to the risks of progressive multifocal leukoencephalopathy. This antibody was manufactured by Genentech and was specific to the CD11a subunit of LFA-1. Cytokine Biologics {#sec1-3} ================== Anti-TNF agents {#sec2-3} --------------- ### Infliximab {#sec3-1} Clinical trials with IV infliximab have shown it to have efficacy of reaching a PASI 75 at 10 weeks at 75.5-88% in those treated with 5 mg/kg when compared to 1.9-6% in the placebo group.\[[@CIT15]--[@CIT17]\] Two of the studies showed that an intermediate dose of 3 mg/kg was also effective in achieving PASI 75 at 10 weeks for 70.3-72% of those treated.\[[@CIT16][@CIT17]\] Efficacies were maintained over placebo for 46-50 weeks, a loss in response was noted in those subjects that developed anti-infliximab antibodies.\[[@CIT15][@CIT16]\] Although not a primary end point, one study noted 26% improvement and a 6% worsening in nail psoriasis of the infliximab and placebo treatment groups, respectively. The most common adverse effects were rhinitis, transaminitis, sinusitis, and headache.\[[@CIT15][@CIT16]\] ### Etanercept {#sec3-2} Phase 2 and phase 3 trials with etanercept delivered subcutaneously report that it is superior to placebo in achieving PASI 75.\[[@CIT18]--[@CIT22]\] At 12 weeks after treatment, the PASI 75 for biweekly subcutaneous injections of 25 mg or 50 mg were reported at 34% and 49%, respectively, while the placebo group had a 12 week PASI 75 of only 3-4%.\[[@CIT19][@CIT21]\] A dose response was noted from low to high dosing\[[@CIT19][@CIT21]\] and the efficacy continued to increase at 24 weeks.\[[@CIT21]\] A phase 3 study of a pediatric population revealed that after 12 weeks, subcutaneous dosing at 0.8 mg/kg resulted in 57% of patients receiving a PASI 75 while placebo dosing only achieved a PASI 75 in 11%.\[[@CIT20]\] Antibody formation against etanercept ranged from 1.1 to 18.3%.\[[@CIT18][@CIT19]\] A loss of response was correlated with the duration of therapy but the formed antibodies were not found to be neutralizing. The most common side effects noted in adults were upper respiratory tract infections,\[[@CIT22]\] sinusitis,\[[@CIT22]\] headaches,\[[@CIT22]\] and injection site reactions\[[@CIT18][@CIT19][@CIT21][@CIT22]\] Injection site rections tended to occur more frequently during the first 12 weeks of therapy and approached placebo level frequencies afterward. The most common side effects noted in one pediatric study was an increased incidence of streptoccal pharyngitis and skin papillomas.\[[@CIT20]\] ### Adalimumab {#sec3-3} Subcutaneously injected adalimumab was found to have superior efficacy of achieving PASI 75 in comparison to placebo in several phase 2 and phase 3 trials. In one phase 2 study, increasing doses of adalimumab were compared against placebo and a dose response was observed. After 12 weeks of therapy it was found that placebo, 40 mg every other week and 40 mg weekly achieved a PASI 75 in 4%, 53%, and 80% of subjects, respectively.\[[@CIT23]\] Two other phase 3 studies found that 71-79.6% of subjects treated with 40 mg every other week achieved a PASI 75 in comparison to 7-18.9% of those treated with placebo after 16 weeks of treatment.\[[@CIT24][@CIT25]\] The higher rate of efficacy in achieving PASI 75 in the placebo groups of the phase 3 studies may have been related to the 16 week course of treatment in comparison to the 12 week treatment course in the phase 2 study. Antibodies against adalimumab developed in 8.8% of patients at some point during their treatment course and the presence of antibodies was correlated with a loss of response.\[[@CIT25]\] One the phase 3 studies compared adalimumab treatment against methotrexate. At 16 weeks, the PASI 75 achieved by subjects in the methotrexate and the adalimumab treatment groups were 35.5% and 79.6%, respectively.\[[@CIT24]\] Because the methotrexate was started low and increased over time, the 16 weeks observation may have been too short to appropriately assess the methotrexate response. The most common side effects were upper respiratory infections,\[[@CIT25]\] nasopharyngitis,\[[@CIT24]\] headache,\[[@CIT24]\] and cellulitis.\[[@CIT25]\] Anti-p40 (IL-12/IL-23) {#sec2-4} ---------------------- ### Ustekinumab {#sec3-4} Ustekinumab is the first of a new class of biological drugs that prevent the actions of IL-12 and IL-23 by binding to their mutual subunit p40. Two phase 3 studies show that subcutaneously injected ustekinumab has superior efficacy in comparison to placebo. Both studies utilized a 12 week placebo controlled period during which ustekinumab had an efficacy of achieving PASI 75 in 66.7-67.1% and 66.4-75.7% in those treated with 45 mg or 90 mg, respectively.\[[@CIT26][@CIT27]\] In the placebo group, 3.1-3.7% achieved PASI 75. Both of these trials included a placebo crossover group that attained similar treatment efficacies as the ustekinumab treatment group. The dosing of ustekinumab is more spaced out than previous biologics with subcutaneous injections given at week 0, week 4, and then at 12 week intervals, making treatment more convenient. The development of antibodies against ustekinumab has been shown to have clinical implications as the antibodies were found to be neutralizing.\[[@CIT26]\] This study showed that subjects could be split into full responders and partial responders, the latter defined as those subjects that achieved PASI 50 but not PASI 75 by 28 weeks. Partial responders had increased the prevalence of antibodies against ustekinumab.\[[@CIT26]\] The most common side effects were injection site reactions.\[[@CIT26]\] As this is a newly introduced drug, there is little long-term usage studies and post-market surveillance will be important in understanding long-term side effects. ### ABT-874 {#sec3-5} ABT-874 is another antibody generated against the p40 subunit and designed to block the actions of IL-12 and IL-23. One phase 2 trial investigated the use of ABT-874 with progressively increasing doses, showing a dose response relationship.\[[@CIT28]\] While 3% of subjects in the placebo achieved PASI 75 at 12 weeks, 90% of those treated with 200 mg every 4 weeks achieved PASI 75 at 12 weeks. It was found that increasing the dosing beyond 200 mg every 4 weeks did not provide any increase in achieving PASI 75. The most common adverse events were injection site reactions and nasopharyngitis. The development of antibodies against ABT-874 were not reported. Discussion {#sec1-4} ========== With the growth in development of biological therapies, there are several effective options for the treatment of chronic plaque psoriasis, which is the most prevalent form of psoriasis. Several generalizations can be made from review of the clinical trial literature. It is interesting to note that in most studies, the placebo group had a larger dropout rate than the treatment group \[[Table 2b](#T0003){ref-type="table"}\], and this may alter the actual differences between the treatment and placebo group. All of the studies compared treatment against placebo, but only one study compared the biological therapy against methotrexate.\[[@CIT24]\] The formation of antibodies against the biological drug is not uncommon and can affect the long-term efficacy of the biologic. Studies in the use of biological therapies and immunosuppresants for rheumatoid arthritis and Crohn\'s disease show that combined dosing of a biological agent with another immunosppressive agent, such as methotrexate, decreases the formation of antibodies against the biological agent.\[[@CIT29][@CIT30]\] Although resistance to one biological agent does not imply resistance to another agent, it would be inconvenient to keep switching agents given the chronic nature of psoriasis. A better solution may be to concomitantly treat patients with both a biological agent and another immunospressant, such as methotrexate. Case reports describe the utility in combining methotrexate with a biological agent.\[[@CIT31]\] However, no studies have investigated the combined therapy of biological agents and methotrexate for psoriasis and currently there are little data on the efficacy or the side effects of combined therapy. The larger studies reviewed here have focused on the therapy of plaque psoriasis and it is unclear how effective the biological therapies will be in treatment of other forms of psoriasis. Smaller studies have suggested that some of the biologics may be useful for other forms of psoriasis.\[[@CIT32]--[@CIT34]\] Unlike the TNF blockers that have been studied for a longer duration of time\[[@CIT35][@CIT36]\] and used extensively in rheumatology, the IL-12/23 blockers are new treatment options and the long-term effects are still largely unknown. Because these biological agents act earlier in the immune response chain, in comparison to the TNF-α blockers, they are potentially more immunosuppressive and thus infection is a concern. In particular, Th-17 cells, whose actions are antagonized by IL-12/23 blockers, are important in protection against bacteria and fungi.\[[@CIT37]\] Biologics are generally safe and well tolerated. However, like all medications, they have adverse effects. Importantly, these medications can predispose patients to infections and increased their risk of developing a malignancy.\[[@CIT38]--[@CIT41]\] All anti-TNF-α agents have been associated with a variety of serious and "routine" opportunistic infections.\[[@CIT38]\] From a public health standpoint, the development of active tuberculosis in some patients who receive TNF-α inhibitor therapy is a matter of serious concern.\[[@CIT38][@CIT39]\] There is also an increased risk for a variety of malignant conditions such as lymphoma, leukemia, and melanomas.\[[@CIT40][@CIT41]\] As the use of TNF-α antagonists becomes widespread, further cases of tuberculosis associated with TNF-α blockade can be expected, especially in developing countries with high incidences of tuberculosis.\[[@CIT38]\] To prevent the reactivation of latent tuberculosis, appropriate screening of patients with Mantoux test and chest X-ray should be performed before initiating anti-TNF therapy, and begin treatment if latent infection is found. The screening strategies employed in Europe and North America have reduced the occurrence of TNF-α inhibitor-associated tuberculosis. Tuberculosis in patients treated with anti-TNF agents may present with extrapulmonary or disseminated disease. Thus, clinicians should be vigilant in monitoring for tuberculosis in their patients treated with TNF-α inhibitors. The role of screening in the prevention of other opportunistic infections is far less certain. No official guidelines currently exist for many of these opportunistic infections, but various authors have made recommendations regarding screening options, as summarized in [Table 3](#T0004){ref-type="table"}.\[[@CIT38][@CIT42]--[@CIT44]\] Because of systemic immune suppression, a variant clinical presentation is expected; atypical signs and symptoms as well as atypical pathogens should be considered. Patients receiving TNF-α inhibitor treatment should be closely monitored for serious infections and should be educated about how to avoid infectious complications.\[[@CIT38]\] Although rare, clinicians need to closely monitor for malignancy, and induction of autoimmune diseases (psoriasis, lupus) in patients receiving anti-TNF agents. ###### Suggested screening tests for certain infections before initiating anti-TNF therapy (39,43,44,45) Infection Recommended screening -------------------- --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Tuberculosis PPD, chest X-ray at baseline and PPD every 12 months. Histoplasmosis Consider chest radiograph and urine histoplasmin antigen testing at baseline and every 3 -- 4 months for patients who live or have lived in endemic areas. Coccidioidomycosis Chest radiograph and serologic testing with IgM and IgG tests at baseline. Consider follow-up testing every 3 -- 4 months for patients who live or have lived in endemic areas. The development of biological therapies has revolutionized psoriasis treatment. Despite the growing number of biological therapies that are entering the clinical arena, many more biological remain on the horizon, including the targeting of IL-21\[[@CIT45]\] or IL-22.\[[@CIT10]\] With time, long-term side effects and efficacies will become clearer and help determine which ones are the most suitable for long-term care of psoriasis. **Source of Support:** Nil **Conflict of Interest:** Nil.
;/*-- ; ; Copyright (c) Microsoft Corporation. All rights reserved. ; ; Abstract: ; This module contains the specific error codes and messages returned ; by SF modules ; ; Author: Mert Coskun (MCoskun) 12-12-2016 ; Environment: User and Kernel modes ; ; --*/ ; ;#pragma once ; ; ;// ;// Facility codes. Define SF to be Facility 0x43; Other components that use SF will use other facility codes. ;// Warning avoid using the commented out facility codes since they are used in KTL. ;// ; ;// const USHORT FacilityKtl = 0xFF; ;// const USHORT FacilityLogger = 0xFC; ;// const USHORT FacilityBtree = 0xBB; ;const USHORT FacilitySF = 0x43; ; ;// ;// Macro for defining NTSTATUS codes. ;// ; ;#define SfStatusCode(Severity, Facility, ErrorCode) ((NTSTATUS) ((Severity)<<30) | (1<<29) | ((Facility)<<16) | ErrorCode) ; ;// ;// Macro for extracting facility code from a SF NTSTATUS code. ;// ; ;#define SfStatusFacilityCode(ErrorCode) (((ErrorCode) >> 16) & 0xFFFF) ; MessageIdTypedef = NTSTATUS SeverityNames = ( Success = 0x0 : STATUS_SEVERITY_SUCCESS Informational = 0x1 : STATUS_SEVERITY_INFORMATIONAL Warning = 0x2 : STATUS_SEVERITY_WARNING Error = 0x3 : STATUS_SEVERITY_ERROR ) FacilityNames = ( FacilitySF = 0x43 : FACILITY_SF ) ;/***************************************************************************/ ;/* NTSTATUS codes for SF */ ;/* */ ;/* Note: All codes must match FABRIC_ERROR_CODEs : [1bbc, 1d4b] */ ;/* Note: Due to conversion requirements between HResult, */ ;/* only Error and Success Severity can be used */ ;/***************************************************************************/ MessageId = 0x1bbc SymbolicName = SF_STATUS_COMMUNICATION_ERROR Facility = FacilitySF Severity = Error Language = English A communication error caused the operation to fail. . MessageId = 0x1bbd SymbolicName = SF_STATUS_INVALID_ADDRESS Facility = FacilitySF Severity = Error Language = English The supplied address was invalid. . MessageId = 0x1bbe SymbolicName = SF_STATUS_INVALID_NAME_URI Facility = FacilitySF Severity = Error Language = English Invalid name URI. . MessageId = 0x1bbf SymbolicName = SF_STATUS_INVALID_PARTITION_KEY Facility = FacilitySF Severity = Error Language = English Invalid partition key or ID. . MessageId = 0x1bc0 SymbolicName = SF_STATUS_NAME_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Name already exists. . MessageId = 0x1bc1 SymbolicName = SF_STATUS_NAME_DOES_NOT_EXIST Facility = FacilitySF Severity = Error Language = English Name does not exist. . MessageId = 0x1bc2 SymbolicName = SF_STATUS_NAME_NOT_EMPTY Facility = FacilitySF Severity = Error Language = English Name not empty. . MessageId = 0x1bc3 SymbolicName = SF_STATUS_NODE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Node not found. . MessageId = 0x1bc4 SymbolicName = SF_STATUS_NODE_IS_UP Facility = FacilitySF Severity = Error Language = English Node is up. . MessageId = 0x1bc5 SymbolicName = SF_STATUS_NO_WRITE_QUORUM Facility = FacilitySF Severity = Error Language = English he operation failed because a quorum of nodes are not available for this replica set. Consider retrying once more nodes are up. . MessageId = 0x1bc6 SymbolicName = SF_STATUS_NOT_PRIMARY Facility = FacilitySF Severity = Error Language = English The operation failed because this node is not the primary replica. Consider re-resolving the primary and retrying the operation there. . MessageId = 0x1bc7 SymbolicName = SF_STATUS_NOT_READY Facility = FacilitySF Severity = Error Language = English The requested data is not yet in cache. This same operation is likely to succeed if retried later. . MessageId = 0x1bc8 SymbolicName = SF_STATUS_OPERATION_NOT_COMPLETE Facility = FacilitySF Severity = Error Language = English The operation has not completed. . MessageId = 0x1bc9 SymbolicName = SF_STATUS_PROPERTY_DOES_NOT_EXIST Facility = FacilitySF Severity = Error Language = English Property does not exist. . MessageId = 0x1bca SymbolicName = SF_STATUS_RECONFIGURATION_PENDING Facility = FacilitySF Severity = Error Language = English The operation failed because this replica set is currently reconfiguring. . MessageId = 0x1bcb SymbolicName = SF_STATUS_REPLICATION_QUEUE_FULL Facility = FacilitySF Severity = Error Language = English Replication queue is full. . MessageId = 0x1bcc SymbolicName = SF_SERVICE_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Service already exists. . MessageId = 0x1bcd SymbolicName = SF_SERVICE_DOES_NOT_EXIST Facility = FacilitySF Severity = Error Language = English Service does not exist. . MessageId = 0x1bce SymbolicName = SF_STATUS_SERVICE_OFFLINE Facility = FacilitySF Severity = Error Language = English The operation failed because the service is currently offline. . MessageId = 0x1bcf SymbolicName = SF_STATUS_SERVICE_METADATA_MISMATCH Facility = FacilitySF Severity = Error Language = English The operation failed because the service metadata does not match. . MessageId = 0x1bd0 SymbolicName = SF_STATUS_SERVICE_AFFINITY_CHAIN_NOT_SUPPORTED Facility = FacilitySF Severity = Error Language = English The operation failed because creating the service would form an affinity chain which is not supported. . MessageId = 0x1bd1 SymbolicName = SF_STATUS_SERVICE_TYPE_ALREADY_REGISTERED Facility = FacilitySF Severity = Error Language = English Service Type is already registered. . MessageId = 0x1bd2 SymbolicName = SF_STATUS_SERVICE_TYPE_NOT_REGISTERED Facility = FacilitySF Severity = Error Language = English Service Type is not registered. . MessageId = 0x1bd3 SymbolicName = SF_STATUS_VALUE_TOO_LARGE Facility = FacilitySF Severity = Error Language = English Invalid argument . MessageId = 0x1bd4 SymbolicName = SF_STATUS_VALUE_EMPTY Facility = FacilitySF Severity = Error Language = English The property value is empty. . MessageId = 0x1bd5 SymbolicName = SF_STATUS_PROPERTY_CHECK_FAILED Facility = FacilitySF Severity = Error Language = English The property check failed. . MessageId = 0x1bd6 SymbolicName = SF_STATUS_WRITE_CONFLICT Facility = FacilitySF Severity = Error Language = English Write conflict. . MessageId = 0x1bd7 SymbolicName = SF_STATUS_ENUMERATION_COMPLETED Facility = FacilitySF Severity = Error Language = English Enumeration has completed. . MessageId = 0x1bd8 SymbolicName = SF_STATUS_APPLICATION_TYPE_PROVISION_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English Cannot provision multiple versions of the same application type simultaneously. . MessageId = 0x1bd9 SymbolicName = SF_STATUS_APPLICATION_TYPE_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Application type and version already exists . MessageId = 0x1bda SymbolicName = SF_STATUS_APPLICATION_TYPE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Application type and version not found . MessageId = 0x1bdb SymbolicName = SF_STATUS_APPLICATION_TYPE_IN_USE Facility = FacilitySF Severity = Error Language = English Application type and version is still in use . MessageId = 0x1bdc SymbolicName = SF_STATUS_APPLICATION_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English APPLICATION_ALREADY_EXISTS . MessageId = 0x1bdd SymbolicName = SF_STATUS_APPLICATION_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Application not found . MessageId = 0x1bde SymbolicName = SF_STATUS_APPLICATION_UPGRADE_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English Application is currently being upgraded . MessageId = 0x1bdf SymbolicName = SF_STATUS_APPLICATION_UPGRADE_VALIDATION_ERROR Facility = FacilitySF Severity = Error Language = English Invalid application upgrade request . MessageId = 0x1be0 SymbolicName = SF_STATUS_SERVICE_TYPE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Service Type not found . MessageId = 0x1be1 SymbolicName = SF_STATUS_SERVICE_TYPE_MISMATCH Facility = FacilitySF Severity = Error Language = English Service Type mismatches description type (i.e. stateless/stateful/persisted) . MessageId = 0x1be2 SymbolicName = SF_STATUS_SERVICE_TYPE_TEMPLATE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Service Type template not found . MessageId = 0x1be3 SymbolicName = SF_STATUS_CONFIGURATION_SECTION_NOT_FOUND Facility = FacilitySF Severity = Error Language = English A configuration section is missing. . MessageId = 0x1be4 SymbolicName = SF_STATUS_CONFIGURATION_PARAMETER_NOT_FOUND Facility = FacilitySF Severity = Error Language = English A configuration parameter is missing. . MessageId = 0x1be5 SymbolicName = SF_STATUS_INVALID_CONFIGURATION Facility = FacilitySF Severity = Error Language = English A configuration parameter has been set to an invalid value. Please check the logs for details. . MessageId = 0x1be6 SymbolicName = SF_STATUS_IMAGEBUILDER_VALIDATION_ERROR Facility = FacilitySF Severity = Error Language = English There is a content validation error in the manifest file(s) . MessageId = 0x1be7 SymbolicName = SF_STATUS_PARTITION_NOT_FOUND Facility = FacilitySF Severity = Error Language = English The operation failed because the requested partition does not exist. . MessageId = 0x1be8 SymbolicName = SF_STATUS_REPLICA_DOES_NOT_EXIST Facility = FacilitySF Severity = Error Language = English The specified replica does not exist. . MessageId = 0x1be9 SymbolicName = SF_STATUS_SERVICE_GROUP_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Service group already exists. . MessageId = 0x1bea SymbolicName = SF_STATUS_SERVICE_GROUP_DOES_NOT_EXIST Facility = FacilitySF Severity = Error Language = English Service group does not exist. . MessageId = 0x1beb SymbolicName = SF_STATUS_PROCESS_DEACTIVATED Facility = FacilitySF Severity = Error Language = English The process has been deactivated. . MessageId = 0x1bec SymbolicName = SF_STATUS_PROCESS_ABORTED Facility = FacilitySF Severity = Error Language = English The process has aborted. . MessageId = 0x1ed SymbolicName = SF_STATUS_UPGRADE_FAILED Facility = FacilitySF Severity = Error Language = English Fabric upgrade failed on the node. . MessageId = 0x1bee SymbolicName = SF_STATUS_INVALID_CREDENTIAL_TYPE Facility = FacilitySF Severity = Error Language = English The security credential type specified is invalid. . MessageId = 0x1bef SymbolicName = SF_STATUS_INVALID_X509_FIND_TYPE Facility = FacilitySF Severity = Error Language = English The X509 find type specified is invalid. . MessageId = 0x1bf0 SymbolicName = SF_STATUS_INVALID_X509_STORE_LOCATION Facility = FacilitySF Severity = Error Language = English The X509 store location specified is invalid. . MessageId = 0x1bf1 SymbolicName = SF_STATUS_INVALID_X509_STORE_NAME Facility = FacilitySF Severity = Error Language = English The X509 store name specified is invalid. . MessageId = 0x1bf2 SymbolicName = SF_STATUS_INVALID_X509_THUMBPRINT Facility = FacilitySF Severity = Error Language = English The X509 thumbprint specified is invalid. . MessageId = 0x1bf3 SymbolicName = SF_STATUS_INVALID_PROTECTION_LEVEL Facility = FacilitySF Severity = Error Language = English The protection level specified is invalid. . MessageId = 0x1bf4 SymbolicName = SF_STATUS_INVALID_X509_STORE Facility = FacilitySF Severity = Error Language = English The X509 store specified is invalid. . MessageId = 0x1bf5 SymbolicName = SF_STATUS_INVALID_SUBJECT_NAME Facility = FacilitySF Severity = Error Language = English The X509 subject name specified is invalid. . MessageId = 0x1bf6 SymbolicName = SF_STATUS_INVALID_ALLOWED_COMMON_NAME_LIST Facility = FacilitySF Severity = Error Language = English The specified list of allowed common names is invalid. . MessageId = 0x1bf7 SymbolicName = SF_STATUS_INVALID_CREDENTIALS Facility = FacilitySF Severity = Error Language = English The specified credentials are invalid. . MessageId = 0x1bf8 SymbolicName = SF_STATUS_DECRYPTION_FAILED Facility = FacilitySF Severity = Error Language = English Failed to decrypt the fvalue. . MessageId = 0x1bf9 SymbolicName = SF_STATUS_CONFIGURATION_PACKAGE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English The config package was not found . MessageId = 0x1bfa SymbolicName = SF_STATUS_DATA_PACKAGE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English The data package was not found . MessageId = 0x1bfb SymbolicName = SF_STATUS_CODE_PACKAGE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English The code package was not found . MessageId = 0x1bfc SymbolicName = SF_STATUS_SERVICE_ENDPOINT_RESOURCE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English The Endpoint resource was not found . MessageId = 0x1bfd SymbolicName = SF_STATUS_INVALID_OPERATION Facility = FacilitySF Severity = Error Language = English The operation is invalid. . MessageId = 0x1bfe SymbolicName = SF_STATUS_OBJECT_CLOSED Facility = FacilitySF Severity = Error Language = English The object is closed. . MessageId = 0x1bff SymbolicName = SF_STATUS_TIMEOUT Facility = FacilitySF Severity = Error Language = English Operation timed out. . MessageId = 0x1c00 SymbolicName = SF_STATUS_FILE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English File not found. . MessageId = 0x1c01 SymbolicName = SF_STATUS_DIRECTORY_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Directory not found. . MessageId = 0x1c02 SymbolicName = SF_STATUS_INVALID_DIRECTORY Facility = FacilitySF Severity = Error Language = English Invalid Directory. . MessageId = 0x1c03 SymbolicName = SF_STATUS_PATH_TOO_LONG Facility = FacilitySF Severity = Error Language = English Path is too long. . MessageId = 0x1c04 SymbolicName = SF_STATUS_IMAGESTORE_IOERROR Facility = FacilitySF Severity = Error Language = English There was an IOException when using the Image Store. . MessageId = 0x1c05 SymbolicName = SF_STATUS_CORRUPTED_IMAGE_STORE_OBJECT_FOUND Facility = FacilitySF Severity = Error Language = English The Image Store object related to this operation appears corrupted. Please re-upload to the Image Store incoming folder before retrying the operation. . MessageId = 0x1c06 SymbolicName = SF_STATUS_APPLICATION_NOT_UPGRADING Facility = FacilitySF Severity = Error Language = English Application is currently NOT being upgraded . MessageId = 0x1c07 SymbolicName = SF_STATUS_APPLICATION_ALREADY_IN_TARGET_VERSION Facility = FacilitySF Severity = Error Language = English Application is already in the target version . MessageId = 0x1c08 SymbolicName = SF_STATUS_IMAGEBUILDER_UNEXPECTED_ERROR Facility = FacilitySF Severity = Error Language = English The Image Builder encountered an unexpected error. . MessageId = 0x1c09 SymbolicName = SF_STATUS_FABRIC_VERSION_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Fabric version has not been registered . MessageId = 0x1c0a SymbolicName = SF_STATUS_FABRIC_VERSION_IN_USE Facility = FacilitySF Severity = Error Language = English Fabric is currently in this version or being upgraded to this version . MessageId = 0x1c0b SymbolicName = SF_STATUS_FABRIC_VERSION_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Version has already been registered . MessageId = 0x1c0c SymbolicName = SF_STATUS_FABRIC_ALREADY_IN_TARGET_VERSION Facility = FacilitySF Severity = Error Language = English Fabric is already in this version . MessageId = 0x1c0d SymbolicName = SF_STATUS_FABRIC_NOT_UPGRADING Facility = FacilitySF Severity = Error Language = English There is no pending Fabric upgrade . MessageId = 0x1c0e SymbolicName = SF_STATUS_FABRIC_UPGRADE_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English Fabric is being upgraded . MessageId = 0x1c0f SymbolicName = SF_STATUS_FABRIC_UPGRADE_VALIDATION_ERROR Facility = FacilitySF Severity = Error Language = English Fabric upgrade request failed validation . MessageId = 0x1c10 SymbolicName = SF_STATUS_HEALTH_MAX_REPORTS_REACHED Facility = FacilitySF Severity = Error Language = English Max number of health reports reached, try again . MessageId = 0x1c11 SymbolicName = SF_STATUS_HEALTH_STALE_REPORT Facility = FacilitySF Severity = Error Language = English Health report is stale . MessageId = 0x1c12 SymbolicName = SF_STATUS_KEY_TOO_LARGE Facility = FacilitySF Severity = Error Language = English The key is too large. . MessageId = 0x1c13 SymbolicName = SF_STATUS_KEY_NOT_FOUND Facility = FacilitySF Severity = Error Language = English The given key was not present. . MessageId = 0x1c14 SymbolicName = SF_STATUS_SEQUENCE_NUMBER_CHECK_FAILED Facility = FacilitySF Severity = Error Language = English Sequence number check failed . MessageId = 0x1c15 SymbolicName = SF_STATUS_ENCRYPTION_FAILED Facility = FacilitySF Severity = Error Language = English Failed to encrypt the value. . MessageId = 0x1c16 SymbolicName = SF_STATUS_INVALID_ATOMIC_GROUP Facility = FacilitySF Severity = Error Language = English The specified atomic group has not been created or no longer exists. . MessageId = 0x1c17 SymbolicName = SF_STATUS_HEALTH_ENTITY_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Entity not found in Health Store . MessageId = 0x1c18 SymbolicName = SF_STATUS_SERVICE_MANIFEST_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Service Manifest not found . MessageId = 0x1c19 SymbolicName = SF_STATUS_RELIABLE_SESSION_TRANSPORT_STARTUP_FAILURE Facility = FacilitySF Severity = Error Language = English Reliable session transport startup failure . MessageId = 0x1c1a SymbolicName = SF_STATUS_RELIABLE_SESSION_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Reliable session already exists . MessageId = 0x1c1b SymbolicName = SF_STATUS_RELIABLE_SESSION_CANNOT_CONNECT Facility = FacilitySF Severity = Error Language = English Reliable session cannot connect . MessageId = 0x1c1c SymbolicName = SF_STATUS_RELIABLE_SESSION_MANAGER_EXISTS Facility = FacilitySF Severity = Error Language = English Reliable session manager exists . MessageId = 0x1c1d SymbolicName = SF_STATUS_RELIABLE_SESSION_REJECTED Facility = FacilitySF Severity = Error Language = English Reliable session rejected . MessageId = 0x1c1e SymbolicName = SF_STATUS_RELIABLE_SESSION_MANAGER_ALREADY_LISTENING Facility = FacilitySF Severity = Error Language = English Reliable session manager already listening . MessageId = 0x1c1f SymbolicName = SF_STATUS_RELIABLE_SESSION_MANAGER_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Reliable session manager not found . MessageId = 0x1c20 SymbolicName = SF_STATUS_RELIABLE_SESSION_MANAGER_NOT_LISTENING Facility = FacilitySF Severity = Error Language = English Reliable session manager not listening . MessageId = 0x1c21 SymbolicName = SF_STATUS_INVALID_SERVICE_TYPE Facility = FacilitySF Severity = Error Language = English Invalid Service Type . MessageId = 0x1c22 SymbolicName = SF_STATUS_IMAGEBUILDER_TIMEOUT Facility = FacilitySF Severity = Error Language = English Image Builder timed out. Please check that the Image Store is available and consider providing a larger timeout when processing large application packages. . MessageId = 0x1c23 SymbolicName = SF_STATUS_IMAGEBUILDER_ACCESS_DENIED Facility = FacilitySF Severity = Error Language = English Please check that the Image Store is available and has correct access permissions for Microsoft Azure Service Fabric processes. . MessageId = 0x1c24 SymbolicName = SF_STATUS_IMAGEBUILDER_INVALID_MSI_FILE Facility = FacilitySF Severity = Error Language = English The MSI file is invalid. . MessageId = 0x1c25 SymbolicName = SF_STATUS_SERVICE_TOO_BUSY Facility = FacilitySF Severity = Error Language = English The service cannot process the request because it is too busy. Please retry. . MessageId = 0x1c26 SymbolicName = SF_STATUS_TRANSACTION_NOT_ACTIVE Facility = FacilitySF Severity = Error Language = English Transaction has already committed or rolled back . MessageId = 0x1c27 SymbolicName = SF_STATUS_REPAIR_TASK_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English The repair task already exists. . MessageId = 0x1c28 SymbolicName = SF_STATUS_REPAIR_TASK_NOT_FOUND Facility = FacilitySF Severity = Error Language = English The repair task could not be found. . MessageId = 0x1c29 SymbolicName = SF_STATUS_RELIABLE_SESSION_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Reliable session not found . MessageId = 0x1c2a SymbolicName = SF_STATUS_RELIABLE_SESSION_QUEUE_EMPTY Facility = FacilitySF Severity = Error Language = English Reliable session queue empty . MessageId = 0x1c2b SymbolicName = SF_STATUS_RELIABLE_SESSION_QUOTA_EXCEEDED Facility = FacilitySF Severity = Error Language = English Reliable session quota exceeded . MessageId = 0x1c2c SymbolicName = SF_STATUS_RELIABLE_SESSION_SERVICE_FAULTED Facility = FacilitySF Severity = Error Language = English Reliable session service faulted . MessageId = 0x1c2d SymbolicName = SF_STATUS_RELIABLE_SESSION_INVALID_TARGET_PARTITION Facility = FacilitySF Severity = Error Language = English Reliable session invalid target partition provided . MessageId = 0x1c2e SymbolicName = SF_STATUS_TRANSACTION_TOO_LARGE Facility = FacilitySF Severity = Error Language = English Transaction data exceeds the configured replication message size limit - ReplicatorSettings.MaxReplicationMessageSize . MessageId = 0x1c2f SymbolicName = SF_STATUS_REPLICATION_OPERATION_TOO_LARGE Facility = FacilitySF Severity = Error Language = English The replication operation is larger than the configured limit - MaxReplicationMessageSize . MessageId = 0x1c30 SymbolicName = SF_STATUS_INSTANCE_ID_MISMATCH Facility = FacilitySF Severity = Error Language = English The provided InstanceId did not match. . MessageId = 0x1c31 SymbolicName = SF_STATUS_UPGRADE_DOMAIN_ALREADY_COMPLETED Facility = FacilitySF Severity = Error Language = English Specified upgrade domain has already completed. . MessageId = 0x1c32 SymbolicName = SF_STATUS_NODE_HAS_NOT_STOPPED_YET Facility = FacilitySF Severity = Error Language = English Node has not stopped yet - a previous StopNode is still pending . MessageId = 0x1c33 SymbolicName = SF_STATUS_INSUFFICIENT_CLUSTER_CAPACITY Facility = FacilitySF Severity = Error Language = English The cluster did not have enough resources to perform the requested operation. . MessageId = 0x1c34 SymbolicName = SF_STATUS_INVALID_PACKAGE_SHARING_POLICY Facility = FacilitySF Severity = Error Language = English PackageSharingPolicy must contain a valid PackageName or Scope . MessageId = 0x1c35 SymbolicName = SF_STATUS_PREDEPLOYMENT_NOT_ALLOWED Facility = FacilitySF Severity = Error Language = English Service Manifest packages could not be deployed to node because Image Cache is disabled . MessageId = 0x1c36 SymbolicName = SF_STATUS_INVALID_BACKUP_SETTING Facility = FacilitySF Severity = Error Language = English Invalid backup setting. E.g. incremental backup option is not set upfront . MessageId = 0x1c37 SymbolicName = SF_STATUS_MISSING_FULL_BACKUP Facility = FacilitySF Severity = Error Language = English Incremental backups can only be done after an initial full backup . MessageId = 0x1c38 SymbolicName = SF_STATUS_BACKUP_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English A previously initiated backup is currently in progress . MessageId = 0x1c39 SymbolicName = SF_STATUS_DUPLICATE_SERVICE_NOTIFICATION_FILTER_NAME Facility = FacilitySF Severity = Error Language = English Service notification filter has already been registered at the specified name. . MessageId = 0x1c3a SymbolicName = SF_STATUS_INVALID_REPLICA_OPERATION Facility = FacilitySF Severity = Error Language = English Restart can only be performed on persisted services. For volatile or stateless services use Remove. . MessageId = 0x1c3b SymbolicName = SF_STATUS_INVALID_REPLICA_STATE Facility = FacilitySF Severity = Error Language = English This operation cannot be performed in the current replica state. . MessageId = 0x1c3c SymbolicName = SF_STATUS_LOADBALANCER_NOT_READY Facility = FacilitySF Severity = Error Language = English Load Balancer is currently busy. . MessageId = 0x1c3d SymbolicName = SF_STATUS_INVALID_PARTITION_OPERATION Facility = FacilitySF Severity = Error Language = English MovePrimary or MoveSecondary operation can be only be performed on stateful Service Type. . MessageId = 0x1c3e SymbolicName = SF_STATUS_PRIMARY_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Replica is already primary role. . MessageId = 0x1c3f SymbolicName = SF_STATUS_SECONDARY_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Replica is already secondary role. . MessageId = 0x1c40 SymbolicName = SF_STATUS_BACKUP_DIRECTORY_NOT_EMPTY Facility = FacilitySF Severity = Error Language = English The backup directory is not empty . MessageId = 0x1c41 SymbolicName = SF_STATUS_FORCE_NOT_SUPPORTED_FOR_REPLICA_OPERATION Facility = FacilitySF Severity = Error Language = English Replicas hosted in Fabric.exe or in processes not managed by Microsoft Azure Service Fabric cannot be force removed. . MessageId = 0x1c42 SymbolicName = SF_STATUS_ACQUIRE_FILE_LOCK_FAILED Facility = FacilitySF Severity = Error Language = English There was an error acquiring lock on the file. This indicates that another process has acquired write lock on the file or the process does not have access to the file location. . MessageId = 0x1c43 SymbolicName = SF_STATUS_CONNECTION_DENIED Facility = FacilitySF Severity = Error Language = English Not authorized to connect . MessageId = 0x1c44 SymbolicName = SF_STATUS_SERVER_AUTHENTICATION_FAILED Facility = FacilitySF Severity = Error Language = English Failed to authenticate server identity . MessageId = 0x1c45 SymbolicName = SF_STATUS_CONSTRAINT_KEY_UNDEFINED Facility = FacilitySF Severity = Error Language = English One or more placement constraints on the service are undefined on all nodes that are currently up. . MessageId = 0x1c46 SymbolicName = SF_STATUS_MULTITHREADED_TRANSACTIONS_NOT_ALLOWED Facility = FacilitySF Severity = Error Language = English Multithreaded usage of transactions is not allowed. . MessageId = 0x1c47 SymbolicName = SF_STATUS_INVALID_X509_NAME_LIST Facility = FacilitySF Severity = Error Language = English . MessageId = 0x1c48 SymbolicName = SF_STATUS_VERBOSE_FM_PLACEMENT_HEALTH_REPORTING_REQUIRED Facility = FacilitySF Severity = Error Language = English . MessageId = 0x1c49 SymbolicName = SF_STATUS_GATEWAY_NOT_REACHABLE Facility = FacilitySF Severity = Error Language = English A communication error caused the operation to fail. . MessageId = 0x1c4a SymbolicName = SF_STATUS_USER_ROLE_CLIENT_CERTIFICATE_NOT_CONFIGURED Facility = FacilitySF Severity = Error Language = English Certificate for UserRole FabricClient is not configured. . MessageId = 0x1c4b SymbolicName = SF_STATUS_TRANSACTION_ABORTED Facility = FacilitySF Severity = Error Language = English Transaction cannot be used after encountering an error. Retries must occur on a new transaction. . MessageId = 0x1c4c SymbolicName = SF_STATUS_CANNOT_CONNECT Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates there was a connection failure. . MessageId = 0x1c4d SymbolicName = SF_STATUS_MESSAGE_TOO_LARGE Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates the message is too large. . MessageId = 0x1c4e SymbolicName = SF_STATUS_CONSTRAINT_NOT_SATISFIED Facility = FacilitySF Severity = Error Language = English The service's and cluster's configuration settings would result in a constraint-violating state if the operation were executed. . MessageId = 0x1c4f SymbolicName = SF_STATUS_ENDPOINT_NOT_FOUND Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates the specified endpoint was not found. . MessageId = 0x1c50 SymbolicName = SF_STATUS_APPLICATION_UPDATE_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates the application is currently being updated. . MessageId = 0x1c51 SymbolicName = SF_STATUS_DELETE_BACKUP_FILE_FAILED Facility = FacilitySF Severity = Error Language = English Deletion of backup files/directory failed. Currently this can happen in a scenario where backup is used mainly to truncate logs. . MessageId = 0x1c52 SymbolicName = SF_STATUS_CONNECTION_CLOSED_BY_REMOTE_END Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates the connection was closed by the remote end. . MessageId = 0x1c53 SymbolicName = SF_STATUS_INVALID_TEST_COMMAND_STATE Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates that this API call is not valid for the current state of the test command. . MessageId = 0x1c54 SymbolicName = SF_STATUS_TEST_COMMAND_OPERATION_ID_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates that this test command operation id (Guid) is already being used. . MessageId = 0x1c55 SymbolicName = SF_STATUS_CM_OPERATION_FAILED Facility = FacilitySF Severity = Error Language = English Creation or deletion terminated due to persistent failures after bounded retry. . MessageId = 0x1c56 SymbolicName = SF_STATUS_IMAGEBUILDER_RESERVED_DIRECTORY_ERROR Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates the path passed by the user starts with a reserved directory. . MessageId = 0x1c57 SymbolicName = SF_STATUS_CERTIFICATE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates the certificate is not found. . MessageId = 0x1c58 SymbolicName = SF_STATUS_CHAOS_ALREADY_RUNNING Facility = FacilitySF Severity = Error Language = English A FabricErrorCode that indicates that an instance of Chaos is already running. . MessageId = 0x1c59 SymbolicName = SF_STATUS_FABRIC_DATA_ROOT_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Fabric Data Root is not defined on the target machine. . MessageId = 0x1c5a SymbolicName = SF_STATUS_INVALID_RESTORE_DATA Facility = FacilitySF Severity = Error Language = English Indicates that restore metadata present in supplied restore directory in invalid. . MessageId = 0x1c5b SymbolicName = SF_STATUS_DUPLICATE_BACKUPS Facility = FacilitySF Severity = Error Language = English Indicates that backup-chain in specified restore directory contains duplicate backups. . MessageId = 0x1c5c SymbolicName = SF_STATUS_INVALID_BACKUP_CHAIN Facility = FacilitySF Severity = Error Language = English Indicates that backup-chain in specified restore directory has one or more missing backups. . MessageId = 0x1c5d SymbolicName = SF_STATUS_STOP_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English An operation is already in progress. . MessageId = 0x1c5e SymbolicName = SF_STATUS_ALREADY_STOPPED Facility = FacilitySF Severity = Error Language = English The node is already in a stopped state. . MessageId = 0x1c5f SymbolicName = SF_STATUS_NODE_IS_DOWN Facility = FacilitySF Severity = Error Language = English The node is down (not stopped). . MessageId = 0x1c60 SymbolicName = SF_STATUS_NODE_TRANSITION_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English Node transition in progress. . MessageId = 0x1c61 SymbolicName = SF_STATUS_INVALID_BACKUP Facility = FacilitySF Severity = Error Language = English Indicates that backup provided for restore is invalid. . MessageId = 0x1c62 SymbolicName = SF_STATUS_INVALID_INSTANCE_ID Facility = FacilitySF Severity = Error Language = English The provided instance id is invalid. . MessageId = 0x1c63 SymbolicName = SF_STATUS_INVALID_DURATION Facility = FacilitySF Severity = Error Language = English The provided duration is invalid. . MessageId = 0x1c64 SymbolicName = SF_STATUS_RESTORE_SAFE_CHECK_FAILED Facility = FacilitySF Severity = Error Language = English Indicates that backup provided for restore has older data than present in service. . MessageId = 0x1c65 SymbolicName = SF_STATUS_CONFIG_UPGRADE_FAILED Facility = FacilitySF Severity = Error Language = English Indicates that the config upgrade fails. . MessageId = 0x1c66 SymbolicName = SF_STATUS_UPLOAD_SESSION_RANGE_NOT_SATISFIABLE Facility = FacilitySF Severity = Error Language = English Indicates that the upload session range will overlap or are out of range. . MessageId = 0x1c67 SymbolicName = SF_STATUS_UPLOAD_SESSION_ID_CONFLICT Facility = FacilitySF Severity = Error Language = English Indicates that the upload session ID is existed for a different image store relative path. . MessageId = 0x1c68 SymbolicName = SF_STATUS_INVALID_PARTITION_SELECTOR Facility = FacilitySF Severity = Error Language = English Indicates that the partition selector is invalid. . MessageId = 0x1c69 SymbolicName = SF_STATUS_INVALID_REPLICA_SELECTOR Facility = FacilitySF Severity = Error Language = English Indicates that the replica selector is invalid. . MessageId = 0x1c6a SymbolicName = SF_STATUS_DNS_SERVICE_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Indicates that DnsService is not enabled on the cluster. . MessageId = 0x1c6b SymbolicName = SF_STATUS_INVALID_DNS_NAME Facility = FacilitySF Severity = Error Language = English Indicates that service DNS name is invalid. . MessageId = 0x1c6c SymbolicName = SF_STATUS_DNS_NAME_IN_USE Facility = FacilitySF Severity = Error Language = English Indicates that service DNS name is in use by another service. . MessageId = 0x1c6d SymbolicName = SF_STATUS_COMPOSE_DEPLOYMENT_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Indicates the compose application already exists. . MessageId = 0x1c6e SymbolicName = SF_STATUS_COMPOSE_DEPLOYMENT_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Indicates the compose application is not found. . MessageId = 0x1c6f SymbolicName = SF_STATUS_INVALID_FOR_STATEFUL_SERVICES Facility = FacilitySF Severity = Error Language = English Indicates the operation is only valid for stateless services. . MessageId = 0x1c70 SymbolicName = SF_STATUS_INVALID_FOR_STATELESS_SERVICES Facility = FacilitySF Severity = Error Language = English Indicates the operation is only valid for stateful services. . MessageId = 0x1c71 SymbolicName = SF_STATUS_ONLY_VALID_FOR_STATEFUL_PERSISTENT_SERVICES Facility = FacilitySF Severity = Error Language = English Indicates the operation is only valid for stateful persistent services. . MessageId = 0x1c72 SymbolicName = SF_STATUS_INVALID_UPLOAD_SESSION_ID Facility = FacilitySF Severity = Error Language = English Indicates the upload session ID is invalid. Please use GUID as upload session ID. . MessageId = 0x1c73 SymbolicName = SF_STATUS_BACKUP_NOT_ENABLED Facility = FacilitySF Severity = Error Language = English Indicates that the backup protection is not enabled. . MessageId = 0x1c74 SymbolicName = SF_STATUS_BACKUP_IS_ENABLED Facility = FacilitySF Severity = Error Language = English Indicates that the backup protection is enabled. . MessageId = 0x1c75 SymbolicName = SF_STATUS_BACKUP_POLICY_DOES_NOT_EXIST Facility = FacilitySF Severity = Error Language = English Indicates the Backup Policy does not exist. . MessageId = 0x1c76 SymbolicName = SF_STATUS_BACKUP_POLICY_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Indicates the Backup Policy is already exists. . MessageId = 0x1c77 SymbolicName = SF_STATUS_RESTORE_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English Indicates that a partition is already has a restore in progress. . MessageId = 0x1c78 SymbolicName = SF_STATUS_RESTORE_SOURCE_TARGET_PARTITION_MISMATCH Facility = FacilitySF Severity = Error Language = English Indicates that the source from where restore is requested has a properties mismatch with target partition. . MessageId = 0x1c79 SymbolicName = SF_STATUS_FAULT_ANALYSIS_SERVICE_NOT_ENABLED Facility = FacilitySF Severity = Error Language = English Indicates the Restore cannot be triggered as Fault Analysis Service is not running. . MessageId = 0x1c7a SymbolicName = SF_STATUS_CONTAINER_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Indicates the container is not found. . MessageId = 0x1c7b SymbolicName = SF_STATUS_OBJECT_DISPOSED Facility = FacilitySF Severity = Error Language = English The operation is performed on a disposed object. . MessageId = 0x1c7c SymbolicName = SF_STATUS_NOT_READABLE Facility = FacilitySF Severity = Error Language = English Indicates the partition is not readable. . MessageId = 0x1c7d SymbolicName = SF_STATUS_BACKUPCOPIER_UNEXPECTED_ERROR Facility = FacilitySF Severity = Error Language = English Indicates that the backup copier failed due to unexpected error during its operation. . MessageId = 0x1c7e SymbolicName = SF_STATUS_BACKUPCOPIER_TIMEOUT Facility = FacilitySF Severity = Error Language = English Indicates that the backup copier failed due to timeout during its operation. . MessageId = 0x1c7f SymbolicName = SF_STATUS_BACKUPCOPIER_ACCESS_DENIED Facility = FacilitySF Severity = Error Language = English Indicates that the backup copier was denied required access to complete operation. . MessageId = 0x1c80 SymbolicName = SF_STATUS_INVALID_SERVICE_SCALING_POLICY Facility = FacilitySF Severity = Error Language = English Indicates that the scaling policy specified for the service is invalid . MessageId = 0x1c81 SymbolicName = SF_STATUS_SINGLE_INSTANCE_APPLICATION_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Indicates that the single instance application already exists. . MessageId = 0x1c82 SymbolicName = SF_STATUS_SINGLE_INSTANCE_APPLICATION_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Indicates that the single instance application is not found. . MessageId = 0x1c83 SymbolicName = SF_STATUS_VOLUME_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English Volume already exists. . MessageId = 0x1c84 SymbolicName = SF_STATUS_VOLUME_NOT_FOUND Facility = FacilitySF Severity = Error Language = English Indicates that the specified volume is not found. . MessageId = 0x1c85 SymbolicName = SF_STATUS_DATABASE_MIGRATION_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English Indicates that the service is undergoing database migration and unavailable for writes . MessageId = 0x1c86 SymbolicName = SF_STATUS_CENTRAL_SECRET_SERVICE_GENERIC Facility = FacilitySF Severity = Error Language = English Central Secret Service generic error. . MessageId = 0x1c87 SymbolicName = SF_STATUS_SECRET_INVALID Facility = FacilitySF Severity = Error Language = English Invalid secret error. . MessageId = 0x1c88 SymbolicName = SF_STATUS_SECRET_VERSION_ALREADY_EXISTS Facility = FacilitySF Severity = Error Language = English The secret version already exists. . MessageId = 0x1c89 SymbolicName = SF_STATUS_SINGLE_INSTANCE_APPLICATION_UPGRADE_IN_PROGRESS Facility = FacilitySF Severity = Error Language = English Single instance application is currently being upgraded . MessageId = 0x1c8a SymbolicName = SF_STATUS_COMPOSE_DEPLOYMENT_NOT_UPGRADING Facility = FacilitySF Severity = Error Language = English Indicates the compose application is not upgrading. . MessageId = 0x1c8b SymbolicName = SF_STATUS_SECRET_TYPE_CANNOT_BE_CHANGED Facility = FacilitySF Severity = Error Language = English The type of an existing secret cannot be changed. .
What to watch for in Minnesota's legislative races this year Republicans enter next week's midterm election with advantages in Minnesota's legislative chambers. But historical patterns — and a Star Tribune analysis — suggest defending those majorities may prove difficult, particularly in the Minnesota House of Representatives. Control of the Legislature tends to blow with the up-ballot winds, due in large part to a couple dozen swing seats in greater Minnesota and the Twin Cities suburbs. During presidential election years, the winner's party routinely has captured majorities in the Minnesota Legislature — only to lose them during midterm election years, due in part to voter backlash. Control of the Minnesota House routinely changes hands The party of the incumbent president often loses seats during midterm election years. This gives hope to Democrats, as November's midterm could be positioned to follow past trends. The DFL only needs to flip 11 seats from GOP control to retake the House. An unusual but critical special election in the Minnesota Senate will also determine control of that chamber, which has been split evenly between parties since earlier this year. Republican Jeff Howe and DFL candidate Joe Perske are facing off in that St. Cloud-area race, which is in a district that historically has leaned Republican. The Star Tribune has analyzed these races and isolated which legislative contests to watch most closely on Election Night. Races to watch In a chamber representing 134 districts, 68 are needed to hold a majority. Currently Republicans have 77 seats, compared to 57 for the DFL. Polling is rare in Minnesota's legislative contests, but looking at each district's partisan voting trends and the last presidential election's results can suggest how competitive these races might be. At least 19 races are in possibly vulnerable districts Several competitive legislative seats are in districts that voted for the opposite party's presidential candidate in 2016. Sorting districts by their Cook Partisan Voting Index and presidential vote margins shows those in politically polarized areas may be poised to flip. ⇦ More Democratic | More Republican ⇨ open seatrematch A Star Tribune analysis shows seven DFL-held seats in districts won by Donald Trump in 2016, versus 12 GOP-held seats in districts won by Hillary Clinton. A handful of others had close margins for both presidential and legislative races. Many of the 24 open seats without incumbents or the 17 rematches from two years ago may also be worth watching. These rankings use President Trump's vote margins from 2016, along with the Cook Partisan Voting Index (CPVI), which rates each district's political lean based on averages from the past two presidential contests. Watching the rural and suburban votes Geography also matters in these races, especially since Minnesota's urban/rural political divide became even more pronounced after 2016. Districts in Minnesota's Iron Range and Southern Minnesota voted overwhelmingly for Donald Trump in 2016. Inversely, many suburban districts that often vote Republican were won by Hillary Clinton by significant margins. Several seats in the Iron Range, along with a number in the Twin Cities suburbs, are in districts that voted for the opposing party's presidential candidate in 2016, and are also mostly located in hotly-contested Congressional districts. Of course, statewide elections could also have an effect, particularly depending upon whether each party's candidate for governor and the U.S. Senate can shore up a geographically diverse enough coalition to win. And just as control of the U.S. House of Representatives is closely tied to presidential approval ratings, similar trends have been found in Minnesota's legislative races.
6:45 PM: Nobody likes 'cutesie' Harv... 6:30 PM: Here's some crucial information ahead of tonight's game against the Kings... Jersey: Heritage Black Television: TSN5, RDS Radio: TSN 1200, Unique FM 94,5 Referees: Kevin Pollock, Steve Kozar Linesmen: Derek Nansen, Pierre Racicot 4:30 PM: It's another Throwback Thursday game tonight as well which means the Sens will be sporting their heritage jerseys (dress accordingly) and you can grab $1 hot dog or $1 small pop before 7 P.M. (limit 2 per person) 4:00 PM: And from NHL.com here are tonight's projected lineups for the Sens and Kings... SENATORS Colin Greening - Kyle Turris – Erik Condra Mike Hoffman – Mika Zibanejad- Bobby Ryan Mark Stone – Curtis Lazar – Alex Chiasson David Legwand - Zack Smith – Chris Neil Chris Phillips - Erik Karlsson Jared Cowen - Cody Ceci Mark Borowiecki - Eric Gryba Craig Anderson Robin Lehner Scratched: Patrick Wiercioch Injured: Clarke MacArthur (sick), Milan Michalek (upper body), Marc Methot (back/hip) KINGS Marian Gaborik – Anze Kopitar – Justin Williams Tanner Pearson – Jeff Carter – Tyler Toffoli Dustin Brown – Jarret Stoll – Trevor Lewis Kyle Clifford – Mike Richards – Dwight King Jake Muzzin – Drew Doughty Robyn Regehr – Alec Martinez Brayden McNabb – Matt Greene Jonathan Quick Martin Jones Scratched: Jamie McBain, Jordan Nolan, Slava Voynov Injured: None 3:30 PM: Get the full rundown on tonight's game with the Pre-Game Report courtesy of Sens TV and Gord Wilson. 1:30 PM: Senators centre Mika Zibanejad caught up with Sens TV after today's morning skate. Take a look... 1:15 PM: Senators head coach Dave Cameron passed along his updates after today's morning skate. Here's what he had to say... On if he's anxious before his first game as head coach: Yes. Anxious. Emotional. Excited. We had more meetings in the past few days than the United Nations. So I'm excited to cut back on that. On his road to becoming an NHL head coach: When you get into this it's no different than a player starting in the minor leagues. You aspire to get into the National Hockey League. There's only 30 of these jobs available and a lot of good coaches out there that aren't in the National Hockey League and never make it to the National Hockey League so you have to get some things lined up and much like winning a championship: some things need to fall in place. It's been awhile but I never put a time frame on it. What he remembers about his last game as a head coach: I lost it. On the response he's looking for from his team tonight: Effort. Work ethic. You can't win in the best league in the world if you don't have a work ethic. Throw the systems out the window, throw the x's and o's out the window, throw everything out the window if you don't have effort. On Clarke MacArthur's absence from the morning skate: Clarke left yesterday sick and he wasn't able to skate this morning. He's going to come in but he's going to be a game-time decision. I can't imagine him going from sick to not skating this morning to playing tonight so I'll say game-time decision. On Methot's injury: He's day-to-day. Full practice yesterday. I came today figuring he got through practice yesterday but he's banged up a little bit so not be able to go tonight. 12:00 PM: We caught up with Senators forward Mike Hoffman ahead of tonight's game with the Kings. Here's what he had to say... On building chemistry with Zibanejad and Ryan: Since the first game we got to play together, we were getting some opportunities but it just seemed like we weren't able to put the puck in the back of the net. We'd talk to each other after the game about the chances being there and about being patient. It's about getting used to playing with each other and then the opportunities will come down the road. It's been going well and obviously I enjoy playing with those two guys. On playing the defending Stanley Cup Champions: It's something you can use to help elavate your game. A lot of those guys have gone all the way and won a championship in this league so they know what it takes to win. It'll be a good test for us tonight. On Dave Cameron's first game as head coach: Anytime a team has a new head coach the players are always going to try and make the best impression of themselves and show the coaches what they can do. Even though Dave was an assistant coach here since the start of the season and has watched us play, now he's the head coach and he's the one that will be making the calls. I think everyone here wants to go out and do the best we can in his debut. 10:30 AM: The Sens are on the ice for their morning skate... Team huddle before #Sens morning skate gets going here at Canadian Tire Centre. A photo posted by Ottawa Senators (@nhlsenators) on Dec 12, 2014 at 7:29am PST 9:45 AM: The Sens Gameday Journal is officialy back as the Ottawa Senators welcome the defending Stanley Cup Champions to Canadian Tire Centre tonight in what will be their first of two meetings with the Los Angeles Kings this season. Puck drop is set for 7:30 p.m. New bench boss Dave Cameron is set to make his debut as head coach after replacing Paul MacLean earlier this week. Cameron has been an assistant with the Senators since 2011. The Sens are coming off a huge 4-3 overtime comeback win versus the Vancouver Canucks this past Sunday. Mika Zibanejad set career-highs in goals (2) and points (4) in that game to help Ottawa battle back from a 3-0 deficit early in the second period. The Sens also registered a season-high 45 shots on goals in the victory. Los Angeles comes to Ottawa after a 1-0 road loss to the Buffalo Sabres this past Tuesday. Sabres goaltender Jhonas Enroth turned aside 34 shots to outduel the King's Jonathan Quick and earn his first shutout of the season. The Kings currently sit 9th in the Western Conference with a record of 14-9-5 (5-4-1 in their last 10 games). The Sens will have their morning skate at 10:15 so we'll have plenty of updates regarding lineup changes, players' thoughts, Sens TV videos, Instagram goodness and more. Stay tuned!
Monthly Archives: January, 2013 Source: Orthodox Church in America SYOSSET, NY [OCA] In line with the Orthodox Church in America’s Strategic Plan, as embraced by delegates to the 16th All-American Council in 2011, a small group of volunteers has been working on the Youth Department’s approach to social media. The group, led by Priest Christopher Rowe, has produced a short video spot now available for viewing. Filming and editing services were offered by Matthew Andrews of Holy Assumption Church, Philedelphia, PA, with the assistance of Justin Nescott of Saint Alexander Nevsky Cathedral, Allison Park, PA; Priest John Vitko of Saint Luke Church, McLean, VA;… Source: Fordham University By Joanna Klimaski In the United States, less than 1 percent of people identify as Orthodox Christians—however, with an estimated population in excess of 260 million worldwide, Orthodox Christianity represents the second largest Christian tradition in the world. Now, a grant secured by two Fordham scholars will help bridge the gap between the U.S. population and this important segment of Christians living in some of the most significant global hot-spots. The Orthodox Christian Studies Center at Fordham University has received a prestigious challenge grant from the National Endowment for the Humanities (NEH), an independent federal agency and… Source: The Daily Star By Wassim Mroueh BEIRUT: Following a surprise meeting chaired by Maronite Patriarch Cardinal Beshara Rai Friday, rival Christian leaders called for adopting an electoral law that provides fair representation for all sects, in an apparent retreat from agreeing to the controversial Orthodox electoral proposal. “It was agreed and stressed that it is necessary to adopt an electoral law that provides the best and fairest representation for all Lebanese sects,” said a brief statement issued after the meeting. Free Patriotic Movement leader Michel Aoun; Amin Gemayel, the head of the Kataeb Party; and Marada Movement leader Suleiman… Source: Sofia News Agency The Sofia Bishopric has labeled the Friday refusal of the Diocesan Council of prelates and vicars to sign the list of representatives from the Sofia Diocese to elect a new patriarch a “sabotage.” The list was prepared by interim Patriarch and Sofia Metropolitan Kiril. The Bishopric admits that there have been disagreements in the process of preparing the list, but their escalation, they say, was a clear sign that the story aims at sabotaging the election. The statement, issued Saturday, further stresses that such act is unacceptable in the light of clerical discipline and canonical spirit.… Source: Providence Journal By Richard C. Dujardin PROVIDENCE, R.I. — Rhode Island’s Orthodox Christian clergy are urging the rejection of any proposals that would redefine marriage as anything other than as a union between a man and woman. In a statement signed by 18 of its member priests and issued Friday, the Rhode Island Orthodox Clergy Fellowship said, “We must remember that God Himself is the author of marriage and that the well being of the individual person and human society at large is closely bound up with the health state of family as it has been understood since the… Source: Catholic World News Mehmet Ali Agca, who shot and wounded Pope John Paul II in May 1981, met this week with the Orthodox Patriarch Bartholomew I of Constantinople. The January 7 conversation took place at Agca’s request. Agca reportedly told the Ecumenical Patriarch that he had spent many hours reading the Bible while in prison. After his conviction in an Italian court for the attempted murder of the Pontiff, Agca spent 19 years in prison in Rome before he was released in 2000, as part of a general amnesty declared by Italian authorities at the prompting of Pope John… Source: The National Herald Theodore Kalmoukos BOSTON, MA – His Beatitude Archbishop Chrysostomos of Cyprus told TNH that he blamed the current Cypriot government of Demetris Christofias for the economic crisis as well as the political dead ends. “I believe that the government didn’t do its duty. It let things to roll over on their own.” Chrysostomos added that “I can tell you that the government worked negatively and that is why we have come to this point. At any rate now, it’s leaving in two months and we are going to have a new government.” The prelate revealed that… Source: The National Herald TNH staff HAVANA, CUBA – More than 80 Archons and Greek Orthodox faithful journeyed to Havana, Cuba for a 6-day pilgrimage to visit Saint Nicholas Greek Orthodox Cathedral from December 5 to 10. The pilgrimage was sponsored by the Order of St Andrew and led by its spiritual advisor, Father Alexander Karloutsos, Protopresbyter of the Ecumenical Patriarchate. The trip culminated in a celebration of the Feast of Saint Nicholas and took place under the auspices of His Eminence Metropolitan Athenagoras. The trip was remarkable in the context of modern Cuba. “On the first night, the pilgrims… Source: The National Herald CONSTANTINOPLE (From the website of Today’s Zaman) – Following a meeting held on Friday, the Council of Foundations — part of Turkey’s Directorate General for Foundations (VGM) — returned 190 hectares of forest to the Greek Orthodox Halki (Heybeliada) Seminary in Istanbul. According to the decision, 190 hectares of woodlands near the Halki Seminary will be given to the seminary’s owner, the Aya Triada Monastery Foundation. This is the biggest property return to a minority group in the history of Turkey. Established in 1844 on the island of Heybeliada, Halki Seminary was closed in 1971 under… Source: Orthodox Church in America NEW YORK, NY [OCA] His Beatitude, Metropolitan Tikhon, was among numerous guests who attended a reception at the Consulate General of the Russian Federation here on Wednesday, January 9, 2013, marking the celebration of the Nativity of Our Lord on the Julian Calendar. The reception was hosted by the Honorable Igor L. Golubovskiy, Consul General, and His Eminence, Archbishop Justinian of Naro-Fominsk, Administrator of the Patriarchal Parishes in the USA, who warmly welcomed Metropolitan Tikhon, who was accompanied by Archpriest Eric G. Tosi, OCA Secretary; Archpriest Leonid Kishkovsky, Director of External Affairs and Interchurch Relations;… WE NEED YOUR HELP! Upcoming Events In preparation for the 2018 celebration of the 100th anniversary of Ukrainian Orthodoxy in the United States, the UHEC presents an exhibition documenting the lives of the Church’s prime hierarchs, the historical and cultural contexts The Museum is pleased to announce its next exhibition–Rushnyky: Sacred Ukrainian Textiles. Opening February 15, 2018, the exhibition celebrates and explores Ukrainian culture through one of its most ancient and valued traditions. A rushnyk is Who: Florida Servants and their families (educational child programming will be provided). No walk-ins will be accepted; you must register before the final deadline if you wish to attend Topic: I Never Knew You Guest Emory University is pleased to host the Medieval Academy of America for the first time since 1984. The entire conference will be held and housed at the Emory Conference Center, a Frank Lloyd Wright-inspired building
TEXAS COURT OF APPEALS, THIRD DISTRICT, AT AUSTIN NO. 03-02-00585-CR Henry James Weatherman, Appellant v. The State of Texas, Appellee FROM THE DISTRICT COURT OF BELL COUNTY, 264TH JUDICIAL DISTRICT NO. 49,307, HONORABLE MARTHA J. TRUDO, JUDGE PRESIDING M E M O R A N D U M O P I N I O N Appellant Henry James Weatherman was placed on deferred adjudication community supervision after he pleaded guilty to possessing between four and two hundred grams of cocaine. Tex. Health & Safety Code Ann. § 481.115 (West Supp. 2003). He later pleaded true to the allegations in the State's motion to adjudicate, after which the court revoked supervision, adjudicated him guilty, and sentenced him to twelve years in prison. Appellant's court-appointed attorney filed a brief concluding that the appeal is frivolous and without merit. The brief meets the requirements of Anders v. California, 386 U.S. 738 (1967), by presenting a professional evaluation of the record demonstrating why there are no arguable grounds to be advanced. See also Penson v. Ohio, 488 U.S. 75 (1988); High v. State, 573 S.W.2d 807 (Tex. Crim. App. 1978); Currie v. State, 516 S.W.2d 684 (Tex. Crim. App. 1974); Jackson v. State, 485 S.W.2d 553 (Tex. Crim. App. 1972); Gainous v. State, 436 S.W.2d 137 (Tex. Crim. App. 1969). A copy of counsel's brief was delivered to appellant, and appellant was advised of his right to examine the appellate record and to file a pro se brief. No pro se brief has been filed. We have reviewed the record and counsel's brief and agree that the appeal is frivolous and without merit. We find nothing in the record that might arguably support the appeal. Counsel's motion to withdraw is granted. The judgment of conviction is affirmed. Jan P. Patterson, Justice Before Justices Kidd, Yeakel and Patterson Affirmed Filed: March 20, 2003 Do Not Publish
England In a post on Brexit I had asked the following rhetorical question: “Can much of the spirit of either Burke or Cobbett be found anywhere in practical politics today?” As far as the spirit of Cobbett goes, the question remains rhetorical. But Theresa May’s new Conservative Manifesto has more of the spirit of Burke than one would expect from a successor of Margaret Thatcher. For instance: Continue reading → The Preamble to the Treaty of Lisbon, recognizes the influence of “religion” on its “values,” but it sees these values— including solidarity between peoples— as universal and secular. Thus it states: DRAWING INSPIRATION from the cultural, religious and humanist inheritance of Europe, from which have developed the universal values of the inviolable and inalienable rights of the human person, freedom, democracy, equality and the rule of law […] DESIRING to deepen the solidarity between their peoples while respecting their history, their culture and their traditions […] Now that Brexit has become Brexibat, and the supposed ‘direction’ of European history has been called into doubt, Pope St. Pius X (if he were still alive today) might be forgiven for saying “I told you so.” In his Apostolic Letter Notre Charge Apostolique, St. Pius X rejected the idea that “universal solidarity” or “fraternity” could be established on any firm basis apart from the Catholic Faith. Fraternity founded on “the love of common interest or, beyond all philosophies and religions, on the mere notion of humanity” is soon swept away by “the passions and wild desires of the heart.” No, he writes, “there is no genuine fraternity outside Christian charity.” Indeed, even if it could succeed a fraternity merely based on enlightened self-interest and a common recognition of humanity would not even be desirable: By separating fraternity from Christian charity thus understood, Democracy, far from being a progress, would mean a disastrous step backwards for civilization. If, as We desire with all Our heart, the highest possible peak of well being for society and its members is to be attained through fraternity or, as it is also called, universal solidarity, all minds must be united in the knowledge of Truth, all wills united in morality, and all hearts in the love of God and His Son Jesus Christ. But this union is attainable only by Catholic charity, and that is why Catholic charity alone can lead the people in the march of progress towards the ideal civilization. This thesis of Pope St. Pius X’s is actually a common place of Catholic Social Teaching. Russell Hittinger has even argued (with only slight exaggeration) that of the three ideals of the French Revolution— liberty, equality, and fraternity — the Roman Pontiffs have been especially troubled by fraternity. Quite recently, in Caritas in Veritate, Pope Benedict XVI echoed his predecessors on this point: Will it ever be possible to obtain this brotherhood by human effort alone? As society becomes ever more globalized, it makes us neighbours but does not make us brothers. Reason, by itself, is capable of grasping the equality between men and of giving stability to their civic coexistence, but it cannot establish fraternity. This originates in a transcendent vocation from God the Father, who loved us first, teaching us through the Son what fraternal charity is. (¶ 19) Catholic Social Teaching has long noted that three ideals of the French Revolution are secularized Christian ideals. Pope St. John Paul II was re-iterating and old thesis in his controversial (and often misunderstood) homily at Le Bourget in 1980. Unfortunately, however, parts of the le Bourget homily, and other recent magisterial teachings, seem to be endorsing a secularized universal fraternity. As the Lake Garda Statementputs it: Today, however, the Church’s leaders present her role as merely that of proposing a “contribution” to a vast and quite hopeless neo-Pelagian project in which the United Nations or some other “world political authority” would serve as the juridical framework for a solidaristic world order in which “believers,” regardless of religion, and unbelievers would be co-equal participants. And this despite the fact that St. Pius X’s words do seem to have been born in the 19th and 20th centuries. The universal brotherhood declared by the French revolutionaries had little weight against “the passions and wild desires of the heart.” The intellectual grasp of common humanity was drowned in the powerful pseudo-religions of nationalism, and ever more internecine wars tore Europe apart, culminating in the previously unimaginable carnage of World Wars I and II. But after World War II it seemed that a new beginning was possible. The Schuman Declaration recognized that a merely abstract rational solidarity was not enough, and proposed taking concrete steps to fuse the interests of European nations together, hoping that out of the ‘de-facto solidarity’ of national self-interest well understood, a deeper solidarity would develop. Schuman himself, like many of the founding fathers of the EU, was devout Catholic. As Alan Fimister shows in his brilliant study of Schuman and Catholic Social Teaching, Schuman was hoping that the EU would become a new Christendom, inspired by a Faith, which at the time seemed to be reviving. But that is not what happened. As Fimister puts it in a recent article: “Schuman well understood […] that the European project of Christian Democracy, if it became anti-Christian, ‘would be a caricature which would sink into either tyranny or anarchy.’” As Adrian Pabst has eloquently put it, the actual development of the EU has seen a fusion of “Anglo-Saxon free-market economics with continental bureaucratic statism.” That is, the “common interest” of EU has pursued by means of a violent and anti-traditional economic mechanism, and it’s rational “notion of humanity” has been given form (to quote Pabst again) in “Kantian morality of context-less duties, Weberian statecraft void of virtue, and Bismarckian quasi-military management of citizens through centralised welfare,” yielding a uninion that is “abstract, administrative and alien vis-a-vis its citizens.” And yet, Pabst was arguing against Brexit, and many of his colleagues in Radical Orthodoxy have done the same. In his reaction to Brexibat, John Milbank writes: Christians are duty bound for theological and historical reasons to support the ever closer union of Europe (which does not imply a superstate) and to deny the value of absolute sovereignty or the lone nation-state. Tragically, the Reformation, Roundhead, nonconformist, puritan, whig, capitalist, liberal version of Britishness last night triumphed over our deep ancient character which is Catholic or Anglican, Cavalier, Jacobite, High Tory or Socialist. The spirit of both Burke and Cobbett has been denied by the small-minded, bitter, puritanical, greedy and Unitarian element in our modern legacy. Is this true? Can much of the spirit of either Burke or Cobbet be found anywhere in practical politics today? There certainly seems to be very little of either spirit on either side of the Brexit debate. Would that Leave and Remain could have both lost! One prominent Burkean, however, has made an argument virtually opposite to Milbank’s: Sir Roger Scruton. Scruton argues that the EU is really anti-European, and that by leaving the European Union the United Kingdom will have a chance at saving the best parts of the European heritage. But as for me, I think that Edmund Burke himself was right when, over two hundred years ago, he declared the glory of Europe was gone forever: But the age of chivalry is gone. That of sophisters, economists; and calculators has succeeded; and the glory of Europe is extinguished forever. Never, never more shall we behold that generous loyalty to rank and sex, that proud submission, that dignified obedience, that subordination of the heart which kept alive, even in servitude itself, the spirit of an exalted freedom. My essay is on the portrayal of the soul in the novel. I argue that the novel developed as a literary form particularly suited to the modern view of the subject as an isolated res cogitans separate from the res extensa and also from other res cogitantes, except to the extent that it enters into voluntary relationships with other subjects. Following Ian Watt, I argue that this explains not only the form of the novel, but also to a large extent the main theme of English novels since Samuel Richardson: love between a man and a woman usually terminating in marriage. As I put it in my essay, Capitalism having destroyed the interpersonal ties of more organic societies and replaced them with cold contractualism, freely chosen relationships took on a great importance: especially the relationship of husband and wife, which, disengaged from other areas of life, becomes a matter of personal choice. (p. 204) Now it occured to me recently that since marriage here is important mostly for its subjective purpose of overcoming the isolation of the individual, rather than for its role in a larger society, it makes sense that while proposals of marriage play a prominent role in novels, actual weddings are surprisingly rare. Moreover, on the rare occasions when a wedding is actually described, it is often described as being a small, private affair, rather than a great feast for a whole community. Take for example David Copperfield’s wedding to Agnes. If anyone might be expected to ignore the novelistic convention of small weddings, one would think it would be Dickens, who has so much concern with “social” problems and so on, and is by no means so devoted to the classical novelistic purpose of giving a window into the depths of the res cogitans as more formally perfect novelists. Moreover, David Copperfield is by the time of his wedding to Agnes a national celebrity, who might be expected to have a very wide social circle. (Even in our lamentable time celebrities like to have big weddings; witness Francesco Totti’s wedding at Santa Maria in Aracoeli, which was televised so that the whole of Italy could be, as it were, present). And yet this is how Dickens describes David and Agnes’s wedding: Traddles and Sophy, and Doctor and Mrs. Strong, were the only guests at our quiet wedding. A notable exception to the rule, however, is (spoiler alert:) Mary and Frank’s wedding in Trollope’s Dr Thorne. It is a truly magnificent affair in which not only all the friends and relations of the Thornes and Greshams are present, but also all the dignitaries of Barsetshire, and (significantly) all the common people dependent on the Greshams. The reason for this, it seems to me, is that Dr Thorne is really about the conjunction of two different worlds, and of two different views of marriage. The Greshams are an old aristocratic family whose position in the community is threatened by new economic realities of 19th century England. The only practicable way for Frank to save his position, and thus the whole way of life of his family, and to a certain extent of the whole community, is to marry someone rich. But of course he falls in love with Mary Thorne, who is very poor. The interesting thing about the novel is the way in which both Frank and Mary are torn about their prospective marriage— both acknowledge the importance of personal choice and love (so central to the bourgeois ideal of marriage that is the main theme of novels), and yet both also see the importance of saving Frank’s position, and the suffering that their marriage would consequently bring on the whole community. There are two apparently incommensurable moral ideals in conflict here. This conflict is only resolved by the fortuitous circumstance of Mary’s inheriting the fortune of a railway magnate. Thus bringing a strange synthesis in which the wealth of the new world of railways and industry is used to prop up the old world way of life of the landed gentry. This works quite well in the novel, but it was not a solution that admitted to a general application to the problems of English society. In the civil wars, the Egremonts pricked by their Norman blood, were cavaliers and fought pretty well. But in 1688, alarmed at the prevalent impression that King James intended to insist on the restitution of the church estates to their original purposes, to wit, the education of the people and the maintenance of the poor, the Lord of Marney Abbey became a warm adherent of “civil and religious liberty,”—the cause for which Hampden had died in the field, and Russell on the scaffold,—and joined the other whig lords, and great lay impropriators, in calling over the Prince of Orange and a Dutch army, to vindicate those popular principles which, somehow or other, the people would never support. (Benjamin Disraeli, Sybil) In a reply to Owen White’s comment on my last post I claimed that English Toryism worthy of the name suffered its final defeat in 1846 with the triumph of the free trade movement and the abolition of the Corn Laws. To explain what I meant I want to consider the account of the anti-conservative nature of capitalism in The Communist Manifesto. Marx and Engels point out that bourgeois capitalism has dissolved the feudal ties that used to tie men to their ‘natural superiors,’ and that it has stripped human relations down to ‘egotistical calculation,’ and reduced human values to ‘exchange value.’ But they think that this was in a way necessary (one might almost say good) because it has enabled the rise of a revolutionary class who know that they are being oppressed: «for exploitation, veiled by religious and political illusions, it has substituted naked, shameless, direct, brutal exploitation.» (p. 16) But what if the religious and political institutions that founded pre-capitalist society in Western Europe were not illusions? What would become of their argument then? If one thinks that earthly societies ought to reflect the hierarchical order of the cosmos, then one might indeed think that ‘feudal’ society may have been more defensible then Marx and Engels thought, and that the rise of bourgeois capitalism was not a necessary unveiling of exploitation at all, but just an unmitigated disaster. Continue reading → Schadenfreude is not the most noble of human emotions, but it can certainly be very sweet. I must confess that to me the most enjoyable thing about the recent Tory election victory in the UK is the impotent rage and naked despair in the left-wing English newspapers. I don’t much like what passes for Tory politics in England nowadays, and I don’t actually think this Tory victory will make much difference, but the progressives’ despair is really amusing. For a moment the worshipers at the idol of progress doubt their god, and shout in rage at the meaningless nothingness left over after his absence. Continue reading → Hilaire Belloc calls the dons that taught him at Oxford «The horizon of my memories— / Like large and comfortable trees.» I can apply that expression to the friends of my parents whom I knew as a small child. Since we moved often when I was growing up, there are many who form the horizon of my childhood memories whom I have seen only rarely since. There is something wonderful about meeting those people now (or even just reading their writings), and being able to know them in quite a different way than I did as a child. Continue reading → I suppose I am the last person on earth to discover this brilliant poem. It reminds me of my own visit to Greece in 2003, but of course (like all Betjeman poems) it is really about England. Greek Orthodox by John Betjeman To the Reverend T. P. Symonds What did I see when first I went to Greece?Shades of the Sixth across the Peloponnese. Though clear the clean-cut Doric temple shoneStill droned the voice of Mr Gidney on; “That hoti? Can we take its meaning hereWholly as interrogative?” Edward Lear, Show me the Greece of wrinkled olive boughsAbove red earth; thin goats, instead of cows, Each with its bell; the shallow terraced soil;The stone-built wayside shrine; the yellow oil; The tiled and cross-shaped church, who knows how oldIts ashlar walls of honey-coloured gold? Three centuries or ten? Of course, there’ll beThe long meander off to find the key. The domed interior swallows up the day. Here, where to light a candle is to pray,The candle flame shows up the almond eyes Of local saints who view with no surpriseTheir martyrdoms depicted upon walls On which the filtered daylight faintly falls.The flame shows up the cracked paint– sea-green blue And red and gold, with grained wood showing through–Of much-kissed ikons, dating from, perhaps, The fourteenth century. There across the apse,Ikon- and oleograph-adorned, is seenThe semblance of an English chancel screen. “With oleographs?” you say. “Oh, what a pity! Surely the diocese has some committeeAdvising it on taste?” It is not so. Thus vigorously does the old tree grow,By persecution pruned, watered with blood, Its living roots deep in pre-Christian mud,It needs no bureaucratical protection. It is its own perpetual resurrection.Or take the galleon metaphor– it rides Serenely over controversial tidesTriumphant to the Port of Heaven, its home, With one sail missing– that’s the Pope’s in Rome. Vicar, I hope it will not be a shockTo find this village has no ‘eight o’clock’. Those bells you heard at eight were being rungFor matins of a sort but matins sung. Soon will another set of bells beginAnd all the villagers come crowding in. The painted boats rock empty by the quayFeet crunch on gravel, faintly beats the sea. From the domed church, as from the sky, look downThe Pantocrator’s searching eyes of brown, With one serene all-comprehending stareOn farmer, fisherman and millionaire. To attack the French Revolution as a Catholic might seem a bit too easy. But then Hillaire Belloc was famously a great defender of the Revolution, and even Aelianus of Laodicea seems to agree with him up to a point. The French Revolution, it would seem, is a bit complicated. Continue reading → I think that the carnival is an irrational institution, and that St Philip Neri was entirely right to try to abolish it. The irrationality is mostly limited to February, but in German-speaking parts it “officially” begins on the 11th of November. This is because of the confusion of the “little” pre-Advent carnival with the “big” pre-Lent carnival to form one giant “carnival Season”. Various rationalizations have been attempted for the carnival. What interests me about them is that they fall into basically two types, which correspond to the two accounts of the nature of jokes that I referred to in my last post as the Prussian and the Austrian view. Continue reading →
Corner Three Walt Frazier, right, shown here in a 1970 playoff game against John Havlicek of the Boston Celtics. Associated Press You ask; I answer. Every week in this space, I’ll field three questions posed via email at marcstein-newsletter@nytimes.com. (Please include your first and last name, as well as the city you’re writing in from, and make sure the subject line reads “Corner Three.”) Q: Please compare and contrast Stephen Curry’s individual style of play to Walt Frazier’s and the ball movement of the current Warriors and the old Knicks. — Bob Purcell (San Diego) STEIN: You must know that I’m a sucker for any question that gives me a chance to talk about or explore the 1970s. So I couldn’t resist your topic, even though I must also concede that I really didn’t start following the N.B.A. until 1975-ish and thus can’t claim firsthand knowledge of the Knicks’ glory days. Fortunately for you and anyone else interested, I was able to consult a true expert on both those Knicks and these Warriors. Jim Barnett has been Golden State’s color analyst on television for the past 34 seasons and played in the N.B.A. from 1966-1977 — including a season and change with the Knicks as Frazier’s teammate in 1975-76. Here’s Jim take: “Comparisons from different generations are always tough, especially since the 3-point line has drastically changed the game. But Frazier was bigger and stronger. And a much, much better defender. Frazier could shoot with a man in his face; he didn’t need as much space to shoot as Curry does. He had great court awareness and vision and didn’t make a lot of mistakes. He was much more deliberate player. “Steph has more flair to his game and is a much better shooter — particularly from distance. Had there been a 3-point line in Frazier’s era, I don’t think he could have taken advantage of it. I believe he would have struggled from that distance; Frazier’s comfort zone was the midrange. Steph is more acrobatic on drives, whereas Frazier used his strength to finish inside. Frazier also didn’t have a left-handed finish like Steph does. Curry is a more clever passer but also more daring, which makes him more turnover-prone. “On defense, both have quick hands for steals, but, again, Frazier’s strength gave him an advantage. He used to steal the ball off the dribble by reaching in and cleverly moving your forearm away while getting his hand on the ball. He was so good at it that the referees could not detect a foul. He kind of slid his arm inside yours and prevented you from getting to the ball. “The bottom line is that both are great generational players. Frazier was more consistent and steady. Curry is more electric and prone to more explosive scoring runs.” As for the ball movement part of the question, Barnett adds: “The ball often stops with the Warriors for more one-on-one play. But there are similarities. The Knicks’ ball movement was magical in 1970 in their championship year. Bill Bradley was constantly moving to get open; he was slow afoot but had a deadly release. With both teams you see stars sacrificing for the good of the team. The Warriors, like those Knicks, are at their best when ball and player movement are in sync — four or five passes without a dribble sometimes.” Q: How do the front offices of rebuilding teams usually approach their coaching searches? Do they try to focus on hiring the coach they think will lead the franchise back into the playoffs? Or are they viewing the first two, three years of a rebuild as transitional and recognize that the next coach is probably not going to last long enough to see the team being a contender again? More specifically for the Cavaliers, they seem to be interviewing all the up-and-coming N.B.A. assistants. Do these candidates usually favor getting their own head coaching gig over remaining a top assistant on a playoff team? What does the league value when assessing coaching talent? — Alexandre Raffalli STEIN: I understand why you’re looking for a common thread, in trying to predict what your team will do, but it would be hard to pinpoint what the “league” is looking for because no two franchises are alike. The Cavaliers have actually made it pretty clear that they are looking for a young head coach who will embrace analytics and try to replicate the heavy-on-development atmosphere that has birthed such good results in Brooklyn with Kenny Atkinson and in Atlanta with Lloyd Pierce. Phoenix, by contrast, isn’t much closer to contention than the Cavaliers are, but the Suns targeted the more established Monty Williams in hopes that he can give them a strong voice and presence. The Suns see Williams as the key to establishing a new culture and reputation for a franchise that hasn’t been able to get out of the lottery for nearly a decade. More teams are going the Cleveland route than taking the Phoenix approach. But there is no universal template. Q: When does it become public? Did reporters know before today that Foster was going to do a game? — @jasonpuckett20 from Twitter STEIN: This question was a response to my tweet last week which explained that the league chooses its referee teams for the first four games for every playoff series before the series starts. The pairings for each game are not publicly announced until game day. So, no, reporters did not know Scott Foster would officiate Game 2 of the Golden State/Houston series until that morning. But the N.B.A.’s referee union (@OfficialNBARefs on Twitter) confirmed the league’s policy here on the timing of referee assignments. Perhaps they should announce the assignments for Game 1 through Game 4 in every series before the series even starts to achieve full transparency. But I don’t dispute that this is the procedure if the union describes it as such.
Q: Numpy: Find the value needed in one equation which minimizes the error the title is not clear, i hope to explain better here: i have the two following arrays, ep and sp with the same dimension: ep = [0.00000000e+00, 4.29973987e-05, 1.77977219e-04, 3.08940223e-04, 4.44883670e-04, 5.84806153e-04, 7.28705999e-04, 8.77580573e-04, 1.03342551e-03, 1.19623754e-03, 1.36301748e-03, 1.53675860e-03, 1.72145026e-03. 1.91608833e-03] sp = [336.17311024, 366.02001118, 427.4927458, 471.53403676, 503.53359236, 527.23879184, 544.98822976, 558.34153011, 568.29913137, 575.9109472, 581.00400657, 584.97104685, 587.14272582, 587.92832846] I need to obtain an array sw as per the following formula: sw = (np.amax(sp)/(ei**(ei+c))) * ((ep+ei)**(ei+c)) where c is the max value of ep array and ei has to be the value that minimize the sum of the following other equation (after the iteration for each value of sp and sw): f = (sp - sw)**2 Any idea? Thanks! A: How about something like this? You have already described your error function so can use scipy.optimize.minimize to minimize it: from scipy.optimize import minimize import numpy as np from matplotlib import pyplot as plt ep = np.array([0.0000000e+00, 4.29973987e-05, 1.77977219e-04, 3.08940223e-04, 4.44883670e-04, 5.84806153e-04, 7.28705999e-04, 8.77580573e-04, 1.03342551e-03, 1.19623754e-03, 1.36301748e-03, 1.53675860e-03, 1.72145026e-03, 1.91608833e-03]) sp = np.array([336.17311024, 366.02001118, 427.4927458, 471.53403676, 503.53359236, 527.23879184, 544.98822976, 558.34153011, 568.29913137, 575.9109472, 581.00400657, 584.97104685, 587.14272582, 587.92832846]) def err(ei, c): sw = (sp/ei**(ei+c))*((ep+ei)**(ei+c)) return np.sum((sp-sw)**2) # do minimization c = max(ep) guess = [1.2] res = minimize(err, guess, args=(c,), method='Nelder-Mead') # get miniization result ei, = res.x # plot results fig, ax = plt.subplots(ncols=2) ax[0].plot(sp) ax[0].plot((sp/ei**(ei+c))*((ep+ei)**(ei+c))) ax[0].set_title('Function evaluation') ax[1].plot((sp/ei**(ei+c))*((ep+ei)**(ei+c)) - sp, label='Minimized') ei, = guess ax[1].plot((sp/ei**(ei+c))*((ep+ei)**(ei+c)) - sp, label='Initial Guess') ax[1].set_title('Difference') ax[1].legend()
THE K-VEST IT'S ROLE IN CREATING CHANGE IN YOUR GOLF SWING Cause & Effect It is very easy to see effects or faults in our swing. Long lasting change won't occur until we find the cause of the effects and fix the causes. What is normally happening in swing changes is we are just changing compensation and these might work short term if we are lucky. For long lasting change we have to find the root causes and fix them. The problem with making compensation is it will either cause inconsistencies or injury or both. The essence of a reliable swing that creates consistent ball flight is balance throughout the swing from set up to finish position. There are only three sources that affect our ability to make a balanced swinging motion. What the player believes is the way to swing; What the player's body will allow him/her to do; What the player's clubs will allow him/her to do. Unless all three sources are addressed, then you will never find the cause of your swing faults. The K-Vest will help you see and feel the faults and compensations that you have in your swing. It's recommended to achieve the best results for your investment of time and money in having tuition with the K-Vest that you explore all the possible causes with your coach. Discuss your beliefs of what you think you have to do to make a balanced swing and what you currently work on. You can see that technique is called beliefs because they are not necessarily the truth. Our physical abilities and disabilities will determine what our body can and cannot achieve. It would be unrealistic to expect to have a good posture for your golf swing if your posture is bad the rest of the day. Remember it is never too late to change and an improvement in posture will help our day to day life as well as our golf swing. Our equipment. At least 50% of miss hits could be blamed on having the wrong fitting golf clubs. In most cases changing your clubs to the correct fitting is the easiest and quickest way to create change in your swing and your balance. It is recommended that everyone having invested time and money in a K-Vest lesson must have a fitting. The K-Vest will very quickly show you if the length and lie of your clubs is correct and can also help with finding the correct loft and shaft flex that you need to make a balanced swing. Remember that learning should be fun and with the K-Vest it will be at least 30 times faster.
IBC Headliners IBC Headliners is the defunct news update of the sequestered television station in the Philippines, Intercontinental Broadcasting Corporation through IBC News and Public Affairs. This is aired Monday to Friday at the end of some programs. The news updates are no longer aired due to unknown reasons after the launching of News Team 13. Final Anchors Jake Morales Jinky Baticados Jess Caduco Former Anchors Roan Sumayao Kaye Langit-Luistro Ida Marie Bernasconi Karen Tayao-Cabrera E.R. Ejercito Maricel Halili Alvin Sejera Atty. Aline Brosoto Adrian Ayalin Toff Rada Thea Gavino Abby Gonzales Bernadette Sembrano Julius Segovia Grace Choa Manuel Llige Neil Santos III Tintin Pizarro See also List of programs aired by Intercontinental Broadcasting Corporation IBC News and Public Affairs Category:Philippine television news programs Category:1994 Philippine television series debuts Category:2011 Philippine television series endings Category:IBC News and Public Affairs Category:Intercontinental Broadcasting Corporation Category:Intercontinental Broadcasting Corporation shows Category:Filipino-language television programs Category:English-language television programs
Q: How to prevent uTorrent from autolaunching at startup? When I start my Mac each time I am faced with uTorrent opening automatically. I went to Share Preferences -> User -> LoginApp to check if this app is chosen, but no... So how to remove this app from autolaunch? A: If you use the web app version - see this answer - https://apple.stackexchange.com/a/394352/5472 Those still using the app, this guide will solve the problem: Stop uTorrent from Opening at Startup with Mac OSX - wikihow Instructions The steps from the link are: Open uTorrent Click on uTorrent beside the "apple" and click Preferences Click on General Uncheck the box. Under Program Startup there are two options. Uncheck the second one that says Start uTorrent when Mac starts up This stops the uTorrent app launch the next startup. A: If you are working on uTorrent web, @davka's method doesn't work. Please follow below steps in case of uTorrent web. Start uTorrent web Open URL http://127.0.0.1:19575/gui/index.html (or) uTorrent home page Go to the settings icon Setting pop up will open Under "System" header, uncheck the option "Start μTorrent Web when computer starts" Done!!
‘PUBG’ arrives on mobile in the US The math and the money of level 90 boosts For $60, level 90 boosts definitely seem pricey -- costing more than the expansion itself -- but DisRuptive1 on Reddit has taken the time to break down the math on that $60. To do so, he's taken careful measure of the time it's taken him to get a new character to level 90, plus grinding up professions. And though your leveling speed may be better -- or worse -- than his, if you count up the hours of playtime it takes, you can see how a boosted 90 might be worth the pricetag... at least if you really want another alt. The short of it is that boosting from level 1 to level 90 will save you about 84 hours of playtime, while boosting from 60 to 90 and getting max-level professions will save you about 70 hours of playtime. If we take to the goblin philosophy that time is money, than that many hours certainly add up to a chunk of change -- though we'll leave you to do the math on what your own time is worth. So if you've spent enough time with leveling content that none of it is terribly new to you, then maybe spending $60 instead of spending 70 hours time isn't such a bad idea.
:man_page: mongoc_uri_get_tls mongoc_uri_get_tls() ==================== Synopsis -------- .. code-block:: c bool mongoc_uri_get_tls (const mongoc_uri_t *uri); Parameters ---------- * ``uri``: A :symbol:`mongoc_uri_t`. Description ----------- Fetches a boolean indicating if TLS was specified for use in the URI. Returns ------- Returns a boolean, true indicating that TLS should be used. This returns true if *any* :ref:`TLS option <tls_options>` is specified.
Introductions {#Sec1} ============= Low-level laser therapy (LLLT), recently termed photobiomodulation, involves using a specific range of wavelengths and low power density; it has been widely used for suppressing inflammation, healing wounds, and treating neurological diseases, acute or chronic pain, and degenerative arthritis \[[@CR1], [@CR2]\]. Laser beams could also be applied at acupoints as form of acupuncture, termed low-level laser acupuncture (LLLA) \[[@CR3]\], with benefits of noninvasive, nonpainful, nonthermal, and noninfectious characteristics \[[@CR4]\]. However, no study has assessed the use of LLLA for acute, strong pain. Surgery is a necessary evil. Poor surgical pain control increases perioperative morbidity and induces chronic postoperative pain \[[@CR5]\]. A multimodal analgesic strategy is strongly suggested to reduce opioid-induced side effects \[[@CR6], [@CR7]\], and acupuncture or electroacupuncture (EA) has been selected to improve the quality \[[@CR8]\]. Some LLLA studies have assessed its application for postoperative pain \[[@CR3], [@CR9]\], but these studies were mostly limited to dental, orofacial, and small incision surgeries. Furthermore, whether LLLA exerts equal analgesic effects as LLLT and EA remains unclear. In this study, we hypothesized that LLLA reduces postsurgical nociception in a rat plantar incision (PI) model \[[@CR10]\]. We surveyed incision-induced molecular profiles in the spinal cord to clarify the possible molecular mechanisms to rationalize its clinical use. Methods {#Sec2} ======= Animals {#Sec3} ------- Male Sprague--Dawley rats (230--250 g; BioLASCO, Taipei, Taiwan) were housed in groups of three per cage at a constant 22 ± 2 °C and relative humidity of 40--60% (*v*/*v*); food and water were supplied ad libitum, and a 12-h light/dark cycle was maintained. All experiments were on the basis of the experimental animal "3R principle," replacement, reduction, and refinement, to minimize number of the animals and performed after approval from the Institutional Animal Care and Utilization Committee, China Medical University, Taichung, Taiwan, in strict accordance with the guidelines for experimental animals \[[@CR11]\]. LLLA and EA {#Sec4} ----------- An animal laser stimulation device (Jubilant Sunrise Co., Taiwan), which contains a GaAlAs light-emitting diode laser with four output channels providing two channels of red laser light (wavelength, 650 nm; output density, 1.5 and 3.0 J/cm^2^) and two channels of near-infrared laser light (wavelength, 830 nm; output density, 1.5 J/cm^2^), was used. Laser light was emitted in the pulsed wave mode (15 Hz), with a spot size of 0.03 cm^2^. The rats were placed in a transparent cylinder holder and were anesthetized with 1% isoflurane gas, as previously described \[[@CR12]\]. Both hind limbs were exposed outside the cylinder, and the right hind limb was shaved to expose the skin for irradiation. The laser device was tightly fixed to minimize small movements, and the laser probe was perpendicularly applied at the acupoint (ST36, Zusanli) on the right hind limb. Three types of LLLA beams were applied: red LLLA (RED-LA) for 30 min or 15 min and near-infrared LLLA (NIR-LA) for 15 min. LLLA was conducted immediately after PI (day 0) and repeated for 3 successive days (days 1--3; Fig. [1](#Fig1){ref-type="fig"}a).Fig. 1PI-induced bilateral mechanical allodynia and ipsilateral heat hyperalgesia**. a** Diagram of the experiment protocol used in the study. **b**--**e** Nociceptive responses of the naive, PI, and RED-30-LA (i.e., normal rats who received 30-min of RED-LA) groups. **b** and **c** show mechanical withdrawal thresholds in the ipsilateral and contralateral hind paws, respectively, and **d** and **e** illustrate heat withdrawal thresholds in the ipsilateral and contralateral paws, respectively. Abbreviations and symbols: *BL*, baseline data; *D* or *Day*, post-PI day; *D1-1*, post-PI day 1, post-LA 1 h; *EA*, electroacupuncture; *hr*, post-LA hour; *LA*, laser acupuncture; *PI*, plantar incision. Upward arrows mean behavioral measure. \**p* \< 0.05, \*\**p* \< 0.01 for groups vs. naive group; \#*p* \< 0.05, \#\#*p* \< 0.01 for groups vs. PI group through one-way ANOVA with Tukey's post hoc test. No difference was found between the naive and RED-30-LA groups. *N* = 5 (naive), *N* = 6 (PI), and *N* = 5 (RED-30-LA) EA manipulation was conducted using our lab protocol \[[@CR12]\]. After stable anesthesia with isoflurane, EA was delivered through a pair of stainless steel needles (36G) inserted at the right ST36. A constant current with square-wave pulses with a 0.5-ms pulse width and 4-Hz frequency was generated by a Grass S88 stimulator and constant current units (Grass, West Warwick, RI, USA). The final stimulation intensity was usually 4--5 mA (about 10 times the muscle twitch intensity) was applied for 30 min. PI models {#Sec5} --------- At the right hind paw, a 1-cm longitudinal incision up to the plantaris muscle was made and then sutured. The wound was examined daily, and any sign of wound infection excluded the rat from the study. To measure the mechanical and thermal thresholds, we performed the up--down method using von Frey fibers (Stoelting, Wood Dale, IL, USA) and the Hargreaves' test using a glass platform constantly maintained at 30 °C (Plantar Test Apparatus, IITC, CA, USA), as described in our previous study \[[@CR13]\]. The experimenter performing the aforementioned two behavioral tests was blinded to the group allocation. Western blotting {#Sec6} ---------------- The rats were euthanized at 3 h and 3 days after PI. The right-dorsal quarter of the L4--L5 spinal cord segment was harvested and frozen in liquid nitrogen. Tissues were homogenized in RIPA buffer (10 μL/mg tissue) containing the appropriate *protease* and phosphatase inhibitors (Sigma-Aldrich, Inc., St. Louis, MO, USA). Equivalent samples (20 μg) were separated on 6--10% SDS--PAGE gel and were electrophoretically transferred to PVDF membranes. After being blocked, the blotting membranes were incubated overnight at 4 °C with polyclonal antibodies against ERK, p-EKR, p38, p-p38 (all 1:1000; Cell Signaling Technology, Danvers, MA, USA), TNF (1:1000; R&D Systems, Inc., MN, USA), iNOS (1:200; Santa Cruz, CA, USA), or GAPDH (1:5000; Novus Biologicals, CO, USA). The blots were then incubated with a HRP-conjugated secondary antibody (Amersham, 1:5000), developed in an enhanced chemiluminescence solution (Millipore, Merck KGaA, Darmstadt, Germany), and exposed onto hyperfilms (Amersham). Specific bands were evaluated with respect to the apparent molecular size and positive control. Statistical analysis {#Sec7} -------------------- All results are expressed as the mean ± standard error of the mean (SEM). Data from behavioral tests were analyzed using two-way analysis of variance (ANOVA). The mean values of western blot analysis were analyzed using one-way ANOVA. Tukey's post hoc test was employed following ANOVA. Calculations were completed using PASW software for Windows (version 18.0; SPSS Inc., Chicago, IL, USA). *P* values of \< 0.05 were considered statistically significant. Results {#Sec8} ======= PI stimulated mechanical hypersensitivity in both hind paws and heat hypersensitivity only in the ipsilateral hind paw {#Sec9} ---------------------------------------------------------------------------------------------------------------------- Consistent with our previous studies \[[@CR14]\], PI drastically decreased mechanical thresholds from (preoperative) 20--23 g to \< 3 g and thermal withdrawal thresholds from 10--12 s to approximately 2 s in the incised hind paw at 1 h (Fig. [1](#Fig1){ref-type="fig"}b−e). All rats recovered to a freely moving status within 2 min after the termination of anesthesia, indicating minimized anesthetic influence. Tactile allodynia and heat hyperalgesia in the right hind paw persisted until day 3 after PI. On the contralateral side, tactile thresholds were mildly lowered, indicating mirror-image pain, but heat withdrawal thresholds did not change. Because our data showed that post-PI pain returned to the baseline on day 5 after PI \[[@CR13]\], pain behaviors beyond day 3 were not measured. Notably, the findings of the 30-min RED-LA group did not differ from those of the naive group, indicating that daily irradiation with RED-LA for 30 min did not alter the basal mechanical or heat thresholds. Both RED-LA and NIR-LA reduced PI-induced tactile allodynia {#Sec10} ----------------------------------------------------------- RED-LA (650 nm) and NIR-LA (830 nm), LLLA treatments with different wavelengths but the same power density, were applied daily for 15 min to evaluate the impact of wavelength differences. Both treatments attenuated PI-induced mechanical allodynia in the ipsilateral paw from day 1 (i.e., after two cycles of irradiation) but had no effect on heat hyperalgesia (Fig. [2](#Fig2){ref-type="fig"}a, c). No differences were observed between the RED-LA and NIR-LA groups; both had analgesia for at least 3 h, but the effectiveness was mild (unpublished lab data). Mirror-image tactile allodynia was reversed by 15-min RED-LA but not by 15-min NIR-LA (Fig. [2](#Fig2){ref-type="fig"}b).Fig. 2LLLA attenuated PI-induced mechanical allodynia, but not heat hyperalgesia. Comparison of the effects of different wavelengths of LLLA on PI-induced nociceptive hypersensitivity. Red (RED-15) and near-infrared LLLA (NIR-15), which were applied daily for 15 min for 4 days from day 0 after PI, were tested. **a**, **b** Mechanical thresholds. **c**, **d** Heat thresholds. \**p* \< 0.05, \*\**p* \< 0.01 for RED-15 group vs. PI group, \#*p* \< 0.05, \#\#*p* \< 0.01 for NIR-15 group vs. RED-15 group, +*p* \< 0.05, ++*p* \< 0.01 for NIR-15 group vs. RED-15 group through one-way ANOVA with Tukey's post hoc test. *N* = 5 (control), *N* = 6 (PI), *N* = 7 (NIR-15), and *N* = 7 (RED-15) A duration-dependent effect of LLLA on mechanical allodynia {#Sec11} ----------------------------------------------------------- The irradiation duration influenced the analgesic effect. For both hind paws, the 30-min RED-LA group showed significantly stronger reversal effects on mechanical hypersensitivity than did the 15-min RED-LA group (Fig. [3](#Fig3){ref-type="fig"}a, b), indicating that prolonging irradiation from 15 to 30 min enhanced analgesia, with an earlier occurrence of analgesia and a greater accumulating effect. However, no effect was observed on heat hypersensitivity in either paw (Fig. [3](#Fig3){ref-type="fig"}c, d), suggesting that LLLA may affect only the mechanical nociceptive pathway.Fig. 3Dose-dependent LLLA analgesic effects and a comparison with EA-induced analgesia. Comparison of the effects on PI-induced nociceptive hypersensitivity between irradiation durations and between LLLA and EA. Two RED-LA durations, 15 min (RED-15) and 30 min (RED-30), were employed. **a**, **b** Mechanical allodynia. **c**, **d** Heat hyperalgesia. **e**, **f** Mechanical and heat hypersensitivity in the ipsilateral hind paw. \**p* \< 0.05, \*\**p* \< 0.01 for groups vs. PI group, \#*p* \< 0.05, \#\#*p* \< 0.01 for groups vs. RED-30 group through one-way ANOVA with Tukey's post hoc test. *N* = 5 (control), *N* = 6 (PI), *N* = 7 (RED-15), *N* = 6 (RED-30), and *N* = 6 (EA) RED-LA produced comparable suppression to that produced by EA on PI-induced mechanical allodynia {#Sec12} ------------------------------------------------------------------------------------------------ EA stimulation followed the same time-course protocol as that used for LLLA irradiation (Fig. [3](#Fig3){ref-type="fig"}e, f). We noted that 2-Hz EA at an intensity of 4--5 mA for 30 min significantly attenuated PI-induced mechanical allodynia on the PI side (Fig. [3](#Fig3){ref-type="fig"}e). The gradually increasing analgesia is very similar to that observed with 30-min RED-LA treatments, both in analgesic efficacy and analgesic duration. In addition, both LLLA and EA had no effect on heat hyperalgesia (Fig. [3](#Fig3){ref-type="fig"}c, d, f). Because we aimed to compare the differences between LLLA and EA, there is no control group in Fig. [3](#Fig3){ref-type="fig"}e, f. However, we had controlled EA studies in our previous publications \[[@CR13], [@CR15]\]. LLLA significantly inhibited p-ERK, p-p38, and iNOS but did not affect TNF {#Sec13} -------------------------------------------------------------------------- We examined alterations of the spinal dorsal MAPK, TNF, and iNOS expression at 3 h and 3 days post-PI. Western blotting showed that p-ERK, p-p38, iNOS, and TNF levels were significantly increased in the PI group compared with the naive group at 3 days after PI (Fig. [4](#Fig4){ref-type="fig"}). In the 30-min RED-LA group, daily RED-LA treatments significantly reduced p-ERK, p-p38, and iNOS expression (Fig. [4](#Fig4){ref-type="fig"}b--d). However, LLLA had no effect on TNF expression at 3 days after PI (Fig. [4](#Fig4){ref-type="fig"}e). In comparison, expressions of MAPK, TNF, and iNOS in the spinal dorsal horns were not affected by LLLA at 3 h after PI (Supplement Fig. [1](#Sec15){ref-type="sec"}).Fig. 4LLLA suppressed PI-induced molecular activation. **a** Representative western blot diagram of protein expression among the groups on post-PI day 3. **b** Relative p-ERK1 and p-ERK2 levels. **c**, **d**, **e** Relative p-p38, iNOS, and TNF levels among the groups, respectively. \**p* \< 0.05, \*\**p* \< 0.01 for RED-30 group vs. PI group; \#*p* \< 0.05, \#\#*p* \< 0.01 for RED-15 group vs. PI group, +*p* \< 0.05, ++*p* \< 0.01 for RED-15 group vs. RED-30 group through one-way ANOVA with Tukey's post hoc test. *N* = 4--5 for each group Discussion {#Sec14} ========== In this study, LLLA ameliorated incision-induced mechanical hypersensitivity with a comparable effect to that of low-frequency high-intensity EA stimulation. The analgesic effects depended on the duration of irradiation, and the effects accumulated through repetitive application. LLLA reduced MAPK activation and iNOS expression in the spinal dorsal horn, implying postsynaptic analgesic actions of LLLA. The irradiation dose has been a crucial determinant of LLLA effectiveness in this study and in other studies \[[@CR3], [@CR16]\]. We determined that a higher irradiation density, a longer duration, and repeated application improved analgesic effects; however, we do not intend to develop any standard protocol here because additional factors regarding lasers, such as wavelength, power density, pulse mode, and acupoints (single or multiple, unilateral or bilateral, and point combination), should be considered \[[@CR3]\]. Both 15-min RED-LA and NIR-LA produced mild suppression of PI-induced mechanical allodynia, but these groups showed no significant difference. The wavelength of a low-power laser falls into an 'optical window' between red and near-infrared (600--1070 nm) for maximal penetration. The irradiation depth of this window for the shaved 'ex vivo' skin of mice was within 2.5--3.5 mm \[[@CR17]\]; therefore, whether LLLA could penetrate to the depth of ST36 in humans is unknown. However, the depth of energy transmission is not only dependent on laser beam profiles but also governed by skin properties, including thickness, age, sex, and inflammation, all could affect outcome. Increasing irradiation density by prolonging the laser time from 15 to 30 min significantly enhanced analgesia. RED-LA for 15 min provided a radiant exposure of 1.8 J/cm^2^. According to the Arndt--Schultz law \[[@CR18]\], biostimulation occurs at doses between 0.05 and 10 J/cm \[[@CR19]\], and an optimal value between 0.5 and 4 J/cm^2^ could reduce pain and inflammation. In 2010, the World Association for Laser Therapy recommended a radiant power output of 5--500 mW as a clinically appropriate window for LLLT by using 780--860-nm GaAlAs lasers and suggested a dosage of 4 J per point for plantar fasciitis \[[@CR20]\]. Regarding acupoint employment, a study of myofascial pain using 830-nm GaAlAs LA showed positive effects with an at least 10-mW power and 0.5 J/point, whereas those with 0.1--0.2 J/point had negative effects \[[@CR21]\]. Because most knowledge regarding the therapeutic window is derived from LLLT application on injured tissues rather than on acupoints, effective doses of LLLT and LLLA for reducing inflammation, nociception, and oxidative stress or for inducing vasodilatation and cellular proliferation \[[@CR22]--[@CR24]\] should to be verified before further study \[[@CR25]\]. LLLA application for 4 successive days in normal rats did not cause any alterations in mechanical or heat withdrawal thresholds. This result demonstrates the safety of using such low-energy irradiation on skin, contrary to the risks of EA-related infection or inflammation. This study also provides a head-to-head comparison between RED-LA and EA. For the first time, we identified that a low power but sufficient dose of laser stimulation at an acupoint could produce an equivalent effect to that of EA on acute postsurgical pain. The two study protocols were very similar, involving the same acupoint, anesthetic procedures, animal manipulation, times and durations of repetitive interventions, and experimenter. Higher LLLA irradiation doses exert a stronger effect, similar to the intensity-dependent EA effect observed by using low-frequency, high-intensity EA (4 Hz, 10 mA) in our previous study \[[@CR13], [@CR15]\]. However, both LLLA and EA have low effectiveness. According to our study \[[@CR13]\], the EA effect was equipotent to an intraperitoneal injection of morphine at a dose of 1 mg/kg. Altogether, LLLA is not only comparable to EA in reducing postoperative pain but may also be a superior choice for patients with a needle phobia or bleeding diathesis \[[@CR3]\]. Furthermore, similarities in analgesic patterns between LLLA and EA imply that they may have analogous mechanisms, despite having distinct physical properties (i.e., laser light and heat vs. electricity and needling pain). LLLA could activate endogenous opioidergic and serotonergic (5-HT1 and 5-HT2A receptors) systems in acetic acid- and formalin-induced nociception (indicating visceral and inflammatory pain, respectively), and the analgesic effects were reversed by naloxone, pindolol, and ketanserin but not by ondansetran \[[@CR26]\]; all of these pathways have also been observed in EA analgesia \[[@CR27], [@CR28]\]. In addition, recent studies have determined that LLLA activates brain networks to produce a central modulation effect, which is not the same as effects after EA \[[@CR28], [@CR29]\]. All three members of the MAPK family (ERK, p38, and JNK) have been hallmarks of nociceptive sensitization in different pain models and play a critical role in nociceptive development and maintenance through distinct pathways within spinal neurons and glia \[[@CR30], [@CR31]\]. In a PI model, studies show that the inhibition of spinal p-ERK and p-p38 evidently attenuates PI-induced pain behaviors \[[@CR14], [@CR31], [@CR32]\], and activated ERK contributes to the initiation of hypersensitivity immediately after incision \[[@CR32]\]. EA pretreatment attenuated PI-induced mechanical hypersensitivity and decreased the number of spinal p-ERK-ir cells distributed in the superficial laminae as early as 30 min after treatment \[[@CR13]\]. In this study, daily 30-min RED-LA did not affect early p-ERK levels at 3 h after PI (Supplementary Fig. [1A](#Sec15){ref-type="sec"}) but reduced p-ERK expression at 3 days after PI. This result suggests that the LLLA effect is weak and slow, and repetitive laser irradiation may be essential for accumulating analgesia. A strong EA stimulation (2 Hz, 10 mA, 4 days) activated stronger p-p38 expression than sham EA \[[@CR15]\], whereas we observed LLLA significantly decreased p-p38. This implies that LLLA may be less irritating in p38 activation than EA stimulation, while maintains acupoint-mediated antinociceptive action. However, such comparisons may not be accurate because of differences in quantification methods, i.e., immunofluorescence vs. western blot. NO, after synthesis by NOS, serves as an essential early warning signal and contributes to nociceptive maintenance \[[@CR33]\]. In rats, the major source of NO in the spinal dorsal horn is interneurons located in laminae II and III \[[@CR34]\]. Different from the definite role of neuronal NOS in sensitizing spinal circuit, the role of iNOS in central transmission remains unclear \[[@CR35]\]. Studies have proved that iNOS is required for inflammatory pain \[[@CR36], [@CR37]\], and highly selective iNOS inhibitors, 1400W \[[@CR38]\] and GW274150 \[[@CR39]\], reduced thermal hyperalgesia. Importantly, we firstly report LLLA significantly suppressed iNOS in the spinal cord. TNF, a proinflammatory cytokine, was expressed in microglia, astrocytes, and primary sensory dorsal root ganglion neurons \[[@CR40]\] but rarely in spinal cord neurons \[[@CR41]\]. It also plays an essential role in neuropathic pain induced by nerve injury or inflammation \[[@CR42]\]. Accumulating evidence suggests that TNF enhances the central mechanisms of neuropathic pain, including c-fiber-evoked long-term potentiation and microglial p-p38-mediated synaptic plasticity \[[@CR43]\]. LLLT irradiation at the injured wound could exhibit TNF-related anti-inflammatory properties \[[@CR44]\]. The present study demonstrated that although PI significantly increased TNF expression in the ipsilateral dorsal horn, repetitive RED-LA could not reverse increased TNF expression. Nevertheless, the inhibition of spinal microglial p-p38, but not TNF, by LLLA suggests an alternative pathway of microglia-mediated proinflammatory cytokines. Repetitive LLLA treatments ameliorate incision-induced mechanical pain, whereas the analgesic efficacy is slow and low. In addition, analgesic efficacy of LLLA is analog to that of high-intensity EA, and the inhibition of several sensitizing signals suggests a unique role of LLLA from EA in postsurgical spinal modulation. In conclusion, this preclinical study provides a theoretical basis for the clinical use of LLLA in postoperative pain patients and gives LLLA a novel impetus to become a valuable alternative to EA. Electronic supplementary material ================================= {#Sec15} Supplement Fig. 1LLLA did not alter spinal expressions on 3 h post-PI. A, B, C, D: Relative p-ERK1, p-ERK2, p-p38, iNOS, and TNF levels among the groups, respectively. One-way ANOVA with Tukey's post hoc test and no significant difference among groups. *N* = 4--5 for each group. (GIF 215 kb) High resolution image (TIFF 124 kb) Ching-Huang Lin and Yeong-Ray Wen contributed equally to this work. A preliminary account of the results has been given in a published abstract in 16th World Congress on Pain. **Electronic supplementary material** The online version of this article (10.1007/s10103-017-2367-7) contains supplementary material, which is available to authorized users. Each author had participated sufficiently in the study, and all took public responsibility for appropriate portions of the content. Dr. Wen, Dr. Lin, and Dr. Hsu designed the whole study conception together. Ms. Wang and Mr. Lin performed behavioral tests, collected the data, and analyzed the data with Dr. Zeng. Dr. Zeng, Dr. Chang, Dr. Tsai, and Dr. Wen discussed and interpreted all the data. Mrs. Zeng, Dr. Tsai, and Dr. Wen drafted the manuscript. Dr. Wen wrote the final manuscript and Dr. Wu helped providing the critical opinions. This study was sponsored by research grants from the National Science Council in Taiwan (NSC101-2314-B-039-005-MY3), Minister of Science and Technology (MOST 104-2314-B-039-020-MY2), in part from Taiwan Ministry of Health and Welfare Clinical Trial Center (MOHW106-TDU-B-212-113004), in part from China Medical University Hospital (DMR-106-217) to Y.R. Wen, in part from Minister of Science and Technology (MOST 105-2320-B-039-029), and in part from China Medical University Hospital (DMR-106-181) to S.F. Hsu. Conflict of interest {#FPar1} ==================== The authors declare that they have no conflict of interest.
Q: How to append element in the currently clicked table element from popup form? So I have made a table table elements and functions for the pop up and the form. Appending element on clicking save button also works. However on a new popup the data from the form is appended in every previously clicked table cell no matter if the cell is full or empty.I am somehow trying to populate the cell with currently generated ID . Considering the fact that I me new at JavaScript I am totally missing something Can someone give me idea what is that. The Code //================ADDs POPUP ON CLICK================/ $(document).ready(function () { /*Adding the klikanje class to td*/ $('table tbody tr:not(:first) td').addClass('klikanje'); /*removing the klikanje class from the first column*/ $('table tr:first-child, table td:first-child').removeClass('klikanje'); /*removing the klikanje class from the first row*/ $('table tbody tr:first-child td').removeClass('klikanje'); /*Making random id*/ /*appending data atributs to empty td*/ $('.klikanje').click(function(){ var self = $(this); if ($(this).is(':empty')) { var idBase = 'clickId-'; function getRandomInt(min, max) { return Math.floor(Math.random() * (max - min)) + min; } var idNumber = getRandomInt(1, 1000000); var clickID = idBase + idNumber var callingID = '#' + clickID; $(this).attr({ 'data-toggle': 'modal', 'data-target': '#popUp', 'id': clickID }); /*save to td */ $('#save').click(function () { var theName = $('input[name=name]').val(); var theLastName = $('input[name=lastname]').val(); var $fullCell = $('<p>' + theName + '' + theLastName + '</p>'); if((theLastName+theLastName).length > 0){ $(callingID).append($fullCell); $(callingID).css('background-color', 'yellow'); } }); /*save to td end */ } else { alert('Already taken spot. Please pick another one!'); $(this).attr({ 'data-toggle': '', 'data-target': '', 'id': '' }); } }); });//<---ADDs POPUP ON CLICK END Full code : JsFiddle A: You need to just empty the fields after saving the value because same popup html is used again and again and value once entered in the input elements will stay there until manually cleared. Use below code. var callingID = ""; $('.klikanje').click(function(){ var self = $(this); if ($(this).is(':empty')) { var idBase = 'clickId-'; function getRandomInt(min, max) { return Math.floor(Math.random() * (max - min)) + min; } var idNumber = getRandomInt(1, 1000000); var clickID = idBase + idNumber callingID = '#' + clickID; $(this).attr({ 'data-toggle': 'modal', 'data-target': '#popUp', 'id': clickID }); updated fiddle : https://jsfiddle.net/9zcj3ab8/27/
This spicy ground lamb stew brings the heat but sweet pickled mustard seeds and a bright finish of parsley and lemon helps brighten and soften the spice. Pickled mustard seeds are also known as poor man’s caviar and it’s the perfect addition to this spicy ground lamb stew. Grade Serves: 4 Cost: $$ Skill Level: Easy Time to Make: About 1 hour 20 minutes (45-55 minutes inactive) Ingredients for Spicy Ground Lamb Stew with Pickled Mustard Seeds Spicy Ground Lamb Stew 2 teaspoons neutral cooking oil 1 pound ground lamb 1 tablespoon powdered harissa seasoning (or use chili powder and cayenne powder to taste) 1 jalapeño, minced 1 yellow onion, peeled and diced 5 carrots, trimmed, peeled, and cut into rounds 2 tablespoons tomato paste ¼ cup vermouth or red wine 4 cups chicken stock 1 teaspoon garlic powder 1 teaspoon onion powder ½ teaspoon ground cinnamon ½ teaspoon ground cinnamon ½ teaspoon cayenne powder, more or less to taste 1 pound Yukon gold potatoes, scrubbed and cut into bite-sized cubes Salt and pepper to taste ½ cup fresh parsley leaves, roughly chopped 1 lemon, juiced and zested 1 cup uncooked white rice 2 teaspoons butter Pickled Mustard Seeds ¼ cup yellow mustard seeds ½ cup rice wine vinegar ½ cup water, more as needed ¼ cup granulated sugar Method Prepare Pickled Mustard Seeds: Combine all ingredients for the pickled mustard seeds in a small sauce pan. Bring to a low boil, stir, and then reduce heat to very low and simmer for 45 minutes. Add splashes of water as necessary to keep the mustard seeds just submerged and stir occasionally. Transfer the pickled mustard to seeds and liquid to a bowl and set aside at room temperature until ready to serve. Note: Leftover pickled mustard seeds should be stored in an airtight container and will last for months in the fridge. Prepare the Lamb: In a wide pot, heat the neutral cooking oil over medium heat until very hot. Add the lamb and season with salt and pepper. Cook the lamb for 10-12 minutes, breaking the meat up with a wooden spoon, until well-browned all over. Add the harissa and stir to coat everything. Use a slotted spoon to remove the lamb from the pot and transfer to a bowl. Prepare the Vegetables: Return the pot to medium and add the diced onion and minced jalapeño. Cook, stirring regularly, for 5 minutes or until the onion has begun to soften. Add the sliced carrots and season with salt and pepper. Cook for 5-7 minutes or until the vegetables begin to soften and take on a deeper color around the edges. Prepare the Stew Base: Add the tomato paste to the pot of vegetables and stir to coat the vegetables. Cook for 1-2 minutes or until the paste begins to deepen in color. Add the vermouth and stir to combine, scraping up any browned bits stuck to the bottom of the pot. Pour in the chicken stock, turn the heat to high, and bring to a boil. Once boiling, reduce heat to low and add the garlic and onion powder, cinnamon and cloves, and the cayenne powder to taste. Season with salt and pepper. Simmer the Lamb Stew: Return the cooked lamb to the pot and simmer the stew, uncovered, for 35-45 minutes or until the potatoes are fork-tender and the flavors have melded. Taste and season to your preferences. Prepare the Garnish: Combine the lemon juice, parsley, and lemon zest in a bowl and toss to combine. Prepare the Rice: While the spicy ground lamb stew is simmering, prepare the rice by combining it with water, a sprinkle of salt, and the butter in a small saucepan. Bring to a boil and then reduce heat, cover, and simmer over very low heat for 16-17 minutes. Turn off the heat and rest for 5 minutes before fluffing with a fork. To Serve the Spicy Ground Lamb Stew: Divide the cooked rice between bowls and and pile the spicy ground lamb stew on top. Spoon two tablespoons of the pickled mustard seeds (with liquid) on each dish and garnish with the parsley and lemon mixture. Enjoy! Pin this Spicy Ground Lamb Stew with Pickled Mustard Seeds for Later! I don’t make lamb often, but when I do, it’s usually for a special occasion, like this amazing New Year’s Eve dinner lamb chops!
.. algorithm:: .. summary:: .. relatedalgorithms:: .. properties:: Description ----------- This algorithm exports a given :ref:`Workspace2D <Workspace2D>` to a YAML format which supposed to be read by the `Frida 2.0 <http://apps.jcns.fz-juelich.de/doku/frida/start>`_ software for further data analysis. The algorithm has been developed for the TOFTOF instrument, but can be used for other TOF instruments as well. Limitations ########### The input workspace must be a Wokspace2D with an instrument. The X unit of the workspace has to be 'DeltaE' Y axis must be a Spectrum axis or it's unit has to be 'Momentum Transfer'. Usage ----- **Example - SaveYDA** .. testcode:: SaveYDAExample import os import numpy as np from sys import stdout # create x and y data dataX = np.arange(12).reshape(3, 4) dataY = np.arange(9).reshape(3, 3) # create sample workspace ws = CreateWorkspace(DataX=dataX, DataY=dataY, DataE=np.sqrt(dataY), NSpec=3, UnitX="DeltaE") # add Instrument LoadInstrument(ws,True,InstrumentName="TOFTOF") #add sample Logs AddSampleLog(ws,"proposal_number","3") AddSampleLog(ws, "proposal_title", "Proposal Title") AddSampleLog(ws,"experiment_team","Experiment Team name") AddSampleLog(ws,"temperature","200.0", LogUnit="F") AddSampleLog(ws,"Ei","1.0",LogUnit="meV") # test file name filename = os.path.join(config["defaultsave.directory"], "TestSaveYDA.yaml") # save file SaveYDA(ws, filename) with open(filename,'r') as f: for i in range(12): stdout.write(f.readline()) **Output:** .. testoutput:: SaveYDAExample Meta: format: yaml/frida 2.0 type: generic tabular data History: - Proposal number 3 - Proposal Title - Experiment Team name - data reduced with mantid Coord: x: {name: w, unit: meV} y: {name: 'S(q,w)', unit: meV-1} z: [{name: 2th, unit: deg}] .. testcleanup:: SaveYDAExample DeleteWorkspace("ws") os.remove(filename) .. categories:: .. sourcelink::
In the past few years, in which Disney and Lucasfilm have acted terrified they might ruin their “Star Wars” cash cow by making movies that don’t exactly fit some mathematical formula of what a “Star Wars” movie looks like, I feel like they missed an important detail — a detail that is becoming very clear with “Solo” shaping up to be a massive disappointment. There are other ways to damage a brand than just by making bad movies, or movies that don’t appeal on the surface to the audience you’re targeting. You can diminish a franchise just as easily by coasting on former glories instead of actually moving forward with new ideas. That’s exactly what Disney has done since it bought Lucasfilm, and “Star Wars” with it, back in 2012. And it’s the reason why “Solo” is doing so poorly at the box office. The powers that be have failed to make people care about this iteration of the series. Disney has been doing this “Star Wars” thing all wrong, and “Solo” is the proof. Also Read: Things Are About to Get Worse for 'Solo' We all understood when Disney made that $4 billion purchase that the plan was to pump out “Star Wars” movies for the rest of our lives. But now, just a few years into this endeavor, there is suddenly a very real chance that the whole thing may fall apart much sooner than we could have imagined — if they don’t get it together soon. In hindsight, “Solo” was probably doomed from the start, being born from a lack of vision for the franchise. It has no bearing on the portion of the franchise that is ostensibly trying to advance the brand — the numbered main saga movies — which renders it optional viewing by default for casual viewers. There’s no reason to think that future movies about Boba Fett or Obi-Wan will do any better, because they’d be even LESS relevant. If there was a time when “Solo” and other future standalone movies maybe could have worked, it was before Lucasfilm decided against going in any sort of interesting or fresh direction with them. Way back in 2015, Lucasfilm boss Kathleen Kennedy described these “Star Wars Story” movies as an “opportunity for us to tap into emergent directing talent out there and do some things that are unexpected.” That idea was certainly reflected in the hiring of Gareth Edwards for “Rogue One” and Phil Lord and Chris Miller for “Solo.” But both of those movies ended up swapping that “emergent directing talent” for fixers, who ended up delivering the most generic possible “Star Wars” experiences. Also Read: 22 Times 'Solo' Recycled Moments From the Original 'Star Wars' Trilogy The way I see it, these spinoffs are the products of hubris — the thought, in this case, that the brand is so strong that so long as you throw things out there that feel sufficiently “Star Wars”-esque, they will succeed. But the box office failure of “Solo” (which looks on its way to pulling-in less than a half-billion worldwide — definitely a failure) shows that didn’t pan out. And if Disney/Lucasfilm thinks this is just some one-off freak accident that doesn’t warrant a major course correction, then this situation will eventually get worse. To put it a different way: “Solo” is a sign that Disney is on the wrong path with “Star Wars.” It’s clear that the novelty factor that has driven the wild and unprecedented success of this new era of “Star Wars” is gone now. The first couple of new “Star Wars” films were going to be big winners by default, because that’s just how it is when you bring back the most popular movie franchise in history after a long hiatus. (We saw a similar thing happen with “Jurassic World” just six months prior to the release of “The Force Awakens.”) Fan fervor for new, potentially good “Star Wars” movies gave Disney what amounts to a grace period to figure out what they wanted to do — there was built-in goodwill just because they were bringing “Star Wars” back, and doing so just as the inarguable success of Marvel suggested to us that the company Knows What It Is Doing. But at some point they were gonna have to make a real effort if they wanted that gargantuan success to continue with yearly releases. Also Read: 5 Reasons Why 'Solo: A Star Wars Story' Crumbled at the Box Office They haven’t done that. Star Wars” in the Disney era has no identity of its own, as it opts to re-use the old franchise identity instead. The franchise now just lives in the past, with new saga movies judged by how well they echo previous “Star Wars” movies, and spinoffs that tie into the 40-year-old original trilogy instead of the new one they’re making right now.” And that’s why “Solo” is flopping. “Solo” is the fourth in a severely disjointed sequence of movies that were all released in quick succession. There is absolutely no sense of direction to all this, no vibe that these movies are leading to something other than more references to the old movies. Maybe they had a vague plan to create some kind of mini-universe out of the standalone movies — movies about Boba Fett and Obi-Wan would certainly allow for characters to cross over between each other and also “Rogue One” and “Solo.” But there’s been absolutely no sign to that effect so far — we didn’t get any “Rogue One” characters popping up in “Solo,” for example, and they keep killing off nearly every important character who wasn’t already in the original trilogy. Generally, these movies exist apart from one another, and serve mainly to give viewers the thrill of recognizing references to the original trilogy. But more than that, there’s been no feeling that there’s any kind of real vision for the franchise as a whole at all the last few years. Also Read: 'Solo: A Star Wars Story' - What's the Deal With Those Gold Dice? That problem is hardly localized just to the “Star Wars Story” standalones. “The Last Jedi” was particularly egregious in its disposability and lack of connection to even its own context. If anything, it was more preoccupied with clearing the board that “The Force Awakens” had set than with setting anything new up — if “The Force Awakens” was a franchise reboot of sorts, then “The Last Jedi” was a reboot of the reboot. That movie leaves the world in much the same state that “Revenge of the Sith” did — our heroes have lost, and are in no position to mount a real opposition to their enemies. But when we saw “Revenge of the Sith” we already knew what the next part of the story was because we’d seen it already in the original “Star Wars.” “The Last Jedi” just leaves us wondering where the story could possibly go from here, with the entire fighting forces of the Resistance all but completely destroyed. That’s a huge deal, but for some reason, Disney/Lucasfilm followed that up with a spinoff movie that has absolutely no bearing on those events. Sure, Disney and Lucasfilm apologists could point to the fact that fans have been pleased in the moment with each of these new movies (to the tune of A Cinemascores for the first three they put out and an A- for “Solo”) as proof contrary to my complaints. But satisfying the “Star Wars” audience on opening night doesn’t necessarily equal a good legacy. For proof of that just look at the maligned prequels, each of which earned an A- when they were released. With “Star Wars” it’s much harder to get a bad Cinemascore than it is to get a good one Also Read: All the 'Star Wars' Behind-the-Scenes Shakeups Since Disney Bought Lucasfilm (So Far) A long-running franchise can only persist in perpetuity — without long breaks like the ones “Star Wars” has taken in the past — if it works as a coherent unit. The lack of overall vision for the movie franchise is particularly glaring next to the Marvel Cinematic Universe, which Lucasfilm so obviously has been hoping to replicate. The big difference between the two is that the MCU has had at least a broad plan from the very beginning, and each of its movies — even seeming stand-alones like “Guardians of the Galaxy” — have played into the grand tapestry that is the whole of the franchise. Meanwhile, remember how “The Last Jedi” essentially rebooted what it didn’t completely discard outright from “The Force Awakens”? We’re now four movies into the new “Star Wars” and it still does not appear to have any kind of plan or even an attempt to make its movies function as a unit. Lucasfilm needs a vision for where it wants to take the franchise as a whole, and all the movies it produces need to take part in delivering that vision. Spinoffs need to bolster the main saga in at least some small way, not be completely separate from it. And that main saga needs to have a destination in mind — they can’t just undo each other to way “The Last Jedi” rebuked “The Force Awakens.” Also Read: 10 Plot Threads 'The Force Awakens' Set Up that 'The Last Jedi' Blew Off From here on out, those are the problems that have to be fixed. Because if “Solo” is the indicator it appears to be, rather than a fluke, the days of Disney/Lucasfilm being able to pump out a serviceable “Star Wars” movie and make oodles of profit by default are coming to an end.
The mayor of Baltimore has lifted a city-wide curfew, almost a week after protests began, sparked by yet another death of a black man from the hands of security forces: 25-year-old Freddie Gray died in police custody. “My goal has always been to not have the curfew in place a single day longer than was necessary. I believe we have reached that point today,” mayor Stephanie Rawlings-Blake announced on Twitter. My goal has always been to not have the curfew in place a single day longer than was necessary. I believe we have reached that point today. — Mayor Rawlings-Blake (@MayorSRB) May 3, 2015 The curfew had been imposed since Tuesday, and has ordered the city residents to stay at home after 10:00pm. Effective immediately, I have rescinded my order instituting a city-wide curfew. I want to thank the people of Baltimore for their patience. — Mayor Rawlings-Blake (@MayorSRB) May 3, 2015 Last Monday, looting, arson, and street rioting raged in Baltimore, with police responding by firing rubber bullets and tear gas. Scores of arrests were made over the week, with over 3,000 security forces on the ground at the time, backed up by the National Guard. READ MORE: Baltimore protester wearing ‘F**k the police T-shirt’ gets face full of pepper spray (VIDEO) After six policemen involved in Gray’s death were arrested, and charges were brought against them, the tensions eased, and the protests went on largely peacefully. A few arrests were made during the Saturday march, but only due to the demonstrators breaking the curfew. On April 12, 25-year-old Freddie Gray was hustled into a police van to the Western District police station, from which an ambulance drove Gray to a shock trauma unit. The man died a week later, with 80 percent of his spine severed at the neck, according to his family lawyers. The latest series of protests are part of the “Black Lives Matter” demonstrations that gripped the nation in the wake of the murders of African Americans at the hands of police in Ferguson, New York, and Cleveland.
「東洋経済オンライン」に6月6日に掲載された翻訳記事に、「(JSONという)気味の悪い拡張子」「聞いたことのないファイル」といった表現があり、ネットユーザーから「JSONは一般的なデータ形式だ」「原文と意味が違う。誤訳では」などと指摘されていた件で、同誌は7日、「原文とかい離した訳だった」とし、原文に忠実な訳に修正した上で、「気味の悪い拡張子」などの記載を削除した。 修正前の記事 New York Timesの原文 問題の記事は、「グーグルが握っているあなたの『個人情報』」という見出しで、The News York Timesの「Google’s File on Me Was Huge. Here’s Why It Wasn’t as Creepy as My Facebook Data.」を翻訳したもの。 記事では、Googleが保有する自分の全データを取得できるツール「Google Takeout」を使って記者が自らのデータをダウンロードした結果を紹介し、一般ユーザーには読み取りづらい形式で提供されるファイルも多いと指摘していた。 その具体例として、「For example, some files included the extension .JSON.My Google Maps location history was stored in a .JSON file, and it displayed an unintelligible list of GPS coordinates and time stamps.」(例えば、いくつかのファイルは、.JSONという拡張子を含んでいた。私のGoogleマップのロケーションはJSONファイルに収められており、GPS座標とタイムスタンプの難解なリストが表示された)と紹介していた。 この部分について、東洋経済オンラインの記事では当初「たとえば、グーグル・マップのロケーション履歴(GPS座標と時間情報)は、『.JSON』という聞いたこともない拡張子のファイルに収められていた」と翻訳。中見出しには、「聞いたことのないファイルに収められている」「気味の悪い拡張子」と記載していた。 これについて、Web技術に詳しいユーザーから異論が噴出。「JSONはごく一般的なデータ形式」「東洋経済オンラインのWebサイトにもJSONが多用されている」「原文と意味が違う。誤訳では」などと物議をかもし、7日のTwitterで「JSON」がほぼ終日トレンドに入るほど話題になった。 東洋経済オンラインは7日午後、この部分の記述を原文に忠実な内容に訂正。「気味の悪い拡張子」などの中見出しも修正した上で、「記事初出時には、『.JSONという奇妙な拡張子』『聞いたこともない拡張子』とありましたが、原文とかい離した訳となっておりましたので、中見出し及び本文内の表記を訂正致します」と訂正履歴を記載した。 修正後の記事 最近、IT関連やWeb技術に関する記事で、「不正確だ」などとツッコミが入って話題になる例が増えている。昨年5月には、日経ビジネスが記事の見出しで、半導体大手の米NVIDIAを「謎のAI半導体メーカー」と紹介したことが話題に。今年6月5日には、ソースコード共有ツール「GitHub」について、日本経済新聞電子版が「設計図共有サイト」と紹介して物議を醸した。
Q: How to display a part of a shape in Orchard CMS in the Layout.cshtml file in own created admin theme for orchard that it contains the below code for display admin UI's header: @if (Model.Header != null) { <div id="header" role="banner"> @Zone(Model.Header) </div> } Considering that the Model.Header contains two part for display: User.cshtml and Header.cshtml. now what i want to do is to perevent display the header, and in other word i want to display just User.cshtml part existing in Model.Header shape. A: Bertrand's answer is spot on for a front-end theme but as you are referring to a custom admin theme I took at look at Layout.cshtml in TheAdmin. Just before the snippet you posted there are the following lines which build up the header and footer zones: Model.Header.Add(Display.Header()); Model.Header.Add(Display.User(CurrentUser: WorkContext.CurrentUser)); Model.Footer.Add(Display.OrchardVersion()); Remove the first line and the header zone will just contain the User shape.
Save Article Without Jon Stewart, Who Will Fill the Late-Night Throne? There are plenty of personalities in the Daily Show host’s orbit—Amy Schumer, Key and Peele, Lena Dunham—but can any of them truly replace Comedy Central’s golden boy? By John Anderson Aug. 6, 2015 5:17 p.m. ET Jon Stewart has left the building, a.k.a. Comedy Central’s World News Headquarters in New York. A nation mourns. Bedtime will never be the same. Politicians won’t have America’s pre-eminent faux pundit to kick them around anymore. And TV comedy? In Mr. Stewart’s wake lies tumult and unease. There’s no question it was time for him to go. He knew it. “The Daily Show” was marked in recent months by an increasing reliance on easy jokes, easier vulgarity, and the isn’t-it-adorable inability of the guy with the bleeper to...
Q: Why did Mike leave? I don't think Mike's character should have vanished like what the creator showed in Suits. While it is true that Meghan Markle is now Duchess of Sussex and probably can't work (or something), the audience truly loved Mike individually. There could have been a replacement of Rachel, or a dramatic break-up, maybe. The audience would have gulped the heart-breaking news like that. But simply erasing Mike was not really good. Now if we logically think, when you move to another city, you don't totally vanish like that. Especially with the expertise of Mike Ross. Did the creators really have to let go of Mike because of Rachel? I don't think his character was so dependent on hers. Or, was there other reason? A: In this interview in the Hollywood Reporter, Patrick J. Adams, who plays Mike Ross, explains that he chose to leave the show because he believed Mike Ross' story had nowhere else to go: As we were starting to talk about renegotiating contracts [for season eight and beyond], I took a moment. Everybody was going full steam ahead and I stopped and said, "We need to think about this because this is more of my time and more of my life — and what’s the story left to tell?" [...] I had this voice in my head that said that we've told his story and if he hangs out longer, Mike is just going to be another lawyer on television. That didn’t feel right for him. Whether you agree with him is another matter entirely, but that is why he left. As far as I cam tell, Meghan Markle's own departure from the show had nothing to do with Adams' departure. It was just convenient timing for the writers, as it allowed them to write them both out at the same time. For the record, Adams has not ruled out returning to the show in future, even if it's just a one-off: I’ve said my goodbyes to Mike and to Suits, but I never close any door. When the time comes, if it felt like [returning] was the right thing to do, I’d definitely be open to it. [...] If it felt like it was the appropriate thing to bring Mike back for a big goodbye, then that’s something I could be open to.
Unless otherwise indicated herein, the description in this section is not prior art to the claims in this application and is not admitted to be prior art by inclusion in this section. A typical sheet conveyance apparatus, which conveys sheets, includes a brush-shaped discharging member for contacting the sheet. The discharging member discharges electric charge of the sheets, and this stabilizes conveyability and loadability of the sheets. There is proposed a grounding mechanism that grounds a conveyance roller.
Taking on life, love and parenthood one stiletto clad step at a time Reward Charts Over the last year I really didn’t care about what my house looked like. I was too busy picking myself up off the floor and trying to find happiness within myself and my children, that a clean house was not the number one thing to do on my list. That means I spent many many weekends cleaning up. It didn’t bother me then, but it bothers me now. Amandalynn is heading to school in a week and i need to make sure our home life is organised so that she knows where to find her school things at all times. Enter: Reward Charts! Amandalynn use to have these but as I said I was toooOoo busy sorting my shit out. They moved back into the kitchen. *Night one was great, kids did what was needed and the got stickers. Pat on the back supermom *Night two started out well. Lorelai refused to help pick up toys so she got a black X and Amandalynn got 2 stickers. She again refused to help with the dishes and got another X. Amandalynn cried because she have to take the trash out. I sat them down, told them if they cry or moan when have to do their chores then they get an X and for each X I will take a priviliage away.
CLEVELAND, Ohio -- The 11 Occupy Cleveland protesters arrested Friday night on Public Square in an act of civil disobedience emerged on Saturday disheveled but no worse for wear from their overnight stay in city jail. "Some people got treated a little more roughly than others, but at the end of the day, it wasn't New York," said arrested protester Erin McCardle, 23, of Cleveland. "There was no pepper spray, no batons." The detained protesters, three women and eight men ranging in age from 19 to 46, pleaded not guilty to charges of resisting arrest, trespassing and violating the city's curfew for Public Square. Cleveland Municipal Judge Ronald Adrine, who held a special arraignment session for the protesters Saturday afternoon, released all 11 on personal bonds. Mayor Frank Jackson's administration ordered the arrests after the protesters' two-week permit to use Public Square had expired. Occupy Cleveland had maintained a 24-hour presence on the square since protesters first gathered there Oct. 6, but had technically been in violation of the 10 p.m. to 5 a.m. curfew during that time. Administration officials have cited a three-month permit for the Downtown Cleveland Alliance that began Saturday for its annual Christmas lighting display as the reason for enforcing the curfew. Volunteers arrived on the square at 7 a.m. Saturday to begin stringing lights on trees. Prominent civil rights attorney Terry Gilbert, who arrived at the Justice Center on Saturday after the court hearing concluded, said he and other lawyers would be volunteering to represent the arrested protesters. "I think it's shameful the mayor's office hasn't been more flexible in dealing with this thing," Gilbert said. "No one needed to be arrested." Those interviewed Saturday said they were, for the most part, treated respectfully by the police officers who arrested them and the jail guards who oversaw their stays while prisoners who had followed the Occupy Cleveland movement on television had expressed their support. Others said that until Friday night, the relationship between protesters and police had been cordial and respectful. Having followed the example set by Third District Commander Patrick Stephens, officers had shown genuine concern for protesters well-being as they braved the chilly, damp weather that has marked Occupy Cleveland's two-week stay on Public Square, protesters said. But they also said that given the change in the city's attitude toward their movement that more arrests are likely. "I think there's definitely the potential we will be in this position again," McCardle said. Cleveland City Councilman Brian Cummins, who obtained the two-week permit for Occupy Cleveland that expired at 10 p.m. Friday, agreed. He questioned why the Downtown Cleveland Alliance should receive a three-month permit on Public Square for their Christmas display while the protesters are only given two weeks. Scott Schneider, 28, of Olmsted Falls, said he was not "glad" about his arrest, but felt it was necessary to take a stand. Like many of his fellow occupiers, he said he was troubled by how corporate money has corrupted politics and that half the country's wealth was in the hands of 1 percent of the population. The global Occupy movement has embraced their standing as the "99 percent." "I'll get arrested today, I'll get arrested tomorrow," Schneider said. "If it's fighting for my daughter to have an opportunity for the American Dream, I'll get arrested every day." What happens next is unclear. After their release, the 11 joined a group of about 20 other Occupy Cleveland participants in a rag-tag march toward Tower City for a late lunch. A drummer kept cadence as their voices echoed off buildings with the chant: "Ain't no power like the power of the people and the power of the people don't stop." Follow Us cleveland.com is powered by Plain Dealer Publishing Co. and Northeast Ohio Media Group. All rights reserved (About Us).The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Northeast Ohio Media Group LLC.
{# # talkatv - Commenting backend for static pages # Copyright (C) 2012 talkatv contributors, see AUTHORS # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU Affero General Public License as # published by the Free Software Foundation, either version 3 of the # License, or (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Affero General Public License for more details. # # You should have received a copy of the GNU Affero General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. #} {% extends 'talkatv/base.html' %} {% set active_page = 'comment_list' %} {% block bootstrap_js_bottom %} {{ super() }} <script> //a polyfill for the ordered-list reversed attribute // http://www.whatwg.org/specs/web-apps/current-work/multipage/grouping-content.html#the-ol-element // http://www.whatwg.org/specs/web-apps/current-work/multipage/grouping-content.html#dom-li-value //uses these awesomeness: // Array.prototype.forEach // Element.prototype.children //if you want support for older browsers *cough*IE8-*cough*, then use the other // file provided // // from https://gist.github.com/1671548 (function () { "use strict"; if ( 'reversed' in document.createElement('ol') ) { return; } [].forEach.call( document.getElementsByTagName('ol'), function ( list ) { if ( list.getAttribute( 'reversed' ) !== null ) { reverseList( list ); } }); function reverseList ( list ) { var children = list.children, count = list.getAttribute('start'); //check to see if a start attribute is provided if ( count !== null ) { count = Number( count ); if ( isNaN(count) ) { count = null; } } //no, this isn't duplication - start will be set to null // in the previous if statement if an invalid start attribute // is provided if ( count === null ) { count = children.length; } [].forEach.call( children, function ( child ) { child.value = count--; }); } }()); </script> {% endblock %} {% block title %}Comments for {{ comment_context.item.title }} - talkatv{% endblock %} {% block talkatv_body %} <div class="page-header"> <h1>Comments for <a href="{{ comment_context.item.url }}" rel="nofollow">{{ comment_context.item.title }}</a></h1> </div> <div class="row"> <div class="span8"> <div id="talkatv-comments"> <div class="talkatv-form"> <form> <!-- TODO --> </form> </div> {% if comment_context %} <ol reversed="reversed" class="comment-list"> {% for comment in comment_context.comments %} {{ render_comment(comment) }} {% endfor %} </ol> {% endif %} </div> </div> </div> {% endblock %} {% macro render_comment(comment) %} <li> <div class="comment-inner"> <p class="comment-text">{{ comment.text }}</p> <span class="comment-created" data-source-time="{{ comment.created }}">{{ comment.created }}</span> <span class="comment-username">{{ comment.username }}</span> </div> {% if comment.replies %} <ol reversed> {% for reply in comment.replies %} {{ render_comment(reply) }} {% endfor %} </ol> {% endif %} </li> {% endmacro %}
Behavioral deficits associated with dietary induction of decreased brain docosahexaenoic acid concentration. Docosahexaenoic acid (DHA), an n-3 fatty acid, is rapidly deposited during the period of rapid brain development. The influence of n-3 fatty acid deficiency on learning performance in adult rats over two generations was investigated. Rats were fed either an n-3 fatty acid-adequate (n-3 Adq) or -deficient (n-3 Def) diet for three generations (F1-F3). Levels of total brain n-3 fatty acids were reduced in the n-3 Def group by 83 and 87% in the F2 and F3 generations, respectively. In the Morris water maze, the n-3 Def group showed a longer escape latency and delayed acquisition of this task compared with the n-3 Adq group in both generations. The acquisition and memory levels of the n-3 Def group in the F3 generation seemed to be lower than that of the F2 generation. The 22:5n-6/22:6n-3 ratio in the frontal cortex and dams' milk was markedly increased in the n-3 Def group, and this ratio was significantly higher in the F3 generation compared with the F2 generation. These results suggest that learning and cognitive behavior are related to brain DHA status, which, in turn, is related to the levels of the milk/dietary n-3 fatty acids.
Interactions between DNA and Gemini surfactant: impact on gene therapy: part I. Nonviral gene therapy using gemini surfactants is a unique approach to medicine that can be adapted toward the treatment of various diseases. Recently, gemini surfactants have been utilized as candidates for the formation of nonviral vectors. The chemical structure of the surfactant (variations in the alkyl tail length and spacer/head group) and the resulting physicochemical properties of the lipoplexes are critical parameters for efficient gene transfection. Moreover, studying the interaction of the surfactant with DNA can help in designing an efficient vector and understanding how transfection complexes overcome various cellular barriers. Part I of this review provides an overview of various types of gemini surfactants designed for gene therapy and their transfection efficiency; and Part II will focus on different novel methods utilized to understand the interactions between the gemini and DNA in a lipoplex.
Exploring the mind of Jay. Main menu Post navigation Where Are You Now, Joe the Plumber? Ahhh, the joys of blogging. I just contributed to a wikipedia article and it was so constraining, having to cite sources and write from a neutral point of view. Now I can say whatever I want and don’t have to justify any of it! My topic was the thing Democrats have noticed (and Republicans seem to ignore) where the “red” (Republican) states vote for people who say they want to shrink the government, but the red states actually take much more from the government. In other words, if you take the data of how much each state pays in taxes per capita and then subtract how much it gets back in government spending, you get the net contribution of each state to the federal government. For most blue (Democratic) states, the net contribution is a positive number. But for most red states, it’s negative. The wikipedia article is here, the bit I did is the table near the bottom with all the numbers, and the paragraphs in the two sections above that, starting with “Politics and Controversy of Unequal Contribution by States to the Federal Budget”. When you consider that the red states are mostly the poorer states, with more people on welfare and medicaid and more federal assistance for schools and all the other liberal programs for the poor, it makes sense. What doesn’t make sense is why the poor people in these poor red states vote for Republicans who say they want to cut all these programs. This has been blogged about on various web sites like The Tax Foundation and Alternet. But the funniest rant that I’ve seen by far is this one, whose name contains a very bad word so please excuse my linking to it, which makes this argument, not only about the contributions to the federal budget, but about other Republican wedge issues like family values and religion. He points out that blue states (many of which have gay marriage) tend to have the lowest divorce rates (Massachusetts is the lowest) and red states the highest. And he says it all with a liberal (pun intended) sprinkling of bad words, so it’s even funnier if you like that sort of thing. I think the reason that those poor people vote against their self-interest is that they have a different view of what voting is. To me and you, voting is a way of choosing our leaders. To them, voting is a way of choosing their life. It’s an expression of who they want to be. I once knew a woman who came from a lower middle class/working class family and who was working her way up the the federal government in Washington, DC. She said she always voted Republican because someone she knew in college said Republicans were the party of rich people, so if you want to be rich, vote with them. And however naive that is, I think that’s exactly what’s going on. People from Mississippi and Alabama are saying “I’m poor and on welfare and I’ve had three kids out of wedlock or I’m divorced or my girlfriend and I decided to have an abortion and I feel terrible about all of it because that goes against my values and my aspirations, so I’m going to vote for the people who tell me that’s all bad. That will redeem me and get me into the club for good rich people.” Well, for some it’s about values and for some, they really just want to be rich. Remember “Joe the Plumber”? He was the guy who complained at a town hall meeting in the 2004 election that the Democrats had put too many restrictions on small businesses. These restrictions were probably for the benefit of the employees, but never mind. It turns out, Joe didn’t own a plumbing business. He hoped to one day own a plumbing business. At the moment he was an under-employed plumber trying to make ends meet. So instead of Joe being the poster child of the small business owner, he’s the poster child of the woebegone (yay, spelled it right!) working class that votes against it’s own economic interest. So I think maybe we need to give people some other way to express who they are and what their values are and what they want to be. I kind of thought that was called “living your life”. But apparently now it’s called voting. Not surprising, because voting is a lot easier than living. You just push a button. Or pull a lever. Or punch a butterfly ballot. Or twirl that doohickey. Or something, I don’t know what, Oh gosh I spoiled my ballot, I voted for Ralph Nader AGAIN!!! Voting is actually pretty easy, so it’s a good candidate (pun intended) for a no-hassle way to self-affirm. Of course as soon as people find a good thing they start to ruin it. Now Republicans want to make voting harder, too. Where’s my ID card? I need to find it before November. I feel a need to re-affirm that I’m an elite intellectual, and blogging is too hard. ******************************** Update: I guess if I still lived in America and watched the news, I’d know that Joe the Plumber is running for Congress.
Pharmaceuticals in Drinking Water? The problem of contaminated tap water in the U.S. goes well beyond Flint—and also beyond lead. There are many more toxic chemicals in our drinking water that we like to believe. Communities in New York, New Hampshire and Vermont recently found elevated levels of PFOA, a suspected carcinogen, in their water supplies. PFOA, or perfluorooctanoic acid, is a synthetic perfluoroalkyl chemical used to manufacture nonstick pan coatings and water-resistant clothing. And, even more recent is the finding that water discharged from Burlington’s wastewater treatment plant into Lake Champlain—the source of drinking water for tens of thousands of people in the Burlington area—contains concentrations of pharmaceuticals high enough to reflect demographic shifts in the city. The presence of pharmaceuticals in drinking water from different U.S. areas has been know for more than a few years. A report publicly released in 2011 by the U.S. Government Accountability Office revealed that drinking water in some metropolitan areas contains pharmaceuticals, and raised concerns about their potential impact on human health. According to the World Health Organization “Pharmaceuticals are synthetic or natural chemicals that can be found in prescription medicines, over-the-counter therapeutic drugs and veterinary drugs. Pharmaceuticals contain active ingredients that have been designed to have pharmacological effects and confer significant benefits to society. Pharmaceuticals can be introduced into water sources through sewage, which carries the excreta of individuals and patients who have used these chemicals, from uncontrolled drug disposal (e.g. discarding drugs into toilets) and from agricultural runoff comprising livestock manure. They have become chemicals of emerging concern to the public because of their potential to reach drinking-water.” Emma Rosi-Marshall, a scientist at the Cary Institute of Ecosystem Studies and lead author of a study published in 2013 on the effects of pharmaceutical pollution on aquatic life and water quality, said in a press release: “Pharmaceutical pollution is now detected in waters throughout the world. Causes include aging infrastructure, sewage overflows, and agricultural runoff. Even when waste water makes it to sewage treatment facilities, they aren’t equipped to remove pharmaceuticals. As a result, our streams and rivers are exposed to a cocktail of synthetic compounds, from stimulants and antibiotics to analgesics and antihistamines.” Results from a study published this year in the journal Science of the Total Environment show that water samples from private wells on Cape Cod are contaminated not only by perfluoroalkyl chemicals and flame retardants, but also by a dozen different pharmaceuticals. The researchers found that sulfamethoxazole, an antibiotic used to treat urinary tract infections, and carbamazepine, a drug used to treat seizures, nerve pain, and bipolar disorder, were among the most common pharmaceuticals detected. The researchers also found that the pharmaceuticals were present at concentrations orders of magnitude lower than those found in a therapeutic dose. However, Laurel Schaider, the study lead author, said in a press release: “But that doesn’t necessarily mean there’s nothing to worry about. Drugs are intended for specific uses and can have side effects, and we don’t give certain medications to pregnant women or children because the developing body is very sensitive.” Another concern is that people might have allergies to some of the drugs that contaminate the water. Antibiotics, for example, are known to cause allergic reactions in susceptible people. These reactions can be severe—they include symptoms that range from hives and wheezing to the potentially life-threatening anaphylactic shock. In the press release mentioned above, Schaider also said: “People often don’t think about where their tap water comes from. But it’s really important that they do and that they take steps to make sure it’s safe.” 24 Comments I am surprised to read that pharmaceuticals are so rampantly infesting our water, not because of the infestation itself, but because it may have an effect on our well-being. I recall when I was younger, and the neighborhood boys would try to persuade us that our drinking water was actually urine, filtered out. While that’s probably not actually how it works, it’s peculiar to me that trace amounts matter to us, rather than just animals. I wonder if there’s anything to be done about this, besides “damage control.” Can we clean the water that’s routed through our sewers and into our drinking glasses? As an employee of a local, independent pharmacy, surprisingly, I see the threat of pharmaceutical-contaminated water frequently. I cannot count the number of times a patient has entered into the pharmacy with bags full of expired prescription medications or drugs he/she is not taking anymore looking for a proper disposal method. We are thankful these patients come to us and ask because most people simply flush their medications down the toilet or sink. Having active ingredients from medications in our drinking water is a major health concern with risky consequences, so the FDA has a method that does not effect our water. The problem is, however, is not a lot of people know this or do the research — they simply flush the pills because it is easier. According to the FDA, you can safely dispose of medications in your household trash. They ask that you mix the medications with either coffee grounds or kitty litter, place it in a sealed bag, and simply throw it away with your garbage. If you do not feel comfortable using this method, the DEA holds national drug take-back programs where collection sites (i.e, police stations) are set up for the safe disposal of medications. This was a great informative read, and one that does not come as a surprise to me. Please keep in mind that this is going on in a country in which it is hard to find bottled water with simply just the ingredient “water” written on it and nothing more. Today’s bottled water can contain magnesium chloride, sodium chloride, and magnesium sulfate. This seems a bit excessive for such a simple beverage as water. There are claims that these ingredients are used to enhance the taste of water or to add minerals to the diet. In addition to this, the FDA allows small amount of contaminants in bottled water, as long as it is kept under a certain level. This includes bacteria called coliform, arsenic which we have spoken briefly about in class, and phenols. I challenge you to read a the ingredients on a bottle of water next time you drink. I think this is a definitely an issue that should be tended to quickly, no matter where it is occurring. I agree with many of the posters that this could be contributing to our problem of antibiotic resistance. One of the most common pharmaceuticals detected, sulfamethoxazole, can further aggravate conditions for those with autoimmune disorders. My question is what is being done to prevent this from happening? Even though the pharmaceuticals are in small amounts “deemed” harmless now, in the future it could definitely pose a problem. Considering our lack of fresh drinking water available, we should do what we can now to care for it the best we can. The issue concerning water contamination just as affrometioned in the article does indeed go beyond Flint, Michigan. Improper usage or disposal of many of our daily products have been shown to also be a contributory factor. And the idea that some pharmaceutical products makes its way to our drinking water is alarming. Pharmaceutical drugs or products contain some chemicals that when not handled or used correctly could lead to multiple effects. And knowing this same toxic substances makes its way to freshwater is also concerning not only for current generation but also for the future generation. I believe just as the article states educating people about large about the potential risks associated with contaminated water would in turn I believe raise awareness and lead to people taking action in hope of reducing the risks. There is a famous french proverb by Olivier Blanchette which states that “l’eau est source de vie” , meaning that water is a source of life, because we, as humans, can live without anything but water. When growing up with this in mind, and after reading that article, the only thing I can think of is how water that is supposed to give us life, be now contaminated will all the pharmaceuticals that can lead us to death? Yes! I say death because when I read the article I am not thinking about the fact that the doses present in the water are mild. I just think about how much water we have been consuming since we are born, and how that mild dose everyday is becoming worst as we go. Consequently, the only thing that I see now is how people can protect themselves from now on because the government does not seem to care about the population. The only measures that are found are related the pharmaceutical companies and the FDA such as: improve the design of the drugs such as they can be eliminated in the body and not go into excretion, FDA should be harsh regarding the approval of drugs, produce only necessary drugs. I found this feasible, so I do not understand why they are still not done yet. Because the measures are only related to them, but it seems that they do not want to take actions, I believe that they should at least find measures that could be applied to the population, to us. Consequently, we can have the choice of whether or not we want to take our own actions, and whether or not we want to save ourselves. That would be more fair to us, and it could save us some damages along the way. It was also very alarming to me to find out that the water we have been consuming contain such pharmaceuticals mentioned in this post. This was the first instance of me reading about water contamination with pharmaceuticals. According to the article, the U.S. government only took accountability in recent year and admitted the drinking water in some metropolitan are contain pharmaceuticals and raise some concern over potential harm to the population. Just as the flint crisis I feel like they are down playing the severity. I believe there need to be an extensive study needs to be done into water contaminations not only in metropolitan areas but other areas. Nevertheless, as you mentioned we really don’t know what kinds of side effect we will be facing with past and potential future exposures unless something can be done about it. In this study, a new analytical technique was used to effectively trace Carbamazepine, a anti-epileptic drug, and its metabolite found in urine that is recalcitrant compound. This drug has a high absorbance by crops in farms from contaminated underground water. The technique provided a selective and sensitive quantifications of the Carbamazepine and its metabolite in urine in the environment. This allow for a previously difficult detection in sewers to become a lot easier for cleanup efforts in the future. In searching up more studies on pharmaceuticals clean up I have noticed not a lot of study is being done to improve this issue. I am not sure f this is because pharmaceutical contamination of drinking water isn’t considering a priority or not but neglecting such a huge public health concern is only going to hurt us in the long run. This article talks about the presence of pharmaceuticals within the common person’s drinking water, which not only raises concern about the health effects on those who have consumed it, but also the length of time this problem has been present. Despite the drugs have been found in low concentration that are below the normal prescribed amounts , this still creates a form of danger to those drinking this water due to not only the mixture of them , but also take into consideration possible allergens to medications and what prolonged exposure can do to people. It simply raises flags that this situation has occurring for the past few years. It raises questions of the integrity of the United States water filtration and purification system, where else problems like this can be occurring without our knowledge. Review and possible remediation of water centers may be in the immediate future. There are so many chemicals polluting our drinking water today. The EPA requires drinking water treatment plants to test for up to 90 different contaminants and of that 90 surprisingly pharmaceutical drugs are absent from that list. This is frightening because there has been a growing concern regarding pharmaceutical drugs being found in our drinking water. A majority of these drugs are getting into our water because of people disposing of their medicines in the toilet. Even after FDA advised that people mix them with kitty litter or coffee grounds before putting it in the trash or dumping it at a collection site, people still result to flushing their prescriptions down the toilet. One thing I found interesting was that our body metabolizes only 90% of drugs that we intake, so the other 10% is either excreted through waste or sweat so, either way, these drugs are going to affect our water. However, if people can start disposing of their drugs the safe way as FDA advised that would minimize a majority of the drugs present in our water today. People drink water all the time so we cannot solely rely on wastewater treatment plants. We do not know how these drugs are affecting us, but the potential of risk is still present, and we cannot take that chance especially when pregnant women, the elderly, and young kids are drinking this water. Some believe that the problem could be solved if doctors lowered the dose of medication. I personally disagree with this because reducing the dose of medication for a patient might not be beneficial for them. Some people suffer illnesses that require a higher dose of medication and just because the dosage is lowered doesn’t mean people will stop flushing their medicine down the toilet. I think the best solution is to educate people about our drinking water, the different things that are currently affecting it, and ways that we can prevent people from experiencing negative effects from our water. If the antibiotics that are found in drinking water are still relatively active, the potential for the antibiotics to increase antibiotic resistance can also be an issue. Being that we already have an ongoing problem of antibiotic resistance, the possibility of drinking water contamination by antibiotics perpetuating the problem is of high concern. Unfortunately, antibiotics are not the only pollutant capable of causing health concerns. Some of these pollutants are not even regulated. It should also be noted that a lot of the contaminants found in water are not only a result of human pollution. A lot of chemicals occur naturally such as arsenic, manganese, mercury, and selenium. Granted, these elements do not do much to your health at low concentrations, but the problem is the increasing concentrations of these chemicals as a result of current industrial waste disposal procedures. Part of the problem is the lack of awareness of the issue. If you were to ask anyone if they know of the variety and amounts of chemicals that are present in their drinking water, most people would say no. This lack of awareness stems from the fact that the effects of water pollution are not readily apparent to people in developed areas. The problem also extends beyond humans into the ecosystem. From my experience, most people do not care about what happens to animals and plants in the wild as long as they get what they need. This attitude is also very common within the government when they are making the choice between money or conservation and sustainability. To a lot of people, if the government is not doing anything about water pollution, then why should they? Therefore, if prevention is not viable then we may have to resort to developing filtration systems that strive to reduce the amount of toxic chemicals in water and to enforce stricter regulation procedures. Reading this blog post and taking an overall look at the sustainability model that we have been talking about in class, it seems to me that there is one common problem tying the water crisis together. That problem is a lack of concern, knowledge, or to simply put it ignorance on our part. The water crisis in Flint exemplifies the lack of concern on the part of city officials. By trying to cut cost, they failed to understand the consequences of their actions and now the lives of people have to pay the price. The situation presented in this blog about how pharmaceuticals are now detected in the drinking water highlight our ignorance on proper drug disposal. One possibility to stop this problem is education. We need to educated people on the potential hazards of throwing chemicals and unused drugs away and also the proper way of disposal. Although it is stated in the blog that the concentrations of these pharmaceuticals are at low concentrations, it should be pointed out that having all these different drugs with different functions mixed together in drinking water could affect us and animals living in their environment. For example there have been drugs that have affected fish by alternating their eating habits and anxiety. With that being said, Eloy I agree with your statement that you made about how people do not care about what happens to plants or animals as long as they get what they want. Unfortunately some people really don’t care about this situation until it personally affects them whether it’s their business or their own personal health. Until then these people will continue with their habits which will undoubtedly have a profound impact on the lives of other people and the animals in the environment. In order to counteract that there needs to be new treatments in placed to treat pharmaceutical contaminated water. Current treatment approaches fail to remove most of the pharmaceuticals in water. There are new technologies that can help remove the pharmaceuticals in drinking water. One them is using carbon filters with uses activated carbon. One study has shown that is has helped removed 90-98% of pharmaceutical residues. Another new treatment is onzonation. Through this treatment electron rich structures in molecules are attacked due to ozone being a selective oxidant. Studies have shown that up to 95% of pharmaceutical residues can be removed. It is quite disturbing that not only are some areas of the United States, as well as those around the world, have an issue with emptying aquifers but the remaining water and water in the system used for drinking water is contaminated with chemicals and pharmaceuticals. Water could be argued to be the most important element in existence, especially for life. Yet somehow it has become a dumping ground for multiple dangerous compounds without regard for the consequences on human, animal and environmental safety and development. It is very unsettling that human beings have ruined our natural resources due to carelessness, greed and side effects of developing society. As of now, many scientists are attesting to the danger and potential threats looming with regards to the chemicals and pharmaceuticals in the water. According to the World Allergy Organization, infant allergies are on the rise, mostly those associated with food. This makes sense, since contaminated water is used to harvest and grow crops used to feed citizens. While the long term effects of the water contamination on human development and immunity is far from being understood, it is not a leap to be concerned that the effects of even small “non-therapeutic” dose of medication can be detrimental those humans especially infants. While the contamination has occurred and there is not much can do regarding that aspect of the problem, unless we had a time machine, we can prevent further contamination and develop methods for obtaining water from sources other than the bodies of water that are contaminated until they can be properly cleaned. We should take note of inventions such as those by Arturo Vittori. He invented a special tower designed to absorb water from the atmosphere. In order to protect our immune systems, future generations and the rising threat of antibiotic resistant bacteria, filtering and ensure our drinking water is clean should be one of the highest priorities! Although the chemicals in the water may be at a level that the human body can sustain, what will become of us as time progresses? Will our bodies still be able to withstand any harmful effects of this contaminated water? Scientists have already proven that chronic exposure to the low level of drugs in Lake Monroe of Indiana, the main water reservoir, causes lower reproduction rates and embryo development issues in zebra fish. Yes, fish and humans are not the same, but this does provide us with a glimpse of what could be if we don’t take steps to resolve this issue. Experts recommend that pharmaceutical companies find novel ways to dispose of their waste and even change the formulas of drugs to accommodate the water treatment process, which does not cater to many chemicals found in pharmaceuticals. This article was about pharmaceuticals being in the publics drinking water, which is a scary thought. The article does mention the concentrations being lower than the therapeutic dose. Some people might find that comforting but nevertheless people are still ingesting it. I enjoyed how the article ends on Schaider saying people need to take steps in making sure the water they drink is safe. Water is a universal solvent, so it has the ability to dissolve almost anything it comes in contact with. With this in mind, although water may look safe there is a chance it is not. The first way to be safe is to have your water tested. This can be done by the local water supplier or a state- certified lab. It’s also possible to test the water yourself. (2) At home test kits can test for: Bacteria, lead, pesticides, nitrates and nitrites, chloride, hardness, and more. The Water Quality Association has a few methods for point-of-use solution to treat water before consumption. One is the activated carbon, that filters out benzene, various pesticides, lead, and more. (1) It is recommended to at least test for coliform bacteria and nitrates because they are tied to intestinal illnesses and blue baby syndromes for infants. Knowledge is power, so the next thing is to get informed on the different contaminants that might be in your water. This way it can be known what device can protect you from them. 1. At the Faucet. (n.d.). Retrieved April 26, 2016, from https://www.wqa.org/Improve-Your-Water/Solutions/At-the-Faucet 2. How to tell if your water is safe | BabyCenter. (n.d.). Retrieved April 26, 2016, from http://www.babycenter.com/0_how-to-tell-if-your-water-is-safe_469.bc?showAll=true At least with the rooting around I’ve done on various sites, it seems like the levels of these pharmaceuticals are not high enough to cause any acute problems, but I think that this post and the linked article do raise valid concerns for a potential disaster in the future. I also wonder if there is a chance that the antibiotics that are being put into water sources will contribute to the buildup of resistant strains that will affect anyone who associates with the water source. While there is much work to be done in figuring out a proper industrial disposal of pharmaceuticals, it sounds like what will have the most immediate and impactful effect is for the general public to properly dispose of old medications. The FDA has a list, which they are continually revising, of medications that are considered safe to be flushed down the toilet (1). The FDA even recommends putting the drugs in a sealable plastic bag with coffee grounds, dirt, or kitty litter (2). Drugs that are not safe to flush can often be returned to local police departments, or some other government building, for proper disposal. I’ll even put a list of these places for the state of Georgia below (2) Drug-resistant bacteria were the first thing that popped in my head too after reading this article. Not only are antibiotics already misused a lot (sometimes with wrong prescriptions or people just taking them for any little headache or even a viral infection!), they are also getting introduced to our water sources? This can eventually lead to a recipe for some super-resistant bacteria. According to Wright, S. anti-biotic resistant urinary bacteria are already on the rise just from trimethoprom-sulfamethaxazole prescriptions alone. I agree with informing the public and giving safer methods of disposing the medications. Relying on the public to fix this problem totally might not be super efficient though as non-compliance has always and will probably always be an issue. In addition to informing the public, I think the pipelines used for transporting our water should be augmented in a way that there would be no cross-contamination. Better water recycling and purifying techniques could also be used in addition to the public help and better pipes. The advances in industry and medicine have been widely beneficial to mankind but the unseen consequence of our improvement has polluted our water supply. These contaminants include “antibiotics, hormones, contraceptives and steroids.” The U.S. Geological Survey found these pharmaceuticals in 80% of the rivers and streams they surveyed since 2000. The number has likely increased since then. The improper disposal of drugs has been a concern and been researched by the Citizens Campaign for the Environment (CCE). They state that the “possible health concerns include hormone disruption, antibiotic resistance, and synergistic affects” as well as the “alteration of behavior and reproductive function of fish and mollusks” due to antidepressants. These are just a few known outcomes; the danger comes from the side affects and the surprise cocktail of drug interactions. The lack of information about proper disposal of these drugs has lead to this epidemic. These problems can effects pregnancies, childhood development and other wildlife that unknowingly utilizes contaminated water sources. The FDA’s guideline for proper disposal is to locate take-back programs or to throw the drugs in the trash and not down the toilet. The drugs should also be mixed with unsavory substances to make them less appealing to children and pets and to be put in bags to prevent leakage. The water supply needs more careful monitoring and programs to actively remove these substances. Without awareness and actions we are doomed to be in fear of the water in our faucets. The original article emphasizes the newly prioritized and drastic effects pharmaceutical drugs being released into the environment. Specifically, these effects and concerns were focused on the human population. I’m not a huge animal-activist but I hate to see anyone or anything taken advantage of or left-out. So not including animals or wildlife organisms in this conversation would be unjust. We do not live our entire lives outdoors and in the actual environment like animals do. In fact, wildlife is exposed to the contaminated water and environment for much longer periods than humans are. We have treatment plants and precautions to help lessen the amount of pharmaceutical drugs in our water or food, but animals do not have this luxury. They take food and water as it comes. So I was interested to learn about the effects these released drugs had on other forms of life, besides our own. A study was done on the environmental effects, and a section was devoted to animals. Changes in a demographic can apply to animals, not just humans as mentioned in the article. Insects affected by pharmaceutical drugs can be changed physiologically and behaviorally. Other drugs can affect fish development and fertility. Antibiotics have the ability to affect animals that live in the soil by off-setting the sensitive ecosystem and environment. So not only are we depleting the Earth of freshwater, but we are ruining what we have with more than just lead like in Flint, Michigan. We are drastically out-numbered by other forms of life. Insufficient and contaminated water will affect these organisms, but humans definitely use the Earth more than our counterparts. This takes us back to what we discussed in class for two weeks. As the dominant users of Earth’s resources, we have to learn moderation AND “system thinking.” We already know the damage waste and apparently pharmaceutical drugs can do. Now we need to accept the problem, and make a commitment to fixing it. Some companies and workers have already started by controlling disposal of labeled pharmaceutical drugs, such as hospital-waste water. If the sources of pharmaceutical waste were better controlled, we would have less in our water. If we don’t make an effort to stop overusing and contaminating water, not only will we lose one of our most precious resources, but also many sources of food and organisms that keep us alive. Tanderson makes a valid point in mentioning how not only are the chemicals negatively affecting the human population but they are also affecting the animals. One thing that this made me consider is how humans implement this behavior. In addition to the chemicals that animals are exposed to in the environment, animals are also being used as a vector to bring more pollution to the environment, affecting animals and humans. Of course, the animal is not at fault but the humans are, as we continue to use animals in research and dispose of the waste in the environment. According to the link below, millions of animals are used in research and they produce an abundance of waste. They produce food waste, chemicals, diseases, even viruses. Also ground water and air are polluted due to incineration and soil pollution. So, not only are animals being affected by the pollution, but they are being used by humans to cause even more pollution. Going down this path, pharmaceuticals won’t be the only thing that we have to worry about being in our drinking water. I’m sure while reading this article many arrived to the supporting evidence in the article that mentioned that researchers found that pharmaceuticals were detected in lower concentrations than the therapeutic dose and thought, “then why is pharmaceutical contamination in water such a big deal?” Considering there are a significant amount of pollutants found in water like lead and mercury with more serious side effects, I know I did. However, I then arrived to the part of the article that mentioned a concern for those with drug allergies that could come across a drug that can trigger an allergic reaction in their contaminated water. According to an Associated Press investigation, antibiotics, anti-convulsants, mood stabilizers and sex hormones have been found in the drinking water of at least 41 million Americans. Keeping in mind common drug allergies to drugs such as penicillin-type antibiotics, sulfonamide-containing antibiotics, NSAIDs such as aspirin or ibuprofen, etc., it is important to note the potentially serious threat being posed on those with drug allergies consuming drinking water with possible traces of these drugs. Although no major health effects have yet been detected by the EPA, the matter should not be overlooked due to the possible allergic reactions that can arise by pharmaceutical contaminated water potentially causing sudden side effects such as hives, anaphylactic shock or death that may arise from simply drinking a cup of tap water. This is more so something to fear because it is not easily detectable and even more worrisome because water pollution by pharmaceuticals has been a concern for decades and has proven unreasonable to completely eradicate due to the pharmaceutical contamination of wastewater through feces, consumers flushing pills down toilets and also because most water treatments fail to remove all drug residue. It is important to note that not only is this contamination making its way into our drinking water, but also to rivers in which the fish we consume inhabit. After learning about the potentially serious long term health effects posed by consuming lead contaminated drinking water, I believe it is important to research the potential long term effects of consuming pharmaceutical contaminated drinking water, more specifically, the unknowing consumption of drugs that are not specifically prescribed to us through pharmaceutical contaminated water. Perhaps increased antibiotic resistance may arise by the continuous consumption of small traces of antibiotics or sudden mood swings may arise from the discontinuous consumption of antidepressants or even a serious drug interaction may arise from a drug unknowingly consumed through drinking water and a prescription someone may take daily. This is definitely one to look into. The fundamental element of survival for all creatures including ourselves is water and its scarcity and contamination is something we should put as top priority in solving. Freshwater has already been depleted because of global warming and air pollution but now we have to face the issue of pharmaceutical contamination in our drinking waters. Pharmaceuticals is indeed a potential need for the entire human population as it can save our lives or helps us maintain a stable lifestyle. However, these pharmaceuticals may not only contaminate our drinking waters but also waters in agriculture or wild animals we feed off of. Pharmaceuticals present in water may show defects in animals or the destruction of agriculture. When we consume these contaminated food or agriculture, we may develop certain diseases or illnesses. However, researchers are now trying to change the chemical structures of pharmaceuticals so they can be degraded in the body and in sewage treatment system before contaminating our waters. They’ve chosen propranolol for their study and changed its chemical structure but still has the function of treating heart problems and high blood pressure. This could be a potential strategy to reduce further pharmaceutical contamination in our drinking water in the future. The perpetuating problem with low concentrations of pharmaceuticals found in [private] wells is a complex issue that requires a collaborative effort. Although the concentrations measured by the researchers were significantly lower than the therapeutic dose, the current water crisis should act as a catalyst in recognizing the actual significance of these low concentrations of pharmaceuticals found in a water source that is almost entirely depleted. Furthermore, researchers have observed the extensive influence pharmaceutical-contaminated water has on important ecological systems that may result in detrimental consequences for higher trophic levels. The concentrations of pharmaceuticals in water can only increase if the causes for these issues are not addressed as the availability of necessary freshwater is diminishing right before our eyes. Domestic drinking water wells are often more shallow, increasing the chances of higher pharmaceutical concentrations in the water. Domestic wells are used in communities that are served by onsite wastewater treatment systems, providing source for pathogens and chemical contaminants in ground water in areas with high septic system density. The causes for these issues include aging infrastructure, sewage overflow, agricultural runoff and improperly equipped mechanisms of purifying drinking water. To put it blunting, human existence bears the fault for the current global climate and water crisis. Urbanization, increasing population, deforestation, and overall zealous misuse of the Earth’s resources without regard to the consequences of an increasing population in demand of resources that are being depleted at record breaking rates- play a detrimental role in our current global climate and water crisis. Fortunately, we come equipped with the means of addressing these issues; however, I understand that this is a more complex issue that requires significant financial support, education on the long term impact of pharmaceutical therapy and possible preventative measures, placing importance in knowing where your water is coming from and how it is being purified, and electing official representatives who place high priority in implementing efficient regulations for optimum water quality of the wells and aquifers that remain viable, as well as the global climate as a whole. In a collective effort, we can help minimize the large carbon footprint that we have already begun to leave. LTran, I agree with your point of view on this issue. Human negligent is absolute to blame for this aquatic pharmaceutical pollution problem that we’re encountering right now. Aside from the pharmaceutical manufacturers and agriculture farms negligently dumping their chemical water waste into the sewage system we also have to take into account the negligent of hospitals and the general public as well. First of all, chemicals can also get into the water from the drugs we use. Our bodies metabolize only a fraction of most drugs we swallow. Most of the remainder is excreted in urine or feces and therefore gets into wastewater. Topical medication such as creams or lotions, the unabsorbed portions of those medications can contribute to the pollution problem when they get washed off. Aside from our unintentional actions, what do you think regarding what people do regarding theirs expire prescriptions medicine? Yes, some of us may probably discard it through the right authority, but many people would just dump the med into the toilet or the trash. These chemicals eventually ended up into the sewer system, and then to our aquatic environment and causing such rising in our marine pollution. Health care institutions are another source of pharmaceutical water pollution. Some hospitals are probably less of a problem than other because their strict protocols regarding unused drugs but many do not. Many healthcare facilities especially nursing homes have often been guilty of flushing medications down the toilet or drain after a patient dies or is transferred to another facility. And the unspoken rules for getting rid of opioid painkillers, which make disposal down the drain an acceptable option, have inadvertently encouraged some nursing homes to dispose of all their leftover medications that way. Problems will continue to rise if we don’t take actions. In my point of view, there are a few different ways I can think of that we as the general public should do to cut down such an issue. First, limit the bulk purchase of over the counter drugs, this way peoples can cut down from discarding their unused medications. Second, use drug take-back programs to take back drugs locally and properly incinerate and discard them. And finally do not discard our medications down the drain and trash. If we can be more mindful regarding our actions, we may be able to create a better cleaner future. The idea that there are pharmaceuticals and other chemicals floating around in our drinking water is of major concern. Even in a developed country such as the United States, we too are facing the reality that our water might not be as safe as we are told. In several states, they have found evidence of chemicals such as PFOA a possible carcinogen and several pharmaceuticals either over the counter or prescribed within the drinking water. We are not aware what interactions or problems may arise with these chemicals present in our water. In the study Occurrence removal and risk assessment of pharmaceutical and personal care products (PPCPs) in an advanced drinking water treatment plant (ADWTP) around Taihu Lake in China, they found that even when using the guidelines for purification techniques there were three chemicals still found in the water. Those were caffeine, roxithromycin, and sulfamethoxazole. Caffeine has several drug interactions and when mixing with your medications it can cause effects such as increased heart rate, low blood pressure, irregular heartbeat, anemia, and can cause a caffeine overdose by increasing its effects (http://www.caffeineinformer.com/caffeine-drug-interactions). Sulfamethoxazole can cross the placenta and is considered a class C in pregnancy which is not safe to take while pregnant (http://www.drugs.com/pregnancy/sulfamethoxazole.html). There must be a reform in the way the water is treated, so that we know we can safely drink the water without worrying about the presence of harmful chemicals.
361 Mass. 341 (1972) 280 N.E.2d 179 HELENA M. RAUNELA, administratrix, & another vs. THE HERTZ CORPORATION & another. Supreme Judicial Court of Massachusetts, Worcester. February 7, 1972. March 6, 1972. Present: CUTTER, SPIEGEL, REARDON, QUIRICO, & HENNESSEY, JJ. Francis H. George for the defendants. John M. O'Connor for the plaintiffs. QUIRICO, J. This is an action in tort for negligence in which Helena M. Raunela, individually, seeks to recover for personal injuries sustained by her in an automobile accident, and in which she also seeks recovery, in her capacity as administratrix of the estate of her late husband, Mauno Raunela, for his conscious suffering and death resulting from the same accident. The defendants are The Hertz Corporation (Hertz) and Agnes D. Leahey as administratrix of the estate of her late husband Philip M. Leahey (Leahey) whose death also resulted from the same accident. The accident involved a collision between a Volkswagen automobile driven by Mrs. Raunela and owned by her husband who was a passenger therein at the time of the collision, and an International van body truck owned by Hertz and driven by Leahey. The case is before us on the defendants' exceptions to the denial of their motion for directed verdicts and the denial of their motion for a new trial. The plaintiffs' declaration is in six counts, the first four by Mrs. Raunela as administratrix, and the last two by her individually. The jury returned verdicts for the plaintiffs on all counts as follows: count 1: $40,000 against Leahey for the death of Mauno Raunela;[1] count 2: $2,000 against Leahey for the conscious suffering of Mauno Raunela; count 3: $40,000 against Hertz for the death of Mauno Raunela; count 4: $2,000 against Hertz for the conscious suffering of Mauno Raunela; count 5: $18,000 against Leahey for personal injuries to Mrs. *343 Raunela; and count 6: $18,000 against Hertz for personal injuries to Mrs. Raunela. In counts 3, 4 and 6 against Hertz, the plaintiffs alleged that Leahey negligently operated the truck as an agent, servant or employee of Hertz. The defendants' single answer to all counts consisted of a general denial, plea of contributory negligence, denial of agency, violation of law, statute of limitations, and denial of public way. On the defendants' exceptions to the denial of their motion for directed verdicts the test is whether "anywhere in the evidence, from whatever source derived, any combination of circumstances could be found from which a reasonable inference could be drawn in favor of the plaintiff." Kelly v. Railway Exp. Agency, Inc. 315 Mass. 301, 302. Adams v. Herbert, 345 Mass. 588, 589. We hold that such a combination of circumstances could be found in the evidence and that the case was therefore properly submitted to the jury for decision. The Volkswagen and the truck were traveling in opposite directions on the same highway, both approaching an intersection formed by another road crossing the highway. As the Volkswagen attempted to make a left hand turn into the cross road called Rindge Road, its right side and the left front of the truck collided within the intersection and in the lane in which the truck had been traveling. The car was pushed sideway for an unspecified distance and the truck turned over on its left side. There are no traffic controls at the intersection. The truck left brake marks on the pavement for a distance of over thirty-five feet to the point of impact. There was nothing to obstruct the truck driver's view of the intersection for a distance of 400 feet as he approached it. Before making the turn, Mrs. Raunela put on her directional lights, stopped and looked in both directions, and then looked straight ahead. She saw nothing coming so she made her left turn and had almost completed the turn into Rindge Road when struck by the defendant's truck. The jury could thus find that the truck was not in the 400 foot range of view when the car started to make its turn, *344 and that the truck thereafter came into a position where its driver could have seen the car making the turn and could have stopped the truck before it struck the car. It is now almost seventy years since the Legislature enacted the first general statute regulating the operation of motor vehicles. See St. 1903, c. 473.[2] It is also almost seventy years since the first motor vehicle tort cases started to appear in the reports of the decisions of this court. See Hennessey v. Taylor, 189 Mass. 583, decided in 1905. From those earliest decisions to the present time we have rendered numerous decisions reciting in detail the evidence which either did or did not warrant the submission of the case to the jury. Except in unusual cases it is doubtful whether it would add much to our jurisprudence to continue with such detailed recitals of evidence in passing on exceptions to the allowance or denial of motions for directed verdicts. The barest outline of the evidence should suffice for such purpose except in unusual cases. The day after the jury returned their verdicts, the defendants filed a motion for a new trial. The motion is not reproduced in the record, and the bill of exceptions does not state the grounds upon which the new trial was sought. The bill shows only that "after hearing, the court granted a new trial on Count I of the plaintiff's declaration unless the plaintiffs remitted the sum of... [$20,000] and denied the motion as to Counts II, III, IV, V, and VI ... to which action the defendants excepted. The plaintiffs filed a remittitur as to Count I ... leaving said verdict in the net sum of ... $20,000." A copy of the docket entries received by this court from the clerk of courts for Worcester County reflects only that the motion for a new trial was allowed "on count I on grounds I & 3 in motion" and that it was "Denied as to all other counts." It also shows the order for remittitur. This still leaves us with a record which gives no information as to the *345 grounds of the motion or the basis for the action of the court thereon. It is only by resort to the briefs that we are able to discern what the defendants are attempting to place before us by their exception to the judge's action on the motion for a new trial. The judge instructed the jury that if they found for the plaintiff administratrix on the two counts for death they should determine the amount of damages "in the sum of not less than five thousand dollars nor more than fifty thousand dollars to be assessed with reference to the degree of ... culpability." This instruction was erroneous because the death statute in effect when Mauno Raunela died, viz. on November 11, 1965, prescribed a range of damages from $3,000 to $30,000. G.L.c. 229, § 2, as amended through St. 1962, c. 306, § 1. The increase of the range to $5,000 to $50,000 was effected by St. 1965, c. 683, § 1, approved September 7, 1965, but by § 2 thereof the increase applied only to deaths resulting from injuries sustained or accidents occurring on or after January 1, 1966. Despite this error, neither party saved any exception to the charge. The error was not discovered until after the jury were discharged. The defendants are now attempting to use their exception to the judge's order on their motion for a new trial as the vehicle by which to obtain our review of the admittedly erroneous instruction as to damages. "A motion for a new trial ... need not be entertained when based upon alleged errors of law that either were raised or could have been raised at the trial." Peterson v. Hopson, 306 Mass. 597, 600, and cases cited. Devore v. Good, 321 Mass. 84, 85-86. "While a judge may in his discretion permit such a question to be presented on a motion for a new trial, he cannot be required to consider it." Hathaway v. Checker Taxi Co. 321 Mass. 406, 412. Ordinarily an exception to the denial of such a motion will not be sustained by this court where the record shows no abuse of discretion by the judge. The defendant has not claimed abuse of discretion with *346 reference to the judge's denial of the motion for a new trial on the two counts for conscious suffering and on the two counts for Mrs. Raunela's injuries. The only error argued by the defendants in their brief was the judge's conditional allowance of a new trial on count 1 unless the plaintiff agreed to a remittitur of $20,000. This verdict was thus reduced from $40,000, which was $10,000 above the maximum permitted by the applicable death statute to $20,000, or $10,000 below such maximum. The judge's action on count 1 was a proper exercise of his discretion and of the authority vested in him by G.L.c. 231, § 127, as amended through St. 1967, c. 139, which provides in pertinent part: "The court may, at any time before judgment, set aside the verdict in a civil action and order a new trial for any cause for which a new trial may by law be granted.... A verdict shall not be set aside as excessive until the prevailing party has first been given an opportunity to remit so much thereof as the court adjudges is excessive." The determination of the amount of remittitur was the responsibility of the judge, provided only that the amount of the resulting verdict was within the range of damages permitted by the applicable death statute. The record shows no abuse of discretion in the judge's discharge of that responsibility. The plaintiff having agreed to the remittitur, the verdict on count 1 stands at $20,000 without the necessity of a new trial. Kenyon v. Vogel, 250 Mass. 341, 344. Nicklas v. New Bedford, 250 Mass. 471, 473-474. There is another matter which we think requires attention in order to avoid a miscarriage of justice, although it does not appear to have been raised or argued by counsel on either side. The verdict on each of counts 1 and 3 for death was for $40,000 and thus both were in excess of the $30,000 maximum permitted by the applicable death statute. Although the judge reduced the verdict on count 1, he denied the motion for a new trial as to count 3. There is nothing in the record or the briefs to explain or account for this difference in the judge's action on these *347 two verdicts for death. There could be no lawful verdict on count 3 for an amount in excess of $30,000. The counts of the declaration alleging causes of action against Hertz do so on the theory that at the time of the accident Leahey was driving the truck as its agent, servant or employee. In this state of the pleadings, the verdicts against Hertz could not be based on any negligence apart from or independent of that of Leahey. Lemay v. Springfield St. Ry. 210 Mass. 63, 67-68. Foley v. John H. Bates Inc. 295 Mass. 557, 563. Zarski v. Creamer, 317 Mass. 744, 746-747. Accordingly, the verdict against Hertz should be in the same amount as the verdict against the estate of Leahey, whose negligence appears to have furnished the yardstick for measuring the "degree of culpability," for purposes of computing damages under G.L.c. 229, § 2, as amended. It was error for the judge to allow the verdict of $40,000 on count 3 against Hertz to stand in that amount. The case is to stand for further appropriate action in the Superior Court to reduce the amount of the verdict on count 3 to $20,000. Exceptions sustained as to count 3, and overruled as to all other counts. NOTES [1] The amount of this verdict was later reduced to $20,000 as hereinafter appears. [2] For more limited earlier legislation, see St. 1901, c. 192, and St. 1902, c. 315.
--- id: 5900f42f1000cf542c50ff40 challengeType: 5 title: 'Problem 194: Coloured Configurations' forumTopicId: 301832 --- ## Description <section id='description'> Consider graphs built with the units A: and B: , where the units are glued along the vertical edges as in the graph . A configuration of type (a,b,c) is a graph thus built of a units A and b units B, where the graph's vertices are coloured using up to c colours, so that no two adjacent vertices have the same colour. The compound graph above is an example of a configuration of type (2,2,6), in fact of type (2,2,c) for all c ≥ 4. Let N(a,b,c) be the number of configurations of type (a,b,c). For example, N(1,0,3) = 24, N(0,2,4) = 92928 and N(2,2,3) = 20736. Find the last 8 digits of N(25,75,1984). </section> ## Instructions <section id='instructions'> </section> ## Tests <section id='tests'> ```yml tests: - text: <code>euler194()</code> should return 61190912. testString: assert.strictEqual(euler194(), 61190912); ``` </section> ## Challenge Seed <section id='challengeSeed'> <div id='js-seed'> ```js function euler194() { return true; } euler194(); ``` </div> </section> ## Solution <section id='solution'> ```js // solution required ``` </section>
Sony Although band.it can fit on lenses from any manufacturer, these are specifically sized for the Sony line-up. The band.it can stop lens creep, act as a replacement Sony OEM zoom ring or OEM focus ring, or simply improve a photographer's grip on their lens. Professional Sony repair shops can take time and cost hundreds. If the zoom or focus collar is simply loose, the band.its for these lenses are perfectly sized to fit in the existing grooves.
Design of a structure-based model for protein folding from flexible conformations. The use of coarse-grained models is important in many fields, especially those that use computer simulation to analyze large systems in processes that span long-time scales, as happens in protein folding. Among those approaches, structure-based models have been widely and successfully used for a few decades now. They usually take a single native conformation, experimentally solved, of the protein studied to determine the native contacts, which subsequently define the interaction potential for the simulation. The characteristics of the folding transition can then be analyzed from the computed trajectories. In this paper, we consider the possibility of enriching these models by considering the structural fluctuations present in the native state of a globular protein at room temperature in an aqueous environment. We use the different conformers experimentally provided when the protein structure was determined by nuclear magnetic resonance (NMR) spectroscopy as an approximate ensemble to test our methodology, which includes the definition of a global interaction potential and the analysis of the thermodynamic and structural characteristics of the folding process. The results are compared with traditional, single structure models.
private itemSelected fileInfo file: fileList selectedFile
Three women who were freed from a London home after 30 years had been allowed outside in "carefully controlled circumstances" during their ordeal but were victims of "slavery, in simple terms", a senior British police officer says. Commander Steve Rodhouse described a "complicated and disturbing picture of emotional control over many years" in the case of the women, declining to say how they wound up in the south London home. Two suspects, a man and a woman, were arrested early on Thursday (local time) on suspicion of forced labour and domestic servitude. He said investigators are trying to figure out "what were the invisible handcuffs that were used" to exert such control for the 30 years the women were allegedly held captive and subject to physical, mental and emotional abuse. "It is not as brutally obvious as women being physically restrained inside an address and not being allowed to leave," Rodhouse said. "This may have appeared to be a normal family." The disclosure Thursday that a 69-year-old Malaysian, a 57-year-old Irish woman and a 30-year-old Briton were freed after apparently spending 30 years in captivity prompted a flurry of speculation and questions about how such a tragedy escaped notice for so long. The arrests were made after the Irish woman phoned a charity last month to say she was being held against her will along with two others. The charity engaged in a series of secretive conversations with the women and contacted police. Two of the women eventually left the house, and police rescued the third. The case has sent shockwaves throughout Britain and around the world, but is the latest horrifying case of a broader phenomenon that officials warn is still happening - and on the rise. "Cases of modern slavery are becoming more prevalent in Europe," said Rob Wainwright, director of Europol, the European Union's law enforcement agency. "Unfortunately, it remains a low priority for many national police authorities. Europol is committed to fostering stronger international police action in this area and to raising greater levels of public attention." Since the most recent expansions of the EU and the lifting of restrictions on employment in many countries, instances of situations which amount to forced labour have increased, Europol says. Anti-slavery charity The Walk Free Foundation last month released a global index that estimated that more than 29 million people live in some form of modern slavery - which can take the form of domestic servitude, forced marriages, child trafficking and forced labour. While the index found that Africa and Asia are home to the vast majority of modern slaves, it estimated that there are up to 4600 slaves in the UK - a country which had the lowest estimated prevalence of slavery in a ranking of 162 countries. Fiona David, of Walk Free, said on Friday that the most recent case in London highlights that slavery can be perpetrated by "just people living in the neighbourhood", not necessarily "organised criminals". The suspects - both 67 - have also been questioned on suspicion of immigration offences, police said. Regarding their identity, police would only say that the suspects were not British and had been in the country for "many years". They would not elaborate on the pair's nationalities, but did note that both had been arrested in the 1970s. Police did not say why. Both suspects have been released on bail, having surrendered their passports and agreed not to return to their house as part of their bail conditions. Police say they do not believe there are other victims in the case, and they are confident that they know the true identities of the three women. The relationships among the women - and between the women and the suspects - are under investigation, police said. "Whilst we do not believe that they have been subjected to sexual abuse, we know that there has been physical abuse, described as beatings," said Kevin Hyland, head of the Metropolitan Police's human trafficking unit. He and Rodhouse defended the lapse in time between October 25 - when the women gained freedom - and the arrests, saying that the case is complicated and investigators must be careful to ensure they do not further traumatise the victims as they unravel the events of the past 30 years. Hyland also urged patience as the case unfolds, noting that officers must sift through 55 bags of evidence seized in a search of the home, interview several people and follow up numerous strands. Police noted that the case was "unique" not least because of the length of women's ordeal, though the UK has seen a string of high-profile slavery cases in recent years. Last month, an 84-year-old man was jailed for repeatedly raping a deaf and mute girl he trafficked into Britain from Pakistan and kept as a virtual slave. Police in Wales have arrested at least seven people in recent months as part of a long-running investigation into a suspected slavery ring there.
The present invention relates to a video monitoring system, and more particularly to such a video monitoring system which comprises a transmitter unit that detect predetermined detecting zones, and a receiver unit which is operated by the user to control the operation of the transmitter unit at a distance. Regular commercially available video telephones can only transmit audio/video signals, and provides only one single picture. These video telephones cannot be linked to a video camera for image output. When a video telephone is connected, it immediately transmits detected image to the opposite party without through a recognition process. Further, these video telephones do not provide burglar-alarm function, remote control function, or automatic dialing function. If a remote control function is required, additional circuit means must be installed.