text stringlengths 8 5.77M |
|---|
Flight helmet
A flight helmet, sometimes referred to as a "bone dome" or "foam dome", is a special type of helmet primarily worn by military aircrew.
A flight helmet can provide:
Impact protection to reduce the risk of head injury (e.g. in the event of a parachute landing) and protection from wind blast (e.g. in the event of ejection).
A visor to shield the eyes from sunlight, flash and laser beams.
Noise attenuation, headphones and a microphone (except when included in a mask).
A helmet mounted display, mounting for night vision goggles and/or a helmet tracking system (so the aircraft knows where the pilot is looking).
The design of a flight helmet may also consider:
Comfort - including the weight, centre of gravity and provision for cooling and ventilation.
Compatibility with an oxygen mask (for high-altitude flight and NBC protection).
History of flight helmets
In the first days of aviation the leather helmets used in motor-racing were adopted by pilots as head protection. The initial design of early leather flying helmets was adapted during the 1930s to become the type B helmet which enabled the external attachment of radio earphones oxygen masks and removable goggles to protect pilots eyes from the elements.
By World War II, an oxygen mask was added to the equipment as planes flew higher where thinner air required a breathable air supply to the pilots and crew. After World War II into the Korean War, the leather headpiece was gradually replaced with a hard helmet needed as head protection during bailing out (and later with high velocity ejection). Also, goggles were replaced by a visor that was incorporated to the helmet and tinted to protect against sun. Current head gear (appears after the Vietnam War) also includes communications equipment (head set and microphones) to let pilots communicate with ground operations and their crew.
References
External links
Images
USSR fighter pilot helmet
Category:Helmets
Category:Aircraft components
Category:Aviation medicine
Category:Aircrew clothing |
Q:
Why bind OpenGL buffer objects?
In OpenGL a general procedure is to bind a named buffer object (or vertex array object, framebuffer, ...), invoke some operations on the currently bound object and then bind some kind of "default" object:
glBindBufferObject(GL_ARRAY_BUFFER, bufferObjectName)
glBufferData(GL_ARRAY_BUFFER, data, GL_STATIC_DRAW)
glBindBufferObject(GL_ARRAY_BUFFER, 0)
(LWJGL in Kotlin)
I just discovered that there are "named" version for many functions. The example from above would become something like
glNamedBufferData(bufferObjectName, data, GL_STATIC_DRAW)
which is way more suitable in an object-oriented context.
So why use something like in the first example? Every tutorial I came upon used the first approach, so is there some performance lost or similar downsides in the "named" approach?
A:
The named functions are part of the ARB_direct_state_access extension which was introduced in OpenGL 4.5. Before that only the normal methods existed.
The main reason for using the older version is when targeting pre OpenGL 4.5 hardware. Most tutorials are also written against older versions of OpenGL.
|
Best of 2012: Fashionably great
I had a fabulous time, if you will, as a panelist and participant in last night’s Fashion Lawyer Marketing CLE at Fordham Law School’s Fashion Law Institute. I certainly learned far more than I taught, but of course, that makes sense, considering that I was only one-third of the panel. Attendance was so good that people even sat in the front row! I didn’t even see people looking at their smartphones. (Someone said that’s because there’s no signal in the room, but that’s just crazy talk.)
Prof. Jeff Trexler, Bernice Leber, your blogger, Ted Max
Some highlights:
The fascinating and insightful Professor JeffTrexler moderated, and first called on Bernice Leber, who besides having done everything a lawyer can do right in a career has also been the president of the New York State Bar Association. She walked briefly through the history of lawyer advertising regulation and laid out the standards that apply today, mostly focusing on the attorney advertising rules in New York (many of which are her handiwork!) but without failing to address the complex nature of multi-jurisdictional and online practice in our era. Bernice also discussed specific cases that have come before ethics panels and acknowledged that applying the standards in a social-networking, multimedia, branding-branding-branding world can be tricky.
I spoke next. Obviously I spoke about myself. In other words, I acknowledged the fact that I was invited to participate in the panel in part because I am considered a “success” a “branding” my practice among fashion lawyers — having come to terms with the fact that I probably really am a “fashion lawyer,” just kind of a lumpy one — and that it probably does “work” for me. But I made a point of discussing how conflicted myself is about all this myself-talking-about. Believe me, I am. It’s almost embarrassing, really. Indeed, I said, (a) I’m not sure what it really means to say that all this @roncoleman “branding” “works,” in terms of “fashion” clients; (b) what I do on this blog and in social networking is, to put it mildly, not for everyone; (c) what I do here is certainly not for everyone who wants to represent major fashion houses or the other big-money parts of the fashion “industry,” but that (d) people who represent smaller clients in design, retail and other parts of that business are also fashion lawyers, and … that’s okay; (e) unfortunately, while there are opportunities in marketing to and serving such clientele, the first part is easier than the second if you don’t have bona fide experience — ideally representing Big Fashion for a meaningful period of time, as I have been privileged to do — and that (f) yeah, I know, that experience is not so easy to get these days. By the end of my presentation I managed to ensure that not one participant would get any ideas about sending me a resume.
Not so the next speaker, the highly tall and distinguished and stentorian and charming Ted Max, who did not hesitate to reinforce my point that we way we do things here at LIKELIHOOD OF CONFUSION® is not for everyone. Ted recommended the approach of being really successful instead, and discussed fashion lawyer “branding” in the broader sense of career development — seeking to be the person, for example, in a general-practice environment, who seeks IP- or fashion-related assignments; writing and publishing; and observing basic (but widely misunderstood) tenets of networking which focus on adding value to others (in this case, fashion clients) without expectation of recompense. To do this properly, he explained, and to otherwise “brand” yourself effectively as a fashion lawyer — whether within or without your organization — Ted stressed the need to truly learn about the industry you wish to serve and get to know people in it. Clients can tell, he says, if you “get it” or not. They insist on working with lawyers who get it, as Ted does.
Ted noted, in the nicest possible way while gesturing obviously (but affectionately) towards me as a counterexample , that in terms of “personal branding,” major fashion clients don’t want it. They are the brand, not you. And he is 100% right. This raises a bit of a dilemma, of course, for young lawyers seeking to break into fashion law in the 2010’s as opposed to the 1970’s or ’80’s, before the fashion business’s boom. That boom, as Ted pointed out, was in no small part the product of the far greater number of department stores, and hence opportunities for design startups to get designs out to the public. Yes, we have the Internet today, but the Internet probably amplifies the domination of extant brands and designers rather than open up opportunities for innovation in the field. For what it’s worth, Ted said that, like Bernice and me, he never woke up and decided he wanted to be “a fashion lawyer” and doesn’t necessarily think of himself as one. We are all, he said, lawyers who are privileged to have fashion clients, among others.
We took a few questions afterward. One was a follow-up on the subject of “getting to know the business,” an area in which Bernice, Ted and Jeff could speak far more expertly than myself. Besides reading Women’s Wear Daily and going to fashion-industry events, what else would the panelists suggest? We all agreed that young lawyers don’t know enough about the business of business, fashion industry or otherwise, and should make it theirs to know how to read financial statements and balance sheets and to understand the nitty gritty and culture of the industry in order to serve them well.
From there we segued to further discussion I alluded to in my comments: There is a perception that a lot of people who are interested in fashion law are, perhaps, mainly interested in pretty things but their daddies made them to law school so here’s how they’re going to “follow their passion.” This image is reinforced by the proliferation of light-as-air “fashion law blogs” focusing a little too much on the pretty new things they’re showing this year and not quite enough on legal analysis, case developments and, God forbid, anything original. That’s not good “fashion lawyer branding.” (A good example of a fashion law blogger who, in contrast, demonstrates her hands-on comprehension and professionalism regarding fashion law is Staci Riordan, as exemplified in this post.)
There was discussion as well of the stress on young lawyers to skirt ethical limitations on marketing, especially with respect to candor about their inexperience, when they’re facing underemployment and over-indebtedness. At this juncture Jeff Trexler, whose background is in classics, sagely noted the connection between our word “ethics” and the Greek concept of an ethos, meaning, in a sense, a statement of “what you are about” — ironically, a classical concept of branding. That’s a good point to focus on in ending this recapitulation of an industry that seems to focus so much on dressing up to look as if you are about something and a young cadre of professionals who, for a range of reasons, want to dress up to serve that constituency as attorneys.
This was one of the most engaging and consciousness-raising CLE’s I’ve either given or attended. And the discussion at the panelist and event team dinner afterward, which went on until they pretty much kicked us out of the restaurant at 11, was a fitting follow-up. (If I get some clearances perhaps I will divulge some of that talk as well in a later post.) All this is, of course, a testament to the vision and talent of — did you think I was going to forget? — the doyenne of fashion law, Susan Scafidi, academic director of the Fashion Law Institute and the fashion law lady we all want to grow up to be.
Thanks to Susan, and her crack team (including Jeff Trexler, of course, as well as her Fashion Fellow Females) for making it all happen, and for inviting me to participate!
Check out Clouthub – GetClouthub.com/Ron
The Title, the Blog and the Blogger
The question of whether consumers are likely to be confused is the signal inquiry that determines if a trademark infringement claim is valid. I write here about trademark law, copyright law, brands, free speech (mostly as it relates to the Internet) and legal issues related to blogging. That may sound like a lot, but it's just a blog.
READ THIS FIRST OR ELSE
THIS BLOG IS ONLY A BLOG, NOT LEGAL ADVICE. IT IS IN PART AN ADVERTISEMENT FOR LEGAL SERVICES BY RONALD D. COLEMAN, AN ATTORNEY ADMITTED IN NEW YORK AND NEW JERSEY ONLY, BUT HE IS NOT YOUR LAWYER. YOU ARE NOT HIS CLIENT CLIENT. JUST WALK BESIDE HIM AND BE HIS FRIEND. |
Q:
Prevent content from a div showing under another div
I want to prevent this happening. How can I avoid the limits in red are not surpassed by the central text? At full screen the text is shown correctly but when I resize I want the text to stay as a "block".
<div class="centered">
<div style="float: left; width: 20%;text-align : left">Title1 Title2<br>Components<br> Comp1 <br> Comp2 <br> Comp3 <br> Comp4 <br> Comp5 <br> Comp6 </div>
<div style="width: 80%;text-align : center; float: middle;"><p align="justify"> Historia </p></div></div>
</div>
A:
You can apply overflow: hidden to the second div.
That way it will force it to stay as block element.
Demo
|
Rainbow phenomenon sweeps over Pope Francis spectators
Related
From East Harlem to Central Park Friday evening, spectators awaiting Pope Francis took notice of rainbows that seemed to appear in the sky.
Photos of short colorful bands began to circulate on Twitter and Instagram, with some users saying they saw the rainbows as a divine recognition of the pope's presence.
Francis stopped by an East Harlem Catholic school at about 4 p.m. before a procession through Central Park and Mass at Madison Square Garden.
"Even the rainbow decided to come out to greet the pope," Twitter user @SMB930 wrote from Central Park.
"God is present. Out of the blue.. a tiny rainbow! Pope Francis is almost here!!!," Twitter user @AngelaCardenas_ added.
It's more likely the weather brought the colorful light rather than the pope, said Jay Engle, a National Weather Service meteorologist in Upton.
The metropolitan area saw a group of high-floating wispy cirrus clouds in the upper atmosphere Friday, Engle said. Those clouds contain ice crystals, which bend the sun's the light into small bands of color.
"Probably what you're seeing is refracted light," Engle said. "It's not uncommon when you have cirrus clouds that they can refract sunlight."
Typical rainbows are created when sunlight passes through water droplets in the atmosphere, such as after a rainstorm, according to National Geographic.
Weather service data shows clear and sunny to partly sunny skies over Manhattan for the rest of the day. That weather pattern isn't unusual, Engle said. And there's potential for more light refraction to show up. |
[Abdominal obesity and associated comorbidities among primary care patients].
Abdominal obesity is associated with type 2 diabetes, cardiovascular disease, dyslipidemia and hypertension. The prevalence of abdominal obesity and its relationship with these comorbidities have not previously been examined in Danish primary care patients. The IDEA study was an international cross sectional study including 168,159 patients worldwide. In Denmark, 47 randomly selected general practitioners included 847 consecutive patients. Age, gender, waist circumference, body mass index (BMI) and the presence of known comorbidities were recorded for all patients. The prevalence of abdominal obesity (waist circumference = 80 cm for women and = 94 cm for men) was 66% among women and 60% among men. There was a significant relationship between the degree of abdominal obesity and the prevalence of diabetes, dyslipidemia and hypertension for both sexes. There was a trend towards an increased prevalence of cardiovascular disease with increased waist circumference. Abdominal obesity is very frequently found in Danish primary care patients, and it is associated with an increased prevalence of diabetes, dyslipidemia and hypertension. Patients with increased waist circumference should be screened to diagnose comorbidities related to the abdominal obesity. |
This invention relates to a bicycle shock-absorbing apparatus, and more particularly, to an apparatus that utilizes elastomer polymers instead of springs or the like to absorb a shock from a uneven terrain.
A conventional bicycle does not have any shock-absorbing apparatus attached to either the front or rear wheel axle. Therefore, a biker will feel discomfort when passing over an uneven terrain. In addition, long term use on an uneven terrain will damage the bicycle. With the above drawbacks, the bicycle needs to be improved to have better performance.
An off-road bicycle (or a mountain bicycle) is popularly used for sport and leisure. Therefore, a safe and trouble-free bicycle is a basic requirement for off- road use. A number of front fork designs have been disclosed for off-road motorcycles. However, a bicycle is quite different to a motorcycle in many ways, such as the momentum of a motorcycle is much greater than that of a bicycle under normal use, as a motorcycle has a greater mass and is used at higher speeds than those of a bicycle. Therefore, simply adapting a current motorcycle shock-absorbing apparatus onto a bicycle is not feasible.
U.S. Pat. No. 4,971,344, teaches a bicycle with a front fork wheel suspension that utilizes a pair of telescoping tubes and a spring-loaded valve, so that the latter can regulate the flow of fluid between the pair of telescoping tubes and thus absorb shock from an impact.
U.S. Pat. No. 5,094,324, which belongs to the present inventor, also discloses a bicycle shock-absorbing apparatus comprising an inner tube, a valve device, and an outer tube cooperating with a pair of springs and damping oil loops therein for absorbing the shock impact from an uneven terrain.
Another U.S. Pat. No. 5,088,705, which also belongs to the present inventor, discloses a bicycle shock-absorbing apparatus comprising an inner tube and an outer tube. An upper spring socket and an lower spring socket are disposed in the inner tube and the outer tube separately. A compression spring is disposed between the spring sockets, oil being filled between the spring sockets. The inner tube is fixedly attached to the upper spring socket and corelatedly actuated with the spring to achieve a shock absorbing effect.
However, the above disclosures utilize springs which are apt to loose elasticity in use over a long time. The change of the spring(s) is cumbersome because the spring has to be linked with corelated socket(s) and the damping oil will cause trouble when changing the spring. |
Not sure if this allowed, I'm out of Ninjaflex filament and the next batch won't arrive until December and I have 1 tyre left to print! Would anyone consider printing it for me for an agreed upon price and shipping it? Please pm me here or email me at dhooie (at) gmail.com |
In general, a computer program consists of a sequence of instructions all of which belong to a particular instruction set. At the appropriate time, each instruction is typically loaded into an instruction register where it resides while being decoded and executed. The execution of one instruction normally involves a plurality of steps. In many processors, each of these steps is performed by the execution of a microinstruction which may be stored in a read only memory. Accordingly, for these processors, a stage is required whereby a sequence of microinstruction memory addresses are provided for one instruction. In the prior art, this has been accomplished through the use of hardware logic that decodes the instruction. Commonly, each instruction is divided into a plurality of fields, each field consisting of a single bit or contiguous bits. Examples of fields are format, operation code, address mode, register specification, etc. The number, size, and types of fields may vary within one instruction set. Generally, the hardware decode logic determines the particular format from a delineation field within the instruction and then decodes the remainder of the instruction according to that format. However, when it is desirable to emulate a different processor using a different instruction set, different hardware decode logic is required. |
Hey I dont see to much about the Hawks at all over here in NH, but I was wondering something...
Did Wilson play that well in the rpeeseason or was Flynn that BAD in the preseason wilson got the job?? 9I mean you guys went out and paid big bucks get Flynn so I am just wondering how Wilson was able win the job before game 1 even happened.)
Flynn definately wasn't underwhelming IMO. He seemed to be a very capable game managing "dink n dunk", "take whats there" type of QB, which is not a bad thing. He seemed to be able to take care of the ball and hit the open guy for a decent gain, but that's all he looked like. He looked like Kyle Orton or Matt Cassel, who aren't bad quarterbacks by any stretch, but they aren't "special". After the last few years, I'd have been happy as anything to have that kind of QB.
But Russell Wilson looked like he had the potential to be so much more than that, and still does IMO. But he's a rookie QB who's going to go through the rookie QB learning curve, which is where we find ourselves. Barring anything horrible, I can see Rusty having a pretty damn good career, full of playoff runs and pro-bowls.
FREE PEHAWK
Sac>CANI love Sac with all my heart, and wish I were half as handsome as he.^I know this is here, but leaving it b/c YOLO.
CANHawk wrote:Flynn definately wasn't underwhelming IMO. He seemed to be a very capable game managing "dink n dunk", "take whats there" type of QB, which is not a bad thing. He seemed to be able to take care of the ball and hit the open guy for a decent gain, but that's all he looked like. He looked like Kyle Orton or Matt Cassel, who aren't bad quarterbacks by any stretch, but they aren't "special". After the last few years, I'd have been happy as anything to have that kind of QB.
But Russell Wilson looked like he had the potential to be so much more than that, and still does IMO. But he's a rookie QB who's going to go through the rookie QB learning curve, which is where we find ourselves. Barring anything horrible, I can see Rusty having a pretty damn good career, full of playoff runs and pro-bowls.
Read this explanation and all but ignore the others... It was quite the polarizing issue so everyone tends to have a biased opinion. Also, Flynns contract wasn't that big, especially after the first year. He'll make about 5 mill next year and then 6 the year after if we keep him through the next 2, so he could be an interesting trade possibility. That is only if Russell Wilson holds onto the job, plays well, AND we can get another backup quarterback who won't be huge drop off from Flynn.
Russel outplayed Flynn in the preseason and showed the potential to be special. In addition the coaches and players said his work ethic, film study and leadership qualities tipped the scales in his favor. During camp we heard the praise about how he's the first here, last to leave and is out-studying everyone in the film room.
I tend to agree that Flynn's future is based on Wilson's progress, but while Flynn is higher paid...The FO only guaranteed that money for two years, so from a business standpoint he is a value and we did not over spend for him even as a back-up IMO.
I ask about the trade possibility because a team say Like Buffalo could give up as much as a 1st rounder to get Flynn (or at least a 2nd rounder) and while the hawks are vastly improved every team could use another high 2nd round pick or even earlier first round pick.
CANHawk wrote:Flynn definately wasn't underwhelming IMO. He seemed to be a very capable game managing "dink n dunk", "take whats there" type of QB, which is not a bad thing. He seemed to be able to take care of the ball and hit the open guy for a decent gain, but that's all he looked like. He looked like Kyle Orton or Matt Cassel, who aren't bad quarterbacks by any stretch, but they aren't "special".
Canadians must have a different definition for "underwhelming" because you just hit it on the head with your description of Flynn.
PatsFanNH wrote:lol ok, do you see the Hawks trying to trade one of these two QB's in the offseason? (be silly have such a high salary for a back up QB.)
It'll be hard to trade Flynn, IMO. There wasn't much of a market this off-season for the unproven quarterback and next year's might just be worse considering how many teams are seemingly "set" with their veteran/young quarterbacks.
Flynn's contract is $5.25 million next year with $2 mil guaranteed. Too high to trade for as a backup and probably too high for teams looking for, at best, a two-way quarterback competition. Teams looking for an upgrade would do better looking to the draft.
I could see Flynn staying through 2013, but if Wilson is still the starter by then, Flynn is gone. It's excusable to pay that now (or next year) to backup a 1st year or 2nd year young player, but not for a 3rd year starter (where Flynn is set to make $6.25m).
"People who don't punch their ponies in the face make me sick." - Louis C.K.
Flynn did in the preseason what Wilson's doing in the regular season (ie. Moving the ball into FG range and then stalling in the Red Zone or having to punt on every drive.)
In the preseason though, Wilson was scoring on almost every drive (at first against 2nd team Defenses, then in games 3 and 4 of the preseason, he did it against 1st team defenses) and looked phenomenal with a bajillion gallons of potential.
Therefore, it stands to reason then that if Flynn was behind center in the regular season, he would either be doing the same as Wilson or worse.
CANHawk wrote:Flynn definately wasn't underwhelming IMO. He seemed to be a very capable game managing "dink n dunk", "take whats there" type of QB, which is not a bad thing. He seemed to be able to take care of the ball and hit the open guy for a decent gain, but that's all he looked like. He looked like Kyle Orton or Matt Cassel, who aren't bad quarterbacks by any stretch, but they aren't "special".
Canadians must have a different definition for "underwhelming" because you just hit it on the head with your description of Flynn.
Maybe Flynn was just "whelming" and not over or under.
I think a word people have used in this thread applies. Wilson looked special, like he had a playmaking element to his game that just didn't seem to be there with Flynn. I recall back in the preseason someone saying that Flynn played capably and efficiently, but that he was uninspiring. That summed up my views on it, too.
Seahawk Sailor wrote:To sum it up for Pats fans: would you rather go with the rookie who looks like he could be a Tom Brady, or the veteran backup with three starts that looks like he could be a Drew Bledsoe?
LOL BB went with Bledsoe for a year so Brady could learn the offense and get comfortable lol.. and Bledsoe was good for like 4 years..
Like everyone has said, Flynn looked fine and capable, but Wilson just took the Seahawk Nation by storm and was effin dominant in the preseason. Hopefully after last weeks game the reigns will come off a little bit more, but I doubt it. I think because it IS the Pats, and what the forecast is calling for that the Seahawks are gonna try and turn this into a slobberknocker, last time they forced a game like that was when they demoralized the Cowboys. I don't ask this to be a douche, I ask because I really just don't know, but can the Pats play a grind it out beat the holy hell out of another team and take a beating game?
Last edited by Throwdown on Thu Oct 11, 2012 11:56 am, edited 1 time in total.
Seahawk Sailor wrote:To sum it up for Pats fans: would you rather go with the rookie who looks like he could be a Tom Brady, or the veteran backup with three starts that looks like he could be a Drew Bledsoe?
LOL BB went with Bledsoe for a year so Brady could learn the offense and get comfortable lol.. and Bledsoe was good for like 4 years..
You say this as though Bledsoe was only a temporary placeholder for Brady. IIRC, Bledsoe was paid a ridiculous contract the year they drafted Brady (something like 10 years/100 m.) I doubt even BB knew what they had in Brady that first season.
Edit: Did some research, Bledsoe was re-signed a year after they drafted Brady.
"People who don't punch their ponies in the face make me sick." - Louis C.K.
Flynn's salary is not a big deal given Wilson basically here on a premium. The way I see it is The Seahawks are spending (let's round) say 3 million dollars at the QB position in 2012, it doesn't matter how it's broken up...that 3 million still has to be spent. It's not on PC to pay these guys, he just needs to put who he believes is the best on the field. Besides, the owners rich b#!!!
That being said, Wilson lit it up in the off season and won the job straight up. Personally, I feel the decision took a little too long and is hampering is performance so far. His chemistry with the receivers has been lack luster...but!....showing definite signs of improvement...can't wait to see what will happen when the offense is on the same page! It's going to be awesome.
PatsFanNH wrote:I ask about the trade possibility because a team say Like Buffalo could give up as much as a 1st rounder to get Flynn (or at least a 2nd rounder) and while the hawks are vastly improved every team could use another high 2nd round pick or even earlier first round pick.
PatsFanNH wrote:I ask about the trade possibility because a team say Like Buffalo could give up as much as a 1st rounder to get Flynn (or at least a 2nd rounder) and while the hawks are vastly improved every team could use another high 2nd round pick or even earlier first round pick.
We already gave them TJack
Which is why the posts about us "not being able to trade Flynn" are ridiculous. I bet I read 1,000 posts about how it would be impossible to trade TJ since he was making $4 million. Well guess what, we got something out of him. If Flynn gets any playing time this year (whether through injury or because we are kicking the crap out of someone), his trade value could go up substantially. Besides, if the rookie QBs have proven anything this year it is that it is difficult to come in and start as QB. RW is tied for the best win loss record for all rookie QBs in the past 20 years, and he has been assisted by a phenomenal D and a great rushing game. Different teams will be in the market this year, different QBs will get hurt or bomb out, Flynn will be worth something guaranteed.
Throwdown wrote:Like everyone has said, Flynn looked fine and capable, but Wilson just took the Seahawk Nation by storm and was effin dominant in the preseason. Hopefully after last weeks game the reigns will come off a little bit more, but I doubt it. I think because it IS the Pats, and what the forecast is calling for that the Seahawks are gonna try and turn this into a slobberknocker, last time they forced a game like that was when they demoralized the Cowboys. I don't ask this to be a douche, I ask because I really just don't know, but can the Pats play a grind it out beat the holy hell out of another team and take a beating game?
1st Snow doesnt stop the Pats passing game and if anything slippery conditions are BETTER for theReceiver as he knows where he is going while the CB could lose their balance. So the Pats will pass alot still.
As for the slobberknocker game, I THINk they can do it now with these running backs especially since teams cant key on the running game even in bad weather.
PatsFanNH wrote:lol ok, do you see the Hawks trying to trade one of these two QB's in the offseason? (be silly have such a high salary for a back up QB.)
The Seahawks look at it as salary paid to a position...so they are spending X amount on the QB position, it doesn't matter to them if the starter or the backup is making more of the pot than the other.
They have the luxury to do that because Wilson is making 3rd round rookie money. His salary combined with Flynn's is STILL less than what a lot of teams pay their starting QB.
If Wilson were to get really good and be worthy of a pay raise in an extension, by that time Flynn will be nearing the end of his contract.
In week 17, after we beat the 9ers and seal the division and the #1 spot in the NFC, he'll get to throw for a franchise record 500 yards and 7 TDs against the Rams ....exactly like he did to Detroit when he was in Green Bay. (putting up monster digits in a meaningless game) |
<?xml version="1.0" encoding="UTF-8"?>
<module external.linked.project.path="$MODULE_DIR$" external.root.project.path="$MODULE_DIR$/.." external.system.id="GRADLE" external.system.module.group="challenge-six" external.system.module.version="unspecified" type="JAVA_MODULE" version="4">
<component name="FacetManager">
<facet type="android-gradle" name="Android-Gradle">
<configuration>
<option name="GRADLE_PROJECT_PATH" value=":app" />
</configuration>
</facet>
<facet type="android" name="Android">
<configuration>
<option name="SELECTED_BUILD_VARIANT" value="debug" />
<option name="ASSEMBLE_TASK_NAME" value="assembleDebug" />
<option name="COMPILE_JAVA_TASK_NAME" value="compileDebugJava" />
<option name="ASSEMBLE_TEST_TASK_NAME" value="assembleDebugTest" />
<option name="SOURCE_GEN_TASK_NAME" value="generateDebugSources" />
<option name="TEST_SOURCE_GEN_TASK_NAME" value="generateDebugTestSources" />
<option name="ALLOW_USER_CONFIGURATION" value="false" />
<option name="MANIFEST_FILE_RELATIVE_PATH" value="/src/main/AndroidManifest.xml" />
<option name="RES_FOLDER_RELATIVE_PATH" value="/src/main/res" />
<option name="RES_FOLDERS_RELATIVE_PATH" value="file://$MODULE_DIR$/src/main/res" />
<option name="ASSETS_FOLDER_RELATIVE_PATH" value="/src/main/assets" />
</configuration>
</facet>
</component>
<component name="NewModuleRootManager" inherit-compiler-output="false">
<output url="file://$MODULE_DIR$/build/intermediates/classes/debug" />
<exclude-output />
<content url="file://$MODULE_DIR$">
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/r/debug" isTestSource="false" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/aidl/debug" isTestSource="false" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/buildConfig/debug" isTestSource="false" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/rs/debug" isTestSource="false" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/res/rs/debug" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/r/test/debug" isTestSource="true" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/aidl/test/debug" isTestSource="true" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/buildConfig/test/debug" isTestSource="true" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/source/rs/test/debug" isTestSource="true" generated="true" />
<sourceFolder url="file://$MODULE_DIR$/build/generated/res/rs/test/debug" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/res" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/resources" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/assets" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/aidl" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/java" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/jni" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/debug/rs" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/main/res" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/main/resources" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/main/assets" type="java-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/main/aidl" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/main/java" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/main/jni" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/main/rs" isTestSource="false" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/res" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/resources" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/assets" type="java-test-resource" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/aidl" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/java" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/jni" isTestSource="true" />
<sourceFolder url="file://$MODULE_DIR$/src/androidTest/rs" isTestSource="true" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/assets" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/bundles" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/classes" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/coverage-instrumented-classes" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/dependency-cache" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/dex" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/dex-cache" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/incremental" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/jacoco" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/javaResources" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/libs" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/lint" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/manifests" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/ndk" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/pre-dexed" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/proguard" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/res" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/rs" />
<excludeFolder url="file://$MODULE_DIR$/build/intermediates/symbols" />
<excludeFolder url="file://$MODULE_DIR$/build/outputs" />
</content>
<orderEntry type="jdk" jdkName="Android API 20 Platform" jdkType="Android SDK" />
<orderEntry type="sourceFolder" forTests="false" />
<orderEntry type="library" exported="" name="appcompat-v7-19.1.0" level="project" />
<orderEntry type="library" exported="" name="support-v4-19.1.0" level="project" />
</component>
</module>
|
Mr. Watts: Regular meetings are held between OPRAF and British Rail
to discuss a wide range of issues. The decision to withdraw Motorail
services and the London--Fort William sleeper service from May was taken by
BR on commercial grounds.
Mr. McLeish: To ask the Secretary of State for Transport under what
statutory powers the Director of Franchising and OPRAF were acting when the
decision was taken to exclude the Fort William sleeper and Motorail
services from the passenger service requirement for ScotRail.
[15747]
Mr. Watts: In indicating that he would not include the Fort William
sleeper service and Motorail services in the draft passenger service
requirement for ScotRail, the Franchising Director was acting within the
bounds of the statutory objectives, instructions and guidance issued by my
right hon. Friend the Member for Norfolk, South (Mr. MacGregor) on 22 March
1994 in accordance with the provisions of section 5 of the Railways Act
1993.
Mr. Charles Kennedy: To ask the Secretary of State for Transport (1)
what assessment he has made of the additional costs associated with
maintenance of the (a) Fort William to London sleeper service, (b) Carlisle
to London sleeper service and (c) Scotland to London motorail services, for
the purpose of an eight week consultation period commencing in May,
indicating the financial assumptions involved; and if he will make a
statement; [15139]
(2) what estimate he has made of the costs associated with the closure of
the (a) Fort William to London sleeper service, (b) Carlisle to London
sleeper service and (c) Scotland to London motorail services; and if he
will make a statement; [15141] (3) what estimate he has made of the
start up costs associated with re-opening, after May, the (a) Fort William
to London sleeper service, (b) Carlisle to London sleeper service and (c)
Scotland to London Motorail services; and if he will make a statement.
[15140]
Mr. Watts: My right hon. Friend has not made any such assessments on
estimates. The decision to withdraw Motorail services and the sleeper
service between London and Carlisle and London and Fort William from 28 May
was a commercial decision by British Rail. It has undertaken to retain the
assets needed to run these services so that they can be restored if the
Franchising Director decides to include them in the passenger service
requirement for the ScotRail franchise.
Birmingham Northern Relief Road
Ms Walley: To ask the Secretary of State for Transport (1) if he
will ensure that the inquiry into the Birmingham northern relief road is
based on a re-assessment of traffic models and growth forecasts;
[15257]
(2) what account he has taken of the effects of congestion of the traffic
model assumption in respect of the Birmingham northern relief road which
assumes that for roads which are full traffic will grow at a reduced rate;
[15255]
(3) on what basis traffic modellers have ignored heavy goods vehicles in
respect of the Birmingham northern relief road; and if he will make a
statement; [15254]
(4) what assessment he has made of the impact of an (a) untolled and (b)
tolled west orbital road in respect of
Column 318
the Birmingham northern relief road.
[15256]
Mr. Watts: These are matters for the Highways Agency. I have asked
the chief executive to write to the hon. Member.
Letter from Laurie Haynes to Ms Joan Walley, dated 23 March 1995:
You asked the Secretary of State for information about the traffic
modelling used for the Birmingham Northern Relief Road. We are satisfied
that the traffic model uses a robust methodology and has taken account of
significant changes, such as the SACTRA report, which have arisen since the
draft Orders were published. The ongoing public inquiry into the proposals
has received much information on traffic flows and techniques. It will be
for the Inspector to form his own judgement on that evidence.
The Original (February 1994) BNRR traffic forecasts assumed a tolled
Western Orbital Route. The latest (November 1994) forecasts assume a WOR
that will be free to motorists. The traffic impacts of these differing
assumptions are contained in evidence placed before the inquiry.
HGVs are not ignored in the traffic model. Tests established the most
appropriate methodology for the evaluation of the BNRR proposals; this
ensures the most realistic estimate of HGV routing. Details of the
methodology used have been presented to the inquiry. The traffic model
takes account of the capacity of the roads in the area. Reduced growth
rates have been assumed for all journeys with one or both ends in the
conurbation, in line with assumptions made by local highway authorities in
the conurbation.
ENVIRONMENT
Hydrofluorocarbons
Mr. Matthew Taylor: To ask the Secretary of State for the
Environment what plans he has to set targets for the phasing out of HFCs.
[14984]
Mr. Atkins: There are no plans to phase out HFCs, nor to set targets
for phaseout. HFCs have been developed as alternatives to some ozone-
depleting substances and are an important part of the solution to the
problem of depletion of the ozone layer. However, HFCs are also greenhouse
gases and the Government are discussing with industry the scope for
voluntary agreements to limit HFC emissions and to ensure that HFCs are not
used where emissions are unavoidable if safe, practical and more
environmental acceptable alternatives are available.
Local Government Commission
Mr. Gordon Prentice: To ask the Secretary of State for Environment
what qualities he will look for in appointing a new chair of the revamped
Local Government Commission. [15058]
Mr. Robert B. Jones: On 21 March my right hon. Friend announced the
appointment of Sir David Cooksey to the chairmanship of the Local
Government Commission, Official Report , column 145 . I believe Sir David
has all the qualities required of the chairman, and I note that his
appointment was immediately welcomed by the hon. Member for Holborn and St.
Pancras (Mr. Dobson).
Local Government Reorganisation
Mr. Gordon Prentice: To ask the Secretary of State for the
Environment (1) if he will list the English counties, following the current
reorganisation of local government, that will have no administrative
function but will have a
Column 319
lord lieutenant and sheriff; [15072]
(2) if he will list the English counties, following the current
reorganisation of local government, which are to be extended beyond their
administrative boundaries for ceremonial purposes and where lords
lieutenant and sheriffs will have jurisdiction over the wider area;
[15070]
(3) if he will list the English counties, following the current
reorganisation of local government, that will have no functions.
[15071]
Mr. Robert B. Jones: Decisions have not yet been taken in all cases.
However, I expect that the only county areas without any county councils
but with their own lords lieutenant will be Berkshire and East Yorkshire.
Most areas whose local authority is granted unitary powers will be deemed
to be part of a neighbouring county area for ceremonial purposes.
In those areas for which structure orders have been made, North West
Somerset and Bath and North East Somerset will be deemed to be part of
Somerset; South Gloucestershire will be deemed to be part of
Gloucestershire; North Lincolnshire and North East Lincolnshire will be
deemed to be part of Lincolnshire; York will be deemed to be part of North
Yorkshire; and Hull will be deemed to be part of East Yorkshire. We are
still considering the ceremonial arrangements for Cleveland.
Lords Lieutenant
Mr. Gordon Prentice: To ask the Secretary of State for the
Environment if he will list the English county councils which have their
own lord lieutenant and sheriff. [15073]
Mr. Robert B. Jones: A lord lieutenant and high sheriff are
appointed to the following counties:
Greater London
Greater Manchester
Merseyside
South Yorkshire
Tyne and Wear
West Midlands
West Yorkshire
Avon
Bedfordshire
Berkshire
Buckinghamshire
Cambridgeshire
Cheshire
Cleveland
Cornwall
Cumbria
Derbyshire
Devon
Dorset
Durham
East Sussex
Essex
Gloucestershire
Hampshire
Hereford and Worcester
Hertfordshire
Humberside
Isle of Wight
Kent
Lancashire
Liecestershire
Column 320
Lincolnshire
Norfolk
Northamptonshire
Northumberland
North Yorkshire
Nottinghamshire
Oxfordshire
Shopshire
Somerset
Staffordshire
Suffolk
Surrey
Warwickshire
West Sussex
Wiltshire
Air Pollution
Mr. McGrady: To ask the Secretary of State for the Environment what
discussions have taken place with his European ministerial counterparts
concerning the need to reduce levels of air pollution. [15127]
Mr. Atkins: I maintain regular contacts with my European ministerial
counterparts on all aspects of environmental protection, including air
pollution. Most recently, I met my European Community counterparts in
Brussels on 9 March at the meeting of the Environment Council. We had a
fruitful discussion on a number of issues related to air pollution,
including the proposed directive on integrated pollution prevention and
control and the proposed framework directive on ambient air quality
assessment and management.
Mr. McGrady: To ask the Secretary of State for the Environment what
steps he will take to reduce levels of air pollution; and if he will make a
statement. [15133]
Mr. Atkins: The Government announced their strategic policies for
managing air quality in the document "Air Quality: Meeting the Challenge",
published on 19 January. Copies are available in the House Libraries. Those
policies are aimed at delivering sustainable improvements in air quality
throughout the UK. Proposals include a framework of national air quality
standards, a new system of local air quality assessment and management and
an action plan for transport.
National Rivers Authority
Mr. Alan W. Williams: To ask the Secretary of State for the
Environment what was the level of (a) grant in aid, (b) internal income
generated and (c) total budget for the National Rivers Authority for each
year since its establishment. [15321]
Mr. Atkins: The level of grant in aid, income generated from charges
and levies and total expenditure of the National Rivers authority are:
Mr. Alan W. Williams: To ask the Secretary of State for the
Environment what was the total number of people working (a) full time and
(b) part time for the National Rivers Authority in each year since it was
established. [15322]
Mr. Atkins: The NRA does not separately record numbers of part-time
staff. The data show permanent staff, including part-time staff, and
temporary staff, including those working for limited periods and those on
fixed term contracts:
Mr. Alan W. Williams: To ask the Secretary of State for the
Environment if he will list each of the major establishments which are part
of the National Rivers Authority, giving number of employees and budget for
(a) 1993 94, (b) 1994 95 and (c) 1995 96 in 1994 prices. [15316]
Mr. Atkins: The number of people employed by the National Rivers
Authority on each of its functions is:
Regional Water Companies
Ms Armstrong: To ask the Secretary of State for the Environment if
he will list for each regional water company (a) the net equity proceeds to
Government as a result of privatisation, (b) the market value at the end of
the first day of trading and (c) the current market value. [15351]
Mr. Atkins: Information on the proceeds resulting from
privatisation, the market capitalisation at flotation and movement in share
values at the end of the first day's trading in shares in the 10 water
holding companies in England and Wales, is contained in the National Audit
Office report "Department of the Environment: Sale of the Water Authorities
in England and Wales", a copy of which is in the Library. Current market
values vary according to fluctuations in the share price of the companies.
This information is not held by my Department.
Local Authorities
Mr. David Shaw: To ask the Secretary of State for the Environment if
he will bring forward legislation to require local authorities to disclose
in their annual accounts (a) the number of staff employed, (b) their total
remuneration, (c) the number of staff in receipt of remuneration in excess
of £10,000 per annum in salary bands of £5, 000 and (d) the
remuneration of the highest paid chief officer in a format similar to that
used in company accounts. [15165]
Mr. Robert B. Jones: There is a strong case for local authorities to
publish details of the pay of their senior staff in broadly the same way as
companies are required to publish details of the pay of their senior
employees. However, I am keen to keep the new obligations on local
authorities under control.
My Department is considering what information it would be appropriate for
local authorities to publish and the best way for the local authorities to
be encouraged to make that information public. Of course, no new
stipulations would be introduced without consultation with the local
authority associations.
Mrs. Roche: To ask the Secretary of State for the Environment what
were the (a) total staff numbers, (b) total revenue and capital expenditure
and (c) local
Column 323
authority housing stock in all district
authorities in East and West Sussex. [14890]
Mr. Robert B. Jones [holding answer 22 March 1995]: The
available information is:
Mr. Luff: To ask the Secretary of State for the Environment if he
will make a statement on his proposals for local authority participation in
companies and for amending the capital finance regulations. [16203]
Mr. Curry: The Local Authorities (Companies) Order 1995 and the
Local Authorities (Capital Finance and Approved Investments) (Amendment)
Regulations 1995 have today been laid before Parliament. These implement
the package of proposals to encourage closer partnership between local
authorities and the private sector, announced by my right hon. Friend on 31
October 1994.
The Local Authorities (Companies) Order 1995 establishes a regime for local
authority participation in companies, under which those companies,
including companies limited by guarantee, which are led by the private
sector will be subject to few controls other than those applicable
generally under the Companies Acts. We are providing in the regime
transitional provisions for local authority companies established before 1
April 1995, and we are also allowing certain exemptions.
The Local Authorities (Capital Finance and Approved Investments)
(Amendment) Regulations 1995 make a number of changes to the local
authority capital finance rules, with the intention of promoting the use of
private finance.
The order and regulations laid take account of extensive consultation
conducted by my right hon. Friend the Secretary of State for the
Environment and my right hon. Friend the Secretary of State for Wales with
the local authority associations, individual local authorities, and other
interested parties. The main changes made following this will:
Column 324
free authorities of all subsequent capital
finance impact from a company's operations provided it leaves the public
sector, permanently, by 31 March 1996.
increase to 75 per cent. the usable proportion of receipts of sale of local
authority shareholdings in airport companies arising before 1 April 1997,
and in bus companies arising before 31 March 1996. This was announced by my
right hon. Friend the Secretary of State for Transport on 3 March, Official
Report, column 732 . allow authorities holding leases of non-housing
property taken out before 1988 to extend them for up to 10 years without
capital costs.
allow authorities to transfer assets to companies in return for a mixed
consideration of cash and shares, without needing to set resources aside in
relation to the shares.
The regulations also introduce other beneficial changes which reflect
consultations with and representations from local authorities. These will:
allow authorities to renew, for up to two years without capital cost,
leases on privately owned homes expiring after 20 December 1994. This will
enable authorities to continue present arrangements by renewing short-term
leases on good quality homes in the private rented sector, rather than
using bed-and-breakfast hotels to provide temporary accommodation. The use
of bed and breakfast accommodation has fallen by 43 per cent. over two
years.
allow costs of computer software to be capitalised.
In addition, there are many clarificatory and drafting changes. I will also
be laying before Parliament later in the year further regulations which
will have the effect of increasing to 90 per cent. the usable proportion of
local authorities' receipts from sales of car parks and retail property
arising between 1 September 1995 and 31 August 1996.
Thus local authorities and prospective private sector partners can now look
forward to a total of four targeted |
Ministries: integral to the functioning of our church
The Passionists in Jamaica
The Passionists of St. Paul of the Cross Province belong to a world-wide community of Passionists, a Catholic religious community founded by St. Paul of the Cross, one of the great missionary saints of the Catholic Church.
Church Events: All the things that we put on
“We do not live only by food, but because of that good Word of God living through our lives, must we live.”
Friends, we ought never fail to express the love and joy that is within us as we go through our trials, or to show by example that a godly life is to be lived and cherished. Let’s always look at the example of our Lord and Saviour, who even in His darkest hours of need, ever sought to pray and then do what was best in each situation that He faced, rather than to engage in what was easily convenient. By God’s Word, be happily encouraged today.
(Deuteronomy 8:3, Cited by Jesus in Matthew 4:4)
About us
St. Elizabeth Roman Catholic Church is situated on Ransford Avenue, in the heart of Kingston, Jamaica. Our members seek Christ’s peace by following His teachings and by sharing together in a lifelong journey of spiritual growth. In response to the gospel’s call for justice and compassion, we reach out and share our resources with all those in need, and we encourage each other to respond to their baptismal call by sharing their time, talents, and treasures.
“I will not offer to the Lord my God sacrifices
that have cost me nothing.” |
Description:
Base layer for Unicode classification and properties.
Files:
lib/unictype.in.h
m4/libunistring-base.m4
Depends-on:
unitypes
stdbool
configure.ac:
gl_LIBUNISTRING_LIBHEADER([0.9.4], [unictype.h])
Makefile.am:
BUILT_SOURCES += $(LIBUNISTRING_UNICTYPE_H)
unictype.h: unictype.in.h
$(AM_V_GEN)rm -f $@-t $@ && \
{ echo '/* DO NOT EDIT! GENERATED AUTOMATICALLY! */'; \
cat $(srcdir)/unictype.in.h; \
} > $@-t && \
mv -f $@-t $@
MOSTLYCLEANFILES += unictype.h unictype.h-t
Include:
"unictype.h"
License:
LGPLv2+
Maintainer:
all
|
Recently the Deadpool actor Ryan Reynold shared his experience of working with Michael Bay. Both worked in the “6 Underground” director which showcases action sequences in a huge scale.
Recalling his experience of working with the Hollywood action filmmaker, Reynolds said that Bay is immensely talented and has one unique ability. He explained, “Bay shifts the shooting around to suit his inspiration. I think he listens to the movie. If you’re expecting a calendar that’s going to be a reliable thing, forget it. It’s out the window.”
He further explained the work style of Bay in detail. He said how Bay would improvise scenes based on a location in any given time that nobody could expect. “Michael would see a location or space somewhere and suddenly we’d be shooting a totally improvised scene there or a chunk of the movie that you hadn’t expected to shoot that month. Michael’s got this unique ability to see where the story’s taking him,” added a new fanboy of Michael Bay.
Reynolds confirmed the making of ‘Deadpool 3’
Reynolds loves to stay in the news and his social media buzzing has a huge contribution to that. Recently he confirmed the making of ‘Deadpool 3’ which immediately attracted media. According to a report on dailymail.co.ok, in the Christmas Eve special episode of the popular morning show “Live With Kelly And Ryan”’s Christmas Eve episode Reynolds disclosed the information.
He was asked about the possibility of the third film of the popular franchise by Kelly and Ryan. The famous actor promptly said, “Yeah, we’re working on it right now with the whole team.” The 43-year-old actor further added, “We’re over at Marvel [Studios] now, which is like the big leagues all of a sudden. It’s kinda crazy. So yeah, we’re working on (Deadpool 3).” No wonder the fans went crazy after the breaking of this massive news. The countdown definitely has begun for them! |
Christoph Schütz
Christoph Schütz (November 6, 1689 in Umstadt, Germany - January 4, 1750 in Bad Homburg, Germany) was a pietist writer and a songbook publisher.
Schütz's book, Die Güldene Rose. . . von der Wiederbringung Aller Dinge (The Golden Rose . . . on the Restoration of All Things) influenced George Rapp and his Harmony Society so much at one point that they used the symbol of the rose and the Bible verse Micah 4:8 as the symbol of their communal society for a couple of years.
Category:Radical Pietism
Category:German non-fiction writers
Category:German Christian religious leaders
Category:1689 births
Category:1750 deaths
Category:18th-century Christian mystics
Category:Protestant mystics
Category:German male non-fiction writers |
using System;
using System.Collections.Generic;
using System.Linq;
using System.Threading.Tasks;
using FilterPipelineExample.Filters;
using Microsoft.AspNetCore.Mvc;
using Microsoft.AspNetCore.Mvc.Filters;
namespace FilterPipelineExample.Controllers
{
[LogResourceFilter, LogActionFilter, LogAuthorizationFilter, LogResultFilter, LogExceptionFilter]
public class HomeController : Controller
{
public IActionResult Index()
{
Console.WriteLine("Executing HomeController.Index");
return Content("Home Page");
}
public IActionResult Exception()
{
Console.WriteLine("Executing HomeController.Exception");
throw new System.Exception("Exception thrown!");
}
public override void OnActionExecuting(ActionExecutingContext context)
{
Console.WriteLine("Executing HomeController.OnActionExecuting");
//context.Result = new ContentResult()
//{
// Content = "HomeController.OnActionExecuting - Short-circuiting ",
//};
}
public override void OnActionExecuted(ActionExecutedContext context)
{
Console.WriteLine($"Executing HomeController.OnActionExecuted: cancelled {context.Canceled}");
//context.ExceptionHandled = true;
//context.Result = new ContentResult()
//{
// Content = "HomeController - convert to success ",
//};
}
}
}
|
This invention relates to an imaging device employing so-called transfer type pressure-sensitized recording medium consisting of a microcapsule sheet (pressure-sensitized medium) and a developing sheet or a self-developing type pressure-sensitized recording medium, more particulary, to an imaging device having a function capable of controlling an operation of a pressurizing rollers for pressurizing medium so as to begin to accurately pressurize the recording medium from the start position of an area to be pressurized.
An imaging device employing a pressure-sensitized recording medium consisting of a microcapsule sheet and a developing sheet will be described below for an example of conventional devices.
The microcapsule sheet forms a roll with its leading end to be pulled out of it in operation. The developing sheet is in cut form.
Such an imaging device generates through exposure a latent image responsive to the actual image on the microcapsule sheet. A developing sheet is then laid on the side carrying the latent image of the microcapsule sheet and both are pressurized between a pair of pressure rollers opposed to each other. This pressure operation develops the latent image formed on the microcapsule sheet into a visible image transferred to the developing sheet.
The pair of pressure rollers are normally in their standby open position, while drawing themselves to a closed position when a sensor, for instance, detects the developing paper passing a certain position having been set before the pair of the pressure rollers. The pressure rollers resume their open position when they are rotated through a certain angle after closure thereof.
However, there are some cases in which adjusting the degree of exposure of the pressure-sensitized recording medium or enlarging or reducing the image size is effected by varying a travelling speed of the pressure-sensitized recording medium. As the travelling speed thus varies, there is some irregularity in feed quantity of the developing medium and the pressure-sensitized recording medium into the space between the pressure rollers when the opposing pressure rollers of the pressure developing unit are completely brought to their closing position.
This makes the pressure-developing operation on the developing sheet start at varying start positions, resulting in a difficulty in providing an exact reproduction of the image.
Also, when employing a pressure-sensitized recording medium consisting of microcapsule sheet and developing sheet, a problem has been encountered that, if a sheet of microcapsule sheet with no developing sheet laid on it is put under pressure, the content of the microcapsules is deposited on the rollers staining the back of the developing sheet at the time of following development. Furthermore, a thickened layer of capsule content laid upon the roller surface makes pressure distribution over the pair of pressure rollers less uniform, so that the developed image suffers uneven color quality. |
Q:
How Google decided how websites will look to my visitors?
I have a small WordPress website, Google shows me a print screen of how the visitors of my site see it :
And as you can see in the image on the right, it seems like all the thumbnails gone and the site is squeezed to the right.
When I enter the site, everything looks great (like in the picture on the left).
How can I understand what is the problem, and fix it?
A:
The problem you have is with your responsive design, and more specific - your breaking points. You can easily see that your website actually look exactly like the screenshot on 1024px width (see http://responsivetest.net/#u=http://www.wetravel.co.il/|1024|768|1) or just minimize your browser's width, you'll see the breaking point eventually). Google test the Desktop version on 1024px so that's the reason to display it like that. Your site looks like that for resolutions between 978px and 1186px. You should check your CSS, as that's the place where your problem occure
|
Q:
grounding, whats its purpose?
Some say Ground is just a reference point for measuring voltages, some say ground is a safety device for appliances and some say ground is just a bare piece of metal regardless if its even connected to the actual earth (as in dirt)
I have multiple questions about ground:
This one is about appliances and is taken from howstuffworks, "Let's say that a hot wire comes loose inside an ungrounded metal case,the metal case then becomes hot so anyone that would touch the case would be fatally shocked. By having a ground wire attached to the metal case, electricity from the hot case will flow straight to ground and will trip the breaker"
Can you not be safe just by touching a hot wire alone, granted you don't touch neutral?
What if you touch a hot wire then, stick you other finger in the dirt (soil)?
So its telling me that the current flow from a hot wire, to the grounding wire-> (connect to some rocks and dirt/poop) is so high, it can trip a breaker?
In a DC situation there is no hot wire, and (correct me if i'm wrong) but if I have a 350v Capacitor fully charged, there is absolutely no way for me to get electrocuted unless I touch both terminals. Why doesn't AC behave this way?
And how about this:
people say step 4 is to ground that wire, How? The car is insulated from the earth All I see is an open circuit.
Please help, Thanks!
A:
The reason this is confusing is because the ideas are confused, mixed up in the word "ground".
Sometimes “earth(ing)” is used to refer to the concept of electrically connecting to the earth, allowing “ground” to be used for the concept of “a part of the circuit we consider to be 0 volts”.
Some say Ground is just a reference point for measuring voltages
That's one of the meanings. You have some device, some circuit, and say that this conductor is 0 V and measure everything else relative to it.
If the device is isolated (battery powered and not hooked up to anything else), then it's truly arbitrary, but if you have connections, signal or power cables, to something else — power supply, digital signal, analog audio signal, whatever — then the expected electrical characteristics are generally such that the two devices share the a common 0 V reference — a common ground.
(If there's a problem so that one of the devices is causing current to flow along different parts of the system that should be the same “ground”, that's called a ground loop.)
some say ground is a safety device for appliances
The safety device here is the presence of a connection between the chassis of the device (generally, any exposed metallic parts) and the “ground” conductor of the electric circuit, which is also joined to earth. The safety comes from the idea that if somehow the chassis gets joined to line voltage (“hot”) and current will flow to the “ground” (and perhaps trip a breaker or GFCI/RCD device) instead of through you when you touch it (as you are a higher-resistance connection to earth).
some say ground is just a bare piece of metal regardless if its even connected to the actual earth
A bare pice of metal is never “a ground” by itself. It's just common, for safety reasons and for electrical design convenience, to design things so that all exposed metal is joined to, or a part of, the circuit's “ground”.
Can you not be safe just by touching a hot wire alone, granted you don't touch neutral?
If you jump in the air and poke the hot wire, you're certainly safe. If you're touching anything else, like what you're standing on, you might be able to make a circuit.
What if you touch a hot wire then, stick you other finger in the dirt (soil)?
So its telling me that the current flow from a hot wire, to the grounding wire-> (connect to some rocks and dirt/poop) is so high, it can trip a breaker?
Depends on the kind of dirt, and how wet it is. If it's sufficiently conductive, the circuit consists of the incoming electric service (hot branch) → house wiring → you → dirt → service ground connection at the breaker panel → service neutral. (That is if your wiring is like USA wiring, at least.)
But safety grounding isn't just about “dirt” — think about the kitchen. You've got electric appliances, salty (conductive) water involved in cooking, possible spills and/or damaged wiring —
In a DC situation there is no hot wire, and
This is true but misleading. The reason we use the term “hot” with AC only is because AC voltages reverse all the time and so we can't just say “the positive wire” or “the -5V wire” or such. A way to describe either case would be to say “not at 0 V”. (Nominally in that resistance in wiring means that almost nothing is at exactly 0 V.)
(correct me if i'm wrong) but if I have a 350v Capacitor fully charged, there is absolutely no way for me to get electrocuted unless I touch both terminals.
If you had a 350 V AC power source that was isolated, then you could touch one terminal and be just as fine as in the capacitor case.
(Well, mostly fine. Because AC can pass through capacitors, and lots of things are a little bit like capacitors, there could be some current flow, though not much if the other terminal isn't connected to anything and therefore has no opportunity for capacitive coupling of its own.)
But your household AC line supply is not isolated — the neutral side is joined to earth — so it is not safe in this way.
people say step 4 is to ground that wire, How? The car is insulated from the earth All I see is an open circuit.
What they're not showing in the picture is that the “Yours” car is assumed to have the negative battery terminal connected to the car's metal frame, thus completing the circuit in the picture.
The reason for that hookup scheme is not anything about the electric circuit itself — it's because the final connection when current starts to flow may make an arc for a moment, and you want that arc to be away from the battery so it doesn't ignite any hydrogen gas that may be in the vicinity. (Mistreated lead-acid batteries electrolyse their water and thus produce hydrogen gas.)
|
Q:
network activity interferes with bluetooth
I've noticed that my Bluetooth mouse pointer slows down until it's just about unusable when I have a lot of network activity going on - for example moving a larger file from one machine to another. My computer is a dell inspiron 1525 with bluetooth and internal wireless N.
Any idea what causes this kind of thing, or better yet what to do about it?
thanks!
A:
Wireless 802.11b/g/n and Bluetooth are both designed to use the 2.4GHz spectrum. Wireless N also has the ability to use 5GHz, but the other side of the connection has to support it too. More than likely, your wireless is on the 2.4GHz frequency and you're getting interference.
If this is the case, there's a few things you can try.
(easiest) Switch to a wired mouse. Zero interference, zero configuration.
(easy) Turn off your wireless adapter and use an ethernet cable to connect to your router. Zero interference, not much configuration. It does limit your laptop's movement, however.
(most flexible) Try configuring your router to use a different channel. You may have to experiment to find a channel that's not picking up interference from the Bluetooth or other nearby wireless networks.
(least flexible) Check to see if your router has 5GHz capability. Enable it, and/or disable the 2.4GHz option. This will get rid of the interference, but will also kill any chance of using 802.11b/g on the router.
|
/* This file is part of the Spring engine (GPL v2 or later), see LICENSE.html */
#ifndef DAMAGE_ARRAY_H
#define DAMAGE_ARRAY_H
#include <algorithm>
#include <vector>
#include "System/creg/creg_cond.h"
class float3;
class DamageArray
{
CR_DECLARE(DamageArray)
public:
DamageArray(float damage = 1.0f)
: paralyzeDamageTime(0)
, impulseFactor(1.0f)
, impulseBoost(0.0f)
, craterMult(1.0f)
, craterBoost(0.0f)
{
SetDefaultDamage(damage);
}
DamageArray(const DamageArray& da) { *this = da; }
DamageArray(DamageArray&& da) { *this = std::move(da); }
virtual ~DamageArray() {}
DamageArray& operator = (const DamageArray& da) {
paralyzeDamageTime = da.paralyzeDamageTime;
impulseFactor = da.impulseFactor;
impulseBoost = da.impulseBoost;
craterMult = da.craterMult;
craterBoost = da.craterBoost;
damages = da.damages;
return *this;
}
DamageArray& operator = (DamageArray&& da) {
paralyzeDamageTime = da.paralyzeDamageTime;
impulseFactor = da.impulseFactor;
impulseBoost = da.impulseBoost;
craterMult = da.craterMult;
craterBoost = da.craterBoost;
damages = std::move(da.damages);
return *this;
}
DamageArray operator * (float damageMult) const {
DamageArray da(*this);
for (unsigned int a = 0; a < damages.size(); ++a)
da.damages[a] *= damageMult;
return da;
}
int GetNumTypes() const { return damages.size(); }
void SetDefaultDamage(float damage);
void Set(int typeIndex, float d) { damages[typeIndex] = d; }
float Get(int typeIndex) const { return damages[typeIndex]; }
float GetDefault() const { return damages[0]; }
public:
int paralyzeDamageTime;
float impulseFactor;
float impulseBoost;
float craterMult;
float craterBoost;
protected:
std::vector<float> damages;
};
class DynDamageArray : public DamageArray
{
CR_DECLARE_DERIVED(DynDamageArray)
public:
DynDamageArray(float damage = 1.0f);
DynDamageArray(const DynDamageArray& da) { *this = da; fromDef = false; refCount = 1; }
~DynDamageArray();
void PostLoad();
DamageArray GetDynamicDamages(const float3& startPos, const float3& curPos) const;
static const DynDamageArray* IncRef(const DynDamageArray* dda);
static void DecRef(const DynDamageArray* dda);
static DynDamageArray* GetMutable(const DynDamageArray*& dda);
float dynDamageExp;
float dynDamageMin;
float dynDamageRange;
bool dynDamageInverted;
float craterAreaOfEffect;
float damageAreaOfEffect;
float edgeEffectiveness;
float explosionSpeed;
mutable int refCount;
bool fromDef;
};
#endif
|
Fans of Dutch club Den Haag throw down cuddly toys to a group of children from a local cancer hospital during their Dutch top-flight match against Feyenoord on Sunday.
Sadly for them, their off-field generosity wasn't rewarded with victory on the pitch as the home side ran out 3-1 winners, with former Liverpool forward Dirk Kuyt among the scorers.
Available to UK users only. |
Grünblatt E, Nemoda Z, Werling AM, et al. The involvement of the canonical Wnt‐signaling receptor *LRP5* and *LRP6* gene variants with ADHD and sexual dimorphism: Association study and meta‐analysis. Am J Med Genet Part B. 2019;180B:365--376. 10.1002/ajmg.b.32695
**Funding information** Hungarian Brain Research Program, Grant/Award Number: NAP‐B KTIA_NAP_13‐2014‐0011; University of Zurich, Filling the Gap, Grant/Award Number: Postdoctoral to Anna Maria Werling; University of Zurich; Deutsche Forschungsgemeinschaft, Grant/Award Number: HE1446/9‐1HI865/2‐1KFO125
1. INTRODUCTION {#ajmgb32695-sec-0001}
===============
Attention‐deficit/hyperactivity disorder (ADHD), a neurodevelopmental disorder, is one of the most common psychiatric and behavioral disorders in children and adolescents, with more than 5% of the pediatric population affected worldwide, often persisting into adulthood (Polanczyk, Willcutt, Salum, Kieling, & Rohde, [2014](#ajmgb32695-bib-0053){ref-type="ref"}; Thomas, Sanders, Doust, Beller, & Glasziou, [2015](#ajmgb32695-bib-0065){ref-type="ref"}). Although both the cause and pathophysiology of ADHD are largely unknown, there is a growing body of evidence supporting interactions of multiple genetic and environmental factors during early development thus providing a neurobiological susceptibility to the disorder (Curatolo, D\'Agati, & Moavero, [2010](#ajmgb32695-bib-0014){ref-type="ref"}).
ADHD diagnosis in children and adolescents is more frequent in boys than girls, with males being 2--4 times more likely to meet diagnostic criteria than females (Davies, [2014](#ajmgb32695-bib-0015){ref-type="ref"}). Moreover, age‐at‐onset, severity, and comorbidities were found to be sex‐dependent (Davies, [2014](#ajmgb32695-bib-0015){ref-type="ref"}). Just recently, a fMRI study reported significant volume reduction in putamen and thalamus of girls with ADHD, whereas a significant subcortical volume reduction was observed in ADHD patients independent of sex (Rosch et al., [2018](#ajmgb32695-bib-0057){ref-type="ref"}). Subsequently, the authors discuss the importance to study the trajectories of such neurodevelopmental disorders together with the sex‐dimorphic neuroanatomical development, as maturation timelines between boys and girls are substantially different (Rosch et al., [2018](#ajmgb32695-bib-0057){ref-type="ref"}). Differential susceptibility to pre‐ and postnatal stress has been discussed to affect brain development and maturation in a sex‐dimorphic manner, which was hypothesized to add to the genetic load that already leads to the different ADHD frequencies between genders (Van den Bergh et al., [2017](#ajmgb32695-bib-0068){ref-type="ref"}). The aforementioned recent findings as examples, point to the importance of studying genetic susceptibility for ADHD not only at the diagnostic level, but also at age‐at‐onset and sex differences.
Wnt‐signaling pathways orchestrate cellular proliferation, polarity and differentiation; processes that are crucial for healthy tissue morphogenesis, especially in the embryonic stage (MacDonald, Tamai, & He, [2009](#ajmgb32695-bib-0041){ref-type="ref"}). Two most known Wnt‐pathways exist: a canonical pathway and a noncanonical pathway. In the canonical pathway, the secreted Wnt glycoproteins bind to Frizzled receptors, as well as to either lipoprotein receptor‐related protein 5 (LRP5) or LRP6 coreceptors, to initiate a signaling cascade, in which downstream β‐catenin is harnessed as a cotranscription factor in the nucleus (Tamai et al., [2000](#ajmgb32695-bib-0061){ref-type="ref"}; Wehrli et al., [2000](#ajmgb32695-bib-0074){ref-type="ref"}). Canonical Wnt‐signaling has a pivotal role both in the developing and mature brain. During development the Wnt pathway regulates the balance between proliferation and differentiation of neuronal progenitor and precursor cells (Noelanders & Vleminckx, [2016](#ajmgb32695-bib-0049){ref-type="ref"}). Furthermore, Wnt‐signaling also affects neuronal stem cell proliferation and differentiation in the mature brain (Bengoa‐Vergniory & Kypta, [2015](#ajmgb32695-bib-0007){ref-type="ref"}), and it has a supportive role in the maturation of dendrites and spines (Hussaini et al., [2014](#ajmgb32695-bib-0029){ref-type="ref"}).
Several neurodevelopmental psychiatric disorders have been shown to overlap not only at the behavioral levels, but also at the genetic levels, as it has been repeatedly shown among ADHD, autism spectrum disorder (ASD), intellectual disability (ID), bipolar disorder, and psychosis (Brainstorm Consortium et al., [2018](#ajmgb32695-bib-0004){ref-type="ref"}; Bulik‐Sullivan et al., [2015](#ajmgb32695-bib-0008){ref-type="ref"}; Khanzada, Butler, & Manzardo, [2017](#ajmgb32695-bib-0032){ref-type="ref"}; Polimanti & Gelernter, [2017](#ajmgb32695-bib-0054){ref-type="ref"}; Taurines et al., [2012](#ajmgb32695-bib-0062){ref-type="ref"}; van Hulzen et al., [2017](#ajmgb32695-bib-0069){ref-type="ref"}; Zhao & Nyholt, [2017](#ajmgb32695-bib-0082){ref-type="ref"}). Interestingly, the Wnt‐signaling pathway seems to be one of the overlapping pathways, showing pathological alterations in the above disorders (Kwan, Unda, & Singh, [2016](#ajmgb32695-bib-0034){ref-type="ref"}; Mulligan & Cheyette, [2017](#ajmgb32695-bib-0047){ref-type="ref"}; Oron & Elliott, [2017](#ajmgb32695-bib-0050){ref-type="ref"}; Zhao & Nyholt, [2017](#ajmgb32695-bib-0082){ref-type="ref"}). For example, genome‐wide association studies (GWAS) reported the 4p15.31 region to be nominally associated with ADHD (not reaching genome‐wide *p*‐value \< 5 × 10^−8^), where the *KCNIP4* (potassium voltage‐gated channel interacting protein 4) gene is located (Lasky‐Su et al., [2008](#ajmgb32695-bib-0035){ref-type="ref"}; Lesch et al., [2008](#ajmgb32695-bib-0037){ref-type="ref"}; Neale et al., [2008](#ajmgb32695-bib-0048){ref-type="ref"}). KCINP4 is known to play a role in the negative feedback loop of the Wnt/β‐catenin pathway. In a later candidate gene study, six *KCNIP4* single markers and one haplotype block were found to associate with adult ADHD (aADHD; Weissflog et al., [2013](#ajmgb32695-bib-0076){ref-type="ref"}). Another GWAS analyzed a subpopulation of ADHD cases, which had concomitant oppositional defiant disorder, and found the β‐catenin‐pathway to be highlighted in the enrichment analysis (Aebi et al., [2015](#ajmgb32695-bib-0001){ref-type="ref"}). Moreover, Wnt‐signaling has been also associated with learning and memory, especially with deficits in working and spatial memory (Fortress, Schram, Tuscher, & Frick, [2013](#ajmgb32695-bib-0023){ref-type="ref"}; Maguschak & Ressler, [2011](#ajmgb32695-bib-0042){ref-type="ref"}; Maguschak & Ressler, [2012](#ajmgb32695-bib-0043){ref-type="ref"}). Epidemiological studies pointed to Wnt‐involvement in behavioral problems including hyperactivity (Hussaini et al., [2014](#ajmgb32695-bib-0029){ref-type="ref"}; Maguschak & Ressler, [2012](#ajmgb32695-bib-0043){ref-type="ref"}). In ASD, highly comorbid disorder in ADHD, a wide range of evidence points to the involvement of the Wnt‐pathway (Belinson et al., [2016](#ajmgb32695-bib-0006){ref-type="ref"}; Caracci, Avila, & De Ferrari, [2016](#ajmgb32695-bib-0009){ref-type="ref"}; Packer, [2016](#ajmgb32695-bib-0051){ref-type="ref"}; Zhang, Yuan, Wang, & Li, [2014](#ajmgb32695-bib-0081){ref-type="ref"}). Lastly, an indirect evidence of the Wnt‐signaling involvement in ADHD could be demonstrated by our research group, showing that methylphenidate (a psychostimulant and one of the first line treatment in ADHD therapy) influences cell proliferation and differentiation supporting neuronal maturation (Grünblatt, Bartl, & Walitza, [2018](#ajmgb32695-bib-0025){ref-type="ref"}). More specifically, we could demonstrate that methylphenidate activates Wnt‐signaling, which was not due to the dopamine transporter inhibition---the main know therapeutic mechanism of this drug---as selective dopamine transporter inhibitor GBR‐12909 treatment demonstrated the opposite effects (Grünblatt et al., [2018](#ajmgb32695-bib-0025){ref-type="ref"}).
As the two possible coreceptors LRP5 and LRP6 play major role in Wnt‐pathway activation, we conducted literature search selecting functional gene variants affecting either receptor function, gene expression or epigenetic modulations, such as histone modifications or DNA methylation levels (see Table [1](#ajmgb32695-tbl-0001){ref-type="table"} and Supporting Information Table S1). Published genetic associations with psychiatric, neurological, or metabolic diseases are also listed in Table [1](#ajmgb32695-tbl-0001){ref-type="table"}. Based on the hypothesis of the involvement of Wnt‐signaling in ADHD, we carried out genetic association analyses of the selected four *LRP5* and *LRP6* gene variants with ADHD in three independent European samples (total 2,917 participants), and a meta‐analysis with previously published data. Furthermore, due to sex‐discrepancy in ADHD frequency, we stratified the analysis according to sex and compared our results to the recent Psychiatric Genomic Consortium (PGC) ADHD GWAS results (Demontis et al., [2017](#ajmgb32695-bib-0019){ref-type="ref"}; Martin et al., [2018](#ajmgb32695-bib-0045){ref-type="ref"}).
######
Literature summary linking LRP5 and LRP6 gene variants with ADHD and other disorders
Gene SNP[a](#ajmgb32695-note-0002){ref-type="fn"} Functional effects in HEK293T cells Functional effects in neuronal cells or animal models Association studies
------ ---------------------------------------------- -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
LRP5 Loci/gene NA Overexpression of *LRP5* & *LRP6* in SH‐SY5Y cells protected against oxidative stress and reduced tau phosphorylation (Zhang, Bahety, & Ee, [2015](#ajmgb32695-bib-0080){ref-type="ref"}). BMD (Estrada et al., [2012](#ajmgb32695-bib-0022){ref-type="ref"}); schizophrenia and major depressive disorder (Zhao & Nyholt, [2017](#ajmgb32695-bib-0082){ref-type="ref"})
LRP5 rs4988319 NA NA BMD (Tran, Nguyen, Eisman, & Nguyen, [2008](#ajmgb32695-bib-0066){ref-type="ref"}); Wagner syndrome (Rothschild et al., [2013](#ajmgb32695-bib-0058){ref-type="ref"})
LRP5 rs3736228 LRP5‐V1330 demonstrated reduced Wnt3a signaling compared to wild‐type (Urano et al., [2009](#ajmgb32695-bib-0067){ref-type="ref"}) NA Males low diastolic blood pressure (Suwazono et al., [2006](#ajmgb32695-bib-0060){ref-type="ref"}); obesity and BMI (Guo et al., [2006](#ajmgb32695-bib-0026){ref-type="ref"}); male bone fractures (van Meurs et al., [2006](#ajmgb32695-bib-0070){ref-type="ref"}); BMD (Estrada et al., [2012](#ajmgb32695-bib-0022){ref-type="ref"}; Tran et al., [2008](#ajmgb32695-bib-0066){ref-type="ref"}); risk of having metabolic syndrome (Yang et al., [2013](#ajmgb32695-bib-0079){ref-type="ref"})
LRP6 Loci/gene NA Neural tube defects in humans as well as in mice (Allache et al., [2014](#ajmgb32695-bib-0003){ref-type="ref"}; Carter et al., [2005](#ajmgb32695-bib-0010){ref-type="ref"}; Kokubu et al., [2004](#ajmgb32695-bib-0033){ref-type="ref"}; Lei et al., [2015](#ajmgb32695-bib-0036){ref-type="ref"}; Pinson, Brennan, Monkley, Avery, & Skarnes, [2000](#ajmgb32695-bib-0052){ref-type="ref"}); *Lrp6* mutant mice (insertion mutation) demonstrate suboptimal development of brain regions (e.g., forebrain, midbrain, and hindbrain), and defected neurogenesis of dopaminergic neurons (Castelo‐Branco et al., [2010](#ajmgb32695-bib-0011){ref-type="ref"}; Pinson et al., [2000](#ajmgb32695-bib-0052){ref-type="ref"}; Zhou, Zhao, & Pleasure, [2004](#ajmgb32695-bib-0083){ref-type="ref"}), as well as age‐dependent synaptic loss and memory impairments in these mice (Liu et al., [2014](#ajmgb32695-bib-0039){ref-type="ref"}) AD, diabetes mellitus type 2, osteoporosis (Wang, Luo, Xu, Zhou, & Zhang, [2017](#ajmgb32695-bib-0072){ref-type="ref"})
LRP6 rs1012672 LRP6‐variant demonstrated reduced Wnt signaling compared to wild‐type (Xu et al., [2014](#ajmgb32695-bib-0078){ref-type="ref"}) NA AD (miR‐141 miR‐23a miR‐23b; Mallick & Ghosh, [2011](#ajmgb32695-bib-0044){ref-type="ref"}); AD (Alarcon et al., [2013](#ajmgb32695-bib-0002){ref-type="ref"}; De Ferrari et al., [2007](#ajmgb32695-bib-0018){ref-type="ref"})
LRP6 rs2302685 LRP6‐variant demonstrated reduced Wnt signaling compared to wild‐type (De Ferrari et al., [2007](#ajmgb32695-bib-0018){ref-type="ref"}; Xu et al., [2014](#ajmgb32695-bib-0078){ref-type="ref"}) NA Risk of ischemic stroke (Harriott et al., [2015](#ajmgb32695-bib-0027){ref-type="ref"}); AD (Alarcon et al., [2013](#ajmgb32695-bib-0002){ref-type="ref"}; De Ferrari et al., [2007](#ajmgb32695-bib-0018){ref-type="ref"}); male bone fractures (van Meurs et al., [2006](#ajmgb32695-bib-0070){ref-type="ref"})
Abbreviations: AD = Alzheimer\'s disease; BMD = bone mineral density; BMI = body mass index; NA = not available.
Details on annotation, GTEx and epigenetic findings are presented in the Supporting Information Table S1.
2. METHODS {#ajmgb32695-sec-0002}
==========
2.1. Study samples {#ajmgb32695-sec-0003}
------------------
### 2.1.1. Zurich child and adolescent ADHD (cADHD) patients and parents including unrelated control‐sample {#ajmgb32695-sec-0004}
One hundred and ninety six Caucasian nuclear families (146 families with both parents and 50 families with one parent) were recruited and the index patients (aged 6--21 years) were phenotypically characterized in the outpatient units of the Department of Child and Adolescent Psychiatry and Psychotherapy, University Hospital of Psychiatry Zurich. Families were included if at least the index patient fulfilled the diagnostic criteria for ADHD (F90.0 or F90.1) according to ICD‐10 (Dilling, Freyberger, & Stieglitz, [1996](#ajmgb32695-bib-0020){ref-type="ref"}; World Health Organization, [2016](#ajmgb32695-bib-0077){ref-type="ref"}). Accordingly, this resulted in 727 individuals (258 probands with ADHD (males = 179, females = 79) and 469 controls (males = 203, females = 266); total of 382 male and 345 female participants). The ADHD diagnoses of the parents and siblings were reported by the parents. The psychiatric diagnostics of the index patient was assessed by a child and adolescent psychiatrist or psychologist under supervision of a senior psychiatrist in the clinic. The index patient was required to be ≥6 years and to have an IQ over 75 as assessed with either the Wechsler Intelligence Scale for Children (WISC; Tewes, Rossmann, & Schallberger, [1999](#ajmgb32695-bib-0064){ref-type="ref"}; Wechsler, [1991](#ajmgb32695-bib-0073){ref-type="ref"}), the Kaufman Assessment Battery for Children (K‐ABC; Kaufman & Kaufman, [1983](#ajmgb32695-bib-0030){ref-type="ref"}; Melchers & Preuss, [1994](#ajmgb32695-bib-0046){ref-type="ref"}), the Culture Fair Test (CFT‐20‐R; Weiss, [2006](#ajmgb32695-bib-0075){ref-type="ref"}), Snijders‐Oomen Nonverbal Intelligence Test (SON‐R; Tellegen, Winkel, & Laros, [2003](#ajmgb32695-bib-0063){ref-type="ref"}) or Intelligence and Development Scales (IDS; Grob, Meyer, & Hagmann‐von Arx, [2009](#ajmgb32695-bib-0024){ref-type="ref"}). Exclusion criteria were: (a) potentially confounding and severe psychiatric diagnoses such as psychosis, any pervasive developmental disorder, primary mood or anxiety disorder, and Tourette\'s disorder, (b) neurological disorders such as epilepsy, (c) a history of any acquired brain damage or evidence of the fetal alcohol syndrome, (d) premature deliveries (delivery before 37th gestational week), and/or (e) maternal reports of severe prenatal, perinatal or postnatal complications.
In the case--control setting, the 196 index patients (males = 148, females = 48) were compared to genetically independent 124 Caucasian healthy controls (males = 72, females = 52, aged between 5 and 18 years) who were recruited at the Departments of Child and Adolescent Psychiatry of the Universities of Würzburg and Zurich. The index patient in the case--control study was part of the family study and the inclusion and exclusion criteria were the same as described above. Informed written consent was obtained in all cases from the participants and their parents. The study was approved by the ethical commissions of all involved universities in accordance with the latest version of the Declaration of Helsinki, including an ethical permission granted by the Ethic Committees from Würzburg, and the Cantonal Ethic Committee of Zurich (Ref. Nr. KFO 140/03 and KEK‐ZH‐Nr. 2016--00101). Demographic characteristics of Zurich ADHD cases and controls are summarized in Supporting Information Table S2a and S2b.
### 2.1.2. Replication samples (Hungarian and German cADHD) {#ajmgb32695-sec-0005}
The SNP association study was replicated in samples from Budapest, Hungary and Würzburg, Germany, which were described in detail previously (Kereszturi et al., [2007](#ajmgb32695-bib-0031){ref-type="ref"}; Walitza et al., [2005](#ajmgb32695-bib-0071){ref-type="ref"}). The replication sample included child and adolescent patients with ADHD and their parents (Würzburg; Walitza et al., [2005](#ajmgb32695-bib-0071){ref-type="ref"}), and ADHD patients, their available parents and unrelated controls (Budapest; Kereszturi et al., [2007](#ajmgb32695-bib-0031){ref-type="ref"}) with the following characteristics: There were 171 Caucasian nuclear families (106 families with both parents and 65 families with one parent) with additional cADHD cases and healthy young adult controls from Budapest. In the family‐based setting this yielded 181 probands with ADHD according to ICD‐10 (males = 157, females = 24) and 312 controls (males = 132, females = 180), whereas the case--control study consisted of 206 cADHD patients (males = 180, females = 26, aged between 5 and 17 years) and 262 healthy controls (males = 160, females = 102, aged between 18 and 29 years). The Würzburg‐trios and duos included 387 children and adolescents affected with ADHD also according to ICD‐10 (males = 296, females = 91) and 540 controls (males = 275, females = 265).
The Ethics Committees of the respective universities approved the study and written informed consents were obtained from the participants and their parents after the study have been fully explained (see previous publications; Kereszturi et al., [2007](#ajmgb32695-bib-0031){ref-type="ref"}; Walitza et al., [2005](#ajmgb32695-bib-0071){ref-type="ref"}).
### 2.1.3. Genotyping {#ajmgb32695-sec-0006}
The study samples were genotyped for rs4988319 and rs3736228 in *LRP5*, and rs1012672 and rs2302685 in *LRP6*, which were chosen based on previous genetic findings (described in the introduction) and the availability of validated or functionally tested TaqMan assays. DNA was isolated either from whole blood collected in ethylenediaminetetraacetic acid tubes using QIAamp DNA Blood Maxi Kit (Qiagen), or from saliva collected in the Oragene DNA collection kit (DNA Genotek, Canada) and isolated as per manufacturer\'s protocol. DNA concentrations, A260/A280, and A260/A230 ratios were measured using a spectrophotometer (NanoVue Plus, GE). The study population was genotyped with DNA (10 ng), TaqMan® Genotyping Master Mix (Applied Biosystems), and *LRP5* or *LRP6* SNP Genotyping Assays (Applied Biosystems---see Supporting Information Table S3) combined in a 384‐well plate. Real‐time PCR was performed in a C1000™ CFX384™ Thermal cycler (Bio‐Rad) using TaqMan® SNP Genotyping Assay PCR standard protocol. Genotypes were determined by the allelic discrimination program of Bio‐Rad CFX Manager™ Software version 2.1. Samples were run in duplicates to ensure reproducibility. In case of ambiguity in duplicates, genotyping was repeated in a separate run to resolve the discrepancy. No‐template controls were included in every run to exclude impurities.
### 2.1.4. Statistical analysis {#ajmgb32695-sec-0007}
All association studies were run on the PLINK v1.7 (URL: <http://pngu.mgh.harvard.edu/purcell/plink/>; Purcell et al., [2007](#ajmgb32695-bib-0055){ref-type="ref"}). Each study group (case--control study) was tested for Hardy--Weinberg equilibrium (Supporting Information Table S4). For the case--control association study, the Fisher\'s Exact Test was conducted and significance was set at *p* \< .00417 following multiple testing corrections (four SNPs, three groups = male, female, and all together). For the family association study, Mendel errors test (none were found) followed by the transmission disequilibrium test was conducted as well as a parent‐of‐origin analysis. Power was calculated using the Genetic Association Study (GAS) calculator <http://csg.sph.umich.edu/abecasis/cats/gas_power_calculator/index.html>.
### 2.1.5. Meta‐analysis {#ajmgb32695-sec-0008}
We conducted literature search to find any publications that described genetic association studies for *LRP5* and *LRP6* SNPs in connection to ADHD or GWAS in European (Caucasian) ADHD. No previous GAS was available for these two genes in ADHD. However, we could find the GWAS by Hinney et al. ([2011](#ajmgb32695-bib-0028){ref-type="ref"}), and the GWAS results of the PGC (Demontis et al., [2017](#ajmgb32695-bib-0019){ref-type="ref"}; Martin et al., [2018](#ajmgb32695-bib-0045){ref-type="ref"}) containing the SNPs analyzed in the current study. A meta‐analysis was conducted with the currently studied populations (Zurich, Budapest, and Würzburg) together with the cADHD results from Hinney et al. ([2011](#ajmgb32695-bib-0028){ref-type="ref"}) using the MIX 2.0 Pro v.2.0.1.4 (BiostatXL, 2011. <http://www.meta-analysis-made-easy.com>). The PGC‐ADHD results were not added into the meta‐analysis, as the results from the PGC GWAS would outweigh our three study samples, due to a larger sample size, as well as high heterogeneity since the PGC did not contain solely cADHD patients. Therefore, the results of the PGC‐ADHD were used only as comparison to the meta‐analysis results. Variability, due to between‐study heterogeneity, was estimated by *I* ^2^ and funnel plots (Supporting Information Table S5), followed by Begg\'s and Egger\'s regression test (Begg & Mazumdar, [1994](#ajmgb32695-bib-0005){ref-type="ref"}; Egger, Davey Smith, Schneider, & Minder, [1997](#ajmgb32695-bib-0021){ref-type="ref"}; Supporting Information Table S6) to evaluate publication bias due to heterogeneity, and the quality of the studies was assessed based on traditional epidemiological considerations as previously described in Liu et al. ([2015](#ajmgb32695-bib-0040){ref-type="ref"}) (Supporting Information Table S7 and S8). Following heterogeneity tests, fixed‐effects model was used to conduct the mea‐analysis when *I* ^2^ demonstrated no significant heterogeneity in the samples, whereas the random‐effects model meta‐analysis was run if heterogeneity was found (see type of test used for each test in Supporting Information Table S5).
### 2.1.6. Gene expression patterns and functional findings {#ajmgb32695-sec-0009}
To elaborate whether the four SNPs studied may have any potential functional effects on gene expression or epigenetic targets, the SNPnexus (<http://www.snp-nexus.org/>; Chelala, Khan, & Lemoine, [2009](#ajmgb32695-bib-0012){ref-type="ref"}; Dayem Ullah, Lemoine, & Chelala, [2012](#ajmgb32695-bib-0016){ref-type="ref"}; Dayem Ullah, Lemoine, & Chelala, [2013](#ajmgb32695-bib-0017){ref-type="ref"}) and eQTLs for both genes according to GTEx (<https://www.gtexportal.org/home/>; Consortium, [2013](#ajmgb32695-bib-0013){ref-type="ref"}) were run (see results Supporting Information Table S1). Furthermore, the gene‐expression profiles in various brain regions compared to whole blood and nerve‐tibial were extracted from GTEx data for *LRP5* and *LRP6* stratified by sex. Welch two‐sided *t* test was conducted between the two sexes for each of the tissue analyzed. Since ADHD is a neurodevelopmental disorder, and most likely the transcript patterns alter with age, we downloaded the expression profiles of the two genes from the BRAINSPAN consortium (<http://www.brainspan.org/>) focusing on several brain regions (dorsolateral prefrontal cortex, orbital frontal cortex, hippocampus, amygdala, striatum, and cerebellum) to create age trajectories for the expression of the two genes.
3. RESULTS {#ajmgb32695-sec-0010}
==========
3.1. LRP5 and LRP6 genetic associations in cADHD {#ajmgb32695-sec-0011}
------------------------------------------------
Linkage disequilibrium (LD) values between the two *LRP5* SNPs and the *LRP6* SNPs demonstrated weak linkage in all studied cohorts, similar to the NIH LDlink data for European populations (extracted from <https://analysistools.nci.nih.gov/LDlink/?tab=home>; see Supporting Information Table S9). Therefore, we could conclude that the resulted association was independent of each other.
In the case--control study a nominal significant association between *LRP5* rs3736228 and ADHD was observed in the Zurich sample (OR = 2.043, 95% CI 1.209--3.453, *p* = .0067, power = 0.944; Supporting Information Table S10). This association was significant after stratification by sex only in ADHD females (OR = 3.614, 95% CI 1.519--8.6, *p* = .0024, power = 1.0). Nominal significant sex‐specific association was also present at this *LRP5* SNP in the Budapest case--control sample (OR = 2.549, 95% CI 1.218--5.334, *p* = .0109, power = 0.995). Moreover, *LRP5* rs4988319 was nominally associated with ADHD in the female subgroup from Budapest (OR = 2.12, 95% CI 1.007--4.462, *p* = .0444, power = 0.923).
Although no significant association between *LRP6* rs1012672 or rs2302685 and ADHD was detected in any one of the three European samples, some tendencies could be observed (Supporting Information Table S10). However, following sex stratification, nominal significant association of the *LRP6* rs2302685 was observed among males using the case--control design at both the Zurich and Budapest ADHD samples (OR = 1.971, 95% CI 1.13--3.438, *p* = .0159, power = 0.904; OR = 1.516, 95% CI 1.009--2.277, *p* = .0441, power = 0.519, respectively). Family based association analyses of the *LRP6* SNPs yielded only tendency toward association in the Zurich sample (Supporting Information Table S10).
3.2. Meta‐analysis of LRP5 and LRP6 SNPs in children and adolescents with ADHD {#ajmgb32695-sec-0012}
------------------------------------------------------------------------------
In order to evaluate the associations found with ADHD, we performed a meta‐analysis including both the case--control and family studies (Zurich, Würzburg, and Budapest) with available published data from Hinney et al. ([2011](#ajmgb32695-bib-0028){ref-type="ref"}). As described in the methods section, the large PGC‐ADHD GWAS (Demontis et al., [2017](#ajmgb32695-bib-0019){ref-type="ref"}; Martin et al., [2018](#ajmgb32695-bib-0045){ref-type="ref"}) was not added into the current meta‐analysis and was only used as a comparison study, because it consisted of both cADHD and aADHD, as well as due to its weight comparing to the other studies (Supporting Information Table S7‐S8). Following heterogeneity analysis (Supporting Information Table S5 and Figure S1) a fixed‐effect model analysis was conducted since no significant heterogeneity was detected. At the *LRP5* SNPs we could not find significant association with cADHD (Figures [1](#ajmgb32695-fig-0001){ref-type="fig"}a and [2](#ajmgb32695-fig-0002){ref-type="fig"}a). On the other hand, a tendency was observed at *LRP6* rs1012672 (total *n* = 4,712; OR = 1.262, *p* = .0559, power = 0.884; Figure [3](#ajmgb32695-fig-0003){ref-type="fig"}a), and a nominal significant association was detected at *LRP6* rs2302685 with ADHD (total *n* = 2,917; OR = 1.206, 95% CI 1.03--1.413; *p* = .0197; power = 0.794; Figure [4](#ajmgb32695-fig-0004){ref-type="fig"}a).
\]](AJMG-180-365-g001){#ajmgb32695-fig-0001}
\]](AJMG-180-365-g002){#ajmgb32695-fig-0002}
\]](AJMG-180-365-g003){#ajmgb32695-fig-0003}
\]](AJMG-180-365-g004){#ajmgb32695-fig-0004}
Following sex stratification, a nominal significant association of *LRP5* rs4988319 and a significant association of *LRP5* rs3736228 was observed with cADHD among females (total *n* = 229; OR = 1.8, 95% CI 1.073--3.024, *p* = .0259, power = 0.731; total *n* = 957; OR = 2.083, 95% CI 1.292--3.359, *p* = .0026, power = 0.998; respectively; Figures [1](#ajmgb32695-fig-0001){ref-type="fig"}c and [2](#ajmgb32695-fig-0002){ref-type="fig"}c). On the other hand, at *LRP6* rs2303685 significant association with cADHD was present in males (total *n* = 559; OR = 1.661, 95% CI 1.196--2.307, *p* = .0024, power = 0.846; Figure [4](#ajmgb32695-fig-0004){ref-type="fig"}b).
To test the sex effect, we ran a regression analysis (generalized linear mixed model) looking at the sex and SNP dosage and their interaction including the sites as a random effect in order to account for possible site‐effects. The regression analysis showed significant association between sex and ADHD but no significant SNP × sex interaction was detected (Supporting Information Table S11). Nevertheless, some suggestive sex effects were found supporting the meta‐analysis results, as the probability to have ADHD increased with the number of risk allele at *LRP5* rs4988319 in females (Supporting Information Figure S2a). Similarly, a modest increase for having ADHD could be seen for those with the risk allele of *LRP5* rs3736228 (Supporting Information Figure S2b). Whereas at *LRP6* rs2302685 the probability to have ADHD increased with the number of risk allele only in males (Supporting Information Figure S2d).
3.3. PGC‐ADHD GWAS results for LRP5 and LRP6 SNPs {#ajmgb32695-sec-0013}
-------------------------------------------------
In order to compare the current findings that focused on Caucasian cADHD patients, we extracted the summary statistics of the newest (November 2017) available PGC data for European ancestry ADHD patients (child and adolescent as well as adults) and then stratified data by sex (Demontis et al., [2017](#ajmgb32695-bib-0019){ref-type="ref"}; Martin et al., [2018](#ajmgb32695-bib-0045){ref-type="ref"}). Only a suggestive association was observed between ADHD and *LRP5* rs3736228 among females (OR = 1.0942, 95% CI 1.0197--1.1742, *p* = .2779). While, *LRP6* rs2302685 showed association with ADHD only in the female subgroup of the PGC cohort (OR = 1.177, 95% CI 1.0858--1.2503, *p* = .0208). Therefore, none of the associations found in the meta‐analysis could be confirmed in the PGC‐ADHD data (Supporting Information Table S10). Nevertheless, observing all SNPs\' association results of the PGC‐ADHD dataset at the *LRP5* gene (Supporting Information Figure S3), a nominally significant signal could be seen in the male/female combined population at rs4988321 (*p* = .032), which is in moderate LD with rs3736228 (*D*′ = 1.0, *R* ^2^ = 0.227 at CEU; *D*′ = 0.967, *R* ^2^ = 0.266 at EUR) but not with rs4988319 (*D*′ = 0.219, *R* ^2^ = 0.009 at CEU; *D*′ = 0.514, *R* ^2^ = 0.056 at EUR). This association was specifically stronger (*p* = .0086) at the female population in the sex stratified Manhattan plot (Supporting Information Figure S3c). Similarly, around the studied *LRP6* SNPs, some nominally significant signals could be observed in the male/female combined study population (Supporting Information Figure S4a), that were particularly enhanced in the stratified female ADHD population (Supporting Information Figure S4b).
3.4. Sex and age dependent LRP5 and LRP6 gene expression patterns in brain tissue {#ajmgb32695-sec-0014}
---------------------------------------------------------------------------------
According to GTEx database, *LRP5* transcript expression in various brain regions is rather low compared to the nerve‐tibial, but higher than whole blood samples (Supporting Information Figure S5). Similar pattern was observed for *LRP6* transcript with slightly higher expression levels in brain regions (Supporting Information Figure S6). *LRP5* transcript was expressed significantly higher in male brain‐spinal cord, whereas slightly higher expression in female could be observed in the cerebellum, nucleus accumbens, putamen, and substantia nigra, however in the last three not reaching significance. *LRP6* transcript was expressed significantly higher in male brain‐cortex, and slightly more expressed in male caudate, spinal cord, and nerve‐tibial, however not reaching significance. As the GTEx data represents aged population, age dependent gene‐expression was extracted from the BRAINSPAN database (Supporting Information Figure S7). From the six brain regions extracted, *LRP5* and *LRP6* expression show a strong age dependency with higher levels at embryonal and early postnatal stages compared to middle age subjects (up to 40 years of age), in which the expression becomes lower starting from around 19 years of age (corresponding to 1,000 weeks).
4. DISCUSSION {#ajmgb32695-sec-0015}
=============
The involvement of Wnt‐signaling in neurodevelopmental and neurodegenerative disorders have been widely discussed, particularly in ASD and AD with several studies pointing to its role in cognition and behavior (Kwan et al., [2016](#ajmgb32695-bib-0034){ref-type="ref"}; Libro, Bramanti, & Mazzon, [2016](#ajmgb32695-bib-0038){ref-type="ref"}; Mulligan & Cheyette, [2017](#ajmgb32695-bib-0047){ref-type="ref"}; Rios, Cisternas, Arrese, Barja, & Inestrosa, [2014](#ajmgb32695-bib-0056){ref-type="ref"}; Wang et al., [2017](#ajmgb32695-bib-0072){ref-type="ref"}; Zhang et al., [2014](#ajmgb32695-bib-0081){ref-type="ref"}). In the current study, we tested the hypothesis that *LRP5* and *LRP6* gene variants, coding for essential receptors for the Wnt‐pathway activation, associate with ADHD among children and adolescents, in a sex‐specific manner. Among the four studied gene variants, our meta‐analysis showed significant association between *LRP5* rs3736228 (Ala1330Val) and cADHD in girls, while *LRP6* rs2303685 (Val1062Ile) was associated with cADHD in boys. This phenomenon could also be observed in the more heterogeneous ADHD population studied in the PGC‐ADHD, consisting of both cADHD and aADHD samples, in which nominally significant SNP signals on the Manhattan plots were found to be specific for females at *LRP5*, however no clear‐cut result for *LRP6* gene variants emerged. This discrepancy between our results and the PGC‐ADHD might be due to higher heterogeneity observed in the PGC‐ADHD sample, considering the age of onset that may play a major role with these gene variants. Indeed, BRAINSPAN dataset analysis (Supporting Information Figure S7) demonstrated age‐dependent gene expression of both *LRP5* and *LRP6* with higher transcript levels at brain developmental stages while lower in adulthood. Independent to age effects, in GTEx dataset some hint for higher expression of *LRP5* in aged females and of *LRP6* in aged males was observed (Supporting Information Figures S5 and S6, respectively), point to sex‐dependent regulation.
The Wnt‐signaling genes were shown to display sex differences in gene expression levels in a study of human placental transcriptomics of male and female embryos (Sedlmeier et al., [2014](#ajmgb32695-bib-0059){ref-type="ref"}). In this study, the authors tested the effect of maternal dietary n‐3 polyunsaturated fatty acid supplementation during pregnancy, measuring the offspring\'s fat mass and development. Interestingly, the authors revealed significant sex‐dependent gene expression difference in control placentae per se, in which Wnt‐signaling genes were down regulated in male compared to female placentae (Sedlmeier et al., [2014](#ajmgb32695-bib-0059){ref-type="ref"}). Furthermore, n‐3 unsaturated fatty acid supplementation affected the placental transcriptomics much stronger in females, as demonstrated with decreased *LRP6* mRNA levels in the n‐3 supplemented female placentae (Sedlmeier et al., [2014](#ajmgb32695-bib-0059){ref-type="ref"}), whereas male placenta transcriptomics did not result in such alterations. In addition, the authors showed significant positive correlation with placental estradiol‐17β/testosterone ratio and *LRP6* expression (Sedlmeier et al., [2014](#ajmgb32695-bib-0059){ref-type="ref"}). One possible explanation to this sex‐dimorphic effect is that there is at least one estrogen receptor alpha response element within the gene body of the Wnt‐signaling genes, which might affect their transcription regulation via sex hormones (Sedlmeier et al., [2014](#ajmgb32695-bib-0059){ref-type="ref"}).
Lastly, some limitations should be mentioned, such as the relatively modest sample size of the sex‐stratified ADHD cohorts at certain gene variants in the meta‐analysis, the heterogeneity of the PGC‐ADHD used as a comparison study, and the limited number of variants studied within the two genes. Therefore, some caution should be taken at the interpretation of our results, especially at those analyses where only two independent study cohorts could be used. Nevertheless, our study\'s strength lies in the more homogenous, childhood‐onset ADHD samples recruited from European populations with the same diagnostic tools and similar inclusion/exclusion criteria.
In summary, we were able to demonstrate genetic associations between nonsynonymous *LRP5* and *LRP6* variants with cADHD in a sex‐specific manner. These results could highlight genetic variants with modified receptor functions in the Wnt‐signaling playing important role in brain development and maturation, which is particularly vulnerable in children and adolescents with ADHD. However, this hypothesis should be further investigated at the molecular and cellular levels, for example, using animal models or using induced pluripotent stem cell neuronal modeling techniques. In the light of our previous findings that methylphenidate activates Wnt‐signaling (Grünblatt et al., [2018](#ajmgb32695-bib-0025){ref-type="ref"}), we suggest that LRP5/6 coreceptors could be regarded as possible new therapeutic targets in ADHD treatment, especially in childhood when brain maturation is still ongoing.
CONFLICT OF INTEREST {#ajmgb32695-sec-0017}
====================
The authors declare no conflict of interest.
Supporting information
======================
######
**Table S1:** Supplementary Table.
######
Click here for additional data file.
######
**Appendix S1:** Supplementary Material.
######
Click here for additional data file.
The authors thank the families, patients, and control volunteers who participated in this research. The authors would like to acknowledge Psychiatric Genomics Consortium (PGC) ADHD for providing us with the newest summary statistics of the GWAS, Ms. Miryame Hofmann and Mrs. Susanne Kunert‐Dümpelmann for their laboratory technical support. The authors acknowledge the national grant that supported the Hungarian study (NAP‐B KTIA_NAP_13‐2014‐0011), the Deutsche Forschungsgemeinschaft (DFG) grant that supported the German study (KFO125; HE1446/9‐1, HI865/2‐1) and the postdoctoral grant support for Anna Maria Werling by the University of Zurich, the "Filling the Gap program".
|
Q:
Bitmap size exceeds VM budget, not understanding why
I've looked all over for "Bitmap size exceeds VM budget" problems, but none of the solutions seem applicable for me. I am not understanding why my program sometimes throws this error because they way I'm using it doesn't seem to cause any possible memory leaks. My stack traces are pointing to the BitmapFactory.decodeResource() method. I've got a background image that I'm using to draw on a Canvas and this is how I've been initializing it:
Bitmap backgroundImage = BitmapFactory.decodeResource(getResources(),
R.drawable.background);
backgroundImage = resizeImage(backgroundImage, w, h);
This is how I've been using it:
canvas.drawBitmap(backgroundImage, 0, 0, paint);
I thought that putting backgroundImage = null in the onDestroy method would help, but that did nothing. There is not other reference to the background image resource in my program except in an XML file, but I don't think that affects it. Could someone explain to me why this is happening and how to fix it?
By the way, there is not screen orientation changes involved in this app.
A:
You need to free the bitmap pixels when you're done with it. You mentioned that you set its value to null, but that only makes it eligible for GC, it does not explicitly tell the VM that you're done with those pixels, and that now is a good time to free them.
Before you set it to null, simply call Bitmap#recycle() on the Bitmap:
protected void onDestroy() {
if (this.backgroundImage != null) {
this.backgroundImage.recycle();
this.backgroundImage = null;
}
}
Additionally, you may be wasting resources in your resizeImage() method, which you did not provide code for. It's much more efficient to do proper down-sampling of the Bitmap at decode-time, rather than loading the full-size Bitmap, and then scaling it down from there.
The general technique is to use the 3-argument version of BitmapFactory.decodeResource(), with BitmapFactory.Options#inJustDecodeBounds for a first-time-pass in order to get the width/height of the Bitmap (although in your case, since it comes from the app's resources, there's no reason you should even have to do that.. but I'll explain it anyway); then determine a proper samplesize based on the target size, and decode the bitmap a second time. That usually results in much less memory usage, especially for very large images (e.g., with inSampleSize set to 2, it decodes the full-size Bitmap, but only allocates enough memory for a Bitmap of half the original size, downscaling the Bitmap in the process).
|
I can barely recall my first kiss, it might have been at a high school disco, but I don’t remember who with. I’m a bit vague as to what I did at my first day of work. Most of what I learnt at school is a distance memory, don’t ask me what themes Romeo and Juliet examines. However, I can tell you exactly where, what I was wearing and who I was with when I got my first survival knife, which was well over 20 years ago now. Recalling the memory brings back some very fond childhood memories with my dad, which I hope someday to recreate with my own son. My first knife was an old sheath knife with an antler horn handle, it was a bit rusty and wasn’t particularly sharp, but it signified that I was to be trusted with a potentially dangerous tool and satisfied some very primal urges. My long love of knives began at this time and I’ve extended my collection significantly since then.
If a film contains a survival knife you can bet that it’s going to be something cool, but is there really any practical application to having a survival knife, if you have one in the real world would it ever get any use?
In spite of our advancements in medicine, travel, technology and communications, millions of people around the world are thrust into disaster situations and are at the mercy of the elements or assistance from strangers. Additionally, thousands of people globally accidentally find themselves in a unexpected random life and death situations where the difference between life and death can depend on a little knowledge and the tools and resources available. So what? It is prudent, whenever possible, to keep irreplaceable survival tools close at hand just in case the unthinkable happens. Possibly the most important tool you can have is a quality survival knife. No other tool or piece of equipment can replace the survival knife, it’s proved itself throughout history as a must have piece of kit. Since modern man started making its way out of Africa, we have always relied on some sort of cutting tool to meet our most basic survival needs: shelter, fire, food and water. Over thousands of years the cutting tools have developed from simple stone tools into beautifully engineered survival knives. However, it should be noted that not all survival knives are created equally.
I’m fortunate enough to have the opportunity to try out many types of survival knives at BladesPro on an everyday basis. I can even take a selection with me when my partner and I go for a day or weekend into the wilderness. However, I realise this is not possible for most people. At the very least, a survival knife should be available when you’re likely to need it most i.e. when you’re out and about in the wilderness. The more often you have it with you, the more often you’ll likely find a use for it, even if it’s not a survival situation. I always have one in my car as who knows when you might need to cut your seat belt or smash a window. So regardless if you’re backpacking, fishing, hunting, skiing, hiking, boating or camping, a good knife is a trusted irreplaceable companion. I’m rarely if ever out and about without one.
Survival knives are as the name implies, knives that help you to survive. A well made survival knife can have hundreds of uses, including:
Cutting/Slicing
Splitting
Signaling
Shelter Building
Self-Defense
Prying Tool
Make-Shift Screwdriver
Hunting Weapon
Hammering
Food Prep
First Aid Tool
Fire Making
Digging
When it comes to buying a knife, not just a survival knife, buying something well built and functional is far more worthwhile than a knife with lots of bells and whistles. Leave the survival knives with 100 accessories for the films and buy something which is well designed and built to last. Function out performs aesthetics. Your number one priority is how the knife performs, which in itself depends on a variety of time tested key features.
The Six Defining Features of a Survival Knife
Size
Despite what you might have been told, size does indeed matter. However, bigger is not always better. If your blade is too big, you’ll find that your knife is impractical for work which requires precision, such as carving delicate snares sets or preparing small game.
On the other hand, a small knife might not be up to the task of chopping or batoning. Batoning involves striking the back of your knife with another object in order to drive it through stubborn or thick wood. This technique is invaluable if you plan to use the blade for splitting small logs or for cutting through the limbs of trees.
From my own personal experience, I find that a knife between 20 – 30 cm in length is ideal. You should look for something with a 10 – 15 cm blade in order to be effective.
Fixed Blade
A fixed blade survival knife is undeniably more reliable than a standard folding knife. While a good folding survival knife is a great tool to keep in your pocket for everyday use, a fixed blade reigns supreme when it comes to meeting demands of a genuine survival scenario.
Any moving parts of joints represent a potential weakness in a knife. You should wherever possible work to minimise your risk exposure when in a survival situations, you can do this by picking a tool which is better suited to taking the abuse chopping, prying, pounding and cutting will impart on a knife.
Full Tang
Since we’ve established that a survival knife should be fixed blade, we should also establish that a survival knife needs to be full tang. The term full tang means the knife and handle are made from one piece of continuous metal. A grip is normally attached to the handle to improve the comfort and the ability to actually grip the knife. A full tang knife is substantially more robust than an equivalently made partial tang knife such as half tang, push tang or rat tail tang.
A partial tang knife is prone to loosening over time, often developing play in the handle, especially when the knife is subjected to demanding jobs such as chopping, prying or batoning. When a partial tang blade becomes loose, it can be extremely difficult to effectively fix them without specialist tools, it also becomes a liability and can easily catastrophically fail and cause serious injury. In comparison, a full tang knife still functions as a knife even if the handles come loose, it can even be wrapped in paracord or rags in order to create a replacement grip.
I know off no advantage offered by a partial tang knife when compared to a full tang blade, assuming the materials used are identical. It’s very difficult to completely break a single piece of continuous solid metal. It can usually be quite easy to spot a full tang knife, just look for the metal handle to be sandwiched between the knifes scales.
Sharp Pointed Tip
This might be an clear decision for some of our readers, but make sure you pick a survival knife with a sharp point. I’ve seen many so called survival knives with rounded, hooked or angles tips. So despite what you might have been told, there are many good arguments as to why your survival knife should have a sharp pointed tip. The first is its ability to pierce things. Any knife without a sharp tip will not be as effective at piercing thick fur, hide or any other similar material.
As such, a spear pointed knife can by itself be used a hunting weapon, either when lashed to a pole in order to create a spear or by itself. If the scales on your survival knife can be easily removed then the blade of the knife can be more easily seamlessly integrated into a staff to form a spear.
In addition to its piercing abilities, a sharp pointed knife presents several advantages versus any other type of blade tip. Below I’ve compiled a short list of tasks which a sharp pointed knife is especially good at.
Drilling or notching wood
Repairing clothes or gear
Removing splinters
Detailed picking or prying
Cleaning and preparing small animals such as fish
Processing wild edibles
Accessing bait in otherwise difficult to reach areas
Single Edged Blade
A survival knife should not be sharpened on both sides in the style of a dagger. A double edged blade is rarely if ever preferable over a single edged knife in the vast majority of survival situations. In fact, it can be a real disadvantage.
Not only is it preferential to have a single edged blade, but it’s far superior to have a survival knife with a flat spine, one which has been ground at a 90 degree angle to the blade. A flat spine is perfect for striking a ferro-rod, while a bevelled or rounded spine makes this task almost impossible.
When out in the woods or camping, I will often use my knife to baton through larger pieced of weed. Regardless of whether I’m splitting wood for a fire or constructing a shelter, a knife which was sharpened on both edges would make this task much harder.
With a flat backed knife I can also use my thumb as a rest for increased control when performing tasks that require a high degree of accuracy, such as notching triggers for traps or creating snares. This is not something I would want to attempt with a double edged knife as the risk of injuring myself is greatly increased.
Substantial Pommel
In case you didn’t know, the pommel is the bottom of a knifes handle, and may also be referred to as the butt. I will often use the pommel on my survival knife for some jobs that require a light amount of hammering. It’s great for driving in shelter pegs. I’ve also had circumstances when I’ve been able to use the point of my knife to create a temporary fishing hole in ice by hammering the pommel of my knife with a piece of wood in order to push the tip of the knife into the ice. You might find that some knives are designed with a rounded or hooked pommel, this shape is far from ideal for hammering. If you want to get the maximum amount of use out of your survival knife, opt for one with a substantial well designed pommel.
Bottom Line
Use the criteria laid out above as the groundwork for picking the perfect survival knife. At the end of the day, only you can decide what you really need from your survival knife and what features you can do without. Anything that’s not covered in the criteria above pretty much come down to personal preference.
There are more than a few survival knives out there that cover every one of the six must have features, yet they may be aesthetically different and diverse in their appearance. There are numerous design and style options that effect how the knife looks but also have very little bearing on the survival knives functionality. Some of these features may include:
Final Words
A survival knife is just a tool and like any other tool its effectiveness is often dictated by the skills of whoever is wielding it, it’s not a magic wand nor will it automatically save your life. Skills only come with repeated use and practise, even the most talented tradesman, musicians or actors spend years practising their trade to become proficient.
Don’t buy a survival knife just as a piece of decoration, it is a tool that needs and should be used. Modern man has always used cutting blades, they have helped our species evolve and influenced how we shape the world around us. No other tool has had a bigger impact on how we hunted, fought, built or survived in the wilderness. From early humans wandering the plains of Africa to modern soldiers on the battlefield, there is no other relationship like that between a man and his trusty blade. Make sure you pick yours carefully.
Leave a Reply.
ABOUT US
BladesPro are pleased to provide an exciting and extensive range of quality Knives and Swords. We pride ourselves on our commitment to excellence and professionalism, putting our customers needs and wants at the center of all our decisions. Our knives and swords are sourced directly from the manufacturer and are shipped to you, cutting out the middle man and saving you money. |
The value of pH as a quality control indicator for apheresis platelets.
Standards and regulations require measurement of pH as an apheresis platelet (PLT) component quality monitor. The usefulness of this quality control (QC) measure was investigated. QC data were retrospectively reviewed for apheresis PLTs collected over 4.5 years. Three collection devices were used, the Amicus (Baxter), the CS-3000 Plus (Baxter), and the MCS+ LN9000 (Haemonetics). Each month, four components from each instrument were sampled. PLT counts and component volume were measured immediately after collection, and pH, after 5 days of storage. A total of 668 products were studied. pH decreased as PLT concentration increased (r(2) = 0.129, p < 0.001) and as component volume decreased (r(2) = 0.086, p = 0.02). PLT concentration and volume, however, were poor predictors of a low pH. Apheresis instrument type affected pH. The 216 components collected with use of the CS-3000 device had a lower pH than components from the other two instruments. Only 13 components had a pH value less than the acceptable level of 6.2, 12 of which were collected with the CS-3000. For newer-model blood cell separators, pH measurements do not provide information that might identify a manufacturing problem. Because factors that influence pH are controlled or monitored for each component, evaluation of pH on a sample group provides an indication of the quality of specific component only, rather than an effective monitor of the quality of the manufacturing process. |
2009 2. divisjon
The 2009 2. divisjon season was the third highest football (soccer) league for men in Norway.
26 games were played in 4 groups, with 3 points given for wins and 1 for draws. Strømmen, Follo, Sandnes Ulf and Ranheim were promoted to the 2010 Norwegian First Division. Number twelve, thirteen and fourteen were relegated to the 3. divisjon, except for the two number twelve teams with the most points. The winning teams from each of the 24 groups in the 3. divisjon each faced a winning team from another group in a playoff match, resulting in 12 playoff winners which were promoted to the 2. divisjon.
League tables
Group 1
Group 2
Group 3
Group 4
Top goalscorers
28 goals:
Morten Eriksen, Sandnes Ulf
21 goals:
Eirik Markegård, FK Tønsberg
Trond Haugstad, Strømmen
Remond Macougne Mendy, Raufoss
Mato Grubisic, Valdres
20 goals:
Christian Østli, FK Tønsberg
19 goals:
Christopher Joyce, Pors Grenland
18 goals:
Øyvind L. Gausdal, Vindbjart
Joakim Rudolfsen, Mo
17 goals:
Vebjørn Svensson, FF Lillehammer
Promotion playoff
References
Tables: Group 1, Group 2, Group 3, Group 4
Goalscorers
Category:2. divisjon seasons
3
Norway
Norway |
The Yards (2000)
Leo (Mark Wahlberg), a recently released convict, finds himself on the right track as he has a job lined-up for him and everything. But that all goes South once he finds out that his boss and company are up to some shady-business. The business is owned by his uncle (James Caan) and ran mainly by his bestie (Joaquin Phoenix). So yeah, basically the guy is having a lot of problems being able to separate right from wrong and family from enemies, but to top it all off: His mother (Ellen Burstyn) is sick, and not getting any better. Isn’t coming home just grand?
This is one of those rare movies that somehow found it’s way of sinking in beneath the cracks, without anybody ever knowing about it or even mentioning it, unless they were some prestigious film critic that had the privilege to see it in theaters, or some ultra-fan of Marky Mark. It was just one of those movies that had its stars and its premise, but didn’t have the backing it would have had, had it been released in today’s world. Thankfully, that’s what On Demand is for – to remind me what an idiot I was before when I watched this movie.
In case some of you don’t know what I mean by that, I reviewed this movie a long, long time ago, in a galaxy far, far away and thought that the movie plain and simply blew. Now, maybe those weren’t my exact words or anything, but the fact of the matter was that I was bored, annoyed and just tired from watching this movie about a bunch of a-holes, act like bigger a-holes to one another, and make it seem as if family is some sort of reason for allowing a person to almost die. I wasn’t having any of it, and gave the movie a low rating. But after these years, I think I’ve come to realize that this is just one of those movies that’s a nice watch, but you got to be in the mood for it.
Still has that Dirk Diggler cut going on? Oh, now I see what type of living he’s going to be making nowadays.
Even though the movie may be advertised as a slam-bang, action-thriller with Marky Mark, guns, violence, crime and Johnny Cash acting all sly on us, it’s totally not. Don’t get me wrong, there is plenty of Marky Mark, guns, violence, crime, and Johnny Cash to be found here, but it’s not the way that most mainstream movies would paint it as. Writer/director James Gray is a step above that in the way that he has everything all slowed down so that not only can you get in the mood for what’s about to unfold, but also get involved with the characters as well.
If anything, that’s what the movie really blew me away with: The characters. Gray captures what it’s like to be and live in a close family that does almost everything and anything for each other, even if that means sticking their heads in a little bit and killing some people in the mean time (hey, it’s family, right?). He shows how everybody interacts with one another, who likes who, who doesn’t, what their type of relationship is, the why, the where, the who, and the be, being, been. All of that fun and nasty stuff is included here to give us a full picture of what to not only expect from these family members, but why.
That’s why once everything gets all wacky and crazy at the end, it’s still somewhat believable because we feel like we know these characters, and can come to expect them to commit dumb actions, given the circumstances. Some are conventional and obvious with their actions, but the way they are painted with morally-corrupt souls, than just normal, generic assholes, is what takes you for a left turn. Not everybody is bad, but the ones that are, stay in your mind and really mess with it, especially just as everything begins to boil down as to “who is going to betray who next?”. That aspect of the movie is fun to see, but given the character-development, it’s more than just a bit entertaining.
However, Gray’s sense of style doesn’t always work with me. For my first, initial-viewing, the slowness bothered the hell out of me to the point of where I was snoozing left and right. After these years of seeing worse movies that take it’s slo-mo pill for the sake of being slow; I thought I’d get used to it. But that’s where I was slightly wrong. See, Gray’s style is that he lets a lot of scenes just linger on and on until they really get under your skin. That works for a good couple of scenes, but after awhile, it goes on too long and seems like it’s the only trick in the book that this guy had to play. I don’t mind when my action isn’t non-stop guns and explosions, but don’t slow everything down just to have it all settle in. With time, it will. Trust me, my friend.
A bastard, a beotch, and a poor child with no promising-future. Now say cheese!
As slow as the movie was at times, it still didn’t take away from the final-product, nor its performances. Marky Mark was pretty solid as Leo because he isn’t called on much to do except to look concerned, and to brood the whole time with his angry face. He does it very well, even if it does feel like his character’s blandness gets lost in a sea of overly wild members of the cast like James Caan and Joaquin Phoenix. Caan is great as the slimy, untrustworthy step-uncle that seems like he means well and all, but in all honesty: Just wants money and fame. And he’ll do whatever it takes to get that dream of his. Whatta bastard. Joaquin Phoenix is fun to watch as Leo’s best buddie because he gets a chance to show that wild side we always see so much, but also show you how much a person can get so tangled in a web, without ever having a clear enough head to know when the hell to get out. Phoenix is good at showing those contrasting sides, and it’s what makes his character more than just a fuck-up. He’s a sympathetic fuck-up, at the most.
For the ladies, you still have a pretty solid troupe, but nobody really worth going crazy about. Charlize Theron is good as Erica, Leo’s cousin and Joaquin’s girl, because she’s able to get past the fact that she is a beautiful woman underneath it all, and just let her character win you over. She’s a bit grimy and dumb for staying with a d-bag like Phoenix’s character, but you see where she’s coming from and it’s not hard to feel for her once everything goes South. Theron’s always a capable actress, and doesn’t let herself get up-staged when she’s right next to vets like Faye Dunaway and Ellen Burstyn. Both are good for what it is that they are called upon to do, but that doesn’t seem as if it’s really saying much, once the ending hits you like a ton of bricks.
Consensus: James Gray may use a couple of the same tricks a little too much, but he still keeps The Yards interesting and compelling with it’s three-dimensional characters, the situations that they are put in and the decisions they are forced to make. Some of which, won’t make you too happy.
7 / 10 = Rental!!
Oh Charlize. How you always love to make men think you don’t actually look like this.
When it first came out I loved it and I seemed pretty alone in liking it as none of my friends appreciated it. Happy to see it get some love here. One which I haven’t watched in a long time. This review makes me want to rewatch it again. |
AFFIRMATION: "I AM FOCUSED IN MY HANDS AND BODY. WHERE I GO, WHAT I DO, AND HOW I DO IT MATTER."
FIRE READING - 8.22-8.29
AFFIRMATION: "UNTIL I AM READY TO SPEAK, I THINK, AND I DANCE."
THIS WEEK: You have something important inside of you trying to get out. Let your words come into focus so you can use them after Mars goes direct on the 26th. Until then figure out what you want to say, but mostly enjoy trying to say it, messing it up, and being human in general.
When we tune into the fire there is an image of a loving woman arms outstretched to the sun, the world, the human race. She seems to be both gathering in the light of the sun and offering her heart to it. She is somewhere in between revelling in the moment and trying to capture it with words. Let yourself be there. Be where you are and try to understand it, and know that this is what all great music, theater, opera and art in general are made of: Human beings, trying to reckon with themselves, nature, the world they find themselves in, and their place in it relative to the each other and the whole damn universe.
But this woman (that’s you) is clearly trying to express something so deep which is probably well… herself and her truth. Whatever you’re dealing with RN, remember that the stakes are this high.
COLORS TO POP: Hippie earth tones or patchwork colors and woven patterns. CRYSTALS TO VIBE: Sandstone, aquamarineOILS TO ANOINT: Geranium, sandalwoodSNACKS TO NOSH: Rooibos tea, magic mushrooms, honeycomb candy.INSPIRATIONS TO INSPIRE: Cavemen who probably had "better" things to do like hunt, gather, and survive an ice age, but who still took time to revel in the natural forces of the sun, moon and stars. Part worship, part inquiry into the nature of the universe, these cosmic reckonings by early humans also resulted in cave-paintings... i.e. something was happening in this relationship and they wanted to communicate it.
THIS WEEK: Energy enters the heart from the left side. What do you need to trust that which you are not trusting? What little bits of self are you still taking for granted? What lovable aspects of your being have you cast aside in favor of applying more muscle and fire to your existence? Pick them back up as they are aspects which you could be madly in love with right now, which you may have even been appreciative of last week.
How to back off and let yourself take care of itself?
Be clear, ONE MORE TIME, about the purest intentions behind who you are, what you want, and why you want it. Let it be simple, easy, carefree and hopelessly sincere. “I just wanna love all the babies.” “I just want a family of my own.” “I just wanna enforce some social justice.” If it feels like an embarrassingly sincere admission of your most tender truths, that is where your power is. That is your hope, that is your guiding light. But as someone who can always get the job done if you push through, this path-of-least-resistance approach can be disorienting.
We just need you to be unapologetically YOU, even more YOU than you already are, without hurting anyone. A teacher once told us that the inner child is the most perfectly lovable, adorable, and precious part of you, which is beyond perfect, just as it is, in its simplest and sweetest, and most no-big-deal form. Try to be a little bit obsessed with this part of you and let it run the show.
FIRE READING - 8.8-8.15
AFFIRMATION: "I AM IN PROCESS AND PROCEED GENTLY WITH DETERMINATION."
COLORS TO POP: Warm, glowing colors - firefly green, sunset reds and orangesCRYSTALS TO VIBE: Fire opalOILS TO ANOINT: Jasmine, MyrrhSNACKS TO NOSH: Bland nourishing stuff like whole grain toast with nut butterINSPIRATIONS TO INSPIRE: Ellen Pompeo who has played Meredith Grey on Grey's Anatomy for 317 episodes, over 14 seasons of procedural television in 13 years.
THIS WEEK: Don't blow up or burn out. You gotta be kind to yourself and others if you really want your victory to be sweet. We're dealing with tummy vibes this week, which, in the EdibleSpirit lexicon, is associated with the digestive fire and how you are processing the energies moving through your existence. That fire burning within you wants to be handled with care and respect, and this week's affirmation reflects that. So don't stop moving forward, but handle yourself with care, as though you are in the middle of an important transformation, because you are. There's big relief coming when Mercury and Mars station direct, on the 19th and 26th, respectively. Until then, you run the risk of burning yourself or others, so go easy on yourself and everyone else if you can.
THIS WEEK: PLEASE LEAD THE WAY. We need your brave, brazen, buxom boldness. When we tune into fire this week we get a surge of energy in the throat. Don’t sit on your feelings. Get your shit out. Write, free hand, journal, channel. Express yourself powerfully. You can run the risk of burning too hot, like, all the time. but that’s the point. BURN IT OFF. CALL IT OUT. BULLSHIT IS BULLSHIT and you can’t lie. Don’t keep secrets cuz no one will keep them for you. Own your self and your power.
FIRE READING 7.18-7.25
AFFIRMATION: "WHAT CAN I PUT DOWN? I AM ALLOWED TO LET GO OF SOMETHING."
THIS WEEK: The energy seems to be concentrated around the head and shoulders. If you’re so tense you can’t look to the right or left, you are basically useless to us and the army of love. But don’t worry you’re still a warrior, you just have to unpack some unnecessary crap that you’ve taken on. It is not so brutal as the AIR readings this week. You don’t have to constantly strip stuff down and away. But if you are tense, or stressed, or spinning out of control, use the affirmation to remind you that you usually have to put down something that’s not important in order to pick up something that is. Give yourself the chance to let some responsibility go in the name of picking up something that actually matters to you. Then you can keep marching with a lighter load, remembering why you are marching, and easily establishing a sustainable rhythm that will carry you through until LEO LAND which opens its gates this weekend. You will be in your natural elemental territory then and it’s probably going to make you feel even more glorious than you usually do. So use this time in unfamiliar water to do some reshuffling of your priorities as best you can because whatever is vibing high in your heart come Leo Season is going to ROAR until it makes itself known to you and everyone around you.
COLORS TO POP: Dusty purples, muted greens, and navy bluesCRYSTALS TO VIBE: Smoky quartz, ocean jasper, obsidianOILS TO ANOINT: Blue tansy, lavenderSNACKS TO NOSH: High fiber foods, whole grains, dandelion greensINSPIRATIONS TO INSPIRE: Special-education teachers on the weekends - so used to dealing with lots of challenging energies coming into their own, realizing themselves. When you’re not on-duty you have to be able to put down what matters big-picture, so you can focus a little more on what matters to you here and now.
FIRE READING - 7.11-7.18
AFFIRMATION: "I AM FREE TO START OVER IN A WAY THAT PLEASES ME"
THIS WEEK: In general, fire burns forth and water flows back. Cancer season can make us all very introspective, nostalgic, or out-of-control-emo. WATER douses FIRE, lame. But the cool thing is, FIRE evaporates water. So for once, we are encouraging you to BURN BABY BURN. But it's more like a controlled burn of a field. The first thing that came through you was, "I smooth the edges by burning the field." This is a little extra, like trying to smooth your split ends by lighting them on fire, but HEY, you can be a little extra. Use your natural inclination to burn the house down to free yourself from the bondage of inertia, nostalgia, or regret. It's always a great time to start afresh, as the moment is literally always renewing itself. It's always another NOW. Oh! Now it's another NOW. So the affirmation is chill: I AM FREE TO START OVER IN A WAY THAT PLEASES ME. Clarify your field so the march forward while holding your heart aloft (see ETHER) is that much easier, with a cleared way. It's ok if you feel like you're going around and around. Just make sure you beat something back, trim it down, or burn it away every time you make another lap. You might realize that you've been getting your energy all along from what you truly care about, and maybe, just maybe you are already marching in perfect sync with your heartbeat... you just might not be able to hear the satisfying syncopation from 20,000 leagues under the Cancer sea.
Element(s) to Call In: FIRE, EARTHElement(s) to Release: WATERColors to POP: Blood Red, CrimsonCrystals to vibe with: Garnet, HematiteEssential Oils to anoint: Vetiver, Ylang YlangSnacks to nosh: nutrient rich filling stuff like whole grains and legumes. Also spicy curries, so maybe like make or order some delicious Indian.Inspirations: Park Rangers across America: keep making the rounds, tending to the lands that you steward. Do what needs to be done asap, knowing that your superiors don't necessarily care about you or support you. This is between you and the Earth, and it's about upholding your deepest values. |
Q:
How to make a skybox move with the player but not jump with them
I have a pretty nice skybox, but it doesn't seem realistic that the player can get right next to it, so I want it to move with the player, but not jump with the player or rotate with the player.
A:
I found out how to. I just added a Copy Location object constraint
|
Lindsay Hansen Park, Executive Director of the Sunstone Foundation sits down with Karin Peter to talk about her work in the Short Creek area working with the FLDS and exFLDS communities. Lindsay’s work with Mormon fundamentalists began as she podcasted her way through The Year of Polygamy. Listen as Lindsay shares about some of the lessons she has learned as well as lessons we can all learn about the power and danger of how stories are told.
Download Audio
Download Transcript |
It can seem, sometimes, like the federal government is weighing in on pain care without understanding what patients go through. Fortunately, a new task force charged with creating recommendations for pain management has worked hard to include the patient perspective.
This task force, called the Pain Management Best Practices Intra-Agency Task Force, recently released a much-anticipated draft report with recommendations for managing acute and chronic pain. After a 90-day public comment period ending April 1, the report will be finalized and submitted to Congress.
“We are pleased to see that the report emphasizes the importance of individualized, multi-modal, patient-centered care,” says Nicole Hemmenway, interim CEO of U.S. Pain Foundation. “In particular, the recommendations aim to put to rest issues and inconsistencies in policies at relevant federal agencies, including the Centers for Disease Control and Prevention and the Food and Drug Administration.”
It is incredibly important that people with pain share their feedback on the report. Does it go far enough in encouraging effective pain care? Does it not go far enough? Tell the task force what you think.
Make sure your voice is heard
Visit our online toolkit for more details about the report and how to comment. Watch a webinar with Cindy Steinberg, the only patient and patient advocacy representative on the task force, with her perspective on the report and tips for commenting. Watch and share this educational video! |
John McAfee: I've Escaped to Guatemala
John McAfee's bizarre run from authorities in Belize took another strange turn Tuesday with the millionaire anti-virus software company founder now claiming he has escaped the country and is in Guatemala.
McAfee, 67, who is wanted for questioning in Belize about the shooting death of his neighbor, is now in Guatemala and "will be meeting with Guatemalan officials this morning," according to a blog post written under his name. McAfee made the announcement after an iPhone photo of McAfee uploaded to the U.S. magazine Vice had accidentally revealed his exact location inside Guatemala.
"I apologize for all of the misdirections over the past few days," the post reads. "It was not easy to exit Belize and required many supporters in many countries."
The update is the latest in a puzzling series of posts on the blog, which over the weekend claimed that he had been detained on the Belizean/Mexico border.
That post claimed that McAfee had already escaped Belize and was on the run with his 20-year-old girlfriend Samantha and two reporters from Vice Magazine.
McAfee did not reveal his location in that post, and a spokesperson for Belize's National Security Ministry, Raphael Martinez, told ABC News on Monday that no one by McAfee's name was ever detained at the border and that Belizean security officials believed McAfee was still in their country.
The latest blog post on McAfee's site confirmed that the photo had mistakenly revealed his location, and said that Monday was "chaotic due to the accidental release of my exact co-ordinates by an unseasoned technician at Vice headquarters."
"We made it to safety in spite of this handicap," the post reads. "I had to cancel numerous interviews with the press yesterday because of this and I apologize to all of those affected." An official at the Guatemalan Embassy in Washington, D.C. could not immediately confirm whether McAfee was in the Central American country.
McAfee, who founded his namesake anti-virus company, has been wanted for questioning since November 11, when his neighbor, Greg Faull, was found shot in the head. McAfee has not been formally charged, but claims he's innocent and is on the run because he will be killed if he is taken into custody. McAfee has managed to stay in the public eye while a fugitive, giving his first broadcast interview to ABC News last month. He has also spoken to other major media outlets and has declared that he never planned to leave Belize.
In Monday's post, he wrote that he just wants to find a safe place for Samantha before he returns. "My fight is in Belize," he wrote, "and I can do little in exile." |
Less, a leaner CSS - cloudhead
http://lesscss.org
======
chriseppstein
This looks promising and seems to address a lot of the objections I hear to
compass and sass. I do really like the superset syntax approach where css is
legal syntax in a less file.
So I will be following along the development. There's still a lot of features
that would be required of less to support a framework like compass. There's
currently no arguments for mixins, no way to extend the language with
functions that call out to code, no macro syntax allowing branching/looping
and generation of selectors and properties. Such features aren't needed by
your average user writing their own content, but they are absolutely core to
building reusable design that can be configured and applied to your code using
a simple and intuitive interface.
Anyways, it's really great to see new ideas and innovation in the css compiler
space. We all win as these ideas mature and gain acceptance in the web
development community.
-chris eppstein (sass core team)
~~~
cloudhead
Great to have you on board! Compass was definitely one of the inspirations
behind Less. Unlike Compass, though, I'd like to keep it small, as it is and
as close to CSS as possible, so the more complex features of Compass probably
won't find their way in Less, unless they fit the ideal.
~~~
chriseppstein
I know the distinction between Sass and Compass is blurred for many folks,
much like ruby and rails.
Compass is libraries and tools to provide project management and community
features, sass is the syntax that makes compass possible. Compass could be
built on any css syntax with a comparable feature set to sass.
So my point was that until you provide those more heavyweight features in the
core language, you cannot have a framework like compass. Frameworks drive
adoption, so think about that decision carefully. Having powerful features
doesn't force them to be used, but not having them, creates limitations.
~~~
cloudhead
'Having more features doesn't force them to be used' — correct, but it changes
the perception people have of the tool, as well as what they start to expect
from it.
I personally favor smaller tools which do the least amount possible while
still fulfilling your needs. That's why, for example, I'm not a huge fan of
Rails, and would much rather use Sinatra when I can. I know I'm not the only
one.
It's this sort of overhead I'm trying to avoid. Less is very straightforward,
and I want to keep it that way—there's not much you need to learn to start
using it, and the code base is tiny. For most use cases I think the feature-
set will be more than enough, and if it's not, we have Compass.
~~~
9oliYQjP
I think you made the right call. CSS isn't complex enough to need a framework.
In a lot of cases, CSS frameworks abuse the primary motivating factor for
trying to separate style and content in the first place. If I have to use
particular HTML markup or class naming conventions, I may as well just forego
the separation of content and style altogether and use table layouts.
But less appears to make desperately needed additions that should ultimately
show up in CSS itself IMHO. Certainly when I was first picking up CSS -- given
my programming background -- I was reaching for the concept of variables and
in fact was surprised that they did not exist in CSS. For that reason, I'd
consider less to be more of a language extension than a framework.
~~~
chriseppstein
You don't know about compass then. Go watch the screencast.
CSS isn't complex, but building websites that work correctly in 8 web browsers
most certainly is. Compass frameworks give you re-use without semantic fail.
~~~
9oliYQjP
I do know about compass, but I have a feeling compass will be to less what
Prototype is to jQuery, at least for me. When I first learned Prototype I
thought it was awesome, but jQuery just ended up making a whole lot more sense
to me. Different strokes for different folks I suppose.
~~~
carbon8
What you are describing would be closer to Sass vs Less, not Compass vs Less.
Compass is a meta-framework built on Sass to make working with CSS frameworks
much simpler, easier, cleaner and more flexible.
In your case, you don't use CSS frameworks at all, but you just want a few
features that aren't in CSS, so Compass isn't what you'd be considering, Less
or Sass would be.
~~~
chriseppstein
At least someone gets it ;-)
~~~
9oliYQjP
If I don't want to use a framework like blueprint, and I actually prefer (in
this context) the CSS syntax (e.g., braces et al) as opposed to HAML, then is
compass still useful to me? That's what is (now) confusing to me given your
replies to my original comment. My original criticism isn't of compass. It's
just that if I don't like blueprint/YUI/960, then would it not be redundant to
use compass?
Hopefully you don't take this personally. If I ever find myself required to
use one of the above frameworks, they would probably be a lot more palatable
when used in conjunction with compass.
------
sketerpot
That web page has shiny-excellent design. It immediately tells you what Less
is, how to install and run it, and then launches into source code examples so
you can immediately learn how to use it. Very smooth!
(Someone needs to recognize these things and give praise to the people who so
richly deserve it.)
~~~
ggchappell
That's a very good point.
Also a somewhat embarrassing one. My standard practice is to go to Wikipedia
to find out what is going on, then back to the page to find out more. And yet,
when I came across a good, helpful page, where that was not necessary, I
didn't even notice.
I guess this is yet another example of good design being design you don't
notice. (Although, obviously, that "you" isn't referring to _you_.)
~~~
ralph
"good design being design one doesn't notice"?
~~~
ggchappell
Yeah, that works. Also "good design being design that isn't noticed".
------
KevinMS
After suffering through a project with complex css I felt a similar itch and
tried to scratch it by developing <http://moonfall.org/>
Its very similar to this, differences I see are:
It uses C/Lua, not ruby, so the cool kids probably wont use it.
Its compiled, so no interpreter needs to be installed.
Its very fast so it can be run as a cgi script, either for just development
(avoiding the compile annoyance), or live (as its site uses now), or run from
the command line to avoid the compile overhead in production.
You can add functions written in lua and compile them into the executable.
The variables are defined in a separate file, so your editor won't freak out
in css mode.
When I introduced it got on smashing magazines best of whatever,
[http://www.smashingmagazine.com/2007/08/14/best-of-
july-2007...](http://www.smashingmagazine.com/2007/08/14/best-of-july-2007/)
I had a lot of css hipsters hating on me... a lot. They despised it.
Their arguments were like "you don't need variables in css, you have to use
the cascade!"
Something like
.my_colored_div, .my_other_colored_div { background-color:red }
... then way further down...
.my_colored_div { width: 100px} .my_other_colored_div { width: 200px}
So instead of defining something once, (a variable), you should define
something (dom element) in multiple places.
I'm sure its obvious to you guys that defining something in multiple places
like that would end up a big mess. So it didn't bother me so much being
criticised by a group of developers who probably haven't done more complicated
coding than a few pages of php.
Anyway, I'm not promoting moonfall, I honestly don't know if anybody is even
using it, I never did, (although somebody ported it to a perl module), what I
want to say is ever since that project that motivated me to develop moonfall,
I haven't needed it, because the way I approach css has changed for the
better.
I have a few simple rules.
1\. Avoid using css, it relatively sucks. Try to let the html do what it
wants. The more css you have, the more you will be fighting the browsers.
2\. If you need variables in your css, you are probably making a big mess that
you will regret.
3\. If you have a web page that needs a lot of css, its too busy, or looks too
much like a desktop application.
4\. Only put global styles in the main css file.
4\. My most controversial rule, one that has helped me the most but will
probably bring on the hating... If a style only needs to be used in one place,
or you cannot come up with a good name for it, don't put it in the css file,
put it in the style tag attribute in the html style="blah:blahpx". Trust me,
try it.
~~~
henrrrik
Even very complex and messy CSS is easily handled using something like Firebug
for Firefox or the Web inspector in Safari.
I won't even comment on the inline styles recommendation.
------
ihumanable
Yes yes a million times yes. I've looked at Sass before but its HAML syntax
made it less than appealing. This is beautiful, its just a smarter CSS,
leveraging everything you already know about CSS but with the things you wish
CSS had.
~~~
jamesjyu
Totally agreed here. The reason I don't want to move to HAML and Sass is the
learning curve required of devs, especially those that aren't necessarily
familiar with scripting languages (like visual designers, etc). but do know
about HTML and CSS.
This is just a simple enough extension to CSS that is natural, but still
giving power to express styles much more concisely.
~~~
deepakjois
I think it is important to differentiate between HAML syntax and SASS. Even
though both are part of the same package, SASS syntax is actually quite
minimal and closely follows CSS syntax, without the extraneous syntactical
elements like curly braces etc.
Chris Eppstein, the inventor of SASS has stated elsewhere that one of his
primary goals is to make SASS friendly for designers to use, and he claims to
have sought feedback from designers as well. See comments here :
[http://jeffcroft.com/blog/2009/may/20/applying-oop-
concepts-...](http://jeffcroft.com/blog/2009/may/20/applying-oop-concepts-
css/#c150744)
~~~
chriseppstein
Hampton Catlin invented Sass. Nathan Weizenbaum is the primary maintainer now,
and I'm just a newbie, only around since Sass 2.0.
Everyone seems to give designers an insultingly small credit for their ability
to do development. But the concepts behind CSS and Sass are the hard parts
(flow, positioning, block, layout, etc), the syntax is easy in comparison.
Every designer that I've worked with who knew css took 1 hour to learn sass
and fell in love.
------
Pistos2
Nice looking project, but...
Am I the only one in the world that bemoans naming decisions like this? The
name is not just a dictionary word, and hard to get page rank with; it's even
the name of an already-existing popular geek word (namely, the UNIX pager).
Am I the only one that thinks that the best names for things are the ones that
have extremely few search engine hits before you choose them?
~~~
railsjedi
I like the name a lot, but I agree that its going to be difficult to google
search. Sucks, but doesn't that seem like a limitation of search engines?
~~~
diN0bot
search for "less css". hmmm. "less extend css" no problem.
i agree that some names are ridiculous for search engines; this one might be
ok. jury is still out.
~~~
Pistos2
Is that like how we "need" to search for: "flickr photo sharing", "wikipedia
encyclopedia", "facebook social networking", or "youtube video sharing"?
I think it's better to name your software or site (or company?) something that
can be searched for and found by the name alone.
~~~
george_morgan
This would be more of an issue if it was a consumer service/product. I'm going
to give web developers the benefit of the doubt and say they'll probably find
this if they're looking for it.
------
mrkurt
For once, I'd love to see one of these things built with a proper parser. The
regex madness has to stop!
~~~
gamache
Why? Sane regexes aren't all that inefficient, and here efficiency doesn't
matter much anyhow.
~~~
dasil003
It's not about efficiency, it's about robust parsing.
~~~
boucher
Actually, I think it's about ease of implementation.
~~~
stcredzero
Correctness > Ease of implementation
------
cloudhead
Also, check out the article @ usabilitypost.com for the full story:
[http://www.usabilitypost.com/2009/06/16/introducing-less-
a-b...](http://www.usabilitypost.com/2009/06/16/introducing-less-a-better-
css/)
------
russell
I like the look of Less. I've taken cursory looks at other CSS generation
tools have been less than enthralled by the ugly syntax and over-
complications. Less is lean and looks like something that might be a future
CSS extension. I'm definitely going to give it a try.
------
railsjedi
Sass definitely needs some competition. I love it, but there's some things it
could improve on.
Allowing the mixin of any class into any class is genius. A very standard
workflow when developing SASS stylesheets is extracting out a rule into a
mixin, and mixing them into multiple classes. However, eliminating this step
is huge.
I really like removing semicolons and braces, so SASS wins out huge in that
regard.
I also really like SASS's new syntax for interpolation (standard ruby #{}).
It's variable are lame though (use of the bang character for variables was a
mistake).
Anyways, good stuff. I'm glad LESS exists and allows people to work around
some of the missed opportunities of the CSS syntax.
~~~
chriseppstein
We deprecated some features in Sass 2.2 that will allow us to change the
variable syntax in 2.4. Legacy users are a bitch ;-)
The idea of allowing any top-level css class be used as a mixin is a really
interesting one that we could consider adding to sass. However, I would argue
that you still need an abstract class syntax like the current mixin,
especially where arguments are in use.
As a sass framework builder, I really like that I don't have to define a
presentational class name that would end up in your stylesheets just so that
you can mix them into your semantic selectors. It makes it much easier to keep
presentation out of markup.
------
cloudhead
Now if anyone feels like writing a tmbundle for Less, I'll be more than happy
to put it up on the site!
------
ssharp
This is outstanding. It's simple and logical. You don't need to learn any new
language. It doesn't "fix" CSS but it provides a lot of very useful features
to help clean it up. The nested rules and variables are really useful. The
mix-ins seem like they are already "sort of" available in CSS by just
assigning multiple classes to an element.
Any plans to port this to other languages?
------
dpnewman
This is a near perfect example of an incremental improvement. Kind of reads
one's mind about what would be ideal to add to css - and provides it in a
completely intuitive implementation. Bravo.
------
asifr
Mixins! Why has CSS not implemented these brilliant syntax rules? It's so
intuitive and fits in with any programmatic workflow.
~~~
sfphotoarts
Coming to CSS about 6 months ago I was just amazed that it doesn't have these
features already, like variables and mixins. Is there anything like this out
there already for PHP?
~~~
chriseppstein
What is it about php folks that think that everything has to be implemented in
php?
~~~
sfphotoarts
I'm not suggestion everything has to be implemented in php, however, I'd have
thought the answer was pretty obvious in this case. FAIL!
------
ori_b
It seems slightly odd to call it "leaner" when you're adding stuff on top of
CSS. The additions seem nice enough, but to me, "leaner" means that the number
of [mis]features is being reduced to make a smaller spec and implementation.
~~~
benhoyt
Yes. And to me it seemed odd that 3/4 of the examples of LESS actually require
MORE typing than the CSS. So perhaps not the best name, but looks like a nice
tool.
Or maybe LESS should be an acronym: Less Equals Simpler Styles :-)
------
timdorr
I find it interesting that these tools are targetted at developers when
designers could easily benefit from these even more. What would be interesting
is if someone could build this into a Javascript library that compiles and
converts the Less/sass/Compass code into CSS on the fly. If Cappuccino can do
it for executed code written in an entirely different language, I don't think
CSS would be that hard either. Of course, it's been a _long_ time since I
wrote a lexer/parser from scratch.
~~~
dasil003
I think the reason is because designers are not into complex toolchains. Just
the fact that you need to compile this CSS is a hurdle that makes this much
less usable in a designers world.
I've often bemoaned the lack of variables in CSS for things like colors,
especially because hex numbers are not very readable, but overall I'm not an
advocate of these kinds of CSS pre-processors. It's not that I don't see the
value, but I think they can easily become a crutch for developers who don't
want to learn how to write clean CSS and utilize the cascade or refactor their
HTML into a more sensible structure (hint: sometimes the most semantic class
name is actually a presentational one, rather than duplicating a bunch of CSS,
'mixins' just serving to mask the smell).
The other thing is that cutting designers out of your project just because
they can't or won't set up a Ruby environment is a pretty easy way to
eliminate a lot of the best designers.
------
heycarsten
I use Sass daily and I will continue to. I don't understand the hate for the
indentation sensitivity; no curly braces or semi-colons to deal with and
visible structure are huge wins as far as I'm concerned. I guess I'm just not
seeing the "obvious awesomeness" that makes this so much of an improvement
over Sass. I can see the appeal for the use case of existing CSS but I find
that rarely happens.
~~~
chriseppstein
<https://twitter.com/chriseppstein/status/2198875051>
------
trapper
Surely everyone has been using a homegrown version of this since they started
with css? We use a build script to generate our css files with things such as:
.header { background: @BACKGROUND } .maintable { margin-left:
5+@DEFAULT_MARGIN }
I mean, without it you are left writing it all manually! Good to see something
open source though, and I love the hierarchy.
------
jonursenbach
This is ridiculous. The first two examples they give you, you are actually
producing more code than if you had done it properly to begin with.
#header, #footer {
/* styling here */
}
Less, in their case, is actually more.
~~~
pkulak
That's because they are trying to make simple examples. I've wanted this
functionality in CSS many times, and in my real-world CSS, it would have made
it a _lot_ easier and shorter.
------
RossDM
How come no one is making these things for Java? Do people just use Ant to do
the same thing?
~~~
mosburger
No one makes any stuff like this for Java. Java has lost the wind from its
sails. Java has been relegated to beige cubicles and enterprise solutions.
I say this as a disheartened Java programmer. I've recently been involved in a
Rails project and a couple of Django projects, and then jumped back into Java.
The difference in energy is amazing. Who would make something like this for
Java? What would its success path be? Acceptance into an Apache incubator and
then into "Commons?" Spec JSR-123987 finally being accepted by Sun/Oracle five
years after its written?
I know this isn't a new revelation and I'm far from the first person to bemoan
the stale, slow death of Java - but I'm sitting at an airport terminal with
nothing better to do, and it's raining out, I'm depressed, and probably
shouldn't be posting to HN. :)
~~~
revetkn
Check out GWT's CssResource support, which is a much more powerful version of
Less backed by a real compiler instead of a collection of regexes:
<http://code.google.com/p/google-web-toolkit/wiki/CssResource>
I agree that most of the Java web bits (including pretty much all the popular
web frameworks) are, for lack of a better term, enterprisey crap. It saddens
me a bit that GWT isn't more popular - there's a lot of innovation and power
there that gets ignored simply because the framework's written in Java. IMHO,
Rails and Django et al are just kind of standard web MVC frameworks that
happen to be implemented on fun-to-write languages: the only thing out there
that has the real "right" approach to web _application_ dev is GWT, which is
fundamentally difference from all the rest (per the Google Maps/Wave team,
Wave would not have been possible without GWT).
~~~
mosburger
I've never tried GWT. I'll be sure to check it out, thanks for the
recommendation.
The most "fun" Java web development framework, IMHO, is Stripes. I think what
sets it apart is the lack of enterprisey crap - it's simplicity is refreshing,
but it's still powerful enough to be useful.
------
wfarr
It's interesting, for sure, but I like haml/sass and that style much more.
Not to mention, having arguments for mixins is really, really nice. And
compass is solid too.
------
nex3
A follow-up: <http://news.ycombinator.com/item?id=662669>
------
ngrandy
for people who want to try out or develop with less without installing the
ruby gem, you can compile documents via http here:
<http://www.tripeedo.com/less>
------
PStamatiou
just as i switched to Compass/Sass...
~~~
chriseppstein
Well lessc is just a replacement for the sass compiler so far. It lacks the
project management and ruby framework integration features that you get with
compass and sass.
~~~
jmtulloss
For those of us not using Ruby frameworks, that's a definite plus. It's nice
to have a simple standalone tool that does this.
~~~
jeroen
Except that I doubt that anyone not using Ruby is going to install Ruby just
to run this. It looks very promising, but without a standalone compiler it is
useless to me.
~~~
carbon8
_"Except that I doubt that anyone not using Ruby is going to install Ruby just
to run this"_
I don't see why not. Most developers depend on tools written in a variety of
languages.
~~~
jmtulloss
Agreed. I barely know Ruby, but I have Ruby installed cause so many quality
tools are written in it.
------
nopassrecover
Perfect
|
Over lunch (which was fucking delicious, by the way) we were put into new groups, which was totally fine with me. Although I enjoyed surfing with my company-mates in the first session, they were also some of the best surfers at the pool, which meant they were less likely to fall, which meant I was less likely to catch any scraps. In the wave pool, you want to be paired with the worst surfers possible as to bolster your wave count. This is not so unlike ocean surfing, when you really think about it.
Plus it was nice to get away from Ashton. That bastard.
By sheer force of will I was able to convince my group that I should get the first wave of the session, despite being the youngest and least accomplished media member of the bunch. On top of getting that first-wave cleanness, the wavepool operator bumped the settings up from CT-2 to CT-1, which essentially made the wave steeper and faster than in our first session, all of which led to the longest, roundest tube I would get all day and then another great left on the way back. With those rides under my belt, I was able to surf the remainder of the session with a lightness of mind, body, and spirit. This may or may not have had something to do with the six total waves I caught.
That’s right folks, I was the new Ashton. And damn did it feel good!
I spent the day’s final session, which featured Morgan, Shinya, Warshaw and a few others, on the back of the jetski. This is a heavy call, but I might have had just as much fun riding shotgun and filming my pals as I did surfing the waves myself. There’s something truly exciting about calling out sections and seeing others' stoked expressions after a good ride. Though he wasn’t there at the time, I could feel Raimana’s presence riding along with me.
If I had to pick a highlight, it was probably watching Matt Warshaw get what he referred to as his “first barrel in seven years”. Not his best barrel; his first barrel in seven years. And considering how he rode the thing, with his clean shimmy-step and knock-kneed stance, you’d think the old man had just hopped off a plane from Salina Cruz. |
Forums
these are the divisions for season 2. If I forgot or misplaced someone please tell me immediately. Divisions have been pretty hard to form, so there can be mistakes!
To keep the equilibrium in divisions: number of players relegations will be 2 for divisions of 8 or less players, 3 if the players are 9 or more. In this season there are no divisions with more than 8 players.
Divisions with 6 players will have only 1 relegation.
Promotions and relegations will be only of 1 division. No 2 divisions jumps.
To contact the players: please pay attention to the names of the players!!! They can have differences due to Champions League or Nation Cup. |
UPDATE III: The Senate rejected the Udall amendment 38-60.
While nearly all Americans head to family and friends to celebrate Thanksgiving, the Senate is gearing up for a vote on Monday or Tuesday that goes to the very heart of who we are as Americans. The Senate will be voting on a bill that will direct American military resources not at an enemy shooting at our military in a war zone, but at American citizens and other civilians far from any battlefield — even people in the United States itself.
Senators need to hear from you, on whether you think your front yard is part of a “battlefield” and if any president can send the military anywhere in the world to imprison civilians without charge or trial.
The Senate is going to vote on whether Congress will give this president—and every future president — the power to order the military to pick up and imprison without charge or trial civilians anywhere in the world. Even Rep. Ron Paul (R-Texas) raised his concerns about the NDAA detention provisions during last night’s Republican debate. The power is so broad that even U.S. citizens could be swept up by the military and the military could be used far from any battlefield, even within the United States itself.
The worldwide indefinite detention without charge or trial provision is in S. 1867, the National Defense Authorization Act bill, which will be on the Senate floor on Monday. The bill was drafted in secret by Sens. Carl Levin (D-Mich.) and John McCain (R-Ariz.) and passed in a closed-door committee meeting, without even a single hearing.
I know it sounds incredible. New powers to use the military worldwide, even within the United States? Hasn’t anyone told the Senate that Osama bin Laden is dead, that the president is pulling all of the combat troops out of Iraq and trying to figure out how to get combat troops out of Afghanistan too? And American citizens and people picked up on American or Canadian or British streets being sent to military prisons indefinitely without even being charged with a crime. Really? Does anyone think this is a good idea? And why now?
The answer on why now is nothing more than election season politics. The White House, the Secretary of Defense, and the Attorney General have all said that the indefinite detention provisions in the National Defense Authorization Act are harmful and counterproductive. The White House has even threatened a veto. But Senate politics has propelled this bad legislation to the Senate floor.
But there is a way to stop this dangerous legislation. Sen. Mark Udall (D-Colo.) is offering the Udall Amendment that will delete the harmful provisions and replace them with a requirement for an orderly Congressional review of detention power. The Udall Amendment will make sure that the bill matches up with American values.
In support of this harmful bill, Sen. Lindsey Graham (R-S.C.) explained that the bill will “basically say in law for the first time that the homeland is part of the battlefield” and people can be imprisoned without charge or trial “American citizen or not.” Another supporter, Sen. Kelly Ayotte (R-N.H.) also declared that the bill is needed because “America is part of the battlefield.”
The solution is the Udall Amendment; a way for the Senate to say no to indefinite detention without charge or trial anywhere in the world where any president decides to use the military. Instead of simply going along with a bill that was drafted in secret and is being jammed through the Senate, the Udall Amendment deletes the provisions and sets up an orderly review of detention power. It tries to take the politics out and put American values back in.
In response to proponents of the indefinite detention legislation who contend that the bill “applies to American citizens and designates the world as the battlefield,” and that the “heart of the issue is whether or not the United States is part of the battlefield,” Sen. Udall disagrees, and says that we can win this fight without worldwide war and worldwide indefinite detention.
The senators pushing the indefinite detention proposal have made their goals very clear that they want an okay for a worldwide military battlefield, that even extends to your hometown. That is an extreme position that will forever change our country.
Now is the time to stop this bad idea. Please urge your senators to vote YES on the Udall Amendment to the National Defense Authorization Act.
UPDATE I: Don’t be confused by anyone claiming that the indefinite detention legislation does not apply to American citizens. It does. There is an exemption for American citizens from the mandatory detention requirement (section 1032 of the bill), but no exemption for American citizens from the authorization to use the military to indefinitely detain people without charge or trial (section 1031 of the bill). So, the result is that, under the bill, the military has the power to indefinitely imprison American citizens, but it does not have to use its power unless ordered to do so.
But you don’t have to believe us. Instead, read what one of the bill’s sponsors, Sen. Lindsey Graham said about it on the Senate floor: “1031, the statement of authority to detain, does apply to American citizens and it designates the world as the battlefield, including the homeland.”
There you have it — indefinite military detention of American citizens without charge or trial. And the Senate is likely to vote on it Monday or Tuesday.
UPDATE II: The debate on NDAA has begun. Your Senator needs to hear from you RIGHT NOW! >>
Learn more about detention: Sign up for breaking news alerts, follow us on Twitter, and like us on Facebook. |
Surprise! Another day, another new movie trailer from Netflix. The project in question this time is Sand Castle, a war drama from director Fernando Coimbra (A Wolf at the Door) written by Chris Roessner and starring Henry Cavill and Nicholas Hoult. As glimpsed in this first trailer, Hoult plays a reluctant soldier, Private Matt Ocre, who attempts to injure himself to get out of combat duty despite the place of honor such a position holds in the eyes of his elders. Spoiler alert: It doesn’t work.
The trailer, at least, teases what looks to be an honest portrayal of both the soldiers embroiled in the 2003 conflict in Iraq and the Iraqi citizens who are none too pleased with the American occupation. It’s a tense first look that promises to explore the more taboo aspects of the fog of war.
Set in Iraq in 2003, Sand Castle follows a group of American soldiers in the early days of the second Gulf War. Bearing witness to the heat and the horror is the inexperienced Private Matt Ocre (Nicholas Hoult), who, together with several fellow soldiers, is ordered to the outskirts of Baqubah to repair a water pumping station damaged by U.S. bombs. But, as Ocre discovers, in an atmosphere where resentment and anger fester, trying to win the hearts and minds of the locals is a task fraught with danger. It’s here, in the streets, squares and schools that he discovers the true cost of war. The film stars Nicholas Hoult, Henry Cavill, Glen Powell, Logan Marshall-Green, Beau Knapp, Neil Brown Jr., Parker Sawyers, Sam Spruell, Sammy Sheik, Tommy Flanagan and is available only on Netflix April 21. |
Column: How sports can help us heal
New York Jets head coach Rex Ryan took some heat last week for saying he so badly wanted to win Sunday night’s game against the Cowboys because of the 10th anniversary of the Sept. 11 attacks. “I feel more pressure on this game for whatever reason than any game I’ve ever coached, seems like,” he had told members of the New York media.
TV and radio pundits responded by saying a football game and the senseless deaths of so many innocent people shouldn’t be mentioned — even thought about — together in the same sentence. After all, this was just a regular-season game, and Sept. 11 happened 10 years ago.
But I’ll say this: The Jets’ Sunday night come-from-behind victory really gave me and countless other Jets fans — I’m sure even some of those who lost loved ones in 9/11 – something to smile about on a day filled with sadness.
I spent the Sept. 11 anniversary at home, editing stories and photos on memorial events from across our coverage area. During a four- or five-hour chunk of that time, I watched CBS coverage of the heart-wrenching remembrances of those killed in the terror attacks as all the 9/11 victims’ names were read from two podiums at ground zero.
There were victims’ brothers and sisters, saying how backyard barbecues have never been the same in 10 years. There were the surviving mothers, vowing to join their sons or daughters one day in heaven. There were the wives, giving their lost husbands updates on their children’s lives, and trying their hardest to be strong. And then there were the kids, including teenagers and 20-somethings, most of whom struggled through tears as they spoke, while still calling their lost parent Mommy or Daddy; these are relationships frozen in time. Some of the children who spoke never even met their fathers.
But later, there was sport, that great diversion.
The Jets victory Sunday night reminded a lot of us of retired Mets catcher Mike Piazza’s Sept. 21, 2001, go-ahead home run against the Atlanta Braves. That was the first professional sports game played in New York after the terror attacks. Up until that moment, many didn’t even know if attending a game was even the right thing to do. But when Piazza hit that huge homer to left-center field, we cheered, surprising even ourselves. And it was a frenzied, cathartic cheer, both at Shea Stadium and in homes across the region.
It was prolonged, because we wanted to hold onto that unfamiliar feeling of feeling good.
In the days that followed, we were slowly able to laugh again. You want to communicate to your children the shock, anger, fear and anguish adults felt after Sept. 11? Tell them to imagine almost two weeks devoid of humor — pretty much like all of this past Sunday. That was, of course, until a combination of a goal line fumble, a blocked punt, an interception and a long field goal led to one of the most memorable come-from-behind Jets victories anyone could ever remember.
On the day spent mostly with a lump in my throat, I now grabbed a plush football and did my best John Elway impression in the living room. I dropped back and pump-faked a few times before letting the ball fly and sending my 5-month-old puppy slipping and sliding down the hardwood hallway after it.
I had lost myself.
And isn’t that what sports is all about, for the fans and athletes?
So thank you, Rex and the Jets, for taking Sunday night’s game so darn seriously. And for helping us, well, forget — if only for a moment.
Michael White is the editor of the Riverhead News-Review. He can be reached at [email protected] or 631-298-3200, ext. 152. |
Categoría de la entrada:
Autor de la entrada:
El E3, un evento internacional dedicado a los videojuegos está trayendo jugosas novedades. Microsoft ha soltado la bomba, quiere unificar las versiones de Minecraft para distintas plataformas para que puedan jugar entre ellos usuarios de PC (windows10), Xbox, Nintendo Switch, Pocket edition (móviles) e incluso la versión dedicada a la Realidad Virtual.
De esta unificación se ha quedado fuera Sony y sus Play Station. Se comenta que posiblemente no hayan llegado a un acuerdo con Microsoft.
Coming Soon ¿En qué plataforma juegas a Minecraft? PC Xbox Móvil Nintendo Switch Play Station Results Vote ¿En qué plataforma juegas a Minecraft? PC 89 ( 57.79 % ) Xbox 7 ( 4.55 % ) Móvil 11 ( 7.14 % ) Nintendo Switch 5 ( 3.25 % ) Play Station 42 ( 27.27 % ) Back
¿En qué plataforma juegas a Minecraft? PC 89 ( 57.79 % ) Xbox 7 ( 4.55 % ) Móvil 11 ( 7.14 % ) Nintendo Switch 5 ( 3.25 % ) Play Station 42 ( 27.27 % ) Back
Novedades
La compatiblidad entre plataformas no es la única novedad. Dicha versión que reúne casi todas las plataformas vendrá con otras mejoras importantes:
Aumento de resolución a 4K UHD
Mejoras de calidad en texturas
Mejor sistema de iluminación
Servidores masivos. En consolas no había servidores públicos hasta ahora.
Os dejamos el vídeo promocional que nos hace la boca agua. Al parecer admitirán Shaders oficialmente y texturas de mayor resolución sin necesidad de modificaciones de terceros en Minecraft.
Opinión
Personalmente me parece una idea inteligente por parte de Microsoft ya que si baja el número de jugadores de Minecraft la mejor opción es reunirlos a todos para que puedan jugar juntos. También es cierto que esto podría haber llegado mucho antes y no fragmentar el juego haciendo diferentes versiones por dispositivo. Veremos como solucionan la diferente experiencia de juego desde cada plataforma ya que los controles son totalmente diferentes en PC, consola o móvil.
Actualización
Parece ser que la compatiblidad del juego en PC se limita a la versión nativa de Windows 10 y no a la versión original en Java.
Mojang y Microsoft nos han dejado un adelanto del nuevo sistema gráfico que se llamará Super Duper Graphics Pack.
¿Qué te parece la noticia? Cuéntanos en comentarios. |
First-line hysterectomy for women with low-risk non-metastatic gestational trophoblastic neoplasia no longer wishing to conceive.
Low-risk gestational trophoblastic neoplasia (GTN) patients (FIGO score ≤6) are generally treated with single agent chemotherapy (methotrexate or dactinomycin) resulting in a 5-year mortality rate of 0.3%. However, despite these encouraging survival rates, chemotherapy is associated with significant adverse events in most patients. Although it is generally accepted that patients who no longer wish to conceive may be treated by hysterectomy for a hydatidiform mole, the evidence to support this strategy in low-risk GTN patients is lacking. To describe the survival, efficacy, and tolerance associated with first-line hysterectomy in low-risk non-metastatic GTN patients. Seventy-four of 1072 low-risk GTN patients treated in the French Center underwent first-line hysterectomy. Patients data with successful first-line hysterectomy were retrospectively compared to those requiring further salvage chemotherapy. First-line hysterectomy was followed by hCG normalization in 61 patients (82.4%, 95% confidence interval [CI] 71.8-90.3) without any further salvage chemotherapy, whereas 13 patients required salvage chemotherapy. After multivariate analysis, a FIGO score of 5-6 (exact OR 8.961, 95%CI 1.60-64.96), and the presence of choriocarcinoma (exact OR 14.295, 95%CI 1.78-138.13) were associated with the risk of requiring salvage chemotherapy. Hysterectomy as a first-line treatment is effective without salvage chemotherapy in 82.4% of women with low-risk non-metastatic GTN and can be presented as an alternative to single-agent chemotherapy when childbearing considerations have been fulfilled. In young patients, this therapeutic option should not be considered because single-agent chemotherapies are curative in nearly 100% of patients while maintaining fertility. |
Image copyright BBC NI press office/William Cherry Image caption The panellists, from left, were Mike Nesbitt (UUP); Naomi Long (Alliance); Mark Durkan (SDLP); Martin McGuinness (Sinn Féin) and Nigel Dodds (DUP)
Northern Ireland's five biggest parties have clashed over welfare reform and gay marriage in the final TV election debate before voters go to the polls.
The NI leaders' debate took place at the BBC but only one of the parties was represented by its leader.
UUP leader Mike Nesbitt accused Sinn Féin of costing Northern Ireland "£2m a week by reneging on your commitments" in the recent Stormont House Agreement.
Sinn Féin's Martin McGuinness said the UUP had "signed up" for welfare cuts.
"You were a member of a party that signed up, through UCUNF [Ulster Conservatives and Unionists, New Force]... which resulted in the withdrawal of £1.5bn from our budget," Mr McGuinness said.
'Regret'
Sinn Féin withdrew its support for the Stormont House Agreement in March, three months after the five-party deal had been struck on a wide range of issues, including welfare reform.
On the issue of same-sex marriage, the UUP leader and the DUP's Nigel Dodds said they believed marriage should be between a man and woman.
Mr McGuiness, the SDLP's Mark Durkan, and Naomi Long from Alliance supported equal marriage rights.
Image caption The parties clashed on the issues of welfare reform and same-sex marriage
Both Mr Durkan and Mrs Long expressed regret that several MLAs from their parties were either absent or had abstained from a recent Northern Ireland Assembly vote on sex-same marriage.
Mr Durkan said the SDLP was the first party to propose the decriminalisation of homosexuality, the equalisation of the age of consent and civil partnerships.
He said the SDLP's "party policy is clear" on the issue of same-sex marriage and called for legislation to be passed.
'Hypocrite'
Mrs Long said: "I share the disappointment that not all of my colleagues have voted in favour of this legislation."
She said that her party was "working our colleagues to address their concerns around the issue" and added that "no-one has equality when it is denied to anyone".
Image copyright BBC NI Press Office Image caption The debate was chaired by BBC presenter Noel Thompson
The recent controversy involving Health Minister Jim Wells, who resigned after linking same-sex parents to child abuse, was raised in the debate.
Mr Dodds said Mr McGuinness was a "hypocrite" for demanding an apology from Mr Wells but not offering an apology for IRA murders during the Troubles.
The DUP deputy leader said: "The fact is that we do not believe in the redefinition of marriage, but that does not make you anti-gay."
'Pulled out'
Mr Nesbitt said he had a "zero tolerance for homophobia" but had voted against same-sex marriage because he "was brought up in a church that believes that marriage is between a man and a woman".
Mr McGuinness repeated his party's call for a referendum on same-sex marriage, to allow the people of Northern Ireland to decide.
The parties also clashed over how to deal with the legacy of the Troubles and Sinn Féin's policy of refusing to take their seats at Westminster.
All five party leaders were invited to the debate but only the UUP leader accepted, with the other four sending senior party members.
BBC presenter Noel Thompson said: "Until this morning, we had been expecting the SDLP leader but Alasdair McDonnell pulled out, with the party saying that was 'in line with the DUP and Alliance'."
The debate was broadcast on BBC One Northern Ireland but you can watch it again here and you can watch the NI Leaders' Debate: Reaction here. |
Q:
How to deploy Angular.js to Elastic Beanstalk
What is the simple way to deploy an AngularJS app into Amazon Elastic Beanstalk.? Should We use a Docker container ? or a simple node.js app will do the trick ?
Thank you in advance
Eduardo.
A:
To answer my own question. I figured out that deploying Angular.JS app to Elastic Beanstalk is not a good choice.
I created an S3 bucket and set it for static website hosting, easier and more elegant solution
|
[1 of 62] (Marcus Ball (6), Cleyon Laing (90), Shawn Lemon (40), Brian Tyms (18), James Wilder Jr. (32), Terrance Plummer (47), Khalil Bass (44), Martese Jackson (30) of the Toronto Argonauts at the Nathan Phillip Square in Toronto celebrating with the fans of Toronto their win of the 105th Grey Cup. Tuesday, November 28, 2017. (Photo: Johany Jutras)) |
Lobster tails are on sale for Valentine's Day. Great! But how do I cook them?
Addie Broyles, Austin American-Statesman
Wednesday
Feb 13, 2019 at 1:14 PM
Nothing says love like lobster.
We all know the story of how the crawfish of the sea went from prison food to one of the foods most closely identified with luxury. The only thing fancier than steak and lobster is caviar and you can’t exactly eat an entire serving of caviar for dinner. (Or maybe you can and would also like to pay for my kids’ college education.)
These are the most romantic restaurants in the country
If you are planning on cooking at home for Valentine’s Day tomorrow night (or Galentine’s Day tonight), you still have time to stop by the grocery store and buy a lobster tail (and/or a steak) to grill for yourself or someone you love. Cast iron-seared steaks (or steak tips) are one of my favorite treats, no matter if it’s a holiday, but I’m not as well versed at cooking lobster. (The only thing you need to know about cooking steak is to pull the meat out of the fridge about 30 minutes to an hour before you plan to cook it and salt and pepper generously. Cook over a super high heat on both sides for slightly less time than you think. The meat will continue to cook, but let it sit on a cutting board for about 5 to 10 minutes before serving. You can tent it with aluminum foil to keep the heat.)
I don’t love lobster enough to try cooking the whole thing -- and many retailers, including Whole Foods, have stopped carrying live, whole lobsters -- but cooking a lobster tail is more more reasonable in terms of effort and price anyway. Many grocers have lobster tails on sale this week, and I picked up two small tails for $5 each at H-E-B today.
The technique is simple: Cut open the tail with kitchen shears, release the meat from the bottom of the shell, place a slice of lemon underneath it and a pat of butter on top and broil for 10 minutes. I’ve seen some cooks sprinkle paprika on top, which adds both flavor and color, but I think I’ll stick with salt.
Never miss a story
Choose the plan that's right for you.
Digital access or digital and print delivery. |
Q:
jQuery .parents([selector]) doesn't work with IE9 and Firefox
<html>
<body>
<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js"></script>
<script type="application/javascript">
$(document).ready(function() {
$("#evaluation_complete").parents("table")[0].remove(); //doesn't work
//this works
//var EvalComplete = document.getElementById("evaluation_complete");
//EvalComplete.parentNode.parentNode.parentNode.parentNode.parentNode.removeChild(
//EvalComplete.parentNode.parentNode.parentNode.parentNode);
});
</script>
<p>Testing little code</p>
<table>
<tbody>
<tr>
<td class="button-left"> </td>
<td class="button-middle" nowrap="true"><div
style="margin: 0px 0px 1px;">
<a class="button-text" name="evaluation_complete"
id="evaluation_complete" href="#">Evaluation Complete</a>
</div></td>
<td class="button-right"> </td>
</tr>
</tbody>
</table>
</body>
</html>
I have no control of how the table is set up. However all I know is the id of the link. My goal is to traverse to the <table> element and remove it from DOM. I've also tried it with closest. The error I get in Firefox and IE9 is that remove is not a function. The commented out block works but is not very dynamic. However, in Chrome, it works flawlessly. Thank you for any help.
A:
It does'nt work as you are trying to use .remove() on a native JS element, not a jQuery element:
It's not :
$("#evaluation_complete").parents("table")[0].remove();
but
$("#evaluation_complete").parents("table").eq(0).remove();
or
$("#evaluation_complete").parents("table").first().remove();
etc.
using [0] or get(0) gets the native JS element from the array-like jQuery object, which does'nt have a .remove() method.
As a sidenote, using closest() would be more efficient, and will work with the above examples.
|
Persistent Opioid Use After Hysterectomy in the United States, 2005-2015.
To assess variables associated with opioid prescriptions filled perioperatively after hysterectomy and the risk of prolonged opioid use through 1 year after hysterectomy. In this retrospective cohort study, we used the 2005-2015 IBM MarketScan databases to identify women aged at least 18 years who underwent hysterectomy. For opioid use, we identified filled prescriptions for opioid medications. We excluded women with prevalent opioid use, defined as an opioid prescription filled 180 to 30 days preoperatively or at least two prescriptions filled in the 30 days before surgery. We defined perioperative opioid use as any opioid prescription filled within 30 days before or 7 days after surgery. We used log-binomial regression to identify independent predictors of perioperative opioid prescription fill. To assess the risk of long-term opioid use, we estimated the proportion of women with ongoing monthly opioid prescriptions through 12 months after surgery and the proportion of women with any opioid prescription 3-6 months after surgery, mimicking published estimates. Among 569,634 women who underwent hysterectomy during the study period, 176,537 (30.9%) were excluded owing to prevalent opioid use. We found that 331,322 (84.3%) women filled a perioperative opioid prescription, with median quantity of 30 pills (interquartile range 25-40), and that younger (adjusted risk ratio [adjRR]18-24 0.91) and older (adjRR65-74 0.84; adjRR75+ 0.70) patients were less likely to receive a perioperative prescription compared with women aged 45-54. The proportion of women with continuous monthly fills of opioids through 2, 3, 6, and 12 months after surgery was 1.40%, 0.34%, 0.06%, and 0.02%, respectively. Most women who underwent hysterectomy in the United States from 2005 to 2015 filled a perioperative opioid prescription with a median quantity of 30 pills. The risk of prolonged opioid use through 6 months is quite low, at 0.06% or 1 in 1,547. |
<resources>
<string name="app_name">CalendarView</string>
</resources>
|
"He's had a second spell at the club that was very successful, but you have to be cautious about having one return too many. |
Spatially separated heterodyne grating interferometer for eliminating periodic nonlinear errors.
Periodic nonlinear errors caused by frequency mixing are serious obstacles for increasing the resolution of heterodyne grating interferometers. To eliminate the periodic nonlinear errors, a spatially separated heterodyne grating interferometer is proposed in this study. Two modulated beams with different frequencies are transferred respectively by two fibers, which form a spatially separated construction. A couple of comparison experiments in both time domain and frequency domain are designed and conducted. The results of the frequency-spectrum analysis experiment showed that the periodic nonlinear errors were no larger than 0.086 nm, which proved that the proposed system was effectual in eliminating periodic nonlinear errors. |
We are joined by Humayun Sheikh and Toby Simpson, founders of the Fetch.ai project. Humayun Sheikh is well known as the first investor in DeepMind, one of the leading AI companies in the world. This ambitious project seeks to create a self-learning blockchain network that fosters economic activity/combinations between off-chain AI agents. The fetch blockchain network will allow an AI agent, such as a delivery robot, to autonomously discover economic partners that would find its services and data valuable. Towards this goal, Fetch.ai claims to have found solutions to designing a useful proof of work system and building a scalable block chain.
Topics discussed in this episode:
Humayun and Toby’s background at Deep Mind
Toby’s background in the videogames industry building virtual worlds
The vision behind the Fetch.ai project
On solutions to useful PoW, salability and the complexity of the project
Timelines and what to expect from Fetch
Links mentioned in this episode:
Sponsors:
Shapeshift: Buy and sell alt coins instantly and securely without a centralized exchange
Support the show, consider donating:
This episode is also available on :
Watch or listen, Epicenter is available wherever you get your podcasts. |
#include <bits/stdc++.h>
using namespace std;
typedef long long ll;
typedef long double ld;
typedef double db;
typedef string str;
typedef pair<int,int> pi;
typedef pair<ll,ll> pl;
typedef pair<ld,ld> pd;
typedef vector<int> vi;
typedef vector<ll> vl;
typedef vector<ld> vd;
typedef vector<str> vs;
typedef vector<pi> vpi;
typedef vector<pl> vpl;
typedef vector<pd> vpd;
#define mp make_pair
#define f first
#define s second
#define sz(x) (int)x.size()
#define all(x) begin(x), end(x)
#define rall(x) (x).rbegin(), (x).rend()
#define rsz resize
#define ins insert
#define ft front()
#define bk back()
#define pf push_front
#define pb push_back
#define eb emplace_back
#define lb lower_bound
#define ub upper_bound
#define FOR(i,a,b) for (int i = (a); i < (b); ++i)
#define F0R(i,a) FOR(i,0,a)
#define ROF(i,a,b) for (int i = (b)-1; i >= (a); --i)
#define R0F(i,a) ROF(i,0,a)
#define trav(a,x) for (auto& a: x)
const int MOD = 1e9+7; // 998244353;
const int MX = 2e5+5;
const ll INF = 1e18;
const ld PI = acos((ld)-1);
const int xd[4] = {1,0,-1,0}, yd[4] = {0,1,0,-1};
template<class T> bool ckmin(T& a, const T& b) {
return b < a ? a = b, 1 : 0; }
template<class T> bool ckmax(T& a, const T& b) {
return a < b ? a = b, 1 : 0; }
int pct(int x) { return __builtin_popcount(x); }
namespace input {
template<class T> void re(complex<T>& x);
template<class T1, class T2> void re(pair<T1,T2>& p);
template<class T> void re(vector<T>& a);
template<class T, size_t SZ> void re(array<T,SZ>& a);
template<class T> void re(T& x) { cin >> x; }
void re(double& x) { string t; re(t); x = stod(t); }
void re(ld& x) { string t; re(t); x = stold(t); }
template<class T, class... Ts> void re(T& t, Ts&... ts) {
re(t); re(ts...);
}
template<class T> void re(complex<T>& x) { T a,b; re(a,b); x = {a,b}; }
template<class T1, class T2> void re(pair<T1,T2>& p) { re(p.f,p.s); }
template<class T> void re(vector<T>& a) { F0R(i,sz(a)) re(a[i]); }
template<class T, size_t SZ> void re(array<T,SZ>& a) { F0R(i,SZ) re(a[i]); }
}
using namespace input;
namespace output {
void pr(int x) { cout << x; }
void pr(long x) { cout << x; }
void pr(ll x) { cout << x; }
void pr(unsigned x) { cout << x; }
void pr(unsigned long x) { cout << x; }
void pr(unsigned long long x) { cout << x; }
void pr(float x) { cout << x; }
void pr(double x) { cout << x; }
void pr(ld x) { cout << x; }
void pr(char x) { cout << x; }
void pr(const char* x) { cout << x; }
void pr(const string& x) { cout << x; }
void pr(bool x) { pr(x ? "true" : "false"); }
template<class T> void pr(const complex<T>& x) { cout << x; }
template<class T1, class T2> void pr(const pair<T1,T2>& x);
template<class T> void pr(const T& x);
template<class T, class... Ts> void pr(const T& t, const Ts&... ts) {
pr(t); pr(ts...);
}
template<class T1, class T2> void pr(const pair<T1,T2>& x) {
pr("{",x.f,", ",x.s,"}");
}
template<class T> void pr(const T& x) {
pr("{"); // const iterator needed for vector<bool>
bool fst = 1; for (const auto& a: x) pr(!fst?", ":"",a), fst = 0;
pr("}");
}
void ps() { pr("\n"); } // print w/ spaces
template<class T, class... Ts> void ps(const T& t, const Ts&... ts) {
pr(t); if (sizeof...(ts)) pr(" "); ps(ts...);
}
void pc() { pr("]\n"); } // debug w/ commas
template<class T, class... Ts> void pc(const T& t, const Ts&... ts) {
pr(t); if (sizeof...(ts)) pr(", "); pc(ts...);
}
#define dbg(x...) pr("[",#x,"] = ["), pc(x);
}
using namespace output;
namespace io {
void setIn(string s) { freopen(s.c_str(),"r",stdin); }
void setOut(string s) { freopen(s.c_str(),"w",stdout); }
void setIO(string s = "") {
ios_base::sync_with_stdio(0); cin.tie(0); // fast I/O
// cin.exceptions(cin.failbit);
// throws exception when do smth illegal
// ex. try to read letter into int
if (sz(s)) { setIn(s+".in"), setOut(s+".out"); } // for USACO
}
}
using namespace io;
mt19937 rng((uint32_t)chrono::steady_clock::now().time_since_epoch().count());
int N,M,K;
vpi v;
bool vis[MX];
vi apply(vi x) {
trav(t,v) for (int i = t.f; i < t.f+t.s-i; ++i)
swap(x[i],x[t.f+t.s-i]);
return x;
}
vi mul(vi a, vi b) {
F0R(i,N) a[i] = b[a[i]];
return a;
}
int main() {
setIO(); re(N,M,K);
v.rsz(M); re(v); trav(t,v) t.f --, t.s --;
vi ret(N); iota(all(ret),0); ret = apply(ret);
vi ans(N); iota(all(ans),0);
while (K) {
if (K&1) ans = mul(ans,ret);
ret = mul(ret,ret); K /= 2;
}
trav(t,ans) ps(t+1);
// you should actually read the stuff at the bottom
}
/* stuff you should look for
* int overflow, array bounds
* special cases (n=1?)
* do smth instead of nothing and stay organized
*/ |
Discovery of antidepressant activity by forced swimming test may depend on pre-exposure of rats to a stressful situation.
Antidepressant-induced anti-immobility effects have been assessed in animals exposed or not to a pretest session using the forced swimming test. Desipramine, maprotiline, mianserine (15 and 30 mg/kg), nomifensine (2.5 and 5 mg/kg), d-amphetamine (1 and 2 mg/kg) and muscimol (1 and 2 mg/kg), unlike imipramine (15 and 30 mg/kg), LY-171555 (0.1 and 0.2 mg/kg) and scopolamine (0.5 and 0.1 mg/kg), did not reduce immobility time in rats which had not received the pretest session. On the other hand, all of the drugs tested reduced immobility time in rats exposed to a pretest session. In addition, the degree of antiimmobility effects of desipramine (20 mg/kg) and nomifensine (5 mg/kg) increased proportionally with the level of water (0, 4, 15 and 30 cm) to which animals were exposed at the time of pretest. Furthermore, desipramine reduced immobility time in rats pre-exposed to types of stress different from forced swimming, cold, restraint or foot-shock. All drugs were injected intraperitoneally three times, 24, 5 and 1 h before testing. The present findings suggest that a stressful pretest session may reveal pharmacological properties of antidepressants in the forced swimming test. This is also substantiated by the fact that diazepam (2.5 and 5 mg/kg) administered 30 min before the swimming pretest antagonized the anti-immobility effect of 15 mg/kg desipramine. |
/* $OpenBSD: misc.c,v 1.153 2020/06/26 05:16:38 djm Exp $ */
/*
* Copyright (c) 2000 Markus Friedl. All rights reserved.
* Copyright (c) 2005-2020 Damien Miller. All rights reserved.
* Copyright (c) 2004 Henning Brauer <henning@openbsd.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#include "includes.h"
#include <sys/types.h>
#include <sys/ioctl.h>
#include <sys/socket.h>
#include <sys/stat.h>
#include <sys/time.h>
#include <sys/wait.h>
#include <sys/un.h>
#include <limits.h>
#ifdef HAVE_LIBGEN_H
# include <libgen.h>
#endif
#ifdef HAVE_POLL_H
#include <poll.h>
#endif
#include <signal.h>
#include <stdarg.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#include <unistd.h>
#include <netinet/in.h>
#include <netinet/in_systm.h>
#include <netinet/ip.h>
#include <netinet/tcp.h>
#include <arpa/inet.h>
#include <ctype.h>
#include <errno.h>
#include <fcntl.h>
#include <netdb.h>
#ifdef HAVE_PATHS_H
# include <paths.h>
#include <pwd.h>
#endif
#ifdef SSH_TUN_OPENBSD
#include <net/if.h>
#endif
#include "xmalloc.h"
#include "misc.h"
#include "log.h"
#include "ssh.h"
#include "sshbuf.h"
#include "ssherr.h"
#include "platform.h"
/* remove newline at end of string */
char *
chop(char *s)
{
char *t = s;
while (*t) {
if (*t == '\n' || *t == '\r') {
*t = '\0';
return s;
}
t++;
}
return s;
}
/* set/unset filedescriptor to non-blocking */
int
set_nonblock(int fd)
{
int val;
val = fcntl(fd, F_GETFL);
if (val == -1) {
error("fcntl(%d, F_GETFL): %s", fd, strerror(errno));
return (-1);
}
if (val & O_NONBLOCK) {
debug3("fd %d is O_NONBLOCK", fd);
return (0);
}
debug2("fd %d setting O_NONBLOCK", fd);
val |= O_NONBLOCK;
if (fcntl(fd, F_SETFL, val) == -1) {
debug("fcntl(%d, F_SETFL, O_NONBLOCK): %s", fd,
strerror(errno));
return (-1);
}
return (0);
}
int
unset_nonblock(int fd)
{
int val;
val = fcntl(fd, F_GETFL);
if (val == -1) {
error("fcntl(%d, F_GETFL): %s", fd, strerror(errno));
return (-1);
}
if (!(val & O_NONBLOCK)) {
debug3("fd %d is not O_NONBLOCK", fd);
return (0);
}
debug("fd %d clearing O_NONBLOCK", fd);
val &= ~O_NONBLOCK;
if (fcntl(fd, F_SETFL, val) == -1) {
debug("fcntl(%d, F_SETFL, ~O_NONBLOCK): %s",
fd, strerror(errno));
return (-1);
}
return (0);
}
const char *
ssh_gai_strerror(int gaierr)
{
if (gaierr == EAI_SYSTEM && errno != 0)
return strerror(errno);
return gai_strerror(gaierr);
}
/* disable nagle on socket */
void
set_nodelay(int fd)
{
int opt;
socklen_t optlen;
optlen = sizeof opt;
if (getsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &opt, &optlen) == -1) {
debug("getsockopt TCP_NODELAY: %.100s", strerror(errno));
return;
}
if (opt == 1) {
debug2("fd %d is TCP_NODELAY", fd);
return;
}
opt = 1;
debug2("fd %d setting TCP_NODELAY", fd);
if (setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &opt, sizeof opt) == -1)
error("setsockopt TCP_NODELAY: %.100s", strerror(errno));
}
/* Allow local port reuse in TIME_WAIT */
int
set_reuseaddr(int fd)
{
int on = 1;
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on)) == -1) {
error("setsockopt SO_REUSEADDR fd %d: %s", fd, strerror(errno));
return -1;
}
return 0;
}
/* Get/set routing domain */
char *
get_rdomain(int fd)
{
#if defined(HAVE_SYS_GET_RDOMAIN)
return sys_get_rdomain(fd);
#elif defined(__OpenBSD__)
int rtable;
char *ret;
socklen_t len = sizeof(rtable);
if (getsockopt(fd, SOL_SOCKET, SO_RTABLE, &rtable, &len) == -1) {
error("Failed to get routing domain for fd %d: %s",
fd, strerror(errno));
return NULL;
}
xasprintf(&ret, "%d", rtable);
return ret;
#else /* defined(__OpenBSD__) */
return NULL;
#endif
}
int
set_rdomain(int fd, const char *name)
{
#if defined(HAVE_SYS_SET_RDOMAIN)
return sys_set_rdomain(fd, name);
#elif defined(__OpenBSD__)
int rtable;
const char *errstr;
if (name == NULL)
return 0; /* default table */
rtable = (int)strtonum(name, 0, 255, &errstr);
if (errstr != NULL) {
/* Shouldn't happen */
error("Invalid routing domain \"%s\": %s", name, errstr);
return -1;
}
if (setsockopt(fd, SOL_SOCKET, SO_RTABLE,
&rtable, sizeof(rtable)) == -1) {
error("Failed to set routing domain %d on fd %d: %s",
rtable, fd, strerror(errno));
return -1;
}
return 0;
#else /* defined(__OpenBSD__) */
error("Setting routing domain is not supported on this platform");
return -1;
#endif
}
/*
* Wait up to *timeoutp milliseconds for events on fd. Updates
* *timeoutp with time remaining.
* Returns 0 if fd ready or -1 on timeout or error (see errno).
*/
static int
waitfd(int fd, int *timeoutp, short events)
{
struct pollfd pfd;
struct timeval t_start;
int oerrno, r;
monotime_tv(&t_start);
pfd.fd = fd;
pfd.events = events;
for (; *timeoutp >= 0;) {
r = poll(&pfd, 1, *timeoutp);
oerrno = errno;
ms_subtract_diff(&t_start, timeoutp);
errno = oerrno;
if (r > 0)
return 0;
else if (r == -1 && errno != EAGAIN && errno != EINTR)
return -1;
else if (r == 0)
break;
}
/* timeout */
errno = ETIMEDOUT;
return -1;
}
/*
* Wait up to *timeoutp milliseconds for fd to be readable. Updates
* *timeoutp with time remaining.
* Returns 0 if fd ready or -1 on timeout or error (see errno).
*/
int
waitrfd(int fd, int *timeoutp) {
return waitfd(fd, timeoutp, POLLIN);
}
/*
* Attempt a non-blocking connect(2) to the specified address, waiting up to
* *timeoutp milliseconds for the connection to complete. If the timeout is
* <=0, then wait indefinitely.
*
* Returns 0 on success or -1 on failure.
*/
int
timeout_connect(int sockfd, const struct sockaddr *serv_addr,
socklen_t addrlen, int *timeoutp)
{
int optval = 0;
socklen_t optlen = sizeof(optval);
/* No timeout: just do a blocking connect() */
if (timeoutp == NULL || *timeoutp <= 0)
return connect(sockfd, serv_addr, addrlen);
set_nonblock(sockfd);
for (;;) {
if (connect(sockfd, serv_addr, addrlen) == 0) {
/* Succeeded already? */
unset_nonblock(sockfd);
return 0;
} else if (errno == EINTR)
continue;
else if (errno != EINPROGRESS)
return -1;
break;
}
if (waitfd(sockfd, timeoutp, POLLIN | POLLOUT) == -1)
return -1;
/* Completed or failed */
if (getsockopt(sockfd, SOL_SOCKET, SO_ERROR, &optval, &optlen) == -1) {
debug("getsockopt: %s", strerror(errno));
return -1;
}
if (optval != 0) {
errno = optval;
return -1;
}
unset_nonblock(sockfd);
return 0;
}
/* Characters considered whitespace in strsep calls. */
#define WHITESPACE " \t\r\n"
#define QUOTE "\""
/* return next token in configuration line */
static char *
strdelim_internal(char **s, int split_equals)
{
char *old;
int wspace = 0;
if (*s == NULL)
return NULL;
old = *s;
*s = strpbrk(*s,
split_equals ? WHITESPACE QUOTE "=" : WHITESPACE QUOTE);
if (*s == NULL)
return (old);
if (*s[0] == '\"') {
memmove(*s, *s + 1, strlen(*s)); /* move nul too */
/* Find matching quote */
if ((*s = strpbrk(*s, QUOTE)) == NULL) {
return (NULL); /* no matching quote */
} else {
*s[0] = '\0';
*s += strspn(*s + 1, WHITESPACE) + 1;
return (old);
}
}
/* Allow only one '=' to be skipped */
if (split_equals && *s[0] == '=')
wspace = 1;
*s[0] = '\0';
/* Skip any extra whitespace after first token */
*s += strspn(*s + 1, WHITESPACE) + 1;
if (split_equals && *s[0] == '=' && !wspace)
*s += strspn(*s + 1, WHITESPACE) + 1;
return (old);
}
/*
* Return next token in configuration line; splts on whitespace or a
* single '=' character.
*/
char *
strdelim(char **s)
{
return strdelim_internal(s, 1);
}
/*
* Return next token in configuration line; splts on whitespace only.
*/
char *
strdelimw(char **s)
{
return strdelim_internal(s, 0);
}
struct passwd *
pwcopy(struct passwd *pw)
{
struct passwd *copy = xcalloc(1, sizeof(*copy));
copy->pw_name = xstrdup(pw->pw_name);
copy->pw_passwd = xstrdup(pw->pw_passwd);
#ifdef HAVE_STRUCT_PASSWD_PW_GECOS
copy->pw_gecos = xstrdup(pw->pw_gecos);
#endif
copy->pw_uid = pw->pw_uid;
copy->pw_gid = pw->pw_gid;
#ifdef HAVE_STRUCT_PASSWD_PW_EXPIRE
copy->pw_expire = pw->pw_expire;
#endif
#ifdef HAVE_STRUCT_PASSWD_PW_CHANGE
copy->pw_change = pw->pw_change;
#endif
#ifdef HAVE_STRUCT_PASSWD_PW_CLASS
copy->pw_class = xstrdup(pw->pw_class);
#endif
copy->pw_dir = xstrdup(pw->pw_dir);
copy->pw_shell = xstrdup(pw->pw_shell);
return copy;
}
/*
* Convert ASCII string to TCP/IP port number.
* Port must be >=0 and <=65535.
* Return -1 if invalid.
*/
int
a2port(const char *s)
{
struct servent *se;
long long port;
const char *errstr;
port = strtonum(s, 0, 65535, &errstr);
if (errstr == NULL)
return (int)port;
if ((se = getservbyname(s, "tcp")) != NULL)
return ntohs(se->s_port);
return -1;
}
int
a2tun(const char *s, int *remote)
{
const char *errstr = NULL;
char *sp, *ep;
int tun;
if (remote != NULL) {
*remote = SSH_TUNID_ANY;
sp = xstrdup(s);
if ((ep = strchr(sp, ':')) == NULL) {
free(sp);
return (a2tun(s, NULL));
}
ep[0] = '\0'; ep++;
*remote = a2tun(ep, NULL);
tun = a2tun(sp, NULL);
free(sp);
return (*remote == SSH_TUNID_ERR ? *remote : tun);
}
if (strcasecmp(s, "any") == 0)
return (SSH_TUNID_ANY);
tun = strtonum(s, 0, SSH_TUNID_MAX, &errstr);
if (errstr != NULL)
return (SSH_TUNID_ERR);
return (tun);
}
#define SECONDS 1
#define MINUTES (SECONDS * 60)
#define HOURS (MINUTES * 60)
#define DAYS (HOURS * 24)
#define WEEKS (DAYS * 7)
/*
* Convert a time string into seconds; format is
* a sequence of:
* time[qualifier]
*
* Valid time qualifiers are:
* <none> seconds
* s|S seconds
* m|M minutes
* h|H hours
* d|D days
* w|W weeks
*
* Examples:
* 90m 90 minutes
* 1h30m 90 minutes
* 2d 2 days
* 1w 1 week
*
* Return -1 if time string is invalid.
*/
long
convtime(const char *s)
{
long total, secs, multiplier;
const char *p;
char *endp;
errno = 0;
total = 0;
p = s;
if (p == NULL || *p == '\0')
return -1;
while (*p) {
secs = strtol(p, &endp, 10);
if (p == endp ||
(errno == ERANGE && (secs == LONG_MIN || secs == LONG_MAX)) ||
secs < 0)
return -1;
multiplier = 1;
switch (*endp++) {
case '\0':
endp--;
break;
case 's':
case 'S':
break;
case 'm':
case 'M':
multiplier = MINUTES;
break;
case 'h':
case 'H':
multiplier = HOURS;
break;
case 'd':
case 'D':
multiplier = DAYS;
break;
case 'w':
case 'W':
multiplier = WEEKS;
break;
default:
return -1;
}
if (secs >= LONG_MAX / multiplier)
return -1;
secs *= multiplier;
if (total >= LONG_MAX - secs)
return -1;
total += secs;
if (total < 0)
return -1;
p = endp;
}
return total;
}
#define TF_BUFS 8
#define TF_LEN 9
const char *
fmt_timeframe(time_t t)
{
char *buf;
static char tfbuf[TF_BUFS][TF_LEN]; /* ring buffer */
static int idx = 0;
unsigned int sec, min, hrs, day;
unsigned long long week;
buf = tfbuf[idx++];
if (idx == TF_BUFS)
idx = 0;
week = t;
sec = week % 60;
week /= 60;
min = week % 60;
week /= 60;
hrs = week % 24;
week /= 24;
day = week % 7;
week /= 7;
if (week > 0)
snprintf(buf, TF_LEN, "%02lluw%01ud%02uh", week, day, hrs);
else if (day > 0)
snprintf(buf, TF_LEN, "%01ud%02uh%02um", day, hrs, min);
else
snprintf(buf, TF_LEN, "%02u:%02u:%02u", hrs, min, sec);
return (buf);
}
/*
* Returns a standardized host+port identifier string.
* Caller must free returned string.
*/
char *
put_host_port(const char *host, u_short port)
{
char *hoststr;
if (port == 0 || port == SSH_DEFAULT_PORT)
return(xstrdup(host));
if (asprintf(&hoststr, "[%s]:%d", host, (int)port) == -1)
fatal("put_host_port: asprintf: %s", strerror(errno));
debug3("put_host_port: %s", hoststr);
return hoststr;
}
/*
* Search for next delimiter between hostnames/addresses and ports.
* Argument may be modified (for termination).
* Returns *cp if parsing succeeds.
* *cp is set to the start of the next field, if one was found.
* The delimiter char, if present, is stored in delim.
* If this is the last field, *cp is set to NULL.
*/
char *
hpdelim2(char **cp, char *delim)
{
char *s, *old;
if (cp == NULL || *cp == NULL)
return NULL;
old = s = *cp;
if (*s == '[') {
if ((s = strchr(s, ']')) == NULL)
return NULL;
else
s++;
} else if ((s = strpbrk(s, ":/")) == NULL)
s = *cp + strlen(*cp); /* skip to end (see first case below) */
switch (*s) {
case '\0':
*cp = NULL; /* no more fields*/
break;
case ':':
case '/':
if (delim != NULL)
*delim = *s;
*s = '\0'; /* terminate */
*cp = s + 1;
break;
default:
return NULL;
}
return old;
}
char *
hpdelim(char **cp)
{
return hpdelim2(cp, NULL);
}
char *
cleanhostname(char *host)
{
if (*host == '[' && host[strlen(host) - 1] == ']') {
host[strlen(host) - 1] = '\0';
return (host + 1);
} else
return host;
}
char *
colon(char *cp)
{
int flag = 0;
if (*cp == ':') /* Leading colon is part of file name. */
return NULL;
if (*cp == '[')
flag = 1;
for (; *cp; ++cp) {
if (*cp == '@' && *(cp+1) == '[')
flag = 1;
if (*cp == ']' && *(cp+1) == ':' && flag)
return (cp+1);
if (*cp == ':' && !flag)
return (cp);
if (*cp == '/')
return NULL;
}
return NULL;
}
/*
* Parse a [user@]host:[path] string.
* Caller must free returned user, host and path.
* Any of the pointer return arguments may be NULL (useful for syntax checking).
* If user was not specified then *userp will be set to NULL.
* If host was not specified then *hostp will be set to NULL.
* If path was not specified then *pathp will be set to ".".
* Returns 0 on success, -1 on failure.
*/
int
parse_user_host_path(const char *s, char **userp, char **hostp, char **pathp)
{
char *user = NULL, *host = NULL, *path = NULL;
char *sdup, *tmp;
int ret = -1;
if (userp != NULL)
*userp = NULL;
if (hostp != NULL)
*hostp = NULL;
if (pathp != NULL)
*pathp = NULL;
sdup = xstrdup(s);
/* Check for remote syntax: [user@]host:[path] */
if ((tmp = colon(sdup)) == NULL)
goto out;
/* Extract optional path */
*tmp++ = '\0';
if (*tmp == '\0')
tmp = ".";
path = xstrdup(tmp);
/* Extract optional user and mandatory host */
tmp = strrchr(sdup, '@');
if (tmp != NULL) {
*tmp++ = '\0';
host = xstrdup(cleanhostname(tmp));
if (*sdup != '\0')
user = xstrdup(sdup);
} else {
host = xstrdup(cleanhostname(sdup));
user = NULL;
}
/* Success */
if (userp != NULL) {
*userp = user;
user = NULL;
}
if (hostp != NULL) {
*hostp = host;
host = NULL;
}
if (pathp != NULL) {
*pathp = path;
path = NULL;
}
ret = 0;
out:
free(sdup);
free(user);
free(host);
free(path);
return ret;
}
/*
* Parse a [user@]host[:port] string.
* Caller must free returned user and host.
* Any of the pointer return arguments may be NULL (useful for syntax checking).
* If user was not specified then *userp will be set to NULL.
* If port was not specified then *portp will be -1.
* Returns 0 on success, -1 on failure.
*/
int
parse_user_host_port(const char *s, char **userp, char **hostp, int *portp)
{
char *sdup, *cp, *tmp;
char *user = NULL, *host = NULL;
int port = -1, ret = -1;
if (userp != NULL)
*userp = NULL;
if (hostp != NULL)
*hostp = NULL;
if (portp != NULL)
*portp = -1;
if ((sdup = tmp = strdup(s)) == NULL)
return -1;
/* Extract optional username */
if ((cp = strrchr(tmp, '@')) != NULL) {
*cp = '\0';
if (*tmp == '\0')
goto out;
if ((user = strdup(tmp)) == NULL)
goto out;
tmp = cp + 1;
}
/* Extract mandatory hostname */
if ((cp = hpdelim(&tmp)) == NULL || *cp == '\0')
goto out;
host = xstrdup(cleanhostname(cp));
/* Convert and verify optional port */
if (tmp != NULL && *tmp != '\0') {
if ((port = a2port(tmp)) <= 0)
goto out;
}
/* Success */
if (userp != NULL) {
*userp = user;
user = NULL;
}
if (hostp != NULL) {
*hostp = host;
host = NULL;
}
if (portp != NULL)
*portp = port;
ret = 0;
out:
free(sdup);
free(user);
free(host);
return ret;
}
/*
* Converts a two-byte hex string to decimal.
* Returns the decimal value or -1 for invalid input.
*/
static int
hexchar(const char *s)
{
unsigned char result[2];
int i;
for (i = 0; i < 2; i++) {
if (s[i] >= '0' && s[i] <= '9')
result[i] = (unsigned char)(s[i] - '0');
else if (s[i] >= 'a' && s[i] <= 'f')
result[i] = (unsigned char)(s[i] - 'a') + 10;
else if (s[i] >= 'A' && s[i] <= 'F')
result[i] = (unsigned char)(s[i] - 'A') + 10;
else
return -1;
}
return (result[0] << 4) | result[1];
}
/*
* Decode an url-encoded string.
* Returns a newly allocated string on success or NULL on failure.
*/
static char *
urldecode(const char *src)
{
char *ret, *dst;
int ch;
ret = xmalloc(strlen(src) + 1);
for (dst = ret; *src != '\0'; src++) {
switch (*src) {
case '+':
*dst++ = ' ';
break;
case '%':
if (!isxdigit((unsigned char)src[1]) ||
!isxdigit((unsigned char)src[2]) ||
(ch = hexchar(src + 1)) == -1) {
free(ret);
return NULL;
}
*dst++ = ch;
src += 2;
break;
default:
*dst++ = *src;
break;
}
}
*dst = '\0';
return ret;
}
/*
* Parse an (scp|ssh|sftp)://[user@]host[:port][/path] URI.
* See https://tools.ietf.org/html/draft-ietf-secsh-scp-sftp-ssh-uri-04
* Either user or path may be url-encoded (but not host or port).
* Caller must free returned user, host and path.
* Any of the pointer return arguments may be NULL (useful for syntax checking)
* but the scheme must always be specified.
* If user was not specified then *userp will be set to NULL.
* If port was not specified then *portp will be -1.
* If path was not specified then *pathp will be set to NULL.
* Returns 0 on success, 1 if non-uri/wrong scheme, -1 on error/invalid uri.
*/
int
parse_uri(const char *scheme, const char *uri, char **userp, char **hostp,
int *portp, char **pathp)
{
char *uridup, *cp, *tmp, ch;
char *user = NULL, *host = NULL, *path = NULL;
int port = -1, ret = -1;
size_t len;
len = strlen(scheme);
if (strncmp(uri, scheme, len) != 0 || strncmp(uri + len, "://", 3) != 0)
return 1;
uri += len + 3;
if (userp != NULL)
*userp = NULL;
if (hostp != NULL)
*hostp = NULL;
if (portp != NULL)
*portp = -1;
if (pathp != NULL)
*pathp = NULL;
uridup = tmp = xstrdup(uri);
/* Extract optional ssh-info (username + connection params) */
if ((cp = strchr(tmp, '@')) != NULL) {
char *delim;
*cp = '\0';
/* Extract username and connection params */
if ((delim = strchr(tmp, ';')) != NULL) {
/* Just ignore connection params for now */
*delim = '\0';
}
if (*tmp == '\0') {
/* Empty username */
goto out;
}
if ((user = urldecode(tmp)) == NULL)
goto out;
tmp = cp + 1;
}
/* Extract mandatory hostname */
if ((cp = hpdelim2(&tmp, &ch)) == NULL || *cp == '\0')
goto out;
host = xstrdup(cleanhostname(cp));
if (!valid_domain(host, 0, NULL))
goto out;
if (tmp != NULL && *tmp != '\0') {
if (ch == ':') {
/* Convert and verify port. */
if ((cp = strchr(tmp, '/')) != NULL)
*cp = '\0';
if ((port = a2port(tmp)) <= 0)
goto out;
tmp = cp ? cp + 1 : NULL;
}
if (tmp != NULL && *tmp != '\0') {
/* Extract optional path */
if ((path = urldecode(tmp)) == NULL)
goto out;
}
}
/* Success */
if (userp != NULL) {
*userp = user;
user = NULL;
}
if (hostp != NULL) {
*hostp = host;
host = NULL;
}
if (portp != NULL)
*portp = port;
if (pathp != NULL) {
*pathp = path;
path = NULL;
}
ret = 0;
out:
free(uridup);
free(user);
free(host);
free(path);
return ret;
}
/* function to assist building execv() arguments */
void
addargs(arglist *args, char *fmt, ...)
{
va_list ap;
char *cp;
u_int nalloc;
int r;
va_start(ap, fmt);
r = vasprintf(&cp, fmt, ap);
va_end(ap);
if (r == -1)
fatal("addargs: argument too long");
nalloc = args->nalloc;
if (args->list == NULL) {
nalloc = 32;
args->num = 0;
} else if (args->num+2 >= nalloc)
nalloc *= 2;
args->list = xrecallocarray(args->list, args->nalloc, nalloc, sizeof(char *));
args->nalloc = nalloc;
args->list[args->num++] = cp;
args->list[args->num] = NULL;
}
void
replacearg(arglist *args, u_int which, char *fmt, ...)
{
va_list ap;
char *cp;
int r;
va_start(ap, fmt);
r = vasprintf(&cp, fmt, ap);
va_end(ap);
if (r == -1)
fatal("replacearg: argument too long");
if (which >= args->num)
fatal("replacearg: tried to replace invalid arg %d >= %d",
which, args->num);
free(args->list[which]);
args->list[which] = cp;
}
void
freeargs(arglist *args)
{
u_int i;
if (args->list != NULL) {
for (i = 0; i < args->num; i++)
free(args->list[i]);
free(args->list);
args->nalloc = args->num = 0;
args->list = NULL;
}
}
/*
* Expands tildes in the file name. Returns data allocated by xmalloc.
* Warning: this calls getpw*.
*/
char *
tilde_expand_filename(const char *filename, uid_t uid)
{
const char *path, *sep;
char user[128], *ret;
struct passwd *pw;
u_int len, slash;
if (*filename != '~')
return (xstrdup(filename));
filename++;
path = strchr(filename, '/');
if (path != NULL && path > filename) { /* ~user/path */
slash = path - filename;
if (slash > sizeof(user) - 1)
fatal("tilde_expand_filename: ~username too long");
memcpy(user, filename, slash);
user[slash] = '\0';
if ((pw = getpwnam(user)) == NULL)
fatal("tilde_expand_filename: No such user %s", user);
} else if ((pw = getpwuid(uid)) == NULL) /* ~/path */
fatal("tilde_expand_filename: No such uid %ld", (long)uid);
/* Make sure directory has a trailing '/' */
len = strlen(pw->pw_dir);
if (len == 0 || pw->pw_dir[len - 1] != '/')
sep = "/";
else
sep = "";
/* Skip leading '/' from specified path */
if (path != NULL)
filename = path + 1;
if (xasprintf(&ret, "%s%s%s", pw->pw_dir, sep, filename) >= PATH_MAX)
fatal("tilde_expand_filename: Path too long");
return (ret);
}
/*
* Expand a string with a set of %[char] escapes and/or ${ENVIRONMENT}
* substitutions. A number of escapes may be specified as
* (char *escape_chars, char *replacement) pairs. The list must be terminated
* by a NULL escape_char. Returns replaced string in memory allocated by
* xmalloc which the caller must free.
*/
static char *
vdollar_percent_expand(int *parseerror, int dollar, int percent,
const char *string, va_list ap)
{
#define EXPAND_MAX_KEYS 16
u_int num_keys = 0, i;
struct {
const char *key;
const char *repl;
} keys[EXPAND_MAX_KEYS];
struct sshbuf *buf;
int r, missingvar = 0;
char *ret = NULL, *var, *varend, *val;
size_t len;
if ((buf = sshbuf_new()) == NULL)
fatal("%s: sshbuf_new failed", __func__);
if (parseerror == NULL)
fatal("%s: null parseerror arg", __func__);
*parseerror = 1;
/* Gather keys if we're doing percent expansion. */
if (percent) {
for (num_keys = 0; num_keys < EXPAND_MAX_KEYS; num_keys++) {
keys[num_keys].key = va_arg(ap, char *);
if (keys[num_keys].key == NULL)
break;
keys[num_keys].repl = va_arg(ap, char *);
if (keys[num_keys].repl == NULL)
fatal("%s: NULL replacement for token %s", __func__, keys[num_keys].key);
}
if (num_keys == EXPAND_MAX_KEYS && va_arg(ap, char *) != NULL)
fatal("%s: too many keys", __func__);
if (num_keys == 0)
fatal("%s: percent expansion without token list",
__func__);
}
/* Expand string */
for (i = 0; *string != '\0'; string++) {
/* Optionally process ${ENVIRONMENT} expansions. */
if (dollar && string[0] == '$' && string[1] == '{') {
string += 2; /* skip over '${' */
if ((varend = strchr(string, '}')) == NULL) {
error("%s: environment variable '%s' missing "
"closing '}'", __func__, string);
goto out;
}
len = varend - string;
if (len == 0) {
error("%s: zero-length environment variable",
__func__);
goto out;
}
var = xmalloc(len + 1);
(void)strlcpy(var, string, len + 1);
if ((val = getenv(var)) == NULL) {
error("%s: env var ${%s} has no value",
__func__, var);
missingvar = 1;
} else {
debug3("%s: expand ${%s} -> '%s'", __func__,
var, val);
if ((r = sshbuf_put(buf, val, strlen(val))) !=0)
fatal("%s: sshbuf_put: %s", __func__,
ssh_err(r));
}
free(var);
string += len;
continue;
}
/*
* Process percent expansions if we have a list of TOKENs.
* If we're not doing percent expansion everything just gets
* appended here.
*/
if (*string != '%' || !percent) {
append:
if ((r = sshbuf_put_u8(buf, *string)) != 0) {
fatal("%s: sshbuf_put_u8: %s",
__func__, ssh_err(r));
}
continue;
}
string++;
/* %% case */
if (*string == '%')
goto append;
if (*string == '\0') {
error("%s: invalid format", __func__);
goto out;
}
for (i = 0; i < num_keys; i++) {
if (strchr(keys[i].key, *string) != NULL) {
if ((r = sshbuf_put(buf, keys[i].repl,
strlen(keys[i].repl))) != 0) {
fatal("%s: sshbuf_put: %s",
__func__, ssh_err(r));
}
break;
}
}
if (i >= num_keys) {
error("%s: unknown key %%%c", __func__, *string);
goto out;
}
}
if (!missingvar && (ret = sshbuf_dup_string(buf)) == NULL)
fatal("%s: sshbuf_dup_string failed", __func__);
*parseerror = 0;
out:
sshbuf_free(buf);
return *parseerror ? NULL : ret;
#undef EXPAND_MAX_KEYS
}
/*
* Expand only environment variables.
* Note that although this function is variadic like the other similar
* functions, any such arguments will be unused.
*/
char *
dollar_expand(int *parseerr, const char *string, ...)
{
char *ret;
int err;
va_list ap;
va_start(ap, string);
ret = vdollar_percent_expand(&err, 1, 0, string, ap);
va_end(ap);
if (parseerr != NULL)
*parseerr = err;
return ret;
}
/*
* Returns expanded string or NULL if a specified environment variable is
* not defined, or calls fatal if the string is invalid.
*/
char *
percent_expand(const char *string, ...)
{
char *ret;
int err;
va_list ap;
va_start(ap, string);
ret = vdollar_percent_expand(&err, 0, 1, string, ap);
va_end(ap);
if (err)
fatal("%s failed", __func__);
return ret;
}
/*
* Returns expanded string or NULL if a specified environment variable is
* not defined, or calls fatal if the string is invalid.
*/
char *
percent_dollar_expand(const char *string, ...)
{
char *ret;
int err;
va_list ap;
va_start(ap, string);
ret = vdollar_percent_expand(&err, 1, 1, string, ap);
va_end(ap);
if (err)
fatal("%s failed", __func__);
return ret;
}
int
tun_open(int tun, int mode, char **ifname)
{
#if defined(CUSTOM_SYS_TUN_OPEN)
return (sys_tun_open(tun, mode, ifname));
#elif defined(SSH_TUN_OPENBSD)
struct ifreq ifr;
char name[100];
int fd = -1, sock;
const char *tunbase = "tun";
if (ifname != NULL)
*ifname = NULL;
if (mode == SSH_TUNMODE_ETHERNET)
tunbase = "tap";
/* Open the tunnel device */
if (tun <= SSH_TUNID_MAX) {
snprintf(name, sizeof(name), "/dev/%s%d", tunbase, tun);
fd = open(name, O_RDWR);
} else if (tun == SSH_TUNID_ANY) {
for (tun = 100; tun >= 0; tun--) {
snprintf(name, sizeof(name), "/dev/%s%d",
tunbase, tun);
if ((fd = open(name, O_RDWR)) >= 0)
break;
}
} else {
debug("%s: invalid tunnel %u", __func__, tun);
return -1;
}
if (fd == -1) {
debug("%s: %s open: %s", __func__, name, strerror(errno));
return -1;
}
debug("%s: %s mode %d fd %d", __func__, name, mode, fd);
/* Bring interface up if it is not already */
snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%s%d", tunbase, tun);
if ((sock = socket(PF_UNIX, SOCK_STREAM, 0)) == -1)
goto failed;
if (ioctl(sock, SIOCGIFFLAGS, &ifr) == -1) {
debug("%s: get interface %s flags: %s", __func__,
ifr.ifr_name, strerror(errno));
goto failed;
}
if (!(ifr.ifr_flags & IFF_UP)) {
ifr.ifr_flags |= IFF_UP;
if (ioctl(sock, SIOCSIFFLAGS, &ifr) == -1) {
debug("%s: activate interface %s: %s", __func__,
ifr.ifr_name, strerror(errno));
goto failed;
}
}
if (ifname != NULL)
*ifname = xstrdup(ifr.ifr_name);
close(sock);
return fd;
failed:
if (fd >= 0)
close(fd);
if (sock >= 0)
close(sock);
return -1;
#else
error("Tunnel interfaces are not supported on this platform");
return (-1);
#endif
}
void
sanitise_stdfd(void)
{
int nullfd, dupfd;
if ((nullfd = dupfd = open(_PATH_DEVNULL, O_RDWR)) == -1) {
fprintf(stderr, "Couldn't open /dev/null: %s\n",
strerror(errno));
exit(1);
}
while (++dupfd <= STDERR_FILENO) {
/* Only populate closed fds. */
if (fcntl(dupfd, F_GETFL) == -1 && errno == EBADF) {
if (dup2(nullfd, dupfd) == -1) {
fprintf(stderr, "dup2: %s\n", strerror(errno));
exit(1);
}
}
}
if (nullfd > STDERR_FILENO)
close(nullfd);
}
char *
tohex(const void *vp, size_t l)
{
const u_char *p = (const u_char *)vp;
char b[3], *r;
size_t i, hl;
if (l > 65536)
return xstrdup("tohex: length > 65536");
hl = l * 2 + 1;
r = xcalloc(1, hl);
for (i = 0; i < l; i++) {
snprintf(b, sizeof(b), "%02x", p[i]);
strlcat(r, b, hl);
}
return (r);
}
/*
* Extend string *sp by the specified format. If *sp is not NULL (or empty),
* then the separator 'sep' will be prepended before the formatted arguments.
* Extended strings are heap allocated.
*/
void
xextendf(char **sp, const char *sep, const char *fmt, ...)
{
va_list ap;
char *tmp1, *tmp2;
va_start(ap, fmt);
xvasprintf(&tmp1, fmt, ap);
va_end(ap);
if (*sp == NULL || **sp == '\0') {
free(*sp);
*sp = tmp1;
return;
}
xasprintf(&tmp2, "%s%s%s", *sp, sep == NULL ? "" : sep, tmp1);
free(tmp1);
free(*sp);
*sp = tmp2;
}
u_int64_t
get_u64(const void *vp)
{
const u_char *p = (const u_char *)vp;
u_int64_t v;
v = (u_int64_t)p[0] << 56;
v |= (u_int64_t)p[1] << 48;
v |= (u_int64_t)p[2] << 40;
v |= (u_int64_t)p[3] << 32;
v |= (u_int64_t)p[4] << 24;
v |= (u_int64_t)p[5] << 16;
v |= (u_int64_t)p[6] << 8;
v |= (u_int64_t)p[7];
return (v);
}
u_int32_t
get_u32(const void *vp)
{
const u_char *p = (const u_char *)vp;
u_int32_t v;
v = (u_int32_t)p[0] << 24;
v |= (u_int32_t)p[1] << 16;
v |= (u_int32_t)p[2] << 8;
v |= (u_int32_t)p[3];
return (v);
}
u_int32_t
get_u32_le(const void *vp)
{
const u_char *p = (const u_char *)vp;
u_int32_t v;
v = (u_int32_t)p[0];
v |= (u_int32_t)p[1] << 8;
v |= (u_int32_t)p[2] << 16;
v |= (u_int32_t)p[3] << 24;
return (v);
}
u_int16_t
get_u16(const void *vp)
{
const u_char *p = (const u_char *)vp;
u_int16_t v;
v = (u_int16_t)p[0] << 8;
v |= (u_int16_t)p[1];
return (v);
}
void
put_u64(void *vp, u_int64_t v)
{
u_char *p = (u_char *)vp;
p[0] = (u_char)(v >> 56) & 0xff;
p[1] = (u_char)(v >> 48) & 0xff;
p[2] = (u_char)(v >> 40) & 0xff;
p[3] = (u_char)(v >> 32) & 0xff;
p[4] = (u_char)(v >> 24) & 0xff;
p[5] = (u_char)(v >> 16) & 0xff;
p[6] = (u_char)(v >> 8) & 0xff;
p[7] = (u_char)v & 0xff;
}
void
put_u32(void *vp, u_int32_t v)
{
u_char *p = (u_char *)vp;
p[0] = (u_char)(v >> 24) & 0xff;
p[1] = (u_char)(v >> 16) & 0xff;
p[2] = (u_char)(v >> 8) & 0xff;
p[3] = (u_char)v & 0xff;
}
void
put_u32_le(void *vp, u_int32_t v)
{
u_char *p = (u_char *)vp;
p[0] = (u_char)v & 0xff;
p[1] = (u_char)(v >> 8) & 0xff;
p[2] = (u_char)(v >> 16) & 0xff;
p[3] = (u_char)(v >> 24) & 0xff;
}
void
put_u16(void *vp, u_int16_t v)
{
u_char *p = (u_char *)vp;
p[0] = (u_char)(v >> 8) & 0xff;
p[1] = (u_char)v & 0xff;
}
void
ms_subtract_diff(struct timeval *start, int *ms)
{
struct timeval diff, finish;
monotime_tv(&finish);
timersub(&finish, start, &diff);
*ms -= (diff.tv_sec * 1000) + (diff.tv_usec / 1000);
}
void
ms_to_timeval(struct timeval *tv, int ms)
{
if (ms < 0)
ms = 0;
tv->tv_sec = ms / 1000;
tv->tv_usec = (ms % 1000) * 1000;
}
void
monotime_ts(struct timespec *ts)
{
struct timeval tv;
#if defined(HAVE_CLOCK_GETTIME) && (defined(CLOCK_BOOTTIME) || \
defined(CLOCK_MONOTONIC) || defined(CLOCK_REALTIME))
static int gettime_failed = 0;
if (!gettime_failed) {
# ifdef CLOCK_BOOTTIME
if (clock_gettime(CLOCK_BOOTTIME, ts) == 0)
return;
# endif /* CLOCK_BOOTTIME */
# ifdef CLOCK_MONOTONIC
if (clock_gettime(CLOCK_MONOTONIC, ts) == 0)
return;
# endif /* CLOCK_MONOTONIC */
# ifdef CLOCK_REALTIME
/* Not monotonic, but we're almost out of options here. */
if (clock_gettime(CLOCK_REALTIME, ts) == 0)
return;
# endif /* CLOCK_REALTIME */
debug3("clock_gettime: %s", strerror(errno));
gettime_failed = 1;
}
#endif /* HAVE_CLOCK_GETTIME && (BOOTTIME || MONOTONIC || REALTIME) */
gettimeofday(&tv, NULL);
ts->tv_sec = tv.tv_sec;
ts->tv_nsec = (long)tv.tv_usec * 1000;
}
void
monotime_tv(struct timeval *tv)
{
struct timespec ts;
monotime_ts(&ts);
tv->tv_sec = ts.tv_sec;
tv->tv_usec = ts.tv_nsec / 1000;
}
time_t
monotime(void)
{
struct timespec ts;
monotime_ts(&ts);
return ts.tv_sec;
}
double
monotime_double(void)
{
struct timespec ts;
monotime_ts(&ts);
return ts.tv_sec + ((double)ts.tv_nsec / 1000000000);
}
void
bandwidth_limit_init(struct bwlimit *bw, u_int64_t kbps, size_t buflen)
{
bw->buflen = buflen;
bw->rate = kbps;
bw->thresh = buflen;
bw->lamt = 0;
timerclear(&bw->bwstart);
timerclear(&bw->bwend);
}
/* Callback from read/write loop to insert bandwidth-limiting delays */
void
bandwidth_limit(struct bwlimit *bw, size_t read_len)
{
u_int64_t waitlen;
struct timespec ts, rm;
bw->lamt += read_len;
if (!timerisset(&bw->bwstart)) {
monotime_tv(&bw->bwstart);
return;
}
if (bw->lamt < bw->thresh)
return;
monotime_tv(&bw->bwend);
timersub(&bw->bwend, &bw->bwstart, &bw->bwend);
if (!timerisset(&bw->bwend))
return;
bw->lamt *= 8;
waitlen = (double)1000000L * bw->lamt / bw->rate;
bw->bwstart.tv_sec = waitlen / 1000000L;
bw->bwstart.tv_usec = waitlen % 1000000L;
if (timercmp(&bw->bwstart, &bw->bwend, >)) {
timersub(&bw->bwstart, &bw->bwend, &bw->bwend);
/* Adjust the wait time */
if (bw->bwend.tv_sec) {
bw->thresh /= 2;
if (bw->thresh < bw->buflen / 4)
bw->thresh = bw->buflen / 4;
} else if (bw->bwend.tv_usec < 10000) {
bw->thresh *= 2;
if (bw->thresh > bw->buflen * 8)
bw->thresh = bw->buflen * 8;
}
TIMEVAL_TO_TIMESPEC(&bw->bwend, &ts);
while (nanosleep(&ts, &rm) == -1) {
if (errno != EINTR)
break;
ts = rm;
}
}
bw->lamt = 0;
monotime_tv(&bw->bwstart);
}
/* Make a template filename for mk[sd]temp() */
void
mktemp_proto(char *s, size_t len)
{
const char *tmpdir;
int r;
if ((tmpdir = getenv("TMPDIR")) != NULL) {
r = snprintf(s, len, "%s/ssh-XXXXXXXXXXXX", tmpdir);
if (r > 0 && (size_t)r < len)
return;
}
r = snprintf(s, len, "/tmp/ssh-XXXXXXXXXXXX");
if (r < 0 || (size_t)r >= len)
fatal("%s: template string too short", __func__);
}
static const struct {
const char *name;
int value;
} ipqos[] = {
{ "none", INT_MAX }, /* can't use 0 here; that's CS0 */
{ "af11", IPTOS_DSCP_AF11 },
{ "af12", IPTOS_DSCP_AF12 },
{ "af13", IPTOS_DSCP_AF13 },
{ "af21", IPTOS_DSCP_AF21 },
{ "af22", IPTOS_DSCP_AF22 },
{ "af23", IPTOS_DSCP_AF23 },
{ "af31", IPTOS_DSCP_AF31 },
{ "af32", IPTOS_DSCP_AF32 },
{ "af33", IPTOS_DSCP_AF33 },
{ "af41", IPTOS_DSCP_AF41 },
{ "af42", IPTOS_DSCP_AF42 },
{ "af43", IPTOS_DSCP_AF43 },
{ "cs0", IPTOS_DSCP_CS0 },
{ "cs1", IPTOS_DSCP_CS1 },
{ "cs2", IPTOS_DSCP_CS2 },
{ "cs3", IPTOS_DSCP_CS3 },
{ "cs4", IPTOS_DSCP_CS4 },
{ "cs5", IPTOS_DSCP_CS5 },
{ "cs6", IPTOS_DSCP_CS6 },
{ "cs7", IPTOS_DSCP_CS7 },
{ "ef", IPTOS_DSCP_EF },
{ "le", IPTOS_DSCP_LE },
{ "lowdelay", IPTOS_LOWDELAY },
{ "throughput", IPTOS_THROUGHPUT },
{ "reliability", IPTOS_RELIABILITY },
{ NULL, -1 }
};
int
parse_ipqos(const char *cp)
{
u_int i;
char *ep;
long val;
if (cp == NULL)
return -1;
for (i = 0; ipqos[i].name != NULL; i++) {
if (strcasecmp(cp, ipqos[i].name) == 0)
return ipqos[i].value;
}
/* Try parsing as an integer */
val = strtol(cp, &ep, 0);
if (*cp == '\0' || *ep != '\0' || val < 0 || val > 255)
return -1;
return val;
}
const char *
iptos2str(int iptos)
{
int i;
static char iptos_str[sizeof "0xff"];
for (i = 0; ipqos[i].name != NULL; i++) {
if (ipqos[i].value == iptos)
return ipqos[i].name;
}
snprintf(iptos_str, sizeof iptos_str, "0x%02x", iptos);
return iptos_str;
}
void
lowercase(char *s)
{
for (; *s; s++)
*s = tolower((u_char)*s);
}
int
unix_listener(const char *path, int backlog, int unlink_first)
{
struct sockaddr_un sunaddr;
int saved_errno, sock;
memset(&sunaddr, 0, sizeof(sunaddr));
sunaddr.sun_family = AF_UNIX;
if (strlcpy(sunaddr.sun_path, path,
sizeof(sunaddr.sun_path)) >= sizeof(sunaddr.sun_path)) {
error("%s: path \"%s\" too long for Unix domain socket",
__func__, path);
errno = ENAMETOOLONG;
return -1;
}
sock = socket(PF_UNIX, SOCK_STREAM, 0);
if (sock == -1) {
saved_errno = errno;
error("%s: socket: %.100s", __func__, strerror(errno));
errno = saved_errno;
return -1;
}
if (unlink_first == 1) {
if (unlink(path) != 0 && errno != ENOENT)
error("unlink(%s): %.100s", path, strerror(errno));
}
if (bind(sock, (struct sockaddr *)&sunaddr, sizeof(sunaddr)) == -1) {
saved_errno = errno;
error("%s: cannot bind to path %s: %s",
__func__, path, strerror(errno));
close(sock);
errno = saved_errno;
return -1;
}
if (listen(sock, backlog) == -1) {
saved_errno = errno;
error("%s: cannot listen on path %s: %s",
__func__, path, strerror(errno));
close(sock);
unlink(path);
errno = saved_errno;
return -1;
}
return sock;
}
void
sock_set_v6only(int s)
{
#if defined(IPV6_V6ONLY) && !defined(__OpenBSD__)
int on = 1;
debug3("%s: set socket %d IPV6_V6ONLY", __func__, s);
if (setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &on, sizeof(on)) == -1)
error("setsockopt IPV6_V6ONLY: %s", strerror(errno));
#endif
}
/*
* Compares two strings that maybe be NULL. Returns non-zero if strings
* are both NULL or are identical, returns zero otherwise.
*/
static int
strcmp_maybe_null(const char *a, const char *b)
{
if ((a == NULL && b != NULL) || (a != NULL && b == NULL))
return 0;
if (a != NULL && strcmp(a, b) != 0)
return 0;
return 1;
}
/*
* Compare two forwards, returning non-zero if they are identical or
* zero otherwise.
*/
int
forward_equals(const struct Forward *a, const struct Forward *b)
{
if (strcmp_maybe_null(a->listen_host, b->listen_host) == 0)
return 0;
if (a->listen_port != b->listen_port)
return 0;
if (strcmp_maybe_null(a->listen_path, b->listen_path) == 0)
return 0;
if (strcmp_maybe_null(a->connect_host, b->connect_host) == 0)
return 0;
if (a->connect_port != b->connect_port)
return 0;
if (strcmp_maybe_null(a->connect_path, b->connect_path) == 0)
return 0;
/* allocated_port and handle are not checked */
return 1;
}
/* returns 1 if process is already daemonized, 0 otherwise */
int
daemonized(void)
{
int fd;
if ((fd = open(_PATH_TTY, O_RDONLY | O_NOCTTY)) >= 0) {
close(fd);
return 0; /* have controlling terminal */
}
if (getppid() != 1)
return 0; /* parent is not init */
if (getsid(0) != getpid())
return 0; /* not session leader */
debug3("already daemonized");
return 1;
}
/*
* Splits 's' into an argument vector. Handles quoted string and basic
* escape characters (\\, \", \'). Caller must free the argument vector
* and its members.
*/
int
argv_split(const char *s, int *argcp, char ***argvp)
{
int r = SSH_ERR_INTERNAL_ERROR;
int argc = 0, quote, i, j;
char *arg, **argv = xcalloc(1, sizeof(*argv));
*argvp = NULL;
*argcp = 0;
for (i = 0; s[i] != '\0'; i++) {
/* Skip leading whitespace */
if (s[i] == ' ' || s[i] == '\t')
continue;
/* Start of a token */
quote = 0;
if (s[i] == '\\' &&
(s[i + 1] == '\'' || s[i + 1] == '\"' || s[i + 1] == '\\'))
i++;
else if (s[i] == '\'' || s[i] == '"')
quote = s[i++];
argv = xreallocarray(argv, (argc + 2), sizeof(*argv));
arg = argv[argc++] = xcalloc(1, strlen(s + i) + 1);
argv[argc] = NULL;
/* Copy the token in, removing escapes */
for (j = 0; s[i] != '\0'; i++) {
if (s[i] == '\\') {
if (s[i + 1] == '\'' ||
s[i + 1] == '\"' ||
s[i + 1] == '\\') {
i++; /* Skip '\' */
arg[j++] = s[i];
} else {
/* Unrecognised escape */
arg[j++] = s[i];
}
} else if (quote == 0 && (s[i] == ' ' || s[i] == '\t'))
break; /* done */
else if (quote != 0 && s[i] == quote)
break; /* done */
else
arg[j++] = s[i];
}
if (s[i] == '\0') {
if (quote != 0) {
/* Ran out of string looking for close quote */
r = SSH_ERR_INVALID_FORMAT;
goto out;
}
break;
}
}
/* Success */
*argcp = argc;
*argvp = argv;
argc = 0;
argv = NULL;
r = 0;
out:
if (argc != 0 && argv != NULL) {
for (i = 0; i < argc; i++)
free(argv[i]);
free(argv);
}
return r;
}
/*
* Reassemble an argument vector into a string, quoting and escaping as
* necessary. Caller must free returned string.
*/
char *
argv_assemble(int argc, char **argv)
{
int i, j, ws, r;
char c, *ret;
struct sshbuf *buf, *arg;
if ((buf = sshbuf_new()) == NULL || (arg = sshbuf_new()) == NULL)
fatal("%s: sshbuf_new failed", __func__);
for (i = 0; i < argc; i++) {
ws = 0;
sshbuf_reset(arg);
for (j = 0; argv[i][j] != '\0'; j++) {
r = 0;
c = argv[i][j];
switch (c) {
case ' ':
case '\t':
ws = 1;
r = sshbuf_put_u8(arg, c);
break;
case '\\':
case '\'':
case '"':
if ((r = sshbuf_put_u8(arg, '\\')) != 0)
break;
/* FALLTHROUGH */
default:
r = sshbuf_put_u8(arg, c);
break;
}
if (r != 0)
fatal("%s: sshbuf_put_u8: %s",
__func__, ssh_err(r));
}
if ((i != 0 && (r = sshbuf_put_u8(buf, ' ')) != 0) ||
(ws != 0 && (r = sshbuf_put_u8(buf, '"')) != 0) ||
(r = sshbuf_putb(buf, arg)) != 0 ||
(ws != 0 && (r = sshbuf_put_u8(buf, '"')) != 0))
fatal("%s: buffer error: %s", __func__, ssh_err(r));
}
if ((ret = malloc(sshbuf_len(buf) + 1)) == NULL)
fatal("%s: malloc failed", __func__);
memcpy(ret, sshbuf_ptr(buf), sshbuf_len(buf));
ret[sshbuf_len(buf)] = '\0';
sshbuf_free(buf);
sshbuf_free(arg);
return ret;
}
/* Returns 0 if pid exited cleanly, non-zero otherwise */
int
exited_cleanly(pid_t pid, const char *tag, const char *cmd, int quiet)
{
int status;
while (waitpid(pid, &status, 0) == -1) {
if (errno != EINTR) {
error("%s: waitpid: %s", tag, strerror(errno));
return -1;
}
}
if (WIFSIGNALED(status)) {
error("%s %s exited on signal %d", tag, cmd, WTERMSIG(status));
return -1;
} else if (WEXITSTATUS(status) != 0) {
do_log2(quiet ? SYSLOG_LEVEL_DEBUG1 : SYSLOG_LEVEL_INFO,
"%s %s failed, status %d", tag, cmd, WEXITSTATUS(status));
return -1;
}
return 0;
}
/*
* Check a given path for security. This is defined as all components
* of the path to the file must be owned by either the owner of
* of the file or root and no directories must be group or world writable.
*
* XXX Should any specific check be done for sym links ?
*
* Takes a file name, its stat information (preferably from fstat() to
* avoid races), the uid of the expected owner, their home directory and an
* error buffer plus max size as arguments.
*
* Returns 0 on success and -1 on failure
*/
int
safe_path(const char *name, struct stat *stp, const char *pw_dir,
uid_t uid, char *err, size_t errlen)
{
char buf[PATH_MAX], homedir[PATH_MAX];
char *cp;
int comparehome = 0;
struct stat st;
if (realpath(name, buf) == NULL) {
snprintf(err, errlen, "realpath %s failed: %s", name,
strerror(errno));
return -1;
}
if (pw_dir != NULL && realpath(pw_dir, homedir) != NULL)
comparehome = 1;
if (!S_ISREG(stp->st_mode)) {
snprintf(err, errlen, "%s is not a regular file", buf);
return -1;
}
if ((!platform_sys_dir_uid(stp->st_uid) && stp->st_uid != uid) ||
(stp->st_mode & 022) != 0) {
snprintf(err, errlen, "bad ownership or modes for file %s",
buf);
return -1;
}
/* for each component of the canonical path, walking upwards */
for (;;) {
if ((cp = dirname(buf)) == NULL) {
snprintf(err, errlen, "dirname() failed");
return -1;
}
strlcpy(buf, cp, sizeof(buf));
if (stat(buf, &st) == -1 ||
(!platform_sys_dir_uid(st.st_uid) && st.st_uid != uid) ||
(st.st_mode & 022) != 0) {
snprintf(err, errlen,
"bad ownership or modes for directory %s", buf);
return -1;
}
/* If are past the homedir then we can stop */
if (comparehome && strcmp(homedir, buf) == 0)
break;
/*
* dirname should always complete with a "/" path,
* but we can be paranoid and check for "." too
*/
if ((strcmp("/", buf) == 0) || (strcmp(".", buf) == 0))
break;
}
return 0;
}
/*
* Version of safe_path() that accepts an open file descriptor to
* avoid races.
*
* Returns 0 on success and -1 on failure
*/
int
safe_path_fd(int fd, const char *file, struct passwd *pw,
char *err, size_t errlen)
{
struct stat st;
/* check the open file to avoid races */
if (fstat(fd, &st) == -1) {
snprintf(err, errlen, "cannot stat file %s: %s",
file, strerror(errno));
return -1;
}
return safe_path(file, &st, pw->pw_dir, pw->pw_uid, err, errlen);
}
/*
* Sets the value of the given variable in the environment. If the variable
* already exists, its value is overridden.
*/
void
child_set_env(char ***envp, u_int *envsizep, const char *name,
const char *value)
{
char **env;
u_int envsize;
u_int i, namelen;
if (strchr(name, '=') != NULL) {
error("Invalid environment variable \"%.100s\"", name);
return;
}
/*
* If we're passed an uninitialized list, allocate a single null
* entry before continuing.
*/
if (*envp == NULL && *envsizep == 0) {
*envp = xmalloc(sizeof(char *));
*envp[0] = NULL;
*envsizep = 1;
}
/*
* Find the slot where the value should be stored. If the variable
* already exists, we reuse the slot; otherwise we append a new slot
* at the end of the array, expanding if necessary.
*/
env = *envp;
namelen = strlen(name);
for (i = 0; env[i]; i++)
if (strncmp(env[i], name, namelen) == 0 && env[i][namelen] == '=')
break;
if (env[i]) {
/* Reuse the slot. */
free(env[i]);
} else {
/* New variable. Expand if necessary. */
envsize = *envsizep;
if (i >= envsize - 1) {
if (envsize >= 1000)
fatal("child_set_env: too many env vars");
envsize += 50;
env = (*envp) = xreallocarray(env, envsize, sizeof(char *));
*envsizep = envsize;
}
/* Need to set the NULL pointer at end of array beyond the new slot. */
env[i + 1] = NULL;
}
/* Allocate space and format the variable in the appropriate slot. */
/* XXX xasprintf */
env[i] = xmalloc(strlen(name) + 1 + strlen(value) + 1);
snprintf(env[i], strlen(name) + 1 + strlen(value) + 1, "%s=%s", name, value);
}
/*
* Check and optionally lowercase a domain name, also removes trailing '.'
* Returns 1 on success and 0 on failure, storing an error message in errstr.
*/
int
valid_domain(char *name, int makelower, const char **errstr)
{
size_t i, l = strlen(name);
u_char c, last = '\0';
static char errbuf[256];
if (l == 0) {
strlcpy(errbuf, "empty domain name", sizeof(errbuf));
goto bad;
}
if (!isalpha((u_char)name[0]) && !isdigit((u_char)name[0])) {
snprintf(errbuf, sizeof(errbuf), "domain name \"%.100s\" "
"starts with invalid character", name);
goto bad;
}
for (i = 0; i < l; i++) {
c = tolower((u_char)name[i]);
if (makelower)
name[i] = (char)c;
if (last == '.' && c == '.') {
snprintf(errbuf, sizeof(errbuf), "domain name "
"\"%.100s\" contains consecutive separators", name);
goto bad;
}
if (c != '.' && c != '-' && !isalnum(c) &&
c != '_') /* technically invalid, but common */ {
snprintf(errbuf, sizeof(errbuf), "domain name "
"\"%.100s\" contains invalid characters", name);
goto bad;
}
last = c;
}
if (name[l - 1] == '.')
name[l - 1] = '\0';
if (errstr != NULL)
*errstr = NULL;
return 1;
bad:
if (errstr != NULL)
*errstr = errbuf;
return 0;
}
/*
* Verify that a environment variable name (not including initial '$') is
* valid; consisting of one or more alphanumeric or underscore characters only.
* Returns 1 on valid, 0 otherwise.
*/
int
valid_env_name(const char *name)
{
const char *cp;
if (name[0] == '\0')
return 0;
for (cp = name; *cp != '\0'; cp++) {
if (!isalnum((u_char)*cp) && *cp != '_')
return 0;
}
return 1;
}
const char *
atoi_err(const char *nptr, int *val)
{
const char *errstr = NULL;
long long num;
if (nptr == NULL || *nptr == '\0')
return "missing";
num = strtonum(nptr, 0, INT_MAX, &errstr);
if (errstr == NULL)
*val = (int)num;
return errstr;
}
int
parse_absolute_time(const char *s, uint64_t *tp)
{
struct tm tm;
time_t tt;
char buf[32], *fmt;
*tp = 0;
/*
* POSIX strptime says "The application shall ensure that there
* is white-space or other non-alphanumeric characters between
* any two conversion specifications" so arrange things this way.
*/
switch (strlen(s)) {
case 8: /* YYYYMMDD */
fmt = "%Y-%m-%d";
snprintf(buf, sizeof(buf), "%.4s-%.2s-%.2s", s, s + 4, s + 6);
break;
case 12: /* YYYYMMDDHHMM */
fmt = "%Y-%m-%dT%H:%M";
snprintf(buf, sizeof(buf), "%.4s-%.2s-%.2sT%.2s:%.2s",
s, s + 4, s + 6, s + 8, s + 10);
break;
case 14: /* YYYYMMDDHHMMSS */
fmt = "%Y-%m-%dT%H:%M:%S";
snprintf(buf, sizeof(buf), "%.4s-%.2s-%.2sT%.2s:%.2s:%.2s",
s, s + 4, s + 6, s + 8, s + 10, s + 12);
break;
default:
return SSH_ERR_INVALID_FORMAT;
}
memset(&tm, 0, sizeof(tm));
if (strptime(buf, fmt, &tm) == NULL)
return SSH_ERR_INVALID_FORMAT;
if ((tt = mktime(&tm)) < 0)
return SSH_ERR_INVALID_FORMAT;
/* success */
*tp = (uint64_t)tt;
return 0;
}
void
format_absolute_time(uint64_t t, char *buf, size_t len)
{
time_t tt = t > INT_MAX ? INT_MAX : t; /* XXX revisit in 2038 :P */
struct tm tm;
localtime_r(&tt, &tm);
strftime(buf, len, "%Y-%m-%dT%H:%M:%S", &tm);
}
/* check if path is absolute */
int
path_absolute(const char *path)
{
return (*path == '/') ? 1 : 0;
}
void
skip_space(char **cpp)
{
char *cp;
for (cp = *cpp; *cp == ' ' || *cp == '\t'; cp++)
;
*cpp = cp;
}
/* authorized_key-style options parsing helpers */
/*
* Match flag 'opt' in *optsp, and if allow_negate is set then also match
* 'no-opt'. Returns -1 if option not matched, 1 if option matches or 0
* if negated option matches.
* If the option or negated option matches, then *optsp is updated to
* point to the first character after the option.
*/
int
opt_flag(const char *opt, int allow_negate, const char **optsp)
{
size_t opt_len = strlen(opt);
const char *opts = *optsp;
int negate = 0;
if (allow_negate && strncasecmp(opts, "no-", 3) == 0) {
opts += 3;
negate = 1;
}
if (strncasecmp(opts, opt, opt_len) == 0) {
*optsp = opts + opt_len;
return negate ? 0 : 1;
}
return -1;
}
char *
opt_dequote(const char **sp, const char **errstrp)
{
const char *s = *sp;
char *ret;
size_t i;
*errstrp = NULL;
if (*s != '"') {
*errstrp = "missing start quote";
return NULL;
}
s++;
if ((ret = malloc(strlen((s)) + 1)) == NULL) {
*errstrp = "memory allocation failed";
return NULL;
}
for (i = 0; *s != '\0' && *s != '"';) {
if (s[0] == '\\' && s[1] == '"')
s++;
ret[i++] = *s++;
}
if (*s == '\0') {
*errstrp = "missing end quote";
free(ret);
return NULL;
}
ret[i] = '\0';
s++;
*sp = s;
return ret;
}
int
opt_match(const char **opts, const char *term)
{
if (strncasecmp((*opts), term, strlen(term)) == 0 &&
(*opts)[strlen(term)] == '=') {
*opts += strlen(term) + 1;
return 1;
}
return 0;
}
sshsig_t
ssh_signal(int signum, sshsig_t handler)
{
struct sigaction sa, osa;
/* mask all other signals while in handler */
memset(&sa, 0, sizeof(sa));
sa.sa_handler = handler;
sigfillset(&sa.sa_mask);
#if defined(SA_RESTART) && !defined(NO_SA_RESTART)
if (signum != SIGALRM)
sa.sa_flags = SA_RESTART;
#endif
if (sigaction(signum, &sa, &osa) == -1) {
debug3("sigaction(%s): %s", strsignal(signum), strerror(errno));
return SIG_ERR;
}
return osa.sa_handler;
}
|
Brainfreeze
2017, 20 minutes
When grief overcomes sense and reality desperation ensues.
A dark comedy in which Simon overcome by grief attempts to reanimate the head of his father, a once leading edge scientist in cryogenics. Three sisters take chase through the streets and countryside of Jersey to a final showdown. |
Cape Town: Asian teams have done the
continent proud in their opening games of the World Cup with
the exception of disappointing Australia, who were tipped by
many to be the region`s best chance of success.
Hundreds of millions of people across Asia have witnessed
gutsy performances from South Korea, Japan, North Korea and
even Oceania qualifier New Zealand.
North Korea scored their first World Cup goal in 44
years, Japan posted their maiden World Cup victory on foreign
soil and New Zealand picked up their first point ever.
But the Socceroos, who went further then any other Asian
nation at the World Cup four years ago, let the side down,
embarrassingly crushed 4-0 by Germany.
The most unexpected result came from Japan, who entered
the tournament on the back of four straight defeats and with
few punters expecting things to change.
But they scored a 1-0 upset victory over Cameroon that
has revived their spirits and given them fresh belief they can
emulate their march to the last 16 round at the 2002 World
Cup.
"The victory has given us some room to breathe, mentally,
before the remaining two games," said former Arsenal
midfielder Junichi Inamoto.
They face Holland next and coach Takeshi Okada is keen to
maintain a perspective.
"In the next game we will be up against the Netherlands
so we will have to go one step further," he said.
"This was the first win on foreign soil in the World Cup
for our team but this is not an achievement at all. What`s
coming next is the point."
South Korea, semi-finalists on home soil in 2002, also
achieved a hard-fought victory, beating Greece 2-0.
They now play Diego Maradona`s Argentina, which is likely
to be a far tougher test.
"This is only the start. It`s win number one but we have
to continue to grow," said coach Huh Jung-Moo.
"Argentina are one of the candidates for the title, they
have a lot of good players, but I have told my players to
remain confident."
Their northern neighbours might have lost 2-1 to Brazil,
but the performance from a team ranked 104 places below the
five-time champions was widely praised.
"Tactically and technically they were equal with Brazil
most of the time," said Asian Football Confederation President
Mohamed Bin Hammam.
"This is amazing considering that they are playing in the
World Cup after 44 years and their first game was against,
arguably, the best team in the world at present."
Nevertheless, it was a defeat and North Korea now have a
huge task ahead of them if they want to make the knockout
rounds, with Cristiano Ronaldo`s Portugal next up in Cape Town
on June 21.
While New Zealand stunned Slovakia with a stoppage time
equaliser to take their first ever World Cup point, their
fierce sporting rivals Australia flopped badly, with the loss
compounded by Tim Cahill being sent off.
Now, anything less than three points against Ghana on
Saturday will end their hopes of qualifying for the second
round -- a feat they managed four years ago before losing to
eventual winners Italy on a dubious penalty.
Their crushing defeat to Germany sparked a general
despondency back home and coach Pim Verbeek, whose tactics
have been criticised, has his work cut out to lift their
morale.
"You cannot compare this (Germany) game with the next
game. We have to learn from this game," he said. |
551 F.Supp. 397 (1982)
UNITED STATES of America, Plaintiff,
v.
Jose Luis CANTERO, Defendant.
No. 82 CR 256.
United States District Court, N.D. Illinois, E.D.
November 18, 1982.
*398 Joseph H. Hartzler, Asst. U.S. Atty., Chicago, Ill., for plaintiff.
James P. Tatooles, Chicago, Ill., for defendant.
Memorandum
LEIGHTON, District Judge.
This is a motion to suppress evidence seized from a suitcase which defendant was carrying near a baggage retrieval area at O'Hare International Airport in Chicago. The issue presented is whether he was subjected to an unreasonable search when his suitcase was opened after he was stopped at the airport by government narcotic agents. Evidence consisting of defendant's testimony and that of three government witnesses has been heard, the testimonial conflicts have been resolved, and the court finds that the following are the material facts.
I
Chicago police officer Rosemary Burzinski, at the time in question, was assigned to the narcotics detail at O'Hare International Airport. One of her duties was to monitor incoming flights in the attempt to identify drug couriers. As a part of her assignment, she ordinarily stood in an airport concourse and observed people deplane from flights that originated in cities which have come to be known as source cities for drugs brought into and distributed within the United States. If a deplaning passenger becomes suspect, Officer Burzinski will maintain additional surveillance and sometimes stop and question that person about illicit drugs. Whenever an encounter uncovers any drugs, then an arrest and seizure will occur. Officer Burzinski has worked at O'Hare for two and one-half years, has participated in about 200 encounters, and has been involved in about 50-75 seizures. One of her co-workers was Robert Fulkerson who was also assigned to O'Hare Airport as a special agent with the United States Department of Justice as part of a Task Force to detect drug couriers. In the last two and one-half years assigned to the airport, he has participated in four to five encounters per week, and in approximately 100 arrests.
On April 12, 1982, at about 3:20 p.m., defendant Jose Cantero arrived at O'Hare on United Air Lines Flight 111 from Miami, Florida, a noted source city for cocaine. He was traveling alone in the first class section; *399 and was the first passenger to leave the plane. When he reached the passenger concourse, he was seen by Officer Burzinski. She had never seen him before; did not know him, nor did she have any information from anyone concerning him. Nonetheless, she decided to follow Cantero as he proceeded toward the baggage retrieval area in the lower level, meeting Agent Fulkerson on the way. The two agents rode down the escalator and noticed that Cantero looked back, making eye contact with one of them. They heard him ask a skycap where the international terminal parking lot was located. This inquiry led the two agents to conclude that, because of the high cost of parking, Cantero must have been away from Chicago only a few days. The agents kept him under surveillance, and observed that he went to the baggage retrieval rack, picked up a red Samsonite suitcase, and began walking toward the automatic door.
Just before he reached it, Fulkerson tapped Cantero on the shoulder and showed him a DEA identification badge, and asked Cantero if he could speak to him. Cantero answered, "Sure." Burzinski was a short distance away; a third agent, Officer Lowry had joined the group but was not participating in the transaction. Fulkerson, in a conversational tone of voice, asked Cantero to identify himself; he produced a valid Illinois driver's license and an airline ticket which showed an original booking for an earlier flight. After examining the documents, Fulkerson asked Cantero if he had drugs in the suitcase. Cantero said, "No." Then Burzinski and Fulkerson told Cantero that they wanted to see if there were narcotic drugs in the red Samsonite. They asked Cantero for permission to open the suitcase; Cantero refused, saying he found it embarrassing to be subjected to such treatment in the presence of the many people in the area, some coming in and out of the automatic doors. Fulkerson then suggested that they move to one side, to the right of those exiting the area; and when they did, he took the suitcase from Cantero and opened it.
Among the items which could been seen immediately were two large blue and white "Prince of Denmark" cookie cans, approximately eight inches in diameter, sealed tight with tape around the edges. They were ordinary looking; and with the exception of the tape, nothing about them suggested they contained anything but cookies. Upon seeing the two cans, Fulkerson and Burzinski asked Cantero if he would consent to an inspection of their contents. Cantero refused, saying that they contained "voodoo items". Fulkerson, then, with Burzinski joining in the conversation, told Cantero that it was necessary for them to take the suitcase to the international terminal where they had "Rebel", a trained drugsniffing canine that would be used to determine whether the two cans contained narcotics.
Fulkerson took possession of the Samsonite; and when Cantero objected, he was told he could go with the agents to the other terminal; but that he was free to leave the airport, without his suitcase. Cantero decided to stay with the agents. The four of them then, Fulkerson leading, Lowry next, and Burzinski with Cantero along, began the walk to the international terminal, a distance away. On arrival there, Burzinski took the suitcase; and, in a separate room, exposed the cookie cans to Rebel's trained nose. She reported to her co-workers that from Rebel's reactions, the two cookie cans contained drugs. Cantero, who in the meantime had been kept under the careful surveillance of Fulkerson and Lowry, was arrested.[1] A short time later, a search warrant was obtained, the cans were searched, and in them were found 986 grams of a mixture containing cocaine. It is this evidence which defendant asks this court to suppress on the ground that his suitcase was opened at O'Hare Airport by Agent Fulkerson without a warrant, without lawful cause, and without consent. The *400 government asks this court to deny defendant's motion to suppress on the ground that he consented to the opening of his suitcase, in fact opened it himself.
II
The evidence in support of the government's contention that Cantero opened his own suitcase is the testimony of Burzinski and Fulkerson. This is not a case in which it is claimed that Cantero's physical or behavioral characteristics fit a drug courier profile; nor is it one in which the government claims that at the time its agents took possession of Cantero's driver's license and airline ticket they had knowledge of specific articulable facts which gave rise to a reasonable belief that he had committed or was committing a crime. This case is one in which the government claims that Cantero, on being asked by two agents, voluntarily consented, opened his suitcase, and put in open view the two cookie cans that were later shown to contain a substantial quantity of cocaine.
Consent may constitute a waiver of Fourth Amendment rights. United States v. Fike, 449 F.2d 191, 192, (5th Cir. 1971). It can be given in the form of words, gesture, or conduct, United States v. Griffin, 530 F.2d 739, 742 (7th Cir.1976); and a search conducted pursuant to consent is an exception to both the requirement of a warrant and probable cause, United States v. Bolin, 514 F.2d 554, 559 (7th Cir.1975). However, consent to a search is not lightly inferred and depends on the facts of each case, United States v. Cogwell, 486 F.2d 823, 837 (7th Cir.) cert. denied, 416 U.S. 959, 94 S.Ct. 1975, 40 L.Ed.2d 310 (1974), the question whether a consent was voluntary being itself one of fact to be determined from the totality of all the circumstances. United States v. Mendenhall, 446 U.S. 544, 558-59, 100 S.Ct. 1870, 1879, 64 L.Ed.2d 497 (1980); Schneckloth v. Bustamonte, 412 U.S. 218, 227, 93 S.Ct. 2041, 2047, 36 L.Ed.2d 854 (1973).
It is well established that when relying on consent as justification for a warrantless search, the prosecution has the burden of establishing that consent was, in fact, freely and voluntarily given. United States v. Glasby, 576 F.2d 734, 737 (7th Cir.) cert. denied, 439 U.S. 854, 99 S.Ct. 164, 58 L.Ed.2d 159 (1978). The credibility of those who testify concerning this fact is always important and crucial; so for this reason, a court should consider the whole nexus of its sense impressions of the witnesses. Dyer v. MacDougall, 201 F.2d 265, 268-269 (2d Cir. 1952); see Hall v. United States, 465 F.Supp. 571, 574 (N.D.Ill.1979). And the demeanor of such witnesses is a highly useful, even if not an infallible method of ascertaining the truth and accuracy of their narratives. Arnstein v. Portor, 154 F.2d 464, 470 (2d Cir.1946); see Sartor v. Arkansas Nat. Gas Corp., 321 U.S. 620, 628, 64 S.Ct. 724, 729, 88 L.Ed. 967 (1944).
This court has applied these tests of credibility to the testimony of Cantero, Burzinski, and Fulkerson. It has noticed, in the process, that Burzinski was one of the arresting officers and a witness in United States v. Black, a case that produced an opinion by Judge Nicholas J. Bua of this court, 510 F.Supp. 989; one for the majority of a court of appeals panel by Judge Pell, 675 F.2d 129; and a dissenting opinion by Judge Swygert, 675 F.2d 138. In its response to defendant's motion to suppress, the government submitted a legal discussion in which it argued that "[t]his case is controlled by the Seventh Circuit's recent opinion in United States v. Black, 675 F.2d 129 (7th Cir.1982). The facts in Black are virtually identical to the facts in the present case." This is no doubt true; there is a surprising similarity in some details of the facts testified to in this case by Burzinski and Fulkerson and the ones which she and her fellow agent described in United States v. Black.
Black, like Cantero in this case, was observed by Burzinski as he disembarked from a United Airline flight that originated in a Florida city considered by the DEA to be a main source of cocaine distribution in the United States. Black, like Cantero, according to Burzinski and her fellow officer Kinsella, was the first passenger to deplane. *401 He engaged in conduct which Kinsella in his testimony said was not unusual. Burzinski and Kinsella watched Black as he entered Gate F-3 and sat down without checking in. About five minutes later, Black picked up his travel bag and walked to the concourse. As he did, Burzinski and Kinsella identified themselves to him. They showed him their identification and Kinsella then asked him, in a normal tone of voice, if they could speak to him. According to Burzinski and Kinsella, Black said, "[s]ure". Kinsella asked Black if he had identification and an airline ticket. Black produced a Hawaii driver's license and a first class, one way ticket to Honolulu.
The ticket, however, was in the name of Mr. R. Plack. Kinsella asked Black why he was traveling under a fictitious name. Black offered no explanation; he merely shrugged his shoulders in response. Kinsella then asked Black what he had been doing in Florida. Black replied that he had been in Florida surfing for the past three months and, after he ran out of money, he harvested coconuts to earn money for his return ticket to Hawaii. At that point, Kinsella suggested that the two move a few feet away from the area of the initial stop in order to avoid blocking traffic on the concourse. Kinsella, at about this time, handed Black's license and ticket to Burzinski. The documents were never returned to him.
Black appeared to both Burzinski and Kinsella to be extremely nervous. Kinsella asked Black what was in his travel bag; Black said it contained books, clothes, and toilet articles. Kinsella asked Black, in a normal tone of voice, if he would consent to a search of the travel bag. Black responded in the affirmative; Kinsella specifically informed Black that he did not have to consent to the search. Then, without responding further, according to Burzinski and Kinsella, Black immediately knelt down, unzipped the bag, took out a book and handed it to Kinsella. Kinsella inspected the book, put it down on the floor next to the bag and then reached into it and took out a shaving kit. Kinsella opened the kit, inspected its contents, and then placed it on the floor next to the bag. Black said nothing and made no attempt to stop Kinsella from further inspection.
Kinsella then reached into the travel bag again and grasped a shirt. He felt an object through it. As he began to withdraw the shirt from the bag, Burzinski who was standing across from her kneeling partner, could see a clear plastic bag containing white powder wrapped in the folds of the shirt. The plastic bag was itself wrapped in a torn paper bag. Because of the way the bag containing the white powder was wrapped in the folds of the shirt, it was not visible to Kinsella as he brought the shirt to the top of the open travel bag. Just as Kinsella's hand reached the top of the travel bag, Black grabbed Kinsella's wrist, and while pulling Kinsella's hand out of the travel bag, told Kinsella not to search any further. As Black yanked Kinsella's hand out of the travel bag, the plastic bag containing the mixture fell out of the shirt to the bottom of the travel bag. Kinsella saw the plastic bag containing the white powder in plain view on the bottom of the travel bag and told Black he was under arrest. It was later determined that the plastic bag contained 540 grams of a mixture containing cocaine. Black was indicted; and when he appeared before Judge Bua he moved to suppress the evidence seized at the airport. The motion was denied.
A reading of Judge Bua's opinion, that of Judge Pell for the panel majority in the court of appeals, and Judge Swygert's dissent, conveys the teaching that in an airport investigative stop of a plane passenger, what police officers do with the passenger's identification documents can have important consequences for Fourth Amendment purposes. When Burzinski testified in this case, this court asked her if she had followed the Black case after her testimony before Judge Bua; she said that she had. She was then asked whether she knew that Black had appealed his conviction; she said she did. Then this court asked her whether she had read the court of appeals opinions in Black which had been issued on April 6, 1982, six days before Cantero was arrested at O'Hare Airport. She hesitated; and then said, "I may have."
*402 From this court's sense impressions of this witness, and observing her demeanor and manner while answering questions put to her, it finds that Burzinski had read the court of appeals opinions before she became a witness in this case; and, in addition, she and Fulkerson had discussed the parameters of Black with assistant United States attorneys in preparing for their testimony. Both Burzinski and Fulkerson have testified that when Cantero was asked for his identification, and he produced his Illinois driver's license and airplane ticket, they examined the two documents and returned the driver's license to him but kept the airline ticket. Cantero has denied that either document was returned to him. He states under oath that Fulkerson kept the documents and had them in his possession up until the time of the arrest at the international terminal.
At two points, Cantero is corroborated by the government's evidence. First, both Fulkerson and Burzinski say that after seeing the two cookie tins, and asking Cantero for permission to examine their contents, he was told by them that he was not under arrest; and that when Fulkerson took possession of the suitcase to carry it to the international terminal, where they could use Rebel's trained nose, Cantero was told he was free to leave the airport, or if he chose, go with them with the suitcase. Second, when, after his arrest, Cantero was delivered to the Chicago Metropolitan Correctional Center for processing, it was either Fulkerson, Burzinski, or another DEA agent who had Cantero's driver's license and produced it for the inventory clerk.
This court finds it unbelievable, and untrue, that two experienced drug enforcement agents would stop a total stranger, take from him a suitcase which they believed contained narcotic drugs, and then tell the suspected suitcase owner that he was free to leave their presence without their having ready at hand means by which they could locate him later and arrest him if their suspicions were substantiated.[2] It is evident, therefore, that at the time Burzinski and Fulkerson told Cantero he was free to leave the airport, they did so because they had in their possession his Illinois driver's license and his airline ticket which they could use to trace him in the event the time came for them to arrest him. For these reasons, the court finds that when Cantero handed to Fulkerson his driver's license and plane ticket, Fulkerson kept the documents in his possession. And when, moments later, Cantero's suitcase was opened, it was Fulkerson, not Cantero, who opened it. At the time that Fulkerson decided to retain possession of Cantero's travel documents, and when he opened the suitcase, neither he nor Burzinski had knowledge of any specific and articulable fact which could support a reasonable belief that Cantero had committed a crime.
III
From the facts shown by the evidence, this court concludes that the initial contact which Fulkerson and Burzinski had with Cantero, up to and including the point where Fulkerson retained possession of Cantero's driver's license and airplane ticket, was lawful, and was not a seizure triggering the protections of the Fourth Amendment. United States v. Black, 675 F.2d 129, 135 (7th Cir.1982). It has long been the law in Illinois, consistent with the Bill of Rights in the federal constitution, that a peace officer can always, without violence or coercion, approach a citizen, disclose his official purpose, and inquire of the citizen his name, his reason for being where he is, and what he is about. People v. Howlett, 1 Ill.App.3d 906, 274 N.E.2d 885 (1971); see People v. Henneman, 367 Ill. 151, 10 N.E.2d 649 (1937).
However, when in this case Fulkerson took Cantero's airplane ticket and driver's license and kept them from him, Cantero *403 was seized within the meaning of the Fourth Amendment. See Brown v. Texas, 443 U.S. 47, 50, 99 S.Ct. 2637, 2640, 61 L.Ed.2d 357 (1979); cf. United States v. Palmer, 603 F.2d 1286, 1288 (8th Cir.1979). A person is seized in a constitutional sense when, in view of all the circumstances surrounding the incident, a reasonable person would believe that he is not free to leave. United States v. Mendenhall, 446 U.S. 544, 554, 100 S.Ct. 1870, 1877, 64 L.Ed.2d 497 (1980). United States v. Jefferson, 650 F.2d 854, 857 (6th Cir.1981); United States v. Viegas, 639 F.2d 42, 44 (1st Cir.) cert. denied, 451 U.S. 970, 101 S.Ct. 2046, 68 L.Ed.2d 348 (1981). This was Cantero's situation.
He had an automobile parked in the international terminal parking lot; under Illinois law, he could not drive it from the airport without possession of his license. The seizure of these documents from him was unlawful because at the time it was effected neither Fulkerson nor Burzinski had knowledge of any specific and articulable fact sufficient to give rise to reasonable suspicion that Cantero had committed or was committing a crime. United States v. Brignoni-Ponce, 422 U.S. 873, 881-82, 95 S.Ct. 2574, 2580, 45 L.Ed.2d 607 (1975); cf., United States v. Black, 510 F.Supp. 989, 993 (N.D.Ill.1981), aff'd, 675 F.2d 129 (7th Cir. 1982).
The opening of Cantero's suitcase by Fulkerson was a government search requiring application of the Fourth Amendment. United States v. Newton, 510 F.2d 1149, 1153 (7th Cir.1975). Except as incident to a lawful arrest or on invitation or consent, a search without a warrant, of portable personal effects in the immediate possession of their owner is illegal. Faubion v. United States, 424 F.2d 437, 440 (10th Cir.1970). There was no warrant in this case; the search was not incident to a lawful arrest; and Cantero did not give consent or invite it. He was subjected to an unreasonable search when his suitcase was opened by Fulkerson. United States v. Rodriguez, 525 F.2d 1313 (10th Cir.1973); see United States v. Lonabaugh, 494 F.2d 1257 (5th Cir.1973); cf. United States v. Garay, 477 F.2d 1306 (5th Cir.1973). Therefore, his motion to suppress is granted, and the evidence consisting of his airline ticket, Illinois driver's license, the red Samsonite suitcase, the two large black and blue "Prince of Denmark" cookie cans, and their contents, the 986 grams of a mixture containing cocaine, will be refused admission in evidence in any trial of the charges in this case. An appropriate order will be entered.
So ordered.
NOTES
[1] On April 28, 1982, defendant was charged in a one-count indictment with possession of 986 grams of a mixture containing cocaine with intent to distribute, in violation of Title 21, United States Code, Section 841(a)(1).
[2] The suitcase did not have an owner's tag or label from which Burzinski and Fulkerson could have learned Cantero's address; nor, as far as the government has shown, did the contents contain any item that would have furnished the government agents with information they could use to find Cantero.
|
This above all: to thine own self be true, and it must follow, as the night the day, thou canst not then be false to any man.
Menu
Comic Book Teaser: The Brothers Three
Nick Robles has created more glorious character art for Shining Ascension. Nick, you’re awesome! ❤
Maedoc the King’s Son (ax), Caratacos the Magician’s Son (spear), and Bricius the Poet’s Son (crouching) meet Bregga during her quest. Are they friends or foes? You’ll have to read the comic to find out! 😀
The half-brothers will appear in the Shining Ascension series, coming to the Internet early 2015. |
Business Directories
The Russian Direct Investment Fund (RDIF) will support the creation of an Egyptian investment fund as part of an agreement with the Egyptian Ministry of Investment to bolster cooperation between the two countries.
The agreement wa
India's Essar Group will sign a long-term crude oil import deal with Russia's Rosneft during President Vladimir Putin's visit to New Delhi on Thursday, government and industry sources said.
"Essar will sign an MoU
India's Essar Group will sign a long-term crude oil import deal with Russia's Rosneft during President Vladimir Putin's visit to New Delhi on Thursday, government and industry sources said.
"Essar will sign an MoU
Russian President Vladimir Putin plans to leave the G20 summit early, a member of his delegation said, after Western leaders blasted Moscow on Saturday for the crisis in Ukraine and threatened more sanctions.
The Russian official
US President Barack Obama will visit Estonia and attend a Nato summit in Wales next week to send a strong message to Russian President Vladimir Putin that his incursion into Ukraine must be reversed and to keep his hands off the Baltic nations.
Russia's Vladimir Putin on Saturday voiced limited support for Ukraine's unilateral ceasefire in its conflict with pro-Russian separatists, but told President Petro Poroshenko there had to be talks with the rebels to prevent the truce co
China and Russia signed a $400 billion gas supply deal on Wednesday, securing the world's top energy user a major source of cleaner fuel and opening up a new market for Moscow as it risks losing European customers over the Ukraine crisis.
Ukrainian forces killed up to five pro-Moscow separatists in the east of the country, the Interior Ministry said on Thursday, as Russian President Vladimir Putin warned of "consequences" if Kiev used the army against its own people.
Separatists attacked a Ukrainian national guard base overnight and Kiev said three separatists were killed, the worst bloodshed yet in a 10-day pro-Russian uprising in east Ukraine, overshadowing crisis talks to resolve the conflict.
US President Barack Obama told Russian President Vladimir Putin in a tense phone call on Monday that Moscow would face further costs for its actions in Ukraine and should use its influence to get separatists in the country to stand down. |
~ If You Don't Like the Game, Change the Rules
More on Making This Editor Happy
After I had finished making selections for Ye Olde Magick Shoppe, I wrote a post discussing some of the recurring patterns in short stories that did not make the cut. And now that selections have been made on two more anthologies (official announcement coming soon!), it seems a good time to expand that list. (I am proud to say that this time, every author did get personalized feedback—which apparently is not common these days.)
Variations of the “And” Plot
In an “And” story, something happens, and something else happens, and something else happens… but each event seems meandering. There is no progression from one episode to the next; and no buildup to a theme’s culmination.
This time around, there were a few subspecies of the “And” plot that deserve special note:
Wish Fulfillment: Again, not all wish fulfillment is bad necessarily. Harry Potter begins with wish fulfillment: neglected boy is suddenly told he is special and goes off to wizard school. The danger with a wish-fulfillment plot is when the author gets caught up in all the nice things happening to the protagonist, and avoids providing a real plot or conflict. The author is in danger of shying away from true obstacles, which seemingly get in the way of all the nice things happening to the characters. Done well, wish fulfillment can launch a story and make it cool, or it could even be the culmination of a story—but in between, there had better be serious conflict, drama, opposition, struggle, and in a word, plot.
Revenge Fantasy: Strictly speaking, this is a kind of wish-fulfillment story, but with the focus on all the suffering meted out to the protagonist’s enemies. Again, this had better be the culmination of a well-constructed plot, or it will simply be boring and lurid.
Passive Characters: In this type of story, the protagonist is basically a bystander. Problems are resolved via Deus ex Machina, as the protagonist stands around impotently and drifts from scene to scene, the better to observe all the exciting things that other people are doing to other people. (This is distinct from a “Watson” viewpoint character, who is not actually the protagonist but serves as a narrative device to observe the real protagonist.)
Nihilism
Yet again, the grimdark emo plot makes an appearance. It seems like many authors believe that fiction ought to be depressing and to reiterate the meaninglessness of life. This often leads to flabby stories in which a series of bad things happen, with no real theme or point.
A useful contrast would be HP Lovecraft. His stories were unrelentingly grim, of course; but they were not truly nihilistic, to my mind. Rather, in the Lovecraft mythos, human experience was approximately trivial in comparison to the vast ancient powers who battled over the cosmos. On some level, meaning still existed; it’s just that humans rarely mattered!
And this does not mean that grim, depressing stories are verboten. But they need to have a point. The Grapes of Wrath, 1984, or Old Yeller were all grim; but the grimness was in service to the story, not its focus.
***
So there you have it. The recurring theme of all of these entries is that stories, in my opinion, ought to have conflict over important stakes. The conflict need not be big and pyrotechnic; small vignettes can also be good. But it has to illustrate something that matters. At a time when we have literally millions of books to choose from, a good story needs a reason to demand the reader’s time. Tell a story worth reading. |
Farm visits and undercooked hamburgers as major risk factors for sporadic Escherichia coli O157:H7 infection: data from a case-control study in 5 FoodNet sites.
In 1996, active surveillance in 5 Foodborne Diseases Active Surveillance Network (FoodNet) sites revealed up to a 9-fold difference in Escherichia coli O157:H7 (O157) infection incidence between sites. A matched case-control study of sporadic O157 cases was conducted in these sites from March 1996 through April 1997. Case subjects were patients with non-outbreak-related diarrheal illness who had O157 isolated from their stool samples. Control subjects were healthy persons matched by age and telephone number exchange. Overall, 196 case patients and 372 controls were enrolled. O157 infections were associated with farm exposure, cattle exposure, eating a pink hamburger (both at home and away from home), eating at a table-service restaurant, using immunosuppressive medication, and obtaining beef through a private slaughter arrangement. Variations in cattle exposures may explain a part of the regional variability of O157 infection incidence. O157 control measures should focus on reducing risks associated with eating undercooked hamburger, dining at table-service restaurants, and farm exposures. |
Athwaas – A Handshake For Peace
“I strongly believe that there is a lack of information and most importantly lack of correct information.” Omar Hafiz spoke to Pratiti Ganatra about the idea behind his peace project Athwaas - it’s execution and the unexpected popularity and appreciation it received.
In the span of two months, Omar Hafiz, a well-known development practitioner from Kashmir travelled to 17 states of India and met young artists in an attempt to sensitise them about the Kashmir issue. Hafiz has in the past worked and executed projects for international organisations like the Red Cross, Amnesty International, Conciliation Resources, Action Aid, Give India, Lombard, and the UNHCR. But this time, he chose a different approach. In the process of meeting these young artists across the country, he made a documentary-style video – titled ‘Screaming Canvases’, which gained immense popularity online.
What made you choose the documentary approach to broach this sensitive topic?
I would like to quote artists themselves here: We are artists; we come from different cultures, different states, different religions but we have one thing in common – we are humans. We don’t know any other language of expressing our solidarity with the people of Kashmir. So, here we paint our thoughts together in solidarity with the people of Kashmir with a hope that it will reach out to them in the same context as we paint it.
No doubt that this is a sensitive issue, but when sensitive issues are taken sensitively then a lot of things become easier to understand. My whole point is to transform the Kashmir conflict in a way that I can understand it and contribute to it as well. Creativity has bridged never-ending differences. Creative art is always inspiring, motivating and productive. The social media has given freedom of expression to the people of Kashmir to that level that it has helped in the sensitisation of the issue to the rest of the world. So, the tool to reach out to a global audience was the social media.
The documentary bit was because this involved hearing first hand from the artists themselves. It involved their real thoughts and messages along with showcasing their work for the people of Kashmir. It also helped to a great deal in building faith among the Kashmiri people and the immediate circles of the artists. The whole initiative was about to sensitise the Indian youth about the situation, and what it additionally did was develop and build some trust between the two parties.
The politically inactive faction of the Indian society, they actually don’t have any knowledge of the Kashmir issue – for them Kashmir is just a beautiful holiday destination; they do not understand the sufferings of the people there.
Do you believe that there is a lack of information about Kashmir or lack of correct information?
Yes, I strongly believe that there is a lack of information and most importantly lack of correct information. Look, there are two important factions of the India society – the politically active faction and the politically inactive faction. The politically active faction has two elements, one is who are active but not inclined to any political party and the other is who are active and also inclined to a political party… so the faction which is active and not inclined to any political party, they are actually aware of the Kashmir issue, but they don’t know about the realities of the issue. The ones who have a leaning towards a political party, have some knowledge about the Kashmir issue, but that is incorrect, because it is the knowledge being passed on to them by the political party – they just have that version of the story. The politically inactive faction of the Indian society, they actually don’t have any knowledge of the Kashmir issue – for them Kashmir is just a beautiful holiday destination; they do not understand the sufferings of the people there. So this whole thing leads to utter chaos – you feel bogged down by the whole thing when you don’t even find a single Indian knowing the real suffering of Kashmir.
How happy/satisfied would you say you are as a Kashmiri about the coverage that mainstream media gives to this whole issue?
As a Kashmiri, I am highly unsatisfied and unhappy about the coverage that mainstream media has been giving this Kashmir issue. It is crystal clear that this issue is a political issue and thus it requires a political solution but then India has never tried to change it’s stand on the issue, they just start debating about it when the resistance movement starts heating up – which at the same time gives logic to resistance moment in a way that Kashmir issue is always unheard by Indian state and resistance moment on ground brings them to a point where they have to listen to what the Kashmiris demand and aspire for. Till then there is no debate, there is no dialogue process that could have actually taken a different shape.
What the mainstream media does is keep tagging this resistance movement as something, which is being sponsored by PoK or Pakistan, which actually exaggerates the whole thing – it never leads to any solution in the end. So, I strongly believe that it is time for mainstream media to change its stand towards Kashmir and just give it the shape of an actually political issue, which needs an actual political solution.
The point of giving it a documentary style feel and shape was also because I was very aware of the power of social media – screening it at a particular place would have limited my audience, but with social media which is borderless, my reach would be limitless.
When you first started travelling, had you decided this was how it would turn out?
So, when I first started travelling, I had just this brief idea that wherever I travelled, I just wanted to meet the youth and get a brief idea from them about what they knew about Kashmir. The reason for focussing on the youth was that in India, even the few who do know about the Kashmir issue are in the higher age bracket – the youth are misinformed, or don’t have any information about Kashmir at all. So I thought of beginning this initiative towards the youth.
Athwaas, is a Kashmiri word which means handshake. So I named this initiative as Athwaas, or Handshake For Peace, and starting meeting the youth of different parts. I then realised that not every section of the youth is sensitised to the Kashmir issue. Then after some introspection, I decided that I needed to sub-categorise the youth to focus on the more sensitive sections and that’s when I decided to shift my focus to artists. So first when I met the artists, I just wanted to get a feel of what they knew about the Kashmir issue. Also as artists I knew that their art matters more than what they actually say, so I had initially planned that I would take their canvasses and then maybe put them up as an exhibition or something. But then I thought that if I do this – first it would become a one-day affair, and secondly some might like it, others would politicise it. So finally the idea became about creating something with a message, creating awareness among the youth of India without politicising it. And then I decided to record the whole thing – their canvasses as well as what they wanted to say. At this initial stage I had jus thought I would save/archive this footage. But then I decided to merge the whole process, create a 5-8 minute video where the coverage of the artists could be given a documentary sort of shape.
The point of giving it a documentary style feel and shape was also because I was very aware of the power of social media – screening it at a particular place would have limited my audience, but with social media which is borderless, my reach would be limitless. The scope of taking this message forward was immense. So documentary and social media came into my mind during the process of shooting it and meeting new people during the travels. And the number of people it has reached has exceeded all my expectations – it has reached around 1.5 million people, which is pretty great. And most of them appreciated it because it was a different approach to create awareness, it wasn’t overtly emotional but at the same time tries to sensitise one to the issue.
What were the artists’ reactions when you met them and told them about your idea?
When I met them individually, some of them were excited by the idea, some alienated me, some refused further talks about Kashmir, some came up with a lot of questions, some had the usual stereotypes and doubts in mind that are all Kashmiris terrorists because they all raise their voices against India. But I was expecting all of these reactions. We Kashmiris are used to such diverse reactions. It is a part of our daily lives when we travel outside Kashmir.
What kind of understanding did the artists already have? And how did that change once they met you?
Most of the artists had no idea about the issue. They knew that there is something wrong there, and there are curfews but they did not know the real picture. So I just made it a process – the first time when I met the artists I tried to figure out what the artists already knew about Kashmir, and to my surprise rarely people knew about the issue. So when I left after the first meeting, I used to request them to take a couple of hours out and read up about the history of Kashmir. And it happened many a times, that as they started to read up, they used to call me up with questions. This made me really happy, that they were taking the initiative to read up. And at the same time, I was also very conscious about the fact that I was not sending them the reading material – they were reading it up on their own from whatever source they could get their hands on. And then the next time I would meet them, I would ask them what they felt and then ask them to paint it and put in on a canvas for Kashmir. So this is how the whole journey started.
And the success of this whole initiative lies in the fact that when these artists put up this work, this documentary on their blog, on their Facebook wall, on their social media accounts, they got a lot of questions there.
And the success of this whole initiative lies in the fact that when these artists put up this work, this documentary on their blog, on their Facebook wall, on their social media accounts, they got a lot of questions there. Their friends were either asking questions, or some were getting offended – but the good bit was that the artists were personally responding to each and every comment and question. The artists weren’t calling me, or referring them to me, they were answering the questions themselves – which according to me was the success of the project. The point was the sensitise people about the issue – and do it in this way – with logic, with facts and figures. That more and more people are appreciating it was an added advantage and just made the project bigger.
In the past, Kashmiris have tried innumerable things creatively to try and sensitise people about the issue in their own way but it has never taken this shape. I think the reason these artists from different parts of India are being heard, and not the Kashmiris who have tried before is that according to me, Kashmiris are alienated in the Indian society.
Do you think sensitisation to the Kashmir issue works more effectively if it comes from a Kashmiri or a non-Kashmiri like the artists you use in the documentary?
Yes, I strongly believe that the sensitisation to the Kashmir issue works more effectively if it comes from a non-Kashmiri person. To be very honest, I had understood this fact a long time ago and so while working on Athwaas, I knew that if the message came from the youth of India, it would be more effective. In the past, Kashmiris have tried innumerable things creatively to try and sensitise people about the issue in their own way but it has never taken this shape. I think the reason these artists from different parts of India are being heard, and not the Kashmiris who have tried before is that according to me, Kashmiris are alienated in the Indian society. There are many reasons for this – both political and apolitical but I strongly felt that this message coming from a non-Kashmiri would be more effective than coming from a Kashmiri.
What would your next step be, seeing that this approach has gotten so much coverage and success?
To be very honest, I had never thought that this small initiative of mine would get so much coverage and so much success. I am so happy with the coverage that it has received in the press, in magazines such as yours, and also on the social media accounts of so many people.
The next step would be to nuance, reshape and revamp the same message in a different way and to a broader spectrum of artists and audiences. One way of doing this may be to reach out to more famous artists across India and South Asia. I would also like to share this with the people working in the other units in J&K, like in Ladakh, Jammu, Baluchistan and Gilgit – it so happens that sometimes they are the ones who are most misinformed about Kashmir. So for now, these are the plans I am looking at. Creativity is such a powerful tool and this small documentary has just proved that. So there are a few ideas that came up during the making of this documentary – something more vibrant, something more creative but definitely something apolitical would be my way forward.
Share:
Related
Pratiti Ganatra has completed her Masters in Mass Communication from the Symbiosis Institute Of Media and Communication, and has been with Kindle Magazine for the past two years. She likes to read and write on politics and history. She hopes that someday she will travel the world and write about it. |
Cash, while not as common as it once was, is unlikely to disappear entirely, experts believe.
Forget cash, cards or whipping out your smartphone.
Shoppers could soon be paying for goods simply by picking what they want and walking out the door.
It's simple, really. A chip in each item detects your selection and a 3D scanner above the doorway could check your identity against a database and debit your preferred account.
Rather than being a dystopian vision of the future, online shopping giant Amazon has already made this a reality at its checkout-less Seattle store.
READ MORE
* The emergence of an independent nation
* Technology could increase the trust in data
* Cash will not die
Using the same biometric scanning technology we see at Customs Smartgate kiosks in international airports, customers are able to check in via a smartphone app as they enter the store, which automatically detects when products are taken from or returned to the shelves and keeps track of them in a virtual cart.
It's little wonder that Reserve Bank deputy governor Geoff Bascand acknowledged in 2015 that New Zealand's "new" banknotes could be the last ones designed for the central bank.
CAMERON SPENCER/STUFF We may not yet have dreamed of the way we'll be paying for items in 20 years, ANZ digital transformation head Liz Maguire says.
But how close are we to having micro-chip implants embedded under our skins to make payments?
Like the Amazon stores, this has also already arrived.
One Swedish startup gives its workers the chance to have microchips the size of grains of rice inserted under their skin that can open doors, operate printers, or buy smoothies with a wave of the hand.
SIMON DAWSON/STUFF Eighty per cent of Kiwis would use a smartphone for everyday purchases, and almost two-thirds are keen to try out new payment technologies, according to a survey by Visa.
The pace of change sweeping the banking and payment industry is reaching a "tipping point", according to Massey University banking expert David Tripe.
Tripe says he has started noticing shop assistants on auto-pilot keying in Eftpos transactions even before checking how consumers intend to pay – and then having to cancel the transaction when someone pulls out a $20 bill.
The so-called "retail apocalpyse", where consumers shift their spending habits ever more online, is forcing bricks and mortar stores to innovate.
JIM URQUHART/REUTERS Not all that glitters is gold - banking expert David Tripe says Bitcoin is best viewed as a "commodity currency" because of the amount of power used in its creation.
ANZ bank digital transformation head Liz Maguire says it is combining its internet banking app with Apple's Siri and voice biometrics, so customers could securely transfer money to a friend just by saying "pay John $50" to their smartphone.
She says people may want to pay for transport using smart watches or rings, but prefer a different payment device in a posh shop.
"I am sure there will be new things that we have never dreamed off."
Even though cash may no longer be king, Maguire believes the completely cashless society may be a mirage.
The next big evolutionary step has long been touted as being the arrival of alternative "virtual" or crypto currencies such as Bitcoin.
But not everyone is convinced the hegemony of traditional currencies is really under threat.
Massey's banking guru Tripe notes the New Zealand dollar is as much a "virtual currency" as a physical one.
ANDY JACKSON/STUFF Green Party energy and ICT spokesman Gareth Hughes believes most people would be surprised by the environmental cost of Bitcoin.
Only about 3 per cent of the $150 billion deposited with banks in New Zealand exists in notes and coins, and the rest is just numbers on a computer.
Alternative currencies have "come and gone" over the ages, and Tripe says it is too soon to say whether Bitcoin will be also be a flash in the pan.
What seems to be clear is that Bitcoin has failed to take-off as a "means of exchange" in New Zealand, except perhaps when it comes to paying off ransomware demands, such as the recent 'Petya' attack.
REUTERS Bitcoin "mines" such as this one in Iceland could be consuming as much power as Denmark within a few years, some pundits fear.
Internet service provider Slingshot made headlines in 2014 when it became the largest domestic company to start accepting Bitcoin as payment for bills.
But it quietly shelved the payment option during an upgrade of its IT systems.
"There wasn't a huge demand," consumer manager Taryn Hamilton explains.
JASON REDMOND/REUTERS This Amazon Go store in Seattle has no check-outs; instead people pay simply by walking out the door.
"It was a quirky thing to offer, but 'normal cash' won out after a while."
In addition to being associated with ransomware payments and tax evasion – and hence the focus of a growing number of regulators around the world – Bitcoin has another ugly secret.
Bitcoins are brought into circulation by "Bitcoin mining", which is achieved by setting up computer servers to solve mathematical puzzles than turn up Bitcoins at random.
The economics of Bitcoin mining is largely determined by the cost of electricity to run those servers, so creating a Bitcoin, now worth $3545, should cost close to that in fossil or other fuels.
Just as currencies were historcially made out of precious metals such as gold and silver, Tripe says it wouldn't be much of a stretch to say each Bitcoin is made out of 30 barrels of oil.
One study suggests Bitcoin mining could consume as much electricity as Denmark by 2020 and American Nobel laureate for economics Paul Krugman is among those who have described it as a terrible step backwards for currencies.
The environmental debate over Bitcoin mining also appears to have the Green Party thinking carefully, even though it is a natural ally for alternative and barter currencies.
"We don't have policies specifically on Bitcoin. We do have policies supporting local currencies," energy and information, communication technology spokesman Gareth Hughes says.
"I think people using Bitcoin would be surprised to consider the environmental footprint."
So the upshot is, we may be stuck with the money we've got, but that doesn't mean it can't work harder for us.
Tripe expects banking costs to decline over time.
Those costs include not just the likes of bank fees and charges, but the "spreads" between the interest rate at which people can borrow and lend money, and at which they can change money between different currencies.
"As payment systems become increasingly technological, costs are declining," Tripe says.
The growth in the number of non-bank companies that are springing up offering people cheaper ways to move money around the world suggests that the foreign exchange market may be set for some disruption, he says.
Banks typically charge about a two per cent cut in fees and exchange rate spreads when transferring funds across borders.
That is even though they deal in two-ways flows of different currencies all the time, so the majority of transactions will "cancel out" and never require the bank to buy or sell any foreign currencies on a wholesale market.
Banks will instead maintain a "working balance" in different currencies, Tripe explains, and will only buy or sell currencies if they consume that and need to cover their position.
Maguire says ANZ is testing the distributed ledger technology of blockchain – not to be confused with Bitcoin itself – to process international payments faster and more securely.
"This proof of concept has been adopted by international payments service Swift and 45 leading banks from around the world have signed up to be part of the pilot to test this.
"It is always important that there is a reasonable price for the services we offer," she adds.
Aside from being untraceable and hence useful for buying things on the black economy, or from people you'd rather not deal with again, cash may also prove to be valuable when "the big one" strikes – should Eftpos and ATM networks go down.
The Civil Defence and Emergency Management Ministry doesn't specify an amount to have on hand but says people should be able to make do for at least three days.
"We understand supermarkets will still be able to process electronic payments, in most cases, as they have a process that allows this to occur offline.
"We also understand that local bank branches will act to make cash available via non ATM methods," a spokeswoman says.
Bar a natural disaster sending us back to the iron age – and whizzy new payment technologies aside – just what is "reasonable" when clipping the ticket is perhaps the million-dollar question when it comes to the future of money.
Over at Amazon, they're already looking at bringing the cashier-less technology to the 1200 Whole Food grocery stores across the United States that was recently purchased for $18bn.
So the era of swiping and Paywaving may not last long. |
Gaming systems are becoming ever larger and more complex. Geographically, a gaming system may comprise hundreds of linked or unlinked gaming devices within a single casino. In addition, the systems may now span multiple properties, with gaming machines over a wide geographic area connected to one another or associated with the same system.
Today's gaming systems may have a variety of features or functions which make the system very complex. Of course, the operational components of a gaming system are likely to include a large number of gaming machines, table games, keno stations, cashier workstations, auditor workstation, accounting workstations, and many other related system elements. These system elements are likely to be connected to a host computer via a network. Via this connection, information may be transmitted to each gaming machine or other device and information may be transmitted from each gaming machine or device. This information may comprise a wide variety of information, such as security information and gaming machine activity information.
Each gaming machine may also be associated with a player tracking network. This network may include the same communication links and host computer. However, this portion of the system is specially adapted to perform such functions as receiving player identification, such as by a player tracking card inserted into a card reader at the gaming machine, and tracking of player game play information. This information may include coin in and coin out information from the gaming machine.
A gaming machine may also be associated with a progressive network or system. Here, a group of gaming machines are associated, and amounts wagered may be placed in a common pool which can be won playing any one of the machines associated with the progressive system.
A gaming machine may also be provided with a communication link to a financial system. This system or function includes components arranged to permit a player to use a credit card or similar form of credit associated with an outside financial institution for providing credit for playing the gaming machine.
A gaming machine may also be associated with a cashless transaction system, such as International Game Technology's EZ-PAY™ system. Such a system includes components arranged to print tickets representing monetary value in lieu of dispensing actual currency or coin.
The complexity and size of these gaming systems creates a number of difficulties. It is desirable to be able to determine the location of a specific gaming machine and obtain information regarding its operation. It is surprisingly difficult to locate a particular gaming machine, given the size of the machine. However, in a large casino with thousands of machines, and considering that the layout of the casino may be changed with some frequency, the location of a particular machine is often somewhat difficult to determine.
Generally, the location is known either through a printed chart or by physically traveling to the casino to find the machine. In the first case, information regarding the gaming machine is rather singular, and more general information which may be pertinent to the location of the gaming machine, such as landmarks in the casino or relationships to other machines or banks of machines, may be lacking. In the second case, the detailed information is provided, but only to the person who travels to the gaming machine and physically observes it and the surroundings of the machine in the casino.
It is also often difficult to obtain information regarding a particular machine. The information regarding a particular machine, such as information regarding player activities, security, cashless transactions and the like may be found in different data files and with different computers or host arranged to implement the various functions or systems with which the gaming machine is associated.
A system which provides information regarding components of a gaming system, such as gaming machines and table games, including location information and game machine activity information, is desired. |
Mission
The Gloucester Fishermen Athletic Association (GFAA) is a nonprofit 501(c) community-based organization dedicated to the principle that all student-athletes of the Gloucester school system should be able to participate in the sport of their choice, regardless of financial circumstances. As equally important is our belief that the student-athletes should be able to practice and play on safe and maintained facilities.
Donate
Your financial support makes participation possible!
Donate to the GFAA
Every student deserves the right to participate regardless of financial circumstances. Help us offset student athletic fees with a donation. Please donate on-line or send donations directly to us. Thank You!
Make checks payable to:GFAA, P.O. Box 3010Gloucester, MA 01930
Join Our Mailing List
Email Type
Email
News
June 2016
Congratulations to all the GHS 2016 graduates! Enjoy your accomplishments and celebrate safely! |
Q:
Writing a macro for a spreadsheet in excel
I need to write a spreadsheet which when you press a button adds a row of data and asks for the parameters needed for the calculations, but I cant seem to get it right, its really frustrating me, any help would be appreciated. I am a complete begginner to macros in excel and have only done very basic programming for matlab on my uni course. My script so far is as follows:
Sub AddPosTol()
'
' AddPosTol Macro
'
Dim rngSeek As Range
Set rngSeek = Range("A1").End(xlDown).Offset(1, 0)
With rngSeek.Offset(0, 1)
With .Font
.Name = "Solid Edge ANSI1 Symbols"
.Size = 11
End With
End With
Range(rngSeek).Offset(0, 1) = "l"
Range(rngSeek).Offset(0, 3) = "=RC[-1]"
Range(rngSeek).Offset(0, 4) = "0"
With rngSeek.Offset(1, 1)
With .Font
.Bold = True
End With
End With
Range(rngSeek).Offset(1, 1) = "X value"
Range(rngSeek).Offset(2, 1) = "Y Value"
Range(rngSeek).Offset(0, 4) = "=2*SQRT((R[1]C[-3]-R[1]C)^2+(R[2]C[-3]-R[2]C)^2)"
Range(rngSeek).Offset(0, 5) = "=2*SQRT((R4C3-R[1]C)^2+(R5C3-R[2]C)^2)"
Range(rngSeek).Offset(0, 6) = "=2*SQRT((R[1]C[-3]-R[1]C)^2+(R[2]C[-3]-R[2]C)^2)"
Range(rngSeek).Offset(0, 7) = "=2*SQRT((R[1]C[-3]-R[1]C)^2+(R[2]C[-3]-R[2]C)^2)"
Range(rngSee).Offset(0, 8) = "=2*SQRT((R4C3-R[1]C)^2+(R5C3-R[2]C)^2)"
Range(rngSeek).Offset(0, 2) = (InputBox("Insert Positional Tolerance Diametre"))
Range(rngSeek).Offset(1, 2) = (InputBox("Insert X value on drawing"))
Range(rngSeek).Offset(2, 2) = (InputBox("Insert Y value on drawing"))
End Sub
A:
You've defined rngSeek as a range and then are trying to use that range definition with the Range() method of the worksheet.
All the lines where you have Range(rngSeek).Offset(... you can replace with rngSeek.Offset(...
(One of your formula also references the wrong cells ;-)
|
Monday, January 23, 2012
Believe! That is our message today. We have often given you information and you discount it. You may see different things transpire than what you expect. But through all that is happening, you must believe. Allow others to follow their own guidance and information and don't feel the need to direct them, as you think they should be in the world.
We notice that many often feel the need to judge others for how they are in the world and we see how many would expect others to live as they live. If you trust and believe, you will allow each to follow the path that is right for them without trying to judge or manipulate them. Sometimes the best thing you can do for someone is step back and give them space to be as they need to be. Respect of each path is cruscial.
If you believe and trust, you have the keys to the kingdom. Your world is evolving and you must each allow others to evolve as they need to. All works out perfectly.
Sunday, January 22, 2012
Know us! We are integral to you! Open your lives to us so that we may truly integrate with you. Spend time aligning with whomever you are working with. As we connect more and more, we find better ways to work together. We are working with you better and better. Know this.
Your lives are in flux. Know this and allow the changes to take place. Many of you are in lives that will not be recognizable to how those lives were a year ago. The future will also open up to a new existence. Each phase builds on the previous phase. This is part of the beauty of this very moment in time. As your earth reconfigures so do your lives. You will be amazed by how this all will turn out.
Saturday, January 21, 2012
Now is a time of great changes. Much is moving faster and faster. There is a huge acceleration in process. Once things start happening, you will find that much expanse will happen quickly. The flood gates are about to open. You are ready for what is to take place. Breathe while you are in the process. Allow each piece to take place as it needs to.
We are with you. We are helping you. You are not alone. Feel us and let us come in. Time is shifting. All is in perfection. Know that when things change, there is a purpose for this. As on element changes so do many other elements.
Friday, January 20, 2012
We are aware that you pick up information that often shifts and changes. You may feel put on hold but you are not really on hold. There is a shift where you are expanding to planes of potentials. Mankind is waking up and evolving so they are no longer stuck on a linear path. Each decision you make and others make will often shift what is taking place. All may shift in an instant. Many things are not fixed. There are some experiences that are fixed.
You may ask if something is fixed or mutable to know whether something is a sure thing on the timing you are picking up or whether it is only a potential that may take place. If you are aware of what must take place in a certain timing versus a possibility, you will find you are less frustrated.
We are working with you and we will continue to help you navigate whatever is showing up. We send you much love and support in this process. Know you are never alone. Learning to be present and go with the flow, you will find you are in much better shape to handle whatever comes up. Fine tune your connection with your teams and you will all learn to work better with each other. We are all a work in progress.
Thursday, January 19, 2012
You each have many pathways that will lead you to your journey. There is much variety in all that is before you each. So, worry not about how to get there. It is more important to know that you are meant to follow certain markers on your journey. It is like an actor hitting their mark. There is much that can happen from marker to marker. You may experience much on your journey.
What you study and experience all creates a beautiful tapestry for each of you. However, not all experiences are yours to have. You may find that you are drawn to an experience but for other reasons than you imagine. You may also find you are repelled by certain experiences. Trust what comes from within you. Trust what you seek and what seeks you. Find what resonates with you. Your soul will lead you to many twists and turns. Miracles await each of you in each moment. So, bless that journey and awaken to how you are meant to experience what is before you.
Whatever you do or experience, always tune into your team and you will do a marvelous job. Your futures await you. Trust and know that what is within you will be superb.
Wednesday, January 18, 2012
Spend a few minutes each morning tuning into what your focus of the day is to be. Your guides or teams may have suggestions for you. Whatever comes up, will help you with the day. Tune into the energy that comes through and see what it helps create. This does not need to be a long process. Just be open and ask about your focus and what you need to be aware of for the day. You can also ask if there is anything special you need to do during the day. Don’t worry if you don’t pick up anything. It may come to you in many forms. Just be open to the process.
You may find that this process is more effective for you at some other time of the day. Follow whatever your intuition guides you to do.
Tuesday, January 17, 2012
Have you made some time for someone whom you keep saying you need to call or spend time with? It is important for you to do this. Don’t wait until it is too late. It is important for you to spend time with others and to make them feel special. Make it a point to contact someone whom you really value but don’t seem to find the time for. Commit to this connection. You won’t be sorry that you did it.
We don’t ask you to do this out of guilt but out of a sense of making someone’s day a bit more special.
We would never ask someone to do charity out of guilt or feeling forced to do it. We would not ask you to contact a loved one out of guilt. We are looking for people you genuinely enjoy. If you contribute to a charity, make sure it is something you believe in and would genuinely want to support. Whatever you invest your energy in should be something that lifts or raises your vibration. It should not deplete you. Then you know you are on the right track. Your soul always gives you clues as to what you are doing and if it is right for you.
Always treat each moment as the only moment. You may never get another chance with someone. So, value whatever time you have together or let them go so that they can be with someone who does value them. When you do this, you are truly coming from a place of honor and respect.
Monday, January 16, 2012
What do you want to learn? What do you want to know? Seek knowledge. Be willing to try on different hats and discover what you love. Be bold and daring. Take chances. We are not asking you to take chances on things that you dread or feel heaviness at the thought of doing. We are asking you to seek whatever you feel excitement with in the prospect of experiencing. There should be a sense of thrill and your heart opening up to the experience. You don’t need to bring anyone on your adventure. Instead, let the right people show up who are thrilled and excited by the same adventure. That is how you build or create an authentic life. You must first have a true desire to go for an experience and then move on from there. When you are committed, the Universe is committed to you. Know this and allow it to happen.
The adventures await. You have it within you. You don’t know how something will truly work out, until you proceed with the experience.
Sunday, January 15, 2012
You know your answers. You often don’t want to admit it but you do know what is right for you. Stop putting so much energy into what is right for another being. You often don’t really know that answer. Stop trying to fix other’s lives. You often don’t have a clue how to really fix their lives. You just think you do because something looks dysfunctional to you so you decide to interfere.
A better use of your time is taking a look at your own lives. What do you want to change in your own life and existence? Now spend time on what steps might help you get to where you want to go. Chances are it has nothing to do with what another person is doing or not doing. It becomes comfortable to blame others for your unhappiness or anything else you wish to come up with. The truth is, when you are ready to change your life, you must create the change. If you truly wish for something to be different, you must first take steps to create that change. You hold the true power. You must be willing to step in and make the changes required. First look at what you would like to change. Do not tell anyone how they must be, instead, work on yourselves. Help create yourself as you wish to be. Help create the work that is within you. If you do this, you will change your lives to what is right for you and you can then simply enjoy those in your lives whom you feel drawn to and connected with. It involves releasing your attachments to outcomes. Your focus is in the process, enjoying the process and becoming your best you. Try that on and see how it works for you.
Saturday, January 14, 2012
Arise you who seek truth. Seek the dawn of mankind. Seek evolution and invest in being what you are. Release all that is not for you. Clear a path for what is for you. When you are ready to grow, the growth opportunities will present themselves. You may choose the path of suffering or you may choose to awaken and see the gift in all that happens. Struggle no more. We say this but we respect those who need to struggle. If you desire to be a victim, we will not stand in your way. We respectfully submit there is little power in this, except for those who like to show others their pain and suffering. We would prefer you choose the path of thriving and shining. Glory awaits those willing to seek it.
Pay attention to your thoughts and beliefs for they alter your pathways. If you truly wish to create what is your authentic life, simply ask for help in creating that way of being. There is no fear in something that is of the true light. Pay attention to when it is time to move on and when there is still something of value for you to learn in a situation. If you are honest, you will know what is what and when the timing is right. Don’t waste time in justifying why you are staying in situations you know are ready to be released. You do not do people justice when you hold onto them when you would rather release them. You keep them from moving on. That serves no one. Many do this to be nice but it isn’t nice, it denotes fear of moving forward and you block others from doing the same. When it is time to let go of something, simply let go. It doesn’t need to be a production. Make change simple and you will find it is simple.
Friday, January 13, 2012
Know that the passage of time has altered many things. Mankind has rewritten much to notate whomever they felt won a situation. Mankind knows little of the events in the heavens. They are told stories and believe them. You must each cultivate your true connections so that you receive the information directly, instead of second, third or some lesser variation of information.
You are each a crowning glory of creation. Your working life and paths are lit before you. Your paths open to those willing to look at their true path. There are few others who will stay with you from beginning to end. You will have many beings come and go. Hold onto nothing so that all may be free. Enjoy the time you have with each other and allow each to come and go as they need. Those meant to come back into your lives will. Those meant to be released must be released. Energy works best when there is a flow. Energy works best when it is allowed to be as it truly is. Allow all things to be authentic. Trust you will know what you need to know, when you need to know it. Trust the ways of all things.
If you pay attention to your feeling senses, you will know when something is off and when it is in alignment. That is key to everything. People can create an image that portrays one thing but if you truly pay attention to the energy, you will know what lies beyond the façade. Be authentic and in truth and seek those who are authentic and in truth.
Thursday, January 12, 2012
We know that you feel the need to have constant information from us. There are times where you do not need us to feed you answers. You only need to participate in the moment. Be present. Show up! We are around you and we are at your side or within you. When you need us, we are with you. There are times you need to just experience. Always invite us in but then trust the experience. Know you are well prepared for what is to be.
Wednesday, January 11, 2012
You are in our hearts and minds. We believe in you and are so proud of you. You each are following paths that are unique to you and your experiences help us with the human experience. We are not corporal and we have no way of learning about the physical experiences, except through our charges who teach us so much about being human. We watch your concerns and worries and we are able to take that information to understand what it is like to be human. When you step into the physical experience, you often feel disconnected from the higher realm existences. We hold no worries in our forms because we are connected to all that is. We also have no physical needs because we have no physical form. We have appearances and forms but it is not like you experience.
When you leave your physical form, you still have an energy form. You still continue on with or without your physical form. Each existence holds many gifts. Enjoy the gift that you have in your current forms. Enjoy each experience and know there is no reason for worry or stressing over outcomes. It all works out perfectly. Be more present in each moment. You will appreciate all that is going on, at some point, even if you don’t get it right now.
Tuesday, January 10, 2012
Be what you are and the rest will fall into place. We know that this sounds simple but many of you are trying to be something other than what you are or you try to emulate traits that are found in others. Instead allow your own energy to flow through you and from you. Seek that which you are truly interested in. Find ways to be authentic.
The thing that each of you have going for yourselves is that you are who you are. You can be a much better you than an imitation of another. It is fine to try new things and study alternative ways. In this process of learning you will foster learning and development but focus on what you truly enjoy and not trying to impress another. When you are working, find ways to truly enjoy some aspect of your work. If you can’t, then you really do need to find some other work. We guarantee there is something out there that you will enjoy. You just need to find it or in some cases, rediscover what gives you shear joy. Don’t attempt this when you are overwhelmed or exhausted. Seek this information when you are feeling rested and open.
Monday, January 9, 2012
For those of you who are meant to be bringers of light among mankind, focus on light. Shine light from within you. Utilize images of light radiating from source or envision light radiating form you. Ask that truth be revealed, seen, heard and understood. Shine light in the dark. Shine light in all that you are and do.
You may also tune into what your light is meant to do. If you are meant to heal, shine healing from your core. If you are meant to bring truth, shine the light of truth form your core. To find out what your light is meant to do, ask your teams. You may have some other function. If so, you will find that out too. You may not be a light bearer and if so, your purpose and function will reveal itself to you in another way. This message is mainly geared towards those who are meant to bring light to the people. If you are one of those beings, you will be guided on what to do and how to do it. You do not shine the light with the purpose of changing others but because you are light and must radiate light. Those who need to work with you will show up or gravitate to you.
If you are meant to do other work, that too is special and needed at this time. Ask for clarity about what your work is meant to be and do. You will receive answers. If not now, then you will receive your answers soon.
Sunday, January 8, 2012
You or many of you profess to be something but come up with reasons not to follow through. You think to be valid at doing something you must have fancy degrees and be paid for your skill sets. In fact, to be something, you must only be it and do what is within you. If you are a writer, write. If you are an actor, act. If you are a wonderful cook or baker, cook or bake. If you are a healer, heal. Do whatever you say you are, in some form. It is more important to do the task or behavior instead of talking about doing it.
There are professions where you do require added knowledge but there are also ways to be what you truly are right away. From there, study and acquire the degrees you require to expand your abilities. Start from what is innately within you. Always seek more knowledge to help you expand and grow.
No one can do certain work for you. You must do it yourself. But follow what is within you.
Saturday, January 7, 2012
The Light Bearer (Lucifer) was made evil by mankind. Humans knew nothing of what transpired between God and the creations of the Almighty. Mankind created stories of the fallen ones to create punitive ways for those who did not follow the rules that humans created under the guise of coming from God. The names of each angel reflected who and what they were. Mankind created evil ways to justify punitive behaviors. The one called Lucifer only brought light and held light but by making him evil, mankind prevented the light from coming through. It is time to correct that. Mankind requires great light right now. It is important for all light to shine through. There is nothing to fear. Bring in light. Search for truth. Be open and follow your guidance. You will all be magnificent. It is time to move back to decisions based on love and not fear.
Friday, January 6, 2012
Blessings my children! We gather around you now in united front. Your world changes and your lives alter on your courses. There is much we have discussed with you form your paths and directions to help you on your paths. You warrant some information to help guide you but you all have this guidance around you now, in many forms. Your paths are awakening. Your lives are coming to fruition.
We counsel you to hold patience right now and know that you will venture forward with the help of light around you and permeating within each of you. There is much wisdom in the light and it comes forth for each of you to follow. Your new jobs are forming and you will be put to work shortly. To prepare for this, rid yourselves of energy that no longer resonates with you and perform service that leads to your destinies. If you are not sure what this means, ask your teams. You will receive the guidance you require. Your path is calling to you now.
We raise a salute to each of you as you embark on your forward journey!
Thursday, January 5, 2012
We encourage you each to try different things with energy. Rearrange your home and see how it feels sitting in different furniture and looking at new perspectives of the room. What works and what doesn’t work for you? Try things out and see how the flow feels. Especially if you feel your life is stagnant, the shifts will help you with the flow of your space. It doesn’t mean everything will stay the same as the experiment. Sometimes people just get comfortable with something that doesn’t work. You can also move different pieces around.
We caution you to not do this in the space of another person, unless they are working with you. Moving energy around that affects others will not be good for them. If you help someone move their things around, with their permission, that is okay.
You may find that you enjoy the new perspective. If you don’t like something, you can always move it back to the way it was before you started. This will often help shake things up in your life. Another technique is to get rid of anything that doesn’t resonate with you now. Find someone who really enjoys the item or donate it to a thrift store. There are many potentials awaiting you. Don’t ever be afraid to try new things, especially if you feel drawn to the new adventures. It is time to get out of your boxes.
Wednesday, January 4, 2012
Even when people think that they are on the same path with you, it doesn’t mean that they are. There are many variations. Don’t assume that because something is right for you, that it is right for others. Just because someone is making plans for you, you must still find how to do what is right for you within that. There is no one size fits all. There are times that you will be able to join activities and there are other times that you must follow your own path.
People will come and go in your lives. There are some people in your lives you might feel are there for your whole existence but it is like a play where they come and go in the script. They are not with you at all moments. Some people are only there for a walk on role. Some you keep close to you but if you are honest it is not right for any of you. Just because you are related to someone doesn’t mean that they are with you for your whole life. Just because someone is a friend doesn’t mean that they are with you for your whole life. All people that you know will come and go as they need to. There is no need for alarm or concern. Your world is changing and what you were brought up with is not the case of how all must be.
You are witnessing great changes in society and the way the world is. The rules you believe are not necessarily so. You must be aware of this and open for the new to come through. You are witnessing miracles that no one else has been privy to before. Always check in and you will know what we mean. Don’t worry that things appear differently from what you have been taught. There is nothing wrong with this. Your inner workings know the truth. Your soul knows the truth. Arise to that truth. You are ready to break the molds.
Tuesday, January 3, 2012
One, stop watching anything with violence, murder, fighting. This energy only lowers your vibration. It is not entertainment. Know this. You have come to think of this as entertainment but it does not raise your vibration. It lowers it and to do your work, you must look to things that inspire you and raise your energy. Some of you think this is boring and that is fine. You are not ready for light work, if you are bored by peace and inspiration.
Two, stay away from those people who are not right for you. You are not making a judgment about them but only what is right for you. You will know that someone is not right from you by using your senses. Do you feel drained by them or feel sick around them? Do you feel a strong connection with them or repelled by them. Do you flinch when they call you? Are you excited when they call you? Pay attention to how you feel around individuals or groups. We have heard you say that you should be able to shield yourself around such people and be with everyone. That is not true. To do light work you must open and expand your energy. You cannot affectively do that around people who do not belong with you. To stop this, tune in before you say yes to anything. If you are supposed to be with someone or in a situation, you will feel good or okay about saying yes to it. The answers may come through other senses. We are just using the feeling sense as an example.
We have heard some of you say that you would rather be with the wrong people than just be open to the right people and spend time alone. However, if you want to be with the right people you can’t take up time with the wrong people. If you persist in this, you are also not ready for your real work. You also don’t have room for the right people and situations to show up.
We would prefer you being alone rather than allowing the wrong people into your lives. If you know something isn’t working stop doing it. There will be plenty of jobs and things for you to do. You open up your creativity by not putting energy into things that are not for you. Your lives will still have some conflicts and various situations because that is just within your learning. Even when you are with the right people there will be conflict because of your human natures. But you must make sure that whatever you involve yourself with is appropriate for you. Always check in and you will know what to do.
For those of you who need to have day jobs, you will still be able to have a day job and support yourself through that work without violating your energy. Ask for the counsel of your teams and you will be just fine. If we put you in a vacuum it is only until there is enough shifting so that you have a better variety of places to go and things to do.
Monday, January 2, 2012
The awakening begins. You are ushering in a period of adventure and change. You must awaken what is within. Take time each day to connect with what is within you. Take time to be who and what you are. In this time remove the labels foisted upon you. Awaken what is within your soul. Connect to your soul and the power within in and just be with that energy. Relearn who and what you are. Take a stand in your own life. Take back your power and reclaim your true self. Do this request with your intention. You will not be sorry for this piece. This is a place of power for you. You must awaken in order to be as you are meant to be for the next phase and next tasks that await you.
Sunday, January 1, 2012
Masters of the Light rejoice. We have assembled a mighty court for you. We gather in a new awakening. Arise brothers and sisters and be who you are truly meant to be. Stand in your power and never relinquish your true self for another. It is no longer for you to dim your light upon waking or sleeping. You are mighty light energies who have gathered here at this time to usher in a new era of peace, change and fortitude.
Our message to you today is simple. Be! That is right! Be your full selves. Stand in your own light and create from this place. As you radiate your light into the world, you will receive all that you require. You will be guided to where you truly belong and you will do as you are meant to do. The first step is to Be. Be true to your soul and your journey. Recreate what is in alignment. Stand tall in your power. If you find things are out of alignment, then you must ask for guidance on how to bring them back into alignment. When you are aligned all will show up as if by magic. It is difficult to create when you are not authentic or true to yourselves and your natures. |
package test.javafx.fxml;
/*
* Copyright (c) 2011, 2016, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation. Oracle designates this
* particular file as subject to the "Classpath" exception as provided
* by Oracle in the LICENSE file that accompanied this code.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/
import com.sun.javafx.fxml.FXMLLoaderHelper;
import org.junit.Test;
import java.io.IOException;
import java.util.concurrent.atomic.AtomicBoolean;
import javafx.fxml.FXMLLoader;
import javafx.fxml.LoadListener;
import static org.junit.Assert.*;
public class FXMLLoader_ScriptTest {
@Test
@SuppressWarnings("deprecation")
public void testStaticScriptLoad() throws IOException {
FXMLLoader fxmlLoader = new FXMLLoader(getClass().getResource("static_script_load.fxml"));
FXMLLoaderHelper.setStaticLoad(fxmlLoader, true);
AtomicBoolean scriptCalled = new AtomicBoolean();
AtomicBoolean scriptEndCalled = new AtomicBoolean();
fxmlLoader.setLoadListener(new LoadListener() {
@Override
public void readImportProcessingInstruction(String target) {
}
@Override
public void readLanguageProcessingInstruction(String language) {
}
@Override
public void readComment(String comment) {
}
@Override
public void beginInstanceDeclarationElement(Class<?> type) {
}
@Override
public void beginUnknownTypeElement(String name) {
}
@Override
public void beginIncludeElement() {
}
@Override
public void beginReferenceElement() {
}
@Override
public void beginCopyElement() {
}
@Override
public void beginRootElement() {
}
@Override
public void beginPropertyElement(String name, Class<?> sourceType) {
}
@Override
public void beginUnknownStaticPropertyElement(String name) {
}
@Override
public void beginScriptElement() {
assertFalse(scriptCalled.getAndSet(true));
}
@Override
public void beginDefineElement() {
}
@Override
public void readInternalAttribute(String name, String value) {
}
@Override
public void readPropertyAttribute(String name, Class<?> sourceType, String value) {
}
@Override
public void readUnknownStaticPropertyAttribute(String name, String value) {
}
@Override
public void readEventHandlerAttribute(String name, String value) {
}
@Override
public void endElement(Object value) {
if (value instanceof String && ((String) value).contains("doSomething")) {
assertTrue(scriptCalled.get());
assertFalse(scriptEndCalled.getAndSet(true));
}
}
});
fxmlLoader.load();
assertTrue(scriptCalled.get());
assertTrue(scriptEndCalled.get());
}
@Test
public void testScriptHandler() throws IOException {
FXMLLoader loader = new FXMLLoader(getClass().getResource("script_handler.fxml"));
loader.load();
Widget w = (Widget) loader.getNamespace().get("w");
assertNotNull(w);
loader.getNamespace().put("actionDone", new AtomicBoolean(false));
w.fire();
assertTrue(((AtomicBoolean) loader.getNamespace().get("actionDone")).get());
}
@Test
public void testExternalScriptHandler() throws IOException {
FXMLLoader loader = new FXMLLoader(getClass().getResource("script_handler_external.fxml"));
loader.load();
Widget w = (Widget) loader.getNamespace().get("w");
assertNotNull(w);
loader.getNamespace().put("actionDone", new AtomicBoolean(false));
w.fire();
assertTrue(((AtomicBoolean)loader.getNamespace().get("actionDone")).get());
}
}
|
The relationship between self-concept and selected academic and personal factors.
One-hundred sixty-five high school students were the subjects in a study to determine if selected personal and academic variables were predictive of self-concept scores. The full model was moderately predictive of self-esteem, accounting for approximately 46% of the variance of the criterion variable. Also, it was found that, as a subset of variables, both academic and personal variables made a significant, unique contribution to the prediction of self-concept scores. Of the eleven independent variables used in this study, it was noted that grade point average, extracurricular activities, health, and home life individually made a unique contribution to the prediction of self-concept scores. These four variables also were found to be significantly correlated with self-concept. Other independent variables found to be significantly correlated with self-concept were: parents married and parents divorced. However, these variables were not considered as making a unique contribution to the prediction of self-concept. |
A Prospective Six Sigma Quality Improvement Trial to Optimize Universal Screening for Genetic Syndrome Among Patients With Young-Onset Colorectal Cancer.
Improving the quality of health care is a national priority, and providing patient-centered care is one of the 6 key areas for quality improvement. In the setting of patients with young-onset colorectal cancer (CRC), appropriate genetic workup and testing for potential underlying inherited CRC syndromes is fundamental to patient-centered care. Lynch syndrome (LS) is the most common of these inherited syndromes, and current recommendations from the NCCN and other professional societies advocate universal screening for LS among young patients with CRC. However, practical implementation of these guidelines often falls short. We conducted a prospective quality improvement intervention trial to optimize universal screening for LS in young (age <50 years) patients, involving 356 eligible patients during the 12-month preintervention period and 299 patients during the postintervention. Applying the Six Sigma conceptual framework, we demonstrated a significant increase in use of tumor-based molecular testing and subsequent confirmatory germline mutation testing for LS. This led to identification of more patients to be managed as having LS and of more first- and second-degree relatives to benefit from the testing results. This study demonstrated the successful application of a quality improvement conceptual framework for the universal adoption of molecular biomarker testing in patients with cancer, and for improving adherence to NCCN Clinical Practice Guidelines in Oncology for CRC Screening. As molecular and genetic testing is becoming increasingly common, we present a prototype study for improving the adoption of molecular studies and the provision of guideline-based patient-centered care. |
[Two methods for transrectal ultrasound-guided biopsy of the prostate: systematic vs. guided for suspect echogenic lesion].
We undertook this study to determine the efficiency of ultrasound-guided transrectal prostate biopsy applying two techniques: systematic extended vs. suspicious sonographic areas. Medical files and histopathological reports were reviewed of patients who were treated at the Specialties Hospital of the 21st Century Medical National Center in Mexico City with suspicion of prostate cancer (T1, T2 and PSA <10 ng/ml). Patients had ultrasound-guided transrectal prostate biopsy applying two techniques: systematic extended vs. hypoechoic suspicious sonographic areas. Studies were carried out from January 1, 2005 to July 2006. Of 145 selected patients submitted to ultrasound-guided transrectal prostate biopsy, systematic extended biopsy (group I) was carried out in 73 (50.3%), taking on average 11.75 cylinders per patient. In 72 (49.6%) patients, biopsies were taken on suspicious sonographic areas (group II), taking on average 4.02 cylinders. In group I, 36 (49.3%) patients were positive vs. group II, where 20 (27.7%) patients were positive (p <0.01) with an estimation of risk in favor of group I, determining a probability 2.5 times higher of positivity with this technique (95% confidence interval: range 1.2-5) and a better performance in 22%. Systematic extended ultrasound-guided transrectal prostate biopsy represents a technique with a higher rate of efficiency than using ultrasound-guided transrectal prostate biopsy in suspicious sonographic areas and has proven over time to be the superior prostate biopsy technique for diagnosis of prostate cancer. It must be considered the method of choice. |
A Scientology Blog dedicated to informing people about the evils of the "Church" of Scientology. This made up "Religion" is actually a dangerous cult created by L Ron Hubbard and Xenu the Galactic Overlord. Ruined lives. Lost fortunes. Federal crimes, and even death -- Welcome to the "Church" of Scientology.
Scientology Videos
Loading...
Monday, December 26, 2005
Tigger wrote:
Well, I shall repeat...
You have picked the wrong target.
Remember what happened when Kevin Cosner's movie was made the target.......
Targeting the movie may and in all probability will, result in Tom Cruise making a bigger profit.
IMO, if you are going to boycott, i should be BOYCOTTTOMCRUISE.(whatever) and list the reasons why, which should not not be "beliefs" but "actions", including using his celebrity power to force movie directors and workers to tour Scientology centers and tents, attacking Brooke Shields and psychiatry, giving donations in the names of others WITHOUT THIER PERMISSION to COs, etc. and the "actions"/crimes of COS, which are numerous.
Tigger
There, I did this in last 10 minutes............ I threw up some good stuff J. Swift said and quoted him on it and coppied a page from scientomogy.info and what Glen said. I also gave him credit.
I got REAL work to do now........ no more scientology stuff for a few, it's not paying the bills-
I Hope everyone is enjoying their holidays!!
Dodge and that scieno Private Investigator, Russell Andrews that tried to get me fired from my job aren't calling me back I was just wishing them a Merry Christmas and a Happy New year! I don't think they like me, I could be wrong though. Maybe their christmas present to me just hasn't gotten here yet. You know how snail mail is. |
Waikiki Beach Studio apartment lies not far from Japanese Cultural Center of Hawaii and features ironing service and shopping service. Key features of the apartment include a lift and a cash machine.
The city center is 4 km away. It is within easy reach of Ala Wai Canal and Waikiki War Memorial Natatorium. It takes about 5 minutes' walk to reach Ruffage Natural Foods and Hy's Steak House .
This property is just a short stroll from T Galleria by DFS.
A local bus stop is 400 meters away.
Rooms
The venue offers rooms with individual climate control, a private safe, LCD TV, iron and ironing board and a private toilet. This apartment invites guests to 1 bedrooms. 1 bathrooms with a bathtub and a shower along with a hairdryer, guest toiletries and bath sheets are provided.
Eat & Drink
It offers a kitchen with a microwave, an electric kettle, a fridge, a stove and glassware. |
Navigation using a personal mobile device (such as a “smart” cell-phone) is commonplace, and mostly makes use of satellite based global positioning systems (e.g. GPS).
While navigation (i.e., finding one's way from the current position to a desired destination) was the “raison d′etre” for positioning technology, the capability of determining and sharing the positions of object, and in particular one's self-position spawned a myriad of other applications and services, such as Surveying and Mapping, Location Based Services (LBS) and advertisement, Social Network applications, people and vehicle tracking, etc. All this has made positioning technology very popular, and it is installed in all modern mobile devices.
Satellite GPS technology is very attractive because the vast majority of GPS receivers are relatively simple and low cost, and the required satellite signal is globally available, without the need for any additional hardware or infrastructure installation. However—it becomes useless in areas where the receivers cannot “see the sky”, or are otherwise deprived of adequate satellite signal.
Indoor shopping malls, airport terminals, trade show and exhibition venues, museums—these are just some of the venues where position based applications can be extremely useful, but where GPS technology cannot work, and one has to look for other technologies that can do the task. Existing indoor positioning technologies are mostly based on radio signals, such as WiFi, which also happens to be available in most modern mobile devices. However, these technologies lack adequate precision, or require costly hardware infrastructure installation and maintenance throughout the area where positioning is desired. |
Introduction
============
Platypnea-orthodeoxia is a relatively uncommon but striking clinical syndrome characterized by dyspnea and deoxygenation accompanying a change to a sitting or standing posture from a recumbent position. It was first reported in 1949 when Burchell *et al*. \[[@B1]\] described a patient with an atrial septal defect manifesting platypnea-orthodeoxia and subsequently described the reversal of both following closure of a patent foramen ovale. \'Platypnea\' and \'orthodeoxia\' were not used to describe the manifestations of this syndrome until they became commonly accepted terms in 1969 and 1976, respectively \[[@B2],[@B3]\]. Since then, a few cases have been reported with interatrial communications being the most common etiologic associations \[[@B4]-[@B6]\]. The precise mechanisms for both platypnea and orthodeoxia are unknown. In several isolated case reports, speculation over mechanisms is often geared to whatever special features were found in the patient been reported. We present a case of a patient with severe platypnea and orthodeoxia infected with two opportunistic pathogens and with no evidence of intracardiac or intrapulmonary shunt.
Case presentation
-----------------
A 75-year-old Caucasian woman was admitted to our hospital with febrile illness accompanied by dyspnea without other specific symptoms, such as cough or sputum. She was normotensive, and her heart sounds were normal with bibasal lung crepitations. An electrocardiogram demonstrated sinus rhythm with a normal axis and oxygen saturation in room air was 75%. Platypnea and orthodeoxia were major features of her illness. When supine on 35% oxygen by face mask, arterial blood gas measurements yielded persistent hypoxemia (pO~2~: 70 mmHg, pCO~2~: 30 mmHg) with counterbalanced metabolic acidosis (HCO~3~: 18 mmol/l, pH 7.44). However, in the upright position, she developed severe hypoxemia (pO~2~: 40 mmHg). Biochemical tests showed renal failure (urea: 100 mg/dl, creatinine: 2 mg/dl, hematocrit (Hct): 30%), increased lactate dehydrogenase (LDH) levels (600 U/L) and increased markers of inflammation (erythrocyte sedimentation rate (ESR): 100 mm, CRP: \>100 mg/dl), while a chest X-ray showed a few bilateral diffuse interstitial infiltrates, predominantly in the lower lobes.
Five months before admission, oliguric acute renal failure was detected and kidney biopsy revealed rapidly progressive glomerulonephritis with 100% crescents compatible with Wegener\'s disease or nodular polyarteritis. She was initially treated with sessions of renal dialysis and plasmapheresis combined with pulses of methylprednisolone. Afterwards, the treatment switched to oral methylprednisolone at 48 mg/day combined with oral cyclophosphamide at 100 mg/day for 2 months with progressive lessening of the doses. Cyclophosphamide was finally withdrawn due to severe side effects (leucopenia). During the last trimester, she was in good condition under treatment with 16 mg/day of methylprednisolone.
She was initially treated with empirical antibiotic treatment and underwent computed tomographic (CT) scanning which showed patchy areas of ground-glass opacity (Figure [1](#F1){ref-type="fig"}). With the suspicion of *Pneumocystis jiroveci*pneumonia and despite a negative test for HIV, fiberoptic bronchoscopy and bronchoalveolar lavage (BAL) were performed. Immunostaining of the specimens was positive for *P. jiroveci*and several cysts were microscopically visualized. Thus, the treatment was changed to high-dose intravenous co-trimoxazole and prednisolone.
{#F1}
Although she became afebrile, the clinical presentation deteriorated with excessive platypnea coupled with orthodeoxia. Sitting up was associated with a fall in her oxygen saturation of up to 67% under oxygen administration. As there was no evidence of liver disease or hepatopulmonary syndrome, a transthoracic echocardiogram was performed. Intravenously administered normal saline was not detected in the left atrium after two or six cardiac circles excluding the presence of intracardiac or intrapulmonary shunts. Due to the respiratory distress, a pulmonary angiogram was not performed. A new CT scan revealed further deterioration consisting of organized consolidations with air bronchogram at the lung bases and air in the mediastinum (Figure [2](#F2){ref-type="fig"}). On day 15, she was intubated and admitted to the intensive care unit. At the same time, BAL examination was positive for cytomegalovirus (CMV) through polymerase chain reaction (PCR) (23,000 copies/ml). Intravenous ganciclovir (5 mg/kg, twice a day) was added to the treatment. Despite the appropriate treatment, she died on day 25.
{#F2}
Discussion
==========
Platypnea (increased dyspnea in the erect position relieved by assuming a recumbent position) and orthodeoxia (accentuated hypoxemia in the erect position, improved by assuming a recumbent position) were the patient\'s more striking symptoms. Only one case of this syndrome associated with *Pneumocystis carinii*pneumonia (the old term now replaced by *jiroveci*) has been previously reported \[[@B7]\]. However, to the best of our knowledge, the association of this syndrome with pulmonary infection by two opportunistic pathogens, including *P. jiroveci*, has not been reported.
The etiologic background of this syndrome includes intracardiac shunts, anatomic pulmonary vascular and pulmonary parenchymal shunts, with interatrial communications being the most common etiologic association, but the precise mechanisms are not known \[[@B5],[@B8],[@B9]\]. Other diseases associated with platypnea-orthodeoxia include chronic obstructive pulmonary disease (COPD) \[[@B10]\], constrictive pericarditis \[[@B11]\], pneumonectomy \[[@B12]\], paradoxical embolism \[[@B13]\] and even acute organophosphorus poisoning \[[@B14]\].
In our patient, *P. jiroveci*and CMV were detected in BAL specimens using reliable methods (immunostaining/microscopic visualization and PCR, respectively) in an immunosuppressed patient. The radiological findings were not diagnostic as both of the above pathogens present with similar findings. It has been noted that coinfection with CMV and other pathogens will be detected in more than half of *Pneumocystis*-infected patients \[[@B15]\] and thus the major pathogen is not easily defined. As we found no other common pathogens and our patient continued to deteriorate despite the appropriate treatment for *P. jiroveci*pneumonia, we believe that CMV was responsible for the fatal deterioration.
Our patient had no history or evidence of COPD or chronic liver disease (for example, cirrhosis). As platypnea and orthodeoxia were major features of her illness, further investigation focused on the detection of probable intracardiac or intrapulmonary shunts using contrast echocardiography, a widely accepted and non-invasive method \[[@B16]\]. No evidence of such disorders was found, so these symptoms probably arose as a result of significant areas of low or zero V/Q ratio. Indeed, a CT scan indicated that the lung bases were predominantly affected. Gravity might increase intrapulmonary blood flow shunting through poorly ventilated lung bases exacerbating dyspnea and deoxygenation in the upright position. The same explanation has been proposed by other authors for similar cases \[[@B5],[@B7]\].
Whether specific pathogens such as *P. jiroveci*and/or CMV or severe V/Q mismatching of any etiology are responsible for the emergence of this syndrome remains to be clarified.
Conclusion
==========
Platypnea-orthodeoxia is a rare and usually underestimated syndrome. Intracardiac shunts and particularly, interatrial communications with or without overt lung disease as well as anatomic pulmonary vascular shunts are the most common etiologic associations. However, if detailed examination reveals no obvious intracardiac or intrapulmonary shunting combined with extensive pulmonary lesions, such as severe pneumonia even due to opportunistic pathogens, then severe V/Q mismatching should be considered as the probable explanation.
Abbreviations
=============
BAL: bronchoalveolar lavage; COPD: chronic obstructive pulmonary disease; CMV: cytomegalovirus; CRP: C-reactive protein; ESR: erythrocyte sedimentation rate; Hct: hematocrit; LDH: lactate dehydrogenase; PCR: polymerase chain reaction; V/Q: ventilation/perfusion.
Consent
=======
Written informed consent was obtained from the patient for publication of this case report and accompanying images. A copy of the written consent is available for review by the Editor-in-Chief of this journal
Competing interests
===================
The authors declare that they have no competing interests.
Authors\' contributions
=======================
KK was the main author and carried out the pulmonary investigation of the case. IM carried out the nephrological investigation of the case. AV carried out vasculitis diagnosis and management of the case. CB carried out the respiratory failure diagnosis and management. TK is the corresponding author and was responsible for manuscript preparation and the pulmonary investigation of the case. PV carried out the renal failure diagnosis and management of the case.
|
China's bike-share app Ofo raises $850 mil to expand overseas
Chinese bike-sharing start-up Ofo says it has raised around $850 million from investors including e-commerce giant Alibaba, to finance its overseas expansion while it battles rivals in China.
Ofo, whose lemon-yellow bicycles are ubiquitous in Chinese cities, said on the social network Weibo that it had raised $866 million.
The consortium of investors was led by Alibaba, China's top online shopping conglomerate which also contributed to the $700 million raised by Ofo in July 2017.
The latest cash injection will allow Ofo to expand its overseas presence. The company has already made inroads into France, Japan and the U.S., and says it is operational in around 20 countries.
It is also fighting to increase its market share in China, where it is competing against its local rival Mobike -- backed by another Chinese internet giant, Tencent.
The bulk of China's vast and rapidly growing bike-sharing market is shared between the two companies, which compete with each other by offering subsidies and extremely low fares.
Mobike, Ofo and others are tapping into the sharing economy ethic behind Airbnb and ride-hailing apps such as Uber, and targeting China's 700 million mobile phone users, who increasingly use their smartphone for transactions.
The bikes are unlocked using an app and cost as little as one yuan (15 cents) an hour.
Not everyone is happy with the service, though, which allows bikes to be left anywhere. Careless users often park the bicycles haphazardly on footpaths and roads. |
We are pleased to announce the very first TOXIKK Community Cup on the 15th of January. Make sure to sign up for the first tournament and compete against other players.
Ever miss the pre-Modern Warfare days of FPS, back when chaos was the rule in online slaughter houses such as Quake III and Unreal Tournament? TOXIKK is the game for you.
Forget the modern trappings of customizable loadouts, character classes, and cover systems. Put all your faith in your aiming reticle, forget about reloading, and pray for that well placed med-kit. TOXIKK is all about keeping it old-school.
The mission was to reinvigorate the FPS genre by taking it back to it's online deathmatch glory days, and TOXIKK delivers. Frantic action, mechanics that are quick to learn but difficult to master, and a commitment to staying true to the genre's roots have come together to create the best 1990's FPS released in 2016. Modern graphics and a PC-focused development deliver screaming fast pace and beautiful performance you expect from the FPS games of old, but without the ugly polygons only nostalgia glasses could see past.
A true example of the best aspects of modern gaming mixing with the values that made retro shooters great: skill based gameplay and an even playing field. You won't win based on a exploitative build, your DLC, or some character class. Only skill separates the winners from the fragged. Forget your console gamepad, TOXIKK is utilized for the Mouse and Keyboard crowd. With new updates released frequently, full Steam Workshop integration, and an active community of players and developers, TOXIKK is just what the modern FPS genre needs: Old School Cool.
You can now test your TOXIKK skills online with ESL Community tournaments. Frag, or die trying, against some of the best players in Europe!
Feel free to join us in this great new journey by signing up for the first ever TOXIKK tournament on Sunday, January 15th!
TOXIKK Community Cup #1 Europe Sign up!
(Check-in: 15:30 - 15:45 CET)
Check-in is first come, first serve. Sign up until Sunday, 16:00 CET
Date: Sunday, 15th of January
Start: 16:00 CET
Size: Unlimited
Structure: TBA
Coverage: Brackets & Participants
Powered by Reakktor may be a self-financed indie studio, but every team member brings at least a decade of experience in professional game development to the table, is passionate about what he (or she) does and dedicated to delivering a high quality game experience.
Founded in 1991 by Martin Schwiezer, the team developed over a dozen of PC and online games like e.g. Neocron (the world’s first cyberpunk MMORPG and also the first MMO to merge real-time FPS and RPG elements). TOXIKK – Old school cool meets new age polishEver miss the pre-Modern Warfare days of FPS, back when chaos was the rule in online slaughter houses such as Quake III and Unreal Tournament? TOXIKK is the game for you.Forget the modern trappings of customizable loadouts, character classes, and cover systems. Put all your faith in your aiming reticle, forget about reloading, and pray for that well placed med-kit. TOXIKK is all about keeping it old-school.The mission was to reinvigorate the FPS genre by taking it back to it's online deathmatch glory days, and TOXIKK delivers. Frantic action, mechanics that are quick to learn but difficult to master, and a commitment to staying true to the genre's roots have come together to create the best 1990's FPS released in 2016. Modern graphics and a PC-focused development deliver screaming fast pace and beautiful performance you expect from the FPS games of old, but without the ugly polygons only nostalgia glasses could see past.A true example of the best aspects of modern gaming mixing with the values that made retro shooters great: skill based gameplay and an even playing field. You won't win based on a exploitative build, your DLC, or some character class. Only skill separates the winners from the fragged. Forget your console gamepad, TOXIKK is utilized for the Mouse and Keyboard crowd. With new updates released frequently, full Steam Workshop integration, and an active community of players and developers, TOXIKK is just what the modern FPS genre needs: Old School Cool.You can now test your TOXIKK skills online with ESL Community tournaments. Frag, or die trying, against some of the best players in Europe!Feel free to join us in this great new journey by signing up for the first ever TOXIKK tournament on Sunday, January 15th! Sims , Wednesday, 04/01/17 06:56 |
FILE PHOTO: The logo of Swiss drugmaker Novartis is seen outside the company's offices in Athens, Greece, February 6, 2018. REUTERS/Costas Baltas
(Reuters) - The U.S. Food and Drug Administration on Friday approved Novartis AG’s combination therapy to treat an aggressive type of thyroid cancer.
The therapy, which uses Novartis’ Tafinlar and Mekinist, was approved to treat anaplastic thyroid cancer that cannot be removed surgically or has spread to other parts of the body, and has a type of abnormal gene known as BRAF V600E.
This is the first FDA-approved treatment for patients with this form of thyroid cancer and the third type of cancer with this specific gene mutation, the FDA said
The company has been expanding the use of this drug for other diseases as well. In combination, Tafinlar and Mekinist are approved for use to treat a type of lung cancer that has the BRAF V600E gene.
The FDA had last month approved the combination to treat a type of melanoma. |
Q:
Given a polynomial system, determine a simple set containing all its solutions
Suppose we have a system of complex polynomials $f = (f_1, \ldots, f_n)$, where each $f_i$ can be viewed as a function $\mathbb{C}^n \to \mathbb{C}$. The solutions of $f$ are the points $x \in \mathbb{C}^n$ such that $f(x) = 0$.
There are results bounding the magnitude of the zeros of univariate polynomials. One result for instance is given here. With this result we know that all zeros of a univariate polynomial $p$ are inside a complex disk or radius $R$ centered at the origin. The value $R$ can be determined using only the coefficients of $p$.
In the title, by simple set I mean a set like the above, which is a disk. What I mean by simple is a set which is determined explicitly by the coefficients of the $f_i$'s and has some simple determining rule. I'm looking for a way to know where the solutions are in advance. Sharp results are welcome.
I know there are some results relating this systems with Newton polyhedra, but I only saw results about counting solutions. If there is a connection between Newton polyhedra and the location of the solutions I would be glad to know. If anyone know some relevant article or book please share it here so I can read it.
Thank you very much.
A:
One large area of research which addresses questions of this type is related to
the Lee-Yang theorem, which gives a sufficient condition in terms of coefficients
for zeros of a polynomial to lie in the complement of the unit polydisk. Closely related questions
are about zeros lying in the complement of $\{ z:\Re z_j>0,\,1\leq j\leq n\}$.
References:
E. Lieb and A. Sokal, A General Lee-Yang Theorem for One-Component and
Multicomponent Ferromagnets, Commun. Math. Phys. 80, 153-179 (1981).
D. Ruelle, Is our mathematics natural? The case of equilibrium statistical mechanics. Bull. Amer. Math. Soc. (N.S.) 19 (1988), no. 1, 259–268.
J. Borcea, P. Brändén,
Multivariate Pólya-Schur classification problems in the Weyl algebra,
Proc. Lond. Math. Soc. (3) 101 (2010), no. 1, 73–104.
|
President's Page - April 2003
The Leading Edge
We all move forward on their wings
It might have been that time when your uncle flew his 172 to town for Thanksgiving and let you take the yoke as you flew over your house.
It might have been that spring afternoon you spent sitting in the field watching the returning mallards and Canada geese set their wings…twist and turn and work the wind…then drop, soft as feathers, onto the farm pond.
Maybe it was that Saturday the Little League game was rained out, and you spent the morning watching Those Magnificent Men in Their Flying Machines on television.
No one can say for sure where dreams of flying are conceived. They are as distinct and varied as the people who hold them, and they are as old as history itself.
From the days of the first pilots, there have been those who have dreamed of being the best pilots. Those who have strived to excel in piloting have benefited all of us. By pushing themselves and their machines to the edge of their respective performance envelopes and back again, they have led us to improved aircraft designs, safer flying practices, and lifesaving recovery techniques.
This leading edge form of piloting has evolved into the international sport of competitive aerobatics—a sport that pays continuous dividends to aviation’s growth, progress, and safety for all of us. It is the mission of the United States Aerobatic Foundation (USAF) to raise the required funding for the flying teams that represent our nation in international competition. Quite frankly, the foundation needs all of our help. This year, for only the third time in history, the World Aerobatic Championships will be held in the United States. It is a time of both celebration and challenges for aviation. This year we celebrate the centennial anniversary of the invention of powered flight. It was December 17, 1903, when Wilbur and Orville Wright turned their dreams into the gift of wings to the world. At the same time, it is a time of challenge: The security issues raised by September 11, the tragic loss of the space shuttle Columbia, and the economic issues facing the transportation and aerospace industries have fostered a climate of uncertainty and, in some cases, discouragement about aviation’s future.
Help us deliver a positive message on aviation’s behalf by supporting the U.S. Aerobatic Teams as they host the world in 2003!
The United States is exactly where the message should emanate from. Powered flight was invented here. We’ve trained more pilots in the United States than all of the other nations on earth combined. Pick a category of aircraft development and production— commercial, military, general, experimental— and for 100 years, America has led the world. We are the only nation to leave a human footprint on another celestial body. From June 25 to July 4, 2003, the world will be watching the skies above Lakeland, Florida. The skies will be filled with those living—and flying—their dreams. We need to give the U.S. team every possible opportunity to be victorious.
In our nation, the support of the U.S. Aerobatic Team is not a story of government or large corporation spon- 3 By pushing themselves and their machines to the edge of their respective performance envelopes and back again, they have led us to improved aircraft designs, safer flying practices, and lifesaving recovery techniques. sorship. It is a story that has been written contest by contest, competitor by competitor, and individual donor by individual donor. Each year, USAF must undertake the raising of needed funds in an effort to keep America’s teams competitive on the world stage. The challenges, and the opportunity, have never been greater in our history.
There is an immediate need to raise $100,000. Unlike many of the countries our teams will compete against, there is no system in our country that allows our pilots to devote themselves full time to their aerobatic training. Each U.S. competitor must supply his or her own world-class aerobatic airplane and invest limitless hours in punishing practice and physical training in order to win qualifying spots on the team. All that the team members receive and all that they ask is the chance to represent their country—to follow their dreams of being the best of the best.
No one can say for sure where dreams of flying are conceived. But we do know that where dreams are nurtured and supported, we all move forward on their wings. The IAC’s job is to create the atmosphere for pilots to learn the art of aerobatics. Of those who learn through our building block system, we select the best. The United States Aerobatic Foundation is an autonomous organization working in concert with the IAC to raise funds for our best—the U.S. team. Along with one paid administrative staff person, they are made up of hard working and generous volunteers. Please consider whatever you can as soon as you can to help this year’s team to victory, and come on down to Lakeland to cheer them on. Thanks, and fly safely! |
Archives
Follow us on Twitter
Category: J Thermophys Heat Transfer
A physics journal has retracted a 2014 paper after a reader discovered a slew of errors.
The paper, published in the Journal of Thermophysics and Heat Transfer, explored how the properties of nanofluids—fluids that contain nanoparticles—change as the fluid moves through different materials.
According to the editor-in-chief, Greg Naterer, an outside expert—Asterios Pantokratoras, based at Democritus University of Thrace in Greece—contacted the journal in May 2017 after discovering “errors with symbols in equations and figures.” The journal investigated the concerns and reached out to the paper’s corresponding author V. Ramachandra Prasad at Madanapalle Institute of Technology and Science in India for a response; after several rounds of comments from Pantokratoras and Prasad, the journal concluded that the paper should be retracted. |
The Z1 Dashboard software allows you to easily customize the display to suit your style. This customization is done using
the Settings Dialog, accessible by clicking the Settings Icon
while not connected to a sim, or by selecting 'Settings' from the menu when not in the car. Note that each instance of the
Z1 Dashboard software can have different settings. Changing settings for a particular instance only effects that instance.
The settings dialog contains several tabs with specific settings under each one. This page describes the Strategy tab.
Strategy Tab
The Z1 Dashboard helps you with many strategy aspects of your race. For example, when you are approaching your pit stop the
track map dashboards will start to display a highlighted snake on the map. This snake shows you approximately where you will
rejoin the track after your stop. This can be used to help you determine when to make your stop. In addition the cars near
you will be highlighted at this point and remain highlighted until after you and they have pitted. This is because during pit
stops you are sometimes racing cars that are not near you on the track. Having the cars that you are racing highlighted allows
you to see them easily regardless of where they are on the track.
Laps To Stop:
This allows you to specify when the snake are car highlighting should start. If you set this to 3, then when you get down
to 3 laps of fuel remaining the track maps will start to display the snake and highlighted cars. Note that you can also
assign a button to toggle this highlighting as well, so that you can have it on whenever you like.
Pit Stop Time:
This is the time it takes for you to pit. The Auto settings will let the Z1 calculate the time of the pit stop. This is done
using several criteria including the average of previous stops, pit speed limits and pit lane length. If you set this to a
specific time, then the Z1 will always use that time for all pit stops.
Display Range:
When set to Yes the highlighted snake will be displayed on the track map to represent your approximate location after
your pit stop. When set to No the old style 'After Stop' square will be displayed instead. Note that if there is not
enough pit stop data to generate a highlighted snake, then even if set to Yes the old style 'After Stop' square will
be displayed.
Range Width:
This is the width of the pit stop snake highlight on the track maps. It is recommended to make the snake slightly wider
than the track map width.
Show 'After Stop':
Setting this to Yes will display the text 'After Stop' near the highlighted pit stop snake. Setting this to No will
turn off that text display, leaving just the highlighted snake.
After Stop Color:
This is the color used to render the After Stop Text, and the snake overlay. Click the swatch to display a color chooser so you can
customize the color.
After Stop Size:
This is the font size used to render the After Stop text.
Stops In Race:
This is the number of stops you plan to make in the race. You need to manually set this for each race to make sure it is correct.
This is very important in timed races. The Z1 does not know how many stops you plan to make if you do not tell it. Every pit stop
you make reduces the amount of time you are on track. This reduction in time means that during a timed race you will do fewer laps,
resulting in needing less fuel. If you plan to make one stop but this option is set to zero stops then the Z1 may over-estimate
the amount of fuel you need to finish the race. It is therefore highly advised to make sure this is set correctly for timed races.
# of stop effect time race length:
If you set this to Yes then the Z1 will use the number of stops you plan to make when calculating the number of laps you have left
to run in a timed race. This in turn will effect the amount of fuel you need to finish the race. It is recommended that you use
this option in conjunction with the simulated race option to determine what works best for you.
Tracked Color:
This is the color used to highlight the cars that are near you when they are being tracked during the pit stop window.
Tracked Cars:
When set to Yes cars near you will be tracked during pit stop windows. When set to No they will not be tracked.
Tracked Delta:
This is the maximum number of seconds a competitor can be either ahead or behind you in order for them to be tracked.
PL Speed Based:
This determines how the Z1 will determine the current pit lane speed limit. By default it will always try to get that information
from the sim. If you select 'Always on entered limit' then the Z1 will use the speed limit you enter regardless of what the sim reports.
Pit Lane Speed:
This is the pit lane speed limit in either KPH or MPH that the Z1 will use if the sim does not report a pit lane speed limit or if you
specify the Z1 should ignore any reported limit from the sim in favor of this number.
Simulated Race:
This determine if the Z1 will run a simulated race once you get in the car. You can choose to have a simulated race start when you get
in the car or when you press a button. Once started the simulated race will continue for the designated number of laps or minutes. All
features of the Z1 will act as if you are in a race during this time. This is an excellent way to practice your race, check for the
best strategy, and confirm the amount of fuel needed at a stop. |
The collection of leaves is traditionally achieved using rakes, blowers or other handheld items. In certain environments that are replete with leaves, the use of handheld items to gather leaves renders the collection process burdensomely time-consuming and laborious.
Accordingly, lawn mowers and other similar types of motorized lawn equipment, such as mulchers, chippers and vacuums, are often utilized to assist in the collection of leaves. Specifically, by advancing the lawn mower over the desired area, the mower blade shreds, or mulches, the leaves and discharges the resultant debris into a designated collection bag, or bin, in communication with the mower.
Although the use of traditional lawn mowers has been found to facilitate the collection of leaves, the limited size of the designated collection bag requires frequently unloading of debris retained therein, particularly in environments that are heavily covered with leaves. This frequent unloading of the retained matter renders the entire collection process significantly more time-consuming and highly disruptive.
Accordingly, it is known in the art for oversized leaf collection bags to be used in place of the limited sized collection bag, or bin, typically designated for use with a particular piece of motorized lawn equipment, such as mowers. Due to the enlarged size of the collection bag, the leaves can be collected without stopping frequently to empty collected matter.
For example, in U.S. Pat. No. 6,546,710 to D. DeHart, the disclosure of which is incorporated herein by reference, there is provided a grass and leaf catcher for use with a riding mower that is in the form of a large bag of flexible material having a generally conical shape. The bag has an opening around its first end and another at the second end. The opening at the first end is generally circular, with a drawstring to facilitate attachment around the discharge tube and hood of the mower. A cleat in proximity to the opening allows for securing the drawstring. The opening at the second end is likewise secured by a drawstring and cleat combination, or by a hook-and-loop fastener. A mesh area in the surface of the bag relieves the pressure within the bag caused by the entry of air forced up the discharge tube by the action of the cutter blades of the mower.
Oversized collection bags of the type as described above are most commonly connected to a typical riding mower by mounting the enlarged opening of the bag directly over the hood on the rear of the mower that is ordinarily provided to support the plastic collection bin, the bin being removed in this situation so as not to interfere with the bag. The remainder of the bag is thus disposed to drag behind the mower on the lawn surface.
Oversized collection bags of the type as described above have been found to suffer from a pair of notable drawbacks.
As a first drawback, oversized collection bags of the type as described above are generally incapable of being mounted onto a riding mower that does not include the plastic collection bin accessory. As a result, a user who did not originally purchase the mower with the collection bin must subsequently purchase the plastic collection bin accessory, typically at a substantial cost. Otherwise, the user is precluded from using the collection bag with the mower.
As a second drawback, oversized collection bags of the type as described above are designed to drag behind the mower on the ground surface, which is often roughened with presence of rocks, gravel and the like. As a result, it has been found that collection bags often wear prematurely or become punctured or damaged as a result of the direct frictional contact against the ground surface.
Adapters are known in the art to assist in the connection of oversized collection bags to conventional riding lawn mowers that do not include a rear collection bin. These types of adapters are typically connected directly to the blade deck on the underside of the riding lawn mower, rather than to fixed structures. n the rear of the mower. Although useful, these types of adapters have been found to suffer from a plurality of notable drawbacks.
As a first drawback, adapters for connecting an oversized collection bag to the blade deck of a conventional riding mower are typically constructed out of a relatively rigid material for durability purposes. As a result of their rigid construction, these types of adapters are incapable of universal usage. Rather, each adapter is typically designed for use with a single style of mower, thereby necessitating the manufacture of a uniquely dimensioned adapter for each of the large variety of different mowers currently on the market.
As a second drawback, adapters for connecting an oversized collection bag to the blade deck of a conventional riding mower are not only difficult to install but also require the attachment of additional support structures (e.g., an auxiliary support) to the mower deck.
As a third drawback, adapters for connecting an oversized collection bag to the blade deck of a conventional riding mower typically include a plurality of components, many of which are substantial in size. As a result, the packaging for these types of adapters is relatively large, which not only introduces display and storage issues at the point-of-sale but also substantially increases shipping costs, which is highly undesirable. |
Homemade Ricotta Recipe
Real ricotta cheese is made by reheating the whey left over from cheesemaking. Most of us at home don't have easy access to a large supply of whey, but we can use milk and an acid like white vinegar to make a remarkably similar cheese that looks, tastes, and behaves almost exactly like true ricotta. The keys to getting it right lie in using the right amount of acid, heating the milk to the right temperature, and holding it there long enough for a ricotta-like flavor to develop.
Why It Works
Heating the milk to between 175°F and 185°F (79 and 85°C) will produce a light and tender curd, without requiring a large dose of acid.
Using the minimum acid necessary for a decent yield, and absolutely no more than that, ensures the ricotta tastes milky and sweet, not sour.
Holding the curds at a high temperature for about 20 minutes allows a more true ricotta flavor to develop.
Ingredients
Directions
1.
Fill a pot with the milk. Stir in salt, if using. Heat over medium heat until milk registers 185°F (85°C) on an instant-read thermometer. Add vinegar or lemon juice and stir briefly to incorporate. Curds should begin forming almost immediately; stop stirring as soon as they've formed throughout the pot.
2.
Without stirring, continue to hold curdled-milk mixture at 185°F for 20 minutes. It's okay if the temperature fluctuates down to 175°F (79°C) or up to 190°F (88°C), but try to keep it in that zone for the full 20 minutes.
3.
Line a fine-mesh strainer with paper towels or cheesecloth. Using a slotted spoon, transfer curds to strainer and let stand until excess liquid has drained away. Exactly how long to let it drain depends on whether you want a moister final product or a drier one. Do not try to pour all the milky liquid through the strainer, as this will clog it and prevent the liquid from flowing through.
4.
Drained ricotta can be refrigerated, covered, for up to 2 days, though it is best when freshly made.
Special Equipment
Notes
This recipe can be scaled up or down as desired. You can use pasteurized milk, homogenized milk, and/or cream-line milk, but do not use ultra-pasteurized milk, as it will not work. Distilled white vinegar creates the most neutral flavor, while lemon juice adds just a touch of lemony flavor; that can be good in some applications (like, say, if you're dolloping the ricotta onto pancakes), but may not be desirable in others. I prefer not to add salt, since the ricotta can always be seasoned later, but feel free to add a pinch if you like.
Daniel cooked for years in some of New York's top American, Italian and French restaurants - starting at the age of 13, when he began staging at the legendary restaurant Chanterelle. He spent nearly a year working on organic farms in Europe, where he harvested almonds and Padron peppers in Spain, shepherded a flock of more than 200 sheep in Italy, and made charcuterie in France. When not working on, thinking about, cooking and eating food, he blows off steam (and calories) as an instructor of capoeira, the Afro-Brazilian martial art.
PREVIEW YOUR COMMENT
HTML Hints
Comment Guidelines
Post whatever you want, just keep it seriously about eats, seriously. We reserve the right to delete off-topic or inflammatory comments. Learn more in the Comment Policy section of our Terms of Use page. |
Q:
Обернуть блок в ссылку , которая находиться в этом блоке
Есть множество блоков данной конструкции:
<div class="thumbnail boxed-content">
<div class="col-sm-12 col-md-12"></div>
<div class="col-sm-12 col-md-12">
<h3 class="item-title text-danger center-block">
<a title="DP2K-6E" href="/some.html">asdasd</a>
</h3>
</div>
</div>
Как обернуть каждый в ссылку и поставить атрибут href такой, который находиться внутри этого блока.
Делал так, но что-то пошло не так:
$('.thumbnail.boxed-content').wrap("<a href=$('this .col-sm-12:nth-child(2) h3 a').href></a>");
A:
var $blocks = $('.thumbnail.boxed-content');
var $hrefs = $('.thumbnail.boxed-content a');
$blocks.wrap(function(){
var $element = $(this);
var href = $element.find('a').attr('href');
return "<a href="+href+"></a>"
})
<script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script>
<div class="thumbnail boxed-content">
<div class="col-sm-12 col-md-12"></div>
<div class="col-sm-12 col-md-12">
<h3 class="item-title text-danger center-block">
<a title="DP2K-6E" href="/some1.html">first block</a>
</h3>
</div>
</div>
<div class="thumbnail boxed-content">
<div class="col-sm-12 col-md-12"></div>
<div class="col-sm-12 col-md-12">
<h3 class="item-title text-danger center-block">
<a title="DP2K-6E" href="/some2.html">second block</a>
</h3>
</div>
</div>
|
Wednesday, December 16, 2009
Decades
My decades coincide with the calendar decades, minus two weeks. Happy Birthday to me as I turn 60 today. Reflecting on the decades, I came up with one word for each. These words are not all-encompassing but capture the general focus of how my life evolved.
20s was my decade for education30s was my decade for career40s was my decade for family50s was my decade for community
Riverview Flowers
About Me
This is my third revision of "About Me" since I started this blog. Perhaps that is all you need to know about me, that I am constantly exploring new paths. At the beginning of 2012, I am chair of the St. Joseph River Watershed Initiative, a rain garden consultant for the City of Fort Wayne, owner of a cut flower business, and a marketing freelancer. My sons are 22 years old and I am a grandmother. We are selling the home we lived in for 25 years and building a home at The Highlands. Hopefully, I will be writing about my chickens and bees at this time next year. |
Apple Call Options Are Almost Free
Apple (AAPL) continues to be the most talked-about stock, not because shares are eclipsing new highs but because of the 30% drop that shares have experienced in the past several months. The decline has been so rapid that some value-seeking investors are buying or making a long case for owning the stock.
The most recent headline pertains to the hedge-fund manager David Einhorn suggesting that Apple issue a high-yield preferred stock security that would mathematically serve to increase the value of the common stock. Einhorn's hedge fund, Greenlight Capital, has been an Apple shareholder for a few years now.
The value investing adage is that price is what you pay, but value is what you get. Apple shares are trading for $480 a share. With each share comes over $100 per share in cash and investments. Despite concerns that Apple's growth rate and margins are facing pressure, nearly 5 billion people in the world are still without smartphones. If Apple captures even 20% of that market, that's a lot more iPhones to sell. And over time, I believe that tablet computing, specifically the iPad, will continue to juice sales and profits.
More so, Apple requires no excess cash to run its business. That means that Apple could theoretically pay out a special dividend of $50 or $100 per share and not have to worry for a second about its cash needs. This is, of course, why Einhorn is going front and center with his idea of a high-yield preferred stock issuance.
So Apple shares have a lot of interesting upside optionalities that are attracting more and more value-seeking investors today. The market, in my view, appears to be getting inflated. At the same time, one of biggest cash-generating companies has seen shares fall 30%. Dare I say that if the market were to experience a healthy pullback, Apple would outperform? It's a lot less risky to own Apple at $480 than at $700.
But why pay $480 for the common shares when you can get the options for free? No, not free in the common sense of the word, but in the financial sense. The Apple January 2014 $300 calls can be bought for around $182, or a time premium of $2, less than 40 basis points of Apple's underlying stock price -- basically nothing in option pricing. So instead of coughing up $480 a share, you can get the same exposure and virtually the identical risk for $182, or 38% of the stock price. If Apple shares were to drop to $300 a share, you would lose the same dollar amount as if you had bought the common at $480.
As a minuscule bonus, if the market gets Apple fever again and shares become more volatile and advance, you may pick up a few bonus percentage points, as volatility theoretically would increase the price of an option. For an additional 1% or so, you can draw out your bet to January 2015, not a bad idea at all, given the quality of Apple as a business and as a cash-flow generator.
Nothing prevents Apple shares from falling further, but since it has such a strong balance sheet and business franchise, many investors who have tons of cash and who are sitting on the sidelines get an instant opportunity to put that cash to work. With so many favorable upside options, it's not a bad idea to bet on Apple via an option. |
If her bet won’t, Grace Ibuna says she’ll run for Ignacio Arroyo’s seat
02:23 AM March 25th, 2012
March 25th, 2012 02:23 AM
BACOLOD CITY—Businesswoman Grace Ibuna may run for the House seat that was vacated with the death of her long time partner, Rep. Ignacio “Iggy” Arroyo, who passed away on Jan. 26.
Ibuna, after her well publicized fight with Arroyo’s estranged wife over the funeral arrangements for the late congressman, said she would throw her hat into the congressional ring in a special election on June 2 if her candidate, Binalbagan Mayor Alejandro Mirasol, decided not to run.
“I don’t want to run but if it’s my destiny and my calling, I’ll abide by it. I am only for the welfare of the people of the fifth district who showed so much love for Iggy—that will never leave my heart,” said Ibuna, a registered voter in Hacienda Grande Robles, La Castellana, Negros Occidental.
ADVERTISEMENT
Mirasol of the United Negros Alliance is widely seen as the Aquino administration’s candidate for the special elections. UNA is currently chaired by Gov. Alfredo Maranon Jr.
Mirasol’s possible rival in the alliance is his nephew, Board Member Emilio Yulo III, who has announced his plan to run for the vacant congressional seat.
The fifth district is composed of Himamaylan City and the towns of Binalbagan, Hinigaran, Isabela, La Castellana and Moises Padilla.
Aside from Mirasol, another reported UNA aspirant for the congressional seat is Board Member Melvin Ibañez.
The Parish Pastoral Council for Responsible Voting (PPCRV), however, urged Congress to cancel the special poll and just wait for the regular midterm elections in 2013.
In a statement, the PPCRV said the special election for the replacement of Iggy Arroyo scheduled in June would be a “total waste” of public funds because it comes less than a year before the regular midterm elections. The special poll would cost the public around P30 million, the poll watchdog said.
The PPCRV also noted that the filing of the certificates of candidacy for the 2013 elections would take place from Oct. 1 to Oct. 5, or “barely four months” after the scheduled special elections.
“It is highly unconscionable, impractical and senseless to hold elections for the position left vacant by the death of Rep. Iggy Arroyo. The PPCRV sees no public good or service for such special elections.”
“The position, power and other perks that go with a congressional seat could just be used to promote the campaign of the one elected. A total waste,” the group said.
The PPCRV also pointed out that the ban on public works projects will begin in February 2013 “so that whoever wins in the June 2 special election cannot implement or even contract for any public works project that will benefit his or her constituents.” Philip C. Tubeza |
o = 1/55 - 12/55. Is o > a?
False
Let t = -38 - -38.1. Let l = -96 + 188. Let r = l + -462/5. Which is smaller: r or t?
r
Let i be -28 + (-2 + -1 - -1). Let j = 59/2 + i. Which is bigger: 0.2 or j?
0.2
Let i = 6 + -3. Let t(u) = u**3 - 7*u**2 + 7*u - 5. Let c be t(6). Let r = i - c. Is 3 at least r?
True
Suppose -2*p - 11 = -3*p + 3*z, 3*z = 3*p - 21. Let n = -5 + p. Which is smaller: n or -2/9?
-2/9
Let d(b) = -b**2 + b - 1. Let h be d(0). Let r be (3 - (-441)/(-146)) + 0. Let v = r + -417/1022. Which is bigger: h or v?
v
Let p(i) = i**3 + 4*i**2 + i + 5. Let l = -5 - -8. Suppose -10 - 2 = l*x. Let q be p(x). Which is smaller: q or 3/7?
3/7
Let n be (4/2)/(4/6). Suppose 0*j - 5*j + n*h = -9, -j - 2*h = 6. Let q = -746/5 + 150. Is q at most j?
False
Let h = -3/2879 - 4795/924159. Is 1 > h?
True
Let w(b) = -b + 1. Let p be w(5). Let n = p - -3. Let m = -44/203 - 2/29. Is n != m?
True
Suppose -3*h = -5*h - r - 15, 3*h = -3*r - 24. Which is greater: -1 or h?
-1
Let v(b) = -b**3 + 14*b**2 + 3. Let j be v(14). Let h = 11 + -7. Suppose p = j*p + h. Is -3 equal to p?
False
Let v be 1/(2 - 11/5). Let h be (-2)/(-10) - (-1)/v. Let y be (0/(-1))/(1 - h). Is -1/4 at least as big as y?
False
Let g = -2 - 0. Let y be (-9)/g + 9/(-6). Let d(u) = -u**2 + 6*u - 4. Let j be d(4). Which is smaller: y or j?
y
Suppose a + 3*j = -5, 2*a - j + 10 = -7. Is -6 smaller than a?
False
Suppose -3*a + 8 - 2 = 0. Which is smaller: a or 0?
0
Let x be 4*(24/(-51))/2. Is 0 smaller than x?
False
Let t(c) = c**3 + c**2 - c + 5. Let p = 16 - 16. Let w be t(p). Is 5 less than w?
False
Let r(i) = -i**3 - 10*i**2 + 15*i - 7. Let v be r(-11). Let s = v - -355/7. Suppose -2*n - 3 = n. Do s and n have the same value?
False
Suppose -4*n - 5 = -v + 2*v, 0 = 2*v + 10. Do n and 3 have the same value?
False
Let d = 34 + -29. Is d <= 4?
False
Suppose 5*m = 13 + 7. Suppose 2*r - 3*a = -m*a + 7, 2*a = 3*r. Let p be 4/(-14) + (-46)/(-14). Which is smaller: r or p?
r
Let m be ((-3)/(-9))/((-2)/12). Let w be ((1 - m)/(-3))/(-1). Is 2 equal to w?
False
Suppose 5*d + 0*b = 3*b, 5*b = 0. Which is smaller: 1 or d?
d
Let j = 22 + -61. Is j > -39?
False
Let a be (-8)/(-164)*(-6)/(-8). Let p = 1139/246 + a. Which is greater: 5 or p?
5
Suppose 0 = 2*r - 6*r - 4. Let c be (1192/290)/(-4) - -1. Let w = c - 407/1015. Which is smaller: r or w?
r
Suppose r - 5*r + 2 = -w, 3*w - 11 = -5*r. Is 1 equal to r?
True
Let u = -2.8 - -3. Let k = 39 - 39.2. Let z = k + u. Do 0 and z have different values?
False
Let u(d) = -8*d + 34. Let x be u(11). Which is greater: x or 0?
0
Let f(u) = -u. Let y be f(-5). Suppose y*h - h = 3*l + 14, -4*l = 4*h. Suppose -9 = -4*z - 0*g + g, 4*z = -5*g + 3. Do z and h have the same value?
True
Let f = 1.5 + 12.5. Let v = 1 + -1. Which is bigger: f or v?
f
Let a(n) = -n**2 - 5*n + 1. Let c be a(-5). Let o = 3 - c. Suppose -v = v + o. Do 4/9 and v have different values?
True
Let k = -49 + 23. Let s = k + 20. Is -8 less than s?
True
Let j = -0.2 + 17.2. Let q be 14/(-6) - (5 - 17)/6. Which is bigger: j or q?
j
Let w(u) = -u**3 + 8*u**2 + u - 10. Let y be w(8). Let b be (3/y)/(54/24). Which is bigger: -2 or b?
b
Let c = 39 - 45.4. Let a = -6 - c. Let k = 1.6 + a. Are k and -1/4 non-equal?
True
Let u(q) = -q**3 - 10*q**2 + 10*q - 9. Let m be u(-11). Suppose m*i + 9 = 3*i - j, 4*i + 4 = -4*j. Are i and 4 equal?
True
Let n be 2414/(-11) + (-1 - -3). Let p = n + 4678/55. Let b = 132 + p. Does b = 1?
False
Let o be (-34)/(-84) - (-1)/(-3). Which is smaller: 1 or o?
o
Suppose -2 = h + m - 8, -5*h + m + 24 = 0. Let p = 4 - h. Let j be 8 - (-1 - p - -3). Is 5 < j?
False
Let m = 11 + -3. Suppose -2*w + 4*o = -32, -2*w + 2*o + 38 - m = 0. Let h be 4/w + 4/(-14). Is h <= 2/9?
True
Let i(o) = -o + 2. Let c be i(5). Let p(q) = q**3 + 3*q**2 + 2*q + 4. Let l be p(-3). Which is bigger: c or l?
l
Let r = -1.1 - -1.12. Let j be 1/3*(1 + 0). Is j at least r?
True
Let p(d) = d**2 - 2. Let x be p(-2). Let b be 2 + -1 + -4 + 3. Which is bigger: b or x?
x
Suppose 0 = 2*c + 2*a + 12, -2*a = 3 + 7. Suppose -3*j + 27 = 3*x, 5*j + 3*x = j + 38. Is j smaller than c?
False
Let t = 176 - 1235/7. Is -4 less than t?
True
Let z = -405/4 - -102. Let a(g) = -g - 5. Suppose 6 + 14 = -4*s. Let m be a(s). Is m not equal to z?
True
Let y = -59 - -49. Let g = 0 + -10. Is y >= g?
True
Let r(q) = q**2 + 6*q + 10. Let z be r(-4). Suppose 2*j + z + 0 = 0. Which is smaller: j or 1/11?
j
Let j = 67 + -67. Let p be (-3 + -1 + 2)/7. Which is bigger: p or j?
j
Let i be (-12)/(5 + -4) + 4. Let t be -4*(2 - (-2)/(-8)). Are i and t equal?
False
Let i = -2.31 + 0.31. Let v(d) = 2*d**3 - 4*d**2 + 1 - d**3 - d + 4. Let k be v(4). Which is smaller: k or i?
i
Let u = -4/563 - -1506/53485. Which is smaller: u or 0?
0
Let d be (-6)/(-21) + (-218)/812. Let c = 235/174 - d. Let w(i) = -i**3 + 2. Let j be w(0). Which is smaller: c or j?
c
Let f = -80/9 - -9. Let s = -28 + 28. Which is bigger: f or s?
f
Let h be 20/72*(-21)/(-10). Let i = 25/12 - h. Is i greater than or equal to 1?
True
Let l(w) be the third derivative of w**5/30 - w**4/6 + w**2. Let y be l(3). Let s be (7/(-84))/((-2)/y). Which is bigger: s or -0.1?
s
Let h(x) = 4*x + 25. Let c be h(12). Which is greater: c or 74?
74
Suppose 0 = 4*g - 10 + 2. Let n(r) = r - 2. Let a be n(5). Which is greater: g or a?
a
Let h be 63/(-35)*80/(-6). Which is smaller: h or 22?
22
Let s = -0.35 + 1.35. Let a = 1.86 - -0.24. Let q = a + -2. Which is smaller: s or q?
q
Let c(g) = g - 6. Suppose -5*y + 25 = -5. Let q be c(y). Let w = 0.2 - 0. Which is greater: w or q?
w
Suppose 5*p = -h - 21, 1 = 8*h - 5*h - p. Which is bigger: -2/117 or h?
-2/117
Let s = -55/259 + -8/37. Which is greater: s or 4?
4
Let i = -20 + -1. Do i and -21 have different values?
False
Let k be ((-3)/(-2))/((-9)/12). Let c be k/19*3/(-6). Which is smaller: c or -1?
-1
Let l(w) = w**3 + 6*w**2 + 4*w + 3. Let o be l(-5). Suppose -h + o = 7. Suppose 2*u = -3*u. Do u and h have different values?
True
Let f be 1*-1 + 1/(-1). Let a(k) = k**3 + 4*k**2 + 2*k - 1. Let p be a(-3). Let t(w) = w**3 - 2*w**2 - 2*w + 3. Let y be t(p). Which is greater: y or f?
y
Let n = 2 - 2. Suppose -5*q + n*q = -55. Suppose x + a - 1 = 2, 3*x = -4*a + q. Is 1 less than x?
False
Let u be (-5)/(-60)*22/2. Let s = 1/4 - u. Is s greater than -2/3?
False
Suppose 0*z - 30 = 3*z. Which is greater: -17/2 or z?
-17/2
Let x(c) = 2*c - 5. Let f be x(5). Let b = 17 + -10. Which is smaller: b or f?
f
Suppose -5*q - z = 4*z + 165, -4*q = z + 132. Which is smaller: 0 or q?
q
Let q = -22 - -23.02. Let f = q - 0.02. Suppose 0 = -5*j + 10 - 5. Is f greater than or equal to j?
True
Suppose -27*q - 114 = -28*q. Is 113 greater than or equal to q?
False
Let d(v) = 2*v + 7. Let h be d(-3). Let u be (h/5)/((-4)/10). Which is smaller: -12 or u?
-12
Let b = -5.1 + 6. Let h = -2.9 + b. Which is bigger: h or -0.1?
-0.1
Let b be (-2)/(-8) - 5/8. Suppose -p - 3 + 0 = 3*u, -2*u + 4*p + 12 = 0. Suppose -3*x = -4*l + 5, -3*x - l + u*l = -5. Which is bigger: x or b?
x
Let f = -455/8 + 57. Which is smaller: 1 or f?
f
Suppose -4 - 8 = -3*d, 5*y + 2*d - 43 = 0. Suppose -m + y = -1. Suppose -4*a = 5*o - 3*o - m, 16 = -5*a + 4*o. Which is smaller: -1 or a?
-1
Let a be (0 - (24 + -1))/(3 + -2). Is -23 at least as big as a?
True
Let v be 2 + -3 - (0 + -3). Suppose 2*s - s + v*r = -10, -2*s + r + 5 = 0. Let m be ((-2)/(-8))/(10/8). Is m less than or equal to s?
False
Let o = 8 - 5. Let a = -1 - 4. Let d = o + a. Which is greater: d or 0?
0
Let l = 15 + -13.9. Let o = l + -1. Is o < -5?
False
Let n(i) = i**2 + 11*i + 7. Suppose k + 4*t = 3*t - 9, -5*k - 3*t - 45 = 0. Let r be n(k). Do r and -11 have different values?
False
Suppose -3*z + 8 = -1, 4*w + 4*z = -8. Suppose a = 4*a + 2*b + 82, a = 2*b - 30. Let k be (-1)/a - 8/28. Which is greater: w or k?
k
Let a = 0.9 + -0.92. Let h = a - -1.02. Which is smaller: -0.3 or h?
-0.3
Suppose 72 = 5*g + o - 4*o, 1 = o. Suppose -4*d + 4 = -3*d, -4*d - 4 = -5*u. Suppose g = -u*j - 5*z, -3*j = -4*j + 4*z + 12. Which is bigger: -3/4 or j?
j
Let g = 23 - 12.5. Let d = 9 - g. Let m = d + 0.5. Which is greater: m or -1/3?
-1/3
Let l = -24620 - -171998/7. Let a(o) = o**3 - 7*o**2 - 8*o + 7. Let u be a(7). Let c = u - l. Are c and 0 equal?
False
Let k = -0.1 + 1.1. L |
{
"name": "TP-Link WDR4300",
"author": "fofa",
"version": "0.1.0",
"matches": [
{
"search": "headers",
"text": "TP-Link WDR4300"
}
]
} |
MassLandlords recently spoke with a commercial lender about the Greater Boston rental real estate market. The lender requested not to be named because their bank needs to review public statements, which would take so long as to render this article untimely. We have tried to convey the essential information here. Any errors or omissions are our own. Check with your preferred bank for alternative viewpoints.
Historically low interest rates are at an end. Prices remain high.
Rents Peaking
From 2012 to 2015, we saw what may in hindsight be considered “peak growth” in rent rates, 6%/yr. Now in late 2018 we’re seeing 2 to 3% per year, and in some cases rents are stagnating. In Greater Boston, there’s a lot of Class A real estate with amenities, a doorman, etc. Concessions are needed to make these higher rents compare well in the market.
Boston is certainly unique: there’s a big supply on the market but there’s a lot of pent-up demand, so there’s great absorption at the moment. It’s like a renaissance of development and new housing. Rents overall are still very strong. As of yet there’s no sign of slackening.
Inside the “128 Beltway” is considered a safer lending area because rents remain strong through cycles.
Hot areas in Greater Boston are Quincy (a phenomenal area, great value recently), Chelsea (so close to downtown), Revere, and Everett, especially pending the new casino. Chelsea is the next East Boston.
Purchase Prices High Despite Rising Rates
On the acquisition front, we’re at an impasse. Rates have been so low for so long that values have skyrocketed in real estate compared to other asset classes. Interest rates should be driving prices down from 2015, but overall the higher interest rates are also driving higher expected cap rates. Despite rates having gone up 300 basis points in the last three years, sellers are not coming down any in price.
Acquisitions have therefore really stalled. This will be obvious if you have been in the market comparing rent levels to asking prices. It’s hard to find properties that will cash flow or meet desired returns.
Refinance Now?
The 2006 and 2007 pre-collapse mortgages all came to maturity in 2016 and 2017. Many commercial borrowers refinanced early in 2014 and 2015. This “wall of maturities” in 2015 was probably the peak of the refinance cycle. The last three years may have been an unnoticed correction from a banker’s point of view.
No one knows where rates will go long-term. We can and do set expectations for the next 12 to 18 months. In that timeframe, it’s all but certain that rates will rise. So if your mortgage is coming due in the next 1 to 2 years, think about refinancing now.
Note that banks are in a lot better position now than they were in 2007. They can no longer do risky loans. For risky loans, there are other lending sources besides traditional banks. The banks themselves are sitting on strong portfolios. There are not many great deals out there, so a well-prepared commercial borrower can get a lot of attention.
There have been eight rate increases since normalization began in 2015, after 8 years of no rate increases. There’s another increase expected in the December timeframe. In 2019 another three increases are expected.
If your rents have increased, your property value may have increased appreciably in a lender’s eyes. Even with tighter lending standards, you may be well positioned to lock in a low rate and take cash out for renovation or acquisition.
The advice is to look at your portfolios, your rates, and which mortgages are coming due. Remember that in 2007, rates were 6%. Plan ahead and refinance earlier if it makes sense.
Thank you very much for this blog.Here there is lot of information for the beginners. This will helps me a lot to increase our market in real estate field. Keep on writing and share your knowledge for the beginners. |
debridement (di-BREED-ment, day-) noun
Surgical removal of dead, infected tissue or foreign matter from a wound.
[From French debridement, from debrider (to unbridle), from Middle French
desbrider (de- + brider).]
"Voluminous clinical studies also indicate that hypnosis can reduce the
acute pain experienced by patients undergoing burn-wound debridement,
children enduring bone marrow aspirations and women in labor."
Michael R Nash, The Truth And the Hype of Hypnosis, Scientific American
(New York), Jul 2001.
Here is a pop-quiz: how many light-years does it take for an astronomer to
change a light bulb? Answer, of course, is none. She knows a light-year is
a unit of distance, not time. The red-herring word `year' in this term tries
to mislead us. This week brings together words whose meaning is not the first
thing that comes to mind. -Anu
............................................................................
Be master of your petty annoyances and conserve your energies for the big,
worthwhile things. It isn't the mountain ahead that wears you out - it's
the grain of sand in your shoe. -Robert Service, writer (1874-1958)
This is a reader-supported publication. If you'd like to contribute, visit
http://wordsmith.org/awad/friends.html . Send your comments about words
(or anything else) to anu@wordsmith.org. To unsubscribe, subscribe, or to
change address, visit http://wordsmith.org/awad/subscriber.html
Pronunciation:
http://wordsmith.org/words/debridement.wav
http://wordsmith.org/words/debridement.ram |
In case you missed it, there’s yet another United Nations climate conference in progress, this time in Doha Qatar. At the Associated Press, there is a story on a protest which organizers want to characterize as a “march for peace” by “a few hundred” climate activists demanding “climate justice.” The AP’s Karl Ritter warns readers that “Dangerous (global) warming effects could include flooding of coastal cities and island nations, disruptions to agriculture and drinking water, and the spread of diseases and the extinction of species” — even though there has been no net warming in 16 years. Another AP story suggest that “SOME WISH ISLAM WOULD INFORM CLIMATE DEBATE.” I’ll suggest that the referenced “some” includes a few AP and other journalists and almost no one else.
But there has been no room at the AP, as confirmed in a search on the world “climate” at the wire service’s website at 3:30 p.m. ET and a review of possibly relevant articles, for discussion or even recognition of a November 29 open letter sent by over 125 scientists “qualified in climate-related matters” who have informed U.N. Secretary-General Ban Ki-Moon that “there is no substantiation” for the so-called “science” undergirding the U.N. meeting’s agenda (produced in full after the jump; bold is in original):(more…)
Before getting to her letter, I want to personally thank Ms. Schmidt’s staff for their determined and compassionate involvement in a matter than was of utmost importance to our family. I am not able to discuss its details, but I can assure readers that her staff’s work was critical to its resolution, and I will never forget how well it was handled.
From departing Congresswoman Jean Schmidt, in the type of email I suspect most defeated congresspersons don’t even think about composing:
The two case workers in my office estimate that they have received a total of about 6,300 requests for constituent services since I came to Congress in 2005. That’s not counting the hundreds of questions that the case workers have answered each year for constituents without having to open case files.
Responding to the needs of the people who live in the seven counties that make up Ohio’s Second Congressional District has been one of my top priorities as your representative in Washington over the last 7½ years.
My current term will conclude January 3. My Hamilton County and Adams County offices are wrapping up several cases involving constituent services, but future requests for such help will be referred to the offices of Ohio’s two senators, Rob Portman and Sherrod Brown.
My staff has done an extraordinary job of navigating the federal bureaucracy on behalf of the thousands of people who have telephoned or written to request help over the years.
Some cases, such as requests to expedite passports or visas, can be handled in a few days or weeks. More complex matters, such as those involving immigration, can take six months to three years to resolve. “It can be frustrating at times, but it’s always rewarding,” one of my case workers said.
Many times, my office has been the last hope for people facing financial difficulties. Common issues have included delays by the Internal Revenue Service in processing tax refunds, or demands for additional paperwork to process the payment of Medicare bills. In one case, we helped a constituent get long-overdue Social Security benefits that totaled $68,000.
Other times, my office has helped veterans or their families obtain the medals earned years ago for military service. My office has also cut through red tape to help veterans or their widows obtain tens of thousands of dollars in overdue VA benefits. Other times, my office intervened to help resolve pay or retirement issues for active-duty members of the military.
My case workers also have helped constituents with claims involving thousands of dollars in compensation and medical benefits related to the Energy Employees Occupational Illness Compensation Program Act.
People who have waited on claims for months or even years have been amazed that something could be done to speed things up once a congressional office made a phone call or sent an email.
… I’ve gone to battle for farmers in Southern Ohio, opposing undue regulations and pushing for programs that ensure that our nation has the safest and most stable food supply in the world.
I’ve pushed for reforms for the food stamp program, but argued against drastic cuts that would force many Americans to go hungry. Child-nutrition issues have been a major concern of mine.
I also have championed many projects related to jobs and getting our economy back on track, including the lengthy fight to prod the administration of President Obama to support the USEC uranium-enrichment plant in Pike County.
The importance of constituent services is something I recognized long before becoming the first woman to represent Southern Ohio in Congress. Previously, I spent four years as a state representative in the Ohio House, and I was a Miami Township trustee in my native Clermont County for 11 years.
For each of those 22 years, it has been an honor and a privilege to serve you.
This column went up at PJ Media and was teased here at BizzyBlog on Thursday.
______________________________
Last week, just in time for the start of what yours truly and the vast majority of Americans call the “Christmas shopping season,” but which the press in virtual lockstep tags as the “holiday shopping season,” a policy analyst at a leftist think tank seriously proposed that all retailers voluntarily raise their employees’ minimum wage to $12.01 per hour, or $25,000 per year for those who work a forty-hour week year-round.
The study (“Retail’s Hidden Potential: How Raising Wages Would Benefit Workers, the Industry and the Overall Economy”; full PDF here) came from Demos, whose nice-sounding goal is to “make equality and democracy more than just ideals.” Though it is often characterized as “non-partisan,” it boasts of “a partnership” with the openly liberal but really far-left American Prospect. Catherine Ruetschlin, the study’s author, appears to have had some possibly scrubbed involvement with Occupy Wall Street, and to have been a leader of an unsuccessful 2008-2009 effort aimed at “ridding the New School from the tyranny of Bob Kerrey.” Kerrey, the former Democratic U.S. senator, headed that New York City university for a decade before leaving when his second five-year term ended in January 2011.
According to her Demos bio, Ruetschlin “is currently completing a PhD in Economics at The New School.” Before she receives that doctorate, she should be required to retake Econ 101, especially those pesky sections dealing with the profit motive and the law of supply and demand.
I won’t even attempt to list all of the weaknesses in the Demos study, as it would require at least a term paper to thoroughly expose them all. What I will address will more than suffice to discredit it.
In Ruetschlin’s alternative universe, if retailers raised all employees’ wages to at least $12 per hour, “the new floor would mean a 27 percent pay raise” on average for those earning below that threshold. Then, as if by magic, because of that increase and others granted to higher earners who would also demand to be paid more, “More than 700,000 Americans would be lifted out of poverty, and more than 1.5 million retail workers and their families would move up from in or near poverty.” Employing her trusty Keynesian stimulus calculator, she further projects that “As a result of the economic growth from a wage increase, employers would create 100,000 to 132,000 additional jobs.” And of course, the impact on retailers’ operations would be minimal, because “The cost of the wage increase amounts to $20.8 billion, or just 1 percent of the $2.17 trillion in total annual sales by large retailers.”
It is here that Ruetschlin’s most obvious slip shows. Instead of framing the increased costs of pervasive pay raises (some of which I believe she failed to consider, including payroll taxes, workers’ comp, and other wage-based costs) as a percentage of what retailers actually have available to absorb additional costs (i.e., before-tax profits or net cash flow, and certainly not sales), she goes into a completely irrelevant rant about how some of them are engaging in stock buybacks. It’s easy to see why she dissembles. A Deloitte LLP study (very large PDF) of retailers’ 2010 financial results revealed that eight of the world’s top ten retailers (the other two are privately held) achieved net profit margins of only 3.0 percent. That is their after-tax percentage; pre-tax, it’s at most 5 percent.
Thus, what Ruetschlin really wants is for retailers to do one of three things: voluntarily reduce their pre-tax profits by about 20 percent ($20.8 billion divided by roughly $108 billion in pretax profit), force these costs on to their customers, or extract an equivalent amount from their suppliers in the form of price breaks. And this is going to stimulate job growth?
No it won’t. Here are just a few of the more obvious effects, depending on whose ox gets gored.
If companies voluntarily take the hit and take no alternative actions, their share prices will plummet, as will their ability to pay dividends. They will be less able to raise capital for future expansion. This will affect not only the so-called “one percent” who own and preside over these firms. It will also strike at the rest of us who directly own shares in these companies or indirectly hold them through retirement-plan and other mutual fund investments.
But of course, companies, at least those wishing to survive, will take alternative actions. Some will place more emphasis on their highly automated online efforts. Other will freeze or contract their brick-and-mortar store count. Still others will reduce the floor space at their existing stores. Oh, and one other thing: An entirely government-driven trend which is already underway will accelerate at warp speed. Employers will become even more determined to keep employees from meeting ObamaCare’s new definition of “full-time employment,” holding as many of their current and new workers to 30 or fewer hours per week to avoid being fined for not covering them on their health insurance plans.
Companies which simply choose to pass on the increased costs to the public will become less competitive. They will lose customers, sales and market share, and will be forced to shrink their store count and workforce. Some will go out of business.
If suppliers are the ones who get beaten down, their profits and their shareholders will suffer, along with employees who will surely be hurt by some combination of layoffs due to increased automation and compensation cuts.
At the same time, a $12.01 minimum wage in retail would put enormous pressure on those in other lower-paying industries to pay more, forcing them to raise their prices and suffer the consequences of reduced consumer demand for their goods and services.
There is virtually no doubt that if Demos and Ruetschlin were ever to get what they want, the overall economy and total employment would shrink, not grow.
What Demos, Ruetschlin and their grim band of fellow radicals refuse to recognize is that employment is not some kind of entitlement. It is instead a mutual business agreement between a worker and his or her employer that the use of their services at a given price is a win-win for both parties. If you make the cost of the agreement too dear for either party, you won’t have an agreement. If you are able to force such agreements on the unwilling anyway, you will end up with fewer of them. In the current case, the result will be fewer jobs.
What I really fear is that leftist efforts such as these are the opening shots in what will become an all-out war on employment practices at companies throughout the land. Using dreck such as that produced by Demos as support, “greedy capitalists” will be blamed for the continued and virtually inevitable failure of the economic policies of the Obama administration. And if these companies won’t do what they “should”? Why, the government will just have to take them over and run them “correctly.”
We’ve seen it happen time and again in other countries. I wish I could be confident that it can’t and won’t happen here.
z Pol-Party-Lobby Sites z
Unclassified
Comments
Comments are welcome, but are moderated.
Posting of comments is not immediate, and may take up to 24 hours.
Comment posting, as well as possible deletion, isat the sole discretion of BizzyBlog.
Allowing a comment to be posted does not constitute agreement with it, or endorsement of it.
-----------------------------
S.O.B. Alliance
SOB Alliance posts
Testimonials
"(ACORN) says it provide lots of services for poor people, but a recent NewsBusters post by Tom Blumer exposes the hollow facts behind the claims." |
SPORTS AUGUST 28, 2016
Mt. Pleasant Panther volleyball team went 4-1 to finish 2nd to Des Moines Lincoln at the Osceola Clarke tournament Saturday. Besides the host school, Bedford, Martensdale St. Mary’s, and Mt. Ayr joined MPHS and D.M. Lincoln.
Friday night the M.P. Panther football team fell to Clear Creek-Amana 23-8. Zach Beason threw a 55 yard TD pass to Jordon Magnani, and a 2 point conversion pass to Pat Canby. This Friday night M.P. goes to Mediapolis to play, Mepo lost to West Burlington-Notre Dame 14-12 in overtime. |
/*
* HID quirks support for Linux
*
* Copyright (c) 1999 Andreas Gal
* Copyright (c) 2000-2005 Vojtech Pavlik <vojtech@suse.cz>
* Copyright (c) 2005 Michael Haboustak <mike-@cinci.rr.com> for Concept2, Inc
* Copyright (c) 2006-2007 Jiri Kosina
* Copyright (c) 2007 Paul Walmsley
*/
/*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the Free
* Software Foundation; either version 2 of the License, or (at your option)
* any later version.
*/
#include <linux/hid.h>
#include <linux/export.h>
#include <linux/slab.h>
#include <linux/mutex.h>
#include "hid-ids.h"
/*
* Alphabetically sorted by vendor then product.
*/
static const struct hid_device_id hid_quirks[] = {
{ HID_USB_DEVICE(USB_VENDOR_ID_AASHIMA, USB_DEVICE_ID_AASHIMA_GAMEPAD), HID_QUIRK_BADPAD },
{ HID_USB_DEVICE(USB_VENDOR_ID_AASHIMA, USB_DEVICE_ID_AASHIMA_PREDATOR), HID_QUIRK_BADPAD },
{ HID_USB_DEVICE(USB_VENDOR_ID_AFATECH, USB_DEVICE_ID_AFATECH_AF9016), HID_QUIRK_FULLSPEED_INTERVAL },
{ HID_USB_DEVICE(USB_VENDOR_ID_AIREN, USB_DEVICE_ID_AIREN_SLIMPLUS), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_AKAI_09E8, USB_DEVICE_ID_AKAI_09E8_MIDIMIX), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_AKAI, USB_DEVICE_ID_AKAI_MPKMINI2), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_ALPS, USB_DEVICE_ID_IBM_GAMEPAD), HID_QUIRK_BADPAD },
{ HID_USB_DEVICE(USB_VENDOR_ID_AMI, USB_DEVICE_ID_AMI_VIRT_KEYBOARD_AND_MOUSE), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_ATEN, USB_DEVICE_ID_ATEN_2PORTKVM), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_ATEN, USB_DEVICE_ID_ATEN_4PORTKVMC), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_ATEN, USB_DEVICE_ID_ATEN_4PORTKVM), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_ATEN, USB_DEVICE_ID_ATEN_CS124U), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_ATEN, USB_DEVICE_ID_ATEN_CS1758), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_ATEN, USB_DEVICE_ID_ATEN_CS682), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_ATEN, USB_DEVICE_ID_ATEN_CS692), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_ATEN, USB_DEVICE_ID_ATEN_UC100KM), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_CHICONY, USB_DEVICE_ID_CHICONY_MULTI_TOUCH), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_CHICONY, USB_DEVICE_ID_CHICONY_PIXART_USB_OPTICAL_MOUSE), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_CHICONY, USB_DEVICE_ID_CHICONY_WIRELESS), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_CHIC, USB_DEVICE_ID_CHIC_GAMEPAD), HID_QUIRK_BADPAD },
{ HID_USB_DEVICE(USB_VENDOR_ID_CH, USB_DEVICE_ID_CH_3AXIS_5BUTTON_STICK), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_CH, USB_DEVICE_ID_CH_AXIS_295), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_CH, USB_DEVICE_ID_CH_COMBATSTICK), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_CH, USB_DEVICE_ID_CH_FIGHTERSTICK), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_CH, USB_DEVICE_ID_CH_FLIGHT_SIM_ECLIPSE_YOKE), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_CH, USB_DEVICE_ID_CH_FLIGHT_SIM_YOKE), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_CH, USB_DEVICE_ID_CH_PRO_PEDALS), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_CH, USB_DEVICE_ID_CH_PRO_THROTTLE), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_K65RGB), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_K65RGB_RAPIDFIRE), HID_QUIRK_NO_INIT_REPORTS | HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_K70RGB), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_K70RGB_RAPIDFIRE), HID_QUIRK_NO_INIT_REPORTS | HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_K70R), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_K95RGB), HID_QUIRK_NO_INIT_REPORTS | HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_M65RGB), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_GLAIVE_RGB), HID_QUIRK_NO_INIT_REPORTS | HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_SCIMITAR_PRO_RGB), HID_QUIRK_NO_INIT_REPORTS | HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_STRAFE), HID_QUIRK_NO_INIT_REPORTS | HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_CREATIVELABS, USB_DEVICE_ID_CREATIVE_SB_OMNI_SURROUND_51), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_DELL, USB_DEVICE_ID_DELL_PIXART_USB_OPTICAL_MOUSE), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_DMI, USB_DEVICE_ID_DMI_ENC), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRACAL_RAPHNET, USB_DEVICE_ID_RAPHNET_2NES2SNES), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRACAL_RAPHNET, USB_DEVICE_ID_RAPHNET_4NES4SNES), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, USB_DEVICE_ID_DRAGONRISE_DOLPHINBAR), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, USB_DEVICE_ID_DRAGONRISE_GAMECUBE1), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, USB_DEVICE_ID_DRAGONRISE_PS3), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, USB_DEVICE_ID_DRAGONRISE_WIIU), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_DWAV, USB_DEVICE_ID_EGALAX_TOUCHCONTROLLER), HID_QUIRK_MULTI_INPUT | HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELAN, HID_ANY_ID), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELO, USB_DEVICE_ID_ELO_TS2700), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_EMS, USB_DEVICE_ID_EMS_TRIO_LINKER_PLUS_II), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_ETURBOTOUCH, USB_DEVICE_ID_ETURBOTOUCH_2968), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_ETURBOTOUCH, USB_DEVICE_ID_ETURBOTOUCH), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_FORMOSA, USB_DEVICE_ID_FORMOSA_IR_RECEIVER), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_FREESCALE, USB_DEVICE_ID_FREESCALE_MX28), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_FUTABA, USB_DEVICE_ID_LED_DISPLAY), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_GREENASIA, USB_DEVICE_ID_GREENASIA_DUAL_USB_JOYPAD), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_HAPP, USB_DEVICE_ID_UGCI_DRIVING), HID_QUIRK_BADPAD | HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_HAPP, USB_DEVICE_ID_UGCI_FIGHTING), HID_QUIRK_BADPAD | HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_HAPP, USB_DEVICE_ID_UGCI_FLYING), HID_QUIRK_BADPAD | HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_HOLTEK_ALT, USB_DEVICE_ID_HOLTEK_ALT_KEYBOARD_A096), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_HP, USB_PRODUCT_ID_HP_LOGITECH_OEM_USB_OPTICAL_MOUSE_0A4A), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_HP, USB_PRODUCT_ID_HP_LOGITECH_OEM_USB_OPTICAL_MOUSE_0B4A), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_HP, USB_PRODUCT_ID_HP_PIXART_OEM_USB_OPTICAL_MOUSE), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_HP, USB_PRODUCT_ID_HP_PIXART_OEM_USB_OPTICAL_MOUSE_094A), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_IDEACOM, USB_DEVICE_ID_IDEACOM_IDC6680), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_INNOMEDIA, USB_DEVICE_ID_INNEX_GENESIS_ATARI), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_EASYPEN_M610X), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_MOUSEPEN_I608X), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_MOUSEPEN_I608X_V2), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_PENSKETCH_M912), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_PIXART_USB_OPTICAL_MOUSE_ID2), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_C007), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_C077), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_KEYBOARD_G710_PLUS), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_MOUSE_C01A), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_MOUSE_C05A), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_MOUSE_C06A), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_MCS, USB_DEVICE_ID_MCS_GAMEPADBLOCK), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_MGE, USB_DEVICE_ID_MGE_UPS), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_POWER_COVER), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_SURFACE_PRO_2), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_TOUCH_COVER_2), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_TYPE_COVER_2), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_MOJO, USB_DEVICE_ID_RETRO_ADAPTER), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_MSI, USB_DEVICE_ID_MSI_GT683R_LED_PANEL), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_MULTIPLE_1781, USB_DEVICE_ID_RAPHNET_4NES4SNES_OLD), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_NATSU, USB_DEVICE_ID_NATSU_GAMEPAD), HID_QUIRK_BADPAD },
{ HID_USB_DEVICE(USB_VENDOR_ID_NEC, USB_DEVICE_ID_NEC_USB_GAME_PAD), HID_QUIRK_BADPAD },
{ HID_USB_DEVICE(USB_VENDOR_ID_NEXIO, USB_DEVICE_ID_NEXIO_MULTITOUCH_PTI0750), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_NEXTWINDOW, USB_DEVICE_ID_NEXTWINDOW_TOUCHSCREEN), HID_QUIRK_MULTI_INPUT},
{ HID_USB_DEVICE(USB_VENDOR_ID_NOVATEK, USB_DEVICE_ID_NOVATEK_MOUSE), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_DUOSENSE), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_PANTHERLORD, USB_DEVICE_ID_PANTHERLORD_TWIN_USB_JOYSTICK), HID_QUIRK_MULTI_INPUT | HID_QUIRK_SKIP_OUTPUT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_PENMOUNT, USB_DEVICE_ID_PENMOUNT_1610), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_PENMOUNT, USB_DEVICE_ID_PENMOUNT_1640), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_PI_ENGINEERING, USB_DEVICE_ID_PI_ENGINEERING_VEC_USB_FOOTPEDAL), HID_QUIRK_HIDINPUT_FORCE },
{ HID_USB_DEVICE(USB_VENDOR_ID_PIXART, USB_DEVICE_ID_PIXART_OPTICAL_TOUCH_SCREEN1), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_PIXART, USB_DEVICE_ID_PIXART_OPTICAL_TOUCH_SCREEN2), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_PIXART, USB_DEVICE_ID_PIXART_OPTICAL_TOUCH_SCREEN), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_PIXART, USB_DEVICE_ID_PIXART_USB_OPTICAL_MOUSE), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_PRIMAX, USB_DEVICE_ID_PRIMAX_MOUSE_4D22), HID_QUIRK_ALWAYS_POLL },
{ HID_USB_DEVICE(USB_VENDOR_ID_PRODIGE, USB_DEVICE_ID_PRODIGE_CORDLESS), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_QUANTA, USB_DEVICE_ID_QUANTA_OPTICAL_TOUCH_3001), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_QUANTA, USB_DEVICE_ID_QUANTA_OPTICAL_TOUCH_3003), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_QUANTA, USB_DEVICE_ID_QUANTA_OPTICAL_TOUCH_3008), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_REALTEK, USB_DEVICE_ID_REALTEK_READER), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_SAITEK, USB_DEVICE_ID_SAITEK_RUMBLEPAD), HID_QUIRK_BADPAD },
{ HID_USB_DEVICE(USB_VENDOR_ID_SEMICO, USB_DEVICE_ID_SEMICO_USB_KEYKOARD2), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_SEMICO, USB_DEVICE_ID_SEMICO_USB_KEYKOARD), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_SENNHEISER, USB_DEVICE_ID_SENNHEISER_BTD500USB), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_SIGMA_MICRO, USB_DEVICE_ID_SIGMA_MICRO_KEYBOARD), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_SIGMATEL, USB_DEVICE_ID_SIGMATEL_STMP3780), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_SIS_TOUCH, USB_DEVICE_ID_SIS1030_TOUCH), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_SIS_TOUCH, USB_DEVICE_ID_SIS817_TOUCH), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_SIS_TOUCH, USB_DEVICE_ID_SIS9200_TOUCH), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_SIS_TOUCH, USB_DEVICE_ID_SIS_TS), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_SUN, USB_DEVICE_ID_RARITAN_KVM_DONGLE), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYMBOL, USB_DEVICE_ID_SYMBOL_SCANNER_1), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYMBOL, USB_DEVICE_ID_SYMBOL_SCANNER_2), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_HD), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_LTS1), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_LTS2), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_QUAD_HD), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_TP_V103), HID_QUIRK_NO_INIT_REPORTS },
{ HID_USB_DEVICE(USB_VENDOR_ID_TOPMAX, USB_DEVICE_ID_TOPMAX_COBRAPAD), HID_QUIRK_BADPAD },
{ HID_USB_DEVICE(USB_VENDOR_ID_TOUCHPACK, USB_DEVICE_ID_TOUCHPACK_RTS), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_TPV, USB_DEVICE_ID_TPV_OPTICAL_TOUCHSCREEN_8882), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_TPV, USB_DEVICE_ID_TPV_OPTICAL_TOUCHSCREEN_8883), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_TURBOX, USB_DEVICE_ID_TURBOX_KEYBOARD), HID_QUIRK_NOGET },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_TABLET_KNA5), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_TABLET_TWA60), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_MEDIA_TABLET_10_6_INCH), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_MEDIA_TABLET_14_1_INCH), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_SIRIUS_BATTERY_FREE_TABLET), HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_WISEGROUP_LTD2, USB_DEVICE_ID_SMARTJOY_DUAL_PLUS), HID_QUIRK_NOGET | HID_QUIRK_MULTI_INPUT },
{ HID_USB_DEVICE(USB_VENDOR_ID_WISEGROUP, USB_DEVICE_ID_QUAD_USB_JOYPAD), HID_QUIRK_NOGET | HID_QUIRK_MULTI_INPUT },
{ 0 }
};
/*
* A list of devices for which there is a specialized driver on HID bus.
*
* Please note that for multitouch devices (driven by hid-multitouch driver),
* there is a proper autodetection and autoloading in place (based on presence
* of HID_DG_CONTACTID), so those devices don't need to be added to this list,
* as we are doing the right thing in hid_scan_usage().
*
* Autodetection for (USB) HID sensor hubs exists too. If a collection of type
* physical is found inside a usage page of type sensor, hid-sensor-hub will be
* used as a driver. See hid_scan_report().
*/
static const struct hid_device_id hid_have_special_driver[] = {
#if IS_ENABLED(CONFIG_HID_A4TECH)
{ HID_USB_DEVICE(USB_VENDOR_ID_A4TECH, USB_DEVICE_ID_A4TECH_WCP32PU) },
{ HID_USB_DEVICE(USB_VENDOR_ID_A4TECH, USB_DEVICE_ID_A4TECH_X5_005D) },
{ HID_USB_DEVICE(USB_VENDOR_ID_A4TECH, USB_DEVICE_ID_A4TECH_RP_649) },
#endif
#if IS_ENABLED(CONFIG_HID_ACCUTOUCH)
{ HID_USB_DEVICE(USB_VENDOR_ID_ELO, USB_DEVICE_ID_ELO_ACCUTOUCH_2216) },
#endif
#if IS_ENABLED(CONFIG_HID_ACRUX)
{ HID_USB_DEVICE(USB_VENDOR_ID_ACRUX, 0x0802) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ACRUX, 0xf705) },
#endif
#if IS_ENABLED(CONFIG_HID_ALPS)
{ HID_DEVICE(HID_BUS_ANY, HID_GROUP_ANY, USB_VENDOR_ID_ALPS_JP, HID_DEVICE_ID_ALPS_U1_DUAL) },
#endif
#if IS_ENABLED(CONFIG_HID_APPLE)
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_MIGHTYMOUSE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_FOUNTAIN_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_FOUNTAIN_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER3_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER3_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER3_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_MINI_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_MINI_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_MINI_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_HF_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_HF_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_HF_JIS) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_WIRELESS_ANSI) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_WIRELESS_ISO) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_WIRELESS_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING2_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING2_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING2_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING3_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING3_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING3_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4A_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4A_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4A_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5A_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5A_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5A_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_REVB_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_REVB_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_REVB_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6A_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6A_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6A_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7A_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7A_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7A_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING8_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING8_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING8_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING9_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING9_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING9_JIS) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_WIRELESS_2009_ANSI) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_WIRELESS_2009_ISO) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_WIRELESS_2009_JIS) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_WIRELESS_2011_ANSI) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_WIRELESS_2011_ISO) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_ALU_WIRELESS_2011_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_MAGIC_KEYBOARD_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_FOUNTAIN_TP_ONLY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER1_TP_ONLY) },
#endif
#if IS_ENABLED(CONFIG_HID_APPLEIR)
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_IRCONTROL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_IRCONTROL2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_IRCONTROL3) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_IRCONTROL4) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_IRCONTROL5) },
#endif
#if IS_ENABLED(CONFIG_HID_ASUS)
{ HID_I2C_DEVICE(USB_VENDOR_ID_ASUSTEK, USB_DEVICE_ID_ASUSTEK_I2C_KEYBOARD) },
{ HID_I2C_DEVICE(USB_VENDOR_ID_ASUSTEK, USB_DEVICE_ID_ASUSTEK_I2C_TOUCHPAD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ASUSTEK, USB_DEVICE_ID_ASUSTEK_ROG_KEYBOARD1) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ASUSTEK, USB_DEVICE_ID_ASUSTEK_ROG_KEYBOARD2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ASUSTEK, USB_DEVICE_ID_ASUSTEK_ROG_KEYBOARD3) },
{ HID_USB_DEVICE(USB_VENDOR_ID_JESS, USB_DEVICE_ID_ASUS_MD_5112) },
{ HID_USB_DEVICE(USB_VENDOR_ID_TURBOX, USB_DEVICE_ID_ASUS_MD_5110) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_ASUSTEK, USB_DEVICE_ID_ASUSTEK_T100CHI_KEYBOARD) },
#endif
#if IS_ENABLED(CONFIG_HID_AUREAL)
{ HID_USB_DEVICE(USB_VENDOR_ID_AUREAL, USB_DEVICE_ID_AUREAL_W01RN) },
#endif
#if IS_ENABLED(CONFIG_HID_BELKIN)
{ HID_USB_DEVICE(USB_VENDOR_ID_BELKIN, USB_DEVICE_ID_FLIP_KVM) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LABTEC, USB_DEVICE_ID_LABTEC_WIRELESS_KEYBOARD) },
#endif
#if IS_ENABLED(CONFIG_HID_BETOP_FF)
{ HID_USB_DEVICE(USB_VENDOR_ID_BETOP_2185BFM, 0x2208) },
{ HID_USB_DEVICE(USB_VENDOR_ID_BETOP_2185PC, 0x5506) },
{ HID_USB_DEVICE(USB_VENDOR_ID_BETOP_2185V2PC, 0x1850) },
{ HID_USB_DEVICE(USB_VENDOR_ID_BETOP_2185V2BFM, 0x5500) },
#endif
#if IS_ENABLED(CONFIG_HID_CHERRY)
{ HID_USB_DEVICE(USB_VENDOR_ID_CHERRY, USB_DEVICE_ID_CHERRY_CYMOTION) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CHERRY, USB_DEVICE_ID_CHERRY_CYMOTION_SOLAR) },
#endif
#if IS_ENABLED(CONFIG_HID_CHICONY)
{ HID_USB_DEVICE(USB_VENDOR_ID_CHICONY, USB_DEVICE_ID_CHICONY_TACTICAL_PAD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CHICONY, USB_DEVICE_ID_CHICONY_WIRELESS2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CHICONY, USB_DEVICE_ID_ASUS_AK1D) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CHICONY, USB_DEVICE_ID_CHICONY_ACER_SWITCH12) },
#endif
#if IS_ENABLED(CONFIG_HID_CMEDIA)
{ HID_USB_DEVICE(USB_VENDOR_ID_CMEDIA, USB_DEVICE_ID_CM6533) },
#endif
#if IS_ENABLED(CONFIG_HID_CORSAIR)
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_K90) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_GLAIVE_RGB) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CORSAIR, USB_DEVICE_ID_CORSAIR_SCIMITAR_PRO_RGB) },
#endif
#if IS_ENABLED(CONFIG_HID_CP2112)
{ HID_USB_DEVICE(USB_VENDOR_ID_CYGNAL, USB_DEVICE_ID_CYGNAL_CP2112) },
#endif
#if IS_ENABLED(CONFIG_HID_CYPRESS)
{ HID_USB_DEVICE(USB_VENDOR_ID_CYPRESS, USB_DEVICE_ID_CYPRESS_BARCODE_1) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CYPRESS, USB_DEVICE_ID_CYPRESS_BARCODE_2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CYPRESS, USB_DEVICE_ID_CYPRESS_BARCODE_3) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CYPRESS, USB_DEVICE_ID_CYPRESS_BARCODE_4) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CYPRESS, USB_DEVICE_ID_CYPRESS_MOUSE) },
#endif
#if IS_ENABLED(CONFIG_HID_DRAGONRISE)
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, 0x0006) },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, 0x0011) },
#endif
#if IS_ENABLED(CONFIG_HID_ELAN)
{ HID_USB_DEVICE(USB_VENDOR_ID_ELAN, USB_DEVICE_ID_HP_X2_10_COVER) },
#endif
#if IS_ENABLED(CONFIG_HID_ELECOM)
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_ELECOM, USB_DEVICE_ID_ELECOM_BM084) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELECOM, USB_DEVICE_ID_ELECOM_M_XT3URBK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELECOM, USB_DEVICE_ID_ELECOM_M_XT3DRBK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELECOM, USB_DEVICE_ID_ELECOM_M_XT4DRBK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELECOM, USB_DEVICE_ID_ELECOM_M_DT1URBK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELECOM, USB_DEVICE_ID_ELECOM_M_DT1DRBK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELECOM, USB_DEVICE_ID_ELECOM_M_HT1URBK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELECOM, USB_DEVICE_ID_ELECOM_M_HT1DRBK) },
#endif
#if IS_ENABLED(CONFIG_HID_ELO)
{ HID_USB_DEVICE(USB_VENDOR_ID_ELO, 0x0009) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ELO, 0x0030) },
#endif
#if IS_ENABLED(CONFIG_HID_EMS_FF)
{ HID_USB_DEVICE(USB_VENDOR_ID_EMS, USB_DEVICE_ID_EMS_TRIO_LINKER_PLUS_II) },
#endif
#if IS_ENABLED(CONFIG_HID_EZKEY)
{ HID_USB_DEVICE(USB_VENDOR_ID_EZKEY, USB_DEVICE_ID_BTC_8193) },
#endif
#if IS_ENABLED(CONFIG_HID_GEMBIRD)
{ HID_USB_DEVICE(USB_VENDOR_ID_GEMBIRD, USB_DEVICE_ID_GEMBIRD_JPD_DUALFORCE2) },
#endif
#if IS_ENABLED(CONFIG_HID_GFRM)
{ HID_BLUETOOTH_DEVICE(0x58, 0x2000) },
{ HID_BLUETOOTH_DEVICE(0x471, 0x2210) },
#endif
#if IS_ENABLED(CONFIG_HID_GREENASIA)
{ HID_USB_DEVICE(USB_VENDOR_ID_GREENASIA, 0x0012) },
#endif
#if IS_ENABLED(CONFIG_HID_GT683R)
{ HID_USB_DEVICE(USB_VENDOR_ID_MSI, USB_DEVICE_ID_MSI_GT683R_LED_PANEL) },
#endif
#if IS_ENABLED(CONFIG_HID_GYRATION)
{ HID_USB_DEVICE(USB_VENDOR_ID_GYRATION, USB_DEVICE_ID_GYRATION_REMOTE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GYRATION, USB_DEVICE_ID_GYRATION_REMOTE_2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GYRATION, USB_DEVICE_ID_GYRATION_REMOTE_3) },
#endif
#if IS_ENABLED(CONFIG_HID_HOLTEK)
{ HID_USB_DEVICE(USB_VENDOR_ID_HOLTEK, USB_DEVICE_ID_HOLTEK_ON_LINE_GRIP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_HOLTEK_ALT, USB_DEVICE_ID_HOLTEK_ALT_KEYBOARD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_HOLTEK_ALT, USB_DEVICE_ID_HOLTEK_ALT_MOUSE_A04A) },
{ HID_USB_DEVICE(USB_VENDOR_ID_HOLTEK_ALT, USB_DEVICE_ID_HOLTEK_ALT_MOUSE_A067) },
{ HID_USB_DEVICE(USB_VENDOR_ID_HOLTEK_ALT, USB_DEVICE_ID_HOLTEK_ALT_MOUSE_A070) },
{ HID_USB_DEVICE(USB_VENDOR_ID_HOLTEK_ALT, USB_DEVICE_ID_HOLTEK_ALT_MOUSE_A072) },
{ HID_USB_DEVICE(USB_VENDOR_ID_HOLTEK_ALT, USB_DEVICE_ID_HOLTEK_ALT_MOUSE_A081) },
{ HID_USB_DEVICE(USB_VENDOR_ID_HOLTEK_ALT, USB_DEVICE_ID_HOLTEK_ALT_MOUSE_A0C2) },
#endif
#if IS_ENABLED(CONFIG_HID_ITE)
{ HID_USB_DEVICE(USB_VENDOR_ID_ITE, USB_DEVICE_ID_ITE8595) },
#endif
#if IS_ENABLED(CONFIG_HID_ICADE)
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_ION, USB_DEVICE_ID_ICADE) },
#endif
#if IS_ENABLED(CONFIG_HID_JABRA)
{ HID_USB_DEVICE(USB_VENDOR_ID_JABRA, HID_ANY_ID) },
#endif
#if IS_ENABLED(CONFIG_HID_KENSINGTON)
{ HID_USB_DEVICE(USB_VENDOR_ID_KENSINGTON, USB_DEVICE_ID_KS_SLIMBLADE) },
#endif
#if IS_ENABLED(CONFIG_HID_KEYTOUCH)
{ HID_USB_DEVICE(USB_VENDOR_ID_KEYTOUCH, USB_DEVICE_ID_KEYTOUCH_IEC) },
#endif
#if IS_ENABLED(CONFIG_HID_KYE)
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_GENIUS_GILA_GAMING_MOUSE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_GENIUS_MANTICORE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_GENIUS_GX_IMPERATOR) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_ERGO_525V) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_EASYPEN_I405X) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_MOUSEPEN_I608X) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_MOUSEPEN_I608X_V2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_EASYPEN_M610X) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_PENSKETCH_M912) },
#endif
#if IS_ENABLED(CONFIG_HID_LCPOWER)
{ HID_USB_DEVICE(USB_VENDOR_ID_LCPOWER, USB_DEVICE_ID_LCPOWER_LC1000) },
#endif
#if IS_ENABLED(CONFIG_HID_LED)
{ HID_USB_DEVICE(USB_VENDOR_ID_DELCOM, USB_DEVICE_ID_DELCOM_VISUAL_IND) },
{ HID_USB_DEVICE(USB_VENDOR_ID_DREAM_CHEEKY, USB_DEVICE_ID_DREAM_CHEEKY_WN) },
{ HID_USB_DEVICE(USB_VENDOR_ID_DREAM_CHEEKY, USB_DEVICE_ID_DREAM_CHEEKY_FA) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROCHIP, USB_DEVICE_ID_LUXAFOR) },
{ HID_USB_DEVICE(USB_VENDOR_ID_RISO_KAGAKU, USB_DEVICE_ID_RI_KA_WEBMAIL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_THINGM, USB_DEVICE_ID_BLINK1) },
#endif
#if IS_ENABLED(CONFIG_HID_LENOVO)
{ HID_USB_DEVICE(USB_VENDOR_ID_LENOVO, USB_DEVICE_ID_LENOVO_TPKBD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LENOVO, USB_DEVICE_ID_LENOVO_CUSBKBD) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_LENOVO, USB_DEVICE_ID_LENOVO_CBTKBD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LENOVO, USB_DEVICE_ID_LENOVO_TPPRODOCK) },
#endif
#if IS_ENABLED(CONFIG_HID_LOGITECH)
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_MX3000_RECEIVER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_S510_RECEIVER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_S510_RECEIVER_2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_RECEIVER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_DINOVO_DESKTOP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_DINOVO_EDGE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_DINOVO_MINI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_ELITE_KBD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_CORDLESS_DESKTOP_LX500) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_EXTREME_3D) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_DUAL_ACTION) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_WHEEL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_RUMBLEPAD_CORD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_RUMBLEPAD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_RUMBLEPAD2_2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_G29_WHEEL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_WINGMAN_F3D) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_WINGMAN_FFG) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_FORCE3D_PRO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_FLIGHT_SYSTEM_G940) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_MOMO_WHEEL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_MOMO_WHEEL2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_VIBRATION_WHEEL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_DFP_WHEEL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_DFGT_WHEEL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_G25_WHEEL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_G27_WHEEL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_WII_WHEEL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_RUMBLEPAD2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_SPACETRAVELLER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_SPACENAVIGATOR) },
#endif
#if IS_ENABLED(CONFIG_HID_LOGITECH_HIDPP)
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_T651) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_G920_WHEEL) },
#endif
#if IS_ENABLED(CONFIG_HID_LOGITECH_DJ)
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_UNIFYING_RECEIVER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_UNIFYING_RECEIVER_2) },
#endif
#if IS_ENABLED(CONFIG_HID_MAGICMOUSE)
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_MAGICMOUSE) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_MAGICTRACKPAD) },
{ HID_BLUETOOTH_DEVICE(BT_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_MAGICTRACKPAD2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_MAGICTRACKPAD2) },
#endif
#if IS_ENABLED(CONFIG_HID_MAYFLASH)
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, USB_DEVICE_ID_DRAGONRISE_PS3) },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, USB_DEVICE_ID_DRAGONRISE_DOLPHINBAR) },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, USB_DEVICE_ID_DRAGONRISE_GAMECUBE1) },
{ HID_USB_DEVICE(USB_VENDOR_ID_DRAGONRISE, USB_DEVICE_ID_DRAGONRISE_GAMECUBE2) },
#endif
#if IS_ENABLED(CONFIG_HID_MICROSOFT)
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_COMFORT_MOUSE_4500) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_COMFORT_KEYBOARD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_SIDEWINDER_GV) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_NE4K) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_NE4K_JP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_NE7K) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_LK6K) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_PRESENTER_8K_USB) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_DIGITAL_MEDIA_3K) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_WIRELESS_OPTICAL_DESKTOP_3_0) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_OFFICE_KB) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_DIGITAL_MEDIA_7K) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_DIGITAL_MEDIA_600) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_DIGITAL_MEDIA_3KV1) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_POWER_COVER) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_MICROSOFT, USB_DEVICE_ID_MS_PRESENTER_8K_BT) },
#endif
#if IS_ENABLED(CONFIG_HID_MONTEREY)
{ HID_USB_DEVICE(USB_VENDOR_ID_MONTEREY, USB_DEVICE_ID_GENIUS_KB29E) },
#endif
#if IS_ENABLED(CONFIG_HID_MULTITOUCH)
{ HID_USB_DEVICE(USB_VENDOR_ID_LG, USB_DEVICE_ID_LG_MELFAS_MT) },
#endif
#if IS_ENABLED(CONFIG_HID_WIIMOTE)
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_NINTENDO, USB_DEVICE_ID_NINTENDO_WIIMOTE) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_NINTENDO, USB_DEVICE_ID_NINTENDO_WIIMOTE2) },
#endif
#if IS_ENABLED(CONFIG_HID_NTI)
{ HID_USB_DEVICE(USB_VENDOR_ID_NTI, USB_DEVICE_ID_USB_SUN) },
#endif
#if IS_ENABLED(CONFIG_HID_NTRIG)
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_1) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_3) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_4) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_5) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_6) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_7) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_8) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_9) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_10) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_11) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_12) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_13) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_14) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_15) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_16) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_17) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NTRIG, USB_DEVICE_ID_NTRIG_TOUCH_SCREEN_18) },
#endif
#if IS_ENABLED(CONFIG_HID_ORTEK)
{ HID_USB_DEVICE(USB_VENDOR_ID_ORTEK, USB_DEVICE_ID_ORTEK_PKB1700) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ORTEK, USB_DEVICE_ID_ORTEK_WKB2000) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ORTEK, USB_DEVICE_ID_ORTEK_IHOME_IMAC_A210S) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SKYCABLE, USB_DEVICE_ID_SKYCABLE_WIRELESS_PRESENTER) },
#endif
#if IS_ENABLED(CONFIG_HID_PANTHERLORD)
{ HID_USB_DEVICE(USB_VENDOR_ID_GAMERON, USB_DEVICE_ID_GAMERON_DUAL_PSX_ADAPTOR) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GAMERON, USB_DEVICE_ID_GAMERON_DUAL_PCS_ADAPTOR) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GREENASIA, 0x0003) },
{ HID_USB_DEVICE(USB_VENDOR_ID_JESS2, USB_DEVICE_ID_JESS2_COLOR_RUMBLE_PAD) },
#endif
#if IS_ENABLED(CONFIG_HID_PENMOUNT)
{ HID_USB_DEVICE(USB_VENDOR_ID_PENMOUNT, USB_DEVICE_ID_PENMOUNT_6000) },
#endif
#if IS_ENABLED(CONFIG_HID_PETALYNX)
{ HID_USB_DEVICE(USB_VENDOR_ID_PETALYNX, USB_DEVICE_ID_PETALYNX_MAXTER_REMOTE) },
#endif
#if IS_ENABLED(CONFIG_HID_PICOLCD)
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROCHIP, USB_DEVICE_ID_PICOLCD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROCHIP, USB_DEVICE_ID_PICOLCD_BOOTLOADER) },
#endif
#if IS_ENABLED(CONFIG_HID_PLANTRONICS)
{ HID_USB_DEVICE(USB_VENDOR_ID_PLANTRONICS, HID_ANY_ID) },
#endif
#if IS_ENABLED(CONFIG_HID_PRIMAX)
{ HID_USB_DEVICE(USB_VENDOR_ID_PRIMAX, USB_DEVICE_ID_PRIMAX_KEYBOARD) },
#endif
#if IS_ENABLED(CONFIG_HID_PRODIKEYS)
{ HID_USB_DEVICE(USB_VENDOR_ID_CREATIVELABS, USB_DEVICE_ID_PRODIKEYS_PCMIDI) },
#endif
#if IS_ENABLED(CONFIG_HID_RETRODE)
{ HID_USB_DEVICE(USB_VENDOR_ID_FUTURE_TECHNOLOGY, USB_DEVICE_ID_RETRODE2) },
#endif
#if IS_ENABLED(CONFIG_HID_RMI)
{ HID_USB_DEVICE(USB_VENDOR_ID_LENOVO, USB_DEVICE_ID_LENOVO_X1_COVER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_RAZER, USB_DEVICE_ID_RAZER_BLADE_14) },
{ HID_USB_DEVICE(USB_VENDOR_ID_PRIMAX, USB_DEVICE_ID_PRIMAX_REZEL) },
#endif
#if IS_ENABLED(CONFIG_HID_ROCCAT)
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_ARVO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_ISKU) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_ISKUFX) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_KONE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_KONEPLUS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_KONEPURE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_KONEPURE_OPTICAL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_KONEXTD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_KOVAPLUS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_LUA) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_PYRA_WIRED) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_PYRA_WIRELESS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_RYOS_MK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_RYOS_MK_GLOW) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_RYOS_MK_PRO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ROCCAT, USB_DEVICE_ID_ROCCAT_SAVU) },
#endif
#if IS_ENABLED(CONFIG_HID_SAITEK)
{ HID_USB_DEVICE(USB_VENDOR_ID_SAITEK, USB_DEVICE_ID_SAITEK_PS1000) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SAITEK, USB_DEVICE_ID_SAITEK_RAT7_OLD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SAITEK, USB_DEVICE_ID_SAITEK_RAT7) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SAITEK, USB_DEVICE_ID_SAITEK_RAT9) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SAITEK, USB_DEVICE_ID_SAITEK_MMO7) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MADCATZ, USB_DEVICE_ID_MADCATZ_RAT5) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MADCATZ, USB_DEVICE_ID_MADCATZ_RAT9) },
#endif
#if IS_ENABLED(CONFIG_HID_SAMSUNG)
{ HID_USB_DEVICE(USB_VENDOR_ID_SAMSUNG, USB_DEVICE_ID_SAMSUNG_IR_REMOTE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SAMSUNG, USB_DEVICE_ID_SAMSUNG_WIRELESS_KBD_MOUSE) },
#endif
#if IS_ENABLED(CONFIG_HID_SMARTJOYPLUS)
{ HID_USB_DEVICE(USB_VENDOR_ID_PLAYDOTCOM, USB_DEVICE_ID_PLAYDOTCOM_EMS_USBII) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WISEGROUP, USB_DEVICE_ID_SMARTJOY_PLUS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WISEGROUP, USB_DEVICE_ID_SUPER_JOY_BOX_3) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WISEGROUP, USB_DEVICE_ID_DUAL_USB_JOYPAD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WISEGROUP_LTD, USB_DEVICE_ID_SUPER_JOY_BOX_3_PRO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WISEGROUP_LTD, USB_DEVICE_ID_SUPER_DUAL_BOX_PRO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WISEGROUP_LTD, USB_DEVICE_ID_SUPER_JOY_BOX_5_PRO) },
#endif
#if IS_ENABLED(CONFIG_HID_SONY)
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_LOGITECH, USB_DEVICE_ID_LOGITECH_HARMONY_PS3) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_SMK, USB_DEVICE_ID_SMK_PS3_BDREMOTE) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_SMK, USB_DEVICE_ID_SMK_NSG_MR5U_REMOTE) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_SMK, USB_DEVICE_ID_SMK_NSG_MR7U_REMOTE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_BUZZ_CONTROLLER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_WIRELESS_BUZZ_CONTROLLER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_MOTION_CONTROLLER) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_MOTION_CONTROLLER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_NAVIGATION_CONTROLLER) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_NAVIGATION_CONTROLLER) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_PS3_BDREMOTE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_PS3_CONTROLLER) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_PS3_CONTROLLER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_PS4_CONTROLLER) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_PS4_CONTROLLER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_PS4_CONTROLLER_2) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_PS4_CONTROLLER_2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_PS4_CONTROLLER_DONGLE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_VAIO_VGX_MOUSE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SONY, USB_DEVICE_ID_SONY_VAIO_VGP_MOUSE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SINO_LITE, USB_DEVICE_ID_SINO_LITE_CONTROLLER) },
#endif
#if IS_ENABLED(CONFIG_HID_SPEEDLINK)
{ HID_USB_DEVICE(USB_VENDOR_ID_X_TENSIONS, USB_DEVICE_ID_SPEEDLINK_VAD_CEZANNE) },
#endif
#if IS_ENABLED(CONFIG_HID_STEELSERIES)
{ HID_USB_DEVICE(USB_VENDOR_ID_STEELSERIES, USB_DEVICE_ID_STEELSERIES_SRWS1) },
#endif
#if IS_ENABLED(CONFIG_HID_SUNPLUS)
{ HID_USB_DEVICE(USB_VENDOR_ID_SUNPLUS, USB_DEVICE_ID_SUNPLUS_WDESKTOP) },
#endif
#if IS_ENABLED(CONFIG_HID_THRUSTMASTER)
{ HID_USB_DEVICE(USB_VENDOR_ID_THRUSTMASTER, 0xb300) },
{ HID_USB_DEVICE(USB_VENDOR_ID_THRUSTMASTER, 0xb304) },
{ HID_USB_DEVICE(USB_VENDOR_ID_THRUSTMASTER, 0xb323) },
{ HID_USB_DEVICE(USB_VENDOR_ID_THRUSTMASTER, 0xb324) },
{ HID_USB_DEVICE(USB_VENDOR_ID_THRUSTMASTER, 0xb605) },
{ HID_USB_DEVICE(USB_VENDOR_ID_THRUSTMASTER, 0xb651) },
{ HID_USB_DEVICE(USB_VENDOR_ID_THRUSTMASTER, 0xb653) },
{ HID_USB_DEVICE(USB_VENDOR_ID_THRUSTMASTER, 0xb654) },
{ HID_USB_DEVICE(USB_VENDOR_ID_THRUSTMASTER, 0xb65a) },
#endif
#if IS_ENABLED(CONFIG_HID_TIVO)
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_TIVO, USB_DEVICE_ID_TIVO_SLIDE_BT) },
{ HID_USB_DEVICE(USB_VENDOR_ID_TIVO, USB_DEVICE_ID_TIVO_SLIDE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_TIVO, USB_DEVICE_ID_TIVO_SLIDE_PRO) },
#endif
#if IS_ENABLED(CONFIG_HID_TOPSEED)
{ HID_USB_DEVICE(USB_VENDOR_ID_BTC, USB_DEVICE_ID_BTC_EMPREX_REMOTE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_BTC, USB_DEVICE_ID_BTC_EMPREX_REMOTE_2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CHICONY, USB_DEVICE_ID_CHICONY_WIRELESS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_TOPSEED, USB_DEVICE_ID_TOPSEED_CYBERLINK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_TOPSEED2, USB_DEVICE_ID_TOPSEED2_RF_COMBO) },
#endif
#if IS_ENABLED(CONFIG_HID_TWINHAN)
{ HID_USB_DEVICE(USB_VENDOR_ID_TWINHAN, USB_DEVICE_ID_TWINHAN_IR_REMOTE) },
#endif
#if IS_ENABLED(CONFIG_HID_UCLOGIC)
{ HID_USB_DEVICE(USB_VENDOR_ID_HUION, USB_DEVICE_ID_HUION_TABLET) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_HUION_TABLET) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_TABLET_PF1209) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_TABLET_WP4030U) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_TABLET_WP5540U) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_TABLET_WP8060U) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_TABLET_WP1062) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_WIRELESS_TABLET_TWHL850) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_TABLET_TWHA60) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_YIYNOVA_TABLET) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UGEE_TABLET_81) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UGEE_TABLET_45) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UCLOGIC, USB_DEVICE_ID_UCLOGIC_DRAWIMAGE_G3) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UGEE, USB_DEVICE_ID_UGEE_TABLET_EX07S) },
{ HID_USB_DEVICE(USB_VENDOR_ID_UGTIZER, USB_DEVICE_ID_UGTIZER_TABLET_GP0610) },
#endif
#if IS_ENABLED(CONFIG_HID_UDRAW_PS3)
{ HID_USB_DEVICE(USB_VENDOR_ID_THQ, USB_DEVICE_ID_THQ_PS3_UDRAW) },
#endif
#if IS_ENABLED(CONFIG_HID_WALTOP)
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_SLIM_TABLET_5_8_INCH) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_SLIM_TABLET_12_1_INCH) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_Q_PAD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_PID_0038) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_MEDIA_TABLET_10_6_INCH) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_MEDIA_TABLET_14_1_INCH) },
{ HID_USB_DEVICE(USB_VENDOR_ID_WALTOP, USB_DEVICE_ID_WALTOP_SIRIUS_BATTERY_FREE_TABLET) },
#endif
#if IS_ENABLED(CONFIG_HID_XINMO)
{ HID_USB_DEVICE(USB_VENDOR_ID_XIN_MO, USB_DEVICE_ID_XIN_MO_DUAL_ARCADE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_XIN_MO, USB_DEVICE_ID_THT_2P_ARCADE) },
#endif
#if IS_ENABLED(CONFIG_HID_ZEROPLUS)
{ HID_USB_DEVICE(USB_VENDOR_ID_ZEROPLUS, 0x0005) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ZEROPLUS, 0x0030) },
#endif
#if IS_ENABLED(CONFIG_HID_ZYDACRON)
{ HID_USB_DEVICE(USB_VENDOR_ID_ZYDACRON, USB_DEVICE_ID_ZYDACRON_REMOTE_CONTROL) },
#endif
{ }
};
/* a list of devices that shouldn't be handled by HID core at all */
static const struct hid_device_id hid_ignore_list[] = {
{ HID_USB_DEVICE(USB_VENDOR_ID_ACECAD, USB_DEVICE_ID_ACECAD_FLAIR) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ACECAD, USB_DEVICE_ID_ACECAD_302) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ADS_TECH, USB_DEVICE_ID_ADS_TECH_RADIO_SI470X) },
{ HID_USB_DEVICE(USB_VENDOR_ID_AIPTEK, USB_DEVICE_ID_AIPTEK_01) },
{ HID_USB_DEVICE(USB_VENDOR_ID_AIPTEK, USB_DEVICE_ID_AIPTEK_10) },
{ HID_USB_DEVICE(USB_VENDOR_ID_AIPTEK, USB_DEVICE_ID_AIPTEK_20) },
{ HID_USB_DEVICE(USB_VENDOR_ID_AIPTEK, USB_DEVICE_ID_AIPTEK_21) },
{ HID_USB_DEVICE(USB_VENDOR_ID_AIPTEK, USB_DEVICE_ID_AIPTEK_22) },
{ HID_USB_DEVICE(USB_VENDOR_ID_AIPTEK, USB_DEVICE_ID_AIPTEK_23) },
{ HID_USB_DEVICE(USB_VENDOR_ID_AIPTEK, USB_DEVICE_ID_AIPTEK_24) },
{ HID_USB_DEVICE(USB_VENDOR_ID_AIRCABLE, USB_DEVICE_ID_AIRCABLE1) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ALCOR, USB_DEVICE_ID_ALCOR_USBRS232) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ASUSTEK, USB_DEVICE_ID_ASUSTEK_LCM)},
{ HID_USB_DEVICE(USB_VENDOR_ID_ASUSTEK, USB_DEVICE_ID_ASUSTEK_LCM2)},
{ HID_USB_DEVICE(USB_VENDOR_ID_AVERMEDIA, USB_DEVICE_ID_AVER_FM_MR800) },
{ HID_USB_DEVICE(USB_VENDOR_ID_AXENTIA, USB_DEVICE_ID_AXENTIA_FM_RADIO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_BERKSHIRE, USB_DEVICE_ID_BERKSHIRE_PCWD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CIDC, 0x0103) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CYGNAL, USB_DEVICE_ID_CYGNAL_RADIO_SI470X) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CYGNAL, USB_DEVICE_ID_CYGNAL_RADIO_SI4713) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CMEDIA, USB_DEVICE_ID_CM109) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CYPRESS, USB_DEVICE_ID_CYPRESS_HIDCOM) },
{ HID_USB_DEVICE(USB_VENDOR_ID_CYPRESS, USB_DEVICE_ID_CYPRESS_ULTRAMOUSE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_DEALEXTREAME, USB_DEVICE_ID_DEALEXTREAME_RADIO_SI4701) },
{ HID_USB_DEVICE(USB_VENDOR_ID_DELORME, USB_DEVICE_ID_DELORME_EARTHMATE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_DELORME, USB_DEVICE_ID_DELORME_EM_LT20) },
{ HID_I2C_DEVICE(USB_VENDOR_ID_ELAN, 0x0400) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ESSENTIAL_REALITY, USB_DEVICE_ID_ESSENTIAL_REALITY_P5) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ETT, USB_DEVICE_ID_TC5UH) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ETT, USB_DEVICE_ID_TC4UM) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GENERAL_TOUCH, 0x0001) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GENERAL_TOUCH, 0x0002) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GENERAL_TOUCH, 0x0004) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GOTOP, USB_DEVICE_ID_SUPER_Q2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GOTOP, USB_DEVICE_ID_GOGOPEN) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GOTOP, USB_DEVICE_ID_PENPOWER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GRETAGMACBETH, USB_DEVICE_ID_GRETAGMACBETH_HUEY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GRIFFIN, USB_DEVICE_ID_POWERMATE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GRIFFIN, USB_DEVICE_ID_SOUNDKNOB) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GRIFFIN, USB_DEVICE_ID_RADIOSHARK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_90) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_100) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_101) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_103) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_104) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_105) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_106) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_107) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_108) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_200) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_201) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_202) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_203) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_204) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_205) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_206) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_207) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_300) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_301) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_302) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_303) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_304) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_305) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_306) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_307) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_308) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_309) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_400) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_401) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_402) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_403) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_404) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_405) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_500) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_501) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_502) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_503) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_504) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_1000) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_1001) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_1002) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_1003) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_1004) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_1005) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_1006) },
{ HID_USB_DEVICE(USB_VENDOR_ID_GTCO, USB_DEVICE_ID_GTCO_1007) },
{ HID_USB_DEVICE(USB_VENDOR_ID_IMATION, USB_DEVICE_ID_DISC_STAKKA) },
{ HID_USB_DEVICE(USB_VENDOR_ID_JABRA, USB_DEVICE_ID_JABRA_GN9350E) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KBGEAR, USB_DEVICE_ID_KBGEAR_JAMSTUDIO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KWORLD, USB_DEVICE_ID_KWORLD_RADIO_FM700) },
{ HID_USB_DEVICE(USB_VENDOR_ID_KYE, USB_DEVICE_ID_KYE_GPEN_560) },
{ HID_BLUETOOTH_DEVICE(USB_VENDOR_ID_KYE, 0x0058) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_CASSY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_CASSY2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_POCKETCASSY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_POCKETCASSY2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MOBILECASSY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MOBILECASSY2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MICROCASSYVOLTAGE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MICROCASSYCURRENT) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MICROCASSYTIME) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MICROCASSYTEMPERATURE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MICROCASSYPH) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_POWERANALYSERCASSY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_CONVERTERCONTROLLERCASSY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MACHINETESTCASSY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_JWM) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_DMMP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_UMIP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_UMIC) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_UMIB) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_XRAY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_XRAY2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_VIDEOCOM) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MOTOR) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_COM3LAB) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_TELEPORT) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_NETWORKANALYSER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_POWERCONTROL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MACHINETEST) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MOSTANALYSER) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MOSTANALYSER2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_ABSESP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_AUTODATABUS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_MCT) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_HYBRID) },
{ HID_USB_DEVICE(USB_VENDOR_ID_LD, USB_DEVICE_ID_LD_HEATCONTROL) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MADCATZ, USB_DEVICE_ID_MADCATZ_BEATPAD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MCC, USB_DEVICE_ID_MCC_PMD1024LS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MCC, USB_DEVICE_ID_MCC_PMD1208LS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROCHIP, USB_DEVICE_ID_PICKIT1) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROCHIP, USB_DEVICE_ID_PICKIT2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROCHIP, USB_DEVICE_ID_PICK16F1454) },
{ HID_USB_DEVICE(USB_VENDOR_ID_MICROCHIP, USB_DEVICE_ID_PICK16F1454_V2) },
{ HID_USB_DEVICE(USB_VENDOR_ID_NATIONAL_SEMICONDUCTOR, USB_DEVICE_ID_N_S_HARMONY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100 + 20) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100 + 30) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100 + 100) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100 + 108) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100 + 118) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100 + 200) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100 + 300) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100 + 400) },
{ HID_USB_DEVICE(USB_VENDOR_ID_ONTRAK, USB_DEVICE_ID_ONTRAK_ADU100 + 500) },
{ HID_USB_DEVICE(USB_VENDOR_ID_PANJIT, 0x0001) },
{ HID_USB_DEVICE(USB_VENDOR_ID_PANJIT, 0x0002) },
{ HID_USB_DEVICE(USB_VENDOR_ID_PANJIT, 0x0003) },
{ HID_USB_DEVICE(USB_VENDOR_ID_PANJIT, 0x0004) },
{ HID_USB_DEVICE(USB_VENDOR_ID_PETZL, USB_DEVICE_ID_PETZL_HEADLAMP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_PHILIPS, USB_DEVICE_ID_PHILIPS_IEEE802154_DONGLE) },
{ HID_USB_DEVICE(USB_VENDOR_ID_POWERCOM, USB_DEVICE_ID_POWERCOM_UPS) },
#if IS_ENABLED(CONFIG_MOUSE_SYNAPTICS_USB)
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_TP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_INT_TP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_CPAD) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_STICK) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_WP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_COMP_TP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_WTP) },
{ HID_USB_DEVICE(USB_VENDOR_ID_SYNAPTICS, USB_DEVICE_ID_SYNAPTICS_DPAD) },
#endif
{ HID_USB_DEVICE(USB_VENDOR_ID_YEALINK, USB_DEVICE_ID_YEALINK_P1K_P4K_B2K) },
{ }
};
/**
* hid_mouse_ignore_list - mouse devices which should not be handled by the hid layer
*
* There are composite devices for which we want to ignore only a certain
* interface. This is a list of devices for which only the mouse interface will
* be ignored. This allows a dedicated driver to take care of the interface.
*/
static const struct hid_device_id hid_mouse_ignore_list[] = {
/* appletouch driver */
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_FOUNTAIN_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_FOUNTAIN_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER3_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER3_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER3_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_HF_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_HF_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER4_HF_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING2_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING2_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING2_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING3_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING3_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING3_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4A_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4A_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING4A_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5A_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5A_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING5A_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6A_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6A_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING6A_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7A_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7A_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING7A_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING8_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING8_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING8_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING9_ANSI) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING9_ISO) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_WELLSPRING9_JIS) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_FOUNTAIN_TP_ONLY) },
{ HID_USB_DEVICE(USB_VENDOR_ID_APPLE, USB_DEVICE_ID_APPLE_GEYSER1_TP_ONLY) },
{ }
};
bool hid_ignore(struct hid_device *hdev)
{
if (hdev->quirks & HID_QUIRK_NO_IGNORE)
return false;
if (hdev->quirks & HID_QUIRK_IGNORE)
return true;
switch (hdev->vendor) {
case USB_VENDOR_ID_CODEMERCS:
/* ignore all Code Mercenaries IOWarrior devices */
if (hdev->product >= USB_DEVICE_ID_CODEMERCS_IOW_FIRST &&
hdev->product <= USB_DEVICE_ID_CODEMERCS_IOW_LAST)
return true;
break;
case USB_VENDOR_ID_LOGITECH:
if (hdev->product >= USB_DEVICE_ID_LOGITECH_HARMONY_FIRST &&
hdev->product <= USB_DEVICE_ID_LOGITECH_HARMONY_LAST)
return true;
/*
* The Keene FM transmitter USB device has the same USB ID as
* the Logitech AudioHub Speaker, but it should ignore the hid.
* Check if the name is that of the Keene device.
* For reference: the name of the AudioHub is
* "HOLTEK AudioHub Speaker".
*/
if (hdev->product == USB_DEVICE_ID_LOGITECH_AUDIOHUB &&
!strcmp(hdev->name, "HOLTEK B-LINK USB Audio "))
return true;
break;
case USB_VENDOR_ID_SOUNDGRAPH:
if (hdev->product >= USB_DEVICE_ID_SOUNDGRAPH_IMON_FIRST &&
hdev->product <= USB_DEVICE_ID_SOUNDGRAPH_IMON_LAST)
return true;
break;
case USB_VENDOR_ID_HANWANG:
if (hdev->product >= USB_DEVICE_ID_HANWANG_TABLET_FIRST &&
hdev->product <= USB_DEVICE_ID_HANWANG_TABLET_LAST)
return true;
break;
case USB_VENDOR_ID_JESS:
if (hdev->product == USB_DEVICE_ID_JESS_YUREX &&
hdev->type == HID_TYPE_USBNONE)
return true;
break;
case USB_VENDOR_ID_VELLEMAN:
/* These are not HID devices. They are handled by comedi. */
if ((hdev->product >= USB_DEVICE_ID_VELLEMAN_K8055_FIRST &&
hdev->product <= USB_DEVICE_ID_VELLEMAN_K8055_LAST) ||
(hdev->product >= USB_DEVICE_ID_VELLEMAN_K8061_FIRST &&
hdev->product <= USB_DEVICE_ID_VELLEMAN_K8061_LAST))
return true;
break;
case USB_VENDOR_ID_ATMEL_V_USB:
/* Masterkit MA901 usb radio based on Atmel tiny85 chip and
* it has the same USB ID as many Atmel V-USB devices. This
* usb radio is handled by radio-ma901.c driver so we want
* ignore the hid. Check the name, bus, product and ignore
* if we have MA901 usb radio.
*/
if (hdev->product == USB_DEVICE_ID_ATMEL_V_USB &&
hdev->bus == BUS_USB &&
strncmp(hdev->name, "www.masterkit.ru MA901", 22) == 0)
return true;
break;
case USB_VENDOR_ID_ELAN:
/*
* Many Elan devices have a product id of 0x0401 and are handled
* by the elan_i2c input driver. But the ACPI HID ELAN0800 dev
* is not (and cannot be) handled by that driver ->
* Ignore all 0x0401 devs except for the ELAN0800 dev.
*/
if (hdev->product == 0x0401 &&
strncmp(hdev->name, "ELAN0800", 8) != 0)
return true;
break;
}
if (hdev->type == HID_TYPE_USBMOUSE &&
hid_match_id(hdev, hid_mouse_ignore_list))
return true;
return !!hid_match_id(hdev, hid_ignore_list);
}
EXPORT_SYMBOL_GPL(hid_ignore);
/* Dynamic HID quirks list - specified at runtime */
struct quirks_list_struct {
struct hid_device_id hid_bl_item;
struct list_head node;
};
static LIST_HEAD(dquirks_list);
static DEFINE_MUTEX(dquirks_lock);
/* Runtime ("dynamic") quirks manipulation functions */
/**
* hid_exists_dquirk: find any dynamic quirks for a HID device
* @hdev: the HID device to match
*
* Description:
* Scans dquirks_list for a matching dynamic quirk and returns
* the pointer to the relevant struct hid_device_id if found.
* Must be called with a read lock held on dquirks_lock.
*
* Returns: NULL if no quirk found, struct hid_device_id * if found.
*/
static struct hid_device_id *hid_exists_dquirk(const struct hid_device *hdev)
{
struct quirks_list_struct *q;
struct hid_device_id *bl_entry = NULL;
list_for_each_entry(q, &dquirks_list, node) {
if (hid_match_one_id(hdev, &q->hid_bl_item)) {
bl_entry = &q->hid_bl_item;
break;
}
}
if (bl_entry != NULL)
dbg_hid("Found dynamic quirk 0x%lx for HID device 0x%hx:0x%hx\n",
bl_entry->driver_data, bl_entry->vendor,
bl_entry->product);
return bl_entry;
}
/**
* hid_modify_dquirk: add/replace a HID quirk
* @id: the HID device to match
* @quirks: the unsigned long quirks value to add/replace
*
* Description:
* If an dynamic quirk exists in memory for this device, replace its
* quirks value with what was provided. Otherwise, add the quirk
* to the dynamic quirks list.
*
* Returns: 0 OK, -error on failure.
*/
static int hid_modify_dquirk(const struct hid_device_id *id,
const unsigned long quirks)
{
struct hid_device *hdev;
struct quirks_list_struct *q_new, *q;
int list_edited = 0;
int ret = 0;
hdev = kzalloc(sizeof(*hdev), GFP_KERNEL);
if (!hdev)
return -ENOMEM;
q_new = kmalloc(sizeof(struct quirks_list_struct), GFP_KERNEL);
if (!q_new) {
ret = -ENOMEM;
goto out;
}
hdev->bus = q_new->hid_bl_item.bus = id->bus;
hdev->group = q_new->hid_bl_item.group = id->group;
hdev->vendor = q_new->hid_bl_item.vendor = id->vendor;
hdev->product = q_new->hid_bl_item.product = id->product;
q_new->hid_bl_item.driver_data = quirks;
mutex_lock(&dquirks_lock);
list_for_each_entry(q, &dquirks_list, node) {
if (hid_match_one_id(hdev, &q->hid_bl_item)) {
list_replace(&q->node, &q_new->node);
kfree(q);
list_edited = 1;
break;
}
}
if (!list_edited)
list_add_tail(&q_new->node, &dquirks_list);
mutex_unlock(&dquirks_lock);
out:
kfree(hdev);
return ret;
}
/**
* hid_remove_all_dquirks: remove all runtime HID quirks from memory
* @bus: bus to match against. Use HID_BUS_ANY if all need to be removed.
*
* Description:
* Free all memory associated with dynamic quirks - called before
* module unload.
*
*/
static void hid_remove_all_dquirks(__u16 bus)
{
struct quirks_list_struct *q, *temp;
mutex_lock(&dquirks_lock);
list_for_each_entry_safe(q, temp, &dquirks_list, node) {
if (bus == HID_BUS_ANY || bus == q->hid_bl_item.bus) {
list_del(&q->node);
kfree(q);
}
}
mutex_unlock(&dquirks_lock);
}
/**
* hid_quirks_init: apply HID quirks specified at module load time
*/
int hid_quirks_init(char **quirks_param, __u16 bus, int count)
{
struct hid_device_id id = { 0 };
int n = 0, m;
unsigned short int vendor, product;
u32 quirks;
id.bus = bus;
for (; n < count && quirks_param[n]; n++) {
m = sscanf(quirks_param[n], "0x%hx:0x%hx:0x%x",
&vendor, &product, &quirks);
id.vendor = (__u16)vendor;
id.product = (__u16)product;
if (m != 3 ||
hid_modify_dquirk(&id, quirks) != 0) {
pr_warn("Could not parse HID quirk module param %s\n",
quirks_param[n]);
}
}
return 0;
}
EXPORT_SYMBOL_GPL(hid_quirks_init);
/**
* hid_quirks_exit: release memory associated with dynamic_quirks
* @bus: a bus to match against
*
* Description:
* Release all memory associated with dynamic quirks for a given bus.
* Called upon module unload.
* Use HID_BUS_ANY to remove all dynamic quirks.
*
* Returns: nothing
*/
void hid_quirks_exit(__u16 bus)
{
hid_remove_all_dquirks(bus);
}
EXPORT_SYMBOL_GPL(hid_quirks_exit);
/**
* hid_gets_squirk: return any static quirks for a HID device
* @hdev: the HID device to match
*
* Description:
* Given a HID device, return a pointer to the quirked hid_device_id entry
* associated with that device.
*
* Returns: the quirks.
*/
static unsigned long hid_gets_squirk(const struct hid_device *hdev)
{
const struct hid_device_id *bl_entry;
unsigned long quirks = 0;
if (hid_match_id(hdev, hid_ignore_list))
quirks |= HID_QUIRK_IGNORE;
if (hid_match_id(hdev, hid_have_special_driver))
quirks |= HID_QUIRK_HAVE_SPECIAL_DRIVER;
bl_entry = hid_match_id(hdev, hid_quirks);
if (bl_entry != NULL)
quirks |= bl_entry->driver_data;
if (quirks)
dbg_hid("Found squirk 0x%lx for HID device 0x%hx:0x%hx\n",
quirks, hdev->vendor, hdev->product);
return quirks;
}
/**
* hid_lookup_quirk: return any quirks associated with a HID device
* @hdev: the HID device to look for
*
* Description:
* Given a HID device, return any quirks associated with that device.
*
* Returns: an unsigned long quirks value.
*/
unsigned long hid_lookup_quirk(const struct hid_device *hdev)
{
unsigned long quirks = 0;
const struct hid_device_id *quirk_entry = NULL;
/* NCR devices must not be queried for reports */
if (hdev->bus == BUS_USB &&
hdev->vendor == USB_VENDOR_ID_NCR &&
hdev->product >= USB_DEVICE_ID_NCR_FIRST &&
hdev->product <= USB_DEVICE_ID_NCR_LAST)
return HID_QUIRK_NO_INIT_REPORTS;
/* These devices must be ignored if version (bcdDevice) is too old */
if (hdev->bus == BUS_USB && hdev->vendor == USB_VENDOR_ID_JABRA) {
switch (hdev->product) {
case USB_DEVICE_ID_JABRA_SPEAK_410:
if (hdev->version < 0x0111)
return HID_QUIRK_IGNORE;
break;
case USB_DEVICE_ID_JABRA_SPEAK_510:
if (hdev->version < 0x0214)
return HID_QUIRK_IGNORE;
break;
}
}
mutex_lock(&dquirks_lock);
quirk_entry = hid_exists_dquirk(hdev);
if (quirk_entry)
quirks = quirk_entry->driver_data;
else
quirks = hid_gets_squirk(hdev);
mutex_unlock(&dquirks_lock);
return quirks;
}
EXPORT_SYMBOL_GPL(hid_lookup_quirk);
|
"When Earthsea's thousand and one islands were born" "The Nameless Ones ruled, with their evil energy engulfing the planet." "Until a powerful amulet was forged, from the faith of a devout order of priestesses which kept Earthsea at peace and the Nameless Ones restrained deep beneath the temple on the island of Atuan." "But then the Amulet was broken and evil in the form of Kargide invaders questing to rule the world spread across Earthsea like a plague, leaving only the priestesses' faith and prayer to guard the door and keep the Nameless Ones contained." "An ancient prophecy told of a young wizard who would someday arise to reunite the Amulet and bring a lasting peace to the world of Earthsea." "How's that?" "Well, you're getting better, Diana." "You're practicing conscientiously, studying hard." "You might make it to my level one day." " You mean down really below?" " No." "I mean to take you to the heights." "I mean to take you to places you've never been." "Oh, and you think you know how to do that?" "It's a knack." "I think I've got it." "Oh you do, do you?" " That kind of a knack?" " No." "Not that kind of knack." "But..." "I'm glad you showed it to me." "You have no idea how much trouble you're in, Ged of Ten Alders!" "I thought you could be pleased." "Easy, easy." "Well I'm not." "Ged?" "Ged?" "What is it?" "Ged!" "Ged, what's happening?" "Did you have another one of your visions?" "The one with the door..." " and the girl." " You scare me when you do that." "You're scared?" "Try having visions that make no sense." "May be you should get back to work?" "I'm ok now." "All the more reason for you to go." "Ok..." "I want the power of the Nameless Ones." "But to control their power" "I must first release them." "And I need to know how to open that door, Kossil." "The door's secured by secret means and that secret is secured in a single mind." "The High Priestess Thar, who learnt it from her predecessor, and will teach it to her lovely, lovely successor." "And when I am chosen and learn the secret," "I will slip into your chamber and crawl into your bed" "and whisper it in your ear." "And then, my dearest Kossil, all of Earthsea shall be ours." "So, is this wizard talking?" "No, your Majesty." "Really?" "And that is because?" "He is... dead, Sire." "Ah." "You were perhaps a bit overly... enthusiastic." "He was very frail, Majesty." "But before the end he did, hum..." "Please..." "Tell me." "He confirmed the prophecy, Sire." "That a magus will arise, who will reunite the Amulet of Peace and will end all war on Earthsea." "As I'm well aware!" "What I want to know, is "when" he will arise." "That's what this wizard revealed, your Majesty." " He's already arisen." " What?" "He's here, on Earthsea now, Sire." "At last..." "And his name?" "What... is his name?" "This wizard died before we could extract it, Sire!" "But he did give some insight." ""You will know him by the evil that he does"." "Riddles?" "I hate riddles!" "Make sure you keep the other one alive a little bit longer." "Oh." "Nice of you to drop in!" "Did I miss something?" "Some interesting hammering perhaps?" "Spare me the sarcasm!" "We do this for a living, you know?" " A "living", is that what you call it?" " Aye!" "Earning your keep by the sweat of your brow." "What's wrong with that?" "There's nothing wrong." "It's just that the port of Gont is 20 miles up the coast." "And they say it's bursting with life, full of ships, and interesting characters from all over Earthsea." "You know something?" "We've never been there." "We've never had any reason to go!" "There are 1,000 islands on Earthsea." "Maybe more." "Have you been to any of them?" "Even one?" "I'm sorry if the life I offer you isn't good enough, Ged." "It's the best I can do." "I keep us fed, I keep a roof over our heads!" "What more do you want?" " These repairs need taking back." " Not till you're done here!" " I'll be back before you know I'm gone." " Stop right there!" "Ged, come back here!" "Good as new!" " Your father's work?" " Yes." "No one better at patching a pot." "You make it sound like an insult." "Your father deserves your respect." "And a little compassion, too." "It's not been easy for him, raising a child by himself." "I'm not a child anymore." "Maybe if he tried seeing that." "Maybe if he tried understanding who I am." "Life would have been different for you had your mother lived." "So!" "What's the spell to be, today?" "Is it the one creating ice?" "Should I sit?" "What do you say?" "Actually, I was just going to make myself a salad for lunch." "Would you like some?" "No." "I'm not really hungry." " Marion, how did you learn everything about magic?" " Truthfully..." "I don't remember." "I don't remember anything before the... storm washed me up here." "Your mother took me in you know, and nursed me back to life!" "She was a good woman, your mother." "I wish I could have known her." " She would have been very proud of you." " For what?" "I mean I've hardly done anything." "I probably never will!" "You know..." "I think she would have wanted you to have this." " I can't, that's yours." " Ged..." "It was with me when she found me." "Take it in remembrance of your mother." "Ged?" "Ged?" " They're coming." " What?" "Kargides, I saw them!" " Kargides?" " I have to go." "Ged!" "Ged, where the hell are you going?" "Ged, answer me!" "Don't you run away when I talk to you." "I'm fed up with your disrespect!" " I thought I saw something." " Oh?" "More of your wizard nonsense." "Well, you're no wizard, you're a blacksmith!" "Get used to it." "I won't get used to it." "I'm better than that!" ""Better"?" "You insolent pup!" "I'll..." "Warn the village." "Tell them in to gather the weapons." " To fight Kargide warriors?" " Better to die like men than be hunted down like rabbits." "Go!" "He saw them coming." "Where's that son of yours?" "He'll be here." " There's no sign of him." " I said he'll be here!" " You must remember." " I can't remember, Ged." "Marion, you told me yourself you'd done it before." "So long ago..." " I don't have the strength any more." " I doesn't matter, I do." "All you have to do is remember the spell." "It's about time." "What does he think he's doing?" "I have no idea." "Ged, whatever you're doing, do it quickly because they're coming!" "Stand your ground!" "Ged, take this sword." "Damn you, take the sword!" "Call to them." "Draw them away." " What are you talking about?" " To the high falls!" "You Kargide dogs!" "Run!" "Run!" " Run to the high ground!" " Come on, this way you dogs!" "Move, move!" "Cowards!" "Come on, this way!" "This way!" "I did it." "Ged!" " Follow me." " Yes Sire." "Your Majesty." "To what do we owe this honor?" "I've come to seek spiritual guidance, Venerable Mother." " I hope I can provide it." " I'm sure that you can." "As you know, I've dedicated myself and all the resources available in a effort to bring order to our world of Earthsea." "Word has reached to us of your conquests, your Majesty." "Won at such cost!" "But it's a lengthy process." "There is much resistance." "Have you not asked yourself whether our island nations much be better left" " to rule themselves?" " As a matter of fact, I have." "And the answer was "No"." "Earthsea needs unity and order." "Yes, but if the price of unity and order is so high" "Venerable Mother I didn't come here to discuss my campaigns." "I came here, to tell you of my fears." "My fears that I won't live to see my work completed." "No one knows the time we have allotted, your Majesty." "True." "Maybe except for the Immortals." "The Immortals?" "The Nameless Ones live forever." "Do they not?" "That seems to be true." "So they must possess the secret of that immortality." "Not necessarily." "They are immortal, but they don't know why." "So can they not teach us it?" "The Nameless Ones cannot teach us anything, King Tygath." "They can only destroy us." "Which is why it is my order's vow to insure that they will be restrained forever, and yours to insure our success." "Perhaps robbing Earthsea of great power." "Power for good?" "If it were in the right hands." "There is no right hands for the Nameless One, King Tygath." "Our world almost came to an end, once before." "When another Kargide King had the same reckless notion." "They should never be released!" "And as far as I'm concerned they will never be!" "The wizard is already on Earthsea." "I must control the Nameless Ones before he's able to fulfill his prophesied destiny." " You asked Thar to help you?" " Yes, and she refused." "I can not kill her before the secrets have been passed on, but- she must pass them on soon." "Only to her successor." "Then she must be "encouraged" to select one." " She must select me." " Then see to it that she does." "He saved us, your lad." "Saved us all." "A wizard..." " Who's that father?" " Who is he?" "This is he who wove the spell of concealment?" "Aye." "He died on the High Falls." "Did he, now?" "Who are you?" "Peace, Ged." "You're back with us, now." "Back from where?" "From the darkness." " What did you do?" " I restored your son to you, blacksmith." "His spirit had not yet left him." "Who are you?" " My name is Ogion." " Oh, the Great Wizard!" "How can I repay you, Magus?" "Allow me to give Ged his real name." "No." "He has a name." "My wife and I, rest her soul, we gave it to him!" "Blacksmith, know you not that every living being has a secret name, in which its power resides?" "And in this young man there lies much power." "You want to turn him into a magus?" " You restored him only to take him away?" " I don't know yet." "Would you a least permit him to find out the name his soul should bear?" "Aye." "You are" "Sparrow-hawk" "That is the name in which your power resides." "Tell no one except those you trust with your soul." "For the rest of the world, you must be named "Ged"" "son of the blacksmith of the village of Ten Alders." ""Sparrow-hawk"." "Do you wish to learn the ways of magic, Sparrow-hawk?" "It would mean putting all that you know and love behind you." "Such power..." "Yes." "Then ask your father's blessing." "His blessing?" " Why would I need that?" " Consider it a test, in humility." "Father I wish to study with Ogion to be a wizard." "I ask your blessing on me." "Why should I give it?" "When it means forsaking everything I provided for you." " Giving up the home your mother brought you into the world in - 'Cause it's what she wanted for me, isn't it?" "She wanted us to be a family." "But we're not." "And I now have a chance to be somebody, do you begrudge me that?" "I don't begrudge you, son." "But I do fear for you." "I truly fear." "Ogion." "I'll come back." "You won't." "Will you?" "It was good though, wasn't it?" "I would have gone mad without you." "Oh Ged, I'm not sure I made all that much of a difference." "Just go." "Thanks." "Ged?" "I hope you'll find her." "Find who?" "The girl you've been dreaming about." "The entire raiding party, gone?" "We saw the mist from the ship, Sire." "It swallowed them up and then they were lured over the cliffs." "A very convenient "mist" this, for those villagers." " There was talk, Sire." " Talk about what?" " Talk of wizardry." " Was there?" " And the wizard?" " A young lad, your Majesty." "Unknown until then." "Is that so?" " And his name?" " We never found out, Sire." " But it doesn't signify, he's dead." " Dead?" " Despite his victory over my men?" " He went right over the cliffs in the fight." " Did he, now?" "Well, so be it." "I'm off to join the troops at Yoll, but if there's any more news about" ""unusual wizards"," "I want to be notified at once." "Understood?" " It is my understanding, Sire." " Good." "Cleave foot over seed, mixed every day, for a week." "Thank you." " What would we do without you, master?" " Struggle on friend, as we all do." "I didn't realize being a wizard involved so much animal husbandry." "A wizard's job is to serve the people he lives among, Ged." "Whether their animals are sick, crops fail, or they're threatened by" "Kargide warriors." "Our task simply is to make life on Earthsea tolerable, as I hope you're learning." "Well, frankly magus, since I've been with you I don't feel I've learned a thing." "Is that so?" "Well perhaps that is because you haven't figured out what I've been teaching, yet." " You sent for me, sister Kossil?" " I did." "Come in, Rosa." "I've been watching you with great interest." "And I've come to believe that you have much greater potential than anyone so far has acknowledged." " Potential, sister?" " Yes." "And if I ever become high priestess, I shall see to it that you receive your full due." "Thank you, sister Kossil." " I'm very honored." " But of course... for now... it is my sacred duty to aid, and protect our Mother Thar." " And to that end I need your help." " My help?" "Mother Thar... is unwell." "She goes to great lengths to conceal it." "She stubbornly refuses to take her medication." "We must see that she takes it." "A few drops concealed in her daily tea." "Wh" " Without her knowledge?" " That doesn't seem right." " Is it right to let her waste away?" "Do it, Rosa." "For her sake." "For the sake of our Sisterhood." "You will be rewarded one thousand fold." "Is it true a wizard can move clouds around in the sky so he never gets rained on?" "Yes Ged." "Quite true." "I'd be interested in seeing that." "Perhaps now would be a good time?" "Ogion?" "What's the use of having power if you don't use it?" "That's what I want you to think about, Sparrow-hawk." "All right, I get it." "I said I get it!" "Ogion?" "Not those, Ged." "Much too strong." "But don't I need powerful spells if I am to become a powerful wizard?" "I don't want you to become a powerful wizard." "Until you master yourself." "Which requires years of roaming hills, gathering herbs, learning the nature." "Letting knowledge seep into your bones." "Seep?" "Why is that such a strangely unattractive word?" "I think it's a good word, I like it." "Come, let's eat." "Magus?" "Is there something moving in my bowl?" "You've never heard of eel and fish head chowder before?" "No." "No, I haven't." "This is one of my mother's best." "You'll develop a taste for it over time." "And what is the chief duty of the priestesses of Atuan?" "To bring the strength of the Gods, to Atuan to the High Priestess for the protection of all of Earthsea, sister Tenar." "That's right." "And it is the duty of the High Priestess to use that power to..." "Venerable Mother." "Please." "I came to talk to your teacher." "Tenar, I've just finished going through the examination papers for the young priestesses." "You came... first." "With the highest grade any priestess has ever achieved in the history of our Temple." "Finish your lesson, and come to my office." "I want to talk about your future here." "Begone!" "Begone!" "I command you to return to whence you came!" "What in the name of Earthsea do you think you were doing?" "Have you any idea what almost happened here?" " I'm sorry, I didn't think this" " No, you didn't think." "Did you?" "That's not your style." "Sorcery isn't a game we play for pleasure or for praise, lad." "Every word, every act, of our Art is done for good or for evil." "Before you speak or do you must know the consequences." " All right, I understand." " No!" "Certainly you didn't!" "Or this never would have happened." "This never would have happened if you didn't waste my time gathering useless herbs" " and watching sheep sneeze!" " Oh I've forgotten that you above the work of a humble wizard!" "Just as you're above the work of a mere blacksmith!" "It's not what I meant." "Master, all my life I've been told I was a fool." "A dreamer." "And now I find I have this appetite to learn everything as fast as I can." "Is that wrong?" "You're not wrong." "But not wise." "If you stay with me you'll need patience." "Do you have patience, Ged?" "I know I should say I have, but... that wouldn't be true." "No." "It wouldn't." "Would it?" "There's another way." "And perhaps it might be..." " Have you heard of the Island of Roke?" " The Island of the Wise." "Of course." " But I thought that was..." " For those who have extraordinary ability." "Which you have." "What do you think?" "That's simple." "Stay with me, and let wisdom grow." "Now, you wish you hadn't asked?" "Don't you?" "I don't want to leave you, Ogion." " I owe you my life." " You owe me nothing, Sparrow-hawk." "But if you feel my path is too long and slow, you must make the choice yourself." "Roke Island or Ogion." "Then Roke it must be." "A beautiful island, Gont." "First time away?" "Yeah, I figured you for a land lover." "Well, don't worry about it." "You'll be back home." "Someday." "If you don't mind me asking..." "Oh, easy there." "How did you end up on this tub?" " My magus bartered my passage." " Magus?" "So where are you bound?" "Roke." "What it's like?" "Oh, I've never been to Wizard's Island." "What do you want to go there for?" "I see." "You're one of the powerful ones, eh?" "Well, I'd better stay on the right side of you then." "We'd all better stay on the right side of him if we want a better wind." "Here, stow that there." "Can you do anything about this breeze, young magus?" "No." "Captain, I'm not trained at sea wizardry, but I could... conjure a mist, if you want it?" "Well, a fat lot of good that's gonna do." "Have you any skills with a compass?" "Can you help us steer?" "No, Sir." "I go to Roke to learn these things." "Then you join the oarsmen for you trip my friend, for I afford no passengers here." "Take him below." "Find him an ore." "And take one for yourself as well." "You've coiled more than enough of rope for one day." "Aye, Sir." "Come on, then." "So, how are you at making people disappear?" "We did it, men!" "They won't dare to fight Kargides again." "And Earthsea shall be a safer place for it." "And Atuan a richer one, Sire." "Truly." "I must confide there's something..." "intoxicating about the power of death." "Slitting a man's throat, feeling his warm life drain upon one's fingers." "To control life..." "That, is the greatest power of all." "It's only a matter of time, your Majesty, before we control it all." "And on every island we take, the first thing we seek is information." "Information, Sire?" "About that young magus." "Who we must find, and kill." "To your men, General." "Roke ahoy!" "Rather you than me, in a place like that." "I can't wait to get started." "Doesn't it scare you, that kind of thing?" "No." "I've been wanting this my whole life." "I'd rather be sailing into a raging squall any day." "But, I wish you luck." "Who goes there?" "Who is it?" "Ged." "Son of Dunain..." "Yes?" "I bear a letter from the mage Ogion, for the Arch Magus of the school." "Very well." "Enter, if you can." "I can't enter without your help." "How true!" "But I can't help you if you don't tell me who you really are." "Sparrow-hawk" "I'll take your letter to the Arch Magus." "Messengers are meant to wait by the river entrance." "That could be, but I'm no messenger, I've come here to study." "Disguised... as a peddler." "Do they consider that a jest, here at Roke?" "You're obviously from somewhere distant and... doubtless obscure..." "Allow me to inform you, you have the honor of addressing Jasper of Eolg." "Of the house of Havnor." "Ah, Jasper." "I'm glad you've taken the initiative of welcoming the new arrival." "I am Arch mage Nemmerle." "Arch Magus of this school." "It's an honor to be here, Sir." "Listen to this... from Ogion of Gont." ""I send a young man who could be one of the great wizards of Earthsea -"" ""if the wind blow true."" "Quite a testimonial, from a wizard of such esteem." "Most impressive." "Especially coming from one of Roke's prized graduates." " Ogion went here?" " Oh, yes." "A most distinguished alumnus." "Welcome to Roke, Ged of Ten Alders." "And may your stay here be profitable to you." "and to Earthsea." "Jasper." "Arch Magus?" "Show Ged around." "Introduce him to his fellow students." "Explain some of our traditions." " Now, Arch Magus?" " Yes, why not now?" "Tomorrow you'll start a program of studies which will not cease until you have become all that it is in you to become." "Which if Ogion is right, is quite a lot." "Well..." "Where to start?" "I wonder what it feels like to be a beginner." "It's been so long!" "This way, then." " Could use a bit of salt." " Ah..." "Vetch!" "The perfect table companion for you, Ged." "Vetch is a fisherman's son, so he can tell you about... bait, and as you're a blacksmith's lad, you can tell him all about, hmm bellows." "He's very good at that." "Cutting remarks, painful innuendos, humiliating insinuations." "If his magic were half as good!" "Let's get you some food." "You got anything actually edible in there?" "You know, hidden away?" "It's this lad's first day, so..." "Show some compassion." " Where are you from, Ged?" " Gont, and you?" "Vemish." "Ah..." "Vemish." "Well." " You've never heard of it, have you?" " Not really, No." "Not really?" "I'll let you off with that this once, but what you have to understand, my friend, is that Vemish is the paradise" " of Earthsea." " Has he been bending your ear about Vemish?" "Ignore her, Ged." "Look." "Vemish..." "Is right next to Iffish." "Which is just across..." "Fkutark." "And this..." "This is the bay where you can hear the mermaids singing in the moonlight." "Welcome to Roke, Ged." "Oh Tenar, you do make me laugh." "Oh, Kossil?" "I have some very good news." "Tenar here, has just graduated first, among the younger priestesses." "Well done Tenar." "I'm so pleased for you." "I remember when you first came here." "A lost, frightened little orphan." "Full of questions..." "You were a charming little waif." "Thirsting for understanding." "Wasn't she, Venerable Mother?" "And you Kossil..." "You are so... so formidable." "I'll take that as a compliment." "I've allowed you to take on far too much work over the years." "I decided to ask Tenar to take on some of your responsibilities." "As you wish, Venerable Mother." "Are you unwell?" "Something must have disagreed with me." "If you'll excuse me, I need to lie down." "Lesson fourteen, in the lesser Art of Changing..." "The pebble." "Get on with it, Ladies and Gentlemen." "I was hoping for a pancake." "I guess this will do." "That is good." "Brilliant." "What, are you trying to make me feel inferior?" "Diamonds!" "Well done, Ged." "Look at these, everybody." "Perfect... diamonds." "And these... are for you." "Well, that didn't last long." "You didn't expect it to stay that way, did you?" "Why shouldn't it, if the magic is strong enough?" "Because to change a rock in to a jewel you must change its True Name." "It can be done." "But it should not be done." "Not even to a single grain of sand until you know the good and evil that'll follow." "I don't understand." "Good and evil, isn't it just turning one thing into another?" "If the isles of Earthsea were turned into diamonds, how many people do you think would survive?" "Things are... as they are... for a reason." "At least you must understand that reason before you decide to change them." " That's fine." "But I still want to know how to do it." " I'm sure you do, Ged." "I'm sure you do." "But you will not learn it here." "Not until you learn true wisdom." "In some ways, this is the most dangerous of the Arts." "Because you're making things move through time and space, at your command." "As when I make this creature appear." "Venison!" "I've never known anyone to see the entire world though their stomach before." "Now you do, my friend." "Master Summoner, you spoke of time as well of space." "Does that mean a wizard could conjure anything, dead or alive?" "No wizard would conjure off the dead, young man." "Because they cannot be sent safely back to where they came from." "That's not gonna get you out of here any sooner than the rest of us." "I don't wanna leave." "Every time we learn the True Name of something we gain power over it." "I wanna gain as much power as I possibly can." "Well, done another one." " Master Namer, I'll take my next!" " Yes, another?" "Yes... right." "Right away." "You were in the middle of..." "Let me see..." ""Camus"..." ""Caster", "Service"..." "Yes... here we are." "At this rate you're going to be the most powerful wizard on Earthsea." "And the most annoying show off." "Come on, we've been on a steady diet of words for the last three months" "I want something you can actually chew!" "What's going on here?" "It appears the "Amazing Jasper" is going to summon something." "The young aristocrat's condescending to put on a magic show?" " Methinks he does it to impress the ladies." " I didn't realize they are that easy to impress." "Blacksmith!" "Perhaps you'd like to... impress us with a demonstration of your own." "You could make something minuscule seem enormous." "Your brain for instance." "You may wanna try that trick on yourself Jasper, just... aim a little lower." "Are you sure you want to try this?" "Why not, I think it will be quite an adventure." "Look how free it is!" "Besides, any wizard worth his salt should be able to shapeshift." "No one's questioning ability here, it's just a minor matter of breaking the rules." "Meant to be broken, Vetch!" "Meant to be broken." "Try saying that to the Arch Magus!" "Speaking of breaking the rules..." "I hear the splendiferous Jasper is going to be offered the wizardship of Pender, when he graduates." "It's quite a coup for someone his age, wouldn't you say?" "I'm sure he deserves it and he'll do a wonderful job." "Oh please..." "We both know he's a second rate show-off with the big head and rich relatives." "People like having an aristocrat for their wizard." "He'll do fine." "Yeah, well... you'd do much better." "Maybe if certain people shut up for a minute." "All right." "All right, watch this." "I think I finally got it." "Ged, you did it!" "I mean..." "What have you done?" "This is crazy, Ged!" "And dangerous!" "Yeah, I'm yelling at a bird." "Tried shapeshifting yet, Jasper?" "It's much more impressive than making apple trees, don't you think?" "There's no need for me to name the student who did this." "He knows who he is." "But I want to take this moment... to warn you all of the dangers of Shapeshifting." "You may have heard the tale of the wizard Voger of Wave, who delighted in taking the shape of a bear, and did so more and more often until the bear grew in him and the man... died away." "And he became the bear and killed his own small son in the forest." "And was then hunted down, and slain." "This shapeshifting business is not something to be toyed with!" "Is that understood?" "Understood, Arch Magus." "You're even lower than I thought, Jasper." "I don't know what you're talking about." "I'm talking about you sneaking to the Arch Magus about my doing something you can't!" "You have no idea what I can and can't do, little man." " We don't run in the same circles." " You think I'd want to?" "Oh, you want to, Blacksmith boy!" "Your whole life's spent trying to become something you're not." "The more you try to prove yourself my equal, the more you show yourself for what you really are!" "Ah yes..." "Brute force and ignorance, eh?" "The tools of your trade!" "Well, it's magus power we value here, not horse power!" "You think you have more magus power than I do?" "That sounds like a challenge!" " All right Blacksmith, I accept." " It wasn't a challenge!" "Tell him, Ged." "Stop this both of you, duels in sorcery are forbidden!" "You know that!" "There you are, bumpkin, a way out." "Feel free to back off!" "So, what'll it be?" "Ged, leave it alone." "What about summoning a spirit?" "You think I can't do that?" "From the dead." "What about the Lady Elfarren?" "Could you summon her, or would that be to hard for you?" "Are you out of your mind?" "It's fine with me." " Ged, don't do it!" " Why not?" "Why not, indeed?" "Roke Woods, midnight." "You're not a summoner, Ged." " And as for the Lady Elfarren..." " Why not her as well as anyone else?" "Jasper, give this up!" "Doing sorcery without reason is like lighting a fire in a forest." "You know that, tell him!" "It doesn't matter..." "He can't do it." "He hasn't got it in him." "Well, that's what he has to learn." "We'll see." "Arise all of you!" "I need your strength." "What's happening?" " The Nameless Ones, we need to pray" " I'll wake the others!" "I summon you, Lady Elfarren!" "Try to keep up, sisters!" "Pray sisters!" "Pray!" "Be still!" "What have you done?" "Get it off!" "Are you all right?" "No, Tenar.." "Something horrible happened here tonight." "Something beyond anything I've known." "May our faith prevail." "I saw him..." "Who?" "And it was as though I knew him." "My liege!" "Ah..." "General Doar, just in time." "Is it true, Sire?" " We are invading Roke?" " We are indeed, General." "Our magus has just revealed himself." "Come, set sail, and have the rest of the fleet follow us as soon as they've put up to sea." "Arch Magus." "Ged." " Be still, my son." " Where am I?" "This is the first time you've opened your eyes in days." "How are you feeling?" " Get them off of me!" " Certainly, certainly, but you must" "I'm so sorry." "be thankful of these." "They've done, what my spells have not been able to achieve." "So ashamed." "I too am ashamed of you." "And of this institution for producing someone who could commit such an act of folly." " Arch Magus I didn't..." " You have great power in you Sparrow-hawk." "And you utterly misused it!" "You tried to summon a spirit of the dead." "And instead you brought out the most fearsome being our world has ever known." "You released a Nameless One." "I saw it as a shadow." "The shadow of your ignorance." "The shadow of your arrogance." "You brought a being of utter evil into the world, whose only objective, its deep, soul-gnawing hunger will be to find you." "And possess you." "Possess me?" "Devour your soul." "And as your powers are great, so when that happens it will become great and all Earthsea will be endangered." "It is a shadow now, but soon it will kill, absorbing its victim's body to become a creature even more horrible!" "A Gebbeth!" "And then you will really have reason to fear it." "Is there no way to defeat it?" "None!" "Unless you know its True Name." " Then I must go to the Master Namer." " Ged..." "He has no way of knowing." "Then what am I to do?" "As soon as you're strong enough you must leave Roke, never to return." "Leave Roke." "Go where?" "Wherever in the world it will least expect to find you." "That is your only hope." "But get well first." "You'll need all your strength." "At the moment we were blown to the floor, the young wizard was attacked by this, this great shadowy beast." " It was horrible." " Who is this wizard?" "I don't know." "If your vision be true, this is a particularly evil magus." " How so?" " Because... if the two events are related it would signify the most ominous act." "One of the Nameless Ones was released." "There has never been anybody or anything in the history of our Temple powerful enough to overcome our faith." "But what happened at the Door might have been beyond my powers." "And if that is so, our Temple is endangered." "No." "No, not with you to lead us, Venerable Mother!" "I don't know that I still have the strength my mission requires." "Ged." "I am so glad to see you." "We were all afraid you were going to die." "How do you feel?" "Frail." "Furious with myself and very very stupid!" "I really made a mess of things, didn't I?" "Yeah, on an epic scale." "But, you're alive." "That's what matters." " That looks pretty nasty." " Oh, I'm not in pain." "That thing possessed an ungodly strength." "It flicked me aside like a bug!" "Are you hurt?" "My feelings mostly." "But it could have killed you, Ged." "And so it will." "Wh-What do you mean?" "It is my fate." "The Shadow's only purpose is to see me gone." "And to make matters worse, if that's possible, my wizard training here has come to its end." "What?" "The Arch Magus asked me to leave Roke." "That's not very sporting of him." "But this could all work out." "I'm also leaving Roke." "I've gotten my appointment as a wizard!" "You finished the course?" "You got your staff?" "Believe it or not!" " I'm so happy for you." " And guess where the job is." " Home!" " Vemish?" " "Paradise on earth" that's wonderful!" " That settles it..." "You're coming with me." "We're going to Vemish together." "I appreciate the offer, Vetch." " I can't tell you how much that means to me" " But?" "I can't do that to you." "I've become a fugitive, to be hunted by the shadow till I'm done." "I can't bring that into your life." "Or the life of the people you'll be looking after." "All right." "But if you ever need me call on me by my True Name." "Astario" "I am Sparrow-hawk" "Till we meet again, my friend." "There's Roke now, Sire." "We've beaten the rest of the fleet by at least a day." "Good." "That's strange, what do you make that to be?" "There!" "Action Stations!" "Yes sir!" "Who the hell are you?" "Arch mage Nemmerle." "Arch Magus of Roke." "You certainly know how to make an entrance." "Arch Magus, to what do I owe this... pleasure?" "My desire to avoid unnecessary loss of life, Tygath!" "Really?" "And what loss of life would that be?" "The loss of life if you tried to take Roke." "Because the weapons of Roke are formidable." "Oh, I'm sure they are!" "All I want really, is some information about some insignificant young magus." " Not available." " The magus?" " Or the information?" " Neither." "Tygath" " and that is final." " King" "Tygath!" "Seize him!" "Draw back while you still can, Tygath!" " Before you annihilate us all." " Kill him!" "How dare he talk to you like that, Sire!" "You heard him..." "he's the "Arch Magus of Roke"." "Soon to be a memory." "Now..." "When the rest of the fleet arrives" "Have half of them, fan out from here, and scour every island within a day's sailing radius from Osskil to Illion." "Certainly, Sire." "And the other half?" "Have them pay this pompous, chief magician a house call." "Listen mate, I didn't know she was your wife, and from what I gather, I'm not the first, you know?" "Ged!" "I can't believe it." "Want some more?" "Come on!" "He was a bit of a rough job, aye?" "Let me get you a drink!" "Here, come on." "Cheerios!" "What are you doing here on Osskil?" "I'm... really not sure." "And you?" "I'm on my way home after a profitable voyage." "And how is that charming captain of ours?" "I've long since pulled of that barge." "But tell me, the last we met you were on your way to becoming a wizard, weren't you?" " I am a wizard." "Sort of." " Well, good show!" "Where to next?" "Actually things didn't go all that well at Roke." "Oh really?" " I created a bit of a stir." " Oh... how so?" "Let's just say I've taken the trout." "Well, it's not that bad, is it?" "Listen." "You ever heard of a place called Teranon on the other side of the island?" " I cant' say that I have." " Now you have." "That's where I'm heading" "And from what I've heard, there hasn't been a wizard there in years." "Why don't you come with me?" "We lodge here tonight, leave in the morning." "There's a very fine goat house there." "If you don't mind paying for it." " You got a deal." " Ah, Cheers!" "Barkeep!" "Another jug of you finest ale for my long lost friend." "Oh, this is a bleak place." "I suppose it's more cheerful on the other side of the mountains." "I was saying I hope it's more cheerful where you come from." "Not a living soul for hours." "How much farther to the other side of island, Skiorch?" "I could do with some food and a bath." "Have you fallen asleep on your feet?" "How much farther?" "What's wrong?" "Skiorch!" "The Gebbeth!" "Ged" "Sparrow-hawk..." "Are you a messenger or a message?" "You seem strangely familiar." "Did I not name you once?" "You've seen some trouble since we last parted, I think." "I return, Master, as I left." "A fool." "Let's see what a good fire can do." "Bring back some memories?" "Yes, it reminds me of why I left." "Get it down you, and get on with the story." "And so I transformed myself." "If you hadn't brought me back, that would've been that." "He will find me sooner or later." " Unless you know its name." " No one knows its name." "So you must defeat it." "Defeat it?" "I fought it twice, and twice I fled in terror." " Perhaps the third time is the charm." " Ogion, I've no strength against it." "And if you're going to suggest that I stay here, the answer is no." "I'm not inflicting that thing on you." "Good." "But in that case" "I have a hard thing to say to you." "Say it." "You must turn around." "Turn around?" "Yes." "If you keep running the evil will drive you, choosing the way you go." "You must do the choosing." "You must seek... what seeks you." "And have it devour me when we meet?" "So that I'm its creature, and my powers are a danger to all of Earthsea?" "You must make this Gebbeth your own." "If you're a fugitive when it finds you, if you abuse your strength and flee, it will prevail." "But if you're doing the seeking..." "I'll be able to destroy it?" "I can't tell." "But it's the best counsel I can give you." "If you want to cease being hunted you must become the hunter." "You know I've walked with great wizards and lived on the Isle of the Wise," "but you are my true master, Ogion." "Better late than never." "But you may be my master in the end." "Thank you, magus." "May it serve you well." "And now, master," "I must go hunting." "You called for me, Venerable Mother?" "Sister Kossil." "Our world is darkening and I grow weaker." "The time has come to appoint my successor." "You wish me to call the priestesses into conclave?" "That is what I wish." "They all know you as my strong right hand." "It's time they also knew who will lead the Temple, when I'm gone." "I understand completely." "Just... rest and relax." "I'll arrange everything." "You're there Gebbeth, aren't you?" "Well, here I am." "Why are we not inside as yet?" "Are your men incapable of breaking down a door?" "They cannot fight magic, your Majesty." " Who said that?" " Jasper of Eolg." " Of the House of Havnor." " Oh, Yes." "How ageable to finally meet you in the flesh." "Jasper of the House of..." "You've served me well." "If I were to open that door for you... and you seize all of Roke... you would be needing a new Arch Magus?" "Would you not?" "And..." "I gather you have someone in mind." "Just... get me in there." "Jasper." "Sisters..." "As our world darkens with each Kargide conquest, my health continues to fail, so" "I feel the time has come for me to name she... who will carry the secrets of the Tombs, after me." "I, hereby bestow, the Great Belt of Keys, to she who will be the next High Priestess." "That's impossible!" "The doors are impenetrable." "You should ask for you money back." "Jasper?" "No... not you." "We have given you power to bring light and goodness to the world." "And instead you have chosen darkness and evil." "You break my heart." "No..." "I think I'll do that." "Here..." "I believe this is yours." "You must have dropped it." "Come to me and receive the tokens of your office," "sister Tenar." "Sister Tenar." "Come to me." "I've been waiting for you, Ged." "And the waiting is over." "Stop!" "If you destroy me, you destroy us both." "So be it!" "I brought you into this world, and I will take you out of it." "No." "You must take me in, into your soul." "so together we can be great!" "You mean "evil"." ""Evil"?" ""Good"?" "Just words." "Accept me." "Let my power flow through you and anything is possible!" "Exactly!" "If you can't be alone, Shadow, it'll happen to both of us." |
Pets Deserve Evidence-Based Medicine, Too, Says The SkeptVet
Enlarge this image toggle caption katoosha/iStockphoto/Getty Images katoosha/iStockphoto/Getty Images
Hunting for good medical advice for your ailing kitty or pup? You'll find no shortage of ardent testimonials and ads for sketchy or unproven treatments on the Web.
Silicon Valley veterinarian Brennen McKenzie worries that some of the same pseudoscience that is rampant in human medicine is leading pet owners astray.
McKenzie's blog, The SkeptVet, aims to bring a calm voice of evidence-based skepticism in analyzing medical options for dogs and cats. McKenzie works at the Adobe Animal Hospital in Los Altos, Calif., and is a past president of the Evidence-Based Veterinary Medicine Association. Once a researcher who studied monkey behavior, he earned his veterinary medicine degree from the University of Pennsylvania in 2001.
The SkeptVet is a labor of love; McKenzie gets no outside funding for it. I recently spoke with him about blogging, pseudoscience and his 19-year-old pet corn snake. The interview has been edited for length and clarity.
Why does the world need skeptical veterinarians?
Pet owners need to know the pros and cons of health care options for their pets to make good decisions. "Skeptic" doesn't mean someone who automatically rejects new or unfamiliar ideas. It's someone who refrains from judging a claim until they have examined the evidence dispassionately — someone who gives preference to scientific evidence over personal experience, anecdote, tradition or history.
That's particularly critical on the Internet, where information about alternative therapies is most often marketing information. Or it's provided by people who obviously believe in these therapies and don't necessarily want to disclose their limitations. Pet owners who have a negative experience with a therapy rarely bother to tell anybody else about it.
In your writings, you speak out a lot against veterinary pseudoscience. What are some examples?
Pseudoscience takes the form both of recommending things that are not helpful and discouraging the use of things that are. There are certain therapies that we know are not helpful because there's been adequate research and study showing that. A classic example is homeopathic remedies, which true believers will argue can cure cancer, autoimmune disease or almost any illness, in both pets and in people.
Homeopathy makes the claim that administering a substance that triggers disease symptoms can have curative powers, if it's diluted in water or alcohol to the point where none of it actually remains. The substance can be nearly anything — from a plant or animal to moonlight or a piece of the Berlin Wall. Homeopathy has never been shown to be useful in good-quality scientific studies.
These homeopathic products are available over the counter in most pharmacies despite being useless, because they are generally considered harmless (except, of course, when used as a substitute for effective medical treatment). Any direct harm of homeopathic remedies typically comes from improper production, which leads to biologically significant levels of the original material or to contaminants. That is uncommon, although of course it does occur.
On the flip side is pseudoscience that undermines what we know about science-based medicine. Take anti-vaccine activism: Some people claim that veterinary vaccines should be avoided because their risks are greater than their benefits and they cause all sorts of horrible diseases. But there's no evidence that vaccines actually do that.
What about widely used conventional treatments in veterinary medicine? Are there any that you think aren't warranted?
Sure. I mean, the beauty and frustration of science is that it progresses over time and that things that we believe at one point may not turn out to be true later. Or that as we refine our knowledge, we have to give up things that we believe in. There are definitely practices like that in conventional, science-based medicine.
One example is annual boosters of core veterinary vaccines for animals. Science has shown for quite a while that yearly boosters for certain specific diseases, such as distemper and parvovirus, are unproductive. It's not clear that it's harmful, but it's certainly not needed. I think that conventional veterinarians have been slow to give that up.
You've blogged about how there are a lot of misconceptions about the pros and cons of neutering a pet. Where do people go wrong there?
I think the biggest misconception is that there is a simple, across-the-board, right answer to if and when you should neuter your pet. That's not the case, because biology is too complex for that. Broad rules such as "every dog should be neutered at six months," or "no pet should be neutered at all" — none of those are justifiable because the answer is, frustratingly, "It depends." It depends on the breed, on the age, on the particular balance of risks and benefits that you're talking about. The reality is that you should have a lengthy, nuanced discussion with your veterinarian about that.
Lots of pet owners will swear that their animals benefited from an alternative therapy, whether it's turmeric or cannabis-based extracts. What's the trouble with relying on these anecdotes?
It's totally understandable why those kinds of experiences are compelling. But things that look to us like simple, straightforward relationships may not be. You know, the classic example is, every time I wash my car, it rains. We know that that is not a reasonable cause-and-effect relationship, because we understand how the weather works. But there were times in history when people believed that your personal actions could influence the weather.
Medicine is incredibly complex, and it is very difficult to identify a true response to a treatment simply by watching to see what happens, based only on our personal observations. Because there are so many factors involved in what happens next. And that's the reason why we have research studies that make an effort to control for sources of error. We know that science works better, because our own individual judgment and observations are not reliable.
What feedback do you get from readers?
With any controversial topic, I get a ton of hate mail. A regular stream of "How dare you — this worked for me and you're just awful" or "You're a tool of the pharmaceutical industry." But I also get a lot of people who write, "Oh, thank God, finally, somebody is willing to ask questions or be critical of these things," because it's often so unpopular to do so.
Do you have pets?
I have two dogs: Max, a 10-year-old Boston terrier, and Brodie, a 4-year-old mutt from the shelter. And I have a 19-year-old corn snake named Tess. My wife, who is both afraid of snakes and a wonderfully supportive person, bought me a snake when I was in vet school because I wanted to learn more about exotic pets. I don't think she realized that corn snakes can live well into their 20s.
Have you ever tried a therapy for your pets that didn't have much scientific evidence behind it?
I previously had some dogs who were older and had arthritis, around when I first started practicing veterinary medicine. I put one of them on glucosamine because more experienced colleagues said it was helpful. I hadn't yet started looking at evidence-based medicine. I did not perceive any change in my dog, and overall, the scientific evidence of meaningful benefit from glucosamine is very weak.
But being a skeptic doesn't mean that I'm saying people should never use these kinds of things. There are definitely circumstances where trying something for which there is very little evidence is totally appropriate. I'm simply saying that pet owners need to be fully informed about the uncertainty and risks and benefits involved. |
In Search of Deeper Blues: Trans-N-Heterocyclic Carbene Platinum Phenylacetylide as a Dopant for Phosphorescent OLEDs.
A trans-N-heterocyclic carbene (NHC) platinum(II) acetylide complex bearing phenyl acetylene ligands (NPtPE1) has been synthesized via the Hagihara reaction in 64% yield. The complex features spectrally narrow deep blue emission with a phosphorescence quantum yield (0.30) and lifetime (∼10 μs) in the solid state. The modest quantum yield and lifetime make NPtPE1 a candidate for incorporation into an organic light emitting diode (OLED). Prototype devices exhibited a maximum EQE of 8% with CIE (0.20,0.20). To the best of our knowledge, this is the first example of a platinum(II) acetylide bearing NHC ligands to be incorporated into an OLED. |
Flipping the cyclin D1 switch in mantle cell lymphoma.
Mantle cell lymphoma (MCL) is a rare, aggressive subtype of B cell NHL for which there is no standard of care. It is characterized by the t(11;14) translocation, implicating cyclin D1 (CCND1) in its pathogenesis. Cyclin D1 is one of a family of 3 unlinked D type cyclin genes, CCND1, 2, 3. CCND1 is not expressed in normal B cells. Deregulated expression occurs as a result of juxtaposition of cis IgH enhancer elements, Eμ and 3' Cα, to the cyclin D1 gene. These enhancer elements and regions upstream of the CCND1 gene are hypomethylated on the translocated allele. Histones surrounding the translocation have shown hyperacetylation as well, a hallmark of transcriptionally active chromatin. The t(11;14) translocation is an epigenetic event, leading to cyclin D1 deregulated transcription. These findings provide the rationale for the use of epigenetic and targeted cyclin D1 therapies to overcome resistance and induce durable remissions in MCL. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.