text stringlengths 8 5.77M |
|---|
Letterboxing, like any outdoor sport, carries the risk of unforeseen hazards. "Letterboxing North
America" supports a policy of not knowingly placing letterboxes in areas that will create undue risk to the
letterbox hunter. However, as conditions may vary, it is the responsibility of the letterbox searcher to
become thoroughly familiar with the conditions in the area to be searched, to adequately prepare for
those conditions, and to conduct oneself safely and responsibly with respect to those conditions and with
respect to his or her personal abilities and limitations. "Letterboxing North America" and the individual
letterbox sponsors assume no liability for events which may occur related directly or indirectly to one's
searching for a letterbox.
Do not let children hunt for letterboxes unsupervised.
By reading and utilizing the letterbox clues posted on this web site, you acknowledge the above
conditions, and accept responsibility for your own actions, and agree to hold non-liable the clue writers,
website authors, and letterboxing organizations and further, agree to provide this disclaimer to any
person with whom you share these letterbox clues. |
Israeli newspaper Yediot got their hands on the European Union’s 40-point plan to “pressure Israel into negotiations” in the wake of Netanyahu’s re-election.
An EU diplomatic source told Ynet that there was a definite chance that the recommendations in the report, which the member states have yet to approve, were more likely to be implemented following Prime Minister Benjamin Netanyahu’s statement during his election campaign that a Palestinian state would not be created under his rule.
“We are on a collision course,” said the European diplomat. “It’s clear to everyone in Brussels that there must be a response to these statements.”
…”If Israel continues its policy beyond the Green Line, it will affect the relationship between European nations and Israel,” he warned. |
Quiz: Howstuffworks
Do I Have a Chance With Him?
Emily Maggrett
Image: Morsa Images/DigitalVision/GettyImages
About This Quiz
He's been DMing you a lot lately and you're picking up vibes, but does he actually like you more than a friend? If you can't tell whether he wants to get to know you better or is stringing you along, take this quiz to solve the mystery. Because if he likes you, that's lit, but if he doesn't, you've got places to go, hair to get did and no time for fools!
To figure out his true intentions, we're going to ask you about how often he texts you, what you two talk about and if he finds excuses to low-key cuddle. Maybe he hasn't caught feelings for you yet, maybe he's caught them but isn't sure whether he wants to date you, maybe he's attracted to your banging bod but isn't ready for a relationship or maybe he's TOTALLY into you and you're too shy to see it! Either way, this quiz will help you to find out the truth.
As you answer these questions, please be real AF. We need receipts to figure out what his true feelings are about you. Don't get salty — we just wanna make sure you're not wasting your time. So are you ready to find out what's up? Stop re-reading his last three texts and play this quiz!
How did you meet?
At school or work
Through a dating app
Through mutual friends
Through a very litty hobby
Is he single?
Not yet! 😜
I don't know!
It's complicated. 🤷♀️
Boy makes a point of mentioning it every time I see him. 😍
Have you two ever kissed?
No
No, but we send each other NSFW messages.
Yes
We're kissing on the regular.
Do you two chill one-on-one?
No, only in groups
Yes, but only late at night, if you know what I mean.
No, but we've been talking about doing something like that soon.
Yuh, that's totally our vibe.
When you're together, how often does he check his phone?
Basically the whole time
Every 15 minutes or so
Once an hour
He doesn't look at it unless it buzzes!
You post a thirst trap on Instagram. He ... ?
Doesn't do anything
Likes it
Leaves a flirty comment
DMs you immediately
How many times a day does he text you?
Never, unless I've been texting him.
Once or twice (around 2 a.m.)
Three times a day
All. Day. Long.
Does he tell you that you smell good?
No. But if I smell rank, he points it out.
Yuh ... when he gets close. 😜
Yup, if I'm wearing perfume.
All the time, fam!
What do you two usually talk about?
We haven't had many one-on-one conversations.
We don't exactly "talk."
We talk about memes we both like (and there's a lot!).
E V E R Y T H I N G. We're like best friends.
Do your friends think he likes you?
No, but IDGAF.
They think he likes "certain things" about me.
The fam can't decide!
BET.
When you complain about other guys sliding into your DMs, does he act jealous?
(Sigh.) Not. At. All.
No, no matter how much I talk about it!
Sometimes (and I 💖 it!).
Yeah, he's big jealous.
You show up for a night out wearing something racy. He ... ?
Doesn't notice
Says, "You look like a snack"
Makes a point of talking to you all night
Says, "Marry me! Just kidding. Maybe."
When you're around, does he flirt with other people?
... Yes.
I don't want to talk about it. 💔
He did once, then I mean-mugged him and he cut it out. 😀
Absolutely not. 💕💕💕
Has he ever left you on read?
Yes. If he actually responds, I'm shocked.
Yeah, but I still like him!
He doesn't do that often because he knows I'll get salty. 😈
That boy would never!
If you got a flat tire, would he show up and change it for you?
Not in a million years, bruh.
Nope. Dude would tell me to call AAA.
Yes, if he wasn't already at work.
In a heartbeat!
What kind of emoji does he use when he texts you?
🤷♂️
🍆
🍑
💖
Has he ever told you that he thinks you're smart?
Nah. More like the opposite. 😱
Nope, and I'm salty about it!
Yes, he's said that a couple times.
Bruh, he tells me I'm smart and amazing every. Single. Day.
Does he hug you a lot or offer you massages?
No. I offered him a massage once, but he turned it down!
No on the hugs, yeah to the massages ...
If we're chilling together, we're cuddling.
Yuh. He wants to "relieve" my "stress."
Are there other people that he's interested in?
OMFG, yes.
Yes. But just thinking about that makes me feel shook.
IDK. I hope not!
Haha, not at all.
Does he start text conversations with you or does he just reply to your texts?
He's never initiated a chat with me.
He DMs me, but only when he wants something.
We text each other an equal amount.
He contacts me more than I contact him.
Have you ever tried to DTR (define the relationship)? What did he do?
We don't have a relationship, so we can't DTR it. 😒
He ghosted me faster than the speed of light!
Yes, but then I chickened out, TBH.
He actually seemed relieved I was bringing it up!
You say, "I wish I could find a guy who really cares about me." He ... ?
Says, "Well, I guess there's someone for everyone."
Says, "I hope you find that too, but it ain't me."
Says, "Maybe you already do."
Says, "You do! It's me!" and then kisses your face off. 😆
Does he only flirt with you in the summer or during festival season?
He's never flirted with me, bruh.
Oof. Maybe, okay?
I thought it was just a summer thing, but boy keeps hanging around.
He's sweet no matter what the weather's like. YKTV. 😉
Has he ever complimented someone else in front of you?
Yes ... my best friend. 😫
Yeah. When I called him out on it, he got salty instead of apologizing.
Only in a platonic way
When I'm around, no other people exist. 💗
If you did a slow fade from his life, do you think he'd notice?
Nope. He wouldn't. 😖
Maybe? I'm not totally sure. 🤷♀️
OFC. And he wouldn't like it!
He'd be shook. We see each other almost every day.
Does he find dumb excuses to be physically close to you?
No. In fact, he doesn't like being alone with me.
Yaaaas.
Yeah. He loves "showing me" how to do stuff.
Bet. It's almost like a game we play.
How does he introduce you to other people?
"This is my coworker, [your name.]"
"This is my friend with benefits, [your name.]"
"This is [your name.]"
"This is [your name.] You know, the cutie I was telling you about the other day?"
When you make a mistake, how does he act?
He acts annoyed AF.
He pretends like he didn't notice.
He uses it as an excuse to tease me.
He gets so extra about it that we end up "wrestling."
Is he interested in meeting your fam?
Nah. He seems bored AF whenever I talk about them.
No. I brought it up once, and he immediately dipped. 😭
Maybe. At least he doesn't fall asleep whenever I talk about them.
Girl, he texts WITH MY MOM.
Let's say that you finally told him that you liked him. How do you think he'd respond?
I know that boy is into me ... I'm just waiting for the right time to make my move.✨
Sponsored Links
About HowStuffWorks Play
How much do you know about dinosaurs? What is an octane rating? And how do you use a proper noun? Lucky for you, HowStuffWorks Play is here to help. Our award-winning website offers reliable, easy-to-understand explanations about how the world works. From fun quizzes that bring joy to your day, to compelling photography and fascinating lists, HowStuffWorks Play offers something for everyone. Sometimes we explain how stuff works, other times, we ask you, but we’re always exploring in the name of fun! Because learning is fun, so stick with us!
Get smarter every day! Subscribe & get 1 quiz every week.
Playing quizzes is free! We send trivia questions and personality tests every week to your inbox. By
clicking "Sign Up" you are agreeing to our
privacy policy and confirming that you are 13
years old or over. |
defmodule Mix.Tasks.Phx.Digest.Clean do
use Mix.Task
@default_output_path "priv/static"
@default_age 3600
@default_keep 2
@shortdoc "Removes old versions of static assets."
@recursive true
@moduledoc """
Removes old versions of compiled assets.
By default, it will keep the latest version and
2 previous versions as well as any digest created
in the last hour.
mix phx.digest.clean
mix phx.digest.clean -o /www/public
mix phx.digest.clean --age 600 --keep 3
## Options
* `-o, --output` - indicates the path to your compiled
assets directory. Defaults to `priv/static`
* `--age` - specifies a maximum age (in seconds) for assets.
Files older than age that are not in the last `--keep` versions
will be removed. Defaults to 3600 (1 hour)
* `--keep` - specifies how many previous versions of assets to keep.
Defaults to 2 previous versions
"""
@doc false
def run(args) do
switches = [output: :string, age: :integer, keep: :integer]
{opts, _, _} = OptionParser.parse(args, switches: switches, aliases: [o: :output])
output_path = opts[:output] || @default_output_path
age = opts[:age] || @default_age
keep = opts[:keep] || @default_keep
{:ok, _} = Application.ensure_all_started(:phoenix)
case Phoenix.Digester.clean(output_path, age, keep) do
:ok ->
# We need to call build structure so everything we have cleaned from
# priv is removed from _build in case we have build_embedded set to
# true. In case it's not true, build structure is mostly a no-op, so we
# are fine.
Mix.Project.build_structure()
Mix.shell().info [:green, "Clean complete for #{inspect output_path}"]
{:error, :invalid_path} ->
Mix.shell().error "The output path #{inspect output_path} does not exist"
end
end
end
|
Again, Quentin was already walking towards the mound. The situation had already escalated and from every video I have seen Greinke's initial response seemed to be a raise of his head and say something, not shout it. Quentin then started running towards the mound, by that point there was nothing anyone could do to stop the fight. Greinke did throw his glove aside.
There is a sort of macho element that was at play here obviously. I get the sort of psychological need for a pitcher to feel bulletproof and that he owns the plate or the mound or whatever. When a batter is charging the pitcher, he can't just run away. He shouldn't throw his glove aside and get ready to throw down though either, really all he can do is hope that the catcher can get in between him and the batter.
Watch the video again. He clearly says something. I'm not as skilled at reading lips as VC, but it does look like he's saying, "What?" There's no question he spoke.
I think the question is how did he say it. He clearly says two things. The first is when Quentin is walking towards him and he did not appear to be shouting in that video. When Quentin starts running at him, Greinke throws his glove aside and says something else.
Again, Quentin was already walking towards the mound. The situation had already escalated and from every video I have seen Greinke's initial response seemed to be a raise of his head and say something, not shout it. Quentin then started running towards the mound, by that point there was nothing anyone could do to stop the fight. Greinke did throw his glove aside.
He could've either started backpedalling or running the other way. He threw his glove aside, and lowered his shoulder. He wasn't a hapless victim. He welcomed the confrontation. He didn't back down. He's not a victim.
Again, Quentin was already walking towards the mound. The situation had already escalated and from every video I have seen Greinke's initial response seemed to be a raise of his head and say something, not shout it. Quentin then started running towards the mound, by that point there was nothing anyone could do to stop the fight. Greinke did throw his glove aside.
There was time for him to back away, albeit not more than a few seconds.
Quote:
Originally Posted by WhiteSox5187
There is a sort of macho element that was at play here obviously. I get the sort of psychological need for a pitcher to feel bulletproof and that he owns the plate or the mound or whatever. When a batter is charging the pitcher, he can't just run away. He shouldn't throw his glove aside and get ready to throw down though either, really all he can do is hope that the catcher can get in between him and the batter.
I understand the point you're making here, and I actually don't disagree with it. What I have a problem with is that Greinke exposed his shoulder to TCQ while the latter was charging the mound. If he had assumed a proper defensive stance, it's likely his collarbone remains in one piece. He didn't do that.
I think the question is how did he say it. He clearly says two things. The first is when Quentin is walking towards him and he did not appear to be shouting in that video. When Quentin starts running at him, Greinke throws his glove aside and says something else.
Well, TCQ says he didn't hear what was said, so the "how" of the situation doesn't matter. What does matter is that Greinke clearly says a word to Carlos before Quentin attacks him. It's possible that was enough to provoke Carlos, especially if he was already spoiling for a fight. I can believe he thought about fighting Greike. I don't for one moment believe munch's claims that he set up the entire thing.
I also don't entirely believe Quentin's version of events (I've spent the entire day tearing him apart on this board for his stupidity, and Paul Konerko, as well, for defending him), but Greinke isn't blameless. He was there. He could have handled things differently, but he chose to open his mouth, and he chose to leave himself vulnerable to injury.
He could've either started backpedalling or running the other way. He threw his glove aside, and lowered his shoulder. He wasn't a hapless victim. He welcomed the confrontation. He didn't back down. He's not a victim.
By the time Greinke threw his glove to the side, Quentin was charging at him full steam. So no, he is not a "victim" per se but he is not the instigator either.
Quote:
Originally Posted by RKMeibalane
There was time for him to back away, albeit not more than a few seconds.
I understand the point you're making here, and I actually don't disagree with it. What I have a problem with is that Greinke exposed his shoulder to TCQ while the latter was charging the mound. If he had assumed a proper defensive stance, it's likely his collarbone remains in one piece. He didn't do that.
Yea, I agree with your point that lowering his shoulder was stupid. I am not sure that he knew what the proper defensive stance was though and instinct probably took over. Unless a pitcher has a background in karate or wrestling (like Kyle Farnsworth), they are kind of defenseless at that point. I remember seeing Pedro backpedal and throw his glove at the guy who was charging him when he was with the Expos. I think that was after Pedro just lost a perfect game by hitting a guy too.
Quentin's going to find out he doesn't have many friends left in baseball after this. Bud Black was straining to talk about it while having to stick up for his guy. Carlos is a marked man now and the pitching fraternity will be after him.
By the time Greinke threw his glove to the side, Quentin was charging at him full steam. So no, he is not a "victim" per se but he is not the instigator either.
I never said he was the instigator. Quentin was clearly that by charging the mound. But as he was, Greinke could've backpedaled or turned and ran. He could've done either in the time it took him to drop his glove and lower his shoulder. But we agree that he wasn't a victim here.
Well, TCQ says he didn't hear what was said, so the "how" of the situation doesn't matter. What does matter is that Greinke clearly says a word to Carlos before Quentin attacks him. It's possible that was enough to provoke Carlos, especially if he was already spoiling for a fight. I can believe he thought about fighting Greike. I don't for one moment believe munch's claims that he set up the entire thing.
I also don't entirely believe Quentin's version of events (I've spent the entire day tearing him apart on this board for his stupidity, and Paul Konerko, as well, for defending him), but Greinke isn't blameless. He was there. He could have handled things differently, but he chose to open his mouth, and he chose to leave himself vulnerable to injury.
This is really getting into minutia here, but I think the fact that Quentin took his first step towards the mound shows he was ready for a fight. Greinke did say something but based solely on his body language I don't think it was INTENDED to be confrontational. I also doubt that it was intended to be apologetic either.
Yea, I agree with your point that lowering his shoulder was stupid. I am not sure that he knew what the proper defensive stance was though and instinct probably took over. Unless a pitcher has a background in karate or wrestling (like Kyle Farnsworth), they are kind of defenseless at that point. I remember seeing Pedro backpedal and throw his glove at the guy who was charging him when he was with the Expos. I think that was after Pedro just lost a perfect game by hitting a guy too.
The instinctive response is to raise one's hands in front of the face and upper-body. I just had my girlfriend run toward me with her fists up to test the idea. Before I even realized what I'd done, my hands were in front of my face, and I'd gone to something resembling a basketball defensive crouch, with my feet aligned with my shoulders. Granted, I'm not a pitcher and have no throwing arm to protect, but what Greinke did makes absolutely no sense.
Quentin's going to find out he doesn't have many friends left in baseball after this. Bud Black was straining to talk about it while having to stick up for his guy. Carlos is a marked man now and the pitching fraternity will be after him.
Oh if he thought they were throwing at him before wait until he faces the Dodgers again. It's probably worth pointing out that in the first inning Marquis threw a 1-2 pitch up around the head of Matt Kemp, so I think the Dodgers are going to REALLY have it out for Quentin.
Quentin's going to find out he doesn't have many friends left in baseball after this. Bud Black was straining to talk about it while having to stick up for his guy. Carlos is a marked man now and the pitching fraternity will be after him. |
Dutch government hands over education's keys to Microsoft
on: 2011-11-07
The Dutch government wants to tie the country's schools to
a single software vendor for years to come. Dutch students using Free Software
or devices without Silverlight-support will find themselves locked out of
schools' online systems due to the use of proprietary technology and closed
standards. Marja Bijsterveldt, the secretary of education, recently said that
she is unwilling
to enforce the Dutch government's own Open Standards policy on educational
institutions. Instead, the government will accept long-term vendor
lock-in of educational institutions.
For Free Software advocate Jan Stedehouder this emphasizes the need for a
stronger and more robust Open Standards policy framework. Therefore Stedeholder
initiated the Dutch campaign to make the use of Open Standards mandatory in the
public sector and to ensure vendor-independent access to all online service of
publicly funded organisations.
The organisations and individuals supporting the campaign demand:
to strengthen the Dutch action plan "Netherlands Open in Connection"
by making the use of Open Standards truly mandatory for all publicly-funded
institutions
to make vendor-independent access to all online services and
information mandatory for all publicly-funded institutions, in this case,
educational institutions;
to promote innovative education in IT-skills by broadening the
educational program with vendor-independent skill-sets.
"The policy framework approved by the Dutch Parliament in 2007 was an
important, internationally acclaimed achievement", says Stedehouder. "But
political barriers have meant that this policy hasn't been implemented. As a
result, students, future knowledge workers, are still locked in proprietary
technology."
Stedehouder highlights that students who complain about being locked out of
their school's system are being advised to buy the proprietary Microsoft
Windows operating system. "This behaviour is not only unacceptable but also
illegal. Our campaign aims at passing new legislation to ensure the mandatory
use of Open Standards in education, to make sure that students have access to
the free technology they deserve", says Stedeholder.
The Free Software Foundation Europe (FSFE) supports the Dutch
campaign which is gaining traction and has received endorsements by NLLGG, LPI Netherlands , NLUUG and HCC, and almost 900 individuals. The Dutch
parliament shares the disappointment with the way the Open Standards policy
framework is implemented in education. Mark Lamers, coordinator for FSFE
Netherlands, says: "Now it is time to act for everybody who is in favour of a
free competition in the software market, and of course all Free Software
advocates: Support this campaign!"
"Though this problem is all too common around the world, the Dutch
government's stance is particularly disappointing", says Karsten Gerloff,
president of FSFE. "The Netherlands have some of the most progressive policies
on Free Software and Open Standards in the world. But the education ministry
utterly fails to implement them. I can well understand that Dutch
parliamentarians are dissatisfied and want to push for a more robust
policy." |
Q:
How to cause soft references to be cleared in Java?
I have a cache which has soft references to the cached objects. I am trying to write a functional test for behavior of classes which use the cache specifically for what happens when the cached objects are cleared.
The problem is: I can't seem to reliably get the soft references to be cleared. Simply using up a bunch of memory doesn't do the trick: I get an OutOfMemory before any soft references are cleared.
Is there any way to get Java to more eagerly clear up the soft references?
Found here:
"It is guaranteed though that all
SoftReferences will get cleared before
OutOfMemoryError is thrown, so they
theoretically can't cause an OOME."
So does this mean that the above scenario MUST mean I have a memory leak somewhere with some class holding a hard reference on my cached object?
A:
The problem is: I can't seem to
reliably get the soft references to be
cleared.
This is not unique to SoftReferences. Due to the nature of garbage collection in Java, there is no guarantee that anything that is garbage-collectable will actually be collected at any point in time. Even with a simple bit of code:
Object temp = new Object();
temp = null;
System.gc();
there is no guarantee that the Object instantiated in the first line is garbage collected at this, or in fact any point. It's simply one of the things you have to live with in a memory-managed language, you're giving up declarative power over these things. And yes, that can make it hard to definitively test for memory leaks at times.
That said, as per the Javadocs you quoted, SoftReferences should definitely be cleared before an OutOfMemoryError is thrown (in fact, that's the entire point of them and the only way they differ from the default object references). It would thus sound like there is some sort of memory leak in that you're holding onto harder references to the objects in question.
If you use the -XX:+HeapDumpOnOutOfMemoryError option to the JVM, and then load the heap dump into something like jhat, you should be able to see all the references to your objects and thus see if there are any references beside your soft ones. Alternatively you can achieve the same thing with a profiler while the test is running.
A:
There is also the following JVM parameter for tuning how soft references are handled:
-XX:SoftRefLRUPolicyMSPerMB=<value>
Where 'value' is the number of milliseconds a soft reference will remain for every free Mb of memory. The default is 1s/Mb, so if an object is only soft reachable it will last 1s if only 1Mb of heap space is free.
A:
You can force all SoftReferences to be cleared in your tests with this piece of code.
|
At the bottom of the sidebar on any page you'll see the "Log in / create account" link. It's the same link, whether you are creating an account or using an existing one. Follow the link, choose your username and password, and you are ready to go. You'll notice that under Personal Tools it now shows your username, and you have some other links. Take a little time to browse those pages, especially the "My Preferences" page where you may want to set the timezone under the "Date and time" tab.
+
At the bottom of the sidebar on any page you'll see the "Log in" links. It's the same link, whether you are creating an account or using an existing one. Follow the link, choose your username and password, and you are ready to go. You'll notice that under Personal Tools it now shows your username, and you have some other links. Take a little time to browse those pages, especially the "My Preferences" page where you may want to set the timezone under the "Date and time" tab.
+
+
{{Note|1= Due to a recent heavy bout of spamming it has become necessary to tighten up login procedures, which is why the old plain account creation has disappeared. If you have an account which uses OpenID, such as Google or Yahoo identities (there are others, too) you may use them, but we strongly advise you to create an Identity account. One account gives you access to many KDE services, and there is no down-side. You will not be spammed with messages about any KDE service you haven't subscribed to.
Contents
New to UserBase?
UserBase is open for everyone to read. If you want to contribute to UserBase you need to register an account; this has many advantages:
You get a user name and a user page which you can use to make drafts.
You can watch pages to get notifications if something on the page changes.
Your user name makes it easy for other people to recognize your work.
You become a part of the KDE community.
... and much more!
Registering is very fast and easy, read on for more information.
Creating an Account
At the bottom of the sidebar on any page you'll see the "Log in" links. It's the same link, whether you are creating an account or using an existing one. Follow the link, choose your username and password, and you are ready to go. You'll notice that under Personal Tools it now shows your username, and you have some other links. Take a little time to browse those pages, especially the "My Preferences" page where you may want to set the timezone under the "Date and time" tab.
{{Note|1= Due to a recent heavy bout of spamming it has become necessary to tighten up login procedures, which is why the old plain account creation has disappeared. If you have an account which uses OpenID, such as Google or Yahoo identities (there are others, too) you may use them, but we strongly advise you to create an Identity account. One account gives you access to many KDE services, and there is no down-side. You will not be spammed with messages about any KDE service you haven't subscribed to.
No doubt you have lots of questions, and UserBase looks a little daunting at first sight, but there are many pages that help you get started.
Finding Pages in the same Category
At the bottom of a page you should find a category link, which will look like [[Category:Getting Started]]. If a page is relevant to more than one category it might look something like [[Category:Getting Started|Contributing]]. If you hover over the category statement (the real one, not this display dummy) you will see that each of those categories is a link to another page. On that page you will find a listing of related pages.
Starting to Contribute to English pages
Note
All new content must be in English. The reason is that the translation system allows changes on the English pages to be passed for translation. It is not possible to operate in the reverse, changing a translated page and passing the change back to the English page.
When you are logged in you have an Edit icon (or tab, depending on the theme you use) on every page. Your "My preferences" link will also give you the choice of having edit links for each section. These can be used to make a small edit or add a snippet to an existing page. You might also find it useful to set "Preview" as a default. You will find guidelines on the Modify a Page page.
If you are interested in creating a whole page (or series of pages), you will find a short introduction to relevance of content and on the same page there are links to How-To pages for most common tasks.
Whatever happens, you are not alone. If you hit a problem don't be afraid to ask. Use "Discussion" pages for questions about the topics under discussion - they are usually picked up quite quickly. There is also a forum topic for questions about editing. Quick questions that don't need a lengthy answer can also be asked on Freenode IRC, channel #kde-www.
Above all, we want UserBase to be an enjoyable experience, both for readers and contributors.
Working with page translation
If you want to get started in translating documents, you will find information on Translate a Page. Use the sidebar link to apply for adding to the Translator group. The sidebar link Translation Tools is a good way to monitor what is happening to translations to your language. |
Long-range elastic-mediated interaction between nanoparticles adsorbed on free-standing smectic films.
We determine the elastic-mediated interaction between colloidal nanoparticles adsorbed on the surface of free-standing smectic films. In contrast with the short-range character of the elastic-mediated force between particles adsorbed on smectic films supported by a solid substrate, the effective force acquires a long-range character in free-standing films, decaying with the particles distance R as slow as 1/R . We also discuss the dependence of the effective interaction potential on the surface tension gamma and film thickness. We show that it decays as 1/gamma in the regime of large surface tensions and becomes independent of the film thickness at a characteristic surface tension. |
Photoshop Tutorial: Create a blueprint effect
One of the most interesting elements to any construction project is the blueprints. The plans themselves are a physical representation of hopes and dreams. They are a manifestation of the potential. They speak to us because they are the means by which we shape the world around us. Blueprints are the way we conquer the chaos and create, build and develop. Allow us to draw up plans and we can accomplish anything. These drafted plans also contain a fascinating network of technical lines and illustration. We can work with Photoshop to create this interesting effect from scratch, just follow the steps below to find out.
STEP 01
Open the ‘House Image.jpg’ file from the CD. Duplicate the Background layer and begin using the Clone Stamp tool to remove stray details from the image. Target areas like foliage and the harsh shadow on the roof. The clone work doesn’t need to be pretty; it just needs to obliterate the unwanted details.
STEP 02
To tend tothe annoying foliage in and around the fence slats, use the Clone Stamp Tool to copy the clean slats from another area of fence. Use a simple brush with black paint to conceal the brushstrokes seen between the slats. The line drawing technique simply needs heavy contrast here.
STEP 03
Use the Polygonal Marquee tool to select the roof areas and the window glass. Go to Edit>Fill and fill the selection with 50% Grey. This ensures that the line-drawing process will generate nice outlines for these areas without filling them with stray marks.
STEP 04
Create a selection around the outline of the house and copy it to a new layer. Then go to Filter>Blur>Smart Blur. Set the quality to High and Mode to Edge Only. The goal is to get nice clean contour lines by adjusting the sliders. A Radius of 52 and Threshold of 34 works well in this case.
STEP 05
Because the line drawing conversion is based on contrast, it renders lines around shadow areas as well as architecture. Take a hard edged black paintbrush and paint out the lines that don’t follow physical shapes as well as any other stray marks that may have been produced.
STEP 06
Set the line drawing layer’s mode to screen. Set the Foreground and Background colours to two similar shades of blue, we used 013ad9 and 0c1189 respectively. Create a new layer beneath the line drawing and add a linear gradient going from one corner to the opposite. Duplicate the line drawing layer and use a Gaussian Blur with a Radius of 4 pixels.
STEP 07
Open the ‘grid.png’ file and drag the grid onto the project. Place the grid layer just above the blue gradient. Set the blending mode to screen and reduce the Opacity to 43%. Add a layer mask and use a radial gradient that goes from black to transparent in order to fade areas of the grid immediately behind the line drawing.
STEP 08
Create a rectangular selection of the grid file roughly the size of the roof area. Copy and paste this onto the line drawing. Go to Edit>Transform>Distort and drag the corners to match the roof perspective. Create a selection around the window area and hold the shift key while pressing the Add layer mask button to mask out that area.
STEP 09
Finish off the blue print effect by adding in lines and text. To get the arrowheads, use the Line tool found under the Shape tool set (with the rectangle and circle shape tools), and then look in the Options bar for a small down pointing arrow that opens the arrowhead options. When finished, save and close this file.
STEP 10
Open the ‘ConstructionSetting.jpg’ file and then go to File>Place to deposit the blueprint file as a Smart Object. Set the blending mode to Linear Burn and reduce the Opacity to 63%. Rotate the blueprint 90% and go to Edit>Transform>Warp. Manipulate the warp points until the blueprint roughly matches the shape of the paper.
STEP 11
To more accurately fit the blueprint to the folds and curves of the paper, go to Edit>Puppet Warp. Create pins on the warp grid and push and pull them gently to form the blueprint into the precise shape you need. Stubborn points can be hidden with a layer mask.
STEP 12
Move a duplicate of the Background layer above the blueprint and use the Pen tool to create a path around all the tools over the blueprint (or go to the Paths panel and select the path already included with the file). Next, go to Layer>Vector Mask>Current Path.
STEP 13
Add a layer mask to the tools layer and gently brush out any halos around the tools. If the masking doesn’t help, use the Burn tool set to Midtones and 15% to darken the edges of the tools. Soft brushes on the mask can give the appearance of a reflection on the chrome areas of the hammer.
STEP 14
Create a composite layer on top of the project by pressing Alt/Opt+Ctrl/Cmd+Shift+E and grab the Blur tool with a small tip and Strength set to 25%. Trace over the edge of the blueprint to soften it. Do the same for any other harsh lines that appear too distracting. |
Q:
How do I identify on which thread a Lua script is running?
I'm currently working on Lua scripts to integrate with some third party product. This third party product calls my Lua script on several threads at the same time, which is fine. However, as I write to a log file from my scripts, I'd like to identify which thread is running my Lua script and write that to the log file as well.
This would allow me to identify which log entries belong together.
Any thoughts on how I could make a proper distinction between log entries from different threads in Lua would be very welcome.
A:
The default tostring() representation of a table contains the (memory) address of the table. It's guaranteed to be unique across different Lua VMs running on the same process.
You can exploit this to generate a unique ID for each thread:
local unique_id = tostring( {} ):sub(8) -- extracts the "address" part
print(unique_id)
--> outputs 0x7f876b608b00
As a side note, this is a recommended way of generating unique keys for use with the global Lua registry!
|
OC Selene By AngelWarriorAurora Watch
4 Favourites 1 Comment 88 Views
She has a height of ~35cm without mane and ears
Made with Minky and Marathon Rayon embroidery thread
The one-part-mane was a challenge but lot of fun to make
IMAGE DETAILS Image size 3501x1495px 6.26 MB Show More
Published : Apr 12, 2017 |
Promotion
Take Shelter trailer
I hadn't heard much about Take Shelter until this morning, and the good news is that the trailer is really intriguing and Michael Shannon and Jessica Chastain star in the film that's written and directed by Jeff Nichols.
I'm really curious as to where the story is going to go, but it does provide another powerful psychological role for Shannon to revel in, as he so often does.
Curtis lives in Ohio with his wife Samantha and daughter Hannah. When he begins having terrifying dreams about an encroaching apocalyptic storm, he chooses to keep the disturbance to himself, channelling his anxiety into the obsessive building of a storm shelter in their backyard. His seemingly inexplicable behaviour concerns and confounds Samantha, and provokes intolerance among co-workers, friends and neighbours. But the resulting strain on his marriage and tension within the community doesn't compare to Curtis' private fear of what his dreams may truly signify. Faced with the proposition that his disturbing visions signal disaster of one kind or another, Curtis confides in Samantha, testing the power of their bond against the highest possible stakes.
Now here's the trailer:
Looks good doesn't it? Are you as curious as I am as to how the story turns out and how the character develops? |
Selenium in the anterior pituitary of the rat after a single injection of 75Se sodium selenite.
In order to investigate the selenite metabolism in the anterior pituitary and compare it with other endocrine organs, rats were injected intraperitoneally with 75Se sodium selenite (5 mg/kg). The rats were whole body counted shortly after injection and recounted just before sacrifice, which was performed 2, 24, 48 h, and 4, 10, 20, 30, 40, 60, and 80 d after injection. Besides the anterior pituitary, the selenium content was also estimated in the thyroid gland, testis, adrenals, liver, kidney, and blood. The maximum selenium content was observed in all organs 2 h after injection, at which time the anterior pituitary contained 2.9 micrograms/g wet wt, compared to 13.5 micrograms/g wet wt in liver and .6 micrograms/mg wet wt in testis. The excretion of selenite from the anterior pituitary resembled that seen in most other organs investigated, i.e., an initial rapid excretion and a slower secondary phase resembling a first order reaction. Practically all selenium was excreted by 60 d after injection. The selenium content in pituitaries from untreated rats was estimated by PIXE analysis to be 2.2 +/- .1 micrograms dry wt and .48 +/- .03 micrograms/g wet wt. From the present study it can be concluded that selenium in the form of selenite accumulates in the anterior pituitary after a single intraperitoneal injection; selenite is excreted from the gland in a biphasic manner; practically all selenium is excreted within 60 d; and pituitaries from normal rats contain .48 micrograms selenium/g wet wt. |
zohar lazar
When you think Woody Allen, you naturally think of… lesbian three-ways? Tom Carson asks what happens when an old man discovers Scarlett Johansson, an obscure continent called Europe, and the redemptive power of Penélope Cruz naked. The answer: a lustful reawakening read more
The only real winner in the endless Democratic primary? Those smart-ass policy wonks at MSNBC. Tom Carson straps himself to a barcalounger for days of infuriating coverage from the hottest political team on TV read more
Why is it that our best actors are so determined to punish us with their De Niro impersonations? As Oscar season comes to a head, Tom Carson isolates the virus that's left all our leading men so damned glum and asks: Would it kill these guys to show us a good time once in a while?? read more
The new fourteen-hour Ken Burns documentary about America in World War II is sublime. It will sweep you off your feet and put you there—in Italy, on Omaha Beach, on the home front. But that's not enough for the master of history. He wants you sobbing on the couch read more
Though Tommy Lee Jones has been acting nearly forty years, audiences are only now starting to recognize the depth of his talent. Has he changed, or have we? Either way, with that ravaged, mournful face—put to great use in the Coen Brothers' graphic instant classic No Country for Old Men—Jones is finally showing us what he's made of read more |
/*
* Encog(tm) Core v3.4 - Java Version
* http://www.heatonresearch.com/encog/
* https://github.com/encog/encog-java-core
* Copyright 2008-2017 Heaton Research, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* For more information on Heaton Research copyrights, licenses
* and trademarks visit:
* http://www.heatonresearch.com/copyright
*/
package org.encog.ensemble.aggregator;
import java.util.ArrayList;
import junit.framework.TestCase;
import org.encog.ml.data.MLData;
import org.encog.ml.data.basic.BasicMLData;
public class TestMajorityVoting extends TestCase {
public void testMajorityVoting() {
BasicMLData right = new BasicMLData(new double[]{0.0,1.0});
BasicMLData wrong = new BasicMLData(new double[]{1.0,0.0});
ArrayList<MLData> outs = new ArrayList<MLData>();
outs.add(right);
outs.add(wrong);
outs.add(right);
outs.add(right);
MajorityVoting majorityVotingUnderTest = new MajorityVoting();
BasicMLData result = (BasicMLData) majorityVotingUnderTest.evaluate(outs);
TestCase.assertEquals(0.0,result.getData(0));
TestCase.assertEquals(1.0,result.getData(1));
}
}
|
By Tim Traeger
Editor
411whittier.com
SOUTH EL MONTE – What they do makes a difference every day. How they do it buoys the spirits of those who may have been tossed from mainstream society or witnessed their combined potentials overlooked.
So when the Lincoln Training Center opened its doors on Wednesday, Oct. 30, 2013 for an open house to celebrate its first 50 years, it also showed the nonprofit organization lives up to its guiding motto, “Turning Disabilities into Possibilities.”
About 100 invited guests from across the Southland came to the center’s 35,000-square-foot headquarters at 2643 Loma Ave. to see the about 200 disabled “clients” packaging goods, bundling bars of soap but, most importantly, holding down real jobs.
“As you can see, we’re kind of busy today,” said Lincoln’s vice president of operations, Gary T. Griffen. “Each one of our clients gets a paycheck every two weeks.”
Griffen said Lincoln has centers in Sacramento, Fresno and another in Vista near San Diego. But the nonprofit’s reach touches many communities. He has worked in his position for 26 years. Many administrators at the center have tenures longer than two decades.
“We have clients who come from the Whittier area. A lot of our support comes from Whittier,” Griffen said. “Most of our clients who come through this center are referred to us through the San Gabriel Valley Regional Center … we just go where life takes us to provide more jobs.”
On this day many clients were packaging “chip boards” for painting contractors. Those boards will be shipped to stores like Sam’s Club, Costco, Lowe’s and Home Depot. Yet the center also provides custodial, grounds maintenance and general contracting.
“And we’re also looking to get more involved with disabled veterans,” Griffen said. “Starting next year we have big plans for that.”
For Bret Kirkpatrick, CEO of Bay Cities Inc. in Pico Rivera, Lincoln provides a reliable workforce for his marketing company that lowers the firm’s bottom line.
“We have a team from Lincoln that reports every day at our facility. They do packing, and different types of jobs for our clients that are part of our core business. They come to work on time. They are excited about what they’re doing. They do a great job every day for us and they’re reliable. It’s a really nice relationship,” Kirkpatrick said.
“What I like the most about it really, is when I come into work it’s an example for all of our employees. We interact with these folks. There’s one employee named Mikey. He’s so fired up. ‘How you doing?’ ‘Awesome!’ Why aren’t we so excited about our jobs?” Kirkpatrick said. His company of 125 full-time staff has been in Pico Rivera for 57 years.
“They perform all types of cleaning detail. Different packing jobs. We’re evaluating the use of more (Lincoln) teams and how we can integrate that. As the minimum wage goes up, we see an opportunity to integrate more Lincoln crews into the packing area,” Kirkpatrick said. “It’s the proverbial win-win.”
Michael Doss of Belmont Shore, whose wife owns Brown’s Jewelry and Loan in Rosemead on Garvey Avenue, said the couple recently joined Lincoln’s “Affair of the Heart” committee. There’s a reason why the couple got behind one of Lincoln’s largest annual fund-raisers.
“I was so impressed by everything I learned that I wanted to get involved. It truly is a wonderful operation. Every one of us needs purpose in life. We have to feel valued. We have to feel like there’s something more out there. That’s what this gives. A significance and a purpose in life,” Doss said. “They really care about life. When they can’t come in, they call. They really care about their jobs.”
But beyond bottom lines and shorter unemployment lines, there’s a higher sense of purpose for many who work at Lincoln.
Noreen Baca, director of marketing and development, has been at Lincoln for 17 years. For her, staff longevity and career satisfaction comes from, “The work we do for our clients. We love our clients and it’s amazing to see the ability they have.”
For RoseMary Garza, Lincoln vice president of rehabilitation programs who supervises the staff that gives guidance to disabled clients working at the center, her job of 26 years offers a level of fulfillment a mere paycheck can’t provide.
“It’s extremely fulfilling to see these individuals being provided the opportunity to go out and display their abilities,” Garza said. “They are excellent employees. A lot of the information we receive from many of the contacts we have out in the community say that they are truly an added benefit at their locations.
“They say they really put a smile on people’s faces. They tell us they really lift the bar for their entry-level staff. On payday they’re so thrilled to get their paychecks. They show up on time. They appreciate their jobs. They have good attitudes when they’re there. They display appreciation for the work that they’re doing. They want to please everybody. Customer service is important to them,” Garza said. “They want to do a good job.”Tim Traeger is former editor of the Whittier Daily News. Reach him at ttraeger@411whittier.com or call 626-646-7352.
Get dialed in!
411whittier.com is committed to publishing positive community events, letters to the editor, business and education news, local sports and faith-based information into "print." For the time being postings will be exclusively published online. Please send your submissions to editor@411whittier.com |
Tetanus vaccines found spiked with sterilization chemical to carry out race-based genocide against Africans
(NaturalNews) Tetanus vaccines given to millions of young women in Kenya have been confirmed by laboratories to contain a sterilization chemical that causes miscarriages, reports the Kenya Catholic Doctors Association, a pro-vaccine organization.
A whopping 2.3 million young girls and women are in the process of being given the vaccine, pushed by UNICEF and the World Health Organization.
“We sent six samples from around Kenya to laboratories in South Africa. They tested positive for the HCG antigen,” Dr. Muhame Ngare of the Mercy Medical Centre in Nairobi told LifeSiteNews. “They were all laced with HCG.” |
The present invention relates to a surgical operating apparatus which performs therapeutic treatment, such as incision, resection or coagulation, of a living body tissue by making use of composite energy of ultrasonic and high-frequency waves, and which can also perform therapeutic treatment by high-frequency waves.
Jpn. Pat. Appln. KOKAI Publication No. 2005-278932 (Patent Document 1), for instance, discloses an ultrasonic therapeutic apparatus as a general example of an ultrasonic therapeutic apparatus which can perform therapeutic treatment, such as incision, resection or coagulation, of a living body tissue by making use of ultrasonic and can also perform therapeutic treatment by high-frequency waves.
In this apparatus, a proximal-side operation section is coupled to a proximal end portion of an elongated insertion section. An ultrasonic transducer which generates ultrasonic vibration is provided in the operation section. A therapeutic section for treating a living body tissue is provided at a distal end portion of the insertion section.
The insertion section has an elongated tubular sheath. A rod-shaped vibration transmission member (probe) is inserted in the sheath. A proximal end portion of the vibration transmission member is detachably attached to the ultrasonic transducer via a screw-type coupling section. Ultrasonic vibration, which is generated by the ultrasonic transducer, is transmitted to a probe distal end portion at the distal end side of the vibration transmission member.
In the therapeutic section, a jaw is provided so as to be opposed to the probe distal end portion. A proximal end portion of the jaw is rotatably supported on a distal end portion of the sheath via a support shaft. A driving pipe for driving the jaw is inserted in the sheath so as to be axially advancible/retreatable.
A pin receiving section is formed at a distal end portion of the driving pipe. The pin receiving section is formed in an extension portion which is extended, as one body with the driving pipe, to a distal end side from a distal end edge portion of the driving pipe. A coupling pin is provided at a distal end portion of the pin receiving section. The driving pipe and the jaw body are coupled by the coupling pin.
The operation section is provided with an operation handle. In accordance with the operation of the operation handle, the driving pipe is axially advanced/retreated. In interlock with the operation of the driving pipe, the jaw is opened/closed relative to the probe distal end portion.
At this time, a living body tissue is held between the probe distal end portion and the jaw in accordance with the closing operation of the jaw. In this state, ultrasonic vibration from the ultrasonic transducer is transmitted to the probe distal end portion on the therapeutic section side via the vibration transmission member. Thereby, using ultrasonic, therapeutic treatment, such as incision, resection or coagulation, of the living body tissue is performed.
In addition, in the apparatus of the above-described Patent Document 1, a proximal end portion of the sheath is detachably coupled to the operation handle of the operation section. Further, a high-frequency connection pin is attached to the operation section. An electric cord for supplying high-frequency current from a high-frequency cauterization power supply device is connected to the high-frequency connection pin. An inner end portion of the high-frequency connection pin is electrically connected to the probe distal end portion of the therapeutic section or to the jaw via an electric conduction path within the operation section and the sheath. High-frequency current is supplied, when necessary, to the probe distal end portion of the therapeutic section or to the jaw, and high-frequency therapeutic treatment, such as coagulation, of the living body tissue is performed.
In the apparatus of the above-described Patent Document 1, when high-frequency therapeutic treatment is performed, the driving pipe is axially advanced/retreated in accordance with the operation of the operation handle, and the jaw is opened/closed relative to the probe distal end portion in interlock with the operation of the driving pipe. In addition, the pin receiving section is formed at the distal end portion of the driving pipe. The pin receiving section is formed in the extension portion which is extended, as one body with the driving pipe, to the distal end side from the distal end edge portion of the driving pipe. The coupling pin is provided at the distal end portion of the pin receiving section. The driving pipe and the jaw body are coupled by the coupling pin. |
{
"ClickHeat": {
"LANG_USER" : "Utilizator",
"LANG_PASSWORD" : "Parola",
"LANG_LOGIN" : "Login",
"LANG_LOGIN_ERROR" : "Eroare de logare, nume utilizator sau parola gresite",
"LANG_LOGOUT" : "Logout",
"LANG_UNKNOWN_DIR" : "Nu pot defini directorul curent, va rugam sa ne contactati",
"LANG_DAYS" : "L,M,M,J,V,S,D",
"LANG_RANGE" : "Zi,Saptamana,Luna",
"LANG_MONTHS" : "0,Ianuarie,Februarie,Martie,Aprilie,Mai,Iunie,Iulie,August,Septembrie,Octombrie,Noiembrie,Decembrie",
"LANG_SITE" : "Website",
"LANG_GROUP" : "Grup",
"LANG_BROWSER" : "Browser",
"LANG_ALL" : "Toate",
"LANG_UNKNOWN" : "Altele/necunoscut",
"LANG_EXAMPLE_URL" : "Pagina web",
"LANG_LAYOUT" : "Layout pentru grup",
"LANG_LAYOUT_FIXED" : "Continut fix/meniu",
"LANG_LAYOUT_LIQUID" : "Continut flexibil/meniu (ajustare automata la dimensiunea ecranului)",
"LANG_LAYOUT_NONE" : "Margine (fara continut), flexibila",
"LANG_LAYOUT_0" : "Meniu si continut flexibil",
"LANG_LAYOUT_1" : "Meniu fix in stanga, continut flexibil",
"LANG_LAYOUT_2" : "Continut centrat cu dimensiune fixa (margini egale in stanga si dreapta)",
"LANG_LAYOUT_3" : "Continut cu dimensiune fixa in partea stanga (margine cu dimensiune automata in dreapta)",
"LANG_LAYOUT_4" : "Meniu fix in dreapta, continut flexibil",
"LANG_LAYOUT_5" : "Meniuri fixe la stanga si la dreapta, continut flexibil",
"LANG_LAYOUT_6" : "Continut fix in dreapta (margine cu dimensiune automata in stanga)",
"LANG_LAYOUT_LEFT" : "Dimensiune fixa de la stanga (pixeli)",
"LANG_LAYOUT_CENTER" : "Dimensiune fixa centrata (pixeli)",
"LANG_LAYOUT_RIGHT" : "Dimensiune fixa de la dreapta (pixeli)",
"LANG_SCREENSIZE" : "Marime ecran",
"LANG_HEATMAP" : "Transparenta pentru imaginea generata (click-uri)",
"LANG_LATEST_CHECK" : "Upgrade",
"LANG_LATEST_KO" : "Nu pot gasi in mod dinamic ultima versiune a aplicatiei, a dumneavoastra este %s, ultima versiune de pe site-ul Dugwood este",
"LANG_LATEST_OK" : "Aveti ultima versiune de aplicatie instalata (%s)",
"LANG_LATEST_NO" : "Versiunea actuala a aplicatiei (%s) nu este ultima (%s). Puteti sa o copiati pe site-ul dumneavoastra:",
"LANG_LOG_MY_CLICKS" : "Inregistreaza click-urile mele?",
"LANG_JAVASCRIPT_ADMIN_COOKIE" : "Pentru a evita poluarea rezultatelor,\\npoti alege ca sistemul sa inregistreze click-urile tale sau nu\\n\\nOK = inregistreaza click-urile mele\\nCancel = nu inregistra click-urile mele",
"LANG_JAVASCRIPT" : "cod Javascript copiat in paginile care vor fi monitorizate",
"LANG_JAVASCRIPT_IMAGE" : "Arata logo-ul ClickHeat in paginile monitorizate: ",
"LANG_JAVASCRIPT_SHORT" : "Cod compact (numai 3 linii)",
"LANG_JAVASCRIPT_QUOTA" : "Numar maxim de click-uri pe pagina si vizitator, urmatoarele click-uri nu vor fi contorizate (0 = fara limita, 3 este o alegere buna)",
"LANG_JAVASCRIPT_SITE" : "Nume site (caractere permise: A-Z, a-z, 0-9, _, -, .)",
"LANG_JAVASCRIPT_GROUP" : "Nume de grup, pentru a grupa pagini similare pentru o analiza mai simpla",
"LANG_JAVASCRIPT_GROUP0" : "foloseste un cuvant cheie",
"LANG_JAVASCRIPT_GROUP1" : "caractere permise: A-Z, a-z, 0-9, _, -, .",
"LANG_JAVASCRIPT_GROUP2" : "foloseste titlul unei pagini (<a href=\"http://www.Dugwood.com/clickheat/performance.html\" onclick=\"window.open(this.href, 'external');return false\">nu este recomandat</a>)",
"LANG_JAVASCRIPT_GROUP3" : "foloseste adresa paginii (<a href=\"http://www.Dugwood.com/clickheat/performance.html\" onclick=\"window.open(this.href, 'external');return false\">nu este recomandat</a>)",
"LANG_JAVASCRIPT_PASTE" : "Copiaza codul de mai jos in codul paginilor tale, chiar la sfarsitul paginii (inainte de </body>):",
"LANG_JAVASCRIPT_DEBUG" : "Din momentul in care a fost copiat codul, nu uita sa-l testezi pentru a verifica daca functioneaza corect. Foloseste variabila <span class=\"error\">?debugclickheat</span>. De exemplu: http://www.site-demo.com/index.html - tasteaza in browser http://www.site-demo.com/index.html<span class=\"error\">?debugclickheat</span>. Vei vedea un mesaj care arata modul de functionare al aplicatiei. Daca ai o problema, te rugam sa ne contactezi",
"LANG_NO_CLICK_BELOW" : "Leave below in English please",
"LANG_NO_CLICK_BELOW" : "No clicks recorded beneath this line",
"LANG_ERROR_GROUP" : "Grup necunoscut. _JAVASCRIPT_",
"LANG_ERROR_DATA" : "Nu exista inregistrari pentru perioada selectata (incearca sa scoti diferite filtre: browser, marime ecran). _JAVASCRIPT_",
"LANG_ERROR_JAVASCRIPT" : "Ati instalat corect codul Javascript in pagini?",
"LANG_ERROR_FILE" : "Nu pot deschide fisierul cu inregistrari",
"LANG_ERROR_SCREEN" : "Marime ecran non-standard",
"LANG_ERROR_LOADING" : "Generez imaginea, va rog sa asteptati...",
"LANG_ERROR_FIXED" : "Toate dimensiunile pe latime sunt fixe, acest lucru nu este posibil. Va rugam sa schimbati latimea pentru layout cu una de mai sus.",
"LANG_DEFAULT" : "default",
"LANG_CHECKS" : "Verificari preliminarii",
"LANG_CHECK_WRITABLE" : "Permisiune de scriere in directorul de configurare, config",
"LANG_CHECK_NOT_WRITABLE" : "PHP nu are permisiune de scriere in directoul de configurare, config",
"LANG_CHECK_GD" : "GD graphic library",
"LANG_CHECK_GD_IMG" : "imagecreatetruecolor() inexistent, nu pot crea imagini de calitate, verificati daca GD este instalat",
"LANG_CHECK_GD_ALPHA" : "imagecolorallocatealpha() inexistent, nu pot crea imagini transparente (poti ignora acest mesaj, dar transparenta este recomandata)",
"LANG_CHECK_GD_PNG" : "imagepng() inexistent, nu pot crea imagini PNG�",
"LANG_CHECKS_OK" : "Urmatorul pas: configurare",
"LANG_CHECKS_KO" : "Unul sau mai multe teste au esuat. Va rugam, corectati problemele si reincarcati aceasta pagina.",
"LANG_CONFIG" : "Configurare",
"LANG_CONFIG_HEADER_HEATMAP" : "Creare de harta de click-uri",
"LANG_CONFIG_HEADER_DISPLAY" : "Ecran principal",
"LANG_CONFIG_HEADER_SECURITY" : "Securitate",
"LANG_CONFIG_HEADER_LOGIN" : "Parametrii de login",
"LANG_CONFIG_LOGPATH" : "Fisiere de inregistrare' director",
"LANG_CONFIG_LOGPATH_DIR" : "Directorul pentru fisiere de inregistrate nu exista. Va rugam sa-l creati",
"LANG_CONFIG_LOGPATH_KO" : "Directorul pentru fisiere de inregistrate - logs - nu are permisiune de scriere, va rugam sa-i dati permisiune de scriere pentru utilizatorul PHP",
"LANG_CONFIG_CACHEPATH" : "Director pentru fisiere temporare",
"LANG_CONFIG_CACHEPATH_DIR" : "Directorul pentru fisiere temporare nu exista, va rugam sa-l creati",
"LANG_CONFIG_CACHEPATH_KO" : "Directorul pentru fisiere temporare - cache - nu are permisiune de scriere, va rugam sa-i dati permisiune de scriere pentru utilizatorul PHP",
"LANG_CONFIG_REFERERS" : "Nume de domenii (separate prin virgule) carora li se permite inregistrarea click-urilor pe acest server",
"LANG_CONFIG_GROUPS" : "Nume de grupuri (separate prin virgule) carora li se permite inregistrarea click-urilor pe acest server",
"LANG_CONFIG_FILESIZE" : "Marime maxima pentru un fisier de inregistrare (in KB) pentru un grup intr-o zi (1000 click-uri reprezinta proximativ 25KB, 0 = fara limite)",
"LANG_CONFIG_CHECK" : "Verifica configurare",
"LANG_CONFIG_MEMORY" : "Limita de memorie (valoare php.ini default: %dMB, limite: de la %d la %dMB, dar <a href=\"http://www.Dugwood.com/clickheat/performance.html\" onclick=\"window.open(this.href, 'external');return false\">aveti grija cu valorile mari</a>)",
"LANG_CONFIG_MEMORY_KO" : "va rugam sa ramaneti in valorile specificate",
"LANG_CONFIG_STEP" : "Click-uri grupate in zone de X*X pixeli (influenteaza viteza de redare a hartii de click-uri)",
"LANG_CONFIG_STEP_KO" : "zonele nu pot avea sub 1x1 pixeli",
"LANG_CONFIG_DOT" : "Harta de clik-uri' marime de punct (pixeli)",
"LANG_CONFIG_DOT_KO" : "marimea de punct nu poate fi zero",
"LANG_CONFIG_PALETTE" : "Daca vedeti patrate rosii pe harta selectati aceasta optiune",
"LANG_CONFIG_HEATMAP" : "Arata harta de click-uri (decat click-uri individuale' harta)",
"LANG_CONFIG_FLASHES" : "Ascunde elemente <Flash>",
"LANG_CONFIG_IFRAMES" : "Ascunde <iframe>",
"LANG_CONFIG_YESTERDAY" : "Arata statisticile de ieri la inceput (in locul celor de azi)",
"LANG_CONFIG_ALPHA" : "Transparenta (0 => 100)",
"LANG_CONFIG_FLUSH" : "Stergere automata a statisticilor mai vechi de X zile (0 = pastreaza toate fisierele, nu este recomandat)",
"LANG_CONFIG_START" : "prima zi a saptamanii",
"LANG_CONFIG_START_M" : "Luni",
"LANG_CONFIG_START_S" : "Duminica",
"LANG_CONFIG_ADMIN_LOGIN" : "Nume utilizator pentru administrator",
"LANG_CONFIG_ADMIN_PASS" : "Parola pentru administrator (de doua ori)",
"LANG_CONFIG_VIEWER_LOGIN" : "Nume utilizator pentru utilizator (daca nu se scrie nimic, contul este sters)",
"LANG_CONFIG_VIEWER_PASS" : "Parola pentru utilizator (de doua ori)",
"LANG_CONFIG_LOGIN" : "Numele utilizator trebuie sa aiba cel putin 4 litere",
"LANG_CONFIG_PASS" : "parola nu a fost completata",
"LANG_CONFIG_MATCH" : "parolele nu corespund",
"LANG_CONFIG_SAVE" : "Salveaza configurare",
"LANG_CLEANER_RUNNING" : "Curatare in lucru...",
"LANG_CLEANER_RUN" : "Curatare terminata: %d fisiere si %d directoare au fost sterse",
"LANG_CANCEL" : "Cancel",
"LANG_UPGRADE" : "Upgrade",
"LANG_UPGRADE_NEXT" : "Verifica configuratia si apoi salveaza pentru a termina upgrade-ul"
}
}
|
Q:
exact definition of open sets
What is the exact definition of open sets?
I know both definitions of open sets with respect to metric space and topological space. but what is most general definition that covers the both.
A:
Let $X$ be a set. An open set is an element of a collection $\mathcal{T}$ (whose elements are subsets of $X$), called a topology, which satisfies three conditions.
$\varnothing$ and $X$ are elements of $\mathcal{T}$.
For any subcollection $\mathcal{S}$ of $\mathcal{T}$, the union $\bigcup\mathcal{S}$ is an element of $\mathcal{T}$.
For any finite subcollection $\mathcal{S}$ of $\mathcal{T}$, the intersection $\bigcap\mathcal{S}$ is an element of $\mathcal{T}$.
Let $(M,\rho)$ be a metric space. Then the metric topology $\mathcal{T}_{\rho}$ induced by the metric $\rho$ is the collection of sets of the form $\bigcup\mathcal{B}$, where $\mathcal{B}$ is any collection (possibly empty) of open balls. Here an open ball is a set of the form $\{x\in M:\rho(x_0,x)<r_0\}$ for fixed $x_0\in M$ and for fixed positive real number $r_0$.
A:
There is no definition of what an open set is.
There is a definition of what a Topology, and each Topology will have a class of sets that are called open but these sets can pretty much be anything we want so far as the class of sets obey certain rules of inclusion.
A metric space is a type of topological space and the definition of an open set in a metric space is such that the class of all open sets obeys the rules of inclusion required for the metric space to be considered a topology.
So the definition of a Topology is the most general definition. But every topology will have its own classification of what open sets are. These classifications of sets must obey certain rules but the actual open sets themselves need not have any consistent properties.
....
More precisely if a have a universal set $X$ then ANY $T \subset P(X)$ (any class of subsets of $X$) can be called the class of all "open" sets so long as the following apply:
$X$ and $\emptyset$ are elements of $T$.
The union of sets in $T$ will itself be in $T$
Any finite intersection of sets in $T$ will itself be in $T$
As long as those rules are obeyed any set can be considered open.
If we have a metric space $X$ and we define that if a set $A\subset X$ is such: that for every point $x\in A$ there will be an open ball $B_r(x)$ around $x$ so that $B_r(x) \subset A$; we call such a set PEN-Oay.
Now $X$ is PEN-Oay because everything including all open balls are subsets of it. And $\emptyset$ is PEN-Oay vacuously because it has no points (as every point can be said to have any property).
And we can prove but I will not that any union (even infinite unions) of PEN-Oay sets are PEN-Oay.
And we can prove any finite intersection of PEN-Oay sets are PEN-Oay.
So if being PEN-Oay satisfies all three conditions for the class of all PEN-Oay sets to be considered a class of all "open" sets.
So we can say the metric space is a Topology so that $T = \{$ all "open" set$\} = \{$ all PEN-Oay sets$\}$.
|
all about audience research in museums and other cultural institutions
Saturday, November 24, 2007
Timing and pace of museum education visits
This question from Cathy Burke (UK): Dear Lynda, Susan Groundwater-Smith suggested I contact you to see if you know of any studies that have examined matters of timing and pace in the way that museum educators organised the experience of children visiting museums - especially on children's views on or experience of this - I am involved with a project that has generated this question at Manchester Art Gallery here in the UK. Looking for suitable literature. Feels like it is an important issue but I am finding it difficult to find relevant studies.
Hi Cathy. I don't know of any studies about this actually. A good resource is the Visitor Studies Group email alert where you can post a question. You could also look at Janette Griffin's thesis on school visits and museums, especially the lit review. It is available online at this link (I think!). If it doesn't work then go to the home page, search for University of Technology and her name and it should pop up. You could also email Janette (her details are on the UTS website).
There have been many general studies of timing in museums which may also be a good place to start. The Methodology chapter of my thesis has relevant lit and references (scroll down the page and it's there as a pdf).
I'd be really interested in what you find - can you let us all know via the blog please?
No comments:
What is the audience research blog?
Hi everyone. I'm conducting a blogging experiment - will this blog become a way for those of us who work in museum evaluation and audience research to share our work with the world, rather than via email to our contacts as happens currently?
My challenge to you, my colleagues, is to use this blog to post questions, answer queries and share experiences. I look forward to this adventure with a mixed sense of excitement and anxiety!
Disclaimer: The views expressed on this blog are those of individual post authors and are not the official views of the Australian Museum, who accepts no liability for content posted on this site. This blog is moderated by Lynda Kelly with input from Mel Broe an intern from the University of Sydney. |
12-20-2005
• by Ivan Eland (Independent Institute)
Several recent presidents could have been impeached for selected unconstitutional or illegal actions during their presidencies. But the sitting president, George W. Bush, may win the prize for committing the most impeachable offenses of any recent pr |
William Chater
William Chater (19 September 1821 – 7 March 1880) was an organist, composer, conductor and teacher from Coventry.
Life
Chater was born in Coventry, the son of Edward and Ann Chater. He was the conductor of the Coventry Choral Society for many years.
Appointments
Organist of Vicar Lane Chapel, Coventry
Organist of St John the Baptist Church, Coventry
Organist of Christ Church, Coventry ???? - 1866
Organist at Holy Trinity Church, Coventry 1866 - 1880
Works
Chater wrote songs, chants, chorales and anthems including:
Blessed is he that remembereth the Poor. Anthem.
By the Waters of Babylon. Anthem.
References
Category:1821 births
Category:1880 deaths
Category:English organists
Category:Male organists
Category:English composers
Category:19th-century British composers
Category:19th-century English musicians
Category:People from Coventry
Category:19th-century male musicians |
Reducing substance abuse risk factors among children through a teacher as facilitator program.
A Teachers as Facilitators (TAF) Program used classroom teachers as leaders of small groups that promoted social, emotional, and academic development of children at high risk of adopting potentially destructive substance abuse patterns. The program was intended to increase participating students' positive socialization experiences and academic achievement by successfully integrating these students into the school's social system. A longer-range goal was to increase students' sense of worth as it affects their attitudes toward relationships with other people and academic demands. Program results were: 1) school personnel were found capable of accurately identifying and referring to the TAF Program children who were at risk of substance usage and in need of assistance; 2) the TAF Program was effective in improving at-risk students' perceived academic self-concept, but was less effective in increasing students' perceived sense of social support; and 3) the program was endorsed by participating teachers, counselors, and administrators. |
How to Take Pictures in Bright Sunlight.
Transform bright light from a foe to a friend
with a simple polarizing filter.
You will need A camera Circular polarizing
filter and eye protection or sunglasses.
Step 1.
Put on your sunglasses—you don’t want
to hurt your own eyes.
Step 2.
Decide on what subject you wish to shoot.
Step 3.
Position yourself according to the orientation
of the sun, with your back toward the sun
and your subject facing the sun to minimize
shadows on their faces.
Step 4.
Grab your camera and screw on a polarizing
filter, which will help defray excess UV light.
Step 5.
Set your ISO to the lowest possible setting,
such as 100.
Step 6.
Turn of your auto-mode and choose either Manual,
Aperture Priority, or Shutter Speed priority
modes.
Step 7.
Compose your shot.
Compose your subject by using the rule of
thirds, where your subject is either in the
left or right third, not the direct middle,
for the most interesting pictures.
Step 8.
Focus on the subject.
Step 9.
Take a light reading by metering the subject.
If your camera has a built-in light meter,
it will meter through the glass, adjusting
for the polarizing lens.
If, however, you’re using a hand-held meter,
be sure to add the appropriate ƒ-stop by
reading the instructions on the filter’s
packaging.
Step 10.
Select your shutter speed and aperture, based
on your readings.
In bright situations your camera’s meter
system will tend to underexpose your shot
to balance out the amount of light hitting
your sensor.
If you want “white” snow, not “grey”
snow, over-expose your shots by 1/2 to a full
stop.
Step 11.
Look through your viewfinder at the subject
and adjust your polarizing filter until the
sky is a deep blue.
Step 12.
Re-focus on the subject.
Step 13.
Shoot until you’re satisfied, then shoot
a little more, just in case.
Did you know The intensity of ultraviolet
rays increases 5% every 1000 feet of elevation
you gain.
|
Meeting in Mountains
Encounter in Mountains ( ) is a 1966 Georgian comedy film directed by Nikoloz Sanishvili and starring Leila Abashidze and Tengiz Archvadze.
Synopsis
Somewhere in the mountains of Khevsureti, Georgia a film shoot is in progress. The director is very dissatisfied with the acting of Lali, who plays a Khevsurian woman named Mzevinar.
External links
Category:Kartuli Pilmi films
Category:Soviet films
Category:1960s comedy films
Category:Soviet comedy films
Category:Georgian-language films
Category:1966 films |
"Bottom Line, they don't understand that human decency is at the core of everything. I been jacking all them years and I can count on my hand the number of times they said thank you."— Stan
Leanne Best as Jessie, Martha Plimpton as Tracey(Photo: Johan Persson)
Lynn Nottage's play Ruined London reviewwas important and award winning. Intimate Apparel London review and Fabulation London review were also notable. With her latest play, Sweat, she becomes the first woman to have won the prestigious Pulitzer prize twice. Seen in the closing days of 2018, the last production in Josie Rourke's reign at the Donmar Warehouse, Sweat is everything I could have hoped for.
Set in Reading, Pennsylvania,Sweat looks at blue collar workers in America and how after years of toiling for the same company they lose their jobs to cheaper labour, from immigrant communities within the United States, or to the residents of Mexico. Reading is a steel town and like Sheffield, in the film 1997 The Full Monty, is one which finds it is losing jobs to cheaper producers abroad. Of course what Lynn Nottage is cleverly documenting is the reason behind the political success of Donald Trump in the 2016 election with the support of blue collar Americans.
Nottage's play is framed by future scenes of two young men, sons of workers at Olstead's factory, Chris (Osy Ikhile) and Jason (Patrick Gibson) initially in their interviews with a probation or parole officer. Frankie Bradshaw's set is heavy industrial, huge pipes, hooks on chains, girders and rusted pipes set high above the stage. Onstage, covers are removed and a bar set is revealed where three of the Olstead women workers gather to celebrate. The barman Stan (Stuart McQuarrie) runs the bar with a busboy Oscar (Sebastian Viveros). Jessie (Leanne Beat) is pretty much wasted but Cynthia (Clare Perkins) and Tracey (Martha Plimpton) are also well oiled but coherent.
We hear about Cynthia's husband, Brucie (Wil Johnson) who has been on strike and is locked out by his factory management for 93 weeks. He had issues with drugs and stolen from Cynthia. Stan, the bar owner, left Olstead's after an industrial accident and has his own opinion on how little the management did for him. Nottage constructed her play after research with the residents of Reading and the play is detailed and authentic as it traces how Cynthia is promoted off the factory floor but is manipulated into becoming an apologist for management. She is of course branded a traitor.
The playwright cleverly uses her characters to tell us what the issues are at the factory. Workers are asked to take a drop in wages and an increase in hours and a loss of benefits like retirement pensions. A leaflet in Spanish advertising opportunities at Olstead's is found by Oscar, reduced wages for the workers who have been there for forty years but a step up for Oscar from clearing bar tables. News bulletins give us the news on presidential elections as well as local items of Reading news.
Lynette Linton's direction is pitch perfect and we note that she is the newly appointed artistic director of the Bush Theatre, the career path that Josie Rourke took before arriving at the Donmar, after Michael Grandage. All the cast are believable but I will single out Martha Plimpton's complex acting role as the worker betrayed by her employers and her best mate. Osy Ikhile too has a promising future, here as Cynthia's son Chris. Clare Perkins' part is pivotal as the ambitious woman offered the poisoned chalice.
I think Sweat is the best new play I have seen this year.
My only reservation on first seeing is that we cannot solve this problem. In the UK, the steel industry and the mines are almost closed. If America is the richest country in the world, why is it that some of its workers are so near the poverty line? Whereas once the role of the unions was to protect workers, now labour is outsourced abroad and the unions are powerless to stop that. It is indeed the Age of De-Industrialization in the Western world. What Sweat does is to explain to the theatre going classes why people voted for someone who promised them a future. |
FIG. 9 shows a conventional power synthetic IC in which a high-power output transistor chip 23 is disposed between an input matching circuit 30 and an output matching circuit 31. The input matching circuit 30 and the output matching circuit 31 are disposed on a substrate 22 having a high dielectric constant, and the substrate 22 is disposed on a ceramic substrate 21. The input matching circuit 30 is connected to an input terminal 34 with four wires 33, and the output matching circuit 31 is connected to an output terminal 35 with four wires 33.
The input matching circuit 30 is divided into two patterns 30a and 30b, and the output matching circuit 31 is divided into two patterns 31a and 31b. The purpose of dividing the matching circuit into plural patterns is, since a large matching circuit may have area-to-area variations in characteristics, to make the characteristics of the circuit uniform in each pattern.
In a high-power output transistor employed as a high-frequency power synthetic IC, usually, a plurality of transistor cells (hereinafter referred to simply as cells) are connected in parallel. In the transistor shown in FIG. 9, twelve cells are connected in parallel, and the half of the twelve cells, i.e., six cells, are connected through wires 32 to the input matching circuit pattern 30a and the output matching circuit pattern 31a while the other half of the cells are connected through wires 32 to the input matching circuit pattern 30b and the output matching circuit pattern 31b.
FIG. 10 shows a comb-shaped transistor in which drain electrodes 1 and source electrodes 2 are alternatingly arranged facing each other, as an example of the high-power output transistor chip 23. The source electrodes 2 are connected through an air bridge 3 to source pads 4 and connected through via-holes 5 to a rear electrode (not shown) on the rear surface of a semi-insulating GaAs substrate 18. In the comb-shaped transistor, a single transistor cell comprises fourteen gate fingers, and a gate pad 7 is provided for the fourteen gate fingers. Each gate finger is fed through a gate bus 8.
By the way, in a high-frequency and high-power output transistor, there is a possibility that the transistor might oscillate and form a resonance circuit when a DC or a high frequency signal is applied thereto, because of cell to cell variations in characteristics and impedances. When the transistor forms such a resonance circuit, the operation of the transistor becomes unstable, i.e., no signal is output or unnecessary signals are amplified, whereby the synthesis efficiency is significantly reduced.
In the transistor shown in FIG. 9, the patterns 30a and 30b of the input matching circuit 30 are connected to each other through a resistor 92, and the patterns 31a and 31b of the output matching circuit 31 are connected to each other through a resistor 93, whereby the resistors 92 and 93 serve as gain loss components to prevent the transistor from oscillating when a DC or a high-frequency signal is applied. In this case, however, oscillation between adjacent cells in the transistor chip cannot be prevented.
Meanwhile, Japanese Published Patent Application No. Hei. 4-11743 proposed a semiconductor device capable of preventing unwanted oscillation inside a transistor. This semiconductor device is shown in FIG. 11. In FIG. 11, a bus bar 110 connecting gate electrodes 101 of six transistor cells, and a drain electrode 102 common to the six transistor cells are respectively divided into two parts so that each part corresponds to three transistor cells, and the separated bus bars 110 are connected to each other through a resistor layer 41 while the separated drain electrodes 102 are connected to each other through a resistor layer 42, which resistor layers are disposed on a semiconductor substrate 104. In FIG. 11, reference numerals 113 and 123 designate gate bonding pads and drain bonding pads, respectively. In this semiconductor device, however, oscillation between adjacent cells is not prevented, especially when a high-frequency signal is applied, because of cell to cell variations in characteristics and impedances.
Furthermore, Japanese Published Patent Application No. Hei. 1-166564 proposed a high-power field effect transistor for stable transistor operation. This transistor is shown in FIG. 12. In FIG. 12, a transistor cell comprises a plurality of transistor elements, and gate electrodes 37 of the transistor elements are connected through a gate leading electrode 38 to a gate bonding pad 39. A resistor 36 is connected between each gate electrode 37 and the gate leading electrode 38. In this transistor, however, since the resistor 36 is connected to the gate electrode 37 in series, it significantly reduces the gain of the transistor element. |
INTRODUCTION
============
Hantavirus cardiopulmonary syndrome (HCPS), also known as Hantavirus pulmonary syndrome (HPS), has a 35% overall case fatality rate.^([@r1])^ There are no specific antivirals, vaccines, or immunotherapeutic agents for HCPS, and treatment is mainly supportive and symptomatic.^([@r2])^ Ribavirin is an antiviral agent that did not yield any significant benefit in clinical outcomes when used to treat patients during the cardiopulmonary phase of the disease.^([@r3])^ A recent trial of high-dose methylprednisolone (16mg/kg/day) in patients with confirmed or suspected HCPS, attempting to modulate the immune response responsible for the catastrophic outcome, showed no significant clinical benefit.^([@r1])^
Patients with HCPS and refractory shock have a particularly high mortality rate, and early connection to extracorporeal membrane oxygenation (ECMO) has been suggested to improve outcomes.^([@r4],[@r5])^ However, despite an overall survival of 66%, complications from percutaneous cannulation and bleeding are frequent with ECMO. There has also been no prospective trial comparing ECMO with a more conservative approach that incorporates recent advances in critical care management.^([@r6])^ As part of our protocol for managing patients with septic shock, high-volume continuous hemofiltration (HVHF) is frequently used and may play a role in decreasing mortality in patients with refractory septic shock at our institution.^([@r7]-[@r9])^
We report the case of a patient with demonstrated HCPS and refractory shock who was successfully treated with HVHF and Hantavirus hyperimmune plasma, the latter as part of a compassionate treatment national protocol.^([@r10])^ A short course of HVHF may help to differentiate patients who can be treated with conventional intensive care unit (ICU) management from those who will require more complex therapies, such as extracorporeal membrane support.
CASE REPORT
===========
A 30-year-old female patient was admitted to our emergency department in February 2013 with a six-day history of malaise and headache followed by fever. Three days before admission, she was seen in another hospital and sent home with Levofloxacin for suspicion of sinusitis. When symptoms worsened and she developed progressive dyspnea, she visited our emergency department.
On admission, she had severe dyspnea and tachycardia. Laboratory results indicated a lactate level of 4.2mmol/L, C-reactive protein of 7.7mg/dL (normal value \< 0.5), platelet count of 34,000/mm^3^, hematocrit of 47.9%, and lactate dehydrogenase of 406U/L. Diffuse bilateral perihilar infiltrates were present on chest radiography ([Figure 1](#f1){ref-type="fig"}). Troponin-T and creatine-kinase MB were within normal limits. A blood smear showed both neutrophilia and lymphocytosis, including lymphocytes with immunoblastic morphologic features. Because she had recently travelled to an area with a high prevalence of Hantavirus, a rapid test was ordered on admission, and the results were positive.
Figure 1Chest-X-ray on A) admission (left), B) the first day (center) and C) the 6^th^ day (right) showing bilateral infiltrates suggesting acute respiratory distress syndrome.
After initial resuscitation with normal saline, she was transferred to the ICU. Subsequently, due to poor oxygenation and severe alterations in clinical perfusion, the patient was intubated, and protective ventilation was initiated according to our protocol.
Despite administration of hydrocortisone 100mg and aggressive volume expansion with normal saline and albumin, within a few hours, the patient required high dose norepinephrine (0.7µg/kg/min). Peripheral perfusion was also severely altered (lactate levels 5.9mmol/L). Echocardiography showed depressed left ventricular function, with an estimated ejection fraction (Simpson) of 40%, in the presence of severe tachycardia ([Table 1](#t1){ref-type="table"}). A pulmonary artery catheter showed a cardiac index of 2.8L/min/m^2^ and a stroke volume index of 17.5mL/min/m^2^, confirming the diagnosis of cardiopulmonary syndrome secondary to Hantavirus infection.
######
Time course of hemodynamic, clinical and laboratory variables immediately before and after starting high volume hemofiltration
**Time** **Baseline** **3 hours** **6 hours** **12 hours** **24 hours** **48 hours** **72 hours**
--------------------------------------------------- -------------- ------------- ------------- -------------- -------------- -------------- --------------
Cardiac index (L/min/m^2^) 2.8 3.1 3.2 3.4 3.9 2.7
PWP (mmHg) 20 15 15 16 8 18
CVP (mmHg) 14 10 7 12 7 14
PAP (mmHg) 36/26 26/14 27/15 27/10 24/9 27/15
SVI (mL/min/m^2^) 17.5 24.8 25.6 25.5 35.1 27.8
Heart rate 160 129 125 125 133 111 97
Temperature (ºC) 38.2 36.4 36.2 36.3 36.2 36.5 36.6
NE dose 0.7 0.42 0.16 0.11 0.04 0.1 \-
Fluid balance[\*](#TFN4){ref-type="table-fn"} (L) 3.6 3.9 4.8 0.5
PaO~2~ (mmHg) 81.2 66.7 82 86.5 88.6 115.5 89.9
PaCO~2~ (mmHg) 31 30 31.4 26.6 33.7 38.9 32
pH 7.28 7.31 7.41 7.45 7.44 7.36 7.44
HCO~3~ (mEq) 14.3 14.7 19.6 18 22.2 21.6 21
PaO~2~/FiO~2~ ratio 232 148 182 216 222 289 321
SatmvO~2~ (%) 74.3 62.7 67.6 63.4 66.9 79.5 54.9
Creatinine (mg/dL) 0.83 0.49 1.42 1.34
C-reactive protein (mg/dL) 10.6 14.8 7.3
Lactate (mmol/L) 5.9 4.6 4.4 2.5 3.6 2.6 2.7
Albumin (g/dL) 2.6 2.7 2.7
Hematocrit (%) 40.6 32.1 29.7 28
WBC (/mm^3^) 23,800 28,000 25,100 18,500
Platelets (/mm^3^) 27,000 27,000 24,000 25,000
PWP - pulmonary artery wedge pressure; CVP - central venous pressure; PAP - pulmonary artery pressure; SVI - stroke volume index; NE dose - norepinephrine dose (µg/kg/min); PaO~2~ - arterial oxygen tension; PaCO~2~ - arterial carbon dioxide tension; HCO~3~ - bicarbonate; PaO~2~/FiO~2~ - ratio of arterial oxygen tension to inspired oxygen fraction; SatmvO~2~ - mixed venous oxygen saturation; WBC - white blood cells.
Accumulated fluid balance during the previous 24 hours.
At that time, the ratio of arterial oxygen tension to inspired oxygen fraction (PaO~2~:FiO~2~ ratio) was approximately 200. However, due to severe cardiac dysfunction and high norepinephrine requirements, we decided to implement a trial of 6 hours of HVHF before deciding to initiate ECMO.
A 13.5 double-lumen catheter was inserted into the right femoral vein, and HVHF was initiated at 100mL/kg/h. Three hours after starting HVHF, norepinephrine levels were reduced by half, with a significant improvement in clinical perfusion. At that time, the patient received Hantavirus hyperimmune plasma (5,000U/Kg) under a compassionate national treatment protocol.^([@r10])^ Lactate levels decreased from 5.9 to 2.5mmol/L 12 hours after the initiation of HVHF and eventually normalized a few days later. Two days later, repeat echocardiography revealed an improvement in ejection fraction to 65% and an increase in stroke volume index to 35mL/min/m^2^.
The patient continued to improve clinically, although she developed hyperactive delirium, which was successfully managed with quetiapine and dexmedetomidine. The patient was finally extubated 10 days after admission.
Echocardiography on day 14 showed normal systolic function, with no evidence of pulmonary hypertension or cardiac chamber enlargement. On day 16 after admission, she was discharged from the ICU and was sent home a few days later. Two years later, the patient is living a normal life.
DISCUSSION
==========
We describe a patient with HCPS who presented with respiratory failure and severe cardiovascular dysfunction, fulfilling the traditional criteria for ECMO. The implementation of HVHF may have helped to reverse shock within a few hours and, together with conventional critical care management, may have prompted recovery.^([@r6]-[@r8],[@r11],[@r12])^
Hantavirus cardiopulmonary syndrome has high mortality. Treatment is mainly supportive and symptomatic. Early connection to ECMO has been suggested to improve outcomes in patients with HCPS and refractory shock.^([@r5])^ In 1998, Crowley et al. identified several criteria for non-survival, which included refractory shock, lactate \> 4.0mmol/L, severe hypoxia (PaO~2~:FiO~2~ ratio \< 60), and cardiac arrest.^([@r4])^ More recently, Wernly et al. reported an overall survival of 66.6% in 51 patients who were treated with ECMO support. The patients, who had at least one of the previous criteria for non-survival, had a typical clinical presentation consistent with HCPS and a cardiac index that rapidly dropped to \< 2.0L/min/m2 despite maximum inotropic support.^([@r5])^ However, to date, there has been no prospective trial comparing ECMO with a more conservative approach that incorporates recent advances in critical care management, including protective ventilation and HVHF.^([@r7],[@r8],[@r11],[@r12])^ Moreover, ECMO is associated with complications derived from vessel cannulation, frequent bleeding, and high costs.^([@r5])^
The symptoms and severity of HCPS are mainly due to increased capillary permeability following activation of the innate and adaptive immune response rather than direct virus-induced cellular damage. This is likely the most important physiological feature responsible for the massive leakage of plasma into alveoli, with resultant pulmonary edema, in Andes virus (ANDV) infection. In experimental and some observational trials, HVHF has been shown to remove excess inflammatory mediators and to improve cardiopulmonary function in refractory septic shock.^([@r7],[@r13])^ However, a large randomized trial of 140 critically ill patients with septic shock and acute kidney injury did not show a benefit of HVHF in improving either hemodynamic profile or organ function at a dose of 70mL/kg/h compared with 35mL/kg/h.^([@r14])^
In the setting of HCPS, Seitsonen et al. reported two cases caused by Puumala virus infection that rapidly resolved after initiation of corticosteroid treatment combined with continuous veno-venous hemo-diafiltration.^([@r15])^ As the use of steroids has not been shown to provide significant clinical benefit in a number of patients,^([@r1])^ these cases reinforce the potential role that HVHF may play as an alternative way of modulating the inflammatory response in refractory shock in the context of HCPS before proceeding to ECMO.
Our patient fulfilled the criteria for ECMO due to the presence of refractory shock despite high doses of norepinephrine, hyperlactatemia and tissue hypoperfusion. However, hypoxemia was moderate, and the hemodynamic profile resembled that of severe septic shock. Therefore, based on our extensive experience with HVHF, we decided to initiate a trial of HVHF.^([@r7]-[@r9],[@r16])^ The dramatic decrease in norepinephrine requirements soon after HVHF suggests that this therapy may have played a significant role in improving the patient\'s condition. However, whether this was due to the removal of inflammatory mediators, a decrease in fever or the normalization of pH remains unclear. If the patient had not responded well to HVHF therapy or presented with refractory hypoxemia, ECMO would have being started immediately.
We also cannot exclude the role of Hantavirus hyperimmune plasma in reversing shock. However, the temporal course suggests otherwise as the patient was already on HVHF and improving when the hyperimmune plasma was administered. The use of neutralizing antibodies produced by a DNA vaccine has been shown to protect against lethal ANDV infection in Syrian hamsters, an animal model of ANDV infection.^([@r17])^ A non-randomized pilot study in patients with ANDV infection was conducted in Chile. The results were promising, with a reduction in mortality from 32% to 14%, compared with the outcomes of patients from centers that did not participate in the study.^([@r10])^ However, future studies are needed to support a definitive recommendation regarding the use of immune plasma.
CONCLUSION
==========
In summary, we describe a patient with Hantavirus cardiopulmonary syndrome who presented with respiratory failure and severe cardiovascular dysfunction. Despite fulfilling traditional criteria for extracorporeal membrane oxygenation, the implementation of high-volume continuous hemofiltration was associated with rapid shock reversal and may have prompted recovery. In patients with Hantavirus cardiopulmonary syndrome and cardiovascular dysfunction, we suggest that a 6 to 12 hour trial of high volume continuous hemofiltration be attempted before proceeding to a more aggressive approach, such as extracorporeal membrane oxygenation. However, further clinical trials are required to support a definitive recommendation regarding the use of high volume continuous hemofiltration in these patients.
**Responsible editor:** Thiago Costa Lisboa
[^1]: **Conflicts of interest:** None.
|
Other webcomics
Artwork: Fiery Love
└ posted on Saturday, 18 February 2012, by Novil
As part of our feature “commissioned artwork of our characters drawn by other talented artists”, the Philippine artist Jericho (Serathus) drew the picture you can see above. It is titled “Fiery Love” and dedicated to all fans of the computer role playing game Planescape: Torment from Black Isle which is known for its innovative story and great characters. Larisa sure knows how to terrify evil firemages.
Supporters can download the image in its original size (3200 x 2000) and as a wallpaper on the special page for donators.
I’m open for suggestions for subjects that you’d like to see drawn in color. A new picture will be posted every second Saturday.
Ignus isn’t a ‘fire mage’ and nor is he evil. He is permanently linked to the plane of fire, ie. fire incarnate. Fire knows no morals, it just is …and so is Ignus. He also hover in the air. I think it’s because he’s physically unable to move in any other manner, but I could be wrong.
He might not be a “full mage”, but he was definitely a student of magic; we don’t know if he burnt down half of Sigil long before he “graduated” (if there’s something like that) or if he was never released from being a mere student, because one of the former persona of the Nameless One was a prick and never thought him “good enough”.
If not pure evil – Ingus IS definitely twisted. He was before, he got even more screwy while he studied magic and now after years of being tormented (although he is such a masochist he probably enjoys it even) he is insane. Fire, as an element, is not insane. Fire is – like any other element – neutral, while Ignus is “chaotic neutral”. This is what makes him difficult to handle and dangerous. There is STILL some intellect behind insanity, paired with emotion, and while you can’t hurt or stir fire’s emotion you can do it with the ones of a once human being.
Pure fire wouldn’t betray you in the end because of “revenge” or the desire to burn down entire worlds. But Ignus does, because he knows “desire”. |
DALLAS (NCBWA) – Two of the nation's top pitchers and three All-America position players have been named as finalists for the 2013 Dick Howser Trophy presented by Easton Foundations. Balloting was conducted by the National Collegiate Baseball Writers Association, in conjunction with the College Baseball Foundation, the Dick Howser Trophy committee and the St. Petersburg Area Chamber of Commerce. San Diego outfielder Kris Bryant, Vanderbilt second baseman Tony Kemp, North Carolina third baseman Colin Moran, and pitchers Tyler Beede of Vanderbilt and Mark Appel of Stanford are the elite fivesome for the 27th annual Howser Trophy ceremonies. The winner will be announced Saturday, June 15, at a 10 a.m. (CDT) national news conference at TD Ameritrade Park – the third-year home of the 67th annual Division I NCAA World Series. Each finalist also represents the ideals of character, leadership, desire, and competitive spirit exhibited by Dick Howser, the All-America shortstop and later head coach at Florida State, before managing the Kansas City Royals to the world championship in 1985. He also is the namesake for Dick Howser Stadium at FSU. Bryant, a junior from Las Vegas, Nev., led the nation in virtually every power hitting category in 2013. The two-time All-West Coast Conference selection and consensus '13 All-America choice has 31 home runs - 10 more than current runner-up Ryan Kinsella of Elon – in 62 contests to top NCAA individuals. The Toreros' standout also paces DI in runs with 80 (1.3 per game), bases-on-balls with 66 and slugging percentage at .820 (187 total bases in 228 at-bats). He helped USD, under coach Rich Hill, to advance the deepest of any WCC team in '13 NCAA play with a second-place showing in the Los Angeles Regional hosted by winner UCLA. Kemp, a junior from Nashville, Tenn., has led the Southeastern Conference much of the season in batting average and enters the NCAA Nashville Super Regional with a team-best .398 mark. Compared with previous Dick Howser Trophy winner second baseman Rickie Weeks of Southern University, the swift infielder led Vanderbilt to a school-best 26-3 SEC mark and 54 wins in its first 64 outings. He enters the week tied for second nationally in hits with 102 and has helped VU generate runs with 64 runs and a team-high 32 stolen bases for coach Tim Corbin's crew. Moran, a junior from Rye, N.Y., stands atop all DI participants with 85 RBI and aided UNC to the No. 1 seed and Chapel Hill Regional and Super Regionals. He has batted .351 with 13 home runs and 69 runs for the 2013 Tar Heels, the Atlantic Coast Conference champions under coach Mike Fox. Moran has added consensus All-America laurels to his resume' for the second year in succession and is 2013 ACC Hitter of the Year. Beede, a sophomore from Auburn, Mass., enters NCAA Super Regional competition with a nation-topping 14-0 record, 16 games started as the Commodores' ace, 101 strikeouts, a 2.20 earned run average, .177 opponents' batting average, Southeastern Conference Pitcher of the Year, and All-America laurels. Appel, a senior from Houston, Texas, took the educational route and returned to Stanford for a successful final campaign. That moved paid dividends for the big rigthmader as he won almost a third of the Cardinal’s 32 team victories at 10-4 to complement a 2.12 ERA and 1300 strikeouts in 106.1 innings of work for coach Mark Marquess’ 2013 squad. Voting for the Dick Howser Trophy has been conducted by the NCBWA membership since 1999 after the American Baseball Coaches Association selected the recipient from 1987-1998. The NCBWA also selects the Stopper of the Year, the Division I National Coach of the Year and National Freshman Hitter and Pitcher of the Year, along with NCAA Division II and III All-America teams, Players and Coaches of the Year. The Howser Trophy was created in 1987, shortly after Howser's death. Previous winners of the Howser Trophy are Mike Fiore, Miami, 1987; Robin Ventura, Oklahoma State, 1988; Scott Bryant, Texas, 1989; Alex Fernandez, Miami-Dade Community College South, 1990; Frank Rodriguez, Howard College (Texas), 1991; Brooks Kieschnick, Texas, 1992 and 1993; Jason Varitek, Georgia Tech, 1994; Todd Helton, Tennessee, 1995; Kris Benson, Clemson, 1996; J. D. Drew, Florida State, 1997; Eddy Furniss, LSU, 1998; Jason Jennings, P, Baylor, 1999; Mark Teixeira, 1B, Georgia Tech, 2000; Mark Prior, P, USC, 2001; Khalil Greene, SS, Clemson, 2002; Rickey Weeks, 2B, Southern U., 2003; Jered Weaver, P, Long Beach State, 2004; Alex Gordon, 3B, Nebraska, 2005; Brad Lincoln, P, Houston, 2006; David Price, P, Vanderbilt, 2007; Buster Posey, C, Florida State, 2008; Stephen Strasburg, P, San Diego State, 2009; Anthony Rendon, 3B, Rice, 2010; Taylor Jungmann, P, Texas, 2011; and Mike Zunino, C, Florida, 2012. 2013 Dick Howser Trophy:
• Thu., May 16: Dick Howser Trophy semifinalists announced
• Thu., June 6: Dick Howser Trophy finalists announced
• Sat., June 15: Dick Howser Trophy winner announced Related links:
• More on the Dick Howser Trophy |
Livermore girl, 7, killed in freeway crash
TRAFFIC
A 7-year-old girl was killed Friday when she was thrown from a minivan after it crashed into a big-rig truck in Livermore, the California Highway Patrol said.
Hannah Bates of Livermore was declared dead at the scene. The driver of the minivan and two other children in the vehicle suffered minor to moderate injuries, said CHP Officer Steve Creel. He did not know whether the female driver and the other children were related to Hannah.
The minivan was in the far left lane of westbound Interstate 580 near Portola Avenue when the crash happened in the rain at 8:30 a.m., the CHP said.
The minivan was going about 65 mph when the driver lost control and hit the center guardrail, Creel said. The vehicle then veered right and crossed two lanes before it slammed into the truck, which was traveling about 55 mph in the far right lane, Creel said.
The truck was hauling two trailers full of grapes. The van hit the second trailer, which overturned and spilled grapes over the freeway. After hitting the trailer, the minivan veered left and overturned before landing upright in the far two left lanes, Creel said.
The van's sliding doors flew open during the crash, and Hannah was thrown from the vehicle. It was unclear whether she had been wearing a seat belt, Creel said.
The cause of the crash is under investigation. The weather may have played a role, and investigators also are looking at the two rear tires of the minivan, which were severely worn, Creel said. |
0, 86, -9, -2, -3 in increasing order.
-9, -3, -2, 0, 5, 86
Sort -8, -1, -5, -62, 2 in decreasing order.
2, -1, -5, -8, -62
Put -10, 2, 321 in increasing order.
-10, 2, 321
Put -3, 3, 101, -14, 2 in increasing order.
-14, -3, 2, 3, 101
Sort -12, -22, -3, -141 in increasing order.
-141, -22, -12, -3
Sort -129, -431.4, 0 in decreasing order.
0, -129, -431.4
Put 1, -5, 90, -128 in increasing order.
-128, -5, 1, 90
Sort -12, 3, 61, -3 in decreasing order.
61, 3, -3, -12
Sort 0.2, 0.4, -3, 53.3, -0.3.
-3, -0.3, 0.2, 0.4, 53.3
Sort -2, 2, -3, -9109 in descending order.
2, -2, -3, -9109
Sort -1, 2, 0, 4/183, 2/7 in increasing order.
-1, 0, 4/183, 2/7, 2
Sort 0, 2, -2, -172, -1.
-172, -2, -1, 0, 2
Sort -4, 1, -2, -45, 148, -1.
-45, -4, -2, -1, 1, 148
Put -2/37, 1, -1624 in increasing order.
-1624, -2/37, 1
Put 4, -34, -2, 0.12, -3, 3 in increasing order.
-34, -3, -2, 0.12, 3, 4
Sort -3, -19352, 19 in descending order.
19, -3, -19352
Put -0.355, -0.06, 444, 2/7 in descending order.
444, 2/7, -0.06, -0.355
Sort -3, 4, 302, 1 in decreasing order.
302, 4, 1, -3
Sort 2, -3/2, 8/2889 in decreasing order.
2, 8/2889, -3/2
Sort -1, -2, 4, 0.04, -1/5, 0.1 in descending order.
4, 0.1, 0.04, -1/5, -1, -2
Sort 11, -4, -1, -8, -3 in descending order.
11, -1, -3, -4, -8
Sort 9, -1, 5, -1066, 1.
-1066, -1, 1, 5, 9
Sort 21653, -4, 2, -1 in ascending order.
-4, -1, 2, 21653
Put -207, 0, 0.08, 3 in decreasing order.
3, 0.08, 0, -207
Put -4, 64, 74, 4, -1, 5 in increasing order.
-4, -1, 4, 5, 64, 74
Put -2/39, 0.4, 4, -64, 1/4, 11 in decreasing order.
11, 4, 0.4, 1/4, -2/39, -64
Put -3, -4, 8296 in descending order.
8296, -3, -4
Put -9, 1, -2, 21, 2 in decreasing order.
21, 2, 1, -2, -9
Sort -2, -6, 13, -56, 5, 4 in ascending order.
-56, -6, -2, 4, 5, 13
Put -6, 213, 22 in decreasing order.
213, 22, -6
Sort 1, -36/5, -3, -13, 3/4.
-13, -36/5, -3, 3/4, 1
Put -6, 4, -4, -26668, 3, -1 in decreasing order.
4, 3, -1, -4, -6, -26668
Put -5, 549, -49, -4 in decreasing order.
549, -4, -5, -49
Sort 73, 634, 4, -3/4 in ascending order.
-3/4, 4, 73, 634
Sort -0.3, 6, 87049/3.
-0.3, 6, 87049/3
Put -2/13, 28, 0, 2, 304, 2/13 in ascending order.
-2/13, 0, 2/13, 2, 28, 304
Put -2, -5, 38, -3 in increasing order.
-5, -3, -2, 38
Sort 204, -1, 4, -270 in descending order.
204, 4, -1, -270
Put -291, -59, 2/13 in descending order.
2/13, -59, -291
Sort 0, -181, -5, 2, 3 in increasing order.
-181, -5, 0, 2, 3
Sort -1.4, -3/4, -25.09 in ascending order.
-25.09, -1.4, -3/4
Put -10, -2, -5, 299, -3, 5 in descending order.
299, 5, -2, -3, -5, -10
Sort -2, -26113, 0, -5 in decreasing order.
0, -2, -5, -26113
Sort 588, 2, 97.
2, 97, 588
Sort 2/3, 2/11, -0.1, -4, -56, -12 in decreasing order.
2/3, 2/11, -0.1, -4, -12, -56
Put -0.1, 1107, 0, -1/6, 2 in descending order.
1107, 2, 0, -0.1, -1/6
Sort 4, -0.4, -7, -0.6, -9.
-9, -7, -0.6, -0.4, 4
Sort 5, -3, 8265, -1.
-3, -1, 5, 8265
Sort 0, 65770, 1 in decreasing order.
65770, 1, 0
Put 2/15, 0.26, 7.7, -1/4 in decreasing order.
7.7, 0.26, 2/15, -1/4
Sort 0.3, 4, 11.48 in descending order.
11.48, 4, 0.3
Sort -0.1, -9, 1, 2/13, 0.4, 93.
-9, -0.1, 2/13, 0.4, 1, 93
Sort -22, -13, -1/182, 0.5 in descending order.
0.5, -1/182, -13, -22
Put 5, -5/16, 191, -0.5 in increasing order.
-0.5, -5/16, 5, 191
Sort 2, -729, 3, -2 in decreasing order.
3, 2, -2, -729
Put 13587, -1, 4 in decreasing order.
13587, 4, -1
Sort -23, -25, 3, -1, -6 in decreasing order.
3, -1, -6, -23, -25
Sort 145, -45, -5 in descending order.
145, -5, -45
Sort -1, -6.5, -0.3, 504 in descending order.
504, -0.3, -1, -6.5
Sort -2.29, 15, 1/4 in descending order.
15, 1/4, -2.29
Sort 4, 3, -21701, -5.
-21701, -5, 3, 4
Sort -4, 2/3, 475, -1.8 in descending order.
475, 2/3, -1.8, -4
Sort -33, -91/5, 0.2.
-33, -91/5, 0.2
Sort -5, -220, -89, 0 in decreasing order.
0, -5, -89, -220
Sort -0.064, 2, 0.1, 19 in descending order.
19, 2, 0.1, -0.064
Sort 10, 3.77, -6, 4.
-6, 3.77, 4, 10
Put 7, -2, 55/17 in decreasing order.
7, 55/17, -2
Sort -8, -1/8, 0.5, 0.4, 268/9 in descending order.
268/9, 0.5, 0.4, -1/8, -8
Sort -1, -2, 6, -9, -31, 4.
-31, -9, -2, -1, 4, 6
Put 0.4, 1/6, -5, -60, 112 in increasing order.
-60, -5, 1/6, 0.4, 112
Put 14, -5, -1130, 4, -7, 5 in increasing order.
-1130, -7, -5, 4, 5, 14
Sort 172, 0.4, -2, 3/7 in ascending order.
-2, 0.4, 3/7, 172
Sort -5, -86, -0.3, -1, -2 in decreasing order.
-0.3, -1, -2, -5, -86
Put -1, -44, 101, 3 in ascending order.
-44, -1, 3, 101
Sort -1, 2, 25, -829.
-829, -1, 2, 25
Sort -97, 4, 2, 1, -2 in ascending order.
-97, -2, 1, 2, 4
Put -0.3, -53, 1235, -1/10 in increasing order.
-53, -0.3, -1/10, 1235
Sort -0.1, 1, -2/2617, -1.
-1, -0.1, -2/2617, 1
Put -23, -2/19, 0.5, 2/9, 239 in descending order.
239, 0.5, 2/9, -2/19, -23
Put -215, -6, 6, 4, -5 in ascending order.
-215, -6, -5, 4, 6
Sort 8, -52, 4, -59, -2/7 in descending order.
8, 4, -2/7, -52, -59
Sort -2/5, -58.39, 2/13 in increasing order.
-58.39, -2/5, 2/13
Put 38, -4, 95, 2, -116 in decreasing order.
95, 38, 2, -4, -116
Sort 0.5, 5, -0.12, -25856 in increasing order.
-25856, -0.12, 0.5, 5
Sort 0.1, 1107, -2, 2/15 in descending order.
1107, 2/15, 0.1, -2
Put -35.7, -1/4, 0.2, 2/7, 2, -0.1 in decreasing order.
2, 2/7, 0.2, -0.1, -1/4, -35.7
Sort 1/3, -1/4, 73/5, -2/123, 0.5.
-1/4, -2/123, 1/3, 0.5, 73/5
Sort 171, -5, -2, -22 in decreasing order.
171, -2, -5, -22
Sort 2, 4, -49.
-49, 2, 4
Sort 13000, -1/2, -7.
-7, -1/2, 13000
Put 8, -6, 3, -12, 2 in decreasing order.
8, 3, 2, -6, -12
Put -89, 0, 63, -5, -14 in descending order.
63, 0, -5, -14, -89
Sort 3, -13, 1, -46 in increasing order.
-46, -13, 1, 3
Put 0.2, -1, -2/15, 3, 34, 81 in descending order.
81, 34, 3, 0.2, -2/15, -1
Sort 697, 4, 0.2, 0.4, 2/7 in decreasing order.
697, 4, 0.4, 2/7, 0.2
Put -0.2, -0.06, 0.4, 10337, -1 in descending order.
10337, 0.4, -0.06, -0.2, -1
Sort -84, 5, -11, 4, 6 in ascending order.
-84, -11, 4, 5, 6
Put -4, 7, 5, 1, -2 in decreasing order.
7, 5, 1, -2, -4
Sort 4, -1411, 1/3, -0.1, 104, 0.
-1411, -0.1, 0, 1/3, 4, 104
Sort 156, -13, -1, 1 in ascending order.
-13, -1, 1, 156
Sort 2, -2574, 4/5 in decreasing order.
2, 4/5, -2574
Put -9, 0, 20, -3 in descending order.
20, 0, -3, -9
Sort -3/2, 16, 5/119, -1 in ascending order.
-3/2, -1, 5/119, 16
Sort -20, -554, 24 in decreasing order.
24, -20, -554
Sort -0.3, -0.05, -4, 6, 0.4.
-4, -0.3, -0.05, 0.4, 6
Sort -82, -11.84, 0.12.
-82, -11.84, 0.12
Sort 2, -2/31, 40/17 in ascending order.
-2/31, 2, 40/17
Put 916, -1/2, 0 in decreasing order.
916, 0, -1/2
Sort 30705, 1/3, -2.
-2, 1/3, 30705
Put -2, 0, -3, -292 in descending order.
0, -2, -3, -292
Sort -3, -62, 0, 57, -1 in increasing order.
-62, -3, -1, 0, 57
Sort 13, -2, -13, -6.
-13, -6, -2, 13
Sort -5, -4, -79107, -1, -3 in increasing order.
-79107, -5, -4, -3, -1
Put -4/5, 1761, -4, 158 in increasing order.
-4, -4/5, 158, 1761
Put -5, 0.2, -16103/4, -5/4 in increasing order.
-16103/4, -5, -5/4, 0.2
Sort -3, 148, -30, -5 in ascending order.
-30, -5, -3, 148
Sort 0, 2, 1654, -3, 4 in decreasing order.
1654, 4, 2, 0, -3
Sort -23, -113, -4.
-113, -23, -4
Put 6, 3, 168, -0.12 in decreasing order.
168, 6, 3, -0.12
Sort -31, -2, 4, -1/5, 4/13.
-31, -2, -1/5, 4/13, 4
Sort 2, 4, 0.4, -485, -0.9 in decreasing order.
4, 2, 0.4, -0.9, -485
Sort 1.2, -3/5, -33, 3/4 in ascending order.
-33, -3/5, 3/4, 1.2
Sort -1, -11, -0.5, 4/7, -5, 17.7 in increasing order.
-11, -5, -1, -0.5, 4/7, 17.7
Put 5, 1, 772, 3, -5, -8 in increasing order.
-8, -5, 1, 3, 5, 772
Sort -5362, -6, 6.
-5362, -6, 6
Sort -120, -5, -52 in ascending order.
-120, -52, -5
Put 2, -0.5, 15, 1/5, 22, -10 in decreasing order.
22, 15, 2, 1/5, -0.5, -10
Put 2, -2, 3, -13, 66 in increasing order.
-13, -2, 2, 3, 66
Sort -136, -4, -33, 3 in descending order.
3, -4, -33, -136
Sort 0.18, 12/11, -16 in ascending order.
-16, 0.18, 12/11
Sort 4, 0, 8, 39 in decreasing order.
39, 8, 4, 0
Sort -1/2, 2/17, 1, 5, 147 in decreasing order.
147, 5, 1, 2/17, -1/2
Sort -16, -43021, 2 in decreasing order.
2, -16, -43021
Put -2673, 1/3, 4, 87 in increasing order.
-2673, 1/3, 4, 87
Put 4, 1311, -166 in descending order.
1311, 4, -166
Put 7, -0.06, 2/7, -1, 4, 1.7 in ascending order.
-1, -0.06, 2/7, 1.7, 4, 7
Put 13, 3, -4, -3, -5, 2 in descending order.
13, 3, 2, -3, -4, -5
Put -3820, -41, -2, |
391 U.S. 392 (1968)
PUYALLUP TRIBE
v.
DEPARTMENT OF GAME OF WASHINGTON ET AL.
No. 247.
Supreme Court of United States.
Argued March 25-26, 1968.
Decided May 27, 1968.[*]
CERTIORARI TO THE SUPREME COURT OF WASHINGTON.
Arthur Knodel argued the cause and filed briefs for petitioner in No. 247. Jack E. Tanner argued the cause and filed a brief for petitioners in No. 319.
Joseph L. Coniff, Special Assistant Attorney General of Washington, and Mike R. Johnston, Assistant Attorney *393 General, argued the cause for respondents in both cases. With them on the briefs was John J. O'Connell, Attorney General.
John S. Martin, Jr., argued the cause for the United States, as amicus curiae, urging reversal in both cases. With him on the brief were Solicitor General Griswold, Assistant Attorney General Martz, Louis F. Claiborne, Roger P. Marquis, and Edmund B. Clark.
George S. Woodworth, Assistant Attorney General, argued the cause for the State of Oregon, as amicus curiae, urging affirmance in both cases. With him on the brief were Robert Y. Thornton, Attorney General, and Roy C. Atchison and Henry S. Kane, Assistant Attorneys General. T. J. Jones III argued the cause for the State of Idaho Fish and Game Department, as amicus curiae, urging affirmance in both cases. With him on the brief was Allan G. Shepard, Attorney General of Idaho.
Briefs of amici curiae, urging reversal in No. 247, were filed by Arthur Lazarus, Jr., for the Association on American Indian Affairs, Inc., by Albert J. Ahern for the National Congress of American Indians, and by James B. Hovis for the Confederated Bands and Tribes of the Yakima Indian Nation.
MR. JUSTICE DOUGLAS delivered the opinion of the Court.
These cases present a question of public importance which involves in the first place a construction of the Treaty of Medicine Creek made with the Puyallup and Nisqually Indians in 1854 (10 Stat. 1132) and secondly the constitutionality of certain conservation measures adopted by the State of Washington allegedly impinging on those treaty rights.
*394 These suits were brought by respondents in the state court against the Indians for declaratory relief and for an injunction. The trial court held for respondents and with exceptions not relevant to our problem the Supreme Court affirmed in part and remanded for further findings on the conservation aspect of the problem. Department of Game v. Puyallup Tribe, 70 Wash. 2d 245, 422 P. 2d 754; Department of Game v. Kautz, 70 Wash. 2d 275, 422 P. 2d 771. We granted the petitions for certiorari and consolidated the cases for oral argument. 389 U. S. 1013.
While the Treaty of Medicine Creek created a reservation for these Indians, no question as to the extent of those reservation rights, if any, is involved here.[1] Our *395 question concerns the fishing rights protected by Article III, which so far as relevant reads as follows:
"The right of taking fish, at all usual and accustomed grounds and stations, is further secured to said Indians, in common with all citizens of the Territory, and of erecting temporary houses for the purpose of curing, together with the privilege of hunting, gathering roots and berries, and pasturing their horses on open and unclaimed lands . . . ."
The fish to which the Treaty rights pertain in these cases are salmon and steelhead, anadromous fish that hatch in the fresh water of the Puyallup River and the Nisqually River. The steelhead is a trout; the salmon are of four specieschinook, silver, chum, and pink. They come in from the ocean, pass through the salt water of Puget Sound, enter the fresh waters at the mouths of rivers, and go up these rivers to spawn. The adult salmon die after spawning, but not necessarily the steelhead. In time the fry return to the ocean and start the cycle anew.
People fish for these species far offshore.[2] As respects fishing within its territorial waters, Washington specifies the time when fishing may take place, the areas open to fishing, and the gear that may be used.[3]
*396 Fishing licenses are prescribed.[4] Steelhead may be taken only by hook[5] and not commercially. Salmon may be taken commercially with nets of a certain type in certain areas.[6] Set nets or fixed appliances are barred in "any waters" of the State for the taking of salmon or steelhead.[7] So is "monofilament gill net webbing."[8]
Nearly every river in the State has a salmon preserve at its mouth;[9] and Commencement Bay at the mouth of the Puyallup River is one of those preserves.[10]
The Puyallup Indians use set nets to fish in Commencement Bay and at the mouth of the Puyallup River and in areas upstream. The Nisqually Indians use set nets in the fresh waters of the Nisqually River. These Indians fish not only for their own needs but commercially as well, supplying the markets with a large volume of salmon. The nets used are concededly illegal if the laws and regulations of the State of Washington are valid; and it is to that question that we now turn.[11]
*397 The "right of taking fish at all usual and accustomed places, in common with" citizens of the Territory under a treaty with the Yakimas was involved in United States v. Winans, 198 U. S. 371. The lands bordering the Columbia River at those places were acquired by private owners who under license from the State acquired the right to fish there and sought to exclude the Indians by reason of their ownership. The Court held that the right to fish at these places was a "continuing" one that could not be destroyed by a change in ownership of the land bordering the river. 198 U. S., at 381. To construe the treaty as giving the Indians "no rights but such as they would have without the treaty" (198 U. S., at 380) would be "an impotent outcome to negotiations and a convention, which seemed to promise more and give the word of the Nation for more." Ibid. In Seufert Bros. Co. v. United States, 249 U. S. 194, the Court construed the same provision liberally so as to include all "accustomed places" even though the Indians shared those places with other Indians and with white men, rejecting a strict, technical construction not in keeping with the justice of the case.
*398 It is in that spirit that we approach these cases in determining the scope of the treaty rights which the Puyallups and Nisqually obtained.
The treaty right is in terms the right to fish "at all usual and accustomed places." We assume that fishing by nets was customary at the time of the Treaty; and we also assume that there were commercial aspects to that fishing as there are at present. But the manner in which the fishing may be done and its purpose, whether or not commercial, are not mentioned in the Treaty. We would have quite a different case if the Treaty had preserved the right to fish at the "usual and accustomed places" in the "usual and accustomed" manner. But the Treaty is silent as to the mode or modes of fishing that are guaranteed. Moreover, the right to fish at those respective places is not an exclusive one. Rather, it is one "in common with all citizens of the Territory." Certainly the right of the latter may be regulated. And we see no reason why the right of the Indians may not also be regulated by an appropriate exercise of the police power of the State. The right to fish "at all usual and accustomed" places may, of course, not be qualified by the State, even though all Indians born in the United States are now citizens of the United States. Act of June 2, 1924, 43 Stat. 253, as superseded by § 201 (b) of the Nationality Act of 1940, 8 U. S. C. § 1401 (a) (2). But the manner of fishing, the size of the take, the restriction of commercial fishing, and the like may be regulated by the State in the interest of conservation, provided the regulation meets appropriate standards and does not discriminate against the Indians.
In Tulee v. Washington, 315 U. S. 681, we had before us for construction a like treaty with the Yakima Indians which guaranteed the right to fish "at all usual and accustomed places, in common with the citizens" of Washington *399 Territory. 12 Stat. 951. Tulee, a member of the tribe, was fishing without a license off the Yakima Indian Reservation; the State convicted him for failure to obtain a license. We reversed, saying:
"[W]hile the treaty leaves the state with power to impose on Indians, equally with others, such restrictions of a purely regulatory nature concerning the time and manner of fishing outside the reservation as are necessary for the conservation of fish, it forecloses the state from charging the Indians a fee of the kind in question here." Id., at 684.
In other words, the "right" to fish outside the reservation was a treaty "right" that could not be qualified or conditioned by the State. But "the time and manner of fishing . . . necessary for the conservation of fish," not being defined or established by the treaty, were within the reach of state power.
The overriding police power of the State, expressed in nondiscriminatory measures for conserving fish resources, is preserved. In United States v. Winans, supra, a forerunner of the Tulee case, the Court said:
"[S]urely it was within the competency of the Nation to secure to the Indians such a remnant of the great rights they possessed as `taking fish at all usual and accustomed places.' Nor does it restrain the State unreasonably, if at all, in the regulation of the right." 198 U. S., at 384.
Another forerunner of Tulee was Kennedy v. Becker, 241 U. S. 556, which also involved a nonexclusive grant of fishing rights to Indians. Indians were charged with the spearing of fish contrary to New York law, their defense being the fishing rights granted by a treaty. The Court, in sustaining the judgments of conviction, said:
"We do not think that it is a proper construction of the reservation in the conveyance to regard it as *400 an attempt either to reserve sovereign prerogative or so to divide the inherent power of preservation as to make its competent exercise impossible. Rather are we of the opinion that the clause is fully satisfied by considering it a reservation of a privilege of fishing and hunting upon the granted lands in common with the grantees, and others to whom the privilege might be extended, but subject nevertheless to that necessary power of appropriate regulation, as to all those privileged, which inhered in the sovereignty of the State over the lands where the privilege was exercised." 241 U. S., at 563-564.
The use of purse seines and other nets[12] in the salt waters is permitted for commercial purposes under terms and conditions prescribed by the State; and their use in these areas is open to all, Indians as well as others. The use of set nets[13] in fresh water streams or at their mouths is barred not only to Indians but to all others. *401 An expert for the State testified that the reason for that prohibition was conservation:
"The salmon are milling and delaying, and especially in times of low water or early arrival of the run or for any number of reasons, the delay may be considerable.
"Once again the fish are available to the net again and again. This is the main reason for the preserve, so that the milling stock will not be completely taken.
"Then further, this is a point in the bay at the river mouth where you very definitely have a funnelling effect. The entire run is funneled into a smaller area and it is very vulnerable."
Fishing by hook and line is allowed in these areas because when salmon are "milling near the river mouth," they are not "feeding and they don't strike very well, so the hook and line fishery will take but a small percentage of the available stock no matter how hard they fish."
Whether the prohibition of the use of set nets in these fresh waters was a "reasonable and necessary" (70 Wash. 2d, at 261, 422 P. 2d, at 764) conservation measure[14] was *402 left for determination by the trial court when the Supreme Court, deeming the injunction in No. 247 too broad, remanded the case for further findings.[15] When *403 the case was argued here, much was said about the pros and the cons of that issue. Since the state court has given us no authoritative answer to the question, we leave it unanswered and only add that any ultimate findings on the conservation issue must also cover the issue of equal protection implicit in the phrase "in common with."
Affirmed.
NOTES
[*] Together with No. 319, Kautz et al. v. Department of Game of Washington et al., also on certiorari to the same court.
[1] It should be noted that while a reservation was created by Article II of the Treaty, Article VI provided that the President might remove the Indians from the reservation "on remunerating them for their improvements and the expenses of their removal, or may consolidate them with other friendly tribes or bands." Article VI also gave the President authority alternatively to divide the reservation into lots and assign them to those individuals or families who were willing to make these places their permanent home. In 1887 Congress passed the General Allotment Act (24 Stat. 388) authorizing the division of the reservation land among the individual Indians. In 1893 Congress passed the Puyallup Allotment Act, 27 Stat. 633, which established a commission to make the allotments. And by the Act of April 28, 1904, 33 Stat. 565, Congress gave "the consent of the United States" to the removal of prior restrictions on alienation by these Indians. The trial court in No. 247 found that all lands within the boundaries of the reservation created by the Treaty have been transferred to private ownership pursuant to these Acts of Congress, with the exception of two small tracts used as a cemetery for members of the tribe; and much of it is now in the city of Tacoma. See State v. Satiacum, 50 Wash. 2d 513, 314 P. 2d 400 (1957). Whether in light of this history the reservation has been extinguished is a question we do not reach. Cf. Seymour v. Superintendent, 368 U. S. 351, 356-359. The Washington Supreme Court seems to hold that the right to fish in streams once within the old reservation is protected by the Article III guarantee. See 70 Wash. 2d, at 261, 262, 422 P. 2d, at 763, 764. There are indeed no other fishing rights specifically reserved in the Treaty of Medicine Creek except those covered by Article III.
[2] Fishing for salmon in the high seas is governed by a convention agreed to by Canada, Japan, and the United States on May 9, 1952. 4 U. S. T., Pt., I, p. 380, T. I. A. S. No. 2786. As to sockeye salmon and pink salmon, the United States and Canada have a separate convention first signed May 26, 1930, and amended as of July 3, 1957. 8 U. S. T., Pt. I, p. 1057, T. I. A. S. No. 3867.
Washington bars the use of nets in fishing for salmon in the international waters of the Pacific. Wash. Rev. Code § 75.12.220.
[3] Wash. Admin. Code §§ 220-16-010 to XXX-XX-XXX (salmon); Wash. Dept. of Game, Perm. Regs. Nos. 32-35 (1964), Temp. Reg. No. 273 (1968) (steelhead).
[4] Wash. Rev. Code §§ 75.28.380; §§ 77.32.005-77.32.280.
[5] Wash. Dept. of Game, Perm. Reg. No. 34 (1964).
[6] Wash. Rev. Code § 75.12.140 defines the permissible areas for reef net fishing. Section 75.12.010, while containing a prohibition against commercial fishing in a large salt water area, allows the director of fisheries to permit commercial fishing there within stated times and with prescribed gear. And see Wash. Admin. Code §§ 220-32-010 to XXX-XX-XXX (Columbia River area); §§ 220-36-010 to XXX-XX-XXX (Grays Harbor area); §§ 220-40-010 to XXX-XX-XXX (Willapa Harbor area); §§ 220-48-010 to XXX-XX-XXX (Puget Sound area). Commercial fishing in other areas is banned. Wash. Rev. Code § 75.12.160; Wash. Admin. Code § 220-20-010.
[7] Wash. Rev. Code §§ 75.12.060, 77.16.060.
[8] Wash. Rev. Code § 75.12.280. It appears that the monofilament type of gear (made of plastic) is less visible in clear water in daylight than the nylon web.
[9] Wash. Admin. Code § 220-48-020.
[10] Wash. Admin. Code § 220-48-020 (10).
[11] Petitioners in No. 247 argue that the Washington courts lacked jurisdiction to entertain an action against the tribe without the consent of the tribe or the United States Government (citing United States v. United States Fidelity & Guaranty Co., 309 U. S. 506, and Turner v. United States, 248 U. S. 354), viewing the suit as one to "extinguish a Tribal communal fishing right guaranteed by federal Treaty." This case, however, is a suit to enjoin violations of state law by individual tribal members fishing off the reservation. As such, it is analogous to prosecution of individual Indians for crimes committed off reservation lands, a matter for which there has been no grant of exclusive jurisdiction to federal courts. See, e. g., DeMarrias v. South Dakota, 319 F. 2d 845 (C. A. 8th Cir. 1963); Buckman v. State, 139 Mont. 630, 366 P. 2d 346 (1961). With respect to crimes committed by Indians within reservation boundaries, see 18 U. S. C. §§ 1153, 1162. And see § 401 (a) of Title IV of the 1968 Civil Rights Act, Pub. L. No. 90-284, 82 Stat. 78; Seymour v. Superintendent, 368 U. S. 351; United States v. Celestine, 215 U. S. 278.
[12] A purse seine is a type of gear that encircles a school of fish, lead weights taking the net down, and a boat operating at each end of the net. A line runs through rings on the bottom of the net, making it possible to close the bottom of the net. Wash. Admin. Code § 220-16-010 (15).
A gill net has a mesh which fish cannot back out of once their heads get through. Gill net fishing is drift fishing, the net being up to 1,800 feet in length. Wash. Admin. Code § 220-16-010 (8).
Purse seines and drift gill nets are used in salt water.
[13] Set gill nets are often anchored at one end, stretched on a cork line, and held down by weights, while drifting at the other end. They are often located one above another at a short distance. Fish are taken by hand out of the nets as a boat travels its length. The mesh in the gill net varies, depending on the size of the species of salmon that are runningchinook, 8 to 8 1/2 inches; silver, chum, and sockeye, 5 1/2 inches. Set gill nets run from 40 to 150 feet depending on the width of the river at the point they are used. Wash. Admin. Code § 220-16-010 (19).
[14] Much emphasis is placed on Maison v. Confederated Tribes, 314 F. 2d 169 (C. A. 9th Cir. 1963), where another treaty right pertaining to other Indians was tendered in opposition to Oregon's power to regulate salmon fishing in the interests of conservation. This Treaty gave the Indians the right to fish off the reservation at all "usual and accustomed stations in common with citizens of the United States." Id., at 170. The Court of Appeals held that Oregon could regulate the Indians' Treaty right to fish under two conditions: "first, that there is a need to limit the taking of fish, second, that the particular regulation sought to be imposed is `indispensable' to the accomplishment of the needed limitation." Id., at 172.
The idea that the conservation measure be "indispensable" is derived from Tulee v. Washington, supra, where in striking down the license fee we said that "the imposition of license fees is not indispensable to the effectiveness of a state conservation program." 315 U. S., at 685. But that statement in its context meant no more than that it would, indeed, be unusual for a State to have the power to tax the exercise of a "federal right." As stated by the Court in the sentence immediately following, the license fee "acts upon the Indians as a charge for exercising the very right their ancestors intended to reserve." Ibid. Cf. Murdock v. Pennsylvania, 319 U. S. 105, 112: "The power to tax the exercise of a privilege is the power to control or suppress its enjoyment."
As to a "regulation" concerning the time and manner of fishing outside the reservation (as opposed to a "tax"), we said that the power of the State was to be measured by whether it was "necessary for the conservation of fish." 315 U. S., at 684.
The measure of the legal propriety of those kinds of conservation measures is therefore distinct from the federal constitutional standard concerning the scope of the police power of a State. See Ferguson v. Skrupa, 372 U. S. 726; Williamson v. Lee Optical Co., 348 U. S. 483; Daniel v. Family Ins. Co., 336 U. S. 220; Olsen v. Nebraska, 313 U. S. 236.
[15] In No. 319, the parties entered into a stipulation of facts which, because of its scope, made unnecessary "the tailoring of the injunction to meet a specific situation, as in the Puyallup case . . . ." 70 Wash. 2d, at 280, 422 P. 2d, at 774. The Washington Supreme Court did, however, remand to the trial court with instructions to limit the injunction only to those violations of Washington law that had been stipulated to be presently necessary to the conservation of the fish runs. It was stipulated that the "usual and accustomed fishing grounds" (within the meaning of the Treaty) encompassed the Nisqually River and its tributaries downstream from the Nisqually Reservation. The parties further stipulated that the defendants had fished contrary to state fishing conservation laws and regulations since 1960; that "[i]f permitted to continue, the defendants' commercial fishery would virtually exterminate the salmon and steelhead fish runs of the Nisqually River"; and that "it is necessary for proper conservation of the salmon and steelhead fish runs of the Nisqually River . . . that the plaintiffs enforce state fishery conservation laws and regulations to the fishing activities of the defendants at their usual and accustomed grounds."
|
3D Dynamic Focus CO2 Laser Marking/Engraving/Cutting Machine is equipped with high power RF laser tube imported from America. The RF CO2 Laser Machine can work in 200W high power with high precision, high speed and long working lifetime.
3D Dynamic Focus CO2 Laser marking/Engraving/Cutting Machine is equipped with high power RF laser tube imported from America. The RF CO2 laser machine can work in 200W high power with high precision, high speed and long working lifetime.
3D Dynamic Focus CO2 Laser marking/Engraving/Cutting Machine is Equipped with hi-tech dynamic focusing scanning mirror and control card, it is excellent in the aspects of algorithm optimization, high speed of marking and cutting, and other powerful functions. It is specially designed for the laser scanning with tiny light spot, large working range and high flexibility. Furthermore, this equipment is characterized by high strength in use, compact construction, dust-proof, convenient and accurate installation, strong anti-jamming ability, which can ensure the stability of the system under long-hours working conditions.
3D Dynamic Focus CO2 laser Marking/Engraving/Cutting Machine is used for marking in leather carving, hollow-out leather, greeting cards, and laser marking in woods, and laser firing in jeans wear and other laser marking technologies of nonmetal.
Please consciously abide by the relevant laws and regulations of the Internet, is strictly prohibited to publish pornographic, violent, reactionary remarks. Your E-mail is not open. If you don't want your E-mail to be known by STYLECNC administrator, please checked Anonymous. |
Q:
Memory management basics?
With this code:
#include <iostream>
#include <vector>
#include <stdio.h>
struct x
{
int a;
const char* t;
};
int main()
{
std::vector<x> instances;
while(true)
{
printf("wait for key1\n");
getchar();
getchar();
{
for(int i = 0; i < 100000; i++)
{
x n;
n.a = i;
n.t = "x instance";
instances.push_back(n);
}
//x instance deleted right?
}
{
x x1, x2, x3;
x1 = instances[0];
x2 = instances[1];
x3 = instances[2];
std::cout << x1.t << std::endl;
std::cout << x2.t << std::endl;
std::cout << x3.t << std::endl;
instances.clear();
}
printf("wait for key2\n");
getchar();
getchar();
}
return 0;
}
I'm getting this output:
wait for key2
wait for key1
x instance
x instance
x instance
That's cute but I think I should get a output like this:
wait for key2
wait for key1
>>£#$@@#£#$½£#$½
>>£#$@@#£#$½£#$½
>>£#$@@#£#$½£#$½
Because x struct instances must be deleted. Am I wrong? And the true implemention should be like this:
#include <iostream>
#include <vector>
#include <stdio.h>
struct x
{
int a;
const char* t;
};
int main()
{
std::vector<x*> instances;
while(true)
{
printf("wait for key1\n");
getchar();
getchar();
{
for(int i = 0; i < 100000; i++)
{
x* n = new x();
n->a = i;
n->t = "x instance";
instances.push_back(n);
}
}
{
x* x1 = 0;
x* x2 = 0;
x* x3 = 0;
x1 = instances[0];
x2 = instances[1];
x3 = instances[2];
std::cout << x1->t << std::endl;
std::cout << x2->t << std::endl;
std::cout << x3->t << std::endl;
instances.clear(); /* delete x instances one-by-one like 'delete instances[i];' */
}
printf("wait for key2\n");
getchar();
getchar();
}
return 0;
}
I'm not clear about memory management. Why I can still get (non-new'd) 'x instances' after cleanup? Examples?
I've looked in link>> and I think x instances in the for loop must be deleted?
Update
Here is my example implementation for other people (beginners like me).
I'll use a sync'd queue for socket io packets and
I don't care about thread.join() just because my threads
are only workers, not managers! (what a real-life simulation!)
#include <iostream>
#include <thread>
#include <chrono>
bool b1 = true;
bool b2 = true;
//Of course you can create only 1 boolean for all threads (isAlive should be a good name for it)
//but this way provides more detailed thread aliveness control.
void process(bool* ref, int id)
{
bool my = *ref;
while (my)
{
std::this_thread::sleep_for(std::chrono::milliseconds(1000));
std::cout << "thread#" << id << std::endl;
my = *ref;
}
std::cout << "thread#" << id << " end." << std::endl;
}
int main()
{
std::thread(process, &b1, 0).detach();
std::thread(process, &b2, 1).detach();
std::cin.get();
b1 = false;
std::cin.get();
b2 = false;
//MS-DOS :(
std::cin.get();
return 0;
}
Posibble output:
thread#thread#10
thread#0
thread#1
thread#1
thread#0
//Hit the enter!
thread#1
thread#0
thread#0 end.
thread#1
thread#1
//Hit the enter!
thread#1
thread#1 end.
//Hit the enter!
A:
When you add an element to vector with push_back, the element is copied into the vector. This means that the vector has its own copy of your element, and even if the element is deleted (either by you or by the end of the scope), the vector still contains the element.
When the vector is deleted, the vector takes care of deleting its elements one by one, all by itself, so you don't have to.
You can find more information about push_back here:
Adds a new element at the end of the vector, after its current last element. The content of val is copied (or moved) to the new element.
Your "improved" version, where you dynamically allocate the variables, is a misuse of pointers. If all you're doing is inserting the elements into the vector then there's no need to dynamically allocate them, because the vector won't even contain the dynamically allocated values - only copies of them.
|
American presidencies rise and fall in times of great crisis. It’s been true as long as we’ve had a country.
In the darkest days of the Civil War, President Abraham Lincoln implored Americans to ensure that “government of the people, by the people, for the people, shall not perish from the earth.” Eventually, that government prevailed.
In his first inaugural address, President Franklin D. Roosevelt told Americans that “the only thing we have to fear is fear itself.” The country went on to emerge from the Great Depression and fight and win a world war.
In the days after 9/11, President George W. Bush transformed from the not-so-sharp “son of George Bush” to a leader ready to meet his moment. In the still-burning rubble of the World Trade Center, first responders told him they couldn’t hear him over the bullhorn he was using. He told them, “I can hear you. The rest of the world hears you. … And the people who knocked these buildings down will hear all of us soon.” The country, on its knees in grief, rose up because of the president’s words. Just because of his words.
And during the coronavirus crisis of 2020, as the World Health Organization declared a pandemic, President Donald J. Trump has said these words for the ages: |
Q:
Show that a real-valued function with non-empty subdifferential is convex
Let $f:X \to \mathbb{R}$ be a function such that $\partial f(x)\neq \emptyset$ for all $x \in X$. Show that $f$ is convex.
I would appreciate some help with getting started on this problem. Thanks
A:
Hint: Consider $x_1, x_2\in X$, and $x=\lambda x_1+(1-\lambda)x_2$, for $\lambda\in(0,1)$. What can you say about $f(x_1)-f(x)$?. Or about $f(x_2)-f(x)$?. What does this imply about $\lambda f(x_1)+(1-\lambda)f(x_2)-f(x)$?
|
Members of the Hedgehog (Hh) family of signaling molecules mediate important developmental processes including patterning, morphogenesis of organs and cell specification. While the Hh pathway has been studied extensively, there is a lack of detailed understanding of the molecular and cellular mechanisms underlying this pathway. Genetic screens in zebrafish have identified several mutants that are defective in Hh signaling. The sonic-you (syu) locus encodes the zebrafish Sonic hedgehog and detour (dtr) and you-too (yot) loci encode the Gli1 and Gli2 zinc finger transcription factors, respectively. Mutations in these loci disrupt forebrain, spinal cord and somite development. A fourth mutant, chameleon (con), displays similar phenotypes as syu, dtr and yot, but the gene product has not been molecularly identified. Phenotypic analysis of con mutants suggests that con has a key function in Hh signaling during spinal cord development. This project has two specific aims: l) I will pursue the cloning of the con gene by using positional cloning, synteny conservation and candidate gene approaches. 2) The site of con action will be determined by genetic mosaic analysis by transplanting wildtype cells into con mutant embryos and vice versa, followed by assaying expression of nk2.2 in the spinal cord. To determine the epistatic relationship of con with members of the Hh signaling pathway, I will ectopically express Hh signaling components in con mutants and analyze marker gene expression in the spinal cord. |
Electronics Parts
Shop With Confidence
11045081400 Kenmore Washer - Instructions
All installation instructions for 11045081400 parts
These instructions have been submitted by other PartSelect customers and can help guide you through the washer repair with useful information like difficulty of repair, length of repair, tools needed, and more.
Bellows were moldy, needed to replace
The first step is to remove the retainer ring that holds the outside of the bellow in place.To do this, Open the washer door as far as you can to get it out of the way. look underneath of the front of the bellow on the outside of the washer where it meets the door. Put your head almost on the floor and look up. You will find a spring streached about 3" connected to a small diameter wire (1mm.) that runs all the way around the outside portion of the bellow.Use a small screwdriver or other to pull and pry the spring away from the rubber bellow. Be careful not to damage the spring or ring. Once you have grip on it, pull it carefully toward you then up and off of the bellow.
The front portion of the bellow is now free and can be peeled off. Start at any point and pull the rubber bellow in toward the opening of the washer, it comes off easily.When you get to the detergent outlet on the upper left side, grab the plastic tube and carefully pull the bellow from around it. There is no adhesive or clamp holding this in place, just friction. Remove the rest of the front portion of the bellow.Push as much of the bellow into the washer as possible to get it out of the way.
Once this is off comes the slightly tricky part. Look up at the top right portion of the bellow that is still attached. You may need to feel with your hand but you should be able to see it. You are looking for the screw/nut end of a giant hose clamp. This hose clamp goes around the entire bellow and the secures it to the portion that holds the basket.This is where the stubby screw driver comes in handy. There is not nearly enough room for a standard one and a nut driver or wratchet are too big. The nut will be pointing down and will need to be replaced the same way.Loosen the hose clamp almost all of the way, not necessary to have the hose clamp come completely apart. You can now remove the entire hose clamp from around the bellow by pulling it forward. You will need to remove the hose clamp from the washer. To do this, squeeze it in from the sides about 6", don't kink it. Push it down toward the floor between the basket and the metal front panel. You will now be able to remove it from the top of the opening and be able to pull the bottom portion out.Pull the old bellow completely out, very easy to do.
Time to install the new bellow. Figure out which side goes in and which faces out. The big hint is that the water inlet is on the upper left side.You will notice at the top of the bellow on the portion that goes inside of the washer, you will find a small triangular shaped tab about 1/4" high. This is your centering mark. This will be at the very top. If you keep this at the top, everything will line up perfectly.
Slip the bellow over the edge of the portion that holds the basket where you removed the old one. I started at the top and worked left so I could install the detergent inlet tube. Pull this through the bellow carefully. It doesn't take a lot of force.As you are pressing the bellow on this lip, you will notice that there is a 1/2" high back stop all of the way around. This is great because as you press it on, there is a positive stop and you can't go further than necessary. Continue to press it in all of the way around.
Now it is time to install the Hose clamp. Un bend anything that might have bent on the clamp. With the nut at the top or top right with the nut facing down to the floor while holding it vertically, squish it slightly inward, put the bottom portion in first then the top portion. Orient is as it was when you took it off. Slide it around the bellow. You will feel a positive stop. Grab the stubby screwdriver and tighten down the hose clamp. I did about a medium force when tightening. It doesn't take a lot of force.
Now it is time to pull the remaining part of the bellow out of the basket and fit it into place. Press it around the outside portion of the opening so it hooks over the lip. This w
Washer would not drain ,F02 and SUD code displaying
(1) First I unpluged the washer then I removed the water from the tube with a water vac.(2) Then I removed the three (3) screws that holds the front panel, using a Torx T-20 socket. ( this is a front load washer ). The panel is below the loading door. (3) I packed towels under the washer.(4) I slowly removed the cleanout in the front of the pump, using the water vac to catch the water as it leaked out.(5) I removed the wiring to the motor.(6) I removed the screw that holds the pump in place with a Torx T-20 socket.(7) I pulled the pump forward so the clamps that hold the drain hose and discharge hose could be removed using the hose clamp pliers. ( they come off much easier then they go back on ).(8) I tested the pump and found it would run but was making a lot of noise and running slow. (9) To reinstall start with number (7) and work backwards to number (1) skipping (3) and (4). Don Kramer Wichita, Kansas
1. remove the three screws from the top backside of the top panel 2. push the top panel to the rear 1/8 to 1/4 inch3. lift/rotate top panel from rear to front, set aside.4. remove the three wire connectors from latch.5. use #15 Torx to remove the three screws from the latch.6. remove and replace part using top opening.7. reverse order to finish.
Tub of front load washer was slowly filling with water when machine was empty/off
Pulled out machine...removed top panel..unscrewed existing valve and removed it...then reversed the whole process with the new valve..it was very easy to do and worked perfectly...no more water in tub!
Then: 1. Open the drawers in the sub-base, remove the screws on the left and right side rails, and remove the drawer.
2. Remove the three torx head screws along the bottom of the front cabinet cover and remove the cover.
NOTE: There are sharp metal edges exposed inside of the cabinet. A heavy long sleeve shirt and gloves are recomended when working in this area to prevent injury.
3. With a pair of pliers, grip the end of the front right shock absorber near the attachment point and rotate counter-clockwise. Repeat procedure at other end of shock absorber. (note: this may destroy the plastic end of the shock absorber, but you're going to replace it with a new one anyway.)
4. With the front shock absorber out of the way, you can now reach the rear shock absorber on the same side and repeat the removal procedure. (note: Be sure to take note of which end of the shock absorber is up and which end is down. This will be important when installing the new ones.)
5. Install the new rear shock absorber by first inserting the lower end into the slot in the base plate and rotating it 1/4 turn clockwise by hand. it should snap into place easily. Then insert the upper end into the plastic drum attachment point and rotate it 1/4 turn clockwise.
6. Install the new front shock absorber by the same procedure, then procede to the left side shock absorbers using steps 3, 4, & 5.
Note: While the cabinet is open, now is a good time to clean out the pump strainer located front and center.
7. Re-install the front cabinet cover using the three torx head screws. (note: the machine will not operate without the cabinet cover in place.)
8. Adjust the leveling legs so that the machine is level and each leg supports an equal amount of the machine's weight.
I first removed the back panel held on by about 10 screws. I removed the drive belt from the pulley, then removed the lock nut securing the pulley to the drum & removed the pulley. Attached the new pulley to the drum, tightened on the lock nut, attached the new belt & ran a spin cycle. When that went OK I replaced the back panel & the washer was back in service.
My washer would not always finsh the cycle (most of the time it would run between 2 and 30 minutes) and then the time display would flash and the washer would shut down and beep. An f06 fault code flashed in the display.
First I removed the screws and the plastic slide clips to remove the back plate. I then went to the lower right of the washer and found the motor control unit. It has about four plus going into it. The front inside mount of the control unit has a clip on it that must be pushed so you can pull the unit free of the bottom of the machine. Once the control unit was free I flipped open the plug cover with a screwdriver which just snaps over the plugs. I then removed the plugs from the unit carefully so I didn't break them. It was a tight work space and I had to pop out some of the clips that hold the wire harness in place to get some slack in the wires. I then pushed up on the washing drum which gave me enough room to slide to old unit out and get the new one in. Then just reconnect the plugs, plug cover, snap the unit back into place, refit and wire harness clips that where removed, and place the back panel of the machine back on. I tested mine before putting the back panel on and it completely solved the problem. Note that there are 2 control units in this machine 1. motor control and 2. the central control located behind the display. I was told it could have been either one of them, but after some research I chose the motor control unit since it seemed to be a problem with the tachometer sensor which is read through the motor control unit.
Ultimately you have to get to the inside of the machine where the door lock is located in order to see if you will need this door lock that I bought.
DISCONNECT POWER FROM MACHINE.
First take off the top by taking off the 2 screws on the back of the machine.
Second take off the control panel, I believe there are about 5 or 6 screws for that.(there's also a screw when you open up the detergent compartment on the bottom left- also, a lever must be pushed in order for the compartment to come off- it MUST be taken off).
Third unscrew the top of the front white plate.. there should be a 5 or 6 screws for that.You don't need to take off the entire front plate.
Finally unscrew 3 screws that hold the door lock in place .. make sure your hands is in the machine- the back of door lock to catch the lock when you're on the last screw.
Gently take out the door lock from the side with the cables attached by holding the white metal door open (it bends).
Try to pull on the bottom of the door lock (its a manual release). If it doesn't release you need to buy a new door lock like I did... if it does release then you don't need a door lock and just reassemble. (Note: You can also try plugging in the machine and THEN pulling down on the manual release. When I tried this the door lock just vibrated and nothing happened so I bought a new door lock.)
If you have the new door lock continue here:
Take out all 3 cables on the old door lock by pressing on the corresponding clips.
Attach the new door lock with the correct cables. Assemble machine back together.
Thats it.
Washer baffle broke off
I snapped the piece into place. It took two people to do the job....one to hold the washer basket from moving and the other to snap it in place. It did take some hard pushing but it worked out great!!!! The repair man quoted me $130.00 for the installation only. And I installed myself it in less than 5 minutes!
How did I know it was the flow-meter? Read the service manual as possible causes to narrow it down. Disassembled old flowmeter and cleaned. That fixed for awhile. Problem came back, could 'tap' on flowmeter to temporarily fix. This convinced me that was indeed the problem.
The flowmeter is just a simple vane that moves as water flows across it, and sends pulses each time it rotates. If it 'sticks' then the computer doesn't think any water is coming in - hence the error. Tapping on it would 'unstick' long enough to confirm problem.
Water still in tub / tub would not spin
Don't know how they managed to get out of the washer tub, but we found a quarter, dime and penny in the "lint" filter (called the "Cap" in the PartSelect details). The penny managed to get into the impeller and took out 3 1/2 of the 4 impeller blades.
Replacement is very simple, about a 15-20 minute job Be sure the machine is unplugged for safety.Remove the three (3) screws holding the lower front panel and remove the panel. The pump assembly is a white unit about the middle of the opening (the original pump itself was black, the new one is white). Unscrewing the large cap will allow any residual water to drain out (we used a wet/dry shop vac to get most of the water out of the tub first). Following the wires going to the pump, there is a cover over the wiring connector that easily pops up and the connector can be pulled out. Directly below the unit is a screw with a Torx head that has to be removed, then two (2) hoses held with compression hose clamps that need to be removed with pliers. The unit will slide out of the base of the washer. There is a wiring harness in front of this assembly that can be popped loose on one side or the other to get the unit out.
Reversing the steps gets everything back in place.
NOTE: A notice came with my new pump stating that a tab needed to be removed on the wiring connector. It is easily removed by hand.
By the way - that was the most expensive penny I've ever owned! Pockets in jeans are now required to be turned out in our house before they are allowed in the washer!
water leaked into drum while machine when turned off
1. Removed the 4 screws across the top of the back of the washer which hold on the washer top.2. slightly lift the backside of the washer top and pull/ slide to the back to remove. Top will unlatch and and lift off.3.Remove the star screw that attaches the water valve to the back of the washer.4. Remove hose clamp and 4 wire clips from water vale assembly and replaced with new valve. 5. Reverse order to reassemble.
I removed the outer tub clamp using two needle-nosed pliers. Then I folded the bellow back and removed the bellow from the dispensing outlet. I then losened the bellow clamp using a screw driver. It was on there very securely. Then I had my daughter with her smaller hands finish untightening the screw enough to release the bellows from the machine. Then the bellow and clamp were taken out of the machine carefully, not scratching anything and noting orientation for new bellow. I cleaned the machine surfaces. Next, lining up the top notch on the bellow, it was worked into the groove around the entire inner basket. The bellow also had to have the hole covering placed over the dispensing outlet. This was the most time consuming. Just to make certain that it was positioned correctly took 20 minutes. I then put the bellow clamp back on and tightened it to the very tight positioned it was in prior to being removed. My daughter returned to help with the smaller bellow clamp that goes to the front of the machine. I needed help keeping one side of the clamp in placed while the other side was stretched out again to go onto the bellow. Then the machine was leveled top to back, side to side, leg nuts tightened. Works quieter than ever.
Movers wouldn't accept washer w/o shipping bolts
Like most folks, my daughter has tossed the shipping bolts after her puechase, I moved her the first time w/o any thought to it but commercial movers won't do that, they will chg. you to have it done and it's not cheap, akin to an appliance repair. This kit contains all four bolts/spacers, (2) upper and (2) lower. Hard to tell from the decription but a sweet gal on the help desk assured me of it. Got it fast and got them installed in minutes, easy to do and wrote a big note on the back of the washer to save them!! No idea why your owners book says "do not reuse". |
items:
- name: Azure Architecture Center
href: /azure/architecture/
- name: Architecture icons
href: icons/index.md
- name: Browse all Architectures
href: browse/index.md
- name: Browse Hybrid Cloud Architectures
href: browse/hybrid_index.md
- name: What's new
href: changelog.md
- name: Application Architecture Guide
items:
- name: Introduction
href: guide/index.md
- name: Architecture styles
items:
- name: Overview
href: guide/architecture-styles/index.md
- name: Big compute
href: guide/architecture-styles/big-compute.md
- name: Big data
href: guide/architecture-styles/big-data.md
- name: Event-driven architecture
href: guide/architecture-styles/event-driven.md
- name: Microservices
href: guide/architecture-styles/microservices.md
- name: N-tier application
href: guide/architecture-styles/n-tier.md
- name: Web-queue-worker
href: guide/architecture-styles/web-queue-worker.md
- name: Design principles for Azure applications
items:
- name: Overview
href: guide/design-principles/index.md
- name: Design for self-healing
href: guide/design-principles/self-healing.md
- name: Make all things redundant
href: guide/design-principles/redundancy.md
- name: Minimize coordination
href: guide/design-principles/minimize-coordination.md
- name: Design to scale out
href: guide/design-principles/scale-out.md
- name: Partition around limits
href: guide/design-principles/partition.md
- name: Design for operations
href: guide/design-principles/design-for-operations.md
- name: Use managed services
href: guide/design-principles/managed-services.md
- name: Use the best data store for the job
href: guide/design-principles/use-the-best-data-store.md
- name: Design for evolution
href: guide/design-principles/design-for-evolution.md
- name: Build for the needs of business
href: guide/design-principles/build-for-business.md
- name: Technology choices
items:
- name: Choose a compute service
href: guide/technology-choices/compute-decision-tree.md
- name: Choose a data store
items:
- name: Understand data store models
href: guide/technology-choices/data-store-overview.md
- name: Select a data store
href: guide/technology-choices/data-store-decision-tree.md
- name: Criteria for choosing a data store
href: guide/technology-choices/data-store-considerations.md
- name: Choose a load balancing service
href: guide/technology-choices/load-balancing-overview.md
- name: Choose a messaging service
href: guide/technology-choices/messaging.md
- name: Best practices for cloud applications
items:
- name: API design
href: best-practices/api-design.md
- name: API implementation
href: best-practices/api-implementation.md
- name: Autoscaling
href: best-practices/auto-scaling.md
- name: Background jobs
href: best-practices/background-jobs.md
- name: Caching
href: best-practices/caching.md
- name: Content Delivery Network
href: best-practices/cdn.md
- name: Data partitioning
href: best-practices/data-partitioning.md
- name: Data partitioning strategies (by service)
href: best-practices/data-partitioning-strategies.md
- name: Message encoding considerations
href: best-practices/message-encode.md
- name: Monitoring and diagnostics
href: best-practices/monitoring.md
- name: Retry guidance for specific services
href: best-practices/retry-service-specific.md
- name: Transient fault handling
href: best-practices/transient-faults.md
- name: Performance tuning
items:
- name: Introduction
href: performance/index.md
- name: Scenario 1 - Distributed transactions
href: performance/distributed-transaction.md
- name: Scenario 2 - Multiple backend services
href: performance/backend-services.md
- name: Scenario 3 - Event streaming
href: performance/event-streaming.md
- name: Performance antipatterns
items:
- name: Overview
href: antipatterns/index.md
- name: Busy Database
href: antipatterns/busy-database/index.md
- name: Busy Front End
href: antipatterns/busy-front-end/index.md
- name: Chatty I/O
href: antipatterns/chatty-io/index.md
- name: Extraneous Fetching
href: antipatterns/extraneous-fetching/index.md
- name: Improper Instantiation
href: antipatterns/improper-instantiation/index.md
- name: Monolithic Persistence
href: antipatterns/monolithic-persistence/index.md
- name: No Caching
href: antipatterns/no-caching/index.md
- name: Synchronous I/O
href: antipatterns/synchronous-io/index.md
- name: Responsible Innovation
items:
- name: Overview
href: guide/responsible-innovation/index.md
- name: Judgment Call
href: guide/responsible-innovation/judgmentcall.md
- name: Harms Modeling
items:
- name: Understand Harm
href: guide/responsible-innovation/harms-modeling/index.md
- name: Assess Types of Harm
href: guide/responsible-innovation/harms-modeling/type-of-harm.md
- name: Community Jury
href: guide/responsible-innovation/community-jury/index.md
- name: Azure for AWS Professionals
items:
- name: Overview
href: aws-professional/index.md
- name: Component information
expanded: true
items:
- name: Accounts
href: aws-professional/accounts.md
- name: Compute
href: aws-professional/compute.md
- name: Databases
href: aws-professional/databases.md
- name: Messaging
href: aws-professional/messaging.md
- name: Networking
href: aws-professional/networking.md
- name: Regions and Zones
href: aws-professional/regions-zones.md
- name: Resources
href: aws-professional/resources.md
- name: Security and Identity
href: aws-professional/security-identity.md
- name: Storage
href: aws-professional/storage.md
- name: Service comparison
href: aws-professional/services.md
- name: Azure for GCP Professionals
items:
- name: Overview
href: gcp-professional/index.md
- name: Services comparison
href: gcp-professional/services.md
- name: Microsoft Azure Well-Architected Framework
items:
- name: Overview
href: framework/index.md
- name: Cost Optimization
items:
- name: About
href: framework/cost/index.yml
- name: Principles
href: framework/cost/overview.md
- name: Design
items:
- name: Checklist
href: framework/cost/design-checklist.md
- name: Cost model
href: framework/cost/design-model.md
- name: Capture requirements
href: framework/cost/design-capture-requirements.md
- name: Azure regions
href: framework/cost/design-regions.md
- name: Azure resources
href: framework/cost/design-resources.md
- name: Governance
href: framework/cost/design-governance.md
- name: Initial estimate
href: framework/cost/design-initial-estimate.md
- name: Managed services
href: framework/cost/design-paas.md
- name: Performance and price options
href: framework/cost/design-price.md
- name: Provision
items:
- name: Checklist
href: framework/cost/provision-checklist.md
- name: AI + Machine Learning
href: framework/cost/provision-ai-ml.md
- name: Big data
href: framework/cost/provision-analytics.md
- name: Compute
href: framework/cost/provision-compute.md
- name: Data stores
href: framework/cost/provision-datastores.md
- name: Messaging
href: framework/cost/provision-messaging.md
- name: Networking
href: framework/cost/provision-networking.md
items:
- name: Cost for networking services
href: framework/cost/provision-networking-services.md
- name: Web apps
href: framework/cost/provision-webapps.md
- name: Monitor
items:
- name: Checklist
href: framework/cost/monitor-checklist.md
- name: Budgets and alerts
href: framework/cost/monitor-alert.md
- name: Reports
href: framework/cost/monitor-reports.md
- name: Reviews
href: framework/cost/monitor-reviews.md
- name: Optimize
items:
- name: Checklist
href: framework/cost/optimize-checklist.md
- name: Autoscale
href: framework/cost/optimize-autoscale.md
- name: Reserved instances
href: framework/cost/optimize-reserved.md
- name: VM instances
href: framework/cost/optimize-vm.md
- name: Caching
href: framework/cost/optimize-cache.md
- name: Tradeoffs
href: framework/cost/tradeoffs.md
- name: Operational Excellence
items:
- name: Overview
href: framework/devops/overview.md
- name: Application design
href: framework/devops/app-design.md
- name: Development
href: framework/devops/development.md
- name: Deployment
href: framework/devops/deployment.md
- name: Infrastructure Deployments
href: framework/devops/iac.md
- name: Monitoring
href: framework/devops/monitoring.md
- name: Performance
href: framework/devops/performance.md
- name: Testing
href: framework/devops/testing.md
- name: Checklist
href: checklist/dev-ops.md
- name: Performance Efficiency
items:
- name: Overview
href: framework/scalability/overview.md
- name: Application design
href: framework/scalability/app-design.md
- name: Capacity planning
href: framework/scalability/capacity.md
- name: Load testing
href: framework/scalability/load-testing.md
- name: Monitoring
href: framework/scalability/monitoring.md
- name: Checklist
href: framework/scalability/performance-efficiency.md
- name: Reliability
items:
- name: Overview
href: framework/resiliency/overview.md
- name: Application design
items:
- name: Design overview
href: framework/resiliency/app-design.md
- name: Error handling
href: framework/resiliency/app-design-error-handling.md
- name: Failure mode analysis
href: resiliency/failure-mode-analysis.md
- name: Backup and recovery
href: framework/resiliency/backup-and-recovery.md
- name: Business metrics
href: framework/resiliency/business-metrics.md
- name: Chaos engineering
href: framework/resiliency/chaos-engineering.md
- name: Data management
href: framework/resiliency/data-management.md
- name: Monitoring and disaster recovery
href: framework/resiliency/monitoring.md
- name: Recover from a region-wide service disruption
href: resiliency/recovery-loss-azure-region.md
- name: Resiliency testing
href: framework/resiliency/testing.md
- name: Checklist
href: checklist/resiliency-per-service.md
- name: Security
items:
- name: About
href: framework/security/overview.md
- name: Principles
href: framework/security/security-principles.md
- name: Design
items:
- name: Gather the security requirements
href: framework/security/architecture-type.md
- name: Key security strategies
href: framework/security/resilience.md
- name: Governance and administration
href: framework/security/governance.md
- name: Regulatory compliance
href: framework/security/law-authority.md
- name: Administration
href: framework/security/critical-impact-accounts.md
- name: Identity
items:
- name: Identity and access management
href: framework/security/design-identity.md
- name: Best practices
href: /azure/security/fundamentals/identity-management-best-practices?bc=%2fazure%2farchitecture%2fbread%2ftoc.json&toc=%2fazure%2farchitecture%2ftoc.json
- name: Networking
items:
- name: Network security review
href: framework/security/design-network-review.md
- name: Containment strategies for organizations
href: framework/security/design-network.md
- name: Best practices
href: /azure/security/fundamentals/network-best-practices?bc=%2fazure%2farchitecture%2fbread%2ftoc.json&toc=%2fazure%2farchitecture%2ftoc.json
- name: Storage
href: framework/security/design-storage.md
- name: Applications and services
href: framework/security/design-apps-services.md
- name: Monitor
items:
- name: Security operations
href: framework/security/security-operations.md
- name: Review and audit
href: framework/security/governance.md
- name: Tools
href: framework/security/monitor-tools.md
- name: Network access
href: framework/security/monitor-network.md
- name: Monitor identity risk
href: framework/security/monitor-identity.md
- name: DDoS attacks
- name: Optimize
items:
- name: Automate
href: framework/security/governance.md
- name: Replace insecure protocols
href: framework/security/governance.md
- name: Elevate security capabilities
href: framework/security/governance.md
- name: Design Patterns
items:
- name: Overview
href: patterns/index.md
- name: Categories
items:
- name: Availability
href: patterns/category/availability.md
- name: Data management
href: patterns/category/data-management.md
- name: Design and implementation
href: patterns/category/design-implementation.md
- name: Management and monitoring
href: patterns/category/management-monitoring.md
- name: Messaging
href: patterns/category/messaging.md
- name: Performance and scalability
href: patterns/category/performance-scalability.md
- name: Resiliency
href: patterns/category/resiliency.md
- name: Security
href: patterns/category/security.md
- name: Ambassador
href: patterns/ambassador.md
- name: Anti-corruption Layer
href: patterns/anti-corruption-layer.md
- name: Asynchronous Request-Reply
href: patterns/async-request-reply.md
- name: Backends for Frontends
href: patterns/backends-for-frontends.md
- name: Bulkhead
href: patterns/bulkhead.md
- name: Cache-Aside
href: patterns/cache-aside.md
- name: Choreography
href: patterns/choreography.md
- name: Circuit Breaker
href: patterns/circuit-breaker.md
- name: Claim Check
href: patterns/claim-check.md
- name: Command and Query Responsibility Segregation (CQRS)
href: patterns/cqrs.md
- name: Compensating Transaction
href: patterns/compensating-transaction.md
- name: Competing Consumers
href: patterns/competing-consumers.md
- name: Compute Resource Consolidation
href: patterns/compute-resource-consolidation.md
- name: Deployment Stamps
href: patterns/deployment-stamp.md
- name: Event Sourcing
href: patterns/event-sourcing.md
- name: External Configuration Store
href: patterns/external-configuration-store.md
- name: Federated Identity
href: patterns/federated-identity.md
- name: Gatekeeper
href: patterns/gatekeeper.md
- name: Gateway Aggregation
href: patterns/gateway-aggregation.md
- name: Gateway Offloading
href: patterns/gateway-offloading.md
- name: Gateway Routing
href: patterns/gateway-routing.md
- name: Geodes
href: patterns/geodes.md
- name: Health Endpoint Monitoring
href: patterns/health-endpoint-monitoring.md
- name: Index Table
href: patterns/index-table.md
- name: Leader Election
href: patterns/leader-election.md
- name: Materialized View
href: patterns/materialized-view.md
- name: Pipes and Filters
href: patterns/pipes-and-filters.md
- name: Priority Queue
href: patterns/priority-queue.md
- name: Publisher/Subscriber
href: patterns/publisher-subscriber.md
- name: Queue-Based Load Leveling
href: patterns/queue-based-load-leveling.md
- name: Retry
href: patterns/retry.md
- name: Saga
href: reference-architectures/saga/saga.md
- name: Scheduler Agent Supervisor
href: patterns/scheduler-agent-supervisor.md
- name: Sequential Convoy
href: patterns/sequential-convoy.md
- name: Sharding
href: patterns/sharding.md
- name: Sidecar
href: patterns/sidecar.md
- name: Static Content Hosting
href: patterns/static-content-hosting.md
- name: Strangler
href: patterns/strangler.md
- name: Throttling
href: patterns/throttling.md
- name: Valet Key
href: patterns/valet-key.md
- name: Azure categories
expanded: true
items:
- name: AI + Machine Learning
items:
- name: Overview
href: data-guide/big-data/ai-overview.md
- name: Technology guide
items:
- name: Cognitive services
href: data-guide/technology-choices/cognitive-services.md
- name: Machine learning
href: data-guide/technology-choices/data-science-and-machine-learning.md
- name: Machine learning at scale
href: data-guide/big-data/machine-learning-at-scale.md
- name: Natural language processing
href: data-guide/technology-choices/natural-language-processing.md
- name: R developer's guide to Azure
href: data-guide/technology-choices/r-developers-guide.md
- name: Architectures
items:
- name: AI at the edge
href: solution-ideas/articles/ai-at-the-edge.md
- name: AI enrichment in Cognitive Search
href: solution-ideas/articles/cognitive-search-with-skillsets.md
- name: AI for Earth
href: solution-ideas/articles/ai-for-earth.md
- name: Auditing and risk management
href: solution-ideas/articles/auditing-and-risk-compliance.md
- name: Autonomous systems
href: solution-ideas/articles/autonomous-systems.md
- name: Disconnected AI at the edge
href: solution-ideas/articles/ai-at-the-edge-disconnected.md
- name: Baseball decision analysis with ML.NET and Blazor
href: data-guide/big-data/baseball-ml-workload.md
- name: Batch scoring for deep Learning
href: reference-architectures/ai/batch-scoring-deep-learning.md
- name: Batch scoring with Python
href: reference-architectures/ai/batch-scoring-python.md
- name: Batch scoring with Spark on Databricks
href: reference-architectures/ai/batch-scoring-databricks.md
- name: Batch scoring with R
href: reference-architectures/ai/batch-scoring-R-models.md
- name: Business Process Management
href: solution-ideas/articles/business-process-management.md
- name: Real-time recommendation API
href: reference-architectures/ai/real-time-recommendation.md
- name: Chatbot for hotel reservations
href: example-scenario/ai/commerce-chatbot.md
- name: E-commerce chatbot
href: solution-ideas/articles/commerce-chatbot.md
- name: Enterprise chatbot disaster recovery
href: solution-ideas/articles/enterprise-chatbot-disaster-recovery.md
- name: Enterprise-grade conversational bot
href: reference-architectures/ai/conversational-bot.md
- name: Enterprise productivity chatbot
href: solution-ideas/articles/enterprise-productivity-chatbot.md
- name: FAQ chatbot
href: solution-ideas/articles/faq-chatbot-with-data-champion-model.md
- name: Content Research
href: solution-ideas/articles/content-research.md
- name: Contract Management
href: solution-ideas/articles/contract-management.md
- name: Customer churn prediction
href: solution-ideas/articles/customer-churn-prediction.md
- name: Customer feedback
href: solution-ideas/articles/customer-feedback-and-analytics.md
- name: Defect prevention
href: solution-ideas/articles/defect-prevention-with-predictive-maintenance.md
- name: Distributed deep learning training
href: reference-architectures/ai/training-deep-learning.md
- name: Digital Asset Management
href: solution-ideas/articles/digital-asset-management.md
- name: Energy supply optimization
href: solution-ideas/articles/energy-supply-optimization.md
- name: Energy demand forecasting
href: solution-ideas/articles/forecast-energy-power-demand.md
- name: Image classification
href: example-scenario/ai/intelligent-apps-image-processing.md
- name: Image classification with CNN's
href: solution-ideas/articles/image-classification-with-convolutional-neural-networks.md
- name: Information discovery with NLP
href: solution-ideas/articles/information-discovery-with-deep-learning-and-nlp.md
- name: Interactive voice response bot
href: solution-ideas/articles/interactive-voice-response-bot.md
- name: Digital text processing
href: solution-ideas/articles/digital-media-speech-text.md
- name: Machine teaching
href: solution-ideas/articles/machine-teaching.md
- name: MLOps for Python models
href: reference-architectures/ai/mlops-python.md
- name: MLOps technical paper
items:
- name: Upscale ML lifecycle with MLOps
href: example-scenario/mlops/mlops-technical-paper.md
- name: MLOps maturity model
href: example-scenario/mlops/mlops-maturity-model.md
- name: Azure ML service selection guide
href: example-scenario/mlops/aml-decision-tree.md
- name: Model training with AKS
href: solution-ideas/articles/machine-learning-with-aks.md
- name: Movie recommendations
href: example-scenario/ai/movie-recommendations.md
- name: Marketing optimization
href: solution-ideas/articles/optimize-marketing-with-machine-learning.md
- name: Personalized offers
href: solution-ideas/articles/personalized-offers.md
- name: Personalized marketing solutions
href: solution-ideas/articles/personalized-marketing.md
- name: Population health management
href: solution-ideas/articles/population-health-management-for-healthcare.md
- name: Hospital patient predictions
href: solution-ideas/articles/predict-length-of-stay-and-patient-flow-with-healthcare-analytics.md
- name: Vehicle telematics
href: solution-ideas/articles/predictive-insights-with-vehicle-telematics.md
- name: Predictive maintenance
href: solution-ideas/articles/predictive-maintenance.md
- name: Predictive marketing
href: solution-ideas/articles/predictive-marketing-campaigns-with-machine-learning-and-spark.md
- name: Quality assurance
href: solution-ideas/articles/quality-assurance.md
- name: Real-time scoring Python models
href: reference-architectures/ai/realtime-scoring-python.md
- name: Real-time scoring R models
href: reference-architectures/ai/realtime-scoring-r.md
- name: Remote patient monitoring
href: solution-ideas/articles/remote-patient-monitoring.md
- name: Retail assistant with visual capabilities
href: solution-ideas/articles/retail-assistant-or-vacation-planner-with-visual-capabilities.md
- name: Retail product recommendations
href: solution-ideas/articles/product-recommendations.md
- name: Scalable personalization
href: example-scenario/ai/scalable-personalization.md
- name: Speech services
href: solution-ideas/articles/speech-services.md
- name: Speech to text conversion
href: reference-architectures/ai/speech-ai-ingestion.md
- name: Training Python models
href: reference-architectures/ai/training-python-models.md
- name: Vision classifier model
href: example-scenario/dronerescue/vision-classifier-model-with-custom-vision.md
- name: Visual assistant
href: solution-ideas/articles/visual-assistant.md
- name: Deploy AI and machine learning at the edge by using Azure Stack Edge
href: hybrid/deploy-ai-ml-azure-stack-edge.md
- name: Analytics
items:
- name: Architectures
items:
- name: Advanced analytics
href: solution-ideas/articles/advanced-analytics-on-big-data.md
- name: Anomaly detector process
href: solution-ideas/articles/anomaly-detector-process.md
- name: App integration using Event Grid
href: solution-ideas/articles/application-integration-using-event-grid.md
- name: Automated enterprise BI
href: reference-architectures/data/enterprise-bi-adf.md
- name: Big data analytics with Azure Data Explorer
href: solution-ideas/articles/big-data-azure-data-explorer.md
- name: Content Delivery Network analytics
href: solution-ideas/articles/content-delivery-network-azure-data-explorer.md
- name: Data warehousing and analytics
href: example-scenario/data/data-warehouse.md
- name: Demand forecasting
href: solution-ideas/articles/demand-forecasting.md
- name: Demand forecasting for marketing
href: solution-ideas/articles/demand-forecasting-price-optimization-marketing.md
- name: Demand forecasting for price optimization
href: solution-ideas/articles/demand-forecasting-and-price-optimization.md
- name: Demand forecasting for shipping
href: solution-ideas/articles/demand-forecasting-for-shipping-and-distribution.md
- name: Discovery Hub for analytics
href: solution-ideas/articles/cloud-scale-analytics-with-discovery-hub.md
- name: Hybrid big data with HDInsight
href: solution-ideas/articles/extend-your-on-premises-big-data-investments-with-hdinsight.md
- name: Monitoring solution with Azure Data Explorer
href: solution-ideas/articles/monitor-azure-data-explorer.md
- name: ETL using HDInsight
href: solution-ideas/articles/extract-transform-and-load-using-hdinsight.md
- name: Interactive analytics with Azure Data Explorer
href: solution-ideas/articles/interactive-azure-data-explorer.md
- name: IoT telemetry analytics with Azure Data Explorer
href: solution-ideas/articles/iot-azure-data-explorer.md
- name: Interactive price analytics
href: solution-ideas/articles/interactive-price-analytics.md
- name: Mass ingestion of news feeds on Azure
href: example-scenario/ai/newsfeed-ingestion.md
- name: Oil and Gas tank level forecasting
href: solution-ideas/articles/oil-and-gas-tank-level-forecasting.md
- name: Predicting length of stay in hospitals
href: solution-ideas/articles/predicting-length-of-stay-in-hospitals.md
- name: Predictive aircraft engine monitoring
href: solution-ideas/articles/aircraft-engine-monitoring-for-predictive-maintenance-in-aerospace.md
- name: Real Time analytics on on big data
href: solution-ideas/articles/real-time-analytics.md
- name: Stream processing with Azure Databricks
href: reference-architectures/data/stream-processing-databricks.md
- name: Stream processing with Azure Stream Analytics
href: reference-architectures/data/stream-processing-stream-analytics.md
- name: Tiering applications & data for analytics
href: solution-ideas/articles/tiered-data-for-analytics.md
- name: Blockchain
items:
- name: Architectures
items:
- name: Blockchain workflow application
href: solution-ideas/articles/blockchain-workflow-application.md
- name: Decentralized trust between banks
href: example-scenario/apps/decentralized-trust.md
- name: Supply chain track and trace
href: solution-ideas/articles/supply-chain-track-and-trace.md
- name: Compute
items:
- name: HPC Overview
href: topics/high-performance-computing.md
- name: Architectures
items:
- name: 3D video rendering
href: example-scenario/infrastructure/video-rendering.md
- name: Computer-aided engineering
href: example-scenario/apps/hpc-saas.md
- name: Digital image modeling
href: example-scenario/infrastructure/image-modeling.md
- name: HPC risk analysis
href: solution-ideas/articles/hpc-risk-analysis.md
- name: HPC and big compute
href: solution-ideas/articles/big-compute-with-azure-batch.md
- name: Cloud-based HPC cluster
href: solution-ideas/articles/hpc-cluster.md
- name: Hybrid HPC with HPC Pack
href: solution-ideas/articles/hybrid-hpc-in-azure-with-hpc-pack.md
- name: Linux virtual desktops with Citrix
href: example-scenario/infrastructure/linux-vdi-citrix.md
- name: Move Azure resources across regions
href: solution-ideas/articles/move-azure-resources-across-regions.md
- name: Run a Linux VM on Azure
href: reference-architectures/n-tier/linux-vm.md
- name: Run a Windows VM on Azure
href: reference-architectures/n-tier/windows-vm.md
- name: Solaris emulator on Azure VMs
href: solution-ideas/articles/solaris-azure.md
- name: Migrate IBM applications with TmaxSoft OpenFrame
href: solution-ideas/articles/migrate-mainframe-apps-with-tmaxsoft-openframe.md
- name: Reservoir simulations
href: example-scenario/infrastructure/reservoir-simulation.md
- name: CFD simulations
href: example-scenario/infrastructure/hpc-cfd.md
- name: Containers
items:
- name: AKS Solution Journey
href: reference-architectures/containers/aks-start-here.md
- name: AKS Baseline Cluster
href: reference-architectures/containers/aks/secure-baseline-aks.md
- name: AKS Cluster Best Practices
href: /Azure/aks/best-practices
- name: AKS Workload Best Practices
href: /Azure/aks/best-practices#developer-best-practices
- name: AKS Example Solutions
items:
- name: Microservices architecture on AKS
href: reference-architectures/containers/aks-microservices/aks-microservices.md
- name: Microservices with AKS and Azure DevOps
href: solution-ideas/articles/microservices-with-aks.md
- name: Secure DevOps for AKS
href: solution-ideas/articles/secure-devops-for-kubernetes.md
- name: Building a telehealth system
href: example-scenario/apps/telehealth-system.md
- name: CI/CD pipeline for container-based workloads
href: example-scenario/apps/devops-with-aks.md
- name: Databases
items:
- name: Guides
items:
- name: Overview
href: data-guide/index.md
- name: Relational data
items:
- name: Extract, transform, and load (ETL)
href: data-guide/relational-data/etl.md
- name: Online analytical processing (OLAP)
href: data-guide/relational-data/online-analytical-processing.md
- name: Online transaction processing (OLTP)
href: data-guide/relational-data/online-transaction-processing.md
- name: Data Warehousing
href: data-guide/relational-data/data-warehousing.md
- name: Non-relational data
items:
- name: Non-relational data stores
href: data-guide/big-data/non-relational-data.md
- name: Free-form text search
href: data-guide/scenarios/search.md
- name: Time series data
href: data-guide/scenarios/time-series.md
- name: Working with CSV and JSON files
href: data-guide/scenarios/csv-and-json.md
- name: Big Data
items:
- name: Big Data architectures
href: data-guide/big-data/index.md
- name: Batch processing
href: data-guide/big-data/batch-processing.md
- name: Real time processing
href: data-guide/big-data/real-time-processing.md
- name: Technology choices
items:
- name: Analytical data stores
href: data-guide/technology-choices/analytical-data-stores.md
- name: Analytics and reporting
href: data-guide/technology-choices/analysis-visualizations-reporting.md
- name: Batch processing
href: data-guide/technology-choices/batch-processing.md
- name: Data lakes
href: data-guide/scenarios/data-lake.md
- name: Data storage
href: data-guide/technology-choices/data-storage.md
- name: Data store comparison
href: guide/technology-choices/data-store-comparison.md
- name: Pipeline orchestration
href: data-guide/technology-choices/pipeline-orchestration-data-movement.md
- name: Real-time message ingestion
href: data-guide/technology-choices/real-time-ingestion.md
- name: Search data stores
href: data-guide/technology-choices/search-options.md
- name: Stream processing
href: data-guide/technology-choices/stream-processing.md
- name: Application tenancy in SaaS Databases
items:
- name: Tenancy models
href: isv/application-tenancy.md
- name: Monitor Azure Databricks jobs
items:
- name: Overview
href: databricks-monitoring/index.md
- name: Send Databricks application logs to Azure Monitor
href: databricks-monitoring/application-logs.md
- name: Use dashboards to visualize Databricks metrics
href: databricks-monitoring/dashboards.md
- name: Troubleshoot performance bottlenecks
href: databricks-monitoring/performance-troubleshooting.md
- name: Transfer data to and from Azure
href: data-guide/scenarios/data-transfer.md
- name: Extend on-premises data solutions to Azure
href: data-guide/scenarios/hybrid-on-premises-and-cloud.md
- name: Securing data solutions
href: data-guide/scenarios/securing-data-solutions.md
- name: Architectures
items:
- name: Apache Cassandra
href: best-practices/cassandra.md
- name: Azure data platform
href: example-scenario/dataplate2e/data-platform-end-to-end.md
- name: Big data analytics with Azure Data Explorer
href: solution-ideas/articles/big-data-azure-data-explorer.md
- name: Campaign optimization with HDInsight Spark
href: solution-ideas/articles/campaign-optimization-with-azure-hdinsight-spark-clusters.md
- name: Campaign optimization with SQL Server
href: solution-ideas/articles/campaign-optimization-with-sql-server.md
- name: DataOps for modern data warehouse
href: example-scenario/data-warehouse/dataops-mdw.md
- name: Data streaming
href: solution-ideas/articles/data-streaming-scenario.md
- name: Data cache
href: solution-ideas/articles/data-cache-with-redis-cache.md
- name: Digital campaign management
href: solution-ideas/articles/digital-marketing-using-azure-database-for-postgresql.md
- name: Digital marketing using Azure MySQL
href: solution-ideas/articles/digital-marketing-using-azure-database-for-mysql.md
- name: Finance management using Azure MySQL
href: solution-ideas/articles/finance-management-apps-using-azure-database-for-mysql.md
- name: Finance management using Azure PostgreSQL
href: solution-ideas/articles/finance-management-apps-using-azure-database-for-postgresql.md
- name: Gaming using Azure MySQL
href: solution-ideas/articles/gaming-using-azure-database-for-mysql.md
- name: Gaming using Cosmos DB
href: solution-ideas/articles/gaming-using-cosmos-db.md
- name: Globally distributed apps using Cosmos DB
href: solution-ideas/articles/globally-distributed-mission-critical-applications-using-cosmos-db.md
- name: Hybrid ETL with Azure Data Factory
href: example-scenario/data/hybrid-etl-with-adf.md
- name: Intelligent apps using Azure MySQL
href: solution-ideas/articles/intelligent-apps-using-azure-database-for-mysql.md
- name: Intelligent apps using Azure PostgreSQL
href: solution-ideas/articles/intelligent-apps-using-azure-database-for-postgresql.md
- name: Interactive querying with HDInsight
href: solution-ideas/articles/interactive-querying-with-hdinsight.md
- name: Loan charge-off prediction with HDInsight Spark
href: solution-ideas/articles/loan-chargeoff-prediction-with-azure-hdinsight-spark-clusters.md
- name: Loan charge-off prediction with SQL Server
href: solution-ideas/articles/loan-chargeoff-prediction-with-sql-server.md
- name: Loan credit risk modeling
href: solution-ideas/articles/loan-credit-risk-analyzer-and-default-modeling.md
- name: Loan credit risk with SQL Server
href: solution-ideas/articles/loan-credit-risk-with-sql-server.md
- name: Messaging
href: solution-ideas/articles/messaging.md
- name: Modern data warehouse
href: solution-ideas/articles/modern-data-warehouse.md
- name: N-tier app with Cassandra
href: reference-architectures/n-tier/n-tier-cassandra.md
- name: Ops automation using Event Grid
href: solution-ideas/articles/ops-automation-using-event-grid.md
- name: Oracle migration to Azure
href: solution-ideas/articles/reference-architecture-for-oracle-database-migration-to-azure.md
- name: Personalization using Cosmos DB
href: solution-ideas/articles/personalization-using-cosmos-db.md
- name: Retail and e-commerce using Azure MySQL
href: solution-ideas/articles/retail-and-ecommerce-using-azure-database-for-mysql.md
- name: Retail and e-commerce using Azure PostgreSQL
href: solution-ideas/articles/retail-and-ecommerce-using-azure-database-for-postgresql.md
- name: Retail and e-commerce using Cosmos DB
href: solution-ideas/articles/retail-and-e-commerce-using-cosmos-db.md
- name: Running Oracle Databases on Azure
href: solution-ideas/articles/reference-architecture-for-oracle-database-on-azure.md
- name: Serverless apps using Cosmos DB
href: solution-ideas/articles/serverless-apps-using-cosmos-db.md
- name: Streaming using HDInsight
href: solution-ideas/articles/streaming-using-hdinsight.md
- name: Windows N-tier applications
href: reference-architectures/n-tier/n-tier-sql-server.md
- name: Developer Options
items:
- name: Microservices
items:
- name: Overview
href: microservices/index.md
- name: Guides
items:
- name: Domain modeling for microservices
items:
- name: Domain analysis
href: microservices/model/domain-analysis.md
- name: Tactical DDD
href: microservices/model/tactical-ddd.md
- name: Identify microservice boundaries
href: microservices/model/microservice-boundaries.md
- name: Design a microservices architecture
items:
- name: Introduction
href: microservices/design/index.md
- name: Choose a compute option
href: microservices/design/compute-options.md
- name: Interservice communication
href: microservices/design/interservice-communication.md
- name: API design
href: microservices/design/api-design.md
- name: API gateways
href: microservices/design/gateway.md
- name: Data considerations
href: microservices/design/data-considerations.md
- name: Design patterns for microservices
href: microservices/design/patterns.md
- name: Operate microservices in production
items:
- name: Monitor microservices in Azure Kubernetes Service (AKS)
href: microservices/logging-monitoring.md
- name: CI/CD for microservices
href: microservices/ci-cd.md
- name: CI/CD for microservices on Kubernetes
href: microservices/ci-cd-kubernetes.md
- name: Automated Kubernetes deployments with Bedrock
href: example-scenario/bedrock/bedrock-automated-deployments.md
- name: Migrate to a microservices architecture
items:
- name: Migrate a monolith application to microservices
href: microservices/migrate-monolith.md
- name: Modernize enterprise applications with Service Fabric
href: service-fabric/modernize-app-azure-service-fabric.md
- name: Migrate from Cloud Services to Service Fabric
href: service-fabric/migrate-from-cloud-services.md
- name: Serverless applications
items:
- name: Serverless Functions overview
href: serverless-quest/serverless-overview.md
- name: Serverless Functions examples
href: serverless-quest/reference-architectures.md
- name: Plan for serverless architecture
items:
- name: Serverless Functions decision and planning
href: serverless-quest/validate-commit-serverless-adoption.md
- name: Serverless application assessment
href: serverless-quest/application-assessment.md
- name: Technical workshops and training
href: serverless-quest/technical-training.md
- name: Proof of concept or pilot
href: serverless-quest/poc-pilot.md
- name: Develop and deploy serverless apps
items:
- name: Serverless Functions app development
href: serverless-quest/application-development.md
- name: Serverless Functions code walkthrough
href: serverless/code.md
- name: CI/CD for a serverless frontend
href: serverless/guide/serverless-app-cicd-best-practices.md
- name: Serverless Functions app operations
href: serverless-quest/functions-app-operations.md
- name: Serverless Functions app security
href: serverless-quest/functions-app-security.md
- name: Architectures
items:
- name: Big data analytics with Azure Data Explorer
href: solution-ideas/articles/big-data-azure-data-explorer.md
- name: CI/CD pipeline using Azure DevOps
href: example-scenario/apps/devops-dotnet-webapp.md
- name: Event-based cloud automation
href: reference-architectures/serverless/cloud-automation.md
- name: Microservices on Azure Service Fabric
href: reference-architectures/microservices/service-fabric.md
- name: Multicloud with the Serverless Framework
href: example-scenario/serverless/serverless-multicloud.md
- name: Serverless applications using Event Grid
href: solution-ideas/articles/serverless-application-architectures-using-event-grid.md
- name: Serverless event processing
href: reference-architectures/serverless/event-processing.md
- name: Unified logging for microservices apps
href: example-scenario/logging/unified-logging.md
- name: DevOps
items:
- name: Checklist
href: checklist/dev-ops.md
- name: Guides
items:
- name: Extending Resource Manager templates
items:
- name: Overview
href: building-blocks/extending-templates/index.md
- name: Update a resource
href: building-blocks/extending-templates/update-resource.md
- name: Conditionally deploy a resource
href: building-blocks/extending-templates/conditional-deploy.md
- name: Use an object as a parameter
href: building-blocks/extending-templates/objects-as-parameters.md
- name: Property transformer and collector
href: building-blocks/extending-templates/collector.md
- name: Architectures
items:
- name: CI/CD pipeline for chatbots with ARM templates
href: example-scenario/apps/devops-cicd-chatbot.md
- name: CI/CD for Azure VMs
href: solution-ideas/articles/cicd-for-azure-vms.md
- name: CI/CD for Azure Web Apps
href: solution-ideas/articles/azure-devops-continuous-integration-and-continuous-deployment-for-azure-web-apps.md
- name: CI/CD for Containers
href: solution-ideas/articles/cicd-for-containers.md
- name: CI/CD using Jenkins and AKS
href: solution-ideas/articles/container-cicd-using-jenkins-and-kubernetes-on-azure-container-service.md
- name: DevSecOps in Azure
href: solution-ideas/articles/devsecops-in-azure.md
- name: DevSecOps in GitHub
href: solution-ideas/articles/devsecops-in-github.md
- name: DevTest and DevOps for IaaS
href: solution-ideas/articles/dev-test-iaas.md
- name: DevTest and DevOps for PaaS
href: solution-ideas/articles/dev-test-paas.md
- name: DevTest and DevOps for microservices
href: solution-ideas/articles/dev-test-microservice.md
- name: DevTest Image Factory
href: solution-ideas/articles/dev-test-image-factory.md
- name: CI/CD using Jenkins and Terraform
href: solution-ideas/articles/immutable-infrastructure-cicd-using-jenkins-and-terraform-on-azure-virtual-architecture-overview.md
- name: Hybrid DevOps
href: solution-ideas/articles/devops-in-a-hybrid-environment.md
- name: Java CI/CD using Jenkins and Azure Web Apps
href: solution-ideas/articles/java-cicd-using-jenkins-and-azure-web-apps.md
- name: Jenkins on Azure
href: example-scenario/apps/jenkins.md
- name: SharePoint for Dev-Test
href: solution-ideas/articles/sharepoint-farm-devtest.md
- name: Real time location sharing
href: example-scenario/signalr/index.md
- name: Run containers in a hybrid environment
href: hybrid/hybrid-containers.md
- name: High Availability
items:
- name: Overview
href: high-availability/building-solutions-for-high-availability.md
- name: Architectures
items:
- name: IaaS - Web application with relational database
href: high-availability/ref-arch-iaas-web-and-db.md
- name: Hybrid
items:
- name: Guides
items:
- name: FSLogix for the enterprise
href: example-scenario/wvd/windows-virtual-desktop-fslogix.md
- name: Architectures
items:
- name: Manage configurations for Azure Arc enabled servers
href: hybrid/azure-arc-hybrid-config.md
- name: Azure Automation in a hybrid environment
href: hybrid/azure-automation-hybrid.md
- name: Using Azure file shares in a hybrid environment
href: hybrid/azure-file-share.md
- name: Azure Functions in a hybrid environment
href: hybrid/azure-functions-hybrid.md
- name: Back up files and applications on Azure Stack Hub
href: hybrid/azure-stack-backup.md
- name: Azure Automation Update Management
href: hybrid/azure-update-mgmt.md
- name: Deploy AI and machine learning at the edge by using Azure Stack Edge
href: hybrid/deploy-ai-ml-azure-stack-edge.md
- name: Design a hybrid Domain Name System solution with Azure
href: hybrid/hybrid-dns-infra.md
- name: Hybrid file services
href: hybrid/hybrid-file-services.md
- name: Hybrid availability and performance monitoring
href: hybrid/hybrid-perf-monitoring.md
- name: Hybrid Security Monitoring using Azure Security Center and Azure Sentinel
href: hybrid/hybrid-security-monitoring.md
- name: Manage hybrid Azure workloads using Windows Admin Center
href: hybrid/hybrid-server-os-mgmt.md
- name: Azure Arc hybrid management and deployment for Kubernetes clusters
href: hybrid/arc-hybrid-kubernetes.md
- name: Connect standalone servers by using Azure Network Adapter
href: hybrid/azure-network-adapter.md
- name: Disaster Recovery for Azure Stack Hub virtual machines
href: hybrid/azure-stack-vm-dr.md
- name: On-premises data gateway for Azure Logic Apps
href: hybrid/gateway-logic-apps.md
- name: Run containers in a hybrid environment
href: hybrid/hybrid-containers.md
- name: Connect an on-premises network to Azure
href: reference-architectures/hybrid-networking/index.md
- name: Connect an on-premises network to Azure using ExpressRoute
href: reference-architectures/hybrid-networking/expressroute-vpn-failover.md
- name: Cross cloud scaling
href: solution-ideas/articles/cross-cloud-scaling.md
- name: Cross-platform chat
href: solution-ideas/articles/cross-platform-chat.md
- name: Extend an on-premises network using ExpressRoute
href: reference-architectures/hybrid-networking/expressroute.md
- name: Extend an on-premises network using VPN
href: reference-architectures/hybrid-networking/vpn.md
- name: Hybrid connections
href: solution-ideas/articles/hybrid-connectivity.md
- name: Implement a hub-spoke network topology
href: reference-architectures/hybrid-networking/shared-services.md
- name: Troubleshoot a hybrid VPN connection
href: reference-architectures/hybrid-networking/troubleshoot-vpn.md
- name: Connect using Windows Virtual Desktop
items:
- name: Windows Virtual Desktop for enterprises
href: example-scenario/wvd/windows-virtual-desktop.md
- name: Multiple Active Directory forests
href: example-scenario/wvd/multi-forest.md
- name: Multiple forests with Azure AD DS
href: example-scenario/wvd/multi-forest-azure-managed.md
- name: Identity
items:
- name: Guides
items:
- name: Identity in multitenant applications
items:
- name: Introduction
href: multitenant-identity/index.md
- name: The Tailspin scenario
href: multitenant-identity/tailspin.md
- name: Authentication
href: multitenant-identity/authenticate.md
- name: Claims-based identity
href: multitenant-identity/claims.md
- name: Tenant sign-up
href: multitenant-identity/signup.md
- name: Application roles
href: multitenant-identity/app-roles.md
- name: Authorization
href: multitenant-identity/authorize.md
- name: Secure a web API
href: multitenant-identity/web-api.md
- name: Cache access tokens
href: multitenant-identity/token-cache.md
- name: Client assertion
href: multitenant-identity/client-assertion.md
- name: Federate with a customer's AD FS
href: multitenant-identity/adfs.md
- name: Architectures
items:
- name: AD DS resource forests in Azure
href: reference-architectures/identity/adds-forest.md
- name: Deploy AD DS in an Azure virtual network
href: reference-architectures/identity/adds-extend-domain.md
- name: Extend on-premises AD FS to Azure
href: reference-architectures/identity/adfs.md
- name: Hybrid Identity
href: solution-ideas/articles/hybrid-identity.md
- name: Integrate on-premises AD domains with Azure AD
href: reference-architectures/identity/azure-ad.md
- name: Integrate on-premises AD with Azure
href: reference-architectures/identity/index.md
- name: Integration
items:
- name: Architectures
items:
- name: Basic enterprise integration on Azure
href: reference-architectures/enterprise-integration/basic-enterprise-integration.md
- name: Enterprise business intelligence
href: reference-architectures/data/enterprise-bi-synapse.md
- name: Enterprise integration using queues and events
href: reference-architectures/enterprise-integration/queues-events.md
- name: Publishing internal APIs to external users
href: example-scenario/apps/publish-internal-apis-externally.md
- name: Web and Mobile front-ends
href: solution-ideas/articles/front-end.md
- name: Custom Business Processes
href: solution-ideas/articles/custom-business-processes.md
- name: Line of Business Extension
href: solution-ideas/articles/lob.md
- name: On-premises data gateway for Azure Logic Apps
href: hybrid/gateway-logic-apps.md
- name: Internet of Things
items:
- name: Architectures
items:
- name: IoT reference architecture
href: reference-architectures/iot.md
- name: Condition Monitoring
href: solution-ideas/articles/condition-monitoring.md
- name: IoT and data analytics
href: example-scenario/data/big-data-with-iot.md
- name: IoT using Cosmos DB
href: solution-ideas/articles/iot-using-cosmos-db.md
- name: Predictive Maintenance for Industrial IoT
href: solution-ideas/articles/iot-predictive-maintenance.md
- name: IoT Connected Platform
href: solution-ideas/articles/iot-connected-platform.md
- name: Contactless IoT interfaces
href: solution-ideas/articles/contactless-interfaces.md
- name: COVID-19 IoT Safe Solutions
href: solution-ideas/articles/cctv-mask-detection.md
- name: Lighting and disinfection system
href: solution-ideas/articles/uven-disinfection.md
- name: Light and power for emerging markets
href: solution-ideas/articles/iot-power-management.md
- name: Predictive maintenance with IoT
href: example-scenario/predictive-maintenance/iot-predictive-maintenance.md
- name: Process real-time vehicle data using IoT
href: example-scenario/data/realtime-analytics-vehicle-iot.md
- name: Safe Buildings with IoT and Azure
href: solution-ideas/articles/safe-buildings.md
- name: Secure access to IoT apps with Azure AD
href: example-scenario/iot-aad/iot-aad.md
- name: Voice assistants and IoT devices
href: solution-ideas/articles/iot-controlling-devices-with-voice-assistant.md
- name: IoT using Azure Data Explorer
href: solution-ideas/articles/iot-azure-data-explorer.md
- name: Industrial IoT Analytics
items:
- name: Architecture
href: guide/iiot-guidance/iiot-architecture.md
- name: Recommended services
href: guide/iiot-guidance/iiot-services.md
- name: Data visualization
href: guide/iiot-guidance/iiot-data.md
- name: Considerations
href: guide/iiot-guidance/iiot-considerations.md
- name: IoT concepts
items:
- name: Introduction to IoT solutions
href: example-scenario/iot/introduction-to-solutions.md
- name: Devices, platform, and applications
href: example-scenario/iot/devices-platform-application.md
- name: Attestation, authentication, and provisioning
href: example-scenario/iot/attestation-provisioning.md
- name: Field and cloud edge gateways
href: example-scenario/iot/field-cloud-edge-gateways.md
- name: Application-to-device commands
href: example-scenario/iot/cloud-to-device.md
- name: Builders, developers, and operators
href: example-scenario/iot/builders-developers-operators.md
- name: IoT patterns
items:
- name: Measure and control loop
href: example-scenario/iot/measure-control-loop.md
- name: Monitor and manage loop
href: example-scenario/iot/monitor-manage-loop.md
- name: Analyze and optimize loop
href: example-scenario/iot/analyze-optimize-loop.md
- name: Solution scaling with application stamps
href: example-scenario/iot/application-stamps.md
- name: Management and Governance
items:
- name: Architectures
items:
- name: Archive on-premises data to cloud
href: solution-ideas/articles/backup-archive-on-premises.md
- name: Back up cloud applications
href: /azure/backup/guidance-best-practices
- name: Back up on-premises applications
href: solution-ideas/articles/backup-archive-on-premises-applications.md
- name: Centralize app configuration and security
href: solution-ideas/articles/appconfig-key-vault.md
- name: Computer forensics
href: example-scenario/forensics/index.md
- name: High availability for BCDR
href: solution-ideas/articles/build-high-availability-into-your-bcdr-strategy.md
- name: Data Sovereignty & Data Gravity
href: solution-ideas/articles/data-sovereignty-and-gravity.md
- name: Enterprise-scale disaster recovery
href: solution-ideas/articles/disaster-recovery-enterprise-scale-dr.md
- name: Updating Windows VMs in Azure
href: example-scenario/wsus/index.md
- name: Highly available SharePoint Server 2016
href: reference-architectures/sharepoint/index.md
- name: SMB disaster recovery with Azure Site Recovery
href: solution-ideas/articles/disaster-recovery-smb-azure-site-recovery.md
- name: SMB disaster recovery with Double-Take DR
href: solution-ideas/articles/disaster-recovery-smb-double-take-dr.md
- name: Manage configurations for Azure Arc enabled servers
href: hybrid/azure-arc-hybrid-config.md
- name: Azure Automation in a hybrid environment
href: hybrid/azure-automation-hybrid.md
- name: Back up files and applications on Azure Stack Hub
href: hybrid/azure-stack-backup.md
- name: Azure Automation Update Management
href: hybrid/azure-update-mgmt.md
- name: Hybrid availability and performance monitoring
href: hybrid/hybrid-perf-monitoring.md
- name: Manage hybrid Azure workloads using Windows Admin Center
href: hybrid/hybrid-server-os-mgmt.md
- name: Azure Arc hybrid management and deployment for Kubernetes clusters
href: hybrid/arc-hybrid-kubernetes.md
- name: Disaster Recovery for Azure Stack Hub virtual machines
href: hybrid/azure-stack-vm-dr.md
- name: Media
items:
- name: Architectures
items:
- name: Instant broadcasting with serverless
href: solution-ideas/articles/instant-broadcasting-on-serverless-architecture.md
- name: Live streaming digital media
href: solution-ideas/articles/digital-media-live-stream.md
- name: Video-on-demand digital media
href: solution-ideas/articles/digital-media-video.md
- name: Migration
items:
- name: Architectures
items:
- name: Adding modern front-ends to legacy apps
href: solution-ideas/articles/adding-a-modern-web-and-mobile-frontend-to-a-legacy-claims-processing-application.md
- name: Banking system
items:
- name: Banking cloud transformation
href: example-scenario/banking/banking-system-cloud-transformation.md
- name: Patterns and implementations
href: example-scenario/banking/patterns-and-implementations.md
- name: JMeter implementation reference
href: example-scenario/banking/jmeter-load-testing-pipeline-implementation-reference.md
- name: Lift and shift LOB apps
href: solution-ideas/articles/modern-customer-support-portal-powered-by-an-agile-business-process.md
- name: Lift and shift with AKS
href: solution-ideas/articles/modern-customer-support-portal-powered-by-an-agile-business-process.md
- name: Oracle database migration
items:
- name: Migration decision process
href: example-scenario/oracle-migrate/oracle-migration-overview.md
- name: Cross-cloud connectivity
href: example-scenario/oracle-migrate/oracle-migration-cross-cloud.md
- name: Lift and shift to Azure VMs
href: example-scenario/oracle-migrate/oracle-migration-lift-shift.md
- name: Refactor
href: example-scenario/oracle-migrate/oracle-migration-refactor.md
- name: Rearchitect
href: example-scenario/oracle-migrate/oracle-migration-rearchitect.md
- name: Serverless computing LOB apps
href: solution-ideas/articles/onboarding-customers-with-a-cloud-native-serverless-architecture.md
- name: Unlock Legacy Data with Azure Stack
href: solution-ideas/articles/unlock-legacy-data.md
- name: Decompose apps with Service Fabric
href: example-scenario/infrastructure/service-fabric-microservices.md
- name: Mixed Reality
items:
- name: Architectures
items:
- name: Mixed reality design reviews
href: solution-ideas/articles/collaborative-design-review-powered-by-mixed-reality.md
- name: Facilities management with mixed reality
href: solution-ideas/articles/facilities-management-powered-by-mixed-reality-and-iot.md
- name: Training powered by mixed reality
href: solution-ideas/articles/training-and-procedural-guidance-powered-by-mixed-reality.md
- name: Mobile
items:
- name: Architectures
items:
- name: Custom mobile workforce app
href: solution-ideas/articles/custom-mobile-workforce-app.md
- name: Scalable apps with Azure MySQL
href: solution-ideas/articles/scalable-web-and-mobile-applications-using-azure-database-for-mysql.md
- name: Scalable apps using Azure PostgreSQL
href: solution-ideas/articles/scalable-web-and-mobile-applications-using-azure-database-for-postgresql.md
- name: Social app for with authentication
href: solution-ideas/articles/social-mobile-and-web-app-with-authentication.md
- name: Task-based consumer mobile app
href: solution-ideas/articles/task-based-consumer-mobile-app.md
- name: Networking
items:
- name: Guides
items:
- name: Add IP spaces to peered virtual networks
href: networking/prefixes/add-ip-space-peered-vnet.md
- name: Azure Firewall Architecture Guide
href: example-scenario/firewalls/index.md
- name: Architectures
items:
- name: Virtual network peering and VPN gateways
href: reference-architectures/hybrid-networking/vnet-peering.md
- name: Deploy highly available NVAs
href: reference-architectures/dmz/nva-ha.md
- name: High availability for IaaS apps
href: example-scenario/infrastructure/iaas-high-availability-disaster-recovery.md
- name: Hub-spoke network topology in Azure
href: reference-architectures/hybrid-networking/hub-spoke.md
- name: Implement a secure hybrid network
href: reference-architectures/dmz/secure-vnet-dmz.md
- name: Segmenting Virtual Networks
href: reference-architectures/hybrid-networking/network-level-segmentation.md
- name: Azure Automation Update Management
href: hybrid/azure-update-mgmt.md
- name: Design a hybrid Domain Name System solution with Azure
href: hybrid/hybrid-dns-infra.md
- name: Hybrid availability and performance monitoring
href: hybrid/hybrid-perf-monitoring.md
- name: Connect standalone servers by using Azure Network Adapter
href: hybrid/azure-network-adapter.md
- name: SAP
items:
- name: Overview
href: reference-architectures/sap/sap-overview.md
- name: Architectures
items:
- name: SAP HANA on Azure (Large Instances)
href: reference-architectures/sap/hana-large-instances.md
- name: SAP HANA Scale-up on Linux
href: reference-architectures/sap/run-sap-hana-for-linux-virtual-machines.md
- name: SAP NetWeaver on Windows on Azure
href: reference-architectures/sap/sap-netweaver.md
- name: SAP S/4HANA in Linux on Azure
href: reference-architectures/sap/sap-s4hana.md
- name: SAP BW/4HANA in Linux on Azure
href: reference-architectures/sap/run-sap-bw4hana-with-linux-virtual-machines.md
- name: SAP NetWeaver on SQL Server
href: solution-ideas/articles/sap-netweaver-on-sql-server.md
- name: SAP deployment using an Oracle DB
href: example-scenario/apps/sap-production.md
- name: Dev/test for SAP
href: example-scenario/apps/sap-dev-test.md
- name: Security
items:
- name: Architectures
items:
- name: Azure AD in Security Operations
href: example-scenario/aadsec/azure-ad-security.md
- name: Cyber threat intelligence
href: example-scenario/data/sentinel-threat-intelligence.md
- name: Highly-secure IaaS apps
href: reference-architectures/n-tier/high-security-iaas.md
- name: Homomorphic encryption with SEAL
href: solution-ideas/articles/homomorphic-encryption-seal.md
- name: Real-time fraud detection
href: example-scenario/data/fraud-detection.md
- name: Secure OBO refresh tokens
href: example-scenario/secrets/secure-refresh-tokens.md
- name: Securely managed web apps
href: example-scenario/apps/fully-managed-secure-apps.md
- name: Virtual network integrated microservices
href: example-scenario/integrated-multiservices/virtual-network-integration.md
- name: Virtual Network security options
href: example-scenario/gateway/firewall-application-gateway.md
- name: Hybrid Security Monitoring using Azure Security Center and Azure Sentinel
href: hybrid/hybrid-security-monitoring.md
- name: Storage
items:
- name: Architectures
items:
- name: Media rendering
href: solution-ideas/articles/azure-batch-rendering.md
- name: Medical data storage
href: solution-ideas/articles/medical-data-storage.md
- name: HIPAA/HITRUST Health Data and AI
href: solution-ideas/articles/security-compliance-blueprint-hipaa-hitrust-health-data-ai.md
- name: Using Azure file shares in a hybrid environment
href: hybrid/azure-file-share.md
- name: Hybrid file services
href: hybrid/hybrid-file-services.md
- name: Web
items:
- name: Architectures
items:
- name: Basic web application
href: reference-architectures/app-service-web-app/basic-web-app.md
- name: Deployment in App Service Environments
items:
- name: Standard deployment
href: reference-architectures/enterprise-integration/ase-standard-deployment.md
- name: High availability deployment
href: reference-architectures/enterprise-integration/ase-high-availability-deployment.md
- name: E-commerce front end
href: example-scenario/apps/ecommerce-scenario.md
- name: E-commerce website running in ASE
href: solution-ideas/articles/ecommerce-website-running-in-secured-ase.md
- name: Highly available SharePoint farm
href: solution-ideas/articles/highly-available-sharepoint-farm.md
- name: Highly available multi-region web application
href: reference-architectures/app-service-web-app/multi-region.md
- name: Hybrid SharePoint farm with Microsoft 365
href: solution-ideas/articles/sharepoint-farm-microsoft-365.md
- name: Intelligent product search engine for e-commerce
href: example-scenario/apps/ecommerce-search.md
- name: Migrate a web app using Azure APIM
href: example-scenario/apps/apim-api-scenario.md
- name: Multi-region N-tier application
href: reference-architectures/n-tier/multi-region-sql-server.md
- name: Multitenant SaaS
href: example-scenario/multi-saas/multitenant-saas.md
- name: Multi-tier web application built for HA/DR
href: example-scenario/infrastructure/multi-tier-app-disaster-recovery.md
- name: SAP S/4 HANA for Large Instances
href: solution-ideas/articles/sap-s4-hana-on-hli-with-ha-and-dr.md
- name: Scalable e-commerce web app
href: solution-ideas/articles/scalable-ecommerce-web-app.md
- name: Scalable Episerver marketing website
href: solution-ideas/articles/digital-marketing-episerver.md
- name: Scalable Sitecore marketing website
href: solution-ideas/articles/digital-marketing-sitecore.md
- name: Scalable Umbraco CMS web app
href: solution-ideas/articles/medium-umbraco-web-app.md
- name: Scalable and secure WordPress on Azure
href: example-scenario/infrastructure/wordpress.md
- name: Scalable order processing
href: example-scenario/data/ecommerce-order-processing.md
- name: Scalable web app
href: reference-architectures/app-service-web-app/scalable-web-app.md
- name: More Scalable web apps
href: solution-ideas/articles/scalable-web-apps.md
- name: Serverless web app
href: reference-architectures/serverless/web-app.md
- name: Simple branded website
href: solution-ideas/articles/simple-branded-website.md
- name: Simple digital marketing website
href: solution-ideas/articles/digital-marketing-smb.md
- name: Web app monitoring on Azure
href: reference-architectures/app-service-web-app/app-monitoring.md
- name: Web and mobile applications with MySQL, Cosmos DB, and Redis
href: solution-ideas/articles/webapps.md
- name: Dynamics Business Central as a Service on Azure
href: solution-ideas/articles/business-central.md
- name: Azure Functions in a hybrid environment
href: hybrid/azure-functions-hybrid.md
- name: Cloud Adoption Framework
href: /azure/cloud-adoption-framework
|
Bob Merrick
Robert 'Bob' Merrick (23 July 1893 - 24 October 1981) was an Australian rules footballer who played for Fitzroy in the VFL.
Personal life
Merrick was born at Darlinghurst, NSW the son of Robert and Lillian Rose Merrick. He married Minnie Ruth Duncan in 1917 at Redfern, NSW and they had two children John Robert and Kathleen Helen.
A printer by trade, he was survived by each of them when he died on 24 October 1981.
Playing
Merrick was originally from Sydney and prior to joining Fitzroy played his football with Port Melbourne, finishing the 1915 VFA season as the league's leading goalkicker. He debuted for Fitzroy in 1919 and playing as a full-forward, topped Fitzroy's goalkicking every year until he left in 1922, with 42, 53, 32 and 47 goals respectively. Unlucky not to play in a premiership, he missed out on the Maroon's 1922 premiership side due to a knee injury.
He shares with Jack Moriarty the record for most goals in a match by a Fitzroy player, kicking a bag of 12 goals in his club's Round 16 encounter with Melbourne at Brunswick Street Oval in 1919.
Merrick made a brief comeback with Fitzroy in 1926 but could only manage five games before an injured shoulder saw him omitted from the side. He completed his senior football career back at Port Melbourne for the remainder of 1926 and entire 1927-28 seasons.
From 1930-34 Merrick played in the Wednesday league for Yellow Cabs booting four goals in winning 1930 and 1934 Grand Final teams and two in the 1931 premiership loss. It was during this stint that, according to a story told by Jack Dyer, Merrick abused the ball and an all in fight resulted when an opponent assumed the abuse was directed at him.
Umpiring
After missing out on the 1922 VFL Grand Final Merrick took a break from playing and began what was to become an intermittent umpiring career.
He was appointed by the North West Football Union (NWFU) in 1923 but his knee proved restrictive even for umpiring and he resigned his appointment without making the trip to Tasmania.
Merrick's activities in 1924 are undocumented but by April 1925 he had been appointed captain-coach of Benalla and had the team in rigorous pre-season training. He starred in the opening round kicking seven goals against Rutherglen where "his marking and snapshots were just as good as when he was the idol of Fitzroy". Three more goals against Albury and two against Hume Weir and it appeared he was back in form. In early June Merrick resigned from Benalla and by the middle of the month had once again taken up the whistle, this time in the Barrier Ranges Football Association (BRFA). It was an interesting selection given Merrick's relative inexperience against a list of applicants that included Les Netherton, a VFL umpire with 16 senior matches to his credit and a further 72 VCFL appointments over four seasons. Merrick's readiness to travel at once, and paying the fares of his family himself, seems to have been the difference.
His term in Broken Hill was initially successful on the field. He was even able to assist in the training of the BRFA representative team as the prepared for a match against a touring South Australian team. Off the field the local umpires association, of which both Merrick and J. Cameron (also of Melbourne) were members came into dispute with the league over match fee demands and the accusations of bias on the part of several members by the Souths club. In a tit-for-tat affair the umpires' association withdrew its services for the round scheduled for 15 August and the Souths club refused to field a team. Industrial peace was never restored and the season never completed. Due to limited matches now being available, Merrick was dismissed by the BRFA.
Following his football comeback in 1926-28 Merrick applied for a position with the VFL, initially as a boundary umpire. He was appointed for the 1929 season but it seems likely that some injury delayed his start as there is no reference to his taking the field until 6 July. By the end of the season he had umpired five VCFL matches.
Footnotes
References
Holmesby, Russell and Main, Jim (2007). The Encyclopedia of AFL Footballers. 7th ed. Melbourne: Bas Publishing.
"Wells" (Samuel Garnet Wells (1885-1972)), "The Men who Shot and Scored Freely", The Herald, (Friday, 21 July 1922), p.4.]
External links
Bob "Bloater" Merrick, The VFA Project.
Bob Merrick: Boyles Football Photos.
Category:1893 births
Category:Australian rules footballers from New South Wales
Category:Fitzroy Football Club players
Category:Port Melbourne Football Club players
Category:1981 deaths |
MYANMAR-US-POLITICS-INTERNET-GOOGLE
Caption:Google chairman Eric Schmidt speaks during a conference at a technology park in Yangon on March 22, 2013. Schmidt's stop in Myanmar is part of a tour of Asia which also took him to North Korea in January. AFP PHOTO/Ye Aung THU (Photo credit should read Ye Aung Thu/AFP/Getty Images)
Caption:
Google chairman Eric Schmidt speaks during a conference at a technology park in Yangon on March 22, 2013. Schmidt's stop in Myanmar is part of a tour of Asia which also took him to North Korea in January. AFP PHOTO/Ye Aung THU (Photo credit should read Ye Aung Thu/AFP/Getty Images)
Rights-managedRights-managed products are licensed with restrictions on usage, such as limitations on size, placement, duration of use and geographic distribution. You will be asked to submit information concerning your intended use of the product, which will determine the scope of usage rights granted.
{{ title }}
Keywords
This image is subject to copyright. Getty Images reserves the right to pursue unauthorized users of this image or clip, and to seek damages for copyright violations. To learn more about copyright and Getty Images’ enforcement program, click here. Availability for this image cannot be guaranteed until time of purchase.
Google chairman Eric Schmidt speaks during a conference at a... News PhotoChairperson,Eric Schmidt,Google,Myanmar,Science and Technology,Talking,Technology,The Internet,Vertical,YangonPhotographer AFPCollection: AFP 2013 AFPGoogle chairman Eric Schmidt speaks during a conference at a technology park in Yangon on March 22, 2013. Schmidt's stop in Myanmar is part of a tour of Asia which also took him to North Korea in January. AFP PHOTO/Ye Aung THU (Photo credit should read Ye Aung Thu/AFP/Getty Images) |
Light stimulates in vivo inositol lipid turnover in frog retinal pigment epithelial cells at the onset of shedding and phagocytosis of photoreceptor membranes.
We have developed an experimental model to study in vivo inositol lipid metabolism in frog retinal pigment epithelial (RPE) cells, including the effect of light on phospholipase C-mediated hydrolysis of phosphatidylinositol 4,5-bisphosphate. RPE cells were rapidly isolated after either brief light or dark periods. Light and electron microscopy showed complete detachment of the retina from the RPE cells, and that the RPE cell suspensions were devoid of photoreceptor cell outer segments. Frog tissues were labeled in vivo for 20 hr by intravitreal injection of [3H]inositol (4 microCi, 4 microliters per eye) within a 24-hr constant illumination period. Following 1 hr of darkness (priming period), frogs were intravitreally injected with LiCl (0.5 M, 4 microliters per eye) 15 min before the onset of either 30-min light stimulation or an additional 30 min of darkness (controls). In order to preserve endogenous inositol phosphate pools present after dark and light exposure, the RPE cells were harvested in the shortest time possible, at low temperatures (18-20 degrees C), and in the presence of 10 mM LiCl. Total [3H]inositol-labeled water-soluble products (inositol plus inositol phosphates) were increased by 86% after 30 min of light. Inositol trisphosphate (IP3) showed the highest accumulation (a 5.5-fold increase), followed by inositol bisphosphate (1.9-fold increase) and inositol monophosphate (1.4-fold increase). Free [3H]inositol also accumulated (2.8-fold increase), reflecting only a partial inhibition of phosphomonoesterase by LiCl. These changes were paralleled by a 12% decrease in 3H-labeled phosphatidylinositol with no significant difference in the labeling of polyphosphoinositides.(ABSTRACT TRUNCATED AT 250 WORDS) |
Following a meal, increased blood glucose levels stimulate insulin release from the pancreas to act throughout the body to lower blood glucose levels. Important sites of action of insulin on glucose metabolism include facilitation of glucose uptake into skeletal muscle and adipocytes, and an increase of glycogen storage in the liver. Skeletal muscle and adipocytes is responsible for insulin-mediated glucose uptake and utilization in the fed state, making them very important sites for glucose metabolism.
Diabetes comprises two distinct diseases, viz. type 1 (or insulin-dependent diabetes) and type 2 (insulin-independent diabetes), both of which involve the malfunction of glucose homeostasis. Type 2 diabetes affects more than 350 million people in the world and the number is rising rapidly. Complications of diabetes include severe cardiovascular problems, kidney failure, peripheral neuropathy, blindness and even loss of limbs and death in the later stages of the disease. Type 2 diabetes is characterized by insulin resistance in skeletal muscle and adipose tissue (fat), and at present there is no definitive treatment. Most treatments used today are focused on treating dysfunctional insulin signaling or inhibiting glucose output from the liver and many of those treatments have several drawbacks and side effects. There is thus a great interest in identifying novel insulin-independent ways to treat different form of metabolic orders connected with dysregulation of glucose uptake such as type 2 diabetes.
In type 2 diabetes the insulin-signaling pathway is blunted in peripheral tissues such as fat and skeletal muscle. Methods for treating type 2 diabetes typically include lifestyle changes, as well as the administration of insulin or oral medications to help the body with the glucose homeostasis. People with type 2 diabetes in the later stages of the disease develop “beta-cell failure” or the inability of the pancreas to release insulin in response to high blood glucose levels. In the later stages of the disease patients often require insulin injections, in combination with oral medications, to manage their diabetes. In type 2 diabetes the insulin-signaling pathway is blunted in peripheral tissues and most common drugs have side effects including the said down regulation or desensitization of the insulin pathway and/or the promotion of fat incorporation in fat, liver and skeletal muscle, furthermore increased stimulation of proliferation of certain cells and a higher risk of promoting cancer. There is thus a great interest in identifying novel ways to treat metabolic diseases including type 2 diabetes that do not include these side-effects.
The molecular understanding of the signaling pathway below the insulin receptor has been a very hard problem to solve and has been occupying a great number of researchers since the discovery of insulin. In short, control of glucose uptake by insulin involves activation of the insulin receptor (IR), insulin receptor substrate (IRS), phosphoinositide 3-kinase (PI3K) and thus stimulation of phosphatidylinositol (3,4,5)-triphosphate (PIP3), mammalian target of rapamycin also called mechanistic target of rapamycin (mTOR), Akt/PKB (Akt) and TBCID4 (AS160), leading to translocation of glucose transporter 4 (GLUT4). Akt activation is considered necessary for GLUT4 translocation.
Akt has multiple act ions and regulates cellular metabolism and survival. Akt can promote cell survival both directly and indirectly. Akt can promote proliferation and differentiation and has impact on the cell cycle and migration of cells. Akt can influence transcription and translation. Akt has been implicated in angiogenesis and tumor growth. Thus Akt promotes changes in cells and tissues that can lead to cancer and other pathophysiological effects, such as obesity and negative effects on insulin signaling. It would thus be desirable to be able to increase glucose uptake without stimulating Akt to circumvent these side-effects.
Another important protein involved in the insulin-signaling pathway is mTOR. mTOR is regulated by several upstream pathways involved in energy uptake of the cell. mTOR is a complex that exists in two complexes: mTOR complex-1 (mTORC1), which includes the protein raptor, and mTOR complex-2 (mTORC2), which includes the protein rictor. PI3K has a key function upstream of mTOR in the insulin pathway by generating polyphosphoinositides in the plasma membrane, which function as a docking site for Akt. Thereby Akt is brought close to its activating kinases, PDK-1, which phosphorylates Akt on Thr308, and mTORC2, which phosphorylates Akt on Ser473 (Rowland, Fazakerley & James 2011).
Insulin and catecholamines are released in the body in response to quite different stimuli. Whereas insulin is released in response to the rise in blood sugar levels after a meal, epinephrine (also referred to as adrenaline) and norepinephrine (also referred to as noradrenaline) are released due to various internal and external stimuli, such as exercise, emotions and stress but also homeostatic tissue regulation. Insulin is an anabolic hormone that stimulates many processes involved in growth including glucose uptake, glycogen and triglyceride formation whereas catecholamines are mainly catabolic. Although insulin and catecholamines normally have antagonistic effects, it has been shown previously that they have similar actions in skeletal muscle on glucose uptake (Nevzorova et al. 2006). It is likely that catecholamines stimulate glucose uptake via adrenergic receptors to supply muscle cells with an energy substrate. Thus, it is likely that in mammals, including humans, the adrenergic and insulin systems can work independently to provide for the energy need of skeletal muscle during different situations. Since insulin stimulates many anabolic processes including a number of unwanted side effects it would be beneficial to be able to stimulate glucose uptake through the newly found adrenergic signaling pathway, which is catabolic and does not include many of the unwanted processes.
It is known in the field of the art that adrenergic receptors are prototypic models for the study of G protein-coupled receptors (GPCRs) and their signaling (Santulli, laccarino 2013, Drake, Shenoy & Leficowitz 2006). There are three different classes of ARs, with distinct expression patterns and pharmacological profiles: α1-, α2- and β-ARs. The α1-ARs comprise the α1A, α1B and α1D while α2-ARs are divided into α2A, α2B- and α2C. The β-ARs are also divided into the subtypes β1, β2, and β3, of which β2-AR is the major isoform in skeletal muscle cells (Watson-Wright, Wilkinson 1986, Liggett, Shah & Cryer 1988). Adrenergic receptors are G protein coupled and signal through second messengers such as cAMP and phospholipase C and are thus suited as prototypical models for most classes of GPCRs.
Glucose uptake in cells is mainly considered to be through facilitative glucose transporters (GLUT). GLUTs are transporter proteins mediating transport of glucose and/or fructose over the plasma membrane down the concentration gradient. There are fourteen known members of the GLUT family, named GLUT1-14, divided into three classes (Class I, Class II and Class III) dependent on their substrate specificity and tissue expression. GLUT1 and GLUT4 are the most intensively studied isoforms and, together with GLUT2 and GLUT3, belong to Class I which mainly transports glucose (in contrast to Class II that also transports fructose). GLUT1 is ubiquitously expressed and is responsible for basal glucose transport. GLUT4 is only expressed in peripheral tissues such as skeletal muscle, cardiac muscle and adipose tissues. GLUT4 has also been reported to be expressed in e.g. brain, kidney, and liver. GLUT4 is the major isoform involved in insulin stimulated glucose uptake.
To treat a condition involving a dysregulation of glucose homeostasis or glucose uptake in a mammal, it would be very advantageous to be able to activate certain GLUTs. For example for diseases such as type 2 diabetes it is vital to activate GLUT4 translocation to the plasma membrane and thus glucose uptake. Regulation of GLUT1 translocation or intrinsic activity has been suggested to occur in several tissues including erythrocytes depending on ATP-levels (Hebert, Carruthers 1986). It has also been indicated in HEK-cells (Palmada et al. 2006), 3T3-L1 (Harrison et al. 1992) and clone-9 cells (Barnes et al. 2002). Impaired GLUT translocation, of in particular GLUT8, has been reported as involved in both male and female infertility (Gawlik et al. 2008, Carayannopoulos et al. 2000). The mechanism whereby insulin signaling increases glucose uptake is mainly via GLUT4-translocation from intracellular storage to the plasma membrane (Rodnick et al. 1992). After longer insulin stimulation also GLUT1-content is increased due to increased transcription (Taha et al. 1995). Glucose uptake in type 2 diabetes is associated with defects in PI3K activity, insulin receptor tyrosine, IRS and Akt phosphorylation, resulting in impairment of GLUT4 translocation to the plasma membrane. Impaired GLUT translocation also plays a role in muscle wasting. Furthermore, GLUT translocation plays a role in feeding behavior. Mice lacking GLUT4 develop problems with lipid and glucose homeostasis leading to changes in feeding behavior. Decreased concentrations of GLUT1 and GLUT3 have also been shown in the brains of patients with Alzheimer's disease (Simpson et al 2008). Also in a review article of Shah K, et al. (Shah, Desilva & Abbruscato 2012) the role of glucose transporters in brain disease, diabetes and Alzheimer's disease is discussed. |
Q:
Difference between 越える and 超える
What is the difference between 越える【こえる】 and 超える【こえる】?
A:
「越{こ}える」 means "to cross", "to go over", "to overreach", etc.
「超{こ}える」 means "to exceed", "to be above", "to surpass", etc.
|
/*
Implementation of the gameduino2 parts. Since they require a complete new
handling of everything gui related, we moved it into a separate file.
*/
#include "gd2_ext.h"
// Initalize display
void initializeLCD()
{
HAL::delayMilliseconds(100);
HAL::spiBegin();
HAL::delayMilliseconds(100);
GD.begin();
HAL::delayMilliseconds(100);
}
#define CELL_32_SPEED 0
#define CELL_32_FLOW 1
#define CELL_32_FAN 2
#define CELL_32_EXTRUDER 11
#define CELL_32_BED 14
#define CELL_32_SDCARD 15
#define CELL_32_MENU 16
#define CELL_32_EMERGENCY 17
#define CELL_32_POWER_ON 18
#define CELL_32_POWER_OFF 19
#define CELL_32_LIGHT_ON 20
#define CELL_32_LIGHT_OFF 21
#define CELL_32_PAUSE 22
#define CELL_32_PRINT 23
#define CELL_32_HOME 24
#define CELL_32_MOVE 25
#define CELL_32_CHECK_OFF 26
#define CELL_32_CHECK_ON 27
#define CELL_32_TARGET_POS 28
#define CELL_32_CURRENT_POS 29
#define CELL_32_CLOSE 30
#define CELL_32_BIGBTN_SEL_A 31
#define CELL_32_BIGBTN_SEL_B 32
#define CELL_32_BIGBTN_A 33
#define CELL_32_BIGBTN_B 34
#define TAG_NONE 0
#define TAG_EMERGENCY 1
#define TAG_POWER 2
#define TAG_LIGHT 3
#define TAG_FAN 4
#define TAG_FAN_SLIDER 5
#define TAG_BED 6
#define TAG_BED_SLIDER 7
#define TAG_EXT0 8
#define TAG_EXT0_SLIDER 9
#define TAG_EXT1 10
#define TAG_EXT1_SLIDER 11
#define TAG_SPEED_SLIDER 12
#define TAG_FLOW_SLIDER 13
#define TAG_MENU 14
class GD2
{
public:
static uint8_t screens[4];
static uint8_t screenPos;
static void startScreen()
{
HAL::delayMilliseconds(100);
GD.ClearColorRGB(0x103000);
GD.Clear();
HAL::delayMilliseconds(100);
GD.cmd_textP(240, 30, 31, OPT_CENTER, versionString);
GD.cmd_textP(240, 130, 31, OPT_CENTER, PSTR(UI_PRINTER_NAME));
GD.swap();
HAL::delayMilliseconds(100);
LOAD_ASSETS();
HAL::delayMilliseconds(100);
}
static void refresh()
{
switch(screens[screenPos]) {
case 0:
default:
renderMainScreen();
break;
}
GD.swap();
}
static void parse(FSTRINGPARAM(text)) {
uid.col = 0;
uid.parse(text,false);
}
static void renderMainScreen() {
// GD.ClearColorRGB(0xf0f0f0L);
GD.ClearColorRGB(0xffffffL);
GD.Clear();
// Grid
GD.ColorRGB(0xabadb3L);
GD.Begin(RECTS);
GD.Vertex2ii(0,251);GD.Vertex2ii(480,272);
GD.Begin(LINES);
GD.Vertex2ii(0,58);GD.Vertex2ii(419, 58);
GD.Vertex2ii(419,0);GD.Vertex2ii(419, 250);
GD.Vertex2ii(0,250);GD.Vertex2ii(479, 250);
GD.Vertex2ii(444,250);GD.Vertex2ii(444, 272);
GD.ColorRGB(0x3b5e67);
GD.Begin(BITMAPS);
GD.Tag(TAG_MENU);
GD.Vertex2ii( 451, 253, ICONS32_HANDLE, CELL_32_MENU);
GD.Tag(TAG_EMERGENCY);
GD.Vertex2ii( 432, 11, ICONS32_HANDLE, CELL_32_EMERGENCY);
int iy = 51;
GD.Tag(TAG_POWER);
GD.Vertex2ii( 432, iy, ICONS32_HANDLE, CELL_32_POWER_OFF);
iy += 40;
GD.Tag(TAG_LIGHT);
GD.Vertex2ii( 432, iy, ICONS32_HANDLE, CELL_32_LIGHT_OFF);
iy += 40;
GD.Vertex2ii( 5, 74, ICONS32_HANDLE, CELL_32_SPEED);
GD.Vertex2ii( 5, 104, ICONS32_HANDLE, CELL_32_FLOW);
GD.Vertex2ii( 5, 134, ICONS32_HANDLE, CELL_32_FAN);
GD.Vertex2ii( 5, 164, ICONS32_HANDLE, CELL_32_EXTRUDER);
GD.Vertex2ii( 5, 194, ICONS32_HANDLE, CELL_32_EXTRUDER);
GD.Vertex2ii( 5, 224, ICONS32_HANDLE, CELL_32_EXTRUDER);
GD.Vertex2ii( 46, 74, SLIDER_HANDLE, 0);
GD.Vertex2ii( 46, 104, SLIDER_HANDLE, 0);
GD.Vertex2ii( 46, 134, SLIDER_HANDLE, 0);
GD.Vertex2ii( 46, 164, SLIDER_HANDLE, 1);
GD.Vertex2ii( 46, 194, SLIDER_HANDLE, 1);
GD.Vertex2ii( 46, 224, SLIDER_HANDLE, 1);
// Text
GD.ColorRGB(0);
parse(PSTR(UI_TEXT_PAGE_BUFFER));
GD.cmd_text(9, 8, 26, 0, uid.printCols);
parse(PSTR(UI_TEXT_PRINT_FILAMENT ":%Uf m"));
GD.cmd_text(9, 24, 26, 0, uid.printCols);
parse(PSTR(UI_TEXT_PRINT_TIME ":%Ut"));
GD.cmd_text(9, 40, 26, 0, uid.printCols);
parse(PSTR("X:%x0 mm"));
GD.cmd_text(330, 8, 26, 0, uid.printCols);
parse(PSTR("Y:%x1 mm"));
GD.cmd_text(330, 24, 26, 0, uid.printCols);
parse(PSTR("Z:%x2 mm"));
GD.cmd_text(330, 40, 26, 0, uid.printCols);
GD.ColorRGB(0xffffffL);
parse(PSTR("%os"));
GD.cmd_text(9, 250, 27, 0, uid.printCols);
}
// Check toush screen for new actions
static void checkTouch()
{
GD.get_inputs();
switch(GD.inputs.tag) {
case 1: // Emergency
break;
}
}
};
uint8_t GD2screens[4] = {0,0,0,0};
uint8_t screenPos = 0;
void uiInitKeys() {}
void uiCheckKeys(int &action) {}
inline void uiCheckSlowEncoder() {}
void uiCheckSlowKeys(int &action)
{
GD2::checkTouch();
}
|
Mental health at the intersections: the impact of complex needs on police contact and custody for Indigenous Australian men.
Indigenous Australians experience significant social risk, vulnerability and disadvantage. Nowhere is this more starkly demonstrated than in the levels of contact that Indigenous Australians have with the criminal justice system, particularly the police. Utilizing a linked dataset of extant criminal justice, human and health service administrative data in New South Wales (NSW) Australia, this paper explores patterns of police contact and custody for a cohort of Indigenous males with complex needs. Four significant factors are identified that alone or in combination appear to impact on the frequency with which these men experience police contact and custody, including young age at first police contact, experiencing out of home care as a child, alcohol misuse, and limited locational mobility. Whilst it might be expected that the presence of mental ill-health and/or cognitive disability would be a key predictor of the frequency and intensity of police contact and custody, the findings suggest rather that the presence of multiple disadvantages beginning in the early years and compounding throughout individuals' lives, in which mental illness may or may not be a factor, is more significant than the presence of any one diagnosis in precipitating police contact and custody for this group. |
Microsoft Visual Studio Solution File, Format Version 12.00
# Visual Studio 2013
VisualStudioVersion = 12.0.21005.1
MinimumVisualStudioVersion = 10.0.40219.1
Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "gordon_cnn", "gordon_cnn.vcxproj", "{7FD29E20-9C18-40EB-80AF-F48D50B652AC}"
EndProject
Global
GlobalSection(SolutionConfigurationPlatforms) = preSolution
Debug|Win32 = Debug|Win32
Debug|x64 = Debug|x64
Release|Win32 = Release|Win32
Release|x64 = Release|x64
EndGlobalSection
GlobalSection(ProjectConfigurationPlatforms) = postSolution
{7FD29E20-9C18-40EB-80AF-F48D50B652AC}.Debug|Win32.ActiveCfg = Debug|Win32
{7FD29E20-9C18-40EB-80AF-F48D50B652AC}.Debug|Win32.Build.0 = Debug|Win32
{7FD29E20-9C18-40EB-80AF-F48D50B652AC}.Debug|x64.ActiveCfg = Debug|x64
{7FD29E20-9C18-40EB-80AF-F48D50B652AC}.Debug|x64.Build.0 = Debug|x64
{7FD29E20-9C18-40EB-80AF-F48D50B652AC}.Release|Win32.ActiveCfg = Release|Win32
{7FD29E20-9C18-40EB-80AF-F48D50B652AC}.Release|Win32.Build.0 = Release|Win32
{7FD29E20-9C18-40EB-80AF-F48D50B652AC}.Release|x64.ActiveCfg = Release|x64
{7FD29E20-9C18-40EB-80AF-F48D50B652AC}.Release|x64.Build.0 = Release|x64
EndGlobalSection
GlobalSection(SolutionProperties) = preSolution
HideSolutionNode = FALSE
EndGlobalSection
EndGlobal
|
Arlington, Texas — Baker Mayfield threw four touchdowns and No. 2 Oklahoma staked claim to a playoff spot with a 41-17 win over No. 10 TCU in the return of the Big 12 championship game on Saturday.
With their record 11th Big 12 title, the Sooners (12-1, No. 3 CFP) are a lock to in the College Football Playoff for the second time in three seasons. They are the only Big 12 team to make the four-team playoff format that started in 2014.
Oklahoma jumped out to a quick 17-0 lead, including Caleb Kelly’s 18-yard fumble return for a touchdown after running back Kyle Hicks’ turnover on the first offensive play by TCU (10-3, No. 11).
Kenny Hill threw two TD passes to get the Horned Frogs within 24-17 at halftime, but Oklahoma scored twice on its first three offensive plays after the break.
Mayfield, the front-runner for the Heisman Trophy to be named next week, finished 15-of-23 passing for 243 yards and take game MVP honors. The first two touchdowns were to tight end Mark Andrews.
Hill opened the second half with three consecutive incompletions. On the first play after the punt, Mayfield hit Mykel Jones for a 55-yard catch-and-run score.
Southeastern Conference
No. 6 Georgia 28No. 4 Auburn 7
Atlanta — Shaking off a blowout loss to Auburn just three weeks ago, Jake Fromm threw two touchdown passes and No. 6 Georgia made its bid for a spot in the College Football Playoff with a victory over the No. 4 Tigers in the Southeastern Conference championship game.
Auburn (10-3) was the hottest team in the country, rolling into Atlanta after wins over Georgia and then-No. 1 Alabama in its last three games. But the Tigers were stymied by two crucial turnovers, a blocked field goal and a Georgia team eager to make up for its embarrassing 40-17 defeat on the Plains.
Nick Chubb, Sony Michel and freshman D’Andre Swift provided a much more effective running game for Georgia than the first meeting, which opened up things for the freshman quarterback. Fromm completed 16 of 22 passes for 183 yards, including a 2-yard touchdown to Isaac Nauta in the second quarter and a 6-yarder to Terry Godwin with just over 13 minutes remaining that essentially sealed Georgia’s victory.
The Bulldogs claimed their first SEC title since 2005 and capped an impressive rise in Kirby Smart’s second season as coach. Georgia went 8-5 a year ago, but Nick Saban’s former defensive coordinator insisted he was establishing a culture that would return the team to national prominence.
Georgia (12-1), which was No. 6 in the latest CFP standings, will surely move into the top four after its dominating performance against the Tigers. Auburn was ranked second in the CFP poll, but managed only 259 yards after piling up 488 in the Nov. 11 rout.
American Athletic Conference
No. 12 UCF 62No. 16 Memphis 55 (2ot)
Orlando, Fla. — Otis Anderson scored on a 1-yard run on the first possession of the second overtime and Central Florida — in what turned out to be its last game under coach Scott Frost — beat Memphis for its third AAC crown in five years.
Frost, the second-year coach and former Nebraska quarterback, took the Cornhuskers’ job after the game.
Memphis (10-2, CFP No. 20) got as far as the UCF 9 in the second OT, but Riley Ferguson’s pass on second-and-goal was intercepted by Tre Neal, giving the Knights (12-0, CFP No. 15) a likely spot in a New Year’s Six bowl.
The top two scoring teams in the country combined for 117 points and 1,479 yards. It was tied at 48 at the end of regulation.
The Knights led 48-34 early in the fourth quarter but the Tigers rallied to tie with 4:13 remaining on Ferguson’s 10-yard touchdown pass to Anthony Miller. Memphis had a chance to win it in regulation but Riley Patterson’s 51-yard field-goal attempt with 28 seconds remaining was wide left.
UCF’s McKenzie Milton was 28 of 40 for 494 yards and five touchdowns. He was selected the game’s most outstanding player.
Conference USA
FAU 41, North Texas 17
Boca Raton, Fla. — Devin Singletary ran for 164 yards and three touchdowns and Florida Atlantic beat North Texas to win its first Conference USA championship in coach Lane Kiffin’s first season.
The Owls (10-3) extended their unbeaten streak to nine games and were undefeated against C-USA opponents this season. Jason Driskel completed 15 of 27 passes for 269 yards and a touchdown, and Kalib Woods had a school-record 208 yards receiving yards. FAU had 633 yards of offense.
The Owls, who beat North Texas (9-4) 69-31 in the regular season, took a 34-0 lead in the first 33 minutes. FAU had gains of 47, 49, 22, 44, 21 and 34 yards in the first quarter alone.
Mid-American Conference
Toledo 45, Akron 28
Detroit — Logan Woodside threw four touchdown passes, Terry Swanson ran for 180 yards and two scores and Toledo beat Akron in the Mid-American Conference championship game at Ford Field.
Receivers Diontae Johnson (118 yards) and Jon’Vea Johnson (103) combined for 221 yards and three touchdowns for Toledo (11-2). The Rockets won their third conference title game and first since 2004.
Akron (7-6) forced five turnovers, but couldn’t overcome a lopsided first half in it second loss to Toledo (11-2) this season.
Woodside threw three touchdown passes in the first half, two to Diontae Johnson, as help the Rockets take a 28-0 lead. |
Email
ALMOST one thousand civilian deaths, almost a million displaced, four UN peacekeepers killed and some 10 injured, Lebanese army barracks destroyed with numerous casualties caused to soldiers who stayed away from the conflict and 60 per cent or more of Lebanon’s infrastructure destroyed.
This is the grim tally resulting from the disproportionate response of Israeli Prime Minister Ehud Olmert to the kidnapping of two Israeli soldiers and of the Bush administration’s decision to view the crisis as an opportunity to redraw the map in the Middle East.
There is no end in sight since it is apparent from the 200 or more rockets being fired every day into northern Israel, some with deadly effect, that the ostensible prime target — Hezbollah’s rocket arsenal — has not yet been destroyed nor has the ability of the Hezbollah to launch such rockets been seriously affected.
If the Israeli air force has failed so far to deliver on the promises that the air force commander is said to have made, the Israeli army’s advance into Lebanon is having even tougher going with the Hezbollah resistance proving to be far more resilient than the Israelis had been led to expect. Press reports suggest that at least twice Israeli forces have been thrown out of the border village of Bint Jebeil. Elsewhere, Hezbollah has claimed that four Israeli tanks have been damaged in villages for occupation of which battles have been raging intermittently since the conflict began on July 12.
The Israelis have been critical of their prime minister’s decision to rely primarily on the air force to destroy Hezbollah and are now deeply worried about the casualty count which is bound to mount as Israel pursues a land offensive with the ostensible purpose of driving Hezbollah out of the approximately 15-mile depth that lies between the Lebanese Israeli border and the Litani river.
Some Muslim commentators have expressed their apprehension that Israeli aggression is aimed not merely at the destruction of Hezbollah’s military potential but at the reoccupation of southern Lebanon at least up to the Litani river. Farfetched this may well be but it is indicative of the deep distrust of Israeli and US motives among the people of the region.
Meanwhile, the Israeli people are also concerned about the damage - relatively light when compared to Lebanese losses - that Hezbollah rockets have inflicted on the morale of the Israeli people and on the image of invincibility that the Israelis had acquired after their lightning fast victories in earlier wars with their Arab neighbours. The killing of 12 Israeli army reservists, who were due to move into Lebanon, just south of the Israeli-Lebanese border at the village of Kifr Giladi has intensified such concerns and prompted an intensification of Israeli air attacks.
In the light of these ground realities Prime Minister Olmert’s claims of having crippled Hezbollah sound almost as bombastic as the claims Arab leaders used to make during their losing wars against Israel. This early and remarkable success on the part of Hezbollah, and the folk hero status its leader Sheikh Nasrallah has acquired in an Arab world sadly bereft of heroic figures, must not, however, blind us to reality.
It is inevitable, given the overwhelming Israeli military superiority and the unending chain of supplies from the US on the one hand, and the cutting off of all supply routes for Hezbollah on the other, that the Israelis will be able to prevail if they are not reined in. What Hezbollah has achieved by denying Israel a quick victory is time — time to allow the resentment and hatred in the Muslim world to build, time for Israel’s supporters in Washington and elsewhere to be questioned about the destruction they are wreaking and the consequences for ties between the West and the Arab and Muslim worlds, time for isolating Israel’s supporters and putting them before the bar of international public opinion. What should be the effect of this?
Olmert, whose disproportionate reaction was owed, in my view, almost entirely to his desire to be seen as a worthy successor to Ariel Sharon, will not be influenced by the international outrage. He believes that even after the recent erosion the support his present posture enjoys in Israel is overwhelming. In his view, friendly or even normal relations with Israel’s Arab neighbours are a distant dream. Israel can and must impose its own “peace” on these neighbours and be prepared to defend it with its military might. If this leads to turbulence and instability in the region so be it since it will only enhance in American eyes the value of the alliance with stable and democratic Israel.
It is only the Americans, pushed ever so gently by the Europeans and an ever more beleaguered Prime Minister Tony Blair, who can rein him in and they have good reason for doing so.
If Israel is allowed to continue, Lebanon will be destroyed along with Hezbollah’s arsenal but Hezbollah, as a movement will live on. Despite the current display of Arab solidarity the deep and chronic fissures in Lebanon exacerbated by economic hardship will reemerge and a new phase of Lebanon’s civil war of the 1970s and 1980s will commence. The Cedar Revolution of which the Americans were the most fervent proponents if not sponsors will wither. Freeing Lebanon from foreign influence will remain an elusive goal.
Lebanon will not be the only country in which Hezbollah will find fresh adherents nor will the Shias be the only recruits. If Al Qaeda chooses to recruit it will run out of enrollment forms but even more ominously other Al Qaeda-like organisations will sprout all over the Arab and Muslim world. Terrorist attacks, with Muslim countries as the first victims, will also spread to the West. Muslims settled or born in Europe and the US will be viewed with increasing suspicion even if they maintain a low profile and offer no more than oral sympathy to their coreligionists and kinfolk in the Middle East. Analysts and scholars will find it increasingly difficult to maintain in the West a distinction between the “radical Islamists” and the “moderates” who reflect the true spirit of Islam.
The incipient civil war in Iraq may turn into a full-fledged confrontation with the occupation forces. Already it appears to me that the demonstrations in Baghdad, larger than those in any other Arab country have caused misgivings and will, in all likelihood, strain relations between the Americans and the Shia alliance. The rejection of demands made when Prime Minister Nouri al-Maliki visited Washington for a condemnation of Hezbollah has apparently had an impact on Congress where Israel’s supporters abound.
In these circumstances it is perhaps time for the Bush administration to look again at the Security Council resolution they have virtually coerced the French into accepting and which calls for a cessation of hostilities but permits the Israelis to continue to occupy the Lebanese region into which they have moved. According to the latest reports the Arab League ministers are sending, after their meeting in Beirut, a special delegation to the UN to ask that the resolution be brought in line with the seven-point proposal made by Lebanese Prime Minister Fouad Siniora and approved by the Lebanese cabinet of which Hezbollah is a part.
Currently, the American president maintains that a ceasefire resolution would not address the root problem which he identified as being the “ability of Hezbollah to operate as “a state within a state” and to establish an armed presence in southern Lebanon while receiving arms from foreign sponsors, notably Iran and Syria. The Lebanese proposal that the Israelis withdraw completely from Lebanese territory and be replaced in that area by the Lebanese army backed by the 2,000 strong UNIFIL force currently in Lebanon seems to meet the American demand. The Lebanese are not opposed to the subsequent introduction of a robust international peacekeeping force but argue rightly that the vacating of Lebanese territory must not be made dependent on the induction of such a force which will take time.
The Lebanese have also demanded the return of the Shebaa Farms. The Israelis argue that the area belongs to Syria and presumably that its return would be part of the peace settlement with Syria. They dismiss as cartographic manipulation the Syrian assertion that the area is part of Lebanon. The Lebanese argument is that since the Syrians and Lebanese are both agreed that this is Lebanese territory Israel should hand it over and thus remove the rationale for Hezbollah retaining a militia that could strive for the restoration of Lebanese sovereignty over Israeli-occupied Lebanese territory. This is not a fundamental issue and could be dealt with in the second resolution which would also deal with the question of the overall Arab-Israel relationship. The question of the exchange of prisoners could also be left to the second resolution.
The Israelis should certainly be required, as a matter of humanitarian law, to provide the Lebanese with the maps of the minefields that they laid in Lebanon during the long years of occupation. It is legally mandatory for Israel to do so but in the present circumstances it is also the sort of gesture that could at least in small measure mitigate the impact of the damage Israel has done.
The Americans have to see that the Hezbollah’s move away from being a military force has been made more difficult by recent events and by the elevated status that Hezbollah now enjoys in Lebanon and the Arab world. Hezbollah, however, is also aware that after the dust settles those who praise it for restoring Arab pride will also blame it for providing the excuse Israel needed to wreak havoc on Lebanon. It will have to tread a fine line and that it is already doing so by endorsing Prime Minister Siniora’s efforts to get an agreement on a resolution that will ultimately lead to the disarming of Hezbollah.
The Americans can tell the Israelis that they risk little in agreeing to this proposal. The Israelis have the force to be able to reoccupy Lebanon if the implementation of the agreement falters or if Hezbollah’s conversion into a purely political force does not occur.
In an election year and with his band of dedicated neo-conservative advisers President Bush may find this a difficult decision to make but it is the only one that can save the region and the world from further destruction turmoil and instability.
The writer is a former foreign secretary.
Progress of library science
By Zubeida Mustafa
TOMORROW is the 50th anniversary of the founding of the Library and Information Science Department of the University of Karachi. It was on August 10, 1956, that the department launched its post-graduate diploma programme – the first degree level course for librarians in Pakistan.
A programme in librarianship had been started in Lahore by Asa Don Dickenson, a student of the famous Melvil Dewey in 1915, but it was a certificate course. In 1957, the diploma programme was converted into a degree and a Master’s course. Nearly 3,143 students have graduated from the department in the last 50 years. Its faculty has grown from seven members – many of them part time – under the founding chairman Abdul Moid to nine full time staff members today.
Being the first in the field, the Karachi University’s library science department naturally has enjoyed a preeminence in the country. Now other universities also teach this subject, so aptly termed as the “final science” by John Barth. But strangely enough, the others were late in following suit. The Sindh University was the next one to launch a Master’s programme in library science in 1976 followed by Punjab University in 1979, Peshawar and Balochistan universities in 1983, and the Islamia University in Bahawalpur in 1985.
The most important contribution of the department in Karachi university is that it has raised the status of librarianship in the country. With legendary figures such as Dr Anis Khurshid associated with it, the department rose to great heights. Dr Khurshid was a devoted teacher, a committed researcher and a prolific writer. He conducted a number of surveys of libraries in the country and was instrumental in drafting a library law which, unfortunately, has not been adopted by any government so far. Even in his retirement he is a source of inspiration to other librarians in the country.
Thanks to his efforts, the librarian’s profession achieved a dignity and status which was until then non-existent in a country that sadly lacks a book culture. Although the reading habit has not quite caught on, there are pockets of avid readers all over the country. They might be students borrowing books from the school/college/university library, office workers visiting one of the few public libraries we have or housewives shopping for low cost publications in bookstores and supermarkets. They constitute a small but vocal band of readership that ardently supports the institution of libraries and librarianship.
These readers are like islands of scholarship in an ocean of ignorance and apathy towards learning. But good and committed librarians are not unheard of. The few that are there serve as catalysts in promoting the reading habit. Gone are the days when a librarian was just a keeper of books who organised them on the shelves after indexing and cataloguing them. Today, the librarian is basically an information scientist who, in the words of Moinuddin Khan, another ardent champion of the library movement in the country, regards his/her primary duty to help people gain access to information. The librarian’s expertise lies in his knowledge about precisely where a particular piece of information is available and how it can be reached. While performing this function she/he becomes a specialist on diverse sources of information, and in the process, becomes very knowledgeable her/himself.
Small wonder so many librarians have gone on to acquire a higher degree in a field of their interest. Of course, they do not relinquish the basic expertise they have gained in handling books and information. But they also learn about the subject on which they are digging up information. They are the true transmitters of knowledge and have come to be respected in their role. According to Moinuddin Khan, a library can become instrumental in spreading literacy and education. Today, a librarian in a government organisation can go up to NBPS-20 which is equivalent to the deputy secretary’s post. The director general of the national library is a grade 21 officer.
This recognition, though not adequate enough, has come to a great extent because the Library and Information Science Department at the Karachi University has, unlike many other departments at the same institution, kept pace with the growing and diverse need for information and the increasingly multiple sources of knowledge. It has played a pioneering role in introducing the latest technologies and methodologies in the field in Pakistan. Thus in 1983 the library science department became the Library and Information Science department and information science courses were added. Then came the computer age and courses on information storage and retrieval, data processing in libraries and information networks data bank were made compulsory. A computer laboratory was established in 1985.
It is a pity that with this wealth of training and know-how available here Pakistan still lacks a library movement. It has rightly been said that “we cannot have good libraries until we first have good librarians — properly educated, professionally recognised, and fairly rewarded”. Now good librarians are not so hard to find. But good libraries are. Malahat Kalim Sherwani, the head of the library and information science department at the Karachi University, feels that without a network of public libraries and a library in every school it is difficult to make this institution popular at every level. At the university, she and her colleagues have tried to inculcate this awareness in their students. But without the government’s cooperation and support it is not possible to create this chain of libraries. “We will never be able to fight illiteracy and ignorance if this apathy towards the library continues,” Malahat Sherwani says.
Given this official indifference, it is essential that librarians should become social activists for their cause in order to initiate a library movement in the country. The focus has so far been on conferences and workshops to create awareness about the importance of libraries as institutions of learning. Librarians have struggled hard to gain recognition of the importance of libraries as purveyors of information but something more than that is needed. The library and information science department should add a compulsory course on librarians as motivators.
Some of the best librarians I have known have succeeded in creating a desire in people for books. They know how to attract people to books and make readers out of them. A course on this would combine elements of psychology, sociology, inter-personal communication and the art of counselling to teach the librarian-to-be skills that a good teacher, psychologist and counsellor employs.
Although many librarians have this skill, not all of them have mastered it. Thus they do not always succeed in creating enthusiasm for reading a book. Who will they motivate? Of course, the students, children and readers who come there way. But most importantly, they need to motivate parents because the love for books becomes a lifelong thing when inculcated from the cradle.
This land is mine!
By Hafizur Rahman
ONE could say that the Mughals were back. Not in full force as rulers of the subcontinent but in the person of Mirza Zafar, a photographer of Peshawar who was determined to get back his patrimony from its usurpers. The usurpers in his case being the British government of India in the first instance, followed by its successor the government of Pakistan.
Earlier a similar “royal” in Lahore, Mirza Bashir Ahmed alias Nawab Sahib, had claimed sovereignty over the whole of Pakistan but was willing to be content with much less. He just wanted to be given the Mughal monuments in the city by virtue of his being the last living descendant of Emperor Bahadur Shah Zafar. Unlike him, the Peshawar man was not so ambitious. He claimed only a portion of the cantonment, including the railway station, saying that the land had been granted as jagir to his ancestors by Emperor Akbar. He even went to court on this, though I couldn’t keep up with the proceedings.
These were personal foibles and the two were dismissed by public opinion as crackpots. Also one does not know the psychological or other reasons that impelled them to air their claims in the press.
While the Peshawar photographer could have become a billionaire if his claim had been accepted, what would Nawab Sahib have done with Lahore’s Mughal monuments? Become rish by restricting entry into them by tickets?
These are questions that have agitated mankind for ages and in modern times are echoed by racial claims to land based on ancient history, and even legend. The are cries all over the world, saying, “This land is ours!”.
The question is — if it is valid at all in these times — who was the original owner, and of what part, of the globe? For instance, the USA aggressively supports the right of the Jews to Israel just because they once lived there some 2,000 years ago, but is not willing to concede the same right to its Red Indians who were masters of the country only 300 years ago. Apparently the older a claim the more valid it is in American eyes.
Chauvinistic Hindus in India, who label Muslims as alien conquerors and want them to go back where they came from, forget that, as ryans, they too had been intruders and marauders and had driven the Dravidians, the original inhabitants of Northern India, to the South. After that they set up in UP and Delhi the mythical utopia described so eloquently in the Ramayana as Ram Raj. On principle they should all go back to Central Asia and the Russian teppes from where they rode out to invade this land.
Imagine, if like Mirza Zafar, the Hindus were to adopt legal means and file a petition with the International Court of Justice in The Hague that all the rich and prosperous republics of Central Asia, now peopled mostly by Muslims, should be handed over to them since they were the original inhabitants of that vast region; what would happen? Probably nothing.
Only the world would laugh, and if the Court possesses a sense of humour besides a sense of justice, it would ask them why they had left their homes in Central Asia in the first place. Who and what made them do that?
The move of the Indian Hindus would be in keeping with the prevailing accusation of smaller states in South Asia that India was becoming hegemonic day by day. Maybe they will make such a move only after they have assured their neighbours like Nepal and Pakistan that their welfare lies in existing submissively as satellites of the great Hindu empire. By the way, can anyone explain why India is unable to live in peace and goodwill with Nepal which is the only other Hindu country in the world?
Shall we them see a mass exodus from over-populated India to the beautiful and fertile valleys of Central Asia? But before that happens the Hindus of Northern India may well be confronted by a demand from the even more over-populated South that its people — originally and racially Dravidians — were anxious to move northwards and reoccupay the great cities of UP. They may have become bored with living for centuries in the hot and humid South and think that a change of scene and climate would be good for their health and colouring.
Allowing for wholesale shifts in population, where will the people of Central India go if the original Aryans decide to return to their homeland? Frankly, I don’t know because my knowledge of ancient history ends here. I can only suggest that they should move to the vast open spaces of Siberia. It may be somewhar cold out there but what is a little discomfort for the sake of historical adjustment?
There will be a problem for the Muslims of Pakistan. Should they too move or should they stay put? You must have noticed that no educated Pakistani worth his salt, and even the uneducated Pakistani, admits to local ancestory. The same goes for the Muslims of India. Everyone of us is born of forebears who came from Bukhara or Ispahan, Istanbul or Makkah. Our surnames make that very evident. There are more Qureshis in the subcontinent than Muslims in Arabia.
Would we like to go back to those sacred haunts if promised corner plots there? Or is this foreign ancestory flaunted by us merely to acquire a superior distinction? None of us wants to admit that we are the children of converts and thus originally Hindus, or even Achhuts, untouchables. If this absurd claim on our part is recognized that we all came from abroad then the question arises — where did all the Hindus of this vast area go? None of us wants to be asked to answer this question and face the truth about ourselves.
Actually, what do all these claims amount to? Someone or other will always turn up and shout, “This land is mine!” Therefore it is better and wiser to to try yo make good wherever we are instead of setting up sights on free property. We should learn to be content with what we have and respect the rights of our neighbours. That goes for both Mirza Zafar and Nawab Sahib and the expansionist Hindus of India.
Unbalanced progress
THE United States wanted a suspension of fighting and France wanted a ceasefire — but perhaps the best that can be hoped for is a standoff. On Sunday, though, even that looked unlikely as Israel suffered its worst losses to date, with rocket attacks killing at least 15 people.
Similar numbers died in Lebanon, as Israel continued a campaign of bombardment that has displaced hundreds of thousands from their homes, laid waste to essential infrastructure and killed hundreds of civilians. In another part of the forest, the conflict with the Palestinians — which Tony Blair for one has linked to the Lebanon war — stepped up a gear when Israel arrested their parliament’s speaker, Aziz Dweik.
The dire news on the ground emerged just hours after the US and France agreed a draft UN resolution calling for the violence to stop, giving an apparent glimmer of hope. It could be adopted by the Security Council as soon as today. Not least among the ironies of this tragedy has been the emergence of France as a bridge between the US and much of the rest of the world. It was a role Tony Blair once hoped to take.
But in practice, even without Sunday’s tragedies, the details fell short of what is likely to be needed to achieve peace, even though the draft resolution does inch things forward. It calls for a “cessation” of hostilities, rather than a mere “suspension”. And the resolution avoids making the ceasefire conditional on an international force being assembled, as Israel had demanded. France prevailed on the US on these points by exploiting the leverage afforded by its willingness, in the right circumstances, to supply boots on the ground.
Sadly, though, on many issues the Israelis remain as intransigent as Hezbollah may prove, so it is still hard to see a ceasefire sticking. The lack of balance in the draft resolution poses further problems. Israel is called on only to end “offensive military actions”, but it claims the whole disproportionate campaign so far has been defensive.
The demand for the immediate release of Israeli soldiers, whose capture triggered the war, is not mirrored in respect of Lebanese prisoners held south of the border. Israel’s troops will be able to remain inside Lebanon for the immediate future — something Hezbollah is unlikely to accept — while Lebanese grievances, such as the occupation of Shebba Farms, are not addressed. |
This invention relates to a profiled plastics bag closure strip and an adhesive bonding method.
Releasable bags of plastics material are well-known. These bags include a bag forming substrate and closure strips along the mouth of the bag. Each closure strip has one of a cooperating pair of male and female profiled closure elements. The principal method of making such material has been to extrude a tube which includes the substrate and integral closure strips and then to flatten the tube and to cut and weld in various directions so as to form the individual bags. In more recent times there have been developments directed towards the use of an adhesive for bonding independently extruded closure strips to a substrate. G.B. Pat. No. 1546433 describes a general method for the adhesive bonding of a closure strip to a substrate
In the adhesive bonding method a relatively thick closure strip is bonded to a relatively thin substrate and where a hot melt type of adhsive is used a substantial quantity of heat is required in order to ensure that proper adhesion of the closure strip to the substrate is obtained. In technical terms it is necessary to ensure that there is sufficient heat to "wet out" the closure strip or at least that portion thereof which is subject to contact with the adhesive to form the bond.
In practice it has been found to be difficult to achieve a satisfactory bond between two thermo-plastic components such as a substrate and a closure strip. It is believed that this difficulty arises at least in part from one or more of the variables within the bonding method and the products and apparatus concerned. The adhesive applicator system tends to provide a varying output of bonding material. The speed with which the thermo-plastic components pass the adhesive applicator system varies. These two factors lead to a variation in the mass of adhesive per length of the substrate and closure strip. There can be variations in the pressures applied to the substrate and closure strip during bonding. There can be variations in the thickness of the profile structure due to variations inherent in an extrusion process. These two factors can result in a greater or lesser quantity of adhesive being squeezed out from between the two components or even in the two components failing to make adhering contact.
The present invention is predicated on the realisation that an important part of an adhesive bonding method concerning the components in question is to provide a given thickness of the adhesive material over at least a part of the contacting surfaces of the strip and the substrate. This thickness ensures, when a hot melt type of adhesive is used, that there is a suitable quantity of heat per unit area of the closure strip to ensure that "wet out" of the strip is obtained at least over that part of its surface area designed to make adhering contact with the substrate. |
Digital image processing, such as compression, transmission, browsing and communications is common in the art. Typically early methods of digital image transmission and storage used so-called Pulse Code Modulation (PCM). More recent systems use more complicated digital compression techniques.
Digital compression techniques according to the state of the art are based on transform coding. One such compression technique is the JPEG format as standardized by the Joint Photographic Experts Group according to the standards ITU-T T.81, ISO/IEC IS 10918-land ITU-T T.84, see inter alia “The JPEG Handbook”, by W. Pennebaker, J. Mitchell, Van Nostrand Reinhold, 1993.
It is also common to post-process compressed images. Post-processing may involve applying filters, changing the image format, etc. Post-processing may also involve scaling the compressed image to fit a small screen, and then zooming and panning the scaled image. One product for post-processing compressed images is the PhotoShop software suite provided by Adobe Systems Incorporated of USA. |
"Chobirico. Jam Institute" - Making jam out of radishes, eggplants, and onions?!?
Choosing ingredients, making jam, packaging, making soda, and running a cafe. All these jobs are completed at Chobirico. Jam Institute by one person, Ms. Sugawara.
The name "Chobirico. Jam Institute" may seem a bit strange to a newcomer, but you’ll soon find out that "Chobirico" is actually Keiko Sugawara's (owner), nickname. Now why the period after Chobirico? It seems that the owner was told by a fortune teller that putting a period in the shop name would bring the shop good fortune and many visitors.
"I used to work in a building in Iwamizawa. But three years ago I rented this old house. With the help of friends we remodeled, and the whole business has moved here." says Ms. Sugawara.
Originally, jam making was just a hobby for Ms. Sugawara, but after buying too many radishes one day, a thought struck her. "If you can make pickled radish by adding salt, can you make radish jam by adding sugar?" After trying her idea out, she realized it wasn't quite that simple. She didn't give up, however, and began to experiment. She added apples and other ingredients to the mix until she found a radish jam that tasted great. Then, she moved on to onion and eggplant jams. Confident in her product she published her results in a blog and soon gained an audience. From these humble beginnings she opened up the "Chobirico. Jam Institute.”
"I think Hokkaido vegetables are really delicious. So if I can make a jam out of radish or zucchini that helps even one person truly appreciate the taste of Hokkaido veggies, I'm really happy."
The main ingredient of each jam is Hokkaido vegetables. Then Hokkaido fruits are added to adjust the flavor. The granulated sugar used is made from Hokkaido beets, with no unnecessary additives added throughout the process. The vegetables used vary depending on the season, but "Radish and Apple," "Onion and Strawberry," and "Onion and Raspberry" jams are available all year.
The "Jam Shop Original Soda" is a carbonated drink made with a jam base. Tastes great on hot summer days, and in winter it can be enjoyed as a hot beverage.
While I was at the shop writing this article, several visitors came in to eat. The shop was just featured on FM radio, so many newcomers stopped by. This child and his mother came in for a bite and I asked them what drew them to the store. The mother answered "In a shop like this, my son and I can eat knowing that the jams are healthy and the products are all safe."
Because jams are made with preservatives, jams bought here can be safely stored for up to one year. However, the color of the jam will degrade over time. Ms. Sugawara told us "If it's possible, I want each customer to eat the freshest, and most delicious, product possible. So if you buy jam to take home, be sure to buy smaller sizes to get the best flavor."
The cafe portion is only open on Fridays and Saturdays, but you can pick up jams at the shop. For more distant costumers, mail order is another way to get your hands on some delicious jam. Be sure to try these unique and tasty jams for yourself! |
Comment An academic who promised several years ago to use a new form of mass hypnosis to get the public motivated to fight climate change claims that he's done it. In fact the claim is bogus: it is itself part of his attempt to carry out his plan of manipulating public opinion.
The academicis, as regular readers of these pages will have guessed, Professor Nick Pidgeon of Cardiff uni. Several years ago, the prof (a specialist in "social and decision sciences") stated publicly that he and his fellow soft-studies academics should develop a new method of manipulating public opinion, one that would work better than normal advertising or propaganda. This new and more powerful discipline of mass hypnosis should be used to condition the public into a state where they would support drastic action against the perceived dangers of man-made climate change.
At the time, we compared Pidgeon's proposed new methods to Isaac Asimov's science-fictional discipline of "psychohistory", a set of methods which could be used to manipulate the behaviour of large populations without their knowledge.
Pidgeon wrote then that the key was to arouse the right emotions in the public:
Emotion is an integral part of our thinking ... Emotion creates the abiding commitments needed to sustain action on difficult problems, such as climate change ... appropriately framed emotional appeals can motivate action, given the right supporting conditions (in particular a sense of personal vulnerability ... and [a sense of] the support of others).
(Our italics.)
Obviously when you want to give people the feeling that they are personally vulnerable to climate change it would make sense to point to some natural disaster such as the 2013/14 floods and suggest that they were caused by climate change, and that there will be more of this as a result of climate change. If you want to suggest that there is strong support from other people for action on climate change, it would be a cunning plan to tell them that other people overwhelmingly support such action.
Funnily enough, Professor Pidgeon has done just those things. In a press release issued today, he says:
The British public’s belief in the reality of climate change and its human causes rose significantly last year - and is now at its highest since 2005 ... In December 2013 and January 2014, an exceptional run of winter storms hit the UK, leading to widespread flooding ... such extremes of weather are predicted to be more frequent and severe in the UK under a changed climate ... The flooding events were seen as a sign of things to come ... Regarding support for political action, around three-quarters (74 per cent) of people surveyed in the national sample supported the UK signing up to international agreements to limit carbon emissions, with only 7 per cent opposing this measure ... This finding above all sends a clear signal to the UK government.
In summary: you are personally vulnerable to climate change and there is strong support for others for action against it (that is against carbon emissions).
But hold on - Professor Pidgeon didn't just say those things. They are the result of "research" in the "social and decision sciences". Specifically, they are the result of a massive survey of what the British people think carried out by Ipsos MORI, which the prof got the government (ie, you) to pay for.
It's just an amazing bit of luck for the prof, then, that the survey said exactly what he had specified it should say several years previously.
Oh wait, no it isn't. Because actually it doesn't really back up his message at all. Skipping over Pidgeon's waffley advertorial propaganda "research paper" (it's not a peer-reviewed publication or anything, just a lengthy pseudoscientific polemic written by the prof and some pals*) to the actual survey results, we find out the following things. |
Q:
What does Diagnostic-Code: SMTP; 573 mean?
I am using sendmail to send mail from my Rails application. But, there seems to be a error happening while sending mails to a specific user domain. The error from /var/mail/*** is as follows:
Date: Tue, 11 Oct 2011 16:33:46 GMT
From: Mail Delivery Subsystem <MAILER-DAEMON@*****>
Message-Id: <201110111633.p9BGXkpR010310@******>
To: <****@*****>
MIME-Version: 1.0
Content-Type: multipart/report; report-type=delivery-status;
boundary="p9BGXkpR010310.1318350826/******"
Subject: Returned mail: see transcript for details
Auto-Submitted: auto-generated (failure)
This is a MIME-encapsulated message
--p9BGXkpR010310.1318350826/*******
The original message was received at Tue, 11 Oct 2011 16:33:42 GMT
from localhost [127.0.0.1]
----- The following addresses had permanent fatal errors -----
<****@{domain}.com>
(reason: 573 ********@****** failed to route the address)
<*****@{domain}.com>
(reason: 573 *******@****** failed to route the address)
<*****@{domain}.com>
(reason: 573 *******@******* failed to route the address)
----- Transcript of session follows -----
... while talking to *********.com.1.0001.arsmtp.com.:
>>> MAIL From:<*******@*******> SIZE=1273
<<< 573 ********@********* failed to route the address
554 5.0.0 Service unavailable
--p9BGXkpR010310.1318350826/*******
Content-Type: message/delivery-status
Reporting-MTA: dns; StreetSense
Received-From-MTA: DNS; localhost
Arrival-Date: Tue, 11 Oct 2011 16:33:42 GMT
Final-Recipient: RFC822; ****@*******.com
Action: failed
Status: 5.0.0
Diagnostic-Code: SMTP; 573 *******@******* failed to route the address
Last-Attempt-Date: Tue, 11 Oct 2011 16:33:46 GMT
Final-Recipient: RFC822; *******@********.com
Action: failed
Status: 5.0.0
Diagnostic-Code: SMTP; 573 *******@******** failed to route the address
Last-Attempt-Date: Tue, 11 Oct 2011 16:33:46 GMT
Final-Recipient: RFC822; ******@*********.com
Action: failed
Status: 5.0.0
Diagnostic-Code: SMTP; 573 *****@******** failed to route the address
Last-Attempt-Date: Tue, 11 Oct 2011 16:33:46 GMT
The bounced back emails are all from the same domain, and mails are being successfully sent to other domains. When I looked for SMTP 573 diagnostic codes, I got this "573 Internal server error, IP address related.". But I dont know what it means. Can anyone help me?
I ran these commands and I run it and got the following outputs:
# dig streetsense.com MX
; <<>> DiG 9.3.6-P1-RedHat-9.3.6-16.P1.el5 <<>> xxxxx.com MX
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61139
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 4, ADDITIONAL: 4
;; QUESTION SECTION:
;xxxxx.com. IN MX
;; ANSWER SECTION:
xxxxx.com. 3600 IN MX 10 xxxxx.com.1.0001.arsmtp.com.
xxxxxx.com. 3600 IN MX 20 xxxxx.com.2.0001.arsmtp.com.
;; AUTHORITY SECTION:
xxxxx.com. 155394 IN NS ns04.ntiva.net.
xxxxx.com. 155394 IN NS ns01.ntiva.net.
xxxxx.com. 155394 IN NS ns02.ntiva.net.
xxxxx.com. 155394 IN NS ns03.ntiva.net.
;; ADDITIONAL SECTION:
ns01.ntiva.net. 147 IN A xxx.xx.xx.xxx
ns02.ntiva.net. 147 IN A xxx.xx.xx.xxx
ns03.ntiva.net. 147 IN A xxx.xx.xx.xxx
ns04.ntiva.net. 147 IN A xxx.xx.xx.xxx
;; Query time: 45 msec
;; SERVER: xxx.xxx.x.x#xx(xxx.xxx.x.x)
;; WHEN: Tue Oct 11 18:08:23 2011
;; MSG SIZE rcvd: 262
ping also seem to be working:
# ping xxxxxxx.com
PING xxxxxxxx.com (xxx.xx.xx.xx) xx(xx) bytes of data.
64 bytes from linux06.ntiva.com (xxx.xx.xx.xx): icmp_seq=1 ttl=53 time=29.0 ms
64 bytes from linux06.ntiva.com (xxx.xx.xx.xx): icmp_seq=2 ttl=53 time=27.4 ms
64 bytes from linux06.ntiva.com (xxx.xx.xx.xx): icmp_seq=3 ttl=53 time=27.4 ms
64 bytes from linux06.ntiva.com (xxx.xx.xx.xx): icmp_seq=4 ttl=53 time=27.4 ms
Can anyone help me to find the issue?
A:
It means the server encountered an error internally in it's processing that is somehow related to your IP address. Ping is irrelevant - as is what you ate for breakfast. Obviously - the message was not delivered to the server.
Could be a way to tell you to get lost (as in: IP address blacklisted for some reason). Could be a failure to do anything - that will be visible on some error log on the server. Not your problem unless you (a) suspect you are blacklisted or (b) are the server operator so you can check and fix.
|
Comedian Marcus Brigstocke and presenter Clive Anderson get chatting in the tag-team talk show where this week's guest is next week's interviewer. From January 2007. |
feelings
I spent time Monday and Tuesday of this week reading When Sophie Gets Angry — Really, Really Angry in my youngest childrens’ classrooms as part of Project Cornerstone, a program in Silicon Valley committed to helping children and teens feel…
Today’s food for thought is an example of putting into practice Real Life Skill #2: Experience your emotions and direct your feelings. I was standing in my husband’s office, looking at his pictures. The feeling unexpectedly swept in — a…
Following the post on Real Life Skill #2 (Experience your emotions and direct your feelings), let’s look at applying this in daily life. (Because if we don’t deal with our emotions and feelings, they will deal with us, coming out…
We previously talked about Real Life Skill #1 (Get head (and heart) in line with knowing life is messy — for everyone) and applying it in our day-to-day. Today, let’s talk about another real life skill. Real Life Skill #2:…
Thoughts for a day when you or your teen are feeling off: If you’re feeling messy, unsure, afraid, irritable, angry, sad, or anything that seems like a “bad” feeling*, it’s totally okay. Absolutely, totally, completely okay. All emotions and feelings are…
Today’s food for thought is a selection of recent ponderings: -Danielle LaPorte’s Truthbomb: “So much is a cry for love.” -Jill Bolte Taylor’s TED talk: My stroke of insight -What if: What if so much IS a cry for love?…
Thought for today for us as adults, as well as our teens (they learn a lot by what we do or don’t do!): On a place to begin dealing with pain (and everyone experiences pain sometimes), start with feeling…
Today’s thought for consideration is on a piece of cheesy advice (courtesy of The Little Engine That Could movie): If you think you can, you can. If you think you can’t, you can’t. Either way, you’re right. This isn’t about simply…
I ponder regularly on feelings. I used to shove down most emotions and feelings (nope, can’t feel that!). I keep learning that emotions and feelings (and actually letting myself experience them!) are mission critical to actually thriving. We all have them… |
Development Philosophy
The Kenya Development Philosophy
Communities in developing countries are the underprivileged. In Sub-Saharan Africa, more than 80% of the populations depend on rain-fed agriculture. In Kenya 70% of the people live in rural areas where they work on farms to generate food and income.
Their lives are characterized by:
Diminishing land sizes
Diminishing financial capacity to purchase chemical farm inputs
Diminishing ability to establish farm mechanization.
Declining soil fertility and energy sources
Reducing ability to determine prices for their agricultural produce.
Reduced ability to irrigate farms.
Reduced ability to influence policies that control their rural development.
On the other hand;
Increasing family and population sizes.
Increasing prices for rural development goods and services.
The end result of the scenario analyzed above is a people who are disempowered. SACDEP believe that people are not necessarily poor, their status are as a result of poor development strategies.
These strategies are perpetuated by a biased elitist minority mostly guided by academic and foreign thinking.
Therefore, SACDEP SAYS “give people an opportunity to develop themselves and you will be surprised at what they can do for themselves.”
About
Print this page to PDF for the complete set of vectors. Or to use on the desktop, install FontAwesome.otf, set it as the font in your application. |
Introduction {#Sec1}
============
Renal cancer is common cancer, and the incidence rates in males and females are 5% and 3%, respectively^[@CR1]^. Clear cell renal cell carcinoma (ccRCC) accounts for 70--80% of renal cancer, which is the most representative subtype, and the incidence rate increased year by year. Compared with other cancers, kidney cancer-related clinical symptoms and biomarkers are less, so early diagnosis is difficult. Moreover, ccRCC has poor responses to conventional chemotherapy and radiation therapy, leading to a low 5-year survival rate of advanced patients, which is only 10--20%^[@CR2],[@CR3]^. Nowadays, VEGF tyrosine kinase inhibitor monotherapy had been one type of standard therapy. Moreover, with the advances in immunotherapy and the more newly discovered therapeutic target, a combination of the immunotherapy and the targeted therapies could be the next standard of treatment^[@CR4]^. Therefore, it is especially necessary to explore the internal mechanism of ccRCC to find some new therapeutic targets.
Circular RNA (circRNA), derived from the exon or intron region of a gene, is a particular type of non-coding RNA molecule that is different from linear RNA. Compared with linear RNA structure, circRNA has no 5′--3′ polarity and no polyA tail, making it a closed circular structure. Therefore, it is more stable than linear RNA, and it is not easily degraded by RNA exonuclease or RNase^[@CR5]^. CircRNAs' function can generalize as below (1) miRNA can regulate the post-transcriptional expression of target genes, and circRNA can act as a competing endogenous RNA (ceRNA) to bind to miRNA like a sponge to regulate the function of miRNA, thus indirectly regulating the expression of genes (2) It can affect gene expression through interacting with RNA binding protein and modulating the stability of mRNAs (3) It also can function as protein scaffolds and encode functional proteins in some cancer cells lines^[@CR6]--[@CR9]^. Recently, some studies have demonstrated that circRNA not only acts as a molecular marker but can also participate in cancer proliferation and invasion by regulating miRNA in colorectal cancer, lung cancer, and bladder cancer^[@CR10]^.
In this study, some novel circRNAs may act as ceRNA to regulate gene expression in ccRCC, and their potential mechanisms have been investigated by utilizing gene chip and bioinformatics methods. The process digraph is showed in Fig. [1](#Fig1){ref-type="fig"}: Firstly, circRNAs related microarray datasets of ccRCC were obtained from GEO database, and differential expressed circRNAs (DECs) were also acquired. Then, to demonstrate whether the DECs function as ceRNAs in ccRCC, their related miRNAs and miRNA target genes have been collected, and a circRNA/miRNA/mRNA network also has been constructed. Furthermore, a protein--protein interaction (PPI) network was successfully built, and the hub-genes were also obtained. Functional enrichment and pathway enrichment analyses were performed to reveal the potential pathogenesis of ccRCC. Furthermore, connectivity map (CMap) analysis and pharmacogenomics analysis were conducted to predict bio-active compounds and potential drugs for the treatment of ccRCC, which may provide a new method in the latent therapeutic capacity of circRNAs in ccRCC.Figure 1Flowchart of this study about constructing a circRNA/miRNA/mRNA network and predicting some potential therapeutic options of ccRCC.
Methods {#Sec2}
=======
Data obtained and DECs acquired {#Sec3}
-------------------------------
Gene Expression Synthesis (GEO, <https://www.ncbi.nlm.nih.gov/geo/>) is a public functional genomic database that allows users to query, locate, review and download research, and gene expression profiles^[@CR11]^. Microarray datasets that provide circRNA expression profile data in clear cell renal cell carcinoma (ccRCC) were acquired from the GEO database. All raw expression data were normalized and log2-transformed. Then Limma, a Bioconductor package in R, was applied for differential analysis of microarray data, to determine DECs in microarray dataset with the criteria of \|log2 (fold change)\|\> 2 and *P* value \< 0.05^[@CR12]^.
Prediction of MREs {#Sec4}
------------------
Cancer-specific circRNA database (CSCD, <https://gb.whu.edu.cn/CSCD>) was constructed to understand the functional effects of circRNAs, through predicting the miRNA response element (MRE) sites and RNA binding protein (RBP) sites for each circRNA^[@CR13]^. Circular RNA Interactome (CircInteractome) is also a web tool to map RNA-binding proteins (RBP) and miRNA response element (MRE) sites on human circRNAs by searching some public databases of circRNA, miRNA, and RBP. It also provides bioinformatic analyses of binding sites on circRNAs, and additionally analysis of miRNA and RBP sites^[@CR14]^. DIANA-miRPath v3.0 (<https://www.microrna.gr/miRPathv3>) is an online software that is committed to assessing miRNAs regulatory roles and forecasting the related regulation pathways^[@CR15]^. The miRNA response elements (MREs), of those selected DECs, were predicted with these two web tools, CSCD and CircInteractome. Overlapped miRNAs of the two algorithms were predicted as potential target miRNAs of the DECs. DIANA-miRPath also predicted these overlapped miRNA\'s functions. Then these overlapped miRNAs were selected for further mRNA predictions.
Forecasting of miRNA targeted genes {#Sec5}
-----------------------------------
MiRWalk 2.0 is a web tool to predict miRNA--mRNA interactions. It involves 12 predicted algorithms (miRWalk, Microt4, mirbridge Targetscan, RNAhybrid, RNA22, PITA, Pictar2, miRNAMap, miRDB, miRanda and miRMap) to ensure the correctness of forecast results^[@CR16]^. Then targeted genes forecasted by at least seven algorithms were selected to overlapped with differentially expressed genes (DEGs) in ccRCC from TCGA database.
Collecting DEGs of ccRCC and obtaining the overlapped genes {#Sec6}
-----------------------------------------------------------
The Cancer Genome Atlas (TCGA) is a public database that demonstrated major cancer related genomic alterations. Differentially expressed genes (DEGs) were determined by the edgeR package in Bioconductor with the screening criteria of \|log2 (fold change)\|\> 2 and FDR \< 0.05^[@CR17]^.Then the overlapped genes between the predicted miRNA target genes and the DEGs were obtained through the Venn diagram.
Functional enrichment analysis of overlapped genes {#Sec7}
--------------------------------------------------
The database for annotation, visualization, and integrated discovery (DAVID V6.8, <https://david.abcc.ncifcrf.gov/>) is a freely accessed web-based online bioinformatics resource that provides tools for the functional interpretation of large lists of genes/proteins^[@CR18]^. It was used to perform Gene Ontology (GO) analysis and Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway enrichment analysis about the overlapped genes with a setting *P* \< 0.05 and counts \> 2.
Establishment of PPI network and identification of hub-genes {#Sec8}
------------------------------------------------------------
The Search Tool for the Retrieval of Interacting Genes database (STRING) provides credible information on interactions between proteins and supplies detailed annotation^[@CR19]^. In this study, the interactions between proteins, which has a combined score \> 0.7, was considered as a statistically significant interaction. Then, a PPI network of the overlapped genes was constructed by the STRING (version 11). Cytoscape is a general-purpose, open-source software environment for the broad integration of molecular interaction network data. In molecular and biology fields, it can load molecular and genetic interaction data, integrate global datasets and functional annotations, establish powerful visual mappings across these data. A wide variety of Cytoscape Apps can enhance their capabilities^[@CR20]^. Molecular Complex Detection (MCODE) is an app of Cytoscape to find densely connected regions of a vast molecular interaction network (as PPI, protein--protein-interaction network) based on node-weighting arithmetic, effectively. So, PPI networks were drawn using Cytoscape (version 3.7.1) and essential modules consisting of hub-genes and several relatively essential modules in the PPI networks identified by MCODE with selected criteria as follows: degree cut-off = 2, node score cut-off = 0.2, Max depth = 100, and k-score = 2.
Overall survival (OS) analysis of the hub genes {#Sec9}
-----------------------------------------------
The Gene Expression Profiling Interactive Analysis (GEPIA) is a web-based tool to deliver fast and customize-able functionalities based on TCGA and GTEx data. It provides key interactive and customizable functions, including differential expression analysis, profiling plotting, correlation analysis, patient survival analysis^[@CR21]^. In this study, overall survival (OS) analysis was used to explore the influence on OS by differentially expressed hub-genes between ccRCC tissues and normal ones.
Construction of circRNA--miRNA--mRNA network {#Sec10}
--------------------------------------------
A circRNA--miRNA--mRNA regulatory network was constructed by using Cytoscape software to draw the regulatory network.
Connectivity Map (CMap) analysis {#Sec11}
--------------------------------
The Connectivity Map (CMap) is a gene expression profiling database and is great potential for discovering new therapeutic drugs for the disease. It is a database of biological applications in which gene expression is linked to disease, helping researchers quickly use data from gene expression profiles to compare small molecule compounds or drugs that are highly associated with disease^[@CR22]^. With the help of CMap, candidate compounds would be discovered to treat the ccRCC. Negatively related drugs (*P* \< 0.005 and connectivity score \< 0) for anti-ccRCC were screened. These compounds\' structures and some annotations were obtained from the website PubChem (<https://pubchem.ncbi.nlm.nih.gov>), which is an essential chemical information resource, containing 247.3 million substance descriptions, 96.5 million unique chemical structures and 237 million bioactivity test results from 1.25 million biological assays^[@CR23]^.
Pharmacogenomics analysis for hub genes {#Sec12}
=======================================
The Pharmacogenomics and Pharmacogenetics Knowledge Base (PharmGKB, <https://www.pharmgkb.org/>) is committed to Collecting and classifying information about how genetic variation affects drug response^[@CR24]^. It is a comprehensive resource for pharmacogenetics, including their variations, pharmacodynamic pathways and their effects on drug-related phenotypes^[@CR25]^. Furthermore, researchers can freely get this knowledge about potential worked drugs from this web. In this research, the network database was used to predict drugs that might act on hub-genes.
Results {#Sec13}
=======
Acquiring 6 DECs in clear cell renal cell carcinoma (ccRCC) {#Sec14}
-----------------------------------------------------------
In order to explore the potential function of circRNAs and construct the interaction network between circRNAs and miRNAs in ccRCC, DECs were confirmed at the first step. A microarray dataset GSE100186 was obtained from GEO database, which includes four clear cell renal cell carcinoma tissues and four matched non-tumor tissues. The gene chip was from the platform of Agilent-074301 Arraystar Human CircRNA microarray V2. By applying Limma package, a string of circRNAs was considered as significant difference points, and six circRNAs, which shows the most credible in different expression (*P* \< 0.0001 and LogFC \> 2), have been selected as research objects in this study as the volcano (Fig. [2](#Fig2){ref-type="fig"}a) showing. These six circRNAs' different expressions between 4 clear cell renal cell carcinoma tissues and 4 matched non-tumor tissues present as Fig. [2](#Fig2){ref-type="fig"}b. The basic characteristics of the 6 circRNAswere displayed in Table [1](#Tab1){ref-type="table"}.Figure 2Acquire DECs of ccRCC. (**a**) Volcano plots for DECs, the green points and red points represent up and down expressed circRNAs respectively. (**b**) A heatmap for 6 differentially expressed circRNAs we selected, the change in color represents the difference in expression.Table 1Basic characteristics of these 6 circRNAs.CircRNA IDAliasCircRNA typePositionStrandBest transcriptGene symbolRegulationhsa_circ_0039238hsa_circRNA_039238exonicChr16:47162235--47165936−NM_018092NETO2Uphsa_circ_0031594hsa_circRNA_101341exonicchr14:34398281--34400421−NM_022073EGLN3Uphsa_circ_0029340hsa_circRNA_101202exonicchr12:125292306--125294835−NM_005505SCARB1Uphsa_circ_0084927hsa_circRNA_104651exonicchr8:95676924--95677424+NM_017697ESRP1Downhsa_circ_0035442hsa_circRNA_101529exonicchr15:58284902--58287337−NM_001206897ALDH1A2Downhsa_circ_0025135hsa_circRNA_101001exonicchr12:6458115--6465046−NM_001159576SCNN1ADown
Identification of 6 circRNA--miRNA interactions {#Sec15}
-----------------------------------------------
Increasing evidence has demonstrated that some circRNAs play critical roles in tumors by functioning as "sponge" to trap miRNAs. So, some miRNAs, which are related to these six DECs we got, were predicted based on this ceRNA theory. The basic structural patterns of the 6 circRNAs were illustrated in Fig. [3](#Fig3){ref-type="fig"} which all have these structures of MRE, RBP and ORF. To explore whether all these 6 circRNAs had the function as ceRNA in ccRCC, two online databases, CSCD and CircInteractome, were used to collect and explore potential target miRNAs for them. A total of 6 circRNA--miRNA interactions, including hsa_circ_0029340-miR-1205/miR-657, hsa_circ_0025135-miR-587/miR-637 and hsa_circ_0039238-miR-1278/miR-548p, were identified. DIANA-miRPath was then used to probe the signaling pathways in that the 6 miRNAs may be involved. As shown in Fig. [4](#Fig4){ref-type="fig"}, these RNAs are involved in some pathways in the development of tumorigenesis.Figure 3Basic structures of the 6 circRNAs. The different colors in the outer and inner ring represent the different exons and the positions of MRE, RBP and ORF.Figure 4Significant signaling pathways about the 6 miRNAs by utilizing the DIANA-miRPath.
Obtaining the overlapped genes {#Sec16}
------------------------------
Six miRNAs linked with circRNAs had been obtained. To explore these miRNAs\' function in ccRCC, overlapped genes will be obtained in this work. RNA-sequencing (RNA-seq) data contained 349 clear cell renal cell carcinoma tissue samples and 49 normal controls that were obtained from the TCGA. Total 5828 DEGs in clear cell renal cell carcinoma showing in the Volcano (Fig. [5](#Fig5){ref-type="fig"}a), which were gained by running edgeR package. Moreover, 5287 target genes of the six miRNAs mentioned above were obtained by the miRWalk. Furthermore, 497 overlapped genes were identified by intersecting the miRNA targeted genes and DEGs from TCGA, as Fig. [5](#Fig5){ref-type="fig"}b showing.Figure 5(**a**) Volcano plots showing DEGs obtained from TACG dataset by utilizing edgeR package. (**b**) Venn graph showing the 497 overlapped genes by intersecting the miRNA targeted genes and DEGs from TCGA.
Function enrichment analyses {#Sec17}
----------------------------
To understand the biological roles and potential functions of the 497 overlapped genes, GO analysis, which including biological process (BP), molecular function (MF), and cellular component (CC), and KEGG signal pathway enrichment analysis had been performed. GO analysis showed that in BP terms, these overlapped genes were mainly enriched in positive regulation of transcription from RNA polymerase II promoter, negative regulation of transcription from RNA polymerase II promoter, transcription from RNA polymerase II promoter, and positive regulation of transcription, DNA-templated. For MF, overlapped genes were mainly enriched in protein homodimerization activity, transcription factor activity, sequence-specific DNA binding, calcium ion binding, and sequence-specific DNA binding. For CC, these overlapped genes were mainly enriched in integral component of membrane, plasma membrane, integral component of plasma membrane, and extracellular region. The KEGG signal pathway enrichment analysis found that DEGs are mainly enriched in pathways such as Pathways in cancer, Neuroactive ligand-receptor interaction, PI3K-Akt signaling pathway, Rap1 signaling pathway, and Ras signaling pathway. The results are shown in Fig. [6](#Fig6){ref-type="fig"}.Figure 6Dot plot of function enrichment analysis. (**a**) Biological process analysis. (**b**) Cellular component analysis. (**c**) Molecular function analysis. (**d**) KEGG pathway analysis. The color intensity of the nodes shows the degree of enrichment of this analysis. The enrich-factor is defined as the ratio of the differential genes in the entire genome. The dot size represents the count of genes in a pathway.
Identification of 10 hub-genes {#Sec18}
------------------------------
The functions of these overlapped genes had been analyzed above. To further explore the effect of circRNA/miRNA regulatory networks on gene expression levels in ccRCC, a PPI network was constructed, and some hub-genes, which screened from this PPI network by applying some bioinformatics algorithms, were obtained. By utilizing STRING and Cytoscape, a PPI network consisting of 177 nodes and 330 edges to display the interactions among the 497 mRNAs (Fig. [7](#Fig7){ref-type="fig"}a). Then a subnetwork (MCODE score:9.0) with ten nodes and 45 edges was selected, which revealed the critical roles of the ten genes (PTGER3, ADCY2, APLN, CXCL5, GRM4, MCHR1, NPY5R, CXCR4, ACKR3, MTNR1B) in clear cell renal cell carcinoma (Fig. [7](#Fig7){ref-type="fig"}b). After this, a network about the association between these circRNA, miRNAs and hub-genes were built (Fig. [7](#Fig7){ref-type="fig"}c). 13 circRNA/miRNA/mRNA regulatory axis, including hsa_circ_0029340/has-miR-657/GRM4 axis, hsa_circ_0025135/has-miR-587/PTGER3 axis, hsa_circ_0025135/has-miR-587/ADCY2 axis, hsa_circ_0025135/has-miR-587/ACKR3 axis, hsa_circ_0025135/has-miR-587/NPY5R axis, hsa_circ_0025135/has-miR-637/APLN axis, hsa_circ_0025135/has-miR-637/GRM4 axis, hsa_circ_0025135/has-miR-637/MTNR1B, hsa_circ_0039238/has-miR-548p/PTGER3 axis, hsa_circ_0039238/has-miR-548p/HAPLN1 axis, hsa_circ_0039238/has-miR-548p/CXCL5 axis, hsa_circ_0039238/has-miR-548p/MCHR1 axis, hsa_circ_0039238/has-miR-548p/CXCR4 axis, extracted from this network.Figure 7(**a**) A network of overlapped genes' interaction. Gradual changes in color represent differences in the expression levels of different genes of ccRCC. (**b**) A network of 10 hub-genes. Gradual changes in color represent differences in the expression levels of different genes of ccRCC. (**c**) A network showing the interactions of circRNAs/miRNAs/hub-genes. circRNAs, miRNAs, hub-genes are shown in red, yellow, and green respectively).
Effects of hub-genes on overall survival {#Sec19}
----------------------------------------
The hub-genes and it's predicted regulated pathways had been found out. And now the overall survival time of patient\'s with ccRCC will be displayed, which is the most concerning thing by all clinicians. The OS of these hub-genes are exhibited in Fig. [8](#Fig8){ref-type="fig"}, excluding MTNR1B which did not have sufficient data to go on survival analysis. Total five genes were found to have significant effects on overall survival. The overexpression of these genes, PTGER3, ADCY2, and APLN, can prolong the overall survival and may act as a protective factor, but the down-regulated genes, CXCL5 and GRM4, have adverse effects on OS, may act as risk factors.Figure 8The overall survival time of 9 hub-genes.
Construction of a circRNA--miRNA--mRNA network {#Sec20}
----------------------------------------------
To present the relationship between circRNA, miRNA, and mRNA, a circRNA/miRNA/mRNA network was constructed through combining the circRNA/miRNA interactions and the miRNA/mRNA interactions by using Cytoscape, shown as Fig. [9](#Fig9){ref-type="fig"}. It provided an expression about the connections between the 3 DECs (hsa_circ_0029340, hsa_circ_0025135, hsa_circ_0039238), the 6 miRNAs (miR-1205, miR-657, miR-587,miR-637, miR-1278,miR-548p) and the 497 mRNAs.Figure 9A network of circRNA/miRNA/mRNA. Octagon represents circRNA, Diamond represents miRNA, Oval represents mRNA. Gradual changes in color represent differences in the expression levels of different genes of ccRCC.
Candidate compounds from CMap {#Sec21}
-----------------------------
The regulated network of circRNAs, miRNAs, mRNAs, had been constructed, and now some candidates or drugs, which may have effects on ccRCC, will be forecasted. The candidate compounds were predicted by CMap, showing in Table [2](#Tab2){ref-type="table"}. The enrichment correlation coefficient calculated by the correlation coefficient in all instances ranges from 1 to + 1. The score is positive, indicating that a small molecule compound or drug has a similar or co-directional relationship with a particular biological process; score is negative, indicating that a small molecule compound or drug has an opposite or antagonistic link to a particular organism. The *P* value was evaluated for the significance of the enrichment correlation coefficient and the smaller the value, the greater the credibility^[@CR25]^.Table 2A potential compound identified by Cmap for ccRCC.Cmap nameEnrichment scoreDose (μm)CellUp scoreDown scorejosamycin− 0.4115MCF7− 0.618− 0.114josamycin− 0.4115HL60− 0.775− 0.136josamycin− 0.4115PC3− 0.661− 0.124
Pharmacogenomics analysis for hub genes to find potential drug {#Sec22}
==============================================================
By exploring the website PharmGkb, the above ten hub-genes were selected for pharmacogenomic analysis to find some potential drugs and complement the results of CMap. The results are showing in Table [3](#Tab3){ref-type="table"}. Bevacizumab can treat Colorectal Neoplasms efficiency, which may be related to the expression of CXCR4. And capecitabine can also work with colorectal cancer reduced progression-free survival but slightly. These two drugs mentioned above are all associated with cancer, but hmg coa reductase inhibitors and Ace Inhibitors, Plain are not associated with cancer as the annotation from the website introduces.Table 3Four potential drugs identified by PharmGKB for ccRCC.GenesSNPDrugSignificant*P* valueAssociationReferencesADCY2rs4702484CapecitabineYes0.018In patients receiving capecitabine monotherapy CC carriers showed slightly reduced progression-free survival (CC 6.2 vs. CT 8.0 months; *P* = 0.018)PMID: 25815774ADCY2rs4702484CapecitabineNo0.229Analyzing the entire cohort of capecitabine monotherapy (N = 126) and Combination therapy (N = 139) no association for genetic markers with progression-free survival was foundPMID: 25815774CXCL5rs352046Hmg coa reductase inhibitorsYes0.0009Genotype CC is associated with increased response to hmg coa reductase inhibitors in people with Acute coronary syndrome as compared to genotypes CG + GGPMID: 18769620PTGER3rs11209716Ace Inhibitors, PlainYes0.002Allele C is associated with decreased risk of Cough when treated with Ace Inhibitors, Plain in people with Hypertension as compared to allele TPMID: 17496729CXCR4rs2228014BevacizumabYes0.029Genotypes AA + AG is associated with decreased progression-free survival when treated with bevacizumab in people with Colorectal Neoplasms as compared to genotype GGPMID: 27503580
Discussion {#Sec23}
==========
An increasing number of researches have demonstrated that circRNAs and miRNAs play important roles in cancer biological recently. Experiments had demonstrated that miRNAs are closely related to the proliferation, migration, and invasion, and circRNAs can regulate these processes via miRNAs in ccRCC^[@CR26]--[@CR28]^. Some studies also demonstrated that circRNA/miRNA has a strong association with diseases, especially with cancer, by utilizing advanced computational methods such as KATZ algorithm, Locality-Constrained Linear Coding algorithm, inductive matrix completion, decision tree^[@CR29]--[@CR35]^ . Therefore, circRNAs and miRNAs can apply as a therapeutic method or a biomarker of diagnosis. In this study, 6 DECs (hsa_circ_0029340, hsa_circ_0039238, hsa_circ_0031594, hsa_circ_0084927, hsa_circ_0035442, hsa_circ_0025135) were selected at the first step. To our knowledge, hsa_circ_0084927 had been demonstrated that it is involved in the development of lung adenocarcinoma-associated malignant pleural effusion, but the other 5 circRNAs had not been studied yet^[@CR36]^. These five circular RNAs were first discovered that are abnormally expressed in ccRCC, and they have the potential to be excellent biomarkers or potential therapeutic targets. As a kind of highly conserved endogenous RNA (ceRNA), circRNA has been confirmed to have a function as \"sponge\" to absorb corresponding miRNA by interacting with miRNA binding sites and, thus, playing a role in regulating genes expression indirectly. Among the 6 DECs above, 3 circRNAs (hsa_circ_0029340, hsa_circ_0025135, hsa_circ_0039238) were ascertained as ceRNA to regulate the expression of 6 miRNAs (miR-1205, miR-657, miR-587, miR-637, miR-1278, miR-548p). However, based on the ceRNA theory, no miRNAs related to the other three circRNAs were found, which may play other roles, such as coding protein, interaction with RNA binding protein, or modulating the stability of mRNAs so on. Among the 6 miRNAs identified, miR-657, miR-587 was confirmed to act as tumor-promoting molecules in some cancer types^[@CR37]--[@CR41]^. Some research have found that miR-657 overexpressed in lung cancer, cervical squamous cell carcinoma, larynx carcinoma, hepatocellular carcinoma, and it can promote carcinoma cells abilities of tumorigenesis, proliferation and invasion by some complex targeting pathways^[@CR37],[@CR40]^. And For miR-587, it can antagonize 5-FU-induced apoptosis and confers drug resistance by regulating PPP2R1B expression in colorectal cancer, and it is related to the survival time of glioblastoma multiforme patients^[@CR41],[@CR42]^. In contrast, mir-1205, miR-637, and miR-548p act as tumor suppressor molecules. MiR-1205 can target some downstream gene sits to inhibited and promote cell proliferation and invasion in some cancers ^[@CR43]--[@CR45]^. For miR-637, many studies suggest it act as a protective factor to suppress the cancer cells proliferation, invasion and migration by targeting on regulating the expression of AKt1, RING1 or NUPRI in hepatocellular carcinoma, colorectal cancer, glioma, and cervical cancer^[@CR45]--[@CR49]^. MiR-548p decreases Hepatic Apolipoprotein B Secretion and Lipid Synthesis, acting at HBx/HNF4A/miR-548p/HBXIP pathway that controls hepatoma cell growth and tumorigenesis of hepatocellular carcinoma^[@CR50]^. But there are no studies having found that miR-1278 plays an important regulatory role in tumors. In general, the findings of this study about these miRNAs are similar to other studies, and these miRNAs may play an important role in the development of ccRCC.
CircRNAs affect the expression of genes by acting at miRNA, as shown above. To further explore the effects of circRNA on gene expression by acting at miRNA, 497 overlapping genes were collected to go for function enrichment analyses. These genes were enriched mainly in the biological process about the regulation about transcription and cell proliferation. Meanwhile, KEGG analysis showing that these genes were mainly enriched in some cancer-related pathways such as Pathways in cancer, PI3K-Akt signaling pathway, Rap1 signaling pathway, and Ras signaling pathway. Furthermore, these pathways have been shown to have an interaction in some cancers, which may indicate that these circRNAs explored in this study may exert the same or related regulatory functions by acting on the circRNA/miRNA/mRNA axis. PI3K/Akt signaling pathway is an important pathway to regulate cancer proliferation, adhesion, migration, invasion and angiogenesis. It acts at downstream targets, as Forkhead box O transcription factors (FoxO), mammalian target of rapamycin (mTOR), to stimulate expression of death receptor ligands and enhance Vascular endothelial growth factor (VEGF) secretion^[@CR51],[@CR52]^. Meanwhile, PI3K/Akt signaling pathway can be activated by RAS or Rap1 pathway, and it can interact with gene P53 to promote the function of enabling gene repair and maintaining gene stability^[@CR53]^. Moreover, Rap1 is activated by upstream signaling molecules (as calmodulin, cAMP) and tyrosine kinase (as PKA PKC), acting on downstream molecular markers (such as B-raf PAPL) to regulate gene expression, cell proliferation, adhesion, etc^[@CR54],[@CR55]^. In summary, the function and signaling pathways of these genes are related to the occurrence and development of tumors, which have been confirmed in other studies. Therefore, these genes, which are regulated by circRNAs indirectly, play an essential role in the signal pathway of ccRCC.
In this study, hub-genes (PTGER3, ADCY2, APLN, CXCL5, GRM4, MCHR1, NPY5R, CXCR4, ACKR3, MTNR1B) were obtained, and some circRNA/miRNA/mRNA regulatory axis about these hub-genes were constructed which may help researchers build a more systematic, more profound about the regulatory network. Among these hub-genes, PTGER3, CDCT2, APLN, CXCL5 and GRM4 show significant effects on overall survival time between ccRCC tissue group and normal tissue group. PTGER3, CDCT2 and APLN have positive effects on overall survival time, but CXCL5 and GRM4 have negative effects on it. Research demonstrated that APLN could interact with APLN receptor, which is a G-protein-coupled receptor, which may influence the aggressive of ccRCC and the effect of immune therapy^[@CR56]^. And C-X-C chemokine receptor 4 (CXCR4) is the major chemokine receptor in solid tumors. Increased CXCR4 expression was associated with more aggressive tumor behavior in RCC patients, especially in ccRCC subtypes, due to their more metastatic behavior^[@CR57]^. However, to our best knowledge, the rest hub-genes in ccRCC had not been investigated.
Clear cell renal cell carcinoma (ccRCC) is one of the most drug-resistant malignancies. Exploring potential compounds or drugs that may have a therapeutic effect on ccRCC is necessary. Cmap and Pharmacogenomics analysis had been exploited to find potential compounds and drugs. Josamycin is a naturally produced antibiotics that have a 16-membered macrocyclic lactone ring predicted by Cmap. A study had demonstrated that Josamycin can suppress the development of altered liver cell foci but not indicted this compound has anti-cancer function^[@CR58]^. Meanwhile, a study demonstrated that 14-membered ring macrolide antibiotics, roxithromycin and clarithromycin, have a significant inhibitory effect to mouse B16 melanoma cell on tumor angiogenesis, tumor growth, and metastasis. However, t a 16-membered ring macrolide, as josamycin, did not show any inhibitory effect on these ways when at the same dose^[@CR59]^. So, more studies are needed to illustrate whether josamycin can act as anti-tumor function and its mechanism of action. Capecitabine is targeting to the SNPs of rs4702484 of ADCY2, and reduced progression-free survival but slightly. However, the effect of chemotherapy for clear cell renal cancer is poor. Capecitabine is seldom used in treating renal cancer, sometimes used in combination with targeted drug therapy^[@CR60]--[@CR62]^. Bevacizumab targeting to the SNPs of rs228014 of CXCR4, exerting anti-tumor effect. Bevacizumab is a monoclonal antibody that inhibits vascular endothelial growth factor and is used to treat various metastatic cancers. It has the ability to bind to the VEGF receptor (VEGFR), which are on the surface of endothelial cells and are membrane-bound tyrosine kinase receptors responsible for specific downstream survival and proliferation pathways^[@CR63]^. Also, bevacizumab is commonly used in treating metastatic ccRCC, combining it with other drugs, as interferon, erlotinib^[@CR64]--[@CR67]^. Hmg-coa reductase inhibitors have been confirmed to have anti-cancer effects in some cancers, but whether it has the same effects on ccRCC had not been confirmed^[@CR68]^. It may be a potential therapeutic drug and need researches to test and verify. However, for Angiotensin Converting Enzyme (ACE)-Inhibitory, whether it has an anti-tumor effect is still unclear, some recent studies had demonstrated that Angiotensin Converting Enzyme (ACE) Inhibitory could induce apoptosis of cancer cell^[@CR69],[@CR70]^. But some studies also demonstrated that it might increase the risk of canceryy^[@CR71]^. To sum up, these compounds and drugs, which were predicted by this study, maybe the right choice for the treatment of ccRCC.
Several limitations should be considered. The construction of circRNA/miRNA/mRNA regulatory networks and the prediction of therapeutic drugs were all relying on a series of bioinformatics algorithms and databases. A large number of experiments are needed to verify the accuracy of these prediction conclusions. In addition, in the choice of DECs, the selection criteria with higher credibility are adopted. Although the specificity of the prediction results is improved, the sensitivity is insufficient in this study. In this paper, the latest and most reasonable algorithms were selected, but random errors and selection bias cannot be avoided. In future research, we will verify our predictions in cell lines and in entity samples.
Conclusion {#Sec24}
==========
In this study, we firstly constructed a circRNA/miRNA/mRNA regulatory network based on the theory of ceRNA through using some bioinformatic tools and genomics databases. Furthermore, the functions of these circRNA/miRNA/mRNA links are also had been predicted. In addition, some compounds and drugs for ccRCC are predicted which may be the potential treatment candidates. All this work can improve our understanding of potential pathogenesis in ccRCC, and it has directive functions for further research works. However, all these results were speculated by various bioinformatics analyses, and it still needs to be further confirmed .
**Publisher\'s note**
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
We thank the GEO, TCGA, miRWalk, miRPath, DAVID, STRING, GEPIA, Cytosacpe, Cmap and PharmGKB databases for providing their platforms and contributors for their valuable data sets. This manuscript is supported by the National Natural Science Foundations of China (Juan Ren, 81772793/H1621; Juan Ren, 81172490/H1621; Juan Ren, 31201060/C0709; Juan Ren, 30973175/H1621); Supported by Program for New Century Excellent Talents in University (Juan Ren, NCET-12-0440); Supported by Scientific and Technological Research Foundation of Shaan'xi Province (Juan Ren, 2020JM-368); The Fundamental Research Funds for the Central Universities (Juan Ren, 2012); Clinical Research Award of the First Affiliated Hospital of Xi\'an Jiaotong University, China (Juan Ren, No. XJTU1AHCR2014-041).
J.R. and S.H.B. participated in study design and draft the manuscript. S.H.B., Y.Y.W., Y.Y.L., S.Y. were the major authors who performed experiments and wrote the manuscript equally. S.H.B. drawn Figs. [1](#Fig1){ref-type="fig"}, [2](#Fig2){ref-type="fig"}, [3](#Fig3){ref-type="fig"}, [4](#Fig4){ref-type="fig"}, [5](#Fig5){ref-type="fig"}, [6](#Fig6){ref-type="fig"}, [7](#Fig7){ref-type="fig"}, [8](#Fig8){ref-type="fig"} and [9](#Fig9){ref-type="fig"}. J.Z.Z., J.X.L. and B.N.H. reviewed the data analysis and assessment. R.L., S.S., H.L.M. and X.Z.Z. helped to draft the manuscript and polish the English. All authors read and approved the final version to be published.
The authors declare that the data supporting the findings of this study are available within the article.
The authors declare no competing interests.
|
MORGANTOWN, W.Va. — Fans of professional sports teams would not have noticed anything out of the ordinary at Milan Puskar Stadium’s concession stands on a recent sunny Saturday afternoon. Domestic and imported beer, wine and a hard cider advertised as gluten-free were all for sale during West Virginia’s football game against Maryland.
But these options were actually unusual. West Virginia is in the small minority of college teams that sell alcohol at football games to general-admission ticketholders, which it has done since 2011. And it is one of very few in the five most prominent conferences to do so, although many more make alcohol available in suites and to holders of other kinds of premium tickets.
“I’m a traditionalist,” said Alan Cage, 65, a West Virginia fan who sold Coca-Cola at the old Mountaineer Field when he was a boy. “It’s college football, and I grew up with no beer in the stands.”
But he was quick to add, “From an economic standpoint, I can understand.”
In an era of seven-figure coaching salaries and demands for more resources for athletes, universities are always looking for ways to increase revenue. But college football is also eager to keep up attendance, which averaged 44,190 last season, the lowest figure since at least 2003, according to the N.C.A.A. In the era of high-definition home televisions, fan experience is the focus of many athletic directors’ offices. |
By posting content to TruckNet, you're agreeing to our terms of use and confirm that you have read our Privacy Policy, and our Cookie Use Policy. You acknowledge that any personal data you post on TruckNet may be accessed by other members of TruckNet and visitors to the forum
Who in their right mind thinks that Hving to work EVERY Other Saturday is sociable
Sociable working hours; which are based on a 45 hour week (Monday to Friday between the hours of 07:00 – 17:00 and alternate Saturdays 08:00 – 12:00).
Yes one of the super duper building supplie company's not the Jews on lot thought this time . And by my calculations 5 x 10 = 50 + 4 = 54 hours So even taking 5x1 hour dinner breaks that's still over 45 hrs
Roymondo wrote:Which bit of "between the hours of" do you not understand? The shifts don't start before 7am and don't finish after 5pm. That's not the same as saying you will be working from 7am until 5pm...
Roymondo wrote:Which bit of "between the hours of" do you not understand? The shifts don't start before 7am and don't finish after 5pm. That's not the same as saying you will be working from 7am until 5pm...
As it says BASED on 45 hrs does not say it will be 45 hrs it maybe more which will incure o/t payment. Most Drivers have a basic based on 40-45 hrs but get paid o/t over and abovePerhaps your one of the lucky ones who has no need to do 4hrs on alternate Saturdays,
Who in their right mind thinks that Hving to work EVERY Other Saturday is sociable
Somebody who likes getting out of bed at 6am in a morning setting off to work at 6.30am and knowing they'll be walking back through their front door at 5.30pm no matter what happens after pottering around the locality at a nice steady pace all day.
It is literally as close to a non-driving job as you can get for knowing what time you'll be starting and finishing.
Conor.Man made global warming is a massive lie concocted and exploited by governments and business to extort money out of us.East Anglia University Climate Research Unit, the world leaders, have falsified data and have outright lied to everyone.
Roymondo wrote:Which bit of "between the hours of" do you not understand? The shifts don't start before 7am and don't finish after 5pm. That's not the same as saying you will be working from 7am until 5pm...
Its because builders merchants are open on a saturday, to allow people who during the week are working to do their building work..a shelf here, a shed there, etc etc..i dont agree with working weekends full stop, but many fodd supply chains now insist that their work begins on a thursday and ends on a monday..to squeeze every weekend out of you.. I have never believed supermarkets should be open on a sunday, it even says that in our bible ( except for motorbike shops apparently ) but what a godsend it can be !!..guess its ok to open shops on a sunday, so long as its other thats working eh !! myself included.
I'd say 4 hours (0800-1200) every other Saturday would be a fair compromise for not having to work outside the hours of 7&5 all week. You wouldn't even miss the lunchtime kick offs on your Saturdays in & you could still stay up late on the Friday.
Who in their right mind thinks that Hving to work EVERY Other Saturday is sociable
Somebody who likes getting out of bed at 6am in a morning setting off to work at 6.30am and knowing they'll be walking back through their front door at 5.30pm no matter what happens after pottering around the locality at a nice steady pace all day.
It is literally as close to a non-driving job as you can get for knowing what time you'll be starting and finishing.
Also building deliveries can be as close to a building labourer's job as it gets.Ironically I don't ever remember being asked to work Saturdays doing that on agency work and the hours were more or less as you've described during the week.No surprise that most drivers including myself preferred doing a decent distance run on a few bulk drops/collections for example.
Also no surprise which type of work the agency had the most of in that regard and the most trouble filling.
IE it's sometimes better to do maybe a few more hours,but preferably starting a bit later finishing later,doing decent distance work which gets you out of town and mostly a shift made up of driving.
By posting content to TruckNet, you're agreeing to our terms of use and confirm that you have read our Privacy Policy, and our Cookie Use Policy. You acknowledge that any personal data you post on TruckNet may be accessed by other members of TruckNet and visitors to the forum |
C04 Comparisons
Comparisons with EOP C04 Series
On the following pages, you will find a comparison between the individual solutions of the Analysis Centers and the IVS combination with respect to the C04 series. The C04 series provides Earth Orientation Parameters (EOP):
Polar motion with respect to the crust X-Pole and Y-Pole,
Irregularities of the rotation angle UT1-UTC and LOD,
Celestial pole offsets dX and dY
in reference to the precession-nutation model IAU2006 and with respect to the ITRF2008.
These values are smoothed at 1-day intervals and published by the IERS Earth Orientation Center. Since 1 December 2011, the EOP C04 series have been delivered with 30-day latency and include only final definitive values, as announced in IERS message 198. A description of the C04 series can be found at the C04-Guide.
For comparison, the missing X- and Y-Pole Rate of the C04 series are determined by a weighted linear interpolation of the X- and Y-Pole values, respectively.
The comparison is embedded in an interactive tool containing data of the last two year. The user is free to display the graphics of the individual solution, to choose the time-span and to overlay the residuals with their error bars.
The statistics table is updated according to the chosen data set(s). Tool tipping a data point provides a link to the analysis report of the corresponding session. |
Q:
python-hypothesis: Retrieving or reformatting a falsifying example
Is it possible to retrieve or reformat the falsifying example after a test failure? The point is to show the example data in a different format - data generated by the strategy is easy to work with in the code but not really user friendly, so I'm looking at how to display it in a different form. Even a post-mortem tool working with the example database would be enough, but there does not seem to be any API allowing that, or am I missing something?
A:
You can call note to record additional information during a test, such as your own custom-formatted copy of the generated inputs.
When Hypothesis finds a falsifying example, it will also print out the notes that were recorded the execution of that particular example.
|
Skin camouflage
Over one million people in the UK live with some form of altered image. Skin problems represent 20% of the NHS workload, making this the most common reason people visit their GPs in the UK.
'Altered image' can be defined as an aesthetic difference acquired either at birth, or after an accident, an attack, a disease, a failed cosmetic procedure, or an operation.
The emotional impact of having an altered image can be huge. In a society where we look up to celebrities who rarely make it to their late twenties without having some kind of 'corrective procedure' to get rid of bumpy noses, smile lines and slightly wonky teeth, living with an altered image caused by severe scarring, burns, skin conditions and disease can be incredibly difficult at times.
Skin camouflage is a temporary but practical technique used by both men and women to disguise non-infectious skin conditions such as acne, vitiligo and rosacea, as well as burns, scars and stretch-marks.
Most clients who choose to have skin camouflage just want to enjoy an ordinary life without the extra attention, prejudice and feelings of self-consciousness that often come with looking noticeably different.
Camouflage can be used for one-off occasions like weddings, public events and nights out, or it can be applied daily and worn at work, at the gym and even in the swimming pool.
What is skin camouflage?
Skin camouflage is the name given to a form of highly pigmented substance used to conceal non-infectious skin conditions and scars. The camouflage comes in three parts:
The first step in the skin camouflage process is to book a consultation with a professional specialising in skin camouflage. During the consultation, the professional will match your skin as accurately as possible to a shade of camouflage, before teaching you how to apply the specialist products yourself.
Unlike regular make-up, skin camouflage products are designed to be water resistant, which gives the wearer the confidence to go swimming without it washing away. However, no brand should be considered 100% rub proof - it is easily removed with detergents should the camouflage transfer to clothing or bed linen. Always pat the area dry when wet - otherwise you could disturb the camouflage.
What to expect during your appointment
Your skin camouflage appointment will take around an hour to complete. After an initial consultation, during which you will be asked to identify the area or areas you want camouflaged, your beauty professional will set about developing a colour match that blends perfectly with the rest of your skin.
Step one: apply
Once an acceptable skin match is agreed, your skin camouflage will be applied in one of three different ways:
1. Finger tips are used to carefully wipe, dab or rub the cream over the affected area – this is quickly achieved, even over the largest of areas.
2. A sponge is used when the skin is fragile or may quickly redden.
3. A brush is usually used over fine scars (when a sponge or fingers would apply too much product).
After the cream has been applied, there are four or five more steps for your beauty professional to complete:
Step two : powder
Powder is required to fix the cream, which helps to prevent smudging. This is applied in a rolling-pressing motion. A powder mop or the reverse of the powder puff is then used to remove any excess powder, or the area can be blotted with a dampened flannel.
Step three: fix
The fixing stage ensures that the camouflage becomes water and smudge-resistant. Fixing is achieved with a fair quantity of powder, dabbed on with a puff in a pressing, rolling motion.
Step four: brush
A brush is then used (in the direction of hair growth) to remove any excess powder.
Step five: final cover and blot
Your beauty professional may find that another application of camouflage is necessary. After this is applied, he or she will dampen a flannel or sponge and press it gently over the area in a blotting motion. This will remove any excess chalkiness from the powder and also help the camouflage cream to set.
Of course, you won't be expected to go to your professional every morning for reapplication - part of your initial appointment involves a tutorial in how to apply and remove the camouflage yourself - and you will be given a chance to run through the process under the supervision of your professional.
Maintaining camouflage
Be aware that any contact with oily substances such as sun-tan oil, aromatherapy massage oils, soaps and soap substitutes will remove the camouflage. Care must therefore be taken with any camouflage applied to backs of hands and fingers when using hygiene products.
Removing camouflage
Soap and water, or cosmetic wipes, or using a soap substitute will remove your camouflage (if necessary remove the soap substitute with soft tissue). Camouflage should be removed daily, especially from the face.
What can be camouflaged?
Skin camouflage is designed to conceal discoloration to the skin; however, it cannot alter its function or texture. The following non infectious conditions are commonly requested for camouflage application,
Skin conditions:
rosacea
flushing/blushing
freckles
hypo-pigmentation
age-spots
thread veins
stretch marks
cleft lip
acne
portwine stains
café au lait marks
plaque psoriasis
vitiligo.
If you notice changes in your skin, you are advised to consult a medical professional before continuing with your camouflage applications.
Scarring as a result of:
burn injury
skin condition
skin graft
surgical procedure
self-harm
car accident
other accident
disease
assault/violence/abuse.
Other:
Radiographer's markings.
What can't be camouflaged?
Skin camouflage can only be used to cover healthy, diagnosed skin conditions. A beauty professional will never camouflage any of the following:
bacterial and fungal infections including ringworm
blistering or ulcerated skin
chill-blains
open wounds
moles (moles need to be monitored in case of changes indicating cancer)
infestations like scabies
stitches
varicose veins
warts/herpes/shingles and other viral infections
pustular forms of psoriasis
skin cancer
measles and chicken pox.
Benefits of skin camouflage
It is important to realise that many people live quite happily with their skin conditions and scarring without feeling the need to camouflage them - they view them as unique and natural parts of their own bodies. Unfortunately, we do live in a society that frequently stigmatises anything deemed 'different'. This means that people who live with noticeable differences also commonly live with prejudice, intrusive stares, inappropriate questioning, name-calling and even sometimes physical abuse. It is for this reason that many choose to hide their conditions with skin camouflage.
People choose to have skin camouflage because it enables them to:
avoid extra attention
no longer feel defined by their altered image
blend into the crowd when they want to
feel more confident.
Skin camouflage offers a simple solution to complex problems - its role immediately after diagnosis or at a later date can help clients regain their confidence and self-esteem and allow them to return to normal life.
Skin camouflage FAQ
What does skin camouflage feel like?
Some people imagine skin camouflage feels thick and heavy. This is not so - if the formula is applied properly it should be smooth to the touch with a non-greasy matte finish.
The British Association of Skin Camouflage (BASC) has been internationally acknowledged as the leading training provider for pharmacists, therapists, beauticians and medical professionals who wish to administer skin camouflage.
Formed in 1985, BASC aims to improve the availability of skin camouflage and uphold a high standard of practice within the profession.
All members of BASC are trained to the highest possible standard and kept informed of the latest technological and research developments.
References
Provide Feedback
This is where you can submit feedback about the content of this page.
We review feedback on a monthly basis.
Please note we are unable to provide any personal advice via this feedback form. If you do require further information or advice, please visit the homepage & use the search function to contact a professional directly. |
Equine infectious anemia found in horse
A pony recently obtained by an equine rescue group from a sale barn in Pennsylvania and brought to a stable on a New Jersey premises has been confirmed positive for Equine Infectious Anemia (EIA). Officials in Pennsylvania are investigating the source of the infection. The pony has been euthanized.
Equine Infectious Anemia (EIA), also known as swamp fever, is an infectious, viral disease that infects all equidae (horses, donkeys, zebras, etc.) It is not infectious to humans. There is no effective treatment or approved vaccine available for Equine Infectious Anemia.
The disease is spread via blood-to-blood transmission, not close proximity or casual contact. EIA is usually transmitted from horse to horse by large biting insects such as horseflies and deerflies. The bites from these flies stimulate defensive movement by the horse, which often results in an interruption of the flies' blood feeding. When interrupted, flies are motivated to complete feeding as soon as possible.
They then attack the same or a second host and feed to complete their meal. Any infective material from the blood of the first host that is present on the mouthparts of the flies can be transmitted to the second host. Blood transfusions, unsterilized or contaminated needles and equipment contaminated with blood from an infected horse can also spread the virus.
Depending on an individual horse's immune system and the severity of its reaction, clinical signs of EIA can range dramatically. While some infected with EIA show no signs of illness, others display fever, weight loss, icterus (yellowing of body tissues), anemia, swelling of the limbs, weakness, rejection of feed, and/or sudden death.
To minimize disease transmission, all equidae should be tested for EIA before being brought onto a new premises. The animal should be isolated and observed for 45 to 60 days, then retested before being introduced to the herd.
New Jersey law requires all imported equidae to have a negative official test for EIA within the past 12 months. All equidae traveling on New Jersey roads must have a negative EIA test a maximum of 24 months prior to such travel, and any equidae that change ownership must be tested a maximum of 90 days prior to such a change in ownership. Equidae younger than six months and accompanied by a dam (female parent) that has a negative official test within the past 12 months are exempt from EIA testing.
For further information about EIA or information about EIA testing performed at the NJDA-Division of Animal Health Diagnostic Laboratory, please contact Dr. Nancy Halpern at 609-292-3965 or via email at Nancy.Halpern@ag.state.nj.us. |
Speaking at Courage’s launch event in Berlin last week, Edward Snowden’s lawyer in Germany, Wolfgang Kaleck explained the threats his client faces, the politicisation of his case and the ongoing legal work to protect him.
Courage runs Edward Snowden’s only official defence fund, donations to which support legal and public defence efforts for the NSA whistleblower. Since the fund was launched in August 2013, it has spent over 100,000 dollars on
direct legal costs alone.
Wolfgang Kaleck’s presentation touched on some of the issues the defence fund has been able to support, in Germany and elsewhere.
Over the past year, Edward Snowden has delivered testimony, or spoken by videolink, to a number of international investigations into mass surveillance. A number of national investigations are proposed or ongoing, including two separate German inquiries.
On June 4 this year, the German Federal Prosecutor announced he was reopening a preliminary criminal investigation into NSA interception of Chancellor Angela Merkel’s mobile phone. Kaleck revealed that, despite the German Federal Prosecutor’s recent claim to have invited Mr Snowden’s participation in the investigation, it was in fact Kaleck who offered his client’s help in proceedings – only to be told there was “no scope” for a witness testimony.
Similarly, while Edward Snowden has been invited to speak to Germany’s Parliamentary surveillance inquiry, the mechanics of how that testimony will be delivered remain complex:
They want him as a witness but they won’t take any risk. They do not want to be able to secure witness testimony from him… The latest news is that they invited themselves to Moscow and asked us, or me as a lawyer, if we would agree to host them.
Not all of Edward Snowden’s legal team have spoken about their role publicly. Wolfgang Kaleck mentioned one of these, the legal team representing Mr Snowden in the US who have been trying to negotiate his safe return home over the past year. Despite the determination of US officials to take extraordinary measures against Mr Snowden, those efforts continue.
At Wednesday’s launch event, Mr Kaleck asked supporters to “be prepared for a long distance run… he and we all know that solidarity might still also be necessary in one, three or five years, because the US is known for chasing these kinds of people for a very long time.”
Ensuring that Edward Snowden stays safe will be a long battle fought on
many fronts – both legal and public. Edward Snowden’s defence fund will
continue to need money until he is fully protected.
You can help support Edward Snowden by making a donation towards his legal costs.
You can also demonstrate to governments around the world the strength and breadth of popular demand for the whistleblower’s protection by contributing a picture to Courage’s new Stand With Snowden campaign.
Full transcript:
It is a pleasure to be able to speak to you today, although I think you don’t really need a lawyer to explain the legal situation of Edward Snowden. It can be summarised in three sentences.
He is wanted by the superpower USA. So far he is hosted by another superpower, Russia. The rest of the world, with the exception of some brave countries, are profiting from the revelations whilst advising Edward away from turning to Europe.
That’s the short version, now I am going to get a little bit boring.
You don’t need a lawyer to understand what I’m telling you right now because this is not about law, it’s about politics. Every single decision that has been made in the Snowden case is a highly political decision.
Legally, there are several ways for him. It starts with the USA again and it all begins in one part of the US. The Eastern District of Virginia released an accusation last June. We don’t know much more about the charges but we have an idea, I think we all have an idea, of what the accusations might be. The threat is very clear, he is pretty much aware of what the threat is. The threat is something like thirty years in prison. And then, the treatment which whistleblowers regularly receive in the US and that is special administrative measures. That’s maximum security prison and probably solitary confinement.
And because of this threat, he has chosen to go to Russia, with the help of Sarah. There is no need to talk about Russia a lot and I don’t want to start to speculate right now.
As you know, because you all read the New York Times, on 28 April there was a long article about talks which have taken place since last summer between some lawyers who are representing Snowden in the US and the government. So far, and this is also a debate in the New York Times, so far, these talks haven’t shown any results and publicly we don’t know any results of these talks. And still, and I come back to this, still, he thinks and his lawyers in the US think it makes sense to talk with the US government.
There have been a lot of rumours, especially last week again, that he might go to Brazil, he might go to other countries. That’s a little bit of the self-referentiality of the media. He had given an interview to Globo, Brazil, and he repeated what he has been saying previously that he would be happy to be in Brazil – like many of us as well!
As he said to Glenn Greenwald when Globo was in news he had sent a couple of letters to a number of countries together with Sarah last year from the airport, but there is no new development. The situation is that he is wanted by the US, and hosted by Russia.
Then there is the brave country Germany who has been really solid and I am not going into details because this is ongoing. Germans during the last weeks have made a lot of, we would call it in the German phrase, a ‘storm in a glass of water’.
As you all know, from the beginning he has said that he is willing to participate in national and supranational inquiries. Because for him, the most important consideration is not his person.
He always states, he makes it very clear that it should not be about his person but it should be about him as an example, and it should be about the revelations, it should be about mass surveillance, it should be about the subject. So this the primary reason why he is willing to participate in a number of inquiries – participate in the inquiries by the European parliament, by the Parliamentary Assembly of the Council of Europe.
It is important to note that he participated as an expert – he didn’t participate as a witness, he didn’t give a witness testimony. A witness testimony was requested by him by the German parliamentary inquiry, which we know all about. They want him as a witness but they won’t take any risk. They do not want to be able to secure witness testimony from him.
The latest news is that they invited themselves to Moscow and asked us, or me as a lawyer, if we would agree to host them. That has to be decided until next week, not particularly interesting but still the kind of smaller details that we have struggled with. The next stage in Germany is another inquiry where he has not officially been asked by the Federal Prosecutor for Germany to give testimony or to reveal documents.
The Federal Prosecutor stated last week in his press release that he had asked us to give documents or participate in the procedure, in the criminal procedure. It was the other way round – I offered participation, they told me there was no space for any witness testimony, but he is not hindered to reveal any news to them.
So that’s the kind of thing we are struggling with in Germany. A number of other procedures and inquiries are following, so we are talking French senate, the Danish senate, the Belgian state are all starting running inquiries where he might participate or not.
A small inclusion, as I refer back to my summary – the situation is not at all as expected, it is deeper or something else. It seems to be more or less stable like it is right now.
So what I am asking all of you for is: be prepared for a long distance run, be prepared for a long distance run.
He enjoys the solidarity, all kinds of expressions of solidarity, but he and we all know that solidarity might still also be necessary in one, three or five years. Because the US is known for chasing these kinds of people for a very long time. So I would be happy to have to have a solution for him earlier, but if this is not the case, I will have to see you all here in one, three or five years.
Thank you.
Click here for an audio recording of the event. |
Q:
Calculate net income
I have a dataset looks like :
time type amount
1 2017/1/1 0:00 income 729.64
2 2017/1/1 0:05 income 1465.15
3 2017/1/1 0:10 outcome 1456.07
4 2017/1/1 0:15 outcome 1764.28
...
289 2017/1/2 0:00 income 719.64
290 2017/1/2 0:05 income 165.15
291 2017/1/2 0:10 income 1006.07
292 2017/1/2 0:15 outcome 104.28
I want to calculate net income by date where if you have income more than outcome result will be positive else negative.
The result should look like this:
date netincome
1 2017/1/1 -729.64
2 2017/1/2 1465.15
3 2017/1/3 1456.07
4 2017/1/4 1764.28
...
How can I get this efficiently?
A:
Sample data:
df <- data.frame(time=c("2017/1/1 0:00", "2017/1/1 0:05", "2017/1/1 0:10","2017/1/2 0:00", "2017/1/2 0:05", "2017/1/2 0:10"),
type=c("income", "income", "outcome", "income", "outcome", "outcome"),
amount=c(729.64, 1465.15, 1456.07, 729.64, 729.64, 1456.07))
Transform time to date and outcome in negative values:
df$date <- lubridate::date(df$time)
df$amount[df$type=="outcome"] <- df$amount[df$type=="outcome"]*-1
Use dplyr to summarise the data (sum of amount by date):
library(dplyr)
output <- df %>% group_by(date) %>% summarise(netincome=sum(amount))
Result:
output
# A tibble: 2 x 2
date netincome
<chr> <dbl>
1 2017/1/1 738.72
2 2017/1/2 -1456.07
|
Actions, Rhetoric by Taliban
Reclusive top Taliban leader Mullah Omar says the Taliban would like to resolve the Osama bin Laden issue, so there can be “an easing and then lifting of UN sanctions that are strangling and killing the people of [Afghanistan].” [United Press International, 4/9/2004]
The Taliban hold a three-day drill camp for Islamist militants in Abbottabad, Pakistan, according to Radio Free Europe. Attendees are said to come from several countries. The camp is held “under the patronage of Mullah Abdul Salam Zaeef,” who is the Taliban’s official ambassador to Pakistan at the time. [Radio Free Europe, 5/6/2011] While militant camps actually in Abbottabad are apparently uncommon, there are many such camps in the Manshera area about 35 miles away that have been there since the 1990s and will still be there in 2011 (see May 22, 2011). It is unclear when US intelligence first becomes aware of militant activity in the Abbottabad area. In 2011, a US strike force will enter Osama bin Laden’s compound near Abottabad and kill him (see May 2, 2011).
At around 8:00 p.m., Afghanistan time (11:30 a.m., New York time), Taliban leader Mullah Omar allegedly says, “Things have gone much further than expected.” This is according to what the New Yorker will describe as “Afghan intelligence sources” who monitor the call. (It is unclear what “Afghan intelligence sources” means, since the Taliban control nearly all of Afghanistan at this time, but it could be a reference to Northern Alliance forces; the CIA gave them equipment to monitor the Taliban (see Winter 1999-March 2000).) Omar’s comment takes place over an hour after one of the World Trade Center towers collapsed, which means thousands have been killed in the attacks, not hundreds (see 9:59 a.m. September 11, 2001). An Afghan intelligence official will later say: “They were expecting a reaction. But they thought it would be a Clinton-type reaction. They didn’t anticipate the kind of revenge that occurred.” [New Yorker, 6/10/2002] The “Clinton-type reaction” presumably is a reference to the August 1998 missile strikes on Sudan and Afghanistan during the Clinton administration (see August 20, 1998).
At around 9:30 p.m., Afghanistan time (1:00 p.m., New York time), Taliban Foreign Minister Mullah Wakil Ahmed Muttawakil holds a press conference in Kabul, Afghanistan, and claims that the 9/11 attacks did not originate from Afghanistan. He reads a statement by Taliban leader Mullah Omar, which claims that Osama bin Laden also was not involved: “This type of terrorism is too great for one man,” the statement says. [New Yorker, 6/10/2002]
Pakistani ISI Director Lt. Gen. Mahmood Ahmed is periodically meeting and communicating with top Taliban leader Mullah Omar during this time. He is advising him to resist the US and not to hand over bin Laden (see September 17-18 and 28, 2001). According to journalist Kathy Gannon, he is also giving Omar and other Taliban leaders advice on how to resist the US military. Omar has almost no education and very little understanding of the Western world. Mahmood, by contrast, has just come from meetings with top officials in the US (see September 13-15, 2001). Gannon will later write that each time Mahmood visited Omar, he gave him “information about the likely next move by the United States. By then, [he] knew there weren’t going to be a lot of US soldiers on the ground. He warned Mullah Omar that the United States would be relying heavily on aerial bombardment and on the Northern Alliance.” Mahmood gives additional pointers on targets likely to be hit, command and control systems, anti-aircraft defense, what types of weapons the US will use, and so forth. [Gannon, 2005, pp. 93-94] Immediately after 9/11, Mahmood had promised Pakistan’s complete support to help the US defeat the Taliban (see September 13-15, 2001).
Robert Grenier, head of the CIA station in Islamabad, Pakistan, has a secret meeting with Mullah Akhter Mohammed Osmani, considered to be the second-most powerful figure in the Taliban. They meet in a five-star hotel in the Pakistani province of Baluchistan. Grenier suggests that if the Taliban want to avoid the wrath of the US in the wake of the 9/11 attacks, there are several things they can do: Turn bin Laden over to the US for prosecution. As CIA Director George Tenet will later put it, “administer justice themselves, in a way that clearly [takes] him off the table.” Stand aside and let the US find bin Laden on their own. Osmani and his team relays the offers back to top Taliban leader Mullah Omar, but Omar rejects them. On October 2, Grenier has a second meeting with Osmani in a Baluchistan villa. He makes the new proposal that Osmani should overthrow Omar and then use his new power to get rid of bin Laden. This too is rejected. There are no contemporary media accounts of these meetings, but Tenet will describe them in his 2007 book. [Tenet, 2007, pp. 182-183] Curiously, Osmani will be captured by US forces in 2002 and then let go (see Late July 2002). He will be killed in late 2006 (see December 19, 2006).
A secret meeting takes place between Taliban and US government representatives in the city of Quetta, Pakistan. Afghan-American businessman Kabir Mohabbat serves as a middleman. US officials deny the meeting takes place, but later in the month Mohabbat explains that the US demands the Taliban hand over bin Laden, extradite foreign members of al-Qaeda who are wanted in their home countries, and shut down bin Laden’s bases and camps. Mohabbat claims that the Taliban agrees to meet all the demands. However, some days later he is told the US position has changed and the Taliban must surrender or be killed. Later in the month, the Taliban again agrees to hand over bin Laden unconditionally, but the US replies that “the train had moved.”
[CBS News, 9/25/2001; CounterPunch, 11/1/2004]
Lieutenant General Mahmood Ahmed. [Source: Agence France-Presse]On September 17, ISI Director Lt. Gen. Mahmood Ahmed heads a six-man delegation that visits Mullah Omar in Kandahar, Afghanistan. It is reported he is trying to convince Omar to extradite bin Laden or face an immediate US attack. [Press Trust of India, 9/17/2001; Financial Times, 9/18/2001; London Times, 9/18/2001] Also in the delegation is Lt. Gen. Mohammed Aziz Khan, an ex-ISI official who appears to be one of Saeed Sheikh’s contacts in the ISI. [Press Trust of India, 9/17/2001] On September 28, Mahmood returns to Afghanistan with a group of about ten religious leaders. He talks with Omar, who again says he will not hand over bin Laden. [Agence France-Presse, 9/28/2001] A senior Taliban official later claims that on these trips Mahmood in fact urges Omar not to extradite bin Laden, but instead urges him to resist the US. [Associated Press, 2/21/2002; Time, 5/6/2002] Another account claims Mahmood does “nothing as the visitors [pour] praise on Omar and [fails] to raise the issue” of bin Laden’s extradition. [Knight Ridder, 11/3/2001] Two Pakistani brigadier generals connected to the ISI also accompany Mahmood, and advise al-Qaeda to counter the coming US attack on Afghanistan by resorting to mountain guerrilla war. The advice is not followed. [Asia Times, 9/11/2002] Other ISI officers also stay in Afghanistan to advise the Taliban.
ISI Director Lt. Gen. Mahmood Ahmed meets with top Taliban leader Mullah Omar on September 17-18, 2001, and again on September 28. He is supposed to encourage the Taliban to extradite Osama bin Laden or face immediate US attack, but in fact he encourages the Taliban to fight and resist the upcoming US invasion (see Mid-September-October 7, 2001). He is also in regular communication with Omar and other Taliban leaders, and gives them advice on how to resist the US invasion (see Mid-September-October 7, 2001). The CIA quickly learns of Mahmood’s double dealing, and informs Pakistani President Pervez Musharraf. Musharraf replaces Mahmood on October 7 (see October 7, 2001). But despite the ISI’s obvious double dealing, the CIA continues to heavily rely on the ISI for its intelligence about the Taliban (see November 3, 2001). [Rashid, 2008, pp. 77]
By late September 2001, the CIA covert plan to conquer Afghanistan is in place but it needs the US military to work. CIA official Gary Schroen will later recall, “We were there for just about a month by ourselves in the valley. We were the only Americans in the country for almost a month.” According to a PBS Frontline documentary, at some point around the middle of October, “there was a fiery NSC [National Security Council] meeting. The CIA had been complaining [Defense Secretary Donald] Rumsfeld was dragging his feet in Afghanistan. It was said Rumsfeld didn’t like taking orders from the CIA.” Lt. Gen. Michael DeLong will later say, “Rumsfeld went to the president and said, ‘The CIA has to work for me, or this isn’t going to work.’” President Bush finally agrees and places Rumsfeld in charge of the Afghanistan war. A short time later, on October 20, the first US Special Forces are put into action in Afghanistan, calling in precision air strikes. The Taliban fold in the face of the attack and the capital of Kabul will fall in mid-November. But according to Schroen, “I was absolutely convinced that that would happen and that the Taliban would break quickly. That could have happened in October, early October,” had the US military arrived to assist the CIA sooner. [PBS Frontline, 6/20/2006]
The ISI secretly assists the Taliban in its defense against a US-led attack. The ISI advises Pakistani President Pervez Musharraf that the Taliban will hold out against the US invasion until the spring of 2002 at least, and then will be able to hold out through a guerrilla war. Encouraged, Musharraf allows the ISI to continue to supply the Taliban on a daily basis. Pakistani journalist Ahmed Rashid will later explain, “The ISI justified its actions as stemming from fear of an Indian controlled Northern Alliance government after the overthrow of the Taliban. It also did not want to totally abandon the Taliban, its only proxy in Afghanistan. At the same time, the [Pakistani] army wanted to keep the Americans engaged, fearing that once Kabul had fallen, they would once again desert the region. With one hand Musharraf played at helping the war against terrorism, while with the other he continued to deal with the Taliban.” ISI Supplies and Advisers - Fuel tankers and supply trucks cross the border so frequently that one border crossing in the Pakistani province of Balochistan is closed to all regular traffic so ISI supplies can continue to the Taliban stronghold of Kandahar with little notice. [Rashid, 2008, pp. 77-78] Between three and five ISI officers give military advice to the Taliban in late September. [Daily Telegraph, 10/10/2001] At least five key ISI operatives help the Taliban prepare defenses in Kandahar, yet none are punished for their activities. [Time, 5/6/2002] Secret advisers begin to withdraw in early October, but some stay on into November. [Knight Ridder, 11/3/2001] Large convoys of rifles, ammunition, and rocket-propelled grenade launchers for Taliban fighters cross the border from Pakistan into Afghanistan on October 8 and 12, just after US bombing of Afghanistan begins and after a supposed crackdown on ISI fundamentalists. The Pakistani ISI secretly gives safe passage to these convoys, despite having promised the US in September that such assistance would immediately stop. [New York Times, 12/8/2001]US Aware of ISI Double Dealing - Rashid will later comment, “Thus, even as some ISI officers were helping US officers locate Taliban targets for US bombers, other ISI officers were pumping in fresh armaments for the Taliban.” On the Afghan side of the border with Pakistan, Northern Alliance operatives keep track of the ISI trucks crossing the border, and keep the CIA informed about the ISI aid. Gary Berntsen, one of the first CIA operatives to arrive in Afghanistan, will later say, “I assumed from the beginning of the conflict that ISI advisers were supporting the Taliban with expertise and material and, no doubt, sending a steady stream of intelligence back to [Pakistan].” [Rashid, 2008, pp. 77-78]Taliban Collapses as ISI Aid Slows - Secret ISI convoys of weapons and other supplies continue into November. [United Press International, 11/1/2001; Time, 5/6/2002] An anonymous Western diplomat will later state, “We did not fully understand the significance of Pakistan’s role in propping up the Taliban until their guys withdrew and things went to hell fast for the Talibs.” [New York Times, 12/8/2001]
Jalaluddin Haqqani. [Source: PBS]Lt. Gen. Mahmood Ahmed is supposedly helping the US defeat the Taliban (see September 13-15, 2001) while secretly helping the Taliban resist the US (see September 17-18 and 28, 2001 and Mid-September-October 7, 2001). Jalaluddin Haqqani is a Taliban leader close to bin Laden who controls the Khost region of eastern Afghanistan where most of bin Laden’s training camps and supporters are. Journalist Kathy Gannon will later note, “Had he wanted to, Haqqani could have handed the United States the entire al-Qaeda network.” [Gannon, 2005, pp. 94] He also has extensive ties with the ISI, and was a direct CIA asset in the 1980s (see (1987)). Journalist Steve Coll will later say, “There was always a question about whether Haqqani was really Taliban, because he hadn’t come out of Kandahar; he wasn’t part of the core group. And it was quite reasonable to believe after 9/11 that maybe he could be flipped.… [US officials] summoned him to Pakistan, and they had a series of meetings with him, the content of which is unknown.” [PBS Frontline, 10/3/2006] In early October 2001, Haqqani makes a secret trip to Pakistan and meets with Mahmood. Mahmood advises him to hold out and not defect, saying that he will have help. Haqqani stays with the Taliban and will continue to fight against the US long after the Taliban loses power. [Gannon, 2005, pp. 94]
In mid-November 2001, the Washington Post will report that senior Air Force officials are upset they have missed opportunities to hit top al-Qaeda and Taliban leaders since the start of the bombing of Afghanistan. According to these officials, the Air Force believes it has the leaders in its crosshairs as many as ten times, but they are unable to receive a timely clearance to fire. Cumbersome approval procedures, a concern not to kill civilians, and a power play between the Defense Department and the CIA contribute to the delays. One anonymous Air Force official later says, “We knew we had some of the big boys. The process is so slow that by the time we got the clearances, and everybody had put in their 2 cents, we called it off.” The main problem is that commanders in the region have to ask for permission from General Tommy Franks, based in Central Command headquarters in Tampa, Florida, or even Defense Secretary Rumsfeld and other higher-ups. Air Force generals complain to Franks about the delay problem, but never receive a response. For example, at one point in October, a Taliban military convoy is moving north to reinforce front line positions. Targeters consider it an easy mark of clear military value. But permission from Central Command is denied on the suspicion that the target is so obvious that “it might be a trick.” In another example, a target is positively identified by real-time imagery from a Predator drone, but Central Command overrides the decision to strike, saying they want a second source of data. An anonymous official calls this request for independent verification of Predator imagery “kind of ridiculous.” [Washington Post, 11/18/2001] The London Times paraphrase officials who claim that, “Attempts to limit collateral damage [serve] merely to prolong the war, and force the Pentagon to insert commandos on the ground to hunt down the same targets.” [London Times, 11/19/2001] By the end of the war, only one top al-Qaeda leader, Mohammed Atef, is killed in a bombing raid (see November 15, 2001), and no top Taliban leaders are killed.
Khalid Khawaja. [Source: CNN]Ex-CIA Director James Woolsey, as part of his attempt to gather evidence that could tie Iraq to the 9/11 attacks, contacts the Taliban. He works with Mansoor Ijaz, a US businessman of Pakistani origin, who is a lobbyist for Pakistan in the US, an occasional Fox News commentator, and has extensive political ties in the US. Woolsey is also vice chairman of the board of Ijaz’s company. Woolsey and Ijaz work with Khalid Khawaja, a friend of Osama bin Laden and ex-ISI operative. The three plus an unnamed US journalist arrange to meet with Taliban leader Mullah Omar in Kandahar, Afghanistan, on October 8. The Taliban agree to tell Woolsey about a meeting between Iraqi and al-Qaeda officials that took place in 1997, and possibly other similar information. Apparently in return they hope to avert the US invasion of Afghanistan. However, the US bombing begins on October 7, and the meeting is called off. [Dawn (Karachi), 2/15/2002; Financial Times, 3/6/2003] At least part of this team will later play another behind-the-scenes role. After being given a tip that Mansoor Ijaz is connected to leading militant Muslims in Pakistan, reporter Daniel Pearl will connect with Khalid Khawaja, who in turn connects him with militant Muslims who kidnap and eventually kill him. A leading Pakistani newspaper will claim that at one point Newsweek is about to accuse Khawaja of involvement in the plot to kidnap Pearl, but Ijaz vouches for Khawaja and convinces Newsweek to pull back its accusations. [Dawn (Karachi), 2/15/2002; Vanity Fair, 8/2002]
Abdul Haq. [Source: Abdul Haq Foundation]Abdul Haq, a leader of the Afghan resistance to the Taliban, is killed. According to some reports, he “seemed the ideal candidate to lead an opposition alliance into Afghanistan to oust the ruling Taliban.” [Observer, 10/28/2001] Four days earlier, he had secretly entered Afghanistan with a small force to try to raise rebellion, but was spotted by Taliban forces and surrounded. He calls former National Security Adviser Robert McFarlane (who had supported him in the past) who then calls the CIA and asks for immediate assistance to rescue Haq. A battle lasting up to twelve hours ensues. (The CIA had previously rejected Haq’s requests for weapons to fight the Taliban, and so his force is grossly underarmed.) [Sydney Morning Herald, 10/29/2001] The CIA refuses to send in a helicopter to rescue him, alleging that the terrain is too rough, even though Haq’s group is next to a hilltop once used as a helicopter landing point. [Observer, 10/28/2001; Los Angeles Times, 10/28/2001] An unmanned surveillance aircraft eventually attacks some of the Taliban forces fighting Haq, but not until five hours after Haq has been captured. The Taliban executes him. [Wall Street Journal, 11/2/2001] Vincent Cannistraro, former head of the CIA’s Counter Terrorism Center, and others suggest that Haq’s position was betrayed to the Taliban by the ISI. Haq was already an enemy of the ISI, which may have killed his family. [Village Voice, 10/26/2001; USA Today, 10/31/2001; Knight Ridder, 11/3/2001; Toronto Star, 11/5/2001]
According to author Ron Suskind, some time in November the US makes a deal with Pakistani President Pervez Musharraf. Pakistan will seal off the passages to Pakistan from the Tora Bora region in Afghanistan where Taliban and al-Qaeda forces are expected to gather. In return, the US will give Pakistan nearly a billion dollars in new economic aid. Pakistan will fail to effectively seal the border in the next month (see December 10, 2001) and almost the entire force in Tora Bora will escape into Pakistan. [Suskind, 2006, pp. 58]
The US military loses both a helicopter and a drone in Afghanistan on the same day. The Taliban claim that the helicopter was shot down and that up to 50 US soldiers died in the crash, which was just south of Kabul. “All together between 40 to 50 Americans have died in both these incidents,” Qari Fazil Rabi, a Taliban information ministry official, tells Reuters. “You can see the bodies of the Americans on board the helicopters with their uniforms.” However, the Pentagon dismisses the claims, blaming bad weather for the crash landing of the special forces helicopter and the loss of the drone. According to the Pentagon, the helicopter had a crew of four and was on a mission to pick up a sick soldier. The crew members were injured in the crash, but were rescued by another helicopter, and the downed helicopter was later destroyed by F-14 Tomcats from the aircraft carrier USS Theodore Roosevelt. According to The Guardian, “Such a search-and-destroy mission would only take place if the items on the helicopter were considered extremely sensitive and the US military did not want it to fall into enemy hands.” [Guardian, 11/3/2001]
The US, lacking local agents and intelligence in Afghanistan, is said to be heavily reliant on the ISI for information about the Taliban. The US is said to be confident in the ISI, even though the ISI was the main supporter of the Taliban up until 9/11. Knight Ridder Newspapers comments, “Anti-Taliban Afghans, foreign diplomats, and Pakistani government security officials say that pro-Taliban officers remain deeply embedded within ISI and might still be helping America’s enemies inside Afghanistan.” A leader of the resistance to the Taliban says, “There are lots of (ISI) officers who are fully committed to the way of the Taliban and Osama bin Laden.” Former ISI Director Hamid Gul says, “It is a foolish commander who depends on someone else’s intelligence, especially when that someone doesn’t like him and was once friendly with the enemy.”
[Knight Ridder, 11/3/2001] Later in the month another article notes that the CIA continues to rely on the ISI for covert actions against the Taliban. One CIA agent says, “The same Pakistani case officers who built up the Taliban are doing the translating for the CIA. Our biggest mistake is allowing the ISI to be our eyes and ears.”
[Toronto Star, 11/5/2001]
The Taliban abandon the strategic northern Afghan city of Mazar-i-Sharif, allowing the Northern Alliance to take control. [Associated Press, 8/19/2002] The Taliban abandons the rest of Northern Afghanistan in the next few days, except the city of Kunduz, where most of the Taliban flee. Kunduz falls on November 25, but not before most of the thousands of fighters there are airlifted out (see November 14-25, 2001). [New Yorker, 1/21/2002]
Jamal Udeen, a British national of Jamaican descent who has been imprisoned since October (see October 2001), along with a handful of other non-Afghans, is left in a Kandahar prison when the Taliban leadership flees the advancing Northern Alliance troops. Having lost his passport, Udeen does not know how to leave the country. The International Committee of the Red Cross (ICRC) visits the jail and asks him if he wants to go to Pakistan together with some Pakistanis who were also prisoners of the Taliban and who will be allowed to cross the border. But with “no money and no way of getting back to Britain,” Udeen decides to remain in Kandahar. [Mirror, 3/12/2004]
Northern Alliance forces entering Kabul. One holds a poster of recently assassinated Northern Alliance leader Ahmed Shah Massoud. [Source: Getty Images] (click image to enlarge)Kabul, Afghanistan’s capital, falls to the Northern Alliance. The Taliban will abandon the rest of the country over the next few weeks. [BBC, 11/13/2001] The US and Pakistan did not want the Northern Alliance to conquer Kabul for ethnic and strategic regions. But after a change in US bombing tactics, the Taliban front line unexpectedly and suddenly collapsed, making this conquest all but inevitable (see October-Early November 2001). It is later reported that the US paid about $70 million in bribes to get dozens of Taliban leaders to surrender or change sides. This is credited with assisting the sudden collapse of Taliban forces. [Washington Times, 2/7/2002; Washington Post, 11/18/2002]
Bin Laden gave a speech in front of about 1,000 supporters on November 10, 2001 in the town of Jalalabad, Afghanistan. [Christian Science Monitor, 3/4/2002] On the night of November 13, a convoy of 1,000 or more al-Qaeda and Taliban fighters escapes from Jalalabad and reaches the fortress of Tora Bora after hours of driving and then walking. Bin Laden is believed to be with them, riding in one of “several hundred cars” in the convoy. The US bombs the nearby Jalalabad airport, but apparently does not attack the convoy. [Christian Science Monitor, 3/4/2002; Knight Ridder, 10/20/2002] The Northern Alliance captures Jalalabad the next day. [Sydney Morning Herald, 11/14/2001]
At the request of the Pakistani government, the US secretly allows rescue flights into the besieged Taliban stronghold of Kunduz, in Northern Afghanistan, to save Pakistanis fighting for the Taliban (and against US forces) and bring them back to Pakistan. Pakistan’s President “Musharraf won American support for the airlift by warning that the humiliation of losing hundreds—and perhaps thousands—of Pakistani Army men and intelligence operatives would jeopardize his political survival.”
[New Yorker, 1/21/2002] Dozens of senior Pakistani military officers, including two generals, are flown out. [NOW with Bill Moyers, 2/21/2003] In addition, it is reported that the Pakistani government assists 50 trucks filled with foreign fighters to escape the town. [New York Times, 11/24/2001] Many news articles at the time suggest an airlift is occurring. [Independent, 11/16/2001; New York Times, 11/24/2001; BBC, 11/26/2001; Independent, 11/26/2001; Guardian, 11/27/2001; MSNBC, 11/29/2001] Significant media coverage fails to develop, however. The US and Pakistani governments deny the existence of the airlift. [US Department of State, 11/16/2001; New Yorker, 1/21/2002] On December 2, when asked to assure that the US did not allow such an airlift, Rumsfeld says, “Oh, you can be certain of that. We have not seen a single—to my knowledge, we have not seen a single airplane or helicopter go into Afghanistan in recent days or weeks and extract people and take them out of Afghanistan to any country, let alone Pakistan.”
[MSNBC, 4/13/2003] Reporter Seymour Hersh believes that Rumsfeld must have given approval for the airlift. [NOW with Bill Moyers, 2/21/2003] However, The New Yorker magazine reports, “What was supposed to be a limited evacuation apparently slipped out of control and, as an unintended consequence, an unknown number of Taliban and al-Qaeda fighters managed to join in the exodus.” A CIA analyst says, “Many of the people they spirited away were in the Taliban leadership” who Pakistan wanted for future political negotiations. US intelligence was “supposed to have access to them, but it didn’t happen,” he says. According to Indian intelligence, airlifts grow particularly intense in the last three days before the city falls on November 25. Of the 8,000 remaining al-Qaeda, Pakistani, and Taliban, about 5,000 are airlifted out and 3,000 surrender. [New Yorker, 1/21/2002] Hersh later claims that “maybe even some of bin Laden’s immediate family were flown out on those evacuations.”
[NOW with Bill Moyers, 2/21/2003]
Hazrat Ali. [Source: Robert Nickelsberg / Getty Images]Hazrat Ali and Haji Zaman Ghamsharik, warlords in the Tora Bora region of Afghanistan, both later claim that they are first approached in the middle of November by US officers and asked to take part in an attack on Tora Bora. They agree. [Christian Science Monitor, 3/4/2002] By late November, the US-allied warlords assemble a motley force of about 2,500 Afghans supported by a fleet of old Russian tanks at the foot of the Tora Bora mountains. They are poorly equipped and trained and have low morale. The better-equipped Taliban and al-Qaeda are 5,000 feet up in snow-covered valleys, forests, and caves. [New York Times Magazine, 9/11/2005] On December 3, a reporter for the Christian Science Monitor overhears Ali in a Jalalabad, Afghanistan, hotel making a deal to give three al-Qaeda operatives safe passage out of the country. [Christian Science Monitor, 3/4/2002] The US chooses to rely mainly on Hazrat Ali’s forces for the ground offensive against Tora Bora. Ali supposedly pays one of his aides $5,000 to block the main escape routes to Pakistan. But in fact this aide helps Taliban and al-Qaeda escape along these routes. Afghan villagers in the area later even claim that they took part in firefights with fighters working for Ali’s aide who were providing cover to help al-Qaeda and Taliban escape. [Christian Science Monitor, 3/4/2002] Author James Risen later claims, “CIA officials are now convinced that Hazrat Ali’s forces allowed Osama bin Laden and his key lieutenants to flee Tora Bora into Pakistan. Said a CIA source, ‘We realized those guys just opened the door. It wasn’t a big secret.’” While the US will never publicly blame Ali for assisting in the escape, the CIA will internally debate having Ali arrested by the new Afghan government. But this idea will be abandoned and Ali will become the new strongman in the Jalalabad region. [Risen, 2006, pp. 168-169] CIA official Michael Scheuer later will comment, “Everyone who was cognizant of how Afghan operations worked would have told Mr. Tenet that [his plan to rely on Afghan warlords] was nuts. And as it turned out, he was.… The people we bought, the people Mr. Tenet said we would own, let Osama bin Laden escape from Tora Bora in eastern Afghanistan into Pakistan.” [PBS Frontline, 6/20/2006]
A Tora Bora cave used by al-Qaeda forces in December 2001. [Source: Chris Hondros / Getty Images]According to Newsweek, approximately 600 al-Qaeda and Taliban fighters, including many senior leaders, escape Afghanistan on this day. This is the first day of heavy bombing of the Tora Bora region (see November 16, 2001). There are two main routes out of the Tora Bora cave complex to Pakistan. The US bombs only one route, so the 600 are able to escape without being attacked using the other route. Hundreds will continue to use the escape route for weeks, generally unbothered by US bombing or Pakistani border guards. US officials later privately admit they lost an excellent opportunity to close a trap. [Newsweek, 8/11/2002] On the same day, the media reports that the US is studying routes bin Laden might use to escape Tora Bora [Los Angeles Times, 11/16/2001] , but the one escape route is not closed, and by some accounts bin Laden and others escape into Pakistan will use this same route several weeks later (see November 28-30, 2001). High-ranking British officers will later privately complain, “American commanders had vetoed a proposal to guard the high-altitude trails, arguing that the risks of a firefight, in deep snow, gusting winds, and low-slung clouds, were too high.” [New York Times, 9/30/2002]
A US airstrike in the Tora Bora region. [Source: Gary Bernsten]Heavy US bombing of Tora Bora, the Taliban and al-Qaeda mountainous stronghold near the Pakistani border, begins. A large convoy containing bin Laden and other al-Qaeda leaders arrived in Tora Bora about three day earlier. The son of a tribal elder later recalls, “At first, we thought that the US military was trying to frighten the Arabs out, since they were only bombing from one side.” Rather than send in US ground forces in large numbers, the US chooses to supply two local warlords and have their fighters do most of the fighting while heavy bombing continues. Within days, a small number of US special forces are brought in to assist the local warlords. One of the warlords chosen, Haji Zaman Ghamsharik, was actually living in exile in France and has to be flown to Afghanistan. He is “known to many as a ruthless player in the regional smuggling business.” Between 1,500 to 2,000 of bin Laden’s fighters are in Tora Bora when the battle begins. [Christian Science Monitor, 3/4/2002; Knight Ridder, 10/20/2002] There are two main mountain passes out of Tora Bora and into Pakistan. From the beginning on this day, eyewitnesses report that the US bombs only one pass. [Newsweek, 8/11/2002] The fighting and bombing will continue through early December (see December 5-17, 2001) while bin Laden and most of his forces escape via the other pass (see November 28-30, 2001).
Foreign Taliban fighters agree to be transported to Erganak, located 12 miles west of Kunduz. But to their surprise they arrive in a desert on the outskirts of Mazar-i-Sharif. According to some sources, the “foreigners [were] tricked into going to Mazar on the understanding they would attack it.” Tension increases when they realize they have actually surrendered. After some negotiating, a second agreement is made with Amir Jan, a Northern Alliance commander with Pashtun roots. The foreign fighters are told by their Taliban commander to disarm—but are not told that they will later be detained as prisoners. Amir Jan tells the Guardian of London: “The foreigners thought that after surrendering to the Northern Alliance they would be free. They didn’t think they would be put in jail.” [Guardian, 11/27/2001; London Times, 11/28/2001; Guardian, 12/1/2001]
Taliban fighters being transported to Qala-i-Janghi fortress. [Source: CNN/House of War]The foreign Taliban fighters, who surrendered in Kunduz the day before (see November 23, 2001), are taken into custody by General Dostum who wants to send them to a Soviet-built airfield in Mazar-i-Sharif. But US Special Forces say the runway might be needed for military operations. A last minute decision is then made to transport the prisoners to Dostum’s 19th Century Qala-i-Janghi fortress. Prior to leaving for the compound, all of the Taliban and al-Qaeda fighters are supposed to be disarmed, but for some reason fighters in only three of the five transport vehicles are actually checked. [Guardian, 11/27/2001; Guardian, 12/1/2001] The foreign Taliban fighters arrive at the Qala-i-Janghi fort early in the morning. When some of Dostum’s men attempt to frisk the group of fighters who have not yet been disarmed, one of the Chechen prisoners detonates a hand grenade, killing himself, several other prisoners, and two Northern Alliance commanders. As a result, the weapons search is abandoned and the prisoners are herded into a stable area north of the fort. Between two and eight of the prisoners in the stable area blow themselves up that night. As a result, the Northern Alliance decides to relocate them into the basement of the fortress. [London Times, 11/28/2001; Guardian, 12/1/2001; Newsweek, 12/1/2001]
US troops are set to land near the Taliban stronghold of Kandahar, Afghanistan (see November 26, 2001). [Associated Press, 8/19/2002] Apparently, as the noose tightens around Kandahar, Hamid Karzai, the new leader of Afghanistan, makes a deal with the Taliban. He gives them a general amnesty in return for surrender of the city. Taliban’s leader Mullah Omar is allowed to escape “with dignity” as part of the deal. However, the US says it will not abide by the deal and Karzai then says he will not let Omar go free after all. Taliban forces begin surrendering on December 7. [Sydney Morning Herald, 12/8/2001] Omar escapes.
Qala-i-Janghi fortress. [Source: CNN/House of War]After a sleepless night in the overcrowded basement in Dostum’s fortress, a group of Taliban prisoners, including John Walker Lindh, are led out, one by one, by the guards. They are searched, tied up and later seated in rows on an open lawn. [Newsweek, 12/1/2001; Guardian, 12/1/2001] Simon Brooks, head of the International Committee for the Red Cross in northern Afghanistan, arrives at the Qala-i-Janghi compound seeking an assurance from Said Kamal, Dostum’s security chief, that the prisoners will be treated in accordance with international law. He also wants to write the prisoners’ names down and get messages for their families. [Guardian, 12/1/2001] Another official from the Red Cross, Olivier Martin, is also inside Qala-i-Janghi making sure that the prisoners are being cared for in accordance with the Geneva Conventions. [Independent, 11/29/2001] Meanwhile, Northern Alliance fighters are tying up prisoners at the south end of the fortress. [London Times, 11/28/2001; Guardian, 11/29/2001; Guardian, 12/1/2001] The prisoners are scared and think the Northern Alliance is preparing to execute them. They believe that the two television crews—from Reuters and the German station ARD—present intend to film their deaths. One of the prisoners recalls, “Our hands were tied, and they were beating and kicking some of us. Some of the Mujahedin [Taliban] were scared, crying. They thought we were all going to be killed.” [New York Times, 11/28/2001; Newsweek, 12/1/2001; Guardian, 12/1/2001] One guard hits Lindh in the back of his head, so hard that he “nearly [loses] consciousness.” [United States of America v. John Walker Lindh, 6/13/2002 ]
CIA agent “Dave”. [Source: CNN/House of War]One of the prisoners who is being interrogated by the two CIA agents tells Mike Spann that he has come to Afghanistan “to kill” him. With that, the prisoner lunges towards him. At this point accounts differ over what happens. According to an early account, Mike Spann immediately shoots the prisoner and three others dead with his pistol before the nearby Taliban prisoners join the skirmish and “beat, kick, and bite” Spann to death. [London Times, 11/28/2001] In the other account, the prisoner who lunged towards Spann, used a grenade to blow him and Spann up, killing both of them immediately. [Guardian, 12/1/2001] “Dave,” the second CIA agent, then shoots at least one of the foreign Taliban fighters dead and flees the vicinity. He goes to General Dostum’s headquarters in the north side of the fort where he contacts the American embassy in Tashkent, Uzbekistan using a satellite phone borrowed from the German TV crew. He tells the embassy, “We have lost control of the situation. Send in helicopters and troops.” [Guardian, 12/1/2001] One witness later recalls, “David asked his superiors for choppers to be brought in, as well as ground troops to get everyone out. They sent about 40 American soldiers, but the choppers were too far away in Uzbekistan. David’s people offered to bring in gunships and bomb the Taliban. They would flatten the whole castle and kill us all. David told them twice they shouldn’t do that. They were really pressing for airstrikes and after three hours they started.” [London Times, 11/28/2001] Meanwhile, Dostum’s soldiers began to shoot indiscriminately at the rows of bound prisoners. Some are killed and as prisoners stand up and run for cover, more are shot in their flight. John Walker Lindh too tries to run but after two or three paces a bullet hits him in his right thigh and he falls to the ground. Unable to walk, with chaos all around him, Lindh pretends to be dead. He remains on the ground for the next twelve hours. The Taliban soldiers soon overpower their Northern Alliance captors, take their weapons and break into the arms depot located towards the center for the compound where they help themselves to Dostum’s mortars and rocket launchers. [London Times, 11/28/2001; Guardian, 12/1/2001; United States of America v. John Walker Lindh, 6/13/2002 ]
Mike Spann. [Source: CIA]In the morning, CIA agent “Dave,” US Special Forces, SAS soldiers, and an additional 200 Northern Alliance troops arrive at the Qala-i-Janghi fortress to fight the remaining ten or so Taliban fighters who are still resisting. One of the US soldiers warns journalists not to be inside the compound at night. [London Times, 11/28/2001; BBC, 12/1/2001; CNN, 8/3/2002] “To clear the last pockets of Taliban resistance in the afternoon, Alliance soldiers approached the houses in the middle of the compound and fired at random into basement windows,” the London Times later reports. “Some 20-liter petrol canisters were thrown in, then grenades.” [London Times, 11/28/2001] Alliance soldiers roaming the complex shoot at the bodies to make sure there are no survivors. They also loot corpses, stealing rifles, boots, clothing, and even gold fillings from their teeth. [Independent, 11/29/2001] According to an escaped prisoner, a Northern Alliance tank runs over the bodies of injured survivors. [Pakistan News Service (Newark, CA), 12/3/2001] A tank attacks the western half of the compound and reportedly kills the last two remaining holdouts who are still fighting. By noon, “the ground was littered with countless mangled bodies,” the London Times reports. [London Times, 11/28/2001; BBC, 12/1/2001] Foreign reporters are allowed in the compound. One Associated Press photographer sees Northern Alliance soldiers removing the bindings from the hands of the dead Taliban fighters. [Independent, 11/29/2001] In the afternoon, it is discovered that there are about 100 survivors in the basement of a one-story building at the center of the compound. US Special Forces order Northern Alliance soldiers to pour diesel fuel into the basement and ignite it. [Newsweek, 12/1/2001] General Dostum’s men pour fuel down several air ducts, two of which lead into a room where John Walker Lindh is sitting, drenching him. Unable to walk, he has to crawl away from the air ducts. Some minutes later, the fuel is lit and fire spreads quickly throughout the basement. “People were being burned alive,” an eyewitness will recall. Lindh loses consciousness in the smoke-filled air, while Dostum’s soldiers fire rockets amidst the surviving Taliban. The report by Lindh’s defense will say, “Human remains litter the entire basement floor.” [United States of America v. John Walker Lindh, 6/13/2002 ] At dusk, US soldiers recover CIA agent Mike Spann’s (see September 10, 2001) booby-trapped body. [CNN, 8/3/2002]
The Northern Alliance assaults Qala-i-Janghi fortress. [Source: CNN/House of War]Northern Alliance General Abdul Rashid Dostum returns to the Qala-i-Janghi fortress from Kunduz. Three health officials attempting to enter the basement where Taliban survivers are still holding out are shot by armed Taliban who refuse to surrender. Several Taliban mullahs brought in by Dostum are unable to convince the holdouts to surrender. [CNN, 8/3/2002]
A mass grave dug up near Mazar-i-Sharif, Afghanistan.
[Source: Physicians for Human Rights]Even as the US is allowing some Taliban and al-Qaeda to secretly fly out of Kunduz, Afghanistan (see November 14-25, 2001), it allows a brutal massacre of those who had to stay behind. The Glasgow Sunday Herald later says, “It seems established, almost beyond doubt, that US soldiers oversaw and took part in horrific crimes against humanity,” which resulted in the death of thousands of Taliban supporters who surrendered after Kunduz fell to the Northern Alliance. The documentary, Afghan Massacre: Convoy of Death, exposes this news widely in Europe, but the massacre goes virtually unreported in the US. [Sunday Herald (Glasgow), 6/16/2002]
Northern alliance fighters retaking Qala-i-Janghi fortress. [Source: CNN/House of War]After a number of survivors are discovered in the basement of the Qala-i-Janghi fortress, Northern Alliance soldiers drop artillery rockets into the basement and detonate them by fuses. [Newsweek, 12/1/2001; CNN, 8/3/2002] Northern Alliance soldiers then redirect an irrigation stream into the basement of a one-story building in the Qala-i-Janghi fortress where surviving Taliban soldiers are, flooding it with freezing cold water. John Walker Lindh almost drowns and suffers from hypothermia. Most of the remaining prisoners die because of the water, and throughout the basement “the stench from decaying human remains becomes particularly acute.” [Newsweek, 12/1/2001; United States of America v. John Walker Lindh, 6/13/2002 ]
Taliban survivors who have been holding out in the basement of a one-story building in the Qala-i-Janghi fortress surrender. [Newsweek, 12/1/2001] John Walker Lindh is found “with approximately 15 dead or dying persons on the floor.” [United States of America v. John Walker Lindh, 6/13/2002 ] Of the more than 300 prisoners who arrived with Lindh a week before, only 86 survive. “Everyone was in poor health, and most of them were traumatized, with absent looks on their faces,” Oliver Martin, chief of the International Committee of the Red Cross (ICRC) delegation at Mazar-i-Sharif, later recalls. “It must have been hell and horror for them.” [United States of America v. John Walker Lindh, 6/13/2002 ] For around six hours, Lindh and many other wounded and dying prisoners are locked in an overcrowded dark container. He is then moved to the back of an open-air truck, from where he notices ICRC officials and members of the media. It then appears that Northern Alliance leader Abdul Rashid Dostum intended to suffocate the prisoners inside the container, but that the presence of the ICRC and journalists has prevented that. [United States of America v. John Walker Lindh, 6/13/2002 ] Lindh and the other surviving but wounded Taliban are taken to the town of Sheberghan. [United States of America v. John Walker Lindh, 6/13/2002 ]
In the middle of December, the US government discloses that some 7,000 Taliban and al-Qaeda members have been captured. While they are at that time mostly held by Afghan and Pakistani forces, they will all have to be screened so their leaders can stand trial. [San Francisco Chronicle, 12/22/2001]
Four prisoners captured at Tora Bora and shown to the media on December 17, 2001. [Source: Getty Images]US-allied forces declare that the battle of Tora Bora has been won. A ten-day ground offensive that began on December 5 has cleared out the remaining Taliban and al-Qaeda forces in Tora Bora. The Afghan war is now widely considered to be over. However, many will later consider the battle a failure because most of the enemy escapes (see December 5-17, 2001), and because the Taliban will later regroup. [Christian Science Monitor, 3/4/2002] The Christian Science Monitor later reports that up to 2,000 Taliban and al-Qaeda were in the area when the battle began. The vast majority successfully fled, and only 21 al-Qaeda fighters were finally captured. [Christian Science Monitor, 3/4/2002] US intelligence analysts later estimate that around 1,000 to 1,100 al-Qaeda fighters and an unknown number of leaders escaped Tora Bora, while Pakistani officials estimate 4,000 fighters plus 50 to 80 leaders escaped (see October 2004). [Knight Ridder, 10/30/2004] Author Ron Suskind will suggest in 2006 that there were just over 1,000 al-Qaeda and Taliban in the area, and of those, 250 were killed or captured. [Suskind, 2006, pp. 75Sources:Ron Suskind] Bin Laden left the area by December 15, if not earlier (see December 15, 2001 and Mid-December 2001). It is believed that al-Qaeda’s number two leader, Ayman al-Zawahiri, also escaped the area around the same time. [Knight Ridder, 10/20/2002]
The Guardian reports that many in Afghanistan intelligence say former top Taliban officials are living openly in villas in Afghanistan and Pakistan. At least four top leaders who had been caught have been simply released. Yet another leader, wanted by the US for harboring al-Qaeda operatives at his compound, is able to escape a very loose house arrest in mid-December. Two soldiers were checking on him once a day. One intelligence source claims to know the exact location of many, and says they could be rounded up within hours. A former Taliban minister now working with the Northern Alliance also claims: “Some are living in luxury in fine houses, they are not hiding in holes. They could be in jail by tonight if the political will existed.” The US claims it is working hard to find and catch these leaders. [New York Times, 12/20/2001; Guardian, 12/24/2001] However, it will later be revealed that the US is aware of these Taliban living in Pakistan but will not seriously press Pakistan about them until 2006 (see 2002-2006).
In the 1990s, Afghan drug kingpin Haji Bashir Noorzai developed close ties to Taliban top leader Mullah Omar, al-Qaeda, and the Pakistani ISI. He becomes the top drug kingpin in Taliban-controlled Afghanistan. He is also reputedly the richest person in Afghanistan and the Taliban’s banker. For instance, according to US sources, as the Taliban began their military defeat after 9/11, they entrusted Noorzai with as much as $20 million in Taliban money for safekeeping. But he then surrenders to the US military in Afghanistan. Noorzai later says of this time, “I spent my days and nights comfortably. There was special room for me. I was like a guest, not a prisoner.” [CBS News, 2/7/2002; Risen, 2006, pp. 152-162] He spends several days in custody at the Kandahar airport. He speaks to US military and intelligence officials, but is released before Drug Enforcement Agency (DEA) agents arrive in the country to question him. [National Public Radio, 4/26/2002] The other top drug kingpin for the Taliban is also arrested then let go by the US at this time (see December 2001 and After). Noorzai then lives in Pakistan, where he has been given a Pakistani passport by the ISI. He operates drug-processing laboratories there and has little trouble traveling to other countries. [Risen, 2006, pp. 152-162] In 2004 it will be reported, “According to House International Relations Committee testimony this year, Noorzai smuggles 4,400 pounds of heroin out of the Kandahar region to al-Qaeda operatives in Pakistan every eight weeks.” [USA Today, 10/26/2004]
Helaluddin Helal, Afghanistan’s deputy interior minister in 2002 and 2003, later claims that he becomes convinced at this time that Pakistani ISI officers are protecting bin Laden. He says that he passes intelligence reports on the location of Taliban and al-Qaeda leaders in Pakistan, but nothing is done in response. “We would tell them we had information that al-Qaeda and Taliban leaders were living in specific areas. The Pakistanis would say no, you’re wrong, but we will go and check. And then they would come back and say those leaders are not living there. [The Pakistanis] were going to these places and moving the al-Qaeda or Taliban leaders.” [McClatchy Newspapers, 9/9/2007] Some al-Qaeda leaders are captured during this time, but there are also reports that Taliban leaders are living openly in Pakistan (see December 24, 2001 and 2002-2006).
Robert Grenier, head of the CIA station in Islamabad, Pakistan, later says that the issue of fugitive Taliban leaders living in Pakistan was repeatedly raised with senior Pakistani intelligence officials in 2002. “The results were just not there. And it was quite clear to me that it wasn’t just bad luck.” [New York Times, 8/12/2007] For instance, in December 2001 the Guardian reported that many Taliban leaders are living openly in large villas in Pakistan (see December 24, 2001). But Grenier decides that Pakistan will not act on the Taliban and urges them to focus on arresting al-Qaeda operatives instead. “From our perspective at the time, the Taliban was a spent force. We were very much focused on al-Qaeda and didn’t want to distract the Pakistanis from that.” Zalmay Khalilzad, US ambassador to Afghanistan, US military officials, and some Bush administration officials periodically argue that the Taliban are crossing from Pakistan into Afghanistan and killing US soldiers and aid workers (see August 18, 2005 and June 18, 2005). But it is not until some time in 2006 that President Bush strenuously presses Pakistani President Pervez Musharraf about acting on the Taliban leaders living in Pakistan. Even then, Bush reportedly tells his aides that he worries the ties between the Pakistani ISI and the Taliban continue and no serious action will be taken despite Musharraf’s assurances. [New York Times, 8/12/2007]
Mullah Mohammed Omar. [Source: CBC]The US allegedly locates former Taliban leader Mullah Omar and 1,500 of his soldiers in the remote village of Baghran, Afghanistan. After a six-day siege, and surrounded by US helicopters and troops, Omar and four bodyguards supposedly escape the dragnet in a daring chase on motorcycles over dirt roads. His soldiers are set free in return for giving up their weapons, in a deal brokered by local leaders. Yet it remains unclear if Omar was ever in the village in the first place. [Observer, 1/6/2002]
Mullah Mohammed Khaksar. [Source: Agence France-Presse]Time magazine reports the CIA is still not interested in talking to Mullah Mohammed Khaksar, easily the highest ranking Taliban defector. Khaksar was the Taliban’s deputy interior minister, which put him in charge of vital security matters. He was secretly giving the Northern Alliance intelligence on the Taliban since 1997, and he had sporadic and mostly unsuccessful efforts trying to give information to the US while he still worked for the Taliban (see April 1999 and Between September 12 and Late November 2001). In late November 2001, he defected to the Northern Alliance and was given an amnesty due to his secret collaboration with them. He continues to live in his house in Kabul after the defeat of the Taliban, but is unable to get in contact with US intelligence. In February 2002, Time magazine informs US officials that Khaksar wants to talk, but two weeks later the magazine will report that he still has not been properly interviewed. [Time, 2/25/2002] The US may be reluctant to speak to him because much of what he has to say seems to be about al-Qaeda’s links with the Pakistani ISI, and the US is now closely working with Pakistan. Time magazine reports, “The little that Khaksar has divulged to an American general and his intelligence aide—is tantalizing.… He says that the ISI agents are still mixed up with the Taliban and al-Qaeda,” and that the three groups have formed a new political group to get the US out of Afghanistan. He also says that “the ISI recently assassinated an Afghan in the Paktika province who knew the full extent of ISI’s collaboration with al-Qaeda.” [Time, 2/19/2002] He will similarly comment to journalist Kathy Gannon that bin Laden’s foreign fighters in Afghanistan “were all protected by the Taliban leadership, but their money and instructions came direction from Pakistan’s ISI.” [Gannon, 2005, pp. 161] Khaksar will continue to live in Afghanistan until early 2006, when he is apparently assassinated by the Taliban. [Washington Post, 1/15/2006]
US troops investigate two dead bodies on March 17, 2002, as Operation Anaconda comes to a close. [Source: Joe Raedle/ Reuters]The US launches Operation Anaconda, a major offensive in Shah-i-Kot valley, near the town of Gardez, Afghanistan. About 2,000 US and allied soldiers attack a Taliban and al-Qaeda stronghold in the valley. The goal is to surround and cut off the Taliban and al-Qaeda from being able to retreat into Pakistan. Officially, the operation is hailed as an easy victory. For instance, Gen. Tommy Franks calls the operation “an unqualified and absolute success.” [Radio Free Europe, 3/20/2002] A Pentagon spokesperson calls the operation “a great success,” and says that of the hundreds or even thousands of enemy fighters trapped in the valley,“less than 100 escaped.” [New York Times, 3/14/2002] Up to 800 Taliban and al-Qaeda fighters are reported killed. [New York Times, 3/14/2002]Unexpected Resistance - However, other accounts paint a different picture. The operation runs into unexpected resistance from the start, and eight US soldiers and a small number of allied Afghan fighters are killed in the first few days. The London Times later notes, “what was to have been a two-day operation stretched to 12.” Australian special forces troops who took part later say the operation was botched. “They blamed much of the problem on inadequate US air power, poor intelligence, and faulty technology.” [Radio Free Europe, 3/20/2002; London Times, 6/18/2002]Militants Able to Escape - It appears that, as in Tora Bora, Afghan warlord armies supervised by a small number of US special forces, were given the key task of cutting off escape routes. At least one of the warlords involved had tricked the US military earlier in the war. “Although [Afghan] commanders insisted from the start of the campaign that the slopes were surrounded, [one Afghan commander] admitted that there had been at least one escape route” left open. The Guardian notes that “US troops spent weeks planning the attack on Shah-i-Kot, training and arming Afghan soldiers to prevent a repeat of the battle at Tora Bora,” but nonetheless, “nearly all the Taliban and al-Qaeda fighters appeared to have fled the area.” [Washington Post, 3/4/2002; Guardian, 3/15/2002] Most flee across the border into Pakistan (see December 2001-Spring 2002). The New York Times even reported that “some participants… said the Taliban had more or less come and gone as they pleased, visiting villagers in nearby towns.” [New York Times, 3/14/2002] One captured Taliban soldier who fought in the battle later claims that bin Laden made a brief personal appearance to rally his troops. [Newsweek, 8/11/2002] Only about 20 prisoners are captured and fewer than 20 bodies are found. [New York Times, 3/14/2002; New York Times, 3/18/2002] After retreating, the Taliban and al-Qaeda will change strategies and no longer attempt to congregate in Afghanistan in large numbers.
A suspected Taliban member named Abdullah is taken into US custody, together with 34 other members of the Taliban army. According to Abdullah, the men have their heads hooded and their hands tied behind their backs with plastic zip ties. They are then taken to the US base in Kandahar where for several hours they are ordered to lie down on the stony ground. During this time, Abdullah is kicked in the ribs. The men are shaved of all their facial and body hair. Abdullah later complains that he was shaved by a woman. [Amnesty International, 8/19/2003] This means that the technique of “forced grooming,” authorized by Defense Secretary Donald Rumsfeld for use at Guantanamo between December 2, 2002 and January 15, 2003 (see December 2, 2002), is allegedly already being used in Afghanistan in the spring of 2002. This technique is considered extremely humiliating for Muslim males.
US troops raid a compound in Sangesar, a village close to Kandahar, and arrest more than thirty anti-Taliban fighters, presumably by mistake. Taken to Kandahar, they are “thrown down,” face first, onto the ground, by US soldiers. One detainee later recalls: “They picked me up and threw me down on the rocks. It was painful. I couldn’t rest on my chest. When I moved they kicked me.” Another says he is held by the feet and head and kicked in the back repeatedly. [Associated Press, 3/23/2002]
A CIA case officer tells Adam Rice, a US Special Forces operations sergeant working out of a safe house near Kandahar, Afghanistan, that a figure believed to be top Taliban leader Mullah Omar has been tracked by a Predator drone to a location in Shah-i-Kot Valley, a short flight away. Omar and the group with him would be vulnerable to a helicopter assault. However, whenever Rice’s team wants to move more than five kilometers from their safe house, they are required to file a request in advance. If fighting is involved, the request has to pass through several layers of bureaucracy, and a three-star general has to give the final okay. The process can take days, and in this case it does. The target eventually moves on before permission is given. [Newsweek, 8/28/2007]
US Special Forces apprehend Mullah Akhter Mohammed Osmani, a top general and one of the six most-wanted Taliban, in Kandahar. He is flown to a detention center north of Kabul for interrogation, but is released a few weeks later and escapes to Pakistan. Contradicting the statements of many soldiers in Kandahar, the Defense Intelligence Agency says it “has no knowledge that Mullah Akhter Mohammed Osmani was ever in US custody in Afghanistan.” [Washington Times, 12/18/2002] Curiously, the CIA took part in secret talks with Osmani over the fate of bin Laden (see Mid-September-October 2, 2001). Osmani will be killed in an air strike at the end of 2006 (see December 19, 2006).
With the US having diverted much of their best troops and equipment to Iraq, the Taliban and al-Qaeda begin regrouping inside Afghanistan. In August 2002, it is reported that former Taliban head Mullah Omar has secretly returned to Afghanistan and is living in remote hideouts near Kandahar. [Guardian, 8/30/2002] In September, US intelligence officials say “al-Qaeda operatives who found refuge in Pakistan are starting to regroup and move back into Afghanistan… The movement back into Afghanistan is still relatively small and involves al-Qaeda members traveling in small groups, the officials say.… American officials say the world’s largest concentrations of al-Qaeda operatives are now in Afghanistan and Pakistan, and the recent influx into Afghanistan is creating new dangers.” [New York Times, 9/10/2002] In December, a United Nations report claims that al-Qaeda training camps have recently been reactivated in Afghanistan, and new volunteers are making their way to the camps. While the new camps are basic, they are said to be “increasing the long-term capabilities of the al-Qaeda network.” [Associated Press, 12/17/2002]
Habibullah. [Source: CBS]Mullah Habibullah, a 30-year-old Afghan from the southern province of Oruzgan, dies of complications related to “blunt force trauma” while in detention at the US base at Bagram. [Washington Post, 3/5/2003; BBC, 3/6/2003; Guardian, 3/7/2003; New York Times, 9/17/2004] Habibullah was captured by an Afghan warlord on November 28, 2002, and delivered to Bagram by the CIA on November 30. Habibullah is identified as the brother of a former Taliban commander, and later described as portly, well-groomed, and, in the words of American military police officer Major Bobby Atwell, “very confident.” [New York Times, 5/20/2005]Injured When Delivered into US Custody - When Habibullah arrived at the US air base, he was reportedly already severely hurt. Despite his condition, according to one account, he was isolated “in a ‘safety’ position [stress position], with his arms shackled and tied to a beam in the ceiling.” He was left in that position for days, but regularly checked on. [Knight Ridder, 8/21/2004]Targeted for Abuse - Though battered and ill, Habibullah’s defiance makes him a target for physical abuse, with the MPs and guards repeatedly attacking his legs. (Some guards will later claim Habibullah’s injuries were received when he tried to escape.) Most of the Americans will later describe Habibullah as insubordinate; one will recall being kneed in the groin by Habibullah after subjecting the prisoner to a rectal examination. Habibullah’s interrogations produce little of worth, in part because the MPs who interrogate him usually have no interpreters available. Sometimes the MPs demand that another prisoner translate for them; usually the interrogation sessions contain no more than physical restraints or beatings. [New York Times, 5/20/2005] At some point, Sgt. James P. Boland, a guard from the Army Reserve’s 377th MP Company from Cincinnati, allegedly watches as a subordinate beats Habibullah. [New York Times, 9/17/2004] The beating of Habibullah was likely witnessed by British detainee Moazzam Begg, who will later say he witnessed the death of “two fellow detainees at the hands of US military personnel” while at Bagram (see July 12, 2004). [Guardian, 10/1/2004; New York Times, 10/15/2004]Complaints of Chest Pains Mocked - During his last interrogation session, on December 2, Habibullah spends the entirety of the session coughing and complaining of chest pains. His right leg is stiff and his right leg swollen. The interpreter for the session, Ebrahim Baerde, later recalls the interrogators “laughing and making fun of” Habibullah “because he was spitting up a lot of phlegm.” Habibullah is still defiant; when one interrogator asks if he wants to spend the rest of his life in handcuffs, Baerde will recall the prisoner retorting, “Yes, don’t they look good on me?” [New York Times, 5/20/2005]Found Dead, Hanging from Shackles - On December 3, Habibullah is found dead, still hanging in his shackles. [Washington Post, 3/5/2003; BBC, 3/6/2003; Guardian, 3/7/2003; New York Times, 9/17/2004] Boland sees Habibullah hanging from the ceiling of his cell, suspended by two sets of handcuffs and a chain around his waist. His body is slumped forward and his tongue is protruding. Boland, along with Specialists Anthony Morden and Brian Cammack, enters the cell. Cammack puts a piece of bread in Habibullah’s mouth; another soldier puts an apple in Habibullah’s hand, and it falls to the floor. According to Cammack, Habibullah’s spit gets on Cammack’s chest. Later, Cammack will acknowledge, “I’m not sure he spit at me,” but now he screams, “Don’t ever spit on me again!” and knees Habibullah in the thigh “maybe a couple” of times. Habibullah makes no response; his body swings limply from the chains. Twenty minutes later, the guards unchain Habibullah and lay him on the floor. He has no pulse. Cammack, according to another guard, “appeared very distraught” and “was running about the room hysterically.” An MP is sent to wake a medic, who refuses to respond, telling the MP to call an ambulance instead. By the time a second medic arrives at the cell, Habibullah is laid spreadeagled on the floor, eyes and mouth open. “It looked like he had been dead for a while, and it looked like nobody cared,” the medic, Staff Sergeant Rodney Glass, will later recall. Atwell will later recall that Habibullah’s death “did not cause an enormous amount of concern ‘cause it appeared natural.” The autopsy, completed five days later, will show bruises and abrasions on Habibullah’s chest, arms, and head. The body has severe contusions on the calves, knees, and thighs, and the sole print of a boot is on his left calf. The death will be attributed to a blood clot, probably caused by the severe injuries to his legs, which traveled to his heart and blocked the blood flow to his lungs. [New York Times, 5/20/2005] His legs have been struck so forcefully, according to one death certificate, it complicated his coronary artery disease. Another certificate will say the beating led to a pulmonary embolism, which is a blockage of an artery in the lungs, often caused by a blood clot. [USA Today, 5/31/2004]Commanding Officer Able to Hear Screams, Moans of Detainees - In charge of the military intelligence interrogators at Bagram at this time is Capt. Carolyn A. Wood. According to an anonymous intelligence officer, Wood should be aware of what is happening to prisoners at Bagram since interrogations take place close to her office. The intelligence officer will recall hearing screams and moans coming out from the interrogation and isolation rooms. [Knight Ridder, 8/21/2004]
Pakistan’s tribal region, shown in various colors, while the rest of Pakistan is in green. FATA stands for Federally Administered Tribal Areas, the bureaucratic name for the area. [Source: Public domain via Wikipedia]Thousands of al-Qaeda-linked militants have been regrouping in the Pakistan tribal region of South Waziristan (see Late May 2002 and June 2002). By late 2002, these forces begin regularly attacking US outposts, also known as firebases, just across the border in Afghanistan. In December 2002, the US is forced to abandon the Lawara firebase after phosphorus rockets fired on the base burn US Special Forces vehicles. US military officials begin to complain that the Pakistani government’s Frontier Corps is not only turning a blind eye to these attacks, but is actually helping al-Qaeda forces cross the border and providing covering fire for their attacks. US forces are not allowed to pursue al-Qaeda forces across the Pakistan border (see Early 2002 and After). In January 2003, US commander Lieutenant General Dan McNeill publicly speaks out about the situation despite orders from his superiors not to. He says, “US forces acknowledge the internationally recognized boundaries of Afghanistan, but may pursue attackers who attempted to escape into Pakistan to evade capture or retaliation.” Around the same time, the US media begins to report that the Pakistani government is allowing militants to attack US positions across the border (see December 2002-February 2003). Pakistan comes under increasing pressure to do something, but takes no action. Confident of their position, militants begin killing tribal elders who they suspect are not loyal to them, further cementing their control and causing many to flee. Some fleeing locals claim that the Pakistani ISI is frequently meeting with al-Qaeda and Taliban leaders there, such as Taliban leader Jalaluddin Haqqani, and apparently supporting them. [Rashid, 2008, pp. 440] The Pakistani army commander in the region, Lieutenant General Ali Jan Orakzai, is considered a close friend of Pakistani President Pervez Musharraf. It is believed he intensely hates the US and NATO, and has sympathy for the Taliban. He will later call them a “national liberation movement.” [Rashid, 2008, pp. 277, 384] The Pakistani army will finally launch its first limited attack against al-Qaeda in October 2003 (see October 2, 2003).
The Associated Press reports that suicide squads are being trained in Pakistan by al-Qaeda operatives to hit targets in Afghanistan. The bombers’ families are being promised $50,000. The Pakistani government denies the presence of any such camps. “But privately, some officials in Pakistan’s intelligence community and Interior Ministry say they believe there is such bomb training and that it is protected by Pakistani militants and Taliban sympathizers in the Pakistan military.” [Associated Press, 12/12/2002] Al-Qaeda is mostly based in the tribal region of South Waziristan, launching border attacks form there with the assistance from Pakistan’s ISI and the Frontier Corps (see December 2002-February 2003). In February 2003, the Wall Street Journal claims, “Western diplomats in Islamabad and Kabul, Afghan officials, and US army officers [in Afghanistan] now strongly believe that elements of Pakistan’s intelligence services and its religious parties are allowing the Taliban to regroup on the Pakistani side of the border. US officers say 90 percent of attacks they face are coming from groups based in Pakistan. Simply put, Pakistan’s strategy appears to be to continue hunting down non-Afghan members of al-Qaeda hiding in Pakistan, so a level of cooperation with the US continues, while at the same time allowing the Pashtun Taliban and others to maintain their presence in Pakistan. The US has not raised this issue publicly, fearing that it would destabilize [Pakistani President Pervez] Musharraf’s government.… [W]hile promising support to [Afghan leader Hamid Karzai], Pakistan is undermining him and the effort to erase terrorism from Afghanistan. American silence is only encouraging Pakistan’s Islamic parties, who now govern the North West Frontier Province, to extend an even greater helping hand to Afghan and Pakistani extremists. The Pakistani army has willingly played into their hands, rigging last October’s general elections so that the Islamic parties were unprecedently successful, releasing from jail leaders of banned terrorist groups, and encouraging them to mount pro-Iraq demonstrations. All this is part of a larger power play where Gen. Musharraf can claim to the Americans that he needs greater US support because he is threatened by fundamentalists. This is a game that every Pakistani regime since the 1980s has played with Washington, and it has always worked.” [Wall Street Journal, 2/11/2003]
There are several credible sightings by CIA and military informants of top Taliban leader Mullah Omar entering a mosque in Kandahar, Afghanistan. A Green Beret team located at a base just minutes away are ready to deploy to go after Omar, but each time US military commanders follow strict protocol and call in the Delta Force commando team instead. But this team is based hundreds of miles away near Kabul and it takes them several hours to arrive in Kandahar. By that time, Omar has disappeared. Apparently this is part of a pattern only allowing certain Special Forces units to go after important targets. The Washington Post will report in 2004 that any mission that takes Special Forces farther than two miles from a “firebase” requires as long as 72 hours to be approved. And on the rare occasions that such forces are authorized to act, they are required to travel in armed convoys, a practice that alerts the enemy. [Washington Post, 1/5/2004]
Defense Secretary Donald Rumsfeld announces that the 8,000 US soldiers in Afghanistan have ended major combat operations there and will now shift their focus to rebuilding the country. The US talks about reducing the number of troops in 2004 and replacing them with newly trained Afghan soldiers. Rumsfeld’s announcement comes on the same day that President Bush declares that combat operations have ended in Iraq (see May 1, 2003). Rumsfeld says that small-scale combat operations will continue to mop up pockets of Taliban and al-Qaeda resistance. [Washington Post, 5/2/2003] Over two years later, in June 2005, the New York Times will report that despite periodic predictions of the Taliban’s collapse, recent intense fighting “reveals the Taliban to be still a vibrant fighting force supplied with money, men and weapons.” While the Taliban may not be able to hold ground in the “almost forgotten war,” they have enough personnel and weapons to “continue their insurgency indefinitely” and render parts of the country ungovernable. [New York Times, 6/4/2005]
Up until 2004, suicide bombings were almost unheard of in Afghanistan. But beginning that year, the Taliban launches six suicide attacks. In 2005, the number increases to 21. In 2006, the number skyrockets to 141, causing 1,166 casualties. In 2007, the number remains steady at 137, but the number of casualties increases 50 percent to 1,730. On September 8, 2006, a suicide bomber hits a US convoy just outside the US embassy in Kabul, killing two US soldiers and 16 Afghans. The resulting investigation uncovers a suicide bomb support network in Kabul that links to militants in the tribal regions of Pakistan. Amrullah Saleh, the head of Afghanistan’s intelligence agency, says: “Every single bomber we arrest is linked to Pakistan in some way. The training, provisions, explosives, technical equipment, are all being manufactured in Pakistan, and the CIA knows this.” [Rashid, 2008, pp. 366-367]
In late 2001, a Pakistani named Abdullah Mahsud was arrested in northern Afghanistan and transferred to the US-run Guantanamo prison. He apparently concealed his true identity while there, and is released in March 2004. He returns to Waziristan, the Pakistani tribal region where he was born, and quickly becomes an important Taliban leader. The US Defense Department belatedly realizes he has been associated with the Taliban since he was a teenager, and calls him an “al-Qaeda-linked facilitator.” He earns a fearsome reputation by orchestrating attacks and kidnappings, starting later in 2004. His forces will sign a peace deal with the Pakistani government in early 2005 that effectively gives them control over South Waziristan (see February 7, 2005). Mahsud will be killed on July 24, 2007, just days after a peace deal between the Pakistani government and Waziristan militants collapses (see July 11-Late July, 2007). He reportedly blows himself up with a grenade while surrounded by Pakistani security forces in a town in Baluchistan province about 30 miles from the Afghan border that is also near Waziristan. A Pakistani official will say: “This is a big blow to the Pakistani Taliban. He was one of the most important commanders that the Taliban had in Waziristan.” [Washington Post, 7/25/2007]
The New York Times reports that, “For months Afghan and American officials have complained that even while Pakistan cooperates in the fight against al-Qaeda, militant Islamic groups there are training fighters and sending them into Afghanistan to attack American and Afghan forces.” One prisoner captured by the Afghan government says Pakistan is allowing militant groups to train and organize insurgents to fight in Afghanistan. Groups designated as terrorist organizations by the US and/or Pakistan have simply changed names and continue to operate freely. An anonymous Western diplomat says, “When you talk about Taliban, it’s like fish in a barrel in Pakistan. They train, they rest there. They get support.” The New York Times comments, “Western diplomats in Kabul and Pakistani political analysts have said that Pakistan has continued to allow the Taliban to operate to retain influence in Afghanistan.”
[New York Times, 8/4/2004]
The UN’s independent expert on human rights in Afghanistan, Cherif Bassiouni, visits the Afghan government’s Pul-i-Charkhi prison in Kabul where 725 Taliban members and Pakistani supporters are being held. After his visit, he describes conditions at the prison as “inhuman” and says that the prisoners should be released. He also wanted to visit the US-run detention centers in Afghanistan but US authorities rejected his request. Bassiouni says the US’s lack of transparency “raises serious concerns about the legality of detention and conditions of those detainees.”
[Reuters, 8/22/2004]
A meeting of tribesmen in Wana, South Waziristan, May 2004. [Source: Kamran Wazir]The Pakistani government signs a little-noticed agreement with Baitullah Mahsud, the chieftain of the Mahsud tribe in South Waziristan. Waziristan is in the tribal region of Pakistan near the Afghanistan border, and numerous media accounts suggest that Osama bin Laden and other top al-Qaeda leaders may be hiding out there. The deal, signed in the town of Sararogha and known as the Sararogha peace pact, prohibits forces in South Waziristan led by Abdullah Mahsud, another member of the same tribe as Baitullah Mahsud, from attacking the Pakistani army and giving shelter to foreign terrorists. However, it does not prevent these forces from attacking US troops across the border in Afghanistan. It also does not require these forces to surrender or register foreign terrorists in Waziristan. Abdullah Mahsud is a wanted fugitive in Pakistan and has pledged his loyalty to Taliban leader Mullah Omar. But as part of the deal his forces are even given some money to repay debts owed to al-Qaeda-linked foreign militants. As a result of this deal, the Pakistan army soon leaves South Waziristan entirely. A similar deal will be made with North Waziristan in September 2006 (see September 5, 2006). The area becomes a Taliban base to attack US and NATO troops across the border in Afghanistan. The number of Taliban attacks there will rise from 1,600 in 2005 to more than 5,000 in 2006. [Asia Times, 5/4/2005; Levy and Scott-Clark, 2007, pp. 433] Abdullah Mahsud was held by the US in the Guantanamo prison from December 2001 to March 2004 (see March 2004). In July 2007, renewed fighting between the Pakistani army and tribal militants will cause the Waziristan truce to collapse (see July 11-Late July, 2007). He will blow himself up to avoid capture a few days after the truce ends. [New York Times, 7/25/2007] The CIA will later claim that Baitullah Mahsud was involved in the assassination of former Pakistani Prime Minister Benazir Bhutto in December 2007. [Washington Post, 1/18/2008]
The Los Angeles Times reports that Taliban forces are being trained in Pakistan’s tribal border region with support from Pakistan’s intelligence agency, the ISI. It is believed that the Pakistani ISI has made more sophisticated technology available to the Taliban in recent months, including the ability to construct and detonate bombs at long distance using cordless phones to transmit the detonation signals. Pakistan officially denies these charges. However, Lt. Sayed Anwar, acting head of Afghanistan’s counter-terrorism department, says: “Pakistan is lying. We have very correct reports from their areas. We have our intelligence agents inside Pakistan’s border as well.… They say they are friends of Americans, and yet they order these people to kill Americans.” Anwar said that intelligence agents operating in Pakistan and captured prisoners describe an extensive network of militant training camps in areas of the North Waziristan tribal region. He alleges there are at least seven camps there which are closed to outsiders and guarded by Pakistani troops. Zulfiqar Ali, a Pakistani journalist working for the Los Angeles Times, was able to sneak into one of the camps and saw armed militants, some as young as 13, undergoing ideological orientation and weapons training. Sources say at least 13 militant camps had been reactivated in the month of May. The camps are allegedly funded and supplied by the ISI. Lt. Naqibullah Nooristani, an operations commander for Afghan troops fighting with US soldiers, says the Taliban have been resurgent recently because they are receiving improved training and equipment in Pakistan. [Los Angeles Times, 7/28/2005]
Knight Ridder reports, “Nearly four years after a US-led military intervention toppled them from power, the Taliban has re-emerged as a potent threat to stability in Afghanistan. Though it’s a far cry from the mass movement that overran most of the country in the 1990s, today’s Taliban is fighting a guerrilla war with new weapons, including portable anti-aircraft missiles, and equipment bought with cash sent through Osama bin Laden’s al-Qaeda network, according to Afghan and Western officials.… The Taliban is now a disparate assemblage of radical groups estimated to number several thousand, far fewer than when it was in power before November 2001. The fighters operate in small cells that occasionally come together for specific missions. They’re unable to hold territory or defeat coalition troops.… The Taliban insurgents have adopted some of the terrorist tactics that their Iraqi counterparts have used to stoke popular anger at the Iraqi government and the US military. They’ve stalled reconstruction and fomented sectarian tensions in a country that remains mired in poverty and corruption, illegal drugs and ethnic and political hatred.” Most of the original top leaders were never captured. Some who were briefly held and then released, such as former Defense Minister Mullah Obaidullah Akhund (see Early January 2002), are part of the resurgence. Forty-four US soldiers have been killed in the last six months. Afghan and Western officials claim that the Taliban continues to be supported by Pakistan’s ISI. Pakistan “seeks a weak government in [Afghanistan] that it can influence.” It is claimed that the Taliban are allowed to maintain training camps and arms depots just across the border from Pakistan. [Knight Ridder, 8/18/2005]
At some point in 2006, an unnamed senior ISI (Pakistani intelligence) official admits that militant leader Jalaluddin Haqqani is a Pakistani asset. The official makes the comment after being asked by a New York Times reporter why the Pakistani military has not moved against Haqqani. Haqqani is head of the Haqqani network, a semi-autonomous branch of the Taliban, based in Pakistan, that is launching attacks against US forces in Afghanistan. [New York Times, 6/17/2008] In 2008, US intelligence will similarly overhear the head of Pakistan’s military call Haqqani a “strategic asset” (see May 2008).
The Christian Science Monitor reports: “Taliban leaders strut openly around Quetta, Pakistan, where they are provided with offices and government-issued weapons authorization cards; Pakistani army officers are detailed to Taliban training camps; and Pakistani border guards constantly wave self-proclaimed Taliban through checkpoints into Afghanistan.” A Monitor reporter who lives in Kandahar, Afghanistan, notes that the result is that people there “have reached an astonishing conclusion: The United States must be in league with the Taliban… In other words, in a stunning irony, much of this city, the Taliban’s former stronghold, is disgusted with the Americans not because of their Western culture, but because of their apparent complicity with Islamist extremists.” [Christian Science Monitor, 5/2/2006] CNN will similarly report in September 2006 that Taliban head Mullah Omar and most other top Taliban leaders are living in Quetta (see September 12, 2006).
The plight of women in Afghanistan during Taliban rule was considered notoriously bad and it has been generally assumed to have gotten much better since the government headed by Hamid Karzai was established (see December 22, 2001). However, according to a report by the United Nations Development Fund for Women, “Violence against women in Afghanistan is widespread and mainly happens inside victims’ homes.… Acts of violence [against women] are happening with impunity.” [Associated Press, 8/14/2006]
Mullah Bakht Mohammed. [Source: Al-Jazeera]Britain spends more than £1.5 million (approximately $2.4 million) in Afghanistan in a scheme to bribe members of the Taliban to stop fighting and abandon their ranks. Yet the operation fails to persuade any significant Taliban members to defect, attracts mostly lower-level foot soldiers, and results in no decrease in fighting in Helmand Province. “It hasn’t had the results we’d hoped,” admits a senior British Foreign Office official, “though not for want of effort on our part.” The money is allocated in January and May through intelligence agencies and the UN-backed peace strengthening commission after the killings of two top Taliban commanders and ruling shura members, Mullah Akhter Mohammed Osmani and Mullah Dadullah Akhund (see December 19, 2006 and May 13, 2007). The funds are disbursed with the intention of capitalizing on a dip in Taliban morale and anticipated defections referred to as the “Dadullah effect.” The money is used to “spread this message” and pay for housing and transport for any Taliban who decide to defect. The Sunday Times reports that efforts to use Dadullah’s death to warn others were likely undermined by the Afghan government’s release of five Taliban prisoners, including Mullah Dadullah’s brother, Mullah Bakht Mohammed, in return for a kidnapped Italian journalist. Mullah Bakht Mohammed is now believed to be commanding Taliban operations in Helmand. The Sunday Times report does not mention if or how the bribe money is accounted for, or if any of the money is diverted to Taliban structures. [Sunday Times (London), 7/22/2007]
Muhammad Hanif confessing on video. [Source: BBC]A captured Taliban spokesman claims that Taliban leader Mullah Omar is living in Pakistan under the protection of the ISI. Muhammad Hanif, a.k.a. Abdul Haq Haji Gulroz, one of two Taliban spokesmen, was recently captured by the Afghan government. He is seen on video saying to his captors, “[Omar] lives in Quetta [a Pakistan border town]. He is protected by the ISI.” He further claims that the ISI funds and equips Taliban suicide bombings and former ISI Director Hamid Gul supports and funds the insurgency. The Pakistani government denies the allegations and claims Omar has not been seen in Pakistan. [BBC, 1/17/2007; Daily Telegraph, 1/19/2007]
In early March 2007, the Pakistani government announces that a top Taliban official has been captured. Mullah Obaidullah Akhund, the Taliban’s former defense minister, was supposedly captured on February 26, 2007, the same day that Vice President Cheney visited Pakistan, which the Associated Press says “has been under growing international pressure to crack down on Taliban militants believed to seek sanctuary on its soil.” If so, he would be the most senior Taliban leader ever captured since 9/11. However, the Swiss weekly SonntagsBlick claims that one of its reporters interviewed him in Quetta, Pakistan on February 28, just two days after his supposed capture. SonntagsBlick writes, “The world press reported: top-Taliban imprisoned. At the same time he was sitting with a SonntagsBlick reporter having coffee.” [Associated Press, 3/2/2007; Associated Press, 3/11/2007] He was also reportedly captured by the Northern Alliance in early 2002 and then released with US approval (see Early January 2002).
Mullah Dadullah Akhund. [Source: Reuters]Mullah Dadullah Akhund, the Taliban’s top military commander, is killed in Afghanistan. The Telegraph claims that, “Since the Taliban’s ousting in late 2001, Dadullah emerged as probably the militant group’s most prominent and feared commander.” He often appeared in videos and media interviews. [Daily Telegraph, 5/14/2007] He is only the second high-ranking Taliban leader captured or killed since 9/11 (see December 19, 2006). ABC News claims that 36 hours before he was killed, Dadullah said in a videotaped interview that he was training US and British citizens to carry out suicide missions in their home countries. US officials claim to have tracked him from this interview in Quetta, Pakistan, back to a Taliban hiding base in Afghanistan, then carried out a helicopter assault against his base. [ABC News, 5/14/2007] The Taliban immediately announce that his younger brother, Mullah Bakht Mohammed, will be his replacement as the chief military strategist (see June 5, 2007). [CBC News, 5/14/2007]
Agents from MI6 engage in secret talks with Taliban leaders despite the British government’s claims that there are no negotiations with terrorists. The Daily Telegraph cites intelligence sources who say that British intelligence agents have been staging discussions known as “jirgas” with senior insurgents on several occasions over the summer. “The [MI6] officers were understood to have sought peace directly with the Taliban with them coming across as some sort of armed militia. The British would also provide ‘mentoring’ for the Taliban,” says one intelligence source. There have reportedly been up to half a dozen meetings between MI6 agents and the Taliban, taking place at housing compounds on the outskirts of Lashkah Gah and in villages in the Upper Gereshk valley, which is to the northeast of the main town in Helmand province. During the talks, the compounds are surrounded by a force of British infantry providing a security cordon. Afghan officials are reported to be present at the clandestine meetings to show that President Hamid Karzai’s government was leading the negotiations. “These meetings were with up to a dozen Taliban or with Taliban who had only recently laid down their arms,” another intelligence source says. “The impression was that these were important motivating figures inside the Taliban.” Helmand province produces most of Afghanistan’s opium, which accounts for up to 90 percent of the world’s supply of heroin. The United Nations has reported that the Taliban derive funding from the trafficking of Afghan opium. [Daily Telegraph, 12/26/2007; United Nations, 11/27/2008]
A high-ranking Taliban leader says that Osama bin Laden is alive and well. Mullah Bakht Mohammed (a.k.a. Mansoor Dadullah) says in an interview with Al Jazeera: “Sheikh Osama bin Laden is alive and active. He’s carrying out his duties. The latest proof that he is alive is that he sent me a letter of condolences after the martyrdom of my brother.” Bakht’s brother, Mullah Dadullah Akhund, was the Taliban’s top military commander, but was killed in May 2007 (see May 13, 2007), and Bakht immediately took his place. [Al Jazeera, 6/5/2007] In December 2007, the Taliban will announce that Bakht has been replaced as military commander due to insubordination. He will continue fighting for the Taliban however, and will be injured and captured by Pakistani forces near the Pakistan-Afghanistan border in February 2008. [Associated Press, 2/11/2008]
The Taliban’s former chief spokesman, Mullah Mohammad Is’haq Nizami, reveals that talks are being held between Afghan President Hamid Karzai’s government and key lieutenants of former Taliban leader Mullah Omar. Mullah Nizami says that he has been relaying messages for months from Kabul to Mullah Omar’s aides in the Quetta Shura, the Taliban’s ruling council based in Pakistan. The Quetta Shura is thought to be responsible for orchestrating attacks across the border in Kandahar and Helmand provinces, Afghanistan. The disclosure contradicts British Prime Minister Gordon Brown’s carefully worded statement to Parliament a day earlier insisting that no negotiations would be held with Taliban leaders. “We are not negotiating with the leadership, but we want to support President Karzai in his efforts at reconciliation. If he is successful in bringing across those members of the insurgency who then declare that they will give up fighting and support democracy and be part of the system, then these are efforts at reconciliation that are important to the future of the whole country,” Brown states during a session of prime minister’s questions. Mullah Nizami, who also ran the regime’s radio station Voice of Sharia until 2001, says that the negotiations aim to isolate Mullah Omar by wooing his lieutenants in the Quetta Shura. “Karzai is trying to get the 18 people in the Quetta Shura. If he succeeds it will be a defeat for Mullah Omar. The Taliban and the government are tired of fighting and they want to negotiate,” he says. Nizami fled to Pakistan in 2001 when the Taliban regime collapsed, but returned to Kabul under an ongoing reconciliation programme in an effort to open talks. Mullah Nazimi further explains that the Taliban want to take part in the Afghan government, want sharia law instituted, and want the withdrawal of international forces. The Belfast Telegraph reports that talks will continue “under the table” until the two sides can agree on something warranting a public announcement. The Independent reports that the British government was prepared to admit that the talks between the Afghan government and the Taliban had taken place and that dialogue should be opened with Taliban leaders, but Gordon Brown changed his mind just before prime minister’s questions on December 12, denying any negotiations with Taliban leadership. Brown’s denial is further contradicted by a report that British MI6 agents had engaged in secret talks with the Taliban and other Afghan insurgent leaders in Helmand Province earlier this summer (see Summer 2007). [Independent, 12/12/2007; Belfast Telegraph, 12/13/2007]
British military sources tout the success of secret meetings and negotiations held with elements of the Taliban, claiming that direct contact has led insurgents to change sides and has provided intelligence leading to the deaths of key insurgent commanders. But critics, such as officials within the Afghan government, argue that the tactics—including the use of bribes for information—undermine democracy and allow the Taliban a back door back into power. In addition, Afghan military sources claim that insurgents are using coalition forces to settle scores with rivals. American officials say the policy of engagement by the British has led to serious mistakes, such as the agreement reached in Musa Qala in February under which British forces were withdrawn in return for tribal elders pledging to keep the Taliban out. The Taliban quickly occupied the town and held it for seven months. The Independent also reports that the Taliban has killed and tortured insurgents, children included, who were seen to be collaborating with British and the Afghan governments. British Prime Minister Gordon Brown’s government continues to officially deny Britain has been involved in negotiations with the Taliban. [Independent, 12/14/2007]
An armed attacker in the lobby of the Serena Hotel in Kabul, Afghanistan, on January 14, 2008. [Source: TV2 Norway]Militants attack a luxury hotel in Kabul, Afghanistan, with machine guns and a suicide bomber. Six people are killed and six more are injured. The suicide bomber blows himself up and one of the machine gunners is killed, and two other attackers apparently escape. The target is the Serena Hotel, a heavily guarded five-star hotel frequented by Westerners. A Norwegian journalist and a US citizen are among those killed. A Taliban spokesperson immediately takes credit for the attack. [BBC, 1/15/2008] Months later, the New York Times will report that the attack was actually masterminded by a leader of the Haqqani network, a semi-autonomous branch of the Taliban, which is largely based in Pakistan. The leader is not named, but Sirajuddin Haqqani will later boast in an interview that he planned the attack (see March 25, 2009). According to the Times: “Pakistani forces have been reluctant to move against the Haqqanis. According to European officials and one senior Pakistani official, [top leader Jalaluddin] Haqqani has maintained his old links with Pakistani intelligence [the ISI] and still enjoys their protection.” In a video, Jalaluddin boasts of his role in an attack on a hotel, which presumably is the Serena Hotel attack, as well as boasting of other attacks. Jalaluddin is Sirajuddin’s father. [New York Times, 6/17/2008]
A blasted vehicle in front of the prison. [Source: Allauddin Khan / Associated Press]A suicide truck bomber hits the front gate of the Sarposa Prison, south of Kandahar, Afghanistan. A second suicide bomber on foot hits the back wall of the prison a short time later. Then, about 30 Taliban on motorbikes rush into the prison, killing nine guards and freeing the prisoners. Between 900 to 1,100 prisoners escape, including about 400 Taliban militants. Minibuses waiting at the front of the prison then drive many of the escaped prisoners away, while the rest flee on foot. [Associated Press, 6/14/2008] A US official says no internationally recognized Taliban leaders were in the prison, but some significant mid-level fighters did escape. Officials also say the attack is noteworthy “because of the evident planning behind it and the skill with which it was carried out—a demonstration of the Taliban’s ability to carry out complex and bold operations with modest manpower.” [Newsweek, 6/17/2008] The provincial police chief of Kandahar, the local head of the intelligence agency, and the head of police criminal investigations are fired several days later for negligence. It is not alleged that any of them helped stage the escape. [BBC, 6/26/2008]
Members of the Frontier Corps near Shakai, in the region of South Waziristan, in August 2004. [Source: Kamran Wazir / Reuters / Corbis]The British newspaper The Observer reports that the Frontier Corps, a Pakistani government paramilitary force operating in Pakistan’s tribal regions near the border with Afghanistan, sometimes join in attacks on US-led forces in Afghanistan. The article alleges there are “box loads” of after-action reports compiled after armed clashes near the border, detailing the Frontier Corps working with the Taliban and other allied militants. Some attacks are launched so close to Frontier Corps outposts that Pakistani cooperation with the Taliban is assumed. There has been a dramatic increase in cross-border incidents compared to the same time the year before. An anonymous US official says: “The United States and NATO have substantial information on this problem. It’s taking place at a variety of places along the border with the Frontier Corps giving direct and indirect assistance. I’m not saying it is everyone. There are some parts that have been quite helpful… but if you have seen the after-action reports of their involvement in attacks along the Afghan border you would appreciate the problem.” The US government continues to downplay such incidents, worried about its relationship with the Pakistani government. A NATO spokesman says: “The real concern is that the extremists in Pakistan are getting safe havens to rest, recuperate and retool in Pakistan and come across the border. The concerns have been conveyed to the Pakistan authorities.” [Observer, 6/22/2008]
Polish intelligence warns India and the US that the Taliban are likely to attack the Indian embassy in Kabul, Afghanistan. The embassy will be bombed one week later, killing 54 (see July 7, 2008). The document giving the warning is entitled, “Threat Report… Threat to Indian Embassy.” It is based on information received one day earlier. It states, “Taliban are planning to carry out an attack on the Indian embassy in Kabul.” It goes on to describe how a suicide bomber plans to use a stolen Afghan government car and stolen uniform to get past security. The document will be publicly leaked in 2010 as part of a massive WikiLeaks release of US documents relating to the US war in Afghanistan. [Press Trust of India, 7/27/2010] It is unclear how or where Polish intelligence got this information. US intelligence apparently learns around this time that the Taliban and ISI, Pakistan’s intelligence agency, are planning a spectacular bombing somewhere in Afghanistan (see Late June 2008). However, it appears that India acts on at least one of the warnings, because the Indian ambassador to Afghanistan will later say that India took extra security measures in the weeks before the bombings because “we were expecting trouble.” Most importantly, sand-filled blast barriers are placed around the main embassy building. That, plus the quick action of security guards, will prevent the bomber from getting closer to the building, and thus reduce the number of lives lost. [Associated Press, 7/9/2008]
A suicide bombing at the Indian embassy in Kabul, Afghanistan, kills 54 people and injures 140 others. The main target appears to be a diplomatic convoy that had just entered the embassy gate, directly followed by the suicide truck. Among the dead are two senior Indian diplomats, including the military attaché, Brigadier Ravi Mehta. Many of those killed are people standing in line waiting for visas. [London Times, 8/3/2008] The Indian government received at least one warning about an attack on the embassy, and it took extra security precautions that helped reduce the loss of lives (see July 1, 2008). The Afghan interior ministry quickly asserts that the ISI, Pakistan’s intelligence agency, helped the Taliban with the attack. A presidential spokesman states at a news conference, “The sophistication of this attack and the kind of material that was used in it, the specific targeting, everything has the hallmarks of a particular intelligence agency that has conducted similar terrorist acts inside Afghanistan in the past.” The Afghan government has asserted that the ISI is responsible for other attacks in Afghanistan, including an attempted assassination of President Hamid Karzai in late April 2008 (see April 27, 2008). The Indian government also quickly blames the ISI and the Taliban. [Financial Times, 7/8/2008; Taipei Times, 7/9/2008] The Taliban deny involvement in the attack, but the New York Times notes that the Taliban usually deny involvement in attacks with a large number of civilian casualties. [New York Times, 7/8/2008] Less than a month later, US intelligence will accuse the ISI of helping a Taliban-linked militant network led by Jalaluddin Haqqani to plan the bombing (see August 1, 2008). President Bush will even directly threaten Pakistani Prime Minister Yousaf Raza Gillani with serious consequences if another attack is linked to the ISI (see July 28, 2008).
Former Afghan National Police (ANP) trained by US forces including the controversial American security contractor Blackwater are defecting to the Taliban, according to Al Jazeera. The channel reports that around 70 former police in the province of Herat have joined the Taliban in the past two months. Recruits featured in a video report carry weapons provided by the Afghan government and certificates for weapons training from the US. Some of the fighters openly display their Blackwater-issued IDs. One new Taliban recruit, Abdul Rahim, says he received training from Blackwater for 45 days. “I can use the training to save my life in these mountains and I can also use it to fight them,” he explains. The former members of the ANP tell Al Jazeera that they have joined the Taliban for ideological reasons and are using their weapons and training to fight the coalition. Another defector, Sulieman Ameri, along with 16 men under his command, were until a month ago enlisted in the ANP and patrolling the border with Iran. “Our soil is occupied by Americans and I want them to leave this country. That is my only goal,” he says. [Al Jazeera, 10/15/2008; Al Jazeera, 10/15/2008]
King Abdullah of Saudi Arabia hosts “ice-breaking” talks between the Afghan government, current and “former” Taliban, and representatives of other militant groups. Among the participants are Mullah Omar’s former “foreign minister” and his former Kandahar spokesman, Afghan government officials, and a representative of former mujaheddin commander Gulbuddin Hekmatyar, whose group, Hezb-i-Islami, is labeled a “terrorist organization” by the United States. [CNN, 10/5/2008] Hamid Karzai’s brother, Abdul Qayum, and ex-Pakistani premier Nawaz Sharif are also reported to be in the meetings. [Independent, 10/8/2008; Independent, 11/13/2008] During the talks, all parties reportedly agree that continued dialogue should be sought. AFP, citing Saudi sources, reports that the negotiators move on to Islamabad, Pakistan on Sunday, September 27, 2008. A spokesman for President Hamid Karzai will later deny that negotiations were held, saying that Afghan religious scholars had visited Saudi Arabia during Ramadan and attended a dinner with King Abdullah. A spokesman for the Taliban, Zabihullah Mujahed, also denies any meetings. [Agence France-Presse, 10/7/2008]
Wahid Mujda, an Afghan political analyst and former Taliban official for the Afghan Ministry of Foreign Affairs, tells the Islamic Republic of Iran Broadcasting (IRIB) network that the US is supplying arms to the Taliban to “jeopardize the security situation” as a justification to stay in Afghanistan. According to Iranian Press TV, Mujda says the US invaded Afghanistan on the pretext of fighting terrorism, but actually wanted to create a base to exercise pressure on rivals in the region. He also says that NATO-led forces are even encouraging cross border attacks by the Taliban from Pakistan. Alluding to meetings held in the United Arab Emirates, Mujda further suggests that the US has begun direct talks with the Taliban to secure results in the 2009 Afghanistan presidential election, implying the possibility of negotiations on an important role for the Taliban in the next Afghan government. [Press TV, 9/28/2008]
Taliban presence map: January-September 2009. [Source: International Council on Security and Development]An international research and policy group reports that the Taliban have attained a permanent presence in about 80 percent of Afghanistan, up from 72 percent in November 2008 and 54 percent in November 2007. The International Council on Security and Development (ICOS), formerly known as The Senlis Council, also reports that another 17 percent of Afghanistan is seeing “substantial” Taliban activity. Furthermore, it reports a recent sharp rise in Taliban activity in the north, a formerly peaceful area. “The dramatic change in the last few months has been the deterioration of the situation in the north of Afghanistan, which was previously one of the most stable parts of Afghanistan. Provinces such as Kunduz and Balkh are now heavily affected by Taliban violence. Across the north of Afghanistan, there has been a dramatic increase in the rate of insurgent attacks against international, Afghan government, and civilian targets,” states Alexander Jackson, a policy analyst at ICOS. Spokeswoman Jane Francis says ICOS’s data is based on reports from a team in Afghanistan and was gathered from daily insurgent activity reports between January and September 2009. “The unrelenting and disturbing return, spread, and advance of the Taliban is now without question,” says Norine MacDonald QC, president and lead field researcher for ICOS. [International Council on Security and Development, 9/10/2009; Associated Press, 9/10/2009]
Secret negotiations backed by the British government are under way to bring warlord Gulbuddin Hekmatyar back into Afghanistan’s political process, according to Al Jazeera. The talks between Taliban-linked mediators, Western officials, and the Afghan government are believed to involve a proposal for the return to Afghanistan of Hekmatyar, granting him immunity from prosecution there. Hekmatyar would first be offered asylum in Saudi Arabia under the proposal. The meetings recall earlier Afghan negotiations involving Hekmatyar and a Saudi role (see Between September 24 and 27, 2008). Ghairat Baheer, a Hektmatyar son-in-law released from the US prison at Bagram airbase in Afghanistan in May last year after six years in custody, is reported to be involved in the negotiations. Baheer, an ambassador to Pakistan in the 1990s, was given a visa to travel to London by British authorities last month. Humayun Jarir, a Kabul-based politician and another son-in-law of Hekmatyar, is also said to have been involved. This is consistent with a report published late last year of Hekmatyar family members being engaged in negotiations with the Afghan government in coordination with Britain (see November 13, 2008). James Bays, Al Jazeera’s correspondent in Kabul, adds that the plan is to widen these talks and bring in elements of the Taliban. [Independent, 10/8/2008; Al Jazeera, 2/27/2009]
A US military newspaper reports that continued resurgence of the Taliban has led residents in Kabul to surmise that the US is supporting the Taliban. US support for the Taliban is “virtually ubiquitous” in Kabul, according to Stars and Stripes. “Now we think America is supporting both the Taliban and the Afghan government. That’s what everyone says,” states Kabul shopkeeper Qand Mohmadi. “We don’t know for sure why they are doing it,” says real estate broker Daoud Zadran. “Politics is bigger than our thoughts. But maybe America wants to build up the Taliban so they have an excuse to remain in Afghanistan because of the Iranian issue.” Stars and Stripes also reports that many residents suspect that the US and Western companies are colluding with Afghan officials to pilfer the economy. [Stars and Stripes, 2/15/2009]National Opinion Survey Reveals Public Alarm, Plummeting Confidence - A public opinion survey conducted by ABC News, the BBC, and the German TV station ARD finds plummeting public confidence in and support for the Afghan government and its Western allies. Just 40 percent of those surveyed say they feel the country is heading in the right direction, down from 77 percent in 2005. Approval of overall US efforts in Afghanistan is only 32 percent, compared to 68 percent three years ago. The poll also shows falling support for the government of Afghan President Hamid Karzai. In 2005, 80 percent of Afghans said they supported the Karzai regime, but just 49 percent say the same thing today. In addition to corruption and complaints about food, fuel, and the economy, the resurgence of the Taliban is a key element of the public’s alarm: 58 percent of Afghans see the Taliban as the biggest danger to the country. 43 percent say the Taliban have grown stronger in the past year in comparison to 24 percent who think the movement has weakened. [ABC News, 2/9/2009]Police Chief Doubts Veracity of Public Suspicions - One district police chief in Kabul expresses frustration with American efforts, but finds it hard to believe that the US is supporting the Taliban. “People see that America is so strong and they wonder—why can’t it wipe out the Taliban?” says Col. Najeeb Ullah Samsour, adding that he does not personally think the US is supporting the insurgents. “People are saying that for six or seven years we have all these international troops, but everything is getting worse… security, the economy, everything. So they think America must be supporting the Taliban.” Osama bin Laden - “This government is so corrupt that if Osama bin Laden and Mullah Omar were crossing the street together right outside, no one would call the police because they know the police would just take a bribe to let them go,” says resident Habib Rahman. “A lot of people say that Osama is really from America,” according to Nasrallah Wazidi. “They say he’s just playing a role like a movie star.” [Stars and Stripes, 2/15/2009]
NWFP Minister Bashir Bilour with Swat Treaty Hasham Ahmed. [Source: Agence France Presse - Getty Images]Pakistan agrees to a truce with Taliban fighters that would impose strict Islamic religious law—sharia—on the Swat Valley in northwest Pakistan, a setback for the Obama administration’s hopes to mount a united front against Islamist militants there and in Afghanistan. The agreement gives the Taliban religious and social control of the Swat region, considered of critical strategic importance in battling insurgents in the wild border region between Pakistan and Afghanistan. James Dobbins, a former Bush administration envoy to Afghanistan, says: “It is definitely a step backwards. The Pakistanis have to take a stronger line with extremists in the region.” Obama administration envoy Richard Holbrooke says, “We are very concerned about Pakistan and stability.” A Pentagon official calls it a “negative development,” but other officials are more circumspect. “What is, of course, important is that we are all working together to fight terrorism and particularly to fight the cross-border activities that some Taliban engage in,” says Pentagon spokesman Gordon Duguid. NATO officials take a tougher stance, with NATO spokesman James Appathurai calling the truce a “reason for concern.” He adds, “Without doubting the good faith of the Pakistani government, it is clear that the region is suffering very badly from extremists and we would not want it to get worse.” Amnesty International official Sam Zarifi says, “The government is reneging on its duty to protect the human rights of people from Swat Valley by handing them over to Taliban insurgents.” [Associated Press, 2/18/2009]
Mullah Agha Jan Mutassim, a former Taliban finance minister and member of the group’s political council, tells al-Samoud magazine that the Taliban are willing to work with all Afghan groups to achieve peace. “We would like to take an Afghan strategy that is shared and large-scale, in consultation with all the Afghan groups, to reach positive and fruitful results,” Mutassim is quoted as saying in an interview translated by the US-based Site Intelligence Group, which monitors jihadi web sites. Mutassim, thought to be close to Mullah Omar, stresses that Afghanistan’s problems can be solved only if foreign troops withdraw from the country. “If these forces leave, the problem will be over, the question will be finished, and peace will prevail,” he says. Despite harsh words for the West, Mutassim praises the government of Saudi Arabia, according to the report. Saudi Arabia, which has allegedly been a source of funding for the Taliban (see 1996) and was one of only three states to recognize the Taliban as the government of Afghanistan between 1997 and 2001 (see May 26, 1997), has hosted talks between former Taliban, Afghan government officials, and others (see Between September 24 and 27, 2008). Mutassim adds that the Taliban are not seeking to share power in an “agent government,” but want the institution of an Islamic Emirate in which “educating women is as necessary as educating men.” [Site Intelligence Group, 2/25/2009; Reuters, 2/26/2009]
A deputy to Richard Holbrooke meets with a representative of Afghan warlord Gulbuddin Hekmatyar to discuss the role his group, Hizb-i-Islami (HIA) could play in ending the Afghan conflict, according to Afghan media. The HIA is designated as a terrorist organization by the United States and Hekmatyar has a reported $25 million price on his head. The meeting is held with Hekmatyar emissary Daud Abedi. The US-Hekmatyar meeting is the most recent in a series of meetings and negotiations reportedly involving Hekmatyar representatives and the Afghan government, Taliban representatives, and the Saudis, inter alia (see Between September 24 and 27, 2008 and February 2009). [Daily Telegraph, 4/8/2009]Withdrawal of Foreign Troops a Top Priority - In an interview with Asia Times reporter and analyst Syed Saleem Shahzad, Mr Abedi will recount the meeting, which he describes as positive, adding that he participated on his own initiative, was given Hekmatyar’s approval, and did not involve Pakistani officials. Abedi will not name the US official(s) he met because the talks are, he explains, ongoing. He says a ceasefire is possible in Afghanistan once talks are concluded and an exact schedule for the earliest possible departure of foreign troops is known: a top priority for the HIA. “I know what the HIA wants and what the Taliban wants in order to see if we could make a situation possible in which foreign troops leave Afghanistan as soon as possible,” he will say. Abedi denies that there is any chance the HIA will join the Afghan government in the near future. Insurgents loyal to Hekmatyar hold complete command over Kapissa province’s Tagab valley, only 30 kilometers north of Kabul. Syed Saleem Shahzad will suggest that the HIA, whose political wing has offices all over Afghanistan and keeps 40 seats in the Afghan parliament, is fully geared to replace President Hamid Karzai in the upcoming presidential elections. [Asia Times, 4/10/2009]Deep Ties to Major Players in Region - Hekmatyar, among the most ruthless and extreme of the Afghan Islamic warlords, has had deep ties to Osama bin Laden, the CIA, the ISI, and the drug trade (see 1984), 1983, and (see March 13, 1994).
A US drone attacks a target in Pakistan that the CIA believes is Hakimullah Mahsud, a lieutenant of Tehrik-i-Taliban (Pakistani Taliban) leader Baitullah Mahsud. However, it kills 10 to 12 of his followers instead. [New Yorker, 10/26/2009]
Saudi Prince Turki al-Faisal, former intelligence chief and ambassador to Washington (see May 1998), recommends the Obama administration emulate earlier administrations and work with insurgent leader Jalaluddin Haqqani, a key Pakistan-based Taliban ally who has had ties to the ISI, CIA, and Osama bin Laden (see Early October 2001). Haqqani is “someone who could be reached out to… to negotiate and bring [the Taliban] into the fold,” Prince Turki tells a group of government and business leaders and journalists over a dinner in Washington organized by blogger Steve Clemons. Haqqani is thought to be behind recent suicide attacks in Afghanistan, and is suspected to have been behind the attempted assassination of Hamid Karzai (see April 27, 2008). Brent Scowcroft, national security adviser to President Gerald Ford and President George H. W. Bush, also urges the US to negotiate with some members of the Taliban in Afghanistan and Pakistan in remarks following Prince Turki’s. [Washington Times, 4/27/2009]
Afghan President Hamid Karzai says his administration is investigating numerous reports of “unknown” military helicopters carrying gunmen to the northern provinces of the country amid increasing militancy in the area. At a press conference, Karzai says that his government has received information over the last five months from local residents and officials indicating that unmarked helicopters have been ferrying militants to Baghlan, Kunduz, and Samangan provinces, and have been air-dropping them at night. “Even today we received reports that the furtive process is still ongoing,” he tells journalists, though he does not share any evidence, arguing that the issue is too sensitive. Karzai adds that authorities have received similar reports in the northwest as well, and that a comprehensive investigation is underway to determine which country the helicopters belonged to, why armed men are being snuck into the region, and whether increasing insecurity in the north is linked to this. “I hope in the near future we will find out who these helicopters belong to,” he says. [Ferghana Information Agency, 10/12/2009; Press TV, 10/12/2009; Daily Outlook Afghanistan, 10/12/2009] Western officials will later deny there is any truth to the reports (see October 14 - 29, 2009). The Institute for War & Peace Reporting (IWPR) notes that helicopters are almost entirely the exclusive domain of foreign forces in Afghanistan; NATO forces control Afghanistan’s air space and have a monopoly on aircraft. IWPR reports that Afghans believe the insurgency is being deliberately moved north, with international troops transporting fighters in from the volatile south to create mayhem in new locations. [Institute for War & Peace Reporting, 10/29/2009] The International Council on Security and Development has reported a dramatic rise in Taliban presence and activity in the formerly peaceful north in recent months (see Between January and September 2009), coinciding with the helicopter reports. The Asia Times reports that the Taliban now have complete control over several districts in the northern province of Kunduz. [Asia Times, 10/16/2009]Who Are the Militants? - The majority of reports cite eyewitnesses who claim the militants are Taliban. In Kunduz province, northern Afghanistan, a soldier from the 209th Shahin Corps of the Afghan National Army tells of an incident in which helicopters intervened to rescue Taliban during a battle. “Just when the police and army managed to surround the Taliban in a village of Qala-e-Zaal district, we saw helicopters land with support teams,” he says. “They managed to rescue their friends from our encirclement, and even to inflict defeat on the Afghan National Army.” Residents in a district of Baghlan province also witness a battle in which they insist that two foreign helicopters offload Taliban fighters who then attack their district center. “I saw the helicopters with my own eyes,” says Sayed Rafiq of Baghlan-e-Markazi. “They landed near the foothills and offloaded dozens of Taliban with turbans, and wrapped in patus [a blanket-type shawl].” According to numerous media reports, the district police chief along with the head of counter-narcotics and a number of soldiers are killed in the attack. The governor of Baghlan-e-Markazi, Commander Amir Gul, insists that the Taliban fighters are delivered by helicopter. “I do not know to which country the helicopters belonged,” he tells the Institute for War and Peace Reporting. “But these are the same helicopters that are taking the Taliban from Helmand to Kandahar and from there to the north, especially to Baghlan.” According to Gul, the district department of the National Security Directorate has identified the choppers, but refuses to comment. Baghlan police chief, Mohammad Kabir Andarabi, says that his department has reported to Kabul that foreign helicopters are transporting the Taliban into Baghlan. Baghlan provincial governor, Mohammad Akbar Barikzai, tells a news conference that his intelligence and security services have discovered that unidentified helicopters have been landing at night in some parts of the province. “We are investigating,” he says. [Institute for War & Peace Reporting, 10/29/2009] Other officials say the militants are not only Taliban. The provincial governor of Kunduz claims the fighters being transported are members of the Islamic Movement of Uzbekistan (IMU). Sanobar Shermatova, a Moscow-based Central Asia analyst, writes that the IMU likely comprises the bulk of Taliban-allied militants moving into northern Afghanistan. [Eurasianet, 10/13/2009; Institute for War & Peace Reporting, 11/6/2009] Afghan Lower House representative, Ms. Najia Aimaq, quotes Interior Ministry authorities who say that helicopters are transporting Gulbuddin Hekmatyar’s men to the northern provinces to fight the Taliban. [Nukhost Daily via UNAMA, 10/14/2009]Who Is Providing the Air Transport? - Unconfirmed reports are circulating that the helicopters are American, according to Iran’s Press TV. [Press TV, 10/12/2009] McClatchy suggests that although Karzai does not say which nations he suspects are providing the helicopters, his remarks stir speculation that the US is somehow involved. However, a Karzai campaign staffer will later clarify that Karzai does not mean to imply the helicopters are American (see October 14 - 29, 2009). “We believe what the American ambassador [Karl Eikenberry] has said, and that the helicopters don’t belong to America,” says Moen Marastyal, an Afghan parliament member who has worked on the Karzai re-election campaign. [McClatchy, 10/14/2009] Afghan political analyst Ghulam Haidar Haidar asserts that foreign forces led by the US are behind the increasing instability in Kunduz and that coalition forces are training and equipping the insurgents in order to spread insecurity to Central Asia. “The United States wants a base from which to threaten Russia,” he says. An unnamed resident from Chahr Dara district echoes Haidar’s analysis, insisting that the Taliban are being supported by the US. “I saw it with my own eyes,” he says. “I was bringing my cattle home in the evening, and I saw Taliban getting off American helicopters. They were also unloading motorcycles from these aircraft. Later, a local mullah whom I know very well went to talk to the Americans, and then the helicopter left.” [Asia Times, 10/16/2009] Press TV will later cite unnamed diplomats who say the British army has been relocating Taliban insurgents from southern Afghanistan to the north via its Chinook helicopters. [Press TV, 10/17/2009] According to Rahim Rahimi, a professor at Balkh University, both America and Britain are trying to undermine security in Afghanistan to justify the need for foreign forces. “They will try and destabilize the north any way they can,” he says. “It is a good excuse to expand their presence in the area, to get a grip on the gas and oil in Central Asia.” [Institute for War & Peace Reporting, 10/29/2009]
A New York Times investigation finds that some munitions procured by the Pentagon for the Afghan National Security Forces (ANSF) are leaking to the Taliban and other insurgents for use against American troops. Arms and ordnance collected from dead insurgents are found to be identical to ammunition the United States and other allies have provided to Afghan government forces, according to an examination of ammunition markings and interviews with American officers and arms dealers conducted by the New York Times. Military officials, arms analysts, and dealers say that poor American and Afghan controls on the vast inventory of weapons and ammunition sent to Afghanistan—as well as outright corruption among Afghan forces—may have helped insurgents stay supplied. Furthermore, military officers say that American forces do not examine all captured weapons to trace how insurgents obtain them, nor do they seek to determine whether the Afghan government, directly or indirectly, is a significant Taliban supplier. An American unit from the 26th Infantry allows the New York Times to examine the weapons it had retrieved from a raid on Taliban fighters. Examination of the Taliban’s cartridges finds telling signs of diversion in which the ammunition bears markings from an American company which sells cartridges to Afghan soldiers and police officers through middlemen. Ammo from a Czech company which has donated surplus ammo to the Afghan government is also identified. Afghan Government and Security Forces Blamed for Weapon Diversions - The New York Times cautions that given the large number of potential weapons sources, “the probability that the Taliban and the Pentagon were sharing identical supply sources [is] small.” James Bevan, a researcher specializing in ammunition for the Geneva-based research group, Small Arms Survey, says that the munitions have most likely slipped from Afghan state custody. Mr. Bevan, who has documented ammunition diversion in Kenya, Uganda, and Sudan, surmises that interpreters, soldiers, or police officers sell ammunition for profit or pass it along for other reasons, including support for the insurgency. The American military does not dispute the possibility that theft or corruption could be steering ammunition to insurgents, but it backs Mr. Bevan’s statement that illicit diversion of arms is the fault of Afghan security forces, particularly corruption within the police. Capt. James C. Howell, commander of the unit that captured the ammunition, says the findings are unsurprising but explains that this form of corruption is not the norm, citing poor discipline and oversight in the Afghan national security forces rather than deliberate diversion. Another officer, Brig. Gen. Anthony R. Ierardi, the deputy commander of the transition command, cautions that insurgent use of American-procured munitions is not widespread, noting that the captured ammunition sampling was small and that munitions might have leaked to the Taliban through less nefarious means. United States Military Also to Blame - The United States military was recently criticized by the Government Accountability Office and the Pentagon’s Inspector General, which blamed the Combined Security Transition Command-Afghanistan for failing to account for hundreds of thousands of weapons issued to the ANSF, warning that unaccounted for weapons were at great risk of being diverted to insurgents (see February 12, 2009) and (see October 24, 2008). [New York Times, 5/19/2009]
Pakistan’s army spokesman, Maj. Gen. Athar Abbas, suggests that NATO weapons are crossing the border from Afghanistan and going to the Taliban in Pakistan. In an interview with CNN, General Abbas links Afghanistan to the battle between Pakistani armed forces and the Taliban in Pakistan’s Swat valley, saying that the Taliban are “very well equipped from the border area.” Abbas adds that the United States should “stop worrying about the nukes and start worrying about the weapons lost in Afghanistan.” He explains that Washington is neglecting this problem by focusing too much on the safety of Pakistan’s nuclear arsenal. General Abbas further suggests, without elaborating, that the Taliban are also getting weapons and support from “foreign intelligence agencies.” [CNN, 5/29/2009]
Villagers from towns in Helmand province accuse provincial Afghan police forces of perpetrating abuse against the local population recently and in the period before the Taliban re-gained control of the region. The reports include accusations of extortion and the rape of pre-teen boys. Villagers tell US and British troops who have arrived in the area for major operations (see Early Morning July 2, 2009) about the abuses, and say that the local police are a bigger problem than the Taliban. In fact, village elders say that they are willing to support the Taliban against coalition troops if these police forces are allowed to return. The accusations are acknowledged by some Western civilian and military officials, but their response is tepid. Adding to the problem of abuse and corruption is that the districts where the US-British military operation in Helmand is taking place are especially sensitive because they contain the main opium poppy fields in the province. Some of the police are linked to the private militia of a powerful warlord who has been implicated in drug trafficking. Former US ambassador to Afghanistan, Ronald Neumann, says that the problem is not surprising and can be traced back to the creation of the national police after the overthrow of the Taliban regime in late 2001 (see November 13, 2001). Neumann recalls that the Afghan police were “constituted from the forces that were then fighting the Taliban.” [Inter Press Service, 7/29/2009]Child Rape, Extortion - “The police would stop people driving on motorcycles, beat them, and take their money,” says Mohammad Gul, an elder in the village of Pankela, which British troops have been operating for the past three days. Gul also points to two compounds where pre-teen boys have been abducted by police to be used for the local practice of “bachabazi,” or sex with pre-pubescent boys. “If the boys were out in the fields, the police would come and rape them,” he says. “You can go to any police base and you will see these boys. They hold them until they are finished with them and then let the child go.” The Interior Ministry in Kabul says it will address the reports only after contacting police commanders in the area. [Reuters, 7/12/2009] A villager in the village of Aynak, Ghulam Mohammad, says that villagers are happy with the Afghan army, but not the police. “We can’t complain to the police because they take money and abuse people,” he says. [Associated Press, 7/13/2009]Some Locals Prefer Taliban to Afghan Police - Mohammad Rasul, an elderly farmer, says that local people rejoiced when the Taliban arrived in the village 10 months ago and drove the police out. Even though his own son was killed by a Taliban roadside bomb five years ago, Rasul says the Taliban fighters earned their welcome in the village by treating people with respect. “We were happy [after the Taliban arrived]. The Taliban never bothered us,” he says. “If [the British] bring these people back, we can’t live here. If they come back, I am sure they will burn everything.” Another resident adds: “The people here trust the Taliban. If the police come back and behave the same way, we will support the Taliban to drive them out.” [Reuters, 7/12/2009] Similarly, within hours of the arrival of US troops in Aynak, villagers report the police abuse to US military officers and claim the local police force is “a bigger problem than the Taliban.” [Associated Press, 7/13/2009]Police Linked to Narco Warlord's Militia - Afghan police in the province are linked to corrupt local warlord Sher Mohammed Akhunzadeh. Akhunzadeh, a former Mujihideen commander and ally of President Hamid Karzai, has been implicated in heroin trafficking and the maintenance of a vengeful private militia from which many of the local police force were drawn under a Karzai plan to form an “Afghanistan National Auxiliary Police.” Akhundzada was the Karzai-appointed governor of Helmand for four years but was forced to step down after a British-trained counter narcotics team found nearly 10 tons of heroin in his basement. He remained powerful in the province, however, after Karzai appointed weak governors and/or allies in his place, allowing him to maintain control of the police, who were drawn in part from his own 500-man private army. Akhundzada’s predatory reign ended in 2008 when the Taliban regained control of the region. [Inter Press Service, 7/29/2009]Official US and UK Response Tepid - The spokesman for British-led Task Force Helmand, Lieutenant Colonel Nick Richardson, tells IPS that the task force is aware of the grievances voiced by village elders to British officers. He declines, however, to specify the grievances that are imparted to the British and says, “If there is any allegation, it will be dealt with by the appropriate authorities.” He specifies that this would mean “the chain of command of the Afghan national police.” The spokesman for the US 2nd Marine Expeditionary Brigade (MEB), Captain William Pelletier, is even less helpful. He tells IPS that he has no information about the allegations of misconduct by police as reported to British officers. IPS notes that the MEB’s headquarters in Helmand are right next to those of the British Task Force Helmand. Pelletier does not respond to another IPS query about the popular allegations made to US officers of police abuses in the US area of responsibility in Helmand. [Inter Press Service, 7/29/2009]Training for Afghan National Police - The Associated Press reports that after US troops arrive in the district, they send the old police force in Aynak to a US-sponsored training program called “focused district development.” The program, launched last spring, is geared toward police officers mainly from districts in Kandahar and Helmand provinces, and gives them eight weeks of intense training. Thousands of the nation’s 83,000-strong police force have already undergone training at regional training centers staffed by Western military personnel and police officers hired by US private security firm DynCorp, according to an NPR report. It is unclear whether the abusive police in Aynak had received US training under this program, but the head of the interim police force that replaced the abusive police, Colonel Ghulam, says that these officers had already had training. “They had training but not enough, and that’s why the people had problems with them,” he says. [National Public Radio, 3/17/2008; Associated Press, 7/13/2009]
A CIA-controlled Predator drone kills Tehrik-i-Taliban (Pakistani Taliban) leader Baitullah Mahsud in the hamlet of Zanghara, South Waziristan, in Pakistan’s tribal region. Prior to the attack, officials at CIA headquarters watched a live video feed from the drone showing Mahsud reclining on the rooftop of his father-in-law’s house with his wife and his uncle, a medic; at one point, the images showed that Mahsud, who suffers from diabetes and a kidney ailment, was receiving an intravenous drip. After the attack, all that remains of him is a detached torso. Eleven others die: his wife, his father-in-law, his mother-in-law, a lieutenant, and seven bodyguards. According to a CNN report, the strike was authorized by President Obama. Pakistan’s Interior Minister Rehman Malik will later see the footage and comment: “It was a perfect picture. We used to see James Bond movies where he talked into his shoe or his watch. We thought it was a fairy tale. But this was fact!” According to reporter Jane Mayer: “It appears to have taken 16 missile strikes, and 14 months, before the CIA succeeded in killing [Mahsud]. During this hunt, between 207 and 321 additional people were killed, depending on which news accounts you rely upon.” [New Yorker, 10/26/2009]
The Taliban’s capabilities and attacks have grown increasingly sophisticated according to US military officials who say it appears as if they have received training from elite forces. Several officials interviewed by the Washington Post say that it appears as if the insurgents attended something akin to the US Army Ranger School. “In some cases… we started to see that enhanced form of attack,” says a US Army general who previously oversaw forces in Afghanistan. He tells the Post that the insurgents have “developed the ability to do some of the things that make up what you call a disciplined force.” Another officer stationed at the Pentagon suggests that the Taliban are improving with experience by studying US forces in remote areas such as the Korengal Valley near the border with Pakistan. According to the officer, battles in this region “are a perfect lab to vet fighters and study US tactics.” Some officers conjecture that fighters are receiving professional instruction from Arab and Central Asian countries though the use of embedded trainers, a mentoring technique used by the US military. [Washington Post, 9/2/2009] Last year, Al Jazeera reported that former members of the Afghan National Police who had received training from US forces including Blackwater were defecting to the Taliban (see (August) - October 15, 2008).
Secretary of State Hillary Clinton circulates a diplomatic cable that states Pakistani intelligence continues to support some Islamist militant groups. The cable is sent to US ambassadors and other US diplomats, and contains “talking points” to raise with host governments. In Pakistan, the diplomats are told to press the Pakistani government to take action against the Haqqani network, a semi-autonomous part of the Taliban operating in Pakistan, and to enforce sanctions against Lashkar-e-Toiba, a Pakistani militant group linked to the 2008 attacks in Mumbai, India. The cable reads, “Although Pakistani senior officials have publicly disavowed support for these groups, some officials from the Pakistan’s Inter-Services Intelligence Directorate (ISI) continue to maintain ties with a wide array of extremist organizations, in particular the Taliban, [Lashkar-e-Toiba], and other extremist organizations. These extremist organizations continue to find refuge in Pakistan and exploit Pakistan’s extensive network of charities, NGOs, and madrassas.” (A madrassa is an Islamic boarding school.) The contents of the cable will be made public by Wikileaks, a non-profit whistleblower group, in 2010. [Daily Telegraph, 5/31/2011]
President Obama asks the Pakistani government for permission to launch raids on the ground against strongholds of militant leader Sirajuddin Haqqani, but the request is refused. Haqqani has become the de facto leader of the Haqqani network, a semi-autonomous branch of the Taliban. Although it is based in Pakistan’s tribal region, it launches attacks on US troops in Afghanistan. The US has put a $5 million bounty on Haqqani’s head, and attempts to kill him with drone strikes have been unsuccessful (see for instance September 8, 2008). Obama makes the request in a letter to Pakistani President Asif Ali Zardari, which is hand delivered by National Security Adviser General Jim Jones. General David Petraeus, head of US forces in the region, follows up with a meeting with General Ashfaq Kayani, head of Pakistan’s military. However, Pakistan says no. A senior Pakistani official says that a fight with the Haqqani network would create too many problems for Pakistan’s over-stretched army. “We have drawn a red line and would not accept any cross-border strikes by US forces,” he says. However, US intelligence believes that the ISI, Pakistan’s intelligence agency, is actually allied with the Haqqani network and has been for over 20 years. [Daily Beast, 1/6/2010] US intelligence believes that in 2008, the Haqqani network and the ISI worked together to bomb the Indian embassy in Kabul, Afghanistan (see July 7, 2008 and August 1, 2008). Later in the month, a suicide bomber will kill nine people at a CIA base in Afghanistan, and US intelligence will suspect that the Haqqani network was involved in the attack (see December 30, 2009) and the ISI may have played a role as well (see January 6, 2010).
A suicide bomber wearing an explosive vest kills five CIA officers, two private US military contractors, a Jordanian, and an Afghan at a remote base in Afghanistan. Six others are wounded. The chief of the base is one of those killed. The attack at the CIA base known as Forward Operating Base Chapman is in Khost Province, only 10 miles from the Pakistan border. It is one of two bases in Afghanistan directly run by the CIA; both are used in the effort to hit al-Qaeda targets with Predator drones in Pakistan. Triple Agent Suicide Bomber - The suicide bomber, Humam Khalil al-Balawi, is a Jordanian doctor. He also turns out to be a triple agent. Originally a supporter of al-Qaeda and other Islamist militant groups, he was recruited to be an informant for Jordanian intelligence. (The Jordanian killed in the suicide attack, Sharif Ali bin Zeid, was his handler.) Then the Jordanians passed him on to the CIA and he was an informant for them too. For months, he fed both intelligence agencies information that was used by US forces in Predator drone strikes. However, none of the targets were important, and this apparently was just a ploy to gain the CIA’s trust. He also was able to provide details on al-Qaeda sites in Pakistan in a way that proved he had been there. He even turned over photographs that gave “irrefutable proof” he had been in the presence of al-Qaeda’s top leadership. Promising Meeting - Having gained the CIA’s trust, al-Balawi was able to enter the base through three checkpoints without being closely checked, although even visiting dignitaries must be checked. He promised important information about the whereabouts of al-Qaeda deputy leader Ayman al-Zawahiri. This was considered the best lead on al-Zawahiri in years, and the White House had been told to expect important information from al-Balawi’s debriefing. Typically, only one or two intelligence officials are present in informant debriefings, but his information is considered so important that eight people are near him when his bomb goes off. [London Times, 1/6/2010; Washington Post, 1/10/2010]Base Commander Is 'World Class' Al-Qaeda Expert - Previously, al-Balawi had only met with Jordanian intelligence, but he was considered such a promising source that the CIA wanted to talk to him in person. The locale was chosen in part because the base commander, Jennifer Lynne Matthews, was considered a “world-class expert on al-Qaeda and counterterrorism operations,” who spent nearly 20 years in the CIA. She had been part of Alec Station, the CIA’s bin Laden unit, back in the 1990s. After 9/11, she was “integrally involved in all of the CIA’s rendition operations,” according to an intelligence source. For instance, she managed the operation that located and captured Abu Zubaida in 2002. From 2005 to 2009, she was the chief of the counterterrorism branch in London, and had a key role in breaking up a 2006 al-Qaeda plot to blow up airplanes. Then she volunteered to work in Afghanistan. [Washington Post, 1/10/2010; Washingtonian, 1/2011]Seven Americans Killed - The CIA officers killed are Matthews, Darren LaBonte, Elizabeth Hanson, Harold Brown Jr., and Scott Michael Roberson. Blackwater private military contractors Jeremy Wise and Dane Clark Paresi are also killed in the attack. [Washington Post, 6/8/2010]Lax Security Leads to Deaths - Al-Balawi is still outside when he is greeted by several CIA officials. Just as he is about to be carefully searched, he sets his bomb off. The blast is so powerful that it kills people standing some distance away. The CIA will later conduct an internal investigation and conclude that there were crucial security mistakes in letting him get so far into the base without being searched. [Washington Post, 1/10/2010; Washingtonian, 1/2011]Militant Groups Claim Credit - Several days after the bombing, a video will emerge of al-Balawi sitting next to militant leader Hakimullah Mahsud. In it al-Balawi says that he will martyr himself in revenge for the 2009 killing of militant leader Baitullah Mashud. Baitullah led the Tehrik-i-Taliban (the Pakistani Taliban), and was replaced by Hakimullah after his death. The video makes obvious that the Tehrik-i-Taliban had a major role in the attack, but other Islamist militant groups take credit as well. Al-Qaeda leader Mustafa Abu al-Yazid also will take credit for the attack on behalf of al-Qaeda. He will say it is in revenge for Baitullah’s death, plus the death of two other militant leaders killed in Predator drone attacks. Since, as previously mentioned, al-Balawi apparently had photos and other evidence showing his al-Qaeda connections, it seems al-Qaeda has a role as well. Additionally, the CIA base is just across the border from North Waziristan, the center of power for the Haqqani network, which is a semi-autonomous part of the Taliban. US officials believe that nothing happens in the region without the knowledge of the Haqqanis, and that network is probably involved as well. In the days after the suicide attack, the US will respond with an unusual number of drone attacks, most of them targeting Haqqani sites. US analysts fear the attack shows that the Tehrik-i-Taliban, Haqqani network, and al-Qaeda are effectively working together. [ABC News, 1/7/2010; New York Times, 1/9/2010] A later report will suggest that the ISI, Pakistan’s intelligence agency, could have supplied the explosives used in the bombing (see January 6, 2010).
Email Updates
Receive weekly email updates summarizing what contributors have added to the History Commons database
Donate
Developing and maintaining this site is very labor intensive. If you find it useful, please give us a hand and donate what you can.Donate Now
Volunteer
If you would like to help us with this effort, please contact us. We need help with programming (Java, JDO, mysql, and xml), design, networking, and publicity. If you want to contribute information to this site, click the register link at the top of the page, and start contributing.Contact Us |
// RUN: %clang_cc1 %s -verify -pedantic -fsyntax-only -Wno-unused-value -triple spir-unknown-unknown
#pragma OPENCL EXTENSION cl_khr_fp16 : disable
constant float f = 1.0h; // expected-error{{half precision constant requires cl_khr_fp16}}
half half_disabled(half *p, // expected-error{{declaring function return value of type 'half' is not allowed}}
half h) // expected-error{{declaring function parameter of type 'half' is not allowed}}
{
half a[2]; // expected-error{{declaring variable of type 'half [2]' is not allowed}}
half b; // expected-error{{declaring variable of type 'half' is not allowed}}
*p; // expected-error{{loading directly from pointer to type 'half' requires cl_khr_fp16. Use vector data load builtin functions instead}}
*p = 0; // expected-error{{assigning directly to pointer to type 'half' requires cl_khr_fp16. Use vector data store builtin functions instead}}
p[1]; // expected-error{{loading directly from pointer to type 'half' requires cl_khr_fp16. Use vector data load builtin functions instead}}
p[1] = 0; // expected-error{{assigning directly to pointer to type 'half' requires cl_khr_fp16. Use vector data store builtin functions instead}}
float c = 1.0f;
b = (half) c; // expected-error{{casting to type 'half' is not allowed}}
c = (float) 1.0h; // expected-error{{half precision constant requires cl_khr_fp16}}
b = 1.0h; // expected-error{{half precision constant requires cl_khr_fp16}}
half *allowed = &p[1];
half *allowed2 = &*p;
half *allowed3 = p + 1;
return h;
}
kernel void half_disabled_kernel(global half *p,
half h); // expected-error{{declaring function parameter of type 'half' is not allowed; did you forget * ?}}
// Exactly the same as above but with the cl_khr_fp16 extension enabled.
#pragma OPENCL EXTENSION cl_khr_fp16 : enable
constant half a = 1.0h;
half half_enabled(half *p, half h)
{
half a[2];
half b;
*p;
*p = 0;
p[1];
p[1] = 0;
float c = 1.0f;
b = (half) c;
c = (float) 1.0h;
b = 1.0h;
half *allowed = &p[1];
half *allowed2 = &*p;
half *allowed3 = p + 1;
return h;
}
kernel void half_enabled_kernel(global half *p,
half h);
|
vintage union jack rug wool red hudson boxes rug
Contact your local account executive or call our Customer Care Concierge at 800.423.4709 to place your order; typical area rug lead-time is 4-6 weeks.
The kits use pure British and New Zealand wool sourced by Iriss and the company are also heavily involved in the move how long until rug burn heals to reinvigorate the British Done in haste at room temperature hand market.
The scent may encourage your dog to pee there and fortify his or her scent mark in the area.
I have a hand knotted wool rug and it truly has held up so much better than machine made carpets in my home, so the price reflects quality.
Inspired by animal prints and designer shoes, the Colby Rug is right off the catwalk.
At in Fern Park, you can find high-quality, durable, and affordable furniture sets for any room in your home.
If you want the ease of using a canister vacuum but wish it had the power of an upright, the Powered Rotator may be the perfect vacuum.
Crafted of 100% hand-spun vintage union jack rug wool bamboo viscose, considered one of the finest fibers on earth, these rugs harmonize perfectly with modern interiors in deep shades of slate, mocha vintage union jack rug wool and satiny silver.
It fun to curl up your braids every so once in a while to see how big your rug is getting and decide how many more braids you want to make.
So the synthetic toxicants, toxics, or toxic chemicals you refer to are not toxins.
She received her propaedeutics in law with an average of 8.6.
With the Rite Rug Credit Card you can choose between many flooring products, including carpets, hardwood, laminates, vinyl flooring and tile flooring, and spread out the cost over time.
The Rug Market has a solid reputation for quality flooring, installation and design services.
We at Truckee Mountain Rug Co.
This can be caused during a cleaning process due to unstable dyes, and often from a flood or hot spillage.
Leather shag rugs are becoming popular for their durability and ability to blend in how long until rug burn heals well with home and office decor.
Rugs have evolved into a work of unique identity, the concrete embodiment of emotions woven into wools, silks and fine linens.
If your wool area rugs transitional rug has a wool area rugs transitional canvas or burlap backing rather than rubber or foam, add double-face carpet tape to the back side of the rug's newsliveforum.info/Vintage-Rug/vintage-union-jack-rug-wool/rug-and-weave-discount Indoor Area Rug is rated 4.9 out of 5 Clean I've hung need to part patterns chemical vintage union jack rug wool 28.
After cutting the waterproof tablecloth to size, I place it waterproof side down on the bottom of my carpet.
Getting coffee out of your carpet is a relatively easy task but if you are dealing with an older stain, you may try the following procedure.
One requires the use of a carpet seaming iron and heat activated tape that holds the carpet pieces together.
A custom built area rug that can be perfectly made to fit any angle, size or carpet style to meet the most challenging areas.
Carpet Runners can also be used to create stability and a non-slip surface for moving from one area to another.
Since rugs are so ubiquitous, shopping for one can be a pain because it's hard to know where to go, what to look for, and how to be sure you've gotten something good.
purple area rugs traditional vintage union jack rug wool
Southwest rugs are genuine, handmade weavings, made by Navajo weavers, using mostly handspun, native wool and vegetal dyes. Medicare uses a case-mix classification system to assign a nursing home resident to a RUG category based on his or her medical conditions and the resources needed to provide care. Numerous brilliant vintage rugs for sale female cat peeing on rugs created thanks to the emergence of the movement in America. These rugs are a fantastic eye catching blend of texture and feel that is a must have for anyone who wants their home decor to stand out from the crowd. Have you considered getting them cleaned in your local launderette - many do horse rugs and know not to shrink them. Hire the best carpet cleaning specialists from Space Steamers if you need professionals who offer effective services. The Woolite Heavy Traffic Carpet Cleaner can refresh and eliminate odors around your home. The average bear shot in Mn weighs 130-140# so unless you can judge them shooting a 200# might be a challenge. A common question when carpeting a room is how many linear feet to buy, given the dimensions of the room and the width of the carpet roll. Persian rugs made with extra high pile and very simple, graphic designs focused on the use of color, which can be vibrant or soft and earthy. The final step is extraction, where the Rug Doctor extracts the cleaning solution, dirt, grime and excess moisture from the carpet or rug with a powerful vacuuming action. Rug Pad Needed: No, the latex backing provides slip resistance and protection for underlying floors. The mouse pad definitely looks cool and has good quality for the price, but the texture of the surface makes the mouse movement becomes choppy and it is therefore not at all pleasant to actually use. And no matter when and where you need our rug rental, you can count on us. What to do: If this happens, you can use a damp cloth or sponge with a soap solution to wipe the rug. Place them underneath the portable kitchen island to define the cooking prep area, or set one below the dining table to anchor the mealtime zone. Through his travels and his contacts in Afghanistan, Abdul has assembled a collection ranging from small, colorful wall hangings to room-size rugs of breathtaking workmanship, hand-crafted from natural fibers. The stars represent the Australian Flag and the actual rug measures 58 x 85.5 cm. These beauties are the birth-child of a cross between central and western Turkish rugs during the mid 1800's.
zapotec wool rug guide
I strive to keep classes fun and relaxed for all, and I make sure you go home with the skills needed for satisfaction and success with your rug punching endeavors. I also have two dogs that leave hair EVERYWHERE and the Mighty Mite picks up pet hair better than any other vacuum I've ever used. Colonial Mills stair treads follow trendy flamboyancy and present their gorgeous woven designs to grace your steps with. They may need to be separated and reintroduced slowly, using food treats to reward and encourage peaceful behavior. When you choose us, you are dealing directly with individuals who are experienced and beatles rugs for sale when it comes to services such as rug cleaning, rug repair, upholstery cleaning, carpet cleaning and pet odor removal.
ivory shag area rug with black border
After using the powder my carpet was much fresher smelling and was no longer stale. We want to help you find the perfect area, Persian or Oriental rug for your home. The other benefit that is common with machine made rugs is they usually have a short pile and a dense weaveand they tend not to flatten as much as some other rugs. Carpets woven in central Persia tend to be cat hat bath rug most characteristic of all Persian rugs. Now I am inspired to make my own rag rugs thank you so much for taking the time to post this on line. I have a cat that was sick with a uti and he urinated in this one spot over and over again.
travel for rugs horses padded
As for Mercer Rug and its employees, they will now be owned by Hadeed Carpet Cleaning, a similar but larger company based in Alexandria. While you are breaking in the rug before you vacuum sweep it off with stiff bristled broom or it will clog. So I did some research into awning mats and found that the reviews on this one we're pretty good so I took a leap and purchased it and this is what I thought of after camping with this mat for the weekend. These provide superior cleaning while offering greater fabric and surface care to extend the life and luster of carpets and floors. With a wide variety of intricate patterns, bold colours and sizes, you are sure to find the perfect rug for your home. Below are a few recent sideboards of successful Canadian Threshold lists in America. Flat-weave rugs that are tightly woven are suitable for all types of chairs, and dash and albert rug sales are less likely to form from table legs. Few of us have the luxury of having a spare room that we can devote to storage, and have to make do with closets, cupboards and under beds. We have hardwood floors in our home with rugs that always seem to either bend at the edges or can never be kept in place especially with the rug in our living room which has the most traffic always seems to move. Using a soil bristle brush, immediately brush the powder thoroughly into carpet. Applying salt to a red wine spill on carpet helps to absorb the excess moisture without pushing the stain further into the carpet. The second book about building a loom yourself is called The Loom Book, by Tim Reed It, too, is out of print, and I have not seen a copy myself.
tx rug frisco stores
The measurements for this rug are: 12 feet 11 inches wide by 18 feet 9 inches long. An easy way to tear your strips-cut a couple of inches down, every 1 1/2″ or however wide you want your strips, across the top of the sheet. If so, check out the A to Z Stain Removal Guide which gives directions for how to remove mohawk eason dark brown area rug 100 types of stains from all kinds of surfaces. Finding synthetic material rugs in your decided pattern or color may be easier than finding the same in natural fibers. At Heirloom, we can either completely remove the fringe from rugs for customers who have become tired and stressed with their fringe or replace existing fringe. With over 90 vendors covering over 40 rug-producing countries, you will agree that we have the best selection of rugs in Bradenton.
rugs to go xfinity
Every rug goes through a range of quality inspections, looking for consistency in size, yarn quality, pile height and shearing. Fereghan rugs are generally more related to Sultanabad, Mahal and general Arak weaving which exhibit looser weave density overall. Interior Technology Services is specially trained and uniquely qualified to clean your oriental or area rug. Her simple solution is to wrap the wool in a plastic bag and put it in your freezer for a day or two. Her grandmother, a Finnish immigrant on a small farm in Calumet, Michigan, was a rug weaver, and she grew up with Grandma's rugs on the floor, but hadn't thought about weaving until she crocheted one rug, braided one rug, and was dissatisfied with the process. Sisal is much stronger than most other natural fibers that are found in rugs, such as flax, jute, and hemp. It must be discontinued, but you may want to call the manufactuer, ask them why this rug was discontinued, and if it is in fact one of theirs. She just put the heavy thread between the strips to attach the two outside strips together. When you have completed hooking the rug it is time to choose binding with a complimentary color and bind the edges. A rug too large may collide with furniture and walls, or become a trip hazard if it creates an uneven surface. That's why you shouldn't use it on stain resistant carpet or natural fibers, but it's acceptable to use on olefin. Once the sides and/or ends wear and weaken, this quickly puts the rug at risk carpetright rugs and runners unraveling. Most of the rugs I'm looking at are maybe 50 years old, relics of the time before everyone worried about time. All in all you'll find that the $500 proffessional job doesn't look so bad, $500 could be pretty cheap for a rug depending on the size of the bear you have. Because of this, we decided the best course of action would be to ensure that no further damage be done to an already damaged rug. Think of it this way: a rug should fit the size of the main area of a room, which is not necessarily the entire room. The second thing I've tried is buying a huge plastic tote box with a flat lid, and cutting a round hole in the middle of the lid for the cat to get through. Modern styles often use neutral colors in the furnishings and walls and add visual interest and some additional color with a bold, printed rug like a tiger rug. One of the more common causes of water damage though is from potted plants that are placed directly on the rug. Weatherbeeta Web Leg Straps are a fully adjustable leg strap for replacement or for use with rugs with d-rings that are not supplied with leg straps.
wash an area rug
Delivery of an assembled rug display system can save hours of time otherwise needed to properly assemble the better homes and gardens indoor outdoor rugs That's when I realized that COLOR choices were the most important decisions involved in making a beautiful rug. Another frustration with the design is the difficult of cleaning the dirty water tank in general. Whether you just want to buy a Little Navigator Area Rug or shop for your entire home, Birch Lane has a zillion things home. Our realistic black bear skin carpet mounts olson low cost. The quality and workmanship of this rug is exceptional it I wouldn't expect any less from Candice Olson.
unique upholstery carpet and rug cleaning
General Gameplan: Make your opponents play around the Twin combo that's not in your deck. Newcomers to the Persian city weaving groups include extremely finely knotted Qums and Nains, while a burgeoning number of geometric rugs were woven in Heriz and by the descendants of the Bakhtiari tribespeople. Once the soil is rinsed away, the area rug is dried flat or hung to dry in a controlled environment. Featuring 100 percent natural jute fibers, the Metro rug provides an authentic look and luxurious feel. It never occurred to check yelp online reviews as Home Decorators Collection's products are offered through Home Depot. These ridges actually grab to and hold any silk rug to prevent slipping on top of the pad. Sometime's an area rug is a bit dirtier than what it would be with normal wear and tear. Machine Made - A machine known as a Wilton loom and power loom, produces a machine-made rug. Decontamination Bath: We use a special decontamination treatment to protect the natural fibers in your Oriental rug. The other benefit of a Prue Cushion rug pad is that it protects the floors from scratching rug backings and rug shifting. We find that most repairs necessary to restore an area rug to like new condition are quite simple and cost less than you think. Each rug is axminster woven through-the-back for the finest imported skein-dyed and lustre washed worsted wool yarns. At that time I was more interested in introducing people to rug hooking and getting classes than I was selling patterns and wool. James Opie covers the weavings of the nomadic and village-dwelling peoples of Iran, Afghanistan, Turkey, the Caucasus, and Central Asia, and describes the ancient roots of tribal rug weaving and the significance of their common Oriental rug patterns and traditions. Think Executive Rug Cleaning the next time you need area rug cleaning and repair. They wouldn't because they would not be cost competitive with Joe Schmoe and his 1985 hatchback and his DIY carpet machine. The information below is the result of a recent HEAD request from the Atlantis Rugs UK website, at It's reasonable to ask why any of this information might be useful, yet it can avail a knowledgeble customer of some useful tid-bits. Teach children about time with our Signs of the Time mats and an introduction oriental rug guide kit music with our Noteworthy carpets.
natural sheep wool rugs
I have long been known as a solid player, but never as a deck designer. Other area rugs that are popular besides the most common rugs, which are made from wool, wool blends, silk or synthetics, are indoor/outdoor rugs made from Olefin or Polypropylene and vinyl floor cloths rug runners with rubber backing track from new age vinyl. Give us a call at Kennedy Carpet, we can help solve any restoration emergency you may experience and we are on standby 24/7 for all restoration emergencies in Quincy, MA. Rated 5 out of 5 by Wife from Rug runners I fell in love with a runner in the catalog about a year ago. The art is not lost in Ghiordes, for at discouragingly long intervals there find way to market from that town dainty prayer rugs or some bits of sedjadeh, so fine of texture, so true in color, so traditionally perfect in design, that experts, knowing well how far the Ghiordese have fallen from workmanly grace, swear by the beard of the Prophet that they have been made in Sehna, after the Ghiordes patterns of long ago. My sweet Mama read my paint tricks post and told me she really loved the vinegar tip.
standard australian rug sizes
Most designers recommend choosing a rug that will cover the majority of the floor, with approximately 18 inches of exposed floor on all sides of the rug. Their three showrooms are filled with thousands of rugs from all over the world. I attended a class given by Kathy Clark on how to design a antique primitive pattern and techniques in how to make it look old. By applying fiber stain protector, you will increase the striped black white rug of your area rug dramatically. The rug repair and cleaning company utilizes a unique cleaning process that includes hand-detailing of problem areas, complete removal of all dust and foreign particles, and removal of atmospheric gases. If you are new to this blog, my background has been, 9 years in a rug cleaning business. |
Newsletter 204: March 2015
Contributions for this Newsletter are most welcome, both from our members and others. We ask that they be go-related and “newsy”. They should be fairly brief and may include a few pictures (jpeg files), and links to items elsewhere on the internet. Contributions should be sent to newsletter@britgo.org to arrive by the first day of the month.
The place for debate and general discussion is currently Gotalk[1]. However, an introduction to a new topic is fine in the Newsletter.
Jil Segerman, Newsletter Editor
NEWS
This is the 5th season of a team competition played online on Pandanet (IGS) in its own room "EuropeanTeamChamp". The UK team captained by Chris Bryant went clear top of the European C League. After 7 matches the British team has 7 wins, having won the first 6 matches 3-1.
Our seventh match was against our major rivals Bulgaria, who also had 6 wins, and somehow, without our top two players, we won 4-0! Information on the British players and their progress is on our Pandanet page[4]. Check the schedule and log in on Pandanet to watch the action!
SUNDAY EVENING LECTURES on KGS
The talks are online on KGS in the British Room. Look for the open game “BGATeach”. There is an audio feed, so make sure your sound is switched on. Details of forthcoming lectures are on our Calendar[5]
BRITISH GO CONGRESS: UPDATE There are now 50 entrants, ranging from 4dan to 17kyu. The Congress will be held at the Prince Rupert Hotel, Shrewsbury; see the brochure on our Calendar page for more information. Time to make up your mind and book for a great weekend. There are still a few rooms available at the hotel.
We are delighted to announce the attendance at the tournament of a pro-standard player. Chi-Min Oh, 7dan from Durham has an EGF rating equivalent to 3p. He will run the teaching session on Friday afternoon and will also be available for game commentaries."
Pentangle Puzzles and Games[6] have kindly agreed to be a sponsor for the tournament. They will have a stall there, displaying go books and equipment including some clearance lines at half price. If you are interested in seeing any specific more expensive or unusual stuff from their range, then contact them in advance on info@pentangle-puzzles.co.uk so that it can be brought to the venue with no obligation.
ANNUAL GENERAL MEETING
The Annual General Meeting of the British Go Association will be held at the Prince Rupert Hotel, Shrewsbury, Shropshire, SY1 1UQ on Saturday 28th March at 7pm, or slightly before if the third round of the British Open is complete (and no earlier than 6:30pm).
CALLING YOUNG GO PLAYERS: 2015 UK GO CHALLENGE The entry forms for the 2015 UK Go Challenge are now available on the UK Go Challenge website[7]. Packs are now available. The only thing that has changed this year is the prizes. Back again are the ever-popular black and white logo bugs, and the top prize is one of the "Play Go!" tote bags. We hope all UK youth or school Go clubs can take part. See full information here.[7]
ONLINE LEAGUE
Reminder of last month's item: We are now taking entries for the 2015 league season. This will get under way hopefully at the beginning of April 2015. If you would like to join it, either as an individual wanting to be assigned to a team, or a new team wanting to join, please contact the Online League coordinators at online-league @ britgo.org as soon as possible. Also advise any changes of members and provide email addresses. Further details are on the League web-page[8].
Please could existing teams confirm as soon as possible that they want to play this season and also advise any changes of members.
OUR ANNUAL AWARDS
Reminder: Voting for will close on 21st March 2015, and awards will be presented at the AGM. Please log in and visit our Awards 2015 page[9] to cast your vote.
Looking ahead to 2016, Council has decided that the Awards will continue for a second year, with an additional category: Recruiter of the Year. This is intended to recognise the person who has recruited the most new members to the British Go Association and, unlike the other awards, we’ll accept self-nominations! We’ll also consider those people who’ve recruited large numbers of people to Go, but may require some evidence of this...
CANDIDATES' TOURNAMENT
The Candidates' Tournament will take place on Saturday 2nd to Monday 4th May, in Cambridge. We are pleased to announce that Matthew Macfadyen will attend to provide games analysis for players at the tournament.
Your last chance to qualify is at the British Open in Shrewsbury. Please visit the BGA
calendar to get full details and also the 'more info' link to get advice on accommodation, especially if you do not drive or need to be very near
the venue. In any case you should start finding accommodation now if
you do not live locally.
CAMBRIDGE UNIVERSITY GO SOCIETY 50TH ANNIVERSARY
CUGOS, the second oldest Go club in the UK after the London Go club, was founded in October 1965 and we’re hoping to celebrate the 50th anniversary with a dinner and perhaps a special Go tournament, probably in early 2016. Obviously details from the early days are sketchy now, but if you were or are a member and wish to be added to the mailing list about this event please contact, Jon Diamond jon@diamondconsulting.co.uk. If you have any suggestions about the type of event or other people to add to the list Jon would also be pleased to receive them.
PS Please also contact Jon if you have any stories or additional information about the club, so that we can produce a CUGOS history for the occasion.
EUROPEAN GO FEDERATION ACADEMY: YOUNG PLAYERS' SUPPORT
Announcement from EGF President Martin Stiassny:
"After signing a memorandum of understanding with Mr. Ge Yuhong (owner of the Go-school in Beijing where our students are studying) and Mr. Luo Gang (chief manager of CEGO) for a cooperation till December 2016 I am proud to announce the EGF Academy.[10] The start is scheduled for 23rd March 2015.
The EGF Academy will offer online-playing, analyzing and teaching in different groups for more than 30 players. General manager of this project will be Viktor Lin, the vice-president of the Austrian Go Association.
This is another very important milestone for European Go!"
GO ACADEMY FOR YOUNGSTERS IN BEIJING
Announcement from EGF President Martin Stiassny:
"According to the EGF-CEGO cooperation, we will get in 2015 again the chance to nominate up to 6 promising players for studying Go in Beijing from 16th September 2015 till 29th February 2016. Last month (in a meeting in Beijing) both sides agreed that we should try to find younger players for this project. Our friends in Beijing are checking several points, for example under which conditions youngsters from Europe can enter an international school, parallel to studying Go.
So our goal in Europe should be to find players younger than 18, maybe 16 years old, best case 14 years old. It will not be easy to convince parents to send their children to China. But the message of today: Please look on your youngsters. If you have a candidate, Zhao Baolong, the chinese Pro, coming back to Europe in March, will test these promising boys and girls.
The clear statement of our friends from CEGO: We want to support younger players, not only in Europe (see EGF-academy announcement) but also in Beijing."
Please don't hesitate to contact Martin Stiassny or Li Ting if you have a candidate. Contact[11]
WORLD AMATEUR GO CHAMPIONSHIPS Des Cann will be the UK representative at the WAGC to be held in Bankok in June.
YOUTH SQUAD TRAINING IN CAMBRIDGE, 1ST MARCH
Twenty two players aged 5 to 15 took part. In the morning there was some teaching and in the afternoon a four round tournament in four groups ranging from around 10-kyu in the top section to novices in the lowest one. The section winners were Charlotte Bexfield, Alexander Hsieh, Daniel Chen and Jianzhou Mei. There were lots of prizes and nice cakes, and the players were given Baduk Sports Ring wristbands to show the rating levels they have achieved.
ADMIN.
CALLING ALL TOURNAMENT ORGANISERS: CHILD-FRIENDLY TOURNAMENTS
We want to encourage children and young people to take part in tournaments. With approval of our Child Protection Officer Sue Paterson, Colin Maclennan has drafted the following additon to the Tournament Organisers' Handbook:
"When planning your tournament consider the following;
1. At the registration stage, ask entrants if they plan to bring children or young
people with them, and if so their ages.
2. If you have children or young people registered, try to arrange the draw so that
they win at least one game. Youngsters are usually relatively weak players
compared to adults, and can find it very discouraging to lose all their games.
3. Try to have some prizes appropriate for younger players, and hold them back so
that they don’t get chosen by the adult winners! Try to make sure the child or
young person actually wins a prize! Tournament organisers have a lot of
discretion and it is always possible to award a prize for “best defence in a lost
game” or some other invented category."
YOUTH AND STUDENT MEMBERSHIP FEES
You’re probably aware that Council decided last year to create a Student internet-only membership at a dramatically reduced cost of £5 per annum. We’d like to clarify this and how it relates to the old Under-18 and Student memberships. The new categories are:Youth: UK residents who are either under-18 or who qualify for Student membership. If you don't want the printed British Go Journal please sign up for Student Membership.Student: UK residents who are under-26 and studying full-time at a UK approved educational establishment. This is an online-only membership. If you want the printed British Go Journal please sign up for Youth Membership.
PROPOSAL FOR LIFETIME MEMBERSHIP
Some other organisations, such as the National Trust, offer a life-time membership at a cost of something like 30-40x the standard annual membership (less for those over State Pension Age). We currently offer a maximum of 5-year membership at our Standard rate. Is there any interest in us offering a similar lifetime scheme? If you have some please contact the President.
TO QUALIFY FOR THE WORLD MIND SPORTS GAMES
There has been no confirmation of this happening next in 2016, and some indications that in any event it won’t happen until 2017 to avoid a clash with the Chess Olympiad. However, just in case it does happen in 2016 this is an advance warning for those people who might hope to qualify: if Council uses the same criteria as in 2008 and 2012, then you need to make sure that you’re on the EGF rating list that we publish on our website early in 2016. A historic rating that isn’t seen because you haven’t played a recent tournament is not sufficient (see the EGD site[12] for more details).
WORLD WIDE IWAMOTO AWARDS 2015
A message from Harry van der Krogt, Financial Manager of the European Go Centre[13]:
"The European Go Centre is happy to announce the World Wide Iwamoto Awards. In succession to the European editions in 2001, 2003, 2007 and 2012, the Iwamoto Awards now go global. Thanks to internet and social media, the world has become smaller, so we think it is time to invite people on a global scale to submit Go promotion projects.
These projects are collected in our public database. With this information everybody who is involved in the promotion of Go can find new ideas and inspiration for their own projects. You can have a look at our website at http://go-centre.nl/wp/home/iwamoto-awards/iwamoto-award-entries/ to see the submissions of previous editions of the European Iwamoto Awards.
The winner of the award will receive € 1.000, two runners up will receive € 500.
The European Iwamoto Awards were much appreciated by the contributors, the EGF and the Nihon Ki-in. Therefore we want to extend the project and improve some features. You can find all details and the criteria for submitting projects on our website[14]" |
14 Harsh But Obvious Truths Most People Choose to Forget
Similar to success, the interpretation of happiness is unique to each individual’s heart and mind. Despite the wealth of studies conducted to investigate the concept of happiness and the individual factors that influence it, there is no single, accurate metric for which it can be effectively measured.
That being said, there are a number of harsh truths that people often overlook during the pursuit of happiness. This may be a conscious act of ignorance, since these austere facts of life challenge those who are indecisive or lacking in mental toughness. Recognizing these truths will actively empower you to achieve happiness, both in your professional and personal pursuits.
What are these truths and what benefits can you enjoy by recognizing and accepting them as fundamental aspects of life? Consider the following:
1. Life is Short and There’s More to be Embraced
While there is evidence to suggest that the average life expectancy is continuing to rise even in developing economies, it’s a fundamental truth that the typical human existence is relatively short. Although this is not a positive thought, you should consider it as a reminder to make the most of every opportunity that comes your way and live your life to the fullest.
2. Failure is a Fundamental and Necessary Part of Life
While none of us like to fail, this is unfortunately an inescapable and omni-present fact of life that must be accepted unequivocally. Even though you may fear failure, you cannot refuse to accept new challenges simply in an attempt to avoid feelings of disappointment. When you consider that failure is a necessary foundation on which success is often built, it is something that can be embraced and given positive associations.
3. You Have a Lot to Learn Regardless of Your Age
Whether you are a teenager, in the prime of life or approaching your retirement, you cannot deny that learning is a constant process that continues from birth until the day that you die. If you fail to absorb new information or methods of working as you continue to age, you will ultimately cease to evolve or advance in line with social progression.
4. There are Always Factors That You Cannot Control
The course of your life is influenced by a series of factors, from the people you meet, to your health, or the decision others make. Many of these factors will remain outside of your direct control, and it is important that you do not waste your time, talent and emotional energy attempting to influence them. Instead, you should focus solely on influencing the factors that you can control, such as prioritizing your goals and surrounding yourself with positive people throughout your lifetime.
5. Information Should Never be Confused with Knowledge
While it is possible to spend the majority of your life absorbing data and acquiring information, this should never be confused with gaining knowledge. At best, attempting to read information and discussing theoretical ideals merely gives you a philosophical understanding of a particular subject. Experience and practical endeavors provide you with a satisfactory level of knowledge that can equip you to succeed in life.
6. A Busy Life is Not Necessarily a Productive One
If you ever hear people discussing the concept of a ‘busy fool,’ they are referring to individuals who invest vast amounts of time and energy into projects without achieving anything noteworthy. It is a sad truth that many of us mistake business for productivity, in the same way that some confuse an excess of physical endeavor with inspiration. Productivity relies on a more structured approach and the ability to schedule time in a sensible manner.
7. You Cannot Achieve Success in Life Without Providing Value
We have already discussed how the interpretation of success varies from person to person, but this does not mean that there are not fundamental rules that can help you to achieve your goals. It is important not to become preoccupied with a generic understanding of success, or simply aspire to become wealthy and famous without understanding how you intend to achieve these ambitions. You cannot be successful without first providing value, and this requires you to develop in-demand skills and apply them over a period of time.
8. Understand the Clear Distinction Between Thinking and Doing
Theory is a crucial aspect of social, scientific and technological advancement, and it has underpinned some of the most important developments since the dawn of the 21st century. The cultivation of such wisdom would mean little without the efforts of pragmatists, who are happy to stand on the shoulders of giants and use intellectual theory to create a practical application. This perfectly epitomizes the difference between thinking and doing, which is important to understand if you are to strike a productive balance in your own life.
9. The Past Can Never be Changed, Only Learned From
Like failure, our past experiences are the building blocks that help structure our lives and determine all future successes. This should help you to cope with the fact that you will never be able to change your past or the impact that it has had on your life, regardless of your age or the outlook that you have on life. Instead, what you can do is control how you react to past events and learn from them in a constructive and positive manner.
10. You Must Take Responsibility for Your Own Happiness
While we all dream of finding love and settling down with a life-partner, there is always a risk that a romantic relationship can end acrimoniously and in heartbreak. This ending can occur because you have an unhealthy view of relationships, and place your heart and happiness in the hands of a loved one. This is extremely counter-productive, as you must assume responsibility for your own happiness and develop a sense of self-worth that enables you to approach relationships from a position of emotional security.
11. There Will Always be People Who Do Not Like You
On a similar note, this inflated sense of security can help you to deal with the fact that there will always be people who do not like you. If you pursue a path in life that encourages you to focus on being a people-pleaser who wishes to avoid conflict at all costs, you will ultimately become discontented and detached from your own goals. Instead, accept that you will never be everything to everyone and focus on being true to yourself in the pursuit of happiness.
12. You Will Get Out of Life What You Put Into It
Life is an exercise in establishing goals, pursuing them and generating some form of return for your efforts. A general rule is that you will get out of life what you are prepared to put into it, whether this relates to love, friendship or professional success. If you remain willing to invest time and effort into delivering value, you will surely secure success over a prolonged period of time.
13. Repeating the Same Activities Every Day Hinders Self-improvement
While there may be staple features of your daily routine, the failure to embrace new lifestyle actions and broaden your range of activities will ultimately hinder self-improvement and personal development. Growth occurs as a result of change or evolution, while such an outlook also exposes you to new and exciting experiences. So although change for changes sake should be avoided, it should be considered as a viable option when necessary.
14. Accept That Change is Intimidating and Will Likely Prompt Feelings of Fear
Before you implement changes into your life, you may experience feelings of fear and genuine trepidation. This is because you are effectively embracing the unknown, which can trigger more significant changes in your life over a longer period of time. You will never be 100% prepared for change or new chapters in your life, which means that you must maintain a willingness to be bold and operate outside of your comfort zone during the pursuit of success.
Lewis is a freelancer writer, blogger and researcher who works for Shift Insurance He specializes in the fields of finance, business, digital marketing and technology. He also has a passion for healthy living and exercise. |
In a flyfishing world which many times focuses on hatches, learning particulars about the hatch in question has always been one of the primary keys to success. Flyfishing Alaska is consistent in that respect; where it varies and is unique may be in the substance of the "hatch."
Alaskan waters provide fish with many of the same aquatic insects that are present in waters throughout North America, although comparatively, hatches are generally smaller and less diverse. In many waters, commonly recognized hatches may be absent or inconsequential falling in the shadow of Alaska's "blanket hatches" of eggs and flesh. Both are by-products from millions of returning salmon which congregate in freshwater streams; similarly, they carry timing and substance to rival the most prolific hatches of more southerly waters. Eggs have remained a focal point of anglers pursuing northern fish; however, flesh is routinely viewed as an oddity and mistakenly overlooked by anglers making fly selections.
Fishing with a flesh imitation may seem unusual, but to resident fish, birds and mammals, salmon carcasses are an absolute life sustaining staple and a key element to the survival of the species. And from an angling perspective, salmon flesh may be more substantial than the egg we've come to associate so readily with for flyfishing in Alaska.
As the salmon enter their chosen streams and begin the spawning process, the eggs are one of the first big feeds of the new season for waiting residents. The magnitude of this occurrence cannot be underestimated, however, eggs are produced in limited quantities by only half the spawning salmon - the females. The five species of returning salmon may have different run timing making eggs available over a period of time, but the actual duration that eggs are available is relatively limited. In contrast, all salmon will produce flesh, introducing 100% of their body mass into the ecosystem. Flesh becomes available when the early run fish begin to die, and will be very abundant in late summer through fall until freeze up. Streambeds remain littered with carcasses that fish will continue to feed on well after the surface has frozen, and countless salmon along riverbanks become effectively preserved in ice until the following spring when thaws and increased water flows re-introduce salmon flesh to river residents.
Eons of time and the high nutritional value of salmon flesh have ingrained an instinct in resident Rainbows and others to feed on carcasses voraciously. These fish have an uncontrollable driven need to feed heavily on this food source any time it's present. What this means to the flyfisherman, is the opportunity to present an imitation while fish are feeding heavily on the natural. Odd or repulsive as the flesh concept may seem, what better situation could an angler hope for.
From a tactical standpoint - for us to accurately imitate a natural, it's important to understand not only what is hatching, but also the cycles, nuances and behavior of the natural. So how do you imitate something as abstract as a tattered piece of dead fish? Well, like other hatches, the first thing we need to do is identify the natural. Flesh is not necessarily just flesh - it varies.
The biggest variation in patterns lie in color. When salmon first enter fresh water, the color of their flesh ranges from pale orange to deep red depending upon the species. Shortly after their exit from the salt, physiological changes begin to occur resulting in metamorphosis that leave fish with little resemblance of their former selves. During this change, the flesh begins to pale and soften leaving the older fish with mushy white meat that will only be suitable for animal consumption.
Then, after the fish has expired and begun to decompose, the flesh will continue to bleach from the elements. This will be the primary object of our imitation - dingy gray or white. The notable exception to this presents itself in certain high-pressure fisheries. Where easy angler access and strong salmon runs meet, there will be a slaughter. Thousands of bright, fresh fish may be caught each day, with cleaning done on the bank or at fish cleaning stations, with the scraps being deposited in the river to wash downstream. A veritable chum line develops and these areas become feeding stations for resident fish. An imitation to be used in these areas should possess the orange salmon color of fresh flesh.
PRESENTATION
Presenting our fly to the fish is accomplished by "dead drift nymphing." Most fly fishers are familiar with the necessary techniques, but few nymphing situations will require more of the angler to assure a true dead drift. To appreciate the rationale behind a diligent dead drift, we can compare flesh with the imitations that are commonly used. Because emerging insects are alive and moving, there exists a small, acceptable margin of error. If our line drags a little, it may pull the fly toward the surface, imitating a phase of the emergence and still be effective. Flesh on the other hand, is inanimate - every feathery detail of movement is dictated by the will and whim of the current. A less than optimally presented fly will take fish, but the more naturally a fly moves in the water will reflect the number of strikes an angler will receive.
As in all fishing situations, the areas fish will be holding will vary with the water conditions. Generally speaking fish will take holding lies which deliver the highest concentration of food with the least amount of expended energy. Because flesh is dependent upon current for movement downstream, the areas of greatest concentration will be where riffs run into pools, deep water tails out, and slow water meets fast, although my most productive and favorite situation is near the dead falls, sweepers and log jams.
Many Alaskan streams are strewn with deadfalls - these areas are prime. Snarled branches form a strainer, effectively catching and holding salmon carcasses as they drift downstream. Carcasses pile on top of one another as the water pressure forces them further into the deadfall, never to come out again in one piece. Over time, the relentless force of the stream breaks the carcasses into small enough pieces to pass through the filter of branches. Flesh will continue to trickle from the sweepers for prolonged periods of time forming a feeding station for hungry Bows and Char. The beauty of this situation is that there's no place in the river a big bow would rather be than deep under the protection of deadfall timber. This combination of protection and a consistent food supply makes for "Hog Heaven."
Fishing the deadfalls can be tricky. The fish won't go far from their comfort zone - they don't need to. Get a drift through the slot with a white bunny leech and there's almost a guarantee. There's one obvious catch though - I mean snag. I've been plagued by the dilemma, knowingly making casts, setting drifts that I knew were in trouble if a fish didn't hammer the fly in the first few feet. Losing a dozen flies in ridiculously short stretches only to reach for another - why? Because the fish are so long, so fat and broad across the shoulders, and run, leap and fight with a wildness I've never experienced in another trout. These fish are in the prime of their lives after a spring feeding of smolt, a summer of eggs and the proceeding weeks of flesh. They're pristine, immaculate and huge.
Add Some Armor To Your FlyTo every problem there is a solution. How hard could it be to work through a snagging problem? Simple - tie weedless. I've begun tying a weedless version using mono that allows me to probe deep into the jams with a substantial increase in not only my recovery rate, but also more importantly my success rate. If tree branch type resistance is felt while drifting through dead-fall areas, pull slowly working the fly back the way it came, then once free, allow it to continue it's drift, then hang on.
Fishing flesh really is an odd, uniquely Alaskan event, but the concept will be quickly appreciated when the flesh hatch is on.
Footnote:
Salmon carcasses are very prominent in and of themselves, but their presence also creates another situation that is worth considering. Frequently carcasses above the water line become maggot infested. This writhing mass of maggots takes on the profile of a salmon and is disgustingly impressive. Rain, fluctuating water levels and boat traffic wakes all contribute to these larvae being washed into the river which creates another hatch of sorts. Maggots are easy to imitate and their presence should not be ignored if taking trout is the objective. |
Q:
Push fail for "force:source:push
I am creating an lwc. Below is the js code
import { LightningElement, track } from "lwc";
export default class HelloIteration extends LightningElement {
@track
contacts = [
{
Id: 1,
Name: "Amy Taylor",
Title: "VP of Engineering"
},
{
Id: 2,
Name: "Michael Jones",
Title: "VP of Sales"
},
{
Id: 3,
Name: "Jennifer Wu",
Title: "CEO"
}
];
}
And HTML is
<lightning-card title="ContactInformation" icon-name="custom:custom14">
<div class="slds-m-around_medium">
<template for:each={contacts} for:item="contact">
<div key={contact.Id}>
{contact.Name}, {contact.Title}
</div>
</template>
</div>
</lightning-card>
When I am trying to push it, an error occurred
Error force-app\main\default\lwc\myFirstWebComponent\myFirstWebComponent.js bad result: TypeError: Cannot read property 'parent' of undefined
at prune (/home/sfdc/tools/lwc/1.3.7-226.6/node_modules/@lwc-platform/sfdc-lwc-compiler/node_modules/@lwc-platform/sfdc-lwc-metadata/dist/template/transform/binding.js:111:17) at getPrunedPath (/home/sfdc/tools/lwc/1.3.7-226.6/node_modules/@lwc-platform/sfdc-lwc-compiler/node_modules/@lwc-platform/sfdc-lwc-metadata/dist/template/transform/binding.js:121:12) at elements.forEach.component (/home/sfdc/tools/lwc/1.3.7-226.6y.forEach (<anonymous>) at Object.transform (/home/sfdc/tools/lwc/1.3.7-226.6/node_modules/@lwc-platform/
ERROR running force:source:push: Push failed.
The linter is throwing the below error
How to solve the issue?
A:
The HTML for the component needs to be wrapped in a <template> tag. Change the HTML to the following and try re-pushing:
<template>
<lightning-card title="ContactInformation" icon-name="custom:custom14">
<div class="slds-m-around_medium">
<template for:each={contacts} for:item="contact">
<div key={contact.Id}>
{contact.Name}, {contact.Title}
</div>
</template>
</div>
</lightning-card>
</template>
|
Study of baicalin on sympathoexcitation induced by myocardial ischemia via P2X3 receptor in superior cervical ganglia.
After the myocardial ischemia, injured myocardial tissues released large quantity of ATP, which activated P2X3 receptor in superior cervical ganglia and made the SCG postganglionic neurons excited. Excitatory of sympathetic postganglionic efferent neurons increased the blood pressure and heart rates, which aggravated the myocardial ischemic injury. Baicalin has anti-inflammatory and anti-oxidant properties. Our study showed that baicalin reduced the incremental concentration of serum CK-MB, cTn-T, epinephrine and ATP, decreased the up-regulated expression levels of P2X3 mRNA and protein in SCG after MI, and then inhibited the sympathetic excitatory activity triggered by MI injury. These results indicated that baicalin acted on P2X3 receptor was involved in the transmission of sympathetic excitation after the myocardial ischemic injury. Baicalin might decrease sympathetic activity via inhibiting P2X3 receptor in rat SCG to protect the myocardium. |
RI DataHub - Data Mining
The RI DataHUB is a central resource for anyone interested in using data to understand the well-being of people in Rhode Island. The RI DataHub brings together data sets from multiple federal, state and local sources.
The RI DataHub allows you to select the data of your choice and visualize it in charts, graphs, maps and more. The ability to see relationships between data sets sheds light on important details and allows for new insights into policy or programmatic questions about the well-being of Rhode Islanders. |
Coors Field
As April dawns, the boys of summer begin their annual trek north from the cacti of Arizona and palm trees of Florida to their respective homes, keen to ply their dusty trade through a simmering July and, hopefully, into October’s chill, where the fortunate few will realize their childhood dreams of...
As snow flew in Denver this past winter, the right-field upper-deck area at Coors Field was getting a makeover. The top level was stripped of 3,500 seats to make way for The Rooftop: 38,000 square feet with two bars, a CHUBurger (featuring beef from Oskar Blues’ Hops & Heifers Farm in Longmont...
After Tuesday's All-Star game, the Rockies are back at home on Blake Street this weekend for an incredibly long home stretch of 10 games. If you haven't made your way to Coors Field this year to celebrate 20 years of major league baseball in Denver, now's the time. Our favorite seats...
Colorado Springs Sky Sox baseball is still—somehow—a hidden gem. That's probably because to get to the baseball stadium of the Colorado Rockies Triple-A team, you have to drive down to Colorado Springs, zig-zag past the giant New Life Church, and then take Powers Boulevard so far south that...
Rant: A Diamond in the Rain
Thanks to our unpredictable weather, it's wise to bring sunscreen, water, a raincoat, blanket, gloves, and a towel to a Colorado Rockies game—just in case. Early in this (young) 2013 season, it was the snow that kept the diamond at Coors Field covered by a tarp...
Rant: The National Western Stock Show is staying in Denver. So what's next?
Last week, a host of local officials announced that the 106-year-old National Western Stock Show would remain in Denver. This concluded about two years of wrangling over the event's future, and at one point it...
The Colorado Rockies are finally near the top of a list of major league teams for something—but it's not exactly an honor.
The website Urine Feces Everywhere—yes, that's really the name—ranked Coors Field No. 6 on a list of baseball's least-sanitary stadiums. Among a slew of criteria, UFE.com...
From the Archives
Slideshows
Previous
Johnson & Wales students, all baking and pastry arts majors, competed in the Gingerbread Takeover from December 6–8. Final judging took place on Thursday in the lobby of the Sheraton Downtown Denver hotel. All photos by Sarah Boyum
Photo of the Week
The American Society of Interior Designers' (ASID) Colorado Chapter decorated the Governor's Residence for the holidays. Holiday tours, free and open to the public, will take place December 8-11 and December 15-18 from 10 a.m. to 2 p.m. All photos by Sarah Boyum |
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE TS>
<TS version="2.1" language="es-ES" sourcelanguage="en">
<context>
<name>TestGui::UnitTest</name>
<message>
<location filename="../../UnitTest.ui" line="16"/>
<source>FreeCAD UnitTest</source>
<translation>Prueba de unidades de FreeCAD</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="31"/>
<source>Failures and errors</source>
<translation>Fallos y errores</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="47"/>
<source>Description</source>
<translation>Descripción</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="82"/>
<source>&Start</source>
<translation>&Iniciar</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="85"/>
<source>Alt+S</source>
<translation>Alt+S</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="114"/>
<source>&Help</source>
<translation>&Ayuda</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="117"/>
<source>F1</source>
<translation>F1</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="127"/>
<source>&About</source>
<translation>&Acerca de</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="130"/>
<source>Alt+A</source>
<translation>Alt+A</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="140"/>
<source>&Close</source>
<translation>&Cerrar</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="143"/>
<source>Alt+C</source>
<translation>Alt+C</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="161"/>
<source>Idle</source>
<translation>Inactivo</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="168"/>
<source>Progress</source>
<translation>Progreso</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="197"/>
<source>Remaining:</source>
<translation>Restante:</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="214"/>
<source>Errors:</source>
<translation>Errores:</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="231"/>
<source>Failures:</source>
<translation>Fallos:</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="248"/>
<source>Run:</source>
<translation>Ejecutar:</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="258"/>
<source>Test</source>
<translation>Prueba</translation>
</message>
<message>
<location filename="../../UnitTest.ui" line="270"/>
<source>Select test name:</source>
<translation>Selecciona nombre para la prueba</translation>
</message>
</context>
<context>
<name>TestGui::UnitTestDialog</name>
<message>
<location filename="../../UnitTestImp.cpp" line="164"/>
<source>Help</source>
<translation>Ayuda</translation>
</message>
<message>
<location filename="../../UnitTestImp.cpp" line="164"/>
<source>Enter the name of a callable object which, when called, will return a TestCase.
Click 'start', and the test thus produced will be run.
Double click on an error in the tree view to see more information about it, including the stack trace.</source>
<translation>Introduzca el nombre de un objeto llamable que, cuando sea llamado, devolverá un TestCase.
Haga clic en 'Inicio', y se llevará a cabo la prueba ya.
Haga doble clic en un error en la vista de árbol para ver más información sobre él, incluyendo el seguimiento de la pila.</translation>
</message>
<message>
<location filename="../../UnitTestImp.cpp" line="176"/>
<source>About FreeCAD UnitTest</source>
<translation>Acerca de FreeCAD UnitTest</translation>
</message>
<message>
<location filename="../../UnitTestImp.cpp" line="176"/>
<source>Copyright (c) Werner Mayer
FreeCAD UnitTest is part of FreeCAD and supports writing Unit Tests for ones own modules.</source>
<translation>Copyright (c) Werner Mayer
FreeCAD UnitTest es parte de FreeCAD y soporta escribir pruebas unitarias para los propios módulos.</translation>
</message>
</context>
</TS>
|
Prevalence of left-sided colorectal cancer and benefit of flexible sigmoidoscopy: a county hospital experience.
The best way to evaluate the colon for both diagnosis of symptoms and surveillance is colonoscopy. However, access to colonoscopy is often restricted. Our objective was to assess the anatomic distribution and stage at presentation of colorectal cancer (CRC) in a county hospital population, the prevalence and distribution of CRC in younger patients, and the utility of flexible sigmoidoscopy for early diagnosis of left-sided cancers in this population. We performed a retrospective chart review of 151 patients who underwent colorectal resection from 2001 to 2003. Overall, 66.9 per cent of patients underwent resection for left-sided CRC. Forty-two (27.8%) of 151 were under age 50. In patients over 50, 66.1 per cent were found to have left-sided CRC compared with 69 per cent of patients under 50. Fifty per cent (50.3%) of patients had stage III or IV (advanced) disease. Forty-nine and a half per cent of patients over 50 and 52.3 per cent under 50 had advanced disease. Forty-eight and a half per cent of patients with left-sided CRC had advanced stage disease compared with 54% of patients with right-sided CRC. In patients under 50, the rates were 55.2 per cent and 46.1 per cent respectively. Two-thirds of the CRC occurred in the left side of the colon in both older and younger population. Flexible sigmoidoscopy should be considered as an early tool in the diagnosis of CRC. |
Soil Compaction can be cause by many sources. Farming equipment, such as trucks and tractors, can lead to fragipan. Earth moving equipment can also cause compaction. Pastures can even be compacted by animals when field are wet (McMahon 147). That means even lawn mowers and people can cause compaction in their own lawn & garden. Especially when the soil is wet. These compacted soils have a higher Bulk Density. As the Bulk Density goes up, the pore space goes down.
Pore space is a needed part in the growth of any plant; grass, roses, corn, tomatoes, flowers. Remember, Field Capacity is the point where there is an equal amount or distribution of water and air in the soil profile. Plants need both air and water to survive. Compacted soils do not allow water, air or roots to penetrate easily. Water, air and roots are necessary for a healthy enviroment to grow plants and sustain the ecosystem for other organisms (Utah.gov). |
Pregnancy outcomes in in vitro fertilization cycles with serum estradiol drop prior to human chorionic gonadotropin.
To study the effect of an unpredictable drop in serum estradiol prior to hCG administration on pregnancy outcomes in in vitro fertilization cycles. 3653 consecutive IVF cycles from January 1, 1998 to December 31, 2000 at Brigham and Women's Hospital were reviewed, and 65 cycles in which oocyte retrieval (ER) was performed following a drop in serum estradiol (E(2)) not associated with intentional withdrawal of gonadotropins were identified. Daily gonadotropin dose was decreased at some time in 25 of these cycles, while the remaining 40 cycles did not have a reduction in gonadotropin dose. A retrospective case-control study of the respective live birth rates and pregnancy loss rates of patients with unpredictable E(2) drops in the 65 study cycles were compared to 65 age matched controls. Live birth rates (32% vs. 35%, p=0.72) and pregnancy loss rates (28% vs. 30%, p=0.76) were similar for all study and control groups respectively. There were no differences in live birth and pregnancy loss rates in cycles undergoing gonadotropin dose reduction (40% vs. 44%, p=0.78 and 29% vs. 39%, p=0.70) and cycles without gonadotropin dose reduction (28% vs. 30%, p=0.81 and 27% vs. 20%, p=0.72). In the absence of coasting, a drop in serum estradiol levels during GnRH-agonist downregulated controlled ovarian hyperstimulation for IVF prior to hCG is not associated with a decrease in live birth rates or pregnancy loss rates. |
577 F.2d 734
Harrisv.Byrnes
No. 78-6060
United States Court of Appeals, Fourth Circuit
5/15/78
1
D.Md.
AFFIRMED
|
Q:
What is the conjugate variable of angular momentum?
We know that for Heisenberg uncertainty principle, position and momentum are conjugates, energy and time are conjugates.
Like wise what is the conjugate variable for angular momentum?
Is it orientation along with something? Or anything else?
P.Q:-Another observation, the unit of Angular momentum already is kg*m^2/s, which is supposed to be the unit of uncertainty. So the conjugate variable must be unit less
A:
From Wikipedia, conjugate variables have a general definition:
In classical physics, the derivatives of action are conjugate variables to the quantity with respect to which one is differentiating. In quantum mechanics, these same pairs of variables are related by the Heisenberg uncertainty principle.
In the same way that the conjugate of linear momentum is position ($x$), the conjugate of angular momentum is "angular position", a.k.a. orientation. You can find a list of other conjugate pairs here.
As for the units of orientation, indeed, radians are dimensionless:
Although the radian is a unit of measure, it is a dimensionless quantity. This can be seen from the definition given earlier: the angle subtended at the centre of a circle, measured in radians, is equal to the ratio of the length of the enclosed arc to the length of the circle's radius. Since the units of measurement cancel, this ratio is dimensionless.
|
Q:
Is there a word for person who have to always read anything written or printed anything and anywhere?
Is there a word for person who always have to read anything written or printed either the graffiti on wall something printed on t shirt, behind or on side of the transport literally almost everything no matter the situation. Sometime he/she makes it awkward in-front of other people.More curious type of person but sometime annoying.
Edit 1: That word that clearly implies the behavioral pattern as mentioned by @Spagirl.
A:
A voracious reader, and anything shorter will be confusing.
Here's an example from Google Books, found using Chris H's suggestion in the comments:
Voracious -- Collins
If you describe a person, or their appetite for something, as voracious, you mean that they want a lot of something.
Joseph Smith was a voracious book collector.
He read voraciously.
There's also a rare (fancy, made-up) word, like Steve Lovell mentioned in the comments:
Omnivoracious -- Encyclo
Mentally striving to find and learn all existing forms of information beyond what is considered a normal acquisition:
He had an omnivoracious desire for knowledge about everything; both past and present.
|
Ultrastructure of the human palatine tonsil and its functional significance.
The human palatine tonsils represent a mucosa-associated lymphoid tissue with a significant function in mucosal protection against alimentary and airborne pathogens. The ultrastructure of different morphological compartments in the human palatine tonsil was studied in eighteen tonsils obtained from the patients who had undergone elective tonsillectomy due to chronic tonsillitis. The tonsillar specimens were analyzed by scanning and transmission electron microscopy. The results showed the presence of tight junctions between superficial epithelial cells of the oropharyngeal tonsillar surface. The crypt epithelium is a sponge-like structure infiltrated by non-epithelial cells, mostly lymphocytes, and is characterized by the presence of small pores - microcrypts occupied by large microvillus cells and/or lymphocytes. Antigen-presenting Langerhans cells with typical intracytoplasmic Birbeck granules were also found in the crypt epithelium. The lymphoid follicles are composed of lymphocytes and two types of non-lymphoid follicular cells: small fibroblast-like cells and large cells, morphologically consistent with antigen-bearing follicular dendritic cells or macrophages. The interfollicular areas consisted of a dense network of reticular cells and reticular fibers; many lymphocytes were interspersed between the reticular fibers. In addition to arterioles and high endothelial venules in the interfollicular lymphoid tissue, some fenestrated capillaries were seen intraepithelially and subepithelially. The complex ultrastructure of the human palatine tonsil provides a microenvironment necessary for antigen uptake, antigen processing and immune response. |
Directions
1. In a large bowl combine berries and pears. Add lemon juice, sugar, flour, and half teaspoon of cinnamon. Gently fold to mix.
2. Spray deep 10 inch pie pan with butter-flavored cooking spray. Gently lay one sheet of phyllo dough over the pan. Ease in dough and let the edges hang over the pan. Spray the dough with butter again or use a pastry brush and real butter, quickly or dough will dry out and become brittle. Place the second sheet over the first and right angles. Spray new layer. Repeat twice more. Heap fruit into the pan. Gently bring phyllo dough to partially cover the fruit.
3. Combine remaining 1/2 teaspoon of cinnamon and brown sugar. spray or brush butter over the top of the crust. Bake in preheated 350 degree oven until filling bubbles and crust is browned about 45 minutes. Remove from oven and let sit for ten minutes.
Recipes
Cookbook Cafe
Cookbook Cafe is a do-it-yourself digital publishing platform that enables anyone to create, market and sell their very own cookbook to the world for profit or fundraising. With our easy to use cookbook builder, you can publish your own beautifuly interactive cookbook as both Web-based eBook and iPad App. Read More |
Family man abducted in Vavuniyaa
[TamilNet, Wednesday, 09 July 2008, 17:37 GMT]Varatharaja Ganeshamoorthy, 32, a father of three children was abducted by a group of more than ten unidentified armed persons on July 4 night around 10:00 p.m from his house at Amman Koayilady in Thonikal in Vavuniya police division, according to complaints made by his wife Lakshmi with the Vavuniyaa Police, regional offices of the Human Rights Commission of Sri Lanka (HRCSL) and the International Committee of Red Cross (ICRC) Tuesday
She said that the gang had entered her house and asked for her husband calling by his name. When her husband came out he was dragged out of the house, pushed into a vehicle and driven away. Since then she has not received any information about her husband's whereabouts |
My Kitchen Back splash: Hand Painted Ceramic Tile
Have you ever seen something so lovely that it "haunted" you for a year afterwards? Well, that was the case when I found my hand painted kitchen back splash tile; proving, once again,
that, Good things come to those who wait work their butt off and don't take "no" for an answer!
I had seen it in a local tile store. All they would tell me was that it was hand formed and hand painted by two ladies that had a small tile company some where in Canada. That's all I knew...for a year...that and the fact that I had to have it in my kitchen.
A year later, we began construction of our home and, when it came time to design the kitchen, I knew that the tile was going to play a central role. I chose cabinets and counter tops that would coordinate with the tile that I had seen.
Everything was progressing smoothly...until my tile source went out of business. Our home took just over a year to build and I spent that time looking for another tile that I would love as much as the one that I had seen nearly two years earlier.
I found....nothing. Nothing would compare to the crackled glaze and hand formed tiles....nothing came close to the range of color found in raku. This tile haunted me!
We moved into our home and the kitchen was without tile for nearly two years after that (for those of you keeping track...this is nearly four years from the first time that I saw this tile)
Over the next several months, I scoured the Internet, searching, in every conceivable way, for hand painted, hand formed, ceramic back splash tile....then, one day, I found it! I called the lovely ladies in Canada and explained my situation and they agreed to work with me.
It took nearly another year before the tile was finished and installed. Each time there was a revision to the colors or to how I wanted it painted, it took 12 weeks for the new sample of the tile to leave Canada, clear customs and make it to Illinois.
After all that, I can still say that I love this tile! So much, in fact, that I decided that I'd like to install something similar in my new kitchen...different colors, of course, and a slightly different pattern, but I want to work with these ladies.
So, you can imagine my disappointment when I realized that I've lost the name and address of the company!!!!!
If any of you happens to recognize this tile or knows the name of the small, Canadian, tile makers that this may have come from....please message me....otherwise, I'll be searching the Internet...again...
No, I don't have a new home chosen...yet.
I do know that it will likely be a rehab and that it will involve a new kitchen....and hand painted ceramic back splash tile...from this company...if I can find them. You may wonder why I'm looking when I haven't even found a place yet... Well, this time, I'd like to have my tile installed in less than five years....that seems reasonable, doesn't it?
Lijit Ad Wijit
Lijit Ad Tag
Subscribe via email
Follow on Bloglovin
.
Hi! I'm Kimberly. Welcome to Serendipity Refined! This blog is about finding beauty in the ordinary "stuff" of every day life. I'm an expert in furniture painting and refinishing. I love decorating redecorating with vintage, repurposed and found items. I'm a lifelong DIY'er who believes that you can have a gorgeous home on a budget! Sometimes, you'll find me painting furniture and sometimes, I'm baking or crafting or rehabbing our 1950's ranch. It's all here, and I'm sharing it! So join me, won't you? I promise that it won't be boring. If you'd like to know more about me, please check out my About Me Page.
Blog Top Sites
Would you like SerendipityRefined delivered right to your inbox? Enter your Email Address below.
Copyright and Sharing Serendipity Refined
ALL IMAGES AND CONTENT COPYRIGHT SERENDIPITYREFINED 2011-2018
I don't mind sharing content, ideas, and photos, so long as you ask me and link back to the Serendipity Refined site for credit. Unless otherwise indicated, all images and content contained in this blog are copyrighted property of Serendipity Refined. Unauthorized use and/or duplication of this material without express and written permission from this blog’s author and/or owner is strictly prohibited. One picture with a link back may be used provided that full and clear credit is given to Serendipity Refined with appropriate and specific direction to the original content. |
Senators unwilling or unable to provide documented proof of their residence are being called on the carpet and forced to explain themselves in a series of meetings with members of the Senate's internal economy committee, CBC News has learned.
Those meetings begin today. It's unclear how many or which senators will be called.
Conservative senators David Tkachuk and Carolyn Stewart Olsen will play the role of interrogator, along with Liberal Percy Downe, the CBC's James Cudmore reported.
The internal economy committee asked all senators last December to prove where they live through drivers licences, health cards and tax filings. The committee is in charge of senators' budgets and administrative matters.
Nothing to be shortcircuited
Senator Mike Duffy said Friday he would repay expenses claimed for his home in Ottawa, explaining he made a mistake in declaring that his primary residence was in Prince Edward Island. Other senators, including Pamela Wallin, Mac Harb, Dennis Patterson and Patrick Brazeau, have faced questions about their expense claims and residency declarations.
Cowan said Monday that paying back the expenses may not be enough, depending on the results of the audit.
"That's not necessarily the end of it, absolutely not. It may be, but it depends on what the audit report says," Cowan said.
Emphasizing that he can't speak for any senator but himself, Cowan said he finds the form filled out by senators to be perfectly clear. If there is something confusing about a form he's filling out, he says, "You ask about it. That's what I do when I don't understand something. I never sign anything that I don't understand."
Cowan says he and LeBreton agree on how the issue of senator expenses should be handled, regardless of party.
"I don't think there's any difference between Senator LeBreton and me on this. We are both determined that this is dealt with fairly, openly, transparently, and nothing's going to be swept under the carpet. Nothing's going to be shortcircuited."
'Unacceptable for any other Canadian'
NDP Leader Tom Mulcair pointed to Duffy's claim that the form senators have to fill out is unclear, and to the fact Wallin has an Ontario health card but tells the Senate she resides in Saskatchewan.
"He says the form is too complicated …She told the federal government that she lived in one province while telling a provincial government that she lived in another. This would be unacceptable for any other Canadian. Why does the prime minister seem to think it's acceptable for his Conservative senators?" Mulcair said.
NDP ethics critic Charlie Angus said EI forms tell applicants that if they misrepresent the facts to make a false claim, they are committing fraud and could be prosecuted.
"So will the government hold senators who break the rules to the same standards they hold unemployed Canadians to?" Angus said.
Government House Leader Peter Van Loan says the government has committed to ensuring expenses and the rules governing them are appropriate, and to reporting publicly about them.
"Senators Patterson, Wallin and Duffy all own property in the provinces and territory they represent. They maintain deep and continuing ties to those regions and in fact three senators all spend considerable time in their home provinces and territory," he said.
"The reality is if you want to see real change in the Senate, if you want to see real change towards an accountable Senate, you need to embrace the Conservative proposal to actually let Canadians have a say who represents them in the Senate. The NDP simply won't do that." |
When Allen Hurns collects the first paycheck from his newly signed $40 million contract extension, the first thing he's probably going to want to buy is some anti-itch cream, and he's probably going to want to buy a lot of it.
You see, Hurns has what might be the worst allergy possible for a professional football player: He's allergic to grass.
That's like Joey Chestnut being allergic to hot dogs.
Although Hurns is getting $20 million guaranteed in his new deal, which is a good thing, the trade-off is that he's likely going to be with the Jaguars until at least 2020. That's bad news because the Jaguars practice on grass and play every single one of their home games on grass.
This catch was probably an itchy one for Allen Hurns. USATSI
Hurns told ESPN.com this week that he tries to avoid his grass allergy during practice by wearing long sleeve shirts and tights. Obviously, wearing that type of clothing isn't ideal when in certain situations, like during training camp, when you have to be outside in the hot Florida sun.
The good news for Hurns is that his grass allergy isn't that bad: It doesn't affect his breathing and it doesn't clog up his nose. The big downside to the allergy is that his skin will sometimes breakout in a rash after rubbing against grass. The rashes can end up being itchy.
"It has its moments," Hurns said of the allergy, via ESPN.com. "Sometimes I break out. Sometimes I don't. At times it gets pretty aggravating, but for the most part it's been holding up good."
The good news for Hurns is that the allergy held up long enough over his first two seasons that the undrafted free agent was able to earn a huge contract extension.
Hurns racked up a total of 1,031 yards and 10 touchdowns in 2015. |
immigration news
The immigration community is bracing itself for a historical and unprecedented exhaustion of the H-1B cap. Employers can petition H-1B workers for the October 1, 2007 start date beginning April 1, 2007. Since April 1st is a Sunday this year, applications will not be accepted until April 2, 2007.
The 65,000 visa numbers are expected to be exhausted within the first two weeks of April because demand is so high! This will have been the fastest the cap has ever been exhausted. Petitioners cannot wait and must be ready to file on April 2nd in order to have a chance of obtaining an H-1B visa number.
Bill Gates recently testified at Congressional hearings urging the cap be eliminated entirely and that an infinite number of H-1Bs be available. Sen. Judd Gregg (R-N.H.) said he “agreed 100 percent” that there shouldn’t be a limit on the number of highly skilled people in the country, but he suggested Congress might not be able to do more than double the quota.
Until Congress acts to increase the quota, employers and H-1B workers will have to scramble for the visa numbers as soon as they become available. The USCIS has informed the public that it will not accept any applications received earlier that April 2, 2007 and reject those filed before the start date. This means people who planned on filing their petitions on Friday, March 30, 2007 with the USCIS to accept on Saturday March 31, 2007, will have their cases rejected.
Because the filing date is fast approaching, and the quota is expected to be reached in either the first or second week of availability, H-1B petition preparation should be in its final stages. Those people looking for petitioners should intensify their job search right now to ensure sufficient time for an H-1B petition to be prepared for filing within the first week of April.
Below are some frequently asked questions we have received about the H-1B cap.
What does it mean when the H-1B cap is reached?This means that if an employer is petitioning to change your status to H-1B (for example from student or tourist status to H-1B), and the petition is received after the cap is met, the change of status cannot be granted.
If I get an October 1, 2007 start date will I be able to remain in the U.S. legally?You will only be able to remain in the U.S. if the previous status you were admitted in was valid until October 1, 2007. For example if you entered as a tourist and your I-94 card said your status was valid until October 1, 2007 or later, you would be able to remain in the U.S. You will not be allowed to work until October 1, 2007 and only if you were granted a Change of Status as well.
For students who are changing status to H-1B, the situation may be different. In the past the legacy INS passed a regulation allowing students who just graduated to remain in the U.S. and start working on October 1. It is unknown if the USCIS will provide the same benefit this time.
I am in H-1B status now and I have filed an extension or I will be filing an extension. Will I be in danger of missing the cap? Will I go out of status?No. The H-1B cap only applies to new H-1B petitions. If an employee is already in H-1B status and is being petitioned by the same employer or even a new employer, that employee is not subject to the cap.
I am not in H-1B status now. There is an employer who is willing to sponsor me. What should I do with the cap end approaching?You should begin processing the H-1B petition as soon as possible. The longer you delay, the closer you are to not getting a visa number.
Those who require H-1B petitions must coordinate with their immigration lawyers right now to ensure that they are on track for an early filing. In all likelihood, there will be no opportunity for a late filing. |
More than 10,000 packets of heroin were seized Monday night after Altoona police busted a suspected Johnstown to Altoona drug connection.
Damon “Fat Cat” Devine, 36, of Johnstown was arrested in the parking lot of Motel 6 on Sterling Street about 9:30 p.m. after Devine and three alleged accomplices delivered 13 bricks of heroin — 50 packets in each brick totaling 650 packets — to a police informant.
“We took a significant amount of heroin off the streets of Altoona and Johnstown,” Altoona police Lt. Benjamin Jones said Tuesday of the arrests by Altoona police and the Blair County Drug Task Force, along with agents with the Attorney General’s Bureau of Narcotics Investigation and the Cambria County Drug Task Force.
The heroin was branded “Dragon” by Devine, who police said talked to the informant using Facetime on Tuesday leading up to their meeting.
Devine allegedly was criticizing the informant for not having money owed to him and told him “he was screwing up a good thing,” police noted in the charges.
Devine also told the informant everyone wanted his brand of heroin, “Dragon.”
According to police, a police informant working with Altoona police arranged to meet Devine at the motel so the informant could pay the $7,000 owed for heroin that Devine had already supplied to the informant. Police supplied the informant with that money and another $2,000 for more heroin.
Police in Cambria County had followed Devine, who rode in a 2016 Chevrolet Malibu driven by Jasmine N. McGowan, 26, also of Johnstown, and another vehicle in their entourage, a 2006 red Pontiac G6 that was driven by 29-year-old Anthony Freiwald, also of Johnstown. Riding with Freiwald was Barbara Tyler, 57, of Trenton, N.J., police said.
When the two vehicles arrived at the motel, police were waiting and said Devine used Facetime to call the informant, who was in a room. Devine had the informant come outside and after the informant handed $7,000 to Devine along with the $2,000 for more heroin, Devine allegedly said he had eight bricks of heroin for the informant that he had paid for and was fronting him another five bricks for which he would owe $1,250. Devine then told the informant to get the heroin from “her” in the red car, according to police.
Tyler allegedly handed the informant the 13 bricks of heroin and as the informant walked back to his police contact, officers moved in and arrested the four on felony and misdemeanor drug delivery charges.
Police immediately seized the $9,000 in drug task force funds supplied for the deal. Another $826 was found on Devine, and McGowan’s purse held $7,126, police said.
At 1:15 a.m., police and state drug agents descended on McGowan’s Johnstown home, 179 Strayer St., and allegedly hauled off $8,849 in cash, 200 bricks of heroin, an ounce of marijuana and 87.6 grams of crack cocaine. The heroin equaled about 10,000 packets and the crack cocaine equaled about 3 ounces.
A Philadelphia man, James Everett-Bey, was arrested after the search in Johnstown and also faces felony drug charges.
“If 13 bricks of that heroin came to Altoona, how many more bricks could have come to Altoona in the future,” Jones said of the seizure.
Jones said the investigation remains ongoing and was supported financially by Operation Our Town.
Magisterial District Judge Todd Kelly set bail for Devine and Tyler at $100,000 each while bail for Freiwald was set at $25,000. McGowan’s bail was set at 10 percent of $25,000.
Preliminary hearing for the four suspects are scheduled for Feb. 23 before Magisterial District Judge Steven Jackson.
Mirror Staff Writer Greg Bock is at 946-7458. |
The continuing adventures of a cruising sailor/family lawyer, his wife (also a lawyer), and their young children.
Two Exhausted Boys And Pamela, The Perfect Hostess
Keith07/18/2008, LA
I wanted to get in this shot of Pamela even though the guys are about to crash on me. She was very kind to hang out with me so much while I was in town. Between taking care of the kids and me during the day and working at night these days as a set designer for hollywood, she is busy. My brother Kevin similarly puts in 12 hour work days to support the family. I remember when I devoted most of my life energy to work. I didn't even have a family to support. The work regimine we follow here in the US doesn't leave much left for one's self or others. With all this time and energy on my hands in this coming period, I hope I will not waste it and that I will savour and appreciate the freedom. Before he left for work this morning, my bro assured me that if I needed money, I could call on him. What a guy. Lets hope I don't have to make that call.
Keith, best weather yet this trip, except in the middle of the day, when it got warm07/18/2008
My brother Kevin left for work early and I got to spend a few hours with my youngest niece. We played with play dough together, I made her breakfast, she taught me her version of checkers and tick tack toe. Then my sister-in-law Pamela got everyone organized for the day. We dropped Jasmine off at camp and took youngest nephew Cameron to the Guitar Center. Cameron is 2.5 years old. Guitar Center is a music instrument superstore. The boy was in his element. He especially likes the drum section. We had to drag him out of there after spending over an hour running from one drum set to the next. A nice mexican food lunch, rest time, work-out and clean-up at the Beverly Hills Country Club, a bit of food shopping with Pam and the kids, BBQing red snapper on the roof deck with my bro, family dinner, and bed time. I sure like this better than hanging out by myself in an empty house in Tucson, but maybe not as much as hanging out by myself with the dogs in a cruising sailboat.
Somehow this is how the picture came out. I think I moved the camera when I realized it was going to flash and disturb everyone on the flight. I'm presently staying for a day or two with my brother, sister in law, and their two young kids in the city of Los Angeles. I feel better already. For one thing, its a lot cooler in LA than Tucson. Also, I'm traveling again, which feels right. From the calls and e-mails, the dogs and boat are fine. Only four more days, not that I'm counting. The highlight of Tucson was the friends and family that I spent time with. Going back "home" like that really taught me some things and put some things into perspective. Glad to be moving on in my travels.
My childhood friend Jen graciously picked me up from the airport and took me straight to our favorite sushi place. There we met Todd, who went to high school with me (though we didn't know each other at the time) and childhood friend and former roomate Zev, in from Israel. Zev was a big influence in Jake's life when he was a very young golden. It was really nice to go from being alone to being with good old friends. Jen took me to my parent's house, where I picked up my truck from their garage. I went back to my house on boulder canyon and spent the night there. It was a freaky night and I didn't sleep well. In a big empty house, no dogs or anything. The silence as I went to sleep was unnerving. I always felt comfortable and at home in that house. Not now. It was like I wasn't supposed to be there. By the next morning I couldn't wait to get outside. I went to defensive driving school from 7:30 a.m. until 12:30 a.m. It wasn't as bad as I expected, but it certainly wasn't fun. I could tell it was going to be a little different when the instructor had Grateful Dead playing on a boom box in the corner. Hours of rambling with a few jokes thrown in later and we were out of there. I went back to my house after running a few errands and again, I didn't want to be there anymore. My mother kindly offered for me to stay at their place and I took her up on the offer. It's still wierd to be here all alone, but better than my house. Cousin Jodi came over around sunset and we went over to my parents' clubhouse for a light dinner. I actually have a rather full schedule today so that should keep me busy, which is important.
I'm sitting on the ground near an electrical outlet in the terminal leading to security at the Norfolk/Hampton Roads airport. It is quite a nice little complex. Whatever problems I had with internet, electricity, and phone in Oriental, we've got all bars showing at this spot. The drive to the airport was uneventful and only about 20 miles. I found the long-term oversized vehicle parking without too much trouble and hung out in the motorhome for several hours before my flight. I was worried about finding a place to park the 34 foot motorhome near the airport but it wasn't a problem at all. No more expensive than using the regular long-term lot. I walked over earlier this morning and had crab soup and crackers for breakfast. Tasty. There are people from all over the world walking through this airport. Must be a popular tourist destination. Dare I say the trip out west has gone ok so far. Only 8 more days 'till we're back cruising.
Since I was parked a short walk from the Taco Bell, I made a run for it. I also needed ice. I ordered my usual, two hard tacos and a bean burrito without onions. Taco Bell is the only place I know that puts enchilada sauce in the bean burrito without having to ask for it or pay extra. Good on them. The onions I could do without. Who wants a crunchy bean and cheese burrito. I like my Taco Bell with several extra-hot sauces. Urban bliss, I tell you. Slept fitfully at the Walmart parking lot and awoke to full-on sunlight. Took a walk, but its not the same without the dogs. Every time I came back into the Rebounder I half-expected to see them. I called the Pet Parlor this morning and they say Jake and Anne are doing just fine...
Around noon today I loaded the Rebounder, brought the dogs to the Pet Parlor in Oriental for boarding, and headed off to Norfolk. It was a long drive. Stopped at this burger joint for lunch and had an incredible burger and fries. I'm parked about 30-40 miles from the airport just outside the city. The sun is just about to go down at 8:00 p.m. The weather here is perfect. I will be able to sleep with just the windows open tonight. It's like a completely different weather experience here. I can see now that the outer banks of the Carolinas are holding the bad weather in - maybe its the arctic water and the gulf stream converging off the coast that creates the weather we have been experiencing in Oriental, but whatever, it is much more dry, sunny, and pleasant up north here, at least this time of year. Sometimes you just have to push through the present circumstances - give up the good to go for the great, so to speak. I have to admit I was really depressed today leaving Oriental without the dogs, but I have no choice. Traveling completely alone is not what I had in mind. Leaving the dogs in a kennal was not in the plan. But I have already learned that cruising on a sailboat means giving up set plans and living day by day or week by week and making decisions as needed even if the decisions are hard ones. I bought a few $5 DVDs at the Walmart and will watch one tonight on the surround sound home theater. Tomorow late morning I will head to the airport to park in the long-term oversized vehicle parking. Late tomorrow I will be back in Tucson. As long as I'm in populated areas, I have good internet from the Verizon card (which they finally replaced via Fed Ex to Deatons). So for now I can keep posting, but there won't be much of interest to cruisers or arm-chair cruisers, except the reality that you sometimes get called back home and you've got to deal with that with as good an attitude as possible. |
Research has shown that there is evidence of cannibalism within the species of wolf spider. The study shows that male wolf spiders will occasionally prey on female wolf spiders. The males targeted the older females rather than the younger ones. The research team hypothesize that this behaviour improves the reproductive success of males, as they eat females with a lower reproductive value and mate with females with a higher reproductive success. Update: Males have also been observed killing/ dismembering and occasionally eating other males. This seems to be a territorial act as the limbs are later arranged around the nesting area of the living male. |
Sue Burke – Women’s History Month
When I was in grade school in the 1960s in Wisconsin, girls could not wear slacks to school except on days when we had physical education, and then only for half-days. At lunch, we had to go home and change.
We also sometimes wore slacks under our skirts on cold winter days. Pre-global-warming Wisconsin could get plenty cold, and I walked a half-mile to school, but we girls had to take off our slacks when we got there and leave them in our lockers.
Even then, we thought the rule was stupid, one of many rules only for girls. We were unhappy, and we worked to change what we could.
By the time I graduated from high school in 1973, we could wear slacks to class, but that same year, Helen Thomas was ridiculed by President Richard Nixon for wearing them to the Oval Office.
Women staff members were not allowed to wear pants at the White House, and over at Congress, female aides in slacks were sometimes harassed.
Thomas, at that moment, was the chief White House correspondent for United Press International and had traveled with Nixon to China the year before. Eventually she became the first female officer of the National Press Club and first female president of the White House Correspondent’s Association – which she had enlisted the help of President Kennedy to open up to women.
But Nixon was no Kennedy. “Helen, are you still wearing slacks?” Nixon said. “Do you prefer them, really? Every time I see a girl in slacks, it reminds me of China.” He asked her if they cost more than “gowns.” She said no, and he replied: “Then change.” The room erupted with laughter.
Her fellow reporters – males – complained that she had been ridiculed. “It was a cheap way for the President to get a laugh,” one said. Another thought “she was too nice” and should have taken Nixon on.
Thomas responded “The President has not been out on the American scene enough to recognize that pants are not just a trend but a part of the American woman’s wardrobe. I don’t know the President very well, but I do know he is a gentleman of the old school. He views women as he saw them in the ‘30s or ‘40s. Or even ‘50s.”
At that point, I was about to begin university studies for journalism. Helen Thomas hadn’t been my inspiration, but she showed how far I could go. Like her, I might become the only reporter in the White House Press Corps to have a personal assigned seat in the White House Briefing Room. I might be the one to say “Thank you, Mr. President” to signal that the briefing was over, and no one would argue with me about that, not even the President himself.
Eventually, I became a journalist and loved the work. Then I branched out into other kinds of writing and loved that. I also campaigned for women’s rights. I wore slacks whenever I wanted. And I was happy.
Sue Burke now lives in Madrid, Spain, and works as a writer and translator. More information is available at her website, http://www.sue.burke.name. She is also part of a crowdfunding campaign to translate a Spanish science fiction anthology into English at http://igg.me/at/CastlesInSpain. |
Dimitrija Čupovski
Dimitrija Čupovski () (November 8, 1878 – October 29, 1940) was a Macedonian textbook writer and lexicographer.
Early years
Dimitrija Čupovski was born in the village of Papradište (now part of Čaška Municipality) in the Ottoman Empire (present-day North Macedonia). Before Čupovski was born, his father had been killed by Albanian mercenaries. When he was 10 years old his village was burned, and he and his family then settled in Kruševo, the birthplace of his mother. After learning the painting trade, he and his brothers left for Sofia in search of work. In the capital of the newly established Kingdom of Bulgaria Čupovski worked during the day and visited the school organized by Dame Gruev, Petar Pop Arsov and other students.
However, after that he continued his education in Belgrade and Saint Petersburg. The Bulgarian Macedonian revolutionary Hristo Shaldev, who lived then in St. Petersburg, described him as a person sharing pro-Russian views. According to Shaldev, a member of the Secret Macedonian-Adrianopolitan circle in St. Peterburg and IMRO, the main ideologists under whose influence Čupovski failed, were the Serbian professors Stojan Novakovic, Jovan Cvijić and Aleksandar Belić. Especially Novaković used his diplomatic role in St. Petersburg to put his ideas into practice, through his support to the Macedonian Literary Society, established in Saint Petersburg in 1902, and its "Macedonist" members as Čupovski.
When in 1905 Čupovski tried to organize for the first time a pan-Macedonian conference in Veles, he was expelled from the town by a local chief of IMRO Ivan Naumov, and was threatened with death for his pro-Macedonian and anti-Bulgarian ideas. Blaže Ristovski claims that it happened because of the intrigues of the local Bulgarian Metropolitan bishop and the activity of Shaldev, who then described Čupovski as a Serbian agent, but eventually, in his Memoirs, would present a letter from Čupovski, written in 1904, in which he speaks against “the Serbian propaganda in Macedonia and its destructive influence amongst the people”. Some Bulgarian researchers also suppose that Čupovski was a marginal figure and Serbian agent on a service of the Russian Imperial Ministry of Foreign Affairs.
After the outbreak of the Balkan War in 1912, Čupovski arrived on November 17 in Sofia, where he met with a part of the Macedonian emigration, but without much success. On December 4, he arrived in Skopje where Čupovski stayed at the home of his uncle and also met with some local citizens. This attempt to persuade them to adopt his pro-Macedonian ideas failed too, and he was even expelled by his relative.
Then he went to Veles, where he organized a pan-Macedonian conference, that was de facto a meeting attended by some local revolutionaries from the left wing of the IMRO. Čupovski convinced them to send representatives to the London peace conference to try to preserve the integrity of the region of Macedonia, but finally this attempt ended also unsuccessful. Afterwards Čupovski left Macedonia and returned to Petersburg, where he initiated the sending of a memorandum to the independence of Macedonia to the Great Powers and another to the countries of the Balkan League. After the Balkan Wars and the Serbian annexation of Vardar Macedonia Čupovski also exposed every detail of the Serbian chauvinistic propaganda, and every victim of the Serbian aggression.
He was one of the founders of the Macedonian Literary Society, established in Saint Petersburg in 1902, and served as its president from 1902 to 1917. Čupovski was also the author of a large number of articles and official documents, publisher of the printed bulletin of the Macedonian Colony, and organiser of several Macedonian associations. He wrote verse both in Russian and Macedonian. He also produced the first Macedonian-Russian dictionary, worked on a Macedonian grammar and an encyclopaedic monograph on Macedonia and the Macedonians. He also drew up an ethnic and geographical map of Macedonia.
In the period 1913–1914, Čupovski published the newspaper "Македонскi Голосъ" (Macedonian Voice) in which he and fellow members of the Petersburg Macedonian Colony promoted the existence of a separate Macedonian people which is different from the Greeks, Bulgarians and Serbs, and were struggling to popularize the idea for an independent Macedonian state. After the First World War and the October Revolution in Russia, the political activity of Čupovski ceased.
Dimitrija Čupovski is considered one of the most prominent ethnic Macedonians in history and one of the most important actors of the ethnic Macedonian awakening.
References
External links
МАКЕДОНСКIЙ ГОЛОСЪ – Број 1 (9 Јуни 1913 година).
Category:1878 births
Category:1940 deaths
Category:People from Čaška Municipality
Category:Macedonian writers
Category:Macedonian culture
Category:Early Macedonists |
One of the most reliable character actors in Hollywood has joined the increasingly exciting mini-series focused on Russia’s greatest monarch, Catherine the Great. Jason Clarke has signed on board as Grigory Potemkin, Catherine’s lover, and confidant.
Advertisement
In the early 1760s, Catherine the Great was an ambitious woman married to Russian Czar Peter III. Unable to withstand his bumbling rule, Catherine organized a coup in which Peter was assassinated, and she was installed in his place. While the act was being carried out, Catherine was protected by a soldier named Grigory Potemkin, the man who would become her life’s great love, “despite the fact that he was overweight, rather pompous and missing an eye.”
Though their affair was tumultuous (aka, the stuff of good drama), Potemkin became incredibly dear to Catherine as she steered the Russian nation toward one of its golden eras. She was brilliant, cunning, and willing to risk everything for her country, and Potemkin was the man who kept her secrets.
Though Jason Clarke hasn’t broken through in the public consciousness, that lack of high-level fame has nothing to do with his on-screen ability. Over the last 15 years, Clarke has distinguished himself as an actor capable of taking on any role that comes his way. Whether he’s one part of a trio of moonshining brothers or he’s a domestic terrorist trying to take down the White House, Clarke always imbues his roles with a charisma that makes him a reliable addition to any cast and an especially thrilling add-on to Catherine the Great in particular.
Even if you weren’t ready to tune in to watch Catherine the Great based solely on Mirren’s presence, then the opportunity to see Jason Clarke trade lines with one of the best actors of all time should make the price of admission seem very reasonable.
The reality star has plans to follow in her father Robert Kardashian’s footsteps by becoming an attorney, and she’s aiming to...
Katie RosbottomApril 10, 2019
FameFocus.com puts the spotlight on the world of entertainment and keeps you in the know. We cover the latest gossip and trending topics about celebrities, movies, TV, music, sports and fashion from Hollywood and around the world. Want the daily scoop? Sign up for our newsletter to stay up on all the current pop culture buzz. |
[package]
name = "imgui"
version = "0.5.0"
edition = "2018"
authors = ["Joonas Javanainen <joonas.javanainen@gmail.com>", "imgui-rs contributors"]
description = "High-level Rust bindings to dear imgui"
homepage = "https://github.com/Gekkio/imgui-rs"
repository = "https://github.com/Gekkio/imgui-rs"
license = "MIT/Apache-2.0"
categories = ["gui", "api-bindings"]
readme = "README.markdown"
exclude = [
"/resources"
]
[dependencies]
bitflags = "1.0"
glium = { version = "0.27", default-features = false, optional = true }
gfx = { version = "0.18", optional = true }
imgui-sys = { version = "0.5.0", path = "imgui-sys" }
lazy_static = "1.1"
parking_lot = "0.11"
[features]
wasm = ["imgui-sys/wasm"]
[dev-dependencies]
memoffset = "0.5"
[workspace]
members = [
"imgui-sys",
"imgui-gfx-renderer",
"imgui-glium-renderer",
"imgui-winit-support"
]
exclude = [
"imgui-examples",
"imgui-gfx-examples",
"imgui-sys-bindgen"
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.