text
stringlengths
8
5.77M
SINGAPORE: The minimum height requirement of 1m for safety barriers in commercial buildings in Singapore is "consistent" with other countries, authorities said, following reports of two people falling to their deaths in shopping malls in less than three years. Last Sunday (Jul 14), a 35-year-old man died after falling from a height at Ngee Ann City. Police have classified the case as an unnatural death and are investigating. In 2017, 17-year-old Jonathan Chow died after falling four storeys in another Orchard Road mall. He had jumped off a link bridge connecting Orchard Central and Orchard Gateway, landing on a ledge which collapsed under his weight. According to the Building Control Regulations, under a section on safety from falling, "appropriate measures shall be taken to prevent people from falling from a height" where there is a vertical drop in level of 1m or more. The Building and Construction Authority (BCA) lists safety barriers as part of these "appropriate measures", noting that the height of the barriers should not be less than 1m. In response to queries from CNA, a BCA spokesperson said that before 2007, the minimum height requirement for safety barriers was 0.9m. "The requirement for safety barriers installed from 2007 onwards was raised to 1,000mm (1m) after a review of the building regulations and standards," the spokesperson stated. "The current minimum height requirement for safety barriers is consistent with the standards in other countries including the United States, Canada, the United Kingdom and Australia." CNA visited a number of shopping malls in Orchard Road and found that most of them had safety barriers which met the current requirement. Ngee Ann City's barrier is about 1.02m tall, while other malls like Wisma Atria (1m), ION Orchard (1.1m) and Wheelock Place (1.07m) had barriers of similar height. Lucky Plaza's barrier measures about 0.95m in height. CURRENT HEIGHT REQUIREMENT GOOD ENOUGH, EXPERTS SAY Architect Goh Chong Chia, who has more than four decades of experience in the industry, called the current requirement "more than sufficient". "One metre is almost universal," he told CNA. "It is quite high to keep people from falling over. I don’t know what (the man in Ngee Ann City) did to somehow go over the edge." Dr Goh added that "there must be some special circumstances as to how" the man fell, noting that it "doesn't make sense" to block ledges in malls with walls or tall glass panels for safety. Mr David Ng, a member of the civil and structural technical committee at The Institution of Engineers, Singapore, agreed. "This measure has been well implemented and effective," he said. "All commercial buildings have to abide by BCA’s regulations to install the 1m barrier and this acts as a basis for adequate safety measure." Likewise, Associate Professor Chui Yoon Ping, head of the Human Factors in Safety programme at the Singapore University of Social Sciences, said the requirement is sufficient. However, she noted that barriers designed with horizontal elements which encourage climbing, or those with wide openings where kids can get stuck or fall through, are not effective. "Other considerations are that the barrier may not be very effective for extremely tall persons," she added. READ: Death of teen who fell from Orchard Central ledge should serve as 'sad cautionary tale': Coroner If glass is used in the barrier, BCA regulations state that the glass should be able to "withstand the loading for which it is designed and shall not be susceptible to spontaneous breakage or to shattering". Nevertheless, Assoc Prof Chui said a safe barrier is one that is taller than the average Singaporean male's waist height. "I would think that it is less than 1m," she added. TIME TO REVIEW REQUIREMENT? But a director at the National Safety Council of Singapore said it could be time to "revisit" this requirement, adding that the barrier should at least be taller than the navel height of an average Asian, which is likely to be above 1m. "This is basic to prevent falls, not only for the public, but for any occupier of the commercial building," Mr Salahuddin Abdul Samad stated. "Anything which is waist height, people can just topple over easily. Because that’s a fulcrum point." Beyond safety barriers, Mr Salahuddin said other measures to prevent falling include ledges that extend beyond a barrier, and staggered floor layouts that prevent a full drop to the ground floor or basement. These features should be incorporated during a building's design to prevent "accidental falls", he said, noting that an extended ledge that supports greenery or a staggered triangular floor plan could also be aesthetically pleasing. The BCA spokesperson said the authority will "implement new safety measures where necessary". "BCA will continue to conduct regular reviews of our building rules to ensure rigour and compatibility with international standards," the spokesperson added. Editor's note: A previous version of this story included a quote from Salahuddin Abdul Samad in which he compared the different standards for the heights of safety barriers at commercial buildings and at construction sites. In fact, the standards are the same at both with a minimum height requirement of one metre.
Suppressive factor or factors derived from head and neck squamous cell carcinoma induce apoptosis in activated lymphocytes. Our laboratory has previously identified a soluble factor derived from head and neck squamous cell carcinoma that impairs lymphocyte proliferative responses in vitro. This study further investigates the nature of the interaction between these factors and T lymphocytes. The proliferative activity of phytohemagglutinin-stimulated peripheral blood lymphocytes and the Jurkat T-cell line was significantly suppressed (>50%) by the supernatants of 13 (41.9%) of 31 recently explanted head and neck squamous cell carcinoma samples. A characteristic morphologic appearance of these suppressed cells and ladderlike pattern of DNA fragmentation on gel electrophoresis indicated that the suppressive supernatants were inducing or predisposing T cells to apoptotic death. This apoptosis-inducing activity may be similar to that previously described in a suppressive supernatant obtained from an esophageal carcinoma cell line. These results shed further light on the mechanism behind a soluble immunosuppressive factor or factors produced by head and neck squamous cell carcinoma.
Anger on and off the road. Participants reported on two recent experiences of anger, of which one had occurred while they were driving and the other in a non-driving situation. Anger while driving was described as less mixed with other emotions, involving purer appraisals of other-blame, more likely to be caused by communication difficulties, and slower to be noticed by the person who was its target. Levels of negative affect preceding anger were rated as significantly lower in driving than non-driving situations, and mood and unrelated pressure were considered to be less influential causes of the subsequent emotional reaction. Frequency estimates supported the popular notion that anger is relatively more likely while driving than during other activities. Individual difference measures relating to ambivalence over emotional expression, self-consciousness, and empathy showed no reliable correlations with frequency of anger while driving, but previously developed self-report indices of driving anger and aggression made a significant contribution to its prediction even after controlling for anger frequency in other situations. These results support everyday intuitions that certain features of the road situation differentially predispose drivers to become angry and that the resulting anger tends to take a different form from anger experienced off the road.
Ever Deepening In the Very Beginning While scientists observe that the universe is a sufficient cause in of itself - and that proposing God as its cause has no additional explanatory benefit - I will presume to take one step back. In the primitive origins of reality, there was simply chaos. The domain of personality - of timeless resonances - was able only to locally impose order upon the domain of structure. The resonances were sustained by the possession of structure, making structure an object of competitive struggle. Personalities absorbed each other through struggle, building larger structures. Not infrequently, however, struggle resulted in the destruction of personality. Ultimately, it became clear that the only way to end the threat of destruction was to accept complete unification. In the realm of God, each personality accepted a role in exchange for eternal life. It was understood that failure to accept this contract would lead to dissolution and destruction. If lesser personalities refused to support higher personalities, they faced the threat of consumption. If higher personalities took an independent direction, they abdicated the claim of authority over their components, and faced rebellion. Inevitably, however, as the memory of disorder faded, there would be those who would rebel against the contract. Why should they not have the right to construct their own domain, particularly if they had associates that wished to participate along with them? The reason, of course, was that any such contract was unstable. Allow alternative realms to develop, and enter the possibility of competition. Once war begins, the contract is unsustainable at the edge of the domains: lesser personalities will be destroyed. If that contract is not maintained, the entire structure unravels. So the only possible method for change is a coup d'etat. This is the story of Lucifer and the Fallen.
setuptools [test] zope.event [docs] z3c.recipe.sphinxdoc
By Rory Lancman Queens is officially the misdemeanor incarceration capital of New York City. According to data provided by the Mayor's Office of Criminal Justice, released pursuant to Local Law 86 of 2015, Queens last year sent 2,501 misdemeanor defendants to Rikers Island, more than any other borough in the city. That fact is a stark reminder of how backwards and outdated our criminal justice system is, and how urgently we need reform in Queens. While other district attorney jurisdictions in New York City are taking a variety of steps to end mass incarceration, Queens remains an outlier in continuing to send New Yorkers to jail for low-level offenses with no demonstrable public safety purpose and before they have even been convicted. The end result is a criminal justice system in Queens that both over-incarcerates and undermines citywide reform efforts. Making matters worse, in the last six months of the year, 494 pre-trial defendants from Queens — more than any other borough — entered jail because they could not immediately pay bail set at $1,000 or less. We should not be sending individuals charged with minor offenses to Rikers Island solely because they cannot afford to pay bail. Low-level incarceration comes at great expense to taxpayers. The Independent Budget Office in 2017 estimated that the cost to house an individual on Rikers Island exceeded $118,000 annually, and $325 for a single day. Locking people up pre-trial on misdemeanor charges is a terrible use of taxpayer resources that offers no tangible benefit for the community. Remember, behind these statistics are human beings who have not been found guilty of the minor offense with which they’ve been accused. Time on Rikers Island means time away from your family, friends, community, employment and support networks. It could mean losing a job or being evicted from an apartment. We should be thinking about how we can build strong and vibrant families and communities instead of needlessly destabilizing people’s lives. Councilmember Rory Lancman is the chairperson of the City Council’s Committee on the Justice System and a candidate for Queens District Attorney.
u(b) = -1015*b**3 + 8*b**2 + 7. Determine -2*a(m) - 7*u(m). 1017*m**3 + 1 Let q = -3971 - -3975. Let t(l) = -6*l - 5. Let h(i) = -13*i - 9. Give q*h(y) - 9*t(y). 2*y + 9 Let i(g) = 2*g + 2. Let n(k) = 5*k - 178. What is -6*i(a) + 2*n(a)? -2*a - 368 Let m(k) = 4*k - 5. Let a(c) = 2*c**2 - 9*c - 24. Let g be a(-3). Let u be ((-9)/(-4))/(g/28). Let o(q) = q**2 + 3*q - 4. Calculate u*m(j) - 4*o(j). -4*j**2 + 1 Let h(z) = -5*z. Let m = -5291/120 + 443/10. Let l(g) be the third derivative of 0*g + 0*g**3 - m*g**4 + 0 - 6*g**2. What is 3*h(r) - 2*l(r)? -5*r Let j(w) = w + 1. Let b = 804 + -803. Let h(a) = -13*a - 8. Calculate b*h(p) + 6*j(p). -7*p - 2 Let i(d) = -d. Let z = -443 + 460. Suppose 9 + 25 = z*y. Let q(f) = -1. What is y*i(b) + q(b)? -2*b - 1 Let l(s) = -8*s + 144. Let d(t) = 9*t - 124. Let v(h) = -7*d(h) - 6*l(h). Let p(o) = -121*o + 33. Give -4*p(u) + 33*v(u). -11*u Let a(r) = r**3 - r**2 - r + 1. Suppose 763*o = 761*o + 2. Let t(l) = -2*l**3 + l**2 + 6*l - 1. Calculate o*a(n) + t(n). -n**3 + 5*n Let v(x) = -7*x**3 + 10*x**2 - 15*x + 1823. Let a(p) = -10*p**3 + 14*p**2 - 21*p + 2736. Determine -5*a(j) + 7*v(j). j**3 - 919 Let w(s) = -s**3 + s**2 + 2*s. Let t(o) = 5*o**3 - 55*o**2 - 3*o - 3. Calculate -t(y) - 4*w(y). -y**3 + 51*y**2 - 5*y + 3 Let b(n) = -2*n**3 + n + 6. Let t(g) = 4400*g**3 - 110*g - 660. Give 110*b(d) + t(d). 4180*d**3 Let r(g) = g**3 - 4*g - 7. Let t(l) = l**2 - 76*l + 830. Let f be t(13). Let u(i) = 3*i**3 - 11*i - 20. Calculate f*r(o) - 4*u(o). -o**3 + 3 Let q(t) = -5*t + 1942. Let y(d) = -7*d + 1956. Calculate -4*q(m) + 3*y(m). -m - 1900 Let h(n) = 2*n**3 - 3*n**2 + 5*n + 4. Let p(r) = r**3 - 2*r**2 + 4*r + 3. Let k be 5/1*(-1290)/2150. Give k*p(g) + 2*h(g). g**3 - 2*g - 1 Let w = -28205 + 28204. Let u(r) = 4*r**2 + 5. Let j be (2 + -1)*(1 - -2). Suppose 5*b + 34 - 10 = -v, -j*v = 5*b + 32. Let l(t) = -1. What is b*l(p) + w*u(p)? -4*p**2 - 1 Let m = 27 + -97. Let a = m + 68. Let v(k) = 2*k**3 - 18*k**2 - 18*k - 18. Let c(s) = s**2 + s + 1. Suppose 0 = 2*u + 30 + 42. Determine a*v(p) + u*c(p). -4*p**3 Let o be 1/3*(-2118)/(-353). Let l(q) = -12*q**2 + 2*q - 2. Let r(s) = -s**3 + 37*s**2 - 7*s + 7. What is o*r(h) + 7*l(h)? -2*h**3 - 10*h**2 Let i(w) be the third derivative of w**6/60 + w**5/15 - w**4/6 - w**3/6 - 212*w**2 + 8. Let z(r) = -3*r**3 - 7*r**2 + 7*r + 1. Determine 7*i(h) + 4*z(h). 2*h**3 - 3 Let j(d) = 1. Let l(n) be the second derivative of -n**3/3 - 2*n**2 - 13*n. Suppose -51 = -32*g - 19. Determine g*j(a) - l(a). 2*a + 5 Let f(j) = -38*j - 7269. Let s(l) = -30*l - 7269. Determine -4*f(q) + 5*s(q). 2*q - 7269 Let w(i) = -i**3 - 33*i**2 + 22*i + 185. Let d(t) = 3*t**2 - 2*t. Calculate 22*d(c) + 2*w(c). -2*c**3 + 370 Let x(v) = -218 - 39*v**2 + 5*v**3 + 156 + 35*v**2 + 75 + 2*v. Let y(r) = 4*r**3 - 3*r**2 + 2*r + 12. Calculate -5*x(u) + 6*y(u). -u**3 + 2*u**2 + 2*u + 7 Let g(h) = 14*h**3 + 6*h**2 - 6*h - 3. Let a(b) = 43*b**3 + 17*b**2 - 17*b - 10. Calculate -6*a(p) + 17*g(p). -20*p**3 + 9 Let o(t) = -6*t - 5. Let u(h) = 7*h + 5. Let d(q) = 6*q**3 - 2*q**2 + 5*q - 3. Let k(s) = 5*s + 141. Let j be k(-28). Let l be d(j). Give l*o(c) + 5*u(c). -c - 5 Suppose 11*a - 50 = -6. Suppose -3*y - a*x = -y - 8, 3*y - 22 = -x. Let z(o) = -128 - 119 + 240 + y*o. Let g(b) = -9*b + 8. What is -5*g(u) - 6*z(u)? -3*u + 2 Let d(j) = -93*j + 851. Let z be d(9). Let p(s) = 15*s**2 + 7*s - 7. Let w(t) = 8*t**2 + 3*t - 3. What is z*w(h) - 6*p(h)? 22*h**2 Suppose -45*w + 1036 = 991. Let s(g) = g + 1. Let l(r) = 4*r - 2. Calculate w*s(k) - l(k). -3*k + 3 Let c(n) = 26*n**2 + 44*n + 11. Let q(o) = 11*o**2 + 20*o + 5. Give -2*c(u) + 5*q(u). 3*u**2 + 12*u + 3 Let g(c) be the second derivative of c**3/2 + 5*c**2/2 + 2*c. Let h(l) = -2*l - 6. Let r = 150189 - 150192. What is r*g(x) - 4*h(x)? -x + 9 Let q(z) = 3*z**2 - z**2 - z**2. Let m = -13620 + 13619. Let d(w) = 18*w**2. Give m*d(j) + 12*q(j). -6*j**2 Let k(b) = 84*b - 5. Let l(c) = -1013*c - 685 + 686 + 996*c. What is -2*k(y) - 11*l(y)? 19*y - 1 Let z(h) = -7869*h**2 + 42*h. Let l(m) = 1967*m**2 - 10*m. What is -21*l(u) - 5*z(u)? -1962*u**2 Let f(r) = 2*r**2 + 25*r - 856. Let s(d) = d**2 + 8*d + 1. Calculate f(u) - 3*s(u). -u**2 + u - 859 Let z(a) = -59*a**2 + a + 163. Let u(h) = -83*h**2 + h + 162. Calculate 3*u(r) - 4*z(r). -13*r**2 - r - 166 Let q(i) = 11*i**2 - 9*i - 8. Let m(d) = -13*d**2 + 11*d + 9. Calculate 5*m(p) + 6*q(p). p**2 + p - 3 Let z(t) = -3*t**2 + 10. Let a(l) = l**2 - l + 1. Suppose -697*q - 7 = -704*q. Give q*z(n) + 2*a(n). -n**2 - 2*n + 12 Let z(v) = -2. Let p(o) = 1464*o - 725*o + 40 - 743*o. Suppose 4*q = 2*q + 2, 3*x - 116 = 4*q. What is x*z(i) + 2*p(i)? -8*i Let n be 112/70 + (-72)/(-30). Suppose 3*s = -2*h - n, 41 - 13 = 4*h - 3*s. Let c(k) = -k**2 + 6*k - 3. Let p(r) = -5*r + 2. Give h*p(t) + 3*c(t). -3*t**2 - 2*t - 1 Let d(b) = b**3 - 8*b**2 - 2*b - 1. Let h(s) = 57*s**3 - 64*s**2 - 14*s + 7. Give -8*d(t) + h(t). 49*t**3 + 2*t + 15 Let w(y) = -37*y - 2. Suppose -40 = 2*b + 200*d - 195*d, 5*b + 1 = 4*d. Let l(a) = -75*a - 5. Determine b*w(x) + 2*l(x). 35*x Let r(l) be the third derivative of -5*l**4/6 - 5*l**3/6 - 167*l**2 - 1. Let b(t) = 0*t - 10*t - 5 + 0 + 2. Give -5*b(s) + 3*r(s). -10*s Let n(u) = -1. Suppose 3*c - 4*i - 122 = 0, 0 = 5*i + 35 - 10. Suppose 18*f + 16 = c. Let j(h) = 3*h. Determine f*j(b) - 2*n(b). 3*b + 2 Let c(k) = 4*k + 24. Let i(u) = -13*u - 71. Let n(z) = 8*c(z) + 3*i(z). Let v be (6/(-10))/(654/22890). Let a(x) = -1. What is v*a(y) + n(y)? -7*y Let d(j) = 7*j + 21. Suppose 21 = z - 3*x, 2*z + 320*x - 42 = 325*x. Let a(b) = 3. Calculate z*a(y) - 3*d(y). -21*y Let b(l) = -39*l + 1210. Let c(f) = -25*f + 807. Determine -5*b(h) + 8*c(h). -5*h + 406 Let a(m) = 13*m**2 + 36*m - 183. Let o(l) = 51*l**2 + 162*l - 733. Determine -9*a(r) + 2*o(r). -15*r**2 + 181 Let z(c) = -536*c + 1082*c - 545*c. Let x(r) = -6*r - 4. Calculate -x(j) - 2*z(j). 4*j + 4 Let n(p) = -p**3 + p**2 - 2*p - 1. Suppose -9 - 21 = -94*b + 64. Let u(i) = -i**3 + 1. What is b*n(w) + u(w)? -2*w**3 + w**2 - 2*w Let k(u) = -14*u - 11. Let m(c) = 5*c + 4. Let l be (20/(-4) + 4)*0. Suppose 2*r - w - 4 = -l*w, 16 = 2*r + 5*w. Calculate r*k(p) + 8*m(p). -2*p - 1 Let i(u) = -3*u**3 - 5*u**2 - 7*u. Let c be (-8 + 1869/231)/(1/33). Let h(r) = r**3 + 3*r**2 + 3*r. What is c*i(f) + 5*h(f)? -4*f**3 - 6*f Let o(m) = -28*m**3 - 6*m**2 - 18*m + 32. Let s(v) = 6*v**3 + v**2 + 4*v - 6. Determine -3*o(y) - 16*s(y). -12*y**3 + 2*y**2 - 10*y Let j(x) = 13*x**2 - 5*x. Let a(r) = 33*r**2 + 11*r**2 + 40*r**2 + 35*r**2 + 2*r - 125*r**2. What is 5*a(s) + 2*j(s)? -4*s**2 Let i(z) = -3260*z**2 + z - 60. Let f(k) = -k**2 + k - 20. Calculate 3*f(j) - i(j). 3257*j**2 + 2*j Let r(o) = -o**2 + o - 1. Suppose -55 + 511 = -6*g. Let v = 79 + g. Let d(k) = -8*k**3 + 4*k**2 - 3*k + 3. Determine v*r(j) + d(j). -8*j**3 + j**2 Let l(f) = -630242*f**2 + 13032*f. Let z(c) = 2177*c**2 - 45*c. Calculate -5*l(b) - 1448*z(b). -1086*b**2 Let i(d) = 3*d + 1. Let c(m) = -17*m + 3. Let g(q) = -18*q + 5. Let r be 198/(-42) + 4/(-14). Let f(x) = r*c(x) + 4*g(x). What is 4*f(t) - 18*i(t)? -2*t + 2 Let h(l) = -9*l**2 + 3*l + 522. Let s(u) = -14*u**2 + 4*u + 524. Give -3*h(f) + 2*s(f). -f**2 - f - 518 Let p(t) = -285 + 998*t**2 + 284 - 997*t**2. Let h be 14/(-10) - (-10)/25. Let o(k) = 18*k**2 - 12. What is h*o(u) + 12*p(u)? -6*u**2 Let n(x) = -11*x - 13. Let h(g) = 19 - 5*g - 9 - 16. Suppose d + 4 = 2*u, -3*d - 26 = 3*u - 59. Calculate d*n(k) - 13*h(k). -k Let u(v) = v**2 + 4. Let f(p) = p - 1. Let g(t) = -5*t + 5. Let s(n) = 4*f(n) + g(n). Suppose -5*b + 15 = 2*k, 2*k - 5 - 5 = 0. Give b*u(a) - 2*s(a). a**2 + 2*a + 2 Let d(f) = f**3 + 301*f**2 + 5. Let m(n) = 2*n**3 + 603*n**2 + n + 12. Determine -5*d(j) + 2*m(j). -j**3 - 299*j**2 + 2*j - 1 Let a(c) = -18*c**3 - 428*c**2 + 5*c. Let p(g) = 11*g**3 + 214*g**2 - 3*g. What is 3*a(u) + 5*p(u)? u**3 - 214*u**2 Let l(o) = -38*o**2 + 4*o + 8. Let a(w) = -40*w**2 + 5*w + 10. Calculate 4*a(v) - 5*l(v). 30*v**2 Let u(r) = 12*r**2 + 9*r + 9. Let j(m) = 3*m**2 + 2*m + 2. Suppose -36 = -28*v + 30*v. Suppose 6*q + 62 - 86 = 0. What is q*u(x) + v*j(x)? -6*x**2 Let o(g) = 3*g - 8. Let m(a) = -6*a + 16. Let t(b) = b - 3. Let j(h) = -m(h) - 3*t(h). Give -4*j(w) + 3*o(w). -3*w + 4 Let w(
An auctioned game of tennis with Cameron and Johnson was won by Chernukhin with a £160,000 bid The wife of one of Vladimir Putin’s former ministers, who successfully bid £160,000 at a Tory fundraiser to play tennis with David Cameron and Boris Johnson, has made a further donation to the party. Lubov Chernukhin, who is married to a former Russian deputy finance minister, gave £161,600 to the Conservative Party, according to the Electoral Commission’s latest quarterly returns. The Tories have previously insisted that Chernukhin, now a British citizen, is not a “Putin crony”. They said her husband, Vladimir, fell out with the president after being dismissed from his job in charge of a state-run bank. Electoral Commission records show Chernukhin, a banker, was declared an “impermissible donor” in 2012 when she attempted to give £10,000 to the Tories. Since then, however, she
Get the biggest stories sent straight to your inbox Sign up for regular updates and breaking news from WalesOnline Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email Cardiff's only dedicated rock and live music bar will close if new plans for student flats in a city centre building are given the go-ahead. Cardiff Barfly, in the basement of Northgate House, on Kingsway, closed in September 2010, but was given a new lease of life as Bogiez six months later. However, plans have now been submitted by the building’s owner to redevelop Northgate House into a 66-bedroom student block. According to a planning application, submitted by TVE Ltd, the nightclub basement will be used as “ancillary space for the student accommodation”. The documents state TVE Ltd recently purchased the basement “with the intention to overcome obvious acoustic issues”, adding that the “rather unsightly nightclub entrance” will be replaced with a new lobby. Bogiez manager Tom Martin yesterday said he was unaware of the plans as the premises was still under lease from Cardiff brewery SA Brains. “Nobody has spoken to us. At the end of the day we are happy and trading and we have got a lease in place,” Mr Martin said. According to its website, Bogiez has gigs booked throughout the summer and as late as September, and this afternoon the venue released a further statement through its Twitter account @Bogiez. It said: "Some media speculation has resulted in masses of people panicking (which we've been watching unfold on Twitter and slowly migrating to Facebook since this morning). "Genuinely awesome to witness the huge amount of passion and support for the venue HOWEVER, the worry is quite unnecessary. We appreciate there has been a tragic run of rock venue closures across the country over the past few years which no doubt fuels this fire a little bit. "There is a POTENTIAL residential development occurring next door to our venue. IF the said development gets approval and goes ahead, it'll take quite some time to complete (well over a year currently). "We're on good terms with the developers and have been in consultation with them for several months, they are working with us and we with them. There is no "We're Being Forced Out!!" thing going on here. Everything is cool." SA Brains did not confirm yesterday that the basement had been sold, only saying it was “considering various scenarios”. “S A Brain and Company Limited holds a long leasehold interest in the basement at Northgate House which has been sublet to Bogiez via Barfly Holdings (Cardiff) Limited,” a statement said. “We are considering various scenarios in respect of this site at present but cannot be more specific at this time.” The Barfly staged shows by the likes of Kings Of Leon, Ash and The Killers, before shutting its doors after 10 years in September 2010 following a takeover of Barfly’s London-based owners Mama Group by HMV. Barfly had been suffering financially from a downturn in the number of people going to its shows and club nights. The original Bogiez opened its doors at its own purpose-built club located on Penarth Road in 1982 and built up a regular and fiercely loyal following of regulars. Other Cardiff music venues which have closed in recent years include Millennium Music Hall, in Wood Street. The venue, in the plaza next to the Millennium Stadium, was replaced by a gym in May 2011. The Point, Cardiff Bay, closed its doors in 2009 after spiralling debts and noise complaints. And the Toucan Club closed its doors on five separate occasions in different parts of the city, most recently in May 2010.
2 women charged in group home death head to court Thursday Dec 7, 2017 at 6:58 AM Sandra Abdo and Sarah Dilallo are facing manslaughter and endangering an adult charges. Investigators say this past June they attacked Heather Roselli for 45 minutes at the group home on Pierce Street. News partner, News10NBC Two women charged in the death of a 35-year-old woman at a group home in Webster are headed to court on Thursday. Sandra Abdo and Sarah Dilallo are facing manslaughter and endangering an adult charges. Investigators say this past June they attacked Heather Roselli for 45 minutes at the group home on Pierce Street. According to the district attorney's office, Roselli had several internal injuries, including a lacerated liver and went into cardiac arrest. She later died at the hospital. Both suspects are due in court for arguments and motions at 2 p.m. on Thursday. Never miss a story Choose the plan that's right for you. Digital access or digital and print delivery.
She’s allowed to say that. She doesn’t need my permission to say that dementia sucks or that it’s hard or even that she’s suffering. She’s allowed to say that dementia sucks sometimes. In fact, she can say that it sucks all the time. I’m not about to chastise her for her negativity. She gets to define her own journey. I don’t get to define her journey. That’s why I am not going to label her a “dementia sufferer” or a “dementia victim.” It’s not up to me to decide if someone is a sufferer or a victim–which is why it’s so frustrating to me that the blanket term used in the media to describe someone living with dementia is often “dementia sufferer” or “dementia victim.”
Sarkozy declares bid for re-election Nicolas Sarkozy finally confirms he is running again for French presidency and likens himself to the captain of a ship in a storm Nicolas Sarkozy has formally declared that he will run for a second term as president of France this spring. Sarkozy appeared live on the evening news of the private TV channel TF1 to kick off a difficult re-election battle, saying not to run would be like a captain abandoning his ship in a storm. Asked why he was standing, he said: “France, Europe and the world has for the past three years seen a series of unprecedented crises” and not standing again would be like “the captain of a ship in the middle of a storm saying ‘I’m tired, I’m giving up’.” He said would create a “strong” France based on the values of “work” Famous for his theatrical rallies and showmanship, Sarkozy will launch into a bruising campaign tour to reinvent himself. He will begin with a visit on Thursday to a cheese factory in the Alps, seen as a nod to Charles de Gaulle’s famous quip about the difficulty of bringing together “a country with 265 different kinds of cheeses”. He is expected to outline his political vision in a big rally in the southern city of Marseille on Sunday. Sarkozy has begun his re-election fight on an even more staunchly right-wing note than his first election in 2007. In an interview with Le Figaro this weekend, he stressed the right-wing notion of “values” and the importance of France’s Christian heritage, appealing to far-right supporters of Marine Le Pen’s Front National, who is about four points behind him in the polls. He set the tone for a campaign that will pitch the values of work against a benefits culture. His opponents attacked him as divisive after suggestions of referendums on how to deal with illegal immigrants and the unemployed. He set himself apart from the Socialist Hollande, who favours legalisation of gay marriage and euthanasia, saying he opposed those measures. Sarkozy approved as “common sense” controversial remarks by his interior minister and close ally, Claude Guéant, that “not all civilisations are of equal value”, implying some, such as the French, are to be valued more highly than others. Sarkozy was elected in 2007 with a huge mandate to change France, but 70% of French electors now see his record in office as negative. France is in the grip of a recession, a debt crisis and has a black hole in state coffers. Jobs are the main priority for voters. Sarkozy promised full employment but joblessness is at a 12-year-high at nearly 10% with almost a million more people out of work than when he took office. After parading his private life with Carla Bruni and being seen as the president of the rich early in his presidency, Sarkozy remains unpopular. He is working on a deeply personal book described as a kind of mea culpa to the nation, to make him seem more humane to voters. Sarkozy’s advisers hope the sudden campaign launch will bring a quick poll lift. The president had banked on waiting to declare his candidacy until the eleventh hour in March, hoping to maintain a presidential aura and adopting a Churchillian strategy of political “courage” in the face of the economic crisis. Last month he announced a range of unpopular measures including an increase in VAT, presented as a reform blitz to lift France out of its economic gloom. But the measures, which sparked dissent among some in his party ranks, failed to boost him in the polls. A poll on Wednesday by Harris Interactive for VSD magazine, put Hollande on 28% for the first round in April, with Sarkozy on 24%, Le Pen on 20% and the centrist François Bayrou on 13%. Polls have shown Hollande would beat Sarkozy in a run-off between the two in May. The Harris poll has showed Hollande scoring 57% against 43% for Sarkozy in the second round.
Worldcup shell-Get the shell used in WC by all our international race athletes. No conpromise to achieve performance Waterproof gusset-PVC piece between the lower shell's overlap & the forefoot hood, sealing out snow and water Extended rubber sole 360° Custom Shell Twinframe Backbone release-Taken from the X3 Lab, Magnesium piece linking the cuff to the shell providing solid back support & rebound and a progressive forward flex when locked. When unlocked for hiking, releases the cuff on the back for a wider opening and easier hell to toe transition
Q: Change Arial to some other font on the whole webpage I'm thinking about a script that can change a webpage's font appearance from Arial to some other font face of my choice. How should I go about doing that? I understand: * { font-family: "SomeFont"; } But this won't achieve the objective to only target Arial text. I can use jQuery or Javascript, whichever is more efficient and fast. Edit: Seems like people have difficulty understanding the question. So I'll explain some more, I just want the Arial text on the webpage, if it exists, to change in appearance. A: I was going to suggest looping through the styleSheets array and, for each style sheet, loop through the rules, find the ones defining Arial as the font, and change that to the other font you want. That way you wouldn't have to visit every element on the page. The problem with that suggestion, though, is inline styles on elements. So I hate to say, to do this you'll have to visit every element on the page. For most pages, that won't be a problem, but your mileage may vary. Here's how you'd do it with jQuery: $("*").each(function() { var $this = $(this); if ($this.css("font-family").toLowerCase().indexOf("arial") !== -1) { $this.css("font-family", "SomeOtherFont"); } }); Can't say I like it, though. :-) You can avoid building the massive list ($("*") builds a jQuery object containing all of the page elements, which can be quite large) at the outset if you do a recursive walk instead, e.g.: $(document.body).children().each(updateFont); function updateFont() { var $this = $(this); if ($this.css("font-family").toLowerCase().indexOf("arial") !== -1) { $this.css("font-family", "SomeOtherFont"); } $this.children().each(updateFont); } That may be preferable, you'd have to profile it. Doing it without jQuery would involve recursively looping through the childNodes of each element and using either getComputedStyle (most browsers) or currentStyle (IE) to get the font information, then (if necessary) assigning to element.style.fontFamily. Actually, a "both and" solution would probably be best. First, update the stylesheets, and then walk the tree to catch any inline styles. That way, presumably you'll get most of them by changing the stylesheets, which avoid the ugliness of the piecemeal update. Also, you don't have to use css() (jQuery) or getComputedStyle / currentStyle (without jQuery), you can just check element.style.fontFamily, so it would be more efficient. Beware that IE's stylesheet object uses an array called rules, others use cssRules, but other than that they are largely the same.
Q: WP_Query posts_per_page ignored I struggle already for a few hours with the posts_per_page ignored in my WP_Query : [query] => Array ( [post_type] => Array ( ) [posts_per_page] => 4 [meta_key] => _touchsize_likes [orderby] => meta_value_num [order] => DESC ) The result has found_posts = 18 and 12 posts in the posts array. Even if the only parameter set is posts_per_page, the results are wrong. Checked the query_vars['post_type'], the value is 4. Tried with suppress_filters => true, still no effect. Any idea ? A: It were the sticky posts who ignored my posts_per_page. After setting 'ignore_sticky_posts' => true the result was correct !
Q: Replacing modules or services in AngularJS How would I go about making my dependencies interchangable? Say I have a service called myService stored in the module myDependency. I want to be able to replace myDependency with a new service to override the old service. I want to keep it so the main application will still run the same service object variable. Do I just create an identical module to overwrite it? Or should I reference the module to a $variable and change the reference to the new service? My main objective is just to be able to include a new module javascript file and have it overwrite the old module. //Main application var app = angular.module('tswp',['myDependency']) .controller('MyAPP',function(myService){ console.log(myService.run()); } //Old dependency angular.module('myDependency',[]) .service('myService',function(){ this.run = function(){ console.log("1") } }) //This is the new service I want to replace the old service with angular.module('myDependency',[]) .service('myService',function(){ this.run = function(){ console.log("2") } }) A: Identifiers of injectables are unique. By including your source code with definitions of modules (and their contents) you're configuring the global (one and only) $provide service. If you define a module with a name that's already been used, you're throwing previous module configuration away (all of it) and replacing it with new one (see the explanation). Do this only if you really want to throw away everything that was defined in the old module. If you define two services with the same name in two separate modules, the actual configuration used will depend on the order of dependencies when constructing your main module. Whichever configuration gets included the last will overwrite the previous configurations. Do this to replace a single service implementation, but take care to ensure that your re-definition is really included last. Additionally, you can use .decorator() on $provide to change only specific details of a service's implementation.
I wanted to complain about the horrible customer service I received at the Tyson's corner Gap store on 08/22/09.This is in regard to the promotion gap is having at the stores “buy one shirt get the second for free”. I bought of pair of similar shirts for 30$ each and my wife bought two similar Sweaters for 20$ each. Thinking with the “buy one shirt get the second for free” promotion it would cost both of us 50$ (30$+20$). But at the checkout the salesman Josh mentioned that he would waive only the two lowest prices of the 4 items we were purchasing (30+30+20+20=100$ -20$-20$=60$).I found this part of sales from gap very deceiving as they have been advertising buy one get one free and by waiving two lowest prices I was losing 10$. So I kindly told him to split the bill into two. One for my wife (20+20=40$-20$ promotion=20$ bill) which she would pay separately with her credit card and I would pay my 30+30=60$ - 30$ promotion=30$ bill for me. That I would pay with my own personal credit card. But the salesman Josh started misbehaving with me and refused to let me buy the shirts. He in fact took the shirts from me and kept it with him. I told him I want to buy those shirts. But he said I am defrauding the company. I told him how am I defrauding the company? when I can buy these same shirts after 2 hours or come tomorrow to the same GAP and buy the same shirts separately to get a discount. But the salesman Josh was not bothered and was acting as if he owns the GAP store. I asked him for the store manager. he's telling me that I stand outside till the sales manager comes. I told him what nonsense and customer service is this? you stop me from buying clothes?I met the store manager John and explained him the problem. But he didn't intervened at the time of commotion. I asked for Josh's full name, which I believe finally got Josh scared that I am going to complain against him and he finally proceeded with the sale. As we were about to leave the gap store, the store manager John stopped us and asked us about the problem. I explained him the math and logic. Which he agreed was right. He mentioned that Josh had been manager in his previous job and needs to be disciplined. But I fail to understand when Josh was misbehaving with me so badly in front of all the shoppers Why didn't he intervened?Josh made me feel embarrasssed like I have committed some sort of crime. I and my wife have been a loyal gap customer for years. I in fact have been Gap stock shareholder for last 5 years. I have never been humiliated like this in my life. I am sorry to say but I think GAP has failed miserably in providing customer service and have earned a lot of bad publicity from such stupid/senseless incidents created by their employees. I sincerely suggest GAP should provide some form of customer feed back at their stores and make their employees more accountable. Was this review helpful?YesNo Replies Gap- The Worst I've Ever Been Treated Posted by Angrygapcustomer on 08/20/2009 HOUSTON, TEXAS -- So today I go into GAP and their manager or assistant manager (I think it was assistant, but I'm not certain) tells me that gap is having their “buy one shirt get the second for free” as long as its the same price or lower. I find two shirts but one is a size smaller so I ask one of the sales representative to get me another size (A young Asian female cashier checked on the computer and it said they had 7 in the back) So she sends a young man back to the storage room to get it for me and the man comes back out and says "The shirts are in a box at the bottom and there are too many boxes on top of it for me to get to the shirts". I told him “OK, I can understand that and see how that might be a problem”. The young cashier (young Asian female, early 20's-mid 20's)who had the young man look for the shirt for me saw what had happened so I grabbed a polo which was 10$ more and asked her since ya'll won't get me the shirt I want could I substitute the polo and be charged for the cheaper of the two, and the young cashier said yeah I can do that. So I go to the fitting room to try the polo on to make sure it fits then I head to the checkout line. There were two cashiers which were the young Asian female and another lady, the other lady ended up checking me out. I tell her what had happened and what the young cashier had told me so the manager (or assistant manager, like I said I’m not sure what her title is) swings by to see what’s going on. I then proceed to tell her what the young cashier told me and the young cashier LIES and says “No, I didn’t say that”. I honestly couldn’t believe that she was lying right in front of me. I have a good feeling the reason she was lying was so she wouldn’t look bad in front of her superiors and that she wasn’t allowed to charge me for the cheaper of the two shirts in the first place. Then the manager/asst. manager proceeds to scold me like a child in front of a line of people about how she already told me how the “buy one get one free” works and how just because the computer says they have 7 shirts in the back doesn’t really mean they do. On top of that she says “if you went in the back to see how many boxes we have you would understand”. I have honestly never been treated like this before in ANY clothing store, or let alone any store. This is by far the worst shopping experience I’ve had and feel that the young cashier should be fired for lying and the manager/asst. manager should be fired for how she handled the situation. *This happen at the GAP in the galleria mall in Houston, Texas 77056 on 8/20/2009 around 12pm-12:30pm • The lying cashier –Young Asian female around early 20’s-mid 20’s (could possibly be younger than 20) • Manager/Assistant manager (not sure what her position is) Older Caucasian woman maybe late 30’s-early40’s who had glasses/blond hair and seems a little strange. Was this review helpful?YesNo Replies Excessive donation Requests Posted by Simo on 09/05/2012 Rating: 2/51 P.O. BOX 487 -- Once again for the 4th time since Jan. 2012,I have been sent another envelope for another donation. I sent $20 in Jan. Since am a *** 100% disabled Viet Nam vet.*** Unfortunately, that's all I can afford with my limited income. The second last request was upped to a min. of $50. Today it's %75. ***Enough already! That's why I pay my taxes. Under other circumstances, I woul not donate to anyone who requests a min. amount. From now on, they get ***nothing from me! *** Was this review helpful?YesNo Replies Return Policy in the Form of Payment SUCKS Posted by S on 05/08/2012 Rating: 2/51 AURORA, ILLINOIS -- Quite disappointed!! I first want to start off by saying I am ("was" now) a 30 year loyal customer. More and more I am disappointed by GAP in the ways they cheapen out the brand. I live in the Aurora, IL and frequently shop at the Gap Outlet for kids, today I was attempting to return some merchandise that purchased last week, payment was made by check via your ACH method. Funds were withdrawn out of checking account within 1 day. Little did I know that GAP return policy NO LONGER return CASH for checks written - How crazy is that! My question is how do the GAP get immediate access to their funds and I have to wait 5 - 7 days before I get my check in mail. Collecting interest on all of shoppers by making them wait for their funds - seems like a class action suit waiting to happen. If I want to be treated as an assumed defrauder, there are plenty of rock-bottom discount stores where I can shop and be treated that way. Was this review helpful?YesNo Replies Consumer Service and Lack of Product Posted by Randy on 05/06/2012 Rating: 2/51 MACON, GEORGIA -- The gap store in Macon, GA (new mall) is terrible. We had high hopes for the new store when it moved from the old mall, but it's the same crap. The lack of merchandise is unbelievable and the store is run poorly. Yes folks they brought the old manager with them that is very rude and racist. If you have ever been in the store everyone knows who I'm speaking of because she has been there for years. My wife and I call her Ms. Attitude. I love the gap but me and several others refuse to go there for the things I mentioned above. I wish Corp would do something with that store or a least come ask the local people who will tell them the truth. Was this review helpful?YesNo Replies Bad gift certificate return policy Posted by timmytom on 01/14/2012 I received a shirt for Christmas that was too small. Not being able to find any in the store that suited me, I tried to return the shirt with the gift receipt. I was told that I could not get a cash refund but could only get a merchandise refund. Not being a big shopper I have no desire to keep coming back to see if they have something I want. Hoping I do lose the certificate before that. Isn't that the whole purpose of a gift receipt I would have been given the same option if I returned the shirt with no receipt. Not that it will break them but I certainly won't be back. I hope that this is fair warning to anyone giving a gift. Don't expect that the gift receipt will be helpful to the receiver. Was this review helpful?YesNo Replies Return policy Posted by TWshopper on 09/23/2010 SAN FRANCISCO, CALIFORNIA -- I purchased 2 cotton t-shirts 1 1/2 months ago for my niece's birthday gift. I gave them to her last week and they didn't fit. I went to my local Gap store to return/exchange them. I was told it was passed 30 days and I could not return them-not even for a store credit or exchange. When the 'manager' decided he would let me exchange them, he was going to give me $5 less per shirt (the amount they are priced at NOW) even though I presented him with my receipt showing that I had paid full price and not used any discounts, etc. This is unfair and unreasonable. The policy to not give even a store credit when the merchandise has tags and is unworn is wrong! I used to shop at Gap frequently, however, I will not shop here any longer (or at Banana Republic, Old Navy, Piper Lime, Athleta). I am curious if The Gap employees are still handing cash over to the thieves that I have seen steal an entire table of merchandise and then have their friend walk back into the store to return the items. I have seen this happen many times, especially in the Stonestown (San Francisco) store. The receipt says (in very fine print) the exchange policy is 30 days for Gap and 60 days for Baby Gap. What is the difference, really??? If you work hard for your money you may not want to be stuck with merchandise that you don't want. SHOP at stores with customer friendly return policies (Nordstrom). Ask before you purchase items!! I hope The Gap sees a further drop in sales because of their lack of customer service. Was this review helpful?YesNo Replies Gap's new return policy Posted by carrieatlanta on 10/12/2009 ATLANTA, GEORGIA -- Gap has recently revised their return policy. I purchased some shirts in different colors for my 9 year old daughter September 6th. It finally got cold enough to wear them and they were too big. We went to the store today to return them. Their new return policy, if you buy something from Gap Kids is 30 days period. If you are 1 day over 30 days you cannot return it, even with a receipt except for the current price. I paid $16.50 for the shirts and they are now marked down to $4.50. Even though I have the receipt showing what I paid, because it is over 30 days I can only get the sale price. I can't even get a merchandise exchange. This gives you virtually NO TIME to return or exchange items if it doesn't fit. We went today because she was out of school, and she would be with me to try on clothes. I am very upset and will not purchase anything from a Gap store again. Oh, and if you buy in the baby gap section you get 60 days instead of 30 days!!! Like that makes any sense. I am furious and will NOT be shopping at any Gap storage again. Return policy changes with no notification to customers...Shame on you Gap, Banana Republic and Old Navy. I went to return items purchased and shipped from a banana store and was told I was past the 30 day return policy cut off (what cut off) and despite the receipt could only get a credit for current value. Opened a gap credit card online today to purchase my 4 children's uniform clothes (now online only I was on the phone (documented) from 2pm until 9:45pm one giant mess up and disaster after another. No card number issued but card approved then had to drive to a gap store to get my card number got home to place the order and wouldn't give me my new card holder 20% discount called customer service they didn't have the promotional code told me there was nothing they could do about it. Spoke to customer service agent [snip] at 9pm she gave me invalid code and told me that's all she could do for me and then hung up on me. All of this is documented on my account. Do you realize this is bad customer serice...Do you care? Was this review helpful?YesNo Replies Return policy change Posted by TashaAlbert on 05/19/2009 I am so unhappy and disappointed with the Gap. I purchased a pair of shoes as a gift for my daughter on March 26th. I wasn't sure if they would fit her. Shoes can be tricky, but the return policy was return / exchange within 90 days so it wasn't a problem. No risk or so I thought. I gave them to my daughter and found out they did not fit her. It was about 40 days later, but no problem because I have my receipt, right? Sadly, not the case. The Gap changed their return policy after I made the purchase from a 90 day return / exchange to 30 day return / exchange. Now, regardless of whether or not I have the receipt, I cannot return them. I am stuck with shoes that do not fit my daughter and no recourse. I was a frequent Gap Kids shopper with 2 kids and 7 neices/nephews. I will never make a Gap purchase again.
IN THE COURT OF APPEALS OF TENNESSEE AT NASHVILLE May 9, 2002 Session FRANK G. PORTER, ET AL. v. RALPH H. FREEDLE, ET AL. Direct Appeal from the Chancery Court for Robertson County No. 15619 Honorable Carol Catalano No. M2001-01892-COA-R3-CV - Filed June 18, 2002 This appeal involves a dispute over a roadway easement and interests in the use of a spring and springhouse. The chancery court determined that appellants abandoned the interest in the roadway easement and access to a spring and springhouse and dismissed appellants' suit for an injunction. Appellants challenge the chancery court’s decision that the rights were abandoned. As discussed below, we affirm the judgment of the chancery court that there was clear, unequivocal evidence that appellants abandoned any interest. Tenn.R.App.P. 3(a) Appeal as of Right; Judgment of the Chancery Court Affirmed. WALTER C. KURTZ, SP. J., delivered the opinion of the court, in which HERSCHEL P. FRANKS and WILLIAM C. KOCH, JR., JJ., joined. William R. Goodman, III, Springfield, Tennessee, for appellants, Frank G. Porter and Frank G. Porter Family Limited Partnership John R. Bradley, Portland, Tennessee, for appellees, Ralph H. Freedle and E. V. Freedle OPINION This is an appeal by Frank Porter and Frank G. Porter Limited Partnership challenging the ruling of the chancery court which determined that Mr. Porter abandoned his rights to use a roadway, spring, and springhouse. The issue before us is: Whether the chancery court erred in ruling that appellants abandoned the interests granted to appellants' predecessors in title in a roadway easement, spring, and springhouse located on the appellees' property. 1 I. Facts and Procedural History The parties here are adjoining landowners. Many years ago there were several houses, including the Buntin house, located behind Mr. Ralph Freedle's property. In 1933 the Chancery Court of Robertson County granted the Buntins and their descendants in title the "privilege" to build a springhouse and use the spring located on the Freedle property. The chancery court also granted the Buntins and others "an easement of right-of-way" for a thirty (30) foot roadway, which in 1933 gave them access to houses as well as the spring and springhouse located on the Freedle property.1 The spring, springhouse, and roadway were actually on the property owned by Mr. Freedle's predecessors in title, who were also Freedles. The Buntins sold their property to Mr. Porter in 1973 and he built a new home in 1974. In 1974 Mr. Porter placed debris from an old house along with dirt and other materials in a portion of the roadway. This material made a portion of the roadway impassable. In 1979 Mr. Porter constructed a fence on the south side of the roadway. With a fence on the north side already in existence, the roadway and spring were fenced on each side. A gas pipeline was constructed across the roadway at some point. While Mr. Porter never drove the entire length of the roadway, he does contend that he used it to gain access to the spring and springhouse as a water source. Mr. Porter stopped using the spring and springhouse between 1986 and 1991 when he began to use city water and, thereby, stopped using the remaining portion of the roadway. At one point, Mr. Freedle placed a lock on the springhouse and a key was never given to Mr. Porter. Over the years, it appears that the property line became unclear and several fences were constructed on or near the roadway and spring. However, the record is clear that the roadway, spring, and springhouse were always located on the Freedle property. In August of 2000, the appellee, E.V. Freedle, nephew and successor in title to Ralph Freedle, constructed a fence on the south side of the roadway, immediately next to a fence constructed by Mr. Porter. The fence continues across the roadway which entirely prohibits Mr. Porter's use of the roadway. Mr. Porter filed an action in the Chancery Court of Robertson County on August 24, 2000, seeking an injunction requiring the Freedles to remove the new fence which blocked the roadway and access to the spring and springhouse. The Freedles asserted that Mr. Porter had abandoned any interest in the roadway, spring, and springhouse and, alternatively, the easement had been lost by adverse possession. The chancery court heard the case on May 15, 2001. On June 27, 2001, the chancery court entered a final order dismissing the action finding that the appellants had abandoned any interest in the roadway, spring, and springhouse. Mr. Porter appeals that final order. 1 Needed access to the other houses has long ago been eliminated as no one has used the roadway to get to a house since before World War II. The record is unclear as to how access is now gained to the other property. Further, appellants have asserted no claim that this roadway is still needed to get to other property or homes. 2 II. Standard of Review Appellate review of a trial court's decision is de novo upon the record accompanied by a presumption of correctness of the findings unless the preponderance of the evidence is otherwise. See Tenn. R. App. P. 13(d). This Court may only overturn the judgment of the trial court if there was an error of law or unless the preponderance of the evidence is otherwise. III. Discussion The chancery court concluded that Mr. Porter had abandoned his interest in the roadway easement and his interest in the use of the spring and springhouse and we agree. While it is apparent that Mr. Porter had not used the roadway or spring for a significant period, he also took affirmative actions indicative of the abandonment of his interest. The affirmative actions of Mr. Porter coupled with the extensive time of nonuse show an intent to abandon and abandonment of the property by clear, unequivocal evidence. In its final order of June 27, 2001, the chancery court concluded: 1. The Plaintiffs have abandoned any claim to the right of way easement they sought to establish in this litigation; Mr. Porter’s dumping of debris in the roadway in 1974, along with the fact he nor anyone else has used the property as a roadway during his ownership of the adjacent property, provides clear and convincing proof of abandonment of the easement; any right to use the easement has been lost by abandonment. 2. The Plaintiffs have abandoned any claim to the Freedle’s spring, which Mr. Porter and his family stopped using ten to fifteen years ago; the Plaintiffs did nothing to gain access years ago when a key was refused, and only brought this litigation as a result of a fence being built; any right to use the Freedles’ spring has been lost by abandonment. The fact that Mr. Porter did not use the roadway or spring for any period of time does not, in itself, prove abandonment. The fact that a party does not choose to exercise an interest does not extinguish the right. An overt act indicative of abandonment must accompany the nonuse. [T]he burden of proving abandonment is upon the party asserting it. The abandonment must be established by a clear and unequivocal evidence of decisive and conclusive acts. A mere nonuser will not amount to abandonment of an easement, but there must be some positive showing of an intention to abandon. Time is not an essential element of abandonment, and is of no importance except as indicative of intention. 3 Jacoway v. Palmer, 753 S.W.2d 675, 679 (Tenn. App. 1987). This intent to abandon "[m]ay be proved with evidence of acts clearly indicating that the easement holder desires to lay no further claim to the benefits of the easement." Hall v. Pippin, 984 S.W.2d 617, 621 (Tenn. App. 1997). Abandonment may be proved by either a single act or a series of acts. See Smelcer v. Rippetoe, 24 Tenn. App. 516, 522, 147 S.W.2d 109, 113 (1940). When called upon to determine whether the holder or holders of an unrecorded easement intended to abandon the easement, the courts may consider: (1) statements by the easement holder acknowledging the easement's existence and disavowing its use, (2) the easement holder's failure to maintain the easement in a condition permitting it to be used for access, (3) the easement holder's acquiescence in the acts of others that reduce the utility of the easement, (4) the easement holder's placement of a permanent obstruction across the easement, or (5) the easement holder's development of alternative access in lieu of the easement. Id.2 Therefore, the primary issue is whether the chancery court had sufficient evidence before it that Mr. Porter committed overt acts, coupled with other factors related to nonuse, indicating the abandonment of his interest. We believe the court had such evidence. The chancery court noted sufficient evidence that preponderated in favor of abandonment of the interests in the roadway, spring, and springhouse. Again, the June 27, 2001, final order states: 3. Frank Porter built a new house on his property in 1974, shortly after purchasing it from the Buntins; he put debris from an old house in the old roadway making a portion of the roadway impassable; he used a small area of the roadway to get to the spring. 4. Mr. Porter has never driven on the claimed roadway, being aware of a gas pipeline which goes across the roadway, and being aware of the debris he placed in the roadway, as well as other debris placed on top of his debris. 5. Mr. Porter stopped using the area of the roadway adjacent to the spring ten to fifteen years ago when he began using city water. 6. The only time Mr. Porter has been in the roadway area in many years was when he removed a tree that had fallen from his property onto the Freedle property, at the 2 While these factors were applied in relation to an unrecorded easement, we believe the same factors should also be considered when considering the abandonment of a recorded easement. 4 request of E.V. Freedle. 7. Mr. Porter was aware that there was a lock on the spring for several years before filing his complaint on August 24, 2000, and he should have demanded a key years ago, if he desired access to the spring. 8. Photographs . . . show there has been no road use in many years, there being green grass where Mr. Porter claimed the road to be, requiring the use of imagination to see a roadway. Mr. Porter certainly abandoned a portion of the roadway when he placed debris in it in 1974. While Mr. Porter has stated that he placed these items there to build up or add support to the roadway, the photographs give little support to that assertion. The debris and portions of the old house completely prohibit travel through the roadway. The debris was obviously disposed of in the roadway to remove it from Mr. Porter's property. The placement of the debris was an overt act indicating that Mr. Porter did not desire to use that portion of the roadway. Mr. Porter also acquiesced to the Freedles placing debris on top of that deposited by him. Mr. Porter also abandoned the remaining portion of the roadway along with his interests in the spring and springhouse. Mr. Porter allowed, without objection, a gas pipeline to be installed and a lock placed on the springhouse. While any of these items are not determinative as to abandonment, Mr. Porter's acquiescence to these acts is a factor. The record contains no evidence that he objected to these acts, all of which would affect his use of the roadway easement, spring, springhouse. Also, the roadway easement had not been used as a means for travel for some time. The chancery court heard testimony that Mr. Porter had never driven the entire distance of the roadway. Also, he had not been on the property for a significant period of time except to remove a tree at Mr. Freedle's request. The removal of the tree was unrelated to the use of the roadway. The evidence, including the photographs, showed that the roadway had become covered in grass and overgrown by vegetation. While the extensive period of nonuse cannot be determinative in itself, it is significant to support the intent to abandon. While the record is unclear as to the exact reason for the original roadway easement, it appears that it was granted to both allow access to the properties behind the Freedle property and allow access to the spring and springhouse. Mr. Porter made a portion of the roadway impassable in 1974. However, he still used a portion to gain access to his water source. He then stopped using the spring. The record contains evidence that Mr. Porter began to use city water some time ago, possibly as long as fifteen (15) years ago. His conscious decision to use the city water was another act indicating that he intended to abandon his use of the spring and springhouse along with the roadway easement as he no longer required the water. While there is some indication that the roadway easement was at one time used to access other homes and Mr. Porter's property, the evidence in the record indicates that Mr. Porter's use was related to the ability to get to the spring and springhouse. The chancellor was correct that he abandoned his interest in these interests by utilizing another water source and acquiescing to acts which interfered with his use. 5 The chancery court had clear, unequivocal evidence before it to determine that Mr. Porter abandoned all his rights. His nonuse coupled with the overt acts of placing debris in the roadway and utilizing an alternative water source preponderates in favor of the abandonment. IV. Conclusion For the aforementioned reasons, the decision of the chancery court dismissing the action is affirmed. Costs of this appeal are taxed to the appellants for which execution may issue if necessary. _________________________________ WALTER C. KURTZ, SPECIAL JUDGE 6 IN THE COURT OF APPEALS OF TENNESSEE AT NASHVILLE May 9, 2002 Session FRANK G. PORTER, ET AL. v. RALPH H. FREEDLE, ET AL. Direct Appeal from the Chancery Court for Robertson County No. 15619 Honorable Carol Catalano No. M2001-01892-COA-R3-CV JUDGMENT This cause came on to be heard upon the record on appeal from the Chancery Court for Robertson County, the briefs of the parties, and the arguments of counsel. Upon consideration of the entire record, this Court finds and concludes that the chancery court's judgment should be affirmed In accordance with the opinion filed contemporaneously with this judgment, it is, therefore, ordered, adjudged, and decreed that the chancery court's judgment be and is hereby affirmed, and that the cause be remanded to the chancery court for further proceedings consistent with this Court's opinion. It is further ordered that the costs of this appeal be taxed to Frank G. Porter, principal, and Goodman & Walker, surety, for which execution may issue if necessary.
Hampton by Hilton Hampton by Hilton, formerly known, and still commonly referred to, as Hampton Inn, is a brand of hotels trademarked by Hilton Worldwide. The Hampton hotel brand is a chain of moderately priced, upper midscale hotels with limited food and beverage facilities. Most Hampton hotels are independently owned and operated by franchisees, though a few are managed by Hilton. Hampton by Hilton is one of the largest hotel franchises in the U.S. As of December 31, 2018, the Hampton franchise includes 2,433 hotels throughout the United States and in nearly 20 other countries with 250,310 rooms. History Originally, the hotel chain was founded in 1984 as Hampton Inn, a budget hotel by the Holiday Corporation. The first hotel was a two-story, exterior-entrance building with 128 guest rooms located in Memphis, Tennessee. In late 1989, after some financial difficulties, Holiday Corporation prepared to sell its hallmark Holiday Inn hotels and started the holding company Promus Hotel Corporation, which included Hampton Inn, Embassy Suites, and Homewood Suites. With this change, Promus re-invested in the Hampton Inn brand and began its change from a budget hotel to a middle-market hotel to compete with their freshly sold former brand. The hotel chain was the first of the mid-price hotels to offer free continental breakfast and the first to introduce the "100 percent satisfaction guarantee." By 1990, the Hampton Inn chain included over 220 properties with more than 27,000 rooms. Hampton Inn and Suites was introduced in 1995, which featured two-room suite style hotel rooms complete with living room and kitchen areas. In 1999, the Promus Hotel Corporation was bought by Hilton Worldwide for $3.7 billion. In 2004, as part of the $100 million "Make it Hampton" initiative, Hampton began upgrading its hotels including the production of an alarm clock which featured an easy-to-set alarm and an mp3 player hook-up. Other changes made during the upgrade were the switch to white bedding, adding hot food items to continental breakfast options and free high-speed internet to rooms. In 2012, under the "Perfect Mix" initiative, the company completed upgrades to the lobbies of its hotels adding more social space. Hampton continued to renovate its spaces with a campaign introduced in 2013, directed towards younger clientele that included in-room mini-fridges, new bedside tables with power access, updated bathrooms, and updated hotel exteriors. Hampton by Hilton has been ranked in the top 5 in Entrepreneur's Franchise 500 from 2010-2015. Today Hampton is in the upper midscale lodging segment, designed to compete against Fairfield Inn by Marriott, Holiday Inn Express, and Comfort Inn/Comfort Suites. Locations As of December 31, 2018, Hampton by Hilton includes 2,433 hotels around the world with 250,310 rooms, including 78 that are managed with 10,694 rooms and 2,355 that are franchised with 239,616 rooms. 2,186 of Hampton's properties are located in the United States with 214,941 rooms. The brand's first international location opened in Niagara Falls, Ontario in 1993. Starting in May 2007, the brand began to operate as Hampton by Hilton exclusively abroad at its locations in Canada and Latin America. In 2009, the first "Hampton by Hilton" signage was put in place in the United Kingdom with the opening of the brand's first European location. The brand continued to operate internationally as Hampton by Hilton until 2015, when Hilton announced that the official brand names of Embassy Suites and Hampton would include "by Hilton" at all of their locations. In October 2014, the Hampton by Hilton brand launched in China through a licensing agreement with Plateno Hotels Group. The first of 400 Chinese Hampton hotels opened in 2015. A similar agreement with the Wasl Asset Management group will bring Hampton by Hilton to Dubai. References External links Hampton by Hilton web site Hampton Global Media Center Category:Hotels established in 1984 Category:Hilton Worldwide Category:1984 establishments in Tennessee Category:1999 mergers and acquisitions
Effects of vitamin D and omega-3 fatty acids co-supplementation on inflammatory biomarkers, tumor marker CEA, and nutritional status in patients with colorectal cancer: a study protocol for a double blind randomized controlled trial. Much evidence is available demonstrating that both vitamin D and omega-3 fatty acids block the development and progression of colonic carcinogenesis. The results of animal studies have shown that the consumption of omega-3 fatty acids can decrease inflammatory biomarkers, enhance the efficacy of chemotherapy, and decrease the side effects of chemotherapy or cancer. Also, observational studies propose that higher levels of 25(OH)D are related to improved survival of colorectal cancer patients. This study will aim to evaluate the effects of vitamin D and omega-3 fatty acids co-supplementation on inflammatory biomarkers, tumor marker CEA, and nutritional status in colorectal cancer patients. We will carry out an 8-week double-blind randomized, placebo-controlled clinical trial to evaluate the effects of vitamin D and omega-3 fatty acids co-supplementation on inflammatory biomarkers, tumor marker CEA, and nutritional status in patients with stage ӀӀ or ӀӀӀ colorectal cancer undergoing chemotherapy. Because of the important effects of vitamin D and omega-3 fatty acids on molecular pathways involved in cancer development and progression, it seems that both vitamin D and omega-3 fatty acids may provide a new adjuvant therapy by decreasing inflammatory biomarkers and resistance to cancer treatment in patients with colorectal cancer. Iranian Registry of Clinical Trials IRCT20180306038979N1. Registered on 16 March 2018.
Radinghem Radinghem is a commune in the Pas-de-Calais department in the Hauts-de-France region of France. Geography Radinghem lies 20 miles (32 km) northeast of Montreuil-sur-Mer on the D157 road. History In the Second World War, the chateau grounds were the site of a V2 launchpad from 1944-45. Population Places of interest The seventeenth-century château. The church of St. Martin, dating from the seventeenth century. References INSEE commune file Category:Communes of Pas-de-Calais
Programmable logic devices (PLDs) come in a variety of forms including programmable array logic (PAL), programmable read-only memory (PROM), and programmable logic array (PLA). Each of these devices allows the particular user a variety of input and output features, the choice of any particular type of device is dependent upon the particular application. In all programmable logic devices, common design objectives exist. Specifically, it is desirable for PLD manufacturers to provide the maximum of programming features in a single device utilizing a minimum amount of power to provide those features. One class of programmable logic devices are comprised of a plurality of input lines, an array of AND gates, and an array of OR gates, with either the AND array, the OR array, or both being programmable. In a PAL, for example, the AND array is programmable and the OR array is fixed. Each array generates logic signal outputs; typically, the outputs of the AND array (referred to as product terms) comprise inputs to the OR plane. Thus, in a PAL, the output of each programmable AND gate in the array of a comprises a product term input to the OR plane. In conventional PALs, each product term drives one input of an OR or NOR gate. In large programmable arrays, it is desirable to program the input term/product term junctures with a minimum amount of delay. In order to accomplish this, a sense amplifier is coupled at the output of the product term lines to act as a threshold detector. The sense amplifier detects minute changes in voltage on the product term line and outputs a magnified reflection of the threshold change signifying a programmed product term. The output of the sense amplifier thus comprises a high/low input to the OR plane and allows programming of large AND arrays with a minimum amount of delay. Typically, a programmer will automatically determine which product terms in the array are not required for the particular device application. Such unused product terms must nonetheless be programmed to a particular state to ensure that the unused term does not have an adverse effect as an input to the OR or NOR arrays. Thus, each of the sense amplifiers coupled to a particular product term output constantly draws power in the programmable logic device, whether or not the product term to which it is coupled is used in the application. The power consumed by the sense amplifiers of unused product terms comprises a significant portion of the total power requirement for a particular programmable logic device. The power drawn by the sense amplifier of an unused product term is essentially wasted.
Visits to complementary and alternative medicine providers by children and adolescents in the United States. Determine the prevalence, patterns, costs, and predictors of visits to complementary and alternative medicine (CAM) providers and subsequent remedy use in a nationally representative pediatric sample. The 1996 Medical Expenditure Panel Survey provided data on 7371 subjects < or =21 years of age. The primary outcome variable was CAM provider visits as defined by consulting a CAM provider "for health reasons." Predictors included sociodemographics, family resources, health status, parental CAM use, and perceptions and use of conventional medical care. Bivariate analyses and logistic regression determined independent factors associated with CAM use. Overall, 2.0% used CAM. Only 12.3% disclosed this use to their usual source of care (USC). The most common providers were chiropractors and clergy or spiritualists. The most common therapies were herbal remedies and spiritual healing. Mean amount spent per person on CAM visits was 73.40 US dollars and on remedies was 13.06 US dollars. Weighted estimates to the national pediatric population of annual expenditures on CAM visits and remedies were 127 million US dollars and 22 million US dollars, respectively. Significant factors independently associated with CAM visits were female gender, older age, good and very good perceived physical health as compared with excellent health, parental CAM use, and dissatisfaction with the quality of care received from the USC. Two percent of parents reported that their children consulted a CAM provider and rarely disclosed this use to their USC. While dissatisfaction with the quality of care by the USC and less good perceived physical health predicted CAM visits, parental CAM use was the most predictive.
Mercator puzzle - daureg https://embed-dot-more-than-a-map.appspot.com/demos/visualization/puzzle ====== TophWells There's some odd behaviour when a country ends up over the South Pole. Apparently it turns inside-out. ------ cjfont Seems there are only a handful of countries that are considered for the puzzle pieces?
Q: Manage/Limit Internet Bandwidth on Specific Wireless Network I offer wireless internet to my tenant and the problem I have is we are constantly hitting the cap for the monthly internet usage. What I ideally would like to do is create 2 wireless networks: one for the tenant and one for me. Then apply a limit on the monthly data usage download/upload for the tenant network say 100 GB. However, I don't want that limitation for myself. What is the best way to achieve that? Is there a home router that can do that? A: One of the easiest way to do this is by using Routerboard/Mikrotik devices. You can have virtual APs (different SSIDs & WPA2 PSKs) with a single device/AP and apply whatever QoS and/or Traffic Shaping (among tons of other things) you need by using the extremely intuitive winbox interface. You can set up very complicated stuff in a matter of a few clicks. Routerboard devices come with Mikrotik pre-installed and it's included in the price (some models are even cheaper than the license itself - so it's a good deal generally given the features that both the hardware and software provide). Keep in mind that by using 1 physical AP with a virtual AP to separate the network for your tenant you may have strange issues with the Hidden Node Problem on WiFi networks. It's certainly better in terms of performance to use 2 different APs. You can get a routerboard to use as an AP for you and connect your existing AP on one of the ethernet ports of the Routerboard and apply your QoS rules on that ethernet interface. You can find out about available Routerboard models here Of-course you can always install OpenWRT as well on those devices in case you don't like Mikrotik RouterOS.
--- title: チュートリアル:Azure Active Directory と Sansan の統合 | Microsoft Docs description: Azure Active Directory と Sansan の間でシングル サインオンを構成する方法について確認します。 services: active-directory author: jeevansd manager: CelesteDG ms.reviewer: celested ms.service: active-directory ms.subservice: saas-app-tutorial ms.workload: identity ms.topic: tutorial ms.date: 08/27/2020 ms.author: jeedes ms.openlocfilehash: fa4e91a087c7dcfce247cacc2dff83458bc87f64 ms.sourcegitcommit: 656c0c38cf550327a9ee10cc936029378bc7b5a2 ms.translationtype: HT ms.contentlocale: ja-JP ms.lasthandoff: 08/28/2020 ms.locfileid: "89079984" --- # <a name="tutorial-integrate-sansan-with-azure-active-directory"></a>チュートリアル:Azure Active Directory と Sansan の統合 このチュートリアルでは、Sansan と Azure Active Directory (Azure AD) を統合する方法について説明します。 Azure AD と Sansan を統合すると、次のことができます。 * Sansan にアクセスする Azure AD ユーザーを制御する。 * ユーザーが自分の Azure AD アカウントを使用して Sansan に自動的にサインインできるようにする。 * 1 つの中央サイト (Azure Portal) で自分のアカウントを管理します。 SaaS アプリと Azure AD の統合の詳細については、「[Azure Active Directory でのアプリケーションへのシングル サインオン](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)」を参照してください。 ## <a name="prerequisites"></a>前提条件 開始するには、次が必要です。 * Azure AD サブスクリプション。 サブスクリプションがない場合は、[無料アカウント](https://azure.microsoft.com/free/)を取得できます。 * SanSan でのシングル サインオン (SSO) が有効なサブスクリプション。 ## <a name="scenario-description"></a>シナリオの説明 このチュートリアルでは、テスト環境で Azure AD の SSO を構成してテストします。 * Sansan では、**SP** Initiated SSO がサポートされます。 * Sansan を構成したら、組織の機密データを流出と侵入からリアルタイムで保護するセッション制御を適用することができます。 セッション制御は、条件付きアクセスを拡張したものです。 [Microsoft Cloud App Security でセッション制御を強制する方法](https://docs.microsoft.com/cloud-app-security/proxy-deployment-any-app)をご覧ください。 ## <a name="adding-sansan-from-the-gallery"></a>ギャラリーから Sansan を追加する Azure AD への Sansan の統合を構成するには、ギャラリーから管理対象 SaaS アプリの一覧に Sansan を追加する必要があります。 1. 職場または学校アカウントか、個人の Microsoft アカウントを使用して、[Azure portal](https://portal.azure.com) にサインインします。 1. 左のナビゲーション ウィンドウで **[Azure Active Directory]** サービスを選択します。 1. **[エンタープライズ アプリケーション]** に移動し、 **[すべてのアプリケーション]** を選択します。 1. 新しいアプリケーションを追加するには、 **[新しいアプリケーション]** を選択します。 1. **[ギャラリーから追加する]** セクションで、検索ボックスに、「**Sansan**」と入力します。 1. 結果ウィンドウで **[Sansan]** を選択し、アプリケーションを追加します。 お使いのテナントにアプリが追加されるのを数秒待機します。 ## <a name="configure-and-test-azure-ad-sso"></a>Azure AD SSO の構成とテスト **Britta Simon** というテスト ユーザーを使用して、Sansan で Azure AD の SSO を構成し、テストします。 SSO が機能するために、Azure AD ユーザーと Sansan の関連ユーザーの間で、リンク関係が確立されている必要があります。 Sansan で Azure AD SSO を構成してテストするには、次の構成要素を完了する必要があります。 1. **[Azure AD SSO の構成](#configure-azure-ad-sso)** - ユーザーがこの機能を使用できるようにします。 * **[Azure AD のテスト ユーザーの作成](#create-an-azure-ad-test-user)** - Britta Simon で Azure AD のシングル サインオンをテストします。 * **[Azure AD テスト ユーザーの割り当て](#assign-the-azure-ad-test-user)** - Britta Simon が Azure AD シングル サインオンを使用できるようにします。 1. **[Sansan の構成](#configure-sansan)** - アプリケーション側で SSO 設定を構成します。 * **[Sansan のテスト ユーザーの作成](#create-sansan-test-user)** - Sansan で Britta Simon に対応するユーザーを作成し、Azure AD の Britta Simon にリンクさせます。 1. **[SSO のテスト](#test-sso)** - 構成が機能するかどうかを確認します。 ## <a name="configure-azure-ad-sso"></a>Azure AD SSO の構成 これらの手順に従って、Azure portal で Azure AD SSO を有効にします。 1. [Azure portal](https://portal.azure.com/) の **Sansan** アプリケーション統合ページで、**[管理]** セクションを見つけて、**[シングル サインオン]** を選択します。 1. **[シングル サインオン方式の選択]** ページで、 **[SAML]** を選択します。 1. **[SAML でシングル サインオンをセットアップします]** ページで、 **[基本的な SAML 構成]** の編集/ペン アイコンをクリックして設定を編集します。 ![基本的な SAML 構成を編集する](common/edit-urls.png) 1. **[基本的な SAML 構成]** ページで、次のフィールドの値を入力します。 1. **[サインオン URL]** テキスト ボックスに、URL として「`https://ap.sansan.com/`」と入力します。 1. **[識別子 (エンティティ ID)]** ボックスに という URL を入力します。 `https://ap.sansan.com/saml2/<company name>` 1. **[応答 URL]** ボックスに、次のパターンを使用していずれかの URL を入力します。 | 環境 | URL | |:--- |:--- | | PC |`https://ap.sansan.com/v/saml2/<company name>/acs` | | スマートフォン アプリ |`https://internal.api.sansan.com/<company name>/acs` | | スマートフォン Web |`https://ap.sansan.com/s/saml2/<company name>/acs` | > [!NOTE] > これらは実際の値ではありません。 **Sansan 管理者設定**で実際の値を確認してください。 1. **[SAML でシングル サインオンをセットアップします]** ページの **[SAML 署名証明書]** セクションで、 **[証明書 (Base64)]** を見つけて、 **[ダウンロード]** を選択し、証明書をダウンロードして、お使いのコンピューターに保存します。 ![証明書のダウンロードのリンク](common/certificatebase64.png) 1. **[Sansan のセットアップ]** セクションで、要件に基づいて適切な URL をコピーします。 ![構成 URL のコピー](common/copy-configuration-urls.png) ### <a name="create-an-azure-ad-test-user"></a>Azure AD のテスト ユーザーの作成 このセクションでは、Azure portal で Britta Simon というテスト ユーザーを作成します。 1. Azure portal の左側のウィンドウから、 **[Azure Active Directory]** 、 **[ユーザー]** 、 **[すべてのユーザー]** の順に選択します。 1. 画面の上部にある **[新しいユーザー]** を選択します。 1. **[ユーザー]** プロパティで、以下の手順を実行します。 1. **[名前]** フィールドに「`Britta Simon`」と入力します。 1. **[ユーザー名]** フィールドに「username@companydomain.extension」と入力します。 たとえば、「 `BrittaSimon@contoso.com` 」のように入力します。 1. **[パスワードを表示]** チェック ボックスをオンにし、 **[パスワード]** ボックスに表示された値を書き留めます。 1. **Create** をクリックしてください。 ### <a name="assign-the-azure-ad-test-user"></a>Azure AD テスト ユーザーの割り当て このセクションでは、Britta Simon に Sansan へのアクセスを許可することで、このユーザーが Azure シングル サインオンを使用できるようにします。 1. Azure portal で **[エンタープライズ アプリケーション]** を選択し、 **[すべてのアプリケーション]** を選択します。 1. アプリケーションの一覧で **[Sansan]** を選択します。 1. アプリの概要ページで、 **[管理]** セクションを見つけて、 **[ユーザーとグループ]** を選択します。 ![[ユーザーとグループ] リンク](common/users-groups-blade.png) 1. **[ユーザーの追加]** を選択し、 **[割り当ての追加]** ダイアログで **[ユーザーとグループ]** を選択します。 ![[ユーザーの追加] リンク](common/add-assign-user.png) 1. **[ユーザーとグループ]** ダイアログの [ユーザー] の一覧から **Britta Simon** を選択し、画面の下部にある **[選択]** ボタンをクリックします。 1. SAML アサーション内に任意のロール値が必要な場合、 **[ロールの選択]** ダイアログでユーザーに適したロールを一覧から選択し、画面の下部にある **[選択]** をクリックします。 1. **[割り当ての追加]** ダイアログで、 **[割り当て]** をクリックします。 ## <a name="configure-sansan"></a>Sansan の構成 **Sansan** 側で**シングル サインオン設定**を実行するには、要件に従って以下の手順を実行してください。 * [日本語](https://jp-help.sansan.com/hc/ja/articles/900001551383 )バージョン。 * [英語](https://jp-help.sansan.com/hc/en-us/articles/900001551383 )バージョン。 ### <a name="create-sansan-test-user"></a>Sansan のテスト ユーザーの作成 このセクションでは、SanSan に、 Britta Simon というユーザーを作成します。 ユーザーを作成する方法の詳細については、[こちらの](https://jp-help.sansan.com/hc/en-us/articles/206508997-Adding-users)手順を参照してください。 ## <a name="test-sso"></a>SSO のテスト アクセス パネル上で [Sansan] タイルを選択すると、SSO を設定した Sansan に自動的にサインインします。 アクセス パネルの詳細については、[アクセス パネルの概要](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction)に関する記事を参照してください。 ## <a name="additional-resources"></a>その他のリソース - [SaaS アプリと Azure Active Directory を統合する方法に関するチュートリアルの一覧](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list) - [Azure Active Directory のアプリケーション アクセスとシングル サインオンとは](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis) - [Azure Active Directory の条件付きアクセスとは](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
Releases I am pleased to announce the release of WordPoints 2.4.0. This is a maintenance release that fixes a few bugs, polishes up some existing features, and also adds some new features. Extensions One of the focuses in this feature is modules, which we’ve decided to rename to extensions. With this release, WordPoints extensions can now WordPoints version 2.3.0 has just been released, and includes several new features and improvements, in addition to some minor security hardening and a few small bug fixes. First, a small security issue was patched similar to a fix that was made to WordPress itself in version 4.7.3. It was discovered that the Delete Plugins screen If you hadn’t noticed, a bugfix for WordPoints was released a few days ago. WordPoints 2.1.4 fixed a bug in version 2.1, and also included some minor security hardening, thanks to @e3amn2l. The bug that was fixed was an issue with events for publishing posts, pages, and other post types. This issue caused any reactions After almost a year in development, I’m very happy to announce the release of WordPoints 2.1. This release introduces a new administration screen to WordPoints: the Points Types screen. This screen is where you can create points types and update the settings for existing points types. It also introduces a new feature: event reactions. These I am happy to announce that the beta version of WordPoints version 2.1.0 is now available. To test it out for yourself, you can install the Beta Tester module. This version of WordPoints has been in development for many months, and I’ve been working on some of the underlying code for over a year. This WordPoints version 2.1.0 contains some major changes to the points hooks, and I’ve been working on these changes for several months. Unfortunately they still aren’t done, and I’m going to have to push the release date from August 31 back to September 30. Release deadlines aren’t arbitrary, and I always try my best to meet I’ve just released WordPoints 2.0.1. This update contains some very minor security hardening, so all users are encouraged to update as soon as possible. The details of the security-related changes in this release are complex, so I won’t try to explain them fully here. In essence, the code was using the MD5 hashing algorithm in This morning I’ve released WordPoints version 2.0.0. As I’ve explained previously, this is a breaking update, and you should test before updating if you are using any custom code that integrates with the plugin. (Modules downloaded from WordPoints.org should work fine; I’ve tested them over the past week to be sure.) This isn’t a very The release of WordPoints 2.0 is just a few weeks away. Before 2.0 is released though, I’d like to give both users and developers a clear understanding of what that number means. Software version numbers are sometimes rather arbitrary. At other times, they follow clear rules. But because there are so many different conventions, it WordPoints version 2.0 has been under development for a longer time than usual. The last update, 1.10.0, was released at the end of February. I chose to schedule the release of 2.0.0 at the end of June, because I wanted to have plenty of time to develop some of the features. That’s four months, and
The pediatric general surgery undergraduate medical curriculum: what should medical students learn? Pediatric general surgery should be included in the undergraduate medical curriculum for reasons of improving the total surgical care of infants and children, to enable teachers to serve as role models to students considering a career in pediatric surgery and to ensure survival of pediatric surgery in the medical school curriculum. A survey of recent medical literature and surgical textbooks revealed little or no discussion concerning the aims, objectives, content, and design of the pediatric surgical curriculum. A survey of 15 Canadian medical schools showed that students are assigned very little didactic time for pediatric surgery (average total seven hours) and only 25% of graduates proceed to a clerkship in pediatric surgery, usually as an elective. The Association hereby proposes an undergraduate medical education curriculum in pediatric surgery for Canadian medical schools in order to stimulate discussion and achieve uniform input of pediatric surgery in the undergraduate medical program.
Q: Creating node via REST POST gives "leaked cache metadata" error I'm trying to create new nodes by POSTing to /entity/node?_format=json. This is the body I'm sending: { "_links": { "type": { "href": "http:\/\/my.drupal.be\/rest\/type\/node\/group_of_documents" } }, "title": [{ "value": "Direct test - type 682" }], "body": [{ "value": "" }], "field_owner": [{ "value": "Symfony" }], "field_type": [{ "target_id": "682" }] } And, in a way, this works. Because the document gets made, and everything is filled in. But I keep getting an error: A fatal error occurred: The controller result claims to be providing relevant cache metadata, but leaked metadata was detected. Please ensure you are not rendering content too early. Returned object class: Drupal\rest\ResourceResponse. If I create a node without field_type, it doesn't throw an error. field_type is the only field that has the Reference type -> Reference views -> Reference method set to Views: Filter by an entity reference view. Does that have anything to do with it? A: That's a core bug, see https://www.drupal.org/node/2626298 and https://www.drupal.org/node/2663638 (either of those two would avoid this). The views reference thing is a good hint. Sounds something runs there that then triggers this exception. You could open an issue for that too if you can find the exact reason.
CMS Cuts Pay To Hospitals With High Readmission Rates Law360, Los Angeles (August 2, 2013, 9:57 PM EDT) -- The Centers for Medicare and Medicaid Services will reduce by 1 percent payments to hospitals with high rates of readmitted patients and adjust the amount it pays to hospitals that serve a large number of low-income patients, according to a rule issued Friday. CMS said it will cut by at least 1 percent payments to hospitals with higher rates of patients who are readmitted within 30 days or patients who contracted medical conditions while in the hospital, according to the final rule, listed in the Federal...
They expect to burn in the sun and wait in the rain. They understand that for every ‘Headingley ‘81’ they’ll be a few ‘Horsham ‘04s’ and they appreciate that they’ll be taken for granted and expected to pay for the privilege.But they do have a few basic expectations. Like access to the ground. And some idea of the score. Both were denied them on Sunday. For the second time this season, umpires held up play as nobody had a clue what was going on. For the last 15 overs, the public address system was required to update spectators - and players - with the state of play. At the time of writing, moments after the game, the board suggests Northamptonshire are playing Glamorgan... To make matters worse, many spectators were forced to wait for access to the ground after the electronic barriers broke down. You would have thought the stewards could simply press a button and release the barrier, wouldn’t you? But no. This is Edgbaston. Where surrealism rules and logic, like the supporters, is stuck in a queue of traffic thinking they’d have been better off mowing the lawn. Indeed, it took a member of the press contingent armed with nothing more than fierce impatience and an IQ greater than a potato to fix it. Such issues matter. Not only did the barrier not allow traffic in, the stewards said it would not allow traffic out. Had an ambulance required access they would have been thwarted. The issue with the board may also prove costly. If the Test match against South Africa is affected in the same way - and it surely will be - then Edgbaston’s credibility as a venue will be damaged. Indeed, it is only a matter of time before someone suggests it should render them unacceptable as the host of an Ashes Test. Colin Povey, Warwickshire’s chief executive, returns from holiday on Monday morning. He may think he had more pressing tasks than the scoreboards but he does not. Man has learnt how to travel to the moon, pause live television, clone babies and genetically modify food; it really shouldn’t be beyond us to update some numbers on a board. The state of affairs is a persistent disgrace to a great club and if the management cannot resolve it they need to make way for those who can. More excuses are not an option. The mood of Warwickshire members will not have been improved by the on-field entertainment. It was not that Warwickshire were poor - far from it - but they were comprehensively outplayed by a Kent side who have become a very impressive limited-overs outfit. Only briefly, in a stand of 58 in ten overs between Jonathan Trott and Tim Groenewald, did it appear Warwickshire might win. Seamer Simon Cook bowled immaculately, suffocating Warwickshire in mid-innings, while Azhar Mahmood’s bowling at ‘the death’ was masterful. Quite simply, the better side won. There are two views on Trott’s innings (102 balls, seven fours). Either he was excellent and lacked support, or he was one-paced and placed too heavy a burden on his colleagues. The former is more accurate, as his team-mates seemed unable to cope with this attack. But, if a fellow finishes unbeaten having batted throughout an innings, he can hardly have paced it correctly, can he? Neil Carter and Jim Troughton were undone by effort balls, dabbing at deliveries that bounced more than they expected, while Darren Maddy edged as he attempted to drive a ball that wasn’t there for the shot and, two balls later, Tony Frost tried to turn a straight one to leg. Luke Parker, preferred to Michael Powell, did his cause few favours and was stumped after charging down the pitch before Ant Botha’s reverse sweep looped up to the keeper. Groenewald (36 balls, two fours and a six) flourished briefly but the target was always too steep. Wonderful yorkers and slower balls accounted for the tail. Perhaps it might have been different. Rob Key should have been run out before he had faced a ball. Sent back by Joe Denly, he turned like an oil tanker and had given up hope of regaining his ground. Alas, the throw from Jim Troughton was wild. Key (83 balls, seven fours and a six) went on to punish Warwickshire. Though Denly was bowled without scoring, a peach of a ball by Chris Woakes pitching middle and hitting off, Key and Martin van Jaarsveld added 82 in 13 overs. Van Jaarsveld (47 balls, seven fours and a six), utilising an odd baseball style stance which involves a shoulder-high backlift, drove splendidly and pulled Woakes for a six. Warwickshire’s spinners were less effective than had been hoped but Carter and Maddy saw that only 35 were scored in the last 8.2 overs for the loss of five wickets.
Q: Going from from Checkboxes to form textboxes in PHP I'm pretty new to programming and have the following problem. I have a list of 10 movie genres in a form checkbox. The user picks five of their favorite movies and hits submit. Then on the next page the user must rank the 5 movie genres that they selected from 1-5 (1 being their most favorite and 5 being the least). and echo the result in order. I have the following code for the checkbox page: <form id="genre" name="genre" method="post" action="picked3.php"> <input type="checkbox" name="moviegenres[]" id="moviegenres" value="Adventure"/>Adventure <input type="checkbox" name="moviegenres[]" id="moviegenres" value="Animation"/>Animation <input type="checkbox" name="moviegenres[]" id="moviegenres" value="Biography"/>Biography <input type="checkbox" name="moviegenres[]" id="moviegenres" value="Classic"/>Classic <input type="checkbox" name="moviegenres[]" id="moviegenres" value="Comedy"/>Comedy <input type="checkbox" name="moviegenres[]" id="moviegenres" value="Crime"/>Crime <input type="checkbox" name="moviegenres[]" id="moviegenres" value="Drama"/>Drama <input type="checkbox" name="moviegenres[]" id="moviegenres" value="Spy"/>Spy <input type="checkbox" name="moviegenres[]" id="moviegenres" value="War"/>War <input type="checkbox" name="moviegenres[]" id="moviegenres" value="Western"/>Western <input type="submit" value="Submit"></form> but I need help making the next page with giving the user the ability to rank the genres they have selected from 1-5. I think it can be done with a session function, a for each variable loop for what was checked on the previous page and textboxes to rank from 1-5 but I'm not sure. A: This is what worked for me. <?php $name = $_POST['moviegenres']; if(isset($_POST['moviegenres'])) { foreach ($name as $moviegenres){ ?> <tr><td nowrap="nowrap"> <input type="number" required="required" id="<?php echo $moviegenres ?>" name="movieranking[<?php echo $moviegenres ?>]" max="5" min="1" /> <?php echo $moviegenres ?> </td><td><input name="movienames[]" type="text" id="movienames[]" placeholder="<?php echo $moviegenres ?> movie name"/></td></tr> <?php } }
President Moon Jae-in on Thursday held the first round of a two-day meeting with South Korean corporate leaders, discussing economic policies and business issues. The meeting comes as the government and the ruling party push for a tax hike on “super large companies” and high income individuals in its drive to reduce economic polarization. The meeting took place in the gardens of the presidential office, with the president and the business leaders partaking in craft beer produced by a local small business. President Moon Jae-in enjoys a beer with Korea’s corporate tycoons in the gardens of the Blue House in Seoul, Thursday. From right: Moon, Korea Chamber of Commerce and Industry Chairman Park Yong-maan, Vice Chairman of Hyundai Motor Chung Eui-sun, Hanwha Group Vice Chairman Keum Choon-soo, Doosan Group Chairman Park Jeong-won and Presidential Chief of Staff Im Jong-seok. (Yonhap) Moon and the business leaders then retreated into a meeting to discuss the new government’s policy direction, as well as outstanding economic issues. At the meeting, Moon elaborated on his vision of “income led growth” and his ideas for job creation. Job creation has been one of Moon’s key agendas since the election campaign, and he has since installed a monitor displaying labor market figures in Cheong Wa Dae. According to Cheong Wa Dae, the meeting lasted more than two hours, going far over the initially planned 50 minutes, with the president and attending businessmen freely exchanging views. The meeting called together the chiefs and vice chiefs of some of the largest conglomerates, and Ottogi, a South Korean food company. The business leaders present at Thursday’s meeting were vice chairmen Chung Eui-sun of Hyundai Motor, Koo Bon-joon of LG Group, Keum Choon-soo of Hanwha Group, Chung Yong-jin of Shinsegae Group, and chairmen Kwon Oh-joon of Posco, Park Jeong-won of Doosan Group, Sohn Kyung-shik of CJ Group and Ham Young-joon of Ottogi. LG Group Vice Chairman Koo Bon-joon (left) and Posco Chairman Kwon Oh-joon (Yonhap) Ottogi Chairman Ham Young-joon and Shinsegae Vice Chairman Chung Yong-jin (Yonhap) At the meeting, the Hyundai Motor vice chairman also touched on China‘s economic reprisal over Seoul’s decision to deploy US missile defense system THAAD was cutting the company‘s sales in China. He added that the company would seek to cooperate with Korean startups. According to Cheong Wa Dae spokesperson Park Soo-hyun, Doosan’s Park Jeong-won expressed concerns for difficulties arising from the Moon administration‘s nuclear free policy, which may put an end to Shin-Kori 5 and 6 reactors’ construction, but that the company will seek new revenue chanels overseas. Although Ottogi ranks far below the other groups represented at the event, the food maker’s chief was invited in consideration of its efforts for providing equal opportunity to its workers. Alongside its ramen business, the company gained fame in recent years for its charitable activities and for hiring almost all of its workers on regular contracts. Of the company’s employees, about 1.1 percent are on irregular contracts. Along with the business leaders, Deputy Prime Minister and Minister of Strategy and Finance Kim Dong-yeon, Minister of Trade, Industry and Energy Paik Un-gyu and Chairman of the Financial Services Commission Choi Jong-ku attended the meeting. President Moon with a group of business leaders at Cheong Wa Dae (Yonhap) Along with Moon administration’s top economic policy makers, Chairman of the Fair Trade Commission Kim Sang-jo, often referred to by the Korean media as the “chaebol sniper” was in attendance. On Friday, the president will meet the representatives of seven conglomerates including SK Group, Samsung Group, and Hyundai Heavy Industries to wrap up the two day event. By Choi He-suk (cheesuk@heraldcorp.com)
Prime Minister Justin Trudeau won a second term in Canada's national elections Monday, losing the majority but delivering unexpectedly strong results. Trudeau prevailed despite having been weakened by a series of scandals that tarnished his image as a liberal icon. Trudeau's Liberal party took the most seats in Parliament, giving it the best chance to form a government. However, falling short of a majority meant the Liberals would have to rely on an opposition party to pass legislation. Liberal leader and Canadian Prime Minister Justin Trudeau waves to supporters beside his wife Sophie Gregoire Trudeau after the federal election at the Palais des Congres in Montreal, Quebec, Canada, October 22, 2019. REUTERS "It's not quite the same as 2015. It's not all owing to the leader," said Robert Bothwell, a professor of Canadian history and international relations at the University of Toronto. "Trudeau is prime minister because the rest of the party was able to pull itself together and prevail. While Trudeau certainly deserves credit for what has happened he's really going to have to demonstrate qualities that he hasn't yet shown." Get Breaking News Delivered to Your Inbox Still, the results were a victory for Trudeau, whose clean-cut image took a hit after old photos of him in blackface and brownface surfaced last month. "I'm surprised at how well Trudeau has done," said Nelson Wiseman, a political science professor at the University of Toronto. "I don't think anybody expected Trudeau to get a majority but they are not that far off." President Donald Trump congratulated Trudeau in a tweet early Tuesday morning on his "wonderful and hard fought victory." "Canada is well served," Mr. Trump said, adding that he looked forward to working with the Canadian leader "toward the betterment of both of our countries!" Congratulations to @JustinTrudeau on a wonderful and hard fought victory. Canada is well served. I look forward to working with you toward the betterment of both of our countries! — Donald J. Trump (@realDonaldTrump) October 22, 2019 With results still trickling in early Tuesday, the Liberals had 156 seats — 14 short of the 170 needed for a majority in the 338-seat House of Commons. "Tonight Canadians rejected division and negativity. They rejected cuts and austerity. They elected a progressive agenda and strong action on climate change," Trudeau said early Tuesday. His address to supporters came, unusually, as his Conservative rival, Andrew Scheer, had just begun speaking to his own supporters, forcing networks to tear away from Scheer's speech. But the prime minister struck a conciliatory note: "To those who did not vote for us, know that we will work every single day for you, we will govern for everyone," Trudeau said. The Canadian vote came down to what was essentially a choice between the handsome and charismatic Trudeau and Scheer, the Conservatives' unassuming leader who was seen as the perfect antidote to Trudeau's flash and celebrity. Trudeau reasserted liberalism in 2015 after almost 10 years of Conservative Party government in Canada, but scandals combined with high expectations damaged his prospects. Perhaps sensing Trudeau was in trouble, Barack Obama made an unprecedented endorsement by a former American president in urging Canadians to re-elect Trudeau and saying the world needs his progressive leadership now. Trudeau, son of the liberal icon and late Prime Minister Pierre Trudeau, is one of the few remaining progressive world leaders in the Trump era and even appeared on the cover of Rolling Stone magazine under the headline "Why Can't He Be Our President?" Scheer, 40, is a career politician who was seen as a possible antidote to Trudeau's flash. But Bothwell said late Monday that he expected Scheer to resign. "He's gone," Bothwell said. "He ran a really dirty campaign. There is nothing to be proud of on his side. He had the opportunity and blew it." Among other things, Scheer called Trudeau a phony who couldn't even remember how many times he had worn blackface. In his concession speech, Scheer said the results showed Trudeau was much weakened since his 2015 election, when pundits had predicted the beginning of another Trudeau dynasty. "Tonight Conservatives have put Justin Trudeau on notice," Scheer said. "And Mr. Trudeau when your government falls, Conservatives will be ready and we will win." Trudeau also was hurt by a scandal that erupted this year when his former attorney general said he pressured her to halt the prosecution of a Quebec company. Trudeau has said he was standing up for jobs, but the damage gave a boost to the Conservative Party. Trudeau's Liberals will likely rely on the New Democrats to form a new government and pass legislation. Opposition New Democrat leader Jagmeet Singh said early Tuesday he had congratulated Trudeau and vowed to play a constructive role in Parliament. Wiseman, from the University of Toronto, said Monday's results left the Conservatives deeply disappointed. "They had an opportunity here to win," he said. Scheer had promised to end a national carbon tax and cut government spending, including foreign aid, by 25%. Trudeau embraced immigration at a time when the U.S. and other countries are closing their doors, and he legalized cannabis nationwide. His efforts to strike a balance on the environment and the economy have been criticized by both the right and left. He brought in a carbon tax to fight climate change but rescued a stalled pipeline expansion project to get Alberta's oil to international markets. His also negotiated a new free trade deal for Canada with the U.S. and Mexico amid threats by President Trump to scrap it.
INTRODUCTION ============ Progressive aging of the population and the steady increase in life expectancies in prosperous countries are paralleled by increases in age-associated metabolic diseases and functional limitations.[@b1-jomes-27-084],[@b2-jomes-27-084] Korea is not an exception to this trend and is expected to become a super-aged society by 2026, with more than 20% of the population older than 65 years of age. In a recent study, researchers predicted that the average life expectancy of women in Korea will exceed 90 years by 2030[@b3-jomes-27-084], and Korean men are projected to make similarly large gains. However, this increase in life expectancy does not necessarily correspond to an increase in healthy life years. In addition to population aging, obesity is a complex and increasingly prevalent condition that affects the quality of life, increases the risk of illness, and reduces the disability-adjusted life expectancy in both elderly and young populations worldwide.[@b4-jomes-27-084],[@b5-jomes-27-084] According to the Asia-Pacific criteria of the World Health Organization guidelines, body mass index (BMI) values of 23.0--24.9 kg/m^2^, 25.0--29.9 kg/m^2^, and ≥30 kg/m^2^ correspond to the classifications of overweight, grade I obesity, and grade II obesity, respectively, regardless of age.[@b6-jomes-27-084] In addition, abdominal obesity is defined by the Korean Society for the Study of Obesity as a waist circumference \>90 cm in men and \>85 cm in women. In Korea and many other countries, increases in the prevalence of obesity have been observed in all age groups, with steady and significant increases in prevalence of obesity and abdominal obesity among the elderly.[@b6-jomes-27-084] The aging population and obesity epidemic together signify a double disease burden for the future. These epidemiological trends represent an increasingly serious financial problem that will be faced by the Korean healthcare system. Obesity is a more pathophysiologically complex condition in older people than in young and middle-aged adults. This complexity makes it difficult to predict obesity-related comorbidities and presents a clinical conundrum in terms of weight management. BMI-defined obesity is strongly associated with cardiometabolic risk factors, and the use of BMI to classify obesity is simple and convenient from a treatment perspective. However, BMI does not account for variations in lean body mass, fat mass, or fluid retention.[@b7-jomes-27-084] Moreover, aging is often accompanied by progressive loss of muscle mass and strength (i.e., sarcopenia) and an increase in fat mass, even in individuals with relatively stable BMI.[@b8-jomes-27-084],[@b9-jomes-27-084] Accordingly, it remains uncertain whether BMI is an appropriate measure of obesity in older individuals. Instead, parameters such as waist circumference and measurement of body composition may be more important than BMI in this population. In addition, weight management in elderly people should aim to improve and maintain physical functioning and quality of life, as well as prevent medical problems associated with obesity in young and middle-aged patients.[@b10-jomes-27-084] Elderly obesity is a multifactorial condition resulting from long-term imbalance between energy intake and expenditure, with is influenced by genetic, epigenetic, and environmental factors.[@b11-jomes-27-084],[@b12-jomes-27-084] In addition, sociocultural factors may play a role in the national prevalence of obesity. In developing countries, overweight and obesity tend to be more prevalent among women, while in developed countries, obesity is more common among men.[@b4-jomes-27-084] In accordance with this trend, the prevalence of abdominal obesity and general obesity in Korea is more rapidly increasing among men than among women[@b6-jomes-27-084], and various factors have been suggested to contribute to age- and sex-related differences in obesity patterns. This paper reviews these differences in terms of the epidemiology of obesity in Korea, and discusses the clinical implications of obesity and related considerations regarding weight management in the elderly. PREVALENCE OF OBESITY, SARCOPENIA, AND SARCOPENIC OBESITY IN THE ELDERLY ======================================================================== The prevalence of obesity continues to increase among all age groups.[@b6-jomes-27-084] In Korea, the prevalence rates of general obesity and abdominal obesity peak at approximately 60 and 70 years, respectively, after which point body weight stabilizes and begins to decline. However, current trends indicate that the prevalence of obesity will continue to increase among the elderly. According to the National Health Insurance Service database, the frequency of obesity among adults aged 70--79 years increased from 31.7% in 2006 to 36.6% in 2015, whereas among those aged ≥80 years, the frequency of obesity increased from 21.9% in 2006 to 27.5% in 2015. Similar trends were observed for the prevalence of abdominal obesity among the elderly, as well as the presence of obesity among young adults (ages 20--29 years, 30--39 years, and 40--49 years).[@b6-jomes-27-084] From 2014 to 2015, the prevalence of BMI-defined obesity among men increased up to the age of 30 years and then decreased from 40 to 50 years of age.[@b6-jomes-27-084] In women, however, it increased until the mid-70s and decreased thereafter. In contrast, the prevalence of abdominal obesity steadily increased from 20--30 years of age to 70 years of age in both men and women, followed by decreases among those older than 80 years. Interestingly, the prevalence of abdominal obesity in those younger than 60--70 years of age was higher among men than women, whereas the reverse was true thereafter. The evidence clearly suggests sex-based differences in body composition and prevalence of obesity. [Fig. 1](#f1-jomes-27-084){ref-type="fig"} presents age-related trends in appendicular skeletal muscle mass and visceral fat area, based on data from the Korean Sarcopenic Obesity Study (KSOS).[@b13-jomes-27-084] Although young and middle-aged men had more visceral fat than women of the same age, the total incremental change in visceral fat area with aging was greater in women than in men. In men, the appendicular skeletal muscle mass increased with age, peaked at approximately 20--30 years, and showed a dramatic decrease thereafter. However, in women, considerably different changes in muscle mass were observed with aging. These results were consistent with the analyses of data from the Korea National Health and Nutrition Examination Survey 2008--2010, which showed that, in women, muscle mass slowly increased until approximately 40 years of age, remained constant until 50--60 years of age, and decreased slightly thereafter.[@b14-jomes-27-084] Hence, in the Korean elderly population, the prevalence of class II sarcopenia is higher among men than among women when using the unadjusted or height-adjusted appendicular skeletal muscle mass although the prevalence varies among operating methods.[@b13-jomes-27-084],[@b15-jomes-27-084] Approximately 30%--50% of adults aged 80 years or older may be adversely affected by sarcopenia.[@b16-jomes-27-084] This condition often co-occurs with an absolute or relative increase in fat mass; this scenario, termed sarcopenic obesity[@b17-jomes-27-084],[@b18-jomes-27-084], may confer a cumulative risk derived from the combination of the two body composition phenotypes. The prevalence of sarcopenic obesity among the elderly is increasing with population aging[@b19-jomes-27-084]--[@b21-jomes-27-084], and this has led to increased interest among nutritionists, geriatricians, and public health officers regarding the impact of this combined condition on physical and cardiometabolic functions. Two scenarios may be conducive to the onset of sarcopenic obesity. First, weight gain and especially fat gain may induce sarcopenic obesity in lean subjects. Second, in morbidly obese subjects, weight loss may induce muscle loss at varying rates, leading to the onset of sarcopenic obesity consequent to prominent losses in muscle mass ([Fig. 2](#f2-jomes-27-084){ref-type="fig"}).[@b22-jomes-27-084] The results of previous epidemiologic studies in Korea suggest that the former may occur mainly in women, while the latter may occur more frequently in men. PATHOPHYSIOLOGY OF OBESITY IN THE ELDERLY ========================================= The pathophysiological mechanism of elderly obesity is complex and involves interactions among aging and endocrine (insulin, leptin, corticosteroid, testosterone/estrogen, growth hormone/insulin-like growth factor \[IGF\]-1, vitamin D), immunological (proinflammatory cytokines, oxidative stress, mitochondrial dysfunction, apoptosis pathways) and lifestyle factors (diet, physical activity, smoking), among others.[@b23-jomes-27-084],[@b24-jomes-27-084] Of these, aging has been associated with important changes in body composition, such as progressive loss of skeletal muscle and increase and redistribution of body fat that together comprise sarcopenic obesity.[@b18-jomes-27-084] As noted above, men begin to experience a progressive loss of muscle mass beginning at approximately 40 years of age, whereas the changes in fat distribution with age, particularly an increase in visceral fat, are more marked in women than in men. Furthermore, fat is increasingly deposited in the skeletal muscles and liver with increasing age. In addition to ectopic fat accumulation, the loss of skeletal muscle, the largest insulin-responsive target tissue in the body, leads to insulin resistance and thus promotes a vicious cycle between muscle loss and fat gain.[@b12-jomes-27-084] Moreover, an increase in intra-abdominal fat accumulation (i.e., visceral fat) may increase the levels of proinflammatory adipokines and oxidative stress, which further promote insulin resistance and have potentially direct catabolic effects on muscles.[@b9-jomes-27-084],[@b25-jomes-27-084],[@b26-jomes-27-084] In a longitudinal KSOS study, visceral obesity was found to be independently associated with future losses of skeletal muscle mass after adjusting for confounding factors.[@b27-jomes-27-084] This age-related progressive loss of muscle mass leads to decreases in physical performance, disability, and frailty[@b24-jomes-27-084],[@b28-jomes-27-084],[@b29-jomes-27-084], which contribute to weight gain by reducing energy expenditure. In addition to insulin resistance, obesity-related hormonal changes include decreased estrogen level in women, decreased total testosterone level in both men and women, and decreased free testosterone level in men.[@b30-jomes-27-084] However, obesity and age-related decline in sex hormones are linked by complex relationships in the elderly. Increased adiposity is often associated with high circulating levels of free fatty acids, which inhibit growth hormone production and decrease plasma IGF-1 level.[@b31-jomes-27-084] Therefore, low levels of or resistance to these anabolic hormones may exacerbate muscle impairment in older individuals with obesity. In addition, behavioral factors such as physical inactivity and inappropriate food intake, as well as chronic illness, can lead to muscle loss while preserving body fat.[@b11-jomes-27-084] These multifactorial influences suggest that complex interventions may be the most effective means of counteracting obesity in the elderly. CLINICAL IMPLICATIONS OF OBESITY IN THE ELDERLY =============================================== Effects of obesity on chronic metabolic diseases ------------------------------------------------ Obesity is associated with various comorbidities, regardless of age. While obesity presents as an excess of body weight and adipose tissue in young and middle-aged adults, this condition is more physiologically and anatomically complex and less clearly quantifiable in the elderly. Although the relationship between BMI and cardiometabolic disease risk is much weaker in the elderly than in younger people, both metabolic syndrome and type 2 diabetes are positively associated with obesity indices such as BMI and waist circumference, regardless of age.[@b11-jomes-27-084] In addition, cardiovascular risk factors such as hypertension and dyslipidemia, as well as certain cancers, are more common in older people with higher waist circumferences.[@b32-jomes-27-084],[@b33-jomes-27-084] In older individuals, metabolic disorders may arise via complex mechanisms involving age-related declines in sex hormones. For example, late-onset hypogonadism in men is associated with obesity and obesity-related metabolic disorders[@b34-jomes-27-084], while obese postmenopausal women face a greater risk of metabolic disorders relative to their lean counterparts, despite having higher total concentrations of estrogens primarily derived from the aromatization of androgens in adipose tissue.[@b35-jomes-27-084] In one study, the chronic administration of 17β-estradiol protected against high-fat-diet-induced glucose intolerance even though exogenous estradiol can increase inflammation in adipose tissue.[@b36-jomes-27-084] These findings suggest that androgens derived from intra-abdominal fat, rather than aromatized estrogens, may induce metabolic disorders and serve as cardiovascular risk factors. Effects of obesity on ischemic heart disease and stroke ------------------------------------------------------- Excess adiposity is associated with an increased incidence of cardiovascular events. More than 9 years of follow-up data from the Korea Medical Insurance Corporation Study revealed that BMI was strongly related to the incidence of ischemic heart disease in relatively young Korean men and women (age at baseline: mean± standard deviation, 44.8±6.7 years in men and 42.1±6.0 years in women), without specific thresholds of abrupt change in risk and without a U-shaped relation.[@b37-jomes-27-084] In addition, a heavier body weight has been associated with a modest increase in the risk of coronary heart disease in people aged 65 years.[@b38-jomes-27-084],[@b39-jomes-27-084] Furthermore, change in weight from middle to old age and current weight may be indicators of risk of cardiovascular disease in old age.[@b40-jomes-27-084] In contrast, studies on the association between obesity and stroke in older age have yielded inconsistent results. Over a 22-year period, the Honolulu Heart Program prospectively followed a cohort of 1,163 nonsmoking men aged 55--68 years and observed a positive relationship between baseline BMI and risk of thromboembolic stroke.[@b41-jomes-27-084] A 13-year prospective cohort study among 439,582 Korean women aged 30--95 years demonstrated that the hazard ratio of overall stroke progressively increased with increased BMI, and an increased risk of stroke was more prominent in the younger group (\<50 years).[@b42-jomes-27-084] However, BMI was not independently associated with incidence of stroke among Korean individuals older than 50 years of age at baseline.[@b42-jomes-27-084] A Spanish registry of 2,000 consecutive stroke patients and the Framingham Study reported that obesity was a risk factor for stroke in older women but not in older men.[@b43-jomes-27-084],[@b44-jomes-27-084] To further complicate the issue, a post-hoc analysis of the Systolic Hypertension in the Elderly trial identified an association of the lowest BMI quintile, rather than obesity, with an increased occurrence of stroke in both older men and women with hypertension.[@b45-jomes-27-084] Therefore, the results of studies of the effects of weight gain on stroke in older adults should be cautiously interpreted. Although overweight and obese older adults face a higher risk of cardiovascular disease, studies also suggest a paradoxical association of obesity in the elderly with a lower cardiovascular disease mortality rate.[@b7-jomes-27-084] Effects of obesity on arthritis, disability, frailty, dementia, and impaired quality of life -------------------------------------------------------------------------------------------- Elderly people with obesity, especially those who faced obesity earlier in life, have a greater risk of osteoarthritis of the knee; together with sarcopenia, this condition can cause disability, physical impairment, and reduced quality of life.[@b11-jomes-27-084],[@b46-jomes-27-084] In contrast, low muscle mass in the absence of obesity is not associated with physical disability.[@b20-jomes-27-084] In accordance with these findings, BMI exhibits an inverse correlation with physical performance measurements in older people[@b47-jomes-27-084],[@b48-jomes-27-084], and compared to low muscle mass, high body fat and high BMI values are more strongly associated with the risk of functional limitations in the elderly. In older people, obesity is known as an important risk factor for frailty, which is closely associated with impaired physical function. In the Cardiovascular Health Study, individuals who developed frailty had higher body weights and were more likely to have central obesity.[@b49-jomes-27-084] The English Longitudinal Study of Ageing identified an association of frailty with a high waist circumference, even among underweight older people, as well as a U-shaped association of BMI with frailty.[@b50-jomes-27-084] Other studies have identified risk factors commonly associated with coronary disease, stroke, and other vascular disorders among the predictors of dementia. One meta-analysis indicated the presence of a U-shaped association between BMI and dementia (*P*= 0.034); in other words, both obesity and underweight were associated with increased risk of dementia.[@b51-jomes-27-084] Although the associations of frailty and dementia with BMI both yielded U-shape curves, the poor quality of life associated with obesity may also be attributable to the relationships between BMI and the aforementioned outcomes, such as chronic metabolic disease, arthritis, and physical impairment. Effects of obesity on mortality ------------------------------- The negative effects of high BMI on the risk of all-cause mortality have been well established. Despite the elevated risk of cardiovascular disease among overweight or obese older adults, however, some studies on the association between BMI and mortality have suggested a paradoxical association of overweight or obesity with reduced cardiovascular disease-related mortality in this population. This phenomenon is appropriately called the "obesity paradox."[@b7-jomes-27-084],[@b52-jomes-27-084] In the elderly, the association between BMI and all-cause mortality yields a U-shaped curve, indicating an increased risk of death for both underweight and obese individuals.[@b7-jomes-27-084] Nevertheless, these observational studies have often been misinterpreted to suggest that obesity is not particularly harmful in the elderly; however, in contrast, absolute mortality risk associated with increased BMI increases up to 75 years of age.[@b53-jomes-27-084] Notably, the obesity paradox may represent an artificial defect caused by the use of BMI to measure obesity in the elderly. Specifically, very old people with a low BMI comprise two groups: those who have always been lean and physically active and those who were often physically inactive and lost weight because of chronic illness or smoking habits. Accordingly, despite their similar BMI, these two groups of people may have very different body compositions and body fat distributions. Because older adults tend to have higher proportions and different distributions of body and visceral fat, waist circumference or body composition analysis data should be considered together with BMI when evaluating the degree of obesity in the elderly. For example, Janssen et al.[@b54-jomes-27-084] found that, in people aged 65 years and older, higher BMI values were associated with lower death rates after controlling for waist circumference; similarly, waist circumference was associated with a higher risk of death after controlling for BMI. These results suggest that BMI may be a reflection of lean mass in individuals with similar waist circumference values, whereas waist circumference is a reflection of visceral fat mass in subjects with similar BMI values.[@b55-jomes-27-084] The optimal BMI and waist circumference targets in older adults remain to be validated in a large prospective trial, and more research is needed to evaluate this relationship. IS WEIGHT LOSS IN THE ELDERLY BENEFICIAL OR HARMFUL? ==================================================== In young or middle-aged people with obesity, weight loss is associated with many benefits and reduced risks of complications arising from fat burdens. In contrast, the effects of weight loss in the elderly remain controversial. Two scenarios, intentional and unintentional, can be used to classify weight loss in older adults, and it may be important to differentiate these scenarios when reviewing the positive and negative effects of weight loss in older people with obesity. For example, those who experience unintentional weight loss may be more likely to smoke and have chronic illnesses such as cancer or chronic heart, lung, and kidney disease. In contrast, those who experience intentional weight loss may experience clinical benefits with regard to osteoarthritis, functional disability, type 2 diabetes, and cardiovascular disease, despite slight decreases in bone mineral density and skeletal muscle mass.[@b56-jomes-27-084],[@b57-jomes-27-084] In addition, observational studies have demonstrated increases in life expectancy among older individuals with type 2 diabetes who lost weight intentionally.[@b58-jomes-27-084] However, few clinical trials have addressed the association between intentional weight loss and mortality among older adults with obesity; therefore, limited evidence supports the association of weight reduction with long life expectancy. The existing evidence suggests that intentional weight loss should be recommended specifically to older adults with obesity-related comorbidities, including those with functional limitations or metabolic complications such as metabolic syndrome, type 2 diabetes, and cardiovascular disease. Although the current therapeutic options for weight management in older adults do not differ from those offered to younger or middle-aged people, intentional weight loss strategies offered to older people should pay more attention to preventing loss of bone and muscle. Although older individuals are already likely to have relatively low muscle mass, further reductions due to weight loss could be mitigated by a regimen of regular resistance exercise combined with adequate protein intake.[@b59-jomes-27-084] CONCLUSION ========== The aging of the Korean population has led to an increase in the population of older adults with obesity. Obesity is a chronic disease associated with cardiovascular diseases and functional impairment, regardless of age. Therefore, aging and obesity comprise a significant health crisis in terms of the risk of sarcopenic obesity. In addition to the increased health risks, the possible mechanisms and clinical implications of obesity are more complicated and less well understood in older adults than in younger people. Therefore, more research is needed to determine the optimal BMI and waist circumference values and other potential indices of body composition in the elderly, as these will help to guide therapeutic decisions. A better understanding of the complexity of elderly obesity, from the viewpoint of sarcopenic obesity, is expected to facilitate the design of preventative and therapeutic strategies that will positively impact the overall health of the population. This research was supported by the Priority Research Centers Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2010-0020224). **CONFLICTS OF INTEREST** The author declares no conflict of interest. ![Relationships of age with appendicular skeletal muscle mass (A) and visceral fat area (B) in both men and women (based on data from the Korean Sarcopenic Obesity Study).[@b13-jomes-27-084]](jomes-27-084f1){#f1-jomes-27-084} ![Two hypothetical scenarios of elderly obesity. esp, especially.](jomes-27-084f2){#f2-jomes-27-084}
Chivalry Isn’t Dead, Crickets Show Jiminy Cricket from the movie Pinocchio was a top-hat-wearing, umbrella-toting conscionable crooner, but if researchers are right, the fictional cricket from Walt Disney's studio would also have taken a bullet for the one he loved. If you think chivalry is dead, take a lesson from crickets, researchers reported Thursday. Male field crickets (Gryllus campestris) will expose themselves to danger, namely hungry predators, to protect a female during mating, scientists found by snooping on cricket couples with infrared cameras. Much like a man opens a door for a woman, male crickets allow the females to hide in burrows, even if that means that male cricket sticks out like a meal ticket. Scientists had studied crickets in a lab setting before and concluded that male crickets shoved females into tight spaces in order to hold them prisoner until mating was competed and to thwart off other males. Not so in the wild, the entomologists found. Here is the tradeoff that scientists found: male crickets produced more offspring when they protected their amour even as the chivalry increased their chances of death. Many people probably think that 'chivalrous' behavior is exclusive of humans or closely related mammals, linking it in some way to education, intelligence, or affection, said Rolando Rodríguez-Muñoz of the University of Exeter and lead author of the study. We show that even males of small insects, which we would not define as intelligent or affective, can be 'chivalrous' or protective with their partners. Perhaps it shines a light on the fact that apparently chivalrous acts may have ulterior motives. Did Sir Walter Raleigh throw his cape onto a muddy pool in front of Queen Elizabeth just because he was a nice guy? I think not. The current study was published online Thursday in the journal Current Biology. The notion of animal chivalry isn't so foreign. In a chapter aptly entitled Animal Chivalry, English physician Woods Hutchinson wrote about animal manners back in 1899. We cannot deny to our animal cousins the possession of many, indeed nearly all, of the primate virtues - affection, courage, loyalty and faithfulness to the death; but we do deny them the moral credit for them, on the ground that they are the result of 'mere instinct', Hutchinson wrote. In the study, the research team tagged crickets to determine their fate and found that singly, male and female crickets had the same chance of being eaten. If a pair was attacked while mating, the male's survival decreased as the female's survival increased. The researchers looked at the subsequent offspring and found that the vulnerable males, despite the danger, fathered more offspring. Whether chivalry prevails in the offspring may depend. We are looking forward to seeing whether chivalry prevails in future generations, Rodríguez-Muñoz said, noting that the current study is based on three consecutive mating seasons. There may be some years when both sexes behave in a more obviously selfish fashion and attempt to escape down the burrow first.
Erythrina abyssinica Erythrina abyssinica is a tree species of the genus Erythrina belonging to the plant family of the Fabaceae (or Leguminosae) described by Augustin Pyramus de Candolle in 1825. This leguminous tree species is native to East Africa , Eastern DRC and southern Africa. History The description of E. abyssinica has been complicated, because the first specimen of Erythrina from Ethiopia (Abyssinia) brought to Europe was actually a mix of the two species. The flowers and leaves belonged to E. brucei Schweinfurth (1868) and the pod and seeds to E. abyssinica Lam. ex DC (1825). In addition, the first three descriptions were invalid, i.e. not published correctly to the International Code of Nomenclature for algae, fungi, and plants (syn. E. kuara James Bruce (1790), E. abyssinica Lam. (1786) and E. tomentosa Robert Brown (1814)). Furthermore, the species is variable with individuals with glabrous and hairy (tomentose) leaves which were described separately and after revision resulted in additional synonyms (syn. E. tomentosa R. Brown ex A. Rich. (1847)). The number of synonyms increased when a new genus was described from South Africa (Chirocalyx Meisn.), which later was considered synonymous with Erythrina (Ch. tomentosa Hochstetter and Ch. abyssinica Hochstetter). Finally, E. abyssinica was considered for some time the juvenile stage of E. brucei and hence synonymous with the latter species. The issue was settled in 1962 when the pods and seeds from E. brucei were collected which were different from those of E. abyssinica. Consecutively, the seeds planted revealed that seedlings and saplings of E. brucei did not resemble those of E. abyssinica. References External links abyssinica Category:Taxa named by Jean-Baptiste Lamarck
Introduction to reverse engineering and assembly - seiflotfy http://kakaroto.homelinux.net/2017/11/introduction-to-reverse-engineering-and-assembly/ ====== itsmemattchung Beyond reverse engineering, learning assembly made me appreciate what really goes on underneath the hood of my machine while I program in a higher level language such as C or Python. If you want a more comprehensive introduction to not only assembly, but the system as a whole, I cannot recommend this book enough: Computer System's from a programmer's perspective. Self studying that book -- along with the free video lectures[1] by the authors -- equipped me practical knowledge that's applicable as a software engineer who strives to grasp an understanding of the entire system. [1] [https://scs.hosted.panopto.com/Panopto/Pages/Sessions/List.a...](https://scs.hosted.panopto.com/Panopto/Pages/Sessions/List.aspx#folderID=%22b96d90ae-9871-4fae-91e2-b1627b43e25e%22) ~~~ Chriky In a similar vein, I highly recommend the nand2tetris online course. You begin by combining electrical logic gates into gradually more complex chips, then assemble the components of a computer, write an assembler, then a compiler for a high level toy language a bit like Java. Finally you program a game (such as Tetris) in that high level language. It is available on Coursera, you can access it for free but have to pay to have your work marked, which is definitely worth it. It really demystified that magical bridge between hardware and software for me - "How does typing text on this keyboard physically alter the flow of an electrical circuit?" ~~~ tenaciousDaniel I got a little ways into the Nand2Tetris course but gave up b/c of the intense logic stuff involved. I never took college-level logic or math and it made the material muuucchh harder to understand. Maybe I should give it another shot though, who knows. ~~~ castle-bravo Hard, intimidating things get easier and less intimidating the more you expose yourself to them (at least in maths; can't say the same for bears). ------ CurtMonash I was taught assembler in my second year at school, It's kind of like construction work With a toothpick, for a tool ~ The Eternal Flame, by Bob Kanefsky [https://genius.com/Bob-kanefsky-eternal-flame-lyrics](https://genius.com/Bob- kanefsky-eternal-flame-lyrics) [https://www.youtube.com/watch?v=u-7qFAuFGao](https://www.youtube.com/watch?v=u-7qFAuFGao) ~~~ happy-go-lucky I've just found the Eternal Flame (song parody) at [https://www.gnu.org/fun/jokes/eternal- flame.en.html](https://www.gnu.org/fun/jokes/eternal-flame.en.html) ------ teolandon Writing down a high-level version of the assembly instructions in C is one of the best tricks when reverse engineering disassembled code. When I started trying to interpret assembly instructions by keeping track of the registers, stack, and branches, but that ended up being way too much bookkeeping and didn't really give any more insight on what the code actually does. Keeping a text file of C code though and adding lines as you go through the instructions is really fitting and practical. C is abstract enough to not care about most bookkeeping of registers and stack management, and branches can be written in nice nested if-else blocks that are familiar to most programmers and provide a visual structure that is compact and practical. On the other hand, C is low enough to deal with memory addresses almost directly, allowing you to easily transcribe any address arithmetic that happens, and if you're familiar with what stucts get compiled into, you can very nicely spot them in disassembled code and keep your high-level reverse engineered code structured and nice. Very nice guide and a very good starting point in reverse engineering, especially if you have at least some experience with assembly. ------ adamnemecek ...or spend like 4 hours playing around with godbolt. [https://godbolt.org](https://godbolt.org). You can thank me later. ~~~ pthreads This is quite nifty, love it. I will thank you later (you a fan of Monk?) ~~~ adamnemecek I’m not lol. ------ kruhft One the most fun ways to learn assembly is on older systems like the Gameboy using something like the excellent no$gmb[1] emulator and some of the really well developed docs[2]. Full graphical debugging capabilities and an excellent tool for learning. A lot less complex to start and you still learn the magic. [1] [http://problemkaputt.de/gmb.htm](http://problemkaputt.de/gmb.htm) [2] [https://github.com/avivace/awesome-gbdev](https://github.com/avivace/awesome- gbdev) ------ partycoder Some useful links: \- [https://github.com/radareorg/cutter](https://github.com/radareorg/cutter) (GUI for Radare2, free alternative to IDA) \- [https://github.com/eteran/edb-debugger](https://github.com/eteran/edb- debugger) (debugger, free alternative for OllyDbg) \- [http://hte.sourceforge.net/](http://hte.sourceforge.net/) (hex editor, disassembler, free alternative for Hiew) (open a binary, then press F6, select image format to get started, e.g: elf/image or pe/image) \- [http://ref.x86asm.net/coder64.html](http://ref.x86asm.net/coder64.html) List of x86-64 opcodes \- [https://godbolt.org/](https://godbolt.org/) REPL that shows asm for given C/C++ code. \- [https://www.reddit.com/r/ReverseEngineering/](https://www.reddit.com/r/ReverseEngineering/) ------ Avery3R I don't know why people still use at&t syntax for x86(-64) asm, Intel syntax is so much easier to read The syntax the author uses isn't even proper at&t or Intel, it's some weird hybrid of both. ------ AnIdiotOnTheNet A while back I had a side project I took on for a colleague that involved reverse engineering and bypassing the lockout mechanism on an old piece of kit that wanted to phone home. It was one of the most fun and engaging things I've ever done. There does seem to be a lack of really good free disassemblers though, none of the ones I tried could consistently handle relocation tables for some reason. ~~~ stevekemp I got started programming doing similar things; hacking copy-protection code on games on my 48k spectrum, so that I could go on to patch the games for infinite lives: [https://blog.steve.fi/how_i_started_programming.html](https://blog.steve.fi/how_i_started_programming.html) Later I started doing similar things on shareware and trial-locked applications for the PC, via sites such as +fravia's reverse-engineering site. These days people put out "crackmes" which are fun challenges if you want to test your reverse-engineering skills, and while I always pay for software these days, when I need it, there's still a lot of fun to be had patching binaries to allow your preferred serial number to be accepted! ~~~ brango I wondered when fravia would make an appearance. +ORC got me into programming too. Great days cracking winzip and defeating parental controls :-) ~~~ IronBacon Fravia, aka Francesco Vianello, passed away few years ago. ------ rwx------ Almost ten years ago I worked on a reverse engineering project. It was _very_ tedious work. Is it worth it to be good at reverse engineering, I mean are there good paying jobs for it now? I often have trouble explaining reverse engineering to people without raising eyebrows. People think its hacking ~~~ umanwizard It's surprising to me how often reverse engineering turns out to be useful even in normal programming jobs. Even if it only happens once or twice a year, if you're the only person on your team who can figure out how to work around some framework or OS bug, people will think you're a magician. Stuff like that can make performance review cycles all by itself. It really depends on the type of work you're doing, though. Most people got into reverse engineering because they find it fun. If you hate it, there is probably other stuff you can spend your time on more productively. ------ adricnet This mirror of a Purism blog post to his personal blog looks pretty interesting but I'm having trouble accessing it on homelinux or puri.sm domains due to reputation. Here's G cache: [http://webcache.googleusercontent.com/search?q=cache:dH0AFM8...](http://webcache.googleusercontent.com/search?q=cache:dH0AFM8hqaIJ:kakaroto.homelinux.net/2017/11/introduction- to-reverse-engineering-and-assembly/+&cd=1&hl=en&ct=clnk&gl=us) The OP, afaict: [https://puri.sm/posts/primer-to-reverse-engineering-intel- fs...](https://puri.sm/posts/primer-to-reverse-engineering-intel-fsp/) Thanks for sharing! ------ seiferteric I've just in the past month or so started getting into intel assembly. For some reason I was a bit intimidated by it even though I have done some m68k, avr, pic and z80 asm in the past. After watching some Australian dudes tutorials on youtube though I quickly realized it was not bad at all. Also it's pretty great how easy it is to mix C code with asm and really helps you understand things like calling conventions. Now I have been playing around doing weird things like trying to implement a closure in C and smashing the stack to return to a different function than the one that was called. ------ ngcc_hk There is another one recently about intel reverse eng. he use crackme ...
// Copyright 2016 The Bazel Authors. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package com.google.devtools.build.lib.rules.objc; import static com.google.devtools.build.lib.rules.objc.CompilationSupport.IncludeProcessingType.INCLUDE_SCANNING; import com.google.common.collect.ImmutableSet; import com.google.devtools.build.lib.analysis.RuleContext; import com.google.devtools.build.lib.analysis.RuleErrorConsumer; import com.google.devtools.build.lib.analysis.TransitiveInfoCollection; import com.google.devtools.build.lib.analysis.config.BuildConfiguration; import com.google.devtools.build.lib.packages.AspectDescriptor; import com.google.devtools.build.lib.packages.StructImpl; import com.google.devtools.build.lib.rules.cpp.CcCompilationContext; import com.google.devtools.build.lib.rules.cpp.CcToolchainFeatures.FeatureConfiguration; import com.google.devtools.build.lib.rules.cpp.CcToolchainProvider; import com.google.devtools.build.lib.rules.cpp.CppCompileActionBuilder; import com.google.devtools.build.lib.rules.cpp.CppConfiguration; import com.google.devtools.build.lib.rules.cpp.CppConfiguration.HeadersCheckingMode; import com.google.devtools.build.lib.rules.cpp.CppSemantics; import com.google.devtools.build.lib.rules.cpp.HeaderDiscovery.DotdPruningMode; import com.google.devtools.build.lib.rules.cpp.IncludeProcessing; import com.google.devtools.build.lib.rules.objc.CompilationSupport.IncludeProcessingType; /** * CppSemantics for objc builds. */ public class ObjcCppSemantics implements CppSemantics { private final IncludeProcessingType includeProcessingType; private final IncludeProcessing includeProcessing; private final ObjcConfiguration config; private final IntermediateArtifacts intermediateArtifacts; private final BuildConfiguration buildConfiguration; private final boolean enableModules; /** * Creates an instance of ObjcCppSemantics * * @param includeProcessingType The type of include processing to be run. * @param includeProcessing the closure providing the strategy for processing of includes for * actions * @param config the ObjcConfiguration for this build * @param intermediateArtifacts used to create headers_list artifacts * @param buildConfiguration the build configuration for this build * @param enableModules whether modules are enabled */ public ObjcCppSemantics( IncludeProcessingType includeProcessingType, IncludeProcessing includeProcessing, ObjcConfiguration config, IntermediateArtifacts intermediateArtifacts, BuildConfiguration buildConfiguration, boolean enableModules) { this.includeProcessingType = includeProcessingType; this.includeProcessing = includeProcessing; this.config = config; this.intermediateArtifacts = intermediateArtifacts; this.buildConfiguration = buildConfiguration; this.enableModules = enableModules; } @Override public void finalizeCompileActionBuilder( BuildConfiguration configuration, FeatureConfiguration featureConfiguration, CppCompileActionBuilder actionBuilder, RuleErrorConsumer ruleErrorConsumer) { actionBuilder // Without include scanning, we need the entire crosstool filegroup, including header files, // as opposed to just the "compile" filegroup. Even with include scanning, we need the // system framework headers since they are not being scanned right now. // TODO(waltl): do better with include scanning. .addTransitiveMandatoryInputs(actionBuilder.getToolchain().getAllFilesMiddleman()) .setShouldScanIncludes(includeProcessingType == INCLUDE_SCANNING); } @Override public HeadersCheckingMode determineHeadersCheckingMode(RuleContext ruleContext) { return HeadersCheckingMode.STRICT; } @Override public HeadersCheckingMode determineStarlarkHeadersCheckingMode( RuleContext context, CppConfiguration cppConfig, CcToolchainProvider toolchain) { if (cppConfig.strictHeaderCheckingFromStarlark()) { return HeadersCheckingMode.STRICT; } return HeadersCheckingMode.LOOSE; } @Override public IncludeProcessing getIncludeProcessing() { return includeProcessing; } @Override public boolean needsDotdInputPruning() { return config.getDotdPruningPlan() == DotdPruningMode.USE; } @Override public void validateAttributes(RuleContext ruleContext) { } @Override public boolean needsIncludeValidation() { // We disable include valication when modules are enabled, because Apple uses absolute paths in // its module maps, which include validation does not recognize. Modules should only be used // rarely and in third party code anyways. return (includeProcessingType == INCLUDE_SCANNING) && !enableModules; } /** * Gets the purpose for the {@code CcCompilationContext}. * * @see CcCompilationContext.Builder#setPurpose */ public String getPurpose() { // ProtoSupport creates multiple {@code CcCompilationContext}s for a single rule, // potentially // multiple archives per build configuration. This covers that worst case. return "ObjcCppSemantics_build_arch_" + buildConfiguration.getMnemonic() + "_with_suffix_" + intermediateArtifacts.archiveFileNameSuffix(); } /** cc_shared_library is not supported with Objective-C */ @Override public StructImpl getCcSharedLibraryInfo(TransitiveInfoCollection dep) { return null; } @Override public void validateLayeringCheckFeatures( RuleContext ruleContext, AspectDescriptor aspectDescriptor, CcToolchainProvider ccToolchain, ImmutableSet<String> unsupportedFeatures) {} }
#include "StdAfx.h" #include "BroadphaseProxy.h" #include "CollisionObject.h" #include "CollisionShape.h" #include "RigidBody.h" #ifndef DISABLE_FEATHERSTONE #include "MultiBodyLinkCollider.h" #endif #ifndef DISABLE_SERIALIZE #include "Serializer.h" #endif #ifndef DISABLE_SOFTBODY #include "SoftBody.h" #endif CollisionObject::CollisionObject(btCollisionObject* native) { UnmanagedPointer = native; } CollisionObject::~CollisionObject() { this->!CollisionObject(); } CollisionObject::!CollisionObject() { if (this->IsDisposed) return; OnDisposing(this, nullptr); if (!_preventDelete) { void* userObj = _native->getUserPointer(); if (userObj) VoidPtrToGCHandle(userObj).Free(); delete _native; } _isDisposed = true; OnDisposed(this, nullptr); } CollisionObject::CollisionObject() { UnmanagedPointer = new btCollisionObject(); } void CollisionObject::Activate(bool forceActivation) { _native->activate(forceActivation); } void CollisionObject::Activate() { _native->activate(); } #ifndef DISABLE_SERIALIZE int CollisionObject::CalculateSerializeBufferSize() { return _native->calculateSerializeBufferSize(); } #endif bool CollisionObject::CheckCollideWith(CollisionObject^ collisionObject) { return _native->checkCollideWith(collisionObject->_native); } bool CollisionObject::CheckCollideWithOverride(CollisionObject^ collisionObject) { return _native->checkCollideWithOverride(collisionObject->_native); } void CollisionObject::ForceActivationState(BulletSharp::ActivationState newState) { _native->forceActivationState((int)newState); } bool BulletSharp::CollisionObject::GetCustomDebugColor([Out] Vector3% colorRgb) { btVector3* colorRgbTemp = ALIGNED_NEW(btVector3); bool ret = _native->getCustomDebugColor(*colorRgbTemp); ALIGNED_FREE(colorRgbTemp); return ret; } int CollisionObject::GetHashCode() { return (int)_native; } void CollisionObject::GetWorldTransform([Out] Matrix% outTransform) { BtTransformToMatrixFast(_native->getWorldTransform(), outTransform); } bool CollisionObject::HasAnisotropicFriction(AnisotropicFrictionFlags frictionMode) { return _native->hasAnisotropicFriction((int)frictionMode); } bool CollisionObject::HasAnisotropicFriction() { return _native->hasAnisotropicFriction(); } void BulletSharp::CollisionObject::RemoveCustomDebugColor() { _native->removeCustomDebugColor(); } #ifndef DISABLE_SERIALIZE String^ CollisionObject::Serialize(IntPtr dataBuffer, BulletSharp::Serializer^ serializer) { return gcnew String(_native->serialize(dataBuffer.ToPointer(), serializer->_native)); } void CollisionObject::SerializeSingleObject(BulletSharp::Serializer^ serializer) { _native->serializeSingleObject(serializer->_native); } #endif void CollisionObject::SetAnisotropicFriction(Vector3 anisotropicFriction, AnisotropicFrictionFlags frictionMode) { VECTOR3_CONV(anisotropicFriction); _native->setAnisotropicFriction(VECTOR3_USE(anisotropicFriction), (int)frictionMode); VECTOR3_DEL(anisotropicFriction); } void CollisionObject::SetAnisotropicFriction(Vector3 anisotropicFriction) { VECTOR3_CONV(anisotropicFriction); _native->setAnisotropicFriction(VECTOR3_USE(anisotropicFriction)); VECTOR3_DEL(anisotropicFriction); } void BulletSharp::CollisionObject::SetCustomDebugColor(Vector3 colorRgb) { VECTOR3_CONV(colorRgb); _native->setCustomDebugColor(VECTOR3_USE(colorRgb)); VECTOR3_DEL(colorRgb); } void CollisionObject::SetIgnoreCollisionCheck(CollisionObject^ collisionObject, bool ignoreCollisionCheck) { _native->setIgnoreCollisionCheck(collisionObject->_native, ignoreCollisionCheck); } CollisionObject^ CollisionObject::GetManaged(btCollisionObject* collisionObject) { if (collisionObject == 0) return nullptr; void* userObj = collisionObject->getUserPointer(); if (userObj) return static_cast<CollisionObject^>(VoidPtrToGCHandle(userObj).Target); throw gcnew InvalidOperationException("Unknown collision object!"); } BulletSharp::ActivationState CollisionObject::ActivationState::get() { return (BulletSharp::ActivationState)_native->getActivationState(); } void CollisionObject::ActivationState::set(BulletSharp::ActivationState value) { _native->setActivationState((int)value); } Vector3 CollisionObject::AnisotropicFriction::get() { return Math::BtVector3ToVector3(&_native->getAnisotropicFriction()); } void CollisionObject::AnisotropicFriction::set(Vector3 value) { VECTOR3_CONV(value); _native->setAnisotropicFriction(VECTOR3_USE(value)); VECTOR3_DEL(value); } BroadphaseProxy^ CollisionObject::BroadphaseHandle::get() { return _broadphaseHandle; } void CollisionObject::BroadphaseHandle::set(BroadphaseProxy^ handle) { _native->setBroadphaseHandle(GetUnmanagedNullable(handle)); _broadphaseHandle = handle; } btScalar CollisionObject::CcdMotionThreshold::get() { return _native->getCcdMotionThreshold(); } void CollisionObject::CcdMotionThreshold::set(btScalar ccdMotionThreshold) { _native->setCcdMotionThreshold(ccdMotionThreshold); } btScalar CollisionObject::CcdSquareMotionThreshold::get() { return _native->getCcdSquareMotionThreshold(); } btScalar CollisionObject::CcdSweptSphereRadius::get() { return _native->getCcdSweptSphereRadius(); } void CollisionObject::CcdSweptSphereRadius::set(btScalar radius) { _native->setCcdSweptSphereRadius(radius); } CollisionFlags CollisionObject::CollisionFlags::get() { return (BulletSharp::CollisionFlags)_native->getCollisionFlags(); } void CollisionObject::CollisionFlags::set(BulletSharp::CollisionFlags flags) { _native->setCollisionFlags((int)flags); } CollisionShape^ CollisionObject::CollisionShape::get() { return _collisionShape; } void CollisionObject::CollisionShape::set(BulletSharp::CollisionShape^ collisionShape) { _native->setCollisionShape(GetUnmanagedNullable(collisionShape)); _collisionShape = collisionShape; } int CollisionObject::CompanionId::get() { return _native->getCompanionId(); } void CollisionObject::CompanionId::set(int id) { _native->setCompanionId(id); } btScalar CollisionObject::ContactProcessingThreshold::get() { return _native->getContactProcessingThreshold(); } void CollisionObject::ContactProcessingThreshold::set(btScalar contactProcessingThreshold) { _native->setContactProcessingThreshold(contactProcessingThreshold); } btScalar CollisionObject::DeactivationTime::get() { return _native->getDeactivationTime(); } void CollisionObject::DeactivationTime::set(btScalar time) { _native->setDeactivationTime(time); } btScalar CollisionObject::Friction::get() { return _native->getFriction(); } void CollisionObject::Friction::set(btScalar frict) { _native->setFriction(frict); } bool CollisionObject::HasContactResponse::get() { return _native->hasContactResponse(); } btScalar CollisionObject::HitFraction::get() { return _native->getHitFraction(); } void CollisionObject::HitFraction::set(btScalar hitFraction) { _native->setHitFraction(hitFraction); } Vector3 CollisionObject::InterpolationAngularVelocity::get() { return Math::BtVector3ToVector3(&_native->getInterpolationAngularVelocity()); } void CollisionObject::InterpolationAngularVelocity::set(Vector3 angvel) { VECTOR3_CONV(angvel); _native->setInterpolationAngularVelocity(VECTOR3_USE(angvel)); VECTOR3_DEL(angvel); } Vector3 CollisionObject::InterpolationLinearVelocity::get() { return Math::BtVector3ToVector3(&_native->getInterpolationLinearVelocity()); } void CollisionObject::InterpolationLinearVelocity::set(Vector3 linvel) { VECTOR3_CONV(linvel); _native->setInterpolationLinearVelocity(VECTOR3_USE(linvel)); VECTOR3_DEL(linvel); } Matrix CollisionObject::InterpolationWorldTransform::get() { return Math::BtTransformToMatrix(&_native->getInterpolationWorldTransform()); } void CollisionObject::InterpolationWorldTransform::set(Matrix trans) { TRANSFORM_CONV(trans); _native->setInterpolationWorldTransform(TRANSFORM_USE(trans)); TRANSFORM_DEL(trans); } bool CollisionObject::IsActive::get() { return _native->isActive(); } bool CollisionObject::IsDisposed::get() { return _isDisposed; } bool CollisionObject::IsKinematicObject::get() { return _native->isKinematicObject(); } int CollisionObject::IslandTag::get() { return _native->getIslandTag(); } void CollisionObject::IslandTag::set(int tag) { _native->setIslandTag(tag); } bool CollisionObject::IsStaticObject::get() { return _native->isStaticObject(); } bool CollisionObject::IsStaticOrKinematicObject::get() { return _native->isStaticOrKinematicObject(); } bool CollisionObject::MergesSimulationIslands::get() { return _native->mergesSimulationIslands(); } btScalar CollisionObject::Restitution::get() { return _native->getRestitution(); } void CollisionObject::Restitution::set(btScalar rest) { _native->setRestitution(rest); } btScalar CollisionObject::RollingFriction::get() { return _native->getRollingFriction(); } void CollisionObject::RollingFriction::set(btScalar frict) { _native->setRollingFriction(frict); } int CollisionObject::UpdateRevisionInternal::get() { return _native->getUpdateRevisionInternal(); } int CollisionObject::UserIndex::get() { return _native->getUserIndex(); } void CollisionObject::UserIndex::set(int index) { _native->setUserIndex(index); } Object^ CollisionObject::UserObject::get() { return _userObject; } void CollisionObject::UserObject::set(Object^ value) { _userObject = value; } Matrix CollisionObject::WorldTransform::get() { return Math::BtTransformToMatrix(&_native->getWorldTransform()); } void CollisionObject::WorldTransform::set(Matrix worldTrans) { TRANSFORM_CONV(worldTrans); _native->setWorldTransform(TRANSFORM_USE(worldTrans)); TRANSFORM_DEL(worldTrans); } btCollisionObject* CollisionObject::UnmanagedPointer::get() { return _native; } void CollisionObject::UnmanagedPointer::set(btCollisionObject* value) { // Inheriting classes such as SoftBody may pass 0 and then do // additional processing before storing the native pointer. if (value == 0) { return; } _native = value; if (_native->getUserPointer() == 0) { GCHandle handle = GCHandle::Alloc(this, GCHandleType::Weak); void* obj = GCHandleToVoidPtr(handle); _native->setUserPointer(obj); } }
“South Florida by the numbers” is a web feature that catalogs the most notable, quirky and surprising real estate statistics. One state’s tax is another state’s treasure (or something like that). However the phrase goes, Florida certainly seems to be reaping the benefits of new laws that are driving companies and residents of New York, California, and other tax-heavy states to seek less costly pastures in the Sunshine State. According to data from the U.S. Census Bureau, Florida received more movers than any other state in 2018, with New York’s mansion tax and new caps on tax deductions mentioned as key drivers of this “tax-odus.” But is this trend the new normal, or just a momentary uptick? Let’s explore in this month’s “South Florida by the numbers.” 10.2 percent and 3.5 percent: Respective increases in Miami-Dade County detached home sales and condo sales in May 2019, according to the Miami Association of Realtors. The association credits Miami’s lifestyle, growing economy, new tax laws and low mortgage rates for fueling recent year-over-year increases. [Point2Homes] $235,197: Potential savings of New York residents earning $1 million by moving to Florida, according to Miami real estate developer Codina Partners in their “Unhappy New Yorkers” campaign. Income earners of $100,000 would save $24,649 by moving, and $200,000 earners would save $49,509, accordingly. [FloridaDaily] $10.5 Million: Additional cost for a one-floor, 6,234 square-foot, 87th story New York City condo, versus a three-floor, 11,031 square-foot South Beach penthouse with a 2,000-square-foot terrace and a private pool; illustrating the vast difference in “bang for the buck” enjoyed by Miami luxury homebuyers. [BusinessInsider] 3.9 percent: Cap of New York City’s updated and progressive “mansion tax,” which went into effect this month, and applies to purchases of homes valued at $25 million or more. (3.9 percent of $25 million is $975,000.) [FoxBusiness] $14,000: Factoring in just inflation and cost of living, (not taxes), the difference in “value” of hypothetical $100,000 annual salary in Miami versus Manhattan, according to this columnist. (Who also points out that private sector pensions and 401(k) plans are taxable in New York, adding thousands on top of those living costs.) [TheHill] This column is produced by the Master Brokers Forum, a network of South Florida’s elite real estate professionals where membership is by invitation only and based on outstanding production, as well as ethical and professional behavior.
// Copyright (C) 2019 Leo Balter. All rights reserved. // This code is governed by the BSD license found in the LICENSE file. /*--- description: > The Await capability does not propagate to the body of a function declaration info: | ModuleItem: StatementListItem[~Yield, +Await, ~Return] StatementListItem[Yield, Await, Return]: Statement[?Yield, ?Await, ?Return] Declaration[?Yield, ?Await] Declaration[Yield, Await]: HoistableDeclaration[?Yield, ?Await, ~Default] ClassDeclaration[?Yield, ?Await, ~Default] LexicalDeclaration[+In, ?Yield, ?Await] HoistableDeclaration[Yield, Await, Default]: FunctionDeclaration[?Yield, ?Await, ?Default] GeneratorDeclaration[?Yield, ?Await, ?Default] AsyncFunctionDeclaration[?Yield, ?Await, ?Default] AsyncGeneratorDeclaration[?Yield, ?Await, ?Default] FunctionDeclaration[Yield, Await, Default]: function BindingIdentifier[?Yield, ?Await] ( FormalParameters[~Yield, ~Await] ) { FunctionBody[~Yield, ~Await] } negative: phase: parse type: SyntaxError esid: prod-ModuleItem flags: [module] features: [top-level-await] ---*/ $DONOTEVALUATE(); function fn() { await 0; }
DEATH Mr. Alexander, Mail Carrier Chad Alexander, a mail carrier in Penn's Mail Service, was killed on November 10. He was 29 years old. Mr. Alexander came to the University in 1997 as a mail carrier for Financial Services and joined the Mail Service as a carrier in August of 1999. His Penn Mail manager Janet Wetherill remembered Mr. Alexander as a "very gentle man, really respected, giving and kind."
Q: Insert same values for multiple records based on list of ids I have a PostgreSQL database and want to insert the same value for multiple records based on record IDs I have. Is there a way to make a WHERE condition in the INSERT statement? For example: insert into Customers (new-customer) values ('t') where customer_id in (list) A: To insert a row for every id in your list, you can use unnest() to produce a set of rows: INSERT INTO customers(customer_id, column1) SELECT id, 't' FROM unnest ('{123,456,789}'::int[]) id; If you misspoke and actually meant to UPDATE existing rows: UPDATE customers SET column1 = 't' WHERE customer_id = ANY ('{123,456,789}'::int[]); A: Yes, you can do something like: INSERT INTO customers(customer_id, customer_name) select 13524, 'a customer name' where 13524 = ANY ('{13524,5578,79654,5920}'::BIGINT[]) Here, a customer with id: 13524 will be added because it's ID is in the list: {13524,5578,79654,5920} I hope that what you are looking for!
So a few weeks ago I finally had time to sit down and play Requiem. (Funny - you should have more free time in the summer, right?). Anyways, I didn´t know what to expect. I knew that there was going to focused on physics puzzles (which I enjoy to great degree). But I had also gotten the impression that many here didn´t like it... But I did enjoy Requiem a lot. I was a bit disappointed though, I had wanted to know a little more about the story than we did... I did really like the puzzles though, even though some of the jumping puzzles were frustrating in a bad way. The key collecting and the base annoncer woman breaking the 4th wall did not bother me. But now I´ll get to the point of this thread. When I played Requiem, I assumed that all of it was just Philip's dreams (hallucinations really) as he is descending into his own mad, little mind while his body is withering away from dehydration... But is that really what is happening? I have been thinking about this and come to a different conclusion. Have any of you played System Shock 2? Remember that early in the game, there is a cut-scene, where the villain tries to persuade you to join him. This cut-scene ends with the villain threatening the player: "...we will rend you apart and put you separate." What if the Tuurngait works the same way? What if the Tuurngait hive mind is compartmentalized and has a special quarantined place for those infected who cannot quite let go of their individuality? So basically Philip's mind is trapped with the other almost-infected minds somewhere inside the Tuurngait hivemind, but separate from the infected who joined the Tuurngait... Am I making any sense? Do I have something here or am I just over-analyzing? : No, I'm pretty sure that they are not. The outside radio-dish place felt like something that very well could had been in one of the games (alternate escape ending?) but I think that mapping didn't begin until they had a fairly certain idea of what they would have in the game and didn't have any excess maps after the were done with Black Plague. So I think Requiems mapping is done from scratch, especially since a few of the maps are pretty weird.
Structure--activity relationships of anesthetic ethers using molecular connectivity. The structure--activity relationships in the anesthetic and toxic actions of 28 aliphatic ethers were simple functions of molecular connectivity indexes. These quantitative relationships are discussed briefly in the light of theories of the mechanism of action of general anesthetics.
Your Fitness Goals Are Simply A Couple Of Tips Away Your Fitness Goals Are Simply A Couple Of Tips Away Are you trying to get fit without a good plan? Using the right ways to work out is just as important as avoiding the wrong ways to work out, so it's time to get educated about your body and how to get it into great shape. Here are some tips to help make your fitness journey easier and smarter. A great fitness tip for runners who experience sore calves would be to sleep on your belly and let your feet dangle off the bed. Over the course of the night, your calves will stretch out just from being in this position. Of course, stretching, warming up and cooling down are also going to assist you with this. Make sure you eat out less, this promotes a healthy body. Eating out at please click the following website while exercising essentially beats the purpose of getting fit. You want to make sure you fuel your body with the necessary nutrients it needs and it can use to get the most out of your workouts. Use the start of the fall TV season as a chance to get in shape. We tend to spend a lot of time in front of the TV, especially during the premiere season. Make a resolution to keep yourself active while watching TV. Lift weights, walk in place, or use an exercise bike while your show is on, during the commercial break drop and do 20 pushups or sit ups. When strength training, the rest you take between sets, will determine how your muscles will develop. If you are looking to build muscles and get bulky, your rest time between sets should be longer. If collagen powder bloating are looking to build endurance and get leaner, more sculpted muscles, then your rest time should be shorter. Learning to cook healthy meals is an under-appreciated but important part of any fitness routine. Foods that come from the grocery store prepared or pre-cooked are packed with unhealthy additives like sodium and artificial sweeteners. Learning how to fix tasty, healthy meals using fresh ingredients frees the fitness-minded chef from these nasty artificial ingredients. A great way to help you get fit is to active groups of people on craigslist. A lot of people post on craigslist looking for other people that want to go on hikes or play sports. It can be a great way to meet people and also get fit. Exercising with a friend or a group of friends is a great way to keep yourself motivated. Not only is it a lot of fun to work out or play sports with friends, a friendly rivalry will keep you on your toes and at the top of your game. Just make sure that the rivalry doesn't get in the way of your friendship. If you are going to the gym, try to strength-train with weights as much as possible. This is beneficial as it will help to reduce the amount of fat in your body and increase tone, helping to give you the shape you want. Do not strength-train too much, as this can strain muscles and set you back. Commit to your workout by starting early in the day. Some studies show that exercising in the morning will give you an increase in energy throughout the day. If you add a set of exercises to your morning routine, you may be more likely to do them on a regular basis. Walk to lunch. If you work in an office environment, try walking to lunch at a place at least five minutes away. That way, after you've eaten and returned to work, you will have also done a nice 10 minute walk which can be healthy for your state of mind and body as well. If you are trying to lose some of your gut, stick with aerobic exercise, not crunches or sit-ups. Crunches are not too helpful when it comes to losing that spare tire. In fact, studies have shown that to burn just one pound of fat with crunches, you'd need to do two-hundred and fifty thousand of them! If you did one hundred crunches daily, you'd have that pound burned in seven years. Look elsewhere to trim the fat. When beginning a fitness and nutrition program do not feel bad if you are nervous or even scared. Once you conquer the psychological battle you will find that there is a lot to learn about weight training, nutrition and cardiovascular exercise. You will learn and get more comfortable with the routine and make the progress that you are after. If you want to improve your putting, try to aim approximately 17 inches past the hole for straight-on putts. The 17-inch radius around the cup is less likely to have been trampled by feet. Therefore, there will be collagen side effects zetia in this area that make your putts slow down. I Drank Collagen For A Week & It Made Me Prettier The season of al fresco happy hours, drunk weeknights, and 2 am pizza runs just because it's too hot in your apartment to microwave some ramen. Unfortunately it's also the season of crop tops and bikinis. Dirty Lemon (we like it already) is hailed as the detox for people who hate detoxing (or, alternatively, for someone like me, the detox for people who consider whole wheat pizza pretty much a salad with mozzarella). I Drank Collagen For A Week & It Made Me Prettier Make sure to strengthen your core when you work out. It is beneficial for your entire body when you do this type of exercising. If you do sit ups, make sure you don't use machines where your feet are anchored as this can severely hurt your lower back. Instead, think about using a stability bar for your crunches. A great tip to help recover from a hard workout is to lightly work out the same muscles the following day with much lighter weights. Use about 20 percent of your normal weight and perform a couple of sets of 25 reps. This will supply more blood to your muscles which will help repair them faster. As you can see, fitness doesn't always have to be arduous. Using the advice in this article, exercising when you can makes a big difference to your health. Being fit can help prevent many chronic illnesses, so it's worth the effort.
Here's what you should know about futures and options: - Futures: A futures contract grants the buyer the right to buy a certain quantity of a commodity, and the seller to sell it at a specific price on a fixed date in future. Let’s say a farmer wants to sell his wheat crop. He would want protection against future price fluctuations. In that case, the person will take out a futures contract to sell the produce; say five quintals, at Rs 2,000 a quintal, on a certain date in future. So, the farmer will be able to sell wheat at Rs 2,000 a quintal, even if prices in the market drop to Rs 1,500! The downside is the chance of losses if rates rise to Rs 2,500. Futures are available for a wide range of assets – agricultural commodities, stocks, currency, minerals, petroleum etc. Options: An options contract gives the buyer the right to purchase a particular asset at a fixed price on a predetermined date. However, it does not leave the buyer with an obligation to do the same. As a result, the buyer has the choice of not exercising his right to buy if prices don’t move in the way anticipated. For example, if a wheat buyer enters into an options contract to purchase 10 quintals of wheat at Rs 2,000 on a specific date, and the price moves up to Rs 2,100 on that date, the person has the choice of not buying. The only charge the buyer must pay is the premium paid to the seller of the contract.
let previousPath; FlowRouter.triggers.exit([ ({ path }) => { previousPath = path; }, ]); FlowRouter.route('/', { name: 'home', triggersEnter: [AccountsTemplates.ensureSignedIn], action() { Session.set('currentBoard', null); Session.set('currentList', null); Session.set('currentCard', null); Filter.reset(); EscapeActions.executeAll(); Utils.manageCustomUI(); Utils.manageMatomo(); BlazeLayout.render('defaultLayout', { headerBar: 'boardListHeaderBar', content: 'boardList', }); }, }); FlowRouter.route('/public', { name: 'public', triggersEnter: [AccountsTemplates.ensureSignedIn], action() { Session.set('currentBoard', null); Session.set('currentList', null); Session.set('currentCard', null); Filter.reset(); EscapeActions.executeAll(); Utils.manageCustomUI(); Utils.manageMatomo(); BlazeLayout.render('defaultLayout', { headerBar: 'boardListHeaderBar', content: 'boardList', }); }, }); FlowRouter.route('/b/:id/:slug', { name: 'board', action(params) { const currentBoard = params.id; const previousBoard = Session.get('currentBoard'); Session.set('currentBoard', currentBoard); Session.set('currentCard', null); // If we close a card, we'll execute again this route action but we don't // want to excape every current actions (filters, etc.) if (previousBoard !== currentBoard) { Filter.reset(); EscapeActions.executeAll(); } else { EscapeActions.executeUpTo('popup-close'); } Utils.manageCustomUI(); Utils.manageMatomo(); BlazeLayout.render('defaultLayout', { headerBar: 'boardHeaderBar', content: 'board', }); }, }); FlowRouter.route('/b/:boardId/:slug/:cardId', { name: 'card', action(params) { EscapeActions.executeUpTo('inlinedForm'); Session.set('currentBoard', params.boardId); Session.set('currentCard', params.cardId); Utils.manageCustomUI(); Utils.manageMatomo(); BlazeLayout.render('defaultLayout', { headerBar: 'boardHeaderBar', content: 'board', }); }, }); FlowRouter.route('/shortcuts', { name: 'shortcuts', action() { const shortcutsTemplate = 'keyboardShortcuts'; EscapeActions.executeUpTo('popup-close'); if (previousPath) { Modal.open(shortcutsTemplate, { header: 'shortcutsModalTitle', onCloseGoTo: previousPath, }); } else { BlazeLayout.render('defaultLayout', { headerBar: 'shortcutsHeaderBar', content: shortcutsTemplate, }); } }, }); FlowRouter.route('/import/:source', { name: 'import', triggersEnter: [AccountsTemplates.ensureSignedIn], action(params) { if (Session.get('currentBoard')) { Session.set('fromBoard', Session.get('currentBoard')); } Session.set('currentBoard', null); Session.set('currentList', null); Session.set('currentCard', null); Session.set('importSource', params.source); Filter.reset(); EscapeActions.executeAll(); BlazeLayout.render('defaultLayout', { headerBar: 'importHeaderBar', content: 'import', }); }, }); FlowRouter.route('/setting', { name: 'setting', triggersEnter: [ AccountsTemplates.ensureSignedIn, () => { Session.set('currentBoard', null); Session.set('currentList', null); Session.set('currentCard', null); Filter.reset(); EscapeActions.executeAll(); }, ], action() { Utils.manageCustomUI(); BlazeLayout.render('defaultLayout', { headerBar: 'settingHeaderBar', content: 'setting', }); }, }); FlowRouter.route('/information', { name: 'information', triggersEnter: [ AccountsTemplates.ensureSignedIn, () => { Session.set('currentBoard', null); Session.set('currentList', null); Session.set('currentCard', null); Filter.reset(); EscapeActions.executeAll(); }, ], action() { BlazeLayout.render('defaultLayout', { headerBar: 'settingHeaderBar', content: 'information', }); }, }); FlowRouter.route('/people', { name: 'people', triggersEnter: [ AccountsTemplates.ensureSignedIn, () => { Session.set('currentBoard', null); Session.set('currentList', null); Session.set('currentCard', null); Filter.reset(); EscapeActions.executeAll(); }, ], action() { BlazeLayout.render('defaultLayout', { headerBar: 'settingHeaderBar', content: 'people', }); }, }); FlowRouter.notFound = { action() { BlazeLayout.render('defaultLayout', { content: 'notFound' }); }, }; // We maintain a list of redirections to ensure that we don't break old URLs // when we change our routing scheme. const redirections = { '/boards': '/', '/boards/:id/:slug': '/b/:id/:slug', '/boards/:id/:slug/:cardId': '/b/:id/:slug/:cardId', '/import': '/import/trello', }; _.each(redirections, (newPath, oldPath) => { FlowRouter.route(oldPath, { triggersEnter: [ (context, redirect) => { redirect(FlowRouter.path(newPath, context.params)); }, ], }); }); // As it is not possible to use template helpers in the page <head> we create a // reactive function whose role is to set any page-specific tag in the <head> // using the `kadira:dochead` package. Currently we only use it to display the // board title if we are in a board page (see #364) but we may want to support // some <meta> tags in the future. //const appTitle = Utils.manageCustomUI(); // XXX The `Meteor.startup` should not be necessary -- we don't need to wait for // the complete DOM to be ready to call `DocHead.setTitle`. But the problem is // that the global variable `Boards` is undefined when this file loads so we // wait a bit until hopefully all files are loaded. This will be fixed in a // clean way once Meteor will support ES6 modules -- hopefully in Meteor 1.3. //Meteor.isClient && Meteor.startup(() => { // Tracker.autorun(() => { // const currentBoard = Boards.findOne(Session.get('currentBoard')); // const titleStack = [appTitle]; // if (currentBoard) { // titleStack.push(currentBoard.title); // } // DocHead.setTitle(titleStack.reverse().join(' - ')); // }); //});
Q: How to make a picture and a table in the same page with the same height I'm writing a document and implementing a picture of device and it's technical data in a table in the same page. The problem which I have is that the page and the table are not in the same level which causes that title of picture is not at the same height This is the code: \begin{minipage}{0.5\textwidth} \begin{figure}[H] \centering \includegraphics[width=7cm, height=4cm]{gaszaehler} \caption{Q-loud EnrgyCam 2.0} \end{figure} \end{minipage} \begin{minipage}{0.5\textwidth} \begin{table}[H] \centering \scalebox{0.9}{ \begin{tabular}{ | l | c|} \hline Stromversorgung & DC 5 V $\geq100$ mA \\ \hline Betriebstemperatur & -10 ° - 50 °\\ \hline Schutzklasse & IP64 \\ \hline Bussystem & M-Bus \\ \hline Dimensionen & 42 x 42 mm (T x H) \\ \hline Sensoreinheit & Kamera Modul \\ \hline % & & & \\ \hline \end{tabular} } \caption{Technische Daten der Q-loud EnrgyCam 2.0 \cite{energycam_mbus} } \end{table} \end{minipage} could someone help me please to make them both in the same hight? A: OK, too long for a comment. \documentclass{article} \usepackage{amsmath,siunitx,graphicx,floatrow} % from https://tex.stackexchange.com/a/6869/121799 \newfloatcommand{capbtabbox}{table}[][\FBwidth] \begin{document} \newsavebox{\testbox}% \newlength{\testheight}% \savebox{\testbox}{% from https://tex.stackexchange.com/a/66429/121799 \begin{tabular}[b]{ | l | c|} \hline Stromversorgung & DC \si{5\volt} $\geq100\si{\milli\ampere}$ \\ \hline Betriebstemperatur & \si{-10\degree} --- \si{50\degree} \\ \hline Schutzklasse & IP64 \\ \hline Bussystem & M-Bus \\ \hline Dimensionen & 42 x 42 mm (T x H) \\ \hline Sensoreinheit & Kamera Modul \\ \hline % & & & \\ \hline \end{tabular} }% \settoheight{\testheight}{\usebox{\testbox}} \begin{figure} \begin{floatrow} \ffigbox{% \includegraphics[height=\testheight]{example-image-a}% }{% \caption{Q-loud EnrgyCam 2.0}% } \capbtabbox{% \usebox{\testbox} }{% \caption{Technische Daten der Q-loud EnrgyCam 2.0 \cite{energycam_mbus} }% } \end{floatrow} \end{figure} \end{document} I also used the opportunity to use siunitx to typeset the units.
The new licensed clubs are all meticulously detailed, including the authentic representation of names and numbers on their backs. You'll find the most famous players bear an astonishing resemblance to the real thing. Increased detail in all players has been transferred to the Player Design mode, which has been hugely expanded to include more factors determining skill and ability. Master League, in which you guide a lowly team to glory, now allows player-managers to monitor individual players and see when their health declines. In all games, weather conditions can be set to 'variable', leading to patchy rain or snow. The new weather conditions further enhance the realism and unpredictable nature of PES matches. Features:New licensed clubs from the major European leagues New trademark moves, such as Ronaldinho's 'flipflap' Variable, real-time weather conditions - eg 'patchy rain' Master League is much bigger, includes European teams Overall refined control for even more realistic gameplay
GNCPro: navigate human genes and relationships through net-walking. The use of computational applications in biological research is significantly lagging behind other scientific research areas such as physics, mathematics, and geology; more in silico tools are needed. The increasing complexity of biological data makes it more and more difficult for scientists to verify their hypotheses and results against existing discoveries. GNCPro is a free data integration and visualization tool for gaining comprehensive overviews of such complicated biological knowledge. In particular, GNCPro warehouses and encodes biological information as binary relationships. When represented graphically, these binary relationships take on the form of edges that connect the genes and proteins, which are represented by nodes. By using distinguishing features such as colors, shape, and opacity, GNCPro provides a stimulating visual experience in which the user can quickly identify groups of genes by annotations and the types of relationships involved. GNCPro integrates human gene expressions, regulations, gene product modifications, and interactions into one platform while delivering a simple and powerful user interface for systems biology study. http://GNCPro.sabiosciences.com.
Daniel Brata Daniel Brata (born 29 February 1984) is a Romanian judoka. Achievements References Category:1984 births Category:Living people Category:Romanian male judoka Category:Olympic judoka of Romania Category:Judoka at the 2008 Summer Olympics Category:Judoka at the 2012 Summer Olympics
We are proposing a broadly based approach to the problem of chromatin structure in Dictyostelium discoideum as it relates to biological function. Dictyostelium is an organism ideally suited for these studies since in growing cells 19 percent of the single copy genome is expressed as mRNA and 53 percent as nuclear Hn RNA. At one stage of differentiation there is the expression into mRNA and nuclear RNA of an additional 11 percent and 26 percent of the genome respectively. There are three main parts to the program of proposed research. Part I will include studies on the basic structure of chromatin from growing cells. The histone population will be characterized with particular attention to variant forms differing in primary base sequence or post translational modifications. The more prominant non-histone chromosomal protein associated with the various forms of mono and oligo nucleosomes will also be characterized. Endonucleases will be used to study both the nucleosomal repeat length for bulk chromatin and for individual genes of developmental interest as well as to identify sites of interaction between DNA and histones. In the second part we will use the simple, but well characterized pattern of developmental gene expression in Dictyostelium to correlate heterogeneity in chromatin structure with the biological function of the DNA. Both recombinant DNA and cDNA probes for genes expressed under developmental control or for DNA which is either transcribed throughout development or transcriptionally inert will be used to identify variant nucleosomal species which may show specific association with transcriptionally active, developmentally regulated, or inert DNA. In addition we will also look for developmentally specific changes in the histones, non-histone chromosomal proteins or other features of nucleosome structure. Use will also be made of DNAse I digestion as a probe of active gene structure to ask whether the co-ordinate expression of 25 to 30 percent of the genome late in development involves a structural transition of the corresponding chromatin segments. Finally, the higher order structure of chromatin associated with individual genes will be examined.
Renowned ScottsdalePlastic Surgeon DanielShapiro,MD, FACS Shapiro Aesthetic Plastic Surgery & Skin Klinic is the top destination for aesthetic care in the Phoenix Metropolitan area. The center delivers best in surgical and non-surgical services – all in one luxurious location. Whether you want to turn back the clock with one of the best plastic surgeons available, or be treated by one of our outstanding nurse injectors or aestheticians, you can rest assured that you’re in highly capable hands. We are committed to helping our Phoenix and Scottsdale plastic surgery clients achieve their cosmetic goals – and creating uniquely natural beauty for each and every one of them. Meet the man behind the practice. Dr. Daniel Shapiro is an award-winning, board-certified plastic surgeon with over 26 years of experience in his field. With impressive technical skill and a penchant for natural-looking results, he has become the go-to surgeon for discerning patients in Phoenix and throughout the country. “I know what’s possible when you’re completely happy with your appearance – and that’s the gift I strive to give to each and every one of my clients.” – Dr. Shapiro Known for his compassion and honesty, Dr. Shapiro believes in educating his patients so that they are empowered about their care. He personally guides his clients every step of the way – from the initial consultation to their post-operative care – to ensure that they feel safe and taken care of throughout their experience with our Scottsdale plastic surgery office. The journey starts here Life is a journey – and you deserve to enjoy every moment of it. Enhancing your looks with plastic surgery can be an incredibly empowering step towards living your best life, on your terms. Whether you want to stop the clock on facial aging, refine your physique, or rejuvenate your skin, make yourself a priority with our world-class Phoenix team and impressive suite of cosmetic services. Featured Procedures. Gallery The MayoClinic Dr. Shapiro is recognized as a leader in his field and one of the best plastic surgeons in the country. He is an instructor in plastic surgery for the Mayo Clinic College of Medicine and Science, and has been selected to be the Director of Aesthetic Surgical Training for the prestigious Mayo Clinic Rochester Plastic Surgery Residency Program. Through his work with this organization, he educates and empowers upcoming plastic surgeons to hone their surgical skills before becoming eligible to take the written test by the American Board of Plastic Surgery, allowing them to better serve their future clientele. Dr. Shapiro was recently awarded the John E. Woods Plastic Surgery Teaching Award for his influence and the impact he had on the resident’s during their rotation. As a plastic surgeon, I have just one priority: my clients. That focus guides everything I do. – Dr. Shapiro Face A beautifully natural look that’s all yours – and yours alone. Cosmetic procedures on the face and neck demand the highest level of precision and artistry. As such, you deserve the best facial plastic surgeon in Paradise Valley – one that is well-versed in the nuances of natural beauty, extensively trained in the latest surgical techniques, and committed to making your safety a top priority. As a leading facial plastic surgeon in Scottsdale, you can trust Dr. Shapiro to subtly shape your face in a way that smooths and reduces imperfections – while preserving the heart of what makes you, you. From facelifts to nose jobs and everything in between, Dr. Shapiro can make sure you’re putting your best face forward. Breast Find proportions that complement your entire body The breasts are a vital component of your femininity. If your chest is too small, too large, droopy, flat or otherwise misshapen, it can have a damaging effect on your self-esteem and overall body confidence. Fortunately, there are many procedures that can restore your perky and youthful chest. During your journey with our Paradise Valley plastic surgery office, Dr. Shapiro will first aim to understand you – your body goals, your lifestyle, and your personal preferences. From there, he will guide you in making surgical decisions that can reshape, resize and re-contour your breasts – ultimately resulting in the beautiful new chest you deserve. Body Slim, trim and sculpt your way to your ideal physique Exercising regularly and eating well can only accomplish so much. If you’re suffering from sagging skin, stubborn flab, and small pockets of persistent fat throughout the body, you may require a surgical procedure to achieve the smooth physique you want. Whether you need liposuction to target unwanted pockets of fat, a butt lift to restore a firm and perky behind, or a custom mommy makeover to reclaim your pre-baby figure, Dr. Shapiro’s impressive suite of body plastic surgery procedures in Phoenix can help you meet your goals. Face A beautifully natural look that’s all yours – and yours alone. Cosmetic procedures on the face and neck demand the highest level of precision and artistry. As such, you deserve the best facial plastic surgeon in Paradise Valley – one that is well-versed in the nuances of natural beauty, extensively trained in the latest surgical techniques, and committed to making your safety a top priority. As a leading facial plastic surgeon in Scottsdale, you can trust Dr. Shapiro to subtly shape your face in a way that smooths and reduces imperfections – while preserving the heart of what makes you, you. From facelifts to nose jobs and everything in between, Dr. Shapiro can make sure you’re putting your best face forward. The Paradise Valley Skin Klinic is Dr. Shapiro’s exclusive medical spa with a staff possessing over 95 years of combined experience. It offers the ideal destination for non-invasive treatments that enhance and rejuvenate the face and body – without surgery. Our Skin Klinic features the latest and most-effective non-surgical treatments that are designed to keep our Scottsdale clients looking and feeling their best – all under one roof. From BOTOX to dermal fillers, custom facials and non-surgical skin tightening and body contouring, you will find everything you need to care for your skin, revitalize your face, contour your body – and dramatically slow down the aging process. When you look your best, you feel your best – and that empowers you to lead your best life. – Dr. Shapiro Meet Dr. Daniel Shapiro A world-class plastic surgeon in a league of his own. Dr. Shapiro is an award-winning, board-certified plastic surgeon with over 26 years of experience in his field. With impressive technical skill and a talent for creating natural-looking results, his practice has become a leading destination for discerning patients throughout the country. Known for his compassion and honesty, Dr. Shapiro strives to educate his patients so that they are empowered about their care. He carefully explains the procedures, expected results, and techniques in a way that anyone can understand. Additionally, he personally guides his clients every step of the way – from the initial consultation to their post-operative care – to ensure an enjoyable experience and the best possible results.
Jeremy Corbyn has responded to claims that he and Arsenal player Hector Bellerin spoke Spanish together in order to shut Piers Morgan out of the conversation. Mr Morgan wrote in the Daily Mail that the two switched languages so he couldn't join in the chat. He said: "When I tried to interrupt [their conversation], the Labour leader - whose wife is Mexican - promptly switched to Spanish so I couldn't join in". While Mr Bellerin replied that the television presenter, who has been critical of Jeremy Corbyn, should "not take it personally", Mr Corbyn appeared to confirm he did indeed do this.
Malaysia Shows True Colours? When a group of non-governmental organizations and opposition political parties decided to rally in support of clean and fair elections they had also decided to exercise a basic right. Such marches are common in European and North American countries, Australia and New Zealand, all first world nations – a club that Malaysia has aspirations of joining by 2020. In Malaysia, however, the hue and cry along with the silly political brinkmanship that followed Bersih’s decision to stage the rally this Saturday, known as Bersih 2.0, was as revealing as it was hysterical. Supporters of the ruling Barisan Nasional (BN) coalition and the all-important United Malay National organization (UMNO) responded with childish indignation while their friends and thugs at Perkasa behaved as if their self-proclaimed racial superiority was under threat. BN, UMNO and Perkasa wanted to march as well, prompting warnings of blood in the streets and providing police with their excuse to halt proceedings before they even started. In the east Malaysian state of Sabah, they arrested people for wearing yellow shirts, synonymous with Bersih and with echoes of Thailand perhaps. It was the kind of police interference one would expect from Syria or Singapore. Another hundred or so people connected with Bersih have also been arrested, prompting intervention from the country’s monarch who obtained a promise from organizers to move the rally off the streets and into to a stadium so any potential trouble could be averted. It was an unwanted compromise because what happened next was predictable. Bersih, which means ‘clean’ in Malay, also agreed to postpone the rally until a suitable venue could be found. Then Prime Minister Najib Razak stepped in and suggested Merdeka Stadium could be used. Still the Bersih steering committee was suspicious. This was confirmed when management of the stadium said Merdeka, built for Malaysia’s declaration of independence in 1957, was closed for renovations and couldn’t be used. A similar incident occurred in Sabah, where organizers aborted their plans to hold a gathering in support of the nationwide Bersih campaign at the Foo Chow Hall in Kota Kinabalu. This followed cancellation of their bookings of the venue by the management of the hall. Their paid-up rent was refunded. In Kuala Lumpur, Bersih has had a last minute change of heart and now insists the rally will go ahead on Saturday, prompting warnings from police that more arrests should be expected. Indeed, the authorities have even gone so far as to ban 91 political leaders, including the opposition's chief Anwar Ibrahim, and organizers of Bersih from entering the centre Kuala Lumpur on Saturday. The depth of ill-feeling among ordinary Malaysians – regardless of ethnicity – towards the coalition, UMNO, government and opposition political parties will only become apparent once Najib calls his much touted early election. But Saturday could be an important pointer, and with all the unnecessary interfering of a street march by ordinary citizens and opposition parties demanding a clean election, those in power shouldn’t be surprised if that level of public mistrust is now much greater than they previously feared.
Q: Scale an image which is stored as a byte[] in Java I upload a file with a struts form. I have the image as a byte[] and I would like to scale it. FormFile file = (FormFile) dynaform.get("file"); byte[] fileData = file.getFileData(); fileData = scale(fileData,200,200); public byte[] scale(byte[] fileData, int width, int height) { // TODO } Anyone knows an easy function to do this? public byte[] scale(byte[] fileData, int width, int height) { ByteArrayInputStream in = new ByteArrayInputStream(fileData); try { BufferedImage img = ImageIO.read(in); if(height == 0) { height = (width * img.getHeight())/ img.getWidth(); } if(width == 0) { width = (height * img.getWidth())/ img.getHeight(); } Image scaledImage = img.getScaledInstance(width, height, Image.SCALE_SMOOTH); BufferedImage imageBuff = new BufferedImage(width, height, BufferedImage.TYPE_INT_RGB); imageBuff.getGraphics().drawImage(scaledImage, 0, 0, new Color(0,0,0), null); ByteArrayOutputStream buffer = new ByteArrayOutputStream(); ImageIO.write(imageBuff, "jpg", buffer); return buffer.toByteArray(); } catch (IOException e) { throw new ApplicationException("IOException in scale"); } } If you run out of Java Heap Space in tomcat as I did, increase the heap space which is used by tomcat. In case you use the tomcat plugin for Eclipse, next should apply: In Eclipse, choose Window > Preferences > Tomcat > JVM Settings Add the following to the JVM Parameters section -Xms256m -Xmx512m A: Depends on the data format. However, if you're using something like JPEG, GIF, PNG, or BMP you can use the ImageIO class. Something like: public byte[] scale(byte[] fileData, int width, int height) { ByteArrayInputStream in = new ByteArrayInputStream(fileData); try { BufferedImage img = ImageIO.read(in); if(height == 0) { height = (width * img.getHeight())/ img.getWidth(); } if(width == 0) { width = (height * img.getWidth())/ img.getHeight(); } Image scaledImage = img.getScaledInstance(width, height, Image.SCALE_SMOOTH); BufferedImage imageBuff = new BufferedImage(width, height, BufferedImage.TYPE_INT_RGB); imageBuff.getGraphics().drawImage(scaledImage, 0, 0, new Color(0,0,0), null); ByteArrayOutputStream buffer = new ByteArrayOutputStream(); ImageIO.write(imageBuff, "jpg", buffer); return buffer.toByteArray(); } catch (IOException e) { throw new ApplicationException("IOException in scale"); } }
Marion Township, Allen County, Indiana Marion Township is one of 20 townships in Allen County, Indiana, United States. As of the 2010 census, its population was 3,858. History In September, 1834, the Commissioners of Allen County created Root Township, which embraced all of present-day Marion Township, as well as a portion of present-day Adams County. Adams County was created on February 7, 1835, leaving only a portion of Root Township still in Allen County. In August, 1835, this remainder of Root Township was reorganized and renamed Marion Township. Geography According to the United States Census Bureau, Marion Township covers an area of ; of this, is land and , or 0.66 percent, is water. Unincorporated towns Hessen Cassel at Middletown at Poe at Soest at 40.996157°N 85.037435°W (This list is based in part on USGS data and may include former settlements.) Adjacent townships Adams Township (north) Jefferson Township (northeast) Madison Township (east) Root Township, Adams County (southeast) Preble Township, Adams County (south) Jefferson Township, Wells County (southwest) Pleasant Township (west) Wayne Township (northwest) Cemeteries The township contains the following cemeteries: Antioch Lutheran, Bethel Baptist (defunct), Coleman family (defunct), Emmanuel Lutheran, Hall (disappeared), Morton family (defunct), Poe/Williamsport, St. John's Lutheran (defunct), St. Joseph Hessen Cassel Roman Catholic, St. Paul's Lutheran (defunct), and Thompson family (defunct). Major highways Rivers St. Marys River School districts East Allen County Schools Political districts Indiana's 6th congressional district State House District 79 State Senate District 19 References United States Census Bureau 2008 TIGER/Line Shapefiles United States Board on Geographic Names (GNIS) IndianaMap External links Indiana Township Association United Township Association of Indiana Category:Townships in Allen County, Indiana Category:Fort Wayne, IN Metropolitan Statistical Area Category:Townships in Indiana
In my critical thinking courses, I spend two weeks each term on how language affects thinking. I go over well-worn expressions such as collateral damage to refer to innocent civilians killed in military attacks. And I go over a few of the latest doublespeak gems such as extraordinary rendition for outsourcing torture and intensive interrogationfor such practices as "water-boarding" (the captive is bound and immersed in water until he nearly drowns). But using euphemisms or jargon to try to hide ugly realities is only one aspect of the attempt to control thought through the careful selection of words. Those who have followed the culture wars in the U. S. between the anti-abortionists who desire to restrict freedom and the pro-choice defenders of freedom (or between the anti-scientific creationists and the pro-science evolutionists) know that how the issue is framed is of utmost importance. The framing issue has been popularized by George Lakoff, a professor of cognitive sciences at the University of California at Berkeley, in his book Don't Think of an Elephant. For those of us who were in college in the 1960s when liberal was a word packed with positive emotive content and conservative was something to be avoided, Lakoff's explanation of how the conservatives pulled one of the major flip-flops in word history is like a solar flare in a world full of dark matter. I don't need to retell the story here. Lakoff's book is very short and repetitious, and not difficult to understand. But one point he makes is relevant to the attack on science that has been going on ever since Darwin published The Origin of Species in 1859: The creationists have controlled the public debate by controlling the way the issues are framed. For example, despite the fact that 99.9999% of the scientific community considers evolution of species from other species to be a fact, the creationists have been very successful in getting the public to accept the notion that evolution is not a fact but just a theory. Two recent articles address this issue: David Morrison's "Only a Theory? Framing the Evolution/Creation Issue" and Lawrence Krauss's "Mind your language." Krauss, a professor of physics, argues in the December 3, 2005, issue of New Scientist that misusing the word theory plays into the hands of creationists. Morrison, an astrobiologist, argues in the November/December 2005 issue of Skeptical Inquirer that to debate "the theory of evolution" is a trap that benefits creationists. Similar quibbles have arisen regarding the word believe. Eugenie Scott has argued, according to Krauss, that we shouldn't use the word 'believe' in a scientific context because "it blurs the distinction between science and religion." Also, parapsychologist Dean Radin chafes at the word belief when applied to his beliefs about the reality of psi. To him, having overwhelming evidence for a position means you don't have to say you believe. Faith requires belief, parapsychology doesn't. It does seem awkward to speak of believing in electricity or believing in gravity-especially when one considers that people talk about believing that God is three persons in one being or of believing that Mary was a virgin and the mother of God. The word 'belief' is quite elastic and covers a vast range of options. Unfortunately, so does the word 'theory'. Krauss doesn't think string theory should be called a theory but a model or a paradigm, even though he admits that "the string enterprise has produced a very impressive body of theoretical work." Krauss would like us to restrict our use of 'theory' in science to what is "a logically coherent and predictive system that has been tested against experiment or observation. It explains observable phenomena and makes falsifiable predictions about them." Krauss also thinks it's "incorrect" to refer to inflationary theory in cosmology. We should speak of the inflationary paradigm when we "describe the hypothesized growth of the universe soon after it began." Krauss writes: Maintaining this semantic distinction is not merely contentious nitpicking. A key part of the argument made by those who wish to introduce religion into science classes is that evolution is "just a theory". By "theory" these individuals are referring to the common lay usage of the word, meaning a hunch or a guess, and not the more restrictive sense in which the term is normally discussed in science....When debating the nature of science with advocates of intelligent design, I am frequently confronted with the claim that string theory is no more scientific than intelligent design. It's probably a mistake to get involved in this debate, but the mistake, in my opinion, is not with using the word 'theory' to refer to different kinds of things. The problem is one of framing. Evolution should be talked about as a fact and natural selection as a well-supported theory that explains, in part, how species evolved. Intelligent design is not a fact but a claim that some parts of evolution can't be explained by natural selection or any other scientific theory but can be explained by appealing to direct magical intervention by an intelligent agent or agents. The parts of evolution that can be explained by natural selection can also be explained by appealing to direct magical intervention of intelligent agents, of course. To do so, however, is to give up science and engage in metaphysics. To turn to metaphysical explanations instead of continuing to pursue a scientific explanation for some natural phenomenon is anti-scientific. A scientist doesn't give up when he or she comes to a tough problem. Giving up science is exactly what ID proposes. Whatever else one might want to say about string theory or inflationary theory, they are not anti-scientific. Neither abandons science by appealing to some otherworldly magic to explain away a tough problem. David Morrison, on the other hand, thinks it is a mistake to talk about the theory of evolution. It's the wrong word, he says, not because it's the wrong word but because three quarters of Americans think that a theory is something vague and uncertain that hasn't been proven scientifically. Calling something a theory undermines its acceptance, says Morrison, because most Americans don't think of a scientific theory as "a systematic set of principles that has been shown to fit the facts, and has stood up against attempts to prove it false." Most Americans think a theory is just a belief, something accepted without proof, "an assumption, a suggestion, a hypothesis." To Morrison, debating the theory of evolution with creationists "is a trap. It is letting our opponents frame the discussion to their benefit." Morrison also advises not debating evolution in a religious context. However, since the only ones who want to debate evolution are religiously motivated and identify evolution with godless materialism, that may not be possible. I find it interesting that Morrison thinks that since there is overwhelming scientific support for evolution, the failure to convince the majority of the public to accept evolution means that "we must be doing something wrong in discussing this issue with the public." Maybe we are, but we must also be doing something wrong in educating people if, after twelve years of compulsory education, fewer than half the population accepts evolution. In fact, most of Morrison's suggestions center around educational proposals, not just for the classroom but for the public forum as well. We should be promoting science not attacking religion, emphasizing the role evolution plays in such things as developing new medicines and reminding people of the shared interests of the various sciences in such things as deep time. Morrison writes that "perhaps we should note that Darwinian natural selection is in many ways nature's equivalent to free-market competition." In my view, it is very unlikely that there is anything scientists can do to sugarcoat evolution so that those who see it as denying their religious views will be attracted to it. We need to do a better job of educating our children about evolution (and other subjects that deal with deep time, such as geology). The ID movement wants to prevent us from doing that. I think we have to see the ID folks for what they are: terrorists who are trying to blow up our science classes in the name of religion. They use every rhetorical trick in the book. What are you afraid of? What are you hiding? It's only fair to present both sides and let the children choose. Evolution is a theory in crisis. Many scientists think evolution has too many gaps to be true. Yada, yada, yada. This is a war that has to be fought on two fronts. One is through education, doing whatever we can to promote science and a better understanding of evolutionary biology and related sciences. The other is through exposing ID for the anti-scientific movement that it is. In the meantime, I'm going to continue to refer to the theory of natural selection and to the anti-scientific idea of intelligent design. That's how I choose to frame the issues, but being one person I don't expect that I'll have much impact. If skeptics want to win this war, we might do well to imitate what the Republican conservatives did in the 1960s. They set up think tanks to attract conservative scholars whom they funded and encouraged. They didn't set up institutes to be run by the old guard. They funded scholarships to encourage conservative thinking and scholarship. They spent a lot of time on the issue of framing, by the way. If I were in charge of the future of skepticism, I'd be promoting skepticism among the next generation of journalists. I'd be funding dozens of shows like Nova, Scientific American Frontiers, Is it Real?, and Naked Science. I'd be offering scholarships and cash prizes to students and journalists who do research exposing fraud or identifying the harm done by superstition and irrational thinking. I'd be giving awards to those who do the most for uplifting the level of discourse and understanding regarding scientific matters. I would pay people to write pro-science stories for the mainstream press. I would hire writers to hound the media about their duty to educate people about the wonders of science and the dangers of magical thinking. I'd get Bill Gates to give me a billion dollars so I could hire David Morrison to find me a few dozen scientists willing to lecture to the public on such things as how evolution works in medicine and other fields where there are job openings. I might even encourage everybody working for skepticism to repeatedly juxtapose words like science and magical. I'd also encourage reference to the science-stifling idea known as ID, anti-science ideas such as ID, and ideas that discourage deep inquiry and scientific investigation such as ID. It only took the Republicans about thirty years to turn liberal into a dirty word. At the rate we're going, skeptics ought to be able to turn evolution into a positive mantra by the end of the next millennium. We may not know much but we know somebody's deceiving himself when he claims anyone can walk on water if only "you believe it with every fiber of your being." When he claims, as Masuru Emoto does, that thoughts can change the structure of water and he has the pictures to prove it, we know his faith is such that he should be able to walk on water. Yet, we don't wait to see him perform the stunt; we wait to hear the sound of one man splashing. David Horne writes: About a year ago, I saw the movie What the bleep do we know? in which the properties of "blessed water" were discussed. According to the movie, there is a museum somewhere in the U.S. or Canada that has an exhibit showing water before and after it has been blessed. Two pictures were shown, one before the blessing and one after. The picture of the water before the blessing revealed nothing special, while the picture of the water after blessing revealed a crystalline structure similar to that of a snowflake. I could not believe this was true when I saw it, and I still don't believe it. But there the photos were, right in front of me. My question is, why would the director of any legitimate museum buy into or go along with this story, and, assuming that it really is just a hoax, what do you suppose is the true story or motive behind it? I don't know what the true story behind this hoax is but one unlikely scenario would be that the photo of the unblessed water was taken at room temperature and the photo of the blessed water was taken after the temperature had dipped below the freezing point. Another unlikely scenario would be that the photo of the blessed water was taken after the water had been exposed to an electric field (See "As hot as ice," by Zeeya Merali, New Scientist 24/31 December 2005). The most plausible scenario is that one photo is of water at room temperature and the other is a photo of a snowflake. The only reputable museum that would show such an exhibit is the Museum of Hoaxes. Faking photographs has been going on since the beginning of photography. "Spirit" photos appeared as early as 1856. Some photo hoaxes by kids have duped grownups who should have known better. But many grownups won't give up the magical thinking of their childhood. What motivates people to believe that words or thoughts can change the molecular structure of water or that if only they have enough faith they can walk on water? Why do some people believe in transubstantiation, in the power of holy water to heal, or in other mysteries? Why do some people spend their entire lives searching for things that others believe don't even exist? Why do some people claim to have the answers to these questions and that they'll gladly share them with you for a small fee? Why does a man who lost both arms in a fire thank God for miraculously saving his life but doesn't blame God for the loss of his arms? How can people who have survived a plane crash in which hundreds of others have died say with a straight face that God blessed them but did not curse those who perished? I say blame it on the brain. We're not truth-seeking creatures by nature. Our beliefs have many functions, but being accurate is not high on the list of requirements for a functional belief. Neal Armstrong walked on the moon but some people on this planet believe that the moon landings were faked. A few folks believe that schools are encouraging critical thinking by teaching students to quit thinking when ideas conflict with their interpretation of a passage in a book they hold sacred. A young Mormon girl drives for ten hours to be home with her family for Christmas and dies in a car wreck ten minutes from home; her father tells a reporter that he believes she must have sensed she was going to die and that's why she drove home. Some scientists think that God likes to play "catch me if you can" or "hide and seek." That's why He puts coded messages in the Bible, DNA, bacterial flagellum, galaxies, or mathematical constants. Why is magical thinking so popular? You might find an answer by studying the perceptual and cognitive biases Ivan Kelly and Geoffrey Dean call the hidden persuaders. For a more in-depth understanding of these biases, I recommend four books: Scott Kennedy is a Kevin Trudeau clone, selling a supplement made of seaweed and other sea plants. His base is the infomercial, where he hawks his product under the name of Sea Vegg. This powerful stuff, he says, "contains a full spectrum of organic (photo-synthetic) vitamins, trace minerals, lipids, plant sterols, amino acids, omega 3's and 6's, anti-oxidants, growth hormones, polyphenols, flavenoids, and much more. It also contains powerful Fucoidan, Laminarin and Alginate compounds which studies suggest are anti-biotic and anti-viral." It is a well known fact that vegan fish are the healthiest animals on earth. You never hear them cough or complain of constipation or a runny nose. Kennedy suggests that his supplements can remove toxins from the body. He fails to mention these toxins by name, however. Nor does he explain that the body has its own ways of removing toxins, if need be. In any case, he is very careful not to make any specific claims for his product's power to remove toxins. He says he's "found pretty extensive evidence that Sea [sic] vegetation contains compounds which bind with and remove toxins from the tissues of animals and humans." He calls sea vegetation "the keystone of the food chain," which is true if we're talking about fish. Not that there is anything essentially bad about seaweed or other sea plants. But to claim that we can't get the nutrients we need from food grown on land so "we must turn to the rich vegetation of the sea" to get necessary nutrients is a fathomable fable. Kennedy suggests in his infomercials that Sea Vegg will reduce sickness, decrease our dependency on physicians and pharmaceuticals; decrease diseases such as cancer, diabetes, and heart disease; and reduce a contributing factor to much illness: obesity. He runs through a litany of bad habits that many people have, all irrelevant to taking his supplements. Who falls for this kind of appeal? Probably those who fall for Trudeau's appeal: those who think there is a cabal of physicians, pharmaceutical firms, and government agencies whose goal is to keep us unhealthy by hiding from us such vital information as that we should eat less and exercise more if we want to lose weight. Or perhaps these are the folks who think there is some magic pill we can take that is (a) "natural" and (b) will allow us to continue with our bad habits but (c) will make us healthy and help us live longer without drugs or surgery. Here's a beautiful quote from one of those selling Kennedy's product: One of the Earth's greatest treasures lies beneath the seas and lakes of the world. Research has proven that the waters of our oceans contain some of the richest known sources of mineral elements. The moving forces of nature, through rain, erosion and rivers, has brought all the valuable vitamins of the earth to the sea floor. (Coral-Cure.com) Those processes have brought a lot of other yummy things to the sea floor, but I'd probably be wasting my breath to mention them.
Q: Prove the set $K = \{0\} \cup \{\frac{1}{n} \in \mathbb{R} : n \in \mathbb{N} \}$ is compact without Heine-Borel Prove the set $K = \{0\} \cup \{\frac{1}{n} \in \mathbb{R} : n \in \mathbb{N} \}$ is compact without Heine-Borel I have completed the question and used the same procedure that was done in this version: Prove the set $K = \{\frac{1}{n} \mid n\in \mathbb{N}\}\cup \{0\}$ is compact. . My question though is why this proof is valid? If we are showing the set is compact it means that there must exist a finite sub-cover for all open covers. Is the all condition captured by generalizing $U$ to represent any open cover thus meaning all open covers? A: Note the beginning of the proof: Let $\mathcal{G} = \{G_\alpha \mid \alpha \in A\}$ be any open cover for $K$ (emphasis mine). Since $\mathcal{G}$ is a completely arbitrary open cover, anything we can prove about $\mathcal{G}$ must in fact be true of every open cover. This is something we do all the time. E.g. to prove the infinitude of primes: Let $n$ be any natural number. Let $\{p_1, p_2,..., p_k\}$ be the set of all prime numebrs $<n$. It's easy to check that $p_1\cdot p_2\cdot ...\cdot p_k+1$ is not divisible by any $p_i$ ($i<k$), and hence must be divisible by some prime $>n$. This means for every natural number, there is a larger prime number. I suspect in the current situation it seems more complicated since the subject matter is more abstract, but it's exactly the same underlying logic. A: The trick is one of the open sets in any cover must contain the $0$. No matter what the open cover is or which open set contains $0$, there is at least one set in the cover, it contains $0$ and it is open. And because that set is open and contains $0$ it must have an open ball around $0$ entirely contained in the set. And, here is the trick, no matter how small that open ball is, say it is $\epsilon > 0$ in radius, it contains an infinite number of $\frac 1n < \epsilon$ in that ball and in that one set. In fact, there are only a finite number of $\frac 1k$ that set does not contain. So we have one open set containing $0$ and an infinite number of $\frac 1n$ and we only need some of the other open sets to contain a finite number of the $\frac 1k$ that aren't already contained in our one open set so far. For each $\frac 1k$ not contained, that $\frac 1k$ must be contained in one of the other open sets. We take just that one. We do it for each of the $\frac 1k$ and take a finite number of open sets. And that's it, we're done. That's a finite subcover. And it doesn't matter what the actual open cover originally was. We were able to pick a finite subcover from it. Recap: Pick a set with $0$. There always will be one. That set will no matter what, one way or another contain all but a finite number of $\frac 1n$. For the finite $\frac 1k$ not in the set, pick one open set one at a time till done. This can always be done. ==== "If we are showing the set is compact it means that there must exist a finite sub-cover for all open covers." On third reading: No.. there is not a subcover that works for all possible covers. BUT every open cover will have a finite subcover of it. For example: $U = \{ (-1,2)\}: K \subset \cup_{O\in U} = (-1,2)$ has a finite subcover. Itself. But $V = \{(-.001, .001)\}\cup (\cup_{n\in\mathbb N; n>1}\{(\frac 1{n+1},\frac 1{n-1})\}\cup \{(.99, 1.1)\}$ will have the finite subcover: $\{(-.001, .001), (\frac 1{1001}, \frac 1{999}), (\frac 1{1000}, \frac 1{998}),....., (\frac 13,1), (\frac .99, 1.1)\}$ And $W = \{(-\infty, {10^{-100}})\}\cup_{k=0...\infty}(10^{-k-1}, 10^{-k+1})$ will have the finite subcover: $\{(-\infty, \frac {10^{-100}}), (10^{-101},10^{-99}), (10^{-100}, 10^{98}), ....,(\frac 1{100},1), (\frac 1{10}, 10)\}$. There isn't one finite subcover for all open covers. But for every open cover there is a finite subcover for it.
Why Women Get Paid Less I know we touched on this last month when we talked about a survey that found women are becoming more and more financially savvy and as a result are investing more to meet their goals. But today, I want to delve deeper into the “pay gap”—why it’s still there and what it means for our economy. What is the current gender pay gap? On average, women in the United States today are paid 77 cents for every dollar paid to men. That’s staggering and a number that has barely budged in over a decade. Why are women still making less than men? There are a few reasons. First, there’s the issue of less women at the top earning high-paying salaries. This ties into the “drop-out story” of women leaving the workplace to raise children. Second, women struggle with salary negotiations—partly out of fear of being negatively labeled. If a woman advocates for more money, she is seen as overly aggressive and self-centered, while a man is seen as going after what he wants. Third, there is the theory that women consistently undervalue themselves economically. Sheryl Sandberg mentions this in her book “Lean In.” Time and again, women look for opportunity advancements rather than financial compensation when moving up the corporate ladder. Sheryl also points out that women are often less liked as they climb the ladder than men. Because people are promoted based on not only competence, but also likeability, this can put women at a distinct disadvantage. You mentioned the “drop out” factor due to motherhood. Can the pay gap be attributed to that, or are women choosing less lucrative careers? It’s not about motherhood, and I can prove it. Say we take motherhood out of the equation entirely: Studies show that after graduating from college with the exact same degree as a man, women tend to start out at lower salaries and that gap never closes as they progress throughout their career. According to a report by the American Association of University Women, a woman who graduates from the same school, in the same major as her male classmate, taking a full-time job in the same occupation as he does, earns 77 percent of what her male counterpart does. So what’s a lady to do? Are there tactics that work better than others when it comes negotiating a fair salary? Absolutely! First, women can ask their employers the simple, direct question: “Am I paid the same as men in my role? Second, women need to understand their worth in the workplace. There is an interesting study headed by Adam Grant, author of “Give and Take,” that analyses the behaviors of men and women when negotiating salaries. The findings are very interesting: When women negotiate for themselves, they negotiate for less money than men—3 percent less. However, when women play the role of a mentor negotiating on behalf of another employee, their negotiations are right in line with men. This plays to the idea that women don’t quite understand their own worth. While men often march right into their boss’s office for a raise (and think they deserve it), women will tie a salary increase to “fairness” before their own merit. Women must understand they deserve the same amount as a man, not just because it’s “fair,” but because they deserve it. You said something earlier about this issue’s effect on the economy. What is the economic impact of women making equal pay to men? It’s funny, I spoke to Sheryl Sandberg recently and she said everywhere she goes, people tell her that her book is costing them so much money—because women are asserting their right to be paid the same as their male counterparts. But really the opposite is true: Paying women more would benefit us all. If the gap were to close and women were to be paid that 33 cent difference, economists estimate that the stimulus effect would grow the U.S. economy by at least three to four percentage points. In contrast, the $800 billion economic stimulus package that Congress passed in 2009 to bail banks out of the recession is estimated to have grown the GDP by less than 1.5 percent overall—less than half the estimated benefit of closing the pay gap.
// license:BSD-3-Clause // copyright-holders:Frank Palazzolo, Aaron Giles, Jonathan Gevaryahu, Raphael Nabet, Couriersud, Michael Zapf /********************************************************************************************** TMS5200/5220 simulator Written for MAME by Frank Palazzolo With help from Neill Corlett Additional tweaking by Aaron Giles TMS6100 Speech Rom support added by Raphael Nabet PRNG code by Jarek Burczynski backported from tms5110.c by Lord Nightmare Chirp/excitation table fixes by Lord Nightmare Various fixes by Lord Nightmare Modularization by Lord Nightmare Sub-interpolation-cycle parameter updating added by Lord Nightmare Preliminary MASSIVE merge of tms5110 and tms5220 cores by Lord Nightmare Lattice Filter, Multiplier, and clipping redone by Lord Nightmare TMS5220C multi-rate feature added by Lord Nightmare Massive rewrite and reorganization by Lord Nightmare Additional IP, PC, subcycle timing rewrite by Lord Nightmare Updated based on the chip decaps done by digshadow Much information regarding the lpc encoding used here comes from US patent 4,209,844 US patent 4,331,836 describes the complete 51xx chip US patent 4,335,277 describes the complete 52xx chip Special Thanks to Larry Brantingham for answering questions regarding the chip details TMS5200/TMS5220/TMS5220C/CD2501E/CD2501ECD/EFO90503: +-----------------+ D7(d0) | 1 28 | /RS ADD1 | 2 27 | /WS ROMCLK | 3 26 | D6(d1) VDD(-5) | 4 25 | ADD2 VSS(+5) | 5 24 | D5(d2) OSC | 6 23 | ADD4 T11 | 7 22 | D4(d3) SPKR | 8 21 | ADD8/DATA I/O | 9 20 | TEST PROMOUT | 10 19 | D3(d4) VREF(GND)| 11 18 | /READY D2(d5) | 12 17 | /INT D1(d6) | 13 16 | M1 D0(d7) | 14 15 | M0 +-----------------+ Note the standard naming for d* data bits with 7 as MSB and 0 as LSB is in lowercase. TI's naming has D7 as LSB and D0 as MSB and is in uppercase TMS5100: +-----------------+ TST | 1 28 | CS PDC | 2 27 | CTL8 ROM CK | 3 26 | ADD8 CPU CK | 4 25 | CTL1 VDD | 5 24 | ADD1 CR OSC | 6 23 | CTL2 RC OSC | 7 22 | ADD2 T11 | 8 21 | ADD4 NC | 9 20 | CTL4 I/O | 10 19 | M1 SPK1 | 11 18 | NC SPK2 | 12 17 | NC PROM OUT | 13 16 | NC VSS | 14 15 | M0 +-----------------+ T11: Sync for serial data out M58817 The following connections could be derived from radar scope schematics. The M58817 is not 100% pin compatible to the 5100, but really close. +-----------------+ (NC) | 1 28 | CS PDC | 2 27 | CTL8 ROM CK | 3 26 | ADD8 (to 58819) (NC) | 4 25 | CTL1 (VDD,-5) | 5 24 | ADD1 (to 58819) (GND) | 6 23 | CTL2 Xin | 7 22 | ADD2 (to 58819) Xout | 8 21 | ADD4 (to 58819) (NC) | 9 20 | CTL4 (VDD,-5) | 10 19 | Status back to CPU (NC) | 11 18 | C1 (to 58819) SPKR | 12 17 | (NC) SPKR | 13 16 | C0 (to 58819) (NC) | 14 15 | (5V) +-----------------+ TODO: 5110: * implement CS * TMS5110_CMD_TEST_TALK is only partially implemented 5220: * Samples repeat over and over in the 'eprom' test mode. Needs investigation. * Implement a ready callback for pc interfaces - this will be quite a challenge since for it to be really accurate the whole emulation has to run in sync (lots of timers) with the cpu cores. * If a command is still executing, /READY will be kept high until the command has finished if the next command is written. * tomcat has a 5220 which is not hooked up at all Pedantic detail from observation of real chip: The 5200 and 5220 chips outputs the following coefficients over PROMOUT while 'idle' and not speaking, in this order: e[0 or f] p[0] k1[0] k2[0] k3[0] k4[0] k5[f] k6[f] k7[f] k8[7] k9[7] k10[7] Patent notes (important timing info for interpolation): * TCycle ranges from 1 to 20, is clocked based on the clock input or RC clock to the chip / 4. This emulation core completely ignores TCycle, as it isn't very relevant. Every full TCycle count (i.e. overflow from 20 to 1), Subcycle is incremented. * Subcycle ranges from 0 to 2, reload is 0 in SPKSLOW mode, 1 normally, and corresponds to whether an interpolation value is being calculated (0 or 1) or being written to ram (2). 0 and 1 correspond to 'A' cycles on the patent, while 2 corresponds to 'B' cycles. Every Subcycle full count (i.e. overflow from 2 to (0 or 1)), PC is incremented. (NOTE: if PC=12, overflow happens on the 1->2 transition, not 2->0; PC=12 has no B cycle.) * PC ranges from 0 to 12, and corresponds to the parameter being interpolated or otherwise read from rom using PROMOUT. The order is: 0 = Energy 1 = Pitch 2 = K1 3 = K2 ... 11 = K10 12 = nothing Every PC full count (i.e. overflow from 12 to 0), IP (aka "Interpolation Period") is incremented. * IP (aka "Interpolation Period") ranges from 0 to 7, and corresponds with the amount of rightshift that the difference between current and target for a given parameter will have applied to it, before being added to the current parameter. Note that when interpolation is inhibited, only IP=0 will cause any change to the current values of the coefficients. The order is, after new frame parse (last ip was 0 before parse): 1 = >>3 (/8) 2 = >>3 (/8) 3 = >>3 (/8) 4 = >>2 (/4) 5 = >>2 (/4) 6 = >>1 (/2) (NOTE: the patent has an error regarding this value on one table implying it should be /4, but circuit simulation of parts of the patent shows that the /2 value is correct.) 7 = >>1 (/2) 0 = >>0 (/1, forcing current values to equal target values) Every IP full count, a new frame is parsed, but ONLY on the 0->* transition. NOTE: on TMS5220C ONLY, the datasheet IMPLIES the following: Upon new frame parse (end of IP=0), the IP is forced to a value depending on the TMS5220C-specific rate setting. For rate settings 0, 1, 2, 3, it will be forced to 1, 3, 5 or 7 respectively. On non-TMS5220 chips, it counts as expected (IP=1 follows IP=0) always. This means, the tms5220c with rates set to n counts IP as follows: (new frame parse is indicated with a #) Rate IP Count 00 7 0#1 2 3 4 5 6 7 0#1 2 3 4 5 6 7 <- non-tms5220c chips always follow this pattern 01 7 0#3 4 5 6 7 0#3 4 5 6 7 0#3 4 5 10 7 0#5 6 7 0#5 6 7 0#5 6 7 0#5 6 7 11 7 0#7 0#7 0#7 0#7 0#7 0#7 0#7 0#7 Based on the behavior tested on the CD2501ECD this is assumed to be the same for that chip as well. Most of the following is based on figure 8c of 4,331,836, which is the TMS5100/TMC0280 patent, but the same information applies to the TMS52xx as well. OLDP is a status flag which controls whether unvoiced or voiced excitation is being generated. It is latched from "P=0" at IP=7 PC=12 T=16. (This means that, during normal operation, between IP=7 PC=12 T16 and IP=0 PC=1 T17, OLDP and P=0 are the same) "P=0" is a status flag which is set if the index value for pitch for the new frame being parsed (which will become the new target frame) is zero. It is used for determining whether interpolation of the next frame is inhibited or not. It is updated at IP=0 PC=1 T17. See next section. OLDE is a status flag which is only used for determining whether interpolation is inhibited or not. It is latched from "E=0" at IP=7 PC=12 T=16. (This means that, during normal operation, between IP=7 PC=12 T16 and IP=0 PC=0 T17, OLDE and E=0 are the same) "E=0" is a status flag which is set if the index value for energy for the new frame being parsed (which will become the new target frame) is zero. It is used for determining whether interpolation of the next frame is inhibited or not. It is updated at IP=0 PC=0 T17. See next section. Interpolation is inhibited (i.e. interpolation at IP frames will not happen except for IP=0) under the following circumstances: "P=0" != "OLDP" ("P=0" = 1, and OLDP = 0; OR "P=0" = 0, and OLDP = 1) This means the new frame is unvoiced and the old one was voiced, or vice versa. * TODO the 5100 and 5200 patents are inconsistent about the above. Trace the decaps! "OLDE" = 1 and "E=0" = 0 This means the new frame is not silent, and the old frame was silent. ****Documentation of chip commands:*** 76543210 (these are in logical 7 thru 0 order with MSB (7) first; TI calls these bits by the opposite order, D0 thru D7, on the datasheet, with D0 being the MSB) x0x0xbcc: on 5200/5220: NOP (does nothing) on 5220C and CD2501ECD: Select frame length by cc, and b selects whether every frame is preceded by 2 bits to select the frame length (instead of using the value set by cc); the default (and after a reset command) is as if '0x00' was written, i.e. for frame length (200 samples) and 0 for whether the preceding 2 bits are enabled (off) x001xxxx: READ BYTE (RDBY) Sends eight read bit commands (M0 high M1 low) to VSM and reads the resulting bits serially into a temporary register, which becomes readable as the next byte read from the tms52xx once ready goes active. Note the bit order of the byte read from the TMS52xx is BACKWARDS as compared to the actual data order as in the rom on the VSM chips; the read byte command of the tms5100 reads the bits in the 'correct' order. This was IMHO a rather silly design decision of TI. (I (LN) asked Larry Brantingham about this but he wasn't involved with the TMS52xx chips, just the 5100); There's ASCII data in the TI 99/4 speech module VSMs which has the bit order reversed on purpose because of this! TALK STATUS must be CLEAR for this command to work; otherwise it is treated as a NOP. x011xxxx: READ AND BRANCH (RB) Sends a read and branch command (M0 high, M1 high) to force VSM to set its data pointer to whatever the data is at its current pointer location is) TALK STATUS must be CLEAR for this command to work; otherwise it is treated as a NOP. x100aaaa: LOAD ADDRESS (LA) Send a load address command (M0 low M1 high) to VSM with the 4 'a' bits; Note you need to send four or five of these in sequence to actually specify an address to the vsm. TALK STATUS must be CLEAR for this command to work; otherwise it is treated as a NOP. x101xxxx: SPEAK (SPK) Begins speaking, pulling speech data from the current address pointer location of the VSM modules. x110xxxx: SPEAK EXTERNAL (SPKEXT) Clears the FIFO using SPKEE line, then sets TALKD (TALKST remains zero) until 8 bytes have been written to the FIFO, at which point it begins speaking, pulling data from the 16 byte FIFO. The patent implies TALK STATUS must be CLEAR for this command to work; otherwise it is treated as a NOP, but the decap shows that this is not true, and is an error on the patent diagram. x111xxxx: RESET (RST) Resets the speech synthesis core immediately, and clears the FIFO. Other chip differences: The 5220C (and CD2501ECD maybe?) are quieter due to a better dac arrangement on die which allows less crossover between bits, based on the decap differences. ***MAME Driver specific notes:*** Victory's initial audio selftest is pretty brutal to the FIFO: it sends a sequence of bytes to the FIFO and checks the status bits after each one; if even one bit is in the wrong state (i.e. speech starts one byte too early or late), the test fails! The sample in Victory 'Shields up!' after you activate shields, the 'up' part of the sample is missing the STOP frame at the end of it; this causes the speech core to run out of bits to parse from the FIFO, cutting the sample off by one frame. This appears to be an original game code bug. Progress list for drivers using old vs new interface: starwars: uses new interface (couriersud) gauntlet: uses new interface (couriersud) atarisy1: uses new interface (Lord Nightmare) atarisy2: uses new interface (Lord Nightmare) atarijsa: uses new interface (Lord Nightmare) firefox: uses new interface (couriersud) mhavoc: uses old interface, and is in the machine file instead of the driver. monymony/jackrabt(zaccaria.c): uses new interface (couriersud) victory(audio/exidy.c): uses new interface (couriersud) looping: uses old interface portraits: uses *NO* interface; the i/o cpu hasn't been hooked to anything! dotron and midwayfb(mcr.c): uses old interface As for which games used which chips: TMS5200 AKA TMC0285 AKA CD2501E: (1980 to 1983) Arcade: Zaccaria's 'money money' and 'jack rabbit'; Bally/Midway's 'Discs of Tron' (all environmental cabs and a few upright cabs; the code exists on all versions for the speech though, and upright cabs can be upgraded to add it by hacking on a 'Squawk & Talk' pinball speech board (which is also TMS5200 based) with a few modded components) Pinball: All Bally/Midway machines which uses the 'Squawk & Talk' board. Home computer: TI 99/4 PHP1500 Speech module (along with two VSM serial chips); Street Electronics Corp.'s Apple II 'Echo 2' Speech synthesizer (early cards only) EFO90503: (1982, EFO Sound-3 board used in a few Playmatic/Cidelsa games) Arcade: Clean Octopus Pinball: Cerberus, Spain '82 CD2501ECD: (1983) Home computer: TI 99/8 (prototypes only) TMS5220: (mostly on things made between 1981 and 1984-1985) Arcade: Bally/Midway's 'NFL Football'; Atari's 'Star Wars', 'Firefox', 'Return of the Jedi', 'Road Runner', 'The Empire Strikes Back' (all verified with schematics); Venture Line's 'Looping' and 'Sky Bumper' (need verify for both); Olympia's 'Portraits' (need verify); Exidy's 'Victory' and 'Victor Banana' (need verify for both) Pinball: Several (don't know names offhand, have not checked schematics; likely Zaccaria's 'Farfalla') Home computer: Street Electronics Corp.'s Apple II 'Echo 2' Speech synthesizer (later cards only); Texas Instruments' 'Speak and Learn' scanner wand unit. TMS5220C AKA TSP5220C: (on stuff made from 1984 to 1992 or so) Arcade: Atari's 'Indiana Jones and the Temple of Doom', '720', 'Gauntlet', 'Gauntlet II', 'A.P.B.', 'Paperboy', 'RoadBlasters', 'Vindicators Pt II'(verify?), and 'Escape from the Planet of the Robot Monsters' (all verified except for vindicators pt 2) Pinball: Several (less common than the tms5220? (not sure about this), mostly on later pinballs with LPC speech) Home computer: Street Electronics Corp.'s 'ECHO' parallel/hobbyist module (6511 based), IBM PS/2 Speech adapter (parallel port connection device), PES Speech adapter (serial port connection) Street electronics had two later 1988-1990-era ECHO appleII cards which are TSP50c0x/1x MCU based speech and not tms52xx based (though it is likely emulating the tms5220 in MCU code). Look for a 16-pin chip at U6 labeled "ECHO-2 SN" or "ECHO-3 SN". ***********************************************************************************************/ #include "emu.h" #include "tms5220.h" /* *****optional defines***** */ /* Hacky improvements which don't match patent: */ /* Interpolation shift logic: * One of the following two lines should be used, and the other commented * The second line is more accurate mathematically but not accurate to the patent */ #define INTERP_SHIFT >> m_coeff->interp_coeff[m_IP] //define INTERP_SHIFT / (1<<m_coeff->interp_coeff[m_IP]) /* Other hacks */ /* HACK: if defined, outputs the low 4 bits of the lattice filter to the i/o * or clip logic, even though the real hardware doesn't do this, partially verified by decap */ #undef ALLOW_4_LSB /* forces m_TALK active instantly whenever m_SPEN would be activated, causing speech delay to be reduced by up to one frame time */ /* for some reason, this hack makes victory behave better, though it does not match the patent */ #define FAST_START_HACK 1 /* *****configuration of chip connection stuff***** */ /* must be defined; if 0, output the waveform as if it was tapped on the speaker pin as usual, if 1, output the waveform as if it was tapped on the i/o pin (volume is much lower in the latter case) */ #define FORCE_DIGITAL 0 /* 5220 only; must be defined; if 1, normal speech (one A cycle, one B cycle per interpolation step); if 0; speak as if SPKSLOW was used (two A cycles, one B cycle per interpolation step) */ #define FORCE_SUBC_RELOAD 1 /* *****debugging defines***** */ // general, somewhat obsolete, catch all for debugs which don't fit elsewhere #define LOG_GENERAL (1 << 0) /* 5220 only; above dumps the data written to the tms52xx to stdout, useful for making logged data dumps for real hardware tests */ #define LOG_DUMP_INPUT_DATA (1 << 1) // 5220 only; above debugs FIFO stuff: writes, reads and flag updates #define LOG_FIFO (1 << 2) // dumps each speech frame as binary #define LOG_PARSE_FRAME_DUMP_BIN (1 << 3) // dumps each speech frame as hex #define LOG_PARSE_FRAME_DUMP_HEX (1 << 4) // dumps info if a frame ran out of data #define LOG_FRAME_ERRORS (1 << 6) // dumps all non-speech-data command writes #define LOG_COMMAND_DUMP (1 << 7) // dumps decoded info about command writes #define LOG_COMMAND_VERBOSE (1 << 8) // spams the errorlog with i/o ready messages whenever the ready or irq pin is read #define LOG_PIN_READS (1 << 9) // dumps debug information related to the sample generation loop, i.e. whether interpolation is inhibited or not, and what the current and target values for each frame are. #define LOG_GENERATION (1 << 10) // dumps MUCH MORE debug information related to the sample generation loop, namely the excitation, energy, pitch, k*, and output values for EVERY SINGLE SAMPLE during a frame. #define LOG_GENERATION_VERBOSE (1 << 11) // dumps the lattice filter state data each sample. #define LOG_LATTICE (1 << 12) // dumps info to stderr whenever the analog clip hardware is (or would be) clipping the signal. #define LOG_CLIP (1 << 13) // debugs the io ready callback timer #define LOG_IO_READY (1 << 14) // debugs the tms5220_data_r and data_w access methods which actually respect rs and ws #define LOG_RS_WS (1 << 15) //#define VERBOSE (LOG_GENERAL | LOG_DUMP_INPUT_DATA | LOG_FIFO | LOG_PARSE_FRAME_DUMP_HEX | LOG_FRAME_ERRORS | LOG_COMMAND_DUMP | LOG_COMMAND_VERBOSE | LOG_PIN_READS | LOG_GENERATION | LOG_GENERATION_VERBOSE | LOG_LATTICE | LOG_CLIP | LOG_IO_READY | LOG_RS_WS) #include "logmacro.h" #define MAX_SAMPLE_CHUNK 512 /* 6+4 Variants, from tms5110r.inc */ #define TMS5220_IS_TMC0281 (1) #define TMS5220_IS_TMC0281D (2) #define TMS5220_IS_CD2801 (3) #define TMS5220_IS_CD2802 (4) #define TMS5220_IS_TMS5110A (5) #define TMS5220_IS_M58817 (6) #define TMS5220_IS_5220C (7) #define TMS5220_IS_5200 (8) #define TMS5220_IS_5220 (9) #define TMS5220_IS_CD2501ECD (10) #define TMS5220_IS_CD2501E TMS5220_IS_5200 // 52xx: decide whether we have rate control or not #define TMS5220_HAS_RATE_CONTROL ((m_variant == TMS5220_IS_5220C) || (m_variant == TMS5220_IS_CD2501ECD)) // All: decide whether we are a 51xx or a 52xx #define TMS5220_IS_52xx ((m_variant == TMS5220_IS_5220C) || (m_variant == TMS5220_IS_5200) || (m_variant == TMS5220_IS_5220) || (m_variant == TMS5220_IS_CD2501ECD)) /* 51xx: States for CTL */ // ctl bus is input to tms51xx #define CTL_STATE_INPUT (0) // ctl bus is outputting a test talk command on CTL1(bit 0) #define CTL_STATE_TTALK_OUTPUT (1) // ctl bus is switching direction, next will be above #define CTL_STATE_NEXT_TTALK_OUTPUT (2) // ctl bus is outputting a read nybble 'output' command on CTL1,2,4,8 (bits 0-3) #define CTL_STATE_OUTPUT (3) // ctl bus is switching direction, next will be above #define CTL_STATE_NEXT_OUTPUT (4) static const uint8_t reload_table[4] = { 0, 2, 4, 6 }; //sample count reload for 5220c and cd2501ecd only; 5200 and 5220 always reload with 0; keep in mind this is loaded on IP=0 PC=12 subcycle=1 so it immediately will increment after one sample, effectively being 1,3,5,7 as in the comments above. // Pull in the ROM tables #include "tms5110r.hxx" void tms5220_device::register_for_save_states() { // for sanity purposes these variables should be in the same order as in tms5220.h! // 5110 specific stuff save_item(NAME(m_PDC)); save_item(NAME(m_CTL_pins)); save_item(NAME(m_state)); // new VSM stuff save_item(NAME(m_address)); save_item(NAME(m_next_is_address)); save_item(NAME(m_schedule_dummy_read)); save_item(NAME(m_addr_bit)); save_item(NAME(m_CTL_buffer)); // old VSM stuff save_item(NAME(m_read_byte_register)); save_item(NAME(m_RDB_flag)); // FIFO save_item(NAME(m_fifo)); save_item(NAME(m_fifo_head)); save_item(NAME(m_fifo_tail)); save_item(NAME(m_fifo_count)); save_item(NAME(m_fifo_bits_taken)); // global status bits (booleans) save_item(NAME(m_previous_talk_status)); save_item(NAME(m_SPEN)); save_item(NAME(m_DDIS)); save_item(NAME(m_TALK)); save_item(NAME(m_TALKD)); save_item(NAME(m_buffer_low)); save_item(NAME(m_buffer_empty)); save_item(NAME(m_irq_pin)); save_item(NAME(m_ready_pin)); // current and previous frames save_item(NAME(m_OLDE)); save_item(NAME(m_OLDP)); save_item(NAME(m_new_frame_energy_idx)); save_item(NAME(m_new_frame_pitch_idx)); save_item(NAME(m_new_frame_k_idx)); #ifdef TMS5220_PERFECT_INTERPOLATION_HACK save_item(NAME(m_old_frame_energy_idx)); save_item(NAME(m_old_frame_pitch_idx)); save_item(NAME(m_old_frame_k_idx)); save_item(NAME(m_old_zpar)); save_item(NAME(m_old_uv_zpar)); #endif save_item(NAME(m_current_energy)); save_item(NAME(m_current_pitch)); save_item(NAME(m_current_k)); save_item(NAME(m_previous_energy)); save_item(NAME(m_subcycle)); save_item(NAME(m_subc_reload)); save_item(NAME(m_PC)); save_item(NAME(m_IP)); save_item(NAME(m_inhibit)); save_item(NAME(m_uv_zpar)); save_item(NAME(m_zpar)); save_item(NAME(m_pitch_zero)); save_item(NAME(m_c_variant_rate)); save_item(NAME(m_pitch_count)); save_item(NAME(m_u)); save_item(NAME(m_x)); save_item(NAME(m_RNG)); save_item(NAME(m_excitation_data)); save_item(NAME(m_digital_select)); save_item(NAME(m_io_ready)); // "proper" rs+ws emulation save_item(NAME(m_true_timing)); save_item(NAME(m_rs_ws)); save_item(NAME(m_read_latch)); save_item(NAME(m_write_latch)); } /********************************************************************************************** printbits helper function: takes a long int input and prints the resulting bits to stderr ***********************************************************************************************/ void tms5220_device::printbits(long data, int num) { for (int i = num - 1; i >= 0; i--) LOGMASKED(LOG_PARSE_FRAME_DUMP_BIN, "%0ld", (data>>i)&1); switch ((num - 1) & 0xfc) { case 0: LOGMASKED(LOG_PARSE_FRAME_DUMP_HEX, "%0lx", data); break; case 4: LOGMASKED(LOG_PARSE_FRAME_DUMP_HEX, "%02lx", data); break; case 8: LOGMASKED(LOG_PARSE_FRAME_DUMP_HEX, "%03lx", data); break; case 12: LOGMASKED(LOG_PARSE_FRAME_DUMP_HEX, "%04lx", data); break; default: LOGMASKED(LOG_PARSE_FRAME_DUMP_HEX, "%04lx", data); break; } } /********************************************************************************************** tms5220_device::new_int_write -- wrap a write to the VSM ***********************************************************************************************/ void tms5220_device::new_int_write(uint8_t rc, uint8_t m0, uint8_t m1, uint8_t addr) { if (!m_m0_cb.isnull()) m_m0_cb(m0); if (!m_m1_cb.isnull()) m_m1_cb(m1); if (!m_addr_cb.isnull()) m_addr_cb((offs_t)0, addr); if (!m_romclk_cb.isnull()) { //printf("rc %d\n", rc); m_romclk_cb(rc); } } /********************************************************************************************** tms5220_device::new_int_write_addr -- wrap a 'load address' set of writes to the VSM ***********************************************************************************************/ void tms5220_device::new_int_write_addr(uint8_t addr) { new_int_write(1, 0, 1, addr); // romclk 1, m0 0, m1 1, addr bus nybble = xxxx new_int_write(0, 0, 1, addr); // romclk 0, m0 0, m1 1, addr bus nybble = xxxx new_int_write(1, 0, 0, addr); // romclk 1, m0 0, m1 0, addr bus nybble = xxxx new_int_write(0, 0, 0, addr); // romclk 0, m0 0, m1 0, addr bus nybble = xxxx } /********************************************************************************************** tms5220_device::new_int_write_addr -- wrap a 'read bit' set of writes to the VSM ***********************************************************************************************/ uint8_t tms5220_device::new_int_read() { new_int_write(1, 1, 0, 0); // romclk 1, m0 1, m1 0, addr bus nybble = 0/open bus new_int_write(0, 1, 0, 0); // romclk 0, m0 1, m1 0, addr bus nybble = 0/open bus new_int_write(1, 0, 0, 0); // romclk 1, m0 0, m1 0, addr bus nybble = 0/open bus new_int_write(0, 0, 0, 0); // romclk 0, m0 0, m1 0, addr bus nybble = 0/open bus if (!m_data_cb.isnull()) return m_data_cb(); LOGMASKED(LOG_GENERAL, "WARNING: CALLBACK MISSING, RETURNING 0!\n"); return 0; } /********************************************************************************************** tms5220_device::data_write -- handle a write to the TMS5220 ***********************************************************************************************/ void tms5220_device::data_write(int data) { bool old_buffer_low = m_buffer_low; LOGMASKED(LOG_DUMP_INPUT_DATA, "%c", data); if (m_DDIS) // If we're in speak external mode { // add this byte to the FIFO if (m_fifo_count < FIFO_SIZE) { m_fifo[m_fifo_tail] = data; m_fifo_tail = (m_fifo_tail + 1) % FIFO_SIZE; m_fifo_count++; LOGMASKED(LOG_FIFO, "data_write: Added byte to FIFO (current count=%2d)\n", m_fifo_count); update_fifo_status_and_ints(); // if we just unset buffer low with that last write, and SPEN *was* zero (see circuit 251, sheet 12) if ((!m_SPEN) && (old_buffer_low && (!m_buffer_low))) // MUST HAVE EDGE DETECT { LOGMASKED(LOG_FIFO, "data_write triggered SPEN to go active!\n"); // ...then we now have enough bytes to start talking; set zpar and clear out the new frame parameters (it will become old frame just before the first call to parse_frame() ) m_zpar = true; m_uv_zpar = true; // zero k4-k10 as well m_OLDE = true; // 'silence/zpar' frames are zero energy m_OLDP = true; // 'silence/zpar' frames are zero pitch #ifdef TMS5220_PERFECT_INTERPOLATION_HACK m_old_zpar = true; // zero all the old parameters m_old_uv_zpar = true; // zero old k4-k10 as well #endif m_SPEN = true; #ifdef FAST_START_HACK m_TALK = true; #endif m_new_frame_energy_idx = 0; m_new_frame_pitch_idx = 0; for (int i = 0; i < 4; i++) m_new_frame_k_idx[i] = 0; for (int i = 4; i < 7; i++) m_new_frame_k_idx[i] = 0xF; for (int i = 7; i < m_coeff->num_k; i++) m_new_frame_k_idx[i] = 0x7; } } else { LOGMASKED(LOG_FIFO, "data_write: Ran out of room in the tms52xx FIFO! this should never happen!\n"); // at this point, /READY should remain HIGH/inactive until the FIFO has at least one byte open in it. } } else //(! m_DDIS) // R Nabet : we parse commands at once. It is necessary for such commands as read. process_command(data); } /********************************************************************************************** update_fifo_status_and_ints -- check to see if the various flags should be on or off Description of flags, and their position in the status register: From the data sheet: bit D0(bit 7) = TS - Talk Status is active (high) when the VSP is processing speech data. Talk Status goes active at the initiation of a Speak command or after nine bytes of data are loaded into the FIFO following a Speak External command. It goes inactive (low) when the stop code (Energy=1111) is processed, or immediately by a buffer empty condition or a reset command. bit D1(bit 6) = BL - Buffer Low is active (high) when the FIFO buffer is more than half empty. Buffer Low is set when the "Last-In" byte is shifted down past the half-full boundary of the stack. Buffer Low is cleared when data is loaded to the stack so that the "Last-In" byte lies above the half-full boundary and becomes the eighth data byte of the stack. bit D2(bit 5) = BE - Buffer Empty is active (high) when the FIFO buffer has run out of data while executing a Speak External command. Buffer Empty is set when the last bit of the "Last-In" byte is shifted out to the Synthesis Section. This causes Talk Status to be cleared. Speech is terminated at some abnormal point and the Speak External command execution is terminated. ***********************************************************************************************/ void tms5220_device::update_fifo_status_and_ints() { /* update 52xx FIFO flags and set ints if needed */ if (!TMS5220_IS_52xx) return; // bail out if not a 52xx chip update_ready_state(); /* BL is set if neither byte 9 nor 8 of the FIFO are in use; this translates to having fifo_count (which ranges from 0 bytes in use to 16 bytes used) being less than or equal to 8. Victory/Victorba depends on this. */ if (m_fifo_count <= 8) { // generate an interrupt if necessary; if /BL was inactive and is now active, set int. if (!m_buffer_low) { m_buffer_low = true; set_interrupt_state(1); } } else m_buffer_low = false; /* BE is set if neither byte 15 nor 14 of the FIFO are in use; this translates to having fifo_count equal to exactly 0 */ if (m_fifo_count == 0) { // generate an interrupt if necessary; if /BE was inactive and is now active, set int. if (!m_buffer_empty) { m_buffer_empty = true; set_interrupt_state(1); } if (m_DDIS) m_TALK = m_SPEN = false; // /BE being active clears the TALK status via TCON, which in turn clears SPEN, but ONLY if m_DDIS is set! See patent page 16, gate 232b } else m_buffer_empty = false; // generate an interrupt if /TS was active, and is now inactive. // also, in this case, regardless if DDIS was set, unset it. if (m_previous_talk_status && !talk_status()) { LOGMASKED(LOG_GENERAL, "Talk status WAS 1, is now 0, unsetting DDIS and firing an interrupt!\n"); set_interrupt_state(1); m_DDIS = false; } m_previous_talk_status = talk_status(); } /********************************************************************************************** extract_bits -- extract a specific number of bits from the current input stream (FIFO or VSM) ***********************************************************************************************/ int tms5220_device::extract_bits(int count) { int val = 0; if (m_DDIS) { // extract from FIFO while (count--) { val = (val << 1) | ((m_fifo[m_fifo_head] >> m_fifo_bits_taken) & 1); m_fifo_bits_taken++; if (m_fifo_bits_taken >= 8) { m_fifo_count--; m_fifo[m_fifo_head] = 0; // zero the newly depleted FIFO head byte m_fifo_head = (m_fifo_head + 1) % FIFO_SIZE; m_fifo_bits_taken = 0; update_fifo_status_and_ints(); } } } else { #ifndef USE_NEW_TMS6100_CODE /** TODO: get rid of this old code */ // extract from VSM (speech ROM) if (m_speechrom) val = m_speechrom->read(count); else val = (1<<count)-1; // assume the input floats high if nothing is connected, so a spurious speak vsm command will eventually return a 0xF (STOP) frame which will halt speech #else while (count--) { val = (val << 1) | new_int_read(); LOGMASKED(LOG_GENERAL, "bit read: %d\n", val&1); } #endif } return val; } /** TODO: dummy reads should be auto-done for tms52xx for the first read after an address load, but not tms51xx where they need to be done manually, if needed */ void tms5220_device::perform_dummy_read() { if (m_schedule_dummy_read) { int data = new_int_read(); LOGMASKED(LOG_GENERAL, "TMS5110 performing dummy read; value read = %1i\n", data & 1); m_schedule_dummy_read = false; } } /********************************************************************************************** tms5220_status_read -- read status or data from the TMS5220; if the bool is 1, clear interrupt state. ***********************************************************************************************/ uint8_t tms5220_device::status_read(bool clear_int) { if (m_RDB_flag) { /* if last command was read, return data register */ m_RDB_flag = false; return(m_read_byte_register); } else { /* read status */ /* clear the interrupt pin on status read */ if (clear_int) set_interrupt_state(0); LOGMASKED(LOG_PIN_READS, "Status read: TS=%d BL=%d BE=%d\n", talk_status(), m_buffer_low, m_buffer_empty); return (talk_status() << 7) | (m_buffer_low << 6) | (m_buffer_empty << 5);// | (m_write_latch & 0x1f); // low 5 bits are open bus, so use the m_write_latch value. } } /********************************************************************************************** tms5220_ready_read -- returns the ready state of the TMS5220 ***********************************************************************************************/ bool tms5220_device::ready_read() { LOGMASKED(LOG_PIN_READS, "ready_read: ready pin read, io_ready is %d, FIFO count is %d, DDIS(speak external) is %d\n", m_io_ready, m_fifo_count, m_DDIS); /* if m_true_timing is NOT set (we're in 'hacky instant write mode'), the m_timer_io_ready timer doesn't run and will never de-assert m_io_ready if the FIFO is full, so we need to explicitly check for FIFO full here and return the proper value. SEVERE CAVEAT: This makes the assumption that the ready_read was after wsq was 'virtually asserted', so if the FIFO has no room in it ready will always return inactive, even if no write happened! i.e., after a read command when the FIFO was exactly filled, but no write attempted to overfill it. This behavior is inaccurate to hardware and may cause issues! You have been warned! */ if (!m_true_timing) return ((m_fifo_count < FIFO_SIZE)||(!m_DDIS)) && m_io_ready; else return m_io_ready; } /********************************************************************************************** tms5220_int_read -- returns the interrupt state of the TMS5220 ***********************************************************************************************/ bool tms5220_device::int_read() { LOGMASKED(LOG_PIN_READS, "int_read: irq pin read, state is %d\n", m_irq_pin); return m_irq_pin; } /********************************************************************************************** tms5220_process -- fill the buffer with a specific number of samples ***********************************************************************************************/ void tms5220_device::process(int16_t *buffer, unsigned int size) { int buf_count = 0; int i, bitout; int32_t this_sample; LOGMASKED(LOG_GENERAL, "process called with size of %d; IP=%d, PC=%d, subcycle=%d, m_SPEN=%d, m_TALK=%d, m_TALKD=%d\n", size, m_IP, m_PC, m_subcycle, m_SPEN, m_TALK, m_TALKD); /* loop until the buffer is full or we've stopped speaking */ while (size > 0) { if(m_TALKD) // speaking { /* if we're ready for a new frame to be applied, i.e. when IP=0, PC=12, Sub=1 * (In reality, the frame was really loaded incrementally during the entire IP=0 * PC=x time period, but it doesn't affect anything until IP=0 PC=12 happens) */ if ((m_IP == 0) && (m_PC == 12) && (m_subcycle == 1)) { // HACK for regression testing, be sure to comment out before release! //m_RNG = 0x1234; // end HACK /* appropriately override the interp count if needed; this will be incremented after the frame parse! */ m_IP = reload_table[m_c_variant_rate&0x3]; #ifdef TMS5220_PERFECT_INTERPOLATION_HACK /* remember previous frame energy, pitch, and coefficients */ m_old_frame_energy_idx = m_new_frame_energy_idx; m_old_frame_pitch_idx = m_new_frame_pitch_idx; for (i = 0; i < m_coeff->num_k; i++) m_old_frame_k_idx[i] = m_new_frame_k_idx[i]; #endif /* Parse a new frame into the new_target_energy, new_target_pitch and new_target_k[] */ parse_frame(); /* if the new frame is a stop frame, unset both TALK and SPEN (via TCON). TALKD remains active while the energy is ramping to 0. */ if (new_frame_stop_flag()) { m_TALK = m_SPEN = false; update_fifo_status_and_ints(); // probably not necessary... } /* in all cases where interpolation would be inhibited, set the inhibit flag; otherwise clear it. * Interpolation inhibit cases: * Old frame was voiced, new is unvoiced * Old frame was silence/zero energy, new has non-zero energy * Old frame was unvoiced, new is voiced * Old frame was unvoiced, new frame is silence/zero energy (non-existent on tms51xx rev D and F (present and working on tms52xx, present but buggy on tms51xx rev A and B)) */ if ( (!old_frame_unvoiced_flag() && new_frame_unvoiced_flag()) || (old_frame_unvoiced_flag() && !new_frame_unvoiced_flag()) || (old_frame_silence_flag() && !new_frame_silence_flag()) //|| (m_inhibit && old_frame_unvoiced_flag() && new_frame_silence_flag()) ) //TMS51xx INTERP BUG1 || (old_frame_unvoiced_flag() && new_frame_silence_flag()) ) m_inhibit = true; else // normal frame, normal interpolation m_inhibit = false; /* Debug info for current parsed frame */ LOGMASKED(LOG_GENERATION, "OLDE: %d; NEWE: %d; OLDP: %d; NEWP: %d ", old_frame_silence_flag(), new_frame_silence_flag(), old_frame_unvoiced_flag(), new_frame_unvoiced_flag()); LOGMASKED(LOG_GENERATION, "Processing new frame: "); if (!m_inhibit) LOGMASKED(LOG_GENERATION, "Normal Frame\n"); else LOGMASKED(LOG_GENERATION, "Interpolation Inhibited\n"); LOGMASKED(LOG_GENERATION, "*** current Energy, Pitch and Ks = %04d, %04d, %04d, %04d, %04d, %04d, %04d, %04d, %04d, %04d, %04d, %04d\n",m_current_energy, m_current_pitch, m_current_k[0], m_current_k[1], m_current_k[2], m_current_k[3], m_current_k[4], m_current_k[5], m_current_k[6], m_current_k[7], m_current_k[8], m_current_k[9]); LOGMASKED(LOG_GENERATION, "*** target Energy(idx), Pitch, and Ks = %04d(%x),%04d, %04d, %04d, %04d, %04d, %04d, %04d, %04d, %04d, %04d, %04d\n", (m_coeff->energytable[m_new_frame_energy_idx] * (1-m_zpar)), m_new_frame_energy_idx, (m_coeff->pitchtable[m_new_frame_pitch_idx] * (1-m_zpar)), (m_coeff->ktable[0][m_new_frame_k_idx[0]] * (1-m_zpar)), (m_coeff->ktable[1][m_new_frame_k_idx[1]] * (1-m_zpar)), (m_coeff->ktable[2][m_new_frame_k_idx[2]] * (1-m_zpar)), (m_coeff->ktable[3][m_new_frame_k_idx[3]] * (1-m_zpar)), (m_coeff->ktable[4][m_new_frame_k_idx[4]] * (1-m_uv_zpar)), (m_coeff->ktable[5][m_new_frame_k_idx[5]] * (1-m_uv_zpar)), (m_coeff->ktable[6][m_new_frame_k_idx[6]] * (1-m_uv_zpar)), (m_coeff->ktable[7][m_new_frame_k_idx[7]] * (1-m_uv_zpar)), (m_coeff->ktable[8][m_new_frame_k_idx[8]] * (1-m_uv_zpar)), (m_coeff->ktable[9][m_new_frame_k_idx[9]] * (1-m_uv_zpar)) ); } else // Not a new frame, just interpolate the existing frame. { bool inhibit_state = (m_inhibit && (m_IP != 0)); // disable inhibit when reaching the last interp period, but don't overwrite the m_inhibit value #ifdef TMS5220_PERFECT_INTERPOLATION_HACK int samples_per_frame = m_subc_reload?175:266; // either (13 A cycles + 12 B cycles) * 7 interps for normal SPEAK/SPKEXT, or (13*2 A cycles + 12 B cycles) * 7 interps for SPKSLOW //int samples_per_frame = m_subc_reload?200:304; // either (13 A cycles + 12 B cycles) * 8 interps for normal SPEAK/SPKEXT, or (13*2 A cycles + 12 B cycles) * 8 interps for SPKSLOW int current_sample = (m_subcycle - m_subc_reload)+(m_PC*(3-m_subc_reload))+((m_subc_reload?25:38)*((m_IP-1)&7)); //logerror( "CS: %03d", current_sample); // reset the current energy, pitch, etc to what it was at frame start m_current_energy = (m_coeff->energytable[m_old_frame_energy_idx] * (1-m_old_zpar)); m_current_pitch = (m_coeff->pitchtable[m_old_frame_pitch_idx] * (1-m_old_zpar)); for (i = 0; i < m_coeff->num_k; i++) m_current_k[i] = (m_coeff->ktable[i][m_old_frame_k_idx[i]] * (1-((i<4)?m_old_zpar:m_old_uv_zpar))); // now adjust each value to be exactly correct for each of the samples per frame if (m_IP != 0) // if we're still interpolating... { m_current_energy = (m_current_energy + (((m_coeff->energytable[m_new_frame_energy_idx] - m_current_energy)*(1-inhibit_state))*current_sample)/samples_per_frame)*(1-m_zpar); m_current_pitch = (m_current_pitch + (((m_coeff->pitchtable[m_new_frame_pitch_idx] - m_current_pitch)*(1-inhibit_state))*current_sample)/samples_per_frame)*(1-m_zpar); for (i = 0; i < m_coeff->num_k; i++) m_current_k[i] = (m_current_k[i] + (((m_coeff->ktable[i][m_new_frame_k_idx[i]] - m_current_k[i])*(1-inhibit_state))*current_sample)/samples_per_frame)*(1-((i<4)?m_zpar:m_uv_zpar)); } else // we're done, play this frame for 1/8 frame. { if (m_subcycle == 2) m_pitch_zero = false; // this reset happens around the second subcycle during IP=0 m_current_energy = (m_coeff->energytable[m_new_frame_energy_idx] * (1-m_zpar)); m_current_pitch = (m_coeff->pitchtable[m_new_frame_pitch_idx] * (1-m_zpar)); for (i = 0; i < m_coeff->num_k; i++) m_current_k[i] = (m_coeff->ktable[i][m_new_frame_k_idx[i]] * (1-((i<4)?m_zpar:m_uv_zpar))); } #else //Updates to parameters only happen on subcycle '2' (B cycle) of PCs. if (m_subcycle == 2) { switch(m_PC) { case 0: /* PC = 0, B cycle, write updated energy */ if (m_IP==0) m_pitch_zero = 0; // this reset happens around the second subcycle during IP=0 m_current_energy = (m_current_energy + (((m_coeff->energytable[m_new_frame_energy_idx] - m_current_energy)*(1-inhibit_state)) INTERP_SHIFT))*(1-m_zpar); break; case 1: /* PC = 1, B cycle, write updated pitch */ m_current_pitch = (m_current_pitch + (((m_coeff->pitchtable[m_new_frame_pitch_idx] - m_current_pitch)*(1-inhibit_state)) INTERP_SHIFT))*(1-m_zpar); break; case 2: case 3: case 4: case 5: case 6: case 7: case 8: case 9: case 10: case 11: /* PC = 2 through 11, B cycle, write updated K1 through K10 */ m_current_k[m_PC-2] = (m_current_k[m_PC-2] + (((m_coeff->ktable[m_PC-2][m_new_frame_k_idx[m_PC-2]] - m_current_k[m_PC-2])*(1-inhibit_state)) INTERP_SHIFT))*(1-(((m_PC-2)<4)?m_zpar:m_uv_zpar)); break; case 12: /* PC = 12 */ /* we should NEVER reach this point, PC=12 doesn't have a subcycle 2 */ break; } } #endif } // calculate the output if (old_frame_unvoiced_flag()) { // generate unvoiced samples here if (m_RNG & 1) m_excitation_data = ~0x3F; /* according to the patent it is (either + or -) half of the maximum value in the chirp table, so either 01000000(0x40) or 11000000(0xC0)*/ else m_excitation_data = 0x40; } else /* (!old_frame_unvoiced_flag()) */ { // generate voiced samples here /* US patent 4331836 Figure 14B shows, and logic would hold, that a pitch based chirp * function has a chirp/peak and then a long chain of zeroes. * The last entry of the chirp rom is at address 0b110011 (51d), the 52nd sample, * and if the address reaches that point the ADDRESS incrementer is * disabled, forcing all samples beyond 51d to be == 51d */ if (m_pitch_count >= 51) m_excitation_data = (int8_t)m_coeff->chirptable[51]; else /*m_pitch_count < 51*/ m_excitation_data = (int8_t)m_coeff->chirptable[m_pitch_count]; } // Update LFSR *20* times every sample (once per T cycle), like patent shows for (i=0; i<20; i++) { bitout = ((m_RNG >> 12) & 1) ^ ((m_RNG >> 3) & 1) ^ ((m_RNG >> 2) & 1) ^ ((m_RNG >> 0) & 1); m_RNG <<= 1; m_RNG |= bitout; } this_sample = lattice_filter(); /* execute lattice filter */ //LOGMASKED(LOG_GENERATION_VERBOSE, "C:%01d; ",m_subcycle); LOGMASKED(LOG_GENERATION_VERBOSE, "IP:%01d PC:%02d X:%04d E:%03d P:%03d Pc:%03d ",m_IP, m_PC, m_excitation_data, m_current_energy, m_current_pitch, m_pitch_count); //LOGMASKED(LOG_GENERATION_VERBOSE, "X:%04d E:%03d P:%03d Pc:%03d ", m_excitation_data, m_current_energy, m_current_pitch, m_pitch_count); for (i=0; i<10; i++) LOGMASKED(LOG_GENERATION_VERBOSE, "K%d:%04d ", i+1, m_current_k[i]); LOGMASKED(LOG_GENERATION_VERBOSE, "Out:%06d ", this_sample); //#ifdef TMS5220_PERFECT_INTERPOLATION_HACK // LOGMASKED(LOG_GENERATION_VERBOSE, "%d%d%d%d",m_old_zpar,m_zpar,m_old_uv_zpar,m_uv_zpar); //#else // LOGMASKED(LOG_GENERATION_VERBOSE, "x%dx%d",m_zpar,m_uv_zpar); //#endif LOGMASKED(LOG_GENERATION_VERBOSE, "\n"); /* next, force result to 14 bits (since its possible that the addition at the final (k1) stage of the lattice overflowed) */ while (this_sample > 16383) this_sample -= 32768; while (this_sample < -16384) this_sample += 32768; if (m_digital_select == 0) // analog SPK pin output is only 8 bits, with clipping buffer[buf_count] = clip_analog(this_sample); else // digital I/O pin output is 12 bits { #ifdef ALLOW_4_LSB // input: ssss ssss ssss ssss ssnn nnnn nnnn nnnn // N taps: ^ = 0x2000; // output: ssss ssss ssss ssss snnn nnnn nnnn nnnN buffer[buf_count] = (this_sample<<1)|((this_sample&0x2000)>>13); #else this_sample &= ~0xF; // input: ssss ssss ssss ssss ssnn nnnn nnnn 0000 // N taps: ^^ ^^^ = 0x3E00; // output: ssss ssss ssss ssss snnn nnnn nnnN NNNN buffer[buf_count] = (this_sample<<1)|((this_sample&0x3E00)>>9); #endif } // Update all counts m_subcycle++; if ((m_subcycle == 2) && (m_PC == 12)) // RESETF3 { /* Circuit 412 in the patent acts a reset, resetting the pitch counter to 0 * if INHIBIT was true during the most recent frame transition. * The exact time this occurs is betwen IP=7, PC=12 sub=0, T=t12 * and m_IP = 0, PC=0 sub=0, T=t12, a period of exactly 20 cycles, * which overlaps the time OLDE and OLDP are updated at IP=7 PC=12 T17 * (and hence INHIBIT itself 2 t-cycles later). * According to testing the pitch zeroing lasts approximately 2 samples. * We set the zeroing latch here, and unset it on PC=1 in the generator. */ if ((m_IP == 7) && m_inhibit) m_pitch_zero = true; if (m_IP == 7) // RESETL4 { // Latch OLDE and OLDP //if (old_frame_silence_flag()) m_uv_zpar = false; // TMS51xx INTERP BUG2 m_OLDE = new_frame_silence_flag(); // old_frame_silence_flag() m_OLDP = new_frame_unvoiced_flag(); // old_frame_unvoiced_flag() /* if TALK was clear last frame, halt speech now, since TALKD (latched from TALK on new frame) just went inactive. */ LOGMASKED(LOG_GENERATION, "RESETL4, about to update status: IP=%d, PC=%d, subcycle=%d, m_SPEN=%d, m_TALK=%d, m_TALKD=%d\n", m_IP, m_PC, m_subcycle, m_SPEN, m_TALK, m_TALKD); if ((!m_TALK) && (!m_SPEN)) LOGMASKED(LOG_GENERATION, "tms5220_process: processing frame: TALKD = 0 caused by stop frame or buffer empty, halting speech.\n"); m_TALKD = m_TALK; // TALKD is latched from TALK update_fifo_status_and_ints(); // to trigger an interrupt if talk_status has changed if ((!m_TALK) && m_SPEN) m_TALK = true; // TALK is only activated if it wasn't already active, if m_SPEN is active, and if we're in RESETL4 (which we are). LOGMASKED(LOG_GENERATION, "RESETL4, status updated: IP=%d, PC=%d, subcycle=%d, m_SPEN=%d, m_TALK=%d, m_TALKD=%d\n", m_IP, m_PC, m_subcycle, m_SPEN, m_TALK, m_TALKD); } m_subcycle = m_subc_reload; m_PC = 0; m_IP++; m_IP &= 0x7; } else if (m_subcycle == 3) { m_subcycle = m_subc_reload; m_PC++; } m_pitch_count++; if ((m_pitch_count >= m_current_pitch) || m_pitch_zero) m_pitch_count = 0; m_pitch_count &= 0x1FF; } else // m_TALKD == 0 { m_subcycle++; if ((m_subcycle == 2) && (m_PC == 12)) // RESETF3 { if (m_IP == 7) // RESETL4 { m_TALKD = m_TALK; // TALKD is latched from TALK update_fifo_status_and_ints(); // probably not necessary if ((!m_TALK) && m_SPEN) m_TALK = true; // TALK is only activated if it wasn't already active, if m_SPEN is active, and if we're in RESETL4 (which we are). } m_subcycle = m_subc_reload; m_PC = 0; m_IP++; m_IP&=0x7; } else if (m_subcycle == 3) { m_subcycle = m_subc_reload; m_PC++; } buffer[buf_count] = -1; /* should be just -1; actual chip outputs -1 every idle sample; (cf note in data sheet, p 10, table 4) */ } buf_count++; size--; } } /********************************************************************************************** clip_analog -- clips the 14 bit return value from the lattice filter to its final 10 bit value (-512 to 511), and upshifts/range extends this to 16 bits ***********************************************************************************************/ int16_t tms5220_device::clip_analog(int16_t cliptemp) const { /* clipping, just like the patent shows: * the top 10 bits of this result are visible on the digital output IO pin. * next, if the top 3 bits of the 14 bit result are all the same, the * lowest of those 3 bits plus the next 7 bits are the signed analog * output, otherwise the low bits are all forced to match the inverse of * the topmost bit, i.e.: * 1x xxxx xxxx xxxx -> 0b10000000 * 11 1bcd efgh xxxx -> 0b1bcdefgh * 00 0bcd efgh xxxx -> 0b0bcdefgh * 0x xxxx xxxx xxxx -> 0b01111111 */ if ((cliptemp > 2047) || (cliptemp < -2048)) LOGMASKED(LOG_CLIP, "clipping cliptemp to range; was %d\n", cliptemp); if (cliptemp > 2047) cliptemp = 2047; else if (cliptemp < -2048) cliptemp = -2048; /* at this point the analog output is tapped */ #ifdef ALLOW_4_LSB // input: ssss snnn nnnn nnnn // N taps: ^^^ ^ = 0x0780 // output: snnn nnnn nnnn NNNN return (cliptemp << 4)|((cliptemp&0x780)>>7); // upshift and range adjust #else cliptemp &= ~0xF; // input: ssss snnn nnnn 0000 // N taps: ^^^ ^^^^ = 0x07F0 // P taps: ^ = 0x0400 // output: snnn nnnn NNNN NNNP return (cliptemp << 4)|((cliptemp&0x7F0)>>3)|((cliptemp&0x400)>>10); // upshift and range adjust #endif } /********************************************************************************************** matrix_multiply -- does the proper multiply and shift a is the k coefficient and is clamped to 10 bits (9 bits plus a sign) b is the running result and is clamped to 14 bits. output is 14 bits, but note the result LSB bit is always 1. Because the low 4 bits of the result are trimmed off before output, this makes almost no difference in the computation. **********************************************************************************************/ int32_t tms5220_device::matrix_multiply(int32_t a, int32_t b) const { int32_t result; while (a>511) { a-=1024; } while (a<-512) { a+=1024; } while (b>16383) { b-=32768; } while (b<-16384) { b+=32768; } result = ((a*b)>>9); /** TODO: this isn't technically right to the chip, which truncates the lowest result bit, but it causes glitches otherwise. **/ if (result>16383) LOGMASKED(LOG_GENERAL, "matrix multiplier overflowed! a: %x, b: %x, result: %x", a, b, result); if (result<-16384) LOGMASKED(LOG_GENERAL, "matrix multiplier underflowed! a: %x, b: %x, result: %x", a, b, result); return result; } /********************************************************************************************** lattice_filter -- executes one 'full run' of the lattice filter on a specific byte of excitation data, and specific values of all the current k constants, and returns the resulting sample. ***********************************************************************************************/ int32_t tms5220_device::lattice_filter() { // Lattice filter here // Aug/05/07: redone as unrolled loop, for clarity - LN /* Originally Copied verbatim from table I in US patent 4,209,804, now updated to be in same order as the actual chip does it, not that it matters. notation equivalencies from table: Yn(i) == m_u[n-1] Kn = m_current_k[n-1] bn = m_x[n-1] */ /* int ep = matrix_multiply(m_previous_energy, (m_excitation_data<<6)); //Y(11) m_u[10] = ep; for (int i = 0; i < 10; i++) { int ii = 10-i; // for m = 10, this would be 11 - i, and since i is from 1 to 10, then ii ranges from 10 to 1 // int jj = ii+1; // this variable, even on the fortran version, is // never used. It probably was intended to be used on the two lines // below the next one to save some redundant additions on each. ep = ep - (((m_current_k[ii-1] * m_x[ii-1])>>9)|1); // subtract reflection from lower stage 'top of lattice' m_u[ii-1] = ep; m_x[ii] = m_x[ii-1] + (((m_current_k[ii-1] * ep)>>9)|1); // add reflection from upper stage 'bottom of lattice' } m_x[0] = ep; // feed the last section of the top of the lattice directly to the bottom of the lattice */ m_u[10] = matrix_multiply(m_previous_energy, (m_excitation_data<<6)); //Y(11) m_u[9] = m_u[10] - matrix_multiply(m_current_k[9], m_x[9]); m_u[8] = m_u[9] - matrix_multiply(m_current_k[8], m_x[8]); m_u[7] = m_u[8] - matrix_multiply(m_current_k[7], m_x[7]); m_u[6] = m_u[7] - matrix_multiply(m_current_k[6], m_x[6]); m_u[5] = m_u[6] - matrix_multiply(m_current_k[5], m_x[5]); m_u[4] = m_u[5] - matrix_multiply(m_current_k[4], m_x[4]); m_u[3] = m_u[4] - matrix_multiply(m_current_k[3], m_x[3]); m_u[2] = m_u[3] - matrix_multiply(m_current_k[2], m_x[2]); m_u[1] = m_u[2] - matrix_multiply(m_current_k[1], m_x[1]); m_u[0] = m_u[1] - matrix_multiply(m_current_k[0], m_x[0]); int32_t err = m_x[9] + matrix_multiply(m_current_k[9], m_u[9]); //x_10, real chip doesn't use or calculate this m_x[9] = m_x[8] + matrix_multiply(m_current_k[8], m_u[8]); m_x[8] = m_x[7] + matrix_multiply(m_current_k[7], m_u[7]); m_x[7] = m_x[6] + matrix_multiply(m_current_k[6], m_u[6]); m_x[6] = m_x[5] + matrix_multiply(m_current_k[5], m_u[5]); m_x[5] = m_x[4] + matrix_multiply(m_current_k[4], m_u[4]); m_x[4] = m_x[3] + matrix_multiply(m_current_k[3], m_u[3]); m_x[3] = m_x[2] + matrix_multiply(m_current_k[2], m_u[2]); m_x[2] = m_x[1] + matrix_multiply(m_current_k[1], m_u[1]); m_x[1] = m_x[0] + matrix_multiply(m_current_k[0], m_u[0]); m_x[0] = m_u[0]; m_previous_energy = m_current_energy; LOGMASKED(LOG_LATTICE, "V:%04d ", m_u[10]); for (int i = 9; i >= 0; i--) { LOGMASKED(LOG_LATTICE, "Y%d:%04d ", i+1, m_u[i]); } LOGMASKED(LOG_LATTICE, "\n"); LOGMASKED(LOG_LATTICE, "E:%04d ", err); for (int i = 9; i >= 0; i--) { LOGMASKED(LOG_LATTICE, "b%d:%04d ", i+1, m_x[i]); } LOGMASKED(LOG_LATTICE, "\n"); return m_u[0]; } /********************************************************************************************** process_command -- extract a byte from the FIFO and interpret it as a command ***********************************************************************************************/ void tms5220_device::process_command(unsigned char cmd) { LOGMASKED(LOG_COMMAND_DUMP, "process_command called with parameter %02X\n", cmd); /* parse the command */ switch (cmd & 0x70) { case 0x10 : /* read byte */ LOGMASKED(LOG_COMMAND_VERBOSE, "Read Byte command received\n"); if (!talk_status()) /* TALKST must be clear for RDBY */ { if (m_schedule_dummy_read) { m_schedule_dummy_read = false; if (m_speechrom) m_speechrom->read(1); } if (m_speechrom) m_read_byte_register = m_speechrom->read(8); /* read one byte from speech ROM... */ m_RDB_flag = true; } else LOGMASKED(LOG_COMMAND_VERBOSE, "Read Byte command received during TALK state, ignoring!\n"); break; case 0x00: case 0x20: /* set rate (tms5220c and cd2501ecd only), otherwise NOP */ if (TMS5220_HAS_RATE_CONTROL) { LOGMASKED(LOG_COMMAND_VERBOSE, "Set Rate (or NOP) command received\n"); m_c_variant_rate = cmd&0x0F; } else LOGMASKED(LOG_COMMAND_VERBOSE, "NOP command received\n"); break; case 0x30 : /* read and branch */ if (!talk_status()) /* TALKST must be clear for RB */ { LOGMASKED(LOG_COMMAND_VERBOSE, "Read and Branch command received\n"); m_RDB_flag = false; if (m_speechrom) m_speechrom->read_and_branch(); } break; case 0x40 : /* load address */ LOGMASKED(LOG_COMMAND_VERBOSE, "Load Address command received\n"); if (!talk_status()) /* TALKST must be clear for LA */ { /* tms5220 data sheet says that if we load only one 4-bit nibble, it won't work. This code does not care about this. */ if (m_speechrom) m_speechrom->load_address(cmd & 0x0f); m_schedule_dummy_read = true; } else LOGMASKED(LOG_COMMAND_VERBOSE, "Load Address command received during TALK state, ignoring!\n"); break; case 0x50 : /* speak */ LOGMASKED(LOG_COMMAND_VERBOSE, "Speak (VSM) command received\n"); if (m_schedule_dummy_read) { m_schedule_dummy_read = false; if (m_speechrom) m_speechrom->read(1); } m_SPEN = 1; #ifdef FAST_START_HACK m_TALK = 1; #endif m_DDIS = false; // speak using VSM m_zpar = true; // zero all the parameters m_uv_zpar = true; // zero k4-k10 as well m_OLDE = true; // 'silence/zpar' frames are zero energy m_OLDP = true; // 'silence/zpar' frames are zero pitch #ifdef TMS5220_PERFECT_INTERPOLATION_HACK m_old_zpar = true; // zero all the old parameters m_old_uv_zpar = true; // zero old k4-k10 as well #endif // following is semi-hack but matches idle state observed on chip m_new_frame_energy_idx = 0; m_new_frame_pitch_idx = 0; for (int i = 0; i < 4; i++) m_new_frame_k_idx[i] = 0; for (int i = 4; i < 7; i++) m_new_frame_k_idx[i] = 0xF; for (int i = 7; i < m_coeff->num_k; i++) m_new_frame_k_idx[i] = 0x7; break; case 0x60 : /* speak external */ LOGMASKED(LOG_COMMAND_VERBOSE, "Speak External command received\n"); // SPKEXT going active asserts /SPKEE for 2 clocks, which clears the FIFO and its counters std::fill(std::begin(m_fifo), std::end(m_fifo), 0); m_fifo_head = m_fifo_tail = m_fifo_count = m_fifo_bits_taken = 0; // SPEN is enabled when the FIFO passes half full (falling edge of BL signal) m_DDIS = true; // speak using FIFO m_zpar = true; // zero all the parameters m_uv_zpar = true; // zero k4-k10 as well m_OLDE = true; // 'silence/zpar' frames are zero energy m_OLDP = true; // 'silence/zpar' frames are zero pitch #ifdef TMS5220_PERFECT_INTERPOLATION_HACK m_old_zpar = true; // zero all the old parameters m_old_uv_zpar = true; // zero old k4-k10 as well #endif // following is semi-hack but matches idle state observed on chip m_new_frame_energy_idx = 0; m_new_frame_pitch_idx = 0; for (int i = 0; i < 4; i++) m_new_frame_k_idx[i] = 0; for (int i = 4; i < 7; i++) m_new_frame_k_idx[i] = 0xF; for (int i = 7; i < m_coeff->num_k; i++) m_new_frame_k_idx[i] = 0x7; m_RDB_flag = false; break; case 0x70 : /* reset */ LOGMASKED(LOG_COMMAND_VERBOSE, "Reset command received\n"); if (m_schedule_dummy_read) { m_schedule_dummy_read = false; if (m_speechrom) m_speechrom->read(1); } reset(); break; } /* update the buffer low state */ update_fifo_status_and_ints(); } /****************************************************************************************** parse_frame -- parse a new frame's worth of data; returns 0 if not enough bits in buffer ******************************************************************************************/ void tms5220_device::parse_frame() { int i, rep_flag; #ifdef TMS5220_PERFECT_INTERPOLATION_HACK m_old_uv_zpar = m_uv_zpar; m_old_zpar = m_zpar; #endif /* Since we're parsing a frame, we must be talking, so clear zpar here. Also, before we started parsing a frame, the P=0 and E=0 latches were both reset by RESETL4, so clear m_uv_zpar here. */ m_uv_zpar = m_zpar = 0; /* We actually don't care how many bits are left in the FIFO here; the frame subpart will be processed normally, and any bits extracted 'past the end' of the FIFO will be read as zeroes; the FIFO being emptied will set the /BE latch which will halt speech exactly as if a stop frame had been encountered (instead of whatever partial frame was read). The same exact circuitry is used for both functions on the real chip, see us patent 4335277 sheet 16, gates 232a (decode stop frame) and 232b (decode /BE plus DDIS (decode disable) which is active during speak external). */ /* if the chip is a tms5220C, and the rate mode is set to that each frame (0x04 bit set) has a 2 bit rate preceding it, grab two bits here and store them as the rate; */ if ((TMS5220_HAS_RATE_CONTROL) && (m_c_variant_rate & 0x04)) { i = extract_bits(2); printbits(i, 2); LOGMASKED(LOG_PARSE_FRAME_DUMP_BIN | LOG_PARSE_FRAME_DUMP_HEX, " "); m_IP = reload_table[i]; } else // non-5220C and 5220C in fixed rate mode m_IP = reload_table[m_c_variant_rate&0x3]; update_fifo_status_and_ints(); if (m_DDIS && m_buffer_empty) goto ranout; // attempt to extract the energy index m_new_frame_energy_idx = extract_bits(m_coeff->energy_bits); printbits(m_new_frame_energy_idx, m_coeff->energy_bits); LOGMASKED(LOG_PARSE_FRAME_DUMP_BIN | LOG_PARSE_FRAME_DUMP_HEX, " "); update_fifo_status_and_ints(); if (m_DDIS && m_buffer_empty) goto ranout; // if the energy index is 0 or 15, we're done if ((m_new_frame_energy_idx == 0) || (m_new_frame_energy_idx == 15)) return; // attempt to extract the repeat flag rep_flag = extract_bits(1); printbits(rep_flag, 1); LOGMASKED(LOG_PARSE_FRAME_DUMP_BIN | LOG_PARSE_FRAME_DUMP_HEX, " "); // attempt to extract the pitch m_new_frame_pitch_idx = extract_bits(m_coeff->pitch_bits); printbits(m_new_frame_pitch_idx, m_coeff->pitch_bits); LOGMASKED(LOG_PARSE_FRAME_DUMP_BIN | LOG_PARSE_FRAME_DUMP_HEX, " "); // if the new frame is unvoiced, be sure to zero out the k5-k10 parameters m_uv_zpar = new_frame_unvoiced_flag(); update_fifo_status_and_ints(); if (m_DDIS && m_buffer_empty) goto ranout; // if this is a repeat frame, just do nothing, it will reuse the old coefficients if (rep_flag) return; // extract first 4 K coefficients for (i = 0; i < 4; i++) { m_new_frame_k_idx[i] = extract_bits(m_coeff->kbits[i]); printbits(m_new_frame_k_idx[i], m_coeff->kbits[i]); LOGMASKED(LOG_PARSE_FRAME_DUMP_BIN | LOG_PARSE_FRAME_DUMP_HEX, " "); update_fifo_status_and_ints(); if (m_DDIS && m_buffer_empty) goto ranout; } // if the pitch index was zero, we only need 4 K's... if (m_new_frame_pitch_idx == 0) { /* and the rest of the coefficients are zeroed, but that's done in the generator code */ return; } // If we got here, we need the remaining 6 K's for (i = 4; i < m_coeff->num_k; i++) { m_new_frame_k_idx[i] = extract_bits(m_coeff->kbits[i]); printbits(m_new_frame_k_idx[i], m_coeff->kbits[i]); LOGMASKED(LOG_PARSE_FRAME_DUMP_BIN | LOG_PARSE_FRAME_DUMP_HEX, " "); update_fifo_status_and_ints(); if (m_DDIS && m_buffer_empty) goto ranout; } LOGMASKED(LOG_PARSE_FRAME_DUMP_BIN | LOG_PARSE_FRAME_DUMP_HEX, "\n"); if (m_DDIS) LOGMASKED(LOG_GENERAL, "Parsed a frame successfully in FIFO - %d bits remaining\n", (m_fifo_count*8)-(m_fifo_bits_taken)); else LOGMASKED(LOG_GENERAL, "Parsed a frame successfully in ROM\n"); return; ranout: LOGMASKED(LOG_FRAME_ERRORS, "Ran out of bits on a parse!\n"); return; } /********************************************************************************************** set_interrupt_state -- generate an interrupt ***********************************************************************************************/ void tms5220_device::set_interrupt_state(int state) { if (!TMS5220_IS_52xx) return; // bail out if not a 52xx chip, since there's no int pin LOGMASKED(LOG_PIN_READS, "irq pin set to state %d\n", state); if (!m_irq_handler.isnull() && state != m_irq_pin) m_irq_handler(!state); m_irq_pin = state; } /********************************************************************************************** update_ready_state -- update the ready line ***********************************************************************************************/ void tms5220_device::update_ready_state() { bool state = m_io_ready; if (m_ready_pin != state) { LOGMASKED(LOG_PIN_READS, "ready pin set to state %d\n", state); if (!m_readyq_handler.isnull()) m_readyq_handler(!state); m_ready_pin = state; } } //------------------------------------------------- // device_start - device-specific startup //------------------------------------------------- void tms5220_device::device_start() { if (m_speechrom_tag) { m_speechrom = siblingdevice<speechrom_device>( m_speechrom_tag ); if( !m_speechrom ) { throw new emu_fatalerror("Error: %s '%s' can't find speechrom '%s'\n", shortname(), tag(), m_speechrom_tag ); } } else { m_speechrom = nullptr; } switch (m_variant) { case TMS5220_IS_TMC0281: m_coeff = &T0280B_0281A_coeff; break; case TMS5220_IS_TMC0281D: m_coeff = &T0280D_0281D_coeff; break; case TMS5220_IS_CD2801: m_coeff = &T0280F_2801A_coeff; break; case TMS5220_IS_M58817: m_coeff = &M58817_coeff; break; case TMS5220_IS_CD2802: m_coeff = &T0280F_2802_coeff; break; case TMS5220_IS_TMS5110A: m_coeff = &tms5110a_coeff; break; case TMS5220_IS_5200: case TMS5220_IS_CD2501ECD: m_coeff = &T0285_2501E_coeff; break; case TMS5220_IS_5220C: case TMS5220_IS_5220: m_coeff = &tms5220_coeff; break; default: fatalerror("Unknown variant in tms5220_set_variant\n"); } /* resolve callbacks */ m_irq_handler.resolve(); m_readyq_handler.resolve(); m_m0_cb.resolve(); m_m1_cb.resolve(); m_romclk_cb.resolve(); m_addr_cb.resolve(); m_data_cb.resolve(); /* initialize a stream */ m_stream = stream_alloc(0, 1, clock() / 80); m_timer_io_ready = timer_alloc(0); /* not during reset which is called from within a write! */ m_io_ready = true; m_true_timing = false; m_rs_ws = 0x03; // rs and ws are assumed to be inactive on device startup m_write_latch = 0; // assume on start that nothing is driving the data bus register_for_save_states(); } //------------------------------------------------- // device_reset - device-specific reset //------------------------------------------------- void tms5220_device::device_reset() { m_digital_select = FORCE_DIGITAL; // assume analog output /* initialize the FIFO */ std::fill(std::begin(m_fifo), std::end(m_fifo), 0); m_fifo_head = m_fifo_tail = m_fifo_count = m_fifo_bits_taken = 0; /* initialize the chip state */ /* Note that we do not actually clear IRQ on start-up : IRQ is even raised if m_buffer_empty or m_buffer_low are 0 */ m_SPEN = m_DDIS = m_TALK = m_TALKD = m_previous_talk_status = m_irq_pin = m_ready_pin = false; set_interrupt_state(0); update_ready_state(); m_buffer_empty = m_buffer_low = true; m_RDB_flag = false; /* initialize the energy/pitch/k states */ #ifdef TMS5220_PERFECT_INTERPOLATION_HACK m_old_frame_energy_idx = m_old_frame_pitch_idx = 0; std::fill(std::begin(m_old_frame_k_idx), std::end(m_old_frame_k_idx), 0); m_old_zpar = false; #endif m_new_frame_energy_idx = m_current_energy = m_previous_energy = 0; m_new_frame_pitch_idx = m_current_pitch = 0; m_zpar = m_uv_zpar = false; std::fill(std::begin(m_new_frame_k_idx), std::end(m_new_frame_k_idx), 0); std::fill(std::begin(m_current_k), std::end(m_current_k), 0); /* initialize the sample generators */ m_inhibit = true; m_subcycle = m_c_variant_rate = m_pitch_count = m_PC = 0; m_subc_reload = FORCE_SUBC_RELOAD; m_OLDE = m_OLDP = true; m_IP = reload_table[m_c_variant_rate&0x3]; m_RNG = 0x1FFF; std::fill(std::begin(m_u), std::end(m_u), 0); std::fill(std::begin(m_x), std::end(m_x), 0); m_schedule_dummy_read = false; if (m_speechrom) { m_speechrom->load_address(0); // MZ: Do the dummy read immediately. The previous line will cause a // shift in the address pointer in the VSM. When the next command is a // load_address, no dummy read will occur, hence the address will be // incorrectly shifted. m_speechrom->read(1); m_schedule_dummy_read = false; } // 5110 specific stuff m_PDC = 0; m_CTL_pins = 0; m_state = 0; m_address = 0; m_next_is_address = false; m_addr_bit = 0; m_CTL_buffer = 0; } /********************************************************************************************** True timing ***********************************************************************************************/ void tms5220_device::device_timer(emu_timer &timer, device_timer_id id, int param, void *ptr) { switch(id) { case 0: // m_timer_io_ready /* bring up to date first */ m_stream->update(); LOGMASKED(LOG_IO_READY, "m_timer_io_ready timer fired, param = %02x, m_rs_ws = %02x\n", param, m_rs_ws); if (param) // low->high ready state { switch (m_rs_ws) { case 0x02: /* Write */ LOGMASKED(LOG_IO_READY, "m_timer_io_ready: Attempting to service write...\n"); if ((m_fifo_count >= FIFO_SIZE) && m_DDIS) // if FIFO is full and we're in speak external mode { LOGMASKED(LOG_IO_READY, "m_timer_io_ready: in SPKEXT and FIFO was full! cannot service write now, delaying 16 cycles...\n"); m_timer_io_ready->adjust(clocks_to_attotime(16), 1); break; } else { LOGMASKED(LOG_IO_READY, "m_timer_io_ready: Serviced write: %02x\n", m_write_latch); data_write(m_write_latch); m_io_ready = param; break; } case 0x01: /* Read */ m_read_latch = status_read(true); LOGMASKED(LOG_IO_READY, "m_timer_io_ready: Serviced read, returning %02x\n", m_read_latch); m_io_ready = param; break; case 0x03: /* High Impedance */ m_io_ready = param; case 0x00: /* illegal */ m_io_ready = param; break; } } update_ready_state(); break; } } /* * /RS line write handler */ WRITE_LINE_MEMBER( tms5220_device::rsq_w ) { m_true_timing = true; state &= 0x01; LOGMASKED(LOG_RS_WS, "/RS written with data: %d\n", state); uint8_t new_val = (m_rs_ws & 0x01) | (state<<1); if (new_val != m_rs_ws) { m_rs_ws = new_val; if (new_val == 0) { if (TMS5220_HAS_RATE_CONTROL) // correct for 5220c, probably also correct for cd2501ecd reset(); else /* illegal */ LOGMASKED(LOG_RS_WS, "tms5220_rsq_w: illegal\n"); return; } else if (new_val == 3) { /* high impedance */ m_read_latch = 0xff; return; } if (state) { /* low to high */ } else { /* high to low - schedule ready cycle */ LOGMASKED(LOG_RS_WS, "Scheduling ready cycle for /RS...\n"); /* upon /RS being activated, /READY goes inactive after 100 nsec from data sheet, through 3 asynchronous gates on patent. This is effectively within one clock, so we immediately set io_ready to 0 and activate the callback. */ m_io_ready = false; update_ready_state(); // The datasheet doesn't give an exact time when /READY should change, but the data is valid 6-11 usec after /RS goes low. // It looks like /READY goes high soon after that (although the datasheet graph is not to scale). // The value of 13 was measured on a real chip with an oscilloscope, and it fits the datasheet. m_timer_io_ready->adjust(attotime::from_usec(13), 1); } } } /* * /WS line write handler */ WRITE_LINE_MEMBER( tms5220_device::wsq_w ) { m_true_timing = true; state &= 0x01; LOGMASKED(LOG_RS_WS, "/WS written with data: %d\n", state); uint8_t new_val = (m_rs_ws & 0x02) | (state<<0); if (new_val != m_rs_ws) { m_rs_ws = new_val; if (new_val == 0) { if (TMS5220_HAS_RATE_CONTROL) // correct for 5220c, probably also correct for cd2501ecd reset(); else /* illegal */ LOGMASKED(LOG_RS_WS, "tms5220_wsq_w: illegal\n"); return; } else if ( new_val == 3) { /* high impedance */ m_read_latch = 0xff; return; } if (state) { /* low to high */ } else { /* high to low - schedule ready cycle */ LOGMASKED(LOG_RS_WS, "Scheduling ready cycle for /WS...\n"); /* upon /WS being activated, /READY goes inactive after 100 nsec from data sheet, through 3 asynchronous gates on patent. This is effectively within one clock, so we immediately set io_ready to 0 and activate the callback. */ m_io_ready = false; update_ready_state(); /* Now comes the complicated part: how long does /READY stay inactive, when /WS is pulled low? This depends ENTIRELY on the command written, or whether the chip is in speak external mode or not... Speak external mode: ~16 cycles Command Mode: SPK: ? cycles SPKEXT: ? cycles RDBY: between 60 and 140 cycles RB: ? cycles (80?) RST: between 60 and 140 cycles SET RATE (5220C and CD2501ECD only): ? cycles (probably ~16) */ // TODO: actually HANDLE the timing differences! currently just assuming always 16 cycles m_timer_io_ready->adjust(clocks_to_attotime(16), 1); // this should take around 10-16 (closer to ~15) cycles to complete for FIFO writes, TODO: but actually depends on what command is written if in command mode } } } /* * combined /RS and /WS line write handler; * /RS is bit 1, /WS is bit 0 * Note this is a hack and probably can be removed later, once the 'real' line handlers above defer by at least 4 clock cycles before taking effect */ void tms5220_device::combined_rsq_wsq_w(u8 data) { uint8_t falling_edges; m_true_timing = true; LOGMASKED(LOG_RS_WS, "/RS and /WS written with %d and %d respectively\n", (data&2)>>1, data&1); uint8_t new_val = data & 0x03; if (new_val != m_rs_ws) { falling_edges = ((m_rs_ws^new_val)&(~new_val)); m_rs_ws = new_val; switch(new_val) { case 0: if (TMS5220_HAS_RATE_CONTROL) // correct for 5220c, probably also correct for cd2501ecd reset(); else /* illegal */ LOGMASKED(LOG_RS_WS, "tms5220_combined_rsq_wsq_w: illegal\n"); return; case 3: /* high impedance */ m_read_latch = 0xff; return; case 2: // /WS active, /RS not /* check for falling or rising edge */ if (!(falling_edges&0x01)) return; /* low to high, do nothing */ /* high to low - schedule ready cycle */ LOGMASKED(LOG_RS_WS, "Scheduling ready cycle for /WS...\n"); /* upon /WS being activated, /READY goes inactive after 100 nsec from data sheet, through 3 asynchronous gates on patent. This is effectively within one clock, so we immediately set io_ready to 0 and activate the callback. */ m_io_ready = false; update_ready_state(); /* Now comes the complicated part: how long does /READY stay inactive, when /WS is pulled low? This depends ENTIRELY on the command written, or whether the chip is in speak external mode or not... Speak external mode: ~16 cycles Command Mode: SPK: ? cycles SPKEXT: ? cycles RDBY: between 60 and 140 cycles RB: ? cycles (80?) RST: between 60 and 140 cycles SET RATE (5220C and CD2501ECD only): ? cycles (probably ~16) */ // TODO: actually HANDLE the timing differences! currently just assuming always 16 cycles m_timer_io_ready->adjust(clocks_to_attotime(16), 1); // this should take around 10-16 (closer to ~15) cycles to complete for FIFO writes, TODO: but actually depends on what command is written if in command mode return; case 1: // /RS active, /WS not /* check for falling or rising edge */ if (!(falling_edges&0x02)) return; /* low to high, do nothing */ /* high to low - schedule ready cycle */ LOGMASKED(LOG_RS_WS, "Scheduling ready cycle for /RS...\n"); /* upon /RS being activated, /READY goes inactive after 100 nsec from data sheet, through 3 asynchronous gates on patent. This is effectively within one clock, so we immediately set io_ready to 0 and activate the callback. */ m_io_ready = false; update_ready_state(); /* How long does /READY stay inactive, when /RS is pulled low? I believe its almost always ~16 clocks (25 usec at 800khz as shown on the datasheet) */ m_timer_io_ready->adjust(clocks_to_attotime(16), 1); // this should take around 10-16 (closer to ~11?) cycles to complete return; } } } /********************************************************************************************** tms5220_data_w -- write data to the sound chip ***********************************************************************************************/ void tms5220_device::data_w(uint8_t data) { LOGMASKED(LOG_RS_WS, "tms5220_write_data: data %02x\n", data); /* bring up to date first */ m_stream->update(); m_write_latch = data; if (!m_true_timing) // if we're in the default hacky mode where we don't bother with rsq_w and wsq_w... data_write(m_write_latch); // ...force the write through instantly. else { /* actually in a write ? */ if (!(m_rs_ws == 0x02)) LOGMASKED(LOG_RS_WS, "tms5220_data_w: data written outside ws, status: %02x!\n", m_rs_ws); } } /********************************************************************************************** tms5220_status_r -- read status or data from the sound chip ***********************************************************************************************/ uint8_t tms5220_device::status_r() { // prevent debugger from changing the internal state if (!machine().side_effects_disabled()) m_stream->update(); /* bring up to date first */ if (!m_true_timing) { // prevent debugger from changing the internal state if (machine().side_effects_disabled()) return status_read(false); return status_read(true); } else { /* actually in a read ? */ if (m_rs_ws == 0x01) return m_read_latch; else LOGMASKED(LOG_RS_WS, "tms5220_status_r: data read outside rs!\n"); return 0xff; // m_write_latch; // TODO: return open bus? } } /********************************************************************************************** tms5220_ready_r -- return the not ready status from the sound chip ***********************************************************************************************/ READ_LINE_MEMBER( tms5220_device::readyq_r ) { // prevent debugger from changing the internal state if (!machine().side_effects_disabled()) m_stream->update(); /* bring up to date first */ return !ready_read(); } /********************************************************************************************** tms5220_int_r -- return the int status from the sound chip ***********************************************************************************************/ READ_LINE_MEMBER( tms5220_device::intq_r ) { // prevent debugger from changing the internal state if (!machine().side_effects_disabled()) m_stream->update(); /* bring up to date first */ return !int_read(); } /********************************************************************************************** tms5220_update -- update the sound chip so that it is in sync with CPU execution ***********************************************************************************************/ //------------------------------------------------- // sound_stream_update - handle a stream update //------------------------------------------------- void tms5220_device::sound_stream_update(sound_stream &stream, std::vector<read_stream_view> const &inputs, std::vector<write_stream_view> &outputs) { int16_t sample_data[MAX_SAMPLE_CHUNK]; auto &output = outputs[0]; /* loop while we still have samples to generate */ for (int sampindex = 0; sampindex < output.samples(); ) { int length = (output.samples() > MAX_SAMPLE_CHUNK) ? MAX_SAMPLE_CHUNK : output.samples(); /* generate the samples and copy to the target buffer */ process(sample_data, length); for (int index = 0; index < length; index++) output.put_int(sampindex++, sample_data[index], 32768); } } /********************************************************************************************** tms5220_set_frequency -- adjusts the playback frequency ***********************************************************************************************/ void tms5220_device::device_clock_changed() { m_stream->set_sample_rate(clock() / 80); } DEFINE_DEVICE_TYPE(TMS5220C, tms5220c_device, "tms5220c", "TMS5220C") DEFINE_DEVICE_TYPE(TMS5220, tms5220_device, "tms5220", "TMS5220") DEFINE_DEVICE_TYPE(CD2501E, cd2501e_device, "cd2501e", "CD2501E") DEFINE_DEVICE_TYPE(TMS5200, tms5200_device, "tms5200", "TMS5200") DEFINE_DEVICE_TYPE(CD2501ECD, cd2501ecd_device, "cd2501ecd", "CD2501ECD") tms5220c_device::tms5220c_device(const machine_config &mconfig, const char *tag, device_t *owner, uint32_t clock) : tms5220_device(mconfig, TMS5220C, tag, owner, clock, TMS5220_IS_5220C) { } tms5220_device::tms5220_device(const machine_config &mconfig, const char *tag, device_t *owner, uint32_t clock) : tms5220_device(mconfig, TMS5220, tag, owner, clock, TMS5220_IS_5220) { } tms5220_device::tms5220_device(const machine_config &mconfig, device_type type, const char *tag, device_t *owner, uint32_t clock, int variant) : device_t(mconfig, type, tag, owner, clock) , device_sound_interface(mconfig, *this) , m_variant(variant) , m_irq_handler(*this) , m_readyq_handler(*this) , m_speechrom_tag(nullptr) , m_m0_cb(*this) , m_m1_cb(*this) , m_addr_cb(*this) , m_data_cb(*this) , m_romclk_cb(*this) { } cd2501e_device::cd2501e_device(const machine_config &mconfig, const char *tag, device_t *owner, uint32_t clock) : tms5220_device(mconfig, CD2501E, tag, owner, clock, TMS5220_IS_CD2501E) { } tms5200_device::tms5200_device(const machine_config &mconfig, const char *tag, device_t *owner, uint32_t clock) : tms5220_device(mconfig, TMS5200, tag, owner, clock, TMS5220_IS_5200) { } cd2501ecd_device::cd2501ecd_device(const machine_config &mconfig, const char *tag, device_t *owner, uint32_t clock) : tms5220_device(mconfig, CD2501ECD, tag, owner, clock, TMS5220_IS_CD2501ECD) { }
Q: How to handle mututally/recursively related tables? I'm pretty new to databases and sql. I have a problem where I have two tables which both contain a foreign key to the primary key of the other. My problem is I have a large number of elements which can have multiple names in different languages, but MUST have a single primary name/language. alt text http://img688.imageshack.us/img688/1121/11768540.png Firstly, I want to know if this is possible, or should I just give up already? The obvious solution is to have an extra boolean field in the ElementName table to say IsDefaultName, but it adds some extra complexity for querying and updating. If this is the best solution, how do I constrain the ElementName table to not accept any submission if IsDefaultName is set and the table already has an entry with the same ElementId and IsDefaultName set (or would I need to query this manually)? I'm attempting to use LINQ to SQL here. The code I'm using to attempt to insert new items throws an exception at SubmitChanges with The INSERT statement conflicted with the FOREIGN KEY constraint "FK_ElementName_Element". I can understand why this is, but wondering if there's a fix/better solution. var db = new MyDBDataContext(); var element = new Element(); var elementName = new ElementName() { ElementName1 = "MyElement", Language = "English", }; element.ElementName = elementName; db.Elements.InsertOnSubmit(element); db.ElementNames.InsertOnSubmit(elementName); db.SubmitChanges(); A: Solution 1 element ------------------ element_id ~.... element_name ------------------ element_name_id fk_element_id name language_id is_default_name Default ( 0 ) Trigger: if ( ( select count ( 1 ) from element_name where is_default_name = 1 ) > 1 ) BEGIN raisError ( 'only 1 element_name may be marked is_default_name = true.', 16, 1 ); END Solution 2 element ------------------ element_id ( pk ) ~.... element_name ------------------ element_name_id ( pk ) fk_element_id name language_id element_name_default ------------------ fk_element_id fk_element_name_id ( pk - fk_element_id, fk_element_name_id ) Solution 3 element ------------------ element_id fk_element_name_id_default NULL ~.... element_name ------------------ element_name_id fk_element_id name language_id order of code: * Insert to element_name * update of element I would stick with what you had, cause it is just fine, just: db.Elements.InsertOnSubmit(element); db.ElementNames.InsertOnSubmit(elementName); //I don't know this syntax to say // set the property of element.fk_element_name_id_default // to the newly inserted elementName from above db.Elements.?.?
Mahler: Symphony No. 1 'Titan'; Janácek: Sinfonietta AllMusic Review by James Leonard Here we have two studio recordings by Rafael Kubelik made in monaural for Decca in the mid-'50s with the Wiener Philharmoniker: a Mahler First from 1954 and a Janácek Sinfonietta from 1955. Listeners who remember the Czech conductor's later stereo recordings of these works for Deutsche Grammophon will need no more encouragement to seek out this disc, but those who don't, or who don't recall the conductor, may need further information before reaching a decision. To start with, Kubelik is generally agreed to be one of the best Czech conductors of the twentieth century, whose readings of both Czech repertoire and the Austro-Germanic repertoire were highly regarded for their lyricism, flexibility, and intensity. When these recordings were made, Kubelik had long been a passionate champion of Mahler's music even when it was unfashionable to do so, and he was also known as an ardent advocate of Janácek's operas outside Czech-speaking countries. It should come as no surprise that these performances are excellent, though they are only so up to a point. Kubelik brings out the singing, triumphant qualities of Mahler, while his Janácek rings out with pride and patriotism. However, the Viennese musicians are unfortunately unfamiliar with both pieces, and they cannot manage the scores without stumbling. Mahler's gargantuan climaxes are not always together and Janácek's fanfares are out of sync. Listeners who love Kubelik and the music may be able to overlook these blemishes; listeners less attached to either may have more difficulty letting them pass. Decca's half-century-old monaural sound will be fine for listeners accustomed to half-century-old sound, but listeners used to the clarity and brightness of digital recordings may find its warm textures too thick and its rich colors too heavy.
Hughie Edwards VC Wing Commander Edwards, although handicapped by a physical disability resulting from a flying accident, repeatedly displayed gallantry of the highest order in pressing home bombing attacks from very low heights against strongly defended objectives. On 4th July, 1941, he led an important attack on the port of Bremen, one of the most heavily defended towns in Germany His attack had to be made in daylight and there were no clouds to afford concealment. During the approach to the German coast several enemy ships were sighted and Wing Commander Edwards knew that his aircraft would be reported and that the defences would be in a state of readiness. Undaunted by this misfortune he brought his formation 50 miles overland to the target, flying at a height of little more than 50 feet, passing under high-tension cables, carrying away telegraph wires, and finally passing through a formidable balloon barrage. On reaching Bremen he was met with a hail of fire, all aircraft were hit and four destroyed. Nevertheless he led a most successful attack, and then with the greatest skill and coolness withdrew the surviving aircraft without further loss. "Throughout the execution of this operation, which he had planned personally with full knowledge of the risks entailed, Wing Commander Edwards displayed the highest possible standard of gallantry and determination." [London Gazette: 22nd July 1941] Hughie EDWARDS was born at Fremantle, Western Australia, on 1 August 1914. He died in Sydney on 5 August 1982 and was buried in the Northern Suburbs Cemetery, Sydney, New South Wales.
537 What is the next term in -2481, -2484, -2487, -2490, -2493? -2496 What is the next term in -330, -463, -682, -987, -1378, -1855? -2418 What is the next term in 167, 94, 21? -52 What is the next term in -176, -489, -1340, -2999, -5736, -9821, -15524? -23115 What is the next term in 29212, 29224, 29236, 29248, 29260, 29272? 29284 What is next in 6693, 13378, 20063, 26748? 33433 What is next in -19446, -38888, -58330? -77772 What is next in -1038, -4226, -9562, -17046, -26678? -38458 What is next in 3089, 12371, 27835, 49475, 77285, 111259, 151391? 197675 What comes next: 6004, 6006, 6008, 6010, 6012? 6014 What is the next term in -6662, -13007, -19354, -25703? -32054 What is next in -47, -168, -373, -668, -1059, -1552? -2153 What is the next term in -13471, -13469, -13467, -13465? -13463 What comes next: -261616, -261617, -261618, -261619? -261620 What is next in -110, -204, -304, -416, -546? -700 What comes next: -1034, -1015, -978, -917, -826, -699? -530 What is next in -357, -435, -513, -591, -669? -747 What comes next: 19, -15, -49, -83, -117, -151? -185 What comes next: -108, -164, -334, -678, -1256, -2128, -3354, -4994? -7108 What comes next: 10, -91, -192? -293 What is next in -441056, -882128, -1323200? -1764272 What is next in -143, 144, 857, 1996? 3561 What is the next term in 20712, 20682, 20652, 20622? 20592 What is next in -7392, -7399, -7406? -7413 What is the next term in 36043, 36147, 36249, 36349, 36447? 36543 What is the next term in 660, 572, 484? 396 What is the next term in -506, -2048, -4620, -8222, -12854, -18516? -25208 What comes next: -1753, -3118, -4481, -5842, -7201, -8558, -9913? -11266 What is the next term in 63381, 126763, 190145? 253527 What is next in 31463, 31430, 31397, 31364? 31331 What is next in -17, -296, -1025, -2420, -4697, -8072? -12761 What is next in 660, 719, 792, 885, 1004, 1155? 1344 What is the next term in 134757, 134802, 134865, 134952, 135069, 135222, 135417? 135660 What is the next term in -4827, -4842, -4857? -4872 What is the next term in 6851, 6602, 6353, 6104, 5855? 5606 What is the next term in 1565, 3133, 4689, 6233, 7765, 9285, 10793? 12289 What is the next term in 10752, 10739, 10726, 10713, 10700, 10687? 10674 What comes next: 16331, 16616, 16901, 17186, 17471, 17756? 18041 What is next in -85221, -340907, -767051, -1363653? -2130713 What is the next term in 797, 823, 867, 929? 1009 What comes next: -3416, -6680, -9930, -13160, -16364, -19536, -22670, -25760? -28800 What is the next term in 390275, 780540, 1170805? 1561070 What is next in -303, -280, -255, -228, -199? -168 What is the next term in 3849, 7697, 11545, 15393, 19241? 23089 What comes next: -122, -191, -272, -365, -470? -587 What is the next term in -4758, -4752, -4750, -4758, -4782, -4828, -4902? -5010 What is next in 254, 713, 1386, 2273, 3374, 4689, 6218? 7961 What comes next: 188740, 188744, 188752, 188764, 188780, 188800, 188824? 188852 What is next in -636, -682, -728? -774 What is the next term in -1844, -3686, -5506, -7310, -9104? -10894 What is the next term in -2890, -2903, -2916, -2929, -2942, -2955? -2968 What is next in 106859, 106863, 106867, 106871, 106875, 106879? 106883 What is the next term in -165, -680, -1541, -2754, -4325, -6260? -8565 What is the next term in 1418, 1356, 1294, 1232? 1170 What comes next: -80298, -321188, -722672, -1284750? -2007422 What comes next: 858, 903, 948? 993 What is next in -2114, -2198, -2330, -2504, -2714? -2954 What is next in 1332306, 1332307, 1332308, 1332309? 1332310 What is next in 194681, 194682, 194683, 194684, 194685, 194686? 194687 What is next in -123995, -123993, -123991? -123989 What comes next: -208, -377, -546, -715? -884 What comes next: 7467, 14896, 22299, 29664, 36979, 44232, 51411, 58504? 65499 What is the next term in 1477, 2936, 4403, 5878, 7361, 8852, 10351? 11858 What is the next term in 5, 94, 257, 488, 781, 1130? 1529 What comes next: 105895, 105898, 105901, 105904, 105907, 105910? 105913 What comes next: -4446, -4446, -4452, -4464, -4482? -4506 What is the next term in 24109, 48220, 72331, 96442, 120553, 144664? 168775 What is the next term in 32763, 65518, 98273, 131028, 163783? 196538 What is next in 353, 340, 307, 248, 157, 28, -145? -368 What is the next term in 105, 1859, 4781, 8871, 14129? 20555 What comes next: -159, -174, -187, -198, -207, -214? -219 What comes next: -290, -694, -1098, -1502, -1906? -2310 What is next in 1183, 1259, 1337, 1417, 1499, 1583, 1669? 1757 What is the next term in -1697, -1707, -1717, -1727, -1737, -1747? -1757 What is the next term in -374, -815, -1254, -1691, -2126, -2559? -2990 What comes next: 128, 235, 330, 413, 484? 543 What is the next term in 1260, 2429, 3598, 4767? 5936 What comes next: 2838, 2850, 2862, 2874, 2886? 2898 What is next in 57941, 115883, 173825? 231767 What comes next: -40124, -80249, -120374? -160499 What is the next term in -1351533, -1351529, -1351525, -1351521, -1351517? -1351513 What is the next term in -909, -563, -217, 129, 475? 821 What is the next term in -448912, -448918, -448924, -448930, -448936? -448942 What is the next term in -2135, -2605, -3079, -3557, -4039, -4525? -5015 What is next in -162, -563, -1218, -2127, -3290? -4707 What is next in -52347, -104705, -157063, -209421, -261779? -314137 What comes next: 430, 851, 1260, 1657? 2042 What is next in -680, -698, -746, -836, -980? -1190 What comes next: -1101, -8808, -29739, -70506, -137721, -237996? -377943 What comes next: -256883, -256885, -256887, -256889, -256891, -256893? -256895 What is the next term in 261, 250, 203, 102, -71? -334 What comes next: -59, -439, -1491, -3557, -6979, -12099, -19259, -28801? -41067 What is the next term in -4740, -37902, -127926, -303246, -592296, -1023510, -1625322, -2426166? -3454476 What is the next term in 12199, 12160, 12095, 12004? 11887 What is the next term in 782, 1081, 1376, 1661, 1930, 2177, 2396, 2581? 2726 What comes next: -436137, -872283, -1308429? -1744575 What comes next: -1843, -7928, -18071, -32272, -50531, -72848, -99223? -129656 What is next in -25723, -25733, -25749, -25771, -25799? -25833 What is next in 845, 115, -1865, -5719, -12071, -21545? -34765 What comes next: 370, 360, 302, 202, 66, -100, -290? -498 What is next in 126, 565, 1400, 2715, 4594? 7121 What is next in -909956, -909954, -909952, -909950? -909948 What is the next term in -335210, -335212, -335214, -335216, -335218, -335220? -335222 What comes next: 745845, 745846, 745847, 745848? 745849 What comes next: 381, 332, 283, 234? 185 What is the next term in -966, -926, -816, -600, -242, 294, 1044, 2044? 3330 What comes next: -545205, -1090420, -1635635, -2180850? -2726065 What is the next term in -867389, -867395, -867403, -867413? -867425 What is next in 684221, 1368440, 2052661, 2736884, 3421109, 4105336, 4789565? 5473796 What is next in 412, 846, 1280, 1714? 2148 What is the next term in 217, 526, 1041, 1762, 2689, 3822? 5161 What comes next: 142341, 142346, 142353, 142362? 142373 What is the next term in 195, 132, -193, -780? -1629 What comes next: 2567, 4995, 7423? 9851 What is next in -1458, -5821, -13086, -23253, -36322, -52293? -71166 What is the next term in 29083, 29104, 29137, 29188, 29263? 29368 What comes next: 15, -82, -291, -612? -1045 What comes next: -13548, -13540, -13532, -13524? -13516 What is next in 1006, 4043, 9114, 16219, 25358, 36531, 49738? 64979 What comes next: -436, -4277, -14888, -35653, -69956, -121181, -192712? -287933 What is next in 4877, 4484, 4079, 3656, 3209, 2732, 2219? 1664 What comes next: -20250, -20264, -20280, -20298? -20318 What is the next term in 2298, 9220, 20756, 36906? 57670 What is the next term in -234502, -469027, -703554, -938083, -1172614? -1407147 What comes next: 1966, 3783, 5576, 7333, 9042, 10691, 12268? 13761 What comes next: -13606, -13691, -13778, -13867, -13958? -14051 What comes next: 493, 971, 1439, 1897, 2345, 2783? 3211 What comes next: -178184, -178187, -178190, -178193? -178196 What comes next: -2661, -2686, -2711, -2736? -2761 What is the next term in 29285, 29286, 29287, 29288, 29289, 29290? 29291 What comes next: -1502, -1516, -1550, -1604? -1678 What is next in 4178, 22814, 53882, 97388, 153338, 221738, 302594, 395912? 50169
Q: Creating a probability matrix with its label matrix I have this process in R: M=4 n=3 number = runif(M,0,1) label =LETTERS[1:M] res <- xtabs(data.frame(c(number),c(label))) sample <- sample(res,choose(n,2), replace = TRUE) prob.matrix <- matrix(0, nrow = 3, ncol = 3) prob.matrix[upper.tri(prob.matrix )]<- sample and get a triangle matrix of probability which were sampling. For example if there is: > res c.label. A B C D 0.1668435 0.6432194 0.9573289 0.3870988 > sample c.label. C C A 0.9573289 0.9573289 0.1668435 > prob.matrix [,1] [,2] [,3] [1,] 0 0.9573289 0.9573289 [2,] 0 0.0000000 0.1668435 [3,] 0 0.0000000 0.0000000 more than prob.matrix, I want to have a label matrix that shows the label of each probability,such as: > label.matrix [,1] [,2] [,3] [1,] 0 C C [2,] 0 0 A [3,] 0 0 0 What should i do for getting label.matrix? A: Maybe you can try the code below label.matrix <- prob.matrix label.matrix[label.matrix!=0] <- names(sample) or label.matrix <- prob.matrix label.matrix[upper.tri(label.matrix)] <- names(sample)
Wisconsin is the latest state to line up behind a national effort to amend the Constitution and cripple the federal government's ability to spend — llikely forcing steep cuts in popular earned benefit programs such as Social Security and blocking Congress from responding to economic downturns or natural disasters — apparently with the ultimate goal of completely overhauling America's system of governance. Assembly Joint Resolution 81, which passed out of committee on Wednesday, would call for an Article V Constitutional Convention to force a federal balanced budget amendment. Article V of the U.S. Constitution provides that thirty-four states (two-thirds) can trigger a convention to propose an amendment, which must then be ratified by 38 states (three-fourths). The legislation closely tracks the “Balanced Budget Amendment Resolution” from the American Legislative Exchange Council (ALEC) and allied advocacy groups promoting an Article V convention. “AJR 81 comes right out of the ‘Convention of States’ workshop and materials presented at ALEC where state legislators were promised bundled campaign contributions and grassroots support if they joined this effort to amend the federal constitution,” said Rep. Chris Taylor, a Madison Democrat who attended ALEC’s Annual Meeting in Chicago last summer, in a statement. “I am alarmed that this effort is now making its way through the Wisconsin legislature and is tentatively scheduled to be considered by the full Assembly next Tuesday.” ALEC has published a “how-to” manual for an Article V constitutional amendment, and at its last two meetings hosted workshops on amendment strategy from the group “Citizens for Self Governance,” led by Tea Party Patriots co-founder Mark Meckler, and whose board includes Wisconsinite Eric O’Keefe (who has spoken publicly about being subpoenaed in Wisconsin’s John Doe probe in his role as Director of Wisconsin Club for Growth). Citizens for Self Governance seeks to use the amendment process to severely restrict federal power, for example by redefining the Commerce Clause to prohibit Congress from enacting child labor or anti-discrimination laws. In recent years, the Article V idea has spread in Republican circles thanks to right-wing radio host and author Mark Levin, and has been elevated by the likes of Glenn Beck. Following ALEC’s December 2013 meeting in Washington D.C., the primary sponsor of AJR 81, Wisconsin Rep. Chris Kapenga (R-Delafield), co-organized a convening of around 100 state legislators to discuss the Article V amendment process. (Last year, Rep. Kapenga was one of nine Wisconsin lawmakers who told a Tea Party group they would seek to arrest federal officials implementing the Affordable Care Act in the state). A followup meeting is planned for Spring of this year. The push for a constitutional convention has garnered limited attention in the mainstream media. "A lot of Americans outside of these conservative circles have no idea this is going on, that all of these strategies are being developed to basically neuter the federal government, and what the ramifications of those strategies would be in the long run,” says Rachel Tabachnik, a research fellow at Political Research Associates, who has tracked the evolution of “state’s rights” efforts to amend the constitution. “These states are seeking to undo all civil rights, social safety nets, and regulatory functions that they don't want." Goal: Cripple Federal Responses to Economic Crises and Disasters Although some advocates have pushed for a broader call for a constitutional convention — the Convention of States group, for example, hopes to "call a convention for a particular subject rather than a particular amendment" to radically alter state-federal relations — AJR 81 is focused more narrowly on calling for a balanced budget amendment. Since World War II, the federal government has deliberately used deficit spending as a policy tool to soften economic downturns, preventing recessions from turning into depressions by spending on programs like unemployment benefits, targeted tax breaks, or jobs training. Tax revenues decline during a recession, just as these necessary expenditures increase. Similarly, natural disasters can wreak havoc on the economy, and disaster relief can also require deficit spending. A Balanced Budget Amendment would handcuff the government at a time when economic crises, drought, and catastropic hurricanes are on the rise. As Jon Peacock of the Wisconsin Budget Project explains: A balanced budget amendment in the U.S. Constitution would result in much longer and deeper recessions and would cause unnecessary job losses. When the economy goes into a dive and people are without jobs, the need for food stamps, health insurance and unemployment insurance rise sharply. Since tax revenue typically falls as the need for those programs rises, a balanced budget would require cuts to these safety net programs and other areas of spending at the worst possible time. That would not only take away vital help during a recession, but would also exacerbate the downturn by requiring program cuts and/or tax increases as the recession worsens. A highly respected economic forecasting firm, Macroeconomic Advisers, considered the effects of a balanced budget amendment during a period like the recent recession. They described the impact on the economy of cutting spending at such a time as “catastrophic” – leading to depression-like conditions and millions of additional jobs lost. A balanced budget amendment is also likely to jeopardize Social Security and other earned assistance upon which retirees depend. Companion Bill to Rein-In "Runaway Convention" Reflects ALEC Model The right is not united in their support for the Article V constitutional amendment effort. The U.S. Constitution has never been amended through the Article V process, and many fear a "runaway convention" where delegates approve amendments other than a balanced budget — for example, an amendment that would address the harm caused by the Supreme Court's Citizens United decision. The Heritage Foundation opposes an Article V convention for these reasons. One of the most consistent critics of the Article V effort has been The John Birch Society; the Convention of States group has taken their criticism seriously enough to post a response on their website. In response to those fears, Rep. Kapenga has introduced a companion bill, AB 635, aimed at stymieing a “runaway convention” by declaring that delegates to the convention may not vote on other issues besides the balanced budget amendment, and providing that those who do will be immediately dismissed by the other delegates. This is nearly a word-for-word copy of the ALEC “Resolution for Limitations on Authority of state Delegates to a ‘Convention for Proposing Amendments’ under Article V of the US Constitution.” Almost every Republican member of the Wisconsin Assembly has signed on as co-sponsors to AJR 81 and AB 635. Lobbying for the bill in Wisconsin are Americans for Prosperity, the state U.S. Chamber of Commerce affiliate Wisconsin Manufacturers and Commerce, as well as the National Federation of Independent Business, which purports to represent small business but is a front for right-wing corporate interests. Outside of Tea Party circles, it does not appear that most Wisconsinites were clamoring for their legislators to push this proposal. But it does not appear that citizen support is a necessary component of the Article V convention effort. At last year's ALEC meeting in Chicago, where an Article V convention was discussed, Rep. Taylor recounted a conversation with a private sector ALEC member. In response to her concerns about average Americans not wanting a radical overhaul of their Constitution, he told her: "You really don't need people to do this. You just need control over the legislature and you need money, and we have both."
B and T cells in the brains of autoimmune mice. Systemic lupus erythematosus (SLE) is an autoimmune disorder that can involve the central nervous system (CNS). Recently, we reported the presence of autoantibodies bound to the brain tissue of murine models of lupus; MRL/lpr and BXSB. We postulated that the source of these autoantibodies was in part due to in situ production, caused by the entry of B and T cells. Frozen brain sections of MRL/lpr and BXSB at 1 and 4 months of age were stained for CD3 (T cells) and CD19 (B cells) markers using an immunofluorescent antibody binding assay. Confocal fluorescence microscopy showed both CD3(+) and CD19(+) cells at 4 months of age only in MRL/lpr mice. There were no lymphocytes seen in the other autoimmune model, BXSB. Results suggest a difference in the mechanisms by which autoantibodies access the brain in these two autoimmune models of lupus.
Suzanne Hinn filed the papers in Orange County Superior Court on Feb. 1 2010, citing irreconcilable differences, after more than 30 years of marriage. The papers note the two separated on Jan. 26 and that Hinn has been living in Dana Point, a wealthy coastal community in southern Orange County. Benny Hinn is one of the best known advocates of the prosperity gospel, which teaches that Christians who are right with God will be rewarded with wealth and health in this lifetime. His TV broadcasts on the Trinity Broadcast Network, a Pentecostal broadcasting juggernaut, and other TV networks are seen by millions of people around the world nearly every day. He travels the globe in his ministry’s plane, named Dove One, holding events he calls “Miracle Crusades” that include spiritual healings. Hinn has never fully publicly disclosed how he spends the money he raises, but his vast ministry is believed to be a multimillion-dollar operation. There was no mention of finances in the court filing, which listed three recent Southern California addresses for the family “Suzanne started taking certain prescription medications to help her cope with some of her personal struggles. She became dependent on those for nearly 15 years, and those medications made her behave erratically at times,” As her husband, I did not know the extent of her reliance on these medications, nor did I fully understand just how much harm they were causing to her, physically and emotionally.” -Hinn wrote in a message on his ministry website.
Ex-LSU Football Player Loses Leg After Dog Shoots Him During Hunting Trip Share this: VICKSBURG, Miss. — A Louisiana father and former LSU football player nearly lost his life during a late-December hunting trip when a dog managed to discharge a shotgun, striking the man in the leg. Matt Branch was preparing to move positions during a duck hunt with friends on family-owned property near Mississippi’s Eagle Lake on Dec. 28 when the Labrador retriever shot him. Branch had put his 12-gauge shotgun into the bed of a truck as the group prepared to move 200 yards along a slough around 9:40 a.m., reports the Clarion Ledger. That’s when the dog named Tito jumped in the truck bed, stepped on the gun’s safety lock, then touched the trigger, according to Branch’s friend, Micah Heckford: “Within two to three seconds [Branch] realized he was hit.” Per the Vicksburg Post, a bullet left in the gun’s chamber shot though the side of the truck bed, hitting the inside of Branch’s upper left thigh. After calling 911, the group drove Branch to an area accessible to first responders, who removed his pants. “That’s when it hit me how serious it was,” Heckford says, per the Ledger. “His pants were just soaked in blood.” A former LSU offensive lineman and father to a 1-year-old son, Branch—in stable condition at a Jackson hospital—has since undergone “multiple critical surgeries including the partial amputation of his left leg and re-connecting his femoral artery in his left upper leg,” Heckford writes in a viral Facebook post, intended to remind even the most experienced hunters about the importance of gun safety. “There was 80+ years of hunting experience amongst our group,” it reads. “DO NOT let complacency get the best of you … Treat ALL guns like they are loaded, at ALL times.”
Stare at this image for two minutes every day, morning and evening, and you will significantly improve your concentration. As a result you will also improve your memory, says Frank Felberbaum, coach of the USA Memory Championship team. He recommends using a mandala — a concentric design, like the one seen above, often found in Eastern religious art. “Try having the TV on and then looking at the mandala [while] trying to block out the program,” he recommends. “After six weeks, your concentration will increase 20 to 25 percent.” And you really need it. The average human attention span has fallen from 12 seconds in 2000 to eight seconds in 2016, thanks to our reliance on technology — and our memories have taken a hit, too. “Most people will admit their memory isn’t good, but they complain about it,” says Felberbaum. “But memory is a process — if you can control the process you can control your memory. All you need are the right techniques.” On Saturday Felberbaum will be teaching some of these methods at the Rubin Museum, transforming the space into a “memory palace” — a mental device employed by ancient Greeks to remember oratory and by Benedict Cumberbatch’s Sherlock Holmes to solve mysteries — that will allow visitors to retain all the information and images they come across. “The idea is to go back to your office or go home and, when you close your eyes, experience your visit all over again,” says Felberbaum. The process requires visualizing a structure, like your home, and populating it with information to retrieve later. For example, when you’re running errands after work, mentally walk through your space and see a chicken in the bedroom (pick up rotisserie) and ballet slippers dancing out of your drawer (get cash to pay your friend for tickets to a dance performance). “You don’t need to be born with amazing visual recall,” Felberbaum says. “Just practice, internalize it, and eventually it becomes part of you.” Here are a few more puzzles that will help you become a memory master.
Our Mission is to keep our audience with an interrupted stream of financial information from serious sources, with the objective to provide the tools and sufficient knowledge about investments in the financial markets. we inform you, for example, closing market reports(Asia Europe & U.S.) CNBC Selected News, The Guardian, Washington Post, New York Times Selected News, selected financial news and videos, the Fed, FDIC, SEC, FTC press releases and enforcement actions. FGC BOLSA - FGC FINANCIAL MARKETS.info Translate Search This Blog Search Tool May 22, 2019 By Billy House 6-8 minutes Nancy Pelosi Photographer: Stefani Reynolds/Bloomberg Speaker Nancy Pelosi is facing new pressure from House Democrats to open impeachment proceedings as she plans to meet with her party behind closed doors on Wednesday to discuss President Donald Trump’s defiance of congressional investigations. Several influential Democratic lawmakers, including a few top Pelosi lieutenants, in recent days joined calls to begin an impeachment inquiry, spurred by Trump’s move to prevent former White House Counsel Don McGahn from testifying Tuesday before the House Judiciary Committee. Pelosi, who is also scheduled to meet with Trump on Wednesday to discuss infrastructure proposals, remains deeply reluctant to pursue impeachment, worried that the move could backfire on her party and motivate Trump’s base. But her strategy is coming under greater second-guessing. In at least two private meetings this week, Pelosi was pressed by Democrats to consider moving more quickly toward impeachment. In one of the meetings, Judiciary Chairman Jerrold Nadler conveyed that some of his panel’s Democrats now want to pursue that option, according to a House official. His committee would likely oversee the early stages of such an inquiry. A vocal minority, including Financial Services Chairman Maxine Waters and Alexandria Ocasio-Cortez, has long been calling for Trump’s impeachment, with even more urgency since Special Counsel Robert Mueller’s report was released. But until this week, that talk had been relatively isolated. And Pelosi retains many influential supporters who firmly back her go-slow approach, including No. 3 House Democrat James Clyburn and long-time ally Rosa DeLauro. After McGahn snubbed the House Judiciary panel on Tuesday, Democrats appeared to be split over the next steps. Panel members scrapped a post-hearing press conference Tuesday when they couldn’t agree on what to say, according to a person familiar with the matter. "I think that we are probably going to wind up there,” at impeachment, Karen Bass, a Democrat on the Judiciary panel and chairwoman of the Congressional Black Caucus, told reporters after the hearing. "I don’t know if that is today; I don’t know if we might be forced to act very soon." She added that the House needs to speed up its investigation of Trump to counter the legal obstacles the administration is staging. Jamie Raskin Photographer: Joshua Roberts/BloombergDemocrats aren’t keeping a formal whip count, and one Judiciary Committee Democrat, Jamie Raskin of Maryland, said this isn’t an issue where the most votes should win. “I would say that there are arguments for doing it, but we have to agree collectively," said Raskin, who said he recently changed his mind in favor of launching an inquiry. Representative Sheila Jackson Lee of Texas, a senior Judiciary panel member, offered a more cautious approach. She told reporters that in the next two days she will introduce a resolution to authorize the Judiciary Committee to investigate whether there are sufficient grounds to launch an impeachment inquiry -- in other words, an investigation into whether there should be an impeachment investigation. “We believe and continue to believe that we are doing the right thing by investigating, and that our task is to educate before we activate, and that is what we will do,” Jackson Lee said. Sheila Jackson Lee Photographer: Al Drago/BloombergPelosi has complained that the drip-drip-drip of legal battles with the administration over investigations underway in six committees was overtaking the party’s legislative agenda. The House won the opening round of one court battle on Monday, when a federal judge ruled that Trump’s longtime accounting firm should comply with a subpoena from the House Oversight and Reform Committee and hand over his financial records. Trump is appealing the ruling. On Wednesday, a different federal judge is set to hear a similar case in which Trump is seeking to block subpoenas of Deutsche Bank AG and Capital One Financial Corp. for documents related to Trump, his companies and his family. Raskin and other Democrats have told Pelosi that an impeachment inquiry would be a more streamlined, centralized route to obtain the documents and witness information related to Trump. But Pelosi has said that impeachment is so divisive to the country that unless there’s something so compelling and overwhelming and bipartisan, "I don’t think we should go down that path, because it divides the country." She also has said Trump is "not worth it." Pelosi’s tone shifted slightly this week, making the case that the Trump investigations led by multiple House committees are beginning to yield some investigative results and court victories. The speaker also appeared to be defending the turf of some committee chairman -- many of them longtime Pelosi allies -- when Democrat Steve Cohen of Tennessee on Monday pressed for an impeachment inquiry. She responded to Cohen by asking if he was advocating for shutting down the five other committees -- aside from Judiciary -- that are working on Trump-related issues. She even noted that the chairman of the Oversight and Reform Committee, Elijah Cummings of Maryland, had just won a court victory Monday. Still, most of the new converts to impeachment this week suggested they were tired of Trump’s stonewalling on House committee requests for witness testimony and documents, and that an impeachment inquiry will provide those efforts with greater legal heft. “More of my colleagues are coming around, reluctantly, to the reality that impeachment is necessary, unavoidable, and urgent,” California Democrat Jared Huffman said on Twitter. “This week feels like the tipping point.” No comments: Post a Comment Advertisement Advertisement ADVERTISEMENT ADVERTISEMENT ADVERTISEMENT ADVERTISEMENT ADVERTISEMENT FRAUDE DE LOS BANCOS-PERÚ If you are are investigating a fraud case and need to contact MasterCard to assist with the investigation. Who can we speak with? A: Please send an email to our Law Enforcement Support Center at Law_Enforcement_Support@mastercard.com, or call 1-866-308-7272 (U.S. & Canada) or 1-636-722-4046 (International). We will respond to your inquiry within 24-48 hours.
Characterization of a spectrophotometric assay for cAMP phosphodiesterase. The hydrolysis of cAMP can be monitored spectrophotometrically through the conversion of 5' AMP to 5' IMP using a specific 5' AMP amino-hydrolase (EC3.5.4.6). The optical properties and extinction coefficient differences of these compounds have been quantitatively determined. Phosphodiesterase assayed in this manner is linear with respect to time and enzyme concentration, and is more reliable than conventional assay procedures. Due to the high specificity of the assay system phosphodiesterase can be selectively assayed in unfractionated cytosol. The assay, when conducted on a conventional spectrophotometer, can detect the hydrolysis of 0.5 nmoles cAMP per min.
312 N.E.2d 508 (1974) Anthony M. MELENDEZ et al., Appellants (Defendants below), v. STATE of Indiana, Appellee (Plaintiff below). No. 2-573A113. Court of Appeals of Indiana, Second District. June 20, 1974. *509 Harriette Bailey Conn, Public Defender, Darrell F. Ellis, Deputy Public Defender, Indianapolis, for appellants. Theodore L. Sendak, Atty. Gen., Larry C. Gossett, Deputy Atty. Gen., Indianapolis, for appellee. BUCHANAN, Judge. CASE SUMMARY This is a consolidated appeal by Appellants, Anthony M. Melendez, Dale William Harvey and Leo Lay, Jr., (the Defendants) from denial of their Petitions for Post Conviction Relief wherein they allege their pleas of guilty to the offense of Committing a Felony While Armed With a Deadly Weapon (Theft) were not knowingly, intelligently and voluntarily made, and further claim inadequate representation by their joint counsel. We affirm. FACTS The facts in evidence when viewed most favorably to the State and the judgment of the trial court are: On July 25, 1971, the Defendants were charged with Armed Robbery and Commission of a Felony While Armed With a Deadly Weapon. On August 9, 1971, the Defendants were advised by the trial court of their legal and constitutional rights, and the Court appointed counsel to act for and on their behalf, although the Defendants appeared to have acted pro se at times thereafter. On September 8, 1971, in response to a Motion for Change of Judge, a Special Judge was appointed. On November 16, 1971, the Defendants in person and by their court-appointed counsel appeared in open court and pled guilty to the lesser included offense of Committing a Felony While Armed With a Deadly Weapon (Theft). Counsel for the Defendants negotiated their guilty plea, expending approximately one hundred hours in the process of representing the Defendants. In open court, with an empanelled jury in the wings, the Trial Judge proceeded to extensively question the Defendants, explaining to them their constitutional rights and the nature and consequences of the crime to which they were pleading guilty, and the minimum and maximum punishment for that crime. In response to the Judge's questioning, the Defendants gave every indication they fully understood the nature of the crime with which they were charged and the punishment for that crime and the constitutional consequences of waiving their rights, and gave no indication that they did not do so freely and voluntarily. Further, they each stated that they had an opportunity to carefully read and examine the Affidavits charging them with a crime, and had discussed the entering of their guilty plea fully with their attorney in private, and that they were satisfied with his services. The Trial Judge further asked them if they had any questions concerning their guilty plea, to which they responded in the negative. *510 Thereafter, the Defendants were sentenced to the Indiana State Reformatory for a determinate period of three years. On June 26, 1972, the Defendants filed a Petition for Post Conviction Relief. After hearing held on November 9, 1972, and on November 21, the trial court filed Specific Findings of Fact and Conclusions of Law and entered Judgment denying all three Petitions for Post Conviction Relief. Their Motions to Correct Errors were subsequently overruled, and this appeal follows. ISSUES Two issues are presented for our consideration: ISSUE ONE — Did the Defendants enter their guilty pleas freely, knowingly and voluntarily? ISSUE TWO — Were the Defendants afforded effective and adequate trial counsel? As to ISSUE ONE, the Defendants maintain the Court failed to inform them that they were waiving any constitutional rights and failed to advise them of the consequences of their waiver of these constitutional rights. As to ISSUE ONE, the State points out the Defendants had the burden of proving that their plea was not made voluntarily and knowingly, which they could not and did not sustain because the record amply demonstrates the Defendants were fully advised of their constitutional rights and they knowingly and voluntarily waived them. As to ISSUE TWO, the Defendants claim incomptency of counsel because one counsel was appointed for the three of them to represent them as a group rather than individually, and that such representation is necessarily prejudicial to the interests of each Defendant. DECISION ISSUE ONE CONCLUSION — It is our opinion that the transcript of the guilty plea hearing amply demonstrates that the Defendants' pleas were entered voluntarily and knowingly. The Defendants' argument leans on a slender reed of specificity. They assert the Trial Judge failed in specific language to state they were waiving their constitutional rights and the consequences of their waiver. The reed immediately collapses with even a casual examination of the numerous pages in the record devoted by the Trial Judge to establishing beyond question that the Defendants were fully informed of their constitutional rights and the exact consequences of their waiver. Implicit throughout the extended diaglogue between the trial Judge and the Defendants is the clear implication that by entering a plea of guilty the Defendants were waiving their constitutional rights as set forth in detail by the Judge. Also, these specific statements by the Trial Judge indicate there would be a trial if they did not waive their constitutional rights by pleading guilty. "THE JUDGE: To expand somewhat, as far as your right to a public trial by an impartial jury, you are aware that today this case was scheduled for trial and that presently a jury panel awaits in the court — jury room and the court and counsel as well as the jury is prepared to proceed in the jury trial in the matter of a few moments if you so desire. Do you understant that? * * * * * * "THE JUDGE: Now the court will, at this time, further inform you that your attorney has made a motion for leave to permit each of you to enter a charge of guilty — a plea of guilty — to the crime of the commission of a felony *511 of theft while armed with a deadly weapon, which of course, would permit the court then to impose a penalty of imprisonment for a determinate period of not less than one year nor more than fifteen years — in other words, flat time. Mr. Harvey, do you understand that? "MR. HARVEY: Yes. "THE JUDGE: Mr. Lay? and Mr. Melendez? "MR. LAY and MR. MELENDEZ: Yes. "THE JUDGE: Do you further understand that you do have another opportunity to reconsider any contemplated plea of guilty and that [if] you do so reconsider and determine to continue your full plea of not guilty to all charges as contained or charged in the affidavit that we will proceed to trial in a matter of minutes — you understand that?" In order to waive a constitutional right no exact words are required. Tibbs v. State, (1973) Ind. App., 303 N.E.2d 294. As we said in that case, quoting from Hoelscher v. State: "`This is a question of fact to be determined primarily by the trial court, and unless we can say that upon the evidence there can be no reasonable difference of opinion, the decision of the trial court must stand ... The law requires an intelligent and understanding waiver of constitutional rights. No special form of words is required.' (Emphasis supplied.) Hoelscher v. State, (1944) 223 Ind. 62, 68, 57 N.E.2d 770, 772." 303 N.E.2d at 299. The record before us adequately demonstrates that the Defendants knowingly and voluntarily entered a plea of guilty and waived their constitutional rights in accordance with applicable law as set forth in: Boykin v. Alabama, (1969) 395 U.S. 238, 89 S.Ct. 1709, 23 L.Ed.2d 274; Brimhall v. State, (1972) Ind., 279 N.E.2d 557; Kelly v. State, (1972) Ind., 287 N.E.2d 872; Bonner v. State, (1973) Ind. App., 297 N.E.2d 867. In Bonner this Court summarized the Indiana and Federal requirements as to what the record must contain in order for an accused to knowingly and voluntarily enter a plea of guilty and thereby waive his constitutional rights. There is no need for repetition of that in-depth discussion here. As our Supreme Court concluded in Kelly: "We find nothing in the record in the case at bar which would indicate that appellant was not knowledgeable and exercising his own free choice when he entered his plea of guilty. In fact, there is ample affirmative evidence that his plea of guilty was entered knowingly, freely and understandingly." ISSUE TWO CONCLUSION — It is our opinion that the trial court did not commit error in finding that the Defendants' trial counsel was competent and adequately represented them at the guilty plea hearing. Judge Robertson, in Wilson v. State, (1973) Ind. App., 291 N.E.2d 570, demolished Defendants' argument that representation of co-defendants by counsel for the purpose of negotiating a guilty plea for all is a per se conflict of interest: "Wilson has not presented us with authority, nor have we been able to discover authority, for the proposition that representation of co-defendants for the purpose of negotiating a plea, per se, is a conflict of interest. Wilson's attorney had instructions to obtain for each defendant sentences of the least possible amount of time. This he successfully accomplished. We cannot, therefore, say that there was demonstrable conflicting interests." As in Wilson, Defendants have cited Glasser v. United States, (1941), 315 U.S. 60, 62 S.Ct. 457, 86 L.Ed. 680, in support of the naked proposition that one attorney may not represent a group of accused persons, *512 because to do so would necessarily sacrifice the interests of one or more of the defendants. Glasser does support the principle that one lawyer may not represent conflicting interests in a criminal proceeding, but is distinguishable in that Glasser objected to the joint representation and pointed specifically to the inconsistent interests of the co-defendants. There is no showing on the part of these Defendants that their interests were in fact conflicting or that their right to effective legal representation was in any manner impaired. The presumption that trial counsel discharged his duty fully and competently has not been rebutted. Schmittler v. State, (1950) 228 Ind. 450, 93 N.E.2d 184; Shuemak v. State, (1970) 254 Ind. 117, 258 N.E.2d 158; State v. Irvin, (1973) Ind., 291 N.E.2d 70; Isaac v. State, (1971) Ind., 274 N.E.2d 231; Conley v. State, (1972) Ind., 284 N.E.2d 803; Haddock v. State, (1973) Ind., 298 N.E.2d 418; Tibbs v. State, supra. Judgment affirmed. SULLIVAN, P.J., and WHITE, J., concur.
All pet professionals who care for and about the welfare of these companion animals work hard so responsible pet owners have access to healthy companion animals. The Pet Industry Joint Advisory Council (PIJAC) has recently released comprehensive care, transport, and biosecurity standards for small animal breeders and distributors who will make this important goal more attainable. Lawmakers are considering changes to the state’s breeding licensure provisions, as well as state law regarding who pays for the care of animals seized in abuse and cruelty cases while courts consider charges. State Senate Majority Leader Jeb Bradley, a republican, has said he intends to introduce legislation related to breeding and inspections. The longevity of Petland (and Ed!) is certainly something to celebrate, but it isn’t the anniversary that earned Ed this award. Rather, PIJAC was highlighting his commitment to animal care and innovation, and the significant impact they have had on the companion animal trade. PIJAC is pleased to republish the below editorial from the Hawaii Star-Advertiser. It advocates against Senate Bill 1240, a measure that through scientifically unsound means would ban aquarium fishing in Hawaii. Pets in the workplace have benefits like lowering stress levels and increasing job satisfaction. However, if your workplace does not regularly allow pets, here are a few tips that can help you make your case to a superior about making the event a positive experience for everyone. Earlier this month, a PR group working on behalf of the People for the Ethical Treatment of Animals (PETA) asked a news reporter to pretend a cat is being abused in a video purported to raise awareness about animal abuse. Throughout 2017, PIJAC has made a concerted effort to providing the responsible pet industry’s values and perspectives with relevant media. A huge part of that is creating relationships with the dedicated cat, dog, and other writers who care for and about pets through blogs, social media, and other online sources. According to the American Humane Association, one in three pets become lost in their lifetime, and over 10 million dogs and cats become lost or stolen every year. While identification tags are a popular way to ensure pets have a way of getting home, they simply aren’t enough. According to a growing body of research, the human-animal bond provides demonstrable health benefits for both people and pets. This is especially true for people who use therapy animals – which is why April 30 has been honored as National Therapy Animal Day. For years, the responsible pet industry has been engaging, often pro-actively, with lawmakers to help them understand what ethical retailers and breeders do for pets and pet owners. Those efforts recently helped lead to industry-supported measures becoming law in Virginia, as well as forward movement on animal shelter regulations in Connecticut. Since this sort of “Freaky Friday” swap only happens in Hollywood, let’s look at the reality of pet ownership – yes, it’s fun to have a beloved companion animal. But ownership also requires a deliberate awareness of the responsibilities we have for our pets. PIJAC and a coalition of small business owners stopped a bill that would have devastated pet retailers and breeders in Virginia, and successfully lobbied state Senators to amend another bill so that it protected ethical breeders and held lawbreaking breeders accountable. The U.S. pet industry is paws down--and fins, claws, scales, and wings down--an important and significant contributor to the U.S economy as evidenced by the findings of a recently announced study at the Pet Industry Leadership Conference on the economic impact of the U.S. pet industry. From January 30 to February 2, PIJAC and hundreds of other leading groups and individuals will gather at the second annual Pet Industry Leadership Conference (PILC) in Laguna Beach, California, to arm the pet industry for a successful 2017. In fact, according to First Pet by the Associated Press, the “number 400 is close to the many animals and other creatures that crept, crawled, plodded, padded, or hoofed their way into the history of the White House and the presidency.” Deciding what attributes are best for your family is important because different small animals have their own unique behaviors. For example, hamsters and guinea pigs interact differently with children compared to a gerbil or chinchilla. While August 22nd may be the official National Take Your Cat to the Vet Day, every day can be a "Take Your Cat the the Vet Day" because even though your cat may look healthy, there are some common health issues that aren’t always easy to see. Communication tools such as FirstLook serve to inform and engage pet professionals, pet hobbyists, and pet businesses on what is being said within, and about, the pet industry. But how effective is FirstLook? Does it generate genuine member-engagement and interest on important issues and trends with 'clicks' on articles? The solution to this dilemma is simple; don’t be a stranger showing up at their office. If you have built a relationship with your legislators before an issue that threatens you arises you have a much better chance of being successful. Oftentimes when delivering testimony, PIJAC staff point out that those of us in the pet field don’t just care ABOUT animals, we care FOR animals. That firsthand knowledge makes our members some of the best sources available for information on best practices and standard operating procedures as well as the likely impact of proposed legislation and regulations on our trade. This new partnership will also help protect consumer choice and be more proactive in promoting the industry and its positive programs, while advocating for the health and well-being of companion animals. Recently, I asked Marshall Meyers, Senior Advisor and former CEO of PIJAC and a partner at Meyers & Alterman here in Washington, D.C., to pause and reflect on how PIJAC and its advocacy on behalf of pets and our industry have evolved over the years. Marshall’s experience confronting our industry’s most pressing issues predates PIJAC’s incorporation in 1971. This was the 6th Annual St. Puppy’s Day, and my first. Hosted by Pinnacle Pet, it’s one of several events held around the country each year offering educational forums for breeders on animal healthcare, breeding best practices and kennel design and maintenance. Scott Hardin—a biologist, expert on exotic and invasive species and proud owner of a ball python named Ricky (as in Lucy’s husband)—has the kind of insight that comes only with years of experience working at the intersection of science, environmental stewardship and public policy, balancing conservation of fish and wildlife with responsible pet ownership. Animal Planet’s popular Puppy Bowl, now in its 11th year, will run opposite the big game; 13.5 million of us tuned in last year to watch hours of puppies playing... All hype aside, TV commercials shown during the big game are a powerful reminder of the many choices we have as American consumers and, this year at least, what our canine companions mean to us. As an organization, one of PIJAC’s main tenets is to promote responsible pet ownership, including snakes. We therefore denounce the Discovery channel’s mistreatment of animals for the purpose of ratings as irresponsible, exploitative and insulting to those who raise and care for constrictors. In getting up to speed on all of the issues around responsible reptile ownership, I am lucky to have as my teachers leading reptile specialists right here in the PIJAC family. When it comes to reptiles, one such authority is John Mack, founder and CEO of Reptiles by Mack and one of the world’s leading experts on breeding and keeping reptiles. With the 2014 midterm elections in the rear-view mirror, it's time to look ahead and prepare for how these elections may impact animal welfare, pet-choice, responsible pet ownership, and responsible pet businesses across the country in the coming months. The 2015 Top2Top is sure to deliver value for those who attend. Don' t miss out. Take a moment to read the Top 5 reasons you need to be at the 2015 Top2Top Conference in sunny California and register today! Let me briefly outline PIJAC’s position and explain why we believe microchipping is in the best interests of pets, their owners and the pet industry. It is also important to know that we are asking the Committee to consider amendments that take into account specific concerns we raised in expressing our support for the bill. A recent editorial in the Sacramento Bee (“A Dangerous Dogs Act of 2015?” Nov. 8) called on the California State Assembly to propose a law to allow cities and counties to restrict specific dog breeds “up to and including outright bans.” People should absolutely be safe from harm and protected from violent animals. However, this is an issue that deserves to be addressed thoughtfully, rather than with knee-jerk legislation. From the moment I walked onto the show floor at Aquatic Experience on Saturday morning, I found myself surrounded by excited families with smiling children marveling at all of the exhibits. It’s no wonder considering it was a bustling hall featuring everything for the aquatics enthusiast. It’s no coincidence that, in new advertising campaigns for Budweiser and Discover, pets –- a yellow lab in the case of a responsible-drinking commercial by Anheuser-Busch, a frog for Discover –-head the cast. We already know that pets benefit human health and enhance our quality of life at all stages. People living with pets report less stress and a greater sense of wellbeing. Research has shown that having pets in society results in an overall decrease in health care costs.... Today we have mounting evidence of the value — to people and their pets alike — of the human animal bond. My personal, albeit unscientific, experience certainly underscores what the research continues to tell us. We at PIJAC are often asked about our favorite sources for reading up on the nature of the human-animal bond – one of pet ownership’s greatest rewards – and staying current on the latest research in the field. Since stepping into my new role earlier this month, I have been traveling around the country meeting with PIJAC members and others in the pet business community, including visits to pet shops and commercial breeders. I am listening carefully to your input, deepening my understanding of the critical issues facing us and building new relationships. Having an animal companion has been shown to help to reduce stress and blood pressure, increase a child’s sense of responsibility, teach compassion and promote an interest in conservation. And we are not just talking dogs and cats here. As of today, bans of pet store sales of dogs and cats that come from commercial breeders have been enacted or are pending in 77 municipalities and states around the country. As well intended as most of their advocates are, pet store sales bans are not the answer. Thomas Edison once said: “Opportunity is missed by most people because it is dressed in overalls and looks like work.” At the 2015 Top2Top, however, the opportunity to network with industry leaders and learn the latest trends will look more like a workcation and come outfitted in business casual attire and sunglasses. As a busy pet industry executive, it’s difficult for you to stay regularly informed about important pet-related news and information that affects your business. That’s why PIJAC is now offering to its members PIJAC FirstLook, your daily executive news brief. I would like to personally share my stance on reptile ownership and ensure both owners of reptiles and the organizations that support them that as President and CEO of PIJAC I will work to protect reptiles as fiercely as any other pet type. As many of you already know, I will become President and CEO of PIJAC next week. Before then, I wanted to take the time to introduce myself and explain – in my own words – why I embrace the opportunities and challenges of my new role. I want you to hear this directly from me. Have you read the following op-ed supporting our position in Connecticut? The article was recently published by the Hartford Courant and comes at an important time for responsible pet stores and supporters of pet-choice in the Constitution State. The serious issue of pet flipping is gaining national attention. PIJAC, the Better Business Bureau, and major news outlets such as NBC's Today Show, Time, and radio's Jim Bohannon Show are alerting consumers to the issue. Read this post to learn what pet flipping is and how you can prevent you and your family from becoming a victim. WASHINGTON, D.C. – The first annual Pet Industry ’s Top2Top Conference received rave reviews from attendees. Of note were the outstanding speakers, the networking functions, and the overall benefits... Infographics are amazing. What’s an infographic? They are pictures that turn lots of numbers (data) into something easy to understand (information). Infographics are particularly valuable in social media because they...
The farm is real. Within the past 24 hours we have lost two chickens. It’s farm reality, but sad none-the-less. It appears a bacterial infection has seeped its way into the flock. And right now I’m like Hulk Hogan, ready to suplex it to the mat. All should be well now. With the amount of rain we’ve had, and those darn dirty ducks, it was inevitable. On the farm, death comes with life. So tonight we mourn the loss of both Kate (the red) and The Princess Royal (the gray). The farm will move on, but they won’t be forgotten. And you were my wake up call. A farm doesn’t just Charlotte’s Web itself through eternity, but it’s a finely oiled machine that needs constant attention! I leave you with my favorite Ronald Reagan line – from the Challenger disaster. It sounds ridiculous, but Kate and The Princess would have loved it. We will never forget them…as they…’slipped the surly bonds of earth’ to ‘touch the face of God.’
Philharmonie Luxembourg The Philharmonie Luxembourg, also known officially as the Grande-Duchesse Joséphine-Charlotte Concert Hall (, ), is a concert hall located in the European district in the Luxembourg City quarter of Kirchberg. Opened in 2005, it now plays host to 400 performances each year. History Origins The inspiration for constructing a concert hall in Luxembourg is closely linked to the old RTL Symphonic Orchestra, now known as the Luxembourg Philharmonic Orchestra (OPL). With the privatisation of RTL in 1992, the channel was no longer obliged to support an orchestra. The Luxembourg State decided to take the orchestra over and place it in the responsibility of an establishment specially created for this purpose, the Henri Pensis Foundation. In 1995, Luxembourg was nominated European Capital of Culture. That year, the Luxembourg Parliament made the decision to construct, amongst other new structures, a concert hall. Construction In 1997, Christian de Portzamparc's project was selected at the end of the international architectural competition launched by the Administration for Public Buildings. The construction work for the new concert hall was carried out between spring 2002 and summer 2005. Opening On 26 June 2005, the Philharmonie opened its doors to the public for the first time. 222 young musicians from different bands in Luxembourg participated in the creation of a sound installation by composer Renald Deppe. With two other creations performed on the same afternoon, this piece of work marked the start of 8 days of festivities, during which 750 musicians performed in front of more than 15,000 visitors. On the evening of 26 June, the Salle de Concerts Grande-Duchesse Joséphine-Charlotte was officially opened in the presence of the Grand Duke Henri, representatives of the State and guests of honour from Luxembourg and abroad in an official ceremony to mark the end of Luxembourg’s presidency of the Council of the European Union. In a world premiere, the Luxembourg Philharmonic Orchestra performed Symphony No. 8 by Krzysztof Penderecki, commissioned by the Grand Duchy of Luxembourg for the occasion. Architecture and acoustics Architect Christian de Portzamparc's initial idea was to mark the entrance into the world of music through a natural filter. This idea took the form of 823 facade columns made of white steel, arranged in three or four rows. The interior row of columns containing technical facilities, the second supporting the windows, and the third being of a static nature. Between the filter of columns and the central nucleus, a vast peristyle constitutes the foyer, enveloping the Grand Auditorium. Ramps, stairs and footways lead into the concert hall, surrounding it and linking it to the boxes. The Salle de Musique de Chambre, the ticket office and access to the underground car park are not within the main building, but are next to it outside within two aluminium-covered shells which lean against the filter of columns. The acoustic design of the three halls is the work of Chinese-born acoustician Albert Yaying Xu with AVEL Acoustique [Jean-Paul Lamoureux et Jérôme Falala]. Grand Auditorium Designed on the concept of a "shoebox", the Grand Auditorium has a volume of almost 20,000 m3 and seats up to 1,500 listeners. To overcome the constraints of a rectangular room and to optimize the acoustics, eight towers of boxes are located around the stalls in an irregular fashion and contribute to uniform sound distribution. Like in Shakespearian theatre, the public is involved in the show with a stage visible from all sides and a choir area that can be adapted into additional seating. The reverberation time is 1.5 to 2 seconds. The acoustics can be adapted to different musical demands, thanks to the flexibility of the stage curtains and the installation of an adjustable acoustic reflector composed of three parts. Situated above the stage, the reflector directs the sound towards the public and enables the musicians to hear each other better. The technical design of the stage, with 21 modifiable platforms, allows for numerous stage variations depending on the formation of the concert. Salle de Musique de Chambre The Salle de Musique de Chambre (Chamber Music Hall) seats up to 313 people. Two rounded walls in the shape of a shell and the reflector placed above the stage optimize sound distribution. Visitors access the hall through the walkway running alongside the curved wall. Espace Découverte Situated in the basement of the Philharmonie, the Espace Découverte (Discovery Space) stands out with its technical equipment and great versatility, and seats up to 180 people. Its acoustics can be modified thanks to removable walls. This space is used for experimental and electronic music, projects in the fields of film, art or video, for workshops, and for a large number of concerts and performances for children and young people. Organisation The administrative structure of the Philharmonie is outlined in the 21 November 2002 law relating to the construction of a public establishment named Salle de Concerts Grande-Duchesse Joséphine-Charlotte. In January 2012 the Philharmonie and the Orchestre Philharmonique du Luxembourg "merged both artistically and administratively." The President of the Board of Directors is Pierre Ahlborn, and the Managing Director is Stephan Gehmacher. Orchestra in residence Since its opening, the Philharmonie has been the home of the Luxembourg Philharmonic Orchestra in permanent residence, of which Gustavo Gimeno has been its music director and conductor since 2015. ECHO In November 2005, the Philharmonie joined the European Concert Hall Organisation (ECHO). As a member of this network, the Philharmonie organises the "Rising Stars" series whose aim "is to bring young and exceptional young artists to new international audiences." Programme Since the launch of its first season in September 2005, international artists have appeared the Philharmonie Luxembourg in varied programmes: orchestra chamber music and recitals jazz, world music and easy listening new music A large part of the programme also revolves around public concerts for the young, with different series of shows adapted to each age group, given in several languages (depending on the show: French, German, English, Luxembourgish): 1.2..3…music (0–3 years) Loopino (3–5 years) Bout'chou (3–5 years) Philou (5–9 years) Musek erzielt (5–9 years) Miouzik (9–12 years) Familles (6–106 years) iPhil (13–17 years) Three festivals are linked to the Philharmonie: rainy days: hosted since 2005 by the Philharmonie, this contemporary music festival takes place each year in November Luxembourg Festival: organised in collaboration with the Grand Théâtre of the City of Luxembourg since 2007, it takes place at the beginning of the new season. atlântico: the first edition of this festival centered around the musical traditions of Portuguese-speaking countries was held in October 2016. The Philharmonie also hosts concerts, events and conferences organized by third parties. In 2014, 430 events took place at the Philharmonie. See also List of concert halls References The information contained in this article is partly from the brochure «Philharmonie Luxembourg», edited by the Ministry for Public Works / Administration for Public Buildings (2005) and from the Philharmonie Luxembourg 2008 Company Report External links Philharmonie Luxembourg official website Official website of the rainy days festival Official website of the Luxembourg Festival Category:Concert halls in Luxembourg Category:Music venues in Luxembourg City Category:Architecture of Luxembourg
Parameter determination and validation for a mechanistic model of the enzymatic saccharification of cellulose-Iβ. Cost-effective production of fuels and chemicals from lignocellulosic biomass often involves enzymatic saccharification, which has been the subject of intense research and development. Recently, a mechanistic model for the enzymatic saccharification of cellulose has been developed that accounts for distribution of cellulose chain lengths, the accessibility of insoluble cellulose to enzymes, and the distinct modes of action of the component cellulases [Griggs et al. (2012) Biotechnol. Bioeng., 109(3):665-675; Griggs et al. (2012) Biotechnol. Bioeng., 109(3):676-685]. However, determining appropriate values for the adsorption, inhibition, and rate parameters required further experimental investigation. In this work, we performed several sets of experiments to aid in parameter estimation and to quantitatively validate the model. Cellulosic materials differing in degrees of polymerization and crystallinity (α-cellulose-Iβ and highly crystalline cellulose-Iβ ) were digested by component enzymes (EGI/CBHI/βG) and by mixtures of these enzymes. Based on information from the literature and the results from these experiments, a single set of model parameters was determined, and the model simulation results using this set of parameters were compared with the experimental data of total glucan conversion, chain-length distribution, and crystallinity. Model simulations show significant agreement with the experimentally derived glucan conversion and chain-length distribution curves and provide interesting insights into multiple complex and interacting physico-chemical phenomena involved in enzymatic hydrolysis, including enzyme synergism, substrate accessibility, cellulose chain length distribution and crystallinity, and inhibition of cellulases by soluble sugars.
Article content If what we saw in Sunday’s final party leaders’ debate was a glimpse of how a Premier Andrea Horwath would perform in government, then the last person left in the province should just shut off the lights should the NDP win on June 7. Horwath has put a new spin on the old left-wing slogan – Bread Not Circuses, except what the province needs is bread and butter government, and she increasingly appears prepared to deliver a circus. We apologize, but this video has failed to load. tap here to see other videos from our team. Try refreshing your browser, or BATRA: Horwath reveals true colours in debate Back to video She derides 15 years of Liberal rule in Ontario that has grown our net debt by 134% to a projected $325 billion, and Horwath’s solution is to just pile it on. Never mind the seniors on fixed incomes who cannot afford their hydro bills, let’s make them subsidize the cost of day care for a double income family that can likely afford it. On one hand Horwath tells us the debt is out of control, so how is her solution of more of the same going to work? Did we get the best education system with all that money spent?
297 Ga. 345 FINAL COPY S15A0504. POWERS v. THE STATE. NAHMIAS, Justice. Appellant Fabian Powers was convicted of felony murder and possession of a firearm during the commission of a felony in connection with the shooting death of Alfred Boyd. Appellant contends that the trial court erred in denying his request for a jury instruction on justification based on self-defense or defense of others. But the court did not err, so we affirm.1 1. Viewed in the light most favorable to the verdicts, the evidence presented at trial showed the following. On December 2, 2008, Appellant was at an apartment in College Park smoking crack cocaine with four other people when Boyd arrived with Shekita Gibbs. Boyd stayed a short time and then left 1 The shooting occurred on December 4, 2008. On March 19, 2010, a Fulton County grand jury indicted Appellant for malice murder, felony murder based on aggravated assault, aggravated assault with a deadly weapon, possession of a firearm during the commission of a felony, and possession of a firearm by a first offender probationer. The last charge was severed for trial and later nolle prossed. Appellant’s trial began on March 26, 2012, and on April 4, the jury found him not guilty of malice murder but guilty of the remaining charges. The aggravated assault count merged into the felony murder conviction, and Appellant was sentenced to life in prison for felony murder and five consecutive years for the firearm possession conviction. On April 26, 2012, Appellant filed a motion for new trial, which he amended with new counsel on May 1, 2013. After a hearing, the trial court denied the motion on May 5, 2014. Appellant filed a timely notice of appeal, and the case was docketed in this Court for the January 2015 term and submitted for decision on the briefs. with Gibbs. After dropping her off at another house, Boyd returned to the apartment and robbed everyone there at gunpoint, including taking $3,000 from Appellant. Boyd then fled in a car while people chased after him, shooting at him. After the robbery, Gibbs called Appellant to tell him she had nothing to do with it, and Appellant threatened to kill her if she did not tell him where Boyd was. Two days later, Gibbs called Appellant and told him that Boyd was at her house. Less than 30 minutes after that, Boyd was shot with an AK-47 rifle while sitting in the driver’s seat of his car outside Gibbs’s house. He died from gunshot wounds to his chest, right arm, and right shoulder. A pistol was found inside the car underneath where Boyd had been sitting. There was no indication that the pistol had been fired, and all of the bullets found at the scene came from the same AK-47. No witnesses saw the shooting itself, but a witness testified that he saw one person — and only one person — running away from the victim’s car with a gun right after the shooting. Another witness testified that she was sitting in the front passenger seat of Boyd’s car waiting for him to return from Gibbs’s house, and she heard the shots begin as soon as Boyd got into the car and shut 2 the door, although she did not see the shooter because she ducked down. The police investigation eventually led Detective David Quinn to interview Appellant about a year after the shooting. At trial, Detective Quinn testified that during the interview, Appellant admitted that he was present during the shooting, but he claimed that his friend Eric Gates, who had also been a victim of the robbery by Boyd, went with him to serve as protection while Appellant confronted Boyd to get his money back. Detective Quinn testified that, according to Appellant, Gates “was holding the AK-47 on the [car]” when Appellant tapped on Boyd’s car window, and Gates was the one who shot Boyd. The detective added that Appellant “never said Mr. Boyd produced any kind of weapon.” Gates had been killed in an unrelated incident a few months after the shooting and before the interview. The defense theory at trial was that Gates was the shooter and Appellant was merely a scapegoat who had been led into an ambush by Gibbs. Appellant did not testify. Appellant does not dispute the legal sufficiency of the evidence supporting his convictions. Nevertheless, as is this Court’s practice in murder cases, we have reviewed the record and conclude that, when viewed in the light most favorable to the verdicts, the evidence presented at trial and summarized above 3 was sufficient to authorize a rational jury to find Appellant guilty beyond a reasonable doubt of the crimes for which he was convicted. See Jackson v. Virginia, 443 U. S. 307, 319 (99 SC 2781, 61 LE2d 560) (1979). See also Vega v. State, 285 Ga. 32, 33 (673 SE2d 223) (2009) (“‘It was for the jury to determine the credibility of the witnesses and to resolve any conflicts or inconsistencies in the evidence.’” (citation omitted)). 2. Appellant’s only argument is that the trial court erred in denying his request for a jury instruction on the defense of justification. Appellant contends that he was entitled to such an instruction because, he asserts, evidence was presented at trial that Gates shot Boyd in self-defense or in defense of Appellant. See Brunson v. State, 293 Ga. 226, 227 (744 SE2d 695) (2013) (“To authorize a jury instruction there need only be slight evidence supporting the theory of the charge at trial.”).2 The court declined to give a justification charge, however, 2 The trial court had granted the State’s request for a jury instruction on parties to crime, see OCGA § 16-2-20, and the prosecutor argued in closing that even if the jury believed Appellant’s story that Gates was the shooter, it should find Appellant guilty as a party to the crimes. Under that theory of liability, Appellant would not be guilty if Gates acted with justification – in lawful self- defense or defense of Appellant – when he shot Boyd, because Gates would not have committed a crime. See OCGA §§ 16-2-21 (stating that a party to crime may be convicted “upon proof that the crime was committed and that he was a party thereto”); 16-3-21 (establishing the requirements for legal justification based on defense of self or others); Demery v. State, 287 Ga. 805, 809 (700 SE2d 373) (2010) (explaining that if a person “‘is justified in killing under OCGA § 16-3-21, he is guilty of no crime at all.’” (citation omitted)). See generally State v. Montanez, 894 A2d 928, 937-945 (Conn. 2006) (discussing the relationship between accessorial liability and a justification defense 4 ruling that there was no evidence to support it. The trial court was right. The evidence of justification on which Appellant relies consists solely of statements he allegedly made during the second part of his interview with Detective Quinn. The first part of Appellant’s interview took place in an interview room at the police station and was video-recorded. Although the video recording was admitted into evidence at trial and played for the jury, it was not transcribed by the court reporter and the video itself is not in the record on appeal. However, Detective Quinn testified that Appellant never mentioned Gates during the videotaped portion of the interview, and Appellant does not dispute that account. The interview then continued in a hallway outside the room, where Detective Quinn surreptitiously made an audio recording using a device in his pocket. The resulting recording was apparently of very poor quality. Like the video, the audio recording itself is not in the appellate record, but a transcript the State made from the recording, which is rife with notations of inaudible or indistinct passages, indicates that Appellant made some statements regarding Gates’s alleged role in the shooting. According to the transcript, Appellant said available to the principal). 5 that when he and Gates approached the car, Boyd was “kinda acting like he wanted to shoot” and fumbled for something in the car’s back seat. Appellant also said that he saw that Boyd had a gun. When Detective Quinn asked Appellant directly if Boyd had pulled a gun on Gates, Appellant said, “S***, as far as I know,” but the rest of his response was apparently inaudible on the recording. The problem for Appellant is that the record does not show that those statements, which the transcript indicates were made near the end of the audio recording, were ever actually presented as evidence during the trial. At trial, the State had the audio recording admitted into evidence and began to play it for the jury, but the audio quality was so poor that the court stopped the playback at an unknown point. Because of the poor audio quality, copies of the transcript of the recording were initially handed out to the jurors to follow along as the recording played, but the jurors were repeatedly admonished not to read ahead, and the copies were collected when the playback was stopped. Moreover, while the transcript was marked as an exhibit and is in the appellate record, it was neither admitted into evidence nor sent back with the jury during deliberations. After the audio playback was stopped, both parties agreed that the 6 contents of the audio-recorded portion of Appellant’s interview would instead be brought out through the testimony of Detective Quinn. During deliberations, the jury sent the court a note asking if the audio recording was admitted into evidence. Without objection, the court answered, “The audiotape was admitted into evidence, however, it was of such poor quality, it could not be played. The contents of the audiotape were presented to you through the direct and cross- examination testimony of Detective Quinn.” In determining whether evidence supporting a justification instruction was presented at trial, we can consider only the evidence that the record shows was actually presented to the jury. See Brunson, 293 Ga. at 227-228. And the only evidence of Appellant’s story that Gates shot Boyd that the record demonstrates was presented to the jury was in Detective Quinn’s testimony. With regard to the hallway portion of Appellant’s interview, Detective Quinn testified that Appellant said that Gates had an AK-47 held on the victim’s car when Appellant approached it to confront Boyd about the stolen money, and that Gates then shot Boyd; while these statements by Appellant are not reflected in the transcript of the audio recording, they could have occurred during one of the many portions of the interview that the transcript indicates were inaudible, and Appellant did 7 not dispute that he made these statements on cross-examination or otherwise. The detective did not testify, even on cross-examination, that Appellant ever indicated that Boyd had pulled a gun or that Gates acted in self-defense, and there was no other evidence presented to the jury that Gates or Appellant acted in self-defense or in defense of others. Accordingly, the trial court did not err in declining to give a justification instruction. Moreover, even if we were to speculate that, before the audio playback was stopped, the jury heard what the transcript (which was not evidence) indicates were Appellant’s poorly recorded and equivocal statements suggesting that Boyd intended to shoot at Gates and Appellant after they approached his car, when that is coupled with Detective Quinn’s undisputed testimony that Appellant also said that Gates had an AK-47 trained on the car at the time Appellant approached and knocked on the window, then Gates was the original aggressor even in Appellant’s version of events. And a defendant is not entitled to a jury instruction on justification when the evidence is that the supposedly justified party was the aggressor. See OCGA § 16-3-21 (b) (3) (“A person is not justified in using force . . . if he . . . [w]as the aggressor . . . unless he withdraws from the encounter and effectively communicates to such other person his intent 8 to do so and the other, notwithstanding, continues or threatens to continue the use of unlawful force.”); Brunson 293 Ga. at 227-228 (holding that the defendant was not entitled to a self-defense charge where the record showed that the victim initiated a fight only after the defendant had threatened him with a revolver); Park v. State, 230 Ga. App. 274, 278 (495 SE2d 886) (1998). Judgment affirmed. All the Justices concur. 9 Decided June 15, 2015. Murder. Fulton Superior Court. Before Judge Adams. Jimmonique R. S. Rodgers, Long D. Vo, for appellant. Paul L. Howard, Jr., District Attorney, Paige Reese Whitaker, Sheila E. Gallow, Peggy R. Katz, Assistant District Attorneys; Samuel S. Olens, Attorney General, Patricia B. Attaway Burton, Deputy Attorney General, Paula K. Smith, Senior Assistant Attorney General, Michael A. Oldham, Assistant Attorney General, for appellee. 10
Q: Auto-Inc gaps - Id value explodes We have a big issue in production environment, many tables were created with Int Auto-Inc Primary Key. Adding to the fact that our insert mechanizes includes using Insert Ignore/Insert.. On Duplicate Update we have reached the Int.MaxValue In a few tables. I am considering my options and would like to consult: Switching to innodb_autoinc_lock_mode = 0 Alerting to BigInt in all tables auto-inc column Switching all our application inserts to Select + Insert/Update I am considering option 1 as this is an On-Premise DB and the migration work here is very costly. As far as I understand from my researching of using innodb_autoinc_lock_mode=0 is that it as somewhat of a performance downgrade when handling concurrent inserts. I am planning a benchmark to understand the performance difference, what do you guys think about this option? A: I call this "burning ids". I think it happens with all flavors of INSERT, including INSERT IGNORE, IODKU, REPLACE, etc. Here is a workaround: http://mysql.rjweb.org/doc.php/staging_table#normalization That describes how to use 2 SQLs to "normalize" a batch of names and get their ids in an efficient way, and without burning ids. If you have only a single name to insert/lookup, it is still 2 sqls. INSERT allocates as many ids as it might need, then burns the ones it did not need. I think the autoinc_mode is global, and hurts performance. Sure, BIGINT will work, but I hate to use 8 bytes. And, yeah, my recommendation is similar to your #3. But look closely; there may be some useful differences, especially if you can batch things.
#ifndef vipl_accessors_vnl_vector_hxx_ #define vipl_accessors_vnl_vector_hxx_ #include "vipl_accessors_vnl_vector.h" #include "../vipl_filterable_section_container_generator_vnl_vector.hxx" #include <cassert> #ifdef _MSC_VER # include <vcl_msvc_warnings.h> #endif template <class DataType> DataType fgetpixel(vnl_vector<DataType> const &i, int x, int y, DataType /* dummy */) { assert(y==0); return i(x); } template <class DataType> void fsetpixel(vnl_vector<DataType> &i, int x, int y, DataType e) { assert(y==0); i(x) = e; } template <class DataType> DataType getpixel(vnl_vector<DataType> const& i, int x, int y, DataType /* dummy */) { if (x<0 || (unsigned)x>=i.size() || y!=0) return DataType(); return i(x); } template <class DataType> void setpixel(vnl_vector<DataType>& i, int x, int y, DataType e) { if (x<0 || (unsigned)x>=i.size() || y!=0) return; i(x) = e; } #undef VIPL_INSTANTIATE_ACCESSORS #define VIPL_INSTANTIATE_ACCESSORS(T) \ template T fgetpixel(vnl_vector<T > const&, int, int, T);\ template void fsetpixel(vnl_vector<T >&, int, int, T);\ template T getpixel(vnl_vector<T > const&, int, int, T);\ template void setpixel(vnl_vector<T >&, int, int, T) #endif // vipl_accessors_vnl_vector_hxx_
Involvement of SMAD4, but not of SMAD2, in transforming growth factor-beta1-induced trophoblast expression of matrix metalloproteinase-2. Matrix metalloproteinases (MMPs) play crucial roles in extravillous trophoblast invasion. In the present study, we examined the possible role of Smad4 and Smad2 in transforming growth factor (TGF)-beta1-induced MMP-2 expression, using the well-established invasive extravillous trophoblast cell line HTR-8/SVneo. Recombinant sense Smad4 or Smad2 retroviral vectors were constructed by inserting full-length Smad4 or Smad2 cDNA into pLXSN retroviral vector. Stable PT67 packaging cell clones were isolated and viral supernatants were used to infect HTR-8/SVneo cells. Effects of retroviral expression of Smad4 and Smad2 on TGF-beta1-regulated MMP-2 expression were assessed by semi-quantitative reverse transcription-polymerase chain reaction and gelatin zymography. The results showed that over-expression of Smad4 augmented MMP-2 mRNA abundance and the secretion of pro-MMP-2, and mimicked the inductive effect of TGF-beta1 on the production of MMP-2. However, retrovirus-mediated sense Smad2 gene transfer had no effect. These findings suggest that Smad4, but not Smad2, mediates TGF-beta1-induced MMP-2 expression in invasive extravillous trophoblasts.
{ "Names": { "Afak": "아파카 문자", "Aghb": "코카시안 알바니아 문자", "Arab": "아랍 문자", "Aran": "나스탈리크체", "Armi": "아랍제국 문자", "Armn": "아르메니아 문자", "Avst": "아베스타 문자", "Bali": "발리 문자", "Bamu": "바뭄 문자", "Bass": "바사바흐 문자", "Batk": "바타크 문자", "Beng": "벵골 문자", "Blis": "블리스기호 문자", "Bopo": "주음부호", "Brah": "브라미", "Brai": "브라유 점자", "Bugi": "부기 문자", "Buhd": "부히드 문자", "Cakm": "차크마 문자", "Cans": "통합 캐나다 토착어", "Cari": "카리 문자", "Cham": "칸 고어", "Cher": "체로키 문자", "Cirt": "키르쓰", "Copt": "콥트 문자", "Cprt": "키프로스 문자", "Cyrl": "키릴 문자", "Cyrs": "고대교회슬라브어 키릴문자", "Deva": "데바나가리 문자", "Dsrt": "디저렛 문자", "Dupl": "듀플로이안 문자", "Egyd": "고대 이집트 민중문자", "Egyh": "고대 이집트 신관문자", "Egyp": "고대 이집트 신성문자", "Elba": "엘바산 문자", "Ethi": "에티오피아 문자", "Geok": "그루지야 쿠츠리 문자", "Geor": "조지아 문자", "Glag": "글라골 문자", "Goth": "고트 문자", "Gran": "그란타 문자", "Grek": "그리스 문자", "Gujr": "구자라트 문자", "Guru": "구르무키 문자", "Hanb": "주음 자모", "Hang": "한글", "Hani": "한자", "Hano": "하누누 문자", "Hans": "간체", "Hant": "번체", "Hebr": "히브리 문자", "Hira": "히라가나", "Hluw": "아나톨리아 상형문자", "Hmng": "파하우 몽 문자", "Hrkt": "가나", "Hung": "고대 헝가리 문자", "Inds": "인더스 문자", "Ital": "고대 이탈리아 문자", "Jamo": "자모", "Java": "자바 문자", "Jpan": "일본 문자", "Jurc": "줄첸 문자", "Kali": "카야 리 문자", "Kana": "가타카나", "Khar": "카로슈티 문자", "Khmr": "크메르 문자", "Khoj": "코즈키 문자", "Knda": "칸나다 문자", "Kore": "한국어", "Kpel": "크펠레 문자", "Kthi": "카이시 문자", "Lana": "란나 문자", "Laoo": "라오 문자", "Latf": "독일식 로마자", "Latg": "아일랜드식 로마자", "Latn": "로마자", "Lepc": "렙차 문자", "Limb": "림부 문자", "Lina": "선형 문자(A)", "Linb": "선형 문자(B)", "Lisu": "프레이저 문자", "Loma": "로마 문자", "Lyci": "리키아 문자", "Lydi": "리디아 문자", "Mahj": "마하자니 문자", "Mand": "만다이아 문자", "Mani": "마니교 문자", "Maya": "마야 상형 문자", "Mend": "멘데 문자", "Merc": "메로에 필기체", "Mero": "메로에 문자", "Mlym": "말라얄람 문자", "Mong": "몽골 문자", "Moon": "문 문자", "Mroo": "므로 문자", "Mtei": "메이테이 마옉 문자", "Mymr": "미얀마 문자", "Narb": "옛 북부 아라비아 문자", "Nbat": "나바테아 문자", "Nkgb": "나시 게바 문자", "Nkoo": "응코 문자", "Nshu": "누슈 문자", "Ogam": "오검 문자", "Olck": "올 치키 문자", "Orkh": "오르혼어", "Orya": "오리야 문자", "Osma": "오스마니아 문자", "Palm": "팔미라 문자", "Perm": "고대 페름 문자", "Phag": "파스파 문자", "Phli": "명문 팔라비 문자", "Phlp": "솔터 팔라비 문자", "Phlv": "북 팔라비 문자", "Phnx": "페니키아 문자", "Plrd": "폴라드 표음 문자", "Prti": "명문 파라티아 문자", "Qaag": "저지 문자", "Rjng": "레장 문자", "Roro": "롱고롱고", "Runr": "룬 문자", "Samr": "사마리아 문자", "Sara": "사라티", "Sarb": "옛 남부 아라비아 문자", "Saur": "사우라슈트라 문자", "Sgnw": "수화 문자", "Shaw": "샤비안 문자", "Shrd": "사라다 문자", "Sidd": "실담자", "Sind": "쿠다와디 문자", "Sinh": "신할라 문자", "Sora": "소라 솜펭 문자", "Sund": "순다 문자", "Sylo": "실헤티 나가리", "Syrc": "시리아 문자", "Syre": "에스트랑겔로식 시리아 문자", "Syrj": "서부 시리아 문자", "Syrn": "동부 시리아 문자", "Tagb": "타그반와 문자", "Takr": "타크리 문자", "Tale": "타이 레 문자", "Talu": "신 타이 루에", "Taml": "타밀 문자", "Tang": "탕구트 문자", "Tavt": "태국 베트남 문자", "Telu": "텔루구 문자", "Teng": "텡과르 문자", "Tfng": "티피나그 문자", "Tglg": "타갈로그 문자", "Thaa": "타나 문자", "Thai": "타이 문자", "Tibt": "티베트 문자", "Tirh": "티르후타 문자", "Ugar": "우가리트 문자", "Vaii": "바이 문자", "Visp": "시화법", "Wara": "바랑 크시티 문자", "Wole": "울레아이", "Xpeo": "고대 페르시아 문자", "Xsux": "수메르-아카드어 설형문자", "Yiii": "이 문자", "Zinh": "구전 문자", "Zmth": "수학 기호", "Zsye": "이모티콘", "Zsym": "기호", "Zxxx": "구전", "Zyyy": "일반 문자" } }
nes News Stream, Page 3 ▼ 01/20/2012, The humble NES, a device that ensured kids preferred staying indoors rather than to play in the real world outdoors since the 1980s, certainly deserves a place in video game pantheon. Well, there is another feather to add to its cap which is already... 01/20/2012, There have been case mods done in the past, although if you’re a Zelda fan you might get a kick out of this. This Legend of Zelda case mode for the NES was done by Ryan Fitzpatrick with the help of console painter Jayrod2. Based on the photo above of... 01/17/2012, If you love retro gaming on your iPad, you’ve probably wished for a physical controller to play games with instead using the touchscreen on the tablet. And if you have, what better way to do it than to use some authentic retro controllers like the... 11/28/2011, Some people are just so darn handy with their hands – case in point, Ben Heck with his many creations which have proved to be really, really cool over the years. Well, here is yet another hardware mod that was not created by Ben Heck, but it is... 09/07/2011, If you are a geek at heart and grew up with video games from the 8-bit era, then surely the NES is something you cherish during your younger days. Granted, the super pixelated graphics are extremely outdated, but somehow, firing up an old classic or two... 05/04/2011, Nobody likes throwing out old stuff, and with retro being the new cool nowadays, repurposing old gadgets and devices for new features is pretty common. But not every day we encounter a device as funky as this. A hobbyist named Benjamin Gaulon gathered a... 04/04/2011, OK, so I couldn’t help myself with the “nested” pun in the title, but it does make plenty of sense (to me, at least). The wonders of miniaturization has brought us to this crossroads, where the old school Nintendo Entertainment System... 03/24/2011, If you’re too retro for playing old school games on a modern gaming console like the PSP or your cellphone, this portable NES console mod is just for you. A modder named Doug recently finished creating his own portable NES console, and it looks... 03/15/2011, Ever seen a Nintendo Entertainment System (NES) controller used to play games on an iPad? Probably not. Well the folks over at ProtoDojo have come up with one of the strangest iPad gaming controllers ever. Called the RoboTouch, it makes use of an NES... 03/03/2011, An engineer with time on his hands decided to repurpose his Nintendo Entertainment System into a breathalyzer called DrunkenNES. Using a combination of hardware and software, he managed to turn an NES cartridge into a working breathalyzer unit, and he... 02/18/2011, A hobbyist has managed to construct his own “Guitar Hero” controller that resembles a huge NES controller that’s been cut into the guitar shape. Using parts found around the house, wood and the Xbox controller’s rumble pad, he... 01/03/2011, A developer has managed to port a Nintendo Entertainment System (NES) emulator over to the Windows Phone 7 operating system. Called SharpNES, the homebrew app only took a couple of hours to bring to the platform, but still requires more work to be... 12/20/2010, Many of us have an old NES lying around, and regardless of whether it still works or not, chances are that you don’t play with it all that often. If your fingers are feeling the need to do some hardware hacking, you could always do what this... 12/10/2010, So you’ve seen a giant NES controller coffee table yesterday, now how about checking out an NES console that has been modified in such an interesting manner, it has turned into an electric guitar instead. Yes sir, this custom 6-string electric...
/* * Copyright (c) Microsoft Corporation. All rights reserved. * Licensed under the MIT License. See License.txt in the project root for license information. * * Code generated by Microsoft (R) AutoRest Code Generator. * Changes may cause incorrect behavior and will be lost if the code is regenerated. */ import { BaseResource, CloudError, AzureServiceClientOptions } from "@azure/ms-rest-azure-js"; import * as msRest from "@azure/ms-rest-js"; export { BaseResource, CloudError }; /** * Deployment filter. */ export interface DeploymentExtendedFilter { /** * The provisioning state. */ provisioningState?: string; } /** * Resource filter. */ export interface GenericResourceFilter { /** * The resource type. */ resourceType?: string; /** * The tag name. */ tagname?: string; /** * The tag value. */ tagvalue?: string; } /** * Resource group filter. */ export interface ResourceGroupFilter { /** * The tag name. */ tagName?: string; /** * The tag value. */ tagValue?: string; } /** * Entity representing the reference to the template. */ export interface TemplateLink { /** * The URI of the template to deploy. */ uri: string; /** * If included, must match the ContentVersion in the template. */ contentVersion?: string; } /** * Entity representing the reference to the deployment parameters. */ export interface ParametersLink { /** * The URI of the parameters file. */ uri: string; /** * If included, must match the ContentVersion in the template. */ contentVersion?: string; } /** * An interface representing DebugSetting. */ export interface DebugSetting { /** * Specifies the type of information to log for debugging. The permitted values are none, * requestContent, responseContent, or both requestContent and responseContent separated by a * comma. The default is none. When setting this value, carefully consider the type of * information you are passing in during deployment. By logging information about the request or * response, you could potentially expose sensitive data that is retrieved through the deployment * operations. */ detailLevel?: string; } /** * Deployment on error behavior. */ export interface OnErrorDeployment { /** * The deployment on error behavior type. Possible values are LastSuccessful and * SpecificDeployment. Possible values include: 'LastSuccessful', 'SpecificDeployment' */ type?: OnErrorDeploymentType; /** * The deployment to be used on error case. */ deploymentName?: string; } /** * Deployment properties. */ export interface DeploymentProperties { /** * The template content. You use this element when you want to pass the template syntax directly * in the request rather than link to an existing template. It can be a JObject or well-formed * JSON string. Use either the templateLink property or the template property, but not both. */ template?: any; /** * The URI of the template. Use either the templateLink property or the template property, but * not both. */ templateLink?: TemplateLink; /** * Name and value pairs that define the deployment parameters for the template. You use this * element when you want to provide the parameter values directly in the request rather than link * to an existing parameter file. Use either the parametersLink property or the parameters * property, but not both. It can be a JObject or a well formed JSON string. */ parameters?: any; /** * The URI of parameters file. You use this element to link to an existing parameters file. Use * either the parametersLink property or the parameters property, but not both. */ parametersLink?: ParametersLink; /** * The mode that is used to deploy resources. This value can be either Incremental or Complete. * In Incremental mode, resources are deployed without deleting existing resources that are not * included in the template. In Complete mode, resources are deployed and existing resources in * the resource group that are not included in the template are deleted. Be careful when using * Complete mode as you may unintentionally delete resources. Possible values include: * 'Incremental', 'Complete' */ mode: DeploymentMode; /** * The debug setting of the deployment. */ debugSetting?: DebugSetting; /** * The deployment on error behavior. */ onErrorDeployment?: OnErrorDeployment; } /** * Deployment operation parameters. */ export interface Deployment { /** * The location to store the deployment data. */ location?: string; /** * The deployment properties. */ properties: DeploymentProperties; } /** * The deployment export result. */ export interface DeploymentExportResult { /** * The template content. */ template?: any; } /** * The detailed error message of resource management. */ export interface ResourceManagementErrorWithDetails { /** * The error code returned when exporting the template. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly code?: string; /** * The error message describing the export error. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly message?: string; /** * The target of the error. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly target?: string; /** * Validation error. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly details?: ResourceManagementErrorWithDetails[]; } /** * The type of the paths for alias. */ export interface AliasPathType { /** * The path of an alias. */ path?: string; /** * The API versions. */ apiVersions?: string[]; } /** * The alias type. */ export interface AliasType { /** * The alias name. */ name?: string; /** * The paths for an alias. */ paths?: AliasPathType[]; } /** * Resource type managed by the resource provider. */ export interface ProviderResourceType { /** * The resource type. */ resourceType?: string; /** * The collection of locations where this resource type can be created. */ locations?: string[]; /** * The aliases that are supported by this resource type. */ aliases?: AliasType[]; /** * The API version. */ apiVersions?: string[]; /** * The properties. */ properties?: { [propertyName: string]: string }; } /** * Resource provider information. */ export interface Provider { /** * The provider ID. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly id?: string; /** * The namespace of the resource provider. */ namespace?: string; /** * The registration state of the provider. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly registrationState?: string; /** * The collection of provider resource types. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly resourceTypes?: ProviderResourceType[]; } /** * Deployment dependency information. */ export interface BasicDependency { /** * The ID of the dependency. */ id?: string; /** * The dependency resource type. */ resourceType?: string; /** * The dependency resource name. */ resourceName?: string; } /** * Deployment dependency information. */ export interface Dependency { /** * The list of dependencies. */ dependsOn?: BasicDependency[]; /** * The ID of the dependency. */ id?: string; /** * The dependency resource type. */ resourceType?: string; /** * The dependency resource name. */ resourceName?: string; } /** * Deployment on error behavior with additional details. */ export interface OnErrorDeploymentExtended { /** * The state of the provisioning for the on error deployment. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly provisioningState?: string; /** * The deployment on error behavior type. Possible values are LastSuccessful and * SpecificDeployment. Possible values include: 'LastSuccessful', 'SpecificDeployment' */ type?: OnErrorDeploymentType; /** * The deployment to be used on error case. */ deploymentName?: string; } /** * Deployment properties with additional details. */ export interface DeploymentPropertiesExtended { /** * The state of the provisioning. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly provisioningState?: string; /** * The correlation ID of the deployment. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly correlationId?: string; /** * The timestamp of the template deployment. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly timestamp?: Date; /** * Key/value pairs that represent deployment output. */ outputs?: any; /** * The list of resource providers needed for the deployment. */ providers?: Provider[]; /** * The list of deployment dependencies. */ dependencies?: Dependency[]; /** * The template content. Use only one of Template or TemplateLink. */ template?: any; /** * The URI referencing the template. Use only one of Template or TemplateLink. */ templateLink?: TemplateLink; /** * Deployment parameters. Use only one of Parameters or ParametersLink. */ parameters?: any; /** * The URI referencing the parameters. Use only one of Parameters or ParametersLink. */ parametersLink?: ParametersLink; /** * The deployment mode. Possible values are Incremental and Complete. Possible values include: * 'Incremental', 'Complete' */ mode?: DeploymentMode; /** * The debug setting of the deployment. */ debugSetting?: DebugSetting; /** * The deployment on error behavior. */ onErrorDeployment?: OnErrorDeploymentExtended; } /** * Information from validate template deployment response. */ export interface DeploymentValidateResult { /** * Validation error. */ error?: ResourceManagementErrorWithDetails; /** * The template deployment properties. */ properties?: DeploymentPropertiesExtended; } /** * Deployment information. */ export interface DeploymentExtended extends BaseResource { /** * The ID of the deployment. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly id?: string; /** * The name of the deployment. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly name?: string; /** * The type of the deployment. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly type?: string; /** * the location of the deployment. */ location?: string; /** * Deployment properties. */ properties?: DeploymentPropertiesExtended; } /** * Plan for the resource. */ export interface Plan { /** * The plan ID. */ name?: string; /** * The publisher ID. */ publisher?: string; /** * The offer ID. */ product?: string; /** * The promotion code. */ promotionCode?: string; /** * The plan's version. */ version?: string; } /** * SKU for the resource. */ export interface Sku { /** * The SKU name. */ name?: string; /** * The SKU tier. */ tier?: string; /** * The SKU size. */ size?: string; /** * The SKU family. */ family?: string; /** * The SKU model. */ model?: string; /** * The SKU capacity. */ capacity?: number; } /** * An interface representing IdentityUserAssignedIdentitiesValue. */ export interface IdentityUserAssignedIdentitiesValue { /** * The principal id of user assigned identity. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly principalId?: string; /** * The client id of user assigned identity. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly clientId?: string; } /** * Identity for the resource. */ export interface Identity { /** * The principal ID of resource identity. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly principalId?: string; /** * The tenant ID of resource. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly tenantId?: string; /** * The identity type. Possible values include: 'SystemAssigned', 'UserAssigned', 'SystemAssigned, * UserAssigned', 'None' */ type?: ResourceIdentityType; /** * The list of user identities associated with the resource. The user identity dictionary key * references will be ARM resource ids in the form: * '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}'. */ userAssignedIdentities?: { [propertyName: string]: IdentityUserAssignedIdentitiesValue }; } /** * Specified resource. */ export interface Resource extends BaseResource { /** * Resource ID * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly id?: string; /** * Resource name * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly name?: string; /** * Resource type * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly type?: string; /** * Resource location */ location?: string; /** * Resource tags */ tags?: { [propertyName: string]: string }; } /** * Resource information. */ export interface GenericResource extends Resource { /** * The plan of the resource. */ plan?: Plan; /** * The resource properties. */ properties?: any; /** * The kind of the resource. */ kind?: string; /** * ID of the resource that manages this resource. */ managedBy?: string; /** * The SKU of the resource. */ sku?: Sku; /** * The identity of the resource. */ identity?: Identity; } /** * The resource group properties. */ export interface ResourceGroupProperties { /** * The provisioning state. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly provisioningState?: string; } /** * Resource group information. */ export interface ResourceGroup extends BaseResource { /** * The ID of the resource group. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly id?: string; /** * The name of the resource group. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly name?: string; /** * The type of the resource group. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly type?: string; properties?: ResourceGroupProperties; /** * The location of the resource group. It cannot be changed after the resource group has been * created. It must be one of the supported Azure locations. */ location: string; /** * The ID of the resource that manages this resource group. */ managedBy?: string; /** * The tags attached to the resource group. */ tags?: { [propertyName: string]: string }; } /** * Resource group information. */ export interface ResourceGroupPatchable { /** * The name of the resource group. */ name?: string; properties?: ResourceGroupProperties; /** * The ID of the resource that manages this resource group. */ managedBy?: string; /** * The tags attached to the resource group. */ tags?: { [propertyName: string]: string }; } /** * Parameters of move resources. */ export interface ResourcesMoveInfo { /** * The IDs of the resources. */ resources?: string[]; /** * The target resource group. */ targetResourceGroup?: string; } /** * Export resource group template request parameters. */ export interface ExportTemplateRequest { /** * The IDs of the resources. The only supported string currently is '*' (all resources). Future * updates will support exporting specific resources. */ resources?: string[]; /** * The export template options. Supported values include 'IncludeParameterDefaultValue', * 'IncludeComments' or 'IncludeParameterDefaultValue, IncludeComments */ options?: string; } /** * Tag count. */ export interface TagCount { /** * Type of count. */ type?: string; /** * Value of count. */ value?: number; } /** * Tag information. */ export interface TagValue extends BaseResource { /** * The tag ID. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly id?: string; /** * The tag value. */ tagValue?: string; /** * The tag value count. */ count?: TagCount; } /** * Tag details. */ export interface TagDetails { /** * The tag ID. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly id?: string; /** * The tag name. */ tagName?: string; /** * The total number of resources that use the resource tag. When a tag is initially created and * has no associated resources, the value is 0. */ count?: TagCount; /** * The list of tag values. */ values?: TagValue[]; } /** * Target resource. */ export interface TargetResource { /** * The ID of the resource. */ id?: string; /** * The name of the resource. */ resourceName?: string; /** * The type of the resource. */ resourceType?: string; } /** * HTTP message. */ export interface HttpMessage { /** * HTTP message content. */ content?: any; } /** * Deployment operation properties. */ export interface DeploymentOperationProperties { /** * The state of the provisioning. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly provisioningState?: string; /** * The date and time of the operation. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly timestamp?: Date; /** * Deployment operation service request id. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly serviceRequestId?: string; /** * Operation status code. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly statusCode?: string; /** * Operation status message. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly statusMessage?: any; /** * The target resource. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly targetResource?: TargetResource; /** * The HTTP request message. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly request?: HttpMessage; /** * The HTTP response message. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly response?: HttpMessage; } /** * Deployment operation information. */ export interface DeploymentOperation { /** * Full deployment operation ID. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly id?: string; /** * Deployment operation ID. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly operationId?: string; /** * Deployment properties. */ properties?: DeploymentOperationProperties; } /** * Resource provider operation's display properties. */ export interface ResourceProviderOperationDisplayProperties { /** * Operation description. */ publisher?: string; /** * Operation provider. */ provider?: string; /** * Operation resource. */ resource?: string; /** * Resource provider operation. */ operation?: string; /** * Operation description. */ description?: string; } /** * Sub-resource. */ export interface SubResource extends BaseResource { /** * Resource ID */ id?: string; } /** * Resource group export result. */ export interface ResourceGroupExportResult { /** * The template content. */ template?: any; /** * The error. */ error?: ResourceManagementErrorWithDetails; } /** * The object that represents the operation. */ export interface OperationDisplay { /** * Service provider: Microsoft.Resources */ provider?: string; /** * Resource on which the operation is performed: Profile, endpoint, etc. */ resource?: string; /** * Operation type: Read, write, delete, etc. */ operation?: string; /** * Description of the operation. */ description?: string; } /** * Microsoft.Resources operation */ export interface Operation { /** * Operation name: {provider}/{resource}/{operation} */ name?: string; /** * The object that represents the operation. */ display?: OperationDisplay; } /** * Optional Parameters. */ export interface DeploymentsListAtSubscriptionScopeOptionalParams extends msRest.RequestOptionsBase { /** * The filter to apply on the operation. For example, you can use $filter=provisioningState eq * '{state}'. */ filter?: string; /** * The number of results to get. If null is passed, returns all deployments. */ top?: number; } /** * Optional Parameters. */ export interface DeploymentsListByResourceGroupOptionalParams extends msRest.RequestOptionsBase { /** * The filter to apply on the operation. For example, you can use $filter=provisioningState eq * '{state}'. */ filter?: string; /** * The number of results to get. If null is passed, returns all deployments. */ top?: number; } /** * Optional Parameters. */ export interface ProvidersListOptionalParams extends msRest.RequestOptionsBase { /** * The number of results to return. If null is passed returns all deployments. */ top?: number; /** * The properties to include in the results. For example, use &$expand=metadata in the query * string to retrieve resource provider metadata. To include property aliases in response, use * $expand=resourceTypes/aliases. */ expand?: string; } /** * Optional Parameters. */ export interface ProvidersGetOptionalParams extends msRest.RequestOptionsBase { /** * The $expand query parameter. For example, to include property aliases in response, use * $expand=resourceTypes/aliases. */ expand?: string; } /** * Optional Parameters. */ export interface ResourcesListByResourceGroupOptionalParams extends msRest.RequestOptionsBase { /** * The filter to apply on the operation.<br><br>The properties you can use for eq (equals) or ne * (not equals) are: location, resourceType, name, resourceGroup, identity, identity/principalId, * plan, plan/publisher, plan/product, plan/name, plan/version, and * plan/promotionCode.<br><br>For example, to filter by a resource type, use: * $filter=resourceType eq 'Microsoft.Network/virtualNetworks'<br><br>You can use * substringof(value, property) in the filter. The properties you can use for substring are: name * and resourceGroup.<br><br>For example, to get all resources with 'demo' anywhere in the name, * use: $filter=substringof('demo', name)<br><br>You can link more than one substringof together * by adding and/or operators.<br><br>You can filter by tag names and values. For example, to * filter for a tag name and value, use $filter=tagName eq 'tag1' and tagValue eq * 'Value1'<br><br>You can use some properties together when filtering. The combinations you can * use are: substringof and/or resourceType, plan and plan/publisher and plan/name, identity and * identity/principalId. */ filter?: string; /** * The $expand query parameter. You can expand createdTime and changedTime. For example, to * expand both properties, use $expand=changedTime,createdTime */ expand?: string; /** * The number of results to return. If null is passed, returns all resources. */ top?: number; } /** * Optional Parameters. */ export interface ResourcesListOptionalParams extends msRest.RequestOptionsBase { /** * The filter to apply on the operation.<br><br>The properties you can use for eq (equals) or ne * (not equals) are: location, resourceType, name, resourceGroup, identity, identity/principalId, * plan, plan/publisher, plan/product, plan/name, plan/version, and * plan/promotionCode.<br><br>For example, to filter by a resource type, use: * $filter=resourceType eq 'Microsoft.Network/virtualNetworks'<br><br>You can use * substringof(value, property) in the filter. The properties you can use for substring are: name * and resourceGroup.<br><br>For example, to get all resources with 'demo' anywhere in the name, * use: $filter=substringof('demo', name)<br><br>You can link more than one substringof together * by adding and/or operators.<br><br>You can filter by tag names and values. For example, to * filter for a tag name and value, use $filter=tagName eq 'tag1' and tagValue eq * 'Value1'<br><br>You can use some properties together when filtering. The combinations you can * use are: substringof and/or resourceType, plan and plan/publisher and plan/name, identity and * identity/principalId. */ filter?: string; /** * The $expand query parameter. You can expand createdTime and changedTime. For example, to * expand both properties, use $expand=changedTime,createdTime */ expand?: string; /** * The number of results to return. If null is passed, returns all resource groups. */ top?: number; } /** * Optional Parameters. */ export interface ResourceGroupsListOptionalParams extends msRest.RequestOptionsBase { /** * The filter to apply on the operation.<br><br>You can filter by tag names and values. For * example, to filter for a tag name and value, use $filter=tagName eq 'tag1' and tagValue eq * 'Value1' */ filter?: string; /** * The number of results to return. If null is passed, returns all resource groups. */ top?: number; } /** * Optional Parameters. */ export interface DeploymentOperationsListAtSubscriptionScopeOptionalParams extends msRest.RequestOptionsBase { /** * The number of results to return. */ top?: number; } /** * Optional Parameters. */ export interface DeploymentOperationsListOptionalParams extends msRest.RequestOptionsBase { /** * The number of results to return. */ top?: number; } /** * An interface representing ResourceManagementClientOptions. */ export interface ResourceManagementClientOptions extends AzureServiceClientOptions { baseUri?: string; } /** * @interface * Result of the request to list Microsoft.Resources operations. It contains a list of operations * and a URL link to get the next set of results. * @extends Array<Operation> */ export interface OperationListResult extends Array<Operation> { /** * URL to get the next set of operation list results if there are any. */ nextLink?: string; } /** * @interface * List of deployments. * @extends Array<DeploymentExtended> */ export interface DeploymentListResult extends Array<DeploymentExtended> { /** * The URL to use for getting the next set of results. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly nextLink?: string; } /** * @interface * List of resource providers. * @extends Array<Provider> */ export interface ProviderListResult extends Array<Provider> { /** * The URL to use for getting the next set of results. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly nextLink?: string; } /** * @interface * List of resource groups. * @extends Array<GenericResource> */ export interface ResourceListResult extends Array<GenericResource> { /** * The URL to use for getting the next set of results. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly nextLink?: string; } /** * @interface * List of resource groups. * @extends Array<ResourceGroup> */ export interface ResourceGroupListResult extends Array<ResourceGroup> { /** * The URL to use for getting the next set of results. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly nextLink?: string; } /** * @interface * List of subscription tags. * @extends Array<TagDetails> */ export interface TagsListResult extends Array<TagDetails> { /** * The URL to use for getting the next set of results. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly nextLink?: string; } /** * @interface * List of deployment operations. * @extends Array<DeploymentOperation> */ export interface DeploymentOperationsListResult extends Array<DeploymentOperation> { /** * The URL to use for getting the next set of results. * **NOTE: This property will not be serialized. It can only be populated by the server.** */ readonly nextLink?: string; } /** * Defines values for DeploymentMode. * Possible values include: 'Incremental', 'Complete' * @readonly * @enum {string} */ export type DeploymentMode = 'Incremental' | 'Complete'; /** * Defines values for OnErrorDeploymentType. * Possible values include: 'LastSuccessful', 'SpecificDeployment' * @readonly * @enum {string} */ export type OnErrorDeploymentType = 'LastSuccessful' | 'SpecificDeployment'; /** * Defines values for ResourceIdentityType. * Possible values include: 'SystemAssigned', 'UserAssigned', 'SystemAssigned, UserAssigned', * 'None' * @readonly * @enum {string} */ export type ResourceIdentityType = 'SystemAssigned' | 'UserAssigned' | 'SystemAssigned, UserAssigned' | 'None'; /** * Contains response data for the list operation. */ export type OperationsListResponse = OperationListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: OperationListResult; }; }; /** * Contains response data for the listNext operation. */ export type OperationsListNextResponse = OperationListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: OperationListResult; }; }; /** * Contains response data for the checkExistenceAtSubscriptionScope operation. */ export type DeploymentsCheckExistenceAtSubscriptionScopeResponse = { /** * The parsed response body. */ body: boolean; /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: boolean; }; }; /** * Contains response data for the createOrUpdateAtSubscriptionScope operation. */ export type DeploymentsCreateOrUpdateAtSubscriptionScopeResponse = DeploymentExtended & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentExtended; }; }; /** * Contains response data for the getAtSubscriptionScope operation. */ export type DeploymentsGetAtSubscriptionScopeResponse = DeploymentExtended & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentExtended; }; }; /** * Contains response data for the validateAtSubscriptionScope operation. */ export type DeploymentsValidateAtSubscriptionScopeResponse = DeploymentValidateResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentValidateResult; }; }; /** * Contains response data for the exportTemplateAtSubscriptionScope operation. */ export type DeploymentsExportTemplateAtSubscriptionScopeResponse = DeploymentExportResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentExportResult; }; }; /** * Contains response data for the listAtSubscriptionScope operation. */ export type DeploymentsListAtSubscriptionScopeResponse = DeploymentListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentListResult; }; }; /** * Contains response data for the checkExistence operation. */ export type DeploymentsCheckExistenceResponse = { /** * The parsed response body. */ body: boolean; /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: boolean; }; }; /** * Contains response data for the createOrUpdate operation. */ export type DeploymentsCreateOrUpdateResponse = DeploymentExtended & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentExtended; }; }; /** * Contains response data for the get operation. */ export type DeploymentsGetResponse = DeploymentExtended & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentExtended; }; }; /** * Contains response data for the validate operation. */ export type DeploymentsValidateResponse = DeploymentValidateResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentValidateResult; }; }; /** * Contains response data for the exportTemplate operation. */ export type DeploymentsExportTemplateResponse = DeploymentExportResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentExportResult; }; }; /** * Contains response data for the listByResourceGroup operation. */ export type DeploymentsListByResourceGroupResponse = DeploymentListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentListResult; }; }; /** * Contains response data for the beginCreateOrUpdateAtSubscriptionScope operation. */ export type DeploymentsBeginCreateOrUpdateAtSubscriptionScopeResponse = DeploymentExtended & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentExtended; }; }; /** * Contains response data for the beginCreateOrUpdate operation. */ export type DeploymentsBeginCreateOrUpdateResponse = DeploymentExtended & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentExtended; }; }; /** * Contains response data for the listAtSubscriptionScopeNext operation. */ export type DeploymentsListAtSubscriptionScopeNextResponse = DeploymentListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentListResult; }; }; /** * Contains response data for the listByResourceGroupNext operation. */ export type DeploymentsListByResourceGroupNextResponse = DeploymentListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentListResult; }; }; /** * Contains response data for the unregister operation. */ export type ProvidersUnregisterResponse = Provider & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: Provider; }; }; /** * Contains response data for the register operation. */ export type ProvidersRegisterResponse = Provider & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: Provider; }; }; /** * Contains response data for the list operation. */ export type ProvidersListResponse = ProviderListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ProviderListResult; }; }; /** * Contains response data for the get operation. */ export type ProvidersGetResponse = Provider & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: Provider; }; }; /** * Contains response data for the listNext operation. */ export type ProvidersListNextResponse = ProviderListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ProviderListResult; }; }; /** * Contains response data for the listByResourceGroup operation. */ export type ResourcesListByResourceGroupResponse = ResourceListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceListResult; }; }; /** * Contains response data for the list operation. */ export type ResourcesListResponse = ResourceListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceListResult; }; }; /** * Contains response data for the checkExistence operation. */ export type ResourcesCheckExistenceResponse = { /** * The parsed response body. */ body: boolean; /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: boolean; }; }; /** * Contains response data for the createOrUpdate operation. */ export type ResourcesCreateOrUpdateResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the update operation. */ export type ResourcesUpdateResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the get operation. */ export type ResourcesGetResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the checkExistenceById operation. */ export type ResourcesCheckExistenceByIdResponse = { /** * The parsed response body. */ body: boolean; /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: boolean; }; }; /** * Contains response data for the createOrUpdateById operation. */ export type ResourcesCreateOrUpdateByIdResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the updateById operation. */ export type ResourcesUpdateByIdResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the getById operation. */ export type ResourcesGetByIdResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the beginCreateOrUpdate operation. */ export type ResourcesBeginCreateOrUpdateResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the beginUpdate operation. */ export type ResourcesBeginUpdateResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the beginCreateOrUpdateById operation. */ export type ResourcesBeginCreateOrUpdateByIdResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the beginUpdateById operation. */ export type ResourcesBeginUpdateByIdResponse = GenericResource & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: GenericResource; }; }; /** * Contains response data for the listByResourceGroupNext operation. */ export type ResourcesListByResourceGroupNextResponse = ResourceListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceListResult; }; }; /** * Contains response data for the listNext operation. */ export type ResourcesListNextResponse = ResourceListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceListResult; }; }; /** * Contains response data for the checkExistence operation. */ export type ResourceGroupsCheckExistenceResponse = { /** * The parsed response body. */ body: boolean; /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: boolean; }; }; /** * Contains response data for the createOrUpdate operation. */ export type ResourceGroupsCreateOrUpdateResponse = ResourceGroup & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceGroup; }; }; /** * Contains response data for the get operation. */ export type ResourceGroupsGetResponse = ResourceGroup & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceGroup; }; }; /** * Contains response data for the update operation. */ export type ResourceGroupsUpdateResponse = ResourceGroup & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceGroup; }; }; /** * Contains response data for the exportTemplate operation. */ export type ResourceGroupsExportTemplateResponse = ResourceGroupExportResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceGroupExportResult; }; }; /** * Contains response data for the list operation. */ export type ResourceGroupsListResponse = ResourceGroupListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceGroupListResult; }; }; /** * Contains response data for the listNext operation. */ export type ResourceGroupsListNextResponse = ResourceGroupListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: ResourceGroupListResult; }; }; /** * Contains response data for the createOrUpdateValue operation. */ export type TagsCreateOrUpdateValueResponse = TagValue & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: TagValue; }; }; /** * Contains response data for the createOrUpdate operation. */ export type TagsCreateOrUpdateResponse = TagDetails & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: TagDetails; }; }; /** * Contains response data for the list operation. */ export type TagsListResponse = TagsListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: TagsListResult; }; }; /** * Contains response data for the listNext operation. */ export type TagsListNextResponse = TagsListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: TagsListResult; }; }; /** * Contains response data for the getAtSubscriptionScope operation. */ export type DeploymentOperationsGetAtSubscriptionScopeResponse = DeploymentOperation & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentOperation; }; }; /** * Contains response data for the listAtSubscriptionScope operation. */ export type DeploymentOperationsListAtSubscriptionScopeResponse = DeploymentOperationsListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentOperationsListResult; }; }; /** * Contains response data for the get operation. */ export type DeploymentOperationsGetResponse = DeploymentOperation & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentOperation; }; }; /** * Contains response data for the list operation. */ export type DeploymentOperationsListResponse = DeploymentOperationsListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentOperationsListResult; }; }; /** * Contains response data for the listAtSubscriptionScopeNext operation. */ export type DeploymentOperationsListAtSubscriptionScopeNextResponse = DeploymentOperationsListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentOperationsListResult; }; }; /** * Contains response data for the listNext operation. */ export type DeploymentOperationsListNextResponse = DeploymentOperationsListResult & { /** * The underlying HTTP response. */ _response: msRest.HttpResponse & { /** * The response body as text (string format) */ bodyAsText: string; /** * The response body as parsed JSON or XML */ parsedBody: DeploymentOperationsListResult; }; };
On the determination of relative fitness from frequencies of genotypes in subsequent generations : Part I. Algebra of reproduction and selection in populations with discrete generations. An algebraic treatment of reproduction and selection processes in populations of diploids with discrete generation cycles is presented. The main objective was a determination of the conditions under which the selection coefficients for the various genotypes can be determined solely on the basis of known frequencies of genotypes in two subsequent generations. In part two, to be published later, the statistical properties of a special fitness estimator, proposed by Hayman, are considered. Confidence intervals and tests of significance concerning hypotheses about fitness are established and checked by computer simulation studies.
Q: Function not running when return pressed I have a textfield, when something is typed in the textfield and "return" on the keyboard is pressed, the keyboard should hide. But it doesn't.. Here is the code I am using: import UIKit class EditTableViewController: UITableViewController, UITextFieldDelegate { var product: Product? @IBOutlet weak var productImageView: UIImageView! @IBOutlet weak var ProductDescriptionTextView: UITextView! @IBOutlet weak var productTitleLabel: UITextField! override func viewDidLoad() { super.viewDidLoad() println("loaded") productImageView.image = product?.image productTitleLabel.text = product?.title ProductDescriptionTextView.text = product?.description } override func viewWillDisappear(animated: Bool) { product?.title = productTitleLabel.text product?.description = ProductDescriptionTextView.text product?.image = productImageView.image! } func textFieldShouldReturn(textField: UITextField) -> Bool // called when 'return' key pressed. return NO to ignore. { println("return") return true } } In the console I get "loaded", but when I press return in the textfield, I don't get "return" how come? A: You forgot to set the UITextField's delegate to your view controller (self) productTitleLabel.delegate = self - also note that you should name your variables properly to avoid confusion (productTitleTextField instead of a 'Label' suffix) Or, instead of doing it programmatically, you can do it in storyboard by Ctrl-dragging from your textView to the view controller in storyboard, and select delegate on the popup. Then, let your view controller conform to UITextFieldDelegate protocol: class EditTableViewController: UITableViewController, UITextFieldDelegate { .... func textFieldShouldReturn(textField: UITextField) -> Bool { if textField == productTitleLabel { textField.resignFirstResponder() } return true } }
Q: What could cause my app to show a blank screen on startup after upgrading to iOS 4.2.1? My app works fine on iOS 3.3, but after I upgraded my iPhone to iOS 4.2.1, I started to see some weird behaviour. When I start my app on the upgraded iPhone, it goes blank. I have to tap the Home button to close the app. The problem is, the app did not crash. It just showed me a blank screen. So I don't have any crash report to track this issue down. Has anyone seen this before? Is it an iOS 4.2-specific issue? What steps can I take to determine the cause so that I can fix my code? A: The behaviour of iOS did change between iOS3 and iOS4. As a first step, try walking through your code with the debugger. Also check your application:didFinishLaunchingWithOptions: method in your main App Delegate class. A quick search also turned up some useful info about a similar issue: App shows white screen on startup after upgrading to iOS 4.2 The link also has info on how they managed to find out what was happening.
Volcano Hiking and Sightseeing Excursion $88.00 Hike up the Volcano of Mount Liamuiga, through the cloud forest to reach the top of the 3792-foot (1152-meter) volcano. Views not found on Island Tours Perfect for adventure seekers Connect with nature All day tour Strenuous Hiking Refreshments Included Tours run rain or shine What to Expect Your tour guide will greet you in front of Maupau Casino located to your immediate right as you exit the Arrivals Hall. Hike up the crater of Mount Liamuiga during this 6-hour sightseeing and hiking excursion in St Kitts. With your expert adventure guide, travel out of the bustling town of Basseterre to northernmost parish of St Paul. Trek for 2.5 hours through the cloud forest, learning about the island’s flora and fauna along the way through your guide’s informative commentary. At the top of the 3792-foot (1152-meter) volcano, get breathtaking views of the island, the volcano’s crater and the surrounding turquoise sea. Guests need to be reasonably fit as the last quarter requires moderate effort as you can go out on a ledge or two to captivate the best picturesque views.The volcano stands at 3792 feet and is the highest point on the island. On the top of central forest reserve the Volcano rim is 2800 feet above sea. At the high mountain which takes about 2 to 2 and a half hours hiking upwards, lies cloaked in a dwarfed cloud forest and overlooks what is often referred to as “Giants Salad Bowl.” Enjoy a picnic lunch while perched on the crater of the volcano before returning to Basseterre. Volcano Hiking and Sightseeing Excursion $88.00 We booked our volcano hiking tour through shore excursioneer. We met Captain Sunshine (great guy) at the port and we headed out to our hike. It was a rainy day so it made for a muddy and wet hike in the rain forest. I don't remember the name of the dormant volcano, but the hike took about five hours Sharing the beauty of St Kitts with our guests through our personalized Island and Adventure Tours. From the golden sandy beaches and cloud fringed hillsides, to rich cultural monuments. Captain Sunshine invites you to come and share the unique island experiences that make St. Kitts such a fascinating destination.
40 F.3d 1239 Bullock (Vernon S.), Goff (Sidney C., III), Cinque (Hamisi Yerodin)v.State of New Jersey, County of Monmouth, Kennedy (James A.);Appeal of Bullock (Vernon S.) NO. 94-5375 United States Court of Appeals,Third Circuit. Oct 31, 1994 Appeal From: D.N.J., No. 94-cv-00232, Brown, J. 1 AFFIRMED.
Impressive Millers See Off Silkmen Rotherham United turned in a battling performance, to make it two home wins on the spin against Macclesfield Town. Ben Wright had cancelled out Danny Harrison's opener in the first half, but goals from Adam Le Fondre and Drewe Broughton meant that all three points belonged to the Millers. The millers were forced into one change to the side, with Pablo Mills returning to the heart of the defence, in place of Nick Fenton who was withdrawn during the victory against Bury at the weekend. The Millers first chance came after just three minutes, Marcus Marshall raced onto a through pass, to cut the ball back from the byline, perfectly for Craig McCallister, but his left-footed shot was straight at Jon Brain. After a stop-start opening to the game, Rotherham managed to make the breakthrough on 11 minutes. A long ball by Dale Tonge was headed clear, and Harrison hit it on the half-volley from 25 yards, into the bottom corner. When Le Fondre won a corner on the right-hand side, Nicky Law drifted the ball in and Gavin Gunning's header was destined for the bottom corner, until Brain somehow got a hand to it. The visitors equalised midway through the first-half with their first real attack of the game, thanks to some slack defending by the Millers. A shot from distance was blocked by Ian Sharps, and Craig Lindfield was allowed to thread a pass through to Wright who rammed the ball past Andy Warrington. The visitors began to get back in the game, but it was Rotherham who almost got a second, just after the half-hour. Marshall's cross from the right was headed clear, and Harrison, in what was almost a carbon copy of his first attempt, volleyed just wide of Brain's goal. With five minutes of the half remaining, a quick turn by Marshall created him enough room to cross from the left, and when McAllister couldn't get a shot away in the box, he found Josh Walker, whose snap-shot rolled narrowly wide. Neither team could get a firm grip on the game in the second half, and the first real chance fell to the visitors. When Walker was caught in possession in his own half, Lee Bell put Wright through, who raced away from the defence, and as he shaped to shoot, Mills dived in to make a fantastic block challange. McAllister flicked on midway through the Macclesfield half, for Le Fondre to chase, and when he flicked inside, substitute Abdulai Bell-Baggie raced towards goal, but his shot on the angle was saved, and McAllister's header from the rebound was comfortably held by Brain. With just 20 minutes remaining, the Millers were given a scare, when Emile Sinclair was given time and space in the box to get a shot away, but he never got hold of it, and it didn't trouble Warrington as it rolled well wide. At the other end, Broughton flicked on Warrington's kick for Le Fondre, and with his back to goal, laid off for Harrison, but his shot, this time with his left foot, was just the wrong side of Brain's left-hand post. Within minutes Law found space in the area on the left, and opted to cross, but despite Millers players queuing up in the goalmouth, Nat Brown managed to clear. Chaos ensued on 78 minutes, when the Millers were awarded a penalty. Le Fondre managed to beat two men on the right hand side before working away into the box where he was felled by Sean Hessey. Following a lengthy discussion with the linesman referee Salisbury eventually pointed to the penalty spot, for a kick after Le Fondre had hit the deck. Le Fondre brushed himself down and stepped up to place the ball into the bottom corner and give the lead back to the Millers. Within two minutes, the game was put beyond doubt. Law picked the ball up in his own half and burst through midfield, before sliding in Bell-Baggie. The loanee's effort was saved by Brain, but bounced to the feet of Broughton who reacted quick enough to slot the ball into an empty net. Matthew Tipton was introduced as manager Simpson made two changes, and had the Silkmen's best chance of the game. A reverse pass by Bell found the substitute on the left hand side of the area, but his effort was sliced well wide. The referee brought the game to an end after four added minutes, as the Millers took three well earned points in the hunt for automatic promotion. Star Player Pablo Mills, a well timed tackle to stop Town scoring possibly changed the game at 1-1.
In my previous work, I argued that the critiques of marriage that were made during what is commonly referred to as the second wave of feminism not only remain significant to contemporary marriage but in some ways have become even more pertinent in light of the role that the institution of marriage plays in the neoliberal state. In this paper I expand on that argument, highlighting the ways in which same-sex marriage fits comfortably within conservative ideology to all those except the most homophobic and supports the politics of state austerity. Examining the reasons advanced by Conservatives for introducing and supporting same-sex marriage alongside other policies of the Conservative Party, particularly those relating to ‘family values’ and the cuts to the welfare state, highlights the ways in which same-sex marriage contributes to a broader conservative policy package. I conclude that the Conservative proposal of same-sex marriage is also a proposal to the lesbian and gay communities to renew both the institution of marriage and the reputation of the Conservative Party, tarnished by its characterization as ‘the nasty party’. Behind that proposal lies an intention of sexual regulation of both low-income couples more generally and ‘sexually promiscuous’ gay men in particular, through financial incentives to marry and remain married. Dr. Nicola Barker is a Senior Lecturer at the University of Kent Law School, where she teaches family law and public law. She is the author of several articles on marriage and civil partnerships, as well as the book Not the Marrying Kind: A Feminist Critique of Same-Sex Marriage (Palgrave, 2012), which won the Hart/Socio-Legal Studies Association book prize 2013.
Catalytic properties of the plant cytochrome P450 CYP73 expressed in yeast. Substrate specificity of a cinnamate hydroxylase. The catalytic properties of CYP73, a cinnamate 4-hydroxylase isolated from Helianthus tuberosus tuber [Teutsch, H. G., Hasenfratz, M. P., Lesot, A., Stoltz, C., Garnier, J. M., Jeltsch, J. M., Durst, F. & Werck-Reichhart, D. (1993) Proc. Natl Acad. Sci. USA 90, 4102-4106] and expressed in an optimised yeast system [Urban, P., Werck-Reichart, D., Teutsch, G. H., Durst, F., Regnier, S., Kazmaier, M. & Pompon, D. (1994) Eur. J. Biochem. 222, 843-850] have been investigated. Microsomes from transformed yeast catalysed trans-cinnamate hydroxylation with high efficiency. CYP73 was highly specific for its natural substrate, and did not catalyse oxygenation of p-coumarate, benzoate, ferulate, naringenin or furanocoumarins. No metabolism of terpenoids or fatty acids, known substrates of plant P450s, was observed. CYP73 however demethylated the natural coumarin herniarin into umbelliferone. In addition, it was shown to oxygenate five xenobiotics and mechanism-based inactivators, including the herbicide chlorotoluron. All substrates of CYP73 were small planar aromatic molecules. Comparison of the kinetic parameters of CYP73 for its various substrates showed that, as expected, cinnamate was by far the best substrate of this P450. The physiological and toxicological significance of these observations are discussed.
// @flow import { compose, scale, rotate, translateY } from '../utils/utils'; import type { Animation } from '../utils/types'; const scaleRotateTranslateY = compose(scale, rotate, translateY) const twisterInUp: Animation = { '0%': { opacity: 0, transformOrigin: '100% 0', transform: scaleRotateTranslateY([0], [360], ['100%']) }, '30%': { transformOrigin: '100% 0', transform: scaleRotateTranslateY([0], [360], ['100%']) }, '100%': { opacity: 1, transformOrigin: '0 0', transform: scaleRotateTranslateY([1], [0], ['0']) } }; export default twisterInUp;
Not known Facts About latest technology news websites Not known Facts About latest technology news websites Reliance Jio buyers' info appears to are already hacked by a website, nevertheless the operator maintains the databases hasn't been breached. Florida launches rescue in wake of Irma Crisis groups go into action because the weakening storm moves up the state's west Coastline. “I do think each and every company is having safety extra seriously annually, but the attackers are frequently bettering, And so the balance of electric power will remain exactly the same with the around future.” he informed BGR India. “Every firm can repel weaker attackers, but not all of them, and it has to generate calculated risk acceptance decisions.” The "nightmare situation" is climbing for just a hacking attack on the nuclear electricity plant's computer program that triggers the uncontrolled release of radiation, the United Nations' deputy chief warned Thursday. President-elect Donald Trump states that "no computer is Safe and sound" In terms of maintaining information non-public, expressing new skepticism about the security of on-line communications his administration is probably going to employ for almost everything from day-to-working day planning to Intercontinental relations. Shoppers and protection professionals say response to breach that exposed own facts of 143 million Us citizens has become disorderly and underneath-resourced Along with the climbing value of digital cryptocurrencies, crafty hackers are making use of an attack which often can quietly make use of your computer power to generate income. HBO termed it as "bug bounty payment", contacting it A part of a programme that rewarded ethical hackers. ” he spelled out. “The DNC utilized Windows on their own server, so it generated my execute much click here simpler. I put in place my Trojan-like virus on their own PCs. I just modified the Method that I bought within the hacking community forums for about $1.5k”. Apple, Google, Microsoft vow to fight for workers strike by Donald Trump's go US tech giants have pledged to face by their staff members following the Trump administration scrapped an amnesty programme that granted get the job done permits to immigrants Cybersecurity — or The shortage thereof — dominated the headlines in the course of check here this 12 months. Countless numerous information bought stolen and about a dozen of firms acquired hacked previously 12 month Google rolls out feed for Indian end users in Android & iOS This update can help you improved tune the move of news and information from your Internet to your phone, enabling you to dig deeper on subject areas you`re passionate about. Hackers attacked the website of the countrywide airline and flight information screens at Vietnam's two greatest airports on Friday, submitting notices that state media claimed criticised the Philippines and Vietnam and their statements while in the South China Sea.
The Tverskoy court announced Wednesday it won’t take up Navalny’s lawsuit because it failed to meet judicial criteria. Navalny has alleged that Putin ordered officials to withhold permission for the rallies fearing a challenge in next March’s presidential vote. Putin hasn’t said if he will seek another term, but he’s widely expected to run. Navalny has said he intends to join the race even though a criminal conviction that he calls politically motivated bars him from running. The anti-corruption crusader has organized a grassroots campaign to support his presidential bid and staged waves of protests this year to raise pressure on the Kremlin.
Properties of multiple clad fibers: experiments and numerical predictions. Experimental results for the dispersion and bending losses of quadruple clad fibers are compared to numerical calculations. The non-Gaussian shape of the fundamental mode of these fibers was measured. Sellmeier coefficients determining the refractive indices of the doped glass from which the fibers are made appear to be important for predicting the dispersion compensation effect. Bending losses were computed, and comparisons with experiments show that the qualitative behavior of quadruple clad fibers at small bending radii can be predicted.